If you are not a Demisto customer already, download and install Demisto Community Edition according to Demisto instructions.
Go to Settings->Integrations->Servers & Services and search for Uptycs.
Create an instance of your integration and enter in the appropriate Uptycs API information obtained from your uptycs.io account.
Check the Fetches incidents box.
Click the Test button to verify success.
Click the Done button
You can execute these commands from the Demisto CLI, as part of an automation, or in a playbook. After you successfully execute a command, a DBot message appears in the War Room with the command details.
- uptycs-get-assets
- uptycs-run-query
- uptycs-get-alerts
- uptycs-get-alert-rules
- uptycs-get-event-rules
- uptycs-get-events
- uptycs-get-process-open-sockets
- uptycs-get-process-information
- uptycs-get-process-child-processes
- uptycs-get-processes
- uptycs-get-process-open-files
- uptycs-set-alert-status
- uptycs-set-asset-tag
- uptycs-get-user-information
- uptycs-get-threat-indicators
- uptycs-get-threat-sources
- uptycs-get-threat-vendors
- uptycs-get-parent-information
- uptycs-post-threat-source
- uptycs-get-users
- uptycs-get-asset-groups
- uptycs-get-user-asset-groups
- uptycs-get-threat-indicator
- uptycs-get-threat-source
return assets enrolled with Uptycs
uptycs-get-assets
Argument Name | Description | Required |
---|---|---|
limit | Limit the number of entries returned. | Optional |
os | Only return assets with this type of operating system. | Optional |
host_name_is | Only return assets with this hostname. This argument should be in double quotes. Do not use arguments "host_name_is" and "host_name_like" at the same time. | Optional |
host_name_like | Only return assets with this string in the hostname. This argument should be in double quotes. Use this to find a selection of assets with similar hostnames. Do not use arguments "host_name_is" and "host_name_like" at the same time. | Optional |
asset_group_id | Only return assets which are a member of this asset group | Optional |
Path | Type | Description |
---|---|---|
Uptycs.Assets.id | string | Uptycs asset id |
Uptycs.Assets.createdAt | date | Time asset was enrolled with Uptycs |
Uptycs.Assets.hostName | string | Hostname in Uptycs DB |
Uptycs.Assets.os | string | os installed on asset (Windows, Linux, Mac OS X) |
Uptycs.Assets.osVersion | string | os version |
Uptycs.Assets.lastActivityAt | date | Last activity |
Uptycs.Assets.deletedAt | date | Time asset was unenrolled from Uptycs |
Uptycs.Assets.osqueryVersion | string | Current version of osquery installed on the asset |
uptycs-get-assets os="Mac OS X/Apple OS X/macOS" limit=1
{
"Uptycs.Assets": [
{
"status": "active",
"last_enrolled_at": "2019-03-06 15:22:05.769",
"os_version": "10.14",
"osquery_version": "3.2.6.43-Uptycs",
"created_at": "2018-09-25 16:38:16.440",
"longitude": -97.822,
"os_flavor": "darwin",
"host_name": "kyle-mbp-work",
"latitude": 37.751,
"last_activity_at": "2019-03-06 15:42:10.193",
"os": "Mac OS X",
"id": "984d4a7a-9f3a-580a-a3ef-2841a561669b",
"location": "United States"
}
]
}
id | host_name | os | os_version | osquery_version | last_activity_at |
---|---|---|---|---|---|
984d4a7a-9f3a-580a-a3ef-2841a561669b | kyle-mbp-work | Mac OS X | 10.14 | 3.2.6.43-Uptycs | 2019-03-06 15:42:10.193 |
enter a SQL query to run against the Uptycs database or on your endpoints in real-time. A list of tables can be found at osquery.io/schema, or by using the query "select * from information_schema.tables"
uptycs-run-query
Argument Name | Description | Required |
---|---|---|
query | This is the query that will be run. Queries should be written for a SQLite database. For example, "SELECT * FROM processes" returns the entire table named "processes". This argument should be in double quotes. | Required |
query_type | The query can be run globally (returns results for entire history stored in Uptycs DB) or real-time (returns results for queries run on endpoints at the time of query execution) | Required |
limit | Limit the number of entries returned. | Optional |
Path | Type | Description |
---|---|---|
Uptycs.QueryResults | unknown | Results of executed query |
uptycs-run-query query="SELECT * FROM process_open_sockets LIMIT 10" query_type=realtime host_name_like="uptycs-osquery-"
{
"Uptycs.QueryResults": [
{
"protocol": "6",
"socket": "59764565",
"family": "2",
"local_port": "59752",
"remote_port": "443",
"pid": "9",
"remote_address": "18.213.163.112",
"upt_asset_id": "a4991bf9-13e3-026b-7b46-af192746d556",
"state": "ESTABLISHED",
"fd": "14",
"path": "",
"local_address": "10.8.0.28",
"net_namespace": "4026532943"
},
{
"protocol": "6",
"socket": "59723589",
"family": "2",
"local_port": "55386",
"remote_port": "443",
"pid": "9",
"remote_address": "18.213.163.112",
"upt_asset_id": "a4991bf9-13e3-026b-7b46-af192746d556",
"state": "ESTABLISHED",
"fd": "37",
"path": "",
"local_address": "10.8.0.28",
"net_namespace": "4026532943"
},
{
"protocol": "6",
"socket": "59735105",
"family": "2",
"local_port": "56532",
"remote_port": "443",
"pid": "9",
"remote_address": "18.213.163.112",
"upt_asset_id": "a4991bf9-13e3-026b-7b46-af192746d556",
"state": "ESTABLISHED",
"fd": "36",
"path": "",
"local_address": "10.8.0.28",
"net_namespace": "4026532943"
},
{
"protocol": "0",
"socket": "13674642",
"family": "1",
"local_port": "0",
"remote_port": "0",
"pid": "9",
"remote_address": "",
"upt_asset_id": "a4991bf9-13e3-026b-7b46-af192746d556",
"state": "",
"fd": "11",
"path": "/var/osquery/osquery.em",
"local_address": "",
"net_namespace": "4026532943"
},
{
"protocol": "0",
"socket": "13674637",
"family": "1",
"local_port": "0",
"remote_port": "0",
"pid": "9",
"remote_address": "",
"upt_asset_id": "a4991bf9-13e3-026b-7b46-af192746d556",
"state": "",
"fd": "10",
"path": "",
"local_address": "",
"net_namespace": "4026532943"
},
{
"protocol": "0",
"socket": "13674636",
"family": "1",
"local_port": "0",
"remote_port": "0",
"pid": "9",
"remote_address": "",
"upt_asset_id": "a4991bf9-13e3-026b-7b46-af192746d556",
"state": "",
"fd": "9",
"path": "",
"local_address": "",
"net_namespace": "4026532943"
},
{
"protocol": "0",
"socket": "13674635",
"family": "1",
"local_port": "0",
"remote_port": "0",
"pid": "9",
"remote_address": "",
"upt_asset_id": "a4991bf9-13e3-026b-7b46-af192746d556",
"state": "",
"fd": "8",
"path": "",
"local_address": "",
"net_namespace": "4026532943"
},
{
"protocol": "0",
"socket": "13674634",
"family": "1",
"local_port": "0",
"remote_port": "0",
"pid": "9",
"remote_address": "",
"upt_asset_id": "a4991bf9-13e3-026b-7b46-af192746d556",
"state": "",
"fd": "7",
"path": "",
"local_address": "",
"net_namespace": "4026532943"
},
{
"protocol": "0",
"socket": "13674590",
"family": "1",
"local_port": "0",
"remote_port": "0",
"pid": "6",
"remote_address": "",
"upt_asset_id": "a4991bf9-13e3-026b-7b46-af192746d556",
"state": "",
"fd": "3",
"path": "",
"local_address": "",
"net_namespace": "4026532943"
}
]
}
protocol | socket | family | local_port | remote_port | pid | remote_address | upt_asset_id | state | fd | path | local_address | net_namespace |
---|---|---|---|---|---|---|---|---|---|---|---|---|
6 | 59764565 | 2 | 59752 | 443 | 9 | 18.213.163.112 | a4991bf9-13e3-026b-7b46-af192746d556 | ESTABLISHED | 14 | 10.8.0.28 | 4026532943 | |
6 | 59723589 | 2 | 55386 | 443 | 9 | 18.213.163.112 | a4991bf9-13e3-026b-7b46-af192746d556 | ESTABLISHED | 37 | 10.8.0.28 | 4026532943 | |
6 | 59735105 | 2 | 56532 | 443 | 9 | 18.213.163.112 | a4991bf9-13e3-026b-7b46-af192746d556 | ESTABLISHED | 36 | 10.8.0.28 | 4026532943 | |
0 | 13674642 | 1 | 0 | 0 | 9 | a4991bf9-13e3-026b-7b46-af192746d556 | 11 | /var/osquery/osquery.em | 4026532943 | |||
0 | 13674637 | 1 | 0 | 0 | 9 | a4991bf9-13e3-026b-7b46-af192746d556 | 10 | 4026532943 | ||||
0 | 13674636 | 1 | 0 | 0 | 9 | a4991bf9-13e3-026b-7b46-af192746d556 | 9 | 4026532943 | ||||
0 | 13674635 | 1 | 0 | 0 | 9 | a4991bf9-13e3-026b-7b46-af192746d556 | 8 | 4026532943 | ||||
0 | 13674634 | 1 | 0 | 0 | 9 | a4991bf9-13e3-026b-7b46-af192746d556 | 7 | 4026532943 | ||||
0 | 13674590 | 1 | 0 | 0 | 6 | a4991bf9-13e3-026b-7b46-af192746d556 | 3 | 4026532943 |
return alerts from Uptycs DB
uptycs-get-alerts
Argument Name | Description | Required |
---|---|---|
limit | Limit the number of entries returned. | Required |
host_name_is | Only return assets with this hostname. This argument should be in double quotes. Do not use arguments "host_name_is" and "host_name_like" at the same time. | Optional |
host_name_like | Only return assets with this string in the hostname. This argument should be in double quotes. Use this to find a selection of assets with similar hostnames. Do not use arguments "host_name_is" and "host_name_like" at the same time. | Optional |
code | Alert code to specify which types of alerts you would like to retrieve | Optional |
time_ago | Specifies how far back you want to look. Format examples: 2 hours, 4 minutes, 6 month, 1 day, etc. | Optional |
start_window | Beginning of window to search for open connections. Format is "YYYY-MM-DD HH:MM:SS.000", for example, March 15, 2019 at 1:52:36 am would be written as "2019-03-15 01:52:36.000". This argument should be in double quotes. | Optional |
end_window | End of window to search for open connections. Format is "YYYY-MM-DD HH:MM:SS.000", for example, March 15, 2019 at 1:52:36 am would be written as "2019-03-15 01:52:36.000". This argument should be in double quotes. | Optional |
id | Unique Uptycs alert id which will retrieve a specific alert. Use this argument without any other arguments. | Optional |
Path | Type | Description |
---|---|---|
Uptycs.Alerts.description | string | Description of alert |
Uptycs.Alerts.upt_asset_id | string | Uptycs asset ID |
Uptycs.Alerts.code | string | Alert code in Uptycs DB |
Uptycs.Alerts.severity | string | Severity |
Uptycs.Alerts.alert_time | date | Time alert was created at |
Uptycs.Alerts.value | string | Specific problem which caused an alert. It may be an IP address, a program that crashed, a file with a file hash known to be malware, etc. |
Uptycs.Alerts.host_name | string | Hostname for the asset which fired the alert |
Uptycs.Alerts.id | string | unique Uptycs id for a particular alert |
Uptycs.Alerts.threat_indicator_id | string | unique Uptycs id that identifies the threat indicator which triggered this alert |
Uptycs.Alerts.threat_source_name | string | name of the source of the threat indicator that triggered this alert |
Uptycs.Alerts.pid | unknown | pid of the process which was responsible for firing the alert |
uptycs-get-alerts limit=1
{
"Uptycs.Alerts": [
{
"status": "open",
"description": "Outbound Network Connection to threat intel IOC",
"threat_source_name": "No threat source for this alert",
"severity": "high",
"created_at": "2019-03-05 20:08:02.467",
"pid": "Not applicable or unknown",
"updated_at": "2019-03-05 20:08:04.966",
"value": "54.165.17.209",
"upt_asset_id": "984d4a7a-9f3a-580a-a3ef-2841a561669b",
"threat_indicator_id": "No threat indicator for this alert",
"alert_time": "2019-03-05 20:07:53.000",
"host_name": "kyle-mbp-work",
"assigned_to": null,
"metadata": "{\"local_address\":\"0.0.0.0\",\"local_port\":20480,\"login_name\":\"kyleschmoll\",\"family\":2,\"remote_address\":\"54.165.17.209\"}",
"id": "ce5d1255-df14-4c77-a04b-82a87c74b3df",
"grouping": "Compliance"
}
]
}
upt_asset_id | host_name | grouping | alert_time | description | value | severity | threat_indicator_id | threat_source_name |
---|---|---|---|---|---|---|---|---|
984d4a7a-9f3a-580a-a3ef-2841a561669b | kyle-mbp-work | Compliance | 2019-03-05 20:07:53.000 | Outbound Network Connection to threat intel IOC | 54.165.17.209 | high | No threat indicator for this alert | No threat source for this alert |
retrieve a list of alert rules
uptycs-get-alert-rules
There are no input arguments for this command.
There is no context output for this command.
uptycs-get-alert-rules limit=1
name | description | grouping | enabled | updatedAt | code |
---|---|---|---|---|---|
Bad Domain Alert | Bad Domain Alert | Critical file | true | 2019-02-22T21:04:30.872Z | BAD_DOMAIN |
retrieve a list of event rules
uptycs-get-event-rules
There are no input arguments for this command.
There is no context output for this command.
uptycs-get-event-rules limit=1
name | description | grouping | enabled | updatedAt | code |
---|---|---|---|---|---|
Bad domains | Creates events when a bad domain is resolved | default | true | 2019-02-21T17:20:59.825Z | BAD_DOMAIN |
return events from Uptycs DB
uptycs-get-events
Argument Name | Description | Required |
---|---|---|
limit | Limit the number of entries returned. | Required |
host_name_is | Only return assets with this hostname. This argument should be in double quotes. Do not use arguments "host_name_is" and "host_name_like" at the same time. | Optional |
host_name_like | Only return assets with this string in the hostname. This argument should be in double quotes. Use this to find a selection of assets with similar hostnames. Do not use arguments "host_name_is" and "host_name_like" at the same time. | Optional |
code | Event code to specify which types of events you would like to retrieve | Optional |
time_ago | Specifies how far back you want to look. Format examples: 2 hours, 4 minutes, 6 month, 1 day, etc. | Optional |
start_window | Beginning of window to search for open connections. Format is "YYYY-MM-DD HH:MM:SS.000", for example, March 15, 2019 at 1:52:36 am would be written as "2019-03-15 01:52:36.000". This argument should be in double quotes. | Optional |
end_window | End of window to search for open connections. Format is "YYYY-MM-DD HH:MM:SS.000", for example, March 15, 2019 at 1:52:36 am would be written as "2019-03-15 01:52:36.000". This argument should be in double quotes. | Optional |
Path | Type | Description |
---|---|---|
Uptycs.Events.description | string | Description of event |
Uptycs.Events.assetId | string | Uptycs asset ID |
Uptycs.Events.code | string | Event code in Uptycs DB |
Uptycs.Events.createdAt | date | Time event was created at |
uptycs-get-events limit=10 time_ago="30 days"
{
"Uptycs.Events": [
{
"description": "Bad IP address",
"event_time": "2019-03-05 20:09:31.000",
"severity": "high",
"created_at": "2019-03-05 20:09:33.000",
"value": "87.147.254.215",
"host_name": "kyle-mbp-work",
"metadata": "{\"time\":1551816569,\"path\":\"\",\"pid\":1625}",
"id": "cf12af70-2a30-4754-af7b-12251aeb83f6",
"grouping": "Bad IP access"
},
{
"description": "Bad IP address",
"event_time": "2019-03-05 20:09:31.000",
"severity": "high",
"created_at": "2019-03-05 20:09:33.000",
"value": "87.147.254.215",
"host_name": "kyle-mbp-work",
"metadata": "{\"time\":1551816569,\"path\":\"\",\"pid\":1625}",
"id": "d0c9b280-f38e-4f7f-a52a-bfdf0c4578ce",
"grouping": "Bad IP access"
},
{
"description": "Bad IP address",
"event_time": "2019-03-05 20:08:34.000",
"severity": "high",
"created_at": "2019-03-05 20:08:36.000",
"value": "87.147.254.215",
"host_name": "kyle-mbp-work",
"metadata": "{\"time\":1551816510,\"path\":\"\",\"pid\":1625}",
"id": "82f18097-5d46-454c-8449-6868409af639",
"grouping": "Bad IP access"
},
{
"description": "Bad IP address",
"event_time": "2019-03-05 20:08:34.000",
"severity": "high",
"created_at": "2019-03-05 20:08:36.000",
"value": "87.147.254.215",
"host_name": "kyle-mbp-work",
"metadata": "{\"time\":1551816510,\"path\":\"\",\"pid\":1625}",
"id": "7cd6c6b3-b7d4-4404-b0d2-5978caecd706",
"grouping": "Bad IP access"
},
{
"description": "Outbound Network Connection to threat intel IOC",
"event_time": "2019-03-05 20:08:17.000",
"severity": "high",
"created_at": "2019-03-05 20:08:19.000",
"value": "87.147.254.215",
"host_name": "kyle-mbp-work",
"metadata": "{\"time\":1551816493,\"local_address\":\"0.0.0.0\",\"local_port\":20480,\"login_name\":\"kyleschmoll\",\"family\":2}",
"id": "e4a3e70b-cefd-481f-953d-91e7f9a2605e",
"grouping": "Compliance"
},
{
"description": "Outbound Network Connection to threat intel IOC",
"event_time": "2019-03-05 20:08:17.000",
"severity": "high",
"created_at": "2019-03-05 20:08:19.000",
"value": "87.147.254.215",
"host_name": "kyle-mbp-work",
"metadata": "{\"time\":1551816493,\"local_address\":\"0.0.0.0\",\"local_port\":20480,\"login_name\":\"kyleschmoll\",\"family\":2}",
"id": "877497f9-eeff-44ba-8f97-e0f3969e74db",
"grouping": "Compliance"
},
{
"description": "Outbound Network Connection to threat intel IOC",
"event_time": "2019-03-05 20:08:03.000",
"severity": "high",
"created_at": "2019-03-05 20:08:05.000",
"value": "54.165.17.209",
"host_name": "kyle-mbp-work",
"metadata": "{\"time\":1551816480,\"local_address\":\"0.0.0.0\",\"local_port\":20480,\"login_name\":\"kyleschmoll\",\"family\":2}",
"id": "91d28091-8799-404a-a498-03e9e21cd99e",
"grouping": "Compliance"
},
{
"description": "Outbound Network Connection to threat intel IOC",
"event_time": "2019-03-05 20:07:58.000",
"severity": "high",
"created_at": "2019-03-05 20:08:00.000",
"value": "54.165.17.209",
"host_name": "kyle-mbp-work",
"metadata": "{\"time\":1551816473,\"local_address\":\"0.0.0.0\",\"local_port\":20480,\"login_name\":\"kyleschmoll\",\"family\":2}",
"id": "c13a75e6-94de-4f5d-a3f1-6eeedfa2791e",
"grouping": "Compliance"
},
{
"description": "Bad IP address",
"event_time": "2019-03-05 20:07:04.000",
"severity": "high",
"created_at": "2019-03-05 20:07:06.000",
"value": "87.147.254.215",
"host_name": "kyle-mbp-work",
"metadata": "{\"time\":1551816420,\"path\":\"\",\"pid\":1625}",
"id": "1c004f28-60b4-4916-8d99-db706d6fd87f",
"grouping": "Bad IP access"
},
{
"description": "Outbound Network Connection to threat intel IOC",
"event_time": "2019-03-05 20:06:47.000",
"severity": "high",
"created_at": "2019-03-05 20:06:49.000",
"value": "87.147.254.215",
"host_name": "kyle-mbp-work",
"metadata": "{\"time\":1551816403,\"local_address\":\"0.0.0.0\",\"local_port\":20480,\"login_name\":\"kyleschmoll\",\"family\":2}",
"id": "1c7790d3-8b0b-461a-8c1b-ee51da16f9ef",
"grouping": "Compliance"
}
]
}
host_name | grouping | event_time | description | value | severity |
---|---|---|---|---|---|
kyle-mbp-work | Bad IP access | 2019-03-05 20:09:31.000 | Bad IP address | 87.147.254.215 | high |
kyle-mbp-work | Bad IP access | 2019-03-05 20:09:31.000 | Bad IP address | 87.147.254.215 | high |
kyle-mbp-work | Bad IP access | 2019-03-05 20:08:34.000 | Bad IP address | 87.147.254.215 | high |
kyle-mbp-work | Bad IP access | 2019-03-05 20:08:34.000 | Bad IP address | 87.147.254.215 | high |
kyle-mbp-work | Compliance | 2019-03-05 20:08:17.000 | Outbound Network Connection to threat intel IOC | 87.147.254.215 | high |
kyle-mbp-work | Compliance | 2019-03-05 20:08:17.000 | Outbound Network Connection to threat intel IOC | 87.147.254.215 | high |
kyle-mbp-work | Compliance | 2019-03-05 20:08:03.000 | Outbound Network Connection to threat intel IOC | 54.165.17.209 | high |
kyle-mbp-work | Compliance | 2019-03-05 20:07:58.000 | Outbound Network Connection to threat intel IOC | 54.165.17.209 | high |
kyle-mbp-work | Bad IP access | 2019-03-05 20:07:04.000 | Bad IP address | 87.147.254.215 | high |
kyle-mbp-work | Compliance | 2019-03-05 20:06:47.000 | Outbound Network Connection to threat intel IOC | 87.147.254.215 | high |
find processes which opened a socket
uptycs-get-process-open-sockets
Argument Name | Description | Required |
---|---|---|
ip | IP address which process opened a socket to. This argument should be in double quotes. | Optional |
time | Exact time at which the socket was opened. This argument should be in double quotes. | Optional |
host_name_is | Only return assets with this hostname. This argument should be in double quotes. Do not use arguments "host_name_is" and "host_name_like" at the same time. | Optional |
host_name_like | Only return assets with this string in the hostname. This argument should be in double quotes. Use this to find a selection of assets with similar hostnames. Do not use arguments "host_name_is" and "host_name_like" at the same time. | Optional |
time_ago | Specifies how far back you want to look. Format examples: 2 hours, 4 minutes, 6 month, 1 day, etc. | Optional |
start_window | Beginning of window to search for open sockets. Format is "YYYY-MM-DD HH:MM:SS.000", for example, March 15, 2019 at 1:52:36 am would be written as "2019-03-15 01:52:36.000". This argument should be in double quotes. | Optional |
end_window | End of window to search for open sockets. Format is "YYYY-MM-DD HH:MM:SS.000", for example, March 15, 2019 at 1:52:36 am would be written as "2019-03-15 01:52:36.000". This argument should be in double quotes. | Optional |
asset_id | Only return assets with this asset id. This argument should be in double quotes. Do not use arguments "asset_id", "host_name_is" or "host_name_like" at the same time. | Optional |
Path | Type | Description |
---|---|---|
Uptycs.Sockets.pid | number | pid of process which opened a connection to a specified IP |
Uptycs.Sockets.upt_hostname | string | hostname of the asset which ran the specified process |
Uptycs.Sockets.upt_time | date | time at which the connection was opened |
Uptycs.Sockets.path | string | file path to the process being run |
Uptycs.Sockets.local_address | string | local IP for specified connection |
Uptycs.Sockets.remote_address | string | remote IP for specified connection |
Uptycs.Sockets.local_port | number | local port for specified connection |
Uptycs.Sockets.remote_port | number | remote port for specified connection |
Uptycs.Sockets.upt_asset_id | string | asset id for asset which ran the specified process |
Uptycs.Sockets.parent | unknown | pid for the parent process which spawned the process which opened the connection |
uptycs-get-process-open-sockets limit=1
{
"Uptycs.Sockets": [
{
"upt_counter": 1584,
"protocol": 17,
"socket": 9007199254740991,
"family": 2,
"local_port": 61207,
"upt_hash": "a949059d-542e-5d7e-8fc3-3ec1783f7d53",
"upt_epoch": 0,
"remote_port": 0,
"pid": 375,
"remote_address": "0.0.0.0",
"upt_asset_id": "984d4a7a-9f3a-580a-a3ef-2841a561669b",
"upt_time": "2019-03-06 15:45:40.000",
"state": "",
"upt_hostname": "kyle-mbp-work",
"fd": 74,
"path": "",
"local_address": "192.168.86.48",
"upt_added": false,
"net_namespace": null,
"upt_day": 20190306
}
]
}
upt_hostname | pid | local_address | remote_address | upt_time | local_port | remote_port | socket |
---|---|---|---|---|---|---|---|
kyle-mbp-work | 375 | 192.168.86.48 | 0.0.0.0 | 2019-03-06 15:45:40.000 | 61207 | 0 | 9007199254740991 |
get information for a particular process
uptycs-get-process-information
Argument Name | Description | Required |
---|---|---|
pid | pid for the process. | Required |
host_name_is | Hostname for asset which spawned the specified process. This argument should be in double quotes. | Optional |
time | Time that the specified process was spawned. This argument should be in double quotes. | Required |
asset_id | Only return assets with this asset id. This argument should be in double quotes. Do not use arguments "asset_id" and "host_name_is" at the same time. | Optional |
Path | Type | Description |
---|---|---|
Uptycs.Proc.pid | number | pid for the process |
Uptycs.Proc.upt_hostname | string | hostname for asset which spawned the specified process |
Uptycs.Proc.upt_asset_id | string | asset id for asset which spawned the specified process |
Uptycs.Proc.parent | number | pid for the parent process |
Uptycs.Proc.upt_add_time | date | time that the process was spawned |
Uptycs.Proc.upt_remove_time | date | time that the process was removed |
uptycs-get-process-information asset_id="984d4a7a-9f3a-580a-a3ef-2841a561669b" pid=5119 time="2019-01-29 17:05:07.000"
{
"Uptycs.Proc": [
{
"name": "VBoxHeadless",
"parent": 484,
"upt_add_time": "2019-01-29 16:14:27.000",
"pid": 5119,
"upt_remove_time": "2019-01-29 19:21:31.000 UTC",
"upt_asset_id": "984d4a7a-9f3a-580a-a3ef-2841a561669b",
"cmdline": "/Applications/VirtualBox.app/Contents/MacOS/VBoxHeadless --comment vagrant_default_1535385658307_92120 --startvm 11742093-a8fa-4189-a88c-afc4cb7c70a6 --vrde config",
"upt_hostname": "kyle-mbp-work",
"pgroup": 5119,
"path": "/Applications/VirtualBox.app/Contents/MacOS/VBoxHeadless",
"temp_remove_time": "2019-01-29 19:21:31.000",
"cwd": "/Applications"
}
]
}
upt_hostname | parent | pid | name | path | cmdline |
---|---|---|---|---|---|
kyle-mbp-work | 484 | 5119 | VBoxHeadless | /Applications/VirtualBox.app/Contents/MacOS/VBoxHeadless | /Applications/VirtualBox.app/Contents/MacOS/VBoxHeadless --comment vagrant_default_1535385658307_92120 --startvm 11742093-a8fa-4189-a88c-afc4cb7c70a6 --vrde config |
get all the child processes for a given pid
uptycs-get-process-child-processes
Argument Name | Description | Required |
---|---|---|
parent | The pid for which all child processes will be found | Required |
host_name_is | hostname for the asset which executed these processes. This argument should be in double quotes. | Optional |
limit | Limit the number of entries returned. | Required |
asset_id | Only return assets with this asset_id. This argument should be in double quotes. Do not use arguments "asset_id" and "host_name_is" at the same time. | Optional |
parent_start_time | time at which the parent process was spawned | Optional |
parent_end_time | time at which the parent process was killed, if it exists. | Optional |
Path | Type | Description |
---|---|---|
Uptycs.Children.pid | number | pid of a daughter process |
Uptycs.Children.upt_asset_id | string | asset id for asset which this process was run on |
Uptycs.Children.upt_hostname | unknown | hostname for asset which spawned the specified process |
Uptycs.Children.upt_add_time | unknown | time that the process was spawned |
Uptycs.Children.upt_remove_time | unknown | time that the process was removed |
uptycs-get-process-child-processes asset_id="984d4a7a-9f3a-580a-a3ef-2841a561669b" parent=484 parent_start_time="2019-01-28 14:16:58.000" parent_end_time="2019-01-29 19:21:31.000"
{
"Uptycs.Children": [
{
"name": "VBoxHeadless",
"parent": 484,
"upt_add_time": "2019-01-29 16:14:27.000",
"pid": 5119,
"upt_remove_time": "2019-01-29 19:21:31.000 UTC",
"upt_asset_id": "984d4a7a-9f3a-580a-a3ef-2841a561669b",
"cmdline": "/Applications/VirtualBox.app/Contents/MacOS/VBoxHeadless --comment vagrant_default_1535385658307_92120 --startvm 11742093-a8fa-4189-a88c-afc4cb7c70a6 --vrde config",
"upt_hostname": "kyle-mbp-work",
"pgroup": 5119,
"path": "/Applications/VirtualBox.app/Contents/MacOS/VBoxHeadless",
"temp_remove_time": "2019-01-29 19:21:31.000",
"cwd": "/Applications"
},
{
"name": "VirtualBoxVM",
"parent": 484,
"upt_add_time": "2019-01-29 16:00:17.000",
"pid": 5008,
"upt_remove_time": "2019-01-29 16:13:55.000 UTC",
"upt_asset_id": "984d4a7a-9f3a-580a-a3ef-2841a561669b",
"cmdline": "/Applications/VirtualBox.app/Contents/Resources/VirtualBoxVM.app/Contents/MacOS/VirtualBoxVM --comment vagrant_default_1535385658307_92120 --startvm 11742093-a8fa-4189-a88c-afc4cb7c70a6 --no-startvm-errormsgbox",
"upt_hostname": "kyle-mbp-work",
"pgroup": 5008,
"path": "/Applications/VirtualBox.app/Contents/MacOS/VirtualBoxVM",
"temp_remove_time": "2019-01-29 16:13:55.000",
"cwd": "/Applications"
},
{
"name": "VirtualBoxVM",
"parent": 484,
"upt_add_time": "2019-01-29 15:58:10.000",
"pid": 5002,
"upt_remove_time": "2019-01-29 16:00:17.000 UTC",
"upt_asset_id": "984d4a7a-9f3a-580a-a3ef-2841a561669b",
"cmdline": "/Applications/VirtualBox.app/Contents/Resources/VirtualBoxVM.app/Contents/MacOS/VirtualBoxVM --comment basevm_centos_7_orig --startvm 58264539-0e7a-418f-91be-365aa0f20854 --no-startvm-errormsgbox",
"upt_hostname": "kyle-mbp-work",
"pgroup": 5002,
"path": "/Applications/VirtualBox.app/Contents/MacOS/VirtualBoxVM",
"temp_remove_time": "2019-01-29 16:00:17.000",
"cwd": "/Applications"
},
{
"name": "VirtualBoxVM",
"parent": 484,
"upt_add_time": "2019-01-29 15:55:32.000",
"pid": 4994,
"upt_remove_time": "2019-01-29 15:57:38.000 UTC",
"upt_asset_id": "984d4a7a-9f3a-580a-a3ef-2841a561669b",
"cmdline": "/Applications/VirtualBox.app/Contents/Resources/VirtualBoxVM.app/Contents/MacOS/VirtualBoxVM --comment vagrant_default_1535385658307_92120 --startvm 11742093-a8fa-4189-a88c-afc4cb7c70a6 --no-startvm-errormsgbox",
"upt_hostname": "kyle-mbp-work",
"pgroup": 4994,
"path": "/Applications/VirtualBox.app/Contents/MacOS/VirtualBoxVM",
"temp_remove_time": "2019-01-29 15:57:38.000",
"cwd": "/Applications"
},
{
"name": "VirtualBoxVM",
"parent": 484,
"upt_add_time": "2019-01-28 17:00:39.000",
"pid": 3448,
"upt_remove_time": "2019-01-28 22:27:17.000 UTC",
"upt_asset_id": "984d4a7a-9f3a-580a-a3ef-2841a561669b",
"cmdline": "/Applications/VirtualBox.app/Contents/Resources/VirtualBoxVM.app/Contents/MacOS/VirtualBoxVM --comment ova-31822- --startvm d7414d11-5764-4583-aeb6-94e5527c851c --no-startvm-errormsgbox",
"upt_hostname": "kyle-mbp-work",
"pgroup": 3448,
"path": "/Applications/VirtualBox.app/Contents/MacOS/VirtualBoxVM",
"temp_remove_time": "2019-01-28 22:27:17.000",
"cwd": "/Applications"
}
]
}
upt_hostname | pid | name | path | cmdline | upt_add_time |
---|---|---|---|---|---|
kyle-mbp-work | 5119 | VBoxHeadless | /Applications/VirtualBox.app/Contents/MacOS/VBoxHeadless | /Applications/VirtualBox.app/Contents/MacOS/VBoxHeadless --comment vagrant_default_1535385658307_92120 --startvm 11742093-a8fa-4189-a88c-afc4cb7c70a6 --vrde config | 2019-01-29 16:14:27.000 |
kyle-mbp-work | 5008 | VirtualBoxVM | /Applications/VirtualBox.app/Contents/MacOS/VirtualBoxVM | /Applications/VirtualBox.app/Contents/Resources/VirtualBoxVM.app/Contents/MacOS/VirtualBoxVM --comment vagrant_default_1535385658307_92120 --startvm 11742093-a8fa-4189-a88c-afc4cb7c70a6 --no-startvm-errormsgbox | 2019-01-29 16:00:17.000 |
kyle-mbp-work | 5002 | VirtualBoxVM | /Applications/VirtualBox.app/Contents/MacOS/VirtualBoxVM | /Applications/VirtualBox.app/Contents/Resources/VirtualBoxVM.app/Contents/MacOS/VirtualBoxVM --comment basevm_centos_7_orig --startvm 58264539-0e7a-418f-91be-365aa0f20854 --no-startvm-errormsgbox | 2019-01-29 15:58:10.000 |
kyle-mbp-work | 4994 | VirtualBoxVM | /Applications/VirtualBox.app/Contents/MacOS/VirtualBoxVM | /Applications/VirtualBox.app/Contents/Resources/VirtualBoxVM.app/Contents/MacOS/VirtualBoxVM --comment vagrant_default_1535385658307_92120 --startvm 11742093-a8fa-4189-a88c-afc4cb7c70a6 --no-startvm-errormsgbox | 2019-01-29 15:55:32.000 |
kyle-mbp-work | 3448 | VirtualBoxVM | /Applications/VirtualBox.app/Contents/MacOS/VirtualBoxVM | /Applications/VirtualBox.app/Contents/Resources/VirtualBoxVM.app/Contents/MacOS/VirtualBoxVM --comment ova-31822- --startvm d7414d11-5764-4583-aeb6-94e5527c851c --no-startvm-errormsgbox | 2019-01-28 17:00:39.000 |
find processes which are running or have run on a registered Uptycs assert
uptycs-get-processes
Argument Name | Description | Required |
---|---|---|
time | Exact time at which the process was spawned. This argument should be in double quotes. | Optional |
host_name_is | Only return assets with this hostname. This argument should be in double quotes. Do not use arguments "host_name_is" and "host_name_like" at the same time. | Optional |
host_name_like | Only return assets with this string in the hostname. This argument should be in double quotes. Use this to find a selection of assets with similar hostnames. Do not use arguments "host_name_is" and "host_name_like" at the same time. | Optional |
time_ago | Specifies how far back you want to look. Format examples: 2 hours, 4 minutes, 6 month, 1 day, etc. | Optional |
start_window | Beginning of window to search for open connections. Format is "YYYY-MM-DD HH:MM:SS.000", for example, March 15, 2019 at 1:52:36 am would be written as "2019-03-15 01:52:36.000". This argument should be in double quotes. | Optional |
end_window | End of window to search for open connections. Format is "YYYY-MM-DD HH:MM:SS.000", for example, March 15, 2019 at 1:52:36 am would be written as "2019-03-15 01:52:36.000". This argument should be in double quotes. | Optional |
asset_id | Only return assets with this asset id. This argument should be in double quotes. Do not use arguments "asset_id", "host_name_is" or "host_name_like" at the same time. | Optional |
Path | Type | Description |
---|---|---|
Uptycs.Process.pid | number | pid for a particular process |
Uptycs.Process.parent | number | pid for the parent of a particular process |
Uptycs.Process.upt_asset_id | string | uptycs asset id for the asset which is running (or ran) the process |
Uptycs.Process.upt_hostname | string | host name for the asset which is running (or ran) the process |
Uptycs.Process.upt_time | unknown | time at which the process was spawned |
uptycs-get-processes limit=1
{
"Uptycs.Process": [
{
"uid": 501,
"upt_counter": 1763,
"pid": 2375,
"upt_epoch": 0,
"upt_asset_id": "984d4a7a-9f3a-580a-a3ef-2841a561669b",
"resident_size": null,
"upt_hostname": "kyle-mbp-work",
"sgid": 20,
"suid": 501,
"total_size": null,
"upt_hash": "2010e1dc-1c9e-5f80-b66b-fa10a292bba4",
"euid": 501,
"state": null,
"gid": 20,
"upt_time": "2019-03-06 15:46:40.000",
"upt_added": false,
"cwd": "/private/tmp",
"user_time": null,
"nice": 0,
"parent": 1,
"cgroup_namespace": "",
"start_time": null,
"uts_namespace": "",
"threads": null,
"mnt_namespace": "",
"pgroup": 2375,
"path": "/System/Library/Frameworks/QuickLook.framework/Versions/A/Resources/quicklookd.app/Contents/MacOS/quicklookd",
"user_namespace": "",
"upt_day": 20190306,
"system_time": null,
"name": "quicklookd",
"cmdline": "/System/Library/Frameworks/QuickLook.framework/Resources/quicklookd.app/Contents/MacOS/quicklookd",
"net_namespace": "",
"pid_namespace": "",
"disk_bytes_written": null,
"is_elevated_token": 0,
"egid": 20,
"wired_size": null,
"ipc_namespace": "",
"root": "",
"on_disk": 1,
"disk_bytes_read": null
}
]
}
upt_hostname | pid | name | path | upt_time | parent | cmdline |
---|---|---|---|---|---|---|
kyle-mbp-work | 2375 | quicklookd | /System/Library/Frameworks/QuickLook.framework/Versions/A/Resources/quicklookd.app/Contents/MacOS/quicklookd | 2019-03-06 15:46:40.000 | 1 | /System/Library/Frameworks/QuickLook.framework/Resources/quicklookd.app/Contents/MacOS/quicklookd |
find processes which have opened files
uptycs-get-process-open-files
Argument Name | Description | Required |
---|---|---|
time | Exact time at which the process was spawned. This argument should be in double quotes. | Optional |
host_name_is | Only return assets with this hostname. This argument should be in double quotes. Do not use arguments "host_name_is" and "host_name_like" at the same time. | Optional |
host_name_like | Only return assets with this string in the hostname. This argument should be in double quotes. Use this to find a selection of assets with similar hostnames. Do not use arguments "host_name_is" and "host_name_like" at the same time. | Optional |
time_ago | Specifies how far back you want to look. Format examples: 2 hours, 4 minutes, 6 month, 1 day, etc. | Optional |
start_window | Beginning of window to search for open connections. Format is "YYYY-MM-DD HH:MM:SS.000", for example, March 15, 2019 at 1:52:36 am would be written as "2019-03-15 01:52:36.000". This argument should be in double quotes. | Optional |
end_window | End of window to search for open connections. Format is "YYYY-MM-DD HH:MM:SS.000", for example, March 15, 2019 at 1:52:36 am would be written as "2019-03-15 01:52:36.000". This argument should be in double quotes. | Optional |
asset_id | Only return assets with this asset id. This argument should be in double quotes. Do not use arguments "asset_id", "host_name_is" or "host_name_like" at the same time. | Optional |
Path | Type | Description |
---|---|---|
Uptycs.Files.pid | number | pid for the process which opened a file |
Uptycs.Files.fd | number | process specific file descriptor number |
Uptycs.Files.upt_asset_id | string | Uptycs asset id for the the asset on which the file was opened |
Uptycs.Files.upt_hostname | string | Host name for the asset on which the file was opened |
Uptycs.Files.upt_time | date | time at which the file was opened |
uptycs-get-process-open-files limit=1
{
"Uptycs.Files": [
{
"path": "/var/osquery/osquery.db/058345.sst",
"pid": 9,
"upt_hostname": "uptycs-osquery-vmfk7",
"fd": 23,
"upt_time": "2019-03-06 15:46:54.000"
}
]
}
upt_hostname | pid | path | fd | upt_time |
---|---|---|---|---|
uptycs-osquery-vmfk7 | 9 | /var/osquery/osquery.db/058345.sst | 23 | 2019-03-06 15:46:54.000 |
Set the status of an alert to new, assigned, resolved, or closed
uptycs-set-alert-status
Argument Name | Description | Required |
---|---|---|
id | Uptycs alert id used to identify a particular alert | Required |
status | Status of the alert can be new, assigned, resolved, or closed | Required |
There is no context output for this command.
uptycs-set-alert-status alert_id="9cb18abd-2c9a-43a8-988a-0601e9140f6c" status=assigned
{
"Uptycs.AlertStatus": {
"status": "assigned",
"code": "OUTBOUND_CONNECTION_TO_THREAT_IOC",
"updatedAt": "2019-03-06T15:48:08.196Z",
"updatedByEmail": "[email protected]",
"updatedByAdmin": true,
"updatedBy": "B schmoll",
"id": "9cb18abd-2c9a-43a8-988a-0601e9140f6c",
"createdAt": "2019-02-22T21:13:21.238Z"
}
}
id | code | status | createdAt | updatedAt |
---|---|---|---|---|
9cb18abd-2c9a-43a8-988a-0601e9140f6c | OUTBOUND_CONNECTION_TO_THREAT_IOC | assigned | 2019-02-22T21:13:21.238Z | 2019-03-06T15:48:08.196Z |
Sets a tag on a particular asset
uptycs-set-asset-tag
Argument Name | Description | Required |
---|---|---|
asset_id | Uptycs asset id for the asset that the tag should be set on | Required |
tag | Tag that will be set on the asset | Required |
There is no context output for this command.
uptycs-set-asset-tag asset_id="984d4a7a-9f3a-580a-a3ef-2841a561669b" tag_key="owner" tag_value="Uptycs office"
{
"Uptycs.AssetTags": {
"hostName": "kyle-mbp-work",
"tags": [
"network=low",
"Uptycs=work laptop",
"owner=Uptycs office",
"cpu=unknown",
"memory=unknown",
"disk=high"
]
}
}
hostName | tags |
---|---|
kyle-mbp-work | network=low, Uptycs=work laptop, owner=Uptycs office, cpu=unknown, memory=unknown, disk=high |
get info for an Uptycs user
uptycs-get-user-information
Argument Name | Description | Required |
---|---|---|
user_id | Unique Uptycs id for the user | Required |
There is no context output for this command.
uptycs-get-user-information user_id="33436e24-f30f-42d0-8438-d948be12b5af"
{
"Uptycs.UserInfo": {
"userObjectGroups": [
{
"userId": "33436e24-f30f-42d0-8438-d948be12b5af",
"updatedBy": null,
"objectGroupId": "106eef5e-c3a6-44eb-bb3d-1a2087cded3d",
"customerId": "e8213ef3-ef92-460e-a542-46dccd700c16",
"object_group_id": "106eef5e-c3a6-44eb-bb3d-1a2087cded3d",
"createdBy": null,
"updatedAt": "2018-09-24T17:24:45.606Z",
"id": "e10d6fbb-366c-4b89-86b3-89a1cd4ee83c",
"createdAt": "2018-09-24T17:24:45.606Z"
}
],
"userRoles": {
"admin": {
"description": "Default admin role",
"updatedBy": null,
"custom": false,
"createdBy": null,
"updatedAt": "2019-02-21T17:20:13.070Z",
"id": "01b8ce5d-c93a-41a6-ba63-2e26c7d2cd79",
"hidden": false,
"permissions": [
"ALERT:READ",
"ALERT_RULE:READ",
"ASSET:READ",
"CUSTOMER:READ",
"DESTINATION:READ",
"EVENT:READ",
"EVENT_RULE:READ",
"EXCEPTION:READ",
"FIM:READ",
"FLAG:READ",
"OBJECT_GROUP:READ",
"PROFILE:READ",
"PROMETHEUS_TARGET:READ",
"QUERY:READ",
"QUERY_PACK:READ",
"REPORT:READ",
"REPORT_RUN:READ",
"SCHEMA:READ",
"SCHEDULED_GROUP:READ",
"SCHEDULED_QUERY:READ",
"SNAPSHOT:READ",
"TAG:READ",
"TAG_RULE:READ",
"TEMPLATE:READ",
"THREAT:READ",
"USER:READ",
"USER_ROLE:READ",
"CURRENT_USER:UPDATE",
"CUSTOMER:QUERY",
"ASSET:QUERY",
"OSQUERY:DOWNLOAD",
"OSQUERY:READ",
"FEATURE_SET:READ",
"DASHBOARD:READ",
"CURRENT_USER_PREFERENCE:READ",
"CURRENT_USER_PREFERENCE:CREATE",
"CURRENT_USER_PREFERENCE:UPDATE",
"CURRENT_USER_PREFERENCE:DELETE",
"CURRENT_USER_REPORT_SCHEDULE:CREATE",
"CURRENT_USER_REPORT_SCHEDULE:READ",
"CURRENT_USER_REPORT_SCHEDULE:UPDATE",
"CURRENT_USER_REPORT_SCHEDULE:DELETE",
"COMPLIANCE_FAILURE:READ",
"COMPLIANCE_FAILURE:UPDATE",
"CUSTOM_PROFILE:READ",
"QUERY_JOB:CREATE",
"QUERY_JOB:READ",
"QUERY_JOB:UPDATE",
"QUERY_JOB:DELETE",
"EVENT_EXCLUDE_PROFILE:READ",
"ATC_QUERY:READ",
"ALERT:CREATE",
"ALERT:UPDATE",
"ALERT:DELETE",
"ALERT_RULE:CREATE",
"ALERT_RULE:UPDATE",
"ALERT_RULE:DELETE",
"API_KEY:CREATE",
"API_KEY:READ",
"API_KEY:UPDATE",
"API_KEY:DELETE",
"ASSET:UPDATE",
"ASSET:DELETE",
"ASSET_GROUP_RULE:CREATE",
"ASSET_GROUP_RULE:READ",
"ASSET_GROUP_RULE:UPDATE",
"ASSET_GROUP_RULE:DELETE",
"CUSTOMER:UPDATE",
"DESTINATION:CREATE",
"DESTINATION:UPDATE",
"DESTINATION:DELETE",
"EVENT:CREATE",
"EVENT:UPDATE",
"EVENT:DELETE",
"EVENT_RULE:CREATE",
"EVENT_RULE:UPDATE",
"EVENT_RULE:DELETE",
"EXCEPTION:CREATE",
"EXCEPTION:UPDATE",
"EXCEPTION:DELETE",
"FIM:CREATE",
"FIM:UPDATE",
"FIM:DELETE",
"FLAG:CREATE",
"FLAG:UPDATE",
"FLAG:DELETE",
"OBJECT_GROUP:CREATE",
"OBJECT_GROUP:UPDATE",
"OBJECT_GROUP:DELETE",
"PROMETHEUS_TARGET:CREATE",
"PROMETHEUS_TARGET:UPDATE",
"PROMETHEUS_TARGET:DELETE",
"QUERY:CREATE",
"QUERY:UPDATE",
"QUERY:DELETE",
"QUERY_PACK:CREATE",
"QUERY_PACK:UPDATE",
"QUERY_PACK:DELETE",
"REPORT:CREATE",
"REPORT:UPDATE",
"REPORT:DELETE",
"REPORT_RUN:CREATE",
"REPORT_RUN:UPDATE",
"REPORT_RUN:DELETE",
"SCHEDULED_GROUP:UPDATE",
"SCHEDULED_GROUP:DELETE",
"SCHEDULED_QUERY:CREATE",
"SCHEDULED_QUERY:UPDATE",
"SCHEDULED_QUERY:DELETE",
"SNAPSHOT:CREATE",
"SNAPSHOT:UPDATE",
"SNAPSHOT:DELETE",
"TAG:CREATE",
"TAG:UPDATE",
"TAG:DELETE",
"TAG_RULE:CREATE",
"TAG_RULE:UPDATE",
"TAG_RULE:DELETE",
"TEMPLATE:CREATE",
"TEMPLATE:UPDATE",
"TEMPLATE:DELETE",
"THREAT:CREATE",
"THREAT:UPDATE",
"THREAT:DELETE",
"USER:CREATE",
"USER:UPDATE",
"USER:DELETE",
"USER_ROLE:CREATE",
"USER_ROLE:UPDATE",
"USER_ROLE:DELETE",
"CURRENT_USER:READ",
"CURRENT_USER:UPDATE",
"CUSTOMER_FEATURE_SET:UPDATE",
"USER_PREFERENCE:CREATE",
"USER_PREFERENCE:READ",
"USER_PREFERENCE:UPDATE",
"USER_PREFERENCE:DELETE",
"REPORT_SCHEDULE:CREATE",
"REPORT_SCHEDULE:READ",
"REPORT_SCHEDULE:UPDATE",
"REPORT_SCHEDULE:DELETE",
"AUDIT_LOGS:READ",
"CUSTOM_PROFILE:CREATE",
"CUSTOM_PROFILE:UPDATE",
"CUSTOM_PROFILE:DELETE",
"EVENT_EXCLUDE_PROFILE:CREATE",
"EVENT_EXCLUDE_PROFILE:UPDATE",
"EVENT_EXCLUDE_PROFILE:DELETE",
"ATC_QUERY:CREATE",
"ATC_QUERY:UPDATE",
"ATC_QUERY:DELETE"
],
"customerId": "e8213ef3-ef92-460e-a542-46dccd700c16",
"createdAt": "2018-09-24T17:24:41.194Z",
"name": "admin"
}
},
"email": "[email protected]",
"name": "B schmoll",
"id": "33436e24-f30f-42d0-8438-d948be12b5af"
}
}
name | id | |
---|---|---|
B schmoll | [email protected] | 33436e24-f30f-42d0-8438-d948be12b5af |
get Uptycs threat indicators
uptycs-get-threat-indicators
Argument Name | Description | Required |
---|---|---|
indicator | the specific indicator you wish to search for. This can be an IP address, a Bad Domain, etc. as well ass any indicators you have added. | Optional |
There is no context output for this command.
uptycs-get-threat-indicators limit=1
{
"Uptycs.ThreatIndicators": [
{
"indicator": "54.165.17.209",
"description": "malware.com",
"threatId": "9528e9a6-b948-4681-b4f3-bffb41ea691b",
"indicatorType": "IPv4",
"createdAt": "2019-03-06T15:41:38.096Z",
"id": "c32c2b71-e364-4846-9e7c-902f903a18db",
"isActive": true
}
]
}
id | indicator | description | indicatorType | createdAt | isActive | threatId |
---|---|---|---|---|---|---|
c32c2b71-e364-4846-9e7c-902f903a18db | 54.165.17.209 | malware.com | IPv4 | 2019-03-06T15:41:38.096Z | true | 9528e9a6-b948-4681-b4f3-bffb41ea691b |
get Uptycs threat sources
uptycs-get-threat-sources
There are no input arguments for this command.
There is no context output for this command.
uptycs-get-threat-sources limit=1
{
"Uptycs.ThreatSources": [
{
"name": "AlienVault Open Threat Exchange Malicious Domains and IPs",
"url": "4533da856e43f06ee00bb5f1adf170a0ce5cacaca5992ab1279733c2bdd0a88c",
"enabled": true,
"custom": false,
"lastDownload": "2019-03-06T01:00:06.767Z",
"createdAt": "2019-03-03T01:00:47.056Z",
"description": "A feed of malicious domains and IP addresses"
}
]
}
name | description | url | enabled | custom | createdAt | lastDownload |
---|---|---|---|---|---|---|
AlienVault Open Threat Exchange Malicious Domains and IPs | A feed of malicious domains and IP addresses | 4533da856e43f06ee00bb5f1adf170a0ce5cacaca5992ab1279733c2bdd0a88c | true | false | 2019-03-03T01:00:47.056Z | 2019-03-06T01:00:06.767Z |
get Uptycs threat vendors
uptycs-get-threat-vendors
Argument Name | Description | Required |
---|---|---|
threat_vendor_id | unique Uptycs id which identifies the vendor of this specific threat source | Optional |
There is no context output for this command.
uptycs-get-threat-vendors
{
"Uptycs.ThreatVendors": [
{
"name": "Bschmoll Inc.-Threats",
"url": null,
"updatedAt": "2018-11-20T19:15:05.611Z",
"customerId": "e8213ef3-ef92-460e-a542-46dccd700c16",
"numThreats": null,
"numIocs": null,
"lastDownload": null,
"id": "42b9220c-7e29-4fd8-9cf7-9f811e851f8e",
"createdAt": "2018-11-20T19:15:05.611Z",
"description": null
}
]
}
description | url | updatedAt | customerId | numIocs | numThreats | lastDownload | id | createdAt | name |
---|---|---|---|---|---|---|---|---|---|
2018-11-20T19:15:05.611Z | e8213ef3-ef92-460e-a542-46dccd700c16 | 42b9220c-7e29-4fd8-9cf7-9f811e851f8e | 2018-11-20T19:15:05.611Z | Bschmoll Inc.-Threats |
get the parent process information for a particular child process
uptycs-get-parent-information
Argument Name | Description | Required |
---|---|---|
parent | pid for the parent process. | Required |
host_name_is | Hostname for asset which spawned the specified process. This argument should be in double quotes. | Optional |
child_add_time | Time that the specified process was spawned. This argument should be in double quotes. | Required |
asset_id | Only return assets with this asset id. This argument should be in double quotes. Do not use arguments "asset_id" and "host_name_is" at the same time. | Optional |
Path | Type | Description |
---|---|---|
Uptycs.Parent.pid | number | pid of the process (this is the same number as the input argument 'parent') |
Uptycs.Parent.upt_hostname | string | hostname for asset which spawned the specified process |
Uptycs.Parent.upt_asset_id | string | asset id for asset which spawned the specified process |
Uptycs.Parent.parent | number | pid for the parent process (this is the parent of the input argument 'parent') |
Uptycs.Parent.upt_add_time | date | time that the process was spawned |
Uptycs.Parent.upt_remove_time | date | time that the process was removed |
uptycs-get-parent-information asset_id="984d4a7a-9f3a-580a-a3ef-2841a561669b" child_add_time="2019-01-29 16:14:27.000" parent=484
{
"Uptycs.Parent": [
{
"name": "VBoxSVC",
"parent": 1,
"upt_add_time": "2019-01-28 14:16:58.000",
"pid": 484,
"upt_remove_time": "2019-01-29 19:21:31.000 UTC",
"upt_asset_id": "984d4a7a-9f3a-580a-a3ef-2841a561669b",
"cmdline": "/Applications/VirtualBox.app/Contents/MacOS/VBoxSVC --auto-shutdown",
"upt_hostname": "kyle-mbp-work",
"pgroup": 484,
"path": "/Applications/VirtualBox.app/Contents/MacOS/VBoxSVC",
"temp_remove_time": "2019-01-29 19:21:31.000",
"cwd": "/Applications"
}
]
}
upt_hostname | parent | pid | name | path | cmdline |
---|---|---|---|---|---|
kyle-mbp-work | 1 | 484 | VBoxSVC | /Applications/VirtualBox.app/Contents/MacOS/VBoxSVC | /Applications/VirtualBox.app/Contents/MacOS/VBoxSVC --auto-shutdown |
post a new threat source to your threat sources in Uptycs
uptycs-post-threat-source
Argument Name | Description | Required |
---|---|---|
name | The name for the threat source | Required |
filepath | path to the file containing threat information which will be uploaded | Required |
description | A short description for the threat source | Required |
There is no context output for this command.
uptycs-post-threat-source name="testThreatSources" description="testing Uptycs API" entry_id="4322@27d41dbb-9676-4408-88bf-51193334caf7" filename="threatSourcesTest.csv"
Uptycs Posted Threat Source
get a list of Uptycs users
uptycs-get-users
There are no input arguments for this command.
Path | Type | Description |
---|---|---|
id | string | unique Uptycs id for the user |
uptycs-get-users limit=1
{
"Uptycs.Users": [
{
"name": "B schmoll",
"admin": true,
"id": "33436e24-f30f-42d0-8438-d948be12b5af",
"updatedAt": "2018-09-25T16:10:28.140Z",
"active": true,
"email": "[email protected]",
"createdAt": "2018-09-24T17:24:38.635Z"
}
]
}
name | id | admin | active | createdAt | updatedAt | |
---|---|---|---|---|---|---|
B schmoll | [email protected] | 33436e24-f30f-42d0-8438-d948be12b5af | true | true | 2018-09-24T17:24:38.635Z | 2018-09-25T16:10:28.140Z |
get Uptycs asset groups
uptycs-get-asset-groups
There are no input arguments for this command.
Path | Type | Description |
---|---|---|
Uptycs.AssetGroups.id | string | unique Uptycs id for a particular object group |
uptycs-get-asset-groups
{
"Uptycs.AssetGroups": [
{
"name": "assets",
"description": "Default asset group",
"custom": false,
"updatedAt": "2018-09-24T17:24:45.604Z",
"id": "106eef5e-c3a6-44eb-bb3d-1a2087cded3d",
"createdAt": "2018-09-24T17:24:45.604Z",
"objectType": "ASSET"
},
{
"name": "enrolling",
"description": "Enrolling asset group",
"custom": false,
"updatedAt": "2018-09-24T17:24:45.601Z",
"id": "a73353c1-1b27-4eea-9a7c-d2f946cca030",
"createdAt": "2018-09-24T17:24:45.601Z",
"objectType": "ASSET"
}
]
}
id | name | description | objectType | custom | createdAt | updatedAt |
---|---|---|---|---|---|---|
106eef5e-c3a6-44eb-bb3d-1a2087cded3d | assets | Default asset group | ASSET | false | 2018-09-24T17:24:45.604Z | 2018-09-24T17:24:45.604Z |
a73353c1-1b27-4eea-9a7c-d2f946cca030 | enrolling | Enrolling asset group | ASSET | false | 2018-09-24T17:24:45.601Z | 2018-09-24T17:24:45.601Z |
get a list of users in a particular asset group
uptycs-get-user-asset-groups
Argument Name | Description | Required |
---|---|---|
asset_group_id | return a list of users with access to this asset group | Required |
There is no context output for this command.
uptycs-get-user-asset-groups asset_group_id="106eef5e-c3a6-44eb-bb3d-1a2087cded3d"
{
"Uptycs.UserGroups": {
"B schmoll": {
"email": "[email protected]",
"id": "33436e24-f30f-42d0-8438-d948be12b5af"
},
"Milan Shah": {
"email": "[email protected]",
"id": "89d26aa4-f0a8-48d9-a174-ce5285d9dd60"
}
}
}
B schmoll | Milan Shah |
---|---|
email: [email protected] id: 33436e24-f30f-42d0-8438-d948be12b5af |
email: [email protected] id: 89d26aa4-f0a8-48d9-a174-ce5285d9dd60 |
retrieve information about a specific threat indicator using a unique threat indicator id
uptycs-get-threat-indicator
Argument Name | Description | Required |
---|---|---|
indicator_id | unique Uptycs id which identifies a specific threat indicator | Required |
Path | Type | Description |
---|---|---|
Uptycs.ThreatIndicator.threat_source_id | string | unique Uptycs id which identifies the source of this specific threat indicator |
Uptycs.ThreatIndicator.threat_vendor_id | string | unique Uptycs id which identifies the vendor of this specific threat source |
uptycs-get-threat-indicator indicator_id="0ab619bb-cfe0-4db0-8a31-0a71fcc2a362"
{
"Uptycs.ThreatIndicator": {
"indicator": "92.242.140.21",
"description": "nishant.uptycs.io",
"threatId": "60e2e9eb-f756-4a4d-a85d-55aa8167d59d",
"threat_source_name": "test-bad-ips",
"threat_vendor_id": "42b9220c-7e29-4fd8-9cf7-9f811e851f8e",
"indicatorType": "IPv4",
"threat_source_id": "c67d0821-f2f2-44ee-b3a8-a0bae5b04e55",
"id": "0ab619bb-cfe0-4db0-8a31-0a71fcc2a362",
"createdAt": "2019-01-10T21:25:49.280Z"
}
}
id | indicator | description | indicatorType | createdAt | isActive | threatId |
---|---|---|---|---|---|---|
0ab619bb-cfe0-4db0-8a31-0a71fcc2a362 | 92.242.140.21 | nishant.uptycs.io | IPv4 | 2019-01-10T21:25:49.280Z | true | 60e2e9eb-f756-4a4d-a85d-55aa8167d59d |
retrieve information about a specific threat source
uptycs-get-threat-source
Argument Name | Description | Required |
---|---|---|
threat_source_id | unique Uptycs id for the threat source you wish to retrive | Required |
There is no context output for this command.
uptycs-get-threat-source threat_source_id="20ee2177-4fdc-4070-a046-945048373dd1"
{
"Uptycs.ThreatSources": {
"name": "Debian Linux vulnerabilities",
"url": "https://vulners.com/api/v3/archive/collection/?type=debian",
"enabled": true,
"custom": false,
"lastDownload": null,
"createdAt": "2018-09-14T18:43:54.832Z",
"description": "Debian Linux vulnerabilities"
}
}
name | description | url | enabled | custom | createdAt | lastDownload |
---|---|---|---|---|---|---|
Debian Linux vulnerabilities | Debian Linux vulnerabilities | https://vulners.com/api/v3/archive/collection/?type=debian | true | false | 2018-09-14T18:43:54.832Z |
In order to create an instance of the integration, a user API key and secret must be downloaded from the users Uptycs account. After signing in, navigate to Configuration->Users. At the bottom left of the screen you will see a window labeled "User API key". Click download. The downloaded file will have all the information necessary to create the instance.
While the Demisto-Uptycs integration provides multiple commands with which to access the Uptycs backend, not all features are supported. In particular, configuration changes are best made using the Uptycs UI. Many of the commands have a limit set to reduce the number of rows returned from a query or api call. The limit can be raised, or turned off, however, this may cause the queries take longer to return and potentially return large numbers of rows. When writing queries, it can sometimes be easier to test using the Uptycs UI rather than the integration.
Go to Settings->Integrations->Servers & Services.
Type 'shared agent' into the search bar.
Click 'Add instance'.
Fill in the following:
Name:<choose a name for the endpoint>
Credentials:<valid username on endpoint>
Password:<corresponding password>
Default Hostname or IP Address:<valid IP for endpoint>
Target Architecture: amd64
Target Operation System:<os of the endpoint>
Click the Test button to verify success.
Click the Done button.
Compress killProcess.sh into a .zip file.
Go to Settings->Integrations->Agent Tools.
Click the +Add Tool button.
Navigate to the directory with your zipped up script and upload it.
Go to Automation.
Click the +New Script button.
Delete sample code and paste in killProcess.js.
In the script settings, fill in the following:
Basic:
Name:killProcess
Type: JavaScript
Arguments:
Argument: upt_pid
Mandatory: checked
Description: pid for process to be killed
Advanced:
Run On: D2 Agent
Click the Save icon.
Go to Playbooks.
Click the +New Playbook button. Give the playbook a name.
Click the +Create Task button. Give the task a name.
Click 'Choose automation' and type in the name of your integration command, in this case, 'post-query'.
Fill in the following:
method: POST
api_call: /query
query: SELECT json_extract(metadata, '$.pid') AS upt_pid FROM upt_alerts WHERE description = 'Bad IP address' ORDER BY alert_time DESC LIMIT 1
queryType: global
Click the green OK button.
Click the +Create Task button. Give the task a name.
Click 'Choose automation' and type in the name of your integration command, in this case, 'D2ExecuteCommand'.
Fill in the following:
commandName: D2Drop
arguments:
{
"destpath":"<path of where to save the script on the endpoint>",
"files":"killProcess/killProcess.sh",
"using":"<name of your SharedAgent instance from above>"
}
Click the green OK button.
Click the +Create Task button. Give the task a name.
Click 'Choose automation' and type in the name of your integration command, in this case, 'D2ExecuteCommand'.
Fill in the following:
commandName: killProcess
arguments: {"upt_pid":${UptycsKey.items.upt_pid}}
Click the green OK button
Click the Save icon.
Now connect the nodes of the task boxes to create a workflow, starting with the query, followed by dropping the script on the endpoint, and finally executing the script to kill the process.
Save the playbook.
Click on one of the incidents and go to the Work Plan.
Follow demisto instructions to install a D2 Agent on the desired endpoint.
Use the system_add command to add an endpoint to the incident.
/system_add host=<ip of endpoint> arch=amd64 name=<name for endpoint in UI> os=<os of endpoint> password=<Will-Prompt-After-Enter> user=<valid user on endpoint>