Current ThreatQ Version Filter
 

RSS Feed Reader CDF

The web format of this guide reflects the most current release.  Guides for older iterations are available in PDF format.  

Integration Details

ThreatQuotient provides the following details for this integration:

Introduction

The RSS Feed Reader CDF enables analysts to automatically ingest RSS feeds from multiple sources, directly into ThreatQ.

The integration provides the following feed:

  • RSS Feed Reader - ingests reports as a main object and indicators as related objects.

The integration ingests the following system objects:

  • Reports
    • Report Attributes
  • Indicators

Installation

Perform the following steps to install the integration:

The same steps can be used to upgrade the integration to a new version.

  1. Log into https://marketplace.threatq.com/.
  2. Locate and download the integration file.
  3. Navigate to the integrations management page on your ThreatQ instance.
  4. Click on the Add New Integration button.
  5. Upload the integration file using one of the following methods:
    • Drag and drop the file into the dialog box
    • Select Click to Browse to locate the integration file on your local machine

    ThreatQ will inform you if the feed already exists on the platform and will require user confirmation before proceeding. ThreatQ will also inform you if the new version of the feed contains changes to the user configuration. The new user configurations will overwrite the existing ones for the feed and will require user confirmation before proceeding.

You will still need to configure and then enable the feed.

Configuration

ThreatQuotient does not issue API keys for third-party vendors. Contact the specific vendor to obtain API keys and other integration-related credentials.

To configure the integration:

  1. Navigate to your integrations management page in ThreatQ.
  2. Select the OSINT option from the Category dropdown (optional).

    If you are installing the integration for the first time, it will be located under the Disabled tab.

  3. Click on the integration entry to open its details page.
  4. Enter the following parameters under the Configuration tab:
    Parameter Description
    Preset RSS Feeds Select one or more RSS feeds to ingest posts from. This parameter can be used in conjunction with the Custom RSS Feeds parameter below.  Options include:
    • 360 Netlab
    • AhnLab Security Emergency Response Center
    • Anheng Information
    • BankInfo Security
    • Bitdefender
    • BleepingComputer
    • CERT Polska
    • CIS Security Advisories
    • Citizenlab
    • Check Point Research
    • Cybereason
    • DCSO Cytec
    • ESET WeLiveSecurity
    • Flashpoint
    • Fortinet Threat Research
    • Fox-IT Blog
    • Google Threat Analysis Group
    • Infosecurity Magazine
    • Intezer
    • Jamf Threat Labs
    • Kaspersky Securelist
    • Krebs on Security
    • Latest Hacking News
    • Malwarebytes
    • Malware Traffic Analysis
    • Mandiant Cyber Threat Research
    • Microsoft Threat Intelligence
    • Netskope Threat Research
    • Palo Alto Blog
    • Palo Alto Unit 42
    • Positive Technologies
    • PulseDive
    • Qualys Security Blog
    • Rostelekom Solar 4Rays
    • SANS Internet Storm Center
    • Security Affairs
    • Sekoai.io
    • SentinelOne Labs
    • Sophos Threat Research
    • Symantec Threat Intelligence
    • Trend Micro Research
    • Trustwave SpiderLabs
    Custom RSS Feeds Enter a line-separated list of RSS feeds (URLs) to ingest posts from.  This parameter can be used in conjunction with the Preset RSS Feeds parameter above.
    Ingest Categories As Select one or more entities to ingest the Category field as.  Options include:
    • Attributes
    • Tags (default)
    Parsed IOC Types Select the IOC types to automatically parse from the content.  Options include:
    • CVE (default)
    • IP Address
    • IPv6 Address
    • CIDR Block
    • FQDN
    • URL
    • MD5
    • SHA-1
    • SHA-256
    • SHA-512
    • Email Address
    • Registry Key
    Parsing Options Select the parsing options to use when parsing IOCs from the content.  Options include:
    • Normalize IOCs
    • Derive FQDNs from URLs
    Configuration Screen
  5. Review any additional settings, make any changes if needed, and click on Save.
  6. Click on the toggle switch, located above the Additional Information section, to enable it.

ThreatQ Mapping

RSS Feed Reader

The RSS Feed Reader feed periodically pulls entries from one or more RSS feeds. Entries will be parsed and uploaded to ThreatQ as Reports.

Sample Response:

<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:wfw="http://wellformedweb.org/CommentAPI/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:slash="http://purl.org/rss/1.0/modules/slash/">
	<channel>
		<title>
			Graham Cluley
		</title>
		<link href="https://grahamcluley.com/feed/" rel="self" type="application/rss+xml" />
		<link>
			https://grahamcluley.com
		</link>
		<description>
			Computer security news, advice, and opinion
		</description>
		<lastBuildDate>
			Wed, 15 Feb 2023 13:51:41 +0000
		</lastBuildDate>
		<language>
			en-GB
		</language>
		<updatePeriod>
			hourly
		</updatePeriod>
		<updateFrequency>
			1
		</updateFrequency>
		<generator>
			https://wordpress.org/?v=6.1.1
		</generator>
		<image>
			<url>
				https://grahamcluley.com/wp-content/uploads/2022/12/cropped-android-chrome-512x512-2-32x32.png
			</url>
			<title>
				Graham Cluley
			</title>
			<link>
				https://grahamcluley.com
			</link>
			<width>
				32
			</width>
			<height>
				32
			</height>
		</image>
		<item>
			<title>
				Ransomware attackers steal over 3 million patients&#8217; medical records
			</title>
			<link>
				https://www.bitdefender.com/blog/hotforsecurity/ransomware-attackers-steal-over-3-million-patients-medical-records/
			</link>
			<comments>
				https://www.bitdefender.com/blog/hotforsecurity/ransomware-attackers-steal-over-3-million-patients-medical-records/#respond
			</comments>
			<creator>
				<![CDATA[Graham Cluley]]>
			</creator>
			<pubDate>
				Tue, 14 Feb 2023 10:59:57 +0000
			</pubDate>
			<category>
				<![CDATA[Data loss]]>
			</category>
			<category>
				<![CDATA[Guest blog]]>
			</category>
			<category>
				<![CDATA[Ransomware]]>
			</category>
			<category>
				<![CDATA[data breach]]>
			</category>
			<category>
				<![CDATA[medical]]>
			</category>
			<category>
				<![CDATA[ransomware]]>
			</category>
			<guid isPermaLink="false">
				https://grahamcluley.com/?p=12336776
			</guid>
			<description>
				<![CDATA[
				A ransomware attack has again put the personal information of innocent parties at risk after it was revealed that a data breach has potentially exposed the medical records of more than three million people.
				
				Read more in my article on the Hot for Security blog.
				]]>
			</description>
			<commentRss>
				https://www.bitdefender.com/blog/hotforsecurity/ransomware-attackers-steal-over-3-million-patients-medical-records/feed/
			</commentRss>
			<comments>
				0
			</comments>
		</item>
	</channel>
</rss>

ThreatQuotient provides the following default mapping for this feed:

RSS Feeds typically follow a standard format, but the content will be different from feed to feed.  Each mapping below is based on the available fields for each item in the feed.

Feed Data Path ThreatQ Entity ThreatQ Object Type or Attribute Key Published Date Examples Notes
.title Report.Value N/A .pubDate Ransomware attackers steal over 3 million patients&#8217; medical records N/A
.link Report.Attribute Web Link N/A N/A N/A
.category Report.Attribute, Report.Tag Category N/A N/A Field may be a list or single value
.contentType Report.Attribute Type N/A N/A Non-standard field
.severity Report.Attribute Severity N/A Critical Non-standard field
.dc:type Report.Attribute Type N/A News Non-standard field
.pubDate Report.Attribute Published At N/A Tue, 14 Feb 2023 10:59:57 +0000 N/A
.author Report.Attribute Author N/A N/A N/A
.dc:creator Report.Attribute, Report.Source Author N/A Graham Cluley N/A
.country Report.Attribute Country Code, Country N/A US Non-standard field
.feed_url Report.Attribute RSS Feed N/A https://decoded.avast.io/feed/ N/A
.description, .content:encoded Report.Description N/A N/A N/A N/A
.description, .content:encoded, .title Related Indicator.Value CVE N/A N/A Parsed from content, when enabled

Average Feed Run

Object counts and Feed runtime are supplied as generalities only - objects returned by a provider can differ based on credential configurations and Feed runtime may vary based on system resources and load.

Metric Result
Run Time 5 minutes
Reports 521
Report Attributes 981
Indicators 437

Known Issues / Limitations

  • The CDF utilizes since and until dates to ensure that entries are not re-ingested if they haven't been updated. Use the Run Integration button to ingest historical entries from feeds.
  • Version 1.0.2 contained a spelling error for Volexity, which was spelled incorrectly as Veloxity.  Version 1.0.3 corrected the spelling error.  If you are upgrading from 1.0.2, run the following command to update the name of the source for data that has already been ingested into the platform:
    mysql -uthreatquotient -p"$(awk -F '=' '/password/ {print $2}' /var/www/api/app/config/database.ini)" threatquotient2 -e "UPDATE other_sources SET name='Volexity Blog' WHERE name='Veloxity Blog'" 

    The Indicator and Report pages will display the new updated name, while the older name will be seen in the Threat Library until the next Solr re-indexing.

Change Log

  • Version 1.0.9
    • Updated the URLs for several feeds. 
    • Removed the following deprecated feeds:
      • Avast Threat Labs
      • CERT Australia
      • ENISA News
      • IBM X-Force
      • NCC Group Research
      • Securlist
      • Yoroi Blog
      • Volexity
  • Version 1.0.8
    • Resolved an error that would occur when the author was the object.  
  • Version 1.0.7
    • Updated several existing RSS feeds that have been relocated.  
    • Removed the following deprecated RSS feeds:
      • Zscaler Blog
      • Dark Reading
    • Added the following RSS feeds:
      • 360 Netlab
      • AhnLab Security Emergency Response Center
      • Anheng Information
      • DCSO Cytec
      • ENISA News
      • Google Threat Analysis Group
      • Intezer
      • Jamf Threat Labs
      • Kaspersky Securelist
      • Rostelekom Solar 4Rays
      • Sekoai.io
      • SentinelOne Labs
      • Sophos Threat Research
      • Symantec Threat Intelligence
      • Trend Micro Research
      • Trustwave SpiderLabs
      • Volexity
  • Version 1.0.6
    • Updated several existing RSS feeds that have been relocated.  
    • Removed following deprecated RSS feeds:
      • BAE Systems Threat Research Blog
      • CERT Austria
      • CERT Romania
      • Cisco Security Blog
      • Check Point Threat Center
      • Contagio
      • Count Upon Security
      • Crowdstrike Blog
      • CSO Online
      • Google Online Security
      • GovCERT Switzerland
      • InfoSec Malware Analysis
      • Juniper Threat Research
      • Kryptos Logic Blog
      • Malware Analysis: The Final Frontier
      • McAfee Securing Tomorrow
      • Quick Heal
      • Recorded Future
      • Schneier on Security
      • Scrutiny from an Inquisitive Mind
      • Secureworks Threat Analysis
      • Threatpost
      • TrendMicro
      • Volexity Blog
      • We Live Security
  • Version 1.0.5
    • Upgraded the integration for compatibility with ThreatQ version 5.22.0 and later. 
    • Updated the minimum ThreatQ version to 5.11.0.
  • Version 1.0.4
    • Added several new RSS feeds that were available via the custom connector version of the integration, to the Preset RSS Feeds configuration option.  See the Configuration chapter for a complete list of available feeds.  
  • Version 1.0.3
  • Version 1.0.2
    • Resolved an issue where some RSS feeds contained encoded content with additional tags, which caused run errors.
  • Version 1.0.1
    • Resolved an issue regarding parsing dates for several custom RSS feeds.
    • Resolved an issue regarding RSS feeds consisting of a single post.  
  • Version 1.0.0
    • Initial release

PDF Guides

Document ThreatQ Version
RSS Feed Reader CDF Guide v1.0.9 5.11.0 or Greater
RSS Feed Reader CDF Guide v1.0.8 5.11.0 or Greater
RSS Feed Reader CDF Guide v1.0.7 5.11.0 or Greater
RSS Feed Reader CDF Guide v1.0.6 5.11.0 or Greater
RSS Feed Reader CDF Guide v1.0.5 5.11.0 or Greater
RSS Feed Reader CDF Guide v1.0.4 5.6.0 or Greater
RSS Feed Reader CDF Guide v1.0.3 5.6.0 or Greater
RSS Feed Reader CDF Guide v1.0.2 5.6.0 or Greater
RSS Feed Reader CDF Guide v1.0.1 5.6.0 or Greater
RSS Feed Reader CDF Guide v1.0.0 5.6.0 or Greater