Document toolboxDocument toolbox

Data Profiles

Threat data consists of file level fields and record-level fields. The table below contains descriptions of all available fields.

Data Profiles

Data Profiles

FIELD NAME

DESCRIPTION

File-level fields

profile

data profile id or name

record_type

host, ip, or url

external_id

string indicating an external ID to assign to the batch

record

surrounds the individual record(s) in the XML and JSON formats

Record-level fields

host

threat hostname

ip

threat IP address

url

threat URL

property

threat type

target

target of threat

detected

date/time threat was detected, in ISO 8601 format

duration

duration of this threat in XyXmXwXdXh format, expiration date will be set  to the detected date + this duration

XML format:

<feed>   <profile>SampleProfile</profile>   <record_type>ip</record_type>   <record>   <ip>127.1.0.1</ip>   <property>Phishing_Phish</property>   <detected>20170602T154742Z</detected>   </record>   <record>   <ip>8.8.8.8</ip> <property>Scanner_Generic</property>   <detected>19980927T154242Z</detected>   <duration>1y0m0w0d42h</duration>   </record>  </feed>

JSON format:

{   "feed": {   "profile": "SampleProfile",   "record_type": "host",   "record": [    {"host": "www.google.com", "property": "Scanner_Generic", "detected": "19980927T154242Z", "duration": "1y0m0w0d42h"},   {"host": "www.example.com", "property": "Phishing_Phish", "detected": "20170602T154742Z"}  ]   }  }

CSV format:

record_type,url,profile,detected,property  url,"https://example.com/page1.html", "SampleProfile","20170602T154742Z", "UnwantedContent_Parasite" url,"http://example.com/gift.html", "SampleProfile","20170602T154742Z", "Scam_FakeGiftCard"

 

 

Â