Skip to main content

Cyber Threat Intelligence API

The Cyber Threat Intelligence API provides real-time access to threat data, indicators of compromise (IoCs), vulnerability information, and threat actor analysis through Cognix's threat intelligence platform.


Getting Started

Authentication

All API requests require authentication using a Bearer token in the Authorization header:

Authorization: Bearer YOUR_API_KEY

Please contact support at cognix.au/contact-us to obtain an API key.


API Reference

1. Threat Indicators API

Retrieve and analyze Indicators of Compromise (IoCs).

Endpoint: GET https://api.cognix.au/v1/threat/indicators

Query Parameters

ParameterTypeRequiredDescription
typestringNoIoC type (ip, domain, hash, url)
confidenceintegerNoMinimum confidence score (0-100)
date_rangestringNoDate range format: YYYY-MM-DDtoYYYY-MM-DD
limitintegerNoNumber of results (default: 100)
Example Response
{
"status": "success",
"data": {
"indicators": [
{
"id": "ioc_123",
"type": "ip",
"value": "192.0.2.1",
"confidence": 95,
"first_seen": "2024-01-15T10:30:00Z",
"last_seen": "2024-01-31T15:45:00Z",
"threat_types": ["malware_c2", "botnet"],
"malware_families": ["emotet"],
"tags": ["ransomware", "financial"],
"references": ["https://example.com/threat-report-123"]
}
],
"meta": {
"total_count": 1500,
"filtered_count": 100,
"confidence_average": 87
}
}
}

2. Threat Actor Analysis API

Access detailed information about known threat actors and their activities.

Endpoint: GET https://api.cognix.au/v1/threat/actors

Query Parameters

ParameterTypeRequiredDescription
actor_idstringNoSpecific threat actor identifier
categorystringNoActor category (state, criminal, hacktivist)
capabilitystringNoTechnical capability level
target_sectorstringNoTargeted industry sector
Example Response
{
"status": "success",
"data": {
"actor": {
"id": "APT_123",
"name": "FancyBear",
"aliases": ["APT28", "STRONTIUM"],
"category": "state",
"first_seen": "2008-01-01",
"capability_level": "advanced",
"typical_targets": ["government", "defense", "technology"],
"ttps": ["T1566: Phishing", "T1587: Develop Capabilities"],
"associated_malware": ["X-Agent", "CHOPSTICK"],
"recent_campaigns": [
{
"name": "Operation Ghost",
"start_date": "2024-01-01",
"status": "active",
"targeted_regions": ["APAC", "EU"]
}
]
}
}
}

3. Vulnerability Intelligence API

Monitor and analyze vulnerability information and exploitation status.

Endpoint: GET https://api.cognix.au/v1/threat/vulnerabilities

Query Parameters

ParameterTypeRequiredDescription
cve_idstringNoSpecific CVE identifier
severitystringNoMinimum severity level
exploit_statusstringNoExploitation status filter
affected_productstringNoAffected product or technology
Example Response
{
"status": "success",
"data": {
"vulnerability": {
"cve_id": "CVE-2024-1234",
"severity": "critical",
"cvss_score": 9.8,
"status": {
"patch_available": true,
"exploit_available": true,
"actively_exploited": true
},
"affected_products": [
{
"vendor": "ExampleTech",
"product": "SecurityApp",
"versions": ["1.0.0", "1.1.0"]
}
],
"exploitation_details": {
"ease": "low",
"authentication_required": false,
"known_exploits": 3
},
"mitigation_steps": [
"Update to version 1.1.1",
"Apply network segmentation"
]
}
}
}

4. MITRE ATT&CK Framework API

Access MITRE ATT&CK framework mappings and techniques.

Endpoint: GET https://api.cognix.au/v1/threat/mitre

Query Parameters

ParameterTypeRequiredDescription
technique_idstringNoSpecific ATT&CK technique ID
tacticstringNoSpecific tactic category
actor_idstringNoFilter by associated threat actor
platformstringNoTarget platform (Windows, Linux, etc.)
Example Response
{
"status": "success",
"data": {
"technique": {
"technique_id": "T1566",
"name": "Phishing",
"tactic": "Initial Access",
"platforms": ["Windows", "macOS", "Linux"],
"detection": {
"analytics": [
"Monitor for suspicious email attachments",
"URL reputation checking"
],
"data_sources": ["Email gateway logs", "Network traffic logs"]
},
"observed_actors": [
{
"actor_id": "APT_123",
"confidence": "high",
"last_observed": "2024-01-15"
}
],
"mitigations": [
{
"id": "M1049",
"name": "Antivirus/Antimalware",
"description": "Use anti-virus/anti-malware tools"
}
]
}
}
}

5. Dark Web Monitoring API

Monitor dark web activities and threats.

Endpoint: GET https://api.cognix.au/v1/threat/darkweb

Query Parameters

ParameterTypeRequiredDescription
keywordsstringNoSearch keywords or phrases
categorystringNoThreat category filter
date_rangestringNoDate range for monitoring
source_typestringNoType of dark web source
Example Response
{
"status": "success",
"data": {
"alerts": [
{
"id": "alert_789",
"timestamp": "2024-01-31T12:00:00Z",
"source": {
"type": "forum",
"name": "redacted",
"credibility": "high"
},
"content": {
"type": "credential_leak",
"affected_organization": "example.com",
"details": "Sanitized description of the threat",
"indicators": ["compromised_data_type", "asking_price"]
},
"risk_assessment": {
"severity": "high",
"immediacy": "immediate",
"recommended_actions": [
"Reset affected credentials",
"Monitor for unauthorized access"
]
}
}
],
"summary": {
"total_mentions": 25,
"trending_topics": ["ransomware", "zero_day_exploits"],
"risk_level": "elevated"
}
}
}

Error Handling

Response Codes

CodeDescription
200Success - Request completed successfully
400Bad Request - Invalid parameters or malformed request
401Unauthorized - Invalid or missing API key
403Forbidden - Valid API key but insufficient permissions
404Not Found - Requested resource doesn't exist
429Too Many Requests - Rate limit exceeded
500Internal Server Error - Server-side error occurred
503Service Unavailable - Temporary server maintenance

Error Response Format

{
"status": "error",
"error": {
"code": "ERROR_CODE",
"message": "Human-readable error message",
"details": {
"field": "Additional context about the error",
"suggestion": "Recommended action to resolve the error"
}
},
"request_id": "unique-request-identifier"
}

Common Error Codes

Authentication Errors

Error CodeDescriptionResolution
INVALID_API_KEYThe provided API key is not validPlease contact support at https://cognix.au/contact-us to verify your API key
EXPIRED_API_KEYThe API key has expiredGenerate a new API key
MISSING_API_KEYNo API key provided in the requestInclude API key in Authorization header

CTI-Specific Errors

Error CodeDescriptionResolution
INVALID_IOCInvalid IoC formatCheck IoC format requirements
FEED_UNAVAILABLERequested threat feed is temporarily unavailableRetry request after delay
INVALID_CVEInvalid CVE identifierVerify CVE ID format
SEARCH_TIMEOUTDark web search exceeded time limitRefine search parameters

Best Practices for Error Handling

  1. Always check the status field in the response
  2. Implement retry logic with exponential backoff for rate limits
  3. Log the request_id for all errors
  4. Monitor error rates to detect potential issues
  5. Handle errors gracefully in your application