| Name | Type | Description | Notes |
|---|---|---|---|
| summary | String | A markdown summary of the report | |
| softwareType | SoftwareTypeEnum | The type of software being analyzed | |
| totalNumberOfFunctions | Integer | The total number of functions identified in the binary | |
| numberOfAnalysedFunctions | Integer | The number of functions that were analyzed in the binary | |
| attackFlowSummary | String | A summary in markdown format of the attack flow | |
| ioCs | List<IOC> | A list of IOCs (Indicators of Compromise) found in the analysis | |
| executableTechniques | List<MITRETechnique> | A series of MITRE Techniques found | |
| yaraRule | String | The YARA rule generated for the binary |
| Name | Value |
|---|---|
| MALICIOUS | "Malicious" |
| BENIGN | "Benign" |
| POTENTIALLY_UNWANTED_APPLICATION_PUA_ | "Potentially Unwanted Application (PUA)" |
| LEGITIMATE | "Legitimate" |
| BACKDOORED_LEGITIMATE_SOFTWARE | "Backdoored Legitimate Software" |