Skip to main content

Cyberint Feed

This Integration is part of the Cyberint Pack.#

Supported versions

Supported Cortex XSOAR versions: 6.9.0 and later.

Use the Cyberint Feed integration to get indicators from the feed.

Configure Cyberint Feed on Cortex XSOAR#

  1. Navigate to Settings > Integrations > Servers & Services.

  2. Search for Cyberint Feed.

  3. Click Add instance to create and configure a new integration instance.

    ParameterDescriptionRequired
    Cyberint API URLExample: https://yourcompany.cyberint.ioTrue
    API access tokenTrue
    Fetch indicatorsShould be checked (true)False
    Indicator TypeWhich indicator types to fetchTrue
    ConfidenceConfidence about the indicator details. The value of confidence to fetch indicators from. The value between 0-100.False
    SeveritySeverity about the indicator details. The value of severity to fetch indicators from. The value between 0-100.False
    TagsSupports CSV values.False
    Bypass exclusion listWhen selected, the exclusion list is ignored for indicators from this feed. This means that if an indicator from this feed is on the exclusion list, the indicator might still be added to the system.False
    Trust any certificate (not secure)False
    Use system proxy settingsFalse
  4. Click Test to validate the URLs, token, and connection.

Commands#

You can execute these commands from the Cortex XSOAR CLI, as part of an automation, or in a playbook. After you successfully execute a command, a DBot message appears in the War Room with the command details.

cyberint-get-indicators#


Gets indicators from the feed.

Base Command#

cyberint-get-indicators

Input#

Argument NameDescriptionRequired
limitThe maximum number of results to return. The default value is 10. Default is 10.Optional

Context Output#

PathTypeDescription
Cyberint.ioc_valueStringThe indicator value.
Cyberint.ioc_typeStringThe indicator type.
Cyberint.descriptionStringThe feed description.
Cyberint.detected_activityStringThe feed detected activity.
Cyberint.observation_dateStringThe feed observation date.
Cyberint.severity_scoreStringThe feed severity score.
Cyberint.confidenceStringThe feed confidence.

Command example#

!cyberint-get-indicators limit=10 execution-timeout=700

Context Example#

{
"Cyberint": [
{
"fields": {
"Description": "Recognized as Malicious.",
"FirstSeenBySource": "2024-01-23T22:53:36+00:00",
"reportedby": "Cyberint",
"trafficlightprotocol": "GREEN"
},
"rawJSON": {
"confidence": 80,
"description": "Recognized as Malicious.",
"detected_activity": "malware_payload",
"ioc_type": "file/sha256",
"ioc_value": "ioc1",
"observation_date": "2024-01-23T22:53:36+00:00",
"severity_score": 100
},
"service": "Cyberint",
"type": "File",
"value": "ioc1"
},
{
"fields": {
"Description": "Recognized as zzz.",
"FirstSeenBySource": "2024-01-23T22:55:36+00:00",
"reportedby": "Cyberint",
"trafficlightprotocol": "GREEN"
},
"rawJSON": {
"confidence": 80,
"description": "Recognized as zzz.",
"detected_activity": "malware_payload",
"ioc_type": "file/sha256",
"ioc_value": "ioc2",
"observation_date": "2024-01-23T22:55:36+00:00",
"severity_score": 100
},
"service": "Cyberint",
"type": "File",
"value": "ioc2"
},
{
"fields": {
"Description": "Recognized as xxx.",
"FirstSeenBySource": "2024-01-23T22:53:35+00:00",
"reportedby": "Cyberint",
"trafficlightprotocol": "GREEN"
},
"rawJSON": {
"confidence": 80,
"description": "Recognized as xxx.",
"detected_activity": "malware_payload",
"ioc_type": "file/sha256",
"ioc_value": "ioc3",
"observation_date": "2024-01-23T22:53:35+00:00",
"severity_score": 100
},
"service": "Cyberint",
"type": "File",
"value": "ioc3"
},
{
"fields": {
"Description": "Recognized as xxx.",
"FirstSeenBySource": "2024-01-23T22:55:31+00:00",
"reportedby": "Cyberint",
"trafficlightprotocol": "GREEN"
},
"rawJSON": {
"confidence": 80,
"description": "Recognized as xxx.",
"detected_activity": "malware_payload",
"ioc_type": "file/sha256",
"ioc_value": "ioc4",
"observation_date": "2024-01-23T22:55:31+00:00",
"severity_score": 100
},
"service": "Cyberint",
"type": "File",
"value": "ioc4"
},
{
"fields": {
"Description": "Recognized as xxx.",
"FirstSeenBySource": "2024-01-23T22:55:35+00:00",
"reportedby": "Cyberint",
"trafficlightprotocol": "GREEN"
},
"rawJSON": {
"confidence": 80,
"description": "Recognized as xxx.",
"detected_activity": "malware_payload",
"ioc_type": "file/sha256",
"ioc_value": "ioc5",
"observation_date": "2024-01-23T22:55:35+00:00",
"severity_score": 100
},
"service": "Cyberint",
"type": "File",
"value": "ioc5"
},
{
"fields": {
"Description": "Recognized as Trojan.xxx.",
"FirstSeenBySource": "2024-01-23T22:55:39+00:00",
"reportedby": "Cyberint",
"trafficlightprotocol": "GREEN"
},
"rawJSON": {
"confidence": 80,
"description": "Recognized as Trojan.xxx.",
"detected_activity": "malware_payload",
"ioc_type": "file/sha256",
"ioc_value": "ioc6",
"observation_date": "2024-01-23T22:55:39+00:00",
"severity_score": 100
},
"service": "Cyberint",
"type": "File",
"value": "ioc6"
},
{
"fields": {
"Description": "Recognized as xxx.",
"FirstSeenBySource": "2024-01-12T01:39:06+00:00",
"reportedby": "Cyberint",
"trafficlightprotocol": "GREEN"
},
"rawJSON": {
"confidence": 80,
"description": "Recognized as xxx.",
"detected_activity": "malware_payload",
"ioc_type": "file/sha256",
"ioc_value": "ioc7",
"observation_date": "2024-01-12T01:39:06+00:00",
"severity_score": 100
},
"service": "Cyberint",
"type": "File",
"value": "ioc7"
},
{
"fields": {
"Description": "Recognized as xxx.",
"FirstSeenBySource": "2024-01-23T22:55:36+00:00",
"reportedby": "Cyberint",
"trafficlightprotocol": "GREEN"
},
"rawJSON": {
"confidence": 80,
"description": "Recognized as xxx.",
"detected_activity": "malware_payload",
"ioc_type": "file/sha256",
"ioc_value": "ioc8",
"observation_date": "2024-01-23T22:55:36+00:00",
"severity_score": 100
},
"service": "Cyberint",
"type": "File",
"value": "ioc8"
},
{
"fields": {
"Description": "Recognized as xxx.",
"FirstSeenBySource": "2023-12-16T21:28:01+00:00",
"reportedby": "Cyberint",
"trafficlightprotocol": "GREEN"
},
"rawJSON": {
"confidence": 70,
"description": "Recognized as xxx.",
"detected_activity": "malware_payload",
"ioc_type": "file/sha256",
"ioc_value": "ioc9",
"observation_date": "2023-12-16T21:28:01+00:00",
"severity_score": 100
},
"service": "Cyberint",
"type": "File",
"value": "ioc9"
},
{
"fields": {
"Description": "Recognized as xxx.",
"FirstSeenBySource": "2024-01-23T22:55:35+00:00",
"reportedby": "Cyberint",
"trafficlightprotocol": "GREEN"
},
"rawJSON": {
"confidence": 80,
"description": "Recognized as xxx.",
"detected_activity": "malware_payload",
"ioc_type": "file/sha256",
"ioc_value": "ioc10",
"observation_date": "2024-01-23T22:55:35+00:00",
"severity_score": 100
},
"service": "Cyberint",
"type": "File",
"value": "ioc10"
}
]
}

Human Readable Output#

Indicators from Cyberint Feed:#

ValueType
ioc1File
ioc2File
ioc3File
ioc4File
ioc5File
ioc6File
ioc7File
ioc8File
ioc9File
ioc10File