ThreatFox Feed
ThreatFox Feed Pack.#
This Integration is part of theSupported versions
Supported Cortex XSOAR versions: 6.10.0 and later.
ThreatFox is a platform from abuse.ch and Spamhaus dedicated to sharing indicators of compromise (IOCs) associated with malware, with the infosec community, AV vendors and cyber threat intelligence providers. For more information visit: https://threatfox.abuse.ch/
#
Create an Auth Key for abuse.chNote: If you already have a profile, you can skip steps 1 and 2.
Sign up for an abuse.ch account. You can do this easily by using an existing account that you may already have on X, LinkedIn, Google or Github. Just log in with the authentication provider of your choice here: https://auth.abuse.ch/
Once you are authenticated on abuse.ch, ensure that you connect at least one additional authentication provider. This will ensure that you have access to abuse.ch platforms, even if one of the authentication providers you use shuts down (yes, it happened with Twitter!)
Ensure that you hit the "Save profile" button. In the "Optional" section, you can now generate an "Auth-Key". This is your personal Auth-Key that you can now use in the integration.
#
Configure ThreatFox Feed in CortexParameter | Description | Required |
---|---|---|
Server URL | True | |
Auth Key | Auth Key for authentication with abuse.ch | True |
Use system proxy settings | False | |
Trust any certificate (not secure) | False | |
Fetch indicators | False | |
Source Reliability | Reliability of the source providing the intelligence data. | True |
Indicator Reputation | Indicators from this integration instance will be marked with this reputation. | False |
Traffic Light Protocol Color | The Traffic Light Protocol (TLP) designation to apply to indicators fetched from the feed. | False |
Indicator Expiration Method | The method to be used to expire indicators from this feed. Default: indicatorType | False |
Bypass exclusion list | When selected, the exclusion list is ignored for indicators from this feed. This means that if an indicator from this feed is on the exclusion list, the indicator might still be added to the system. | False |
Feed Fetch Interval (in days) | False | |
Return IOCs with Ports | If selected, IP indicators will include a tag with the port value | False |
Confidence Threshold | False | |
Create relationship | If selected, indicators will be created with relationships | False |
#
CommandsYou can execute these commands from the CLI, as part of an automation, or in a playbook. After you successfully execute a command, a DBot message appears in the War Room with the command details.
#
threatfox-get-indicatorsRetrieves indicators from the ThreatFox API.
#
Base Commandthreatfox-get-indicators
#
InputArgument Name | Description | Required |
---|---|---|
search_term | Indicator value to search for | Optional |
id | Indicator ID to search for. | Optional |
hash | Hash to search for. | Optional |
tag | Tag to search by. For available tag options, please refer to the API documentation- https://threatfox.abuse.ch/api/. | Optional |
malware | Malware to search by. For available malware options, please refer to the API documentation- https://threatfox.abuse.ch/api/. | Optional |
limit | Maximum indicators to search for. Available only when searching by 'malware' or 'tag'. Default is 50. Max is 1000. | Optional |
#
Context OutputThere is no context output for this command.