Current ThreatQ Version Filter
 

Feedly CDF

The web format of this guide reflects the most current release.  Guides for older iterations are available in PDF format.  

Integration Details

ThreatQuotient provides the following details for this integration:

Introduction

The Feedly integration for ThreatQ allows a user to ingest feeds as reports and related objects from Team feeds on Feedly.

You cannot pull from a Feedly Personal feed.

The CDF includes the following feeds:

  • Feedly - ingests reports and other related objects from Feedly.
  • Feedly Threat Intelligence - ingests STIX 2.1 threat intelligence Reports from a Feedly stream. This may also include related Indicators, Malware, Adversaries, Attack Patterns, etc.

The integration ingests the following system object types:

  • Adversaries
    • Adversary Attributes
  • Attack Patterns
    • Attack Pattern Attributes
  • Campaigns
    • Campaign Attributes
  • Courses of Action
    • Course of Action Attributes
  • Identities
    • Identity Attributes
  • Indicators
    • Indicator Attributes
  • Intrusion Sets
  • Intrusion Set Attributes
  • Malware
    • Malware Attributes
  • Reports
    • Report Attributes
  • Signatures
    • Signature Attributes
  • Tag
  • Tools
    • Tool Attributes
  • Vulnerabilities
    • Vulnerability Attributes

 


Transcript: TEXT

Footage from ThreatQ Version 4.57.0

Installation

Perform the following steps to install the integration:

The same steps can be used to upgrade the integration to a new version.

  1. Log into https://marketplace.threatq.com/.
  2. Locate and download the integration yaml file.
  3. Navigate to the integrations management page on your ThreatQ instance.
  4. Click on the Add New Integration button.
  5. Upload the yaml file using one of the following methods:
    • Drag and drop the file into the dialog box
    • Select Click to Browse to locate the file on your local machine

    ThreatQ will inform you if the feed already exists on the platform and will require user confirmation before proceeding. ThreatQ will also inform you if the new version of the feed contains changes to the user configuration. The new user configurations will overwrite the existing ones for the feed and will require user confirmation before proceeding.

  6. If prompted, select the individual feeds to install and click Install. The feed will be added to the integrations page. 

You will still need to configure and then enable the feed.

Configuration

ThreatQuotient does not issue API keys for third-party vendors. Contact the specific vendor to obtain API keys and other integration-related credentials.

To configure the integration:

  1. Navigate to your integrations management page in ThreatQ.
  2. Select the Commercial option from the Category dropdown (optional).

    If you are installing the integration for the first time, it will be located under the Disabled tab.

  3. Click on the integration entry to open its details page.
  4. Enter the following parameters under the Configuration tab:

    Feedly Parameters

    Parameter Description
    Feedly API Token Your Feedly API Token.
    Feedly API Stream ID Your Feedly Stream ID.
    Ingest Keywords As Select the type of object Keywords should be ingested as.  Options include:
    • Tags (default)
    • Attributes 
    Ingest CVEs As: Select the type of objects CVEs should be ingested as.  Options include:
    • Indicators
    • Vulnerabilities  (default)  

    Feedly Configuration Screen

    Feedly Threat Intelligence Parameters

    Parameter Description
    Feedly API Token Your Feedly API Token.
    Feedly API Stream ID Your Feedly Stream ID.
    Ingest CVEs As Select the type of objects CVEs should be ingested as.  Options include:
    • Indicators
    • Vulnerabilities (default)   
    Ingest STIX Indicator Patterns as Signaures Enable this option will result in STIX indicators to be ingested as signatures.  If disabled, indicator values will be ingested as indicators. 

    Feedly Threat Intelligence Configuration Screen
  5. Review any additional settings, make any changes if needed, and click on Save.
  6. Click on the toggle switch, located above the Additional Information section, to enable it.

ThreatQ Mapping

Feedly

The Feedly feed ingests CVE's as indicators or vulnerabilities.

GET https://cloud.feedly.com/v3/streams/contents

Sample Response:

{
  "continuation": "17eb965fd82:8f60c7:26e2bd2e",
  "id": "enterprise/threatquotient/category/4b1e06a8-b4de-4e74-9593-ac879d1d3d23",
  "items": [
    {
        "alternate": [
            {
                "href": "https://packetstormsecurity.com/files/165814/wpcfct102-xssaccess.txt",
                "type": "text/html"
            }
        ],
        "canonicalUrl": "https://packetstormsecurity.com/files/165814/wpcfct102-xssaccess.txt",
        "categories": [
            {
                "id": "enterprise/threatquotient/category/4b1e06a8-b4de-4e74-9593-ac879d1d3d23",
                "label": "Threat Intel"
            }
        ],
        "commonTopics": [
            {
                "id": "nlp/f/topic/2440",
                "label": "Vulnerabilities",
                "salienceLevel": "about",
                "score": 1.0,
                "type": "topic"
            },
            {
                "id": "nlp/f/topic/3003",
                "label": "Cyber Security",
                "salienceLevel": "about",
                "score": 1.0,
                "type": "topic"
            }
        ],
        "crawled": 1643826412301,
        "entities": [
            {
                "id": "vulnerability/m/entity/CVE-2021-24247",
                "label": "CVE-2021-24247",
                "mentions": [
                    {
                        "text": "CVE-2021-24247"
                    }
                ],
                "vulnerabilityInfo": {
                    "cvssScore": 5.4,
                    "description": "The Contact Form Check Tester WordPress plugin through 1.0.2 settings are visible to all registered users in the dashboard and are lacking any sanitisation. As a result, any registered user, such as subscriber, can leave an XSS payload in the plugin settings, which will be triggered by any user visiting them, and could allow for privilege escalation. The vendor decided to close the plugin.",
                    "hasExploit": true,
                    "hasPatch": false
                }
            },
          {
              "type": "mitreAttack",
              "disambiguated": true,
              "id": "nlp/f/entity/gz:mi:x-mitre-tactic-ffd5bcee-6e16-4dd2-8eca-7b3beedf33ca",
              "label": "Initial Access (Enterprise TA0001)",
              "mentions": [],
              "salienceLevel": "mention",
              "causes": [
                  {
                      "id": "nlp/f/entity/gz:mi:attack-pattern-a62a8db3-f23a-4d8f-afd6-9dbc77e7813b",
                      "label": "Phishing (Enterprise T1566)"
                  }
              ]
          }
        ],
        "estimatedCVSS": {
            "category": "HIGH"
        },
        "fingerprint": "b5dfd074",
        "fullContent": "<!DOCTYPE html PUBLIC \"-//W3C//DTD HTML 4.0 Transitional//EN\" \"http://www.w3.org/TR/REC-html40/loose.dtd\">\n<html><body><div><div><div id=\"m\">\n    \n\n    \n    \n    \n    \n    <p></p><h1>WordPress Contact Form Check Tester 1.0.2 XSS / Access Control</h1>\n<dl id=\"F165814\"><dt><a href=\"https://packetstormsecurity.com/files/download/165814/wpcfct102-xssaccess.txt\" title=\"Size: 0.7 KB\"><strong>WordPress Contact Form Check Tester 1.0.2 XSS / Access Control</strong></a></dt>\n<dd>Posted <a href=\"https://packetstormsecurity.com/files/date/2022-02-02/\" title=\"16:49:09 UTC\">Feb  2, 2022</a></dd>\n<dd>Authored by <a href=\"https://packetstormsecurity.com/files/author/13412/\">0xB9</a></dd>\n<dd><p>WordPress Contact Form Check Tester plugin version 1.0.2 suffers from broken access control and cross site scripting vulnerabilities.</p></dd>\n<dd><span>tags</span> | <a href=\"https://packetstormsecurity.com/files/tags/exploit\">exploit</a>, <a href=\"https://packetstormsecurity.com/files/tags/vulnerability\">vulnerability</a>, <a href=\"https://packetstormsecurity.com/files/tags/xss\">xss</a></dd>\n<dd><span>advisories</span> | <a href=\"https://packetstormsecurity.com/files/cve/CVE-2021-24247\">CVE-2021-24247</a></dd>\n<dd><span>MD5</span> | <code>6571a974217db95c175bd945e2b0d575</code></dd>\n<dd><a href=\"https://packetstormsecurity.com/files/download/165814/wpcfct102-xssaccess.txt\" title=\"Size: 0.7 KB\" rel=\"nofollow\">Download</a>  | <a href=\"https://packetstormsecurity.com/files/favorite/165814/\" rel=\"nofollow\">Favorite</a> | <a href=\"https://packetstormsecurity.com/files/165814/WordPress-Contact-Form-Check-Tester-1.0.2-XSS-Access-Control.html\">View</a></dd>\n</dl><p></p><h1>WordPress Contact Form Check Tester 1.0.2 XSS / Access Control</h1>\n<div>\n\n<pre><code># Exploit Title: WordPress Plugin Contact Form Check Tester 1.0.2 - Broken Access Control<br># Date: 2/28/2021<br># Author: 0xB9<br># Software Link: https://wordpress.org/plugins/contact-fo...ck-tester/<br># Version: 1.0.2<br># Tested on: Windows 10<br># CVE: CVE-2021-24247<br><br>1. Description:<br>The plugin settings are visible to all registered users in the dashboard.<br>A registered user can leave a payload in the plugin settings.<br><br>2. Proof of Concept:<br>- Register an account<br>- Navigate to the dashboard<br>- Go to CF7 Check Tester -&gt; Settings<br>- Add a form<br>- Add a field to the form<br>- Put in a payload in either Field selector or Field value  \"&gt;&lt;script&gt;alert(1)&lt;/script&gt;<br>- Save<br>Anyone who visits the settings page will execute the payload.<br><br></code></pre>\n</div>\n \n    \n    \n     </div>\n    \n      </div></div></body></html>",
        "id": "4/bnDLbGIuwgfYUHoNIoHFzwzucR/Wg3zKOf7t/Xc0Q=_17ebbb07b0d:f47321:aa31659c",
        "language": "en",
        "leoSummary": {
            "sentences": [
               {
                          "text": "Palo Alto Networks customers are protected against the types of BEC threats discussed in this blog by products including Cortex XDR and the WildFire, Threat Prevention, AutoFocus and Advanced URL Filtering subscription services for the Next-Generation Firewall .",
                          "position": 16,
                          "score": 0.316
               }
            ]
        },
        "origin": {
            "htmlUrl": "https://packetstormsecurity.com/",
            "streamId": "feed/http://packetstormsecurity.org/exploits.xml",
            "title": "Exploit Files \u2248 Packet Storm"
        },
        "originId": "https://packetstormsecurity.com/files/165814/wpcfct102-xssaccess.txt",
        "published": 1643820549000,
        "sources": [
            {
                "feedlyFeedType": "WebAlert",
                "searchTerms": {
                    "isComplexFilter": false,
                    "parts": [
                        {
                            "id": "nlp/f/publicationBucket/byf:cybersecurity-bundle",
                            "label": "Cybersecurity"
                        },
                        {
                            "text": "HIGH"
                        },
                        {
                            "id": "nlp/f/entity/wd:13166",
                            "label": "WordPress"
                        }
                    ]
                },
                "streamId": "feed/https://feedly.com/f/alert/704a6215-d181-427e-b1a4-d50032e51968",
                "title": "Wordpress Vulns"
            }
        ],
        "memes": "Website",
        "summary": {
            "content": "WordPress Contact Form Check Tester plugin version 1.0.2 suffers from broken access control and cross site scripting vulnerabilities.",
            "direction": "ltr"
        },
        "title": "WordPress Contact Form Check Tester 1.0.2 XSS / Access Control",
        "keywords": [
                    "My Software",
                    "Update"
                ],
        "unread": true,
        "visual": {
            "url": "none"
        },
        "indicatorsOfCompromise": {
      "exports": [
          {
              "type": "markdown",
              "url": "https://exports.feedly.com/ioc/8a22cd92ac501da224308d248fd2e226/20220525.222341.all-ioc.md"
          }
      ],
      "mentions": [
          {
              "text": "mail.saadzakhary[.]com:587",
              "type": "domain",
              "canonical": "mail[.]saadzakhary.com:587"
          },
          {
              "text": "hxxp://192.227.196[.]211/tea_shipping/f_document_shp.doc",
              "type": "url",
              "canonical": "http://192[.]227.196.211/tea_shipping/f_document_shp.doc"
          },
          {
              "text": "f1794bfabeae40abc925a14f4e9158b92616269ed9bcf9aff95d1c19fa79352e",
              "type": "hash",
              "canonical": "f1794bfabeae40abc925a14f4e9158b92616269ed9bcf9aff95d1c19fa79352e"
          }
      ]
  }
    }
  ],
  "updated": 1643836615133
}

ThreatQuotient provides the following default mapping for this feed:

Feed Data Path ThreatQ Entity ThreatQ Object Type or Attribute Key Published Date Examples Notes
items[].title Report.Value N/A items[].published WordPress Contact Form Check Tester 1.0.2 XSS / Access Control N/A
items[].fullContent Report.Description N/A items[].published <!DOCTYPE html PUBLIC.... if fullContent does not exist, content.content is used, if that doesn't exist, summary.content is used.
items[].keywords Report.Attribute/Tag Tag items[].published My Software User chooses whether keywords is ingested as a tag or an attribute
items[].entities[].causes[] Report.Attribute Affected Software items[].published Windows 11 N/A
items[].origin.title Report.Attribute Origin items[].published Exploit Files \u2248 Packet Storm N/A
items[].canonicalUrl Report.Attribute Source URL items[].published https://packetstormsecurity.com/
files/165814/wpcfct102-xssaccess.txt
N/A
items[].summary.content Report.Attribute Feedly Summary items[].published WordPress Contact Form Check Tester plugin version 1.0.2 suffers from broken access control and cross site scripting vulnerabilities. Chosen first over items[].leoSummary
items[].leoSummary[].sentences[].text Report.Attribute Feedly Leo Summary items[].published "Palo Alto Networks customers are protected against the..." Only used if items[].summary doesn't exist
items[].categories[].label Report.Attribute Feedly Category items[].published Threat Intel This attribute is the label of the feed it is associated with
items[].estimatedCVSS.category Report.Attribute Estimated CVSS Severity items[].published High Estimated CVSS severity that Feedly has provided
items[].commonTopics[].label Report.Attribute Topic items[].published Cyber Security Topics that Feedly categorized the item under
items[].memes Report.Attribute Common Subject items[].published Website Topics that Feedly categorized the item under
items[].entities[].label Related.Indicator CVE items[].published CVE-2022-0190 User chooses whether CVE's are ingested as Indicators, Vulnerabilites or both
items[].entities[].vulnerabilityInfo.
cvssScore
Indicator.Attribute CVSS Score items[].published 5.4 N/A
items[].entities[].label Related.Vulnerability N/A items[].published CVE-2022-0190 User chooses whether CVE's are ingested as Indicators, Vulnerabilites or both
items[].indicatorsOfCompromise.
mentions[].canonical
Related.Indicator FQDN items[].published bzone.no-ip.biz N/A
items[].indicatorsOfCompromise.
mentions[].canonical
Related.Indicator URL items[].published https://sk5621.com.co N/A
items[].indicatorsOfCompromise.
mentions[].canonical
Related.Indicator Email Address items[].published N/A N/A
items[].indicatorsOfCompromise.
mentions[].canonical
Related.Indicator IP Address items[].published 45.77.71.50:8082 N/A
items[].indicatorsOfCompromise.
mentions[].canonical
Related.Indicator MD5 items[].published 40b428899db353bb0ea
244d95b5b82d9
N/A
items[].indicatorsOfCompromise.
mentions[].canonical
Related.Indicator SHA-1 items[].published N/A N/A
items[].indicatorsOfCompromise.
mentions[].canonical
Related.Indicator SHA-256 items[].published 6fcd36052b242bc33e905
77e9a9cf5dc91bc7c5f3ad
587b0d45ab4a7cb7b73b3
N/A
items[].indicatorsOfCompromise.
mentions[].canonical
Related.Indicator SHA-512 items[].published 40b428899db353bb0ea2
44d95b5b82d9
N/A
items[].entities[].label Related.Attack Pattern N/A items[].published T1187 - Forced Authentication N/A
items[].entities[].causes[] Related.Identity N/A items[].published Microsoft N/A
items[].entities[].causes[] Related.Malware N/A items[].published TrickBot Includes attribute of affected OS
items[].entities[].causes[] Related.Adversary N/A items[].published MuddyWater N/A

Feedly Threat Intelligence

The Feedly Threat Intelligence feed will ingest STIX 2.1 threat intelligence Reports from a Feedly stream. This may also include related Indicators, Malware, Adversaries, Attack Patterns, etc.

GET https://cloud.feedly.com/v3/enterprise/ioc

{
  "objects": [
    {
      "type": "report",
      "spec_version": "2.1",
      "id": "report--8d52f733-6826-4523-aad5-7f84b9f9a4df",
      "created": "2023-06-23T14:14:07.147182Z",
      "modified": "2023-06-23T14:14:07.147182Z",
      "name": "Bluepurple Pulse: week ending June 25th",
      "description": "<div>[Redacted]</div>",
      "published": "2023-06-23T07:13:58.781Z",
      "object_refs": [
        "malware--52acea22-7d88-433c-99e6-8fef1657e3ad",
        "malware--8c9bcc7d-0484-4067-bc57-30f1036fbac4",
        "threat-actor--68391641-859f-4a9a-9a1e-3e5cf71ec376",
        "attack-pattern--d10cbd34-42e3-45c0-84d2-535a09849584"
      ],
      "external_references": [
        {
          "source_name": "Feedly article",
          "url": "https://feedly.com/i/entry/T8Gn8hJy9MDXgPPEWPf3eKFiC22pQg9/jkwNHgMRBDU=_188e89acb7d:3ae99fe:cee8d097"
        },
        {
          "source_name": "BinaryFirefly",
          "url": "https://bluepurple.binaryfirefly.com/p/bluepurple-pulse-week-ending-june-64e"
        }
      ],
      "labels": ["Wordpress Vulns", "Threat Intel"]
    },
    {
      "type": "malware",
      "spec_version": "2.1",
      "id": "malware--52acea22-7d88-433c-99e6-8fef1657e3ad",
      "created": "2023-06-23T10:46:39.001644Z",
      "modified": "2023-06-23T10:46:39.001644Z",
      "name": "Chrysaor",
      "description": "With our partners and with technical support from Amnesty International’s Security Lab, we’ve been investigating the use of the spyware called Pegasus and the Israeli surveillance company, NSO Group, that sells it to foreign governments.",
      "is_family": true,
      "aliases": ["JigglyPuff", "Pegasus"],
      "external_references": [
        {
          "source_name": "",
          "url": "https://android-developers.googleblog.com/2017/04/an-investigation-of-chrysaor-malware-on.html"
        }
      ]
    },
    {
      "type": "malware",
      "spec_version": "2.1",
      "id": "malware--8c9bcc7d-0484-4067-bc57-30f1036fbac4",
      "created": "2023-06-23T10:46:36.671208Z",
      "modified": "2023-06-23T10:46:36.671208Z",
      "name": "BlackLotus",
      "description": "Cybersecurity researcher Scott Scheferman reported that a new Windows UEFI rootkit, dubbed Black Lotus, is advertised on underground criminal forums.",
      "is_family": true,
      "external_references": [
        {
          "source_name": "",
          "url": "https://kn0s-organization.gitbook.io/blacklotus-analysis-stage2-bootkit-rootkit-stage/"
        }
      ]
    },
    {
      "type": "threat-actor",
      "spec_version": "2.1",
      "id": "threat-actor--68391641-859f-4a9a-9a1e-3e5cf71ec376",
      "created": "2023-06-23T10:46:39.228673Z",
      "modified": "2023-06-23T10:46:39.228673Z",
      "name": "Lazarus Group",
      "description": "Since 2009, HIDDEN COBRA actors have leveraged their capabilities to target and compromise a range of victims; some intrusions have resulted in the exfiltration of data while others have been disruptive in nature. Commercial reporting has referred to this activity as Lazarus Group and Guardians of Peace. Tools and capabilities used by HIDDEN COBRA actors include DDoS botnets, keyloggers, remote access tools (RATs), and wiper malware. Variants of malware and tools used by HIDDEN COBRA actors include Destover, Duuzer, and Hangman.",
      "aliases": [
        "WhoisHacking Team",
        "Lazarus",
        "Bluenoroff",
        "APT 38",
        "OperationTroy",
        "Hidden Cobra",
        "NICKEL GLADSTONE",
        "WhoisHackingTeam"
      ],
      "external_references": [
        {
          "source_name": "",
          "url": "https://threatpost.com/operation-blockbuster-coalition-ties-destructive-attacks-to-lazarus-group/116422/"
        }
      ]
    },
    {
      "type": "attack-pattern",
      "spec_version": "2.1",
      "id": "attack-pattern--d10cbd34-42e3-45c0-84d2-535a09849584",
      "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
      "created": "2020-01-17T16:10:58.592Z",
      "modified": "2022-04-21T16:13:00.598Z",
      "name": "Launch Agent",
      "description": "Adversaries may create or modify launch agents to repeatedly execute malicious payloads as part of persistence. When a user logs in, a per-user launchd process is started which loads the parameters for each launch-on-demand user agent from the property list (.plist) file found in <code>/System/Library/LaunchAgents</code>, <code>/Library/LaunchAgents</code>, and <code>~/Library/LaunchAgents</code>.(Citation: AppleDocs Launch Agent Daemons)(Citation: OSX Keydnap malware) (Citation: Antiquated Mac Malware) Property list files use the <code>Label</code>, <code>ProgramArguments </code>, and <code>RunAtLoad</code> keys to identify the Launch Agent's name, executable location, and execution time.(Citation: OSX.Dok Malware) Launch Agents are often installed to perform updates to programs, launch user specified programs at login, or to conduct other developer tasks.\n\n Launch Agents can also be executed using the [Launchctl](https://attack.mitre.org/techniques/T1569/001) command.\n \nAdversaries may install a new Launch Agent that executes at login by placing a .plist file into the appropriate folders with the <code>RunAtLoad</code> or <code>KeepAlive</code> keys set to <code>true</code>.(Citation: Sofacy Komplex Trojan)(Citation: Methods of Mac Malware Persistence) The Launch Agent name may be disguised by using a name from the related operating system or benign software. Launch Agents are created with user level privileges and execute with user level permissions.(Citation: OSX Malware Detection)(Citation: OceanLotus for OS X) ",
      "kill_chain_phases": [
        {
          "kill_chain_name": "mitre-attack",
          "phase_name": "persistence"
        },
        {
          "kill_chain_name": "mitre-attack",
          "phase_name": "privilege-escalation"
        }
      ],
      "external_references": [
        {
          "source_name": "mitre-attack",
          "url": "https://attack.mitre.org/techniques/T1543/001",
          "external_id": "T1543.001"
        }
      ],
      "object_marking_refs": [
        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
      ],
      "x_mitre_attack_spec_version": "2.1.0",
      "x_mitre_contributors": ["Antonio Piazza, @antman1p"],
      "x_mitre_data_sources": [
        "Command: Command Execution",
        "File: File Creation",
        "File: File Modification",
        "Service: Service Creation",
        "Service: Service Modification"
      ],
      "x_mitre_deprecated": false,
      "x_mitre_detection": "Monitor Launch Agent creation through additional plist files and utilities such as Objective-See’s  KnockKnock application. Launch Agents also require files on disk for persistence which can also be monitored via other file monitoring applications.\n\nEnsure Launch Agent's <code> ProgramArguments </code> key pointing to executables located in the <code>/tmp</code> or <code>/shared</code> folders are in alignment with enterprise policy. Ensure all Launch Agents with the <code>RunAtLoad</code> key set to <code>true</code> are in alignment with policy. ",
      "x_mitre_domains": ["enterprise-attack"],
      "x_mitre_is_subtechnique": true,
      "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
      "x_mitre_permissions_required": ["Administrator", "User"],
      "x_mitre_platforms": ["macOS"],
      "x_mitre_version": "1.4"
    }
  ],
  "id": "bundle--78031701-ea33-4942-a189-aaa93fb3ad2c",
  "type": "bundle"
}

The mapping for this feed is handled by the native ThreatQ STIX 2 parser - see the STIX 2.0 Data Mapping topic for more information. The value of the attribute Modified At is updated at ingestion.

Average Feed Run

Object counts and Feed runtime are supplied as generalities only - objects returned by a provider can differ based on credential configurations and Feed runtime may vary based on system resources and load.

Feedly

The following results were obtained with both Indicators and Vulnerabilities selected as the type of CVE to ingest and both Tags and Attributes selected as the type for keywords to ingest. There may be more or less objects depending on feed.

Metric Result
Run Time < 1 minute
Adversary 1
Attack Pattern 27
Identity 5
Indicators 85
Indicator Attributes 20
Malware 3
Report 13
Report Attributes 69
Vulnerability 6

 

Feedly Threat Intelligence 

Metric Result
Run Time 1 minute
Adversary 100
Adversary Attributes 4188
Attack Pattern 76
Attack Pattern Attributes 1516
Indicators 279
Indicator Attributes 573
Malware 30
Malware Attributes 603
Report 20
Report Attributes 99

Known Issues / Limitations

  • You cannot pull from a Personal Feed.  You can only pull from streams/feeds that are listed under your Team Feeds. 
  • Feedly Cloud servers abuse-prevention systems may return 429 Too many requests for large volumes of data ingested.

Change Log

  • Version 2.0.5
    • Resolved an issue where report descriptions were not being populated if the CVEs were ingested as vulnerabilities.
    • The Ingest CVEs As parameter for both feeds will now only accept one selection: indicators or vulnerabilities.    
  • Version 2.0.4
    • Resolved a feed run issue caused by a missing MITRE Attack Technique identifier.
  • Version 2.0.3
    • Resolved an issue with the Feedly Leo Summary that could cause feed run errors.  
  • Version 2.0.2
    • Added a client parameter, client=theatq.integration, to all API calls made by the integration.  This change was made upon request from the provider.  
    • Updated the default value for the Ingest CVEs As field.  The default value is now set to Vulnerabilities.  
  • Version 2.0.1
    • Resolved an issue where users would encounter an error when reports did not contain a description.  
  • Version 2.0.0
    • Added new feed: Feedly Threat Intelligence.
    • Added improved Description formatting.
    • Updated minimum ThreatQ version to 5.6.0.
  • Version 1.1.0
    • Added Published date to attributes ingested by the feed.
    • Added missing relationships.
    • Updated the default Indicator Status to Review.   
  • Version 1.0.0
    • Initial release

PDF Guides

Document ThreatQ Version
Feedly CDF Guide v2.0.5 5.6.0 or Greater
Feedly CDF Guide v2.0.4 5.6.0 or Greater
Feedly CDF Guide v2.0.3 5.6.0 or Greater
Feedly CDF Guide v2.0.2 5.6.0 or Greater
Feedly CDF Guide v2.0.1 5.6.0 or Greater
Feedly CDF Guide v2.0.0 5.6.0 or Greater
Feedly CDF Guide v1.1.0 4.35.0 or Greater
Feedly CDF Guide v1.0.0 4.35.0 or Greater