Mandiant Threat Intelligence Integration

Overview

This integration allows you to connect to Mandiant Threat Intelligence and perform actions like enriching IOCs and entities, retrieving related entities, getting malware details, and testing connectivity.

Configuration

The configuration for this integration (API endpoint, credentials, etc.) is managed within the SOAR platform’s Marketplace tab. The actions utilize these pre-configured settings.

Actions

Enrich IOCs

Get information about Indicators of Compromise (IOCs) from Mandiant.

Arguments:

  • case_id (string, required): The ID of the case.

  • alert_group_identifiers (List[string], required): Identifiers for the alert groups.

  • ioc_identifiers (string, required): Specify a comma-separated list of IOCs that need to be enriched.

  • target_entities (List[TargetEntity], optional): Optional list of specific target entities (Identifier, EntityType) to run the action on.

  • scope (string, optional): Defines the scope for the action. Defaults to “All entities”.

Returns:

  • dict: A dictionary containing the result of the action execution, including enrichment data for the IOCs.

Ping

Test connectivity to the Mandiant Threat Intelligence service using the parameters provided in the Marketplace tab.

Arguments:

  • case_id (string, required): The ID of the case.

  • alert_group_identifiers (List[string], required): Identifiers for the alert groups.

  • target_entities (List[TargetEntity], optional): Optional list of specific target entities (Identifier, EntityType) to run the action on.

  • scope (string, optional): Defines the scope for the action. Defaults to “All entities”.

Returns:

  • dict: A dictionary containing the result of the ping action.

Enrich Entities

Enrich entities using information from Mandiant. Supported entities: Hostname, IP Address, URL, Domain, File Hash, Threat Actor, Vulnerability. Note: only MD5, SHA-1 and SHA-256 are supported.

Arguments:

  • case_id (string, required): The ID of the case.

  • alert_group_identifiers (List[string], required): Identifiers for the alert groups.

  • severity_score_threshold (string, required): Specify the lowest severity score that will be used to mark the entity as suspicious. Note: only indicators (hostname, IP address, file hash, url) can be marked as suspicious. Maximum: 100.

  • create_insight (bool, optional): If enabled, action will create an insight containing all of the retrieved information about the entity.

  • only_suspicious_entity_insight (bool, optional): If enabled, action will only create an insight for suspicious entities. Note: parameter “Create Insight” should be enabled. Insights for “Threat Actor” and “Vulnerability” entities will also be created even though they are not marked as suspicious.

  • target_entities (List[TargetEntity], optional): Optional list of specific target entities (Identifier, EntityType) to run the action on.

  • scope (string, optional): Defines the scope for the action. Defaults to “All entities”.

Returns:

  • dict: A dictionary containing the result of the action execution, including enrichment data for the entities.

Get Malware Details

Get information about malware from Mandiant.

Arguments:

  • case_id (string, required): The ID of the case.

  • alert_group_identifiers (List[string], required): Identifiers for the alert groups.

  • malware_names (string, required): Specify a comma-separated list of malware names that need to be enriched.

  • create_insight (bool, optional): If enabled, action will create an insight containing information about the malware.

  • fetch_related_io_cs (bool, optional): If enabled, action will fetch indicators that are related to the provided malware.

  • max_related_io_cs_to_return (string, optional): Specify how many indicators action needs to process per malware. Default: 100.

  • target_entities (List[TargetEntity], optional): Optional list of specific target entities (Identifier, EntityType) to run the action on.

  • scope (string, optional): Defines the scope for the action. Defaults to “All entities”.

Returns:

  • dict: A dictionary containing the result of the action execution, including details about the specified malware.

Notes

  • Ensure the Mandiant Threat Intelligence integration is properly configured in the SOAR Marketplace tab.

  • Some actions support specific entity types as input. Refer to the action descriptions for details.

  • Hash enrichment supports MD5, SHA-1, and SHA-256.