Cisco AMP for Endpoints API

GET /v1/events

Description

This is a general query interface for events. This is analogous to the Events view on the FireAMP Console.

Events can be filtered by a variety of criteria. Each criteria type is logically ANDed with the other criteria; each selection of a criteria is logically ORed. For example: with the query string: connector_guid[]=ead39d47-93bd-4230-b692-454b433faf96&event_type[]=2164260868&event_type[]=1090519054, it will return any events that match the connector guid ad39d47-93bd-4230-b692-454b433faf96 AND any events with type (1090519054 OR 2164260868).

The arguments passed to the event_type and group_guid parameters can be retrieved from their respective endpoints.

Query Parameters

Name Type Example Values Description
limit Integer 2, 1, 10
detection_sha256 String f8a6a244138cb1e2f044f63f3dc42beeb555da892bbd7a121274498cbdfc9ad5
application_sha256 String 80ef843fa78c33b511394a9c7535a9cbace1deb2270e86ee4ad2faffa5b1e7d2
connector_guid[] GUID af73d9d5-ddc5-4c93-9c6d-d5e6b5c5eb01
group_guid[] GUID b077d6bc-bbdf-42f7-8838-a06053fbd98a
start_date String (Time ISO8601) 2015-10-01T00:00:00+00:00 Inclusive (The list will include events that match start_date)
offset Integer 10
event_type[] Array 1090519054, 1090519084

Show Response Fields

Name Type Description
version String
metadata.links.self String
metadata.links.prev String
metadata.links.next String
metadata.results.total Integer
metadata.results.current_item_count Integer
metadata.results.index Integer
metadata.results.items_per_page Integer
data Array
data[].id Integer
data[].timestamp Integer
data[].timestamp_nanoseconds Integer
data[].date String (Time ISO8601)
data[].event_type String
data[].event_type_id Integer
data[].detection String
data[].detection_id String
data[].group_guids Array
data[].group_guids[] GUID
data[].computer.connector_guid GUID
data[].computer.hostname String
data[].computer.external_ip String
data[].computer.user String
data[].computer.active Boolean
data[].computer.network_addresses Array
data[].computer.network_addresses[].ip String
data[].computer.network_addresses[].mac String
data[].computer.links.computer String
data[].computer.links.trajectory String
data[].computer.links.group String
data[].file.disposition String
data[].file.file_name String
data[].file.file_path String
data[].file.identity.sha256 String
data[].file.identity.sha1 String
data[].file.identity.md5 String
data[].file.parent.process_id Integer
data[].file.parent.disposition String
data[].file.parent.file_name String
data[].file.parent.identity.sha256 String
data[].file.parent.identity.sha1 String
data[].file.parent.identity.md5 String
data[].scan.description String
Write
Preview

Examples

Fetch list of events sorted in descending order by timestamp
Fetch list of events filtered by connector_guid
Fetch list of events filtered by group_guid
Fetch list of events filtered by detection_sha256
Fetch list of events filtered by application_sha256
Fetch list of events filtered by detection_sha256 and application_sha256
Fetch list of events filtered by event_type
Fetch events that are newer than a given timestamp
Fetch list of events filtered by SCAN_STARTED event type

Fetch list of events sorted in descending order by timestamp

Request

Requires Authorization
GET /v1/events?limit=2
Headers
accept: application/json
content-type: application/json
authorization: Basic FILTERED

cURL Edit, then copy and paste on your terminal

curl -X GET \
-H 'accept: application/json' \
-H 'content-type: application/json' \
--compressed -H 'Accept-Encoding: gzip, deflate' \
-u YOUR_API_CLIENT_ID \
'https://api.apjc.amp.cisco.com/v1/events?limit=2'

Response

Shortened for readability

strict-transport-security: max-age=31536000
content-type: application/json; charset=utf-8
status: 200 OK
x-ratelimit-limit: 3000
x-ratelimit-reset: 3537
x-ratelimit-remaining: 2881
x-frame-options: SAMEORIGIN
x-ratelimit-resetdate: 2019-11-01T18:03:14Z
transfer-encoding: chunked
{
  "version": "v1.2.0",
  "metadata": {
    "links": {
      "self": "https://api.apjc.amp.cisco.com/v1/events?limit=2",
      "next": "https://api.apjc.amp.cisco.com/v1/events?limit=2&offset=2"
    },
    "results": {
      "total": 2726,
      "current_item_count": 2,
      "index": 0,
      "items_per_page": 2
    }
  },
  "data": [
    {
      "id": 6159258594551267000,
      "timestamp": 1572626707,
      "timestamp_nanoseconds": 525000000,
      "date": "2019-11-01T16:45:07+00:00",
      "event_type": "Threat Detected",
      "event_type_id": 1090519054,
      "detection": "W32.DFC.MalParent",
      "detection_id": "6159258594551267599",
      "connector_guid": "9dbe7029-2385-4a24-8ddc-39fccc17ce0f",
      "group_guids": [
        "6c3c2005-4c74-4ba7-8dbb-c4d5b6bafe03"
      ],
      "severity": "Medium",
      "computer": {
        "connector_guid": "9dbe7029-2385-4a24-8ddc-39fccc17ce0f",
        "hostname": "Demo_TeslaCrypt",
        "external_ip": "120.138.22.84",
        "active": true,
        "network_addresses": [
          {
            "ip": "104.138.81.103",
            "mac": "24:66:d7:6e:9a:07"
          }
        ],
        "links": {
          "computer": "https://api.apjc.amp.cisco.com/v1/computers/9dbe7029-2385-4a24-8ddc-39fccc17ce0f",
          "trajectory": "https://api.apjc.amp.cisco.com/v1/computers/9dbe7029-2385-4a24-8ddc-39fccc17ce0f/trajectory",
          "group": "https://api.apjc.amp.cisco.com/v1/groups/6c3c2005-4c74-4ba7-8dbb-c4d5b6bafe03"
        }
      },
      "file": {
        "disposition": "Malicious",
        "file_name": "iodnxvg.exe",
        "file_path": "\\\\?\\C:\\Users\\Administrator\\AppData\\Roaming\\iodnxvg.exe",
        "identity": {
          "sha256": "3372c1edab46837f1e973164fa2d726c5c5e17bcb888828ccd7c4dfcc234a370",
          "sha1": "e654d39cd13414b5151e8cf0d8f5b166dddd45cb",
          "md5": "209a288c68207d57e0ce6e60ebf60729"
        }
      }
    },
    {
      "id": 1489955900329000200,
      "timestamp": 1572625498,
      "timestamp_nanoseconds": 329000000,
      "date": "2019-11-01T16:24:58+00:00",
      "event_type": "Potential Dropper Infection",
      "event_type_id": 1107296258,
      "detection": "W32.3372C1EDAB-100.SBX.TG",
      "connector_guid": "9dbe7029-2385-4a24-8ddc-39fccc17ce0f",
      "group_guids": [
        "6c3c2005-4c74-4ba7-8dbb-c4d5b6bafe03"
      ],
      "severity": "High",
      "start_timestamp": 1572625498,
      "start_date": "2019-11-01T16:24:58+00:00",
      "computer": {
        "connector_guid": "9dbe7029-2385-4a24-8ddc-39fccc17ce0f",
        "hostname": "Demo_TeslaCrypt",
        "external_ip": "120.138.22.84",
        "active": true,
        "network_addresses": [
          {
            "ip": "104.138.81.103",
            "mac": "24:66:d7:6e:9a:07"
          }
        ],
        "links": {
          "computer": "https://api.apjc.amp.cisco.com/v1/computers/9dbe7029-2385-4a24-8ddc-39fccc17ce0f",
          "trajectory": "https://api.apjc.amp.cisco.com/v1/computers/9dbe7029-2385-4a24-8ddc-39fccc17ce0f/trajectory",
          "group": "https://api.apjc.amp.cisco.com/v1/groups/6c3c2005-4c74-4ba7-8dbb-c4d5b6bafe03"
        }
      },
      "file": {
        "disposition": "Malicious",
        "identity": {
          "sha256": "3372c1edab46837f1e973164fa2d726c5c5e17bcb888828ccd7c4dfcc234a370"
        },
        "parent": {
          "disposition": "Blocklisted",
          "identity": {
            "sha256": "9e1ec8b43a88e68767fd8fed2f38e7984357b3f4186d0f907e62f8b6c9ff56ad"
          }
        }
      }
    }
  ]
}

Fetch list of events filtered by connector_guid

Request

Requires Authorization
GET /v1/events?connector_guid[]=9dbe7029-2385-4a24-8ddc-39fccc17ce0f&limit=1
Headers
accept: application/json
content-type: application/json
authorization: Basic FILTERED

cURL Edit, then copy and paste on your terminal

curl -X GET \
-H 'accept: application/json' \
-H 'content-type: application/json' \
--compressed -H 'Accept-Encoding: gzip, deflate' \
-u YOUR_API_CLIENT_ID \
'https://api.apjc.amp.cisco.com/v1/events?connector_guid[]=9dbe7029-2385-4a24-8ddc-39fccc17ce0f&limit=1'

Response

Shortened for readability

strict-transport-security: max-age=31536000
content-type: application/json; charset=utf-8
status: 200 OK
x-ratelimit-limit: 3000
x-ratelimit-reset: 3535
x-ratelimit-remaining: 2878
x-frame-options: SAMEORIGIN
x-ratelimit-resetdate: 2019-11-01T18:03:14Z
transfer-encoding: chunked
{
  "version": "v1.2.0",
  "metadata": {
    "links": {
      "self": "https://api.apjc.amp.cisco.com/v1/events?connector_guid[]=9dbe7029-2385-4a24-8ddc-39fccc17ce0f&limit=1",
      "next": "https://api.apjc.amp.cisco.com/v1/events?connector_guid%5B%5D=9dbe7029-2385-4a24-8ddc-39fccc17ce0f&limit=1&offset=1"
    },
    "results": {
      "total": 309,
      "current_item_count": 1,
      "index": 0,
      "items_per_page": 1
    }
  },
  "data": [
    {
      "id": 6159258594551267000,
      "timestamp": 1572626707,
      "timestamp_nanoseconds": 525000000,
      "date": "2019-11-01T16:45:07+00:00",
      "event_type": "Threat Detected",
      "event_type_id": 1090519054,
      "detection": "W32.DFC.MalParent",
      "detection_id": "6159258594551267599",
      "connector_guid": "9dbe7029-2385-4a24-8ddc-39fccc17ce0f",
      "group_guids": [
        "6c3c2005-4c74-4ba7-8dbb-c4d5b6bafe03"
      ],
      "severity": "Medium",
      "computer": {
        "connector_guid": "9dbe7029-2385-4a24-8ddc-39fccc17ce0f",
        "hostname": "Demo_TeslaCrypt",
        "external_ip": "120.138.22.84",
        "active": true,
        "network_addresses": [
          {
            "ip": "104.138.81.103",
            "mac": "24:66:d7:6e:9a:07"
          }
        ],
        "links": {
          "computer": "https://api.apjc.amp.cisco.com/v1/computers/9dbe7029-2385-4a24-8ddc-39fccc17ce0f",
          "trajectory": "https://api.apjc.amp.cisco.com/v1/computers/9dbe7029-2385-4a24-8ddc-39fccc17ce0f/trajectory",
          "group": "https://api.apjc.amp.cisco.com/v1/groups/6c3c2005-4c74-4ba7-8dbb-c4d5b6bafe03"
        }
      },
      "file": {
        "disposition": "Malicious",
        "file_name": "iodnxvg.exe",
        "file_path": "\\\\?\\C:\\Users\\Administrator\\AppData\\Roaming\\iodnxvg.exe",
        "identity": {
          "sha256": "3372c1edab46837f1e973164fa2d726c5c5e17bcb888828ccd7c4dfcc234a370",
          "sha1": "e654d39cd13414b5151e8cf0d8f5b166dddd45cb",
          "md5": "209a288c68207d57e0ce6e60ebf60729"
        }
      }
    }
  ]
}

Fetch list of events filtered by group_guid

Request

Requires Authorization
GET /v1/events?group_guid[]=6c3c2005-4c74-4ba7-8dbb-c4d5b6bafe03&limit=1
Headers
accept: application/json
content-type: application/json
authorization: Basic FILTERED

cURL Edit, then copy and paste on your terminal

curl -X GET \
-H 'accept: application/json' \
-H 'content-type: application/json' \
--compressed -H 'Accept-Encoding: gzip, deflate' \
-u YOUR_API_CLIENT_ID \
'https://api.apjc.amp.cisco.com/v1/events?group_guid[]=6c3c2005-4c74-4ba7-8dbb-c4d5b6bafe03&limit=1'

Response

Shortened for readability

strict-transport-security: max-age=31536000
content-type: application/json; charset=utf-8
status: 200 OK
x-ratelimit-limit: 3000
x-ratelimit-reset: 3532
x-ratelimit-remaining: 2875
x-frame-options: SAMEORIGIN
x-ratelimit-resetdate: 2019-11-01T18:03:14Z
transfer-encoding: chunked
{
  "version": "v1.2.0",
  "metadata": {
    "links": {
      "self": "https://api.apjc.amp.cisco.com/v1/events?group_guid[]=6c3c2005-4c74-4ba7-8dbb-c4d5b6bafe03&limit=1",
      "next": "https://api.apjc.amp.cisco.com/v1/events?group_guid%5B%5D=6c3c2005-4c74-4ba7-8dbb-c4d5b6bafe03&limit=1&offset=1"
    },
    "results": {
      "total": 903,
      "current_item_count": 1,
      "index": 0,
      "items_per_page": 1
    }
  },
  "data": [
    {
      "id": 6159258594551267000,
      "timestamp": 1572626707,
      "timestamp_nanoseconds": 525000000,
      "date": "2019-11-01T16:45:07+00:00",
      "event_type": "Threat Detected",
      "event_type_id": 1090519054,
      "detection": "W32.DFC.MalParent",
      "detection_id": "6159258594551267599",
      "connector_guid": "9dbe7029-2385-4a24-8ddc-39fccc17ce0f",
      "group_guids": [
        "6c3c2005-4c74-4ba7-8dbb-c4d5b6bafe03"
      ],
      "severity": "Medium",
      "computer": {
        "connector_guid": "9dbe7029-2385-4a24-8ddc-39fccc17ce0f",
        "hostname": "Demo_TeslaCrypt",
        "external_ip": "120.138.22.84",
        "active": true,
        "network_addresses": [
          {
            "ip": "104.138.81.103",
            "mac": "24:66:d7:6e:9a:07"
          }
        ],
        "links": {
          "computer": "https://api.apjc.amp.cisco.com/v1/computers/9dbe7029-2385-4a24-8ddc-39fccc17ce0f",
          "trajectory": "https://api.apjc.amp.cisco.com/v1/computers/9dbe7029-2385-4a24-8ddc-39fccc17ce0f/trajectory",
          "group": "https://api.apjc.amp.cisco.com/v1/groups/6c3c2005-4c74-4ba7-8dbb-c4d5b6bafe03"
        }
      },
      "file": {
        "disposition": "Malicious",
        "file_name": "iodnxvg.exe",
        "file_path": "\\\\?\\C:\\Users\\Administrator\\AppData\\Roaming\\iodnxvg.exe",
        "identity": {
          "sha256": "3372c1edab46837f1e973164fa2d726c5c5e17bcb888828ccd7c4dfcc234a370",
          "sha1": "e654d39cd13414b5151e8cf0d8f5b166dddd45cb",
          "md5": "209a288c68207d57e0ce6e60ebf60729"
        }
      }
    }
  ]
}

Fetch list of events filtered by detection_sha256

Request

Requires Authorization
GET /v1/events?detection_sha256=3372c1edab46837f1e973164fa2d726c5c5e17bcb888828ccd7c4dfcc234a370&limit=1
Headers
accept: application/json
content-type: application/json
authorization: Basic FILTERED

cURL Edit, then copy and paste on your terminal

curl -X GET \
-H 'accept: application/json' \
-H 'content-type: application/json' \
--compressed -H 'Accept-Encoding: gzip, deflate' \
-u YOUR_API_CLIENT_ID \
'https://api.apjc.amp.cisco.com/v1/events?detection_sha256=3372c1edab46837f1e973164fa2d726c5c5e17bcb888828ccd7c4dfcc234a370&limit=1'

Response

Shortened for readability

strict-transport-security: max-age=31536000
content-type: application/json; charset=utf-8
status: 200 OK
x-ratelimit-limit: 3000
x-ratelimit-reset: 3531
x-ratelimit-remaining: 2872
x-frame-options: SAMEORIGIN
x-ratelimit-resetdate: 2019-11-01T18:03:14Z
transfer-encoding: chunked
{
  "version": "v1.2.0",
  "metadata": {
    "links": {
      "self": "https://api.apjc.amp.cisco.com/v1/events?detection_sha256=3372c1edab46837f1e973164fa2d726c5c5e17bcb888828ccd7c4dfcc234a370&limit=1",
      "next": "https://api.apjc.amp.cisco.com/v1/events?detection_sha256=3372c1edab46837f1e973164fa2d726c5c5e17bcb888828ccd7c4dfcc234a370&limit=1&offset=1"
    },
    "results": {
      "total": 309,
      "current_item_count": 1,
      "index": 0,
      "items_per_page": 1
    }
  },
  "data": [
    {
      "id": 6159258594551267000,
      "timestamp": 1572626707,
      "timestamp_nanoseconds": 525000000,
      "date": "2019-11-01T16:45:07+00:00",
      "event_type": "Threat Detected",
      "event_type_id": 1090519054,
      "detection": "W32.DFC.MalParent",
      "detection_id": "6159258594551267599",
      "connector_guid": "9dbe7029-2385-4a24-8ddc-39fccc17ce0f",
      "group_guids": [
        "6c3c2005-4c74-4ba7-8dbb-c4d5b6bafe03"
      ],
      "severity": "Medium",
      "computer": {
        "connector_guid": "9dbe7029-2385-4a24-8ddc-39fccc17ce0f",
        "hostname": "Demo_TeslaCrypt",
        "external_ip": "120.138.22.84",
        "active": true,
        "network_addresses": [
          {
            "ip": "104.138.81.103",
            "mac": "24:66:d7:6e:9a:07"
          }
        ],
        "links": {
          "computer": "https://api.apjc.amp.cisco.com/v1/computers/9dbe7029-2385-4a24-8ddc-39fccc17ce0f",
          "trajectory": "https://api.apjc.amp.cisco.com/v1/computers/9dbe7029-2385-4a24-8ddc-39fccc17ce0f/trajectory",
          "group": "https://api.apjc.amp.cisco.com/v1/groups/6c3c2005-4c74-4ba7-8dbb-c4d5b6bafe03"
        }
      },
      "file": {
        "disposition": "Malicious",
        "file_name": "iodnxvg.exe",
        "file_path": "\\\\?\\C:\\Users\\Administrator\\AppData\\Roaming\\iodnxvg.exe",
        "identity": {
          "sha256": "3372c1edab46837f1e973164fa2d726c5c5e17bcb888828ccd7c4dfcc234a370",
          "sha1": "e654d39cd13414b5151e8cf0d8f5b166dddd45cb",
          "md5": "209a288c68207d57e0ce6e60ebf60729"
        }
      }
    }
  ]
}

Fetch list of events filtered by application_sha256

Request

Requires Authorization
GET /v1/events?application_sha256=3372c1edab46837f1e973164fa2d726c5c5e17bcb888828ccd7c4dfcc234a370&limit=1
Headers
accept: application/json
content-type: application/json
authorization: Basic FILTERED

cURL Edit, then copy and paste on your terminal

curl -X GET \
-H 'accept: application/json' \
-H 'content-type: application/json' \
--compressed -H 'Accept-Encoding: gzip, deflate' \
-u YOUR_API_CLIENT_ID \
'https://api.apjc.amp.cisco.com/v1/events?application_sha256=3372c1edab46837f1e973164fa2d726c5c5e17bcb888828ccd7c4dfcc234a370&limit=1'

Response

Shortened for readability

strict-transport-security: max-age=31536000
content-type: application/json; charset=utf-8
status: 200 OK
x-ratelimit-limit: 3000
x-ratelimit-reset: 3529
x-ratelimit-remaining: 2869
x-frame-options: SAMEORIGIN
x-ratelimit-resetdate: 2019-11-01T18:03:14Z
transfer-encoding: chunked
{
  "version": "v1.2.0",
  "metadata": {
    "links": {
      "self": "https://api.apjc.amp.cisco.com/v1/events?application_sha256=3372c1edab46837f1e973164fa2d726c5c5e17bcb888828ccd7c4dfcc234a370&limit=1",
      "next": "https://api.apjc.amp.cisco.com/v1/events?application_sha256=3372c1edab46837f1e973164fa2d726c5c5e17bcb888828ccd7c4dfcc234a370&limit=1&offset=1"
    },
    "results": {
      "total": 6,
      "current_item_count": 1,
      "index": 0,
      "items_per_page": 1
    }
  },
  "data": [
    {
      "id": 6159251503560262000,
      "timestamp": 1572625056,
      "timestamp_nanoseconds": 680000000,
      "date": "2019-11-01T16:17:36+00:00",
      "event_type": "Threat Detected",
      "event_type_id": 1090519054,
      "detection": "W32.3372C1EDAB-100.SBX.TG",
      "detection_id": "6159251503560261637",
      "connector_guid": "9dbe7029-2385-4a24-8ddc-39fccc17ce0f",
      "group_guids": [
        "6c3c2005-4c74-4ba7-8dbb-c4d5b6bafe03"
      ],
      "severity": "Medium",
      "computer": {
        "connector_guid": "9dbe7029-2385-4a24-8ddc-39fccc17ce0f",
        "hostname": "Demo_TeslaCrypt",
        "external_ip": "120.138.22.84",
        "user": "A@TEMPLATE-W7X86",
        "active": true,
        "network_addresses": [
          {
            "ip": "104.138.81.103",
            "mac": "24:66:d7:6e:9a:07"
          }
        ],
        "links": {
          "computer": "https://api.apjc.amp.cisco.com/v1/computers/9dbe7029-2385-4a24-8ddc-39fccc17ce0f",
          "trajectory": "https://api.apjc.amp.cisco.com/v1/computers/9dbe7029-2385-4a24-8ddc-39fccc17ce0f/trajectory",
          "group": "https://api.apjc.amp.cisco.com/v1/groups/6c3c2005-4c74-4ba7-8dbb-c4d5b6bafe03"
        }
      },
      "file": {
        "disposition": "Malicious",
        "file_name": "rjtsbks.exe",
        "file_path": "\\\\?\\C:\\Users\\Administrator\\AppData\\Roaming\\rjtsbks.exe",
        "identity": {
          "sha256": "3372c1edab46837f1e973164fa2d726c5c5e17bcb888828ccd7c4dfcc234a370",
          "sha1": "e654d39cd13414b5151e8cf0d8f5b166dddd45cb",
          "md5": "209a288c68207d57e0ce6e60ebf60729"
        },
        "parent": {
          "process_id": 2712,
          "disposition": "Malicious",
          "file_name": "t.exe",
          "identity": {
            "sha256": "3372c1edab46837f1e973164fa2d726c5c5e17bcb888828ccd7c4dfcc234a370",
            "sha1": "e654d39cd13414b5151e8cf0d8f5b166dddd45cb",
            "md5": "209a288c68207d57e0ce6e60ebf60729"
          }
        }
      }
    }
  ]
}

Fetch list of events filtered by detection_sha256 and application_sha256

Request

Requires Authorization
GET /v1/events?detection_sha256=3372c1edab46837f1e973164fa2d726c5c5e17bcb888828ccd7c4dfcc234a370&application_sha256=3372c1edab46837f1e973164fa2d726c5c5e17bcb888828ccd7c4dfcc234a370&limit=1
Headers
accept: application/json
content-type: application/json
authorization: Basic FILTERED

cURL Edit, then copy and paste on your terminal

curl -X GET \
-H 'accept: application/json' \
-H 'content-type: application/json' \
--compressed -H 'Accept-Encoding: gzip, deflate' \
-u YOUR_API_CLIENT_ID \
'https://api.apjc.amp.cisco.com/v1/events?detection_sha256=3372c1edab46837f1e973164fa2d726c5c5e17bcb888828ccd7c4dfcc234a370&application_sha256=3372c1edab46837f1e973164fa2d726c5c5e17bcb888828ccd7c4dfcc234a370&limit=1'

Response

Shortened for readability

strict-transport-security: max-age=31536000
content-type: application/json; charset=utf-8
status: 200 OK
x-ratelimit-limit: 3000
x-ratelimit-reset: 3527
x-ratelimit-remaining: 2866
x-frame-options: SAMEORIGIN
x-ratelimit-resetdate: 2019-11-01T18:03:14Z
transfer-encoding: chunked
{
  "version": "v1.2.0",
  "metadata": {
    "links": {
      "self": "https://api.apjc.amp.cisco.com/v1/events?detection_sha256=3372c1edab46837f1e973164fa2d726c5c5e17bcb888828ccd7c4dfcc234a370&application_sha256=3372c1edab46837f1e973164fa2d726c5c5e17bcb888828ccd7c4dfcc234a370&limit=1",
      "next": "https://api.apjc.amp.cisco.com/v1/events?detection_sha256=3372c1edab46837f1e973164fa2d726c5c5e17bcb888828ccd7c4dfcc234a370&application_sha256=3372c1edab46837f1e973164fa2d726c5c5e17bcb888828ccd7c4dfcc234a370&limit=1&offset=1"
    },
    "results": {
      "total": 6,
      "current_item_count": 1,
      "index": 0,
      "items_per_page": 1
    }
  },
  "data": [
    {
      "id": 6159251503560262000,
      "timestamp": 1572625056,
      "timestamp_nanoseconds": 680000000,
      "date": "2019-11-01T16:17:36+00:00",
      "event_type": "Threat Detected",
      "event_type_id": 1090519054,
      "detection": "W32.3372C1EDAB-100.SBX.TG",
      "detection_id": "6159251503560261637",
      "connector_guid": "9dbe7029-2385-4a24-8ddc-39fccc17ce0f",
      "group_guids": [
        "6c3c2005-4c74-4ba7-8dbb-c4d5b6bafe03"
      ],
      "severity": "Medium",
      "computer": {
        "connector_guid": "9dbe7029-2385-4a24-8ddc-39fccc17ce0f",
        "hostname": "Demo_TeslaCrypt",
        "external_ip": "120.138.22.84",
        "user": "A@TEMPLATE-W7X86",
        "active": true,
        "network_addresses": [
          {
            "ip": "104.138.81.103",
            "mac": "24:66:d7:6e:9a:07"
          }
        ],
        "links": {
          "computer": "https://api.apjc.amp.cisco.com/v1/computers/9dbe7029-2385-4a24-8ddc-39fccc17ce0f",
          "trajectory": "https://api.apjc.amp.cisco.com/v1/computers/9dbe7029-2385-4a24-8ddc-39fccc17ce0f/trajectory",
          "group": "https://api.apjc.amp.cisco.com/v1/groups/6c3c2005-4c74-4ba7-8dbb-c4d5b6bafe03"
        }
      },
      "file": {
        "disposition": "Malicious",
        "file_name": "rjtsbks.exe",
        "file_path": "\\\\?\\C:\\Users\\Administrator\\AppData\\Roaming\\rjtsbks.exe",
        "identity": {
          "sha256": "3372c1edab46837f1e973164fa2d726c5c5e17bcb888828ccd7c4dfcc234a370",
          "sha1": "e654d39cd13414b5151e8cf0d8f5b166dddd45cb",
          "md5": "209a288c68207d57e0ce6e60ebf60729"
        },
        "parent": {
          "process_id": 2712,
          "disposition": "Malicious",
          "file_name": "t.exe",
          "identity": {
            "sha256": "3372c1edab46837f1e973164fa2d726c5c5e17bcb888828ccd7c4dfcc234a370",
            "sha1": "e654d39cd13414b5151e8cf0d8f5b166dddd45cb",
            "md5": "209a288c68207d57e0ce6e60ebf60729"
          }
        }
      }
    }
  ]
}

Fetch list of events filtered by event_type

Request

Requires Authorization
GET /v1/events?event_type[]=1090519054&event_type[]=1090519084&offset=10&limit=10
Headers
accept: application/json
content-type: application/json
authorization: Basic FILTERED

cURL Edit, then copy and paste on your terminal

curl -X GET \
-H 'accept: application/json' \
-H 'content-type: application/json' \
--compressed -H 'Accept-Encoding: gzip, deflate' \
-u YOUR_API_CLIENT_ID \
'https://api.apjc.amp.cisco.com/v1/events?event_type[]=1090519054&event_type[]=1090519084&offset=10&limit=10'

Response

Shortened for readability

strict-transport-security: max-age=31536000
content-type: application/json; charset=utf-8
status: 200 OK
x-ratelimit-limit: 3000
x-ratelimit-reset: 3526
x-ratelimit-remaining: 2865
x-frame-options: SAMEORIGIN
x-ratelimit-resetdate: 2019-11-01T18:03:14Z
transfer-encoding: chunked
{
  "version": "v1.2.0",
  "metadata": {
    "links": {
      "self": "https://api.apjc.amp.cisco.com/v1/events?event_type[]=1090519054&event_type[]=1090519084&offset=10&limit=10",
      "prev": "https://api.apjc.amp.cisco.com/v1/events?event_type%5B%5D=1090519054&event_type%5B%5D=1090519084&limit=10&offset=0",
      "next": "https://api.apjc.amp.cisco.com/v1/events?event_type%5B%5D=1090519054&event_type%5B%5D=1090519084&limit=10&offset=20"
    },
    "results": {
      "total": 1753,
      "current_item_count": 10,
      "index": 10,
      "items_per_page": 10
    }
  },
  "data": [
    {
      "id": 6159251516445164000,
      "timestamp": 1572625059,
      "timestamp_nanoseconds": 894000000,
      "date": "2019-11-01T16:17:39+00:00",
      "event_type": "Threat Detected",
      "event_type_id": 1090519054,
      "detection": "W32.DFC.MalParent",
      "detection_id": "6159251516445163614",
      "connector_guid": "9dbe7029-2385-4a24-8ddc-39fccc17ce0f",
      "group_guids": [
        "6c3c2005-4c74-4ba7-8dbb-c4d5b6bafe03"
      ],
      "severity": "Medium",
      "computer": {
        "connector_guid": "9dbe7029-2385-4a24-8ddc-39fccc17ce0f",
        "hostname": "Demo_TeslaCrypt",
        "external_ip": "120.138.22.84",
        "active": true,
        "network_addresses": [
          {
            "ip": "104.138.81.103",
            "mac": "24:66:d7:6e:9a:07"
          }
        ],
        "links": {
          "computer": "https://api.apjc.amp.cisco.com/v1/computers/9dbe7029-2385-4a24-8ddc-39fccc17ce0f",
          "trajectory": "https://api.apjc.amp.cisco.com/v1/computers/9dbe7029-2385-4a24-8ddc-39fccc17ce0f/trajectory",
          "group": "https://api.apjc.amp.cisco.com/v1/groups/6c3c2005-4c74-4ba7-8dbb-c4d5b6bafe03"
        }
      },
      "file": {
        "disposition": "Malicious",
        "file_name": "rjtsbks.exe",
        "file_path": "\\\\?\\C:\\Users\\Administrator\\AppData\\Roaming\\rjtsbks.exe",
        "identity": {
          "sha256": "3372c1edab46837f1e973164fa2d726c5c5e17bcb888828ccd7c4dfcc234a370",
          "sha1": "e654d39cd13414b5151e8cf0d8f5b166dddd45cb",
          "md5": "209a288c68207d57e0ce6e60ebf60729"
        }
      }
    },
    {
      "id": 6159251516445164000,
      "timestamp": 1572625059,
      "timestamp_nanoseconds": 878000000,
      "date": "2019-11-01T16:17:39+00:00",
      "event_type": "Threat Detected",
      "event_type_id": 1090519054,
      "detection": "W32.DFC.MalParent",
      "detection_id": "6159251516445163613",
      "connector_guid": "9dbe7029-2385-4a24-8ddc-39fccc17ce0f",
      "group_guids": [
        "6c3c2005-4c74-4ba7-8dbb-c4d5b6bafe03"
      ],
      "severity": "Medium",
      "computer": {
        "connector_guid": "9dbe7029-2385-4a24-8ddc-39fccc17ce0f",
        "hostname": "Demo_TeslaCrypt",
        "external_ip": "120.138.22.84",
        "active": true,
        "network_addresses": [
          {
            "ip": "104.138.81.103",
            "mac": "24:66:d7:6e:9a:07"
          }
        ],
        "links": {
          "computer": "https://api.apjc.amp.cisco.com/v1/computers/9dbe7029-2385-4a24-8ddc-39fccc17ce0f",
          "trajectory": "https://api.apjc.amp.cisco.com/v1/computers/9dbe7029-2385-4a24-8ddc-39fccc17ce0f/trajectory",
          "group": "https://api.apjc.amp.cisco.com/v1/groups/6c3c2005-4c74-4ba7-8dbb-c4d5b6bafe03"
        }
      },
      "file": {
        "disposition": "Malicious",
        "file_name": "rjtsbks.exe",
        "file_path": "\\\\?\\C:\\Users\\Administrator\\AppData\\Roaming\\rjtsbks.exe",
        "identity": {
          "sha256": "3372c1edab46837f1e973164fa2d726c5c5e17bcb888828ccd7c4dfcc234a370",
          "sha1": "e654d39cd13414b5151e8cf0d8f5b166dddd45cb",
          "md5": "209a288c68207d57e0ce6e60ebf60729"
        }
      }
    }
  ]
}

Fetch events that are newer than a given timestamp

Request

Requires Authorization
GET /v1/events?start_date=2015-10-01T00%3A00%3A00%2B00%3A00&offset=10&limit=10
Headers
accept: application/json
content-type: application/json
authorization: Basic FILTERED

cURL Edit, then copy and paste on your terminal

curl -X GET \
-H 'accept: application/json' \
-H 'content-type: application/json' \
--compressed -H 'Accept-Encoding: gzip, deflate' \
-u YOUR_API_CLIENT_ID \
'https://api.apjc.amp.cisco.com/v1/events?start_date=2015-10-01T00%3A00%3A00%2B00%3A00&offset=10&limit=10'

Response

Shortened for readability

strict-transport-security: max-age=31536000
content-type: application/json; charset=utf-8
status: 200 OK
x-ratelimit-limit: 3000
x-ratelimit-reset: 3526
x-ratelimit-remaining: 2864
x-frame-options: SAMEORIGIN
x-ratelimit-resetdate: 2019-11-01T18:03:14Z
transfer-encoding: chunked
{
  "version": "v1.2.0",
  "metadata": {
    "links": {
      "self": "https://api.apjc.amp.cisco.com/v1/events?start_date=2015-10-01T00%3A00%3A00%2B00%3A00&offset=10&limit=10",
      "prev": "https://api.apjc.amp.cisco.com/v1/events?start_date=2015-10-01T00%3A00%3A00%2B00%3A00&limit=10&offset=0",
      "next": "https://api.apjc.amp.cisco.com/v1/events?start_date=2015-10-01T00%3A00%3A00%2B00%3A00&limit=10&offset=20"
    },
    "results": {
      "total": 2726,
      "current_item_count": 10,
      "index": 10,
      "items_per_page": 10
    }
  },
  "data": [
    {
      "id": 6159251516445164000,
      "timestamp": 1572625059,
      "timestamp_nanoseconds": 894000000,
      "date": "2019-11-01T16:17:39+00:00",
      "event_type": "Threat Detected",
      "event_type_id": 1090519054,
      "detection": "W32.DFC.MalParent",
      "detection_id": "6159251516445163616",
      "connector_guid": "9dbe7029-2385-4a24-8ddc-39fccc17ce0f",
      "group_guids": [
        "6c3c2005-4c74-4ba7-8dbb-c4d5b6bafe03"
      ],
      "severity": "Medium",
      "computer": {
        "connector_guid": "9dbe7029-2385-4a24-8ddc-39fccc17ce0f",
        "hostname": "Demo_TeslaCrypt",
        "external_ip": "120.138.22.84",
        "active": true,
        "network_addresses": [
          {
            "ip": "104.138.81.103",
            "mac": "24:66:d7:6e:9a:07"
          }
        ],
        "links": {
          "computer": "https://api.apjc.amp.cisco.com/v1/computers/9dbe7029-2385-4a24-8ddc-39fccc17ce0f",
          "trajectory": "https://api.apjc.amp.cisco.com/v1/computers/9dbe7029-2385-4a24-8ddc-39fccc17ce0f/trajectory",
          "group": "https://api.apjc.amp.cisco.com/v1/groups/6c3c2005-4c74-4ba7-8dbb-c4d5b6bafe03"
        }
      },
      "file": {
        "disposition": "Malicious",
        "file_name": "rjtsbks.exe",
        "file_path": "\\\\?\\C:\\Users\\Administrator\\AppData\\Roaming\\rjtsbks.exe",
        "identity": {
          "sha256": "3372c1edab46837f1e973164fa2d726c5c5e17bcb888828ccd7c4dfcc234a370",
          "sha1": "e654d39cd13414b5151e8cf0d8f5b166dddd45cb",
          "md5": "209a288c68207d57e0ce6e60ebf60729"
        }
      }
    },
    {
      "id": 6159251516445164000,
      "timestamp": 1572625059,
      "timestamp_nanoseconds": 894000000,
      "date": "2019-11-01T16:17:39+00:00",
      "event_type": "Threat Detected",
      "event_type_id": 1090519054,
      "detection": "W32.DFC.MalParent",
      "detection_id": "6159251516445163615",
      "connector_guid": "9dbe7029-2385-4a24-8ddc-39fccc17ce0f",
      "group_guids": [
        "6c3c2005-4c74-4ba7-8dbb-c4d5b6bafe03"
      ],
      "severity": "Medium",
      "computer": {
        "connector_guid": "9dbe7029-2385-4a24-8ddc-39fccc17ce0f",
        "hostname": "Demo_TeslaCrypt",
        "external_ip": "120.138.22.84",
        "active": true,
        "network_addresses": [
          {
            "ip": "104.138.81.103",
            "mac": "24:66:d7:6e:9a:07"
          }
        ],
        "links": {
          "computer": "https://api.apjc.amp.cisco.com/v1/computers/9dbe7029-2385-4a24-8ddc-39fccc17ce0f",
          "trajectory": "https://api.apjc.amp.cisco.com/v1/computers/9dbe7029-2385-4a24-8ddc-39fccc17ce0f/trajectory",
          "group": "https://api.apjc.amp.cisco.com/v1/groups/6c3c2005-4c74-4ba7-8dbb-c4d5b6bafe03"
        }
      },
      "file": {
        "disposition": "Malicious",
        "file_name": "rjtsbks.exe",
        "file_path": "\\\\?\\C:\\Users\\Administrator\\AppData\\Roaming\\rjtsbks.exe",
        "identity": {
          "sha256": "3372c1edab46837f1e973164fa2d726c5c5e17bcb888828ccd7c4dfcc234a370",
          "sha1": "e654d39cd13414b5151e8cf0d8f5b166dddd45cb",
          "md5": "209a288c68207d57e0ce6e60ebf60729"
        }
      }
    }
  ]
}

Fetch list of events filtered by SCAN_STARTED event type

Request

Requires Authorization
GET /v1/events?event_type[]=554696714&limit=10
Headers
accept: application/json
content-type: application/json
authorization: Basic FILTERED

cURL Edit, then copy and paste on your terminal

curl -X GET \
-H 'accept: application/json' \
-H 'content-type: application/json' \
--compressed -H 'Accept-Encoding: gzip, deflate' \
-u YOUR_API_CLIENT_ID \
'https://api.apjc.amp.cisco.com/v1/events?event_type[]=554696714&limit=10'

Response

Shortened for readability

strict-transport-security: max-age=31536000
content-type: application/json; charset=utf-8
status: 200 OK
x-ratelimit-limit: 3000
x-ratelimit-reset: 3526
x-ratelimit-remaining: 2863
x-frame-options: SAMEORIGIN
x-ratelimit-resetdate: 2019-11-01T18:03:14Z
transfer-encoding: chunked
{
  "version": "v1.2.0",
  "metadata": {
    "links": {
      "self": "https://api.apjc.amp.cisco.com/v1/events?event_type[]=554696714&limit=10",
      "next": "https://api.apjc.amp.cisco.com/v1/events?event_type%5B%5D=554696714&limit=10&offset=10"
    },
    "results": {
      "total": 25,
      "current_item_count": 10,
      "index": 0,
      "items_per_page": 10
    }
  },
  "data": [
    {
      "id": 5832364858376454000,
      "timestamp": 1572624424,
      "timestamp_nanoseconds": 772000000,
      "date": "2019-11-01T16:07:04+00:00",
      "event_type": "Scan Started",
      "event_type_id": 554696714,
      "connector_guid": "17d71471-805b-4183-9121-3924b8982fac",
      "group_guids": [
        "68665863-74d5-4bc1-ac7f-5477b2b6406e"
      ],
      "computer": {
        "connector_guid": "17d71471-805b-4183-9121-3924b8982fac",
        "hostname": "Demo_ZAccess",
        "external_ip": "5.183.149.147",
        "active": true,
        "network_addresses": [
          {
            "ip": "21.199.113.186",
            "mac": "b0:5f:19:3a:cd:0d"
          }
        ],
        "links": {
          "computer": "https://api.apjc.amp.cisco.com/v1/computers/17d71471-805b-4183-9121-3924b8982fac",
          "trajectory": "https://api.apjc.amp.cisco.com/v1/computers/17d71471-805b-4183-9121-3924b8982fac/trajectory",
          "group": "https://api.apjc.amp.cisco.com/v1/groups/68665863-74d5-4bc1-ac7f-5477b2b6406e"
        }
      },
      "scan": {
        "description": "C:\\Program Files\\DVD Maker"
      }
    },
    {
      "id": 5832364789656977000,
      "timestamp": 1572624408,
      "timestamp_nanoseconds": 193000000,
      "date": "2019-11-01T16:06:48+00:00",
      "event_type": "Scan Started",
      "event_type_id": 554696714,
      "connector_guid": "17d71471-805b-4183-9121-3924b8982fac",
      "group_guids": [
        "68665863-74d5-4bc1-ac7f-5477b2b6406e"
      ],
      "computer": {
        "connector_guid": "17d71471-805b-4183-9121-3924b8982fac",
        "hostname": "Demo_ZAccess",
        "external_ip": "5.183.149.147",
        "active": true,
        "network_addresses": [
          {
            "ip": "21.199.113.186",
            "mac": "b0:5f:19:3a:cd:0d"
          }
        ],
        "links": {
          "computer": "https://api.apjc.amp.cisco.com/v1/computers/17d71471-805b-4183-9121-3924b8982fac",
          "trajectory": "https://api.apjc.amp.cisco.com/v1/computers/17d71471-805b-4183-9121-3924b8982fac/trajectory",
          "group": "https://api.apjc.amp.cisco.com/v1/groups/68665863-74d5-4bc1-ac7f-5477b2b6406e"
        }
      },
      "scan": {
        "description": "C:\\Program Files\\Microsoft Games"
      }
    }
  ]
}