TeamT5 ThreatVision
Connector Category: API Feed Source
Notice
The integration is available in Intel Exchange from v3.7.4.0 (Early Access).
Overview
What is this integration about?
Intel Exchange integrates with TeamT5 ThreatVision to provide up-to-date intelligence on cyber threats, including adversaries, malware, vulnerabilities, and attack patterns. This integration enhances security operations by offering valuable insights into evolving threats.
TeamT5 ThreatVision provides intelligence on the following threat objects:
Threat Actors (Adversaries)
Malware
Vulnerabilities
Attack Patterns
Intelligence Reports
Indicators (IPv4, domains, hashes – MD5, SHA1, SHA256)
Tools
Identities
Observables
Configure TeamT5 as a Feed Source
Configure TeamT5 ThreatVision as an API feed source to receive threat data feeds.
Before you Start
You must have the View API Feed, View Feed Source, Create Feed Source, and Update Feed Source permissions in Intel Exchange.
You must have the base URL, client ID, and client secret of your TeamT5 account.
Steps
To configure TeamT5 as an API feed source in Intel Exchange, follow these steps:
Go to Administration > Integration Management. In Feed Sources, click APIs.
Click Add API Source.
Search and select TeamT5 ThreatVision.
Click Add Instance.
Enter a unique name to identify the instance name. For example, TeamT5-Prod.
Enter the base URL of your TeamT5 instance. The default base URL is
https://api.threatvision.org/api/v2/
.Enter the client ID and secret key to authenticate communication between the Intel Exchange and TeamT5 ThreatVision servers.
Select the Verify SSL to verify the SSL certificate and secure the connection between the Intel Exchange and TeamT5 ThreatVision servers. By default, Verify SSL is selected.
Note
Cyware recommends you select Verify SSL. If you disable this option, Intel Exchange may configure an instance for an expired SSL certificate. This may not establish the connection properly and Intel Exchange will not be able to notify you in case of a broken or improper connection.
9. Click Save.
After the TeamT5 instance is configured successfully, you can view the TeamT5 feed channels. You can configure multiple instances by clicking Manage > Add More.
Configure TeamT5 Feed Channels
Configure the feed channel to retrieve threat data feeds from TeamT5.
Steps
To configure the feed channels, follow these steps:
Go to Administration > Integration Management. In Feed Sources, click APIs.
Search and select the TeamT5 app.
Click the vertical ellipsis, and select Manage.
Click Manage Feed Channels.
Select a feed channel, and turn on the toggle.
Enter the date and time to start poling feeds. Select a date within 15 days from the current date.
Enter the name of the collection to group the feed data. For example, CS Feeds. Intel Exchange creates the collection and stores all the feeds from the feed channel.
Select from one of the following Polling Cron Schedule types to define when to poll the data:
Manual: Allows you to manually poll from the source collection.
Auto: Allows you to automatically poll for threat intel from sources at specific time intervals. The default polling cron schedule is Auto.
Enter a frequency in minutes between 60 and 10080 minutes in Polling Time. The default polling time is 240 minutes.
Set a default TLP and confidence score to assign to the feeds that do not have a TLP and confidence score already assigned. By default, the default TLP and confidence score are set to Amber and 100, respectively.
Select any tags to identify and categorize the feeds.
Click Save.
Test Feed Channel Connectivity
Test the connectivity of the TeamT5 API feed channels to ensure that the connection with the correct API endpoint is established and that you have permission to poll feeds.
Before you Start
Ensure that the TeamT5 integration is enabled.
Ensure that the feed channel for which you want to test connectivity is enabled.
Steps
To test the connectivity of a feed channel, follow these steps:
Go to Administration > Integration Management > Feed Sources > APIs.
Search and select the TeamT5 app.
On a feed channel, click the vertical ellipses and select View Details.
In the Working Status section, click Test Connectivity.
If the connection is established, then the working status shows Running. If the connectivity is broken, then the working status shows a Connection Error. Hover over the tooltip next to Connection Error to view the error code.
Note
When the connectivity of a feed channel breaks, Intel Exchange disable the channel and re-attempt to restore the connectivity three times every hour. After a successful re-attempt to restore the connectivity, Intel Exchange enables the feed channel automatically.
TeamT5 Feed Channels
The following table lists the feed channel and the API endpoint used to retrieve feeds from TeamT5:
Feed Channel | API Endpoint | Description |
---|---|---|
Retrieve Threat Actors Feeds |
| Retrieves a list of all adversaries (threat actors). |
| Searches for a specific adversary by name. | |
| Retrieves reports related to the specified adversary. | |
| Retrieves malwares related to the specified adversary. | |
| Retrieves capabalities (attack patterns) related to the specified adversary. | |
| Provides file samples and hash observables linked to the adversary. | |
Fetch Attack Pattern Feeds |
| Retrieves all MITRE ATT&CK techniques. |
| Retrieves all MITRE ATT&CK tactics. | |
| Provides file samples and hash observables related to the specified MITRE technique. | |
Retrieve Vulnerability Feeds |
| Retrieves a list of all advisories with their release dates. |
| Retrieves all vulnerabilities associated with a specific advisory. | |
Retrieve Reports Feeds |
| Retrieves all reports. |
Fetch Malware Feeds |
| Retrieves all malwares. |
| Searches for a specific malware by name. | |
| Retrieves intelligence reports related to the specified malware. | |
| Retrieves adversaries (threat actors) related to the specified malware. | |
| Retrieves capabalities (attack patterns) related to the specified malware. | |
| Provides file samples and hash observables associated with the malware. | |
Fetch Indicator Feeds |
| Retrieves all Indicator of Compromise (IOC) bundles with STIX URLs and related reports. |
| Retrieves detailed IOC objects in STIX 2.1 format, including relations. |