Cybersixgill Darkfeed CDF
The web format of this guide reflects the most current release. Guides for older iterations are available in PDF format.
Integration Details
ThreatQuotient provides the following details for this integration:
Current Integration Version | 1.1.1 |
Compatible with ThreatQ Versions | >= 5.12.1 |
Support Tier | Developer Supported |
Support Email | support@cybersixgill.com |
Introduction
Delivering the next generation of deep & dark web threat intelligence feeds, Cybersixgill tailors threat intelligence to customers' intelligence needs, maximizing effective mitigation and remediation. Using an agile collection methodology and its proprietary collection automation algorithm, Cybersixgill provides broad coverage of exclusive-access deep and dark web sources, as well as relevant surface web sources. Cybersixgill harnesses artificial intelligence and machine learning to automate the production cycle of cyber intelligence from monitoring through extraction to production - unleashing both existing platforms' and teams' performance.
Leverage the power of Cybersixgill to supercharge ThreatQuotient with high-fidelity Threat Intelligence indicators. Get IOCs such as domains, URLs, hashes, and IP addresses straight into the ThreatQuotient platform. Receive updates for the latest vulnerabilities. And, stay on top of your organization's attack surface by monitoring for alerts and compromised credentials.
This integration provides the following feeds:
- Cybersixgill Darkfeed - ingests IOCs and related data
- Cybersixgill DVE - ingests CVEs and related events
- Cybersixgill Alerts - ingest alerts and related data
- Cybersixgill Compromised Accounts - ingests compromised accounts and related data
- Cybersixgill Compromised Emails - ingests compromised emails and related data
The integration ingests the following system objects:
- Indicators
- Attack patterns
- Adversaries
- CVEs
- Vulnerabilities
- Events
The Sixgill Darkfeed CDF is now known as Cybersixgill Darkfeed CDF.
Prerequisites
- The Compromised Account custom object is required and must be installed on your ThreatQ instance prior to attempting to install the integration.
Compromised Account Custom Object
Use the steps provided to install the Compromised Account custom object.
When installing the custom objects, be aware that any in-progress feed runs will be cancelled, and the API will be in maintenance mode.
Use the following steps to install the custom object in ThreatQ v6:
- Download the integration bundle from the ThreatQ Marketplace.
- Unzip the bundle and locate the custom object files.
The custom object files will typically consist of a JSON definition file, install.sh script, and a images folder containing the svg icons.
- SSH into your ThreatQ instance.
- Navigate to the following location:
cd /var/lib/threatq/misc/
- Upload the custom object files, including the images folder.
The directory structure should be as the following:
- misc
- install.sh
- <custom_object_name>.json
- images (directory)
- <custom_object_name>.svg
- misc
- Run the following command:
kubectl exec -it deployment/api-schedule-run -n threatq -- sh /var/lib/threatq/misc/install.sh /var/lib/threatq/misc
The installation script will automatically put the application into maintenance mode, move the files to their required directories, install the custom object, update permissions, bring the application out of maintenance mode, and restart dynamo.
- Delete the install.sh, definition json file, and images directory from the
misc
directory after the object has been installed as these files are no longer needed.
ThreatQ v5 Steps
Use the following steps to install the custom object in ThreatQ v5:
- Download the integration zip file from the ThreatQ Marketplace and unzip its contents.
- SSH into your ThreatQ instance.
- Navigate to tmp directory:
cd /tmp/
- Create a new directory:
mkdir cybersixgill_cdf
- Upload the account.json and install.sh script into this new directory.
- Create a new directory called images within the cybersixgill_cdf directory.
mkdir images
- Upload the account.svg.
- Navigate to the /tmp/cybersixgill_cdf.
The directory should resemble the following:
- tmp
- cybersixgill_cdf
- account.json
- install.sh
- images
- account.svg
- cybersixgill_cdf
- tmp
- Run the following command to ensure that you have the proper permissions to install the custom object:
chmod +x install.sh
- Run the following command:
sudo ./install.sh
You must be in the directory level that houses the install.sh and json files when running this command.
The installation script will automatically put the application into maintenance mode, move the files to their required directories, install the custom object, update permissions, bring the application out of maintenance mode, and restart dynamo.
- Remove the temporary directory, after the custom object has been installed, as the files are no longer needed:
rm -rf cybersixgill_cdf
Installation
The CDF requires the installation of the Compromised Account custom objects before installing the actual CDF. See the Prerequisites chapter for more details.
Perform the following steps to install the integration:
The same steps can be used to upgrade the integration to a new version.
- Log into https://marketplace.threatq.com/.
- Locate and download the integration file.
- Navigate to the integrations management page on your ThreatQ instance.
- Click on the Add New Integration button.
- Upload the integration file using one of the following methods:
- Drag and drop the file into the dialog box
- Select Click to Browse to locate the integration file on your local machine
- Select the individual feeds to install and click Install.
ThreatQ will inform you if the feed already exists on the platform and will require user confirmation before proceeding. ThreatQ will also inform you if the new version of the feed contains changes to the user configuration. The new user configurations will overwrite the existing ones for the feed and will require user confirmation before proceeding.
- The feed will be added to the integrations page. You will still need to configure and then enable the feed.
Configuration
ThreatQuotient does not issue API keys for third-party vendors. Contact the specific vendor to obtain API keys and other integration-related credentials.
To configure the integration:
- Navigate to your integrations management page in ThreatQ.
- Select the Commercial option from the Category dropdown (optional).
If you are installing the integration for the first time, it will be located under the Disabled tab.
- Click on the integration entry to open its details page.
- Enter the following parameters under the Configuration tab:
All Feeds
Parameter Description Cybersixgill Client ID Your Cybersixgill Client ID. Cybersixgill Client Secret Your Cybersixgill Client Secret. Cybersixgill Darkfeed
Parameter Description Add MITRE Tactics to Indicators Enable/disable to set whether MITRE Attack Patterns will be related to ingested indicators from Cybersixgill. Context Selection Select the context you want to bring in with each indicator. This will allow you to curate which pieces of information your organization cares about, and which pieces of information you want to ignore.
- Labels (Tags) (default)
- Confidence (default)
- Severity (default)
- Cybersixgill Feed Name
- Cybersixgill Post Link
- Cybersixgill Source
- Cybersixgill Post Title
- Revoked (default)
- VirusTotal Link
- VirusTotal Positive Rate (default)
- Related Threat Actor (default)
- Related MITRE Techniques (default)
Cybersixgill DVE
Parameter Description Ingest CVE Events Enable this option to ingest the associated events for each CVE. For example, when a CVE was mentioned on Twitter, when a score was changed, or when NVD published a new CVE. (default: false) Ingest CVEs As Select the entity type you would like your CVEs ingested as: - Indicators
- Vulnerabilities (default)
Context Selection Select the context you want to bring in with each CVE. This will allow you to curate which pieces of information your organization cares about, and which pieces of information you want to ignore. - Attribution (default)
- CVSSv3 Score (default)
- CVSSv3 Severity (default)
- CVSSv3 Vector
- CVSSv2 Score
- CVSSv2 Severity
- CVSSv2 Vector
- Current Rating (default)
- Highest Rating (default)
- Previously Exploited
- Affected Vendors (default)
- Affected Products (default)
- Affected Packages (default)
- External References
Cybersixgill Alerts
Parameter Description Ingest CVEs As Select the entity type you would like your CVEs ingested as: - Indicators
- Vulnerabilities (default)
Threat Level Filter Select the threat levels for alerts you want to ingest into ThreatQ. - Imminent (default)
- Emerging (default)
Context Selection Select the context you want to bring in with each indicator. This will allow you to curate which pieces of information your organization cares about, and which pieces of information you want to ignore.
- Labels (Tags) (default)
- Confidence (default)
- Severity (default)
- Cybersixgill Feed Name
- Cybersixgill Post Link
- Cybersixgill Source
- Cybersixgill Post Title
- Revoked (default)
- VirusTotal Link
- VirusTotal Positive Rate (default)
- Related Threat Actor (default)
- Related MITRE Techniques (default)
Cybersixgill Compromised Accounts
Parameter Description Host Domains Enter a line-separated list of host domains to search for. By default, at least one host domain is required to be searched on. You may enter multiple if you'd like to monitor multiple domains for breaches. Require Compromised Password If enabled, only credentials that have an associated compromised password will be ingested into ThreatQ. This will allow you to ignore credentials that have been compromised but do not have a password associated with them. (default: False) Context Selection Select the context you want to bring in with each compromised credential. This will allow you to curate which pieces of information your organization cares about, and which pieces of information you want to ignore. - Credential Domain (default)
- Impacted Domain (default)
- Impacted URL
- Password
- Password Hash Type
- Name (default)
- Breach Name (Tag) (default)
- Breached At (default)
Cybersixgill Compromised Emails
Parameter Description Host Domains Enter a line-separated list of host domains to search for. By default, at least one host domain is required to be searched on. You may enter multiple if you'd like to monitor multiple domains for breaches. Require Compromised Password If enabled, only credentials that have an associated compromised password will be ingested into ThreatQ. This will allow you to ignore credentials that have been compromised but do not have a password associated with them. (default: False) Context Selection Select the context you want to bring in with each compromised credential. This will allow you to curate which pieces of information your organization cares about, and which pieces of information you want to ignore. - Credential Domain (default)
- Password
- Password Hash Type
- Name (default)
- Breach Name (Tag) (default)
- Breached At (default)
- Review any additional settings, make any changes if needed, and click on Save.
- Click on the toggle switch, located above the Additional Information section, to enable it.
ThreatQ Mapping
Cybersixgill Darkfeed
This feed pulls the indicators of compromise (IOCs) from the Cybersixgill Darkfeed. This may include indicators such as URLs, FQDNs, IP Addresses, and Hashes. Indicators will be brought in with context such as the Confidence and Severity.
The feed will then make a request using the supplemental feed, Get Feed Data
, to retrieve the IOCs.
GET https://api.cybersixgill.com/darkfeed/ioc
Sample Response:
{
"id": "bundle--318ed832-2b1c-4d3d-8b9f-6b4b8ef628ad",
"objects": [
{
"created": "2017-01-20T00:00:00.000Z",
"definition": {
"tlp": "amber"
},
"definition_type": "tlp",
"id": "marking-definition--f88d31f6-486f-44da-b317-01333bde0b82",
"type": "marking-definition"
},
{
"created": "2019-12-26T00:00:00Z",
"definition": {
"statement": "Copyright Sixgill 2020. All rights reserved."
},
"definition_type": "statement",
"id": "marking-definition--41eaaf7c-0bc0-4c56-abdf-d89a7f096ac4",
"type": "marking-definition"
},
{
"created": "2020-05-12T15:38:42.969Z",
"description": "Malware available for download from file-sharing sites",
"external_reference": [
{
"description": "Mitre attack tactics and technique reference",
"mitre_attack_tactic": "Build Capabilities",
"mitre_attack_tactic_id": "TA0024",
"mitre_attack_tactic_url": "https://attack.mitre.org/tactics/TA0024/",
"mitre_attack_technique": "Obtain/re-use payloads",
"mitre_attack_technique_id": "T1346",
"mitre_attack_technique_url": "https://attack.mitre.org/techniques/T1346/",
"source_name": "mitre-attack"
}
],
"id": "indicator--4bf4b89b-1115-40d1-9f6c-a70405d49141",
"labels": [
"malicious-activity",
"malware",
"Build Capabilities",
"Obtain/re-use payloads"
],
"lang": "en",
"modified": "2020-05-12T15:38:42.969Z",
"object_marking_refs": [
"marking-definition--41eaaf7c-0bc0-4c56-abdf-d89a7f096ac4",
"marking-definition--f88d31f6-486f-44da-b317-01333bde0b82"
],
"pattern": "[url:value = 'https://anonfile.com/te7aYaw7o9/Leeched_Combo_464705_txt']",
"sixgill_actor": "h4ckcr4ck",
"sixgill_confidence": 80,
"sixgill_feedid": "darkfeed_010",
"sixgill_feedname": "malware_download_urls",
"sixgill_postid": "bded5cfcb05b917ac80c7a0aaac45a2fffb26ce4",
"sixgill_posttitle": "464705 - HQ Combolist Mega, File-upload, Mediafire, 4shared",
"sixgill_severity": 80,
"sixgill_source": "forum_nulled",
"spec_version": "2.0",
"type": "indicator",
"valid_from": "2020-05-08T05:53:26Z"
}
],
"spec_version": "2.0",
"type": "bundle"
}
Lastly, it will acknowledge that the batch of IOCs was consumed using the supplemental feed, Acknowledge Feed Data
.
POST https://api.cybersixgill.com/darkfeed/ioc/ack
ThreatQuotient provides the following default mapping for this feed:
The following mapping is based on each item within the objects
array.
Feed Data Path | ThreatQ Entity | ThreatQ Object Type or Attribute Key | Published Date | Examples | Notes |
---|---|---|---|---|---|
.pattern |
Indicator.Value | .pattern |
.objects[].valid_from | url:value = 'https://anonfile.com/bcqfn7ydoa/ sqli_dumper_10.1_zip'] |
Both value and type are extracted from .pattern |
.modified |
Indicator.Modified At | N/A | N/A | 2020-05-15T12:10:28.942Z | N/A |
.revoked |
Indicator.Status | N/A | N/A | False | Active if .revoked is False else Whitelisted |
.description |
Indicator.Description | N/A | N/A | Malware available for download from file-sharing sites |
N/A |
.sixgill_confidence |
Indicator.Attribute | Confidence | .objects[].valid_from | 80 | N/A |
.sixgill_severity |
Indicator.Attribute | Severity | .objects[].valid_from | 80 | N/A |
.sixgill_feedname |
Indicator.Attribute | Cybersixgill Feed Name |
.objects[].valid_from | malware_download_urls | N/A |
.sixgill_feedid |
Indicator.Attribute | Cybersixgill Feed ID | .objects[].valid_from | darkfeed_010 | N/A |
.sixgill_postid |
Indicator.Attribute | Cybersixgill Post ID | .objects[].valid_from | 9528ffecd65e2a1ae9f5c3b1f5e6948e 2353d620 |
N/A |
.sixgill_posttitle |
Indicator.Attribute | Cybersixgill Post Title | .objects[].valid_from | sqli dumper 10.2 2020 | N/A |
.sixgill_source |
Indicator.Attribute | Cybersixgill Source | .objects[].valid_from | forum_demonforums | N/A |
.revoked |
Indicator.Attribute | False Positive | .objects[].valid_from | Flase | N/A |
.labels[] |
Indicator.Attribute | Label | .objects[].valid_from | malware | N/A |
.sixgill_post_virustotallink |
Indicator.Attribute | VirusTotal Link | .objects[].valid_from | https://virustotal.com/#/file/e436924 a2fac62b5d... |
N/A |
.external_reference[]. |
Indicator.Attribute | VirusTotal Positive Rate |
.objects[].valid_from | low | Applicable only when .source_name is 'VirusTotal' |
.sixgill_actor |
Related Adversary.Name | N/A | .objects[].valid_from | meisami2015 | N/A |
.external_reference[]. |
Related Attack Pattern.Value | N/A | N/A | TA0024 - Build Capabilities | Applicable only when .source_name is 'mitre-attack' |
.external_reference[]. |
Related Attack Pattern.Attribute | Technique ID | N/A | T1346 | N/A |
.external_reference[]. |
Related Attack Pattern.Attribute | Technique Name | N/A | Obtain/re-use payloads | N/A |
.external_reference[]. |
Related Attack Pattern.Attribute | Technique External Reference | N/A | https://attack.mitre.org/techniques /T1346/ |
N/A |
.external_reference[]. |
Related Attack Pattern.Attribute | Tactic ID | N/A | TA0024 | N/A |
.external_reference[]. |
Related Attack Pattern.Attribute | Tactic Name | N/A | Build Capabilities | N/A |
.external_reference[]. |
Related Attack Pattern.Attribute | Tactic External Reference |
N/A | https://attack.mitre.org/tactics/ TA0024/ |
N/A |
Cybersixgill DVE
This feed pulls emerging CVEs and related events from the Cybersixgill DVE feed. This may include indicators such as CVEs, CVSS scores, affected vendors/products, and more.
The feed will then make a request using the supplemental feed, Get Feed Data
, to retrieve the IOCs.
GET https://api.cybersixgill.com/dvefeed/ioc
Sample Response:
{
"id": "bundle--cf118a51-eb64-4aa2-b929-51f91a643495",
"objects": [
{
"created": "2017-01-20T00:00:00.000Z",
"definition": {
"tlp": "amber"
},
"definition_type": "tlp",
"id": "marking-definition--f88d31f6-486f-44da-b317-01333bde0b82",
"type": "marking-definition"
},
{
"created": "2019-12-26T00:00:00Z",
"definition": {
"statement": "Copyright Sixgill 2020. All rights reserved."
},
"definition_type": "statement",
"id": "marking-definition--41eaaf7c-0bc0-4c56-abdf-d89a7f096ac4",
"type": "marking-definition"
},
{
"created": "2020-09-06T20:33:33.538Z",
"external_references": [
{
"external_id": "CVE-2020-15392",
"source_name": "cve"
}
],
"id": "cveevent--a26f4710-0d64-4a76-ae27-6ac038e7536b",
"modified": "2020-09-06T20:33:33.538Z",
"object_marking_refs": [
"marking-definition--41eaaf7c-0bc0-4c56-abdf-d89a7f096ac4",
"marking-definition--f88d31f6-486f-44da-b317-01333bde0b82"
],
"spec_version": "2.0",
"type": "x-cybersixgill-com-cve-event",
"x_sixgill_info": {
"event": {
"_id": "5f1f17164731b1cef86c8aaf",
"action": "trend",
"description": "Trend of Github commits related to CVE-2020-15392",
"event_datetime": "2020-06-30T00:00Z",
"name": "trend_Github_commits",
"prev_level": "prev_level",
"type": "github_authoring"
},
"nvd": {
"base_score_v3": 5.3,
"base_severity_v3": "MEDIUM",
"link": "https://nvd.nist.gov/vuln/detail/CVE-2020-15392",
"modified": "2020-07-15T16:52Z",
"published": "2020-07-07T14:15Z",
"score_2_0": 5.0,
"severity_2_0": "MEDIUM",
"vector_v2": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"vector_v3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"
},
"rating": {
"current": 0.02,
"highest": {
"date": "2020-07-27T00:00Z",
"value": 0.02
},
"previouslyExploited": 0.07
}
}
}
]
}
Lastly, it will acknowledge that the batch of IOCs was consumed using the supplemental feed, Acknowledge Feed Data
.
POST https://api.cybersixgill.com/dvefeed/ioc/ack
ThreatQ provides the following default mapping for this feed:
The following mapping is based on each item within the objects
array.
Feed Data Path | ThreatQ Entity | ThreatQ Object Type or Attribute Key | Published Date | Examples | Notes |
---|---|---|---|---|---|
.external_references[]. |
Indicator Value | CVE | .created |
N/A | N/A |
.x_sixgill_info.event. |
Attirbute | Event Action | .x_sixgill_info.event. |
N/A | N/A |
.x_sixgill_info.event. |
Attirbute | Event Name | .x_sixgill_info.event. |
N/A | N/A |
.x_sixgill_info.nvd.base_ |
Attirbute | CVSS v3 Score | .x_sixgill_info.nvd. |
N/A | N/A |
.x_sixgill_info.nvd.base_ |
Attirbute | CVSS v3 Severity | .x_sixgill_info.nvd. |
N/A | N/A |
.x_sixgill_info.nvd. |
Attirbute | Reference | .x_sixgill_info.nvd. |
N/A | N/A |
.x_sixgill_info.nvd.score_ |
Attirbute | CVSS v2 Score | .x_sixgill_info.nvd. |
N/A | N/A |
.x_sixgill_info.nvd.severity_ |
Attirbute | CVSS v3 Severity | .x_sixgill_info.nvd. |
N/A | N/A |
.x_sixgill_info.nvd.vector_v2 |
Attirbute | CVSS v2 Vector | .x_sixgill_info.nvd. |
N/A | N/A |
.x_sixgill_info.nvd.vector_v3 |
Attirbute | CVSS v3 Vector | .x_sixgill_info.nvd. |
N/A | N/A |
.x_sixgill_info.nvd.base_score_v3 |
Attirbute | CVSS v3 Score | .x_sixgill_info.nvd. |
N/A | N/A |
.x_sixgill_info.current.rating |
Attirbute | Current Score | .x_sixgill_info.event. |
N/A | N/A |
.x_sixgill_info.highest.value |
Attirbute | Highest Score | .x_sixgill_info.event. |
N/A | N/A |
.x_sixgill_info.cpe_match[].vendor |
Attirbute | Affected Vendor | .x_sixgill_info.nvd. |
qlik |
N/A |
.x_sixgill_info.cpe_match[].product |
Attirbute | Affected Product | .x_sixgill_info.nvd. |
qlik_sense |
N/A |
.x_sixgill_info.affected_packages[]. , .x_sixgill_info.affected_patches[]. |
Attirbute | Affected Package | .x_sixgill_info.nvd. |
Alpine:v3.18/vim |
Keys are concentated, separated by a / character |
.x_sixgill_info.attributes[]. |
Attirbute | Attribution | .x_sixgill_info.nvd. |
Has_POC_exploit_attribute |
When x_sixgill_info.attributes == True |
.x_sixgill_info.rating.previously |
Attirbute | Previously Exploited | .x_sixgill_info.event.event_datetime |
N/A | Bool -> Yes/No |
.x_sixgill_info.event.description |
Event Title | N/A | .x_sixgill_info.event. |
N/A | N/A |
.x_sixgill_info.event.level |
Attirbute | Level | .x_sixgill_info.event. |
N/A | N/A |
.x_sixgill_info.event.prev_level |
Attirbute | Previous Level | .x_sixgill_info.event. |
N/A | N/A |
.x_sixgill_info.event.new_base_ |
Attirbute | New Base Score | .x_sixgill_info.event. |
N/A | N/A |
.x_sixgill_info.event.old_base_ |
Attirbute | Old base Score | .x_sixgill_info.event. |
N/A | N/A |
.x_sixgill_info.event.type |
Attirbute | Event Type | .x_sixgill_info.event. |
N/A | N/A |
Cybersixgill Alerts
This feed pulls alerts from your Cybersixgill portal. These alerts may be regarding compromised accounts, leaked credentials, or other security incidents. Using this feed will help you stay up to date with your attack surface, within ThreatQ.
The first request will fetch the list of alerts by date using the primary feed.
GET https://api.cybersixgill.com/alerts/actionable-alert
Sample Response:
[
{
"alert_name": "Recent mentions of your organization in the underground",
"alert_type_id": "619d013e9a1c16790fc6f4be",
"content": ",compound,img,false,32,2023-06-28,2023-06-28,\n31,11,https://www.@sixgill-start-highlight@acme@sixgill-end-highlight@.com/@sixgill-start-highlight@acme@sixgill-end-highlight@-missing-link-partnership/,Linking-Up to Strengthen Threat Operations in Australia,www.@sixgill-start-highlight@acme@sixgill-end-highlight@.com,https://www.themissinglink.com.au/,The Missing Link,branded,a,false,32,2023-03-30,2023-11-28,\n73,26,https://nvd.nist.gov/vuln/detail/CVE-2022-40288,NVD - CVE-2022-40288,nvd.nist.gov,https://www.themissinglink.com.au/se ...",
"date": "2024-01-31 06:09:18",
"es_id": "2d5aa1ae0aca7ef07cce3648c502a0ab40094a61",
"id": "65b9e418168d64d1d32e93b2",
"matched_assets": {
"organization_aliases": ["acme"],
"organization_name": ["acme"]
},
"read": true,
"severity": 1,
"site": "github",
"status": {
"name": "treatment_required"
},
"threat_level": "emerging",
"threats": ["General Mentions"],
"title": "Mentions of acme on underground sites",
"user_id": "5f8fe7a1701ecb000f063250"
},
{
"alert_name": "Compromised Accounts are Discussed in the Underground",
"alert_type_id": "5f27fd269f94fd3b9d1acb71",
"content": "... e/,Security Testing,money,a,false,78,2023-09-19,2023-11-15,\nfor-review,2,0,https://www.1001firms.com/list-of-companies/all/cyber_assurance/contact,Cyber assurance - List of Companies,www.10...www.@sixgill-start-highlight@acme@sixgill-end-highlight@.com",
"date": "2024-01-30 11:51:07",
"es_id": "2d5aa1ae0aca7ef07cce3648c502a0ab40094a61",
"id": "65b8e2ad168d64d1d32e78be",
"matched_assets": {
"organization_aliases": ["acme"],
"organization_name": ["acme"],
"products": []
},
"read": true,
"severity": 1,
"site": "github",
"status": {
"name": "treatment_required"
},
"threat_level": "emerging",
"threats": ["Compromised Accounts"],
"title": "Underground discussion of acme accounts",
"user_id": "5f8fe7a1701ecb000f063250"
}
]
For each of those alerts, it will fetch the full details of it using the supplemental feed, Cybersixgill - Get Alert by ID
.
ThreatQ provides the following default mapping for this feed:
The following mapping is based on each item returned by the Cybersixgill - Get Alert by ID
supplemental feed
Feed Data | ThreatQ Entity | ThreatQ Object Type or Attribute Key | Published Date | Examples | Notes |
---|---|---|---|---|---|
.matched_assets.organization_name[] ,.matched-assets.domain_names[] ,.matched-assets.cves[] , .asset_information.asset_value
|
Asset Value, Vulnerability/ Indicator Value |
N/A | .create_time |
N/A | Object type depends on if the asset is a CVE or not |
.title , .threat_level , .alert_id |
Event Title | Alert | .create_time |
N/A | Keys concatenated together to form Event Title |
.actor_information |
Adversary Name | N/A | .create_time |
N/A | N/A |
.es_item.tags[] |
Event Tags | N/A | .create_time |
N/A | N/A |
.status.name |
Event Attribute | Status | .create_time |
treatment_required |
Updatable |
.category |
Event Attribute | Category | .create_time |
regular |
Updatable |
.alert_name |
Event Attribute | Alert Type | .create_time |
IabAlertRule |
N/A |
.threat_level |
Event Attribute | Threat level | .create_time |
Imminent |
Title-cased |
.threats[] |
Event Attribute | Threat | .create_time |
General Mention |
N/A |
.available_services[] |
Event Attribute | Available Service | .create_time |
purchase |
N/A |
.sub_alerts_length |
Event Attribute | Is Aggregate Alert | .create_time |
true |
If value > 0 |
.asset_information.asset_type |
Asset Attribute | Type | .create_time |
domain |
N/A |
.asset_information.asset_subtypes |
Event Attribute | Subtype | .create_time |
email |
N/A |
.asset_information.importance |
Event Attribute | Importance | .create_time |
High |
Updatable; Mapped from integer to human-readable string |
.asset_information.risk_score |
Event Attribute | Risk | .create_time |
N/A | Updatable; Mapped from integer to human-readable string |
.actor_information.actor_name |
Adversary Attribute | Category | .create_time |
N/A | N/A |
Cybersixgill Compromised Accounts
This feed pulls compromised accounts from Cybersixgill. This may include accounts that have been breached, leaked, or otherwise compromised. This feed is not limited to compromised emails, but rather is more broad in scope, capturing accounts stolen by malware and other means.
The primary feed does not make an API call, but rather the supplemental feed, Cybersixgill - Fetch Compromised Accounts
, is used to fetch results for each of your selected domains.
ThreatQ provides the following default mapping for this feed:
The following mapping is based on each item within the objects
array, returned by the Cybersixgill - Fetch Compromised Accounts
supplemental feed
Feed Data | ThreatQ Entity | ThreatQ Object Type or Attribute Key | Published Date | Examples | Notes |
---|---|---|---|---|---|
.username |
Compromised Account Value | N/A | .create_time |
john.doe@gmail.com |
N/A |
.stealer_malware |
Malware Value | N/A | .create_time |
REDLINE |
If enabled |
.breach_name |
Tag | N/A | N/A | stealer-malware-logs |
If enabled |
.domain |
Attribute | Credential Domain | .create_time |
gmail.com |
If enabled |
.host_domain |
Attribute | Impacted Domain | .create_time |
facebook.com |
If enabled |
.host |
Attribute | Impacted URL | .create_time |
https://facebook.com/login |
If enabled |
.password |
Attribute | Password | .create_time |
hunter2 |
If enabled |
.hash_type |
Attribute | Password Hash Type | .create_time |
plain |
If enabled |
.name |
Attribute | Name | .create_time |
N/A | If enabled |
.breach_date |
Attribute | Breached At | .create_time |
N/A | If enabled |
Cybersixgill Compromised Emails
This feed pulls compromised emails from Cybersixgill. This feed typically includes emails that have been leaked or phished, and may include passwords or other related information.
The primary feed does not make an API call, but rather the supplemental feed, Cybersixgill - Fetch Compromised Emails
, is used to fetch results for each of your selected domains.
ThreatQ provides the following default mapping for this feed:
The following mapping is based on each item within the objects
array, returned by the Cybersixgill - Fetch Compromised Emails
supplemental feed
Feed Data | ThreatQ Entity | ThreatQ Object Type or Attribute Key | Published Date | Examples | Notes |
---|---|---|---|---|---|
.username |
Compromised Account Value | N/A | .create_time |
john.doe@gmail.com |
N/A |
.breach_name |
Tag | N/A | N/A | stealer-malware-logs |
If enabled |
.domain |
Attribute | Credential Domain | .create_time |
gmail.com |
If enabled |
.password |
Attribute | Password | .create_time |
hunter2 |
If enabled |
.hash_type |
Attribute | Password Hash Type | .create_time |
plain |
If enabled |
.name |
Attribute | Name | .create_time |
N/A | If enabled |
.breach_date |
Attribute | Breached At | .create_time |
N/A | If enabled |
Get Feed Data (Supplemental)
Fetches data from a specific Cybersixgill feed.
GET https://api.cybersixgill.com/{{feed name}}/ioc
Sample Response:
See sample data from specific primary feed
Acknowledge Feed Data (Supplemental)
Acknowledges that a batch of IOC items was consumed after running the Get Feed Data
endpoint. On it's next call, the next bundle of IOCs will be received.
POST https://api.cybersixgill.com/{{feed name}}/ioc/ack
Sample Response:
1000
Cybersixgill - Get Alert by ID (Supplemental)
Fetches the full details for an alert by its ID
GET https://api.cybersixgill.com/alerts/actionable_alert/{{alert ID}}
Sample Response:
{
"actor_information": {
"active_since": "2023-09-28T14:34:29",
"activity": 1,
"actor_name": "pbscybsec",
"languages": ["en"],
"reputation": 1,
"site": "github"
},
"additional_info": {
"asset_attributes": ["organization_aliases", "organization_name"],
"assets_counter": {
"organization_aliases": {
"acme": 1
},
"organization_name": {
"acme": 1
}
},
"excluded_assets": {},
"matched_organization_aliases": ["acme"],
"matched_organization_name": ["acme"],
"organization_aliases": ["acme"],
"organization_name": "acme",
"query_attributes": ["organization_aliases", "organization_name"],
"template_id": "619d013e9a1c16790fc6f4be",
"vendor": "Sixgill"
},
"alert_id": "62409ba14511c6c8a9f4e3e3",
"alert_name": "Recent mentions of your organization in the underground",
"alert_type": "PercolatedQueryBasedManagedAlertRule",
"alert_type_id": "619d013e9a1c16790fc6f4be",
"assessment": "",
"asset_information": {},
"category": "regular",
"content_type": "search_result_item",
"create_time": "2023-12-26 06:10:49",
"description": "\"acme\" was recently mentioned on underground sites",
"es_id": "330125ea0391d44882c42f0aa7a49226f388eb7a",
"es_item": {
"collection_date": "2023-12-25T09:38:13",
"content": "... to various Threat intelligence domains.\n# Table of Contents\n- [Threat Intelligence Platforms](#threat-intelligence-platforms)\n- [Open-Source Threat Intelligence Tools](#open-source...https://www.@sixgill-start-highlight@acme@sixgill-end-highlight@.com/",
"content_urls": "https://www.@sixgill-start-highlight@acme@sixgill-end-highlight@.com/",
"creator": "pbscybsec",
"date": "2023-09-28T14:34:29",
"highlight": {
"content": [
"** Readme **\n\n# Biggest-Threat-Intelligence-Resource\nThis repository is a comprehensive collection of the most popular and useful Threat intelligence resources available on the internet. It includes resources related to various Threat intelligence domains.\n\n# Table of Contents\n\n- [Threat Intelligence Platforms](#threat-intelligence-platforms)\n- [Open-Source Threat Intelligence Tools](#open-source"
],
"content_urls": [
"https://www.@sixgill-start-highlight@acme@sixgill-end-highlight@.com/"
]
},
"id": "330125ea0391d44882c42f0aa7a49226f388eb7a",
"images": [],
"lang": "en",
"rep_grade": 5,
"site": "github",
"tags": ["Twitter_handle", "Hacking", "APT", "Drugs", "Malware"],
"title": "Threat-Intelligence",
"type": "repository"
},
"has_comments": false,
"id": "658a6e6b8656daba37822554",
"iq_information": {},
"iq_prioritized": true,
"is_deleted": false,
"lang": "English",
"langcode": "en",
"matched_assets": {
"organization_aliases": ["acme"],
"organization_name": ["acme"]
},
"read": false,
"recommendations": [""],
"severity": 1,
"site": "github",
"site_information": {
"active_since": "1970-01-01T07:00:00",
"description": "Popular web-based hosting service for version control using Git.",
"languages": ["en"],
"site_name": "github",
"stars": 5,
"type": "Github"
},
"status": {
"name": "treatment_required"
},
"summary": "",
"threat_level": "emerging",
"threats": ["General Mentions"],
"title": "Mentions of acme on underground sites",
"trigger_actions": [],
"update_time": "2023-12-26 06:10:49",
"user_id": "5f8fe7a1701ecb000f063250"
}
Cybersixgill - Fetch Compromised Accounts (Supplemental)
Fetches compromised accounts for a given domain.
POST https://api.cybersixgill.com/data_leak/credentials/logins/search
Sample Response:
{
"objects": [
{
"breach_id": 5670012,
"breach_name": "stealer-malware-logs",
"breach_description": "The following credentials were obtained using a stealer malware, and shared on the Telegram channel \"OBSERVERCLOUD - BEST FREE COMBO CLOUD\" (channel id: 1851318122) on 2024-03-05. They were extracted from a file named \"@txtlog - FREE - 318.txt\", with a size of 191.7 MB.",
"breach_publication_date": "2024-03-05",
"domain": "",
"hash_type": "plain",
"name": "",
"password": "Z$ZtP@$$1234",
"post_id": "f28928e4fa2bfd2b05f72074f3ca5321",
"source_name": "telegram",
"post_title": "Daily Telegram Channel 👁 OBSERVERCLOUD - BEST FREE COMBO CLOUD (1851318122)",
"username": "john.doe",
"host": "https://acme.roadrunner.com/login",
"host_domain": "acme.roadrunner.com",
"stealer_malware": "REDLINE",
"create_time": "2024-03-05T20:35:35.347031"
},
{
"breach_id": 5348935,
"breach_name": "stealer-malware-logs",
"breach_description": "The following credentials were obtained using a stealer malware, and shared on the Telegram channel \"OBSERVERCLOUD - BEST FREE COMBO CLOUD\" (channel id: 1851318122) on 2024-03-04. They were extracted from a file named \"@urllogpass_diller_1000000.txt\", with a size of 75.4 MB.",
"breach_publication_date": "2024-03-04",
"domain": "roadrunnersystems.com",
"hash_type": "plain",
"name": "",
"password": "Z*&^^VtP@$$^&$",
"post_id": "eb59ff30381b800177ddd59c7e242354",
"source_name": "telegram",
"post_title": "Daily Telegram Channel 👁 OBSERVERCLOUD - BEST FREE COMBO CLOUD (1851318122)",
"username": "john.doe@roadrunnersystems.com",
"host": "https://acme.roadrunner.com/login",
"host_domain": "acme.roadrunner.com",
"stealer_malware": "",
"create_time": "2024-03-05T09:22:56.560810"
}
]
}
Cybersixgill - Fetch Compromised Emails (Supplemental)
Fetches compromised emails for a given domain.
POST https://api.cybersixgill.com/data_leak/credentials/leaks/search
Sample Response:
{
"objects": [
{
"breach_id": 273204,
"breach_name": "leaked-credentials",
"breach_description": "The following credentials were shared on the Telegram channel \"Raidforums Official\" (channel id: 2124656678) on 2024-01-22. They were extracted from a file named \"25kk By Chucky_7_2000000.txt\", with a size of 67.3 MB.",
"breach_publication_date": "2024-01-22",
"email": "adam.quest@acme.com",
"domain": "acme.com",
"is_email_domain": true,
"hash_type": "plain",
"name": "",
"password": "W3bb0y1!",
"post_id": "d048ac18be31fd71c242a4659319f6c4",
"source_name": "telegram",
"post_title": "Daily Telegram Channel Raidforums Official (2124656678)",
"create_time": "2024-01-24T01:04:50.497875"
},
{
"breach_id": 254158,
"breach_name": "leaked-credentials",
"breach_description": "The following credentials were shared on the Telegram channel \"CHAT | HQ COMBO | FRESH BASE http://proshoping24.ru Onlain magazin\" (channel id: 1368172612) on 2023-11-27T18:40:32. They were extracted from a file named \"621k no valid hq vip combo [@darkwebs_guru].txt.txt\", with a size of 19.6 MB.",
"breach_publication_date": "2023-11-27",
"email": "john.doe@acme.com",
"domain": "acme.com",
"is_email_domain": true,
"hash_type": "plain",
"name": "",
"password": "hunter2",
"post_id": "d4d60e4da1892fdc59e4102df953b715d159e224",
"source_name": "telegram",
"post_title": "",
"create_time": "2023-11-27T20:57:55.484928"
}
]
}
Average Feed Run
Object counts and Feed runtime are supplied as generalities only - objects returned by a provider can differ based on credential configurations and Feed runtime may vary based on system resources and load.
Cybersixgill Darkfeed
Metric | Result |
---|---|
Run Time | 7 minutes |
Indicators | 2001 |
Indicator Attributes | 30,248 |
Adversaries | 65 |
Attack Patterns | 2 |
Attack Patterns Attributes | 21 |
Cybersixgill DVE
Metric | Result |
---|---|
Run Time | 3 minutes |
Vulnerabilities | 158 |
Vulnerability Attributes | 2,404 |
Cybersixgill Alerts
Metric | Result |
---|---|
Run Time | 1 minute |
Adversaries | 4 |
Adversary Attributes | 8 |
Assets | 2 |
Asset Attributes | 4 |
Events | 13 |
Event Attributes | 91 |
Cybersixgill Compromised Accounts
Metric | Result |
---|---|
Run Time | 1 minute |
Compromised Accounts | 5 |
Compromised Account Attributes | 25 |
Malware | 1 |
Cybersixgill Compromised Emails
Metric | Result |
---|---|
Run Time | 1 minute |
Compromised Accounts | 15 |
Compromised Account Attributes | 24 |
Known Issues
- The Darkfeed & DVE feeds are limited to a maximum amount of items fetched per feed run:
- Darkfeed: 100,000 items
- DVE: 25,000 items
Change Log
- Version 1.1.1 rev-a
- Guide Update - added steps for installing the Compromised Account custom object.
- Version 1.1.1
- Resolved an issue where users would encounter an error if no matched assets were returned by the feed.
- Version 1.1.0
- Adds Cybersixgill DVE, Cybersixgill Alerts, Cybersixgill Compromised Accounts, and Cybersixgill Compromised Emails feeds.
- Updates to the Cybersixgill Darkfeed:
- Adds support for additional indicator types; IPv6 Address, Email Address
- Adds user field selections for ingested context
- Adds TLP support
- Renames
False Positive
attribute toRevoked
- Labels will now be ingested as Tags
- Renames
Cybersixgill Post ID
attribute toCybersixgill Post Link
- Removes
Cybersixgill Feed ID
attribute - Fixes issue ingesting "None" label (now a tag)
- The feed will no longer marked Revoked indicators as Whitelisted
- Fixes issue where the feed would not fully paginate through all the available data
- Previous versions of the feed would stop after 2k entries
- This feed will now ingest up to 50k entries per run
- Version 1.0.4
- Updated the labeling and description for the configuration parameters. Cybersixgill API ID is now Cybersixgill Client ID and Cybersixgill API Key is now Cybersixgill Client Secret.
- Version 1.0.3
- Updating integration naming and configuration labels - Sixgill is now Cybersixgill.
- Version 1.0.2
- Update support for MITRE Attack Patterns
- Version 1.0.1
- Fixed error during ingestion
- Version 1.0.0
- Initial release
PDF Guides
Document | ThreatQ Version |
---|---|
Cybersixgill Darkfeed CDF Guide v1.1.1 | 5.12.1 or Greater |
Cybersixgill Darkfeed CDF Guide v1.1.0 | 5.12.1 or Greater |
Cybersixgill Darkfeed CDF Guide v1.0.4 | 4.34.0 or Greater |
Cybersixgill Darkfeed CDF Guide v1.0.3 | 4.34.0 or Greater |
Cybersixgill Darkfeed CDF Guide v1.0.2 | 4.34.0 or Greater |
Cybersixgill Darkfeed CDF Guide v1.0.1 | 4.34.0 or Greater |
Cybersixgill Darkfeed CDF Guide v1.0.0 | 4.34.0 or Greater |