Cisco Threat Grid CDF
The web format of this guide reflects the most current release. Guides for older iterations are available in PDF format.
Integration Details
ThreatQuotient provides the following details for this integration:
Current Integration Version | 1.1.1 |
Compatible with ThreatQ Versions | >= 4.34.0 |
Support Tier | ThreatQ Supported |
Introduction
The Cisco Threat Grid CDF is a sandbox which allows the detonation of samples to generate analysis reports. The Cisco Threat Grid CDF for ThreatQ enables a user to ingest their organization's sample analysis reports from Threat Grid. These samples can be filtered down by their threat score, so you are able to ingest only the detonations that your organization deems important to track.
The CDF provides the following feeds:
- Cisco Threat Grid - ingests analyses as Report Objects within ThreatQ.
- Get Analysis (Supplemental) - fetches the full analysis report JSON from Threat Grid's API.
- Get Sample (Supplemental) - fetches samples from Threat Grid.
The integration ingests the following system object types:
- Attack Patterns
- Attack Pattern Attributes
- Files (attachments)
- Indicators
- Indicator Attributes
- Reports
- Report Attributes
- TTPs
- TTP Attributes
Prerequisites
The following is required to use the integration:
- A Cisco Threat Grid Hostname and API Key.
Installation
Perform the following steps to install the integration:
The same steps can be used to upgrade the integration to a new version.
- Log into https://marketplace.threatq.com/.
- Locate and download the integration file.
- Navigate to the integrations management page on your ThreatQ instance.
- Click on the Add New Integration button.
- Upload the integration file using one of the following methods:
- Drag and drop the file into the dialog box
- Select Click to Browse to locate the integration file on your local machine
ThreatQ will inform you if the feed already exists on the platform and will require user confirmation before proceeding. ThreatQ will also inform you if the new version of the feed contains changes to the user configuration. The new user configurations will overwrite the existing ones for the feed and will require user confirmation before proceeding.
- The feed will be added to the integrations page. You will still need to configure and then enable the feed.
Configuration
ThreatQuotient does not issue API keys for third-party vendors. Contact the specific vendor to obtain API keys and other integration-related credentials.
To configure the integration:
- Navigate to your integrations management page in ThreatQ.
- Select the Commercial option from the Category dropdown (optional).
If you are installing the integration for the first time, it will be located under the Disabled tab.
- Click on the integration entry to open its details page.
- Enter the following parameters under the Configuration tab:
Parameter Description Threat Grid Host Enter your Threat Grid host. Default: panacea.threatgrid.com
API Key Enter your Cisco threat Grid API key for authentication.
Threat Score Criteria Select the threat scores you would like to ingest: - Critical (default)
- High (default)
- Medium
- Low
IOC Severity Threshold Enter a threshold severity for ingested IOCs Default: 50
Apply Severity Threshold to Domains as well Ingest Samples Enabling this will import the malware samples into ThreatQ. This option is disabled by default. You must enable downloading sample content via the API in your Threat Grid Account Profile.
Ingest Behavioral Indicators As Select the object type you would like behavioral indicators stored in - TTP (default)
- Attack Pattern
Disable Proxies Enable/disable this option to set whether the feed will honor proxies set in ThreatQ. Verify SSL Enable/disable this option to set whether the feed will verify SSL connections with the provider. Only Ingest Organizational Data Enable this parameter to only ingest organizational data.
- Review any additional settings, make any changes if needed, and click on Save.
- Click on the toggle switch, located above the Additional Information section, to enable it.
ThreatQ Mapping
Cisco Threat Grid
The Cisco Threat Grid feed ingests analyses as Report Objects within ThreatQ. Any metadata surrounding the reports will be included, as well as related IOCs, related TTPs, and their relevant attribution.
GET https://panacea.threatgrid.com/api/v2/search/submissions
Sample Response:
{
"api_version": 2,
"id": 6654269,
"data": {
"index": 0,
"total": 5,
"took": 486,
"timed_out": false,
"items_per_page": 10,
"current_item_count": 5,
"items": [
{
"score": 1000000,
"matches": {},
"item": {
"properties": {
"metadata": null
},
"tags": [],
"vm_runtime": 300,
"md5": "2128689698b9a7e496b20bac4ddd42b1",
"private": false,
"organization_id": 12882,
"state": "succ",
"login": "strivers",
"sha1": "4d6f2012d5521f240f10b53c769d250d02cd5697",
"sample": "898bf464b34b3806d9f817004fc31533",
"filename": "9S659EHDCSI72649DS.doc",
"analysis": {
"metadata": {
"sandcastle_env": {
"controlsubject": "win7-x64-intel-2020.06.17",
"vm": "win7-x64",
"vm_id": "898bf464b34b3806d9f817004fc31533",
"sample_executed": 1597133073,
"analysis_end": "2020-08-11T08:10:10Z",
"analysis_features": [],
"analysis_start": "2020-08-11T08:03:45Z",
"display_name": "Windows 7 64-bit",
"run_time": 300,
"sandcastle": "3.5.62.17003.0a6e3cc14-1",
"current_os": "7601.18798.amd64fre.win7sp1_gdr.150316-1654"
},
"submitted_file": {
"magic": "Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.1, ...",
"sha1": "4d6f2012d5521f240f10b53c769d250d02cd5697",
"filename": "9S659EHDCSI72649DS.doc",
"sha256": "10281a188a26dbb10562bdc6f5467abad4b0e7fe73672b48a11fdd55819f81f3",
"type": "doc",
"md5": "2128689698b9a7e496b20bac4ddd42b1"
},
"general_details": {
"report_created": "2020-08-11T08:10:17Z",
"sandbox_version": "pilot-d",
"sandbox_id": "mtv-work-028"
},
"malware_desc": [
{
"sha1": "4d6f2012d5521f240f10b53c769d250d02cd5697",
"magic": "Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.1 ...",
"filename": "9S659EHDCSI72649DS.doc",
"size": 80896,
"sha256": "10281a188a26dbb10562bdc6f5467abad4b0e7fe73672b48a11fdd55819f81f3",
"type": "doc",
"md5": "2128689698b9a7e496b20bac4ddd42b1"
}
],
"analyzed_file": {
"magic": "Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.1 ...",
"sha1": "4d6f2012d5521f240f10b53c769d250d02cd5697",
"filename": "9S659EHDCSI72649DS.doc",
"sha256": "10281a188a26dbb10562bdc6f5467abad4b0e7fe73672b48a11fdd55819f81f3",
"type": "doc",
"md5": "2128689698b9a7e496b20bac4ddd42b1"
}
},
"behaviors": [
{
"name": "antivirus-flagged-artifact",
"threat": 72,
"title": "Artifact Flagged by Antivirus"
},
...
],
"threat_score": 100
},
"status": "job_done",
"submitted_at": "2020-08-11T08:03:44Z",
"sha256": "10281a188a26dbb10562bdc6f5467abad4b0e7fe73672b48a11fdd55819f81f3"
}
}
]
}
}
The integration does not use any fields from the above API response within ThreatQ. The supplemental feed id udrf to fetch the full analysis results. That JSON data is parsed for metadata, IOCs, TTPs, etc.
Get Analysis (Supplemental)
The Get Analysis supplemental feed will fetch the full analysis report JSON from Threat Grid's API.
GET https://panacea.threatgrid.com/api/v2/samples/{id}/analysis.json
Sample Response:
{
"version": 4,
"versions": {
"version": "4.0",
"network": {
"version": "2.0"
},
"file": {
"version": "2.0",
"html": "0.0",
"ini": "0.0",
"js": "0.0",
"lnk": "2.0",
"pdf": "0.0",
"pe": "0.0",
"rtf": "0.0",
"txt": "0.0"
},
"yara": "1.0",
"reversing_labs": "1.0",
"virustotal": "1.0",
"cognitive": "1.0",
"heuristic_model": "0.0.20190722T000000Z"
},
"metadata": {
"general_details": {
"report_created": 1583750398,
"sandbox_version": "pilot-d",
"sandbox_id": "mtv-work-087"
},
"sandcastle_env": {
"vm_id": "43a5ae8937855851ee142092d4cd6642",
"current_os": "7601.18798.amd64fre.win7sp1_gdr.150316-1654",
"analysis_start": 1583750035,
"analysis_end": 1583750394,
"run_time": 300,
"sample_executed": 1583750081,
"sandcastle": "3.5.51.16706.30e43d500-1",
"vm": "win7-x64",
"controlsubject": "win7-x64-intel-2020.02.03",
"display_name": "Windows 7 64-bit",
"analysis_features": []
},
"malware_desc": [
{
"filename": "woodguilt.com%2F87229782.png.url",
"size": 49,
"md5": "a28a6b6e8924ec4173241a8eff8bf8d3",
"sha1": "45d2abc7ff3693bb8a0d93fffc36561be28cccb3",
"sha256": "48c02c817adef30b675938044d65862e920c494ec13e60567f2c7aca3d7cc07b",
"magic": "MS Windows 95 Internet shortcut text (URL=<woodguilt.com/87229782.png>), ASCII text",
"type": "url"
}
]
},
"warnings": [],
"iocs": [
{
"category": [
"domain"
],
"hits": 1,
"description": "This indicator indicates that a DNS query was performed to an unregistered domain name...",
"title": "DNS Query Returned Non-Existent Domain",
"data": [
{
"Query_Type": "A",
"Query_ID": 20750,
"Query_Data": "woodguilt.com",
"Answer_Code": "NXDOMAIN",
"Network_Stream": 7
}
],
"tags": [
"communication"
],
"truncated": false,
"confidence": 75,
"mitre-tactics": [],
"heuristic_coefficient": -1.88155557784,
"orbital-queries": [],
"mitre-techniques": [],
"ioc": "dns-query-nxdomain",
"severity": 25
},
{
"category": [
"network-information"
],
"hits": 1,
"description": "A name resolution query using the NetBIOS API was made. NetBIOS is used to facilitate computers...",
"title": "NetBIOS Name Resolution Query",
"data": [
{
"Domain": "WOODGUILT.COM"
}
],
"tags": [
"netbios"
],
"truncated": false,
"confidence": 60,
"mitre-tactics": [],
"heuristic_coefficient": 1.42572787641,
"orbital-queries": [],
"mitre-techniques": [],
"ioc": "netbios-query",
"severity": 60
}
],
"threat": {
"heuristic_score": 0,
"threat_score": 36,
"bucket": "doc",
"heuristic_raw_score": -5.0775348811833245
},
"dynamic": {
"processes": {
"11": {
"registry_keys_read": [],
"pid": 428,
"kpid": "0xfffffa80027f37a0",
"files_deleted": [],
"files_created": [
"\\Users\\Administrator\\AppData\\Roaming\\Microsoft\\Protect\\S-1-5-21-2580483871-590521980-3826313501-500\\b0cc0ca3-d62b-440a-b6c1-e54b3ecf60a2"
],
"file_transactions": [],
"sockets": [],
"files_checked": [],
"sockets_traffic": [],
"errors": [],
"monitored": true,
"registry_keys_deleted": [],
"ppid": null,
"mutants_opened": [],
"memory": [
{
"protect": [
"PAGE_READWRITE"
],
"process": "0xfffffa80027f37a0",
"allocation_type": [
"MEM_COMMIT"
],
"entry": [
{
"size": "0x44",
"base_address": "0x0"
},
...
],
"zero_bits": 0,
"process_handle": "0x3f4"
},
...
],
"new": false,
"registry_keys_opened": [
{
"access": [
"ENUMERATE_SUB_KEYS",
"NOTIFY",
"QUERY_VALUE",
"READ_CONTROL"
],
"options": [
"REG_OPTION_NON_VOLATILE"
],
"name": "REGISTRY\\MACHINE\\SYSTEM\\CONTROLSET001\\CONTROL\\SECURITYPROVIDERS\\SCHANNEL"
},
...
],
"parent": "",
"startup_info": {
"upid": 428,
"shell_info": "C:\\Windows\\system32\\lsass.exe",
"current_directory": "C:\\Windows\\system32\\",
"command_line": "C:\\Windows\\system32\\lsass.exe",
"uthread": 0,
"desktop_info": "",
"tid": "0xfffffa80027b7b50",
"image_pathname": "C:\\Windows\\system32\\lsass.exe",
"dll_path": "C:\\Windows\\system32;C:\\Windows\\system32;C:\\Windows\\system;C:\\Windows;.;C:\\Windows\\system32;...",
"runtime_data": "",
"window_title": "C:\\Windows\\system32\\lsass.exe",
"incomplete": false
},
"process_name": "lsass.exe",
"registry_keys_modified": [
{
"value_name": "LanguageList",
"data_type": "MULTI_SZ",
"data": "en-US\u0000en\u0000\u0000",
"name": "REGISTRY\\USER\\.DEFAULT\\SOFTWARE\\CLASSES\\LOCAL SETTINGS\\MUICACHE\\3E\\52C64B7E"
},
...
],
"threads": [
{
"return": 0,
"thread": "0x00000000",
"process": "0x00000000",
"create_suspended": "0x1",
"client_id": 8397322214375721288,
"process_handle": "0x80000238"
},
...
],
"mutants_created": [],
"analyzed_because": "Process activity after target sample started.",
"files_modified": [
"\\Users\\Administrator\\AppData\\Roaming\\Microsoft\\Protect\\S-1-5-21-2580483871-590521980-3826313501-500\\Preferred",
"\\Users\\Administrator\\AppData\\Roaming\\Microsoft\\Protect\\S-1-5-21-2580483871-590521980-3826313501-500\\b0cc0ca3-d62b-440a-b6c1-e54b3ecf60a2"
],
"atoms_added": [],
"children": [],
"registry_keys_created": [],
"files_read": [
"\\Users\\Administrator\\AppData\\Roaming\\Microsoft\\Protect\\S-1-5-21-2580483871-590521980-3826313501-500\\Preferred"
],
"time": "Mon, 09 Mar 2020 10:34:42 UTC"
},
...
},
"extracted_keys": [
{
"pattern": "openssl",
"key": "AAAAAAAAAABSU0RTt6U4JJaqwk+5GKG0zGzxwAEAAABITmV0Q2ZnLnBkYgAAAAAA",
"offset": 508270176
},
...
]
},
"disk": {
"mbr": {
"hashes": {
"orig": {
"md5": "9e9e7db0e9aae4e1c0368a303657893e",
"sha1": "3ef2fda0124bc0011632e128da23341f3ef369f5",
"sha256": "03b44beb83adb31d85667b4cd806cb28a96cef9f3bc815b2ba7c8c68021607b8"
},
"curr": {
"md5": "9e9e7db0e9aae4e1c0368a303657893e",
"sha1": "3ef2fda0124bc0011632e128da23341f3ef369f5",
"sha256": "03b44beb83adb31d85667b4cd806cb28a96cef9f3bc815b2ba7c8c68021607b8"
}
},
"contents": {
"orig": "3\u00c0\u008e\u00d0\u00bc\u0000|\u008e\u00c0\u008e\u00d8\u00be\u0000|\u00bf\u0000\u0006\u00b9\u0000...",
"curr": "3\u00c0\u008e\u00d0\u00bc\u0000|\u008e\u00c0\u008e\u00d8\u00be\u0000|\u00bf\u0000\u0006\u00b9\u0000..."
},
"changed": false
},
"partition_tables": {
"orig": [
{
"start": 1048576,
"type": 7,
"size": 104857600
},
...
],
"curr": [
{
"start": 1048576,
"type": 7,
"size": 104857600
},
...
],
"changed": false,
"changes": {}
}
},
"network": {
"1": {
"bytes": 664,
"bytes_missed": 0,
"bytes_orig": 0,
"bytes_orig_payload": 0,
"bytes_payload": 608,
"bytes_resp": 664,
"bytes_resp_payload": 608,
"conn_state": "SHR",
"decoded": [
{
"client_ip": "192.168.1.41",
"client_mac": "00:50:a5:4a:ec:7b",
"dns_servers": [
"192.168.1.1"
],
"lease_time": 1200,
"netmask": "255.255.255.0",
"routers": [
"192.168.1.1"
],
"server_ip": "192.168.1.1",
"type": "DHCP_ACK"
}
],
"dst": "192.168.1.1",
"dst_port": 67,
"duration": 0.004355,
"history": "^d",
"packets": 2,
"packets_orig": 0,
"packets_resp": 2,
"protocol": "DHCP",
"service": "dhcp",
"session": 1,
"src": "192.168.1.41",
"src_port": 68,
"transport": "UDP",
"ts_begin": 1583750059.184499,
"ts_end": 1583750059.188854,
"uid": "CnmnL8FPcbmixXLv1"
},
...
},
"annotations": {
"network": {
"204.79.197.200": {
"country": "US",
"ts": "2020-03-09T10:39:51Z",
"reverse_dns": [
"a-0001.a-msedge.net"
],
"country_name": "United States",
"org": "Microsoft Corporation",
"asn": 8068
},
...
}
},
"artifacts": {
"24": {
"antivirus": {
"reversing_labs": {
"status": "UNKNOWN",
"scanner_count": 0,
"scanner_match": 0,
"threat_name": "",
"query_hash": {
"sha256": "7e9422f3ff99cd583d23daac980b4bbfa9f9da7db7daf5d0698312f9998e71e5"
},
"first_seen": "0001-01-01T00:00:00Z",
"threat_level": 0,
"trust_factor": 0,
"last_seen": "0001-01-01T00:00:00Z"
}
},
"created-time": 0,
"created_by": [],
"entropy": 3.3735620533361894,
"executed_from": [],
"magic-type": "data",
"md5": "41f805506d2635ed832726196191973c",
"mime-type": "application/octet-stream; charset=binary",
"modified_by": [],
"origin": "extracted",
"path": "/\u0005kjjaqfajn2c0uzgv1l4qy5nfwe",
"read_by": [],
"relation": {
"process": null,
"extracted_from": [
"5"
],
"contains": null,
"network": null
},
"sha1": "1c8f8f62a7f60281a882d65cc7602afdf9190e98",
"sha256": "7e9422f3ff99cd583d23daac980b4bbfa9f9da7db7daf5d0698312f9998e71e5",
"size": 168,
"type": "",
"whitelist": []
},
...
},
"status": {
"origin": "sandcastle",
"ran": true,
"vm": "win7-x64",
"playbook": "default",
"id": "43a5ae8937855851ee142092d4cd6642",
"analysis_submitted_at": 1583750033,
"state": "proc",
"ven": "phl-ven",
"sha256": "48c02c817adef30b675938044d65862e920c494ec13e60567f2c7aca3d7cc07b",
"status": "Updating analysis status.",
"running_on": "mtv-work-087",
"analysis_started_at": 1583750035,
"md5": "a28a6b6e8924ec4173241a8eff8bf8d3",
"vm_runtime": 300,
"sha1": "45d2abc7ff3693bb8a0d93fffc36561be28cccb3",
"sample_started_at": 1583750081,
"queue": "NA",
"original_filename": "woodguilt.com%2F87229782.png.url"
},
"domains": {
"woodguilt.com": {
"status": "indeterminate",
"content_categories": [],
"security_categories": []
},
...
}
}
ThreatQuotient provides the following default mapping for this feed:
Feed Data Path | ThreatQ Entity | ThreatQ Object Type or Attribute Key | Normalization | Published Date | Notes |
---|---|---|---|---|---|
data.status.original_ filename |
Report. Value |
N/A | data.status.analysis _started_at |
woodguilt.com%2 F87229782.png.url |
Limited to 50 chars |
data.metadata. malware_desc[]. filename |
Attachment. Title |
N/A | data.status.analysis _started_at |
woodguilt.com%2F 87229782.png.url |
Limited to 50 chars. User-configurable. |
data.status.id | Report. Attribute |
Threat Grid Link | data.status.analysis _started_at |
43a5ae893785585 1ee142092d4cd66 42 |
Formatted into URL |
data.status.vm | Report. Attribute |
Threat Grid VM | data.status.analysis _started_at |
win7-x64 | N/A |
data.status. playbook |
Report. Attribute |
Threat Grid Playbook | data.status.analysis _started_at |
default | N/A |
data.threat. heuristic_score |
Indicator/ Report. Attribute |
Heuristic Score | data.status.analysis _started_at |
0 | Updatable |
data.threat. threat_score |
Indicator/ Report. Attribute |
Threat Score | data.status.analysis _started_at |
36 | Updatable |
data.metadata. malware_desc[]. filename |
Indicator. Value |
Filename | data.status.analysis _started_at |
woodguilt.com%2F 87229782.png.url |
N/A |
data.metadata. malware_desc[]. magic |
Indicator. Value |
URL | data.status.analysis _started_at |
MS Windows 95 Internet shortcut text (URL=<woodguilt. com/872 29782.png>), ASCII text |
Value is split so we can get the actual URL |
data.metadata. malware_desc[]. md5 |
Indicator. Value |
MD5 | data.status.analysis _started_at |
a28a6b6e8924ec417 3241a8eff8bf8d3 |
N/A |
data.metadata. malware_desc[]. sha1 |
Indicator. Value |
sha1 | data.status.analysis _started_at |
45d2abc7ff3693bb8a 0d93fffc36561be28c ccb3 |
N/A |
data.metadata. malware_desc[]. sha256 |
Indicator. Value |
SHA-256 | data.status.analysis _started_at |
48c02c817adef30b67 5938044d65862e920 c494ec13e60567f2c7 aca3d7cc07b |
N/A |
data.metadata. iocs[].title |
TTP/ Attack Pattern. Value |
N/A | data.status.analysis _started_at |
DNS Query Returned Non-Existent Domain | User-configurable. |
data.metadata. iocs[].description |
TTP/ Attack Pattern. Description |
N/A | data.status.analysis _started_at |
his indicator indicates that a DNS query was performed to an unregistered domain name.. |
N/A |
data.metadata. iocs[].mitre-tactics[] |
TTP.Value | N/A | data.status.analysis _started_at |
N/A | If no mapping found, just title case, Mapped: {MITRE ID} - |
data.metadata. iocs[].mitre-tec hniques[] |
TTP/ Attack Pattern .Attribute |
Technique | data.status.analysis _started_at |
N/A | Title-cased |
data.metadata. iocs[].data[].Path |
Indicator .Value |
File Path | data.status.analysis _started_at |
N/A | N/A |
data.metadata. iocs[].data[].Domain |
Indicator. Value |
FQDN | data.status.analysis _started_at |
N/A | N/A |
data.metadata. iocs[].data[].URL |
Indicator. Value |
URL | data.status.analysis _started_at |
N/A | N/A |
data.metadata. iocs[].data[].IP |
Indicator. Value |
IP Address | data.status.analysis _started_at |
N/A | N/A |
data.metadata. iocs[].data[].SHA256 |
Indicator. Value |
SHA-256 | data.status.analysis _started_at |
N/A | N/A |
data.metadata. iocs[].data[]. Process_Name |
Indicator. Value |
Filename | data.status.analysis _started_at |
N/A | Status: Indirect |
data.metadata. iocs[].data[]. Original_Filename |
Indicator. Value |
Filename | data.status.analysis _started_at |
N/A | N/A |
data.metadata. iocs[].data[]. Antivirus_Result |
TTP/Attack Pattern/ Indicator. Attribute |
Antivirus Detection | data.status.analysis _started_at |
N/A | N/A |
data.metadata. iocs[].data[].Security |
TTP/Attack Pattern/ Indicator. Attribute |
Security Category | data.status.analysis _started_at |
N/A | N/A |
data.metadata. iocs[].data[].Category |
TTP/Attack Pattern/ Indicator. Attribute |
Content Category | data.status.analysis _started_at |
N/A | N/A |
data.metadata. iocs[].Category |
TTP/Attack Pattern. Attribute |
Category | data.status.analysis _started_at |
domain | N/A |
data.metadata. iocs[].ioc |
TTP/Attack Pattern. Attribute |
Indicator | data.status.analysis _started_at |
dns-query-nxdomain | A programmatic name for the TTP |
data.metadata. iocs[].severity |
TTP/Attack Pattern. Attribute |
Severity | data.status.analysis _started_at |
25 | Updatable |
data.metadata. iocs[].tags |
TTP/Attack Pattern. Attribute |
Tag | data.status.analysis _started_at |
communication | N/A |
data.metadata. iocs[].suspected- sample-categories |
TTP/Attack Pattern. Attribute |
Suspected Sample Category | data.status.analysis _started_at |
N/A | N/A |
data.metadata. domains.{domain} |
Indicator. Value |
FQDN | data.status.analysis _started_at |
N/A | Domains with status innocuous are filtered out. |
data.metadata. domains.{domain}. content_ categories |
Indicator. Attribute |
Content Category | data.status.analysis _started_at |
N/A | N/A |
data.metadata. domains.{domain}. security_ categories |
Indicator. Attribute |
Security Category | data.status.analysis _started_at |
N/A | N/A |
data.metadata. domains. {domain}.status |
Indicator. Attribute |
Status | data.status.analysis _started_at |
indeterminate | Updatable |
data.metadata. domains.{domain}.risk_ info.risk_score |
Indicator. Attribute |
Risk Score | data.status.analysis _started_at |
50 | Updatable |
Get Sample (Supplemental)
This supplemental feed will fetch the sample from Threat Grid
GET https://panacea.threatgrid.com/api/v2/samples/{id}/analysis/sample.zip
There is no mapping for this supplemental feed.
Average Feed Run
Object counts and Feed runtime are supplied as generalities only - objects returned by a provider can differ based on credential configurations and Feed runtime may vary based on system resources and load.
Cisco Threat Grid
Metric | Result |
---|---|
Run Time | 1 minute |
Attack Patterns | 44 |
Attack Pattern Attributes | 332 |
Indicators | 46 |
Indicator Attributes | 85 |
Report | 1 |
Report Attributes | 5 |
TTPs | 9 |
Change Log
- Version 1.1.1
- Added the following new configuration parameter:
- Apply Severity Threshold to Domains as well - filter out domains with risk score less than set IOC Severity Threshold.
- Removed the following configuration parameter:
- Only Ingest Organizational Data.
- Added the following new configuration parameter:
- Version 1.1.0
- Updated the authentication method for the integration.
- Added a configuration field: Only Ingest Organizational Data.
- Version 1.0.9
- Resolved an issue where users would encounter a
RuntimeError('missing 2 required positional arguments: 'name' and 'value' ')
message.
- Resolved an issue where users would encounter a
- Version 1.0.8
- Resolved an issue where users would encounter a
RuntimeError('Cannot unset key on non-Mapping value')
message.
- Resolved an issue where users would encounter a
- Version 1.0.7
- Resolved an issue where users would encounter an error when creating objects from threat data.
- Version 1.0.6
- Resolved an issue that would cause the following error when ingesting data:
Error creating objects from threat data...
.
- Resolved an issue that would cause the following error when ingesting data:
- Version 1.0.5
- Added improved efficiency of the filter chain.
- Version 1.0.4
- Added enable/disable configuration options for ThreatQ proxies and SSL verification.
- Version 1.0.3
- Fixed an issue where users encountered empty key errors from supplement runs.
- Version 1.0.2
- Fixed issue with empty key error in received response
- Now ingests new URL indicators
- Version 1.0.1
- Fixed filter error during ingestion
- Version 1.0.0
- Initial release
PDF Guides
Document | ThreatQ Version |
---|---|
Cisco Threat Grid CDF Guide v1.1.1 | 4.34.0 or Greater |
Cisco Threat Grid CDF Guide v1.1.0 | 4.34.0 or Greater |
Cisco Threat Grid CDF Guide v1.0.9 | 4.34.0 or Greater |
Cisco Threat Grid CDF Guide v1.0.8 | 4.34.0 or Greater |
Cisco Threat Grid CDF Guide v1.0.7 | 4.34.0 or Greater |
Cisco Threat Grid CDF Guide v1.0.6 | 4.34.0 or Greater |
Cisco Threat Grid CDF Guide v1.0.5 | 4.34.0 or Greater |
Cisco Threat Grid CDF Guide v1.0.4 | 4.34.0 or Greater |
Cisco Threat Grid CDF Guide v1.0.3 | 4.34.0 or Greater |
Cisco Threat Grid CDF Guide v1.0.2 | 4.34.0 or Greater |
Cisco Threat Grid CDF Guide v1.0.1 | 4.34.0 or Greater |