Create a Case
POST/workspace/:ws_id/case_management/table/cases
Adds a new Case record.
Request
Path Parameters
Workspace ID
- application/json
Body
required
Case Data
Possible values: [Malware
, Ransomware
, Insider Threat
, VIP
, Workstation
, Server
, Data Leak
, Data Theft
, Account Compromise
, Adware
, Crypto Miner
, Fraud
]
Possible values: [Reconnaissance
, Resource Development
, Initial Access
, Execution
, Persistence
, Privilege Escalation
, Defense Evasion
, Credential Access
, Discovery
, Lateral Movement
, Collection
, Command and Control
, Exfiltration
, Impact
]
Possible values: [1
, 2
, 3
, 4
]
Possible values: [OPEN
, IN PROGRESS
, CLOSED
]
Possible values: [Malware
, Ransomware
, Adware
, Spyware
, Crypto Miner
, Data Exfiltration
, Insider Threat
, Network Intrusion
, DoS
, DDoS
, MITM
, SQL Injection
, Email Spoofing
, DNS Spoofing
, C2 Communications
, Rogue Device
, Brute Force
, Phishing
, Compromised Credentials
, Account Takeover
, Physical
, Vulnerability
, Reconnaissance
, Domain Takeover
, Lateral Movement
, Network Exposure
, Data Exposure
, Credential Exposure
, Suspicious User Activity
, Suspicious Login
, Suspicious Network Activity
, Suspicious USB Device
, Security Policy Violation
, Security Compliance Violation
]
Possible values: [CrowdStrike
, Checkpoint
, Delinea
, Securonix
, Falcon LogScale
, Splunk
, ArcSight
, SolarWinds Service Desk
, Datadog
, SentinelOne
, Microsoft Defender For Cloud
, Microsoft Defender For Cloud Apps
, Microsoft Defender For Endpoints
]
Responses
- 200
- 400
OK
- */*
- Schema
- Example (from schema)
Schema
Possible values: [Malware
, Ransomware
, Insider Threat
, VIP
, Workstation
, Server
, Data Leak
, Data Theft
, Account Compromise
, Adware
, Crypto Miner
, Fraud
]
Possible values: [Reconnaissance
, Resource Development
, Initial Access
, Execution
, Persistence
, Privilege Escalation
, Defense Evasion
, Credential Access
, Discovery
, Lateral Movement
, Collection
, Command and Control
, Exfiltration
, Impact
]
Possible values: [1
, 2
, 3
, 4
]
Possible values: [OPEN
, IN PROGRESS
, CLOSED
]
Possible values: [Malware
, Ransomware
, Adware
, Spyware
, Crypto Miner
, Data Exfiltration
, Insider Threat
, Network Intrusion
, DoS
, DDoS
, MITM
, SQL Injection
, Email Spoofing
, DNS Spoofing
, C2 Communications
, Rogue Device
, Brute Force
, Phishing
, Compromised Credentials
, Account Takeover
, Physical
, Vulnerability
, Reconnaissance
, Domain Takeover
, Lateral Movement
, Network Exposure
, Data Exposure
, Credential Exposure
, Suspicious User Activity
, Suspicious Login
, Suspicious Network Activity
, Suspicious USB Device
, Security Policy Violation
, Security Compliance Violation
]
Possible values: [CrowdStrike
, Checkpoint
, Delinea
, Securonix
, Falcon LogScale
, Splunk
, ArcSight
, SolarWinds Service Desk
, Datadog
, SentinelOne
, Microsoft Defender For Cloud
, Microsoft Defender For Cloud Apps
, Microsoft Defender For Endpoints
]
{
"case_manager": [
"john.doe@blinkops.com"
],
"case_tags": [
"Malware",
"Ransomware",
"Insider Threat"
],
"mitre_attack": [
"Reconnaissance",
"Resource Development"
],
"name": "New Case",
"overview": "<p>1. New Malware detected</p>",
"severity": 3,
"sla": 259200000,
"sla_expiry": 60000,
"status": "OPEN",
"summary": "Summary of the case",
"type": "Malware",
"vendors": [
"CrowdStrike"
]
}
Failed to create record
- */*
- Schema
- Example (from schema)
Schema
{
"data": {},
"details": "string",
"identifier": "string",
"message": "string",
"status": 404,
"user_error": {}
}