Types of Actions
Action helps you execute specific tasks depending on your needs. There are 5 main types of actions in the playbooks:
- Interact with the platform: getters and setters
- Extract data: data collection enrichers
- Connect and use third-party applications
- Set up notifications
- Use helpers to build your own actions
The Actions Library lists all available actions in playbooks with their detailed configuration.
|Get Event Field Common Values||Retrieve the most common values of an ECS field based on the time window|
|List Assets||Retrieve detailed information about assets based on a filter|
|Search Alerts||Retrieve detailed information about alerts (such as the urgency, name of the rule, etc… except events) based on a filter.|
|Get Alert||Retrieve detailed alert information such as the urgency, name of the rule, pattern, etc… except events.|
|Get Events||Retrieve events based on a search. This action is equivalent to a search on the event page and takes into consideration 3 parameters: a query with filters (
Get Events can be used to retrieve events from an alert. Events associated to an alert contain the key
alert_short_ids with the value of the ID of the alert.
|Create an asset||Create an asset|
|Delete an asset||Delete an asset|
|Add attribute to asset||Add attribute to asset|
|Add key to asset||Add key to asset|
|Edit alert||Edit an alert details such as the urgency or the alert category|
|Comment alert||Add a comment to the alert|
|Update alert status||Change the status of an alert|
|Push Events to Intake||Push one or more events to an Intake|
|Attach Alerts to Case||Attach one or more alerts to a case.|
How to update an alert status
To update an alert status, you need to copy the
action_uuid corresponding to the needed action.
|Acknowledge||Acknowledge the alert||
To get notified, you can rely on these tools:
- Mandrill: Send Message
- Mattermost: Post message / Post SEKOIA.IO alert
- Pagerduty: Trigger Alert
- The Hive: Create an alert in the Hive
If you have an account in one of the listed tools below, you can easily extract data from there and import it to SEKOIA.IO. This is made possible with an API key.
|fileutils||Extract data from XML or JSON files|
|http||Request HTTP resources (download file, request URL)|
|STIX||Add source, ass tags, create relationships, cryptolaemus to STIX, CVE to STIX, filter bundle, JSON objects to observables, VirusTotal LiveHunt to observables, MISP to STIX, observables to contextualized indicators, observables to indicators, remove orphan objects, STIX to MISP, string to observables|
These helpers need their associated trigger to function properly:
|MISP||Gather, store, share and correlate threat intelligence. Convert from MISP to STIX, publish MISP event|
|MWDB||Convert a MWDB config to a bundle of observables|
|Triage||Triage raw results to observables|
More actions are available in the Actions Library. To learn how to set up an action, please refer to its documentation.
The dynamic content is written in JINJA. For more information on this language, please follow this documentation.