Skip to content

Get FalconMalwareFamily

bk-cs edited this page Sep 3, 2024 · 2 revisions

Get-FalconMalwareFamily

SYNOPSIS

Search for malware families

DESCRIPTION

Requires 'Malware Families (Falcon Intelligence): Read'.

PARAMETERS

Name Type Description Min Max Allowed Pipeline PipelineByName
Id String[] Malware family identifier X X
Filter String Falcon Query Language expression to limit results
Query String Perform a generic substring search across available fields
Sort String Property and direction to sort results
Limit Int32 Maximum number of results per request 1 5000
Offset Int32 Position to begin retrieving results
Mitre Switch Retrieve MITRE TTP information for malware families
Detailed Switch Retrieve detailed information
All Switch Repeat requests until all available results are retrieved
Total Switch Display total result count instead of results

SYNTAX

Get-FalconMalwareFamily [[-Filter] <String>] [[-Query] <String>] [[-Sort] <String>] [[-Limit] <Int32>] [-Offset <Int32>] [-Detailed] [-All] [-Total] [-WhatIf] [-Confirm] [<CommonParameters>]
Get-FalconMalwareFamily -Id <String[]> -Mitre [-WhatIf] [-Confirm] [<CommonParameters>]
Get-FalconMalwareFamily -Id <String[]> [-WhatIf] [-Confirm] [<CommonParameters>]

REFERENCE

Endpoints

GET /intel/entities/malware/v1
GET /intel/queries/malware/v1
GET /intel/queries/mitre-malware/v1

falconpy

QueryMalware
QueryMitreAttacksForMalware
GetMalwareEntities

USAGE

2024-09-03: PSFalcon v2.2.7

Clone this wiki locally