Siemplify ThreatFuse

Integration version: 14.0

Configure Siemplify ThreatFuse integration in Google Security Operations

For detailed instructions on how to configure an integration inGoogle SecOps, seeConfigureintegrations.

Integration parameters

Use the following parameters to configure the integration:

Parameter Display NameTypeDefault ValueIs MandatoryDescription
Web RootStringhttps://siemplify.threatstream.comYesWeb Root of the Siemplify ThreatFuse instance. This parameter is used for creating report links across integration items.
API RootStringhttps://api.threatstream.comYesAPI Root of the Siemplify ThreatFuse instance.
Email AddressStringN/AYesEmail address of the Siemplify ThreatFuse account.
API KeyPasswordN/AYesAPI key of the Siemplify ThreatFuse account.
Verify SSLCheckboxCheckedYesIf enabled, verifies that the SSL certificate for the connection to the Siemplify ThreatFuse server is valid.
Note: You can make changes at a later stage if needed. Once configured, theInstances can be used in Playbooks. For detailed information on configuring andsupporting multiple instances, seeSupporting multiple instances.

To obtain the API key, complete the following steps:

  1. In your ThreatStream account settings, go to theMy profile tab.

  2. Go to theAccount information section.

  3. Copy theAPI Key value.

Use Cases

Enrich entities.

Actions

Ping

Description

Test connectivity to the Siemplify ThreatFuse with parameters provided at theintegration configuration page in the Google Security Operations Marketplace tab.

Run On

The action idoesn't run on entities, nor has mandatory input parameters.

Action Results

Script Result
Script Result NameValue OptionsExample
is_successTrue/Falseis_success=False
Case Wall
Result TypeValue / DescriptionType
Output message*

The action should not fail nor stop a playbook execution:


If successful: "Successfully connected to the Siemplify ThreatFuse server with the provided connection parameters!"

The action should fail and stop a playbook execution:


If not successful: "Failed to connect to the Siemplify ThreatFuse server! Error is {0}".format(exception.stacktrace)

General

Enrich Entities

Description

Retrieve information about IPs, URLs, hashes, email addresses from SiemplifyThreatFuse. If multiple records are found for the same entity, the action willenrich using the latest record.

Parameters

Parameter Display NameTypeDefault ValueIs MandatoryDescription
Severity ThresholdDDL

Medium

Possible value:

  • Very High
  • High
  • Medium
  • Low
Yes

Specify the severity threshold for the entity, in order to mark it as suspicious.

If multiple records are found for the same entity, the action takes the highest severity out of all available records.

Confidence ThresholdIntegerN/AYes

Specify the confidence threshold for the entity, in order to mark it as suspicious.

Maximum is 100.

If multiple records are found for the entity, the action takes the average.

Active records have priority.

Ignore False Positive StatusCheckboxUncheckedNo

If enabled, the action ignores the false positive status and mark the entity as suspicious based on the "Severity Threshold" and "Confidence Threshold" parameters.

If disabled, the action never labels false positive entities as suspicious, regardless, if they pass the "Severity Threshold" and "Confidence Threshold" conditions or not.

Add Threat Type To CaseCheckboxUncheckedNo

If enabled, the action adds threat types of the entity from all records as tags to the case.

Example: apt

Only Suspicious Entity InsightCheckboxUncheckedYesIf enabled, the action creates insight only for entities that exceeded the "Severity Threshold" and "Confidence Threshold" parameters.
Create InsightCheckboxUncheckedYesIf enabled, the action adds an insight per processed entity.

Run On

This action runs on the following entities:

  • Hash
  • IP Address
  • URL
  • User Name with Email regexes

Action Results

Script Result
Script Result NameValue OptionsExample
is_successTrue/Falseis_success=False
JSON Result
{"objects":[{"status":"inactive","itype":"mal_md5","expiration_ts":"2019-02-25T08:58:58.000Z","ip":null,"is_editable":false,"feed_id":2197,"update_id":3328068779,"longitude":null,"org":"","threat_type":"malware","workgroups":[],"rdns":null,"confidence":60,"uuid":"31d9ed97-9811-4b4b-9e2d-4b3f822eb37f","subtype":"MD5","trusted_circle_ids":[146,254],"id":51744433673,"source":"targetedthreats - OSINT","owner_organization_id":2,"import_session_id":null,"latitude":null,"type":"md5","sort":[1551097291170],"description":null,"tags":[{"id":"fvj","name":"Family=Code4HK"},{"id":"zwz","name":"Report=https://malware.lu/articles/2014/09/29/analysis-of-code4hk.html"}],"threatscore":54,"source_reported_confidence":60,"modified_ts":"2019-02-25T12:21:31.170Z","is_public":false,"asn":"","created_ts":"2018-11-27T09:00:33.468Z","tlp":null,"is_anonymous":false,"country":null,"can_add_public_tags":false,"value":"15e5143e1c843b4836d7b6d5424fb4a5","retina_confidence":-1,"meta":{"detail2":"bifocals_deactivated_on_2019-02-25_09:30:00.127233","severity":"high"},"resource_uri":"/api/v2/intelligence/51744433673/""report_link":"https://siemplify.threatstream.com/detail/url/http:%2F%2Fsweetpineapple.co.za%2Fwp-admin%2Fuser%2Finternetbanking.suncorpbank.htm"},{"status":"active","itype":"apt_md5","expiration_ts":"9999-12-31T00:00:00+00:00","ip":null,"is_editable":false,"feed_id":191,"update_id":5406560,"value":"15e5143e1c843b4836d7b6d5424fb4a5","is_public":true,"threat_type":"apt","workgroups":[],"rdns":null,"confidence":90,"uuid":null,"retina_confidence":-1,"trusted_circle_ids":null,"id":5406560,"source":"SLC Alert Malware Domains","owner_organization_id":736,"import_session_id":null,"latitude":null,"type":"md5","sort":[1421928716491],"description":null,"tags":[{"name":"HITRUST"},{"name":"Public-Threats"}],"threatscore":77,"source_reported_confidence":60,"modified_ts":"2015-01-22T12:11:56.491Z","org":"","asn":"","created_ts":"2015-01-22T12:11:56.491Z","tlp":null,"is_anonymous":null,"country":null,"can_add_public_tags":true,"longitude":null,"subtype":"MD5","meta":{"severity":"high","detail":"Public Threats,HITRUST"},"resource_uri":"/api/v2/intelligence/5406560/"},{"status":"active","itype":"apt_md5","expiration_ts":"9999-12-31T00:00:00+00:00","ip":null,"is_editable":false,"feed_id":0,"update_id":59177,"value":"15e5143e1c843b4836d7b6d5424fb4a5","is_public":true,"threat_type":"apt","workgroups":[],"rdns":null,"confidence":100,"uuid":null,"retina_confidence":-1,"trusted_circle_ids":null,"id":59177,"source":"Analyst","owner_organization_id":2,"import_session_id":2325,"latitude":null,"type":"md5","sort":[1412172414589],"description":null,"tags":[{"name":"apt_md5"},{"name":"CN-APT"},{"name":"IOS-Malware"},{"name":"LadyBoyle"}],"threatscore":85,"source_reported_confidence":0,"modified_ts":"2014-10-01T14:06:54.589Z","org":"","asn":"","created_ts":"2014-10-01T14:06:40.858Z","tlp":null,"is_anonymous":null,"country":null,"can_add_public_tags":false,"longitude":null,"subtype":"MD5","meta":{"detail2":"imported by user 1","severity":"very-high","detail":"LadyBoyle, IOS Malware, CN APT"},"resource_uri":"/api/v2/intelligence/59177/"}],"is_risky":"true""meta":{"total_count":3,"offset":0,"limit":1000,"took":27,"next":null}}
Entity Enrichment
Enrichment Field NameLogic - When to apply
TFuse_idWhen available in JSON
TFuse_statusWhen available in JSON
TFuse_itypeWhen available in JSON
TFuse_expiration_timeWhen available in JSON
TFuse_ipWhen available in JSON
TFuse_feed_idWhen available in JSON
TFuse_confidenceWhen available in JSON
TFuse_uuidWhen available in JSON
TFuse_retina_confidenceWhen available in JSON
TFuse_trusted_circle_idsWhen available in JSON
TFuse_sourceWhen available in JSON
TFuse_latitudeWhen available in JSON
TFuse_typeWhen available in JSON
TFuse_descriptionWhen available in JSON
TFuse_tagsWhen available in JSON
TFuse_threat_scoreWhen available in JSON
TFuse_source_confidenceWhen available in JSON
TFuse_modification_timeWhen available in JSON
TFuse_org_nameWhen available in JSON
TFuse_asnWhen available in JSON
TFuse_creation_timeWhen available in JSON
TFuse_tlpWhen available in JSON
TFuse_countryWhen available in JSON
TFuse_longitudeWhen available in JSON
TFuse_severityWhen available in JSON
TFuse_subtypeWhen available in JSON
TFuse_reportWhen available in JSON
Case Wall
Result TypeValue / DescriptionType
Output message*

The action should not fail nor stop a playbook execution:

If successful and at least one of the provided entities is enriched (is_success=true): "Successfully enriched the following entities using Siemplify ThreatFuse: \n {0}".format(entity.identifier list)

If fail to enrich specific entities (is_success=true): "Action was not able to enrich the following entities using Siemplify ThreatFuse\n: {0}".format([entity.identifier])

If fail to enrich for all entities (is_success=false): "No entities were enriched."

The action should fail and stop a playbook execution:

If a fatal error, like wrong credentials, no connection to the server, other is reported: "Error executing action "Enrich Entities". Reason: {0}''.format(error.Stacktrace)

If the "Confidence Threshold" parameter is not in the 0-100 range: "'Confidence Threshold' value should be in range from 0 to 100."

General
CSV

Table Name: Related Analysis Links: {entity_identifier}

Table Columns:

  • Name: mapped as key in the second response (example Virustotal)
  • Link: mapped as value to the key
General
CSV

Keys based on the enrichment table.

The No Enrichment Prefix, parameter is capitalized.

General

Get Related Hashes

Description

Retrieve entity related hashes based on the associations in SiemplifyThreatFuse.

Parameters

Parameter Display NameTypeDefault ValueIs MandatoryDescription
Confidence ThresholdIntegerN/AYes

Specify the confidence threshold.

Maximum: 100

Search Threat BulletinsCheckboxCheckedNoIf enabled, the action searches among threat bulletins.
Search ActorsCheckboxCheckedNoIf enabled, the action searches among actors.
Search Attack PatternsCheckboxCheckedNoIf enabled, the action searches among attack patterns.
Search CampaignsCheckboxCheckedNoIf enabled, the action searches campaigns.
Search Courses Of ActionCheckboxCheckedNoIf enabled, the action searches among courses of action.
Search IdentitiesCheckboxCheckedNoIf enabled, the action searches among identities.
Search IncidentsCheckboxCheckedNoIf enabled, the action searches among incidents.
Search InfrastructuresCheckboxCheckedNoIf enabled, the action searches among infrastructures.
Search Intrusion SetsCheckboxCheckedNoIf enabled, the action searches among intrusion sets.
Search MalwareCheckboxCheckedNoIf enabled, the action searches among malware.
Search SignaturesCheckboxCheckedNoIf enabled, the action searches among signatures.
Search ToolsCheckboxCheckedNoIf enabled, the action searches among tools.
Search TTPsCheckboxCheckedNoIf enabled, the action searches among TTPs.
Search VulnerabilitiesCheckboxCheckedNoIf enabled, the action searches among vulnerabilities.
Max Hashes To ReturnInteger50NoSpecify the number of hashes to return.

Run On

This action runs on the following entities:

  • Hash
  • IP Address
  • URL
  • User Name with Email regexes
  • Threat Actor
  • CVE

Action Results

Script Result
Script Result NameValue OptionsExample
is_successTrue/Falseis_success=False
JSON Result
{"{}_hashes".format(subtype):["md5hash_1"],"all_hashes":["md5hash_1"]}
Case Wall
Result TypeValue / DescriptionType
Output message*

The action should not fail nor stop a playbook execution:

If successful and at least one hash across entities is found (is_success=true): "Successfully retrieved related hashes from Siemplify ThreatFuse"

If no hashes are found (is_success=false): "No related hashes were found."

The action should fail and stop a playbook execution:

If a fatal error, like wrong credentials, no connection to the server, other is reported: "Error executing action "Get Related Hashes". Reason: {0}''.format(error.Stacktrace)

If the "Confidence Threshold" parameter is not in the 0-100 range: "'Confidence Threshold' value should be in range from 0 to 100."

General

Get Related URLs

Description

Retrieve entity related URLs based on the associations in Siemplify ThreatFuse.

Parameters

Parameter Display NameTypeDefault ValueIs MandatoryDescription
Confidence ThresholdIntegerN/AYes

Specify the confidence threshold.

Maximum: 100

Search Threat BulletinsCheckboxCheckedNoIf enabled, the action searches among threat bulletins.
Search ActorsCheckboxCheckedNoIf enabled, the action searches among actors.
Search Attack PatternsCheckboxCheckedNoIf enabled, the action searches among attack patterns.
Search CampaignsCheckboxCheckedNoIf enabled, the action searches campaigns.
Search Courses Of ActionCheckboxCheckedNoIf enabled, the action searches among courses of action.
Search IdentitiesCheckboxCheckedNoIf enabled, the action searches among identities.
Search IncidentsCheckboxCheckedNoIf enabled, the action searches among incidents.
Search InfrastructuresCheckboxCheckedNoIf enabled, the action searches among infrastructures.
Search Intrusion SetsCheckboxCheckedNoIf enabled, the action searches among intrusion sets.
Search MalwareCheckboxCheckedNoIf enabled, the action searches among malware.
Search SignaturesCheckboxCheckedNoIf enabled, the action searches among signatures.
Search ToolsCheckboxCheckedNoIf enabled, the action searches among tools.
Search TTPsCheckboxCheckedNoIf enabled, the action searches among TTPs.
Search VulnerabilitiesCheckboxCheckedNoIf enabled, the action searches among vulnerabilities.
Max URLs To ReturnInteger50NoSpecify the number of URLs to return.

Run On

This action runs on the following entities:

  • Hash
  • IP Address
  • URL
  • User Name with Email regexes
  • Threat Actor
  • CVE

Action Results

Script Result
Script Result NameValue OptionsExample
is_successTrue/Falseis_success=False
JSON Result
{"urls":["https://www.google.com/url?q=http:/wzFgw"]}
Case Wall
Result TypeValue / DescriptionType
Output message*

The action should not fail nor stop a playbook execution:

If successful and at least one URL across entities is found (is_success=true): "Successfully retrieved related urls from Siemplify ThreatFuse."

If no hashes are found (is_success=false): "No related urls were found."

The action should fail and stop a playbook execution:

If a fatal error, like wrong credentials, no connection to the server, other is reported: "Error executing action "Get Related URLs". Reason: {0}''.format(error.Stacktrace)

If the "Confidence Threshold" parameter is not in the 0-100 range: "'Confidence Threshold' value should be in range from 0 to 100."

General

Get Related Domains

Description

Retrieve entity related domains based on the associations in SiemplifyThreatFuse.

Parameters

Parameter Display NameTypeDefault ValueIs MandatoryDescription
Confidence ThresholdIntegerN/AYes

Specify the confidence threshold.

Maximum: 100

Search Threat BulletinsCheckboxCheckedNoIf enabled, the action searches among threat bulletins.
Search ActorsCheckboxCheckedNoIf enabled, the action searches among actors.
Search Attack PatternsCheckboxCheckedNoIf enabled, the action searches among attack patterns.
Search CampaignsCheckboxCheckedNoIf enabled, the action searches campaigns.
Search Courses Of ActionCheckboxCheckedNoIf enabled, the action searches among courses of action.
Search IdentitiesCheckboxCheckedNoIf enabled, the action searches among identities.
Search IncidentsCheckboxCheckedNoIf enabled, the action searches among incidents.
Search InfrastructuresCheckboxCheckedNoIf enabled, the action searches among infrastructures.
Search Intrusion SetsCheckboxCheckedNoIf enabled, the action searches among intrusion sets.
Search MalwareCheckboxCheckedNoIf enabled, the action searches among malware.
Search SignaturesCheckboxCheckedNoIf enabled, the action searches among signatures.
Search ToolsCheckboxCheckedNoIf enabled, the action searches among tools.
Search TTPsCheckboxCheckedNoIf enabled, the action searches among TTPs.
Search VulnerabilitiesCheckboxCheckedNoIf enabled, the action searches among vulnerabilities.
Max Domains To ReturnInteger50NoSpecify the number of domains to return.

Run On

This action runs on the following entities:

  • Hash
  • IP Address
  • URL
  • User Name with Email regexes
  • Threat Actor
  • CVE

Action Results

Script Result
Script Result NameValue OptionsExample
is_successTrue/Falseis_success=False
JSON Result
{"domains":["www.google.com"]}
Case Wall
Result TypeValue / DescriptionType
Output message*

The action should not fail nor stop a playbook execution:

If successful and at least one hash across entities is found (issuccess=true): "Successfully retrieved related domains from Siemplify ThreatFuse."

If no hashes are found (issuccess=false): "No related domains were found."

The action should fail and stop a playbook execution:

If a fatal error, like wrong credentials, no connection to the server, other is reported: "Error executing action "Get Related Domains". Reason: {0}''.format(error.Stacktrace)

If the "Confidence Threshold" parameter is not in the 0-100 range: "'Confidence Threshold' value should be in range from 0 to 100."

General

Get Related Email Addresses

Description

Retrieve entity related email addresses based on the associations in SiemplifyThreatFuse.

Parameters

Parameter Display NameTypeDefault ValueIs MandatoryDescription
Confidence ThresholdIntegerN/AYes

Specify the confidence threshold.

Maximum: 100

Search Threat BulletinsCheckboxCheckedNoIf enabled, the action searches among threat bulletins.
Search ActorsCheckboxCheckedNoIf enabled, the action searches among actors.
Search Attack PatternsCheckboxCheckedNoIf enabled, the action searches among attack patterns.
Search CampaignsCheckboxCheckedNoIf enabled, the action searches campaigns.
Search Courses Of ActionCheckboxCheckedNoIf enabled, the action searches among courses of action.
Search IdentitiesCheckboxCheckedNoIf enabled, the action searches among identities.
Search IncidentsCheckboxCheckedNoIf enabled, the action searches among incidents.
Search InfrastructuresCheckboxCheckedNoIf enabled, the action searches among infrastructures.
Search Intrusion SetsCheckboxCheckedNoIf enabled, the action searches among intrusion sets.
Search MalwareCheckboxCheckedNoIf enabled, the action searches among malware.
Search SignaturesCheckboxCheckedNoIf enabled, the action searches among signatures.
Search ToolsCheckboxCheckedNoIf enabled, the action searches among tools.
Search TTPsCheckboxCheckedNoIf enabled, the action searches among TTPs.
Search VulnerabilitiesCheckboxCheckedNoIf enabled, the action searches among vulnerabilities.
Max Domains To ReturnInteger50NoSpecify the number of domains to return.

Run On

This action runs on the following entities:

  • Hash
  • IP Address
  • URL
  • User Name with Email regexes
  • Threat Actor
  • CVE

Action Results

Script Result
Script Result NameValue OptionsExample
is_successTrue/Falseis_success=False
JSON Result
{"urls":["https://www.google.com/url?q=http:/wzFgw"]}
Case Wall
Result TypeValue / DescriptionType
Output message*

The action should not fail nor stop a playbook execution:

If successful and at least one hash across entities is found (issuccess=true): "Successfully retrieved related email addresses from Siemplify ThreatFuse."

If no hashes are found (issuccess=false): "No related email addresses were found."

The action should fail and stop a playbook execution:

If a fatal error, like wrong credentials, no connection to the server, other is reported: "Error executing action "Get Related Email Addresses". Reason: {0}''.format(error.Stacktrace)

If the "Confidence Threshold" parameter is not in range 0-100: "'Confidence Threshold' value should be in range from 0 to 100."

General

Get Related IPs

Description

Retrieve entity related IP addresses based on the associations in SiemplifyThreatFuse.

Parameters

Parameter Display NameTypeDefault ValueIs MandatoryDescription
Confidence ThresholdIntegerN/AYes

Specify the confidence threshold.

Maximum: 100

Search Threat BulletinsCheckboxCheckedNoIf enabled, the action searches among threat bulletins.
Search ActorsCheckboxCheckedNoIf enabled, the action searches among actors.
Search Attack PatternsCheckboxCheckedNoIf enabled, the action searches among attack patterns.
Search CampaignsCheckboxCheckedNoIf enabled, the action searches campaigns.
Search Courses Of ActionCheckboxCheckedNoIf enabled, the action search among courses of action.
Search IdentitiesCheckboxCheckedNoIf enabled, the action searches among identities.
Search IncidentsCheckboxCheckedNoIf enabled, the action searches among incidents.
Search InfrastructuresCheckboxCheckedNoIf enabled, the action searches among infrastructures.
Search Intrusion SetsCheckboxCheckedNoIf enabled, the action searches among intrusion sets.
Search MalwareCheckboxCheckedNoIf enabled, the action searches among malware.
Search SignaturesCheckboxCheckedNoIf enabled, the action searches among signatures.
Search ToolsCheckboxCheckedNoIf enabled, the action searches among tools.
Search TTPsCheckboxCheckedNoIf enabled, the action searches among TTPs.
Search VulnerabilitiesCheckboxCheckedNoIf enabled, the action searches among vulnerabilities.
Max Domains To ReturnInteger50NoSpecify the number of domains to return.

Run On

This action runs on the following entities:

  • Hash
  • IP Address
  • URL
  • User Name with Email regexes
  • Threat Actor
  • CVE

Action Results

Script Result
Script Result NameValue OptionsExample
is_successTrue/Falseis_success=False
JSON Result
{"urls":["https://www.google.com/url?q=http:/wzFgw"]}
Case Wall
Result TypeValue / DescriptionType
Output message\*

The action should not fail nor stop a playbook execution:

If successful and at least one hash across entities is found (is_success=true): "Successfully retrieved related IPs from Siemplify ThreatFuse."

If no hashes are found (is_success=false): "No related IPs were found."

The action should fail and stop a playbook execution:

If a fatal error, like wrong credentials, no connection to the server, other is reported: "Error executing action "Get Related IPs". Reason: {0}''.format(error.Stacktrace)

If the "Confidence Threshold" parameter is not in the 0-100 range: "'Confidence Threshold' value should be in range from 0 to 100."

General

Get Related Associations

Description

Retrieve entity related associations from Siemplify ThreatFuse.

Note: Make sure that the email address doesn't contain spaces.

Parameters

Parameter Display NameTypeDefault ValueIs MandatoryDescription
Return CampaignsCheckboxCheckedNoIf enabled, the action fetches related campaigns and details about them.
Return Threat BulletinsCheckboxUncheckedNoIf enabled, the action fetches related threat bulletins and details about them.
Return ActorsCheckboxUncheckedNoIf enabled, the action fetches related actors and details about them.
Return Attack PatternsCheckboxUncheckedNoIf enabled, the action fetches related attack patterns and details about them.
Return Courses Of ActionCheckboxUncheckedNoIf enabled, the action fetches related courses of action and details about them.
Return IdentitiesCheckboxUncheckedNoIf enabled, the action fetches related identities and details about them.
Return IncidentsCheckboxUncheckedNoIf enabled, the action fetches related incidents and details about them.
Return InfrastructureCheckboxUncheckedNoIf enabled, the action fetches related infrastructure and details about them.
Return Intrusion SetsCheckboxUncheckedNoIf enabled, the action fetches related intrusion sets and details about them.
Return MalwareCheckboxUncheckedNoIf enabled, the action fetches related malware and details about them.
Return SignaturesCheckboxUncheckedNoIf enabled, the action fetches related signatures and details about them.
Return ToolsCheckboxUncheckedNoIf enabled, the action fetches related tools and details about them.
Return TTPsCheckboxUncheckedNoIf enabled, the action fetches related TTPs and details about them.
Return VulnerabilitiesCheckboxCheckedNoIf enabled, the action fetches related vulnerabilities and details about them.
Create Campaign EntityCheckboxUncheckedNoIf enabled, the action creates an entity out of available "Campaign" associations.
Create Actors EntityCheckboxUncheckedNoIf enabled, the action creates an entity out of available "Actor" associations.
Create Signature EntityCheckboxUncheckedNoIf enabled, the action creates an entity out of available "Signature" associations.
Create Vulnerability EntityCheckboxUncheckedNoIf enabled, the action creates an entity out of available "Vulnerability" associations.
Create InsightCheckboxCheckedNoIf enabled, the action creates an insight based on the results.
Create Case TagCheckboxCheckedNoIf enabled, the action creates case tags based on the results.
Max Associations To ReturnIntegerN/ANoSpecify the number of associations to return per type.
Max Statistics To ReturnInteger3No

Specify the number of top statistics results regarding IOCs to return.

Note: The action processes the maximum of 1000 IOCs related to the association. If you provide "0", the action does not try to fetch statistics information.

Run On

This action runs on the following entities:

  • Hash
  • IP Address
  • URL
  • User Name with Email regexes

Action Results

Script result
Script Result NameValue OptionsExample
is_successTrue/Falseis_success=False
JSON Result
{"campaign":[{"name":"Coronavirus","id":1},{"name":"Bad campaign","id":2}],"actor":[{"name":"Actor 1","id":1},{"name":"Actor 2","id":2}],"attackpattern":[{"name":"Pattern 1","id":1},{"name":"Pattern 2","id":2}],"courseofaction":[{"name":"Course of Action 1","id":1},{"name":"Course Of Action 2","id":2}],"identity":[{"name":"Identity 1","id":1},{"name":"Identity 2","id":2}],"incident":[{"name":"Incident 1","id":1},{"name":"Incident 2","id":2}],"infrastructure":[{"name":"Infrustructure 1","id":1},{"name":"Infrustructure 2","id":2}],"intrusionset":[{"name":"Intrusion set 1","id":1},{"name":"Intrusion set 2","id":2}],"malware":[{"name":"Malware 1","id":1},{"name":"Malware 2","id":2}],"signature":[{"name":"Signature 1","id":1},{"name":"Signature 2","id":2}],"tool":[{"name":"Tool 1","id":1},{"name":"Tool 2","id":2}],"ttp":[{"name":"TTP 1","id":1},{"name":"TTP 2","id":2}],"vulnerability":[{"name":"Vulnerability 1","id":1},{"name":"Vulnerability 2","id":2}],}
Case Wall
Result TypeValue / DescriptionType
Output message*

The action should not fail nor stop a playbook execution:

If successful and at least one association across entities is found (is_success=true): "Successfully retrieved related associations from Siemplify ThreatFuse"

If no associations are found (is_success=false): "No related associations were found."

Async Message: Waiting for all of the association details to be retrieved"

The action should fail and stop a playbook execution:

If a fatal error, like wrong credentials, no connection to the server, other is reported: "Error executing action "Get Related Association". Reason: {0}''.format(error.Stacktrace)

General
CSV

Name: "Related Associations"

Columns:

  • ID
  • Name
  • Type (association name)
  • Status (mapped as status/display_name)
General

Submit Observables

Description

Submit an observable to Siemplify ThreatFuse based on the IP, URL, Hash, Emailentities.

Note: This action requires "Org admin", "Create Anomali Community Intel" and"Approve Intel" permissions.

Where to find trusted circle IDs

To find the ID of a trusted circle, locate the trusted circle on SiemplifyThreatFuse, and click on its name. The URL displayed in the address bar showsthe ID.

For example: https://siemplify.threatstream.com/search?trustedcircles=13.

Parameters

Parameter Display NameTypeDefault ValueIs MandatoryDescription
ClassificationDDL

Private

Possible Values:

  • Public
  • Private
YesSpecify the classification of the observable.
Threat TypeDDL

APT

Possible Values

  • APT
  • Adware
  • Anomalous
  • Anomyzation
  • Bot
  • Brute
  • C2
  • Compromised
  • Crypto
  • Data Leakage
  • DDOS
  • Dynamic DNS
  • Exfil
  • Exploit
  • Fraud
  • Hacking Tool
  • I2P
  • Informational
  • Malware
  • P2
  • Parked
  • Phish
  • Scan
  • Sinkhole
  • Social
  • Spam
  • Suppress
  • Suspicious
  • TOR
  • VPS
YesSpecify the threat type for the observables.
SourceStringSiemplifyNoSpecify the intelligence source for the observable.
Expiration DateIntegerN/ANo

Specify the expiration date in days for the observable.

If nothing is specified here, the action creates an observable that never expires.

Trusted Circle IDsCSVN/ANo

Specify a comma-separated list of trusted circle IDs.

Observables are shared with those trusted circles.

TLPDDL

Select One

Possible Values:

  • Select One
  • Red
  • Green
  • Amber
  • White
NoSpecify the TLP for your observables.
ConfidenceIntegerN/ANo

Specify what should be the confidence for the observable.

Note: This parameter only works, if you create observables in your organization and the "Override System Confidence" parameter is enabled.

Override System ConfidenceCheckboxUncheckedNo

If enabled, created observables has the confidence specified in the "Confidence" parameter.

Note: You can't share observables in trusted circles and publicly, when this parameter is enabled.

Anonymous SubmissionCheckboxUncheckedNoIf enabled, the action makes an anonymous submission.
TagsCSVN/ANoSpecify a comma-separated list of tags that you want to add to observable.

Run On

This action runs on the following entities:

  • Hash
  • IP Address
  • URL
  • User Name with Email regexes

Action Results

Script Result
Script Result NameValue OptionsExample
is_successTrue/Falseis_success=False
JSON Result
approved_jobs=[{"id":123123,"entity":{entity.identifier}}]jobs_with_excluded_entities=[{"id":123123,"entity":{entity.identifier}}]
Case Wall
Result TypeValue / DescriptionType
Output message*

The action should not fail nor stop a playbook execution:

If successful and at least one hash across entities is found (is_success=true): "Successfully submitted and approved the following entities in Siemplify ThreatFuse:\n{0}".format(entity.identifier list)

If fail for some entities (rejected entities) (is_success=true): "Action was not able to successfully submit and approve the following entities in Siemplify ThreatFuse\n: {0}".format([entity.identifier])

If fail to enrich for all entities (is_success=false): "No entities were successfully submitted to Siemplify ThreatFuse."

The action should fail and stop a playbook execution:

If a fatal error, like wrong credentials, no connection to the server, other is reported: "Error executing action "Submit Observable". Reason: {0}''.format(error.Stacktrace)

If the 400 status code is reported: "Error executing action "Submit Observable". Reason: {0}''.format(message)

General

Report As False Positive

Description

Report entities in Siemplify ThreatFuse as false positive.

Parameters

Parameter Display NameTypeDefault ValueIs MandatoryDescription
ReasonStringN/AYesSpecify the reason why you want to mark entities as false positive.
CommentStringN/AYesSpecify additional information related to your decision regarding marking the entity as false positive.

Run On

This action runs on the following entities:

  • Hash
  • IP Address
  • URL
  • User Name with Email regexes

Action Results

Script Result
Script Result NameValue Options
is_successis_success=False
is_successis_success=True
Case Wall
Result TypeValue / DescriptionType
Output message*

The action should not fail nor stop a playbook execution:

If successful and at least one hash across entities is found (is_success=true): "Successfully reported the following entities as false positive in Siemplify ThreatFuse:\n{0}".format(entity.identifier list)

If fail to mark specific entities (is_success=true): "Action was not able to report the following entities as false positive in Siemplify ThreatFuse\n: {0}".format([entity.identifier])

If fail to enrich for all entities (issuccess=false): "No entities were reported as false positive."

The action should fail and stop a playbook execution:

If a fatal error, like wrong credentials, no connection to the server, other is reported: "Error executing action "Report As False Positive". Reason: {0}''.format(error.Stacktrace)

General

Connector

Configure Siemplify ThreatFuse - Observables Connector

For detailed instructions on how to configure a connector inGoogle SecOps, seeConfiguring theconnector.

Siemplify ThreatFuse - Observables Connector

Pull observables from Siemplify ThreatFuse.

Note: Source names are used in the whitelist.

Recommendations

When configuring connector, it is recommended to use a separate environment, sothat the analysts won't be flooded with all of the speculative alerts.

Where to find trusted circle IDs

To find the ID of a trusted circle, locate the trusted circle on SiemplifyThreatFuse, and click its name. The URL displayed in the address bar showsthe ID.

For example:https://siemplify.threatstream.com/search?trustedcircles=13.

Connector parameters

Use the following parameters to configure the connector:

Parameter Display NameTypeDefault ValueIs MandatoryDescription
Product Field NameStringProduct NameYesEnter the source field name in order to retrieve the Product Field name.
Event Field NameStringtypeYesEnter the source field name in order to retrieve the Event Field name.
Environment Field NameString""No

Describes the name of the field where the environment name is stored.

If the environment field isn't found, the environment is the default environment.

Environment Regex Pattern

String.*No

A regex pattern to run on the value found in the "Environment Field Name" field.

Default is .* to catch all and return the value unchanged.

Used to allow the user to manipulate the environment field via regex logic.

If the regex pattern is null or empty, or the environment value is null, the final environment result is the default environment.

Script Timeout (Seconds)Integer300YesTimeout limit for the python process running the current script.
API RootString

https://api.threat
stream.com

YesAPI root of the Siemplify ThreatFuse instance.
Email AddressStringN/AYesEmail address of the Siemplify ThreatFuse account.
API KeyPasswordN/AYesAPI Key of the Siemplify ThreatFuse account.
Lowest Severity To FetchStringHighYes

Lowest severity that will be used to fetch observables.

Possible values:
Low

Medium

High

Very-High

Lowest Confidence To FetchInteger50Yes

Lowest confidence that will be used to fetch observables. Maximum is 100.

Source Feed FilterCSVN/ANoComma-separated list of feed ids that should be used to ingest observables. Example: 515,4129
Observable Type FilterCSVurl, domain, email, hash, ip, ipv6No

Comma-separated list of observable types that should be ingested. Example: url, domain

Possible values: url, domain, email, hash, ip, ipv6

Observable Status FilterCSVactiveNo

Comma-separated list of observable status that should be used to ingest new data. Example: active,inactive

Possible values: active,inactive,falsepos

Threat Type FilterCSVN/ANo

Comma-separated list of threat types that should be used to ingest observables. Example: аdware,anomalous,anonymization,apt

Possible values:
аdware,anomalous,anonymization,
apt,bot,brute,c2,compromised,
crypto,data_leakage,ddos,dyn_dns,exfil,
exploit,fraud,hack_tool,i2p,informational,
malware,p2p,parked,phish,scan,sinkhole,spam,
suppress,suspicious,tor,vps

Trusted Circle FilterCSVN/ANo

Comma-separated list of trusted circle ids that should be used to ingest observables.

Example: 146,147

Tag Name FilterCSVN/ANoComma-separated list of tag names associated with observables that should be used with ingestion. Example: Microsoft Credentials, Phishing.
Source Feed GroupingCheckboxUncheckedNoIf enabled, the connector will group observables from the same source under the same Siemplify Alert.
Fetch Max Days BackwardsInteger1NoAmount of days from where to fetch observables.
Max Observables Per AlertInteger100NoHow many observables should be a part of one Siemplify Alert. Maximum is 200.
Use whitelist as a blacklistCheckboxUncheckedYesIf enabled, dynamic list will be used as a blocklist.
Verify SSLCheckboxUncheckedYesIf enabled, verify the SSL certificate for the connection to the Siemplify Threatfuse server is valid.
Proxy Server AddressStringN/ANoThe address of the proxy server to use.
Proxy UsernameStringN/ANoThe proxy username to authenticate with.
Proxy PasswordPasswordN/ANoThe proxy password to authenticate with.

Connector rules

Proxy support

The connector supports proxy.

Need more help?Get answers from Community members and Google SecOps professionals.

Except as otherwise noted, the content of this page is licensed under theCreative Commons Attribution 4.0 License, and code samples are licensed under theApache 2.0 License. For details, see theGoogle Developers Site Policies. Java is a registered trademark of Oracle and/or its affiliates.

Last updated 2026-02-19 UTC.