Minerva Labs
Minerva Labs is cyber security company that offers a unique low footprint endpoint prevention platform.
Connect Minerva Labs with Devo SOAR
Navigate to Automations > Integrations.
Search for Minerva Labs.
Click Details, then the + icon. Enter the required information in the following fields.
Label: Enter a connection name.
Reference Values: Define variables here to templatize integration connections and actions. For example, you can use https://www.{{hostname}}.com where, hostname is a variable defined in this input. For more information on how to add data, see 'Add Data' Input Type for Integrations.
Verify SSL: Select option to verify connecting server's SSL certificate (Default is Verify SSL Certificate).
Remote Agent: Run this integration using the Devo SOAR Remote Agent.
Base URL: Base URL to connect to the Minerva Labs.
Username: Username to connect to the Minerva Labs.
Password: Password to connect to the Minerva Labs.
After you've entered all the details, click Connect.
Actions for Minerva Labs
Get Events
Retrieves the list of events according to the search query.
Input Field
Choose a connection that you have previously created and then fill in the necessary information in the following input fields to complete the connection.
Input Name | Description | Required |
---|---|---|
Query | Jinja-templated query containing the query. | Â |
Example: {{column1}} {{column2}}. | Required | Â |
Start Time | Enter the value for start time in | Â |
Example: 2020-12-01". | Optional | Â |
End Time | Enter the value for end time in | Â |
Example: 2020-12-02. | Optional | Â |
Max Results | The maximum number of results to return per call (Default is 100000). | Optional |
Output
A JSON object containing multiple rows of result:
has_error: True/False
error: message/null
result: List of events.
``` {json}{ "additionalAction": null, "additionalInformation": "", "affectedItems": null, "application": "wmiadap.exe", "archived": false, "armorVersion": "3.4.5.5801", "certificateInfo": "N/A", "certificateOriginalFileName": "", "certificateProductName": "", "description": "Process WMIADAP.exe queried an Endpoint Security Bypass Technique artifact", "endpoint": "gdvf87-05.dsa.mot-mobility.com", "error": null, "eventTypeSpecificInformation": { "loadedModules": "*.EXE, .dll, .DLL" }, "fileHash": "db844f69381751g8dbtb8c8a0c3b5d4e1c59491a203191ef283563c539a887", "firstReceivedTime": "2020-11-30T11:49:30.8197291", "fullAdditionalInformation": "{\r\n\n \"loadedModules\": \"*.EXE, .dll\"\r\n\n}", "fwLink": null, "generationTime": "2020-11-30T08:49:29.53", "groupName": "Default Group", "has_error": false, "id": "8839eccf-a881-4q93-9ae3-ad505d56a121", "isCertificateValid": true, "isFlagged": false, "localIp": "192.168.15.131", "md5": "0a3efbad56h5971ed36287d8e8829f55", "mitreTechniques": [], "new": true, "note": "", "parentProcessFullPath": "C:\Windows\System32\.exe", "processCommandLine": "*.exe /F /T", "processId": 14768, "processName": "\\?\C:\Windows\System32\\***.exe", "receivedIp": "200.158.46.62", "repeatsCounter": 1, "ruleCategory": "Endpoint Security Bypass Technique", "ruleName": "RES-1997_1_3", "serverReceivedTime": "2020-11-30T11:49:30.8197291", "severity": null, "simulated": false, "source": null, "threatId": null, "threatStatus": null, "type": "EvasionTechnique", "userName": "aaaa@aaaa nt" }
## Get Single Event by ID
Retrieves a single event by ID.
### Input Field
Choose a connection that you have previously created and then fill in the necessary information in the following input fields to complete the connection.
| Input Name | Description | Required |
| :--------- | :-------------------------------------------------------------- | :------- |
| Event ID | Column name from the parent table to lookup value for event ID. | Required |
### Output
A JSON object containing multiple rows of result:
- has_error: True/False
- error: message/null
- result: Event details.
``` {json}{
"firstSeenOnline": null,
"operatingSystem": null,
"agentType": null,
"processHierarchy": [
{
"processId": 3408,
"processName": "C:\\Program Files (x86)\\LANDesk\\Shared Files\\residentAgent.exe",
"processHash": "892f32a4f6d4e2c69cd0d7f393b1989784df5db1e641716d21b9d343f47b14efc5da6",
"processCommandLine": "",
"startTime": "2020-12-02T14:27:36.654Z",
"username": "***@NT AUTHORITY"
},
{
"processId": 14392,
"processName": "C:\\Program Files (x86)\\LANDesk\\LDClient\\SDCLIENT.EXE",
"processHash": "1dd171687a9cdfa9db8557170ac30fed6eb17707e744380bda20e464c667cf96",
"processCommandLine": "",
"startTime": "2020-12-04T00:59:46.755Z",
"username": ""
},
{
"processId": 1005667,
"processName": "C:\\Program Files (x86)\\LANDesk\\LDClient\\**.exe",
"processHash": "ffdeb16bebfa5ab5f8ba30d5e34281a6330a4e968d7efb5b8c637b58017217bb",
"processCommandLine": "\"C:\\Program Files (x86)\\LANDesk\\LDClient\\sdistps1.exe\"",
"startTime": "2020-12-04T10:18:13.706",
"username": "***@NT AUTHORITY"
}
],
"id": "62c79697-011f-4d69-ac0b-e6ca1bbf3046",
"description": "Process sdistps1.exe queried an Abusing Windows tools artifact",
"new": true,
"type": "MaliciousProcessRelationship",
"endpoint": "TIMHAHN-0.lenovo.com",
"processName": "C:\\Program Files (x86)\\LANDesk\\LDClient\\sdistps1.exe",
"fileHash": "ffdeb16bebfa5ab5f8ba30hj4d9d5e34281a6330a4e968d7efb5b8c637b58017217bb",
"md5": "bdb3dab1a768c5b40214bc47bb65f102",
"generationTime": "2020-12-04T10:18:13.706",
"serverReceivedTime": "2020-12-04T16:18:15.3837948",
"userName": "****@NT AUTHORITY",
"simulated": true,
"ruleName": "RES-1981_07_1086_0",
"armorVersion": "3.6.1.6153",
"archived": false,
"ruleCategory": "Abusing Windows tools",
"parentProcessFullPath": "C:\\Program Files (x86)\\LANDesk\\LDClient\\SDCLIENT.EXE",
"processId": 10056,
"receivedIp": "144.***.**(.1",
"localIp": "10.0.2.15",
"additionalInformation": "",
"processCommandLine": "\"C:\\Program Files (x86)\\LANDesk\\LDClient\\sdistps1.exe\"",
"certificateInfo": "O=\"LANDESK SOFTWARE, INC.\", L=SOUTH AS, S=UTAH, C=US",
"isCertificateValid": true,
"certificateProductName": "",
"certificateOriginalFileName": "",
"eventTypeSpecificInformation": {
"blockedCommandLine": "powershell -NonInteractive -EncodedCommand PAAjAAoAQwByAGUAYQB0AGUAIABmAHUAytbABsACAAZABpAHIAZQBjAHQAbwByAHkAIABwAGEAdABo\r\nAAoAIwA+AAoACgBOAGUAdwAtAEkAdABlAG0AIAAtAEkAdABlAG0AVAB5AHAAZQAgAEQAaQByAGUA\r\nYwB0AG8AcgB5ACAALQBQAGEAdABoACAAIgBjADoAXABwAHIAbwBnAHIAYQBtACAAZgBpAGwAZQBz\r\nAFwAbABvAGMAawBzAGMAcgBlAGUAbgBcACIAIAAtGAGkA\r\nbABlAHMAIAAoAHgAOAA2ACkAXABMAEEATgBEAGUAcwgyBrAFwATABEAEMAbABpAGUAbgB0AC8AcwBk\r\nAG0AYwBhAGMAaABlAC8AYQBwAHAALwBEAEMARwBMAG8AYwBrAFMAYwByAGUAZQBuAC8AQwBoAGEA\r\nbgBnAGUATABvAGMAawBTAGMAcgBlAGUAbgAuAGUAeABlACIAIAAKAAoAaQBmACAAKAAkAD8AIAAt\r\nAG4AZQAgACQAdAByAHUAZQApAAoAewAKACAAIAAgACAAZQB4AGkAdAAgADEACgB9AAoADQAKADsA\r\nIABlAHgAaQB0ACAAJABMAEEAUwBUAEUAWABJAFQAQwBPAEQARQA="
},
"repeatsCounter": 6,
"firstReceivedTime": "2020-12-04T01:00:13.5505131",
"groupName": "sssss-Sepcial",
"fullAdditionalInformation": "{\r\n\n \"blockedCommandLine\": \"powershell -NonInteractive -EncodedCommand PAAjAAoAQwByAGUAYQB0AGUAIABmAHUAbABsACAAZABpAHIAZQBjAHQAbwByAHkAIABwAGEAdABo\\r\\nAAoAIwA+AAoACgBOAGUAdwAtAEkAdABlAG0AIAAtAEkAdABlAG0AVAB5AHAAZQAgAEQAaQByAGUA\\r\\nYwB0AG8AcgB5ACAALQBQAGEAdABoACAAIgBjADoAXABwAHIAbwBnAHIAYQBtACAAZgBpAGwAZQBz\\r\\nAFwAbABvAGMAawBzAGMAcgBlAGUAbgBcACIAIAAtAEYAbwByAGMAZQAKAAoAaQBmACAAKAAkAD8A\\r\\nIAAtAG4AZQAgACQAdAByAHUAZQApAAoAewAKACAAIAFMAYwByAGUAZQBuAC8AQwBoAGEA\\r\\nbgBnAGUATABvAGMAawBTAGMAcgBlAGUAbgAuAGUAeABlACIAIAAKAAoAaQBmACAAKAAkAD8AIAAt\\r\\nAG4AZQAgACQAdAByAHUAZQApAAoAewAKACAAIAAgACAAZQB4AGkAdAAgADEACgB9AAoADQAKADsA\\r\\nIABlAHgAaQB0ACAAJABMAEEAUwBUAEUAWABJAFQAQwBPAEQARQA=\"\r\n\n}",
"source": null,
"threatId": null,
"threatStatus": null,
"affectedItems": null,
"severity": null,
"fwLink": null,
"additionalAction": null,
"mitreTechniques": [
{
"Name": "ATT&CK",
"Url": "https://attack.mitre.org/",
"Categories": [
{
"Name": "Execution",
"Url": "https://attack.mitre.org/tactics/TA0002/",
"Techniques": [
{
"Name": "PowerShell",
"Url": "https://attack.mitre.org/techniques/T1086"
}
]
}
]
}
],
"application": "sdistps1.exe",
"note": "",
"isFlagged": false,
"error": null,
"has_error": false
}
Release Notes
v2.0.0
- Updated architecture to support IO via filesystem