Skip to main content

Cyware Orchestrate

Risk IQ External Threats

App Vendor: Risk IQ

Connector Category: Data Enrichment and Threat Intelligence

App Version in Orchestrate: 1.1.1

API Version: 1.0.0

About App

The RiskIQ External Threats app allows Orchestrate to connect with RiskIQ to create and modify events, enforcements, and enrichments. Using RiskIQ, security analysts can detect and eliminate external threats and automate response to phishing pages or domain abuse. RiskIQ External Threats empowers organizations to monitor digital channels and detect advanced threats such as phishing against customers or employees, imposter social media accounts, compromised mobile apps, or any unsanctioned brand usage.

The RiskIQ External Threats app is configured with the Orchestrate application to perform the following actions:

Action

Description

Update Event or Events

This action updates an event or events with a priority, review code, notes, and tags.

List Search Filter Fields

This action lists all the permitted fields for filtering event searches.

List Crawls

This action lists all the crawls in ascending order from the start date.

View Crawl

This action retrieves details of the crawl based on the crawl GUID.

Search Enforcements

This action searches for enforcements using a query string and date filter.

View Enforcement

This action views an enforcement using the enforcement ID.

Search Event

This action searches events in RiskIQ using queries.

Create Social Event

This action creates a social event in RiskIQ.

Create Content Event

This action creates a content event in RiskIQ.

Create Phish Event

This action creates a phishing event in RiskIQ.

Create Domain Infringement Event

This action creates a domain infringement event in RiskIQ.

Query Whois Information

This action queries the Whois information from RiskIQ.

Update Event Phase

This action updates the phase of a particular event in RiskIQ.

Update Event Tag

This action updates the tag of a particular event in RiskIQ.

View Event

This action views the event details based on the event ID.

Configuration Parameters

The following configuration parameters are required for the RiskIQ app to communicate with the RiskIQ enterprise application. The parameters can be configured by creating instances in the app.

Parameter

Description

Field Type

Required/Optional

Comments

API Key

Enter the RiskIQ External Threats API key.

Text

Required

Secret Key

Enter the RiskIQ External Threats secret key.

Password

Required

Action: Update Event or Events

This action updates an event or events with a priority, review code, notes and tags. The Event ID can be retrieved using the Search Events action.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

Event ID List

Enter the list of event IDs to update.

Example:

"event_ids": [ "85844621", "76643567"]

List

Required

Review Code

Enter the review code to assign to events reflecting the review status.

Example:

"Resolved"

Text

Optional

Allowed values:

  • New

  • Review

  • Dismissed

  • Confirmed

  • Enforced

  • Resolved

  • Tenacious

  • Monitor

Event Priority

Enter the priority to assign to the events.

Example:

"MINOR"

Text

Optional

Allowed values:

  • TRIVIAL

  • MINOR

  • MEDIUM

  • MAJOR

  • CRITICAL

Owner

Enter the owner name to assign to events.

Text

Optional

Country

Enter the country to assign to events.

Example:

"USA"

Text

Optional

Tags

Enter the new tags to assign to events as key-value pairs.

Example:

“Content”: “Credit Card”

Key Value

Optional

Note

Enter the note to add to events.

Text

Optional

Example Request

[
    {
        "note": "Test Event",
        "tags": {“Content”: “Credit Card”},
        "country": "USA",
        "event_ids": [
            "85844621"
        ],
        "review_code": "Resolved",
        "event_priority": "MAJOR"
    }
]
Action: List Search Filter Fields

This action lists all the permitted fields for filtering event searches.

Action Input Parameters

This action does not require any input parameters.

Action: List Crawls

This action lists all the crawls in ascending order from the start date. The crawl details includes the associated crawl ID, GUID, projectID, and other crawl details.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

Start Date

Enter the start date in yyyy-MM-dd format to list the crawls from.

Text

Required

End Date

Enter the end date in yyyy-MM-dd format.

Text

Required

Example Request

[
    {
        "end_date": "2021-05-01",
        "start_date": "2021-01-01"
    }
]
Action: View Crawl

This action retrieves details of the crawl based on the crawl GUID. The crawl GUID can be retrieved from the List Crawls action.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

Crawl GUID

Enter the GUID of the crawl to retrieve details for.

Text

Required

Example Request

[
    {
        "crawl_guid": "8cdc3fd5-60c4-4222-b690-4b832e71a54a"
    }
]
Action: Search Enforcements

This action searches enforcements using a query string or date filter.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

Query

Enter the query string to search enforcements.

Example:

"name": "amazonaws.com"

Text

Optional

Earliest Creation Date

Enter the earliest creation date in yyyy-mm-dd format to return the enforcements.

Text

Optional

Number of Results

Enter the number of results to return.

Integer

Optional

Default value:

50

Offset

Enter the offset of the first result returned.

Integer

Optional

Default value:

0

Example Request

[
    {
        "earliest_creation_date": "2015-01-01",
        "offset": "0",
        "results": "50",
        "query": [
           "name": "amazonaws.com"
         ]
    }
]
Action: View Enforcement

This action views the enforcement details using the Enforcement ID, which can be retrieved from Search Enforcement action.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

Enforcement ID

Enter the Enforcement ID to retrieve the corresponding enforcement details.

Integer

Required

Example Request

[
    {
        "enforcement_id": 243121
    }
]
Action: Search Event

This action searches events in RiskIQ using queries or filter strings to display all the event related information such as event name, ID, associated tags, status, and other details.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

Query

Enter the query to search events.

Example:

"status": "New"

Text

Optional

Filter String

Enter the filter for events.

Format:

"<FIELD> <LOGICAL OPERATOR> <VALUE>"

Filters can be joined using "OR" and "AND". "OR" is applied before "AND".

Text

Optional

Number of Results

Enter the number of search results to return.

Example:

10

Integer

Optional

Default value:

50

Offset

Enter the offset of the first result returned.

Example:

1

Integer

Optional

Default value:

0

Example Request

[
   {
      "offset":1,
      "results":10,
      "filter_string":"reviewCode NOT_IN Dismissed,Resolved OR eventType NE BRAND_IN_DOMAIN AND ip IN 127.0.0.1",
      "query": [
         "status": "New"
      ]
   }
]
Action: Create Social Event

This action creates a social event in RiskIQ using the social event URL, review code, priority, and a note.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

URL

Enter the URL of the social event to be logged.

Example:

"https://www.sampledomain.com/test.exampleuser/"

Text

Required

Review Code

Review the status code to assign to the social event.

Example:

"Resolved"

Text

Required

Allowed values:

  • New

  • Review

  • Dismissed

  • Confirmed

  • Enforced

  • Resolved

  • Tenacious

  • Monitor

Event Priority

Assign the priority to to the social event.

Example:

"MAJOR"

Text

Required

Allowed values:

  • TRIVIAL

  • MINOR

  • MEDIUM

  • MAJOR

  • CRITICAL

Note

Add a custom note to the event.

Example:

"This is a test event"

Text

Optional

Example Request

[
    {
        "url": "https://www.sampledomain.com/test.user/",
        "note": "This is a test event",
        "review_code": "Dismissed",
        "event_priority": "Minor"
    }
]
Action: Create Content Event

This action creates a content event in RiskIQ using the URL, status, priority, and notes.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

URL

Enter the URL to be logged.

Example:

"https://www.medium.com"

Text

Required

Review Code

Review the status code to assign to the event.

Example:

"Monitor"

Text

Required

Allowed values:

  • New

  • Review

  • Dismissed

  • Confirmed

  • Enforced

  • Resolved

  • Tenacious

  • Monitor

Event Priority

Assign a priority to the event.

Example:

"MINOR"

Text

Required

Allowed values:

  • TRIVIAL

  • MINOR

  • MEDIUM

  • MAJOR

  • CRITICAL

Note

Add a custom note to the event.

Example:

"This is a test note for the event"

Text

Optional

Example Request

[
    {
        "url": "https://www.medium.com",
        "note": "This is a test note for the event",
        "review_code": "Dismissed",
        "event_priority": "Minor"
    }
]
Action: Create Phish Event

This action creates a phishing event in RiskIQ using the URL, status, priority, and notes.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

URL

Enter the URL of the phishing event to be logged.

Example:

"https://www.g000gle.com"

Text

Required

Review Code

Review the status code to assign to the phish event.

Text

Required

Allowed values:

  • New

  • Review

  • Dismissed

  • Confirmed

  • Enforced

  • Resolved

  • Tenacious

  • Monitor

Event Priority

Assign a priority to the phish event.

Text

Required

Allowed values:

  • TRIVIAL

  • MINOR

  • MEDIUM

  • MAJOR

  • CRITICAL

Note

Add a custom note to the phish event.

Example:

"This is a test note for the phish event"

Text

Optional

Example Request

[
    {
        "url": "https://www.g000gle.com",
        "note": "This is a test note for the phish event",
        "review_code": "Dismissed",
        "event_priority": "Minor"
    }
]
Action: Create Domain Infringement Event

This action creates a domain infringement event in RiskIQ using the domain URL, status, priority, and optional notes.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

Domain

Enter the domain to log an event for domain infringement.

Example:

"http://cyvvare.com"

Text

Required

Review Code

Review the status code to assign to the domain infringement event.

Example:

"Review"

Text

Required

Allowed values:

  • New

  • Review

  • Dismissed

  • Confirmed

  • Enforced

  • Resolved

  • Tenacious

  • Monitor

Priority

Enter the event priority to assign to this event.

Example:

"TRIVIAL"

Text

Required

Allowed values:

  • TRIVIAL

  • MINOR

  • MEDIUM

  • MAJOR

  • CRITICAL

Note

Enter any notes to add to the domain infringement event.

Text

Optional

Example Request

[
    {
        "note": "This is a test",
        "domain": "http://cyvvare.com",
        "review_code": "Dismissed",
        "event_priority": "Minor"
    }
]
Action: Query Whois Information

This action queries Whois information from RiskIQ.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

Domain

Enter the domain to query RiskIQ for.

Example:

"https://www.testdomain.com"

Text

Required

No of results

Enter the number of results to return.

Example:

50

Integer

Optional

Default value:

10

Example Request

[
    {
        "domain": "https://www.cyware.com"
    }
]
Action: Update Event Phase

This action updates the phase of a particular event in RiskIQ using the Event ID. The Event ID can be retrieved using the Search Events action.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

Event ID

Enter the event ID for which the phase must be updated.

Example:

"85844621"

Integer

Required

Review Code

Enter the status code to update the event to.

Example:

"Resolved"

Text

Required

Allowed values:

  • New

  • Review

  • Dismissed

  • Confirmed

  • Enforced

  • Resolved

  • Tenacious

  • Monitor

Example Request

[
    {
        "event_id": 89061670,
        "review_code": "Resolved"
    }
]
Action: Update Event Tag

This action updates the tag of a particular event in RiskIQ using the Event ID. The Event ID can be retrieved using the Search Events action.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

Event ID

Enter the event ID for which the tag must be updated.

Example:

"85844621"

Integer

Required

Tag

Enter the tag along with the value to update. Note, these tags must exist in external threats.

Example:

"eventtype": "item"

Key Value

Required

Example Request

[
    {
        "tags": {
            "Content": "Credit Card"
        },
        "event_id": 89061647
    }
]
Action: View Event

This action views the event corresponding to an event ID with additional summary details about the event such as associated tags, IP details, domain attributes, and other enforcement details. The Event ID can be retrieved using the Search Events action.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

Event ID

Enter the event ID to view all the event related details.

Example:

"85844621"

Integer

Required

Include User Notes

Enter whether to include notes from users in the response.

Boolean

Optional

Default value:

False

Include Classifier Matches

Enter whether to include classifier matches in the response.

Boolean

Optional

Default value:

False

Include Snapshot URL of Event

Enter whether to include a snapshot URL of the event in the response.

Boolean

Optional

Default value:

False

Example Request

[
    {
        "event_id": 85844621,
        "snapshot": true,
        "classifier_matches": true,
        "include_user_notes": true
    }
]