Threat Intelligence Engine for Recorded Future Integration User Guide
  • 18 Sep 2025
  • 26 Minutes to read
  • Dark
    Light
  • PDF

Threat Intelligence Engine for Recorded Future Integration User Guide

  • Dark
    Light
  • PDF

Article summary

Software Version
This guide applies to the Threat Intelligence Engine for Recorded Future App version 2.0.7. Click here to view Recorded Future Intelligence Engine Integration Guide for version 1.0.x.

Overview

The ThreatConnect® integration with Recorded Future® ingests Risk List entities (Domain, Hash, IP, URL, and Vulnerability), Threat Map entities (Malware and Actor), Alert (Standard and Playbook) entities, and Analyst Notes from Recorded Future. It then creates corresponding objects with select Recorded Future metadata in ThreatConnect.

Dependencies

ThreatConnect Dependencies

  • Active ThreatConnect Application Programming Interface (API) key
  • ThreatConnect instance with version 7.6.2 or newer installed
Note
All ThreatConnect dependencies will be provided by default to subscribing ThreatConnect Cloud customers. Customers on Dedicated Cloud and On-Premises instances can enable these settings on the Account Settings screen within their ThreatConnect instance.

Recorded Future Dependencies

  • Active Recorded Future API token
    Important
    Follow the instructions in the “Setup” section of the Recorded Future Get Started guide to generate a Recorded Future API token. You must be an Enterprise Admin in Recorded Future to generate a Recorded Future API token. Refer to the Recorded Future Get Started guide for information on the entitlements assigned to the API token, based on the modules included in your Recorded Future subscription.
  • Active Recorded Future module subscriptions:
    • Risk List: SecOps Intelligence, Threat Intelligence, and/or Vulnerability Intelligence (see the “Risk List Types” row in Table 1 for more information)
    • Threat Map: Threat Intelligence module
    • Standard Alerts: The required subscription varies by module. Please refer to the Recorded Future documentation (requires a login to view) for more information.
    • Playbook Alerts: The required subscription varies by module. Please refer to the Recorded Future documentation (requires a login to view) for more information.

Application Setup and Configuration

Follow these steps to install the ThreatConnect Intelligence Engine for Recorded Future App

  1. Identify the version of the ThreatConnect integration with Recorded Future you have deployed as a Service on your ThreatConnect instance.
  2. If Version 1 is deployed as a Service, turn off and delete the Service for Version 1.
  3. Install and configure Version 2.

Step 1: Identify Deployed App Version

There are two versions of the ThreatConnect integration with Recorded Future:

  • Version 1: Recorded Future Intelligence Engine 1.0.x (deprecated)
  • Version 2: Threat Intelligence Engine for Recorded Future 2.0.x (formerly Recorded Future Intelligence Engine 2.0.x)

Follow these steps to determine the version of the ThreatConnect integration with Recorded Future that is deployed as a Service on your ThreatConnect instance:

  1. Log into ThreatConnect with a System Administrator account.
  2. From the Automation & Feeds menu on the top navigation bar, select Services.
  3. Enter recorded future in the Name search bar at the top of the Services screen. The App name returned by the search results (Recorded Future Intelligence Engine for Version 1; Threat Intelligence Engine for Recorded Future for Version 2) identifies the version of the ThreatConnect integration with Recorded Future that is deployed as a Service on your ThreatConnect instance (or, if no results are returned, then you do not have any version of the App deployed as a Service on your ThreatConnect instance):
    • Recorded Future Intelligence Engine: Version 1
    • Threat Intelligence Engine for Recorded Future: Version 2

Step 2: Turn Off and Delete the Service for Version 1

Important
Perform this step only if the Recorded Future Intelligence Engine (Version 1) App is deployed as a Service on your ThreatConnect instance. Otherwise, proceed to Step 3.

Follow these steps to turn off and delete the Service for the Recorded Future Intelligence Engine (Version 1) App:

  1. Log into ThreatConnect with a System Administrator account.
  2. From the Automation & Feeds dropdown on the top navigation bar, select Services.
  3. Locate the Recorded Future Intelligence Engine Feed Service.
  4. Turn off the toggle in the Type column.
  5. Select Delete from the Options menu for the Service.
  6. Click Delete in the Delete Service? window to delete the Service for Recorded Future Intelligence Engine.

Step 3: Install and Configure Version 2

Follow these steps to install and configure the Threat Intelligence Engine for Recorded Future (Version 2) App via TC Exchange™:

Warning
Follow the steps in this section only if you do not have, or you have deleted, the Service for the Recorded Future Intelligence Engine (Version 1) App on your ThreatConnect instance.
  1. Log into ThreatConnect with a System Administrator account.
  2. From the SettingsSettings iconmenu on the top navigation bar, select TC Exchange Settings. Then select the Catalog tab on the TC Exchange Settings screen.
  3. Locate the Threat Intelligence Engine for Recorded Future App on the Catalog tab. Then click InstallPlus icon_Dark bluein the Options column to install the App.
  4. After you install the Threat Intelligence Engine for Recorded Future App, the Feed Deployer will open automatically. Use the Feed Deployer to set up and configure the App. See the “Configuration Parameters” section for more information on the parameters available during the configuration and deployment process.
    Important
    If you turned off and deleted the Service for the Recorded Future Intelligence Engine (Version 1) App in Step 2, make sure to enter the name of the Source used for the Recorded Future Intelligence Engine App in the Sources to Create field on the Source tab of the Feed Deployer window. If you enter a different name, then a new Source will be created for data ingestion from the Threat Intelligence Engine for Recorded Future (Version 2) App.

Configuration Parameters

Parameter Definitions

The parameters defined in Table 1 apply to the configuration parameters available when using the Feed Deployer to configure the Threat Intelligence Engine for Recorded Future App.

 

NameDescriptionRequired?
Source Tab
Sources to CreateEnter the name of the Source for the feed.
Important
If you turned off and deleted the Service for the Recorded Future Intelligence Engine (Version 1) App when setting up and configuring the Threat Intelligence Engine for Recorded Future (Version 2) App, make sure to enter the name of the Source used for the Recorded Future Intelligence Engine App in the Sources to Create field on the Source tab of the Feed Deployer window. If you enter a different name, then a new Source will be created for data ingestion from the Threat Intelligence Engine for Recorded Future (Version 2) App.
Required
OwnerSelect the Organization in which the Source will be created.Required
Activate DeprecationSelect this checkbox to allow confidence deprecation rules to be created and applied to Indicators in the Source.Optional
Create AttributesSelect this checkbox to allow custom Attribute Types to be created in the Source.Optional
Parameters Tab
Launch ServerSelect tc-job as the launch server for the Service corresponding to the Feed API Service App.Required
Minimum Risk Score for items being collected.*Select the minimum risk score that Risk List entities must have to be ingested into ThreatConnect. For example, if you select 80 from the dropdown, the App will ignore all Risk List entities with a risk score less than 80. The default value is 65.Required
Risk List TypesSelect one or more Recorded Future Risk List entity types to ingest. Available choices include the following:
  • Domain
  • Hash
  • IP
  • URL
  • Vulnerability
Note

The Domain, Hash, IP, and URL Risk List types are included in the SecOps Intelligence and Threat Intelligence modules available in the Recorded Future subscription. Because these modules are the most common, these Risk List types are selected by default. The Vulnerability Risk List type is not selected by default because it is included in the Vulnerability Intelligence module, which must be purchased separately from your Recorded Future subscription.

For assistance with managing your Recorded Future module subscriptions, please contact your Recorded Future Customer Success Representative.

Note

Each option available for the Risk List Types parameter (Domain, Hash, IP, URL, and Vulnerability) determines how links are followed during the integration's operational processes, as the integration will attempt to follow links for only the selected types.

For example, if you select only IP and Hash from the Risk List Types dropdown and the integration sees an Address Indicator with links to an IP, a Hash, and a URL, the integration will follow only the IP and Hash links for the Address Indicator.
Optional
Collect Indicators Linked in Recorded Future Less Than the Minimum Risk ScoreSelect this checkbox to ingest associated Indicators with a risk score less than the minimum risk score (i.e., the value for the Minimum Risk Score parameter) for entities linked to Risk List types. If this checkbox is cleared, the App will ignore all associated objects whose risk score is less than the minimum risk score. By default, this checkbox is cleared.Optional
Threat Map TypesSelect one or more Recorded Future Threat Map entity types to ingest. Available choices include the following:
  • Malware
  • Actor
Optional
Collect Threat Map Links in Recorded Future Less Than the Minimum Risk ScoreSelect this checkbox to ingest associated Indicators with a risk score less than the minimum risk score (i.e., the value for the Minimum Risk Score parameter) for entities linked to Threat Map types. If this checkbox is cleared, the App will ignore all associated objects whose risk score is less than the minimum risk score. By default, this checkbox is cleared.Optional
Alert TypesSelect one or more Recorded Future Alert entity types to ingest. Available choices include the following:
  • Standard Alert
  • Standard Alert
  • Playbook Alert: Domain Abuse
  • Playbook Alert: Vulnerability
  • Playbook Alert: Third Party Risk
  • Playbook Alert: Data Leak on Code Repo
  • Playbook Alert: Malware Report
  • Playbook Alert: Geopolitics Facility
  • Playbook Alert: Identity Novel Exposures
Optional
Playbook Alert Priority LevelsSelect one or more Recorded Future Playbook Alert priority levels. Only Playbook Alerts with the selected priority levels will be ingested. Available choices include the following:
  • High
  • Moderate
  • Informational
Optional
Collect Standard Alert Entities in Recorded Future Less Than the Minimum Risk ScoreSelect this checkbox to ingest associated Indicators with a risk score less than the minimum risk score (i.e., the value for the Minimum Risk Score parameter) for entities linked to Standard Alert types. If this checkbox is cleared, the App will ignore all associated objects whose risk score is less than the minimum risk score. By default, this checkbox is cleared.Optional
Advanced Settings
Warning
Configure this field with caution and only when necessary. In ThreatConnect, an Indicator’s Confidence Rating is one of the factors used to calculate the Indicator’s ThreatAssess score. If you are an existing user of the Threat Intelligence Engine for Recorded Future App or the Recorded Future Threat Intelligence Engine App and you have never configured this field—which was introduced in version 2.0.7—before, then all Indicators in the Source configured for the App were ingested with a Confidence Rating of 0 (Unassessed). Configuring newly ingested Indicators to have a different default Confidence Rating will cause discrepancies in the way the ThreatAssess score is calculated for new Indicators versus the way it is calculated for existing Indicators. It is recommended that existing users assign Confidence Rating to Indicators individually after examination rather than configure a default Confidence Rating in the Advanced Settings field.

If you have not previously ingested data from either version of the ThreatConnect integration with Recorded Future, then it is recommended to set the default Confidence Rating to risk_score.

The Advanced Settings field allows you to specify a default Confidence Rating for all Indicators ingested from Recorded Future. Configure this field in one of the following three ways:

  • (Recommended for existing integrations) Leave the field blank. All ingested Indicators will have a Confidence Rating of 0 (Unassessed).
  • (Recommended for newly installed integrations) Enter default_confidence=risk_score. Each ingested Indicator will have a Confidence Rating that matches its risk score in Recorded Future.
  • Enter default_confidence=<number>, where <number> is a whole number from 0 to 100. All ingested Indicators will have a Confidence Rating of the provided number. Example: default_confidence=37.
Note
The value entered in the Advanced Settings field will also be used in ad-hoc Job requests.
Optional
Variables Tab
Recorded Future API TokenThe Recorded Future API token.Required
Confirm Tab
Run Feeds after deploymentSelect this checkbox to run the Threat Intelligence Engine for Recorded Future App immediately after the deployment configuration is complete (i.e., after you click DEPLOY on the Feed Deployer window).Optional
Confirm Deployment Over Existing SourceThis checkbox will be displayed if the Source entered in the Sources to Create field has previously been deployed to the Organization selected in the Owner dropdown on the Source tab. Select this checkbox to confirm that you want the Threat Intelligence Engine for Recorded Future App to write data to the same Source. This process will create a new Service for the Threat Intelligence Engine forRecorded Future App. As such, it is recommended that you delete the old Service associated with the Threat Intelligence Engine for Recorded Future App after the new one is created.
Important
If you do not select this checkbox, the DEPLOY button will be grayed out, and you will not be able to deploy the Service. Return to the Source tab and enter a different Source or select a different Organization and then proceed through the tabs of the Feed Deployer window again.
Optional

Threat Intelligence Engine for Recorded Future UI

After installing and deploying the Threat Intelligence Engine for Recorded Future App, you can access the Threat Intelligence Engine for Recorded Future user interface (UI), where you can manage data ingestion from Recorded Future into ThreatConnect.

Follow these steps to access the Threat Intelligence Engine for Recorded Future UI:

  1. Log into ThreatConnect with a System Administrator account.
  2. From the Automation & Feeds dropdown on the top navigation bar, select Services.
  3. Locate and turn on the Threat Intelligence Engine for Recorded Future Feed Service.
  4. Click the link in the Service’s API Path field. The Threat Intelligence Engine for Recorded Future UI will open in a new browser tab.

The following screens are available in the Threat Intelligence Engine for Recorded Future UI:

Dashboard

The Dashboard screen (Figure 1) provides an overview of the total number of Risk List entities (Domain, Hash, IP, URL, and Vulnerability), Threat Map entities (Malware and Intrusion Set), Alert entities (Event and Document) and Analyst Notes (Report, Email Address, Domain, Hash, IP, URL, Vulnerability, Malware, and Intrusion Set) retrieved from Recorded Future. Depending on the available data, cards representing all or a subset of these object types will be displayed on the Dashboard screen.

Note
Address on the Dashboard screen corresponds to the IP Risk List entity type, and Intrusion Set corresponds to the Actor Threat Map entity type.

Figure 1_Threat Intelligence Engine for Recorded Future Integration User Guide_Software Version 2.0.7

 

Jobs

The Jobs screen (Figure 2) breaks down the ingestion of Recorded Future data into manageable Job-like tasks, displaying all processes that are pending, in progress, complete, and failed. The menu in a Job’s row provides the following options:

  • Details: View details for the Job, such as counts of downloaded and batched Groups and start and end times for Alert monitoring, download, and upload.
  • Download Files: Download metadata files for all Jobs and data (convert, download, and upload) files for completed Jobs.
  • Batch Errors: View errors that have occurred for the Job on the Batch Errors screen.

Figure 2_Threat Intelligence Engine for Recorded Future Integration User Guide_Software Version 2.0.7

 

You can filter Threat Intelligence Engine for Recorded Future App Jobs by the following elements:

  • Job ID: Enter text into this box to search for a Job by its Job ID.
  • Job Type: Select Job types to display on the Jobs screen. 
  • Status: Select Job statuses to display on the Jobs screen.
  • Pipeline: Select the pipeline types to display on the Jobsscreen:
    • alerts: Alert entities
    • analyst_note: Analyst Note entities
    • threat_intel: Risk List and Threat Map entities

Add a Job

You can add ad-hoc Jobs on the Jobs screen. Follow these steps to create a request for an ad-hoc Job for the Threat Intelligence Engine for Recorded Future App:

  1. Click Add Job (Figure 2).
  2. Fill out the fields on the Add Job drawer (Figure 3) as follows: Figure 3_Threat Intelligence Engine for Recorded Future Integration User Guide_Software Version 2.0.7

     

    • Risklist Types: (Optional) Select the Risk List entity types to include in the ad-hoc Job.
    • Threat Map Types: (Optional) Select the Threat Map entity types to include in the ad-hoc Job.
    • Alert Types: (Optional) Select the Alert entity types to include in the ad-hoc Job.
    • Alert Start Time: (Optional) Enter the time at which monitoring for triggered Alerts should start.
      Note
      Alert Start Time applies only to Alert entities. If no value is specified, the 1000 most recent Alerts will be downloaded.
    • Alert End Time: (Optional) Enter the time at which monitoring for triggered Alerts should end.
      Note
      Alert End Time applies only to Alert entities. If no value is specified, the 1000 most recent Alerts will be downloaded.
    • Download Analyst Notes: (Optional) Select Yes to download Analyst Notes for the selected Risklist Types.
    • Analyst Note Timeframe: (Optional) Enter the timeframe for which Analyst Notes should be downloaded, using one of the following formats:
      Note
      If you do not enter a value, then the default value of -1d will be used.
      • Absolute date: Enter a date in YYYYMMDD format. Analyst Notes published on or after that date will be downloaded.
        Example
        The following format variations provide valid input:
        • 20250908
        • 2025-09-08
        • 2025-9-8
      • Relative date: Enter a lookback time window. Analyst Notes published on or after the date and time at which the lookback window begins will be downloaded. The lookback window must start with a minus sign (-) to indicate that the window is historic.
        Example
        The following format variations provide valid input:
        • -3d
        • -2d 50m
        • -0d 50m 30s
  3. Click Submit to submit the request for the ad-hoc Job.

Tasks

The Tasks screen (Figure 4) displays all Tasks that may be part of a Job, including each step of the download, convert, and upload processes, as well as Tasks for the Threat Intelligence Engine for Recorded Future App, such as Monitor, Scheduler, and Cleaner. The current status (Idle, Paused, or Running), name, description, and heartbeat timeout length, in minutes, are displayed for each Task. The menu in a Task’s row provides the following options, depending on the Task’s status:

  • Run (idle and paused Tasks only)
  • Pause (idle and running Tasks only)
  • Resume (paused Tasks only)
  • Kill (running Tasks only)

Under the table is a dashboard where you can view runtime analytics.

Figure 4_Threat Intelligence Engine for Recorded Future Integration User Guide_Software Version 2.0.7

 

Download

The Download screen (Figure 5) lets you download JavaScript® Object Notation (JSON) data for Recorded Future entities and then upload the data into ThreatConnect.

Figure 5_Threat Intelligence Engine for Recorded Future Integration User Guide_Software Version 2.0.7

 

Follow these steps to download JSON data for a Recorded Future entity on the Download screen and then upload the data into ThreatConnect:

  1. Recorded Future Type: Select a Recorded Future entity type from the following options: IPAddress (IP), URL, Hash, InternetDomainName (Domain), CyberVulnerability (Vulnerability), Analyst Note, Malware, Actor, StandardAlert, Playbook Alert: Domain Abuse, Playbook Alert: Vulnerability, Playbook Alert: Third Party Risk, Playbook Alert: Data Leak On Code Repo, Playbook Alert: Malware Report, Playbook Alert: Geopolitics Facility, and Playbook Alert: Identity Novel Exposures.
  2. External ID: Enter the ID for the Recorded Future entity of the selected type. For IP, URL, Hash, and Domain Risk List entities, prepend ip:, url:, hash:, and idn:, respectively, to the entity's ID. For Vulnerability Risk List entities, use the CVE ID or Recorded Future ID. The following examples demonstrate the ID format for each Recorded Future entity type:
    • IPAddress: ip:124.71.84.65
    • URL: url:https://send.exploit.in/
    • Hash: hash:092910024190a2521f21658be849c4ac9ae6fa4d5f2ecd44c9055cc353a26875
    • InternetDomainName: idn:efavengh.com
    • CyberVulnerability: CVE-2019-0841or ZgFn9x
    • Analyst Note: 4gSsx8
    • Malware: l3moPJ
    • Actor: eTMnra
    • StandardAlert: -QfHWt
    • Playbook Alerts: task:09e6c192-0f88-4f3e-813c-f6b73bbc95a4
      Note
      All Playbook Alert types have the same ID format.
  3. Click Download. The JSON data will be displayed in two columns: Results (raw JSON data) and Converted (JSON data in ThreatConnect batch format) (Figure 6).Figure 6_Threat Intelligence Engine for Recorded Future Integration User Guide_Software Version 2.0.7

     

  4. Click Upload to submit the converted threat intelligence data via the ThreatConnect Batch API.

Batch Errors

The Batch Errors screen (Figure 7) displays an overview of the batch error types that have occurred for Job requests. You can enter keywords to filter by Job ID.

Figure 7_Threat Intelligence Engine for Recorded Future Integration User Guide_Software Version 2.0.7

 

Select an error type to open a drawer containing a table with details on all batch errors of that type (Figure 8). You can enter keywords to filter by reason for error.

Figure 8_Threat Intelligence Engine for Recorded Future Integration User Guide_Software Version 2.0.7

 

Attachment Status

The Attachment Status screen (Figure 9) displays a table with details on ThreatConnect's attempts to download Report attachments from Recorded Future.  You can enter keywords to filter the table by the Recorded Future Group ID, which can be useful if you do not see a Recorded Future attachment in ThreatConnect as expected, or by status.

Figure 9_Threat Intelligence Engine for Recorded Future Integration User Guide_Software Version 2.0.7

 

Data Mappings

The data mappings in Table 2 through Table 18 illustrate how data are mapped from Recorded Future Intelligence API endpoints into the ThreatConnect data model.

Domain

ThreatConnect object type: Host Indicator

 

Recorded Future API FieldThreatConnect Field
entity/idAttribute: "External ID"
entity/nameName/Summary
entity/note_entitiesSee the “Note Entity” section for more information.
analystNotes/attributes/validated_onHost-to-Report Association (see the “Analyst Note” section for more information on how data are mapped to the associated Report Group)
analystNotes/attributes/published
analystNotes/attributes/text
analystNotes/attributes/topic/name
analystNotes/attributes/validation_urls/name
analystNotes/attributes/title
analystNotes/attributes/note_entities/name
analystNotes/source/name
analystNotes/id
links/hits/sections/lists/entities/idTag
links/hits/sections/lists/entities/typeATT&CK® Tag (if type = MitreAttackIdentifier)
timestamps/firstSeenAttribute: "First Seen"
timestamps/lastSeenAttribute: "Last Seen"
intelCardSource
risk/score
  • Threat Rating
  • Attribute: "Risk Score"
See the “Frequently Asked Questions (FAQ)” section for more information on how Recorded Future risk score is mapped to ThreatConnect Threat Rating.
risk/evidenceDetails/ruleAttribute: "Evidence"
Note
Each risk rule serves as evidence that explains the Indicator’s level of risk. Because there are often many risk rules associated with a Recorded Future Risk List entity, the risk rules are presented in a tabular format for better readability.
risk/evidenceDetails/evidenceString
risk/evidenceDetails/criticality
risk/evidenceDetails/timestamp

Hash

ThreatConnect object type: File Indicator

 

Recorded Future API FieldThreatConnect Field
entity/idAttribute: "External ID"
entity/nameName/Summary
entity/note_entitiesSee the “Note Entity” section for more information.
analystNotes/attributes/validated_onFile-to-Report Association (see the “Analyst Note” section for more information on how data are mapped to the associated Report Group)
analystNotes/attributes/published
analystNotes/attributes/text
analystNotes/attributes/topic/name
analystNotes/attributes/validation_urls/name
analystNotes/attributes/title
analystNotes/attributes/note_entities/name
analystNotes/source/name
analystNotes/id
links/hits/sections/lists/entities/idTag
links/hits/sections/lists/entities/typeATT&CK Tag (if type = MitreAttackIdentifier)
timestamps/firstSeenAttribute: "First Seen"
timestamps/lastSeenAttribute: "Last Seen"
intelCardSource
risk/score
  • Threat Rating
  • Attribute: "Risk Score"
See the “Frequently Asked Questions (FAQ)” section for more information on how Recorded Future risk score is mapped to ThreatConnect Threat Rating.
risk/evidenceDetails/ruleAttribute: "Evidence"
Note
Each risk rule serves as evidence that explains the Indicator’s level of risk. Because there are often many risk rules associated with a Recorded Future Risk List entity, the risk rules are presented in a tabular format for better readability.
risk/evidenceDetails/evidenceString
risk/evidenceDetails/criticality
risk/evidenceDetails/timestamp

IP

ThreatConnect object type: Address Indicator

 

Recorded Future API FieldThreatConnect Field
entity/idAttribute: "External ID"
entity/nameName/Summary
entity/note_entitiesSee the “Note Entity” section for more information.
analystNotes/attributes/validated_onAddress-to-Report Association (see the “Analyst Note” section for more information on how data are mapped to the associated Report Group)
analystNotes/attributes/published
analystNotes/attributes/text
analystNotes/attributes/topic/name
analystNotes/attributes/validation_urls/name
analystNotes/attributes/title
analystNotes/attributes/note_entities/name
analystNotes/source/name
analystNotes/id
links/hits/sections/lists/entities/idTag
location/asn
location/cidr/name
links/hits/sections/lists/entities/typeATT&CK Tag (if type = MitreAttackIdentifier)
timestamps/firstSeenAttribute: "First Seen"
timestamps/lastSeenAttribute: "Last Seen"
intelCardSource
risk/score
  • Threat Rating
  • Attribute: "Risk Score"
See the “Frequently Asked Questions (FAQ)” section for more information on how Recorded Future risk score is mapped to ThreatConnect Threat Rating.
risk/evidenceDetails/ruleAttribute: "Evidence"
Note
Each risk rule serves as evidence that explains the Indicator’s level of risk. Because there are often many risk rules associated with a Recorded Future Risk List entity, the risk rules are presented in a tabular format for better readability.
risk/evidenceDetails/evidenceString
risk/evidenceDetails/criticality
risk/evidenceDetails/timestamp
location/location/countryAttribute: "IP Geo Country"
location/location/cityAttribute: "IP Geo City"

URL

ThreatConnect object type: URL Indicator

 

Recorded Future API FieldThreatConnect Field
entity/idAttribute: "External ID"
entity/nameName/Summary
entity/note_entitiesSee the “Note Entity” section for more information.
analystNotes/attributes/validated_onURL-to-Report Association (see the “Analyst Note” section for more information on how data are mapped to the associated Report Group)
analystNotes/attributes/published
analystNotes/attributes/text
analystNotes/attributes/topic/name
analystNotes/attributes/validation_urls/name
analystNotes/attributes/title
analystNotes/attributes/note_entities/name
analystNotes/source/name
analystNotes/id
links/hits/sections/lists/entities/idTag
links/hits/sections/lists/entities/typeATT&CK Tag (if type = MitreAttackIdentifier)
timestamps/firstSeenAttribute: "First Seen"
timestamps/lastSeenAttribute: "Last Seen"
intelCardSource
risk/score
  • Threat Rating
  • Attribute: "Risk Score"
See the “Frequently Asked Questions (FAQ)” section for more information on how Recorded Future risk score is mapped to ThreatConnect Threat Rating.
risk/evidenceDetails/ruleAttribute: "Evidence"
Note
Each risk rule serves as evidence that explains the Indicator’s level of risk. Because there are often many risk rules associated with a Recorded Future Risk List entity, the risk rules are presented in a tabular format for better readability.
risk/evidenceDetails/evidenceString
risk/evidenceDetails/criticality
risk/evidenceDetails/timestamp

Vulnerability

ThreatConnect object type: Vulnerability Group

 

Recorded Future API FieldThreatConnect Field
entity/idAttribute: "External ID"
entity/nameName/Summary
entity/note_entitiesSee the “Note Entity” section for more information.
analystNotes/attributes/validated_onVulnerability-to-Report Association (see the “Analyst Note” section for more information on how data are mapped to the associated Report Group)
analystNotes/attributes/published
analystNotes/attributes/text
analystNotes/attributes/topic/name
analystNotes/attributes/validation_urls/name
analystNotes/attributes/title
analystNotes/attributes/note_entities/name
analystNotes/source/name
analystNotes/id
links/hits/sections/lists/entities/idTag
links/hits/sections/lists/entities/typeATT&CK Tag (if type = MitreAttackIdentifier)
timestamps/firstSeenAttribute: "First Seen"
timestamps/lastSeenAttribute: "Last Seen"
intelCardSource
risk/scoreAttribute: "Risk Score" 
risk/criticalityLabelAttribute: “Criticality"
risk/evidenceDetails/ruleAttribute: "Evidence"
Note
Each risk rule serves as evidence that explains the Group’s level of risk. Because there are often many risk rules associated with a Recorded Future Risk List entity, the risk rules are presented in a tabular format for better readability.
risk/evidenceDetails/evidenceString
risk/evidenceDetails/criticality
risk/evidenceDetails/timestamp
cvssv3/scopeAttribute: "CVSS v3 Scope"
cvssv3/exploitabilityScoreAttribute: "CVSS v3 Exploitability Score"
cvssv3/modifiedAttribute: "CVSS v3 Modified"
cvssv3/baseSeverityAttribute: "CVSS v3 Base Severity"
cvssv3/baseScoreAttribute: "CVSS v3 Score"
cvssv3/privilegesRequiredAttribute: "CVSS v3 Privileges Required"
cvssv3/userInteractionAttribute: "CVSS v3 User Interaction"
cvssv3/impactScoreAttribute: "CVSS v3 Impact Score"
cvssv3/attackVectorAttribute: "CVSS v3 Attack Vector"
cvssv3/integrityImpactAttribute: "CVSS v3 Integrity Impact"
cvssv3/confidentialityImpactAttribute: "CVSS v3 Confidentiality Impact"
cvssv3/vectorStringAttribute: "CVSS v3 Vector String"
cvssv3/attackComplexityAttribute: "CVSS v3 Attack Complexity"
cvssv3/createdAttribute: "CVSS v3 Created"
cvssv3/availabilityImpactAttribute: "CVSS v3 Availability Impact"
cvss/accessVectorAttribute: "CVSS v2 Access Vector"
cvss/lastModifiedAttribute: "CVSS v2 Last Modified"
cvss/publishedAttribute: "CVSS v2 Published"
cvss/scoreAttribute: "CVSS v2 CVSS Score"
cvss/availabilityAttribute: "CVSS v2 Availability"
cvss/authenticationAttribute: "CVSS v2 Authentication"
cvss/accessComplexityAttribute: "CVSS v2 Access Complexity"
cvss/integrityAttribute: "CVSS v2 Integrity"
cvss/confidentialityAttribute: "CVSS v2 Confidentiality"
cpeAttribute: "CPE"

Analyst Note

Note
For each Analyst Note added to a Risk List entity, a Report Group will be created and associated to the ThreatConnect object that corresponds to the Risk List entity. For daily Analyst Notes, Report Groups will be created and associated to existing Indicators and Groups in ThreatConnect that were ingested from Recorded Future.

ThreatConnect object type: Report Group

 

Recorded Future API FieldThreatConnect Field
analystNotes/attributes/validated_on
  • Last Modified Date
  • Attribute: "External Date Last Modified"
analystNotes/attributes/publishedAttribute: "Publish Date"
analystNotes/attributes/textAttribute: "Report Text"
analystNotes/attributes/topic/nameAttribute: "Report Type"
analystNotes/attributes/validation_urls/nameAttribute: "External References"
analystNotes/attributes/titleName/Summary
analystNotes/attributes/note_entities/nameSee the “Note Entity” section for more information.
analystNotes/source/nameSource
analystNotes/idAttribute: "External ID"

Note Entity

ThreatConnect object type: Report Group

 

Recorded Future Note Entity TypeThreatConnect Field
ASNumberAttribute: "Autonomous System Number"
AWSAccessKeyAttribute: "AWS Access Key"
AircraftAttribute: "Aircraft"
AirportAttribute: "Airport"
AnalystNoteAssociation to Report Group
AnniversaryAttribute: "Anniversary"
AttackVectorAttribute: "Attack Vector"
BankIdentificationNumberAttribute: "Bank Identification Number"
BitcoinAddressAttribute: "Bitcoin Address"
BusinessIdentifierCodeAttribute: "Business Identifier Code"
CaseAttribute: "Case"
CategoryAttribute: "Category"
CityAttribute: "City"
CodeIdentifierAttribute: "Code Identifier"
CommodityAttribute: "Commodity"
CompanyAttribute: "Company"
ContentTypeAttribute: "Content Type"
ContinentAttribute: "Continent"
CountryAttribute: "Country"
CurrencyAttribute: "Currency"
CurrencyPairAttribute: "Currency Pair"
CyberExploitTargetCategoryAttribute: "Cyber Exploit Target Category"
CyberSecurityCategoryAttribute: "Cyber Security Category"
CyberThreatActorCategoryAttribute: "Cyber Threat Actor Category"
CyberVulnerabilityAssociation to Vulnerability Group
DEANumberAttribute: "DEA Number"
DatasetAttribute: "Dataset"
DetectionRuleAttribute: "Detection Rule"
DocumentAttribute: "Document"
EconomicIndicatorAttribute: "Economic Indicator"
EmailAddressAttribute: "Email Address"
EmbassyAssociation to Email Address Indicator
EmojiAttribute: "Emoji"
EntertainmentAwardEventAttribute: "Entertainment Award Event"
EntityAttribute: "Entity"
EntityAliasAttribute: "Alias"
EntityListAttribute: "Entity List"
EntityRangeAttribute: "Entity Range"
EntityRelationAttribute: "Entity Relation"
ExternalIdentifierAttribute: "External ID"
FacilityAttribute: "Facility"
FaxNumberAttribute: "Fax Number"
FeatureAttribute: "Feature"
FileContentAttribute: "File Content"
FileNameAttribute: "File Name"
FileNameExtensionAttribute: "File Extension"
FileTypeAttribute: "File Type"
GeoBoundingBoxAttribute: "Geo Bounding Box"
GeoEntityAttribute: "Geo Entity"
HashAssociation to File Indicator
HashAlgorithmOne of the following algorithms:
  • MD5
  • SHA1
  • SHA256
HashtagAttribute: "Hashtag"
HolidayAttribute: "Holiday"
IRCNetworkAttribute: "IRC Network"
IdentifierAttribute: "Identifier"
ImageAttribute: "Image"
IncidentImpactCategoryAttribute: "Incident Impact Category"
IndustryAttribute: "Industry"
IndustryTermAttribute: "Industry Term"
IntegrationApplicationAttribute: "Integration Application"
IntegrationUserAttribute: "Integration User"
InternetDomainNameAssociation to Host Indicator
IpAddressAssociation to Address Indicator
KeywordAttribute: "Keyword"
LanguageAttribute: "Language"
LinkReportAttribute: "Link Report"
LogotypeAttribute: "Logotype"
MICRAttribute: "Magnetic Ink Character Recognition"
MalwareAttribute: "Malware"
MalwareCategoryAttribute: "Malware Family"
MalwareMutexAttribute: "Mutex"
MalwareSignatureAttribute: "Malware Signature"
MarketIndexAttribute: "Market Index"
MedicalConditionAttribute: "Medical Condition"
MedicalTreatmentAttribute: "Medical Treatment"
MetaAttributeAttribute: "Meta Attribute"
MetaTypeAttribute: "Meta Type"
MilitaryBaseAttribute: "Military Base"
MilitaryExerciseAttribute: "Military Exercise"
MitreAttackIdentifierATT&CK Tag
MovieAttribute: "Movie"
MusicAlbumAttribute: "Music Album"
MusicGroupAttribute: "Music Group"
NationalityAttribute: "Nationality"
NaturalFeatureAttribute: "Natural Feature"
NeighborhoodAttribute: "Neighborhood"
NetworkPortAttribute: "Network Port"
NetworkProtocolAttribute: "Network Protocol"
NumericIdentifierAttribute: "Numeric Identifier"
OperatingSystemAttribute: "Operating System"
OperationAttribute: "Operation"
OrgEntityAttribute: "Org Entity"
OrganizationAttribute: "Organization"
PaymentCardNumberAttribute: "Payment Card Number"
PersonAttribute: "Person"
PhoneNumberAttribute: "Phone"
PortAttribute: "Port"
PositionAttribute: "Position"
IdentifierAttribute: "Product Identifier"
ModuleAttribute: "Product Module"
ModuleAddonAttribute: "Product Module Addon"
VersionAttribute: "Product Version"
ProgrammingLanguageAttribute: "Programming Language"
ProvinceOrStateAttribute: "Province or State"
PublishedMediumAttribute: "Published Medium"
RadioProgramAttribute: "Radio Program"
RadioStationAttribute: "Radio Station"
RegionAttribute: "Region"
ReligionAttribute: "Religion"
ReportEntityAttribute: "Report Entity"
ReportingEntityAttribute: "Reporting Entity"
RiskContextAttribute: "Risk Context"
RiskRuleAttribute: "Risk Rule"
SectorAttribute: "Sector"
SnortDetectionRuleAttribute: "Snort Detection Rule"
SocialSecurityNumberAttribute: "Social Security Number"
SourceAttribute: "Source"
SourceMediaTypeAttribute: "Source Media Type"
SportsEventAttribute: "Sports Event"
SportsGameAttribute: "Sports Game"
SportsLeagueAttribute: "Sports League"
TVShowAttribute: "TV Show"
TVStationAttribute: "TV Station"
TaskAttribute: "Task"
TechnologyAttribute: "Technology"
TechnologyAreaAttribute: "Technology Area"
ThreadAttribute: "Thread"
Threat ActorAttribute: "Threat Actor"
TopicAttribute: "Report Type"
UPSTrackingNumberAttribute: "UPS Tracking Number"
URLAssociation to URL Indicator
USPSTrackingNumberAttribute: "USPS Tracking Number"
UUIDAttribute: "UUID"
UseCaseConfigurationAttribute: "Use Case Configuration"
UseCaseReportAttribute: "Use Case Report"
UserAttribute: "User"
UserEnterpriseAttribute: "User Enterprise"
UserEntityAttribute: "User Entity"
UserGroupAttribute: "User Group"
UserLabelAttribute: "User Label"
UserModuleGroupAttribute: "User Module Group"
UserModuleRoleGroupAttribute: "User Module Role Group"
UserOrganizationAttribute: "User Organization"
UserRoleAttribute: "User Role"
UsernameAttribute: "Username"
VesselAttribute: "Vessel"
WebMoneyIDAttribute: "WebMoney ID"
WinRegKeyAttribute: "Registry Key"
YaraDetectionRuleAttribute: "Yara Detection Rule"

Actor

ThreatConnect object type: Intrusion Set Group

 

Recorded Future API FieldThreatConnect Field
threat_map/idxid
threat_map/nameName/Summary
threat_map/aliasTag: "Intrusion Set: "
threat_map/intentAttribute: "Threat Map Intent"
threat_map/opportunityAttribute: "Threat Map Opportunity"
threat_map/categoriesTag: "Category: "

Malware

ThreatConnect object type: Malware Group

 

Recorded Future API FieldThreatConnect Field
threat_map/idxid
threat_map/nameName/Summary
threat_map/aliasTag: "Intrusion Set: "
threat_map/prevalenceAttribute: "Threat Map Prevalence"
threat_map/opportunityAttribute: "Threat Map Opportunity"
threat_map/categoriesTag: "Category: "
relatedEntities/entities/nameSee the “Note Entity” section for more information.
timestamps/firstSeenAttribute: "First Seen"
timestamps/lastSeenAttribute: "Last Seen"

Standard Alerts

ThreatConnect object type: Event Group

 

Recorded Future API FieldThreatConnect Field
hits/entities/name
  • Tag: "Vulnerability: " (if type = CyberVulnerability)
  • Tag: "Malware: " (if type = Malware)
  • ATT&CK Tag (if type = MitreAttackIdentifier)

hits/document/title

Attribute: "Reference"
hits/document/source/name
hits/document/url
fragment
entities
idxid
hits/entities/typeAttribute: "Entity List"
review/statusStatus
rule/id
  • Attribute: "Alert Rule ID"
  • Tag
rule/nameAttribute: "Alert Rule"
titleName/Summary
triggered_by/entity_path/entityAttribute: "Triggered By"
triggered_by/entity_paths/entity/name
  • Tag: "Vulnerability: " (if type = CyberVulnerability)
  • Tag: "Malware: " (if type = Malware)
  • ATT&CK Tag (if type = MitreAttackIdentifier)
url/apiAttribute: "Source"

owner_organisation_details.organisations/organisation_name

Attribute: "Description"
id
title
review/status_in_portal
review/assignee
review/note
url/portal
ai_insights/text

Playbook Alerts: Domain Abuse

ThreatConnect object type: Event Group

 

Recorded Future API FieldThreatConnect Field
playbook_alert_id
  • Attribute: "Description"
  • Attribute: "External ID"
  • Attribute: "Source"
  • xid
panel_status.case_rule_labelName/Summary
panel_status.entity_name
panel_status.case_rule_labelAttribute: "Alert Rule"
panel_evidence_dns.ip_list[]Attribute: "DNS Record"
panel_evidence_dns.mx_list[]
panel_evidence_dns.ns_list[]
panel_evidence_summary.phishing_malicious_behavior.threatTypes[]Attribute: "Threat Type"
panel_evidence_summary.reregistration.expirationAttribute: "Registration Expiration Date"
panel_evidence_summary.reregistration.registrar_nameAttribute: "Registration Name"
panel_evidence_summary.resolved_record_list[]Attribute: "Risk Rule"
panel_evidence_summary.screenshot_mentions[].mentioned_custom_keywords[]Attribute: "Reference"
panel_evidence_summary.screenshot_mentions[]
panel_evidence_summary.screenshots[]
panel_evidence_summary.screenshots[].tagTag
tags[]
panel_evidence_whois.bodyAttribute: "Whois Record"
panel_status.actions_taken[]Attribute: "Course of Action Taken"
panel_status.created
  • Event Date
  • External Date Added
panel_status.priorityAttribute: "Priority"
panel_status.risk_scoreAttribute: "Risk Score"
panel_status.statusStatus
panel_status.updatedExternal Last Modified

Playbook Alerts: Vulnerability

ThreatConnect object type: Event Group

 

Recorded Future API FieldThreatConnect Field
playbook_alert_id
  • Attribute: "Description"
  • Attribute: "External ID"
  • Attribute: "Source"
  • xid
panel_status.case_rule_labelName/Summary
panel_status.entity_name
panel_status.case_rule_labelAttribute: "Alert Rule"
panel_evidence_summaryAttribute: "Vulnerable Products"
panel_evidence_summary.summary.lifecycle_stageTag
panel_evidence_summary.summary.targets[].name
panel_status.entity_name
tags[]
panel_evidence_summary.summary.risk_rules[].rule
  • Description
  • Attribute: "Risk Rule"
panel_status.actions_taken[]Attribute: "Course of Action Taken"
panel_status.created
  • Event Date
  • External Date Added
panel_status.priorityAttribute: "Priority"
panel_status.risk_scoreAttribute: "Risk Score"
panel_status.statusStatus
panel_status.updatedExternal Last Modified 

Playbook Alerts: Third Party Risk

ThreatConnect object type: Event Group

 

Recorded Future API FieldThreatConnect Field
playbook_alert_id
  • Attribute: "Description"
  • Attribute: "External ID"
  • Attribute: "Source"
  • xid
panel_status.case_rule_labelName/Summary
panel_status.entity_name
panel_status.case_rule_labelAttribute: "Alert Rule"
panel_evidence_summary.assessments[]Attribute: "Risk Rule"
panel_status.actions_takenAttribute: "Course of Action Taken"
panel_status.created
  • Event Date
  • External Date Added
panel_status.entity_criticalityAttribute: "Criticality"
panel_status.priorityAttribute: "Priority"
panel_status.risk_scoreAttribute: "Risk Score"
panel_status.statusStatus
panel_status.updatedExternal Last Modified
tags[]Tag

Playbook Alerts: Data Leak on Code Repo

ThreatConnect object type: Event Group

 

Recorded Future API FieldThreatConnect Field
playbook_alert_id
  • Attribute: "Description"
  • Attribute: "External ID"
  • Attribute: "Source"
  • xid
panel_status.case_rule_labelName/Summary
panel_status.entity_name
panel_status.case_rule_labelAttribute: "Alert Rule"
panel_evidence_summary.assessments[]Attribute: "Risk Rule"
panel_status.actions_takenAttribute: "Course of Action Taken"
panel_status.created
  • Event Date
  • External Date Added
panel_status.entity_criticalityAttribute: "Criticality"
panel_status.priorityAttribute: "Priority"
panel_status.risk_scoreAttribute: "Risk Score"
panel_status.statusStatus
panel_status.updatedExternal Last Modified
tags[]Tag

Playbook Alerts: Malware Report

ThreatConnect object type: Event Group

 

Recorded Future API FieldThreatConnect Field
playbook_alert_id
  • Attribute: "Description"
  • Attribute: "External ID"
  • Attribute: "Source"
  • xid
panel_status.case_rule_labelName/Summary
panel_status.entity_name
panel_status.case_rule_labelAttribute: "Alert Rule"
panel_evidence_summary.assessments[]Attribute: "Risk Rule"
panel_status.actions_takenAttribute: "Course of Action Taken"
panel_status.created
  • Event Date
  • External Date Added
panel_status.entity_criticalityAttribute: "Criticality"
panel_status.priorityAttribute: "Priority"
panel_status.risk_scoreAttribute: "Risk Score"
panel_status.statusStatus
panel_status.updatedExternal Last Modified
tags[]Tag

Playbook Alerts: Geopolitics Facility

ThreatConnect object type: Event Group

 

Recorded Future API FieldThreatConnect Field
playbook_alert_id
  • Attribute: "Description"
  • Attribute: "External ID"
  • Attribute: "Source"
  • xid
panel_status.case_rule_labelName/Summary
panel_status.entity_name
panel_status.case_rule_labelAttribute: "Alert Rule"
panel_evidence_summary.assessments[]Attribute: "Risk Rule"
panel_status.actions_takenAttribute: "Course of Action Taken"
panel_status.created
  • Event Date
  • External Date Added
panel_status.entity_criticalityAttribute: "Criticality"
panel_status.priorityAttribute: "Priority"
panel_status.risk_scoreAttribute: "Risk Score"
panel_status.statusStatus
panel_status.updatedExternal Last Modified
tags[]Tag

Playbook Alerts: Identity Novel Exposures

ThreatConnect object type: Event Group

 

Recorded Future API FieldThreatConnect Field
playbook_alert_id
  • Attribute: "Description"
  • Attribute: "External ID"
  • Attribute: "Source"
  • xid
panel_status.case_rule_labelName/Summary
panel_status.entity_name
panel_status.case_rule_labelAttribute: "Alert Rule"
panel_evidence_summary.assessments[]Attribute: "Risk Rule"
panel_status.actions_takenAttribute: "Course of Action Taken"
panel_status.created
  • Event Date
  • External Date Added
panel_status.entity_criticalityAttribute: "Criticality"
panel_status.priorityAttribute: "Priority"
panel_status.risk_scoreAttribute: "Risk Score"
panel_status.statusStatus
panel_status.updatedExternal Last Modified
tags[]Tag

Risk Score Mappings

ThreatConnect follows the Criticality mapping in Recorded Future when assigning a Threat Rating to data ingested from Recorded Future; however, because the Recorded Future Criticality rating goes only from 0–4, it has been augmented by 1 in ThreatConnect to fit the 0–5 scale for Threat Rating. Table 19 shows how the Recorded Future risk scores are mapped to Threat Rating in ThreatConnect.

 

Recorded Future Risk ScoreThreatConnect Threat Rating
90–995
85–894
25–643
5–242
1–41
0 or Unknown0 or Unknown

Frequently Asked Questions (FAQ)

Why are there several URL errors in the batch errors report? (e.g., [xyz.com] could not be processed as a valid URL due to missing or invalid data (summary is invalid for the given type))

URL errors occur when URL objects coming from Recorded Future use an invalid URL format. Some examples of this behavior include the following:

  • ww3.xyz.com: This URL is missing the protocol, such as http://.
  • http:ww2.xyz.com/page#: This URL is terminated with a special character.

URL objects with an invalid URL format will not be imported into ThreatConnect. Note that this issue occurs rarely.


Why are Indicators with risk scores that are less than the minimum risk score being ingested into ThreatConnect?

Indicators with risk scores that are less than the minimum risk score are ingested because they exist as links from other Risk List entities. To prevent Indicators with a risk score less than the minimum risk score (i.e., the value for the App's Minimum Risk Score parameter) from being ingested, clear the Collect Indicators Linked in Recorded Future Less Than the Minimum Risk Score checkbox in the Feed Deployer when configuring and deploying the App.


How does the Threat Intelligence Engine for Recorded Future Feed API Service App differ from the Recorded Future Risk List Job App?

The Recorded Future Risk List Job App does the following:

  • collects data from Risk List entities
  • creates Indicators with evidence details
  • maps evidence details to a Description Attribute and risk rules to Tags

The Threat Intelligence Engine for Recorded Future Feed API Service App collects data in the following ways:

  • ingests Risk List entities with several of their Attributes
  • ingests all of the Analyst Notes and attached PDFs associated with Risk List entities
  • ingests associated Risk List entities and allows you to view the first-level associations created between the entities and Analyst Notes (i.e., the actual link)
  • obtains a link to each Risk List entity's Recorded Future Intelligence Card
  • ingests Analyst Notes that have been published in the last 24 hours daily

For more information on how Feed API Service Apps function in ThreatConnect, see Feed API Services.


How long does the Threat Intelligence Engine for Recorded Future Feed API Service App take to ingest a complete set of data on its initial run?

In most cases, the Threat Intelligence Engine for Recorded Future App takes 2–4 days to complete the initial data ingestion, depending on how you configure risk score and which Risk List entity types you select to ingest in the Feed Deployer.


In which order are Risk List entities ingested on the initial run?

On the initial run of the Threat Intelligence Engine for Recorded Future App, Risk List entities are ingested in the following order:

  1. Domain
  2. Hash
  3. IP
  4. URL
  5. Vulnerability

You will likely see Risk List entities ingested in chunks along with the associated or linked entities. Note that there may be delays between the creation of the Risk List source entities and the Risk List link entities in ThreatConnect.


How often does the Threat Intelligence Engine for Recorded Future App ingest each Risk List entity type after the initial run?

See Table 20 for each Risk List entity type's download frequency. Analyst Notes are downloaded daily.

 

Recorded Future Risk ListDownload Frequency (Hours)
Domain2
Hash24
IP1
URL2
Vulnerability24

How can I identify where the Threat Intelligence Engine for Recorded Future App collected Indicators and Groups from in Recorded Future?

The following "Source: " Tags, which are applied to Indicators and Groups in ThreatConnect that were ingested from Recorded Future, indicate where the integration collected them from in Recorded Future:

  • Source: Risk List: The entity was ingested from a Risk List.
  • Source: Risk List Link: The entity was ingested as a linked entity from a Risk List entity.
  • Source: Analyst Note: The entity was ingested from an Analyst Note.
  • Source: Analyst Note Link: The entity was ingested as a linked entity from an Analyst Note.
  • Source: RF Alert: The entity was ingested from a Standard Alert.
  • Source: RF Alert Link: The entity was ingested as a linked entity from a Standard Alert.
  • Source: RF Threat Map: The entity was ingested from a Threat Map entity.
  • Source: RF Threat Map Link: The entity was ingested as a linked entity from a Threat Map entity.
  • Source: RF PB Alert: The entity was ingested from a Playbook Alert.
  • Source: RF PB Alert Link: The entity was ingested as a linked entity from Playbook Alert.

Note that an Indicator or Group may have more than one of these Tags applied to them, as the corresponding entities could be associated to one another.


ThreatConnect® is a registered trademark, and TC Exchange™ is a trademark, of ThreatConnect, Inc.
JavaScript® is a registered trademark of Oracle Corporation.
Recorded Future® is a registered trademark of Recorded Future, Inc.
MITRE ATT&CK® and ATT&CK® are registered trademarks of The MITRE Corporation.

30083-03 EN Rev. A


Was this article helpful?