Current ThreatQ Version Filter
 

CISA Reports CDF

The web format of this guide reflects the most current release.  Guides for older iterations are available in PDF format.  

Integration Details

ThreatQuotient provides the following details for this integration:

Introduction

The CISA Reports CDF consumes data provided by the CISA to notify organizations about threats that exist on the Internet.

The integration provides the following endpoint:

  • CISA Reports - ingests reports from the xml source as well as related system objects.

The integration ingests the following system object types:

  • Files
  • Incidents
  • Indicators
  • Reports
  • TTPs

The CISA Reports CDF replaces the US-CERT Reports CDF.  The US-CERT website was removed and its threat intelligence feed was migrated to the main CISA website.   This resulted in a naming update as well as an update to the endpoint utilized by the integration.   

Installation

This integration can be installed in the My Integration section of your ThreatQ instance. See the Adding an Integration topic for more details.

Configuration

ThreatQuotient does not issue API keys for third-party vendors. Contact the specific vendor to obtain API keys and other integration-related credentials.

To configure the integration:

  1. Navigate to your integrations management page in ThreatQ.
  2. Select the OSINT option from the Category dropdown (optional).

    If you are installing the integration for the first time, it will be located under the Disabled tab.

  3. Click on the integration entry to open its details page.
  4. Enter the following parameters under the Configuration tab:
    Parameter Description
    Verify SSL When enabled, the integration will validate the host-provided SSL certificate.  This option is enabled by default.
    Parse Tags Enable this option to automatically add tags to the report object.  This option is enabled by default.
    Parse for Selected Indicators Select the indicator types to be parsed for reports.  Options include
    • CVEs (default)
    • MD5 Hashes (default)
    • SHA-1 Hashes (default)
    • SHA-256 Hashes (default)
    • SHA-512 Hashes (default)
    • IP Addresses (default)

    This parameter does not apply to parsed STIX files.


    Configuration Screen
  5. Review any additional settings, make any changes if needed, and click on Save.
  6. Click on the toggle switch, located above the Additional Information section, to enable it.

ThreatQ Mapping

CISA Reports

The CISA Reports endpoint ingests reports from the xml feed as well as system objects related to the report.

GET https://www.cisa.gov/cybersecurity-advisories/analysis-reports.xml

Depending on the description length, the CDF may or may not attempt to fetch the article's HTML data via the link. The HTML data will be used in-place of the bad description. That request will be made to the following link:

GET https://www.cisa.gov/news-events/analysis-reports/<report_id>

Sample Response:

<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xml:base="https://www.cisa.gov/">
	<channel>
		<title>CISA Analysis Reports</title>
		<link>https://www.cisa.gov/</link>
		<description/>
		<language>en</language>
		<item>
			<title><a href="/news-events/analysis-reports/ar22-272a" hreflang="en">MAR-10365227-2.v1 </a></title>
            <link>https://www.cisa.gov/news-events/analysis-reports/ar22-272a</link> 
			<description>Original release date: October 31, 2019 ... </description>
			<pubDate>Thu, 31 Oct 2019 14:57:45 +0000</pubDate>
			<dc:creator>CISA</dc:creator>
			<guid isPermaLink="false">/node/9076</guid>
		</item>
		...
	</channel>
</rss>

ThreatQuotient provides the following default mapping for this feed:

Feed Data Path ThreatQ Entity ThreatQ Object Type or Attribute Key Published Date Examples Notes
.rss.channel.item[].title Report.title N/A .rss.channel.item[].pubDate AR19-304A: MAR-10365227-2 – North Korean Trojan: HOPLIGHT  
.rss.channel.item[].description Report.description N/A N/A Original release date: October 31, 2019 ... Base64 encoded image binaries are removed and descriptions are truncated at 65535 characters
N/A Report.attribute Report type .rss.channel.item[].pubDate CISA Report  
.rss.channel.item[].link Report.attribute URL .rss.channel.item[].pubDate https://www.cisa.gov/news-events/analysis-reports/ar22-272a  
N/A Report.attribute NCAS feed name .rss.channel.item[].pubDate Analysis Reports  
.rss.channel.item[].description Related Indicator.value IP Address, CVE, MD5, SHA-1, SHA-256, or SHA-512 .rss.channel.item[].pubDate N/A Indicators are parsed out of the description
.rss.channel.item[].description Related File Malware Analysis Report .rss.channel.item[].pubDate N/A PDF links are parsed out of the description, downloaded, and related as an attachment
.rss.channel.item[].description Related File STIX .rss.channel.item[].pubDate N/A STIX links are parsed out of the description, downloaded, and related as an attachment
N/A Related Indicator/TTP/Incident.value N/A .rss.channel.item[].pubDate N/A STIX files are parsed for their indicators, TTPs, Incidents, and Tags

Average Feed Run

Object counts and Feed runtime are supplied as generalities only - objects returned by a provider can differ based on credential configurations and Feed runtime may vary based on system resources and load.

Metric Result
Run Time 2 minutes
Files 7
Reports 10
Report Attributes 30
Indicators 45
Incidents 16
TTPs 2

Change Log

  • Version 2.0.4
    • Resolved a parsing issue with the RSS feed regarding the pubDate
  • Version 2.0.3
    • Resolved a title parsing issue that was caused by a provider change to the <title> XML format.    
  • Version 2.0.2
    • Updated the integration's endpoint based on website migration updates by the provider.  
    • Rebranded to integration from US-CERT Reports to CISA Reports.
  • Version 2.0.1
    • Added the ability to parse Tags. 
    • Fixed an issue where the wrong TTP objects were parsed.   
  • Version 2.0.0
    • Initial Release.  This endpoint used to be included in the US-CERT integration.  That integration has been deprecated and its endpoints split into four separate CDFs.  

PDF Guides

Document ThreatQ Version
CISA Reports CDF Guide v2.0.4 4.52.0 or Greater
CISA Reports CDF Guide v2.0.3 4.52.0 or Greater
CISA Reports CDF Guide v2.0.2 4.52.0 or Greater
US-CERT Reports CDF Guide v2.0.1 4.52.0 or Greater
US-CERT Reports CDF Guide v2.0.0 4.52.0 or Greater