iDefense (Deprecated)
This Integration is part of the Accenture CTI (Deprecated) Pack.#
Deprecated
Use the iDefense v2 integration instead.
Use the iDefense integration to manage cyber threats and security issues in the iDefense security platform.
Configure iDefense on Cortex XSOAR
- Navigate to Settings > Integrations > Servers & Services .
- Search for iDefense.
-
Click
Add instance
to create and configure a new integration instance.
- Name : a textual name for the integration instance.
- URL
- API Token
- Trust any certificate (not secure)
- Use system proxy settings
- Click Test to validate the URLs, token, and connection.
Commands
You can execute these commands from the Cortex XSOAR CLI, as part of an automation, or in a playbook. After you successfully execute a command, a DBot message appears in the War Room with the command details.
- Check IP address: ip
- Check a domain: domain
- Check a URL: url
- Get threats from the iDefense database: idefence-general
- Get the reputation of an indicator: uuid
1. Check an IP address
Checks the reputation of an IP address.
Base Command
ip
Input
| Argument Name | Description | Required |
|---|---|---|
| ip | The IP address to check. | Required |
Context Output
| Path | Type | Description |
|---|---|---|
| IP.Address | unknown | The address of the bad IP. |
| IP.Malicious.Vendor | unknown | For malicious IPs, the name of the vendor that made the decision. |
| IP.Malicious.Description | unknown | For malicious IPs, the reason that the vendor to made the decision. |
| DBotScore.Indicator | unknown | The indicator that was tested. |
| DBotScore.Type | unknown | The type of indicator. |
| DBotScore.Vendor | unknown | The vendor used to calculate the score. |
| DBotScore.Score | unknown | The actual score. |
Command Example
!ip ip=256.256.256.256 using=iDefense_instance_1
Context Example
{
"IP": [
{
"Malicious": {
"Vendor": "iDefense",
"Description": "last seen as MALWARE_C2"
},
"Address": "256.256.256.256"
}
],
"DBotScore": [
{
"Vendor": "iDefense",
"Indicator": "256.256.256.256",
"Score": 2,
"Type": "ip"
}
]
}
Human Readable Output
iDefense IP Reputation
| Dbot Reputation | Name | Threat Types | confidence |
|---|---|---|---|
| Suspicious | 256.256.256.256 | Cyber Espionage | 50 |
2. Check a domain
Checks the reputation of a domain.
Base Command
domain
Input
| Argument Name | Description | Required |
|---|---|---|
| domain | The name of the domain to check. | Required |
Context Output
| Path | Type | Description |
|---|---|---|
| Domain.Name | unknown | The name of the bad domain. |
| Domain.Malicious.Vendor | unknown | For malicious domains, the name of the vendor that made the decision. |
| Domain.Malicious.Description | unknown | For malicious domains, the reason that the vendor made the decision. |
| DBotScore.Indicator | unknown | The indicator that was tested. |
| DBotScore.Type | unknown | The type of the indicator. |
| DBotScore.Vendor | unknown | The vendor used to calculate the score. |
| DBotScore.Score | unknown | The actual score. |
Command Example
!domain domain=example.com using=iDefense_instance_1
Context Example
{
"Domain": [
{
"Malicious": {
"Vendor": "iDefense",
"Description": "last seen as MALWARE_DOWNLOAD"
},
"Name": "example.com"
}
],
"DBotScore": [
{
"Vendor": "iDefense",
"Indicator": "example.com",
"Score": 2,
"Type": "domain"
}
]
}
Human Readable Output
iDefense Domain Reputation
| Dbot Reputation | Name | Threat Types | confidence |
|---|---|---|---|
| Suspicious | example.com | Cyber Espionage |
3. Check a URL
Checks the reputation of a URL.
Base Command
url
Input
| Argument Name | Description | Required |
|---|---|---|
| url | The name of the URL to check (must start with http://). | Required |
Context Output
| Path | Type | Description |
|---|---|---|
| URL.Data | unknown | The name of the bad URL. |
| URL.Malicious.Vendor | unknown | For malicious URLs, the vendor that made the decision. |
| URL.Malicious.Description | unknown | For malicious URLs, the reason that the vendor made the decision. |
| DBotScore.Indicator | unknown | The indicator that was tested. |
| DBotScore.Type | unknown | The type of indicator. |
| DBotScore.Vendor | unknown | The vendor used to calculate the score. |
| DBotScore.Score | unknown | The actual score. |
Command Example
!url url=http://example.com using=iDefense_instance_1
Context Example
{
"URL": [
{
"Malicious": {
"Vendor": "iDefense",
"Description": "last seen as MALWARE_C2"
},
"Data": "http://example.com"
}
],
"DBotScore": [
{
"Vendor": "iDefense",
"Indicator": "http://example.com",
"Score": 2,
"Type": "url"
}
]
}
Human Readable Output
iDefense URL Reputation
| Dbot Reputation | Name | Threat Types | confidence |
|---|---|---|---|
| Suspicious | http://example.com | Cyber Crime | 50 |
4. Get threats from the iDefense database
Returns threat information, such as IP address, URL and domain from the iDefense database.
Base Command
idefense-general
Input
| Argument Name | Description | Required |
|---|---|---|
| max_result | The maximum amount of results to return. | Optional |
Context Output
| Path | Type | Description |
|---|---|---|
| IP.Address | unknown | The name of the bad IP Address. |
| IP.Malicious.Vendor | unknown | For malicious IPs, the vendor that made the decision. |
| IP.Malicious.Description | unknown | For malicious IPs, the reason that the vendor made the decision. |
| Domain.Name | unknown | The name of the bad domain. |
| Domain.Malicious.Vendor | unknown | For malicious domains, the vendor that made the decision. |
| Domain.Malicious.Description | unknown | For malicious domains, the reason that the vendor made the decision. |
| URL.Data | unknown | The bad URL found. |
| URL.Malicious.Vendor | unknown | For malicious URLs, the vendor that made the decision. |
| URL.Malicious.Description | unknown | For malicious URLs, the reason that the vendor made the decision. |
| DBotScore.Indicator | unknown | The indicator that was tested. |
| DBotScore.Type | unknown | The type of indicator. |
| DBotScore.Vendor | unknown | The vendor used to calculate the score. |
| DBotScore.Score | unknown | The actual score. |
Command Example
!idefense-general max_result=1
Context Example
{
"URL": [
{
"Malicious": {
"Vendor": "iDefense",
"Description": "last seen as MALWARE_DOWNLOAD"
},
"Data": "http://example.com/malicious_file.exe"
},
{
"Vendor": "iDefense",
"Indicator": "http://example.com/suspicious_file.exe",
"Score": 2,
"Type": "url"
}
]
}
Human Readable Output
iDefense Reputations
| Dbot Reputation | Name | Threat Types | confidence |
|---|---|---|---|
| Malicious | http://example.com/malicious_file.exe | Cyber Crime | 100 |
| Suspicious | http://example.com/suspicious_file.exe | Cyber Crime | 50 |
5. Get the reputation of an indicator
Returns the reputation of a specific indicator.
Base Command
uuid
Input
| Argument Name | Description | Required |
|---|---|---|
| uuid | The unique ID of the user. | Required |
Context Output
| Path | Type | Description |
|---|---|---|
| IP.Address | unknown | The name of the bad IP Address. |
| IP.Malicious.Vendor | unknown | For malicious IPs, the vendor that made the decision. |
| IP.Malicious.Description | unknown | For malicious IPs, the reason that the vendor made the decision. |
| Domain.Name | unknown | The name of the bad domain. |
| Domain.Malicious.Vendor | unknown | For malicious domains, the vendor that made the decision. |
| Domain.Malicious.Description | unknown | For malicious domains, the reason that the vendor made the decision. |
| URL.Data | unknown | The name of the bad URL. |
| URL.Malicious.Vendor | unknown | For malicious URLs, the vendor that made the decision. |
| URL.Malicious.Description | unknown | For malicious URLs, the reason that the vendor made the decision. |
| DBotScore.Indicator | unknown | The indicator that was tested. |
| DBotScore.Type | unknown | The type of indicator. |
| DBotScore.Vendor | unknown | The vendor used to calculate the score. |
| DBotScore.Score | unknown | The actual score. |
Command Example
!uuid uuid=44a7d565-a260-9oc6-b7f4-2368dc3a4a67 using=iDefense_instance_1
Context Example
{
"Domain": [
{
"Malicious": {
"Vendor": "iDefense",
"Description": "last seen as MALWARE_C2"
},
"Name": "example.com"
}
],
"DBotScore": [
{
"Vendor": "iDefense",
"Indicator": "example.com",
"Score": 2,
"Type": "domain"
}
]
}
Human Readable Output
iDefense Reputations
| Dbot Reputation | Name | Threat Types | confidence |
|---|---|---|---|
| Suspicious | example.com | Cyber Espionage |