VMware Carbon Black EDR CDF
The web format of this guide reflects the most current release. Guides for older iterations are available in PDF format.
Integration Details
ThreatQuotient provides the following details for this integration:
Current Integration Version | 1.0.0 |
Compatible with ThreatQ Versions | >= 5.20.0 |
Support Tier | ThreatQ Supported |
Introduction
The VMware Carbon Black EDR CDF for ThreatQ enables the automatic ingestion of Triage Alerts from VMware Carbon Black EDR into the ThreatQ platform.
The integration provides the following feed:
- VMware Carbon Black EDR - enables the automatic ingestion of Triage Alerts.
The integration ingests the following system system objects:
- Assets
- Events
- Indicators
Installation
Perform the following steps to install the integration:
The same steps can be used to upgrade the integration to a new version.
- Log into https://marketplace.threatq.com/.
- Locate and download the integration yaml file.
- Navigate to the integrations management page on your ThreatQ instance.
- Click on the Add New Integration button.
- Upload the integration file using one of the following methods:
- Drag and drop the yaml file into the dialog box
- Select Click to Browse to locate the integration yaml file on your local machine
ThreatQ will inform you if the feed already exists on the platform and will require user confirmation before proceeding. ThreatQ will also inform you if the new version of the feed contains changes to the user configuration. The new user configurations will overwrite the existing ones for the feed and will require user confirmation before proceeding.
- The feed will be added to the integrations page.
You will still need to configure and then enable the feed.
Configuration
ThreatQuotient does not issue API keys for third-party vendors. Contact the specific vendor to obtain API keys and other integration-related credentials.
To configure the integration:
- Navigate to your integrations management page in ThreatQ.
- Select the Commercial option from the Category dropdown (optional).
If you are installing the integration for the first time, it will be located under the Disabled tab.
- Click on the integration entry to open its details page.
- Enter the following parameters under the Configuration tab:
Parameter Description VMware Carbon Black EDR Hostname or IP Enter the hostname or IP address for your VMware Carbon Black EDR instance. API Token Enter your VMware Carbon Black EDR API Token to authenticate. Custom Alerts Query Optional - enter a custom query for the alerts API endpoint. Verify SSL Enable/Disable the Verify SSL feature. This option should be disabled if you are using a self-signed certificate.
- Review any additional settings, make any changes if needed, and click on Save.
- Click on the toggle switch, located above the Additional Information section, to enable it.
ThreatQ Mapping
VMware Carbon Black EDR
The VMware Carbon Black EDR feed automatically ingests triage alerts and context from VMware Carbon Black EDR into the ThreatQ platform.
GET https://{host_or_ip}/api/v2/alert
Sample Response:
{
"results": [
{
"unique_id": "ae524e9e-7ef4-42cc-a78e-295e902771cb",
"created_time": "2021-12-09T20:20:31.477Z",
"alert_type": "watchlist.hit.ingress.process",
"status": "Unresolved",
"sensor_criticality": 3,
"feed_rating": 3,
"ioc_confidence": 0.5,
"report_score": 100,
"os_type": "windows",
"username": "DESKTOP-RIS67BS\\Admin",
"process_name": "curl.exe",
"process_path": "c:\\windows\\system32\\curl.exe",
"modload_count": 14,
"filemod_count": 0,
"regmod_count": 0,
"netconn_count": 1,
"childproc_count": 0,
"crossproc_count": 1,
"md5": "1c3645ebddbe2da6a32a5f9fb43a3c23",
"sha256": "0ba1c44d0ee5b34b45b449074cda51624150dc16b3b3c38251df6c052adba205",
"process_unique_id": "00000003-0000-2640-01d7-ed3a0d3d7414-017da0dac3ea",
"feed_name": "abusech",
"feed_id": 10,
"watchlist_name": "feodoipblocklist",
"watchlist_id": "feodoipblocklist",
"ioc_type": "ipv4",
"ioc_value": "158.69.118.130",
"ioc_attr": "{\"local_ip\":\"-1062727933\",\"protocol\":\"TCP\",\"remote_ip\":\"-1639614846\",\"port\":\"49927\",\"local_port\":\"49927\",\"remote_port\":\"80\",\"direction\":\"Outbound\"}",
"process_id": "00000003-0000-2640-01d7-ed3a0d3d7414",
"segment_id": 1639081231338,
"hostname": "desktop-ris67bs",
"group": "default group",
"sensor_id": 3,
"comms_ip": "10.13.0.1",
"interface_ip": "192.168.15.3",
"alert_severity": 67.5,
"_version_": 1718701241451675600,
"total_hosts": 0,
"description": "Feodo IP Blocklist",
"link": "https://feodotracker.abuse.ch/downloads/ipblocklist.csv",
"report_ignored": false
}
],
"facets": {},
"filtered": {},
"highlights": [],
"elapsed": 0.016037702560424805,
"start": 0,
"total_results": 10,
"terms": [
"created_time:[2021-12-01T22:15:00 TO 2021-12-09T23:00:00]"
],
"all_segments": true,
"comprehensive_search": true,
"incomplete_results": false
}
ThreatQuotient provides the following default mapping for this feed:
Feed Data Path | ThreatQ Entity | ThreatQ Object Type or Attribute Key | Published Date | Examples | Notes |
---|---|---|---|---|---|
results[].ioc_confidence |
Indicator/Event.Attribute | IOC Confidence | results[].created_time |
0.5 | N/A |
results[].ioc_type |
Indicator/Event.Attribute | IOC Type | results[].created_time |
ipv4 | N/A |
results[].report_score |
Indicator/Event.Attribute | Report Score | results[].created_time |
100 | N/A |
results[].[process_id/segment_id] |
Indicator/Event.Attribute | Process Link | results[].created_time |
https://{host}/#/analyze/ 00000003-0000-2640-01 d7-ed3a0d3d7414/16390 81231338 |
Keys are concatenated together to form the link |
results[].interface_ip |
Asset.Attribute | IP Address | results[].created_time |
192.168.15.3 | For Assets Only |
results[].comms_ip |
Asset.Attribute | Comms IP Address | results[].created_time |
10.13.0.1 | For Assets Only |
results[].os_type |
Asset.Attribute | Operating System | results[].created_time |
windows | For Assets Only |
results[].hostname |
Asset.Attribute | Hostname | results[].created_time |
desktop-ris67bs | For Assets Only |
results[].group |
Asset.Attribute | Host Group | results[].created_time |
default group | For Assets Only |
results[].sensor_criticality |
Asset.Attribute | Host Criticality | results[].created_time |
3 | For Assets Only |
results[].alert_severity |
Event.Attribute | Severity | results[].created_time |
67.5 | For Events Only |
results[].alert_type |
Event.Attribute | Alert Type | results[].created_time |
watchlist.hit.ingre ss.process |
For Events Only |
results[].status |
Event.Attribute | Status | results[].created_time |
Unresolved | For Events Only |
results[].feed_name |
Event.Attribute | Feed Name | results[].created_time |
abusech | For Events Only |
results[].feed_rating |
Event.Attribute | Feed Rating | results[].created_time |
3 | For Events Only |
results[].watchlist_name |
Event.Attribute | Watchlist Name | results[].created_time |
feodoipblocklist | For Events Only |
results[].netconn_count |
Event.Attribute | Network Connections | results[].created_time |
1 | For Events Only |
results[].md5 |
Related Indicator.Value | MD5 | results[].created_time |
1c3645ebddbe2da6a 32a5f9fb43a3c23 |
Added with the Review Status |
results[].sha256 |
Related Indicator.Value | SHA-256 | results[].created_time |
0ba1c44d0ee5b34b4 5b449074cda516241 50dc16b3b3c38251d f6c052adba205 |
Added with the Review Status |
results[].process_name |
Related Indicator.Value | Filename | results[].created_time |
curl.exe | Added with the Review Status |
results[].process_path |
Related Indicator.Value | File Path | results[].created_time |
c:\windows\system32\ curl.exe |
Added with the Review Status |
results[].ioc_value |
Related Indicator.Value | Based on data.ioc_type |
results[].created_time |
158.69.118.130 | N/A |
results[].username |
Related Indicator.Value | Username | results[].created_time |
DESKTOP-RIS67BS\ Admin |
N/A |
results[].[hostname/interface_ip] |
Related Asset.Value | N/A | results[].created_time |
desktop-ris67bs 192.168.15.3 | N/A |
results[].[process_name/alert_type /hostname /watchlist_name /alert_severity /unique_id] |
Event.Title | Alert | results[].created_time |
Process curl.exe triggered a watchlist hit ingress process alert on host desktop-ris67bs | Keys are concatenated together, conditionally |
results[].ioc_attr |
Event.Description | N/A | results[].created_time |
N/A | Concatenated to form HTML & JSON Prettified |
Average Feed Run
Object counts and Feed runtime are supplied as generalities only - objects returned by a provider can differ based on credential configurations and Feed runtime may vary based on system resources and load.
Metric | Result |
---|---|
Run Time | 1 minute |
Asset | 1 |
Asset Attributes | 6 |
Events | 10 |
Event Attributes | 110 |
Indicators | 15 |
Indicator Attributes | 72 |
Change Log
- Version 1.0.0
- Initial release
PDF Guides
Document | ThreatQ Version |
---|---|
VMware Carbon Black EDR CDF Guide v1.0.0 | 5.20.0 or Greater |