ThreatConnect v3
ThreatConnect Pack.#
This Integration is part of theThreatConnect's integration is a intelligence-driven security operations solution with intelligence, automation, analytics, and workflows. This integration was integrated and tested with version 3 of ThreatConnect v3 REST API
#
ThreatConnect v3 HMAC credentials- On the top navigation bar, hover the cursor over the Settings icon and select Org Settings from the dropdown menu.
- Click the Create API User button on the Membership tab of the Organization Settings screen, and the API User Administration window will be displayed.
- Enter the following information:
- First Name: Enter the API user’s first name.
- Last Name: Enter the API user’s last name.
- Organization Role: Use the dropdown menu to select an Organization role for the user.
- Include in Observations and False Positives: Check this box to allow data provided by the API user to be included in observation and false-positive counts.
- Disabled: Click the checkbox to disable an API user’s account in the event that the Administrator wants to retain log integrity when the API user no longer requires ThreatConnect access.
- Record the Secret Key, as it will not be accessible after the window is closed.
- Click SAVE to create the API user account.
For more information - click here (Section - Creating an API User).
#
Configure ThreatConnect v3 on Cortex XSOARNavigate to Settings > Integrations > Servers & Services.
Search for ThreatConnect v3.
Click Add instance to create and configure a new integration instance.
Parameter Description Required Base Url The base URL for the API True Access ID The API credentials True Secret key The API secret key True Default Organization The default owner for the integration False Tags filter for the fetch Free text box to add comma-separated tags to filter the fetched incidents by. False Group Type filter for the fetch The group type to filter the fetched incidents by. False Status filter for the fetch The status to filter the fetched incidents by (if not field will fetch all statuses). False First fetch timestamp (<number> <time unit>, for example, 12 hours, 7 days, 3 months, 1 year) True Incident Metadata The metadata to collect. False Source Reliability Reliability of the source providing the intelligence data. True Rating Threshold for Malicious Indicators (needed for reputation calculation) Rating Threshold for Malicious Indicators, it is necessary to calculate reputation. False Confidence Threshold for Malicious Indicators (needed for reputation calculation) Confidence Threshold for Malicious Indicators. This is necessary to calculate reputation. False Indicator Reputation Freshness in days (needed for reputation calculation) Indicator Reputation Freshness.This is necessary to calculate reputation. False Trust any certificate (not secure) Whether or not to trust any certificate False Use system proxy settings Whether or not to use proxy False Maximum number of incidents to fetch The maximum amount of incident to fetch per run 200 Click Test to validate the URLs, token, and connection.
#
CommandsYou can execute these commands from the Cortex XSOAR CLI, as part of an automation, or in a playbook. After you successfully execute a command, a DBot message appears in the War Room with the command details.
#
ipSearches for an indicator of type IP address.
#
Base Commandip
#
InputArgument Name | Description | Required |
---|---|---|
ip | A comma-separated list of IPv4 or IPv6 addresses. | Required |
owners | A comma-separated list of a client's organizations, sources, or communities to which a user has permissions. For example, users with admin permissions can search for indicators belonging to all owners. | Optional |
ratingThreshold | A comma-separated list of results filtered by indicators whose threat rating is greater than the specified value. Can be "0" - "Unknown", "1" - "Suspicious", "2" - "Low", "3" - Moderate, "4" - High, or "5" - "Critical". | Optional |
confidenceThreshold | A comma-separated list of results filtered by indicators whose confidence rating is greater than the specified value. Can be "0%" - "Unknown," "1% " - "Discredited", "2-29%" - "Improbable," "30-49%" - "Doubtful," "50-69%" - "Possible", "70-89%" - "Probable," or "90-100%" - "Confirmed". | Optional |
#
Context OutputPath | Type | Description |
---|---|---|
TC.Indicator.Name | string | The name of the indicator. |
TC.Indicator.Type | string | The type of the indicator. |
TC.Indicator.ID | string | The ID of the indicator. |
TC.Indicator.Description | string | The description of the indicator. |
TC.Indicator.Owner | string | The owner of the indicator. |
TC.Indicator.CreateDate | date | The date the indicator was created. |
TC.Indicator.LastModified | date | The date the indicator was last modified. |
TC.Indicator.Rating | number | The threat rating of the indicator. |
TC.Indicator.Confidence | number | The confidence rating of the indicator. |
DBotScore.Indicator | String | The indicator that was tested. |
DBotScore.Type | String | The indicator type. |
DBotScore.Vendor | String | The vendor used to calculate the score. |
DBotScore.Score | Number | The actual score. |
DBotScore.Reliability | String | Reliability of the source providing the intelligence data. |
IP.Address | string | The IP address of the indicator. |
IP.Malicious.Vendor | string | For malicious IP addresses, the vendor that made the decision. |
IP.Malicious.Description | string | For malicious IP addresses, the full description. |
TC.Indicator.WebLink | string | The web link of the indicator. |
#
urlSearches for an indicator of type URL.
#
Base Commandurl
#
InputArgument Name | Description | Required |
---|---|---|
url | A comma-separated list of URLs for which to search. For example, "www.demisto.com". | Required |
owners | A comma-separated list of a client's organizations, sources, or communities to which a client’s API user has been granted permission. For example, "owner1", "owner2", or "owner3". | Optional |
ratingThreshold | A comma-separated list of results filtered by indicators whose threat rating is greater than the specified value. Can be "0" - "Unknown", "1" - "Suspicious", "2" - "Low", "3" - Moderate, "4" - High, or "5" - "Critical". | Optional |
confidenceThreshold | A comma-separated list of results filtered by indicators whose confidence rating is greater than the specified value. Can be "0%" - "Unknown," "1% " - "Discredited", "2-29%" - "Improbable," "30-49%" - "Doubtful," "50-69%" - "Possible", "70-89%" - "Probable," or "90-100%" - "Confirmed". | Optional |
#
Context OutputPath | Type | Description |
---|---|---|
TC.Indicator.Name | string | The name of the indicator. |
TC.Indicator.Type | string | The type of the indicator. |
TC.Indicator.ID | string | The ID of the indicator. |
TC.Indicator.Description | string | The description of the indicator. |
TC.Indicator.Owner | string | The owner of the indicator. |
TC.Indicator.CreateDate | date | The date the indicator was created. |
TC.Indicator.LastModified | date | The date the indicator was last modified. |
TC.Indicator.Rating | number | The threat rating of the indicator. |
TC.Indicator.Confidence | number | The confidence rating of the indicator. |
DBotScore.Indicator | string | The indicator that was tested. |
DBotScore.Type | string | The indicator type. |
DBotScore.Vendor | string | The vendor used to calculate the score. |
DBotScore.Score | Number | The actual score. |
DBotScore.Reliability | string | Reliability of the source providing the intelligence data. |
URL.Data | string | The data of the URL indicator. |
URL.Malicious.Vendor | string | For malicious URLs, the vendor that made the decision. |
URL.Malicious.Description | string | For malicious URLs, the full description. |
TC.Indicator.WebLink | string | The web link of the indicator. |
#
fileSearches for an indicator of type file.
#
Base Commandfile
#
InputArgument Name | Description | Required |
---|---|---|
file | A comma-separated list of the hashes of the files. Can be "MD5", "SHA-1", or "SHA-256". | Required |
owners | A comma-separated list of a client's organizations, sources, or communities to which a user has permissions. For example, users with admin permissions can search for indicators belonging to all owners. | Optional |
ratingThreshold | A comma-separated list of results filtered by indicators whose threat rating is greater than the specified value. Can be "0" - "Unknown", "1" - "Suspicious", "2" - "Low", "3" - Moderate, "4" - High, or "5" - "Critical". | Optional |
confidenceThreshold | A comma-separated list of results filtered by indicators whose confidence rating is greater than the specified value. Can be "0%" - "Unknown," "1% " - "Discredited", "2-29%" - "Improbable," "30-49%" - "Doubtful," "50-69%" - "Possible", "70-89%" - "Probable," or "90-100%" - "Confirmed". | Optional |
#
Context OutputPath | Type | Description |
---|---|---|
TC.Indicator.Name | string | The name of the indicator. |
TC.Indicator.Type | string | The type of the indicator. |
TC.Indicator.ID | string | The ID of the indicator. |
TC.Indicator.Description | string | The description of the indicator. |
TC.Indicator.Owner | string | The owner of the indicator. |
TC.Indicator.CreateDate | date | The date the indicator was created. |
TC.Indicator.LastModified | date | The date the indicator was last modified. |
TC.Indicator.Rating | number | The threat rating of the indicator. |
TC.Indicator.Confidence | number | The confidence rating of the indicator. |
TC.Indicator.File.MD5 | string | The MD5 hash of the indicator. |
TC.Indicator.File.SHA1 | string | The SHA1 hash of the indicator. |
TC.Indicator.File.SHA256 | string | The SHA256 hash of the indicator. |
DBotScore.Indicator | string | The indicator that was tested. |
DBotScore.Type | string | The indicator type. |
DBotScore.Vendor | string | The vendor used to calculate the score. |
DBotScore.Score | Number | The actual score. |
DBotScore.Reliability | string | Reliability of the source providing the intelligence data. |
File.MD5 | string | The MD5 hash of the indicator. |
File.SHA1 | string | The SHA1 hash of the indicator. |
File.SHA256 | string | The SHA256 hash of the indicator. |
File.Malicious.Vendor | string | For malicious files, the vendor that made the decision. |
File.Malicious.Description | string | For malicious files, the full description. |
TC.Indicator.WebLink | string | The web link of the indicator. |
#
tc-ownersRetrieves all owners for the current account.
#
Base Commandtc-owners
#
InputArgument Name | Description | Required |
---|
#
Context OutputPath | Type | Description |
---|---|---|
TC.Owner.Name | string | The name of the owner. |
TC.Owner.ID | string | The ID of the owner. |
TC.Owner.Type | string | The type of the owner. |
#
tc-indicatorsRetrieves a list of all indicators.
#
Base Commandtc-indicators
#
InputArgument Name | Description | Required |
---|---|---|
owner | A comma-separated list of results filtered by the owner of the indicator. | Optional |
page | The page to take the results from. | Optional |
limit | The maximum number of results that can be returned. The default is 500. | Optional |
#
Context OutputPath | Type | Description |
---|---|---|
TC.Indicator.Name | string | The name of the indicator. |
TC.Indicator.Type | string | The type of the indicator. |
TC.Indicator.ID | string | The ID of the indicator. |
TC.Indicator.Description | string | The description of the indicator. |
TC.Indicator.Owner | string | The owner of the indicator. |
TC.Indicator.CreateDate | date | The date the indicator was created. |
TC.Indicator.LastModified | date | The date the indicator was last modified. |
TC.Indicator.Rating | number | The threat rating of the indicator. |
TC.Indicator.Confidence | number | The confidence rating of the indicator. |
TC.Indicator.WhoisActive | string | The active indicator (for domains only). |
TC.Indicator.File.MD5 | string | The MD5 hash of the indicator of the file. |
TC.Indicator.File.SHA1 | string | The SHA1 hash of the indicator of the file. |
TC.Indicator.File.SHA256 | string | The SHA256 hash of the indicator of the file. |
DBotScore.Indicator | string | The indicator that was tested. |
DBotScore.Type | string | The indicator type. |
DBotScore.Vendor | string | The vendor used to calculate the score. |
DBotScore.Score | Number | The actual score. |
DBotScore.Reliability | string | Reliability of the source providing the intelligence data. |
IP.Address | string | The IP address of the indicator. |
IP.Malicious.Vendor | string | For malicious IP addresses, the vendor that made the decision. |
IP.Malicious.Description | string | For malicious IP addresses, the full description. |
URL.Data | string | The data of the URL of the indicator. |
URL.Malicious.Vendor | string | For malicious URLs, the vendor that made the decision. |
URL.Malicious.Description | string | For malicious URLs, the full description. |
Domain.Name | string | The name of the domain. |
Domain.Malicious.Vendor | string | For malicious domains, the vendor that made the decision. |
Domain.Malicious.Description | string | For malicious domains, the full description. |
File.MD5 | string | The MD5 hash of the file. |
File.SHA1 | string | The SHA1 hash of the file. |
File.SHA256 | string | The SHA256 hash of the file. |
File.Malicious.Vendor | string | For malicious files, the vendor that made the decision. |
File.Malicious.Description | string | For malicious files, the full description. |
TC.Indicator.WebLink | string | The web link of the indicator. |
#
tc-get-tagsReturns a list of all ThreatConnect tags.
#
Base Commandtc-get-tags
#
InputArgument Name | Description | Required |
---|---|---|
page | The page to take the results from. | Optional |
limit | The maximum number of results that can be returned. The default is 500. | Optional |
name | The name of the tag to get. | Optional |
#
Context OutputPath | Type | Description |
---|---|---|
TC.Tags | Unknown | A list of tags. |
#
tc-tag-indicatorAdds a tag to an existing indicator.
#
Base Commandtc-tag-indicator
#
InputArgument Name | Description | Required |
---|---|---|
tag | The name of the tag. | Required |
indicator | The indicator to tag. For example, for an IP indicator, "8.8.8.8". | Required |
#
Context OutputThere is no context output for this command.
#
tc-get-indicatorRetrieves information about an indicator.
#
Base Commandtc-get-indicator
#
InputArgument Name | Description | Required |
---|---|---|
id | The ID of the indicator by which to search. | Required |
#
Context OutputPath | Type | Description |
---|---|---|
TC.Indicator.Name | string | The name of the indicator. |
TC.Indicator.Type | string | The type of the indicator. |
TC.Indicator.ID | string | The ID of the indicator. |
TC.Indicator.Description | string | The description of the indicator. |
TC.Indicator.Owner | string | The owner of the indicator. |
TC.Indicator.CreateDate | date | The date the indicator was created. |
TC.Indicator.LastModified | date | The date the indicator was last modified. |
TC.Indicator.Rating | number | The threat rating of the indicator. |
TC.Indicator.Confidence | number | The confidence rating of the indicator. |
TC.Indicator.WhoisActive | string | The active indicator (for domains only). |
TC.Indicator.File.MD5 | string | The MD5 hash of the indicator of the file. |
TC.Indicator.File.SHA1 | string | The SHA1 hash of the indicator of the file. |
TC.Indicator.File.SHA256 | string | The SHA256 hash of the indicator of the file. |
TC.Indicator.IndicatorAttributes.dateAdded | date | The date the indicator attribute was added. |
TC.Indicator.IndicatorAttributes.displayed | boolean | Whether to display the indicator attributes on ThreatConnect. |
TC.Indicator.IndicatorAttributes.id | number | The ID of the attribute. |
TC.Indicator.IndicatorAttributes.lastModified | date | The date the indicator attribute was last modified. |
TC.Indicator.IndicatorAttributes.type | string | The name of the attribute. |
TC.Indicator.IndicatorAttributes.value | string | The contents of the attribute. |
DBotScore.Indicator | String | The indicator that was tested. |
DBotScore.Type | String | The indicator type. |
DBotScore.Vendor | String | The vendor used to calculate the score. |
DBotScore.Score | Number | The actual score. |
DBotScore.Reliability | String | Reliability of the source providing the intelligence data. |
IP.Address | string | The IP address of the indicator. |
IP.Malicious.Vendor | string | For malicious IP addresses, the vendor that made the decision. |
IP.Malicious.Description | string | For malicious IP addresses, the full description. |
URL.Data | string | The data of the indicator of the URL. |
URL.Malicious.Vendor | string | For malicious URLs, the vendor that made the decision. |
URL.Malicious.Description | string | For malicious URLs, the full description. |
Domain.Name | string | The domain name of the indicator. |
Domain.Malicious.Vendor | string | For malicious domains, the vendor that made the decision. |
Domain.Malicious.Description | string | For malicious domains, the full description. |
File.MD5 | string | The MD5 hash of the file. |
File.SHA1 | string | The SHA1 hash of the file. |
File.SHA256 | string | The SHA256 hash of the file. |
File.Malicious.Vendor | string | For malicious files, the vendor that made the decision. |
File.Malicious.Description | string | For malicious files, the full description. |
TC.Indicator.WebLink | string | The web link of the indicator. |
#
tc-get-indicators-by-tagFetches all indicators that have a tag.
#
Base Commandtc-get-indicators-by-tag
#
InputArgument Name | Description | Required |
---|---|---|
tag | The name of the tag by which to filter the results. | Required |
owner | A comma-separated list of indicators filtered by the owner. | Optional |
page | The page to take the results from. | Optional |
limit | The maximum number of results that can be returned. The default is 500. | Optional |
#
Context OutputPath | Type | Description |
---|---|---|
TC.Indicator.Name | string | The name of the tagged indicator. |
TC.Indicator.Type | string | The type of the tagged indicator. |
TC.Indicator.ID | string | The ID of the tagged indicator. |
TC.Indicator.Description | string | The description of the tagged indicator. |
TC.Indicator.Owner | string | The owner of the tagged indicator. |
TC.Indicator.CreateDate | date | The date the tagged indicator was created. |
TC.Indicator.LastModified | date | The date the tagged indicator was last modified. |
TC.Indicator.Rating | number | The threat rating of the tagged indicator. |
TC.Indicator.Confidence | number | The confidence rating of the tagged indicator. |
TC.Indicator.WhoisActive | string | The active indicator (for domains only). |
TC.Indicator.File.MD5 | string | The MD5 hash of the indicator of the file. |
TC.Indicator.File.SHA1 | string | The SHA1 hash of the indicator of the file. |
TC.Indicator.File.SHA256 | string | The SHA256 hash of the indicator of the file. |
DBotScore.Indicator | String | The indicator that was tested. |
DBotScore.Type | String | The indicator type. |
DBotScore.Vendor | String | The vendor used to calculate the score. |
DBotScore.Score | Number | The actual score. |
DBotScore.Reliability | String | Reliability of the source providing the intelligence data. |
IP.Address | string | The IP address of the tagged indicator. |
IP.Malicious.Vendor | string | For malicious IP addresses, the vendor that made the decision. |
IP.Malicious.Description | string | For malicious IP addresses, the full description. |
URL.Data | string | The data of the URL of the tagged indicator. |
URL.Malicious.Vendor | string | For malicious URLs, the vendor that made the decision. |
URL.Malicious.Description | string | For malicious URLs, the full description. |
Domain.Name | string | The domain name of the tagged indicator. |
Domain.Malicious.Vendor | string | For malicious domains, the vendor that made the decision. |
Domain.Malicious.Description | string | For malicious domains, the full description. |
File.MD5 | string | The MD5 hash of the file. |
File.SHA1 | string | The SHA1 hash of the file. |
File.SHA256 | string | The SHA256 hash of the file. |
File.Malicious.Vendor | string | For malicious files, the vendor that made the decision. |
File.Malicious.Description | string | For malicious files, the full description. |
TC.Indicator.WebLink | string | The web link of the indicator. |
#
tc-add-indicatorAdds a new indicator to ThreatConnect.
#
Base Commandtc-add-indicator
#
InputArgument Name | Description | Required |
---|---|---|
indicator | The indicator to add. | Required |
indicatorType | The type of the indicator. Possible values are: Address, Agent, User, Registry Key, Mutex, Hashtag, Email Subject, Subject, Email, CIDR, Host, URL, ASN, File, EmailAddress. | Required |
hashType | The type of hash for the file indicator. Possible values are: md5, sha1, sha256. | Optional |
rating | The threat rating of the indicator. Can be "0" - "Unknown", "1" - "Suspicious", "2" - "Low", "3" - Moderate, "4" - High, or "5" - "Critical". | Optional |
confidence | The confidence rating of the indicator. Can be "0%" - "Unknown," "1% " - "Discredited", "2-29%" - "Improbable," "30-49%" - "Doubtful," "50-69%" - "Possible", "70-89%" - "Probable," or "90-100%" - "Confirmed". | Optional |
description | The description of the indicator. | Optional |
tags | A comma-separated list of the tags to apply to the campaign. | Optional |
#
Context OutputPath | Type | Description |
---|---|---|
TC.Indicator.Name | string | The name of the indicator. |
TC.Indicator.Type | string | The type of indicator. |
TC.Indicator.ID | string | The ID of the indicator. |
TC.Indicator.Description | string | The description of the indicator. |
TC.Indicator.Owner | string | The owner of the indicator. |
TC.Indicator.CreateDate | date | The date the added indicator was created. |
TC.Indicator.LastModified | date | The date the added indicator was last modified. |
TC.Indicator.Rating | number | The threat rating of the indicator. |
TC.Indicator.Confidence | number | The confidence rating of the indicator. |
TC.Indicator.WhoisActive | string | The active indicator (for domains only). |
TC.Indicator.File.MD5 | string | The MD5 hash of the indicator of the file. |
TC.Indicator.File.SHA1 | string | The SHA1 hash of the indicator of the file. |
TC.Indicator.File.SHA256 | string | The SHA256 hash of the indicator of the file. |
IP.Address | string | The IP address of the indicator. |
IP.Malicious.Vendor | string | For malicious IP addresses, the vendor that made the decision. |
IP.Malicious.Description | string | For malicious IP addresses, the full description. |
URL.Data | string | The data of the URL of the indicator. |
URL.Malicious.Vendor | string | For malicious URLs, the vendor that made the decision. |
URL.Malicious.Description | string | For malicious URLs, the full description. |
Domain.Name | string | The name of the added indicator of the domain. |
Domain.Malicious.Vendor | string | For malicious domains, the vendor that made the decision. |
Domain.Malicious.Description | string | For malicious domains, the full description. |
File.MD5 | string | The MD5 hash of the file. |
File.SHA1 | string | The SHA1 hash of the file. |
File.SHA256 | string | The SHA256 hash of the file. |
File.Malicious.Vendor | string | For malicious files, the vendor that made the decision. |
File.Malicious.Description | string | For malicious files, the full description. |
TC.Indicator.WebLink | string | The web link of the indicator. |
#
tc-create-incidentCreates a new incident group.
#
Base Commandtc-create-incident
#
InputArgument Name | Description | Required |
---|---|---|
incidentName | The name of the incident group. | Required |
eventDate | The creation time of an incident in the "2017-03-21T00:00:00Z" format. | Optional |
tag | A comma-separated list of the tags applied to the incident. | Optional |
securityLabel | The security label applied to the incident. Possible values are: TLP:RED, TLP:GREEN, TLP:AMBER, TLP:WHITE. | Optional |
description | The description of the incident. | Optional |
#
Context OutputPath | Type | Description |
---|---|---|
TC.Incident.Name | string | The name of the new incident group. |
TC.Incident.Owner | string | The owner of the new incident. |
TC.Incident.EventDate | date | The date on which the event that indicates an incident occurred. |
TC.Incident.Tag | string | The name of the tag of the new incident. |
TC.Incident.SecurityLabel | string | The security label of the new incident. |
TC.Incident.ID | Unknown | The ID of the new incident. |
#
tc-incident-associate-indicatorAssociates an indicator with an existing incident. The indicator must exist before running this command. To add an indicator, run the tc-add-indicator command.
#
Base Commandtc-incident-associate-indicator
#
InputArgument Name | Description | Required |
---|---|---|
incidentId | The ID of the incident to which the indicator is associated. | Required |
indicator | The ID of the indicator. | Required |
#
Context OutputPath | Type | Description |
---|---|---|
TC.Indicator.Name | string | The name of the indicator. |
TC.Indicator.Type | string | The type of the indicator. |
TC.Indicator.ID | string | The ID of the indicator. |
TC.Indicator.Description | string | The description of the indicator. |
TC.Indicator.Owner | string | The owner of the indicator. |
TC.Indicator.CreateDate | date | The date the associated indicator was created. |
TC.Indicator.LastModified | date | The date the associated indicator was last modified. |
TC.Indicator.Rating | number | The threat rating of the indicator. |
TC.Indicator.Confidence | number | The confidence rating of the indicator. |
TC.Indicator.WhoisActive | string | The active indicator (for domains only). |
TC.Indicator.File.MD5 | string | The MD5 hash of the indicator of the file. |
TC.Indicator.File.SHA1 | string | The SHA1 hash of the indicator of the file. |
TC.Indicator.File.SHA256 | string | The SHA256 hash of the indicator of the file. |
IP.Address | string | IP address of the associated indicator of the file. |
IP.Malicious.Vendor | string | For malicious IP addresses, the vendor that made the decision. |
IP.Malicious.Description | string | For malicious IP addresses, the full description. |
URL.Data | string | The data of the URL of the associated indicator of the file. |
URL.Malicious.Vendor | string | For malicious URLs, the vendor that made the decision. |
URL.Malicious.Description | string | For malicious URLs, the full description. |
Domain.Name | string | The name of the indicator of the domain. |
Domain.Malicious.Vendor | string | For malicious domains, the vendor that made the decision. |
Domain.Malicious.Description | string | For malicious domains, the full description. |
File.MD5 | string | The MD5 hash of the file. |
File.SHA1 | string | The SHA1 hash of the file. |
File.SHA256 | string | The SHA256 hash of the file. |
File.Malicious.Vendor | string | For malicious files, the vendor that made the decision. |
File.Malicious.Description | string | For malicious files, the full description. |
TC.Indicator.WebLink | string | The web link of the indicator. |
#
domainSearches for an indicator of type domain.
#
Base Commanddomain
#
InputArgument Name | Description | Required |
---|---|---|
domain | A comma-separated list of names of the domain. | Required |
owners | A comma-separated list of a client's organizations, sources, or communities to which a user has permissions. For example, users with admin permissions can search for indicators belonging to all owners. | Optional |
ratingThreshold | A comma-separated list of results filtered by indicators whose threat rating is greater than the specified value. Can be "0" - "Unknown", "1" - "Suspicious", "2" - "Low", "3" - Moderate, "4" - High, or "5" - "Critical". | Optional |
confidenceThreshold | A comma-separated list of results filtered by indicators whose confidence rating is greater than the specified value. Can be "0%" - "Unknown," "1% " - "Discredited", "2-29%" - "Improbable," "30-49%" - "Doubtful," "50-69%" - "Possible", "70-89%" - "Probable," or "90-100%" - "Confirmed". | Optional |
#
Context OutputPath | Type | Description |
---|---|---|
TC.Indicator.Name | string | The name of the indicator. |
TC.Indicator.Type | string | The type of the domain. |
TC.Indicator.ID | string | The ID of the domain. |
TC.Indicator.Description | string | The description of the domain. |
TC.Indicator.Owner | string | The owner of the domain. |
TC.Indicator.CreateDate | date | The date the indicator of the domain was created. |
TC.Indicator.LastModified | date | The date the indicator of the domain was last modified. |
TC.Indicator.Rating | number | The threat rating of the domain. |
TC.Indicator.Confidence | number | The confidence rating of the domain. |
TC.Indicator.WhoisActive | string | The active indicator (for domains only). |
DBotScore.Indicator | String | The indicator that was tested. |
DBotScore.Type | String | The indicator type. |
DBotScore.Vendor | String | The vendor used to calculate the score. |
DBotScore.Score | Number | The actual score. |
DBotScore.Reliability | String | Reliability of the source providing the intelligence data. |
Domain.Name | string | The name of the domain. |
Domain.Malicious.Vendor | string | For malicious domains, the vendor that made the decision. |
Domain.Malicious.Description | string | For malicious domains, the full description. |
TC.Indicator.WebLink | string | The web link of the indicator. |
#
tc-get-incident-associate-indicatorsReturns indicators that are related to a specific incident.
#
Base Commandtc-get-incident-associate-indicators
#
InputArgument Name | Description | Required |
---|---|---|
incidentId | The ID of the incident. | Required |
#
Context OutputPath | Type | Description |
---|---|---|
TC.Indicator.Name | string | The name of the returned indicator. |
TC.Indicator.Type | string | The type of the returned indicator. |
TC.Indicator.ID | string | The ID of the returned indicator. |
TC.Indicator.Description | string | The description of the returned indicator. |
TC.Indicator.Owner | string | The owner of the returned indicator. |
TC.Indicator.CreateDate | date | The date the returned indicator was created. |
TC.Indicator.LastModified | date | The date the returned indicator was last modified. |
TC.Indicator.Rating | number | The threat rating of the returned indicator. |
TC.Indicator.Confidence | number | The confidence rating of the returned indicator. |
TC.Indicator.WhoisActive | string | The active indicator (for domains only). |
TC.Indicator.File.MD5 | string | The MD5 hash of the indicator of the file. |
TC.Indicator.File.SHA1 | string | The SHA1 hash of the indicator of the file. |
TC.Indicator.File.SHA256 | string | The SHA256 hash of the indicator of the file. |
DBotScore.Indicator | String | The indicator that was tested. |
DBotScore.Type | String | The indicator type. |
DBotScore.Vendor | String | The vendor used to calculate the score. |
DBotScore.Score | Number | The actual score. |
DBotScore.Reliability | String | Reliability of the source providing the intelligence data. |
IP.Address | string | The IP address of the returned indicator. |
IP.Malicious.Vendor | string | For malicious IP addresses, the vendor that made the decision. |
IP.Malicious.Description | string | For malicious IP addresses, the full description. |
URL.Data | string | The data of the URL of the returned indicator. |
URL.Malicious.Vendor | string | For malicious URLs, the vendor that made the decision. |
URL.Malicious.Description | string | For malicious URLs, the full description. |
Domain.Name | string | The name of the domain. |
Domain.Malicious.Vendor | string | For malicious domains, the vendor that made the decision. |
Domain.Malicious.Description | string | For malicious domains, the full description. |
File.MD5 | string | The MD5 hash of the file. |
File.SHA1 | string | The SHA1 hash of the file. |
File.SHA256 | string | The SHA256 hash of the file. |
File.Malicious.Vendor | string | For malicious files, the vendor that made the decision. |
File.Malicious.Description | string | For malicious files, the full description. |
#
tc-update-indicatorUpdates the indicator in ThreatConnect.
#
Base Commandtc-update-indicator
#
InputArgument Name | Description | Required |
---|---|---|
indicator | The name of the updated indicator. | Required |
rating | The threat rating of the updated indicator. | Optional |
confidence | The confidence rating of the updated indicator. | Optional |
size | The size of the file of the updated indicator. | Optional |
dnsActive | Whether the DNS indicator is active (only for hosts). Possible values are: True, False. | Optional |
whoisActive | Whether the indicator is active (only for hosts). Possible values are: True, False. | Optional |
falsePositive | Whether the updated indicator is a false positive. Possible values are: True, False. | Optional |
securityLabel | The security label applied to the incident. Possible values are: TLP:RED, TLP:GREEN, TLP:AMBER, TLP:WHITE. | Optional |
tags | A comma-separated list of tags. | Optional |
#
Context OutputPath | Type | Description |
---|---|---|
TC.Indicator.Name | string | The name of the indicator. |
TC.Indicator.Type | string | The type of the indicator. |
TC.Indicator.ID | string | The ID of the indicator. |
TC.Indicator.Description | string | The description of the indicator. |
TC.Indicator.Owner | string | The owner of the indicator. |
TC.Indicator.CreateDate | date | The date the indicator was created. |
TC.Indicator.LastModified | date | The date the indicator was last modified. |
TC.Indicator.Rating | number | The threat rating of the indicator. |
TC.Indicator.Confidence | number | The confidence rating of the indicator. |
TC.Indicator.WhoisActive | string | The active indicator (for domains only). |
TC.Indicator.File.MD5 | string | The MD5 hash of the indicator of the file. |
TC.Indicator.File.SHA1 | string | The SHA1 hash of the indicator of the file. |
TC.Indicator.File.SHA256 | string | The SHA256 hash of the indicator of the file. |
IP.Address | string | The IP address of the indicator. |
IP.Malicious.Vendor | string | For malicious IP addresses, the vendor that made the decision. |
IP.Malicious.Description | string | For malicious IP addresses, the full description. |
URL.Data | string | The data of the URL of the indicator. |
URL.Malicious.Vendor | string | For malicious URLs, the vendor that made the decision. |
URL.Malicious.Description | string | For malicious URLs, the full description. |
Domain.Name | string | The domain name of the indicator. |
Domain.Malicious.Vendor | string | For malicious domains, the vendor that made the decision. |
Domain.Malicious.Description | string | For malicious domains, the full description. |
File.MD5 | string | The MD5 hash of the file. |
File.SHA1 | string | The SHA1 hash of the file. |
File.SHA256 | string | The SHA256 hash of the file. |
File.Malicious.Vendor | string | For malicious files, the vendor that made the decision. |
File.Malicious.Description | string | For malicious files, the full description. |
TC.Indicator.WebLink | string | The web link of the indicator. |
#
tc-delete-indicator-tagRemoves a tag from a specified indicator.
#
Base Commandtc-delete-indicator-tag
#
InputArgument Name | Description | Required |
---|---|---|
indicator | The ID of the indicator from which to remove a tag. | Required |
tag | The name of the tag to remove from the indicator. | Required |
#
Context OutputPath | Type | Description |
---|---|---|
TC.Indicator.Name | string | The name of the indicator. |
TC.Indicator.Type | string | The type of the indicator. |
TC.Indicator.ID | string | The ID of the indicator. |
TC.Indicator.Description | string | The description of the indicator. |
TC.Indicator.Owner | string | The owner of the indicator. |
TC.Indicator.CreateDate | date | The date the indicator was created. |
TC.Indicator.LastModified | date | The date the indicator was last modified. |
TC.Indicator.Rating | number | The threat rating of the indicator. |
TC.Indicator.Confidence | number | The confidence rating of the indicator. |
TC.Indicator.WhoisActive | string | The active indicator (for domains only). |
TC.Indicator.File.MD5 | string | The MD5 hash of the indicator of the file. |
TC.Indicator.File.SHA1 | string | The SHA1 hash of the indicator of the file. |
TC.Indicator.File.SHA256 | string | The SHA256 hash of the indicator of the file. |
IP.Address | string | The IP address of the indicator. |
IP.Malicious.Vendor | string | For malicious IP addresses, the vendor that made the decision. |
IP.Malicious.Description | string | For malicious IP addresses, the full description. |
URL.Data | string | The data of the URL of the indicator. |
URL.Malicious.Vendor | string | For malicious URLs, the vendor that made the decision. |
URL.Malicious.Description | string | For malicious URLs, the full description. |
Domain.Name | string | The domain name of the indicator. |
Domain.Malicious.Vendor | string | For malicious domains, the vendor that made the decision. |
Domain.Malicious.Description | string | For malicious domains, the full description. |
File.MD5 | string | The MD5 hash of the file. |
File.SHA1 | string | The SHA1 hash of the file. |
File.SHA256 | string | The SHA256 hash of the file. |
File.Malicious.Vendor | string | For malicious files, the vendor that made the decision. |
File.Malicious.Description | string | For malicious files, the full description. |
TC.Indicator.WebLink | string | The web link of the indicator. |
#
tc-delete-indicatorDeletes an indicator from ThreatConnect.
#
Base Commandtc-delete-indicator
#
InputArgument Name | Description | Required |
---|---|---|
indicator | The ID of the indicator to delete. | Required |
#
Context OutputThere is no context output for this command.
#
tc-create-campaignCreates a group based on the Campaign type.
#
Base Commandtc-create-campaign
#
InputArgument Name | Description | Required |
---|---|---|
name | The name of the campaign group. | Required |
firstSeen | The date the campaign was first seen. | Optional |
description | The description of the campaign. | Optional |
tag | Comma-separated list of the tags to apply to the campaign. | Optional |
securityLabel | The security label applied to the incident. Possible values are: TLP:RED, TLP:GREEN, TLP:AMBER, TLP:WHITE. | Optional |
#
Context OutputPath | Type | Description |
---|---|---|
TC.Campaign.Name | string | The name of the campaign. |
TC.Campaign.Owner | string | The owner of the campaign. |
TC.Campaign.FirstSeen | date | The date the campaign was first seen. |
TC.Campaign.Tag | string | The tag of the campaign. |
TC.Campaign.SecurityLevel | string | The security label of the campaign. |
TC.Campaign.ID | string | The ID of the campaign. |
#
tc-create-eventCreates a group based on the Event type.
#
Base Commandtc-create-event
#
InputArgument Name | Description | Required |
---|---|---|
name | The name of the event group. | Required |
eventDate | The date the event occurred. If the date is not specified, the current date is used. | Optional |
status | The status of the event. Possible values are: Needs Review, False Positive, No Further Action, Escalated. | Optional |
tag | A comma-separated list of the tags of the event. | Optional |
owner_name | The name of the owner to which the group belongs. By default, events will be created in the organization in which the API user account resides. | Optional |
#
Context OutputPath | Type | Description |
---|---|---|
TC.Event.Name | string | The name of the event. |
TC.Event.Date | date | The date of the event. |
TC.Event.Status | string | The status of the event. |
TC.Event.Owner | string | The owner of the event. |
TC.Event.Tag | string | The tag of the event. |
TC.Event.ID | string | The ID of the event. |
TC.Event.Type | string | The type of the event. |
#
tc-create-threatCreates a group based on the "Threats" type.
#
Base Commandtc-create-threat
#
InputArgument Name | Description | Required |
---|---|---|
name | The name of the threat group. | Required |
eventDate | The creation time of a threat in the "2017-03-21T00:00:00Z" format. | Optional |
tags | A comma-separated list of the tags applied to the threat. | Optional |
securityLabel | The security label applied to the threat. Possible values are: TLP:RED, TLP:GREEN, TLP:AMBER, TLP:WHITE. | Optional |
description | The description of the threat. | Optional |
#
Context OutputPath | Type | Description |
---|---|---|
TC.Threat.Name | string | The name of the threat. |
TC.Threat.ID | string | The ID of the threat. |
#
tc-delete-groupDeletes a group.
#
Base Commandtc-delete-group
#
InputArgument Name | Description | Required |
---|---|---|
groupID | A comma-separated list of the IDs of the groups to delete. | Required |
#
Context OutputThere is no context output for this command.
#
tc-get-eventsReturns a list of events.
#
Base Commandtc-get-events
#
InputArgument Name | Description | Required |
---|---|---|
fromDate | The date to retrieve groups from in the format yyyy-mm-dd, e.g., 1111-11-11. | Optional |
tag | The tag to retrieve groups by. | Optional |
page | The page to take the results from. | Optional |
limit | The maximum number of results that can be returned. The default is 500. | Optional |
id | A comma-separated list of IDs to filter the groups by. | Optional |
filter | A free text TQL filter. (Refer here for a basic TQL guide). | Optional |
#
Context OutputPath | Type | Description |
---|---|---|
TC.Event.DateAdded | Date | The date the event was added. |
TC.Event.EventDate | Date | The date the event occurred. |
TC.Event.ID | Number | The ID of the event. |
TC.Event.OwnerName | String | The name of the owner of the event. |
TC.Event.Status | String | The status of the event. |
TC.Event.AssociatedGroups | String | The associated groups for the event. |
TC.Event.AssociatedIndicators | String | The associated indicators for the event. |
TC.Event.Tags | String | The tags of the event. |
#
tc-list-groupsReturns all groups.
#
Base Commandtc-list-groups
#
InputArgument Name | Description | Required |
---|---|---|
group_type | The type of the group. Possible values are: Adversary, Attack Pattern, Campaign, Course of Action, Document, E-mail, Event, Incident, Intrusion Set, Malware, Report, Signature, Tactic, Task, Threat, Tool, Vulnerability. | Optional |
fromDate | The date to retrieve groups from in the yyyy-mm-dd format, e.g., 1111-11-11. | Optional |
tag | The tag to retrieve groups by. | Optional |
page | The page to take the results from. | Optional |
limit | The maximum number of results that can be returned. The default is 500. | Optional |
id | A comma-separated list of IDs to filter the groups by. | Optional |
filter | A free text TQL filter. (Refer here for a basic TQL guide). | Optional |
include_tags | Add group tags metadata to the results. | Optional |
include_security_labels | Add group security labels metadata to the results. | Optional |
include_attributes | Add group attributes metadata to the results. | Optional |
include_associated_groups | Add group associated groups metadata to the results. | Optional |
include_associated_indicators | Add group associated indicators metadata to the results. | Optional |
include_all_metaData | Add all group metadata to the results. | Optional |
#
Context OutputPath | Type | Description |
---|---|---|
TC.Group.DateAdded | Date | The date the group was added. |
TC.Group.EventDate | Date | The date the event occurred. |
TC.Group.Name | String | The name of the group. |
TC.Group.OwnerName | String | The name of the owner of the group. |
TC.Group.Status | String | The status of the group. |
TC.Group.ID | Number | The ID of the group. |
#
tc-add-group-tagAdds tags to a specified group.
#
Base Commandtc-add-group-tag
#
InputArgument Name | Description | Required |
---|---|---|
group_id | The ID of the group to which to add the tag. To get the ID, run the tc-list-groups command. | Required |
tag_name | The name of the tag to add to the group. | Required |
#
Context OutputThere is no context output for this command.
#
tc-get-indicator-typesReturns all indicator types available.
#
Base Commandtc-get-indicator-types
#
InputArgument Name | Description | Required |
---|
#
Context OutputPath | Type | Description |
---|---|---|
TC.IndicatorType.ApiBranch | String | The branch of the API. |
TC.IndicatorType.ApiEntity | String | The entity of the API. |
TC.IndicatorType.CasePreference | String | The case preference of the indicator. For example, "sensitive", "upper", or "lower". |
TC.IndicatorType.Custom | Boolean | Whether the indicator is a custom indicator. |
TC.IndicatorType.Parsable | Boolean | Whether the indicator can be parsed. |
TC.IndicatorType.Value1Type | String | The value type of the indicator. |
TC.IndicatorType.Value1Label | String | The value label of the indicator. |
#
tc-create-document-groupCreates a document group.
#
Base Commandtc-create-document-group
#
InputArgument Name | Description | Required |
---|---|---|
file_name | The name of the file to display in the UI. | Required |
name | The name of the group. | Required |
malware | Whether the file is malware. If "true", ThreatConnect creates a password-protected ZIP file on your local machine that contains the sample and uploads the ZIP file. Possible values are: true, false. | Optional |
password | The password of the ZIP file. | Optional |
security_label | The security label applied to the document. Possible values are: TLP:RED, TLP:GREEN, TLP:AMBER, TLP:WHITE. | Optional |
description | A description of the group. | Optional |
entry_id | The ID of the entry, as displayed in the War Room. | Required |
#
Context OutputPath | Type | Description |
---|---|---|
TC.Group.Name | String | The name of the group. |
TC.Group.Owner | String | The owner of the group. |
TC.Group.EventDate | Date | The date the group was created. |
TC.Group.Description | String | The description of the group. |
TC.Group.SecurityLabel | String | The security label of the group. |
TC.Group.ID | Number | The ID of the group to which the attribute was added. |
#
tc-download-documentDownloads the contents of a document.
#
Base Commandtc-download-document
#
InputArgument Name | Description | Required |
---|---|---|
document_id | The ID of the document. | Required |
#
Context OutputPath | Type | Description |
---|---|---|
File.Size | Number | The size of the file. |
File.SHA1 | String | The SHA1 hash of the file. |
File.SHA256 | String | The SHA256 hash of the file. |
File.Name | String | The name of the file. |
File.SSDeep | String | The ssdeep hash of the file (same as displayed in file entries). |
File.EntryID | String | The entry ID of the file. |
File.Info | String | The information of the file. |
File.Type | String | The type of the file. |
File.MD5 | String | The MD5 hash of the file. |
File.Extension | String | The extension of the file. |
#
tc-get-associated-groupsReturns groups associated with a specified group.
#
Base Commandtc-get-associated-groups
#
InputArgument Name | Description | Required |
---|---|---|
group_id | The ID of the group. To get the ID, run the tc-list-groups command. | Required |
#
Context OutputPath | Type | Description |
---|---|---|
TC.Group.AssociatedGroup.DateAdded | Date | The date the group was added. |
TC.Group.AssociatedGroup.GroupID | Number | The ID of the group. |
TC.Group.AssociatedGroup.Name | String | The name of the group. |
TC.Group.AssociatedGroup.OwnerName | String | The name of the owner of the group. |
TC.Group.AssociatedGroup.Type | String | The type of the group. |
#
tc-get-indicator-ownersGet the owner for an indicator.
#
Base Commandtc-get-indicator-owners
#
InputArgument Name | Description | Required |
---|---|---|
indicator | Indicator ID. | Required |
#
Context OutputThere is no context output for this command.
#
tc-download-reportThe group report to download in PDF format.
#
Base Commandtc-download-report
#
InputArgument Name | Description | Required |
---|---|---|
group_id | The ID of the group. | Required |
#
Context OutputPath | Type | Description |
---|---|---|
File.Size | Number | The size of the file. |
File.SHA1 | String | The SHA1 hash of the file. |
File.SHA256 | String | The SHA256 hash of the file. |
File.Name | String | The name of the file. |
File.SSDeep | String | The ssdeep hash of the file. |
File.EntryID | String | The entry ID of the file. |
File.Info | String | The information of the file. |
File.Type | String | The type of the file. |
File.MD5 | String | The MD5 hash of the file. |
File.Extension | String | The extension of the file. |
#
tc-update-groupUpdates a group.
#
Base Commandtc-update-group
#
InputArgument Name | Description | Required |
---|---|---|
id | The ID of the group. | Required |
custom_field | Custom fields for the group. | Optional |
tags | A comma-separated list of The tags applied to the threat. | Optional |
security_label | The security label applied to the threat. Possible values are: TLP:RED, TLP:GREEN, TLP:AMBER, TLP:WHITE. | Optional |
associated_group_id | An ID to associate a group by. | Optional |
associated_indicator_id | An ID to associate an indicator by. | Optional |
security_label | The type of update to the group metadata (associated indicators, attributes,tags, etc.). Possible values are: append, delete, replace. | Optional |
attribute_value | The value of the attribute to associate. | Optional |
attribute_type | The type of the attribute to associate. | Optional |
#
Context OutputPath | Type | Description |
---|---|---|
TC.Group.Name | string | The name of the group. |
TC.Group.Owner | string | The owner of the group. |
TC.Group.Tag | string | The tag of the group. |
TC.Group.SecurityLevel | string | The security label of the group. |
TC.Group.ID | string | The ID of the group. |
#
Redundant ArgumentsThe following arguments were removed in this version:
In the tc-tag-indicator command:
- owner - this argument was redundant.
In the tc-get-indicator command:
- indicator_type - this argument was redundant.
- owners - this argument was redundant.
- ratingThreshold - this argument was redundant.
- confidenceThreshold - this argument was redundant.
- group_associations - this argument was redundant.
- indicator_associations - this argument was redundant.
- indicator_observations - this argument was redundant.
- indicator_tags - this argument was redundant.
- indicator_attributes - this argument was redundant.
In the tc-add-indicator command:
- owner - this argument was redundant.
In the tc-create-incident command:
- owner - this argument was redundant.
In the tc-fetch-incidents command:
- incidentName - this argument was redundant.
In the tc-incident-associate-indicator command:
- indicatorType - this argument was redundant.
- owner - this argument was redundant.
In the tc-get-incident-associate-indicators command:
- owner - this argument was redundant.
In the tc-update-indicator command:
- observations - this argument was redundant.
- threatAssessConfidence - this argument was redundant.
- threatAssessRating - this argument was redundant.
- owner - this argument was redundant.
In the tc-create-campaign command:
- owner - this argument was redundant.
In the tc-create-event command:
- owner - this argument was redundant.
In the tc-delete-group command:
- type - this argument was redundant.
In the tc-add-group-attribute command:
- group_type - this argument was redundant.
In the tc-add-group-security-label command:
- group_type - this argument was redundant.
In the tc-add-group-tag command:
- group_type - this argument was redundant.
In the tc-group-associate-indicator command:
- indicator_type - this argument was redundant.
- group_type - this argument was redundant.
In the tc-get-group command:
- group_type - this argument was redundant.
In the tc-get-group-attributes command:
- group_type - this argument was redundant.
In the tc-get-group-security-labels command:
- group_type - this argument was redundant.
In the tc-get-group-tags command:
- group_type - this argument was redundant.
In the tc-get-group-indicators command:
- group_type - this argument was redundant.
In the tc-get-associated-groups command:
- group_type - this argument was redundant.
In the tc-associate-group-to-group command:
- group_type - this argument was redundant.
- associated_group_type - this argument was redundant.
In the tc-download-report command:
- group_type - this argument was redundant.
#
Additional Considerations for this versionAPI version 3 documentation Use the new REST v3 API instead of the old python module.