ACTI Indicator Query
Accenture CTI v2 Pack.#
This Integration is part of theSupported versions
Supported Cortex XSOAR versions: 5.5.0 and later.
ACTI provides intelligence regarding security threats and vulnerabilities. This integration was integrated and tested with version 2.93.0 of ACTI
#
Configure ACTI Indicator Query on Cortex XSOARNavigate to Settings > Integrations > Servers & Services.
Search for ACTI Indicator Query.
Click Add instance to create and configure a new integration instance.
Parameter Description Required url URL True API Token The API Token to use for connection True Source Reliability Reliability of the source providing the intelligence data. True Trust any certificate (not secure) False Use system proxy settings False Click Test to validate the URLs, token, and connection.
#
CommandsYou can execute these commands from the Cortex XSOAR CLI, as part of an automation, or in a playbook. After you successfully execute a command, a DBot message appears in the War Room with the command details.
#
ipChecks the reputation of the given IP address.
#
Base Commandip
#
InputArgument Name | Description | Required |
---|---|---|
ip | IP address to check. | Optional |
#
Context OutputPath | Type | Description |
---|---|---|
IP.Address | String | The IP address that was checked. |
IP.Malicious.Vendor | String | For malicious IP addresses, the vendor that made the decision. |
IP.Malicious.Description | String | For malicious IP addresses, the reason the vendor made that decision. |
DBotScore.Indicator | String | The indicator that was tested. |
DBotScore.Reliability | String | Reliability of the source providing the intelligence data. |
DBotScore.Type | String | The indicator type. |
DBotScore.Vendor | String | The vendor used to calculate the score. |
DBotScore.Score | String | The actual score. |
#
Command Example!ip ip=0.0.0.0
#
Context Example#
Human Readable Output#
Results
Confidence DbotReputation LastPublished Name ThreatTypes TypeOfUse 0 2 2018-04-25 14:20:30 0.0.0.0 Cyber Espionage MALWARE_DOWNLOAD, MALWARE_C2
#
domainChecks the reputation of the given domain.
#
Base Commanddomain
#
InputArgument Name | Description | Required |
---|---|---|
domain | The domain to check. | Optional |
#
Context OutputPath | Type | Description |
---|---|---|
Domain.Name | String | The name of the domain that was checked. |
Domain.Malicious.Vendor | String | For malicious domains, the vendor that made the decision. |
Domain.Malicious.Description | String | For malicious domains, the reason the vendor made that decision. |
DBotScore.Indicator | String | The indicator that was tested. |
DBotScore.Reliability | String | Reliability of the source providing the intelligence data. |
DBotScore.Type | String | The indicator type. |
DBotScore.Vendor | String | The vendor used to calculate the score. |
DBotScore.Score | Number | The actual score. |
#
Command Example!domain domain=example.org
#
Context Example#
Human Readable Output#
Results
Confidence DbotReputation LastPublished Name ThreatTypes TypeOfUse 50 2 2019-09-18 15:56:49 example.org Cyber Crime MALWARE_C2
#
urlChecks the reputation of the given URL.
#
Base Commandurl
#
InputArgument Name | Description | Required |
---|---|---|
url | The URL to check (must start with "http://"). | Optional |
#
Context OutputPath | Type | Description |
---|---|---|
URL.Data | String | The URL that was checked. |
URL.Malicious.Vendor | String | For malicious URLs, the vendor that made the decision. |
URL.Malicious.Description | String | For malicious URLs, the reason the vendor made that decision. |
DBotScore.Indicator | String | The indicator that was tested. |
DBotScore.Reliability | String | Reliability of the source providing the intelligence data. |
DBotScore.Type | String | The indicator type. |
DBotScore.Vendor | String | The vendor used to calculate the score. |
DBotScore.Score | Number | The actual score. |
#
Command Example!url url=http://example.com
#
Context Example#
Human Readable Output#
Results
Confidence DbotReputation LastPublished Name ThreatTypes TypeOfUse 50 2 2020-09-16 20:29:35 http://example.com Cyber Crime MALWARE_C2
#
acti-get-ioc-by-uuidChecks reputation of a specific indicator(URL/IP/Domain) uuid.
#
Base Commandacti-get-ioc-by-uuid
#
InputArgument Name | Description | Required |
---|---|---|
uuid | Unique User ID. | Required |
#
Context OutputPath | Type | Description |
---|---|---|
IP.Address | String | The IP address. |
IP.Malicious.Vendor | String | For malicious IP addresses, the vendor that made the decision. |
IP.Malicious.Description | String | For malicious IP addresses, the reason the vendor made that decision. |
Domain.Name | String | The domain name. |
Domain.Malicious.Vendor | String | For malicious domains, the vendor that made the decision. |
Domain.Malicious.Description | String | For malicious domains, the reason the vendor made that decision. |
URL.Data | String | The URL. |
URL.Malicious.Vendor | String | For malicious URLs, the vendor that made the decision. |
URL.Malicious.Description | String | For malicious URLs, the reason the vendor made that decision. |
DBotScore.Indicator | String | The indicator that was tested. |
DBotScore.Reliability | String | Reliability of the source providing the intelligence data. |
DBotScore.Type | String | The indicator type. |
DBotScore.Vendor | String | The vendor used to calculate the score. |
DBotScore.Score | Number | The actual score. |
#
Command Example!acti-get-ioc-by-uuid uuid=xxxx
#
Context Example#
Human Readable Output#
Results
Confidence DbotReputation LastPublished Name ThreatTypes TypeOfUse 0 2 2017-01-11 20:56:22 example.org Cyber Espionage MALWARE_C2
#
acti-get-fundamentals-by-uuidChecks reputation of a specific Malware Family/ Threat Campaign/ Threat Group/ Threat Actor.
#
Base Commandacti-get-fundamentals-by-uuid
#
InputArgument Name | Description | Required |
---|---|---|
uuid | Unique ID of the specific Malware Family/ Threat Campaign/ Threat Group/ Threat Actor. | Required |
#
Context OutputPath | Type | Description |
---|---|---|
ACTI_MalwareFamily.display_text | String | The display text of the Malware Family, for example, 'Artemis' |
ACTI_MalwareFamily.threat_types | String | The threat type of the Malware Family. |
ACTI_MalwareFamily.type | String | The type of fundamental i.e. an Malware Family , for example, 'malware_family' |
ACTI_MalwareFamily.last_published | String | The last published date of the Malware Family, for example, '2022-02-11T17:24:03.604Z' |
ACTI_MalwareFamily.last_modified | String | The last modified date of the Malware Family, for example, '2022-02-11T17:24:03.604Z' |
ACTI_MalwareFamily.index_timestamp | String | The index timestamp of the Malware Family, for example, '2022-02-11T17:24:03.604Z' |
ACTI_MalwareFamily.created_on | String | The creation timestamp of the Malware Family, for example, '2020-03-12T22:22:25.000Z' |
ACTI_MalwareFamily.description | String | The description of the Malware Family |
ACTI_MalwareFamily.analysis | String | The analysis of the Malware Family |
ACTI_ThreatGroup.display_text | String | The display text of the Threat Group, for example, 'Black Shadow' |
ACTI_ThreatGroup.threat_types | String | The threat type of the Threat Group. |
ACTI_ThreatGroup.type | String | The type of fundamental i.e. an Threat Group, for example, 'threat_group' |
ACTI_ThreatGroup.last_published | String | The last published date of the Threat Group, for example, '2022-02-11T17:24:03.604Z' |
ACTI_ThreatGroup.last_modified | String | The last modified date of the Threat Group, for example, '2022-02-11T17:24:03.604Z' |
ACTI_ThreatGroup.index_timestamp | String | The index timestamp of the Threat Group, for example, '2022-02-11T17:24:03.604Z' |
ACTI_ThreatGroup.created_on | String | The creation timestamp of the Threat Group, for example, '2020-03-12T22:22:25.000Z' |
ACTI_ThreatGroup.description | String | The description of the Threat Group |
ACTI_ThreatGroup.analysis | String | The analysis of the Threat Group |
ACTI_ThreatActor.display_text | String | The display text of the Threat Actor, for example, 'RastaFarEye' |
ACTI_ThreatActor.threat_types | String | The threat type of the Threat Actor. |
ACTI_ThreatActor.type | String | The type of fundamental i.e. an Threat Actor, for example, 'threat_actor' |
ACTI_ThreatActor.last_published | String | The last published date of the Threat Actor, for example, '2022-02-11T17:24:03.604Z' |
ACTI_ThreatActor.last_modified | String | The last modified date of the Threat Actor, for example, '2022-02-11T17:24:03.604Z' |
ACTI_ThreatActor.index_timestamp | String | The index timestamp of the Threat Actor, for example, '2022-02-11T17:24:03.604Z' |
ACTI_ThreatActor.created_on | String | The creation timestamp of the Threat Actor, for example, '2020-03-12T22:22:25.000Z' |
ACTI_ThreatActor.description | String | The description of the Threat Actor |
ACTI_ThreatActor.analysis | String | The analysis of the Threat Actor |
ACTI_ThreatCampaign.display_text | String | The display text of the Threat Campaign, for example, 'FBI Flash CU-000141-MW' |
ACTI_ThreatCampaign.threat_types | String | The threat type of the Threat Campaign. |
ACTI_ThreatCampaign.type | String | The type of fundamental i.e. an Threat Campaign , for example, 'threat_campaign' |
ACTI_ThreatCampaign.last_published | String | The last published date of the Threat Campaign, for example, '2022-02-11T17:24:03.604Z' |
ACTI_ThreatCampaign.last_modified | String | The last modified date of the Threat Campaign, for example, '2022-02-11T17:24:03.604Z' |
ACTI_ThreatCampaign.index_timestamp | String | The index timestamp of the Threat Campaign, for example, '2022-02-11T17:24:03.604Z' |
ACTI_ThreatCampaign.created_on | String | The creation timestamp of the Threat Campaign, for example, '2020-03-12T22:22:25.000Z' |
ACTI_ThreatCampaign.description | String | The description of the Threat Campaign |
ACTI_ThreatCampaign.analysis | String | The analysis of the Threat Campaign |
DBotScore.Indicator | String | The indicator that was tested. |
DBotScore.Reliability | String | Reliability of the source providing the intelligence data. |
DBotScore.Type | String | The indicator type. |
DBotScore.Vendor | String | The vendor used to calculate the score. |
DBotScore.Score | Number | The actual score. |
#
Command Example!acti-get-fundamentals-by-uuid uuid=7q2b129s-6421-4e22-a276-22be5f76cba8
#
Context Example#
Human Readable Output#
Danabot
For more insight click: https://intelgraph.idefense.com/#/node/malware_family/view/7q2b129s-6421-4e22-a276-22be5f76cba8
CreatedOn DBotReputation IndexTimestamp LastModified LastPublished Name Severity ThreatTypes Type 2021-04-02 04:40:19 2 2021-04-02 04:40:19 2021-04-02 04:40:19 2021-04-02 04:40:19 Danabot 3 Cyber Crime malware_family
#
acti-getThreatIntelReportFetches Intelligence Alerts & Intelligence Reports.
#
Base Commandacti-getThreatIntelReport
#
InputArgument Name | Description | Required |
---|---|---|
uuid | uuid of Intelligence Alert/Report (IA/IR) in the ACTI IntelGraph platform. | Required |
#
Context OutputPath | Type | Description |
---|---|---|
IAIR.abstract | String | This field is specific to Intelligence Alert and provides a summarised context, for example, 'The worldwide COVID-19 outbreak...' |
IAIR.last_published | String | The last published timestamp of the IA/IR, for example, '2020-06-26T01:14:56.000Z' |
IAIR.index_timestamp | String | The index timestamp of the IA/IR, for example, '2022-02-11T17:24:03.604Z' |
IAIR.display_text | String | The display text of the IA/IR, for example, 'SITREP Cybersecurity Risks Related to COVID-19' |
IAIR.value | String | The value of the IA/IR, for example, '8b8b48f1-92a0-411a-a073-3241f6819f8b' |
IAIR.last_modified | String | The last modified timestamp of the IA/IR, for example, '2022-02-11T17:21:48.000Z' |
IAIR.threat_types | String | The threat type of the IA/IR, for example, '- Hacktivism- Cyber Espionage- Cyber Crime- Vulnerability'. It's formatted in such a way that it gets displayed better. |
IAIR.created_on | String | The creation timestamp of the IA/IR, for example, '2020-03-12T22:22:25.000Z' |
IAIR.title | String | The title of the IA/IR, for example, 'SITREP Cybersecurity Risks Related to COVID-19' |
IAIR.type | String | The type of report i.e. an IA/IR , for example, 'intelligence_alert' |
IAIR.uuid | String | The uuid of the IA/IR, for example, '8b8b48f1-92a0-411a-a073-3241f6819f8b' |
IAIR.analysis | String | The analysis of the IA/IR, for example, 'COVID-19 Introduces Cyberthreat Opportunities...' |
IAIR.attachment_links | String | Provides with the document links related to the Intelligence Alert. This field is specific to Intelligence Alert, for example, 'https://intelgraph.idefense.com/rest/files/download/...' |
IAIR.severity | String | Provides severity rating. This field is specific to Intelligence Alert, for example, '4' |
IAIR.mitigation | String | Provides info on how to mitigate. This field is specific to Intelligence Alert, for example, '## Expert, Experienced Advice Will be CriticalTo minimize targeting opportunities...' |
IAIR.conclusion | String | Provides conclusion of the report. This field is specific to Intelligence Report |
IAIR.summary | String | Provides with a summary of the report. This field is specific to Intelligence Report. |
IAIR.dynamic_properties | String | Provides with the dynamic properties related to the intelligence alert/report. |
IAIR.links | String | Provides details of the linked fields related to the intelligence alert/report. |
IAIR.sources_external | String | Provides with external sources related to the intelligence alert/report. |
DBotScore.Indicator | String | The indicator that was tested. |
DBotScore.Reliability | String | Reliability of the source providing the intelligence data. |
DBotScore.Type | String | The indicator type. |
DBotScore.Vendor | String | The vendor that was used to calculate the score. |
DBotScore.Score | String | The actual score. |
#
Command Example!acti-getThreatIntelReport uuid=8b8b48f1-92a0-411a-a073-3241f6819f8b
#
Context Example#
Human Readable OutputReport has been fetched! UUID: 8b8b48f1-92a0-411a-a073-3241f6819f8b Link to view report: https://intelgraph.idefense.com/#/node/intelligence_alert/view/8b8b48f1-92a0-411a-a073-3241f6819f8b