Cybereason CDF
The web format of this guide reflects the most current release. Guides for older iterations are available in PDF format.
Integration Details
ThreatQuotient provides the following details for this integration:
Current Integration Version | 1.0.0 |
Compatible with ThreatQ Versions | >= 4.45.0 |
Support Tier | ThreatQ Supported |
Introduction
Cybereason is an EDR tool used to monitor, detect, and prevent malware from executing in an internal host machine. The Cybereason CDF for ThreatQ enables you to ingest Malware Alerts that are generated in the Cybereason platform.
The integration provides the following feed:
- Cybereason Alerts - ingests any Events and Indicators from Cybereason.
The integration ingests the following system objects:
- Events
- Event Attributes
- Indicators
- Indicator Attributes
Installation
This integration can be installed in the My Integration section of your ThreatQ instance. See the Adding an Integration topic for more details.
Configuration
ThreatQuotient does not issue API keys for third-party vendors. Contact the specific vendor to obtain API keys and other integration-related credentials.
To configure the integration:
- Navigate to your integrations management page in ThreatQ.
- Select the OSINT option from the Category dropdown (optional).
If you are installing the integration for the first time, it will be located under the Disabled tab.
- Click on the integration entry to open its details page.
- Enter the following parameters under the Configuration tab:
Parameter Description Cybereason Host and Port Your Cybereason host and port (if required). Username Your Cybereason Username. Password Your Cybereason Password. Needs Attention Only Enabling this will only ingest malware alerts that "need attention." Malware Types Select one or more malware types to ingest for alerts: - Known Malware
- Unknown Malware
- Fileless
- App Control
- Review any additional settings, make any changes if needed, and click on Save.
- Click on the toggle switch, located above the Additional Information section, to enable it.
ThreatQ Mapping
Cybereason Alerts
The Cybereason Alerts feed enables ThreatQ to ingest any Events and Indicators from Cybereason.
POST {host}/rest/malware/query
Sample Response:
{
"data": {
"malwares": [
{
"guid": "-1682067831.-373350822606094116",
"timestamp": 1605611665000,
"name": "wmplayer.exe",
"type": "UnknownMalware",
"elementType": "File",
"machineName": "w7-cbr-se2",
"status": "Detected",
"needsAttention": false,
"referenceGuid": "-1682067831.-373350822606094116",
"referenceElementType": "File",
"score": 0.6942690445239349,
"detectionValue": "0630086e4eb057a1a3b89642cc0213ee",
"detectionValueType": "DVT_FILE",
"detectionEngine": "StaticAnalysis",
"malwareDataModel": {
"@class": ".BaseFileMalwareDataModel",
"type": "UnknownMalware",
"detectionName": null,
"filePath": "c:\\program files (x86)\\windows media player\\wmplayer.exe"
},
"id": {
"guid": "-1682067831.-373350822606094116",
"timestamp": 1605611665000,
"malwareType": "UnknownMalware",
"elementType": "File"
},
"schedulerScan": false
},
{
"guid": "-1682067831.-373350822606094116",
"timestamp": 1605611498000,
"name": "wmplayer.exe",
"type": "UnknownMalware",
"elementType": "File",
"machineName": "w7-cbr-se2",
"status": "Detected",
"needsAttention": false,
"referenceGuid": "-1682067831.-373350822606094116",
"referenceElementType": "File",
"score": 0.6942690445239349,
"detectionValue": "0630086e4eb057a1a3b89642cc0213ee",
"detectionValueType": "DVT_FILE",
"detectionEngine": "StaticAnalysis",
"malwareDataModel": {
"@class": ".BaseFileMalwareDataModel",
"type": "UnknownMalware",
"detectionName": null,
"filePath": "c:\\program files (x86)\\windows media player\\wmplayer.exe"
},
"id": {
"guid": "-1682067831.-373350822606094116",
"timestamp": 1605611498000,
"malwareType": "UnknownMalware",
"elementType": "File"
},
"schedulerScan": false
}
],
"totalResults": 2,
"hasMoreResults": false
},
"status": "SUCCESS",
"message": ""
}
ThreatQuotient provides the following default mapping for this feed:
Feed Data Path | ThreatQ Entity | ThreatQ Object Type or Attribute Key | Published Date | Examples | Notes |
---|---|---|---|---|---|
.data.malwares[].[name&type& malwareDataModel.detectionN ame&status&detectionEngine] |
Event.Title | Malware | data.malwares[].timestamp | gsecdump.exe - Application.Hacktool. Gsecdump.E - Prevented via AntiVirus |
Event Title is made by adding all the values from the respective keys |
.data.malwares[].malwareData Model.filePath |
Related.Indicator Value | File Path | data.malwares[].timestamp | c:\program files (x86)\ windows media player\ wmplayer.exe |
N/A |
.data.malwares[].name | Related.Indicator Value | Filename | data.malwares[].timestamp | wmplayer.exe | N/A |
.data.malwares[].detectionValue | Related.Indicator Value | MD5 | data.malwares[].timestamp | 0630086e4eb057a1a3b 89642cc0213ee |
N/A |
.data.malwares[].machineName | Event.Attribute | Host Machine | data.malwares[].timestamp | WIN-123-123 | N/A |
.data.malwares[].needsAttention | Event.Attribute | Needs Attention | data.malwares[].timestamp | Yes | N/A |
.data.malwares[].detectionValueType | Event.Attribute | Detection Value Type | data.malwares[].timestamp | DVT_FILE | N/A |
.data.malwares[].type | Event.Attribute & Indicator.Attribute | Malware Type | data.malwares[].timestamp | KnownMalware | N/A |
.data.malwares[].malwareData Model.detectionName |
Event.Attribute & Indicator.Attribute | Detection | data.malwares[].timestamp | Gen:Variant.Mimikatz.10 | N/A |
.data.malwares[].elementType | Event.Attribute & Indicator.Attribute | Element Type | data.malwares[].timestamp | File | N/A |
.data.malwares[].detectionEngine | Event.Attribute & Indicator.Attribute | Detection Engine | data.malwares[].timestamp | AntiVirus | N/A |
.data.malwares[].score | Event.Attribute & Indicator.Attribute | Cybereason Score | data.malwares[].timestamp | 0.76273662732 | N/A |
Average Feed Run
Object counts and Feed runtime are supplied as generalities only - objects returned by a provider can differ based on credential configurations and Feed runtime may vary based on system resources and load.
Cybereason Alerts
Metric | Result |
---|---|
Run Time | 4 minutes |
Events | 951 |
Event Attributes | 5,875 |
Indicators | 143 |
Indicator Attributes | 984 |
Change Log
- Version 1.0.0
- Initial release
PDF Guides
Document | ThreatQ Version |
---|---|
Cybereason CDF Guide v1.0.0 | 4.45.0 or Greater |