Intezer¶
Overview¶
This integration provides tools to interact with the Intezer platform for analyzing files, URLs, and hashes, managing alerts, and indexing files.
Available Tools¶
Detonate File¶
Tool Name: intezer_detonate_file
Description: Analyze a file from Splunk vault with Intezer.
Arguments:
case_id
(string, required): The ID of the case.alert_group_identifiers
(List[string], required): Identifiers for the alert groups.file_path
(string, required): Path to file for analyzing. Multiple values can be provided as a comma-separated string.related_alert_id
(string, optional): The alert id related to the file. Defaults to None.target_entities
(List[TargetEntity], optional): Optional list of specific target entities (Identifier, EntityType) to run the action on. Defaults to empty list.scope
(string, optional): Defines the scope for the action. Defaults to “All entities”.
Returns:
dict
: A dictionary containing the result of the action execution, likely including an analysis ID.
Get URL Report¶
Tool Name: intezer_get_url_report
Description: Get a URL analysis report based on a URL analysis ID.
Arguments:
case_id
(string, required): The ID of the case.alert_group_identifiers
(List[string], required): Identifiers for the alert groups.analysis_id
(string, required): Specify a comma-separated list of URL Analysis IDs to run the action on. Analysis ID is case sensitive. The analysis ID is returned when submitting a URL for analysis. Multiple values can be provided as a comma-separated string.wait_for_completion
(boolean, optional): Whether to wait for the analysis to finish. Defaults to None.target_entities
(List[TargetEntity], optional): Optional list of specific target entities (Identifier, EntityType) to run the action on. Defaults to empty list.scope
(string, optional): Defines the scope for the action. Defaults to “All entities”.
Returns:
dict
: A dictionary containing the result of the action execution, including the URL analysis report.
Get File Report¶
Tool Name: intezer_get_file_report
Description: Get a file analysis report based on an analysis ID or a file hash.
Arguments:
case_id
(string, required): The ID of the case.alert_group_identifiers
(List[string], required): Identifiers for the alert groups.analysis_id
(string, optional): Specify a comma-separated list of File Analysis IDs to run the action on. Analysis ID is case sensitive. Note: if both “Analysis ID” and “File Hash” are provided, then “File Hash” value will have priority. Multiple values can be provided as a comma-separated string. Defaults to None.file_hash
(string, optional): Specify a comma-separated list of file hashes to run the action on. File Hash is case sensitive. Note: if both “Analysis ID” and “File Hash” are provided, then “File Hash” value will have priority. Multiple values can be provided as a comma-separated string. Defaults to None.private_only
(boolean, optional): Whether to show only private reports (relevant only for hashes). Defaults to None.wait_for_completion
(boolean, optional): Whether to wait for the analysis to complete before returning the report. Defaults to None.target_entities
(List[TargetEntity], optional): Optional list of specific target entities (Identifier, EntityType) to run the action on. Defaults to empty list.scope
(string, optional): Defines the scope for the action. Defaults to “All entities”.
Returns:
dict
: A dictionary containing the result of the action execution, including the file analysis report.
Get Alert¶
Tool Name: intezer_get_alert
Description: Get an ingested alert triage and response information using alert ID.
Arguments:
case_id
(string, required): The ID of the case.alert_group_identifiers
(List[string], required): Identifiers for the alert groups.alert_id
(string, required): The alert id to query.wait_for_completion
(boolean, optional): Whether to wait for the analysis to finish. Defaults to None.target_entities
(List[TargetEntity], optional): Optional list of specific target entities (Identifier, EntityType) to run the action on. Defaults to empty list.scope
(string, optional): Defines the scope for the action. Defaults to “All entities”.
Returns:
dict
: A dictionary containing the result of the action execution, including alert details.
Unset Index File¶
Tool Name: intezer_unset_index_file
Description: Unset file’s indexing.
Arguments:
case_id
(string, required): The ID of the case.alert_group_identifiers
(List[string], required): Identifiers for the alert groups.sha256
(string, optional): SHA256 file to unset the indexing. Multiple values can be provided as a comma-separated string. Defaults to None.target_entities
(List[TargetEntity], optional): Optional list of specific target entities (Identifier, EntityType) to run the action on. Typically runs on Filehash entities. Defaults to empty list.scope
(string, optional): Defines the scope for the action. Defaults to “All entities”.
Returns:
dict
: A dictionary containing the result of the action execution.
Detonate URL¶
Tool Name: intezer_detonate_url
Description: Analyze a suspicious URL with Intezer.
Arguments:
case_id
(string, required): The ID of the case.alert_group_identifiers
(List[string], required): Identifiers for the alert groups.url
(string, optional): URL to analyze. Multiple values can be provided as a comma-separated string. Defaults to None.target_entities
(List[TargetEntity], optional): Optional list of specific target entities (Identifier, EntityType) to run the action on. Typically runs on URL entities. Defaults to empty list.scope
(string, optional): Defines the scope for the action. Defaults to “All entities”.
Returns:
dict
: A dictionary containing the result of the action execution, likely including an analysis ID.
Ping¶
Tool Name: intezer_ping
Description: Test connectivity to the Intezer with parameters provided at the integration configuration page on the Marketplace tab.
Arguments:
case_id
(string, required): The ID of the case.alert_group_identifiers
(List[string], required): Identifiers for the alert groups.target_entities
(List[TargetEntity], optional): Optional list of specific target entities (Identifier, EntityType) to run the action on. Defaults to empty list.scope
(string, optional): Defines the scope for the action. Defaults to “All entities”.
Returns:
dict
: A dictionary containing the result of the action execution.
Detonate Hash¶
Tool Name: intezer_detonate_hash
Description: Analyze a file hash (SHA1, SHA256, or MD5) on Intezer Analyze.
Arguments:
case_id
(string, required): The ID of the case.alert_group_identifiers
(List[string], required): Identifiers for the alert groups.file_hash
(string, optional): Hash of the desired report. Multiple values can be provided as a comma-separated string. Defaults to None.target_entities
(List[TargetEntity], optional): Optional list of specific target entities (Identifier, EntityType) to run the action on. Typically runs on Filehash entities. Defaults to empty list.scope
(string, optional): Defines the scope for the action. Defaults to “All entities”.
Returns:
dict
: A dictionary containing the result of the action execution, likely including an analysis ID or report link.
Index File¶
Tool Name: intezer_index_file
Description: Index the file’s genes into the organizational database.
Arguments:
case_id
(string, required): The ID of the case.alert_group_identifiers
(List[string], required): Identifiers for the alert groups.index_as
(List[str], required): Index as trusted or malicious.sha256
(string, optional): Sha256 to index. Multiple values can be provided as a comma-separated string. Defaults to None.family_name
(string, optional): Family name to index as. Defaults to None.target_entities
(List[TargetEntity], optional): Optional list of specific target entities (Identifier, EntityType) to run the action on. Typically runs on Filehash entities. Defaults to empty list.scope
(string, optional): Defines the scope for the action. Defaults to “All entities”.
Returns:
dict
: A dictionary containing the result of the action execution.
Submit Alert¶
Tool Name: intezer_submit_alert
Description: Submit a new alert including the raw alert information to Intezer for processing.
Arguments:
case_id
(string, required): The ID of the case.alert_group_identifiers
(List[string], required): Identifiers for the alert groups.source
(string, required): The source of the alert.raw_alert
(string, required): Alert raw data in JSON format.alert_mapping
(string, required): Mapping to use for the alert in JSON format.target_entities
(List[TargetEntity], optional): Optional list of specific target entities (Identifier, EntityType) to run the action on. Defaults to empty list.scope
(string, optional): Defines the scope for the action. Defaults to “All entities”.
Returns:
dict
: A dictionary containing the result of the action execution, likely including an alert ID assigned by Intezer.
Submit Suspicious Email¶
Tool Name: intezer_submit_suspicious_email
Description: Submit a suspicious phishing email in a raw format (.MSG or .EML) to Intezer for processing.
Arguments:
case_id
(string, required): The ID of the case.alert_group_identifiers
(List[string], required): Identifiers for the alert groups.email_file_path
(string, required): Path to the email file.target_entities
(List[TargetEntity], optional): Optional list of specific target entities (Identifier, EntityType) to run the action on. Defaults to empty list.scope
(string, optional): Defines the scope for the action. Defaults to “All entities”.
Returns:
dict
: A dictionary containing the result of the action execution, likely including an analysis ID.
Submit File¶
Tool Name: intezer_submit_file
Description: Submit a file for analysis.
Arguments:
case_id
(string, required): The ID of the case.alert_group_identifiers
(List[string], required): Identifiers for the alert groups.file_paths
(string, required): The paths of the file to analyze.target_entities
(List[TargetEntity], optional): Optional list of specific target entities (Identifier, EntityType) to run the action on. Defaults to empty list.scope
(string, optional): Defines the scope for the action. Defaults to “All entities”.
Returns:
dict
: A dictionary containing the result of the action execution, likely including an analysis ID.
Submit Hash¶
Tool Name: intezer_submit_hash
Description: Submit a hash for analysis.
Arguments:
case_id
(string, required): The ID of the case.alert_group_identifiers
(List[string], required): Identifiers for the alert groups.target_entities
(List[TargetEntity], optional): Optional list of specific target entities (Identifier, EntityType) to run the action on. Typically runs on Filehash entities. Defaults to empty list.scope
(string, optional): Defines the scope for the action. Defaults to “All entities”.
Returns:
dict
: A dictionary containing the result of the action execution, likely including an analysis ID or report link.