IBM X-Force Exchange v2
IBM X-Force Exchange Pack.#
This Integration is part of theIBM X-Force Exchange lets you receive threat intelligence about applications, IP addresses, URls and hashes
#
Configure XFE v2 in CortexParameter | Description | Required |
---|---|---|
url | Server URL (e.g. https://api.xforce.ibmcloud.com) | True |
credentials | API Key | True |
Source Reliability | Reliability of the source providing the intelligence data. The default value is C - Fairly reliable. | True |
insecure | Trust any certificate (not secure) | False |
proxy | Use system proxy settings | False |
ip_threshold | IP Threshold. Minimum risk score for the IP to be consodered malicious (ranges from 1 to 10). | False |
url_threshold | URL Threshold. Minimum risk score for the URL to be consodered malicious (ranges from 1 to 10). | False |
cve_threshold | CVE Threshold. Minimum risk score for the URL to be consodered malicious (ranges from 1 to 10). | False |
#
CommandsYou can execute these commands from the CLI, as part of an automation, or in a playbook. After you successfully execute a command, a DBot message appears in the War Room with the command details.
#
ipIP to check
#
Base Commandip
#
InputArgument Name | Description | Required |
---|---|---|
ip | IP to check | Required |
threshold | score threshold | Optional |
#
Context OutputPath | Type | Description |
---|---|---|
IP.Address | Unknown | The IP address. |
IP.Malicious.Vendor | Unknown | For malicious IPs, the vendor that made the decision. |
IP.Malicious.Description | Unknown | For malicious IPs, the reason for the vendor to make the decision. |
IP.Malicious.Score | Unknown | For malicious IPs, the score from the vendor. |
DBotScore.Indicator | string | The indicator that was tested. |
DBotScore.Type | string | The indicator type. |
DBotScore.Vendor | string | The vendor used to calculate the score. |
DBotScore.Score | number | The actual score. |
XFE.IP.Reason | String | The reason for the given score from X-Force Exchange. |
XFE.IP.Reasondescription | String | Additional details of the score's reason. |
XFE.IP.Subnets | Unknown | The subnets of the IP. |
#
Command Example!ip ip=8.8.8.8
#
Context Example#
Human Readable Output#
X-Force IP Reputation for: 8.8.8.8https://exchange.xforce.ibmcloud.com/ip/8.8.8.8 |Reason|Score|Subnets| |---|---|---| | Regional Internet Registry:One of the five RIRs announced a (new) location mapping of the IP. | 1 | 8.0.0.0/8, 8.0.0.0/9, 8.8.8.0/24 |
#
urlCheck the given URL reputation
Notice: Submitting indicators using this command might make the indicator data publicly available. See the vendor’s documentation for more details.
#
Base Commandurl
#
InputArgument Name | Description | Required |
---|---|---|
threshold | If the score is above the given threshold, will be considered malicious. If threshold is not specified, the default URL threshold, as configured in the instance settings, will be used. | Optional |
url | The URL to check | Required |
#
Context OutputPath | Type | Description |
---|---|---|
URL.Data | String | The given URL from the user. |
URL.Malicious.Vendor | String | For malicious URLs, the vendor that made the decision. |
DBotScore.Indicator | string | The indicator that was tested. |
DBotScore.Type | string | The indicator type. |
DBotScore.Vendor | string | The vendor used to calculate the score. |
DBotScore.Score | number | The actual score. |
#
Command Example!url url="https://www.google.com"
#
Context Example#
Human Readable Outputhttps://www.google.com#
X-Force URL Reputation for:https://exchange.xforce.ibmcloud.com/url/https://www.google.com |Categories|Score| |---|---| | Search Engines / Web Catalogues / Portals | 1 |
#
fileCheck file reputation
#
Base Commandfile
#
InputArgument Name | Description | Required |
---|---|---|
file | The file hash md5/sha1/sha256 to check | Required |
#
Context OutputPath | Type | Description |
---|---|---|
File.MD5 | String | The file's MD5. |
File.SHA1 | String | The file's SHA1. |
File.SHA256 | String | The file's SHA256. |
File.Malicious.Vendor | String | For malicious files, the vendor that made the decision. |
File.Malicious.Description | String | For malicious files, the reason for the vendor to make the decision. |
File.Relationships.EntityA | String | The source of the relationship. |
File.Relationships.EntityB | String | The destination of the relationship. |
File.Relationships.Relationship | String | The name of the relationship. |
File.Relationships.EntityAType | String | The type of the source of the relationship. |
File.Relationships.EntityBType | String | The type of the destination of the relationship. |
DBotScore.Indicator | string | The indicator that was tested. |
DBotScore.Type | string | The indicator type. |
DBotScore.Vendor | string | The vendor used to calculate the score. |
DBotScore.Score | number | The actual score. |
XFE.File.CnCServers | Unknown | C&C servers related to the given file. |
XFE.File.emails | Unknown | Emails related to the given file. |
XFE.File.downloadServers | Unknown | Download servers related to the given file. |
XFE.File.subjects | Unknown | Subjects related to the given file. |
XFE.File.external | Unknown | Additional information about the given file. |
#
Command Example!file file="f2b8d790dab6d2c6945f9a0bce441921"
#
Context Example#
Human Readable Output#
X-Force md5 Reputation for f2b8d790dab6d2c6945f9a0bce441921https://exchange.xforce.ibmcloud.com/malware/f2b8d790dab6d2c6945f9a0bce441921 |Created Date|Source|Type| |---|---|---| | 2018-08-13T07:48:30Z | reversingLabs | Trojan |
#
domainCheck domain reputation
Notice: Submitting indicators using this command might make the indicator data publicly available. See the vendor’s documentation for more details.
#
Base Commanddomain
#
InputArgument Name | Description | Required |
---|---|---|
domain | The domain to check | Required |
threshold | If the score is above the given threshold, will be considered malicious. If threshold is not specified, the default URL threshold, as configured in the instance settings, will be used. | Optional |
#
Context OutputPath | Type | Description |
---|---|---|
Domain.Name | String | Domain. |
Domain.Malicious.Vendor | String | For malicious URLs, the vendor that made the decision. |
DBotScore.Indicator | string | The indicator that was tested. |
DBotScore.Type | string | The indicator type. |
DBotScore.Vendor | string | The vendor used to calculate the score. |
DBotScore.Score | number | The actual score. |
#
Command Example!domain domain="google.com"
#
Context Example#
Human Readable Output#
X-Force Domain Reputation for: google.comhttps://exchange.xforce.ibmcloud.com/url/google.com |Categories|Score| |---|---| | Search Engines / Web Catalogues / Portals | 1 |
#
cve-searchSearch for details about the given CVE
#
Base Commandcve-search
#
InputArgument Name | Description | Required |
---|---|---|
cve_id | The cve to search for | Required |
#
Context OutputPath | Type | Description |
---|---|---|
CVE.ID | String | The ID of the CVE. |
CVE.CVSS | String | The CVSS of the CVE. |
CVE.Published | Date | The date this was published. |
CVE.Description | Unknown | The CVE description. |
XFE.CVE.Xfdbid | String | The XFBID of the CVE. |
XFE.CVE.RiskLevel | Number | The risk level of the CVE. |
XFE.CVE.Reported | Date | The reported date of the CVE. |
XFE.CVE.Cvss | Unknown | The CVSS information of the CVE. |
XFE.CVE.Stdcode | Unknown | The CVE stdcodes. |
XFE.CVE.Title | String | The title of the CVE. |
XFE.CVE.Description | String | The description of the CVE. |
XFE.CVE.PlatformsAffected | Unknown | The affetcted platforms due to the CVE. |
XFE.CVE.Exploitability | String | The exploitability of the CVE. |
#
Command Example!cve-search cve_id="CVE-2020-3142"
#
Context Example#
Human Readable Output#
X-Force CVE Reputation for CVE-2020-3142https://exchange.xforce.ibmcloud.com/vulnerability/search/CVE-2020-3142
|Access Vector|Affected Platforms|Complexity|Description|Exploitability|Reported|Risk Level|STD Code|Title|Version|
|---|---|---|---|---|---|---|---|---|---|
| Network | Cisco Webex Meetings Suite sites 39.11.0
Cisco Webex Meetings Suite sites 40.1.0
Cisco Webex Meetings Online sites 39.11.0
Cisco Webex Meetings Online sites 40.1.0
| Low | Cisco Webex Meetings Suite sites and Cisco Webex Meetings Online sites could allow a remote attacker to obtain sensitive information, caused by unintended meeting information exposure in a specific meeting join flow for mobile applications. By accessing a known meeting ID or meeting URL from the mobile deviceÂ’s web browser, an attacker could exploit this vulnerability to join a password-protected meeting without providing the meeting password. | Unproven | 2020-01-24T00:00:00Z | 7.5 | CVE-2020-3142 | Cisco Webex Meetings Suite sites information disclosure | 3.0 |
#
cve-latestReturn the latest vulnerabilities found
#
Base Commandcve-latest
#
InputArgument Name | Description | Required |
---|---|---|
limit | The number of results to return | Optional |
start_date | The start of the date range for searching. The format should be YYYY-MM-DDThh:mm:ssZ (e.g. 2016-01-01T00:00:00Z). | Optional |
end_date | The end of the date range for searching. The format should be YYYY-MM-DDThh:mm:ssZ (e.g. 2016-01-01T00:00:00Z). | Optional |
#
Context OutputPath | Type | Description |
---|---|---|
CVE.ID | String | The ID of the CVE. |
CVE.CVSS | String | The CVSS of the CVE. |
CVE.Published | Date | The date this was published. |
CVE.Description | Unknown | The CVE description. |
XFE.CVE.Xfdbid | String | The XFBID of the CVE. |
XFE.CVE.RiskLevel | Number | The risk level of the CVE. |
XFE.CVE.Reported | Date | The reported date of the CVE. |
XFE.CVE.Cvss | Unknown | The CVSS information of the CVE. |
XFE.CVE.Stdcode | Unknown | The CVE stdcodes. |
XFE.CVE.Title | String | The title of the CVE. |
XFE.CVE.Description | String | The description of the CVE. |
XFE.CVE.PlatformsAffected | Unknown | The affetcted platforms due to the CVE. |
XFE.CVE.Exploitability | String | The exploitability of the CVE. |
#
Command Example!cve-latest limit=2
#
Context Example#
Human Readable Output#
X-Force CVE Reputation for CVE-2020-10508https://exchange.xforce.ibmcloud.com/vulnerability/search/CVE-2020-10508
|Access Vector|Affected Platforms|Complexity|Description|Exploitability|Reported|Risk Level|STD Code|Title|Version|
|---|---|---|---|---|---|---|---|---|---|
| Network | Sunnet eHRD 9.0
Sunnet eHRD 8.0 | Low | Sunnet eHRD could allow a remote attacker to obtain sensitive information, caused by improperly storing system files. By using a specific URL, a remote attacker could exploit this vulnerability to obtain sensitive information. | Unproven | 2020-03-27T00:00:00Z | 5.3 | CVE-2020-10508 | Sunnet eHRD information disclosure | 3.0 |
#
X-Force CVE Reputation for CVE-2020-10509https://exchange.xforce.ibmcloud.com/vulnerability/search/CVE-2020-10509
|Access Vector|Affected Platforms|Complexity|Description|Exploitability|Reported|Risk Level|STD Code|Title|Version|
|---|---|---|---|---|---|---|---|---|---|
| Network | Sunnet eHRD 9.0
Sunnet eHRD 8.0 | Low | Sunnet eHRD is vulnerable to cross-site scripting, caused by improper validation of user-supplied input. A remote attacker could exploit this vulnerability to inject malicious script into a Web page which would be executed in a victim's Web browser within the security context of the hosting Web site, once the page is viewed. An attacker could use this vulnerability to steal the victim's cookie-based authentication credentials. | High | 2020-03-27T00:00:00Z | 6.1 | CVE-2020-10509 | Sunnet eHRD cross-site scripting | 3.0 |
#
xfe-whoisGets information about the given host address
#
Base Commandxfe-whois
#
InputArgument Name | Description | Required |
---|---|---|
host | The host or address to search inside X-Force Exchange (e.g. google.com) | Required |
#
Context OutputPath | Type | Description |
---|---|---|
XFE.Whois.Host | String | The given host from the user. |
XFE.Whois.RegistrarName | String | The domain name registrar of the host. |
XFE.Whois.Created | Date | The date the host was created. |
XFE.Whois.Updated | Date | The date the host's information has been updated. |
XFE.Whois.Expires | Date | The date the host will be expired. |
XFE.Whois.Email | String | The contact email of the host owners. |
XFE.Whois.Contact | Unknown | Contact information of the host's organization. |
Domain.Name | String | The name of the domain. |
Domain.CreationDate | Date | The creation date of the domain. |
Domain.ExpirationDate | Date | The expiration date of the domain. |
Domain.UpdatedDate | Date | The date the domain has been updated. |
Domain.Organization | String | The organizaton which owns the domain. |
Domain.Registrant.Country | String | The country of the domain's registrant. |
Domain.Registrant.Name | String | The name of the domain's registrant. |
Domain.WHOIS.Registrar.Name | String | The name of the domain's registar. |
Domain.WHOIS.Registrar.Email | String | The email of the domain's registar. |
Domain.WHOIS.UpdatedDate | String | The date the domain has been updated. |
Domain.WHOIS.ExpirationDate | Unknown | The date the domain has been updated. |
Domain.WHOIS.CreationDate | String | The creation date of the domain. |
Domain.WHOIS.Registrant.Country | String | The country of the domain's registrant. |
Domain.WHOIS.Registrant.Name | String | The name of the domain's registrant. |
#
Command Example!xfe-whois host="google.com"
#
Context Example#
Human Readable Output#
X-Force Whois result for google.comContact | Created | Expires | Host | RegistrarName | Updated | |
---|---|---|---|---|---|---|
{'Type': 'registrant', 'Organization': 'Google LLC', 'Country': 'United States'} | 1997-09-15T07:00:00.000Z | abusecomplaints@markmonitor.com | 2028-09-13T07:00:00.000Z | google.com | MarkMonitor, Inc. | 2019-09-09T15:39:04.000Z |
#
xfe-search-cvesGets list of all vulnerabilities associated with the search term.
#
Base Commandxfe-search-cves
#
InputArgument Name | Description | Required |
---|---|---|
q | The query for the search. (https://exchange.xforce.ibmcloud.com/api/doc/?#Vulnerabilities_get_vulnerabilities_fulltext) | Required |
start_date | The start of the date range for searching. The format should be YYYY-MM-DDThh:mm:ssZ (e.g. 2016-01-01T00:00:00Z). | Optional |
end_date | The end of the date range for searching. The format should be YYYY-MM-DDThh:mm:ssZ (e.g. 2016-01-01T00:00:00Z). | Optional |
bookmark | Bookmark used to page through results. (https://exchange.xforce.ibmcloud.com/api/doc/?#Vulnerabilities_get_vulnerabilities_fulltext) | Optional |
#
Context OutputPath | Type | Description |
---|---|---|
CVE.ID | String | The ID of the CVE. |
CVE.CVSS | String | The CVSS of the CVE. |
CVE.Published | Date | The date this was published. |
CVE.Description | Unknown | The CVE description. |
XFE.CVE.Xfdbid | String | The XFBID of the CVE. |
XFE.CVE.RiskLevel | Number | The risk level of the CVE. |
XFE.CVE.Reported | Date | The reported date of the CVE. |
XFE.CVE.Cvss | Unknown | The CVSS information of the CVE. |
XFE.CVE.Stdcode | Unknown | The CVE stdcodes. |
XFE.CVE.Title | String | The title of the CVE. |
XFE.CVE.Description | String | The description of the CVE. |
XFE.CVE.PlatformsAffected | Unknown | The affetcted platforms due to the CVE. |
XFE.CVE.Exploitability | String | The exploitability of the CVE. |
XFE.CVESearch.TotalRows | String | The total rows received after search. |
XFE.CVESearch.Bookmark | String | Bookmark used to page through results. |
#
Command Example!xfe-search-cves q="Heartbleed"
#
Context Example#
Human Readable Output#
X-Force CVE Reputation for CVE-2014-0964https://exchange.xforce.ibmcloud.com/vulnerability/search/CVE-2014-0964
|Access Vector|Affected Platforms|Complexity|Description|Exploitability|Reported|Risk Level|STD Code|Title|Version|
|---|---|---|---|---|---|---|---|---|---|
| Network | IBM WebSphere Application Server 6.0.2
IBM WebSphere Application Server 6.1 | Medium | IBM WebSphere Application Server is not vulnerable to the Heartbleed vulnerability (CVE-2014-0160) where secure data might not be protected. However, there is a potential denial of service on IBM WebSphere Application Server Version 6.1 and 6.0.2 when running the Heartbleed scanning tools or if sending specially-crafted Heartbeat messages. | Unproven | 2014-05-08T00:00:00Z | 7.1 | CVE-2014-0964
BID-67322 | IBM WebSphere Application Server and Scanning Tool denial of service | 2.0 |
#
X-Force CVE Reputation for BID-67054https://exchange.xforce.ibmcloud.com/vulnerability/search/BID-67054
|Access Vector|Affected Platforms|Complexity|Description|Exploitability|Reported|Risk Level|STD Code|Title|Version|
|---|---|---|---|---|---|---|---|---|---|
| Network | HP Integrated Lights-Out 2 (iLO2) 2.23 | Low | HP Integrated Lights-Out 2 (iLO 2) is vulnerable to a denial of service, caused by an error when scanned by vulnerability assessment tools scan for the Heartbleed vulnerability. A remote attacker could exploit this vulnerability to cause the server to crash. | Unproven | 2014-04-24T00:00:00Z | 7.8 | BID-67054
SA58224
CVE-2014-2601 | HP Integrated Lights-Out 2 Heartbleed denial of service | 2.0 |
#
X-Force CVE Reputation for CVE-2014-0160https://exchange.xforce.ibmcloud.com/vulnerability/search/CVE-2014-0160
|Access Vector|Affected Platforms|Complexity|Description|Exploitability|Reported|Risk Level|STD Code|Title|Version|
|---|---|---|---|---|---|---|---|---|---|
| Network | OpenSSL OpenSSL 1.0.1A
OpenSSL OpenSSL 1.0.1B
OpenSSL OpenSSL 1.0.1c
OpenSSL OpenSSL 1.0.1D
OpenSSL OpenSSL 1.0.1E
OpenSSL OpenSSL 1.0.1f | Low | OpenSSL could allow a remote attacker to obtain sensitive information, caused by an error in the TLS/DTLS heartbeat functionality. An attacker could exploit this vulnerability to remotely read system memory contents without needing to log on to the server. Successful exploitation could allow an attacker to retrieve private keys, passwords or other sensitive information.
This vulnerability is commonly referred to as "Heartbleed". | Functional | 2014-04-07T00:00:00Z | 5 | CVE-2014-0160
US-CERT VU#720951
BID-66690
SA57347
RHSA-2014-0376
RHSA-2014-0378
SA57692
SA57764
SA57759
SA57758
SA57756
SA57786
SA57755
SA57683
SA57810
SA57386
SA57715
SA57822
SA57833
SA57816
SA57772
SA57799
SA57742
SA57785
SA57805
RHSA-2014-0396
SA57887
SA57858
SA57863
SA57894
SA57881
SA57774
SA57866
SA57884
SA57251
SA57775
SA57890
SA57701
SA57888
SA57738
SA57909
SA57900
SA57853
SA57770
SA57773
SA57735
SA57958
SA57483
SA57744
SA57757
SA57850
SA57876
SA57869
SA57921
SA57920
SA57454
SA57628
SA57793
SA57857
SA57972
SA57970
SA57836
SA57966
SA57968
SA58004
SA58005
SA58028
SA57864
SA57979
SA58032
SA57954
SA57999
SA57763
SA57982
SA58024
SA57824
SA58009
SA58033
SA57974
SA58049
SA58046
SA57817
SA58098
SA58048
SA58040
SA58062
SA57815
SA58102
SA58052
SA57941
SA57807
SA57852
SA58113
SA58107
SA58114
SA58115
SA58008
SA57983
SA57969
SA57961
SA57851
SA57960
SA57789
SA57985
SA57984
SA58056
SA58029
SA57512
SA58164
SA58184
SA57911
SA58183
SA58175
SA58166
SA57951
SA57947
SA58171
SA58178
SA57963
SA58167
SA57949
SA58146
SA58019
SA58172
SA57826
SA58182
SA58244
SA58162
SA58188
SA58185
SA58069
SA58058
SA58148
SA58223
SA58124
SA58204
SA58187
SA58190
SA58161
SA58017
SA58195
SA58053
SA58007
SA58022
SA58176
BID-67206 | OpenSSL heartbeat information disclosure | 2.0 |