: Get Tag Details
Focus
Focus

Get Tag Details

Table of Contents

Get Tag Details

Use this resource to get details on a specific public tag listed on the AutoFocus web portal.

Resource

/tag/{public_tag_name} /stix/tag/{public_tag_name}

Request Parameters

The following table describes parameters for Get Tag Details requests.
The public tag name request parameter is not case-sensitive.
Parameters
Description
Type
Example or Possible Values
public_tag_name
(
Required
) Public tag name as listed in the AutoFocus web portal. The public tag name is visible in the response when you Get Tags.
string
Example:
Unit42.CryptoWall

JSON Sample

Request

Include the public tag name to the request URL and include the API key within the request body.
curl -X POST -H "Content-Type: application/json" \ -d '{"apiKey": "apikey"}' 'https://autofocus.paloaltonetworks.com/api/v1.0/tag/Unit42.CryptoWall'

Response

The response contains details about the specified tag.
{ "tag":{ "support_id":1, "tag_name":"CryptoWall", "public_tag_name":"Unit42.CryptoWall", "tag_definition_scope_id":4, "tag_definition_scope":"unit42", "tag_definition_status_id":1, "tag_definition_status":"enabled", "count":9279, "lasthit":"2015-12-11 15:06:33", "description":"CryptoWall is a ransomware family which encrypts files on the system and then demands a ransom from the victim before releasing the encryption key. \n\nMore information about CryptoWall is available at the following URLs:\n\nhttp://researchcenter.paloaltonetworks.com/2014/10/tracking-new-ransomware-cryptowall-2-0/\nhttp://malware.dontneedcoffee.com/2015/01/guess-whos-back-again-cryptowall-30.html", "customer_name":"Palo Alto Networks Unit42", "refs":null, "tag_class_id":null, "report_actions":null, "source":null, "comments":[ ] }, "tag_searches":[ { "count":9279, "lasthit":"2015-12-11 15:06:33", "search_name":"1e3f1a50ae9547166d", "tag_definition_search_status_id":1, "tag_definition_search_status":"enabled", "ui_search_definition":"{\"operator\":\"Any\",\"children\":[{\"field\":\"sample.tasks.file\",\"operator\":\"contains\",\"value\":\"3353616\\3353616.exe\"},{\"field\":\"sample.tasks.file\",\"operator\":\"contains\",\"value\":\"Users\\Administrator\\AppData\\Local\\Microsoft\\Internet Explorer\\DECRYPT_INSTRUCTION.TXT\"},{\"field\":\"sample.tasks.file\",\"operator\":\"contains\",\"value\":\"HELP_DECRYPT.PNG\"},{\"field\":\"sample.tasks.file\",\"operator\":\"contains\",\"value\":\"HELP_DECRYPT.URL\"},{\"field\":\"sample.tasks.file\",\"operator\":\"contains\",\"value\":\"HELP_DECRYPT.TXT\"},{\"field\":\"sample.tasks.file\",\"operator\":\"contains\",\"value\":\"HELP_DECRYPT.HTML\"}],\"field\":\"sample.sha256\"}" } ], "aliases":[ ], "related_tags":[ ], "bucket_info":{ "minute_points":200, "daily_points":25000, "minute_points_remaining":196, "daily_points_remaining":24139, "minute_bucket_start":"2015-12-14 15:46:06", "daily_bucket_start":"2015-12-14 13:06:01" } }

STIX Sample

Request

Include the public tag name to the request URL and include the API key within the request body.
curl -X POST -H "Content-Type: application/xml" -d '<req><apiKey>apikey</apiKey></req>' "https://autofocus.paloaltonetworks.com/api/v1.0/stix/tag/Unit42.CryptoWall"

Response

The response contains details about the specified tag.
<res> <bucket_info> <minute_points>200</minute_points> <daily_points>25000</daily_points> <minute_points_remaining>198</minute_points_remaining> <daily_points_remaining>24998</daily_points_remaining> <minute_bucket_start>2016-03-09 16:44:45</minute_bucket_start> <daily_bucket_start>2016-03-09 16:44:45</daily_bucket_start> </bucket_info> <stix> <stix:STIX_Package xmlns:stix="http://stix.mitre.org/stix-1" xmlns:autofocus="https://autofocus.paloaltonetworks.com" xmlns:cybox="http://cybox.mitre.org/cybox-2" xmlns:cyboxCommon="http://cybox.mitre.org/common-2" xmlns:cyboxVocabs="http://cybox.mitre.org/default_vocabularies-2" xmlns:indicator="http://stix.mitre.org/Indicator-2" xmlns:stixCommon="http://stix.mitre.org/common-1" xmlns:stixVocabs="http://stix.mitre.org/default_vocabularies-1" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" id="autofocus:Package-77c5b3d7-867d-466f-9816-2141f59cd809" version="1.1.1" timestamp="2016-03-10T00:44:46.003067+00:00"> <stix:Indicators> <stix:Indicator id="autofocus:indicator-73a63fc4-dea5-4a81-8e44-ca8934ba1c3c" timestamp="2016-03-06T01:24:06" xsi:type="indicator:IndicatorType"> <indicator:Title>Unit42.CryptoWall</indicator:Title> <indicator:Description>CryptoWall is a ransomware family which encrypts files on the system and then demands a ransom from the victim before releasing the encryption key. More information about CryptoWall is available at the following URLs: http://researchcenter.paloaltonetworks.com/2014/10/tracking-new-ransomware-cryptowall-2-0/ http://malware.dontneedcoffee.com/2015/01/guess-whos-back-again-cryptowall-30.html</indicator:Description> <indicator:Short_Description>Tag Name: CryptoWall, Scope: unit42, Status: enabled, Aliases:</indicator:Short_Description> <indicator:Composite_Indicator_Expression operator="OR"> <indicator:Indicator id="autofocus:indicator-d87a50e5-ef31-454a-95bc-c5efcdde276b" timestamp="2016-03-06T01:24:06" xsi:type="indicator:IndicatorType"> <indicator:Description>&lt;?xml version="1.0" encoding="UTF-8"?&gt;&lt;query&gt;&lt;operator&gt;Any&lt;/operator&gt;&lt;children&gt;&lt;item&gt;&lt;field&gt;sample.tasks.file&lt;/field&gt;&lt;operator&gt;contains&lt;/operator&gt;&lt;value&gt;3353616\3353616.exe&lt;/value&gt;&lt;/item&gt;&lt;item&gt;&lt;field&gt;sample.tasks.file&lt;/field&gt;&lt;operator&gt;contains&lt;/operator&gt;&lt;value&gt;Users\Administrator\AppData\Local\Microsoft\Internet Explorer\DECRYPT_INSTRUCTION.TXT&lt;/value&gt;&lt;/item&gt;&lt;item&gt;&lt;field&gt;sample.tasks.file&lt;/field&gt;&lt;operator&gt;contains&lt;/operator&gt;&lt;value&gt;HELP_DECRYPT.PNG&lt;/value&gt;&lt;/item&gt;&lt;item&gt;&lt;field&gt;sample.tasks.file&lt;/field&gt;&lt;operator&gt;contains&lt;/operator&gt;&lt;value&gt;HELP_DECRYPT.URL&lt;/value&gt;&lt;/item&gt;&lt;item&gt;&lt;field&gt;sample.tasks.file&lt;/field&gt;&lt;operator&gt;contains&lt;/operator&gt;&lt;value&gt;HELP_DECRYPT.TXT&lt;/value&gt;&lt;/item&gt;&lt;item&gt;&lt;field&gt;sample.tasks.file&lt;/field&gt;&lt;operator&gt;contains&lt;/operator&gt;&lt;value&gt;HELP_DECRYPT.HTML&lt;/value&gt;&lt;/item&gt;&lt;/children&gt;&lt;field&gt;sample.sha256&lt;/field&gt;&lt;/query&gt;</indicator:Description> <indicator:Short_Description>Status: enabled</indicator:Short_Description> <indicator:Sightings sightings_count="9676" /> </indicator:Indicator> </indicator:Composite_Indicator_Expression> <indicator:Sightings sightings_count="9676" /> <indicator:Producer> <stixCommon:Description /> <stixCommon:Identity> <stixCommon:Name>Palo Alto Networks Unit42</stixCommon:Name> </stixCommon:Identity> </indicator:Producer> </stix:Indicator> </stix:Indicators> </stix:STIX_Package> </stix> </res>

Recommended For You