Current ThreatQ Version Filter
 

Cybereason Operation

The web format of this guide reflects the most current release.  Guides for older iterations are available in PDF format.  

Integration Details

ThreatQuotient provides the following details for this integration:

Introduction

The Cybereason Operation for ThreatQ enables you to blocklist or allowlist an indicator. It also provides a way to query an indicator for any sightings.

The operation provides the following actions:

  • blocklist - blocklists a given indicator.
  • allowlist - allowlists a given indicator.
  • query - queries Cybereason for any sightings of an indicator.

The operation is compatible with the following indicators types:

  • FQDN
  • IP Address
  • MD5
  • SHA-1

Installation

This integration can be installed in the My Integration section of your ThreatQ instance. See the Adding an Integration topic for more details.

Configuration

ThreatQuotient does not issue API keys for third-party vendors. Contact the specific vendor to obtain API keys and other integration-related credentials.

To configure the integration:

  1. Navigate to your integrations management page in ThreatQ.
  2. Select the Operation option from the Type dropdown (optional).
  3. Click on the integration entry to open its details page.
  4. Enter the following parameters under the Configuration tab:
    Parameter Description
    Cybereason Host and Port Your Cybereason host and port (if required). 
    Username Your Cybereason Username.
    Password Your Cybereason Password.
  5. Review any additional settings, make any changes if needed, and click on Save.
  6. Click on the toggle switch, located above the Additional Information section, to enable it.

Actions

The Cybereason operation provides the following actions:

Action Description Object Type Object Subtype
blocklist Blocklists a given indicator. Indicator FQDN, IP Address, MD5, SHA-1
allowlist Allowlists a given indicator. Indicator FQDN, IP Address, MD5, SHA-1
query Queries Cybereason for any sightings of an indicator. Indicator IP Address, MD5, SHA-1

Blocklist

This action blocklists an Indicator in Cybereason. You can choose to prevent the execution (indicates whether to prevent the file’s execution with Application Control) You can also choose to add or remove the reputation.

POST {Host:Port}/rest/classification/update

Sample Response:

{
  "comment": "Added by ThreatQ",
  "prevent": false,
  "keys": [
      "emag.ro"
  ],
  "maliciousType": "blacklist",
  "remove": true
}

Allowlist

This action allowlists an Indicator in Cybereason. You can choose to add or remove the reputation.

POST {Host:Port}/rest/classification/update

Sample Response:

{
  "keys": [
      "emag.ro"
  ],
  "comment": "Added by ThreatQ",
  "prevent": false,
  "remove": true,
  "maliciousType": "whitelist"
}

Query

Enrich the submitted Indicator

POST {Host:Port}/rest/visualsearch/query/simple

Sample Response:

{
    "failures": 0,
    "message": "",
    "data": {
        "evidenceMap": {
            "blackListClassificationEvidence": 10,
            "reportedByAntiMalwareEvidence": 10
        },
        "queryLimits": {
            "perGroupLimit": 100,
            "perFeatureLimit": 100,
            "totalResultLimit": 1000,
            "groupingFeature": {
                "elementInstanceType": "File",
                "featureName": "fileHash"
            },
            "sortInGroupFeature": null
        },
        "resultIdToElementDataMap": {
            "-371603117.-4881354770789208719": {
                "suspicions": {
                    "reportedByAntiMalwareSuspicion": 1615982754135,
                    "blackListedFileSuspicion": 1625041043432
                },
                "malopPriority": null,
                "guidString": "-371603117.-4881354770789208719",
                "suspicionCount": 2,
                "isMalicious": false,
                "elementValues": {
                    "localAddress": {},
                    "domainName": {
                      "totalSuspicious": 1,
                        "totalMalicious": 0,
                        "totalValues": 1,
                        "elementValues": [
                            {
                                "hasMalops": false,
                                "elementType": {},
                                "name": "cenas.org",
                                "guid": {},
                                "hasSuspicions": true
                            }
                        ],
                      "guessedTotal": 0
                    },
                    "self": {
                        "totalSuspicious": 1,
                        "totalMalicious": 0,
                        "totalValues": 1,
                        "elementValues": [
                            {
                                "hasMalops": false,
                                "elementType": "File",
                                "name": "undetectable_mimikatz_agent.py",
                                "guid": "-371603117.-4881354770789208719",
                                "hasSuspicions": true
                            }
                        ],
                        "guessedTotal": 0
                    },
                    "ownerMachine": {
                        "totalSuspicious": 0,
                        "totalMalicious": 0,
                        "totalValues": 1,
                        "elementValues": [
                            {
                                "hasMalops": false,
                                "elementType": "Machine",
                                "name": "ec2amaz-2utfkt5",
                                "guid": "-371603117.1198775089551518743",
                                "hasSuspicions": false
                            }
                        ],
                        "guessedTotal": 0
                    }
                },
                "suspect": true,
                "labelsIds": null,
                "filterData": {
                    "sortInGroupValue": "-371603117.-4881354770789208719",
                    "groupByValue": "FileHashRuntime:0.4498703058583044935 "
                },
                "simpleValues": {
                    "md5String": {
                        "values": [
                            "e0180a291f1b6f05ebd16a96f05c00a5"
                        ],
                        "totalValues": 1
                    },
                    "correctedPath": {
                        "values": [
                            "c:\\undetectable_mimikatz_agent.py"
                        ],
                        "totalValues": 1
                    },
                    "isSuspicious": {
                        "values": [
                            "true"
                        ],
                        "totalValues": 1
                    },
                    "classificationDetectionName": {
                        "values": [
                            "Heur.BZC.PZQ.Boxter.81.4A61989F"
                        ],
                        "totalValues": 1
                    },
                    "relatedToMalop": {
                        "values": [
                            "true"
                        ],
                        "totalValues": 1
                    },
                    "blackListClassificationEvidence": {
                        "values": [
                            "av_detected"
                        ],
                        "totalValues": 1
                    },
                    "maliciousClassificationType": {
                        "values": [
                            "av_detected"
                        ],
                        "totalValues": 1
                    },
                    "lastDetectEventDetectionStatus": {
                        "values": [
                            "DDS_USER_DETECT_ONLY"
                        ],
                        "totalValues": 1
                    },
                    "elementDisplayName": {
                        "values": [
                            "undetectable_mimikatz_agent.py"
                        ],
                        "totalValues": 1
                    },
                    "ownerMachine.isActiveProbeConnected": {
                        "values": [
                            "false"
                        ],
                        "totalValues": 1
                    },
                    "productType": {
                        "values": [
                            "NONE"
                        ],
                        "totalValues": 1
                    },
                    "sha1String": {
                        "values": [
                            "bd3961fe67753b29d4af68fa64c7fc5244352479"
                        ],
                        "totalValues": 1
                    },
                    "serverAddress": {
                        "values": [
                            "192.158.1.38"
                        ],
                        "totalValues": 1
                    },
                    "dualExtensionEvidence": {
                        "values": [
                            "WooowFile"
                        ],
                        "totalValues": 1
                    },
                    "originalFileName": {
                        "values": [
                            "TerraNostra"
                        ],
                        "totalValues": 1
                    },
                    "extensionType": {
                        "values": [
                            "EXECUTABLE_SCRIPT"
                        ],
                        "totalValues": 1
                    },
                    "canonizedPath": {
                        "values": [
                            "c:\\home\\dir"
                        ],
                        "totalValues": 1
                    },
                    "direction": {
                        "values": [
                            "Nort"
                        ],
                        "totalValues": 1
                    },
                    "remoteAddressCountryName": {
                        "values": [
                            "India"
                        ],
                        "totalValues": 1
                    },
                    "reportedByAntiMalwareEvidence": {
                        "values": [
                            "av_detected"
                        ],
                        "totalValues": 1
                    },
                    "remoteAddress.maliciousClassificationType": {},
                    "signedInternalOrExternal": {},
                    "size": {},
                    "productName": {},
                    "signatureVerifiedInternalOrExternal": {},
                    "aggregatedReceivedBytesCount": {
                        "values": [
                            "128"
                        ],
                        "totalValues": 1
                    },
                    "aggregatedTransmittedBytesCount": {
                        "values": [
                            "3"
                        ],
                        "totalValues": 1
                    },
                    "ownerMachine.osVersionType": {
                        "values": [
                            "Windows_Server_2019"
                        ],
                        "totalValues": 1
                    }
                },
                "malicious": false
            }
        },
        "totalPossibleResults": 10,
        "pathResultCounts": [
            {
                "count": 10,
                "featureDescriptor": {
                    "elementInstanceType": "File",
                    "featureName": null
                }
            }
        ],
        "guessedPossibleResults": 0,
        "suspicionsMap": {
            "reportedByAntiMalwareSuspicion": {
                "totalSuspicions": 10,
                "firstTimestamp": 1612570103071,
                "potentialEvidence": [
                    "reportedByAntiMalwareEvidence"
                ]
            },
            "blackListedFileSuspicion": {
                "totalSuspicions": 10,
                "firstTimestamp": 1625041043432,
                "potentialEvidence": [
                    "blackListClassificationEvidence"
                ]
            }
        },
        "queryTerminated": false,
        "guids": []
    },
    "status": "SUCCESS",
    "hidePartialSuccess": false,
    "expectedResults": 1
}

ThreatQuotient provides the following default mapping for this feed:

Feed Data Path ThreatQ Entity ThreatQ Object Type or Attribute Key Examples
.data.simpleValues.correctedPath.values[] Indicator.Value File Path c:\undetectable_mimik
atz_agent.py
.data.simpleValues.sha1String.values[] Indicator.Value SHA-1 bd3961fe67753b29d4a
f68fa64c7fc5244352479
.data.simpleValues.serverAddress.values[] Indicator.Value IP Address 192.158. 1.38
.data.simpleValues.dualExtensionEvidence.values[] Indicator.Value Filename WooowFile
.data.simpleValues.originalFileName.values[] Indicator.Value Filename TerraNostra
.data.simpleValues.canonizedPath.values[] Indicator.Value File Path c:\home\dir.py
.data.simpleValues.maliciousClassificationType.values[] Indicator.Attribute Malicious Classification av_detected
.data.simpleValues.elementDisplayName.values[] Indicator.Attribute Display Name undetectable_mimikatz_agent.py
.data.simpleValues.ownerMachine.osVersionType.values[] Indicator.Attribute Host Operating System Windows_Server_2019
.data.simpleValues.relatedToMalop.values[] Indicator.Attribute Is Related to MalOp true
.data.simpleValues.isSuspicious.values[] Indicator.Attribute Is Suspicious true
.data.simpleValues.lastDetectEventDetectionStatus.values[] Indicator.Attribute Detected Event DDS_USER_DETECT_ONLY
.data.simpleValues.ownerMachine.isActiveProbeConnected.values[] Indicator.Attribute Is Active Probe Conntected false
.data.simpleValues.extensionType.values[] Indicator.Attribute Extension Type EXECUTABLE_SCRIPT
.data.simpleValues.direction.values[] Indicator.Attribute Connection Direction Nort
.data.simpleValues.remoteAddressCountryName.values[] Indicator.Attribute Remote Country India
.data.simpleValues.aggregatedReceivedBytesCount.values[] Indicator.Attribute Received Bytes 128
.data.simpleValues.aggregatedTransmittedBytesCount.values[] Indicator.Attribute Transmitted Bytes 3
.data.simpleValues.remoteAddress.maliciousClassificationType.values[] Indicator.Attribute Malicious Classification N/A
.data.simpleValues.signedInternalOrExternal.values[] Indicator.Attribute Signed Internal/External N/A
.data.simpleValues.size.values[] Indicator.Attribute File Size N/A
.data.simpleValues.productName.values[] Indicator.Attribute Product Name N/A
.data.simpleValues.signatureVerifiedInternalOrExternal.values[] Indicator.Attribute Signature Verified N/A
.data.elementValues.domainName.elementValues[].name Indicator.Value FQDN cenas.org
.data.elementValues.ownerMachine.elementValues[].name Indicator.Attribute Host Machine ec2amaz-2utfkt5
.data.elementValues.ownerMachine.totalSuspicious Indicator.Attribute Total Suspicious 0
.data.elementValues.ownerMachine.totalMalicious Indicator.Attribute Total Malicious 0
.data.elementValues.ownerMachine.guessedTotal Indicator.Attribute Total Guessed 0
.data.elementValues.localAddress.elementValues[].name Indicator.Attribute Local Address N/A

Change Log

  • Version 1.0.0
    • Initial release

PDF Guides

Document ThreatQ Version
Cybereason Operation Guide v1.0.0 4.35.0 or Greater