Skip to main content

Cyware Orchestrate

Intel 471

App Vendor: Intel 471

App Category: Data Enrichment & Threat Intelligence

Connector Version: 1.0.0

API Version: 1.0.0

About App

The Intel 471 app integrates with Intel 471, a service focused on provisioning of high fidelity and timely indicators feed with rich context, TTP information and malware intelligence reports. It is made to be operationalized easily out of the box within a customer's environment and is accessible via an online portal, restful API and third-party integrations.

The Intel 471 app is configured with the Orchestrate application to perform the following actions:

Action Name

Description

Detailed Vulnerability Info

This action retrieves the detailed information for a vulnerability.

Fetch Actor

This action fetches the actor details.

Fetch Entity

This action retrieves the entity.

Fetch IOC

This action retrieves the IOCs.

Fetch Malware Indicator

This action retrieves the indicators of a particular malware.

Fetch Malware Intel

This action retrieves the malware intel.

Fetch Malware NIDS

This action retrieves the NIDs.

Fetch Malware Yara

This action retrieves the Yara data for the malware.

Fetch Vulnerability Search

This action performs a vulnerability search.

Global Search

This action returns the results matching the filter criteria such as IOC, vulnerabilities, and so on.

Configuration Parameters

The following configuration parameters are required for the Intel 471 app to communicate with the Intel 471 enterprise application. The parameters can be configured by creating instances in the app.

Parameter

Description

Field Type

Required/Optional

Comments

Base URL

Enter the base URL.

Example:

"https://example.com"

Text

Required

Username

Enter the username.

Text

Required

API Key

Enter the API key.

Password

Required

Verify

Choose to verify.

Boolean

Optional

Allowed values:

  • True

  • False

Action: Detailed Vulnerability Info

This action retrieves the detailed information for a vulnerability.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

UID

Enter the UID.

Example:

"e7fafbb8f44a6ded005c154976627da4"

Text

Required

Action: Fetch Actor

This action retrieves the actor details.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

Actor

Enter the actor name.

Example:

"testactor"

Text

Required

From time

Enter the 'from' time, based on which the search results starting from the given creation time are returned. The format can be long unix time or string time range.

Text

Optional

Allowed values:

  • 1569314472407

  • 24hours

  • 1day

Until

Enter the 'until' time, based on which the search results are returned. The format can be long unix time or string time range.

Text

Optional

Allowed values:

  • 1569314472407

  • 24hours

  • 1day

Last updated from

Enter the 'last updated from' time, based on which the search results are returned. The format can be long unix time or string time range.

Text

Optional

Allowed values:

  • 1569314472407

  • 24hours

  • 1day

Last updated until

Enter the 'last updated until' time, based on which the search results are returned. The format can be long unix time or string time range.

Text

Optional

Allowed values:

  • 1569314472407

  • 24hours

  • 1day

Count

Enter the count.

Example:

100

Text

Optional

Sort

Enter the sort criteria.

Text

Optional

Allowed values:

  • relevance

  • earliest

  • latest

Pretty print

Select an option for pretty print.

Boolean

Optional

Action: Fetch Entity

This action retrieves the entity.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

Entity

Enter the entity.

Example:

"syntax"

Text

Required

From time

Enter the 'from' time, based on which the search results starting from the given creation time are returned. The format can be long unix time or string time range.

Text

Optional

Allowed values:

  • 1569314472407

  • 24hours

  • 1day

Until

Enter the 'until' time, based on which the search results are returned. The format can be long unix time or string time range.

Text

Optional

Allowed values:

  • 1569314472407

  • 24hours

  • 1day

Last updated from

Enter the 'last updated from' time, based on which the search results are returned. The format can be long unix time or string time range.

Text

Optional

Allowed values:

  • 1569314472407

  • 24hours

  • 1day

Last updated until

Enter the 'last updated until' time, based on which the search results are returned. The format can be long unix time or string time range.

Text

Optional

Allowed values:

  • 1569314472407

  • 24hours

  • 1day

Count

Enter the count.

Example:

100

Text

Optional

Sort

Enter the sort.

Example:

"relevance"

Text

Optional

Allowed values:

  • relevance

  • earliest

  • latest

Pretty print

Select an option for pretty print.

Boolean

Optional

Action: Fetch IOC

This action retrieves the Indicators of Compromise.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

IOC

Enter the IOC to be searched for.

Example:

malicious@domain.com

Text

Required

Sort

Sort results by relevance or activity start time.

Example:

"relevance"

Text

Optional

Allowed values:

  • relevance

  • earliest

  • latest

From time

Enter the 'from' time, based on which the search results starting from the given creation time are returned. The format can be long unix time or string time range.

Text

Optional

Allowed values:

  • 1569314472407

  • 24hours

  • 1day

Until

Enter the 'until' time, based on which the search results are returned. The format can be long unix time or string time range.

Text

Optional

Allowed values:

  • 1569314472407

  • 24hours

  • 1day

Last updated from

Enter the 'last updated from' time, based on which the search results are returned. The format can be long unix time or string time range.

Text

Optional

Allowed values:

  • 1569314472407

  • 24hours

  • 1day

Last updated until

Enter the 'last updated until' time, based on which the search results are returned. The format can be long unix time or string time range.

Text

Optional

Allowed values:

  • 1569314472407

  • 24hours

  • 1day

Count

Enter the count.

Example:

100

Text

Optional

Pretty print

Select the option for pretty print.

Boolean

Optional

Allowed values:

  • True

  • False

Action: Fetch Malware Indicator

This action retrieves indicators of a particular malware.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

Malware family

Enter the malware family.

Example:

"azorult"

Text

Optional

Indicator type

Search indicators by type.

Example:

"ipv4"

Text

Optional

Allowed values:

  • directory

  • domain

  • file

  • ipv4

  • ipv6

  • mutex

  • url

  • windows_registry_key

Threat type

Enter the threat type.

Example:

"malware"

Text

Optional

Allowed values:

  • malware

  • bulletproof_hosting

  • proxy_service

Indicator

Enter the indicator.

Example:

"example@domain.com"

Text

Optional

Confidence

Enter the confidence.

Example:

"low"

Text

Optional

Allowed values:

  • High

  • Medium

  • Low

From time

Enter the 'from' time, based on which the search results starting from the given creation time are returned. The format can be long unix time or string time range.

Text

Optional

Allowed values:

  • 1569314472407

  • 24hours

  • 1day

Until

Enter the 'until' time, based on which the search results are returned. The format can be long unix time or string time range.

Text

Optional

Allowed values:

  • 1569314472407

  • 24hours

  • 1day

Last updated from

Enter the 'last updated from' time, based on which the search results are returned. The format can be long unix time or string time range.

Text

Optional

Allowed values:

  • 1569314472407

  • 24hours

  • 1day

Last updated

Enter the 'last updated until' time, based on which the search results are returned. The format can be long unix time or string time range.

Text

Optional

Allowed values:

  • 1569314472407

  • 24hours

  • 1day

Count

Enter the count.

Example:

100

Text

Optional

Sort

Enter the sort value.

Example:

"latest"

Text

Optional

Allowed values:

  • relevance

  • earliest

  • latest

Pretty print

Select an option for pretty print.

Boolean

Optional

Action: Fetch Malware Intel

This action retrieves malware intel.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

Malware family

Enter the malware family.

Example:

"azorult"

Text

Optional

Event

Enter the event.

Example:

"syntax"

Text

Optional

Event type

Enter the event type.

Example:

"download_execute"

Text

Optional

Allowed values:

  • download_execute

  • download_plugin

  • exfiltrate_data

  • webinject

Threat type

Enter the threat type.

Example:

"malware"

Text

Optional

Allowed values:

  • malware

  • bulletproof_hosting

  • proxy_service

From time

Enter the 'from' time, based on which the search results starting from the given creation time are returned. The format can be long unix time or string time range.

Text

Optional

Allowed values:

  • 1569314472407

  • 24hours

  • 1day

Until

Enter the 'until' time, based on which the search results are returned. The format can be long unix time or string time range.

Text

Optional

Allowed values:

  • 1569314472407

  • 24hours

  • 1day

Last updated from

Enter the 'last updated from' time, based on which the search results are returned. The format can be long unix time or string time range.

Text

Optional

Allowed values:

  • 1569314472407

  • 24hours

  • 1day

Last updated until

Enter the 'last updated until' time, based on which the search results are returned. The format can be long unix time or string time range.

Text

Optional

Allowed values:

  • 1569314472407

  • 24hours

  • 1day

Count

Enter the count.

Example:

100

Text

Optional

Sort

Enter the sort value.

Text

Optional

Allowed values:

  • relevance

  • earliest

  • latest

Pretty print

Select an option for pretty print.

Boolean

Optional

Action: Fetch Malware NIDS

This action fetches the NIDS.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

Malware family

Enter the malware family name.

Example:

"azorult"

Text

Optional

NIDS

Enter the NIDS.

Text

Optional

Nids type

Enter the NIDs type.

Text

Optional

Threat type

Enter the threat type.

Text

Optional

Confidence

Enter the confidence.

Example:

"Low"

Text

Optional

Allowed values:

  • High

  • Medium

  • Low

From time

Enter the 'from' time, based on which the search results starting from the given creation time are returned. The format can be long unix time or string time range.

Text

Optional

Allowed values:

  • 1569314472407

  • 24hours

  • 1day

Until

Enter the 'until' time, based on which the search results are returned. The format can be long unix time or string time range.

Text

Optional

Allowed values:

  • 1569314472407

  • 24hours

  • 1day

Last updated from

Enter the 'last updated from' time, based on which the search results are returned. The format can be long unix time or string time range.

Text

Optional

Allowed values:

  • 1569314472407

  • 24hours

  • 1day

Last updated until

Enter the 'last updated until' time, based on which the search results are returned. The format can be long unix time or string time range.

Text

Optional

Allowed values:

  • 1569314472407

  • 24hours

  • 1day

Count

Enter the count.

Example:

100

Text

Optional

Sort

Enter the sort value.

Example:

"latest"

Text

Optional

Allowed values:

  • relevance

  • earliest

  • latest

Pretty print

Select an option to pretty print.

Boolean

Optional

Action: Fetch Malware Yara

This action retrieves Yara information for the malware.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

Malware family

Enter the malware family.

Example:

"azorult"

Text

Optional

Yara

Enter the Yara.

Text

Optional

Threat type

Enter the threat type.

Example:

"proxy_service"

Text

Optional

Allowed values:

  • malware

  • bulletproof_hosting

  • proxy_service

Confidence

Enter the confidence.

Example:

"Medium"

Text

Optional

Allowed values:

  • High

  • Medium

  • Low

From time

Enter the 'from' time, based on which the search results starting from the given creation time are returned. The format can be long unix time or string time range.

Text

Optional

Allowed values:

  • 1569314472407

  • 24hours

  • 1day

Until

Enter the 'until' time, based on which the search results are returned. The format can be long unix time or string time range.

Text

Optional

Allowed values:

  • 1569314472407

  • 24hours

  • 1day

Last updated from

Enter the 'last updated from' time, based on which the search results are returned. The format can be long unix time or string time range.

Text

Optional

Allowed values:

  • 1569314472407

  • 24hours

  • 1day

Last updated until

Enter the 'last updated until' time, based on which the search results are returned. The format can be long unix time or string time range.

Text

Optional

Allowed values:

  • 1569314472407

  • 24hours

  • 1day

Count

Enter the count.

Example:

100

Text

Optional

Sort

Sort results by relevance or activity start time.

Example:

"latest"

Text

Optional

Allowed values:

  • relevance

  • earliest

  • latest

Pretty print

Select an option for pretty print.

Boolean

Optional