Let me rephrase your problem (and tell me if I am wrong):
You want to verify that all Artifact does not match any Threat Source, and close the Incident after all Threat Source has been checked, if none of them match.
To achieve this, I will:
- Create a
Artifact Hit field, either boolean or integer, if I wish to count the number of hits and not just get the information a Hit exist.
- A rule on artifact check if a
Threat Source Hits is added, and the Artifact Hit is not alreay YES (or > 0)
and will set Artifact Hit to YES (or add +1 with a script)
With this, you will know that you have a Hit
Example below that add a colored tag on screen using an enrich field modified by a script

Now, the problem is to decide WHEN to close the incident or validate that you had enough time to verify all Threat enrichment
for this I will use the
scheduler App
- Create a rule that is running a workflow that call the scheduler App
- Select in the app the timer you want, 600s for example to get normally all Threat and Threat Enrichment done
- after that, check the value of
Artifact Hit if YES or > 0, assign the incident from "Automation" to "L1 Group", or close the task
- At this time you may loop back to allow more wait time... 2 days before closing by automation, but not assigning the incident to users.
Something like this workflow design:

Attached is an example of Threat Intelligence Playbook manipulation. Please do not use it "as is" on production, but study it in dev/test environment
8) Analyze Automation for Threat Intel
- File Name : config_ThreatIntelligence.res-export-20210706155117.res
Purpose of this Playbook:
- Automate the analysis of the result of IBM X-Force, Cisco Threat Grid & Virus Total Threat Intelligence
- IBM X-Force will provide most recent date an artifact has been seen, with the count, and the first Threat Family
- Cisco Threat Grid will provide the Risk percentage and the count it has been seen
- Virus Total will provide the most recent date an artifact has been seen, with the percentage of detection among the antivirus list
- The element is colored with Red, High Risk, Orange Medium Risk, Green Low Risk and milestones are added on first Threat Intelligence hit
- This Playbook is [SIM] if no integration
Note : Threat Intelligence must be activated
Automatic Activation:
- Activate Threat Feed IBM X-Force, Cisco Threat Grid & Virus Total
- Every time an Artifact get a Threat Hit on Threat Intelligence, the automation analysis is updated
Manual Activation:
Layout Change:
- Add a conditional Tab (artifact hit = True) to present the abstract of all threat Intelligence:
- IBM X-Force with Last Seen, Count & Threat Family
- Cisco Threat Grid with Threat Score & Samples
- Virus Total with Rating and Scan reliability
- add conditional sections (value exist) on the summary to present the analysis fields abstract Virus Total, Cisco and X-Force, when populated
Options:
- Enable Python version P2 or P3 rules depending on your Python options on SOAR. Default is Python version 2
Extract res file command:
resilient-sdk extract --script "Threat Artifact P2 [Sim]" "Threat Artifact Hit Colored" "Threat Artifact P2" "Threat Artifact P3" --rule "Threat Artifact P2 [SIM]" "Threat Artifact Hit" "Threat Artifact P2" "Threat Artifact P3" --field "threat" "artifact_hit" "virus_total" "cisco" "xforce" "rating" "scan_reliability" "threat_score" "samples" "last_seen" "count" "threat_family" -n config_ThreatIntelligence.res --zip
------------------------------
BENOIT ROSTAGNI
------------------------------
Original Message:
Sent: Thu October 28, 2021 05:08 PM
From: Pierre Dufresne
Subject: Iterating through an incident artifacts in a playbook
Hi,
I would like to write a playbook (the new kind) which would iterate through the artifacts associated with an incident and inspect the number of hits for each artifact.
I know there is a field called "hits" for the artifact object but I can't figure out how to look at each artifact once the playbook is started.
If the number of hits is equal to zero, the incident would then be resolved as "Not an issue", otherwise a task would be created and assigned to an analyst.
Is this feasable with the new "Playbooks" functionnality?
Thanks for any help or suggestions.
------------------------------
Pierre Dufresne
------------------------------