Current ThreatQ Version Filter
 

Cisco AMP for Endpoints Operation

The web format of this guide reflects the most current release.  Guides for older iterations are available in PDF format.  

Integration Details

ThreatQuotient provides the following details for this integration:

Introduction

The Cisco AMP for Endpoints operation enriches ThreatQ objects with context obtained from the Cisco AMP for Endpoints API.

The operation is compatible with SHA-256 indicator types and provides the following actions:

  • Get Application Blocking List - retrieves the list of application blocking file lists.
  • Blacklist Application - blacklists an application hash.
  • Query Events - queries for hits.

Installation

This integration can be installed in the My Integration section of your ThreatQ instance. See the Adding an Integration topic for more details.

Configuration

ThreatQuotient does not issue API keys for third-party vendors. Contact the specific vendor to obtain API keys and other integration-related credentials.

To configure the integration:

  1. Navigate to your integrations management page in ThreatQ.
  2. Select the Operation option from the Type dropdown (optional).
  3. Click on the integration entry to open its details page.
  4. Enter the following parameters under the Configuration tab:
    Parameter Description
    Select the Type of Deployment to use Select the deployment type.  Options include Online and On-Prem.  
    Cisco Online Settings If using the Online deployment method, select the Cisco AMP for Endpoints Instance Region. Options include:
    • US (default)
    • EU
    • APJC
    Cisco On-Prem Settings If using the On-Prem deployment method, enter the Cisco AMP for Endpoints Instance On-prem Hostname.
    Client ID The Cisco AMP for Endpoints Client ID.   
    API Token The Cisco AMP for Endpoints API Token.
    Application Control List List of application block lists to add the submitted hash to.
    Application Block List Enter application block lists to add the submitted hash to.  

    Configuration Screen
  5. Review any additional settings, make any changes if needed, and click on Save.
  6. Click on the toggle switch, located above the Additional Information section, to enable it.

Actions

The operation provides the following actions:

Action Description Object Type Object Subtype
Get Application Blocking List Get list of application blocking file lists Indicators  SHA-256
Blacklist Application Blacklist application hash Indicators  SHA-256
Query Events Query events for hits Indicators  SHA-256

Get Application Blocking List

The Get Application Blocking List action is used to get the list of application blocking file lists.

GET https://<region>/v1/file_lists/application_blocking

Sample Response:

{
    "version": "v1.2.0",
    "metadata": {
        "links": {
            "self": "https://api.amp.cisco.com/v1/file_lists/application_blocking"
        },
        "results": {
            "total": 3,
            "current_item_count": 3,
            "index": 0,
            "items_per_page": 500
        }
    },
    "data": [
        {
            "name": "Execution Blacklist",
            "guid": "747633c2-6a94-46dd-8d4a-97986d682252",
            "type": "application_blocking",
            "links": {
                "file_list": "https://api.amp.cisco.com/v1/file_lists/747633c2-6a94-46dd-8d4a-97986d682252"
            }
        },
        {
            "name": "Malware Blacklist",
            "guid": "f1866f7f-8a9d-4608-9ccc-537d72693c0e",
            "type": "application_blocking",
            "links": {
                "file_list": "https://api.amp.cisco.com/v1/file_lists/f1866f7f-8a9d-4608-9ccc-537d72693c0e"
            }
        },
        {
            "name": "ThreatQ Blacklist",
            "guid": "bd1a015b-f775-41ed-9883-ec64cca97bb3",
            "type": "application_blocking",
            "links": {
                "file_list": "https://api.amp.cisco.com/v1/file_lists/bd1a015b-f775-41ed-9883-ec64cca97bb3"
            }
        }
    ]
}

The available blocking lists available are extracted from .data[].name.

Blacklist Application

The Blacklist Application is used to blacklist an application hash.

GET https://<region>/v1/file_lists/<block_list_guid>/files/<sha256>>

The following configuration parameters are available for this action:

option Description
Description A description of the hash.
Override Application
Block Lists
Overrides the lists in the operation configuration.

Sample Response:

{
    "version": "v1.2.0",
    "metadata": {
        "links": {
            "self": "https://api.amp.cisco.com/v1/file_lists/bd1a015b-f775-41ed-9883-ec64cca97bb3/files/5a0d64cc41bb8455f38b4b31c6e69af9e7fd022b0ea9ea0c32c371def24d67f1"
        }
    },
    "data": {
        "sha256": "5a0d64cc41bb8455f38b4b31c6e69af9e7fd022b0ea9ea0c32c371def24d67f1",
        "source": "Created by entering SHA-256 via Public api.",
        "links": {
            "file_list": "https://api.amp.cisco.com/v1/file_lists/bd1a015b-f775-41ed-9883-ec64cca97bb3"
        }
    }
}

Query Events

The Query Events action is used to query events for hits.

GET https://<region>/v1/events

The following configuration parameters are available for this action:

option Description
Query for Query for Detected SHA-256 or Application SHA-256.
Number of days back to get events from Number of days back to get events from.
Maximum number of results The maximum number of events that are queried.

Sample Response:

{
    "version": "v1.2.0",
    "metadata": {
        "links": {
            "self": "https://api.amp.cisco.com/v1/events?detection_sha256=5a0d64cc41bb8455f38b4b31c6e69af9e7fd022b0ea9ea0c32c371def24d67fb"
        },
        "results": {
            "total": 1,
            "current_item_count": 1,
            "index": 0,
            "items_per_page": 500
        }
    },
    "data": [
        {
            "id": 5826659264906657801,
            "timestamp": 1621512020,
            "timestamp_nanoseconds": 460000000,
            "date": "2021-05-20T12:00:20+00:00",
            "event_type": "Threat Detected",
            "event_type_id": 1090519054,
            "detection": "W32.Variant:Stabuniq.15nx.1201",
            "detection_id": "5826659264906657801",
            "connector_guid": "a0e69f4b-2598-4102-a50d-de9ba994fde3",
            "group_guids": [
                "af1e7d79-880b-4aaf-84d4-06149fef0cd2"
            ],
            "severity": "Medium",
            "computer": {
                "connector_guid": "a0e69f4b-2598-4102-a50d-de9ba994fde3",
                "hostname": "Demo_Stabuniq",
                "external_ip": "173.142.132.97",
                "active": true,
                "network_addresses": [
                    {
                        "ip": "30.235.67.2",
                        "mac": "1c:96:e3:a2:aa:29"
                    }
                ],
                "links": {
                    "computer": "https://api.amp.cisco.com/v1/computers/a0e69f4b-2598-4102-a50d-de9ba994fde3",
                    "trajectory": "https://api.amp.cisco.com/v1/computers/a0e69f4b-2598-4102-a50d-de9ba994fde3/trajectory",
                    "group": "https://api.amp.cisco.com/v1/groups/1f3e7f67-9cc1-457e-8870-69d86db80886"
                }
            },
            "file": {
                "disposition": "Blocklisted",
                "file_name": "jqs.exe",
                "file_path": "\\\\?\\C:\\Program Files\\7-Zip\\Update\\jqs.exe",
                "identity": {
                    "sha256": "5a0d64cc41bb8455f38b4b31c6e69af9e7fd022b0ea9ea0c32c371def24d67fb",
                    "sha1": "17db1bbaa1bf1b920e47b28c3050cbff83ab16de",
                    "md5": "f31b797831b36a4877aa0fd173a7a4a2"
                }
            }
        }
    ]
}

ThreatQuotient provides the following default mapping for this feed:

Feed Data Path ThreatQ Entity ThreatQ Object Type or Attribute Key Published Date Examples Notes
.data[].title Event.Title .data[].event_type .data[].timestamp <formatted> Formatted based on the .event_type
.data[].date Event.Happened_at n/a n/a 2020-05-13T13:09:
02+00:00
 
.data[].detection Related Malware.Value n/a .data[].timestamp W32.GenericKD:
Malwaregen.21do.1201
 
.data[].computer.
network_addresses[].ip
Related Indicator.Value IP Address .data[].timestamp 45.139.251.184  
.data[].computer.
network_addresses[].mac
Related Indicator.Value MAC .data[].timestamp 71:73:52:f3:13:8a  
.data[].computer.
external_ip
Event.Attribute & Related Indicator.Attribute Computer External IP .data[].timestamp 151.140.44.204  
.data[].computer.active Event.Attribute & Related Indicator.Attribute Computer Is Active .data[].timestamp True  
.data[].computer.
hostname
Event.Attribute & Related Indicator.Attribute Computer Hostname .data[].timestamp Demo_AMP_Intel  
.data[].computer.
links.computer
Event.Attribute & Related Indicator.Attribute Computer Group Link .data[].timestamp https://api.amp.cisco.
com/v1/computers/7
63e3460-8cf2-49a8-b
e0c-6fa156f4e2fc
 
.data[].computer.
links.group
Event.Attribute & Related Indicator.Attribute Computer Link .data[].timestamp https://api.amp.cisco.
com/v1/groups/2c4e
257f-d91a-4559-bba5
-5a75ca03f8c0
 
.data[].computer.user Event.Attribute & Related Indicator.Attribute Computer User .data[].timestamp johndoe  
.data[].file.file_name Related Indicator.Value Filename .data[].timestamp opticare.exe Ingested if .data[].file.
disposition != 'Clean'
.data[].file.file_path Related Indicator.Value File Path .data[].timestamp \\?\C:\Users\Administr
ator\AppData\Local\Te
mp\opticare.exe
Ingested if .data[].file.
disposition != 'Clean'
.data[].file.identity.md5 Related Indicator.Value MD5 .data[].timestamp b2e15a06b0cca8a926
c94f8a8eae3d88
Ingested if .data[].file.
disposition != 'Clean'
.data[].file.identity.sha1 Related Indicator.Value SHA-1 .data[].timestamp f9b02ad8d25157eebd
b284631ff646316dc60
6d5
Ingested if .data[].file.
disposition != 'Clean'
.data[].file.identity.
sha256
Related Indicator.Value SHA-256 .data[].timestamp fa1789236d05d88dd10
365660defd6ddc8a09fc
ddb3691812379438874
390ddc
Ingested if .data[].file.
disposition != 'Clean'
.data[].network_
info.dirty_url
Related Indicator.Value URL .data[].timestamp http://dak1otavola1ndo
s.com/h/index.php
 
.data[].network_info.
parent.identity.sha256
Related Indicator.Value SHA-256 .data[].timestamp 72c027273297ccf2f33f5
b4c5f5bce3eecc69e5f
78b6bbc1dec9e58780
a6fd02
Ingested if .data[].network_info.
parent.disposition != 'Clean'
.data[].file.parent.
file_name
Related Indicator.Value Filename .data[].timestamp Fax.exe Ingested if .data[].file.parent.
disposition != 'Clean'
.data[].file.parent.
file_path
Related Indicator.Value File Path .data[].timestamp n/a Ingested if .data[].file.parent.
disposition != 'Clean'
.data[].file.parent.
identity.md5
Related Indicator.Value MD5 .data[].timestamp b2e15a06b0cca8a92
6c94f8a8eae3d88
Ingested if .data[].file.parent.
disposition != 'Clean'
.data[].file.parent.
identity.sha1
Related Indicator.Value SHA-1 .data[].timestamp f9b02ad8d25157eeb
db284631ff646316d
c606d5
Ingested if .data[].file.parent.
disposition != 'Clean'
.data[].file.parent.
identity.sha256
Related Indicator.Value SHA-256 .data[].timestamp fa1789236d05d88dd
10365660defd6ddc8
a09fcddb369181237
9438874390ddc
Ingested if .data[].file.parent.
disposition != 'Clean'
.data[].file.parent.
disposition
Related Indicator.Attribute Disposition .data[].timestamp Malicious  
.data[].file.disposition Event.Attribute & Related Indicator.Attribute Disposition .data[].timestamp Clean  
.data[].severity Event.Attribute Severity .data[].timestamp Medium  
.data[].cloud_ioc.
description
Event.Attribute Description .data[].timestamp Microsoft Word launched PowerShell. This is indicative of multiple...  
.data[].cloud_ioc.
short_description
Event.Attribute Short Description .data[].timestamp W32.WinWord.Powershell  
.data[].error.description Event.Attribute Error .data[].timestamp Object name not found  
.data[].vulnerabilities
[].cve
Related Indicator.Value CVE .data[].timestamp CVE-2013-3346  
.data[].vulnerabilities
[].score
Related Indicator.Attribute Score .data[].timestamp 10  
.data[].vulnerabilities
[].url
Related Indicator.Attribute Reference .data[].timestamp https://web.nvd.nist.
gov/view/vuln/detail
?vulnId=CVE-2013-3346
 
.data[].vulnerabilities
[].name
Related Indicator.Attribute Name .data[].timestamp Adobe Acrobat Reader  

Change Log

  • Version 1.0.1
    • Added support for On-Prem deployments.  
  • Version 1.0.0
    • Initial release

PDF Guides

Document ThreatQ Version
Cisco AMP for Endpoints Operation Guide v1.0.1 4.34.0 or Greater
Cisco AMP for Endpoints Operation Guide v1.0.0 4.34.0 or Greater