IBM Security SOAR

IBM QRadar SOAR

Join this online user group to communicate across Security product users and IBM experts by sharing advice and best practices with peers and staying up to date regarding product enhancements.

 View Only

Enhance IOC Parser Function and add results in Notes and Artifact Description 

Mon August 26, 2019 11:43 AM

Prerequisit : have the IOC Parser Function v2 integration installed and configured Link to App Exchange Purpose : Enhance the standard information given by this integration in Artifact Description & Note and add a search button action on a Malware Sample artifact type. Changes : New Rule Extract IOCs (Artifact) and Extract IOCs (Attachment) New Workflows Extract IOC from this Artifact as duplicate of the Example: Parse IOCs (Artifact) with changes in post process scripts Extract IOC from this Attachment as duplicate of the Example: Parse IOCs (Attachment) with changes in post process scripts Results in Note: and in Artifact description: Attached is the res file to import this configuration. Feel free to use, change, adapt this code to your usage. Building the res file: resilient-circuits extract --workflow "parse_iocs_attachment" "parse_iocs_artifact" --rule "Extract IOCs (Artifact)" "Extract IOCs (Attachment)" -o config_IOC.res --zip

Statistics
0 Favorited
6 Views
1 Files
0 Shares
0 Downloads
Attachment(s)
zip file
config_IOC.res.zip   15 KB   1 version
Uploaded - Mon August 26, 2019