CISA Reports CDF
The web format of this guide reflects the most current release. Guides for older iterations are available in PDF format.
Integration Details
ThreatQuotient provides the following details for this integration:
Current Integration Version | 2.0.4 |
Compatible with ThreatQ Versions | >= 4.52.0 |
Support Tier | ThreatQ Supported |
Introduction
The CISA Reports CDF consumes data provided by the CISA to notify organizations about threats that exist on the Internet.
The integration provides the following endpoint:
- CISA Reports - ingests reports from the xml source as well as related system objects.
The integration ingests the following system object types:
- Files
- Incidents
- Indicators
- Reports
- TTPs
The CISA Reports CDF replaces the US-CERT Reports CDF. The US-CERT website was removed and its threat intelligence feed was migrated to the main CISA website. This resulted in a naming update as well as an update to the endpoint utilized by the integration.
Installation
This integration can be installed in the My Integration section of your ThreatQ instance. See the Adding an Integration topic for more details.
Configuration
ThreatQuotient does not issue API keys for third-party vendors. Contact the specific vendor to obtain API keys and other integration-related credentials.
To configure the integration:
- Navigate to your integrations management page in ThreatQ.
- Select the OSINT option from the Category dropdown (optional).
If you are installing the integration for the first time, it will be located under the Disabled tab.
- Click on the integration entry to open its details page.
- Enter the following parameters under the Configuration tab:
Parameter Description Verify SSL When enabled, the integration will validate the host-provided SSL certificate. This option is enabled by default. Parse Tags Enable this option to automatically add tags to the report object. This option is enabled by default. Parse for Selected Indicators Select the indicator types to be parsed for reports. Options include - CVEs (default)
- MD5 Hashes (default)
- SHA-1 Hashes (default)
- SHA-256 Hashes (default)
- SHA-512 Hashes (default)
- IP Addresses (default)
This parameter does not apply to parsed STIX files.
- Review any additional settings, make any changes if needed, and click on Save.
- Click on the toggle switch, located above the Additional Information section, to enable it.
ThreatQ Mapping
CISA Reports
The CISA Reports endpoint ingests reports from the xml feed as well as system objects related to the report.
GET https://www.cisa.gov/cybersecurity-advisories/analysis-reports.xml
Depending on the description length, the CDF may or may not attempt to fetch the article's HTML data via the link. The HTML data will be used in-place of the bad description. That request will be made to the following link:
GET https://www.cisa.gov/news-events/analysis-reports/<report_id>
Sample Response:
<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xml:base="https://www.cisa.gov/">
<channel>
<title>CISA Analysis Reports</title>
<link>https://www.cisa.gov/</link>
<description/>
<language>en</language>
<item>
<title><a href="/news-events/analysis-reports/ar22-272a" hreflang="en">MAR-10365227-2.v1 </a></title>
<link>https://www.cisa.gov/news-events/analysis-reports/ar22-272a</link>
<description>Original release date: October 31, 2019 ... </description>
<pubDate>Thu, 31 Oct 2019 14:57:45 +0000</pubDate>
<dc:creator>CISA</dc:creator>
<guid isPermaLink="false">/node/9076</guid>
</item>
...
</channel>
</rss>
ThreatQuotient provides the following default mapping for this feed:
Feed Data Path | ThreatQ Entity | ThreatQ Object Type or Attribute Key | Published Date | Examples | Notes |
---|---|---|---|---|---|
.rss.channel.item[].title | Report.title | N/A | .rss.channel.item[].pubDate | AR19-304A: MAR-10365227-2 – North Korean Trojan: HOPLIGHT | |
.rss.channel.item[].description | Report.description | N/A | N/A | Original release date: October 31, 2019 ... | Base64 encoded image binaries are removed and descriptions are truncated at 65535 characters |
N/A | Report.attribute | Report type | .rss.channel.item[].pubDate | CISA Report | |
.rss.channel.item[].link | Report.attribute | URL | .rss.channel.item[].pubDate | https://www.cisa.gov/news-events/analysis-reports/ar22-272a | |
N/A | Report.attribute | NCAS feed name | .rss.channel.item[].pubDate | Analysis Reports | |
.rss.channel.item[].description | Related Indicator.value | IP Address, CVE, MD5, SHA-1, SHA-256, or SHA-512 | .rss.channel.item[].pubDate | N/A | Indicators are parsed out of the description |
.rss.channel.item[].description | Related File | Malware Analysis Report | .rss.channel.item[].pubDate | N/A | PDF links are parsed out of the description, downloaded, and related as an attachment |
.rss.channel.item[].description | Related File | STIX | .rss.channel.item[].pubDate | N/A | STIX links are parsed out of the description, downloaded, and related as an attachment |
N/A | Related Indicator/TTP/Incident.value | N/A | .rss.channel.item[].pubDate | N/A | STIX files are parsed for their indicators, TTPs, Incidents, and Tags |
Average Feed Run
Object counts and Feed runtime are supplied as generalities only - objects returned by a provider can differ based on credential configurations and Feed runtime may vary based on system resources and load.
Metric | Result |
---|---|
Run Time | 2 minutes |
Files | 7 |
Reports | 10 |
Report Attributes | 30 |
Indicators | 45 |
Incidents | 16 |
TTPs | 2 |
Change Log
- Version 2.0.4
- Resolved a parsing issue with the RSS feed regarding the
pubDate
.
- Resolved a parsing issue with the RSS feed regarding the
- Version 2.0.3
- Resolved a title parsing issue that was caused by a provider change to the
<title>
XML format.
- Resolved a title parsing issue that was caused by a provider change to the
- Version 2.0.2
- Updated the integration's endpoint based on website migration updates by the provider.
- Rebranded to integration from US-CERT Reports to CISA Reports.
- Version 2.0.1
- Added the ability to parse Tags.
- Fixed an issue where the wrong TTP objects were parsed.
- Version 2.0.0
- Initial Release. This endpoint used to be included in the US-CERT integration. That integration has been deprecated and its endpoints split into four separate CDFs.
PDF Guides
Document | ThreatQ Version |
---|---|
CISA Reports CDF Guide v2.0.4 | 4.52.0 or Greater |
CISA Reports CDF Guide v2.0.3 | 4.52.0 or Greater |
CISA Reports CDF Guide v2.0.2 | 4.52.0 or Greater |
US-CERT Reports CDF Guide v2.0.1 | 4.52.0 or Greater |
US-CERT Reports CDF Guide v2.0.0 | 4.52.0 or Greater |