Data on detected objects

The scope of transmitted data on detected objects depending on the type of the object is listed in the following table.

Data on detected objects

 

Parameter

Data type

Description

Example

file

processedObject.MD5

MD5

MD5 hash of the file or composite object that was sent for scanning.

1839a1e9621c58dadf782e131df3821f

processedObject.SHA256

SHA256

SHA256 hash of the file or composite object that was sent for scanning.

7bbfc1d690079b0c591e146c4294305da1cee857e12db40f4318598fdb503a47

processedObject.fileName

String

Name of the file or composite object that was sent for scanning.

EICAR-CURE.com

processedObject.fileType

String

Type of the file or composite object that was sent for scanning.

GeneralTxt

processedObject.fileSize

Integer

Size of the file or composite object that was sent for scanning, in bytes.

184

detectedObject.MD5

MD5

MD5 hash of the file (simple object or file within a composite object) in which the threat was detected.

1839a1e9621c58dadf782e131df3821f

detectedObject.fileName

String

Name of the file (simple object or file within a composite object) in which the threat was detected.

EICAR-CURE.com

detectedObject.fileSize

Integer

Size of the file (simple object or file within a composite object) in which the threat was detected, in bytes.

184

URL

detectedObject

String

URL of the detected object.

http://example.com/link

host

detectedObject

Array

List of domains to which detected objects belong.

  • For the TAA technology, only one domain is listed.
  • For the URL technology, as well as for objects with the objectSource=dns parameter, the list can contain several domains.

example.org, example.net

See also

Data on detected threats

Data on the environment of detected objects

Page top