Joe Security (Deprecated)
Joe Security Pack.#
This Integration is part of theDeprecated
Use Joe Security v2 instead.
Overview
Use the Joe Security Sandbox integration to detect and analyze potentially malicious files.
Using the integration you can analyze URL links and sample files on different machine types (Windows, Android, iOS and Mac OS X).
All file types are supported.
This integration was integrated and tested with Joe Security v2.
Playbooks
- JoeSecurity -Detonate URL
- JoeSecurity -Detonate File
- JoeSecurity -Detonate File From URL
Use Cases
- Add a file to the integrations war room.
- Sample a file.
- Get information on an old analysis.
- Send a URL sample to Joe Security.
Prerequisites
Before you configure the integration, retrieve the API key from your Joe Security environment.
- Use this link to log in to the Joe Security platform.
- Click the button in the top-right corner and select Settings .
- In the API Key section, select the I Agree checkbox.
- Click the Generate API key button.
- Copy the API key for later use.
Configure the Joe Security Integration on Cortex XSOAR
- Navigate to Settings > Integrations > Servers & Services .
- Search for Joe Security.
-
Click
Add instance
to create and configure a new integration instance.
- Name : A textual name for the integration instance.
- Joe Security URL : URL of the Joe Security server
- API Key
- Trust any certificate (not secure)
- Do not use by default
- Cortex XSOAR engine
- Click Test to validate the URLs and connection.
Commands
You can execute these commands from the Cortex XSOAR CLI, as part of an automation, or in a playbook. After you successfully execute a command, a DBot message appears in the War Room with the command details.
- Ping the server: joe-is-online
- Submit a URL for analysis: joe-analysis-submit-url
- Get analysis information: joe-analysis-info
- Get analyes list: joe-list-analysis
- Submit sample for analysis: joe-analysis-submit-sample
- Search Analyses: joe-search
- Download a report: joe-download-report
- Download analysis file: joe-download-sample
- Detonate a file: joe-detonate-file
- Detonate a URL: joe-detonate-url
Ping the server
Pings the Joe Security server to verify that it is responsive.
Base Command
joe-is-online
Input
There is no input for this command.
Context Data
There is no context data for this command.
Raw Output
There is not raw output for this command.
Submit a URL for analysis
Submits a URL to Joe Security for analysis.
Base Command
joe-analysis-submit-url
Input
Parameter | Required | Description |
url | Required | URL to submit for analysis. |
should_wait | Optional | Specifies if the command polls for the result of the analysis. |
comments | Optional | Comments for the analysis. |
Systems | Optional |
Comma separated list of operating systems to run analysis on. Valid values are:
|
internet-access | Optional |
If to enable full internet access (boolean). Default is True. |
Context Data
Path | Type | Description |
Joe.Analysis.WebID | String | Web ID |
Joe.Analysis.FileName | String | Sample data, could be a file name or URL |
Joe.Analysis.Status | String | Analysis status |
Joe.Analysis.Comments | String | Analysis comments |
Joe.Analysis.Time | Date | Time submitted |
Joe.Analysis.Runs | Unknown | Sub-analysis information |
Joe.Analysis.Result | String | Analysis results |
Joe.Analysis.Errors | Unknown | Errors raised during sampling |
Joe.Analysis.Systems | Unknown | Analysis operating system |
Joe.Analysis.MD5 | String | MD5 hash of the analysis sample |
Joe.Analysis.SHA1 | String | SHA-1 hash of the analysis sample |
Joe.Analysis.SHA256 | String | SHA-256 has of the analysis sample |
DBotScore.Vendor | String | The name of the vendor (JoeSecurity) |
DBotScore.Indicator | Unknown | The name of the sample file or URL |
DBotScore.Type | String |
url - for URL samples file - for anything not URL sample |
DBotScore.Score | String |
Cortex XSOAR Dbot Score:
|
DBotScore.Malicious.Vendor | String | The name of the vendor (JoeSecurity) |
DBotScore.Malicious.Detections | String | The sub analysis detection statuses |
DBotScore.Malicious.SHA1 | String | SHA-1 hash of the file |
Raw Output
There is no raw output for this command.
Get analysis information
Returns information for a specified analysis.
Base Command
joe-analysis-info
Input
Parameter | Required | Description |
webId | Required | Web ID. Supports comma-separated arrays. |
Context Data
Path | Type | Description |
---|---|---|
Joe.Analysis.WebID | String | Web ID |
Joe.Analysis.SampleName | String | Sample Data, could be a file name or URL |
Joe.Analysis.Status | String | Analysis status |
Joe.Analysis.Comments | String | Analysis comments |
Joe.Analysis.Time | Date | Submitted time |
Joe.Analysis.Runs | Unknown | Sub-analysis information |
Joe.Analysis.Result | String | Analysis results |
Joe.Analysis.Errors | Unknown | Errors raised during sampling |
Joe.Analysis.Systems | Unknown | Analysis operating system |
Joe.Analysis.MD5 | String | MD5 hash of the analysis sample |
Joe.Analysis.SHA1 | String | SHA-1 hash of the analysis sample |
Joe.Analysis.SHA256 | String | SHA-256 hash of the analysis sample |
DBotScore.Vendor | String | The name of the vendor (JoeSecurity) |
DBotScore.Indicator | Unknown | The name of the sample file or URL |
DBotScore.Type | string |
url - for URL samples file - for anything not URL sample |
DBotScore.Score | String |
Cortex XSOAR Dbot Score:
|
DBotScore.Malicious.Vendor | String | The name of the vendor (JoeSecurity) |
DBotScore.Malicious.Detections | String | The sub analysis detection statuses |
DBotScore.Malicious.SHA1 | String | The SHA-1 hash of the file |
Raw Output
There is no raw output for this command.
Get analyses list
Returns a list of all analyses.
Base Command
joe-list-analysis
Input
There is no input for this command.
Context Data
Path | Type | Description |
---|---|---|
Joe.Analysis.WebID | String | Web ID |
Joe.Analysis.SampleName | String | Sample Data, could be a file name or URL |
Joe.Analysis.Status | String | Analysis status |
Joe.Analysis.Comments | String | Analysis comments |
Joe.Analysis.Time | Date | Submitted time |
Joe.Analysis.Runs | Unknown | Sub-analysis information |
Joe.Analysis.Result | String | Analysis results |
Joe.Analysis.Errors | Unknown | Errors raised during sampling |
Joe.Analysis.Systems | Unknown | Analysis operating system |
Joe.Analysis.MD5 | String | MD5 hash of the analysis sample |
Joe.Analysis.SHA1 | String | SHA-1 hash of the analysis sample |
Joe.Analysis.SHA256 | String | SHA-256 hash of the analysis sample |
DBotScore.Vendor | String | The name of the vendor (JoeSecurity) |
DBotScore.Indicator | Unknown | The name of the sample file or URL |
DBotScore.Type | String |
url - for URL samples file - for anything not URL sample |
DBotScore.Score | String |
Cortex XSOAR Dbot Score:
|
DBotScore.Malicious.Vendor | String | The name of the vendor (JoeSecurity) |
DBotScore.Malicious.Detections | String | The sub analysis detection statuses |
DBotScore.Malicious.SHA1 | String | The SHA-1 hash of the file |
Raw Output
There is no raw output for this command.
Submit sample for analysis
Submits a sample to Joe Security for analysis.
Base Command
joe-analysis-submit-sample
Input
Parameter | Required | Description |
---|---|---|
file_id | Optional | War Room entry of a file (for example, 3245@4). |
sample_url | Optional | URL of a sample file. Supports comma-seperated arrays. |
should_wait | Optional | Specifies if the command polls for the result of the analysis |
comments | Optional | Comments for the analysis |
systems | Optional |
Comma separated list of operating systems to run analysis on. Valid values are:
|
internet-access | Optional | Enable full internet access. Default is True. |
Context Data
Path | Type | Description |
---|---|---|
Joe.Analysis.WebID | String | Web ID |
Joe.Analysis.SampleName | String | Sample data, could be a file name or URL |
Joe.Analysis.Status | String | Analysis status |
Joe.Analysis.Comments | String | Analysis comments |
Joe.Analysis.Time | Date | Submitted time |
Joe.Analysis.Runs | Unknown | Sub-analysis information |
Joe.Analysis.Result | String | Analysis results |
Joe.Analysis.Errors | Unknown | Errors raised during sampling |
Joe.Analysis.Systems | Unknown | Analysis operating system |
Joe.Analysis.MD5 | String | MD5 hash of the analysis sample |
Joe.Analysis.SHA1 | String | SHA-1 hash of the analysis sample |
Joe.Analysis.SHA256 | String | SHA-256 hash of the analysis sample |
DBotScore.Vendor | String | The name of the vendor (JoeSecurity) |
DBotScore.Indicator | Unknown | The name of the sample file or URL |
DBotScore.Type | String |
url - for URL samples file - for anything not URL sample |
DBotScore.Score | String |
Cortex XSOAR Dbot Score:
|
DBotScore.Malicious.Vendor | String | The name of the vendor (JoeSecurity) |
DBotScore.Malicious.Detections | String | The sub analysis detection statuses |
DBotScore.Malicious.SHA1 | String | The SHA-1 hash of the file |
Raw Output
There is no raw output for this command.
Search Analyses
Search through all analyses in Joe Security.
Base Command
joe-search
Input
Parameter | Description |
query |
String to search for in these fields:
|
Context Data
Path | Type | Description |
---|---|---|
Joe.Analysis.WebID | String | Web ID |
Joe.Analysis.SampleName | String | Sample data, could be a file name or URL |
Joe.Analysis.Status | String | Analysis status |
Joe.Analysis.Comments | String | Analysis comments |
Joe.Analysis.Time | Date | Submitted time |
Joe.Analysis.Runs | Unknown | Sub-analysis information |
Joe.Analysis.Result | String | Analysis results |
Joe.Analysis.Errors | Unknown | Errors raised during sampling |
Joe.Analysis.Systems | Unknown | Analysis operating system |
Joe.Analysis.MD5 | String | MD5 has of the analysis sample |
Joe.Analysis.SHA1 | String | SHA-1 hash of the analysis sample |
Joe.Analysis.SHA256 | String | SHA-256 has of the analysis sample |
DBotScore.Vendor | String | The name of the vendor (JoeSecurity) |
DBotScore.Indicator | Unknown | The name of the sample file or URL |
DBotScore.Type | String |
url - for URL samples file - for anything not URL sample |
DBotScore.Score | String |
Cortex XSOAR Dbot Score:
|
DBotScore.Malicious.Vendor | String | The name of the vendor (JoeSecurity) |
DBotScore.Malicious.Detections | String | The sub analysis detection statuses |
DBotScore.Malicious.SHA1 | String | The SHA-1 hash of the file |
Raw Output
There is no raw output for this command.
Download a report
Downloads a resource associated to a report. This can be the full report, dropped binaries, and so on. See all supported report types here:
Base Command
joe-download-report
Input
Parameter | Required | Description |
webid | Required |
Web ID |
type | Optional |
Resource type to download, default is html |
Context Data
Path | Type | Description |
---|---|---|
InfoFile.Name | String | Name of the file |
InfoFile.EntryID | String | The entry ID of the sample |
InfoFile.Size | Number | The size of the file |
InfoFile.Type | String | File type (for example, PE ) |
InfoFile.Info | String | Basic information about the file |
File.Extension | String | File extension |
Raw Output
There is no raw output for this command.
Download analysis file
Downloads the sample file of an analysis. For security considerations, the extension is dontrun .
Base Command
joe-download-sample
Input
Parameter | Required | Description |
webid | Required |
Web ID |
Context Data
Path | Type | Description |
---|---|---|
File.Size | Number | The size of the file |
File.SHA1 | String | SHA-1 hash of the file |
File.SHA256 | String | SHA-256 hash of the file |
File.Name | String | The sample name |
File.SSDeep | String | ssdeep hash of the file |
File.EntryID | String | War room entry ID of the file |
File.Info | String | Basic information of the file |
File.Type | String | File type (for example PE ) |
File MD5 | String | MD5 hash of the file |
File.Extension | String | File extension |
Raw Output
There is no raw output for this command.
Detonate a file
Submits a file for analysis.
Base Command
joe-detonate-file
Input
Parameter | Required | Description |
---|---|---|
file_id | Optional | War room entry of a file (for example, 3245@4) |
sample_url | Optional | URL of a sample file |
comments | Optional | Comments for the analysis |
systems | Optional |
Comma separated list of operating systems to run the analysis on. Valid values are:
|
internet-access | Optional | If to enable full internet access. Default is True |
Context Data
Path | Type | Description |
---|---|---|
Joe.Analysis.WebID | String | Web ID |
Joe.Analysis.SampleName | String | Sample Data, could be a file name or URL |
Joe.Analysis.Status | String | Analysis status |
Joe.Analysis.Comments | String | Analysis comments |
Joe.Analysis.Time | Date | Submission time |
Joe.Analysis.Runs | Unknown | Sub-analysis information |
Joe.Analysis.Result | String | Analysis results |
Joe.Analysis.Errors | Unknown | Errors raised during sampling |
Joe.Analysis.Systems | Unknown | Analysis operating system |
Joe.Analysis.MD5 | String | MD5 hash of the analysis sample |
Joe.Analysis.SHA1 | String | SHA-1 hash of the analysis sample |
Joe.Analysis.SHA256 | String | SHA-256 hash of the analysis sample |
DBotScore.Vendor | String | The name of the vendor (JoeSecurity) |
DBotScore.Indicator | Unknown | The name of the sample file or URL |
DBotScore.Type | String |
url - for URL samples file - for anything not URL sample |
DBotScore.Score | String |
Cortex XSOAR Dbot Score:
|
DBotScore.Malicious.Vendor | String | The name of the vendor (JoeSecurity) |
DBotScore.Malicious.Detections | String | The sub analysis detection statuses |
DBotScore.Malicious.SHA1 | String | The SHA-1 has of the file |
Raw Output
There is no raw output for this command.
Detonate a URL
Submits a URL for analysis.
Base Command
joe-detonate-url
Input
Parameter | Required | Description |
---|---|---|
url | Required | sample URL |
comments | Optional | Comments for the analysis |
systems | Optional |
Comma separated list of operating systems to run the analysis on. Valid values are:
|
internet-access | Optional | If to enable full internet access. Default is True. |
Context Data
Path | Type | Description |
---|---|---|
Joe.Analysis.WebID | String | Web ID |
Joe.Analysis.SampleName | String | Sample data, could be a file name or URL |
Joe.Analysis.Status | String | Analysis status |
Joe.Analysis.Comments | String | Analysis comments |
Joe.Analysis.Time | Date | Submission time |
Joe.Analysis.Runs | Unknown | Sub-analysis information |
Joe.Analysis.Result | String | Analysis results |
Joe.Analysis.Errors | Unknown | Errors raised during sampling |
Joe.Analysis.Systems | Unknown | Analysis operating system |
Joe.Analysis.MD5 | String | MD5 hash of the analysis sample |
Joe.Analysis.SHA1 | String | SHA-1 hash of the analysis sample |
Joe.Analysis.SHA256 | String | SHA-256 hash of the analysis sample |
DBotScore.Vendor | String | The name of the vendor (JoeSecurity) |
DBotScore.Indicator | Unknown | The name of the sample file or URL |
DBotScore.Type | String |
url - for URL samples file - for anything not URL sample |
DBotScore.Score | String |
Cortex XSOAR Dbot Score:
|
DBotScore.Malicious.Vendor | String | The name of the vendor (JoeSecurity) |
DBotScore.Malicious.Detections | String | The sub analysis detection statuses |
DBotScore.Malicious.SHA1 | String | The SHA-1 hash of the file |
Raw Output
There is no raw output for this command.