Current ThreatQ Version Filter
 

SecAlliance ThreatMatch CDF

The web format of this guide reflects the most current release.  Guides for older iterations are available in PDF format.  

Integration Details

ThreatQuotient provides the following details for this integration:

Introduction

The SecAlliance ThreatMatch CDF enables analysts to automatically import alerts and profiles from ThreatMatch, along with related MITRE ATT&CK techniques, related threat actors, and other context.

The integration provides the following feeds:

  • ThreatMatch Alerts- brings in alerts from ThreatMatch, along with any related context such as related profiles (malware, threat actors, campaigns, & incidents).
    • ThreatMatch Alert Details  (supplemental)fetches details for a given Alert or ID.
  • ThreatMatch Intelligence - brings in intelligence from ThreatMatch's Profiles API. This will only bring in alerts if a profile has alerts related to it.
    • ThreatMatch Profile Details (supplemental) fetches details for a given Profile or ID.

The feeds ingest the following system objects:

  • Adversaries
    • Adversary Attributes
  • Attack Patterns
  • Campaigns
    • Campaign Attributes
  • Events
    • Event Attributes
  • Incidents
  • Indicators
  • Malware
    • Malware Attributes
  • Vulnerabilities

Prerequisites

The integrations requires the following:

  • ThreatMatch Hostname.
  • ThreatMatch Client ID.
  • ThreatMatch Client Secret.

Installation

Perform the following steps to install the integration:

The same steps can be used to upgrade the integration to a new version.

  1. Log into https://marketplace.threatq.com/.
  2. Locate and download the integration file.
  3. Navigate to the integrations management page on your ThreatQ instance.
  4. Click on the Add New Integration button.
  5. Upload the integration file using one of the following methods:
    • Drag and drop the file into the dialog box
    • Select Click to Browse to locate the integration file on your local machine
  6. Select the feeds to install, when prompted, and click Install.  

    ThreatQ will inform you if the feed already exists on the platform and will require user confirmation before proceeding. ThreatQ will also inform you if the new version of the feed contains changes to the user configuration. The new user configurations will overwrite the existing ones for the feed and will require user confirmation before proceeding.

The feed(s) will be added to the integrations page. You will still need to configure and then enable the feed(s).

Configuration

ThreatQuotient does not issue API keys for third-party vendors. Contact the specific vendor to obtain API keys and other integration-related credentials.

To configure the integration:

  1. Navigate to your integrations management page in ThreatQ.
  2. Select the Commercial option from the Category dropdown (optional).

    If you are installing the integration for the first time, it will be located under the Disabled tab.

  3. Click on the integration entry to open its details page.
  4. Enter the following parameters under the Configuration tab:

    SecAlliance ThreatMatch Intelligence Parameters

    Parameter Description
    ThreatMatch Hostname Enter your ThreatMatch Hostname without https://.
    ThreatMatch Client ID Enter your ThreatMatch Client ID.
    ThreatMatch Client Secret Enter your ThreatMatch Client Secret. 
    Ingest CVEs as Select the entity type to ingest CVEs as into the ThreatQ platform. Options include:
    • Indicators (CVEs)
    • Vulnerabilities
    Enable SSL Certificate Verification When checked, validates the host-provided SSL certificate.  This option is enabled by default.
    Disable Proxies  Enable this option if the feed should not honor proxies set in the ThreatQ UI. 

    SecAlliance ThreatMatch Intelligence Configuration Screen

    SecAlliance ThreatMatch Alerts Parameters

    Parameter Description
    ThreatMatch Hostname Enter your ThreatMatch Hostname without https://.
    ThreatMatch Client ID Enter your ThreatMatch Client ID.
    ThreatMatch Client Secret Enter your ThreatMatch Client Secret. 
    Alert Type Filter
    (ThreatMatch Alerts feed only)
    Select the type of alerts to ingest.  Options include:
    • Actor Campaigns
    • Credential Breaches
    • DDoS
    • Exploit Alert
    • General Notification
    • High Impact Vulnerabilities
    • Information leakages
    • Malware Analysis
    • Nefarious Domains
    • Nefarious Forum mention
    • New Malware
    • Pastebin dumps
    • Phishing Attempts
    • PII exposure
    • Sensitive information disclosures
    • Social Media Alerts
    • Supply chain Event
    • Technical exposure
    • Threat Actor Updates
    • Trigger events
    Alert Priority Filter
    (ThreatMatch Alerts feed only)
    Select the priority levels to filter alerts to ingest.  Options include:
    • Very Low
    • Low
    • Medium
    • High
    • Very High
    Ingest CVEs as Select the entity type to ingest CVEs as into the ThreatQ platform. Options include:
    • Indicators (CVEs)
    • Vulnerabilities
    Enable SSL Certificate Verification When checked, validates the host-provided SSL certificate.  This option is enabled by default.
    Disable Proxies  Enable this option if the feed should not honor proxies set in the ThreatQ UI. 

    SecAlliance ThreatMatch Alerts Configuration Screen
  5. Review any additional settings, make any changes if needed, and click on Save.
  6. Click on the toggle switch, located above the Additional Information section, to enable it.

ThreatQ Mapping

ThreatMatch Alerts

The ThreatMatch Alerts feed brings in alerts from ThreatMatch, along with any related context such as related profiles (malware, threat actors, campaigns, & incidents)

GET https://new.threatmatch.com/api/alerts/all

Sample Response:

{
    "list": [
        1
    ],
    "date_applied": "2020-09-23 11:26"
}

ThreatMatch Alert Details (Supplemental)

The ThreatMatch Alert Details feed fetches details for a given Alert or ID.

GET https://new.threatmatch.com/api/alerts/{{alert_id}}/edit

Sample Response:

{
    "data": [
        {
            "id": 3122,
            "status_id": 2,
            "type_id": 9,
            "priority_id": 4,
            "title": "Chinese Group Targeting French National Cybersecurity Agency (ANSSI)",
            "known_as": "",
            "slug": "chinese-group-targeting-french-national-cybersecurity-agency-anssi",
            "image": null,
            "content":"{\"overview_text\":\"<p>France's Agence nationale de la sécurité des systémes d’information (ANSSI, French National Agency for the Security of Information Systems) has revealed it is now dealing with a \\\"massive\\\" hacking campaign being conducted by the China-linked advanced persistent threat (APT) group APT31 (Zirconium, Judgment Panda). While ANSSI did not disclose which sectors were being targeted, it stated that it is asking French organizations to investigate whether they have been compromised. According to ANSSI, APT31's activity in France is an ongoing, \\\"large intrusion campaign of compromise.\\\" According to Ben Koehl with Microsoft's Threat Intelligence Center, \\\"Zirconium appears to operate numerous router networks to facilitate these actions. They are layered together and strategically used. If investigating these IP addresses they should be used mostly as source IPs but on occasion they are pointing implant traffic into the network. Historically they did the classic I have a dnsname -&gt; ip approach for C2 communications. They've since moved that traffic into the router network. This allows them flexibility to manipulate the traffic destination at several layers while slowing the efforts of pursuit elements.\\\"<\\/p>\",\"overview_gallery\":[],\"tags_connectors\":[{\"id\":478,\"name\":\"France\",\"type\":\"tag\",\"text\":\"France (tag)\",\"title\":\"France\"},{\"id\":2002,\"name\":\"Europe\",\"type\":\"tag\",\"text\":\"Europe (tag)\",\"title\":\"Europe\"},{\"id\":2040,\"name\":\"Government & public services\",\"type\":\"tag\",\"text\":\"Government &amp; public services (tag)\",\"title\":\"Government & public services\"}],\"sector-relevance_sector_relevance\":\"<p>Government & public services<\\/p>\",\"mitre-tags_mitre_navigator_tags_selection_summary\":[{\"id\":794,\"type\":\"tag\"}]}",
            "update_notes": null,
            "are_numbered_headings_enabled": false,
            "is_table_included_in_pdf": false,
            "pdf_cover_enabled": false,
            "notes": null,
            "published": 1,
            "publish_now": 1,
            "publish_on": null,
            "published_at": "2021-07-28 15:31:23",
            "updated_at": "2021-08-05 13:35:37",
            "additional_dates": {
                "event_date": "2021-06-30T22:00:00.000Z",
                "discovery_date": "2021-07-07T22:00:00.000Z"
            },
            "tlp": {
                "colour": "green",
                "caveat": null,
                "shortcode": "green",
                "colour_code": "#3AAA35",
                "label": "TLP: GREEN",
                "description": "Limited disclosure, restricted to the community.",
                "classification_title": "",
                "classification_description": ""
            },
            "published_updated_at": null,
            "update_summary": "<p>France’s national cybersecurity agency said on Wednesday that it is contending with a massive campaign by Chinese state-backed hackers targeting French organizations through compromised routers.</p>",
            "is_linear_content_builder": true,
            "published_insignificant_updated_at": "2021-08-05 13:35:36",
            "is_simple_mode_enabled": false,
            "priorityName": "High",
            "is_flagged": false,
            "tag_tactics": {
                "794": [
                    9
                ]
            },
            "tags": [
                478,
                794,
                2002,
                2040
            ],
            "tagsFull": [
                {
                    "id": 478,
                    "name": "France",
                    "slug": "france",
                    "sort_id": 0,
                    "created_at": "2019-05-09 11:49:01",
                    "updated_at": "2019-05-09 11:49:01",
                    "stix_type": null,
                    "misp_name": null,
                    "mitre_technique_id": null,
                    "parent_tag_id": null,
                    "is_deprecated": false,
                    "pivot": {
                        "mapped_item_id": 2848,
                        "tag_id": 478,
                        "content_section_id": null
                    }
                },
                {
                    "id": 794,
                    "name": "T1190 - Exploit public-facing application",
                    "slug": "t1190-exploit-public-facing-application",
                    "sort_id": 0,
                    "created_at": "2019-05-09 11:49:02",
                    "updated_at": "2021-06-22 07:13:35",
                    "stix_type": null,
                    "misp_name": null,
                    "mitre_technique_id": 211,
                    "parent_tag_id": null,
                    "is_deprecated": false,
                    "pivot": {
                        "mapped_item_id": 2848,
                        "tag_id": 794,
                        "content_section_id": null
                    }
                },
                {
                    "id": 2002,
                    "name": "Europe",
                    "slug": "europe",
                    "sort_id": 0,
                    "created_at": "2019-05-09 11:49:05",
                    "updated_at": "2019-05-09 11:49:05",
                    "stix_type": null,
                    "misp_name": null,
                    "mitre_technique_id": null,
                    "parent_tag_id": null,
                    "is_deprecated": false,
                    "pivot": {
                        "mapped_item_id": 2848,
                        "tag_id": 2002,
                        "content_section_id": null
                    }
                },
                {
                    "id": 2040,
                    "name": "Government & public services",
                    "slug": "government-public-services",
                    "sort_id": 0,
                    "created_at": "2019-05-09 11:49:05",
                    "updated_at": "2019-05-09 11:49:05",
                    "stix_type": null,
                    "misp_name": null,
                    "mitre_technique_id": null,
                    "parent_tag_id": null,
                    "is_deprecated": false,
                    "pivot": {
                        "mapped_item_id": 2848,
                        "tag_id": 2040,
                        "content_section_id": null
                    }
                }
            ],
            "related": [
                2369,
                2384
            ],
            "related_alerts": [],
            "related_scenarios": [],
            "author": "ThreatQuotient",
            "author_id": 656,
            "relevanceName": "Global",
            "relevanceSlug": "global",
            "text_relevance": "Government & public services",
            "mitre_navigator_data": {
                "matrices": [
                    {
                        "id": 2,
                        "sort_id": 0
                    }
                ],
                "matricesNames": {
                    "2": "Enterprise"
                },
                "tacticsIds": [
                    9
                ],
                "techniques": {
                    "211": {
                        "9": {
                            "colour_grade": 1
                        }
                    }
                },
                "tacticsNames": {
                    "9": "Initial Access"
                },
                "techniquesNames": {
                    "211": {
                        "name": "T1190 - Exploit Public-Facing Application",
                        "description": "<p>Adversaries may attempt to take advantage of a weakness in an Internet-facing computer or program using software, data, or commands in order to cause unintended or unanticipated behavior. The weakness in the system can be a bug, a glitch, or a design vulnerability. These applications are often websites, but can include databases (like SQL)(Citation: NVD CVE-2016-6662), standard services (like SMB(Citation: CIS Multiple SMB Vulnerabilities) or SSH), network device administration and management protocols (like SNMP and Smart Install(Citation: US-CERT TA18-106A Network Infrastructure Devices 2018)(Citation: Cisco Blog Legacy Device Attacks)), and any other applications with Internet accessible open sockets, such as web servers and related services.(Citation: NVD CVE-2014-7169) Depending on the flaw being exploited this may include Exploitation for Defense Evasion. </p>\n<p>If an application is hosted on cloud-based infrastructure and/or is containerized, then exploiting it may lead to compromise of the underlying instance or container. This can allow an adversary a path to access the cloud or container APIs, exploit container host access via Escape to Host, or take advantage of weak identity and access management policies.</p>\n<p>For websites and databases, the OWASP top 10 and CWE top 25 highlight the most common web-based vulnerabilities.(Citation: OWASP Top 10)(Citation: CWE top 25)</p>",
                        "is_detectable_by_common_defenses": null,
                        "detectable_by_common_defenses_explanation": null,
                        "difficulty_for_adversary": null,
                        "difficulty_for_adversary_explanation": null,
                        "detection": "<p>Monitor application logs for abnormal behavior that may indicate attempted or successful exploitation. Use deep packet inspection to look for artifacts of common exploit traffic, such as SQL injection. Web Application Firewalls may detect improper inputs attempting exploitation.</p>",
                        "tactics_ids": [
                            9
                        ],
                        "matrix_id": 2
                    }
                }
            },
            "linked_profiles": [
                {
                    "id": 2369,
                    "title": "APT31",
                    "listing_description": null,
                    "capability_id": 4,
                    "type_id": 1,
                    "misp_cluster_name": null,
                    "created_at": "2021-07-28 15:32:51",
                    "published_at": "2021-07-28 15:34:26",
                    "published_updated_at": null,
                    "published_insignificant_updated_at": null,
                    "typeName": "Threat Actor",
                    "typeSlug": "threat-actor",
                    "capabilityName": "High"
                },
                {
                    "id": 2384,
                    "title": "Judgement Panda",
                    "listing_description": null,
                    "capability_id": 4,
                    "type_id": 1,
                    "misp_cluster_name": null,
                    "created_at": "2021-08-05 13:26:42",
                    "published_at": "2021-08-05 13:28:44",
                    "published_updated_at": null,
                    "published_insignificant_updated_at": "2021-08-05 13:30:39",
                    "typeName": "Threat Actor",
                    "typeSlug": "threat-actor",
                    "capabilityName": "High"
                }
            ],
            "linked_alerts": [],
            "comments": [],
            "total_comments_count": 0,
            "profile_types": [
                {
                    "id": 1,
                    "name": "Threat Actor",
                    "slug": "threat-actor",
                    "created_at": "2019-04-05 13:28:46",
                    "updated_at": "2020-07-07 07:14:01",
                    "stix_type": "threat-actor",
                    "acronym": "TA"
                },
                {
                    "id": 2,
                    "name": "Country",
                    "slug": "country",
                    "created_at": "2019-04-05 13:28:46",
                    "updated_at": "2020-07-07 07:14:01",
                    "stix_type": "threat-actor",
                    "acronym": "C"
                },
                {
                    "id": 3,
                    "name": "Incident",
                    "slug": "incident",
                    "created_at": "2019-04-05 13:28:46",
                    "updated_at": "2020-07-07 07:14:01",
                    "stix_type": "campaign",
                    "acronym": "I"
                },
                {
                    "id": 4,
                    "name": "Operation",
                    "slug": "operation",
                    "created_at": "2019-04-05 13:28:46",
                    "updated_at": "2020-07-07 07:14:01",
                    "stix_type": "campaign",
                    "acronym": "O"
                },
                {
                    "id": 5,
                    "name": "Malware & Tools",
                    "slug": "malware-tools",
                    "created_at": "2019-04-05 13:28:46",
                    "updated_at": "2020-07-07 07:14:01",
                    "stix_type": "malware",
                    "acronym": "MT"
                }
            ],
            "alert_types": [
                {
                    "id": 9,
                    "name": "Actor Campaigns",
                    "slug": "actor-campaigns",
                    "acronym": "AC"
                },
                {
                    "id": 2,
                    "name": "Credential Breaches",
                    "slug": "credential-breaches",
                    "acronym": "CB"
                },
                {
                    "id": 12,
                    "name": "DDoS",
                    "slug": "ddos",
                    "acronym": "D"
                },
                {
                    "id": 17,
                    "name": "Exploit Alert",
                    "slug": "exploit-alert",
                    "acronym": "EA"
                },
                {
                    "id": 1,
                    "name": "General Notification",
                    "slug": "general-notification",
                    "acronym": "GN"
                },
                {
                    "id": 7,
                    "name": "High Impact Vulnerabilities",
                    "slug": "high-impact-vulnerabilities",
                    "acronym": "HI"
                },
                {
                    "id": 6,
                    "name": "Information leakages",
                    "slug": "information-leakages",
                    "acronym": "IL"
                },
                {
                    "id": 10,
                    "name": "Malware Analysis",
                    "slug": "malware-analysis",
                    "acronym": "MA"
                },
                {
                    "id": 13,
                    "name": "Nefarious Domains",
                    "slug": "nefarious-domains",
                    "acronym": "ND"
                },
                {
                    "id": 8,
                    "name": "Nefarious Forum mention",
                    "slug": "nefarious-forum-mention",
                    "acronym": "NF"
                },
                {
                    "id": 11,
                    "name": "New Malware",
                    "slug": "new-malware",
                    "acronym": "NM"
                },
                {
                    "id": 4,
                    "name": "Pastebin dumps",
                    "slug": "pastebin-dumps",
                    "acronym": "PD"
                },
                {
                    "id": 3,
                    "name": "Phishing Attempts",
                    "slug": "phishing-attempts",
                    "acronym": "PA"
                },
                {
                    "id": 16,
                    "name": "PII exposure",
                    "slug": "pii-exposure",
                    "acronym": "PE"
                },
                {
                    "id": 5,
                    "name": "Sensitive information disclosures",
                    "slug": "sensitive-information-disclosures",
                    "acronym": "SI"
                },
                {
                    "id": 20,
                    "name": "Social Media Alerts",
                    "slug": "social-media-alerts",
                    "acronym": "SM"
                },
                {
                    "id": 14,
                    "name": "Supply chain Event",
                    "slug": "supply-chain-event",
                    "acronym": "SC"
                },
                {
                    "id": 15,
                    "name": "Technical exposure",
                    "slug": "technical-exposure",
                    "acronym": "TE"
                },
                {
                    "id": 19,
                    "name": "Threat Actor Updates",
                    "slug": "threat-actor-updates",
                    "acronym": "TA"
                },
                {
                    "id": 18,
                    "name": "Trigger events",
                    "slug": "trigger-events",
                    "acronym": "TE"
                }
            ]
        }
    ]
}

ThreatMatch Intelligence

The ThreatMatch Intelligence feed brings in intelligence from ThreatMatch's Profiles API. This will only bring in alerts if a profile has alerts related to it.

GET https://new.threatmatch.com/api/profiles/all

Sample Response:

{
    "list": [
        1
    ],
    "date_applied": "2020-09-23 11:26"
}

ThreatMatch Profile Details (Supplemental)

The ThreatMatch Profile Details feed fetches details for a given Profile or ID.

GET https://new.threatmatch.com/api/profiles/{{profile_id}}/edit

Sample Response:

{
    "data": [
        {
            "additional_dates": null,
            "alert_types": [
                {
                    "acronym": "AC",
                    "id": 9,
                    "name": "Actor Campaigns",
                    "slug": "actor-campaigns"
                },
                {
                    "acronym": "CB",
                    "id": 2,
                    "name": "Credential Breaches",
                    "slug": "credential-breaches"
                },
                {
                    "acronym": "D",
                    "id": 12,
                    "name": "DDoS",
                    "slug": "ddos"
                },
                {
                    "acronym": "EA",
                    "id": 17,
                    "name": "Exploit Alert",
                    "slug": "exploit-alert"
                },
                {
                    "acronym": "GN",
                    "id": 1,
                    "name": "General Notification",
                    "slug": "general-notification"
                },
                {
                    "acronym": "HI",
                    "id": 7,
                    "name": "High Impact Vulnerabilities",
                    "slug": "high-impact-vulnerabilities"
                },
                {
                    "acronym": "IL",
                    "id": 6,
                    "name": "Information leakages",
                    "slug": "information-leakages"
                },
                {
                    "acronym": "MA",
                    "id": 10,
                    "name": "Malware Analysis",
                    "slug": "malware-analysis"
                },
                {
                    "acronym": "ND",
                    "id": 13,
                    "name": "Nefarious Domains",
                    "slug": "nefarious-domains"
                },
                {
                    "acronym": "NF",
                    "id": 8,
                    "name": "Nefarious Forum mention",
                    "slug": "nefarious-forum-mention"
                },
                {
                    "acronym": "NM",
                    "id": 11,
                    "name": "New Malware",
                    "slug": "new-malware"
                },
                {
                    "acronym": "PD",
                    "id": 4,
                    "name": "Pastebin dumps",
                    "slug": "pastebin-dumps"
                },
                {
                    "acronym": "PA",
                    "id": 3,
                    "name": "Phishing Attempts",
                    "slug": "phishing-attempts"
                },
                {
                    "acronym": "PE",
                    "id": 16,
                    "name": "PII exposure",
                    "slug": "pii-exposure"
                },
                {
                    "acronym": "SI",
                    "id": 5,
                    "name": "Sensitive information disclosures",
                    "slug": "sensitive-information-disclosures"
                },
                {
                    "acronym": "SM",
                    "id": 20,
                    "name": "Social Media Alerts",
                    "slug": "social-media-alerts"
                },
                {
                    "acronym": "SC",
                    "id": 14,
                    "name": "Supply chain Event",
                    "slug": "supply-chain-event"
                },
                {
                    "acronym": "TE",
                    "id": 15,
                    "name": "Technical exposure",
                    "slug": "technical-exposure"
                },
                {
                    "acronym": "TA",
                    "id": 19,
                    "name": "Threat Actor Updates",
                    "slug": "threat-actor-updates"
                },
                {
                    "acronym": "TE",
                    "id": 18,
                    "name": "Trigger events",
                    "slug": "trigger-events"
                }
            ],
            "associated_alerts_ids": [
                3156
            ],
            "associated_profiles_ids": [],
            "author": "ThreatQuotient",
            "author_id": 692,
            "capabilityName": "Very High",
            "capability_id": 5,
            "comments": [],
            "content": "{\"summary_gallery\":[],\"summary_text\":\"<p>This is a country :)<\\/p>\"}",
            "id": 2404,
            "image": "",
            "is_flagged": false,
            "is_linear_content_builder": true,
            "is_simple_mode_enabled": true,
            "known_as": "USA",
            "linked_alerts": [
                {
                    "capabilityName": "Medium",
                    "created_at": "2021-08-18T14:45:02.000000Z",
                    "id": 3156,
                    "priority_id": 3,
                    "published_at": "2021-08-18T14:45:28.000000Z",
                    "published_insignificant_updated_at": "2021-08-19T13:54:00.000000Z",
                    "published_updated_at": null,
                    "relevanceName": "Global",
                    "relevanceSlug": "global",
                    "title": "Malware Analysis of Nanocore RAT",
                    "typeName": "Malware Analysis",
                    "typeSlug": "malware-analysis",
                    "type_id": 10
                }
            ],
            "linked_profiles": [],
            "listing_description": "The land of the \"free\"",
            "misp_cluster_name": null,
            "mitre_navigator_data": {
                "matrices": [],
                "matricesNames": [],
                "tacticsIds": [],
                "tacticsNames": [],
                "techniques": [],
                "techniquesNames": []
            },
            "notes": null,
            "pdf_cover_enabled": false,
            "profile_types": [
                {
                    "acronym": "TA",
                    "created_at": "2019-04-05T12:28:46.000000Z",
                    "id": 1,
                    "name": "Threat Actor",
                    "slug": "threat-actor",
                    "stix_type": "threat-actor",
                    "updated_at": "2020-07-07T06:14:01.000000Z"
                },
                {
                    "acronym": "C",
                    "created_at": "2019-04-05T12:28:46.000000Z",
                    "id": 2,
                    "name": "Country",
                    "slug": "country",
                    "stix_type": "threat-actor",
                    "updated_at": "2020-07-07T06:14:01.000000Z"
                },
                {
                    "acronym": "I",
                    "created_at": "2019-04-05T12:28:46.000000Z",
                    "id": 3,
                    "name": "Incident",
                    "slug": "incident",
                    "stix_type": "campaign",
                    "updated_at": "2020-07-07T06:14:01.000000Z"
                },
                {
                    "acronym": "O",
                    "created_at": "2019-04-05T12:28:46.000000Z",
                    "id": 4,
                    "name": "Operation",
                    "slug": "operation",
                    "stix_type": "campaign",
                    "updated_at": "2020-07-07T06:14:01.000000Z"
                },
                {
                    "acronym": "MT",
                    "created_at": "2019-04-05T12:28:46.000000Z",
                    "id": 5,
                    "name": "Malware & Tools",
                    "slug": "malware-tools",
                    "stix_type": "malware",
                    "updated_at": "2020-07-07T06:14:01.000000Z"
                }
            ],
            "publish_now": 1,
            "publish_on": null,
            "published": 1,
            "published_at": "2021-08-19T13:52:39.000000Z",
            "published_insignificant_updated_at": null,
            "published_updated_at": null,
            "related": [],
            "related_alerts": [
                3156
            ],
            "related_scenarios": [],
            "relevanceName": "Global",
            "relevanceSlug": "global",
            "slug": "united-states-of-america-1",
            "status_id": 2,
            "tag_tactics": [],
            "tags": [],
            "tagsFull": [],
            "text_relevance": "",
            "title": "United States of America",
            "tlp": {
                "caveat": null,
                "classification_description": "",
                "classification_title": "",
                "colour": "green",
                "colour_code": "#3AAA35",
                "description": "Limited disclosure, restricted to the community.",
                "label": "TLP: GREEN",
                "shortcode": "green"
            },
            "total_comments_count": 0,
            "typeName": "Country",
            "typeSlug": "country",
            "type_id": 2,
            "update_summary": null,
            "updated_at": "2021-08-19T13:52:40.000000Z"
        }
    ]
}

Universal Mapping Tables

ThreatQuotient provides the following default mapping for the ThreatMatch Alert Details and ThreatMatch Profile Details supplemental feeds:

Feed Data Path ThreatQ Entity ThreatQ Object Type or Attribute Key Normalization Published Date Examples Notes
data.title Event Title Alert N/A data.additional_dates.event_date Chinese Group Targeting French National Cybersecurity Agency (ANSSI) N/A
data.tlp.colour TLP Event, Attribute N/A N/A green N/A
data.priorityName Attribute Priority N/A data.published_at High N/A
data.additional_dates.discovery_date Attribute Discovery Date N/A data.published_at N/A N/A
data.alert_types[].name Attribute Alert Type N/A data.published_at Actor Campaigns Only if the data.type_id matches the id
data.profile_types[].name Attribute Profile Type N/A data.published_at Threat Actor Only if an id from the data.linked_profiles matches the id
data.is_flagged Attribute Is Flagged bool -> string data.published_at True N/A
data.relevanceName Attribute Relevance N/A data.published_at Global N/A
data.text_relevance Attribute Sector Relevance N/A data.published_at Government & public services N/A
data.mitre_navigator_data.tacticsNames Attribute Tactic N/A data.published_at Initial Access We only want the values from this dict
data.tagsFull Name Tag N/A N/A France We ignore MITRE techniques & CVEs
data.tagsFull Value Attack Pattern N/A data.published_at T1190 - Exploit Public-Facing Application Parsed for MITRE Techniques (if the key is not null)
data.tagsFull Indicator Value CVE N/A data.published_at CVE-2021-00001 Parsed for CVEs
data.tagsFull Attribute Target Geography N/A data.published_at United States If the content_section_id == target-geography_connectors
data.tagsFull Attribute Country of Origin N/A data.published_at United States If the content_section_id == country-of-origin_connectors
data.tagsFull Attribute Category N/A data.published_at United States If the content_section_id == category_connectors
data.tagsFull Attribute Motivation N/A data.published_at United States If the content_section_id == motivation_connectors
data.tagsFull Attribute Intended Effect N/A data.published_at United States If the content_section_id == intended-effect_connectors
data.id Attribute ThreatMatch Link N/A data.published_at N/A Concatenated with the portal URL
data.content.overview_text/assessment/dates_date_assessment Indicator Value CVE N/A data.published_at N/A Parsed for CVEs
data.content.overview_text/assessment/dates_date_assessment Indicator Value MD5 N/A data.published_at N/A Parsed for MD5s
data.content.overview_text/assessment/dates_date_assessment Indicator Value SHA-1 N/A data.published_at N/A Parsed for SHA-1s
data.content.overview_text/assessment/dates_date_assessment Indicator Value SHA-256 N/A data.published_at N/A Parsed for SHA-256s
data.content.overview_text/assessment/dates_date_assessment Indicator Value SHA-512 N/A data.published_at N/A Parsed for SHA-512s
data.capabilityName Attribute Capability N/A data.published_at High N/A
data.known_as Attribute Known As N/A data.published_at Carbanak N/A
data.notes Attribute Note N/A data.published_at N/A N/A
data.content.malware_malware_family Attribute Malware Family N/A data.published_at Trojan N/A
data.content.malware_malware_type Attribute Malware Type N/A data.published_at Remote Administrative Trojan N/A
data.linked_profiles[].title Attribute Country N/A data.published_at United States If the slugType == country
data.linked_profiles[].title Value Malware N/A data.published_at Carbanak If the slugType == malware-tools
data.linked_profiles[].title Value Campaign N/A data.published_at Operation Sandstorm If the slugType == operation
data.linked_profiles[].title Name Adversary N/A data.published_at APT31 If the slugType == threat-actor
data.linked_profiles[].title Value Incident N/A data.published_at N/A If the slugType == incident
data.priorityName Attribute Priority N/A data.published_at Very High N/A
data.author Attribute Author N/A data.published_at ThreatQuotient N/A

Average Feed Run

Object counts and Feed runtime are supplied as generalities only - objects returned by a provider can differ based on credential configurations and Feed runtime may vary based on system resources and load.

ThreatMatch Alerts

Metric Result
Run Time 1 minute
Adversaries 1
Adversary Attributes 22
Attack Patterns 9
Campaigns 1
Campaign Attributes 4
Events 6
Event Attributes 34
Indicators 16
Malware 1
Malware Attributes 14

ThreatMatch Intelligence

Metric Result
Run Time 1 minute
Adversaries 3
Adversary Attributes 39
Attack Patterns 9
Campaigns 1
Campaign Attributes 6
Events 3
Event Attributes 32
Incidents 1
Incident Attributes 6
Malware 1
Malware Attributes 16

Change Log

  • Version 1.1.2
    • Resolved a filter mapping error that would occur when ingesting CVE vulnerabilities.  
    • Updated the minimum ThreatQ version to 5.5.0.
  • Version 1.1.1
    • Resolved a FilterMapping error.
    • Added the following new configuration parameters:
      • Enable SSL Certificate Verification - enable or disable verification of the server's SSL certificate. 
      • Disable Proxies - determine if the feed should honor proxy configurations set in the ThreatQ UI.
      • Ingest CVES as - determine if the feeds will ingest CVEs as indicators or vulnerabilities.  
  • Version 1.1.0
    • Added Hostname configuration option.
    • Rebranded CDF from ThreatMatch to SecAlliance Threat Match.  
    • Updated Support Tier from Not Actively Supported to ThreatQ Supported.
  • Version 1.0.0
    • Initial Release

PDF Guides

Document ThreatQ Version
SecAlliance ThreatMatch CDF Guide v1.1.2 5.5.0 or Greater
SecAlliance ThreatMatch CDF Guide v1.1.1 4.35.0 or Greater
SecAlliance ThreatMatch CDF Guide v1.1.0 4.35.0 or Greater
ThreatMatch CDF Guide v1.0.0 4.35.0 or Greater