Fortinet white logo
Fortinet white logo

Mandiant Threat Intelligence

1.2.0

Mandiant Threat Intelligence v1.2.0

About the connector

Mandiant Threat Intelligence provides automated access to indicators of compromise (IOCs) — IP addresses, domain names, URLs threat actors are using, via the indicators, allows access to full length finished intelligence in the reports, allows for notification of threats to brand and keyword monitoring via the alerts, and finally allows searching for intelligence on the adversary with the search.

This connector has a dependency on the Threat Intel Management Solution Pack. Install the Solution Pack before enabling ingestion of Threat Feeds from this source.

This document provides information about the Mandiant Threat Intelligence Connector, which facilitates automated interactions, with a Mandiant Threat Intelligence server using FortiSOAR™ playbooks. Add the Mandiant Threat Intelligence Connector as a step in FortiSOAR™ playbooks and perform automated operations with Mandiant Threat Intelligence.

Version information

Connector Version: 1.2.0

FortiSOAR™ Version Tested on: 7.6.1-5275

Authored By: Fortinet

Certified: Yes

Release Notes for version 1.2.0

Following enhancements have been made to the Mandiant Threat Intelligence Connector in version 1.2.0:

  • Added following new actions:
    • Get Indicator Reputation
    • Execute an API Request

Installing the connector

Use the Content Hub to install the connector. For the detailed procedure to install a connector, click here.

You can also use the yum command as a root user to install the connector:

yum install cyops-connector-mandiant-threat-intel

Prerequisites to configuring the connector

  • You must have the service-based URI of the Mandiant Threat Intelligence server to connect and perform automated operations and the public and private keys used to access the Mandiant Threat Intelligence API.
  • The FortiSOAR™ server should have outbound connectivity to port 443 on the Mandiant Threat Intelligence server.

Minimum Permissions Required

  • Not applicable

Configuring the connector

For the procedure to configure a connector, click here

Configuration parameters

In FortiSOAR™, on the Connectors page, click the Mandiant Threat Intelligence connector row (if you are in the Grid view on the Connectors page) and in the Configurations tab enter the required configuration details:

Parameter Description
Server URL The service-based URI to connect and perform the automated operations.
Public Key The unique Mandiant Threat Intelligence Public Key used to create an authentication token required to access the Mandiant Threat Intelligence API.
Private Key The unique Mandiant Threat Intelligence Private Key used to create an authentication token required to access the Mandiant Threat Intelligence API.
Verify SSL Specifies whether the SSL certificate for the server is to be verified.
By default, this option is set to True.

Actions supported by the connector

The following automated operations can be included in playbooks and you can also use the annotations to access operations from FortiSOAR™ release 4.10.0 and onwards:

Function Description Annotation and Category
Get Indicators Retrieves all indicators or specific indicators from Mandiant Threat Intelligence based on the input parameters you have specified. get_indicators
Investigation
Get Reports Retrieves all reports or specific reports for threat actors from Mandiant Threat Intelligence based on the input parameters you have specified. get_reports
Investigation
Get Alerts Retrieves all alerts or specific alerts from Mandiant Threat Intelligence based on the input parameters you have specified. get_alerts
Investigation
Search Collections Retrieves all collections or specific collections from Mandiant Threat Intelligence based on the input parameters you have specified. search_collections
Investigation
Fetch Indicators Retrieves all indicators or specific indicators from Mandiant Threat Intelligence based on the input parameters you have specified. fetch_indicators
Investigation
Get Indicator Reputation Retrieves reputation information from Mandiant Threat Intelligence based on the indicator value you have specified. get_reputation_of_indicators
Investigation
Execute an API Request Sends an API request to any Mandiant Threat Intelligence API endpoint based on specified HTTP method, endpoint, and other input parameters that you have specified, enabling flexible API interactions tailored to user needs. execute_an_api_call
Investigation

operation: Get Indicators

Input parameters

Parameter Description
Created At Specify the DateTime when the indicators were created in Mandiant Threat Intelligence, and from when you want to retrieve indicators from Mandiant Threat Intelligence.
Size Specify the number of results, per page, that you want to include in the response of this operation. The maximum number of results per page is set to 50 items.
STIX UUID Specify the STIX ID of the alert object based on which you want to retrieve indicators from Mandiant Threat Intelligence.
Status Select the status of the indicator based on which you want to filter the indicators retrieved from Mandiant Threat Intelligence. You can choose between Active or Revoked.

Output

The output contains the following populated JSON schema:

{
    "id": "",
    "type": "",
    "objects": [
        {
            "id": "",
            "name": "",
            "type": "",
            "labels": [],
            "created": "",
            "revoked": "",
            "modified": "",
            "is_family": "",
            "description": "",
            "spec_version": "",
            "malware_types": [],
            "object_marking_refs": []
        },
        {
            "id": "",
            "type": "",
            "created": "",
            "revoked": "",
            "modified": "",
            "source_ref": "",
            "target_ref": "",
            "spec_version": "",
            "relationship_type": ""
        },
        {
            "id": "",
            "type": "",
            "created": "",
            "revoked": "",
            "modified": "",
            "source_ref": "",
            "target_ref": "",
            "spec_version": "",
            "relationship_type": ""
        },
        {
            "id": "",
            "type": "",
            "labels": [],
            "created": "",
            "pattern": "",
            "revoked": "",
            "modified": "",
            "confidence": "",
            "valid_from": "",
            "valid_until": "",
            "pattern_type": "",
            "spec_version": "",
            "indicator_types": [],
            "object_marking_refs": [],
            "x_fireeye_com_metadata": {
                "subscriptions": []
            }
        },
        {
            "id": "",
            "name": "",
            "type": "",
            "labels": [],
            "created": "",
            "revoked": "",
            "modified": "",
            "spec_version": "",
            "infrastructure_types": []
        },
        {
            "id": "",
            "type": "",
            "created": "",
            "definition": {
                "tlp": ""
            },
            "definition_type": ""
        },
        {
            "id": "",
            "type": "",
            "created": "",
            "definition": {
                "statement": ""
            },
            "spec_version": "",
            "created_by_ref": "",
            "definition_type": ""
        },
        {
            "id": "",
            "name": "",
            "type": "",
            "created": "",
            "modified": "",
            "spec_version": "",
            "identity_class": "",
            "object_marking_refs": []
        }
    ],
    "spec_version": ""
}

operation: Get Reports

Input parameters

Parameter Description
Created At Specify the DateTime when the indicators were created in Mandiant Threat Intelligence, and from when you want to retrieve indicators from Mandiant Threat Intelligence.
Size Specify the number of results, per page, that you want to include in the response of this operation. The maximum number of results per page is set to 50 items.
Report ID Specify the STIX ID of the report object based on which you want to retrieve reports from Mandiant Threat Intelligence.
Document ID Specify the Report ID to filter this operation to retrieve details of the specific report from Mandiant Threat Intelligence.
Status Select the status of the report based on which you want to filter the reports retrieved from Mandiant Threat Intelligence. You can choose from following options:
  • Active
  • Revoked
Subscription Select the subscription of the report based on which you want to filter the reports retrieved from Mandiant Threat Intelligence. You can choose from the following options:
  • Cyber-Crime
  • Cyber-Espionage
  • Hacktivism
  • Cyber-Physical
  • Strategic
  • Fusion
  • Operational
  • Vulnerability
  • Standard
Report Type Specify the type of report based on which you want to filter the reports retrieved from Mandiant Threat Intelligence.
Actor Name Specify the name of the actor based on which you want to filter the reports retrieved from Mandiant Threat Intelligence. This parameter filters the report results down to a specific actor and returns all matching reports for that actor.
Malware Name Specify the name of the malware based on which you want to filter the reports retrieved from Mandiant Threat Intelligence. This parameter filters the report results down to a specific malware family and returns all matching reports for that malware family.

Output

The output contains the following populated JSON schema:

{
    "id": "",
    "type": "",
    "objects": [
        {
            "type": "",
            "spec_version": "",
            "id": "",
            "created_by_ref": "",
            "created": "",
            "modified": "",
            "name": "",
            "description": "",
            "report_types": [],
            "published": "",
            "object_marking_refs": [],
            "x_fireeye_com_additional_description_sections": {
                "analysis": [],
                "key_points": []
            },
            "object_refs": [],
            "x_fireeye_com_tracking_info": {
                "document_version": "",
                "current_release_date": "",
                "document_id": ""
            },
            "x_fireeye_com_metadata": {
                "product_type": [],
                "subscriptions": []
            }
        }
    ]
}

operation: Get Alerts

Input parameters

Parameter Description
Created At Specify the DateTime when the alerts were created in Mandiant Threat Intelligence, and from when you want to retrieve alerts from Mandiant Threat Intelligence.
Size Specify the number of results, per page, that you want to include in the response of this operation. The maximum number of results per page is set to 50 items.
ID Specify the STIX ID of the alert object based on which you want to retrieve alerts from Mandiant Threat Intelligence.
Alert Type Select the type of alerts based on which you want to filter the alerts retrieved from Mandiant Threat Intelligence. You can choose from the following options:
  • Forum_Post
  • Tweet
  • Web_Content_Publish
  • Paste
  • Email_Analysis
  • Domain_Discovery
  • Document_Analysis
Alert Status Select the status of alerts based on which you want to filter the alerts retrieved from Mandiant Threat Intelligence. You can choose from the following options:
  • New
  • New_Requested
  • Investigated
  • Under_Investigation
  • Closed
  • Closed_Investigated
Alert Categories Select the category of alerts based on which you want to filter the alerts retrieved from Mandiant Threat Intelligence. You can choose from the following options:
  • Social-Media
  • Forums
  • Documents
  • Malware-Repository
  • Network-Indicators
  • Web-Content
  • Paste-Sites
Alert Severity Select the severity of alerts based on which you want to filter the alerts retrieved from Mandiant Threat Intelligence. You can choose from the following options:
  • Low
  • Medium
  • High
  • Critical

Output

The output contains the following populated JSON schema:

{
    "spec_version": "",
    "objects": [
        {
            "id": "",
            "type": "",
            "alert_type": "",
            "name": "",
            "status": "",
            "alert_context": [],
            "prerequisite_conditions": [],
            "object_refs": [],
            "action_nature": "",
            "description": "",
            "created": "",
            "modified": "",
            "alert_severity": {
                "severity_score": ""
            },
            "spec_version": ""
        },
        {
            "id": "",
            "type": "",
            "created": "",
            "created_by_ref": "",
            "definition_type": "",
            "definition": {
                "statement": ""
            },
            "spec_version": ""
        },
        {
            "id": "",
            "name": "",
            "type": "",
            "identity_class": "",
            "created": "",
            "modified": "",
            "object_marking_refs": [],
            "spec_version": ""
        }
    ],
    "id": "",
    "type": ""
}

operation: Search Collections

Input parameters

Parameter Description
Queries Specify the queries using which you want to retrieve the list of Query Objects from Mandiant Threat Intelligence. Each query object includes its type and properties.
Include Connected Objects Select this option to include objects connected to matching objects, through a reference or relationship, in the search response.
Connected Objects Specify the list of all connections using which you want to retrieve connected objects from Mandiant Threat Intelligence. Connections contain fields such as connection_type, connected_type, object_type, property, or relationship_type.
Sort By Specify the property of the object using which you want to sort results retrieved from Mandiant Threat Intelligence.

NOTE: Sort By is applicable only when the include_connected_object flag is set to false.

Order By Specify the sort direction of the results retrieved from Mandiant Threat Intelligence. You can set the sort order to "asc" (ascending) or "desc" (descending). If the sort order is not specified, it defaults to ascending.

NOTE: Sort Order is applicable only when the include_connected_object flag is set to false.

Output

The output contains a non-dictionary value.

operation: Fetch Indicators

Input parameters

Parameter Description
Created At Specify the DateTime when the indicators were created in Mandiant Threat Intelligence, and from when you want to retrieve indicators from Mandiant Threat Intelligence.
Size Specify the number of results, per page, that you want to include in the response of this operation. The maximum number of results per page is set to 50 items.
STIX UUID Specify the STIX ID of the alert object based on which you want to retrieve indicators from Mandiant Threat Intelligence.
Status Select the status of the indicator based on which you want to filter the indicators retrieved from Mandiant Threat Intelligence. You can choose between Active or Revoked.

Output

The output contains the following populated JSON schema:

{
    "id": "",
    "type": "",
    "objects": [
        {
            "id": "",
            "type": "",
            "labels": [],
            "created": "",
            "pattern": "",
            "revoked": "",
            "modified": "",
            "confidence": "",
            "valid_from": "",
            "pattern_type": "",
            "spec_version": "",
            "indicator_types": [],
            "object_marking_refs": [],
            "x_fireeye_com_metadata": {
                "subscriptions": []
            }
        }
    ],
    "spec_version": ""
}

operation: Get Indicator Reputation

Input parameters

Parameter Description
Indicator Value Specify the indicator value whose reputation information you want to retrieve from Mandiant Threat Intelligence.

Output

The output contains a non-dictionary value.

operation: Execute an API Request

Input parameters

Parameter Description
HTTP Method Select an HTTP action for the request. You can select from the following options:
  • DELETE
  • GET
  • PATCH
  • POST
  • PUT
Endpoint Specify the target API URL path for the request. For example, if the website is https://example.com and URL path is https://example.com/collections/alerts/objects, the endpoint would be collections/alerts/objects.
Query Parameters (Optional) Specify any optional parameters to add to the URL and refine the request.
Request Payload (Optional) Specify data, as JSON, to be sent as the request payload (typically for POST or PUT requests).

Output

The output contains a non-dictionary value.

Included playbooks

The Sample - mandiant-threat-intel - 1.2.0 playbook collection comes bundled with the Mandiant Threat Intelligence connector. These playbooks contain steps using which you can perform all supported actions. You can see bundled playbooks in the Automation > Playbooks section in FortiSOAR™ after importing the Mandiant Threat Intelligence connector.

  • > Mandiant Threat Intel Feed > Fetch and Create
  • Fetch Indicators
  • Get Alerts
  • Get Indicators
  • Get Reports
  • Mandiant Threat Intel Feed > Ingest
  • Search Collections
  • Get Indicator Reputation
  • Execute an API Request

Note: If you are planning to use any of the sample playbooks in your environment, ensure that you clone those playbooks and move them to a different collection since the sample playbook collection gets deleted during connector upgrade and delete.

Data Ingestion Support

Use the Data Ingestion Wizard to easily ingest data into FortiSOAR™ by pulling indicators from Mandiant Threat Intelligence. Currently, the indicators ingested from Mandiant Threat Intelligence is mapped to Threat Feeds in FortiSOAR™'s Threat Intel Management. For more information on the Data Ingestion Wizard, see the Connectors Guide in the FortiSOAR™ product documentation.

Configure Data Ingestion

You can configure data ingestion using the Data Ingestion Wizard to seamlessly map the incoming Mandiant Threat Intelligence Feeds to FortiSOAR™ Threat Feeds.

The Data Ingestion Wizard enables you to configure the scheduled pulling of data from Mandiant Threat Intelligence into FortiSOAR™. It also lets you pull some sample data from Mandiant Threat Intelligence using which you can define the mapping of data between Mandiant Threat Intelligence and FortiSOAR™. The mapping of common fields is generally already done by the Data Ingestion Wizard; users are mostly required to only map any custom fields that are added to the Mandiant Threat Intelligence indicator.

Note: For the ingestion playbooks to work you must install and configure the following solution packs:

For more information on solution packs see the respective solution pack document on the Content Hub Portal.

  1. To begin configuring data ingestion, click Configure Data Ingestion on the Mandiant Threat Intelligence connector's Configurations page.

    Click Let's Start by fetching some data, to open the Fetch Sample Data screen.

    Sample data is required to create a field mapping between Mandiant Threat Intelligence data and FortiSOAR™. The sample data is pulled from connector actions or ingestion playbooks.

  2. On the Fetch Data screen, provide the configurations required to fetch indicators from Mandiant Threat Intelligence.

    You can pull indicators from Mandiant Threat Intelligence by selecting the reputation of the indicator (choose between Good, Suspicious, Malicious, No Reputation Available, or TBD) that you want to retrieve from Mandiant Threat Intelligence. Additionally, you can also specify filters such as the confidence level, TLP set, and the age of the indicator.

    The fetched data is used to create a mapping between the Mandiant Threat Intelligence data and FortiSOAR™'s Threat Feed. Once you have completed specifying the configurations, click Fetch Data.

  3. On the Field Mapping screen, map the fields of the ingested Mandiant Threat Intelligence data to the fields of an indicator present in FortiSOAR™.

    To map a field, click the key in the sample data to add the Jinja value of the field. For example, to map the pattern parameter of an ingested indicator from Mandiant Threat Intelligence to the value parameter of a FortiSOAR™ threat feed, click the Value field and then click the pattern field to populate its keys:

    For more information on field mapping, see the Data Ingestion chapter in the Connectors Guide in the FortiSOAR™ product documentation. Once you have completed the mapping of fields, click Save Mapping & Continue.

  4. (Optional) Use the Scheduling screen to configure schedule-based ingestion, i.e., specify the polling frequency to Mandiant Threat Intelligence, so that the content gets pulled from the Mandiant Threat Intelligence integration into FortiSOAR™

    On the Scheduling screen, from the Do you want to schedule the ingestion? drop-down list, select Yes.

    In the Configure Schedule Settings section, specify the Cron expression for the schedule. For example, if you want to pull indicators from Mandiant Threat Intelligence every 5 minutes, click Every X Minute, and in the minute box enter /*5. This means that the indicators will be pulled from Mandiant Threat Intelligence every 5 minutes:

    Once you have completed scheduling, click Save Settings & Continue.

  5. The Summary screen displays a summary of the mapping done, and it also contains links to the Ingestion playbooks. Click Done to complete the data ingestion and exit the Data Ingestion Wizard.

Previous
Next

Mandiant Threat Intelligence v1.2.0

About the connector

Mandiant Threat Intelligence provides automated access to indicators of compromise (IOCs) — IP addresses, domain names, URLs threat actors are using, via the indicators, allows access to full length finished intelligence in the reports, allows for notification of threats to brand and keyword monitoring via the alerts, and finally allows searching for intelligence on the adversary with the search.

This connector has a dependency on the Threat Intel Management Solution Pack. Install the Solution Pack before enabling ingestion of Threat Feeds from this source.

This document provides information about the Mandiant Threat Intelligence Connector, which facilitates automated interactions, with a Mandiant Threat Intelligence server using FortiSOAR™ playbooks. Add the Mandiant Threat Intelligence Connector as a step in FortiSOAR™ playbooks and perform automated operations with Mandiant Threat Intelligence.

Version information

Connector Version: 1.2.0

FortiSOAR™ Version Tested on: 7.6.1-5275

Authored By: Fortinet

Certified: Yes

Release Notes for version 1.2.0

Following enhancements have been made to the Mandiant Threat Intelligence Connector in version 1.2.0:

Installing the connector

Use the Content Hub to install the connector. For the detailed procedure to install a connector, click here.

You can also use the yum command as a root user to install the connector:

yum install cyops-connector-mandiant-threat-intel

Prerequisites to configuring the connector

Minimum Permissions Required

Configuring the connector

For the procedure to configure a connector, click here

Configuration parameters

In FortiSOAR™, on the Connectors page, click the Mandiant Threat Intelligence connector row (if you are in the Grid view on the Connectors page) and in the Configurations tab enter the required configuration details:

Parameter Description
Server URL The service-based URI to connect and perform the automated operations.
Public Key The unique Mandiant Threat Intelligence Public Key used to create an authentication token required to access the Mandiant Threat Intelligence API.
Private Key The unique Mandiant Threat Intelligence Private Key used to create an authentication token required to access the Mandiant Threat Intelligence API.
Verify SSL Specifies whether the SSL certificate for the server is to be verified.
By default, this option is set to True.

Actions supported by the connector

The following automated operations can be included in playbooks and you can also use the annotations to access operations from FortiSOAR™ release 4.10.0 and onwards:

Function Description Annotation and Category
Get Indicators Retrieves all indicators or specific indicators from Mandiant Threat Intelligence based on the input parameters you have specified. get_indicators
Investigation
Get Reports Retrieves all reports or specific reports for threat actors from Mandiant Threat Intelligence based on the input parameters you have specified. get_reports
Investigation
Get Alerts Retrieves all alerts or specific alerts from Mandiant Threat Intelligence based on the input parameters you have specified. get_alerts
Investigation
Search Collections Retrieves all collections or specific collections from Mandiant Threat Intelligence based on the input parameters you have specified. search_collections
Investigation
Fetch Indicators Retrieves all indicators or specific indicators from Mandiant Threat Intelligence based on the input parameters you have specified. fetch_indicators
Investigation
Get Indicator Reputation Retrieves reputation information from Mandiant Threat Intelligence based on the indicator value you have specified. get_reputation_of_indicators
Investigation
Execute an API Request Sends an API request to any Mandiant Threat Intelligence API endpoint based on specified HTTP method, endpoint, and other input parameters that you have specified, enabling flexible API interactions tailored to user needs. execute_an_api_call
Investigation

operation: Get Indicators

Input parameters

Parameter Description
Created At Specify the DateTime when the indicators were created in Mandiant Threat Intelligence, and from when you want to retrieve indicators from Mandiant Threat Intelligence.
Size Specify the number of results, per page, that you want to include in the response of this operation. The maximum number of results per page is set to 50 items.
STIX UUID Specify the STIX ID of the alert object based on which you want to retrieve indicators from Mandiant Threat Intelligence.
Status Select the status of the indicator based on which you want to filter the indicators retrieved from Mandiant Threat Intelligence. You can choose between Active or Revoked.

Output

The output contains the following populated JSON schema:

{
    "id": "",
    "type": "",
    "objects": [
        {
            "id": "",
            "name": "",
            "type": "",
            "labels": [],
            "created": "",
            "revoked": "",
            "modified": "",
            "is_family": "",
            "description": "",
            "spec_version": "",
            "malware_types": [],
            "object_marking_refs": []
        },
        {
            "id": "",
            "type": "",
            "created": "",
            "revoked": "",
            "modified": "",
            "source_ref": "",
            "target_ref": "",
            "spec_version": "",
            "relationship_type": ""
        },
        {
            "id": "",
            "type": "",
            "created": "",
            "revoked": "",
            "modified": "",
            "source_ref": "",
            "target_ref": "",
            "spec_version": "",
            "relationship_type": ""
        },
        {
            "id": "",
            "type": "",
            "labels": [],
            "created": "",
            "pattern": "",
            "revoked": "",
            "modified": "",
            "confidence": "",
            "valid_from": "",
            "valid_until": "",
            "pattern_type": "",
            "spec_version": "",
            "indicator_types": [],
            "object_marking_refs": [],
            "x_fireeye_com_metadata": {
                "subscriptions": []
            }
        },
        {
            "id": "",
            "name": "",
            "type": "",
            "labels": [],
            "created": "",
            "revoked": "",
            "modified": "",
            "spec_version": "",
            "infrastructure_types": []
        },
        {
            "id": "",
            "type": "",
            "created": "",
            "definition": {
                "tlp": ""
            },
            "definition_type": ""
        },
        {
            "id": "",
            "type": "",
            "created": "",
            "definition": {
                "statement": ""
            },
            "spec_version": "",
            "created_by_ref": "",
            "definition_type": ""
        },
        {
            "id": "",
            "name": "",
            "type": "",
            "created": "",
            "modified": "",
            "spec_version": "",
            "identity_class": "",
            "object_marking_refs": []
        }
    ],
    "spec_version": ""
}

operation: Get Reports

Input parameters

Parameter Description
Created At Specify the DateTime when the indicators were created in Mandiant Threat Intelligence, and from when you want to retrieve indicators from Mandiant Threat Intelligence.
Size Specify the number of results, per page, that you want to include in the response of this operation. The maximum number of results per page is set to 50 items.
Report ID Specify the STIX ID of the report object based on which you want to retrieve reports from Mandiant Threat Intelligence.
Document ID Specify the Report ID to filter this operation to retrieve details of the specific report from Mandiant Threat Intelligence.
Status Select the status of the report based on which you want to filter the reports retrieved from Mandiant Threat Intelligence. You can choose from following options:
  • Active
  • Revoked
Subscription Select the subscription of the report based on which you want to filter the reports retrieved from Mandiant Threat Intelligence. You can choose from the following options:
  • Cyber-Crime
  • Cyber-Espionage
  • Hacktivism
  • Cyber-Physical
  • Strategic
  • Fusion
  • Operational
  • Vulnerability
  • Standard
Report Type Specify the type of report based on which you want to filter the reports retrieved from Mandiant Threat Intelligence.
Actor Name Specify the name of the actor based on which you want to filter the reports retrieved from Mandiant Threat Intelligence. This parameter filters the report results down to a specific actor and returns all matching reports for that actor.
Malware Name Specify the name of the malware based on which you want to filter the reports retrieved from Mandiant Threat Intelligence. This parameter filters the report results down to a specific malware family and returns all matching reports for that malware family.

Output

The output contains the following populated JSON schema:

{
    "id": "",
    "type": "",
    "objects": [
        {
            "type": "",
            "spec_version": "",
            "id": "",
            "created_by_ref": "",
            "created": "",
            "modified": "",
            "name": "",
            "description": "",
            "report_types": [],
            "published": "",
            "object_marking_refs": [],
            "x_fireeye_com_additional_description_sections": {
                "analysis": [],
                "key_points": []
            },
            "object_refs": [],
            "x_fireeye_com_tracking_info": {
                "document_version": "",
                "current_release_date": "",
                "document_id": ""
            },
            "x_fireeye_com_metadata": {
                "product_type": [],
                "subscriptions": []
            }
        }
    ]
}

operation: Get Alerts

Input parameters

Parameter Description
Created At Specify the DateTime when the alerts were created in Mandiant Threat Intelligence, and from when you want to retrieve alerts from Mandiant Threat Intelligence.
Size Specify the number of results, per page, that you want to include in the response of this operation. The maximum number of results per page is set to 50 items.
ID Specify the STIX ID of the alert object based on which you want to retrieve alerts from Mandiant Threat Intelligence.
Alert Type Select the type of alerts based on which you want to filter the alerts retrieved from Mandiant Threat Intelligence. You can choose from the following options:
  • Forum_Post
  • Tweet
  • Web_Content_Publish
  • Paste
  • Email_Analysis
  • Domain_Discovery
  • Document_Analysis
Alert Status Select the status of alerts based on which you want to filter the alerts retrieved from Mandiant Threat Intelligence. You can choose from the following options:
  • New
  • New_Requested
  • Investigated
  • Under_Investigation
  • Closed
  • Closed_Investigated
Alert Categories Select the category of alerts based on which you want to filter the alerts retrieved from Mandiant Threat Intelligence. You can choose from the following options:
  • Social-Media
  • Forums
  • Documents
  • Malware-Repository
  • Network-Indicators
  • Web-Content
  • Paste-Sites
Alert Severity Select the severity of alerts based on which you want to filter the alerts retrieved from Mandiant Threat Intelligence. You can choose from the following options:
  • Low
  • Medium
  • High
  • Critical

Output

The output contains the following populated JSON schema:

{
    "spec_version": "",
    "objects": [
        {
            "id": "",
            "type": "",
            "alert_type": "",
            "name": "",
            "status": "",
            "alert_context": [],
            "prerequisite_conditions": [],
            "object_refs": [],
            "action_nature": "",
            "description": "",
            "created": "",
            "modified": "",
            "alert_severity": {
                "severity_score": ""
            },
            "spec_version": ""
        },
        {
            "id": "",
            "type": "",
            "created": "",
            "created_by_ref": "",
            "definition_type": "",
            "definition": {
                "statement": ""
            },
            "spec_version": ""
        },
        {
            "id": "",
            "name": "",
            "type": "",
            "identity_class": "",
            "created": "",
            "modified": "",
            "object_marking_refs": [],
            "spec_version": ""
        }
    ],
    "id": "",
    "type": ""
}

operation: Search Collections

Input parameters

Parameter Description
Queries Specify the queries using which you want to retrieve the list of Query Objects from Mandiant Threat Intelligence. Each query object includes its type and properties.
Include Connected Objects Select this option to include objects connected to matching objects, through a reference or relationship, in the search response.
Connected Objects Specify the list of all connections using which you want to retrieve connected objects from Mandiant Threat Intelligence. Connections contain fields such as connection_type, connected_type, object_type, property, or relationship_type.
Sort By Specify the property of the object using which you want to sort results retrieved from Mandiant Threat Intelligence.

NOTE: Sort By is applicable only when the include_connected_object flag is set to false.

Order By Specify the sort direction of the results retrieved from Mandiant Threat Intelligence. You can set the sort order to "asc" (ascending) or "desc" (descending). If the sort order is not specified, it defaults to ascending.

NOTE: Sort Order is applicable only when the include_connected_object flag is set to false.

Output

The output contains a non-dictionary value.

operation: Fetch Indicators

Input parameters

Parameter Description
Created At Specify the DateTime when the indicators were created in Mandiant Threat Intelligence, and from when you want to retrieve indicators from Mandiant Threat Intelligence.
Size Specify the number of results, per page, that you want to include in the response of this operation. The maximum number of results per page is set to 50 items.
STIX UUID Specify the STIX ID of the alert object based on which you want to retrieve indicators from Mandiant Threat Intelligence.
Status Select the status of the indicator based on which you want to filter the indicators retrieved from Mandiant Threat Intelligence. You can choose between Active or Revoked.

Output

The output contains the following populated JSON schema:

{
    "id": "",
    "type": "",
    "objects": [
        {
            "id": "",
            "type": "",
            "labels": [],
            "created": "",
            "pattern": "",
            "revoked": "",
            "modified": "",
            "confidence": "",
            "valid_from": "",
            "pattern_type": "",
            "spec_version": "",
            "indicator_types": [],
            "object_marking_refs": [],
            "x_fireeye_com_metadata": {
                "subscriptions": []
            }
        }
    ],
    "spec_version": ""
}

operation: Get Indicator Reputation

Input parameters

Parameter Description
Indicator Value Specify the indicator value whose reputation information you want to retrieve from Mandiant Threat Intelligence.

Output

The output contains a non-dictionary value.

operation: Execute an API Request

Input parameters

Parameter Description
HTTP Method Select an HTTP action for the request. You can select from the following options:
  • DELETE
  • GET
  • PATCH
  • POST
  • PUT
Endpoint Specify the target API URL path for the request. For example, if the website is https://example.com and URL path is https://example.com/collections/alerts/objects, the endpoint would be collections/alerts/objects.
Query Parameters (Optional) Specify any optional parameters to add to the URL and refine the request.
Request Payload (Optional) Specify data, as JSON, to be sent as the request payload (typically for POST or PUT requests).

Output

The output contains a non-dictionary value.

Included playbooks

The Sample - mandiant-threat-intel - 1.2.0 playbook collection comes bundled with the Mandiant Threat Intelligence connector. These playbooks contain steps using which you can perform all supported actions. You can see bundled playbooks in the Automation > Playbooks section in FortiSOAR™ after importing the Mandiant Threat Intelligence connector.

Note: If you are planning to use any of the sample playbooks in your environment, ensure that you clone those playbooks and move them to a different collection since the sample playbook collection gets deleted during connector upgrade and delete.

Data Ingestion Support

Use the Data Ingestion Wizard to easily ingest data into FortiSOAR™ by pulling indicators from Mandiant Threat Intelligence. Currently, the indicators ingested from Mandiant Threat Intelligence is mapped to Threat Feeds in FortiSOAR™'s Threat Intel Management. For more information on the Data Ingestion Wizard, see the Connectors Guide in the FortiSOAR™ product documentation.

Configure Data Ingestion

You can configure data ingestion using the Data Ingestion Wizard to seamlessly map the incoming Mandiant Threat Intelligence Feeds to FortiSOAR™ Threat Feeds.

The Data Ingestion Wizard enables you to configure the scheduled pulling of data from Mandiant Threat Intelligence into FortiSOAR™. It also lets you pull some sample data from Mandiant Threat Intelligence using which you can define the mapping of data between Mandiant Threat Intelligence and FortiSOAR™. The mapping of common fields is generally already done by the Data Ingestion Wizard; users are mostly required to only map any custom fields that are added to the Mandiant Threat Intelligence indicator.

Note: For the ingestion playbooks to work you must install and configure the following solution packs:

For more information on solution packs see the respective solution pack document on the Content Hub Portal.

  1. To begin configuring data ingestion, click Configure Data Ingestion on the Mandiant Threat Intelligence connector's Configurations page.

    Click Let's Start by fetching some data, to open the Fetch Sample Data screen.

    Sample data is required to create a field mapping between Mandiant Threat Intelligence data and FortiSOAR™. The sample data is pulled from connector actions or ingestion playbooks.

  2. On the Fetch Data screen, provide the configurations required to fetch indicators from Mandiant Threat Intelligence.

    You can pull indicators from Mandiant Threat Intelligence by selecting the reputation of the indicator (choose between Good, Suspicious, Malicious, No Reputation Available, or TBD) that you want to retrieve from Mandiant Threat Intelligence. Additionally, you can also specify filters such as the confidence level, TLP set, and the age of the indicator.

    The fetched data is used to create a mapping between the Mandiant Threat Intelligence data and FortiSOAR™'s Threat Feed. Once you have completed specifying the configurations, click Fetch Data.

  3. On the Field Mapping screen, map the fields of the ingested Mandiant Threat Intelligence data to the fields of an indicator present in FortiSOAR™.

    To map a field, click the key in the sample data to add the Jinja value of the field. For example, to map the pattern parameter of an ingested indicator from Mandiant Threat Intelligence to the value parameter of a FortiSOAR™ threat feed, click the Value field and then click the pattern field to populate its keys:

    For more information on field mapping, see the Data Ingestion chapter in the Connectors Guide in the FortiSOAR™ product documentation. Once you have completed the mapping of fields, click Save Mapping & Continue.

  4. (Optional) Use the Scheduling screen to configure schedule-based ingestion, i.e., specify the polling frequency to Mandiant Threat Intelligence, so that the content gets pulled from the Mandiant Threat Intelligence integration into FortiSOAR™

    On the Scheduling screen, from the Do you want to schedule the ingestion? drop-down list, select Yes.

    In the Configure Schedule Settings section, specify the Cron expression for the schedule. For example, if you want to pull indicators from Mandiant Threat Intelligence every 5 minutes, click Every X Minute, and in the minute box enter /*5. This means that the indicators will be pulled from Mandiant Threat Intelligence every 5 minutes:

    Once you have completed scheduling, click Save Settings & Continue.

  5. The Summary screen displays a summary of the mapping done, and it also contains links to the Ingestion playbooks. Click Done to complete the data ingestion and exit the Data Ingestion Wizard.

Previous
Next