McAfee ATD Operation
The web format of this guide reflects the most current release. Guides for older iterations are available in PDF format.
Integration Details
ThreatQuotient provides the following details for this integration:
Current Integration Version | 1.2.0 |
Compatible with ThreatQ Versions | >= 4.34.0 |
Support Tier | ThreatQ Supported |
Introduction
The McAfee ATD operation enriches ThreatQ objects with context obtained from the McAfee ATD API.
The operation provides the following actions:
- Get Analyzer Profiles - retrieves the configured ATD analyzer profiles.
- Hash Value Check - checks if the hash is either blacklisted or whitelisted.
- Submit URL - submits a URL for analysis.
- Submit File - submits a file for analysis.
- Get Report - retrieves the report and enriches the threat object
The operation is compatible with Files and URL Indicator types.
Installation
This integration can be installed in the My Integration section of your ThreatQ instance. See the Adding an Integration topic for more details.
Configuration
ThreatQuotient does not issue API keys for third-party vendors. Contact the specific vendor to obtain API keys and other integration-related credentials.
To configure the integration:
- Navigate to your integrations management page in ThreatQ.
- Select the Operation option from the Type dropdown (optional).
- Click on the integration entry to open its details page.
- Enter the following parameters under the Configuration tab:
Parameter Description Host Your McAfee ATD Instance host. User Name Your McAfee ATD username. Password Your McAfee ATD password. - Review any additional settings, make any changes if needed, and click on Save.
- Click on the toggle switch, located above the Additional Information section, to enable it.
Actions
The operation provides the following actions:
Action | Description | Object Type | Object Subtype |
---|---|---|---|
Get Analyzer Profiles | Retrieves the configured ATD analyzer profiles. | Indicators, Files | URL (Indicators) |
Hash Value Check | Checks if the hash is either blacklisted or whitelisted. | Indicators | URL |
Submit URL | Submits a URL for analysis. | Indicators | URL |
Submit File | Submits a file for analysis. | Files | N/A |
Get Report | Retrieves the report and enriches the threat object. | Indicators, Files | URL (Indicators) |
Get Analyzer Profiles
The Get Analyzer Profiles action is used to retrieve the available analyzer profiles configured on the ATD instance.
GET http://<atd-instance-host>/php/vmprofiles.php
Hash Value Check
The Hash Value Check action is used to check if the submitted MD5 hash is either blacklisted or whitelisted.
POST http://<atd-instance-host>/php/atdHashLookup.php
Sample Response:
{ "results": { "E6201BC847D2C9F11B999741704B3E0A": "w" }, "success": true }
ThreatQuotient provides the following default mapping for this action:
Feed Data Path | ThreatQ Entity | ThreatQ Object Type or Attribute Key | Examples | Notes |
---|---|---|---|---|
.results. | Indicator Attribute | ATD Indicator Status | Hash value is whitelisted. | Automatically added |
Submit URL & Submit File
The Submit URL and Submit File actions
used to submit a URL or File to ATD for analysis.
POST http://<atd-instance-host>/php/fileupload.php
Sample Response:
{ "estimatedTime": 0, "fileId": "", "filesWait": 0, "mimeType": "application/url", "results": [ { "cache": 0, "destIp": null, "file": "http://subtitleseeker.com", "md5": "BAE2983970C418BFD22903C5AB3ED569", "messageId": "", "sha1": "", "sha256": "", "size": "25", "srcIp": "", "submitType": "1", "taskId": 246, "url": "http://subtitleseeker.com" } ], "subId": 243, "success": true }
ThreatQuotient provides the following default mapping for this action:
Feed Data Path | ThreatQ Entity | ThreatQ Object Type or Attribute Key | Examples | Notes |
---|---|---|---|---|
subId | Indicator.Attribute | ATD Submission ID | 243 | Automatically added |
.results[].md5 | Indicator.Value | MD5 | 'BAE2983970C418BFD22903C5AB3ED569' | |
.results[].sha1 | Indicator.Value | SHA-1 | N/A | |
.results[].sha256 | Indicator.Value | SHA-256 | N/A |
Configuration Parameters
The following parameters are available for these actions:
Parameter | Description |
---|---|
Analyzer Profile IDs | Comma-separated values representing the analyzer profile IDs to be used for sample analysis. The IDs can be retrieved by running the Get Report action. If left empty, all analyzers are used. |
File Priority | Indicates the priority of sample analysis. |
Source IP | The IPv4 address of the source system or gateway from where the file is downloaded |
Destination IP | The IPv4 address of the target endpoint. |
YARA Scanner | Indicates the custom YARA scanner settings that need to be set for the provided Analyzer Profile IDs . There are three options to choose from. Choosing either Enable or Disable will change the custom YARA scanner to be enabled or disabled, respectively. Choosing Keep Settings will use the current settings for the YARA scanner. The current YARA scanner status can be retrieved by running the Get Analyzer Profiles action. |
Get Report
The Get Report action is used to retrieve the submission report(s) for the submitted threat object.
GET http://<atd-instance-host>/php/configloader/getremoteshowreport.php
Sample Response:
"Summary": { "Bait": "Baitexe activated but not infected", "Behavior": [], "Data": { "analysis_seconds": "79", "compiled_with": "Not Available", "sandbox_analysis": "5" }, "DETversion": "4.6.0.181109", "Files": [ { "FileType": "0", "Md5": "", "Name": "iexplore.exe", "Processes": [ { "Name": "iexplore.exe", "RelType": "1", "Sha256": "" } ], "Sha1": "", "Sha256": "" } ], "hasDynamicAnalysis": "true", "JobId": "243", "JSONversion": "1.003", "MISversion": "4.6.0.21", "Mitre": [ { "Rules": [ { "Description": "Read data from a handle opened on previous URL's request", "Severity": "1" }, { "Description": "connected to common ports", "Severity": "1" } ], "Tactics": "Command and Control", "Techniques": "Commonly Used Port" } ], "OSversion": "win2k16p0x64_Win2k16", "Process": [ { "Name": "http://subtitleseeker.com", "Reason": "loaded by MATD Analyzer", "Severity": "1" } ], "Processes": [ { "Name": "http://subtitleseeker.com", "Registry Operations": [ { "Registry Created": [ "HKCU/Software/Microsoft/Windows/CurrentVersion/Internet Settings/P3P/History" ] } ], "Run-Time Dlls": [ { "DLL Loaded": [ "api-ms-win-rtcore-ntuser-wmpointer-l1-1-0.dll", "dcomp.dll" ] } ] } ], "Selectors": [ { "Engine": "Anti-Malware", "MalwareName": "---", "Severity": "0" } ], "Stats": [ { "Category": "Data spying, Sniffing, Keylogging, Ebanking Fraud ", "ID": "6", "Severity": "0" } ], "Subject": { "FileType": "4096", "md5": "BAE2983970C418BFD22903C5AB3ED569", "Name": "http://subtitleseeker.com", "parent_archive": "Not Available", "sha-1": "4C4ECF4FF55B821A468A2644209439B5A43FA0E5", "sha-256": "3336CD42FEFD2089BFFFB3733BDBF22BFB1B707E8F5EFAEBFD865B0E26ACFFE3", "size": "25", "Timestamp": "2020-11-02 04:53:56", "Type": "application/url" }, "SubmitterName": "robert", "SubmitterType": "STAND_ALONE", "SUMversion": "4.6.0.21", "TaskId": "246", "URL_Reputation": [ { "category": "Business ", "functional": "Business/Services ", "port": "80", "reputation": "Clean", "risk": "Information ", "severity": "0", "url": "IECVLIST.MICROSOFT.COM" } ], "Urls": [ { "Category": "Business ", "Functional": "Business/Services ", "Port": "80", "Processes": [ { "Name": "iexplore.exe", "RelType": "8", "Sha256": "" } ], "Reputation": "-3", "Risk": "Information ", "Severity": "0", "Url": "IECVLIST.MICROSOFT.COM" } ], "Verdict": { "Description": "Sample is somewhat suspicious: final severity level 2", "Severity": "2" } } }
ThreatQuotient provides the following default mapping for this action:
Feed Data Path | ThreatQ Entity | ThreatQ Object Type or Attribute Key | Examples | Notes |
---|---|---|---|---|
.Summary.Data.compiled_with | Indicator.Attribute | Complied With | 'Not Available' | |
.Summary.Data.sandbox_analysis | Indicator.Attribute | Sandbox Analysis | '5' | |
.Summary.Files[].Name | Indicator.Value | Filename | 'iexplore.exe | |
.Summary.Files[].Md5 | Indicator.Value | MD5 | N/A | |
.Summary.Files[].Sha1 | Indicator.Value | SHA1 | N/A | |
.Summary.Files[].Sha256 | Indicator.Value | SHA256 | N/A | |
.Summary.Files[].Processes[].Sha256 | Indicator.Value | SHA256 | N/A | |
.Summary.hasDynamicAnalysis | Indicator.Attribute | Has Dynamic Analysis | 'true' | |
.Summary.Mitre[].Techniques | Attack Pattern.Value | N/A | 'Commonly Used Port' | Linked to a ThreatQ MITRE Attack Pattern |
.Summary.OSversion | Indicator.Attribute | OS Version | 'win2k16p0x64_Win2k16' | |
.Summary.Process[].Reason | Indicator.Attribute | Reason | 'loaded by MATD Analyzer' | |
.Summary.Process[].Severity | Indicator.Attribute | Severity | 'Informational' | Mapped using the severity level mapping table |
.Summary.Processes[].Registry Operations[].Registry Created[] | Indicator.Value | Registry Key | 'HKCU/Software/Microsoft/Windows/ CurrentVersion/Internet Settings/P3P/History' |
|
.Summary.Processes[].Run-Time Dlls[].DLL Loaded[] | Indicator.Value | Filename | 'dcomp.dll' | |
.Summary.Selectors[].Severity | Indicator.Attribute | Engine .Summary.Selectors[] Severity |
'Engine Anti-Malware Severity': 'Unverified' | Each word of the attribute name has its first character capitalized. The attribute value is mapped using the severity level mapping table. |
.Summary.Stats[].Severity | Indicator.Attribute | Category .Summary.Stats[] Severity |
'Category Data Spying Severity': 'Unverified' | Each word of the attribute name has its first character capitalized. The attribute value is mapped using the severity level mapping table. |
.Summary.Subject.md5 | Indicator.Value | MD5 | 'BAE2983970C418BFD 22903C5AB3ED569' |
|
.Summary.Subject.sha-1 | Indicator.Value | SHA1 | '4C4ECF4FF55B821A46 8A2644209439B5A4 3FA0E5' |
|
.Summary.Subject.sha-256 | Indicator.Value | SHA256 | '3336CD42FEFD2089BFFFB 3733BDBF22BFB1B707E8F 5EFAEBFD865B0E 26ACFFE3' |
|
.Summary.Urls[] | Indicator.Value | URL | 'IECVLIST.MICROSOFT.COM' | Review Status |
.Summary.URL_Reputation[] | Indicator.Value | URL | 'IECVLIST.MICROSOFT.COM' | Review Status |
.Summary.Verdict.Severity | Indicator.Attribute | Threat Level | 'Low' | Mapped using the severity level mapping table |
Severity Level Mapping
Mcafee ATD Severity Level |
ThreatQ Attribute Value |
---|---|
-2 | Failed |
-1 | Clean |
0 | Unverified |
1 | Informational |
2 | Low |
3 | Medium |
4 | High |
5 | Very High |
Change Log
- Version 1.2.0
- Added the ability to submit URL samples with a
Scheme
attribute defined.
- Added the ability to submit URL samples with a
- Version 1.1.0
- Add threat severity mapping to severity attributes
- Normalize attributes between connector and operation
- Version 1.0.0
- Revamped operation
- Version 0.1.0
- Initial release
PDF Guides
Document | ThreatQ Version |
---|---|
McAfee ATD Operation Guide v1.2.0 | 4.34.0 or Greater |
McAfee ATD Operation Guide v1.1.0 | 4.34.0 or Greater |
McAfee ATD Operation Guide v1.0.0 | 4.34.0 or Greater |