IoC-Stream Notifications

Generated notifications by matches in the IoC-Stream

An IoC Stream Notification object represents a notification generated by one of your IoC-Stream sources.

The object contains the following attributes:

  • date: <integer> notification date as UTC timestamp.
  • entity_type: <string> the type of object the notification has matched.
  • entity_id: <string> the ID of the object the notification has matches.
  • origin: <string> the origin of the notification.
  • hunting_info: <dictionary> only present in notifications with origin=hunting. Includes additional information about the match, this dictionary can contain the following fields:
    • match_in_subfile: <boolean> whether the match was in a subfile or not.
    • rule_name: <string> matched rule name.
    • rule_tags: <list of strings> matched rule tags.
    • snippet: <string> matched contents inside the file as hexdump. Contains begin_highlight and end_highlight substrings to indicate the part of the file that produced the match and give additional context about surrounding bytes in the match.
    • source_country: <string> country where the matched file was uploaded from.
    • source_key: <string> unique identifier for the source in ciphered form.
  • sources: <list of dictionaries> the different sources associated to the notification. For example, in notifications from Livehunt the only source is always the hunting ruleset that triggered the notification.
  • tags: <list of strings> notification tags.
{
  "data": {
    "attributes": {
      "date": <int>,
      "entity_type": <string>,
      "entity_id": <string>,
      "origin": <string>,
      "hunting_info": {
        "match_in_subfile": <bool>,
        "rule_name": <string>,
        "rule_tags": [<string>, ...],
        "snippet": <string>,
        "source_country": <string>,
        "source_key": <string>,
      "sources": [{"type": <string>, "id": <string>}, ...],
      "tags": [<string>, ...]
    },
    "id": <string>,
    "links": {
      "self": "https://www.virustotal.com/api/v3/ioc_stream_notifications/<id>"
    },
    "type": "ioc_stream_notification"
  }
}
{
	"data": {
		"attributes": {
			"origin": "hunting",
			"entity_id": "7ed0586b68a24bbe7cb29852beb48f2c6a625af46d2fbc3c652d552aa1b1bb5b",
			"hunting_info": {
				"rule_name": "vulnerability_weaponization",
				"source_country": "TR",
				"source_key": "3ed40be4"
			},
			"tags": [
				"ransomware",
				"vulnerability_weaponization",
				"wcoyote"
			],
			"entity_type": "file",
			"sources": [
				{
					"type": "hunting_ruleset",
					"id": "123456789"
				}
			],
			"date": 1684830325
		},
		"type": "ioc_stream_notification",
		"id": "10494503008",
		"links": {
			"self": "https://www.virustotal.com/api/v3/ioc_stream_notifications/10494503008"
		}
	}
}