CCN CERT Reyes Operation
The web format of this guide reflects the most current release. Guides for older iterations are available in PDF format.
Integration Details
ThreatQuotient provides the following details for this integration:
Current Integration Version | 1.0.0 |
Compatible with ThreatQ Versions | >= 5.21.0 |
Support Tier | ThreatQ Supported |
Introduction
The CCN CERT Reyes operation enriches data in the ThreatQ platform that has been ingested from CCN CERT Reyes search endpoints.
The integration provides the following action:
- Enrich - submits the selected indicator for enrichment using the CCN CERT Reyes API.
The integration is with compatible with the following indicator types:
- FQDN
- IP Address
- URL
Prerequisites
The following is required to run the integration:
- Reyes Hostname
- Reyes API Key
- Reyes Client Certificate in PEM format
- Reyes Client Certificate Key
Installation
Perform the following steps to install the integration:
The same steps can be used to upgrade the integration to a new version.
- Log into https://marketplace.threatq.com/.
- Locate and download the integration file.
- Navigate to the integrations management page on your ThreatQ instance.
- Click on the Add New Integration button.
- Upload the integration file using one of the following methods:
- Drag and drop the file into the dialog box
- Select Click to Browse to locate the integration file on your local machine
ThreatQ will inform you if the operation already exists on the platform and will require user confirmation before proceeding. ThreatQ will also inform you if the new version of the operation contains changes to the user configuration. The new user configurations will overwrite the existing ones for the operation and will require user confirmation before proceeding.
The operation is now installed and will be displayed in the ThreatQ UI. You will still need to configure and then enable the operation.
Configuration
ThreatQuotient does not issue API keys for third-party vendors. Contact the specific vendor to obtain API keys and other integration-related credentials.
To configure the integration:
- Navigate to your integrations management page in ThreatQ.
- Select the Operation option from the Type dropdown (optional).
- Click on the integration entry to open its details page.
- Enter the following parameters under the Configuration tab:
Parameter Description Hostname Enter the hostname for the Reyes API. API Key Enter your API Key. Client Certificate (PEM) Enter client certificate in PEM format. Client Certificate Key Enter the client certificate key. Verify SSL Enable this parameter if the operation should validate the host-provided SSL certificate. Bypass system proxy configuration for this operation Enable this parameter to bypass proxy settings set in the ThreatQ UI.
- Review any additional settings, make any changes if needed, and click on Save.
- Click on the toggle switch, located above the Additional Information section, to enable it.
Actions
The CCN CERT Reyes operation provides a single action, Enrich, which queries a user-selected tool for object enrichment. You will be prompted to select which tool to use after you have selected the operation for an object. In addition to selecting an enrichment tool, you can also enable the Test Authentication and Get Raw Data parameter to test the authentication and retrieve raw data without processing.
Tool options, and the indicator types their support, are as follows:
Tool | Object Types | Object SubTypes |
---|---|---|
DomainTools | Indicator | FQDN, IP Address |
GreyNoise | Indicator | IP Address |
Intel CTR | Indicator | IP Address |
RiskIQ | Indicator | FQDN, IP Address |
Shodan | Indicator | FQDN, IP Address |
VirusTotal | Indicator | FQDN, IP Address, URL |
Enrich - DomainTools
The DomainTools tool option for the Enrich action supports FQDN and IP Address type indicators.
FQDN
GET {HOSTNAME}/apireyes/api/v4/search/tool/domain-tools?domain:infomanage28391.cfd
Sample Response:
{
"success": true,
"data": {
"infomanage28391.cfd": {
"ip": [
{
"value": "172.67.212.97",
"lastResolved": "2024-11-25T03:29:05.000Z"
},
{
"value": "104.21.61.171",
"lastResolved": "2024-11-25T03:29:05.000Z"
}
],
"whoIsDomainItem": {
"auditUpdateDate": "2024-11-25T03:29:05.000Z",
"createdDate": "2024-09-12T02:00:00.000Z",
"dataObject": {
"createdDate": "2024-09-12",
"updatedDate": "2024-11-25T02:29:05.984000",
"expiresDate": "2025-09-12",
"registrant": {
"countryCode": "US",
"organization": "Global Domain Group Privacy Service",
"state": "California",
"name": ""
},
"registrantContact": {},
"technicalContact": {
"countryCode": "",
"city": "",
"organization": "",
"state": "",
"email": "please query the rdds service of the registrar of record identified in this output for information on how to contact the registrant, admin, or tech contact of the queried domain name.",
"name": ""
},
"domainName": "infomanage28391.cfd",
"nameServers": [
"ARIELLA.NS.CLOUDFLARE.COM",
"NOEL.NS.CLOUDFLARE.COM"
],
"active": false,
"status": [
"addperiod",
"clienttransferprohibited",
"servertransferprohibited"
],
"parseCode": 0,
"audit": {},
"registrarName": "Global Domain Group LLC",
"registryData": {
"parseCode": 0
},
"estimatedDomainAge": 0,
"ipLocation": "US",
"isp": "CloudFlare Inc.",
"ipAddress": "172.67.212.97",
"asn": "AS13335",
"billingContact": {},
"zoneContact": {},
"administrativeContact": {
"countryCode": "",
"city": "",
"state": "",
"email": "please query the rdds service of the registrar of record identified in this output for information on how to contact the registrant, admin, or tech contact of the queried domain name.",
"name": ""
}
},
"historyObject": []
}
}
},
"error": [
null
]
}
ThreatQuotient provides the following default mapping for FQDN objects using the DomainTools tool based on .data.<fqdn_value>.domain
entry.
Feed Data Path | ThreatQ Entity | ThreatQ Object Type or Attribute Key | Published Date | Examples | Notes |
---|---|---|---|---|---|
.ip[].value | Related Indicator.Value | IP Address | N/A | 172.67.212.97 | N/A |
.whoIsDomainItem.dataObject.registrant.organization | Attribute | Organization | N/A | Global Domain Group Privacy Service | N/A |
.whoIsDomainItem.dataObject.registrant.countryCode | Attribute | Country | N/A | US | N/A |
.whoIsDomainItem.dataObject.registrant.state | Attribute | State | N/A | California | N/A |
.whoIsDomainItem.dataObject.registrant.city | Attribute | City | N/A | N/A | N/A |
.whoIsDomainItem.dataObject.status[] | Attribute | Status | N/A | clienttransferprohibited | N/A |
.whoIsDomainItem.dataObject.nameServers[] | Attribute | Name Server | N/A | ARIELLA.NS.CLOUDFLARE.COM | N/A |
IP Address
GET {HOSTNAME}/apireyes/api/v4/search/tool/domain-tools?ip:8.8.8.8
Sample Response:
{
"success": true,
"data": {
"8.8.8.8": {
"whoIsIPItem": [
{
"cidr": "8.8.8.0/24",
"auditUpdateDate": "2023-12-28T01:00:00.000Z",
"createdDate": "2023-12-28T01:00:00.000Z",
"dataObject": {
"abuseContact": {
"telephone": "16502530000",
"email": "network-abuse@google.com",
"name": "ABUSE"
},
"registrant": {
"countryCode": "US",
"city": "Mountain View",
"postalCode": "94043",
"street": "1600 Amphitheatre Parkway",
"organization": "Google LLC (GOGL)",
"state": "CA",
"name": "GOOGLE LLC"
},
"registrantContact": {},
"technicalContact": {
"telephone": "16502530000",
"email": "arin-contact@google.com",
"name": "GOOGLE LLC"
},
"nameServers": [],
"active": false,
"status": [
"Direct Allocation"
],
"parseCode": 0,
"audit": {},
"registryData": {
"parseCode": 0
},
"estimatedDomainAge": 0,
"billingContact": {},
"zoneContact": {},
"administrativeContact": {
"telephone": "16502530000",
"email": "arin-contact@google.com",
"name": "GOOGLE LLC"
}
}
}
]
}
},
"error": [
null
]
}
ThreatQuotient provides the following default mapping for IP Address objects using the Domaintools tool option based on .data.<ip_address_value>
entry.
Feed Data Path | ThreatQ Entity | ThreatQ Object Type or Attribute Key | Published Date | Examples | Notes |
---|---|---|---|---|---|
.whoIsIPItem[].cidr | Attribute | CIDR | N/A | 8.8.8.0/24 | N/A |
.whoIsIPItem[].dataObject.registrant.organization | Attribute | Organization | N/A | Google LLC (GOGL) | N/A |
.whoIsIPItem[].dataObject.registrant.countryCode | Attribute | Country | N/A | US | N/A |
.whoIsIPItem[].dataObject.registrant.state | Attribute | State | N/A | CA | N/A |
.whoIsIPItem[].dataObject.registrant.city | Attribute | City | N/A | Mountain View | N/A |
.whoIsIPItem[].dataObject.status[] | Attribute | Status | N/A | Direct Allocation | N/A |
.whoIsIPItem[].dataObject.nameServers[] | Attribute | Name Server | N/A | N/A | N/A |
Enrich - GreyNoise
The GreyNoise tool option for the Enrich action supports IP Address type indicators.
IP Address
GET {HOSTNAME}/apireyes/api/v4/search/tool/greynoise?ip:8.8.8.8
Sample Response:
{
"success": true,
"data": {
"8.8.8.8": {
"noise": [],
"riot": [
{
"ip": "8.8.8.8",
"category": "public_dns",
"description": "Google's global domain name system (DNS) resolution service.",
"explanation": "Public DNS services are used as alternatives to ISP's name servers. You may see devices on your network communicating with Google Public DNS over port 53/TCP or 53/UDP to resolve DNS lookups.",
"lastUpdated": "2024-11-25T13:11:02.000Z",
"name": "8.8.8.8",
"reference": "https://developers.google.com/speed/public-dns/docs/isp#alternative",
"riot": true,
"trustLevel": "1"
}
]
}
},
"error": [
null
]
}
ThreatQuotient provides the following default mapping for IP Address object types using the GreyNoise tool based on .data.<ip_address_value>
entry.
Feed Data Path | ThreatQ Entity | ThreatQ Object Type or Attribute Key | Published Date | Examples | Notes |
---|---|---|---|---|---|
.riot[].category | Attribute | Category | N/A | public_dns | N/A |
.riot[].description | Attribute | Description | N/A | Google's global domain name system (DNS) resolution service | N/A |
.riot[].explanation | Attribute | Explanation | N/A | Public DNS services are used as alternatives to ISP's name servers... | N/A |
.riot[].lastUpdated | Attribute | Last Updated | N/A | 2024-11-25T13:11:02.000Z | N/A |
.riot[].reference | Attribute | Reference | N/A | https://developers.google.com/speed/public-dns/docs/isp#alternative | N/A |
.riot[].riot | Attribute | Riot | N/A | True | N/A |
.riot[].trustLevel | Attribute | Trust Level | N/A | 1 | N/A |
.riot[].description | Indicator Description | N/A | N/A | Google's global domain name system (DNS) resolution service | Concatenated with the other fields. |
.riot[].explanation | Indicator Description | N/A | N/A | Public DNS services are used as alternatives to ISP's name servers... | Concatenated with the other fields. |
.noise[].classification | Attribute | Classification | N/A | public_dns | N/A |
.noise[].first_seen | Attribute | First Seen | N/A | 2024-11-25T13:11:02.000Z | N/A |
.noise[].last_seen | Attribute | Last Seen | N/A | 2024-11-25T13:11:02.000Z | N/A |
.noise[].actor | Attribute | Actor | N/A | Bad Actor | N/A |
.noise[].bot | Attribute | Bot | N/A | Gemini | N/A |
.noise[].cve[] | Indicator | CVE | N/A | CVE-2020-9484 | N/A |
.noise[].metadata.asn | Attribute | ASN | N/A | AS20473 | N/A |
.noise[].metadata.city | Attribute | City | N/A | Los Angeles | N/A |
.noise[].metadata.country_code | Attribute | Country | N/A | US | N/A |
.noise[].metadata.organization | Attribute | Organization | N/A | The Constant Company, LLC | N/A |
.noise[].metadata.category | Attribute | Category | N/A | hosting | N/A |
.noise[].metadata.tor | Attribute | TOR | N/A | False | N/A |
.noise[].metadata.rdns | Attribute | rDNS | N/A | 45.63.52.184.vultrusercontent.com | N/A |
.noise[].metadata.os | Attribute | Operating System | N/A | Linux | N/A |
.noise[].metadata.sensor_hits | Attribute | Sensor Hits | N/A | 1 | N/A |
.noise[].metadata.sensor_count | Attribute | Sensor Count | N/A | 5 | N/A |
.noise[].metadata.destination_country_codes | Attribute | Destination Country | N/A | CA | N/A |
.noise[].vpn_service | Attribute | VPN Service | N/A | Cisco | N/A |
.noise[].raw_data.scan[].port | Attribute | Port | N/A | 22 | N/A |
.noise[].raw_data.scan[].protocol | Attribute | Protocol | N/A | TCP | N/A |
.noise[].raw_data.web.paths[] | Attribute | Web Path | N/A | /favicon.ico | N/A |
.noise[].raw_data.web.useragents[] | Attribute | User Agent | N/A | Mozilla/5.0 (compatible; Baiduspider/2.0; +http... | N/A |
Enrich - Intel CTR
The Intel CTR tool option for the Enrich action supports IP Address indicator types.
IP Address
GET {HOSTNAME}/apireyes/api/v4/search/tool/intel-ctr?ip:8.8.8.8
Sample Response:
"event": [
{
"settings": [
{
"value": "Slaved",
"key": "group"
},
{
"value": "65535",
"key": "buffer_size"
},
{
"value": "10485760",
"key": "max_packet_size"
},
{
"value": "c5fa0484-6841-42e6-8369-d6417bb6aa7f",
"key": "mutex"
},
{
"value": "8.8.8.8",
"key": "primary_dns_server"
},
{
"value": "8.8.4.4",
"key": "backup_dns_server"
}
],
"urls": [
"tcp://report-reed.gl.at.ply.gg:25786"
],
"encryption": [
{
"algorithm": "DES",
"key": "722018788c294897",
"context": "COMMUNICATION"
}
],
"md5": "3511c9d5fa66610826129d4a821e61ed",
"sha1": "818afbdad6b64629f5404ba43f14fcbd7ab6d32c",
"sha256": "91627cffcf4dc45431a510d1bc96e50bedd34c7d20fca36823b611c17f311505",
"fileType": "PEEXE_x86",
"fileSize": 3740891,
"threatType": "malware",
"threatFamily": "nanocore",
"firstSeen": "2023-11-25T17:04:53.000Z",
"lastSeen": "2023-11-25T17:04:53.000Z"
},
...
]
ThreatQuotient provides the following default mapping for IP Address objects for the Intel CTR tool based on .data.<ip_address_value>.event[]
entry.
Feed Data Path | ThreatQ Entity | ThreatQ Object Type or Attribute Key | Published Date | Examples | Notes |
---|---|---|---|---|---|
.md5 | Related Indicator.Value | MD5 | N/A | 3511c9d5fa666108261 29d4a821e61ed |
N/A |
.sha1 | Related Indicator.Value | SHA-1 | N/A | 818afbdad6b64629f54 04ba43f14fcbd7ab6d32c |
N/A |
.sha256 | Related Indicator.Value | SHA-256 | N/A | 91627cffcf4dc45431a51 0d1bc96e50bedd34c7d2 0fca36823b611c17f311505 |
N/A |
.urls[] | Related Indicator.Value | IP Address or FQDN | N/A | report-reed.gl.at.ply.gg | The Scheme and Port Attributes will be extracted |
.threatFamily | Related Malware.Value | Malware | N/A | Nanocore | If threatType == "malware" |
.urls[] | Indicator.Attribute | Scheme | N/A | tcp | For IP Address/FQDN indicators |
.urls[] | Indicator.Attribute | Port | N/A | 25786 | For IP Address/FQDN indicators |
.fileType | Indicator.Attribute | File Type | N/A | PEEXE_x86 | For MD5/SHA-1/SHA-256 indicators |
.fileSize | Indicator.Attribute | File Size | N/A | 3740891 | For MD5/SHA-1/SHA-256 indicators |
Enrich - RiskIQ
The RiskIQ tool option for the Enrich action supports FQDN, IP Address, and URL type indicators.
FQDN
GET {HOSTNAME}/apireyes/api/v4/search/tool/riskiq?domain:ariella.ns.cloudflare.com
Sample Response:
{ "data": { "ariella.ns.cloudflare.com": { "dns": [ { "firstSeen": "2024-09-12T09:13:12.000Z", "lastSeen": "2024-09-12T14:25:56.000Z", "recordType": "SOA", "value": "ariella.ns.cloudflare.com" }, { "firstSeen": "2024-09-12T09:09:43.000Z", "lastSeen": "2024-09-15T21:08:55.000Z", "recordType": "NS", "value": "ariella.ns.cloudflare.com." } ], "ip": [ { "firstSeen": "2024-09-12T09:12:29.000Z", "lastSeen": "2024-09-15T21:08:55.000Z", "recordType": "A", "value": "172.67.212.97" }, { "firstSeen": "2024-09-12T09:12:29.000Z", "lastSeen": "2024-09-15T21:08:55.000Z", "recordType": "A", "value": "104.21.61.171" }, { "firstSeen": "2024-09-13T02:25:27.000Z", "lastSeen": "2024-09-13T11:16:06.000Z", "recordType": "AAAA", "value": "2a06:98c1:3121::c" } ] } }, "error": [ null ], "success": true }
ThreatQuotient provides the following default mapping for FQDN object types for the RiskIQ tool based on .data.<fqdn_value>
entry.
Feed Data Path | ThreatQ Entity | ThreatQ Object Type or Attribute Key | Published Date | Examples | Notes |
---|---|---|---|---|---|
.ip[].value | Related Indicator | IP Address/IPv6 | N/A | 104.21.61.171 | Indicator type based on "recordType" |
IP Address
GET {HOSTNAME}/apireyes/api/v4/search/tool/riskiq?ip:8.8.8.8
Sample Response:
{
"domain": [
{
"firstSeen": "2023-09-12T15:29:20.000Z",
"lastSeen": "2024-11-24T16:28:51.000Z",
"recordType": "A",
"resolution": true,
"value": "0efd02432153657373696f6e206b696c6c65643a204e6f20726561736f6e206.76976656e00.o.gov-by.net"
},
{
"firstSeen": "2023-09-21T13:17:31.000Z",
"lastSeen": "2024-11-24T16:47:18.000Z",
"recordType": "A",
"resolution": true,
"value": "c4f602432153657373696f6e206b696c6c65643a204e6f20726561736f6e206.76976656e00.o.gov-by.net"
}
],
"hash": [
{
"collectionDate": "2024-11-25T01:00:00.000Z",
"name": "e6a9fff8367bd276e28ab5f1130de8b745b3a629412fd3b8a6338e17926e0457",
"sampleDate": "2024-11-25T01:00:00.000Z",
"sha256": "e6a9fff8367bd276e28ab5f1130de8b745b3a629412fd3b8a6338e17926e0457"
},
{
"collectionDate": "2024-11-25T01:00:00.000Z",
"name": "e08eb6c5f0f7bca97ce64c85549a2a837e2c46c5bcfdd91542b661ade21f0e3b",
"sampleDate": "2024-11-25T01:00:00.000Z",
"sha256": "e08eb6c5f0f7bca97ce64c85549a2a837e2c46c5bcfdd91542b661ade21f0e3b"
}
],
"url": [
{
"source": "developers.google.com",
"tags": [
"search-engine",
"google"
],
"value": "https://developers.google.com/speed/public-dns"
},
{
"source": "live.paloaltonetworks.com",
"tags": [
"search-engine",
"paloaltonetworks"
],
"value": "https://live.paloaltonetworks.com/t5/general-topics/application-match-sophos-live-protection-to-8-8-8-8/td-p/229518"
},
{
"source": "www.reddit.com",
"tags": [
"search-engine",
"reddit"
],
"value": "https://www.reddit.com/r/techsupport/comments/10xnkgn/should_i_change_my_dns_to_8888/"
}
]
}
ThreatQuotient provides the following default mapping for IP Address object types for the RiskIQ tool based on .data.<ip_address_value>
entry.
Feed Data Path | ThreatQ Entity | ThreatQ Object Type or Attribute Key | Published Date | Examples | Notes |
---|---|---|---|---|---|
.hash[].sha256 | Related Indicator.Value | SHA-256 | N/A | e6a9fff8367bd276e28ab5 f1130de8b745b3a629412f 3b8a6338e17926e0457 |
N/A |
.hash[].sha1 | Related Indicator.Value | SHA-1 | N/A | N/A | N/A |
.hash[].md5 | Related Indicator.Value | MD5 | N/A | N/A | N/A |
.domain[].value | Related Indicator.Value | FQDN | N/A | maclifttruck.ao | N/A |
.url[].value | Indicator.Attribute | Reference | N/A | https://developers.google. com/speed/public-dns |
N/A |
Enrich - Shodan
The Shodan tool option for the Enrich action supports FQDN and IP Address type indicators.
FQDN
GET {HOSTNAME}/apireyes/api/v4/search/tool/shodan?domain:infomanage28391.cfd
Sample Response:
{
"success": true,
"data": {
"infomanage28391.cfd": {}
},
"error": [
null
]
}
ThreatQuotient provides the following default mapping for FQDN object for the Shodan tool option based on .data.<fqdn_value>
entry.
Feed Data Path | ThreatQ Entity | ThreatQ Object Type or Attribute Key | Published Date | Examples | Notes |
---|---|---|---|---|---|
.subdomain[].value | Attribute | Subdomain | N/A | N/A | N/A |
IP Address
GET {HOSTNAME}/apireyes/api/v4/search/tool/shodan?ip:8.8.8.8
Sample Response:
{
"success": true,
"data": {
"8.8.8.8": {
"subdomain": [
{
"value": "dns.google",
"subdomain": true
}
]
}
},
"error": [
null
]
}
ThreatQuotient provides the following default mapping for IP Address objects for the Shodan tool based on .data.<ip_address_value>
entry.
Feed Data Path | ThreatQ Entity | ThreatQ Object Type or Attribute Key | Published Date | Examples | Notes |
---|---|---|---|---|---|
.subdomain[].value | Attribute | Subdomain | N/A | dns.google | N/A |
Enrich - VirusTotal
The VirusTotal tool option supports FDQN, IP Address, and URL type indicators.
FQDN
GET {HOSTNAME}/apireyes/api/v4/search/tool/virus-total?domain:infomanage28391.cfd
Sample Response:
{
"data": {
"infomanage28391.cfd": {
"domain": {
"categories": [
{
"name": "alphaMountain.ai",
"value": "Phishing (alphaMountain.ai)"
}
],
"comments": [
{
"count": 1,
"date": 1726220951000,
"tags": [
"phishing"
],
"text": "#phishing",
"vote": {
"abuse": 0,
"negative": 0,
"positive": 0
}
}
],
"creationDate": 1726099200000,
"jarm": "27d3ed3ed0003ed1dc42d43d00041d6183ff1bfae51ebd88d70384363d525c",
"lastAnalysisDate": 1728890916000,
"lastAnalysisResults": [
{
"category": "harmless",
"engineName": "Acronis",
"method": "blacklist",
"result": "clean"
},
{
"category": "undetected",
"engineName": "0xSI_f33d",
"method": "blacklist",
"result": "unrated"
},
{
"category": "harmless",
"engineName": "Abusix",
"method": "blacklist",
"result": "clean"
},
{
"category": "harmless",
"engineName": "ADMINUSLabs",
"method": "blacklist",
"result": "clean"
},
{
"category": "undetected",
"engineName": "Axur",
"method": "blacklist",
"result": "unrated"
}
],
"lastAnalysisStats": {
"harmless": 52,
"malicious": 11,
"positives": 11,
"suspicious": 1,
"timeout": 0,
"total": 94,
"undetected": 30
},
"lastDnsRecords": [
{
"ttl": 21600,
"type": "NS",
"value": "ariella.ns.cloudflare.com"
},
{
"ttl": 300,
"type": "A",
"value": "172.67.212.97"
},
{
"ttl": 21600,
"type": "NS",
"value": "noel.ns.cloudflare.com"
},
{
"ttl": 300,
"type": "AAAA",
"value": "2606:4700:3031::6815:3dab"
},
{
"expire": 604800,
"rname": "dns.cloudflare.com",
"ttl": 1800,
"type": "SOA",
"value": "ariella.ns.cloudflare.com"
},
{
"ttl": 300,
"type": "AAAA",
"value": "2606:4700:3035::ac43:d461"
},
{
"ttl": 300,
"type": "A",
"value": "104.21.61.171"
}
],
"lastDnsRecordsDate": 1726416860000,
"lastUpdateDate": 1726099200000,
"popularityRanks": [],
"positives": 11,
"reputation": -58,
"subdomain": false,
"total": 94,
"totalVotes": {
"harmless": 0,
"malicious": 1
},
"whois": "Create date: 2024-09-12 00:00:00\nDomain name: infomanage28391.cfd\nDomain registrar id: 3956\nDomain registrar url: https://www.globaldomaingroup.com\nExpiry date: 2025-09-12 00:00:00\nName server 1: noel.ns.cloudflare.com\nName server 2: ariella.ns.cloudflare.com\nQuery time: 2024-09-13 12:49:34\nRegistrant company: c0dbd0252fd47a8b\nRegistrant country: United States\nRegistrant email: f651612a2f356ad3s@\nRegistrant state: 77ab92f1911d7c5f\nUpdate date: 2024-09-12 00:00:00",
"whoisDate": 1757635200000
}
}
},
"error": [
{
"message": "Peticiones agotadas, por favor póngase en contacto con reyes@ccn-cert.cni.es",
"nameApp": "virustotal",
"type": "WARN"
}
],
"success": true
}
ThreatQuotient provides the following default mapping for this action based on .data.<fqdn_value>.domain
entry.
Feed Data Path | ThreatQ Entity | ThreatQ Object Type or Attribute Key | Published Date | Examples | Notes |
---|---|---|---|---|---|
.categories[].value | Attribute | Category | N/A | Phishing (alphaMountain.ai) | N/A |
.reputation | Attribute | Reputation | N/A | -58 | N/A |
.positives | Attribute | Positive Count | N/A | 11 | N/A |
.lastAnalysisStats.harmless | Attribute | Harmless Count | N/A | 52 | N/A |
.lastAnalysisStats.malicious | Attribute | Malicious Count | N/A | 11 | N/A |
.lastAnalysisStats.undetected | Attribute | Undetected Count | N/A | 30 | N/A |
.lastAnalysisStats.suspicious | Attribute | Suspicious Count | N/A | 1 | N/A |
.lastDnsRecords.value | Attribute | Name Server | N/A | noel.ns.cloudflare.com | if .lastDnsRecords.type == "NS" |
.lastDnsRecords.value | Attribute | Start of Authority | N/A | ariella.ns.cloudflare.com | if .lastDnsRecords.type == "SOA" |
.lastDnsRecords.value | Related Indicator.Value | IP Address | N/A | 172.67.212.97 | if .lastDnsRecords.type == "A" |
.lastDnsRecords.value | Related Indicator.Value | IPv6 Address | N/A | 2606:4700:3031::6815:3dab | if .lastDnsRecords.type == "AAAA" |
IP Address
GET {HOSTNAME}/apireyes/api/v4/search/tool/virus-total?ip:8:8:8:8
Sample Response:
{
"success": true,
"data": {
"8.8.8.8": {
"ip": {
"asOwner": "GOOGLE",
"asn": 15169,
"continent": "NA",
"country": "US",
"jarm": "29d3fd00029d29d00042d43d00041d598ac0c1012db967bb1ad0ff2491b3ae",
"lastAnalysisDate": 1732534880000,
"lastAnalysisResults": [
{
"engineName": "Acronis",
"category": "harmless",
"method": "blacklist",
"result": "clean"
},
{
"engineName": "0xSI_f33d",
"category": "undetected",
"method": "blacklist",
"result": "unrated"
},
{
"engineName": "Abusix",
"category": "harmless",
"method": "blacklist",
"result": "clean"
},
{
"engineName": "ADMINUSLabs",
"category": "harmless",
"method": "blacklist",
"result": "clean"
}
],
"lastAnalysisStats": {
"harmless": 63,
"malicious": 0,
"suspicious": 0,
"undetected": 31,
"timeout": 0,
"positives": 0,
"total": 94
},
"network": "8.8.8.0/24",
"regionalInternetRegistry": "ARIN",
"reputation": 540,
"tags": [],
"totalVotes": {
"harmless": 212,
"malicious": 36
},
"whois": "NetRange: 8.8.8.0 - 8.8.8.255\nCIDR: 8.8.8.0/24\nNetName: GOGL\nNetHandle: NET-8-8-8-0-2\nParent: NET8 (NET-8-0-0-0-0)\nNetType: Direct Allocation\nOriginAS: \nOrganization: Google LLC (GOGL)\nRegDate: 2023-12-28\nUpdated: 2023-12-28\nRef: https://rdap.arin.net/registry/ip/8.8.8.0\nOrgName: Google LLC\nOrgId: GOGL\nAddress: 1600 Amphitheatre Parkway\nCity: Mountain View\nStateProv: CA\nPostalCode: 94043\nCountry: US\nRegDate: 2000-03-30\nUpdated: 2019-10-31\nComment: Please note that the recommended way to file abuse complaints are located in the following links. \nComment: \nComment: To report abuse and illegal activity: https://www.google.com/contact/\nComment: \nComment: For legal requests: http://support.google.com/legal \nComment: \nComment: Regards, \nComment: The Google Team\nRef: https://rdap.arin.net/registry/entity/GOGL\nOrgAbuseHandle: ABUSE5250-ARIN\nOrgAbuseName: Abuse\nOrgAbusePhone: +1-650-253-0000 \nOrgAbuseEmail: network-abuse@google.com\nOrgAbuseRef: https://rdap.arin.net/registry/entity/ABUSE5250-ARIN\nOrgTechHandle: ZG39-ARIN\nOrgTechName: Google LLC\nOrgTechPhone: +1-650-253-0000 \nOrgTechEmail: arin-contact@google.com\nOrgTechRef: https://rdap.arin.net/registry/entity/ZG39-ARIN\n",
"whoisDate": 1731367316000,
"positives": 0,
"total": 94,
"comments": [
{
"count": 92,
"date": 1728659511000,
"text": "This indicator was mentioned in a report.\n\n\uD83D\uDD0E Title: Cyberespionage the Gamaredon way: Analysis of toolset used to spy on Ukraine in 2022 and 2023\n\uD83D\uDCD1 Reference: https://web-assets.esetstatic.com/wls/en/papers/white-papers/cyberespionage-gamaredon-way.pdf\n\uD83D\uDCC6 Report Publish Date: 2024-09-26\n\uD83C\uDFF7️ Reference ID: #21abb39ec (https://www.virustotal.com/gui/search/21abb39ec/comments for report's related indicators)\n",
"vote": {
"positive": 0,
"negative": 0,
"abuse": 0
},
"tags": [
"21abb39ec"
]
},
{
"count": 92,
"date": 1728319925000,
"text": "What a beautiful IP",
"vote": {
"positive": 0,
"negative": 0,
"abuse": 0
},
"tags": []
}
]
},
"urls": [
{
"value": "http://mozilla1.com/",
"positives": 2,
"total": 96,
"scanDate": 1732543395000,
"url": "http://mozilla1.com/"
},
{
"value": "https://www.usevchala.cfd/",
"positives": 1,
"total": 96,
"scanDate": 1732535294000,
"url": "https://www.usevchala.cfd/"
},
{
"value": "https://www.tryvchala.cfd/",
"positives": 1,
"total": 96,
"scanDate": 1732534027000,
"url": "https://www.tryvchala.cfd/"
}
],
"relatedSamples": [
{
"sha256": "fb47468a2cd3953c7131431991afcc6a2703f14640520102eea0a685a7e8d6de",
"sampleDate": 1732444650000,
"positives": 0,
"total": 62,
"dateCommunicatingSamples": 1732444650000,
"firstSubmissionDate": 1726865917,
"lastModificationDate": 1732546083000,
"downloadable": true,
"lastAnalysisDate": 1732444650000
},
{
"sha256": "fb2d9f058c2010c57f86a05ae33d282f33e3825290c66b8b120cd177416c6bdf",
"sampleDate": 1732107089000,
"positives": 0,
"total": 63,
"dateCommunicatingSamples": 1732107089000,
"firstSubmissionDate": 1730720182,
"lastModificationDate": 1732545035000,
"downloadable": true,
"lastAnalysisDate": 1732107089000
},
{
"sha256": "f29f1818f5952bcf2e6381afb06c830be7053c7c285f8e371f0dce0c99f5165f",
"sampleDate": 1715792008000,
"positives": 0,
"total": 64,
"dateCommunicatingSamples": 1715792008000,
"firstSubmissionDate": 1715792008,
"lastModificationDate": 1728435612000,
"downloadable": true,
"lastAnalysisDate": 1715792008000
}
],
"ipResolutions": [
{
"value": "sugar998.top",
"lastResolved": 1732545965000,
"positives": 0,
"total": 94,
"hostName": "sugar998.top",
"resolver": "Georgia Institute of Technology",
"date": 1732545965000,
"name": "sugar998.top",
"resolution": true
},
{
"value": "hurguven.win",
"lastResolved": 1732545953000,
"positives": 0,
"total": 94,
"hostName": "hurguven.win",
"resolver": "Georgia Institute of Technology",
"date": 1732545953000,
"name": "hurguven.win",
"resolution": true
},
{
"value": "frontlinesassessment.com",
"lastResolved": 1732545951000,
"positives": 0,
"total": 94,
"hostName": "frontlinesassessment.com",
"resolver": "Georgia Institute of Technology",
"date": 1732545951000,
"name": "frontlinesassessment.com",
"resolution": true
}
]
}
},
"error": [
null
]
}
ThreatQuotient provides the following default mapping for IP Address objects for the VirusTotal tool based on .data.<ip_address_value>
entry.
Feed Data Path | ThreatQ Entity | ThreatQ Object Type or Attribute Key | Published Date | Examples | Notes |
---|---|---|---|---|---|
.ip.asOwner | Attribute | AS Owner | N/A | N/A | |
.ip.asn | Attribute | ASN | N/A | 15169 | N/A |
.ip.country | Attribute | Country | N/A | US | N/A |
.ip.lastAnalysisStats.harmless | Attribute | Harmless Count | N/A | 63 | N/A |
.ip.lastAnalysisStats.malicious | Attribute | Malicious Count | N/A | 0 | N/A |
.ip.lastAnalysisStats.undetected | Attribute | Undetected Count | N/A | 31 | N/A |
.ip.lastAnalysisStats.suspicious | Attribute | Suspicious Count | N/A | 0 | N/A |
.ip.reputation | Attribute | Reputation | N/A | 540 | N/A |
.urls[].value | Related Indicator.Value | URL | N/A | http://mozilla1.com/ | N/A |
.urls[].positives | Related Indicator.Attribute | Positive Count | N/A | 2 | N/A |
.urls[].total | Related Indicator.Attribute | Total | N/A | 96 | N/A |
.urls[].scanDate | Related Indicator.Attribute | Scan Date | N/A | 2024-11-25 01:03:15 UTC | %Y-%m-%d %H:%M:%S %Z |
.relatedSamples[].sha256 | Related Indicator.Value | SHA-256 | N/A | fb47468a2cd3953c713143 1991afcc6a2703f14640520 102eea0a685a7e8d6de |
N/A |
.relatedSamples[].positives | Related Indicator.Attribute | Positive Count | N/A | 0 | N/A |
.relatedSamples[].total | Related Indicator.Attribute | Total | N/A | 62 | N/A |
.relatedSamples[].sampleDate | Related Indicator.Attribute | Sample Date | N/A | 2024-11-25 01:03:15 UTC | %Y-%m-%d %H:%M:%S %Z |
.ipResolutions[].value | Related Indicator.Value | FQDN | N/A | sugar998.top | N/A |
.ipResolutions[].positives | Related Indicator.Attribute | Positive Count | N/A | 0 | N/A |
.ipResolutions[].total | Related Indicator.Attribute | Total Count | N/A | 94 | N/A |
.ipResolutions[].resolver | Related Indicator.Attribute | Resolver | N/A | Georgia Institute of Technology | N/A |
.ipResolutions[].lastResolved | Related Indicator.Attribute | Last Resolved | N/A | 2024-11-25 01:03:15 UTC | %Y-%m-%d %H:%M:%S %Z |
URL
GET {HOSTNAME}/apireyes/api/v4/search/tool/virus-total?url:http://216.173.64.63:4646/update.cmd
Sample Response:
{
"success": true,
"data": {
"http://216.173.64.63:4646/update.cmd": {
"url": {
"value": "http://216.173.64.63:4646/update.cmd",
"tags": ["ip", "ns-port"],
"positives": 1,
"total": 96,
"scanDate": 1726230047000,
"url": "http://216.173.64.63:4646/update.cmd",
"title": "",
"lastAnalysisDate": 1726230047000,
"lastHttpResponseCode": 200,
"lastHttpResponseCodeLength": 168,
"lastHttpResponseContentSha256": "45d28ec6422ca94e4d9290b1d0d5ae1c355f728aa41083a561ec1e0a64a243ea",
"lastSubmissionDate": 1726230047000,
"reputation": -58,
"lastAnalysisResults": [
{
"engineName": "Artists Against 419",
"category": "harmless",
"method": "blacklist",
"result": "clean"
},
{
"engineName": "Acronis",
"category": "harmless",
"method": "blacklist",
"result": "clean"
},
{
"engineName": "Abusix",
"category": "harmless",
"method": "blacklist",
"result": "clean"
}
],
"totalVotes": {
"harmless": 0,
"malicious": 1
},
"lastAnalisysStats": {
"harmless": 67,
"malicious": 1,
"suspicious": 0,
"undetected": 28,
"timeout": 0,
"positives": 1,
"total": 96
},
"comments": [
{
"count": 1,
"date": 1726230105000,
"text": "#XWorm\nhttps://x.com/karol_paciorek/status/1834532649236349137",
"vote": {
"positive": 0,
"negative": 0,
"abuse": 0
},
"tags": [
"xworm"
]
}
]
}
}
},
"error": [null]
}
ThreatQuotient provides the following default mapping for URL objects for the VirusTotal tool based on .data.<url_value>.url
entry.
Feed Data Path | ThreatQ Entity | ThreatQ Object Type or Attribute Key | Published Date | Examples | Notes |
---|---|---|---|---|---|
.lastAnalysisStats.harmless | Attribute | Harmless Count | N/A | 67 | N/A |
.lastAnalysisStats.malicious | Attribute | Malicious Count | N/A | 1 | N/A |
.lastAnalysisStats.undetected | Attribute | Undetected Count | N/A | 28 | N/A |
.lastAnalysisStats.suspicious | Attribute | Suspicious Count | N/A | 0 | N/A |
.reputation | Attribute | Reputation | N/A | -58 | N/A |
.positives | Attribute | Positive Count | N/A | 1 | N/A |
.lastHttpResponseContentSha256 | Related Indicator.Value | SHA-256 | N/A | 45d28ec6422ca94e4d9290b1 d0d5ae1c355f728aa41083a56 1ec1e0a64a243ea |
N/A |
Change Log
- Version 1.0.0
- Initial release
PDF Guides
Document | ThreatQ Version |
---|---|
CCN CERT Reyes Operation Guide v1.0.0 | 5.6.0 or Greater |