Publisher: Intezer Labs
Connector Version: 1.1.0
Product Vendor: Intezer Labs
Product Name: Intezer
Product Version Supported (regex): ".*"
Minimum Product Version: 5.5.0
Intezer connector for Splunk SOAR enables security teams to automate the analysis, detection, and response of threats by integrating Intezer's technology into their Splunk workflows
Publisher: Intezer Labs
Connector Version: 1.1.0
Product Vendor: Intezer Labs
Product Name: Intezer
Product Version Supported (regex): ".*"
Minimum Product Version: 5.5.0
Intezer connector for Splunk SOAR enables security teams to automate the analysis, detection, and response of threats by integrating Intezer's technology into their Splunk workflows.
The app uses HTTP/ HTTPS protocol for communicating with the Intezer server. Below are the default ports used by Splunk SOAR.
Service Name | Transport Protocol | Port |
---|---|---|
http | tcp | 80 |
https | tcp | 443 |
VARIABLE | REQUIRED | TYPE | DESCRIPTION |
---|---|---|---|
apikey | required | password | Intezer API key |
- test connectivity - Test connection to Intezer.
- detonate_file - Analyze a file from Splunk vault with Intezer.
- detonate_hash - Analyze a file hash (SHA1, SHA256, or MD5) on Intezer Analyze.
- get_file_report - Get a file analysis report based on an analysis ID or a file hash.
- detonate_url - Analyze a suspicious URL with Intezer.
- get_url_report - Get a URL analysis report based on a URL analysis ID.
- submit_alert - Submit a new alert, including the raw alert information, to Intezer for processing.
- submit_suspicious_email - Submit a suspicious phishing email in a raw format (.MSG or .EML) to Intezer for processing.
- get_alert - Get an ingested alert triage and response information using alert ID.
- index_file - Index the file's genes into the organizational database.
- unset_index_file - Unset file's indexing.
Test connection to Intezer.
Type: test
Read only: True
No parameters are required for this action
DATA PATH | TYPE | CONTAINS | EXAMPLE VALUES |
---|---|---|---|
is_available | boolean | Whether the connection to Intezer was successful | true |
Analyze a file from Splunk vault with Intezer.
Type: investigate
Read only: True
PARAMETER | REQUIRED | DESCRIPTION | TYPE | CONTAINS |
---|---|---|---|---|
vault_id | required | File's vault ID | string | vault id |
related_alert_id | optional | alert id the file related to | string | alert id |
DATA PATH | TYPE | CONTAINS | EXAMPLE VALUES |
---|---|---|---|
analysis_id | string | Intezer analysis ID | |
analysis_status | string | Intezer analysis status | created in_progress queued failed finished |
analysis_type | string | File Analysis | file |
identifier | string | vault id requested | vault id |
Analyze a file hash (SHA1, SHA256, or MD5) on Intezer Analyze.
Type: investigate
Read only: True
PARAMETER | REQUIRED | DESCRIPTION | TYPE | CONTAINS |
---|---|---|---|---|
file_hash | required | Analyze hash file via Intezer | string | hash sha256 sha1 md5 |
DATA PATH | TYPE | CONTAINS | EXAMPLE VALUES |
---|---|---|---|
analysis_id | string | Intezer analysis ID | |
analysis_status | string | Intezer analysis status | created in_progress queued failed finished |
analysis_type | string | File Analysis | file |
identifier | string | hash requested |
Get a file analysis report based on an analysis ID or a file hash.
Type: generic
Read only: True
Provide either analysis_id or file_hash.
PARAMETER | REQUIRED | DESCRIPTION | TYPE | CONTAINS |
---|---|---|---|---|
analysis_id | optional | File analysis ID. The analysis ID is returned when submitting a file or a hash for analysis | string | |
file_hash | optional | Hash of the desired report | string | hash sha256 sha1 md5 |
private_only | optional | Whether to show only private reports (relevant only for hashes). | boolean | |
wait_for_completion | optional | Whether to wait for the analysis to complete before returning the report. | boolean |
For more details take a look here:
DATA PATH | TYPE | CONTAINS | EXAMPLE VALUES |
---|---|---|---|
analysis_status | string | Intezer analysis status | created in_progress queued failed finished |
analysis_type | string | File Analysis | file |
analysis_id | string | Intezer analysis ID | |
analysis_content.analysis | dictionary | analysis report | |
analysis_content.iocs | dictionary | iocs report | |
analysis_content.ttps | dictionary | ttps report | |
analysis_content.metadata | dictionary | metadata report | |
analysis_content.root-code-reuse | dictionary | root-code-reuse report |
Analyze a suspicious URL with Intezer.
Type: investigate
Read only: True
PARAMETER | REQUIRED | DESCRIPTION | TYPE | CONTAINS |
---|---|---|---|---|
url | required | URL to analyze | string | valid url |
DATA PATH | TYPE | CONTAINS | EXAMPLE VALUES |
---|---|---|---|
analysis_id | string | Intezer analysis ID | |
analysis_status | string | Intezer analysis status | created in_progress queued failed finished |
analysis_type | string | URL Analysis | url |
identifier | string | url requested |
Get a URL analysis report based on a URL analysis ID.
Type: generic
Read only: True
PARAMETER | REQUIRED | DESCRIPTION | TYPE | CONTAINS |
---|---|---|---|---|
analysis_id | required | URL analysis ID. The analysis ID is returned when submitting a URL for analysis | string | |
wait_for_completion | optional | Whether to wait for the analysis to finish. | boolean |
For more details take a look here:
DATA PATH | TYPE | CONTAINS | EXAMPLE VALUES |
---|---|---|---|
analysis_status | string | Intezer analysis status | created in_progress queued failed finished |
analysis_type | string | URL Analysis | url |
analysis_id | string | Intezer analysis ID | |
analysis_content.analysis | dictionary | analysis report |
Get an ingested alert triage and response information using alert ID.
Type: generic
Read only: True
PARAMETER | REQUIRED | DESCRIPTION | TYPE | CONTAINS |
---|---|---|---|---|
alert_id | required | The alert id to query | string | |
wait_for_completion | optional | Whether to wait for the analysis to finish. | boolean |
For more details take a look here:
Submit a new alert, including the raw alert information, to Intezer for processing.
Type: Generic
Read only: True
PARAMETER | REQUIRED | DESCRIPTION | TYPE | CONTAINS |
---|---|---|---|---|
source | required | The source of the alert | string | alert source |
raw_alert | required | alert raw data in JSON format | string | JSON format |
alert_mapping | required | mapping to use for the alert in JSON formant | string | JSON format |
DATA PATH | TYPE | CONTAINS | EXAMPLE VALUES |
---|---|---|---|
alert_id | string | alert ID |
Submit a suspicious phishing email in a raw format (.MSG or .EML) to Intezer for processing
Type: Generic
Read only: True
PARAMETER | REQUIRED | DESCRIPTION | TYPE | CONTAINS |
---|---|---|---|---|
vault_id | required | Email's vault ID | string | vault id |
DATA PATH | TYPE | CONTAINS | EXAMPLE VALUES |
---|---|---|---|
alert_id | string | alert ID |
Index the file's genes into the organizational database.
Type: correct
Read only: True
PARAMETER | REQUIRED | DESCRIPTION | TYPE | CONTAINS |
---|---|---|---|---|
index_as | required | Index as trusted or malicious | string | trusted malicious |
sha256 | optional | sha256 to index | string | sha256 |
family_name | optional | family name to index as | string |
DATA PATH | TYPE | CONTAINS | EXAMPLE VALUES |
---|---|---|---|
index_id | string | Index ID |
Unset file's indexing.
Type: correct
Read only: True
PARAMETER | REQUIRED | DESCRIPTION | TYPE | CONTAINS |
---|---|---|---|---|
file_hash | required | Hash file to unset the indexing | string | hash sha256 sha1 md5 |
No output
The below configuration variables are required for this Connector to operate. These variables are specified when configuring a Intezer asset in SOAR.
VARIABLE | REQUIRED | TYPE | DESCRIPTION |
---|---|---|---|
intezer_api_key | required | password | API key |
test connectivity - Validate the asset configuration for connectivity using supplied configuration
detonate file - Analyze a file from Splunk vault with Intezer
detonate hash - Analyze a file hash (SHA1, SHA256, or MD5) with Intezer
get file report - Get a file analysis report based on an analysis ID or a file hash
detonate url - Analyze a suspicious URL with Intezer
get url report - Get a URL analysis report based on a URL analysis ID
get alert - Get an ingested alert triage and response information using alert ID
submit alert - Submit a new alert, including the raw alert information, to Intezer for processing
submit suspicious email - Submit a suspicious phishing email in a raw format (.MSG or .EML) to Intezer for processing
index file - Index the file's genes into the organizational database
unset index file - Unset file's indexing
Validate the asset configuration for connectivity using supplied configuration
Type: test
Read only: True
Test connection with Intezer.
No parameters are required for this action
No Output
Analyze a file from Splunk vault with Intezer
Type: generic
Read only: False
Analyze a file from Splunk Vault. The action returns the analysis ID and status.
PARAMETER | REQUIRED | DESCRIPTION | TYPE | CONTAINS |
---|---|---|---|---|
vault_id | required | File's vault ID | string | vault id |
related_alert_id | optional | The alert ID that the file is related to | string | alert id |
DATA PATH | TYPE | CONTAINS | EXAMPLE VALUES |
---|---|---|---|
action_result.parameter.vault_id | string | vault id |
|
action_result.parameter.related_alert_id | string | alert id |
|
action_result.status | string | success failed | |
action_result.message | string | ||
summary.total_objects | numeric | ||
summary.total_objects_successful | numeric | ||
action_result.data.*.analysis_id | string | analysis id |
|
action_result.data.*.analysis_status | string | created in_progress queued failed finished | |
action_result.data.*.analysis_type | string | file | |
action_result.data.*.identifier | string | vault id |
|
action_result.summary | string |
Analyze a file hash (SHA1, SHA256, or MD5) with Intezer
Type: generic
Read only: False
Analyze a hash from Splunk Vault. The action returns the analysis ID and status.
PARAMETER | REQUIRED | DESCRIPTION | TYPE | CONTAINS |
---|---|---|---|---|
file_hash | required | File hash (SHA1, SHA256, or MD5) | string | hash sha1 sha256 md5 |
DATA PATH | TYPE | CONTAINS | EXAMPLE VALUES |
---|---|---|---|
action_result.parameter.file_hash | string | hash sha1 sha256 md5 |
|
action_result.status | string | success failed | |
action_result.message | string | ||
summary.total_objects | numeric | ||
summary.total_objects_successful | numeric | ||
action_result.data.*.analysis_id | string | analysis id |
|
action_result.data.*.analysis_status | string | created in_progress queued failed finished | |
action_result.data.*.analysis_type | string | file | |
action_result.data.*.identifier | string | hash sha1 sha256 md5 |
|
action_result.summary | string |
Get a file analysis report based on an analysis ID or a file hash
Type: investigate
Read only: True
Get a file analysis report based on an analysis ID or a file hash.
PARAMETER | REQUIRED | DESCRIPTION | TYPE | CONTAINS |
---|---|---|---|---|
analysis_id | optional | File analysis ID. The analysis ID is returned when submitting a file or a hash for analysis | string | analysis id |
file_hash | optional | File's hash (SHA1, SHA256, MD5) | string | hash sha1 sha256 md5 |
private_only | optional | The "private_only" parameter, used when retrieving analysis reports by file hash, determines database access: "false" (default) uses both public and private databases, consuming additional quota for first-time public access; "true" uses only your private database, conserving quota | boolean | |
wait_for_completion | optional | Whether to wait for the analysis to finish | boolean |
DATA PATH | TYPE | CONTAINS | EXAMPLE VALUES |
---|---|---|---|
action_result.parameter.analysis_id | string | analysis id |
|
action_result.parameter.file_hash | string | hash sha1 sha256 md5 |
|
action_result.parameter.private_only | boolean | ||
action_result.parameter.wait_for_completion | boolean | ||
action_result.status | string | success failed | |
action_result.message | string | ||
summary.total_objects | numeric | ||
summary.total_objects_successful | numeric | ||
action_result.data.*.analysis_type | string | file |
|
action_result.data.*.analysis_id | string | analysis id |
|
action_result.data.*.analysis_status | string | created in_progress queued failed finished | |
action_result.data.*.analysis_content.analysis.analysis_time | string | time utc format |
|
action_result.data.*.analysis_content.analysis.analysis_url | string | analysis url |
|
action_result.data.*.analysis_content.analysis.file_name | string | file name |
|
action_result.data.*.analysis_content.analysis.is_private | boolean | is private analysis |
|
action_result.data.*.analysis_content.analysis.sha256 | string | sha256 |
|
action_result.data.*.analysis_content.analysis.sub_verdict | string | file_based memory_threat suspicious_powershell_command blocklisted_software custom_rule suspicious_script suspicious_behavior testing_activity custom | |
action_result.data.*.analysis_content.analysis.iocs.files.*.sha256 | string | sha256 |
|
action_result.data.*.analysis_content.analysis.iocs.network.*.ip | string | ip |
|
action_result.data.*.analysis_content.analysis.iocs.network.*.url | string | url |
|
action_result.data.*.analysis_content.analysis.ttps.*.ttp.ttp | string | ttp |
|
action_result.summary | string |
Analyze a suspicious URL with Intezer
Type: generic
Read only: False
Analyze a suspicious URL with Intezer.
PARAMETER | REQUIRED | DESCRIPTION | TYPE | CONTAINS |
---|---|---|---|---|
url | required | URL to analyze | string | url |
DATA PATH | TYPE | CONTAINS | EXAMPLE VALUES |
---|---|---|---|
action_result.parameter.url | string | url |
|
action_result.status | string | success failed | |
action_result.message | string | ||
summary.total_objects | numeric | ||
summary.total_objects_successful | numeric | ||
action_result.data.*.analysis_id | string | analysis id |
|
action_result.data.*.analysis_status | string | created in_progress queued failed finished | |
action_result.summary | string |
Get a URL analysis report based on a URL analysis ID
Type: investigate
Read only: True
Get a URL analysis report based on a URL analysis ID.
PARAMETER | REQUIRED | DESCRIPTION | TYPE | CONTAINS |
---|---|---|---|---|
analysis_id | required | URL analysis ID. The analysis ID is returned when submitting a URL for analysis | string | analysis id |
wait_for_completion | optional | Whether to wait for the analysis to finish | boolean |
DATA PATH | TYPE | CONTAINS | EXAMPLE VALUES |
---|---|---|---|
action_result.parameter.analysis_id | string | analysis id |
|
action_result.parameter.wait_for_completion | boolean | ||
action_result.status | string | success failed | |
action_result.message | string | ||
summary.total_objects | numeric | ||
summary.total_objects_successful | numeric | ||
action_result.data.*.analysis_type | string | url |
|
action_result.data.*.analysis_id | string | analysis id |
|
action_result.data.*.analysis_status | string | created in_progress queued failed finished | |
action_result.data.*.analysis_content.analysis.downloaded_file.analysis_id | string | analysis id |
|
action_result.data.*.analysis_content.analysis.downloaded_file.sha256 | string | sha256 |
|
action_result.data.*.analysis_content.analysis.domain_info.domain_name | string | domain name |
|
action_result.data.*.analysis_content.analysis.indicators.*.text | string | indicator |
|
action_result.data.*.analysis_content.analysis.ip | string | ip |
|
action_result.data.*.analysis_content.analysis.scanned_url | string | url |
|
action_result.data.*.analysis_content.analysis.submitted_url | string | ip |
|
action_result.data.*.analysis_content.analysis.summary.verdict_type | string | verdict |
|
action_result.data.*.analysis_content.analysis.summary.verdict_name | string | verdict name |
|
action_result.data.*.analysis_content.analysis.summary.title | string | title |
|
action_result.summary | string |
Get an ingested alert triage and response information using alert ID
Type: investigate
Read only: True
Get an ingested alert triage and response information using alert ID.
PARAMETER | REQUIRED | DESCRIPTION | TYPE | CONTAINS |
---|---|---|---|---|
alert_id | required | The alert ID to query | string | alert id |
wait_for_completion | optional | Whether to wait for the analysis to finish | boolean |
DATA PATH | TYPE | CONTAINS | EXAMPLE VALUES |
---|---|---|---|
action_result.parameter.alert_id | string | alert id |
|
action_result.parameter.wait_for_completion | boolean | ||
action_result.status | string | success failed | |
action_result.message | string | ||
summary.total_objects | numeric | ||
summary.total_objects_successful | numeric | ||
action_result.data.*.alert_url | string | url |
|
action_result.data.*.source | string | source |
|
action_result.data.*.alert.alert_id | string | alert id |
|
action_result.data.*.alert.alert_title | string | alert title |
|
action_result.data.*.alert.severity | string | alert severity |
|
action_result.data.*.alert.creation_time | string | time in utc |
|
action_result.data.*.alert.is_mitigated | boolean | ||
action_result.data.*.alert.device.hostname | string | hostname |
|
action_result.data.*.alert.device.os_type | string | os type |
|
action_result.data.*.triage_result.alert_verdict | string | verdict |
|
action_result.data.*.triage_result.risk_category | string | risk category |
|
action_result.data.*.triage_result.risk_level | string | risk level |
|
action_result.data.*.triage_result.threat_name | string | threat name |
|
action_result.data.*.scans.*.file_analysis.analysis_id | string | analysis id |
|
action_result.data.*.scans.*.file_analysis.verdict | string | verdict |
|
action_result.data.*.scans.file_analysis.sha256 | string | sha256 |
|
action_result.data.*.response.status | string | response status |
|
action_result.data.*.scans | string | scan |
|
action_result.summary | string |
Submit a new alert, including the raw alert information, to Intezer for processing
Type: generic
Read only: False
Submit a new alert, including the raw alert information, to Intezer for processing.
PARAMETER | REQUIRED | DESCRIPTION | TYPE | CONTAINS |
---|---|---|---|---|
source | required | Where the alert came from | string | |
raw_alert | required | The alert raw data in JSON format | string | |
alert_mapping | required | The mapping to use for the alert in JSON formant | string |
DATA PATH | TYPE | CONTAINS | EXAMPLE VALUES |
---|---|---|---|
action_result.parameter.source | string | ||
action_result.parameter.raw_alert | string | ||
action_result.parameter.alert_mapping | string | ||
action_result.status | string | success failed | |
action_result.message | string | ||
summary.total_objects | numeric | ||
summary.total_objects_successful | numeric | ||
summary.data.*.alert_id | string | ||
action_result.summary | string | ||
action_result.data | string |
Submit a suspicious phishing email in a raw format (.MSG or .EML) to Intezer for processing
Type: generic
Read only: False
Submit a suspicious phishing email in a raw format (.MSG or .EML) to Intezer for processing.
PARAMETER | REQUIRED | DESCRIPTION | TYPE | CONTAINS |
---|---|---|---|---|
vault_id | required | The vault ID of the email to submit | string |
DATA PATH | TYPE | CONTAINS | EXAMPLE VALUES |
---|---|---|---|
action_result.parameter.vault_id | string | ||
action_result.status | string | success failed | |
action_result.message | string | ||
summary.total_objects | numeric | ||
summary.total_objects_successful | numeric | ||
summary.data.*.alert_id | string | ||
action_result.data | string | ||
action_result.summary | string |
Index the file's genes into the organizational database
Type: correct
Read only: False
Index the file's genes into the organizational database.
PARAMETER | REQUIRED | DESCRIPTION | TYPE | CONTAINS |
---|---|---|---|---|
index_as | required | "trusted" or "malicious" | string | |
vault_id | optional | File's vault ID | string | vault id |
family_name | optional | Family name | string |
DATA PATH | TYPE | CONTAINS | EXAMPLE VALUES |
---|---|---|---|
action_result.parameter.index_as | string | ||
action_result.parameter.vault_id | string | vault id |
|
action_result.parameter.family_name | string | ||
action_result.status | string | success failed | |
action_result.data | string | ||
action_result.message | string | ||
summary.total_objects | numeric | ||
summary.total_objects_successful | numeric | ||
summary.data.*.index_id | string | ||
action_result.summary | string |
Unset file's indexing
Type: correct
Read only: False
Unset file's indexing.
PARAMETER | REQUIRED | DESCRIPTION | TYPE | CONTAINS |
---|---|---|---|---|
file_hash | required | File's hash (SHA1, SHA256, MD5) | string |
DATA PATH | TYPE | CONTAINS | EXAMPLE VALUES |
---|---|---|---|
action_result.parameter.file_hash | string | ||
action_result.status | string | success failed | |
action_result.data | string | ||
action_result.message | string | ||
summary.total_objects | numeric | ||
summary.total_objects_successful | numeric | ||
action_result.summary | string |