This displays the MITRE ATT&CK details associated with QID. This enables more informed decision-making in threat detection, response, and mitigation and also validates your organization’s adherence to MITRE compliance.
API Request
curl --location 'https://<qualys_base_url>/api/4.0/fo/asset/host/vm/detection/?action=list&output_format=XML&mitre_attack_details=1' \
--header 'X-Requested-With: curl demo2' \
--header 'Authorization: encoded username:passwordstring'
API Response
<?xml version="1.0" encoding="UTF-8" ?>
<!DOCTYPE HOST_LIST_VM_DETECTION_OUTPUT SYSTEM "https://<qualys_base_url>/api/4.0/fo/asset/host/vm/detection/dtd/output.dtd">
<HOST_LIST_VM_DETECTION_OUTPUT>
<RESPONSE>
<DATETIME>2025-03-04T07:30:28Z</DATETIME>
<!-- keep-alive for HOST_LIST_VM_DETECTION_OUTPUT -->
<HOST_LIST>
<!-- keep-alive for HOST_LIST_VM_DETECTION_OUTPUT -->
<HOST>
<ID>6553022</ID>
<IP>11.111.11.111</IP>
<TRACKING_METHOD>AGENT</TRACKING_METHOD>
<OS>
<![CDATA[Windows 10 Pro N 64 bit Edition Version 22H2]]>
</OS>
<DNS>
<![CDATA[solution2]]>
</DNS>
<DNS_DATA>
<HOSTNAME>
<![CDATA[solution2]]>
</HOSTNAME>
<DOMAIN />
<FQDN />
</DNS_DATA>
<NETBIOS>
<![CDATA[SOLUTION2]]>
</NETBIOS>
<QG_HOSTID>
<![CDATA[311ee428-62a0-4604-b9f9-d874c1efbd88]]>
</QG_HOSTID>
<LAST_SCAN_DATETIME>2025-03-04T04:08:01Z</LAST_SCAN_DATETIME>
<LAST_VM_SCANNED_DATE>2025-03-04T04:07:51Z</LAST_VM_SCANNED_DATE>
<LAST_VM_SCANNED_DURATION>238</LAST_VM_SCANNED_DURATION>
<LAST_VM_AUTH_SCANNED_DATE>2025-03-04T04:07:51Z</LAST_VM_AUTH_SCANNED_DATE>
<DETECTION_LIST>
<DETECTION>
<UNIQUE_VULN_ID>66009800</UNIQUE_VULN_ID>
<QID>378827</QID>
<TYPE>Confirmed</TYPE>
<SEVERITY>4</SEVERITY>
<SSL>0</SSL>
<RESULTS>
<![CDATA[C:\Program Files\VMware\VMware Tools\vmtoolsd.exe Version is 12.2.6.44976]]>
</RESULTS>
<STATUS>Active</STATUS>
<FIRST_FOUND_DATETIME>2024-12-18T09:59:37Z</FIRST_FOUND_DATETIME>
<LAST_FOUND_DATETIME>2025-03-04T04:07:51Z</LAST_FOUND_DATETIME>
<SOURCE>QUALYS</SOURCE>
<MITRE_TACTIC_NAME>credential-access</MITRE_TACTIC_NAME>
<MITRE_TECHNIQUE_NAME>Exploitation for Credential Access</MITRE_TECHNIQUE_NAME>
<MITRE_TACTIC_ID>TA0006</MITRE_TACTIC_ID>
<MITRE_TECHNIQUE_ID>T1212</MITRE_TECHNIQUE_ID>
<TIMES_FOUND>305</TIMES_FOUND>
<LAST_TEST_DATETIME>2025-03-04T04:07:51Z</LAST_TEST_DATETIME>
<LAST_UPDATE_DATETIME>2025-03-04T04:08:01Z</LAST_UPDATE_DATETIME>
<IS_IGNORED>0</IS_IGNORED>
<IS_DISABLED>0</IS_DISABLED>
<LAST_PROCESSED_DATETIME>2025-03-04T04:08:01Z</LAST_PROCESSED_DATETIME>
</DETECTION>
<DETECTION>
<UNIQUE_VULN_ID>66010782</UNIQUE_VULN_ID>
<QID>380293</QID>
<TYPE>Confirmed</TYPE>
<SEVERITY>4</SEVERITY>
<SSL>0</SSL>
<RESULTS>
<![CDATA[C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe Version is 92.0.902.67]]>
</RESULTS>
<STATUS>Active</STATUS>
<FIRST_FOUND_DATETIME>2024-12-18T09:59:37Z</FIRST_FOUND_DATETIME>
<LAST_FOUND_DATETIME>2025-03-04T04:07:51Z</LAST_FOUND_DATETIME>
<SOURCE>QUALYS</SOURCE>
<MITRE_TACTIC_NAME>lateral-movement, execution, privilege-escalation</MITRE_TACTIC_NAME>
<MITRE_TECHNIQUE_NAME>Exploitation of Remote Services, Exploitation for Client Execution, Exploitation for Privilege Escalation</MITRE_TECHNIQUE_NAME>
<MITRE_TACTIC_ID>TA0008, TA0002, TA0004</MITRE_TACTIC_ID>
<MITRE_TECHNIQUE_ID>T1210, T1203, T1068</MITRE_TECHNIQUE_ID>
<TIMES_FOUND>305</TIMES_FOUND>
<LAST_TEST_DATETIME>2025-03-04T04:07:51Z</LAST_TEST_DATETIME>
<LAST_UPDATE_DATETIME>2025-03-04T04:08:01Z</LAST_UPDATE_DATETIME>
<IS_IGNORED>0</IS_IGNORED>
<IS_DISABLED>0</IS_DISABLED>
<LAST_PROCESSED_DATETIME>2025-03-04T04:08:01Z</LAST_PROCESSED_DATETIME>
</DETECTION>
<DETECTION>
<UNIQUE_VULN_ID>66307447</UNIQUE_VULN_ID>
<QID>380734</QID>
<TYPE>Confirmed</TYPE>
<SEVERITY>4</SEVERITY>
<SSL>0</SSL>
<RESULTS>
<![CDATA[C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe Version is 92.0.902.67]]>
</RESULTS>
<STATUS>Active</STATUS>
<FIRST_FOUND_DATETIME>2025-02-03T12:29:55Z</FIRST_FOUND_DATETIME>
<LAST_FOUND_DATETIME>2025-03-04T04:07:51Z</LAST_FOUND_DATETIME>
<SOURCE>QUALYS</SOURCE>
<MITRE_TACTIC_NAME>lateral-movement, execution</MITRE_TACTIC_NAME>
<MITRE_TECHNIQUE_NAME>Exploitation of Remote Services, Exploitation for Client Execution</MITRE_TECHNIQUE_NAME>
<MITRE_TACTIC_ID>TA0008, TA0002</MITRE_TACTIC_ID>
<MITRE_TECHNIQUE_ID>T1210, T1203</MITRE_TECHNIQUE_ID>
<TIMES_FOUND>104</TIMES_FOUND>
<LAST_TEST_DATETIME>2025-03-04T04:07:51Z</LAST_TEST_DATETIME>
<LAST_UPDATE_DATETIME>2025-03-04T04:08:01Z</LAST_UPDATE_DATETIME>
<IS_IGNORED>0</IS_IGNORED>
<IS_DISABLED>0</IS_DISABLED>
<LAST_PROCESSED_DATETIME>2025-03-04T04:08:01Z</LAST_PROCESSED_DATETIME>
</DETECTION>
<DETECTION>
<UNIQUE_VULN_ID>66307454</UNIQUE_VULN_ID>
<QID>382524</QID>
<TYPE>Confirmed</TYPE>
<SEVERITY>4</SEVERITY>
<SSL>0</SSL>
<RESULTS>
<![CDATA[C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe Version is 92.0.902.67]]>
</RESULTS>
<STATUS>Active</STATUS>
<FIRST_FOUND_DATETIME>2025-02-03T12:29:55Z</FIRST_FOUND_DATETIME>
<LAST_FOUND_DATETIME>2025-03-04T04:07:51Z</LAST_FOUND_DATETIME>
<SOURCE>QUALYS</SOURCE>
<MITRE_TACTIC_NAME>execution</MITRE_TACTIC_NAME>
<MITRE_TECHNIQUE_NAME>Exploitation for Client Execution</MITRE_TECHNIQUE_NAME>
<MITRE_TACTIC_ID>TA0002</MITRE_TACTIC_ID>
<MITRE_TECHNIQUE_ID>T1203</MITRE_TECHNIQUE_ID>
<TIMES_FOUND>104</TIMES_FOUND>
<LAST_TEST_DATETIME>2025-03-04T04:07:51Z</LAST_TEST_DATETIME>
<LAST_UPDATE_DATETIME>2025-03-04T04:08:01Z</LAST_UPDATE_DATETIME>
<IS_IGNORED>0</IS_IGNORED>
<IS_DISABLED>0</IS_DISABLED>
<LAST_PROCESSED_DATETIME>2025-03-04T04:08:01Z</LAST_PROCESSED_DATETIME>
</DETECTION>
<DETECTION>
<UNIQUE_VULN_ID>66307462</UNIQUE_VULN_ID>
<QID>382691</QID>
<TYPE>Confirmed</TYPE>
<SEVERITY>4</SEVERITY>
<SSL>0</SSL>
<RESULTS>
<![CDATA[C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe Version is 92.0.902.67]]>
</RESULTS>
<STATUS>Active</STATUS>
<FIRST_FOUND_DATETIME>2025-02-03T12:29:55Z</FIRST_FOUND_DATETIME>
<LAST_FOUND_DATETIME>2025-03-04T04:07:51Z</LAST_FOUND_DATETIME>
<SOURCE>QUALYS</SOURCE>
<MITRE_TACTIC_NAME>execution</MITRE_TACTIC_NAME>
<MITRE_TECHNIQUE_NAME>Exploitation for Client Execution</MITRE_TECHNIQUE_NAME>
<MITRE_TACTIC_ID>TA0002</MITRE_TACTIC_ID>
<MITRE_TECHNIQUE_ID>T1203</MITRE_TECHNIQUE_ID>
<TIMES_FOUND>104</TIMES_FOUND>
<LAST_TEST_DATETIME>2025-03-04T04:07:51Z</LAST_TEST_DATETIME>
<LAST_UPDATE_DATETIME>2025-03-04T04:08:01Z</LAST_UPDATE_DATETIME>
<IS_IGNORED>0</IS_IGNORED>
<IS_DISABLED>0</IS_DISABLED>
<LAST_PROCESSED_DATETIME>2025-03-04T04:08:01Z</LAST_PROCESSED_DATETIME>
</DETECTION>
</DETECTION_LIST>
</HOST>
</HOST_LIST>
</RESPONSE>
</HOST_LIST_VM_DETECTION_OUTPUT>
A DTD for the Host Detection List API has been added.
<platform API server> /api/4.0/fo/asset/host/vm/detection/dtd/output.dtd
DTD output for the Host Detection List API is as follows:
DTD Output
<!-- QUALYS HOST_LIST_VM_DETECTION_OUTPUT DTD -->
<!ELEMENT HOST_LIST_VM_DETECTION_OUTPUT (REQUEST?,RESPONSE)>
<!ELEMENT REQUEST (DATETIME, USER_LOGIN, RESOURCE, PARAM_LIST?, POST_DATA?)>
<!ELEMENT DATETIME (#PCDATA)>
<!ELEMENT USER_LOGIN (#PCDATA)>
<!ELEMENT RESOURCE (#PCDATA)>
<!ELEMENT PARAM_LIST (PARAM+)>
<!ELEMENT PARAM (KEY, VALUE)>
<!ELEMENT KEY (#PCDATA)>
<!ELEMENT VALUE (#PCDATA)>
<!-- if returned, POST_DATA will be urlencoded -->
<!ELEMENT POST_DATA (#PCDATA)>
<!ELEMENT RESPONSE (DATETIME, HOST_LIST?, WARNING?)>
<!ELEMENT HOST_LIST (HOST+)>
<!ELEMENT HOST (ID, ASSET_ID?, IP?, IPV6?, TRACKING_METHOD?, ASSET_GROUP_LIST?, NETWORK_ID?, NETWORK_NAME?, OS_HOSTNAME?,
OS?, OS_CPE?, DNS?, DNS_DATA?, CLOUD_PROVIDER?, CLOUD_SERVICE?, CLOUD_RESOURCE_ID?, EC2_INSTANCE_ID?, NETBIOS?, QG_HOSTID?,
LAST_SCAN_DATETIME?, LAST_VM_SCANNED_DATE?,
LAST_VM_SCANNED_DURATION?, LAST_VM_AUTH_SCANNED_DATE?,
LAST_VM_AUTH_SCANNED_DURATION?, LAST_PC_SCANNED_DATE?, TAGS?, METADATA?, CLOUD_PROVIDER_TAGS?, DETECTION_LIST)>
<!ELEMENT ID (#PCDATA)>
<!ELEMENT ASSET_ID (#PCDATA)>
<!ELEMENT IP (#PCDATA)>
<!ELEMENT IPV6 (#PCDATA)>
<!ELEMENT TRACKING_METHOD (#PCDATA)>
<!ELEMENT ASSET_GROUP_LIST (EMPTY|ASSET_GROUP)*>
<!ELEMENT ASSET_GROUP (ID, TITLE)>
<!ELEMENT TITLE (#PCDATA)>
<!ELEMENT NETWORK_ID (#PCDATA)>
<!ELEMENT NETWORK_NAME (#PCDATA)>
<!ELEMENT OS_HOSTNAME (#PCDATA)>
<!ELEMENT OS (#PCDATA)>
<!ELEMENT OS_CPE (#PCDATA)>
<!ELEMENT DNS (#PCDATA)>
<!ELEMENT DNS_DATA (HOSTNAME?, DOMAIN?, FQDN?)>
<!ELEMENT HOSTNAME (#PCDATA)>
<!ELEMENT DOMAIN (#PCDATA)>
<!ELEMENT FQDN (#PCDATA)>
<!ELEMENT CLOUD_PROVIDER (#PCDATA)>
<!ELEMENT CLOUD_SERVICE (#PCDATA)>
<!ELEMENT CLOUD_RESOURCE_ID (#PCDATA)>
<!ELEMENT EC2_INSTANCE_ID (#PCDATA)>
<!ELEMENT NETBIOS (#PCDATA)>
<!ELEMENT QG_HOSTID (#PCDATA)>
<!ELEMENT LAST_SCAN_DATETIME (#PCDATA)>
<!ELEMENT LAST_VM_SCANNED_DATE (#PCDATA)>
<!ELEMENT LAST_VM_SCANNED_DURATION (#PCDATA)>
<!ELEMENT LAST_VM_AUTH_SCANNED_DATE (#PCDATA)>
<!ELEMENT LAST_VM_AUTH_SCANNED_DURATION (#PCDATA)>
<!ELEMENT LAST_PC_SCANNED_DATE (#PCDATA)>
<!ELEMENT TAGS (TAG+)>
<!ELEMENT TAG (TAG_ID?, NAME, COLOR?, BACKGROUND_COLOR?)>
<!ELEMENT TAG_ID (#PCDATA)>
<!ELEMENT NAME (#PCDATA)>
<!ELEMENT COLOR (#PCDATA)>
<!ELEMENT BACKGROUND_COLOR (#PCDATA)>
<!ELEMENT METADATA (EC2|GOOGLE|AZURE)+>
<!ELEMENT EC2 (ATTRIBUTE*)>
<!ELEMENT GOOGLE (ATTRIBUTE*)>
<!ELEMENT AZURE (ATTRIBUTE*)>
<!ELEMENT ATTRIBUTE (NAME,LAST_STATUS,VALUE,LAST_SUCCESS_DATE?,LAST_ERROR_DATE?,LAST_ERROR?)>
<!ELEMENT LAST_STATUS (#PCDATA)>
<!ELEMENT LAST_SUCCESS_DATE (#PCDATA)>
<!ELEMENT LAST_ERROR_DATE (#PCDATA)>
<!ELEMENT LAST_ERROR (#PCDATA)>
<!ELEMENT CLOUD_PROVIDER_TAGS (CLOUD_TAG+)>
<!ELEMENT CLOUD_TAG (NAME, VALUE, LAST_SUCCESS_DATE)>
<!ELEMENT DETECTION_LIST (DETECTION+)>
<!ELEMENT DETECTION (UNIQUE_VULN_ID, QID, TYPE, SEVERITY?, PORT?, PROTOCOL?, FQDN?, SSL?, INSTANCE?, RESULT_INSTANCE?,
RESULTS?, STATUS?,
FIRST_FOUND_DATETIME?, LAST_FOUND_DATETIME?, SOURCE?, MITRE_TACTIC_NAME?, MITRE_TECHNIQUE_NAME?, MITRE_TACTIC_ID?, MITRE_TECHNIQUE_ID?, QDS?, QDS_FACTORS?, TIMES_FOUND?,
LAST_TEST_DATETIME?,
LAST_UPDATE_DATETIME?,
LAST_FIXED_DATETIME?,
FIRST_REOPENED_DATETIME?, LAST_REOPENED_DATETIME?, TIMES_REOPENED?,
SERVICE?, IS_IGNORED?, IS_DISABLED?, AFFECT_RUNNING_KERNEL?, AFFECT_RUNNING_SERVICE?, AFFECT_EXPLOITABLE_CONFIG?, LAST_PROCESSED_DATETIME?, ASSET_CVE?)>
<!ELEMENT UNIQUE_VULN_ID (#PCDATA)>
<!ELEMENT QID (#PCDATA)>
<!ELEMENT TYPE (#PCDATA)>
<!ELEMENT PORT (#PCDATA)>
<!ELEMENT PROTOCOL (#PCDATA)>
<!ELEMENT SSL (#PCDATA)>
<!ELEMENT INSTANCE (#PCDATA)>
<!ELEMENT RESULT_INSTANCE (#PCDATA)>
<!ELEMENT RESULTS (#PCDATA)>
<!ELEMENT STATUS (#PCDATA)>
<!ELEMENT SEVERITY (#PCDATA)>
<!ELEMENT QDS (#PCDATA)>
<!ATTLIST QDS severity CDATA #REQUIRED>
<!ELEMENT QDS_FACTORS (QDS_FACTOR)*>
<!ELEMENT QDS_FACTOR (#PCDATA)>
<!ATTLIST QDS_FACTOR name CDATA #REQUIRED>
<!ELEMENT FIRST_FOUND_DATETIME (#PCDATA)>
<!ELEMENT LAST_FOUND_DATETIME (#PCDATA)>
<!ELEMENT SOURCE (#PCDATA)>
<!ELEMENT MITRE_TACTIC_NAME (#PCDATA)>
<!ELEMENT MITRE_TECHNIQUE_NAME (#PCDATA)>
<!ELEMENT MITRE_TACTIC_ID (#PCDATA)>
<!ELEMENT MITRE_TECHNIQUE_ID (#PCDATA)>
<!ELEMENT TIMES_FOUND (#PCDATA)>
<!ELEMENT LAST_TEST_DATETIME (#PCDATA)>
<!ELEMENT LAST_UPDATE_DATETIME (#PCDATA)>
<!ELEMENT LAST_FIXED_DATETIME (#PCDATA)>
<!ELEMENT FIRST_REOPENED_DATETIME (#PCDATA)>
<!ELEMENT LAST_REOPENED_DATETIME (#PCDATA)>
<!ELEMENT TIMES_REOPENED (#PCDATA)>
<!ELEMENT SERVICE (#PCDATA)>
<!ELEMENT IS_IGNORED (#PCDATA)>
<!ELEMENT IS_DISABLED (#PCDATA)>
<!ELEMENT AFFECT_RUNNING_KERNEL (#PCDATA)>
<!ELEMENT AFFECT_RUNNING_SERVICE (#PCDATA)>
<!ELEMENT AFFECT_EXPLOITABLE_CONFIG (#PCDATA)>
<!ELEMENT LAST_PROCESSED_DATETIME (#PCDATA)>
<!ELEMENT ASSET_CVE (#PCDATA)>
<!ELEMENT WARNING (CODE?, TEXT, URL?)>
<!ELEMENT CODE (#PCDATA)>
<!ELEMENT TEXT (#PCDATA)>
<!ELEMENT URL (#PCDATA)>
<!-- EOF -->