Current ThreatQ Version Filter
 

Group-IB CDF

The web format of this guide reflects the most current release.  Guides for older iterations are available in PDF format.  

Integration Details

ThreatQuotient provides the following details for this integration:

Introduction

Group-IB is a provider of solutions aimed at detection and prevention of cyberattacks, online fraud, and IP protection.

The Group-IB CDF for ThreatQ provides the following feeds:

  • GroupIB Compromised Account
  • GroupIB Compromised Bank Card
  • GroupIB Compromised Data Git Leaks
  • GroupIB Compromised Data Mules
  • GroupIB Compromised Data IMEI
  • GroupIB Compromised IM Discord
  • GroupIB Compromised IM Telegram
  • GroupIB Compromised Masked Band Card
  • GroupIB Compromised Shops
  • GroupIB Human Intelligence Threat
  • GroupIB Human Intelligence Threat Actor
  • GroupIB APT Threat
  • GroupIB APT Threat Actor
  • GroupIB Malware C2
  • GroupIB Suspicious IP Open Proxy
  • GroupIB Suspicious IP Socks Proxy
  • GroupIB Suspicious IP VPN
  • GroupIB Malware Configs
  • GroupIB Suspicious IP Tor Node
  • GroupIB Suspicious IP Scanner
  • GroupIB Malware Report
  • GroupIB Malware Signature
  • GroupIB Malware YARA Rule
  • GroupIB Malware Vulnerability
  • GroupIB Attacks DDoS
  • GroupIB Attacks Deface
  • GroupIB Attacks Phishing
  • GroupIB Attacks Phishing Group
  • GroupIB Attacks Abuse Phishing Kit
  • GroupIB OSI PublicLeak
  • GroupIB IOC Common

Object types ingested from the feeds above include:

  • Adversaries
  • Asset
  • Attack Patterns
  • Compromised Accounts (custom object)
  • Compromised Cards (custom object)
  • Discord Channel (custom object)
  • Identities
  • Indicators
  • Intrusion Sets
  • IMEIs (custom object) 
  • Malware
  • Money Mule (custom object)
  • Organizations (custom object)
  • Reports
  • Signatures
  • Telegram Channel (custom object)
  • Tools
  • Tags
  • Vulnerabilities

Prerequisites

The Group-IB CDF requires the installation of the following custom objects:

  • Compromised Account
  • Compromised Card
  • Discord Channel
  • IMEI
  • Money Mule
  • Organization
  • Telegram Channel

The custom objects listed above must be installed prior to installing the CDF.  Attempting to install the integration without the required custom objects will cause the install process to fail.    

Custom Objects Installation  

Use the steps provided to install the custom objects.    

When installing the custom objects, be aware that any in-progress feed runs will be cancelled, and the API will be in maintenance mode.

Use the following steps to install the custom object in ThreatQ v6:   

  1. Download the integration bundle from the ThreatQ Marketplace.
  2. Unzip the bundle and locate the custom object files.

    The custom object files will typically consist of a JSON definition file, install.sh script, and a images folder containing the svg icons.

  3. SSH into your ThreatQ instance.
  4. Navigate to the following location:
    cd /var/lib/threatq/misc/

  5. Upload the custom object files, including the images folder.

    The directory structure should be as the following:

    • misc
      • install.sh
      • <custom_object_name>.json
      • images (directory)
        • <custom_object_name>.svg
  6. Run the following command:
    kubectl exec -it deployment/api-schedule-run -n threatq -- sh /var/lib/threatq/misc/install.sh /var/lib/threatq/misc

    The installation script will automatically put the application into maintenance mode, move the files to their required directories, install the custom object, update permissions, bring the application out of maintenance mode, and restart dynamo.

  7. Delete the install.sh, definition json file, and images directory from the misc directory after the object has been installed as these files are no longer needed.

Use the following steps to install the custom objects in ThreatQ v5:

  1. Download the custom object zip file from the ThreatQ Marketplace and unzip its contents.  
  2. SSH into your ThreatQ instance.
  3. Navigate to tmp directory:
    cd /tmp/

  4. Create a new directory:
    mkdir groupib_cdf

  5. Upload the groupib.json and install.sh script into this new directory.
  6. Create a new directory called images within the groupib_cdf directory.
    mkdir images

  7. Upload the svg files.  
  8. Navigate to /tmp/groupib_cdf.

    The directory should resemble the following:

    • tmp
      • groupib_cdf
        • groupib.json
        • install.sh
        • images
          • Account.svg
          • CompromisedCard.svg
          • IMEI.svg
          • MoneyMule.svg
          • Organization.svg
  9. Run the following command to ensure that you have the proper permissions to install the custom object:
    chmod +x install.sh

  10. Run the following command:
    sudo ./install.sh

    You must be in the directory level that houses the install.sh and json files when running this command.

    The installation script will automatically put the application into maintenance mode, move the files to their required directories, install the custom object, update permissions, bring the application out of maintenance mode, and restart dynamo.

    GroupIB Custom Objects CLI Installation

  11. Remove the temporary directory, after the custom object has been installed, as the files are no longer needed:
    rm -rf groupib_cdf

Installation

The CDF requires the installation of five custom objects before installing the actual CDF.  See the Prerequisites chapter for more details.    

Perform the following steps to install the integration:

The same steps can be used to upgrade the integration to a new version.

  1. Log into https://marketplace.threatq.com/.
  2. Locate and download the integration zip file.
  3. Extract the files and install the required custom objects.
  4. Navigate to the integrations management page on your ThreatQ instance.
  5. Click on the Add New Integration button.
  6. Upload the yaml file using one of the following methods:
    • Drag and drop the file into the dialog box
    • Select Click to Browse to locate the integration file on your local machine

    ThreatQ will inform you if the feed already exists on the platform and will require user confirmation before proceeding. ThreatQ will also inform you if the new version of the feed contains changes to the user configuration. The new user configurations will overwrite the existing ones for the feed and will require user confirmation before proceeding.

  7. If prompted, select the individual feeds to install and click Install. The feed will be added to the integrations page. 

You will still need to configure and then enable the feed.

Configuration

ThreatQuotient does not issue API keys for third-party vendors. Contact the specific vendor to obtain API keys and other integration-related credentials.

To configure the integration:

  1. Navigate to your integrations management page in ThreatQ.
  2. Select the Commercial option from the Category dropdown (optional).

    If you are installing the integration for the first time, it will be located under the Disabled tab.

  3. Click on the integration entry to open its details page.
  4. Enter the following parameters under the Configuration tab:
    Parameter Description
    Username Your Group-IB username.
    API Key Your Group-IB API Key. 
    Save CVE Data as Select the object type you would like CVEs to be ingested as into the platform.

    This parameter supports the following feeds: GroupIB Human Threat Intelligence, GroupIB APT Threat, and GroupIB Malware Vulnerability.  

    Parse Signatures for Context Enable this configuration parameter to parse ingested signatures for context.  Metadata from YARA and Snort/Suricata rules will be added as attribution, and hashes from the metadata and condition will be added as indicators.

    This parameter supports The GroupIB Malware Signature and GroupIB Malware Yara Rule feeds.

    Default Signature Status Select the status to apply to all ingested signatures. Options include:
    • Active (default)
    • Review
    • Inactive

    This parameter supports The GroupIB Malware Signature and GroupIB Malware Yara Rule feeds.

    Configuration Screen
  5. Review any additional settings, make any changes if needed, and click on Save.
  6. Click on the toggle switch, located above the Additional Information section, to enable it.

ThreatQ Mapping

GroupIB Compromised Account

The Group IB Compromised Account feed ingests custom object Compromised Account and any related Indicators, Malware, and Adversaries.

GET https://tap.group-ib.com/api/v2/compromised/account_group/updated

Sample Response:

{
  "count": 1,
  "items": [
    {
      "dateFirstCompromised": "2022-11-29T12:57:33+00:00",
      "dateFirstSeen": "2023-01-11T15:44:55+00:00",
      "dateLastCompromised": "2022-11-29T12:57:33+00:00",
      "dateLastSeen": "2023-01-11T15:44:55+00:00",
      "evaluation": {
        "admiraltyCode": "B3",
        "credibility": 50,
        "reliability": 80,
        "severity": "orange",
        "tlp": "red",
        "ttl": 90
      },
      "eventCount": 1,
      "events": [
        {
          "client": {
            "ipv4": {
              "asn": "AS9797 Nexon Asia Pacific P/L",
              "city": "Canberra",
              "countryCode": "AU",
              "countryName": "Australia",
              "ip": "210.215.170.103",
              "provider": "Nexon Asia Pacific P/L",
              "region": "Australian Capital Territory"
            }
          },
          "cnc": {
            "cnc": "http://113.218.160.19/",
            "domain": "113.218.160.19",
            "ipv4": {
              "asn": "AS4134 No.31,Jin-rong Street",
              "city": "Changsha",
              "countryCode": "CN",
              "countryName": "China",
              "ip": "113.218.160.19",
              "provider": "China Telecom Hunan",
              "region": "Hunan"
            },
            "ipv6": null,
            "url": "http://113.218.160.19/"
          },
          "dateCompromised": null,
          "dateDetected": "2022-05-25T13:37:04+00:00",
          "id": "3d633aba8b867ad7ffae42fa4ad01c123d54d989",
          "malware": {
            "category": [],
            "class": null,
            "id": "487aa3cd765901009e9582c809d8737e4639863f",
            "name": "Ologin",
            "platform": [],
            "stixGuid": "e0dbd349-855c-9fc5-82d7-6ccd1d177977",
            "threatLevel": null
          },
          "oldId": "1135330344",
          "person": null,
          "source": {
            "id": "",
            "idType": "http_link",
            "type": "Phishing"
          },
          "stixGuid": "25570f61-cc8b-f3dc-a940-67d0ccd83523",
          "threatActor": null
        }
      ],
      "id": "4c48fd8197dba2eecc42d56bfbaba7483e497ea7",
      "displayOptions": {
        "favouriteForCompanies": [],
        "hideForCompanies": [],
        "isFavourite": false,
        "isHidden": false
      },
      "login": "user511627",
      "malware": [
        {
          "id": "e323de16fc8162e02aad6683b0f48a0e4008cbae",
          "name": "QBot"
        }
      ],
      "parsedLogin": {
        "domain": "test-company-1.com",
        "ip": null
      },
      "service": {
        "domain": "www.my.commbank.com.au",
        "ip": null,
        "url": "https://www.my.commbank.com.au/netbank/Logon/Logon.aspx",
        "host": "www.my.commbank.com.au"
      },
      "oldId": "1590",
      "password": "605f3ea202c9",
      "person": {
        "address": null,
        "birthday": null,
        "city": null,
        "countryCode": null,
        "email": null,
        "name": null,
        "passport": null,
        "phone": null,
        "state": null,
        "taxNumber": null,
        "zip": null
      },
      "port": null,
      "portalLink": "https://bt-demo.group-ib.com/cd/accounts?searchValue=id:4c48fd8197dba2eecc42d56bfbaba7483e497ea7",
      "seqUpdate": 1589893516084,
      "source": [
        {
          "id": "https://breachforums.is/Thread-SELLING-Naz-API-Dataset",
          "type": "Stealer log's combolist",
          "idType": "naz.API"
        }
      ],
      "sourceType": [
        "Stealer log's combolist"
      ],
      "threatActor": {
        "country": null,
        "id": "4fde44244b3ed5f4ced23dc890efacf8aceb306a",
        "isAPT": false,
        "name": "Pontorez"
      }
    }
  ]
}

ThreatQ provides the following default mapping for these feeds:

Feed Data Path ThreatQ Entity ThreatQ Object Type or Attribute Key Published Date Examples Notes
.items[].events[].client.ipv4.asn Related Indicator.Attribute ASN .items[].dateFirstSeen AS9797 Nexon Asia Pacific P/L N/A
.items[].events[].client.ipv4.city Related Indicator.Attribute City .items[].dateFirstSeen Canberra N/A
.items[].events[].client.ipv4.countryCode Related Indicator.Attribute Country Code .items[].dateFirstSeen AU N/A
.items[].events[].client.ipv4.countryName Related Indicator.Attribute Country Name .items[].dateFirstSeen Australia N/A
.items[].events[].client.ipv4.ip Related Indicator.Value IP Address .items[].dateFirstSeen 210.215.170.103 N/A
.items[].events[].client.ipv4.provider Related Indicator.Attribute Provider .items[].dateFirstSeen Nexon Asia Pacific P/L N/A
.items[].events[].client.ipv4.region Related Indicator.Attribute Region .items[].dateFirstSeen Australian Capital Territory N/A
.items[].events[].cnc.cnc Related Indicator.Value FQDN .items[].dateFirstSeen http://113.218.160.19/ N/A
.items[].events[].cnc.domain Related Indicator.Value FQDN .items[].dateFirstSeen 113.218.160.19 N/A
.items[].events[].cnc.ipv4.asn Related Indicator.Attribute ASN .items[].dateFirstSeen AS4134 No.31,Jin-rong Street N/A
.items[].events[].cnc.ipv4.city Related Indicator.Attribute City .items[].dateFirstSeen Changsha N/A
.items[].events[].cnc.ipv4.countryCode Related Indicator.Attribute Country Code .items[].dateFirstSeen CN N/A
.items[].events[].cnc.ipv4.countryName Related Indicator.Attribute Country Name .items[].dateFirstSeen China N/A
.items[].events[].cnc.ipv4.ip Related Indicator.Value IP Address .items[].dateFirstSeen 113.218.160.19 N/A
.items[].events[].cnc.ipv4.provider Related Indicator.Attribute Provider .items[].dateFirstSeen China Telecom Hunan N/A
.items[].events[].cnc.ipv4.region Related Indicator.Attribute Region .items[].dateFirstSeen Hunan N/A
.items[].events[].cnc.ipv6.asn Related Indicator.Attribute ASN .items[].dateFirstSeen N/A N/A
.items[].events[].cnc.ipv6.city Related Indicator.Attribute City .items[].dateFirstSeen N/A N/A
.items[].events[].cnc.ipv6.countryCode Related Indicator.Attribute Country Code .items[].dateFirstSeen N/A N/A
.items[].events[].cnc.ipv6.countryName Related Indicator.Attribute Country Name .items[].dateFirstSeen N/A N/A
.items[].events[].cnc.ipv6.ip Related Indicator.Value IPv6 Address .items[].dateFirstSeen N/A N/A
.items[].events[].cnc.ipv6.provider Related Indicator.Attribute Provider .items[].dateFirstSeen N/A N/A
.items[].events[].cnc.ipv6.region Related Indicator.Attribute Region .items[].dateFirstSeen N/A N/A
.items[].events[].cnc.url Related Indicator.Value URL .items[].dateFirstSeen http://113.218.160.19/ N/A
.items[].parsedLogin.domain Related Indicator.Value FQDN .items[].dateFirstSeen test-company-1.com N/A
.items[].evaluation.admiraltyCode Account.Attribute Admiralty Code .items[].dateFirstSeen B3 Updatable
.items[].evaluation.credibility Account.Attribute Credibility .items[].dateFirstSeen 50 Updatable
.items[].evaluation.reliability Account.Attribute Reliability .items[].dateFirstSeen 80 Updatable
.items[].evaluation.severity Account.Attribute Severity .items[].dateFirstSeen orange Updatable
.items[].evaluation.tlp Account.TLP / Related Objects.TLP N/A .items[].dateFirstSeen red N/A
.items[].evaluation.ttl Account.Attribute Time to live (days) .items[].dateFirstSeen 90 Updatable
.items[].malware[].name Related Malware.Value N/A .items[].dateFirstSeen QBot N/A
.items[].login Account.Value N/A .items[].dateFirstSeen Account user511627 Prepended with 'Account '
.items[].password Account.Attribute Password .items[].dateFirstSeen 605f3ea202c9 N/A
.items[].sourceType Account.Attribute Source Type .items[].dateFirstSeen Phishing N/A
.items[].sourceLink Account.Attribute Source Link .items[].dateFirstSeen https://breached.to/Thread-Selling-CLOUT-WITH-MORE-THAN-970-000-LOGS-JUNE-SEPT-2022 N/A
.items[].dateFirstCompromised Account.Attribute Compromised Date .items[].dateFirstSeen 2022-11-29T12:57:33+00:00 N/A
.items[].threatActor[].name Related Adversary.Name N/A .items[].dateFirstSeen Pontorez N/A

GroupIB Compromised Bank Card

The GroupIB Compromised Bank Card feed ingests the custom object Compromised Card as well as any related Indicators and Malware.

GET https://tap.group-ib.com/api/v2/compromised/bank_card_group/updated

Sample Response:

{
  "count": 400,
  "items": [
    {
      "baseName": null,
      "cardInfo": {
        "bin": [
          "601129",
          "6011298",
          "60112988",
          "601129880",
          "6011298803"
        ],
        "issuer": {
          "countryCode": "IN",
          "countryName": "INDIA",
          "issuer": "STATE BANK OF INDIA"
        },
        "number": "4000174114732465",
        "system": "VISA",
        "type": "CLASSIC"
      },
      "eventCount": 1,
      "events": [
        {
          "cardInfo": {
            "cvv": "966",
            "dump": null,
            "pin": null,
            "validThru": "8/2016",
            "validThruDate": "2016-08-31"
          },
          "client": {
            "ipv4": {
              "asn": "AS497 754th Electronic Systems Group",
              "city": "Raleigh",
              "countryCode": "US",
              "countryName": "United States",
              "ip": "56.151.217.119",
              "provider": "United States Postal Service.",
              "region": "North Carolina"
            }
          },
          "cnc": {
            "cnc": "http://246.119.220.81/",
            "domain": "246.119.220.81",
            "ipv4": {
              "asn": "AS497 754th Electronic Systems Group",
              "city": "Raleigh",
              "countryCode": "US",
              "countryName": "United States",
              "ip": "246.119.220.81",
              "provider": "United States Postal Service",
              "region": "North Carolina"
            },
            "ipv6": null,
            "url": "http://246.119.220.81/"
          },
          "malware": {
            "id": "3e9e68a2f267f45f970ee84ff5dac37d05761f60",
            "name": "Phishing"
          },
          "owner": {
            "address": null,
            "city": null,
            "countryCode": null,
            "email": null,
            "name": null,
            "passport": null,
            "phone": null,
            "state": null,
            "zip": null
          },
          "source": {
            "id": null,
            "idType": null,
            "type": "Phishing"
          },
          "threatActor": {
            "country": null,
            "id": "051cbdad0eb17cb52d7b635187a922f97850bfc3",
            "isAPT": false,
            "name": "MegaPony"
          },
          "track": []
        }
      ],
      "dateFirstCompromised": "2020-06-05T10:07:26+00:00",
      "dateLastCompromised": "2020-06-05T10:07:26+00:00",
      "dateFirstSeen": "2020-06-05T10:07:26+00:00",
      "dateLastSeen": "2020-06-05T10:07:26+00:00",
      "evaluation": {
        "admiraltyCode": "B3",
        "credibility": 50,
        "reliability": 80,
        "severity": "orange",
        "tlp": "red",
        "ttl": 90
      },
      "externalId": "",
      "id": "b3d87b6af5532ee8d41baac000bba2d1c46662c8",
      "displayOptions": {
        "favouriteForCompanies": [],
        "hideForCompanies": [],
        "isFavourite": false,
        "isHidden": false
      },
      "malware": [
        {
          "id": "3e9e68a2f267f45f970ee84ff5dac37d05761f60",
          "name": "Phishing"
        }
      ],
      "oldId": "2308",
      "portalLink": "https://bt-demo.group-ib.com/cd/cards?searchValue=id:b3d87b6af5532ee8d41baac000bba2d1c46662c8",
      "seqUpdate": 1591351984817,
      "serviceCode": null,
      "sourceType": [
        "Phishing"
      ],
      "threatActor": [
        {
          "country": null,
          "id": "051cbdad0eb17cb52d7b635187a922f97850bfc3",
          "isAPT": false,
          "name": "MegaPony"
        }
      ]
    }
  ]
}

ThreatQuotient provides the following default mapping for this feed:

Feed Data Path ThreatQ Entity ThreatQ Object Type or Attribute Key Published Date Examples Notes
.items[].events[].cardInfo.cvv Card.Attribute Card CVV .items[].dateFirstSeen 966 N/A
.items[].cardInfo.issuer.countryCode Card.Attribute Card Issuer Country Code .items[].dateFirstSeen IN N/A
.items[].cardInfo.issuer.countryName Card.Attribute Card Issuer Country .items[].dateFirstSeen INDIA N/A
.items[].cardInfo.issuer.issuer Card.Attribute Card Issuer .items[].dateFirstSeen STATE BANK OF INDIA N/A
.items[].cardInfo.number Card.Value Card Number .items[].dateFirstSeen 4000174114732465 N/A
.items[].cardInfo.system Card.Attribute Card System .items[].dateFirstSeen VISA N/A
.items[].cardInfo.type Card.Attribute Card Type .items[].dateFirstSeen CLASSIC N/A
.items[].cardInfo.bin Card.Attribute Bank Identification Number .items[].dateFirstSeen 601129 N/A
.items[].events[].cardInfo.validThru Card.Attribute Card Expiration .items[].dateFirstSeen 8/2016 N/A
.items[].events[].client.ipv4.asn Related Indicator.Attribute ASN .items[].dateFirstSeen AS497 754th Electronic Systems Group N/A
.items[].events[].client.ipv4.city Related Indicator.Attribute City .items[].dateFirstSeen Raleigh N/A
.items[].events[].client.ipv4.countryCode Related Indicator.Attribute Country Code .items[].dateFirstSeen US N/A
.items[].events[].client.ipv4.countryName Related Indicator.Attribute Country Name .items[].dateFirstSeen United States N/A
.items[].events[].client.ipv4.ip Related Indicator.Value IP Address .items[].dateFirstSeen 56.151.217.119 N/A
.items[].events[].client.ipv4.provider Related Indicator.Attribute Provider .items[].dateFirstSeen United States Postal Service N/A
.items[].events[].client.ipv4.region Related Indicator.Attribute Region .items[].dateFirstSeen North Carolina N/A
.items[].events[].cnc.cnc Related Indicator.Value FQDN .items[].dateFirstSeen http://246.119.220.81/ N/A
.items[].events[].cnc.domain Related Indicator.Value FQDN .items[].dateFirstSeen 246.119.220.81 N/A
.items[].events[].cnc.ipv4.asn Related Indicator.Attribute ASN .items[].dateFirstSeen AS497 754th Electronic Systems Group N/A
.items[].events[].cnc.ipv4.city Related Indicator.Attribute City .items[].dateFirstSeen Raleigh N/A
.items[].events[].cnc.ipv4.countryCode Related Indicator.Attribute Country Code .items[].dateFirstSeen US N/A
.items[].events[].cnc.ipv4.countryName Related Indicator.Attribute Country Name .items[].dateFirstSeen United States N/A
.items[].events[].cnc.ipv4.ip Related Indicator.Value IP Address .items[].dateFirstSeen 246.119.220.81 N/A
.items[].events[].cnc.ipv4.provider Related Indicator.Attribute Provider .items[].dateFirstSeen United States Postal Service N/A
.items[].events[].cnc.ipv4.region Related Indicator.Attribute Region .items[].dateFirstSeen North Carolina N/A
.items[].events[].cnc.ipv6.asn Related Indicator.Attribute ASN .items[].dateFirstSeen N/A N/A
.items[].events[].cnc.ipv6.city Related Indicator.Attribute City .items[].dateFirstSeen N/A N/A
.items[].events[].cnc.ipv6.countryCode Related Indicator.Attribute Country Code .items[].dateFirstSeen N/A N/A
.items[].events[].cnc.ipv6.countryName Related Indicator.Attribute Country Name .items[].dateFirstSeen N/A N/A
.items[].events[].cnc.ipv6.ip Related Indicator.Value IPv6 Address .items[].dateFirstSeen N/A N/A
.items[].events[].cnc.ipv6.provider Related Indicator.Attribute Provider .items[].dateFirstSeen N/A N/A
.items[].events[].cnc.ipv6.region Related Indicator.Attribute Region .items[].dateFirstSeen N/A N/A
.items[].events[].cnc.url Related Indicator.Value URL .items[].dateFirstSeen http://246.119.220.81/ N/A
.items[].evaluation.admiraltyCode Card.Attribute Admiralty Code .items[].dateFirstSeen B3 Updatable
.items[].evaluation.credibility Card.Attribute Credibility .items[].dateFirstSeen 50 Updatable
.items[].evaluation.reliability Card.Attribute Reliability .items[].dateFirstSeen 80 Updatable
.items[].evaluation.severity Card.Attribute Severity .items[].dateFirstSeen orange Updatable
.items[].evaluation.tlp Card.TLP / Related Objects.TLP N/A .items[].dateFirstSeen red N/A
.items[].evaluation.ttl Card.Attribute Time to live (days) .items[].dateFirstSeen 90 Updatable
.items[].malware[].name Related Malware.Value N/A .items[].dateFirstSeen Trochilus N/A
.items[].sourceType Card.Attribute Source Type .items[].dateFirstSeen Phishing N/A
.items[].dateFirstCompromised Card.Attribute Compromised Date .items[].dateFirstSeen 2020-05-19T12:39:15+00:00 N/A
.items[].threatActor[].name Related Adversary.Name N/A .items[].dateFirstSeen MegaPony N/A

GroupIB Compromised Data Mules

The GroupIB Compromised Data Mules feed ingests compromised Money Mule objects and any related Indicators, Malware, Organizations, Identities, and Adversaries.

GET https://tap.group-ib.com/api/v2/compromised/mule/updated

Sample Response:

{
  "count": 33789,
  "items": [
    {
      "account": "9245316213",
      "cnc": {
        "cnc": "http://serv.sexura.ru",
        "domain": "serv.sexura.ru",
        "ipv4": {
          "asn": "AS16276 OVH SAS",
          "city": "Gravelines",
          "countryCode": "FR",
          "countryName": "France",
          "ip": "94.23.180.184",
          "provider": "OVH SAS",
          "region": "Hauts-de-France"
        },
        "ipv6": {
          "asn": "AS16276 OVH SAS",
          "city": "Gravelines",
          "countryCode": "FR",
          "countryName": "France",
          "ip": "2001:0db8:85a3:0000:0000:8a2e:0370:7334",
          "provider": "OVH SAS",
          "region": "Hauts-de-France"
        },
        "url": "http://serv.sexura.ru"
      },
      "dateAdd": "2020-10-16T01:06:09+00:00",
      "dateIncident": null,
      "evaluation": {
        "admiraltyCode": "A2",
        "credibility": 80,
        "reliability": 100,
        "severity": "red",
        "tlp": "amber",
        "ttl": 30
      },
      "id": "44bd99f372e2f78ec12513afcb7ee006d86392a2",
      "info": "Nothing",
      "isFavourite": false,
      "isHidden": false,
      "malware": {
        "id": "8790a290230b3b4c059c2516a6adace1eac16066",
        "name": "FlexNet"
      },
      "oldId": "352963098",
      "organization": {
        "bic": "SABRRUMMVH1",
        "bicRu": "SABRRUMMVH1",
        "bsb": "082489",
        "iban": "BIK044525225/30101810400000000225",
        "name": "SAVINGS BANK OF THE RUSSIAN FEDERATION (SBERBANK)",
        "swift": "SABRRUMMVH1"
      },
      "person": {
        "address": "224 Main St",
        "birthday": "01-01-1990",
        "city": "Wiggins",
        "countryCode": "US",
        "email": "jhon@fake.com",
        "name": "John",
        "passport": "123456789",
        "phone": "(555) 555-1234",
        "state": "Colorado",
        "taxNumber": "9999999999999",
        "zip": "80654"
      },
      "portalLink": "https://tap.group-ib.com/cd/mules?searchValue=id:44bd99f372e2f78ec12513afcb7ee006d86392a2",
      "seqUpdate": 1616672696468,
      "sourceType": "Botnet",
      "threatActor": {
        "id": "6c26d5dc4cc743535e7ab5bb205947540878dab9",
        "isAPT": false,
        "name": "CockSkunk"
      },
      "type": "Botnet"
    }
  ]
}

ThreatQ provides the following default mapping for this feed:

Feed Data Path ThreatQ Entity ThreatQ Object Type or Attribute Key Published Date Examples Notes
.items[].account Money Mule.Value N/A .items[].dateAdd 'Money Mule 9245316213' Prepended with Money Mule
.items[].evaluation.admiraltyCode Money Mule.Attribute Admiralty Code .items[].dateAdd 'A2' Updatable
.items[].evaluation.credibility Money Mule.Attribute Credibility .items[].dateAdd '80' Updatable
.items[].evaluation.reliability Money Mule.Attribute Reliability .items[].dateAdd '100' Updatable
.items[].evaluation.severity Money Mule.Attribute Severity .items[].dateAdd 'red' Updatable
.items[].evaluation.tlp Money Mule.TLP / Related Objects.TLP N/A N/A 'amber' N/A
.items[].evaluation.ttl Money Mule.Attribute Time To Live (days) .items[].dateAdd '30' Updatable
.items[].info Money Mule.Attribute Info .items[].dateAdd 'Nothing' N/A
.items[].portalLink Money Mule.Attribute Portal Link .items[].dateAdd https://tap.group-ib.com/cd/mules?searchValue=id:44bd99f372e2f78ec12513afcb7ee006d86392a2 N/A
.items[].seqUpdate Money Mule.Attribute Sequence Update .items[].dateAdd '1616672696468' N/A
.items[].sourceType Money Mule.Attribute Source Type .items[].dateAdd 'Botnet' N/A
.items[].type Money Mule.Attribute Type .items[].dateAdd 'Botnet' N/A
.items[].cnc.cnc Related Indicator.Value FQDN .items[].dateAdd http://serv.sexura.ru N/A
.items[].cnc.domain Related Indicator.Value FQDN .items[].dateAdd 'serv.sexura.ru' N/A
.items[].cnc.url Related Indicator.Value URL .items[].dateAdd http://serv.sexura.ru If a URL Indicator attempting to be consumed is a true FQDN, the API normalize it to be an FQDN Indicator
.items[].cnc.ipv4.ip Related Indicator.Value IP Address .items[].dateAdd '94.23.180.184' N/A
.items[].cnc.ipv4.asn Related Indicator.Attribute ASN .items[].dateAdd 'AS16276 OVH SAS' N/A
.items[].cnc.ipv4.city Related Indicator.Attribute City .items[].dateAdd 'Gravelines' N/A
.items[].cnc.ipv4.countryCode Related Indicator.Attribute Country Code .items[].dateAdd 'FR' N/A
.items[].cnc.ipv4.countryName Related Indicator.Attribute Country Name .items[].dateAdd 'France' N/A
.items[].cnc.ipv4.provider Related Indicator.Attribute Provider .items[].dateAdd 'OVH SAS' N/A
.items[].cnc.ipv4.region Related Indicator.Attribute Region .items[].dateAdd 'Hauts-de-France' N/A
.items[].cnc.ipv6.ip Related Indicator.Value IPv6 Address .items[].dateAdd '2001:0db8:85a3:0000:
0000:8a2e:0370:7334'
N/A
.items[].cnc.ipv6.asn Related Indicator.Attribute ASN .items[].dateAdd 'AS16276 OVH SAS' N/A
.items[].cnc.ipv6.city Related Indicator.Attribute City .items[].dateAdd 'Gravelines' N/A
.items[].cnc.ipv6.countryCode Related Indicator.Attribute Country Code .items[].dateAdd 'FR' N/A
.items[].cnc.ipv6.countryName Related Indicator.Attribute Country Name .items[].dateAdd 'France' N/A
.items[].cnc.ipv6.provider Related Indicator.Attribute Provider .items[].dateAdd 'OVH SAS' N/A
.items[].cnc.ipv6.region Related Indicator.Attribute Region .items[].dateAdd 'Hauts-de-France' N/A
.items[].malware.name Related Malware.Value N/A .items[].dateAdd 'FlexNet' N/A
.items[].organization.name Related Organization N/A .items[].dateAdd 'SAVINGS BANK OF THE RUSSIAN FEDERATION (SBERBANK)' This is a custom object
.items[].organization.bic Related Organization.Attribute BIC .items[].dateAdd 'SABRRUMMVH1' N/A
.items[].organization.bicRu Related Organization.Attribute RU BIC .items[].dateAdd 'SABRRUMMVH1' N/A
.items[].organization.bsb Related Organization.Attribute BSB .items[].dateAdd '082489' N/A
.items[].organization.iban Related Organization.Attribute IBAN .items[].dateAdd 'BIK044525225/30101
810400000000225'
N/A
.items[].organization.swift Related Organization.Attribute SWIFT .items[].dateAdd 'SABRRUMMVH1' N/A
.items[].person.taxNumber Related Identity N/A .items[].dateAdd '9999999999999' N/A
.items[].person.address Related Identity.Attribute Address .items[].dateAdd '224 Main St' N/A
.items[].person.birthday Related Identity.Attribute Birthday .items[].dateAdd '01-01-1990' N/A
.items[].person.city Related Identity.Attribute City .items[].dateAdd 'Wiggins' N/A
.items[].person.countryCode Related Identity.Attribute Country Code .items[].dateAdd 'US' N/A
.items[].person.email Related Identity.Attribute Email Address .items[].dateAdd jhon@fake.com N/A
.items[].person.name Related Identity.Attribute Name .items[].dateAdd 'Jhon' N/A
.items[].person.passport Related Identity.Attribute Passport Data .items[].dateAdd '123456789' N/A
.items[].person.phone Related Identity.Attribute Phone Number .items[].dateAdd '(555) 555-1234' N/A
.items[].person.state Related Identity.Attribute State .items[].dateAdd 'Colorado' N/A
.items[].person.zip Related Identity.Attribute ZIP Code .items[].dateAdd '80654' N/A
.items[].threatActor.name Related Adversary.Name N/A .items[].dateAdd 'CockSkunk' N/A

GroupIB Compromised Data Git Leaks

The GroupIB Compromised Data Git Leaks feed ingests Indicator objects and any related Identities.

GET https://tap.group-ib.com/api/v2/osi/git_repository/updated

Sample Response:

{
  "count": 1,
  "items": [
    {
      "contributors": [
        {
          "authorEmail": "yneth@gmail.ru",
          "authorName": "yneth"
        }
      ],
      "dataFound": {},
      "dateCreated": "2020-03-12T01:12:00+00:00",
      "dateDetected": "2020-03-12T01:12:00+00:00",
      "evaluation": {
        "admiraltyCode": "A1",
        "credibility": 100,
        "reliability": 100,
        "severity": "red",
        "tlp": "red",
        "ttl": 0
      },
      "files": [
        {
          "dataFound": [
            "password"
          ],
          "dateCreated": "2020-03-12T01:12:00+00:00",
          "dateDetected": "2020-03-12T01:12:00+00:00",
          "evaluation": {
            "admiraltyCode": "A1",
            "credibility": 100,
            "reliability": 100,
            "severity": "red",
            "tlp": "red",
            "ttl": 0
          },
          "id": "391db5d5f17ab6cbbbf7c35d1f4d076cb4c830f097b2a9eddd2df7b0650709a7",
          "matchesType": [
            "commonKeywords",
            "keyword"
          ],
          "matchesTypeCount": {
            "commonKeywords": 1,
            "domain": 0,
            "dsn": 0
          },
          "name": "distress_aarch64-apple-darwin",
          "revisions": [
            {
              "bind": [
                {
                  "bindBy": "cert",
                  "companyId": 2692,
                  "data": "cert",
                  "ruleId": 0,
                  "type": "keyword"
                }
              ],
              "data": {
                "commonKeywords": {
                  "password": [
                    "password"
                  ]
                }
              },
              "hash": "391db5d5f17ab6cbbbf7c35d1f4d076cb4c830f097b2a9eddd2df7b0650709a7",
              "info": {
                "authorEmail": "yneth@gmail.ru",
                "authorName": "yneth",
                "timestamp": 1617794272
              }
            }
          ],
          "rules": {},
          "url": "https://github.com/Yneth/distress-releases/releases/download/0.7.1/distress_aarch64-apple-darwin"
        }
      ],
      "id": "ead0d8ae9f2347789941ebacde88ad2e3b1ef691",
      "matchesTypes": [
        "commonKeywords",
        "keyword"
      ],
      "name": "vtdl",
      "numberOf": {
        "contributors": 1,
        "files": 1
      },
      "relations": {},
      "seqUpdate": 1591351984817,
      "source": "github"
    }
  ]
}

ThreatQuotient provides the following default mapping for this feed:

Feed Data Path ThreatQ Entity ThreatQ Object Type or Attribute Key Published Date Examples Notes
.items[].files[].name Indicator.Value Filename .items[].files[].dateDetected distress_aarch64-apple-darwin N/A
.items[].files[].evaluation.admiraltyCode Indicator.Attribute Admiralty Code .items[].files[].dateDetected A1 Updatable
.items[].files[].evaluation.credibility Indicator.Attribute Credibility .items[].files[].dateDetected 100 Updatable
.items[].files[].evaluation.reliability Indicator.Attribute Reliability .items[].files[].dateDetected 100 Updatable
.items[].files[].evaluation.severity Indicator.Attribute Severity .items[].files[].dateDetected red Updatable
.items[].files[].evaluation.tlp Indicator.tlp / Related Objects.tlp N/A .items[].files[].dateDetected red N/A
.items[].files[].evaluation.ttl Indicator.Attribute Time to live (days) .items[].files[].dateDetected 0 Updatable
.items[].files[].matchesTypeCount Indicator.Attribute {Type} match count .items[].files[].dateDetected 1 {Type} is replaced with all the keys
.items[].files[].dataFound Indicator.Attribute Data Found .items[].files[].dateDetected password N/A
.items[].files[].url Related Indicator.Value URL .items[].files[].dateDetected https://github.com/Yneth/distress-releases/releases/download/0.7.1/distress_aarch64-apple-darwin N/A
.items[].files[].revisions[].info.authorName Related Identity.Value N/A .items[].files[].dateDetected yneth N/A
.items[].files[].revisions[].info.authorEmail Related Identity.Attribute Email Address .items[].files[].dateDetected yneth@gmail.ru N/A

GroupIB Compromised Data IMEI

The GroupIB Compromised Data IMEI feed ingests IMEI objects and any related Indicators, Malware, and Adversaries.

GET https://tap.group-ib.com/api/v2/compromised/imei/updated

Sample Response:

{
  "count": 5408859,
  "items": [
    {
      "client": {
        "ipv4": {
          "asn": "AS15169 Google Inc.",
          "city": "Mountain View",
          "countryCode": "US",
          "countryName": "United States",
          "ip": "66.102.6.171",
          "provider": "Google Proxy",
          "region": "California"
        }
      },
      "cnc": {
        "cnc": "http://s1.paradu.ru",
        "domain": "s1.paradu.ru",
        "ipv4": {
          "asn": "AS48666 MAROSNET Telecommunication Company LLC",
          "city": "Moscow",
          "countryCode": "RU",
          "countryName": "Russian Federation",
          "ip": "31.148.99.117",
          "provider": "ALFA TELECOM s.r.o.",
          "region": "Central"
        },
        "ipv6": {
          "asn": "AS48666 MAROSNET Telecommunication Company LLC",
          "city": "Moscow",
          "countryCode": "RU",
          "countryName": "Russian Federation",
          "ip": "2001:0db8:85a3:0000:0000:8a2e:0370:7334",
          "provider": "ALFA TELECOM s.r.o.",
          "region": "Central"
        },
        "url": "http://s1.paradu.ru"
      },
      "dateCompromised": null,
      "dateDetected": "2021-04-10T01:37:36+00:00",
      "device": {
        "iccid": "891004234814455936F",
        "imei": "355266047901929",
        "imsi": "313460000000001",
        "model": "Nexus 5X/6.0.1 (Bot.v.5.0)",
        "os": "Android 6.0.1"
      },
      "evaluation": {
        "admiraltyCode": "A2",
        "credibility": 80,
        "reliability": 100,
        "severity": "red",
        "tlp": "red",
        "ttl": 30
      },
      "id": "9bc865c330efb652cf876ae73e8b6ba7b047acf4",
      "isFavourite": false,
      "isHidden": false,
      "malware": {
        "id": "8790a290230b3b4c059c2516a6adace1eac16066",
        "name": "FlexNet"
      },
      "oldId": "441010555",
      "operator": {
        "countryCode": "RU",
        "name": "MegaFon",
        "number": "+358407192130"
      },
      "portalLink": "https://tap.group-ib.com/cd/imei?searchValue=id:9bc865c330efb652cf876ae73e8b6ba7b047acf4",
      "seqUpdate": 1621774969216,
      "sourceType": "Botnet",
      "threatActor": {
        "id": "6c26d5dc4cc743535e7ab5bb205947540878dab9",
        "isAPT": false,
        "name": "CockSkunk"
      }
    }
  ]
}

ThreatQ provides the following default mapping for this feed:

Feed Data Path ThreatQ Entity ThreatQ Object Type or Attribute Key Published Date Examples Notes
.items[].device.imei IMEI.Value N/A .items[].dateDetected '355266047901929' N/A
.items[].device.iccid IMEI.Attribute Device ICCID .items[].dateDetected '891004234814455936F' N/A
.items[].device.imsi IMEI.Attribute Device IMSI .items[].dateDetected '313460000000001' N/A
.items[].device.model IMEI.Attribute Device Model .items[].dateDetected 'Nexus 5X/6.0.1 (Bot.v.5.0)' N/A
.items[].device.os IMEI.Attribute Device OS .items[].dateDetected 'Android 6.0.1' N/A
.items[].evaluation.admiraltyCode IMEI.Attribute Admiralty Code .items[].dateDetected 'A2' Updatable
.items[].evaluation.credibility IMEI.Attribute Credibility .items[].dateDetected '80' Updatable
.items[].evaluation.reliability IMEI.Attribute Reliability .items[].dateDetected '100' Updatable
.items[].evaluation.severity IMEI.Attribute Severity .items[].dateDetected 'red' Updatable
.items[].evaluation.tlp IMEI.TLP / Related Objects.TLP N/A N/A 'red' N/A
.items[].evaluation.ttl IMEI.Attribute Time To Live (days) .items[].dateDetected '30' Updatable
.items[].operator.countryCode IMEI.Attribute Operator Country Code .items[].dateDetected 'RU' N/A
.items[].operator.name IMEI.Attribute Operator Name .items[].dateDetected 'MegaFon' N/A
.items[].operator.number IMEI.Attribute Operator Phone Number .items[].dateDetected '+358407192130' N/A
.items[].portalLink IMEI.Attribute Source Link .items[].dateDetected https://tap.group-ib.com/cd/imei?searchValue=id:9bc865c330efb652cf876ae73e8b6ba7b047acf4 N/A
.items[].sourceType IMEI.Attribute Source Type .items[].dateDetected 'Botnet' N/A
.items[].dateCompromised IMEI.Attribute Compromised Date .items[].dateDetected '2020-05-19T12:39:15+00:00' N/A
.items[].client.ipv4.ip Related Indicator.Value IP Address .items[].dateDetected '66.102.6.171' N/A
.items[].client.ipv4.asn Related Indicator.Attribute ASN .items[].dateDetected 'AS16276 OVH SAS' N/A
.items[].client.ipv4.city Related Indicator.Attribute City .items[].dateDetected 'Mountain View' N/A
.items[].client.ipv4.countryCode Related Indicator.Attribute Country Code .items[].dateDetected 'US' N/A
.items[].client.ipv4.countryName Related Indicator.Attribute Country Name .items[].dateDetected 'United States' N/A
.items[].client.ipv4.provider Related Indicator.Attribute Provider .items[].dateDetected 'Google Proxy' N/A
.items[].client.ipv4.region Related Indicator.Attribute Region .items[].dateDetected 'California' N/A
.items[].cnc.cnc Related Indicator.Value FQDN .items[].dateDetected http://s1.paradu.ru N/A
.items[].cnc.domain Related Indicator.Value FQDN .items[].dateDetected 's1.paradu.ru' N/A
.items[].cnc.url Related Indicator.Value URL .items[].dateDetected http://s1.paradu.ru If a URL Indicator attempting to be consumed is a true FQDN, the API normalize it to be an FQDN Indicator
.items[].cnc.ipv4.ip Related Indicator.Value IP Address .items[].dateDetected '31.148.99.117' N/A
.items[].cnc.ipv4.asn Related Indicator.Attribute ASN .items[].dateDetected 'AS48666 MAROSNET Telecommunication Company LLC' N/A
.items[].cnc.ipv4.city Related Indicator.Attribute City .items[].dateDetected 'Moscow' N/A
.items[].cnc.ipv4.countryCode Related Indicator.Attribute Country Code .items[].dateDetected 'RU' N/A
.items[].cnc.ipv4.countryName Related Indicator.Attribute Country Name .items[].dateDetected 'Russian Federation' N/A
.items[].cnc.ipv4.provider Related Indicator.Attribute Provider .items[].dateDetected 'ALFA TELECOM s.r.o.' N/A
.items[].cnc.ipv4.region Related Indicator.Attribute Region .items[].dateDetected 'Central' N/A
.items[].cnc.ipv6.ip Related Indicator.Value IPv6 Address .items[].dateDetected '2001:0db8:85a3:0000:
0000:8a2e:0370:7334'
N/A
.items[].cnc.ipv6.asn Related Indicator.Attribute ASN .items[].dateDetected 'AS48666 MAROSNET Telecommunication Company LLC' N/A
.items[].cnc.ipv6.city Related Indicator.Attribute City .items[].dateDetected 'Moscow' N/A
.items[].cnc.ipv6.countryCode Related Indicator.Attribute Country Code .items[].dateDetected 'RU' N/A
.items[].cnc.ipv6.countryName Related Indicator.Attribute Country Name .items[].dateDetected 'Russian Federation' N/A
.items[].cnc.ipv6.provider Related Indicator.Attribute Provider .items[].dateDetected 'ALFA TELECOM s.r.o.' N/A
.items[].cnc.ipv6.region Related Indicator.Attribute Region .items[].dateDetected 'Central' N/A
.items[].malware.name Related Malware.Value N/A .items[].dateDetected 'FlexNet' N/A
.items[].threatActor.name Related Adversary.Name N/A .items[].dateDetected 'CockSkunk' N/A

GroupIB Compromised Data Shops

The GroupIB Compromised Data Shops feed ingests Indicators and related Malware.

GET https://tap.group-ib.com/api/v2/compromised/access/updated

Truncated Sample Response: 

{
  "count": 1,
  "items": [
      {
        "accessType": null,
        "cnc": {
            "cnc": "https://russianmarket.to/",
            "domain": "russianmarket.to",
            "ipv4": {
                "asn": "AS13335",
                "city": null,
                "countryCode": "US",
                "countryName": null,
                "ip": "172.67.168.114",
                "provider": "CLOUDFLARENET",
                "region": "North America"
            },
            "ipv6": null,
            "url": "https://russianmarket.to:443"
        },
        "dateCompromised": "2023-04-30T04:50:47+00:00",
        "dateDetected": "2023-04-30T04:50:47+00:00",
        "description": null,
        "displayOptions": {
            "isFavourite": false,
            "isHidden": false
        },
        "evaluation": {
            "admiraltyCode": "A2",
            "credibility": 80,
            "reliability": 100,
            "severity": "red",
            "tlp": "red",
            "ttl": 30
        },
        "id": "2aa8ed4aeb201eb61a6462471e884adc07e3907a",
        "malware": {
            "category": [],
            "class": null,
            "id": "2086397a5d1d08446656429fec5906de3bc5ebc8",
            "name": "Racoon",
            "platform": [],
            "threatLevel": null
        },
        "price": {
            "currency": "USD",
            "value": "10"
        },
        "rawData": "",
        "rawDataHighlighted": "",
        "seqUpdate": 1682964164818724749,
        "sourceInfo": {
            "externalId": "10604145(7)",
            "name": "russianmarket",
            "seller": "Mo####yf"
        },
        "target": {
            "device": {
                "os": "Windows 10 Pro"
            },
            "domain": "helpcenter.threatq.com",
            "geo": {
                "city": null,
                "country": "JO",
                "state": "Amman Governorate",
                "zip": null
            },
            "ipv4": null,
            "ipv6": null,
            "provider": "ZAIN",
            "url": null
        },
        "techSeqUpdate": null,
        "type": "Logs"
    }
  ]
}

ThreatQ provides the following default mapping for this feed:

Feed Data Path ThreatQ Entity ThreatQ Object Type or Attribute Key Published Date Examples Notes
.items[].target.domain Indicator.Value N/A .items[].dateDetected helpcenter.threatq.com' N/A
.items[].target.device.os Indicator.Attribute Operating System .items[].dateDetected Windows 10 Pro N/A
.items[].target.geo.city Indicator.Attribute City .items[].dateDetected N/A N/A
.items[].target.geo.country Indicator.Attribute Country .items[].dateDetected JO' N/A
.items[].target.geo.state Indicator.Attribute State .items[].dateDetected Amman Governorate N/A
.items[].cnc.cnc Related Indicator.Value FQDN .items[].dateDetected https://russianmarket.to/ N/A
.items[].cnc.domain Related Indicator.Value FQDN .items[].dateDetected russianmarket.to N/A
.items[].cnc.url Related Indicator.Value URL .items[].dateDetected https://russianmarket.to:443 N/A
.items[].cnc.ipv4.ip Related Indicator.Value IP Address .items[].dateDetected 172.67.168.114 N/A
.items[].cnc.ipv4.asn Related Indicator.Attribute ASN .items[].dateDetected AS13335 N/A
.items[].cnc.ipv4.city Related Indicator.Attribute City .items[].dateDetected N/A N/A
.items[].cnc.ipv4.countryCode Related Indicator.Attribute Country Code .items[].dateDetected US N/A
.items[].cnc.ipv4.countryName Related Indicator.Attribute Country Name .items[].dateDetected N/A N/A
.items[].cnc.ipv4.provider Related Indicator.Attribute Provider .items[].dateDetected CLOUDFLARENET N/A
.items[].cnc.ipv4.region Related Indicator.Attribute Region .items[].dateDetected North America N/A
.items[].cnc.ipv6.ip Related Indicator.Value IP Address .items[].dateDetected N/A N/A
.items[].cnc.ipv6.asn Related Indicator.Attribute ASN .items[].dateDetected N/A N/A
.items[].cnc.ipv6.city Related Indicator.Attribute City .items[].dateDetected N/A N/A
.items[].cnc.ipv6.countryCode Related Indicator.Attribute Country Code .items[].dateDetected N/A N/A
.items[].cnc.ipv6.countryName Related Indicator.Attribute Country Name .items[].dateDetected N/A N/A
.items[].cnc.ipv6.provider Related Indicator.Attribute Provider .items[].dateDetected N/A N/A
.items[].cnc.ipv6.region Related Indicator.Attribute Region .items[].dateDetected N/A N/A
.items[].evaluation.tlp Related Indicators.TLP N/A N/A red N/A
.items[].malware.name Related Malware.Value N/A .items[].dateDetected Racoon N/A

GroupIB Compromised IM Discord

The GroupIB Compromised IM Discord feed ingests information about Discord channels using the custom object Discord Channel. The authors of the messages are ingested as related Identities. The content of the messages are appended to the description of the object. This may result in messages that are not sorted chronologically. It was implemented a mechanism that prevents the ingestion of duplicate messages if the feed is run multiple times on the same time interval.

GET https://tap.group-ib.com/api/v2/compromised/discord/updated

Sample Response (truncated):

{
  "count": 1,
  "items": [
     {
      "author": {
        "avatar": "string",
        "discriminator": "1234",
        "id": "string",
        "name": "user1234"
      },
      "channel": {
        "avatar": "string",
        "description": {},
        "id": "string",
        "name": "white_hackers",
        "parsedCounters": {
          "channels": 0,
          "domain": 0,
          "files": 0,
          "ip": 0,
          "links": 0,
          "media": 0
        },
        "server": "server",
        "serverId": "string",
        "stat": {
          "firstMessageDate": "2023-04-10T14:37:32+03:00",
          "id": "string",
          "lastMessageDate": "2023-04-10T14:37:32+03:00",
          "messageNum": 8,
          "name": "string",
          "userNum": 5
        }
      },
      "deleted": "string",
      "edits": {},
      "highlight": [
        "string"
      ],
      "id": "string",
      "media": {
        "name": "string",
        "size": 0,
        "type": "string"
      },
      "repliedMessage": {
        "author": {
          "avatar": "string",
          "discriminator": "string",
          "id": "string",
          "name": "string"
        },
        "id": "string",
        "text": "string",
        "translation": "string"
      },
      "rules": [
        183963
      ],
      "seqUpdate": 0,
      "text": "message text",
      "translation": "string",
      "ts": "2023-04-10T14:37:32+03:00"
    }
  ]
}

ThreatQuotient provides the following default mapping for this feed:

Feed Data Path ThreatQ Entity ThreatQ Object Type or Attribute Key Published Date Examples Notes
.items[].author.name Identity.Value N/A N/A user1234 N/A
.items[].author.discriminator Identity.Attribute Discriminator N/A 1234 N/A
.items[].channel.name Discord Channel.Value N/A .items[].ts white_hackers N/A
.items[].channel.server Discord Channel.Attribute Server .items[].ts server N/A
.items[].channel.stat.
firstMessageTs
Discord Channel.Attribute First Message Date .items[].ts 2023-04-10T14:
37:32+03:00
Updatable
.items[].channel.stat
.messageNum
Discord Channel.Attribute Message Count .items[].ts 10 Updatable
.items[].channel.stat.
userNum
Discord Channel.Attribute Users Count .items[].ts 9 Updatable
.items[].text Discord Channel.Description N/A N/A 2023-04-10T14:37:32+03:00 user1234: message text Appended to the existing description of the channel.
           

GroupIB Compromised IM Telegram

The GroupIB Compromised IM Telegram feed ingests information about Telegram channels, groups or supergroup using the custom object Telegram Channel. The authors of the messages are ingested as related Identities. The content of the messages are appended to the description of the object. This may result in messages that are not sorted chronologically. It was implemented a mechanism that prevents the ingestion of duplicate messages if the feed is run multiple times on the same time interval.

GET https://tap.group-ib.com/api/v2/compromised/messenger/updated

Sample Response (truncated):

{
  "count": 1,
  "items": [
     {
      "author": {
        "id": "string",
        "userName": "user1234",
        "firstName": "Denial",
        "lastName": "Service",
        "type": "user"
      },
      "chatStat": {
        "avatar": {
          "detected": "2023-04-10T14:37:32+03:00",
          "hash": "string",
          "id": "string"
        },
        "firstMessageDate": "2023-04-10T14:37:32+03:00",
        "id": 0,
        "lastMessageDate": "2023-04-10T14:37:32+03:00",
        "messageNum": 10,
        "name": "white_hackers",
        "title": "White Hackers",
        "type": "group",
        "userNum": 9
      },
      "edits": {},
      "highlight": [
        "string"
      ],
      "id": "string",
      "isReply": true,
      "message": "This message was compromised",
      "messageTs": "2023-04-10T14:37:32+03:00",
      "name": "white_hackers",
      "rules": [
        "183963"
      ],
      "seqUpdate": 0,
      "translatedMessage": "string"
    }
  ]
}

ThreatQuotient provides the following default mapping for this feed:

Feed Data Path ThreatQ Entity ThreatQ Object Type or Attribute Key Published Date Examples Notes
.items[].author.userName Identity.Value N/A N/A Account user1234 N/A
.items[].author.firstName Identity.Attribute First Name N/A Denial N/A
.items[].author.lastName Identity.Attribute Last Name N/A Service N/A
.items[].author.type Identity.Attribute Type N/A user N/A
.items[].name Telegram Channel.Value N/A .items[].messageTs Telegram group white_hackers N/A
.items[].chatStat.title Telegram Channel.Attribute Title .items[].messageTs White Hackers N/A
.items[].chatStat.
firstMessageDate
Telegram Channel.Attribute First Message Date .items[].messageTs 2023-04-10T14:37:32+03:00 Updatable
.items[].chatStat.
messageNum
Telegram Channel.Attribute Message Count .items[].messageTs 10 Updatable
.items[].chatStat.
userNum
Telegram Channel.Attribute Users Count .items[].messageTs 9 Updatable
.items[].chatStat.type Telegram Channel.Attribute Type .items[].messageTs commercial N/A
.items[].message Telegram Channel.Description N/A N/A 2023-04-10T14:37:32+03:00 user1234: message text Appended to the existing description of the channel.
           

GroupIB Compromised Masked Bank Card

The GroupIB Compromised Masked Bank Card feed ingests the Compromised Card custom object and any related Indicators, Malware, Adversary and Identity.

GET https://tap.group-ib.com/api/v2/compromised/masked_card/updated

Sample Response:

{
  "count": 400,
  "items": [
    {
      "baseName": null,
      "cardInfo": {
        "cvv": 946,
        "dump": null,
        "issuer": {
          "countryCode": "IN",
          "countryName": "INDIA",
          "issuer": "STATE BANK OF INDIA"
        },
        "number": "4000174114732465",
        "system": "VISA",
        "type": "CLASSIC",
        "validThru": "8/2016"
      },
      "client": {
        "ipv4": {
          "asn": "AS497 754th Electronic Systems Group",
          "city": "Raleigh",
          "countryCode": "US",
          "countryName": "United States",
          "ip": "56.151.217.119",
          "provider": "United States Postal Service.",
          "region": "North Carolina"
        }
      },
      "cnc": {
        "cnc": "http://246.119.220.81/",
        "domain": "246.119.220.81",
        "ipv4": {
          "asn": "AS497 754th Electronic Systems Group",
          "city": "Raleigh",
          "countryCode": "US",
          "countryName": "United States",
          "ip": "246.119.220.81",
          "provider": "United States Postal Service",
          "region": "North Carolina"
        },
        "ipv6": null,
        "url": "http://246.119.220.81/"
      },
      "dateCompromised": "2020-06-05T10:07:26+00:00",
      "dateDetected": "2020-06-05T10:07:26+00:00",
      "evaluation": {
        "admiraltyCode": "B3",
        "credibility": 50,
        "reliability": 80,
        "severity": "orange",
        "tlp": "red",
        "ttl": 90
      },
      "externalId": "",
      "id": "b3d87b6af5532ee8d41baac000bba2d1c46662c8",
      "isFavourite": false,
      "isHidden": false,
      "isIgnore": false,
      "malware": {
        "id": "3e9e68a2f267f45f970ee84ff5dac37d05761f60",
        "name": "Phishing"
      },
      "oldId": "2308",
      "owner": {
        "address": null,
        "birthday": null,
        "city": null,
        "countryCode": null,
        "email": null,
        "name": null,
        "passport": null,
        "phone": null,
        "state": null,
        "taxNumber": null,
        "zip": null
      },
      "portalLink": "https://bt-demo.group-ib.com/cd/cards?searchValue=id:b3d87b6af5532ee8d41baac000bba2d1c46662c8",
      "price": {
        "currency": null,
        "value": null
      },
      "seqUpdate": 1591351984817,
      "serviceCode": null,
      "sourceLink": "https://breached.to/Thread-Selling-CLOUT-WITH-MORE-THAN-970-000-LOGS-JUNE-SEPT-2022",
      "sourceType": "Phishing",
      "threatActor": {
        "country": null,
        "id": "051cbdad0eb17cb52d7b635187a922f97850bfc3",
        "isAPT": false,
        "name": "MegaPony"
      },
      "track": []
    }
  ]
}

ThreatQuotient provides the following default mapping for this feed:

Feed Data Path ThreatQ Entity ThreatQ Object Type or Attribute Key Published Date Examples Notes
.items[].cardInfo.cvv Card.Attribute Card CVV .items[].dateDetected 966 N/A
.items[].cardInfo.issuer.countryCode Card.Attribute Card Issuer Country Code .items[].dateDetected IN N/A
.items[].cardInfo.issuer.countryName Card.Attribute Card Issuer Country .items[].dateDetected INDIA N/A
.items[].cardInfo.issuer.issuer Card.Attribute Card Issuer .items[].dateDetected STATE BANK OF INDIA N/A
.items[].cardInfo.number Card.Value Card Number .items[].dateDetected 4000174114732465 N/A
.items[].cardInfo.system Card.Attribute Card System .items[].dateDetected VISA N/A
.items[].cardInfo.type Card.Attribute Card Type .items[].dateDetected CLASSIC N/A
.items[].cardInfo.validThru Card.Attribute Card Expiration .items[].dateDetected 8/2016 N/A
.items[].client.ipv4.asn Related Indicator.Attribute ASN .items[].dateDetected AS497 754th Electronic Systems Group N/A
.items[].client.ipv4.city Related Indicator.Attribute City .items[].dateDetected Raleigh N/A
.items[].client.ipv4.countryCode Related Indicator.Attribute Country Code .items[].dateDetected US N/A
.items[].client.ipv4.countryName Related Indicator.Attribute Country Name .items[].dateDetected United States N/A
.items[].client.ipv4.ip Related Indicator.Value IP Address .items[].dateDetected 56.151.217.119 N/A
.items[].client.ipv4.provider Related Indicator.Attribute Provider .items[].dateDetected United States Postal Service N/A
.items[].client.ipv4.region Related Indicator.Attribute Region .items[].dateDetected North Carolina N/A
.items[].cnc.cnc Related Indicator.Value FQDN .items[].dateDetected http://246.119.
220.81/
N/A
.items[].cnc.domain Related Indicator.Value FQDN .items[].dateDetected 246.119.220.81 N/A
.items[].cnc.ipv4.asn Related Indicator.Attribute ASN .items[].dateDetected AS497 754th Electronic Systems Group N/A
.items[].cnc.ipv4.city Related Indicator.Attribute City .items[].dateDetected Raleigh N/A
.items[].cnc.ipv4.countryCode Related Indicator.Attribute Country Code .items[].dateDetected US N/A
.items[].cnc.ipv4.countryName Related Indicator.Attribute Country Name .items[].dateDetected United States N/A
.items[].cnc.ipv4.ip Related Indicator.Value IP Address .items[].dateDetected 246.119.220.81 N/A
.items[].cnc.ipv4.provider Related Indicator.Attribute Provider .items[].dateDetected United States Postal Service N/A
.items[].cnc.ipv4.region Related Indicator.Attribute Region .items[].dateDetected North Carolina N/A
.items[].cnc.ipv6.asn Related Indicator.Attribute ASN .items[].dateDetected N/A N/A
.items[].cnc.ipv6.city Related Indicator.Attribute City .items[].dateDetected N/A N/A
.items[].cnc.ipv6.countryCode Related Indicator.Attribute Country Code .items[].dateDetected N/A N/A
.items[].cnc.ipv6.countryName Related Indicator.Attribute Country Name .items[].dateDetected N/A N/A
.items[].cnc.ipv6.ip Related Indicator.Value IPv6 Address .items[].dateDetected N/A N/A
.items[].cnc.ipv6.provider Related Indicator.Attribute Provider .items[].dateDetected N/A N/A
.items[].cnc.ipv6.region Related Indicator.Attribute Region .items[].dateDetected N/A N/A
.items[].cnc.url Related Indicator.Value URL .items[].dateDetected http://246.119.
220.81/
N/A
.items[].evaluation.admiraltyCode Card.Attribute Admiralty Code .items[].dateDetected B3 Updatable
.items[].evaluation.credibility Card.Attribute Credibility .items[].dateDetected 50 Updatable
.items[].evaluation.reliability Card.Attribute Reliability .items[].dateDetected 80 Updatable
.items[].evaluation.severity Card.Attribute Severity .items[].dateDetected orange Updatable
.items[].evaluation.tlp Card.TLP / Related Objects.TLP N/A .items[].dateDetected red N/A
.items[].evaluation.ttl Card.Attribute Time to live (days) .items[].dateDetected 90 Updatable
.items[].malware.name Related Malware.Value N/A .items[].dateDetected Trochilus N/A
.items[].owner.address Related Identity.Attribute Address .items[].dateDetected N/A N/A
.items[].owner.birthday Related Identity.Attribute Birthday .items[].dateDetected N/A N/A
.items[].owner.city Related Identity.Attribute City .items[].dateDetected N/A N/A
.items[].owner.countryCode Related Identity.Attribute Country Code .items[].dateDetected N/A N/A
.items[].owner.email Related Identity.Attribute Email .items[].dateDetected N/A N/A
.items[].owner.name Related Identity.Attribute Name .items[].dateDetected N/A N/A
.items[].owner.passport Related Identity.Attribute Passport data .items[].dateDetected N/A N/A
.items[].owner.phone Related Identity.Attribute Phone Number .items[].dateDetected N/A N/A
.items[].owner.state Related Identity.Attribute State .items[].dateDetected N/A N/A
.items[].owner.taxNumber Related Identity.Value N/A .items[].dateDetected N/A N/A
.items[].owner.zip Related Identity.Attribute ZIP Code .items[].dateDetected N/A N/A
.items[].sourceType Card.Attribute Source Type .items[].dateDetected Phishing N/A
.items[].dateCompromised Card.Attribute Compromised Date .items[].dateDetected 2020-05-19T12:39:
15+00:00
N/A
.items[].sourceLink Card.Attribute Source Link .items[].dateDetected https://breached
.to/Thread-Selling
N/A
.items[].threatActor.name Related Adversary.Name N/A .items[].dateDetected MegaPony N/A

GroupIB Human Intelligence Threat and GroupIB APT Threat

The GroupIB Human Intelligence Threat and APT Threat feeds ingests Intrusion objects and any related Indicators, Malware, Adversaries, Attack Patterns, Identities, and Tools.

GroupIB Human Intelligence Threat
GET https://tap.group-ib.com/api/v2/hi/threat/updated

GroupIB APT Threat
GET https://tap.group-ib.com/api/v2/apt/threat/updated

Sample Response:

{
  "count": 876,
  "items": [
    {
      "contacts": [
        {
          "account": "alexjoe9983",
          "flag": "fake",
          "service": "twitter",
          "type": "social_network"
        }
      ],
      "countries": [
        "LB",
        "TR"
      ],
      "createdAt": "2021-04-13T16:49:27+03:00",
      "cveList": [
        {
          "name": "CVE-2021-27065"
        }
      ],
      "dateFirstSeen": "2019-05-01",
      "dateLastSeen": "2021-04-09",
      "datePublished": "2021-04-09",
      "description": "During the Operation",
      "displayOptions": {
        "isFavourite": false,
        "isHidden": false
      },
      "evaluation": {
        "admiraltyCode": "B2",
        "credibility": 80,
        "reliability": 80,
        "severity": "red",
        "tlp": "amber",
        "ttl": 30
      },
      "expertise": [
        "0day",
        "CVE"
      ],
      "files": [
        {
          "hash": "f1724b95fdac1541bb416bff08b209b8750e23928b58
                   68ec1ce34dad2a740dc0",
          "mime": "image/png",
          "name": "f1724b95fdac1541bb416bff08b209b8750e23928b58
                   68ec1ce34dad2a740dc0",
          "size": 75438
        }
      ],
      "forumsAccounts": [
        {
          "messageCount": 1,
          "nickname": "nobody.gu3st",
          "registeredAt": "2012-07-13",
          "url": "http://www.iranhack.com/forum/member/186-nobody-gu3st"
        }
      ],
      "id": "3bcfabae7dc7a909ca692e702a9b6ca6627528b4",
      "indicatorMalwareRelationships": [
        {
          "indicatorId": "3c157cefdeae6a8403fbfe24790467215493b939",
          "malwareId": "132130dd0aa2f2ab8cb1e358974443276b28195d"
        }
      ],
      "indicatorRelationships": [
        {
          "sourceId": "a6c970a7f082513303a0466ca459329829e00143",
          "targetId": "2d6c6dbf99261a1c84eefec1bb395e4876346a4c"
        }
      ],
      "indicatorToolRelationships": [],
      "indicators": [
        {
          "description": null,
          "id": "3b67fc483bc2c22e0f21d68eabf6385f364a1eea",
          "langs": [
            "ru"
          ],
          "malwareList": [],
          "params": {
            "hashes": {
              "md4": "",
              "md5": "113044788a356aab6c693a3e80189141",
              "md6": "",
              "ripemd160": "",
              "sha1": "ba835af7b8aa51797f95223676640be9c81dad9f",
              "sha224": "2f05477fc24bb4faefd86517156dafdecec45b8ad3cf2522
                         a563582b",
              "sha256": "0aef64991f9121a244c3f3bf7f5448bb8fb2c858bcf0ff26
                         b3b663937af9ef40",
              "sha384": "fdbd8e75a67f29f701a4e040385e2e239863
                         03ea10239211af907fcbb83578b3e41
                         7cb71ce646efd0819dd8c088de1bd",
              "sha512": "2c74fd17edafd80e8447b0d46741ee243b7eb
                         74dd2149a0ab1b9246fb30382f27e853d858571
                         9e0e67cbda0daa8f51671064615d645ae27acb1
                         5bfb1447f459b",
              "whirlpool": ""
            },
            "name": "0aef64991f9121a244c3f3bf7f5448bb8fb2c858bcf0f
                     f26b3b663937af9ef40",
            "size": null
          },
          "url": "http://strigigena.ru/cookie.php",
          "seqUpdate": 16183252904267,
          "techSeqUpdate": null,
          "title": null,
          "type": "file"
        },
        {
          "description": null,
          "id": "221f0e6b18af2cbf069131f2b7cf7e4552ae9d17",
          "langs": [
            "ru"
          ],
          "malwareList": [
            {
              "id": "132130dd0aa2f2ab8cb1e358974443276b28195d",
              "name": "SysUpdate"
            }
          ],
          "params": {
            "domain": "ns162.nsakadns.com",
            "ipv4": [
              "85.204.74.143"
            ],
            "ipv6": [
              "2001:0db8:85a3:0000:0000:8a2e:0370:7334"
            ],
            "ssl": [
              {
                "hashes": {
                  "md5": "5765fafd258a5a1e87c0582a67862675",
                  "sha1": "AB0B22AB421C001462AF4A9F382DC9284747B43D",
                  "sha224": "2f05477fc24bb4faefd86517156dafdecec45b8ad3cf2522a563582b",
                  "sha256": "ca978112ca1bbdcafac231b39a23dc4da786eff8147c4e72b9807785afee48bb",
                  "sha384": "fdbd8e75a67f29f701a4e040385e2e23986303ea1023
                             9211af907fcbb83578b3e417cb71ce646efd
                             0819dd8c088de1bd",
                  "sha512": "2c74fd17edafd80e8447b0d46741ee243b7eb
                             74dd2149a0ab1b9246fb30382f27e8
                             53d8585719e0e67cbda0daa8f51671064615d64
                             5ae27acb15bfb1447f459b"
                }
              }
            ],
            "url": ["http://strigigena.ru/cookie.php"],
            "address": "this2test.com",
            "message": {
              "body": "Body example",
              "subject": "Subject example"
            },
            "senderIp": "85.204.74.144",
            "serverIp": "85.204.74.145"
          },
          "seqUpdate": 16183273671915,
          "techSeqUpdate": null,
          "title": null,
          "type": "network"
        }
      ],
      "indicatorsIds": [
        "3b67fc483bc2c22e0f21d68eabf6385f364a1eea",
        "340ac49012b02435315f1dfca9628319b4c9dae9"
      ],
      "isTailored": false,
      "labels": [
        "campaign",
        "indicator"
      ],
      "langs": [
        "ru",
        "en"
      ],
      "malwareList": [
        {
          "id": "132130dd0aa2f2ab8cb1e358974443276b28195d",
          "name": "SysUpdate"
        }
      ],
      "mitreMatrix": [
        {
          "attackPatternId": "attack-pattern--fddd81e9-dd3d-477e-9773-4fb8ae227234",
          "attackTactic": "build-capabilities",
          "attackType": "pre_attack_tactics",
          "id": "PRE-T1122",
          "params": {
            "data": "Just a string"
          }
        }
      ],
      "oldId": "0c3429ce-c449-485d-aa02-effc62719818",
      "regions": [
        "middle_east",
        "europe",
        "asia",
        "asia"
      ],
      "relatedThreatActors": [
        {
          "id": "",
          "isAPT": "",
          "name": "actor",
          "type": "bad"
        }
      ],
      "reportNumber": "CP-2504-1649",
      "sectors": [
        "gambling",
        "government-national",
        "telecommunications",
        "energy",
        "finance"
      ],
      "seqUpdate": 16184833571103,
      "shortDescription": "This is an attack",
      "shortTitle": "Attack",
      "sources": [
        "https://www.trendmicro.com/en_us/research/21/d/iron.html"
      ],
      "targetedCompany": [
        "TargetCompany"
      ],
      "targetedPartnersAndClients": [
        "TargetPandC"
      ],
      "techSeqUpdate": null,
      "threatActor": {
        "country": "CN",
        "id": "55011fb96789bcb43c8e19e4e886924f803b6d30",
        "isAPT": true,
        "name": "IronTiger"
      },
      "title": "Discovered new toolkit",
      "toolList": [
        {
          "id": "123456789",
          "name": "Tools"
        }
      ],
      "type": "threat",
      "updatedAt": "2021-04-15T13:42:37+03:00"
    }
  ]
}

ThreatQ provides the following default mapping for these feeds:

Feed Data Path ThreatQ Entity ThreatQ Object Type or Attribute Key Published Date Examples Notes
.items[].title Intrusion Set.Value N/A .items[].createdAt 'Discovered new toolkit' N/A
.items[].dateFirstSeen Intrusion Set.Started_at N/A N/A '2019-05-01' N/A
.items[].dateLastSeen Intrusion Set.Ended_at N/A N/A '2021-04-09' N/A
.items[].description Intrusion Set.Description N/A N/A 'During the Operation' N/A
.items[].countries[] Intrusion Set.Attribute Country .items[].createdAt 'LB' N/A
.items[].evaluation.
admiraltyCode
Intrusion Set.Attribute Admiralty Code .items[].createdAt 'B2' Updatable
.items[].evaluation.
credibility
Intrusion Set.Attribute Credibility .items[].createdAt '80' Updatable
.items[].evaluation.
reliability
Intrusion Set.Attribute Reliability .items[].createdAt '80' Updatable
.items[].evaluation.
severity
Intrusion Set.Attribute Severity .items[].createdAt 'red' Updatable
.items[].evaluation.tlp Intrusion Set.TLP / Related Objects.TLP N/A N/A 'amber' N/A
.items[].evaluation.ttl Intrusion Set.Attribute Time To Live (days) .items[].createdAt '30' Updatable
.items[].expertise[] Intrusion Set.Attribute Expertise .items[].createdAt '0day' N/A
.items[].labels[] Intrusion Set.Attribute STIX labels .items[].createdAt 'campaign' N/A
.items[].langs[] Intrusion Set.Attribute Language .items[].createdAt 'ru' N/A
.items[].regions[] Intrusion Set.Attribute Regions .items[].createdAt 'middle_east' N/A
.items[].reportNumber Intrusion Set.Attribute Report Number .items[].createdAt 'CP-2504-1649' N/A
.items[].sectors[] Intrusion Set.Attribute Sector .items[].createdAt 'gambling' N/A
.items[].shortDescription Intrusion Set.Attribute Short Description .items[].createdAt 'This is an attack' N/A
.items[].shortTitle Intrusion Set.Attribute Short Title .items[].createdAt 'Attack' N/A
.items[].sources[] Intrusion Set.Attribute Source .items[].createdAt https://www.trendmicro.com/en_us/research/21/d/iron.html N/A
.items[].targeted
Company[]
Intrusion Set.Attribute Target Company .items[].createdAt 'TargetCompany' N/A
.items[].targeted
PartnersAndClients[]
Intrusion Set.Attribute Target Partner and Client .items[].createdAt 'TargetPandC' N/A
.items[].type Intrusion Set.Attribute Type .items[].createdAt 'threat' N/A
.items[].cveList[].
name
Related Indicator.Value and/or Related Vulnerability.Value CVE .items[].createdAt 'CVE-2021-27065' N/A
.items[].contacts[].
account
Related Identity.Value N/A .items[].createdAt 'alexjoe9983' N/A
.items[].contacts[].
flag
Related Identity.Attribute Contact Flag .items[].createdAt 'fake' N/A
.items[].contacts[].
service
Related Identity.Attribute Contact Service .items[].createdAt 'twitter' N/A
.items[].contacts[].
type
Related Identity.Attribute Contact Type .items[].createdAt 'social_network' N/A
.items[].files[].hash Related Indicator.Value SHA-256 .items[].createdAt 'f1724b95fdac1541b
b416bff08b209b875
0e23928b5868ec1ce
34dad2a740dc0'
N/A
.items[].files[].mime Related Indicator.Attribute File Mime Type .items[].createdAt 'image/png' N/A
.items[].files[].name Related Indicator.Attribute File Name .items[].createdAt 'f1724b95fdac1541bb
416bff08b209b8750e
23928b5868ec1ce34d
ad2a740dc0'
N/A
.items[].files[].size Related Indicator.Attribute File Size .items[].createdAt '75438' N/A
.items[].forums
Accounts[].url
Related Indicator.Value URL .items[].createdAt http://www.iranhack.com/forum/member/186-nobody-gu3st If a URL Indicator attempting to be consumed is a true FQDN, the API normalize it to be an FQDN Indicator
.items[].forums
Accounts[].
nickname
Related Indicator.Attribute Forum Account Nickname .items[].createdAt 'nobody.gu3st' N/A
.items[].indicators[]
.malwareList[].name
Related Malware.Value N/A .items[].createdAt "SysUpdate" N/A
.items[].indicators[]
.params.domain
Related Indicator.Value FQDN .items[].createdAt 'ns162.nsakadns.com' N/A
.items[].indicators[]
.params.ipv4[]
Related Indicator.Value IP Address .items[].createdAt '85.204.74.143' N/A
.items[].indicators[]
.params.ipv6[]
Related Indicator.Value IPv6 Address .items[].createdAt '2001:0db8:85a3:0000:
0000:8a2e:0370:7334'
N/A
.items[].indicators[]
.params.ssl[].hashes
.md5
Related Indicator.Value MD5 .items[].createdAt '5765fafd258a5a1e87c
0582a67862675'
N/A
.items[].indicators[]
.params.ssl[].hashes
.sha1
Related Indicator.Value SHA-1 .items[].createdAt 'AB0B22AB421C001462A
F4A9F382DC9284747B43D'
N/A
.items[].indicators[]
.params.ssl[].hashes
.sha256
Related Indicator.Value SHA-256 .items[].createdAt 'ca978112ca1bbdcafac231
b39a23dc4da786eff8147c
4e72b9807785afee48bb'
N/A
.items[].indicators[]
.params.ssl[].hashes
.sha384
Related Indicator.Value SHA-384 .items[].createdAt 'fdbd8e75a67f29f701a4e04
0385e2e23986303ea10239
211af907fcbb83578b3e417
cb71ce646efd0819dd8c088
de1bd'
N/A
.items[].indicators[]
.params.ssl[].hashes
.sha512
Related Indicator.Value SHA-512 .items[].createdAt '2c74fd17edafd80e8447b0d
46741ee243b7eb74dd2149a
0ab1b9246fb30382f27e853d
8585719e0e67cbda0daa8f51
671064615d645ae27acb15bf
b1447f459b'
N/A
.items[].indicators[]
.params.url
Related Indicator.Value URL .items[].createdAt http://strigigena.ru/cookie.php If a URL Indicator attempting to be consumed is a true FQDN, the API normalize it to be an FQDN Indicator
.items[].indicators[]
.params.address
Related Indicator.Value Email Address .items[].createdAt 'this2test.com' N/A
.items[].indicators[]
.params.message.body
Related Indicator.Attribute Email Body .items[].createdAt 'Body example' N/A
.items[].indicators[]
.params.message.subject
Related Indicator.Attribute Email Subject .items[].createdAt 'Subject example' N/A
.items[].indicators[]
.params.senderIp
Related Indicator.Value IP Address .items[].createdAt '85.204.74.144' N/A
.items[].indicators[]
.params.serverIp
Related Indicator.Value IP Address .items[].createdAt '85.204.74.145' N/A
.items[].indicators[]
.params.hashes.md5
Related Indicator.Value MD5 .items[].createdAt '113044788a356aab6c
693a3e80189141'
N/A
.items[].indicators[]
.params.hashes.sha1
Related Indicator.Value SHA-1 .items[].createdAt 'ba835af7b8aa51797f9
5223676640be9c81dad9f'
N/A
.items[].indicators[]
.params.hashes.sha256
Related Indicator.Value SHA-256 .items[].createdAt '0aef64991f9121a244c3f3b
f7f5448bb8fb2c858bcf0ff26
b3b663937af9ef40'
N/A
.items[].indicators[]
.params.hashes.sha384
Related Indicator.Value SHA-384 .items[].createdAt 'fdbd8e75a67f29f701a4e040
385e2e23986303ea1023921
1af907fcbb83578b3e417cb7
1ce646efd0819dd8c088de1bd'
N/A
.items[].indicators[]
.params.hashes.sha512
Related Indicator.Value SHA-512 .items[].createdAt '2c74fd17edafd80e8447b0d46
741ee243b7eb74dd2149a0ab
1b9246fb30382f27e853d85857
19e0e67cbda0daa8f516710646
15d645ae27acb15bfb1447f459b'
N/A
.items[].malwareList[]
.name
Related Malware.Value N/A .items[].createdAt 'SysUpdate' N/A
.items[].mitreMatrix[]
.id
Related Attack Attack Pattern .items[].createdAt 'attack-pattern--fddd81e9-dd3d-477e-9773-4fb8ae227234' N/A
.items[].mitreMatrix[]
.attackTactic
Related Attack.Attribute Attack Tactic .items[].createdAt 'build-capabilities' N/A
.items[].mitreMatrix[]
.attackType
Related Attack.Attribute Attack Type .items[].createdAt 'pre_attack_tactics' N/A
.items[].mitreMatrix[]
.params.data
Related Attack.Attribute Attack Data .items[].createdAt 'Just a string' N/A
.items[].relatedThreat
Actors[].name
Related Adversary.Name N/A .items[].createdAt 'actor' N/A
.items[].relatedThreat
Actors[].type
Related Adversary.Attribute Type .items[].createdAt 'bad' N/A
.items[].threatActor.
name
Related Adversary.Name N/A .items[].createdAt 'IronTiger' N/A
.items[].threatActor.
country
Related Adversary.Attribute Country .items[].createdAt 'CN' N/A
.items[].toolList[].name Related Tool N/A .items[].createdAt 'Tools' N/A

GroupIB Human Intelligence Threat Actor and GroupIB APT Threat Actor

The GroupIB Human Intelligence Threat Actor and APT Threat Actor feeds ingest Adversary objects and any related Indicators and Reports.

GroupIB Human Intelligence Threat Actor
GET https://tap.group-ib.com/api/v2/hi/threat_actor/updated

GroupIB APT Threat Actor
GET https://tap.group-ib.com/api/v2/apt/threat_actor/updated 

Sample Response:

{
  "count": 242,
  "items": [
    {
      "aliases": [
        "a.m.i.g.o.s",
        "AMIGOS0",
        "AMIGOS",
        "A.M.I.G.O.S",
        "Amigos",
        "amigos0"
      ],
      "country": "RU",
      "createdAt": "2019-02-20T17:44:21+00:00",
      "description": "<figure class=\"image\"><img src=\"/api/v2/hi/threat_actor/",
      "displayOptions": {
        "isFavourite": false,
        "isHidden": false
      },
      "files": [
        {
          "hash": "74e83fabf0733838bc9398b793f5295057ccd75821b9f8be594f6851d1464dc2",
          "mime": "image/png",
          "name": "74e83fabf0733838bc9398b793f5295057ccd75821b9f8be594f6851d1464dc2",
          "size": 216937
        }
      ],
      "goals": [
        "Goal"
      ],
      "id": "bceee15371a475e59676d6cd1102048f139e50cb",
      "isAPT": false,
      "labels": [
        "hacker"
      ],
      "langs": [
        "en"
      ],
      "name": "Amigos",
      "oldId": null,
      "roles": [
          "agent"
      ],
      "seqUpdate": 16184067437615,
      "spokenOnLangs": [
        "en",
        "ru"
      ],
      "stat": {
        "countries": [
            "RU"
        ],
        "dateFirstSeen": "2021-10-24",
        "dateLastSeen": "2021-10-24",
        "regions": [
            "europe",
            "america:northern_america",
            "asia"
        ],
        "reports": [
          {
            "datePublished": "2021-01-05",
            "id": "9ffb44adf43abaaeea1f36c9d2a5adef38ba19e8",
            "name": {
              "en": "First mention on forums"
            }
          }
        ],
        "sectors": [
            "financial-services",
            "finance",
            "technology"
        ],
        "targetedCompany": [
          "Datagroup"
        ],
        "targetedPartnersAndClients": []
      },
      "techSeqUpdate": null,
      "updatedAt": "2021-04-14T16:25:43+03:00"
    }
  ]
}

ThreatQ provides the following default mapping for these feeds:

Feed Data Path ThreatQ Entity ThreatQ Object Type or Attribute Key Published Date Examples Notes
.items[].name Adversary.Name N/A .items[].createdAt 'Amigos' N/A
.items[].aliases[] Adversary.Tag N/A .items[].createdAt 'a.m.i.g.o.s' N/A
.items[].description Adversary.Description N/A .items[].createdAt '<figure class=\"image\">' N/A
.items[].country Adversary.Attribute Country .items[].createdAt 'RU' N/A
.items[].goals[] Adversary.Attribute Goal .items[].createdAt 'Goal' N/A
.items[].labels[] Adversary.Attribute Label .items[].createdAt 'hacker' N/A
.items[].langs[] Adversary.Attribute Language .items[].createdAt 'en' N/A
.items[].roles[] Adversary.Attribute Role .items[].createdAt 'agent' N/A
.items[].spokenOnLangs[] Adversary.Attribute Language .items[].createdAt 'ru' N/A
.items[].stat.countries[] Adversary.Attribute Country .items[].createdAt 'RU' N/A
.items[].stat.dateFirstSeen Adversary.Attribute Date First Seen .items[].createdAt '2021-10-24' N/A
.items[].stat.regions[] Adversary.Attribute Region .items[].createdAt 'europe' N/A
.items[].stat.sectors[] Adversary.Attribute Sector .items[].createdAt 'financial-services' N/A
.items[].stat.targetedCompany[] Adversary.Attribute Targeted Company .items[].createdAt 'Datagroup' N/A
.items[].files[].hash Related Indicator.Value SHA-256 .items[].createdAt '74e83fabf0733838bc9398
b793f5295057ccd75821b9
f8be594f6851d1464dc2'
N/A
.items[].files[].mime Related Indicator.Attribute File Mime Type .items[].createdAt 'image/png' N/A
.items[].files[].name Related Indicator.Attribute File Name .items[].createdAt '74e83fabf0733838bc9398
b793f5295057ccd75821b9
f8be594f6851d1464dc2'
N/A
.items[].files[].size Related Indicator.Attribute File Size .items[].createdAt '216937' N/A
.items[].stat.reports[].name.en Related Intrusion Set N/A .items[].createdAt/ .items[].stat.reports[].
datePublished
'First mention on forums' If .items[].stat.reports[].datePublished it's null we use the value of .items[].createdAt

GroupIB Malware C2

The GroupIB Malware C2 feed ingests Indicators, Malware, and Adversaries.

GET https://tap.group-ib.com/api/v2/malware/cnc/updated

Sample Response:

{
  "count": 22000,
  "items": [
    {
      "cnc": "http://128.199.23.9/uadmin/gate.php",
      "dateDetected": "2021-04-16T07:15:50+00:00",
      "dateLastSeen": "2021-04-16T07:15:50+00:00",
      "domain": "www.0983212l.link",
      "file": [
        {
          "hashes": {
            "md4": "",
            "md5": "5765fafd258a5a1e87c0582a67862675",
            "md6": "",
            "ripemd160": "",
            "sha1": "ba835af7b8aa51797f95223676640be9c81dad9f",
            "sha224": "",
            "sha256": "0aef64991f9121a244c3f3bf7f5448bb8fb2c858bcf0ff26b
                       3b663937af9ef40",
            "sha384": "fdbd8e75a67f29f701a4e040385e2e23
                       986303ea10239211af907fcbb83578
                       b3e417cb71ce646efd0819dd8c088de1bd",
            "sha512":"2c74fd17edafd80e8447b0d46741ee243b7eb74dd2149a0ab1b9246f
b30382f27e853d8585719e0e67cbda0daa8f5167 
1064615d645ae27acb15bfb1447f459b"
          }
        }
      ],
      "id": "4fb5bbcaa61e77d5024b0f02256d3b78339606ef",
      "ipv4": [
        {
          "asn": "AS16276 OVH SAS",
          "city": "Singapore",
          "countryCode": "SG",
          "countryName": "Singapore",
          "ip": "128.199.23.9",
          "provider": "DigitalOcean",
          "region": "Central"
        }
      ],
      "ipv6": [
        {
          "asn": "AS16276 OVH SAS",
          "city": "Singapore",
          "countryCode": "SG",
          "countryName": "Singapore",
          "ip": "2001:0db8:85a3:0000:0000:8a2e:0370:7334",
          "provider": "DigitalOcean",
          "region": "Central"
        }
      ],
      "isFavourite": false,
      "isHidden": false,
      "malwareList": [
        {
          "id": "f9983dbd202159e87ca7ab517d1ca4b08aed542a",
          "name": "U-Admin"
        }
      ],
      "oldId": "448197320",
      "platform": null,
      "seqUpdate": 1622322902077,
      "ssl": [],
      "threatActor": {
        "country": "CN",
        "id": "55011fb96789bcb43c8e19e4e886924f803b6d30",
        "isAPT": true,
        "name": "IronTiger"
      },
      "url": "http://128.199.23.9/uadmin/gate.php"
    }
  ]
}

ThreatQ provides the following default mapping for these feeds:

Feed Data Path ThreatQ Entity ThreatQ Object Type or Attribute Key Published Date Examples Notes
.items[].cnc Related Indicator.Value FQDN .items[].dateDetected http://128.199.23.9/uadmin/gate.php N/A
.items[].domain Related Indicator.Value FQDN .items[].dateDetected 'www.0983212l.link' N/A
.items[].file[].hashes.md5 Related Indicator.Value MD5 .items[].dateDetected '5765fafd258a5a1e87
c0582a67862675'
N/A
.items[].file[].hashes.sha1 Related Indicator.Value SHA-1 .items[].dateDetected 'ba835af7b8aa51797f9
5223676640be9c81da
d9f'
N/A
.items[].file[].hashes.sha256 Related Indicator.Value SHA-256 .items[].dateDetected '0aef64991f9121a244c3
f3bf7f5448bb8fb2c858bc
f0ff26b3b663937af9ef40'
N/A
.items[].file[].hashes.sha384 Related Indicator.Value SHA-384 .items[].dateDetected 'fdbd8e75a67f29f701a4e
040385e2e23986303ea10
239211af907fcbb83578b3
e417cb71ce646efd0819dd
8c088de1bd'
N/A
.items[].file[].hashes.sha512 Related Indicator.Value SHA-512 .items[].dateDetected '2c74fd17edafd80e8447b0
d46741ee243b7eb74dd214
9a0ab1b9246fb30382f27e8
53d8585719e0e67cbda0daa
8f51671064615d645ae27acb
15bfb1447f459b'
N/A
.items[].ipv4[].ip Related Indicator.Value IP Address .items[].dateDetected '128.199.23.9' N/A
.items[].ipv4[].asn Related Indicator.Attribute ASN .items[].dateDetected 'AS16276 OVH SAS' N/A
.items[].ipv4[].city Related Indicator.Attribute City .items[].dateDetected 'Singapore' N/A
.items[].ipv4[].countryCode Related Indicator.Attribute Country Code .items[].dateDetected 'SG' N/A
.items[].ipv4[].countryName Related Indicator.Attribute Country Name .items[].dateDetected 'Singapore' N/A
.items[].ipv4[].provider Related Indicator.Attribute Provider .items[].dateDetected 'DigitalOcean' N/A
.items[].ipv4[].region Related Indicator.Attribute Region .items[].dateDetected 'Central' N/A
.items[].ipv6[].ip Related Indicator.Value IPv6 Address .items[].dateDetected '2001:0db8:85a3:0000:
0000:8a2e:0370:7334'
N/A
.items[].ipv6[].asn Related Indicator.Attribute ASN .items[].dateDetected 'AS16276 OVH SAS' N/A
.items[].ipv6[].city Related Indicator.Attribute City .items[].dateDetected 'Singapore' N/A
.items[].ipv6[].countryCode Related Indicator.Attribute Country Code .items[].dateDetected 'SG' N/A
.items[].ipv6[].countryName Related Indicator.Attribute Country Name .items[].dateDetected 'Singapore' N/A
.items[].ipv6[].provider Related Indicator.Attribute Provider .items[].dateDetected 'DigitalOcean' N/A
.items[].ipv6[].region Related Indicator.Attribute Region .items[].dateDetected 'Central' N/A
.items[].malwareList[].name Related Malware.Value N/A .items[].dateDetected 'U-Admin' N/A
.items[].threatActor.name Related Adversary.Name N/A .items[].dateDetected 'IronTiger' N/A
.items[].threatActor.country Related Adversary.Attribute Country .items[].dateDetected 'CN' N/A
.items[].url Related Indicator.Value URL .items[].dateDetected http://128.199.23.9/uadmin/gate.php If a URL Indicator attempting to be consumed is a true FQDN, the API normalize it to be an FQDN Indicator

GroupIB Malware Configs

The GroupIB Malware Configs feed ingests Indicators and Malware.

GET https://tap.group-ib.com/api/v2/malware/config/updated

Sample Response:

{
  "count": 2000,
  "items": [
    {
        "configSummary": null,
        "content": "LockBit 2.0 Ransomware...",
        "contentLen": 512,
        "dateFirstSeen": "2023-04-27",
        "dateLastSeen": "2023-04-27",
        "domainList": [],
        "file": [
            {
                "md5": "9bfcf1adb9cbcefe33d6077f02fc4a91",
                "name": "vtdl_85dg97ui",
                "sha1": "0ddf7e2c44fc7b9df73b56c0c081e082d7249f33",
                "sha256": "5df9c5633ff349ce87964b23ca33cd7548e57adcdb585a4234dc789e658f9d2f",
                "timestamp": "2023-04-27T03:21:09+00:00"
            }
        ],
        "hash": "433d976b1a7fbd76193c583d150d75ed74dbe04c",
        "id": "433d976b1a7fbd76193c583d150d75ed74dbe04c",
        "ipList": [],
        "malware": {
            "id": "01b0e643235e668704b92833a23224e4c64434e4",
            "name": "Lockbit"
        },
        "malwareId": "01b0e643235e668704b92833a23224e4c64434e4",
        "seqUpdate": 16825684080671
    }
  ]
}

ThreatQ provides the following default mapping for this feed:

Feed Data Path ThreatQ Entity ThreatQ Object Type or Attribute Key Published Date Examples Notes
.items[].malware.name Malware.Value N/A .items[].dateFirstSeen 'Lockbit' N/A
.items[].content Malware.Description N/A .items[].dateFirstSeen 'LockBit 2.0 Ransomware... ' The content was truncated
.items[].hash Related Indicator.Value SHA-1 .items[].dateFirstSeen '433d976b1a7fbd76193c583
d150d75ed74dbe04c'
N/A
.items[].file.md5 Related Indicator.Value MD5 .items[].dateFirstSeen '9bfcf1adb9cbcefe33d6077f0
2fc4a91'
N/A
.items[].file.sha1 Related Indicator.Value SHA-1 .items[].dateFirstSeen '0ddf7e2c44fc7b9df73b56c0c
081e082d7249f33'
N/A
.items[].file.sha256 Related Indicator.Value SHA-256 .items[].dateFirstSeen '5df9c5633ff349ce87964b23ca
33cd7548e57adcdb585a4234d
c789e658f9d2f'
N/A
.items[].file.name Related Indicator.Attribute File name .items[].dateFirstSeen 'vtdl_85dg97ui' N/A

GroupIB Suspicious IP Tor Node, GroupIB Suspicious IP Open Proxy and GroupIB Suspicious IP Socks Proxy

These feeds ingests Indicators objects.

GroupIB Suspicious IP Tor Node
GET https://tap.group-ib.com/api/v2/suspicious_ip/tor_node/updated

GroupIB Suspicious IP Open Proxy
GET https://tap.group-ib.com/api/v2/suspicious_ip/open_proxy/updated

GroupIB Suspicious IP Socks Proxy
GET https://tap.group-ib.com/api/v2/suspicious_ip/socks_proxy/updated

Sample Response:

{
  "count": 132912,
  "items": [
    {
      "dateFirstSeen": "2020-05-27T14:57:33+00:00",
      "dateLastSeen": "2021-04-15T15:31:43+00:00",
      "evaluation": {
        "admiraltyCode": "A1",
        "credibility": 90,
        "reliability": 90,
        "severity": "green",
        "tlp": "green",
        "ttl": 30
      },
      "id": "199.249.230.184",
      "ipv4": {
        "asn": "AS16276 OVH SAS",
        "city": "Singapore",
        "countryCode": "SG",
        "countryName": "Singapore",
        "ip": "128.199.23.10",
        "provider": "DigitalOcean",
        "region": "Central"
      },
      "nodes": [],
      "portalLink": "https://tap.group-ib.com/suspicious/tor?
       searchValue=id:199.249.230.184",
      "seqUpdate": 16182431110000,
      "source": "check.torproject.org",
      "port": "80",
      "type": "http"
    }
  ]
}

ThreatQ provides the following default mapping for these feeds:

Feed Data Path ThreatQ Entity ThreatQ Object Type or Attribute Key Published Date Examples Notes
.items[].ipv4.ip Indicator.Value IP Address .items[].dateFirstSeen '128.199.23.10' N/A
.items[].ipv4.asn Indicator.Attribute ASN .items[].dateFirstSeen 'AS16276 OVH SAS' N/A
.items[].ipv4.city Indicator.Attribute City .items[].dateFirstSeen 'Singapore' N/A
.items[].ipv4.countryCode Indicator.Attribute Country Code .items[].dateFirstSeen 'SG' N/A
.items[].ipv4.countryName Indicator.Attribute Country Name .items[].dateFirstSeen 'Singapore' N/A
.items[].ipv4.provider Indicator.Attribute Provider .items[].dateFirstSeen 'DigitalOcean' N/A
.items[].ipv4.region Indicator.Attribute Region .items[].dateFirstSeen 'Central' N/A
.items[].evaluation.admiraltyCode Indicator.Attribute Admiralty Code .items[].dateFirstSeen 'B2' Updatable
.items[].evaluation.credibility Indicator.Attribute Credibility .items[].dateFirstSeen '80' Updatable
.items[].evaluation.reliability Indicator.Attribute Reliability .items[].dateFirstSeen '80' Updatable
.items[].evaluation.severity Indicator.Attribute Severity .items[].dateFirstSeen 'red' Updatable
.items[].evaluation.tlp Indicator.TLP N/A .items[].dateFirstSeen 'amber' N/A
.items[].evaluation.ttl Indicator.Attribute Time To Live (days) .items[].dateFirstSeen '30' Updatable
.items[].portalLink Indicator.Attribute Portal Link .items[].dateFirstSeen https://tap.group-ib.com/suspicious/tor?searchValue=id:199.249.230.184 N/A
.items[].source Indicator.Attribute Source .items[].dateFirstSeen 'check.torproject.org' N/A
.items[].type Indicator.Attribute Proxy Type .items[].dateFirstSeen 'http' N/A
.items[].port Indicator.Attribute Port .items[].dateFirstSeen '80' N/A

GroupIB Suspicious IP Scanners

The GroupIB Suspicious IP Scanners feed ingests Indicators objects.

GET https://tap.group-ib.com/api/v2/suspicious_ip/scanner/updated

Sample Response:

{
  "count": 132912,
  "items": [
    {
      "categories": [
        "Hacking",
        "FTP Brute-Force"
      ],
      "dateFirstSeen": "2020-05-27T14:57:33+00:00",
      "dateLastSeen": "2021-04-15T15:31:43+00:00",
      "evaluation": {
        "admiraltyCode": "A1",
        "credibility": 90,
        "reliability": 90,
        "severity": "green",
        "tlp": "green",
        "ttl": 30
      },
      "id": "134.209.127.189",
      "ipv4": {
        "asn": "AS16276 OVH SAS",
        "city": "Singapore",
        "countryCode": "SG",
        "countryName": "Singapore",
        "ip": "134.209.127.189",
        "provider": "DigitalOcean",
        "region": "Central"
      },
      "portalLink": null,
      "seqUpdate": 16182431110000,
      "sources": [
        "AbuseIPDB",
        "GIB-HoneyPot"
      ]
    }
  ]
}

ThreatQ provides the following default mapping for this feed:

Feed Data Path ThreatQ Entity ThreatQ Object Type or Attribute Key Published Date Examples Notes
.items[].ipv4.ip Indicator.Value IP Address .items[].dateFirstSeen '134.209.127.189' N/A
.items[].categories Indicator.Tags N/A .items[].dateFirstSeen 'Hacking, FTP Brute-Force' N/A
.items[].ipv4.asn Indicator.Attribute ASN .items[].dateFirstSeen 'AS16276 OVH SAS' N/A
.items[].ipv4.city Indicator.Attribute City .items[].dateFirstSeen 'Singapore' N/A
.items[].ipv4.countryCode Indicator.Attribute Country Code .items[].dateFirstSeen 'SG' N/A
.items[].ipv4.countryName Indicator.Attribute Country Name .items[].dateFirstSeen 'Singapore' N/A
.items[].ipv4.provider Indicator.Attribute Provider .items[].dateFirstSeen 'DigitalOcean' N/A
.items[].ipv4.region Indicator.Attribute Region .items[].dateFirstSeen 'Central' N/A
.items[].evaluation.admiraltyCode Indicator.Attribute Admiralty Code .items[].dateFirstSeen 'B2' Updatable
.items[].evaluation.credibility Indicator.Attribute Credibility .items[].dateFirstSeen '80' Updatable
.items[].evaluation.reliability Indicator.Attribute Reliability .items[].dateFirstSeen '80' Updatable
.items[].evaluation.severity Indicator.Attribute Severity .items[].dateFirstSeen 'red' Updatable
.items[].evaluation.tlp Indicator.TLP N/A .items[].dateFirstSeen 'amber' N/A
.items[].evaluation.ttl Indicator.Attribute Time To Live (days) .items[].dateFirstSeen '30' Updatable
.items[].portalLink Indicator.Attribute Portal Link .items[].dateFirstSeen N/A N/A
.items[].sources Indicator.Attribute Source .items[].dateFirstSeen 'AbuseIPDB' N/A

GroupIB Suspicious IP VPN

The GroupIB Suspicious IP VPN feed ingests Indicators objects.

GET https://tap.group-ib.com/api/v2/suspicious_ip/vpn/updated

Sample Response:

{
  "count": 132912,
  "items": [
    {
      "dateFirstSeen": "2020-05-27T14:57:33+00:00",
      "dateLastSeen": "2021-04-15T15:31:43+00:00",
      "evaluation": {
        "admiraltyCode": "A1",
        "credibility": 90,
        "reliability": 90,
        "severity": "green",
        "tlp": "green",
        "ttl": 30
      },
      "id": "66.235.168.192",
      "ipv4": {
        "asn": "AS16276 OVH SAS",
        "city": "Singapore",
        "countryCode": "SG",
        "countryName": "Singapore",
        "ip": "66.235.168.192",
        "provider": "DigitalOcean",
        "region": "Central"
      },
      "names": [
        "Pulse Connect Secure"
      ],
      "portalLink": null,
      "rules": [
        "Pulse Connect Secure VPN"
      ],
      "seqUpdate": 16182431110000,
      "sources": [
        "playbook"
      ],
      "types": [
        "public"
      ]
    }
  ]
}

ThreatQ provides the following default mapping for this feed:

Feed Data Path ThreatQ Entity ThreatQ Object Type or Attribute Key Published Date Examples Notes
.items[].ipv4.ip Indicator.Value IP Address .items[].dateFirstSeen '66.235.168.192' N/A
.items[].types Indicator.Tags N/A .items[].dateFirstSeen 'public' N/A
.items[].ipv4.asn Indicator.Attribute ASN .items[].dateFirstSeen 'AS16276 OVH SAS' N/A
.items[].ipv4.city Indicator.Attribute City .items[].dateFirstSeen 'Singapore' N/A
.items[].ipv4.countryCode Indicator.Attribute Country Code .items[].dateFirstSeen 'SG' N/A
.items[].ipv4.countryName Indicator.Attribute Country Name .items[].dateFirstSeen 'Singapore' N/A
.items[].ipv4.provider Indicator.Attribute Provider .items[].dateFirstSeen 'DigitalOcean' N/A
.items[].ipv4.region Indicator.Attribute Region .items[].dateFirstSeen 'Central' N/A
.items[].evaluation.admiraltyCode Indicator.Attribute Admiralty Code .items[].dateFirstSeen 'B2' Updatable
.items[].evaluation.credibility Indicator.Attribute Credibility .items[].dateFirstSeen '80' Updatable
.items[].evaluation.reliability Indicator.Attribute Reliability .items[].dateFirstSeen '80' Updatable
.items[].evaluation.severity Indicator.Attribute Severity .items[].dateFirstSeen 'red' Updatable
.items[].evaluation.tlp Indicator.TLP N/A .items[].dateFirstSeen 'amber' N/A
.items[].evaluation.ttl Indicator.Attribute Time To Live (days) .items[].dateFirstSeen '30' Updatable
.items[].portalLink Indicator.Attribute Portal Link .items[].dateFirstSeen N/A N/A
.items[].sources Indicator.Attribute Source .items[].dateFirstSeen 'AbuseIPDB' N/A
.items[].names Indicator.Attribute Name .items[].dateFirstSeen 'Pulse Connect Secure' N/A
.items[].rules Indicator.Attribute Rule .items[].dateFirstSeen 'Pulse Connect Secure VPN' N/A

GroupIB Attacks DDoS

The GroupIB Attacks DDoS feed ingests Indicators objects.

GET https://tap.group-ib.com/api/v2/attacks/ddos/updated

Sample Response:

{
    "count": 100,
    "items": [
        {
            "cnc": {
                "cnc": "peacecorps.gov",
                "domain": "peacecorps.gov",
                "ipv4": {
                    "asn": "AS14618 Amazon.com, Inc.",
                    "city": "Ashburn",
                    "countryCode": "US",
                    "countryName": "United States",
                    "ip": "52.202.206.232",
                    "provider": "Amazon.com",
                    "region": "Virginia"
                },
                "ipv6": null,
                "url": null
            },
            "dateBegin": "2019-03-11T06:58:51+00:00",
            "dateEnd": "2019-03-11T06:58:51+00:00",
            "dateReg": "2019-03-11",
            "evaluation": {
                "admiraltyCode": "A2",
                "credibility": 90,
                "reliability": 90,
                "severity": "red",
                "tlp": "green",
                "ttl": 30
            },
            "id": "3411bdc00c4f7ab43723f30205c31a20e183acf3",
            "isFavourite": false,
            "isHidden": false,
            "malware": {
                "id": "3e9e68a2f267f45f970ee84ff5dac37d05761f69",
                "name": "Bootnet"
            },
            "messageLink": null,
            "oldId": "222",
            "portalLink": "https://tap-demo.group-ib.com/attacks/ddos?searchValue=id:3411bdc00c4f7ab43723f30205c31a20e183acf3",
            "protocol": "udp",
            "seqUpdate": 0,
            "target": {
                "ipv4": {
                    "asn": "AS3223 Voxility S.R.L.",
                    "city": "London",
                    "countryCode": "GB",
                    "countryName": "United Kingdom",
                    "ip": "185.82.99.18",
                    "provider": "Net 360 S.a.r.l",
                    "region": "London, City of"
                },
                "url": "brot.net",
                "category": null,
                "domainsCount": 3,
                "port": 10913,
                "domain": null
            },
            "threatActor": null,
            "type": "DNS Reflection"
        }
    ]
}

ThreatQ provides the following default mapping for these feeds:

Feed Data Path ThreatQ Entity ThreatQ Object Type or Attribute Key Published Date Examples  
.items[].cnc.cnc Indicator.Value FQDN .items[].dateBegin peacecorps.gov N/A
.items[].cnc.domain Indicator.Value FQDN .items[].dateBegin peacecorps.gov N/A
.items[].cnc.ipv4.asn Indicator.Attribute ASN .items[].dateBegin AS14618 Amazon.com, Inc. N/A
.items[].cnc.ipv4.city Indicator.Attribute City .items[].dateBegin Ashburn N/A
.items[].cnc.ipv4.countryCode Indicator.Attribute Country Code .items[].dateBegin US N/A
.items[].cnc.ipv4.countryName Indicator.Attribute Country Name .items[].dateBegin United States N/A
.items[].cnc.ipv4.ip Indicator.Value IP Address .items[].dateBegin 52.202.206.232 N/A
.items[].cnc.ipv4.provider Indicator.Attribute Provider .items[].dateBegin Amazon.com N/A
.items[].cnc.ipv4.region Indicator.Attribute Region .items[].dateBegin Virginia N/A
.items[].cnc.ipv6.asn Indicator.Attribute ASN .items[].dateBegin N/A N/A
.items[].cnc.ipv6.city Indicator.Attribute City .items[].dateBegin N/A N/A
.items[].cnc.ipv6.countryCode Indicator.Attribute Country Code .items[].dateBegin N/A N/A
.items[].cnc.ipv6.countryName Indicator.Attribute Country Name .items[].dateBegin N/A N/A
.items[].cnc.ipv6.ip Indicator.Value IPv6 Address .items[].dateBegin N/A N/A
.items[].cnc.ipv6.provider Indicator.Attribute Provider .items[].dateBegin N/A N/A
.items[].cnc.ipv6.region Indicator.Attribute Region .items[].dateBegin N/A N/A
.items[].cnc.url Related Indicator.Value URL .items[].dateBegin N/A N/A
.items[].evaluation.admiraltyCode Indicator/Malware/
Adversary.Attribute
Admiralty Code .items[].dateBegin A2 Updatable
.items[].evaluation.credibility Indicator/Malware/
Adversary.Attribute
Credibility .items[].dateBegin 90 Updatable
.items[].evaluation.reliability Indicator/Malware/
Adversary.Attribute
Reliability .items[].dateBegin 90 Updatable
.items[].evaluation.severity Indicator/Malware/
Adversary.Attribute
Severity .items[].dateBegin red Updatable
.items[].evaluation.tlp Indicator/Malware/
Adversary.TLP
Traffic Light Protocol .items[].dateBegin green N/A
.items[].evaluation.ttl Indicator/Malware/
Adversary.Attribute
Time to live (days) .items[].dateBegin 30 Updatable
.items[].malware.name Malware.Value N/A .items[].dateBegin Bootnet N/A
.items[].messageLink Indicator/Malware/
Adversary.Attribute
Message Link .items[].dateBegin N/A N/A
.items[].portalLink Indicator/Malware/
Adversary.Attribute
Source Link .items[].dateBegin https://tap.group-ib.com/attacks/ddos?searchValue=id:053e63f81d0e1ebef83b0d3a5cbfebbe1a2b28a7 N/A
.items[].protocol Indicator/Malware/
Adversary.Attribute
Protocol .items[].dateBegin udp N/A
.items[].target.ipv4.asn Related Indicator.Attribute ASN .items[].dateBegin AS3223 Voxility S.R.L. N/A
.items[].target.ipv4.city Related Indicator.Attribute City .items[].dateBegin London N/A
.items[].target.ipv4.countryCode Related Indicator.Attribute Country Code .items[].dateBegin GB N/A
.items[].target.ipv4.countryName Related Indicator.Attribute Country Name .items[].dateBegin United Kingdom N/A
.items[].target.ipv4.ip Related Indicator.Value IP Address .items[].dateBegin 185.82.99.18 N/A
.items[].target.ipv4.provider Related Indicator.Attribute Provider .items[].dateBegin Net 360 S.a.r.l N/A
.items[].target.ipv4.region Related Indicator.Attribute Region .items[].dateBegin London, City of N/A
.items[].target.url Indicator.Value URL .items[].dateBegin brot.net N/A
.items[].target.category Indicator/Malware/
Adversary.Attribute
Category .items[].dateBegin N/A N/A
.items[].target.port Indicator/Malware/
Adversary.Attribute
Port .items[].dateBegin 10913 N/A
.items[].target.domain Indicator.Value FQDN .items[].dateBegin N/A N/A
.items[].threatActor.name Adversary.Value N/A .items[].dateBegin N/A N/A
.items[].type Indicator/Malware/
Adversary.Attribute
Type .items[].dateBegin DNS Reflection N/A

GroupIB Attacks Deface

The GroupIB Attacks Deface feed ingests Indicators objects and related Adversaries.

GET https://tap.group-ib.com/api/v2/attacks/deface/updated

Sample Response:

{
    "count": 100,
    "items": [
        {
            "contacts": [],
            "date": "2023-05-10T11:17:43+00:00",
            "evaluation": {
                "admiraltyCode": "B2",
                "credibility": 80,
                "reliability": 80,
                "severity": "orange",
                "tlp": "amber",
                "ttl": 30
            },
            "id": "645b7fe87400cb001883f9b2",
            "portalLink": "https://tap.group-ib.com/attacks/deface?searchValue=id:645b7fe87400cb001883f9b2",
            "seqUpdate": 1683718118053866,
            "source": "www.zone-h.org",
            "targetDomain": "mandrill.steelcoat.co.in",
            "targetDomainProvider": null,
            "targetIp": {
                "asn": null,
                "city": "Scottsdale",
                "countryCode": null,
                "countryName": "United States",
                "ip": "184.168.108.77",
                "provider": null,
                "region": null
            },
            "threatActor": {
                "country": null,
                "id": "be2da8bce084d842dedb59b2ecf079cbba091cdf",
                "isAPT": false,
                "name": "Mr.Pr4x0r"
            },
            "url": "http://mandrill.steelcoat.co.in/FCH.php"
        }
    ]
}

ThreatQ provides the following default mapping for this feed:

Feed Data Path ThreatQ Entity ThreatQ Object Type or Attribute Key Published Date Examples Notes
.items[].url Indicator.Value URL .items[].date http://httpswwwalibaba.com-spma2700homeloginngnsdc.steelcoat.co.in/FCH.php N/A
.items[].evaluation.admiraltyCode Indicator/Adversary.Attribute Admiralty Code .items[].date B2 Updatable
.items[].evaluation.credibility Indicator/Adversary.Attribute Credibility .items[].date 80 Updatable
.items[].evaluation.reliability Indicator/Adversary.Attribute Reliability .items[].date 80 Updatable
.items[].evaluation.severity Indicator/Adversary.Attribute Severity .items[].date orange Updatable
.items[].evaluation.tlp Indicator/Adversary.TLP Traffic Light Protocol .items[].date amber N/A
.items[].evaluation.ttl Indicator/Adversary.Attribute Time to live (days) .items[].date 30 Updatable
.items[].portalLink Indicator/Adversary.Attribute Source Link .items[].dateBegin https://tap.group-ib.com/attacks/deface?searchValue=id:645b7ff97400cb001883f9bf N/A
.items[].targetIp.ip Related Indicator.Value IP Address .items[].date 184.168.108.77 N/A
.items[].targetIp.asn Related Indicator.Attribute ASN .items[].date N/A N/A
.items[].targetIp.city Related Indicator.Attribute City .items[].date Scottsdale N/A
.items[].targetIp.countryCode Related Indicator.Attribute Country Code .items[].date N/A N/A
.items[].targetIp.countryName Related Indicator.Attribute Country Name .items[].date United States N/A
.items[].targetIp.provider Related Indicator.Attribute Provider .items[].date N/A N/A
.items[].targetIp.region Related Indicator.Attribute Region .items[].date N/A N/A
.items[].targetDomain Related Indicator.Value FQDN .items[].date httpswwwalibaba.com-spma2700homeloginngnsdc.steelcoat.co.in N/A
.items[].threatActor.name Adversary.Value N/A .items[].date Mr.Pr4x0r N/A

GroupIB Malware Report

The GroupIB Malware Report feed ingests Malware objects and any related Indicators, and Adversary.

GET https://tap.group-ib.com/api/v2/malware/malware/updated

Truncated Sample Response:

{
    "count": 1,
    "items": [
        {
            "aliases": [
                "BRATARAT"
            ],
            "attachedFile": [
                {
                    "hash": "dd28c28bcbafa605febc2b3b9a8ccd23ebfedf126aa66a72e598d305bd55bdd4",
                    "mime": "image/png",
                    "name": "dd28c28bcbafa605febc2b3b9a8ccd23ebfedf126aa66a72e598d305bd55bdd4",
                    "size": 173847
                },
                {
                    "hash": "c116cc30b2bff85a6f21bb8013b35eeef4c7e75851ba42c9405c4f44624b972e",
                    "mime": "image/png",
                    "name": "c116cc30b2bff85a6f21bb8013b35eeef4c7e75851ba42c9405c4f44624b972e",
                    "size": 399114
                }
            ],
            "author": null,
            "category": [
                "Banking Trojan"
            ],
            "categoryOptions": [
                {
                    "label": "banking trojan",
                    "value": "banking trojan"
                }
            ],
            "class": null,
            "configCount": 0,
            "configList": [],
            "deleted": false,
            "dislikeCount": 0,
            "fileCount": 0,
            "fileIocList": [],
            "geoRegion": [
                "america:south_america",
                "europe:european_union",
                "europe"
            ],
            "history": [
                {
                    "date": "2023-04-23T20:04:17+03:00",
                    "editor": {
                        "id": "shirshova@group-ib.com"
                    }
                }
            ],
            "id": "a36a740ab0dc910eea2c3760ec93d3b44d9a9a27",
            "isDisliked": false,
            "isLiked": false,
            "isSeen": false,
            "langs": [
                "en"
            ],
            "likeCount": 0,
            "linkedMalware": [],
            "malwareAliasList": [
                "BRATARAT"
            ],
            "mitreCount": 0,
            "name": "BRATA",
            "networkCount": 0,
            "networkIocList": [],
            "partCount": 0,
            "platform": [
                "Android"
            ],
            "platformOptions": [
                {
                    "label": "Android",
                    "value": "android"
                }
            ],
            "portalLink": null,
            "reportRating": null,
            "reportSeen": [
                "9498"
            ],
            "seenCount": 1,
            "seqUpdate": 16563360102488,
            "shortDescription": "BRATA (Brazilian Android Rat) is an Android Rat",
            "signatureCount": 0,
            "signatureList": [],
            "sourceCountry": [
                "BR",
                "IT"
            ],
            "stixGuid": null,
            "threatActorList": [
                {
                    "id": "19a0a76e206404e203b2e3f5cbebcd56d20ea473",
                    "isApt": false,
                    "name": "Donot Team",
                    "url": ""
                }
            ],
            "threatLevel": "Medium",
            "threatLevelOptions": {
                "label": "Medium",
                "value": "Medium"
            },
            "updatedAt": "2023-04-23T20:04:17+03:00",
            "yaraCount": 0,
            "yaraRuleList": []
        }
    ]
}

ThreatQ provides the following default mapping for this feed:

Feed Data Path ThreatQ Entity ThreatQ Object Type or Attribute Key Published Date Examples Notes
.items[].name Malware.Value N/A .items[].history[0].date BRATA N/A
.items[].aliases Malware.Tags N/A .items[].history[0].date BRATARAT, Banking Trojan Concatenated with .items[].category
.items[].category Malware.Tags N/A .items[].history[0].date BRATARAT, Banking Trojan Concatenated with .items[].aliases
.items[].shortDescription Malware.Description N/A .items[].history[0].date BRATA (Brazilian Android Rat) is an Android Rat discovered in 2019. N/A
.items[].geoRegion Malware.Attribute Region .items[].history[0].date america:south_america N/A
.items[].langs Malware.Attribute Language .items[].history[0].date en N/A
.items[].platform Malware.Attribute Operating System .items[].history[0].date Android N/A
.items[].sourceCountry Malware.Attribute Source Country .items[].history[0].date BR N/A
.items[].threatLevel Malware.Attribute Threat Level .items[].history[0].date Medium N/A
.items[].attachedFile[].hash Related Indicator.Value SHA-256 .items[].history[0].date dd28c28bcbafa605febc2b3b9a8
ccd23ebfedf126aa66a72e598d3
05bd55bdd4
N/A
.items[].attachedFile[].size Related Indicator.Attribute File Size .items[].history[0].date 173847 N/A
.items[].threatActorList[].name Related Adversary.Value N/A .items[].history[0].date Donot Team N/A

GroupIB Malware Signature, GroupIB Malware YARA Rule

The Group IB Malware Signature and Malware YARA Rule feeds ingest Events and any related Malware.

GroupIB Malware Signature - GET https://tap.group-ib.com/api/v2/malware/signature/updated 

GroupIB Malware Yara Rule - GET https://tap.group-ib.com/api/v2/malware/yara/updated 

(Truncated) Sample Response:

{
    "count": 1,
    "items": [
        {
            "alertHistory": [],
            "alertNum": 0,
            "class": "backdoor",
            "content": "alert http $EXTERNAL_NET $HTTP_PORTS -> $HOME_NET any (msg:\"CURRENT_EVENTS Driveby bredolab hidden div served by nginx\";",
            "createdAt": "2015-12-03T14:53:26+03:00",
            "id": 107709,
            "malware": [
                {
                    "id": "490fcdb4491edc1ef30687eb2700fbd65727aca3",
                    "name": "Bredolab"
                }
            ],
            "name": "CURRENT_EVENTS Driveby bredolab hidden div served by nginx",
            "seqUpdate": 16752632631373,
            "severity": 5,
            "sid": 2011355,
            "sourceName": null
        }
    ]
}

ThreatQ provides the following default mapping for these feeds:

Feed Data Path ThreatQ Entity ThreatQ Object Type or Attribute Key Published Date Examples Notes
.items[].name Signature.Name Incident .items[].createdAt CURRENT_EVENTS Driveby bredolab hidden div served by nginx N/A
.items[].class Signature.Tags N/A .items[].createdAt backdoor N/A
.items[].content Signature.Value N/A .items[].createdAt alert http $EXTERNAL_NET $HTTP_PORTS -> $HOME_NET any (msg:\"CURRENT_EVENTS Driveby bredolab hidden div served by nginx\"; N/A
.items[].severity Signature.Attribute Severity .items[].createdAt 5 Updatable
.items[].sourceName Signature.Attribute Source .items[].createdAt N/A N/A
.items[].malware[].name Related Malware.Value N/A .items[].createdAt Bredolab N/A
.items[].content Signature.Attribute, Signature.Indicator, Signature.Tag N/A N/A N/A Context is parsed from the signature content (when enabled)

GroupIB Malware Vulnerability

If the type of the ingested object is CVE then it may be ingested as an Indicator, a Vulnerability or both, depending on the user field Save CVE Data as. If the type is not CVE, then this feed ingests the objects as Vulnerabilities.

GET https://tap.group-ib.com/api/v2/osi/vulnerability/updated

Sample Response:

{
  "count": 1,
  "items": [
    {
      "affectedSoftware": [
        {
          "name": "shrimptest",
          "operator": "lt",
          "version": "1.0b3"
        }
      ],
      "bulletinFamily": "NVD",
      "cpeTable": [],
      "cveList": [
        "CVE-2019-11068"
      ],
      "cvss": {
        "score": 0.0,
        "vector": "NONE"
      },
      "darkweb": [],
      "dateLastSeen": "2023-05-03T22:11:28+03:00",
      "dateModified": "2023-05-03T20:15:00+03:00",
      "datePublished": "2023-05-03T20:15:00+03:00",
      "description": "In CyberArk Viewfinity 5.5.10.95 and 6.x before 6.1.1.220, a low privilege user can escalate to an administrative",
      "displayOptions": {
        "isFavourite": false,
        "isHidden": false
      },
      "evaluation": {
        "admiraltyCode": "A1",
        "credibility": 100,
        "reliability": 100,
        "severity": "red",
        "tlp": "green",
        "ttl": 30
      },
      "exploitCount": 1,
      "exploitList": [
        {
          "aix": null,
          "aixFileset": [],
          "appercut": null,
          "assessment": null,
          "bounty": null,
          "bountyState": null,
          "bulletinFamily": "exploit",
          "bulletinSequenceId": null,
          "cpe": [],
          "cpe23": [],
          "cvelist": [
            "CVE-2017-11197"
          ],
          "cvss": {
            "score": 3.2999999999999998,
            "vector": "II:P/RC:UR/AC:L/AU:M/AV:N/E:ND/CI:N/AI:N/RL:ND"
          },
          "cvss3": [],
          "description": "",
          "edition": null,
          "h1reporter": null,
          "h1team": null,
          "hackapp": null,
          "href": "https://www.exploit-db.com/exploits/42319",
          "id": "EDB-ID:42319",
          "ioc": null,
          "isBulletin": "",
          "lastseen": "2018-11-30T12:32:43+03:00",
          "metasploitHistory": null,
          "metasploitReliability": null,
          "modified": "2017-07-13T00:00:00+03:00",
          "naslFamily": null,
          "nmap": null,
          "objectType": null,
          "objectTypes": [],
          "openbugbounty": null,
          "osvdbidlist": null,
          "pluginID": null,
          "provider": "vulners.com",
          "ptsecurityAffected": [],
          "published": "2017-07-13T00:00:00+03:00",
          "references": [],
          "reporter": "Exploit-DB",
          "scanner": [],
          "sequenceId": 16124324829172,
          "sourceData": "# Exploit Title: Privilege Escalation via CyberArk Viewfinity = 5.5 (5.5.10.95)",
          "sourceHref": "https://www.exploit-db.com/download/42319",
          "status": null,
          "taskMd5": "d22f61c5eb10abc520aaa7b0de636dff",
          "threatPostCategory": null,
          "title": "CyberArk Viewfinity 5.5.10.95 - Local Privilege Escalation",
          "type": "exploitdb",
          "vuldb": [],
          "vulnerabilityCvedetails": null,
          "w3af": null
        }
      ],
      "exploitation": [],
      "extCvss": {
        "base": 2.3999999999999999,
        "environmental": 0.0,
        "exploitability": 1.0,
        "impact": 1.5,
        "mImpact": 0.0,
        "overall": 2.3999999999999999,
        "temporal": 2.3999999999999999,
        "vector": "A:N/AC:L/PR:H/C:N/E:X/I:L/RC:R/S:U/UI:R/AV:N/RL:X"
      },
      "extDescription": "",
      "githubLinkList": [],
      "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-11197",
      "id": "CVE-2017-11197",
      "lastseen": "2023-05-03T22:11:28+03:00",
      "portalLink": "https://tap.group-ib.com/osi/vulnerabilities?searchValue=id:CVE-2017-11197",
      "provider": "vulners.com",
      "references": [
        "https://www.exploit-db.com/exploits/42319",
        "http://lp.cyberark.com/rs/316-CZP-275/images/ds-Viewfinity-102315-web.pdf",
        "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-11197"
      ],
      "reporter": "cve@mitre.org",
      "seqUpdate": 16831814361349,
      "softwareMixed": [
        {
          "arch": [],
          "hardware": "",
          "hardwareVendor": "",
          "hardwareVersion": "",
          "os": "",
          "osVendor": "",
          "osVersion": "",
          "rel": [],
          "softwareFileName": "",
          "softwareName": [
            "cisco small business ip phones"
          ],
          "softwareType": [
            "software"
          ],
          "softwareVersion": [
            "any"
          ],
          "softwareVersionString": "",
          "vendor": "Cisco",
          "versionOperator": ""
        }
      ],
      "threats": [],
      "threatsList": [],
      "timeLineData": [],
      "title": "CVE-2017-11197",
      "twitter": [],
      "type": "cve"
    }
  ]
}

ThreatQ provides the following default mapping for this feed:

Feed Data Path ThreatQ Entity ThreatQ Object Type or Attribute Key Published Date Examples Notes
.items[].evaluation.
admiraltyCode
Indicator/
Vulnerability.Attribute
Admiralty Code .items[].datePublished A1 Updatable
.items[].evaluation.
credibility
Indicator/
Vulnerability.Attribute
Credibility .items[].datePublished 100 Updatable
.items[].evaluation
.reliability
Indicator/
Vulnerability.Attribute
Reliability .items[].datePublished 100 Updatable
.items[].evaluation.
severity
Indicator/
Vulnerability.Attribute
Severity .items[].datePublished red Updatable
.items[].evaluation.tlp Indicator/
Vulnerability.TLP
N/A .items[].datePublished green N/A
.items[].evaluation.ttl Indicator/
Vulnerability.Attribute
Time to live (days) .items[].datePublished 30 Updatable
.items[].title Indicator/
Vulnerability.Value
N/A .items[].datePublished CVE-2017-11197 N/A
.items[].description Indicator/
Vulnerability.
Description
N/A .items[].datePublished In CyberArk Viewfinity 5.5.10.95 and 6.x before 6.1.1.220, a low privilege user can escalate to an administrative N/A
.items[].bulletinFamily Indicator/
Vulnerability.Attribute
Bulletin Family .items[].datePublished NVD N/A
.items[].cvss.score Indicator/
Vulnerability.Attribute
CVSS Score .items[].datePublished 3.3 Updatable
.items[].cvss.vector Indicator/
Vulnerability.Attribute
CVSS Vector .items[].datePublished II:P/RC:UR/AC:L/AU:
M/AV:N/E:ND/CI:N/
AI:N/RL:ND
N/A
.items[].extCvss.base Indicator/
Vulnerability.Attribute
CVSS Base Score .items[].datePublished 2.4 Updatable
.items[].extCvss.
environmental
Indicator/
Vulnerability.Attribute
CVSS Environmental Score .items[].datePublished 0 Updatable
.items[].extCvss.
exploitability
Indicator/
Vulnerability.Attribute
CVSS Exploitability Subscore .items[].datePublished 1.0 Updatable
.items[].extCvss.
impact
Indicator/
Vulnerability.Attribute
CVSS Impact Subscore .items[].datePublished 1.5 Updatable
.items[].extCvss.
mImpact
Indicator/
Vulnerability.Attribute
CVSS Modified Impact Subscore .items[].datePublished 0.0 Updatable
.items[].extCvss.
overall
Indicator/
Vulnerability.Attribute
CVSS Overall Score .items[].datePublished 2.4 Updatable
.items[].extCvss.
temporal
Indicator/
Vulnerability.Attribute
CVSS Temporal Score .items[].datePublished 2.4 Updatable
.items[].exploit
Count
Indicator/
Vulnerability.Attribute
Exploit count .items[].datePublished 1 Updatable
.items[].exploit
List[].href
Indicator/
Vulnerability.Attribute
Exploit URL .items[].datePublished https://www.exploit-db.com/exploits/42319 N/A
.items[].exploit
List[].provider
Indicator/
Vulnerability.Attribute
Exploit Provider .items[].datePublished vulners.com N/A
.items[].exploit
List[].reporter
Indicator/
Vulnerability.Attribute
Exploit Reporter .items[].datePublished Exploit-DB N/A
.items[].exploit
List[].title
Indicator/
Vulnerability.Attribute
Exploit Title .items[].datePublished CyberArk Viewfinity 5.5.10.95 - Local Privilege Escalation N/A
.items[].exploit
List[].type
Indicator/
Vulnerability.Attribute
Exploit Type .items[].datePublished exploitdb N/A
.items[].href Indicator/
Vulnerability.Attribute
Vulnerability Details URL .items[].datePublished https://web.nvd.nist.gov/
view/vuln/detail?vulnId=
CVE-2017-11197
N/A
.items[].portalLink Indicator/
Vulnerability.Attribute
Portal Link .items[].datePublished https://tap.group-ib.com/osi/vulnerabilities?searchValue=id:CVE-2017-11197 N/A
.items[].provider Indicator/
Vulnerability.Attribute
Provider .items[].datePublished vulners.com N/A
.items[].software
Mixed
Indicator/
Vulnerability.Attribute
Software .items[].datePublished software cisco small business ip phones version: any Concatenate softwareType, softwareName and softwareVersion
.items[].affected
Software
Indicator/
Vulnerability.Attribute
Software .items[].datePublished shrimptest version: 1.0b3 Concatenate softwareType, softwareName and softwareVersion
.items[].reporter Related Identity.Value N/A .items[].datePublished cve@mitre.org N/A
.items[].cveList Related Indicator/
Vulnerability.Value
N/A .items[].datePublished CVE-2019-11068 N/A

GroupIB Attacks Phishing

The GroupIB Attacks Phishing feed ingests Indicator objects.

GET https://tap.group-ib.com/api/v2/attacks/phishing

Sample Response:

{
  "count": 12,
  "items": [
    {
        "dateBlocked": "2019-03-21T05:53:05+00:00",
        "dateDetected": "2019-03-20T08:46:36+00:00",
        "evaluation": {
            "admiraltyCode": "A2",
            "credibility": 80,
            "reliability": 90,
            "severity": "red",
            "tlp": "amber",
            "ttl": 30
        },
        "history": [
            {
                "date": "2019-03-20T08:47:54+00:00",
                "field": "Detected",
                "reason": null,
                "reporter": "Group-IB Intelligence",
                "value": "In response"
            },
            {
                "date": "2019-03-21T07:46:51+00:00",
                "field": "Status has been changed",
                "reason": null,
                "reporter": "Group-IB Intelligence",
                "value": "In response"
            }
        ],
        "id": "fb2c54adc40a6cc1dbe5ad9771c9787db4fabb64",
        "ipv4": {
            "asn": "AS43260",
            "city": null,
            "countryCode": "CY",
            "countryName": "Cyprus",
            "ip": "185.71.216.171",
            "provider": null,
            "region": "AS"
        },
        "isFavourite": false,
        "isHidden": false,
        "objective": "Card harvest",
        "oldId": "1331",
        "phishingDomain": {
            "domain": "kdrbilisim.com",
            "local": "kdrbilisim.com",
            "dateRegistered": "2012-09-09 13:03:26",
            "title": "ANKARA BİLGİSAYAR TEKNİK SERVİS 0312 226 50 40 | 0312 226 50 40",
            "registrar": "PDR Ltd. d/b/a PublicDomainRegistry.com"
        },
        "portalLink": "https://tap-demo.group-ib.com/attacks/phishing?searchValue=id:fb2c54adc40a6cc1dbe5ad9771c9787db4fabb64",
        "seqUpdate": 1553180722582,
        "status": "In response",
        "targetBrand": "Bank of America",
        "targetCategory": "Finance & Investment",
        "targetCountryName": null,
        "targetDomain": "bankofamerica.com",
        "type": "Phishing",
        "url": "https://www.kdrbilisim.com/Boa"
    }
  ]
}

ThreatQ provides the following default mapping for these feeds:

Feed Data Path ThreatQ Entity ThreatQ Object Type or Attribute Key Published Date Examples NOtes
.items[].evaluation.admiraltyCode Indicator.Attribute Admiralty Code .items[].dateDetected A2 Updatable
.items[].evaluation.credibility Indicator.Attribute Credibility .items[].dateDetected 80 Updatable
.items[].evaluation.reliability Indicator.Attribute Reliability .items[].dateDetected 90 Updatable
.items[].evaluation.severity Indicator.Attribute Severity .items[].dateDetected red Updatable
.items[].evaluation.tlp Indicator.TLP / Related Object.TLP Traffic Light Protocol .items[].dateDetected amber N/A
.items[].evaluation.ttl Indicator.Attribute Time to live (days) .items[].dateDetected 30 Updatable
.items[].ipv4.asn Related Indicator.Attribute ASN .items[].dateDetected AS43260 N/A
.items[].ipv4.city Related Indicator.Attribute City .items[].dateDetected N/A N/A
.items[].ipv4.countryCode Related Indicator.Attribute Country Code .items[].dateDetected CY N/A
.items[].ipv4.countryName Related Indicator.Attribute Country Name .items[].dateDetected Cyprus N/A
.items[].ipv4.ip Related Indicator.Value IP Address .items[].dateDetected 185.71.216.171 N/A
.items[].ipv4.provider Related Indicator.Attribute Provider .items[].dateDetected N/A N/A
.items[].ipv4.region Related Indicator.Attribute Region .items[].dateDetected AS N/A
.items[].objective Indicator.Attribute Objective .items[].dateDetected Card harvest N/A
.items[].phishingDomain.domain Indicator.Value FQDN .items[].phishingDomain.
dateRegistered
kdrbilisim.com N/A
.items[].phishingDomain.local Indicator.Attribute Local .items[].phishingDomain.
dateRegistered
kdrbilisim.com N/A
.items[].phishingDomain.title Indicator.Attribute Title .items[].phishingDomain.
dateRegistered
ANKARA BİLGİSAYAR TEKNİK SERVİS 0312 226 50 40 0312 226 50 40 N/A
.items[].phishingDomain.registrar Indicator.Attribute Registrar .items[].phishingDomain.
dateRegistered
PDR Ltd. d/b/a PublicDomainRegistry.com N/A
.items[].status Indicator.Attribute Status .items[].dateDetected In response N/A
.items[].targetBrand Indicator.Attribute Target Brand .items[].dateDetected Bank of America N/A
.items[].targetCategory Indicator.Attribute Target Category .items[].dateDetected Finance & Investment N/A
.items[].targetCountryName Indicator.Attribute Target Country .items[].dateDetected N/A N/A
.items[].targetDomain Indicator.Attribute Target Domain .items[].dateDetected bankofamerica.com N/A
.items[].type Indicator.Attribute Type .items[].dateDetected Phishing N/A
.items[].url Related Indicator.Value URL .items[].dateDetected https://www.kdrbilisim.com/Boa N/A

GroupIB Attacks Phishing Group

The GroupIB Attacks Phishing Group feed ingests Indicators and Adversaries related to Phishing Attacks. The feed ingests all the attacks updated during the feed run time interval.

The seqUpdate parameter is obtained by making a a call to: https://tap.group-ib.com/api/v2/sequence_list?collection=attacks/phishing_groupANDdate=2024-09-01.

GET https://tap.group-ib.com/api/v2/attacks/phishing_group/updated

Request Parameters:

{
  "seqUpdate": 1724632189898957,
  "limit": 100
}

Sample Response:

{
  "count": 1,
  "items": [
    {
      "brand": "Meta",
      "countPhishing": 2,
      "date": {
        "added": "2024-09-01T00:02:32+04:00",
        "blocked": null,
        "detected": "2024-09-01T00:02:32+04:00",
        "updated": "2024-09-01T00:06:19+04:00"
      },
      "displayOptions": {
        "isFavourite": false,
        "isHidden": false
      },
      "domain": "traderspirits.io",
      "domainInfo": {
        "domain": "traderspirits.io",
        "domainPuny": "traderspirits.io",
        "expirationDate": "2023-07-04T14:58:08+00:00",
        "registered": "2022-07-04T14:58:08+00:00",
        "registrar": "GoDaddy.com, LLC",
        "tld": "io"
      },
      "domainTitle": "Utility  Community based NFT collection. Buy  Sell on Eth Blockchain",
      "evaluation": {
        "admiraltyCode": "C3",
        "credibility": 50,
        "reliability": 50,
        "severity": "red",
        "tlp": "amber",
        "ttl": 30
      },
      "falsePositive": false,
      "groupLifetime": 44204,
      "id": "a80456e50a43c17391cee4328da63908628ac6a7d82348717da379069f0d88c1",
      "ip": [
        {
          "asn": "AS43260",
          "city": "Miami",
          "countryCode": "US",
          "countryName": "United States",
          "ip": "74.208.34.89",
          "provider": "11 Internet AG",
          "region": null
        }
      ],
      "objective": [
        "Login harvest"
      ],
      "phishingKitArray": [],
      "screenshot": {
        "pageHtml": {
          "fileHashMd5": "a28d22149f080eb037b2b3eb66631358",
          "filename": "phishing_screen/c9975a1cd65becbfb3b10c9d05e39ee9970a32b13d8d88f72fed4b3122b82dfa",
          "filetype": "pageHtml",
          "hashSha256": "c9975a1cd65becbfb3b10c9d05e39ee9970a32b13d8d88f72fed4b3122b82dfa",
          "mime": "text/html"
        },
        "pageScreen": {
          "fileHashMd5": "ce04341e8047b76f0479027a18d84891",
          "filename": "phishing_screen/7e15cd3290770ad218b8256b5875f14563c48feee8ccd3c8dd6d3645831e3042",
          "filetype": "pageScreen",
          "hashSha256": "7e15cd3290770ad218b8256b5875f14563c48feee8ccd3c8dd6d3645831e3042",
          "mime": "image/jpeg"
        }
      },
      "seqUpdate": 1724632189898958,
      "signature": {
        "manual": [],
        "resource": [
          "b0cc6de8186b85f20db454ee0f01bf528009269c060d890857a5bd96c20af15d"
        ],
        "screen": []
      },
      "source": [
        "urlscan"
      ],
      "status": 7,
      "threatActor": {
        "country": null,
        "id": null,
        "isAPT": false,
        "name": ""
      },
      "uniqueTitles": [
        {
          "faviconHashes": {
            "md5": null,
            "sha1": null,
            "sha256": null
          },
          "title": "Utility Community based NFT collection."
        }
      ],
      "urlListLink": "https://tap.group-ib.com/api/v2/attacks/phishing_group/a80456e50a43c17391cee4328da63908628ac6a7d82348717da379069f0d88c1/action/url_list",
      "whitelist": false
    }
  ],
  "seqUpdate": 1724632189898958
}

ThreatQ provides the following default mapping for this feed:

Feed Data Path ThreatQ Entity ThreatQ Object Type or Attribute Key Published Date Examples Notes
.items[].evaluation.admiraltyCode Indicator.Attribute Admiralty Code .items[].date.detected C3 Updatable
.items[].evaluation.credibility Indicator.Attribute Credibility .items[].date.detected 50 Updatable
.items[].evaluation.reliability Indicator.Attribute Reliability .items[].date.detected 50 Updatable
.items[].evaluation.severity Indicator.Attribute Severity .items[].date.detected red Updatable
.items[].evaluation.tlp Indicator.TLP / Related Objects.TLP N/A .items[].date.detected amber N/A
.items[].evaluation.ttl Indicator.Attribute Time to live (days) .items[].date.detected 30 Updatable
.items[].ip.asn Related Indicator.Attribute ASN .items[].date.detected AS43260 N/A
.items[].ip.city Related Indicator.Attribute City .items[].date.detected Miami N/A
.items[].ip.countryCode Related Indicator.Attribute Country Code .items[].date.detected US N/A
.items[].ip.countryName Related Indicator.Attribute Country Name .items[].date.detected United States N/A
.items[].ip.ip Related Indicator.Value IP Address .items[].date.detected 74.208.34.89 N/A
.items[].ip.provider Related Indicator.Attribute Provider .items[].date.detected 1&1 Internet AG N/A
.items[].ip.region Related Indicator.Attribute Region .items[].date.detected N/A N/A
.items[].objective Indicator.Attribute Objective .items[].date.detected Login harvest N/A
.items[].domainTitle Indicator.Attribute Domain Title .items[].date.detected Utility & Community based NFT collection. N/A
.items[].brand Indicator.Attribute Brand .items[].date.detected Meta N/A
.items[].countPhishing Indicator.Attribute Count Phishing .items[].date.detected 2 N/A
.items[].domainInfo.registered Indicator.Attribute Register Date .items[].date.detected 2022-07-04 14:58:08+00:00 N/A
.items[].domainInfo.expirationDate Indicator.Attribute Expiration Date .items[].date.detected 2023-07-04 14:58:08+00:00 N/A
.items[].domainInfo.registrar Indicator.Attribute Registrar .items[].date.detected GoDaddy.com, LLC N/A
.items[].domainInfo.tld Indicator.Attribute Top-level domain .items[].date.detected io N/A
.items[].source Indicator.Attribute Source .items[].date.detected urlscan N/A
.items[].domain Indicator.Value FQDN .items[].date.detected traderspirits.io N/A
.items[].threatActor.name Related Adversary.Name N/A .items[].date.detected N/A N/A
.items[].threatActor.country Related Adversary.Attribute Country .items[].date.detected N/A N/A

GroupIB Attack Phishing Kit

The GroupIP Attack Phishing Phishing Kit feed ingests Indicator objects.

GET https://tap.group-ib.com/api/v2/attacks/phishing_kit/updated

Sample Response:

{
  "count": 12,
  "items": [
    {
      "dateDetected": "2019-03-21T18:00:40+00:00",
      "dateFirstSeen": "2019-03-21T18:00:40+00:00",
      "dateLastSeen": "2019-03-21T18:02:53+00:00",
      "downloadedFrom": [],
      "emails": [
        "jimjag@gmail.com",
        "codeworxtech@users.source",
        "coolbru@users.source",
        "mail@info.com",
        "mr.nix008@gmail.com",
        "wezza.marley@gmail.com",
        "mr.nix008@yandex.com"
      ],
      "evaluation": {
        "admiraltyCode": "A1",
        "credibility": 90,
        "reliability": 90,
        "severity": "red",
        "tlp": "amber",
        "ttl": 30
      },
      "hash": "6b27ae3d9fee257551d4c480360fd762",
      "id": "4ce31920791df53309a168117825452bc58b9264",
      "isFavourite": false,
      "isHidden": false,
      "oldId": "1359",
      "path": "https://tap.group-ib.com/api/api/v2/web/attacks/phishing_kit/4ce31920791df53309a168117825452bc58b9264/file/331af2756ec4b1297aa14ff38bf40c7a18f4fcb8899b1804b4dee6bb8d1c91f2",
      "portalLink": "https://bt-demo.group-ib.com/brand/phishing_kit?searchValue=id:4ce31920791df53309a168117825452bc58b9264",
      "seqUpdate": 1553191374631,
      "targetBrand": [
        "Bank of America"
      ],
      "tsFirstSeen": null,
      "tsLastSeen": null,
      "variables": null
    }
  ]
}

ThreatQ provides the following default mapping for this feed:

Feed Data Path ThreatQ Entity ThreatQ Object Type or Attribute Key Published Date Examples Notes
.items[].emails[] Related Indicator.Value Email Address items[].dateDetected jimjag@gmail.com N/A
.items[].downloadedFrom[].
phishingUrl
Related Indicator.Value URL items[].dateDetected N/A N/A
.items[].downloadedFrom[].
url
Related Indicator.Value URL items[].dateDetected hxxps://gt-mywyty186338.code
anyapp.com/cb.zip
N/A
.items[].downloadedFrom[].
domain
Related Indicator.Value FQDN items[].dateDetected gt-mywyty186338.cod
eanyapp.com
N/A
.items[].evaluation.
admiraltyCode
Indicator.Attribute Admiralty Code items[].dateDetected A1 Updatable
.items[].evaluation.credibility Indicator.Attribute Credibility items[].dateDetected 90 Updatable
.items[].evaluation.reliability Indicator.Attribute Reliability items[].dateDetected 90 Updatable
.items[].evaluation.severity Indicator.Attribute Severity items[].dateDetected red Updatable
.items[].evaluation.tlp Indicator.TLP / Related Objects.TLP N/A items[].dateDetected amber N/A
.items[].evaluation.ttl Indicator.Attribute Time to live (days) items[].dateDetected 30 Updatable
.items[].hash Indicator.Value MD5/SHA-1/SHA-256/SHA-384/SHA-512 items[].dateDetected 6b27ae3d9fee25755
1d4c480360fd762
N/A
.items[].targetBrand[] Indicator.Attribute Target Brand items[].dateDetected Bank of America N/A

GroupIB OSI PublicLeak

The GroupIB OSI PublicLeak feed ingests Indicator objects.

GET https://tap.group-ib.com/api/v2/osi/public_leak/updated

Sample Response:

{
  "count": 18138702,
  "items": [
    {
      "bind": [],
      "created": "2021-09-27T12:47:16+03:00",
      "data": "<!--/**\n * GeSHi (C) 2004 - 2007 Nigel McNie, 2007 - 2008 Benny Baumann\n * (http://qbnz.com/highlighter/ and http://geshi.org/)\n */\n.java  {font-family:monospace;color: #000066;}\n.java a:link {color: #000060;}\n.java a:hover {background-color: #f0f000;}\n.java .head {font-family: Verdana, Arial, sans-serif; color: #808080; font-size: 70%; font-weight: bold;  padding: 2px;}\n.java .imp {font-weight: bold; color: red;}\n.java .kw1 {color: #000000; font-weight: bold;}\n.java .kw2 {color: #000066; font-weight: bold;}\n.java .kw3 {color: #003399;}\n.java .kw4 {color: #000066; font-weight: bold;}\n.java .co1 {color: #666666; font-style: italic;}\n.java .co2 {color: #006699;}\n.java .co3 {color: #008000; font-style: italic; font-weight: bold;}\n.java .coMULTI {color: #666666; font-style: italic;}\n.java .es0 {color: #000099; font-weight: bold;}\n.java .br0 {color: #009900;}\n.java .sy0 {color: #339933;}\n.java .st0 {color: #0000ff;}\n.java .nu0 {color: #cc66cc;}\n.java .me1 {color: #006633;}\n.java .me2 {color: #006633;}\n.java span.xtra { display:block; }\n.ln, .ln{ vertical-align: top; }\n.coMULTI, .java span{ line-height:13px !important;}\n-->/* package whatever; // don't place package name! */\n \nimport java.util.*;\nimport java.lang.*;\nimport java.io.*;\n \n/* Name of the class has to be \"Main\" only if the class is public. */\nclass Ideone\n{\n\tpublic static void main (<a href=\"http://www.google.com/search?hl=en&q=allinurl%3Adocs.oracle.com+javase+docs+api+string\">String</a>[] args) throws java.lang.<a href=\"http://www.google.com/search?hl=en&q=allinurl%3Adocs.oracle.com+javase+docs+api+exception\">Exception</a>\n\t{\n\t\t<a href=\"http://www.google.com/search?hl=en&q=allinurl%3Adocs.oracle.com+javase+docs+api+system\">System</a>.out.println(\"A13V1IB3VIYZZH\".length());\n\t}\n}",
      "displayOptions": null,
      "evaluation": {
        "admiraltyCode": "C3",
        "credibility": 50,
        "reliability": 50,
        "severity": "green",
        "tlp": "amber",
        "ttl": 30
      },
      "hash": "db0cd0519335470b6ae614ccbe65ef358b93b349",
      "id": "db0cd0519335470b6ae614ccbe65ef358b93b349",
      "language": "",
      "linkList": [
        {
          "author": "",
          "dateDetected": "2021-09-27T12:47:16+03:00",
          "datePublished": "2021-09-27T11:46:51+03:00",
          "hash": "60df36b3bf7abcb5e540e68fc3193cecb724814e",
          "itemSource": "link",
          "link": "http://ideone.com/4XU0fh",
          "sequenceUpdate": null,
          "size": 1767,
          "source": "ideone.com",
          "status": 1,
          "title": ""
        }
      ],
      "matches": {
                "email": {
                    "email": [
                        "somesampleemail@mail.ru"
                    ]
                }
            },
      "oldId": null,
      "portalLink": "https://tap.group-ib.com/osi/public_leak?searchValue=id:db0cd0519335470b6ae614ccbe65ef358b93b349",
      "seqUpdate": 1632736036790689,
      "size": "1,73 KB",
      "updated": "2021-09-27T12:47:16+03:00",
      "useful": 1
    }
  ]
}

ThreatQ provides the following default mapping for these feeds:

Feed Data Path ThreatQ Entity ThreatQ Object Type or Attribute Key Published Date Examples  
.items[].bind[].key Related Indicator.Value FQDN .items[].created mail.ru N/A
.items[].bind[].ruleValue Related Indicator.Value FQDN .items[].created mail.ru N/A
.items[].bind[].type Related Indicator.Attribute Type .items[].created domains N/A
.items[].data Indicator.Description N/A .items[].created [\"VehicleUsagePeriods\": [[\"endDa N/A
.items[].evaluation.admiraltyCode Indicator.Attribute Admiralty Code .items[].created C3 Updatable
.items[].evaluation.credibility Indicator.Attribute Credibility .items[].created 50 Updatable
.items[].evaluation.reliability Indicator.Attribute Reliability .items[].created 50 Updatable
.items[].evaluation.severity Indicator.Attribute Severity .items[].created orange Updatable
.items[].evaluation.tlp Indicator.TLP / Related Objects.TLP N/A .items[].created amber N/A
.items[].evaluation.ttl Indicator.Attribute Time to live (days) .items[].created 30 Updatable
.items[].hash Indicator.Value SHA-1 .items[].created 9ea9e8f70f76b774e
bbffa58869275a78d
1031e4
N/A
.items[].language Indicator.Attribute Language .items[].created json N/A
.items[].linkList[].hash Related Indicator.Value SHA-1 .items[].created 68664b9e631ff8d352
47645fad364775f0ce4
073
N/A
.items[].linkList[].itemSource Related Indicator.Attribute Source .items[].created api N/A
.items[].linkList[].link Related Indicator.Value URL .items[].created https://pastebin.com/FCuAjGC5 N/A
.items[].linkList[].size Related Indicator.Attribute Size .items[].created 1316 N/A
.items[].linkList[].source Related Indicator.Value FQDN .items[].created pastebin.com N/A
.items[].matches.email.email[] Related Indicator.Value Email Address .items[].created somesampleemail@mail.ru N/A
.items[].size Indicator.Attribute Size .items[].created 1,29 KB N/A

GroupIB IOC Common

The GroupIB IOC Common feed ingests Indicators and Malware.

GET https://tap.group-ib.com/api/v2/ioc/common/updated

Sample Response:

{
  "count": 46781,
  "items": [
    {
      "id": "9518c854e6c1f59fd12089cfe9ed078a22977dc0",
      "type": "file",
      "dateFirstSeen": "2023-04-02T00:00:00+03:00",
      "dateLastSeen": "2023-04-02T00:00:00+03:00",
      "seqUpdate": 16803953345526,
      "hash": [
        "4adf0249073c4e0d022823ee61ce002c",
        "1e37ae9a6d1ad9767b1510ceac2074764667d9bf",
        "cc6cefaacbdce7b595169106f2109afeabf6b24c732566352616202f2010d689"
      ],
      "malwareList": [
        {
          "name": "DCRat",
          "aliases": [
            "DarkCrystal"
          ]
        }
      ],
      "threatList": null
    }
  ]
}

ThreatQ provides the following default mapping for this feed:

Feed Data Path ThreatQ Entity ThreatQ Object Type or Attribute Key Published Date Examples Notes
.items[].hash[] Indicator.Value MD5/SHA-1/SHA-256 .items[].dateFirstSeen '4adf0249073c4e0d0
22823ee61ce002c'
The type of the indicator is determined by its length
.items[].ip[] Indicator.Value IP Address .items[]/dateFirstSeen N/A N/A
.items[].domains[] Indicator.Value FQDN .items[]/dateFirstSeen N/A N/A
.items[].type Indicator.Attribute Type .items[].dateFirstSeen 'file' N/A
.items[].dateFirstSeen Indicator.Attribute Date First Seen .items[].dateFirstSeen '2023-04-02 00:00:00+03:00' N/A
.items[].malwareList[].name Related Malware.Value N/A .items[].dateFirstSeen 'DCRat' N/A
.items[].malwareList.aliases[] Related Malware.Tags N/A .items[].dateFirstSeen 'DarkCrystal' N/A

Average Feed Run

Object counts and Feed runtime are supplied as generalities only - objects returned by a provider can differ based on credential configurations and Feed runtime may vary based on system resources and load.

GroupIB Compromised Account

Metric Result
Run Time 1 minute
Accounts 73
Account Attributes 584
Adversaries 1
Indicators 60
Indicator Attributes 136
Malware 4

GroupIB Compromised Bank Card

Metric Result
Run Time 1 minute
Cards 100
Card Attributes 1,861
Indicators 71
Indicator Attributes 205
Malware 16
Adversaries 6

GroupIB Compromised Data Mules

Metric Result
Run Time 3 minutes
Adversaries 3
Adversary Attributes 3
Indicators 7
Indicator Attributes 12
Malware 2
Malware Attributes 2
Money Mule 500
Money Mule Attributes 5,504
Organization 9

GroupIB Compromised Data GIT Leaks

Metric Result
Run Time 2 minutes
Indicators 3,720
Indicator Attributes 13,132
Identity 153
Identity Attributes 165

GroupIB Compromised Data IMEI

Metric Result
Run Time 1 minute
Adversaries 1
Adversary Attributes 1
IMEI 397
IMEI Attributes 4,006
Indicators 63
Indicator Attributes 286
Malware 3
Malware Attributes 3

GroupIB Compromised Data Shops

Metric Result
Run Time 1 minute
Indicators 3
Indicator Attributes 10
Malware 1

GroupIB Compromised IM Discord

Metric Result
Run Time 4 minutes
Discord Channel 91
Discord Channel Attributes 91
Identities 72
Identity Attributes 333

GroupIB Compromised IM Telegram

Metric Result
Run Time 1 minute
Identities 17
Identity Attributes 34
Telegram Channel 55
Telegram Channel Attributes 342

GroupIB Compromised Masked Bank Card

Metric Result
Run Time 2 minutes
Cards 400
Card Attributes 3,751
Indicators 761
Indicator Attributes 3,787
Malware 10

GroupIB APT Threat

Metric Result
Run Time 25 minutes
Attack Pattern 350
Attack Pattern Attributes 795
Identity 210
Identity Attributes 444
Indicators 23,942
Indicator Attributes 3,160
Intrusion Set 483
Intrusion Set Attributes 9,358
Malware 255
Tool 37

GroupIB Human Malware C2

Metric Result
Run Time 1 minute
Adversaries 19
Indicators 439
Indicator Attributes 152
Malware 18

GroupIB Human Intelligence Threat Actor

Metric Result
Run Time 1 minute
Adversaries 52
Adversary Attributes 2978
Indicators 86
Indicator Attributes 258
Intrusion Set 112

GroupIB Malware Configs

Metric Result
Run Time 1 minute
Indicators 860
Indicator Attributes 767
Malware 21

GroupIB Suspicious IP Tor Node

Metric Result
Run Time 5 minutes
Indicators 500
Indicator Attributes 7,884

GroupIB Suspicious IP Scanners

Metric Result
Run Time 37 minutes
Indicators 29,571
Indicator Attributes 182,708

GroupIB Suspicious IP VPN

Metric Result
Run Time 1 minute
Indicators 100
Indicator Attributes 1,092

GroupIB Attacks DDoS

Metric Result
Run Time 20 minutes
Indicators 7,053
Indicator Attributes 73,807
Adversaries 2
Adversary Attributes 7
Malware 6
Malware Attributes 120

GroupIB Attacks Deface

Metric Result
Run Time 1 minute
Indicators 743
Indicator Attributes 3,852
Adversaries 36
Adversary Attributes 519

GroupIB Malware Report

Metric Result
Run Time 1 minute
Indicators 213
Indicator Attributes 213
Malware 38
Malware Attributes 309
Adversaries 16

GroupIB Malware Signature

Metric Result
Run Time 13 hours 12 minutes
Events 977,748
Event Attributes 977,801
Malware 725

GroupIB Malware Yara Rule

Metric Result
Run Time 21 minutes
Events 27,609
Event Attributes 27,820
Malware 237

GroupIB Malware Vulnerability

Metric Result
Run Time 2 minutes
Indicators 97
Indicator Attributes 1,264
Vulnerabilities 3
Vulnerability Attributes 31
Identities 13
Identity Attributes 7

GroupIB Attacks Phishing

Metric Result
Run Time 1 hour 34 minutes
Indicators 61,898
Indicator Attributes 412,185

GroupIB Attacks Phishing Group

Metric Result
Run Time 1 minute
Indicators 516
Indicator Attributes 4,301

GroupIB Attacks Phishing Kit

Metric Result
Run Time 1 minute
Indicators 51
Indicator Attributes 72

GroupIB OSI PublicLeak

Metric Result
Run Time 1 minute
Indicators 285
Indicator Attributes 1,063

GroupIB IOC Common

Metric Result
Run Time 2 minutes
Indicators 2,667
Indicator Attributes 5,334
Malware 55

Known Issues / Limitations

  • The maximum allowable range is 30 consecutive days. If a larger date range is selected, the feed will change the end date to start date plus 30 days.
  • There is a known known issue with the GroupIB API that can cause a feed to ignore set date parameters.  This can cause more data to be returned, resulting in longer run times.  
  • The GroupIB Compromised IM Discord and GroupIB Compromised IM Telegram feeds may ingest data that contains characters not supported by the database which results in the feed run finishing with a 500 Internal Error error message.  To avoid this error, special characters have been removed.  This issue will be addressed in a future ThreatQ platform release.

Change Log

  • Version 3.5.2
    • GroupIB Malware C2 feed - resolved a Filter-Mapping issue that could occur when certain keys were not present in the API response.  
  • Version 3.5.1
    • Added two new required custom objects utilized by the Group IB Compromised IM Discord and Group IB Compromised IM Telegrams feeds:
      • Telegram Channel
      • Discord Channel
    • The Group IB Compromised IM Discord and Group IB Compromised IM Telegrams feeds now add the content of the messages to the description of ThreatQ objects. 
  • Version 3.5.0
    • Made the following updates to the Group IB Malware Signature and Group IB Malware Yara Rule feeds:
      • intelligence from these feeds will now be ingested as Signature objects.  Prior to version 3.5.0, the intelligence was ingested as ThreatQ Events.  
      • users can now parse the Signatures from these feeds for further context such as attributes and relationships.  
    • The Group IB Attacks Phishing Kit feed can now ingest multiple hash types and phishing URLs.
    • The Group IB Malware Vulnerability feed now ingests related CVEs.  
  • Version 3.4.9
    • GroupIB OSI PublicLeak feed - long descriptions are now truncated.  
    • GroupIB IOC Common feed - additional indicators subtypes have been added: .items[].ip[] (IP Address) and .items[]domain (FQDN).
  • Version 3.4.8
    • Resolved an issue regarding the parsing of First Message Date and Last Message Date for the GroupIB Compromised IM Telegram feed.
    • The GroupIB Attacks Phishing Group feed has been updated to ingest all updated entries.  
  • Version 3.4.7
    • Resolved a Filter-Mapping error that would occur with the GroupIB Human Intelligence Threat feed when the evaluation field is not present in API response.
  • Version 3.4.6
    • Optimized the date format used by GroupIB Compromised IM Telegram feed to prevent ServerDisconnected errors.
  • Version 3.4.5
    • Updated the GroupIB Compromised Account feed to reflect updates to the GroupIB API schema.  
  • Version 3.4.4
    • GroupIB Compromised Account feed - resolved a filter mapping issue when the ipv4 is not present in the API response.  
  • Version 3.4.3
    • Updated the authentication method from headers to basic authentication.  
    • Unicode special characters  not supported by the ThreatQ database engine are no longer ingested.  
  • Version 3.4.2
    • Resolved a Filter Mapping issue with the Group-IB Malware Vulnerability feed.  
  • Version 3.4.1
    • Existing attributes regarding data confidence levels will now be updated.
    • Resolved an issue regarding the measurement unit for the Time to Live attribute.  
    • Re-enabled the GroupIB Compromised Account feed.
    • Added the following feeds:
      • GroupIB Compromised Bank Card
      • GroupIB Compromised IM Discord
      • GroupIB Compromised IM Telegram
      • GroupIB Compromised Masked Bank Card
    • Removed the GroupIB Malware Targeted Malware feed as it has been deprecated by the provider.
    • Updated the Known Issues / Limitations chapter regarding an issue with the Compromised IM Discord and Compromised IM Telegram feeds.    
    • Updated minimum ThreatQ version to 5.20.0.  
  • Version 3.4.0
    • Added a delay for requests and extra retries (with delay) when encountering 429 errors. 
    • Updated the minimum ThreatQ version to 5.19.0.   
  • Version 3.3.0
    • Added the following feeds:
      • GroupIB Compromised Data Shops
      • GroupIB Malware Configs
      • GroupIB Suspicious IP VPN
      • GroupIB Suspicious IP Scanners
      • GroupIB Attacks Deface
      • GroupIB Malware Report
      • GroupIB Malware Signature
      • GroupIB Malware YARA Rule
      • GroupIB Vulnerability
      • GroupIB Attacks Phishing Group
      • GroupIB Attacks Abuse Phishing Kit
      • GroupIB IOC Common
    • Removed the following feeds:
      • GroupIB Brand Abuse Phishing
      • GroupIB Brand Abuse Phishing Kit
      • GroupIB Compromised Data Darkweb
      • GroupIB Compromised Account
      • GroupIB Compromised Card
    • Added pagination.
    • Added support for Start and End date parameters.  See the Known Issues / Limitations chapter for more details.  
  • Version 3.2.0
    • Updated the integration to use the new Group-IB endpoints, tap.group.ib.com.  The previous endpoints, bt.group-ib.com, have been deprecated.  
    • Removed deprecated endpoint: GroupIB Compromised Data Files.      
  • Version 3.1.0
    • GroupIB APT Threat Actor and Human Intelligence Threat Actors will now ingest data from the feed as Intrusion Sets opposed to Reports.  
    • New attributes, Compromised Data and Source Link, have been added to the following feeds: GroupIBCompromised Account, Compromised Card, Compromised Data Files.
  • Version 3.0.0 rev-b
    • Guide Update - Updated the custom object installation instructions in the Prerequisites chapter.
  • Version 3.0.0
    • Added new endpoints to the CDF:
      • GroupIB Compromised Data Darkweb
      • GroupIB OSI PublicLeak
      • GroupIB Compromised Data Files
      • GroupIB Brand Abuse Phishing
      • GroupIB Brand Abuse Phishing Kit
  • Version 2.1.0
    • Added new endpoints to the CDF.  These new endpoints require the installation of additional custom objects: Compromised Account and Compromised Card.  See the Prerequisites section for more details. 
  • Version 2.0.0
    • Initial release

PDF Guides

Document ThreatQ Version
Group IB CDF Guide v3.5.2 5.20.0 or Greater
Group IB CDF Guide v3.5.1 5.20.0 or Greater
Group IB CDF Guide v3.5.0 5.20.0 or Greater
Group IB CDF Guide v3.4.9 5.20.0 or Greater
Group IB CDF Guide v3.4.8 5.20.0 or Greater
Group IB CDF Guide v3.4.7 5.20.0 or Greater
Group IB CDF Guide v3.4.6 5.20.0 or Greater
Group IB CDF Guide v3.4.5 5.20.0 or Greater
Group IB CDF Guide v3.4.4 5.20.0 or Greater
Group IB CDF Guide v3.4.3 5.20.0 or Greater
Group IB CDF Guide v3.4.2 5.20.0 or Greater
Group IB CDF Guide v3.4.1 5.20.0 or Greater
Group IB CDF Guide v3.4.0 5.19.0 or Greater
Group IB CDF Guide v3.3.0 4.45.0 or Greater
Group IB CDF Guide v3.2.0 4.45.0 or Greater
Group IB CDF Guide v3.1.0 4.45.0 or Greater
Group IB CDF Guide v3.0.0 4.45.0 or Greater
Group IB CDF Guide v2.1.0 4.45.0 or Greater
Group IB CDF Guide v2.0.0 4.45.0 or Greater