Current ThreatQ Version Filter

iZoologic Sync Cases CDF

The web format of this guide reflects the most current release.  Guides for older iterations are available in PDF format.  

Integration Details

ThreatQuotient provides the following details for this integration:

Introduction

The iZoologic Sync Cases CDF enables the ingestion and ongoing synchronization of Incident and DLR case data from iZoologic, ensuring both new and updated cases are accurately reflected. The integration collects core case information along with related details, communications, and supporting files to provide comprehensive visibility into case activity and associated entities.

The integration provides the following feeds:

  • iZoologic Incident Case Sync - parses of Incident cases from iZoologic and ingests them as either events or incidents.
    • Get Incident Case Details - request to get information for individual cases and return the data to the Incident Case Sync primary feed.
    • Get Case Communications - request to get the communications for individual cases and returns the data to the Incident Case Sync primary feed.
    • Get Case Files - request to get files from individual cases and fulfill placeholder attachments for objects created by the Incident Case Sync primary feed.
    • File Request - requests the actual file data and returns it to the Get Case Files fulfillment feed.
  • iZoologic DLR Case Sync - This feed parses DLR cases from iZoologic and ingests them as either compromised accounts or Identities.
    • Get DLR Incident Case Details - request to get information for individual DLR cases and return the data to the DLR Case Sync primary feed.

The integration ingests the following object types:

  • Compromised Accounts (custom object)
  • Events
    • Event Attributes
  • Identities
    • Identity Attributes
  • Incidents
    • Incident Attributes
  • Notes
    • Note Attributes

Prerequisites

The integration requires the following:

  • A iZoologic API Key and Secret Key - these values can be obtained by clicking the account icon in iZoologic and selecting Profile > API Key.
  • The compromised account custom object installed on the ThreatQ instance. This object must be installed prior to installing the integration.

Compromised Account Custom Object

The integration requires the compromised account custom object.  

Use the steps provided to install the custom object.    

When installing the custom objects, be aware that any in-progress feed runs will be cancelled, and the API will be in maintenance mode.

Use the following steps to install the custom object in ThreatQ v6:   

  1. Download the integration bundle from the ThreatQ Marketplace.
  2. Unzip the bundle and locate the custom object files.

    The custom object files will typically consist of a JSON definition file, install.sh script, and a images folder containing the svg icons.

  3. SSH into your ThreatQ instance.
  4. Navigate to the tmp folder:
    cd /var/lib/threatq/misc/

  5. Upload the custom object files, including the images folder.

    The directory structure should be as the following:

    • misc
      • install.sh
      • <custom_object_name>.json
      • images (directory)
        • <custom_object_name>.svg
  6. Run the following command:
    kubectl exec -it deployment/api-schedule-run -n threatq -- sh /var/lib/threatq/misc/install.sh /var/lib/threatq/misc

    The installation script will automatically put the application into maintenance mode, move the files to their required directories, install the custom object, update permissions, bring the application out of maintenance mode, and restart dynamo.

  7. Delete the install.sh, definition json file, and images directory from the misc directory after the object has been installed as these files are no longer needed.
  1. Download the integration zip file from the ThreatQ Marketplace and unzip its contents.  
  2. SSH into your ThreatQ instance.
  3. Navigate to tmp directory:
    cd /tmp/
  4. Create a new directory:
    mkdir izoologic
  5. Upload the account.json and install.sh script into this new directory.
  6. Create a new directory called images within the izoologic_cdf directory.
    mkdir images
  7. Upload the account.svg. 
  8. Navigate to the /tmp/izoologic_cdf.

    The directory should resemble the following:

    • tmp
      • izoologic_cdf
        • account.json
        • install.sh
        • images
          • account.svg
  9. Run the following command to ensure that you have the proper permissions to install the custom object:
    chmod +x install.sh
  10. Run the following command:
    sudo ./install.sh

    You must be in the directory level that houses the install.sh and json files when running this command.

    The installation script will automatically put the application into maintenance mode, move the files to their required directories, install the custom object, update permissions, bring the application out of maintenance mode, and restart dynamo.

  11. Remove the temporary directory, after the custom object has been installed, as the files are no longer needed:
    rm -rf xxx_cdf

Installation

The integration requires that the Compromised Account custom object be installed on your ThreatQ instance prior to installing the CDF.  Failure to install the custom object will result in the CDF installation process failing. 

Perform the following steps to install the integration:

The same steps can be used to upgrade the integration to a new version.

  1. Log into https://marketplace.threatq.com/.
  2. Locate and download the integration zip file.
  3. Extract and install the required custom objects if you have not done so already.  
  4. Navigate to the integrations management page on your ThreatQ instance.
  5. Click on the Add New Integration button.
  6. Upload the integration yaml file using one of the following methods:
    • Drag and drop the file into the dialog box
    • Select Click to Browse to locate the file on your local machine
  7. Select the individual feeds to install, when prompted and click Install.

    ThreatQ will inform you if the feed already exists on the platform and will require user confirmation before proceeding. ThreatQ will also inform you if the new version of the feed contains changes to the user configuration. The new user configurations will overwrite the existing ones for the feed and will require user confirmation before proceeding.

The feed(s) will be added to the integrations page. You will still need to configure and then enable the feed.

Configuration

ThreatQuotient does not issue API keys for third-party vendors. Contact the specific vendor to obtain API keys and other integration-related credentials.

To configure the integration:

  1. Navigate to your integrations management page in ThreatQ.
  2. Select the Commercial option from the Category dropdown (optional).

    If you are installing the integration for the first time, it will be located under the Disabled tab.

  3. Click on the integration entry to open its details page.
  4. Enter the following parameters under the Configuration tab:

    Incident Case Sync Parameters

    Parameter Description
    API Key Enter your iZoologic API Key.
    Secret Key Enter your iZoologic Secret Key. 
    Ingest as Event Instead of Incident Enable this parameter to ingests cases as events. Otherwise, cases will be ingested as incident objects. 
    Ingest IP as Attribute Enable this parameter to ingest ip addresses as attributes.
    Added Date vs Detection Date Enable this parameter to have the added date used as the published at date. Otherwise, the detection date will be used.  
    Enable SSL Certificate Verification Enable this parameter if the feed should validate the host-provided SSL certificate. 
    Disable Proxies Enable this parameter if the feed should not honor proxies set in the ThreatQ UI.

    Incident Case Sync Configuration Screen

    DLR Case Sync Parameters

    Parameter Description
    API Key Enter your iZoologic API Key.
    Secret Key Enter your iZoologic Secret Key. 
    Ingest as Identity Instead of Compromised Account Enable this parameter to ingests cases as indentities. Otherwise, cases will be ingested as compromised account objects. 
    Ingest Description as Attribute Enable this parameter to ingest descriptions as attributes.
    Use iZoologic Posted Date Enable this parameter to use the iZoologic posted date for the published date for a case.
    Enable SSL Certificate Verification Enable this parameter if the feed should validate the host-provided SSL certificate. 
    Disable Proxies Enable this parameter if the feed should not honor proxies set in the ThreatQ UI.
    DLR Case Sync Configuration Screen
  5. Review any additional settings, make any changes if needed, and click on Save.
  6. Click on the toggle switch, located above the Additional Information section, to enable it.

ThreatQ Mapping

iZoologic Incident Case Sync

The iZoologic Incident Case Sync feed requests a list of cases that have been updated since the last time the feed was run or from the date/time chosen in a manual run. The range is 30 days max. It then iterates over the list and requests case details, communications, and files. Uses the field lastsynctime in epoch format in the body of the request

POST {host_address}/api/ThreatManagement/CaseSync

Sample Response:

{
  "result": [
    {
      "caseId": "CASE123456",
      "updatedDate": "1672617600"
    },
    {
      "caseId": "CASE123457",
      "updatedDate": "1672704000"
    },
    {
      "caseId": "CASE123458",
      "updatedDate": "1672790400"
    }
  ],
  "success": true,
  "message": null,
  "errorCode": null
}

Get Incident Case Details (Supplemental)

The Get Incidents Case Detail supplemental feed utilizes the caseId from the Case Sync primary feed to get details of the individual cases.

GET {host_address}/api/ThreatManagement/CaseDetail

Sample Response:

{
  "result": {
    "url": "https://suspicious-site.com",
    "caseType": 6,
    "caseDescription": "Incident",
    "statusCode": 1,
    "statusDescription": "Open",
    "brand": "Example Brand",
    "incidentType": "Phishing",
    "threatType": "Brand Abuse",
    "description": "Phishing site impersonating brand",
    "impact": "High risk to brand reputation",
    "recommendation": "Immediate takedown required",
    "addedDate": "1672531200",
    "detectionDate": "1672531200",
    "clientRef": "REF123",
    "ipAddress": "192.168.1.100",
    "webhost": "HostingProvider Inc",
    "webhostCountry": "United States",
    "registrarName": "GoDaddy",
    "nameServer": "ns1.example.com",
    "mxRecord": "mail.example.com",
    "detectedBy": 1,
    "upTime": "2 days, 3 hours, 45 minutes",
    "progressStage": "Investigation",
    "executiveName": null,
    "mobileAppName": null,
    "mobileAppVersion": null,
    "mobileAppStatus": null,
    "mobileAppSignature": null,
    "incidentStatusLogs": [
      {
        "incidentStatus": 1,
        "incidentStatusDescription": "Open",
        "remark": "Case opened for investigation",
        "updatedOn": "1672531200",
        "updatedBy": "iZoologic"
      }
    ],
    "caseFiles": [
      {
        "dateUploaded": "1672531200",
        "originalFilename": "evidence.pdf",
        "fileToken": "U2FsdGVkX19nK8s2mE+7a6bW...encrypted_token",
        "isCaseScreenshot": false
      }
    ]
  },
  "success": true,
  "message": null,
  "errorCode": null
}

ThreatQuotient provides the following default mapping for the main and supplemental feed:

Feed Data Path ThreatQ Entity ThreatQ Object Type or Attribute Key Published Date Examples Notes
data.feed_results.url Event.Title Incident data.feed_results.addedDate https[:]//suspicious-site[.]com User-configurable. If chosen to ingest as an event in the feed config
data.feed_results.url Incident.Value N/A data.feed_results.addedDate https[:]//suspicious-site[.]com User-configurable. If chosen to ingest as an Incident in the feed config
data.feed_results.description Object.Description N/A N/A Phishing site impersonating brand User-configurable. If chosen to ingest as object description instead of attribute in the feed config
data.feed_results.description Event/Incident.Attribute Description N/A Phishing site impersonating brand User-configurable. If chosen to ingest as attribute in the feed config
data.caseId Event/Incident.Attribute Case ID N/A CASE123456 N/A
data.feed_results.brand Event/Incident.Attribute Brand N/A Example Brand N/A
data.feed_results.clientRef Event/Incident.Attribute Client Ref N/A REF123 N/A
data.feed_results.caseDescription Event/Incident.Attribute Case Type N/A Incident N/A
data.feed_results.statusDescription Event/Incident.Attribute Status N/A Open N/A
data.feed_results.incidentType Event/Incident.Attribute Incident Type N/A Phishing N/A
data.feed_results.subIncidentType Event/Incident.Attribute SubIncident Type N/A N/A N/A
data.feed_results.threatType Event/Incident.Attribute Threat Type N/A Brand Abuse N/A
data.feed_results.impact Event/Incident.Attribute Impact N/A High risk to brand reputation N/A
data.feed_results.recommendation Event/Incident.Attribute Recommendation N/A Immediate takedown required N/A
data.feed_results.mxRecord Event/Incident.Attribute MX Record N/A mail.example.com N/A
data.feed_results.detectedBy Event/Incident.Attribute Detected By N/A Client Detection source (1=iZoo, 2=Client)
data.feed_results.upTime Event/Incident.Attribute Up Time N/A 2 days, 3 hours, 45 minutes N/A
data.feed_results.progressStage Event/Incident.Attribute Progress Stage N/A Investigation N/A
data.feed_results.executiveName Event/Incident.Attribute Executive Name N/A N/A N/A
data.feed_results.mobileAppName Event/Incident.Attribute Mobile App Name N/A N/A N/A
data.feed_results.mobileAppVersion Event/Incident.Attribute Mobile App Version N/A N/A N/A
data.feed_results.mobileAppStatus Event/Incident.Attribute Mobile App Status N/A N/A N/A
data.feed_results.mobileAppSignature Event/Incident.Attribute Mobile App Signature N/A N/A N/A
data.feed_results.ipAddress Indicator.Value IP Address data.feed_results.addedDate 192.168.1.100 User-configurable. If chosen to ingest IP as an Indicator Object in the feed config
data.feed_results.ipAddress Event/Incident.Attribute IP Address N/A 192.168.1.100 User-configurable. If chosen to ingest IP as an Attribute in the feed config
data.feed_results.webhost Event/Incident.Attribute Web Host N/A HostingProvider Inc Is attributed to the IP Address Indicator if chosen in the feed config, otherwise attributed to the Event/Incident
data.feed_results.webhostCountry Event/Incident.Attribute Web Host Country N/A United States Is attributed to the IP Address Indicator if chosen in the feed config, otherwise attributed to the Event/Incident
data.feed_results.registrarName Event/Incident.Attribute Registrar Name N/A GoDaddy Is attributed to the IP Address Indicator if chosen in the feed config, otherwise attributed to the Event/Incident
data.feed_results.nameServer Event/Incident.Attribute Name Server N/A ns1.example.com Is attributed to the IP Address Indicator if chosen in the feed config, otherwise attributed to the Event/Incident

Get Case Communications (Supplemental)

The Get Case Communications supplemental feed utilizes the trackingId from the Case Sync primary feed to get details of the individual cases.

GET {host_address}/ThreatManagement/FetchCaseCommunications?fromdate=1753799715&todate=1755095715&caseid=gz3kEgBWO

Sample Response:

{
  "result": [
    {
      "caseID": "gz3kEgBWO",
      "brand": "ThreatQ",
      "createdOn": "1754599674",
      "subject": "New file uploaded for the CASE ID - gz3kEgBWO",
      "message": "Dear iZOOlabs, File name - test_file.txt Please find more details here on iZOOlabs > Incident/Monitoring > Uploads\r\n",
      "postedBy": "user@email.com"
    },
    {
      "caseID": "gz3kEgBWO",
      "brand": "ThreatQ",
      "createdOn": "1754490523",
      "subject": "Incident Acknowledgement - ",
      "message": "Incident Acknowledgement DearDemo, This is acknowledged that the following information has been received. Client Reference: Brand Targeted: ThreatQ Incident Type: Phishing URL: http://test.com Comment:This is a comment. iZOOlabs are currently reviewing this information and an incident will be logged shortly. You will be able to track this incident in iZOOlabs Incident Management portal in a few minutes. Feel free to contact us if you require any assistance. Thank you.",
      "postedBy": "user@email.com"
    }
  ],
  "success": true,
  "message": "",
  "errorCode": ""
}

ThreatQuotient provides the following default mapping for this supplemental feed:

Feed Data Path ThreatQ Entity ThreatQ Object Type or Attribute Key Published Date Examples Notes
value.createdOn Title or Value Event or Note value.createdOn 2025-08-06 00:00:00 - Incident Acknowledgement - Used with "subject" as the title/value. Incident Case Sync ingests these as Notes, DLR Case Sync ingests these as Events
value.subject Title or Value Event or Note value.createdOn 2025-08-06 00:00:00 - Incident Acknowledgement - Used with "createdOn" as the title/value. Incident Case Sync ingests these as Notes, DLR Case Sync ingests these as Events
value.message Description     _See example response_ N/A
value.brand Attribute Brand   ThreatQ N/A
value.postedBy Attribute Posted By   user@email.com N/A

Get Case Files (Fulfillment)

The Get Case Files fulfillment feed is used to fetch files for each Incident Case in iZoologic and upload them to ThreatQ using the File Request supplemental feed.

File Request (Supplemental)

The File Request supplemental feed retrieves file data from iZoologic to upload into ThreatQ using a file token that was returned with the case details.

POST {host_address}/ThreatManagement/DownloadCaseFile

Sample Response for Test File:

test file

iZoologic DLR Case Sync

The iZoologic DLR Case Sync feed retrieves cases that have been updated since the previous execution or from a user-specified date and time during a manual run, with a maximum lookback period of 30 days. It processes each case to collect detailed case information, related communications, and associated files, using the lastsynctime field in epoch format within the request body to determine the update window.

POST {host_address}/api/ThreatManagement/DLRSyncedCases

Sample Response:

{
  "result": [
    {
      "caseId": "DLR#n9Ra7KbR3",
      "modifiedDate": "1755168791"
    }
  ],
  "success": true,
  "message": "",
  "errorCode": ""
}

Get DLR Incident Case Details (Supplemental)

The Get DLR Incident Case Details supplemental feed utilizes the trackingId from the Case Sync primary feed to get details of the individual cases.

GET {host_address}/api/ThreatManagement/DLRDetail

Sample Response 1:

{
  "result": {
    "caseId": "DLR#n9Ra7KbR3",
    "trackingID": "n9Ra7KbR3",
    "brand": "ThreatQ",
    "brandCode": "jnWkxsedbn",
    "fileOrBreachName": "Test",
    "incidentType": "Login Credentials / Bank Account",
    "severity": "Substantial Threat",
    "threatActorName": null,
    "threatActorType": null,
    "threatActorActivities": null,
    "threatActorDetail": null,
    "dataType": "Combo",
    "subType": "Chat Platforms",
    "seller": null,
    "status": "Recovered",
    "originalUrl": "",
    "addedDate": "1755168791",
    "estimatedCost": null,
    "estimatedCrytocurrencyTransactionRate": null,
    "affectedProperty": "Test",
    "affectedPropertyBase": null,
    "affectedPropertyBaseDate": null,
    "affectedPropertyBINNumber": null,
    "description": "This is only a sample DLR case.",
    "impact": "Compromised Accounts details are available in the cybercrime ecosystem and are available for sale.",
    "recommendation": "Compromised Account details have been recovered from the Dark Web are a compromised. The business should immediately mitigate this account by blocking / suspending this account depending on corporate policy.",
    "detectedOn": "Telegram",
    "totalRecords": 1,
    "totalCorporateAccounts": 0,
    "totalPublicAccounts": 1,
    "totalExecutiveAccounts": 0,
    "dataLossRecoveryDetail": [
      {
        "cardType": null,
        "cardLevel": null,
        "cardNumber": null,
        "cardExpiry": null,
        "cvv": null,
        "cardDetail": null,
        "cardClassification": null,
        "track1": null,
        "track2": null,
        "dob": null,
        "ssn": null,
        "country": null,
        "state": null,
        "city": null,
        "zip": null,
        "firstName": null,
        "application": "Application_Test",
        "websiteOrServer": "_Test",
        "userName": "Username_Test",
        "email": "Email_Test",
        "corporateOrPublicAccount": "Public",
        "isExecutiveAccount": false,
        "password": "Password_Test",
        "phone": null,
        "address": null,
        "ipAddress": null,
        "userAgent": null,
        "recoveredProperty": "Test",
        "postedDate": "1754956800",
        "recoveryRemark": null
      }
    ]
  },
  "success": true,
  "message": "",
  "errorCode": ""
}

Sample Response 2:

{
  "result": {
    "caseId": "DLR123456",
    "trackingID": "TRK789012",
    "brand": "Example Brand",
    "brandCode": "BRAND001",
    "fileOrBreachName": "Dark Web Forum",
    "incidentType": "Data Breach",
    "severity": "Financial Data Exposure",
    "threatActorName": "CyberCriminal Group",
    "threatActorType": "Hacktivist",
    "threatActorActivities": "Defacement, Hacking",
    "threatActorDetail": "A decentralized international hacktivist group, known for various cyber-attacks, targeting government entities perceived as unjust or corrupt.",
    "dataType": "Combo",
    "SubType": "Sub Incident Type",
    "Seller": "Beller",
    "status": "Active",
    "addedDate": "2024-01-15T10:30:00Z",
    "estimatedCost": "$50,000",
    "estimatedCrytocurrencyTransactionRate": "0.5 BTC",
    "affectedProperty": "Customer credit card database",
    "affectedPropertyBase": "Primary database server",
    "affectedPropertyBaseDate": "1706656548",
    "AffectedPropertyBINNumber": "4101",
    "description": "Credit card data found on dark web marketplace",
    "impact": "Potential financial fraud for affected customers",
    "recommendation": "Immediate card replacement and customer notification",
    "detectedOn": "Github",
    "totalRecords": 1500,
    "totalCorporateAccounts": 150,
    "totalPublicAccounts": 1350,
    "totalExecutiveAccounts": 220,
    "dataLossRecoveryPrimaryDetail": [
      {
        "cardType": "Visa",
        "cardLevel": "Premium",
        "cardNumber": "****-****-****-5678",
        "cardExpiry": "12/27",
        "firstName": "John D.",
        "email": "Billy.****@example.com",
        "phone": "555-***-5678"
      }
    ],
    "dataLossRecoveryDetail": [
      {
        "cardType": "Visa",
        "cardLevel": "Premium",
        "cardNumber": "****-****-****-1234",
        "cardExpiry": "12/25",
        "firstName": "John D.",
        "email": "john.****@example.com",
        "phone": "555-***-1234"
      }
    ]
  },
  "success": true,
  "message": null,
  "errorCode": null
}

ThreatQuotient provides the following default mapping for the main and supplemental feed:

Feed Data Path ThreatQ Entity ThreatQ Object Type or Attribute Key Published Date Examples Notes
data.dataLossRecoveryDetail.email Compromised Account/Identity.Value Compromised Account or Identity data.dataLossRecoveryDetail.<addedDate/postedDate> Billy.****@example.com User-configurable. Object type and date used chosen in feed config
data.dataLossRecoveryDetail.userName Compromised Account/Identity.Value Compromised Account or Identity data.dataLossRecoveryDetail.<addedDate/postedDate> Username_Test User-configurable. If email is unavailable. Object type and date used chosen in feed config
data.description Compromised Account/Identity.Description N/A N/A This is only a sample DLR case. User-configurable. If chosen to use description as object description.
data.description Compromised Account/Identity.Attribute Description N/A This is only a sample DLR case. User-configurable. If chosen to use description as object attribute.
data.dataLossRecoveryDetail.websiteOrServer Compromised Account/Identity.Attribute Website or Server N/A _Test N/A
data.dataLossRecoveryDetail.corporateOrPublicAccount Compromised Account/Identity.Attribute Corporate or Public Account N/A Public N/A
data.dataLossRecoveryDetail.isExecutiveAccount Compromised Account/Identity.Attribute Is Executive Account N/A false N/A
data.dataLossRecoveryDetail.password Compromised Account/Identity.Attribute Password N/A Password_Test N/A
data.dataLossRecoveryDetail.phone Compromised Account/Identity.Attribute Phone N/A 555-***-5678 N/A
data.dataLossRecoveryDetail.address Compromised Account/Identity.Attribute Address N/A   N/A
data.dataLossRecoveryDetail.userAgent Compromised Account/Identity.Attribute User Agent N/A   N/A
data.dataLossRecoveryDetail.recoveredProperty Compromised Account/Identity.Attribute Recovered Property N/A Test N/A
data.dataLossRecoveryDetail.postedDate Compromised Account/Identity.Attribute Posted Date N/A 2025-08-06 14:28:43+00:00 Converted from epoch time
data.dataLossRecoveryDetail.ipAddress Compromised Account/Identity.Attribute IP Address N/A   Brought in as an attribute since this data is grouped with victim data, not actor data
data.caseId Compromised Account/Identity.Attribute Case ID N/A DLR#n9Ra7KbR3 N/A
data.brand Compromised Account/Identity.Attribute Brand N/A ThreatQ N/A
data.fileOrBreachName Compromised Account/Identity.Attribute File or Breach Name N/A Dark Web Forum N/A
data.severity Compromised Account/Identity.Attribute Severity N/A Substantial Threat N/A
data.threatActorName Compromised Account/Identity.Attribute Threat Actor Name N/A CyberCriminal Group N/A
data.threatActorType Compromised Account/Identity.Attribute Threat Actor Type N/A Hacktivist N/A
data.threatActorActivities Compromised Account/Identity.Attribute Threat Actor Activities N/A Defacement, Hacking N/A
data.threatActorDetail Compromised Account/Identity.Attribute Threat Actor Detail N/A A decentralized international hacktivist group... N/A
data.dataType Compromised Account/Identity.Attribute Data Type N/A Combo N/A
data.subType Compromised Account/Identity.Attribute Subtype N/A Sub Incident Type N/A
data.addedDate Compromised Account/Identity.Attribute Added Date N/A 2024-01-15T10:30:00Z Formatted-timestamp
data.affectedProperty Compromised Account/Identity.Attribute Affected Property N/A Customer credit card database N/A
data.detectedOn Compromised Account/Identity.Attribute Detected On N/A Telegram N/A

Average Feed Run

Object counts and Feed runtime are supplied as generalities only - objects returned by a provider can differ based on credential configurations and Feed runtime may vary based on system resources and load.

iZoologic Incident Case Sync

Metric Result
Run Time <1 minute
Events 3
Event Attributes 15
Notes 5
Note Attributes 10

iZoologic DLR Case Sync

Metric Result
Run Time <1 minute
Identity 1
Identity Attributes 14

Known Issues / Limitations

  • The iZoologic API currently does not support providing DLR case communications.
  • ThreatQ system egress IP Address may need to be whitelisted with iZoologic. Please contact iZoologic support for assistance.
  • The API can usually only accept requests with a maximum time range of 30 days. To cover more days, multiple historical runs will be needed.
  • The API can only go back 60 or 180 days for certain API endpoints.

Change Log

  • Version 1.0.0
    • Initial release

PDF Guides

Document ThreatQ Version
iZoologic Sync Cases CDF Guide v1.0.0 5.29.0 or Greater