Skip to main content

Cyware Orchestrate

Cyware Intel Exchange

App Vendor: Cyware

App Category: Cyware Product, Data Enrichment & Threat Intelligence

Connector Version: 2.0.3

API Version: 3.0.0

About App

The Cyware Intel Exchange app enables security teams to ingest, enrich, analyze, and share threat intelligence in real time, helping improve threat visibility and response across trusted networks.

The Cyware Intel Exchange app is configured with Cyware Orchestrate to perform the following actions:

Action Name

Description

Add Custom Aliases

This action adds custom aliases to threat data objects such as threat actors, malware, attack patterns, campaigns, infrastructures, intrusion sets, and tools.

Add Note to Threat Data Object

This action adds a note to a threat data object.

Add Subscriber

This action adds a subscriber to Intel Exchange.

Add Tag to Threat Data

This action adds a tag to a threat object.

Bulk Add Analyst Score

This action adds an analyst score to multiple threat data objects.

Bulk Add or Remove Watchlist

This action adds or removes multiple threat data objects from the watchlist.

Bulk Add Relation

This action adds a relation to multiple threat data objects.

Bulk Add Tags

This action adds tags to multiple threat data objects.

Bulk Add TLP

This action adds TLP to multiple threat data objects.

Bulk IOC Advanced Lookup

This action performs a bulk lookup for threat data objects in the intel exchange platform and retrieves their basic details, enriched information, and related objects.

Bulk Lookup And Create Intel

This action performs a lookup for IOCs to retrieve the list of objects available in the Intel Exchange platform. If some IOCs are not available, you can choose to create intel and ingest the missing iocs. This action is available in Intel Exchange from the release v3.3.1 and later versions.

Bulk Remove Tags

This action removes tags from multiple threat data objects.

Bulk Run Rule

This action runs a rule on multiple threat data objects.

Create Bulk Notes

This action creates notes in bulk for multiple threat data objects.

Create Collection

This action creates a collection on Intel Exchange.

Create Intel

This action is used to create intel by providing minimal details of indicators, SDOs, relations, custom objects, and indicators parsed from free text.

Create Saved Search

This action creates a saved search on Intel Exchange.

Create Tag

This action creates a tag on Intel Exchange.

Create Task in Multiple Objects

This action creates a task in multiple threat data objects.

Create Task in Threat Data Object

This action creates a task for a threat data object.

Create Task to Parse IOCs

This action creates an IOC parsing task to extract STIX objects from free text data or a web page.

Create Threat Defender Content

This action creates a threat defender content record.

Delete Note From Threat Data Object

This action deletes a note by its unique ID.

Delete Report

This action deletes a report from Intel Exchange. Note: This action is irreversible.

Delete Saved Search

This action deletes a saved search using the specified ID.

Delete Task From Threat Data Object

This action deletes a task of a threat data object.

Enrich Threat Data

This action retrieves the enriched data of a threat data object using the enrichment tool.

Export File

This action retrieves the export data in CSV format.

Filter Relations by Source

This action retrieves source-specific relations of a threat data object.

Generate Export Link

This action is used to generate an export link, which can be used to share data on Intel Exchange

Get Accounts for Integration Tool

This action lists all accounts of an integration tool in Intel Exchange.

Get Action Overview

This action retrieves an overview of the action data of a threat data object.

Get Action Statistics

This action retrieves the statistics of the actions performed on a threat data object.

Get Advanced Details for a Threat Data Object

This action retrieves additional information about a threat data object, such as kill chain phases and published collections.

Get Key Evidence of Confidence Score

This action retrieves the key evidence for the intel exchange confidence score calculation.

Get Kill Chain Details

This action retrieves the details of a STIX kill chain phase.

Get License Details

This action retrieves the license details.

Get Note Details

This action retrieves the details of the specified note.

Get Object Source Details

This action retrieves source-specific details of a threat data object.

Get Object Source Details in List View

This action lists all the occurrences when the specified threat data object was ingested into the platform by the given source.

Get Quick Action Details

This action retrieves the status of the quick actions performed on a threat data object.

Get Related Objects

This action retrieves the related objects of an object type.

Get Relations Overview

This action retrieves the overall relations statistics of a threat data object.

Get Report Details

This action retrieves the details of a report.

Get Report Run Logs

This action retrieves the report run logs.

Get Result of Parse IOCs Task

This action retrieves the result after successfully processing the create parse IOCs task action.

Get Rule Details

This action retrieves the details about a rule.

Get Saved Search Details

This action retrieves the details of a saved search.

Get Signed in User Details

This action retrieves details of the currently logged-in user.

Get Task Details in Threat Data Object

This action retrieves the details of a task.

Get Task Details of Parsing IOCs

This action retrieves the details of the specified parse IOCs task.

Get Task Overview in Threat Data Object

This action retrieves an overview of the tasks created for a threat data object.

Get Threat Data Object Details

This action retrieves basic correlated details of a threat data object in Intel Exchange.

Get User Details

This action retrieves the details of the specified user.

Get User Group Details

This action retrieves the details of the specified user group.

Get Widget Data

This action retrieves the data of a particular widget present in Intel Exchange.

Import Intel

This action imports threat data to Intel Exchange.

Ingest STIX Data

This action is used to ingest STIX 2.1 data into Intel Exchange.

List Actions

This action retrieves a list of actions performed on a threat data object.

List All Collections

This action lists all collections on Intel Exchange.

List All Tags

This action lists all tags from Intel Exchange.

List API Feeds

This action lists all api feeds available on Intel Exchange.

List Custom Attributes of Threat Data Object

This action retrieves the custom attributes of a threat data object with respect to all the sources the object has received.

List Enriched Objects

This action lists the enriched data of the specified threat data object.

List Integrations

This action lists integrations configured in Intel Exchange.

List Intel History

This action retrieves the history of an intel added to Intel Exchange through various sources.

List IOC Types

This action lists all valid indicators of compromise (IOC) types supported by the intel exchange platform.

List Kill Chain Phases

This action retrieves kill chain information of a threat data object.

List Notes in Threat Data Object

This action retrieves a list of notes associated with a threat data object.

List Published Collections of a Threat Object

This action retrieves the published collections of a threat data object.

List Relations of Threat Data Object

This action retrieves the list of relations and their details for a given threat data object.

List Reports

This action lists reports on Intel Exchange.

List Rules

This action lists all the enrichment rules.

List Saved Result Set

This action retrieves saved result sets from Intel Exchange.

List Saved Searches

This action lists saved searches on Intel Exchange.

List Source Collections

This action retrieves a list of collections for the sources.

List Source Details

This action retrieves the source information for the given object type and object ID.

List Source External References

This action lists all external references associated with a threat data object.

List Sources

This action lists all the feed sources.

List Source Types

This action retrieves the types of feed sources available in the Intel Exchange platform.

List Subscribers

This action lists the subscribers configured in Intel Exchange.

List Tasks in Threat Data Object

This action retrieves the list of tasks associated with a threat data object.

List Threat Data

This action retrieves a list of threat data objects available for use in the Threat Investigations Canvas in Intel Exchange.

List Threat Data Object Details in Table View

This action retrieves threat data object details in a tabular format.

List Threat Data Object Sources

This action retrieves a list of feed sources associated with a threat data object, along with their description, fanged description, and de-fanged description.

List User Groups

This action retrieves a list of user groups from Intel Exchange.

List Users

This action lists all the users of the Intel Exchange application.

List Widgets

This action lists widgets present in Intel Exchange.

Perform Action on Threat Data Object

This action performs an action on a threat data object. You can perform actions, such as deprecate, undeprecate, add analyst tlp, add analyst score, and more.

Perform Bulk Action on Rules

This action updates multiple rules in one operation.

Perform Bulk Action on Threat Data

This action performs an action on multiple threat data objects.

Pin Saved Search

This action pins a saved search to the top.

Preview Threat Data Object

This action retrieves specific details of a threat data object.

Quick Add Intel

This action is used to add indicator data to Intel Exchange

Remove Pinned Saved Search

This action removes a saved search from the pinned search list.

Retrieve Download Link

This action retrieves a download URL for the export file, which includes the file ID and a token.

Retrieve Intel Statistics

This action retrieves the statistics history for the specified Intel component.

Retrieve Quick Add Intel Relation Objects

This action retrieves details of threat objects ingested and linked as relationship objects to the report created through the quick add intel submission.

Retrieve Quick Add Intel Status

This action retrieves the intel creation status of a quick add intel submission.

Run Report

This action runs a specific report.

Run Rule

This action runs a rule in Intel Exchange.

Update Note in Threat Data Object

This action updates the details of a note in Intel Exchange.

Update Pinned Saved Search

This action updates the order of a pinned saved search.

Update Saved Search

This action updates a saved search using the specified ID.

Update Task in Threat Data Object

This action updates a task of a threat data object.

Update User Details

This action is used to update the user details on Intel Exchange.

Update User Group Details

This action updates the user group details on Intel Exchange.

Generic Action

This is a generic action to perform any additional use case that you want on Cyware Intel Exchange.

Configuration Parameters

The following configuration parameters are required for the Cyware Intel Exchange app to communicate with the Cyware Intel Exchange enterprise application. The parameters can be configured by creating instances in the app.

Parameter

Description

Field Type

Required/Optional

Comments

Base URL

Enter the base URL of Cyware Intel Exchange.

Example:

https://<tenant_code>.cyware.com/ctixapi

Text

Required

Access ID

Enter the Intel Exchange access ID to authenticate with.

Password

Required

Secret Key

Enter the Intel Exchange secret key for authentication.

Password

Required

SSL Verification

Choose your preference to verify SSL or TLS while making requests. It is recommended to set this option to yes. Passing no may result in incorrectly establishing the connection.

Boolean

Optional

By default, verification is enabled.

Timeout

Enter the timeout value in seconds. This is the number of seconds requests will wait to connect to Intel Exchange and read the response.

Integer

Optional

Allowed range:

15-120

Default value:

15

Action: Add Custom Aliases

This action adds custom aliases to threat data objects such as threat actors, malware, attack patterns, campaigns, infrastructures, intrusion sets, and tools.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

Object ID

Enter the ID of the threat data object to add custom aliases.

Example:

903f519f-feb1-49b8-8c80-18ff8de99e8c

Text

Required

You can retrieve the object ID using the Action: List Threat Data.

Custom Aliases

Enter the list of custom aliases to add to the threat actor.

Example:

$LIST[sample alias 1,sample alias 2]

List

Required

Example Request

[
  {
    "object_id": "56f3c7f6-efe9-470a-85bd-6c3ea01b3f15",
    "custom_aliases": [
      "sample alias 3",
      "sample alias 4"
    ]
  }
]
Action: Add Note to Threat Data Object

This action adds a note to a threat data object.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

Text

Enter the note to add to the object.

Example:

sample note

Text

Required

Ensure that the JSON content passed is stringified if the Is JSON parameter is set to true.

Note Type

Enter the note type to create.

Text

Required

Allowed value:

report

Object ID

Enter the object ID to update the note for.

Example:

2b8d0163-da03-4a1d-86c5-f981f0920c0d

Text

Required

You can retrieve this using the action List Threat Data.

Metadata

Enter any additional metadata associated with the note.

Example:

report_id: 2b8d0163-da03-4a1d-86c5-f981f0920c0d

Key Value

Optional

Is JSON

Choose true if you want to send the note in JSON format.

Boolean

Optional

Default value:

false

Example Request

[
  {
    "text": "{\"summary\": \"Privilege escalation vulnerability detected in login module.\"}",
    "is_json": true,
    "meta_data": {
      "name": "PRIVESC-LOGIN",
      "type": "vulnerability",
      "component": "auth-module",
      "object_id": "b132ea9e-8f3a-45ac-8b59-0dbfa5a23e87"
    },
    "note_type": "incident",
    "object_id": "67f8c3de-5ac1-4d45-a905-773e0e4a7f63"
  }
]
Action: Add Subscriber

This action adds a subscriber to Intel Exchange.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

Subscriber Name

Enter the name of the subscriber.

Example:

John Doe

Text

Required

Primary Contact Name

Enter the primary contact name of the subscriber.

Text

Required

Email

Enter the email ID of the subscriber.

Text

Required

Score

Enter the score for the subscriber.

Integer

Required

Collection IDs

Enter the ID of the collections to which the subscriber needs to be added.

Example:

$LIST[9251d39e-c6d4-4c63-a55f-8201fd0d583d]

List

Required

IP Addresses

Enter IP addresses to establish a secure exchange of intel.

Example:

$LIST[0.0.0.0/0 , 1.12.34.8]

List

Required

Send Mail

Choose true to send mail.

Boolean

Optional

Default value:

true

Whitelisted IP Ranges

Enter any IP ranges to whitelist to access this collection.

Example:

$LIST[1.1.1.1 , 1.12.34.8]

List

Optional

Additional Params

Enter any additional parameters to pass with the request.

Key Value

Optional

Example Request

[
  {
    "name": "JohnDoe",
    "email": "john.doe@orgname.com",
    "score": "5",
    "extra_params": {},
    "collection_ids": [
      "890a0f0a-1d24-4592-b6a2-6104784553d7"
    ],
    "primary_contact_name": "John",
    "whitelisted_ip_ranges": [
      "1.1.1.1"
    ]
  }
]
Action: Add Tag to Threat Data

This action adds a tag to a threat object.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

Object ID

Enter the object ID to add a tag to.

Example:

03694ab0-0e9f-45f4-a4c4-2b6eaedd4803

Text

Required

You can retrieve this using the action List Threat Data.

Object Type

Enter the type of threat data object to add the tag to.

Example:

indicator

Text

Required

Allowed values:

indicator, vulnerability, malware, campaign, threat-actor, intrusion-set, attack-pattern, incident, course-of-action, identity, tool, infrastructure, location, malware-analysis, custom-object, note, observed-data, opinion, report

Tag

Enter the name of the tag to add to this object.

Example:

restricted_ip

Text

Required

Create Tag

Choose true to create a tag if the specified tag does not exist in Intel Exchange.

Boolean

Optional

Default value:

false

Tag Colour

Enter the color of the tag to assign if creating a tag.

Text

Optional

Default value:

#0068fa(blue)

Example Request

[
  {
    "object_id": "97e32263-d8bf-409f-9b6a-d1795515d4c2",
    "tag_to_add": "restricted_cve",
    "object_type": "vulnerability",
    "create_new_tags": true
  }
]
Action: Bulk Add Analyst Score

This action adds an analyst score to multiple threat data objects.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

Analyst Score

Enter the analyst score to add to the objects.

Example:

68

Integer

Required

Allowed range:

0-100

Object IDs

Enter the list of threat data object IDs to perform the bulk action.

Example:

$LIST[49d5e95e-3889-42de-8280-1ebf5c7cb95a, 71cd9a67-aa10-4016-bd32-b44534b2e1b9]

List

Required

You can retrieve this using the action List Threat Data.

Object Type

Enter the type of threat data objects to perform the bulk action. example, indicator

Text

Required

Allowed values:

indicator, vulnerability, malware, campaign, threat-actor, intrusion-set, attack-pattern, incident, course-of-action, identity, tool, infrastructure, location, malware-analysis, custom-object, note, observed-data, opinion, report

Example Request

[
  {
    "object_ids": [
      "5991363a-eff0-4a35-a068-02a3d40c3e3c",
      "53724dbe-1dde-4c90-9c06-25c7890dc766"
    ],
    "object_type": "indicator",
    "analyst_score": "67"
  }
]
Action: Bulk Add or Remove Watchlist

This action adds or removes multiple threat data objects from the watchlist.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

Action Type

Enter watchlist to add objects to the watchlist, or un_watchlist to remove them.

Text

Required

Allowed values:

watchlist, un_watchlist

Object Names

Enter the list of values for the objects to add or remove from the watchlist.

Example:

$LIST[www.childalertfakt.eu, 3:bwcsn:ecsn]

List

Required

You can retrieve this using the action List Threat Data.

Object IDs

Enter the list of threat data object IDs to perform the bulk action.

Example:

$LIST[49d5e95e-3889-42de-8280-1ebf5c7cb95a, 71cd9a67-aa10-4016-bd32-b44534b2e1b9]

List

Required

You can retrieve this using the action List Threat Data.

Object Type

Enter the type of threat data objects.

Example:

indicator

Text

Required

Allowed values:

indicator, vulnerability, malware, campaign, threat-actor, intrusion-set, attack-pattern, incident, course-of-action, identity, tool, infrastructure, location, malware-analysis, custom-object, note, observed-data, opinion, report

Example Request

Adding threat data object to the watchlist:

[
  {
    "object_ids": [
      "5991363a-eff0-4a35-a068-02a3d40c3e3c",
      "53724dbe-1dde-4c90-9c06-25c7890dc766"
    ],
    "action_type": "watchlist",
    "object_type": "indicator",
    "object_names": [
      "www.childalertfakt.eu",
      "3:BWcSn:EcSn"
    ]
  }
]

Removing threat data object from the watchlist:

[
  {
    "object_ids": [
      "5991363a-eff0-4a35-a068-02a3d40c3e3c",
      "53724dbe-1dde-4c90-9c06-25c7890dc766"
    ],
    "action_type": "un_watchlist",
    "object_type": "indicator",
    "object_names": [
      "www.childalertfakt.eu",
      "3:BWcSn:EcSn"
    ]
  }
]
Action: Bulk Add Relation

This action adds a relation to multiple threat data objects.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

Target ID

Enter the ID of an object to add as a relation.

Example:

85830a15-3ae2-49f1-987c-f52ccf40a0e3

Text

Required

You can retrieve this using the action List Threat Data.

Target Type

Enter the type of the object to add as a relation.

Example:

indicator

Text

Required

Allowed values:

indicator, vulnerability, malware, campaign, threat-actor, intrusion-set, attack-pattern, incident, course-of-action, identity, tool, infrastructure, location, malware-analysis, custom-object, note, observed-data, opinion, report

Object IDs

Enter the list of threat data object IDs to perform the bulk action.

Example:

$LIST[49d5e95e-3889-42de-8280-1ebf5c7cb95a, 71cd9a67-aa10-4016-bd32-b44534b2e1b9]

List

Required

You can retrieve this using the action List Threat Data.

Object Type

Enter the type of threat data objects.

Example:

indicator

Text

Required

Allowed values:

indicator, vulnerability, malware, campaign, threat-actor, intrusion-set, attack-pattern, incident, course-of-action, identity, tool, infrastructure, location, malware-analysis, custom-object, note, observed-data, opinion, report

Relationship Type

Enter the relationship type to add to threat data objects.

Text

Optional

Allowed values:

For allowed, see the section Allowed values for the Relationship Type parameter.

Default value:

related-to

Target Name

Enter the name or value of the target object you are adding as a relation.

Example:

An IP address like 5.205.20.175 or a domain name like example.com

Text

Optional

Target Sub Type

Enter the subtype of the object.

Example:

ipv4-addr

Text

Optional

Example Request

[
  {
    "target_id": "1086b703-0e5f-403d-a542-7be06a0bf6eb",
    "object_ids": [
      "5991363a-eff0-4a35-a068-02a3d40c3e3c",
      "53724dbe-1dde-4c90-9c06-25c7890dc766"
    ],
    "object_type": "indicator",
    "target_name": "https://assets.nautil.us/sites/3/nautilus/Braun_Lead-rightside.png?q=65&amp;auto=format&amp;w=350&amp;h=100",
    "target_type": "indicator",
    "target_sub_type": "url",
    "relationship_type": "related-to"
  }
]

targets

indicates

impersonates

duplicate-of

exploited-by

has

compromises

associated-with

employs

hosts

initiates

manages

pertains-to

resolves

serves-as

targets-with

name

compromises-indicator

employs-tactic

mitigates-vulnerability

uses-tactic

associated_actor

av-analysis-of

characterizes

downloads

exfiltrates-to

indicated_ttp

located-at

owns

related_incident

related_ttp

static-analysis-of

uses

attributed-to

related-to

remediated-by

advertised-by

mentions

originates-from

consists-of

facilitates

impacts

involves

measures

provides-context-for

runs

solves

treats

uses-target

originates-from-country

employs-tool

targets-vulnerability

uses-tool

attributed_threat_actor

based-on

communicates-with

drops

exploits

kill_chain_phase

object_reference

potential_coa

related_indicator

related_vulnerability

mitigates

variant-of

derived-from

remediates

identified-by

mentioned-by

investigates

delivers

gives-characteristics-of

includes

knows

part-of

requires

satisfies

subtechnique-of

uses-characteristics-of

associates

employs-malware

mitigates-tactic

uses-malware

associated_campaign

authored-by

beacons-to

controls

dynamic-analysis-of

hosts

kill_chain_phases

observed_ttp

related_campaign

related_coa

suggested_coa

Action: Bulk Add Tags

This action adds tags to multiple threat data objects.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

Tag IDs

Enter the ID of the tags to be added.

Example:

$LIST[ac542ff0-b423-4329-8c82-12e419e48e18, 3af3031b-e9fc-4def-9b67-0d6a984a84fc]

List

Required

You can retrieve this using the action List All Tags.

Object IDs

Enter the list of threat data object IDs to perform the bulk action.

Example:

$LIST[49d5e95e-3889-42de-8280-1ebf5c7cb95a, 71cd9a67-aa10-4016-bd32-b44534b2e1b9]

List

Required

You can retrieve this using the action List Threat Data.

Object Type

Enter the type of threat data objects.

Example:

indicator

Text

Required

Allowed values:

indicator, vulnerability, malware, campaign, threat-actor, intrusion-set, attack-pattern, incident, course-of-action, identity, tool, infrastructure, location, malware-analysis, custom-object, note, observed-data, opinion, report

Example Request

[
  {
    "tag_ids": [
      "ac542ff0-b423-4329-8c82-12e419e48e18",
      "3af3031b-e9fc-4def-9b67-0d6a984a84fc"
    ],
    "object_ids": [
      "ea3ba5c9-66f7-4d17-ac01-60fff153abd1",
      "599ed793-c56e-4976-ae5e-fbfa92e64167"
    ],
    "object_type": "indicator"
  }
]
Action: Bulk Add TLP

This action adds TLP to multiple threat data objects.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

Analyst TLP

Enter the analyst TLP to add to the objects.

Text

Required

Allowed values:

WHITE, GREEN, AMBER, RED

Object IDs

Enter the list of threat data object IDs to add TLPs.

Example:

$LIST[49d5e95e-3889-42de-8280-1ebf5c7cb95a, 71cd9a67-aa10-4016-bd32-b44534b2e1b9]

List

Required

You can retrieve this using the action List Threat Data.

Object Type

Enter the type of threat data objects.

Example:

indicator

Text

Required

Allowed values:

indicator, vulnerability, malware, campaign, threat-actor, intrusion-set, attack-pattern, incident, course-of-action, identity, tool, infrastructure, location, malware-analysis, custom-object, note, observed-data, opinion, report

Example Request

[
  {
    "object_ids": [
      "5991363a-eff0-4a35-a068-02a3d40c3e3c",
      "53724dbe-1dde-4c90-9c06-25c7890dc766"
    ],
    "analyst_tlp": "GREEN",
    "object_type": "indicator",
    "additional_data": {}
  }
]
Action: Bulk IOC Advanced Lookup

This action performs a bulk lookup for threat data objects in the Intel Exchange platform and retrieves their basic details, enriched information, and related objects.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

Object Type

Enter the type of threat data object to retrieve details for.

Example:

indicator

Text

Required

Allowed values:

indicator, vulnerability, malware, campaign, threat-actor, intrusion-set, attack-pattern, incident, course-of-action, identity, tool, infrastructure, location, malware-analysis, custom-object, note, observed-data, opinion, report

Enrichment Data

Choose true to retrieve the latest five enrichment data points of the threat data objects.

Boolean

Optional

Default value:

false

Relation Data

Choose true to retrieve the latest 100 relations details of threat data object details.

Boolean

Optional

Default value:

false

Object Value

Enter a list of up to 100 threat data object values to look up.

Note

You must provide either the Object ID or the Object value parameter.

Example:

$LIST[47.92.78.238, www.facebook.com]

List

Optional

You can retrieve this using the action List Threat Data.

Object ID

Enter a list of up to 100 threat data object IDs to look up.

Note

You must provide either the Object ID or the Object value parameter.

Example:

$LIST[2b8d0163-da03-4a1d-86c5-f981f0920c0d]

List

Optional

You can retrieve this using the action List Threat Data.

Fields to Retrieve

Enter a comma-separated list of fields to retrieve specific details of the objects.

Example:

relations,enrichment_data

Text

Optional

By default, it retrieves all field data.

Enrichment Tools

Enter the names of up to five enrichment tools, separated by commas, to enrich the threat data objects. For example, enter AbuseIPDB, VirusTotal to apply both the AbuseIPDB and VirusTotal enrichment tools.

Text

Optional

You can retrieve this using the action List Integrations.

Example Request

[
  {
    "object_type": "indicator",
    "extra_params": {},
    "object_value": [
      "121.12.118.6",
      "www.facebook.com",
      "222.122.211.121"
    ]
  }
]
Action: Bulk Lookup And Create Intel

This action performs a lookup for IOCs to retrieve the list of objects available in the Intel Exchange platform. If some IOC s are not available, you can choose to create intel and ingest the missing IOCs. This action is available in Intel Exchange from the release v3.3.1 and later versions.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

Indicators

Enter the list of indicators to look up.

Example:

$LIST[76.77.213.225:80, 131.190.253.60, 56.15.255.238]

List

Required

You can enter a maximum of 1000 IOC values.

Enrichment

Choose true to add the last enriched information for each enriched object.

Boolean

Optional

Default value:

true

Create

Choose true to create new IOCs that were missed from the list of lookup IOCs.

Boolean

Optional

Default value:

true

Metadata

Enter any additional information about the objects, such as TLP, confidence score, and more, while creating intel.

Example:

{'tlp':'green'}

Key Value

Optional

Allowed keys:

description, labels, tlp, confidence

Collection Name

Enter the name of the collection to map the threat data objects.

Example:

testFeed-External

Text

Optional

Source Name

Pass the name of the source to map the intel. If the passed source name does not exist in the platform, then a new source is automatically created

Example:

OpenAPI Lookup

Text

Optional

Default source:

OpenAPI Lookup (OpenAPI) of the Miscellaneous source category.

Example Request

[
  {
    "create": false,
    "source": "External Threat Feed",
    "metadata": {
      "tlp": "GREEN",
      "description": "Test entry simulating an external feed with mixed indicator types for validation purposes."
    },
    "enrichment": true,
    "indicators": [
      "185.220.101.4",                      
      "45.83.64.1:443",                    
      "203.0.113.45",                       
      "198.51.100.22:8080",                 
      "2a03:2880:f003:c07:face:b00c:0:1",   
      "e3b0c44298fc1c149afbf4c8996fb924", 
      "44d88612fea8a8f36de82e1278abb02f", 
      "cfcd208495d565ef66e7dff9f98764da", 
      "d41d8cd98f00b204e9800998ecf8427e", 
      "4a44dc15364204a80fe80e9039455cc1",  
      "275a021bbfb6480f4c5f3cf24973d7ee",  
      "f2ca1bb6c7e907d06dafe4687e579fce", 
      "abc1234def5678ghijk90123lmno456p"
    ],
    "collection_name": "testFeed-External"
  }
]
Action: Bulk Remove Tags

This action removes tags from multiple threat data objects.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

Tag IDs

Enter the ID of the tags to be removed.

Example:

$LIST[ac542ff0-b423-4329-8c82-12e419e48e18, 3af3031b-e9fc-4def-9b67-0d6a984a84fc]

List

Required

You can retrieve this using the action List All Tags.

Object IDs

Enter the list of threat data object IDs to perform the bulk action.

Example:

$LIST[49d5e95e-3889-42de-8280-1ebf5c7cb95a, 71cd9a67-aa10-4016-bd32-b44534b2e1b9]

List

Required

You can retrieve this using the action List Threat Data.

Object Type

Enter the type of threat data objects.

Example:

indicator

Text

Required

Allowed values:

indicator, vulnerability, malware, campaign, threat-actor, intrusion-set, attack-pattern, incident, course-of-action, identity, tool, infrastructure, location, malware-analysis, custom-object, note, observed-data, opinion, report

Example Request

[
  {
    "tag_ids": [
      "9583f92f-7437-4ca1-99c5-45c92c1c164e",
      "9ca2002c-21fb-440c-acdc-de8c45307e87"
    ],
    "object_ids": [
      "ea3ba5c9-66f7-4d17-ac01-60fff153abd1",
      "db4ebc15-2def-4af9-9a92-c464521df3a5"
    ],
    "object_type": "indicator"
  }
]
Action: Bulk Run Rule

This action runs a rule on multiple threat data objects.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

Rule ID

Enter the ID of a rule to run.

Example:

5602232e-085b-4c15-89af-404ea45c5703

Text

Required

You can retrieve this using the action List Rules.

Object IDs

Enter the list of threat data object IDs to perform the bulk action on.

Example:

$LIST[49d5e95e-3889-42de-8280-1ebf5c7cb95a, 71cd9a67-aa10-4016-bd32-b44534b2e1b9]

List

Required

You can retrieve this using the action List Threat Data.

Object Type

Enter the type of threat data objects to perform the bulk action on.

Example:

indicator

Text

Required

Allowed values:

indicator, vulnerability, malware, campaign, threat-actor, intrusion-set, attack-pattern, incident, course-of-action, identity, tool, infrastructure, location, malware-analysis, custom-object, note, observed-data, opinion, report

Example Request

[
  {
    "rule_id": "726a05f5-92a6-4f0d-9483-a1f2be548ddf",
    "object_ids": [
      "5991363a-eff0-4a35-a068-02a3d40c3e3c",
      "53724dbe-1dde-4c90-9c06-25c7890dc766"
    ],
    "object_type": "indicator"
  }
]
Action: Create Bulk Notes

This action creates notes in bulk for multiple threat data objects.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

Object Type

Enter the type of the threat data object.

Text

Required

Allowed value:

threatdata

Text

Enter the note content to be added to the specified threat data objects.

Example:

This is a sample note

Text

Required

Object IDs

Enter the list of object IDs on which you want to add bulk notes.

Example:

$LIST[77b4c308-73bc-4e1e-9d05-aeeaa0423df,dd324b2-e8e2-42da-9bc9-f9f4470a13ef]

List

Required

You can retrieve this using the action List Threat Data.

Example Request

[
  {
    "note_type": "threatdata",
    "object_ids": [
      "7c4786c6-f537-4793-b2fa-f12cc841e8dd",
      "62789e69-3850-41d0-b46b-b34f4b91a1fb"
    ],
    "description_text": "This is a sample note"
  }
]
Action: Create Collection

This action creates a collection on Intel Exchange.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

Polling

Choose true to add this collection to the poll data.

Boolean

Required

Inbox

Choose true to add this collection to the inbox service.

Boolean

Required

Collection Name

Enter the name of the collection.

Example:

sample name

Text

Required

Description

Enter a description of the collection.

Example:

This is a sample description

Text

Required

Marking Config

Enter the data marking type.

Text

Optional

Allowed values:

tlp, acs

Default value:

tlp

Default Marking Definition

Enter the default data marking definition.

Text

Optional

Default value:

AMBER

Example Request

[
  {
    "name": "Malicious IP Feed Inbox",
    "inbox": true,
    "polling": true,
    "description": "Automatically ingests and processes IP-based threat indicators for correlation and alerting."
  }
]
Action: Create Intel

This action is used to create intel by providing minimal details of indicators, SDOs, relations, custom objects, and indicators parsed from free text.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

Title

Enter the title of the indicator to create on Intel Exchange.

Example:

vulnerability report

Text

Required

Create Intel

Choose true to create an Intel feed.

Boolean

Optional

Default value:

false

Indicator

Enter the indicators to add to the intel. This should be a dictionary in the form of {indicator_type: indicator_value}.

Key Value

Optional

Allowed indicator types:

ipv4-addr, ipv6-addr, domain, url, email, md5, sha1, sha224, sha256, sha384, sha512, ssdeep

SDOs Object

Enter the SDO types and comma-separated SDO values.

Example:

{\"vulnerability\": \"cve-2021-21913\", \"cve-2021-219134\"}

Key Value

Optional

Confidence

Enter the source confidence score of the indicators being passed.

Integer

Optional

Allowed range:

1-100

TLP

Enter the TLP of the indicators.

Text

Optional

Allowed values:

GREEN, AMBER, RED, WHITE, NONE

Apply Metadata to All Objects

Choose true to apply the metadata to all objects of the intel. Choose false to apply the metadata to the report object that is created as part of the quick add intel submission only.

Boolean

Optional

Default value:

false

Custom Scores

Enter the custom score key and the score in key-value pairs.

Example:

{\"x_ctix_customscore_2\": 2,\"x_ctix_customscore_1\": \"medium\"}.

Key Value

Optional

Description

Enter a description for the intel within 1000 characters.

Example:

This is a sample description

Text

Optional

Labels

Enter a list of tag names to add to the intel.

Example:

$LIST[label_a,label_b]

Any

Optional

Additional Metadata

Enter any additional metadata to create intel.

Any

Optional

Parsed Indicators

Enter the IOC types and indicators parsed from free text.

Example:

{ips: $JSON[{values: [\"2.23.4.2\", \"32.34.1.1\"]}]}

Key Value

Optional

Observables

Enter the STIX cyber observable object (SCO) types and comma-separated SCO values.

Example:

{\"user-account\": \"test@cyware.com\"}

Key Value

Optional

Relations

Enter the objects to be associated with the report object created as part of this quick add submission.

Example:

$JSON[[{\"name\": \"1.1.1.100\",\"type\": \"indicator\",\"ioc_type\": \"ipv4-addr\",\"id\": \"30bafaad-b70d-4881-97f2-7915df322332\"},{\"name\": \"1.1.1.1\",\"type\": \"indicator\",\"ioc_type\": \"ipv4-addr\",\"id\": \"8c664a86-8da7-4cc5-a2a5-aa66b7ca1c8a\"}]]

Any

Optional

You can associate a maximum of 10 objects in a single quick add submission.

Extra data

Enter the extra data to pass in the payload.

Key Value

Optional

Example Request

[
  {
    "tlp": "GREEN",
    "title": "Sample Intel",
    "labels": [
      "label1",
      "label2"
    ],
    "all_sdos": {
      "all_iocs": {
        "ipv4": [
          {
            "value": "1.2.34.21",
            "description": "sample description",
            "is_false_positive": true,
            "notes": [
              "This is a sample note attached to this indicator!",
              "Sample Note 2"
            ],
            "custom_attributes": {
              "x_custom_attribute1": "sample value 1",
              "x_custom_attribute2": "sample value 2"
            }
          }
        ],
        "ipv6": [
          {
            "value": "7b6f:e96a:991b:e1f8:6e50:9bf6:3c7:2922",
            "custom_attributes": {
              "x_custom_attribute1": "sample value 1",
              "x_custom_attribute2": "sample value 2"
            }
          }
        ],
        "domain": [
          {
            "value": "abc.com",
            "custom_attributes": {
              "x_custom_attribute1": "sample value 1",
              "x_custom_attribute2": "sample value 2"
            }
          }
        ],
        "url": [
          {
            "value": "http://www.abc.com",
            "custom_attributes": {
              "x_custom_attribute1": "sample value 1",
              "x_custom_attribute2": "sample value 2"
            }
          }
        ],
        "email_address": [
          {
            "value": "john.doe@cyware.com",
            "custom_attributes": {
              "x_custom_attribute1": "sample value 1",
              "x_custom_attribute2": "sample value 2"
            }
          }
        ],
        "md5": [
          {
            "value": "00616b4b72c8a1da89ed3840fa7313e1",
            "custom_attributes": {
              "x_custom_attribute1": "sample value 1",
              "x_custom_attribute2": "sample value 2"
            }
          }
        ]
      },
      "malwares": [
        {
          "value": "malware1",
          "custom_attributes": {
            "x_custom_attribute1": "sample value 1",
            "x_custom_attribute2": "sample value 2"
          }
        }
      ],
      "attack_patterns": [
        {
          "value": "attackpattern1",
          "custom_attributes": {
            "x_custom_attribute1": "sample value 1",
            "x_custom_attribute2": "sample value 2"
          }
        }
      ],
      "vulnerabilities": [
        {
          "value": "vulnerablities_01",
          "custom_attributes": {
            "x_custom_attribute1": "sample value 1",
            "x_custom_attribute2": "sample value 2"
          }
        }
      ]
    },
    "confidence": "80"
  }
]
Action: Create Tag

This action creates a tag on Intel Exchange.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

Tag Name

Enter a unique name of the tag to add within 50 characters.

Example:

restricted_ip

Text

Required

Tag Color

Enter the hex key of a color code for the tag to assign.

Text

Required

Allowed values:

#5236e2, #0068fa, #eb9c00, #ff5330, #27865f, #c4c81d, #00a2c2, #c341e7, #ad6b76, #95a1b1

Example Request

[
  {
    "name": "restricted_ip"
  }
]
Action: Create Task in Multiple Objects

This action creates a task in multiple threat data objects.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

Object Type

Enter the type of threat data object to associate with the task.

Text

Required

Allowed values:

indicator, vulnerability, malware, campaign, threat-actor, intrusion-set, attack-pattern, incident, course-of-action, identity, tool, infrastructure, location, malware-analysis, custom-object, note, observed-data, opinion, report

Object IDs

Enter a list of threat data object IDs to associate with the task.

Example:

$LIST[f7ad5e3d-5c31-4c44-bbb1-990516d5678e, f7ad5e3d-5c31-4c44-bbb1-990516d5678e]

List

Required

You can retrieve this using the action List Threat Data.

Assignee

Enter the ID of a user to assign the task.

Example:

8efe66c3-1701-4494-a192-5512e0c2c0af

Text

Required

Description Text

Enter the description of the task to be performed.

Example:

task_test

Text

Required

Task Status

Enter the status of the task.

Text

Optional

Allowed values:

not_started, in_progress, completed

Closure Comment

Enter the comment to close the task. This is required if the Task Status is completed.

Text

Optional

Additional Data

Enter the additional data to create a task in multiple threat data objects.

Key Value

Optional

Allowed keys:

type, deadline, priority

Example Request

[
  {
    "assignee": "de3ccc98-efd2-45cc-9432-76bdb75a04c7",
    "object_ids": [
      "a323e45c-0e8e-490e-8a34-a30687ab5610",
      "61a9714e-93d8-4c06-b065-5e5437766383"
    ],
    "object_type": "indicator",
    "description_text": "This is a sample description.",
    "extra_data_fields": {}
  }
]
Action: Create Task in Threat Data Object

This action creates a task for a threat data object.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

Assignee

Enter the ID of a user to assign the task.

Example:

5555f14c-6130-4e58-a2da-33e1a85b5a64

Text

Required

You can retrieve this using the action List Users.

Description Text

Enter the description of the task to be performed.

Example:

Verify this indicator

Text

Required

Threat Data Type

Enter the type of the threat data object.

Example:

indicator

Text

Required

Allowed values:

indicator, vulnerability, malware, campaign, threat-actor, intrusion-set, attack-pattern, incident, course-of-action, identity, tool, infrastructure, location, malware-analysis, custom-object, note, observed-data, opinion, report

Object ID

Enter the ID of the threat data object to associate with the task. If you do not enter this, the task is created as a global task.

Example:

92686150-58e5-4f15-be64-f3e123efd825

Text

Optional

You can retrieve this using the action List Threat Data.

Priority

Enter the priority of the task.

Text

Optional

Allowed values:

high, medium, low

Default value:

medium

Task Deadline

Enter the task deadline in epoch format to specify when the task should be completed.

Example:

1633393469

Integer

Optional

Status

Enter the status of the task.

Text

Optional

Allowed values:

not_started, in_progress, completed.

Default value:

not_started

Closure Comment

Enter the comment to close the task. This is required if Status is completed.

Text

Optional

Example Request

[
  {
    "assignee": "de3ccc98-efd2-45cc-9432-76bdb75a04c7",
    "object_ids": [
      "a323e45c-0e8e-490e-8a34-a30687ab5610",
      "61a9714e-93d8-4c06-b065-5e5437766383"
    ],
    "object_type": "indicator",
    "description_text": "This is a sample description",
    "extra_data_fields": {}
  }
]
Action: Create Task to Parse IOCs

This action creates an IOC parsing task to extract STIX objects from free text data or a web page.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

Free Text Data

Enter free text (up to 50,000 characters) or a web page URL to extract STIX objects and retrieve the task ID.

Example:

1.2.3.11, 1.1.2.1, domain.com

Text

Required

Extract STIX Object

Choose true to extract STIX objects from a web page. If you choose false, then the URL passed in the data parameter is parsed as free text.

Boolean

Optional

Default value:

false

Get Parsed IOC Details

Choose true to retrieve the parsed IOC details.

Boolean

Optional

Default value:

false

Task Completion Wait Time

Enter the time (in seconds) to wait for the task to complete and retrieve its details.

Integer

Optional

Default value:

5

Example Request

[
  {
    "iocs_task_data": "1.2.3.11, 1.1.2.1, domain.com,2aae6c35c94fcfb415dbe95f408b9ce91ee846ed",
    "get_parsed_ioc_details": true
  }
]
Action: Create Threat Defender Content

This action creates a threat defender content record.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

Tags

Enter the list of tag objects to apply to the content.

Example:

$JSON[[{\"id\": \"ef4fdadc-c98c-4e09-afd2-b9084706151e\", \"name\": \"yara\", \"colour_code\": \"#ff5330\"}]]

Any

Optional

Allowed keys:

id, name, colour_code

Rule

Enter the rule content.

Example:

'rule tdl1 : suspicious_file'

Text

Required

External Variables

Enter any external details to add to the threat data content.

Example:

$JSON[[{\"type\": \"boolean\", \"key\": \"some_string_var\", \"value\": true}]]

Any

Optional

Example Request

[
  {
    "rule": "rule Suspicious_File_Strings\n{\n    strings:\n        $s1 = \"cmd.exe\"\n        $s2 = \"powershell\"\n    condition:\n        any of them\n}"
  }
]
Action: Delete Note From Threat Data Object

This action deletes a note by its unique ID.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

Note ID

Enter the ID of the note to delete.

Example:

8003c6ba-5215-486d-881f-d940dcb78d35

Text

Required

You can retrieve this using the action List Notes in Threat Data Object.

Example Request

[
  {
    "note_id": "cd1cb275-b713-4606-b7aa-c373d2bc4575"
  }
]
Action: Delete Report

This action deletes a report from Intel Exchange. This action is irreversible.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

Report ID

Enter the report ID to delete.

Example:

5e7e2c2d-3e3d-4e7f-a6b3-6b3e6b3e6b3e

Text

Required

You can retrieve this using the action List Reports.

Report Type

Enter the report type.

Text

Optional

Allowed values:

basic, advanced

Default value:

basic

Example Request

[
  {
    "report_id": "2edd6bd6-d6f3-48c6-bc07-3eb75bcc3f46",
    "report_type": "basic"
  }
]
Action: Delete Task From Threat Data Object

This action deletes a task of a threat data object.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

Task ID

Enter the unique identifier of a task to delete.

Example:

2d83e656-4aca-4077-a1d7-4b572cc2fb53

Text

Required

You can retrieve this using the action List Tasks in Threat Data Object.

Example Request

[
  {
    "task_id": "521faad7-ac66-4225-b94f-db0d20b7b220"
  }
]
Action: Enrich Threat Data

This action retrieves the enriched data of a threat data object using the enrichment tool.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

App Slug

Enter the slug of an enrichment tool to retrieve its enriched data.

Example:

comodo

Text

Required

You can retrieve this using the action List Integrations.

Object Value

Enter the value of the object to enrich.

Example:

1.1.1.1

Text

Required

Object ID

Enter the ID of an object. For indicators, enter the SCO ID object, and for vulnerabilities, enter the vulnerability object ID.

Example:

916e0c84-61a6-412b-a25c-e65d6bcdc96b

Text

Required

You can retrieve this using the action List Threat Data.

Object Type

Enter the object type to enrich the object.

Text

Required

Allowed values:

indicator, vulnerability

Action Slug

Enter the enrichment action name to retrieve specific details.

Text

Required

Allowed values:

get_ip (for IPs), get_domain (for domain), get_url (for URL), get_cve (for vulnerability)

Example Request

[
  {
    "value": "4.4.4.4",
    "app_slug": "recorded_future",
    "object_id": "18950beb-b3f1-41b5-9a13-7c17d1447459",
    "action_slug": "get_ip",
    "object_type": "indicator"
  }
]
Action: Export File

This action retrieves the export data in CSV format.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

File ID

Enter the file ID generated by the Generate Export Link action.

Example:

df21ff51-0d9e-4380-be78-b75889860702

Text

Required

You can retrieve this using the action Generate Export Link.

Token

Enter the token that is generated by the Retrieve Download Link action.

Example:

61973ea7-5387-4e4b-a221-970fc1dca4xx

Password

Required

You can retrieve this using the action Retrieve Download Link.

Example Request

[
  {
    "token": "8c5e0fe1-833d-4f07-aea1-bc9b2063f1f7",
    "file_id": "89588424-1e36-4647-bd39-939f8c5a537d"
  }
]
Action: Filter Relations by Source

This action retrieves source-specific relations of a threat data object.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

Object ID

Enter the ID of a threat data object.

Example:

09730695-2f63-4a1c-a0fb-a042689588d5

Text

Required

You can retrieve this using the action List Threat Data.

Object Type

Enter the object type to retrieve source-specific relations.

Text

Required

Allowed values:

indicator, vulnerability, malware, campaign, threat-actor, intrusion-set, attack-pattern, incident, course-of-action, identity, tool, infrastructure, location, malware-analysis, custom-object, note, observed-data, opinion, report

Example Request

[
  {
    "object_id": "bb4338e4-d654-4bc6-ad4f-8174309f6384",
    "object_type": "indicator"
  }
]
Action: Get Accounts for Integration Tool

This action lists all accounts of an integration tool in Intel Exchange.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

Tool ID

Enter the integration tool ID to retrieve accounts.

Example:

7a7ac2cf-51e9-48fe-a2a8-32e7a684cc33

Text

Required

You can retrieve this using the action List Integrations.

Example Request

[
  {
    "tool_id": "3aacfe74-e645-41a7-bcea-25a893a4ef0c"
  }
]
Action: Get Action Overview

This action retrieves an overview of the action data of a threat data object.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

Object ID

Enter the ID of a threat data object to retrieve the action overview.

Example:

916e0c84-61a6-412b-a25c-e65d6bcdc96b

Text

Required

You can retrieve this using the action List Threat Data.

Object Type

Enter the object type to retrieve the action overview.

Text

Required

Allowed values:

indicator, vulnerability, malware, campaign, threat-actor, intrusion-set, attack-pattern, incident, course-of-action, identity, tool, infrastructure, location, malware-analysis, custom-object, note, observed-data, opinion, report

Layout

Enter the parameter to filter some fields according to the given layout.

Example:

overview

Text

Required

Page Number

Enter the page number to retrieve actions.

Example:

1

Integer

Optional

Default value:

1

Page Size

Enter the number of records to retrieve on each page.

Example:

3

Integer

Optional

Default value:

10

Example Request

[
  {
    "layout": "overview",
    "page_no": "1",
    "object_id": "e907fab8-b3fe-4df2-9ff0-72fd8660dd00",
    "page_size": "5",
    "object_type": "indicator"
  }
]
Action: Get Action Statistics

This action retrieves the statistics of the actions performed on a threat data object.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

Object ID

Enter the ID of a threat data object to retrieve associated action statistics.

Example:

916e0c84-61a6-412b-a25c-e65d6bcdc96b

Text

Required

You can retrieve this using the action List Threat Data.

Object Type

Enter the object type to retrieve action statistics.

Text

Required

Allowed values:

indicator, vulnerability, malware, campaign, threat-actor, intrusion-set, attack-pattern, incident, course-of-action, identity, tool, infrastructure, location, malware-analysis, custom-object, note, observed-data, opinion, report

Is Third Party Action

Choose true to retrieve third-party action statistics only.

Boolean

Optional

Default value:

false

Is Intel Exchange Action

Choose true to retrieve Intel Exchange action statistics only.

Boolean

Optional

Default value:

false

Example Request

[
  {
    "object_id": "e907fab8-b3fe-4df2-9ff0-72fd8660dd00",
    "object_type": "indicator",
    "is_ctix_action": true,
    "is_third_action": false
  }
]
Action: Get Advanced Details for a Threat Data Object

This action retrieves additional information about a threat data object, such as kill chain phases and published collections.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

Object Type

Enter the type of the object.

Example:

indicator

Text

Required

Allowed values:

indicator, vulnerability, malware, campaign, threat-actor, intrusion-set, attack-pattern, incident, course-of-action, identity, tool, infrastructure, location, malware-analysis, custom-object, note, observed-data, opinion, report

Object ID

Enter the ID of the object to retrieve the details.

Example:

eee70fcc-a23b-4d3b-a968-fc78b121d112

Text

Required

You can retrieve this using the action List Threat Data.

Example Request

[
  {
    "object_id": "b5dac8de-1c37-4d1d-a008-7ee96d42e543",
    "object_type": "indicator"
  }
]
Action: Get Key Evidence of Confidence Score

This action retrieves the key evidence for the Intel Exchange confidence score calculation.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

Object ID

Enter the unique ID of an object.

Example:

dbd48dae-3505-4ace-9c0e-e617d9ccc269

Text

Required

You can retrieve this using the action List Threat Data.

Object Type

Enter the object type.

Text

Optional

Allowed values:

indicator, vulnerability, malware, campaign, threat-actor, intrusion-set, attack-pattern, incident, course-of-action, identity, tool, infrastructure, location, malware-analysis, custom-object, note, observed-data, opinion, report

Default value:

indicator

Example Request

[
  {
    "object_id": "62789e69-3850-41d0-b46b-b34f4b91a1fb",
    "object_type": "indicator"
  }
]
Action: Get Kill Chain Details

This action retrieves the details of a STIX kill chain phase.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

Kill Chain ID

Enter the ID of a kill chain phase to retrieve the details.

Example:

ae78301c-4378-4348-b83e-2e7b4dd8438b

Text

Required

You can retrieve this using the action List Kill Chain Phases.

Example Request

[
  {
    "kill_chain_id": "27e73c50-7f8d-44c1-bcb4-230661836a72"
  }
]
Action: Get License Details

This action retrieves the license details.

Action Input Parameters

No input parameters are required for this action.

Action: Get Note Details

This action retrieves the details of the specified note.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

Note ID

Enter the note ID to retrieve the details.

Example:

711f396d-0bf9-40bf-8693-e31aff702bbf

Text

Required

You can retrieve this using the action List Notes in Threat Data Object.

Example Request

[
  {
    "note_id": "cd1cb275-b713-4606-b7aa-c373d2bc4575"
  }
]
Action: Get Object Source Details

This action retrieves source-specific details of a threat data object.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

Source Object ID

Enter the source object ID to retrieve the details of a threat data object ingested by a particular source at a given time.

Example:

5e7e2c2d-3e3d-4e7f-a6b3-6b3e6b3e6b3e

Text

Required

You can retrieve this using the action List Threat Data Object Sources.

Object Type

Enter the object type.

Text

Required

Allowed values:

indicator, vulnerability, malware, campaign, threat-actor, intrusion-set, attack-pattern, incident, course-of-action, identity, tool, infrastructure, location, malware-analysis, custom-object, note, observed-data, opinion, report

Default value:

indicator

Example Request

[
  {
    "object_id": "7c4786c6-f537-4793-b2fa-f12cc841e8dd",
    "object_type": "indicator"
  }
]
Action: Get Object Source Details in List View

This action lists all the occurrences when the specified threat data object was ingested into the platform by the given source.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

Object ID

Enter the ID of a threat data object.

Example:

eee70fcc-a23b-4d3b-a968-fc78b121d112

Text

Required

You can retrieve this using the action List Threat Data.

Object Type

Enter the object type.

Example:

indicator

Text

Required

Allowed values:

indicator, vulnerability, malware, campaign, threat-actor, intrusion-set, attack-pattern, incident, course-of-action, identity, tool, infrastructure, location, malware-analysis, custom-object, note, observed-data, opinion, report

Source ID

Enter the ID of a source to retrieve the instances of the source.

Example:

bc8c1d21-3bf1-4b19-bf6b-f31db555c1ec

Text

Required

You can retrieve this using the action List Source Details.

Page Size

Enter the number of results to retrieve on each page.

Integer

Optional

Default value:

10

Page Number

Enter the page number to retrieve results from.

Integer

Optional

Default value:

1

Layout

Enter the layout to filter the number of returned fields in the response.

Example:

tab

Text

Optional

Example Request

[
  {
    "page_no": "1",
    "object_id": "62789e69-3850-41d0-b46b-b34f4b91a1fb",
    "page_size": "2",
    "object_type": "indicator",
    "source_id": "bc8c1d21-3bf1-4b19-bf6b-f31db555c1ec"
  }
]
Action: Get Quick Action Details

This action retrieves the status of the quick actions performed on a threat data object.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

Object Type

Enter the type of the threat data object.

Text

Required

Allowed values:

indicator, vulnerability, malware, campaign, threat-actor, intrusion-set, attack-pattern, incident, course-of-action, identity, tool, infrastructure, location, malware-analysis, custom-object, note, observed-data, opinion, report

Object ID

Enter the ID of a threat data object.

Example:

81f699f3-314d-4a6c-a26b-c5802552c0f7

Text

Required

You can retrieve this using the action List Threat Data.

Example Request

[
  {
    "object_id": "bb4338e4-d654-4bc6-ad4f-8174309f6384",
    "object_type": "indicator"
  }
]
Action: Get Relations Overview

This action retrieves the overall relations statistics of a threat data object.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

Object ID

Enter the object ID to retrieve the details.

Example:

eee70fcc-a23b-4d3b-a968-fc78b121d112

Text

Required

You can retrieve this using the action List Threat Data.

Object Type

Enter the object type.

Text

Required

Allowed values:

indicator, vulnerability, malware, campaign, threat-actor, intrusion-set, attack-pattern, incident, course-of-action, identity, tool, infrastructure, location, malware-analysis, custom-object, note, observed-data, opinion, report

Example Request

[
  {
    "object_id": "bb4338e4-d654-4bc6-ad4f-8174309f6384",
    "object_type": "indicator"
  }
]
Action: Get Report Details

This action retrieves the details of a report.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

Report ID

Enter the report ID to retrieve the details.

Example:

5e7e2c2d-3e3d-4e7f-a6b3-6b3e6b3e6b3e

Text

Required

You can retrieve this using the action List Reports.

Report Type

Enter the report type.

Text

Required

Allowed values:

basic, advanced

Example Request

[
  {
    "report_id": "52331c5e-f491-45fb-8577-749c88c1c84a",
    "report_type": "advanced"
  }
]
Action: Get Report Run Logs

This action retrieves the report run logs.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

Report ID

Enter the report ID to retrieve the run logs.

Example:

5e7e2c2d-3e3d-4e7f-a6b3-6b3e6b3e6b3e.

Text

Required

You can retrieve this using the action List Reports.

Type

Enter the report type.

Text

Required

Allowed values:

basic, advanced

Page Size

Enter the number of results to retrieve on each page.

Integer

Optional

Default value:

10

Page Number

Enter the page number to retrieve results from.

Integer

Optional

Default value:

1

Example Request

[
  {
    "page_no": "1",
    "page_size": "5",
    "report_id": "293b2390-7c50-454f-939b-0e1be8f77bc6",
    "report_type": "basic"
  }
]
Action: Get Result of Parse IOCs Task

This action retrieves the result after successfully processing the create parse IOCs task action.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

Task ID

Enter the ID for the parse IOCs task to retrieve the result.

Example:

345

Integer

Required

You can retrieve this using the action Create Task to Parse IOCs.

Example Request

[
  {
    "task_id": "345"
  }
]
Action: Get Rule Details

This action retrieves the details about a rule.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

Rule ID

Enter the rule ID to get details.

Example:

f44312d8-452a-4c7e-93b5-39af07d642db

Text

Required

You can retrieve this using the action List Rules.

Example Request

[
  {
    "rule_id": "62a40a30-8582-4020-a181-28a10b3e9775"
  }
]
Action: Get Saved Search Details

This action retrieves the details of a saved search.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

Saved Search ID

Enter the ID of the saved search to get details.

Example:

5e7e2c2d-3e3d-4e7f-a6b3-6b3e6b3e6b3e

Text

Required

You can retrieve this using the action List Saved Searches.

Example Request

[
  {
    "saved_search_id": "40a15e3d-8ed8-487f-ab73-52d126b90b8d"
  }
]
Action: Get Signed in User Details

This action retrieves details of the currently logged-in user.

Action Input Parameters

No input parameters are required for this action.

Action: Get Task Details in Threat Data Object

This action retrieves the details of a task.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

Task ID

Enter the unique ID of a task to retrieve the details.

Example:

e536dc79-9d34-4944-855a-64f832568b8c

Text

Required

You can retrieve this using the action List Tasks in Threat Data Object.

Example Request

[
  {
    "task_id": "47e7cb73-af65-43e3-950d-eda05669f6d0"
  }
]
Action: Get Task Details of Parsing IOCs

This action retrieves the details of the specified parse IOCs task.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

Task ID

Enter the ID of a parse IOCs task to retrieve the status.

Example:

345

Integer

Required

Fields

Enter the value to retrieve specific details about the task.

Text

Optional

Allowed values:

status, updated, queue_name, actor_name

Example Request

[
  {
    "fields": "actor_name",
    "task_id": "396"
  }
]
Action: Get Task Overview in Threat Data Object

This action retrieves an overview of the tasks created for a threat data object.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

Object ID

Enter the ID of an object to retrieve an overview of the associated tasks.

Example:

00a26ec9-1490-4cd5-a659-c25525ffc238

Text

Optional

You can retrieve this using the action List Threat Data.

Query

Enter the query to search for a task type.

Example:

indicator

Text

Optional

Priority

Enter the priority of the tasks.

Text

Optional

Allowed values:

high, medium, low

Additional Params

Enter the additional parameters to retrieve the task overview.

Key Value

Optional

Allowed keys:

type, status, created_by, assignee, deadline_gte, deadline_lte

Example Request

[
  {
    "query": "task",
    "priority": "medium",
    "extra_params": {
      "type": "indicator"
    }
  }
]
Action: Get Threat Data Object Details

This action retrieves basic correlated details of a threat data object in Intel Exchange.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

Object ID

Enter the ID of the object to retrieve the details.

Example:

eee70fcc-a23b-4d3b-a968-fc78b121d112

Text

Required

You can retrieve this using the action List Threat Data.

Object Type

Enter the type of the object to retrieve the details.

Example:

indicator

Text

Required

Allowed values:

indicator, vulnerability, malware, campaign, threat-actor, intrusion-set, attack-pattern, incident, course-of-action, identity, tool, infrastructure, location, malware-analysis, custom-object, note, observed-data, opinion, report

Example Request

[
  {
    "object_id": "62789e69-3850-41d0-b46b-b34f4b91a1fb",
    "object_type": "indicator"
  }
]
Action: Get User Details

This action retrieves the details of the specified user.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

User ID

Enter the user ID to retrieve the details.

Example:

eee70fcc-a23b-4d3b-a968-fc78b121d112

Text

Required

You can retrieve this using the action List Users.

Example Request

[
  {
    "user_id": "d29f7b59-91e1-4514-972c-e6bb02799752"
  }
]
Action: Get User Group Details

This action retrieves the details of the specified user group.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

User Group ID

Enter the user group ID to get details.

Example:

cf0e148b-5f7a-4f05-8f4d-081fa1743231

Text

Required

You can retrieve this using the action List User Groups.

Example Request

[
  {
    "user_group_id": "61aa6fee-40a2-4395-94f8-f3b933c98488"
  }
]
Action: Get Widget Data

This action retrieves the data of a particular widget present in Intel Exchange.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

Widget Slug

Enter the widget slug to get details.

Example:

ioc_vs_allowed

Text

Required

You can retrieve this using the action List Widgets.

Created From

Enter the timestamp in epoch to get data from.

Example:

1650375753

Integer

Optional

Created Until

Enter the timestamp in epoch to get data until.

Example:

1650375753

Integer

Optional

Page Size

Enter the number of records to retrieve on each page.

Integer

Optional

Example Request

[
  {
    "size": "4",
    "widget_name": "ioc_vs_allowed",
    "created_from": "1713937557",
    "created_till": "1745473558"
  }
]
Action: Import Intel

This action imports threat data to Intel Exchange.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

File Path

Enter the file path for the data to be imported.

Text

Optional

Allowed values:

.json, .xml, .csv, url

For more information, see Cyware Intel Exchange API documentation.

Collection ID

Enter the ID of the collection to which the file is imported.

Example:

603dd2cf-2c3e-4a6b-8200-505d3586df1f

Text

Optional

You can retrieve this using the action List All Collections.

Version

If the file format is STIX1 or STIX2, enter the STIX version.

Text

Optional

Allowed values:

1.0, 2.0, 2.1

Default value:

2.1

File Format

Enter the format for the import.

Text

Optional

Allowed values:

cy-csv, misp, openioc, stix1, stix2, stix20, stix1url, and csv-recorded-future

Default value:

stix2

URL Type

Enter URL information if the file format is STIX1 URL.

Example:

{\"id\": \"url\",\"name\": \"stix 1.x url\",\"type\": \"url\",\"accept\": \"url\",\"slug\": \"stix1url\"}

Key Value

Optional

STIX1 URL

Enter the URL to specify the location of a STIX 1.x file when the file format is stix1url.

Example:

https://www.exampledomain/sites/default/files/2023-12/aa23-335a.stix__0.xml

Text

Optional

Example Request

[
  {
    "url_type": {},
    "file_path": "/tmp/37f54aff-18e2-4e79-8709-4917203e040a/1745741872_indicatord4263f0f297049c2aa9b5ae186b460faDecember1020240947AM.xml",
    "collection_id": "e8e26917-4e31-49ea-a77f-c1e20f52e15d",
    "format_of_file": "stix1"
  }
]
Action: Ingest STIX Data

This action is used to ingest STIX 2.1 data into Intel Exchange.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

Source ID

Enter the ID of the source to ingest the data in.

Example:

eee70fcc-a23b-4d3b-a968-fc78b121d112

Text

Required

You can retrieve this using the action List Sources.

Collection ID

Enter the ID of the collection to ingest the data into.

Example:

777775a5-5ad2-4239-b5eb-aba1e48f2113

Text

Required

You can retrieve this using the action List Source Collections.

Source Type

Enter the type of the source to ingest the data.

Example:

custom_stix_sources

Text

Required

Bundle

Enter the STIX bundle to ingest the data. Ensure that this is a valid STIX bundle.

Example:

$JSON[{ \"id\": \"bundle--eaa3295e-34bc-432b-9deb-111110fff237\", \"type\": \"bundle\", \"objects\": [ { \"type\": \"attack-pattern\", \"spec_version\": \"2.1\", \"id\": \"attack-pattern--0c7b5b88-8ff7-4a4d-aa9d-feb398cd0061\", \"name\": \"spear phishing\", \"confidence\": 0, \"revoked\": false } ] }]

Any

Required

Imported Timestamp

Enter the imported timestamp.

Example:

1436253893

Integer

Optional

Example Request

[
  {
    "bundle": {
      "id": "bundle--283403c3-f0e2-4667-bef9-651ebafcb14c",
      "objects": [
        {
          "created": "2025-04-17T14:21:02.474369Z",
          "id": "identity--821db0f3-217d-469a-b7a5-666a6444b83d",
          "identity_class": "organization",
          "labels": [
            "company"
          ],
        }
      ],
      "type": "bundle"
    },
    "source_id": "464f7431-68eb-41e6-a6c0-498df8cc1ecf",
    "source_type": "Edgar_Sec_filings",
    "collection_id": "e9654fbd-6a69-48db-8f40-e325106c4f23",
    "imported_timestamp": "1745556697"
  }
]
Action: List Actions

This action retrieves a list of actions performed on a threat data object.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

Object ID

Enter the ID of a threat data object to retrieve actions.

Example:

916e0c84-61a6-412b-a25c-e65d6bcdc96b

Text

Required

You can retrieve this using the action List Threat Data.

Object Type

Enter the object type.

Text

Optional

Allowed values:

attack pattern, campaign, course of action, grouping, and more.

App Type

Enter the type of the app that performed the action.

Example:

ctix

Text

Optional

Action Type

Enter the type of actions to retrieve.

Text

Optional

Allowed values:

manual, automatic

Page Number

Enter the page number to retrieve actions.

Example:

1

Integer

Optional

Default value:

1

Page Size

Enter the number of actions to retrieve on each page.

Example:

3

Integer

Optional

Default value:

10

Example Request

[
  {
    "page_no": "1",
    "app_type": "ctix",
    "object_id": "db4ebc15-2def-4af9-9a92-c464521df3a5",
    "page_size": "5",
    "action_type": "manual",
    "object_type": "domain-name"
  }
]
Action: List All Collections

This action lists all collections on Intel Exchange.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

Page Size

Enter the number of results to retrieve on each page.

Integer

Optional

Default value:

10

Page Number

Enter the page number to retrieve results from.

Integer

Optional

Default value:

1

Sort By

Enter the sorting order for collections based on their creation time.

Text

Optional

Allowed values:

- created to sort in descending order, and created to sort in ascending order

Is Active

Choose true to retrieve active collections.

Boolean

Optional

Default value:

true

Created After

Enter the start time in EPOCH format to retrieve collections created after this timestamp.

Example:

1716958173

Integer

Optional

Created Before

Enter the end time in EPOCH format to retrieve collections before this timestamp.

Example:

1717012366

Integer

Optional

Collection Type

Enter the type of collection.

Text

Optional

Allowed values:

inbox, polling

Query

Enter a keyword to search collections based on the title.

Example:

custom

Text

Optional

Nominal

Choose true to retrieve collections with the ID and name of the collections.

Boolean

Optional

Default value:

false

Additional Params

Enter any additional params to pass with the request.

Key Value

Optional

Allowed values:

polling, inbox, is_editable, has_subscribed, created, marking_config, default_marking_definition

Example Request

[
  {
    "nominal": true,
    "page_no": "1",
    "sort_by": "-created",
    "is_active": true,
    "page_size": "100",
    "created_to": "1745474781",
    "created_from": "1713938777",
    "extra_params": {},
    "collection_type": "inbox"
  }
]
Action: List All Tags

This action lists all tags from Intel Exchange.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

Page Number

Enter the page number to retrieve tags of a specific page.

Integer

Optional

Default value:

1

Page Size

Enter the number of items to retrieve on each page.

Integer

Optional

Default value:

10

Created After

Enter the start time in EPOCH format to filter tags created after this timestamp.

Example:

1716958173

Integer

Optional

Created Before

Enter the end time in EPOCH format to filter tags created before this timestamp.

Example:

1717012366

Integer

Optional

Created By

Enter the ID of the creator to filter tags.

Example:

5f51be4c-c2cf-4dac-9cee-7e289205143c

Text

Optional

You can retrieve this using the action List Users.

Modified From

Enter the modified from time in EPOCH format to filter tags.

Example:

1705363200

Integer

Optional

Modified To

Enter the modified time in EPOCH format to filter tags.

Example:

1706745599

Integer

Optional

Query

Enter the query to search.

Example:

tag-name

Text

Optional

Tag Type

Enter the tag type to filter tags.

Text

Optional

Allowed values:

automated and manual

Additional Params

Enter any additional parameters to pass with the payload.

Example:

'created_from': '1628361607'

Key Value

Optional

Example Request

[
  {
    "page_no": "1",
    "page_size": "6",
    "extra_params": {
      "is_active": "true"
    }
  }
]
Action: List API Feeds

This action lists all API feeds available on Intel Exchange.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

Page Number

Enter the page number to retrieve the results from.

Integer

Optional

Default value:

1

Page Size

Enter the number of records to retrieve on each page.

Integer

Optional

Default value:

10

Retrieve Full List

Choose true to retrieve all API feed sources without pagination.

Boolean

Optional

Default value:

false

Query

Enter a query to filter intel feeds by. This is a free-text match.

Text

Optional

Is Active

Choose true to retrieve active API feed sources.

Boolean

Optional

By default, all available feed sources are retrieved.

Example Request

[
  {
    "page_no": "1",
    "is_active": true,
    "page_size": "10",
    "extra_params": {}
  }
]
Action: List Custom Attributes of Threat Data Object

This action retrieves the custom attributes of a threat data object for all the sources the object has received.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

Object ID

Enter the unique ID of an object.

Example:

dbd48dae-3505-4ace-9c0e-e617d9ccc269

Text

Required

You can retrieve this using the action List Threat Data.

Object Type

Enter the type of the object.

Text

Required

Allowed values:

indicator, vulnerability, malware, campaign, threat-actor, intrusion-set, attack-pattern, incident, course-of-action, identity, tool, infrastructure, location, malware-analysis, custom-object, note, observed-data, opinion, report

Example Request

[
  {
    "object_id": "62789e69-3850-41d0-b46b-b34f4b91a1fb",
    "object_type": "indicator"
  }
]
Action: List Enriched Objects

This action lists the enriched data of the specified threat data object.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

Page Size

Enter the number of records to return on each page.

Integer

Optional

Default value:

10

Page Number

Enter the page number to retrieve results.

Integer

Optional

Default value:

1

Layout

Enter the layout to return the responses.

Example:

overview

Text

Optional

Tool

Enter the enrichment tool ID to return the responses.

Example:

03694ab0-0e9f-45f4-a4c4-2b6eaedd4803

Text

Optional

You can retrieve this using the action List Integrations.

Object Type

Enter the object type to return the responses.

Example:

indicator

Text

Optional

Allowed values:

indicator, vulnerability, malware, campaign, threat-actor, intrusion-set, attack-pattern, incident, course-of-action, identity, tool, infrastructure, location, malware-analysis, custom-object, note, observed-data, opinion, report

Object ID

Enter the object ID to return the responses.

Example:

03694ab0-0e9f-45f4-a4c4-2b6eaedd4803

Text

Optional

You can retrieve this using the action List Threat Data.

Example Request

[
  {
    "object_id": "e0c74e84-ddda-4b5f-85bd-98ef5d7f5fdf",
    "object_type": "indicator",
    "extra_params": {}
  }
]
Action: List Integrations

This action lists integrations configured in Intel Exchange.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

Query

Enter the keyword or integration name to search the tool.

Example:

abuse

Text

Optional

Category

Enter the category to filter integrations by.

Example:

security_information_and_event_managment_system, threat_intelligence_enrichment, endpoint_detection_response, security_orchestration_automation_response, cyware_product

Text

Optional

Is Active

Choose true to retrieve active integrations.

Boolean

Optional

Default value:

false

Nominal

Choose true to retrieve the ID, title, and slug name of the tools.

Boolean

Optional

Default value:

false

Page Number

Enter the page number to retrieve results from.

Integer

Optional

Default value:

1

Page Size

Enter the number of results to retrieve on each page.

Integer

Optional

Default value:

10

Additional Params

Enter any additional parameters to pass.

Example:

q, nominal

Key Value

Optional

Example Request

[
  {
    "page_no": "1",
    "category": "security_information_and_event_managment_system",
    "page_size": "3",
    "extra_params": {}
  }
]
Action: List Intel History

This action retrieves the history of an intel added to Intel Exchange through various sources.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

Page Number

Enter the page number to retrieve results from.

Integer

Optional

Default value:

1

Page Size

Enter the number of items to retrieve on each page.

Integer

Optional

Default value:

10

Component

Enter the component name to retrieve the intel history for that specific source.

Text

Optional

Allowed values:

import-intel, openapi, rss_feed, rule, stix-form, and more

Default value:

quick-add-intel

Filter Query

Enter a query to search for an intel based on the title.

Example:

enter \"ip\" to list all intel items containing \"ip\" in the title.

Text

Optional

Intel Status

Enter a value to retrieve intel based on the status.

Text

Optional

Allowed values:

pending, processing, created, draft, failed, and published

Additional Params

Enter the additional parameters to filter the response.

Example:

'created_from': '1628361607'

Key Value

Optional

Allowed keys:

created_from, created_to, published_from, q, sort, published_to, created_by_id, status, page_size, page, and component.

Example Request

[
  {
    "page": "2",
    "component": "quick-add-intel",
    "page_size": "10",
    "extra_params": {
      "q": "ip",
      "sort": "created"
    }
  }
]
Action: List IOC Types

This action lists all valid indicators of compromise (IOC) types supported by the Intel Exchange platform.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

Query Text

Enter the query to search for an IOC type.

Example:

art

Text

Optional

Example Request

[
  {
    "query_text": "email"
  }
]
Action: List Kill Chain Phases

This action retrieves kill chain information of a threat data object.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

Object Type

Enter the object type.

Example:

indicator

Text

Required

Allowed values:

indicator, vulnerability, malware, campaign, threat-actor, intrusion-set, attack-pattern, incident, course-of-action, identity, tool, infrastructure, location, malware-analysis, custom-object, note, observed-data, opinion, report

Object ID

Enter the ID of a threat data object.

Example:

09730695-2f63-4a1c-a0fb-a042689588d5

Text

Required

You can retrieve this using the action List Threat Data.

Page Number

Enter the page number to retrieve the kill chain phases.

Example:

2

Integer

Optional

Default value:

1

Page Size

Enter the number of records to retrieve on each page.

Example:

4

Optional

Default value:

10

Example Request

[
  {
    "object_id": "b5dac8de-1c37-4d1d-a008-7ee96d42e543",
    "object_type": "indicator"
  }
]
Action: List Notes in Threat Data Object

This action retrieves a list of notes associated with a threat data object.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

Object ID

Enter the ID of a threat data object to retrieve the associated notes.

Example:

916e0c84-61a6-412b-a25c-e65d6bcdc96b

Text

Required

You can retrieve this using the action List Threat Data.

Page Number

Enter the page number to go to a specific page.

Integer

Optional

Default value:

1

Page Size

Enter the number of items to retrieve on each page.

Integer

Optional

Default value:

10

Additional Params

Enter any additional parameters to pass with the payload.

Example:

created_from: 1628361607

Key Value

Optional

Example Request

[
  {
    "page_no": "1",
    "object_id": "7c4786c6-f537-4793-b2fa-f12cc841e8dd",
    "page_size": "2",
    "extra_params": {
      "created_from": "1744720591"
    }
  }
]
Action: List Published Collections of a Threat Object

This action retrieves the published collections of a threat data object.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

Object Type

Enter the object type.

Text

Required

Allowed values:

indicator, vulnerability, malware, campaign, threat-actor, intrusion-set, attack-pattern, incident, course-of-action, identity, tool, infrastructure, location, malware-analysis, custom-object, note, observed-data, opinion, report

Object ID

Enter the ID of a threat data object.

Example:

09730695-2f63-4a1c-a0fb-a042689588d5

Text

Required

You can retrieve this using the action List Threat Data.

Page Size

Enter the number of records to retrieve on each page.

Example:

4

Integer

Optional

Default value:

10

Page Number

Enter the page number to retrieve the details.

Integer

Optional

Default value:

1

Additional Params

Enter additional parameters to list published collections.

Key Value

Optional

Example Request

[
  {
    "object_id": "18950beb-b3f1-41b5-9a13-7c17d1447459",
    "page_size": "2",
    "extra_param": "“Save Node Input” is disabled.",
    "object_type": "indicator"
  }
]
Action: List Relations of Threat Data Object

This action retrieves the list of relations and their details for a given threat data object.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

Object ID

Enter the object ID to get details of.

Example:

eee70fcc-a23b-4d3b-a968-fc78b121d112

Text

Required

You can retrieve this using the action List Threat Data.

Object Type

Enter the object type.

Example:

indicator

Text

Required

Allowed values:

indicator, vulnerability, malware, campaign, threat-actor, intrusion-set, attack-pattern, incident, course-of-action, identity, tool, infrastructure, location, malware-analysis, custom-object, note, observed-data, opinion, report

Sources

Enter the list of IDs of the sources to filter the results by.

Example:

$LIST['7a7ac2cf-51e9-48fe-a2a8-32e7a684cc33']

List

Optional

Page Number

Enter the page number of the response to fetch.

Integer

Optional

Default value:

1

Page Size

Enter the number of items to return on each page.

Integer

Optional

Default value:

10

Additional Data

Enter the additional data to pass to the query.

Example:

{'page_size': 10}

Key Value

Required

Example Request

[
  {
    "object_id": "bb4338e4-d654-4bc6-ad4f-8174309f6384",
    "object_type": "indicator",
    "extra_params": {
      "page": "1"
    }
  }
]
Action: List Reports

This action lists reports on Intel Exchange.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

Type

Enter the report type to query.

Text

Required

Allowed values:

basic, advanced

Page Size

Enter the number of results to retrieve on each page.

Integer

Optional

Default value:

10

Page Number

Enter the page number to retrieve results from.

Integer

Optional

Default value:

1

Repeat Type

Enter the frequency of the report run schedule.

Text

Optional

Allowed values:

daily, weekly, and monthly

Shared Type

Enter the visibility of the reports.

Text

Optional

Allowed values:

private, global

Created By

Enter the ID of the user who created the reports.

Text

Optional

You can retrieve this using the action List Users.

Modified By

Enter the ID of the user who modified the reports.

Text

Optional

You can retrieve this using the action List Users.

Additional Params

Enter any additional parameters to pass with the request.

Key Value

Optional

Allowed values:

created_from, created_to, modified_from, modified_to and more.

Example Request

[
  {
    "page_no": "1",
    "page_size": "10",
    "repeat_type": "daily",
    "report_type": "basic",
    "shared_type": "global",
    "extra_params": {}
  }
]
Action: List Rules

This action lists all the enrichment rules.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

Page Number

Enter the page number to retrieve results from.

Integer

Optional

Default value:

1

Page Size

Enter the number of records to return on each page.

Integer

Optional

Default value:

10

Source

Enter a comma-separated list of source IDs to filter rules with matching source.

Example:

98230f-0e9f-45f4-a4c4-sdv89023hb3423,98230f-0e9f-45f4-a4c4-sdv89023hb3424

Text

Optional

You can retrieve this using the action List Sources.

Created By ID

Enter the Intel Exchange user ID to filter rules created by that user.

Example:

03694ab0-0e9f-45f4-a4c4-2b6eaedd4803

Text

Optional

Status

Enter the status of the rules.

Text

Optional

Allowed values:

draft, active, inactive

By default, rules with all statuses are retrieved.

Last Active Till

Enter the timestamp in epoch to filter successfully executed rules until the given value.

Example:

1579289600

Integer

Optional

Last Active From

Enter the timestamp in epoch to filter successfully executed rules from the given value.

Example:

1579289600

Integer

Optional

Created From

Enter the timestamp in epoch to filter rules created from the given timestamp.

Example:

1579289600

Integer

Optional

Created Until

Enter the timestamp in epoch to filter rules created until the given timestamp.

Example:

1579289600

Integer

Optional

Return Minimal Response

Choose true to return the minimal response. Choose false to retrieve complete details of the objects.

Boolean

Optional

Default value:

true

Is Manual Run

Choose true to retrieve rules that are configured for manual execution only.

Key Value

Optional

Default value:

false

Example Request

[
  {
    "created_to": "1745226984",
    "created_from": "1713690983",
    "extra_params": {},
    "created_by_id": "f023feca-9ba8-40f2-9912-0cc80df9889a",
    "last_active_to": "1745226984",
    "last_active_from": "1713690983"
  }
]
Action: List Saved Result Set

This action retrieves saved result sets from Intel Exchange.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

Version

Enter the saved result set version.

Text

Optional

Allowed values:

v2 and v3

Default value:

v3

Label Name

Enter the tag name to filter data. All data associated with the passed tag will be returned.

Text

Optional

Published From

Enter the start of the published time range in epoch format to retrieve data from this time.

Example:

1649406695

Integer

Optional

Published Till

Enter the end of the published time range in epoch format to retrieve data up to this time.

Example:

1650265251

Integer

Optional

Page Number

Enter the page number to retrieve results from.

Integer

Optional

Default value:

1

Page Size

Enter the number of records to retrieve on each page.

Integer

Optional

Default value:

10

Example Request

[
  {
    "version": "v3"
    "extra_params": {}
  }
]
Action: List Saved Searches

This action lists saved searches on Intel Exchange.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

Page Number

Enter the page number to retrieve results from.

Integer

Optional

Default value:

1

Page Size

Enter the number of results to retrieve on each page.

Integer

Optional

Default value:

10

Search Query

Enter the query to search for a saved search.

Example:

malware

Text

Optional

Additional Params

Enter the extra parameters to list saved searches.

Key Value

Optional

Allowed values:

page, page_size, and query

Example Request

[
  {
    "page_no": "1",
    "page_size": "5",
    "extra_params": {
      "query": "malware"
    }
  }
]
Action: List Source Collections

This action retrieves a list of collections for the sources.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

Source

Enter the unique ID of the source to retrieve associated collections.

Example:

5430d746-61ce-4ef7-b1d9-5c03446eca9a

Text

Optional

You can retrieve this using the action List Sources.

Nominal

Choose true to apply Cyware Query Language (CQL).

Boolean

Optional

CQL Query

Enter the CQL query to filter the source collections.

Str

Optional

Page Number

Enter the page number to retrieve collections.

Integer

Optional

Default value:

1

Page Size

Enter the number of collections to retrieve on each page.

Integer

Optional

Default value:

10

Fetch Imported Collections

Choose true to fetch imported collections.

Boolean

Optional

Default value:

true

Example Request

[
  {
    "page": "2",
    "source": "b2f4ff80-071a-4e5e-b9bc-4f81729a981d",
    "nominal": "False",
    "page_size": "15"
  }
]
Action: List Source Details

This action retrieves the source information for the given object type and object ID.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

Object Type

Enter the object type to retrieve source information.

Text

Required

Allowed values:

indicator, vulnerability, malware, campaign, threat-actor, intrusion-set, attack-pattern, incident, course-of-action, identity, tool, infrastructure, location, malware-analysis, custom-object, note, observed-data, opinion, report

Object ID

Enter the object ID to retrieve source information.

Example:

09730695-2f63-4a1c-a0fb-a042689588d5

Text

Required

You can retrieve this using the action List Threat Data.

Page Number

Enter the page number to retrieve sources.

Example:

2

Integer

Optional

Default value:

1

Page Size

Enter the number of records to retrieve on each page.

Example:

4

Integer

Optional

Default value:

1

Example Request

[
  {
    "page": "1",
    "object_id": "62789e69-3850-41d0-b46b-b34f4b91a1fb",
    "page_size": "2",
    "object_type": "indicator"
  }
]
Action: List Source External References

This action lists all external references associated with a threat data object.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

Object ID

Enter the object ID to retrieve external references.

Example:

5e7e2c2d-3e3d-4e7f-a6b3-6b3e6b3e6b3e

Text

Required

You can retrieve this using the action List Threat Data.

Object Type

Enter the object type.

Example:

indicator

Text

Required

Allowed values:

indicator, vulnerability, malware, campaign, threat-actor, intrusion-set, attack-pattern, incident, course-of-action, identity, tool, infrastructure, location, malware-analysis, custom-object, note, observed-data, opinion, report

Page Size

Enter the number of results to retrieve on each page.

Integer

Optional

Default value:

10

Page Number

Enter the page number to retrieve results from.

Integer

Optional

Default value:

1

Example Request

[
  {
    "page_no": "2",
    "object_id": "ebe800fc-c49d-443d-a924-020cd651d7ce",
    "page_size": "1",
    "object_type": "indicator"
  }
]
Action: List Sources

This action lists all the feed sources.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

Source Type

Enter a comma-separated list of the source type name to filter sources based on the type.

Example:

custom_stix_sources,web_scrapper

Text

Optional

Nominal

Choose true to apply Cyware Query Language (CQL).

Boolean

Optional

Default value:

false

Page Number

Enter the page number to retrieve sources from.

Integer

Optional

Default value:

1

Page Size

Enter the number of sources to be retrieved on each page.

Integer

Optional

Default value:

10

Query

Enter the query to filter the response. Set nominal to true to run the query.

Text

Optional

Example Request

[
  {
    "nominal": false,
    "page_no": "1",
    "page_size": "10",
    "source_type": "custom_stix_sources,web_scrapper"
  }
]
Action: List Source Types

This action retrieves the types of feed sources available in the Intel Exchange platform.

Action Input Parameters

No input parameters are required for this action.

Action: List Subscribers

This action lists the subscribers configured in Intel Exchange.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

Page Number

Enter the page number to retrieve results from.

Integer

Optional

Default value:

1

Page Size

Enter the number of results to retrieve on each page.

Integer

Optional

Default value:

10

Subscriber ID

Enter the subscriber ID to filter the response based on it.

Example:

5d4f094e-df41-442b-a12b-9977e7128003

Text

Optional

Organization Name

Enter the organization name to filter subscribers.

Example:

acme

Text

Optional

Retrieve Active Subscribers

Choose true to retrieve active subscribers. Pass false to retrieve inactive subscribers.

Boolean

Optional

Default value:

true

Nominal

Choose true to retrieve only the name and ID of the subscribers.

Boolean

Optional

Default value:

false

Added After

Enter the start time in epoch format to filter subscribers added after this timestamp.

Example:

1716958173

Integer

Optional

Added Before

Enter the end time in epoch format to filter subscribers added before this timestamp.

Example:

1717012366

Integer

Optional

Sort By

Enter the sorting order for subscribers based on their creation time.

Text

Optional

Allowed values:

-created (to sort in descending order) and created (to sort in ascending order).

Additional Params

Enter any additional parameters to pass.

Example:

last_pull_from and last_pull_to

Key Value

Optional

Example Request

[
  {
    "page_no": "1",
    "page_size": "6",
    "extra_params": {
      "sort": "-created",
      "nominal": "true"
    }
  }
]
Action: List Tasks in Threat Data Object

This action retrieves the list of tasks associated with a threat data object.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

Object ID

Enter the ID of a threat data object to retrieve the associated tasks.

Example:

00018ede-2695-4fa1-b253-56374f18bca8

Text

Required

You can retrieve this using the action List Threat Data.

Created By

Enter the ID of a user to filter tasks by the user who created the task.

Example:

0eea7e23-9670-4c5f-9742-2666ddf0be74

Text

Optional

You can retrieve this using the action List Users.

Start Date

Enter the start date of the task deadline in epoch format to filter tasks.

Example:

1623393469

Integer

Optional

End Date

Enter the end date of the task deadline in epoch format to filter tasks.

Example:

1623393501

Integer

Optional

Page Number

Enter the page number to go to a specific page.

Integer

Optional

Default value:

1

Page Size

Enter the number of items to retrieve on each page.

Integer

Optional

Default value:

10

Task Assignee

Enter the ID of a user to filter tasks by the assigned user.

Example:

ed213e1e-fa2b-476e-8778-4d4c61722494

Text

Optional

You can retrieve this using the action List Users.

Task Status

Enter the status to filter tasks.

Example:

not_started

Text

Optional

Task Priority

Enter the priority to filter tasks.

Example:

medium

Text

Optional

Allowed values:

low, medium, high

Additional Params

Enter the additional parameters to list tasks.

Key Value

Optional

Allowed values:

page, page_size, priority, status, assignee, deadline_gte, deadline_lte, created_by, object_id

Example Request

[
  {
    "object_id": "1879725552434888956",
    "created_by": "c9a511e8-18be-444f-9f27-d8fb61e7e8c0",
    "deadline_gte": "1743017400",
    "deadline_lte": "1744968838",
    "extra_params": {
      "page": "1",
      "status": "not_started",
      "page_size": "2"
    }
  }
]
Action: List Threat Data

This action retrieves a list of threat data objects available for use in the Threat Investigations Canvas in Intel Exchange.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

CQL Query

Enter the CQL to list threat data.

Example:

type = 'indicator'

Text

Optional

Page Number

Enter the page number to retrieve results from.

Integer

Optional

Default value:

1

Page Size

Enter the number of results to retrieve on each page.

Integer

Optional

Default value:

10

Enrichment

Choose true to retrieve the details of the last enrichment for the objects that can be enriched.

Boolean

Optional

Default value:

true

Sort by

Enter the value to sort the response.

Example:

ctix_created

Text

Optional

Allowed values:

valid_from, valid_until, ctix_modified, type, id, sub_type, indicator_type, ioc_type, tlp, tags, sources, source_collections, subscribers, published_collections, subscriber_collections, severity, last_seen, first_seen, created, modified, ctix_created, name, country, confidence_score, analyst_score, analyst_tlp, confidence_type, source_confidence, is_reviewed, is_under_review, is_deprecated, is_whitelisted, is_revoked, is_false_positive, is_actioned, primary_attribute, is_watchlist, custom_attributes, analyst_cvss_score, source_created, received_id, pattern, custom_scores, marking_definitions, analyst_markings

Retry Count

Enter the number of times to retry the request in case of a failure.

Integer

Optional

Maximum allowed value:

10

Default value:

3

Retry Interval

Enter the interval (seconds) between retries.

Integer

Optional

Maximum allowed value:

10

Default value:

2

Additional Params

Enter additional parameters to list threat data.

Key Value

Optional

Example Request

[
  {
    "page_no": "2",
    "cql_query": "type='indicator'",
    "page_size": "25",
    "enrichment": false,
    "page_limit": "30",
    "extra_params": {
      "sort": "ctix_created"
    }
  }
]
Action: List Threat Data Object Details in Table View

This action retrieves threat data object details in a tabular format.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

Object ID

Enter the ID of a threat data object.

Example:

09730695-2f63-4a1c-a0fb-a042689588d5

Text

Required

You can retrieve this using the action List Threat Data.

Object Type

Enter the object type.

Text

Required

Allowed values:

indicator, vulnerability, malware, campaign, threat-actor, intrusion-set, attack-pattern, incident, course-of-action, identity, tool, infrastructure, location, malware-analysis, custom-object, note, observed-data, opinion, report

Page Number

Enter the page number to retrieve the details.

Integer

Optional

Default value:

1

Page Size

Enter the number of records to retrieve per page.

Integer

Optional

Default value:

10

Example Request

[
  {
    "page_no": "1",
    "object_id": "62789e69-3850-41d0-b46b-b34f4b91a1fb",
    "page_size": "2",
    "object_type": "indicator"
  }
]
Action: List Threat Data Object Sources

This action retrieves a list of feed sources associated with a threat data object, along with their description, fanged description, and de-fanged description.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

Object ID

Enter the ID of a threat data object.

Example:

09730695-2f63-4a1c-a0fb-a042689588d5

Text

Required

You can retrieve this using the action List Threat Data.

Object Type

Enter the object type.

Text

Required

Allowed values:

indicator, vulnerability, malware, campaign, threat-actor, intrusion-set, attack-pattern, incident, course-of-action, identity, tool, infrastructure, location, malware-analysis, custom-object, note, observed-data, opinion, report

Example Request

[
  {
    "object_id": "62789e69-3850-41d0-b46b-b34f4b91a1fb",
    "object_type": "indicator"
  }
]
Action: List User Groups

This action retrieves a list of user groups from Intel Exchange.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

Query

Enter a query to filter user groups by.

Example:

admin

Text

Optional

Page Number

Enter the page number of the response to fetch.

Integer

Optional

Default value:

1

Page Size

Enter the number of items to return per page.

Integer

Optional

Default value:

10

Additional Params

Enter any additional parameters to pass with the payload.

Example:

is_active: true, created_from: 1628361607

Key Value

Optional

Allowed values:

page, page_size, created_by, created_from, created_to, is_active, and q

Example Request

[
  {
    "query": "admin",
    "page_no": "1",
    "page_size": "5",
    "extra_params": {
      "is_active": "true"
    }
  }
]
Action: List Users

This action lists all the users of the Intel Exchange application.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

Query

Enter a query to filter users by.

Example:

john doe

Text

Optional

Page Number

Enter the page number of the response to fetch.

Integer

Optional

Default value:

1

Page size

Enter the number of items to return on each page.

Integer

Optional

Default value:

10

Additional Params

Enter any additional parameters to pass with the payload.

Key Value

Optional

Allowed keys:

invited_by, sort, is_active, is_blocked, page, page_size, created_from, created_to, q, invite_status, activity_from, activity_to, and group

Example Request

[
  {
    "query": "User",
    "page_no": "1",
    "page_size": "10",
    "extra_params": {
      "sort": "date_joined",
      "invite_status": "INVITED"
    }
  }
]
Action: List Widgets

This action lists widgets present in Intel Exchange.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

Widget Location

Enter the types of widgets to retrieve in comma-separated values.

Text

Optional

Allowed values:

dashboard, hero, custom-dashboard-widget, information-widget, custom-hero-card

Default value:

dashboard

Page Number

Enter the page number to retrieve results from.

Integer

Optional

Default value:

1

Page Size

Enter the number of records to retrieve on each page.

Integer

Optional

Default value:

10.

Created By

Enter the ID of the creator of the widgets to filter widgets.

Example:

a2b82e81-8e7d-4e68-8a36-3d2d9cd518ad

Text

Optional

You can retrieve this using the action List Users.

Example Request

[
  {
    "page_no": "1",
    "page_size": "6",
    "extra_params": {
        "widget_location": "dashboard"
    }
  }
]
Action: Perform Action on Threat Data Object

This action performs an action on a threat data object. You can perform actions, such as deprecate, reinstate as active, add an analyst TLP, add an analyst score, and more.

Action Input Parameters 

Parameter

Description

Field Type

Required/Optional

Comments

Action to Take 

Enter the action to perform on the IOC. 

Example: 

deprecate

Text

Required

Allowed values:

deprecate, un_deprecate, reviewed, manual_review, whitelist, un_whitelist, false_positive, un_false_positive, analyst_tlp, analyst_score, add_tag, add_relation, delete, revoke_intel

Object ID  

Enter the ID of the object to perform the action on. 

Example:

eee70fcc-a23b-4d3b-a968-fc78b121d112

Text

Required

You can retrieve this ID using the List Threat Data action. 

Object Type 

Enter the IOC type. 

Text

Required

Allowed values:

indicator, vulnerability, malware, campaign, threat-actor, intrusion-set, attack-pattern, incident, course-of-action, identity, tool, infrastructure, location, malware-analysis, custom-object, note, observed-data, opinion, report

Default value:

indicator

Additional Data 

Enter any additional data to pass. 

Note: The data is sent as part of the payload.

Key Value

Optional

Additional Params 

Enter any additional params to pass to the request.

Key Value

Optional

Example Request

[
  {
    "object_id": "bb4338e4-d654-4bc6-ad4f-8174309f6384",
    "extra_data": {
      "data": {
        "tag_id": [
          "1ff8fec7-f34a-42a2-b64e-0b327c330c3b"
        ]
      }
    },
    "object_type": "indicator",
    "action_to_take": "add_tag"
  }
]
Action: Perform Bulk Action on Rules

This action updates multiple rules in one operation.

Action Input Parameters 

Parameter

Description

Field Type

Required/Optional

Comments

Rule ID List 

Enter the list of IDs of the rules to update. 

Example:

$LIST[2b91dfe5-8559-4f7e-a64b-5ad87c18ec7e]

List

Required

You can retrieve the rule IDs using the List Rules action. 

Action 

Enter the action to perform to update the rules. 

Example:

follow

Text

Required

Allowed values:

follow (to follow rules), unfollow (to unfollow rules), inactivate (to deactivate rules), active (to activate rules)

Example Request

[
  {
    "action": "follow",
    "rule_id_list": [
      "683b4a36-3f83-49b1-83a0-c1f5dd508",
      "e550f4ed-cb05-4320-9799-8574a344a"
    ]
  }
]
Action: Perform Bulk Action on Threat Data

This action performs an action on multiple threat data objects.

Action Input Parameters 

Parameter

Description

Field Type

Required/Optional

Comments

Action Type 

Enter the action to perform on multiple threat data objects. 

Text

Required

Allowed values: 

deprecate, un_deprecate, manual_review, reviewed, whitelist, un_whitelist, false_positive, and un_false_positive

Object IDs 

Enter the list of threat data object IDs to perform the bulk action. 

For example, $list[49d5e95e-3889-42de-8280-1ebf5c7cb95a, 71cd9a67-aa10-4016-bd32-b44534b2e1b9]

List

Required

You can retrieve this ID using theList Threat Data action. 

Object Type 

Enter the type of threat data objects. 

Example:

indicator

Text

Required

Allowed values:

indicator, vulnerability, malware, campaign, threat-actor, intrusion-set, attack-pattern, incident, course-of-action, identity, tool, infrastructure, location, malware-analysis, custom-object, note, observed-data, opinion, report

Deprecated After 

Enter the time (in epoch) after which the threat data objects will be deprecated. 

For example, 1712345678. 

Note: You must pass this parameter if the action type is un_deprecate.

Integer

Optional

Example Request

[
  {
    "object_ids": [
      "c0022d5a-928f-43cd-853d-0511c500f99e",
      "53724dbe-1dde-4c90-9c06-25c7890dc766"
    ],
    "action_type": "reviewed",
    "object_type": "indicator"
  }
]
Action: Preview Threat Data Object

This action retrieves specific details of a threat data object for preview purposes.

Action Input Parameters 

Parameter

Description

Field Type

Required/Optional

Comments

Object Type 

Enter the type of threat data object. 

For example, vulnerability

Text

Required

Allowed values:

indicator, vulnerability, malware, campaign, threat-actor, intrusion-set, attack-pattern, incident, course-of-action, identity, tool, infrastructure, location, malware-analysis, custom-object, note, observed-data, opinion, report

Object ID 

Enter the ID of the threat data object to preview details. 

For example, 7de86a9c-320b-4678-96b9-d9c99656bd8a

Text

Required

You can retrieve this ID using the List Threat Data action. 

Example Request 

[
  {
    "object_id": "efd2a3f0-c257-4c3d-8899-5e46fb21628b",
    "object_type": "domain-name"
  }
]
Action: Quick Add Intel

This action creates intel in Intel Exchange by providing minimal details of indicators, SDOs, relations, custom objects, and indicators parsed from free text.

Action Input Parameters 

Parameter

Description

Field Type

Required/Optional

Comments

Title 

Enter the title of the intel within 100 characters. 

Example:

1.1.1.1

Text

Required

All SDOs 

Enter the SDO and IOC objects to add to the intel. This must be passed as sdo_name : sdo_value. 

Example:

{vulnerabilities: $JSON[[{\"value\": \"vul1\",\"custom_attributes\": {\"x_custom_attribute1\": \"sample value 1\",\"x_custom_attribute2\": \"sample value 2\"}}]]}

Key Value

Optional

Source 

Enter the source of the data being added. 

Example:

miscellaneous

Text

Optional

Default value is cyware_orchestrate

Collection name 

Enter the collection name the intel belongs to. This parameter is mandatory in versions before Intel Exchange v3.3.2. 

Example:

csol-coll

Text

Optional

Confidence score 

Enter the confidence score of the indicators being passed. This parameter is mandatory in versions before Intel Exchange v3.3.2. 

Example:

80

Integer

Optional

TLP 

Enter the TLP of the indicators. The TLP must be capitalized. This parameter is mandatory in versions before Intel Exchange v3.3.2.

Example:

clear

Text

Optional

Indicators 

Enter all the indicators to add to the intel. The allowed format is indicator_type : indicator_value

Example:

{\"ipv4-addr\": \"1.2.34.21\"}

Key Value

Optional

Allowed indicator types are ipv4-addr, ipv6-addr, domain, url, email, md5, sha1, sha224, sha256, sha384, sha512, ssdeep.

SDOs 

Enter the stix-compliant-SDOs to associate with the indicators. The allowed format is sdo_name : sdo_value. 

Example:

{\"vulnerability\": \"log4j\"}

Key Value

Optional

Custom Attributes 

Enter any additional custom attributes to be passed as a key-value pair. 

Example:

{\"x_test_attribute\": \"test_attribute\"}

Key Value

Optional

Label 

Enter the list of tags for the indicators. This is supported in Intel Exchange from the release v3.3.2 and later versions. 

Example:

$LIST[label_1,label_2]

List

Optional

Example Request

[
  {
    "source": "cyware_orchestrate",
    "collection": "cyware_orchestrate2",
    "metadata": {
      "confidence": 85,
      "tlp": "RED",
      "labels": [
        "x--internal--acd",
        "malware-campaign"
      ]
    },
    "title": "Suspicious Campaign Targeting Financial Sector",
    "all_sdos": {
      "all_iocs": {
        "ipv4": [
          {
            "value": "45.77.89.120",
            "description": "Known C2 server observed in phishing campaign",
            "is_false_positive": false,
            "notes": [
              "Identified during threat hunting on 2025-06-09.",
              "Correlated with indicators from FIN7 campaign."
            ],
            "custom_attributes": {
              "x_threat_level": "high",
              "x_discovered_by": "SOC team"
            }
          }
        ],
        "ipv6": [
          {
            "value": "2607:f8b0:4004:802::200e",
            "custom_attributes": {
              "x_threat_level": "medium",
              "x_discovered_by": "automated scan"
            }
          }
        ],
        "domain": [
          {
            "value": "malicious-update.com",
            "custom_attributes": {
              "x_malware_family": "Emotet",
              "x_status": "blacklisted"
            }
          }
        ],
        "url": [
          {
            "value": "http://malicious-update.com/download",
            "custom_attributes": {
              "x_file_type": "exe",
              "x_hosting_provider": "Namecheap"
            }
          }
        ],
        "email_address": [
          {
            "value": "attacker@fakecompany.com",
            "custom_attributes": {
              "x_campaign_id": "phish-2025-Q2",
              "x_target_group": "finance"
            }
          }
        ],
        "md5": [
          {
            "value": "44d88612fea8a8f36de82e1278abb02f",
            "custom_attributes": {
              "x_file_name": "invoice.exe",
              "x_analysis_status": "malicious"
            }
          }
        ],
        "sha1": [
          {
            "value": "da39a3ee5e6b4b0d3255bfef95601890afd80709",
            "custom_attributes": {
              "x_source": "sandbox",
              "x_behavior": "network beaconing"
            }
          }
        ],
        "sha224": [
          {
            "value": "d14a028c2a3a2bc9476102bb288234c415a2b01f828ea62ac5b3e42f",
            "custom_attributes": {
              "x_usage": "hash validation",
              "x_detection_tool": "YARA"
            }
          }
        ],
        "sha256": [
          {
            "value": "cf83e1357eefb8bd... (truncated for brevity)",
            "custom_attributes": {
              "x_origin": "threat feed",
              "x_verified": "true"
            }
          }
        ],
        "sha384": [
          {
            "value": "ca737f1014a48f4c... (truncated for brevity)",
            "custom_attributes": {
              "x_confidence": "90",
              "x_tool": "HybridAnalysis"
            }
          }
        ],
        "sha512": [
          {
            "value": "0cf918c2b2d6a0f2... (truncated for brevity)",
            "custom_attributes": {
              "x_malware_type": "Trojan",
              "x_risk_score": "9.2"
            }
          }
        ],
        "ssdeep": [
          {
            "value": "768:Hd29GdQ... (truncated)",
            "custom_attributes": {
              "x_similarity_to": "sample_malware_v2",
              "x_cluster_id": "cl1234"
            }
          }
        ]
      },
      "vulnerabilities": [
        {
          "value": "CVE-2024-21412",
          "custom_attributes": {
            "x_cvss_score": "8.8",
            "x_patch_available": "yes"
          }
        }
      ],
      "malwares": [
        {
          "value": "RedLineStealer",
          "custom_attributes": {
            "x_type": "infostealer",
            "x_delivery_method": "phishing email"
          }
        }
      ],
      "campaigns": [
        {
          "value": "Operation SpearPhish",
          "custom_attributes": {
            "x_start_date": "2025-05-10",
            "x_target_industry": "financial"
          }
        }
      ],
      "threat_actors": [
        {
          "value": "APT28",
          "custom_attributes": {
            "x_country_origin": "Russia",
            "x_motivation": "espionage"
          }
        }
      ],
      "intrusion_sets": [
        {
          "value": "FancyBear",
          "custom_attributes": {
            "x_associated_actor": "APT28",
            "x_known_ttp": "spear-phishing with macro-enabled docs"
          }
        }
      ],
      "attack_patterns": [
        {
          "value": "Spear Phishing Attachment",
          "custom_attributes": {
            "x_mitre_id": "T1193",
            "x_tactic": "initial-access"
          }
        }
      ],
      "course_of_actions": [
        {
          "value": "Block IOCs at Firewall",
          "custom_attributes": {
            "x_type": "network",
            "x_effectiveness": "high"
          }
        }
      ],
      "identities": [
        {
          "value": "FinanceCorp Security Team",
          "custom_attributes": {
            "x_contact_email": "soc@financecorp.com",
            "x_role": "defender"
          }
        }
      ],
      "tools": [
        {
          "value": "Cobalt Strike",
          "custom_attributes": {
            "x_usage": "post-exploitation",
            "x_detected_by": "EDR tool"
          }
        }
      ],
      "locations": [
        {
          "value": "Bangalore Office",
          "custom_attributes": {
            "x_type": "geo",
            "x_importance": "primary target region"
          },
          "type": "latitude-longitude",
          "latitude": 12.9716,
          "longitude": 77.5946
        }
      ],
      "malware_analysis": [
        {
          "value": "RedLine Payload Analysis",
          "custom_attributes": {
            "x_tool": "Cuckoo Sandbox",
            "x_result": "network beaconing to 45.77.89.120"
          }
        }
      ]
    }
  }
]
Action: Retrieve Intel Statistics

This action retrieves the statistics history for the specified intel component. By default, the statistics for “quick-add-intel” are returned. 

Action Input Parameters 

Parameter

Description

Field Type

Required/Optional

Comments

Component 

Enter the component to retrieve the statistics history. 

Example:

rss_feed 

Text

Optional

Allowed values:

import-intel, openapi, quick-add-intel, rss_feed, stix-form, rule, threat-bulletin, threatmailbox, x-twitter, visualizer, malware_sandbox, threat-data, browser-extension

Default value:

quick-add-intel

Example Request

[
  {
    "component": "quick-add-intel"
  }
]
Action: Retrieve Quick Add Intel Relation Objects

This action retrieves the details of the threat objects (indicators, SDOs, SCOs, relations, and custom objects) that are ingested and added as relationship objects that is created as part of the quick add intel submission.

Action Input Parameters 

Parameter

Description

Field Type

Required/Optional

Comments

Report ID 

Enter the unique ID of a report object to retrieve the related objects. 

Example:

d42fb454-62c7-4b5f-9330-40036bd2da1f

Text

Required

You can retrieve this using the action List Reports.

Query 

Enter the query to filter based on object name. 

Example:

sa12dfad

Text

Optional

Page Size 

Enter the number of objects to retrieve on each page. 

Example:

100

Integer

Optional

Default value:

10

Page Number 

Enter the page number to retrieve details of threat objects ingested from. 

Example:

5

Integer

Optional

Default value:

1

Example Request

[
  {
    "report_id": "8cebebfe-7794-4135-88e9-abf371526beb"
  }
]
Action: Retrieve Quick Add Intel Status

This action retrieves the intel creation status of a quick add intel submission.

Action Input Parameters 

Parameter

Description

Field Type

Required/Optional

Comments

Task ID 

Enter the quick add intel task ID to retrieve the intel creation status. 

For example, 139e97e9-51fa-4717-bcfa-1cd226a8a76d

Text

Required

You can retrieve the task ID using the List Tasks in Threat Data Object action. 

Example Request 

[
  {
    "task_id": "c7d167d6-6305-4010-ac9a-fdd733ee795b"
  }
]
Action: Run Report

This action runs a specific report.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

Report ID

Enter the report ID to run.

Example:

5e7e2c2d-3e3d-4e7f-a6b3-6b3e6b3e6b3e

Text

Required

You can retrieve this using the action List Reports.

Report Type

Enter the report type.

Text

Required

Allowed values:

basic, advanced

Start Time

Enter the start time in epoch format from which the report should capture data.

Example:

1596825599

Integer

Required

End Time

Enter the end time in epoch format until which the report should capture data.

Example:

1676825599

Integer

Required

File Types

Enter the file types for the report.

List

Required

Allowed values:

csv, xls (for basic reports), pdf (for advanced reports)

Internal Recipients

Enter the internal recipients to share the report with. You must enter at least one internal or external recipient to run the report.

Key Value

Optional

External Recipients

Enter the external recipients to share the report with. You must enter at least one internal or external recipient to run the report.

Key Value

Optional

Example Request

[
  {
    "end_time": "1745306213",
    "report_id": "70c4c1dc-3503-43d0-a925-2e88da90d79b",
    "file_types": [
      "csv"
    ],
    "start_time": "1745219817",
    "report_type": "advanced",
    "internal_recipients": {
      "to": [
        {
          "user_id": "3504aa4a-1e56-40c6-89d7-fc3c6adc2b03",
          "first_name": "John",
          "last_name": "Doe",
          "email": "john.doe@cyware.com"
        }
      ]
    }
  }
]
Action: Run Rule

This action runs a rule in Intel Exchange.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

Rule ID

Enter the rule ID to run.

Example:

4i9a8f0q9d-3e3d-4e7f-a6b3-6b3e6b3e6b3e.

Text

Required

You can retrieve this using the action List Rules.

Start Time

Enter the timestamp value in epoch to filter threat data created from the given timestamp.

Example:

1579289600

Integer

Required

End Time

Enter the timestamp value in epoch to filter threat data created up to the given timestamp.

Example:

1579289600

Integer

Required

Example Request

[
  {
    "rule_id": "09e38940-6652-4db2-bb83-7fd5d637b906",
    "end_time": "1745302763",
    "start_time": "1713690983",
    "extra_params": {}
  }
]
Action: Update Note in Threat Data Object

This action updates the details of a note in Intel Exchange.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

Note ID

Enter the ID of the note to update the details.

Example:

8003c6ba-5215-486d-881f-d940dcb78d35

Text

Required

You can retrieve this using the action List Notes in Threat Data Object.

Description

Enter the updated note description.

Example:

Updated with the latest IOC analysis details

Text

Optional

Note Type

Enter the note type to update.

Text

Optional

Allowed values:

indicator, vulnerability, malware, campaign, threat-actor, intrusion-set, attack-pattern, incident, course-of-action, identity, tool, infrastructure, location, malware-analysis, custom-object, note, observed-data, opinion, report

Metadata

Enter any additional metadata associated with the note.

Key Value

Optional

Provide structured context for the note

Example Request

[
  {
    "text": "Updated with the latest IOC analysis details",
    "note_id": "cd1cb275-b713-4606-b7aa-c373d2bc4575",
    "meta_data": {},
    "note_type": "indicator"
  }
]
Action: Update Task in Threat Data Object

This action updates a task of a threat data object.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

Task ID

Enter the unique identifier of a task to update the details.

Example:

766d52d1-1575-4fb1-9d67-0d7445c919e8

Text

Required

You can retrieve this using the action List Tasks in Threat Data Object.

Assignee

Enter the ID of a user to assign the task.

Example:

5555f14c-6130-4e58-a2da-33e1a85b5a64

Text

Required

You can retrieve this using the action List Users.

Description Text

Enter the description of the task to be performed.

Example:

Verify this indicator

Text

Required

Object ID

Enter the ID of the threat data object to associate with the task. If you do not enter this, the task is created as a global task.

Example:

92686150-58e5-4f15-be64-f3e123efd825

Text

Optional

You can retrieve this using the action List Threat Data Object.

Priority

Enter the priority of the task.

Text

Required

Allowed values:

high, medium, low

Status

Enter the status of the task.

Text

Optional

Allowed values:

not_started, in_progress, completed

Closure Comment

Enter the comment to close the task. This is required if Status is completed.

Text

Optional

Additional Fields

Enter the additional fields to update the task in the threat data object.

Key_value

Optional

Allowed keys:

deadline, type

Example Request

[
  {
    "status": "completed",
    "task_id": "e6c11d76-ba27-483c-b877-2e1bf5e6ac56",
    "assignee": "1eace06e-0d26-4738-8544-6a22e938f113",
    "priority": "high",
    "object_id": "a323e45c-0e8e-490e-8a34-a30687ab5610",
    "extra_fields": {
      "type": "malware"
    },
    "closure_comment": "Task is completed",
    "description_text": "Updating the status"
  }
]
Action: Update User Details

This action is used to update the user details on Intel Exchange.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

User ID

Enter the unique identifier of the user whose details you want to update.

Example:

cf0e148b-5f7a-4f05-8f4d-081fa1743231

Text

Required

You can retrieve this using the action List Users.

User Groups

Enter a list of user groups to assign to the user.

Example:

$JSON[[{"id":"8003c6ba-5215-486d-881f-d940dcb78d35"}]]

Any

Required

Username

Enter the LDAP username of the user.

Example:

JohnDoe

Text

Required

First Name

Enter the first name of the user.

Example:

John

Text

Optional

Last Name

Enter the last name of the user.

Example:

Doe

Text

Optional

Email Alerts

Choose true if the user wants to receive email alerts on the associated email ID from Intel Exchange.

Boolean

Optional

Default value:

True

SMS Alerts

Choose true if the user wants to receive the SMS alerts on the associated contact number from Intel Exchange.

Boolean

Optional

Default value:

True

Is Active

Choose true if the user is an active user.

Boolean

Optional

Default value:

True

Contact Number

Enter the contact number of the user to update.

Text

Optional

Additional Params

Enter any additional parameters to pass with the payload.

Key value

Optional

Example Request

[
  {
    "user_id": "f2779b7b-e8fa-4996-baa4-5f89073ed372",
    "username": "JohnDoe",
    "is_active": true,
    "last_name": "Doe",
    "first_name": "John",
    "user_groups": [
      {
        "id": "2b5b1103-1a62-43a0-b10e-7b89520abee1",
        "name": "Admin"
      }
    ],
    "extra_params": {}
  }
]
Action: Update User Group Details

This action updates the user group details on Intel Exchange.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

User Group ID

Enter the user group ID to update.

Example:

cf0e148b-5f7a-4f05-8f4d-081fa1743231

Text

Required

You can retrieve this using the action List User Groups.

User Group Name

Enter the name of the user group to update.

Example:

Sample Group Name

Text

Required

Allowed Tag Types

Enter the allowed tag types to update.

Example:

$JSON[[{"id": "user","name": "User","colour_code": "#0068FA","is_default": false,"theme": "blue"}]]

Any

Required

User Groups Permissions

Enter a list of permissions to assign to the user group.

Example:

$JSON[[{ "id": "8003c6ba-5215-486d-881f-d940dcb78d35"}]]

Any

Required

Is Active

Choose true if the user group is active.

Boolean

Required

Description

Enter a description for the group to update.

Text

Optional

Additional Params

Enter any additional parameters to pass with the payload.

Example:

email_alerts: true

Key value

Optional

Example Request

[
  {
    "is_active": true,
    "user_group": "Admin",
    "description": "Includes permissions to all Intel Exchange features.",
    "extra_params": {},
    "user_group_id": "61aa6fee-40a2-4395-94f8-f3b933c98488",
    "allowed_tag_types": [
      {
        "id": "user",
        "name": "User",
        "colour_code": "#0068FA",
        "is_default": false,
        "theme": "blue"
      },
      {
        "id": "source",
        "name": "Source",
        "colour_code": "#45505E",
        "is_default": false,
        "theme": "neutral"
      },
      {
        "id": "system",
        "name": "System",
        "colour_code": "#27865F",
        "is_default": false,
        "theme": "green"
      }
    ],
    "user_groups_permissions": [
      {
        "id": "d01c979b-8e9e-4da6-b35e-2314516a9aff"
      }
    ]
  }
]
Action: Generic Action

This is a generic action to perform any additional use case that you want on Cyware Intel Exchange.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

Method

Enter the HTTP method to make the request.

Text

Required

Allowed values:

GET, PUT, POST, DELETE

Endpoint

Enter the endpoint to make the request to.

Example:

ingestion/reports/

Text

Required

Query Params

Enter the query parameters to pass to the API.

Key Value

Optional

Payload

Enter the payload to pass to the API.

Any

Optional

Extra Fields

Enter the additional data to pass to the API.

Key Value

Optional

Allowed keys:

headers, payload_json, files, retry_wait, retry_count, custom_output, and response_type

Example Request

[
  {
    "method": "POST",
    "payload": {
      "query": "type =\"indicator\""
    },
    "endpoint": "ingestion/threat-data/list/",
    "extra_fields": {},
    "query_params": {
      "page": "3",
      "page_size": "25",
      "page_limit": "30"
    }
  }
]