YETI
Version: 2.0.0
Yeti is all about organizing observables, indicators of compromise, TTPs, and knowledge on threat actors in a single, unified repository.
Connect YETI with LogicHub
- Navigate to Automations > Integrations.
- Search for YETI.
- Click Details, then the + icon. Enter the required information in the following fields.
- Label: Enter a connection name.
- Reference Values: Define variables here to templatize integration connections and actions. For example, you can use https://www.{{hostname}}.com where, hostname is a variable defined in this input. For more information on how to add data, see 'Add Data' Input Type for Integrations.
- Verify SSL: Select option to verify connecting server's SSL certificate (Default is Verify SSL Certificate).
- Remote Agent: Run this integration using the LogicHub Remote Agent.
- Server Name or Hostname for YETI: Enter Server IP or Hostname where YETI is installed and running.
- Port Number for YETI: Enter Port Number for YETI instance.
- User: Username for YETI.
- Password: Password for YETI.
- After you've entered all the details, click Connect.
Actions for YETI
Lookup URL
Look up given URL or IP or File Hash in Yeti for the existence of malware.
Input Field
Choose a connection that you have previously created and then fill in the necessary information in the following input fields to complete the connection.
Input Name | Description | Required |
---|---|---|
Column Name to Pull IP or URL or File Hash from Parent Table | Column name to pull IP or URL or File Hash from the parent table. | Required |
Output
A JSON object analyzing the IP.
{
"result": "No result available as value of input is empty"
}
Release Notes
v2.0.0
- Updated architecture to support IO via filesystemv1.0.8
- Added documentation link in the automation library.
Updated about 1 year ago