Sekoia CDF
The web format of this guide reflects the most current release. Guides for older iterations are available in PDF format.
Integration Details
ThreatQuotient provides the following details for this integration:
Current Integration Version | 1.1.1 |
Compatible with ThreatQ Versions | >= 4.42.0 |
Support Tier | ThreatQ Supported |
Introduction
Sekoia is a French-based company that provides intelligence-driven cybersecurity. The Sekoia feed integrates with Sekoia's InThreat
Intelligence Center API as described in Sekoia's Documentation.
The integration provides the following feeds:
- Sekoia - ingests Indicator Patterns within Sekoia Collections, pulling in each Indicator Pattern along with its accompanying context.
- Sekoia Indicator Context (Supplemental) - polls Sekoia's Indicator Context endpoint for each Indicator returned by the primary feed.
The integration ingests the following system objects:
- Attack Patterns
- Attack Pattern Attributes
- Courses of Actions
- Courses of Action Attributes
- Identities
- Indentity Attributes
- Indicators
- Indicator Attribute
- Malware
- Malware Attributes
- Signatures
- Signature Attributes
Prerequisites
In order to pull data from Sekoia's Intelligence Center API, one must first generate an API key within Sekoia's UI. To do this:
- Navigate to the User Center Communities page.
- Click on a Community with Intelligence Center permissions to see more settings for that particular Community.
- On the Community settings page, click the
API keys
tab and then the+ API Key
button. - In the Add API Key modal, give the key an identifiable name and description.
- On the next page, give the key the Admin role as shown below.
After clicking Save
, copy the newly generated API key presented on the next screen and save it as it will only be displayed once. This API key should be used for the Sekoia API Key
User Field in the ThreatQ UI.
Installation
This integration can be installed in the My Integration section of your ThreatQ instance. See the Adding an Integration topic for more details.
Configuration
ThreatQuotient does not issue API keys for third-party vendors. Contact the specific vendor to obtain API keys and other integration-related credentials.
To configure the integration:
- Navigate to your integrations management page in ThreatQ.
- Select the Commercial option from the Category dropdown (optional).
If you are installing the integration for the first time, it will be located under the Disabled tab.
- Click on the integration entry to open its details page.
- Enter the following parameters under the Configuration tab:
Parameter Description Sekoia Collection / Feed ID Collection ID of the Sekoia Feed data should be pulled from. If not supplied, the default Feed will be used. Sekoia API Key Secret authorization key for Sekoia's API. See the Prerequisites section for information on generating a key within Sekoia. Disable Proxies Whether configured proxies should be ignored for requests made by this Feed. The default is False
.Enable SSL Verification Whether the provider's SSL certificate should be verified on requests. The default is True
. - Review any additional settings, make any changes if needed, and click on Save.
- Click on the toggle switch, located above the Additional Information section, to enable it.
ThreatQ Mapping
Sekoia
The Sekoia feed targets Indicator Patterns within Sekoia Collections, pulling in each Indicator Pattern along with its accompanying context.
The first endpoint used is dynamic based on the specified Sekoia Collection / Feed ID
User Field. If a Sekoia Collection / Feed ID
is not specified, the default Sekoia Collection (d6092c37-d8d7-45c3-8aff-c4dc26030608
) will be used.
GET https://app.sekoia.io/api/v2/inthreat/collections/{{ Sekoia Collection / Feed ID }}/patterns
The JSON data returned contains the object UUIDs needed to poll Sekoia's Indicator Context endpoint.
Sample Response:
{
"next_id": "indicator--c000c6f9-ef4e-4143-93e5-87c0e566e8e6",
"items": [
{
"pattern": "[url:value = 'https://tny.de/Em9s?index.php?vywdbxwwquijbubkw']",
"revoked": false,
"modified": "2020-12-06T21:57:35.19529Z",
"valid_from": "2020-12-06T00:00:00Z",
"uuid": "indicator--daa711ef-9e7e-46d3-882c-d42ec6f2f0d4",
"valid_until": "2021-06-05T00:00:00Z",
"created": "2020-12-06T21:57:35.195307Z"
},
{
"pattern": "[url:value = 'http://fb-iverifications.tk/']",
"revoked": false,
"modified": "2020-12-06T21:57:35.195327Z",
"valid_from": "2020-12-06T00:00:00Z",
"uuid": "indicator--b72c0244-58b9-413c-b034-5c4ea7fa950f",
"valid_until": "2021-06-05T00:00:00Z",
"created": "2020-12-06T21:57:35.195341Z"
},
...
]
}
ThreatQuotient provides the following default mapping for this feed:
Feed Data Path | ThreatQ Entity | ThreatQ Object Type or Attribute Key | Published Date | Examples | Notes |
---|---|---|---|---|---|
.items[].uuid | N/A | N/A | N/A | indicator--b72c0244-58b9-413c-b034-5c4ea7fa950f | Used to poll Sekoia's Indicator Context endpoint |
Sekoia Indicator Context
The Sekoia Indicator Context supplemental feed polls Sekoia's Indicator Context endpoint for each Indicator returned by the primary feed. For each Indicator, a STIX package is returned containing:
- The Indicator
- The Indicator's top-level relationships and related objects
- Potentially relevant Course-Of-Action objects
- Referenced Sources and Object Markings like TLP
GET https://app.sekoia.io/api/v2/inthreat/objects/{{ Indicator UUID }}/context
The JSON data returned is a qualified STIX bundle that is passed into ThreatQ's STIX Parser.
Sample Response:
{
"id": "bundle--6fb8fbe6-dff0-43a8-b838-e2723ca9df73",
"type": "bundle",
"objects": [
{
"kill_chain_phases": [
{
"phase_name": "delivery",
"kill_chain_name": "lockheed-martin-cyber-kill-chain"
},
{
"phase_name": "initial-access",
"kill_chain_name": "mitre-attack"
}
],
"x_inthreat_sources_refs": [
"identity--357447d7-9229-4ce1-b7fa-f1b83587048e"
],
"created_by_ref": "identity--357447d7-9229-4ce1-b7fa-f1b83587048e",
"object_marking_refs": [
"marking-definition--34098fce-860f-48ae-8e50-ebd3cc5e41da"
],
"created": "2019-07-31T15:28:10.544209Z",
"revoked": false,
"pattern": "[file:hashes[*] = '3c8b026ca685673f5be574a837c4ae7e608e75a57e3eb4ebcc48f058005a8270' OR file:hashes[*] = 'dde658eb388512ee9f4f31f0f027a7df' OR file:hashes[*] = '42782042bb64fa0b0daad35a6a4cf81ef313129f']",
"x_ic_impacted_sectors": [],
"valid_until": "2018-01-31T23:00:00.000Z",
"id": "indicator--0b2dc54f-f920-4381-8e3f-492e7186d052",
"description": "Договор намерения.chm",
"lang": "en",
"modified": "2019-08-01T10:49:46.360696Z",
"indicator_types": [
"malicious-activity"
],
"x_ic_deprecated": false,
"name": "Malicious CHM",
"spec_version": "2.1",
"type": "indicator",
"x_ic_is_in_flint": false,
"confidence": 79,
"pattern_type": "stix",
"valid_from": "2017-08-31T22:00:00.000Z",
"x_ic_impacted_locations": []
},
{
"external_references": [
{
"source_name": "SEKOIA website",
"url": "https://www.sekoia.fr"
}
],
"object_marking_refs": [
"marking-definition--613f2e26-407d-48c7-9eca-b8e91df99dc9"
],
"created": "2008-01-01T00:00:00Z",
"revoked": false,
"x_ic_is_sector": false,
"x_ic_impacted_sectors": [],
"identity_class": "organization",
"id": "identity--357447d7-9229-4ce1-b7fa-f1b83587048e",
"x_ic_is_source": true,
"description": "SEKOIA is a French company which applies intelligence-driven cybersecurity",
"lang": "en",
"modified": "2019-09-30T07:54:40.149166Z",
"contact_information": "threatintel@sekoia.fr",
"x_ic_deprecated": false,
"name": "SEKOIA",
"sectors": [
"technology"
],
"spec_version": "2.1",
"type": "identity",
"x_ic_is_in_flint": true,
"confidence": 95,
"x_ic_impacted_locations": []
},
{
"id": "marking-definition--34098fce-860f-48ae-8e50-ebd3cc5e41da",
"type": "marking-definition",
"object_marking_refs": [
"marking-definition--34098fce-860f-48ae-8e50-ebd3cc5e41da"
],
"created": "2019-10-09T16:10:07.239899Z",
"spec_version": "2.1",
"definition": {
"tlp": "green"
},
"definition_type": "tlp",
"name": "TLP:GREEN",
"x_ic_deprecated": false
},
{
"id": "marking-definition--613f2e26-407d-48c7-9eca-b8e91df99dc9",
"type": "marking-definition",
"object_marking_refs": [
"marking-definition--34098fce-860f-48ae-8e50-ebd3cc5e41da"
],
"created": "2019-10-31T16:57:02.018068Z",
"spec_version": "2.1",
"definition": {
"tlp": "white"
},
"definition_type": "tlp",
"name": "TLP:WHITE",
"x_ic_deprecated": false
}
]
}
Average Feed Run
Object counts and Feed runtime are supplied as generalities only - objects returned by a provider can differ based on credential configurations and Feed runtime may vary based on system resources and load.
Sekoia
Metric | Result |
---|---|
Run Time | 4 minutes |
Indicators | 394 |
Indicator Attributes | 2,377 |
Attack Patterns | 1 |
Attack Pattern Attributes | 20 |
Courses Of Action | 6 |
Course Of Action Attributes | 19 |
Identities | 6 |
Identity Attributes | 14 |
Malwares | 11 |
Malware Attributes | 73 |
Signatures | 138 |
Signature Attributes | 828 |
Known Issues / Limitations
-
Due to transient errors raised by Sekoia's server, ThreatQ recommends running this feed on an hourly period and avoiding Manual Runs longer than 2 months. Sekoia's server can sporadically throw the following errors when performing large manual runs:
503 Service Unavailable
504 Gateway Time-out
[Errno 104] Connection reset by peer
-
ThreatQ's STIX Parser does not currently handle custom STIX 2 attributes beginning with
x_
, such asx_ic_impacted_sectors
-
Sekoia uses an unconventional method of providing file hashes in their STIX Indicator Patterns that is not supported by the STIX spec. As a result, the ThreatQ STIX Parser may fail to parse out Indicator objects from these Pattern strings.
Change Log
- Version 1.1.1
- Fixed a pagination issue that would cause Sekoia feed runs to fail to complete.
- Version 1.1.0
- Feed revamp and initial release
- Version 1.0.0
- Initial beta development
PDF Guides
Document | ThreatQ Version |
---|---|
Sekoia CDF Guide v1.1.1 | 4.11 or Greater |
Sekoia CDF Guide v1.1.0 | 4.11 or Greater |