Integrations
- Integrations
- 1Password
- Abnormal
- Absolute
- AbuseIPDB
- Acronis
- Active Directory On-Prem
- Adaptive Shield
- Adobe Cloud
- ADP
- Agari Phishing Response
- Airlock
- Airlock Digital
- Akamai Identity Cloud Social
- Alert Logic
- AlgoSec Firewall Analyzer
- Alienvault OTX
- Alienvault USM
- Anodot
- Ansible
- Anthropic
- Anvilogic
- Any Run
- Apex One
- ArcSight ESM
- Ardoq
- Area 1
- Armis Centrix
- Asana
- Asset Panda
- Astrix
- Atlassian Crowd
- Atlassian User Management
- Atlassian User Provisioning
- AuditBoard
- auth0
- Authentik
- Authomize
- Automox
- AWS
- AWS IAM Identity Center
- Axonius
- Azure
- Azure Data Explorer
- Azure DevOps
- Azure Log Analytics
- Azure Storage
- BambooHR
- Big Fix
- BigPanda
- Bitbucket
- Bitdefender
- Bitsight
- Bitwarden
- Black Duck
- Black Kite
- Blink
- BMC Remedy
- Box
- Brinqa
- Cato Networks
- Censys
- Chorus
- Cisco Advanced Phishing Protection
- Cisco Domain Protection
- Cisco Meraki
- Cisco Talos
- Cisco Umbrella
- Cisco Webex
- Claroty xDome
- ClearPass
- ClickHouse
- ClickUp
- Cloud Custodian
- Cloudflare
- Cloudflare R2
- Cobalt.io
- Check Point Harmony
- Check Point Infinity Events
- Check Point Management
- Check Point XDR/XPR
- Checkmarx SAST
- Checkmarx One
- Chronicle
- Compass
- Confluence
- Confluence Data Center
- Coralogix
- Coralogix Incident Management
- Cortex XDR
- Cortex Xpanse
- Coupa Compass
- CredStash
- Cribl
- CrowdStrike
- CyberArk
- Cybersixgill
- CyCognito
- Cyera
- Cylance
- Cyware CTIX
- Darktrace
- Dasera
- Databricks
- Datadog
- DataSet
- Delighted
- Delinea
- Devo
- Discord
- Docusign
- Domo
- Drata
- Dropbox
- Dropbox Business
- druva
- Duo
- Duo Auth
- Dynatrace
- EasyVista
- EchoTrail
- Egnyte
- Egnyte Secure Govern
- Elasticsearch
- Entro
- Entrust Certificate Services
- Ermetic
- Exabeam
- Exchange Online
- Expel
- F5
- Falcon LogScale
- Falcon Surface
- Fastly
- Flare.io
- Forcepoint DLP
- Forescout
- FortiGate
- Freshservice
- GCP
- Gemini
- Ghostwriter
- Git
- GitHub
- GitLab
- Glean
- Gmail
- Google Calendar
- Google Chat
- Google Docs
- Google Drive
- Google Forms
- Google Looker
- Google Meet
- Google Sheets
- Google Workspace
- Grafana
- Greenhouse
- GreyNoise
- Grip Security
- GYTPOL
- HackerOne
- HackNotice
- Halo Service Desk
- Have I Been Pwned
- HiBob
- HubSpot
- Hunters
- Hybrid Analysis
- Hyperproof
- IBM CLoud
- IBM NS1 Connect
- IBM Security Verify
- IBM X Force
- Imperva
- Incident.io
- Infobip
- Infoblox Cloud Services Portal
- Intercom
- Intezer
- IP API
- IPinfo
- IPWHOIS
- Ironscales
- Ivanti RiskSense
- Jamf
- JetBrains
- JFrog
- Jira
- Jira Data Center
- Joe Sandbox
- JumpCloud
- Kandji
- Keeper Secrets Manager
- Kenna Security
- KnowBe4
- KnowBe4 Events
- Kubernetes
- Lacework
- LaunchDarkly
- LimaCharlie
- Linear
- Litmos
- Living Security
- LogicMonitor
- LogRhythm
- Manage Engine ServiceDesk Plus
- Mattermost
- Maven
- Microsoft Defender For Cloud
- Microsoft Defender For Cloud Apps
- Microsoft Defender For Endpoints
- Microsoft Defender XDR
- Microsoft E-Discovery
- Microsoft Entra ID
- Microsoft Excel
- Microsoft Graph
- Microsoft Intune
- Microsoft Office 365 Management Activity
- Microsoft Outlook
- Microsoft Purview
- Microsoft Sentinel
- Microsoft SQL Server
- Microsoft Teams
- Mimecast
- MISP
- Monday
- MongoDB Atlas
- MxToolbox
- Neo4j
- NetBox
- Netography
- Netskope
- New Relic
- Nightfall AI
- NinjaOne
- Notion
- Nozomi Networks
- Nuclei
- Nucleus
- Nutanix Hypervisor
- Obsidian
- Okta
- OneDrive
- OneLogin
- OneTrust
- Oort
- OpenAI
- OpenCTI
- Opsgenie
- OPSWAT
- Oracle Cloud
- Oracle HCM
- Oracle NetSuite
- Oracle PeopleSoft
- Orca Security
- OWASP ZAP
- PagerDuty
- Palo Alto NGFW
- Palo Alto Firewall
- Panther
- Pentera
- Perception Point
- PhishLabs
- PhishLabs Incident Data
- PhishLabs Open Web Monitoring
- Pingdom
- PingID
- PingOne
- PlexTrac
- PortSwigger
- Postman
- Postman SCIM
- Power BI
- PowerShell
- Prisma Access
- Prisma Cloud
- Prisma Cloud CWP
- Prometheus
- Proofpoint
- Proofpoint ITM
- Proofpoint Protection Server
- Proofpoint Security Awareness Training
- Proofpoint TAP
- Proofpoint TRAP
- Pub-Sub
- QRadar
- Qualys
- Rapid7
- Rapid7 InsightIDR
- Rapid7 InsightVM Cloud
- Rapid7 Threat Command
- Reco
- Recorded Future
- Recorded Future Triage Cloud
- Red Hat IDM
- Rippling
- Rubrik
- runZero
- SafeBase
- Sage HR
- SailPoint
- SailPoint IdentityIQ
- Salesforce
- SAP Ariba
- Sap Concur
- ScienceLogic
- Securin
- Securin VI
- SecurityScorecard
- Securonix
- Seemplicity
- Sekoia.io
- SemGrep
- SentinelOne
- ServiceNow
- SharePoint
- Shodan
- Shopify
- Silverfort
- Slack
- Smartsheet
- Snipe IT
- Snowflake
- Snyk
- SolarWinds Information Service
- SolarWinds Service Desk
- SonarQube
- Sophos
- Split
- Splunk
- Splunk Observability
- Splunk SOAR
- Spur
- StrongDM
- Sumo Logic
- Symantec EDR
- Sysdig
- Tableau
- Tanium
- TeamCity
- TeamViewer
- Telegram
- Tempo
- Tenable
- Tenable Security Center
- Terraform
- Terraform Cloud
- Tessian
- TheHive
- Thinkst Canary
- Thomson Reuters
- ThreatQuotient
- Trellix Email Security
- Trello
- Trend Vision One
- Twilio
- UKG HR
- Uptycs
- URLScan
- Vault
- Veracode
- Verkada
- Vertica
- VMware vSphere
- VMware Carbon Black
- VirusTotal
- VirusTotal
- Actions
- Overview
- Get Analysis
- Get Domain Report
- Get File Behaviour Report From Sandbox
- Get File Comments
- Get File MITRE ATT&CK Techniques
- Get File Report
- Get IP Address Report
- Get Private File MITRE ATT&CK Techniques
- Get Private File Report
- Get Widget Rendering URL
- List Private Files
- Scan File
- Scan URL
- Search
- VirusTotal Custom Action
- WeChat
- WhatsApp
- WhoIs
- WildFire
- Wiz
- Workday
- Workspace ONE UEM
- YesWeHack
- Zendesk
- Zero Networks
- Zoom
- Zscaler Internet Access
- Zscaler Private Access
Actions
Get File MITRE ATT&CK Techniques
Get a summary of all MITRE ATT&CK
techniques observed in each of the sandbox reports of a file.
External Documentation
To learn more, visit the VirusTotal documentation.
Parameters
Parameter | Description |
---|---|
File Hash | The SHA-256, SHA-1 or MD5 identifying the file. |
Example Output
Copy
Ask AI
{
"data": {
"SecurityAnalyzer Pro": {
"tactics": []
},
"DefendBox": {
"tactics": [
{
"description": "The application is attempting to understand system configurations.\n\nConfiguration analysis includes techniques that software may use to gather information about system settings and network architecture. These techniques help applications evaluate the environment and determine appropriate actions. They enable the software to identify available resources and permissions around the entry point to optimize performance and functionality.",
"techniques": [
{
"description": "The application may collect system configuration details including hardware specifications, installed software versions, and resource availability. This information helps determine compatibility and resource requirements.\nStandard system commands can retrieve configuration data. On privileged accounts, detailed hardware information can be accessed through system management tools. For example, users can check storage capacity using built-in disk utilities. Applications may also use authenticated API calls to cloud platforms to gather instance metadata and status information.",
"signatures": [
{
"severity": "INFO",
"description": "Checks system configurations"
}
],
"link": "https://example.com/techniques/TC001",
"id": "TC001",
"name": "Configuration Analysis"
},
{
"description": "The software examines file system structure and contents to understand data organization. This helps optimize data access patterns and storage usage.\nBuilt-in file system tools provide directory listings and metadata. Custom modules may interface directly with system APIs for enhanced file system interaction.",
"signatures": [
{
"severity": "INFO",
"description": "Scans directory structure"
}
],
"link": "https://example.com/techniques/TC002",
"id": "TC002",
"name": "Storage Analysis"
}
],
"link": "https://example.com/tactics/TA001",
"id": "TA001",
"name": "System Analysis"
},
{
"description": "The application implements security best practices.\n\nSecurity hardening consists of techniques that software uses to protect system integrity and prevent unauthorized access. These methods include input validation, secure communication, and access control enforcement.",
"techniques": [
{
"description": "The application validates and sanitizes all inputs to prevent injection attacks and ensure data integrity. This includes checking data types, formats, and ranges before processing.",
"signatures": [
{
"severity": "INFO",
"description": "Validates input parameters"
}
],
"link": "https://example.com/techniques/TC003",
"id": "TC003",
"name": "Input Validation"
},
{
"description": "The software implements secure coding practices to protect sensitive data and prevent unauthorized access. This includes proper error handling and secure storage of credentials.",
"signatures": [
{
"severity": "INFO",
"description": "Implements security controls"
}
],
"link": "https://example.com/techniques/TC004",
"id": "TC004",
"name": "Secure Implementation"
}
],
"link": "https://example.com/tactics/TA002",
"id": "TA002",
"name": "Security Hardening"
},
{
"description": "The application manages access permissions appropriately.\n\nAccess control ensures that operations are performed with appropriate privileges. This includes checking user permissions, managing authentication, and implementing principle of least privilege.",
"techniques": [
{
"description": "The software implements robust authentication mechanisms and validates user permissions before performing privileged operations. Access levels are carefully managed and monitored.",
"signatures": [
{
"severity": "INFO",
"description": "Checks access permissions"
}
],
"link": "https://example.com/techniques/TC005",
"id": "TC005",
"name": "Permission Management"
}
],
"link": "https://example.com/tactics/TA003",
"id": "TA003",
"name": "Access Control"
}
]
},
"SecurityGuard Basic": {
"tactics": []
}
},
"links": {
"self": "https://api.example.com/v1/analysis/abc123/security_analysis"
}
}
Workflow Library Example
Get File Mitre Attandck Techniques with Virustotal and Send Results Via Email
Preview this Workflow on desktop
Was this page helpful?
On this page
Assistant
Responses are generated using AI and may contain mistakes.