[Hunt IO] Connector for importing C2 feed into OpenCTI #3033
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Proposed changes
This PR introduces a new connector to integrate Hunt.io’s C2 (Command and Control) feed with OpenCTI. The connector retrieves, processes, and maps threat intelligence data into STIX-compliant objects and relationships to enhance threat visibility in OpenCTI.
Features
Field Mapping
ip
- The IP address associated with the C2 scanIPv4Address
observableport
- The port number used in the C2 connectionNetworkTraffic
object that maps IP to a specific porthostname
- The hostname or domain associated with the C2 scanDomainName
observabletimestamp
- The timestamp of the scanscan_uri
- The URI of the scan targetIndicator
withurl:value
patternconfidence
- The confidence score of the scan resultmalware_name
- The name of the malware detected during the scanMalware
objectmalware_subsystem
- The subsystem of malware detectedMalware
object to represent a malware typeRelationships
Infrastructure
(malware_name
)controls
Malware
(malware_name
)Infrastructure
(malware_name
)consist-of
IPv4Address
(ip
)Infrastructure
(malware_name
)consist-of
DomainName
(hostname
)Indicator
(scan_uri
)indicates
Malware
(malware_name
)Note
Related issues
Checklist
Further comments