Publisher: ReversingLabs
Connector Version: 2.3.0
Product Vendor: ReversingLabs
Product Name: TitaniumCloud
Product Version Supported (regex): ".*"
Minimum Product Version: 5.1.0
This app integrates with ReversingLabs cloud services to implement reputation and investigative actions for file samples and their metadata
This app implements the investigative action 'file reputation' on the ReversingLabs TitaniumCloud file reputation service. Information includes ReversingLabs Malware Presence information and Anti-Virus scanner information.
The ReversingLabs TitaniumCloud File Reputation, part of ReversingLabs Threat Intelligence provides up-to-date file reputation, Anti-Virus scan information and internal analysis information on billions of goodware and malware samples.
Malware samples are continually reanalyzed to ensure that the reputation information is relevant at all times.
In addition to file reputation and historical AV reputation, additional Threat Intelligence can be obtained from TitaniumCloud via multiple APIs and Feeds, which allow users to search for files by hash or anti-virus detection name. It is also possible to hunt for files from a single malware family, search for functionally similar samples, perform bulk queries, and receive alerts on file reputation changes.
For more information, consult the official product website.
Access the Asset Settings tab on the Asset Configuration page. The variables described in the
previous section are displayed in this tab.
Input the username and password required to connect to ReversingLabs TitaniumCloud File Reputation service.
Select the "Verify server certificate" checkbox to ensure that the self-signed certificates are not accepted.
Note: Action parameter 'hunting report vault id' expects JSON type of content from file.
Playbook Backward Compatibility
Following new actions have been added:
- certificate analytics
- uri statistics
- file similarity analytics
- advanced search
- joe sandbox adapter
The app uses HTTP/ HTTPS protocol for communicating with the RL TitaniumCloud REST APIs server. Below are the default ports used by the Splunk SOAR Connector.
SERVICE NAME | TRANSPORT PROTOCOL | PORT |
---|---|---|
http | tcp | 80 |
https | tcp | 443 |
The below configuration variables are required for this Connector to operate. These variables are specified when configuring a TitaniumCloud asset in SOAR.
VARIABLE | REQUIRED | TYPE | DESCRIPTION |
---|---|---|---|
username | required | string | Username |
password | required | password | Password |
url | optional | string | TitaniumCloud or T1000 url |
verify_server_cert | optional | boolean | Verify server certificate |
joe sandbox adapter - ReversingLabs plug-in for Joe Sandbox which will update threat hunting metadata with dynamic analysis results
test connectivity - Validate the asset configuration for connectivity
file reputation - Queries ReversingLabs for file reputation info
advanced search - Queries ReversingLabs Advanced Search with specified search query
file similarity analytics - Queries ReversingLabs file similarity analytics for the specified file
uri statistics - Queries ReversingLabs URI statistics for the specified URI
certificate analytics - Queries ReversingLabs certificate analytics for the specified certificate thumbprint
ReversingLabs plug-in for Joe Sandbox which will update threat hunting metadata with dynamic analysis results
Type: investigate
Read only: True
PARAMETER | REQUIRED | DESCRIPTION | TYPE | CONTAINS |
---|---|---|---|---|
joe_report_vault_id | optional | Joe Sandbox dynamic analysis report vault ID | string | vault id |
hunting_report_vault_id | required | Threat hunting report vault id | string | vault id |
DATA PATH | TYPE | CONTAINS |
---|---|---|
action_result.parameter.hunting_report_vault_id | string | vault id |
action_result.parameter.joe_report_vault_id | string | vault id |
action_result.data.*.hunting_report_vault_id | string | vault id |
action_result.data.*.readable_summary.classification.classification | string | |
action_result.data.*.readable_summary.classification.description | string | |
action_result.data.*.readable_summary.classification.reason | string | |
action_result.data.*.readable_summary.classification.threat.description | string | |
action_result.data.*.readable_summary.classification.threat.factor | numeric | |
action_result.data.*.readable_summary.classification.threat.name | string | |
action_result.status | string | |
action_result.message | string | |
action_result.summary | string | |
summary.total_objects | numeric | |
summary.total_objects_successful | numeric |
Validate the asset configuration for connectivity
Type: test
Read only: True
No parameters are required for this action
No Output
Queries ReversingLabs for file reputation info
Type: investigate
Read only: True
PARAMETER | REQUIRED | DESCRIPTION | TYPE | CONTAINS |
---|---|---|---|---|
hash | optional | File hash to query | string | md5 sha1 sha256 |
hunting_report_vault_id | optional | Threat hunting report vault id | string | vault id |
DATA PATH | TYPE | CONTAINS |
---|---|---|
action_result.parameter.hash | string | md5 sha1 sha256 |
action_result.parameter.hunting_report_vault_id | string | vault id |
action_result.data.*.hunting_report_vault_id | string | vault id |
action_result.data.*.readable_summary.classification.classification | string | |
action_result.data.*.readable_summary.classification.description | string | |
action_result.data.*.readable_summary.classification.reason | string | |
action_result.data.*.readable_summary.classification.threat.description | string | |
action_result.data.*.readable_summary.classification.threat.factor | numeric | |
action_result.data.*.readable_summary.classification.threat.name | string | |
action_result.status | string | |
action_result.message | string | |
action_result.summary | string | |
summary.total_objects | numeric | |
summary.total_objects_successful | numeric |
Queries ReversingLabs Advanced Search with specified search query
Type: investigate
Read only: True
PARAMETER | REQUIRED | DESCRIPTION | TYPE | CONTAINS |
---|---|---|---|---|
search_parameter | optional | RL Advanced Search query search field | string | |
results_per_page | optional | Number of results per one page (Default:1000) | numeric | |
page_number | optional | Page number (Default:1) | numeric | |
hunting_report_vault_id | optional | Threat hunting report vault id | string | vault id |
DATA PATH | TYPE | CONTAINS |
---|---|---|
action_result.parameter.hunting_report_vault_id | string | vault id |
action_result.parameter.page_number | numeric | |
action_result.parameter.results_per_page | numeric | |
action_result.parameter.search_parameter | string | |
action_result.data.*.hunting_report_vault_id | string | vault id |
action_result.data.*.readable_summary.classification.classification | string | |
action_result.data.*.readable_summary.classification.description | string | |
action_result.data.*.readable_summary.classification.reason | string | |
action_result.data.*.readable_summary.classification.threat.description | string | |
action_result.data.*.readable_summary.classification.threat.factor | numeric | |
action_result.data.*.readable_summary.classification.threat.name | string | |
action_result.status | string | |
action_result.message | string | |
action_result.summary | string | |
summary.total_objects | numeric | |
summary.total_objects_successful | numeric |
Queries ReversingLabs file similarity analytics for the specified file
Type: investigate
Read only: True
PARAMETER | REQUIRED | DESCRIPTION | TYPE | CONTAINS |
---|---|---|---|---|
hash | optional | File SHA1 hash value | string | sha1 |
sample_type | optional | RL TitaniumCore sample type | string | |
hunting_report_vault_id | optional | Threat hunting report that represents current state of the hunting workflow | string | vault id |
DATA PATH | TYPE | CONTAINS |
---|---|---|
action_result.parameter.hash | string | sha1 |
action_result.parameter.hunting_report_vault_id | string | vault id |
action_result.parameter.sample_type | string | |
action_result.data.*.hunting_report_vault_id | string | vault id |
action_result.data.*.readable_summary.classification.classification | string | |
action_result.data.*.readable_summary.classification.description | string | |
action_result.data.*.readable_summary.classification.reason | string | |
action_result.data.*.readable_summary.classification.threat.description | string | |
action_result.data.*.readable_summary.classification.threat.factor | numeric | |
action_result.data.*.readable_summary.classification.threat.name | string | |
action_result.status | string | |
action_result.message | string | |
action_result.summary | string | |
summary.total_objects | numeric | |
summary.total_objects_successful | numeric |
Queries ReversingLabs URI statistics for the specified URI
Type: investigate
Read only: True
PARAMETER | REQUIRED | DESCRIPTION | TYPE | CONTAINS |
---|---|---|---|---|
uri | optional | URI value that will get queried. Can be: url, domain, email address or ip address | string | |
hunting_report_vault_id | optional | Threat hunting report that represent current state of the hunting workflow | string | vault id |
DATA PATH | TYPE | CONTAINS |
---|---|---|
action_result.parameter.hunting_report_vault_id | string | vault id |
action_result.parameter.uri | string | |
action_result.data.*.hunting_report_vault_id | string | vault id |
action_result.data.*.readable_summary.classification.classification | string | |
action_result.data.*.readable_summary.classification.description | string | |
action_result.data.*.readable_summary.classification.reason | string | |
action_result.data.*.readable_summary.classification.threat.description | string | |
action_result.data.*.readable_summary.classification.threat.factor | numeric | |
action_result.data.*.readable_summary.classification.threat.name | string | |
action_result.status | string | |
action_result.message | string | |
action_result.summary | string | |
summary.total_objects | numeric | |
summary.total_objects_successful | numeric |
Queries ReversingLabs certificate analytics for the specified certificate thumbprint
Type: investigate
Read only: True
PARAMETER | REQUIRED | DESCRIPTION | TYPE | CONTAINS |
---|---|---|---|---|
thumbprint | optional | Certificate thumbprint that will get queried. Can be: url, domain, email address or ip address | string | |
hunting_report_vault_id | optional | Threat hunting report that represents current state of the hunting workflow | string | vault id |
DATA PATH | TYPE | CONTAINS |
---|---|---|
action_result.parameter.hunting_report_vault_id | string | vault id |
action_result.parameter.thumbprint | string | |
action_result.data.*.hunting_report_vault_id | string | vault id |
action_result.data.*.readable_summary.classification.classification | string | |
action_result.data.*.readable_summary.classification.description | string | |
action_result.data.*.readable_summary.classification.reason | string | |
action_result.data.*.readable_summary.classification.threat.description | string | |
action_result.data.*.readable_summary.classification.threat.factor | numeric | |
action_result.data.*.readable_summary.classification.threat.name | string | |
action_result.status | string | |
action_result.message | string | |
action_result.summary | string | |
summary.total_objects | numeric | |
summary.total_objects_successful | numeric |