LastInfoSec
LastInfoSec Pack.#
This Integration is part of theSupported versions
Supported Cortex XSOAR versions: 5.5.0 and later.
This integration allow to interact with the Gatewatcher LastInfoSec product via API. This integration was integrated and tested with version 2 of LastInfoSec.
#
Configure LastInfoSec in CortexParameter | Description | Required |
---|---|---|
LastInfoSec API token | The API Key to use for connection | True |
Check the TLS certificate | False | |
Use system proxy settings | False | |
Integration Reliability | Reliability of the source providing the intelligence data | False |
#
CommandsYou can execute these commands from the CLI, as part of an automation, or in a playbook. After you successfully execute a command, a DBot message appears in the War Room with the command details.
#
gw-lis-get-by-minuteRetrieve the data from Gatewatcher CTI feed by minute. Max 1440 minutes.
#
Base Commandgw-lis-get-by-minute
#
InputArgument Name | Description | Required |
---|---|---|
Minute | Number of minutes to get. Max 1440 minutes. | Required |
Categories | Filter IoC by categories. Possible values are: phishing, malware, trojan, exploit, ransom, ransomware, tool, keylogger, agent, backdoor. | Optional |
Type | Filter IoC by type. Possible values are: SHA1, SHA256, MD5, URL, Host. | Optional |
Mode | Filter IoC by mode. Possible values are: detection, hunting. | Optional |
Risk | Filter IoC by risk. Possible values are: Malicious, Suspicious, High suspicious. | Optional |
TLP | Filter IoC by TLP. Possible values are: green, white. | Optional |
#
Context OutputPath | Type | Description |
---|---|---|
LIS.GetByMinute.Value | String | Value. |
#
Command example!gw-lis-get-by-minute Minute=10
#
Context Example#
Human Readable Output#
Get IoC by minute
Value http://103.182.16.23/900/HTMLcode.vbs http://103.182.16.23/900/i0ioi0iooioo0IOI0OIOIOiooioi00IOIoioioio0ioi0iOIOioiiOIoiOIOIOioIO0IOIO0.doc http://94.156.253.128/2144/io0Ioi0IOIOOIOi0i00ioioii0ioi0oiOII0OIO0OIOI0I0000%23%23%23%23%23%23%23%23%23%23%23%23%23%230000000%23%23%23%23%23%23%23%23%23%23%23%23%23%2300000000.doc
#
gw-lis-get-by-valueAllows you to search for an IOC (url, hash, host) or a vulnerability in the Gatewatcher CTI database. If the data is known, only the IOC corresponding to the value will be returned.
#
Base Commandgw-lis-get-by-value
#
InputArgument Name | Description | Required |
---|---|---|
Value | Value to be search. | Required |
#
Context OutputPath | Type | Description |
---|---|---|
LIS.GetByValue.Categories | String | Categories. |
LIS.GetByValue.Risk | String | Risk. |
LIS.GetByValue.TLP | String | TLP. |
LIS.GetByValue.Type | String | Type. |
LIS.GetByValue.UsageMode | String | UsageMode. |
LIS.GetByValue.Value | String | Value. |
LIS.GetByValue.Vulnerabilities | String | Vulnerabilities. |
#
Command example!gw-lis-get-by-value Value="58b525579968cba0c68e8f7ae12e51e0b5542acc2c14a2e75fa6df44556e373f"
#
Context Example#
Human Readable Output#
Get IoC corresponding to the value
Categories Risk TLP Type UsageMode Value Vulnerabilities trojan,
malware,
agentSuspicious green SHA256 detection 58b525579968cba0c68e8f7ae12e51e0b5542acc2c14a2e75fa6df44556e373f
#
gw-lis-leaked-email-by-domainAllows you to search for leaked emails via a domain in Gatewatcher's CTI database. If the data is found, a list of emails is returned. otherwise, nothing is returned.
#
Base Commandgw-lis-leaked-email-by-domain
#
InputArgument Name | Description | Required |
---|---|---|
Domain | domain to be searched. | Required |
After | Only return emails that have leaked after this date (date format: 2023-01-15T10:00:00). | Optional |
#
Context OutputPath | Type | Description |
---|---|---|
LIS.LeakedEmail.GetByDomain | String | leaked emails. |
#
Command example!gw-lis-leaked-email-by-domain Domain=foobar.com
#
Context Example#
Human Readable Output#
Leaked email
Emails lucien@fr.foobar.com valerie@fr.foobar.com cyrille@nl.foobar.com patrique@us.foobar.com
#
gw-lis-is-email-leakedAllows you to search if a specific email was leaked in Gatewatcher's CTI database. If the data is found, the email is returned. otherwise, nothing is returned.
#
Base Commandgw-lis-is-email-leaked
#
InputArgument Name | Description | Required |
---|---|---|
email to be searched. | Required | |
After | Only return a value if the email has leaked after this date (date format: 2023-01-15T10:00:00). | Optional |
#
Context OutputPath | Type | Description |
---|---|---|
LIS.LeakedEmail.GetByEmail | String | leaked email. |
#
Command example!gw-lis-is-email-leaked Email=lucien@fr.foobar.com
#
Context Example#
Human Readable Output#
Is email leaked
Value lucien@fr.foobar.com
#
urlsearch IOCs for URLs in Gatewatcher's CTI database.
#
Base Commandurl
#
InputArgument Name | Description | Required |
---|---|---|
url | list of URLs to search for, (comma separated values). | Required |
#
Context OutputPath | Type | Description |
---|---|---|
DBotScore.Indicator | String | The indicator that was tested. |
DBotScore.Reliability | String | Reliability of the source providing the intelligence data. |
DBotScore.Score | Number | The actual score. |
DBotScore.Type | String | The indicator type. |
DBotScore.Vendor | String | The vendor used to calculate the score. |
URL.Data | String | The URL. |
URL.Description | String | Description of the URL. |
URL.TrafficLightProtocol | String | TLP level. |
LIS.URL.Categories | String | Categories matching this url. |
LIS.URL.Risk | String | Risk associated to this URL. |
LIS.URL.TLP | String | TLP level. |
LIS.URL.UsageMode | String | Usage mode for LIS. |
LIS.URL.Value | String | The URL. |
LIS.URL.Vulnerabilities | String | Vulnerabilities associated to this URL. |
#
Command example!url url=http://217.196.96.84/WatchDog.exe
#
Context Example#
Human Readable Output#
Get IoC corresponding to the value
Categories Risk TLP Type UsageMode Value Vulnerabilities malware Suspicious green URL detection http://217.196.96.84/WatchDog.exe
#
filesearch IOCs for file hashes in Gatewatcher's CTI database.
#
Base Commandfile
#
InputArgument Name | Description | Required |
---|---|---|
file | list of files to search for, (comma separated values). | Required |
#
Context OutputPath | Type | Description |
---|---|---|
DBotScore.Reliability | String | Reliability of the source providing the intelligence data. |
DBotScore.Score | Number | The actual score. |
DBotScore.Type | String | The indicator type. |
DBotScore.Vendor | String | The vendor used to calculate the score. |
File.Hashes | String | List of hashes for this file. |
File.Imphash | String | Imphash of the file. |
File.SSDeep | String | SSDeep of the file. |
File.TrafficLightProtocol | String | TLP level. |
File.Type | String | Type of file. |
File.MD5 | String | MD5 of the file. |
File.SHA1 | String | SHA1 of the file. |
File.SHA256 | String | SHA256 of the file. |
File.SHA512 | String | SHA512 of the file. |
LIS.File.Categories | String | Categories matching this file. |
LIS.File.Risk | String | Risk associated to this file. |
LIS.File.TLP | String | TLP level. |
LIS.File.UsageMode | String | Usage mode for LIS. |
LIS.File.Value | String | Hash of the file. |
LIS.File.Vulnerabilities | String | Vulnerabilities associated to this file. |
DBotScore.Indicator | String | The indicator that was tested. |
#
Command example!file file=58b525579968cba0c68e8f7ae12e51e0b5542acc2c14a2e75fa6df44556e373f
#
Context Example#
Human Readable Output#
Get IoC corresponding to the value
Categories Risk TLP Type UsageMode Value Vulnerabilities trojan,
malware,
agentSuspicious green SHA256 detection 58b525579968cba0c68e8f7ae12e51e0b5542acc2c14a2e75fa6df44556e373f
#
domainsearch IOCs for domains in Gatewatcher's CTI database.
#
Base Commanddomain
#
InputArgument Name | Description | Required |
---|---|---|
domain | list of domains to search for, (comma separated values). | Required |
#
Context OutputPath | Type | Description |
---|---|---|
DBotScore.Indicator | String | The indicator that was tested. |
DBotScore.Type | String | The indicator type. |
DBotScore.Vendor | String | The vendor used to calculate the score. |
DBotScore.Score | Number | The actual score. |
DBotScore.Reliability | String | Reliability of the source providing the intelligence data. |
Domain.Name | String | Domain found. |
Domain.Description | String | description of the domain. |
Domain.TrafficLightProtocol | String | TLP level. |
LIS.Domain.Categories | String | Categories matching this domain. |
LIS.Domain.Risk | String | Risk associated to this domain. |
LIS.Domain.TLP | String | TLP level. |
LIS.Domain.Type | String | Type of domain. |
LIS.Domain.UsageMode | String | Usage mode for LIS. |
LIS.Domain.Value | String | The domain name. |
LIS.Domain.Vulnerabilities | String | Vulnerabilities associated to this domain. |
#
Command example!domain domain=kopabayport.co.tz
#
Context Example#
Human Readable Output#
Get IoC corresponding to the value
Categories Risk TLP Type UsageMode Value Vulnerabilities malware Suspicious green Host detection kopabayport.co.tz