Skip to content

Commit

Permalink
Merge pull request #21 from splunk-soar-connectors/next
Browse files Browse the repository at this point in the history
Merging next to main for release 2.3.0
  • Loading branch information
phantom-jacob authored Dec 4, 2024
2 parents 4ed9e69 + 73e8531 commit 3d0b544
Show file tree
Hide file tree
Showing 25 changed files with 461 additions and 323 deletions.
4 changes: 2 additions & 2 deletions .pre-commit-config.yaml
Original file line number Diff line number Diff line change
@@ -1,11 +1,11 @@
repos:
- repo: https://github.com/phantomcyber/dev-cicd-tools
rev: v1.16
rev: v1.23
hooks:
- id: org-hook
- id: package-app-dependencies
- repo: https://github.com/Yelp/detect-secrets
rev: v1.4.0
rev: v1.5.0
hooks:
- id: detect-secrets
args: ['--no-verify']
2 changes: 1 addition & 1 deletion LICENSE
Original file line number Diff line number Diff line change
Expand Up @@ -186,7 +186,7 @@
same "printed page" as the copyright notice for easier
identification within third-party archives.

Copyright (c) Trend Micro, 2022-2023
Copyright (c) Trend Micro, 2022-2024

Licensed under the Apache License, Version 2.0 (the "License");
you may not use this file except in compliance with the License.
Expand Down
82 changes: 80 additions & 2 deletions README.md
Original file line number Diff line number Diff line change
Expand Up @@ -2,11 +2,11 @@
# Trend Vision One for Splunk SOAR

Publisher: Trend Micro
Connector Version: 2.2.1
Connector Version: 2.3.0
Product Vendor: Trend Micro
Product Name: VisionOne
Product Version Supported (regex): ".\*"
Minimum Product Version: 6.1.1
Minimum Product Version: 6.2.2

Trend Vision One is a purpose-built threat defense platform that provides added value and new benefits beyond XDR solutions, allowing you to see more and respond faster. Providing deep and broad extended detection and response (XDR) capabilities that collect and automatically correlate data across multiple security layers—email, endpoints, servers, cloud workloads, and networks—Trend Vision One prevents the majority of attacks with automated protection

Expand Down Expand Up @@ -97,6 +97,7 @@ Configure Trend Vision One on Splunk SOAR
[Collect Forensic File](#action-collect-forensic-file) \- Collect forensic file
[Forensic File Info](#action-forensic-file-info) \- Get the download information for collected forensic file
[Start Analysis](#action-start-analysis) \- Submit file to sandbox for analysis. For supported file types, check [here](https://docs.trendmicro.com/en-us/enterprise/trend-vision-one-olh/threat-intelligence-/sandbox-analysis/sandbox-supported-fi.aspx)
[Vault Sandbox Analysis](#action-vault-sandbox-analysis) \- Submit file from Splunk vault to sandbox for analysis. For supported file types, check [here](https://docs.trendmicro.com/en-us/enterprise/trend-vision-one-olh/threat-intelligence-/sandbox-analysis/sandbox-supported-fi.aspx)
[Add Note](#action-add-note) \- Adds a note to an existing workbench alert
[Update Status](#action-update-status) \- Updates the status of an existing workbench alert
[Get Alert Details](#action-get-alert-details) \- Displays information about the specified alert
Expand Down Expand Up @@ -1428,6 +1429,49 @@ Authentication Information

The app uses HTTPS protocol for communicating with the Trend Vision One server. For authentication a Vision One API Token is used by the Splunk SOAR Connector.

Action: Vault Sandbox Analysis
----------------------

Submit file from vault to sandbox for analysis.

**API key role permissions required: Sandbox Analysis**

* View, filter, and search
* Submit objects

Type: **investigate**
Read only: **False**

| **Argument Name** | **Description** | **Required** |
| --- | --- | --- |
| vault_id | ID of the vault where the file is located | Required |
| file_name | Name of the file to be analyzed | Required |
| document_pass | The password for decrypting the submitted document. The value must be Base64-encoded. The maximum password length is 128 bytes prior to encoding | Optional |
| archive_pass | The password for decrypting the submitted archive. The value must be Base64-encoded. The maximum password length is 128 bytes prior to encoding | Optional |
| arguments | Parameter that allows you to specify Base64-encoded command line arguments to run the submitted file. The maximum argument length before encoding is 1024 bytes. Arguments are only available for Portable Executable (PE) files and script files | Optional |

Example input:

Vault ID
984afc7aaa2718984e15e3b5ab095b519a081321
File Name
some_file.bat
Document Password
cGFzc3dvcmQK
Archive Password
cGFzc3dvcmQK
Arguments
IFMlYztbQA==

#### Context Output


| **Path** | **Type** | **Description** |
| --- | --- | --- |
| action_result.data.*.id | String | Unique alphanumeric string that identifies a submission |
| action_result.data.*.digest | String | object (sandbox-digest) |
| action_result.data.*.arguments | String | Command line arguments encoded in Base64 of the submitted file |

* * *

### Configuration Variables
Expand Down Expand Up @@ -1473,6 +1517,7 @@ VARIABLE | REQUIRED | TYPE | DESCRIPTION
[sandbox investigation package](#action-sandbox-investigation-package) - Downloads the Investigation Package of the specified object
[get suspicious list](#action-get-suspicious-list) - Retrieves information about domains, file SHA-1, file SHA-256, IP addresses, email addresses, or URLs in the Suspicious Object List and displays the information in a paginated list
[get exception list](#action-get-exception-list) - Retrieves information about domains, file SHA-1, file SHA-256, IP addresses, sender addresses, or URLs in the Exception List and displays it in a paginated list
[vault sandbox analysis](#action-vault-sandbox-analysis) - Send vault item to sandbox for analysis

## action: 'test connectivity'
Validate the asset configuration for connectivity using supplied configuration
Expand Down Expand Up @@ -2410,4 +2455,37 @@ action_result.data.\*.value | string | |
action_result.summary | string | |
action_result.message | string | |
summary.total_objects | numeric | |
summary.total_objects_successful | numeric | |

## action: 'vault sandbox analysis'
Send vault item to sandbox for analysis

Type: **investigate**
Read only: **True**

Sends vault item to sandbox for analysis. Provide file name and vault id to perform the action. For the 'arguments' parameter, the maximum argument length before encoding is 1024 bytes. Arguments are only available for Portable Executable (PE) files and script files.

#### Action Parameters
PARAMETER | REQUIRED | DESCRIPTION | TYPE | CONTAINS
--------- | -------- | ----------- | ---- | --------
**vault_id** | required | ID of item in vault | string | `vault id`
**file_name** | required | File name of vault item | string |
**document_pass** | optional | Password for the document | string |
**archive_pass** | optional | Password for the archive | string |
**arguments** | optional | Allows you to specify Base64-encoded command line arguments to run the submitted file | string |

#### Action Output
DATA PATH | TYPE | CONTAINS | EXAMPLE VALUES
--------- | ---- | -------- | --------------
action_result.parameter.vault_id | string | `vault id` |
action_result.parameter.file_name | string | |
action_result.parameter.document_pass | string | |
action_result.parameter.archive_pass | string | |
action_result.parameter.arguments | string | |
action_result.status | string | | success failed
action_result.data.\*.arguments | string | |
action_result.data.\*.digest | string | |
action_result.data.\*.id | string | `task id` |
action_result.message | string | |
summary.total_objects | numeric | |
summary.total_objects_successful | numeric | |
2 changes: 1 addition & 1 deletion __init__.py
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
# File: __init__.py

# Copyright (c) Trend Micro, 2022-2023
# Copyright (c) Trend Micro, 2022-2024

# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
Expand Down
44 changes: 44 additions & 0 deletions manual_readme_content.md
Original file line number Diff line number Diff line change
Expand Up @@ -85,6 +85,7 @@ Configure Trend Vision One on Splunk SOAR
[Collect Forensic File](#action-collect-forensic-file) \- Collect forensic file
[Forensic File Info](#action-forensic-file-info) \- Get the download information for collected forensic file
[Start Analysis](#action-start-analysis) \- Submit file to sandbox for analysis. For supported file types, check [here](https://docs.trendmicro.com/en-us/enterprise/trend-vision-one-olh/threat-intelligence-/sandbox-analysis/sandbox-supported-fi.aspx)
[Vault Sandbox Analysis](#action-vault-sandbox-analysis) \- Submit file from Splunk vault to sandbox for analysis. For supported file types, check [here](https://docs.trendmicro.com/en-us/enterprise/trend-vision-one-olh/threat-intelligence-/sandbox-analysis/sandbox-supported-fi.aspx)
[Add Note](#action-add-note) \- Adds a note to an existing workbench alert
[Update Status](#action-update-status) \- Updates the status of an existing workbench alert
[Get Alert Details](#action-get-alert-details) \- Displays information about the specified alert
Expand Down Expand Up @@ -1416,4 +1417,47 @@ Authentication Information

The app uses HTTPS protocol for communicating with the Trend Vision One server. For authentication a Vision One API Token is used by the Splunk SOAR Connector.

Action: Vault Sandbox Analysis
----------------------

Submit file from vault to sandbox for analysis.

**API key role permissions required: Sandbox Analysis**

* View, filter, and search
* Submit objects

Type: **investigate**
Read only: **False**

| **Argument Name** | **Description** | **Required** |
| --- | --- | --- |
| vault_id | ID of the vault where the file is located | Required |
| file_name | Name of the file to be analyzed | Required |
| document_pass | The password for decrypting the submitted document. The value must be Base64-encoded. The maximum password length is 128 bytes prior to encoding | Optional |
| archive_pass | The password for decrypting the submitted archive. The value must be Base64-encoded. The maximum password length is 128 bytes prior to encoding | Optional |
| arguments | Parameter that allows you to specify Base64-encoded command line arguments to run the submitted file. The maximum argument length before encoding is 1024 bytes. Arguments are only available for Portable Executable (PE) files and script files | Optional |

Example input:

Vault ID
984afc7aaa2718984e15e3b5ab095b519a081321
File Name
some_file.bat
Document Password
cGFzc3dvcmQK
Archive Password
cGFzc3dvcmQK
Arguments
IFMlYztbQA==

#### Context Output


| **Path** | **Type** | **Description** |
| --- | --- | --- |
| action_result.data.*.id | String | Unique alphanumeric string that identifies a submission |
| action_result.data.*.digest | String | object (sandbox-digest) |
| action_result.data.*.arguments | String | Command line arguments encoded in Base64 of the submitted file |

* * *
8 changes: 8 additions & 0 deletions pyproject.toml
Original file line number Diff line number Diff line change
@@ -0,0 +1,8 @@
[tool.black]
line-length = 145
target-version = ['py39']
verbose = true

[tool.isort]
line_length = 145
profile = "black"
1 change: 1 addition & 0 deletions release_notes/2.3.0.md
Original file line number Diff line number Diff line change
@@ -0,0 +1 @@
* Added new action 'vault sandbox analysis' to enable user to submit item from Splunk Vault to XDR portal for analysis.
1 change: 0 additions & 1 deletion requirements.txt
Original file line number Diff line number Diff line change
@@ -1,2 +1 @@
beautifulsoup4==4.11.2
pytmv1==0.6.2
5 changes: 1 addition & 4 deletions tox.ini
Original file line number Diff line number Diff line change
@@ -1,7 +1,4 @@
[flake8]
max-line-length = 145
max-complexity = 28
extend-ignore = F403,E128,E126,E111,E121,E127,E731,E201,E202,F405,E722,D,W292

[isort]
line_length = 145
extend-ignore = F403,E128,E126,E121,E127,E731,E201,E202,E203,E701,F405,E722,D,W503
Loading

0 comments on commit 3d0b544

Please sign in to comment.