Fetch Event Details
For API version information, refer to the API Version History section.
Non-Versioned
This API retrieves details for an event.
Input ParametersInput Parameters
Input Parameters |
Mandatory/Optional |
Description |
---|---|---|
agentId (String) |
Mandatory |
ID of the agent for which you want to fetch the details. |
eventId (String) |
Mandatory |
ID of the event for which you want to fetch the details. |
Authorization (String) |
Mandatory |
Authorization token to authenticate to the Qualys Enterprise TruRisk™ Platform. Prepend token with "Bearer" and one space. For example - Bearer authToken. |
filter (String) | Optional |
Filter the events list by providing a query using Qualys syntax. Refer to the How to Search topic in the online help for assistance with creating your query. For example - event.datetime:["2024-09-15T00:30:00.000Z".."2024-09-22T18:29:59.999Z"] AND action: 'Created' You can filter events based on the time they are generated on the event (event.datetime) or the time they are processed at Qualys (event.eventprocesstime). If you want to fetch events by date AND time, it is recommended to use the "event.datetime" or "event.eventprocesstime" parameter. |
Sample - Fetch File Event DetailsSample - Fetch File Event Details
API request
curl -G --data-urlencode "filter=type:file"
"<qualys_base_url>/ioc/events/fxxxx2-222a-xxxx-abcd-28exxxxx11/F_fexxxxx-222a-1111-abcd-2xxxx11-1xxxx505xxxxxx8xxx56" -H "Authorization: Bearer <token>"
Response
[
{
"dateTime": "2025-02-19T13:23:45.175+0000",
"eventSource": "EDR",
"indicator2": [
{
"score": "7",
"sha256": "3247bcfd60f6dd25f34cb74b5889ab10ef1b3ec72b4d4b3d95b5b25b534560b8",
"familyName": "virus",
"verdict": "MALICIOUS",
"threatName": "virus",
"category": "virus"
}
],
"type": "FILE",
"actor": {
"processEventId": "RTP_900a3661-8a3b-3547-82f8-743e68a5ad5f_11-2-2025",
"processUniqueId": "7203985709335574011",
"processId": 2864,
"processName": "MsMpEng.exe",
"imageFullPath": "C:\\ProgramData\\Microsoft\\Windows Defender\\Platform\\4.18.24090.11-0\\MsMpEng.exe",
"productName": "Microsoft? Windows? Operating System"
},
"score": "7",
"scoreSource": "REVERSING_LAB",
"file": {
"fullPath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe",
"extension": "exe",
"product": "Microsoft? Windows? Operating System",
"fileName": "powershell.exe",
"sha256": "3247bcfd60f6dd25f34cb74b5889ab10ef1b3ec72b4d4b3d95b5b25b534560b8",
"writeDate": "2024-08-09T07:22:08.000+0000",
"description": "Windows PowerShell",
"macroEmbedded": false,
"version": "10.0.22621.3085",
"path": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0",
"createdDate": "2024-08-09T07:22:08.000+0000",
"size": 450560,
"accessDate": "2025-01-10T07:10:47.000+0000",
"certificates": [
{
"expiryDate": "2024-11-14T19:20:09.000+0000",
"certificateSigned": true,
"certificateIssuer": "Microsoft Windows Production PCA 2011",
"certificateValid": false,
"certificateIssuedTo": "Microsoft Windows",
"certificateSignedDate": "2023-11-16T19:20:09.000+0000",
"certificateHash": "d8fb0cc66a08061b42d46d03546f0d42cbc49b7c"
}
],
"nonPEFile": false,
"company": "Microsoft Corporation",
"fileType": "exe",
"md5": "9d8e30daf21108092d5980c931876b7e"
},
"action": "READ",
"id": "RTF_55fcc54e-2cbb-3177-81c0-f42e413312d2_19-2-2025",
"category": [
"virus"
],
"asset": {
"fullOSName": "Microsoft Windows 11 Enterprise 10.0.22631 Build 22631",
"hostName": "WIN-AS-IPV6-4-2",
"agentId": "x82xx34x-5xxx-4110-9878-x91x5x476x47",
"interfaces": [
{
"macAddress": "00:X0:XX:0X:00:00",
"ipAddress": "fXX0:0:0:0:XXX9:1XX9:2XXb:XXed",
"interfaceName": "Intel(R) 82574L Gigabit Network Connection",
"gatewayAddress": "XX.XX.X0X.X"
},
{
"macAddress": "00:X0:XX:0X:00:00",
"ipAddress": "fXX0:0:0:0:XXX9:1XX9:2XXb:XXed",
"interfaceName": "Intel(R) 82574L Gigabit Network Connection",
"gatewayAddress": "XX.XX.X0X.X"
}
],
"netBiosName": "WIN-AS-IPV6-4-2",
"customerId": "8380x005-x923-x37x-8032-42xx709x6xx7",
"platform": "Windows",
"tags": [
{
"name": "Maine_District_Court",
"uuid": "XXX676fX-cXX8-XX32-bfXX-XXX8XbcXXX1b"
},
{
"name": "Meena",
"uuid": "XXX676fX-cXX8-XX32-bfXX-XXX8XbcXXX1b"
},
{
"name": "Cloud Agent",
"uuid": "XXX676fX-cXX8-XX32-bfXX-XXX8XbcXXX1b"
}
]
}
}
]
Response Field DescriptionsResponse Field Descriptions
Dataset Name |
Field Name |
Data Type |
Description |
---|---|---|---|
Event | dateTime | Timestamp | Timestamp of the last reported EDR event (ISO 8601 format). |
eventSource | String | The source of the event (Anti-malware or EDR). | |
type | String | The type of event (e.g., 'FILE' indicates a file-related event). | |
score | String | The overall threat severity score based on reputation data from Threat Intelligence feeds. | |
scoreSource | String | The source of the score (e.g. Anti-malware, Behavioral Detection, Qualys Research, Sandbox, Threat Intelligence). | |
action | String | An action performed on the file (e.g. "READ", "CREATED" etc). | |
id | String | A unique identifier assigned to the agent installed on the asset. | |
category | Array of String | A list of categories associated with the event (e.g., 'virus'). | |
indicator2 | Array of Object |
A list of indicators (detected threats) includes objects with detailed information. Dataset: indicator2 |
|
actor | Object |
Details about the process that triggered the event. Dataset: actor |
|
file | Object |
Details related to the file involved in the event. Dataset: file |
|
file.certificates | Object |
A list of certificates associated with the file. Contains certificate information. Dataset: file.certificates |
|
asset | Object |
Indicates details about the host system where the event occurred. Dataset: asset |
|
asset.interfaces | Array of Object |
A list of network interfaces on the host system, including network-related details such as IP and MAC addresses. Dateset: asset.interfaces |
|
asset.tags | Array of Object |
A list of tags associated with the asset. Contains tag details such as name and unique identifier. Dateset: asset.tags |
|
indicator2 | score | String | The threat severity score. |
sha256 | String | The SHA-256 hash value of the file associated with the indicator. | |
familyName | String | The family name of the detected malware or threat (e.g., "virus"). | |
verdict | String | The verdict assigned to the file (e.g., "MALICIOUS"). | |
threatName | String | The name of the detected threat. | |
category | String | The category of the detected threat (e.g., "virus"). | |
actor | processEventId | String | The unique identifier for the process event. |
processUniqueId | String | The unique identifier for the process. | |
processId | Integer | The Process ID of the actor involved in the event. | |
processName | String | The name of the process responsible for the event (e.g., "MsMpEng.exe"). | |
imageFullPath | String | The full file path of the executable that triggered the event. | |
productName | String | The name of the product associated with the process (e.g., "Microsoft Windows Operating System"). | |
file | fullPath | String | The full file path of the involved file. |
extension | String | The file extension of the involved file (e.g., "exe"). | |
product | String | The product name associated with the file. | |
numOfPages | Integer | The number of pages in the file (if applicable). | |
fileName | String | The name of the file involved in the event. | |
sha256 | String | The SHA-256 hash value of the file. | |
writeDate | String | The date and time when the file was last written to. | |
description | String | The description of the file (e.g., "Windows PowerShell"). | |
macroEmbedded | Boolean | Indicates whether the file contains embedded macros (e.g., 'false' if no macros are present). | |
version | String | The version of the file involved. | |
path | String | The path where the file is located. | |
createdDate | String | The date and time when the file was created. | |
size | Integer | The size of the file in bytes. | |
accessDate | String | The date and time when the file was last accessed. | |
nonPEFile | Boolean | Indicates whether the file is a non-PE (Portable Executable) file. | |
company | String | The company that produced the file. | |
fileType | String | The type of file (e.g. "exe"). | |
md5 | String | The MD5 hash value of the file. | |
file.certificates | expiryDate | String | The expiry date of the certificate. |
certificateSigned | Boolean | Indicates whether the certificate is signed. | |
certificateIssuer | String | The issuer of the certificate. | |
certificateValid | Boolean | Indicates whether the certificate is valid. | |
certificateIssuedTo | String | The entity to which the certificate was issued. | |
certificateSignedDate | String | The date when the certificate was signed. | |
certificateHash | String | The hash value of the certificate. | |
asset | fullOSName | String | The full operating system name and version running on the host system. |
hostName | String | The hostname of the affected system. | |
agentId | String | The unique identifier for the agent monitoring the system. | |
netBiosName | String | The NetBIOS name of the affected system. | |
customerId | String | The unique identifier for the customer. | |
platform | String | The platform on which the host is running (e.g., Windows). | |
asset.interfaces | macAddress | String | The MAC address of the network interface. |
ipAddress | String | The IP address of the network interface. | |
interfaceName | String | The name of the network interface. | |
gatewayAddress | String | The gateway address of the network interface. | |
asset.tags | name | String | The name of the tag. |
uuid | String | The unique identifier for the tag. |
Sample - Fetch Network Event DetailsSample - Fetch Network Event Details
API request
curl -G --data-urlencode "filter=type:network"
"<qualys_base_url>/ioc/events/fxxxx2-222a-xxxx-abcd-28exxxxx11/F_fexxxxx-222a-1111-abcd-2xxxx11-1xxxx505xxxxxx8xxx56" -H "Authorization: Bearer <token>"
Response
[
{
"dateTime": "2025-02-20T15:36:11.000+0000",
"process": {
"fullPath": "/usr/sbin/chronyd",
"parentProcessName": "systemd",
"processFile": {
"fullPath": "/usr/sbin/chronyd",
"path": "/usr/sbin",
"createdDate": "2019-08-08T11:40:18.000+0000",
"sha256": "5fc9a67facabbe3abc2970db5d3ace95f591cf0d307b83c76a62873410dc652a",
"size": 269392,
"moduleName": "chronyd",
"uniqueImageId": "-2766799832389448102",
"md5": "919aa879e59e4cc4ad2638d2d6271eb9"
},
"processEventId": "RTP_f96ee276-5ba1-3963-b6be-98b58637de9d_24-12-2024",
"parentPid": 1,
"pid": 796,
"userName": "chrony",
"processName": "chronyd",
"currentDirectory": "/",
"elevated": false,
"isCertificateExists": false,
"arguments": "/usr/sbin/chronyd",
"parentEventId": "RTP_d7d691d0-1b84-31b1-8d7e-c6b3f43d0963_24-12-2024"
},
"eventSource": "EDR",
"type": "NETWORK",
"network": {
"protocol": "TCP",
"remoteIP": "2604:a880:400:d0::4ed:f001",
"localPort": "0",
"agentMetaData": "{\"tags\":[\"Unknown\",\"auid_4294967295\"]}",
"remotePort": "123",
"state": "ESTABLISHED"
},
"actor": {
"processEventId": "RTP_f96ee276-5ba1-3963-b6be-98b58637de9d_24-12-2024",
"processUniqueId": "4343915213667668267",
"processId": 796,
"processName": "chronyd",
"arguments": "/usr/sbin/chronyd",
"imageFullPath": "/usr/sbin/chronyd"
},
"score": "9",
"scoreSource": "CTDB",
"action": "ESTABLISHED",
"id": "XXX8a87X-XXbb-4XX9-XX74-XXX08f6XX54X",
"category": [
"Phishing",
"Spam Sources",
"Windows Exploits"
],
"asset": {
"fullOSName": "CentOS Linux 7.9.2009",
"hostName": "centos-10.14.28.130",
"agentId": "x82xx34x-5xxx-4110-9878-x91x5x476x47",
"interfaces": [
{
"macAddress": "00:X0:XX:0X:00:00",
"ipAddress": "X0.1X.XX1.00",
"interfaceName": "ens192",
"gatewayAddress": "XX.XX.X0X.X"
},
{
"macAddress": "00:X0:XX:0X:00:00",
"ipAddress": "fXX0:0:0:0:XXX9:1XX9:2XXb:XXed",
"interfaceName": "ens192",
"gatewayAddress": "XX.XX.X0X.X"
}
],
"customerId": "fd01c4e0-9a06-4198-8362-fa6eb8b2adea",
"platform": "LINUX",
"tags": [
{
"name": "Cloud Agent",
"uuid": "XXX676fX-cXX8-XX32-bfXX-XXX8XbcXXX1b"
},
{
"name": "AG1",
"uuid": "XXX676fX-cXX8-XX32-bfXX-XXX8XbcXXX1b"
}
]
}
}
]
Response Field DescriptionsResponse Field Descriptions
Dataset Name |
Field Name |
Data Type |
Description |
---|---|---|---|
Event | dateTime | String | Timestamp of the last reported EDR event (ISO 8601 format). |
eventSource | String | The source of the event (e.g., "EDR" for endpoint detection and response). | |
type | String | The type of event (e.g., "NETWORK" indicates a network-related event). | |
score | String | The overall threat severity score assigned to the event (e.g., "9" indicates a high risk). | |
scoreSource | String | The source of the score (e.g., "CTDB"). | |
action | String | An action taken on the network connection (e.g., "ESTABLISHED"). | |
id | String | The Unique identifier for the event. | |
uniqueId | String | The Unique identifier for the event. | |
process | Object |
Information about the process involved in the event. Dataset: process |
|
process.processFile | Object |
Information about the process file. Dataset: process.processFile |
|
network | Object |
Information related to the network event. Dataset: network |
|
actor | Object |
Details about the process that triggered the event. Dataset: actor |
|
actor | Object |
Information about the asset (host) involved in the event. Dataset: asset |
|
asset.interfaces | Array of Object |
A list of network interfaces on the host system, including network-related details such as IP and MAC addresses. Dateset: asset.interfaces |
|
asset.tags | Array of Object |
A list of tags associated with the asset. Contains tag details such as name and unique identifier. Dateset: asset.tags |
|
Process | fullPath | String | The full path of the process executable. |
parentProcessName | String | The name of the parent process. | |
processEventId | String | The unique identifier for the process event. | |
parentPid | Integer | The parent process ID (PID) of the process. | |
pid | Integer | The process ID (PID) of the current process. | |
userName | String | The username under which the process is running. | |
processName | String | The name of the process. | |
currentDirectory | String | The current directory of the process. | |
elevated | Boolean | Indicates whether the process has elevated privileges (e.g., root, admin). | |
isCertificateExists | Boolean | Indicates whether the process has an associated certificate. | |
arguments | String | The arguments passed to the process during execution. | |
parentEventId | String | Indicates the parent event identifier for the process. | |
process.processFile | fullPath | String | The full path of the process file. |
path | String | The directory path where the process file is located. | |
createdDate | String | The date when the process file was created. | |
sha256 | String | The SHA-256 hash of the process file. | |
size | Integer | The size of the process file in bytes. | |
moduleName | String | The name of the module associated with the process file. | |
uniqueImageId | String | The unique identifier for the process image. | |
md5 | String | The MD5 hash of the process file. | |
network | protocol | String | The protocol used in the network connection (e.g., "TCP"). |
remoteIP | String | The IP address of the remote entity involved in the network connection. | |
localPort | String | The local port used for the network connection. | |
remotePort | String | The remote port used for the network connection | |
state | String | Indicates the state of the network connection (e.g., "ESTABLISHED"). | |
actor | processEventId | String | The unique identifier for the process event. |
processUniqueId | String | The unique identifier for the process. | |
processId | Integer | The process ID of the actor. | |
processName | String | The name of the process involved. | |
arguments | String | The arguments passed to the process involved in the event. | |
imageFullPath | String | The full path of the process executable involved in the event. | |
category | Array of Strings | The categories associated with the event (e.g., "Phishing", "Spam Sources", "Windows Exploits"). | |
asset | fullOSName | String | The full operating system name and version running on the asset. |
hostName | String | The hostname of the affected asset. | |
agentId | String | The unique identifier for the agent monitoring the asset. | |
customerId | String | The unique identifier for the customer. | |
platform | String | The platform of the asset (e.g., "LINUX"). | |
asset.interfaces | macAddress | String | The MAC address of the network interface. |
ipAddress | String | The IP address of the network interface. | |
interfaceName | String | The name of the network interface. | |
gatewayAddress | String | The gateway address of the network interface. | |
asset.tags | name | String | The name of the tag. |
uuid | String | The unique identifier for the tag. |
Sample - Fetch Process Event DetailsSample - Fetch Process Event Details
API request
curl -G --data-urlencode "filter=type:process"
"<qualys_base_url>/ioc/events/fxxxx2-222a-xxxx-abcd-28exxxxx11/F_fexxxxx-222a-1111-abcd-2xxxx11-1xxxx505xxxxxx8xxx56" -H "Authorization: Bearer <token>"
Response
[
{
"dateTime": "2025-02-19T00:03:39.016+0000",
"process": {
"parentProcessName": "services.exe",
"processFile": {
"createdDate": "2025-02-14T18:36:56.000+0000",
"sha256": "6fc3bf1fdfd76860be782554f8d25bd32f108db934d70f4253f1e5f23522e503",
"size": 57528,
"certificates": [
{
"expiryDate": "2025-02-07T19:22:46.000+0000",
"certificateSigned": true,
"certificateIssuer": "Microsoft Windows Production PCA 2011",
"certificateValid": false,
"certificateIssuedTo": "Microsoft Windows Publisher",
"certificateSignedDate": "2024-02-08T19:22:46.000+0000",
"certificateHash": "09a1aa05288e952c901821deaece78d148d2e4d2"
}
],
"moduleName": "svchost.exe",
"uniqueImageId": "6695093065446506235",
"md5": "7469cc568ad6821fd9d925542730a7d8"
},
"processEventId": "RTP_5d946345-7faa-3040-a254-570fe24cb92b_19-2-2025",
"parentPid": 736,
"pid": 4720,
"userName": "NT AUTHORITY\\SYSTEM",
"sid": "S-1-16-16384",
"processName": "svchost.exe",
"elevated": true,
"isCertificateExists": true,
"arguments": "-k netsvcs -p -s wuauserv",
"parentEventId": "RTP_ebe08cb7-a6f6-3fe8-a93d-761f669649ff_12-2-2025",
"integrityLevel": "ML_SYSTEM",
"loadedModules": [
{
"fullPath": "C:\\Windows\\System32\\msxml6.dll",
"fileName": "msxml6.dll",
"createdDate": "2024-05-29T12:12:51.000+0000",
"sha256": "1bb75d1eddd78915238e145aeabdd6ffbc789d6325fb4280dafcf42ca26e7667",
"size": 2474760,
"certificates": [
{
"expiryDate": "2024-11-14T19:20:08.000+0000",
"certificateSigned": true,
"certificateIssuer": "Microsoft Windows Production PCA 2011",
"certificateValid": false,
"certificateIssuedTo": "Microsoft Windows",
"certificateSignedDate": "2023-11-16T19:20:08.000+0000",
"certificateHash": "71f53a26bb1625e466727183409a30d03d7923df"
}
],
"moduleName": "msxml6.dll",
"action": "LOAD",
"productName": "Microsoft XML Core Services",
"md5": "545a0575c1b1caf6b681f4dd9ac75e84"
}
]
},
"eventSource": "EDR",
"type": "PROCESS",
"actor": {
"processEventId": "RTP_ebe08cb7-a6f6-3fe8-a93d-761f669649ff_12-2-2025",
"processId": 736,
"processName": "services.exe",
"imageFullPath": "C:\\Windows\\system32\\services.exe"
},
"score": "3",
"scoreSource": "SIDDHI",
"action": "RUNNING",
"mitreInfoList": [
{
"techniques": [
{
"techniqueName": "Masquerading: Match Legitimate Name or Location",
"techniqueScore": 3,
"techniqueId": "T1036.005"
}
],
"tactics": [
{
"tacticName": "Defense Evasion",
"tacticId": "TA0005"
}
],
"technique": {
"techniqueName": "Masquerading: Match Legitimate Name or Location",
"techniqueScore": 3,
"techniqueId": "T1036.005"
},
"ruleNames": [
"T1036_005_1 Masquerading: Match Legitimate Name or Location"
],
"ruleId": "T1036_005_1"
}
],
"ruleNames": [
"T1036_005_1 Masquerading: Match Legitimate Name or Location"
],
"id": "XXX8a87X-XXbb-4XX9-XX74-XXX08f6XX54X",
"asset": {
"fullOSName": "Microsoft Windows 10 Enterprise 10.0.19045 Build 19045",
"hostName": "DESKTOP-F66RP42",
"agentId": "x82xx34x-5xxx-4110-9878-x91x5x476x47",
"netBiosName": "DESKTOP-F66RP42",
"isQuarantineHost": false,
"customerId": "8380x005-x923-x37x-8032-42xx709x6xx7",
"platform": "Windows",
"tags": [
{
"name": "Cloud Agent",
"uuid": "XXX676fX-cXX8-XX32-bfXX-XXX8XbcXXX1b"
}
]
}
}
]
Response Field DescriptionsResponse Field Descriptions
Dataset Name |
Field Name |
Data Type |
Description |
---|---|---|---|
Event | dateTime | String (ISO 8601) | The timestamp when the event occurred. |
eventSource | String | The source of the event (e.g., EDR). | |
type | String | The type of event (e.g., PROCESS). | |
score | String | The overall threat security score indicating the risk or severity of the event. | |
scoreSource | String | The source of the score. | |
action | String | The action associated with the event (e.g., RUNNING). | |
ruleNames | Array of Strings | The list of rule names triggered by the event (e.g., Masquerading). | |
id | String | The Unique identifier for the event. | |
process | Object |
Information about the process involved in the event. Dataset: process |
|
process.processFile | Object |
Information about the process file. Dataset: process.processFile |
|
process.processFile.certificates | Array of Objects |
The list of certificates associated with the process file. Dataset: process.processFile.certificates |
|
process.loadedModules | Array of Objects |
The list of modules loaded by the process. Dataset: process.loadedModules |
|
process.loadedModules.certificates | Array of Objects |
The list of certificates associated with the process file. Dataset: process.loadedModules.certificates |
|
actor | Object |
Information about the actor that initiated the event. Dataset: actor |
|
mitreInfoList | Array of Objects |
The list of MITRE ATT&CK techniques, tactics, and rules related to the event. Dataset: mitreInfoList |
|
mitreInfoList.techniques | Array of Objects |
The list of techniques associated with the event (e.g. Masquerading). Dataset: mitreInfoList.techniques |
|
mitreInfoList.tactics | Array of Objects |
The list of tactics associated with the event (e.g. Defense Evasion). Dataset: mitreInfoList.tactics |
|
mitreInfoList.technique | Array of Objects |
Detailed information about the MITRE technique. Dataset: mitreInfoList.technique |
|
asset | Object |
Information about the asset (host) involved in the event. Dataset: asset |
|
asset.tags | Array of Objects |
A list of tags associated with the asset. Dataset: asset.tags |
|
indicator2 | score | String | The threat severity score. |
sha256 | String | The SHA-256 hash value of the file associated with the indicator. | |
familyName | String | The family name of the detected malware or threat (e.g., "virus"). | |
verdict | String | The verdict assigned to the file ("MALICIOUS" in this case). | |
threatName | String | The name of the detected threat. | |
category | String | The category of the detected threat (e.g., "virus"). | |
actor | processEventId | String | The unique identifier for the process event. |
processUniqueId | String | The unique identifier for the process. | |
processId | Integer | The process ID of the actor involved in the event. | |
processName | String | The name of the process responsible for the event (e.g., "MsMpEng.exe"). | |
imageFullPath | String | The full file path of the executable that triggered the event. | |
productName | String | The name of the product associated with the process (e.g., "Microsoft Windows Operating System"). | |
file | fullPath | String | The full file path of the involved file. |
extension | String | The file extension of the involved file (e.g., "exe"). | |
product | String | The product name associated with the file. | |
numOfPages | Integer | The number of pages in the file (if applicable). | |
fileName | String | The name of the file involved in the event. | |
sha256 | String | The SHA-256 hash value of the file. | |
writeDate | String | The date and time when the file was last written to. | |
description | String | The description of the file (e.g., "Windows PowerShell"). | |
macroEmbedded | Boolean | Indicates whether the file contains embedded macros (e.g., 'false' if no macros are present). | |
version | String | The version of the file involved. | |
path | String | The path where the file is located. | |
createdDate | String | The date and time when the file was created. | |
size | Integer | The size of the file in bytes. | |
accessDate | String | The date and time when the file was last accessed. | |
nonPEFile | Boolean | Indicates whether the file is a non-PE (Portable Executable) file. | |
company | String | The company that produced the file. | |
fileType | String | The type of file (e.g. "exe"). | |
md5 | String | The MD5 hash value of the file. | |
file.certificates | expiryDate | String | The expiry date of the certificate. |
certificateSigned | Boolean | Indicates whether the certificate is signed. | |
certificateIssuer | String | The issuer of the certificate. | |
certificateValid | Boolean | Indicates whether the certificate is valid. | |
certificateIssuedTo | String | The entity to which the certificate was issued. | |
certificateSignedDate | String | The date when the certificate was signed. | |
certificateHash | String | The hash value of the certificate. | |
asset | fullOSName | String | The full operating system name and version running on the host system. |
hostName | String | The hostname of the affected system. | |
agentId | String | The unique identifier for the agent monitoring the system. | |
netBiosName | String | The NetBIOS name of the affected system. | |
customerId | String | The unique identifier for the customer. | |
platform | String | The platform on which the host is running (e.g., Windows). | |
asset.interfaces | macAddress | String | The MAC address of the network interface. |
ipAddress | String | The IP address of the network interface. | |
interfaceName | String | The name of the network interface. | |
gatewayAddress | String | The gateway address of the network interface. | |
asset.tags | name | String | The name of the tag. |
uuid | String | The unique identifier for the tag. |
Sample - Fetch Registry Event DetailsSample - Fetch Registry Event Details
API request
curl -G --data-urlencode "filter=type:registry"
"<qualys_base_url>/ioc/events/fxxxx2-222a-xxxx-abcd-28exxxxx11/F_fexxxxx-222a-1111-abcd-2xxxx11-1xxxx505xxxxxx8xxx56" -H "Authorization: Bearer <token>"
Response
[
{
"dateTime": "2025-02-22T08:22:23.017+0000",
"registry": {
"path": "TamperProtection",
"value": "0x0",
"key": "HKLM\\SOFTWARE\\Microsoft\\Windows Defender\\Features"
},
"eventSource": "EDR",
"type": "REGISTRY",
"actor": {
"processEventId": "RTP_d15905b7-df0e-3b55-8cb4-f9a7c2ef9d92_21-2-2025",
"processUniqueId": "-553510450883925585",
"processId": 75572,
"processName": "MsMpEng.exe",
"imageFullPath": "C:\\ProgramData\\Microsoft\\Windows Defender\\Platform\\4.18.25010.6-0\\MsMpEng.exe",
"productName": "Microsoft? Windows? Operating System"
},
"score": "3",
"scoreSource": "SIDDHI",
"action": "WRITE",
"mitreInfoList": [
{
"techniques": [
{
"techniqueName": "Modify Registry",
"techniqueScore": 3,
"techniqueId": "T1112"
},
{
"techniqueName": "Impair Defenses: Disable or Modify Tools",
"techniqueId": "T1562.001"
}
],
"tactics": [
{
"tacticName": "Defense Evasion",
"tacticId": "TA0005"
}
],
"technique": {
"techniqueName": "Modify Registry",
"techniqueScore": 3,
"techniqueId": "T1112"
},
"ruleNames": [
"Tamper Win Defender Protection via Registry"
],
"ruleId": "T1112_61"
}
],
"ruleNames": [
"Tamper Win Defender Protection via Registry"
],
"id": "XXX8a87X-XXbb-4XX9-XX74-XXX08f6XX54X",
"asset": {
"fullOSName": "Microsoft Windows Server 2022 Standard 10.0.20348 Build 20348",
"hostName": "WIN-KL5S113723C",
"agentId": "x82xx34x-5xxx-4110-9878-x91x5x476x47",
"interfaces": [
{
"macAddress": "00:X0:XX:0X:00:00",
"ipAddress": "fXX0:0:0:0:XXX9:1XX9:2XXb:XXed",
"interfaceName": "Intel(R) 82574L Gigabit Network Connection",
"gatewayAddress": "XX.XX.X0X.X"
},
{
"macAddress": "00:X0:XX:0X:00:00",
"ipAddress": "fXX0:0:0:0:XXX9:1XX9:2XXb:XXed",
"interfaceName": "Intel(R) 82574L Gigabit Network Connection",
"gatewayAddress": "XX.XX.X0X.X"
},
{
"macAddress": "00:X0:XX:0X:00:00",
"ipAddress": "fXX0:0:0:0:XXX9:1XX9:2XXb:XXed",
"interfaceName": "Intel(R) 82574L Gigabit Network Connection",
"gatewayAddress": "XX.XX.X0X.X"
}
],
"netBiosName": "WIN-KL5S113723C",
"customerId": "8380x005-x923-x37x-8032-42xx709x6xx7",
"platform": "Windows",
"tags": [
{
"name": "Cloud Agent",
"uuid": "XXX676fX-cXX8-XX32-bfXX-XXX8XbcXXX1b"
}
]
}
}
]
Response Field DescriptionsResponse Field Descriptions
Dataset Name |
Field Name |
Data Type |
Description |
---|---|---|---|
Event | dateTime | Timestamp | Timestamp when the event occurred in the endpoint (ISO 8601 format). |
eventSource | String | The source of the event (e.g., "EDR" for endpoint detection and response). | |
type | String | The type of the event (e.g., "REGISTRY" indicates a registry-related event). | |
score | String | The overall threat severity score assigned to the event (e.g., "3" indicates a lower risk). | |
scoreSource | String | The source of the score (e.g., "SIDDHI"). | |
action | String | An action taken on the registry key (e.g., "WRITE"). | |
ruleNames | Array of Strings | A list of rule names associated with the event (e.g., "Tamper Win Defender Protection via Registry"). | |
id | String | A unique identifier for the event. | |
uniqueId | String | A unique identifier for the event. | |
registry | Object |
Registry information involved in the event. Dataset: registry |
|
actor | Object |
Details about the process that triggered the event. Dataset: actor |
|
mitreInfoList | Array of Object |
A list of MITRE ATT&CK techniques, tactics, and rules related to the event. Dataset: mitreInfoList |
|
mitreInfoList.techniques | Array of Object |
A list of techniques associated with the event (e.g., Masquerading). Dataset: mitreInfoList.techniques |
|
mitreInfoList.tactics | Array of Object |
A list of tactics associated with the event (e.g., Defense Evasion). Dataset: mitreInfoList.tactics |
|
mitreInfoList.technique | Object |
Detailed information about the MITRE technique. Dataset: mitreInfoList.technique |
|
asset | Object |
Information about the asset (host) involved in the event. Dataset: asset |
|
asset.interfaces | Array of Object |
A list of network interfaces on the host system, including network-related details such as IP and MAC addresses. Dataset: asset.interfaces |
|
asset.tags | Array of Object |
A list of tags associated with the asset. Contains tag details such as name and unique identifier. Dataset: asset.tags |
|
registry | path | String | The path of the registry key. |
value | String | The value of the registry key. | |
key | String | The key of the registry path. | |
actor | processEventId | String | The unique identifier for the process event. |
processUniqueId | String | The unique identifier for the process. | |
processId | Integer | The process ID of the actor. | |
processName | String | The name of the process involved. | |
imageFullPath | String | The full path of the process executable involved in the event. | |
productName | String | The name of the product associated with the process (e.g., "Microsoft Windows Operating System"). | |
mitreInfoList | ruleNames | Array of Strings | A list of rule names triggered by the event. |
ruleId | String | The unique rule identifier associated with the event. | |
mitreInfoList.techniques | techniqueName | String | The name of the technique used (e.g. "Modify Registry"). |
techniqueScore | Integer | The score of the MITRE technique. | |
techniqueId | String | The technique ID from MITRE ATT&CK (e.g. "T1112" for Modify Registry). | |
mitreInfoList.tactics | tacticName | String | The name of the tactic used (e.g. "Defense Evasion"). |
tacticId | String | The Tactic ID from MITRE ATT&CK (e.g. "TA0005" for Defense Evasion). | |
mitreInfoList.technique | techniqueName | String | The name of the technique (e.g. "Modify Registry"). |
techniqueScore | Integer | The score of the MITRE technique. | |
techniqueId | String | The technique ID from MITRE ATT&CK (e.g. "T1112"). | |
asset | fullOSName | String | The full operating system name and version running on the asset. |
hostName | String | The hostname of the affected asset. | |
agentId | String | The unique identifier for the agent monitoring the asset. | |
netBiosName | String | The NetBIOS name of the affected asset. | |
isQuarantineHost | Boolean | Indicates whether the asset is in quarantine. | |
customerId | String | The unique identifier for the customer. | |
platform | String | The platform of the asset (e.g. "Windows"). | |
asset.interfaces | macAddress | String | The MAC address of the network interface. |
ipAddress | String | The IP address of the network interface. | |
interfaceName | String | The name of the network interface. | |
gatewayAddress | String | The gateway address of the network interface. | |
asset.tags | name | String | The name of the tag. |
uuid | String | The unique identifier for the tag. |
V1.0
This API retrieves details for an event.
Input ParametersInput Parameters
Input Parameters |
Mandatory/Optional |
Description |
---|---|---|
agentId (String) |
Mandatory |
ID of the agent for which you want to fetch the details. |
eventId (String) |
Mandatory |
ID of the event for which you want to fetch the details. |
Authorization (String) |
Mandatory |
Authorization token to authenticate to the Qualys Enterprise TruRisk™ Platform. Prepend token with "Bearer" and one space. For example - Bearer authToken. |
filter (String) | Optional |
Filter the events list by providing a query using Qualys syntax. Refer to the How to Search topic in the online help for assistance with creating your query. For example - event.datetime:["2024-09-15T00:30:00.000Z".."2024-09-22T18:29:59.999Z"] AND action: 'Created' You can filter events based on the time they are generated on the event (event.datetime) or the time they are processed at Qualys (event.eventprocesstime). If you want to fetch events by date AND time, it is recommended to use the "event.datetime" or "event.eventprocesstime" parameter. |
Sample - Fetch File Event DetailsSample - Fetch File Event Details
API request
curl -G --data-urlencode "filter=type:file"
"<qualys_base_url>/ioc/v1/events/fxxxx2-222a-xxxx-abcd-28exxxxx11/F_fexxxxx-222a-1111-abcd-2xxxx11-1xxxx505xxxxxx8xxx56" -H "Authorization: Bearer <token>"
Response
[
{
"dateTime": "2025-02-19T13:23:45.175+0000",
"eventSource": "EDR",
"indicator2": [
{
"score": "7",
"sha256": "3247bcfd60f6dd25f34cb74b5889ab10ef1b3ec72b4d4b3d95b5b25b534560b8",
"familyName": "virus",
"verdict": "MALICIOUS",
"threatName": "virus",
"category": "virus"
}
],
"type": "FILE",
"actor": {
"processEventId": "RTP_900a3661-8a3b-3547-82f8-743e68a5ad5f_11-2-2025",
"processUniqueId": "7203985709335574011",
"processId": 2864,
"processName": "MsMpEng.exe",
"imageFullPath": "C:\\ProgramData\\Microsoft\\Windows Defender\\Platform\\4.18.24090.11-0\\MsMpEng.exe",
"productName": "Microsoft? Windows? Operating System"
},
"score": "7",
"scoreSource": "REVERSING_LAB",
"file": {
"fullPath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe",
"extension": "exe",
"product": "Microsoft? Windows? Operating System",
"fileName": "powershell.exe",
"sha256": "3247bcfd60f6dd25f34cb74b5889ab10ef1b3ec72b4d4b3d95b5b25b534560b8",
"writeDate": "2024-08-09T07:22:08.000+0000",
"description": "Windows PowerShell",
"macroEmbedded": false,
"version": "10.0.22621.3085",
"path": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0",
"createdDate": "2024-08-09T07:22:08.000+0000",
"size": 450560,
"accessDate": "2025-01-10T07:10:47.000+0000",
"certificates": [
{
"expiryDate": "2024-11-14T19:20:09.000+0000",
"certificateSigned": true,
"certificateIssuer": "Microsoft Windows Production PCA 2011",
"certificateValid": false,
"certificateIssuedTo": "Microsoft Windows",
"certificateSignedDate": "2023-11-16T19:20:09.000+0000",
"certificateHash": "d8fb0cc66a08061b42d46d03546f0d42cbc49b7c"
}
],
"nonPEFile": false,
"company": "Microsoft Corporation",
"fileType": "exe",
"md5": "9d8e30daf21108092d5980c931876b7e"
},
"action": "READ",
"id": "RTF_55fcc54e-2cbb-3177-81c0-f42e413312d2_19-2-2025",
"category": [
"virus"
],
"asset": {
"fullOSName": "Microsoft Windows 11 Enterprise 10.0.22631 Build 22631",
"hostName": "WIN-AS-IPV6-4-2",
"agentId": "x82xx34x-5xxx-4110-9878-x91x5x476x47",
"interfaces": [
{
"macAddress": "00:X0:XX:0X:00:00",
"ipAddress": "fXX0:0:0:0:XXX9:1XX9:2XXb:XXed",
"interfaceName": "Intel(R) 82574L Gigabit Network Connection",
"gatewayAddress": "XX.XX.X0X.X"
},
{
"macAddress": "00:X0:XX:0X:00:00",
"ipAddress": "fXX0:0:0:0:XXX9:1XX9:2XXb:XXed",
"interfaceName": "Intel(R) 82574L Gigabit Network Connection",
"gatewayAddress": "XX.XX.X0X.X"
}
],
"netBiosName": "WIN-AS-IPV6-4-2",
"customerId": "8380x005-x923-x37x-8032-42xx709x6xx7",
"platform": "Windows",
"tags": [
{
"name": "Maine_District_Court",
"uuid": "XXX676fX-cXX8-XX32-bfXX-XXX8XbcXXX1b"
},
{
"name": "Meena",
"uuid": "XXX676fX-cXX8-XX32-bfXX-XXX8XbcXXX1b"
},
{
"name": "Cloud Agent",
"uuid": "XXX676fX-cXX8-XX32-bfXX-XXX8XbcXXX1b"
}
]
}
}
]
Response Field DescriptionsResponse Field Descriptions
Dataset Name |
Field Name |
Data Type |
Description |
---|---|---|---|
Event | dateTime | Timestamp | Timestamp of the last reported EDR event (ISO 8601 format). |
eventSource | String | The source of the event (Anti-malware or EDR). | |
type | String | The type of event (e.g., 'FILE' indicates a file-related event). | |
score | String | The overall threat severity score based on reputation data from Threat Intelligence feeds. | |
scoreSource | String | The source of the score (e.g. Anti-malware, Behavioral Detection, Qualys Research, Sandbox, Threat Intelligence). | |
action | String | An action performed on the file (e.g. "READ", "CREATED" etc). | |
id | String | A unique identifier assigned to the agent installed on the asset. | |
category | Array of String | A list of categories associated with the event (e.g., 'virus'). | |
indicator2 | Array of Object |
A list of indicators (detected threats) includes objects with detailed information. Dataset: indicator2 |
|
actor | Object |
Details about the process that triggered the event. Dataset: actor |
|
file | Object |
Details related to the file involved in the event. Dataset: file |
|
file.certificates | Object |
A list of certificates associated with the file. Contains certificate information. Dataset: file.certificates |
|
asset | Object |
Indicates details about the host system where the event occurred. Dataset: asset |
|
asset.interfaces | Array of Object |
A list of network interfaces on the host system, including network-related details such as IP and MAC addresses. Dateset: asset.interfaces |
|
asset.tags | Array of Object |
A list of tags associated with the asset. Contains tag details such as name and unique identifier. Dateset: asset.tags |
|
indicator2 | score | String | The threat severity score. |
sha256 | String | The SHA-256 hash value of the file associated with the indicator. | |
familyName | String | The family name of the detected malware or threat (e.g., "virus"). | |
verdict | String | The verdict assigned to the file (e.g., "MALICIOUS"). | |
threatName | String | The name of the detected threat. | |
category | String | The category of the detected threat (e.g., "virus"). | |
actor | processEventId | String | The unique identifier for the process event. |
processUniqueId | String | The unique identifier for the process. | |
processId | Integer | The Process ID of the actor involved in the event. | |
processName | String | The name of the process responsible for the event (e.g., "MsMpEng.exe"). | |
imageFullPath | String | The full file path of the executable that triggered the event. | |
productName | String | The name of the product associated with the process (e.g., "Microsoft Windows Operating System"). | |
file | fullPath | String | The full file path of the involved file. |
extension | String | The file extension of the involved file (e.g., "exe"). | |
product | String | The product name associated with the file. | |
numOfPages | Integer | The number of pages in the file (if applicable). | |
fileName | String | The name of the file involved in the event. | |
sha256 | String | The SHA-256 hash value of the file. | |
writeDate | String | The date and time when the file was last written to. | |
description | String | The description of the file (e.g., "Windows PowerShell"). | |
macroEmbedded | Boolean | Indicates whether the file contains embedded macros (e.g., 'false' if no macros are present). | |
version | String | The version of the file involved. | |
path | String | The path where the file is located. | |
createdDate | String | The date and time when the file was created. | |
size | Integer | The size of the file in bytes. | |
accessDate | String | The date and time when the file was last accessed. | |
nonPEFile | Boolean | Indicates whether the file is a non-PE (Portable Executable) file. | |
company | String | The company that produced the file. | |
fileType | String | The type of file (e.g. "exe"). | |
md5 | String | The MD5 hash value of the file. | |
file.certificates | expiryDate | String | The expiry date of the certificate. |
certificateSigned | Boolean | Indicates whether the certificate is signed. | |
certificateIssuer | String | The issuer of the certificate. | |
certificateValid | Boolean | Indicates whether the certificate is valid. | |
certificateIssuedTo | String | The entity to which the certificate was issued. | |
certificateSignedDate | String | The date when the certificate was signed. | |
certificateHash | String | The hash value of the certificate. | |
asset | fullOSName | String | The full operating system name and version running on the host system. |
hostName | String | The hostname of the affected system. | |
agentId | String | The unique identifier for the agent monitoring the system. | |
netBiosName | String | The NetBIOS name of the affected system. | |
customerId | String | The unique identifier for the customer. | |
platform | String | The platform on which the host is running (e.g., Windows). | |
asset.interfaces | macAddress | String | The MAC address of the network interface. |
ipAddress | String | The IP address of the network interface. | |
interfaceName | String | The name of the network interface. | |
gatewayAddress | String | The gateway address of the network interface. | |
asset.tags | name | String | The name of the tag. |
uuid | String | The unique identifier for the tag. |
Sample - Fetch Network Event DetailsSample - Fetch Network Event Details
API request
curl -G --data-urlencode "filter=type:network"
"<qualys_base_url>/ioc/v1/events/fxxxx2-222a-xxxx-abcd-28exxxxx11/F_fexxxxx-222a-1111-abcd-2xxxx11-1xxxx505xxxxxx8xxx56" -H "Authorization: Bearer <token>"
Response
[
{
"dateTime": "2025-02-20T15:36:11.000+0000",
"process": {
"fullPath": "/usr/sbin/chronyd",
"parentProcessName": "systemd",
"processFile": {
"fullPath": "/usr/sbin/chronyd",
"path": "/usr/sbin",
"createdDate": "2019-08-08T11:40:18.000+0000",
"sha256": "5fc9a67facabbe3abc2970db5d3ace95f591cf0d307b83c76a62873410dc652a",
"size": 269392,
"moduleName": "chronyd",
"uniqueImageId": "-2766799832389448102",
"md5": "919aa879e59e4cc4ad2638d2d6271eb9"
},
"processEventId": "RTP_f96ee276-5ba1-3963-b6be-98b58637de9d_24-12-2024",
"parentPid": 1,
"pid": 796,
"userName": "chrony",
"processName": "chronyd",
"currentDirectory": "/",
"elevated": false,
"isCertificateExists": false,
"arguments": "/usr/sbin/chronyd",
"parentEventId": "RTP_d7d691d0-1b84-31b1-8d7e-c6b3f43d0963_24-12-2024"
},
"eventSource": "EDR",
"type": "NETWORK",
"network": {
"protocol": "TCP",
"remoteIP": "2604:a880:400:d0::4ed:f001",
"localPort": "0",
"agentMetaData": "{\"tags\":[\"Unknown\",\"auid_4294967295\"]}",
"remotePort": "123",
"state": "ESTABLISHED"
},
"actor": {
"processEventId": "RTP_f96ee276-5ba1-3963-b6be-98b58637de9d_24-12-2024",
"processUniqueId": "4343915213667668267",
"processId": 796,
"processName": "chronyd",
"arguments": "/usr/sbin/chronyd",
"imageFullPath": "/usr/sbin/chronyd"
},
"score": "9",
"scoreSource": "CTDB",
"action": "ESTABLISHED",
"id": "XXX8a87X-XXbb-4XX9-XX74-XXX08f6XX54X",
"category": [
"Phishing",
"Spam Sources",
"Windows Exploits"
],
"asset": {
"fullOSName": "CentOS Linux 7.9.2009",
"hostName": "centos-10.14.28.130",
"agentId": "x82xx34x-5xxx-4110-9878-x91x5x476x47",
"interfaces": [
{
"macAddress": "00:X0:XX:0X:00:00",
"ipAddress": "X0.1X.XX1.00",
"interfaceName": "ens192",
"gatewayAddress": "XX.XX.X0X.X"
},
{
"macAddress": "00:X0:XX:0X:00:00",
"ipAddress": "fXX0:0:0:0:XXX9:1XX9:2XXb:XXed",
"interfaceName": "ens192",
"gatewayAddress": "XX.XX.X0X.X"
}
],
"customerId": "fd01c4e0-9a06-4198-8362-fa6eb8b2adea",
"platform": "LINUX",
"tags": [
{
"name": "Cloud Agent",
"uuid": "XXX676fX-cXX8-XX32-bfXX-XXX8XbcXXX1b"
},
{
"name": "AG1",
"uuid": "XXX676fX-cXX8-XX32-bfXX-XXX8XbcXXX1b"
}
]
}
}
]
Response Field DescriptionsResponse Field Descriptions
Dataset Name |
Field Name |
Data Type |
Description |
---|---|---|---|
Event | dateTime | String | Timestamp of the last reported EDR event (ISO 8601 format). |
eventSource | String | The source of the event (e.g., "EDR" for endpoint detection and response). | |
type | String | The type of event (e.g., "NETWORK" indicates a network-related event). | |
score | String | The overall threat severity score assigned to the event (e.g., "9" indicates a high risk). | |
scoreSource | String | The source of the score (e.g., "CTDB"). | |
action | String | An action taken on the network connection (e.g., "ESTABLISHED"). | |
id | String | The Unique identifier for the event. | |
uniqueId | String | The Unique identifier for the event. | |
process | Object |
Information about the process involved in the event. Dataset: process |
|
process.processFile | Object |
Information about the process file. Dataset: process.processFile |
|
network | Object |
Information related to the network event. Dataset: network |
|
actor | Object |
Details about the process that triggered the event. Dataset: actor |
|
actor | Object |
Information about the asset (host) involved in the event. Dataset: asset |
|
asset.interfaces | Array of Object |
A list of network interfaces on the host system, including network-related details such as IP and MAC addresses. Dateset: asset.interfaces |
|
asset.tags | Array of Object |
A list of tags associated with the asset. Contains tag details such as name and unique identifier. Dateset: asset.tags |
|
Process | fullPath | String | The full path of the process executable. |
parentProcessName | String | The name of the parent process. | |
processEventId | String | The unique identifier for the process event. | |
parentPid | Integer | The parent process ID (PID) of the process. | |
pid | Integer | The process ID (PID) of the current process. | |
userName | String | The username under which the process is running. | |
processName | String | The name of the process. | |
currentDirectory | String | The current directory of the process. | |
elevated | Boolean | Indicates whether the process has elevated privileges (e.g., root, admin). | |
isCertificateExists | Boolean | Indicates whether the process has an associated certificate. | |
arguments | String | The arguments passed to the process during execution. | |
parentEventId | String | Indicates the parent event identifier for the process. | |
process.processFile | fullPath | String | The full path of the process file. |
path | String | The directory path where the process file is located. | |
createdDate | String | The date when the process file was created. | |
sha256 | String | The SHA-256 hash of the process file. | |
size | Integer | The size of the process file in bytes. | |
moduleName | String | The name of the module associated with the process file. | |
uniqueImageId | String | The unique identifier for the process image. | |
md5 | String | The MD5 hash of the process file. | |
network | protocol | String | The protocol used in the network connection (e.g., "TCP"). |
remoteIP | String | The IP address of the remote entity involved in the network connection. | |
localPort | String | The local port used for the network connection. | |
remotePort | String | The remote port used for the network connection | |
state | String | Indicates the state of the network connection (e.g., "ESTABLISHED"). | |
actor | processEventId | String | The unique identifier for the process event. |
processUniqueId | String | The unique identifier for the process. | |
processId | Integer | The process ID of the actor. | |
processName | String | The name of the process involved. | |
arguments | String | The arguments passed to the process involved in the event. | |
imageFullPath | String | The full path of the process executable involved in the event. | |
category | Array of Strings | The categories associated with the event (e.g., "Phishing", "Spam Sources", "Windows Exploits"). | |
asset | fullOSName | String | The full operating system name and version running on the asset. |
hostName | String | The hostname of the affected asset. | |
agentId | String | The unique identifier for the agent monitoring the asset. | |
customerId | String | The unique identifier for the customer. | |
platform | String | The platform of the asset (e.g., "LINUX"). | |
asset.interfaces | macAddress | String | The MAC address of the network interface. |
ipAddress | String | The IP address of the network interface. | |
interfaceName | String | The name of the network interface. | |
gatewayAddress | String | The gateway address of the network interface. | |
asset.tags | name | String | The name of the tag. |
uuid | String | The unique identifier for the tag. |
Sample - Fetch Process Event DetailsSample - Fetch Process Event Details
API request
curl -G --data-urlencode "filter=type:process"
"<qualys_base_url>/ioc/v1/events/fxxxx2-222a-xxxx-abcd-28exxxxx11/F_fexxxxx-222a-1111-abcd-2xxxx11-1xxxx505xxxxxx8xxx56" -H "Authorization: Bearer <token>"
Response
[
{
"dateTime": "2025-02-19T00:03:39.016+0000",
"process": {
"parentProcessName": "services.exe",
"processFile": {
"createdDate": "2025-02-14T18:36:56.000+0000",
"sha256": "6fc3bf1fdfd76860be782554f8d25bd32f108db934d70f4253f1e5f23522e503",
"size": 57528,
"certificates": [
{
"expiryDate": "2025-02-07T19:22:46.000+0000",
"certificateSigned": true,
"certificateIssuer": "Microsoft Windows Production PCA 2011",
"certificateValid": false,
"certificateIssuedTo": "Microsoft Windows Publisher",
"certificateSignedDate": "2024-02-08T19:22:46.000+0000",
"certificateHash": "09a1aa05288e952c901821deaece78d148d2e4d2"
}
],
"moduleName": "svchost.exe",
"uniqueImageId": "6695093065446506235",
"md5": "7469cc568ad6821fd9d925542730a7d8"
},
"processEventId": "RTP_5d946345-7faa-3040-a254-570fe24cb92b_19-2-2025",
"parentPid": 736,
"pid": 4720,
"userName": "NT AUTHORITY\\SYSTEM",
"sid": "S-1-16-16384",
"processName": "svchost.exe",
"elevated": true,
"isCertificateExists": true,
"arguments": "-k netsvcs -p -s wuauserv",
"parentEventId": "RTP_ebe08cb7-a6f6-3fe8-a93d-761f669649ff_12-2-2025",
"integrityLevel": "ML_SYSTEM",
"loadedModules": [
{
"fullPath": "C:\\Windows\\System32\\msxml6.dll",
"fileName": "msxml6.dll",
"createdDate": "2024-05-29T12:12:51.000+0000",
"sha256": "1bb75d1eddd78915238e145aeabdd6ffbc789d6325fb4280dafcf42ca26e7667",
"size": 2474760,
"certificates": [
{
"expiryDate": "2024-11-14T19:20:08.000+0000",
"certificateSigned": true,
"certificateIssuer": "Microsoft Windows Production PCA 2011",
"certificateValid": false,
"certificateIssuedTo": "Microsoft Windows",
"certificateSignedDate": "2023-11-16T19:20:08.000+0000",
"certificateHash": "71f53a26bb1625e466727183409a30d03d7923df"
}
],
"moduleName": "msxml6.dll",
"action": "LOAD",
"productName": "Microsoft XML Core Services",
"md5": "545a0575c1b1caf6b681f4dd9ac75e84"
}
]
},
"eventSource": "EDR",
"type": "PROCESS",
"actor": {
"processEventId": "RTP_ebe08cb7-a6f6-3fe8-a93d-761f669649ff_12-2-2025",
"processId": 736,
"processName": "services.exe",
"imageFullPath": "C:\\Windows\\system32\\services.exe"
},
"score": "3",
"scoreSource": "SIDDHI",
"action": "RUNNING",
"mitreInfoList": [
{
"techniques": [
{
"techniqueName": "Masquerading: Match Legitimate Name or Location",
"techniqueScore": 3,
"techniqueId": "T1036.005"
}
],
"tactics": [
{
"tacticName": "Defense Evasion",
"tacticId": "TA0005"
}
],
"technique": {
"techniqueName": "Masquerading: Match Legitimate Name or Location",
"techniqueScore": 3,
"techniqueId": "T1036.005"
},
"ruleNames": [
"T1036_005_1 Masquerading: Match Legitimate Name or Location"
],
"ruleId": "T1036_005_1"
}
],
"ruleNames": [
"T1036_005_1 Masquerading: Match Legitimate Name or Location"
],
"id": "XXX8a87X-XXbb-4XX9-XX74-XXX08f6XX54X",
"asset": {
"fullOSName": "Microsoft Windows 10 Enterprise 10.0.19045 Build 19045",
"hostName": "DESKTOP-F66RP42",
"agentId": "x82xx34x-5xxx-4110-9878-x91x5x476x47",
"netBiosName": "DESKTOP-F66RP42",
"isQuarantineHost": false,
"customerId": "8380x005-x923-x37x-8032-42xx709x6xx7",
"platform": "Windows",
"tags": [
{
"name": "Cloud Agent",
"uuid": "XXX676fX-cXX8-XX32-bfXX-XXX8XbcXXX1b"
}
]
}
}
]
Response Field DescriptionsResponse Field Descriptions
Dataset Name |
Field Name |
Data Type |
Description |
---|---|---|---|
Event | dateTime | String (ISO 8601) | The timestamp when the event occurred. |
eventSource | String | The source of the event (e.g., EDR). | |
type | String | The type of event (e.g., PROCESS). | |
score | String | The overall threat security score indicating the risk or severity of the event. | |
scoreSource | String | The source of the score. | |
action | String | The action associated with the event (e.g., RUNNING). | |
ruleNames | Array of Strings | The list of rule names triggered by the event (e.g., Masquerading). | |
id | String | The Unique identifier for the event. | |
process | Object |
Information about the process involved in the event. Dataset: process |
|
process.processFile | Object |
Information about the process file. Dataset: process.processFile |
|
process.processFile.certificates | Array of Objects |
The list of certificates associated with the process file. Dataset: process.processFile.certificates |
|
process.loadedModules | Array of Objects |
The list of modules loaded by the process. Dataset: process.loadedModules |
|
process.loadedModules.certificates | Array of Objects |
The list of certificates associated with the process file. Dataset: process.loadedModules.certificates |
|
actor | Object |
Information about the actor that initiated the event. Dataset: actor |
|
mitreInfoList | Array of Objects |
The list of MITRE ATT&CK techniques, tactics, and rules related to the event. Dataset: mitreInfoList |
|
mitreInfoList.techniques | Array of Objects |
The list of techniques associated with the event (e.g. Masquerading). Dataset: mitreInfoList.techniques |
|
mitreInfoList.tactics | Array of Objects |
The list of tactics associated with the event (e.g. Defense Evasion). Dataset: mitreInfoList.tactics |
|
mitreInfoList.technique | Array of Objects |
Detailed information about the MITRE technique. Dataset: mitreInfoList.technique |
|
asset | Object |
Information about the asset (host) involved in the event. Dataset: asset |
|
asset.tags | Array of Objects |
A list of tags associated with the asset. Dataset: asset.tags |
|
indicator2 | score | String | The threat severity score. |
sha256 | String | The SHA-256 hash value of the file associated with the indicator. | |
familyName | String | The family name of the detected malware or threat (e.g., "virus"). | |
verdict | String | The verdict assigned to the file ("MALICIOUS" in this case). | |
threatName | String | The name of the detected threat. | |
category | String | The category of the detected threat (e.g., "virus"). | |
actor | processEventId | String | The unique identifier for the process event. |
processUniqueId | String | The unique identifier for the process. | |
processId | Integer | The process ID of the actor involved in the event. | |
processName | String | The name of the process responsible for the event (e.g., "MsMpEng.exe"). | |
imageFullPath | String | The full file path of the executable that triggered the event. | |
productName | String | The name of the product associated with the process (e.g., "Microsoft Windows Operating System"). | |
file | fullPath | String | The full file path of the involved file. |
extension | String | The file extension of the involved file (e.g., "exe"). | |
product | String | The product name associated with the file. | |
numOfPages | Integer | The number of pages in the file (if applicable). | |
fileName | String | The name of the file involved in the event. | |
sha256 | String | The SHA-256 hash value of the file. | |
writeDate | String | The date and time when the file was last written to. | |
description | String | The description of the file (e.g., "Windows PowerShell"). | |
macroEmbedded | Boolean | Indicates whether the file contains embedded macros (e.g., 'false' if no macros are present). | |
version | String | The version of the file involved. | |
path | String | The path where the file is located. | |
createdDate | String | The date and time when the file was created. | |
size | Integer | The size of the file in bytes. | |
accessDate | String | The date and time when the file was last accessed. | |
nonPEFile | Boolean | Indicates whether the file is a non-PE (Portable Executable) file. | |
company | String | The company that produced the file. | |
fileType | String | The type of file (e.g. "exe"). | |
md5 | String | The MD5 hash value of the file. | |
file.certificates | expiryDate | String | The expiry date of the certificate. |
certificateSigned | Boolean | Indicates whether the certificate is signed. | |
certificateIssuer | String | The issuer of the certificate. | |
certificateValid | Boolean | Indicates whether the certificate is valid. | |
certificateIssuedTo | String | The entity to which the certificate was issued. | |
certificateSignedDate | String | The date when the certificate was signed. | |
certificateHash | String | The hash value of the certificate. | |
asset | fullOSName | String | The full operating system name and version running on the host system. |
hostName | String | The hostname of the affected system. | |
agentId | String | The unique identifier for the agent monitoring the system. | |
netBiosName | String | The NetBIOS name of the affected system. | |
customerId | String | The unique identifier for the customer. | |
platform | String | The platform on which the host is running (e.g., Windows). | |
asset.interfaces | macAddress | String | The MAC address of the network interface. |
ipAddress | String | The IP address of the network interface. | |
interfaceName | String | The name of the network interface. | |
gatewayAddress | String | The gateway address of the network interface. | |
asset.tags | name | String | The name of the tag. |
uuid | String | The unique identifier for the tag. |
Sample - Fetch Registry Event DetailsSample - Fetch Registry Event Details
API request
curl -G --data-urlencode "filter=type:registry"
"<qualys_base_url>/ioc/v1/events/fxxxx2-222a-xxxx-abcd-28exxxxx11/F_fexxxxx-222a-1111-abcd-2xxxx11-1xxxx505xxxxxx8xxx56" -H "Authorization: Bearer <token>"
Response
[
{
"dateTime": "2025-02-22T08:22:23.017+0000",
"registry": {
"path": "TamperProtection",
"value": "0x0",
"key": "HKLM\\SOFTWARE\\Microsoft\\Windows Defender\\Features"
},
"eventSource": "EDR",
"type": "REGISTRY",
"actor": {
"processEventId": "RTP_d15905b7-df0e-3b55-8cb4-f9a7c2ef9d92_21-2-2025",
"processUniqueId": "-553510450883925585",
"processId": 75572,
"processName": "MsMpEng.exe",
"imageFullPath": "C:\\ProgramData\\Microsoft\\Windows Defender\\Platform\\4.18.25010.6-0\\MsMpEng.exe",
"productName": "Microsoft? Windows? Operating System"
},
"score": "3",
"scoreSource": "SIDDHI",
"action": "WRITE",
"mitreInfoList": [
{
"techniques": [
{
"techniqueName": "Modify Registry",
"techniqueScore": 3,
"techniqueId": "T1112"
},
{
"techniqueName": "Impair Defenses: Disable or Modify Tools",
"techniqueId": "T1562.001"
}
],
"tactics": [
{
"tacticName": "Defense Evasion",
"tacticId": "TA0005"
}
],
"technique": {
"techniqueName": "Modify Registry",
"techniqueScore": 3,
"techniqueId": "T1112"
},
"ruleNames": [
"Tamper Win Defender Protection via Registry"
],
"ruleId": "T1112_61"
}
],
"ruleNames": [
"Tamper Win Defender Protection via Registry"
],
"id": "XXX8a87X-XXbb-4XX9-XX74-XXX08f6XX54X",
"asset": {
"fullOSName": "Microsoft Windows Server 2022 Standard 10.0.20348 Build 20348",
"hostName": "WIN-KL5S113723C",
"agentId": "x82xx34x-5xxx-4110-9878-x91x5x476x47",
"interfaces": [
{
"macAddress": "00:X0:XX:0X:00:00",
"ipAddress": "fXX0:0:0:0:XXX9:1XX9:2XXb:XXed",
"interfaceName": "Intel(R) 82574L Gigabit Network Connection",
"gatewayAddress": "XX.XX.X0X.X"
},
{
"macAddress": "00:X0:XX:0X:00:00",
"ipAddress": "fXX0:0:0:0:XXX9:1XX9:2XXb:XXed",
"interfaceName": "Intel(R) 82574L Gigabit Network Connection",
"gatewayAddress": "XX.XX.X0X.X"
},
{
"macAddress": "00:X0:XX:0X:00:00",
"ipAddress": "fXX0:0:0:0:XXX9:1XX9:2XXb:XXed",
"interfaceName": "Intel(R) 82574L Gigabit Network Connection",
"gatewayAddress": "XX.XX.X0X.X"
}
],
"netBiosName": "WIN-KL5S113723C",
"customerId": "8380x005-x923-x37x-8032-42xx709x6xx7",
"platform": "Windows",
"tags": [
{
"name": "Cloud Agent",
"uuid": "XXX676fX-cXX8-XX32-bfXX-XXX8XbcXXX1b"
}
]
}
}
]
Response Field DescriptionsResponse Field Descriptions
Dataset Name |
Field Name |
Data Type |
Description |
---|---|---|---|
Event | dateTime | Timestamp | Timestamp when the event occurred in the endpoint (ISO 8601 format). |
eventSource | String | The source of the event (e.g., "EDR" for endpoint detection and response). | |
type | String | The type of the event (e.g., "REGISTRY" indicates a registry-related event). | |
score | String | The overall threat severity score assigned to the event (e.g., "3" indicates a lower risk). | |
scoreSource | String | The source of the score (e.g., "SIDDHI"). | |
action | String | An action taken on the registry key (e.g., "WRITE"). | |
ruleNames | Array of Strings | A list of rule names associated with the event (e.g., "Tamper Win Defender Protection via Registry"). | |
id | String | A unique identifier for the event. | |
uniqueId | String | A unique identifier for the event. | |
registry | Object |
Registry information involved in the event. Dataset: registry |
|
actor | Object |
Details about the process that triggered the event. Dataset: actor |
|
mitreInfoList | Array of Object |
A list of MITRE ATT&CK techniques, tactics, and rules related to the event. Dataset: mitreInfoList |
|
mitreInfoList.techniques | Array of Object |
A list of techniques associated with the event (e.g., Masquerading). Dataset: mitreInfoList.techniques |
|
mitreInfoList.tactics | Array of Object |
A list of tactics associated with the event (e.g., Defense Evasion). Dataset: mitreInfoList.tactics |
|
mitreInfoList.technique | Object |
Detailed information about the MITRE technique. Dataset: mitreInfoList.technique |
|
asset | Object |
Information about the asset (host) involved in the event. Dataset: asset |
|
asset.interfaces | Array of Object |
A list of network interfaces on the host system, including network-related details such as IP and MAC addresses. Dataset: asset.interfaces |
|
asset.tags | Array of Object |
A list of tags associated with the asset. Contains tag details such as name and unique identifier. Dataset: asset.tags |
|
registry | path | String | The path of the registry key. |
value | String | The value of the registry key. | |
key | String | The key of the registry path. | |
actor | processEventId | String | The unique identifier for the process event. |
processUniqueId | String | The unique identifier for the process. | |
processId | Integer | The process ID of the actor. | |
processName | String | The name of the process involved. | |
imageFullPath | String | The full path of the process executable involved in the event. | |
productName | String | The name of the product associated with the process (e.g., "Microsoft Windows Operating System"). | |
mitreInfoList | ruleNames | Array of Strings | A list of rule names triggered by the event. |
ruleId | String | The unique rule identifier associated with the event. | |
mitreInfoList.techniques | techniqueName | String | The name of the technique used (e.g. "Modify Registry"). |
techniqueScore | Integer | The score of the MITRE technique. | |
techniqueId | String | The technique ID from MITRE ATT&CK (e.g. "T1112" for Modify Registry). | |
mitreInfoList.tactics | tacticName | String | The name of the tactic used (e.g. "Defense Evasion"). |
tacticId | String | The Tactic ID from MITRE ATT&CK (e.g. "TA0005" for Defense Evasion). | |
mitreInfoList.technique | techniqueName | String | The name of the technique (e.g. "Modify Registry"). |
techniqueScore | Integer | The score of the MITRE technique. | |
techniqueId | String | The technique ID from MITRE ATT&CK (e.g. "T1112"). | |
asset | fullOSName | String | The full operating system name and version running on the asset. |
hostName | String | The hostname of the affected asset. | |
agentId | String | The unique identifier for the agent monitoring the asset. | |
netBiosName | String | The NetBIOS name of the affected asset. | |
isQuarantineHost | Boolean | Indicates whether the asset is in quarantine. | |
customerId | String | The unique identifier for the customer. | |
platform | String | The platform of the asset (e.g. "Windows"). | |
asset.interfaces | macAddress | String | The MAC address of the network interface. |
ipAddress | String | The IP address of the network interface. | |
interfaceName | String | The name of the network interface. | |
gatewayAddress | String | The gateway address of the network interface. | |
asset.tags | name | String | The name of the tag. |
uuid | String | The unique identifier for the tag. |
API Version History
The following table depicts the information about the different versions of this API along with the status:
API Version | API Status | Release Date |
/ioc/events/{agentid}/{eventid} | Active | |
/ioc/v1/events/{agentid}/{eventid} | Active | May 2025 |