Skip to main content

Cyware Orchestrate

FireEye NX

App Vendor: FireEye NX

App Category: Network Security

App Version in Orchestrate: 2.0.0

API Version: 1.0.0

About App

The FireEye NX app allows security teams to integrate with the FireEye enterprise application to accurately detect and stop advanced, targeted and evasive attacks in the Internet traffic using FireEye Alerts and Reports.

The FireEye NX app is configured with CSOL application to perform the following:

Action Name

Description

Fetch alerts

This action retrieves alerts using filters.

Fetch reports

This action is used to fetch reports from FireEye.

Request event information

This action requests event information from FireEye.

Fetch system appliance configuration

This action retrieves system appliance configuration from FireEye.

Fetch malware artifacts via alert

This action retrieves malware artifacts file using alert ID.

Fetch malware artifacts data via UUID

This action retrieves malware artifacts data using the UUID.

Fetch event list configuration

This action retrieves the default event list configuration from FireEye.

Fetch alert details

This action retrieves alert details using alert ID.

Acknowledge Alert

This action is used to acknowledge an alert.

Configuration parameters

The following configuration parameters are required for the FireEye NX app to communicate with the FireEye NX enterprise application. The parameters can be configured by creating instances in the app.

Parameter

Description

Field Type

Required / Optional

Comments

Base URL

Enter the BaseURL for FireEye NX access.

Example:

<https://<domain.com>

Text

Required

Username

Enter the username for endpoint access.

Text

Required

Password

Enter the password for endpoint access.

Password

Required

Client token

Enter the client token for endpoint access.

Text

Required

Port

Enter the port for endpoint access.

Integer

Required

SSL verification

Optional preference to either verify or skip the SSL certificate verification for endpoint access

Boolean

Optional

Allowed values:

  • true

  • false

By default, the value is false.

Action: Fetch alerts

This action retrieves alerts using filters.

Input Parameters

Parameter

Description

Field Type

Required / Optional

Comments

Query string

Enter the parameters as query strings for filtering results in the form of key-value pairs.

Example:

"id": "10"

Key Value

Optional

Example Request
[
 {
  "params":
  {
   "id": "10"
  }
 }
]
Action: Fetch reports

This action is used to fetch reports from FireEye.

Input Parameters

Parameter

Description

Field Type

Required / Optional

Comments

Report name

Enter the report name.

Example:

"Threat Report"

Text

Required

Params

Enter the parameters in the form of key-value pairs.

Example:

"id": "10"

Key Value

Optional

Filters

Enter the filters.

Key-Value

Optional

Allowed values:

  • time

  • id

Report type

Enter the report type. If the parameter used in filters is "time", then report type is mandatory.

Example:

"empsEmailActivity"

Text

Optional

Example Request
[
 {
  "report_name": "Threat Report",
  "params": 
  {
   "id": "10"
  },
  "filters": 
  {
   "id": 11"
  }
 }
]
Action: Request event information

This action requests event information from FireEye.

Input Parameters

Parameter

Description

Field Type

Required / Optional

Comments

Params

Enter the parameters in the form of key-value pairs.

Key Value

Optional

Allowed values:

  • duration

  • end_time

  • event_type

  • mvx_correlated_only

Example Request
[
 {
  "params": 
  {
   "event_type": "default"
  }
 }
]
Action: Fetch system appliance configuration

This action retrieves system appliance configuration from FireEye.

Input Parameters

No input parameters are required for this action.

Action: Fetch malware artifacts via alert

This action retrieves malware artifacts file using alert ID.

Input Parameters

Parameter

Description

Field Type

Required / Optional

Comments

Alert ID

Enter the alert ID.

Example:

"23"

Integer

Required

Alert type

Enter the alert type.

Example:

"Sample Alert Type"

Text

Required

Example Request
[
 {
  "alert_id": "23",
  "alert_type": "Sample Alert Type"
 }
]
Action: Fetch malware artifacts data via UUID

This action retrieves malware artifacts data via UUID.

Input Parameters

Parameter

Description

Field Type

Required / Optional

Comments

UUID

Enter the UUID.

Example:

"0bxxxx0b0-0b0b0b-0b0b-0b0b-0b0xxxxxb"

Text

Required

Example Request
[
 {
  "uuid": "0b0b0b0b0-0b0b0b-0b0b-0b0b-0b0b0b0b0b"
 }
]
Action: Fetch event list configuration

This action retrieves the default event list configuration from FireEye.

Input Parameters

Parameter

Description

Field Type

Required / Optional

Comments

Event type

Enter the event type.

Example:

"Sample Event"

Text

Optional

Default value:

  • default

Example Request
[
 {
  "event_type": "Sample Event"
 }
]
Action: Fetch alert details

his action retrieves alert details using alert ID.

Input Parameters

Parameter

Description

Field Type

Required / Optional

Comments

Alert ID

Enter the Alert ID.

Example:

"23"

Integer

Required

Example Request
[
 {
  "alert_id": "23"
 }
]
Action: Acknowledge Alert

This action is used to add an acknowledgment to an alert.

Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

Alert ID

Enter the unique ID of the alert to acknowledge.

Example:

"26"

Integer

Optional

Annotation

Enter an annotation to better explain the acknowledgment.

Example:

"Sample Annotation"

Text

Optional

Alert Type

Specify the alert type of the alert.

Example:

"Malware Object"

Text

Optional

Example Request
{
    "alert_id": "26",
    "annotation": "Sample Annotation",
    "alert_type": "Malware Object"
}