Skip to main content

Cyware Orchestrate

Intel 471

App Vendor: Intel 471

App Category: Data Enrichment & Threat Intelligence

Connector Version: 2.0.0

API Version: 1.0.0

About App

This app integrates with Intel 471, a service focused on the provision of a high fidelity and timely indicators feed with rich context, TTP information, and malware intelligence reports. It is made to be operationalized easily out of the box within a customer's environment and is accessible via an online portal, RESTful API, and third-party integrations.

The Intel 471 app is configured with Cyware Orchestrate to perform the following actions:

Action Name

Description

Detailed Vulnerability Info

This action retrieves the detailed information on a vulnerability.

Fetch Actor

This action retrieves the actor's details.

Fetch Entity

This action retrieves the entity.

Fetch IOC

This action retrieves the IOCs.

Fetch Malware Indicator

This action retrieves indicators of a particular malware.

Fetch Malware Intel

This action retrieves malware intel.

Fetch Malware NIDS

This action retrieves the NIDs.

Fetch Malware YARA

This action retrieves YARA.

Fetch Vulnerability Search

This action retrieves vulnerability search.

Get Breach Alert

This action retrieves the details of the specified breach alert.

Get Malware Intelligence Report

This action retrieves the details of the specified malware intelligence report.

Get Report

This action retrieves the details of the specified information report or Fintel report.

Global Search

This action can be used to return results matching filter criteria such as IOC, vulnerabilities, etc.

Search Breach Alerts

This action searches for breach alerts.

Search Malware Families

This action searches for malware families.

Search Malware Intelligence Reports

This action searches for malware reports that match the specified filter criteria.

Search Reports

This action retrieves a list of information reports or Fintel reports matching the filter criteria.

Generic Action

This is a generic action used to make requests to any Intel 471 endpoint.

Configuration Parameters

The following configuration parameters are required for the Intel 471 app to communicate with the Intel 471 enterprise application. The parameters can be configured by creating instances in the app.

Parameter

Description

Field Type

Required/Optional

Comments

Base URL

Enter the base URL to access Intel 471.

Example:

https://example.com/v1

Text

Required

Username

Enter the username.

Text

Required

API Key

Enter the API key for authentication.

Password

Required

Verify

Choose your preference to verify SSL or TLS while making requests. It is recommended to set this option to yes. Passing no may result in incorrectly establishing the connection.

Boolean

Optional

By default, verification is enabled.

Timeout

Enter the timeout value in seconds. This is the number of seconds requests will wait to connect to Intel 471 and read the response.

Integer

Optional

Allowed range:

15-120

Default value:

15

Action: Detailed Vulnerability Info

This action retrieves the detailed information for a vulnerability.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

UID

Enter the UID to retrieve vulnerability information.

Example:

e7fafbb8f44a6ded005c154976627da4

Text

Required

Action: Fetch Actor

This action retrieves the actor details.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

Actor

Enter the actor's name to retrieve the details.

Example:

apt1

Text

Required

From Time

Enter the 'from' time, based on which the search results starting from the given creation time are returned. The format can be long Unix time or a string time range.

Text

Optional

Allowed values:

1569314472407, 24 hours, 1 day

Until

Enter the 'until' time, based on which the search results are returned. The format can be long Unix time or a string time range.

Text

Optional

Allowed values:

1569314472407, 24 hours, 1 day

Last Updated From

Enter the 'last updated from' time, based on which the search results are returned. The format can be long Unix time or a string time range.

Text

Optional

Allowed values:

1569314472407, 24 hours, 1 day

Last Updated Until

Enter the 'last updated until' time, based on which the search results are returned. The format can be long Unix time or a string time range.

Text

Optional

Allowed values:

1569314472407, 24 hours, 1 day

Count

Enter the count.

Example:

100

Text

Optional

Sort

Enter the value to sort the response.

Text

Optional

Allowed values:

relevance, earliest, latest

Pretty Print

Select an option for pretty print.

Boolean

Optional

Extra Params

Enter the extra parameters to fetch actor details.

Key Value

Optional

Allowed keys:

format, offset, forum

Action: Fetch Entity

This action can be used to fetch the entity.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

Entity

Enter the entity to retrieve it.

Example:

syntax

Text

Required

From Time

Enter the 'from' time, based on which the search results starting from the given creation time are returned. The format can be long Unix time or a string time range.

Text

Optional

Allowed values:

1569314472407, 24hours, 1day

Until

Enter the 'until' time, based on which the search results are returned. The format can be long Unix time or a string time range.

Text

Optional

Allowed values:

1569314472407, 24hours, 1day

Last Updated From

Enter the 'last updated from' time, based on which the search results are returned. The format can be long Unix time or a string time range.

Text

Optional

Allowed values:

1569314472407, 24hours, 1day

Last Updated Until

Enter the 'last updated until' time, based on which the search results are returned. The format can be long Unix time or a string time range.

Text

Optional

Allowed values:

1569314472407, 24hours, 1day

Count

Enter the count of entities to retrieve.

Example:

100

Text

Optional

Sort

Enter the value to sort the response.

Text

Optional

Allowed values:

relevance, earliest, latest

Pretty Print

Select an option for pretty print.

Boolean

Optional

Extra Params

Enter the extra parameters to fetch entity details.

Key Value

Optional

Allowed keys:

entitytype, offset, format

Action: Fetch IOC

This action can be used to fetch the IOCs.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

IOC

Enter the IOC to be searched for.

Example:

malicious@fmail.com or domain.com)

Text

Required

Sort

Enter the value by which to sort the response.

Text

Optional

Allowed values:

relevance, earliest, latest

From Time

Enter the 'from' time, based on which the search results starting from the given creation time are returned. The format can be long Unix time or a string time range.

Text

Optional

Allowed values:

1569314472407, 24hours, 1day

Until

Enter the 'until' time, based on which the search results are returned. The format can be long Unix time or a string time range.

Text

Optional

Allowed values:

1569314472407, 24hours, 1day

Last Updated From

Enter the 'last updated from' time, based on which the search results are returned. The format can be long Unix time or a string time range.

Text

Optional

Allowed values:

1569314472407, 24hours, 1day

Last Updated Until

Enter the 'last updated until' time, based on which the search results are returned. The format can be long Unix time or a string time range.

Text

Optional

Allowed values:

1569314472407, 24hours, 1day

Count

Enter the count of IOCs to retrieve.

Example:

100

Text

Optional

Pretty Print

Select the option for pretty print.

Boolean

Optional

Extra Params

Enter the extra parameters to fetch IOCs.

Key Value

Optional

Allowed keys:

iocType, offset, format

Action: Fetch Malware Indicator

This action retrieves indicators of a particular malware.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

Malware Family

Enter the malware family.

Example:

azorult

Text

Optional

Indicator Type

Enter the value to search for indicators by type.

Text

Optional

Allowed values:

directory, domain, file, ipv4, ipv6, mutex, url, windows_registry_key

Threat Type

Enter the threat type to search for malware indicators.

Text

Optional

Allowed values:

malware, bulletproof_hosting, proxy_service

Indicator

Enter the indicator to search for malware indicators.

Example:

example.com or example@domain.com

Text

Optional

Confidence

Enter the confidence level of the indicator.

Text

Optional

Allowed values:

high, medium, low

Extra Params

Enter the extra parameters to fetch malware indicators.

Key Value

Optional

Allowed keys:

threatuid, malwareFamilyProfileuid, gir

Action: Fetch Malware Intel

This action can be used to fetch malware intel.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

Malware Family

Enter the malware family to retrieve malware intel.

Example:

azorult

Text

Optional

Event

Enter the event.

Example:

syntax

Text

Optional

Event Type

Enter the event type.

Text

Optional

Allowed values:

download_execute, download_plugin, exfiltrate_data, webinject

Threat Type

Enter the threat type to search events by threat type.

Text

Optional

Example:

malware, bulletproof_hosting, proxy_service

From Time

Enter the 'from' time, based on which the search results starting from the given creation time are returned. The format can be long Unix time or a string time range.

Text

Optional

Allowed values:

1569314472407, 24hours, 1day

Until

Enter the 'until' time, based on which the search results are returned. The format can be long Unix time or a string time range.

Text

Optional

Allowed values:

1569314472407, 24hours, 1day

Last Updated From

Enter the 'last updated from' time, based on which the search results are returned. The format can be long Unix time or a string time range.

Text

Optional

Allowed values:

1569314472407, 24hours, 1day

Last Updated Until

Enter the 'last updated until' time, based on which the search results are returned. The format can be long Unix time or a string time range.

Text

Optional

Allowed values:

1569314472407, 24hours, 1day

Count

Enter the count of records to retrieve.

Example:

100

Text

Optional

Sort

Enter the value to sort the response.

Text

Optional

Allowed values:

relevance, earliest, latest

Pretty Print

Select an option for pretty print.

Boolean

Optional

Extra Params

Enter the extra parameters to fetch malware intel.

Key Value

Optional

Allowed keys:

threatuid, malwarefamilyprofileuid, gir

Action: Fetch Malware NIDS

This action can be used to fetch the nids.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

Malware Family

Enter the malware family name.

Example:

azorult

Text

Optional

NIDs

Enter the nids.

Text

Optional

NIDs Type

Enter the NID type to retrieve.

Text

Optional

Threat type

Enter the threat type.

Text

Optional

Confidence

Enter the confidence level to retrieve malware NIDs.

Text

Optional

Allowed values:

high, medium, low

Extra Params

Enter the extra parameters to fetch NIDs.

Key Value

Optional

Allowed keys:

count, sort

Action: Fetch Malware YARA

This action can be used to fetch YARA.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

Malware Family

Enter the malware family to retrieve YARA.

Example:

azorult

Text

Optional

YARA

Enter the YARA.

Text

Optional

Threat Type

Enter the threat type.

Text

Optional

Allowed values:

malware, bulletproof_hosting, proxy_service

Confidence

Enter the confidence.

Text

Optional

Allowed values:

high, medium, low

From Time

Enter the 'from' time, based on which the search results starting from the given creation time are returned. The format can be long Unix time or a string time range.

Text

Optional

Allowed values:

1569314472407, 24hours, 1day

Until

Enter the 'until' time, based on which the search results are returned. The format can be long Unix time or a string time range.

Text

Optional

Allowed values:

1569314472407, 24hours, 1day

Last Updated From

Enter the 'last updated from' time, based on which the search results are returned. The format can be long Unix time or string time range.

Text

Optional

Allowed values:

1569314472407, 24hours, 1day

Last Updated Until

Enter the 'last updated until' time, based on which the search results are returned. The format can be long unix time or string time range.

Text

Optional

Allowed values:

1569314472407, 24hours, 1day

Count

Enter the count.

Example:

100

Text

Optional

Sort

Sort results by relevance or activity start time.

Text

Optional

Allowed values:

relevance, earliest, latest

Pretty Print

Select an option for pretty print.

Boolean

Optional

Extra Params

Enter the extra parameters to make the request.

Key Value

Optional

Allowed keys:

malwarefamilyprofileuid, gir

Action: Get Breach Alert

This action retrieves the details of the specified breach alert.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

Alert UID

Enter the alert identifier to retrieve its details.

Example:

8c5e0e87e683c62bb0a50baeff732152

Text

Required

You can retrieve this using the action Action: Search Breach Alerts.

Action: Get Malware Intelligence Report

This action retrieves the details of the specified malware intelligence report.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

Report UID

Enter the malware intelligence report UID to retrieve the details.

Example:

e7fafbb8f44a6ded005c154976627da4

Text

Required

Action: Get Report

This action retrieves the details of the specified information report or Fintel report.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

Report UID

Enter the report UID to retrieve the details.

Example:

32537c9c6dce18ce6ea4d5106540f089

Text

Required

You can retrieve this using the action Action: Search Reports.

Action: Search Breach Alerts

This action searches for breach alerts.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

Breach Alert

Enter a search term to search for breach alerts.

Example:

communications

Text

Optional

Note

You must provide at least one of Breach Alert, Actor, or Victim.

Actor

Enter the actor or actor group names to search for breach alerts.

Example:

hakkr

Text

Optional

Note

You must provide at least one of Breach Alert, Actor, or Victim.

Victim

Enter the victim of the breach to filter the response.

Example:

bcn telecom

Text

Optional

Note

You must provide at least one of Breach Alert, Actor, or Victim.

Confidence

Enter the confidence level to filter the response.

Example:

medium

Text

Optional

Allowed values:

High, low, medium

Extra Params

Enter the extra parameters to filter the response.

Key Value

Optional

Allowed keys:

from, until, gir

Action: Search Malware Families

This action searches for malware families.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

Malware Family

Enter the malware family name to search.

Example:

asyncrat

Text

Optional

From Time

Enter the start time for the search. Allowed formats are Unix timestamp or relative time.

Example:

24hours

Text

Optional

Until

Enter the end time for the search. Allowed formats are Unix timestamp or relative time.

Example:

24hours

Text

Optional

Extra Params

Enter the extra parameters to search for a malware family.

Key Value

Optional

Allowed keys:

sort, offset, count, prettyprint, format

Action: Search Malware Intelligence Reports

This action searches for malware reports that match the specified filter criteria.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

Malware Report

Enter the malware report to filter the search.

You must provide at least one of Malware Report, Threat Type, Report Title, Malware Family, or Malware Family Profile UID.

Text

Optional

Threat Type

Enter the threat type to search for malware intelligence reports.

You must provide at least one of Malware Report, Threat Type, Report Title, Malware Family, or Malware Family Profile UID.

Example:

malware

Text

Optional

Report Title

Enter the threat ID to search for malware intelligence reports.

You must provide at least one of Malware Report, Threat Type, Report Title, Malware Family, or Malware Family Profile UID.

Text

Optional

Malware Family

Enter the malware family to search for malware intelligence reports.

You must provide at least one of Malware Report, Threat Type, Report Title, Malware Family, or Malware Family Profile UID.

Example:

gozi_isfb

Text

Optional

Malware Family Profile UID

Enter the malware family profile UID to search for malware intelligence reports.

You must provide at least one of Malware Report, Threat Type, Report Title, Malware Family, or Malware Family Profile UID.

Text

Optional

Extra Params

Enter the extra parameters to search for malware intelligence reports.

Key Value

Optional

Allowed keys:

from, sort, gir

Action: Search Reports

This action retrieves a list of information reports or fintel reports matching the filter criteria.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

Report

Enter a search term to find matching reports, subjects, and entities.

Example:

ransomware-as-a-service

Text

Optional

Report Location

Enter the country or region to search for reports.

Example:

USA

Text

Optional

Report Tag

Enter a tag to filter reports.

Example:

e-commerce

Text

Optional

Extra Params

Enter the extra parameters to search for reports.

Key Value

Optional

Allowed keys:

reportadmiraltycode, reporttitle, victim

Action: Generic Action

This is a generic action used to make requests to any Intel 471 endpoint.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

Method

Enter the HTTP method to make the request.

Text

Required

Allowed values:

GET, PUT, POST, DELETE

Endpoint

Enter the endpoint to make the request to.

Example:

alerts

Text

Required

Query Params

Enter the query parameters to make the request.

Example:

{'format': csv}

Key Value

Optional

JSON Payload

Enter the payload in JSON format for the API request.

Example:

$JSON[{"description": description}]

Any

Optional

Extra Fields

Enter the extra fields to pass to the API.

Key Value

Optional

Allowed keys:

payload_data, custom_output, download, filename, files, retry_wait, retry_count, response_type