Accenture iDefense CDF
The web format of this guide reflects the most current release. Guides for older iterations are available in PDF format.
Integration Details
ThreatQuotient provides the following details for this integration:
Current Integration Version | 1.1.0 |
Compatible with ThreatQ Versions | >= 4.25.0 |
Support Tier | ThreatQ Supported |
Introduction
iDefense IntelGraph is a security intelligence platform that allows users to search, manipulate, visualize and contextualize relationships between elements within the iDefense Security Intelligence knowledge base.
Time constrained data fetching is possible, but these feeds only support a Start Date for manual runs and will use the current time as the End Date.
The following feeds are shared by Accenture iDefense:
- Accenture iDefense Vulnerabilities
- Accenture iDefense Threat Actors
- Accenture iDefense Domains
- Accenture iDefense IPs
- Accenture iDefense Hashes
- Accenture iDefense Campaigns
- Accenture iDefense Global Events
- Accenture iDefense Malicious Events
- Accenture iDefense Malware Families
- Accenture iDefense Malicious Tools
- Accenture IDefense Threat Indicators
Installation
Perform the following steps to install the integration:
The same steps can be used to upgrade the integration to a new version.
- Log into https://marketplace.threatq.com/.
- Locate and download the integration file.
- Navigate to the integrations management page on your ThreatQ instance.
- Click on the Add New Integration button.
- Upload the integration file using one of the following methods:
- Drag and drop the file into the dialog box
- Select Click to Browse to locate the integration file on your local machine
ThreatQ will inform you if the feed already exists on the platform and will require user confirmation before proceeding. ThreatQ will also inform you if the new version of the feed contains changes to the user configuration. The new user configurations will overwrite the existing ones for the feed and will require user confirmation before proceeding.
- If prompted, select the individual feeds to install and click Install. The feed will be added to the integrations page.
You will still need to configure and then enable the feed.
Configuration
ThreatQuotient does not issue API keys for third-party vendors. Contact the specific vendor to obtain API keys and other integration-related credentials.
To configure the integration:
- Navigate to your integrations management page in ThreatQ.
- Select the Commercial option from the Category dropdown (optional).
- Click on the integration entry to open its details page.
- Enter the following parameters under the Configuration tab:
Parameter Description API Key The iDefense API Key used for authentication. Feed URL The iDefense API Endpoint URL used by the feed. This parameter is used for display purposes only. - Review any additional settings, make any changes if needed, and click on Save.
- Click on the toggle switch, located above the Additional Information section, to enable it.
ThreatQ Mapping
Shared Attribute Mapping
With the exception of Accenture iDefense Malware Families (see Known Issues/Limitations), the following attribute mapping applies to all feeds:
Feed Data Path | ThreatQ Entity | ThreatQ Object Type or Attribute Key | Published At | Examples | Notes |
---|---|---|---|---|---|
.results[].title | Object.attribute | iDefense Title | .results[].created_on | Kernel.Org Kernel Input Validation Error information Disclosure Vulnerability | |
.results[].links | Object.attribute | Targeted Vertical | .results[].created_on | Includes objects from .results[].links for which relationship is 'target' and type is 'vertical' . |
|
.results[].links | Object.attribute | Targeted Organization | .results[].created_on | Includes objects from .results[].links for which relationship is 'target' and type is 'target_organization' . |
|
.results[].links | Object.attribute | Targeted Country | .results[].created_on | Includes objects from .results[].links for which relationship is 'target' and type is 'country' . |
|
.results[].links | Object.attribute | Impacted Vertical | .results[].created_on | Includes objects from .results[].links for which relationship is 'impacts' and type is 'vertical' . |
|
.results[].links | Object.attribute | Impacted Organization | .results[].created_on | Includes objects from .results[].links for which relationship is 'impacts' and type is 'target_organization' . |
|
.results[].links | Object.attribute | Impacted Country | .results[].created_on | Includes objects from .results[].links for which relationship is 'impacts' and type is 'country' . |
|
.results[].alias | Object.attribute | Alias | .results[].created_on | ['Alias 1', 'Alias 2'] |
|
.results[].pocs | Object.attribute | Proof of Concept | .results[].created_on | ||
.results[].popularity | Object.attribute | Popularity | .results[].created_on | 3 |
In range 1 (Prototype) - 5 (Almost Always) |
.results[].severity | Object.attribute | Severity | .results[].created_on | 3 |
In range 1 (Minimal) - 5 (Extreme) |
.results[].zero_day | Object.attribute | Has Zero Day | .results[].created_on | True |
|
.results[].mitigation | Object.attribute | Mitigation | .results[].created_on | iDefense recommends using Microsoft Corp.'s Enhanced Mitigation experience toolkit (EMET) tool to help mitigate this vulnerability. While... | |
.results[].threat_types | Object.attribute | Threat Type | .results[].created_on | Vulnerability | |
.results[].last_seen_as | Object.attribute | Last Seen As | .results[].created_on | ||
.results[].meta_data | Object.attribute | Metadata | .results[].created_on | ||
.results[].cwe | Object.attribute | CWE | .results[].created_on | CWE-200 | |
.results[].cvss2_ base_score |
Object.attribute | CVSS v2 Base Score | .results[].created_on | 3.3 | |
.results[].cvss2_ temporal_score |
Object.attribute | CVSS v2 Temporal Score | .results[].created_on | 2.4 | |
.results[].cvss3_ base_score |
Object.attribute | CVSS v3 Base Score | .results[].created_on | 5.1 | |
.results[].cvss3_ temporal_score |
Object.attribute | CVSS v3 Temporal Score | .results[].created_on | 7.9 | |
.results[].motivations | Object.attribute | Motivation | .results[].created_on | ||
.results[].nationalities | Object.attribute | Nationality | .results[].created_on | ||
.results[].languages | Object.attribute | Language | .results[].created_on | ||
.results[].capabilities | Object.attribute | Capability | .results[].created_on | ||
.results[].hashtags | Object.attribute | Hashtag | .results[].created_on | ||
.results[].religions | Object.attribute | Religion | .results[].created_on | ||
.results[].real_name | Object.attribute | Real Name | .results[].created_on | ||
.results[].skill_lvl | Object.attribute | Skill Level | .results[].created_on | ||
.results[].attack_type | Object.attribute | Attack Type | .results[].created_on | ||
.results[].motive | Object.attribute | Motive | .results[].created_on | ||
.results[].location | Object.attribute | Location | .results[].created_on | ||
.results[].links | Object.attribute | Location | .results[].created_on | Includes objects from .results[].links for which relationship is 'hasLocation' and type is 'country' |
|
.results[].event_type | Object.attribute | Event Type | .results[].created_on | ||
.results[].variety | Object.attribute | Variety | .results[].created_on | ||
.results[].vector | Object.attribute | Vector | .results[].created_on | ||
.results[].sources_external | Object.attribute | Reference | .results[].created_on | ||
.results[].vendor_fix_external | Object.attribute | Vendor Fix | .results[].created_on | ||
.results[].links | Object.attribute | Affected Technology | .results[].created_on | Includes objects from .results[].links for which relationship is 'affects' and type is 'vuln_tech' . |
|
.results[].description | Object.attribute | Description | .results[].created_on | Remote exploitation of an input validation error vulnerability in Kernel.Org's Kernel could allow an attacker to steal sensitive information... | |
.results[].analysis | Object.attribute | Analysis | .results[].created_on | Exploitation could allow an attacker to steal sensitive information on the targeted host. An attacker... | |
.results[].interesting_characteristics | Object.attribute | Interesting Characteristics | .results[].created_on |
Shared Related Object Mapping
With the exception of Accenture iDefense Malware Families (see Known Issues/Limitations), the following shared object mapping applies to all feeds:
Feed Data Path | ThreatQ Entity | ThreatQ Object Type or Attribute Key | Published At | Examples | Notes |
---|---|---|---|---|---|
.results[].links | Indicators.Value | IP Address | .results[].created_on | 192.168.0.1 | Includes objects from .results[].links for which type is 'ip' . |
.results[].links | Indicators.Value | FQDN | .results[].created_on | somesubdomain. example.com |
Includes objects from .results[].links for which type is 'domain' . |
.results[].links | Indicators.Value | MD5 | .results[].created_on | 1a79a4d60de6718e8 e5b326e338ae533 |
Includes objects from .results[].links for which type is 'file' , with a length of 32. |
.results[].links | Indicators.Value | URL | .results[].created_on | example.com | Includes objects from .results[].links for which type is 'url' . |
.results[].filenames | Indicators.Value | Filename | .results[].created_on | example.txt | N/A |
.results[].sha1 | Indicators.Value | SHA-1 | .results[].created_on | c3499c2729730a7f807 efb8676a92dcb6f8a3f8f |
N/A |
.results[].sha256 | Indicators.Value | SHA-256 | .results[].created_on | 50d858e0985ecc7f6041 8aaf0cc5ab587f42c2570 a884095a9e8ccacd0f6545c |
N/A |
.results[].links | Adversaries.Name | N/A | .results[].created_on | leopoldo787 | Includes objects from .results[].links for which relationship is one of 'alias', 'talksWith', 'advertiserOf' and key does not start with 'CVE-' . |
.results[].links | Adversaries.Name | N/A | .results[].created_on | HAFNIUM | Includes objects from .results[].links for which type is 'threat_group' . |
.results[].links | Malware.Value | N/A | .results[].created_on | fragus | Includes objects from .results[].links for which type is 'malware_family' . |
.results[].links | Campaigns.Value | N/A | .results[].created_on | GRIZZLY STEPPE | Includes objects from .results[].links for which type is 'threat_campaign' . |
.results[].links | Tools.Value | N/A | .results[].created_on | EtterSilent | Includes objects from .results[].links for which type is 'malicious_tool' . |
.results[].ttps | Ttps.Value | N/A | .results[].created_on | Hacking | N/A |
.results[].files[] | Indicator.Value | N/A | .results[].created_on | C:\Users\jujubox\AppData\ Local\Temp\Host.exe |
N/A |
.results[].files[].malware_family | Malware.Value | N/A | .results[].created_on | NanoCore RAT | N/A |
Accenture iDefense Vulnerabilities
JSON response sample:
{
"results": [
{
"created_on": "2020-01-27T15:25:40.000Z",
"index_timestamp": "2020-01-27T15:27:05.411Z",
"key": "CVE-2019-17651",
"last_modified": "2020-01-27T15:25:40.000Z",
"last_published": "2020-01-27T15:25:40.000Z",
"links": [
{
"key": "cpe:/a:fortinet:fortisiem:5.2.5",
"relationship": "affects",
"type": "vuln_tech",
"uuid": "bc52b449-f0e4-4871-936c-15bec7258857",
"href": "/rest/fundamental/v0/bc52b449-f0e4-4871-936c-15bec7258857"
}
],
"replication_id": 1580138740392000000,
"sources_external": [
{
"datetime": "2020-01-27T15:24:40.000Z",
"description": "Security Advisory FG-IR-19-197",
"name": "Fortinet",
"reputation": 5,
"url": "https://fortiguard.com/psirt/FG-IR-19-197"
}
],
"type": "vulnerability",
"uuid": "77a12a69-204b-4c75-bb79-4e545bfb48e4",
"analysis": "Exploitation could allow an attacker to execute arbitrary script code on the targeted host.\n\nAn attacker can successfully exploit this vulnerability by enticing a potential victim to visit a malicious site. This is normally accomplished with social engineering techniques. A mitigating factor against exploitation includes practicing safe browsing habits, such as not visiting untrusted sites.\n\niDefense considers this a LOW-severity vulnerability due to the minimal impact potential.",
"cvss2": "AV:N/AC:M/Au:N/C:N/I:P/A:N/E:U/RL:OF/RC:C",
"cvss2_base_score": 4.3,
"cvss2_temporal_score": 3.2,
"cvss3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N/E:U/RL:O/RC:C",
"cvss3_base_score": 6.1,
"cvss3_temporal_score": 5.3,
"cwe": "CWE-79",
"description": "Remote exploitation of an input validation vulnerability in Fortinet's FortiSIEM, could allow an attacker to execute arbitrary script code on the targeted host.\n\nAn input validation vulnerability has been identified in FortiSIEM. The application fails to properly sanitize user-supplied data via a parameter description field of a Device Maintenance schedule. \n\nFurther details are not available at the time of this writing. iDefense will update this report as more details become available.",
"severity": 2,
"threat_types": [
"Vulnerability"
],
"title": "Fortinet FortiSIEM Input Validation XSS Vulnerability",
"vendor_fix_external": [
{
"advisory_id": "Fortinet update information",
"datetime": "2020-01-06T05:00:00.000Z",
"url": "https://fortiguard.com/psirt/FG-IR-19-197"
}
]
}
],
"total_size": 5,
"page": 1,
"page_size": 25,
"more": false
}
In addition to the attribute mapping listed on Shared Attribute Mapping and related object mapping listed on Shared Related Object Mapping, ThreatQ provides the following default mapping for this feed:
Feed Data Path | ThreatQ Entity | ThreatQ Object Type or Attribute Key | Published At | Examples | Notes |
---|---|---|---|---|---|
.results[].key | Indicator.value | CVE | .results[].created_on | CVE-2020-0001 | N/A |
Accenture iDefense Threat Actors
JSON response sample:
{
"results": [
{
"created_on": "2020-01-24T17:49:58.000Z",
"index_timestamp": "2020-01-27T09:37:28.223Z",
"key": "@_naifu666",
"last_modified": "2020-01-25T12:13:26.000Z",
"last_published": "2020-01-24T17:49:58.000Z",
"links": [
{
"key": "DKB AG",
"relationship": "impacts",
"type": "target_organization",
"uuid": "85027bd1-4afe-4dcf-bebb-23cee7d43e3b",
"href": "/rest/fundamental/v0/85027bd1-4afe-4dcf-bebb-23cee7d43e3b"
},
{
"key": "Sparkasse",
"relationship": "impacts",
"type": "target_organization",
"uuid": "642e3e5c-8f10-40d4-9951-17730eb80381",
"href": "/rest/fundamental/v0/642e3e5c-8f10-40d4-9951-17730eb80381"
}
],
"replication_id": 1579954406915000000,
"sources_external": [
{
"datetime": "2020-01-24T16:58:59.000Z",
"name": "Twitter",
"reputation": 1,
"url": "https://twitter.com/_naifu666"
}
],
"type": "threat_actor",
"uuid": "431e47f1-df34-4d86-865a-e0615015c15e",
"first_seen": "2020-01-08T00:00:00.000Z",
"severity": 2,
"threat_types": [
"Cyber Crime"
],
"description": "Twitter handle `@_naifu911` claimed to have carried out two distributed denial of service (DDoS) attacks affecting German-based Das kann Bank (DKB), and one on Sparkasse Bank Malta plc, which both occurred in January 2020. This Twitter account was suspended and a new handle created in its place: `@_naifu666`. The threat actor using this handle shared screenshots on Twitter of check-host.net, a site used for checking website availability, showing the DKB and Sparkasse sites being unreachable. \n\n`@_naifu666` is a German-language speaker but claims to be from Japan, using a Twitter profile picture of a character called Shiro from the anime \"No Game No Life\" (\"shiro\" means \"white\"). As of January 24, 2020, the account has nine followers and follows 14 Twitter users.\n\nThe Twitter profile shares links to the Telegram account `@naifu1337`, Discord account `.naifu#3596` and Keybase account `keybase.io/naifu`. The Keybase profile contains the Bitcoin address `1Bf36QV91Q9jyyyyw3KyoCUYkQ79JaYWLd` and a single machine called `NaifuVM`. The Bitcoin wallet has zero transactions as of January 24, 2020.\n\nTwitter provides the following additional data: Phone number ending in 95,\nEmail `un***************@p*********.***`",
"skill_lvl": "Unknown",
"ttps": [
"DDoS"
]
}
],
"total_size": 9,
"page": 1,
"page_size": 25,
"more": false
}
In addition to the attribute mapping listed on Shared Attribute Mapping and related object mapping listed on Shared Related Object Mapping, ThreatQ provides the following default mapping for this feed:
Feed Data Path | ThreatQ Entity | ThreatQ Object Type or Attribute Key | Published At | Examples | Notes |
---|---|---|---|---|---|
.results[].key | Adversary.name | N/A | .results[].created_on | Mikhail Rytikov | N/A |
Accenture iDefense Domains
JSON response sample:
{
"results": [
{
"created_on": "2020-01-27T14:20:09.000Z",
"index_timestamp": "2020-01-27T14:22:28.904Z",
"key": "lightway.duckdns.org",
"last_modified": "2020-01-27T14:20:09.000Z",
"last_published": "2020-01-27T14:20:09.000Z",
"links": [
{
"key": "NanoCore RAT",
"relationship": "seenAt",
"type": "malware_family",
"uuid": "d388ac19-8ffb-46ba-9fc6-c94fc1bb80f5",
"href": "/rest/fundamental/v0/d388ac19-8ffb-46ba-9fc6-c94fc1bb80f5"
}
],
"replication_id": 1580134809889000001,
"type": "domain",
"uuid": "edf28d27-cff1-490a-845b-2282694c744d",
"last_seen_as": [
"MALWARE_C2"
],
"severity": 3,
"threat_types": [
"Cyber Crime"
]
}
],
"total_size": 134,
"page": 1,
"page_size": 25,
"more": true
}
In addition to the attribute mapping listed on Shared Attribute Mapping and related object mapping listed on Shared Related Object Mapping, ThreatQ provides the following default mapping for this feed:
Feed Data Path | ThreatQ Entity | ThreatQ Object Type or Attribute Key | Published At | Examples | Notes |
---|---|---|---|---|---|
.results[].key | Indicator.value | FQDN | .results[].created_on | subdomain.example.com | N/A |
Accenture iDefense IPs
JSON response sample:
{
"results": [
{
"created_on": "2020-01-27T14:20:01.000Z",
"index_timestamp": "2020-01-27T14:21:57.692Z",
"key": "67.215.9.236",
"last_modified": "2020-01-27T14:20:01.000Z",
"last_published": "2020-01-27T14:20:01.000Z",
"links": [
{
"key": "NanoCore RAT",
"relationship": "seenAt",
"type": "malware_family",
"uuid": "d388ac19-8ffb-46ba-9fc6-c94fc1bb80f5",
"href": "/rest/fundamental/v0/d388ac19-8ffb-46ba-9fc6-c94fc1bb80f5"
}
],
"replication_id": 1580134801570000000,
"type": "ip",
"uuid": "acdd1524-bdee-4bf8-93a2-21e1a44ca9de",
"last_seen_as": [
"MALWARE_C2"
],
"severity": 3,
"threat_types": [
"Cyber Crime"
],
"ip_int": 1138166252,
"ip_type": 4
}
],
"total_size": 25,
"page": 1,
"page_size": 25,
"more": false
}
In addition to the attribute mapping listed on Shared Attribute Mapping and related object mapping listed on Shared Related Object Mapping, ThreatQ provides the following default mapping for this feed:
Feed Data Path | ThreatQ Entity | ThreatQ Object Type or Attribute Key | Published At | Examples | Notes |
---|---|---|---|---|---|
.results[].key | Indicator.value | IP Address | .results[].created_on | 192.168.0.1 | N/A |
Accenture iDefense Hashes
JSON response sample:
{
"results": [
{
"created_on": "2020-01-27T03:29:20.000Z",
"index_timestamp": "2020-01-27T16:19:17.460Z",
"key": "f6d18361f19fa5b917a8b021596fa293",
"last_modified": "2020-01-27T16:17:46.000Z",
"last_published": "2020-01-27T03:29:20.000Z",
"links": [
{
"key": "http://177.103.159.44:80",
"relationship": "contactsC2At",
"type": "url",
"uuid": "63c65f6d-5862-4544-b6bf-960501e61a3a",
"href": "/rest/fundamental/v0/63c65f6d-5862-4544-b6bf-960501e61a3a"
}
],
"replication_id": 1580141866793000010,
"type": "file",
"uuid": "6e568b84-c3a3-4bc2-9c59-db42dcd7b430",
"file_class": "gzip compressed data, from Unix",
"file_extension": "gzip",
"filenames": [
"w80e3z3n36726.exe"
],
"filetype": "Archive",
"severity": 3,
"sha1": "b8e44e7e54edd35ab601ca2578a9ce5f45683028",
"sha256": "426ca154e8e99de86dc63c3d45ae6a1ab88b49442964ca7896f1eb7d8c6d30b6",
"size": 286374,
"ssdeep": "6144:xjf/UcrD2g3py3ILr3dJYZq5V9Lza2rPdN2U1ygkaOvB+N50ghGXt:Zf/UcXR+o3dJ3VpW2r/2WygkaOvEN50R",
"threat_types": [
"Cyber Crime"
]
}
],
"total_size": 10,
"page": 1,
"page_size": 25,
"more": false
}
In addition to the attribute mapping listed on Shared Attribute Mapping and related object mapping listed on Shared Related Object Mapping, ThreatQ provides the following default mapping for this feed:
Feed Data Path | ThreatQ Entity | ThreatQ Object Type or Attribute Key | Published At | Examples | Notes |
---|---|---|---|---|---|
.results[].key | Indicator.value | MD5 | .results[].created_on | 1a79a4d60de6718e8e5b326e338ae533 | N/A |
Accenture iDefense Campaigns
JSON response sample:
{
"results": [
{
"created_on": "2015-06-05T00:00:00.000Z",
"index_timestamp": "2020-01-27T04:30:45.354Z",
"key": "OPM Breach",
"last_modified": "2020-01-03T14:26:58.000Z",
"last_published": "2015-06-05T00:00:00.000Z",
"links": [
{
"key": "50c24aa1-c90b-4874-93fe-b98f9e5f264e",
"relationship": "mentions",
"type": "intelligence_alert",
"uuid": "901a3856-35b6-41ac-82fa-ca660dc4527c",
"href": "/rest/document/v0/901a3856-35b6-41ac-82fa-ca660dc4527c"
}
],
"replication_id": 1578061618402000000,
"type": "threat_campaign",
"uuid": "9330f7f0-7d13-4645-92fc-61f8ca3ee7b7",
"description": "See [OPM Data Breach](/#/node/intelligence_alert/view/4e9afda9-cda5-4de6-bc87-50970c1bc550)",
"intent": "Espionage",
"motive": [
"political"
],
"severity": 4,
"threat_types": [
"Cyber Espionage"
]
}
],
"total_size": 1,
"page": 1,
"page_size": 25,
"more": false
}
In addition to the attribute mapping listed on Shared Attribute Mapping and related object mapping listed on Shared Related Object Mapping, ThreatQ provides the following default mapping for this feed:
Feed Data Path | ThreatQ Entity | ThreatQ Object Type or Attribute Key | Published At | Examples | Notes |
---|---|---|---|---|---|
.results[].key | Campaign.value | N/A | .results[].created_on | OPM Breach | N/A |
.results[].event_start_date | Campaign.started_at | N/A | N/A | N/A |
Accenture iDefense Global Events
JSON response sample:
{
"results": [
{
"created_on": "2020-01-23T20:15:47.000Z",
"index_timestamp": "2020-01-27T05:37:00.630Z",
"key": "2019-nCoV Novel Coronavirus Outbreak",
"last_modified": "2020-01-23T21:05:18.000Z",
"last_published": "2020-01-23T20:15:47.000Z",
"links": [
{
"key": "Taiwan",
"relationship": "hasLocation",
"type": "country",
"uuid": "8e7da585-04b8-4c5f-80f1-891040557002",
"href": "/rest/fundamental/v0/8e7da585-04b8-4c5f-80f1-891040557002"
},
],
"replication_id": 1579813518213000000,
"sources_external": [
{
"datetime": "2020-01-23T17:50:49.000Z",
"description": "Freedom of the Press and the 2002-2003 SARS Outbreak",
"name": "Congressional-Executive Commission on China",
"reputation": 5,
"url": "https://www.cecc.gov/freedom-of-the-press-and-the-2002-2003-sars-outbreak"
}
],
"type": "global_event",
"uuid": "c6b8b9d6-004d-45d4-af22-67fbfb3df53c",
"description": "On Thursday, January 23 Chinese authorities quarantined the cities of Wuhan (武汉) and its eastern suburbs of Huanggang (黄冈) and Ezhou (鄂州) in response to an outbreak of what has been named Novel Coronavirus (2019-nCoV), shutting down public transportation, roads and highways, rail stations, and the city's airport. \n\nReported infection rates varied. As of January 21, the World Health Organization (WHO) had identified 314 confirmed cases (309 in China, two in Thailand, one in Japan, and one in South Korea) and six confirmed deaths. By January 22, the Chinese State Council Information Office was reporting a total 444 cases of infection and 17 deaths in Wuhan's Hubei Province. Citing the China National Health Commission, on January 23 media sources were reporting 17 dead, all in Wuhan's Hubei Province, from a total of 571 cases in China, three in Thailand, and one each in the United States (Washington State), Japan, South Korea, Taiwan, Hong Kong and Macau for a total of 580. By the early hours of January 24 Beijing local time, Chinese news source _iFeng_ reported a total of 658 infections also including cases in Vietnam, the UK, Singapore, and the Philippines, and 18 dead. Chinese news outlet _Caixin_ late on January 23 cited an estimate by Chinese health authorities that cases would eventually reach up to 6000 in Wuhan alone, and that up to seven cities had been placed under transportation bans.\n\nChinese authorities first reported cases to the WHO on December 31, 2019, and within 24 hours had identified the probable source as an infected animal offered for sale at the Wuhan Huanan Wholesale Seafood Market (武汉华南海鲜批发市场, _Wuhan Huanan Haixian Pifa Shichang_) in the city's central district not far from the Yangtze River. Media reports have described the market as a trading post for exotic game meat, listing species such as ostrich, peacock, civet, crocodile, camel, koala and wolf pup on posted menus, along with live slaughtering services.\n\nMany Chinese citizens praised authorities for their firm handling of the outbreak, including the quarantine actions and the relaxing of state censorship on media reporting about the virus. The media policy contrasted with state suppression of reporting on the SARS virus in 2002 and Asian H7N9 avian flu epidemic in 2013.\n\nAs of January 23, significant global effort is being made to contain the outbreak but will continue to cause concern and even panic until new cases are no longer emerging. Like any large-scale global event, the epidemic is ripe for exploitation in phishing e-mail subject lines and lure documents. iDefense suggests organizations rely only on verifiable and authoritative sources for news and status updates about the virus, and remind their staff about the likelihood of increased phishing attempts and ways to protect against them.",
"event_start_date": "2019-12-31T05:00:00.000Z",
"event_type": "Epidemic"
}
],
"total_size": 1,
"page": 1,
"page_size": 25,
"more": false
}
In addition to the attribute mapping listed on Shared Attribute Mapping and related object mapping listed on Shared Related Object Mapping, ThreatQ provides the following default mapping for this feed:
Feed Data Path | ThreatQ Entity | ThreatQ Object Type or Attribute Key | Published At | Examples | Notes |
---|---|---|---|---|---|
.results[].key | Event.title | Global Event | .results[].created_on | 2019-nCoV Novel Coronavirus Outbreak | N/A |
.results[].event_start_date | Event.happened_at | N/A | N/A | N/A |
Accenture iDefense Malicious Events
JSON response sample:
{
"results": [
{
"created_on": "2020-01-22T20:59:24.000Z",
"index_timestamp": "2020-01-27T09:37:16.485Z",
"key": "28615db1-5110-4765-9154-df559473c195",
"last_modified": "2020-01-26T20:08:29.000Z",
"last_published": "2020-01-22T20:59:24.000Z",
"links": [
{
"key": "Amazon",
"relationship": "impacts",
"type": "target_organization",
"uuid": "d7448fb7-dc25-45f0-b42b-ed24f1f644c3",
"href": "/rest/fundamental/v0/d7448fb7-dc25-45f0-b42b-ed24f1f644c3"
}
],
"replication_id": 1580069309367000000,
"sources_external": [
{
"datetime": "2020-01-22T05:00:00.000Z",
"description": "British public news source",
"name": "British Broadcasting Corporation",
"reputation": 5,
"url": "https://www.bbc.com/news/world-asia-india-50245209"
}
],
"type": "malicious_event",
"uuid": "863ed17d-4f49-4185-ade6-a414d6162e6c",
"attack_type": "Information Exfiltration",
"description": "##Overview\n\nThe 2018 breach of Amazon founder Jeff Bezos’ cell phone, which led to a scandalous 2019 leak of details about Bezos’ private life, traces back to Saudi Arabia’s royal family, according to a forensic study the _Financial Times_ and the _Guardian_ reported on January 21. Anthony J Ferrante of the firm FTI Consulting found with “medium to high confidence” that Bezos’s phone began exporting masses of data soon after he received an encrypted video file from the WhatsApp account of Saudi Prince Mohammad bin Salman in May 2018. \n\nThe forensic analysis, judging from a summary UN Special Rapporteurs for Human Rights Agnes Callamard and David Kaye publicized, showed no evidence of known malware. The report did note that the suspect video had been delivered via an encrypted downloader host on WhatsApp’s media server, which analysts were unable to decrypt for analysis. Analysts suspected that the threat actors used mobile spyware such as the Israeli cyberwarfare firm [NSO Group’s Pegasus](/#/node/intelligence_alert/view/88269b38-c791-4fcb-8abf-36e67a9f8a48) software or possibly the [Hacking Team](/#/node/threat_group/view/5e590c8b-8e29-45ae-be74-c9610e91a0c0)’s Galileo Remote Control System. They suspect that Saudi security chief Saud al-Qahtani, who has procured surveillance software from the [Hacking Team](/#/node/intelligence_alert/view/6f454716-545f-4e39-a5fa-e16466d1cf53) in the past, procured such surveillance software.\n\n##iDefense Insight and Assessment \n\niDefense notes that the Saudi Prince and al-Qahtani have had a strong incentive to discredit Bezos after _The Washington Post_ published articles by journalist Jamal Khashoggi, critical of the Saudi government. A Saudi Twitter campaign targeted Bezos after the paper published articles blaming a Saudi hit squad for the October 2018 murder of Khashoggi. \n\nHowever, publicly available evidence in the case remains less than complete. The attribution rests on massive spikes in egress from Bezos’ phone and on the use of malicious .mp4 files distributed via WhatsApp. \n\niDefense and [others](https://twitter.com/KimZetter/status/1219990065314762752) caution that third-party threat actors may have hacked the Saudi prince’s phone and used it as a launchpad. Both [Iranian](/#/node/intelligence_alert/view/2c8cba51-7eae-4052-b595-77646b7aab16) and [Russian](/#/node/intelligence_alert/view/6f668357-bd6a-4a04-876d-20bd840e0788) governments have targeted Saudi Arabia in the past and have strong incentives to discredit the country so it will not gain too much leverage in the precarious balance among Middle Eastern powers. In addition, if indeed the malware used was Galileo, that code has been available since after the 2015 Hacking Team breach, allowing a variety of threat actors to have used it.\n\n##Action\n\niDefense recommends that organizations and individuals:\n\n* Remain aware that even an encrypted messaging applications like Signal will not ensure privacy of communications.\n* Exercise caution when opening e-mails and clicking on links, even from known contacts.",
"event_end_date": "2019-01-01T05:00:00.000Z",
"event_start_date": "2018-05-01T04:00:00.000Z",
"intent": "Discredit Jeff Bezos and The Washington Post",
"motive": [
"Political"
],
"severity": 3,
"threat_types": [
"Cyber Espionage"
],
"ttps": [
"Information disclosure",
"Mobile malware",
"malicious .mp4 file"
],
"title": "Saudi Prince Likely Linked to 2018 Breach of Amazon Founder Jeff Bezos’ Phone"
}
],
"total_size": 1,
"page": 1,
"page_size": 25,
"more": false
}
In addition to the attribute mapping listed on Shared Attribute Mapping and related object mapping listed on Shared Related Object Mapping, ThreatQ provides the following default mapping for this feed:
Feed Data Path | ThreatQ Entity | ThreatQ Object Type or Attribute Key | Published At | Examples | Notes |
---|---|---|---|---|---|
.results[].key | Event.title | Malicious Event | .results[].created_on | 28615db1-5110-4765-9154-df559473c195 | N/A |
.results[].event_start_date | Event.happened_at | N/A | N/A | N/A |
Accenture iDefense Malware Families
JSON response sample:
{
"results": [
{
"created_on": "2015-01-29T07:52:47.000Z",
"index_timestamp": "2020-01-27T16:42:14.233Z",
"key": "VB Downloader",
"last_modified": "2020-01-27T16:40:51.000Z",
"last_published": "2016-05-19T14:47:54.000Z",
"links": [
{
"key": "793005fd07e7ae0c5bd2064d4d3a4766",
"relationship": "belongsTo",
"type": "file",
"uuid": "076486ac-b810-4ee9-a0f7-4965c57e8470",
"href": "/rest/fundamental/v0/076486ac-b810-4ee9-a0f7-4965c57e8470"
}
],
"replication_id": 1580134608020000000,
"type": "malware_family",
"uuid": "511c3d3b-cff3-4263-b236-269deabab7c4",
"description": "IoT botnet designed to conduct large-scale DDoS attacks.",
"severity": 3,
"threat_types": [
"Hacktivism",
"Cyber Crime"
],
"variety": [
"Brute force"
],
"vector": [
"Network propagation"
]
}
],
"total_size": 20,
"page": 1,
"page_size": 25,
"more": false
}
In addition to the attribute mapping listed on Shared Attribute Mapping, ThreatQ provides the following default mapping for this feed:
Feed Data Path | ThreatQ Entity | ThreatQ Object Type or Attribute Key | Published At | Examples | Notes |
---|---|---|---|---|---|
.results[].key | Malware.value | N/A | .results[].created_on | VB Downloader | N/A |
Accenture iDefense Malicious Tools
JSON response sample:
{
"results": [
{
"created_on": "2019-11-07T14:17:23.000Z",
"index_timestamp": "2020-01-27T04:58:59.837Z",
"key": "Try2check",
"last_modified": "2019-11-07T14:17:23.000Z",
"last_published": "2019-11-07T14:17:23.000Z",
"links": [
{
"key": "bb585868-39c5-41e1-b74c-7237db813bfe",
"relationship": "mentions",
"type": "intelligence_alert",
"uuid": "57a05947-86f7-40ce-96a2-481eaa1de160",
"href": "/rest/document/v0/57a05947-86f7-40ce-96a2-481eaa1de160"
}
],
"replication_id": 1573136243827000000,
"type": "malicious_tool",
"uuid": "2b5b4975-e65b-4d6f-ad0a-63ad11919c5d",
"description": "Service used by threat actors to check the validity of compromised card data, by using it to make small transactions. Also referred to as Try2services",
"severity": 2,
"threat_types": [
"Cyber Crime"
]
}
],
"total_size": 8,
"page": 1,
"page_size": 25,
"more": false
}
In addition to the attribute mapping listed on Shared Attribute Mapping and related object mapping listed on Shared Related Object Mapping, ThreatQ provides the following default mapping for this feed:
Feed Data Path | ThreatQ Entity | ThreatQ Object Type or Attribute Key | Published At | Examples | Notes |
---|---|---|---|---|---|
.results[].key | Tool.value | N/A | .results[].created_on | Try2check | N/A |
Accenture iDefense Threat Indicators
JSON response sample:
{
"results": [
{
"confidence": 50,
"display_text": "http://66.42.98.220:12345/test/install.bat",
"files": [
{
"confidence": 50,
"display_text": "7966c2c546b71e800397a67f942858d0",
"key": "7966c2c546b71e800397a67f942858d0",
"last_seen": "2020-03-09T19:17:00.000Z",
"relationship": "deliveredFrom",
"type": "file",
"uuid": "e4909da9-b75f-4229-8756-4675bb755e19",
"sha1": "b0aa2e0df219236af891f794965a29642de9c96f",
"sha256": "de9ef08a148305963accb8a64eb22117916aa42ab0eddf60ccb8850468a194fc",
"href": "/rest/fundamental/v0/e4909da9-b75f-4229-8756-4675bb755e19"
}
],
"index_timestamp": "2020-03-27T18:51:42.094Z",
"key": "http://66.42.98.220:12345/test/install.bat",
"last_modified": "2020-03-26T16:08:26.000Z",
"last_published": "2020-03-26T16:08:26.000Z",
"last_seen": "2020-03-09T19:17:00.000Z",
"last_seen_as": [
"MALWARE_DOWNLOAD"
],
"malware_family": [],
"mentioned_by": [
{
"display_text": "iDefense Global Research Intelligence Digest for March 11, 2020",
"key": "9d74f9ad-2fee-41f1-b290-7932dc63be73",
"relationship": "mentions",
"type": "intelligence_alert",
"uuid": "06a5dafb-1a7f-4ce6-aec8-74cc7ee1ac84",
"href": "/rest/document/v0/06a5dafb-1a7f-4ce6-aec8-74cc7ee1ac84"
}
],
"replication_id": 1585238906159000000,
"severity": 4,
"threat_types": [
"Cyber Espionage"
],
"type": "url",
"uuid": "9fb4eceb-d9dc-45c6-8ae8-7d5617ba3a1f",
"arguments": [],
"path": [
"test",
"install.bat"
]
}
]
}
In addition to the attribute mapping listed on Shared Attribute Mapping and related object mapping listed on Shared Related Object Mapping, ThreatQ provides the following default mapping for this feed:
Feed Data Path | ThreatQ Entity | ThreatQ Object Type or Attribute Key | Published At | Examples | Notes |
---|---|---|---|---|---|
results[].key | Indicator.value | N/A | .results[].last_published_at | Try2check | N/A |
Known Issues / Limitations
- The Accenture iDefense Malware Families feed excludes some relationships due to the very large amount of data received; other feeds will bring relationships in normally. As a result, any shared attributes or shared related objects derived from
.results[].links
are not parsed for the Accenture iDefense Malware Families feed.
Change Log
- Version 1.1.0
- Added new Threat Indicators feed.
- Fixed a 500 error issue with the Malware Families feed.
- Added supported for related file hashes.
- Version 1.0.0
- Initial release
PDF Guides
Document | ThreatQ Version |
---|---|
Accenture iDefense CDF v1.1.0 | 4.25 or Greater |
Accenture iDefense CDF v1.0.0 | 4.25 or Greater |