{"id":1039903,"date":"2021-11-05T22:16:08","date_gmt":"2021-11-06T02:16:08","guid":{"rendered":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/uncategorized\/building-best-of-both-worlds-automation-and-threat-intel-with-swimlane-and-virustotal-part-one-security-boulevard\/"},"modified":"2021-11-05T22:16:08","modified_gmt":"2021-11-06T02:16:08","slug":"building-best-of-both-worlds-automation-and-threat-intel-with-swimlane-and-virustotal-part-one-security-boulevard","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/automation\/building-best-of-both-worlds-automation-and-threat-intel-with-swimlane-and-virustotal-part-one-security-boulevard\/","title":{"rendered":"Building Best-of-Both-Worlds Automation and Threat Intel With Swimlane and VirusTotal  Part One &#8211; Security Boulevard"},"content":{"rendered":"<p><p>With extensive out-of-the-box integrations and an API-first architecture, Swimlane enables simple interoperability with any organizations existing security stack. Integrations for new and custom applications can also be easily developed using common scripting languages and a RESTful API.<\/p>\n<p>The new partnership between Swimlane and VirusTotal is a great example of this approach in action. In this two part blog series, well start by taking a look at how we work together, and in part two, well share step-by-step guidance for users looking to go live with this powerful technology integration.<\/p>\n<p>VirusTotals new VT Augment Widget feature gives Swimlane and other applications the ability to display up-to-date threat intelligence from right within the Swimlane platform, as well as returning immediately actionable intelligence detection ratios.<\/p>\n<p>This empowers analysts to drill down into the latest, most actionable intelligence and allows us to automate initial classification and triage from a single API call.<\/p>\n<p>How it works<\/p>\n<p>In order to integrate the new VT Augment functionality into Swimlane, we first had to decide how to architect the solution. The following workflow was decided upon, where:<\/p>\n<p>A Source Alert such as a Phishing Email or XDR Alert enters the Swimlane Platform<\/p>\n<p>External IP addresses<\/p>\n<p>Domains<\/p>\n<p>URLs<\/p>\n<p>File Hashes (SHA1\/SHA256\/MD5)<\/p>\n<p>query: The IOC for which we wish to obtain reputation information (required)<\/p>\n<p>fg1: The desired hex color of the main Widget text (optional)<\/p>\n<p>bg1: The desired primary background color in hex (optional)<\/p>\n<p>bg2: The desired secondary background color in hex (optional)<\/p>\n<p>bd1: The desired border color in hex (optional)<\/p>\n<p>url: The URL to use as an iframe src to display the VT Augment Widget<\/p>\n<p>detections: Number of positive VT engine detections <\/p>\n<p>total: Number of engines scanned against<\/p>\n<p>The returned detection ratio can be used to power initial determination of the IOCs maliciousness, and any automations based on prioritization or automatic determination of the IOCs nature. <\/p>\n<p>The returned URL is embedded in an iframe in a Swimlane Widget, where it remains ready for manual analysis<\/p>\n<p>When an analyst opens the Threat Intelligence Record for the IOC, the Widget automatically renders, displaying the full results of the investigation from VirusTotals VT Augment \/widget\/html endpoint.<\/p>\n<p>This workflow is documented in the following diagram:<\/p>\n<p>In part two, well walk through the process of adding VT Augment functionality to a Threat Intelligence Application in Swimlane.<\/p>\n<p>*** This is a Security Bloggers Network syndicated blog from Swimlane (en-US) authored by Nick Tausek. Read the original post at: <a href=\"https:\/\/swimlane.com\/blog\/building-best-of-both-worlds-automation-and-threat-intel-with-swimlane-and-virustotal-part-one\/\" rel=\"nofollow\">https:\/\/swimlane.com\/blog\/building-best-of-both-worlds-automation-and-threat-intel-with-swimlane-and-virustotal-part-one\/<\/a> <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Read more from the original source:<\/p>\n<p><a target=\"_blank\" rel=\"nofollow noopener\" href=\"https:\/\/securityboulevard.com\/2021\/11\/building-best-of-both-worlds-automation-and-threat-intel-with-swimlane-and-virustotal-part-one\/\" title=\"Building Best-of-Both-Worlds Automation and Threat Intel With Swimlane and VirusTotal  Part One - Security Boulevard\">Building Best-of-Both-Worlds Automation and Threat Intel With Swimlane and VirusTotal  Part One - Security Boulevard<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> With extensive out-of-the-box integrations and an API-first architecture, Swimlane enables simple interoperability with any organizations existing security stack. Integrations for new and custom applications can also be easily developed using common scripting languages and a RESTful API. The new partnership between Swimlane and VirusTotal is a great example of this approach in action <a href=\"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/automation\/building-best-of-both-worlds-automation-and-threat-intel-with-swimlane-and-virustotal-part-one-security-boulevard\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":9,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[187732],"tags":[],"class_list":["post-1039903","post","type-post","status-publish","format-standard","hentry","category-automation"],"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/1039903"}],"collection":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/users\/9"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/comments?post=1039903"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/1039903\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/media?parent=1039903"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/categories?post=1039903"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/tags?post=1039903"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}