Skip to main content

Intezer - Analyze File and URL

This Playbook is part of the Intezer Pack.#

Supported versions

Supported Cortex XSOAR versions: 6.5.0 and later.

Analyze Files and URLs on Intezer Analyze.


This playbook uses the following sub-playbooks, integrations, and scripts.


  • GenericPolling
  • Calculate Severity - Generic v2


  • Intezer v2


This playbook does not use any scripts.


  • intezer-analyze-by-file
  • intezer-analyze-url
  • intezer-get-latest-report

Playbook Inputs#

NameDescriptionDefault ValueSourceRequired
FileA file object that represents an email attachment.ContextOptional
URLThe URL object.ContextOptional
IntervalHow often the polling command should run (in minutes).1-Required
TimeoutThe amount of time to wait before a timeout occurs (in minutes).15-Required

Playbook Outputs#

File.Malicious.VendorFor malicious files, the vendor that made the decisionstring
File.MetadataMetadata returned from Intezer analysis (analysis id, analysis url, family, family type, sha256, verdict, sub_verdict). Metadata will be returned only for supported files.unknown
File.ExistsInIntezerDoes the file exists on intezer genome databaseboolean
URL.Malicious.VendorFor malicious Url, the vendor that made the decisionstring
URL.MetadataMetadata returned from Intezer analysisunknown
URL.ExistsInIntezerDoes the url exists on intezerboolean
DBotScoreThe DBotScore object.unknown
DBotScore.IndicatorThe indicator that was tested.string
DBotScore.TypeThe indicator type.string
DBotScore.VendorThe vendor used to calculate the score.string
DBotScore.ScoreThe actual score.number

Playbook Image#