Trellix AX Operation
The web format of this guide reflects the most current release. Guides for older iterations are available in PDF format.
Integration Details
ThreatQuotient provides the following details for this integration:
Current Integration Version | 1.1.0 |
Compatible with ThreatQ Versions | >= 4.10.0 |
Support Tier | ThreatQ Supported |
Introduction
The Trellix AX Operation provides you with the ability to submit a File, URL, or FQDN for sandboxing, add or remove YARA rules, and query alerts.
You can also query your Trellix AX appliance using indicators from ThreatQ to find any alerts related to those indicators. The operation also allows you to seamlessly add and remove YARA rules from your Trellix AX appliance.
The operation provides the following actions:
- Submit - submits a file or URL/FQDN to Trellix AX.
- Get Reports - retrieves all reports for the sample from Trellix AX.
- Add YARA Rule - adds a YARA rule to ThreatQ from Trellix AX.
- Remove YARA Rule - removes YARA rules from ThreatQ.
- Query Alerts - queries alerts in Trellix AX.
The operation can be run on the following object types:
- Files
- Indicators (Email Address, FQDN, IP Address, MD5, URL)
- Signatures (YARA Rule)
The Trellix AX operation replaces the FireEye AX operation as of version 1.1.0.
Installation
This integration can be installed in the My Integration section of your ThreatQ instance. See the Adding an Integration topic for more details.
Configuration
ThreatQuotient does not issue API keys for third-party vendors. Contact the specific vendor to obtain API keys and other integration-related credentials.
To configure the integration:
- Navigate to your integrations management page in ThreatQ.
- Select the Operation option from the Type dropdown (optional).
- Click on the integration entry to open its details page.
- Enter the following parameters under the Configuration tab:
Parameter Description Trellix AX Host Your Host or IP of your Trellix AX instance. Trellix Username Your Trellix AX username for the API. Trellix Password Your Trellix AX password for the API. Trellix Profiles The sandboxing profiles to use to sandbox the samples.
Example:win-7sp1m
- see the Trellix AX UI for more options.
You can specify multiple profiles using a comma-separated format.This parameter can be overridden using action-specific parameters.
- Review any additional settings, make any changes if needed, and click on Save.
- Click on the toggle switch, located above the Additional Information section, to enable it.
Actions
The Trellix AX operation provides the following actions:
Action | Description | Object Type | Object Subtype |
---|---|---|---|
Submit | Submits a file or URL/FQDN to Trellix AX. | File, Indicator | Indicator - URL, FQDN |
Get Reports | Retrieves all reports for the sample from Trellix AX. | File, Indicator | Indicator - URL, FQDN |
Add YARA Rule | Adds a YARA rule to ThreatQ from Trellix AX. | Signature | YARA |
Remove YARA Rule | Removes YARA rules from ThreatQ. | Signature | YARA |
Query Alerts | Queries alerts in Trellix AX. | Indicator, File | Indicator - FQDN, Filename, Email, IP Address |
Submit
The Submit action will submit a file (attachment) or a URL/FQDN to Trellix AX for sandboxing.
POST https:{host_url}/wsapis/v2.0.0/submissions/url
Sample Response:
{ "rawType": "com.fireeye.v200.rest.model.SubmitUrlResponse", "type": "com.fireeye.v200.rest.model.RestModelBase", "entity": { "response": [ { "id": "L31", "link": { "rel": "status", "href": "/submissions/status/L31" }, "submission_details": "[{\"vnc_port\":[],\"job_ids\":[],\"id\":501,\"uuid\":\"5b8d6f3a-3093-47df-9a41-c57e6c5319d3\"}]" } ] } }
Configuration Options
The action provides the following configuration options:
Parameter | Description |
---|---|
Run Using Custom Application | Allows you to run the sample with a specific application within the sandbox profile. This value is a number that corresponds to the custom application. The default setting is 0 - this tells Trellix to determine the application to use. |
Timeout | Determines how long the sandbox will take to "timeout" after inactivity. The default setting is 500. |
Priority | Sets a priority for the task. Options include:
|
Profiles List (overrides config) | This parameter is a list of profiles to use to sandbox the sample. The action will use the profiles set in the UI configuration if this is left blank. Otherwise, this will override the profiles listed in the UI configuration |
Force | This parameter will force resubmit a sample. If this is set to False, it will mark the sample as a duplicate and will not resubmit it. |
Analysis Type | Set the Analysis Type. The default setting is Sandbox. |
Prefetch | Determine the file target based on an internal determination rather than browsing to the target location.
The Analysis Type must be set to 1 if you are using the Sandbox. |
Get Reports
The Get Reports action will get all the reports for the sample, with the only condition being that the sample (in ThreatQ) has an attribute with the name "Trellix AX Submission ID" and the value will be the submission ID.
For each of these attributes, it will fetch a report correlating to the submission ID. If submission results are found, results will be shown and the full JSON report will be uploaded and related to the sample in ThreatQ.
GET https:{host_url}/wsapis/v2.0.0/submissions/results/{submisionID}
Sample Response:
{ "alert": [ { "explanation": { "malwareDetected": { "malware": [ { "md5Sum": "be5d431e32bea4c4bbfc331e233f5a7b", "sha256": "437d73cffc51cd3571b306430484bb781af93c45011c96cfc45eb2d6caa48a68" } ] }, "osChanges": [] }, "src": {}, "alertUrl": "https://10.20.0.133/malware_analysis/analyses?maid=500", "action": "notified", "attackTime": "2023-02-13 12:56:01 +0000", "dst": {}, "applianceId": "AC1F6B720474", "id": 500, "name": "MALWARE_OBJECT", "severity": "MINR", "uuid": "4456d46b-d0e9-4b66-9ecc-0dfde7a67f07", "ack": "no", "product": "MAS", "vlan": 0, "malicious": "no" } ], "appliance": "MAS", "version": "MAS (MAS) 9.1.1.956704", "msg": "concise", "alertsCount": 1 }
Add YARA Rule
The Add YARA Rule action allows you to add YARA rules from ThreatQ to Trellix AX.
POST https:{host_url}/wsapis/v2.0.0/customioc/yara/add/{file_type}
Sample Response:
sample
Configuration Options
The action provides the following parameters:
Parameter | Description |
---|---|
Content Type | Specify which content type the new YARA rule should be applied to. Options include:
|
File Type | The file type of the YARA rules file being submitted, such as exe, pdf, or ppt. The default setting is Common. |
Remove YARA Rule
The Remove YARA Rule action allows you to remove YARA rules from ThreatQ.
POST https:{host_url}/wsapis/v2.0.0/customioc/yara/remove/{file_type}/{yara_rule}
Sample Response:
sample
Configuration Options
The action provides the following parameters:
Parameter | Description |
---|---|
Content Type | Specify which content type the new YARA rule should be applied to. Options include:
|
File Type | The file type of the YARA rules file being submitted, such as exe, pdf, or ppt. The default setting is Common. |
Query Alerts
The Query Alerts action allows you to query alerts in Trellix AX.
This action only applies to FQDNs, Filenames, Emails, and IP Addresses.
GET https:{host_url}/wsapis/v2.0.0/alerts
Sample Response:
{ "alert": [], "appliance": "MAS", "version": "MAS (MAS) 9.1.1.956704", "msg": "extended", "alertsCount": 0 }
Configuration Options
The action provides the following parameters:
Parameter | Description |
---|---|
Start Time | Set the start time to search for alerts. This is used in conjunction with the Duration parameter. You cannot use this at the same time as using the End Time parameter
|
End Time | Set the end time to search for alerts. This is used in conjunction with the Duration parameter. You cannot use this at the same time as using the Start Time parameter.
If no end time or start time is provided, the end time will be set to the current date/time |
Duration | Set the amount of time you want to either look after a start time or before an end time. The default setting is 12 hours. |
Info Level | Set the detail level of the alerts. Options include:
Normal and Extended options will provide a very large alert and may take longer to download. |
Change Log
- Version 1.1.0
- Rebranded the operation from FireEye to Trellix to match vendor branding.
- Version 1.0.2
- Fixed an issue where users were unable to add attributes for certain tables.
- Version 1.0.1
- Fixed an issue with mapping popup windows.
- Added failsafe to mapper to improve stability.
- Version 1.0.0
- Initial Release
PDF Guides
Document | ThreatQ Version |
---|---|
Trellix AX Operation Guide v1.1.0 | 4.10 or Greater |
FireEye AX Operation Guide v1.0.2 | 4.10 or Greater |
FireEye AX Operation Guide v1.0.0 | 3.6.0 or Greater |