Mandiant Advantage Threat Intelligence Engine Integration Configuration Guide
  • 12 Sep 2024
  • 14 Minutes to read
  • Dark
    Light

Mandiant Advantage Threat Intelligence Engine Integration Configuration Guide

  • Dark
    Light

Article summary

Software Version
This guide applies to the Mandiant Advantage Threat Intelligence Engine App version 2.0.x.

Overview

The Mandiant® Advantage Threat Intelligence Engine integration with ThreatConnect® lets you ingest Mandiant Advantage Threat Intelligence Reports, Indicators, Actors, Campaigns, Events, Malware, Signatures, Tools, and Vulnerabilities into ThreatConnect seamlessly. It uses ATT&CK® Tags in ThreatConnect to represent Mandiant Attack Patterns, allowing you to interact with Mandiant data in ThreatConnect’s ATT&CK Visualizer. Finally, it ingests Mandiant Campaigns as Event Groups in ThreatConnect in order to represent each timeline object of a Campaign, enabling you to use Threat Graph to visualize a Campaign and its timeline interactively.

Dependencies

ThreatConnect Dependencies

  • Active ThreatConnect Application Programming Interface (API) key
  • ThreatConnect instance with version 7.2.0 or newer installed
Note
All ThreatConnect dependencies will be provided by default to subscribing ThreatConnect Cloud customers. Customers on Dedicated Cloud and On-Premises instances can enable these settings on the Account Settings screen within their ThreatConnect instance.

Mandiant Dependencies

  • Active Mandiant Advantage Threat Intelligence subscription that provides access to an API key
  • To process and ingest all Mandiant Reports, an active Mandiant Advantage Threat Intelligence subscription to Fusion Reports is required. If you do not have a subscription to Fusion Reports and select any of the checkboxes available for the Mandiant Report Types parameter when configuring the integration (Figure 1), the Mandiant Advantage Threat Intelligence App will not start and run. Therefore ensure all checkboxes for the Mandiant Report Types parameter are cleared when configuring and deploying the App if you do not have a subscription to Fusion Reports.
    Figure 1_Mandiant Advantage Threat Intelligence Engine Integration Configuration Guide_Software Version 2.0

     

Application Setup and Configuration

Important
Follow the steps in this section only if you are installing the Mandiant Advantage Threat Intelligence Engine App for the first time. If you installed version 1.0.of the App previously and are upgrading to version 2.0.of the App, see the “Upgrade Recommendations” section for upgrade instructions.

Follow these steps to install the Mandiant Advantage Threat Intelligence Engine App via TC Exchange™:

  1. Log into ThreatConnect as a System Administrator.
  2. Hover over SettingsSettings iconon the top navigation bar and select TC Exchange Settings. Then select the Catalog tab on the TC Exchange Settings screen.
  3. Locate the Mandiant Advantage Threat Intelligence Engine App on the Catalog tab. Then click InstallPlus icon_Dark bluein the Options column to install the App.
  4. After you install the Mandiant Advantage Threat Intelligence Engine App, the Feed Deployer will open automatically. Use the Feed Deployer to set up and configure the App. See the “Configuration Parameters” section for more information on the parameters available during the configuration and deployment process.

Upgrade Recommendations

If you installed version 1.0.x of the Mandiant Advantage Threat Intelligence Engine App previously, there are two ways to upgrade to version 2.0.of the App:

  • Option 1: Upgrade using the same Source that the previous version of the App uses
  • Option 2: Upgrade using a new Source (recommended)
Important
Option 2 is the recommended upgrade option because it provides a cleaner and more consistent data experience by keeping data created by version 2.0.of the Mandiant Advantage Threat Intelligence Engine App version separate from data created by version 1.0.x of the App.

Option 1: Upgrade Using the Same Source the Previous Version of the App Uses

Using the same Source that the previous version of the Mandiant Threat Intelligence Engine App uses is best if you want to consolidate Mandiant data into a single Source in ThreatConnect and simplify where you need to look to find Mandiant data. However, having a single Source for Mandiant data created by versions 1.0.x and 2.0.x of the Mandiant Advantage Threat Intelligence Engine App will result in the Source containing two variations of Indicators and Groups that look different, as the data created by each version of the App will have differing content. Also, Indicators and Groups created by version 2.0.of the App tend to have more data than the ones created by version 1.0.of the App.

Upgrade Steps (Same Source)

To upgrade the Mandiant Advantage Threat Intelligence Engine App, you must be a System Administrator.

Step 1: Install Version 2.0.x

Follow these steps to install version 2.0.of the Mandiant Advantage Threat Intelligence Engine App via TC Exchange:

  1. Hover over Settingson the top navigation bar and select TC Exchange Settings. Then select the Catalog tab on the TC Exchange Settings screen.
  2. Locate the Mandiant Advantage Threat Intelligence Engine App on the Catalog tab and confirm that its version number is 2.0.x. Then click Installin the Options column to install the App.
Important
The Feed Deployer will open automatically after installing the Mandiant Advantage Threat Intelligence Engine App. However, do not proceed with deploying the App until you complete the steps outlined in the “Step 2: Turn Off the Service for Version 1.0.x section.
Step 2: Turn Off the Service for Version 1.0x

Follow these steps to turn off the Service associated with version 1.0.of the Mandiant Advantage Threat Intelligence Engine App:

  1. Hover over Playbooks on the top navigation bar and select Services.
  2. Locate the Mandiant Advantage Threat Intelligence Engine Feed API Service on the Services screen (i.e., the Service for version 1.0.x of the Mandiant Advantage Threat Intelligence Engine App), and then turn off the Feed Service toggle in the Type column.
Step 3: Deploy Version 2.0x

Follow these steps to deploy version 2.0.of the Mandiant Advantage Threat Intelligence Engine App:

  1. Hover over Settingson the top navigation bar and select TC Exchange Settings. Then select the Installed tab on the TC Exchange Settings screen.
  2. Locate the Mandiant Advantage Threat Intelligence Engine App on the Installed tab and confirm that its version number is 2.0.x. Then click in the Options column and select Deploy.
  3. Use the Feed Deployer to set up and configure the Mandiant Advantage Threat Intelligence Engine App, ensuring that you use the same Source name that version 1.0.x of the App uses. See the “Configuration Parameters” section for more information on the parameters available during the configuration and deployment process.
Step 4: Validate Functionality for Version 2.0x

Follow these steps to verify that version 2.0.of the Mandiant Advantage Threat Intelligence Engine App is functioning properly after it has been installed and deployed:

  1. Hover over Playbooks on the top navigation bar and select Services.
  2. Locate the Mandiant Advantage Threat Intelligence Engine Feed API Service on the Services screen associated with version 2.0.x of the Mandiant Advantage Threat Intelligence App.
  3. Confirm that the Service’s Memory Usage and CPU Usage values are positive and the Errors count is (Figure 2).
    Figure 2_Mandiant Advantage Threat Intelligence Engine Integration Configuration Guide_Software Version 2.0

     

Step 5: Delete the Service for Version 1.0x

Follow these steps to delete the Service associated with version 1.0.of the Mandiant Advantage Threat Intelligence Engine App:

  1. Hover over Playbooks on the top navigation bar and select Services.
  2. Locate the Mandiant Advantage Threat Intelligence Engine Feed API Service on the Services screen that you turned off in the “Step 2: Turn Off the Service for Version 1.0.x section, click in the Options column, and select Delete.
Important
It is crucial to delete the Service for version 1.0.x of the Mandiant Advantage Threat Intelligence Engine App in order to prevent it from being reactivated.

Outcome and Expected Behavior

Version 2.0.x of the Mandiant Advantage Threat Intelligence Engine App will add data to the existing Source using new data mappings. Consequently, the threat intelligence data objects in the Source will have mixed mappings. For instance, Indicators and Groups created by version 1.0.x of the App will not share the same Tags and Attributes as those created by version 2.0.x of the App. Be aware of this when reviewing the Source to avoid confusion over data discrepancies.

Option 2: Upgrade Using a New Source (Recommended)

Using a new Source is the recommended upgrade option because it provides a cleaner and more consistent data experience by keeping data created by version 2.0.x of the Mandiant Advantage Threat Intelligence Engine App separate from data created by version 1.0.x of the App.

Upgrade Steps (Same Source)

To upgrade the Mandiant Advantage Threat Intelligence Engine App, you must be a System Administrator.

Step 1: Install Version 2.0.x

Follow these steps to install version 2.0.of the Mandiant Advantage Threat Intelligence Engine App via TC Exchange:

  1. Hover over Settingson the top navigation bar and select TC Exchange Settings. Then select the Catalog tab on the TC Exchange Settings screen.
  2. Locate the Mandiant Advantage Threat Intelligence Engine App on the Catalog tab and confirm that its version number is 2.0.x. Then click Installin the Options column to install the App.
Step 2: Deploy Version 2.0x

After you install version 2.0.x of the Mandiant Advantage Threat Intelligence Engine App, the Feed Deployer will open automatically. Use the Feed Deployer to set up and configure the App, ensuring that you use a Source name that is different from the one that version 1.0.x of the App uses (e.g., Mandiant Advantage Threat Intelligence 2). See the “Configuration Parameters” section for more information on the parameters available during the configuration and deployment process.

Step 3: Validate Functionality for Version 2.0x

Follow these steps to verify that version 2.0.of the Mandiant Advantage Threat Intelligence Engine App is functioning properly after it has been installed and deployed:

  1. Hover over Playbooks on the top navigation bar and select Services.
  2. Locate the Mandiant Advantage Threat Intelligence Engine Feed API Service on the Services screen associated with version 2.0.x of the Mandiant Advantage Threat Intelligence App.
  3. Confirm that the Service’s Memory Usage and CPU Usage values are positive and the Errors count is (Figure 2).
Step 4: Delete the Service for Version 1.0x

Follow these steps to delete the Service associated with version 1.0.of the Mandiant Advantage Threat Intelligence Engine App:

  1. Hover over Playbooks on the top navigation bar and select Services.
  2. Locate the Mandiant Advantage Threat Intelligence Engine Feed API Service on the Services screen associated with version 1.0.x of the Mandiant Advantage Threat Intelligence Engine App, click in the Options column, and select Delete.
Important
It is crucial to delete the Service for version 1.0.x of the Mandiant Advantage Threat Intelligence Engine App in order to avoid conflicts with the Service for version 2.0.x of the App.

Outcome and Expected Behavior

All downstream integrations that utilize Mandiant data must be updated to use the new Source containing the threat intelligence data objects created by the new version of the Mandiant Advantage Threat Intelligence Engine App. The Source containing data from the previous version of the App can be retained until it is no longer needed, and then it can be removed. All data in the new Source will adhere to the updated data mappings included in version 2.0.x of the App.

Configuration Parameters

Parameter Definitions

The parameters defined in Table 1 apply to the configuration parameters available when using the Feed Deployer to configure the Mandiant Advantage Threat Intelligence Engine App.

 

NameDescriptionRequired?
Source Tab
Source to CreateEnter the name of the Source to be created in ThreatConnect.Required
OwnerSelect the Organization in which the Source will be created in ThreatConnect.Required
Activate DeprecationSelect this checkbox to allow the creation of depreciation rules for Indicators in the Source.Optional
Create AttributesSelect this checkbox to allow the creation of custom Attribute Types in the Source.Optional
Parameters Tab
Launch ServerSelect tc-job as the launch server for the Service corresponding to the Feed API Service App.Required
Mandiant Indicator TypesSelect the Indicator type(s) to import from Mandiant. It is recommended to select all Indicator types.

Available options include the following:
  • FQDN
  • IPv4
  • IPv6
  • MD5
  • SHA1
  • SHA256
  • URL
Required
Mandiant Group TypesSelect the Group type(s) to import from Mandiant. It is recommended to select all Group types.

Available options include the following:
  • Actors
  • Campaigns
  • Events
  • Malware
  • Tools
  • Signatures
  • Vulnerabilities
Required
Mandiant Report TypesSelect the Report type(s) to import from Mandiant. It is recommended to select all Report types only if you have an active Mandiant Advantage Threat Intelligence subscription to Fusion Reports. Otherwise, do not select any Report types.

Available options include the following:
  • Actor Overview
  • Actor Profile
  • Country Profile
  • Credit Card Shop Report
  • Event Coverage/Implication
  • Executive Perspective
  • FireEye Labs Research
  • Futures Scenario
  • Horizons
  • ICS Security Roundup
  • Industry Reporting
  • Malicious Activity Report
  • Malware Overview
  • Malware Profile
  • Malware Quarterly Industry Report
  • Network Activity Reports
  • News Analysis
  • TTP Deep Dive
  • Tactical Threat Report
  • Targeted Malware Lures
  • Threat Activity Alert
  • Threat Activity Report
  • Trends and Forecasting
  • Vulnerability Report
  • Weekly Vulnerability Exploitation Report
Required
Minimum Threat Score FilterEnter the minimum Mandiant Indicator Threat Score that Indicators in Mandiant must have in order to be imported into ThreatConnect. The default value is 60.

Mandiant Indicator Threat Score represents the genuine level of threat an Indicator presents to an organization. For more information on Mandiant Indicator Threat Score, see https://docs.mandiant.com/home/mati-indicator-threat-score-methodology (must have a valid Mandiant account to view this documentation).
Required
Exclude OSINTSelect this checkbox to prevent open-source intelligence (OSINT) from being imported into ThreatConnect. By default, this checkbox is selected.Required
Variables Tab
Mandiant Advantage API PublicEnter the Mandiant Advantage Threat Intelligence ID.Required
Mandiant Advantage API SecretEnter the Mandiant Advantage Threat Intelligence API secret key.Required

Data Mappings

The data mappings in Table 2 through Table 9 illustrate how data are mapped from Mandiant API endpoints into the ThreatConnect data model.

Actors (From Threat-Actors Endpoint)

ThreatConnect object type: Intrusion Set Group

 

Mandiant API FieldThreatConnect Field
name
  • Name/Summary
  • Tag: "Intrusion Set: %name%"
descriptionAttribute: "Description" (default)
idAttribute: "External ID"
aliases[*].nameAttribute: "Aliases" (newline delimited)
last_updatedAttribute: "External Date Last Modified"
motivations[*].nameAttribute: "Adversary Motivation Type"
industries[*].nameAttribute: "Targeted Industry Sector"
observed[*].earliest (confirmed)Attribute: "First Seen" (ingested only when the attribution scope Mandiant API field has a value of confirmed)
malware[*].idAssociated Malware Group
malware[*].nameTag: "Malware: %name%"
locations.source.region.nameAttribute: "Source Region"
locations.source.sub_region.nameAttribute: "Source Sub Region"
location.source.country.iso2Attribute: "Source Country Code"
locations.target[*].iso2Attribute: "Target Country Code"
locations.target[*].target_regionAttribute: "Target Region"
locations.target[*].target_sub-regionAttribute: "Target Sub Region"
cve[*].idAssociated Vulnerability Group
cve[*].nameTag: "Vulnerability: %name%"
associated_uncs[*].idAssociated Intrusion Set Group
last_activity_timeAttribute: "Last Seen"
tools.idAssociated Tool Group
tools.nameTag: "Tool: %name%"
attack_patterns.{attack_pattern_id}.attack_pattern_identifierATT&CK Tag

Indicators (From Indicators Endpoint)

ThreatConnect object type: Indicator (Address, File, Host, or URL)

 

Mandiant API FieldThreatConnect Field
idAttribute: "External ID"
valueIndicator Value
first_seenAttribute: "First Seen"
last_seenAttribute: "Last Seen"
last_updatedLast Modified Date
sources.source_name
sources.osint
sources.first_seen
sources.last_seen
sources.category
Attribute: "Source"

The Attribute’s value is a Markdown-formatted table with the following columns:
  • Name
  • OSINT
  • First Seen
  • Last Seen
  • Category
mscoreAttribute: "Mscore"
attributed_associations.name
attributed_associations.type
  • Tag: "%type%: %name%" (%type% will be either Malware or Intrusion Set)
  • Associated Malware Group (if the type Mandiant API field has a value of Malware) or Intrusion Set Group (if the type Mandiant API field has a value of Intrusion Set)
reports/report_idAssociated Report Group
campaign/idAssociated Campaign Group
threat-rating.confidence_levelAttribute: "Confidence Level"
threat-rating.confidence_scoreConfidence Rating
threat-rating.severity_levelAttribute: "Threat Level"
threat-rating.threat_scoreThreat Rating
categoryAttribute: "Role"
verdict_simpleAttribute: "Verdict"

The Attribute’s value is a Markdown-formatted table with the following columns:
  • Timestamp
  • Sources
  • Verdict
  • Verdict Source

Reports (From Reports Endpoint)

ThreatConnect object type: Report Group

 

Mandiant API FieldThreatConnect Field
report_IdAttribute: "External ID"
title
  • Name/Summary
  • Attribute: "Report Title"
threat_scapeAttribute: "Category"
audienceTag: "Audience: %audience%"
publish_datePublish Date
versionAttribute: "Version"
report_typeAttribute: "Report Type"
executive_summaryAttribute: "Description" (default)
cve_ids
  • Tag: "Vulnerability: %cve_id%"
  • Associated Vulnerability Group
previous_versionsAttribute: "Previous Versions"

The Attribute’s value is a Markdown-formatted table with the following columns:
  • Publish Date
  • Report ID
  • Title
  • Version Number
tags[*].actors.idAssociated Intrusion Set Group
tags[*].actors.nameTag: "Intrusion Set: %name%"
tags[*].affected_industriesAttribute: "Targeted Industry Sector"
tags[*].intended_effectsAttribute: "Intended Effects"
tags[*].motivationsAttribute: "Adversary Motivation Type"
tags[*].malware_families.idAssociated Malware Group
tags[*].malware_families.nameTag: "Malware: %name%"
tags[*].operating_systemsAttribute: "Operating System"
tags[*].ttpsAttribute: "Capability"
tags[*].target_geographiesAttribute: "Target Geography"
tags[*].affected_systemsAttribute: "Affected Systems"
tags[*].source_geographiesAttribute: "Source Geography"
tags[*].targeted_informationsAttribute: "Target Information"

Malware and Tool (From Malware Endpoint)

ThreatConnect object type: Malware or Tool Group

Note
If the inherently_malicious Mandiant API field has a value of 1, ThreatConnect creates a Malware Group. If inherently_malicious has a value of 0, ThreatConnect creates a Tool Group.

 

Mandiant API FieldThreatConnect Field
idAttribute: "External ID"
nameName/Summary
descriptionAttribute: "Description" (default)
last_updated
  • Last Modified Date
  • Attribute: "External Date Last Modified"
operation_systemsAttribute: "Operating System"
aliases[*].nameAttribute: "Aliases" (newline delimited)
capabilitiesAttribute: "Capability"
industries[*].nameAttribute: "Targeted Industry Sector"
detectionsAttribute: "Detections" (newline delimited)
rolesAttribute: "Role"
actors/{index}/idAssociated Intrusion Set Group
actors/{index}/nameTag: "Intrusion Set: %name%"
cve
  • Tag: "Vulnerability: %cve%"
  • Associated Vulnerability Group
yara.idAssociated Signature Group
malware/{index}/idAssociated Malware Group
malware/{index}nameTag: "Malware: %name%"
last_activity_timeAttribute: "Last Seen"
attack_patterns.{attack_pattern_id}.attack_pattern_identifierATT&CK Tag

Signature (From Yara Endpoint)

ThreatConnect object type: Signature Group

 

Mandiant API FieldThreatConnect Field
created
  • Date Added
  • Attribute: "External Date Created"
idAttribute: "External ID"
malware.idAssociated Malware Group
malware.nameTag: "Malware: %name%"
modified
  • Last Modified Date
  • Attribute: "External Date Last Modified"
nameName/Summary
ruleSignature File Content

Campaign (From Campaign Endpoint)

ThreatConnect object type: Campaign Group

 

Mandiant API FieldThreatConnect Field
id
  • XID
  • Attribute: "External ID"
nameName/Summary
descriptionAttribute: "Description" (default)
campaign_typeAttribute: "Campaign Type"
last_activity_time
  • Attribute: "Last Seen"
  • Attribute: "External Date Last Modified"
actors/idAssociated Intrusion Set Group (ingested only when the attribution scope Mandiant API field has a value of confirmed)
actors/nameTag: "Intrusion Set: %name%" (ingested only when the attribution scope Mandiant API field has a value of confirmed)
malware/idAssociated Malware Group (ingested only when the attribution scope Mandiant API field has a value of confirmed)
malware/nameTag: "Malware: %name%" (ingested only when the attribution scope Mandiant API field has a value of confirmed)
tools/idAssociated Tool Group (ingested only when the attribution scope Mandiant API field has a value of confirmed)
tools/nameTag: "Tool: %name%" (ingested only when the attribution scope Mandiant API field has a value of confirmed)
vulnerabilities/cve_id
  • Associated Vulnerability Group
  • Tag: "Vulnerability: %cve_id%"
(ingested only when the attribution scope Mandiant API field has a value of confirmed)
industries/nameAttribute: "Target Industry Sector"
target_locations/countries/iso2Attribute: "Target Country Code"
target_locations/regions/nameAttribute: "Target Region"
target_locations/sub_regions/nameAttribute: "Target Sub Region"
attack_patterns.{attack_pattern_id}.attack_pattern_identifierATT&CK Tag

Timeline (From Campaign Endpoint)

ThreatConnect object type: Event Group

 

Mandiant API FieldThreatConnect Field
timeline/nameAttribute: "Timeline"
timeline/briefAttribute: "Description" (default)
timeline/analyst_briefAttribute: "Additional Analysis and Context"
timeline/timestampEvent Date
timeline/mitre_techniques/nameAttribute: "Capability" (ingested only when the attribution scope Mandiant API field has a value of confirmed)
timeline/used_by/actor/idAssociated Intrusion Set Group
timeline/used_by/actor/nameTag: "Intrusion Set: %name%"
timeline/attributions/malware/idAssociated Malware Group (ingested only when the attribution scope Mandiant API field has a value of confirmed)
timeline/attributions/malware/nameTag: "Malware: %name%" (ingested only when the attribution scope Mandiant API field has a value of confirmed)
timeline/attributions/actor/idAssociated Intrusion Set Group (ingested only when the attribution scope Mandiant API field has a value of confirmed)
timeline/attributions/actor/nameTag: "Intrusion Set: %name%" (ingested only when the attribution scope Mandiant API field has a value of confirmed)
timeline/attributions/vulnerabilities/cve_id
  • Tag: "Vulnerability: %cve_id%"
  • Associated Vulnerability Group
(ingested only when the attribution scope Mandiant API field has a value of confirmed)

Vulnerability (From Vulnerability Endpoint)

ThreatConnect object type: Vulnerability Group

 

Mandiant API FieldThreatConnect Field
titleAttribute: "Title"
idAttribute: "External ID"
descriptionAttribute: "Description" (default)
risk_ratingTag: "Risk Rating: %risk_rating%"
analysisAttribute: "Additional Analysis and Context"
executive_summaryAttribute: "Executive Summary"
exploitation_vectorsAttribute: "Exploitation Vector"
exploitation_consequenceAttribute: "Exploitation Consequence"
exploitation_stateAttribute: "Exploitation State"
cwe_details/idTag: "%id%"
cve_idName/Summary
vendor_fix_references/{index}/url
vendor_fix_references/{index}/name
Attribute: "Vendor Fix URL"
date_of_disclosureAttribute: "Date of Disclosure"
observed_in_the_wildAttribute: "Observed in Wild"
was_zero_dayAttribute: "Was Zero Day"
last_modified_date
  • Last Modified Date
  • Attribute: "External Date Last Modified"
workarounds_listAttribute: "Workaround"
publish_dateAttribute: "Report Publish Date"
available_mitigation/{index}Attribute: "Mitigations"
sources/{index}/source_name
sources/{index}/source_description
sources/{index}/date
sources/{index}/url
Attribute: "Source"
exploits/{index}Attribute: "Exploits"
associated_actors/{index}Associated Intrusion Set Group
associated_malware/{index}Associated Malware Group
associated_reports/{index}Associated Report Group
common_vulnerability_scores/v2.0/access_complexity
  • Attribute: "CVSS v2 Access Complexity"
  • Tag: "Attack Complexity: %value%"
common_vulnerability_scores/v2.0/base_scoreAttribute: "CVSS Score v2"
common_vulnerability_scores/v2.0/integrity_impact
  • Attribute: "CVSS v2 Integrity"
  • Tag: "Integrity Impact: %value%"
common_vulnerability_scores/v2.0/access_vector
  • Attribute: "CVSS v2 Access Vector"
  • Tag: "Attack Vector: %value%"
common_vulnerability_scores/v2.0/authenticationAttribute: "CVSS v2 Authentication"
common_vulnerability_scores/v2.0/availability_impact
  • Attribute: "CVSS v2 Availability"
  • Tag: "Availability Impact: %value%"
common_vulnerability_scores/v2.0/temporal_scoreAttribute: "CVSS Temporal Score v2"
common_vulnerability_scores/v2.0/exploitabilityAttribute: "CVSS v2 Exploitability"
common_vulnerability_scores/v2.0/confidentiality_impact
  • Attribute: "CVSS v2 Confidentiality"
  • Tag: "Confidentiality Impact: %value%"
common_vulnerability_scores/v3.1/attack_complexity
  • Attribute: "CVSS v3 Attack Complexity"
  • Tag: "Attack Complexity: %value%"
common_vulnerability_scores/v3.1/base_scoreAttribute: "CVSS Score v3"
common_vulnerability_scores/v3.1/integrity_impact
  • Attribute: "CVSS v3 Integrity Impact"
  • Tag: "Integrity Impact: %value%"
common_vulnerability_scores/v3.1/report_confidence
  • Attribute: "CVSS v3 Report Confidence"
  • Tag: "Report Confidence: %value%"
common_vulnerability_scores/v3.1/attack_vector
  • Attribute: "CVSS v3 Attack Vector"
  • Tag: "Attack Vector: %value%"
common_vulnerability_scores/v3.1/privileges_required
  • Attribute: "CVSS v3 Privileges Required"
  • Tag: "Privileges Required: %value%"
common_vulnerability_scores/v3.1/availability_impact
  • Attribute: "CVSS v3 Availability Impact"
  • Tag: "Availability Impact: %value%"
common_vulnerability_scores/v3.1/temporal_scoreAttribute: "CVSS Temporal Score v3"
common_vulnerability_scores/v3.1/exploit_code_maturity
  • Attribute: "CVSS v3 Exploit Code Maturity"
  • Tag: "Exploit Code Maturity: %value%"
common_vulnerability_scores/v3.1/user_interaction
  • Attribute: "CVSS v3 User Interaction"
  • Tag: "User Interaction: %value%"
common_vulnerability_scores/v3.1/scope
  • Attribute: "CVSS v3 Scope"
  • Tag: "Scope: %value%"
common_vulnerability_scores/v3.1/confidentiality_impact
  • Attribute: "CVSS v3 Confidentiality Impact"
  • Tag: "Confidentiality Impact: %value%"
common_vulnerability_scores/v3.1/remediation_level
  • Attribute: "CVSS v3 Remediation Level"
  • Tag: "Remediation Level: %value%"
affects_otAttribute: "OT Related"
aliasesAttribute: "Aliases" (newline delimited)
epss/percentileAttribute: "EPSS Percentile"
epss/scoreAttribute: "EPSS Score"
mve_id
  • Name/Summary
  • Attribute: "MVE ID"
Note
The mve_id Mandiant API field is mapped to a Vulnerability Group’s name in certain situations. For example, if a Vulnerability Group represents a zero-day vulnerability that has not been assigned a CVE ID, the vulnerability’s MVE ID will be used as the Vulnerability Group’s name. If a CVE ID is later assigned to a vulnerability with only an MVE ID, the corresponding Vulnerability Group’s name will be updated to replace the MVE ID with the CVE ID.
version_historyAttribute: "Previous Versions"
vulnerable_cpes/vendor_nameAttribute: "Vulnerable Vendor"
vulnerable_cpes/technology_nameAttribute: "Vulnerable Product"
cpe_ranges/start_cpe/vendor
cpe_ranges/start_cpe/product
cpe_ranges/start_cpe/version
cpe_ranges/end_cpe/version
Attribute: "Vulnerable Products"

The Attribute’s value is a Markdown-formatted table with the following columns:
  • Vendor
  • Product
  • Start Version
  • End Version

Frequently Asked Questions (FAQ)

How is Mandiant Threat Score mapped to Indicators in ThreatConnect?

In November 2023, Mandiant introduced Threat Score for Indicators, which builds on the existing MScore. Mandiant Threat Score is a combination of confidence and severity and reflects the likelihood of an Indicator being malicious. A Threat Score of 0 indicates no confidence in the Indicator being malicious, while a Threat Score of 100 indicates full confidence in the Indicator being malicious. In ThreatConnect, the 100-point Mandiant Threat Score scale is mapped to the five-skull Threat Rating scale as follows:

Mandiant Threat ScoreThreatConnect Threat Rating
0–190 Skulls
20–391 Skull
40–592 Skulls
60–743 Skulls
75–894 Skulls
90–1005 Skulls

ThreatConnect® is a registered trademark, and TC Exchange™ is a trademark, of ThreatConnect, Inc.
Mandiant® is a registered trademark of Mandiant, Inc.
MITRE ATT&CK® and ATT&CK® are registered trademarks of The MITRE Corporation.

30002-08 EN Rev. A


Was this article helpful?