Current ThreatQ Version Filter
 

Splunk Exports

The web format of this guide reflects the most current release.  Guides for older iterations are available in PDF format.  

Export Details

ThreatQuotient provides the following details for this export:

Introduction

ThreatQuotient makes it easy for customers to export indicators for use with an external threat detection system.

Creating the Export

The following section will detail how to create exports.

See the Managing Exports topic for more details on ThreatQ exports.  

  1. Select the Settings icon > Exports.

    The Exports page appears with a table listing all exports in alphabetical order.

  2. Click Add New Export

    The Connection Settings dialog box appears.

  3. Enter an Export Name.
  4. Click Next Step.

    The Output Format dialog box appears.

  5. Provide the following information:
    Field Value
    Which type of information would you like to export? Indicators
    Output Type text/plain
    Special Parameters

    indicator.sincedeleted=Y

  6. Enter the following for the Output Format Template:
    #indicator{$tab}indicator_type{$tab}last_modified{$tab}reference_url{$tab}source{$tab}campaign{$tab}status

    {foreach $data as $indicator}

    {$indicator.value}{$tab}{$indicator.type}{$indicator.updated_at}

    {$tab}https://{$http_host}/indicators/{$indicator.id}/details{$tab}{foreach $indicator.Sources item=source name=Sources}{$source.value}{if $smarty.foreach.Sources.last == false}, {/if}{/foreach}{$tab}{foreach $indicator.Adversaries item=adversary name=Adversaries}{$adversary.value}{if $smarty.foreach.Adversaries.last == false}, {/if}{/foreach}{$tab}{$indicator.status}

    {/foreach}
  7. Click on Save Settings and enable the export via the On/Off toggle switch.

Change Log

  • Version 1.0.0
    • Initial release

PDF Guides

Document ThreatQ Version
Spunk Exports Guide v1.0.0 N/A