Current ThreatQ Version Filter
 

Cisco Threat Grid CDF

The web format of this guide reflects the most current release.  Guides for older iterations are available in PDF format.  

Integration Details

ThreatQuotient provides the following details for this integration:

Introduction

The Cisco Threat Grid CDF is a sandbox which allows the detonation of samples to generate analysis reports. The Cisco Threat Grid CDF for ThreatQ enables a user to ingest their organization's sample analysis reports from Threat Grid. These samples can be filtered down by their threat score, so you are able to ingest only the detonations that your organization deems important to track.

The CDF provides the following feeds:

  • Cisco Threat Grid - ingests analyses as Report Objects within ThreatQ.
  • Get Analysis (Supplemental) - fetches the full analysis report JSON from Threat Grid's API.
  • Get Sample (Supplemental) - fetches samples from Threat Grid.  

The integration ingests the following system object types:

  • Attack Patterns
    • Attack Pattern Attributes
  • Files (attachments)
  • Indicators
    • Indicator Attributes
  • Reports
    • Report Attributes
  • TTPs
    • TTP Attributes

Prerequisites

The following is required to use the integration:

  • A Cisco Threat Grid Hostname and API Key.  

Installation

Perform the following steps to install the integration:

The same steps can be used to upgrade the integration to a new version.

  1. Log into https://marketplace.threatq.com/.
  2. Locate and download the integration file.
  3. Navigate to the integrations management page on your ThreatQ instance.
  4. Click on the Add New Integration button.
  5. Upload the integration file using one of the following methods:
    • Drag and drop the file into the dialog box
    • Select Click to Browse to locate the integration file on your local machine

    ThreatQ will inform you if the feed already exists on the platform and will require user confirmation before proceeding. ThreatQ will also inform you if the new version of the feed contains changes to the user configuration. The new user configurations will overwrite the existing ones for the feed and will require user confirmation before proceeding.

  6. The feed will be added to the integrations page. You will still need to configure and then enable the feed.

Configuration

ThreatQuotient does not issue API keys for third-party vendors. Contact the specific vendor to obtain API keys and other integration-related credentials.

To configure the integration:

  1. Navigate to your integrations management page in ThreatQ.
  2. Select the Commercial option from the Category dropdown (optional).

    If you are installing the integration for the first time, it will be located under the Disabled tab.

  3. Click on the integration entry to open its details page.
  4. Enter the following parameters under the Configuration tab:
    Parameter Description
    Threat Grid Host Enter your Threat Grid host.

    Default: panacea.threatgrid.com

    API Key

    Enter your Cisco threat Grid API key for authentication.

    Threat Score Criteria Select the threat scores you would like to ingest:
    • Critical (default)
    • High (default)
    • Medium
    • Low
    IOC Severity Threshold Enter a threshold severity for ingested IOCs

    Default: 50

    Apply Severity Threshold to Domains as well  
    Ingest Samples Enabling this will import the malware samples into ThreatQ.  This option is disabled by default.

    You must enable downloading sample content via the API in your Threat Grid Account Profile.

    Ingest Behavioral Indicators As Select the object type you would like behavioral indicators stored in
    • TTP (default)
    • Attack Pattern
    Disable Proxies Enable/disable this option to set whether the feed will honor proxies set in ThreatQ.  
    Verify SSL Enable/disable this option to set whether the feed will verify SSL connections with the provider.  
    Only Ingest Organizational Data Enable this parameter to only ingest organizational data.  

    Configuration Screen
  5. Review any additional settings, make any changes if needed, and click on Save.
  6. Click on the toggle switch, located above the Additional Information section, to enable it.

ThreatQ Mapping

Cisco Threat Grid

The Cisco Threat Grid feed ingests analyses as Report Objects within ThreatQ. Any metadata surrounding the reports will be included, as well as related IOCs, related TTPs, and their relevant attribution.

GET https://panacea.threatgrid.com/api/v2/search/submissions

Sample Response:

{
  "api_version": 2,
  "id": 6654269,
  "data": {
    "index": 0,
    "total": 5,
    "took": 486,
    "timed_out": false,
    "items_per_page": 10,
    "current_item_count": 5,
    "items": [
      {
        "score": 1000000,
        "matches": {},
        "item": {
          "properties": {
            "metadata": null
          },
          "tags": [],
          "vm_runtime": 300,
          "md5": "2128689698b9a7e496b20bac4ddd42b1",
          "private": false,
          "organization_id": 12882,
          "state": "succ",
          "login": "strivers",
          "sha1": "4d6f2012d5521f240f10b53c769d250d02cd5697",
          "sample": "898bf464b34b3806d9f817004fc31533",
          "filename": "9S659EHDCSI72649DS.doc",
          "analysis": {
            "metadata": {
              "sandcastle_env": {
                "controlsubject": "win7-x64-intel-2020.06.17",
                "vm": "win7-x64",
                "vm_id": "898bf464b34b3806d9f817004fc31533",
                "sample_executed": 1597133073,
                "analysis_end": "2020-08-11T08:10:10Z",
                "analysis_features": [],
                "analysis_start": "2020-08-11T08:03:45Z",
                "display_name": "Windows 7 64-bit",
                "run_time": 300,
                "sandcastle": "3.5.62.17003.0a6e3cc14-1",
                "current_os": "7601.18798.amd64fre.win7sp1_gdr.150316-1654"
              },
              "submitted_file": {
                "magic": "Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.1, ...",
                "sha1": "4d6f2012d5521f240f10b53c769d250d02cd5697",
                "filename": "9S659EHDCSI72649DS.doc",
                "sha256": "10281a188a26dbb10562bdc6f5467abad4b0e7fe73672b48a11fdd55819f81f3",
                "type": "doc",
                "md5": "2128689698b9a7e496b20bac4ddd42b1"
              },
              "general_details": {
                "report_created": "2020-08-11T08:10:17Z",
                "sandbox_version": "pilot-d",
                "sandbox_id": "mtv-work-028"
              },
              "malware_desc": [
                {
                  "sha1": "4d6f2012d5521f240f10b53c769d250d02cd5697",
                  "magic": "Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.1 ...",
                  "filename": "9S659EHDCSI72649DS.doc",
                  "size": 80896,
                  "sha256": "10281a188a26dbb10562bdc6f5467abad4b0e7fe73672b48a11fdd55819f81f3",
                  "type": "doc",
                  "md5": "2128689698b9a7e496b20bac4ddd42b1"
                }
              ],
              "analyzed_file": {
                "magic": "Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.1 ...",
                "sha1": "4d6f2012d5521f240f10b53c769d250d02cd5697",
                "filename": "9S659EHDCSI72649DS.doc",
                "sha256": "10281a188a26dbb10562bdc6f5467abad4b0e7fe73672b48a11fdd55819f81f3",
                "type": "doc",
                "md5": "2128689698b9a7e496b20bac4ddd42b1"
              }
            },
            "behaviors": [
              {
                "name": "antivirus-flagged-artifact",
                "threat": 72,
                "title": "Artifact Flagged by Antivirus"
              },
              ...
            ],
            "threat_score": 100
          },
          "status": "job_done",
          "submitted_at": "2020-08-11T08:03:44Z",
          "sha256": "10281a188a26dbb10562bdc6f5467abad4b0e7fe73672b48a11fdd55819f81f3"
        }
      }
    ]
  }
}

The integration does not use any fields from the above API response within ThreatQ. The supplemental feed id udrf to fetch the full analysis results. That JSON data is parsed for metadata, IOCs, TTPs, etc.

Get Analysis (Supplemental)

The Get Analysis supplemental feed will fetch the full analysis report JSON from Threat Grid's API.

GET https://panacea.threatgrid.com/api/v2/samples/{id}/analysis.json

Sample Response:

{
	"version": 4,
	"versions": {
	  "version": "4.0",
	  "network": {
		"version": "2.0"
	  },
	  "file": {
		"version": "2.0",
		"html": "0.0",
		"ini": "0.0",
		"js": "0.0",
		"lnk": "2.0",
		"pdf": "0.0",
		"pe": "0.0",
		"rtf": "0.0",
		"txt": "0.0"
	  },
	  "yara": "1.0",
	  "reversing_labs": "1.0",
	  "virustotal": "1.0",
	  "cognitive": "1.0",
	  "heuristic_model": "0.0.20190722T000000Z"
	},
	"metadata": {
	  "general_details": {
		"report_created": 1583750398,
		"sandbox_version": "pilot-d",
		"sandbox_id": "mtv-work-087"
	  },
	  "sandcastle_env": {
		"vm_id": "43a5ae8937855851ee142092d4cd6642",
		"current_os": "7601.18798.amd64fre.win7sp1_gdr.150316-1654",
		"analysis_start": 1583750035,
		"analysis_end": 1583750394,
		"run_time": 300,
		"sample_executed": 1583750081,
		"sandcastle": "3.5.51.16706.30e43d500-1",
		"vm": "win7-x64",
		"controlsubject": "win7-x64-intel-2020.02.03",
		"display_name": "Windows 7 64-bit",
		"analysis_features": []
	  },
	  "malware_desc": [
		{
		  "filename": "woodguilt.com%2F87229782.png.url",
		  "size": 49,
		  "md5": "a28a6b6e8924ec4173241a8eff8bf8d3",
		  "sha1": "45d2abc7ff3693bb8a0d93fffc36561be28cccb3",
		  "sha256": "48c02c817adef30b675938044d65862e920c494ec13e60567f2c7aca3d7cc07b",
		  "magic": "MS Windows 95 Internet shortcut text (URL=<woodguilt.com/87229782.png>), ASCII text",
		  "type": "url"
		}
	  ]
	},
	"warnings": [],
	"iocs": [
	  {
		"category": [
		  "domain"
		],
		"hits": 1,
		"description": "This indicator indicates that a DNS query was performed to an unregistered domain name...",
		"title": "DNS Query Returned Non-Existent Domain",
		"data": [
		  {
			"Query_Type": "A",
			"Query_ID": 20750,
			"Query_Data": "woodguilt.com",
			"Answer_Code": "NXDOMAIN",
			"Network_Stream": 7
		  }
		],
		"tags": [
		  "communication"
		],
		"truncated": false,
		"confidence": 75,
		"mitre-tactics": [],
		"heuristic_coefficient": -1.88155557784,
		"orbital-queries": [],
		"mitre-techniques": [],
		"ioc": "dns-query-nxdomain",
		"severity": 25
	  },
	  {
		"category": [
		  "network-information"
		],
		"hits": 1,
		"description": "A name resolution query using the NetBIOS API was made. NetBIOS is used to facilitate computers...",
		"title": "NetBIOS Name Resolution Query",
		"data": [
		  {
			"Domain": "WOODGUILT.COM"
		  }
		],
		"tags": [
		  "netbios"
		],
		"truncated": false,
		"confidence": 60,
		"mitre-tactics": [],
		"heuristic_coefficient": 1.42572787641,
		"orbital-queries": [],
		"mitre-techniques": [],
		"ioc": "netbios-query",
		"severity": 60
	  }
	],
	"threat": {
	  "heuristic_score": 0,
	  "threat_score": 36,
	  "bucket": "doc",
	  "heuristic_raw_score": -5.0775348811833245
	},
	"dynamic": {
	  "processes": {
		"11": {
		  "registry_keys_read": [],
		  "pid": 428,
		  "kpid": "0xfffffa80027f37a0",
		  "files_deleted": [],
		  "files_created": [
			"\\Users\\Administrator\\AppData\\Roaming\\Microsoft\\Protect\\S-1-5-21-2580483871-590521980-3826313501-500\\b0cc0ca3-d62b-440a-b6c1-e54b3ecf60a2"
		  ],
		  "file_transactions": [],
		  "sockets": [],
		  "files_checked": [],
		  "sockets_traffic": [],
		  "errors": [],
		  "monitored": true,
		  "registry_keys_deleted": [],
		  "ppid": null,
		  "mutants_opened": [],
		  "memory": [
			{
			  "protect": [
				"PAGE_READWRITE"
			  ],
			  "process": "0xfffffa80027f37a0",
			  "allocation_type": [
				"MEM_COMMIT"
			  ],
			  "entry": [
				{
				  "size": "0x44",
				  "base_address": "0x0"
				},
                ...
			  ],
			  "zero_bits": 0,
			  "process_handle": "0x3f4"
			},
            ...
		  ],
		  "new": false,
		  "registry_keys_opened": [
			{
			  "access": [
				"ENUMERATE_SUB_KEYS",
				"NOTIFY",
				"QUERY_VALUE",
				"READ_CONTROL"
			  ],
			  "options": [
				"REG_OPTION_NON_VOLATILE"
			  ],
			  "name": "REGISTRY\\MACHINE\\SYSTEM\\CONTROLSET001\\CONTROL\\SECURITYPROVIDERS\\SCHANNEL"
			},
            ...
		  ],
		  "parent": "",
		  "startup_info": {
			"upid": 428,
			"shell_info": "C:\\Windows\\system32\\lsass.exe",
			"current_directory": "C:\\Windows\\system32\\",
			"command_line": "C:\\Windows\\system32\\lsass.exe",
			"uthread": 0,
			"desktop_info": "",
			"tid": "0xfffffa80027b7b50",
			"image_pathname": "C:\\Windows\\system32\\lsass.exe",
			"dll_path": "C:\\Windows\\system32;C:\\Windows\\system32;C:\\Windows\\system;C:\\Windows;.;C:\\Windows\\system32;...",
			"runtime_data": "",
			"window_title": "C:\\Windows\\system32\\lsass.exe",
			"incomplete": false
		  },
		  "process_name": "lsass.exe",
		  "registry_keys_modified": [
			{
			  "value_name": "LanguageList",
			  "data_type": "MULTI_SZ",
			  "data": "en-US\u0000en\u0000\u0000",
			  "name": "REGISTRY\\USER\\.DEFAULT\\SOFTWARE\\CLASSES\\LOCAL SETTINGS\\MUICACHE\\3E\\52C64B7E"
			},
            ...
		  ],
		  "threads": [
			{
			  "return": 0,
			  "thread": "0x00000000",
			  "process": "0x00000000",
			  "create_suspended": "0x1",
			  "client_id": 8397322214375721288,
			  "process_handle": "0x80000238"
			},
			...
		  ],
		  "mutants_created": [],
		  "analyzed_because": "Process activity after target sample started.",
		  "files_modified": [
			"\\Users\\Administrator\\AppData\\Roaming\\Microsoft\\Protect\\S-1-5-21-2580483871-590521980-3826313501-500\\Preferred",
			"\\Users\\Administrator\\AppData\\Roaming\\Microsoft\\Protect\\S-1-5-21-2580483871-590521980-3826313501-500\\b0cc0ca3-d62b-440a-b6c1-e54b3ecf60a2"
		  ],
		  "atoms_added": [],
		  "children": [],
		  "registry_keys_created": [],
		  "files_read": [
			"\\Users\\Administrator\\AppData\\Roaming\\Microsoft\\Protect\\S-1-5-21-2580483871-590521980-3826313501-500\\Preferred"
		  ],
		  "time": "Mon, 09 Mar 2020 10:34:42 UTC"
		},
        ...
	  },
	  "extracted_keys": [
		{
		  "pattern": "openssl",
		  "key": "AAAAAAAAAABSU0RTt6U4JJaqwk+5GKG0zGzxwAEAAABITmV0Q2ZnLnBkYgAAAAAA",
		  "offset": 508270176
		},
		...
	  ]
	},
	"disk": {
	  "mbr": {
		"hashes": {
		  "orig": {
			"md5": "9e9e7db0e9aae4e1c0368a303657893e",
			"sha1": "3ef2fda0124bc0011632e128da23341f3ef369f5",
			"sha256": "03b44beb83adb31d85667b4cd806cb28a96cef9f3bc815b2ba7c8c68021607b8"
		  },
		  "curr": {
			"md5": "9e9e7db0e9aae4e1c0368a303657893e",
			"sha1": "3ef2fda0124bc0011632e128da23341f3ef369f5",
			"sha256": "03b44beb83adb31d85667b4cd806cb28a96cef9f3bc815b2ba7c8c68021607b8"
		  }
		},
		"contents": {
		  "orig": "3\u00c0\u008e\u00d0\u00bc\u0000|\u008e\u00c0\u008e\u00d8\u00be\u0000|\u00bf\u0000\u0006\u00b9\u0000...",
		  "curr": "3\u00c0\u008e\u00d0\u00bc\u0000|\u008e\u00c0\u008e\u00d8\u00be\u0000|\u00bf\u0000\u0006\u00b9\u0000..."
		},
		"changed": false
	  },
	  "partition_tables": {
		"orig": [
		  {
			"start": 1048576,
			"type": 7,
			"size": 104857600
		  },
		  ...
		],
		"curr": [
		  {
			"start": 1048576,
			"type": 7,
			"size": 104857600
		  },
		  ...
		],
		"changed": false,
		"changes": {}
	  }
	},
	"network": {
	  "1": {
		"bytes": 664,
		"bytes_missed": 0,
		"bytes_orig": 0,
		"bytes_orig_payload": 0,
		"bytes_payload": 608,
		"bytes_resp": 664,
		"bytes_resp_payload": 608,
		"conn_state": "SHR",
		"decoded": [
		  {
			"client_ip": "192.168.1.41",
			"client_mac": "00:50:a5:4a:ec:7b",
			"dns_servers": [
			  "192.168.1.1"
			],
			"lease_time": 1200,
			"netmask": "255.255.255.0",
			"routers": [
			  "192.168.1.1"
			],
			"server_ip": "192.168.1.1",
			"type": "DHCP_ACK"
		  }
		],
		"dst": "192.168.1.1",
		"dst_port": 67,
		"duration": 0.004355,
		"history": "^d",
		"packets": 2,
		"packets_orig": 0,
		"packets_resp": 2,
		"protocol": "DHCP",
		"service": "dhcp",
		"session": 1,
		"src": "192.168.1.41",
		"src_port": 68,
		"transport": "UDP",
		"ts_begin": 1583750059.184499,
		"ts_end": 1583750059.188854,
		"uid": "CnmnL8FPcbmixXLv1"
	  },
      ...
	},
	"annotations": {
	  "network": {
		"204.79.197.200": {
		  "country": "US",
		  "ts": "2020-03-09T10:39:51Z",
		  "reverse_dns": [
			"a-0001.a-msedge.net"
		  ],
		  "country_name": "United States",
		  "org": "Microsoft Corporation",
		  "asn": 8068
		},
        ...
	  }
	},
	"artifacts": {
	  "24": {
		"antivirus": {
		  "reversing_labs": {
			"status": "UNKNOWN",
			"scanner_count": 0,
			"scanner_match": 0,
			"threat_name": "",
			"query_hash": {
			  "sha256": "7e9422f3ff99cd583d23daac980b4bbfa9f9da7db7daf5d0698312f9998e71e5"
			},
			"first_seen": "0001-01-01T00:00:00Z",
			"threat_level": 0,
			"trust_factor": 0,
			"last_seen": "0001-01-01T00:00:00Z"
		  }
		},
		"created-time": 0,
		"created_by": [],
		"entropy": 3.3735620533361894,
		"executed_from": [],
		"magic-type": "data",
		"md5": "41f805506d2635ed832726196191973c",
		"mime-type": "application/octet-stream; charset=binary",
		"modified_by": [],
		"origin": "extracted",
		"path": "/\u0005kjjaqfajn2c0uzgv1l4qy5nfwe",
		"read_by": [],
		"relation": {
		  "process": null,
		  "extracted_from": [
			"5"
		  ],
		  "contains": null,
		  "network": null
		},
		"sha1": "1c8f8f62a7f60281a882d65cc7602afdf9190e98",
		"sha256": "7e9422f3ff99cd583d23daac980b4bbfa9f9da7db7daf5d0698312f9998e71e5",
		"size": 168,
		"type": "",
		"whitelist": []
	  },
      ...
	},
	"status": {
	  "origin": "sandcastle",
	  "ran": true,
	  "vm": "win7-x64",
	  "playbook": "default",
	  "id": "43a5ae8937855851ee142092d4cd6642",
	  "analysis_submitted_at": 1583750033,
	  "state": "proc",
	  "ven": "phl-ven",
	  "sha256": "48c02c817adef30b675938044d65862e920c494ec13e60567f2c7aca3d7cc07b",
	  "status": "Updating analysis status.",
	  "running_on": "mtv-work-087",
	  "analysis_started_at": 1583750035,
	  "md5": "a28a6b6e8924ec4173241a8eff8bf8d3",
	  "vm_runtime": 300,
	  "sha1": "45d2abc7ff3693bb8a0d93fffc36561be28cccb3",
	  "sample_started_at": 1583750081,
	  "queue": "NA",
	  "original_filename": "woodguilt.com%2F87229782.png.url"
	},
	"domains": {
	  "woodguilt.com": {
		"status": "indeterminate",
		"content_categories": [],
		"security_categories": []
	  },
	  ...
	}
  }

ThreatQuotient provides the following default mapping for this feed:

Feed Data Path ThreatQ Entity ThreatQ Object Type or Attribute Key Normalization Published Date Notes
data.status.original_
filename
Report.
Value
N/A data.status.analysis
_started_at
woodguilt.com%2
F87229782.png.url
Limited to 50 chars
data.metadata.
malware_desc[].
filename
Attachment.
Title
N/A data.status.analysis
_started_at
woodguilt.com%2F
87229782.png.url
Limited to 50 chars. User-configurable.
data.status.id Report.
Attribute
Threat Grid Link data.status.analysis
_started_at
43a5ae893785585
1ee142092d4cd66
42
Formatted into URL
data.status.vm Report.
Attribute
Threat Grid VM data.status.analysis
_started_at
win7-x64 N/A
data.status.
playbook
Report.
Attribute
Threat Grid Playbook data.status.analysis
_started_at
default N/A
data.threat.
heuristic_score
Indicator/
Report.
Attribute
Heuristic Score data.status.analysis
_started_at
0 Updatable
data.threat.
threat_score
Indicator/
Report.
Attribute
Threat Score data.status.analysis
_started_at
36 Updatable
data.metadata.
malware_desc[].
filename
Indicator.
Value
Filename data.status.analysis
_started_at
woodguilt.com%2F
87229782.png.url
N/A
data.metadata.
malware_desc[].
magic
Indicator.
Value
URL data.status.analysis
_started_at
MS Windows 95 Internet shortcut
text (URL=<woodguilt.
com/872
29782.png>), ASCII text
Value is split so we can get the actual URL
data.metadata.
malware_desc[].
md5
Indicator.
Value
MD5 data.status.analysis
_started_at
a28a6b6e8924ec417
3241a8eff8bf8d3
N/A
data.metadata.
malware_desc[].
sha1
Indicator.
Value
sha1 data.status.analysis
_started_at
45d2abc7ff3693bb8a
0d93fffc36561be28c
ccb3
N/A
data.metadata.
malware_desc[].
sha256
Indicator.
Value
SHA-256 data.status.analysis
_started_at
48c02c817adef30b67
5938044d65862e920
c494ec13e60567f2c7
aca3d7cc07b
N/A
data.metadata.
iocs[].title
TTP/
Attack Pattern.
Value
N/A data.status.analysis
_started_at
DNS Query Returned Non-Existent Domain User-configurable.
data.metadata.
iocs[].description
TTP/
Attack Pattern.
Description
N/A data.status.analysis
_started_at
his indicator indicates that a DNS
query was performed to an unregistered domain name..
N/A
data.metadata.
iocs[].mitre-tactics[]
TTP.Value N/A data.status.analysis
_started_at
N/A If no mapping found, just title case, Mapped: {MITRE ID} -
data.metadata.
iocs[].mitre-tec
hniques[]
TTP/
Attack Pattern
.Attribute
Technique data.status.analysis
_started_at
N/A Title-cased
data.metadata.
iocs[].data[].Path
Indicator
.Value
File Path data.status.analysis
_started_at
N/A N/A
data.metadata.
iocs[].data[].Domain
Indicator.
Value
FQDN data.status.analysis
_started_at
N/A N/A
data.metadata.
iocs[].data[].URL
Indicator.
Value
URL data.status.analysis
_started_at
N/A N/A
data.metadata.
iocs[].data[].IP
Indicator.
Value
IP Address data.status.analysis
_started_at
N/A N/A
data.metadata.
iocs[].data[].SHA256
Indicator.
Value
SHA-256 data.status.analysis
_started_at
N/A N/A
data.metadata.
iocs[].data[].
Process_Name
Indicator.
Value
Filename data.status.analysis
_started_at
N/A Status: Indirect
data.metadata.
iocs[].data[].
Original_Filename
Indicator.
Value
Filename data.status.analysis
_started_at
N/A N/A
data.metadata.
iocs[].data[].
Antivirus_Result
TTP/Attack Pattern/
Indicator.
Attribute
Antivirus Detection data.status.analysis
_started_at
N/A N/A
data.metadata.
iocs[].data[].Security
TTP/Attack Pattern/
Indicator.
Attribute
Security Category data.status.analysis
_started_at
N/A N/A
data.metadata.
iocs[].data[].Category
TTP/Attack Pattern/
Indicator.
Attribute
Content Category data.status.analysis
_started_at
N/A N/A
data.metadata.
iocs[].Category
TTP/Attack Pattern.
Attribute
Category data.status.analysis
_started_at
domain N/A
data.metadata.
iocs[].ioc
TTP/Attack Pattern.
Attribute
Indicator data.status.analysis
_started_at
dns-query-nxdomain A programmatic name for the TTP
data.metadata.
iocs[].severity
TTP/Attack Pattern.
Attribute
Severity data.status.analysis
_started_at
25 Updatable
data.metadata.
iocs[].tags
TTP/Attack Pattern.
Attribute
Tag data.status.analysis
_started_at
communication N/A
data.metadata.
iocs[].suspected-
sample-categories
TTP/Attack Pattern.
Attribute
Suspected Sample Category data.status.analysis
_started_at
N/A N/A
data.metadata.
domains.{domain}
Indicator.
Value
FQDN data.status.analysis
_started_at
N/A Domains with status innocuous are filtered out.
data.metadata.
domains.{domain}.
content_
categories
Indicator.
Attribute
Content Category data.status.analysis
_started_at
N/A N/A
data.metadata.
domains.{domain}.
security_
categories
Indicator.
Attribute
Security Category data.status.analysis
_started_at
N/A N/A
data.metadata.
domains.
{domain}.status
Indicator.
Attribute
Status data.status.analysis
_started_at
indeterminate Updatable
data.metadata.
domains.{domain}.risk_
info.risk_score
Indicator.
Attribute
Risk Score data.status.analysis
_started_at
50 Updatable

Get Sample (Supplemental)

This supplemental feed will fetch the sample from Threat Grid

GET https://panacea.threatgrid.com/api/v2/samples/{id}/analysis/sample.zip

There is no mapping for this supplemental feed.

Average Feed Run

Object counts and Feed runtime are supplied as generalities only - objects returned by a provider can differ based on credential configurations and Feed runtime may vary based on system resources and load.

Cisco Threat Grid

Metric Result
Run Time 1 minute
Attack Patterns 44
Attack Pattern Attributes 332
Indicators 46
Indicator Attributes 85
Report 1
Report Attributes 5
TTPs 9

Change Log

  • Version 1.1.1
    •  Added the following new configuration parameter:
      • Apply Severity Threshold to Domains as well -  filter out domains with risk score less than set IOC Severity Threshold.
    • Removed the following configuration parameter:
      • Only Ingest Organizational Data.
  • Version 1.1.0
    • Updated the authentication method for the integration.
    • Added a configuration field: Only Ingest Organizational Data
  • Version 1.0.9
    • Resolved an issue where users would encounter a RuntimeError('missing 2 required positional arguments: 'name' and 'value' ') message.
  • Version 1.0.8
    • Resolved an issue where users would encounter a RuntimeError('Cannot unset key on non-Mapping value') message.
  • Version 1.0.7
    • Resolved an issue where users would encounter an error when creating objects from threat data.
  • Version 1.0.6
    • Resolved an issue that would cause the following error when ingesting data: Error creating objects from threat data....
  • Version 1.0.5
    • Added improved efficiency of the filter chain.  
  • Version 1.0.4
    • Added enable/disable configuration options for ThreatQ proxies and SSL verification.   
  • Version 1.0.3
    • Fixed an issue where users encountered empty key errors from supplement runs.  
  • Version 1.0.2
    • Fixed issue with empty key error in received response
    • Now ingests new URL indicators
  • Version 1.0.1
    • Fixed filter error during ingestion
  • Version 1.0.0
    • Initial release