Document toolboxDocument toolbox

Minerva Labs

Minerva Labs is cyber security company that offers a unique low footprint endpoint prevention platform.

Connect Minerva Labs with Devo SOAR

  1. Navigate to Automations > Integrations.

  2. Search for Minerva Labs.

  3. Click Details, then the + icon. Enter the required information in the following fields.

  4. Label: Enter a connection name.

  5. Reference Values: Define variables here to templatize integration connections and actions. For example, you can use https://www.{{hostname}}.com where, hostname is a variable defined in this input. For more information on how to add data, see 'Add Data' Input Type for Integrations.

  6. Verify SSL: Select option to verify connecting server's SSL certificate (Default is Verify SSL Certificate).

  7. Remote Agent: Run this integration using the Devo SOAR Remote Agent.

  8. Base URL: Base URL to connect to the Minerva Labs.

  9. Username: Username to connect to the Minerva Labs.

  10. Password: Password to connect to the Minerva Labs.

  11. After you've entered all the details, click Connect.

Actions for Minerva Labs

Get Events

Retrieves the list of events according to the search query.

Input Field

Choose a connection that you have previously created and then fill in the necessary information in the following input fields to complete the connection.

Input Name

Description

Required

Input Name

Description

Required

Query

Jinja-templated query containing the query.

 

Example: {{column1}} {{column2}}.

Required

 

Start Time

Enter the value for start time in yyyy-mm-dd format (Default is Batch start time).

 

Example: 2020-12-01".

Optional

 

End Time

Enter the value for end time in yyyy-mm-dd format (Default is Batch end time).

 

Example: 2020-12-02.

Optional

 

Max Results

The maximum number of results to return per call (Default is 100000).

Optional

Output

A JSON object containing multiple rows of result:

  • has_error: True/False

  • error: message/null

  • result: List of events.

``` {json}{ "additionalAction": null, "additionalInformation": "", "affectedItems": null, "application": "wmiadap.exe", "archived": false, "armorVersion": "3.4.5.5801", "certificateInfo": "N/A", "certificateOriginalFileName": "", "certificateProductName": "", "description": "Process WMIADAP.exe queried an Endpoint Security Bypass Technique artifact", "endpoint": "gdvf87-05.dsa.mot-mobility.com", "error": null, "eventTypeSpecificInformation": { "loadedModules": "*.EXE, .dll, .DLL" }, "fileHash": "db844f69381751g8dbtb8c8a0c3b5d4e1c59491a203191ef283563c539a887", "firstReceivedTime": "2020-11-30T11:49:30.8197291", "fullAdditionalInformation": "{\r\n\n \"loadedModules\": \"*.EXE, .dll\"\r\n\n}", "fwLink": null, "generationTime": "2020-11-30T08:49:29.53", "groupName": "Default Group", "has_error": false, "id": "8839eccf-a881-4q93-9ae3-ad505d56a121", "isCertificateValid": true, "isFlagged": false, "localIp": "192.168.15.131", "md5": "0a3efbad56h5971ed36287d8e8829f55", "mitreTechniques": [], "new": true, "note": "", "parentProcessFullPath": "C:\Windows\System32\.exe", "processCommandLine": "*.exe /F /T", "processId": 14768, "processName": "\\?\C:\Windows\System32\\***.exe", "receivedIp": "200.158.46.62", "repeatsCounter": 1, "ruleCategory": "Endpoint Security Bypass Technique", "ruleName": "RES-1997_1_3", "serverReceivedTime": "2020-11-30T11:49:30.8197291", "severity": null, "simulated": false, "source": null, "threatId": null, "threatStatus": null, "type": "EvasionTechnique", "userName": "aaaa@aaaa nt" }

## Get Single Event by ID Retrieves a single event by ID. ### Input Field Choose a connection that you have previously created and then fill in the necessary information in the following input fields to complete the connection. | Input Name | Description | Required | | :--------- | :-------------------------------------------------------------- | :------- | | Event ID | Column name from the parent table to lookup value for event ID. | Required | ### Output A JSON object containing multiple rows of result: - has_error: True/False - error: message/null - result: Event details. ``` {json}{ "firstSeenOnline": null, "operatingSystem": null, "agentType": null, "processHierarchy": [ { "processId": 3408, "processName": "C:\\Program Files (x86)\\LANDesk\\Shared Files\\residentAgent.exe", "processHash": "892f32a4f6d4e2c69cd0d7f393b1989784df5db1e641716d21b9d343f47b14efc5da6", "processCommandLine": "", "startTime": "2020-12-02T14:27:36.654Z", "username": "***@NT AUTHORITY" }, { "processId": 14392, "processName": "C:\\Program Files (x86)\\LANDesk\\LDClient\\SDCLIENT.EXE", "processHash": "1dd171687a9cdfa9db8557170ac30fed6eb17707e744380bda20e464c667cf96", "processCommandLine": "", "startTime": "2020-12-04T00:59:46.755Z", "username": "" }, { "processId": 1005667, "processName": "C:\\Program Files (x86)\\LANDesk\\LDClient\\**.exe", "processHash": "ffdeb16bebfa5ab5f8ba30d5e34281a6330a4e968d7efb5b8c637b58017217bb", "processCommandLine": "\"C:\\Program Files (x86)\\LANDesk\\LDClient\\sdistps1.exe\"", "startTime": "2020-12-04T10:18:13.706", "username": "***@NT AUTHORITY" } ], "id": "62c79697-011f-4d69-ac0b-e6ca1bbf3046", "description": "Process sdistps1.exe queried an Abusing Windows tools artifact", "new": true, "type": "MaliciousProcessRelationship", "endpoint": "TIMHAHN-0.lenovo.com", "processName": "C:\\Program Files (x86)\\LANDesk\\LDClient\\sdistps1.exe", "fileHash": "ffdeb16bebfa5ab5f8ba30hj4d9d5e34281a6330a4e968d7efb5b8c637b58017217bb", "md5": "bdb3dab1a768c5b40214bc47bb65f102", "generationTime": "2020-12-04T10:18:13.706", "serverReceivedTime": "2020-12-04T16:18:15.3837948", "userName": "****@NT AUTHORITY", "simulated": true, "ruleName": "RES-1981_07_1086_0", "armorVersion": "3.6.1.6153", "archived": false, "ruleCategory": "Abusing Windows tools", "parentProcessFullPath": "C:\\Program Files (x86)\\LANDesk\\LDClient\\SDCLIENT.EXE", "processId": 10056, "receivedIp": "144.***.**(.1", "localIp": "10.0.2.15", "additionalInformation": "", "processCommandLine": "\"C:\\Program Files (x86)\\LANDesk\\LDClient\\sdistps1.exe\"", "certificateInfo": "O=\"LANDESK SOFTWARE, INC.\", L=SOUTH AS, S=UTAH, C=US", "isCertificateValid": true, "certificateProductName": "", "certificateOriginalFileName": "", "eventTypeSpecificInformation": { "blockedCommandLine": "powershell -NonInteractive -EncodedCommand PAAjAAoAQwByAGUAYQB0AGUAIABmAHUAytbABsACAAZABpAHIAZQBjAHQAbwByAHkAIABwAGEAdABo\r\nAAoAIwA+AAoACgBOAGUAdwAtAEkAdABlAG0AIAAtAEkAdABlAG0AVAB5AHAAZQAgAEQAaQByAGUA\r\nYwB0AG8AcgB5ACAALQBQAGEAdABoACAAIgBjADoAXABwAHIAbwBnAHIAYQBtACAAZgBpAGwAZQBz\r\nAFwAbABvAGMAawBzAGMAcgBlAGUAbgBcACIAIAAtGAGkA\r\nbABlAHMAIAAoAHgAOAA2ACkAXABMAEEATgBEAGUAcwgyBrAFwATABEAEMAbABpAGUAbgB0AC8AcwBk\r\nAG0AYwBhAGMAaABlAC8AYQBwAHAALwBEAEMARwBMAG8AYwBrAFMAYwByAGUAZQBuAC8AQwBoAGEA\r\nbgBnAGUATABvAGMAawBTAGMAcgBlAGUAbgAuAGUAeABlACIAIAAKAAoAaQBmACAAKAAkAD8AIAAt\r\nAG4AZQAgACQAdAByAHUAZQApAAoAewAKACAAIAAgACAAZQB4AGkAdAAgADEACgB9AAoADQAKADsA\r\nIABlAHgAaQB0ACAAJABMAEEAUwBUAEUAWABJAFQAQwBPAEQARQA=" }, "repeatsCounter": 6, "firstReceivedTime": "2020-12-04T01:00:13.5505131", "groupName": "sssss-Sepcial", "fullAdditionalInformation": "{\r\n\n \"blockedCommandLine\": \"powershell -NonInteractive -EncodedCommand PAAjAAoAQwByAGUAYQB0AGUAIABmAHUAbABsACAAZABpAHIAZQBjAHQAbwByAHkAIABwAGEAdABo\\r\\nAAoAIwA+AAoACgBOAGUAdwAtAEkAdABlAG0AIAAtAEkAdABlAG0AVAB5AHAAZQAgAEQAaQByAGUA\\r\\nYwB0AG8AcgB5ACAALQBQAGEAdABoACAAIgBjADoAXABwAHIAbwBnAHIAYQBtACAAZgBpAGwAZQBz\\r\\nAFwAbABvAGMAawBzAGMAcgBlAGUAbgBcACIAIAAtAEYAbwByAGMAZQAKAAoAaQBmACAAKAAkAD8A\\r\\nIAAtAG4AZQAgACQAdAByAHUAZQApAAoAewAKACAAIAFMAYwByAGUAZQBuAC8AQwBoAGEA\\r\\nbgBnAGUATABvAGMAawBTAGMAcgBlAGUAbgAuAGUAeABlACIAIAAKAAoAaQBmACAAKAAkAD8AIAAt\\r\\nAG4AZQAgACQAdAByAHUAZQApAAoAewAKACAAIAAgACAAZQB4AGkAdAAgADEACgB9AAoADQAKADsA\\r\\nIABlAHgAaQB0ACAAJABMAEEAUwBUAEUAWABJAFQAQwBPAEQARQA=\"\r\n\n}", "source": null, "threatId": null, "threatStatus": null, "affectedItems": null, "severity": null, "fwLink": null, "additionalAction": null, "mitreTechniques": [ { "Name": "ATT&CK", "Url": "https://attack.mitre.org/", "Categories": [ { "Name": "Execution", "Url": "https://attack.mitre.org/tactics/TA0002/", "Techniques": [ { "Name": "PowerShell", "Url": "https://attack.mitre.org/techniques/T1086" } ] } ] } ], "application": "sdistps1.exe", "note": "", "isFlagged": false, "error": null, "has_error": false }

Release Notes

  • v2.0.0 - Updated architecture to support IO via filesystem