Example Output

[    {        "avl_author": "securityteam@anvilogic.com",        "avl_community_efficacy": 75,        "avl_community_rating": 4,        "avl_custom_labels": [            "text"        ],        "avl_data_category": [            "Powershell logs",            "Process command-line parameters"        ],        "avl_deployed": false,        "avl_details": "Identify hosts using PowerShell commands containing s...",        "avl_entities_of_interest": [            "text"        ],        "avl_exploits": [            "text"        ],        "avl_kill_chain_phase": [            "Actions on Objectives"        ],        "avl_last_deployed_hash": "text",        "avl_mitre_ext_ids": [            "T1059.001",            "T1007"        ],        "avl_mitre_tactic": [            "Execution",            "Discovery"        ],        "avl_mitre_technique": [            "System Service Discovery",            "Command and Scripting Interpreter"        ],        "avl_references": [            "https://github.com/rasta-mouse/Sherlock/blob/master/Sherlock.ps1"        ],        "avl_rule_confidence": "High",        "avl_rule_creation_time": "text",        "avl_rule_domain": [            "Endpoint"        ],        "avl_rule_id": "AVL_R1000",        "avl_rule_link": "https://secure.anvilogic.com/rules?id=AVL_R1000",        "avl_rule_mode": "Warn",        "avl_rule_modified_time": "text",        "avl_rule_name": "avl:ti:avl_r1000:sherlock_ps1_vulnerability_scanner",        "avl_rule_severity": "Medium",        "avl_rule_sub_domain": [            "text"        ],        "avl_running": false,        "avl_scenario_info": [            "text"        ],        "avl_security_controls": [            "text"        ],        "avl_source": "avl:ti:avl_uc1000:sherlock_ps1_vulnerability_scanner",        "avl_sourcetype": "avl:eoi:endpoint:windows",        "avl_techniques_fqn": [            "execution:command and scripting interpreter:powershell",            "discovery"        ],        "avl_threat_groups": [            "text"        ],        "avl_title": "Sherlock.ps1 Vulnerability Scanner (Powershell)",        "avl_triage_steps": [            "Verify that the activity is not expected",            "Review the authentication..."        ],        "avl_use_case_category": "Reconnaissance",        "avl_use_case_description": "The Sherlock PowerShell script queries a...",        "avl_use_case_id": "AVL_UC1000",        "avl_use_case_impact": "Low",        "avl_use_case_name": "avl:ti:avl_uc1000:sherlock_ps1_vulnerability_scanner",        "avl_use_case_sub_category": "Signature",        "avl_use_case_title": "Sherlock.ps1 Vulnerability Scanner",        "avl_use_case_type": "Threat Identifier",        "avl_victim_platform": [            "Windows"        ],        "avl_victim_product": [            "Windows"        ],        "avl_vulnerabilities": [            "text"        ]    }]

Workflow Library Example

List Rules with Anvilogic and Send Results Via Email

Preview this Workflow on desktop