Current ThreatQ Version Filter
 

Cyware CSAP CDF

The web format of this guide reflects the most current release.  Guides for older iterations are available in PDF format.  

Integration Details

ThreatQuotient provides the following details for this integration:

Introduction

The Cyware CSAP CDF integration enables the automatic and periodic ingestion of alerts from Cyware CSAP. These alerts come into ThreatQ as Report objects, along with context such as tags, related malware, related threat actors, related indicators, attribution, and more.

Cyware CSAP is a platform for sharing threat information and collaborating on security incidents. It gathers alerts from various sources, analyzes them, and helps security teams prioritize and respond to threats more quickly. This improves situational awareness and allows teams to work together effectively to defend against cyberattacks.

The integration provides the following feed:

  • Cyware CSAP Alerts - ingests alerts from Cyware CSAP.

The integration ingests the following system objects:

  • Adversaries
  • Attack Patterns
  • Indicators
    • Indicator Attributes
  • Malware
  • Reports
    • Report Attributes
  • Tags
  • Vulnerabilities

Prerequisites

The following is required in order to install and run the integration:

  • Cyware CSAP API Credentials.
  • Your ThreatQ instance's egress IP address must be whitelisted in Cyware CSAP.

Installation

Perform the following steps to install the integration:

The same steps can be used to upgrade the integration to a new version.

  1. Log into https://marketplace.threatq.com/.
  2. Locate and download the integration yaml file.
  3. Navigate to the integrations management page on your ThreatQ instance.
  4. Click on the Add New Integration button.
  5. Upload the integration yaml file using one of the following methods:
    • Drag and drop the file into the dialog box
    • Select Click to Browse to locate the file on your local machine

    ThreatQ will inform you if the feed already exists on the platform and will require user confirmation before proceeding. ThreatQ will also inform you if the new version of the feed contains changes to the user configuration. The new user configurations will overwrite the existing ones for the feed and will require user confirmation before proceeding.

  6. The feed will be added to the integrations page.  You will still need to configure and then enable the feed.

Configuration

ThreatQuotient does not issue API keys for third-party vendors. Contact the specific vendor to obtain API keys and other integration-related credentials.

To configure the integration:

  1. Navigate to your integrations management page in ThreatQ.
  2. Select the Commercial option from the Category dropdown (optional).

    If you are installing the integration for the first time, it will be located under the Disabled tab.

  3. Click on the integration entry to open its details page.
  4. Enter the following parameters under the Configuration tab:
    Parameter Description
    Cyware CSAP Host Enter your Cyware CSAP Hostname.
    Access ID Enter your Cyware CSAP API Access ID to authenticate using HMAC authentication.
    Secret Key Enter your Cyware CSAP API Secret Key to authenticate using HMAC authentication.
    Inherit Relationships & Context to Indicators Enabling this parameter option to inherit relationships and context to the relevant indicators in an alert. This parameter is disabled by default.

    This will not inherit all of the tags, only the ones that have been parsed into more specific entities.

    Ingest CVEs As Select how to ingest CVEs as in the ThreatQ platform.  Options include:
    • Indicators (CVE)
    • Vulnerabilities (default)

    Configuration Screen
  5. Review any additional settings, make any changes if needed, and click on Save.
  6. Click on the toggle switch, located above the Additional Information section, to enable it.

ThreatQ Mapping

Cyware CSAP Alerts

The Cyware CSAP Alerts feed feed ingests alerts from Cyware CSAP. Cyware CSAP provides report content as well as tags with each of the alerts. ThreatQ will parse these tags, looking for relevant threat actors, malware, attack patterns, vulnerabilities, and more. Parsing this context will allow you to better manage the threat intelligence, resulting in faster times to detection and response.

GET https://{tenant}.cyware.com/api/csap/v1/list_alert/

Sample Response:

{
  "count": 2,
  "data": [
    {
      "short_id": "80d38c75",
      "title": "ZeroFox Intelligence Brief - Article 23 and Risks to Foreign Nationals in Hong Kong",
      "status": "PUBLISHED",
      "published_time": 1711469354
    },
    {
      "short_id": "64cd1c71",
      "title": "Top Malware Reported in the Last 24 Hours",
      "status": "PUBLISHED",
      "published_time": 1711466108
    }
  ]
}

ThreatQuotient provides the following default mapping for this feed:

Feed Data Path ThreatQ Entity ThreatQ Object Type or Attribute Key Published Date Examples Notes
.title Report Value N/A .published_time N/A N/A
.content, .card_info, .recommendation, .attachments[], .optional_fields.description, .optional_fields.additional_info, .optional_fields.response_action Report Description N/A N/A N/A Fields are concatenated to form description HTML
.card_tag[].tag_name Malware Value N/A .published_time Jasmin Ransomware Parsed based on tag value
.card_tag[].tag_name Adversary Name N/A .published_time APT28 Parsed based on tag value
.card_tag[].tag_name Attack Pattern Value N/A .published_time T1041 - XXXXX Parsed based on tag value
.card_tag[].tag_name Indicator Value CVE .published_time CVE-2024-12345 Parsed based on tag value; If Ingest CVEs As user field is set to Indicators
.card_tag[].tag_name Vulnerability Value N/A .published_time CVE-2024-12345 Parsed based on tag value; If Ingest CVEs As user field is set to Vulnerabilities
.card_tag[].tag_name Attribute Tactic .published_time Initial Access Parsed based on tag value
.card_tag[].tag_name Attribute Affected Sector .published_time Healthcare Parsed based on tag value
.card_tag[].tag_name Tag N/A .published_time Cyber Threats If no other entity is parsed from the tag
.indicators.{type}.
blacklisted[]
Indicator Mapped from .indicators.{type} .published_time N/A Default Indicator Status is applied
.indicators.{type}.
whitelisted[]
Indicator Mapped from .indicators.{type} .published_time N/A Whitelisted Status is applied
.info_source[].
source_name
Attribute Source .published_time Flashpoint N/A
.card_group[].
group_name
Attribute Alert Group .published_time All CSAP Portal Users (MMost Users) Only applied to Report
.cyber_threat_method
[].cyber_threat_method
_name
Attribute Cyber Threat Method .published_time Compromised User Accounts N/A
.physical_threat_method
[].physical_threat_method
_name
Attribute Physical Threat Method .published_time N/A Only applied to Report
.threat_actor[].threat_
actor_name
Adversary Name N/A .published_time N/A N/A
.reportsource[].
reportsource_name
Attribute Source .published_time Government Organisation N/A
.detectionmethod[].
detectionmethod_name
Attribute Detection Method .published_time N/A N/A
.vulnerability_type[] Attribute N/A .published_time N/A Only applied to Report
.targeted_sector[] Attribute Target Sector .published_time N/A N/A
.content, .card_info Indicator Value CVE .published_time N/A CVEs parsed from description; If Ingest CVEs As user field is set to Indicators
.content, .card_info Vulnerability Value N/A .published_time N/A CVEs parsed from description; If Ingest CVEs As user field is set to Vulnerabilities
.credibility.
credibility_name
Attribute Credibility .published_time Verified Updated at ingestion
.card_category.
category_name
Attribute Category .published_time Malware N/A
.confidence.
confidence_name
Attribute Confidence .published_time N/A Updated at ingestion
.urgency.urgency_name Attribute Urgency .published_time N/A Updated at ingestion
.severity.severity_name Attribute Severity .published_time N/A Updated at ingestion
.priority.priority_name Attribute Priority .published_time N/A Updated at ingestion
.risk.risk_name Attribute Risk .published_time N/A N/A

Cyware CSAP Indicator Type Mapping

ThreatQuotient provides the following Cyware CSAP Indicator Type to ThreatQ mapping:

Cyware CSAp Indicator ThreatQ Indicator Type
md5 MD5
sha1 SHA-1
sha256 SHA-256
sha512 SHA-512
ipv4 IP Address
ip IP Address
ipv6 IPv6 Address
fqdn FQDN
host FQDN
hostname FQDN
domain FQDN
url URL

Cyware CSAP - Get Alert (Supplemental)

The Get Alert supplemental feed fetches an attachment's content by its ID and its parent's report ID.

GET https://{tenant}.cyware.com/api/csap/v1/get_alert_detail/{alert.short_id}

Sample Response:

{
    "short_id": "0a586299",
    "title": "Alpha Ransomware Emerges from NetWalker Ashes",
    "content": "<html><body><p>Alpha, a new ransomware that first appeared in February 2023 has intensified its activities in recent weeks and strongly resembles the now defunct NetWalker ransomware that vanished in January 2021.</p></body></html>",
    "status": "PUBLISHED",
    "tlp": "CLEAR",
    "card_group": [
        {
            "group_id": "70455e0f",
            "group_name": "All CSAP Portal Users (MMost Users)",
            "group_tlp": "RED",
            "group_type": "CUSTOM"
        }
    ],
    "card_category": {
        "category_id": "910364bb",
        "category_name": "Partner Advisory"
    },
    "card_info": "To view additional indicators provided by RiskIQ, click <a href=https://community.riskiq.com/article/507ee0d6>https://community.riskiq.com/article/507ee0d6</a> to set up an account.<br><br>",
    "info_source": [
        {
            "source_id": "da07127f",
            "source_name": "RiskIQ"
        }
    ],
    "card_image": null,
    "push_required": true,
    "push_email_notification": true,
    "published_time": 1708459200,
    "optional_fields": {
        "threat_indicators": "0bad18cb64b14a689965540126e0adbc952f090f1fb7b6447fe897a073860cdb 1c12ff296e7d9f90391e45f8a1d82d8140edf98d616a7da28741094d60d4779d 2d07f0425dc465b3a1267a672c1293f9a3d0cd23106b7be490807fea490978ea 46569bf23a2f00f6bac5de6101b8f771feb972d104633f84e13d9bc98b844520 480cf54686bd50157701d93cc729ecf70c14cd1acd2cb622b38fc25e23dfbc26 5f3bf9c07eedde053f19ce134caa7587f8fb6c466e33256e1253f3a9450b7110 6462b8825e02cf55dc905dd42f0b4777dfd5aa4ff777e3e8fe71d57b7d9934e7 6e204e39121109dafcb618b33191f8e977a433470a0c43af7f39724395f1343e 89bfcbf74607ad6d532495de081a1353fc3cf4cd4a00df7b1ba06c10c2de3972 9c71500a9472814f7bf97a462fe9822cf93dc41e2e34cc068734586d5e5146ef 9d6ed8396ee79ae92a5e6cef718add321226def3461711cf585e0fd302c961ae a8d350bbe8d9ccfbb0c3e9c2dd9251c957d18ce13ae405ceb2f2d087c115db15 ab317c082c910cfe89214b31a0933eaab6c766158984f7aafb9943aef7ec6cbb b2adf8ec7ab5193c7358f6acb30b003493466daee33ea416e3f703e744f73b7d b7ca6d401b051712cb5b1a388a2135921a4420db8fe41842d51d2ec27380b479 c00fbf3fb992e7f237c396d69081246570cbd60d6c7a2262c01ae4d8e6f17ddd c5f7492a3e763b4456afbb181248fdb8e652575cea286db7861e97ffcd1b72e4 df15266a9967320405b3771d0b7353dc5a4fb1cbf935010bc3c8c0e2fe17fb94 e43b1e06304f39dfcc5e59cf42f7a17f3818439f435ceba9445c56fe607d59ea e573d2fec8731580ab620430f55081ceb7153d0344f2094e28785950fb17f499 e68dd7f20cd31309479ece3f1c8578c9f93c0a7154dcf21abce30e75b25da96b f3858d29073ae90f90c9bb284913752533fe1a6437edd6536e4b1775fc8f6db4 f5d25777331ba55d80e064dea72240c1524ffcd3870555a8c34ff5377def3729"
    },
    "indicators": {
        "sha256": {
            "whitelisted": [],
            "blacklisted": [
                "1c12ff296e7d9f90391e45f8a1d82d8140edf98d616a7da28741094d60d4779d",
                "6462b8825e02cf55dc905dd42f0b4777dfd5aa4ff777e3e8fe71d57b7d9934e7"
            ]
        }
    },
    "credibility": null,
    "confidence": null,
    "announcement_type": null,
    "risk": null,
    "urgency": null,
    "severity": null,
    "priority": null,
    "kill_chain_phase": null,
    "exploit_likelihood": null,
    "exploited_wild": null,
    "systemsaffected": null,
    "threat_actor": [],
    "threat_method": [],
    "detectionmethod": [],
    "root_cause": [],
    "card_intel_source": [
        {
            "source_id": "da07127f",
            "info_source_id": "da07127f",
            "card_count": 462,
            "info_source_name": "RiskIQ",
            "alert_count": 462,
            "created": "2022-08-02T18:55:42.009932Z",
            "modified": "2022-08-02T18:55:42.010177Z",
            "source_name": "RiskIQ",
            "is_editable": false,
            "is_active": true,
            "index": 0
        }
    ],
    "cyber_threat_method": [],
    "physical_threat_method": [],
    "document_type": [],
    "vendorsnproduct": [],
    "reportsource": [],
    "vulnerability_type": [],
    "vulnerability_source": [],
    "targeted_sector": [],
    "card_tag": [
        {
            "tag_name": "Alpha",
            "tag_id": "9475209d-1313-49a0-9a19-9f5cca3dc2ac",
            "is_active": true,
            "tag_slug": "alpha"
        },
        {
            "tag_name": "T1056 - Input Capture",
            "tag_id": "5bb0b5e8-57b6-4bd9-b44a-7cd75715eb7e",
            "is_active": true,
            "tag_slug": "t1056-input-capture"
        },
        {
            "tag_name": "OSINT",
            "tag_id": "41b726a3-3298-4c46-a089-b796dadcbad2",
            "is_active": true,
            "tag_slug": "osint"
        },
        {
            "tag_name": "Ransomware",
            "tag_id": "caeeb35d-a009-498a-93f8-a36fcb390054",
            "is_active": true,
            "tag_slug": "ransomware"
        }
    ],
    "previous_base_card": null,
    "child_cards": null,
    "tactic_technique_pairs_data": [],
    "custom_fields": {},
    "tracking_id": "42729d71-ddb9-49b4-8931-72df2751bdac",
    "attachments": [],
    "event": null,
    "intel_id": null,
    "rfi_id": null
}

Average Feed Run

Object counts and Feed runtime are supplied as generalities only - objects returned by a provider can differ based on credential configurations and Feed runtime may vary based on system resources and load.

Metric Result
Run Time 7 minutes
Adversaries 12
Indicators 172
Indicator Attributes 390
Malware 16
Reports 65
Report Attributes 205
Vulnerabilities 13

Known Issues / Limitations

  • Cyware CSAP has a rate limit on how many API calls you can make within an hour. If you are requesting historical data, you may hit this limit, which will cause a feed run error.

Change Log

  • Version 1.0.0
    • Initial release

PDF Guides

Document ThreatQ Version
Cyware CSAP CDF Guide v1.0.0 5.25.0 or Greater