Intezer
This document provides guidance on how to integrate Intezer with the SOAR module of Google Security Operations.
Integration version: 7.0
Integrate Intezer with Google SecOps
The integration requires the following parameters:
| Parameters | Description | 
|---|---|
| API Root | Required API root of the Intezer service. | 
| API Key | Required API key of the Intezer service. | 
| Verify SSL | Optional If selected, Google SecOps verifies that the SSL certificate for the connection to the Intezer server is valid. Not selected by default. | 
For detailed instructions on how to configure an integration in Google SecOps, see Configure integrations .
Actions
Detonate File
Use Intezer to analyze a file.
This action runs on all entities.
Action inputs
To configure the action, use the following parameters:
| Parameters | Description | 
|---|---|
| File Path | Required The paths to the files that you want to analyze. You can provide multiple paths in a comma-separated string, such as  | 
| Related Alert ID | Optional The alert ID related to the file. | 
Action outputs
The following table describes the output types associated with the Detonate File action:
| Action output type | Availability | 
|---|---|
| Case wall attachment | Not available | 
| Case wall link | Not available | 
| Case wall table | Not available | 
| Enrichment table | Not available | 
| JSON result | Available | 
| Output messages | Available | 
| Script result | Available | 
JSON result
The following example describes the JSON result output received when using the Detonate File action:
  [ 
  
 { 
  
 "analysis_id" 
 : 
 "6cd3347b-f5b2-4c98-a0bc-039a6386dc34" 
 , 
  
 "analysis_status" 
 : 
 "created" 
 , 
  
 "analysis_type" 
 : 
 "file" 
 , 
  
 "identifier" 
 : 
 "/tmp/example.eml" 
  
 } 
 ] 
 
 
Output messages
The Detonate File action provides the following output messages:
| Output message | Message description | 
|---|---|
| Successfully fetched the analysis ids for the following file
      paths: PATH 
in Intezer | Action succeeded. | 
| Action wasn't able to fetch the analysis ids for the following
      file paths: PATH 
in Intezer | Action failed. Check the connection to the server, input parameters, or credentials. | 
Script result
The following table describes the values for the script result output when using the Detonate File action:
| Script result name | Value | 
|---|---|
| is_success | True or False | 
Detonate Hash
Analyze a file hash (SHA-1, SHA-256, or MD5) in Intezer Analyze.
This action runs on all entities.
Action inputs
To configure the action, use the following parameters:
| Parameters | Description | 
|---|---|
| File Hash | Required The hash of the reports that you want to analyze. You can provide multiple hashes in a comma-separated string. | 
Action outputs
The following table describes the output types associated with Detonate File action:
| Action output type | Availability | 
|---|---|
| Case wall attachment | Not available | 
| Case wall link | Not available | 
| Case wall table | Not available | 
| Enrichment table | Not available | 
| JSON result | Available | 
| Output messages | Available | 
| Script result | Available | 
Script result
The following table describes the values for the script result output when using the Detonate Hash action:
| Script result name | Value | 
|---|---|
| is_success | True or False | 
JSON result
The following example describes the JSON result output received when using the Detonate Hash action:
  [ 
  
 { 
  
 "analysis_id" 
 : 
 "7bbbec69-5764-479e-bb1c-c3686e992fbb" 
 , 
  
 "analysis_status" 
 : 
 "created" 
 , 
  
 "analysis_type" 
 : 
 "file" 
 , 
  
 "identifier" 
 : 
 "6be971118951786bc7be55ef5656149504008a3e" 
  
 }, 
  
 { 
  
 "analysis_id" 
 : 
 "33ee6661-7435-4e0a-a606-0b7d1a644859" 
 , 
  
 "analysis_status" 
 : 
 "created" 
 , 
  
 "analysis_type" 
 : 
 "file" 
 , 
  
 "identifier" 
 : 
 "5b97c39d87ad627c53023bfebb0ea1b5227c3f4e86e3bf06b23f3e4b0d6726e2" 
  
 } 
 ] 
 
 
Output messages
The Detonate Hash action provides the following output messages:
| Output message | Message description | 
|---|---|
| Successfully fetched the analysis ids for the following hashes: HASH_LIST 
 | Action succeeded. | 
| Action wasn't able to fetch the analysis ids for the following
      hashes: HASH_LIST 
 | Action failed. Check the connection to the server, input parameters, or credentials. | 
Detonate URL
Analyze a suspicious URL with Intezer.
This action runs on all entities.
Action inputs
To configure the action, use the following parameters:
| Parameters | Description | 
|---|---|
| Url | Optional The URL that you want to analyze, such as  You can provide multiple URLs in a comma-separated string. | 
Action outputs
The following table describes the output types associated with Detonate URL action:
| Action output type | Availability | 
|---|---|
| Case wall attachment | Not available | 
| Case wall link | Not available | 
| Case wall table | Not available | 
| Enrichment table | Not available | 
| JSON result | Available | 
| Output messages | Available | 
| Script result | Available | 
Script result
The following table describes the values for the script result output when using the Detonate URL action:
| Script result name | Value | 
|---|---|
| is_success | True or False | 
JSON result
The following example describes the JSON result output received when using the Detonate URL action:
  [ 
  
 { 
  
 "analysis_id" 
 : 
 "d99b7317-02a3-4282-81e9-d27528a575c0" 
 , 
  
 "analysis_status" 
 : 
 "created" 
 , 
  
 "analysis_type" 
 : 
 "url" 
 , 
  
 "identifier" 
 : 
 "www.example.com" 
  
 }, 
  
 { 
  
 "analysis_id" 
 : 
 "ee8d2e7e-950b-43f2-b0b7-cbfc3c20dfc5" 
 , 
  
 "analysis_status" 
 : 
 "created" 
 , 
  
 "analysis_type" 
 : 
 "url" 
 , 
  
 "identifier" 
 : 
 "https://www.example.com/" 
  
 } 
 ] 
 
 
Output messages
The Detonate URL action provides the following output messages:
| Output message | Message description | 
|---|---|
| Successfully fetched the analysis ids for the following urls: URL_LIST 
in Intezer | Action succeeded. | 
| Action wasn't able to fetch the analysis ids for the following
      urls: URL_LIST 
in Intezer | Action failed. Check the connection to the server, input parameters, or credentials. | 
Get Alert
Get an ingested alert triage and response information using the alert ID.
This action runs on all entities.
Action inputs
To configure the action, use the following parameters:
| Parameters | Description | 
|---|---|
| Alert ID | Required The alert ID to query. | 
| Wait For Completion | Optional If selected, the action waits for the analysis to complete. | 
Action outputs
The following table describes the output types associated with the Get Alert action:
| Action output type | Availability | 
|---|---|
| Case wall attachment | Not available | 
| Case wall link | Not available | 
| Case wall table | Not available | 
| Enrichment table | Not available | 
| JSON result | Available | 
| Output messages | Available | 
| Script result | Available | 
Script result
The following table describes the values for the script result output when using the Get Alert action:
| Script result name | Value | 
|---|---|
| is_success | True or False | 
JSON result
The following example describes the JSON result output received when using the Get Alert action:
  { 
  
 "result" 
 :{ 
  
 "alert_id" 
 : 
 "ldt:91a1c5ef609ac479ba77f8ca5879c82fc:958686237274" 
 , 
  
 "source" 
 : 
 "cs" 
 , 
  
 "sender" 
 : 
 "cs" 
 , 
  
 "raw_alert" 
 :{ 
  
 "cid" 
 : 
 "27fe4e476ca3490b8476b2b6650e5a74" 
 , 
  
 "alert_type" 
 : 
 "identify" 
 , 
  
 "created_timestamp" 
 : 
 "2023-11-09T00:03:10.116556016Z" 
 , 
  
 "detection_id" 
 : 
 "ldt:91a1c5ef609ac479ba77f8ca5879c82fc:958686237274" 
 , 
  
 "evidences" 
 :[ 
  
 { 
  
 "evidence_type" 
 : 
 "domain" 
 , 
  
 "evidence_value" 
 : 
 "domain" 
  
 } 
  
 ], 
  
 "device" 
 :{ 
  
 "device_id" 
 : 
 "6a1c5ef609ac479ba77f8ca5879c82fc" 
 , 
  
 "cid" 
 : 
 "67fe4e476ca3490b8476b2b6650e5a74" 
 , 
  
 "agent_load_flags" 
 : 
 "0" 
 , 
  
 "agent_local_time" 
 : 
 "2023-10-18T23:01:49.681Z" 
 , 
  
 "agent_version" 
 : 
 "7.03.15805.0" 
 , 
  
 "bios_manufacturer" 
 : 
 "Example Technologies LTD" 
 , 
  
 "bios_version" 
 : 
 "6.00" 
 , 
  
 "config_id_base" 
 : 
 "65994753" 
 , 
  
 "config_id_build" 
 : 
 "15805" 
 , 
  
 "config_id_platform" 
 : 
 "8" 
 , 
  
 "external_ip" 
 : 
 "35.246.203.0" 
 , 
  
 "hostname" 
 : 
 "example-hostname" 
 , 
  
 "first_seen" 
 : 
 "2023-06-14T10:50:40Z" 
 , 
  
 "last_seen" 
 : 
 "2023-11-09T00:01:56Z" 
 , 
  
 "local_ip" 
 : 
 "198.51.100.1" 
 , 
  
 "mac_address" 
 : 
 "02-42-48-a3-7f-29" 
 , 
  
 "major_version" 
 : 
 "3" 
 , 
  
 "minor_version" 
 : 
 "10" 
 , 
  
 "os_version" 
 : 
 "CentOS 7.9" 
 , 
  
 "platform_id" 
 : 
 "3" 
 , 
  
 "platform_name" 
 : 
 "Linux" 
 , 
  
 "product_type_desc" 
 : 
 "Server" 
 , 
  
 "status" 
 : 
 "normal" 
 , 
  
 "system_manufacturer" 
 : 
 "Example, Inc." 
 , 
  
 "system_product_name" 
 : 
 "Example Virtual Platform" 
 , 
  
 "groups" 
 :[ 
  
 "9489d65c343244169627d4a728389039" 
  
 ], 
  
 "modified_timestamp" 
 : 
 "2023-11-09T00:02:06Z" 
  
 }, 
  
 "behaviors" 
 :[ 
  
 { 
  
 "device_id" 
 : 
 "6a1c5ef609ac479ba77f8ca5879c82fc" 
 , 
  
 "timestamp" 
 : 
 "2023-11-09T00:03:02Z" 
 , 
  
 "template_instance_id" 
 : 
 "1359" 
 , 
  
 "behavior_id" 
 : 
 "10304" 
 , 
  
 "filename" 
 : 
 "bash" 
 , 
  
 "filepath" 
 : 
 "/usr/bin/bash" 
 , 
  
 "alleged_filetype" 
 : 
 "" 
 , 
  
 "cmdline" 
 : 
 "bash crowdstrike_test_high" 
 , 
  
 "scenario" 
 : 
 "suspicious_activity" 
 , 
  
 "objective" 
 : 
 "Falcon Detection Method" 
 , 
  
 "tactic" 
 : 
 "Falcon Overwatch" 
 , 
  
 "tactic_id" 
 : 
 "CSTA0006" 
 , 
  
 "technique" 
 : 
 "Malicious Activity" 
 , 
  
 "technique_id" 
 : 
 "CST0002" 
 , 
  
 "display_name" 
 : 
 "TestTriggerHigh" 
 , 
  
 "description" 
 : 
 "A high level detection was triggered on this process for testing purposes." 
 , 
  
 "severity" 
 : 
 70 
 , 
  
 "confidence" 
 : 
 100 
 , 
  
 "ioc_type" 
 : 
 "" 
 , 
  
 "ioc_value" 
 : 
 "" 
 , 
  
 "ioc_source" 
 : 
 "" 
 , 
  
 "ioc_description" 
 : 
 "" 
 , 
  
 "user_name" 
 : 
 "root" 
 , 
  
 "user_id" 
 : 
 "0" 
 , 
  
 "control_graph_id" 
 : 
 "ctg:6a1c5ef609ac479ba77f8ca5879c82fc:958686237274" 
 , 
  
 "triggering_process_graph_id" 
 : 
 "pid:6a1c5ef609ac479ba77f8ca5879c82fc:46565404531105" 
 , 
  
 "sha256" 
 : 
 "00f8cbc5b3a6640af5ac18d01bc5a666f6f583b1379b9491e0bcc28ba78c92e9" 
 , 
  
 "md5" 
 : 
 "cfd65bed18a1fae631091c3a4c4dd533" 
 , 
  
 "parent_details" 
 :{ 
  
 "parent_sha256" 
 : 
 "00f8cbc5b3a6640af5ac18d01bc5a666f6f583b1379b9491e0bcc28ba78c92e9" 
 , 
  
 "parent_md5" 
 : 
 "cfd65bed18a1fae631091c3a4c4dd533" 
 , 
  
 "parent_cmdline" 
 : 
 "/bin/sh -c ./alert.sh" 
 , 
  
 "parent_process_graph_id" 
 : 
 "pid:6a1c5ef609ac479ba77f8ca5879c82fc:46565400489930" 
  
 }, 
  
 "pattern_disposition" 
 : 
 0 
 , 
  
 "pattern_disposition_details" 
 :{ 
  
 "indicator" 
 : 
 false 
 , 
  
 "detect" 
 : 
 false 
 , 
  
 "inddet_mask" 
 : 
 false 
 , 
  
 "sensor_only" 
 : 
 false 
 , 
  
 "rooting" 
 : 
 false 
 , 
  
 "kill_process" 
 : 
 false 
 , 
  
 "kill_subprocess" 
 : 
 false 
 , 
  
 "quarantine_machine" 
 : 
 false 
 , 
  
 "quarantine_file" 
 : 
 false 
 , 
  
 "policy_disabled" 
 : 
 false 
 , 
  
 "kill_parent" 
 : 
 false 
 , 
  
 "operation_blocked" 
 : 
 false 
 , 
  
 "process_blocked" 
 : 
 false 
 , 
  
 "registry_operation_blocked" 
 : 
 false 
 , 
  
 "critical_process_disabled" 
 : 
 false 
 , 
  
 "bootup_safeguard_enabled" 
 : 
 false 
 , 
  
 "fs_operation_blocked" 
 : 
 false 
 , 
  
 "handle_operation_downgraded" 
 : 
 false 
 , 
  
 "kill_action_failed" 
 : 
 false 
 , 
  
 "blocking_unsupported_or_disabled" 
 : 
 false 
 , 
  
 "suspend_process" 
 : 
 false 
 , 
  
 "suspend_parent" 
 : 
 false 
  
 } 
  
 } 
  
 ], 
  
 "email_sent" 
 : 
 false 
 , 
  
 "first_behavior" 
 : 
 "2023-11-09T00:03:02Z" 
 , 
  
 "last_behavior" 
 : 
 "2023-11-09T00:03:02Z" 
 , 
  
 "max_confidence" 
 : 
 100 
 , 
  
 "max_severity" 
 : 
 70 
 , 
  
 "max_severity_displayname" 
 : 
 "High" 
 , 
  
 "show_in_ui" 
 : 
 true 
 , 
  
 "status" 
 : 
 "new" 
 , 
  
 "hostinfo" 
 :{ 
  
 "domain" 
 : 
 "" 
  
 }, 
  
 "seconds_to_triaged" 
 : 
 0 
 , 
  
 "seconds_to_resolved" 
 : 
 0 
 , 
  
 "behaviors_processed" 
 :[ 
  
 "pid:6a1c5ef609ac479ba77f8ca5879c82fc:46565404531105:10304" 
  
 ], 
  
 "date_updated" 
 : 
 "2023-11-12T00:06:14Z" 
  
 }, 
  
 "alert_sub_types" 
 :[ 
  
 ], 
  
 "alert" 
 :{ 
  
 "alert_id" 
 : 
 "ldt:91a1c5ef609ac479ba77f8ca5879c82fc:958686237274" 
 , 
  
 "alert_url" 
 : 
 null 
 , 
  
 "creation_time" 
 : 
 "2023-11-12T00:06:14" 
 , 
  
 "alert_title" 
 : 
 "ldt:91a1c5ef609ac479ba77f8ca5879c82fc:958686237274" 
 , 
  
 "device" 
 :{ 
  
 }, 
  
 "creation_time_display" 
 : 
 "12 Nov 23 | 00:06 UTC" 
  
 }, 
  
 "triage_result" 
 :{ 
  
 "alert_verdict" 
 : 
 "audited" 
 , 
  
 "risk_category" 
 : 
 "audited" 
 , 
  
 "risk_level" 
 : 
 "informational" 
 , 
  
 "risk_score" 
 : 
 60 
 , 
  
 "risk_level_display" 
 : 
 "Informational" 
 , 
  
 "risk_category_display" 
 : 
 "Audited" 
 , 
  
 "alert_verdict_display" 
 : 
 "Audited" 
  
 }, 
  
 "response" 
 :{ 
  
 "status" 
 : 
 "no_action_needed" 
 , 
  
 "automated_response_actions" 
 :[ 
  
 ], 
  
 "user_recommended_actions" 
 :[ 
  
 ], 
  
 "user_recommended_actions_display" 
 : 
 "" 
 , 
  
 "status_display" 
 : 
 "No Action Needed" 
  
 }, 
  
 "note" 
 : 
 "\ud83d\udfe6 Intezer Automated Triage\n===================================\nAudited - No Action Needed\n===================================\n\n- Title: ldt:alert-ID\n- Source: CrowdStrike\n- Creation time: 12 Nov 23 | 00:06 UTC\n\nView alert: \ud83d\udc49 https://analyze.intezer.com/alerts/ldt:alert_ID" 
 , 
  
 "source_display" 
 : 
 "CrowdStrike" 
 , 
  
 "source_type" 
 : 
 "edr" 
 , 
  
 "intezer_alert_url" 
 : 
 "https://analyze.intezer.com/alerts/ldt:alert-ID" 
  
 }, 
  
 "status" 
 : 
 "succeeded" 
 } 
 
 
Output messages
The Get Alert action provides the following output messages:
| Output message | Message description | 
|---|---|
| Successfully fetched the alert details for the following alert
      id: ALERT_ID 
in Intezer | Action succeeded. | 
| Action wasn't able to fetch the alert detail for the following
      alert: ERROR_REASON 
in Intezer | Action failed. Check the connection to the server, input parameters, or credentials. | 
Get File Report
Get a file analysis report based on an analysis ID or a file hash.
This action runs on all entities.
Action inputs
To configure the action, use the following parameters:
| Parameters | Description | 
|---|---|
| Analysis ID | Optional A comma-separated list of the file analysis IDs to run the action on. This parameter is case sensitive. If both Analysis IDand File Hashparameters are provided, the File Hashvalue has priority. | 
| File Hash | Optional A comma-separated list of file hashes to run the action on. This parameter is case sensitive. If both Analysis IDand File Hashparameters are provided, the File Hashvalue has priority. | 
| Private Only | Optional If selected, the action show only private reports (relevant only for hashes). | 
| Wait For Completion | Optional If selected, the action waits for the analysis to complete before returning the report. | 
Action outputs
The following table describes the output types associated with the Get Report action:
| Action output type | Availability | 
|---|---|
| Case wall attachment | Not available | 
| Case wall link | Not available | 
| Case wall table | Not available | 
| Enrichment table | Not available | 
| JSON result | Available | 
| Output messages | Available | 
| Script result | Available | 
Script result
The following table describes the values for the script result output when using the Get Report action:
| Script result name | Value | 
|---|---|
| is_success | True or False | 
JSON result
The following example describes the JSON result output received when using the Get Report action:
  [ 
  
 { 
  
 "analysis_id" 
 : 
 "fdc18702-e308-43e5-9476-554501fb2009" 
 , 
  
 "analysis_type" 
 : 
 "file" 
 , 
  
 "analysis_status" 
 : 
 "succeeded" 
 , 
  
 "analysis_content" 
 :{ 
  
 "analysis" 
 :{ 
  
 "analysis_id" 
 : 
 "fdc18702-e308-43e5-9476-554501fb2009" 
 , 
  
 "analysis_time" 
 : 
 "Fri, 16 Feb 2024 08:16:20 GMT" 
 , 
  
 "analysis_url" 
 : 
 "https://analyze.intezer.com/analyses/analysis-id" 
 , 
  
 "file_name" 
 : 
 "file_name" 
 , 
  
 "is_private" 
 : 
 true 
 , 
  
 "sha256" 
 : 
 "9baf8bb61b9ab2e28d9a2599bc8f524489845782097464edd20ad7d0353c3b6d" 
 , 
  
 "sub_verdict" 
 : 
 "inconclusive" 
 , 
  
 "tags" 
 :[ 
  
 "non_executable" 
  
 ], 
  
 "verdict" 
 : 
 "unknown" 
  
 }, 
  
 "iocs" 
 :{ 
  
 "files" 
 :[ 
  
 { 
  
 "analysis_id" 
 : 
 "fdc18702-e308-43e5-9476-554501fb2009" 
 , 
  
 "family" 
 : 
 null 
 , 
  
 "path" 
 : 
 "file_name" 
 , 
  
 "sha256" 
 : 
 "9baf8bb61b9ab2e28d9a2599bc8f524489845782097464edd20ad7d0353c3b6d" 
 , 
  
 "type" 
 : 
 "main_file" 
 , 
  
 "verdict" 
 : 
 "unknown" 
  
 } 
  
 ], 
  
 "network" 
 :[ 
  
 { 
  
 "classification" 
 : 
 "suspicious" 
 , 
  
 "ioc" 
 : 
 "198.51.100.161" 
 , 
  
 "source" 
 :[ 
  
 "Network communication" 
  
 ], 
  
 "type" 
 : 
 "ip" 
  
 } 
  
 ] 
  
 }, 
  
 "ttps" 
 :[ 
  
 { 
  
 "data" 
 :[ 
  
 { 
  
 "cid" 
 : 
 2793 
 , 
  
 "pid" 
 : 
 1996 
 , 
  
 "type" 
 : 
 "call" 
  
 }, 
  
 { 
  
 "cid" 
 : 
 5365 
 , 
  
 "pid" 
 : 
 1340 
 , 
  
 "type" 
 : 
 "call" 
  
 }, 
  
 { 
  
 "cid" 
 : 
 5366 
 , 
  
 "pid" 
 : 
 1340 
 , 
  
 "type" 
 : 
 "call" 
  
 }, 
  
 { 
  
 "cid" 
 : 
 5373 
 , 
  
 "pid" 
 : 
 1340 
 , 
  
 "type" 
 : 
 "call" 
  
 }, 
  
 { 
  
 "cid" 
 : 
 5375 
 , 
  
 "pid" 
 : 
 1340 
 , 
  
 "type" 
 : 
 "call" 
  
 } 
  
 ], 
  
 "description" 
 : 
 "Guard pages use detected - possible anti-debugging." 
 , 
  
 "name" 
 : 
 "antidebug_guardpages" 
 , 
  
 "severity" 
 : 
 2 
 , 
  
 "ttps" 
 :[ 
  
 { 
  
 "name" 
 : 
 "Native API" 
 , 
  
 "ttp" 
 : 
 "Execution::Native API [T1106]" 
  
 } 
  
 ] 
  
 } 
  
 ], 
  
 "metadata" 
 :{ 
  
 "file_type" 
 : 
 "non executable" 
 , 
  
 "indicators" 
 :[ 
  
 { 
  
 "classification" 
 : 
 "informative" 
 , 
  
 "name" 
 : 
 "non_executable" 
  
 } 
  
 ], 
  
 "md5" 
 : 
 "a01073d047bd9bb151b8509570ea44d6" 
 , 
  
 "sha1" 
 : 
 "610742629fe7d7188042c8c427fc68723d53cd42" 
 , 
  
 "sha256" 
 : 
 "9baf8bb61b9ab2e28d9a2599bc8f524489845782097464edd20ad7d0353c3b6d" 
 , 
  
 "size_in_bytes" 
 : 
 21 
 , 
  
 "ssdeep" 
 : 
 "3:H0shRFCZ:HlS" 
  
 }, 
  
 "root-code-reuse" 
 : 
 null 
  
 } 
  
 } 
 ] 
 
 
Output messages
The Get File Report action provides the following output messages:
| Output message | Message description | 
|---|---|
| Successfully fetched the file analysis for the following items: ANALYSIS_ID_OR_HASH_LIST 
in
      Intezer | Action succeeded. | 
| No file analysis were found for the provided items | Action failed. Check the connection to the server, input parameters, or credentials. | 
Get URL Report
Get a URL analysis report based on the URL analysis ID.
This action runs on all entities.
Action inputs
To configure the action, use the following parameters:
| Parameters | Description | 
|---|---|
| Analysis ID | Required A comma-separated list of the file analysis IDs to run the action on. This parameter is case sensitive. The analysis ID is returned when submitting a URL for analysis. | 
| Wait For Completion | Optional If selected, the action waits for the analysis to complete. | 
Action outputs
The following table describes the output types associated with the Get URL Report action:
| Action output type | Availability | 
|---|---|
| Case wall attachment | Not available | 
| Case wall link | Not available | 
| Case wall table | Not available | 
| Enrichment table | Not available | 
| JSON result | Available | 
| Output messages | Available | 
| Script result | Available | 
Script result
The following table describes the values for the script result output when using the Get URL Report action:
| Script result name | Value | 
|---|---|
| is_success | True or False | 
JSON result
The following example describes the JSON result output received when using the Get URL Report action:
  [ 
  
 { 
  
 "analysis_id" 
 : 
 "Aef96e22-e0b1-45de-b7fa-2b9596ecb922" 
 , 
  
 "analysis_type" 
 : 
 "url" 
 , 
  
 "analysis_status" 
 : 
 "succeeded" 
 , 
  
 "analysis_content" 
 :{ 
  
 "analysis" 
 :{ 
  
 "analysis_id" 
 : 
 "aef96e22-e0b1-45de-b7fa-2b9596ecb922" 
 , 
  
 "analysis_time" 
 : 
 "Wed, 07 Feb 2024 06:16:42 GMT" 
 , 
  
 "analysis_url" 
 : 
 "https://analyze.intezer.com/url/aef96e22-e0b1-45de-b7fa-2b9596ecb922" 
 , 
  
 "api_void_risk_score" 
 : 
 0 
 , 
  
 "certificate" 
 :{ 
  
 "issuer" 
 : 
 "Example Secure Certificate Authority" 
 , 
  
 "protocol" 
 : 
 "TLS 1.3" 
 , 
  
 "subject_name" 
 : 
 "analyze.intezer.com" 
 , 
  
 "valid_from" 
 : 
 "2023-07-25 19:50:53.000000" 
 , 
  
 "valid_to" 
 : 
 "2024-08-25 19:50:53.000000" 
  
 }, 
  
 "domain_info" 
 :{ 
  
 "creation_date" 
 : 
 "2015-08-28 04:24:45.000000" 
 , 
  
 "domain_name" 
 : 
 "intezer.com" 
 , 
  
 "registrar" 
 : 
 "Example, LLC" 
  
 }, 
  
 "indicators" 
 :[ 
  
 { 
  
 "classification" 
 : 
 "informative" 
 , 
  
 "indicator_info" 
 : 
 "text/html" 
 , 
  
 "indicator_type" 
 : 
 "content_type" 
 , 
  
 "text" 
 : 
 "Content type: text/html" 
  
 }, 
  
 { 
  
 "classification" 
 : 
 "informative" 
 , 
  
 "indicator_type" 
 : 
 "valid_https" 
 , 
  
 "text" 
 : 
 "Valid https" 
  
 }, 
  
 { 
  
 "classification" 
 : 
 "informative" 
 , 
  
 "indicator_type" 
 : 
 "url_accessible" 
 , 
  
 "text" 
 : 
 "URL is accessible" 
  
 }, 
  
 { 
  
 "classification" 
 : 
 "suspicious" 
 , 
  
 "indicator_type" 
 : 
 "empty_page_title" 
 , 
  
 "text" 
 : 
 "Has empty page title" 
  
 }, 
  
 { 
  
 "classification" 
 : 
 "informative" 
 , 
  
 "indicator_type" 
 : 
 "domain_ipv4_assigned" 
 , 
  
 "text" 
 : 
 "Assigned IPv4 domain" 
  
 }, 
  
 { 
  
 "classification" 
 : 
 "informative" 
 , 
  
 "indicator_type" 
 : 
 "domain_ipv4_valid" 
 , 
  
 "text" 
 : 
 "Valid IPv4 domain" 
  
 }, 
  
 { 
  
 "classification" 
 : 
 "informative" 
 , 
  
 "indicator_type" 
 : 
 "uses_cloudflare" 
 , 
  
 "text" 
 : 
 "Uses Cloudflare" 
  
 } 
  
 ], 
  
 "ip" 
 : 
 "203.0.113.201" 
 , 
  
 "redirect_chain" 
 :[ 
  
 { 
  
 "response_status" 
 : 
 200 
 , 
  
 "url" 
 : 
 "https://example.com/" 
  
 } 
  
 ], 
  
 "scanned_url" 
 : 
 "https://example.com/" 
 , 
  
 "submitted_url" 
 : 
 "https://example.com" 
 , 
  
 "summary" 
 :{ 
  
 "description" 
 : 
 "No suspicious activity was detected for this URL" 
 , 
  
 "main_connection_gene_count" 
 : 
 0 
 , 
  
 "main_connection_gene_percentage" 
 : 
 0.0 
 , 
  
 "title" 
 : 
 "No Threats" 
 , 
  
 "verdict_name" 
 : 
 "no_threats" 
 , 
  
 "verdict_type" 
 : 
 "no_threats" 
  
 } 
  
 } 
  
 } 
  
 } 
 ] 
 
 
Output messages
The Get URL Report action provides the following output messages:
| Output message | Message description | 
|---|---|
| Successfully fetched the url analysis for the following analysis
      ids: ANALYSIS_ID 
in Intezer | Action succeeded. | 
| No url analysis were found for the provided analysis ids | Action failed. Check the connection to the server, input parameters, or credentials. | 
Index File
Index the file genes into the organizational database.
This action runs on all entities.
Action inputs
To configure the action, use the following parameters:
| Parameters | Description | 
|---|---|
| Index As | Required Index as trusted or malicious. | 
| SHA256 | Optional The SHA-256 hash to index. You can provide multiple hashes in a comma-separated string. | 
| Family Name | Optional The family name to use in the index. This
    parameter is required if the Index As 
parameter value is  | 
Action outputs
The following table describes the output types associated with the Index File action:
| Action output type | Availability | 
|---|---|
| Case wall attachment | Not available | 
| Case wall link | Not available | 
| Case wall table | Not available | 
| Enrichment table | Not available | 
| JSON result | Available | 
| Output messages | Available | 
| Script result | Available | 
Script result
The following table describes the values for the script result output when using the Index File action:
| Script result name | Value | 
|---|---|
| is_success | True or False | 
JSON result
The following example describes the JSON result output received when using the Index File action:
  [ 
  
 { 
  
 "index_id" 
 : 
 "091ed5aa-a94f-48d9-9b90-89ff434947b2" 
 , 
  
 "status" 
 : 
 "succeeded" 
  
 } 
 ] 
 
 
Output messages
The Index File action provides the following output messages:
| Output message | Message description | 
|---|---|
| Waiting for results for the following hashes: HASH_LIST 
 | Action is still in progress. | 
|     | Action succeeded. | 
| None of the file hash got indexed | Action failed. Check the connection to the server, input parameters, or credentials. | 
Ping
Test connectivity to Intezer.
This action runs on all entities.
Action inputs
None.
Action outputs
The following table describes the output types associated with the Ping action:
| Action output type | Availability | 
|---|---|
| Case wall attachment | Not available | 
| Case wall link | Not available | 
| Case wall table | Not available | 
| Enrichment table | Not available | 
| JSON result | Not available | 
| Output messages | Available | 
| Script result | Available | 
Script result
The following table describes the values for the script result output when using the Ping action:
| Script result name | Value | 
|---|---|
| is_success | True or False | 
Submit Alert
Submit a new alert that includes the raw alert information to Intezer for processing.
This action runs on all entities.
Action inputs
To configure the action, use the following parameters:
| Parameters | Description | 
|---|---|
| Source | Required The source of the alert. | 
| Raw Alert | Required Alert raw data in JSON format. | 
| Alert Mapping | Required Mapping to use for the alert in JSON format. | 
Action outputs
The following table describes the output types associated with the Submit Alert action:
| Action output type | Availability | 
|---|---|
| Case wall attachment | Not available | 
| Case wall link | Not available | 
| Case wall table | Not available | 
| Enrichment table | Not available | 
| JSON result | Available | 
| Output messages | Available | 
| Script result | Available | 
Script result
The following table describes the values for the script result output when using the Submit Alert action:
| Script result name | Value | 
|---|---|
| is_success | True or False | 
JSON result
The following example describes the JSON result output received when using the Submit Alert action:
  { 
  
 "alert_id" 
 : 
 "ccdt:2a1c5ef609ac479ba77f8ca5879c82fc:958686237274" 
 } 
 
 
Output messages
The Submit Alert action provides the following output messages:
| Output message | Message description | 
|---|---|
| Successfully submitted details about the following alert: ALERT_ID 
 | Action succeeded. | 
| Error executing action "Submit Alert". Reason: Invalid parameter
      "Alert Mapping". The JSON structure is invalid. Wrong value provided: ALERT_ID 
 | Action failed. Check the Alert Mapping parameter value. | 
Submit File
Submit a file for analysis.
This action runs on all entities.
Action inputs
To configure the action, use the following parameters:
| Parameters | Description | 
|---|---|
| File Paths | Required The paths of the files to analyze. | 
Action outputs
The following table describes the output types associated with the Submit File action:
| Action output type | Availability | 
|---|---|
| Case wall attachment | Not available | 
| Case wall link | Not available | 
| Case wall table | Not available | 
| Enrichment table | Not available | 
| JSON result | Available | 
| Output messages | Available | 
| Script result | Available | 
Script result
The following table describes the values for the script result output when using the Submit File action:
| Script result name | Value | 
|---|---|
| is_success | True or False | 
JSON result
The following example describes the JSON result output received when using the Submit File action:
  { 
  
 "C:\\\\Users\\\\User1\\\\Downloads\\test_file.exe" 
 : 
  
 { 
  
 "4e553bce90f0b39cd71ba633da5990259e185979c2859ec2e04dd8efcdafe356" 
 : 
  
 { 
  
 "family_name" 
 : 
  
 "Example" 
 , 
  
 "analysis_id" 
 : 
  
 "548e6b8b-20b1-445c-9922-af6b52a8abc3" 
 , 
  
 "sub_verdict" 
 : 
  
 "known_malicious" 
 , 
  
 "analysis_url" 
 : 
  
 "https://analyze.intezer.com/#/analyses/analysis-ID" 
 , 
  
 "verdict" 
 : 
  
 "malicious" 
 , 
  
 "sha256" 
 : 
  
 "4e553bce90f0b39cd71ba633da5990259e185979c2859ec2e04dd8efcdafe356" 
 , 
  
 "is_private" 
 : 
  
 true 
 , 
  
 "analysis_time" 
 : 
  
 "Thu, 14 Feb 2019 08:58:27 GMT" 
  
 } 
  
 } 
 } 
 
 
Submit Hash
Submit a hash for analysis to Intezer.
This action runs on a FileHash entity.
Action inputs
None.
Action outputs
The following table describes the output types associated with the Submit Hash action:
| Action output type | Availability | 
|---|---|
| Case wall attachment | Not available | 
| Case wall link | Not available | 
| Case wall table | Not available | 
| Entity enrichment table | Available | 
| JSON result | Available | 
| Output messages | Not available | 
| Script result | Available | 
Entity enrichment
The following table describes the entity enrichment logic associated with the Submit Hash action:
| Enrichment field | Logic | 
|---|---|
| family_name | Returns if it exists in the JSON result | 
| analysis_id | Returns if it exists in JSON result | 
| sub_verdict | Returns if it exists in JSON result | 
| analysis_url | Returns if it exists in JSON result | 
| verdict | Returns if it exists in JSON result | 
| sha256 | Returns if it exists in JSON result | 
| is_private | Returns if it exists in JSON result | 
| analysis_time | Returns if it exists in JSON result | 
JSON result
The following example describes the JSON result output received when using the Submit Hash action:
  [{ 
  
 "EntityResult" 
 : 
  
 { 
  
 "family_name" 
 : 
  
 "Example" 
 , 
  
 "analysis_id" 
 : 
  
 "548e6b8b-20b1-445c-9922-af6b52a8abc3" 
 , 
  
 "sub_verdict" 
 : 
  
 "known_malicious" 
 , 
  
 "analysis_url" 
 : 
  
 "https://analyze.intezer.com/#/analyses/analysis-ID" 
 , 
  
 "verdict" 
 : 
  
 "malicious" 
 , 
  
 "sha256" 
 : 
  
 "4e553bce90f0b39cd71ba633da5990259e185979c2859ec2e04dd8efcdafe356" 
 , 
  
 "is_private" 
 : 
  
 true 
 , 
  
 "analysis_time" 
 : 
  
 "Thu, 14 Feb 2019 08:58:27 GMT" 
  
 }, 
  
 "Entity" 
 : 
  
 "4e553bce90f0b39cd71ba633da5990259e185979c2859ec2e04dd8efcdafe356" 
 }] 
 
 
Script result
The following table describes the values for the script result output when using the Submit Hash action:
| Script result name | Value | 
|---|---|
| is_success | True or False | 
Submit Suspicious Email
Submit a suspicious phishing email in raw format ( .msg 
or .eml 
) to Intezer
for processing.
This action runs on all entities.
Action inputs
To configure the action, use the following parameters:
| Parameters | Description | 
|---|---|
| Email File Path | Required The path to the email file. | 
Action outputs
The following table describes the output types associated with the Submit Suspicious Email action:
| Action output type | Availability | 
|---|---|
| Case wall attachment | Not available | 
| Case wall link | Not available | 
| Case wall table | Not available | 
| Enrichment table | Not available | 
| JSON result | Available | 
| Output messages | Available | 
| Script result | Available | 
JSON result
The following example describes the JSON result output received when using the Submit Suspicious Email action:
  { 
  
 "alert_id" 
 : 
 "3385f4f9aec655dfac9d59d54e8ff1f12343501ebc62bf1a91ad1954bb6ae0b9" 
 } 
 
 
Output messages
The Submit Suspicious Email action provides the following output messages:
| Output message | Message description | 
|---|---|
| Successfully submitted suspicious email EMAIL_FILE_PATH 
in Intezer | Action succeeded. | 
| Error executing action "Intezer". Reason: No such file or
      directory: EMAIL_FILE_PATH 
 | Action failed. Check the connection to the server, input parameters, or credentials. | 
Script result
The following table describes the values for the script result output when using the Submit Suspicious Email action:
| Script result name | Value | 
|---|---|
| is_success | True or False | 
Unset Index File
Remove files from the index.
This action runs on all entities.
Action inputs
To configure the action, use the following parameters:
| Parameters | Description | 
|---|---|
| SHA256 | Optional The SHA-256 hash to remove from the index. You can provide multiple files in a comma-separated string. | 
Action outputs
The following table describes the output types associated with the Unset Index File action:
| Action output type | Availability | 
|---|---|
| Case wall attachment | Not available | 
| Case wall link | Not available | 
| Case wall table | Not available | 
| Enrichment table | Not available | 
| JSON result | Not available | 
| Output messages | Available | 
| Script result | Available | 
Output messages
The Unset Index File action provides the following output messages:
| Output message | Message description | 
|---|---|
|     | Action succeeded. | 
| Action wasn't able to unset file index for the following hashes: HASH_LIST 
 | Action failed. Check the connection to the server, input parameters, or credentials. | 
Script result
The following table describes the values for the script result output when using the Unset Index File action:
| Script result name | Value | 
|---|---|
| is_success | True or False | 
Need more help? Get answers from Community members and Google SecOps professionals.

