Cofense Intelligence CDF
The web format of this guide reflects the most current release. Guides for older iterations are available in PDF format.
Integration Details
ThreatQuotient provides the following details for this integration:
Current Integration Version | 1.0.7 |
Compatible with ThreatQ Versions | >= 4.35.0 |
Support Tier | ThreatQ Supported |
Introduction
Cofense Intelligence delivers high-fidelity phishing indicators and contextual information highlighting attacker tactics across their global criminal operation.
Security teams can easily operationalize Cofense Intelligence indicators in the ThreatQ platform. Indicators of phishing, such as attack vectors and malware families, help analysts in their phishing defense. Automatically deploy prioritized and relevant data to your sensor grid for detection and blocking.
The CDF provides the following feeds:
- Cofense Intelligence - retrieves objects from Cofense Intelligence and enrich them with related data.
- Cofense Intelligence Credential Phishing - retrieves objects from Cofense Intelligence and enrich them with related data with the possibility to filter based on the malware family.
The integration ingests the following system objects:
- Adversaries
- Adversary Attributes
- Attachments
- Events
- Event Attributes
- Indicators
- Indicator Attributes
- Malware
Installation
This integration can be installed in the My Integration section of your ThreatQ instance. See the Adding an Integration topic for more details.
Configuration
ThreatQuotient does not issue API keys for third-party vendors. Contact the specific vendor to obtain API keys and other integration-related credentials.
To configure the integration:
- Navigate to your integrations management page in ThreatQ.
- Select the Commercial option from the Category dropdown (optional).
If you are installing the integration for the first time, it will be located under the Disabled tab.
- Click on the integration entry to open its details page.
- Enter the following parameters under the Configuration tab:
All Feeds
Parameter Description API ID Your API ID provided by Cofense. Necessary for authentication. API Key Your API key provided by Cofense. Necessary for authentication.
Additional Parameter - Cofense IntelligenceParameter Description Ingest Subject Names When selected, the integration ingests subject names as indicators related to the event.
Additional Parameter - Cofense Intelligence Credential PhishingParameter Description Ingest Web Components When selected, the integration ingests web component indicators. Family Name Select the objects to query by family name. Only one selection can be used at a time.
To ingest phishing data, as the previous versions of the feed did, select the Credential Phishing option. - Review any additional settings, make any changes if needed, and click on Save.
- Click on the toggle switch, located above the Additional Information section, to enable it.
ThreatQ Mapping
Cofense Intelligence
The Cofense Intelligence feed retrieves objects from Cofense Intelligence and enrich them with related data.
GET https://www.threathq.com/apiv1/threat/search?threatType=malware
Sample Response:
{
"success": true,
"data": {
"page": {
"currentPage": 0,
"currentElements": 1,
"totalPages": 1,
"totalElements": 1
},
"threats": [
{
"id": 38663,
"relatedSearchTags": [],
"feeds": [
{
"id": 23,
"permissions": {
"WRITE": false,
"OWNER": false,
"READ": true
},
"displayName": "Cofense"
}
],
"blockSet": [
{
"deliveryMechanism": {
"mechanismName": "GuLoader",
"description": "Malware Downloader"
},
"impact": "Major",
"confidence": 0,
"blockType": "URL",
"roleDescription": "Location from which a payload is obtained",
"role": "Payload",
"data": "https://drive.google.com/u/0/uc?id=1NsGADL4jYjlnVLwjmdivMe3I5yTTalVy&export=download",
"data_1": {
"url": "https://drive.google.com/u/0/uc?id=1NsGADL4jYjlnVLwjmdivMe3I5yTTalVy&export=download",
"domain": "google.com",
"query": "id=1NsGADL4jYjlnVLwjmdivMe3I5yTTalVy&export=download",
"path": "/u/0/uc",
"protocol": "https",
"host": "drive.google.com"
}
},
{
"malwareFamily": {
"familyName": "Remcos Remote Access Trojan",
"description": "Remcos is a remote access trojan or RAT, used to take control of a user’s system. It has multiple capabilities, chief among them is the ability for key logging, information stealing, and audio/visual monitoring."
},
"impact": "Moderate",
"confidence": 0,
"blockType": "Domain Name",
"roleDescription": "Command and control location used by malware",
"role": "C2",
"data": "dns.pepsi25.xyz",
"data_1": "dns.pepsi25.xyz"
}
],
"campaignBrandSet": [
{
"totalCount": 1,
"brand": {
"id": 599,
"text": "UPS"
}
}
],
"extractedStringSet": [],
"domainSet": [],
"senderEmailSet": [],
"executableSet": [
{
"malwareFamily": {
"familyName": "Remcos Remote Access Trojan",
"description": "Remcos is a remote access trojan or RAT, used to take control of a user’s system. It has multiple capabilities, chief among them is the ability for key logging, information stealing, and audio/visual monitoring."
},
"vendorDetections": [],
"fileName": "Juei",
"type": "Download",
"dateEntered": 1588944174529,
"severityLevel": "Major",
"md5Hex": "6dd7c57fd11acea9111b023c27e7eb56"
},
{
"deliveryMechanism": {
"mechanismName": "GuLoader",
"description": "Malware Downloader"
},
"vendorDetections": [],
"fileName": "README.EXE",
"type": "Attachment",
"ssdeep": "12288:unUo0e4kMU/NOJF19U9aZqr18iN1uwIoVBXiDjN5dLro6gVZ4glUSamtZsCNisW0:4U96dNOz15Zqr1t3IoTy1CLlGmjs+",
"dateEntered": 1588941795872,
"severityLevel": "Major",
"md5Hex": "b6c8d83223ea073c01d40fafe866466b",
"sha1Hex": "3341cb5f684cb690e3a92dc8884fcb0c28bf47a3",
"sha224Hex": "4087a2cee7405842aeb47a0a364e2791d6ca52612bc4865cc42a3dbb",
"sha256Hex": "ae3295c31bb70b2970c9acb33c40bae503de989ed9d696842a44c866e7bafa55",
"sha384Hex": "b099de38567532dc9675a31d2d6cd1e57bd613d0649c3ec0f9a5ce4ca7efd935113e26c6182ca1b5892a342e1cfcc490",
"sha512Hex": "b23ada84e5a6cf6260b05423e637481dbfa9fde7c1462d2b9682715bb8e1865e3e0fffd4978b7a4df17c82384655eebfdfc6b9a6a00380b0dbf366fc66ded354",
"fileNameExtension": "EXE"
}
],
"senderIpSet": [],
"senderNameSet": [],
"spamUrlSet": [],
"subjectSet": [
{
"totalCount": 1,
"subject": "UPS - Pending delivery"
}
],
"campaignLanguageSet": [
{
"languageDefinition": {
"isoCode": "en",
"name": "English",
"nativeName": "English",
"family": "Indo-European"
}
}
],
"lastPublished": 1588946280590,
"firstPublished": 1588946277933,
"label": "Shipping - GuLoader, Remcos RAT",
"executiveSummary": "UPS-spoofed emails deliver Remcos RAT via GuLoader.",
"hasReport": true,
"reportURL": "https://www.threathq.com/api/l/activethreatreport/38663/html",
"apiReportURL": "https://www.threathq.com/apiv1/t3/malware/38663/html",
"threatDetailURL": "https://www.threathq.com/p42/search/default?m=38663",
"threatType": "MALWARE",
"malwareFamilySet": [
{
"familyName": "Remcos Remote Access Trojan",
"description": "Remcos is a remote access trojan or RAT, used to take control of a user’s system. It has multiple capabilities, chief among them is the ability for key logging, information stealing, and audio/visual monitoring."
}
],
"deliveryMechanisms": [
{
"mechanismName": "GuLoader",
"description": "Malware Downloader"
}
],
"naicsCodes": []
},
...
]
}
}
ThreatQuotient provides the following default mapping for this feed:
Feed Data Path | ThreatQ Entity | ThreatQ Object Type or Attribute Key | Published Date | Examples | Notes |
---|---|---|---|---|---|
data.threats[].label/.data.threats[].id | Event.Title | Malware | .data.threats[]. firstPublished |
Campaign: Shipping - GuLoader, Remcos RAT (38663) |
Created by formatting the string Campaign: |
.data.threats[].executiveSummary | Event.Description | N/A | .data.threats[]. firstPublished |
"UPS-spoofed emails deliver Remcos RAT via GuLoader." |
|
.data.threats[].threatDetailURL | Event.Attribute | Threat Detail | .data.threats[]. firstPublished |
https://www.threathq.com/ p42/search/ default?m=38663 |
|
.data.threats[].malwareFamilySet[]. familyName |
Event.Attribute | Malware Family |
.data.threats[]. firstPublished |
Remcos Remote Access Trojan | |
.data.threats[].campaignBrandSet[]. brand.text |
Event.Attribute | Brand | .data.threats[]. firstPublished |
UPS | |
.data.threats[].label | Event.Attribute | Label | .data.threats[]. firstPublished |
Shipping - GuLoader, Remcos RAT |
|
.data.threats[].reportURL | Event.Attribute | Active Threat Report |
.data.threats[]. firstPublished |
https://www.threathq.com/api/l/ activethreatreport/38 663/html |
|
.data.threats[].id | Attachment.Title, Attachment.Name |
Attachment | .data.threats[]. firstPublished |
Campaign: Shipping - GuLoader, Remcos RAT (38663) |
Attachment name and title are formatted from . data.threats[].id |
.data.threats[].blockSet[].data_1 | Indicator.Value | .data.threats[] .blockSet[]. blockType |
.data.threats[]. firstPublished |
dns.pepsi25.xyz | |
.data.threats[].blockSet[].impact | Indicator.Attribute | Impact | .data.threats[]. firstPublished |
Major | |
.data.threats[].blockSet[].role Description |
Indicator.Attribute | Role | .data.threats[]. firstPublished |
Location from which a payload is obtained |
|
.data.threats[].blockSet[].infrastructure TypeSubclass.description |
Indicator.Attribute | SubRole | .data.threats[]. firstPublished |
||
.data.threats[].blockSet[].asn | Indicator.Attribute | ASN | .data.threats[]. firstPublished |
||
.data.threats[].blockSet[].country | Indicator.Attribute | Country | .data.threats[]. firstPublished |
Canada | |
.data.threats[].blockSet[].organization | Indicator.Attribute | Organization | .data.threats[]. firstPublished |
||
.data.threats[].executableSet[]. md5Hex |
Indicator.Value | MD5 | .data.threats[]. firstPublished |
b6c8d83223ea073c01d40faf e866466b |
|
.data.threats[].executableSet[]. sha1Hex |
Indicator.Value | SHA-1 | .data.threats[]. firstPublished |
3341cb5f684cb690e3a92dc 8884fcb0c28b f47a3 |
|
.data.threats[].executableSet[]. sha256Hex |
Indicator.Value | SHA-256 | .data.threats[]. firstPublished |
ae3295c31bb70b2970c9ac b33c40bae503d e989ed9d696842a44c866e 7bafa55 |
|
.data.threats[].executableSet[].ssdeep | Indicator.Value | ssdeep | .data.threats[]. firstPublished |
12288:unUo0e4kMU/NOJF19 U9aZqr18iN1u wIoVBXiDjN5dLr o6gVZ4glUSamtZsCNisW0:4 U96dNOz15Zqr1 t3IoTy1CLlGmjs |
|
.data.threats[].executableSet[]. sha384Hex |
Indicator.Value | SHA-384 | .data.threats[]. firstPublished |
b099de38567532dc9675a31 d2d6cd1e57bd61 3d0649c3ec0f 9a5ce4ca7efd935113e26c6182 ca1b5892a342 e1cfcc490 |
|
.data.threats[].executableSet[]. sha512Hex |
Indicator.Value | SHA-512 | .data.threats[]. firstPublished |
b23ada84e5a6cf6260b0542 3e637481dbfa9f de7c1462d2b96 82715bb8e1865e3e0fffd497 8b7a4df17c8238 4655eebfdfc6b9 a6a00380b0dbf366fc66ded354 |
|
.data.threats[].executableSet[].malware Family.familyName |
Indicator.Attribute | Malware Family |
.data.threats[]. firstPublished |
Remcos Remote Access Trojan | |
.data.threats[].executableSet[].malware Family.description |
Indicator.Attribute | N/A | .data.threats[]. firstPublished |
Remcos is a remote access trojan or RAT, used to... |
|
.data.threats[].executableSet[].fileName | Indicator.Attribute | Filename | .data.threats[]. firstPublished |
README.EXE | |
.data.threats[].executableSet[].type | Indicator.Attribute | Vector | .data.threats[]. firstPublished |
Attachment | |
.data.threats[].executableSet[]. executable Subtype.description |
Indicator.Attribute | SubRole | .data.threats[]. firstPublished |
||
.data.threats[].malwareFamilySet. familyName |
Malware.Value | Malware | .data.threats[]. firstPublished |
Remcos Remote Access Trojan |
|
.data.threats[].malwareFamilySet. description |
Malware.Description | N/A | N/A | Remcos is a remote access trojan or RAT, used to... |
Cofense Intelligence Credential Phishing
The Cofense Intelligence Credential Phishing feed retrieves objects from Cofense Intelligence and enrich them with related data with the possibility to filter based on the malware family.
GET https://www.threathq.com/apiv1/threat/search?malwareFamily=null
Sample Response:
{
"success": true,
"data": {
"page": {
"currentPage": 0,
"currentElements": 30,
"totalPages": 2706,
"totalElements": 81153
},
"threats": [
{
"id": 5496,
"relatedSearchTags": [],
"feeds": [
{
"id": 23,
"permissions": {
"READ": true,
"WRITE": false,
"OWNER": false
},
"displayName": "Cofense"
}
],
"blockSet": [
{
"malwareFamily": {
"familyName": "CTB Ransomware",
"description": "Encryption ransomware"
},
"impact": "Major",
"confidence": 100,
"blockType": "Domain Name",
"roleDescription": "Command and control location used by malware",
"role": "C2",
"data": "zsn5qtrgfpu4tmpg.tor2web.fi",
"data_1": "zsn5qtrgfpu4tmpg.tor2web.fi"
}
],
"campaignBrandSet": [
{
"totalCount": 1,
"brand": {
"id": 577,
"text": "Vodafone"
}
}
],
"extractedStringSet": [],
"domainSet": [],
"senderEmailSet": [],
"executableSet": [
{
"malwareFamily": {
"familyName": "CTB Ransomware",
"description": "Encryption ransomware"
},
"vendorDetections": [],
"fileName": "Fattura AG00003378.pdf.exe",
"type": "Attachment",
"dateEntered": 1456437633008,
"severityLevel": "Major",
"md5Hex": "efb280be9a0f11f5eafc7fd49310cf4e",
"sha224Hex": "720c963d5a1134e849dda8b1cc26c2435555480a742a5fea734bbd8b",
"sha256Hex": "a202b605ec8a1fcac91194d8145fe857ae9da9d5224787c372de74ed38738055",
"sha384Hex": "20318fd2f17129241e34aefe2995e53f9f8d543fa2feecc5094f968dd675e0457cbdb6aa73c2280919a6aeb0aba388b6",
"sha512Hex": "15bf417519387655cf558e073c6868d70d222089e147357fdd0cb07f9a77d55ce87bf5ca2f9dbc55ab7bc82436fe15869254189d552f92defa87637b355e2c5a",
"sha1Hex": "14dd6b59fb38a3c312ae5c380bee0b9f400162d4",
"fileNameExtension": "exe"
}
],
"senderIpSet": [],
"senderNameSet": [],
"spamUrlSet": [],
"subjectSet": [
{
"totalCount": 1,
"subject": "Vodafone - Recapito Elettronico Fattura nr. AG00003378"
}
],
"campaignLanguageSet": [],
"campaignScreenshotSet": [],
"lastPublished": 1660157848556,
"firstPublished": 1456438512972,
"label": "Vodafone - CTB Locker Encryption Ransomware",
"executiveSummary": "Imitating a Vodafone template, these Italian-language emails refer to an electronic invoice instructing the recipient to view the attachment. The attachment is a .zip archive containing an executable file representing the CTB Locker encryption ransomware that encrypts files on the victim machine and changes the desktop background to a payment data image. The payment locations for this malware are located on the Tor web and request payment in Bitcoins, making it impossible to track any payments.",
"hasReport": true,
"reportURL": "https://www.threathq.com/api/l/activethreatreport/5496/html",
"apiReportURL": "https://www.threathq.com/apiv1/t3/malware/5496/html",
"threatDetailURL": "https://www.threathq.com/p42/search/default?m=5496",
"threatType": "MALWARE",
"deliveryMechanisms": [],
"malwareFamilySet": [
{
"familyName": "CTB Ransomware",
"description": "Encryption ransomware"
}
],
"secureEmailGatewaySet": [],
"naicsCodes": []
}
]
}
}
ThreatQuotient provides the following default mapping for this feed:
Feed Data Path | ThreatQ Entity | ThreatQ Object Type or Attribute Key | Published Date | Examples | Notes |
---|---|---|---|---|---|
.data.threats[].data.threats[].id | Event.Title | Credential Phishing | .data.threats[]. firstPublished |
Credential Phishing: 5496 | Created by formatting the string Credential Phishing: {{ value.id }} |
.data.threats[].threatDetailURL | Event.Attribute | Threat Detail | .data.threats[]. firstPublished |
N/A | N/A |
.data.threats[].campaignBrandSet[]. brands.text |
Event.Attribute | Brand | .data.threats[]. firstPublished |
Vodafone | N/A |
.data.threats[].campaignScreenshot Set[].url |
Event.Attribute | Reference Screenshot URL | .data.threats[]. firstPublished |
N/A | N/A |
.data.threats[].ipDetail.ip | Indicator.Value | IP Address | .data.threats[]. firstPublished |
1.2.3.4 | N/A |
.data.threats[].ipDetail.asn | Indicator.Attribute | ASN | .data.threats[]. firstPublished |
N/A | N/A |
.data.threats[].ipDetail.asnOrganization | Indicator.Attribute | ASN Organization | .data.threats[]. firstPublished |
N/A | N/A |
.data.threats[].ipdetail.continentCode | Indicator.Attribute | Continent Code | .data.threats[]. firstPublished |
AS | N/A |
.data.threats[].ipDetail.countryIsoCode | Indicator.Attribute | Country ISO Code | .data.threats[]. firstPublished |
MY | N/A |
.data.threats[].ipDetail.countryName | Indicator.Attribute | Country Name | .data.threats[]. firstPublished |
Malaysia | N/A |
.data.threats[].ipDetail.isp | Indicator.Attribute | ISP | .data.threats[]. firstPublished |
Piradius Net | N/A |
.data.threats[].ipDetail.latitude | Indicator.Attribute | Latitude | .data.threats[]. firstPublished |
2.5000 | N/A |
.data.threats[].ipDetail.longitude | Indicator.Attribute | Longitude | .data.threats[]. firstPublished |
112.5000 | N/A |
.data.threats[].ipDetail.metroCode | Indicator.Attribute | Metro Code | .data.threats[]. firstPublished |
N/A | N/A |
.data.threats[].ipDetail.organization | Indicator.Attribute | Organization | .data.threats[]. firstPublished |
N/A | N/A |
.data.threats[].ipDetail.postalCode | Indicator.Attribute | Postal Code | .data.threats[]. firstPublished |
N/A | N/A |
.data.threats[].ipDetail.subdivisionIsoCode | Indicator.Attribute | Subdivision ISO Code | .data.threats[]. firstPublished |
N/A | N/A |
.data.threats[].ipDetail.subdivisionName | Indicator.Attribute | Subdivsion Name | .data.threats[]. firstPublished |
N/A | N/A |
.data.threats[].ipDetail.timeZone | Indicator.Attribute | Time Zone | .data.threats[]. firstPublished |
N/A | N/A |
.data.threats[].campaignLanguageSet[]. languageDefinition.family |
Event.Attribute | Language Family | .data.threats[]. firstPublished |
N/A | N/A |
.data.threats[].campaignLanguageSet[]. languageDefinition.isoCode |
Event.Attribute | Language ISO Code | .data.threats[]. firstPublished |
N/A | N/A |
.data.threats[].campaignLanguageSet[]. languageDefinition.name |
Event.Attribute | Language Name | .data.threats[]. firstPublished |
N/A | N/A |
.data.threats[].campaignLanguageSet[]. languageDefintition.nativeName |
Event.Attribute | Language Native Name | .data.threats[]. firstPublished |
N/A | N/A |
.data.threats[].label | Event.TAG | TAG | N/A | N/A | N/A |
N/A | Indicator.Attribute | Cofense Type | .data.threats[]. firstPublished |
Action | Value will always be 'Action'. Applies to indicators from data.threats[]. blockSet.data_1 |
.data.threats[].webComponents[].md5 | Indicator.Value | MD5 | .data.threats[]. firstPublished |
N/A | N/A |
.data.threats[].webComponents[].sha1 | Indicator.Value | SHA-1 | .data.threats[]. firstPublished |
N/A | N/A |
.data.threats[].webComponents[].sha256 | Indicator.Value | SHA-256 | .data.threats[]. firstPublished |
N/A | N/A |
.data.threats[].webComponents[].sha384 | Indicator.Value | SHA-384 | .data.threats[]. firstPublished |
N/A | N/A |
.data.threats[].webComponents[].sha512 | Indicator.Value | SHA-512 | .data.threats[]. firstPublished |
N/A | N/A |
.data.threats[].webComponents[]. resourceURL.domain |
Indicator.Value | FQDN | .data.threats[]. firstPublished |
N/A | Applies to all hash indicators from .data.threats[]. webComponents[].*. |
.data.threats[].webComponents[]. resourceURL.path |
Indicator.Value | URL Path | .data.threats[]. firstPublished |
N/A | Applies to all hash indicators from .data.threats[]. webComponents[].*. |
.data.threats[].webComponents[]. resourceURL.url |
Indicator.Value | URL | .data.threats[]. firstPublished |
N/A | Applies to all hash indicators from .data.threats[]. webComponents[]. *. Censored in docs for safety - uncensored in provider response |
N/A | Indicator.Attribute | Cofense Type | .data.threats[]. firstPublished |
Web Component | Value will always be 'Web Component'. Applies to all hash indicators from .data.threats[]. webComponents[].*. |
.data.threats[].executableSet[].md5Hex | Indicator.Value | MD5 | .data.threats[]. firstPublished |
N/A | N/A |
.data.threats[].executableSet[].sha1Hex | Indicator.Value | SHA-1 | .data.threats[]. firstPublished |
N/A | N/A |
.data.threats[].executableSet[].sha224Hex | Indicator.Value | SHA-224 | .data.threats[]. firstPublished |
N/A | N/A |
.data.threats[].executableSet[].sha384Hex | Indicator.Value | SHA-384 | .data.threats[]. firstPublished |
N/A | N/A |
.data.threats[].executableSet[].sha512Hex | Indicator.Value | SHA-512 | .data.threats[]. firstPublished |
N/A | N/A |
.data.threats[].executableSet[].fileName | Indicator.Value | Filename | .data.threats[]. firstPublished |
Fattura AG00003378.pdf.exe | N/A |
N/A | Indicator.Attribute | Cofense Type | .data.threats[]. firstPublished |
Executable Component | Value will always be 'Executable Component'. Applies to all indicators from .data.threats[]. executableSet[].*. |
.data.threats[].executableSet[]. fileNameExtension |
Indicator.Attribute | File name extension | .data.threats[]. firstPublished |
exe | Applies to FILENAME indicators |
.data.threats[].executableSet[].type | Indicator.Attribute | File Type | .data.threats[]. firstPublished |
Attachment | Applies to FILENAME indicators |
.data.threats[].blockSet.confidence | Indicator.Attribute | Confidence | .data.threats[]. firstPublished |
N/A | N/A |
.data.threats[].blockSet.impact | Indicator.Attribute | Impact | .data.threats[]. firstPublished |
N/A | N/A |
.data.threats[].blockSet.data_1.protocol | Indicator.Attribute | Protocol | .data.threats[]. firstPublished |
N/A | Applies to URL Path indicators |
.data.threats[].blockSet.data_1.domain | Indicator.Value | FQDN | .data.threats[]. firstPublished |
N/A | N/A |
.data.threats[].blockSet.data_1.url | Indicator.Value | URL | .data.threats[]. firstPublished |
N/A | N/A |
.data.threats[].blockSet.data_1.path | Indicator.Value | URL Path | .data.threats[]. firstPublished |
N/A | N/A |
Average Feed Run
Object counts and Feed runtime are supplied as generalities only - objects returned by a provider can differ based on credential configurations and Feed runtime may vary based on system resources and load.
Cofense Intelligence
The following metrics is for a 24 hour run.
Metric | Result |
---|---|
Run Time | < 1 minute |
Indicators | 200 |
Indicator Attributes | 750 |
Adversaries | 5 |
Adversary Attributes | 20 |
Events | 20 |
Event Attributes | 100 |
Malware | 8 |
Attachments | 20 |
Cofense Intelligence Credential Phishing
The following metrics is for a 24 hour run.
Metric | Result |
---|---|
Run Time | 1 min |
Indicators | 1,749 |
Indicator Attributes | 737 |
Events | 268 |
Event Attributes | 737 |
Change Log
- Version 1.0.7
- Updated the Cofense Intelligence Credential Phishing feed to reflect a change in the provider's API.
- Version 1.0.6
- Added new configuration filter, Family Name, for the Cofense Intelligence Credential Phishing feed.
- Version 1.0.5
- Bug fix on attribute mapping logic for
screenshot
andphishingURL_1
- API Key values are now masked in ThreatQ UI
- Bug fix on attribute mapping logic for
- Version 1.0.4
- Initial release
PDF Guides
Document | ThreatQ Version |
---|---|
Cofense Intelligence CDF Guide v1.0.7 | 4.35.0 or Greater |
Cofense Intelligence CDF Guide v1.0.6 | 4.35.0 or Greater |
Cofense Intelligence CDF Guide v1.0.5 | 4.35.0 or Greater |
Cofense Intelligence CDF Guide v1.0.4 | 4.35.0 or Greater |