IoC-Stream Notifications

Generated notifications by matches in the IoC-Stream

An IoC Stream Notification object represents a notification generated by one of your IoC-Stream sources.

The object contains the following attributes:

  • date: <integer> notification date as UTC timestamp.
  • entity_type: <string> the type of object the notification has matched.
  • entity_id: <string> the ID of the object the notification has matches.
  • origin: <string> the origin of the notification.
  • hunting_info: <dictionary> only present in notifications with origin=hunting. Includes additional information about the match, this dictionary can contain the following fields:
    • match_in_subfile: <boolean> whether the match was in a subfile or not.
    • rule_name: <string> matched rule name.
    • rule_tags: <list of strings> matched rule tags.
    • snippet: <string> matched contents inside the file as hexdump. Contains begin_highlight and end_highlight substrings to indicate the part of the file that produced the match and give additional context about surrounding bytes in the match.
    • source_country: <string> country where the matched file was uploaded from.
    • source_key: <string> unique identifier for the source in ciphered form.
  • sources: <list of dictionaries> the different sources associated to the notification. For example, in notifications from Livehunt the only source is always the hunting ruleset that triggered the notification.
  • tags: <list of strings> notification tags.
{ "data": { "attributes": { "date": <int>, "entity_type": <string>, "entity_id": <string>, "origin": <string>, "hunting_info": { "match_in_subfile": <bool>, "rule_name": <string>, "rule_tags": [<string>, ...], "snippet": <string>, "source_country": <string>, "source_key": <string>, "sources": [{"type": <string>, "id": <string>}, ...], "tags": [<string>, ...] }, "id": <string>, "links": { "self": "https://www.virustotal.com/api/v3/ioc_stream_notifications/<id>" }, "type": "ioc_stream_notification" } }
{ "data": { "attributes": { "origin": "hunting", "entity_id": "7ed0586b68a24bbe7cb29852beb48f2c6a625af46d2fbc3c652d552aa1b1bb5b", "hunting_info": { "rule_name": "vulnerability_weaponization", "source_country": "TR", "source_key": "3ed40be4" }, "tags": [ "ransomware", "vulnerability_weaponization", "wcoyote" ], "entity_type": "file", "sources": [ { "type": "hunting_ruleset", "id": "123456789" } ], "date": 1684830325 }, "type": "ioc_stream_notification", "id": "10494503008", "links": { "self": "https://www.virustotal.com/api/v3/ioc_stream_notifications/10494503008" } } }