top of page

Free Threat Intelligence for Palo Alto Cortex XDR Users: DugganUSA STIX 2.1 Feed

  • Writer: Patrick Duggan
    Patrick Duggan
  • Nov 13, 2025
  • 3 min read

Published: November 13, 2025 Category: Threat Intelligence Vendor: Palo Alto Networks Cortex XDR




The Value Proposition


DugganUSA discovered 244 threats that billion-dollar vendors (AbuseIPDB, VirusTotal, ThreatFox) scored as ZERO.


63% unique discovery rate. Multi-source correlation. Free.


Your Cortex XDR platform is excellent. Our STIX 2.1 feed makes it better.




What You Get



• Free STIX 2.1 threat intelligence feed

• Real-time updates from production security operations

• MITRE ATT&CK mapped indicators

• Zero cost - Democratic Sharing Law (Judge Dredd D6: 99.5% public)

• 244+ unique discoveries missed by major threat intel vendors


Feed URL: `https://analytics.dugganusa.com/api/v1/stix-feed`




Cortex XDR Integration


Step 1: Access Threat Intelligence Management


1. Log into Cortex XDR Console 2. Navigate to Response → External Dynamic Lists 3. Click + New List


Step 2: Configure STIX Feed



List Type: Threat Intelligence
Name: DugganUSA STIX 2.1 Feed
Description: Free threat intel - 244 unique discoveries
Source URL: https://analytics.dugganusa.com/api/v1/stix-feed?days=30&min_confidence=70
Format: STIX 2.1
Update Frequency: Hourly
Authentication: None
Certificate Validation: Enabled


Step 3: Create IOC Rule


Navigate to Response → IOC Rules → + New Rule



Rule Name: Block DugganUSA High-Confidence Threats
Description: Auto-block IPs from unique discovery feed
Source: DugganUSA STIX 2.1 Feed
Severity: High
Action: Block
Scope: All endpoints


Step 4: XQL Queries for Hunt


Find Communications with Unique Discoveries



xql
dataset = xdr_data
| filter event_type = STORY and event_sub_type = NETWORK_STORY
| alter remote_ip = arrayindex(regextract(action_remote_ip, "(\d+\.\d+\.\d+\.\d+)"), 0)
| join type=left (
    dataset = threat_intel_feeds
    | filter feed_name = "DugganUSA STIX 2.1 Feed"
    | alter indicator_ip = indicator_value
  ) indicator_ip = remote_ip
| filter isnotnull(indicator_value)
| fields agent_hostname, remote_ip, indicator_value, threat_score, unique_discovery


Alert on Vendors-Missed Threats



xql
config case_sensitive = false
| dataset = network_story  
| join type=inner (
    dataset = threat_intel_feeds 
    | filter feed_name contains "DugganUSA"
    | filter unique_discovery = true
  ) dst_ip_v4 = indicator_value
| alter 
    missed_by = json_extract_scalar(custom_properties, "$.x_dugganusa_discovery.sources_with_zero_score"),
    confidence = json_extract_scalar(custom_properties, "$.confidence")
| fields _time, src_host_name, dst_ip_v4, confidence, missed_by




Prevention Policy Rules


Bioc Rule: Block High-Confidence Malicious IPs



// Navigate to Response → BIOC Rules
config case_sensitive = false
| dataset = network_story
| join type=inner (
    dataset = threat_intel_feeds
    | filter feed_name = "DugganUSA STIX 2.1 Feed"
    | filter confidence >= 85
    | filter indicator_types contains "malicious-activity"
  ) dst_ip_v4 = indicator_value
| alter threat_name = indicator_name
| fields agent_hostname, dst_ip_v4, threat_name, confidence


Action: Terminate network connection + Alert




Feed Parameters


Customize for your environment:



# High confidence only (recommended for prevention)
https://analytics.dugganusa.com/api/v1/stix-feed?days=7&min_confidence=90




Why This Matters


Cortex XDR has the visibility. We have the correlation.


You see network traffic, endpoint behavior, cloud activity. We see 5 threat intelligence sources simultaneously.


When every major vendor scores an IP as benign, but we blocked it at 95% confidence — that's the indicator your XDR needs.


244 unique discoveries that would have slipped through vendor-only threat feeds.




Integration with AutoFocus


1. Navigate to Threat Intelligence → AutoFocus 2. Create custom tag: `DugganUSA_UniqueDiscovery` 3. Import our STIX feed as tag source 4. Enable automatic tagging for sessions matching our indicators


Result: Enrich AutoFocus sessions with our unique discovery intelligence.




Democratic Sharing Law


This feed is free because hoarding threat intelligence is bullshit.


Zero marginal cost to share digital goods. We publish openly because that's how you prove you're not lying about your discoveries.


Judge Dredd Dimension 6 (Democratic Sharing): 99.5% public (4,780 files tracked).


7.1x evidence-to-claims ratio. We show receipts.




Technical Details



• Format: STIX 2.1 Bundle

• Attribution: `created_by_ref: identity--dugganusa-llc-f4a8c3d2-1b9e-4f7a-8c2d-9e3f5b6a7c8d`

• Update Frequency: Real-time from production auto-blocking

• License: CC0-1.0 (Public Domain)

• Contact: [email protected]




Support


Questions? Email [email protected]


API health: `https://analytics.dugganusa.com/api/v1/stix-feed/info`


Documentation: `https://analytics.dugganusa.com/docs/stix-feed.md`




Your security is our problem now.


— DugganUSA LLC (Minnesota)


Comments

Rated 0 out of 5 stars.
No ratings yet

Add a rating
bottom of page