Abnormal Security

Version: 1.3.1

Abnormal Security is for managing threats to an organisation identified by Abnormal Security. The organisation should be integrated with Abnormal Security and enabled for real-time detection of malicious emails.

Connect Abnormal Security with LogicHub

  1. Navigate to Automations > Integrations.
  2. Search for Abnormal Security.
  3. Click Details, then the + icon. Enter the required information in the following fields.
    • Label: Enter a connection name.
    • Reference Values: Define variables here to templatize integration connections and actions. For example, you can use https://www.{{hostname}}.com where, hostname is a variable defined in this input. For more information on how to add data, see 'Add Data' Input Type for Integrations.
    • Verify SSL: Select option to verify connecting server's SSL certificate (Default is Verify SSL Certificate).
    • Remote Agent: Run this integration using the LogicHub Remote Agent.
    • API Key: The API key required for authentication with Abnormal Security APIs.
  4. After you've entered all the details, click Connect.

Actions for Abnormal Security

List Threats

Fetches a list of the IDs of the top 100 threats identified in Threat Log.

Input Field

Choose a connection that you have previously created and then fill in the necessary information in the following input fields to complete the connection.

Input NameDescriptionRequired
FilterJinja-templated text containing the value of filter. Example: receivedTime gte 2020-01-01T01:01:01Z lte {{time}}Optional
LimitNumber of results to fetch (Default is 100000). Has no effect if filter is not specified. Example: 100Optional
Extra paramsJinja-templated text containing the JSON of params to be sent. Example: {"subject":"sub1","topic":"Abnormal Activity"}Optional

Output

An array of objects containing information about the threatId.

{
   "error":null,
   "has_error":false,
   "threatId":"6124bd9c-9f4e-c0a8-3994-43a7a7e87f3f"
}

Threat Details

Get details of a threat by threat ID.

Input Field

Choose a connection that you have previously created and then fill in the necessary information in the following input fields to complete the connection.

Input NameDescriptionRequired
Threat IDColumn name from the parent table containing UUID of the threat.Required

Output

A JSON object containing information about the threat.

{
   "threatId":"424ca4a6-9bb9-d0f5-1683-c77d262e6ee0",
   "messages":[
      {
         "threatId":"424ca4a6-9bb9-d0f5-1683-c77d262e6ee0",
         "autoRemediated":false,
         "postRemediated":false,
         "attackType":"Reconnaissance",
         "attackStrategy":"Unknown Sender",
         "returnPath":"[email protected]",
         "replyToEmails":[
            
         ],
         "ccEmails":[
            
         ],
         "senderIpAddress":"",
         "impersonatedParty":"None / Others",
         "attackVector":"Text",
         "attachmentNames":[
            
         ],
         "summaryInsights":[
            "Unusual Sender"
         ],
         "remediationTimestamp":"2021-02-19T15:59:38Z",
         "isRead":false,
         "attackedParty":"Employee (other)",
         "abxMessageId":-7922944339592178420,
         "abxPortalUrl":"https://portal.abnormalsecurity.com/home/threat-center/remediation-history/-7922944339592178420",
         "subject":"test",
         "fromAddress":"[email protected]",
         "fromName":"Anna Romano",
         "toAddresses":"[email protected]",
         "recipientAddress":"[email protected]",
         "receivedTime":"2021-02-19T15:59:34Z",
         "sentTime":"2021-02-19T15:59:30Z",
         "internetMessageId":"<[email protected]od.outlook.com>",
         "urls":[
            
         ]
      }
   ],
   "error":null,
   "has_error":false
}

Manage Threat

Use this action to remediate or unremediate a threat. If the request is found to be something that can be processed, the server will an actionId and status URL in the response. This can be used to check the status of the request.

Input Field

Choose a connection that you have previously created and then fill in the necessary information in the following input fields to complete the connection.

Input NameDescriptionRequired
Threat IDColumn name from the parent table containing UUID of the threat.Required
ActionSelect action that is to be taken on this threat. Default is RemediateRequired

Output

A JSON object containing information about the threat.

{
   "action_id":"3f506ad7-ed61-4b4a-8d5f-b842b48116d8",
   "status_url":"http://api.abnormalplatform.com/v1/threats/424ca4a6-9bb9-d0f5-1683-c77d262e6ee0/actions/3f506ad7-ed61-4b4a-8d5f-b842b48116d8",
   "error":null,
   "has_error":false
}

Threat Action Status

Check the status of an action requested on a threat.

Input Field

Choose a connection that you have previously created and then fill in the necessary information in the following input fields to complete the connection.

Input NameDescriptionRequired
Threat IDColumn name from the parent table containing UUID of the threat.Required
Action IDColumn name from the parent table containing action ID for a threat.Required

Output

A JSON object containing information about the current status of the action performed on the threat.

{
   "status":"done",
   "description":"The request was completed successfully",
   "error":null,
   "has_error":false
}

List Cases

A list of the top 100 cases identified in Abnormal Cases.

Input Field

Choose a connection that you have previously created to complete the connection.

Output

An array of JSON object containing information about the caseId.

{
   "caseId":96609,
   "error":null,
   "has_error":false,
   "severity":"Suspicious Account Activity"
}

Case Details

Get details of an abnormal case.

Input Field

Choose a connection that you have previously created and then fill in the necessary information in the following input fields to complete the connection.

Input NameDescriptionRequired
Case IDColumn name from the parent table containing case ID.Required

Output

A JSON object containing information about the case.

{
   "caseId":96609,
   "severity":"Suspicious Account Activity",
   "affectedEmployee":"[email protected]",
   "firstObserved":"2021-02-17T09:00:13Z",
   "error":null,
   "has_error":false
}

Manage Case

Use this action to acknowledge or take another remediation action on a case. If the request is found to be something that can be processed, the server will return an actionId and status URL in the response. This can be used to check the status of the request.

Input Field

Choose a connection that you have previously created and then fill in the necessary information in the following input fields to complete the connection.

Input NameDescriptionRequired
Case IDColumn name from the parent table containing case ID.Required
ActionJinja-templated text containing action that is to be taken on this case.
Example: {{column_from_parent}}
Required

Output

A JSON object containing information about the action ID of the action that was performed.

{
   "action_id":"48244c42-a1a5-42f6-9c2d-3783bd67c554",
   "status_url":"http://api.abnormalplatform.com/v1/cases/96609/actions/48244c42-a1a5-42f6-9c2d-3783bd67c554",
   "error":null,
   "has_error":false
}

Case Action Status

Check the status of an action requested on a case.

Input Field

Choose a connection that you have previously created and then fill in the necessary information in the following input fields to complete the connection.

Input NameDescriptionRequired
Case IDColumn name from the parent table containing case ID.Required
Action IDColumn name from the parent table containing action ID for a case.Required

Output

A JSON object containing information about the status and description of the action that was performed.

{
   "status":"done",
   "description":"The request was completed successfully",
   "error":null,
   "has_error":false
}

Threat Intel (Beta)

Action to get the latest threat intel feed.

Input Field

Choose a connection that you have previously created to complete the connection.

Output

Feed of threat intelligence in Structured Threat Information Expression (STIX) format.

Case Report Misjudgement

To report a false negative or a false positive judgement by Abnormal Security.

Input Field

Choose a connection that you have previously created and then fill in the necessary information in the following input fields to complete the connection.

Input NameDescriptionRequired
Report TypeJinja-templated text containing report type Example: {{parent_table_report_type}}.Required
ReporterJinja-templated text containing reporter Example: {{parent_table_reporter}}.Required
SubjectJinja-templated text subject Example: {{parent_table_subject}}.Required
Recipient Email AddressJinja-templated text containing recipient email address. Example: {{parent_table_recipient_email_address}}.Required
Sender Email AddressJinja-templated text containing sender email address. Example: {{[parent_table_sender_email_address}}.Required

Output

A JSON object containing information.

{
   "detail":"Thank you for your feedback! We have sent your inquiry to our support staff.",
   "error":null,
   "has_error":false
}

Get Detection 360 Report

Get a list of Detection 360deg reports that you have submitted and view corresponding details for each case, including report summaries, statuses, message analyses, and more.

Input Field

Choose a connection that you have previously created and then fill in the necessary information in the following input fields to complete the connection.

Input NameDescriptionRequired
Inquiry TypeJinja-templated text containing inquiry type. Example: {{inquiry_type}}.Required
StartJinja-templated text containing the start of the datetime range, as a Unix timestamp (seconds since 1 January 1970), to fetch Detection 360° cases from as a Unix timestamp. Defaults to 30 days before end. Example. 2022-10-20T00:00:00ZOptional
EndJinja-templated text containing the end of the datetime range, as a Unix timestamp (seconds since 1 January 1970), to fetch Detection 360° cases from. Defaults to the current time. Example. 2022-10-20T00:00:00ZOptional
StatusJinja-templated text containing the comma separated status. Only Detection 360° cases with these statuses will be retrieved. Defaults to all statuses. Example: UNREVIEWED,CONTAINING_ATTACKOptional

Output

JSON containing the following items:

{
  "result": [
    {
      "id": 3454,
      "inquiry_type": "MISSED_ATTACK",
      "messages": [
        {
          "id": -573453450000
        }
      ],
      "status": "RESOLVED",
      "submission_datetime": "2022-10-21T15:26:13Z",
      "submitted_by": {
        "email": "[email protected]",
        "name": "Xyz"
      },
      "report": {
        "analysis": "some random text",
        "root_causes": [
          {
            "name": "Detection False Negative",
            "description": "some random text"
          }
        ]
      }
    },
    {
      "id": 6788,
      "inquiry_type": "MISSED_ATTACK",
      "messages": [
        {
          "id": -27505413453455000
        }
      ],
      "status": "RESOLVED",
      "submission_datetime": "2022-10-12T15:11:59Z",
      "submitted_by": {
        "email": "[email protected]",
        "name": "Abc"
      },
      "report": {
        "analysis": "some random text",
        "root_causes": [
          {
            "name": "Not an Attack",
            "description": "some random text"
          }
        ]
      }
    }
  ],
  "error": null,
  "has_error": false
}

Release Notes

  • v1.3.1 - Added Get Detection 360 Report action.
  • v1.2.1 - Added Extra params optional field in List Threats action.

© 2017-2021 LogicHub®. All Rights Reserved.