Incoming feed - FireEye iSIGHT Intelligence Report API#
Note
This article describes how to configure incoming feeds for a particular feed source. To see how to configure incoming feeds in general, see Create and configure incoming feeds.
Specifications |
|
---|---|
Transport type |
FireEye iSIGHT Intelligence Report API |
Content type |
FireEye Report JSON| |
Ingested data |
FireEye iSIGHT intelligence reports. |
Processed data |
STIX reports on vulnerabilities, malware, and threats such as threat actors, strategies, tactics, and techniques. |
Requirements#
FireEye public API key.
FireEye private API key.
Skip extraction of observables from unstructured text#
By default, this extension extracts observables from unstructured text in entities ingested from the incoming feed, such as from:
Entity titles
Entity descriptions
This may result in a number of false positives when ingesting the feed.
To reduce the number of false positives from ingesting unstructured text, you can either:
Select the Skip extraction of observables from unstructured text option when configuring the feed.
Or, Create observable rules to ignore false positives that are particular to this incoming feed.
For example, observables extracted from unstructured data
when ingesting entities from FireEye iSIGHT Intelligence Report API may
result in a large number of domain: fireeye.satmetrix.com
observables. Create an observable rule to ignore those observables.
Configure the incoming feed#
Create or edit an incoming feed.
Under Transport and content, fill out these fields:
Note
Required fields are marked with an asterisk (*).
Field
Description
Transport type*
Select FireEye iSIGHT Intelligence Report API from the drop-down menu.
Content type*
Select FireEye Report JSON from the drop-down menu.
API URL*
Set this to the FireEye iSIGHT API endpoint.
By default, this is set to
https://api.isightpartners.com/
API key (public)*
Set this to your FireEye public API key.
API key (private)*
Set this to your FireEye private API key.
SSL verification
Selected by default. Select this option to enable SSL for this feed.
SSL Cert
Used when connecting to a feed source that uses a custom CA. Set this as the path to the SSL certificate to use when authenticating the feed source.
For more information, see SSL certificates.
Include Threat intelligence type
Enable to retrieve threat intelligence reports when you run the feed.
Selected by default.
Include Malware intelligence type
Enable to retrieve malware intelligence reports when you run the feed.
Selected by default.
Include Vulnerability intelligence type
Enable to retrieve vulnerability intelligence reports when you run the feed.
Selected by default.
Include Overview intelligence type
Enable to retrieve ‘Malware Overview’ and ‘Actor Overview’ intelligence reports when you run the feed.
Selected by default.
Download and attach PDF version of reports
When the feed runs, it downloads and attaches a PDF version for each report it receives from the feed source.
Selected by default.
Caution
Enabling this makes an additional API call to FireEye for every report retrieved. Disable if the feed consumes your Daily Query Quota too quickly.
Start ingesting from*
Ingest data from the feed source starting from this date and time. Use the drop-down calendar to select the date and time you want to start ingesting feed data from.
Store your changes by selecting Save.
SSL certificates#
To use an SSL certificate, it must be:
Accessible on the EclecticIQ Intelligence Center host.
Placed in a location that can be accessed by the
eclecticiq
user.Owned by
eclecticiq:eclecticiq
.
To make sure that EclecticIQ Intelligence Center can access the SSL certificate:
Upload the SSL certificate to a location on the EclecticIQ Intelligence Center host.
On the EclecticIQ Intelligence Center host, open the terminal.
Change ownership of the SSL certificate by running as root in the terminal:
chown eclecticiq:eclecticiq /path/to/cert.pem
Where
/path/to/cert.pem
is the location of the SSL certificate EclecticIQ Intelligence Center needs to access.
Ingestion results#
Retrieved reports are ingested as Report entitites on the platform, with the following attached entitites where available:
Ingested report |
Resulting entities |
---|---|
Malware intelligence report |
|
Threat intelligence report |
|
Vulnerability intelligence report |
|
API version#
This extension uses version 2.5 of the FireEye iSIGHT API.