Skip to main content

Cyware Orchestrate

KELA

App Vendor: KELA

App Category: Data Enrichment & Threat Intelligence

Connector Version: 1.2.0

API Version: 1.0.0

About App

The KELA monitoring app delivers real-time threat intelligence from the dark web, helping security teams identify risks and respond swiftly.

The KELA app is configured with Orchestrate to perform the following actions:

Action Name

Description

Get Botnet Incidents from Monitor 

This action retrieves botnet incidents for a specific monitor.

Get Daily Highlights from Threat Landscape 

This action retrieves the daily highlights provided by KELA’s analysts.

Get Data from Investigate 

This action retrieves details of the specified data type.

Get Incident Data from Monitor 

This action retrieves the data of an incident based on the specified ID.

Get Incidents List by Incident Type from Monitor 

This action lists the incidents based on the specified ID.

Get Latest Cybercrime Observables Detection from Technical Intelligence 

This action would provide the latest updated detections in batches of 100 - without any filter or limitation.

Get Leaked Credential Incidents from Monitor 

This action retrieves leaked credential incidents for a specific monitor.

Get Network Vulnerability Incidents from Monitor 

This action retrieves network vulnerability incidents for a specific monitor.

Get Saved Query from Investigate 

This action retrieves the actual details of a saved query.

Get User License from Investigate 

This action retrieves your license information.

List Aggregations from Monitor 

This action lists the specified monitor’s aggregation.

List Data Counters from Investigate 

This action retrieves the list of data types along with the count of results for each type.

List Incidents from Monitor 

This action lists the incidents based on the specified ID.

List Saved Queries from Investigate 

This action lists all your current saved queries.

Request for Information in Monitor 

This action requests an RFI inquiry to KELA.

Scroll Incidents in Monitor 

This action retrieves the next bulk of incidents using the scroll ID.

Search Data in Investigate 

This action searches for a specific data type.

Search Pagination in Investigate 

This action navigates through limited search results to access larger data sets.

Update Incident Properties in Monitor 

This action updates the status of the specified incident.

Generic Action 

This is a generic action to perform any additional use case on Kela.

Configuration Parameters

The following configuration parameters are required for the Kela app to communicate with the Kela enterprise application. The parameters can be configured by creating instances in the app.

Parameter

Description

Field Type

Required/Optional

Comments

API Token 

Enter the API token to authenticate the client.

Password

Required

Timeout

Enter the timeout value in seconds. This is the number of seconds that requests will wait to establish a connection with KELA.

Integer

Optional

Allowed Range:

15-120

Default value:

15

Verify

Choose your preference to verify SSL or TLS while making requests. It is recommended to set this option to yes. Passing no may result in incorrectly establishing the connection.

Boolean

Optional

By default, verification is not enabled.

Action: Get Botnet Incidents from Monitor

This action retrieves botnet incidents for a specific monitor.

Action Input Parameters 

Parameter 

Description 

Field Type 

Required/Optional 

Comments 

From Date 

Enter the start date to retrieve incidents from.

Example:

1685452480

Integer

Optional

To Date 

Enter the end date to retrieve incidents.

Example:

1685452481

Integer

Optional

Limit 

Enter the maximum number of incidents to return in the response.

Integer

Optional

Default value:

20

Maximum allowed value:

1000

Monitor ID

Enter the monitor ID.

Text

Required

Example Request 

[
  {
    "limit": "20",
    "to_date": "2147483647",
    "from_date": "0",
    "monitor_id": "5968"
  }
]
Action: Get Daily Highlights from Threat Landscape

This action retrieves the daily highlights provided by KELA’s analysts.

Action Input Parameters

No input parameters are required for this action.

Action: Get Data from Investigate

This action retrieves details of the specified data type.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

ID

Enter the ID of the data to retrieve its details.

Text

Required

You can retrieve this using the action Search Data in Investigate.

Type

Enter the data type for which you want to retrieve details. 

Text

Required

Allowed values:

hacking_discussions, instant_messaging, breached_servers, intelligence_reports

[
  {
    "id": "36fa223a89b891381c2d8f04936f0a50",
    "type": "intelligence_reports"
  }
]
Action: Get Incident Data from Monitor

This action retrieves the data of an incident based on the specified ID.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

Incident ID

Enter the incident ID to retrieve its details.

Text

Required

You can retrieve this using the action List Incidents from Monitor.

Monitor ID

Enter the monitor ID to query.

Text

Required

Example Request

[
  {
    "monitor_id": "5968",
    "incident_id": "837a6b00a7184228982ad7a57085b65c-demo"
  }
]
Action: Get Incidents List by Incident Type from Monitor

This action lists the incidents based on the specified ID.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

Incident Type

Enter the type of incident.

Text

Required

Allowed values:

leaked_credentials, botnets, network_vulnerabilities,reports, credit_cards, dld_source_codes, instant_messaging, hacking_discussions

Monitor ID

Enter the ID of the monitor to query.

Text

Required

Additional Parameters

Enter additional parameters to send with the request.

Key value

Optional

Allowed keys:

text, limit, to_date, from_date, severities, first_appearance

Action: Get Latest Cybercrime Observables Detection from Technical Intelligence

This action would provide the latest updated detections in batches of 100 - without any filter or limitation.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

Filters

Enter the filters to narrow down the results.

Example:

{"observable_type": ["IP"],"posted_from_date": "1680072075809"}

Key_Value

Optional

Sort

Enter to sort the data.

Example:

{"order_by": "posted_date","order_type": "desc"}

Key_Value

Optional

Pagination

Enter the pagination value.

Example:

{'skip':20}

Key_Value

Optional

Action: Get Leaked Credential Incidents from Monitor

This action retrieves leaked credential incidents for a specific monitor.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

From Date

Enter the start date to retrieve incidents from.

Example:

1685452480

Integer

Optional

To Date

Enter the end date to retrieve incidents.

Example:

1685452481

Integer

Optional

Limit

Enter the maximum number of incidents to return in the response.

Example:

50

Integer

Optional

Default value:

20

Maximum allowed value:

1000

Example Request

[
   {
      "from_date":1685452480,
      "to_date":1685452481,
      "offset":50
   }
]
Action: Get Network Vulnerability Incidents from Monitor

This action retrieves network vulnerability incidents for a specific monitor.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

From Date

Enter the start date to retrieve incidents from.

Example:

1685452480

Integer

Optional

To Date

Enter the end date to retrieve incidents.

Example:

1685452481

Integer

Optional

Limit

Enter the maximum number of incidents to return in the response.

Example:

50

Integer

Optional

Default value:

20

Maximum allowed value:

1000

Example Request

[
   {
      "from_date":1685452480,
      "to_date":1685452481,
      "offset":50
   }
]
Action: Get Saved Query from Investigate

This action retrieves the actual details of a saved query.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

ID

Enter the ID of the saved query.

Text

Required

You can retrieve this using the action List Saved Queries from Investigate.

Example Request

[
  {
    "id": "46d302d067ee0c361f1228bbf06291d6793eee86125a5a24d1ad1c2c1850b10d"
  }
]
Action: Get User License from Investigate

This action retrieves your license information.

Action Input Parameter

No input parameters are required for this action.

Action: List Aggregations from Monitor

This action lists the specified monitor’s aggregation.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

Monitor ID

Enter the ID of the monitor to query.

Text

Required

Extra Params

Enter any extra params to filter the response.

Example:

filter: SCIM Filter, limit: 10

Key Value

Optional

Allowed keys:

limit, severities, identifier, tags, categories, start_date, end_date

Example Request

[
  {
    "monitor_id": "5968"
  }
]
Action: List Data Counters from Investigate

This action retrieves the list of data types along with the count of results for each type.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

Query

Enter the search query string to search for data type.

Text

Required

Entity

Enter the type of the query string. 

Text

Required

Allowed values:

text, domains, emails, subnets, credit_cards

Default value:

text

Example Request

[
  {
    "query": "Sample Query",
    "entity": "text"
  }
]
Action: List Incidents from Monitor

This action lists the incidents based on the specified ID.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

Feed Property ID

Enter the ID of the bundle associated with the incident.

Text

Required

Monitor ID

Enter the ID of the monitor to query.

Text

Required

Extra Params

Enter any extra params to filter the response by.

Example:

"free_text": "TEXT"

Key Value

Optional

Allowed keys:

free_text, status

Example Request

[
  {
    "monitor_id": "5968",
    "feed_property_id": "837a6b00a7184228982ad7a57085b65c-demo"
  }
]
Action: List Saved Queries from Investigate

This action lists all your current saved queries.

Action Input Parameters

No input parameters are required for this action.

Action: Request for Information in Monitor

This action requests an RFI inquiry to KELA.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

Text

Enter the message body.

Text

Required

Urgency

Enter the urgency level for this RFI. 

Integer

Required

Allowed values:

1 for low, 2 for medium, 3 for high, 4 for critical

Subject

Enter the message subject.

Text

Required

Monitor ID

Enter the monitor ID to query.

Text

Required

Example Request

[
  {
    "text": "Sample Text",
    "subject": "Sample Subject",
    "urgency": "1",
    "monitor_id": "5968"
  }
]
Action: Scroll Incidents in Monitor

This action retrieves the next bulk of incidents using the scroll ID.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

Scroll ID

Enter the scroll ID to retrieve incidents.

Example:

DnF1ZXJ5VGhlbkZldGNoEAAAAAC936NlFlpYNUhXVkhBUXd1SEFybnNONWE1Y2cAAAAA3QuZnxZnTm81a2xfOFRJcW14c3l1a2U2aXFnAAAAAVUAUu0WWTJ5TU9zeU9SNkM3U3JjZFNqWjYzUQAAAAAfo6XxFm9xxS1JYazdRU2JxZ1NGa3BsMW81RUEAAAAAs3mt6BZEMjBMYmZ4c1FFeWJIeTFBaTJuWW5BAAAAASqdAb4WTDZXLWNGX1ZReHlyanc5UUdfQ0dWQQxxAACzea3pFkQyMExiZnhzUUV5Ykh5MUFpMm5ZbkEAAAABLG-RRRZzM0xvcEVNUFEwSzlJZVJtRDVORGV3AAAAARo5L8wWclkwTmpRY2hRQlNWM1liNkRUSnV4dwAAAAFaAeeEFlRKdndwbFFiUXB5Zi0wRWFhLVNFUkEAAAABLEvnBZBMmRFVFUtbFFRaWh1akQ4ZGp4TmpBAAAAAIK6TNkWY3c0bHVxxkJRWGlmMElPLXVWajJnZwAAAAFaAeeDFlRKdndwbFFiUXB5Zi0wRWFhLVNFUkEAAAAA3QuZoBZnTm81a2xfOFRJcW14c3l1a2U2aXFnAAAAASqdAb8WTDZXLWNGX1ZReHlyanc5UUdfQ0dWQQAAAAEaOS_NFnJZME5qUWNoUUJTVjNZYjZEVEp1eHc=

Text

Required

Monitor ID

Enter the monitor ID.

Text

Required

Example Request

[
  {
    "scroll_id": "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_FnJyeE9handPUk9tR29NU2tseGhPbHcAAAACCe8XDxZaWDVIV1ZIQVF3dUhBcm5zTjVhNWNnAAAAAnEDREsWQTJkRVRVLWxRUWlodWpEOGRqeE5qQQAAAAFOCGSPFm9OS1JYazdRU2JxZ1NGa3BsMW81RUE=",
    "monitor_id": "5968"
  }
]
Action: Search Data in Investigate

This action searches for a specific data type.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

Query

Enter the search query string to search for data type.

Text

Required

Entity

Enter the type of the query string. 

Text

Optional

Allowed values:

text, domains, emails, subnets, credit_cards

Default value is text

Index

Enter the type of the data to search.

Text

Optional

Allowed values:

hacking_discussions, leaked_credentials, instant_messaging, compromised_accounts, breached_servers, intelligence_reports.

Default value is hacking_discussions

Filters

Enter the filters to narrow down the search results.

Example:

{"crawlers": ["Pastebin"]}.

Key-Value

Optional

Example Request

[
  {
    "query": "hacking discussions "
  }
]
Action: Search Pagination in Investigate

This action navigates through limited search results to access larger data sets.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

Scroll ID

Enter the scroll ID for the search query you are currently paginating through to continue retrieving results.

Text

Required

Example Request

[
  {
    "scroll_id": "08ce7d8eee05bf5bc2192b7fd52fef7ff603b33d54292d771c123bd4cffb4615"
  }
]
Action: Update Incident Properties in Monitor

This action updates the status of the specified incident.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

Incident ID

Enter the ID of the incident to update it.

Text

Required

You can retrieve this using the action List Incidents from Monitor.

Monitor ID

Enter the monitor ID to query.

Text

Required

Additional Parameters

Enter the additional parameters to update the status. 

Key-Value

Optional

Allowed keys:

handled, read, star, deleted

Example Request

[
  {
    "delete": false,
    "monitor_id": "5968",
    "incident_id": "837a6b00a7184228982ad7a57085b65c-demo"
  }
]
Action: Generic Action

This is a generic action to perform any additional use case on Kela.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

Endpoint

Enter the endpoint to initiate a request.

Example:

/monitor/monitor_id/

Text

Required

Method

Enter the HTTP method to make.

Example:

GET

Text

Required

Allowed keys:

GET, PUT, POST, DELETE

Query Params

Enter the query parameters to filter the result.

Example:

$JSON[{"page":10}]

Any

Optional

Payload Data

Enter the payload data to pass to the API.

Example:

{"data": {"reason": "security_testing"}}

Key Value

Optional

Payload JSON

Enter the payload JSON to pass to the API.

Example:

$JSON[{"data": {"type": "ransomware","id": 788996}}]

Any

Optional

Example Request

[
   {
      "method":"GET",
      "endpoint":"incidents",
      "payload_data":{
         "data":[
            {
               "reason":"security_testing"
            }
         ]
      },
      "query_params":{
         "limit":"10"
      }
   }
]