Admin Guide

Synapse-Mandiant Admin Guide

Configuration

Synapse-Mandiant requires a Mandiant Advantage API key. For information on how to sign up, please visit the Mandiant Advantage API documentation.

Setting API key for global use

To set-up a global API key:

> mandiant.advantage.setup.apikey myapikey myapisecret
Setting Mandiant Advantage API key for all users.

Using per-user API keys

A user may set-up their own API key:

> mandiant.advantage.setup.apikey --self myapikey myapisecret
Setting Mandiant Advantage API key for the current user.

Dependencies

Synapse-Mandiant requires the following Power-Ups to be installed:

Name   : synapse-fileparser
Version: >=4.13.1,<5.0.0
Desc   : Synapse-FileParser is used to parse report PDFs and link extracted indicators to the media:news node.

Permissions

Package (synapse-mandiant) defines the following permissions:
power-ups.mandiant.advantage.user : Allows a user to issue queries to the Mandiant Advantage API. ( default: false )

You may add rules to users/roles directly from storm:

> auth.user.addrule visi power-ups.mandiant.advantage.user
Added rule power-ups.mandiant.advantage.user to user visi.

or:

> auth.role.addrule ninjas power-ups.mandiant.advantage.user
Added rule power-ups.mandiant.advantage.user to role ninjas.

Exported APIs

Synapse-Mandiant does not currently export any APIs.

Workflows

Synapse-Mandiant provides the following workflows in Optic:

Title: Configuration

Node Actions

Synapse-Mandiant provides the following node actions in Optic:

Name : actors
Desc : Ingest threat actor details from the Mandiant Advantage API.
Forms: ou:name, ou:org, risk:threat

Name : indicators
Desc : Ingest indicator details from the Mandiant Advantage API.
Forms: inet:ipv4, inet:ipv6, inet:fqdn, hash:sha256, hash:sha1, hash:md5, file:bytes, inet:email, inet:url

Name : malware
Desc : Ingest malware family details from the Mandiant Advantage API.
Forms: risk:tool:software, it:prod:softname

Name : vulns
Desc : Ingest vulnerability details from the Mandiant Advantage API.
Forms: risk:vuln, it:sec:cve

Onload Events

Synapse-Mandiant uses an onload event run required data migrations and to create the following extended properties:

_mandiant:icscore
    forms: ('inet:ipv4', 'inet:ipv6', 'inet:fqdn', 'inet:url', 'hash:md5', 'hash:sha1', 'hash:sha256', 'inet:email', 'risk:alert')
    doc: Records the Mandiant IC-Score value.
_mandiant:threat:score
    forms: ('inet:ipv4', 'inet:ipv6', 'inet:fqdn', 'inet:url', 'hash:md5', 'hash:sha1', 'hash:sha256', 'inet:email')
    doc: Records the Mandiant Threat Score value.
_mandiant:threat:confidence
    forms: ('inet:ipv4', 'inet:ipv6', 'inet:fqdn', 'inet:url', 'hash:md5', 'hash:sha1', 'hash:sha256', 'inet:email')
    doc: Records the Mandiant Threat Rating Confidence level.
_mandiant:threat:severity
    forms: ('inet:ipv4', 'inet:ipv6', 'inet:fqdn', 'inet:url', 'hash:md5', 'hash:sha1', 'hash:sha256', 'inet:email')
    doc: Records the Mandiant Threat Rating Severity level.
_mandiant:threat:severity:reasons
    forms: ('inet:ipv4', 'inet:ipv6', 'inet:fqdn', 'inet:url', 'hash:md5', 'hash:sha1', 'hash:sha256', 'inet:email')
    doc: Records the Mandiant Threat Rating Severity reasons.

The onload event will also run any required data migrations.

Ingesting CPE strings

The Mandiant Advantage API may sometimes return invalid CPE strings. Invalid CPE strings will be rejected by Synapse when attempting to ingest the API data. As a workaround, the Synapse-Mandiant Power-Up peforms the following transformations on CPE strings before attempting to ingest them:

  • Replace \- with -. Dashes (hyphens) should not be escaped according to the CPE 2.3 specification.

Synapse v2.187.0 migration

Synapse v2.187.0 added a model migration (v0.2.31) that removed all invalid it:sec:cpe nodes from the Cortex. The Synapse-Mandiant onload migration uses the above transformations to attempt to automatically repair and restore invalid it:sec:cpe nodes that originated from the Synapse-Mandiant Power-Up.