Domain Enrichment - DomainTools Iris Investigate

Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊

Back to Content Index


Given a domain or set of domains associated with an incident return all Iris Investigate data for those domains as comments in the incident.

Attribute Value
Type Playbook
Solution DomainTools
Source View on GitHub

Additional Documentation

📄 Source: DomainTools-Iris-Investigate-Playbook/readme.md

DomainTools

DomainTools Iris Investigate Domain Playbook

Table of Contents

  1. Overview
  2. Deploy DomainTools-Iris-Investigate-Playbook
  3. Authentication
  4. Prerequisites
  5. Deployment
  6. Post Deployment Steps

Overview

This playbook uses the DomainTools Iris Investigate API. Given a domain or set of domains associated with an incident, return Whois, mailserver, DNS, SSL and related indicators from Iris Investigate, highlighting fields where fewer than 200 domains share an attribute. This is useful in order to clue investigators where there could be additional indicators of interest available via the Iris Investigate UI or API.

Visit https://www.domaintools.com/integrations to request a Api key.

When a new Azure Sentinel Incident is created, and this playbook is triggered, it performs these actions:

Incident Comments

Deploy to Azure Deploy to Azure

Authentication

Authentication methods this connector supports: - API Key authentication

Prerequisites

Deployment instructions

Post-Deployment instructions

a. Playbook parameters:

Once deployment is complete, you can change the playbook parameters to get the desired results as explained below. - Open the Logic App in the edit mode. click on parameters pivots - If "Fetch_Guided_Pivots_Results" is set to True, It will get the following details for each entity: - Reverse Email Domain - Reverese IP - Pivot MX Host - Pivot by MX IP - Pivot by Nameserver IP Address - Pivot Nameserver Host - Pivot by Registrant Name - Pivot by Registrant Org - Reverse Email - Pivot SSL Email - Pivot by SSL Hash pivots - If you provide tags in the "Find_Domains_With_Malicious_tags" paramter, if a specified set of tags is observed, the playbook will mark the incident as “severe” in Sentinel and add a comment. tags - If "Fetch_Domain Tools_DNSDB_Results" is set to True, It will get the DNSDB Rdata details for each entity: rdata - Save the Logic App.

[Content truncated...]


Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊

Back to Playbooks · Back to DomainTools