Skip to content

Commit

Permalink
Private upload mode docs #4 (#28670)
Browse files Browse the repository at this point in the history
* Updated Docs

* Added RNs

* updated RN

* updated OPSWAT pack-ignore
  • Loading branch information
darkushin authored and ostolero committed Aug 8, 2023
1 parent 47ec38a commit 61750f0
Show file tree
Hide file tree
Showing 21 changed files with 85 additions and 11 deletions.
Original file line number Diff line number Diff line change
Expand Up @@ -5,3 +5,4 @@
- Private / Organization specific Hatching: https://private.tria.ge/
- The API key can be found by going to your Hatching UI, clicking your account name in the top right, and the API key will be listed in the left hand side under "API Key"

Notice: Submitting indicators using the ***triage-submit-sample*** command of this integration might make the indicator data publicly available. See the vendor’s documentation for more details.
2 changes: 2 additions & 0 deletions Packs/HatchingTriage/Integrations/HatchingTriage/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -53,6 +53,8 @@ Get a list of all samples either private or public
***
Submits a file or url for analysis

Notice: Submitting indicators using this command might make the indicator data publicly available. See the vendor’s documentation for more details.


#### Base Command

Expand Down
6 changes: 6 additions & 0 deletions Packs/HatchingTriage/ReleaseNotes/1_0_13.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,6 @@

#### Integrations

##### Hatching Triage

Documentation and metadata improvements.
2 changes: 1 addition & 1 deletion Packs/HatchingTriage/pack_metadata.json
Original file line number Diff line number Diff line change
Expand Up @@ -3,7 +3,7 @@
"description": "Scalable malware sandbox",
"support": "partner",
"certification": "certified",
"currentVersion": "1.0.12",
"currentVersion": "1.0.13",
"author": "Hatching",
"url": "https://hatching.io/",
"email": "support@hatching.io",
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -3,4 +3,6 @@ See [https://analyze.intezer.com](https://analyze.intezer.com/account-details) f

In order to use 'Intezer-scan host' playbook, you should add the latest version of intezer scanner tool (you can find it under https://analyze.intezer.com).
After downloading the scanner, add it to your Cortex XSOAR agent tool library(Settings->Integrations->agent tools).
You should upload a zip file named 'Scanner' with the 'Scanner.exe' file inside it. (Files names are case sensitive)
You should upload a zip file named 'Scanner' with the 'Scanner.exe' file inside it. (Files names are case sensitive)

Notice: Submitting indicators using the ***intezer-analyze-url*** command of this integration might make the indicator data publicly available. See the vendor’s documentation for more details.
2 changes: 2 additions & 0 deletions Packs/Intezer/Integrations/IntezerV2/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -75,6 +75,8 @@ Analysis created successfully: 59e2f081-45f3-4822-bf45-407670dcb4d7
***
Checks file reputation of the given URL

Notice: Submitting indicators using this command might make the indicator data publicly available. See the vendor’s documentation for more details.

#### Base Command

`intezer-analyze-url`
Expand Down
7 changes: 7 additions & 0 deletions Packs/Intezer/ReleaseNotes/1_5_13.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,7 @@

#### Integrations

##### Intezer v2

- Documentation and metadata improvements.
- Updated the Docker image to: *demisto/py3-tools:1.0.0.67627*.
2 changes: 1 addition & 1 deletion Packs/Intezer/pack_metadata.json
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@
"name": "Intezer",
"description": "Malware detection and analysis based on code reuse",
"support": "partner",
"currentVersion": "1.5.12",
"currentVersion": "1.5.13",
"author": "Intezer",
"url": "intezer.com",
"email": "support@intezer.com",
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -7,3 +7,9 @@ Before you configure the integration, retrieve the API key from your Joe Securit
- Choose the *API Key* tab, and click the *Terms and Conditions* checkbox.
- Click **Generate API key**.
- Copy the API key and insert it to the *API Key* field.

Notice: Submitting indicators using the following commands of this integration might make the indicator data publicly available.
- ***url***
- ***joe-submit-url***
- ***joe-submit-sample***
See the vendor’s documentation for more details.
5 changes: 4 additions & 1 deletion Packs/JoeSecurity/Integrations/JoeSecurityV2/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -490,6 +490,8 @@ Retrieves files information from Joe Security.
***
Retrieves URL information from Joe Security.

Notice: Submitting indicators using this command might make the indicator data publicly available. See the vendor’s documentation for more details.


#### Base Command

Expand Down Expand Up @@ -868,6 +870,7 @@ Retrieve the submission info.

### joe-submit-sample
***
Notice: Submitting indicators using this command might make the indicator data publicly available. See the vendor’s documentation for more details.



Expand Down Expand Up @@ -1052,7 +1055,7 @@ Retrieve the submission info.

### joe-submit-url
***
Notice: Submitting indicators using this command might make the indicator data publicly available. See the vendor’s documentation for more details.


#### Base Command
Expand Down
6 changes: 6 additions & 0 deletions Packs/JoeSecurity/ReleaseNotes/1_1_11.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,6 @@

#### Integrations

##### Joe Security v2

Documentation and metadata improvements.
2 changes: 1 addition & 1 deletion Packs/JoeSecurity/pack_metadata.json
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@
"name": "Joe Security",
"description": "Sandbox Cloud",
"support": "xsoar",
"currentVersion": "1.1.10",
"currentVersion": "1.1.11",
"author": "Cortex XSOAR",
"url": "https://www.paloaltonetworks.com/cortex",
"email": "",
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -6,3 +6,5 @@ API key and API token are generate by Lastline and given at the subscription tim
### How to use the `threshold` parameter.
By default, the `threshold` parameter is set to 70. This means that for every file with a severity of over 70
the Dbot score will be set to *high*. This parameter is configurable.

Notice: Submitting indicators using the ***lastline-upload-url*** command of this integration might make the indicator data publicly available. See the vendor’s documentation for more details.
2 changes: 2 additions & 0 deletions Packs/Lastline/Integrations/Lastline_v2/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -116,6 +116,8 @@ Submission Time: 2020-02-25 06:58:19
### Submit a URL for analysis
---
Submits a URL for analysis.

Notice: Submitting indicators using this command might make the indicator data publicly available. See the vendor’s documentation for more details.
##### Base Command

`lastline-upload-url`
Expand Down
6 changes: 6 additions & 0 deletions Packs/Lastline/ReleaseNotes/1_0_17.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,6 @@

#### Integrations

##### Lastline v2

Documentation and metadata improvements.
2 changes: 1 addition & 1 deletion Packs/Lastline/pack_metadata.json
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@
"name": "Lastline",
"description": "Use the Lastline v2 integration to provide threat analysts and incident response teams with the advanced malware isolation and inspection environment needed to safely execute advanced malware samples, and understand their behavior.",
"support": "xsoar",
"currentVersion": "1.0.16",
"currentVersion": "1.0.17",
"author": "Cortex XSOAR",
"url": "https://www.paloaltonetworks.com/cortex",
"email": "",
Expand Down
3 changes: 3 additions & 0 deletions Packs/OPSWAT-Filescan/.pack-ignore
Original file line number Diff line number Diff line change
Expand Up @@ -4,3 +4,6 @@ ignore=IN126,IN135,IN153
[file:README.md]
ignore=RM104,RM102

[known_words]
OPSWAT
Filescan
Original file line number Diff line number Diff line change
Expand Up @@ -5,3 +5,5 @@ For the integration you need your OPSWAT Filescan Sandbox API key.
You can generate it if you don't have one after logging in on the [Filescan Sandbox](https://www.filescan.io/users/profile) page under the My settings - API Key tab.

Copy the API key and insert it to the *API Key* field.

Notice: Submitting indicators using the ***opswat-filescan-scan-url*** command of this integration might make the indicator data publicly available. See the vendor’s documentation for more details.
2 changes: 2 additions & 0 deletions Packs/OPSWAT-Filescan/Integrations/OPSWATFilescan/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -29,6 +29,8 @@ Scan URL with OPSWAT Filescan Sandbox

**Note**: OPSWAT Filescan Sandbox handles URL scanning as a file scan.

Notice: Submitting indicators using this command might make the indicator data publicly available. See the vendor’s documentation for more details.

#### Base Command

`opswat-filescan-scan-url`
Expand Down
6 changes: 6 additions & 0 deletions Packs/OPSWAT-Filescan/ReleaseNotes/1_0_2.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,6 @@

#### Integrations

##### OPSWAT Filescan Sandbox

Documentation and metadata improvements.
26 changes: 21 additions & 5 deletions Packs/OPSWAT-Filescan/pack_metadata.json
Original file line number Diff line number Diff line change
Expand Up @@ -2,16 +2,32 @@
"name": "OPSWAT Filescan Sandbox",
"description": "Unique adaptive threat analysis technology",
"support": "partner",
"currentVersion": "1.0.1",
"currentVersion": "1.0.2",
"author": "OPSWAT",
"url": "https://docs.opswat.com/filescan",
"email": "threatintel@opswat.com",
"created": "2023-03-25T00:00:00Z",
"categories": [
"Forensics & Malware Analysis"
],
"tags": ["Malware", "Simulation", "Threat Intelligence", "New"],
"useCases": ["Threat Intelligence Management", "Malware"],
"keywords": ["scan", "adaptive", "threat analysis", "zero-day", "IOC"],
"marketplaces": ["xsoar"]
"tags": [
"Malware",
"Simulation",
"Threat Intelligence",
"New"
],
"useCases": [
"Threat Intelligence Management",
"Malware"
],
"keywords": [
"scan",
"adaptive",
"threat analysis",
"zero-day",
"IOC"
],
"marketplaces": [
"xsoar"
]
}

0 comments on commit 61750f0

Please sign in to comment.