Publisher: ANYRUN FZCO
Connector Version: 1.1.0
Product Vendor: ANYRUN FZCO
Product Name: ANY.RUN
Product Version Supported (regex): ".*"
Minimum Product Version: 6.2.0.355
This app enables you to detonate files and URLs, and perform investigative actions, using the ANY.RUN interactive online malware sandbox service, thereby giving you automated analysis and advanced threat detection through an agentless sandbox
This connector requires an API key to authenticate with the ANY.RUN services. You can generate the key at your ANY.RUN Profile.
Official API documentation can be found here.
This connector is intended for customers with a 'Hunter' or 'Enterprise' subscription plans mainly, since some features provided by the connector are available with the mentioned plans only. Information about subscription plans and features available with them can be found here.
This connector comes with some additional python 3 libraries, that it depends on, including:
- aiosignal-1.3.1 (Apache License 2.0, Copyright 2013-2019 Nikolay Kim and Andrew Svetlov)
- async_timeout-4.0.3 (Apache License 2.0, Copyright 2016-2020 aio-libs collaboration)
- attrs-23.2.0 (MIT License, Copyright (c) 2015 Hynek Schlawack and the attrs contributors)
- multidict-6.0.5 (Apache License 2.0, Copyright 2016 Andrew Svetlov and aio-libs contributors)
- yarl-1.9.4 (Apache License 2.0, Copyright 2016-2021, Andrew Svetlov and aio-libs team)
- frozenlist-1.4.1 (Apache License 2.0, Copyright 2013-2019 Nikolay Kim and Andrew Svetlov)
- aiohttp-3.10.2 (Apache License 2.0, Copyright aio-libs contributors)
- anyrun_py-0.1.1
The below configuration variables are required for this Connector to operate. These variables are specified when configuring a ANY.RUN asset in SOAR.
VARIABLE | REQUIRED | TYPE | DESCRIPTION |
---|---|---|---|
anyrun_server | required | string | ANY.RUN base URL (e.g. https://api.any.run) |
anyrun_api_key | required | password | API Key used for API authentication |
anyrun_timeout | required | numeric | Number of seconds to wait for a request to timeout |
test connectivity - Validate the asset configuration for connectivity using supplied configuration
url reputation - Get reports of a specific URL analysis
file reputation - Get reports of a specific file analysis by that file's hash
domain reputation - Get reports of analyses, that involve specific domain
ip reputation - Get reports of analyses, that involve specific IP
get report - Get report for a submission
get iocs - Get list of IoCs for a submission
detonate url - Detonate a URL
detonate file - Detonate a file from Vault
get intelligence - Threat Intelligence IoC Lookup
Validate the asset configuration for connectivity using supplied configuration
Type: test
Read only: True
No parameters are required for this action
No Output
Get reports of a specific URL analysis
Type: investigate
Read only: True
This action requests a list of already completed reports of a URL analysis. Option search_in_public_tasks enables search in public submissions, which requires ANY.RUN TI License to work, and is disabled by default. By default, only 100 recent submissions from your own submission history are used for search.
PARAMETER | REQUIRED | DESCRIPTION | TYPE | CONTAINS |
---|---|---|---|---|
url | required | URL (Size range: 2-256) | string | url |
search_in_public_tasks | optional | Option for searching in public tasks (requires TI license) | boolean |
DATA PATH | TYPE | CONTAINS | EXAMPLE VALUES |
---|---|---|---|
action_result.parameter.url | string | url |
|
action_result.parameter.search_in_public_tasks | boolean | ||
action_result.data.*.tasks.*.uuid | string | anyrun task id |
0cf223f2-530e-4a50-b68f-563045268648 |
action_result.data.*.tasks.*.mainObject.name | string | ||
action_result.data.*.tasks.*.verdict | string | No threats detected Suspicious activity Malicious activity | |
action_result.data.*.tasks.*.related | string | https://app.any.run/tasks/0cf223f2-530e-4a50-b68f-563045268648 | |
action_result.data.*.tasks.*.date | string | 2024-01-01T00:00:00.000Z | |
action_result.data.*.tasks.*.file | string | https://content.any.run/tasks/0cf223f2-530e-4a50-b68f-563045268648/download/files/65c5ff68-b453-415c-abf9-0023ea44dd89 | |
action_result.data.*.tasks.*.misp | string | https://api.any.run/report/0cf223f2-530e-4a50-b68f-563045268648/summary/misp | |
action_result.data.*.tasks.*.pcap | string | https://content.any.run/tasks/0cf223f2-530e-4a50-b68f-563045268648/download/pcap | |
action_result.data.*.tasks.*.mainObject.hashes.md5 | string | hash md5 |
|
action_result.data.*.tasks.*.mainObject.hashes.sha1 | string | hash sha1 |
|
action_result.data.*.tasks.*.mainObject.hashes.sha256 | string | hash sha256 |
|
action_result.status | string | success failed | |
action_result.message | string | ||
summary.total_objects | numeric | 1 | |
summary.total_objects_successful | numeric | 1 |
Get reports of a specific file analysis by that file's hash
Type: investigate
Read only: True
This action requests a list of already completed reports of a file analysis. Option search_in_public_tasks enables search in public submissions, which requires ANY.RUN TI License to work, and is disabled by default. By default, only 100 recent submissions from your own submission history are used for search.
PARAMETER | REQUIRED | DESCRIPTION | TYPE | CONTAINS |
---|---|---|---|---|
hash | required | File hash ('MD5', 'SHA1', 'SHA256') (Size range: 2-256) | string | hash md5 sha1 sha256 |
search_in_public_tasks | optional | Option for searching in public tasks (requires TI license) | boolean |
DATA PATH | TYPE | CONTAINS | EXAMPLE VALUES |
---|---|---|---|
action_result.parameter.hash | string | hash md5 sha1 sha256 |
|
action_result.parameter.search_in_public_tasks | boolean | ||
action_result.data.*.tasks.*.uuid | string | anyrun task id |
0cf223f2-530e-4a50-b68f-563045268648 |
action_result.data.*.tasks.*.mainObject.name | string | ||
action_result.data.*.tasks.*.verdict | string | No threats detected Suspicious activity Malicious activity | |
action_result.data.*.tasks.*.related | string | https://app.any.run/tasks/0cf223f2-530e-4a50-b68f-563045268648 | |
action_result.data.*.tasks.*.date | string | 2024-01-01T00:00:00.000Z | |
action_result.data.*.tasks.*.file | string | https://content.any.run/tasks/0cf223f2-530e-4a50-b68f-563045268648/download/files/65c5ff68-b453-415c-abf9-0023ea44dd89 | |
action_result.data.*.tasks.*.misp | string | https://api.any.run/report/0cf223f2-530e-4a50-b68f-563045268648/summary/misp | |
action_result.data.*.tasks.*.pcap | string | https://content.any.run/tasks/0cf223f2-530e-4a50-b68f-563045268648/download/pcap | |
action_result.data.*.tasks.*.mainObject.hashes.md5 | string | hash md5 |
|
action_result.data.*.tasks.*.mainObject.hashes.sha1 | string | hash sha1 |
|
action_result.data.*.tasks.*.mainObject.hashes.sha256 | string | hash sha256 |
|
action_result.status | string | success failed | |
action_result.message | string | ||
summary.total_objects | numeric | 1 | |
summary.total_objects_successful | numeric | 1 |
Get reports of analyses, that involve specific domain
Type: investigate
Read only: True
This action requests a list of already completed reports of analyses, where requested domain was involved. This action requires ANY.RUN TI License.
PARAMETER | REQUIRED | DESCRIPTION | TYPE | CONTAINS |
---|---|---|---|---|
domainname | required | Domain name (Size range: 2-256) | string | domain |
DATA PATH | TYPE | CONTAINS | EXAMPLE VALUES |
---|---|---|---|
action_result.parameter.domainname | string | domain |
|
action_result.data.*.tasks.*.uuid | string | anyrun task id |
0cf223f2-530e-4a50-b68f-563045268648 |
action_result.data.*.tasks.*.mainObject.name | string | ||
action_result.data.*.tasks.*.verdict | string | No threats detected Suspicious activity Malicious activity | |
action_result.data.*.tasks.*.related | string | https://app.any.run/tasks/0cf223f2-530e-4a50-b68f-563045268648 | |
action_result.data.*.tasks.*.date | string | 2024-01-01T00:00:00.000Z | |
action_result.data.*.tasks.*.file | string | https://content.any.run/tasks/0cf223f2-530e-4a50-b68f-563045268648/download/files/65c5ff68-b453-415c-abf9-0023ea44dd89 | |
action_result.data.*.tasks.*.misp | string | https://api.any.run/report/0cf223f2-530e-4a50-b68f-563045268648/summary/misp | |
action_result.data.*.tasks.*.pcap | string | https://content.any.run/tasks/0cf223f2-530e-4a50-b68f-563045268648/download/pcap | |
action_result.data.*.tasks.*.mainObject.hashes.md5 | string | hash md5 |
|
action_result.data.*.tasks.*.mainObject.hashes.sha1 | string | hash sha1 |
|
action_result.data.*.tasks.*.mainObject.hashes.sha256 | string | hash sha256 |
|
action_result.status | string | success failed | |
action_result.message | string | ||
summary.total_objects | numeric | 1 | |
summary.total_objects_successful | numeric | 1 |
Get reports of analyses, that involve specific IP
Type: investigate
Read only: True
This action requests a list of already completed reports of analyses, where requested IP was involved. This action requires ANY.RUN TI License.
PARAMETER | REQUIRED | DESCRIPTION | TYPE | CONTAINS |
---|---|---|---|---|
ip | required | IP (Size range: 2-256) | string | ip |
DATA PATH | TYPE | CONTAINS | EXAMPLE VALUES |
---|---|---|---|
action_result.parameter.ip | string | ip |
|
action_result.data.*.tasks.*.uuid | string | anyrun task id |
0cf223f2-530e-4a50-b68f-563045268648 |
action_result.data.*.tasks.*.mainObject.name | string | ||
action_result.data.*.tasks.*.verdict | string | No threats detected Suspicious activity Malicious activity | |
action_result.data.*.tasks.*.related | string | https://app.any.run/tasks/0cf223f2-530e-4a50-b68f-563045268648 | |
action_result.data.*.tasks.*.date | string | 2024-01-01T00:00:00.000Z | |
action_result.data.*.tasks.*.file | string | https://content.any.run/tasks/0cf223f2-530e-4a50-b68f-563045268648/download/files/65c5ff68-b453-415c-abf9-0023ea44dd89 | |
action_result.data.*.tasks.*.misp | string | https://api.any.run/report/0cf223f2-530e-4a50-b68f-563045268648/summary/misp | |
action_result.data.*.tasks.*.pcap | string | https://content.any.run/tasks/0cf223f2-530e-4a50-b68f-563045268648/download/pcap | |
action_result.data.*.tasks.*.mainObject.hashes.md5 | string | hash md5 |
|
action_result.data.*.tasks.*.mainObject.hashes.sha1 | string | hash sha1 |
|
action_result.data.*.tasks.*.mainObject.hashes.sha256 | string | hash sha256 |
|
action_result.status | string | success failed | |
action_result.message | string | ||
summary.total_objects | numeric | 1 | |
summary.total_objects_successful | numeric | 1 |
Get report for a submission
Type: investigate
Read only: True
This action requires a submission TaskID.
PARAMETER | REQUIRED | DESCRIPTION | TYPE | CONTAINS |
---|---|---|---|---|
taskid | required | ANY.RUN task UUID | string | anyrun task id |
DATA PATH | TYPE | CONTAINS | EXAMPLE VALUES |
---|---|---|---|
action_result.parameter.taskid | string | anyrun task id |
0cf223f2-530e-4a50-b68f-563045268648 |
action_result.data.*.analysis.permanentUrl | string | https://app.any.run/tasks/0cf223f2-530e-4a50-b68f-563045268648 | |
action_result.data.*.analysis.reports.ioc | string | https://api.any.run/report/0cf223f2-530e-4a50-b68f-563045268648/ioc/json | |
action_result.data.*.analysis.reports.graph | string | https://content.any.run/report/0cf223f2-530e-4a50-b68f-563045268648/graph | |
action_result.data.*.analysis.scores.verdict.threatLevelText | string | No threats detected Suspicious activity Malicious activity | |
action_result.data.*.analysis.scores.verdict.threatLevel | numeric | 0 1 2 | |
action_result.data.*.analysis.scores.verdict.score | numeric | 100 | |
action_result.data.*.analysis.scores.specs.knownThreat | string | false true | |
action_result.data.*.analysis.content.mainObject.type | string | file download url | |
action_result.data.*.analysis.content.mainObject.url | string | ||
action_result.data.*.analysis.content.mainObject.filename | string | ||
action_result.data.*.analysis.content.mainObject.info.file | string | ||
action_result.data.*.analysis.content.mainObject.info.mime | string | ||
action_result.data.*.analysis.content.mainObject.hashes.sha256 | string | hash sha256 |
|
action_result.data.*.analysis.content.mainObject.hashes.sha1 | string | hash sha1 |
|
action_result.data.*.analysis.content.mainObject.hashes.md5 | string | hash md5 |
|
action_result.status | string | success failed | |
action_result.message | string | ||
summary.total_objects | numeric | 1 | |
summary.total_objects_successful | numeric | 1 |
Get list of IoCs for a submission
Type: investigate
Read only: True
This action requires a submission TaskID.
PARAMETER | REQUIRED | DESCRIPTION | TYPE | CONTAINS |
---|---|---|---|---|
taskid | required | ANY.RUN task UUID | string | anyrun task id |
DATA PATH | TYPE | CONTAINS | EXAMPLE VALUES |
---|---|---|---|
action_result.parameter.taskid | string | anyrun task id |
0cf223f2-530e-4a50-b68f-563045268648 |
action_result.data.*.ioc.*.ioc | string | ||
action_result.data.*.ioc.*.type | string | md5 sha1 sha256 domain ip url | |
action_result.data.*.ioc.*.category | string | ||
action_result.data.*.ioc.*.reputation | numeric | 0 1 2 | |
action_result.status | string | success failed | |
action_result.message | string | ||
summary.total_objects | numeric | 1 | |
summary.total_objects_successful | numeric | 1 |
Detonate a URL
Type: investigate
Read only: True
This action requires a URL for ANY.RUN service to analyse. All other parameters are optional - for more information about them refer to official documentation (https://any.run/api-documentation/).
PARAMETER | REQUIRED | DESCRIPTION | TYPE | CONTAINS |
---|---|---|---|---|
obj_url | required | URL to detonate (Size range: 5-512) | string | url |
obj_type | optional | Type of new task (Default: url) | string | |
os | optional | Operation System (Default: Windows10x64_complete) | string | |
env_locale | optional | Operation system's language (Default: en-US) | string | |
opt_network_connect | optional | Network connection state | boolean | |
opt_network_fakenet | optional | FakeNet feature status | boolean | |
opt_network_tor | optional | TOR using | boolean | |
opt_network_geo | optional | Geo location option (Default: fastest) | string | |
opt_network_mitm | optional | HTTPS MITM proxy option | boolean | |
opt_network_residential_proxy | optional | Residential proxy using | boolean | |
opt_network_residential_proxy_geo | optional | Residential proxy geo location option (Default: fastest) | string | |
opt_privacy_type | optional | Privacy settings (Default: bylink) | string | |
opt_timeout | optional | Timeout option (seconds) (Default: 60) (Size range: 10-1200) | numeric | |
opt_automated_interactivity | optional | Automated Interactivity (ML) option | boolean | |
obj_ext_startfolder | optional | Start object from (Default: temp) | string | |
obj_ext_cmd | optional | Optional command line (Size range: 2-256) | string | |
obj_ext_browser | optional | Browser name (Default: Google Chrome) | string | |
obj_ext_useragent | optional | User agent (Size range: 2-256) | string | |
obj_ext_extension | optional | Change extension to valid | boolean | |
opt_privacy_hidesource | optional | Option for hiding of source URL | boolean |
DATA PATH | TYPE | CONTAINS | EXAMPLE VALUES |
---|---|---|---|
action_result.parameter.obj_url | string | url |
|
action_result.parameter.obj_type | string | url download | |
action_result.parameter.os | string | ||
action_result.parameter.env_locale | string | ||
action_result.parameter.opt_network_connect | boolean | ||
action_result.parameter.opt_network_fakenet | boolean | ||
action_result.parameter.opt_network_tor | boolean | ||
action_result.parameter.opt_network_geo | string | ||
action_result.parameter.opt_network_mitm | boolean | ||
action_result.parameter.opt_network_residential_proxy | boolean | ||
action_result.parameter.opt_network_residential_proxy_geo | string | ||
action_result.parameter.opt_privacy_type | string | ||
action_result.parameter.opt_timeout | numeric | ||
action_result.parameter.opt_automated_interactivity | boolean | ||
action_result.parameter.obj_ext_startfolder | string | ||
action_result.parameter.obj_ext_cmd | string | ||
action_result.parameter.obj_ext_browser | string | ||
action_result.parameter.obj_ext_useragent | string | ||
action_result.parameter.obj_ext_extension | boolean | ||
action_result.parameter.opt_privacy_hidesource | boolean | ||
action_result.data.*.taskid | string | anyrun task id |
0cf223f2-530e-4a50-b68f-563045268648 |
action_result.data.*.permanentUrl | string | https://app.any.run/tasks/0cf223f2-530e-4a50-b68f-563045268648 | |
action_result.status | string | success failed | |
action_result.message | string | ||
summary.total_objects | numeric | 1 | |
summary.total_objects_successful | numeric | 1 |
Detonate a file from Vault
Type: investigate
Read only: True
This action requires a vauld ID of a file for ANY.RUN service to analyse. All other parameters are optional - for more information about them refer to official documentation (https://any.run/api-documentation/).
PARAMETER | REQUIRED | DESCRIPTION | TYPE | CONTAINS |
---|---|---|---|---|
vault_id | required | Vault ID of a file to detonate | string | vault id |
os | optional | Operation System (Default: Windows10x64_complete) | string | |
env_locale | optional | Operation system's language (Default: en-US) | string | |
opt_network_connect | optional | Network connection state | boolean | |
opt_network_fakenet | optional | FakeNet feature status | boolean | |
opt_network_tor | optional | TOR using | boolean | |
opt_network_geo | optional | Geo location option (Default: fastest) | string | |
opt_network_mitm | optional | HTTPS MITM proxy option | boolean | |
opt_network_residential_proxy | optional | Residential proxy using | boolean | |
opt_network_residential_proxy_geo | optional | Residential proxy geo location option (Default: fastest) | string | |
opt_privacy_type | optional | Privacy settings (Default: bylink) | string | |
opt_timeout | optional | Timeout option (seconds) (Default: 60) (Size range: 10-660) | numeric | |
opt_automated_interactivity | optional | Automated Interactivity (ML) option | boolean | |
obj_ext_startfolder | optional | Start object from (Default: temp) | string | |
obj_ext_cmd | optional | Optional command line (Size range: 2-256) | string | |
obj_ext_elevateprompt | optional | Encounter UAC prompts | boolean | |
auto_confirm_uac | optional | Auto confirm Windows UAC requests. Not applicable for Linux , use run_as_root instead | boolean | |
run_as_root | optional | Run file with superuser privileges. Not applicable for Windows, use auto_confirm_uac instead. Used only for file type | boolean | |
obj_ext_extension | optional | Change extension to valid | boolean |
DATA PATH | TYPE | CONTAINS | EXAMPLE VALUES |
---|---|---|---|
action_result.parameter.vault_id | string | vault id |
|
action_result.parameter.os | string | ||
action_result.parameter.env_locale | string | ||
action_result.parameter.opt_network_connect | boolean | ||
action_result.parameter.opt_network_fakenet | boolean | ||
action_result.parameter.opt_network_tor | boolean | ||
action_result.parameter.opt_network_geo | string | ||
action_result.parameter.opt_network_mitm | boolean | ||
action_result.parameter.opt_network_residential_proxy | boolean | ||
action_result.parameter.opt_network_residential_proxy_geo | string | ||
action_result.parameter.opt_privacy_type | string | ||
action_result.parameter.opt_timeout | numeric | ||
action_result.parameter.opt_automated_interactivity | boolean | ||
action_result.parameter.obj_ext_startfolder | string | ||
action_result.parameter.obj_ext_cmd | string | ||
action_result.parameter.obj_ext_elevateprompt | boolean | ||
action_result.parameter.auto_confirm_uac | boolean | ||
action_result.parameter.run_as_root | boolean | ||
action_result.parameter.obj_ext_extension | boolean | ||
action_result.data.*.taskid | string | anyrun task id |
0cf223f2-530e-4a50-b68f-563045268648 |
action_result.data.*.permanentUrl | string | https://app.any.run/tasks/0cf223f2-530e-4a50-b68f-563045268648 | |
action_result.status | string | success failed | |
action_result.message | string | ||
summary.total_objects | numeric | 1 | |
summary.total_objects_successful | numeric | 1 |
Threat Intelligence IoC Lookup
Type: investigate
Read only: True
Perform investigative actions by using the ANY.RUN Threat Intelligence Portal API method. This action requires ANY.RUN TI License. For more information about available parameters refer to official documentation (https://any.run/api-documentation/).
PARAMETER | REQUIRED | DESCRIPTION | TYPE | CONTAINS |
---|---|---|---|---|
sha256 | optional | Sha256 (Size range: 2-256) | string | hash sha256 |
sha1 | optional | Sha1 (Size range: 2-256) | string | hash sha1 |
md5 | optional | MD5 (Size range: 2-256) | string | hash md5 |
threatname | optional | Name of threat (Size range: 2-256) | string | |
threatlevel | optional | Threat level (Default: ) | string | |
tasktype | optional | Task run type (Default: ) | string | |
submissioncountry | optional | Submission country (Size range: 2-256) | string | |
os | optional | Operation system (Default: - not used) | string | |
ossoftwareset | optional | Operation system software (Default: - not used) | string | |
osbitversion | optional | Operation system bitness (Default: - not used) | numeric | |
registrykey | optional | Registry key (Size range: 2-256) | string | |
registryname | optional | Registry name (Size range: 2-256) | string | |
registryvalue | optional | Registry value (Size range: 2-256) | string | |
moduleimagepath | optional | Module image path (Size range: 2-256) | string | file path |
rulethreatlevel | optional | Rule threat level (Default: - not used) | string | |
rulename | optional | Rule name (Size range: 2-256) | string | |
mitre | optional | MITRE (Size range: 2-256) | string | |
imagepath | optional | Process image path (Size range: 2-256) | string | file path |
commandline | optional | Command line (Size range: 2-256) | string | process name |
injectedflag | optional | Injected flag (Default: - not used) | string | |
destinationip | optional | Destination ip (Size range: 2-256) | string | ip |
destinationport | optional | Destination port (Default: - not used) (Size range: 1-65535) | numeric | port |
destinationipasn | optional | Destination IPASN (Size range: 2-256) | string | |
destinationipgeo | optional | Destination IP Geo (Size range: 2-256) | string | |
domainname | optional | Domain name (Size range: 2-256) | string | domain |
filename | optional | File name (Size range: 2-256) | string | file name |
suricataclass | optional | Suricata class (Default: - not used) | string | |
suricatamessage | optional | Suricata message (Size range: 2-256) | string | |
suricatathreatlevel | optional | Suricata threat level (Default: - not used) | string | |
suricataid | optional | Suricata ID (Size range: 2-256) | string | |
url | optional | URL (Size range: 2-256) | string | url |
httprequestcontenttype | optional | HTTP request content type (Size range: 2-256) | string | |
httpresponsecontenttype | optional | HTTP response content type (Size range: 2-256) | string | |
httprequestfiletype | optional | HTTP request file type (Size range: 2-256) | string | |
httpresponsefiletype | optional | HTTP response file type (Size range: 2-256) | string |
DATA PATH | TYPE | CONTAINS | EXAMPLE VALUES |
---|---|---|---|
action_result.parameter.sha256 | string | hash sha256 |
|
action_result.parameter.sha1 | string | hash sha1 |
|
action_result.parameter.md5 | string | hash md5 |
|
action_result.parameter.threatname | string | ||
action_result.parameter.threatlevel | string | ||
action_result.parameter.tasktype | string | ||
action_result.parameter.submissioncountry | string | ||
action_result.parameter.os | string | ||
action_result.parameter.ossoftwareset | string | ||
action_result.parameter.osbitversion | numeric | ||
action_result.parameter.registrykey | string | ||
action_result.parameter.registryname | string | ||
action_result.parameter.registryvalue | string | ||
action_result.parameter.moduleimagepath | string | file path |
|
action_result.parameter.rulethreatlevel | string | ||
action_result.parameter.rulename | string | ||
action_result.parameter.mitre | string | ||
action_result.parameter.imagepath | string | file path |
|
action_result.parameter.commandline | string | ||
action_result.parameter.injectedflag | string | ||
action_result.parameter.destinationip | string | ip |
|
action_result.parameter.destinationport | numeric | port |
|
action_result.parameter.destinationipasn | string | ||
action_result.parameter.destinationipgeo | string | ||
action_result.parameter.domainname | string | domain |
|
action_result.parameter.filename | string | file name |
|
action_result.parameter.suricataclass | string | ||
action_result.parameter.suricatamessage | string | ||
action_result.parameter.suricatathreatlevel | string | ||
action_result.parameter.suricataid | string | ||
action_result.parameter.url | string | url |
|
action_result.parameter.httprequestcontenttype | string | ||
action_result.parameter.httpresponsecontenttype | string | ||
action_result.parameter.httprequestfiletype | string | ||
action_result.parameter.httpresponsefiletype | string | ||
action_result.data.*.summary.threatLevel | string | ||
action_result.data.*.summary.detectedType | string | ||
action_result.data.*.summary.lastSeen | string | ||
action_result.summary.*.Type | string | ||
action_result.summary.*.Count | numeric | ||
action_result.summary.*.str | string | ||
action_result.status | string | success failed | |
action_result.message | string | ||
summary.total_objects | numeric | 1 | |
summary.total_objects_successful | numeric | 1 |