Home
EN
Location
Documentation Home
Palo Alto Networks
Support
Live Community
Knowledge Base
Clear
AutoFocus® API Reference
:
General Artifacts
Updated on
Fri Sep 01 02:09:44 UTC 2023
Focus
Download PDF
Updated on
Fri Sep 01 02:09:44 UTC 2023
Focus
Home
AutoFocus
AutoFocus® API Reference
Perform AutoFocus Searches
Search Field Names
General Artifacts
Download PDF
AutoFocus® API Reference
General Artifacts
Table of Contents
Filter
Expand all
|
Collapse all
About the AutoFocus API
AutoFocus API Overview
AutoFocus API Prerequisites
AutoFocus API Rate Limits
Rate Limits and Points Allotment
How to Track Points
Points Usage
AutoFocus API Resources
Resources for Initiating Searches
Resources for Viewing Search Results
Resources for Direct Searches
AutoFocus API STIX Support
STIX Elements and Fields
Get Started with the AutoFocus API
Get Your API Key
Make Your First AutoFocus API Calls
Start a Search
View Results
Perform AutoFocus Searches
Search Samples and Sessions
Search Field Names
General Artifacts
Sample Artifacts
Session Artifacts
Analysis Artifacts
Linux Artifacts
Windows Artifacts
Mac Artifacts
Android Artifacts
Macro Artifacts
Search Parameter Types and Operators
Search Countries and Country Codes
Search Top Tags, Session Histogram, and Session Aggregate Data
Search for Signatures
View Search Results
Perform Direct Searches
Get Session Details
Get Sample Analysis
Get Tags
Get Tag Details
Get Threat Indicator Feed
Get Custom Threat Indicator Feed
Get Threat Intelligence Card Summary
Export List
Get Anti-spyware, Vulnerability, and File-Format Signature
Get Antivirus Signature
Get DNS Signature
Get Geolocation
Get Anti-spyware, Vulnerability, and File-Format Release Info
AutoFocus API Error Codes
AutoFocus API Error Codes
General Artifacts
The following table provides field names and related information for general artifacts.
Field Name
Artifact Type as it Appears on AutoFocus Web Portal
Field Type
Acceptable Values and Examples
alias.domain
Domain
domain
Domain seen within DNS Activity, HTTP Activity, or File URL.
alias.email
Email Address
alias
Email address seen within email recipient address or email sender address.
alias.filename
Filename
alias
Valid filename as detected within a session or File Activity field.
alias.hash
Hash
alias
Valid SHA256, SHA1, or MD5 hash
Example:
eb4559d2debb5de11b3a90536ef36709de394b91c1e9a981e4987c4c02036b52
alias.ip_address
IP Address
alias
A IP address as it appears in connection activity, DNS activity, or HTTP activity.
sample.tag
Tag
tagList
Valid AutoFocus tag.
Example:
Parite
sample.tag_alias
Tag Alias
typeAheadSelect
Valid AutoFocus tag alias.
Example:
CryptoHost
sample.tag_class
Tag Class
simpleSelect
Actor:
actor
Campaign:
campaign
Malware Family:
family
Exploit:
exploit
Malicious Behavior:
malicious_behavior
sample.tag_group
Tag Group
simpleSelect
Valid AutoFocus tag group.
Example:
Ransomware
sample.tag_scope
Tag Scope
simpleSelect
Private:
private
Public:
public
Information:
commodity
Unit 42:
unit42
sample.tag_source
Tag Source
simpleSelect
Valid tag source.
Example:
Unit 42
sample.threat_name
Threat Name
typeAheadSelect
Valid threat name.
Example:
TDSS/Win32.fey.a
alias.url
URL
url
Valid File URL or URL as detected in HTTP activity.
alias.user_agent
User Agent
alias
Valid browser user agent as detected in HTTP Activity or User Agent Fragments.
Previous
Search Field Names
Next
Sample Artifacts