Skip to main content

Infoblox Threat Intelligence Feed

This Integration is part of the Infoblox Threat Intelligence Feed Pack.#

Supported versions

Supported Cortex XSOAR versions: 6.10.0 and later.

The Infoblox Threat Intelligence Feed retrieves the discovered indicators from the Infoblox platform based on user-specified filters. This integration was integrated and tested with version 1.0.0 of InfobloxThreatIntelligenceFeed.

Configure Infoblox Threat Intelligence Feed in Cortex#

ParameterDescriptionRequired
Service API KeyService API key for Infoblox TIDE API authenticationTrue
Fetch indicatorsFalse
Indicator TypesThe type of indicators to be retrieved.False
First Fetch TimeThe date or relative timestamp from where to start fetching indicators.

Supported formats: 2 minutes, 2 hours, 2 days, 2 weeks, 2 months, 2 years, yyyy-mm-dd, yyyy-mm-ddTHH:MM:SSZ

For example: 01 Mar 2025, 01 Mar 2025 04:45:33, 2025-05-17T04:45:33Z

Note: The maximum allowed relative time is 4 hours or 240 minutes.
False
Max Indicators Per FetchThe maximum number of indicators to fetch in each run.

Note: The maximum allowed value is 50000.
False
DGA ThreatFilter the indicators having threats originated from dynamically generated algorithms.False
Threat ClassesFilters the indicators according to the selected threat classes.False
Data ProvidersFilter indicators by data provider profiles.False
Indicator ReputationIndicators from this integration instance will be marked with this reputation.False
Source ReliabilityReliability of the source providing the intelligence data.True
Traffic Light Protocol ColorThe Traffic Light Protocol (TLP) designation to apply to indicators fetched from the feed.False
TagsSupports CSV values.False
Bypass exclusion listWhen selected, the exclusion list is ignored for indicators from this feed. This means that if an indicator from this feed is on the exclusion list, the indicator might still be added to the system.False
Indicator Expiration MethodFalse
Feed Fetch IntervalTime interval for fetching indicators.

Note: The maximum allowed interval is 4 hours or 240 minutes.
False
Trust any certificate (not secure)False
Use system proxy settingsFalse

Commands#

You can execute these commands from the CLI, as part of an automation, or in a playbook. After you successfully execute a command, a DBot message appears in the War Room with the command details.

infoblox-cloud-get-indicators#


Fetches a given limit of indicators from the Infoblox platform and displays them in human-readable format in the war room.

Base Command#

infoblox-cloud-get-indicators

Input#

Argument NameDescriptionRequired
limitThe maximum number of indicators to retrieve.

Note: The maximum allowed value is 50000. Default is 50.
Optional
indicator_typesThe type of indicators to be retrieved. Supports comma-separated values. Possible values are: IP, HOST, URL, EMAIL, HASH.Optional
from_dateThe date or relative timestamp from which indicator retrieval begins.

Supported formats: 2 minutes, 2 hours, 2 days, 2 weeks, 2 months, 2 years, yyyy-mm-dd, yyyy-mm-ddTHH:MM:SSZ

For example: 01 Mar 2025, 01 Mar 2025 04:45:33, 2025-05-17T04:45:33Z.
Optional
to_dateThe date or relative timestamp up to which indicator retrieval ends.

Supported formats: 2 minutes, 2 hours, 2 days, 2 weeks, 2 months, 2 years, yyyy-mm-dd, yyyy-mm-ddTHH:MM:SSZ

For example: 01 Mar 2025, 01 Mar 2025 04:45:33, 2025-05-17T04:45:33Z.
Optional
dga_threatFilter the indicators having threats originated from dynamically generated algorithms. Possible values are: Yes, No.Optional
threat_classesFilters the indicators according to the provided threat classes. Supports comma-separated values. Possible values are: APT, Bot, CompromisedDomain, CompromisedHost, Cryptocurrency, DDoS, DNSTunnel, ExploitKit, ICS, IllegalContent, InternetInfrastructure, IntrusionAttempt, LimitedDistro, Malicious, MaliciousNameserver, MalwareC2, MalwareC2DGA, MalwareDownload, Parked, Phishing, Policy, PolicyViolation, Proxy, Scam, Sinkhole, Spambot, Suspicious, UncategorizedThreat, Undefined, UnwantedContent, WebAppAttack, Whitelist.Optional
data_provider_profilesFilters the indicators according to the given data providers. Supports comma-separated values. Possible values are: IID, AISCOMM.Optional

Context Output#

PathTypeDescription
Infoblox.FeedIndicator.idStringUnique identifier of the indicator.
Infoblox.FeedIndicator.typeStringType of the indicator (HOST, IP, URL, EMAIL, HASH).
Infoblox.FeedIndicator.hostStringHostname of the indicator.
Infoblox.FeedIndicator.domainStringDomain of the indicator.
Infoblox.FeedIndicator.ipStringIP address of the indicator.
Infoblox.FeedIndicator.emailStringEmail address of the indicator.
Infoblox.FeedIndicator.hashStringHash of the indicator.
Infoblox.FeedIndicator.hash_typeStringHash type of the indicator.
Infoblox.FeedIndicator.urlStringURL of the indicator.
Infoblox.FeedIndicator.valueStringThe indicator value.
Infoblox.FeedIndicator.tldStringTop-level domain of the indicator.
Infoblox.FeedIndicator.threat_levelNumberThreat level of the indicator (0-100).
Infoblox.FeedIndicator.threat_labelStringThreat label of the indicator.
Infoblox.FeedIndicator.confidenceNumberConfidence level of the indicator (0-100).
Infoblox.FeedIndicator.threat_classStringThreat class of the indicator.
Infoblox.FeedIndicator.propertyStringProperty of the indicator.
Infoblox.FeedIndicator.profileStringProfile of the indicator.
Infoblox.FeedIndicator.detectedDateDetection timestamp.
Infoblox.FeedIndicator.receivedDateReception timestamp.
Infoblox.FeedIndicator.expirationDateExpiration timestamp.
Infoblox.FeedIndicator.upStringStatus of the indicator.
Infoblox.FeedIndicator.dgaStringDomain generation algorithm.
Infoblox.FeedIndicator.batch_idStringBatch ID of the indicator.
Infoblox.FeedIndicator.threat_scoreNumberThreat score of the indicator.
Infoblox.FeedIndicator.threat_score_ratingStringThreat score rating of the indicator.
Infoblox.FeedIndicator.threat_score_vectorStringThreat score vector of the indicator.
Infoblox.FeedIndicator.confidence_scoreNumberConfidence score of the indicator.
Infoblox.FeedIndicator.confidence_score_ratingStringConfidence score rating of the indicator.
Infoblox.FeedIndicator.confidence_score_vectorStringConfidence score vector of the indicator.
Infoblox.FeedIndicator.extended.notesStringNotes for the indicator.
Infoblox.FeedIndicator.extended.commentsStringComments for the indicator.
Infoblox.FeedIndicator.extended.cyberint_guidStringGUID of the indicator.
Infoblox.FeedIndicator.extended.protocolStringProtocol of the indicator.
Infoblox.FeedIndicator.extended.referencesStringReferences of the indicator.
Infoblox.FeedIndicator.extended.original_profileStringOriginal profile of the indicator.
Infoblox.FeedIndicator.extended.attack_chainStringAttack chain of the indicator.
Infoblox.FeedIndicator.extended.sample_sha256StringSHA256 of the sample.

Command example#

!infoblox-cloud-get-indicators limit="5" indicator_types="EMAIL,IP,HOST,HASH,URL" from_date="2023-01-01T00:00:00.000Z" to_date="2024-12-31T23:59:59.999Z"

Context Example#

{
"Infoblox": {
"FeedIndicator": [
{
"id": "00000000-0000-0000-0000-000000000001",
"type": "EMAIL",
"host": "example.com",
"email": "test@example.com",
"domain": "example.com",
"tld": "com",
"profile": "IID",
"property": "APT_testC2",
"threat_class": "APT",
"threat_level": 80,
"expiration": "2043-01-06T00:41:57.421Z",
"detected": "2023-01-11T00:41:57.421Z",
"received": "2023-01-11T00:46:38.969Z",
"imported": "2023-01-11T00:46:38.969Z",
"up": "true",
"confidence": 100,
"batch_id": "00000000-0000-0000-0000-000000000001",
"threat_score": 9.1,
"threat_score_rating": "Critical",
"threat_score_vector": "TSIS:1.0/AV:N/AC:L/PR:L/UI:N/EX:H/MOD:L/AVL:L/CI:N/ASN:N/TLD:N/DOP:N/P:T",
"risk_score": 9.9,
"risk_score_rating": "Critical",
"risk_score_vector": "RSIS:1.0/TSS:C/TLD:N/CVSS:C/EX:H/MOD:L/AVL:L/T:H/DT:H",
"confidence_score": 8.1,
"confidence_score_rating": "High",
"confidence_score_vector": "COSIS:1.0/SR:H/POP:N/TLD:N/CP:T",
"extended": {
"cyberint_guid": "00000000000000000000000000000001",
"notes": "The email address is part of a cluster of test domains."
}
},
{
"id": "00000000-0000-0000-0000-000000000002",
"type": "IP",
"ip": "0.0.0.0",
"profile": "IID",
"property": "APT_testC2",
"threat_class": "APT",
"threat_level": 100,
"expiration": "2042-11-01T09:29:18.721Z",
"detected": "2022-11-01T09:29:18.721Z",
"received": "2022-11-01T09:31:39.329Z",
"imported": "2022-11-01T09:31:39.329Z",
"up": "true",
"confidence": 100,
"batch_id": "00000000-0000-0000-0000-000000000002",
"threat_score": 10,
"threat_score_rating": "Critical",
"threat_score_vector": "TSIS:1.0/AV:N/AC:L/PR:L/UI:N/EX:H/MOD:H/AVL:L/CI:N/ASN:N/TLD:N/DOP:N/P:T",
"risk_score": 9.9,
"risk_score_rating": "Critical",
"risk_score_vector": "RSIS:1.0/TSS:C/TLD:N/CVSS:C/EX:H/MOD:H/AVL:L/T:H/DT:H",
"confidence_score": 0.1,
"confidence_score_rating": "Unconfirmed",
"confidence_score_vector": "COSIS:1.0/SR:N/POP:N/TLD:N/CP:T",
"extended": {
"cyberint_guid": "00000000000000000000000000000002",
"notes": "test notes for APT testC2."
}
},
{
"id": "00000000-0000-0000-0000-000000000003",
"type": "HOST",
"host": "test.net",
"domain": "test.net",
"tld": "net",
"profile": "IID",
"property": "MalwareC2_testRAT",
"threat_class": "MalwareC2",
"threat_level": 100,
"threat_label": "LowProfileC2Beacon",
"expiration": "2026-04-15T23:54:58.665Z",
"detected": "2024-04-15T23:54:58.665Z",
"received": "2024-04-17T16:14:57.694Z",
"imported": "2024-04-17T16:14:57.694Z",
"dga": "false",
"up": "true",
"confidence": 100,
"batch_id": "00000000-0000-0000-0000-000000000003",
"threat_score": 10,
"threat_score_rating": "Critical",
"threat_score_vector": "TSIS:1.0/AV:N/AC:L/PR:L/UI:N/EX:H/MOD:H/AVL:L/CI:N/ASN:N/TLD:N/DOP:N/P:T",
"risk_score": 9.7,
"risk_score_rating": "Critical",
"risk_score_vector": "RSIS:1.0/TSS:C/TLD:N/CVSS:M/EX:H/MOD:H/AVL:L/T:H/DT:M",
"confidence_score": 8.1,
"confidence_score_rating": "High",
"confidence_score_vector": "COSIS:1.0/SR:H/POP:N/TLD:N/CP:T",
"extended": {
"cyberint_guid": "00000000000000000000000000000003",
"notes": "These domains appear to be set up for the DECOY DOG toolkit identified by Infoblox targeting enterprise infrastructure."
}
},
{
"id": "00000000-0000-0000-0000-000000000004",
"type": "HASH",
"hash": "000000000000000000000000000000000000000000000000000000000000001",
"hash_type": "SHA256",
"profile": "IID",
"property": "MalwareC2_Azorult",
"threat_class": "MalwareC2",
"threat_level": 100,
"expiration": "2025-08-25T20:00:34.12Z",
"detected": "2024-08-25T20:00:34.12Z",
"received": "2024-08-25T20:01:35.75Z",
"imported": "2024-08-25T20:01:35.75Z",
"up": "true",
"confidence": 100,
"batch_id": "00000000-0000-0000-0000-000000000005",
"extended": {
"cyberint_guid": "00000000000000000000000000000005",
"notes": "The file uses Living off the Land (LotL) methods, a malicious technique that involves abusing pre-built software on the victim's machine to execute attacks. This binary matches the threat signature",
"sample_sha256": "000000000000000000000000000000000000000000000000000000000000001"
}
},
{
"id": "00000000-0000-0000-0000-000000000005",
"type": "URL",
"ip": "0.0.0.0",
"url": "http://0.0.0.0/example",
"profile": "IID",
"property": "MalwareC2_Generic",
"threat_class": "MalwareC2",
"threat_level": 100,
"expiration": "2025-10-01T10:32:58.891Z",
"detected": "2025-06-03T10:32:58.891Z",
"received": "2025-06-03T10:36:37.283Z",
"imported": "2025-06-03T10:36:37.283Z",
"up": "true",
"confidence": 100,
"batch_id": "00000000-0000-0000-0000-000000000005",
"extended": {
"attack_chain": "ACIS",
"cyberint_guid": "00000000000000000000000000000005",
"notes": "Exfiltration target of Cuckoo Stealer for MacOS (SHA256: 00000000000000000000000000000005)",
"protocol": "http",
"references": "https://www.example.com/gui/file/00000000000000000000000000000005"
}
}
]
}
}

Human Readable Output#

Infoblox TIDE Indicators: Found 5 indicators between 2023-01-01T00:00:00.000Z and 2024-12-31T23:59:59.999Z#

TypeValueThreat ClassConfidenceThreat LevelExpirationPropertyProfile
Emailtest@example.comAPT100802043-01-06T00:41:57.421ZAPT_testC2IID
IP0.0.0.0APT1001002042-11-01T09:29:18.721ZAPT_testC2IID
Domaintest.netMalwareC21001002026-04-15T23:54:58.665ZMalwareC2_testRATIID
File000000000000000000000000000000000000000000000000000000000000001MalwareC21001002025-08-25T20:00:34.12ZMalwareC2_AzorultIID
URLhttp://0.0.0.0/exampleMalwareC21001002025-10-01T10:32:58.891ZMalwareC2_GenericIID