Try in Splunk SOAR

Description

Accepts a file_hash, domain, IP address, or URL, and asks Splunk for a list of devices that have interacted with each. It then produces a normalized output and summary table.

  • Type: Investigation
  • Product: Splunk SOAR
  • Apps: Splunk
  • Last Updated: 2023-03-31
  • Author: Lou Stella, Splunk; Kelby Shelton, Splunk
  • ID: 5299b9dc-e8c4-46ba-d942-92ace0ff816d
  • Use-cases:
    • Enrichment

Associated Detections

How To Implement

This input playbook requires the Splunk connector to be configured. It is designed to work in conjunction with the Dynamic Identifier Activity Analysis playbook or other playbooks in the same style.

D3FEND

ID Technique Definition Category
D3-IAA Identifier Activity Analysis Taking known malicious identifiers and determining if they are present in a system. Identifier Analysis

Explore Playbook

explore

Required field

Reference

source | version: 1