Skip to content

Latest commit

 

History

History
32 lines (20 loc) · 1.25 KB

File metadata and controls

32 lines (20 loc) · 1.25 KB

ReportAnalysisResponse

Properties

Name Type Description Notes
summary String A markdown summary of the report
softwareType SoftwareTypeEnum The type of software being analyzed
totalNumberOfFunctions Integer The total number of functions identified in the binary
numberOfAnalysedFunctions Integer The number of functions that were analyzed in the binary
attackFlowSummary String A summary in markdown format of the attack flow
ioCs List<IOC> A list of IOCs (Indicators of Compromise) found in the analysis
executableTechniques List<MITRETechnique> A series of MITRE Techniques found
yaraRule String The YARA rule generated for the binary

Enum: SoftwareTypeEnum

Name Value
MALICIOUS "Malicious"
BENIGN "Benign"
POTENTIALLY_UNWANTED_APPLICATION_PUA_ "Potentially Unwanted Application (PUA)"
LEGITIMATE "Legitimate"
BACKDOORED_LEGITIMATE_SOFTWARE "Backdoored Legitimate Software"