Skip to main content

NucleonCyberFeed

This Integration is part of the NucleonCyber Pack.#

Supported versions

Supported Cortex XSOAR versions: 6.0.0 and later.

This is the NucleonCyber Feed integration This integration was integrated and tested with version 6.0.0 of NucleonCyberFeed

Configure NucleonCyberFeed on Cortex XSOAR#

  1. Navigate to Settings > Integrations > Servers & Services.

  2. Search for NucleonCyberFeed.

  3. Click Add instance to create and configure a new integration instance.

    ParameterDescriptionRequired
    Fetch indicatorsFalse
    Server's URLShould be feed of type .txt. For using other types of feed, modify the parsing in the python file.True
    User NameThe given username to use for NucleonCyber API connectionTrue
    PasswordThe given password to use for NucleonCyber API connectionTrue
    UsrnThe given usrn to use for NucleonCyber API connectionTrue
    ClientIDThe given clientID to use for NucleonCyber API connectionTrue
    Indicator ReputationIndicators from this integration instance will be marked with this reputationFalse
    Source ReliabilityReliability of the source providing the intelligence dataTrue
    Traffic Light Protocol ColorThe Traffic Light Protocol (TLP) designation to apply to indicators fetched from the feedFalse
    Feed Fetch IntervalFalse
    Bypass exclusion listWhen selected, the exclusion list is ignored for indicators from this feed. This means that if an indicator from this feed is on the exclusion list, the indicator might still be added to the system.False
    Trust any certificate (not secure)False
    Use system proxy settingsFalse
    False
    False
    TagsSupports CSV values.False
    Incremental feedIncremental feeds pull only new or modified indicators that have been sent from the integration. The determination if the indicator is new or modified happens on the 3rd-party vendor's side, so only indicators that are new or modified are sent to Cortex XSOAR. Therefore, all indicators coming from these feeds are labeled new or modified.False
  4. Click Test to validate the URLs, token, and connection.

Commands#

You can execute these commands from the Cortex XSOAR CLI, as part of an automation, or in a playbook. After you successfully execute a command, a DBot message appears in the War Room with the command details.

nucleon-get-indicators#


Gets indicators from the feed.

Base Command#

nucleon-get-indicators

Input#

Argument NameDescriptionRequired
typeThe indicator type (ip, url or hash). Default is ip.Required
limitThe maximum number of results to return. Default is 10.Optional

Context Output#

PathTypeDescription
NucleonCyber.Indicators.valueStringIP/HASH/URL.
NucleonCyber.Indicators.expStringIndicators exp.

Command Example#

!nucleon-get-indicators

Context Example#

{
"NucleonCyber": {
"Indicators": [
{
"automated": false,
"botnet": false,
"bruteForce": false,
"cnc": false,
"darknet": false,
"fields": {
"nucleonsegment": "governments",
"os": "Linux",
"osversion": "3.x",
"port": 0,
"tags": [
"nucleon_bruteForce",
"nucleon_bruteForce"
],
"targetCountry": "SG",
"trafficlightprotocol": "GREEN"
},
"governments": false,
"os": "Linux",
"osVersion": "3.x",
"port": 0,
"proxy": false,
"rawJSON": {
"automated": false,
"bot": false,
"botnet": false,
"bruteForce": false,
"cnc": false,
"darknet": false,
"exp": "1629991508",
"governments": false,
"os": "Linux",
"osVersion": "3.x",
"port": 0,
"proxy": false,
"segment": "governments",
"sourceCountry": "BR",
"targetCountry": "SG",
"type": "IP",
"value": "4.4.4.4"
},
"segment": "governments",
"service": "NucleonCyberFeed",
"sourceCountry": "BR",
"targetCountry": "SG",
"type": "IP",
"value": "4.4.4.4"
}
]
}
}

Human Readable Output#

IP indicators from NucleonCyberFeed:#

ValueType
4.4.4.4IP