Knowledgebase
  • API
  • Web App
  • Support
  • Home
  • Contact

TruSTAR Platform Overview

1. Introducing TruSTAR

2. Product Architecture

3. Data Management

4. Data Processing

4.1 Data Processing: Collect

4.2 Data Processing: Prepare

4.3 Data Processing: Prioritize

4.4 Data Processing: Connect

5. Capabilities

5.1 Capabilities: Governance

5.2 Capabilities: Intel Workflows

5.3 Capabilities: Search

5.4 Capabilities: Scoring

5.5 Capabilities: Analytics

6. Interfaces

6.1 Interfaces: REST API

6.2 Interfaces: Integrations

6.3 Interfaces: Web App

7. Use Cases

7.1 Use Cases: Detect

7.2 Use Cases: Triage

7.3 Use Cases: Investigate

7.4 Use Cases: Disseminate

TruSTAR Ontology

Developer Portal

Building a Custom Integratiom

TruSTAR REST API v1.3

Case Management Integrations with REST API v1.3

Detection Integrations with REST API v1.3

SOAR Integrations with REST API v1.3

Overview: Partner Resources

Requirements for Integrations

Integrating Intelligence Sources with TruSTAR

Building an Observable-Query Intelligence Source Integration

Python SDK

REST API v1.3

REST API v2.0

Intelligence Sources

Digital Risk/ATO

Cyjax

Digital Shadows

RiskIQ Blacklist

RiskIQ PassiveTotal

Shape Blackfish

SpyCloud

Endpoint

Cisco AMP Threat Grid Indicator Query

Crowdstrike Falcon Detection

Crowdstrike Falcon Intelligence

Crowdstrike Falcon Reports

Threat Intelligence

AbuseIPDB

Alienvault OTX

Alienvault OTX Pulse

Bambenek C2 Domain Feed

Bambenek C2 IP Feed

Bambenek DGA Feed

Cofense Intelligence

Dragos WorldView

Facebook Threat Exchange

Farsight Security

Flashpoint

Hybrid Analysis

IBM X-Force

IBM X-Force Threat Intelligence

Intel 471 Adversary Intelligence

Intel 471 Alerts

Intel 471 Malware Intelligence

Mandiant Threat Intelligence

NetLab 360 DGA Feeds

Recorded Future Hash Intelligence

Recorded Future IP Intelligence

Recorded Future URL Intelligence

Recorded Future Vulnerability Intelligence

Shodan

Symantec Threat Intelligence

VirusTotal

urlscan

Trusted Community

A-ISAC

COVID-19 OSINT Community Enclave

F-ISAC

FS-ISAC

NCFTA CyFin

NCFTA TNT

Other

AWS GuardDuty

Custom TAXII Client A, B, C

Cybersource

MISP

Malware Sandboxes

Cisco AMP Threat Grid Analysis

Joe Sandbox

How Intelligence Sources are Updated

Intelligence Sources FAQ

Open Source Intelligence Tech Specs

Overview: Intelligence Sources

Apps

Case Management

Fast Incident Response

Install: TruSTAR for FIR

User Guide: TruSTAR for FIR

IBM Resilient

FAQ: TruSTAR for Resilient

Install: TruSTAR for Resilient

User Guide: TruSTAR for Resilient

JIRA

FAQ: TruSTAR for Jira

Install: TruSTAR for Jira

User Guide: TruSTAR for Jira

ServiceNow

FAQ: TruSTAR for ServiceNow

Install: TruSTAR for ServiceNow

User Guide: TruSTAR for ServiceNow

ServiceNow V2

Install: TruSTAR for ServiceNow V2

User Guide: TruSTAR for ServiceNow V2

Overview: Case Management Apps

Detection

Splunk Enterprise Security

User Guide: TruSTAR Unified

1. Overview

2. Download Observables to Splunk

3. Auto Submit + Enrich + Re-enrich NEs (ES)

4. Manually Submit an NE to Enclave (ES)

5. Manually Enrich a Notable Event (ES)

6. Research Observable in TruSTAR.

7. Useful SPL Searches

8. Troubleshooting

FAQ (TS Unif)

Install (TS Unif)

IBM QRadar

FAQ: TruSTAR for IBM QRadar

Install: TruSTAR for IBM QRadar

User Guide: TruSTAR for IBM QRadar

Overview: Detection Workflow Apps

Orchestration

Demisto

User Guide: TruSTAR for Demisto

Creating a Demisto Playbook

Indicator Retrieval in Demisto

Indicator Searches in Demisto

Listing TruSTAR Enclaves in Demisto

Phishing Triage Commands for Demisto

Report Commands in Demisto

Report Searches in Demisto

User Guide: TruSTAR for Demisto

Whitelisting with Demisto

FAQ: TruSTAR for Demisto

Install: TruSTAR for Demisto

Overview: Demisto

TAXII Applications

Anomali ThreatStream

LogRhythm

Palo Alto MineMeld

TAXII FAQ

TruSTAR TAXII Server

Using other tools' TAXII clients with TruSTAR TAXII Server

Threat Intelligence Platform

MISP (v2)

FAQ: TruSTAR for MISP (v2)

Install: TruSTAR for MISP (v2)

User Guide: TruSTAR for MISP (v2)

Other

TruSTAR Extension for Chrome

TruSTAR on Slack

Workflow Apps FAQ

TruSTAR Web App

UI Walkthrough

1. Start Here

2. Main Window

3. Filter and Refine Panel

4. Intelligence Reports

5. Indicators

6. Marketplace

7. TruSTAR Community Chat

8. User Settings

Reports

Copying a Report

Deleting a Report

Emailing a Report

Exporting Report Data

Moving a Report

Overview: Intelligence Reports

Redacting Data from a Report

Reports Graph View

Reports List View

Reports Panel

Submitting a Report

Tagging a Report

Updating a Report

Indicators

Deleting Indicators

Exporting Indicators

IOC List View

Observable Graph View

Overview: Indicators

Tagging Indicators

Threat Actors

Uploading Indicators

Whitelisting Indicators

Phishing Triage

Overview: Phishing Triage

Phishing Triage API

Phishing Triage Python SDK

Phishing Workflow in the TruSTAR Web App

Using Phishing Triage with Detection Tools

Using Phishing Triage with Orchestration Tools

Using Phishing Triage with a TAXII Client

User Settings

Determining Your TruSTAR Role / Permissions

Editing Your Profile

Notifications

User Settings Overview

Admin Features

Single Sign-On (SSO)

Okta (SSO)

Ping Identity (SSO)

Salesforce (SSO)

Enclave Inbox

Automating Forwarding to an Enclave Inbox

Enclave Inbox

Setting up an Enclave Inbox with Proofpoint

Managing Users

Managing the Company Whitelist

Managing the Redaction Library

Setting Up Multi-Factor Authentication (MFA)

Setting up a Service Account

Indicator Prioritization Intel Workflow

Creating an Indicator Prioritization Intel Workflow

Deleting an Intel Workflow

Editing an Intel Workflow

FAQ: Intel Workflows

Overview: Indicator Prioritization Intel Workflow

Viewing a Data Set in Postman

Viewing an Intel Workflow

Working with Safelist Libraries

Other Features

MITRE ATT&CK Framework

Navigation Bar

Searching

Using Notes

Using the Filter and Refine Panel

Overview: TruSTAR Web App

Technology

TruSTAR Scoring

Normalized Indicator Scores

Priority Event Scores

Priority Indicator Scores

Auto-Whitelist

Enclaves

Redaction Library

FAQs

TruSTAR Policies

API Usage Policy

Privacy Policy

Contacting Support

Finding Your API Keys

Finding a Report ID

Finding an Enclave Email Handle

Finding an Enclave ID

Login FAQ

Observable Collection FAQ

Observables Supported by TruSTAR

Security FAQ

Splunk + TruSTAR Acquisition

TruSTAR Glossary

TruSTAR Videos

Uploading Observables FAQ

All Categories ​>​ ​Intelligence Sources ​ > ​ ​Malware Sandboxes

Malware Sandboxes

2 articles

Cisco AMP Threat Grid Analysis

Setting up the Cisco Threat Grid Analysis intelligence source

Updated 11 months ago by TruSTAR

Joe Sandbox

Setting up the Joe Sandbox intelligence source

Updated 1 month ago by TruSTAR

Powered by HelpDocs (opens in a new tab)

Contact