Skip to main content

Mandiant Enrich

This Integration is part of the Mandiant Advantage Threat Intelligence Pack.#

Supported versions

Supported Cortex XSOAR versions: 6.6.0 and later.

Mandiant Threat Intelligence Enrichment#

Enrich Indicators of Compromise using Cortex XSOAR Generic Reputation commands, and create indicators for Threat Actors, Malware Families, and Campaigns from Mandiant Advantage.

Prerequisites#

A Mandiant Advantage Threat Intelligence account.

Get Credentials#

  • Log in to advantage.mandiant.com.
  • Navigate to Settings, then scroll down to APIv4 Access and Key.
  • Click Get Key ID and Secret.

Integration Settings#

ParameterDescriptionRequired
API KeyYour API Key from Mandiant Advantage Threat Intelligence.True
Secret KeyYour Secret Key from Mandiant Advantage Threat Intelligence.True
TimeoutAPI calls timeout.False
Source ReliabilityReliability of the source providing the intelligence data.True
Traffic Light Protocol ColorThe Traffic Light Protocol (TLP) designation to apply to indicators enriched.False
TagsSupports CSV values.False
Map Attack Pattern Relationships to Mitre ATT&CKWhen enabled the integration will attempt to map Attack Pattern relationships to Attack Pattern Indicators created by the Mitre ATT&CK Integration.False

Commands#

file#

Get information about a file hash from Mandiant.

Base Command#

file

Input#

ArgumentDescriptionRequired
fileList of files.True

Context Output#

PathTypeDescription
DBotScore.ScorenumberThe actual score calculated using the Mandiant Threat Score.
DBotScore.VendorstringThe vendor used to calculate the score.
DBotScore.IndicatorStringThe indicator that was tested.
DBotScore.TypestringThe indicator type.
DBotScore.ReliabilitystringThe reliability definition of the vendor used to calculate the score as defined in the integration settings.
File.SHA1stringThe SHA1 hash of the file.
File.SHA256stringThe SHA256 hash of the file.
File.MD5stringThe MD5 hash of the file.
File.namestringThe name of the indicator.
File.CampaignstringA comma-separated list of any campaigns associated with the indicator.
File.TrafficLightProtocolstringThe traffic light protocol color associated with the indicator.
File.Malicious.descriptionstringA description of why the file is malicious.
File.Malicious.vendorstringThe vendor providing the description.
File.MalwareFamilystringA comma-separated list of any Malware Families associated with the indicator.
File.RelationshipslistA list of relationship objects associated with the indicator.
File.HasheslistA list of hash objects associated with the indicator.
Mandiant.File.threat_rating.confidence_levelstringThe confidence level of the indicator's threat rating.
Mandiant.File.threat_rating.confidence_scorenumberThe confidence score of the indicator's threat rating.
Mandiant.File.threat_rating.severity_levelstringThe severity level of the indicator.
Mandiant.File.threat_rating.severity_reasonlistA list of severity reasons that contribute to the severity level of the indicator.
Mandiant.File.threat_rating.threat_scorenumberThe threat score of the indicator.
Mandiant.File.campaignslistA list of campaign objects associated with the indicator.
Mandiant.File.last_seendateThe date and time that the indicator was last seen.
Mandiant.File.first_seendateThe date and time that the indicator was first seen.
Mandiant.File.mscorenumberThe confidence score of the indicator.
Mandiant.File.attributed_associationslistA list of attribution objects (Threat Actors, Malware Families) associated with the indicator.
Mandiant.File.valuestringThe value of the indicator.
Mandiant.File.last_updateddateThe date and time that the indicator was last updated by Mandiant.
Mandiant.File.associated_hasheslistA list of file hashes associated with the indicator (MD5, SHA1, SHA256).
Mandiant.File.sourceslistA list of source objects associated with the indicator.
Mandiant.File.typestringThe indicator's type.
Mandiant.File.idstringThe indicator's Mandiant ID.
Mandiant.File.reportslistA list of Mandiant reports associated with the indicator.

ip#

Get information about an IP address from Mandiant.

Base Command#

ip

Input#

ArgumentDescriptionRequired
ipList of IPs.True

Context Output#

PathTypeDescription
DBotScore.ScorenumberThe actual score calculated using the Mandiant Threat Score.
DBotScore.VendorstringThe vendor used to calculate the score.
DBotScore.IndicatorStringThe indicator that was tested.
DBotScore.TypestringThe indicator type.
DBotScore.ReliabilitystringThe reliability definition of the vendor used to calculate the score as defined in the integration settings.
IP.AddressstringThe IP address value.
IP.CampaignstringA comma-separated list of any campaigns associated with the indicator.
IP.TrafficLightProtocolstringThe traffic light protocol color associated with the indicator.
IP.MalwareFamilystringA comma-separated list of any Malware Families associated with the indicator.
IP.RelationshipslistA list of relationship objects associated with the indicator.
IP.STIXIDstringThe STIX ID of the CVE.
IP.PublicationslistA list of report objects associated with the indicator.
Mandiant.IP.threat_rating.confidence_levelstringThe confidence level of the indicator's threat rating.
Mandiant.IP.threat_rating.confidence_scorenumberThe confidence score of the indicator's threat rating.
Mandiant.IP.threat_rating.severity_levelstringThe severity level of the indicator.
Mandiant.IP.threat_rating.severity_reasonlistA list of severity reasons that contribute to the severity level of the indicator.
Mandiant.IP.threat_rating.threat_scorenumberThe threat score of the indicator.
Mandiant.IP.campaignslistA list of campaign objects associated with the indicator.
Mandiant.IP.last_seendateThe date and time that the indicator was last seen.
Mandiant.IP.first_seendateThe date and time that the indicator was first seen.
Mandiant.IP.mscorenumberThe confidence score of the indicator.
Mandiant.IP.attributed_associationslistA list of attribution objects (Threat Actors, Malware Families) associated with the indicator.
Mandiant.IP.valuestringThe value of the indicator.
Mandiant.IP.last_updateddateThe date and time that the indicator was last updated by Mandiant .
Mandiant.IP.sourceslistA list of source objects associated with the indicator.
Mandiant.IP.typestringThe indicator's type.
Mandiant.IP.idstringThe indicator's Mandiant ID.
Mandiant.IP.reportslistA list of Mandiant reports associated with the indicator.

url#

Get information about a URL from Mandiant.

Base Command#

url

Input#

ArgumentDescriptionRequired
urlList of URLs.True

Context Output#

PathTypeDescription
DBotScore.ScorenumberThe actual score calculated using the Mandiant Threat Score.
DBotScore.VendorstringThe vendor used to calculate the score.
DBotScore.IndicatorStringThe indicator that was tested.
DBotScore.TypestringThe indicator type.
DBotScore.ReliabilitystringThe reliability definition of the vendor used to calculate the score as defined in the integration settings.
URL.DatastringThe URL value.
URL.CampaignstringA comma-separated list of any campaigns associated with the indicator.
URL.TrafficLightProtocolstringThe traffic light protocol color associated with the indicator.
URL.MalwareFamilystringA comma-separated list of any Malware Families associated with the indicator.
URL.RelationshipslistA list of relationship objects associated with the indicator.
URL.STIXIDstringThe STIX ID of the CVE.
Mandiant.URL.threat_rating.confidence_levelstringThe confidence level of the indicator's threat rating.
Mandiant.URL.threat_rating.confidence_scorenumberThe confidence score of the indicator's threat rating.
Mandiant.URL.threat_rating.severity_levelstringThe severity level of the indicator.
Mandiant.URL.threat_rating.severity_reasonlistA list of severity reasons that contribute to the severity level of the indicator.
Mandiant.URL.threat_rating.threat_scorenumberThe threat score of the indicator.
Mandiant.URL.campaignslistA list of campaign objects associated with the indicator
Mandiant.URL.last_seendateThe date and time that the indicator was last seen.
Mandiant.URL.first_seendateThe date and time that the indicator was first seen.
Mandiant.URL.mscorenumberThe confidence score of the indicator.
Mandiant.URL.attributed_associationslistA list of attribution objects (Threat Actors, Malware Families) associated with the indicator.
Mandiant.URL.valuestringThe value of the indicator.
Mandiant.URL.last_updateddateThe date and time that the indicator was last updated by Mandiant.
Mandiant.URL.sourceslistA list of source objects associated with the indicator.
Mandiant.URL.typestringThe indicator's type.
Mandiant.URL.idstringThe indicator's Mandiant ID.
Mandiant.URL.reportslistA list of Mandiant reports associated with the indicator.

domain#

Get information about a domain from Mandiant.

Base Command#

domain

Input#

ArgumentDescriptionRequired
domainList of domains.True

Context Output#

PathTypeDescription
DBotScore.ScorenumberThe actual score calculated using the Mandiant Threat Score.
DBotScore.VendorstringThe vendor used to calculate the score.
DBotScore.IndicatorStringThe indicator that was tested.
DBotScore.TypestringThe indicator type.
DBotScore.ReliabilitystringThe reliability definition of the vendor used to calculate the score as defined in the integration settings.
Domain.NamestringThe domain name.
Domain.CampaignstringA comma-separated list of any campaigns associated with the indicator.
Domain.TrafficLightProtocolstringThe traffic light protocol color associated with the indicator.
Domain.MalwareFamilystringA comma-separated list of any Malware Families associated with the indicator.
Domain.RelationshipslistA list of relationship objects associated with the indicator.
Domain.STIXIDstringThe STIX ID of the CVE.
Mandiant.Domain.threat_rating.confidence_levelstringThe confidence level of the indicator's threat rating.
Mandiant.Domain.threat_rating.confidence_scorenumberThe confidence score of the indicator's threat rating.
Mandiant.Domain.threat_rating.severity_levelstringThe severity level of the indicator.
Mandiant.Domain.threat_rating.severity_reasonlistA list of severity reasons that contribute to the severity level of the indicator.
Mandiant.Domain.threat_rating.threat_scorenumberThe threat score of the indicator.
Mandiant.Domain.campaignslistA list of campaign objects associated with the indicator.
Mandiant.Domain.last_seendateThe date and time that the indicator was last seen.
Mandiant.Domain.first_seendateThe date and time that the indicator was first seen.
Mandiant.Domain.mscorenumberThe confidence score of the indicator.
Mandiant.Domain.attributed_associationslistA list of attribution objects (Threat Actors, Malware Families) associated with the indicator.
Mandiant.Domain.valuestringThe value of the indicator.
Mandiant.Domain.last_updateddateThe date and time that the indicator was last updated by Mandiant.
Mandiant.Domain.sourceslistA list of source objects associated with the indicator.
Mandiant.Domain.typestringThe indicator's type.
Mandiant.Domain.idstringThe indicator's Mandiant ID.
Mandiant.Domain.reportslistA list of Mandiant reports associated with the indicator.

cve#

Get information about a CVE from Mandiant.

Base Command#

cve

Input#

ArgumentDescriptionRequired
cveList of CVEs.True

Context Output#

PathTypeDescription
CVE.VulnerableConfigurationslistA list of CPE objects.
CVE.PublicationslistA list of reports associated with the CVE.
CVE.ModifieddateThe date that the CVE was last modified.
CVE.STIXIDstringThe STIX ID of the CVE.
CVE.VulnerableProductslistA list of CPE objects.
CVE.PublisheddateThe date that the CVE was last published
CVE.TrafficLightProtocolstringThe traffic light protocol color associated with the CVE.
CVE.CVSS.scorenumberThe CVSS score of the CVE.
CVE.CVSS.VectorstringThe CVSS Vector of the CVE.
CVE.CVSS.VersionnumberThe CVSS version of the CVE.
CVE.IDstringThe CVE ID.
CVE.DescriptionstringA description of the CVE.
DBotScore.ScorenumberThe actual score calculated using the CVSS score.
DBotScore.VendorstringThe vendor used to calculate the score.
DBotScore.IndicatorStringThe indicator that was tested.
DBotScore.TypestringThe indicator type.
DBotScore.ReliabilitystringThe reliability definition of the vendor used to calculate the score as defined in the integration settings.
Mandiant.CVE.is_predictedboolIf the risk rating was predicted (True) or set by an analyst (False).
Mandiant.CVE.date_of_disclosuredateThe date and time that the CVE was disclosed.
Mandiant.CVE.associated_reportslistA list of reports associated with the CVE.
Mandiant.CVE.exploitslistA list of exploits associated with the CVE.
Mandiant.CVE.cve_idstringThe CVE ID of the CVE.
Mandiant.CVE.workarounds_listlistA list of workarounds associated with the CVE.
Mandiant.CVE.vendor_fix_referenceslistA list of vendor fix references associated with the CVE.
Mandiant.CVE.version_historylistA list of history objects containing links to detail about each version of the CVE.
Mandiant.CVE.risk_ratinglistThe risk rating associated with the CVE.
Mandiant.CVE.first_publish_datedateThe date and time that the CVE was fist published.
Mandiant.CVE.exploitation_consequencestringThe exploitation consequence associated with the CVE.
Mandiant.CVE.vulnerable_cpeslistA list of vulnerable CPE objects associated with the CVE.
Mandiant.CVE.updated_datedateThe date and time that the CVE was last updated.
Mandiant.CVE.workaroundsstringA summary of any workarounds associated with the CVE.
Mandiant.CVE.available_mitigationlistA list of mitigations associated with the CVE.
Mandiant.CVE.associated_actorslistA list of Threat Actor objects associated with the CVE.
Mandiant.CVE.titlestringThe title of the CVE.
Mandiant.CVE.common_vulnerability_scoresobjectAn object containing common vulnerability score objects associated with the CVE.
Mandiant.CVE.sourceslistA list of sources associated with the CVE.
Mandiant.CVE.typestringThe type of indicator.
Mandiant.CVE.vulnerable_productslistA summary of any vulnerable products associated with the CVE.
Mandiant.CVE.exploitation_vectorslistA list of exploitation vectors associated with the CVE.
Mandiant.CVE.idstringThe Mandiant ID of the CVE.
Mandiant.CVE.last_modified_datedateThe date and time that the CVE was last modified.
Mandiant.CVE.observed_in_the_wildboolIf the CVE was observed in the wild (True) of not (False).
Mandiant.CVE.was_zero_dayboolIf the CVE was determined to be a zero day exploit (True) of not (False).
Mandiant.CVE.exploitation_statestringThe current exploitation state of the CVE.
Mandiant.CVE.associated_malwarelistA list of Malware Family objects associated with the CVE.
Mandiant.CVE.descriptionstringA description of the CVE.
Mandiant.CVE.cpe_rangeslistA list of CPE objects objects associated with the CVE.
Mandiant.CVE.mve_idstringThe Mandiant Vulnerability ID of the CVE.
Mandiant.CVE.publish_datedateThe date and time that the CVE was published.
Mandiant.CVE.aliaseslistA list of alias objects associated with the CVE.

mati-get-actor#

Get information about a Threat Actor from Mandiant.

Base Command#

mati-get-actor

Input#

ArgumentDescriptionRequired
actor_nameName of the actor to look up.True

Context Output#

PathTypeDescription
Mandiant.Actor.associated_uncslistUNC Threat Actors associated with the fetched Threat Actor.
Mandiant.Actor.counts.aliasesnumberThe number of alternate names the fetched Threat Actor is known as.
Mandiant.Actor.counts.associated_uncsnumberThe number of UNC Threat Actors associated with the fetched Threat Actor.
Mandiant.Actor.counts.attack_patternsnumberThe number of Attack Patterns associated with the fetched Threat Actor.
Mandiant.Actor.counts.cvenumberThe number of vulnerabilities associated with the fetched Threat Actor.
Mandiant.Actor.counts.industriesnumberThe number of industries targeted by the fetched Threat Actor.
Mandiant.Actor.counts.malwarenumberThe number of Malware Families associated with the fetched Threat Actor.
Mandiant.Actor.counts.reportsnumberThe number of finished intelligence reports associated with the fetched Threat Actor.
Mandiant.Actor.audiencelistA list of audience objects describing who can read the Threat Actor information.
Mandiant.Actor.observedlistA list of observed objects describing when the Threat Actor was first and last seen.
Mandiant.Actor.namestringThe name of the Threat Actor.
Mandiant.Actor.valuestringThe name of the Threat Actor.
Mandiant.Actor.last_updateddateThe date and time that the Threat Actor object was last updated by Mandiant.
Mandiant.Actor.cvelistA list of vulnerability objects associated with the Threat Actor.
Mandiant.Actor.last_activity_timedateThe date and time that the Threat Actor object was last active.
Mandiant.Actor.malwarelistA list of Malware Family objects associated with the Threat Actor.
Mandiant.Actor.suspected_attributionlistA list of Intel objects suspected to be associated with the Threat Actor.
Mandiant.Actor.typestringThe type of Cortex XSOAR indicator.
Mandiant.Actor.idstringThe Mandiant ID of the Threat Actor.
Mandiant.Actor.toolslistA list of tool objects associated with the Threat Actor.
Mandiant.Actor.industrieslistA list of industry objects associated with the Threat Actor.
Mandiant.Actor.descriptionstringA description of the Threat Actor.
Mandiant.Actor.motivationslistA list of motivation objects associated with the Threat Actor.
Mandiant.Actor.aliaseslistA list of alias objects describing alternate names associated with the Threat Actor.
Mandiant.Actor.locations.sourcelistA list of source location objects describing the country that the Threat Actor originates from.
Mandiant.Actor.locations.targetlistA list of target country objects describing the countries that the Threat Actor targets.
Mandiant.Actor.locations.target_regionlistA list of target region objects describing the regions that the Threat Actor targets.
Mandiant.Actor.locations.target_sub_regionlistA list of target sub-region objects describing the sub-regions that the Threat Actor targets.

mati-get-malware#

Get information about a Malware Family from Mandiant.

Base Command#

mati-get-malware

Input#

ArgumentDescriptionRequired
malware_nameName of the Malware Family to look up.True

Context Output#

PathTypeDescription
Mandiant.Malware.counts.detectionsnumberThe number of detections associated with the Malware Family.
Mandiant.Malware.counts.cvenumberThe number of vulnerabilities associated with the Malware Family.
Mandiant.Malware.counts.malwarenumberThe number of Malware Families associated with the Malware Family.
Mandiant.Malware.counts.capabilitiesnumberThe number of capabilities associated with the Malware Family.
Mandiant.Malware.counts.attack_patternsnumberThe number of Attack Patterns associated with the Malware Family.
Mandiant.Malware.counts.industriesnumberThe number of industries targeted by the Malware Family.
Mandiant.Malware.counts.actorsnumberThe number of Threat Actors associated with the Malware Family.
Mandiant.Malware.counts.aliasesnumberThe number of alternate names associated with the Malware Family.
Mandiant.Malware.counts.reportsnumberThe number of finished intelligence reports associated with the Malware Family.
Mandiant.Malware.audiencelistA list of audience objects describing who can read the Malware Family information.
Mandiant.Malware.operating_systemslistA list of operating systems that the Malware Family is known to impact.
Mandiant.Malware.namestringThe name of the Malware Family.
Mandiant.Malware.detectionslistA list of detections associated with the Malware Family.
Mandiant.Malware.valuestringThe name of the Malware Family .
Mandiant.Malware.last_updateddateThe date and time that the Malware Family object was last updated by Mandiant.
Mandiant.Malware.cvelistA list of vulnerability objects associated with the Malware Family.
Mandiant.Malware.last_activity_timedateThe date and time that the Malware Family object was last active .
Mandiant.Malware.malwarelistA list of Malware Family objects associated with the Malware Family.
Mandiant.Malware.capabilitieslistA list of capability objects associated with the Malware Family.
Mandiant.Malware.yaralistA list of YARA rule objects associated with the Malware Family.
Mandiant.Malware.industrieslistA list of industry objects targeted by the Malware Family.
Mandiant.Malware.roleslistA list of roles associated with the Malware Family.
Mandiant.Malware.actorslistA list of Threat Actor objects associated with the Malware Family.
Mandiant.Malware.aliaseslistA list of alias objects describing alternate names associated with the Malware Family.
Mandiant.Malware.inherently_maliciousnumberIf 1, the object should be considered a Malware Family, if 0 the object is a Tool.

mati-get-campaign#

Retrieve information about a Campaign from Mandiant.

Base Command#

mati-get-campaign

Input#

ArgumentDescriptionRequired
campaign_idID of the campaign to lookup.True

Context Output#

PathTypeDescription
Mandiant.Campaign.counts.timelinenumberThe number of events in the Campaign timeline.
Mandiant.Campaign.counts.campaignsnumberThe number of other Campaigns associated with the Campaign.
Mandiant.Campaign.counts.malwarenumberThe number of Malware Families associated with the Campaign.
Mandiant.Campaign.counts.actor_collaborationsnumberThe number of Threat Actor Collaborations associated with the Campaign.
Mandiant.Campaign.counts.vulnerabilitiesnumberThe number of Vulnerabilities associated with the Campaign.
Mandiant.Campaign.counts.toolsnumberThe number of Tools associated with the Campaign.
Mandiant.Campaign.counts.industriesnumberThe number of target industries associated with the Campaign.
Mandiant.Campaign.counts.actorsnumberThe number of Threat Actors associated with the Campaign.
Mandiant.Campaign.counts.reportsnumberThe number of finished intelligence reports associated with the Campaign.
Mandiant.Campaign.profile_updatedateThe date and time that the profile of the Campaign was last updated.
Mandiant.Campaign.campaign_typestringThe type of the Campaign.
Mandiant.Campaign.namestringThe name of the Campaign.
Mandiant.Campaign.short_namestringThe short name / ID of the Campaign.
Mandiant.Campaign.target_locations.countrieslistA list of country objects that the Campaign targets.
Mandiant.Campaign.target_locations.regionslistA list of region objects that the Campaign targets.
Mandiant.Campaign.target_locations.sub_regionslistA list of sub-region objects that the Campaign targets.
Mandiant.Campaign.valuestringThe short name / ID of the Campaign.
Mandiant.Campaign.last_activity_timedateThe date and time that the Campaign was last known to be active.
Mandiant.Campaign.malwarelistA list of Malware Family objects associated with the Campaign.
Mandiant.Campaign.actor_collaborationslistA list of Actor Collaboration objects associated with the Campaign.
Mandiant.Campaign.vulnerabilitieslistA list of Vulnerability objects associated with the Campaign.
Mandiant.Campaign.typestringThe indicator type.
Mandiant.Campaign.toolslistA list of tool objects associated with the Campaign.
Mandiant.Campaign.industrieslistA list of target industry objects associated with the Campaign.
Mandiant.Campaign.actorslistA list of Threat Actor objects associated with the Campaign.
Mandiant.Campaign.aliaseslistA list of alias objects associated with the Campaign.