Cisco AMP Threat Grid Indicator Query

Updated 2 weeks ago by TruSTAR

This document explains how to set up the Cisco AMP Threat Grid Indicator Query premium intelligence source in the TruSTAR platform.

Cisco Threat Grid combines advanced sandboxing with threat intelligence into one unified solution to protect organizations from malware.

  • Source Type: Premium Intel
  • Update Type: Query-based
  • Parser: Yes
  • Time to Install: 10 minutes

Observables Supported

  • IP
  • Domain
  • URL (Domains are extracted from URL)
  • SHA256
  • SHA1
  • MD5
  • REGISTRY_KEY

Requirements

  • Subscription to Cisco AMP Threat Grid
  • Cisco AMP Threat Grid API key.
TruSTAR Admin rights are required to activate this Premium Intelligence feed.

Getting Started

  1. Log into the TruSTAR Web App.
  2. Click the Marketplace icon on the left side menu.
  3. Choose Premium Intel.
  4. Click Subscribe on the Cisco Amp Threat Grid Analysis Feeds box.
  5. Enter your your API key and then click Save Credentials & Request Subscription.

TruSTAR will validate the integration within 48 hours and send an email when the integration has been enabled.

TruSTAR Report Mapping

The information retrieved from this intelligence source is stored in the CiscoAMP Threat Grid Enclave using this format.

Field 

Explanation

Example

Report Title

IP <IOC Value> Example:

IP XX.45.72.XX

External ID

Encoded value of (IP <<IOC Value>

IP XX.45.72.XX

Report Body

Entire JSON content received from Cisco Threat Grid

Time Begun

Timestamp

2019-01-18T01:35:17Z

Tags

As per workflow logic(use severity score)

Known Issues

No reported issues.

Please contact support@trustar.co if you have issues with this integration.


How Did We Do?