Feedly CDF
The web format of this guide reflects the most current release. Guides for older iterations are available in PDF format.
Integration Details
ThreatQuotient provides the following details for this integration:
Current Integration Version | 2.0.5 |
Compatible with ThreatQ Versions | >= 5.6.0 |
Support Tier | ThreatQ Supported |
Introduction
The Feedly integration for ThreatQ allows a user to ingest feeds as reports and related objects from Team feeds on Feedly.
You cannot pull from a Feedly Personal feed.
The CDF includes the following feeds:
- Feedly - ingests reports and other related objects from Feedly.
- Feedly Threat Intelligence - ingests STIX 2.1 threat intelligence Reports from a Feedly stream. This may also include related Indicators, Malware, Adversaries, Attack Patterns, etc.
The integration ingests the following system object types:
|
|
Transcript: TEXT
Footage from ThreatQ Version 4.57.0
Installation
Perform the following steps to install the integration:
The same steps can be used to upgrade the integration to a new version.
- Log into https://marketplace.threatq.com/.
- Locate and download the integration yaml file.
- Navigate to the integrations management page on your ThreatQ instance.
- Click on the Add New Integration button.
- Upload the yaml file using one of the following methods:
- Drag and drop the file into the dialog box
- Select Click to Browse to locate the file on your local machine
ThreatQ will inform you if the feed already exists on the platform and will require user confirmation before proceeding. ThreatQ will also inform you if the new version of the feed contains changes to the user configuration. The new user configurations will overwrite the existing ones for the feed and will require user confirmation before proceeding.
- If prompted, select the individual feeds to install and click Install. The feed will be added to the integrations page.
You will still need to configure and then enable the feed.
Configuration
ThreatQuotient does not issue API keys for third-party vendors. Contact the specific vendor to obtain API keys and other integration-related credentials.
To configure the integration:
- Navigate to your integrations management page in ThreatQ.
- Select the Commercial option from the Category dropdown (optional).
If you are installing the integration for the first time, it will be located under the Disabled tab.
- Click on the integration entry to open its details page.
- Enter the following parameters under the Configuration tab:
Feedly Parameters
Parameter Description Feedly API Token Your Feedly API Token. Feedly API Stream ID Your Feedly Stream ID. Ingest Keywords As Select the type of object Keywords should be ingested as. Options include: - Tags (default)
- Attributes
Ingest CVEs As: Select the type of objects CVEs should be ingested as. Options include: - Indicators
- Vulnerabilities (default)
Feedly Threat Intelligence Parameters
Parameter Description Feedly API Token Your Feedly API Token. Feedly API Stream ID Your Feedly Stream ID. Ingest CVEs As Select the type of objects CVEs should be ingested as. Options include: - Indicators
- Vulnerabilities (default)
Ingest STIX Indicator Patterns as Signaures Enable this option will result in STIX indicators to be ingested as signatures. If disabled, indicator values will be ingested as indicators.
- Review any additional settings, make any changes if needed, and click on Save.
- Click on the toggle switch, located above the Additional Information section, to enable it.
ThreatQ Mapping
Feedly
The Feedly feed ingests CVE's as indicators or vulnerabilities.
GET https://cloud.feedly.com/v3/streams/contents
Sample Response:
{
"continuation": "17eb965fd82:8f60c7:26e2bd2e",
"id": "enterprise/threatquotient/category/4b1e06a8-b4de-4e74-9593-ac879d1d3d23",
"items": [
{
"alternate": [
{
"href": "https://packetstormsecurity.com/files/165814/wpcfct102-xssaccess.txt",
"type": "text/html"
}
],
"canonicalUrl": "https://packetstormsecurity.com/files/165814/wpcfct102-xssaccess.txt",
"categories": [
{
"id": "enterprise/threatquotient/category/4b1e06a8-b4de-4e74-9593-ac879d1d3d23",
"label": "Threat Intel"
}
],
"commonTopics": [
{
"id": "nlp/f/topic/2440",
"label": "Vulnerabilities",
"salienceLevel": "about",
"score": 1.0,
"type": "topic"
},
{
"id": "nlp/f/topic/3003",
"label": "Cyber Security",
"salienceLevel": "about",
"score": 1.0,
"type": "topic"
}
],
"crawled": 1643826412301,
"entities": [
{
"id": "vulnerability/m/entity/CVE-2021-24247",
"label": "CVE-2021-24247",
"mentions": [
{
"text": "CVE-2021-24247"
}
],
"vulnerabilityInfo": {
"cvssScore": 5.4,
"description": "The Contact Form Check Tester WordPress plugin through 1.0.2 settings are visible to all registered users in the dashboard and are lacking any sanitisation. As a result, any registered user, such as subscriber, can leave an XSS payload in the plugin settings, which will be triggered by any user visiting them, and could allow for privilege escalation. The vendor decided to close the plugin.",
"hasExploit": true,
"hasPatch": false
}
},
{
"type": "mitreAttack",
"disambiguated": true,
"id": "nlp/f/entity/gz:mi:x-mitre-tactic-ffd5bcee-6e16-4dd2-8eca-7b3beedf33ca",
"label": "Initial Access (Enterprise TA0001)",
"mentions": [],
"salienceLevel": "mention",
"causes": [
{
"id": "nlp/f/entity/gz:mi:attack-pattern-a62a8db3-f23a-4d8f-afd6-9dbc77e7813b",
"label": "Phishing (Enterprise T1566)"
}
]
}
],
"estimatedCVSS": {
"category": "HIGH"
},
"fingerprint": "b5dfd074",
"fullContent": "<!DOCTYPE html PUBLIC \"-//W3C//DTD HTML 4.0 Transitional//EN\" \"http://www.w3.org/TR/REC-html40/loose.dtd\">\n<html><body><div><div><div id=\"m\">\n \n\n \n \n \n \n <p></p><h1>WordPress Contact Form Check Tester 1.0.2 XSS / Access Control</h1>\n<dl id=\"F165814\"><dt><a href=\"https://packetstormsecurity.com/files/download/165814/wpcfct102-xssaccess.txt\" title=\"Size: 0.7 KB\"><strong>WordPress Contact Form Check Tester 1.0.2 XSS / Access Control</strong></a></dt>\n<dd>Posted <a href=\"https://packetstormsecurity.com/files/date/2022-02-02/\" title=\"16:49:09 UTC\">Feb 2, 2022</a></dd>\n<dd>Authored by <a href=\"https://packetstormsecurity.com/files/author/13412/\">0xB9</a></dd>\n<dd><p>WordPress Contact Form Check Tester plugin version 1.0.2 suffers from broken access control and cross site scripting vulnerabilities.</p></dd>\n<dd><span>tags</span> | <a href=\"https://packetstormsecurity.com/files/tags/exploit\">exploit</a>, <a href=\"https://packetstormsecurity.com/files/tags/vulnerability\">vulnerability</a>, <a href=\"https://packetstormsecurity.com/files/tags/xss\">xss</a></dd>\n<dd><span>advisories</span> | <a href=\"https://packetstormsecurity.com/files/cve/CVE-2021-24247\">CVE-2021-24247</a></dd>\n<dd><span>MD5</span> | <code>6571a974217db95c175bd945e2b0d575</code></dd>\n<dd><a href=\"https://packetstormsecurity.com/files/download/165814/wpcfct102-xssaccess.txt\" title=\"Size: 0.7 KB\" rel=\"nofollow\">Download</a> | <a href=\"https://packetstormsecurity.com/files/favorite/165814/\" rel=\"nofollow\">Favorite</a> | <a href=\"https://packetstormsecurity.com/files/165814/WordPress-Contact-Form-Check-Tester-1.0.2-XSS-Access-Control.html\">View</a></dd>\n</dl><p></p><h1>WordPress Contact Form Check Tester 1.0.2 XSS / Access Control</h1>\n<div>\n\n<pre><code># Exploit Title: WordPress Plugin Contact Form Check Tester 1.0.2 - Broken Access Control<br># Date: 2/28/2021<br># Author: 0xB9<br># Software Link: https://wordpress.org/plugins/contact-fo...ck-tester/<br># Version: 1.0.2<br># Tested on: Windows 10<br># CVE: CVE-2021-24247<br><br>1. Description:<br>The plugin settings are visible to all registered users in the dashboard.<br>A registered user can leave a payload in the plugin settings.<br><br>2. Proof of Concept:<br>- Register an account<br>- Navigate to the dashboard<br>- Go to CF7 Check Tester -> Settings<br>- Add a form<br>- Add a field to the form<br>- Put in a payload in either Field selector or Field value \"><script>alert(1)</script><br>- Save<br>Anyone who visits the settings page will execute the payload.<br><br></code></pre>\n</div>\n \n \n \n </div>\n \n </div></div></body></html>",
"id": "4/bnDLbGIuwgfYUHoNIoHFzwzucR/Wg3zKOf7t/Xc0Q=_17ebbb07b0d:f47321:aa31659c",
"language": "en",
"leoSummary": {
"sentences": [
{
"text": "Palo Alto Networks customers are protected against the types of BEC threats discussed in this blog by products including Cortex XDR and the WildFire, Threat Prevention, AutoFocus and Advanced URL Filtering subscription services for the Next-Generation Firewall .",
"position": 16,
"score": 0.316
}
]
},
"origin": {
"htmlUrl": "https://packetstormsecurity.com/",
"streamId": "feed/http://packetstormsecurity.org/exploits.xml",
"title": "Exploit Files \u2248 Packet Storm"
},
"originId": "https://packetstormsecurity.com/files/165814/wpcfct102-xssaccess.txt",
"published": 1643820549000,
"sources": [
{
"feedlyFeedType": "WebAlert",
"searchTerms": {
"isComplexFilter": false,
"parts": [
{
"id": "nlp/f/publicationBucket/byf:cybersecurity-bundle",
"label": "Cybersecurity"
},
{
"text": "HIGH"
},
{
"id": "nlp/f/entity/wd:13166",
"label": "WordPress"
}
]
},
"streamId": "feed/https://feedly.com/f/alert/704a6215-d181-427e-b1a4-d50032e51968",
"title": "Wordpress Vulns"
}
],
"memes": "Website",
"summary": {
"content": "WordPress Contact Form Check Tester plugin version 1.0.2 suffers from broken access control and cross site scripting vulnerabilities.",
"direction": "ltr"
},
"title": "WordPress Contact Form Check Tester 1.0.2 XSS / Access Control",
"keywords": [
"My Software",
"Update"
],
"unread": true,
"visual": {
"url": "none"
},
"indicatorsOfCompromise": {
"exports": [
{
"type": "markdown",
"url": "https://exports.feedly.com/ioc/8a22cd92ac501da224308d248fd2e226/20220525.222341.all-ioc.md"
}
],
"mentions": [
{
"text": "mail.saadzakhary[.]com:587",
"type": "domain",
"canonical": "mail[.]saadzakhary.com:587"
},
{
"text": "hxxp://192.227.196[.]211/tea_shipping/f_document_shp.doc",
"type": "url",
"canonical": "http://192[.]227.196.211/tea_shipping/f_document_shp.doc"
},
{
"text": "f1794bfabeae40abc925a14f4e9158b92616269ed9bcf9aff95d1c19fa79352e",
"type": "hash",
"canonical": "f1794bfabeae40abc925a14f4e9158b92616269ed9bcf9aff95d1c19fa79352e"
}
]
}
}
],
"updated": 1643836615133
}
ThreatQuotient provides the following default mapping for this feed:
Feed Data Path | ThreatQ Entity | ThreatQ Object Type or Attribute Key | Published Date | Examples | Notes |
---|---|---|---|---|---|
items[].title | Report.Value | N/A | items[].published | WordPress Contact Form Check Tester 1.0.2 XSS / Access Control | N/A |
items[].fullContent | Report.Description | N/A | items[].published | <!DOCTYPE html PUBLIC.... | if fullContent does not exist, content.content is used, if that doesn't exist, summary.content is used. |
items[].keywords | Report.Attribute/Tag | Tag | items[].published | My Software | User chooses whether keywords is ingested as a tag or an attribute |
items[].entities[].causes[] | Report.Attribute | Affected Software | items[].published | Windows 11 | N/A |
items[].origin.title | Report.Attribute | Origin | items[].published | Exploit Files \u2248 Packet Storm | N/A |
items[].canonicalUrl | Report.Attribute | Source URL | items[].published | https://packetstormsecurity.com/ files/165814/wpcfct102-xssaccess.txt |
N/A |
items[].summary.content | Report.Attribute | Feedly Summary | items[].published | WordPress Contact Form Check Tester plugin version 1.0.2 suffers from broken access control and cross site scripting vulnerabilities. | Chosen first over items[].leoSummary |
items[].leoSummary[].sentences[].text | Report.Attribute | Feedly Leo Summary | items[].published | "Palo Alto Networks customers are protected against the..." | Only used if items[].summary doesn't exist |
items[].categories[].label | Report.Attribute | Feedly Category | items[].published | Threat Intel | This attribute is the label of the feed it is associated with |
items[].estimatedCVSS.category | Report.Attribute | Estimated CVSS Severity | items[].published | High | Estimated CVSS severity that Feedly has provided |
items[].commonTopics[].label | Report.Attribute | Topic | items[].published | Cyber Security | Topics that Feedly categorized the item under |
items[].memes | Report.Attribute | Common Subject | items[].published | Website | Topics that Feedly categorized the item under |
items[].entities[].label | Related.Indicator | CVE | items[].published | CVE-2022-0190 | User chooses whether CVE's are ingested as Indicators, Vulnerabilites or both |
items[].entities[].vulnerabilityInfo. cvssScore |
Indicator.Attribute | CVSS Score | items[].published | 5.4 | N/A |
items[].entities[].label | Related.Vulnerability | N/A | items[].published | CVE-2022-0190 | User chooses whether CVE's are ingested as Indicators, Vulnerabilites or both |
items[].indicatorsOfCompromise. mentions[].canonical |
Related.Indicator | FQDN | items[].published | bzone.no-ip.biz | N/A |
items[].indicatorsOfCompromise. mentions[].canonical |
Related.Indicator | URL | items[].published | https://sk5621.com.co | N/A |
items[].indicatorsOfCompromise. mentions[].canonical |
Related.Indicator | Email Address | items[].published | N/A | N/A |
items[].indicatorsOfCompromise. mentions[].canonical |
Related.Indicator | IP Address | items[].published | 45.77.71.50:8082 | N/A |
items[].indicatorsOfCompromise. mentions[].canonical |
Related.Indicator | MD5 | items[].published | 40b428899db353bb0ea 244d95b5b82d9 |
N/A |
items[].indicatorsOfCompromise. mentions[].canonical |
Related.Indicator | SHA-1 | items[].published | N/A | N/A |
items[].indicatorsOfCompromise. mentions[].canonical |
Related.Indicator | SHA-256 | items[].published | 6fcd36052b242bc33e905 77e9a9cf5dc91bc7c5f3ad 587b0d45ab4a7cb7b73b3 |
N/A |
items[].indicatorsOfCompromise. mentions[].canonical |
Related.Indicator | SHA-512 | items[].published | 40b428899db353bb0ea2 44d95b5b82d9 |
N/A |
items[].entities[].label | Related.Attack Pattern | N/A | items[].published | T1187 - Forced Authentication | N/A |
items[].entities[].causes[] | Related.Identity | N/A | items[].published | Microsoft | N/A |
items[].entities[].causes[] | Related.Malware | N/A | items[].published | TrickBot | Includes attribute of affected OS |
items[].entities[].causes[] | Related.Adversary | N/A | items[].published | MuddyWater | N/A |
Feedly Threat Intelligence
The Feedly Threat Intelligence feed will ingest STIX 2.1 threat intelligence Reports from a Feedly stream. This may also include related Indicators, Malware, Adversaries, Attack Patterns, etc.
GET https://cloud.feedly.com/v3/enterprise/ioc
{
"objects": [
{
"type": "report",
"spec_version": "2.1",
"id": "report--8d52f733-6826-4523-aad5-7f84b9f9a4df",
"created": "2023-06-23T14:14:07.147182Z",
"modified": "2023-06-23T14:14:07.147182Z",
"name": "Bluepurple Pulse: week ending June 25th",
"description": "<div>[Redacted]</div>",
"published": "2023-06-23T07:13:58.781Z",
"object_refs": [
"malware--52acea22-7d88-433c-99e6-8fef1657e3ad",
"malware--8c9bcc7d-0484-4067-bc57-30f1036fbac4",
"threat-actor--68391641-859f-4a9a-9a1e-3e5cf71ec376",
"attack-pattern--d10cbd34-42e3-45c0-84d2-535a09849584"
],
"external_references": [
{
"source_name": "Feedly article",
"url": "https://feedly.com/i/entry/T8Gn8hJy9MDXgPPEWPf3eKFiC22pQg9/jkwNHgMRBDU=_188e89acb7d:3ae99fe:cee8d097"
},
{
"source_name": "BinaryFirefly",
"url": "https://bluepurple.binaryfirefly.com/p/bluepurple-pulse-week-ending-june-64e"
}
],
"labels": ["Wordpress Vulns", "Threat Intel"]
},
{
"type": "malware",
"spec_version": "2.1",
"id": "malware--52acea22-7d88-433c-99e6-8fef1657e3ad",
"created": "2023-06-23T10:46:39.001644Z",
"modified": "2023-06-23T10:46:39.001644Z",
"name": "Chrysaor",
"description": "With our partners and with technical support from Amnesty International’s Security Lab, we’ve been investigating the use of the spyware called Pegasus and the Israeli surveillance company, NSO Group, that sells it to foreign governments.",
"is_family": true,
"aliases": ["JigglyPuff", "Pegasus"],
"external_references": [
{
"source_name": "",
"url": "https://android-developers.googleblog.com/2017/04/an-investigation-of-chrysaor-malware-on.html"
}
]
},
{
"type": "malware",
"spec_version": "2.1",
"id": "malware--8c9bcc7d-0484-4067-bc57-30f1036fbac4",
"created": "2023-06-23T10:46:36.671208Z",
"modified": "2023-06-23T10:46:36.671208Z",
"name": "BlackLotus",
"description": "Cybersecurity researcher Scott Scheferman reported that a new Windows UEFI rootkit, dubbed Black Lotus, is advertised on underground criminal forums.",
"is_family": true,
"external_references": [
{
"source_name": "",
"url": "https://kn0s-organization.gitbook.io/blacklotus-analysis-stage2-bootkit-rootkit-stage/"
}
]
},
{
"type": "threat-actor",
"spec_version": "2.1",
"id": "threat-actor--68391641-859f-4a9a-9a1e-3e5cf71ec376",
"created": "2023-06-23T10:46:39.228673Z",
"modified": "2023-06-23T10:46:39.228673Z",
"name": "Lazarus Group",
"description": "Since 2009, HIDDEN COBRA actors have leveraged their capabilities to target and compromise a range of victims; some intrusions have resulted in the exfiltration of data while others have been disruptive in nature. Commercial reporting has referred to this activity as Lazarus Group and Guardians of Peace. Tools and capabilities used by HIDDEN COBRA actors include DDoS botnets, keyloggers, remote access tools (RATs), and wiper malware. Variants of malware and tools used by HIDDEN COBRA actors include Destover, Duuzer, and Hangman.",
"aliases": [
"WhoisHacking Team",
"Lazarus",
"Bluenoroff",
"APT 38",
"OperationTroy",
"Hidden Cobra",
"NICKEL GLADSTONE",
"WhoisHackingTeam"
],
"external_references": [
{
"source_name": "",
"url": "https://threatpost.com/operation-blockbuster-coalition-ties-destructive-attacks-to-lazarus-group/116422/"
}
]
},
{
"type": "attack-pattern",
"spec_version": "2.1",
"id": "attack-pattern--d10cbd34-42e3-45c0-84d2-535a09849584",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"created": "2020-01-17T16:10:58.592Z",
"modified": "2022-04-21T16:13:00.598Z",
"name": "Launch Agent",
"description": "Adversaries may create or modify launch agents to repeatedly execute malicious payloads as part of persistence. When a user logs in, a per-user launchd process is started which loads the parameters for each launch-on-demand user agent from the property list (.plist) file found in <code>/System/Library/LaunchAgents</code>, <code>/Library/LaunchAgents</code>, and <code>~/Library/LaunchAgents</code>.(Citation: AppleDocs Launch Agent Daemons)(Citation: OSX Keydnap malware) (Citation: Antiquated Mac Malware) Property list files use the <code>Label</code>, <code>ProgramArguments </code>, and <code>RunAtLoad</code> keys to identify the Launch Agent's name, executable location, and execution time.(Citation: OSX.Dok Malware) Launch Agents are often installed to perform updates to programs, launch user specified programs at login, or to conduct other developer tasks.\n\n Launch Agents can also be executed using the [Launchctl](https://attack.mitre.org/techniques/T1569/001) command.\n \nAdversaries may install a new Launch Agent that executes at login by placing a .plist file into the appropriate folders with the <code>RunAtLoad</code> or <code>KeepAlive</code> keys set to <code>true</code>.(Citation: Sofacy Komplex Trojan)(Citation: Methods of Mac Malware Persistence) The Launch Agent name may be disguised by using a name from the related operating system or benign software. Launch Agents are created with user level privileges and execute with user level permissions.(Citation: OSX Malware Detection)(Citation: OceanLotus for OS X) ",
"kill_chain_phases": [
{
"kill_chain_name": "mitre-attack",
"phase_name": "persistence"
},
{
"kill_chain_name": "mitre-attack",
"phase_name": "privilege-escalation"
}
],
"external_references": [
{
"source_name": "mitre-attack",
"url": "https://attack.mitre.org/techniques/T1543/001",
"external_id": "T1543.001"
}
],
"object_marking_refs": [
"marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
],
"x_mitre_attack_spec_version": "2.1.0",
"x_mitre_contributors": ["Antonio Piazza, @antman1p"],
"x_mitre_data_sources": [
"Command: Command Execution",
"File: File Creation",
"File: File Modification",
"Service: Service Creation",
"Service: Service Modification"
],
"x_mitre_deprecated": false,
"x_mitre_detection": "Monitor Launch Agent creation through additional plist files and utilities such as Objective-See’s KnockKnock application. Launch Agents also require files on disk for persistence which can also be monitored via other file monitoring applications.\n\nEnsure Launch Agent's <code> ProgramArguments </code> key pointing to executables located in the <code>/tmp</code> or <code>/shared</code> folders are in alignment with enterprise policy. Ensure all Launch Agents with the <code>RunAtLoad</code> key set to <code>true</code> are in alignment with policy. ",
"x_mitre_domains": ["enterprise-attack"],
"x_mitre_is_subtechnique": true,
"x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"x_mitre_permissions_required": ["Administrator", "User"],
"x_mitre_platforms": ["macOS"],
"x_mitre_version": "1.4"
}
],
"id": "bundle--78031701-ea33-4942-a189-aaa93fb3ad2c",
"type": "bundle"
}
The mapping for this feed is handled by the native ThreatQ STIX 2 parser - see the STIX 2.0 Data Mapping topic for more information. The value of the attribute Modified At
is updated at ingestion.
Average Feed Run
Object counts and Feed runtime are supplied as generalities only - objects returned by a provider can differ based on credential configurations and Feed runtime may vary based on system resources and load.
Feedly
The following results were obtained with both Indicators and Vulnerabilities selected as the type of CVE to ingest and both Tags and Attributes selected as the type for keywords to ingest. There may be more or less objects depending on feed.
Metric | Result |
---|---|
Run Time | < 1 minute |
Adversary | 1 |
Attack Pattern | 27 |
Identity | 5 |
Indicators | 85 |
Indicator Attributes | 20 |
Malware | 3 |
Report | 13 |
Report Attributes | 69 |
Vulnerability | 6 |
Feedly Threat Intelligence
Metric | Result |
---|---|
Run Time | 1 minute |
Adversary | 100 |
Adversary Attributes | 4188 |
Attack Pattern | 76 |
Attack Pattern Attributes | 1516 |
Indicators | 279 |
Indicator Attributes | 573 |
Malware | 30 |
Malware Attributes | 603 |
Report | 20 |
Report Attributes | 99 |
Known Issues / Limitations
- You cannot pull from a Personal Feed. You can only pull from streams/feeds that are listed under your Team Feeds.
- Feedly Cloud servers abuse-prevention systems may return
429 Too many requests
for large volumes of data ingested.
Change Log
- Version 2.0.5
- Resolved an issue where report descriptions were not being populated if the CVEs were ingested as vulnerabilities.
- The Ingest CVEs As parameter for both feeds will now only accept one selection: indicators or vulnerabilities.
- Version 2.0.4
- Resolved a feed run issue caused by a missing MITRE Attack Technique identifier.
- Version 2.0.3
- Resolved an issue with the
Feedly Leo Summary
that could cause feed run errors.
- Resolved an issue with the
- Version 2.0.2
- Added a client parameter,
client=theatq.integration
, to all API calls made by the integration. This change was made upon request from the provider. - Updated the default value for the Ingest CVEs As field. The default value is now set to Vulnerabilities.
- Added a client parameter,
- Version 2.0.1
- Resolved an issue where users would encounter an error when reports did not contain a description.
- Version 2.0.0
- Added new feed: Feedly Threat Intelligence.
- Added improved Description formatting.
- Updated minimum ThreatQ version to 5.6.0.
- Version 1.1.0
- Added Published date to attributes ingested by the feed.
- Added missing relationships.
- Updated the default Indicator Status to Review.
- Version 1.0.0
- Initial release
PDF Guides
Document | ThreatQ Version |
---|---|
Feedly CDF Guide v2.0.5 | 5.6.0 or Greater |
Feedly CDF Guide v2.0.4 | 5.6.0 or Greater |
Feedly CDF Guide v2.0.3 | 5.6.0 or Greater |
Feedly CDF Guide v2.0.2 | 5.6.0 or Greater |
Feedly CDF Guide v2.0.1 | 5.6.0 or Greater |
Feedly CDF Guide v2.0.0 | 5.6.0 or Greater |
Feedly CDF Guide v1.1.0 | 4.35.0 or Greater |
Feedly CDF Guide v1.0.0 | 4.35.0 or Greater |