I wanted to inquire about any new features or updates that have been recently enabled in Yara-L, mainly threat intel feeds or the features which can be used to develop rules or to define new severity. Could you please provide me with information regarding the latest enhancements or functionalities added to the system?
We continue to build and improve upon all of the items you mention and have some of these in various preview stages that we look forward to getting to general availability as well.
We continue to build and improve upon all of the items you mention and have some of these in various preview stages that we look forward to getting to general availability as well.
From a purely external data feed perspective, there is the VirusTotal Relationships, the GCTI Tor Exit Nodes, GCTI Remote Access Tools. Additionally, there is enriched data including geolocation, safe browsing, whois and VT enrichment.
From a derived perspective, prevalence and first/last seen are also available.
From a purely external data feed perspective, there is the VirusTotal Relationships, the GCTI Tor Exit Nodes, GCTI Remote Access Tools. Additionally, there is enriched data including geolocation, safe browsing, whois and VT enrichment.
From a derived perspective, prevalence and first/last seen are also available.
could you please provise detailed documentation for derived perpective or a sample rule?
The two derived context examples we have are prevalence, which spans ip, file hashes and domains as well as first/last seen which cover the same but also first time for assets and users.
The two derived context examples we have are prevalence, which spans ip, file hashes and domains as well as first/last seen which cover the same but also first time for assets and users.
I have an additional question: Is the "whois" data pushed to Chronicle by Chronicle itself, or does the tenant need a premium subscription or some other service for this purpose?