-
Notifications
You must be signed in to change notification settings - Fork 1.6k
/
GoogleChronicleBackstory.yml
3941 lines (3936 loc) · 202 KB
/
GoogleChronicleBackstory.yml
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
618
619
620
621
622
623
624
625
626
627
628
629
630
631
632
633
634
635
636
637
638
639
640
641
642
643
644
645
646
647
648
649
650
651
652
653
654
655
656
657
658
659
660
661
662
663
664
665
666
667
668
669
670
671
672
673
674
675
676
677
678
679
680
681
682
683
684
685
686
687
688
689
690
691
692
693
694
695
696
697
698
699
700
701
702
703
704
705
706
707
708
709
710
711
712
713
714
715
716
717
718
719
720
721
722
723
724
725
726
727
728
729
730
731
732
733
734
735
736
737
738
739
740
741
742
743
744
745
746
747
748
749
750
751
752
753
754
755
756
757
758
759
760
761
762
763
764
765
766
767
768
769
770
771
772
773
774
775
776
777
778
779
780
781
782
783
784
785
786
787
788
789
790
791
792
793
794
795
796
797
798
799
800
801
802
803
804
805
806
807
808
809
810
811
812
813
814
815
816
817
818
819
820
821
822
823
824
825
826
827
828
829
830
831
832
833
834
835
836
837
838
839
840
841
842
843
844
845
846
847
848
849
850
851
852
853
854
855
856
857
858
859
860
861
862
863
864
865
866
867
868
869
870
871
872
873
874
875
876
877
878
879
880
881
882
883
884
885
886
887
888
889
890
891
892
893
894
895
896
897
898
899
900
901
902
903
904
905
906
907
908
909
910
911
912
913
914
915
916
917
918
919
920
921
922
923
924
925
926
927
928
929
930
931
932
933
934
935
936
937
938
939
940
941
942
943
944
945
946
947
948
949
950
951
952
953
954
955
956
957
958
959
960
961
962
963
964
965
966
967
968
969
970
971
972
973
974
975
976
977
978
979
980
981
982
983
984
985
986
987
988
989
990
991
992
993
994
995
996
997
998
999
1000
category: Analytics & SIEM
sectionOrder:
- Connect
- Collect
commonfields:
id: Google Chronicle Backstory
version: -1
configuration:
- display: User's Service Account JSON
name: service_account_credential
required: true
type: 4
section: Connect
- additionalinfo: Select the region based on the location of the chronicle backstory instance.
defaultvalue: General
display: Region
name: region
options:
- General
- Europe
- Asia
required: false
type: 15
section: Connect
- display: Provide comma(',') separated categories (e.g. APT-Activity, Phishing). Indicators belonging to these "categories" would be considered as "malicious" when executing reputation commands.
name: malicious_categories
required: false
type: 12
section: Collect
advanced: true
- display: Provide comma(',') separated categories (e.g. Unwanted, VirusTotal YARA Rule Match). Indicators belonging to these "categories" would be considered as "suspicious" when executing reputation commands.
name: suspicious_categories
required: false
type: 12
section: Collect
advanced: true
- display: Specify the "severity" of indicator that should be considered as "malicious" irrespective of the category. If you wish to consider all indicators with High severity as Malicious, set this parameter to 'High'. Allowed values are 'High', 'Medium' and 'Low'. This configuration is applicable to reputation commands only.
name: override_severity_malicious
options:
- high
- medium
- low
required: false
type: 16
section: Collect
advanced: true
- display: Specify the "severity" of indicator that should be considered as "suspicious" irrespective of the category. If you wish to consider all indicators with Medium severity as Suspicious, set this parameter to 'Medium'. Allowed values are 'High', 'Medium' and 'Low'. This configuration is applicable to reputation commands only.
name: override_severity_suspicious
options:
- high
- medium
- low
required: false
type: 16
section: Collect
advanced: true
- display: Specify the numeric value of "confidence score". If the indicator's confidence score is equal or above the configured threshold, it would be considered as "malicious". The value provided should be greater than the suspicious threshold. This configuration is applicable to reputation commands only.
name: override_confidence_score_malicious_threshold
required: false
type: 0
section: Collect
advanced: true
- display: Specify the numeric value of "confidence score". If the indicator's confidence score is equal or above the configured threshold, it would be considered as "suspicious". The value provided should be smaller than the malicious threshold. This configuration is applicable to reputation commands only.
name: override_confidence_score_suspicious_threshold
required: false
type: 0
section: Collect
advanced: true
- display: Select the confidence score level. If the indicator's confidence score level is equal or above the configured level, it would be considered as "malicious". The confidence level configured should have higher precedence than the suspicious level. This configuration is applicable to reputation commands only. Refer the "confidence score" level precedence UNKNOWN SEVERITY < INFORMATIONAL < LOW < MEDIUM < HIGH.
name: override_confidence_level_malicious
options:
- unknown_severity
- informational
- low
- medium
- high
required: false
type: 15
section: Collect
advanced: true
- display: |-
Select the confidence score level. If the indicator's confidence score level is equal or above the configured level, it would be considered as "suspicious".
The confidence level configured should have lesser precedence than the malicious level. This configuration is applicable to reputation commands only. Refer the "confidence score" level precedence UNKNOWN SEVERITY < INFORMATIONAL < LOW < MEDIUM < HIGH.
name: override_confidence_level_suspicious
options:
- unknown_severity
- informational
- low
- medium
- high
required: false
type: 15
section: Collect
advanced: true
- display: Fetch incidents
name: isFetch
required: false
type: 8
section: Collect
- display: Incident type
name: incidentType
required: false
type: 13
section: Connect
- additionalinfo: |-
The UTC date or relative timestamp from where to start fetching incidents.
Supported formats: N minutes, N hours, N days, N weeks, N months, N years, yyyy-mm-dd, yyyy-mm-ddTHH:MM:SSZ
For example: 10 minutes, 5 hours, 8 days, 2 weeks, 8 months, 2021-12-31, 01 Mar 2021, 01 Feb 2021 04:45:33, 2022-04-17T14:05:44Z
defaultvalue: 3 days
display: First fetch time
name: first_fetch
required: false
type: 0
section: Collect
- defaultvalue: '100'
display: How many incidents to fetch each time
name: max_fetch
required: false
type: 0
section: Collect
- additionalinfo: Select Chronicle alert type to create actionable incident. Available options are IOC Domain matches(Default), Assets with alerts, Detection alerts and User alerts.
defaultvalue: IOC Domain matches
display: Chronicle Alert Type (Select the type of data to consider for fetch incidents).
name: backstory_alert_type
options:
- IOC Domain matches
- Assets with alerts
- Detection alerts
- User alerts
required: false
type: 15
section: Collect
advanced: true
- display: Select the severity of alerts to be filtered for Fetch Incidents. Available options are 'High', 'Medium', 'Low' and 'Unspecified' (If not selected, fetches all alerts).
name: incident_severity
options:
- High
- Medium
- Low
- Unspecified
required: false
type: 15
section: Collect
advanced: true
- additionalinfo: 'Fetches detection by either Rule ID (format: ru_{UUID}) or Version ID (format: {ruleId}@v_{int64}_{int64}. Enter in comma separated format to add multiple. Entered rules have precedence over the "Fetch all rules detections" checkbox.'
display: Detections to fetch by Rule ID or Version ID
name: fetch_detection_by_ids
required: false
type: 0
section: Collect
advanced: true
- additionalinfo: Fetch detections for all versions of all the rules.
display: Fetch all rules detections
name: fetch_all_detections
required: false
type: 8
section: Collect
advanced: true
- additionalinfo: Select the alert state to filter the detections to be fetched using fetch incidents. Available options are 'ALERTING' and 'NOT_ALERTING' (Default-No Selection).
display: Filter detections by alert state
name: fetch_detection_by_alert_state
options:
- ALERTING
- NOT_ALERTING
required: false
type: 15
section: Collect
advanced: true
- additionalinfo: Select the time window to query Chronicle. While selecting the time window consider the time delay for an event to appear in Chronicle after generation. Available options are 15 (Default), 30, 45 and 60. This parameter is not applied when "IOC Domain matches" Chronicle Alert Type is selected. Don't touch unless you're missing alerts.
defaultvalue: '15'
display: Time window (in minutes)
name: time_window
options:
- '15'
- '30'
- '45'
- '60'
required: false
type: 15
section: Collect
advanced: true
- additionalinfo: Sort detections by "DETECTION_TIME" or by "CREATED_TIME". If not specified, it defaults to "CREATED_TIME". This configuration is applicable to "Detection alerts" only.
defaultvalue: CREATED_TIME
display: List Basis
name: fetch_detection_by_list_basis
options:
- CREATED_TIME
- DETECTION_TIME
required: false
type: 15
section: Collect
advanced: true
- display: Trust any certificate (not secure)
name: insecure
required: false
type: 8
section: Connect
advanced: true
- display: Use system proxy settings
name: proxy
required: false
type: 8
section: Connect
advanced: true
- additionalinfo: Reliability of the source providing the intelligence data.
defaultvalue: B - Usually reliable
display: Source Reliability
name: integrationReliability
options:
- A+ - 3rd party enrichment
- A - Completely reliable
- B - Usually reliable
- C - Fairly reliable
- D - Not usually reliable
- E - Unreliable
- F - Reliability cannot be judged
required: false
type: 15
section: Collect
- defaultvalue: indicatorType
name: feedExpirationPolicy
display: ''
options:
- never
- interval
- indicatorType
- suddenDeath
required: false
type: 17
section: Collect
advanced: true
- defaultvalue: '20160'
name: feedExpirationInterval
display: ''
required: false
type: 1
section: Collect
advanced: true
description: Use the Chronicle integration to retrieve Asset alerts or IOC Domain matches as Incidents. Use it to fetch a list of infected assets based on the indicator accessed. This integration also provides reputation and threat enrichment of indicators observed in the enterprise.
display: Chronicle
name: Google Chronicle Backstory
script:
commands:
- arguments:
- auto: PREDEFINED
default: false
description: Fetches IOC Domain matches in the specified time interval. If configured, overrides the start_time argument.
isArray: false
name: preset_time_range
predefined:
- Last 1 day
- Last 7 days
- Last 15 days
- Last 30 days
required: false
secret: false
- default: false
description: 'The value of the start time for your request, in RFC 3339 format (e.g. 2002-10-02T15:00:00Z) or relative time. If not supplied, the default is the UTC time corresponding to 3 days earlier than current time. Formats: YYYY-MM-ddTHH:mm:ssZ, YYYY-MM-dd, N days, N hours. Example: 2020-05-01T00:00:00Z, 2020-05-01, 2 days, 5 hours, 01 Mar 2021, 01 Feb 2021 04:45:33, 15 Jun.'
isArray: false
name: start_time
required: false
secret: false
- default: false
defaultValue: '10000'
description: The maximum number of IOCs to return. You can specify between 1 and 10000.
isArray: false
name: page_size
required: false
secret: false
deprecated: false
description: Lists the IOC Domain matches within your enterprise for the specified time interval. The indicator of compromise (IOC) domain matches lists for which the domains that your security infrastructure has flagged as both suspicious and that have been seen recently within your enterprise.
execution: false
name: gcb-list-iocs
outputs:
- contextPath: Domain.Name
description: The domain name of the artifact.
type: String
- contextPath: GoogleChronicleBackstory.Iocs.Artifact
description: The Indicator artifact.
type: String
- contextPath: GoogleChronicleBackstory.Iocs.IocIngestTime
description: Time(UTC) the IOC was first seen by Chronicle.
type: Date
- contextPath: GoogleChronicleBackstory.Iocs.FirstAccessedTime
description: Time(UTC) the artifact was first seen within your enterprise.
type: Date
- contextPath: GoogleChronicleBackstory.Iocs.LastAccessedTime
description: Time(UTC) the artifact was most recently seen within your enterprise.
type: Date
- contextPath: GoogleChronicleBackstory.Iocs.Sources.Category
description: Source Category represents the behavior of the artifact.
type: String
- contextPath: GoogleChronicleBackstory.Iocs.Sources.IntRawConfidenceScore
description: The numeric confidence score of the IOC reported by the source.
type: Number
- contextPath: GoogleChronicleBackstory.Iocs.Sources.NormalizedConfidenceScore
description: The normalized confidence score of the IOC reported by the source.
type: String
- contextPath: GoogleChronicleBackstory.Iocs.Sources.RawSeverity
description: The severity of the IOC as reported by the source.
type: String
- contextPath: GoogleChronicleBackstory.Iocs.Sources.Source
description: The source that reported the IOC.
type: String
- arguments:
- default: true
description: ' The artifact indicator associated with assets. The artifact type can be one of the following: IP, Domain, MD5, SHA1, or SHA256. '
isArray: false
name: artifact_value
required: true
secret: false
- auto: PREDEFINED
default: false
description: Fetches assets that accessed the artifact during the interval specified. If configured, overrides the start_time and end_time arguments.
isArray: false
name: preset_time_range
predefined:
- Last 1 day
- Last 7 days
- Last 15 days
- Last 30 days
required: false
secret: false
- default: false
description: 'The value of the start time for your request, in RFC 3339 format (e.g. 2002-10-02T15:00:00Z) or relative time. If not supplied, the default is the UTC time corresponding to 3 days earlier than current time. Formats: YYYY-MM-ddTHH:mm:ssZ, YYYY-MM-dd, N days, N hours. Example: 2020-05-01T00:00:00Z, 2020-05-01, 2 days, 5 hours, 01 Mar 2021, 01 Feb 2021 04:45:33, 15 Jun.'
isArray: false
name: start_time
required: false
secret: false
- default: false
description: 'The value of the end time for your request, in RFC 3339 format (e.g. 2002-10-02T15:00:00Z) or relative time. If not supplied, the default is current UTC time. Formats: YYYY-MM-ddTHH:mm:ssZ, YYYY-MM-dd, N days, N hours. Example: 2020-05-01T00:00:00Z, 2020-05-01, 2 days, 5 hours, 01 Mar 2021, 01 Feb 2021 04:45:33, 15 Jun.'
isArray: false
name: end_time
required: false
secret: false
- default: false
defaultValue: '10000'
description: The maximum number of IOCs to return. You can specify between 1 and 10000.
isArray: false
name: page_size
required: false
secret: false
deprecated: false
description: Returns a list of the assets that accessed the input artifact (IP, domain, MD5, SHA1 and SHA256) during the specified time.
execution: false
name: gcb-assets
outputs:
- contextPath: GoogleChronicleBackstory.Asset.HostName
description: The hostname of the asset that accessed the artifact.
type: String
- contextPath: GoogleChronicleBackstory.Asset.IpAddress
description: The IP address of the asset that accessed the artifact.
type: String
- contextPath: GoogleChronicleBackstory.Asset.MacAddress
description: The MAC address of the asset that accessed the artifact.
type: String
- contextPath: GoogleChronicleBackstory.Asset.ProductId
description: The Product ID of the asset that accessed the artifact.
type: String
- contextPath: GoogleChronicleBackstory.Asset.AccessedDomain
description: The domain artifact accessed by the asset.
type: String
- contextPath: GoogleChronicleBackstory.Asset.AccessedIP
description: The IP address artifact accessed by the asset.
type: String
- contextPath: GoogleChronicleBackstory.Asset.AccessedMD5
description: The MD5 file hash artifact accessed by the asset.
type: String
- contextPath: GoogleChronicleBackstory.Asset.AccessedSHA1
description: The SHA1 file hash artifact accessed by the asset.
type: String
- contextPath: GoogleChronicleBackstory.Asset.AccessedSHA256
description: The SHA256 file hash artifact accessed by the asset.
type: String
- contextPath: GoogleChronicleBackstory.Asset.FirstAccessedTime
description: The time when the asset first accessed the artifact.
type: Date
- contextPath: GoogleChronicleBackstory.Asset.LastAccessedTime
description: The time when the asset last accessed the artifact.
type: Date
- contextPath: Host.Hostname
description: The hostname of the asset that accessed the artifact.
type: String
- contextPath: Host.ID
description: The Product ID of the asset that accessed the artifact.
type: String
- contextPath: Host.IP
description: The IP address of the asset that accessed the artifact.
type: String
- contextPath: Host.MACAddress
description: The MAC address of the asset that accessed the artifact.
type: String
- arguments:
- default: true
description: The IP address to check.
isArray: true
name: ip
required: true
secret: false
deprecated: false
description: Checks the reputation of an IP address.
execution: false
name: ip
outputs:
- contextPath: DBotScore.Indicator
description: The indicator that was tested.
type: String
- contextPath: DBotScore.Type
description: The indicator type.
type: String
- contextPath: DBotScore.Vendor
description: The vendor used to calculate the score.
type: String
- contextPath: DBotScore.Score
description: 'The reputation score (0: Unknown, 1: Good, 2: Suspicious, 3: Bad)'
type: Number
- contextPath: IP.Address
description: The IP address of the artifact.
type: String
- contextPath: IP.Malicious.Vendor
description: For malicious IPs, the vendor that made the decision.
type: String
- contextPath: IP.Malicious.Description
description: For malicious IPs, the reason that the vendor made the decision.
type: String
- contextPath: GoogleChronicleBackstory.IP.IoCQueried
description: The artifact that was queried.
type: String
- contextPath: GoogleChronicleBackstory.IP.Sources.Address.IpAddress
description: The IP address of the artifact.
type: String
- contextPath: GoogleChronicleBackstory.IP.Sources.Address.Domain
description: The domain name of the artifact.
type: String
- contextPath: GoogleChronicleBackstory.IP.Sources.Address.Port
description: The port numbers of the artifact.
type: Unknown
- contextPath: GoogleChronicleBackstory.IP.Sources.Category
description: The behavior of the artifact.
type: String
- contextPath: GoogleChronicleBackstory.IP.Sources.ConfidenceScore
description: The confidence score indicating the accuracy and appropriateness of the assigned category.
type: Number
- contextPath: GoogleChronicleBackstory.IP.Sources.FirstAccessedTime
description: The time the IOC was first accessed within the enterprise.
type: Date
- contextPath: GoogleChronicleBackstory.IP.Sources.LastAccessedTime
description: The time the IOC was most recently seen within your enterprise.
type: Date
- contextPath: GoogleChronicleBackstory.IP.Sources.Severity
description: Impact of the artifact on the enterprise.
type: String
- arguments:
- default: true
description: The domain name to check.
isArray: true
name: domain
required: true
secret: false
deprecated: false
description: Checks the reputation of a domain.
execution: false
name: domain
outputs:
- contextPath: DBotScore.Indicator
description: The indicator that was tested.
type: String
- contextPath: DBotScore.Type
description: The indicator type.
type: String
- contextPath: DBotScore.Vendor
description: The vendor used to calculate the score.
type: String
- contextPath: DBotScore.Score
description: 'The reputation score (0: Unknown, 1: Good, 2: Suspicious, 3: Bad)'
type: Number
- contextPath: Domain.Name
description: The domain name of the artifact.
type: String
- contextPath: Domain.Malicious.Vendor
description: For malicious domains, the vendor that made the decision.
type: String
- contextPath: Domain.Malicious.Description
description: For malicious domains, the reason that the vendor made the decision.
type: String
- contextPath: GoogleChronicleBackstory.Domain.IoCQueried
description: The domain that queried.
type: String
- contextPath: GoogleChronicleBackstory.Domain.Sources.Address.IpAddress
description: The IP address of the artifact.
type: String
- contextPath: GoogleChronicleBackstory.Domain.Sources.Address.Domain
description: The domain name of the artifact.
type: String
- contextPath: GoogleChronicleBackstory.Domain.Sources.Address.Port
description: The port numbers of the artifact.
type: Unknown
- contextPath: GoogleChronicleBackstory.Domain.Sources.Category
description: The behavior of the artifact.
type: String
- contextPath: GoogleChronicleBackstory.Domain.Sources.ConfidenceScore
description: The confidence score indicating the accuracy and appropriateness of the assigned category.
type: Number
- contextPath: GoogleChronicleBackstory.Domain.Sources.FirstAccessedTime
description: The time the IOC was first accessed within the enterprise.
type: Date
- contextPath: GoogleChronicleBackstory.Domain.Sources.LastAccessedTime
description: The time the IOC was most recently seen within your enterprise.
type: Date
- contextPath: GoogleChronicleBackstory.Domain.Sources.Severity
description: Impact of the artifact on the enterprise.
type: String
- arguments:
- default: false
description: The artifact indicator value. The supported artifact types are IP and domain.
isArray: false
name: artifact_value
required: true
secret: false
deprecated: false
description: Accepts an artifact indicator and returns any threat intelligence associated with the artifact. The threat intelligence information is drawn from your enterprise security systems and from Chronicle's IoC partners (for example, the DHS threat feed).
execution: false
name: gcb-ioc-details
outputs:
- contextPath: Domain.Name
description: The domain name of the artifact.
type: String
- contextPath: IP.Address
description: The IP address of the of the artifact.
type: String
- contextPath: GoogleChronicleBackstory.IocDetails.IoCQueried
description: The artifact entered by the user.
type: String
- contextPath: GoogleChronicleBackstory.IocDetails.Sources.Address.IpAddress
description: The IP address of the artifact.
type: String
- contextPath: GoogleChronicleBackstory.IocDetails.Sources.Address.Domain
description: The domain name of the artifact.
type: String
- contextPath: GoogleChronicleBackstory.IocDetails.Sources.Address.Port
description: The port numbers of the artifact.
type: Unknown
- contextPath: GoogleChronicleBackstory.IocDetails.Sources.Category
description: The behavior of the artifact.
type: String
- contextPath: GoogleChronicleBackstory.IocDetails.Sources.ConfidenceScore
description: The confidence score indicating the accuracy and appropriateness of the assigned category.
type: Number
- contextPath: GoogleChronicleBackstory.IocDetails.Sources.FirstAccessedTime
description: The time the IOC was first accessed within the enterprise.
type: Date
- contextPath: GoogleChronicleBackstory.IocDetails.Sources.LastAccessedTime
description: The time the IOC was most recently seen within your enterprise.
type: Date
- contextPath: GoogleChronicleBackstory.IocDetails.Sources.Severity
description: Impact of the artifact on the enterprise.
type: String
- arguments:
- auto: PREDEFINED
default: false
description: Fetch alerts for the specified time range. If preset_time_range is configured, overrides the start_time and end_time arguments.
isArray: false
name: preset_time_range
predefined:
- Last 1 day
- Last 7 days
- Last 15 days
- Last 30 days
required: false
secret: false
- default: false
description: 'The value of the start time for your request, in RFC 3339 format (e.g. 2002-10-02T15:00:00Z) or relative time. If not supplied, the default is the UTC time corresponding to 3 days earlier than current time. Formats: YYYY-MM-ddTHH:mm:ssZ, YYYY-MM-dd, N days, N hours. Example: 2020-05-01T00:00:00Z, 2020-05-01, 2 days, 5 hours, 01 Mar 2021, 01 Feb 2021 04:45:33, 15 Jun.'
isArray: false
name: start_time
required: false
secret: false
- default: false
description: 'The value of the end time for your request, in RFC 3339 format (e.g. 2002-10-02T15:00:00Z) or relative time. If not supplied, the default is current UTC time. Formats: YYYY-MM-ddTHH:mm:ssZ, YYYY-MM-dd, N days, N hours. Example: 2020-05-01T00:00:00Z, 2020-05-01, 2 days, 5 hours, 01 Mar 2021, 01 Feb 2021 04:45:33, 15 Jun.'
isArray: false
name: end_time
required: false
secret: false
- default: false
defaultValue: '10000'
description: The maximum number of IOCs to return. You can specify between 1 and 100000.
isArray: false
name: page_size
required: false
secret: false
- auto: PREDEFINED
default: false
description: The severity by which to filter the returned alerts. If not supplied, all alerts are fetched. This is applicable for asset alerts only. The possible values are "High", "Medium", "Low", or "Unspecified".
isArray: false
name: severity
predefined:
- High
- Medium
- Low
- Unspecified
required: false
secret: false
- auto: PREDEFINED
default: false
defaultValue: Asset Alerts
description: Specify which type of alerts you want. The possible values are "Asset Alerts" or "User Alerts".
isArray: false
name: alert_type
predefined:
- Asset Alerts
- User Alerts
required: false
secret: false
deprecated: false
description: List all the alerts tracked within your enterprise for the specified time range. Both the parsed alerts and their corresponding raw alert logs are returned.
execution: false
name: gcb-list-alerts
outputs:
- contextPath: GoogleChronicleBackstory.Alert.AssetName
description: The asset identifier. It can be IP Address, MAC Address, Hostname or Product ID.
type: String
- contextPath: GoogleChronicleBackstory.Alert.AlertInfo.Name
description: The name of the alert.
type: String
- contextPath: GoogleChronicleBackstory.Alert.AlertInfo.Severity
description: The severity of the alert.
type: String
- contextPath: GoogleChronicleBackstory.Alert.AlertInfo.SourceProduct
description: The source of the alert.
type: String
- contextPath: GoogleChronicleBackstory.Alert.AlertInfo.Timestamp
description: The time of the alert in Chronicle.
type: String
- contextPath: GoogleChronicleBackstory.Alert.AlertCounts
description: The total number of alerts.
type: Number
- contextPath: GoogleChronicleBackstory.UserAlert.User
description: The user identifier. It can be username or email address.
type: String
- contextPath: GoogleChronicleBackstory.UserAlert.AlertInfo.Name
description: The name of the user alert.
type: String
- contextPath: GoogleChronicleBackstory.UserAlert.AlertInfo.SourceProduct
description: The source of the user alert.
type: String
- contextPath: GoogleChronicleBackstory.UserAlert.AlertInfo.Timestamp
description: The time of the user alert in Chronicle.
type: String
- contextPath: GoogleChronicleBackstory.UserAlert.AlertInfo.RawLog
description: The raw log of the user alert.
type: String
- contextPath: GoogleChronicleBackstory.UserAlert.AlertCounts
description: The total number of user alerts.
type: Number
- arguments:
- auto: PREDEFINED
default: false
description: Specify the identifier type of the asset you are investigating. The possible values are Host Name, IP Address, MAC Address or Product ID.
isArray: false
name: asset_identifier_type
predefined:
- Host Name
- IP Address
- MAC Address
- Product ID
required: true
secret: false
- default: false
description: Value of the asset identifier.
isArray: false
name: asset_identifier
required: true
secret: false
- auto: PREDEFINED
default: false
description: Get events that are discovered during the interval specified. If configured, overrides the start_time and end_time arguments.
isArray: false
name: preset_time_range
predefined:
- Last 1 day
- Last 7 days
- Last 15 days
- Last 30 days
required: false
secret: false
- default: false
description: ' The value of the start time for your request. The format of Date should comply with RFC 3339 (e.g. 2002-10-02T15:00:00Z) or relative time. If not supplied, the product considers UTC time corresponding to 2 hours earlier than current time. Formats: YYYY-MM-ddTHH:mm:ssZ, YYYY-MM-dd, N days, N hours. Example: 2020-05-01T00:00:00Z, 2020-05-01, 2 days, 5 hours, 01 Mar 2021, 01 Feb 2021 04:45:33, 15 Jun.'
isArray: false
name: start_time
required: false
secret: false
- default: false
description: 'The value of the end time for your request. The format of Date should comply with RFC 3339 (e.g. 2002-10-02T15:00:00Z) or relative time. If not supplied, the product considers current UTC time. Formats: YYYY-MM-ddTHH:mm:ssZ, YYYY-MM-dd, N days, N hours. Example: 2020-05-01T00:00:00Z, 2020-05-01, 2 days, 5 hours, 01 Mar 2021, 01 Feb 2021 04:45:33, 15 Jun.'
isArray: false
name: end_time
required: false
secret: false
- default: false
defaultValue: '10000'
description: Specify the maximum number of events to fetch. You can specify between 1 and 10000.
isArray: false
name: page_size
required: false
secret: false
- default: false
description: 'Specify the reference time for the asset you are investigating, in RFC 3339 format (e.g. 2002-10-02T15:00:00Z) or relative time. If not supplied, the product considers start time as reference time. Formats: YYYY-MM-ddTHH:mm:ssZ, YYYY-MM-dd, N days, N hours. Example: 2020-05-01T00:00:00Z, 2020-05-01, 2 days, 5 hours, 01 Mar 2021, 01 Feb 2021 04:45:33, 15 Jun.'
isArray: false
name: reference_time
required: false
secret: false
deprecated: false
description: List all of the events discovered within your enterprise on a particular device within the specified time range. If you receive the maximum number of events you specified using the page_size parameter (or 100, the default), there might still be more events within your Chronicle account. You can narrow the time range and issue the call again to ensure you have visibility into all possible events. This command returns more than 60 different types of events. Any event would have only specific output context set. Refer the UDM documentation to figure out the output properties specific to the event types.
execution: false
name: gcb-list-events
outputs:
- contextPath: GoogleChronicleBackstory.Events.eventType
description: Specifies the type of the event.
type: String
- contextPath: GoogleChronicleBackstory.Events.eventTimestamp
description: The GMT timestamp when the event was generated.
type: Date
- contextPath: GoogleChronicleBackstory.Events.collectedTimestamp
description: The GMT timestamp when the event was collected by the vendor's local collection infrastructure.
type: Date
- contextPath: GoogleChronicleBackstory.Events.description
description: Human-readable description of the event.
type: String
- contextPath: GoogleChronicleBackstory.Events.productEventType
description: Short, descriptive, human-readable, and product-specific event name or type.
type: String
- contextPath: GoogleChronicleBackstory.Events.productLogId
description: A vendor-specific event identifier to uniquely identify the event (a GUID). Users might use this identifier to search the vendor's proprietary console for the event in question.
type: String
- contextPath: GoogleChronicleBackstory.Events.productName
description: Specifies the name of the product.
type: String
- contextPath: GoogleChronicleBackstory.Events.productVersion
description: Specifies the version of the product.
type: String
- contextPath: GoogleChronicleBackstory.Events.urlBackToProduct
description: URL linking to a relevant website where you can view more information about this specific event or the general event category.
type: String
- contextPath: GoogleChronicleBackstory.Events.vendorName
description: Specifies the product vendor's name.
type: String
- contextPath: GoogleChronicleBackstory.Events.principal.assetId
description: Vendor-specific unique device identifier.
type: String
- contextPath: GoogleChronicleBackstory.Events.principal.email
description: Email address.
type: String
- contextPath: GoogleChronicleBackstory.Events.principal.hostname
description: Client hostname or domain name field.
type: String
- contextPath: GoogleChronicleBackstory.Events.principal.platform
description: Platform operating system.
type: String
- contextPath: GoogleChronicleBackstory.Events.principal.platformPatchLevel
description: Platform operating system patch level.
type: String
- contextPath: GoogleChronicleBackstory.Events.principal.platformVersion
description: Platform operating system version.
type: String
- contextPath: GoogleChronicleBackstory.Events.principal.ip
description: IP address associated with a network connection.
type: String
- contextPath: GoogleChronicleBackstory.Events.principal.port
description: Source or destination network port number when a specific network connection is described within an event.
type: String
- contextPath: GoogleChronicleBackstory.Events.principal.mac
description: MAC addresses associated with a device.
type: String
- contextPath: GoogleChronicleBackstory.Events.principal.administrativeDomain
description: Domain which the device belongs to (for example, the Windows domain).
type: String
- contextPath: GoogleChronicleBackstory.Events.principal.url
description: Standard URL.
type: String
- contextPath: GoogleChronicleBackstory.Events.principal.file.fileMetadata
description: Metadata associated with the file.
type: String
- contextPath: GoogleChronicleBackstory.Events.principal.file.fullPath
description: Full path identifying the location of the file on the system.
type: String
- contextPath: GoogleChronicleBackstory.Events.principal.file.md5
description: MD5 hash value of the file.
type: String
- contextPath: GoogleChronicleBackstory.Events.principal.file.mimeType
description: Multipurpose Internet Mail Extensions (MIME) type of the file.
type: String
- contextPath: GoogleChronicleBackstory.Events.principal.file.sha1
description: SHA-1 hash value of the file.
type: String
- contextPath: GoogleChronicleBackstory.Events.principal.file.sha256
description: SHA-256 hash value of the file.
type: String
- contextPath: GoogleChronicleBackstory.Events.principal.file.size
description: Size of the file.
type: String
- contextPath: GoogleChronicleBackstory.Events.principal.process.commandLine
description: Stores the command line string for the process.
type: String
- contextPath: GoogleChronicleBackstory.Events.principal.process.productSpecificProcessId
description: Stores the product specific process ID.
type: String
- contextPath: GoogleChronicleBackstory.Events.principal.process.productSpecificParentProcessId
description: Stores the product specific process ID for the parent process.
type: String
- contextPath: GoogleChronicleBackstory.Events.principal.process.file
description: Stores the file name of the file in use by the process.
type: String
- contextPath: GoogleChronicleBackstory.Events.principal.process.file.fileMetadata
description: Metadata associated with the file.
type: String
- contextPath: GoogleChronicleBackstory.Events.principal.process.file.fullPath
description: Full path identifying the location of the file on the system.
type: String
- contextPath: GoogleChronicleBackstory.Events.principal.process.file.md5
description: MD5 hash value of the file.
type: String
- contextPath: GoogleChronicleBackstory.Events.principal.process.file.mimeType
description: Multipurpose Internet Mail Extensions (MIME) type of the file.
type: String
- contextPath: GoogleChronicleBackstory.Events.principal.process.file.sha1
description: SHA-1 hash value of the file.
type: String
- contextPath: GoogleChronicleBackstory.Events.principal.process.file.sha256
description: SHA-256 hash value of the file.
type: String
- contextPath: GoogleChronicleBackstory.Events.principal.process.file.size
description: Size of the file.
type: String
- contextPath: GoogleChronicleBackstory.Events.principal.process.parentPid
description: Stores the process ID for the parent process.
type: String
- contextPath: GoogleChronicleBackstory.Events.principal.process.pid
description: Stores the process ID.
type: String
- contextPath: GoogleChronicleBackstory.Events.principal.registry.registryKey
description: Stores the registry key associated with an application or system component.
type: String
- contextPath: GoogleChronicleBackstory.Events.principal.registry.registryValueName
description: Stores the name of the registry value associated with an application or system component.
type: String
- contextPath: GoogleChronicleBackstory.Events.principal.registry.registryValueData
description: Stores the data associated with a registry value.
type: String
- contextPath: GoogleChronicleBackstory.Events.principal.user.emailAddresses
description: Stores the email addresses for the user.
type: String
- contextPath: GoogleChronicleBackstory.Events.principal.user.employeeId
description: Stores the human resources employee ID for the user.
type: String
- contextPath: GoogleChronicleBackstory.Events.principal.user.firstName
description: Stores the first name for the user.
type: String
- contextPath: GoogleChronicleBackstory.Events.principal.user.middleName
description: Stores the middle name for the user.
type: String
- contextPath: GoogleChronicleBackstory.Events.principal.user.lastName
description: Stores the last name for the user.
type: String
- contextPath: GoogleChronicleBackstory.Events.principal.user.groupid
description: Stores the group ID associated with a user.
type: String
- contextPath: GoogleChronicleBackstory.Events.principal.user.phoneNumbers
description: Stores the phone numbers for the user.
type: String
- contextPath: GoogleChronicleBackstory.Events.principal.user.title
description: Stores the job title for the user.
type: String
- contextPath: GoogleChronicleBackstory.Events.principal.user.userDisplayName
description: Stores the display name for the user.
type: String
- contextPath: GoogleChronicleBackstory.Events.principal.user.userid
description: Stores the user ID.
type: String
- contextPath: GoogleChronicleBackstory.Events.principal.user.windowsSid
description: Stores the Microsoft Windows security identifier (SID) associated with a user.
type: String
- contextPath: GoogleChronicleBackstory.Events.target.assetId
description: Vendor-specific unique device identifier.
type: String
- contextPath: GoogleChronicleBackstory.Events.target.email
description: Email address.
type: String
- contextPath: GoogleChronicleBackstory.Events.target.hostname
description: Client hostname or domain name field.
type: String
- contextPath: GoogleChronicleBackstory.Events.target.platform
description: Platform operating system.
type: String
- contextPath: GoogleChronicleBackstory.Events.target.platformPatchLevel
description: Platform operating system patch level.
type: String
- contextPath: GoogleChronicleBackstory.Events.target.platformVersion
description: Platform operating system version.
type: String
- contextPath: GoogleChronicleBackstory.Events.target.ip
description: IP address associated with a network connection.
type: String
- contextPath: GoogleChronicleBackstory.Events.target.port
description: Source or destination network port number when a specific network connection is described within an event.
type: String
- contextPath: GoogleChronicleBackstory.Events.target.mac
description: One or more MAC addresses associated with a device.
type: String
- contextPath: GoogleChronicleBackstory.Events.target.administrativeDomain
description: Domain which the device belongs to (for example, the Windows domain).
type: String
- contextPath: GoogleChronicleBackstory.Events.target.url
description: Standard URL.
type: String
- contextPath: GoogleChronicleBackstory.Events.target.file.fileMetadata
description: Metadata associated with the file.
type: String
- contextPath: GoogleChronicleBackstory.Events.target.file.fullPath
description: Full path identifying the location of the file on the system.
type: String
- contextPath: GoogleChronicleBackstory.Events.target.file.md5
description: MD5 hash value of the file.
type: String
- contextPath: GoogleChronicleBackstory.Events.target.file.mimeType
description: Multipurpose Internet Mail Extensions (MIME) type of the file.
type: String
- contextPath: GoogleChronicleBackstory.Events.target.file.sha1
description: SHA-1 hash value of the file.
type: String
- contextPath: GoogleChronicleBackstory.Events.target.file.sha256
description: SHA-256 hash value of the file.
type: String
- contextPath: GoogleChronicleBackstory.Events.target.file.size
description: Size of the file.
type: String
- contextPath: GoogleChronicleBackstory.Events.target.process.commandLine
description: Stores the command line string for the process.
type: String
- contextPath: GoogleChronicleBackstory.Events.target.process.productSpecificProcessId
description: Stores the product specific process ID.
type: String
- contextPath: GoogleChronicleBackstory.Events.target.process.productSpecificParentProcessId
description: Stores the product specific process ID for the parent process.
type: String
- contextPath: GoogleChronicleBackstory.Events.target.process.file
description: Stores the file name of the file in use by the process.
type: String
- contextPath: GoogleChronicleBackstory.Events.target.process.file.fileMetadata
description: Metadata associated with the file.
type: String
- contextPath: GoogleChronicleBackstory.Events.target.process.file.fullPath
description: Full path identifying the location of the file on the system.
type: String
- contextPath: GoogleChronicleBackstory.Events.target.process.file.md5
description: MD5 hash value of the file.
type: String
- contextPath: GoogleChronicleBackstory.Events.target.process.file.mimeType
description: Multipurpose Internet Mail Extensions (MIME) type of the file.
type: String
- contextPath: GoogleChronicleBackstory.Events.target.process.file.sha1
description: SHA-1 hash value of the file.
type: String
- contextPath: GoogleChronicleBackstory.Events.target.process.file.sha256
description: SHA-256 hash value of the file.
type: String
- contextPath: GoogleChronicleBackstory.Events.target.process.file.size
description: Size of the file.
type: String
- contextPath: GoogleChronicleBackstory.Events.target.process.parentPid
description: Stores the process ID for the parent process.
type: String
- contextPath: GoogleChronicleBackstory.Events.target.process.pid
description: Stores the process ID.
type: String
- contextPath: GoogleChronicleBackstory.Events.target.registry.registryKey
description: Stores the registry key associated with an application or system component.
type: String
- contextPath: GoogleChronicleBackstory.Events.target.registry.registryValueName
description: Stores the name of the registry value associated with an application or system component.
type: String
- contextPath: GoogleChronicleBackstory.Events.target.registry.registryValueData
description: Stores the data associated with a registry value.
type: String
- contextPath: GoogleChronicleBackstory.Events.target.user.emailAddresses
description: Stores the email addresses for the user.
type: String
- contextPath: GoogleChronicleBackstory.Events.target.user.employeeId
description: Stores the human resources employee ID for the user.
type: String
- contextPath: GoogleChronicleBackstory.Events.target.user.firstName
description: Stores the first name for the user.
type: String
- contextPath: GoogleChronicleBackstory.Events.target.user.middleName
description: Stores the middle name for the user.
type: String
- contextPath: GoogleChronicleBackstory.Events.target.user.lastName
description: Stores the last name for the user.
type: String
- contextPath: GoogleChronicleBackstory.Events.target.user.groupid
description: Stores the group ID associated with a user.