Publisher: Phantom
Connector Version: 1.0.36
Product Vendor: CrowdStrike
Product Name: Falcon Host API
Product Version Supported (regex): ".*"
Minimum Product Version: 3.0.284
This app allows you to manage indicators of compromise (IOC) and investigate your endpoints on the Falcon Host API
This table lists the configuration variables required to operate Falcon Host API. These variables are specified when configuring a Falcon Host API asset in Splunk SOAR.
VARIABLE | REQUIRED | TYPE | DESCRIPTION |
---|---|---|---|
baseurl | required | string | API Base URL |
verify_server_cert | required | boolean | Verify server certificate |
user | required | string | Falcon API User |
key | required | password | Falcon API Key |
test connectivity - Validate the asset configuration for connectivity
hunt file - Hunt for a file on the network by querying for the hash
hunt domain - Get a list of device IDs on which the domain was matched
list processes - List processes that have recently used the IOC on a particular device
get process detail - Retrieve the details of a process that is running or that previously ran, given a process ID
get system info - Get details of a device, given the device ID
create alert - Upload one or more indicators that you want CrowdStrike to watch
get alert - Get the full definition of one or more indicators that are being watched
update alert - Update an indicator that has been uploaded
delete alert - Delete an indicator that is being watched
list alerts - Get a list of uploaded IOCs that match the search criteria
list endpoints - List all the endpoints/sensors configured on the device
set status - Set the state of a detection in Falcon Host
Validate the asset configuration for connectivity
Type: test
Read only: True
No parameters are required for this action
No Output
Hunt for a file on the network by querying for the hash
Type: investigate
Read only: True
PARAMETER | REQUIRED | DESCRIPTION | TYPE | CONTAINS |
---|---|---|---|---|
hash | required | File hash to search | string | hash sha256 sha1 md5 |
count_only | optional | Get endpoint count only | boolean |
DATA PATH | TYPE | CONTAINS | EXAMPLE VALUES |
---|---|---|---|
action_result.status | string | ||
action_result.parameter.count_only | boolean | ||
action_result.parameter.hash | string | hash sha256 sha1 md5 |
|
action_result.data.*.device_id | string | falcon device id |
|
action_result.summary.device_count | numeric | ||
action_result.message | string |
Get a list of device IDs on which the domain was matched
Type: investigate
Read only: True
PARAMETER | REQUIRED | DESCRIPTION | TYPE | CONTAINS |
---|---|---|---|---|
domain | required | Domain to search | string | domain |
count_only | optional | Get endpoint count only | boolean |
DATA PATH | TYPE | CONTAINS | EXAMPLE VALUES |
---|---|---|---|
action_result.status | string | ||
action_result.parameter.count_only | boolean | ||
action_result.parameter.domain | string | domain |
|
action_result.data.*.device_id | string | falcon device id |
|
action_result.summary.device_count | numeric | ||
action_result.message | string |
List processes that have recently used the IOC on a particular device
Type: investigate
Read only: True
Given a file hash or domain, the action will list all the processes that have either recently connected to the domain or interacted with the file that matches the supplied hash. Use the list endpoints actions to get the device id to run the action on.
PARAMETER | REQUIRED | DESCRIPTION | TYPE | CONTAINS |
---|---|---|---|---|
ioc | required | File Hash or Domain to use for searching | string | hash sha256 sha1 md5 domain |
id | required | Falcon Device ID to search on | string | falcon device id |
DATA PATH | TYPE | CONTAINS | EXAMPLE VALUES |
---|---|---|---|
action_result.status | string | ||
action_result.parameter.id | string | falcon device id |
|
action_result.parameter.ioc | string | hash sha256 sha1 md5 domain |
|
action_result.data.*.falcon_process_id | string | falcon process id |
|
action_result.summary | string | ||
action_result.message | string |
Retrieve the details of a process that is running or that previously ran, given a process ID
Type: investigate
Read only: True
PARAMETER | REQUIRED | DESCRIPTION | TYPE | CONTAINS |
---|---|---|---|---|
falcon_process_id | required | Process ID from previous Falcon IOC search | string | falcon process id |
DATA PATH | TYPE | CONTAINS | EXAMPLE VALUES |
---|---|---|---|
action_result.status | string | ||
action_result.parameter.falcon_process_id | string | falcon process id |
|
action_result.data.*.command_line | string | ||
action_result.data.*.device_id | string | falcon device id |
|
action_result.data.*.file_name | string | file name |
|
action_result.data.*.process_id | string | pid |
|
action_result.data.*.process_id_local | string | pid |
|
action_result.data.*.start_timestamp | string | ||
action_result.data.*.start_timestamp_raw | string | ||
action_result.data.*.stop_timestamp | string | ||
action_result.data.*.stop_timestamp_raw | string | ||
action_result.summary | string | ||
action_result.message | string |
Get details of a device, given the device ID
Type: investigate
Read only: True
PARAMETER | REQUIRED | DESCRIPTION | TYPE | CONTAINS |
---|---|---|---|---|
id | required | Device ID from previous Falcon IOC search | string | falcon device id |
DATA PATH | TYPE | CONTAINS | EXAMPLE VALUES |
---|---|---|---|
action_result.status | string | success | |
action_result.parameter.id | string | falcon device id |
0498d1102b23481162ff846d0633e14c |
action_result.data.*.agent_load_flags | string | 3 | |
action_result.data.*.agent_local_time | string | 2015-07-31T14:07:42.816Z | |
action_result.data.*.agent_version | string | 2.0.0010.3005 | |
action_result.data.*.bios_manufacturer | string | Phoenix Technologies LTD | |
action_result.data.*.bios_version | string | 6.00 | |
action_result.data.*.cid | string | md5 |
3f40c380adc74a3187c27252c0227cff |
action_result.data.*.config_id_base | string | 65994752 | |
action_result.data.*.config_id_build | string | 3005 | |
action_result.data.*.config_id_platform | string | 3 | |
action_result.data.*.device_id | string | falcon device id |
0498d1102b23481162ff846d0633e14c |
action_result.data.*.device_policies.prevention.applied | boolean | True | |
action_result.data.*.device_policies.prevention.applied_date | string | ||
action_result.data.*.device_policies.prevention.assigned_date | string | 2018-03-10T15:39:31.220730539Z | |
action_result.data.*.device_policies.prevention.policy_id | string | md5 |
f81459e0d85b4bc7b3ad14ad40889042 |
action_result.data.*.device_policies.prevention.policy_type | string | prevention | |
action_result.data.*.device_policies.prevention.settings_hash | string | 87cb8b2e | |
action_result.data.*.device_policies.sensor_update.applied | boolean | True False | |
action_result.data.*.device_policies.sensor_update.applied_date | string | ||
action_result.data.*.device_policies.sensor_update.assigned_date | string | 2018-03-10T15:39:31.220769757Z | |
action_result.data.*.device_policies.sensor_update.policy_id | string | md5 |
62a3908297584c52bdafaa7fdf3c3bdd |
action_result.data.*.device_policies.sensor_update.policy_type | string | sensor-update | |
action_result.data.*.device_policies.sensor_update.settings_hash | string | 65994753 | |
action_result.data.*.external_ip | string | ip |
50.18.218.205 |
action_result.data.*.first_seen | string | 2018-03-10T15:38:09Z | |
action_result.data.*.group_hash | string | sha256 |
e2a8b394c0e62960747ff5d64a335162b36ba4c5a54ee6499b438b94e5269ae8 |
action_result.data.*.groups | string | md5 |
873560309d1b4686a6cee666575e7a93 |
action_result.data.*.hostname | string | host name |
TheNarrowSea CentOS70 |
action_result.data.*.last_seen | string | 2018-03-10T15:39:34Z | |
action_result.data.*.machine_domain | string | domain |
VICTIMNET.local |
action_result.data.*.major_version | string | 6 | |
action_result.data.*.meta.version | string | 6 106635 | |
action_result.data.*.minor_version | string | 1 | |
action_result.data.*.modified_timestamp | string | 2018-03-10T15:40:09Z | |
action_result.data.*.os_version | string | Windows Server 2008 R2 CentOS 7 | |
action_result.data.*.ou | string | ||
action_result.data.*.platform_id | string | 0 3 | |
action_result.data.*.platform_name | string | Windows | |
action_result.data.*.policies.*.applied | boolean | True | |
action_result.data.*.policies.*.applied_date | string | ||
action_result.data.*.policies.*.assigned_date | string | 2018-03-10T15:39:31.220730539Z | |
action_result.data.*.policies.*.policy_id | string | md5 |
f81459e0d85b4bc7b3ad14ad40889042 |
action_result.data.*.policies.*.policy_type | string | prevention | |
action_result.data.*.policies.*.settings_hash | string | 87cb8b2e | |
action_result.data.*.product_type | string | 3 | |
action_result.data.*.product_type_desc | string | Server | |
action_result.data.*.provision_status | string | Provisioned | |
action_result.data.*.release_group | string | ||
action_result.data.*.site_name | string | Default-First-Site-Name | |
action_result.data.*.slow_changing_modified_timestamp | string | 2018-04-23T22:52:27Z | |
action_result.data.*.status | string | normal | |
action_result.data.*.system_manufacturer | string | VMware, Inc. | |
action_result.data.*.system_product_name | string | VMware Virtual Platform | |
action_result.summary.device_count | numeric | ||
action_result.summary.hostname | string | host name |
TheNarrowSea |
action_result.message | string | Hostname: TheNarrowSea | |
summary.total_objects | numeric | 1 | |
summary.total_objects_successful | numeric | 1 |
Upload one or more indicators that you want CrowdStrike to watch
Type: contain
Read only: False
Valid values for the policy parameter are:
- detect
Send a notification when the particular indicator has been detected on a host - none
Take no action when the particular indicator has been detected on a host. This is equivalent to turning the indicator off.
As of this writing the only valid value for the share_level parameter is red.
The expiration parameter is only valid for IP and Domains. As of this writing, if not specified, the Falcon API defaults to 30 days.
PARAMETER | REQUIRED | DESCRIPTION | TYPE | CONTAINS |
---|---|---|---|---|
ioc | required | Input domain, ip or hash ioc | string | hash sha256 sha1 md5 domain ip |
policy | required | Enforcement Policy (in case of detection) | string | |
share_level | optional | Indicator share level | string | |
expiration | optional | Alert lifetime in days (domains and ips only) | numeric | |
source | optional | Indicator Originating source | string | |
description | optional | Indicator description | string |
DATA PATH | TYPE | CONTAINS | EXAMPLE VALUES |
---|---|---|---|
action_result.status | string | ||
action_result.parameter.description | string | ||
action_result.parameter.expiration | numeric | ||
action_result.parameter.ioc | string | hash sha256 sha1 md5 domain ip |
|
action_result.parameter.policy | string | ||
action_result.parameter.share_level | string | ||
action_result.parameter.source | string | ||
action_result.data | string | ||
action_result.summary | string | ||
action_result.message | string | ||
summary.total_objects | numeric | ||
summary.total_objects_successful | numeric |
Get the full definition of one or more indicators that are being watched
Type: investigate
Read only: True
PARAMETER | REQUIRED | DESCRIPTION | TYPE | CONTAINS |
---|---|---|---|---|
ioc | required | Hash, ip or domain IOC to get details of | string | ip sha1 md5 sha256 domain |
DATA PATH | TYPE | CONTAINS | EXAMPLE VALUES |
---|---|---|---|
action_result.status | string | ||
action_result.parameter.ioc | string | ip sha1 md5 sha256 domain |
|
action_result.data.*.created_by | string | ||
action_result.data.*.created_timestamp | string | ||
action_result.data.*.description | string | ||
action_result.data.*.expiration_timestamp | string | ||
action_result.data.*.modified_by | string | ||
action_result.data.*.modified_timestamp | string | ||
action_result.data.*.policy | string | ||
action_result.data.*.share_level | string | ||
action_result.data.*.source | string | ||
action_result.data.*.type | string | ||
action_result.data.*.value | string | ||
action_result.summary | string | ||
action_result.message | string | ||
summary.total_objects | numeric | ||
summary.total_objects_successful | numeric |
Update an indicator that has been uploaded
Type: generic
Read only: False
PARAMETER | REQUIRED | DESCRIPTION | TYPE | CONTAINS |
---|---|---|---|---|
ioc | required | Hash, ip or domain IOC to update | string | ip sha1 md5 sha256 domain |
policy | optional | Enforcement policy (in case of detection) | string | |
share_level | optional | Indicator share level | string | |
expiration | optional | Alert lifetime in days (domains and ips only) | numeric | |
source | optional | Indicator originating source | string | |
description | optional | Indicator description | string |
DATA PATH | TYPE | CONTAINS | EXAMPLE VALUES |
---|---|---|---|
action_result.status | string | ||
action_result.parameter.description | string | ||
action_result.parameter.expiration | numeric | ||
action_result.parameter.ioc | string | ip sha1 md5 sha256 domain |
|
action_result.parameter.policy | string | ||
action_result.parameter.share_level | string | ||
action_result.parameter.source | string | ||
action_result.data | string | ||
action_result.summary | string | ||
action_result.message | string | ||
summary.total_objects | numeric | ||
summary.total_objects_successful | numeric |
Delete an indicator that is being watched
Type: correct
Read only: False
PARAMETER | REQUIRED | DESCRIPTION | TYPE | CONTAINS |
---|---|---|---|---|
ioc | required | Hash, ip or domain IOC from previous upload | string | ip sha1 md5 sha256 domain |
DATA PATH | TYPE | CONTAINS | EXAMPLE VALUES |
---|---|---|---|
action_result.status | string | ||
action_result.parameter.ioc | string | ip sha1 md5 sha256 domain |
|
action_result.data | string | ||
action_result.summary | string | ||
action_result.message | string | ||
summary.total_objects | numeric | ||
summary.total_objects_successful | numeric |
Get a list of uploaded IOCs that match the search criteria
Type: investigate
Read only: True
The list of IOCs are segregated by the ioc type in the action results. The action view will limit the display of each IOC type to 100, however the result will contian the complete list returned by the device.
Valid and default values for parameters are:
- type
- all
Search in all IOC types. This is the default - hash
Search for match of type sha256, sha1 and md5 - ipv4
- sha256
- sha1
- md5
- domain
- all
- policy
Please see the documentation of the create alert action for an explaination of the policy values- all
This is the default - detect
- none
This is a valid string value for the policy parameter
- all
- share_level
- all
This is the default - red
- all
Every alert has an expiration time set (configured date and time when the alert will expire), use the from_expiration and to_expiration fields to return the alerts whose expiration time and date falls within the specified range. For e.g. to list all the alerts that expire between 1st August 2016 to 1st September 2016 use the from and to expiration dates as 2016-08-01T00:00:00Z and 2016-09-01T00:00:00Z respectively.
PARAMETER | REQUIRED | DESCRIPTION | TYPE | CONTAINS |
---|---|---|---|---|
ioc | optional | Hash, ip or domain IOC to match | string | hash ip sha1 md5 sha256 domain |
type | optional | Indicator type | string | |
policy | optional | Enforcement policy | string | |
share_level | optional | Indicator share level | string | |
source | optional | The source of indicators | string | |
from_expiration | optional | The earliest indicator expiration date (RFC3339) | string | |
to_expiration | optional | The latest indicator expiration date (RFC3339) | string |
DATA PATH | TYPE | CONTAINS | EXAMPLE VALUES |
---|---|---|---|
action_result.status | string | ||
action_result.parameter.from_expiration | string | ||
action_result.parameter.ioc | string | hash ip sha1 md5 sha256 domain |
|
action_result.parameter.ph | string | ||
action_result.parameter.policy | string | ||
action_result.parameter.share_level | string | ||
action_result.parameter.source | string | ||
action_result.parameter.to_expiration | string | ||
action_result.parameter.type | string | ||
action_result.data.*.domain | string | domain |
|
action_result.data.*.ip | string | ip |
|
action_result.data.*.md5 | string | hash md5 |
|
action_result.data.*.sha1 | string | hash sha1 |
|
action_result.data.*.sha256 | string | hash sha256 |
|
action_result.summary.alerts_found | numeric | ||
action_result.summary.total_domain | numeric | ||
action_result.summary.total_ip | numeric | ||
action_result.summary.total_md5 | numeric | ||
action_result.summary.total_sha1 | numeric | ||
action_result.summary.total_sha256 | numeric | ||
action_result.message | string | ||
summary.total_objects | numeric | ||
summary.total_objects_successful | numeric |
List all the endpoints/sensors configured on the device
Type: investigate
Read only: True
Filtering:
The Filter parameter allows you to search for specific devices in your environment by platform, host name, IP, or a number of other parameters. The filter must be made in the format FIELD: ’VALUE’. The value for the field must be a string enclosed by single quotes:platform_name:'Windows'
Some numerical fields support filtering with operators. Supported operators include: >, <, =, >=, <=, and != . Using filter operators, it is possible to conduct searches like; show me all devices that have been active in the 7 days before July 31 2016:last_seen:>'2016-07-24'
Wildcards are also supported for host name search. For example, you could do a partial search for a device called "my-host-name" like so:hostname:'my-host-na*'
You can also use multiple filter statements, the filters are applied sequentially, each search is executed and then the subsequent search is done over the filtered results.
There are two logical operators, a plus sign (+) is used for AND, and comma separated statements in brackets ([,]) are used for OR. Using logical operators, it is possible to conduct searches like; show me all devices that have been active in the 7 days before July 31 2016 AND devices where the platform is Windows OR Mac:last_seen:>'2016-07-24'+platform_name:['Windows','Mac']
.
PARAMETER | REQUIRED | DESCRIPTION | TYPE | CONTAINS |
---|---|---|---|---|
offset | optional | Offset in list of endpoints | numeric | |
limit | optional | Max endpoints | numeric | |
filter | optional | Filter to limit endpoints | string |
DATA PATH | TYPE | CONTAINS | EXAMPLE VALUES |
---|---|---|---|
action_result.status | string | success | |
action_result.parameter.filter | string | ||
action_result.parameter.limit | string | ||
action_result.parameter.offset | string | ||
action_result.data.*.agent_load_flags | string | 0 | |
action_result.data.*.agent_local_time | string | 2018-03-22T16:38:22.750Z | |
action_result.data.*.agent_version | string | 2.27.1804.0 | |
action_result.data.*.bios_manufacturer | string | Phoenix Technologies LTD | |
action_result.data.*.bios_version | string | 6.00 | |
action_result.data.*.cid | string | md5 |
3f40c380adc74a3187c27252c0227cff |
action_result.data.*.config_id_base | string | 65994753 | |
action_result.data.*.config_id_build | string | 1804 | |
action_result.data.*.config_id_platform | string | 8 | |
action_result.data.*.device_id | string | falcon device id |
bfb4ebc6bca04c97592e4f69003aee40 |
action_result.data.*.device_policies.global_config.applied | boolean | True False | |
action_result.data.*.device_policies.global_config.applied_date | string | 2018-03-14T00:09:10.673728368Z | |
action_result.data.*.device_policies.global_config.assigned_date | string | 2018-03-14T00:06:29.224753262Z | |
action_result.data.*.device_policies.global_config.policy_id | string | md5 |
d4dd68c990ee40bca1d5ed56b07cdde6 |
action_result.data.*.device_policies.global_config.policy_type | string | globalconfig | |
action_result.data.*.device_policies.global_config.settings_hash | string | 614387e8 | |
action_result.data.*.device_policies.prevention.applied | boolean | True False | |
action_result.data.*.device_policies.prevention.applied_date | string | 2017-07-27T09:37:31.945581204Z | |
action_result.data.*.device_policies.prevention.assigned_date | string | 2017-07-27T09:35:32.555314541Z | |
action_result.data.*.device_policies.prevention.policy_id | string | md5 |
f81459e0d85b4bc7b3ad14ad40889042 |
action_result.data.*.device_policies.prevention.policy_type | string | prevention | |
action_result.data.*.device_policies.prevention.settings_hash | string | 87cb8b2e | |
action_result.data.*.device_policies.sensor_update.applied | boolean | True False | |
action_result.data.*.device_policies.sensor_update.applied_date | string | ||
action_result.data.*.device_policies.sensor_update.assigned_date | string | 2018-04-23T22:07:05.888228775Z | |
action_result.data.*.device_policies.sensor_update.policy_id | string | md5 |
9d4fd29a70a34612b34157db8b5a5b6d |
action_result.data.*.device_policies.sensor_update.policy_type | string | sensor-update | |
action_result.data.*.device_policies.sensor_update.settings_hash | string | 65994753 | |
action_result.data.*.external_ip | string | ip |
50.254.133.53 |
action_result.data.*.first_seen | string | 2017-03-28T10:49:06Z | |
action_result.data.*.group_hash | string | sha256 |
e2a8b394c0e62960747ff5d64a335162b36ba4c5a54ee6499b438b94e5269ae8 |
action_result.data.*.groups | string | md5 |
873560309d1b4686a6cee666575e7a93 |
action_result.data.*.hostname | string | host name |
CentOS70 |
action_result.data.*.last_seen | string | 2018-04-23T22:07:06Z | |
action_result.data.*.local_ip | string | ip |
10.2.18.225 |
action_result.data.*.mac_address | string | 00-50-56-9e-34-e4 | |
action_result.data.*.machine_domain | string | domain |
id1.eng.cyphort.com |
action_result.data.*.major_version | string | 3 | |
action_result.data.*.meta.version | string | 106621 | |
action_result.data.*.minor_version | string | 10 | |
action_result.data.*.modified_timestamp | string | 2018-04-23T22:08:19Z | |
action_result.data.*.os_version | string | CentOS 7 | |
action_result.data.*.ou | string | Domain Controllers | |
action_result.data.*.platform_id | string | 3 | |
action_result.data.*.platform_name | string | Linux | |
action_result.data.*.policies.*.applied | boolean | True False | |
action_result.data.*.policies.*.applied_date | string | 2017-07-27T09:37:31.945581204Z | |
action_result.data.*.policies.*.assigned_date | string | 2017-07-27T09:35:32.555314541Z | |
action_result.data.*.policies.*.policy_id | string | md5 |
f81459e0d85b4bc7b3ad14ad40889042 |
action_result.data.*.policies.*.policy_type | string | prevention | |
action_result.data.*.policies.*.settings_hash | string | 87cb8b2e | |
action_result.data.*.product_type | string | 1 | |
action_result.data.*.product_type_desc | string | Workstation | |
action_result.data.*.provision_status | string | Provisioned | |
action_result.data.*.release_group | string | ||
action_result.data.*.site_name | string | Default-First-Site-Name | |
action_result.data.*.slow_changing_modified_timestamp | string | 2018-04-23T22:08:19Z | |
action_result.data.*.status | string | normal | |
action_result.data.*.system_manufacturer | string | VMware, Inc. | |
action_result.data.*.system_product_name | string | VMware Virtual Platform | |
action_result.summary.device_count | numeric | 100 | |
action_result.message | string | Device count: 100 | |
summary.total_objects | numeric | 1 | |
summary.total_objects_successful | numeric | 1 |
Set the state of a detection in Falcon Host
Type: generic
Read only: False
The detection id can be obtained from the Crowdstrike UI.
Valid values for the state parameter are new, in_progress, true_positive, false_positive and ignored.
PARAMETER | REQUIRED | DESCRIPTION | TYPE | CONTAINS |
---|---|---|---|---|
id | required | Detection ID to set the state of | string | falcon detection id |
state | required | State to set | string |
DATA PATH | TYPE | CONTAINS | EXAMPLE VALUES |
---|---|---|---|
action_result.status | string | ||
action_result.parameter.id | string | falcon detection id |
|
action_result.parameter.state | string | ||
action_result.data | string | ||
action_result.summary | string | ||
action_result.message | string | ||
summary.total_objects | numeric | ||
summary.total_objects_successful | numeric |