Skip to main content

Cyware Orchestrate

FireEye Email Security (EX)

App Vendor: FireEye

App Category: Forensics & Malware Analysis

Connector Version: 1.0.0

API Version: 1.1.0

About App

FireEye EX is a secure gateway with an advanced email protection that can detect threats as the detection engines inspect suspicious email traffic to identify attacks that evade traditional signature- and policy-based defenses. The FireEye EX app allows security teams to integrate with the FireEye Email Security (EX Series) application. This helps security analysts in analyzing emails through the related actions and successfully quarantining spear-phishing emails used in advanced targeted attacks.

The FireEye Email Security (EX) app is configured with the Orchestrate application to perform the following actions:

Action Name

Description

Fetch Alert Acknowledgement

This action retrieves acknowledgement of an alert.

Fetch Alert Details

This action retrieves details of an alert using the alert ID.

Fetch Alerts

This action retrieves the alert details.

Fetch Malware Artifact data by UUID

This action retrieves malware artifact data by UUID.

Fetch Malware Artifacts by Alert ID

This action retrieves malware artifacts by using alert ID.

Fetch Reports

This action retrieves the reports.

Fetch System Appliance Configuration

This action retrieves the configuration of the system appliance.

Fetch Yara Rule Lists

This action retrieves a list of Yara rules.

Configuration Parameters

The following configuration parameters are required for the FireEye Email Security (EX) app to communicate with the FireEye Email Security (EX) enterprise application. The parameters can be configured by creating instances in the app.

Parameter

Description

Field Type

Required/Optional

Comments

Base URL

Enter the base URL.

Example:

"https://api.fireeyesampledomain.com/token"

Text

Required

Username

Enter the username to access the FireEye EX endpoints.

Text

Required

Password

Enter the password to access the FireEye EX endpoints.

Password

Required

Client Token

Enter the client token to access the FireEye EX endpoints.

Password

Required

Port

Enter the port number to access the FireEye EX endpoints.

Text

Required

SSL verification

Optional preference to either verify or skip the SSL certificate verification.

Text

Optional

Allowed values:

  • True

  • False

Default value:

False

Action: Fetch Alert acknowledgement

This action retrieves acknowledgement for the alert.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

Alert ID

Enter the alert ID.

Example:

"76345119800"

Text

Required

Annotation

Enter the annotation.

Example

"discovered by john doe"

Text

Required

Alert type

Enter the alert type.

Example:

"malware object"

Text

Required

Example Request

[
   {
      "alert_id":", "76345119800",
      "annotation":"Discovered by John Doe",
      "alert_type":"Malware Object"
   }
]
Action: Fetch Alert details

This action retrieves details of an alert using the alert ID.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

Alert ID

Enter the alert ID to fetch the alert details.

Example:

"76345119800"

Text

Required

You can retrieve the Alert ID using the Fetch Alerts action.

Example Request

[
   {
      "alert_id":"76345119800"
   }
]
Action: Fetch Alerts

This action retrieves the alert details.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

Query string

Enter the parameters as a query string in the form of key-value pairs to filter the search results.

Example:

sample key: sample value

Key Value

Optional

Example Request

[
   {
      "params":{
         "<Sample Key>":"<Sample Value>"
      }
   }
]
Action: Fetch Malware Artifact data by UUID

This action retrieves the malware artifact data by UUID.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

UUID

Enter the UUID.

Example:

4186

Text

Required

Example Request

[
   {
      "uuid":"4186"
   }
]
Action: Fetch Malware Artifacts by Alert ID

This action retrieves the malware artifacts by using alert ID.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

Alert ID

Enter the alert ID.

Example:

"76345119800"

Text

Required

You can retrieve the Alert ID using the Fetch Alerts action.

Alert Type

Enter the alert type.

Example:

"malware object"

Text

Required

Example Request

[
   {
      "alert_id":"76345119800",
      "alert_type":"Malware Object"
   }
]
Action: Fetch reports

This action retrieve reports.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

Report Name

Enter the report name.

Example:

"Report123"

Text

Required

Parameters

Enter the parameters.

Example:

sample parameters

Text

Optional

Filters

Enter the filters. By default, the value is time.

Example:

ID

Text

Optional

Report type

Enter the report type. If the filter includes time, then the report type is mandatory.

Example:

CSV

Text

Optional

Example Request

[
   {
      "report_name":"Report123",
      "params":"<Sample parameters>",
      "filters":"ID"
   }
]
Action: Fetch System Appliance configuration

This action retrieves the configuration of the system appliance.

Action Input Parameters

This action does not require any input parameter.

Action: Fetch Yara rule lists

This action retrieves a list of Yara rules.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

Yara type

Enter the Yara type.

Example:

pdf

Text

Optional

Parameters

Enter the parameters.

Example:

key-value

Key Value

Optional

Example Request

[
   {
      "yara_type":"pdf",
      "params":{
         "<Sample key>":"<Sample value>"
      }
   }
]