/Packs/ThreatConnect/Integrations/ThreatConnect_v2/ThreatConnect_v2.yml

https://github.com/demisto/content · YAML · 2100 lines · 2100 code · 0 blank · 0 comment · 0 complexity · b7b492765fdf58d7576c95f360e1470a MD5 · raw file

  1. commonfields:
  2. id: ThreatConnect v2
  3. version: -1
  4. name: ThreatConnect v2
  5. display: ThreatConnect v2
  6. category: Data Enrichment & Threat Intelligence
  7. description: ThreatConnect's intelligence-driven security operations solution with intelligence, automation, analytics, and workflows.
  8. configuration:
  9. - display: baseUrl
  10. name: baseUrl
  11. defaultvalue: https://api.threatconnect.com
  12. type: 0
  13. required: true
  14. - display: Access ID
  15. name: accessId
  16. defaultvalue: ""
  17. type: 0
  18. required: true
  19. - display: Secret Key
  20. name: secretKey
  21. defaultvalue: ""
  22. type: 4
  23. required: true
  24. - display: Default Organization
  25. name: defaultOrg
  26. defaultvalue: ""
  27. type: 0
  28. required: false
  29. - display: Rating threshold for Malicious Indicators
  30. name: rating
  31. defaultvalue: "3"
  32. type: 0
  33. required: false
  34. - display: Confidence threshold for Malicious Indicators
  35. name: confidence
  36. defaultvalue: "50"
  37. type: 0
  38. required: false
  39. - display: Indicator Reputation Freshness (in days)
  40. name: freshness
  41. defaultvalue: "7"
  42. type: 0
  43. required: false
  44. - display: Use system proxy settings
  45. name: proxy
  46. required: false
  47. type: 8
  48. script:
  49. script: '-'
  50. type: python
  51. commands:
  52. - name: ip
  53. arguments:
  54. - name: ip
  55. required: true
  56. default: true
  57. description: The IPv4 or IPv6 address.
  58. - name: owners
  59. description: A comma-separated list of a client's organizations, sources, or communities
  60. to which a user has permissions. For example, users with admin permissions
  61. can search for indicators belonging to all owners.
  62. - name: ratingThreshold
  63. description: A list of results filtered by indicators whose threat rating is
  64. greater than the specified value. Can be "0" - "Unknown", "1" - "Suspicious",
  65. "2" - "Low", "3" - Moderate, "4" - High, or "5" - "Critical".
  66. - name: confidenceThreshold
  67. description: A list of results filtered by indicators whose confidence rating
  68. is greater than the specified value. Can be "0%" - "Unknown," "1% " - "Discredited",
  69. "2-29%" - "Improbable," "30-49%" - "Doubtful," "50-69%" - "Possible", "70-89%"
  70. - "Probable," or "90-100%" - "Confirmed".
  71. outputs:
  72. - contextPath: TC.Indicator.Name
  73. description: The name of the indicator.
  74. type: string
  75. - contextPath: TC.Indicator.Type
  76. description: The type of the indicator.
  77. type: string
  78. - contextPath: TC.Indicator.ID
  79. description: The ID of the indicator.
  80. type: string
  81. - contextPath: TC.Indicator.Description
  82. description: The description of the indicator.
  83. type: string
  84. - contextPath: TC.Indicator.Owner
  85. description: The owner of the indicator.
  86. type: string
  87. - contextPath: TC.Indicator.CreateDate
  88. description: The date on which the indicator was created.
  89. type: date
  90. - contextPath: TC.Indicator.LastModified
  91. description: The date on which the indicator was modified.
  92. type: date
  93. - contextPath: TC.Indicator.Rating
  94. description: The threat rating of the indicator.
  95. type: number
  96. - contextPath: TC.Indicator.Confidence
  97. description: The confidence rating of the indicator.
  98. type: number
  99. - contextPath: DBotScore.Indicator
  100. description: The value assigned by DBot for the indicator.
  101. type: string
  102. - contextPath: DBotScore.Type
  103. description: The type assigned by DBot for the indicator.
  104. type: string
  105. - contextPath: DBotScore.Score
  106. description: The score assigned by DBot for the indicator.
  107. type: number
  108. - contextPath: DBotScore.Vendor
  109. description: The vendor used to calculate the score.
  110. type: string
  111. - contextPath: IP.Address
  112. description: The IP address of the indicator.
  113. type: string
  114. - contextPath: IP.Malicious.Vendor
  115. description: For malicious IP addresses, the vendor that made the decision.
  116. type: string
  117. - contextPath: IP.Malicious.Description
  118. description: For malicious IP addresses, the full description.
  119. type: string
  120. description: Searches for an indicator of type IP address.
  121. - name: url
  122. arguments:
  123. - name: url
  124. required: true
  125. default: true
  126. description: The URL for which to search. For example, "www.demisto.com".
  127. - name: owners
  128. description: A comma-separated list of a client's organizations, sources, or communities
  129. to which a clients API user has been granted permission. For example, "owner1",
  130. "owner2", or "owner3".
  131. - name: ratingThreshold
  132. description: A list of results filtered by indicators whose threat rating is
  133. greater than the specified value. Can be "0" - "Unknown", "1" - "Suspicious",
  134. "2" - "Low", "3" - Moderate, "4" - High, or "5" - "Critical".
  135. - name: confidenceThreshold
  136. description: A list of results filtered by indicators whose confidence rating
  137. is greater than the specified value. Can be "0%" - "Unknown," "1% " - "Discredited",
  138. "2-29%" - "Improbable," "30-49%" - "Doubtful," "50-69%" - "Possible", "70-89%"
  139. - "Probable," or "90-100%" - "Confirmed".
  140. outputs:
  141. - contextPath: TC.Indicator.Name
  142. description: The name of the indicator.
  143. type: string
  144. - contextPath: TC.Indicator.Type
  145. description: The type of the indicator.
  146. type: string
  147. - contextPath: TC.Indicator.ID
  148. description: The ID of the indicator.
  149. type: string
  150. - contextPath: TC.Indicator.Description
  151. description: The description of the indicator.
  152. type: string
  153. - contextPath: TC.Indicator.Owner
  154. description: The owner of the indicator.
  155. type: string
  156. - contextPath: TC.Indicator.CreateDate
  157. description: The date on which the indicator was created.
  158. type: date
  159. - contextPath: TC.Indicator.LastModified
  160. description: The date on which the indicator was last modified.
  161. type: date
  162. - contextPath: TC.Indicator.Rating
  163. description: The threat rating of the indicator.
  164. type: number
  165. - contextPath: TC.Indicator.Confidence
  166. description: The confidence rating of the indicator.
  167. type: number
  168. - contextPath: DBotScore.Indicator
  169. description: The value assigned by DBot for the indicator.
  170. type: string
  171. - contextPath: DBotScore.Type
  172. description: The type assigned by DBot for the indicator.
  173. type: string
  174. - contextPath: DBotScore.Score
  175. description: The score assigned by DBot for the indicator.
  176. type: number
  177. - contextPath: DBotScore.Vendor
  178. description: The vendor used to calculate the score.
  179. type: string
  180. - contextPath: URL.Data
  181. description: The data of the URL indicator.
  182. type: string
  183. - contextPath: URL.Malicious.Vendor
  184. description: For malicious URLs, the vendor that made the decision.
  185. type: string
  186. - contextPath: URL.Malicious.Description
  187. description: For malicious URLs, the full description.
  188. type: string
  189. description: Searches for an indicator of type URL.
  190. - name: file
  191. arguments:
  192. - name: file
  193. required: true
  194. default: true
  195. description: The hash of the file. Can be "MD5", "SHA-1", or "SHA-256".
  196. - name: owners
  197. description: A comma-separated list of a client's organizations, sources, or communities
  198. to which a user has permissions. For example, users with admin permissions
  199. can search for indicators belonging to all owners.
  200. - name: ratingThreshold
  201. description: A list of results filtered by indicators whose threat rating is
  202. greater than the specified value. Can be "0" - "Unknown", "1" - "Suspicious",
  203. "2" - "Low", "3" - Moderate, "4" - High, or "5" - "Critical".
  204. - name: confidenceThreshold
  205. description: A list of results filtered by indicators whose confidence rating
  206. is greater than the specified value. Can be "0%" - "Unknown," "1% " - "Discredited",
  207. "2-29%" - "Improbable," "30-49%" - "Doubtful," "50-69%" - "Possible", "70-89%"
  208. - "Probable," or "90-100%" - "Confirmed".
  209. outputs:
  210. - contextPath: TC.Indicator.Name
  211. description: The name of the indicator.
  212. type: string
  213. - contextPath: TC.Indicator.Type
  214. description: The type of the indicator.
  215. type: string
  216. - contextPath: TC.Indicator.ID
  217. description: The ID of the indicator.
  218. type: string
  219. - contextPath: TC.Indicator.Description
  220. description: The description of the indicator.
  221. type: string
  222. - contextPath: TC.Indicator.Owner
  223. description: The owner of the indicator.
  224. type: string
  225. - contextPath: TC.Indicator.CreateDate
  226. description: The date on which the indicator was created.
  227. type: date
  228. - contextPath: TC.Indicator.LastModified
  229. description: The last date on which the indicator was modified.
  230. type: date
  231. - contextPath: TC.Indicator.Rating
  232. description: The threat rating of the indicator.
  233. type: number
  234. - contextPath: TC.Indicator.Confidence
  235. description: The confidence rating of the indicator.
  236. type: number
  237. - contextPath: TC.Indicator.File.MD5
  238. description: The MD5 hash of the indicator.
  239. type: string
  240. - contextPath: TC.Indicator.File.SHA1
  241. description: The SHA1 hash of the indicator.
  242. type: string
  243. - contextPath: TC.Indicator.File.SHA256
  244. description: The SHA256 hash of the indicator.
  245. type: string
  246. - contextPath: DBotScore.Indicator
  247. description: The value assigned by DBot for the indicator.
  248. type: string
  249. - contextPath: DBotScore.Type
  250. description: The type assigned by DBot for the indicator.
  251. type: string
  252. - contextPath: DBotScore.Score
  253. description: The score assigned by DBot for the indicator.
  254. type: number
  255. - contextPath: DBotScore.Vendor
  256. description: The vendor used to calculate the score.
  257. type: string
  258. - contextPath: File.MD5
  259. description: The MD5 hash of the indicator.
  260. type: string
  261. - contextPath: File.SHA1
  262. description: The SHA1 hash of the indicator.
  263. type: string
  264. - contextPath: File.SHA256
  265. description: The SHA256 hash of the indicator.
  266. type: string
  267. - contextPath: File.Malicious.Vendor
  268. description: For malicious files, the vendor that made the decision.
  269. type: string
  270. - contextPath: File.Malicious.Description
  271. description: For malicious files, the full description.
  272. type: string
  273. description: Searches for an indicator of type file.
  274. - name: tc-owners
  275. arguments: []
  276. outputs:
  277. - contextPath: TC.Owner.Name
  278. description: The name of the owner.
  279. type: string
  280. - contextPath: TC.Owner.ID
  281. description: The ID of the owner.
  282. type: string
  283. - contextPath: TC.Owner.Type
  284. description: The type of the owner.
  285. type: string
  286. description: Retrieves all owners for the current account.
  287. - name: tc-indicators
  288. arguments:
  289. - name: owner
  290. description: A list of results filtered by the owner of the indicator.
  291. - name: limit
  292. description: The maximum number of results that can be returned. The default
  293. is 500.
  294. outputs:
  295. - contextPath: TC.Indicator.Name
  296. description: The name of the indicator.
  297. type: string
  298. - contextPath: TC.Indicator.Type
  299. description: The type of the indicator.
  300. type: string
  301. - contextPath: TC.Indicator.ID
  302. description: The ID of the indicator.
  303. type: string
  304. - contextPath: TC.Indicator.Description
  305. description: The description of the indicator.
  306. type: string
  307. - contextPath: TC.Indicator.Owner
  308. description: The owner of the indicator.
  309. type: string
  310. - contextPath: TC.Indicator.CreateDate
  311. description: The date on which the indicator was created.
  312. type: date
  313. - contextPath: TC.Indicator.LastModified
  314. description: The last date on which the indicator was modified.
  315. type: date
  316. - contextPath: TC.Indicator.Rating
  317. description: The threat rating of the indicator.
  318. type: number
  319. - contextPath: TC.Indicator.Confidence
  320. description: The confidence rating of the indicator.
  321. type: number
  322. - contextPath: TC.Indicator.WhoisActive
  323. description: The active indicator (for domains only).
  324. type: string
  325. - contextPath: TC.Indicator.File.MD5
  326. description: The MD5 hash of the indicator of the file.
  327. type: string
  328. - contextPath: TC.Indicator.File.SHA1
  329. description: The SHA1 hash of the indicator of the file.
  330. type: string
  331. - contextPath: TC.Indicator.File.SHA256
  332. description: The SHA256 hash of the indicator of the file.
  333. type: string
  334. - contextPath: DBotScore.Indicator
  335. description: The value assigned by DBot for the indicator.
  336. type: string
  337. - contextPath: DBotScore.Type
  338. description: The type assigned by DBot for the indicator.
  339. type: string
  340. - contextPath: DBotScore.Score
  341. description: The score assigned by DBot for the indicator.
  342. type: number
  343. - contextPath: DBotScore.Vendor
  344. description: The vendor used to calculate the score.
  345. type: string
  346. - contextPath: IP.Address
  347. description: The IP address of the indicator.
  348. type: string
  349. - contextPath: IP.Malicious.Vendor
  350. description: For malicious IP addresses, the vendor that made the decision.
  351. type: string
  352. - contextPath: IP.Malicious.Description
  353. description: For malicious IP addresses, the full description.
  354. type: string
  355. - contextPath: URL.Data
  356. description: The data of the URL of the indicator.
  357. type: string
  358. - contextPath: URL.Malicious.Vendor
  359. description: For malicious URLs, the vendor that made the decision.
  360. type: string
  361. - contextPath: URL.Malicious.Description
  362. description: For malicious URLs, the full description.
  363. type: string
  364. - contextPath: Domain.Name
  365. description: The name of the domain.
  366. type: string
  367. - contextPath: Domain.Malicious.Vendor
  368. description: For malicious domains, the vendor that made the decision.
  369. type: string
  370. - contextPath: Domain.Malicious.Description
  371. description: For malicious domains, the full description.
  372. type: string
  373. - contextPath: File.MD5
  374. description: The MD5 hash of the file.
  375. type: string
  376. - contextPath: File.SHA1
  377. description: The SHA1 hash of the file.
  378. type: string
  379. - contextPath: File.SHA256
  380. description: The SHA256 hash of the file.
  381. type: string
  382. - contextPath: File.Malicious.Vendor
  383. description: For malicious files, the vendor that made the decision.
  384. type: string
  385. - contextPath: File.Malicious.Description
  386. description: For malicious files, the full description.
  387. type: string
  388. description: Retrieves a list of all indicators.
  389. - name: tc-get-tags
  390. arguments: []
  391. outputs:
  392. - contextPath: TC.Tags
  393. description: A list of tags.
  394. type: Unknown
  395. description: Returns a list of all ThreatConnect tags.
  396. - name: tc-tag-indicator
  397. arguments:
  398. - name: tag
  399. required: true
  400. description: The name of the tag.
  401. - name: indicator
  402. required: true
  403. description: The indicator to tag. For example, for an IP indicator, "8.8.8.8".
  404. - name: owner
  405. description: A list of indicators filtered by the owner.
  406. description: Adds a tag to an existing indicator.
  407. - name: tc-get-indicator
  408. arguments:
  409. - name: indicator
  410. required: true
  411. default: true
  412. description: The name of the indicator by which to search. The command retrieves
  413. information from all owners. Can be an IP address, a URL, or a file hash.
  414. - name: indicator_type
  415. description: Only for custom. Leave empty for standard ones
  416. - name: owners
  417. description: Indicator Owner(s)
  418. - name: ratingThreshold
  419. description: A list of results filtered by indicators whose threat rating is
  420. greater than the specified value. Can be "0" - "Unknown", "1" - "Suspicious",
  421. "2" - "Low", "3" - Moderate, "4" - High, or "5" - "Critical".
  422. - name: confidenceThreshold
  423. description: A list of results filtered by indicators whose confidence rating
  424. is greater than the specified value. Can be "0%" - "Unknown," "1% " - "Discredited",
  425. "2-29%" - "Improbable," "30-49%" - "Doubtful," "50-69%" - "Possible", "70-89%"
  426. - "Probable," or "90-100%" - "Confirmed".
  427. - name: group_associations
  428. required: true
  429. auto: PREDEFINED
  430. predefined:
  431. - "true"
  432. - "false"
  433. description: Retrieve Indicator Group Associations
  434. defaultValue: "false"
  435. - name: indicator_associations
  436. auto: PREDEFINED
  437. predefined:
  438. - "true"
  439. - "false"
  440. description: Retrieve Indicator Associations
  441. defaultValue: "false"
  442. - name: indicator_observations
  443. auto: PREDEFINED
  444. predefined:
  445. - "true"
  446. - "false"
  447. description: Retrieve Indicator Observations
  448. defaultValue: "false"
  449. - name: indicator_tags
  450. auto: PREDEFINED
  451. predefined:
  452. - "true"
  453. - "false"
  454. description: Retrieve Indicator Tags
  455. defaultValue: "false"
  456. outputs:
  457. - contextPath: TC.Indicator.Name
  458. description: The name of the indicator.
  459. type: string
  460. - contextPath: TC.Indicator.Type
  461. description: The type of the indicator.
  462. type: string
  463. - contextPath: TC.Indicator.ID
  464. description: The ID of the indicator.
  465. type: string
  466. - contextPath: TC.Indicator.Description
  467. description: The description of the indicator.
  468. type: string
  469. - contextPath: TC.Indicator.Owner
  470. description: The owner of the indicator.
  471. type: string
  472. - contextPath: TC.Indicator.CreateDate
  473. description: The date on which the indicator was created.
  474. type: date
  475. - contextPath: TC.Indicator.LastModified
  476. description: The last date on which the indicator was modified.
  477. type: date
  478. - contextPath: TC.Indicator.Rating
  479. description: The threat rating of the indicator.
  480. type: number
  481. - contextPath: TC.Indicator.Confidence
  482. description: The confidence rating of the indicator.
  483. type: number
  484. - contextPath: TC.Indicator.WhoisActive
  485. description: The active indicator (for domains only).
  486. type: string
  487. - contextPath: TC.Indicator.File.MD5
  488. description: The MD5 hash of the indicator of the file.
  489. type: string
  490. - contextPath: TC.Indicator.File.SHA1
  491. description: The SHA1 hash of the indicator of the file.
  492. type: string
  493. - contextPath: TC.Indicator.File.SHA256
  494. description: The SHA256 hash of the indicator of the file.
  495. type: string
  496. - contextPath: DBotScore.Indicator
  497. description: The value assigned by DBot for the indicator.
  498. type: string
  499. - contextPath: DBotScore.Type
  500. description: The type assigned by DBot for the indicator.
  501. type: string
  502. - contextPath: DBotScore.Score
  503. description: The score assigned by DBot for the indicator.
  504. type: number
  505. - contextPath: DBotScore.Vendor
  506. description: The vendor used to calculate the score.
  507. type: string
  508. - contextPath: IP.Address
  509. description: The IP address of the indicator.
  510. type: string
  511. - contextPath: IP.Malicious.Vendor
  512. description: For malicious IP addresses, the vendor that made the decision.
  513. type: string
  514. - contextPath: IP.Malicious.Description
  515. description: For malicious IP addresses, the full description.
  516. type: string
  517. - contextPath: URL.Data
  518. description: The data of the indicator of the URL.
  519. type: string
  520. - contextPath: URL.Malicious.Vendor
  521. description: For malicious URLs, the vendor that made the decision.
  522. type: string
  523. - contextPath: URL.Malicious.Description
  524. description: For malicious URLs, the full description.
  525. type: string
  526. - contextPath: Domain.Name
  527. description: The domain name of the indicator.
  528. type: string
  529. - contextPath: Domain.Malicious.Vendor
  530. description: For malicious domains, the vendor that made the decision.
  531. type: string
  532. - contextPath: Domain.Malicious.Description
  533. description: For malicious domains, the full description.
  534. type: string
  535. - contextPath: File.MD5
  536. description: The MD5 hash of the file.
  537. type: string
  538. - contextPath: File.SHA1
  539. description: The SHA1 hash of the file.
  540. type: string
  541. - contextPath: File.SHA256
  542. description: The SHA256 hash of the file.
  543. type: string
  544. - contextPath: File.Malicious.Vendor
  545. description: For malicious files, the vendor that made the decision.
  546. type: string
  547. - contextPath: File.Malicious.Description
  548. description: For malicious files, the full description.
  549. type: string
  550. description: Retrieves information about an indicator.
  551. - name: tc-get-indicators-by-tag
  552. arguments:
  553. - name: tag
  554. required: true
  555. default: true
  556. description: The name of the tag by which to filter.
  557. - name: owner
  558. description: A list of indicators filtered by the owner.
  559. outputs:
  560. - contextPath: TC.Indicator.Name
  561. description: The name of the tagged indicator.
  562. type: string
  563. - contextPath: TC.Indicator.Type
  564. description: The type of the tagged indicator.
  565. type: string
  566. - contextPath: TC.Indicator.ID
  567. description: The ID of the tagged indicator.
  568. type: string
  569. - contextPath: TC.Indicator.Description
  570. description: The description of the tagged indicator.
  571. type: string
  572. - contextPath: TC.Indicator.Owner
  573. description: The owner of the tagged indicator.
  574. type: string
  575. - contextPath: TC.Indicator.CreateDate
  576. description: The date on which the tagged indicator was created.
  577. type: date
  578. - contextPath: TC.Indicator.LastModified
  579. description: The last date on which the tagged indicator was modified.
  580. type: date
  581. - contextPath: TC.Indicator.Rating
  582. description: The threat rating of the tagged indicator.
  583. type: number
  584. - contextPath: TC.Indicator.Confidence
  585. description: The confidence rating of the tagged indicator.
  586. type: number
  587. - contextPath: TC.Indicator.WhoisActive
  588. description: The active indicator (for domains only).
  589. type: string
  590. - contextPath: TC.Indicator.File.MD5
  591. description: The MD5 hash of the indicator of the file.
  592. type: string
  593. - contextPath: TC.Indicator.File.SHA1
  594. description: The SHA1 hash of the indicator of the file.
  595. type: string
  596. - contextPath: TC.Indicator.File.SHA256
  597. description: The SHA256 hash of the indicator of the file.
  598. type: string
  599. - contextPath: DBotScore.Indicator
  600. description: The value assigned by DBot for the tagged indicator.
  601. type: string
  602. - contextPath: DBotScore.Type
  603. description: The type assigned by DBot for the tagged indicator.
  604. type: string
  605. - contextPath: DBotScore.Score
  606. description: The score assigned by DBot for the tagged indicator.
  607. type: number
  608. - contextPath: DBotScore.Vendor
  609. description: The vendor used to calculate the score.
  610. type: string
  611. - contextPath: IP.Address
  612. description: The IP address of the tagged indicator.
  613. type: string
  614. - contextPath: IP.Malicious.Vendor
  615. description: For malicious IP addresses, the vendor that made the decision.
  616. type: string
  617. - contextPath: IP.Malicious.Description
  618. description: For malicious IP addresses, the full description.
  619. type: string
  620. - contextPath: URL.Data
  621. description: The data of the URL of the tagged indicator.
  622. type: string
  623. - contextPath: URL.Malicious.Vendor
  624. description: For malicious URLs, the vendor that made the decision.
  625. type: string
  626. - contextPath: URL.Malicious.Description
  627. description: For malicious URLs, the full description.
  628. type: string
  629. - contextPath: Domain.Name
  630. description: The domain name of the tagged indicator.
  631. type: string
  632. - contextPath: Domain.Malicious.Vendor
  633. description: For malicious domains, the vendor that made the decision.
  634. type: string
  635. - contextPath: Domain.Malicious.Description
  636. description: For malicious domains, the full description.
  637. type: string
  638. - contextPath: File.MD5
  639. description: The MD5 hash of the file.
  640. type: string
  641. - contextPath: File.SHA1
  642. description: The SHA1 hash of the file.
  643. type: string
  644. - contextPath: File.SHA256
  645. description: The SHA256 hash of the file.
  646. type: string
  647. - contextPath: File.Malicious.Vendor
  648. description: For malicious files, the vendor that made the decision.
  649. type: string
  650. - contextPath: File.Malicious.Description
  651. description: For malicious files, the full description.
  652. type: string
  653. description: Fetches all indicators that have a tag.
  654. - name: tc-add-indicator
  655. arguments:
  656. - name: indicator
  657. required: true
  658. description: The indicator to add.
  659. - name: rating
  660. description: The threat rating of the indicator. Can be "0" - "Unknown", "1"
  661. - "Suspicious", "2" - "Low", "3" - Moderate, "4" - High, or "5" - "Critical".
  662. - name: confidence
  663. description: The confidence rating of the indicator. Can be "0%" - "Unknown,"
  664. "1% " - "Discredited", "2-29%" - "Improbable," "30-49%" - "Doubtful," "50-69%"
  665. - "Possible", "70-89%" - "Probable," or "90-100%" - "Confirmed".
  666. - name: owner
  667. description: The owner of the new indicator. The default is the "defaultOrg"
  668. parameter.
  669. outputs:
  670. - contextPath: TC.Indicator.Name
  671. description: The name the indicator.
  672. type: string
  673. - contextPath: TC.Indicator.Type
  674. description: The type of indicator.
  675. type: string
  676. - contextPath: TC.Indicator.ID
  677. description: The ID of the indicator.
  678. type: string
  679. - contextPath: TC.Indicator.Description
  680. description: The description of the indicator.
  681. type: string
  682. - contextPath: TC.Indicator.Owner
  683. description: The owner of the indicator.
  684. type: string
  685. - contextPath: TC.Indicator.CreateDate
  686. description: The date on which the added indicator was created.
  687. type: date
  688. - contextPath: TC.Indicator.LastModified
  689. description: The last date on which the added indicator was modified.
  690. type: date
  691. - contextPath: TC.Indicator.Rating
  692. description: The threat rating of the indicator.
  693. type: number
  694. - contextPath: TC.Indicator.Confidence
  695. description: The confidence rating of the indicator.
  696. type: number
  697. - contextPath: TC.Indicator.WhoisActive
  698. description: The active indicator (for domains only).
  699. type: string
  700. - contextPath: TC.Indicator.File.MD5
  701. description: The MD5 hash of the indicator of the file.
  702. type: string
  703. - contextPath: TC.Indicator.File.SHA1
  704. description: The SHA1 hash of the indicator of the file.
  705. type: string
  706. - contextPath: TC.Indicator.File.SHA256
  707. description: The SHA256 hash of the indicator of the file.
  708. type: string
  709. - contextPath: IP.Address
  710. description: The IP address of the indicator.
  711. type: string
  712. - contextPath: IP.Malicious.Vendor
  713. description: For malicious IP addresses, the vendor that made the decision.
  714. type: string
  715. - contextPath: IP.Malicious.Description
  716. description: For malicious IP addresses, the full description.
  717. type: string
  718. - contextPath: URL.Data
  719. description: The data of the URL of the indicator.
  720. type: string
  721. - contextPath: URL.Malicious.Vendor
  722. description: For malicious URLs, the vendor that made the decision.
  723. type: string
  724. - contextPath: URL.Malicious.Description
  725. description: For malicious URLs, the full description.
  726. type: string
  727. - contextPath: Domain.Name
  728. description: The name of the added indicator of the domain.
  729. type: string
  730. - contextPath: Domain.Malicious.Vendor
  731. description: For malicious domains, the vendor that made the decision.
  732. type: string
  733. - contextPath: Domain.Malicious.Description
  734. description: For malicious domains, the full description.
  735. type: string
  736. - contextPath: File.MD5
  737. description: The MD5 hash of the file.
  738. type: string
  739. - contextPath: File.SHA1
  740. description: The SHA1 hash of the file.
  741. type: string
  742. - contextPath: File.SHA256
  743. description: The SHA256 hash of the file.
  744. type: string
  745. - contextPath: File.Malicious.Vendor
  746. description: For malicious files, the vendor that made the decision.
  747. type: string
  748. - contextPath: File.Malicious.Description
  749. description: For malicious files, the full description.
  750. type: string
  751. description: Adds a new indicator to ThreatConnect.
  752. - name: tc-create-incident
  753. arguments:
  754. - name: owner
  755. description: The owner of the new incident. The default is the "defaultOrg"
  756. parameter.
  757. - name: incidentName
  758. required: true
  759. default: true
  760. description: The name of the incident group.
  761. - name: eventDate
  762. description: The creation time of an incident in the "2017-03-21T00:00:00Z"
  763. format.
  764. - name: tag
  765. description: The tag applied to the incident.
  766. - name: securityLabel
  767. auto: PREDEFINED
  768. predefined:
  769. - TLP:RED
  770. - TLP:GREEN
  771. - TLP:AMBER
  772. - TLP:WHITE
  773. description: The security label applied to the incident. Can be "TLP:RED", "TLP:GREEN",
  774. "TLP:AMBER", or "TLP:WHITE".
  775. - name: description
  776. description: The description of the incident.
  777. outputs:
  778. - contextPath: TC.Incident.Name
  779. description: The name of the new incident group.
  780. type: string
  781. - contextPath: TC.Incident.Owner
  782. description: The owner of the new incident.
  783. type: string
  784. - contextPath: TC.Incident.EventDate
  785. description: The date on which the event that indicates an incident occurred.
  786. type: date
  787. - contextPath: TC.Incident.Tag
  788. description: The name of the tag of the new incident.
  789. type: string
  790. - contextPath: TC.Incident.SecurityLabel
  791. description: The security label of the new incident.
  792. type: string
  793. - contextPath: TC.Incident.ID
  794. description: The ID of the new incident.
  795. type: Unknown
  796. description: Creates a new incident group.
  797. - name: tc-fetch-incidents
  798. arguments:
  799. - name: incidentId
  800. default: true
  801. description: The fetched incidents filtered by ID.
  802. - name: owner
  803. description: The fetched incidents filtered by owner.
  804. - name: incidentName
  805. description: The fetched incidents filtered by incident name.
  806. outputs:
  807. - contextPath: TC.Incident
  808. description: The name of the group of fetched incidents.
  809. type: string
  810. - contextPath: TC.Incident.ID
  811. description: The ID of the fetched incidents.
  812. type: string
  813. - contextPath: TC.Incident.Owner
  814. description: The owner of the fetched incidents.
  815. type: string
  816. description: Fetches incidents from ThreatConnect.
  817. - name: tc-incident-associate-indicator
  818. arguments:
  819. - name: indicatorType
  820. required: true
  821. auto: PREDEFINED
  822. predefined:
  823. - ADDRESSES
  824. - EMAIL_ADDRESSES
  825. - URLS
  826. - HOSTS
  827. - FILES
  828. - CUSTOM_INDICATORS
  829. description: The type of the indicator. Can be "ADDRESSES", "EMAIL_ADDRESSES",
  830. "URLS", "HOSTS", "FILES", or "CUSTOM_INDICATORS".
  831. - name: incidentId
  832. required: true
  833. description: The ID of the incident to which the indicator is associated.
  834. - name: indicator
  835. required: true
  836. default: true
  837. description: The name of the indicator.
  838. - name: owner
  839. description: A list of indicators filtered by the owner.
  840. outputs:
  841. - contextPath: TC.Indicator.Name
  842. description: The name of the indicator.
  843. type: string
  844. - contextPath: TC.Indicator.Type
  845. description: The type of the indicator.
  846. type: string
  847. - contextPath: TC.Indicator.ID
  848. description: The ID of the indicator.
  849. type: string
  850. - contextPath: TC.Indicator.Description
  851. description: The description of the indicator.
  852. type: string
  853. - contextPath: TC.Indicator.Owner
  854. description: The owner of the indicator.
  855. type: string
  856. - contextPath: TC.Indicator.CreateDate
  857. description: The date on which the indicator associated was created.
  858. type: date
  859. - contextPath: TC.Indicator.LastModified
  860. description: The last date on which the indicator associated was modified.
  861. type: date
  862. - contextPath: TC.Indicator.Rating
  863. description: The threat rating of the indicator.
  864. type: number
  865. - contextPath: TC.Indicator.Confidence
  866. description: The confidence rating of the indicator.
  867. type: number
  868. - contextPath: TC.Indicator.WhoisActive
  869. description: The active indicator (for domains only).
  870. type: string
  871. - contextPath: TC.Indicator.File.MD5
  872. description: The MD5 hash of the indicator of the file.
  873. type: string
  874. - contextPath: TC.Indicator.File.SHA1
  875. description: The SHA1 hash of the indicator of the file.
  876. type: string
  877. - contextPath: TC.Indicator.File.SHA256
  878. description: The SHA256 hash of the indicator of the file.
  879. type: string
  880. - contextPath: IP.Address
  881. description: IP address of the associated indicator of the file.
  882. type: string
  883. - contextPath: IP.Malicious.Vendor
  884. description: For malicious IP addresses, the vendor that made the decision.
  885. type: string
  886. - contextPath: IP.Malicious.Description
  887. description: For malicious IP addresses, the full description.
  888. type: string
  889. - contextPath: URL.Data
  890. description: The data of the URL of the associated indicator of the file.
  891. type: string
  892. - contextPath: URL.Malicious.Vendor
  893. description: For malicious URLs, the vendor that made the decision.
  894. type: string
  895. - contextPath: URL.Malicious.Description
  896. description: For malicious URLs, the full description.
  897. type: string
  898. - contextPath: Domain.Name
  899. description: The name of the indicator of the domain.
  900. type: string
  901. - contextPath: Domain.Malicious.Vendor
  902. description: For malicious domains, the vendor that made the decision.
  903. type: string
  904. - contextPath: Domain.Malicious.Description
  905. description: For malicious domains, the full description.
  906. type: string
  907. - contextPath: File.MD5
  908. description: The MD5 hash of the file.
  909. type: string
  910. - contextPath: File.SHA1
  911. description: The SHA1 hash of the file.
  912. type: string
  913. - contextPath: File.SHA256
  914. description: The SHA256 hash of the file.
  915. type: string
  916. - contextPath: File.Malicious.Vendor
  917. description: For malicious files, the vendor that made the decision.
  918. type: string
  919. - contextPath: File.Malicious.Description
  920. description: For malicious files, the full description.
  921. type: string
  922. description: Associates an indicator with an existing incident. The indicator
  923. must exist before running this command. To add an indicator, run the tc-add-indicator
  924. command.
  925. - name: domain
  926. arguments:
  927. - name: domain
  928. required: true
  929. default: true
  930. description: The name of the domain.
  931. - name: owners
  932. description: A comma-separated list of a client's organizations, sources, or communities
  933. to which a user has permissions. For example, users with admin permissions
  934. can search for indicators belonging to all owners.
  935. - name: ratingThreshold
  936. description: A list of results filtered by indicators whose threat rating is
  937. greater than the specified value. Can be "0" - "Unknown", "1" - "Suspicious",
  938. "2" - "Low", "3" - Moderate, "4" - High, or "5" - "Critical".
  939. - name: confidenceThreshold
  940. description: A list of results filtered by indicators whose confidence rating
  941. is greater than the specified value. Can be "0%" - "Unknown," "1% " - "Discredited",
  942. "2-29%" - "Improbable," "30-49%" - "Doubtful," "50-69%" - "Possible", "70-89%"
  943. - "Probable," or "90-100%" - "Confirmed".
  944. outputs:
  945. - contextPath: TC.Indicator.Name
  946. description: The name of the of the indicator.
  947. type: string
  948. - contextPath: TC.Indicator.Type
  949. description: The type of the domain.
  950. type: string
  951. - contextPath: TC.Indicator.ID
  952. description: The ID of the domain.
  953. type: string
  954. - contextPath: TC.Indicator.Description
  955. description: The description of the domain.
  956. type: string
  957. - contextPath: TC.Indicator.Owner
  958. description: The owner of the domain.
  959. type: string
  960. - contextPath: TC.Indicator.CreateDate
  961. description: The date on which the indicator of the domain was created.
  962. type: date
  963. - contextPath: TC.Indicator.LastModified
  964. description: The last date on which the indicator of the domain was modified.
  965. type: date
  966. - contextPath: TC.Indicator.Rating
  967. description: The threat rating of the domain.
  968. type: number
  969. - contextPath: TC.Indicator.Confidence
  970. description: The confidence rating of the domain.
  971. type: number
  972. - contextPath: TC.Indicator.WhoisActive
  973. description: The active indicator (for domains only).
  974. type: string
  975. - contextPath: DBotScore.Indicator
  976. description: The value assigned by DBot for the indicator.
  977. type: string
  978. - contextPath: DBotScore.Type
  979. description: The type assigned by DBot for the indicator.
  980. type: string
  981. - contextPath: DBotScore.Score
  982. description: The score assigned by DBot for the indicator.
  983. type: number
  984. - contextPath: DBotScore.Vendor
  985. description: The vendor used to calculate the score.
  986. type: string
  987. - contextPath: Domain.Name
  988. description: The name of the domain.
  989. type: string
  990. - contextPath: Domain.Malicious.Vendor
  991. description: For malicious domains, the vendor that made the decision.
  992. type: string
  993. - contextPath: Domain.Malicious.Description
  994. description: For malicious domains, the full description.
  995. type: string
  996. description: Searches for an indicator of type domain.
  997. - name: tc-get-incident-associate-indicators
  998. arguments:
  999. - name: incidentId
  1000. required: true
  1001. default: true
  1002. description: The ID of the incident.
  1003. - name: owner
  1004. description: A list of indicators filtered by the owner.
  1005. outputs:
  1006. - contextPath: TC.Indicator.Name
  1007. description: The name of the returned indicator.
  1008. type: string
  1009. - contextPath: TC.Indicator.Type
  1010. description: The type of the returned indicator.
  1011. type: string
  1012. - contextPath: TC.Indicator.ID
  1013. description: The ID of the returned indicator.
  1014. type: string
  1015. - contextPath: TC.Indicator.Description
  1016. description: The description of the returned indicator.
  1017. type: string
  1018. - contextPath: TC.Indicator.Owner
  1019. description: The owner of the returned indicator.
  1020. type: string
  1021. - contextPath: TC.Indicator.CreateDate
  1022. description: The date on which the returned indicator was created.
  1023. type: date
  1024. - contextPath: TC.Indicator.LastModified
  1025. description: The last date on which the returned indicator was modified.
  1026. type: date
  1027. - contextPath: TC.Indicator.Rating
  1028. description: The threat rating of the returned indicator.
  1029. type: number
  1030. - contextPath: TC.Indicator.Confidence
  1031. description: The confidence rating of the returned indicator.
  1032. type: number
  1033. - contextPath: TC.Indicator.WhoisActive
  1034. description: The active indicator (for domains only).
  1035. type: string
  1036. - contextPath: TC.Indicator.File.MD5
  1037. description: The MD5 hash of the indicator of the file.
  1038. type: string
  1039. - contextPath: TC.Indicator.File.SHA1
  1040. description: The SHA1 hash of the indicator of the file.
  1041. type: string
  1042. - contextPath: TC.Indicator.File.SHA256
  1043. description: The SHA256 hash of the indicator of the file.
  1044. type: string
  1045. - contextPath: DBotScore.Indicator
  1046. description: The value assigned by DBot for the indicator.
  1047. type: string
  1048. - contextPath: DBotScore.Type
  1049. description: The type assigned by DBot for the indicator.
  1050. type: string
  1051. - contextPath: DBotScore.Score
  1052. description: The score assigned by DBot for the indicator.
  1053. type: number
  1054. - contextPath: DBotScore.Vendor
  1055. description: The vendor used to calculate the score.
  1056. type: string
  1057. - contextPath: IP.Address
  1058. description: The IP address of the returned indicator.
  1059. type: string
  1060. - contextPath: IP.Malicious.Vendor
  1061. description: For malicious IP addresses, the vendor that made the decision.
  1062. type: string
  1063. - contextPath: IP.Malicious.Description
  1064. description: For malicious IP addresses, the full description.
  1065. type: string
  1066. - contextPath: URL.Data
  1067. description: The data of the URL of the returned indicator.
  1068. type: string
  1069. - contextPath: URL.Malicious.Vendor
  1070. description: For malicious URLs, the vendor that made the decision.
  1071. type: string
  1072. - contextPath: URL.Malicious.Description
  1073. description: For malicious URLs, the full description.
  1074. type: string
  1075. - contextPath: Domain.Name
  1076. description: The name of the domain.
  1077. type: string
  1078. - contextPath: Domain.Malicious.Vendor
  1079. description: For malicious domains, the vendor that made the decision.
  1080. type: string
  1081. - contextPath: Domain.Malicious.Description
  1082. description: For malicious domains, the full description.
  1083. type: string
  1084. - contextPath: File.MD5
  1085. description: The MD5 hash of the file.
  1086. type: string
  1087. - contextPath: File.SHA1
  1088. description: The SHA1 hash of the file.
  1089. type: string
  1090. - contextPath: File.SHA256
  1091. description: The SHA256 hash of the file.
  1092. type: string
  1093. - contextPath: File.Malicious.Vendor
  1094. description: For malicious files, the vendor that made the decision.
  1095. type: string
  1096. - contextPath: File.Malicious.Description
  1097. description: For malicious files, the full description.
  1098. type: string
  1099. description: Returns indicators that are related to a specific incident.
  1100. - name: tc-update-indicator
  1101. arguments:
  1102. - name: indicator
  1103. required: true
  1104. description: The name of the updated indicator.
  1105. - name: rating
  1106. description: The threat rating of the updated indicator.
  1107. - name: confidence
  1108. description: The confidence rating of the updated indicator.
  1109. - name: size
  1110. description: The size of the file of the updated indicator.
  1111. - name: dnsActive
  1112. description: The active DNS indicator (only for hosts).
  1113. - name: whoisActive
  1114. description: The active indicator (only for hosts).
  1115. - name: updatedValues
  1116. description: A comma-separated list of field:value pairs to update. For example, "rating=3",
  1117. "confidence=42", and "description=helloWorld".
  1118. - name: falsePositive
  1119. auto: PREDEFINED
  1120. predefined:
  1121. - "True"
  1122. - "False"
  1123. description: The updated indicator set as a false positive. Can be "True" or
  1124. "False".
  1125. - name: observations
  1126. description: The number observations on the updated indicator.
  1127. - name: securityLabel
  1128. auto: PREDEFINED
  1129. predefined:
  1130. - TLP:RED
  1131. - TLP:GREEN
  1132. - TLP:AMBER
  1133. - TLP:WHITE
  1134. description: The security label applied to the incident. Can be "TLP:RED", "TLP:GREEN",
  1135. "TLP:AMBER", or "TLP:WHITE".
  1136. - name: threatAssessConfidence
  1137. description: Assesses the confidence rating of the indicator.
  1138. - name: threatAssessRating
  1139. description: Assesses the threat rating of the indicator.
  1140. outputs:
  1141. - contextPath: TC.Indicator.Name
  1142. description: The name of the indicator.
  1143. type: string
  1144. - contextPath: TC.Indicator.Type
  1145. description: The type of the indicator.
  1146. type: string
  1147. - contextPath: TC.Indicator.ID
  1148. description: The ID of the indicator.
  1149. type: string
  1150. - contextPath: TC.Indicator.Description
  1151. description: The description of the indicator.
  1152. type: string
  1153. - contextPath: TC.Indicator.Owner
  1154. description: The owner of the indicator.
  1155. type: string
  1156. - contextPath: TC.Indicator.CreateDate
  1157. description: The date on which the indicator was created.
  1158. type: date
  1159. - contextPath: TC.Indicator.LastModified
  1160. description: The last date on which the indicator was modified.
  1161. type: date
  1162. - contextPath: TC.Indicator.Rating
  1163. description: The threat rating of the indicator.
  1164. type: number
  1165. - contextPath: TC.Indicator.Confidence
  1166. description: The confidence rating of the indicator.
  1167. type: number
  1168. - contextPath: TC.Indicator.WhoisActive
  1169. description: The active indicator (for domains only).
  1170. type: string
  1171. - contextPath: TC.Indicator.File.MD5
  1172. description: The MD5 hash of the indicator of the file.
  1173. type: string
  1174. - contextPath: TC.Indicator.File.SHA1
  1175. description: The SHA1 hash of the indicator of the file.
  1176. type: string
  1177. - contextPath: TC.Indicator.File.SHA256
  1178. description: The SHA256 hash of the indicator of the file.
  1179. type: string
  1180. - contextPath: IP.Address
  1181. description: The IP address of the indicator.
  1182. type: string
  1183. - contextPath: IP.Malicious.Vendor
  1184. description: For malicious IP addresses, the vendor that made the decision.
  1185. type: string
  1186. - contextPath: IP.Malicious.Description
  1187. description: For malicious IP addresses, the full description.
  1188. type: string
  1189. - contextPath: URL.Data
  1190. description: The data of the URL of the indicator.
  1191. type: string
  1192. - contextPath: URL.Malicious.Vendor
  1193. description: For malicious URLs, the vendor that made the decision.
  1194. type: string
  1195. - contextPath: URL.Malicious.Description
  1196. description: For malicious URLs, the full description.
  1197. type: string
  1198. - contextPath: Domain.Name
  1199. description: The domain name of the indicator.
  1200. type: string
  1201. - contextPath: Domain.Malicious.Vendor
  1202. description: For malicious domains, the vendor that made the decision.
  1203. type: string
  1204. - contextPath: Domain.Malicious.Description
  1205. description: For malicious domains, the full description.
  1206. type: string
  1207. - contextPath: File.MD5
  1208. description: The MD5 hash of the file.
  1209. type: string
  1210. - contextPath: File.SHA1
  1211. description: The SHA1 hash of the file.
  1212. type: string
  1213. - contextPath: File.SHA256
  1214. description: The SHA256 hash of the file.
  1215. type: string
  1216. - contextPath: File.Malicious.Vendor
  1217. description: For malicious files, the vendor that made the decision.
  1218. type: string
  1219. - contextPath: File.Malicious.Description
  1220. description: For malicious files, the full description.
  1221. type: string
  1222. description: Updates the indicator in ThreatConnect.
  1223. - name: tc-delete-indicator-tag
  1224. arguments:
  1225. - name: indicator
  1226. required: true
  1227. description: The name of the indicator from which to remove a tag.
  1228. - name: tag
  1229. required: true
  1230. description: The name of the tag to remove from the indicator.
  1231. outputs:
  1232. - contextPath: TC.Indicator.Name
  1233. description: The name of the indicator.
  1234. type: string
  1235. - contextPath: TC.Indicator.Type
  1236. description: The type of the indicator.
  1237. type: string
  1238. - contextPath: TC.Indicator.ID
  1239. description: The ID of the indicator.
  1240. type: string
  1241. - contextPath: TC.Indicator.Description
  1242. description: The description of the indicator.
  1243. type: string
  1244. - contextPath: TC.Indicator.Owner
  1245. description: The owner of the indicator.
  1246. type: string
  1247. - contextPath: TC.Indicator.CreateDate
  1248. description: The date on which the indicator was created.
  1249. type: date
  1250. - contextPath: TC.Indicator.LastModified
  1251. description: The last date on which the indicator was modified.
  1252. type: date
  1253. - contextPath: TC.Indicator.Rating
  1254. description: The threat rating of the indicator.
  1255. type: number
  1256. - contextPath: TC.Indicator.Confidence
  1257. description: The confidence rating of the indicator.
  1258. type: number
  1259. - contextPath: TC.Indicator.WhoisActive
  1260. description: The active indicator (for domains only).
  1261. type: string
  1262. - contextPath: TC.Indicator.File.MD5
  1263. description: The MD5 hash of the indicator of the file.
  1264. type: string
  1265. - contextPath: TC.Indicator.File.SHA1
  1266. description: The SHA1 hash of the indicator of the file.
  1267. type: string
  1268. - contextPath: TC.Indicator.File.SHA256
  1269. description: The SHA256 hash of the indicator of the file.
  1270. type: string
  1271. - contextPath: IP.Address
  1272. description: The IP address of the indicator.
  1273. type: string
  1274. - contextPath: IP.Malicious.Vendor
  1275. description: For malicious IP addresses, the vendor that made the decision.
  1276. type: string
  1277. - contextPath: IP.Malicious.Description
  1278. description: For malicious IP addresses, the full description.
  1279. type: string
  1280. - contextPath: URL.Data
  1281. description: The data of the URL of the indicator.
  1282. type: string
  1283. - contextPath: URL.Malicious.Vendor
  1284. description: For malicious URLs, the vendor that made the decision.
  1285. type: string
  1286. - contextPath: URL.Malicious.Description
  1287. description: For malicious URLs, the full description.
  1288. type: string
  1289. - contextPath: Domain.Name
  1290. description: The domain name of the indicator.
  1291. type: string
  1292. - contextPath: Domain.Malicious.Vendor
  1293. description: For malicious domains, the vendor that made the decision.
  1294. type: string
  1295. - contextPath: Domain.Malicious.Description
  1296. description: For malicious domains, the full description.
  1297. type: string
  1298. - contextPath: File.MD5
  1299. description: The MD5 hash of the file.
  1300. type: string
  1301. - contextPath: File.SHA1
  1302. description: The SHA1 hash of the file.
  1303. type: string
  1304. - contextPath: File.SHA256
  1305. description: The SHA256 hash of the file.
  1306. type: string
  1307. - contextPath: File.Malicious.Vendor
  1308. description: For malicious files, the vendor that made the decision.
  1309. type: string
  1310. - contextPath: File.Malicious.Description
  1311. description: For malicious files, the full description.
  1312. type: string
  1313. description: Removes a tag from a specified indicator.
  1314. - name: tc-delete-indicator
  1315. arguments:
  1316. - name: indicator
  1317. required: true
  1318. description: The name of the indicator to delete.
  1319. description: Deletes an indicator from ThreatConnect.
  1320. - name: tc-create-campaign
  1321. arguments:
  1322. - name: name
  1323. required: true
  1324. description: The name of the campaign group.
  1325. - name: firstSeen
  1326. description: The earliest date on which the campaign was seen.
  1327. - name: owner
  1328. description: The owner of the new incident. The default is the "defaultOrg"
  1329. parameter.
  1330. - name: description
  1331. description: The description of the campaign.
  1332. - name: tag
  1333. description: The name of the tag to apply to the campaign.
  1334. - name: securityLabel
  1335. description: The security label of the campaign. For example, "TLP:Green".
  1336. outputs:
  1337. - contextPath: TC.Campaign.Name
  1338. description: The name of the campaign.
  1339. type: string
  1340. - contextPath: TC.Campaign.Owner
  1341. description: The owner of the campaign.
  1342. type: string
  1343. - contextPath: TC.Campaign.FirstSeen
  1344. description: The earliest date on which the campaign was seen.
  1345. type: date
  1346. - contextPath: TC.Campaign.Tag
  1347. description: The tag of the campaign.
  1348. type: string
  1349. - contextPath: TC.Campaign.SecurityLevel
  1350. description: The security label of the campaign.
  1351. type: string
  1352. - contextPath: TC.Campaign.ID
  1353. description: The ID of the campaign.
  1354. type: string
  1355. description: Creates a group based on the "Campaign" type.
  1356. - name: tc-create-event
  1357. arguments:
  1358. - name: name
  1359. required: true
  1360. description: The name of the event group.
  1361. - name: eventDate
  1362. description: The date on which the event occurred. If the date is not specified,
  1363. the current date is used.
  1364. - name: status
  1365. auto: PREDEFINED
  1366. predefined:
  1367. - Needs Review
  1368. - False Positive
  1369. - No Further Action
  1370. - Escalated
  1371. description: The status of the event. Can be "Needs Review", "False Positive",
  1372. "No Further Action", or "Escalated".
  1373. - name: owner
  1374. description: The owner of the event.
  1375. - name: description
  1376. description: The description of the event.
  1377. - name: tag
  1378. description: The tag of the event.
  1379. outputs:
  1380. - contextPath: TC.Event.Name
  1381. description: The name of the event.
  1382. type: string
  1383. - contextPath: TC.Event.Date
  1384. description: The date of the event.
  1385. type: date
  1386. - contextPath: TC.Event.Status
  1387. description: The status of the event.
  1388. type: string
  1389. - contextPath: TC.Event.Owner
  1390. description: The owner of the event.
  1391. type: string
  1392. - contextPath: TC.Event.Tag
  1393. description: The tag of the event.
  1394. type: string
  1395. - contextPath: TC.Event.ID
  1396. description: The ID of the event.
  1397. type: string
  1398. description: Creates a group based on the "Event" type.
  1399. - name: tc-create-threat
  1400. arguments:
  1401. - name: name
  1402. required: true
  1403. description: The name of the threat group.
  1404. outputs:
  1405. - contextPath: TC.Threat.Name
  1406. description: The name of the threat.
  1407. type: string
  1408. - contextPath: TC.Threat.ID
  1409. description: The ID of the threat.
  1410. type: string
  1411. description: Creates a group based on the "Threats" type.
  1412. - name: tc-delete-group
  1413. arguments:
  1414. - name: groupID
  1415. required: true
  1416. description: The ID of the group to delete.
  1417. - name: type
  1418. required: true
  1419. auto: PREDEFINED
  1420. predefined:
  1421. - Incidents
  1422. - Events
  1423. - Campaigns
  1424. - Threats
  1425. description: The type of the group to delete. Can be "Incidents", "Events",
  1426. "Campaigns", or "Threats".
  1427. description: Deletes a group.
  1428. - name: tc-add-group-attribute
  1429. arguments:
  1430. - name: group_id
  1431. required: true
  1432. description: The ID of the group to which to add attributes. To get the ID of
  1433. the group, run the tc-get-groups command.
  1434. - name: attribute_type
  1435. required: true
  1436. description: The type of attribute to add to the group. The type is located
  1437. in the UI in a specific group or under Org Config.
  1438. - name: attribute_value
  1439. required: true
  1440. description: The value of the attribute.
  1441. - name: group_type
  1442. required: true
  1443. auto: PREDEFINED
  1444. predefined:
  1445. - adversaries
  1446. - campaigns
  1447. - documents
  1448. - emails
  1449. - events
  1450. - incidents
  1451. - intrusionSets
  1452. - reports
  1453. - signatures
  1454. - threats
  1455. description: The type of the group. Can be "adversaries", "campaigns", "documents",
  1456. "emails", "events", "incidents", "intrusionSets", "reports", "signatures",
  1457. or "threats".
  1458. outputs:
  1459. - contextPath: TC.Group.DateAdded
  1460. description: The date on which the attribute was added.
  1461. type: Date
  1462. - contextPath: TC.Group.LastModified
  1463. description: The date on which the added attribute was last modified.
  1464. type: Date
  1465. - contextPath: TC.Group.Type
  1466. description: The type of the group to which the attribute was added.
  1467. type: String
  1468. - contextPath: TC.Group.Value
  1469. description: The value of the attribute added to the group.
  1470. type: String
  1471. - contextPath: TC.Group.ID
  1472. description: The group ID to which the attribute was added.
  1473. type: Number
  1474. description: Adds an attribute to a specified group.
  1475. - name: tc-get-events
  1476. arguments: []
  1477. outputs:
  1478. - contextPath: TC.Event.DateAdded
  1479. description: The date on which the event was added.
  1480. type: Date
  1481. - contextPath: TC.Event.EventDate
  1482. description: The date on which the event occurred.
  1483. type: Date
  1484. - contextPath: TC.Event.ID
  1485. description: The ID of the event.
  1486. type: Number
  1487. - contextPath: TC.Event.OwnerName
  1488. description: The name of the owner of the event.
  1489. type: String
  1490. - contextPath: TC.Event.Status
  1491. description: The status of the event.
  1492. type: String
  1493. description: Returns a list of events.
  1494. - name: tc-get-groups
  1495. arguments:
  1496. - name: group_type
  1497. required: true
  1498. auto: PREDEFINED
  1499. predefined:
  1500. - adversaries
  1501. - campaigns
  1502. - documents
  1503. - emails
  1504. - events
  1505. - incidents
  1506. - intrusionSets
  1507. - reports
  1508. - signatures
  1509. - threats
  1510. description: The type of the group. Can be "adversaries", "campaigns", "documents",
  1511. "emails", "events", "incidents", "intrusionSets", "reports", "signatures",
  1512. or "threats".
  1513. outputs:
  1514. - contextPath: TC.Group.DateAdded
  1515. description: The date on which the group was added.
  1516. type: Date
  1517. - contextPath: TC.Group.EventDate
  1518. description: The date on which the event occurred.
  1519. type: Date
  1520. - contextPath: TC.Group.Name
  1521. description: The name of the group.
  1522. type: String
  1523. - contextPath: TC.Group.OwnerName
  1524. description: The name of the owner of the group.
  1525. type: String
  1526. - contextPath: TC.Group.Status
  1527. description: The status of the group.
  1528. type: String
  1529. - contextPath: TC.Group.ID
  1530. description: The ID of the group.
  1531. type: Number
  1532. description: Returns all groups, filtered by the group type.
  1533. - name: tc-add-group-security-label
  1534. arguments:
  1535. - name: group_id
  1536. required: true
  1537. description: The ID of the group to which to add the security label. To get
  1538. the ID, run the tc-get-groups command.
  1539. - name: group_type
  1540. required: true
  1541. auto: PREDEFINED
  1542. predefined:
  1543. - adversaries
  1544. - campaigns
  1545. - documents
  1546. - emails
  1547. - events
  1548. - incidents
  1549. - intrusionSets
  1550. - reports
  1551. - signatures
  1552. - threats
  1553. description: The type of the group to which to add the security label. Can be
  1554. "adversaries", "campaigns", "documents", "emails", "events", "incidents",
  1555. "intrusionSets", "reports", "signatures", or "threats".
  1556. - name: security_label_name
  1557. required: true
  1558. description: The name of the security label to add to the group. For example,
  1559. "TLP:GREEN".
  1560. description: Adds a security label to a group.
  1561. - name: tc-add-group-tag
  1562. arguments:
  1563. - name: group_id
  1564. required: true
  1565. description: The ID of the group to which to add the tag. To get the ID, run
  1566. the tc-get-groups command.
  1567. - name: group_type
  1568. required: true
  1569. auto: PREDEFINED
  1570. predefined:
  1571. - adversaries
  1572. - campaigns
  1573. - documents
  1574. - emails
  1575. - events
  1576. - incidents
  1577. - intrusionSets
  1578. - reports
  1579. - signatures
  1580. - threats
  1581. description: The type of the group to which to add the tag. Can be "adversaries",
  1582. "campaigns", "documents", "emails", "events", "incidents", "intrusionSets",
  1583. "reports", "signatures", or "threats".
  1584. - name: tag_name
  1585. required: true
  1586. description: The name of the tag to add to the group.
  1587. description: Adds tags to a specified group.
  1588. - name: tc-get-indicator-types
  1589. arguments: []
  1590. outputs:
  1591. - contextPath: TC.IndicatorType.ApiBranch
  1592. description: The branch of the API.
  1593. type: String
  1594. - contextPath: TC.IndicatorType.ApiEntity
  1595. description: The entity of the API.
  1596. type: String
  1597. - contextPath: TC.IndicatorType.CasePreference
  1598. description: The case preference of the indicator. For example, "sensitive",
  1599. "upper", or "lower".
  1600. type: String
  1601. - contextPath: TC.IndicatorType.Custom
  1602. description: Whether the indicator is a custom indicator.
  1603. type: Boolean
  1604. - contextPath: TC.IndicatorType.Parsable
  1605. description: Whether the indicator can be parsed.
  1606. type: Boolean
  1607. - contextPath: TC.IndicatorType.Value1Type
  1608. description: The name of the indicator.
  1609. type: String
  1610. - contextPath: TC.IndicatorType.Value1Label
  1611. description: The value label of the indicator.
  1612. type: String
  1613. description: Returns all indicator types available.
  1614. - name: tc-group-associate-indicator
  1615. arguments:
  1616. - name: indicator_type
  1617. required: true
  1618. description: The type of the indicator. To get the available types, run the
  1619. tc-get-indicator-types command. The indicator must be spelled as displayed
  1620. in the ApiBranch column of the UI.
  1621. - name: indicator
  1622. required: true
  1623. description: The name of the indicator. For example, "indicator_type=emailAddresses"
  1624. where "indicator=a@a.co.il".
  1625. - name: group_type
  1626. required: true
  1627. auto: PREDEFINED
  1628. predefined:
  1629. - adversaries
  1630. - campaigns
  1631. - documents
  1632. - emails
  1633. - events
  1634. - incidents
  1635. - intrusionSets
  1636. - reports
  1637. - signatures
  1638. - threats
  1639. description: The type of the group. Can be "adversaries", "campaigns", "documents",
  1640. "emails", "events", "incidents", "intrusionSets", "reports", "signatures",
  1641. or "threats".
  1642. - name: group_id
  1643. required: true
  1644. description: The ID of the group. To get the ID of the group, run the tc-get-groups
  1645. command.
  1646. outputs:
  1647. - contextPath: TC.Group.GroupID
  1648. description: The ID of the group.
  1649. type: Number
  1650. - contextPath: TC.Group.GroupType
  1651. description: The type of the group.
  1652. type: String
  1653. - contextPath: TC.Group.Indicator
  1654. description: The name of the indicator.
  1655. type: String
  1656. - contextPath: TC.Group.IndicatorType
  1657. description: The type of the indicator.
  1658. type: String
  1659. description: Associates an indicator with a group.
  1660. - name: tc-create-document-group
  1661. arguments:
  1662. - name: file_name
  1663. required: true
  1664. description: The name of the file to display in the UI.
  1665. - name: name
  1666. required: true
  1667. description: The name of the file.
  1668. - name: malware
  1669. auto: PREDEFINED
  1670. predefined:
  1671. - "true"
  1672. - "false"
  1673. description: Whether the file is malware. If "true", ThreatConnect creates a
  1674. password-protected ZIP file on your local machine that contains the sample
  1675. and uploads the ZIP file.
  1676. - name: password
  1677. description: The password of the ZIP file.
  1678. - name: security_label
  1679. description: The security label of the group.
  1680. - name: description
  1681. description: A description of the group.
  1682. - name: entry_id
  1683. required: true
  1684. description: The file of the ID of the entry, as displayed in the War Room.
  1685. outputs:
  1686. - contextPath: TC.Group.Name
  1687. description: The name of the group.
  1688. type: String
  1689. - contextPath: TC.Group.Owner
  1690. description: The owner of the group.
  1691. type: String
  1692. - contextPath: TC.Group.EventDate
  1693. description: The date on which the group was created.
  1694. type: Date
  1695. - contextPath: TC.Group.Description
  1696. description: The description of the group.
  1697. type: String
  1698. - contextPath: TC.Group.SecurityLabel
  1699. description: The security label of the group.
  1700. type: String
  1701. - contextPath: TC.Group.ID
  1702. description: The ID of the group to which the attribute was added.
  1703. type: Number
  1704. description: Creates a document group.
  1705. - name: tc-get-group
  1706. arguments:
  1707. - name: group_type
  1708. required: true
  1709. auto: PREDEFINED
  1710. predefined:
  1711. - adversaries
  1712. - campaigns
  1713. - documents
  1714. - emails
  1715. - events
  1716. - incidents
  1717. - intrusionSets
  1718. - reports
  1719. - signatures
  1720. - threats
  1721. description: The type of group for which to return the ID. Can be "adversaries",
  1722. "campaigns", "documents", "emails", "events", "incidents", "intrusionSets",
  1723. "reports", "signatures", or "threats".
  1724. - name: group_id
  1725. required: true
  1726. description: The ID of the group to retrieve. To get the ID, run the tc-get-groups
  1727. command.
  1728. outputs:
  1729. - contextPath: TC.Group.DateAdded
  1730. description: The date on which the group was added.
  1731. type: Date
  1732. - contextPath: TC.Group.EventDate
  1733. description: The date on which the event occurred.
  1734. type: Date
  1735. - contextPath: TC.Group.Name
  1736. description: The name of the group.
  1737. type: String
  1738. - contextPath: TC.Group.Owner.ID
  1739. description: The ID of the group owner.
  1740. type: Number
  1741. - contextPath: TC.Group.Owner.Name
  1742. description: The name of the group owner.
  1743. type: String
  1744. - contextPath: TC.Group.Owner.Type
  1745. description: The type of the owner.
  1746. type: String
  1747. - contextPath: TC.Group.Status
  1748. description: The status of the group.
  1749. type: String
  1750. description: Retrieves a single group.
  1751. - name: tc-get-group-attributes
  1752. arguments:
  1753. - name: group_type
  1754. required: true
  1755. auto: PREDEFINED
  1756. predefined:
  1757. - adversaries
  1758. - campaigns
  1759. - documents
  1760. - emails
  1761. - events
  1762. - incidents
  1763. - intrusionSets
  1764. - reports
  1765. - signatures
  1766. - threats
  1767. description: The type of group for which to return the attribute. Can be "adversaries",
  1768. "campaigns", "documents", "emails", "events", "incidents", "intrusionSets",
  1769. "reports", "signatures", or "threats".
  1770. - name: group_id
  1771. required: true
  1772. description: The ID of the group for which to return the attribute. To get the
  1773. ID, run the tc-get-groups command.
  1774. outputs:
  1775. - contextPath: TC.Group.Attribute.DateAdded
  1776. description: The date on which the group was added.
  1777. type: Date
  1778. - contextPath: TC.Group.Attribute.Displayed
  1779. description: Whether the attribute is displayed on the UI.
  1780. type: Boolean
  1781. - contextPath: TC.Group.Attribute.AttributeID
  1782. description: The ID of the attribute.
  1783. type: Number
  1784. - contextPath: TC.Group.Attribute.LastModified
  1785. description: The date on which the attribute was last modified.
  1786. type: Date
  1787. - contextPath: TC.Group.Attribute.Type
  1788. description: The type of the attribute.
  1789. type: String
  1790. - contextPath: TC.Group.Attribute.Value
  1791. description: The value of the attribute.
  1792. type: String
  1793. description: Retrieves the attribute of a group.
  1794. - name: tc-get-group-security-labels
  1795. arguments:
  1796. - name: group_type
  1797. required: true
  1798. auto: PREDEFINED
  1799. predefined:
  1800. - adversaries
  1801. - campaigns
  1802. - documents
  1803. - emails
  1804. - events
  1805. - incidents
  1806. - intrusionSets
  1807. - reports
  1808. - signatures
  1809. - threats
  1810. description: The type of group for which to return the security labels. Can
  1811. be "adversaries", "campaigns", "documents", "emails", "events", "incidents",
  1812. "intrusionSets", "reports", "signatures", or "threats".
  1813. - name: group_id
  1814. required: true
  1815. description: The ID of the group for which to return the security labels. To
  1816. get the ID, run the tc-get-groups command.
  1817. outputs:
  1818. - contextPath: TC.Group.SecurityLabel.Name
  1819. description: The name of the security label.
  1820. type: String
  1821. - contextPath: TC.Group.SecurityLabel.Description
  1822. description: The description of the security label.
  1823. type: String
  1824. - contextPath: TC.Group.SecurityLabel.DateAdded
  1825. description: The date on which the security label was added.
  1826. type: Date
  1827. description: Retrieves the security labels of a group.
  1828. - name: tc-get-group-tags
  1829. arguments:
  1830. - name: group_type
  1831. required: true
  1832. auto: PREDEFINED
  1833. predefined:
  1834. - adversaries
  1835. - campaigns
  1836. - documents
  1837. - emails
  1838. - events
  1839. - incidents
  1840. - intrusionSets
  1841. - reports
  1842. - signatures
  1843. - threats
  1844. description: The type of group for which to return the tags. Can be "adversaries",
  1845. "campaigns", "documents", "emails", "events", "incidents", "intrusionSets",
  1846. "reports", "signatures", or "threats".
  1847. - name: group_id
  1848. required: true
  1849. description: The ID of the group for which to return the tags. To get the ID,
  1850. run the tc-get-groups command.
  1851. outputs:
  1852. - contextPath: TC.Group.Tag.Name
  1853. description: The name of the tag.
  1854. type: String
  1855. description: Retrieves the tags of a group.
  1856. - name: tc-download-document
  1857. arguments:
  1858. - name: document_id
  1859. required: true
  1860. description: The ID of the document.
  1861. outputs:
  1862. - contextPath: File.Size
  1863. description: The size of the file.
  1864. type: Number
  1865. - contextPath: File.SHA1
  1866. description: The SHA1 hash of the file.
  1867. type: String
  1868. - contextPath: File.SHA256
  1869. description: The SHA256 hash of the file.
  1870. type: String
  1871. - contextPath: File.Name
  1872. description: The name of the file.
  1873. type: String
  1874. - contextPath: File.SSDeep
  1875. description: The ssdeep hash of the file (same as displayed in file entries).
  1876. type: String
  1877. - contextPath: File.EntryID
  1878. description: The entry ID of the file.
  1879. type: String
  1880. - contextPath: File.Info
  1881. description: The information of the file.
  1882. type: String
  1883. - contextPath: File.Type
  1884. description: The type of the file.
  1885. type: String
  1886. - contextPath: File.MD5
  1887. description: The MD5 hash of the file.
  1888. type: String
  1889. - contextPath: File.Extension
  1890. description: The extension of the file.
  1891. type: String
  1892. description: Downloads the contents of a document.
  1893. - name: tc-get-group-indicators
  1894. arguments:
  1895. - name: group_type
  1896. required: true
  1897. auto: PREDEFINED
  1898. predefined:
  1899. - adversaries
  1900. - campaigns
  1901. - documents
  1902. - emails
  1903. - events
  1904. - incidents
  1905. - intrusionSets
  1906. - reports
  1907. - signatures
  1908. - threats
  1909. description: The type of the group for which to return the indicators. Can be
  1910. "adversaries", "campaigns", "documents", "emails", "events", "incidents",
  1911. "intrusionSets", "reports", "signatures", or "threats".
  1912. - name: group_id
  1913. required: true
  1914. description: The ID of the group for which to return the indicators. To get
  1915. the ID, run the tc-get-groups command.
  1916. outputs:
  1917. - contextPath: TC.Group.Indicator.Summary
  1918. description: The summary of the indicator.
  1919. type: String
  1920. - contextPath: TC.Group.Indicator.ThreatAssessConfidence
  1921. description: The confidence rating of the indicator.
  1922. type: String
  1923. - contextPath: TC.Group.Indicator.IndicatorID
  1924. description: The ID of the indicator.
  1925. type: Number
  1926. - contextPath: TC.Group.Indicator.DateAdded
  1927. description: The date on which the indicator was added.
  1928. type: Date
  1929. - contextPath: TC.Group.Indicator.Type
  1930. description: The type of the indicator.
  1931. type: String
  1932. - contextPath: TC.Group.Indicator.Rating
  1933. description: The threat rating of the indicator.
  1934. type: Number
  1935. - contextPath: TC.Group.Indicator.ThreatAssertRating
  1936. description: The rating of the threat assert.
  1937. type: Number
  1938. - contextPath: TC.Group.Indicator.OwnerName
  1939. description: The name of the owner of the indicator.
  1940. type: String
  1941. - contextPath: TC.Group.Indicator.LastModified
  1942. description: The date that the indicator was last modified.
  1943. type: Date
  1944. description: Returns indicators associated with a group.
  1945. - name: tc-get-associated-groups
  1946. arguments:
  1947. - name: group_type
  1948. required: true
  1949. auto: PREDEFINED
  1950. predefined:
  1951. - adversaries
  1952. - campaigns
  1953. - documents
  1954. - emails
  1955. - events
  1956. - incidents
  1957. - intrusionSets
  1958. - reports
  1959. - signatures
  1960. - threats
  1961. description: The type of group. Can be "adversaries", "campaigns", "documents",
  1962. "emails", "events", "incidents", "intrusionSets", "reports", "signatures",
  1963. or "threats".
  1964. - name: group_id
  1965. required: true
  1966. description: The ID of the group. To get the ID, run the tc-get-groups command.
  1967. outputs:
  1968. - contextPath: TC.Group.AssociatedGroup.DateAdded
  1969. description: The date on which group was added.
  1970. type: Date
  1971. - contextPath: TC.Group.AssociatedGroup.GroupID
  1972. description: The ID of the group.
  1973. type: Number
  1974. - contextPath: TC.Group.AssociatedGroup.Name
  1975. description: The name of the group.
  1976. type: String
  1977. - contextPath: TC.Group.AssociatedGroup.OwnerName
  1978. description: The name of the owner of the group.
  1979. type: String
  1980. - contextPath: TC.Group.AssociatedGroup.Type
  1981. description: The type of the group.
  1982. type: String
  1983. description: Returns indicators associated with a specified group.
  1984. - name: tc-associate-group-to-group
  1985. arguments:
  1986. - name: group_type
  1987. required: true
  1988. auto: PREDEFINED
  1989. predefined:
  1990. - adversaries
  1991. - campaigns
  1992. - documents
  1993. - emails
  1994. - events
  1995. - incidents
  1996. - intrusionSets
  1997. - reports
  1998. - signatures
  1999. - threats
  2000. description: The type of the group. Can be "adversaries", "campaigns", "documents",
  2001. "emails", "events", "incidents", "intrusionSets", "reports", "signatures",
  2002. or "threats".
  2003. - name: group_id
  2004. required: true
  2005. description: The ID of the group. To get the ID of the group, run the tc-get-groups
  2006. command.
  2007. - name: associated_group_type
  2008. required: true
  2009. auto: PREDEFINED
  2010. predefined:
  2011. - adversaries
  2012. - campaigns
  2013. - documents
  2014. - emails
  2015. - events
  2016. - incidents
  2017. - intrusionSets
  2018. - reports
  2019. - signatures
  2020. - threats
  2021. description: The type of group to associate. Can be "adversaries", "campaigns",
  2022. "documents", "emails", "events", "incidents", "intrusionSets", "reports",
  2023. "signatures", or "threats".
  2024. - name: associated_group_id
  2025. required: true
  2026. description: The ID of the group to associate.
  2027. outputs:
  2028. - contextPath: TC.Group.AssociatedGroup.AssociatedGroupID
  2029. description: The ID of the associated group.
  2030. type: Number
  2031. - contextPath: TC.Group.AssociatedGroup.AssociatedGroupType
  2032. description: The type of the associated group.
  2033. type: String
  2034. - contextPath: TC.Group.AssociatedGroup.GroupID
  2035. description: The ID of the group to associate to.
  2036. type: Number
  2037. - contextPath: TC.Group.AssociatedGroup.GroupType
  2038. description: The type of the group to associate to.
  2039. type: String
  2040. description: Associates one group with another group.
  2041. - name: tc-get-indicator-owners
  2042. arguments:
  2043. - name: indicator
  2044. required: true
  2045. description: Indicator Value
  2046. description: Get Owner for Indicator
  2047. - name: tc-download-report
  2048. description: The group report to download in PDF format.
  2049. arguments:
  2050. - name: group_type
  2051. required: true
  2052. auto: PREDEFINED
  2053. predefined:
  2054. - adversaries
  2055. - campaigns
  2056. - emails
  2057. - incidents
  2058. - signatures
  2059. - threats
  2060. description: 'The type of the group. Can be: "adversaries", "campaigns", "emails", "incidents", "signatures", or "threats".'
  2061. - name: group_id
  2062. required: true
  2063. description: The ID of the group.
  2064. outputs:
  2065. - contextPath: File.Size
  2066. description: The size of the file.
  2067. type: Number
  2068. - contextPath: File.SHA1
  2069. description: The SHA1 hash of the file.
  2070. type: String
  2071. - contextPath: File.SHA256
  2072. description: The SHA256 hash of the file.
  2073. type: String
  2074. - contextPath: File.Name
  2075. description: The name of the file.
  2076. type: String
  2077. - contextPath: File.SSDeep
  2078. description: The SSDeep hash of the file.
  2079. type: String
  2080. - contextPath: File.EntryID
  2081. description: The entry ID of the file.
  2082. type: String
  2083. - contextPath: File.Info
  2084. description: The information of the file.
  2085. type: String
  2086. - contextPath: File.Type
  2087. description: The type of the file.
  2088. type: String
  2089. - contextPath: File.MD5
  2090. description: The MD5 hash of the file.
  2091. type: String
  2092. - contextPath: File.Extension
  2093. description: The extension of the file.
  2094. type: String
  2095. dockerimage: demisto/threatconnect-py3-sdk:1.0.0.10664
  2096. runonce: false
  2097. subtype: python3
  2098. fromversion: '5.0.0'
  2099. tests:
  2100. - ThreatConnect v2 - Test