Document toolboxDocument toolbox

threatintel.threatquotient

Introduction

The tags beginning with threatintel.threatquotient identify events generated by ThreatQ.

Valid tags and data tables

The full tag must have four levels. The first two are fixed as threatintel.threatquotient and represent technology and brand. The third level corresponds to the service while the fourth, fifth, and sixth levels identify the type of events sent.

Technology

Brand

Service

Type

Version

Format

Technology

Brand

Service

Type

Version

Format

threatintel

threatquotient

  • platform

  • anonymization

  • commandandcontrol

  • logincompromise

  • userdefined

  • compromisedpkicertificate

  • wateringhole

  • watchlist

  • incident

  • exfiltration

  • spearphish

  • sighting

  • hostcharacteristics

  • sqlinjectionattack

  • dosattack

  • malware

  • 1

  • json

These are the valid tags and corresponding data tables that will receive the parsers' data:

Tag

Devo table

threatintel.threatquotient.platform.anonymization.1.json

threatintel.threatquotient.platform.anonymization

threatintel.threatquotient.platform.commandandcontrol.1.json

threatintel.threatquotient.platform.commandandcontrol

threatintel.threatquotient.platform.logincompromise.1.json

threatintel.threatquotient.platform.logincompromise

threatintel.threatquotient.platform.userdefined.1.json

threatintel.threatquotient.platform.userdefined

threatintel.threatquotient.platform.compromisedpkicertificate.1.json

threatintel.threatquotient.platform.compromisedpkicertificate

threatintel.threatquotient.platform.wateringhole.1.json

threatintel.threatquotient.platform.wateringhole

threatintel.threatquotient.platform.watchlist.1.json

threatintel.threatquotient.platform.watchlist

threatintel.threatquotient.platform.incident.1.json

threatintel.threatquotient.platform.incident

threatintel.threatquotient.platform.exfiltration.1.json

threatintel.threatquotient.platform.exfiltration

threatintel.threatquotient.platform.spearphish.1.json

threatintel.threatquotient.platform.spearphish

threatintel.threatquotient.platform.sighting.1.json

threatintel.threatquotient.platform.sighting

threatintel.threatquotient.platform.hostcharacteristics.1.json

threatintel.threatquotient.platform.hostcharacteristics

threatintel.threatquotient.platform.sqlinjectionattack.1.json

threatintel.threatquotient.platform.sqlinjectionattack

threatintel.threatquotient.platform.dosattack.1.json

threatintel.threatquotient.platform.dosattack

threatintel.threatquotient.platform.malware.1.json

threatintel.threatquotient.platform.malware

Apart from the data tables above, there’s also a parent table threatintel.threatquotient.platform that displays data from all the tags listed.

How to send data to Devo

To send logs to these tables, Devo provides a collector that you can download and use to send the required events to your Devo domain. You can learn how to use it in this article.