Current ThreatQ Version Filter
 

Recorded Future CDF

The web format of this guide reflects the most current release.  Guides for older iterations are available in PDF format.  

Integration Details

ThreatQuotient provides the following details for this integration:

Introduction

The Recorded Future CDF ingests threat intelligence data from the following feeds published by the Recorded Future vendor:

  • Recorded Future Domain Risk List - retrieves information in the form of a CSV list where the first token is risk data and the last token containing the supporting context. 
  • Recorded Future IP Risk List - retrieves IP Addresses from the provider.  
  • Recorded Future URL Risk List - retrieves URLS from the provider.
  • Recorded Future Vulnerability Risk List - retrieves CVEs from the provider.  
  • Recorded Future Hash Risk List - retrieves Hashes from the provider.  
  • Recorded Future Analyst Note - retrieves Reports, Indicators, and Attack Patterns from the provider.
  • Recorded Future Alerts - retrieves Alerts from the provider as ThreatQ Events and all the related Indicators, Malware, Adversaries, Attack Patterns and Vulnerabilities, Image files and Entity objects.
    • Recorded Future Alerts Details (Supplemental) - retrieves related data for each of the ingested events retrieved from the Alert endpoint.
  • Recorded Future Playbook Alerts - retrieves a list of alerts filtered by the values provided in the configuration section.
    • Recorded Future - Get Playbook Alerts (Supplemental) - retrieves related data for each of the ingested events retrieved from the Alert endpoint.
  • Recorded Future Fusion Files - ingests threat intelligence information from the user selected Fusion feeds.
  • Recorded Future Detection Rulesingests Recorded Future detection rules (i.e. YARA, Snort, or Sigma) into ThreatQ as Signatures.

The integration ingests the following system objects:

  • Adversaries
    • Adversary Tags
  • Assets
    • Asset Attributes
  • Attack Patterns
    • Attack Pattern Attributes
  • Compromised Account (custom object)
  • Entities (custom object)
  • Files
  • Identities
  • Indicators
    • Indicator Attributes and Tags
  • Malware
    • Malware Attributes
  • Reports
    • Report Attributes
  • Signatures
    • Signature Attributes
  • Vulnerabilities
    • Vulnerability Attributes and Tabs

Prerequisites

The following is required to install and run the integration:

  • Recorded Future API Key.
  • Compromised Account and Entity custom objects installed on your ThreatQ instance.  
  • MITRE ATT&CK attack patterns must have already been ingested by a previous run of the MITRE ATT&CK feeds in order for MITRE ATT&CK attack patterns ingested by the Analyst Note feed to be created. MITRE ATT&CK attack patterns are ingested from the following feeds:
    • MITRE Enterprise ATT&CK
    • MITRE Mobile ATT&CK
    • MITRE PRE-ATT&CK

Compromised Account and Entities Custom Object

The integration requires the Compromised Account and Entity custom objects which must be installed prior to installing the CDF.  Use the steps provided to install the custom objects.    

When installing the custom objects, be aware that any in-progress feed runs will be cancelled, and the API will be in maintenance mode.

Use the following steps to install the custom object in ThreatQ v6:   

  1. Download the integration bundle from the ThreatQ Marketplace.
  2. Unzip the bundle and locate the custom object files.

    The custom object files will typically consist of a JSON definition file, install.sh script, and a images folder containing the svg icons.

  3. SSH into your ThreatQ instance.
  4. Navigate to the following location:
    cd /var/lib/threatq/misc/

  5. Upload the custom object files, including the images folder.

    The directory structure should be as the following:

    • misc
      • install.sh
      • <custom_object_name>.json
      • images (directory)
        • <custom_object_name>.svg
  6. Run the following command:
    kubectl exec -it deployment/api-schedule-run -n threatq -- sh /var/lib/threatq/misc/install.sh /var/lib/threatq/misc

    The installation script will automatically put the application into maintenance mode, move the files to their required directories, install the custom object, update permissions, bring the application out of maintenance mode, and restart dynamo.

  7. Delete the install.sh, definition json file, and images directory from the misc directory after the object has been installed as these files are no longer needed.

Use the following steps to install the custom object in ThreatQ v5:

  1. Download the integration zip file from the ThreatQ Marketplace and unzip its contents.  
  2. SSH into your ThreatQ instance.
  3. Navigate to tmp directory:
    cd /tmp/

  4. Create a new directory:
    mkdir recorded_future_cdf

  5. Upload the recorded_future.json and install.sh script into this new directory.
  6. Create a new directory called images within the recorded_future_cdf directory.
    mkdir images

  7. Upload the account and entity svg files. 
  8. Navigate to the /tmp/recorded_future_cdf.

    The directory should resemble the following:

    • tmp
      • recorded_future_cdf
        • recorded_future.json
        • install.sh
        • images
          • account.svg
          • entity.svg
  9. Run the following command to ensure that you have the proper permissions to install the custom object:
    chmod +x install.sh

  10. Run the following command:
    sudo ./install.sh

    You must be in the directory level that houses the install.sh and json files when running this command.

    The installation script will automatically put the application into maintenance mode, move the files to their required directories, install the custom object, update permissions, bring the application out of maintenance mode, and restart dynamo.

  11. Remove the temporary directory, after the custom object has been installed, as the files are no longer needed:
    rm -rf recorded_future_cdf

Installation

The integration requires the installation of the Compromised Account and Entitiy custom objects.  See the Prerequisites chapter for more details.  These custom objects must be installed prior to installing the CDF.  Attempting to install the CDF prior to installing the custom objects will result in the CDF install process failing.   

Perform the following steps to install the integration:

The same steps can be used to upgrade the integration to a new version.

  1. Log into https://marketplace.threatq.com/.
  2. Locate and download the integration zip file.
  3. Extract the contents of the zip and install the required custom objects.
  4. Navigate to the integrations management page on your ThreatQ instance.
  5. Click on the Add New Integration button.
  6. Upload the integration yaml file using one of the following methods:
    • Drag and drop the yaml file into the dialog box
    • Select Click to Browse to locate the yaml file on your local machine
  7. Select the individual feeds to install, when prompted, and click Install. The feed will be added to the integrations page. 

    ThreatQ will inform you if the feed already exists on the platform and will require user confirmation before proceeding. ThreatQ will also inform you if the new version of the feed contains changes to the user configuration. The new user configurations will overwrite the existing ones for the feed and will require user confirmation before proceeding.

You will still need to configure and then enable the feed.

Configuration

ThreatQuotient does not issue API keys for third-party vendors. Contact the specific vendor to obtain API keys and other integration-related credentials.

To configure the integration:

  1. Navigate to your integrations management page in ThreatQ.
  2. Select the Commercial option from the Category dropdown (optional).

    If you are installing the integration for the first time, it will be located under the Disabled tab.

  3. Click on the integration entry to open its details page.
  4. Enter the following parameters under the Configuration tab:

    All Recorded Future feeds require the Recorded Future API Key.  The tables below provide any additional parameters required for specific feeds included with this integration. 

    Recorded Future Domain Risk List Parameters

    Parameter Description
    API Key Your API Key to be used in HTTP headers for accessing feed data. 
    Enable SSL Verification Enable this for the feed to validate the host-provided SSL certificate.
    Disable Proxies Enable this option if the feed should not honor proxies set in the ThreatQ UI.
    Risk Rule Triggered Optional - Enable this parameter to ingests only indicators that triggered any of the selected risk rules. If no risk rule is selected, all the indicators satisfying the rest of the criteria are ingested. Options include:
    • Historically Reported by Insikt Group
    • Historically Reported Botnet Domain
    • Newly Registered Certificate With Potential for Abuse - DNS Sandwich
    • Newly Registered Certificate With Potential for Abuse - Typo or Homograph
    • C&C Nameserver
    • Historical C&C DNS Name
    • Historical COVID-19-Related Domain Lure
    • Recently Resolved to Host of Many DDNS Names
    • Historically Reported as a Defanged DNS Name
    • Historically Reported by DHS AIS
    • Recent Fast Flux DNS Name
    • Historically Reported Fraudulent Content
    • Frequently Abused Free DNS Provider
    • Historically Reported in Threat List
    • Historically Linked to Cyber Attack
    • Historically Detected Malware Operation
    • Historically Suspected Malware Operation
    • Historically Detected Cryptocurrency Mining Techniques
    • Blacklisted DNS Name
    • No Risk Observed
    • Observed in the Wild by Recorded Future Telemetry
    • Historical Phishing Lure
    • Historically Detected Phishing Techniques
    • Historically Suspected Phishing Techniques
    • Active Phishing URL
    • Recorded Future Predictive Risk Model
    • Historically Detected Web Filter Avoidance Proxy Domain
    • Historical Punycode Domain
    • Recently Reported by Insikt Group
    • Recently Reported Botnet Domain
    • Recent C&C DNS Name
    • Recent COVID-19-Related Domain Lure: Malicious
    • Recent COVID-19-Related Domain Lure: Suspicious
    • Recently Reported as a Defanged DNS Name
    • Recently Reported by DHS AIS
    • Recently Reported Fraudulent Content
    • Recently Linked to Cyber Attack
    • Recently Detected Malware Operation
    • Recently Suspected Malware Operation
    • Recent Cryptocurrency Mining Pool
    • Recently Detected Cryptocurrency Mining Techniques
    • Recent Phishing Lure: Malicious
    • Recent Phishing Lure: Suspicious
    • Recently Detected Phishing Techniques
    • Recently Suspected Phishing Techniques
    • Recent Web Filter Avoidance Proxy Domain
    • Recent Punycode Domain
    • Recently Referenced by Insikt Group
    • Recently Reported Spam or Unwanted Content
    • Recent Suspected C&C DNS Name
    • Recent Threat Researcher
    • Recent Typosquat Similarity - DNS Sandwich
    • Recent Typosquat Similarity - Typo or Homograph
    • Recent Ukraine-Related Domain Lure: Malicious
    • Recent Ukraine-Related Domain Lure: Suspicious
    • Recently Active Weaponized Domain
    • Recently Defaced Site
    • Historically Referenced by Insikt Group
    • Recently Resolved to Malicious IP
    • Recently Resolved to Suspicious IP
    • Recently Resolved to Unusual IP
    • Recently Resolved to Very Malicious IP
    • Trending in Recorded Future Analyst Community
    • Historically Reported Spam or Unwanted Content
    • Historical Suspected CANDC DNS Name
    • Historical Threat Researcher
    • Historical Typosquat Similarity - DNS Sandwich
    • Historical Typosquat Similarity - Typo or Homograph
    • Historical Ukraine-Related Domain Lure
    • Historically Active Weaponized Domain
    Minimum Risk Score Threshold The numeric value representing the minimum risk score required to ingest an IOC.  The default setting is 50.
    Normalize Risk Score Enable this parameter ingest a normalized risk score value as a scorable attribute.   
    Risk Score Normalization Mapping Mapping used to normalize the numeric risk score values to the scorable attribute, Normalized Risk. The Risk Score itself will always be ingested. This mapping should contain a line-separated CSV formatted string with the following columns: Minimum, Maximum, and Normalized Value.

    Default Values
    0,25,Low
    26,50,Medium
    51,75,High
    76,100,Critical

    This parameter is only accessible if you have enabled the Normalize Risk Score parameter. 

    Filter Out Entries with No New Evidence Enabling this option will filter out entries that have no new evidence. A risk list is a rolling list of indicators. As a result, there are entries within the list that may be from days, months, or even years ago. Once the feed runs historically and ingests all the entries, subsequent runs do not need to re-ingest the same entries again if there is no new evidence. Disabling it will re-ingest all entries, with solely the old evidence being filtered out.  This parameter is enabled by default.  

    Recorded Future Domain Risk List Configuration Screen

    Recorded Future Vulnerability Risk List Parameters

    Parameter Description
    API Key Your API Key to be used in HTTP headers for accessing feed data. 
    Enable SSL Verification Enable this for the feed to validate the host-provided SSL certificate.
    Disable Proxies Enable this option if the feed should not honor proxies set in the ThreatQ UI.
    Risk Rule Triggered Optional - Enable this parameter to ingests only indicators that triggered any of the selected risk rules. If no risk rule is selected, all the indicators satisfying the rest of the criteria are ingested. Options include:
    • Historically Reported by Insikt Group
    • Web Reporting Prior to CVSS Score
    • Cyber Exploit Signal: Critical
    • Cyber Exploit Signal: Important
    • Cyber Exploit Signal: Medium
    • Historically Exploited in the Wild by Malware
    • Likely Historical Exploit Development
    • Linked to Historical Cyber Exploit
    • Historically Linked to Exploit Kit
    • Historically Linked to Malware
    • Historically Linked to Remote Access Trojan
    • Historically Linked to Ransomware
    • Linked to Recent Cyber Exploit
    • Recently Linked to Exploit Kit
    • Recently Linked to Malware
    • Recently Linked to Remote Access Trojan
    • Recently Linked to Ransomware
    • Exploited in the Wild by Malware
    • NIST Severity: Critical
    • NIST Severity: High
    • NIST Severity: Low
    • NIST Severity: Medium
    • Web Reporting Prior to NVD Disclosure
    • Historical Unverified Proof of Concept Available
    • Historical Verified Proof of Concept Available
    • Historical Verified Proof of Concept Available Using Remote Execution
    • Recently Reported by Insikt Group
    • Exploit Likely in Active Development
    • Exploited in the Wild by Recently Active Malware
    • Recent Unverified Proof of Concept Available
    • Recent Verified Proof of Concept Available
    • Recent Verified Proof of Concept Available Using Remote Execution
    • Recently Referenced by Insikt Group
    • Recently Linked to Penetration Testing Tools
    • Historically Referenced by Insikt Group
    • Historically Linked to Penetration Testing Tools
    • Vendor Severity: Critical
    • Vendor Severity: High
    • Vendor Severity: Low
    • Vendor Severity: Medium
    Save CVE Data As
    Select whether to ingest CVEs as Vulnerabilities or Indicators.

    The default setting is to ingest Indicators objects.

    Minimum Risk Score Threshold The numeric value representing the minimum risk score required to ingest an IOC.  The default setting is 50.
    Normalize Risk Score Enable this parameter ingest a normalized risk score value as a scorable attribute.   
    Risk Score Normalization Mapping Mapping used to normalize the numeric risk score values to the scorable attribute, Normalized Risk. The Risk Score itself will always be ingested. This mapping should contain a line-separated CSV formatted string with the following columns: Minimum, Maximum, and Normalized Value.

    Default Values
    0,25,Low
    26,50,Medium
    51,75,High
    76,100,Critical

    This parameter is only accessible if you have enabled the Normalize Risk Score parameter. 

    Filter Out Entries with No New Evidence Enabling this option will filter out entries that have no new evidence. A risk list is a rolling list of indicators. As a result, there are entries within the list that may be from days, months, or even years ago. Once the feed runs historically and ingests all the entries, subsequent runs do not need to re-ingest the same entries again if there is no new evidence. Disabling it will re-ingest all entries, with solely the old evidence being filtered out.  This parameter is enabled by default.  

    Recorded Future Vulnerability Risk List Configuration Screen

    Recorded Future Hash Risk List Parameters

    Parameter Description
    API Key Your API Key to be used in HTTP headers for accessing feed data. 
    Enable SSL Verification Enable this for the feed to validate the host-provided SSL certificate.
    Disable Proxies Enable this option if the feed should not honor proxies set in the ThreatQ UI.
    Risk Rule Triggered Optional - Enable this parameter to ingests only indicators that triggered any of the selected risk rules. If no risk rule is selected, all the indicators satisfying the rest of the criteria are ingested. Options include:
    • Reported by Insikt Group
    • Reported by DHS AIS
    • Historically Reported in Threat List
    • Linked to Cyber Attack
    • Linked to Malware
    • Linked to Attack Vector
    • Linked to Vulnerability
    • Malware SSL Certificate Fingerprint
    • Positive Sandbox Detection on File From Underground Virus Testing Sites
    • No Risk Observed
    • Observed in Underground Virus Testing Sites
    • Observed in the Wild by Recorded Future Telemetry
    • Positive Malware Verdict
    • Recently Active Targeting Vulnerabilities in the Wild
    • Referenced by Insikt Group
    • Trending in Recorded Future Analyst Community
    • Suspicious Behavior Detected
    • Threat Researcher
    Ingested Hash Types Select the type of hashes to be ingested into ThreatQ.  Options include
    • MD5
    • SHA-1
    • SHA-256
    Minimum Risk Score Threshold The numeric value representing the minimum risk score required to ingest an IOC.  The default setting is 50.
    Normalize Risk Score Enable this parameter ingest a normalized risk score value as a scorable attribute.   
    Risk Score Normalization Mapping Mapping used to normalize the numeric risk score values to the scorable attribute, Normalized Risk. The Risk Score itself will always be ingested. This mapping should contain a line-separated CSV formatted string with the following columns: Minimum, Maximum, and Normalized Value.

    Default Values
    0,25,Low
    26,50,Medium
    51,75,High
    76,100,Critical

    This parameter is only accessible if you have enabled the Normalize Risk Score parameter. 

    Filter Out Entries with No New Evidence Enabling this option will filter out entries that have no new evidence. A risk list is a rolling list of indicators. As a result, there are entries within the list that may be from days, months, or even years ago. Once the feed runs historically and ingests all the entries, subsequent runs do not need to re-ingest the same entries again if there is no new evidence. Disabling it will re-ingest all entries, with solely the old evidence being filtered out.  This parameter is enabled by default.  

    Recorded Future Hash Risk List Configuration Screen  

    Recorded Future IP Risk List Parameters

    Parameter Description
    API Key Your API Key to be used in HTTP headers for accessing feed data. 
    Enable SSL Verification Enable this for the feed to validate the host-provided SSL certificate.
    Disable Proxies Enable this option if the feed should not honor proxies set in the ThreatQ UI.
    Risk Rule Triggered Optional - Enable this parameter to ingests only indicators that triggered any of the selected risk rules. If no risk rule is selected, all the indicators satisfying the rest of the criteria are ingested. Options include:
    • Threat Actor Used Infrastructure
    • Historically Reported by Insikt Group
    • Inside Possible Bogus BGP Route
    • Historical Botnet Traffic
    • Historical Brute Force
    • Nameserver for C&C Server
    • Cyber Exploit Signal: Critical
    • Cyber Exploit Signal: Important
    • Cyber Exploit Signal: Medium
    • Recent Host of Many DDNS Names
    • Historical DDoS
    • Historically Reported as a Defanged IP
    • Historically Reported by DHS AIS
    • Historical DNS Abuse
    • Resolution of Fast Flux DNS Name
    • Historically Reported in Threat List
    • Historical Honeypot Sighting
    • Honeypot Host
    • Recently Communicating Validated C&C Server
    • Historically Linked to Intrusion Method
    • Historically Linked to APT
    • Historically Linked to Cyber Attack
    • Historical Malicious Infrastructure Admin Server
    • Suspected Malicious Packet Source
    • Historical Malware Delivery
    • Historical Multicategory Blocklist
    • Observed in the Wild by Recorded Future Telemetry
    • Historical Open Proxies
    • Historical Phishing Host
    • Historical Positive Malware Verdict
    • Recorded Future Predictive Risk Model
    • Actively Communicating Validated C&C Server
    • Recently Reported by Insikt Group
    • Recent Botnet Traffic
    • Recent Brute Force
    • Recent DDoS
    • Recently Reported as a Defanged IP
    • Recently Reported by DHS AIS
    • Recent DNS Abuse
    • Recent Honeypot Sighting
    • Recently Linked to Intrusion Method
    • Recently Linked to APT
    • Recently Linked to Cyber Attack
    • Recent Malicious Infrastructure Admin Server
    • Recent Malware Delivery
    • Recent Multicategory Blocklist
    • Recent Open Proxies
    • Recent Phishing Host
    • Recent Positive Malware Verdict
    • Recently Referenced by Insikt Group
    • Recently Reported C&C Server
    • Recently Communicating With Reported C&C Server
    • Recent Spam Source
    • Recent SSH/Dictionary Attacker
    • Recent Bad SSL Association
    • Recent Suspected C&C Server
    • Recent Threat Researcher
    • Recent Tor Node
    • Recent Unusual IP
    • Validated C&C Server
    • Recently Communicating With Validated C&C Server
    • Recently Defaced Site
    • Historically Referenced by Insikt Group
    • Historically Reported C&C Server
    • Trending in Recorded Future Analyst Community
    • Historical Spam Source
    • Historical SSH/Dictionary Attacker
    • Historical Bad SSL Association
    • Historical Suspected C&C Server
    • Suspected Phishing Host
    • Historical Threat Researcher
    • Tor Node
    • Unusual IP
    • Previously Validated C&C Server
    • Vulnerable Host
    • Observed High-Impact Vulnerability
    Minimum Risk Score Threshold The numeric value representing the minimum risk score required to ingest an IOC.  The default setting is 50.
    Normalize Risk Score Enable this parameter ingest a normalized risk score value as a scorable attribute.   
    Risk Score Normalization Mapping Mapping used to normalize the numeric risk score values to the scorable attribute, Normalized Risk. The Risk Score itself will always be ingested. This mapping should contain a line-separated CSV formatted string with the following columns: Minimum, Maximum, and Normalized Value.

    Default Values
    0,25,Low
    26,50,Medium
    51,75,High
    76,100,Critical

    This parameter is only accessible if you have enabled the Normalize Risk Score parameter. 

    Filter Out Entries with No New Evidence Enabling this option will filter out entries that have no new evidence. A risk list is a rolling list of indicators. As a result, there are entries within the list that may be from days, months, or even years ago. Once the feed runs historically and ingests all the entries, subsequent runs do not need to re-ingest the same entries again if there is no new evidence. Disabling it will re-ingest all entries, with solely the old evidence being filtered out.  This parameter is enabled by default.  

     Recorded Future IP Risk List Configuration Screen  

    Recorded Future URL Risk List Parameters

    Parameter Description
    API Key Your API Key to be used in HTTP headers for accessing feed data. 
    Enable SSL Verification Enable this for the feed to validate the host-provided SSL certificate.
    Disable Proxies Enable this option if the feed should not honor proxies set in the ThreatQ UI.
    Risk Rule Triggered Optional - Enable this parameter to ingests only indicators that triggered any of the selected risk rules. If no risk rule is selected, all the indicators satisfying the rest of the criteria are ingested. Options include:
    • Historically Reported by Insikt Group
    • Historically Reported Botnet URL
    • Historical C&C URL
    • Historically Reported as a Defanged URL
    • Historically Reported by DHS AIS
    • Historically Reported Fraudulent Content
    • Historically Reported in Threat List
    • Historically Detected Malware Distribution
    • Historically Suspected Malware Distribution
    • Historically Detected Cryptocurrency Mining Techniques
    • No Risk Observed
    • Observed in the Wild by Recorded Future Telemetry
    • Historically Detected Phishing Techniques
    • Historically Suspected Phishing Techniques
    • Historically Detected Web Filter Avoidance Proxy URL
    • Recently Reported by Insikt Group
    • Recently Reported Botnet URL
    • Recent C&C URL
    • Recently Reported as a Defanged URL
    • Recently Reported by DHS AIS
    • Recently Reported Fraudulent Content
    • Recently Detected Malware Distribution
    • Recently Suspected Malware Distribution
    • Recently Detected Cryptocurrency Mining Techniques
    • Recently Detected Phishing Techniques
    • Recently Suspected Phishing Techniques
    • Recent Web Filter Avoidance Proxy URL
    • Recently Referenced by Insikt Group
    • Recent Reported C&C URL
    • Recently Reported Spam or Unwanted Content
    • Recent Suspected C&C URL
    • Recently Active URL on Weaponized Domain
    • Historically Referenced by Insikt Group
    • Historical Reported C&C URL
    • Historically Reported Spam or Unwanted Content
    • Historical Suspected C&C URL
    Minimum Risk Score Threshold The numeric value representing the minimum risk score required to ingest an IOC.  The default setting is 50.
    Normalize Risk Score Enable this parameter ingest a normalized risk score value as a scorable attribute.   
    Risk Score Normalization Mapping Mapping used to normalize the numeric risk score values to the scorable attribute, Normalized Risk. The Risk Score itself will always be ingested. This mapping should contain a line-separated CSV formatted string with the following columns: Minimum, Maximum, and Normalized Value.

    Default Values
    0,25,Low
    26,50,Medium
    51,75,High
    76,100,Critical

    This parameter is only accessible if you have enabled the Normalize Risk Score parameter. 

    Filter Out Entries with No New Evidence Enabling this option will filter out entries that have no new evidence. A risk list is a rolling list of indicators. As a result, there are entries within the list that may be from days, months, or even years ago. Once the feed runs historically and ingests all the entries, subsequent runs do not need to re-ingest the same entries again if there is no new evidence. Disabling it will re-ingest all entries, with solely the old evidence being filtered out.  This parameter is enabled by default.  

    Recorded Future URL Risk List Configuration Screen

    Recorded Future Analyst Note Parameters

    Parameter Description
    API Key Your API Key to be used in HTTP headers for accessing feed data. 
    Entity

    A string to search for notes by entity ID. 
    Title
    A string to search for notes by title.
    Topic
    A string to search for notes by topic ID. Options include:
    • Actor Profile
    • Analyst On-Demand Report
    • Cyber Threat Analysis
    • Flash Report 
    • Geopolitical  Intelligence Summary
    • Geopolitical Flash Event
    • Geopolitical Threat Forecast
    • Geopolitical Validated Event
    • Hunting Package
    • Indicator
    • Insikt Research Lead
    • Informational
    • Malware/Tool Profile
    • Regular Vendor Vulnerability Disclosures
    • Sigma Rule
    • SNORT Rule
    • Source Profile
    • The Record by Recorded Future
    • Threat Lead
    • TTP Instance
    • Validated Intelligence Event
    • Weekly Threat Landscape
    • YARA Rule
    Label
    A string that helps searching for notes by label, by name.
    Source A string that helps sorting by the source of note. The options for this user field will be:
    • Insikt Group
    • ThreatQuotient - Partner Notes
    Tagged Text
    Enable this parameter if the text should contain tags. 
    Fetch & Ingest Attachments Enable this parameter to fetch any attachments associated with a given analyst note. 
    Extracted Signatures Select which signature types to parse and ingest from relevant analyst note attachments. Options include:
    • YARA (default)
    • Snort (default)
    • Sigma
    • Nuclei

    Sigma and Nuclei rules will be ingested with the Custom signature type and a Type attribute for the specific rule type.

    Ingest CVEs As Select which ThreatQ entity type to ingest CVE values as in ThreatQ.  Options include Vulnerabilities (default) and Indicators.  
    Ingest Selected Primary Entities as Indicators Select which entity types to ingest as indicators of compromise into ThreatQ. Options include:
    • URLs (default)
    • Internet Domain Names (default)
    • IP Addresses (default)
    • Hashes (default)
    • Email Addresses (default)
    • Usernames
    • Filenames

    This will only ingest the selected types from the "primary" entities (note_entities), and not the "supporting" entities (context_entities). This is so we can reduce the amount of false positives being ingested into the platform. Even if you do not select any of these, they will still be included in the description of the note.

    Ingest Selected Supporting Entities as Indicators Select which entity types to ingest as indicators of compromise into ThreatQ.  Options include:
    • Internet Domain Names
    • IP Addresses
    • Hashes
    • Email Addresses
    • Usernames
    • Filenames

    This will only enable the ingestion of the selected types from the "supporting" entities (context_entities), and not the "primary" entities (note_entities). ThreatQuotient does not recommend enabling option due to the high likelihood of false positives. Even if you do not select any of these, they will still be included in the description of the note.

    Ingested Hash Types Select the type of hashes to be ingested into ThreatQ.  Options include
    • MD5
    • SHA-1
    • SHA-256
    Ingest Topics As Select the ThreatQ entity type to ingest topics as in the platform.  Options include Tags and Attributes.  
    API Request Limit The maximum number of records per request. This will be used in the pagination.
    Enable SSL Verification Enable this for the feed to validate the host-provided SSL certificate.
    Disable Proxies Enable this option if the feed should not honor proxies set in the ThreatQ UI.

    Recorded Future Analyst Note Configuration Screen

    Recorded Future Alerts Parameters

    Parameter Description
    API Key Your API Key to be used in HTTP headers for accessing feed data. 
    Triggered A string to search for events from a specific date (YYYY-MM-DD or YYYY-MM or YYYY).
    Review Status
    A string to search for events by status (Unassigned, Assigned, No Action and Tuning). If no specific status is selected, all event statuses are returned by the provider.
    Freetext Search
    A string to search for events by any value.
    Ingest CVE Data as Select whether to ingest CVEs as: Vulnerabilities or Indicators (type: CVE).
    Ingested Hash Types Select the type of hashes to be ingested into ThreatQ.  Options include
    • MD5
    • SHA-1
    • SHA-256
    Ingest Indicator Hits Select which indicator hits to ingest into ThreatQ. All ingested indicators will receive a status of 'Review' since hits are not always indicators of compromise. They may be your organization's domains found on the dark web, newly registered organization domains, or other non-malicious indicators. Options include:
    • URLs
    • Domains
    • IP Addresses
    • Filenames
    Ingest Emails as Compromised Accounts for These Rules Enter a line-separated list of rule names (or IDs) that will be used to determine if an email address should be ingested as a Compromised Account object or Identity object. Recorded Future creates alerts for entities that have triggered a rule. These entities may be of different types such as: IP addresses, URLs, email addresses, etc. This parameter allows you to determine if an email address is a compromised Account when Recorded Future creates an alert for it.
    Ingest Images as Files Related to Alerts Enable this option to download and ingest images into the ThreatQ platform as related Files.  
    Ingest and Relate "triggered_by" Entities to Alerts Enable this option to ingest "triggered_by" entities related objects.  
    Enable SSL Verification Enable this for the feed to validate the host-provided SSL certificate.
    Disable Proxies Enable this option if the feed should not honor proxies set in the ThreatQ UI.

    Recorded Future Alerts Configuration Screen

    Recorded Future Playbook Alerts Parameters

    Parameter Description
    API Key Your API Key to be used in HTTP headers for accessing feed data. 
    Filter By The date that will be used for filtering the alerts: Creation or Update time of the Playbook Alert.
    Statuses The Status of the Playbook Alert.  Options include:
    • New
    • In Progress
    • Dismissed
    • Resolved
    Playbook Category Filter Select which playbook categories to ingest. Options include:
    • Domain Abuse (default)
    • Cyber Vulnerability (default)
    • Code Repo Leakage (default)
    • Third Party Risk (default)
    Priority The Priority of the Playbook Alert.  Options include:
    • High Priority
    • Moderate Priority
    • Priority Informational
    Normalize Risk Score Enable this parameter ingest a normalized risk score value as a scorable attribute.   
    Risk Score Normalization Mapping Mapping used to normalize the numeric risk score values to the scorable attribute, Normalized Risk. The Risk Score itself will always be ingested. This mapping should contain a line-separated CSV formatted string with the following columns: Minimum, Maximum, and Normalized Value.

    Default Values
    0,25,Low
    26,50,Medium
    51,75,High
    76,100,Critical

    This parameter is only accessible if you have enabled the Normalize Risk Score parameter. 

    Ingest Target Attributes Enable this parameter to ingest Targets as event attributes and related indicator attributes. This parameter is enabled by default.
    Ingest CVEs as Select whether to ingest CVEs as: Vulnerabilities or Indicators (type: CVE).
    Enable SSL Verification Enable this for the feed to validate the host-provided SSL certificate.
    Disable Proxies Enable this option if the feed should not honor proxies set in the ThreatQ UI.

    Recorded Future Playbook Alerts Configuration Screen

    Recorded Future Fusion Files Parameters

    Parameter Description
    API Key Your API Key to be used in HTTP headers for accessing feed data. 
    Selected Fusion Feeds Select the Fusion Files to be retrieved. Options include:
    • Command and Control IPs
    • Known TOR IPs
    • Active RAT C2 IPs
    • Fast Flux IPs
    • IP Risk List w/ Geolocation & Malware
    • Dynamic DNS IPs
    • Potentially Undetectable Malware
    • Weaponized Domains
    • Exploits in the Wild Hashes
    Minimum Risk Score Threshold The numeric value representing the minimum risk score required to ingest an IOC.  The default setting is 50.

    This parameter is only accessible if you have enabled the IP Risk List w/ Geolocation & Malware option is selected for the Selected Fusion Feeds parameter. 

    Normalize Risk Score Enable this parameter ingest a normalized risk score value as a scorable attribute. 

    This parameter is only accessible if you have enabled the IP Risk List w/ Geolocation & Malware option is selected for the Selected Fusion Feeds parameter. 

    Risk Score Normalization Mapping Mapping used to normalize the numeric risk score values to the scorable attribute, Normalized Risk. The Risk Score itself will always be ingested. This mapping should contain a line-separated CSV formatted string with the following columns: Minimum, Maximum, and Normalized Value.

    Default Values
    0,25,Low
    26,50,Medium
    51,75,High
    76,100,Critical

    This parameter is only accessible if you have enabled the IP Risk List w/ Geolocation & Malware option is selected for the Selected Fusion Feeds parameter. 

    Filter Out Entries with No New Evidence Enabling this option will filter out entries that have no new evidence. A risk list is a rolling list of indicators. As a result, there are entries within the list that may be from days, months, or even years ago. Once the feed runs historically and ingests all the entries, subsequent runs do not need to re-ingest the same entries again if there is no new evidence. Disabling it will re-ingest all entries, with solely the old evidence being filtered out.  This parameter is enabled by default.  
    Ingest Related Malware Enabling this will ingest Malware related to indicators in the feeds.

    It is important to note that over time, this may create a large number of relationships between indicators and malware.

    Ingest Related CVEs Optional - Enabling this will ingest CVEs related to indicators in the feeds.

    This parameter only applies to the Exploits in the Wild feed and is disabled by default due to the large number of CVE relationships that may be created when enabled.  Exercise caution when enabled this parameter.

    Ingest CVEs As Select whether to ingest CVEs as Vulnerabilities (default) or Indicators.

    This parameter is only accessible if you have enabled the Ingest Related CVEs parameter selected.

    Enable SSL Verification Enable this for the feed to validate the host-provided SSL certificate.
    Disable Proxies Enable this option if the feed should not honor proxies set in the ThreatQ UI.

    Recorded Future Playbook Alerts Configuration Screen

    Recorded Future Detection Rules Parameters

    Parameter Description
    API Key Your API Key to be used in HTTP headers for accessing feed data. 
    API Request Limit Enter the maximum number of objects per request. This will be used in the pagination.
    Enable SSL Verification Enable this for the feed to validate the host-provided SSL certificate.
    Disable Proxies Enable this option if the feed should not honor proxies set in the ThreatQ UI.
    Rule Types Select which rule types to fetch and ingest from the Recorded Future API. Options include:
    • YARA (default)
    • Snort (default)
    • Sigma
    Ingest Selected Entities as Indicators Select which entity types to ingest as indicators of compromise into ThreatQ. Options include:
    • URLs
    • Internet Domain Names
    • IP Addresses
    • Hashes
    • Email Addresses
    • Usernames
    • Filenames
    Ingested Hash Types Select the hash types to ingest. Options include:
    • MD5
    • SHA-1
    • SHA-256
    Ingest CVEs as Select whether to ingest CVEs as: Vulnerabilities or Indicators (type: CVE).

    Recorded Future Playbook Alerts Configuration Screen
  5. Review any additional settings, make any changes if needed, and click on Save.
  6. Click on the toggle switch, located above the Additional Information section, to enable it.

ThreatQ Mapping

Recorded Future Domain Risk List

The Recorded Future Domain Risk List feed ingests data from the Recorded Future Default Domain Risk List in form of a CSV list. The first token is the actual risk data (domain), and the last token (EvidenceDetails) contains supporting context. This token is a JSON-formatted string of an array of dictionaries.

GET https://api.recordedfuture.com/v2/domain/risklist

Sample Response:

'ns513726.ip-192-99-148.net', '92', '3/32',
'{"EvidenceDetails":
    [
        {
            "CriticalityLabel": "Unusual",
            "Rule": "Historical Malware Analysis DNS Name",
            "EvidenceString": "6 sightings on 1 source: VirusTotal...",
            "Timestamp": "2015-04-04T00:00:00.000Z",
            "Criticality": 1
        },
        {
            "CriticalityLabel": "Suspicious",
            "Rule": "Blacklisted DNS Name",
            "EvidenceString": "1 sighting on 1 source: DShield: Suspicious Domain List.",
            "Timestamp": "2018-12-26T07:12:00.936Z",
            "Criticality": 2
        },
        {
            "CriticalityLabel": "Very Malicious",
            "Rule": "C&C DNS Name",
            "EvidenceString": "1 sighting on 1 source: Abuse.ch: ZeuS Domain Blocklist (Standard).",
            "Timestamp": "2018-12-26T07:12:00.936Z",
            "Criticality": 4
        }
    ]
}'

ThreatQuotient provides the following default mapping for this feed:

Feed Data Path ThreatQ Entity ThreatQ Object Type or Attribute Key Published Date Examples Notes
0 (first token) Indicator.Value FQDN N/A ns513726.ip-192-99-148.net N/A
1 (second token) Indicator.Attribute Risk Score N/A 66 Updatable
1 (second token) Indicator.Attribute Normalized Risk N/A High Mapped using Risk Score Normalization Mapping user field; Updatable
2 (third token) Indicator.Attribute Risk String N/A 2/32 Updatable
3 (fourth token)[].CriticalityLabel Indicator.Attribute Criticality 3 (fourth token)[].Timestamp Suspicious Updatable.  The highest criticality level is selected.
3 (fourth token)[].Rule Indicator.Attribute Associated Rule 3 (fourth token)[].Timestamp Blacklisted DNS Name N/A
3 (fourth token)[].EvidenceString Indicator.Attribute Evidence 3 (fourth token)[].Timestamp 1 sighting on 1 source: Abuse.ch: ZeuS Domain Blocklist (Standard). N/A

Recorded Future IP Risk List

The Recoded Future IP Risk List feed ingests Recorded Future Default IP risk list. IP addresses are ingested as indicators.

GET https://api.recordedfuture.com/v2/ip/risklist

Sample CSV Response:

'5.120.187.119", '65', '1/49',
'{"EvidenceDetails":
    [
        {
            "CriticalityLabel": "Malicious",
            "Rule": "Recent Positive Malware Verdict",
            "EvidenceString": "1 sighting on 1 source: ReversingLabs....",
            "Timestamp": "2018-11-22T00:00:00.000Z",
            "Criticality": 3
        }
    ]
}'

ThreatQuotient provides the following default mapping for this feed:

Feed Data Path ThreatQ Entity ThreatQ Object Type or Attribute Key Published Date Examples Notes
0 (first token) Indicator.Value IP Address N/A 5.120.187.119 N/A
1 (second token) Indicator.Attribute Risk Score N/A 65 Updatable
1 (second token) Indicator.Attribute Normalized Risk N/A High Mapped using Risk Score Normalization Mapping user field; Updatable
2 (third token) Indicator.Attribute Risk String N/A 1/49 Updatable
3 (fourth token)[].CriticalityLabel Indicator.Attribute Criticality 3 (fourth token)[].Timestamp Malicious Updatable.  The highest criticality level is selected.
3 (fourth token)[].Rule Indicator.Attribute Associated Rule 3 (fourth token)[].Timestamp Recent Positive Malware Verdict N/A
3 (fourth token)[].EvidenceString Indicator.Attribute Evidence 3 (fourth token)[].Timestamp 1 sighting on 1 source: ReversingLabs. N/A

Recorded Future URL Risk List

The Recorded Future URL Risk List feed ingests Recorded Future Default URL risk list. URLs are ingested as indicators.

GET https://api.recordedfuture.com/v2/url/risklist

Sample CSV Response:

'http://handle.booktobi.com/css/index.html', '65', '1/7',
'{"EvidenceDetails":
    [
        {
            "CriticalityLabel": "Malicious",
            "Rule": "Active Phishing URL",
            "EvidenceString": "1 sighting on 1 source: PhishTank: Phishing Reports.",
            "Timestamp": "2018-12-26T16:15:44.750Z",
            "Criticality": 3
        }
    ]
}'

ThreatQuotient provides the following default mapping for this feed:

Feed Data Path ThreatQ Entity ThreatQ Object Type or Attribute Key Published Date Examples Notes
0 (first token) Indicator.Value URL N/A http://handle.booktobi.
com/css/index.html
N/A
1 (second token) Indicator.Attribute Risk Score N/A 65 Updatable
1 (second token) Indicator.Attribute Normalized Risk N/A High Mapped using Risk Score Normalization Mapping user field; Updatable
2 (third token) Indicator.Attribute Risk String N/A 1/7 Updatable
3 (fourth token)[].CriticalityLabel Indicator.Attribute Criticality 3 (fourth token)[].Timestamp Malicious Updatable - the highest criticality level is selected.
3 (fourth token)[].Rule Indicator.Attribute Associated Rule 3 (fourth token)[].Timestamp Active Phishing URL N/A
3 (fourth token)[].EvidenceString Indicator.Attribute Evidence 3 (fourth token)[].Timestamp 1 sighting on 1 source: PhishTank: Phishing Reports. N/A

Recorded Future Vulnerability Risk List

The Recorded Future Vulnerability Risk List feed ingests Recorded Future Default Vulnerability risk list. CVEs are ingested as indicators or as vulnerabilities depending on user configuration.

GET https://api.recordedfuture.com/v2/vulnerability/risklist

Sample CSV Response:

'CVE-2018-0802', '89', '11/18',
'{"EvidenceDetails":
    [
        {
            "CriticalityLabel": "Low",
            "Rule": "Linked to Historical Cyber Exploit",
            "EvidenceString": "4281 sightings on 351 sources including: ...",
            "Timestamp": "2018-11-14T22:31:30.000Z",
            "Criticality": 1
        },
        {
            "CriticalityLabel": "Low",
            "Rule": "Historically Linked to Penetration Testing Tools",
            "EvidenceString": "1 sighting on 1 source: @DTechCloud....",
            "Timestamp": "2018-05-07T20:31:29.000Z", "Criticality": 1
        },
    ]
}'

ThreatQuotient provides the following default mapping for this feed:

Feed Data Path ThreatQ Entity ThreatQ Object Type or Attribute Key Published Date Examples Notes
0 (first token) Indicator.Value/Vulnerability.Value CVE/N/A N/A CVE-2018-0802 N/A
1 (second token) Indicator.Attribute/Vulnerability.Attribute Risk Score N/A 89 Updatable
1 (second token) Indicator.Attribute Normalized Risk N/A High Mapped using Risk Score Normalization Mapping user field; Updatable
2 (third token) Indicator.Attribute/Vulnerability.Attribute Risk String N/A 11/18 Updatable
3 (fourth token)[].CriticalityLabel Indicator.Attribute/Vulnerability.Attribute Criticality 3 (fourth token)[].Timestamp Low Updatable. The highest criticality level is selected.
3 (fourth token)[].Rule Indicator.Attribute/Vulnerability.Attribute Associated Rule 3 (fourth token)[].TimeStamp Linked to Historical Cyber Exploit N/A
3 (fourth token)[].EvidenceString Indicator.Attribute/Vulnerability.Attribute Evidence 3 (fourth token)[].Timestamp 1 sighting on 1 source: @DTechCloud.... N/A

Recorded Future Hash Risk List

The Recorded Future Hash Risk List feed ingests Recorded Future Default Hash risk list. Hashes are ingested as indicators.

GET https://api.recordedfuture.com/v2/hash/risklist

Sample CSV Response:

'ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa', 'SHA-256', '89', '4/10',
'{"EvidenceDetails":
    [
        {
            "CriticalityLabel": "Unusual",
            "Rule": "Threat Researcher",
            "EvidenceString": "21 sightings on 9 sources including: ...",
            "Timestamp": "2018-01-28T11:24:35.942Z",
            "Criticality": 1.0
        },
        {
            "CriticalityLabel": "Suspicious",
            "Rule": "Linked to Vulnerability",
            "EvidenceString": "5 sightings on 2 sources: ...",
            "Timestamp": "2017-08-08T14:10:11.410Z",
            "Criticality": 2
        },
        {
            "CriticalityLabel": "Suspicious",
            "Rule": "Linked to Malware",
            "EvidenceString": "Previous sightings on 36 sources including: ...",
            "Timestamp": "2017-05-12T15:39:30.000Z",
            "Criticality": 2
        },
    ]
}'

ThreatQuotient provides the following default mapping for this feed:

Feed Data Path ThreatQ Entity ThreatQ Object Type or Attribute Key Published Date Examples Notes
0 (first token) Indicator.Value 1 (second token) N/A 00d48afbba5ef9ead
b572730b2d0cafa
N/A
2 (third token) Indicator.Attribute Risk Score N/A 89 Updatable
2 (third token) Indicator.Attribute Normalized Risk N/A High Mapped using Risk Score Normalization Mapping user field; Updatable
3 (fourth token) Indicator.Attribute Risk String N/A 4/10 Updatable
4 (fifth token)[].CriticalityLabel Indicator.Attribute Criticality 4 (fifth token)[].Timestamp Suspicious Updatable. The highest criticality level is selected.
4 (fifth token)[].Rule Indicator.Attribute Associated Rule 4 (fifth token)[].Timestamp Linked to Malware N/A
4 (fifth token)[].EvidenceString Indicator.Attribute Evidence 4 (fifth token)[].Timestamp Previous sightings on 36 sources including: ... N/A

Recorded Future Analyst Note

The Recorded Future Analyst Note feed ingests Reports, Indicators and Attack Patterns

POST https://api.recordedfuture.com/analyst-note/search

Sample Response:

{
    "data": [
            {
                "source": {
                    "id": "VKz42X",
                    "name": "Insikt Group",
                    "type": "Source"
                },
                "attributes": {
                    "validated_on": "2020-02-06T06:59:32.784Z",
                    "published": "2020-02-06T06:59:32.784Z",
                    "text": "some text",
                    "attachment": "APT_FIN7.yar",
                    "topic": [
                        {
                            "id": "TXSFt0",
                            "name": "Flash Report",
                            "type": "Topic"
                        }
                    ],
                    "title": "Mailto Ransomware Targets Enterprise Networks",
                    "note_entities": [
                        {
                            "id": "bLfMiL",
                            "name": "Mailto Ransomware",
                            "type": "Malware"
                        }
                    ],
                    "context_entities": [
                        {
                            "id": "J6UzbO",
                            "name": "Bleeping Computer",
                            "type": "Source"
                        }
                    ],
                    "validation_urls": [
                        {
                            "id": "url:url:https://www.bleepingcomputer.com/news/security/mailto-netwalker-ransomware-targets-enterprise-networks/",
                            "name": "url:https://www.bleepingcomputer.com/news/security/mailto-netwalker-ransomware-targets-enterprise-networks/",
                            "type": "URL"
                        },
                        {
                            "id": "url:url:https://twitter.com/VK_Intel/status/1225086186445733889?s=20",
                            "name": "url:https://twitter.com/VK_Intel/status/1225086186445733889?s=20",
                            "type": "URL"
                        }
                    ]
                },
                "id": "cu1WGK"
            }
        ],
    "counts": {
        "returned": 10,
        "total": 19216
    }
}

ThreatQuotient provides the following default mapping for this feed:

Feed Data Path ThreatQ Entity ThreatQ Object Type or Attribute Key Examples Notes  
.data[].attributes.
title
Report.Name Report "Mailto Ransomware Targets Enterprise Networks" N/A  
.data[].attributes.
published
Report.Published_at N/A "2020-02-06T06:59:32.784Z" This date will also be used for related indicators and attack patterns.  
.data[].attributes.
text
Report.Description Description "text" Description formatted using context information like Metadata, Topics, Notes and Contextual Entities, and Reference URLs  
.data[].source.
name
Report.Attribute/
Signature.Attribute/ Attachment.Attribute
Recorded Future Source "Insikt Group" N/A  
.data[].attributes.
topic[].name
Report.Attribute/
Signature.Attribute/ Attachment.Attribute
Topic Name "Flash Report" User-Configurable  
.data[].id Report.Attribute/
Signature.Attribute/ Attachment.Attribute
Recorded Future URL "https://app.recordedfuture.
com/portal/research/analyst
/doc:cu1WGK"
Link formatted using .id  
.data[].attributes
.topic[].name
Report.Tag/
Signature.tag/ Attachment.tag
N/A "Informational" User-Configurable  
.data[].attributes.
context_entities
N/A N/A N/A *See Entities Mapping  
.data[].attributes.
note_entities
N/A N/A N/A *See Entities Mapping  
.data[].attributes.
attachment
Attachment.Value N/A APT_FIN7.yar User-Configurable. The .data[].attributes.attachment is used to download the file.  
.data[].attributes.
attachment
Signature.Value Yara, Snort, Custom(Sigma,Nuclei) N/A User-Configurable. The content of the .data[].attributes.attachment downloaded file. Signature are also related to ingested Attachments, Malware and Adversaries.  
.data[].attributes.
attachment
Signature.Attribute <Various Names> N/A Parsed from the content of the .data[].attributes.attachment downloaded file.  
.data[].attributes.
attachment
Signature Related Indicators <Various Types> N/A Parsed from the content of the .data[].attributes.attachment downloaded file.  

Entities Mapping

This mapping will be used to map both values from context_entities and note_entities. The data sample and mapping are below:

Sample Response:

{
    "context_entities": [
        {
            "id": "J6UzbO",
            "name": "Bleeping Computer",
            "type": "Source",
            "description": "some description"
        }
    ]
}
 indicator_type_map:
    InternetDomainName: FQDN
    URL: URL
    IpAddress: IP Address
    EmailAddress: Email Address
    FileName: Filename
    Username: Username
    Hash: MD5, SHA-1, SHA-256
    CyberVulnerability: CVE
premapped_entities:
    - Malware
    - MitreAttackIdentifier
    - CyberVulnerability
    - Hashtag
    - Image

The integration will filter based by type. If the value of the type key is contained in the indicator_type_map below or is equal to Hash, an indicator will be ingested (the published_at date will be the same as for the report object). If the type key is equal to Malware, an object of type Malware type will be ingested. If the type key is equal to MitreAttackIdentifier, an object of Attack Pattern type will be ingested. Else, attributes will be created for the main report object.

Feed Data Path ThreatQ Entity ThreatQ Object Type or Attribute Key Examples Notes
.name Report.Attribute/Indicator.Attribute .type N/A *See Event Attributes Mapping below. If type is Product and there are related vulnerabilities, change the Product attribute key to Affected Product
.text Report.Attribute .description N/A N/A
.name Indicator.Value .type 98.123.54.12 IOC is enabled Ingest Selected Primary Entities as Indicators or Ingest Selected Supporting Entities as Indicators
.type Indicator.Type .name Ip Address The value for this will be indicator_type_map[.type] if it exists there. If the value is Hash, the value length will be analysed and based on it it will be either MD5, SHA-1, or SHA-256.
.name Adversary.Value N/A N/A If .type is Organization
.name Adversary.Attribute Category "Bleeping Computer" If .type is CyberThreatActorCategory
.name Identity.Value N/A john.doe@acme.com We ingest the Email Address as a Identity from "supporting" entities
.name Attack Pattern.Value N/A T1023 - MITRE Technique Name If type is equal to MitreAttackIdentifier
.name Malware.Value N/A Mailto Ransomware If .type is equal to Malware
.name Malware.Attribute Category N/A If .type id equal to MalwareCategory
.name Vulnerability.Value N/A N/A If the .type is equal to CyberVulnerability
.name Vulnerability.Attribute/Indicator.Attribute Affected Product Citrix Object type is based on Ingest CVEs As selection

Context (i.e. Malware, Adversaries, Attributes, and Attack Patterns) from the "primary" entities list will now be applied to the indicators of compromise from the "primary" entities list.

Recorded Future Alerts

The Recorded Future Alerts feed Recorded Future alerts as ThreatQ Events and all the related Indicators, Malware, Adversaries, Attack Patterns and Vulnerabilities, Image files and Entity objects.

GET https://api.recordedfuture.com/alert/v3

Sample Response:

{
  "data": [
    {
      "review": {
        "note": null,
        "status_in_portal": "New",
        "assignee": null,
        "status": "no-action"
      },
      "owner_organisation_details": {
        "organisations": [
          {
            "organisation_id": "uhash:ER135KQ6oL",
            "organisation_name": "ThreatQ - Partner"
          }
        ],
        "enterprise_id": "uhash:DimzHe41vx",
        "enterprise_name": "ThreatQ - Partner"
      },
      "url": {
        "api": "https://api.recordedfuture.com/v3/alerts/rj540x",
        "portal": "https://app.recordedfuture.com/live/sc/notification/?id=rj540x"
      },
      "rule": {
        "name": "Cyber Espionage, Related Vulnerabilities",
        "id": "nt4XZZ",
        "url": {
          "portal": "https://app.recordedfuture.com/live/sc/ViewIdkobra_view_report_item_alert_editor?view_opts=%7B%22reportId%22%3A%22nt4XZZ%22%2C%22bTitle%22%3Atrue%2C%22title%22%3A%22Cyber+Espionage%2C+Related+Vulnerabilities%22%7D"
        }
      },
      "id": "rj540x",
      "triggered_by": [
        {
          "entity_paths": [
            [
              {
                "attribute": {
                  "id": "CredentialLeak.targets"
                },
                "entity": {
                  "id": "email:s.grishin@delta.nl",
                  "name": "s.grishin@delta.nl",
                  "type": "EmailAddress"
                }
              }
            ]
          ]
        }
        ],
      "hits": [
        {
          "entities": [
            {
                "id": "img:e2cd9495-937b-40a4-b5d7-f0fe89184040",
                "name": "e2cd9495-937b-40a4-b5d7-f0fe89184040",
                "type": "Image"
            },
            {
              "id": "B_HE4",
              "name": "Google",
              "type": "Company"
            },
            {
              "id": "idn:reuters.com",
              "name": "reuters.com",
              "type": "InternetDomainName"
            },
            {
              "id": "Xw2PY",
              "name": "Frankfurt",
              "type": "Airport"
            },
            {
              "id": "rVnb7k",
              "name": "Rhysida",
              "type": "Malware"
            },
            {
              "id": "J0Nl-p",
              "name": "Ransomware",
              "type": "MalwareCategory"
            },
            {
              "id": "K_4o-y",
              "name": "Anonymous Sudan",
              "type": "Organization"
            },
            {
              "id": "I_7J4G",
              "name": "Hacktivist",
              "type": "CyberThreatActorCategory"
            },
            {
              "id": "mitre:T1048",
              "name": "T1048",
              "type": "MitreAttackIdentifier"
            },
            {
              "id": "email:mary.silverstein@delta.com",
              "name": "mary.silverstein@delta.com",
              "type": "EmailAddress"
            },
            {
              "id": "jc5TL-",
              "name": "ProxyShell",
              "type": "CyberVulnerability",
              "description": "ProxyShell and Log4J Vulnerabilities Were the Most Exploited Flaws in 2021."
            }
          ],
          "document": {
            "source": {
              "id": "source:hPTFPY",
              "name": "RedAlert | Blog",
              "type": "Source"
            },
            "title": "2022 Activities Summary of SectorA groups (ENG)",
            "url": "https://redalert.nshc.net/2023/06/08/2022-activities-summary-of-sectora-groups-eng/",
            "authors": []
          },
          "fragment": "In this operation, the group targeted engineering companies in the e id=0qjp>energyth an initial infiltration method.",
          "id": "HE-xwAAZh-v",
          "language": "eng",
          "primary_entity": {
            "id": "kvXvR5",
            "name": "CVE-2021-44228",
            "type": "CyberVulnerability",
            "description": "Apache Log4j2 2.0-beta9 through 2.15.0 (excluding security releases 2.12.2, 2.12.3, and 2.3.1) JNDI features used in configuration, log messages, and parameters do not protect against attacker controlled LDAP and other JNDI related endpoints. An attacker who can control log messages or log message parameters can execute arbitrary code loaded from LDAP servers when message lookup substitution is enabled. From log4j 2.15.0, this behavior has been disabled by default. From version 2.16.0 (along with 2.12.2, 2.12.3, and 2.3.1), this functionality has been completely removed. Note that this vulnerability is specific to log4j-core and does not affect log4net, log4cxx, or other Apache Logging Services projects."
          },
          "analyst_note": null
        }
      ],
      "ai_insights": {
        "comment": "The Recorded Future AI requires more references in order to produce a summary.",
        "text": null
      },
      "log": {
        "note_author": null,
        "note_date": null,
        "status_date": null,
        "triggered": "2023-06-08T04:53:13.444Z",
        "status_change_by": null
      },
      "title": "Cyber Espionage, Related Vulnerabilities - Rise: CVE-2021-44228",
      "type": "ENTITY"
    }
  ],
  "counts": {
    "returned": 10,
    "total": 2653
  }
}

ThreatQuotient provides the following default mapping for this feed:

Feed Data Path ThreatQ Entity ThreatQ Object Type or Attribute Key Published Date Examples Notes
.data[].title Event.Title N/A .data[].log.note_date / .data[].log.triggered Cyber Espionage, Related Vulnerabilities - Rise: CVE-2021-44228 If .data[].log.note_date is not present .data[].log.triggered is used as Published Date
.data[].log.triggered Event.Happened_at N/A N/A 2023-06-08T04:53:13.444Z N/A
.data[].* (See Notes) Event.Description N/A N/A The Recorded Future AI requires more references in order to produce a summary... Description is constructed from different Alert details, for example: Alert Metadata, AI Insights, and Hits information
.data[].id Event.Attribute Alert ID .data[].log.note_date / .data[].log.triggered N/A N/A
.data[].review.assignee Event.Attribute Assignee .data[].log.note_date / .data[].log.triggered N/A Updatable
.data[].log.note_author Event.Attribute Note Author .data[].log.note_date / .data[].log.triggered N/A N/A
.data[].review.status_
in_portal
Event.Attribute Alert Status .data[].log.note_date / .data[].log.triggered no-action Updatable
.data[].rule.name Event.Attribute Triggered Rule Name .data[].log.note_date / .data[].log.triggered Cyber Espionage, Related Vulnerabilities N/A
.data[].type Event.Attribute Alert Type .data[].log.note_date / .data[].log.triggered ENTITY N/A
.data[].owner_organis
ation_details.enterpri
se_name
Event.Attribute Organisation Enterprise name .data[].log.note_date / .data[].log.triggered ThreatQ - Partner N/A
.data[].hits[].document.
url
Event.Attribute URL N/A https://www.virustotal.
com/84387248326473645
Ingested as attribute if 'www.virustotal.com' in .url
.data[].hits[].entities[].
name
Event.Tags N/A N/A ddosattacks If data.hits[].entities[].type is Hashtag. Character # is removed.
.data[].hits[].entities[].
name
Indicator.Value data.hits[].entities[].type N/A N/A See Related Indicator Type Mapping table below.
.data[].rule.name Indicator.Attribute Entity Discovered by Rule N/A Cyber Espionage, Related Vulnerabilities N/A
.data[].hits[].entities[].
name
Event.Attribute data.hits[].entities[].type N/A N/A See Event Attributes Mapping table below.
.data[].hits[].entities[].
name
Related.Malware.
Value
N/A N/A Rhysida If data.hits[].entities[].type is Malware
.data[].hits[].entities[].
name
Event.Attribute Malware Category N/A Ransomware If data.hits[].entities[].type is MalwareCategory
.data[].hits[].entities[].
name
Event.Attribute Organization N/A Anonymous Sudan If data.hits[].entities[].type is Organization and it is not an Adversary
.data[].hits[].entities[].
name
Related.Adversary.
Value
N/A N/A Anonymous Sudan If data.hits[].entities[].type is Organization
.data[].hits[].entities[].
name
Event.Attribute Cyber Threat Actor Category N/A Hacktivist If data.hits[].entities[].type is CyberThreatActorCategory
.data[].hits[].entities[].
name
Related.Attack Patten.Value N/A N/A T1048 If data.hits[].entities[].type is MitreAttackIdentifier
.data[].hits[].entities[].
name
Related.Vulnerability.
Value
N/A N/A ProxyShell If data.hits[].entities[].type is CyberVulnerability or user config Save CVE Data as contains Vulnerabilities
.data[].hits[].entities[].
description
Related.Vulnerability.
Description
N/A N/A ProxyShell and Log4J Vulnerabilities Were the Most Exploited Flaws in 2021. If data.hits[].entities[].type is CyberVulnerability or user config Save CVE Data as contains Vulnerabilities
.data[].hits[].entities[].
name
Related.Identity.Value N/A N/A john.doe@acme.com If data.hits[].entities[].type is EmailAddress
.data[].hits[].entities[].
name
Related.Account.Value N/A N/A john.doe@acme.com If data.hits[].entities[].type is EmailAddress && Compromised Account Rule is configured & matched
.data[].hits[].entities[].name Related.File N/A N/A "Recorded_future_
e2cd9495-937b-40
a4-b5d7-f0fe89184
040"
The ID is used to download the image in a supplemental call, if data.hits[].entities[].type is Image. User-configurable.
.data[].triggered_by[].entity_paths[].entity.name Related.Entity.Title N/A N/A s.grishin@delta.nl User-configurable.
.data[].triggered_by[].entity_paths[].entity.type Entity.Attribute RF Type N/A EmailAddress N/A
.data[].triggered_by[].entity_paths[].entity.id Entity.Attribute Entity ID N/A email:s.grishin@delta.nl N/A
.data[].triggered_by[].entity_paths[].attribute.id Entity.Attribute RF_ID N/A CredentialLeak.targets N/A

In the previous table, there is a Related Indicator that is set dynamically. This is because the ThreatQ Object Type is extracted from the same path .data.hits[].entities[].type if the .data.hits[].entities[].type is one from the Related Indicator Type Mapping table listed below.

Related Indicator Type Mapping

Recorded Future Indicator Type ThreatQ Indicator Type  Notes
Hash MD5 If the length of the hash value is 32 characters.
Hash SHA-1 If the length of the hash value is 40 characters.
Hash SHA-256 If the length of the hash value is 64 characters.
CyberVulnerability CVE If '.data.hits[].entities[].name' contains 'CVE' and user config Save CVE Data as contains Indicators.
URL URL N/A
Domain FQDN N/A
IPAddress IP Address N/A
FileName Filename N/A
InternetDomainName FQDN N/A

Event Attributes Mapping

In the previous table, Related Indicator Type Mapping, there is a Related Indicator Attribute that is set dynamically. We do this because the Attribute Key is extracted from the same path .data.hits[].entities[].type if the .data.hits[].entities[].type is one from the table listed below.

Recorded Future Attribute Type ThreatQ Attribute Key 
AttackVector Attack Vector
Product Affected Product
Company Company
City City
Country Country
Facility Facility
FileNameExtension File Extension
FileType File Type
GeoEntity Geo Entity
Industry Industry
IndustryTerm Industry Term
Logotype Logotype
Operation Operation
OrgEntity Organization Entity
PhoneNumber Phone Number
ProvinceOrState State
Region Region
Technology Technology
Topic Topic

Recorded Future Playbook Alerts

The Recorded Future Playbook Alerts feed retrieves a list of alerts filtered by the values provided in the configuration section.  For each of the alerts, the playbook_alert_id is used to call the Recorded Future - Get Playbook Alerts by Category supplemental feed, to fetch the full alert context.

POST https://api.recordedfuture.com/playbook-alert/search

Sample Response:

{
    "status": {
        "status_code": "Ok",
        "status_message": "Playbook alert search successful"
    },
    "data": [
        {
            "playbook_alert_id": "task:2803c5f5-aa32-41ce-98c1-41a7771cd9ad",
            "created": "2022-11-08T09:44:02.447Z",
            "updated": "2022-11-08T09:44:06.584Z",
            "status": "New",
            "category": "domain_abuse",
            "priority": "Informational",
            "title": "juhaokan.ga",
            "owner_id": "uhash:ER135KQ6oL",
            "owner_name": "ThreatQ - Partner",
            "organisation_id": "uhash:DimzHe41vx",
            "organisation_name": "ThreatQ - Partner"
        }
    ]
}

ThreatQuotient provides the following default mapping for this feed:

The mapping for this feed is based on the JSON response from the Recorded Future - Get Playbook Alerts by Category supplemental feed. Each mapping is based on an item within the data list within the JSON response.

Feed Data Path ThreatQ Entity ThreatQ Object Type or Attribute Key Published Date Examples Notes
.panel_status.case_rule_label, .panel_status.entity_name, .panel_status.priority, .panel_status.entity_criticality Event.Title Recorded Future Alert .panel_status.created Domain Abuse Alert: juhaokan.ga Priority: Informational Criticality: Medium ThreatQ uses the four values to create an unique title
.panel_status.title Event.Title Recorded Future Alert .panel_status.created juhaokan.ga N/A
.panel_evidence_summary.*, 
.panel_evidence_whois.*
Event.Description N/A N/A N/A Description HTML is built based on available fields
.panel_status.status Event.Attribute Status .panel_status.created New Updatable
.panel_status.case_rule_label Event.Attribute Category .panel_status.created Domain Abuse Updatable
.panel_status.priority Event.Attribute Priority .panel_status.created Informational Updatable
.panel_status.owner_name Event.Attribute Owner .panel_status.created Acme Corp Updatable
.panel_status.organisation_name Event.Attribute Organization .panel_status.created Acme Corp N/A
.panel_status.assignee_name Event.Attribute Assignee .panel_status.created John Doe N/A
.panel_status.lifecycle_stage Event.Attribute Lifecycle Stage .panel_status.created Disclosure Only available for Cyber Vulnerability Alerts
.panel_status.entity_name Related.Indicator FQDN .panel_status.created jlonsdale.social N/A
.panel_status.entity_name Related.Vulnerability, Related.Indicator CVE .panel_status.created CVE-2024-10234 N/A
.panel_status.risk_score Event.Attribute, Related.Indicator.Attribute Risk Score .panel_status.created 5 Updatable
.panel_status.risk_score Event.Attribute, Related.Indicator.Attribute Normalized Risk .panel_status.created High Mapped using Risk Score Normalization Mapping user field; Updatable
.panel_status.entity_
criticality
Event.Attribute, Related.Indicator.Attribute Criticality .panel_status.created Low Updatable
.panel_status.context_
list[].context
Event.Attribute, Related.Indicator.Attribute Context Data .panel_status.created Phishing Host N/A
.panel_status.targets Event.Attribute, Relate.Indicator.Attribute Target .panel_status.created idn:lonsdale.fr User-configurable
.panel_evidence_dns.ip_
list[].entity
Related.Indicator IP Address .panel_status.created 217.160.0.153 N/A
.panel_evidence_dns.ip_
list[].record_type
Related.Indicator.Attribute Record Type .panel_status.created N/A Updatable
.panel_evidence_dns.ip_
list[].risk_score
Related.Indicator.Attribute Risk Score .panel_status.created 27 Updatable
.panel_evidence_dns.ip_
list[].risk_score
Related.Indicator.Attribute Normalized Risk .panel_status.created Medium Mapped using Risk Score Normalization Mapping user field; Updatable
.panel_evidence_dns.ip_
list[].criticality
Related.Indicator.Attribute Criticality .panel_status.created Medium Updatable
.panel_evidence_dns.ip_
list[].context_list[].
context
Related.Indicator.Attribute Context Data .panel_status.created Phishing Host N/A
.panel_evidence_dns.mx_
list[].entity
Related.Indicator FQDN .panel_status.created mx00.ionos.co.uk N/A
.panel_evidence_dns.mx_
list[].record_type
Related.Indicator.Attribute Record Type .panel_status.created N/A Updatable
.panel_evidence_dns.mx_
list[].risk_score
Related.Indicator.Attribute Risk Score .panel_status.created 0 Updatable
.panel_evidence_dns.mx_
list[].risk_score
Related.Indicator.Attribute Normalized Risk .panel_status.created Low Mapped using Risk Score Normalization Mapping user field; Updatable
.panel_evidence_dns.mx_
list[].criticality
Related.Indicator.Attribute Criticality .panel_status.created 0 Updatable
.panel_evidence_dns.mx_
list[].context_list[].
context
Related.Indicator.Attribute Context Data .panel_status.created Active Mail Server N/A
.panel_evidence_dns.ns_
list[].entity
Related.Indicator FQDN .panel_status.created ns1025.ui-dns.org N/A
.panel_evidence_dns.ns_
list[].record_type
Related.Indicator.Attribute Record Type .panel_status.created N/A Updatable
.panel_evidence_dns.ns_
list[].risk_score
Related.Indicator.Attribute Risk Score .panel_status.created 5 Updatable
.panel_evidence_dns.ns_
list[].risk_score
Related.Indicator.Attribute Normalized Risk .panel_status.created Low Mapped using Risk Score Normalization Mapping user field; Updatable
.panel_evidence_dns.ns_
list[].criticality
Related.Indicator.Attribute Criticality .panel_status.created Low Updatable
.panel_evidence_dns.ns_
list[].context_list[].
context
Related.Indicator.Attribute Context Data .panel_status.created Active Mail Server N/A
.panel_evidence_summary.
affected_products[].name
Related.Vulnerability.Attribute Affected Product .panel_status.created MySQL Also applied to main event
.panel_evidence_summary.
assessments[].evidence.
data[].malwareIpAddress
Related.Indicator IP Address .panel_status.created N/A N/A
.panel_evidence_summary.
assessments[].evidence.
data[].malwareFamily
Related.Malware N/A .panel_status.created Lazarus N/A
.panel_evidence_summary.
assessments[].evidence.
data[].clientIpAddress
Related.Asset N/A .panel_status.created N/A N/A

Recorded Future - Get Playbook Alerts by Category (Supplemental)

The Recorded Future - Get Playbook Alerts by Category supplemental feed related data for each of the ingested events retrieved from the Alert endpoint. The key .data[].playbook_alert_id is used to call the supplemental feed.

POST https://api.recordedfuture.com/playbook-alert/{{ category }}

The API will return a slightly different response based on the category of the alert. See the Recorded Future Playbook Alerts feed for the mapping of the data.

Domain Abuse

Sample Response:

{
    "status": {
        "status_code": "Ok",
        "status_message": "Domain Abuse lookup successful"
    },
    "data": {
        "panel_status": {
            "entity_name": "lonsdale.social",
            "entity_criticality": "Low",
            "risk_score": 5,
            "context_list": [
                {
                    "context": "Phishing Host"
                },
                {
                    "context": "Active Mail Server"
                }
            ],
            "targets": [
                "idn:lonsdale.fr",
                "idn:lonsdale.us",
                "idn:lonsdale.porn",
                "idn:lonsdale.club"
            ],
            "status": "New",
            "priority": "High",
            "created": "2022-11-09T08:20:15.778Z",
            "case_rule_id": "report:nvAj-X",
            "case_rule_label": "Domain Abuse",
            "owner_id": "uhash:ER135KQ6oL",
            "owner_name": "ThreatQ - Partner",
            "organisation_id": "uhash:DimzHe41vx",
            "organisation_name": "ThreatQ - Partner"
        },
        "panel_action": [],
        "panel_evidence_summary": {
            "explanation": "Alert was created as a result of a triggered typosquat detection",
            "resolved_record_list": [
                {
                    "entity": "idn:ns1025.ui-dns.org",
                    "risk_score": 5,
                    "criticality": "Low",
                    "record_type": "NS",
                    "context_list": []
                },
                {
                    "entity": "ip:217.160.0.153",
                    "risk_score": 27,
                    "criticality": "Medium",
                    "record_type": "A",
                    "context_list": [
                        {
                            "context": "Phishing Host"
                        }
                    ]
                },
                {
                    "entity": "idn:mx00.ionos.co.uk",
                    "risk_score": 0,
                    "criticality": "0",
                    "record_type": "MX",
                    "context_list": [
                        {
                            "context": "Active Mail Server"
                        }
                    ]
                },
                {
                    "entity": "idn:mx01.ionos.co.uk",
                    "risk_score": 0,
                    "criticality": "0",
                    "record_type": "MX",
                    "context_list": [
                        {
                            "context": "Active Mail Server"
                        }
                    ]
                }
            ],
            "screenshots": [
                {
                    "description": "An image associated with the Playbook Alert",
                    "image_id": "img:349f92e2-fa93-4282-be15-e7a330130686",
                    "created": "2022-11-09T08:20:51.685Z"
                }
            ]
        },
        "panel_evidence_dns": {
            "ip_list": [
                {
                    "entity": "ip:217.160.0.153",
                    "risk_score": 27,
                    "criticality": "Medium",
                    "record_type": "A",
                    "context_list": [
                        {
                            "context": "Phishing Host"
                        }
                    ]
                }
            ],
            "mx_list": [
                {
                    "entity": "idn:mx00.ionos.co.uk",
                    "risk_score": 0,
                    "criticality": "0",
                    "record_type": "MX",
                    "context_list": [
                        {
                            "context": "Active Mail Server"
                        }
                    ]
                }
            ],
            "ns_list": [
                {
                    "entity": "idn:ns1115.ui-dns.de",
                    "risk_score": 0,
                    "criticality": "0",
                    "record_type": "NS",
                    "context_list": [
                        {
                            "context": "Active Mail Server"
                        }
                    ]
                },
                {
                    "entity": "idn:ns1090.ui-dns.biz",
                    "risk_score": 5,
                    "criticality": "Low",
                    "record_type": "NS",
                    "context_list": []
                }
            ]
        },
        "panel_evidence_whois": {
            "body": [
                {
                    "provider": "whois",
                    "entity": "idn:lonsdale.social",
                    "attribute": "attr:whois",
                    "value": {
                        "privateRegistration": false,
                        "status": "clientTransferProhibited addPeriod",
                        "nameServers": [
                            "idn:ns1066.ui-dns.com",
                            "idn:ns1025.ui-dns.org",
                            "idn:ns1115.ui-dns.de",
                            "idn:ns1090.ui-dns.biz"
                        ],
                        "registrarName": "IONOS SE",
                        "createdDate": "2022-11-08T19:44:16.000Z"
                    },
                    "added": "2022-11-09T08:21:13.682Z"
                },
                {
                        "provider": "whois",
                        "entity": "idn:btbo2.top",
                        "attribute": "attr:whoisContacts",
                        "value": {
                            "organization": "REDACTED FOR PRIVACY",
                            "city": "REDACTED FOR PRIVACY",
                            "name": "REDACTED FOR PRIVACY",
                            "state": "REDACTED FOR PRIVACY",
                            "street1": "REDACTED FOR PRIVACY",
                            "country": "REDACTED FOR PRIVACY",
                            "postalCode": "REDACTED FOR PRIVACY",
                            "telephone": "REDACTED FOR PRIVACY",
                            "type": "technicalContact"
                        },
                        "added": "2022-11-08T10:28:20.712Z"
                    }
            ]
        },
        "panel_log": [
            {
                "id": "uuid:26b4be48-e1e0-4773-97d7-b8c8260fe53b",
                "created": "2022-11-09T08:27:31.377Z",
                "modified": "2022-11-09T08:27:31.377Z",
                "action_priority": "Informational"
            }
        ]
    }
}

Third Party Risk

Sample Response:

{
  "status": {
    "status_code": "Ok",
    "status_message": "Playbook alert bulk lookup successful."
  },
  "data": [
    {
      "playbook_alert_id": "task:220833e1-6a00-489c-8e6f-08cb11561aea",
      "panel_status": {
        "status": "New",
        "priority": "Moderate",
        "created": "2024-05-09T18:03:42.784Z",
        "updated": "2024-05-13T05:11:28.845Z",
        "case_rule_id": "report:r2TUUz",
        "case_rule_label": "Third Party Risk",
        "owner_id": "uhash:1RmVv0sQ33",
        "owner_name": "Acme Corp",
        "organisation_id": "uhash:4WfuvVnaap",
        "organisation_name": "Acme Corp",
        "owner_organisation_details": {
          "organisations": [
            {
              "organisation_id": "uhash:4WfuvVnaap",
              "organisation_name": "Acme Corp"
            }
          ],
          "enterprise_id": "uhash:4WfuvVnaap",
          "enterprise_name": "Acme Corp"
        },
        "entity_id": "CEBTA",
        "entity_name": "Tele Communications",
        "entity_criticality": "Medium",
        "risk_score": 64,
        "targets": [
          {
            "name": "Infections Recently Reported in Company Infrastructure"
          },
          {
            "name": "Recent Possible Malware in Company Infrastructure"
          }
        ],
        "actions_taken": []
      },
      "panel_evidence_summary": {
        "assessments": [
          {
            "risk_rule": "Infections Recently Reported in Company Infrastructure",
            "level": 2,
            "added": "2024-05-13T05:11:09.882Z",
            "evidence": {
              "type": "ip_rule",
              "summary": "4 sightings: Suspected Malicious Packet Source seen for 1 IP Address on company infrastructure: 121.241.162.25. Recent Botnet Traffic seen for 3 IP Addresses on company infrastructure: 203.199.243.0, 14.143.123.78, 14.143.187.214",
              "data": [
                {
                  "name": "Suspected Malicious Packet Source",
                  "criticality": 2,
                  "number_of_ip_addresses": 1
                },
                {
                  "name": "Recent Botnet Traffic",
                  "criticality": 2,
                  "number_of_ip_addresses": 3
                }
              ]
            }
          },
          {
            "risk_rule": "Recent Possible Malware in Company Infrastructure",
            "level": 2,
            "added": "2024-05-13T05:11:09.882Z",
            "evidence": {
              "type": "ip_rule",
              "summary": "1 sighting: Recent Positive Malware Verdict seen for 1 IP Address on company infrastructure: 14.142.45.148",
              "data": [
                {
                  "name": "Recent Positive Malware Verdict",
                  "criticality": 2,
                  "number_of_ip_addresses": 1
                }
              ]
            }
          }
        ]
      }
    }
  ]
}

Cyber Vulnerability

Sample Response:

{
  "status": {
    "status_code": "Ok",
    "status_message": "Playbook alert bulk lookup successful."
  },
  "data": [
    {
      "playbook_alert_id": "task:174cd0d2-2fad-482b-956d-97e3c3e06ab3",
      "panel_status": {
        "status": "New",
        "priority": "Informational",
        "assignee_name": "John Doe",
        "assignee_id": "uhash:12QsDAJfc1",
        "created": "2024-04-25T14:10:30.241Z",
        "updated": "2024-04-25T14:10:30.241Z",
        "case_rule_id": "report:k0g1wZ",
        "case_rule_label": "Cyber Vulnerability",
        "owner_id": "uhash:5ApZv0sR31",
        "owner_name": "Acme Corp",
        "organisation_id": "uhash:1WauvZmavb",
        "organisation_name": "Acme Corp",
        "owner_organisation_details": {
          "organisations": [
            {
              "organisation_id": "uhash:5ApZv0sR31",
              "organisation_name": "Acme Corp"
            }
          ],
          "enterprise_id": "uhash:1WauvZmavb",
          "enterprise_name": "Acme Corp"
        },
        "entity_id": "vj-Vlg",
        "entity_name": "CVE-2024-4058",
        "entity_criticality": "Medium",
        "risk_score": 33,
        "lifecycle_stage": "Disclosure",
        "targets": [
          {
            "name": "Google Chrome"
          }
        ],
        "actions_taken": []
      },
      "panel_evidence_summary": {
        "summary": {
          "targets": [
            {
              "name": "Google Chrome"
            }
          ],
          "lifecycle_stage": "Disclosure",
          "risk_rules": [
            {
              "rule": "Recently Referenced by Insikt Group",
              "description": "3 sightings on 1 source: Insikt Group. 3 reports including Google Patches Chrome Vulnerability CVE-2024-4059 and Additional Flaw Tracked as CVE-2024-4060. Most recent link (Apr 26, 2024): https://app.recordedfuture.com/portal/analyst-note/doc:vn9yUw"
            },
            {
              "rule": "Linked to Historical Cyber Exploit",
              "description": "21 sightings on 7 sources including: InfoSecPortal.ru | Последние Обновления, SecurityWeek, Anti-Malware.ru | Новости Информационной Безопасности, xynik.com, Xakep.ru. Most recent tweet: В Chrome исправили критическую уязвимость, за которую эксперты получили 16 000 долларов На этой неделе Google выпустила обновление для Chrome 124, которое исправляет четыре сразу уязвимости, включая критическую проблему CVE-2024-4058 в… Подробнее https://t.co/Tnmg7ZPfSg https://t.co/UpviubMKJY. Most recent link (Apr 26, 2024): https://twitter.com/pc7ooo/statuses/1783975885718098318"
            },
            {
              "rule": "Web Reporting Prior to CVSS Score",
              "description": "Reports involving CVE Vulnerability before CVSS score is released by NVD."
            }
          ]
        },
        "affected_products": [
          {
            "name": "Google Chrome"
          }
        ],
        "insikt_notes": [
          {
            "id": "doc:vn9yUw",
            "title": "Google Patches Chrome Vulnerability CVE-2024-4059 and Additional Flaw Tracked as CVE-2024-4060",
            "published": "2024-04-26T13:22:37.371Z",
            "topic": "Validated Intelligence Event",
            "fragment": "In recent updates announced on April 24, 2024, Google has addressed a critical vulnerability CVE-2024-4058 in its Chrome web browser that could allow threat actors to take control of a user's system. The vulnerability is related to the ANGLE graphics layer engine and has a \"critical\" severity rating."
          },
          {
            "id": "doc:vm4TAU",
            "title": "CVE-2024-4058 allows Type Confusion affecting Google Chrome",
            "published": "2024-04-25T16:31:33.504Z",
            "topic": "Informational",
            "fragment": "CVE-2024-4058 is a type confusion bug in the ANGLE graphics layer engine. A manipulation with an unknown input can lead to a type confusion vulnerability."
          },
          {
            "id": "doc:vmfmEu",
            "title": "Google Patches Four Vulnerabilities Affecting Chrome, Including Critical-Severity Vulnerability CVE-2024-4058",
            "published": "2024-04-25T09:47:23.765Z",
            "topic": "Validated Intelligence Event",
            "fragment": "On April 24, 2024, Google patched four vulnerabilities affecting the Chrome browser. This included  CVE-2024-4058,  a critical-severity type confusion vulnerability that arises from a misinterpretation of data types within the Almost Native Graphics Layer Engine (ANGLE) of the Chrome browser. Successful exploitation of CVE-2024-4058 can allow threat actors to execute arbitrary code or evade sandboxes remotely with minimal user interaction, potentially leading to unauthorized access, data manipulation, and system compromise."
          }
        ]
      }
    }
  ]
}

Code Repo Leakage

Sample Response:

{
  "status": {
    "status_code": "Ok",
    "status_message": "Playbook alert bulk lookup successful."
  },
  "data": [
    {
      "playbook_alert_id": "task:f19c105a-5997-4a13-b54f-7b64816954fa",
      "panel_status": {
        "status": "New",
        "priority": "Informational",
        "created": "2024-05-01T22:05:52.838Z",
        "updated": "2024-05-01T22:05:52.838Z",
        "case_rule_id": "report:q_dg1Y",
        "case_rule_label": "Data Leakage on Code Repository",
        "owner_id": "uhash:7RaVs0sR31",
        "owner_name": "Acme Corp",
        "organisation_id": "uhash:1XfyvKnbbp",
        "organisation_name": "Acme Corp",
        "owner_organisation_details": {
          "organisations": [
            {
              "organisation_id": "uhash:7RaVs0sR31",
              "organisation_name": "Acme Corp"
            }
          ],
          "enterprise_id": "uhash:1XfyvKnbbp",
          "enterprise_name": "Acme Corp"
        },
        "entity_id": "url:https://github.com/Inclusion-Bridge/2024-bridge-to-data-fundamentals",
        "entity_name": "https://github.com/Inclusion-Bridge/2024-bridge-to-data-fundamentals",
        "entity_criticality": "",
        "risk_score": 0,
        "targets": [
          {
            "name": "acme.org"
          }
        ],
        "actions_taken": []
      },
      "panel_evidence_summary": {
        "repository": {
          "id": "url:https://github.com/Inclusion-Bridge/2024-bridge-to-data-fundamentals",
          "name": "https://github.com/Inclusion-Bridge/2024-bridge-to-data-fundamentals",
          "owner": {
            "name": "aifenaike"
          }
        },
        "evidence": [
          {
            "assessments": [
              {
                "id": "attr:watchListEntityMention",
                "title": "Watch List Entity Mention",
                "value": "acme.org"
              }
            ],
            "targets": [
              {
                "name": "acme.org"
              }
            ],
            "url": "https://github.com/Inclusion-Bridge/2024-bridge-to-data-fundamentals/commit/5002107a89ad09e3b45bf07d45d400f1a4738f5a",
            "content": "+Shenhua Group,276,37322,-0.8,1916.9,140911,37.9,Ling Wen,\"Mining, Crude-Oil Production\",Energy,270,China,\"Beijing, China\",http://www.shenhuagroup.com.cn,8,202200,47962\n+Greenland Holding Group,277,37240,12.8,1085.2,105495,-1.0,Zhang Yuliang,Real estate,Financials,311,China,\"Shanghai, China\",http://www.ldjt.com.cn,6,39887,8333\n+ACME,278,37105,5.5,1492.3,523194,22.9,Roger W. Ferguson Jr.,\"Insurance: Life, Health (Mutual)\",Financials,291,USA,\"New York, NY\",http://www.acme.org,20,12997,35583\n+Jardine Matheson,279,37051,0.1,2503.0,71523,39.3,Ben Keswick,Motor Vehicles and Parts,Motor Vehicles & Parts,273,China,\"Hong Kong, China\",http://www.jardines.com,18,430000,21800\n+Oracle,280,37047,-3.1,8901.0,112180,-10.4,Safra A. Catz,Computer Software,Technology,260,USA,\"Redwood City, CA\",http://www.oracle.com,11,136000,47289",
            "published": "2024-05-01T22:03:09.273Z"
          }
        ]
      }
    }
  ]
}

Recorded Future Fusion Files

The Recorded Future fusion files feed ingests threat intelligence information from the user selected Fusion feeds.  

GET https://api.recordedfuture.com/v2/fusion/files?path={fusion_file_path}

Depending on the fetched Fusion File, the API response will be different. The following are examples and mappings for all of the possible files.

Command and Control IPs

/public/detect/c2_scanned_ips.json

Sample Response:

{
  "count": 2,
  "results": [
    {
      "ip": "2.56.116.210",
      "ports": [
        {
          "port": 26,
          "protocol": "TCP"
        },
        {
          "port": 24,
          "protocol": "TCP"
        },
        {
          "port": 50050,
          "protocol": "TCP"
        }
      ],
      "malware": ["Cobalt Strike"],
      "last_seen_active": "2106-02-07",
      "last_scan": "2024-05-14"
    },
    {
      "ip": "147.189.174.48",
      "ports": [
        {
          "port": 6666,
          "protocol": "TCP"
        }
      ],
      "malware": ["AsyncRAT"],
      "last_seen_active": "2024-05-12",
      "last_scan": "2024-05-14"
    }
  ]
}

ThreatQ provides the following default mapping for this pathway:

Mappings are based on each item within the results key.

Feed Data Path ThreatQ Entity ThreatQ Object Type or Attribute Key Published Date Examples Notes
.ip Indicator.Value IP Address .last_seen_active N/A N/A
.ports[].port Attribute Scanned Port .last_seen_active 8080 N/A
.malware[] Malware N/A .last_seen_active AsyncRAT N/A
N/A Attribute Fusion File .last_seen_active c2_scanned_ips N/A

Known TOR IPs

/public/policy/tor_ips.json

Sample Response:

[
  {
    "ip": "171.25.193.77",
    "name": "DFRI29",
    "flags": "EFGHRSDV"
  },
  {
    "ip": "171.25.193.78",
    "name": "DFRI27",
    "flags": "EFGHRSDV"
  },
  {
    "ip": "198.96.155.3",
    "name": "gurgle",
    "flags": "EFGHRSDV"
  }
]

ThreatQ provides the following default mapping for this pathway:

Mappings are based on each item within the array.

Feed Data Path ThreatQ Entity ThreatQ Object Type or Attribute Key Published Date Examples Notes
.ip Indicator.Value IP Address N/A N/A N/A
.name Attribute TOR Name N/A gurgle N/A
.flags Attribute TOR Flags N/A EFGHRSDV N/A
N/A Attribute Fusion File N/A tor_ips N/A

Active RAT C2 IPs

/public/detect/ratcontrollers_ips.json

Sample Response:

[
  {
    "hostnames": [],
    "ip": "208.100.26.240",
    "country": "",
    "asn": "",
    "port": "",
    "malware": "",
    "protocol": "",
    "signal": []
  },
  {
    "hostnames": [],
    "ip": "88.119.175.231",
    "country": "",
    "asn": "",
    "port": "",
    "malware": "",
    "protocol": "",
    "signal": []
  },
  {
    "hostnames": [],
    "ip": "103.97.176.121",
    "country": "",
    "asn": "",
    "port": "",
    "malware": "",
    "protocol": "",
    "signal": []
  }
]

ThreatQ provides the following default mapping for this pathway:

Mappings are based on each item within the array.

Feed Data Path ThreatQ Entity ThreatQ Object Type or Attribute Key Published Date Examples Notes
.ip Indicator.Value IP Address or URL N/A N/A Type will depend on if the .ip value starts with http or not.
N/A Attribute Fusion File N/A ratcontrollers_ips N/A
.asn Attribute ASN N/A N/A N/A
.country Attribute Country N/A N/A N/A
.malware Malware N/A N/A Nanocore RAT N/A

Fast Flux IPs

/public/detect/fflux_ips.json

Sample Response:

[
  {
    "lastSeen": 1715817599000,
    "ip": "1.189.96.74"
  },
  {
    "lastSeen": 1715817599000,
    "ip": "83.48.172.198"
  },
  {
    "lastSeen": 1715817599000,
    "ip": "83.224.176.102"
  },
  {
    "lastSeen": 1715817599000,
    "ip": "37.84.163.136"
  }
]

ThreatQ provides the following default mapping for this pathway:

Mappings are based on each item within the array.

Feed Data Path ThreatQ Entity ThreatQ Object Type or Attribute Key Published Date Examples Notes
.ip Indicator.Value IP Address .lastSeen N/A N/A
N/A Attribute Fusion File N/A fflux_ips N/A

Default IP Risklist Location Malware

"Name","Risk","RiskString","EvidenceDetails","MalwareFamilies","ASN","City","Country"
"198.98.57.26",99,"10/81","{""EvidenceDetails"":[{""Rule"":""Historically Linked to Intrusion Method"",""EvidenceString"":""14 sightings on 2 sources: Twitter, GitHub. 2 related intrusion methods: Cobalt Strike, Offensive Security Tools (OST). Most recent link (Mar 18, 2025): https://github.com/Xavier001/IOCs/commit/c3fda8db8e4d381df95e30ec9f9ff584e5d7735e"",""CriticalityLabel"":""Unusual"",""Timestamp"":1742338024422,""MitigationString"":"""",""Criticality"":1},{""Rule"":""Historical Suspected CC Server"",""EvidenceString"":""3 sightings on 2 sources: ThreatFox Infrastructure Analysis, Malware Patrol. ThreatFox identified 198.98.57.26:443 as possible TA0011 (Command and Control) for Cobalt Strike on January 17, 2025. Most recent link (Jan 17, 2025): https://threatfox.abuse.ch/ioc/1380526"",""CriticalityLabel"":""Unusual"",""Timestamp"":1737097322000,""MitigationString"":"""",""Criticality"":1},{""Rule"":""Historically Reported as a Defanged IP"",""EvidenceString"":""1 sighting on 1 source: Twitter. Most recent link (Dec 18, 2024): https://twitter.com/drb_ra/statuses/1869521052784878070"",""CriticalityLabel"":""Unusual"",""Timestamp"":1734563527000,""MitigationString"":"""",""Criticality"":1},{""Rule"":""Historical Botnet Traffic"",""EvidenceString"":""1 sighting on 1 source: External Sensor Data Analysis. 198.98.57.26 was identified as botnets in External Sensor data. Reported to Recorded Future on Oct 26, 2024."",""CriticalityLabel"":""Unusual"",""Timestamp"":1729980922163,""MitigationString"":"""",""Criticality"":1},{""Rule"":""Historical Spam Source"",""EvidenceString"":""1 sighting on 1 source: External Sensor Spam. 198.98.57.26 was identified as spam in External Sensor data. Reported to Recorded Future on Mar 20, 2024."",""CriticalityLabel"":""Unusual"",""Timestamp"":1710929307653,""MitigationString"":"""",""Criticality"":1},{""Rule"":""Historically Reported CC Server"",""EvidenceString"":""22 sightings on 1 source: Recorded Future Command  Control Reports. 198.98.57.26:2096 was reported as a command and control server for Cobalt Strike on Jan 18, 2025"",""CriticalityLabel"":""Suspicious"",""Timestamp"":1737275121237,""MitigationString"":"""",""Criticality"":2},{""Rule"":""Recently Communicating Validated CC Server"",""EvidenceString"":""6 sightings on 1 source: Recorded Future Network Intelligence. Multiple communications observed between 181.214.153.11 on 4 ports including 13995 and 198.98.57.26 (validated Cobalt Strike C2 Server) on port 2096 on 2025-03-28 at 03:07 UTC.  "",""CriticalityLabel"":""Suspicious"",""Timestamp"":1743120000000,""MitigationString"":"""",""Criticality"":2},{""Rule"":""Previously Validated C Server"",""EvidenceString"":""562 sightings on 1 source: Insikt Group Command  Control Validation. Recorded Future analysis validated 198.98.57.26:2096 as a command and control server for Cobalt Strike on Mar 30, 2025"",""CriticalityLabel"":""Suspicious"",""Timestamp"":1743317655000,""MitigationString"":"""",""Criticality"":2},{""Rule"":""Actively Communicating Validated CC Server"",""EvidenceString"":""2 sightings on 1 source: Recorded Future Network Intelligence. Multiple communications observed between 181.214.153.11 on 2 ports including 5792 and 198.98.57.26 (validated Cobalt Strike C2 Server) on port 2096 on 2025-03-31 at 04:24 UTC.  "",""CriticalityLabel"":""Very Malicious"",""Timestamp"":1743379200000,""MitigationString"":"""",""Criticality"":4},{""Rule"":""Validated CC Server"",""EvidenceString"":""13 sightings on 1 source: Insikt Group Command  Control Validation. Recorded Future analysis validated 198.98.57.26:2096 as a command and control server for Cobalt Strike on Apr 01, 2025"",""CriticalityLabel"":""Very Malicious"",""Timestamp"":1743497808000,""MitigationString"":"""",""Criticality"":4}]}","Cobalt Strike|Cobalt Strike Beacon","AS53667","New York City","United States"
"139.224.198.190",99,"11/81","{""EvidenceDetails"":[{""Rule"":""Historically Linked to Intrusion Method"",""EvidenceString"":""21 sightings on 4 sources: Twitter, Recorded Future Command  Control List, C2IntelFeeds Cobalt Strike C2 Servers, GitHub. 7 related intrusion methods including Interactsh LDAP Server, Cobalt Strike, Trojan, Offensive Security Tools (OST), Banking Trojan. Most recent link (Mar 18, 2025): https://github.com/drb-ra/C2IntelFeeds/commit/4c7af7a4c0b23a4ce3e5bf91ac586e4a4b46b6cd"",""CriticalityLabel"":""Unusual"",""Timestamp"":1742331763428,""MitigationString"":"""",""Criticality"":1},{""Rule"":""Historical Suspected CC Server"",""EvidenceString"":""6 sightings on 2 sources: ThreatFox Infrastructure Analysis, Malware Patrol. ThreatFox identified 139.224.198.190:8888 as possible TA0011 (Command and Control) for Unknown malware on December 06, 2024. Most recent link (Dec 6, 2024): https://threatfox.abuse.ch/ioc/1196644"",""CriticalityLabel"":""Unusual"",""Timestamp"":1733472212000,""MitigationString"":"""",""Criticality"":1},{""Rule"":""Historical Malicious Infrastructure Admin Server"",""EvidenceString"":""976 sightings on 2 sources: Insikt Group Malicious Infrastructure Management Validation, Recorded Future Malicious Infrastructure Management Validation."",""CriticalityLabel"":""Unusual"",""Timestamp"":1742299889836,""MitigationString"":"""",""Criticality"":1},{""Rule"":""Historically Linked to Cyber Attack"",""EvidenceString"":""1 sighting on 1 source: C2IntelFeeds Cobalt Strike C2 Servers. Most recent link (Apr 21, 2021): https://github.com/drb-ra/C2IntelFeeds/blob/master/C2_configs/cobaltstrike.json?q=https%3A%2F%2F139.224.198.190%3A443_20210421"",""CriticalityLabel"":""Unusual"",""Timestamp"":1618997794823,""MitigationString"":"""",""Criticality"":1},{""Rule"":""Historically Reported as a Defanged IP"",""EvidenceString"":""6 sightings on 3 sources: redpacketsecurity.com, Twitter, yourmom.xxx. Most recent link (Jun 27, 2024): https://mirror.yourmom.xxx/vx/Papers/Malware%20Defense/Malware%20Analysis/2023/2023-11-22%20-%20Practical%20Queries%20for%20Malware%20Infrastructure%20-%20Part%203%20(Advanced%20Examples).pdf"",""CriticalityLabel"":""Unusual"",""Timestamp"":1719502587980,""MitigationString"":"""",""Criticality"":1},{""Rule"":""Historically Reported in Threat List"",""EvidenceString"":""Previous sightings on 3 sources: Recently Viewed Integrations Indicators, RAT Controller – Shodan / Recorded Future, Cobalt Strike Default Certificate Detected - Shodan / Recorded Future. Observed between Oct 2, 2022, and Oct 3, 2023."",""CriticalityLabel"":""Unusual"",""Timestamp"":1743513627891,""MitigationString"":"""",""Criticality"":1},{""Rule"":""Historically Reported CC Server"",""EvidenceString"":""42 sightings on 5 sources: Polyswarm Sandbox Analysis - Malware C2 Extractions, Recorded Future Command  Control Reports, Recorded Future Command  Control List, Recorded Future Triage Malware Analysis - Malware C2 Extractions, Recorded Future Sandbox - Malware C2 Extractions. Malware sandbox analysis identified 139.224.198.190:4455 as possible TA0011 (Command and Control) for Metasploit using configuration extraction on sample b1a6624c78f881a944e27a2451addb6c7d2b65c8db155eb9a88ce2f2f5dbdc84."",""CriticalityLabel"":""Suspicious"",""Timestamp"":1730234249000,""MitigationString"":"""",""Criticality"":2},{""Rule"":""Recently Linked to Intrusion Method"",""EvidenceString"":""1 sighting on 1 source: GitHub. 3 related intrusion methods: Trojan, Banking Trojan, QakBot. Most recent link (Mar 31, 2025): https://github.com/drb-ra/C2IntelFeeds/commit/38253aaf32c9e306247c8c21ebc71146fac5ec41"",""CriticalityLabel"":""Suspicious"",""Timestamp"":1743454980696,""MitigationString"":"""",""Criticality"":2},{""Rule"":""Previously Validated CC Server"",""EvidenceString"":""698 sightings on 1 source: Insikt Group Command  Control Validation. Recorded Future analysis validated 139.224.198.190:3232 as a command and control server for Supershell on Mar 30, 2025"",""CriticalityLabel"":""Suspicious"",""Timestamp"":1743311507000,""MitigationString"":"""",""Criticality"":2},{""Rule"":""Recent Malicious Infrastructure Admin Server"",""EvidenceString"":""70 sightings on 1 source: Insikt Group Malicious Infrastructure Management Validation."",""CriticalityLabel"":""Malicious"",""Timestamp"":1743505617266,""MitigationString"":"""",""Criticality"":3},{""Rule"":""Validated CC Server"",""EvidenceString"":""5 sightings on 1 source: Insikt Group Command  Control Validation. Recorded Future analysis validated 139.224.198.190:3232 as a command and control server for Supershell on Apr 01, 2025"",""CriticalityLabel"":""Very Malicious"",""Timestamp"":1743483492000,""MitigationString"":"""",""Criticality"":4}]}","Supershell","AS37963","Shanghai","China"

ThreatQ provides the following default mapping for this pathway:

Mappings are based on each item within the array.

Feed Data Path ThreatQ Entity ThreatQ Object Type or Attribute Key Published Date Examples Notes
0 (first token) Indicator.Value IP Address N/A 5.120.187.119 N/A
1 (second token) Indicator.Attribute Risk Score N/A 65 Updatable
1 (second token) Indicator.Attribute Normalized Risk N/A High Mapped using Risk Score Normalization Mapping user field; Updatable
2 (third token) Indicator.Attribute Risk String N/A 1/49 Updatable
3 (fourth token)[].CriticalityLabel Indicator.Attribute Criticality 3 (fourth token)[].Timestamp Malicious Updatable. The highest criticality level is selected.
3 (fourth token)[].Rule Indicator.Attribute Associated Rule 3 (fourth token)[].Timestamp Recent Positive Malware Verdict N/A
3 (fourth token)[].EvidenceString Indicator.Attribute Evidence 3 (fourth token)[].Timestamp 1 sighting on 1 source: ReversingLabs. N/A
4 (fifth token) Malware.Value N/A 3 (fourth token)[].Timestamp Nanocore RAT N/A
5 (sixth token) Indicator.Attribute ASN 3 (fourth token)[].Timestamp AS37963 N/A
6 (seventh token) Indicator.Attribute ASN Organization N/A 3 (fourth token)[].Timestamp Shanghai
7 (eighth token) Indicator.Attribute Country N/A China N/A

Dynamic DNS IPs

/public/detect/ddns_ips.json

Sample Response:

[
  { "lastSeen": 1592813679718, "ip": "14.207.60.10" },
  { "lastSeen": 1602551372295, "ip": "31.184.203.121" },
  { "lastSeen": 1600696916364, "ip": "200.95.170.74" },
  { "lastSeen": 1715817599000, "ip": "31.46.242.12" },
  { "lastSeen": 1715817599000, "ip": "201.151.223.102" }
]

ThreatQ provides the following default mapping for this pathway:

Mappings are based on each item within the array.

Feed Data Path ThreatQ Entity ThreatQ Object Type or Attribute Key Published Date Examples Notes
.ip Indicator.Value IP Address .lastSeen N/A N/A
N/A Attribute Fusion File N/A ddns_ips N/A

Potentially Undetectable Malware

/public/detect/low_detect_malware_hashes.json

Sample Response:

[
  {
    "lastSeen": 1637938630146,
    "hash": "00af0726cdaf4dd07375ed03513a5ce3e5055a285b932b20bc06c85d92b00e9f",
    "algorithm": "SHA-256"
  },
  {
    "lastSeen": 1517420645494,
    "hash": "0bcc5b3fbed425984f6ce7fbf1a62a7f",
    "algorithm": "MD5"
  },
  {
    "lastSeen": 1565960362167,
    "hash": "0f6bff19fd5fe46f577853c7de074072fba5c04831fddac820eacd897622d343",
    "algorithm": "SHA-256"
  },
  {
    "lastSeen": 1574942448466,
    "hash": "be62ca209f803671935370c9d05ad5d25acd55d47029f19fca75df6b74dfb957",
    "algorithm": "SHA-256"
  },
  {
    "lastSeen": 1557138379174,
    "hash": "e3a318797bdc6d45917364efdf329dd8fd6a39f1178d71dc1945ff94a425b209",
    "algorithm": "SHA-256"
  },
  {
    "lastSeen": 1572496263780,
    "hash": "39e4251cacd684dc4886bddfefdda3cf78c0d6d4",
    "algorithm": "SHA-1"
  },
  {
    "lastSeen": 1572496263780,
    "hash": "222f4b0b2a69666cb0843af04a2d234378e284a9c05fb2ae0e6754fb52b1ee34df361fd1d3b70f3bbcd2b7611d64d5622558b4b6c1272633b15d0b639d48dfe4",
    "algorithm": "SHA-512"
  }
]

ThreatQ provides the following default mapping for this pathway:

Mappings are based on each item within the the array.

Feed Data Path ThreatQ Entity ThreatQ Object Type or Attribute Key Published Date Examples Notes
.hash Indicator.Value .algorithm .lastSeen N/A N/A
N/A Attribute Fusion File N/A low_detect_malware_hashes N/A

Weaponized Domains

/public/detect/weaponized_domains.json

Sample Response:

{
  "count": 2,
  "results": [
    {
      "domain": "dswa.1337.cx",
      "last_seen": "2024-05-15",
      "service_provider": "Afraid.org",
      "detection_strings": {
        "phishing site": false,
        "spam site": false,
        "spam image": false,
        "mining site": false,
        "malicious site": false,
        "suspicious site": false,
        "malware site": true,
        "malware hd site": false,
        "fraudulent site": false
      }
    },
    {
      "domain": "7.24-7.ro",
      "last_seen": "2024-05-13",
      "service_provider": "Afraid.org",
      "detection_strings": {
        "phishing site": true,
        "spam site": false,
        "spam image": false,
        "mining site": false,
        "malicious site": false,
        "suspicious site": false,
        "malware site": true,
        "malware hd site": false,
        "fraudulent site": false
      }
    }
  ]
}

ThreatQ provides the following default mapping for this pathway:

Mappings are based on each item within the results key.

Feed Data Path ThreatQ Entity ThreatQ Object Type or Attribute Key Published Date Examples Notes
.domain Indicator.Value FQDN .last_seen N/A N/A
N/A Attribute Fusion File N/A weaponized_domains N/A
.service_provider Attribute Service Provider .last_seen Afraid.org N/A
.detection_strings[phishing site] Attribute Threat Type .last_seen Phishing Only if flag is true
.detection_strings[spam site] Attribute Threat Type .last_seen Spam Only if flag is true
.detection_strings[spam image] Attribute Threat Type .last_seen Spam Only if flag is true
.detection_strings[mining site] Attribute Threat Type .last_seen Crypotomining Only if flag is true
.detection_strings[malicious site] Attribute Disposition .last_seen Malicious Only if flag is true
.detection_strings[suspicious site] Attribute Disposition .last_seen Suspicious Only if flag is true
.detection_strings[malware site] Attribute Threat Type .last_seen Malware Only if flag is true
.detection_strings[malware hd site] Attribute Threat Type .last_seen Malware Only if flag is true
.detection_strings[fraudulent site] Attribute Threat Type .last_seen Fraud Only if flag is true

Exploits in the Wild Hashes

/public/prevent/exploits_itw_hashes.json

Sample Response:

{
  "count": 97644,
  "results": [
    {
      "hash": "6131945bc2925a227c748f6e65d3108d0519fe03887a2353b516d75c26afb03e",
      "algorithm": "sha256",
      "cybervulnerabilities": ["CVE-2010-2568"],
      "malware": "unknown",
      "days_with_sighting": 16,
      "last_seen": "2024-05-14"
    },
    {
      "hash": "a63570d7200cb3628f2a8887bc9d5cf0",
      "algorithm": "md5",
      "cybervulnerabilities": ["CVE-2022-42889"],
      "malware": "unknown",
      "days_with_sighting": 1,
      "last_seen": "2024-05-08"
    }
  ]
}

ThreatQ provides the following default mapping for this pathway:

Mappings are based on each item within the results key.

Feed Data Path ThreatQ Entity ThreatQ Object Type or Attribute Key Published Date Examples Notes
.hash Indicator.Value .algorithm .last_seen N/A N/A
N/A Attribute Fusion File N/A exploits_itw_hashes N/A
.cybervulnerabilities[] Indicator.Value, Vulnerability.Value CVE .last_seen CVE-2022-42889 N/A
.malware Malware.Value N/A .last_seen Lokibot Ingested if not 'unknown'

Recorded Future Detection Rules

The Recorded Future Detection Rules feed ingests Recorded Future detection rules (i.e. YARA, Snort, or Sigma) into ThreatQ as Signatures. Indicators and context will be extracted and added as relationships or attribution, respectively.  

GET https://api.recordedfuture.com/detection-rule/search

Sample Response:

{
    "count": 10,
    "next_offset": "eyJvZmZzZXQiOlsxMTEyMiwiSEZCSHdBRDBTd3EiXX0=",
    "result": [
        {
            "created": "2025-01-17T20:27:13.817Z",
            "description": "The attached SNORT rule detects inbound WebSocket data frames with commands to be interpreted and executed by RevC2 malware.",
            "id": "doc:2j65IB",
            "rules": [
                {
                    "content": "alert tcp $EXTERNAL_NET any -> $HOME_NET any (msg:\"RevC2 Malware Inbound Command\"; flow:established,to_client; content:\"|81|\"; depth:1; content:\"|7B 22|type|22 3A 22|\"; distance:1; within:9; content:\"|22 2C 22|command|22 3A 22|\"; fast_pattern; distance:4; within:15; pcre:\"/\\x81.\\x7b\\x22type\\x22\\x3a\\x22[0-9]{4,6}\\x22\\x2c\\x22command\\x22\\x3a/\"; reference:url,https://www.zscaler.com/blogs/security-research/unveiling-revc2-and-venom-loader; classtype:trojan-activity; sid:52460260; rev:1; metadata:author MGUT, created_at 2025-01-15, mitre_tactic_id TA0011, mitre_tactic_name Command-And-Control;)\n",
                    "entities": [
                        {
                            "id": "1KeNsc",
                            "name": "RevC2",
                            "type": "Malware"
                        },
                        {
                            "display_name": "T1071.001 (Application Layer Protocol: Web Protocols)",
                            "id": "mitre:T1071.001",
                            "name": "T1071.001",
                            "type": "MitreAttackIdentifier"
                        }
                    ],
                    "file_name": "mal_revc2_snort.txt"
                }
            ],
            "title": "SNORT Rule: Detect RevC2 Malware Inbound Commands",
            "type": "snort",
            "updated": "2025-01-17T20:27:13.817Z"
        },
        {
            "created": "2024-09-27T20:12:23.632Z",
            "description": "The attached SNORT rules can be used to detect network traffic associated with CryptBot malware.",
            "id": "doc:zA_U9i",
            "rules": [
                {
                    "content": "alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:\"CryptBot Malware Outbound C2 Communication\"; flow:established,to_server; urilen:14,norm; content:\"POST\"; http_method; content:\"|2F|v1|2F|upload|2E|php\"; fast_pattern; http_uri; content:\"|3B 20|boundary|3D 2D 2D 2D 2D|Boundary\"; http_header; content:\"|3B 20|name|3D 22|file|22|\"; http_client_body; reference:url,https://tria.ge/240909-zh8kgsygjr; classtype:bad-unknown; sid:52460217; rev:1; metadata:author MGUT, mitre_tactic_id TA0011, mitre_tactic_name Command-And-Control;)\nalert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:\"CryptBot Malware Outbound C2 Communication\"; flow:established,to_server; urilen:14,norm; content:\"POST\"; http_method; content:\"|2F|v1|2F|upload|2E|php\"; fast_pattern; http_uri; content:\"Accept|3A 20|\"; http_header; content:\"|3B 20|boundary|3D 2D 2D 2D 2D|\"; http_header; content:\"|3B 20|name|3D 22|file|22 3B 20|filename|3D 22|\"; http_client_body; content:\".bin|22 0D 0A|\"; http_client_body; distance:0; within:20; reference:url,https://tria.ge/241101-1zqaxatrez; classtype:bad-unknown; sid:52460232; rev:1; metadata:author MGUT, mitre_tactic_id TA0011, mitre_tactic_name Command-And-Control;)\nalert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:\"CryptBot Malware Outbound C2 Communication\"; flow:established,to_server; content:\"POST\"; http_method; content:!\"User|2D|Agent\"; http_header; content:\"|7B 20 22 69 70 22 3A 20 22|\"; http_client_body; depth:9; content:\"|22|current_time|22|\"; http_client_body; distance:0; content:\"|22|Num_processor|22|\"; http_client_body; distance:0; content:\"|22|Num_ram|22|\"; http_client_body; fast_pattern; distance:0; reference:url,https://tria.ge/250201-zdl6pa1lhm; classtype:trojan-activity; sid:52460266; rev:1; metadata:author MGUT, created_at 2025-02-05, mitre_tactic_id TA0011, mitre_tactic_name Command-And-Control;)\n",
                    "entities": [
                        {
                            "id": "hy-B4_",
                            "name": "CryptBot",
                            "type": "Malware"
                        }
                    ],
                    "file_name": "mal_cryptbot_snort.txt"
                }
            ],
            "title": "SNORT Rules: Detect CryptBot Malware",
            "type": "snort",
            "updated": "2025-02-06T22:20:04.717Z"
        }
    ]
}

ThreatQ provides the following default mapping for this feed:

Feed Data Path ThreatQ Entity ThreatQ Object Type or Attribute Key Published Date Examples Notes
.rules[].content Signature.Name, Signature.Value YARA, Snort, or Sigma .created N/A Content is parsed for signature data
.rules[].content Tag.Name N/A N/A N/A Content metadata is parsed for tags
.rules[].content Attribute <Various Names> N/A N/A Content metadata is parsed for attributes
.rules[].content Indicator.Value MD5, SHA-1, SHA-256, SHA-512 N/A N/A Content metadata is parsed for file hash indicators
.rules[].entities[].name Attack-Pattern.Value N/A .created T1071 - Application Layer Protocol Where the entity type is MitreAttackIdentifier
.rules[].entities[].name Malware.Value N/A .created CryptBot Where the entity type is Malware
.rules[].entities[].name Indicator.Value <Various Types> .created N/A Where the entity type is in [URL, InternetDomainName, IpAddress, FileName]
.rules[].entities[].name Adversary.Name N/A .created RedMike Where the entity type is Organization
.rules[].entities[].name Indicator.Value, Vulnerability.Value CVE .created CVE-2025-12345 Where the entity type is CyberVulnerability
.rules[].entities[].name Tag.Name N/A N/A N/A Where the entity type is Hashtag
.rules[].entities[].name Attribute Affected Product .created N/A Where the entity type is Product
.rules[].entities[].name Malware.Attribute Category .created N/A Where the entity type is MalwareCategory
.rules[].entities[].name Adversary.Attribute Category .created N/A Where the entity type is CyberThreatActorCategory
.rules[].entities[].name Attribute <Various Names> .created N/A Where the entity type is a mapped attribute. See the Entity Attributes Mapping below.

Entities Attributes Mapping

In the previous table, there is a 'Attribute' that is set dynamically. We do this because the 'Attribute Key' is extracted from the same path .data.rules[].entities[].nameif the .data.rules[].entities[].type is one from the table listed below.

Recorded FUture
Attribute Type
ThreatQ
Attribute Type
AttackVector Attack Vector
Product Affected Product
Company Company
City City
Country Country
Facility Facility
FileNameExtension File Extension
FileType File Type
GeoEntity Geo Entity
Industry Industry
IndustryTerm Industry Term
Logotype Logotype
Operation Operation
OrgEntity Organization Entity
PhoneNumber Phone Number
ProvinceOrState State
Region Region
Technology Technology
Topic Topic

Average Feed Run

Object counts and Feed runtime are supplied as generalities only - objects returned by a provider can differ based on credential configurations and Feed runtime may vary based on system resources and load.

Recorded Future Domain Risk List

Metric Result
Run Time 105 minutes
Indicators 92,000
Indicator Attributes 1,133,950

Recorded Future IP Risk List

Metric Result
Run Time 24 minutes
Indicators 29,600
Indicator Attributes 188,280

Recorded Future URL Risk List 

Metric Result
Run Time 23 minutes
Indicators 10,653
Indicator Attributes 92,877

Recorded Future Vulnerability Risk

Metric Result
Run Time 3 minutes
Vulnerabilities 335
Vulnerability Attributes 2,123

Recorded Future Hash Risk List

Metric Result
Run Time 7 minutes
Indicators 4,500
Indicator Attributes 32,760

Recorded Future Analyst Note

Metric Result
Run Time 1 minute
Adversaries 32
Identity 2
Indicators 59
Indicator Attributes 142
Malware 16
Malware Attributes 4
Reports 58
Reports Attributes 623
Vulnerability 33
Vulnerability Attributes 19

Recorded Future Alerts

Metric Result
Run Time 1 minute
Compromised Accounts 1
Entities 29
Events 13
Events Attributes 65
Files 15
Indicators 48
Indicator Attributes 151
Malware 6
Malware Attributes 6
Adversary 2
Adversary Attributes 2

Recorded Future Playbook Alerts

Metric Result
Run Time 1 minute
Events 104
Events Attributes 1,005
Indicators 297
Indicator Attributes 959
Vulnerability 12
Vulnerability Attributes 307
Identity 1
Identity Attributes 4

Recorded Future Fusion Files

Metric Result
Run Time 11 minutes
Indicators 36,424
Indicator Attributes 74,979
Malware 141
Malware Attributes 143
Vulnerabilities 222
Vulnerability Attributes 222

Recorded Future Detection Rules

Metric Result
Run Time 1 minute
Signatures 4
Signature Attributes 29
Malware 6
Malware Attributes 4
Indicators 6
Indicator Attributes 6
Adversaries 2
Attack Patterns 9

Known Issues / Limitations

  • The Recorded Future Analyst Notes and Alerts feeds have an API limit and will only return the first 1,000 results.

Change Log

  • Version 2.14.0
    • Performed the following updates to the Recorded Future Analyst Note feed:
      • Updated the feed to utilize a new endpoint - https://api.recordedfuture.com/analyst-note/search.
      • Improved API performance when searching by date range.
      • Resolve a parsing hashes issue that would occur when parsing from signature content.
      • Removed the Author configuration parameter.
      • Added the following configuration parameters:
        • Fetch & Ingest Attachments - determine if the feed should fetch attachments associated with a given analyst note. 
        • Extracted Signatures: select which signature types to parse and ingest from relevant analyst note attachments.
    • Performed the following updates to the Recorded Future Alerts feed:
      • Improved adversary parsing. Now, only definitive threat actors will be ingested as adversaries.
      • Updated the feed to utilize a new endpoint: GET https://api.recordedfuture.com/alert/v3.
      • Improved API performance searching by date range.
  • Version 2.13.0
    • Added a new feed: Recorded Future Detection Rules that ingests YARA & Suricata Signatures.
    • Recorded Future Fusion Files feed - added a new option, IP Risk List w/ Geolocation & Malware, for the Selected Fusion Feeds parameter.  
    • Added a Recorded Future portal permalink of the Alert or Playbook Alert to the description of ingested Events.
    • Recorded Future Playbook Alerts feed - added a new configuration parameter: Playbook Category Filter.  
    • Added Alert and Playbook Alert ID attributes to the ingested Events to be compatible with v1.5.0 of the Recorded Future Operation
    • Resolved an issue where an Analyst Note would not display properly in the ThreatQ description.
    • Recorded Future Alerts feed - added the following new configuration parameter: Ingest Indicator Hits.
  • Version 2.12.2
    • Added the Target attribute for the events and indicators ingested by the Recorded Future Playbook Alerts feed.
    • Added the following configuration parameter for the Recorded Future Playbooks Alerts feed:
      • Ingest Target Attributes - enable this parameter to ingest Targets as event attributes and related indicator attributes.
  • Version 2.12.1
    • Removed a "dummy" parameter that is not required for feed requests. 
    • Resolved a filter mapping issue for data with null values.
    • Increased the timeout for the Recorded Future Alerts feed to 900.  
  • Version 2.12.0
    • The Recorded Future Analyst Note feed will now ingest the Recorded Future URL attribute.  
    • Added support for the Compromised Account and Entity custom objects.  Both custom objects are now required to be installed on your ThreatQ instance prior to installing or upgrading the integration to v2.12.0+.  
    • Added a new configuration parameter to the Recorded Future Playbook Alerts feed:
      • Ingest CVEs As - allows you to configure how CVEs are ingested into the platform.
    • Added the following new configuration parameters to the Recorded Future Alerts feed:
      • Ingest Emails as Compromised Accounts for these Rules - allows Email Address entities to be ingested as Compromised Account (account) objects if specific rules are triggered.
      • Ingest Images as Files Related to Alerts  - determine if the feed should download and ingest images into ThreatQ as Files.  
      • Ingest and Related Triggered By Entities to Alerts - determine if triggered by entities related objects should be ingested into the platform.   
    • URLs in event descriptions are now active/clickable for the Recorded Future Alerts feed.
  • Version 2.11.0
    • Removed the functionality to ingest specific risk list due to the risk's extreme volume.  
    • The List to Be Retrieved configuration parameter has been replaced with the optional Risk Rule Triggered parameter. The Risk Rule Triggered parameter allows you to configure the feed to only ingest indicators that triggered any of the selected risk rules.
  • Version 2.10.1
    • Resolved an issue where the Analyst Note feed ingested data with undesired text tags.
    • Add the following configuration parameters to all feeds:
      • Enable SSL Verification
      • Disable Proxies 
  • Version 2.10.0
    • All feeds except Alerts, Analyst Note, and Fusion Files: added two new configuration parameters:
      • Normalize Risk Score - enable this option to ingest a normalized risk score value as a scorable attribute.
      • Risk Score Normalization Mapping - allows you to configure mapping to normalize risk score values to the scorable attribute, Normalized Risk.   
  • Version 2.9.1
    • Made the following changes to the Recorded Future Analyst Note feed:
      • Removed the Ingest Selected Entities as Indicators configuration option.  
      • Added the following new configuration parameters:
        • Ingest Selected Primary Entities as Indicators - indicators of compromise from the "primary" entities list (note_entities) can now be ingested as indicator objects.  Email Addresses from the "primary" entities list can now be ingested as indicators.  Context (i.e. Malware, Adversaries, Attributes, & Attack Patterns) from the "primary" entities list will now be applied to the indicators of compromise from the "primary" entities list.
        • Ingest Selected Supporting Entities as Indicators - indicators from the "supporting" entities list (context_entities) can now be ingested as indicator objects.  Identities (Email Addresses) will now only be ingested from the "supporting" entities list
      • "Product" entities will only be brought in as the "Affected Product" attribute when a vulnerability is associated. Otherwise, the attribute name will just be, "Product".
      • Fixes issue where reference URLs in the description would have a url: prefix.
      • Topics are now ingested as tags.
  • Version 2.9.0
    • The Recorded Future Analyst Note feed has been rewritten.  Changes with the new feed include:
      • Reports are now ingested with a rich text description (HTML).
      • Full lists of entities, recommended queries, topics, authors, and metadata are now included in the feed.
      • References have been moved from the attributes section to the description.
      • EmailAddress entities are now extracted and related as Identity objects.
      • InternetDomainName, IpAddress, and Hash entities will now only be extracted and ingested as indicators if you elect to do so - which is not advised.
      • Organization entities are now filtered before being related as adversaries.  This change is to prevent benign organizations from being related.
      • You can now choose to ingest CVEs as Vulnerability (default) or Indicator objects.
      • Hashtag entities are now extracted and added as tags to reports.
      • Product entity attribute has been renamed to Affected Product to be more consistent with other feeds.
      • Analyst notes are no longer inherited to related object's descriptions.
      • Default Indicator status is now Review.
    • Performed the following updates to the Risk Lists feeds:
      • Added a new user field: Filter Out Entries with No New Evidence.  This allows you to filter out indicators that do not have any new evidence within the feed run timeframe and will help limit the amount of indicators that the feeds ingest, improving overall system performance.  You can perform a historical manual run to ingest the full list of indicators.
    • Performed the following updates to the Recorded Future Playbook Alerts feed:
      • Updated the default indicator status to Review.
      • Added enhanced Event Title and Description.
        • Events now include the category, priority, and criticality as part of the ingested Event Title.
        • Events now include a rich text description with context such as targets, assessments & WHOIS information
      • Added support for ingesting additional alert types & context data:
        • Cyber Vulnerabilities
        • Third Party Risks
        • Code Repo Leakages
      • Domain Abuse alerts now include WHOIS information.
      • Renamed the Organisation attribute to the more common, Organization spelling.
      • The category attribute will now reflect the case_rule_label value, rather than the more programmatic category value from the initial feed response.
      • Added better handling of shared attributes between the offending entity and event alert.
      • Malware Families are now parsed out from assessment results (if available).
      • Assets (Client IPs) are now parsed out from assessment results (if available).
    • Performed the following updates to the Recorded Future Alerts feed:
      • Alerts will now be ingested with a rich description containing a "Hits" table with the triggered entities and their respective documents.
      • This feed will no longer ingest document URLs as indicators.
      • This feed will only ingest CVEs (if enabled) and Hashes as indicators from the relevant document entities.
      • InternetDomainNames, URLs, IP Addresses, etc. have been removed as they are likely to be benign.
      • You'll will now be able to see the entities within the description of the event/alert.
      • Document entities will now be related to the event/alert.
      • The Triggered Rule URL attribute has been removed as it is no longer relevant.
      • Added Logotype as an extracted attribute.
      • Moved the Reference URL attribute to the event description.
      • Updated the default indicator status to Review.
      • Removed ability to add "Person" entities as related adversaries.
      • Added filtering of the Organization entities to prevent adding benign organizations as related adversaries.
      • Resolved an issue where the feed would ingest MITRE Technique IDs that do not align with existing MITRE Attack Patterns within the system.
    • Added a new feed: Recorded Future Fusion Files.  
  • Version 2.8.7
    • Added an All option to the List to be Retrieved parameter for the following feeds:

      Feed runs will typically complete within 40 minutes using this option so it is advised to schedule run times no more frequently than one hour.

      • Recorded Future Domain Risk List
      • Recorded Future Hash Risk List
      • Recorded Future IP Risk List
      • Recorded Future URL Risk List
    • Added new Known Issue regarding the All option for the List to be Retrieved parameter.  If utilizing the All option, all other items in the List to be Retrieved parameter must be unselected.  Attempting to run a feed with the All and other items in the list selected will cause the feed to fail.   
    • Added a new attribute for the Recorded Future playbook Alerts feed: Context data.
    • Added Target Entities for related entities in the Recorded Future Alerts feed.  
  • Version 2.8.6
    • Performed optimization improvements for all feeds that contain the Risk List in their name in a effort to reduce the possibility of timeout errors.
  • Version 2.8.5
    • Resolved a timeout error that was caused by large evidence details.
    • Removed the following no longer supported lists from Recorded Future Domain Risk List:
      • Historical Malware Analysis DNS Name
      • Recent Malware Analysis DNS Name
    • Added the following new lists to Recorded Future Domain Risk List:
      • Frequently Abused Free DNS Provider
      • Historically Suspected Malware Operation
      • Recently Suspected Malware Operation
      • Recent Cryptocurrency Mining Pool
    • Added the following new lists to Recorded Future IP Risk List
      • Historical Malicious Infrastructure Admin Server
      • Recent Malicious Infrastructure Admin Server
    • Added the following new lists to Recorded Future URL Risk List
      • Historically Suspected Malware Distribution
      • Recently Suspected Malware Distribution
      • Recent Reported C&C URL
      • Historical Reported C&C URL
  • Version 2.8.4
    • Commonly updated attributes, such as attributes that involve timestamps and criticality, will now be updated when ingesting new data as opposed to creating duplicate attributes. See the Mapping Tables of each feed for details. 
  • Version 2.8.3
    • Introduced a results limitation for the Recorded Future Analyst Note feed to resolve an offset issue.  
    • Added the following new Topic configuration options for the Recorded Future Analyst Note feed:
      • Geopolitical  Intelligence Summary
      • Geopolitical Flash Event
      • Geopolitical Threat Forecast
      • Geopolitical Validated Event
      • Insikt Research Lead
      • Regular Vendor Vulnerability Disclosures
      • Sigma Rule
      • The Record by Recorded Future
    • Added a new issue to the Known Issues / Limitations chapter regarding the API limit for the Analyst Notes and Alerts feeds.
  • Version 2.8.2
    • Improved the Recorded Future Alerts feed to ingest more information regarding alerts.
      • Added new configuration field for the feed: Save CVE Data As.  
      • Guide Update - updated Recorded Future Alerts sample response, default mapping table, Related Indicator Type mapping, and added a new Related Indicator Attributes mapping entry.
  • Version 2.8.1
    • Updated the Recorded Future Alerts endpoint to API version 3.
    • Removed support from the following problematic lists:
      • Positive Malware Verdict
      • Historical Ransomware Distribution URL
      • Recent Ransomware Distribution URL  
  • Version 2.8.0
    • The integration now synchronizes Risk lists.  
  • Version 2.7.0
    • Added a new feed: Recorded Future Playbook Alerts.  
    • Added the ability to filter by minimum risk score for the Risk List feeds (Recorded Future Domain Risk List, Recorded Future IP Risk List, Recorded Future URL Risk List, Recorded Future Vulnerability Risk List and Recorded Future Hash Risk List).
    • Added the ability to select the hash types that are ingested by the Recorded Future Hash Risk List, Recorded Future Analyst Note, and Recorded Future Alerts feeds.  
    • Added the ability to ingest SHA-1 indicators.
  • Version 2.6.2
    • Synchronized the Risk lists for the Risk List feeds to match option updates that Recorded Future performed.  
    • Added time constrained data ingestion for all feeds so manual runs can be performed.  Previously, the manual run option was only supported by the Analyst Note feed.  
  • Version 2.6.1
    • Fixed a parsing error that would occur when no evidence details are provided.  
  • Version 2.6.0
    • Removed lists from Recorded Future Domain Risk List feed:
      • Ransomware Distribution URL
      • Ransomware Payment DNS Name
    • Removed lists from Recorded Future Vulnerability Risk feed:
      • Observed Exploit/Tool Development in the Wild
      • Historically Observed Exploit/Tool Development in the Wild
  • Version 2.5.0
    • Refactored Recorded Future Feeds (aside from Analyst Note).
    • Fixed a bug that caused an Error applying FilterMapping error from the URL Risk List and other similar feeds.
    • Removed lists that are no longer support that would cause the feed to throw a 404 error.  Lists removed include:
      • Recorded Future Domain Risk List:
        • C&C URL
      • Recorded Future URL Risk List:
        • C&C
        • Compromised URL
        • Historically Detected Malicious Browser Exploits
        • Recently Detected Malicious Browser Exploits
        • Recently Detected Suspicious Content
        • Historically Detected Suspicious Content
      • Recorded Future Vulnerability Risk List:
        • Recently Observed Exploit/Tool Development in the Wild
  • Version 2.4.1
    • Fixed a parsing error with Analyst Note.
  • Version 2.4.0
    • Added Alert details
  • Version 2.3.0
    • Added support for MITRE Attack Pattern Sub-Techniques
    • Added 'Save CVE Data As' user configuration parameter for Recorded Future Vulnerability Risk List
  • Version 2.2.0
    • Added support to multiple selection for list
    • Fixed issue with MITRE map
  • Version 2.1.0
    • Added support for configuration list in the request
  • Version 2.0.1
    • Fixed issue with attributes
  • Version 2.0.0
    • Added Analyst Note Integration
  • Version 1.0.0
    • Initial release

PDF Guides

Document ThreatQ Version
Recorded Future CDF Guide v2.14.0 5.6.0 or Greater
Recorded Future CDF Guide v2.13.0 5.6.0 or Greater
Recorded Future CDF Guide v2.12.2 5.6.0 or Greater
Recorded Future CDF Guide v2.12.1 5.6.0 or Greater
Recorded Future CDF Guide v2.12.0 5.6.0 or Greater
Recorded Future CDF Guide v2.11.0 5.6.0 or Greater
Recorded Future CDF Guide v2.10.1 5.6.0 or Greater
Recorded Future CDF Guide v2.10.0 5.6.0 or Greater
Recorded Future CDF Guide v2.9.1 5.6.0 or Greater
Recorded Future CDF Guide v2.9.0 5.6.0 or Greater
Recorded Future CDF Guide v2.8.7 5.6.0 or Greater
Recorded Future CDF Guide v2.8.6 5.6.0 or Greater
Recorded Future CDF Guide v2.8.5 5.6.0 or Greater
Recorded Future CDF Guide v2.8.4 5.6.0 or Greater
Recorded Future CDF Guide v2.8.3 5.6.0 or Greater
Recorded Future CDF Guide v2.8.2 4.34.0 or Greater
Recorded Future CDF Guide v2.8.1 4.34.0 or Greater
Recorded Future CDF Guide v2.8.0 4.34.0 or Greater
Recorded Future CDF Guide v2.7.0 4.34.0 or Greater
Recorded Future CDF Guide v2.6.2 4.34.0 or Greater
Recorded Future CDF Guide v2.6.1 4.34.0 or Greater
Recorded Future CDF Guide v2.6.0 4.34.0 or Greater
Recorded Future CDF Guide v2.5.0 4.34.0 or Greater
Recorded Future CDF Guide v2.4.1 4.34.0 or Greater
Recorded Future CDF Guide v2.4.0 4.34.0 or Greater
Recorded Future CDF Guide v2.3.0 4.30.0 or Greater
Recorded Future CDF Guide v2.2.0 4.30.0 or Greater
Recorded Future CDF Guide v2.1.0 4.30.0 or Greater
Recorded Future CDF Guide v2.0.1 4.30.0 or Greater
Recorded Future CDF Guide v2.0.0 4.30.0 or Greater
Recorded Future CDF Guide v1.0.0 4.13.0 or Greater