Skip to content

Commit 4e88794

Browse files
committed
Adding d3fend technique tag
1 parent a143d1d commit 4e88794

File tree

1 file changed

+3
-1
lines changed

1 file changed

+3
-1
lines changed

playbooks/Cisco_Talos_Intelligence_Identifier_Reputation_Analysis.yml

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,13 +5,15 @@ date: '2025-01-17'
55
author: Kelby Shelton, Tapish Jain, Splunk
66
type: Investigation
77
description: "Accepts a URL, IP or Domain and provides intelligence on the objects. Generates a per observable report that includes the objects threat level, threat categories, acceptable use categories and score."
8-
playbook: CiscoTalosIntelligence_Identifier_Reputation_Analysis
8+
playbook: Cisco_Talos_Intelligence_Identifier_Reputation_Analysis
99
how_to_implement: This input playbook requires the Cisco Talos Intelligence connector to be configured and a Splunk SOAR cloud license.
1010
references:
1111
- https://d3fend.mitre.org/technique/d3f:IdentifierReputationAnalysis/
1212
app_list:
1313
- Cisco Talos Intelligence
1414
tags:
15+
defend_technique_id:
16+
- D3-IRA
1517
platform_tags:
1618
- reputation
1719
- url

0 commit comments

Comments
 (0)