IBM XForce Collections¶
Table of Contents¶
Release Notes¶
Version |
Date |
Notes |
---|---|---|
1.1.0 |
05/2023 |
Updated code to latest template and added playbooks |
1.0.1 |
09/2020 |
App Host support added and proxy support added |
1.0.0 |
12/2018 |
Initial Release |
1.1.0 Changes¶
In v1.1, the existing rules and workflows have been replaced with playbooks. This change is made to support the ongoing, newer capabilities of playbooks. Each playbook has the same functionality as the previous, corresponding rule/workflow.
If upgrading from a previous release, you’ll noticed that the previous release’s rules/workflows remain in place. Both sets of rules and playbooks are active. For manual actions, playbooks will have the same name as it’s corresponding rule, but with “(PB)” added at the end. For automatic actions, the playbooks will be disabled by default.
You can continue to use the rules/workflows. But migrating to playbooks will provide greater functionality along with future app enhancements and bug fixes.
Overview¶
IBM SOAR Components for the IBM XForce Collections API
The fn_xforce integration provides the ability to query the IBM XForce Collections API. Collections can be queried either by matching a provided search term or by Collection ID. Additionally, it is possible to query both public and private Collections. Information gathered from X-Force can be used for incident and artifact enrichment.
Key Features¶
Query Xforce for collections
Get Xforce collection by ID
Requirements¶
This app supports the IBM Security QRadar SOAR Platform and the IBM Security QRadar SOAR for IBM Cloud Pak for Security.
SOAR platform¶
The SOAR platform supports two app deployment mechanisms, Edge Gateway (formerly App Host) and integration server.
If deploying to a SOAR platform with an Edge Gateway, the requirements are:
SOAR platform >=
45.0.0
.The app is in a container-based format (available from the AppExchange as a
zip
file).
If deploying to a SOAR platform with an integration server, the requirements are:
SOAR platform >=
45.0.0
.The app is in the older integration format (available from the AppExchange as a
zip
file which contains atar.gz
file).Integration server is running
resilient_circuits>=45.0.0
.If using an API key account, make sure the account provides the following minimum permissions:
Name
Permissions
Org Data
Read
Function
Read
The following SOAR platform guides provide additional information:
Edge Gateway Deployment Guide or App Host Deployment Guide: provides installation, configuration, and troubleshooting information, including proxy server settings.
Integration Server Guide: provides installation, configuration, and troubleshooting information, including proxy server settings.
System Administrator Guide: provides the procedure to install, configure and deploy apps.
The above guides are available on the IBM Documentation website at ibm.biz/soar-docs. On this web page, select your SOAR platform version. On the follow-on page, you can find the Edge Gateway Deployment Guide, App Host Deployment Guide, or Integration Server Guide by expanding Apps in the Table of Contents pane. The System Administrator Guide is available by expanding System Administrator.
Cloud Pak for Security¶
If you are deploying to IBM Cloud Pak for Security, the requirements are:
IBM Cloud Pak for Security >=
1.10
.Cloud Pak is configured with an Edge Gateway.
The app is in a container-based format (available from the AppExchange as a
zip
file).
The following Cloud Pak guides provide additional information:
Edge Gateway Deployment Guide or App Host Deployment Guide: provides installation, configuration, and troubleshooting information, including proxy server settings. From the Table of Contents, select Case Management and Orchestration & Automation > Orchestration and Automation Apps.
System Administrator Guide: provides information to install, configure, and deploy apps. From the IBM Cloud Pak for Security IBM Documentation table of contents, select Case Management and Orchestration & Automation > System administrator.
These guides are available on the IBM Documentation website at ibm.biz/cp4s-docs. From this web page, select your IBM Cloud Pak for Security version. From the version-specific IBM Documentation page, select Case Management and Orchestration & Automation.
Proxy Server¶
The app does support a proxy server.
Python Environment¶
Python 3.6 and Python 3.9 are supported. Additional package dependencies may exist for each of these packages:
resilient_circuits>=45.0.0
Installation¶
Install¶
To install or uninstall an App or Integration on the SOAR platform, see the documentation at ibm.biz/soar-docs.
To install or uninstall an App on IBM Cloud Pak for Security, see the documentation at ibm.biz/cp4s-docs and follow the instructions above to navigate to Orchestration and Automation.
App Configuration¶
The following table provides the settings you need to configure the app. These settings are made in the app.config file. See the documentation discussed in the Requirements section for the procedure.
Config |
Required |
Example |
Description |
---|---|---|---|
xforce_apikey |
Yes |
|
API key for Xforce. |
xforce_baseurl |
Yes |
|
Xforce base url. |
xforce_password |
Yes |
|
Password for Xforce |
Function - X-Force Utilities: Get Collection by ID¶
A function that takes in a parameter of a xforce_collection_id and then submits this to the X-Force API to gather data for the provided case.
Inputs:
Name |
Type |
Required |
Example |
Tooltip |
---|---|---|---|---|
|
|
Yes |
|
A collection ID for use with the XForce API |
Outputs:
NOTE: This example might be in JSON format, but
results
is a Python Dictionary on the SOAR platform.
results = {
"content": {
"caseFileID": "7c551c65686c0866daafcee3d838f052",
"coOwner": false,
"contents": {
"editorType": "draft",
"plainText": "Threat Type\nDescribe the type of Collection being created\nOverview\nGive a succinct overview of the threat involved\nIndicators of Compromise\n 1.1.1.1 https://ru.wikipedia.org/wiki cf23df2207d99a74fbe169e3eba035e633b65d94 \n 108.177.16.0 CVE-2015-0313 poehali@namore.com stopspam.ru/tak/kak jorik.txt \nya.com 152c883836f1f3eec207395ac6f8e0c6 .ru50d858e0985ecc7f60418aaf0cc5ab587f42c2570a884095a9e8ccacd0f6545c \nProtection\nShare best practices for protection against this threat\nRecommendations\nRecommend a course of action, resources or applications to remediate this threat\nReferences\nAdd further resources and information about this threat",
"rawContentState": {
"blocks": [
{
"data": {},
"depth": 0,
"entityRanges": [],
"inlineStyleRanges": [],
"key": "1988j",
"text": "Threat Type",
"type": "header-one"
},
{
"data": {},
"depth": 0,
"entityRanges": [],
"inlineStyleRanges": [],
"key": "f1988",
"text": "Describe the type of Collection being created",
"type": "unstyled"
},
{
"data": {},
"depth": 0,
"entityRanges": [],
"inlineStyleRanges": [],
"key": "989eq",
"text": "Overview",
"type": "header-one"
},
{
"data": {},
"depth": 0,
"entityRanges": [],
"inlineStyleRanges": [],
"key": "e6gah",
"text": "Give a succinct overview of the threat involved",
"type": "unstyled"
},
{
"data": {},
"depth": 0,
"entityRanges": [],
"inlineStyleRanges": [],
"key": "73loq",
"text": "Indicators of Compromise",
"type": "header-one"
},
{
"data": {},
"depth": 0,
"entityRanges": [
{
"key": 0,
"length": 7,
"offset": 1
},
{
"key": 1,
"length": 29,
"offset": 9
},
{
"key": 2,
"length": 40,
"offset": 39
}
],
"inlineStyleRanges": [],
"key": "3ge65",
"text": " 1.1.1.1 https://ru.wikipedia.org/wiki cf23df2207d99a74fbe169e3eba035e633b65d94 ",
"type": "unstyled"
},
{
"data": {},
"depth": 0,
"entityRanges": [
{
"key": 3,
"length": 12,
"offset": 1
},
{
"key": 4,
"length": 13,
"offset": 14
},
{
"key": 5,
"length": 19,
"offset": 47
},
{
"key": 6,
"length": 9,
"offset": 67
}
],
"inlineStyleRanges": [],
"key": "6efvp",
"text": " 108.177.16.0 CVE-2015-0313 poehali@namore.com stopspam.ru/tak/kak jorik.txt ",
"type": "unstyled"
},
{
"data": {},
"depth": 0,
"entityRanges": [
{
"key": 7,
"length": 6,
"offset": 0
},
{
"key": 8,
"length": 32,
"offset": 7
},
{
"key": 9,
"length": 64,
"offset": 43
}
],
"inlineStyleRanges": [],
"key": "a9563",
"text": "ya.com 152c883836f1f3eec207395ac6f8e0c6 .ru50d858e0985ecc7f60418aaf0cc5ab587f42c2570a884095a9e8ccacd0f6545c ",
"type": "unstyled"
},
{
"data": {},
"depth": 0,
"entityRanges": [],
"inlineStyleRanges": [],
"key": "29es1",
"text": "Protection",
"type": "header-one"
},
{
"data": {},
"depth": 0,
"entityRanges": [],
"inlineStyleRanges": [],
"key": "79k7",
"text": "Share best practices for protection against this threat",
"type": "unstyled"
},
{
"data": {},
"depth": 0,
"entityRanges": [],
"inlineStyleRanges": [],
"key": "7ua1h",
"text": "Recommendations",
"type": "header-one"
},
{
"data": {},
"depth": 0,
"entityRanges": [],
"inlineStyleRanges": [],
"key": "1fnn",
"text": "Recommend a course of action, resources or applications to remediate this threat",
"type": "unstyled"
},
{
"data": {},
"depth": 0,
"entityRanges": [],
"inlineStyleRanges": [],
"key": "l9da",
"text": "References",
"type": "header-one"
},
{
"data": {},
"depth": 0,
"entityRanges": [],
"inlineStyleRanges": [],
"key": "78bt3",
"text": "Add further resources and information about this threat",
"type": "unstyled"
}
],
"entityMap": {
"0": {
"data": {
"id": "1.1.1.1",
"type": "IP"
},
"mutability": "IMMUTABLE",
"type": "OBSERVABLE"
},
"1": {
"data": {
"id": "https://ru.wikipedia.org/wiki",
"type": "URL"
},
"mutability": "IMMUTABLE",
"type": "OBSERVABLE"
},
"2": {
"data": {
"id": "cf23df2207d99a74fbe169e3eba035e633b65d94",
"type": "MAL"
},
"mutability": "IMMUTABLE",
"type": "OBSERVABLE"
},
"3": {
"data": {
"id": "108.177.16.0",
"type": "IP"
},
"mutability": "IMMUTABLE",
"type": "OBSERVABLE"
},
"4": {
"data": {
"id": "CVE-2015-0313",
"type": "VUL"
},
"mutability": "IMMUTABLE",
"type": "OBSERVABLE"
},
"5": {
"data": {
"id": "stopspam.ru/tak/kak",
"type": "URL"
},
"mutability": "IMMUTABLE",
"type": "OBSERVABLE"
},
"6": {
"data": {
"id": "jorik.txt",
"type": "URL"
},
"mutability": "IMMUTABLE",
"type": "OBSERVABLE"
},
"7": {
"data": {
"id": "ya.com",
"type": "URL"
},
"mutability": "IMMUTABLE",
"type": "OBSERVABLE"
},
"8": {
"data": {
"id": "152c883836f1f3eec207395ac6f8e0c6",
"type": "MAL"
},
"mutability": "IMMUTABLE",
"type": "OBSERVABLE"
},
"9": {
"data": {
"id": "50d858e0985ecc7f60418aaf0cc5ab587f42c2570a884095a9e8ccacd0f6545c",
"type": "MAL"
},
"mutability": "IMMUTABLE",
"type": "OBSERVABLE"
}
}
},
"reports": [],
"wiki": "Threat Type\nDescribe the type of Collection being created\nOverview\nGive a succinct overview of the threat involved\nIndicators of Compromise\n 1.1.1.1 https://ru.wikipedia.org/wiki cf23df2207d99a74fbe169e3eba035e633b65d94 \n 108.177.16.0 CVE-2015-0313 poehali@namore.com stopspam.ru/tak/kak jorik.txt \nya.com 152c883836f1f3eec207395ac6f8e0c6 .ru50d858e0985ecc7f60418aaf0cc5ab587f42c2570a884095a9e8ccacd0f6545c \nProtection\nShare best practices for protection against this threat\nRecommendations\nRecommend a course of action, resources or applications to remediate this threat\nReferences\nAdd further resources and information about this threat"
},
"created": "2021-05-20T12:19:07.138Z",
"deletable": false,
"extensions": [],
"links": [],
"mine": false,
"nGroups": 0,
"nPeople": 0,
"owner": {
"isDisabled": false,
"name": "QA RVision",
"uuid": "http://www.ibm.com/55000AJ8RT"
},
"shared": "public",
"tags": [],
"title": "Test_Collection",
"tlpColor": {
"tlpColorCode": "white",
"tlpColorName": "TLP_WHITE",
"tlpIsUserDefined": true
},
"unconvertedContents": null,
"writeable": false
},
"inputs": {
"xforce_collection_id": "7c551c65686c0866daafcee3d838f052"
},
"metrics": {
"execution_time_ms": 584,
"host": "local",
"package": "fn-xforce",
"package_version": "1.1.0",
"timestamp": "2023-05-09 09:11:51",
"version": "1.0"
},
"raw": null,
"reason": null,
"success": true,
"version": 2.0
}
Example Pre-Process Script:
inputs.xforce_collection_id = artifact.value
Example Post-Process Script:
results = playbook.functions.results.collection_results
if results.get("success"):
content = results.get("content", {})
if isinstance(content, str):
incident.addNote(content)
elif content.get("contents", {}):
noteText = f"""<b>Title:</b> {content.get('title')}
<b>Created:</b> {content.get('created')}
<b>Tags:</b> {content.get('tags')}
{content.get('contents', {}).get('wiki')}
"""
incident.addNote(noteText)
Function - X-Force Utilities: Query Collection¶
A function that allows a user to submit a query to the X-Force Collections API. Supports searching either public or private collections.
Inputs:
Name |
Type |
Required |
Example |
Tooltip |
---|---|---|---|---|
|
|
No |
|
Which type of collections to search. Public or private collections available. |
|
|
Yes |
|
A query to submit for searching XForce Collections |
Outputs:
NOTE: This example might be in JSON format, but
results
is a Python Dictionary on the SOAR platform.
results = {
"content": {
"casefiles": [
{
"caseFileID": "7c551c65686c0866daafcee3d8061d6b",
"created": "2021-10-14T10:28:28.741Z",
"links": [],
"owner": {
"isDisabled": false,
"name": "\u0414\u0430\u0440\u044c\u044f \u041b\u0430\u043d\u0433\u0438\u043d\u0430",
"userid": "http://www.ibm.com/5500038YXJ"
},
"shared": true,
"tags": [],
"title": "\u0440\u043f\u043e\u043f",
"writable": false
},
{
"caseFileID": "7c551c65686c0866daafcee3d838f052",
"created": "2021-05-20T12:19:07.138Z",
"links": [],
"owner": {
"isDisabled": false,
"name": "QA RVision",
"userid": "http://www.ibm.com/55000AJ8RT"
},
"shared": true,
"tags": [],
"title": "Test_Collection",
"writable": false
},
{
"caseFileID": "2a58b28a880eab0ddc23d856e4871a69",
"created": "2023-03-08T17:51:22.131Z",
"links": [],
"owner": {
"isDisabled": false,
"name": "First Last",
"userid": "http://www.ibm.com/550001H8BT"
},
"shared": true,
"tags": [],
"title": "test2",
"totalVotes": 0,
"writable": true
},
{
"caseFileID": "6db4c6bcafe3333fffaf5a754b7ae73d",
"created": "2020-03-10T12:33:59.224Z",
"links": [],
"owner": {
"isDisabled": false,
"name": "sai Karthik",
"userid": "http://www.ibm.com/55000126PG"
},
"shared": true,
"tags": [],
"title": "test1",
"writable": false
},
{
"caseFileID": "52adef79fe80b4958050c700a8b0da15",
"created": "2019-07-22T17:20:40.817Z",
"links": [],
"owner": {
"isDisabled": false,
"name": "ZHENG LU",
"userid": "http://www.ibm.com/550002YAE9"
},
"shared": true,
"tags": [],
"title": "Test Email",
"writable": false
},
{
"caseFileID": "7d889aac958a5dbebc01a16979140eb2",
"created": "2023-01-23T11:34:04.800Z",
"links": [],
"owner": {
"isDisabled": false,
"name": "X-Force Research",
"userid": "http://www.ibm.com/550004JMXN",
"verified": "researcher"
},
"shared": true,
"tags": [
"phishing",
"early-warning",
"squatting",
"x-location:all",
"x-industry:media"
],
"title": "Taobao Squatting Campaign",
"writable": false
},
{
"caseFileID": "e2fa5296f88a0c4ad37e4f4652c221db",
"created": "2017-10-30T07:47:29.799Z",
"links": [],
"owner": {
"isDisabled": false,
"name": "Noah J, A",
"userid": "http://www.ibm.com/50SKQTFFS2"
},
"shared": true,
"tags": [
"icloader",
"fusioncore",
"kryptik",
"adware",
"malware"
],
"title": "Kryptik / FusionCore / ICLoader Malware Campaign via AWS IP",
"writable": false
},
{
"caseFileID": "383879eab7c4e0c5d38c1c2e9709ffe9",
"created": "2018-04-10T13:05:35.686Z",
"links": [],
"owner": {
"isDisabled": false,
"name": "XFTAS Newsletter Admin",
"userid": "http://www.ibm.com/50GHFD9JCW",
"verified": "ibmexpert"
},
"shared": true,
"tags": [
"xftas"
],
"title": "XFTAS Daily Threat Assessment for April 02, 2018",
"writable": false
}
],
"num_of_casefiles": 8
},
"inputs": {
"xforce_collection_type": "public",
"xforce_query": "1.1.1.1"
},
"metrics": {
"execution_time_ms": 556,
"host": "local",
"package": "fn-xforce",
"package_version": "1.1.0",
"timestamp": "2023-05-09 09:11:47",
"version": "1.0"
},
"raw": null,
"reason": null,
"success": true,
"version": 2.0
}
Example Pre-Process Script:
inputs.xforce_query = artifact.value
inputs.xforce_collection_type = "private"
Example Post-Process Script:
results = playbook.functions.results.query_collections_results
if results.get("success"):
content = results.get("content", {})
if isinstance(content, str):
noteText = """<b>X-Force Query status</b><br>{}""".format(content)
incident.addNote(helper.createRichText(noteText))
elif content.get("num_of_casefiles") > 0:
noteText = """<b>X-Force Query status</b><br>Total matched case files: <b>{}</b>""".format(content.get("num_of_casefiles", 0))
incident.addNote(helper.createRichText(noteText))
Playbooks¶
Playbook Name |
Description |
Object |
Status |
---|---|---|---|
X-Force Query Collection by ID - Example (PB) |
Takes in a parameter of a xforce_collection_id and then attempts to gather enriching information for that collection via the X-Force API. |
artifact |
|
X-Force Query from Artifact - Example (PB) |
takes in a provided artifact as a query and then submits this to the X-Force API searching collections for casefiles relevant to the query. |
artifact |
|
X-Force Return Top 3 from Collection(s) - Example (PB) |
None |
artifact |
|
Troubleshooting & Support¶
Refer to the documentation listed in the Requirements section for troubleshooting information.
For Support¶
This is an IBM supported app. Please search ibm.com/mysupport for assistance.