Skip to content

Commit 143b01a

Browse files
2.10.0 updated with example
1 parent 422f637 commit 143b01a

File tree

1 file changed

+9
-0
lines changed

1 file changed

+9
-0
lines changed

Scenarios and Workflows/TAXII_data_filtering.ipynb

Lines changed: 9 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -62,6 +62,15 @@
6262
{
6363
"cell_type": "markdown",
6464
"source": [
65+
"## Filtering options\n",
66+
"The `get_objects_aggregated` method offers result filtering by several criteria. The following are the available filtering arguments with example values.\n",
67+
"- `stix_types`: \"indicator\", \"domain-name\", \"relationship\", \"file\", \"url\", \"ipv4-addr\" or \"identity\"\n",
68+
"- `name`: e.g. \"compltheroomchngnotific.com\"\n",
69+
"- `confidence`: e.g. \">=60\" or \"=50\"\n",
70+
"- `created`: e.g. \">2025-01-23T19:28:11Z\"\n",
71+
"- `labels`: e.g. [\"CobaltStrike\", \"PE/Exe\"]\n",
72+
"\n",
73+
"\n",
6574
"## Latest CobaltStrike indicators with high confidence from Ransomware Indicators Feed data\n",
6675
"We will now fetch Ransomware Feed data from the last 30 days of time and filter out CobaltStrike indicators with confidence level of 80 or more."
6776
],

0 commit comments

Comments
 (0)