Cmdlets
Get-FalconActor
Search for Falcon Intelligence threat actors. Permissions:Actors (Falcon Intelligence): Read
Threat actor identifier
Falcon Query Language expression to limit results
Perform a generic substring search across available fields
Property and direction to sort results. Valid values:
name|asc,name|desctarget_countries|asc,target_countries|desctarget_industries|asc,target_industries|desctype|asc,type|desccreated_date|asc,created_date|desclast_activity_date|asc,last_activity_date|desclast_modified_date|asc,last_modified_date|desc
Maximum number of results per request (1-5000)
Specific fields to return, or a predefined collection name surrounded by two underscores [default: basic]
Include additional information. Valid values:
tactic_and_techniquePosition to begin retrieving results
Retrieve detailed information
Repeat requests until all available results are retrieved
Display total result count instead of results
Example
Get-FalconAttck
Search for MITRE ATT&CK tactic and technique information related to specific actors. Permissions:Actors (Falcon Intelligence): Read
Tactic and technique identifier, by actor
Actor identifier (‘slug’)
Example
Get-FalconCve
Search for Falcon Intelligence CVE reports. Permissions:Vulnerabilities (Falcon Intelligence): Read
CVE identifier
Falcon Query Language expression to limit results
Perform a generic substring search across available fields
Property and direction to sort results
Maximum number of results per request
Position to begin retrieving results
Retrieve detailed information
Repeat requests until all available results are retrieved
Display total result count instead of results
Example
Get-FalconIndicator
Search for Falcon Intelligence indicators. Permissions:Indicators (Falcon Intelligence): Read
Indicator identifier
Falcon Query Language expression to limit results
Perform a generic substring search across available fields
Property and direction to sort results. Valid values:
id|asc,id|descindicator|asc,indicator|desctype|asc,type|descpublished_date|asc,published_date|desclast_updated|asc,last_updated|desc_marker|asc,_marker|desc
Maximum number of results per request (1-5000)
Include previously deleted indicators
Include related indicators
Position to begin retrieving results
Retrieve detailed information
Repeat requests until all available results are retrieved
Display total result count instead of results
Example
Get-FalconIntel
Search for Falcon Intelligence reports. Permissions:Reports (Falcon Intelligence): Read
Report identifier
Falcon Query Language expression to limit results
Perform a generic substring search across available fields
Property and direction to sort results. Valid values:
name|asc,name|desctarget_countries|asc,target_countries|desctarget_industries|asc,target_industries|desctype|asc,type|desccreated_date|asc,created_date|desclast_modified_date|asc,last_modified_date|desc
Maximum number of results per request (1-5000)
Specific fields, or a predefined collection name surrounded by two underscores [default: basic]
Position to begin retrieving results
Retrieve detailed information
Repeat requests until all available results are retrieved
Display total result count instead of results
Example
Get-FalconMalwareFamily
Search for Falcon Intelligence malware families. Permissions:Malware Families (Falcon Intelligence): Read
Malware family identifier
Falcon Query Language expression to limit results
Perform a generic substring search across available fields
Property and direction to sort results
Maximum number of results per request (1-5000)
Specific fields to return
Position to begin retrieving results
Retrieve MITRE TTP information for malware families
Retrieve detailed information
Repeat requests until all available results are retrieved
Display total result count instead of results
Example
Get-FalconRule
Search for Falcon Intelligence rulesets. Permissions:Rules (Falcon Intelligence): Read
Ruleset identifier
Ruleset type. Valid values:
common-event-formatcql-changelog,cql-master,cql-updatenetwitnesssnort-suricata-changelog,snort-suricata-master,snort-suricata-updateyara-changelog,yara-master,yara-update
Ruleset name
Ruleset description
Ruleset tag
Filter results to those created on or after a date
Filter results to those created on or before a date
Perform a generic substring search across available fields
Property and direction to sort results
Maximum number of results per request (1-5000)
Position to begin retrieving results
Retrieve detailed information
Repeat requests until all available results are retrieved
Display total result count instead of results
Example
Receive-FalconAttck
Download MITRE ATT&CK information for an actor. Permissions:Actors (Falcon Intelligence): Read
Export format. Valid values:
csv, json [default: json]Destination path (default: ./slug.format)
Actor identifier
Overwrite an existing file when present
Example
Receive-FalconIntel
Download a Falcon Intelligence report. Permissions:Reports (Falcon Intelligence): Read
Destination path (default: slug.pdf)
Report identifier
Overwrite an existing file when present
Example
Receive-FalconMalwareFamilyAttck
Download MITRE ATT&CK information for a malware family. Permissions:Malware Families (Falcon Intelligence): Read
Export format. Valid values:
CSV, JSON, JSON_NAVIGATOR [default: JSON]Destination path (default: ./slug.format)
Malware family identifier
Overwrite an existing file when present
Example
Receive-FalconRule
Download the most recent or a specific Falcon Intelligence ruleset. Permissions:Rules (Falcon Intelligence): Read
Ruleset type, used to retrieve the latest ruleset. Valid values:
common-event-formatcql-changelog,cql-master,cql-updatenetwitnesssnort-suricata-changelog,snort-suricata-master,snort-suricata-updateyara-changelog,yara-master,yara-update
Download the latest rule set only if it doesn’t have a matching ‘tags’ value
Restrict results to those modified after a provided date (HTTP, ANSIC or RFC850 format)
Destination path (must end with .gz, .gzip, or .zip)
Ruleset identifier, used for a specific ruleset
Overwrite an existing file when present
Example
Related Resources
IOC Management
Manage custom indicators of compromise
MalQuery
Hunt for malware samples using YARA
Sandbox Analysis
Submit and analyze files in Falcon Sandbox