Current ThreatQ Version Filter

GreyNoise Action Bundle

The web format of this guide reflects the most current release.  Guides for older iterations are available in PDF format.  

Integration Details

ThreatQuotient provides the following details for this integration:

Introduction

The GreyNoise Action Bundle for ThreatQ enables analysts to use GreyNoise Enterprise for automated enrichment and investigations.

The action bundle provides the following actions:

  • GreyNoise - IP Quick Check - performs a quick noise check on the IPs of the selected data collection.
  • GreyNoise - CVE Enrichment - enriches selected CVEs with GreyNoise data.
  • GreyNoise - IP Context - enriches select IPs with GreyNoise's full contextual data.  

The integration is both compatible with and returns IP Address type indicators.  Additionally, the GreyNoise - CVE Enrichment action is also compatible and enriches CVE type indicators and vulnerabilities.  

This action is intended for use with ThreatQ TDR Orchestrator (TQO). An active TQO license is required for this feature.

Prerequisites

  • An active ThreatQ TDR Orchestrator (TQO) license.
  • A data collection containing:
    • All actions except the CVE Enrichment action - IP Address type indicators.
    • The GreyNoise CVE Enrichment action - CVE type indicators and Vulnerability objects 

Installation

Perform the following steps to install the integration:

The same steps can be used to upgrade the integration to a new version.

  1. Log into https://marketplace.threatq.com/.
  2. Locate and download the action bundle zip file.
  3. Navigate to the integrations management page on your ThreatQ instance.
  4. Click on the Add New Integration button.
  5. Upload the zip file using one of the following methods:
    • Drag and drop the zip file into the dialog box
    • Select Click to Browse to locate the zip file on your local machine
  6. Select the actions to install, when prompted, and click on the Install button.

    ThreatQ will inform you if the action already exists on the platform and will require user confirmation before proceeding. ThreatQ will also inform you if the new version of the action contains changes to the user configuration. The new user configurations will overwrite the existing ones for the action and will require user confirmation before proceeding.

    The action(s) have been installed on your ThreatQ instance. You will still need to configure the action(s).

Configuration

ThreatQuotient does not issue API keys for third-party vendors. Contact the specific vendor to obtain API keys and other integration-related credentials.

To configure the integration:

  1. Navigate to your integrations management page in ThreatQ.
  2. Select the Actions option from the Category dropdown (optional).
  3. Click on the action entry to open its details page.
  4. Enter the following parameters under the Configuration tab:

    The configurations set on this page will be used as the default settings when inserting this action into a new workflow. Updating the configurations on this page will not update any instances of this action that have already been deployed to a workflow. In that scenario, you must update the action’s configurations within the workflow itself.

    IP Quick Check Parameters

    Parameter Description
    GreyNoise API Key API Key for authentication with the IPInfo API
    Disable Proxies Enable this option to have the action ignore proxies settings set in the ThreatQ UI.
    Enable SSL Certificate Verification Enable this option to verify the provider's SSL certificate.  
    Context Filter  Select the pieces of Context to ingest back into ThreatQ. Options include:
    • RIOT
    • Noise
    • Noise Code
    RIOT IP Status Select the status of the IP Addresses that are within the RIOT dataset.  Options include: 
    • Whitelisted
    • Review
    • Active
    Non-RIOT IP Status Select the status of the IP Addresses that are not within the RIOT dataset. Options include: 
    • Whitelisted
    • Review
    • Active
    Objects Per Run Maximum number of Objects to Submit per workflow run.

    IP Quick Check Configuration Screen

    CVE Enrichment Parameters

    Parameter Description
    GreyNoise API Key API Key for authentication with the IPInfo API
    Disable Proxies Enable this option to have the action ignore proxies settings set in the ThreatQ UI.
    Enable SSL Certificate Verification Enable this option to verify the provider's SSL certificate.  
    Ingest Corresponding Vulnerability Object If enabled, along with ingesting the CVE context, a vulnerability object will also be created for the underlying vulnerability details. Vulnerability objects & CVEs will share the same enrichment context. If it's not enabled, Vulnerability Name attribute is created for the CVE.
    Enrichment Context Filter Select the pieces of context to ingest with each vulnerability (when available).  Options include: 
    • CVSS Score (default)
    • Affected Product (default)
    • Affected Vendor (default)
    • EPSS Score (default)
    • Is CISA KEV (default)
    • Has Exploit (default)
    • Attack Vector (default)
    Objects Per Run Enter the maximum number of objects to submit per workflow run.

    CVE Enrichment Configuration Screen

    IP Context Parameters

    Parameter Description
    GreyNoise API Key API Key for authentication with the IPInfo API
    Disable Proxies Enable this option to have the action ignore proxies settings set in the ThreatQ UI.
    Enable SSL Certificate Verification Enable this option to verify the provider's SSL certificate.  
    Set Status to Active if Malicious Enable this parameter to have the status of the IP will be set to Active if the classification is malicious. 
    Enrichment Context Filter Select the pieces of context to ingest with each vulnerability (when available).  Options include: 
    • Actor
    • Malware Family
    • First Seen
    • Last Seen
    • Tags
    • Classification
    • CVEs
    • Is Bot
    • Is TOR
    • Is VPN
    • Is Spoofable
    • VPN Service
    • ASN
    • Region
    • Organization
    • Category
    • Operating System
    • Destination Country
    • Destination Country Code
    • Source Country
    • Source Country Code
    • Source City
    • RDNS
    • Scanned Paths
    • Scanned Ports
    • RIOT
    • RIOT Category
    • Service Name
    • Trust Level
    • External Reference
    • Last Updated
    Add Raw Data Information to Description Enable this parameter to add the scanned ports and paths to the description.

    Enabling this parameter may significantly increase the description size.

    Objects Per Run Enter the maximum number of objects to submit per workflow run.

    IP Context Configuration Screen
  5. Review any additional settings, make any changes if needed, and click on Save.

Actions

The action bundle provides the following actions:

Function Description Object Type Object Subtype
GreyNoise - IP Quick Check Quickly checks if IPs in a data collection are noise or not (also checks RIOT) Indicator IP Address
GreyNoise - CVE Enrichment Enriches CVEs with GreyNoise data Indicator, Vulnerability Indicator - CVE
GreyNoise - IP Context Enriches IPs with GreyNoise's full contextual data Indicator IP Address

IP Quick Check

The GreyNoise - IP Quick Check action checks IPs to see if they are within GreyNoise's RIOT dataset (a known benign service).

POST https://api.greynoise.io/v3/noise/ip?quick=true

Sample Body:

{
  "ips": [
    "20.163.15.34"
  ]
}

Sample Response:

[
  {
    "business_service_intelligence": {
      "found": false,
      "trust_level": ""
    },
    "internet_scanner_intelligence": {
      "classification": "malicious",
      "found": true
    },
    "ip": "20.163.15.34"
  }
]

ThreatQuotient provides the following default mapping for this action:

Feed Data Path ThreatQ Entity ThreatQ Object Type or Attribute Key Published Date Examples Notes
.ip Indicator.Value IP Address N/A 20.163.15.34 N/A
.business_service_intelligence.found Indicator.Attribute RIOT N/A false Updatable
.internet_scanner_intelligence.found Indicator.Attribute Noise N/A true Updatable
.internet_scanner_intelligence.classification Indicator.Attribute RIOT Classification N/A malicius Updatable

CVE Enrichment

The GreyNoise - CVE Enrichment action performs CVE ID lookups to enrich CVEs with GreyNoise data.

POST https://api.greynoise.io/v3/cves

Sample Body:

{
  "cves": [
    "CVE-2024-23897"
  ]
}

Sample Response:

{
  "id": "CVE-2024-23897",
  "details": {
    "vulnerability_name": "Jenkins Command Line Interface (CLI) Path Traversal Vulnerability",
    "vulnerability_description": "Jenkins 2.441 and earlier, LTS 2.426.2 and earlier does not disable a feature of its CLI command parser that replaces an '@' character followed by a file path in an argument with the file's contents, allowing unauthenticated attackers to read arbitrary files on the Jenkins controller file system.",
    "cve_cvss_score": 9.8,
    "product": "Jenkins Command Line Interface (CLI)",
    "vendor": "Jenkins",
    "published_to_nist_nvd": true
  },
  "timeline": {
    "cve_published_date": "2024-01-24T18:15:09Z",
    "cve_last_updated_date": "2024-05-14T15:01:24Z",
    "first_known_published_date": "2024-01-30T00:00:00Z",
    "cisa_kev_date_added": "2024-08-19T00:00:00Z"
  },
  "exploitation_details": {
    "attack_vector": "NETWORK",
    "exploit_found": true,
    "exploitation_registered_in_kev": true,
    "epss_score": 0.97225
  },
  "exploitation_stats": {
    "number_of_available_exploits": 48,
    "number_of_threat_actors_exploiting_vulnerability": 2,
    "number_of_botnets_exploiting_vulnerability": 0
  },
  "exploitation_activity": {
    "activity_seen": false,
    "benign_ip_count_1d": 0,
    "benign_ip_count_10d": 0,
    "benign_ip_count_30d": 0,
    "threat_ip_count_1d": 0,
    "threat_ip_count_10d": 0,
    "threat_ip_count_30d": 0
  }
}

ThreatQuotient provides the following default mapping for this action:

Feed Data Path ThreatQ Entity ThreatQ Object Type or Attribute Key Published Date Examples Notes
.details.vulnerability_name Vulnerability Value N/A .timeline.cve_published_date Jenkins Command Line Interface (CLI) Path Traversal Vulnerability User-configurable;
.details.vulnerability_name Indicator Attribute Vulnerability Name .timeline.cve_published_date Jenkins Command Line Interface (CLI) Path Traversal Vulnerability If Ingest Corresponding Vulnerability Object is unchecked;
exploited Indicator/Vulnerability TAG N/A .timeline.cve_published_date exploited If .exploitation_details.exploitation_registered_in_kev or .exploitation_details.exploit_found is True
.details.cve_cvss_score Indicator/Vulnerability Attribute CVSS Score .timeline.cve_published_date 9.8 Updatable; User-configurable;
.details.product Indicator/Vulnerability Attribute Affected Product .timeline.cve_published_date Jenkins Command Line Interface (CLI) User-configurable;
.details.vendor Indicator/Vulnerability Attribute Affected Vendor .timeline.cve_published_date Jenkins User-configurable;
.exploitation_details.attack_vector Indicator/Vulnerability Attribute Attack Vector .timeline.cve_published_date NETWORK User-configurable;
.exploitation_details.exploit_found Indicator/Vulnerability Attribute Has Exploit .timeline.cve_published_date true Updatable; User-configurable;
.exploitation_details.exploitation_registered_in_kev Indicator/Vulnerability Attribute Is CISA KEV .timeline.cve_published_date true Updatable; User-configurable;
.exploitation_details.epss_score Indicator/Vulnerability Attribute EPSS Score .timeline.cve_published_date 0.97225 Updatable; User-configurable;
.timeline.*, .exploitation_stats.*, .exploitation_activity.* Indicator/Vulnerability Description N/A N/A N/A Various fields concatenated to build description HTML

IP Context

The GreyNoise - IP Context action enriches IPs with GreyNoise's full contextual data such as geolocation information and classification.

POST https://api.greynoise.io/v3/noise/multi/context

Sample Body:

{
  "ips": [
    "1.1.1.1"
  ]
}

Sample Response:

{
  "data": [
    {
      "actor": "unknown",
      "bot": false,
      "classification": "malicious",
      "cve": [],
      "first_seen": "2024-08-19",
      "ip": "45.63.52.184",
      "last_seen": "2024-08-19",
      "metadata": {
        "asn": "AS20473",
        "category": "hosting",
        "city": "Los Angeles",
        "country": "United States",
        "country_code": "US",
        "destination_countries": ["Canada"],
        "destination_country_codes": ["CA"],
        "organization": "The Constant Company, LLC",
        "os": "",
        "rdns": "45.63.52.184.vultrusercontent.com",
        "region": "California",
        "sensor_count": 1,
        "sensor_hits": 5,
        "source_country": "United States",
        "source_country_code": "US",
        "tor": false
      },
      "published_at": "2024-08-19 00:00:00+00:00",
      "raw_data": {
        "hassh": [],
        "ja3": [],
        "scan": [
          {
            "port": 983,
            "protocol": "TCP"
          }
        ],
        "web": {}
      },
      "seen": true,
      "spoofable": true,
      "tags": [],
      "vpn": false,
      "vpn_service": ""
    }
  ]
}

ThreatQuotient provides the following default mapping for this action:

Feed Data Path ThreatQ Entity ThreatQ Object Type or Attribute Key Published Date Examples Notes
.ip Indicator.Value IP Address .first_seen 1.1.1.1 N/A
.business_service_intelligence.explanation Indicator.Description N/A N/A Public DNS services are used as alternatives ... N/A
.business_service_intelligence.description Indicator.Description N/A N/A Cloudflare, Inc. is an American web infrastructure ... N/A
.internet_scanner_intelligence.raw_data.{scan.port, .scan.protocol, .http.path} Indicator.Description N/A N/A N/A If Add Raw Data Information To Description is enabled.
.internet_scanner_intelligence.tags[].name Indicator.Tags N/A N/A Apple iOS Lockdownd Crawler User-configurable.
.internet_scanner_intelligence.actor Indicator.Attribute Actor .first_seen APT9 User-configurable. If this is 'unknown', it will be ignored.
.internet_scanner_intelligence.classification Indicator.Attribute Classification .first_seen malicious User-configurable.
.internet_scanner_intelligence.metadata.rdns Indicator.Attribute rDNS .first_seen crawl-66-249-79-17.googlebot.com User-configurable
.internet_scanner_intelligence.metadata.source_country Indicator.Attribute Source Country .first_seen Italy User-configurable
.internet_scanner_intelligence.metadata.source_country_code Indicator.Attribute Country Code .first_seen IT User-configurable
.internet_scanner_intelligence.metadata.source_city Indicator.Attribute Source City .first_seen Milan User-configurable
.internet_scanner_intelligence.metadata.destination_countries[] Indicator.Attribute Destination Country .first_seen Germany User-configurable
.internet_scanner_intelligence.metadata.destination_country_codes[] Indicator.Attribute Destination Country Code .first_seen DE User-configurable
.internet_scanner_intelligence.metadata.organization Indicator.Attribute Organization .first_seen Data Communication Business Group User-configurable
.internet_scanner_intelligence.metadata.asn Indicator.Attribute ASN .first_seen AS3462 User-configurable
.internet_scanner_intelligence.tor Indicator.Attribute Is Tor .first_seen False User-configurable. This is converted to string. Updatable.
.internet_scanner_intelligence.metadata.os Indicator.Attribute Operating System .first_seen Windows 7/8 User-configurable
.internet_scanner_intelligence.metadata.category Indicator.Attribute Category .first_seen isp User-configurable
.internet_scanner_intelligence.raw_data.http.path[] Indicator.Attribute Scanned Path .first_seen /bootstrap/3.3.6/css/bootstrap.min.css User-configurable
.internet_scanner_intelligence.raw_data.scan[].port Indicator.Attribute Scanned Port .first_seen 80 User-configurable
.internet_scanner_intelligence.bot Indicator.Attribute Is Bot .first_seen False User-configurable. This is converted to string. Updatable.
.internet_scanner_intelligence.vpn Indicator.Attribute Is VPN .first_seen False User-configurable. This is converted to string. Updatable.
.internet_scanner_intelligence.spoofable Indicator.Attribute Is Spoofable .first_seen True User-configurable. This is converted to string. Updatable
.internet_scanner_intelligence.vpn_service Indicator.Attribute VPN Service .first_seen Cisco User-configurable
.internet_scanner_intelligence.tags[] Indicator.Attribute Malware Family .first_seen Emotet User-configurable. If the value is present in the table below Greynoise Malware Tags Mapping
.business_service_intelligence.name Indicator.Attribute Service Name .first_seen Google Public DNS User-configurable.
.business_service_intelligence.trust_level Indicator.Attribute Trust Level .first_seen Trustworthy User-configurable. Mapped according to Greynoise Trust Mapping
.business_service_intelligence.reference Indicator.Attribute External Reference .first_seen https://one.one.one.one User-configurable.
.business_service_intelligence.last_updated Indicator.Attribute Last Updated .first_seen 2025-12-05T09:11:03Z User-configurable. Updatable.
.business_service_intelligence.business_ti.found Indicator.Attribute RIOT .first_seen True User-configurable. Updatable. Converted to string.
.business_service_intelligence.business_ti.category Indicator.Attribute RIOT Category .first_seen public_dns User-configurable.
.internet_scanner_intelligence.cves[] Related Indicator.Vulnerability CVE/Vulnerability .first_seen CVE-2020-1234 User-configurable. Ingested according to Ingest CVEs As.

GreyNoise Malware Tags Mapping

The following is how GreyNoise Malware tags are mapped as attributes in ThreatQ.

GreyNoise Tag ThreatQ Attribute 
emotet Emotet
trickbot TrickBot
mirai Mirai
looks like conficker Conficker
d3c3mb3r botnet D3C3MB3R Bot
looks like eternalblue EternalBlue
zmeu worm ZmEu
e6 group E6
zte router worm ZTE Router Worm
ssh bruteforcer SSH Bruteforcer
androxgh0st Androxgh0st
zyxel router worm Zyxel Router Worm

GreyNoise Trust Mapping

The following is how GreyNoise trust levels are mapped as attributes in ThreatQ.

GreyNoise Trust Level  ThreatQ Attribute 
1 Trustworthy
2 Somewhat Trustworthy

Enriched Data

Object counts and action runtime are supplied as generalities only - objects returned by a provider can differ based on credential configurations and action runtime may vary based on system resources and load.

IP Quick Check

Metric Result
Run Time 1 minute
Indicators 25
Indicator Attributes 73

CVE Enrichment

Metric Result
Run Time 1 minute
Indicators 5
Indicator Attributes 35
Vulnerabilities 4
Vulnerability Attributes 29

IP Context

Metric Result
Run Time 1 minute
Indicators 9
Indicator Attributes 163

Use Case Example

  • IP Quick Check - you have a list of IPs and want to see if any of them have been observed scanning or attacking devices on the internet. 
  • CVE Enrichment - you have a list of CVEs and want to enrich them with additional context from GreyNoise to better understand the risk associated with each CVE.
  • IP Context - you have a list of IPs and want to enrich them with additional context from GreyNoise to better understand whether or not they are just noise or are actually malicious.

Change Log

  • Version 1.2.0
    • Updated the integration to use GreyNoise API v3.  
    • Removed the following actions:
      • GreyNoise - Find Similar IPs - the API endpoint was deprecated by the vendor.
      • GreyNoise - RIOT - functions have been integrated into the GreyNoise - IP Context action.
    • Added a new configuration parameter for the GreyNoise - IP Context action:
      • Add Raw Data Information to Description - gives you the option to add the scanned ports and paths to the description.
    • Added additional options for the Enrichment Context Filter configuration parameter for the GreyNoise - IP Context action.
  • Version 1.1.0
    • Added two new actions: GreyNoise CVE Enrichment and GreyNoise IP Context.
    • Added the follow configuration options to all actions:
      • Disable Proxies - enable this option to have the action ignore proxy settings set in the ThreatQ UI.
      • Enable SSL Verification - enable this option to verify the provider's SSL certificate.
  • Version 1.0.0
    • Initial release

PDF Guides

Document ThreatQ Version
GreyNoise Action Bundle Guide v1.2.0 5.12.1 or Greater
GreyNoise Action Bundle Guide v1.1.0 5.12.1 or Greater
GreyNoise Action Bundle Guide v1.0.0 5.12.1 or Greater