Python Script that downloads Mandiant Threat Intel to JSON file for offline consumption.
It can also adds an additional field to be ready for Splunk consumption.
Install mandiant_threatintel
dependency from https://github.com/google/mandiant-ti-client
- Create a
config.ini
is the same folder, based on theconfig.ini.template
. - Add your API Key/Secret without quotes.
For more information type
$ python3 main.py -h
usage: main.py [-h] [-o OUTPUT_FILE] [-s START_DATETIME] [-e END_DATETIME] [-m MIN_SCORE] [-p PAGE_SIZE] [--exclude-osint] [--splunk-convert] [-v]
Download Mandiant Threat Intelligence Through API
options:
-h, --help show this help message and exit
-o OUTPUT_FILE, --output-file OUTPUT_FILE
Name of the Output file (Default: output-startdatetime-enddatetime.json)
-s START_DATETIME, --start-datetime START_DATETIME
Start Datetime of search | Format dd/mm/YYYY@HH:MM:SS | (Default: Start of current day)
-e END_DATETIME, --end-datetime END_DATETIME
End Datetime of search | Format dd/mm/YYYY@HH:MM:SS | (Default: Now)
-m MIN_SCORE, --min-score MIN_SCORE
Minimum score of confidence (Default: 0)
-p PAGE_SIZE, --page-size PAGE_SIZE
The number of results to retrieve per page - Not limit the results to retrieve (Default: 1000)
--exclude-osint Exclude OSINT from results
--splunk-convert Make transformations for splunk consumption
-v, --verbose Print Arguments
JSON file with Mandiant Threat Intel indicators.
Add flag --splunk-convert
to make transformations in order to be consumed from Mandiant Threat Intel App.