Generating a Report
To create a report, simply ask the agent in your chat:“Generate a threat intelligence report for this sample”The agent will compile all findings from the current analysis session, including triage data, tool outputs, and its own conclusions, into a structured document.
Report Structure
Every report follows a consistent structure:Executive Summary
A high-level overview of the sample, its classification, and the assessed threat level. Written for non-technical stakeholders who need to understand the risk without diving into technical details.Technical Analysis
Detailed findings from the analysis, including:- File metadata and classification
- Code analysis highlights (decompiled functions, suspicious patterns)
- Behavioural indicators (API calls, string artefacts, embedded resources)
- Evasion techniques detected (packing, obfuscation, anti-analysis tricks)
Indicators of Compromise (IOCs)
Extracted indicators organised into three categories:| Category | Examples |
|---|---|
| Network | Domains, IP addresses, URLs, C2 endpoints |
| File | Hashes (MD5, SHA1, SHA256), file names, file paths, mutexes |
| Host | Registry keys, scheduled tasks, service names, process names |
MITRE ATT&CK Mapping
Techniques and tactics observed in the sample, mapped to the MITRE ATT&CK framework. Each mapping includes:- Technique ID (e.g., T1055 - Process Injection)
- Tactic category (e.g., Defense Evasion)
- Evidence from the analysis supporting the mapping
Export Formats
Reports can be downloaded in three formats:Markdown
Clean, portable text format. Works well for pasting into wikis, tickets, or version-controlled documentation.
Formatted document ready for sharing with stakeholders, attaching to incident reports, or archiving.
HTML
Self-contained HTML file that can be viewed in any browser or embedded in internal tools.
IOC Export
In addition to full reports, you can export just the IOCs in machine-readable formats:- JSON - Structured data for ingestion into SIEMs or threat intel platforms
- CSV - Spreadsheet-compatible format for manual review or bulk import
- STIX 2.1 - Standard format for sharing threat intelligence between organisations and tools
“Extract all IOCs from this sample and export as STIX”