Skip to main content

Cyware Orchestrate

Recorded Future

App Vendor: Recorded Future

App Category: Data Enrichment & Threat Intelligence

Connector Version: 1.2.1

API Version: 2.0.0

About App

Recorded Future is a global real-time cyber threat intelligence provider, to dynamically categorize, link, and analyze intelligence in real-time and deliver easy-to-consume insights for proactively reducing risk. The Recorded Future app allows security teams to integrate with the Recorded Future enterprise application to search for threats and lookup endpoints.

The Recorded Future app is configured with the Orchestrate application to perform the following actions:

Action Name

Description

Credentials Lookup

This action looks up credential data for a set of subjects.

Credentials Search

This action searches credential data for a set of domains.

Domain Lookup

This action looks up threat intel information for a domain.

Entity Match

This action finds the entity ID based on the entity name.

Get Malware Statistics

This action returns malware family statistics.

Hash Lookup

This action looks up threat intel for a hash.

Incident Report

This action provides an exposure incident report for a single malware log.

IOC Lookup - SOAR

This action looks up multiple IOCs including IP addresses, URLs, domains, hashes, and vulnerabilities.

IP Address Lookup

This action looks up threat intel for an IP address.

Lookup risk context

This action looks up the risk context and retrieves a list of all context names.

Password Lookup

This action looks up passwords for exposure.

Search Alert by ID

This action searches an alert by unique ID.

Search Alert Notification

This action searches alert notifications to get details such as assignee, note author, status, and so on.

Search Alert Rules

This action searches alert rules using free text.

Search Dump Metadata

This action searches dump metadata for given names.

Search entity list by ID

This action searches the entity list with the unique ID.

Search entity lists

This action searches the entity list with free text.

Search Malware

This action searches for malware.

Search Vulnerability

This action searches for a vulnerability.

Triage IOCs

This action is used to triage multiple IOCs and set the threshold value.

URL Lookup

This action looks up threat intel for a URL.

Generic Action

This is a generic action to perform any additional use case on Recorded Future.

Configuration Parameters

The following configuration parameters are required for the Recorded Future app to communicate with the Recorded Future enterprise application. The parameters can be configured by creating instances in the app.

Parameter

Description

Field Type

Required/Optional

Comments

API Token 

Enter the API token.

Password

Required

Verify

Choose your preference to verify SSL or TLS while making requests. It is recommended to set this option to yes. Passing no may result in incorrectly establishing the connection.

Boolean

Optional

By default, verification is not enabled.

Timeout

Enter the timeout value in seconds. This is the number of seconds that requests will wait to establish a connection with Recorded Future.

Integer

Optional

Allowed range:

15-120

Default value:

15

Domain

Enter the domain value.

Text

Optional

Action: Credentials Lookup

This action is used to look up credential data for a set of subjects.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

Subjects

Enter the list of subjects.

List

Optional

Filter

Enter the filters in JSON format.

Any

Optional

Available keys:

malware_families, authorization_protocols, username_properties

Organization ID

Enter the organization ID.

Text

Optional

Extra Data

Enter additional data to be added in the payload JSON.

Any

Optional

Action: Domain Lookup

This action looks up threat intel information for a domain.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

Domain

Enter the domain.

Text

Required

Metadata

Optional preference to add metadata to the response.

Boolean

Optional

Allowed values:

  • true

  • false

Default value: false

Action: Entity Match

This action is used to find the entity ID based on the entity name.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

Name

Enter the entity name.

Text

Required

Type

Enter the entity type.

List

Optional

Limit

Enter the limit.

Integer

Optional

Default value:

10

Action: Get Malware Statistics

This action is used to return malware family statistics.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

Limit

Specify the maximum number of results to return.

Integer

Optional

Default value:

10

Action: Hash lookup

This action looks up threat intel for a hash.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

Hash

Enter the hash value.

Text

Required

Metadata

Optional preference to either include or exclude metadata.

Boolean

Optional

Allowed values:

  • true

  • false

Default value: false

Action: Incident Report

This action provides an exposure incident report for a single malware log.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

Source Malware Log

Enter the malware log to retrieve the data.

Text

Required

Action: IOC Lookup - SOAR

This action looks up multiple IOCs including IP addresses, URLs, domains, hashes, and vulnerabilities.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

IP Address

Enter the IP addresses in a list.

List

Optional

URL

Enter the URLs in a list.

List

Optional

Domain

Enter the domains in a list.

List

Optional

Hash

Enter the hashes in a list.

List

Optional

Vulnerability

Enter the vulnerabilities in a list.

List

Optional

Metadata

Optional preference to either include or exclude metadata.

Boolean

Optional

Allowed values:

  • true

  • false

Default value: false

Action: IP Address Lookup

This action looks up threat intel for an IP address.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

IP Address

Enter the IP address.

Text

Required

Metadata

Optional preference to either include or exclude metadata.

Boolean

Optional

Allowed values:

  • true

  • false

Default value: false

Action: Lookup Risk Context

This action looks up the risk context and retrieves a list of all context names.

Action Input Parameters

This action does not require any input parameter.

Action: Password Lookup

This action looks up passwords for exposure.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

Hash Type

Enter the hash type. 

Example: 

  • SHA1

  • SHA256

Text

Required

 

Hash Value

Enter the hash value. 

Example: 

"7c33e832cb0eb2610c8d3bf603bde1e986c6ea7d"

Text

Required

 

Action: Search Alert by ID

This action searches an alert by unique ID.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

Unique ID

Enter the unique ID.

Text

Required

Action: Search Alert Notification

This action searches alert notifications to get details such as assignee, note author, status, and so on.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

Free Text

Enter the free text.

Text

Optional

Limit

Enter the limit of results to return.

Integer

Optional

Additional Parameters

Enter the additional parameters.

Key Value

Optional

Action: Search Alert Rules

This action searches alert rules using free text.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

Free Text

Enter the free text.

Text

Optional

Limit

Enter the limit of results to return.

Integer

Optional

Action: Search Dump Metadata

This action searches dump metadata for given names.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

Names

Enter the list of names.

List

Required

 

Limit

Specify the maximum number of results to return.

Integer

Optional

Default value:

10

Action: Search Entity List by ID

This action searches the entity list with the unique ID.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

Unique ID

Enter the unique ID for the entity list.

Text

Required

Action: Search Entity Lists

This action searches the entity list with free text.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

Free Text

Enter the free text.

Text

Optional

Limit

Enter the limit.

Integer

Optional

Default value: 10

Metadata

Optional preference to either include or exclude metadata.

Boolean

Optional

Allowed values:

  • true

  • false

Default value: false

Action: Search Malware

This action searches for malware.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

Free Text

Enter the free text to search the malware information.

Text

Optional

Extra Params

Enter the extra parameters.

Key Value

Optional

Metadata

Optional preference to either include or exclude metadata.

Boolean

Optional

Allowed values:

  • true

  • false

Default value: false

Action: Search Vulnerability

This action searches for a vulnerability.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

Free Text

Enter the free text value.

Text

Optional

Meta data

Optional preference to either include or exclude metadata.

Boolean

Optional

Allowed values:

  • true

  • false

Default value: false

Limit

Enter the limit for the number of results.

Integer

Optional

Default value: 10

Extra Params

Enter the extra parameters.

Key Value

Optional

Allowed values:

  • from

  • riskscore

  • cvssscore

  • cvssv3score

  • product

  • firstseen

  • lastseen

  • list

  • riskrule

  • orderby

  • direction

  • comment

Action: Triage IOCs

This action is used to triage multiple IOCs and set the threshold value.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

Context Name

Enter the context name to determine a verdict.

Text

Required

Threshold Value

Enter the threshold value to determinate the verdict.

Integer

Optional

IP Address

Enter the IP addresses in a list.

List

Optional

URL

Enter the URLs in a list.

List

Optional

Domain

Enter the domains in a list.

List

Optional

Hash

Enter the hashes in a list.

List

Optional

Allowed values:

  • md5

  • sha-1

Vulnerability

Enter the vulnerabilities in a list.

List

Optional

Metadata

Optional preference to either include or exclude metadata.

Boolean

Optional

Allowed values:

  • true

  • false

Default value: false

Additional Parameters

Enter the additional parameters.

Key Value

Optional

Action: URL Lookup

This action looks up threat intel for a URL.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

URL

Enter the URL.

Text

Required

Metadata

Optional preference to either include or exclude metadata.

Boolean

Optional

Allowed values:

  • true

  • false

Default value: false

Action: Generic Action

This is a generic action used to make requests to any Recorded Future endpoint.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

Version

Enter the version.

Text

Required

Allowed values:

v1,v2

Endpoint

Enter the endpoint.

Example:

/identity/metadata/dump/search

Text

Required

Method

Enter the HTTP method to make the request.

Text

Required

Allowed values:

GET, PUT, POST, DELETE

Payload JSON

Enter the payload JSON.

Example:

{'format': 'json'}

Key Value

Optional

Query Params

Enter the query params.

Example:

{'format': 'json'}

Key Value

Optional

Headers

Enter the header.

Example:

{'content-type':'application/json'}

Key Value

Optional