TIP Integration Overview: Anomali ThreatStream

Malicious IP Feed

Install from App Store

From the ThreatStream App Store, search for the GreyNoise Premium Feed and Click Get Access.

GreyNoise Premium Feed card in App Store

GreyNoise Premium Feed card in App Store

Click "I have Credentials" on the configuration screen, enter your GreyNoise API key, and then click activate.

GreyNoise Feed credential configuration dialog

GreyNoise Feed credential configuration dialog

📘

This Feed updates once per day.

🚧

The Feed requires an active GreyNoise subscription with Feed access. A 14-Day Free trial is available for existing customers and for new customers that start a GreyNoise Trial.

Sample Observable

The following shows a sample of an observable that was created by the Feed. It includes the classification information, source country, and CVE information provided by GreyNoise as tags.

Sample of observable provided by GreyNoise Feed

Sample of observable provided by GreyNoise Feed

Enrichment

Install From AppStore

Current Version: 3.0.0

From the ThreatStream Interface, go to the App Store. Search for GreyNoise and select the Get Access option.

GreyNosie Enrichment Integration within ThreatStream

GreyNoise Premium Enrichment card in App Store

Configure Credentials

Click "I have credentials" to configure the enrichment.

Enter a GreyNoise API Key, then press the Activate button.

If the activation is successful, ThreatStream will display a Green success notification. If there are any issues, please contact [email protected]

📘

Free Tier API Keys

For those users with a Free / Commuity Tier API key, enter the key as above, and the enrichment for IPs will work within the restrictions and rate-limits on your account.

Enriching an IP Observerable

Once the GreyNoise enrichment is enabled, ThreatStream will automatically query the GreyNoise IP API and provide results for all public IPv4 observables. If the IP address is part of the GreyNoise dataset, the details will be displayed on the IP Details tab:

IPs that are Not Noise

If an IP is not found in the GreyNoise data set, ThreatStream will provide an indicator that this is the case:

594

IP Timeline Information

Click on the IP Timeline Details tab to view a daily view of scanning activity.

Performing a Pivot-Based (right-click) Lookup

To query an IP in GreyNoise from the canvas, right-click on an IPv4 address, then select the "Search IP" action from the GreyNoise enrichments menu:

The enrichment will add additional tags and other information to the canvas, based on the response from GreyNoise and if the Enterprise or Community API is being used:

Enriching a Vulnerability

Once the GreyNoise enrichment is enabled, ThreatStream will automatically query the GreyNoise CVE API and provide results for all CVEs within the dataset:

Pivot to Observables with Vulnerability Tag

For those users with one or more GreyNoise Indicator feeds enabled, the Vulnerability enrichment includes a link to Pivot to the Observables tab and search for all active indicators ingested within a GreyNoise feed that are tagged with the indicated Vulnerability: