Skip to content

Latest commit

 

History

History

falcon_intel_indicators

Folders and files

NameName
Last commit message
Last commit date

parent directory

..
 
 
 
 

Falcon Threat Intelligence Indicators

This page represents a stand-alone tool that uses Falcon Intelligence API to query the Intel Indicators and outputs those vulnerabilities in JSON format to the stdout. This tool can be used together with JSON parsing tools like jq in order to build reports of your liking.

Installation

go get github.com/crowdstrike/gofalcon/examples/falcon_intel_indicators

Exemplary Usage

Interactive Run:

$ FALCON_CLIENT_ID="abc" FALCON_CLIENT_SECRET="XYZ" FALCON_CLOUD=us-1 \
      falcon_intel_indicators
Missing --filter attribute. Please provide FQL (Falcon Query Language) expression for Intelligence Indicators search.
filter:

Providing FQL filter on command-line and counting the results.

$ FALCON_CLIENT_ID="abc" FALCON_CLIENT_SECRET="XYZ" FALCON_CLOUD=us-1 \
      falcon_intel_indicators \
      --filter="type:'url'+malicious_confidence:'Medium'"  | jq length

Filter out all the IOCs that have been deleted:

$ FALCON_CLIENT_ID="abc" FALCON_CLIENT_SECRET="XYZ" FALCON_CLOUD=us-1 \
      falcon_intel_indicators \
      --filter="deleted:false"  | jq length

Please Refer to Falcon Intel API documentation to learn more about FQL filter, about the meaning of the indicator entity properties, and best practices. Further, please refer to jq tool manual to learn how to effectively post-process JSON outputs in command-line.