Recorded Future CDF
The web format of this guide reflects the most current release. Guides for older iterations are available in PDF format.
Integration Details
ThreatQuotient provides the following details for this integration:
Current Integration Version | 2.14.0 |
Compatible with ThreatQ Versions | >= 5.6.0 |
Support Tier | ThreatQ Supported |
Introduction
The Recorded Future CDF ingests threat intelligence data from the following feeds published by the Recorded Future vendor:
- Recorded Future Domain Risk List - retrieves information in the form of a CSV list where the first token is risk data and the last token containing the supporting context.
- Recorded Future IP Risk List - retrieves IP Addresses from the provider.
- Recorded Future URL Risk List - retrieves URLS from the provider.
- Recorded Future Vulnerability Risk List - retrieves CVEs from the provider.
- Recorded Future Hash Risk List - retrieves Hashes from the provider.
- Recorded Future Analyst Note - retrieves Reports, Indicators, and Attack Patterns from the provider.
- Recorded Future Alerts - retrieves Alerts from the provider as ThreatQ Events and all the related Indicators, Malware, Adversaries, Attack Patterns and Vulnerabilities, Image files and Entity objects.
- Recorded Future Alerts Details (Supplemental) - retrieves related data for each of the ingested events retrieved from the Alert endpoint.
- Recorded Future Playbook Alerts - retrieves a list of alerts filtered by the values provided in the configuration section.
- Recorded Future - Get Playbook Alerts (Supplemental) - retrieves related data for each of the ingested events retrieved from the Alert endpoint.
- Recorded Future Fusion Files - ingests threat intelligence information from the user selected Fusion feeds.
- Recorded Future Detection Rules - ingests Recorded Future detection rules (i.e. YARA, Snort, or Sigma) into ThreatQ as Signatures.
The integration ingests the following system objects:
- Adversaries
- Adversary Tags
- Assets
- Asset Attributes
- Attack Patterns
- Attack Pattern Attributes
- Compromised Account (custom object)
- Entities (custom object)
- Files
- Identities
- Indicators
- Indicator Attributes and Tags
- Malware
- Malware Attributes
- Reports
- Report Attributes
- Signatures
- Signature Attributes
- Vulnerabilities
- Vulnerability Attributes and Tabs
Prerequisites
The following is required to install and run the integration:
- Recorded Future API Key.
- Compromised Account and Entity custom objects installed on your ThreatQ instance.
- MITRE ATT&CK attack patterns must have already been ingested by a previous run of the MITRE ATT&CK feeds in order for MITRE ATT&CK attack patterns ingested by the Analyst Note feed to be created. MITRE ATT&CK attack patterns are ingested from the following feeds:
- MITRE Enterprise ATT&CK
- MITRE Mobile ATT&CK
- MITRE PRE-ATT&CK
Compromised Account and Entities Custom Object
The integration requires the Compromised Account and Entity custom objects which must be installed prior to installing the CDF. Use the steps provided to install the custom objects.
When installing the custom objects, be aware that any in-progress feed runs will be cancelled, and the API will be in maintenance mode.
Use the following steps to install the custom object in ThreatQ v6:
- Download the integration bundle from the ThreatQ Marketplace.
- Unzip the bundle and locate the custom object files.
The custom object files will typically consist of a JSON definition file, install.sh script, and a images folder containing the svg icons.
- SSH into your ThreatQ instance.
- Navigate to the following location:
cd /var/lib/threatq/misc/
- Upload the custom object files, including the images folder.
The directory structure should be as the following:
- misc
- install.sh
- <custom_object_name>.json
- images (directory)
- <custom_object_name>.svg
- misc
- Run the following command:
kubectl exec -it deployment/api-schedule-run -n threatq -- sh /var/lib/threatq/misc/install.sh /var/lib/threatq/misc
The installation script will automatically put the application into maintenance mode, move the files to their required directories, install the custom object, update permissions, bring the application out of maintenance mode, and restart dynamo.
- Delete the install.sh, definition json file, and images directory from the
misc
directory after the object has been installed as these files are no longer needed.
Use the following steps to install the custom object in ThreatQ v5:
- Download the integration zip file from the ThreatQ Marketplace and unzip its contents.
- SSH into your ThreatQ instance.
- Navigate to tmp directory:
cd /tmp/
- Create a new directory:
mkdir recorded_future_cdf
- Upload the recorded_future.json and install.sh script into this new directory.
- Create a new directory called images within the recorded_future_cdf directory.
mkdir images
- Upload the account and entity svg files.
- Navigate to the /tmp/recorded_future_cdf.
The directory should resemble the following:
- tmp
- recorded_future_cdf
- recorded_future.json
- install.sh
- images
- account.svg
- entity.svg
- recorded_future_cdf
- tmp
- Run the following command to ensure that you have the proper permissions to install the custom object:
chmod +x install.sh
- Run the following command:
sudo ./install.sh
You must be in the directory level that houses the install.sh and json files when running this command.
The installation script will automatically put the application into maintenance mode, move the files to their required directories, install the custom object, update permissions, bring the application out of maintenance mode, and restart dynamo.
- Remove the temporary directory, after the custom object has been installed, as the files are no longer needed:
rm -rf recorded_future_cdf
Installation
The integration requires the installation of the Compromised Account and Entitiy custom objects. See the Prerequisites chapter for more details. These custom objects must be installed prior to installing the CDF. Attempting to install the CDF prior to installing the custom objects will result in the CDF install process failing.
Perform the following steps to install the integration:
The same steps can be used to upgrade the integration to a new version.
- Log into https://marketplace.threatq.com/.
- Locate and download the integration zip file.
- Extract the contents of the zip and install the required custom objects.
- Navigate to the integrations management page on your ThreatQ instance.
- Click on the Add New Integration button.
- Upload the integration yaml file using one of the following methods:
- Drag and drop the yaml file into the dialog box
- Select Click to Browse to locate the yaml file on your local machine
- Select the individual feeds to install, when prompted, and click Install. The feed will be added to the integrations page.
ThreatQ will inform you if the feed already exists on the platform and will require user confirmation before proceeding. ThreatQ will also inform you if the new version of the feed contains changes to the user configuration. The new user configurations will overwrite the existing ones for the feed and will require user confirmation before proceeding.
You will still need to configure and then enable the feed.
Configuration
ThreatQuotient does not issue API keys for third-party vendors. Contact the specific vendor to obtain API keys and other integration-related credentials.
To configure the integration:
- Navigate to your integrations management page in ThreatQ.
- Select the Commercial option from the Category dropdown (optional).
If you are installing the integration for the first time, it will be located under the Disabled tab.
- Click on the integration entry to open its details page.
- Enter the following parameters under the Configuration tab:
All Recorded Future feeds require the Recorded Future API Key. The tables below provide any additional parameters required for specific feeds included with this integration.
Recorded Future Domain Risk List Parameters
Parameter Description API Key Your API Key to be used in HTTP headers for accessing feed data. Enable SSL Verification Enable this for the feed to validate the host-provided SSL certificate. Disable Proxies Enable this option if the feed should not honor proxies set in the ThreatQ UI. Risk Rule Triggered Optional - Enable this parameter to ingests only indicators that triggered any of the selected risk rules. If no risk rule is selected, all the indicators satisfying the rest of the criteria are ingested. Options include: - Historically Reported by Insikt Group
- Historically Reported Botnet Domain
- Newly Registered Certificate With Potential for Abuse - DNS Sandwich
- Newly Registered Certificate With Potential for Abuse - Typo or Homograph
- C&C Nameserver
- Historical C&C DNS Name
- Historical COVID-19-Related Domain Lure
- Recently Resolved to Host of Many DDNS Names
- Historically Reported as a Defanged DNS Name
- Historically Reported by DHS AIS
- Recent Fast Flux DNS Name
- Historically Reported Fraudulent Content
- Frequently Abused Free DNS Provider
- Historically Reported in Threat List
- Historically Linked to Cyber Attack
- Historically Detected Malware Operation
- Historically Suspected Malware Operation
- Historically Detected Cryptocurrency Mining Techniques
- Blacklisted DNS Name
- No Risk Observed
- Observed in the Wild by Recorded Future Telemetry
- Historical Phishing Lure
- Historically Detected Phishing Techniques
- Historically Suspected Phishing Techniques
- Active Phishing URL
- Recorded Future Predictive Risk Model
- Historically Detected Web Filter Avoidance Proxy Domain
- Historical Punycode Domain
- Recently Reported by Insikt Group
- Recently Reported Botnet Domain
- Recent C&C DNS Name
- Recent COVID-19-Related Domain Lure: Malicious
- Recent COVID-19-Related Domain Lure: Suspicious
- Recently Reported as a Defanged DNS Name
- Recently Reported by DHS AIS
- Recently Reported Fraudulent Content
- Recently Linked to Cyber Attack
- Recently Detected Malware Operation
- Recently Suspected Malware Operation
- Recent Cryptocurrency Mining Pool
- Recently Detected Cryptocurrency Mining Techniques
- Recent Phishing Lure: Malicious
- Recent Phishing Lure: Suspicious
- Recently Detected Phishing Techniques
- Recently Suspected Phishing Techniques
- Recent Web Filter Avoidance Proxy Domain
- Recent Punycode Domain
- Recently Referenced by Insikt Group
- Recently Reported Spam or Unwanted Content
- Recent Suspected C&C DNS Name
- Recent Threat Researcher
- Recent Typosquat Similarity - DNS Sandwich
- Recent Typosquat Similarity - Typo or Homograph
- Recent Ukraine-Related Domain Lure: Malicious
- Recent Ukraine-Related Domain Lure: Suspicious
- Recently Active Weaponized Domain
- Recently Defaced Site
- Historically Referenced by Insikt Group
- Recently Resolved to Malicious IP
- Recently Resolved to Suspicious IP
- Recently Resolved to Unusual IP
- Recently Resolved to Very Malicious IP
- Trending in Recorded Future Analyst Community
- Historically Reported Spam or Unwanted Content
- Historical Suspected CANDC DNS Name
- Historical Threat Researcher
- Historical Typosquat Similarity - DNS Sandwich
- Historical Typosquat Similarity - Typo or Homograph
- Historical Ukraine-Related Domain Lure
- Historically Active Weaponized Domain
Minimum Risk Score Threshold The numeric value representing the minimum risk score required to ingest an IOC. The default setting is 50. Normalize Risk Score Enable this parameter ingest a normalized risk score value as a scorable attribute. Risk Score Normalization Mapping Mapping used to normalize the numeric risk score values to the scorable attribute, Normalized Risk
. The Risk Score itself will always be ingested. This mapping should contain a line-separated CSV formatted string with the following columns: Minimum, Maximum, and Normalized Value.
Default Values0,25,Low 26,50,Medium 51,75,High 76,100,Critical
This parameter is only accessible if you have enabled the Normalize Risk Score parameter.
Filter Out Entries with No New Evidence Enabling this option will filter out entries that have no new evidence. A risk list is a rolling list of indicators. As a result, there are entries within the list that may be from days, months, or even years ago. Once the feed runs historically and ingests all the entries, subsequent runs do not need to re-ingest the same entries again if there is no new evidence. Disabling it will re-ingest all entries, with solely the old evidence being filtered out. This parameter is enabled by default.
Recorded Future Vulnerability Risk List Parameters
Parameter Description API Key Your API Key to be used in HTTP headers for accessing feed data. Enable SSL Verification Enable this for the feed to validate the host-provided SSL certificate. Disable Proxies Enable this option if the feed should not honor proxies set in the ThreatQ UI. Risk Rule Triggered Optional - Enable this parameter to ingests only indicators that triggered any of the selected risk rules. If no risk rule is selected, all the indicators satisfying the rest of the criteria are ingested. Options include: - Historically Reported by Insikt Group
- Web Reporting Prior to CVSS Score
- Cyber Exploit Signal: Critical
- Cyber Exploit Signal: Important
- Cyber Exploit Signal: Medium
- Historically Exploited in the Wild by Malware
- Likely Historical Exploit Development
- Linked to Historical Cyber Exploit
- Historically Linked to Exploit Kit
- Historically Linked to Malware
- Historically Linked to Remote Access Trojan
- Historically Linked to Ransomware
- Linked to Recent Cyber Exploit
- Recently Linked to Exploit Kit
- Recently Linked to Malware
- Recently Linked to Remote Access Trojan
- Recently Linked to Ransomware
- Exploited in the Wild by Malware
- NIST Severity: Critical
- NIST Severity: High
- NIST Severity: Low
- NIST Severity: Medium
- Web Reporting Prior to NVD Disclosure
- Historical Unverified Proof of Concept Available
- Historical Verified Proof of Concept Available
- Historical Verified Proof of Concept Available Using Remote Execution
- Recently Reported by Insikt Group
- Exploit Likely in Active Development
- Exploited in the Wild by Recently Active Malware
- Recent Unverified Proof of Concept Available
- Recent Verified Proof of Concept Available
- Recent Verified Proof of Concept Available Using Remote Execution
- Recently Referenced by Insikt Group
- Recently Linked to Penetration Testing Tools
- Historically Referenced by Insikt Group
- Historically Linked to Penetration Testing Tools
- Vendor Severity: Critical
- Vendor Severity: High
- Vendor Severity: Low
- Vendor Severity: Medium
Save CVE Data As
Select whether to ingest CVEs as Vulnerabilities or Indicators. The default setting is to ingest Indicators objects.
Minimum Risk Score Threshold The numeric value representing the minimum risk score required to ingest an IOC. The default setting is 50. Normalize Risk Score Enable this parameter ingest a normalized risk score value as a scorable attribute. Risk Score Normalization Mapping Mapping used to normalize the numeric risk score values to the scorable attribute, Normalized Risk
. The Risk Score itself will always be ingested. This mapping should contain a line-separated CSV formatted string with the following columns: Minimum, Maximum, and Normalized Value.
Default Values0,25,Low 26,50,Medium 51,75,High 76,100,Critical
This parameter is only accessible if you have enabled the Normalize Risk Score parameter.
Filter Out Entries with No New Evidence Enabling this option will filter out entries that have no new evidence. A risk list is a rolling list of indicators. As a result, there are entries within the list that may be from days, months, or even years ago. Once the feed runs historically and ingests all the entries, subsequent runs do not need to re-ingest the same entries again if there is no new evidence. Disabling it will re-ingest all entries, with solely the old evidence being filtered out. This parameter is enabled by default.
Recorded Future Hash Risk List Parameters
Parameter Description API Key Your API Key to be used in HTTP headers for accessing feed data. Enable SSL Verification Enable this for the feed to validate the host-provided SSL certificate. Disable Proxies Enable this option if the feed should not honor proxies set in the ThreatQ UI. Risk Rule Triggered Optional - Enable this parameter to ingests only indicators that triggered any of the selected risk rules. If no risk rule is selected, all the indicators satisfying the rest of the criteria are ingested. Options include: - Reported by Insikt Group
- Reported by DHS AIS
- Historically Reported in Threat List
- Linked to Cyber Attack
- Linked to Malware
- Linked to Attack Vector
- Linked to Vulnerability
- Malware SSL Certificate Fingerprint
- Positive Sandbox Detection on File From Underground Virus Testing Sites
- No Risk Observed
- Observed in Underground Virus Testing Sites
- Observed in the Wild by Recorded Future Telemetry
- Positive Malware Verdict
- Recently Active Targeting Vulnerabilities in the Wild
- Referenced by Insikt Group
- Trending in Recorded Future Analyst Community
- Suspicious Behavior Detected
- Threat Researcher
Ingested Hash Types Select the type of hashes to be ingested into ThreatQ. Options include - MD5
- SHA-1
- SHA-256
Minimum Risk Score Threshold The numeric value representing the minimum risk score required to ingest an IOC. The default setting is 50. Normalize Risk Score Enable this parameter ingest a normalized risk score value as a scorable attribute. Risk Score Normalization Mapping Mapping used to normalize the numeric risk score values to the scorable attribute, Normalized Risk
. The Risk Score itself will always be ingested. This mapping should contain a line-separated CSV formatted string with the following columns: Minimum, Maximum, and Normalized Value.
Default Values0,25,Low 26,50,Medium 51,75,High 76,100,Critical
This parameter is only accessible if you have enabled the Normalize Risk Score parameter.
Filter Out Entries with No New Evidence Enabling this option will filter out entries that have no new evidence. A risk list is a rolling list of indicators. As a result, there are entries within the list that may be from days, months, or even years ago. Once the feed runs historically and ingests all the entries, subsequent runs do not need to re-ingest the same entries again if there is no new evidence. Disabling it will re-ingest all entries, with solely the old evidence being filtered out. This parameter is enabled by default.
Recorded Future IP Risk List Parameters
Parameter Description API Key Your API Key to be used in HTTP headers for accessing feed data. Enable SSL Verification Enable this for the feed to validate the host-provided SSL certificate. Disable Proxies Enable this option if the feed should not honor proxies set in the ThreatQ UI. Risk Rule Triggered Optional - Enable this parameter to ingests only indicators that triggered any of the selected risk rules. If no risk rule is selected, all the indicators satisfying the rest of the criteria are ingested. Options include: - Threat Actor Used Infrastructure
- Historically Reported by Insikt Group
- Inside Possible Bogus BGP Route
- Historical Botnet Traffic
- Historical Brute Force
- Nameserver for C&C Server
- Cyber Exploit Signal: Critical
- Cyber Exploit Signal: Important
- Cyber Exploit Signal: Medium
- Recent Host of Many DDNS Names
- Historical DDoS
- Historically Reported as a Defanged IP
- Historically Reported by DHS AIS
- Historical DNS Abuse
- Resolution of Fast Flux DNS Name
- Historically Reported in Threat List
- Historical Honeypot Sighting
- Honeypot Host
- Recently Communicating Validated C&C Server
- Historically Linked to Intrusion Method
- Historically Linked to APT
- Historically Linked to Cyber Attack
- Historical Malicious Infrastructure Admin Server
- Suspected Malicious Packet Source
- Historical Malware Delivery
- Historical Multicategory Blocklist
- Observed in the Wild by Recorded Future Telemetry
- Historical Open Proxies
- Historical Phishing Host
- Historical Positive Malware Verdict
- Recorded Future Predictive Risk Model
- Actively Communicating Validated C&C Server
- Recently Reported by Insikt Group
- Recent Botnet Traffic
- Recent Brute Force
- Recent DDoS
- Recently Reported as a Defanged IP
- Recently Reported by DHS AIS
- Recent DNS Abuse
- Recent Honeypot Sighting
- Recently Linked to Intrusion Method
- Recently Linked to APT
- Recently Linked to Cyber Attack
- Recent Malicious Infrastructure Admin Server
- Recent Malware Delivery
- Recent Multicategory Blocklist
- Recent Open Proxies
- Recent Phishing Host
- Recent Positive Malware Verdict
- Recently Referenced by Insikt Group
- Recently Reported C&C Server
- Recently Communicating With Reported C&C Server
- Recent Spam Source
- Recent SSH/Dictionary Attacker
- Recent Bad SSL Association
- Recent Suspected C&C Server
- Recent Threat Researcher
- Recent Tor Node
- Recent Unusual IP
- Validated C&C Server
- Recently Communicating With Validated C&C Server
- Recently Defaced Site
- Historically Referenced by Insikt Group
- Historically Reported C&C Server
- Trending in Recorded Future Analyst Community
- Historical Spam Source
- Historical SSH/Dictionary Attacker
- Historical Bad SSL Association
- Historical Suspected C&C Server
- Suspected Phishing Host
- Historical Threat Researcher
- Tor Node
- Unusual IP
- Previously Validated C&C Server
- Vulnerable Host
- Observed High-Impact Vulnerability
Minimum Risk Score Threshold The numeric value representing the minimum risk score required to ingest an IOC. The default setting is 50. Normalize Risk Score Enable this parameter ingest a normalized risk score value as a scorable attribute. Risk Score Normalization Mapping Mapping used to normalize the numeric risk score values to the scorable attribute, Normalized Risk
. The Risk Score itself will always be ingested. This mapping should contain a line-separated CSV formatted string with the following columns: Minimum, Maximum, and Normalized Value.
Default Values0,25,Low 26,50,Medium 51,75,High 76,100,Critical
This parameter is only accessible if you have enabled the Normalize Risk Score parameter.
Filter Out Entries with No New Evidence Enabling this option will filter out entries that have no new evidence. A risk list is a rolling list of indicators. As a result, there are entries within the list that may be from days, months, or even years ago. Once the feed runs historically and ingests all the entries, subsequent runs do not need to re-ingest the same entries again if there is no new evidence. Disabling it will re-ingest all entries, with solely the old evidence being filtered out. This parameter is enabled by default.
Recorded Future URL Risk List Parameters
Parameter Description API Key Your API Key to be used in HTTP headers for accessing feed data. Enable SSL Verification Enable this for the feed to validate the host-provided SSL certificate. Disable Proxies Enable this option if the feed should not honor proxies set in the ThreatQ UI. Risk Rule Triggered Optional - Enable this parameter to ingests only indicators that triggered any of the selected risk rules. If no risk rule is selected, all the indicators satisfying the rest of the criteria are ingested. Options include: - Historically Reported by Insikt Group
- Historically Reported Botnet URL
- Historical C&C URL
- Historically Reported as a Defanged URL
- Historically Reported by DHS AIS
- Historically Reported Fraudulent Content
- Historically Reported in Threat List
- Historically Detected Malware Distribution
- Historically Suspected Malware Distribution
- Historically Detected Cryptocurrency Mining Techniques
- No Risk Observed
- Observed in the Wild by Recorded Future Telemetry
- Historically Detected Phishing Techniques
- Historically Suspected Phishing Techniques
- Historically Detected Web Filter Avoidance Proxy URL
- Recently Reported by Insikt Group
- Recently Reported Botnet URL
- Recent C&C URL
- Recently Reported as a Defanged URL
- Recently Reported by DHS AIS
- Recently Reported Fraudulent Content
- Recently Detected Malware Distribution
- Recently Suspected Malware Distribution
- Recently Detected Cryptocurrency Mining Techniques
- Recently Detected Phishing Techniques
- Recently Suspected Phishing Techniques
- Recent Web Filter Avoidance Proxy URL
- Recently Referenced by Insikt Group
- Recent Reported C&C URL
- Recently Reported Spam or Unwanted Content
- Recent Suspected C&C URL
- Recently Active URL on Weaponized Domain
- Historically Referenced by Insikt Group
- Historical Reported C&C URL
- Historically Reported Spam or Unwanted Content
- Historical Suspected C&C URL
Minimum Risk Score Threshold The numeric value representing the minimum risk score required to ingest an IOC. The default setting is 50. Normalize Risk Score Enable this parameter ingest a normalized risk score value as a scorable attribute. Risk Score Normalization Mapping Mapping used to normalize the numeric risk score values to the scorable attribute, Normalized Risk
. The Risk Score itself will always be ingested. This mapping should contain a line-separated CSV formatted string with the following columns: Minimum, Maximum, and Normalized Value.
Default Values0,25,Low 26,50,Medium 51,75,High 76,100,Critical
This parameter is only accessible if you have enabled the Normalize Risk Score parameter.
Filter Out Entries with No New Evidence Enabling this option will filter out entries that have no new evidence. A risk list is a rolling list of indicators. As a result, there are entries within the list that may be from days, months, or even years ago. Once the feed runs historically and ingests all the entries, subsequent runs do not need to re-ingest the same entries again if there is no new evidence. Disabling it will re-ingest all entries, with solely the old evidence being filtered out. This parameter is enabled by default.
Recorded Future Analyst Note Parameters
Parameter Description API Key Your API Key to be used in HTTP headers for accessing feed data. Entity
A string to search for notes by entity ID. Title
A string to search for notes by title. Topic
A string to search for notes by topic ID. Options include: - Actor Profile
- Analyst On-Demand Report
- Cyber Threat Analysis
- Flash Report
- Geopolitical Intelligence Summary
- Geopolitical Flash Event
- Geopolitical Threat Forecast
- Geopolitical Validated Event
- Hunting Package
- Indicator
- Insikt Research Lead
- Informational
- Malware/Tool Profile
- Regular Vendor Vulnerability Disclosures
- Sigma Rule
- SNORT Rule
- Source Profile
- The Record by Recorded Future
- Threat Lead
- TTP Instance
- Validated Intelligence Event
- Weekly Threat Landscape
- YARA Rule
Label
A string that helps searching for notes by label, by name. Source A string that helps sorting by the source of note. The options for this user field will be: - Insikt Group
- ThreatQuotient - Partner Notes
Tagged Text
Enable this parameter if the text should contain tags. Fetch & Ingest Attachments Enable this parameter to fetch any attachments associated with a given analyst note. Extracted Signatures Select which signature types to parse and ingest from relevant analyst note attachments. Options include: - YARA (default)
- Snort (default)
- Sigma
- Nuclei
Sigma and Nuclei rules will be ingested with the
Custom
signature type and aType
attribute for the specific rule type.Ingest CVEs As Select which ThreatQ entity type to ingest CVE values as in ThreatQ. Options include Vulnerabilities (default) and Indicators. Ingest Selected Primary Entities as Indicators Select which entity types to ingest as indicators of compromise into ThreatQ. Options include: - URLs (default)
- Internet Domain Names (default)
- IP Addresses (default)
- Hashes (default)
- Email Addresses (default)
- Usernames
- Filenames
This will only ingest the selected types from the "primary" entities (note_entities), and not the "supporting" entities (context_entities). This is so we can reduce the amount of false positives being ingested into the platform. Even if you do not select any of these, they will still be included in the description of the note.
Ingest Selected Supporting Entities as Indicators Select which entity types to ingest as indicators of compromise into ThreatQ. Options include: - Internet Domain Names
- IP Addresses
- Hashes
- Email Addresses
- Usernames
- Filenames
This will only enable the ingestion of the selected types from the "supporting" entities (context_entities), and not the "primary" entities (note_entities). ThreatQuotient does not recommend enabling option due to the high likelihood of false positives. Even if you do not select any of these, they will still be included in the description of the note.
Ingested Hash Types Select the type of hashes to be ingested into ThreatQ. Options include - MD5
- SHA-1
- SHA-256
Ingest Topics As Select the ThreatQ entity type to ingest topics as in the platform. Options include Tags and Attributes. API Request Limit The maximum number of records per request. This will be used in the pagination. Enable SSL Verification Enable this for the feed to validate the host-provided SSL certificate. Disable Proxies Enable this option if the feed should not honor proxies set in the ThreatQ UI.
Recorded Future Alerts Parameters
Parameter Description API Key Your API Key to be used in HTTP headers for accessing feed data. Triggered A string to search for events from a specific date (YYYY-MM-DD or YYYY-MM or YYYY). Review Status
A string to search for events by status (Unassigned, Assigned, No Action and Tuning). If no specific status is selected, all event statuses are returned by the provider. Freetext Search
A string to search for events by any value. Ingest CVE Data as Select whether to ingest CVEs as: Vulnerabilities or Indicators (type: CVE). Ingested Hash Types Select the type of hashes to be ingested into ThreatQ. Options include - MD5
- SHA-1
- SHA-256
Ingest Indicator Hits Select which indicator hits to ingest into ThreatQ. All ingested indicators will receive a status of 'Review' since hits are not always indicators of compromise. They may be your organization's domains found on the dark web, newly registered organization domains, or other non-malicious indicators. Options include: - URLs
- Domains
- IP Addresses
- Filenames
Ingest Emails as Compromised Accounts for These Rules Enter a line-separated list of rule names (or IDs) that will be used to determine if an email address should be ingested as a Compromised Account object or Identity object. Recorded Future creates alerts for entities that have triggered a rule. These entities may be of different types such as: IP addresses, URLs, email addresses, etc. This parameter allows you to determine if an email address is a compromised Account when Recorded Future creates an alert for it. Ingest Images as Files Related to Alerts Enable this option to download and ingest images into the ThreatQ platform as related Files. Ingest and Relate "triggered_by" Entities to Alerts Enable this option to ingest "triggered_by" entities related objects. Enable SSL Verification Enable this for the feed to validate the host-provided SSL certificate. Disable Proxies Enable this option if the feed should not honor proxies set in the ThreatQ UI.
Recorded Future Playbook Alerts Parameters
Parameter Description API Key Your API Key to be used in HTTP headers for accessing feed data. Filter By The date that will be used for filtering the alerts: Creation
orUpdate
time of the Playbook Alert.Statuses The Status of the Playbook Alert. Options include: - New
- In Progress
- Dismissed
- Resolved
Playbook Category Filter Select which playbook categories to ingest. Options include: - Domain Abuse (default)
- Cyber Vulnerability (default)
- Code Repo Leakage (default)
- Third Party Risk (default)
Priority The Priority of the Playbook Alert. Options include: - High Priority
- Moderate Priority
- Priority Informational
Normalize Risk Score Enable this parameter ingest a normalized risk score value as a scorable attribute. Risk Score Normalization Mapping Mapping used to normalize the numeric risk score values to the scorable attribute, Normalized Risk
. The Risk Score itself will always be ingested. This mapping should contain a line-separated CSV formatted string with the following columns: Minimum, Maximum, and Normalized Value.
Default Values0,25,Low 26,50,Medium 51,75,High 76,100,Critical
This parameter is only accessible if you have enabled the Normalize Risk Score parameter.
Ingest Target Attributes Enable this parameter to ingest Targets as event attributes and related indicator attributes. This parameter is enabled by default. Ingest CVEs as Select whether to ingest CVEs as: Vulnerabilities or Indicators (type: CVE). Enable SSL Verification Enable this for the feed to validate the host-provided SSL certificate. Disable Proxies Enable this option if the feed should not honor proxies set in the ThreatQ UI.
Recorded Future Fusion Files Parameters
Parameter Description API Key Your API Key to be used in HTTP headers for accessing feed data. Selected Fusion Feeds Select the Fusion Files to be retrieved. Options include: - Command and Control IPs
- Known TOR IPs
- Active RAT C2 IPs
- Fast Flux IPs
- IP Risk List w/ Geolocation & Malware
- Dynamic DNS IPs
- Potentially Undetectable Malware
- Weaponized Domains
- Exploits in the Wild Hashes
Minimum Risk Score Threshold The numeric value representing the minimum risk score required to ingest an IOC. The default setting is 50. This parameter is only accessible if you have enabled the
IP Risk List w/ Geolocation & Malware
option is selected for the Selected Fusion Feeds parameter.Normalize Risk Score Enable this parameter ingest a normalized risk score value as a scorable attribute. This parameter is only accessible if you have enabled the
IP Risk List w/ Geolocation & Malware
option is selected for the Selected Fusion Feeds parameter.Risk Score Normalization Mapping Mapping used to normalize the numeric risk score values to the scorable attribute, Normalized Risk
. The Risk Score itself will always be ingested. This mapping should contain a line-separated CSV formatted string with the following columns: Minimum, Maximum, and Normalized Value.
Default Values0,25,Low 26,50,Medium 51,75,High 76,100,Critical
This parameter is only accessible if you have enabled the
IP Risk List w/ Geolocation & Malware
option is selected for the Selected Fusion Feeds parameter.Filter Out Entries with No New Evidence Enabling this option will filter out entries that have no new evidence. A risk list is a rolling list of indicators. As a result, there are entries within the list that may be from days, months, or even years ago. Once the feed runs historically and ingests all the entries, subsequent runs do not need to re-ingest the same entries again if there is no new evidence. Disabling it will re-ingest all entries, with solely the old evidence being filtered out. This parameter is enabled by default. Ingest Related Malware Enabling this will ingest Malware related to indicators in the feeds. It is important to note that over time, this may create a large number of relationships between indicators and malware.
Ingest Related CVEs Optional - Enabling this will ingest CVEs related to indicators in the feeds. This parameter only applies to the
Exploits in the Wild
feed and is disabled by default due to the large number of CVE relationships that may be created when enabled. Exercise caution when enabled this parameter.Ingest CVEs As Select whether to ingest CVEs as Vulnerabilities (default) or Indicators. This parameter is only accessible if you have enabled the Ingest Related CVEs parameter selected.
Enable SSL Verification Enable this for the feed to validate the host-provided SSL certificate. Disable Proxies Enable this option if the feed should not honor proxies set in the ThreatQ UI.
Recorded Future Detection Rules Parameters
Parameter Description API Key Your API Key to be used in HTTP headers for accessing feed data. API Request Limit Enter the maximum number of objects per request. This will be used in the pagination. Enable SSL Verification Enable this for the feed to validate the host-provided SSL certificate. Disable Proxies Enable this option if the feed should not honor proxies set in the ThreatQ UI. Rule Types Select which rule types to fetch and ingest from the Recorded Future API. Options include: - YARA (default)
- Snort (default)
- Sigma
Ingest Selected Entities as Indicators Select which entity types to ingest as indicators of compromise into ThreatQ. Options include: - URLs
- Internet Domain Names
- IP Addresses
- Hashes
- Email Addresses
- Usernames
- Filenames
Ingested Hash Types Select the hash types to ingest. Options include: - MD5
- SHA-1
- SHA-256
Ingest CVEs as Select whether to ingest CVEs as: Vulnerabilities or Indicators (type: CVE).
- Review any additional settings, make any changes if needed, and click on Save.
- Click on the toggle switch, located above the Additional Information section, to enable it.
ThreatQ Mapping
Recorded Future Domain Risk List
The Recorded Future Domain Risk List feed ingests data from the Recorded Future Default Domain Risk List in form of a CSV list. The first token is the actual risk data (domain), and the last token (EvidenceDetails) contains supporting context. This token is a JSON-formatted string of an array of dictionaries.
GET https://api.recordedfuture.com/v2/domain/risklist
Sample Response:
'ns513726.ip-192-99-148.net', '92', '3/32',
'{"EvidenceDetails":
[
{
"CriticalityLabel": "Unusual",
"Rule": "Historical Malware Analysis DNS Name",
"EvidenceString": "6 sightings on 1 source: VirusTotal...",
"Timestamp": "2015-04-04T00:00:00.000Z",
"Criticality": 1
},
{
"CriticalityLabel": "Suspicious",
"Rule": "Blacklisted DNS Name",
"EvidenceString": "1 sighting on 1 source: DShield: Suspicious Domain List.",
"Timestamp": "2018-12-26T07:12:00.936Z",
"Criticality": 2
},
{
"CriticalityLabel": "Very Malicious",
"Rule": "C&C DNS Name",
"EvidenceString": "1 sighting on 1 source: Abuse.ch: ZeuS Domain Blocklist (Standard).",
"Timestamp": "2018-12-26T07:12:00.936Z",
"Criticality": 4
}
]
}'
ThreatQuotient provides the following default mapping for this feed:
Feed Data Path | ThreatQ Entity | ThreatQ Object Type or Attribute Key | Published Date | Examples | Notes |
---|---|---|---|---|---|
0 (first token) | Indicator.Value | FQDN | N/A | ns513726.ip-192-99-148.net | N/A |
1 (second token) | Indicator.Attribute | Risk Score | N/A | 66 | Updatable |
1 (second token) | Indicator.Attribute | Normalized Risk | N/A | High | Mapped using Risk Score Normalization Mapping user field; Updatable |
2 (third token) | Indicator.Attribute | Risk String | N/A | 2/32 | Updatable |
3 (fourth token)[].CriticalityLabel | Indicator.Attribute | Criticality | 3 (fourth token)[].Timestamp | Suspicious | Updatable. The highest criticality level is selected. |
3 (fourth token)[].Rule | Indicator.Attribute | Associated Rule | 3 (fourth token)[].Timestamp | Blacklisted DNS Name | N/A |
3 (fourth token)[].EvidenceString | Indicator.Attribute | Evidence | 3 (fourth token)[].Timestamp | 1 sighting on 1 source: Abuse.ch: ZeuS Domain Blocklist (Standard). | N/A |
Recorded Future IP Risk List
The Recoded Future IP Risk List feed ingests Recorded Future Default IP risk list. IP addresses are ingested as indicators.
GET https://api.recordedfuture.com/v2/ip/risklist
Sample CSV Response:
'5.120.187.119", '65', '1/49',
'{"EvidenceDetails":
[
{
"CriticalityLabel": "Malicious",
"Rule": "Recent Positive Malware Verdict",
"EvidenceString": "1 sighting on 1 source: ReversingLabs....",
"Timestamp": "2018-11-22T00:00:00.000Z",
"Criticality": 3
}
]
}'
ThreatQuotient provides the following default mapping for this feed:
Feed Data Path | ThreatQ Entity | ThreatQ Object Type or Attribute Key | Published Date | Examples | Notes |
---|---|---|---|---|---|
0 (first token) | Indicator.Value | IP Address | N/A | 5.120.187.119 | N/A |
1 (second token) | Indicator.Attribute | Risk Score | N/A | 65 | Updatable |
1 (second token) | Indicator.Attribute | Normalized Risk | N/A | High | Mapped using Risk Score Normalization Mapping user field; Updatable |
2 (third token) | Indicator.Attribute | Risk String | N/A | 1/49 | Updatable |
3 (fourth token)[].CriticalityLabel | Indicator.Attribute | Criticality | 3 (fourth token)[].Timestamp | Malicious | Updatable. The highest criticality level is selected. |
3 (fourth token)[].Rule | Indicator.Attribute | Associated Rule | 3 (fourth token)[].Timestamp | Recent Positive Malware Verdict | N/A |
3 (fourth token)[].EvidenceString | Indicator.Attribute | Evidence | 3 (fourth token)[].Timestamp | 1 sighting on 1 source: ReversingLabs. | N/A |
Recorded Future URL Risk List
The Recorded Future URL Risk List feed ingests Recorded Future Default URL risk list. URLs are ingested as indicators.
GET https://api.recordedfuture.com/v2/url/risklist
Sample CSV Response:
'http://handle.booktobi.com/css/index.html', '65', '1/7',
'{"EvidenceDetails":
[
{
"CriticalityLabel": "Malicious",
"Rule": "Active Phishing URL",
"EvidenceString": "1 sighting on 1 source: PhishTank: Phishing Reports.",
"Timestamp": "2018-12-26T16:15:44.750Z",
"Criticality": 3
}
]
}'
ThreatQuotient provides the following default mapping for this feed:
Feed Data Path | ThreatQ Entity | ThreatQ Object Type or Attribute Key | Published Date | Examples | Notes |
---|---|---|---|---|---|
0 (first token) | Indicator.Value | URL | N/A | http://handle.booktobi. com/css/index.html |
N/A |
1 (second token) | Indicator.Attribute | Risk Score | N/A | 65 | Updatable |
1 (second token) | Indicator.Attribute | Normalized Risk | N/A | High | Mapped using Risk Score Normalization Mapping user field; Updatable |
2 (third token) | Indicator.Attribute | Risk String | N/A | 1/7 | Updatable |
3 (fourth token)[].CriticalityLabel | Indicator.Attribute | Criticality | 3 (fourth token)[].Timestamp | Malicious | Updatable - the highest criticality level is selected. |
3 (fourth token)[].Rule | Indicator.Attribute | Associated Rule | 3 (fourth token)[].Timestamp | Active Phishing URL | N/A |
3 (fourth token)[].EvidenceString | Indicator.Attribute | Evidence | 3 (fourth token)[].Timestamp | 1 sighting on 1 source: PhishTank: Phishing Reports. | N/A |
Recorded Future Vulnerability Risk List
The Recorded Future Vulnerability Risk List feed ingests Recorded Future Default Vulnerability risk list. CVEs are ingested as indicators or as vulnerabilities depending on user configuration.
GET https://api.recordedfuture.com/v2/vulnerability/risklist
Sample CSV Response:
'CVE-2018-0802', '89', '11/18',
'{"EvidenceDetails":
[
{
"CriticalityLabel": "Low",
"Rule": "Linked to Historical Cyber Exploit",
"EvidenceString": "4281 sightings on 351 sources including: ...",
"Timestamp": "2018-11-14T22:31:30.000Z",
"Criticality": 1
},
{
"CriticalityLabel": "Low",
"Rule": "Historically Linked to Penetration Testing Tools",
"EvidenceString": "1 sighting on 1 source: @DTechCloud....",
"Timestamp": "2018-05-07T20:31:29.000Z", "Criticality": 1
},
]
}'
ThreatQuotient provides the following default mapping for this feed:
Feed Data Path | ThreatQ Entity | ThreatQ Object Type or Attribute Key | Published Date | Examples | Notes |
---|---|---|---|---|---|
0 (first token) | Indicator.Value/Vulnerability.Value | CVE/N/A | N/A | CVE-2018-0802 | N/A |
1 (second token) | Indicator.Attribute/Vulnerability.Attribute | Risk Score | N/A | 89 | Updatable |
1 (second token) | Indicator.Attribute | Normalized Risk | N/A | High | Mapped using Risk Score Normalization Mapping user field; Updatable |
2 (third token) | Indicator.Attribute/Vulnerability.Attribute | Risk String | N/A | 11/18 | Updatable |
3 (fourth token)[].CriticalityLabel | Indicator.Attribute/Vulnerability.Attribute | Criticality | 3 (fourth token)[].Timestamp | Low | Updatable. The highest criticality level is selected. |
3 (fourth token)[].Rule | Indicator.Attribute/Vulnerability.Attribute | Associated Rule | 3 (fourth token)[].TimeStamp | Linked to Historical Cyber Exploit | N/A |
3 (fourth token)[].EvidenceString | Indicator.Attribute/Vulnerability.Attribute | Evidence | 3 (fourth token)[].Timestamp | 1 sighting on 1 source: @DTechCloud.... | N/A |
Recorded Future Hash Risk List
The Recorded Future Hash Risk List feed ingests Recorded Future Default Hash risk list. Hashes are ingested as indicators.
GET https://api.recordedfuture.com/v2/hash/risklist
Sample CSV Response:
'ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa', 'SHA-256', '89', '4/10',
'{"EvidenceDetails":
[
{
"CriticalityLabel": "Unusual",
"Rule": "Threat Researcher",
"EvidenceString": "21 sightings on 9 sources including: ...",
"Timestamp": "2018-01-28T11:24:35.942Z",
"Criticality": 1.0
},
{
"CriticalityLabel": "Suspicious",
"Rule": "Linked to Vulnerability",
"EvidenceString": "5 sightings on 2 sources: ...",
"Timestamp": "2017-08-08T14:10:11.410Z",
"Criticality": 2
},
{
"CriticalityLabel": "Suspicious",
"Rule": "Linked to Malware",
"EvidenceString": "Previous sightings on 36 sources including: ...",
"Timestamp": "2017-05-12T15:39:30.000Z",
"Criticality": 2
},
]
}'
ThreatQuotient provides the following default mapping for this feed:
Feed Data Path | ThreatQ Entity | ThreatQ Object Type or Attribute Key | Published Date | Examples | Notes |
---|---|---|---|---|---|
0 (first token) | Indicator.Value | 1 (second token) | N/A | 00d48afbba5ef9ead b572730b2d0cafa |
N/A |
2 (third token) | Indicator.Attribute | Risk Score | N/A | 89 | Updatable |
2 (third token) | Indicator.Attribute | Normalized Risk | N/A | High | Mapped using Risk Score Normalization Mapping user field; Updatable |
3 (fourth token) | Indicator.Attribute | Risk String | N/A | 4/10 | Updatable |
4 (fifth token)[].CriticalityLabel | Indicator.Attribute | Criticality | 4 (fifth token)[].Timestamp | Suspicious | Updatable. The highest criticality level is selected. |
4 (fifth token)[].Rule | Indicator.Attribute | Associated Rule | 4 (fifth token)[].Timestamp | Linked to Malware | N/A |
4 (fifth token)[].EvidenceString | Indicator.Attribute | Evidence | 4 (fifth token)[].Timestamp | Previous sightings on 36 sources including: ... | N/A |
Recorded Future Analyst Note
The Recorded Future Analyst Note feed ingests Reports, Indicators and Attack Patterns.
POST https://api.recordedfuture.com/analyst-note/search
Sample Response:
{
"data": [
{
"source": {
"id": "VKz42X",
"name": "Insikt Group",
"type": "Source"
},
"attributes": {
"validated_on": "2020-02-06T06:59:32.784Z",
"published": "2020-02-06T06:59:32.784Z",
"text": "some text",
"attachment": "APT_FIN7.yar",
"topic": [
{
"id": "TXSFt0",
"name": "Flash Report",
"type": "Topic"
}
],
"title": "Mailto Ransomware Targets Enterprise Networks",
"note_entities": [
{
"id": "bLfMiL",
"name": "Mailto Ransomware",
"type": "Malware"
}
],
"context_entities": [
{
"id": "J6UzbO",
"name": "Bleeping Computer",
"type": "Source"
}
],
"validation_urls": [
{
"id": "url:url:https://www.bleepingcomputer.com/news/security/mailto-netwalker-ransomware-targets-enterprise-networks/",
"name": "url:https://www.bleepingcomputer.com/news/security/mailto-netwalker-ransomware-targets-enterprise-networks/",
"type": "URL"
},
{
"id": "url:url:https://twitter.com/VK_Intel/status/1225086186445733889?s=20",
"name": "url:https://twitter.com/VK_Intel/status/1225086186445733889?s=20",
"type": "URL"
}
]
},
"id": "cu1WGK"
}
],
"counts": {
"returned": 10,
"total": 19216
}
}
ThreatQuotient provides the following default mapping for this feed:
Feed Data Path | ThreatQ Entity | ThreatQ Object Type or Attribute Key | Examples | Notes | |
---|---|---|---|---|---|
.data[].attributes. title |
Report.Name | Report | "Mailto Ransomware Targets Enterprise Networks" | N/A | |
.data[].attributes. published |
Report.Published_at | N/A | "2020-02-06T06:59:32.784Z" | This date will also be used for related indicators and attack patterns. | |
.data[].attributes. text |
Report.Description | Description | "text" | Description formatted using context information like Metadata, Topics, Notes and Contextual Entities, and Reference URLs | |
.data[].source. name |
Report.Attribute/ Signature.Attribute/ Attachment.Attribute |
Recorded Future Source | "Insikt Group" | N/A | |
.data[].attributes. topic[].name |
Report.Attribute/ Signature.Attribute/ Attachment.Attribute |
Topic Name | "Flash Report" | User-Configurable | |
.data[].id | Report.Attribute/ Signature.Attribute/ Attachment.Attribute |
Recorded Future URL | "https://app.recordedfuture. com/portal/research/analyst /doc:cu1WGK" |
Link formatted using .id |
|
.data[].attributes .topic[].name |
Report.Tag/ Signature.tag/ Attachment.tag |
N/A | "Informational" | User-Configurable | |
.data[].attributes. context_entities |
N/A | N/A | N/A | *See Entities Mapping |
|
.data[].attributes. note_entities |
N/A | N/A | N/A | *See Entities Mapping |
|
.data[].attributes. attachment |
Attachment.Value | N/A | APT_FIN7.yar | User-Configurable. The .data[].attributes.attachment is used to download the file. |
|
.data[].attributes. attachment |
Signature.Value | Yara, Snort, Custom(Sigma,Nuclei) | N/A | User-Configurable. The content of the .data[].attributes.attachment downloaded file. Signature are also related to ingested Attachments, Malware and Adversaries. |
|
.data[].attributes. attachment |
Signature.Attribute | <Various Names> | N/A | Parsed from the content of the .data[].attributes.attachment downloaded file. |
|
.data[].attributes. attachment |
Signature Related Indicators | <Various Types> | N/A | Parsed from the content of the .data[].attributes.attachment downloaded file. |
Entities Mapping
This mapping will be used to map both values from context_entities
and note_entities
. The data sample and mapping are below:
Sample Response:
{
"context_entities": [
{
"id": "J6UzbO",
"name": "Bleeping Computer",
"type": "Source",
"description": "some description"
}
]
}
indicator_type_map:
InternetDomainName: FQDN
URL: URL
IpAddress: IP Address
EmailAddress: Email Address
FileName: Filename
Username: Username
Hash: MD5, SHA-1, SHA-256
CyberVulnerability: CVE
premapped_entities:
- Malware
- MitreAttackIdentifier
- CyberVulnerability
- Hashtag
- Image
The integration will filter based by type. If the value of the type
key is contained in the indicator_type_map below or is equal to Hash
, an indicator will be ingested (the published_at date will be the same as for the report object). If the type
key is equal to Malware
, an object of type Malware type will be ingested. If the type
key is equal to MitreAttackIdentifier
, an object of Attack Pattern type will be ingested. Else, attributes will be created for the main report
object.
Feed Data Path | ThreatQ Entity | ThreatQ Object Type or Attribute Key | Examples | Notes |
---|---|---|---|---|
.name | Report.Attribute/Indicator.Attribute | .type | N/A | *See Event Attributes Mapping below. If type is Product and there are related vulnerabilities, change the Product attribute key to Affected Product |
.text | Report.Attribute | .description | N/A | N/A |
.name | Indicator.Value | .type | 98.123.54.12 |
IOC is enabled Ingest Selected Primary Entities as Indicators or Ingest Selected Supporting Entities as Indicators |
.type | Indicator.Type | .name | Ip Address | The value for this will be indicator_type_map[.type] if it exists there. If the value is Hash , the value length will be analysed and based on it it will be either MD5 , SHA-1 , or SHA-256 . |
.name | Adversary.Value | N/A | N/A | If .type is Organization |
.name | Adversary.Attribute | Category | "Bleeping Computer" | If .type is CyberThreatActorCategory |
.name | Identity.Value | N/A | john.doe@acme.com |
We ingest the Email Address as a Identity from "supporting" entities |
.name | Attack Pattern.Value | N/A | T1023 - MITRE Technique Name |
If type is equal to MitreAttackIdentifier |
.name | Malware.Value | N/A | Mailto Ransomware |
If .type is equal to Malware |
.name | Malware.Attribute | Category | N/A | If .type id equal to MalwareCategory |
.name | Vulnerability.Value | N/A | N/A | If the .type is equal to CyberVulnerability |
.name | Vulnerability.Attribute/Indicator.Attribute | Affected Product | Citrix |
Object type is based on Ingest CVEs As selection |
Context (i.e. Malware, Adversaries, Attributes, and Attack Patterns) from the "primary" entities list will now be applied to the indicators of compromise from the "primary" entities list.
Recorded Future Alerts
The Recorded Future Alerts feed Recorded Future alerts as ThreatQ Events and all the related Indicators, Malware, Adversaries, Attack Patterns and Vulnerabilities, Image files and Entity objects.
GET https://api.recordedfuture.com/alert/v3
Sample Response:
{
"data": [
{
"review": {
"note": null,
"status_in_portal": "New",
"assignee": null,
"status": "no-action"
},
"owner_organisation_details": {
"organisations": [
{
"organisation_id": "uhash:ER135KQ6oL",
"organisation_name": "ThreatQ - Partner"
}
],
"enterprise_id": "uhash:DimzHe41vx",
"enterprise_name": "ThreatQ - Partner"
},
"url": {
"api": "https://api.recordedfuture.com/v3/alerts/rj540x",
"portal": "https://app.recordedfuture.com/live/sc/notification/?id=rj540x"
},
"rule": {
"name": "Cyber Espionage, Related Vulnerabilities",
"id": "nt4XZZ",
"url": {
"portal": "https://app.recordedfuture.com/live/sc/ViewIdkobra_view_report_item_alert_editor?view_opts=%7B%22reportId%22%3A%22nt4XZZ%22%2C%22bTitle%22%3Atrue%2C%22title%22%3A%22Cyber+Espionage%2C+Related+Vulnerabilities%22%7D"
}
},
"id": "rj540x",
"triggered_by": [
{
"entity_paths": [
[
{
"attribute": {
"id": "CredentialLeak.targets"
},
"entity": {
"id": "email:s.grishin@delta.nl",
"name": "s.grishin@delta.nl",
"type": "EmailAddress"
}
}
]
]
}
],
"hits": [
{
"entities": [
{
"id": "img:e2cd9495-937b-40a4-b5d7-f0fe89184040",
"name": "e2cd9495-937b-40a4-b5d7-f0fe89184040",
"type": "Image"
},
{
"id": "B_HE4",
"name": "Google",
"type": "Company"
},
{
"id": "idn:reuters.com",
"name": "reuters.com",
"type": "InternetDomainName"
},
{
"id": "Xw2PY",
"name": "Frankfurt",
"type": "Airport"
},
{
"id": "rVnb7k",
"name": "Rhysida",
"type": "Malware"
},
{
"id": "J0Nl-p",
"name": "Ransomware",
"type": "MalwareCategory"
},
{
"id": "K_4o-y",
"name": "Anonymous Sudan",
"type": "Organization"
},
{
"id": "I_7J4G",
"name": "Hacktivist",
"type": "CyberThreatActorCategory"
},
{
"id": "mitre:T1048",
"name": "T1048",
"type": "MitreAttackIdentifier"
},
{
"id": "email:mary.silverstein@delta.com",
"name": "mary.silverstein@delta.com",
"type": "EmailAddress"
},
{
"id": "jc5TL-",
"name": "ProxyShell",
"type": "CyberVulnerability",
"description": "ProxyShell and Log4J Vulnerabilities Were the Most Exploited Flaws in 2021."
}
],
"document": {
"source": {
"id": "source:hPTFPY",
"name": "RedAlert | Blog",
"type": "Source"
},
"title": "2022 Activities Summary of SectorA groups (ENG)",
"url": "https://redalert.nshc.net/2023/06/08/2022-activities-summary-of-sectora-groups-eng/",
"authors": []
},
"fragment": "In this operation, the group targeted engineering companies in the e id=0qjp>energyth an initial infiltration method.",
"id": "HE-xwAAZh-v",
"language": "eng",
"primary_entity": {
"id": "kvXvR5",
"name": "CVE-2021-44228",
"type": "CyberVulnerability",
"description": "Apache Log4j2 2.0-beta9 through 2.15.0 (excluding security releases 2.12.2, 2.12.3, and 2.3.1) JNDI features used in configuration, log messages, and parameters do not protect against attacker controlled LDAP and other JNDI related endpoints. An attacker who can control log messages or log message parameters can execute arbitrary code loaded from LDAP servers when message lookup substitution is enabled. From log4j 2.15.0, this behavior has been disabled by default. From version 2.16.0 (along with 2.12.2, 2.12.3, and 2.3.1), this functionality has been completely removed. Note that this vulnerability is specific to log4j-core and does not affect log4net, log4cxx, or other Apache Logging Services projects."
},
"analyst_note": null
}
],
"ai_insights": {
"comment": "The Recorded Future AI requires more references in order to produce a summary.",
"text": null
},
"log": {
"note_author": null,
"note_date": null,
"status_date": null,
"triggered": "2023-06-08T04:53:13.444Z",
"status_change_by": null
},
"title": "Cyber Espionage, Related Vulnerabilities - Rise: CVE-2021-44228",
"type": "ENTITY"
}
],
"counts": {
"returned": 10,
"total": 2653
}
}
ThreatQuotient provides the following default mapping for this feed:
Feed Data Path | ThreatQ Entity | ThreatQ Object Type or Attribute Key | Published Date | Examples | Notes |
---|---|---|---|---|---|
.data[].title | Event.Title | N/A | .data[].log.note_date / .data[].log.triggered | Cyber Espionage, Related Vulnerabilities - Rise: CVE-2021-44228 | If .data[].log.note_date is not present .data[].log.triggered is used as Published Date |
.data[].log.triggered | Event.Happened_at | N/A | N/A | 2023-06-08T04:53:13.444Z | N/A |
.data[].* (See Notes) | Event.Description | N/A | N/A | The Recorded Future AI requires more references in order to produce a summary... | Description is constructed from different Alert details, for example: Alert Metadata, AI Insights, and Hits information |
.data[].id | Event.Attribute | Alert ID | .data[].log.note_date / .data[].log.triggered | N/A | N/A |
.data[].review.assignee | Event.Attribute | Assignee | .data[].log.note_date / .data[].log.triggered | N/A | Updatable |
.data[].log.note_author | Event.Attribute | Note Author | .data[].log.note_date / .data[].log.triggered | N/A | N/A |
.data[].review.status_ in_portal |
Event.Attribute | Alert Status | .data[].log.note_date / .data[].log.triggered | no-action | Updatable |
.data[].rule.name | Event.Attribute | Triggered Rule Name | .data[].log.note_date / .data[].log.triggered | Cyber Espionage, Related Vulnerabilities | N/A |
.data[].type | Event.Attribute | Alert Type | .data[].log.note_date / .data[].log.triggered | ENTITY | N/A |
.data[].owner_organis ation_details.enterpri se_name |
Event.Attribute | Organisation Enterprise name | .data[].log.note_date / .data[].log.triggered | ThreatQ - Partner | N/A |
.data[].hits[].document. url |
Event.Attribute | URL | N/A | https://www.virustotal. com/84387248326473645 |
Ingested as attribute if 'www.virustotal.com' in .url |
.data[].hits[].entities[]. name |
Event.Tags | N/A | N/A | ddosattacks | If data.hits[].entities[].type is Hashtag . Character # is removed. |
.data[].hits[].entities[]. name |
Indicator.Value | data.hits[].entities[].type | N/A | N/A | See Related Indicator Type Mapping table below. |
.data[].rule.name | Indicator.Attribute | Entity Discovered by Rule | N/A | Cyber Espionage, Related Vulnerabilities | N/A |
.data[].hits[].entities[]. name |
Event.Attribute | data.hits[].entities[].type | N/A | N/A | See Event Attributes Mapping table below. |
.data[].hits[].entities[]. name |
Related.Malware. Value |
N/A | N/A | Rhysida | If data.hits[].entities[].type is Malware |
.data[].hits[].entities[]. name |
Event.Attribute | Malware Category | N/A | Ransomware | If data.hits[].entities[].type is MalwareCategory |
.data[].hits[].entities[]. name |
Event.Attribute | Organization | N/A | Anonymous Sudan | If data.hits[].entities[].type is Organization and it is not an Adversary |
.data[].hits[].entities[]. name |
Related.Adversary. Value |
N/A | N/A | Anonymous Sudan | If data.hits[].entities[].type is Organization |
.data[].hits[].entities[]. name |
Event.Attribute | Cyber Threat Actor Category | N/A | Hacktivist | If data.hits[].entities[].type is CyberThreatActorCategory |
.data[].hits[].entities[]. name |
Related.Attack Patten.Value | N/A | N/A | T1048 | If data.hits[].entities[].type is MitreAttackIdentifier |
.data[].hits[].entities[]. name |
Related.Vulnerability. Value |
N/A | N/A | ProxyShell | If data.hits[].entities[].type is CyberVulnerability or user config Save CVE Data as contains Vulnerabilities |
.data[].hits[].entities[]. description |
Related.Vulnerability. Description |
N/A | N/A | ProxyShell and Log4J Vulnerabilities Were the Most Exploited Flaws in 2021. | If data.hits[].entities[].type is CyberVulnerability or user config Save CVE Data as contains Vulnerabilities |
.data[].hits[].entities[]. name |
Related.Identity.Value | N/A | N/A | john.doe@acme.com | If data.hits[].entities[].type is EmailAddress |
.data[].hits[].entities[]. name |
Related.Account.Value | N/A | N/A | john.doe@acme.com | If data.hits[].entities[].type is EmailAddress && Compromised Account Rule is configured & matched |
.data[].hits[].entities[].name | Related.File | N/A | N/A | "Recorded_future_ e2cd9495-937b-40 a4-b5d7-f0fe89184 040" |
The ID is used to download the image in a supplemental call, if data.hits[].entities[].type is Image . User-configurable. |
.data[].triggered_by[].entity_paths[].entity.name | Related.Entity.Title | N/A | N/A | s.grishin@delta.nl | User-configurable. |
.data[].triggered_by[].entity_paths[].entity.type | Entity.Attribute | RF Type | N/A | EmailAddress | N/A |
.data[].triggered_by[].entity_paths[].entity.id | Entity.Attribute | Entity ID | N/A | email:s.grishin@delta.nl | N/A |
.data[].triggered_by[].entity_paths[].attribute.id | Entity.Attribute | RF_ID | N/A | CredentialLeak.targets | N/A |
In the previous table, there is a Related Indicator that is set dynamically. This is because the ThreatQ Object Type is extracted from the same path .data.hits[].entities[].type
if the .data.hits[].entities[].type
is one from the Related Indicator Type Mapping table listed below.
Related Indicator Type Mapping
Recorded Future Indicator Type | ThreatQ Indicator Type | Notes |
---|---|---|
Hash | MD5 | If the length of the hash value is 32 characters. |
Hash | SHA-1 | If the length of the hash value is 40 characters. |
Hash | SHA-256 | If the length of the hash value is 64 characters. |
CyberVulnerability | CVE | If '.data.hits[].entities[].name' contains 'CVE' and user config Save CVE Data as contains Indicators. |
URL | URL | N/A |
Domain | FQDN | N/A |
IPAddress | IP Address | N/A |
FileName | Filename | N/A |
InternetDomainName | FQDN | N/A |
Event Attributes Mapping
In the previous table, Related Indicator Type Mapping, there is a Related Indicator Attribute that is set dynamically. We do this because the Attribute Key
is extracted from the same path .data.hits[].entities[].type
if the .data.hits[].entities[].type
is one from the table listed below.
Recorded Future Attribute Type | ThreatQ Attribute Key |
---|---|
AttackVector | Attack Vector |
Product | Affected Product |
Company | Company |
City | City |
Country | Country |
Facility | Facility |
FileNameExtension | File Extension |
FileType | File Type |
GeoEntity | Geo Entity |
Industry | Industry |
IndustryTerm | Industry Term |
Logotype | Logotype |
Operation | Operation |
OrgEntity | Organization Entity |
PhoneNumber | Phone Number |
ProvinceOrState | State |
Region | Region |
Technology | Technology |
Topic | Topic |
Recorded Future Playbook Alerts
The Recorded Future Playbook Alerts feed retrieves a list of alerts filtered by the values provided in the configuration section. For each of the alerts, the playbook_alert_id
is used to call the Recorded Future - Get Playbook Alerts by Category supplemental feed, to fetch the full alert context.
POST https://api.recordedfuture.com/playbook-alert/search
Sample Response:
{
"status": {
"status_code": "Ok",
"status_message": "Playbook alert search successful"
},
"data": [
{
"playbook_alert_id": "task:2803c5f5-aa32-41ce-98c1-41a7771cd9ad",
"created": "2022-11-08T09:44:02.447Z",
"updated": "2022-11-08T09:44:06.584Z",
"status": "New",
"category": "domain_abuse",
"priority": "Informational",
"title": "juhaokan.ga",
"owner_id": "uhash:ER135KQ6oL",
"owner_name": "ThreatQ - Partner",
"organisation_id": "uhash:DimzHe41vx",
"organisation_name": "ThreatQ - Partner"
}
]
}
ThreatQuotient provides the following default mapping for this feed:
The mapping for this feed is based on the JSON response from the Recorded Future - Get Playbook Alerts by Category supplemental feed. Each mapping is based on an item within the data list within the JSON response.
Feed Data Path | ThreatQ Entity | ThreatQ Object Type or Attribute Key | Published Date | Examples | Notes |
---|---|---|---|---|---|
.panel_status.case_rule_label, .panel_status.entity_name, .panel_status.priority, .panel_status.entity_criticality |
Event.Title | Recorded Future Alert | .panel_status.created |
Domain Abuse Alert: juhaokan.ga Priority: Informational Criticality: Medium |
ThreatQ uses the four values to create an unique title |
.panel_status.title |
Event.Title | Recorded Future Alert | .panel_status.created |
juhaokan.ga |
N/A |
.panel_evidence_summary.* , .panel_evidence_whois.*
|
Event.Description | N/A | N/A | N/A | Description HTML is built based on available fields |
.panel_status.status |
Event.Attribute | Status | .panel_status.created |
New |
Updatable |
.panel_status.case_rule_label |
Event.Attribute | Category | .panel_status.created |
Domain Abuse |
Updatable |
.panel_status.priority |
Event.Attribute | Priority | .panel_status.created |
Informational |
Updatable |
.panel_status.owner_name |
Event.Attribute | Owner | .panel_status.created |
Acme Corp |
Updatable |
.panel_status.organisation_name |
Event.Attribute | Organization | .panel_status.created |
Acme Corp |
N/A |
.panel_status.assignee_name |
Event.Attribute | Assignee | .panel_status.created |
John Doe |
N/A |
.panel_status.lifecycle_stage |
Event.Attribute | Lifecycle Stage | .panel_status.created |
Disclosure |
Only available for Cyber Vulnerability Alerts |
.panel_status.entity_name |
Related.Indicator | FQDN | .panel_status.created |
jlonsdale.social |
N/A |
.panel_status.entity_name |
Related.Vulnerability, Related.Indicator | CVE | .panel_status.created |
CVE-2024-10234 |
N/A |
.panel_status.risk_score |
Event.Attribute, Related.Indicator.Attribute | Risk Score | .panel_status.created |
5 |
Updatable |
.panel_status.risk_score |
Event.Attribute, Related.Indicator.Attribute | Normalized Risk | .panel_status.created |
High | Mapped using Risk Score Normalization Mapping user field; Updatable |
.panel_status.entity_ |
Event.Attribute, Related.Indicator.Attribute | Criticality | .panel_status.created |
Low |
Updatable |
.panel_status.context_ |
Event.Attribute, Related.Indicator.Attribute | Context Data | .panel_status.created |
Phishing Host |
N/A |
.panel_status.targets |
Event.Attribute, Relate.Indicator.Attribute | Target | .panel_status.created |
idn:lonsdale.fr |
User-configurable |
.panel_evidence_dns.ip_ |
Related.Indicator | IP Address | .panel_status.created |
217.160.0.153 |
N/A |
.panel_evidence_dns.ip_ |
Related.Indicator.Attribute | Record Type | .panel_status.created |
N/A | Updatable |
.panel_evidence_dns.ip_ |
Related.Indicator.Attribute | Risk Score | .panel_status.created |
27 |
Updatable |
.panel_evidence_dns.ip_ |
Related.Indicator.Attribute | Normalized Risk | .panel_status.created |
Medium | Mapped using Risk Score Normalization Mapping user field; Updatable |
.panel_evidence_dns.ip_ |
Related.Indicator.Attribute | Criticality | .panel_status.created |
Medium |
Updatable |
.panel_evidence_dns.ip_ |
Related.Indicator.Attribute | Context Data | .panel_status.created |
Phishing Host |
N/A |
.panel_evidence_dns.mx_ |
Related.Indicator | FQDN | .panel_status.created |
mx00.ionos.co.uk |
N/A |
.panel_evidence_dns.mx_ |
Related.Indicator.Attribute | Record Type | .panel_status.created |
N/A | Updatable |
.panel_evidence_dns.mx_ |
Related.Indicator.Attribute | Risk Score | .panel_status.created |
0 |
Updatable |
.panel_evidence_dns.mx_ |
Related.Indicator.Attribute | Normalized Risk | .panel_status.created |
Low | Mapped using Risk Score Normalization Mapping user field; Updatable |
.panel_evidence_dns.mx_ |
Related.Indicator.Attribute | Criticality | .panel_status.created |
0 |
Updatable |
.panel_evidence_dns.mx_ |
Related.Indicator.Attribute | Context Data | .panel_status.created |
Active Mail Server |
N/A |
.panel_evidence_dns.ns_ |
Related.Indicator | FQDN | .panel_status.created |
ns1025.ui-dns.org |
N/A |
.panel_evidence_dns.ns_ |
Related.Indicator.Attribute | Record Type | .panel_status.created |
N/A | Updatable |
.panel_evidence_dns.ns_ |
Related.Indicator.Attribute | Risk Score | .panel_status.created |
5 |
Updatable |
.panel_evidence_dns.ns_ |
Related.Indicator.Attribute | Normalized Risk | .panel_status.created |
Low | Mapped using Risk Score Normalization Mapping user field; Updatable |
.panel_evidence_dns.ns_ |
Related.Indicator.Attribute | Criticality | .panel_status.created |
Low |
Updatable |
.panel_evidence_dns.ns_ |
Related.Indicator.Attribute | Context Data | .panel_status.created |
Active Mail Server |
N/A |
.panel_evidence_summary. |
Related.Vulnerability.Attribute | Affected Product | .panel_status.created |
MySQL |
Also applied to main event |
.panel_evidence_summary. |
Related.Indicator | IP Address | .panel_status.created |
N/A | N/A |
.panel_evidence_summary. |
Related.Malware | N/A | .panel_status.created |
Lazarus |
N/A |
.panel_evidence_summary. |
Related.Asset | N/A | .panel_status.created |
N/A | N/A |
Recorded Future - Get Playbook Alerts by Category (Supplemental)
The Recorded Future - Get Playbook Alerts by Category supplemental feed related data for each of the ingested events retrieved from the Alert endpoint. The key .data[].playbook_alert_id
is used to call the supplemental feed.
POST https://api.recordedfuture.com/playbook-alert/{{ category }}
The API will return a slightly different response based on the category of the alert. See the Recorded Future Playbook Alerts feed for the mapping of the data.
Domain Abuse
Sample Response:
{
"status": {
"status_code": "Ok",
"status_message": "Domain Abuse lookup successful"
},
"data": {
"panel_status": {
"entity_name": "lonsdale.social",
"entity_criticality": "Low",
"risk_score": 5,
"context_list": [
{
"context": "Phishing Host"
},
{
"context": "Active Mail Server"
}
],
"targets": [
"idn:lonsdale.fr",
"idn:lonsdale.us",
"idn:lonsdale.porn",
"idn:lonsdale.club"
],
"status": "New",
"priority": "High",
"created": "2022-11-09T08:20:15.778Z",
"case_rule_id": "report:nvAj-X",
"case_rule_label": "Domain Abuse",
"owner_id": "uhash:ER135KQ6oL",
"owner_name": "ThreatQ - Partner",
"organisation_id": "uhash:DimzHe41vx",
"organisation_name": "ThreatQ - Partner"
},
"panel_action": [],
"panel_evidence_summary": {
"explanation": "Alert was created as a result of a triggered typosquat detection",
"resolved_record_list": [
{
"entity": "idn:ns1025.ui-dns.org",
"risk_score": 5,
"criticality": "Low",
"record_type": "NS",
"context_list": []
},
{
"entity": "ip:217.160.0.153",
"risk_score": 27,
"criticality": "Medium",
"record_type": "A",
"context_list": [
{
"context": "Phishing Host"
}
]
},
{
"entity": "idn:mx00.ionos.co.uk",
"risk_score": 0,
"criticality": "0",
"record_type": "MX",
"context_list": [
{
"context": "Active Mail Server"
}
]
},
{
"entity": "idn:mx01.ionos.co.uk",
"risk_score": 0,
"criticality": "0",
"record_type": "MX",
"context_list": [
{
"context": "Active Mail Server"
}
]
}
],
"screenshots": [
{
"description": "An image associated with the Playbook Alert",
"image_id": "img:349f92e2-fa93-4282-be15-e7a330130686",
"created": "2022-11-09T08:20:51.685Z"
}
]
},
"panel_evidence_dns": {
"ip_list": [
{
"entity": "ip:217.160.0.153",
"risk_score": 27,
"criticality": "Medium",
"record_type": "A",
"context_list": [
{
"context": "Phishing Host"
}
]
}
],
"mx_list": [
{
"entity": "idn:mx00.ionos.co.uk",
"risk_score": 0,
"criticality": "0",
"record_type": "MX",
"context_list": [
{
"context": "Active Mail Server"
}
]
}
],
"ns_list": [
{
"entity": "idn:ns1115.ui-dns.de",
"risk_score": 0,
"criticality": "0",
"record_type": "NS",
"context_list": [
{
"context": "Active Mail Server"
}
]
},
{
"entity": "idn:ns1090.ui-dns.biz",
"risk_score": 5,
"criticality": "Low",
"record_type": "NS",
"context_list": []
}
]
},
"panel_evidence_whois": {
"body": [
{
"provider": "whois",
"entity": "idn:lonsdale.social",
"attribute": "attr:whois",
"value": {
"privateRegistration": false,
"status": "clientTransferProhibited addPeriod",
"nameServers": [
"idn:ns1066.ui-dns.com",
"idn:ns1025.ui-dns.org",
"idn:ns1115.ui-dns.de",
"idn:ns1090.ui-dns.biz"
],
"registrarName": "IONOS SE",
"createdDate": "2022-11-08T19:44:16.000Z"
},
"added": "2022-11-09T08:21:13.682Z"
},
{
"provider": "whois",
"entity": "idn:btbo2.top",
"attribute": "attr:whoisContacts",
"value": {
"organization": "REDACTED FOR PRIVACY",
"city": "REDACTED FOR PRIVACY",
"name": "REDACTED FOR PRIVACY",
"state": "REDACTED FOR PRIVACY",
"street1": "REDACTED FOR PRIVACY",
"country": "REDACTED FOR PRIVACY",
"postalCode": "REDACTED FOR PRIVACY",
"telephone": "REDACTED FOR PRIVACY",
"type": "technicalContact"
},
"added": "2022-11-08T10:28:20.712Z"
}
]
},
"panel_log": [
{
"id": "uuid:26b4be48-e1e0-4773-97d7-b8c8260fe53b",
"created": "2022-11-09T08:27:31.377Z",
"modified": "2022-11-09T08:27:31.377Z",
"action_priority": "Informational"
}
]
}
}
Third Party Risk
Sample Response:
{
"status": {
"status_code": "Ok",
"status_message": "Playbook alert bulk lookup successful."
},
"data": [
{
"playbook_alert_id": "task:220833e1-6a00-489c-8e6f-08cb11561aea",
"panel_status": {
"status": "New",
"priority": "Moderate",
"created": "2024-05-09T18:03:42.784Z",
"updated": "2024-05-13T05:11:28.845Z",
"case_rule_id": "report:r2TUUz",
"case_rule_label": "Third Party Risk",
"owner_id": "uhash:1RmVv0sQ33",
"owner_name": "Acme Corp",
"organisation_id": "uhash:4WfuvVnaap",
"organisation_name": "Acme Corp",
"owner_organisation_details": {
"organisations": [
{
"organisation_id": "uhash:4WfuvVnaap",
"organisation_name": "Acme Corp"
}
],
"enterprise_id": "uhash:4WfuvVnaap",
"enterprise_name": "Acme Corp"
},
"entity_id": "CEBTA",
"entity_name": "Tele Communications",
"entity_criticality": "Medium",
"risk_score": 64,
"targets": [
{
"name": "Infections Recently Reported in Company Infrastructure"
},
{
"name": "Recent Possible Malware in Company Infrastructure"
}
],
"actions_taken": []
},
"panel_evidence_summary": {
"assessments": [
{
"risk_rule": "Infections Recently Reported in Company Infrastructure",
"level": 2,
"added": "2024-05-13T05:11:09.882Z",
"evidence": {
"type": "ip_rule",
"summary": "4 sightings: Suspected Malicious Packet Source seen for 1 IP Address on company infrastructure: 121.241.162.25. Recent Botnet Traffic seen for 3 IP Addresses on company infrastructure: 203.199.243.0, 14.143.123.78, 14.143.187.214",
"data": [
{
"name": "Suspected Malicious Packet Source",
"criticality": 2,
"number_of_ip_addresses": 1
},
{
"name": "Recent Botnet Traffic",
"criticality": 2,
"number_of_ip_addresses": 3
}
]
}
},
{
"risk_rule": "Recent Possible Malware in Company Infrastructure",
"level": 2,
"added": "2024-05-13T05:11:09.882Z",
"evidence": {
"type": "ip_rule",
"summary": "1 sighting: Recent Positive Malware Verdict seen for 1 IP Address on company infrastructure: 14.142.45.148",
"data": [
{
"name": "Recent Positive Malware Verdict",
"criticality": 2,
"number_of_ip_addresses": 1
}
]
}
}
]
}
}
]
}
Cyber Vulnerability
Sample Response:
{
"status": {
"status_code": "Ok",
"status_message": "Playbook alert bulk lookup successful."
},
"data": [
{
"playbook_alert_id": "task:174cd0d2-2fad-482b-956d-97e3c3e06ab3",
"panel_status": {
"status": "New",
"priority": "Informational",
"assignee_name": "John Doe",
"assignee_id": "uhash:12QsDAJfc1",
"created": "2024-04-25T14:10:30.241Z",
"updated": "2024-04-25T14:10:30.241Z",
"case_rule_id": "report:k0g1wZ",
"case_rule_label": "Cyber Vulnerability",
"owner_id": "uhash:5ApZv0sR31",
"owner_name": "Acme Corp",
"organisation_id": "uhash:1WauvZmavb",
"organisation_name": "Acme Corp",
"owner_organisation_details": {
"organisations": [
{
"organisation_id": "uhash:5ApZv0sR31",
"organisation_name": "Acme Corp"
}
],
"enterprise_id": "uhash:1WauvZmavb",
"enterprise_name": "Acme Corp"
},
"entity_id": "vj-Vlg",
"entity_name": "CVE-2024-4058",
"entity_criticality": "Medium",
"risk_score": 33,
"lifecycle_stage": "Disclosure",
"targets": [
{
"name": "Google Chrome"
}
],
"actions_taken": []
},
"panel_evidence_summary": {
"summary": {
"targets": [
{
"name": "Google Chrome"
}
],
"lifecycle_stage": "Disclosure",
"risk_rules": [
{
"rule": "Recently Referenced by Insikt Group",
"description": "3 sightings on 1 source: Insikt Group. 3 reports including Google Patches Chrome Vulnerability CVE-2024-4059 and Additional Flaw Tracked as CVE-2024-4060. Most recent link (Apr 26, 2024): https://app.recordedfuture.com/portal/analyst-note/doc:vn9yUw"
},
{
"rule": "Linked to Historical Cyber Exploit",
"description": "21 sightings on 7 sources including: InfoSecPortal.ru | ПоÑледние ОбновлениÑ, SecurityWeek, Anti-Malware.ru | ÐовоÑти Информационной БезопаÑноÑти, xynik.com, Xakep.ru. Most recent tweet: Ð’ Chrome иÑправили критичеÑкую уÑзвимоÑть, за которую ÑкÑперты получили 16 000 долларов Ðа Ñтой неделе Google выпуÑтила обновление Ð´Ð»Ñ Chrome 124, которое иÑправлÑет четыре Ñразу уÑзвимоÑти, Ð²ÐºÐ»ÑŽÑ‡Ð°Ñ ÐºÑ€Ð¸Ñ‚Ð¸Ñ‡ÐµÑкую проблему CVE-2024-4058 в… Подробнее https://t.co/Tnmg7ZPfSg https://t.co/UpviubMKJY. Most recent link (Apr 26, 2024): https://twitter.com/pc7ooo/statuses/1783975885718098318"
},
{
"rule": "Web Reporting Prior to CVSS Score",
"description": "Reports involving CVE Vulnerability before CVSS score is released by NVD."
}
]
},
"affected_products": [
{
"name": "Google Chrome"
}
],
"insikt_notes": [
{
"id": "doc:vn9yUw",
"title": "Google Patches Chrome Vulnerability CVE-2024-4059 and Additional Flaw Tracked as CVE-2024-4060",
"published": "2024-04-26T13:22:37.371Z",
"topic": "Validated Intelligence Event",
"fragment": "In recent updates announced on April 24, 2024, Google has addressed a critical vulnerability CVE-2024-4058 in its Chrome web browser that could allow threat actors to take control of a user's system. The vulnerability is related to the ANGLE graphics layer engine and has a \"critical\" severity rating."
},
{
"id": "doc:vm4TAU",
"title": "CVE-2024-4058 allows Type Confusion affecting Google Chrome",
"published": "2024-04-25T16:31:33.504Z",
"topic": "Informational",
"fragment": "CVE-2024-4058 is a type confusion bug in the ANGLE graphics layer engine. A manipulation with an unknown input can lead to a type confusion vulnerability."
},
{
"id": "doc:vmfmEu",
"title": "Google Patches Four Vulnerabilities Affecting Chrome, Including Critical-Severity Vulnerability CVE-2024-4058",
"published": "2024-04-25T09:47:23.765Z",
"topic": "Validated Intelligence Event",
"fragment": "On April 24, 2024, Google patched four vulnerabilities affecting the Chrome browser. This included CVE-2024-4058, a critical-severity type confusion vulnerability that arises from a misinterpretation of data types within the Almost Native Graphics Layer Engine (ANGLE) of the Chrome browser. Successful exploitation of CVE-2024-4058 can allow threat actors to execute arbitrary code or evade sandboxes remotely with minimal user interaction, potentially leading to unauthorized access, data manipulation, and system compromise."
}
]
}
}
]
}
Code Repo Leakage
Sample Response:
{
"status": {
"status_code": "Ok",
"status_message": "Playbook alert bulk lookup successful."
},
"data": [
{
"playbook_alert_id": "task:f19c105a-5997-4a13-b54f-7b64816954fa",
"panel_status": {
"status": "New",
"priority": "Informational",
"created": "2024-05-01T22:05:52.838Z",
"updated": "2024-05-01T22:05:52.838Z",
"case_rule_id": "report:q_dg1Y",
"case_rule_label": "Data Leakage on Code Repository",
"owner_id": "uhash:7RaVs0sR31",
"owner_name": "Acme Corp",
"organisation_id": "uhash:1XfyvKnbbp",
"organisation_name": "Acme Corp",
"owner_organisation_details": {
"organisations": [
{
"organisation_id": "uhash:7RaVs0sR31",
"organisation_name": "Acme Corp"
}
],
"enterprise_id": "uhash:1XfyvKnbbp",
"enterprise_name": "Acme Corp"
},
"entity_id": "url:https://github.com/Inclusion-Bridge/2024-bridge-to-data-fundamentals",
"entity_name": "https://github.com/Inclusion-Bridge/2024-bridge-to-data-fundamentals",
"entity_criticality": "",
"risk_score": 0,
"targets": [
{
"name": "acme.org"
}
],
"actions_taken": []
},
"panel_evidence_summary": {
"repository": {
"id": "url:https://github.com/Inclusion-Bridge/2024-bridge-to-data-fundamentals",
"name": "https://github.com/Inclusion-Bridge/2024-bridge-to-data-fundamentals",
"owner": {
"name": "aifenaike"
}
},
"evidence": [
{
"assessments": [
{
"id": "attr:watchListEntityMention",
"title": "Watch List Entity Mention",
"value": "acme.org"
}
],
"targets": [
{
"name": "acme.org"
}
],
"url": "https://github.com/Inclusion-Bridge/2024-bridge-to-data-fundamentals/commit/5002107a89ad09e3b45bf07d45d400f1a4738f5a",
"content": "+Shenhua Group,276,37322,-0.8,1916.9,140911,37.9,Ling Wen,\"Mining, Crude-Oil Production\",Energy,270,China,\"Beijing, China\",http://www.shenhuagroup.com.cn,8,202200,47962\n+Greenland Holding Group,277,37240,12.8,1085.2,105495,-1.0,Zhang Yuliang,Real estate,Financials,311,China,\"Shanghai, China\",http://www.ldjt.com.cn,6,39887,8333\n+ACME,278,37105,5.5,1492.3,523194,22.9,Roger W. Ferguson Jr.,\"Insurance: Life, Health (Mutual)\",Financials,291,USA,\"New York, NY\",http://www.acme.org,20,12997,35583\n+Jardine Matheson,279,37051,0.1,2503.0,71523,39.3,Ben Keswick,Motor Vehicles and Parts,Motor Vehicles & Parts,273,China,\"Hong Kong, China\",http://www.jardines.com,18,430000,21800\n+Oracle,280,37047,-3.1,8901.0,112180,-10.4,Safra A. Catz,Computer Software,Technology,260,USA,\"Redwood City, CA\",http://www.oracle.com,11,136000,47289",
"published": "2024-05-01T22:03:09.273Z"
}
]
}
}
]
}
Recorded Future Fusion Files
The Recorded Future fusion files feed ingests threat intelligence information from the user selected Fusion feeds.
GET https://api.recordedfuture.com/v2/fusion/files?path={fusion_file_path}
Depending on the fetched Fusion File, the API response will be different. The following are examples and mappings for all of the possible files.
Command and Control IPs
/public/detect/c2_scanned_ips.json
Sample Response:
{ "count": 2, "results": [ { "ip": "2.56.116.210", "ports": [ { "port": 26, "protocol": "TCP" }, { "port": 24, "protocol": "TCP" }, { "port": 50050, "protocol": "TCP" } ], "malware": ["Cobalt Strike"], "last_seen_active": "2106-02-07", "last_scan": "2024-05-14" }, { "ip": "147.189.174.48", "ports": [ { "port": 6666, "protocol": "TCP" } ], "malware": ["AsyncRAT"], "last_seen_active": "2024-05-12", "last_scan": "2024-05-14" } ] }
ThreatQ provides the following default mapping for this pathway:
Mappings are based on each item within the results
key.
Feed Data Path | ThreatQ Entity | ThreatQ Object Type or Attribute Key | Published Date | Examples | Notes |
---|---|---|---|---|---|
.ip |
Indicator.Value | IP Address | .last_seen_active |
N/A | N/A |
.ports[].port |
Attribute | Scanned Port | .last_seen_active |
8080 |
N/A |
.malware[] |
Malware | N/A | .last_seen_active |
AsyncRAT |
N/A |
N/A | Attribute | Fusion File | .last_seen_active |
c2_scanned_ips |
N/A |
Known TOR IPs
/public/policy/tor_ips.json
Sample Response:
[ { "ip": "171.25.193.77", "name": "DFRI29", "flags": "EFGHRSDV" }, { "ip": "171.25.193.78", "name": "DFRI27", "flags": "EFGHRSDV" }, { "ip": "198.96.155.3", "name": "gurgle", "flags": "EFGHRSDV" } ]
ThreatQ provides the following default mapping for this pathway:
Mappings are based on each item within the array.
Feed Data Path | ThreatQ Entity | ThreatQ Object Type or Attribute Key | Published Date | Examples | Notes |
---|---|---|---|---|---|
.ip |
Indicator.Value | IP Address | N/A | N/A | N/A |
.name |
Attribute | TOR Name | N/A | gurgle |
N/A |
.flags |
Attribute | TOR Flags | N/A | EFGHRSDV |
N/A |
N/A | Attribute | Fusion File | N/A | tor_ips |
N/A |
Active RAT C2 IPs
/public/detect/ratcontrollers_ips.json
Sample Response:
[ { "hostnames": [], "ip": "208.100.26.240", "country": "", "asn": "", "port": "", "malware": "", "protocol": "", "signal": [] }, { "hostnames": [], "ip": "88.119.175.231", "country": "", "asn": "", "port": "", "malware": "", "protocol": "", "signal": [] }, { "hostnames": [], "ip": "103.97.176.121", "country": "", "asn": "", "port": "", "malware": "", "protocol": "", "signal": [] } ]
ThreatQ provides the following default mapping for this pathway:
Mappings are based on each item within the array.
Feed Data Path | ThreatQ Entity | ThreatQ Object Type or Attribute Key | Published Date | Examples | Notes |
---|---|---|---|---|---|
.ip |
Indicator.Value | IP Address or URL | N/A | N/A | Type will depend on if the .ip value starts with http or not. |
N/A | Attribute | Fusion File | N/A | ratcontrollers_ips |
N/A |
.asn |
Attribute | ASN | N/A | N/A | N/A |
.country |
Attribute | Country | N/A | N/A | N/A |
.malware |
Malware | N/A | N/A | Nanocore RAT |
N/A |
Fast Flux IPs
/public/detect/fflux_ips.json
Sample Response:
[ { "lastSeen": 1715817599000, "ip": "1.189.96.74" }, { "lastSeen": 1715817599000, "ip": "83.48.172.198" }, { "lastSeen": 1715817599000, "ip": "83.224.176.102" }, { "lastSeen": 1715817599000, "ip": "37.84.163.136" } ]
ThreatQ provides the following default mapping for this pathway:
Mappings are based on each item within the array.
Feed Data Path | ThreatQ Entity | ThreatQ Object Type or Attribute Key | Published Date | Examples | Notes |
---|---|---|---|---|---|
.ip |
Indicator.Value | IP Address | .lastSeen |
N/A | N/A |
N/A | Attribute | Fusion File | N/A | fflux_ips |
N/A |
Default IP Risklist Location Malware
"Name","Risk","RiskString","EvidenceDetails","MalwareFamilies","ASN","City","Country"
"198.98.57.26",99,"10/81","{""EvidenceDetails"":[{""Rule"":""Historically Linked to Intrusion Method"",""EvidenceString"":""14 sightings on 2 sources: Twitter, GitHub. 2 related intrusion methods: Cobalt Strike, Offensive Security Tools (OST). Most recent link (Mar 18, 2025): https://github.com/Xavier001/IOCs/commit/c3fda8db8e4d381df95e30ec9f9ff584e5d7735e"",""CriticalityLabel"":""Unusual"",""Timestamp"":1742338024422,""MitigationString"":"""",""Criticality"":1},{""Rule"":""Historical Suspected CC Server"",""EvidenceString"":""3 sightings on 2 sources: ThreatFox Infrastructure Analysis, Malware Patrol. ThreatFox identified 198.98.57.26:443 as possible TA0011 (Command and Control) for Cobalt Strike on January 17, 2025. Most recent link (Jan 17, 2025): https://threatfox.abuse.ch/ioc/1380526"",""CriticalityLabel"":""Unusual"",""Timestamp"":1737097322000,""MitigationString"":"""",""Criticality"":1},{""Rule"":""Historically Reported as a Defanged IP"",""EvidenceString"":""1 sighting on 1 source: Twitter. Most recent link (Dec 18, 2024): https://twitter.com/drb_ra/statuses/1869521052784878070"",""CriticalityLabel"":""Unusual"",""Timestamp"":1734563527000,""MitigationString"":"""",""Criticality"":1},{""Rule"":""Historical Botnet Traffic"",""EvidenceString"":""1 sighting on 1 source: External Sensor Data Analysis. 198.98.57.26 was identified as botnets in External Sensor data. Reported to Recorded Future on Oct 26, 2024."",""CriticalityLabel"":""Unusual"",""Timestamp"":1729980922163,""MitigationString"":"""",""Criticality"":1},{""Rule"":""Historical Spam Source"",""EvidenceString"":""1 sighting on 1 source: External Sensor Spam. 198.98.57.26 was identified as spam in External Sensor data. Reported to Recorded Future on Mar 20, 2024."",""CriticalityLabel"":""Unusual"",""Timestamp"":1710929307653,""MitigationString"":"""",""Criticality"":1},{""Rule"":""Historically Reported CC Server"",""EvidenceString"":""22 sightings on 1 source: Recorded Future Command Control Reports. 198.98.57.26:2096 was reported as a command and control server for Cobalt Strike on Jan 18, 2025"",""CriticalityLabel"":""Suspicious"",""Timestamp"":1737275121237,""MitigationString"":"""",""Criticality"":2},{""Rule"":""Recently Communicating Validated CC Server"",""EvidenceString"":""6 sightings on 1 source: Recorded Future Network Intelligence. Multiple communications observed between 181.214.153.11 on 4 ports including 13995 and 198.98.57.26 (validated Cobalt Strike C2 Server) on port 2096 on 2025-03-28 at 03:07 UTC. "",""CriticalityLabel"":""Suspicious"",""Timestamp"":1743120000000,""MitigationString"":"""",""Criticality"":2},{""Rule"":""Previously Validated C Server"",""EvidenceString"":""562 sightings on 1 source: Insikt Group Command Control Validation. Recorded Future analysis validated 198.98.57.26:2096 as a command and control server for Cobalt Strike on Mar 30, 2025"",""CriticalityLabel"":""Suspicious"",""Timestamp"":1743317655000,""MitigationString"":"""",""Criticality"":2},{""Rule"":""Actively Communicating Validated CC Server"",""EvidenceString"":""2 sightings on 1 source: Recorded Future Network Intelligence. Multiple communications observed between 181.214.153.11 on 2 ports including 5792 and 198.98.57.26 (validated Cobalt Strike C2 Server) on port 2096 on 2025-03-31 at 04:24 UTC. "",""CriticalityLabel"":""Very Malicious"",""Timestamp"":1743379200000,""MitigationString"":"""",""Criticality"":4},{""Rule"":""Validated CC Server"",""EvidenceString"":""13 sightings on 1 source: Insikt Group Command Control Validation. Recorded Future analysis validated 198.98.57.26:2096 as a command and control server for Cobalt Strike on Apr 01, 2025"",""CriticalityLabel"":""Very Malicious"",""Timestamp"":1743497808000,""MitigationString"":"""",""Criticality"":4}]}","Cobalt Strike|Cobalt Strike Beacon","AS53667","New York City","United States"
"139.224.198.190",99,"11/81","{""EvidenceDetails"":[{""Rule"":""Historically Linked to Intrusion Method"",""EvidenceString"":""21 sightings on 4 sources: Twitter, Recorded Future Command Control List, C2IntelFeeds Cobalt Strike C2 Servers, GitHub. 7 related intrusion methods including Interactsh LDAP Server, Cobalt Strike, Trojan, Offensive Security Tools (OST), Banking Trojan. Most recent link (Mar 18, 2025): https://github.com/drb-ra/C2IntelFeeds/commit/4c7af7a4c0b23a4ce3e5bf91ac586e4a4b46b6cd"",""CriticalityLabel"":""Unusual"",""Timestamp"":1742331763428,""MitigationString"":"""",""Criticality"":1},{""Rule"":""Historical Suspected CC Server"",""EvidenceString"":""6 sightings on 2 sources: ThreatFox Infrastructure Analysis, Malware Patrol. ThreatFox identified 139.224.198.190:8888 as possible TA0011 (Command and Control) for Unknown malware on December 06, 2024. Most recent link (Dec 6, 2024): https://threatfox.abuse.ch/ioc/1196644"",""CriticalityLabel"":""Unusual"",""Timestamp"":1733472212000,""MitigationString"":"""",""Criticality"":1},{""Rule"":""Historical Malicious Infrastructure Admin Server"",""EvidenceString"":""976 sightings on 2 sources: Insikt Group Malicious Infrastructure Management Validation, Recorded Future Malicious Infrastructure Management Validation."",""CriticalityLabel"":""Unusual"",""Timestamp"":1742299889836,""MitigationString"":"""",""Criticality"":1},{""Rule"":""Historically Linked to Cyber Attack"",""EvidenceString"":""1 sighting on 1 source: C2IntelFeeds Cobalt Strike C2 Servers. Most recent link (Apr 21, 2021): https://github.com/drb-ra/C2IntelFeeds/blob/master/C2_configs/cobaltstrike.json?q=https%3A%2F%2F139.224.198.190%3A443_20210421"",""CriticalityLabel"":""Unusual"",""Timestamp"":1618997794823,""MitigationString"":"""",""Criticality"":1},{""Rule"":""Historically Reported as a Defanged IP"",""EvidenceString"":""6 sightings on 3 sources: redpacketsecurity.com, Twitter, yourmom.xxx. Most recent link (Jun 27, 2024): https://mirror.yourmom.xxx/vx/Papers/Malware%20Defense/Malware%20Analysis/2023/2023-11-22%20-%20Practical%20Queries%20for%20Malware%20Infrastructure%20-%20Part%203%20(Advanced%20Examples).pdf"",""CriticalityLabel"":""Unusual"",""Timestamp"":1719502587980,""MitigationString"":"""",""Criticality"":1},{""Rule"":""Historically Reported in Threat List"",""EvidenceString"":""Previous sightings on 3 sources: Recently Viewed Integrations Indicators, RAT Controller – Shodan / Recorded Future, Cobalt Strike Default Certificate Detected - Shodan / Recorded Future. Observed between Oct 2, 2022, and Oct 3, 2023."",""CriticalityLabel"":""Unusual"",""Timestamp"":1743513627891,""MitigationString"":"""",""Criticality"":1},{""Rule"":""Historically Reported CC Server"",""EvidenceString"":""42 sightings on 5 sources: Polyswarm Sandbox Analysis - Malware C2 Extractions, Recorded Future Command Control Reports, Recorded Future Command Control List, Recorded Future Triage Malware Analysis - Malware C2 Extractions, Recorded Future Sandbox - Malware C2 Extractions. Malware sandbox analysis identified 139.224.198.190:4455 as possible TA0011 (Command and Control) for Metasploit using configuration extraction on sample b1a6624c78f881a944e27a2451addb6c7d2b65c8db155eb9a88ce2f2f5dbdc84."",""CriticalityLabel"":""Suspicious"",""Timestamp"":1730234249000,""MitigationString"":"""",""Criticality"":2},{""Rule"":""Recently Linked to Intrusion Method"",""EvidenceString"":""1 sighting on 1 source: GitHub. 3 related intrusion methods: Trojan, Banking Trojan, QakBot. Most recent link (Mar 31, 2025): https://github.com/drb-ra/C2IntelFeeds/commit/38253aaf32c9e306247c8c21ebc71146fac5ec41"",""CriticalityLabel"":""Suspicious"",""Timestamp"":1743454980696,""MitigationString"":"""",""Criticality"":2},{""Rule"":""Previously Validated CC Server"",""EvidenceString"":""698 sightings on 1 source: Insikt Group Command Control Validation. Recorded Future analysis validated 139.224.198.190:3232 as a command and control server for Supershell on Mar 30, 2025"",""CriticalityLabel"":""Suspicious"",""Timestamp"":1743311507000,""MitigationString"":"""",""Criticality"":2},{""Rule"":""Recent Malicious Infrastructure Admin Server"",""EvidenceString"":""70 sightings on 1 source: Insikt Group Malicious Infrastructure Management Validation."",""CriticalityLabel"":""Malicious"",""Timestamp"":1743505617266,""MitigationString"":"""",""Criticality"":3},{""Rule"":""Validated CC Server"",""EvidenceString"":""5 sightings on 1 source: Insikt Group Command Control Validation. Recorded Future analysis validated 139.224.198.190:3232 as a command and control server for Supershell on Apr 01, 2025"",""CriticalityLabel"":""Very Malicious"",""Timestamp"":1743483492000,""MitigationString"":"""",""Criticality"":4}]}","Supershell","AS37963","Shanghai","China"
ThreatQ provides the following default mapping for this pathway:
Mappings are based on each item within the array.
Feed Data Path | ThreatQ Entity | ThreatQ Object Type or Attribute Key | Published Date | Examples | Notes |
---|---|---|---|---|---|
0 (first token) | Indicator.Value | IP Address | N/A | 5.120.187.119 | N/A |
1 (second token) | Indicator.Attribute | Risk Score | N/A | 65 | Updatable |
1 (second token) | Indicator.Attribute | Normalized Risk | N/A | High | Mapped using Risk Score Normalization Mapping user field; Updatable |
2 (third token) | Indicator.Attribute | Risk String | N/A | 1/49 | Updatable |
3 (fourth token)[].CriticalityLabel | Indicator.Attribute | Criticality | 3 (fourth token)[].Timestamp | Malicious | Updatable. The highest criticality level is selected. |
3 (fourth token)[].Rule | Indicator.Attribute | Associated Rule | 3 (fourth token)[].Timestamp | Recent Positive Malware Verdict | N/A |
3 (fourth token)[].EvidenceString | Indicator.Attribute | Evidence | 3 (fourth token)[].Timestamp | 1 sighting on 1 source: ReversingLabs. | N/A |
4 (fifth token) | Malware.Value | N/A | 3 (fourth token)[].Timestamp | Nanocore RAT |
N/A |
5 (sixth token) | Indicator.Attribute | ASN | 3 (fourth token)[].Timestamp | AS37963 |
N/A |
6 (seventh token) | Indicator.Attribute | ASN Organization | N/A | 3 (fourth token)[].Timestamp | Shanghai |
7 (eighth token) | Indicator.Attribute | Country | N/A | China |
N/A |
Dynamic DNS IPs
/public/detect/ddns_ips.json
Sample Response:
[ { "lastSeen": 1592813679718, "ip": "14.207.60.10" }, { "lastSeen": 1602551372295, "ip": "31.184.203.121" }, { "lastSeen": 1600696916364, "ip": "200.95.170.74" }, { "lastSeen": 1715817599000, "ip": "31.46.242.12" }, { "lastSeen": 1715817599000, "ip": "201.151.223.102" } ]
ThreatQ provides the following default mapping for this pathway:
Mappings are based on each item within the array.
Feed Data Path | ThreatQ Entity | ThreatQ Object Type or Attribute Key | Published Date | Examples | Notes |
---|---|---|---|---|---|
.ip |
Indicator.Value | IP Address | .lastSeen |
N/A | N/A |
N/A | Attribute | Fusion File | N/A | ddns_ips |
N/A |
Potentially Undetectable Malware
/public/detect/low_detect_malware_hashes.json
Sample Response:
[ { "lastSeen": 1637938630146, "hash": "00af0726cdaf4dd07375ed03513a5ce3e5055a285b932b20bc06c85d92b00e9f", "algorithm": "SHA-256" }, { "lastSeen": 1517420645494, "hash": "0bcc5b3fbed425984f6ce7fbf1a62a7f", "algorithm": "MD5" }, { "lastSeen": 1565960362167, "hash": "0f6bff19fd5fe46f577853c7de074072fba5c04831fddac820eacd897622d343", "algorithm": "SHA-256" }, { "lastSeen": 1574942448466, "hash": "be62ca209f803671935370c9d05ad5d25acd55d47029f19fca75df6b74dfb957", "algorithm": "SHA-256" }, { "lastSeen": 1557138379174, "hash": "e3a318797bdc6d45917364efdf329dd8fd6a39f1178d71dc1945ff94a425b209", "algorithm": "SHA-256" }, { "lastSeen": 1572496263780, "hash": "39e4251cacd684dc4886bddfefdda3cf78c0d6d4", "algorithm": "SHA-1" }, { "lastSeen": 1572496263780, "hash": "222f4b0b2a69666cb0843af04a2d234378e284a9c05fb2ae0e6754fb52b1ee34df361fd1d3b70f3bbcd2b7611d64d5622558b4b6c1272633b15d0b639d48dfe4", "algorithm": "SHA-512" } ]
ThreatQ provides the following default mapping for this pathway:
Mappings are based on each item within the the array.
Feed Data Path | ThreatQ Entity | ThreatQ Object Type or Attribute Key | Published Date | Examples | Notes |
---|---|---|---|---|---|
.hash |
Indicator.Value | .algorithm |
.lastSeen |
N/A | N/A |
N/A | Attribute | Fusion File | N/A | low_detect_malware_hashes |
N/A |
Weaponized Domains
/public/detect/weaponized_domains.json
Sample Response:
{ "count": 2, "results": [ { "domain": "dswa.1337.cx", "last_seen": "2024-05-15", "service_provider": "Afraid.org", "detection_strings": { "phishing site": false, "spam site": false, "spam image": false, "mining site": false, "malicious site": false, "suspicious site": false, "malware site": true, "malware hd site": false, "fraudulent site": false } }, { "domain": "7.24-7.ro", "last_seen": "2024-05-13", "service_provider": "Afraid.org", "detection_strings": { "phishing site": true, "spam site": false, "spam image": false, "mining site": false, "malicious site": false, "suspicious site": false, "malware site": true, "malware hd site": false, "fraudulent site": false } } ] }
ThreatQ provides the following default mapping for this pathway:
Mappings are based on each item within the results
key.
Feed Data Path | ThreatQ Entity | ThreatQ Object Type or Attribute Key | Published Date | Examples | Notes |
---|---|---|---|---|---|
.domain |
Indicator.Value | FQDN | .last_seen |
N/A | N/A |
N/A | Attribute | Fusion File | N/A | weaponized_domains |
N/A |
.service_provider |
Attribute | Service Provider | .last_seen |
Afraid.org |
N/A |
.detection_strings[phishing site] |
Attribute | Threat Type | .last_seen |
Phishing |
Only if flag is true |
.detection_strings[spam site] |
Attribute | Threat Type | .last_seen |
Spam |
Only if flag is true |
.detection_strings[spam image] |
Attribute | Threat Type | .last_seen |
Spam |
Only if flag is true |
.detection_strings[mining site] |
Attribute | Threat Type | .last_seen |
Crypotomining |
Only if flag is true |
.detection_strings[malicious site] |
Attribute | Disposition | .last_seen |
Malicious |
Only if flag is true |
.detection_strings[suspicious site] |
Attribute | Disposition | .last_seen |
Suspicious |
Only if flag is true |
.detection_strings[malware site] |
Attribute | Threat Type | .last_seen |
Malware |
Only if flag is true |
.detection_strings[malware hd site] |
Attribute | Threat Type | .last_seen |
Malware |
Only if flag is true |
.detection_strings[fraudulent site] |
Attribute | Threat Type | .last_seen |
Fraud |
Only if flag is true |
Exploits in the Wild Hashes
/public/prevent/exploits_itw_hashes.json
Sample Response:
{ "count": 97644, "results": [ { "hash": "6131945bc2925a227c748f6e65d3108d0519fe03887a2353b516d75c26afb03e", "algorithm": "sha256", "cybervulnerabilities": ["CVE-2010-2568"], "malware": "unknown", "days_with_sighting": 16, "last_seen": "2024-05-14" }, { "hash": "a63570d7200cb3628f2a8887bc9d5cf0", "algorithm": "md5", "cybervulnerabilities": ["CVE-2022-42889"], "malware": "unknown", "days_with_sighting": 1, "last_seen": "2024-05-08" } ] }
ThreatQ provides the following default mapping for this pathway:
Mappings are based on each item within the results
key.
Feed Data Path | ThreatQ Entity | ThreatQ Object Type or Attribute Key | Published Date | Examples | Notes |
---|---|---|---|---|---|
.hash |
Indicator.Value | .algorithm |
.last_seen |
N/A | N/A |
N/A | Attribute | Fusion File | N/A | exploits_itw_hashes |
N/A |
.cybervulnerabilities[] |
Indicator.Value, Vulnerability.Value | CVE | .last_seen |
CVE-2022-42889 |
N/A |
.malware |
Malware.Value | N/A | .last_seen |
Lokibot |
Ingested if not 'unknown' |
Recorded Future Detection Rules
The Recorded Future Detection Rules feed ingests Recorded Future detection rules (i.e. YARA, Snort, or Sigma) into ThreatQ as Signatures. Indicators and context will be extracted and added as relationships or attribution, respectively.
GET https://api.recordedfuture.com/detection-rule/search
Sample Response:
{
"count": 10,
"next_offset": "eyJvZmZzZXQiOlsxMTEyMiwiSEZCSHdBRDBTd3EiXX0=",
"result": [
{
"created": "2025-01-17T20:27:13.817Z",
"description": "The attached SNORT rule detects inbound WebSocket data frames with commands to be interpreted and executed by RevC2 malware.",
"id": "doc:2j65IB",
"rules": [
{
"content": "alert tcp $EXTERNAL_NET any -> $HOME_NET any (msg:\"RevC2 Malware Inbound Command\"; flow:established,to_client; content:\"|81|\"; depth:1; content:\"|7B 22|type|22 3A 22|\"; distance:1; within:9; content:\"|22 2C 22|command|22 3A 22|\"; fast_pattern; distance:4; within:15; pcre:\"/\\x81.\\x7b\\x22type\\x22\\x3a\\x22[0-9]{4,6}\\x22\\x2c\\x22command\\x22\\x3a/\"; reference:url,https://www.zscaler.com/blogs/security-research/unveiling-revc2-and-venom-loader; classtype:trojan-activity; sid:52460260; rev:1; metadata:author MGUT, created_at 2025-01-15, mitre_tactic_id TA0011, mitre_tactic_name Command-And-Control;)\n",
"entities": [
{
"id": "1KeNsc",
"name": "RevC2",
"type": "Malware"
},
{
"display_name": "T1071.001 (Application Layer Protocol: Web Protocols)",
"id": "mitre:T1071.001",
"name": "T1071.001",
"type": "MitreAttackIdentifier"
}
],
"file_name": "mal_revc2_snort.txt"
}
],
"title": "SNORT Rule: Detect RevC2 Malware Inbound Commands",
"type": "snort",
"updated": "2025-01-17T20:27:13.817Z"
},
{
"created": "2024-09-27T20:12:23.632Z",
"description": "The attached SNORT rules can be used to detect network traffic associated with CryptBot malware.",
"id": "doc:zA_U9i",
"rules": [
{
"content": "alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:\"CryptBot Malware Outbound C2 Communication\"; flow:established,to_server; urilen:14,norm; content:\"POST\"; http_method; content:\"|2F|v1|2F|upload|2E|php\"; fast_pattern; http_uri; content:\"|3B 20|boundary|3D 2D 2D 2D 2D|Boundary\"; http_header; content:\"|3B 20|name|3D 22|file|22|\"; http_client_body; reference:url,https://tria.ge/240909-zh8kgsygjr; classtype:bad-unknown; sid:52460217; rev:1; metadata:author MGUT, mitre_tactic_id TA0011, mitre_tactic_name Command-And-Control;)\nalert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:\"CryptBot Malware Outbound C2 Communication\"; flow:established,to_server; urilen:14,norm; content:\"POST\"; http_method; content:\"|2F|v1|2F|upload|2E|php\"; fast_pattern; http_uri; content:\"Accept|3A 20|\"; http_header; content:\"|3B 20|boundary|3D 2D 2D 2D 2D|\"; http_header; content:\"|3B 20|name|3D 22|file|22 3B 20|filename|3D 22|\"; http_client_body; content:\".bin|22 0D 0A|\"; http_client_body; distance:0; within:20; reference:url,https://tria.ge/241101-1zqaxatrez; classtype:bad-unknown; sid:52460232; rev:1; metadata:author MGUT, mitre_tactic_id TA0011, mitre_tactic_name Command-And-Control;)\nalert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:\"CryptBot Malware Outbound C2 Communication\"; flow:established,to_server; content:\"POST\"; http_method; content:!\"User|2D|Agent\"; http_header; content:\"|7B 20 22 69 70 22 3A 20 22|\"; http_client_body; depth:9; content:\"|22|current_time|22|\"; http_client_body; distance:0; content:\"|22|Num_processor|22|\"; http_client_body; distance:0; content:\"|22|Num_ram|22|\"; http_client_body; fast_pattern; distance:0; reference:url,https://tria.ge/250201-zdl6pa1lhm; classtype:trojan-activity; sid:52460266; rev:1; metadata:author MGUT, created_at 2025-02-05, mitre_tactic_id TA0011, mitre_tactic_name Command-And-Control;)\n",
"entities": [
{
"id": "hy-B4_",
"name": "CryptBot",
"type": "Malware"
}
],
"file_name": "mal_cryptbot_snort.txt"
}
],
"title": "SNORT Rules: Detect CryptBot Malware",
"type": "snort",
"updated": "2025-02-06T22:20:04.717Z"
}
]
}
ThreatQ provides the following default mapping for this feed:
Feed Data Path | ThreatQ Entity | ThreatQ Object Type or Attribute Key | Published Date | Examples | Notes |
---|---|---|---|---|---|
.rules[].content |
Signature.Name, Signature.Value | YARA, Snort, or Sigma | .created |
N/A | Content is parsed for signature data |
.rules[].content |
Tag.Name | N/A | N/A | N/A | Content metadata is parsed for tags |
.rules[].content |
Attribute | <Various Names> | N/A | N/A | Content metadata is parsed for attributes |
.rules[].content |
Indicator.Value | MD5, SHA-1, SHA-256, SHA-512 | N/A | N/A | Content metadata is parsed for file hash indicators |
.rules[].entities[].name |
Attack-Pattern.Value | N/A | .created |
T1071 - Application Layer Protocol |
Where the entity type is MitreAttackIdentifier |
.rules[].entities[].name |
Malware.Value | N/A | .created |
CryptBot |
Where the entity type is Malware |
.rules[].entities[].name |
Indicator.Value | <Various Types> | .created |
N/A | Where the entity type is in [URL , InternetDomainName , IpAddress , FileName ] |
.rules[].entities[].name |
Adversary.Name | N/A | .created |
RedMike |
Where the entity type is Organization |
.rules[].entities[].name |
Indicator.Value, Vulnerability.Value | CVE | .created |
CVE-2025-12345 |
Where the entity type is CyberVulnerability |
.rules[].entities[].name |
Tag.Name | N/A | N/A | N/A | Where the entity type is Hashtag |
.rules[].entities[].name |
Attribute | Affected Product | .created |
N/A | Where the entity type is Product |
.rules[].entities[].name |
Malware.Attribute | Category | .created |
N/A | Where the entity type is MalwareCategory |
.rules[].entities[].name |
Adversary.Attribute | Category | .created |
N/A | Where the entity type is CyberThreatActorCategory |
.rules[].entities[].name |
Attribute | <Various Names> | .created |
N/A | Where the entity type is a mapped attribute. See the Entity Attributes Mapping below. |
Entities Attributes Mapping
In the previous table, there is a 'Attribute' that is set dynamically. We do this because the 'Attribute Key' is extracted from the same path .data.rules[].entities[].name
if the .data.rules[].entities[].type
is one from the table listed below.
Recorded FUture Attribute Type |
ThreatQ Attribute Type |
---|---|
AttackVector | Attack Vector |
Product | Affected Product |
Company | Company |
City | City |
Country | Country |
Facility | Facility |
FileNameExtension | File Extension |
FileType | File Type |
GeoEntity | Geo Entity |
Industry | Industry |
IndustryTerm | Industry Term |
Logotype | Logotype |
Operation | Operation |
OrgEntity | Organization Entity |
PhoneNumber | Phone Number |
ProvinceOrState | State |
Region | Region |
Technology | Technology |
Topic | Topic |
Average Feed Run
Object counts and Feed runtime are supplied as generalities only - objects returned by a provider can differ based on credential configurations and Feed runtime may vary based on system resources and load.
Recorded Future Domain Risk List
Metric | Result |
---|---|
Run Time | 105 minutes |
Indicators | 92,000 |
Indicator Attributes | 1,133,950 |
Recorded Future IP Risk List
Metric | Result |
---|---|
Run Time | 24 minutes |
Indicators | 29,600 |
Indicator Attributes | 188,280 |
Recorded Future URL Risk List
Metric | Result |
---|---|
Run Time | 23 minutes |
Indicators | 10,653 |
Indicator Attributes | 92,877 |
Recorded Future Vulnerability Risk
Metric | Result |
---|---|
Run Time | 3 minutes |
Vulnerabilities | 335 |
Vulnerability Attributes | 2,123 |
Recorded Future Hash Risk List
Metric | Result |
---|---|
Run Time | 7 minutes |
Indicators | 4,500 |
Indicator Attributes | 32,760 |
Recorded Future Analyst Note
Metric | Result |
---|---|
Run Time | 1 minute |
Adversaries | 32 |
Identity | 2 |
Indicators | 59 |
Indicator Attributes | 142 |
Malware | 16 |
Malware Attributes | 4 |
Reports | 58 |
Reports Attributes | 623 |
Vulnerability | 33 |
Vulnerability Attributes | 19 |
Recorded Future Alerts
Metric | Result |
---|---|
Run Time | 1 minute |
Compromised Accounts | 1 |
Entities | 29 |
Events | 13 |
Events Attributes | 65 |
Files | 15 |
Indicators | 48 |
Indicator Attributes | 151 |
Malware | 6 |
Malware Attributes | 6 |
Adversary | 2 |
Adversary Attributes | 2 |
Recorded Future Playbook Alerts
Metric | Result |
---|---|
Run Time | 1 minute |
Events | 104 |
Events Attributes | 1,005 |
Indicators | 297 |
Indicator Attributes | 959 |
Vulnerability | 12 |
Vulnerability Attributes | 307 |
Identity | 1 |
Identity Attributes | 4 |
Recorded Future Fusion Files
Metric | Result |
---|---|
Run Time | 11 minutes |
Indicators | 36,424 |
Indicator Attributes | 74,979 |
Malware | 141 |
Malware Attributes | 143 |
Vulnerabilities | 222 |
Vulnerability Attributes | 222 |
Recorded Future Detection Rules
Metric | Result |
---|---|
Run Time | 1 minute |
Signatures | 4 |
Signature Attributes | 29 |
Malware | 6 |
Malware Attributes | 4 |
Indicators | 6 |
Indicator Attributes | 6 |
Adversaries | 2 |
Attack Patterns | 9 |
Known Issues / Limitations
- The Recorded Future Analyst Notes and Alerts feeds have an API limit and will only return the first 1,000 results.
Change Log
- Version 2.14.0
- Performed the following updates to the Recorded Future Analyst Note feed:
- Updated the feed to utilize a new endpoint -
https://api.recordedfuture.com/analyst-note/search
. - Improved API performance when searching by date range.
- Resolve a parsing hashes issue that would occur when parsing from signature content.
- Removed the Author configuration parameter.
- Added the following configuration parameters:
- Fetch & Ingest Attachments - determine if the feed should fetch attachments associated with a given analyst note.
- Extracted Signatures: select which signature types to parse and ingest from relevant analyst note attachments.
- Updated the feed to utilize a new endpoint -
- Performed the following updates to the Recorded Future Alerts feed:
- Improved adversary parsing. Now, only definitive threat actors will be ingested as adversaries.
- Updated the feed to utilize a new endpoint:
GET https://api.recordedfuture.com/alert/v3
. - Improved API performance searching by date range.
- Performed the following updates to the Recorded Future Analyst Note feed:
- Version 2.13.0
- Added a new feed: Recorded Future Detection Rules that ingests YARA & Suricata Signatures.
- Recorded Future Fusion Files feed - added a new option,
IP Risk List w/ Geolocation & Malware
, for the Selected Fusion Feeds parameter. - Added a Recorded Future portal permalink of the Alert or Playbook Alert to the description of ingested Events.
- Recorded Future Playbook Alerts feed - added a new configuration parameter: Playbook Category Filter.
- Added Alert and Playbook Alert ID attributes to the ingested Events to be compatible with v1.5.0 of the Recorded Future Operation
- Resolved an issue where an Analyst Note would not display properly in the ThreatQ description.
- Recorded Future Alerts feed - added the following new configuration parameter: Ingest Indicator Hits.
- Version 2.12.2
- Added the
Target
attribute for the events and indicators ingested by the Recorded Future Playbook Alerts feed. - Added the following configuration parameter for the Recorded Future Playbooks Alerts feed:
- Ingest Target Attributes - enable this parameter to ingest Targets as event attributes and related indicator attributes.
- Added the
- Version 2.12.1
- Removed a "dummy" parameter that is not required for feed requests.
- Resolved a filter mapping issue for data with null values.
- Increased the timeout for the Recorded Future Alerts feed to 900.
- Version 2.12.0
- The Recorded Future Analyst Note feed will now ingest the
Recorded Future URL
attribute. - Added support for the Compromised Account and Entity custom objects. Both custom objects are now required to be installed on your ThreatQ instance prior to installing or upgrading the integration to v2.12.0+.
- Added a new configuration parameter to the Recorded Future Playbook Alerts feed:
- Ingest CVEs As - allows you to configure how CVEs are ingested into the platform.
- Added the following new configuration parameters to the Recorded Future Alerts feed:
- Ingest Emails as Compromised Accounts for these Rules - allows Email Address entities to be ingested as Compromised Account (account) objects if specific rules are triggered.
- Ingest Images as Files Related to Alerts - determine if the feed should download and ingest images into ThreatQ as Files.
- Ingest and Related Triggered By Entities to Alerts - determine if triggered by entities related objects should be ingested into the platform.
- URLs in event descriptions are now active/clickable for the Recorded Future Alerts feed.
- The Recorded Future Analyst Note feed will now ingest the
- Version 2.11.0
- Removed the functionality to ingest specific risk list due to the risk's extreme volume.
- The List to Be Retrieved configuration parameter has been replaced with the optional Risk Rule Triggered parameter. The Risk Rule Triggered parameter allows you to configure the feed to only ingest indicators that triggered any of the selected risk rules.
- Version 2.10.1
- Resolved an issue where the Analyst Note feed ingested data with undesired text tags.
- Add the following configuration parameters to all feeds:
- Enable SSL Verification
- Disable Proxies
- Version 2.10.0
- All feeds except Alerts, Analyst Note, and Fusion Files: added two new configuration parameters:
- Normalize Risk Score - enable this option to ingest a normalized risk score value as a scorable attribute.
- Risk Score Normalization Mapping - allows you to configure mapping to normalize risk score values to the scorable attribute,
Normalized Risk
.
- All feeds except Alerts, Analyst Note, and Fusion Files: added two new configuration parameters:
- Version 2.9.1
- Made the following changes to the Recorded Future Analyst Note feed:
- Removed the Ingest Selected Entities as Indicators configuration option.
- Added the following new configuration parameters:
- Ingest Selected Primary Entities as Indicators - indicators of compromise from the "primary" entities list (note_entities) can now be ingested as indicator objects. Email Addresses from the "primary" entities list can now be ingested as indicators. Context (i.e. Malware, Adversaries, Attributes, & Attack Patterns) from the "primary" entities list will now be applied to the indicators of compromise from the "primary" entities list.
- Ingest Selected Supporting Entities as Indicators - indicators from the "supporting" entities list (context_entities) can now be ingested as indicator objects. Identities (Email Addresses) will now only be ingested from the "supporting" entities list
- "Product" entities will only be brought in as the "Affected Product" attribute when a vulnerability is associated. Otherwise, the attribute name will just be, "Product".
- Fixes issue where reference URLs in the description would have a
url:
prefix. - Topics are now ingested as tags.
- Made the following changes to the Recorded Future Analyst Note feed:
- Version 2.9.0
- The Recorded Future Analyst Note feed has been rewritten. Changes with the new feed include:
- Reports are now ingested with a rich text description (HTML).
- Full lists of entities, recommended queries, topics, authors, and metadata are now included in the feed.
- References have been moved from the attributes section to the description.
EmailAddress
entities are now extracted and related as Identity objects.InternetDomainName
,IpAddress
, andHash
entities will now only be extracted and ingested as indicators if you elect to do so - which is not advised.Organization
entities are now filtered before being related as adversaries. This change is to prevent benign organizations from being related.- You can now choose to ingest CVEs as Vulnerability (default) or Indicator objects.
Hashtag
entities are now extracted and added as tags to reports.Product
entity attribute has been renamed toAffected Product
to be more consistent with other feeds.- Analyst notes are no longer inherited to related object's descriptions.
- Default Indicator status is now
Review
.
- Performed the following updates to the Risk Lists feeds:
- Added a new user field: Filter Out Entries with No New Evidence. This allows you to filter out indicators that do not have any new evidence within the feed run timeframe and will help limit the amount of indicators that the feeds ingest, improving overall system performance. You can perform a historical manual run to ingest the full list of indicators.
- Performed the following updates to the Recorded Future Playbook Alerts feed:
- Updated the default indicator status to
Review
. - Added enhanced Event Title and Description.
- Events now include the category, priority, and criticality as part of the ingested Event Title.
- Events now include a rich text description with context such as targets, assessments & WHOIS information
- Added support for ingesting additional alert types & context data:
- Cyber Vulnerabilities
- Third Party Risks
- Code Repo Leakages
Domain Abuse
alerts now include WHOIS information.- Renamed the
Organisation
attribute to the more common,Organization
spelling. - The
category
attribute will now reflect thecase_rule_label
value, rather than the more programmaticcategory
value from the initial feed response. - Added better handling of shared attributes between the offending entity and event alert.
- Malware Families are now parsed out from assessment results (if available).
- Assets (Client IPs) are now parsed out from assessment results (if available).
- Updated the default indicator status to
- Performed the following updates to the Recorded Future Alerts feed:
- Alerts will now be ingested with a rich description containing a "Hits" table with the triggered entities and their respective documents.
- This feed will no longer ingest document URLs as indicators.
- This feed will only ingest CVEs (if enabled) and Hashes as indicators from the relevant document entities.
- InternetDomainNames, URLs, IP Addresses, etc. have been removed as they are likely to be benign.
- You'll will now be able to see the entities within the description of the event/alert.
- Document entities will now be related to the event/alert.
- The
Triggered Rule URL
attribute has been removed as it is no longer relevant. - Added
Logotype
as an extracted attribute. - Moved the
Reference URL
attribute to the event description. - Updated the default indicator status to Review.
- Removed ability to add "Person" entities as related adversaries.
- Added filtering of the Organization entities to prevent adding benign organizations as related adversaries.
- Resolved an issue where the feed would ingest MITRE Technique IDs that do not align with existing MITRE Attack Patterns within the system.
- Added a new feed: Recorded Future Fusion Files.
- The Recorded Future Analyst Note feed has been rewritten. Changes with the new feed include:
- Version 2.8.7
- Added an All option to the List to be Retrieved parameter for the following feeds:
Feed runs will typically complete within 40 minutes using this option so it is advised to schedule run times no more frequently than one hour.
- Recorded Future Domain Risk List
- Recorded Future Hash Risk List
- Recorded Future IP Risk List
- Recorded Future URL Risk List
- Added new Known Issue regarding the All option for the List to be Retrieved parameter. If utilizing the All option, all other items in the List to be Retrieved parameter must be unselected. Attempting to run a feed with the All and other items in the list selected will cause the feed to fail.
- Added a new attribute for the Recorded Future playbook Alerts feed:
Context data
. - Added
Target Entities
for related entities in the Recorded Future Alerts feed.
- Added an All option to the List to be Retrieved parameter for the following feeds:
- Version 2.8.6
- Performed optimization improvements for all feeds that contain the Risk List in their name in a effort to reduce the possibility of timeout errors.
- Version 2.8.5
- Resolved a timeout error that was caused by large evidence details.
- Removed the following no longer supported lists from Recorded Future Domain Risk List:
Historical Malware Analysis DNS Name
Recent Malware Analysis DNS Name
- Added the following new lists to Recorded Future Domain Risk List:
Frequently Abused Free DNS Provider
Historically Suspected Malware Operation
Recently Suspected Malware Operation
Recent Cryptocurrency Mining Pool
- Added the following new lists to Recorded Future IP Risk List
Historical Malicious Infrastructure Admin Server
Recent Malicious Infrastructure Admin Server
- Added the following new lists to Recorded Future URL Risk List
Historically Suspected Malware Distribution
Recently Suspected Malware Distribution
Recent Reported C&C URL
Historical Reported C&C URL
- Version 2.8.4
- Commonly updated attributes, such as attributes that involve timestamps and criticality, will now be updated when ingesting new data as opposed to creating duplicate attributes. See the Mapping Tables of each feed for details.
- Version 2.8.3
- Introduced a results limitation for the Recorded Future Analyst Note feed to resolve an offset issue.
- Added the following new Topic configuration options for the Recorded Future Analyst Note feed:
- Geopolitical Intelligence Summary
- Geopolitical Flash Event
- Geopolitical Threat Forecast
- Geopolitical Validated Event
- Insikt Research Lead
- Regular Vendor Vulnerability Disclosures
- Sigma Rule
- The Record by Recorded Future
- Added a new issue to the Known Issues / Limitations chapter regarding the API limit for the Analyst Notes and Alerts feeds.
- Version 2.8.2
- Improved the Recorded Future Alerts feed to ingest more information regarding alerts.
- Added new configuration field for the feed: Save CVE Data As.
- Guide Update - updated Recorded Future Alerts sample response, default mapping table, Related Indicator Type mapping, and added a new Related Indicator Attributes mapping entry.
- Improved the Recorded Future Alerts feed to ingest more information regarding alerts.
- Version 2.8.1
- Updated the Recorded Future Alerts endpoint to API version 3.
- Removed support from the following problematic lists:
- Positive Malware Verdict
- Historical Ransomware Distribution URL
- Recent Ransomware Distribution URL
- Version 2.8.0
- The integration now synchronizes Risk lists.
- Version 2.7.0
- Added a new feed: Recorded Future Playbook Alerts.
- Added the ability to filter by minimum risk score for the Risk List feeds (Recorded Future Domain Risk List, Recorded Future IP Risk List, Recorded Future URL Risk List, Recorded Future Vulnerability Risk List and Recorded Future Hash Risk List).
- Added the ability to select the hash types that are ingested by the Recorded Future Hash Risk List, Recorded Future Analyst Note, and Recorded Future Alerts feeds.
- Added the ability to ingest SHA-1 indicators.
- Version 2.6.2
- Synchronized the Risk lists for the Risk List feeds to match option updates that Recorded Future performed.
- Added time constrained data ingestion for all feeds so manual runs can be performed. Previously, the manual run option was only supported by the Analyst Note feed.
- Version 2.6.1
- Fixed a parsing error that would occur when no evidence details are provided.
- Version 2.6.0
- Removed lists from Recorded Future Domain Risk List feed:
- Ransomware Distribution URL
- Ransomware Payment DNS Name
- Removed lists from Recorded Future Vulnerability Risk feed:
- Observed Exploit/Tool Development in the Wild
- Historically Observed Exploit/Tool Development in the Wild
- Removed lists from Recorded Future Domain Risk List feed:
- Version 2.5.0
- Refactored Recorded Future Feeds (aside from Analyst Note).
- Fixed a bug that caused an Error applying FilterMapping error from the URL Risk List and other similar feeds.
- Removed lists that are no longer support that would cause the feed to throw a 404 error. Lists removed include:
- Recorded Future Domain Risk List:
- C&C URL
- Recorded Future URL Risk List:
- C&C
- Compromised URL
- Historically Detected Malicious Browser Exploits
- Recently Detected Malicious Browser Exploits
- Recently Detected Suspicious Content
- Historically Detected Suspicious Content
- Recorded Future Vulnerability Risk List:
- Recently Observed Exploit/Tool Development in the Wild
- Recorded Future Domain Risk List:
- Version 2.4.1
- Fixed a parsing error with Analyst Note.
- Version 2.4.0
- Added Alert details
- Version 2.3.0
- Added support for MITRE Attack Pattern Sub-Techniques
- Added 'Save CVE Data As' user configuration parameter for Recorded Future Vulnerability Risk List
- Version 2.2.0
- Added support to multiple selection for list
- Fixed issue with MITRE map
- Version 2.1.0
- Added support for configuration list in the request
- Version 2.0.1
- Fixed issue with attributes
- Version 2.0.0
- Added Analyst Note Integration
- Version 1.0.0
- Initial release
PDF Guides