Google Chronicle Detection CDF
The web format of this guide reflects the most current release. Guides for older iterations are available in PDF format.
Integration Details
ThreatQuotient provides the following details for this integration:
Current Integration Version | 1.0.0 |
Compatible with ThreatQ Versions | >= 6.0.1 |
Support Tier | ThreatQ Supported |
Introduction
The Google Chronicle Detections CDF for ThreatQ enables the automatic ingestion of detections into the ThreatQ platform in the form of Events. The integration allows you to ingest all of your detections and automatically extract indicators such as IP addresses, domains, and URLs from the detection events and entities. You can also submit via specifying a list of rule IDs.
The integration provides the following feed:
- Google Chronicle Detections - ingests Google Chronicle Detections in the form of ThreatQ events.
The integration ingests the following system objects:
- Assets
- Events
- Indicators
Prerequisites
The following is required in order to utilize this integration:
- A Google Chronicle Service Account (Non-Ingestion API) JSON is required for this integration. This service account configuration should be for use with the Ingestion API. If you do not have this JSON file, contact your Google Chronicle representative to obtain one.
Installation
Perform the following steps to install the integration:
The same steps can be used to upgrade the integration to a new version.
- Log into https://marketplace.threatq.com/.
- Locate and download the integration yaml file.
- Navigate to the integrations management page on your ThreatQ instance.
- Click on the Add New Integration button.
- Upload the integration yaml file using one of the following methods:
- Drag and drop the file into the dialog box
- Select Click to Browse to locate the file on your local machine
- Select the individual feeds to install, when prompted and click Install.
ThreatQ will inform you if the feed already exists on the platform and will require user confirmation before proceeding. ThreatQ will also inform you if the new version of the feed contains changes to the user configuration. The new user configurations will overwrite the existing ones for the feed and will require user confirmation before proceeding.
The feed(s) will be added to the integrations page. You will still need to configure and then enable the feed.
Configuration
ThreatQuotient does not issue API keys for third-party vendors. Contact the specific vendor to obtain API keys and other integration-related credentials.
To configure the integration:
- Navigate to your integrations management page in ThreatQ.
- Select the Commercial option from the Category dropdown (optional).
If you are installing the integration for the first time, it will be located under the Disabled tab.
- Click on the integration entry to open its details page.
- Enter the following parameters under the Configuration tab:
Parameter Description Chronicle API Region Select which API region to connect to when communicating with Google Chronicle. Options include: - USA - malachiteingestion-pa.googleapis.com
- Europe - europe-malachiteingestion-pa.googleapis.com
- London - europe-west2-malachiteingestion-pa.googleapis.com
- Singapore - asia-southeast1-malachiteingestion-pa.googleapis.com
Dedicated API Hostname Optional - Enter you dedicated API region endpoint if you have one. This field will override your selection for the Chronicle API region field. Service Account JSON Copy and paste your Google Chronicle Service Account's JSON here. This is given to you by your Google Chronicle representative and allows access to the Non-Ingestion API (Backstory API). Detection Rule IDs Enter a line-separated list of Rule IDs to pull detections for. If left blank, all detections from all rules will be pulled. Ingest Related Assets Enable this option to ingest assets related to events. Event Context Filter Select the pieces of enrichment context to ingest into ThreatQ for an event. Options include: - Detection Rule Labels (default)
- Detection Outcomes (default)
- Rule Name (default)
- Rule Type (default)
- Chronicle Link (default)
- Alert State (default)
- Detection Time (default)
- Detection Type (default)
- Detection ID (default)
Related IoCs Filter Select which related IoCs should be ingested into ThreatQ. Options include: - MD5 (default)
- SHA-1 (default)
- SHA256 (default)
- Email Address (default)
- FQDN (default)
- IP Address/ IPv6 Address
- MAC Address (default)
- Filename (default)
- File Path (default)
- Registry Key (default)
- URL (default)
Disable Proxies Enable this option if the action should not honor proxies set in the ThreatQ UI.
- Review any additional settings, make any changes if needed, and click on Save.
- Click on the toggle switch, located above the Additional Information section, to enable it.
ThreatQ Mapping
Google Chronicle Detections
The Google Chronicle Detections feed ingests Google Chronicle Detections as ThreatQ events and will automatically extract indicators such as IP addresses, domains, and URLs from the detection events & entities.
GET https://{REGION}/v2/detect/rules/-/detections
Sample Parameters:
{
"start_time": "2024-07-01T00:00:00Z",
"end_time": "2024-08-01T00:00:00Z",
"page_size": 1000
}
Sample Response:
{
"detections": [
{
"collectionElements": [
{
"label": "e",
"references": [
{
"event": {
"about": [
{
"asset": {
"hostname": "host1.dummy.threatq.com",
"ip": [
"192.168.50.12"
],
"category": "Workstation",
"networkDomain": "dummy.threatq.com",
"type": "WORKSTATION",
"deploymentStatus": "deployed",
"location": {
"city": "New York",
"countryOrRegion": "USA",
"name": "New York City",
"state": "NY"
},
"platformSoftware": {
"platform": "Linux"
},
"vulnerabilities": [
{
"cveId": "CVE-2004-0230"
}
]
},
"file": {
"md5": "72fe869aa394ef0a62bb8324857770dd"
}
}
],
"src": {
"hostname": "vetfashion.xyz",
"user": {
"emailAddresses": "fashion@vet.com"
},
"mac": [
"00:b0:d0:c2:26"
],
"registry": {
"registryKey": "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Uninstall\\Google Chrome"
},
"domain": {
"name": "vetfashion.xyz",
"registrar": "Fashion",
"nameServer": "Fashion US",
"firstSeenTime": "2023-07-23T11:42:00Z",
"contactEmail": "fashion@vet.com"
},
"url": "https://vetfashion.xyz/css/10/admin/index.php",
"file": {
"sha1": "9a301f2a0259bdedb85e2ea4c071534776d471ab",
"md5": "72fe869aa394ef0a62bb8324857770bb",
"sha256": "1ff597e8bd590896c17d856188d1f0950a5a4cf4e7d2c0b40a6c1eb95c9586cc",
"names": "eicar.exe",
"fullPath": "/root/eicar.exe",
"fileType": "exe",
"mimeType": "application/octet",
"capabilitiesTags": [
"t1",
"t2"
]
},
"process": {
"file": {
"fileType": "cmd",
"mimeType": "application/octet",
"sha1": "9a301f2a0259bdedb85e2ea4c071534776d47aaa",
"md5": "72fe869aa394ef0a62bb8324857770dd",
"sha256": "1ff597e8bd590896c17d856188d1f0950a5a4cf4e7d2c0b40a6c1eb95c9586b3",
"names": "eicar_cmd",
"fullPath": "/root/eicar_cmd.exe",
"capabilitiesTags": [
"t1"
]
}
}
},
"target": {
"ip": [
"1.2.3.4",
"dbc3:d974:24f4:bee8:5a27:135f:31c9:b133"
]
},
"metadata": {
"baseLabels": {
"allowScopedAccess": true,
"logTypes": [
"UDM"
]
},
"collectedTimestamp": "2024-07-23T11:41:10Z",
"eventTimestamp": "2024-07-23T11:41:10Z",
"eventType": "GENERIC_EVENT",
"id": "AAAAAPWwZKCHDTZ+APe+vncmzmMAAAAAFAAAAAEAAAA=",
"ingestedTimestamp": "2024-07-23T11:41:10.756162Z",
"logType": "UDM",
"productName": "ThreatQ",
"vendorName": "ThreatQuotient"
},
"securityResult": [
{
"about": {
"asset": {
"hostname": "dummy.hostbc69ddcd6febc4e74f4f49b699ff0f1e61ccb1a5"
},
"file": {
"md5": "72fe869aa394ef0a62bb8324857770dd"
}
},
"alertState": "NOT_ALERTING",
"category": [
"SOFTWARE_MALICIOUS"
],
"categoryDetails": [
""
],
"confidence": "HIGH_CONFIDENCE",
"priority": "MEDIUM_PRIORITY",
"severity": "LOW",
"threatFeedName": "Bank",
"threatStatus": "ACTIVE",
"urlBackToProduct": "https://crinela.sandbox.threatq.online/indicators/1400022/details"
}
]
},
"id": {
"id": "NTY3YWY5ZjJjOGU4N2QwOGNlMmYwOWI3YWIxZmM4NTA="
}
}
]
},
{
"label": "ioc",
"references": [
{
"entity": {
"entity": {
"ip": [
"148.72.164.179"
]
},
"metadata": {
"collectedTimestamp": "2024-07-02T08:40:32Z",
"entityType": "IP_ADDRESS",
"eventMetadata": {
"baseLabels": {
"allowScopedAccess": true,
"logTypes": [
"UDM"
]
},
"id": "AAAAANSfEX62Vhg/yyXXbtHoRo8AAAAABwAAAAIAAAA="
},
"interval": {
"endTime": "2024-07-24T00:00:00Z",
"startTime": "2024-07-23T11:30:05Z"
},
"productName": "ThreatQ",
"sourceLabels": [
{
"key": "threat_source",
"value": "BankInfo Security"
},
{
"key": "threat_source",
"value": "AhnLab Security Emergency Response Center"
}
],
"sourceType": "ENTITY_CONTEXT",
"threat": [
{
"about": {
"ip": [
"148.72.164.179"
],
"user": {
"emailAddresses": "fashion2@vet.com"
},
"mac": [
"00:b0:d0:c2:33"
],
"registry": {
"registryKey": "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Install\\Google Chrome"
},
"domain": {
"name": "vetfashion.abc",
"registrar": "ThreatQ2",
"nameServer": "ThreatQ2 US",
"firstSeenTime": "2024-07-23T11:42:00Z",
"contactEmail": "fashion2@vet.com"
},
"url": "https://vetfashion.abc/css/10/admin/index.php",
"file": {
"sha1": "9a301f2a0259bdedb85e2ea4c071534776d47111",
"md5": "72fe869aa394ef0a62bb832485777011",
"sha256": "1ff597e8bd590896c17d856188d1f0950a5a4cf4e7d2c0b40a6c1eb95c958611",
"names": "eicar2.exe",
"fullPath": "/root/eicar2.exe",
"fileType": "exe",
"mimeType": "application/octet",
"capabilitiesTags": [
"a1",
"a2"
]
},
"process": {
"file": {
"sha1": "9a301f2a0259bdedb85e2ea4c071534776d47a22",
"md5": "72fe869aa394ef0a62bb83248577702",
"sha256": "1ff597e8bd590896c17d856188d1f0950a5a4cf4e7d2c0b40a6c1eb95c958622",
"names": "eicar_cmd2",
"fullPath": "/root/eicar_cmd2.exe"
}
}
},
"alertState": "NOT_ALERTING",
"category": [
"NETWORK_MALICIOUS"
],
"categoryDetails": [
"test"
],
"confidence": "HIGH_CONFIDENCE",
"priority": "MEDIUM_PRIORITY",
"severity": "LOW",
"threatFeedName": "Bank",
"threatStatus": "ACTIVE",
"threatName": "redline",
"urlBackToProduct": "https://threatq.online/indicators/1400021/details"
}
],
"vendorName": "ThreatQuotient"
}
},
"id": {
"id": "MTNjZjY3NDc2NzJiOTQ1Mzk0MTk3ZjE1OWQ2MTNmMWM="
}
}
]
}
],
"createdTime": "2024-07-23T17:58:53.063066Z",
"detection": [
{
"alertState": "NOT_ALERTING",
"description": "Match ThreatQ IOCs against incoming events",
"detectionFields": [
{
"key": "ip",
"source": "udm.about.ip",
"value": "148.72.164.179"
}
],
"riskScore": 15,
"ruleId": "ru_a76085f0-31a3-4601-9fed-f4bf30657c0f",
"ruleLabels": [
{
"key": "author",
"value": "ThreatQuotient"
},
{
"key": "description",
"value": "Match ThreatQ IOCs against incoming events"
},
{
"key": "severity",
"value": "HIGH"
},
{
"key": "priority",
"value": "MEDIUM_PRIORITY"
}
],
"ruleName": "threatq_ioc_match_ips",
"ruleType": "MULTI_EVENT",
"ruleVersion": "ru_a76085f0-31a3-4601-9fed-f4bf30657c0f@v_1679587313_251503000",
"urlBackToProduct": "https://nfr-thrtq.backstory.chronicle.security/ruleDetections?ruleId=ru_a76085f0-31a3-4601-9fed-f4bf30657c0fselectedList=RuleDetectionsViewTimelineselectedDetectionId=de_93a232f7-0d01-54a7-ec7a-9db433044c5cselectedTimestamp=2024-07-23T11:42:00ZversionTimestamp=2023-03-23T16:01:53.251503Z",
"variables": {
"ip": {
"sourcePath": "udm.about.ip",
"stringVal": "148.72.164.179",
"type": "MATCH",
"value": "148.72.164.179"
}
},
"outcomes": [
{
"key": "risk_score",
"value": "1"
},
{
"key": "priority",
"value": "MEDIUM_PRIORITY"
},
{
"key": "severity",
"value": "LOW"
},
{
"key": "asset_id_count"
}
]
}
],
"detectionTime": "2024-07-23T11:42:00Z",
"id": "de_93a232f7-0d01-54a7-ec7a-9db433044c5c",
"timeWindow": {
"endTime": "2024-07-23T11:42:00Z",
"startTime": "2024-07-23T11:27:00Z"
},
"type": "RULE_DETECTION"
}
]
}
ThreatQuotient provides the following default mapping based on each item with the .detections
list.
Feed Data Path | ThreatQ Entity | ThreatQ Object Type or Attribute Key | Published Date | Examples | Notes |
---|---|---|---|---|---|
.detection[].ruleName |
Event.Title | Detection | .createdTime |
threatq_ioc_match_ips |
Only the first entry in detections[] that has a value for ruleName is used. |
.detection[0].detection |
Event.Title | Detection | .createdTime |
ip: 148.72.164.179 |
Fields .key and .value are concatenated. |
.detection[0].outcomes |
Event.Title | Detection | .createdTime |
Risk Score: 1 |
If .key equals 'risk_score'. |
.detection[0].ruleLabels |
Event.Title | Detection | .createdTime |
MEDIUM_PRIORITY |
If .key equals 'priority'. |
.detection[0].ruleLabels |
Event.Title | Detection | .createdTime |
LOW_SEVERITY |
If .key equals 'severity'. _SEVERITY appended. |
.detection[].ruleType |
Event.Title | Detection | .createdTime |
MULTI_EVENT |
Only the first entry in detections[] that has a value for ruleType is used. |
.detection[].alertState |
Event.Title | Detection | .createdTime |
NOT_ALERTING |
Only the first entry in detections[] that has a value for alertState is used. |
.detectionTime |
Event.Happened_At | Detection | N/A | 2024-07-23T11:42:00Z |
N/A |
.collectionElements |
Event.Description | Detection | N/A | N/A | Added as JSON to the description. |
.detection[].ruleLabels[] |
Event.Attribute | .detection[].ruleLabels[].key |
.createdTime |
N/A | The attribute name has title case and _ is replaced by . Key Severity is replaced with Rule Severity .If enabled in configuration. |
.detection[].outcomes[] |
Event.Attribute | .detection[].outcomes[].key |
.createdTime |
N/A | The attribute name has title case and _ is replaced by . Key Risk Score is replaced with Rule Risk Score . If enabled in configuration. |
.detection[].ruleName |
Event.Attribute | Rule Name | .createdTime |
threatq_ioc_match_ips |
If enabled in configuration. |
.detection[].urlBackTo |
Event.Attribute | Chronicle Link | .createdTime |
https://nfr-thrtq.backstory.chronicle... |
If enabled in configuration. |
.detection[].alertState |
Event.Attribute | Alert State | .createdTime |
NOT_ALERTING |
Updated at ingestion. If enabled in configuration. |
.detection[].ruleType |
Event.Attribute | Rule Type | .createdTime |
MULTI_EVENT |
If enabled in configuration. |
.type |
Event.Attribute | Detection Type | .createdTime |
RULE_DETECTION |
If enabled in configuration. |
.detectionTime |
Event.Attribute | Detection Time | .createdTime |
2024-07-23T11:42:00Z |
Updated at ingestion. If enabled in configuration. |
.id |
Event.Attribute | Detection ID | .createdTime |
de_93a232f7-0d01-54a7-ec7a-9db433044c5c |
If enabled in configuration. |
.collectionElements[]. |
Event.Related Indicator.Value | Email Address | N/A | fashion@vet.com |
If enabled in configuration. |
.collectionElements[]. |
Event.Related Indicator.Value | FQDN | N/A | vetfashion.xyz |
If enabled in configuration. |
.collectionElements[]. |
Event.Related Indicator.Value | Mac Address | N/A | 00:b0:d0:c2:26 |
If enabled in configuration. |
.collectionElements[]. |
Event.Related Indicator.Value | MD5 | N/A | 72fe869aa394ef0a62bb8324857770dd |
If enabled in configuration. |
.collectionElements[]. |
Event.Related Indicator.Value | SHA-1 | N/A | 9a301f2a0259bdedb85e2ea4c071534776d47aaa |
If enabled in configuration. |
.collectionElements[].references[].event.src/target.process.file.sha256 |
Event.Related Indicator.Value | SHA-256 | N/A | 1ff597e8bd590896c17d856188d1f0950a5a4cf4e7d2c0b40a6c1eb95c9586cc |
If enabled in configuration. |
.collectionElements[].references[].event.src/target.process.file.names |
Event.Related Indicator.Value | Filename | N/A | eicar_cmd |
If enabled in configuration. |
.collectionElements[].references[].event.src/target.process.file.fullPath |
Event.Related Indicator.Value | File Path | N/A | /root/eicar_cmd.exe |
If enabled in configuration. |
.collectionElements[].references[].event.src/target.process.file.fileType |
Event.Related Indicator.Attribute | File Type | N/A | cmd |
N/A |
.collectionElements[].references[].event.src/target.process.file.mimeType |
Event.Related Indicator.Attribute | MIME Type | N/A | application/octet |
N/A |
.collectionElements[].references[].event.src/target.process.file.capabilitiesTags |
Event.Related Indicator.Attribute | Capabilities Tag | N/A | t1 |
N/A |
.collectionElements[].references[].event.src/target.file.md5 |
Event.Related Indicator.Value | MD5 | N/A | 72fe869aa394ef0a62bb8324857770bb |
If enabled in configuration. |
.collectionElements[].references[].event.src/target.file.sha1 |
Event.Related Indicator.Value | SHA-1 | N/A | 9a301f2a0259bdedb85e2ea4c071534776d471ab |
If enabled in configuration. |
.collectionElements[].references[].event.src/target.file.sha256 |
Event.Related Indicator.Value | SHA-256 | N/A | 1ff597e8bd590896c17d856188d1f0950a5a4cf4e7d2c0b40a6c1eb95c9586cc |
If enabled in configuration. |
.collectionElements[].references[].event.src/target.file.names |
Event.Related Indicator.Value | Filename | N/A | eicar |
If enabled in configuration. |
.collectionElements[].references[].event.src/target.file.fullPath |
Event.Related Indicator.Value | File Path | N/A | /root/eicar.exe |
If enabled in configuration. |
.collectionElements[].references[].event.src/target.file.fileType |
Event.Related Indicator.Attribute | File Type | N/A | exe |
N/A |
.collectionElements[].references[].event.src/target.file.mimeType |
Event.Related Indicator.Attribute | MIME Type | N/A | application/octet |
N/A |
.collectionElements[].references[].event.src/target.file.capabilitiesTags |
Event.Related Indicator.Attribute | Capabilities Tag | N/A | t1 |
N/A |
.collectionElements[].references[].event.src/target.registry.registryKey |
Event.Related Indicator.Value | Registry Key | N/A | HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft... |
If enabled in configuration. |
.collectionElements[].references[].event.src/target.url |
Event.Related Indicator.Value | URL | N/A | https://vetfashion.xyz/css/10/admin/index.php |
If enabled in configuration. |
.collectionElements[].references[].event.src/target.domain.name |
Event.Related Indicator.Value | FQDN | N/A | vetfashion.xyz |
If enabled in configuration. |
.collectionElements[].references[].event.src/target.domain.registrar |
Event.Related Indicator.Attribute | Registrar | N/A | Fashion |
N/A |
.collectionElements[].references[].event.src/target.domain.nameServer |
Event.Related Indicator.Attribute | Nameserver | N/A | Fashion US |
N/A |
.collectionElements[].references[].event.src/target.domain.firstSeenTime |
Event.Related Indicator.Attribute | First Seen | N/A | 2023-07-23T11:42:00Z |
Updated at ingestion. |
.collectionElements[].references[].event.src/target.domain.contactEmail |
Event.Related Indicator.Attribute | Contact Email | N/A | fashion@vet.com |
N/A |
.collectionElements[].references[].event.src/target.ip |
Event.Related Indicator.Value | IP Address/IPv6 Address | N/A | 1.2.3.4 |
If enabled in configuration. |
.collectionElements[].references[].entity.metadata.threat[].about.user.emailAddresses |
Event.Related Indicator.Value | Email Address | N/A | fashion2@vet.com |
If enabled in configuration. |
.collectionElements[].references[].entity.metadata.threat[].about.hostname |
Event.Related Indicator.Value | FQDN | N/A | vetfashion.xyz |
If enabled in configuration. |
.collectionElements[].references[].entity.metadata.threat[].about.mac |
Event.Related Indicator.Value | Mac Address | N/A | 00:b0:d0:c2:33 |
If enabled in configuration. |
.collectionElements[].references[].entity.metadata.threat[].about.process.file.md5 |
Event.Related Indicator.Value | MD5 | N/A | 72fe869aa394ef0a62bb832485777011 |
If enabled in configuration. |
.collectionElements[].references[].entity.metadata.threat[].about.process.file.sha1 |
Event.Related Indicator.Value | SHA-1 | N/A | 9a301f2a0259bdedb85e2ea4c071534776d47aaa |
If enabled in configuration. |
.collectionElements[].references[].entity.metadata.threat[].about.process.file.sha256 |
Event.Related Indicator.Value | SHA-256 | N/A | 1ff597e8bd590896c17d856188d1f0950a5a4cf4e7d2c0b40a6c1eb95c9586cc |
If enabled in configuration. |
.collectionElements[].references[].entity.metadata.threat[].about.process.file.names |
Event.Related Indicator.Value | Filename | N/A | eicar_cmd2 |
If enabled in configuration. |
.collectionElements[].references[].entity.metadata.threat[].about.process.file.fullPath |
Event.Related Indicator.Value | File Path | N/A | /root/eicar_cmd2.exe |
If enabled in configuration. |
.collectionElements[].references[].entity.metadata.threat[].about.process.file.fileType |
Event.Related Indicator.Attribute | File Type | N/A | cmd |
N/A |
.collectionElements[].references[].entity.metadata.threat[].about.process.file.mimeType |
Event.Related Indicator.Attribute | MIME Type | N/A | application/octet |
N/A |
.collectionElements[].references[].entity.metadata.threat[].about.process.file.capabilitiesTags |
Event.Related Indicator.Attribute | Capabilities Tag | N/A | A1 |
N/A |
.collectionElements[].references[].entity.metadata.threat[].about.file.md5 |
Event.Related Indicator.Value | MD5 | N/A | 72fe869aa394ef0a62bb8324857770bb |
If enabled in configuration. |
.collectionElements[].references[].entity.metadata.threat[].about.file.sha1 |
Event.Related Indicator.Value | SHA-1 | N/A | 9a301f2a0259bdedb85e2ea4c071534776d471ab |
If enabled in configuration. |
.collectionElements[].references[].entity.metadata.threat[].about.file.sha256 |
Event.Related Indicator.Value | SHA-256 | N/A | 1ff597e8bd590896c17d856188d1f0950a5a4cf4e7d2c0b40a6c1eb95c9586cc |
If enabled in configuration. |
.collectionElements[].references[].entity.metadata.threat[].about.file.names |
Event.Related Indicator.Value | Filename | N/A | eicar2 |
If enabled in configuration. |
.collectionElements[].references[].entity.metadata.threat[].about.file.fullPath |
Event.Related Indicator.Value | File Path | N/A | /root/eicar2.exe |
If enabled in configuration. |
.collectionElements[].references[].entity.metadata.threat[].about.file.fileType |
Event.Related Indicator.Attribute | File Type | N/A | exe |
N/A |
.collectionElements[].references[].entity.metadata.threat[].about.file.mimeType |
Event.Related Indicator.Attribute | MIME Type | N/A | application/octet |
N/A |
.collectionElements[].references[].entity.metadata.threat[].about.file.capabilitiesTags |
Event.Related Indicator.Attribute | Capabilities Tag | N/A | a1 |
N/A |
.collectionElements[].references[].entity.metadata.threat[].about.registry.registryKey |
Event.Related Indicator.Value | Registry Key | N/A | HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft... |
If enabled in configuration. |
.collectionElements[].references[].entity.metadata.threat[].about.url |
Event.Related Indicator.Value | URL | N/A | https://vetfashion.xyz/css/10/admin/index.php |
If enabled in configuration. |
.collectionElements[].references[].entity.metadata.threat[].about.domain.name |
Event.Related Indicator.Value | FQDN | N/A | vetfashion.xyz |
If enabled in configuration. |
.collectionElements[].references[].entity.metadata.threat[].about.domain.registrar |
Event.Related Indicator.Attribute | Registrar | N/A | Fashion |
N/A |
.collectionElements[].references[].entity.metadata.threat[].about.domain.nameServer |
Event.Related Indicator.Attribute | Nameserver | N/A | Fashion US |
N/A |
.collectionElements[].references[].entity.metadata.threat[].about.domain.firstSeenTime |
Event.Related Indicator.Attribute | First Seen | N/A | 2023-07-23T11:42:00Z |
Updated at ingestion. |
.collectionElements[].references[].entity.metadata.threat[].about.domain.contactEmail |
Event.Related Indicator.Attribute | Contact Email | N/A | fashion2@vet.com |
N/A |
.collectionElements[].references[].entity.metadata.threat[].about.ip |
Event.Related Indicator.Value | IP Address/IPv6 Address | N/A | 148.72.164.179 |
If enabled in configuration. |
.collectionElements[].references[].entity.metadata.threat[].category |
Event.Related Indicator.Attribute | Category | N/A | NETWORK_MALICIOUS |
N/A |
.collectionElements[].references[].entity.metadata.threat[].categoryDetails |
Event.Related Indicator.Attribute | Category Detail | N/A | test |
N/A |
.collectionElements[].references[].entity.metadata.threat[].threatName |
Event.Related Indicator.Attribute | Threat Name | N/A | redline |
N/A |
.collectionElements[].references[].entity.metadata.threat[].severity |
Event.Related Indicator.Attribute | Severity | N/A | LOW |
Updated at ingestion |
.collectionElements[].references[].entity.metadata.threat[].confidence |
Event.Related Indicator.Attribute | Confidence | N/A | HIGH_CONFIDENCE |
Updated at ingestion |
.collectionElements[].references[].entity.metadata.threat[].priority |
Event.Related Indicator.Attribute | Priority | N/A | MEDIUM_PRIORITY |
Updated at ingestion |
.collectionElements[].references[].entity.metadata.threat[].urlBackToProduct |
Event.Related Indicator.Attribute | Product URL | N/A | https://threatq.online/indicators/1400021/details |
N/A |
.collectionElements[].references[].entity.metadata.threat[].threatFeedName |
Event.Related Indicator.Attribute | Threat Feed | N/A | Bank |
N/A |
.collectionElements[].references[].event.src/target/about/principal.asset.hostname |
Event.Related Asset.Value | N/A | N/A | host1.dummy.threatq.com |
N/A |
.collectionElements[].references[].event.src/target/about/principal.asset.ip |
Event.Related Asset.Value | N/A | N/A | 192.168.50.12 |
If hostname is not present. |
.collectionElements[].references[].event.src/target/about/principal.asset.category |
Event.Related Asset.Attribute | Category | N/A | Workstation |
N/A |
.collectionElements[].references[].event.src/target/about/principal.asset.deploymentStatus |
Event.Related Asset.Attribute | Deployment Status | N/A | deployed |
N/A |
.collectionElements[].references[].event.src/target/about/principal.asset.ip |
Event.Related Asset.Attribute | IP Address | N/A | 192.168.50.12 |
N/A |
.collectionElements[].references[].event.src/target/about/principal.asset.location.city |
Event.Related Asset.Attribute | City | N/A | New York |
N/A |
.collectionElements[].references[].event.src/target/about/principal.asset.location.countryOrRegion |
Event.Related Asset.Attribute | Country | N/A | USA |
N/A |
.collectionElements[].references[].event.src/target/about/principal.asset.location.name |
Event.Related Asset.Attribute | Location | N/A | New York City |
N/A |
.collectionElements[].references[].event.src/target/about/principal.asset.location.state |
Event.Related Asset.Attribute | State | N/A | NY |
N/A |
.collectionElements[].references[].event.src/target/about/principal.asset.networkDomain |
Event.Related Asset.Attribute | Network Domain | N/A | dummy.threatq.com |
N/A |
.collectionElements[].references[].event.src/target/about/principal.asset.platformSoftware |
Event.Related Asset.Attribute | Platform | N/A | Linux |
N/A |
.collectionElements[].references[].event.src/target/about/principal.asset.type |
Event.Related Asset.Attribute | Asset Type | N/A | WORKSTATION |
N/A |
.collectionElements[].references[].event.src/target/about/principal.asset.vulnerabilities.cveId |
Event.Related Asset.Related Indicator.Value | CVE | N/A | CVE-2004-0230 |
N/A |
Average Feed Run
Object counts and Feed runtime are supplied as generalities only - objects returned by a provider can differ based on credential configurations and Feed runtime may vary based on system resources and load.
Metric | Result |
---|---|
Run Time | 1 minute |
Events | 27 |
Event Attributes | 300 |
Indicators | 30 |
Indicator Attributes | 250 |
Assets | 15 |
Asset Attributes | 20 |
Change Log
- Version 1.0.0
- Initial release
PDF Guides
Document | ThreatQ Version |
---|---|
Google Chronicle Detections CDF Guide v1.0.0 | 6.0.1 or Greater |