ParseHTMLIndicators
Common Scripts Pack.#
This Script is part of theSupported versions
Supported Cortex XSOAR versions: 5.5.0 and later.
This script will extract indicators from given HTML and will handle bad top-level domains to avoid false positives caused by file extensions.
#
Script DataName | Description |
---|---|
Script Type | python3 |
Tags | |
Cortex XSOAR Version | 5.5.0 |
#
Used InThis script is used in the following playbooks and scripts.
- Kaseya VSA 0-day - REvil Ransomware Supply Chain Attack
#
InputsArgument Name | Description |
---|---|
url | The full URL of the blog |
exclude_indicators | The indicators to be excluded from the results. |
exclude_TLD | Top-Level-Domain to be excluded from domain indicators. |
unescape_domain | Whether to remove brackets [] from the domain regex extraction. Can result in higher false positives for file extensions. |
#
OutputsPath | Description | Type |
---|---|---|
http.parsedBlog.indicators | The extracted indicators | Unknown |
http.parsedBlog.sourceLink | The link for the source of the indicators | Unknown |