diff --git a/docs/swagger (3).json b/docs/swagger.json similarity index 99% rename from docs/swagger (3).json rename to docs/swagger.json index 90beff1..7e86dab 100644 --- a/docs/swagger (3).json +++ b/docs/swagger.json @@ -92,4 +92,4 @@ "example": "{\n \"reporterInfo\": {\n \"reporterEmail\": \"reporter_email@email.com\",\n \"reporterName\": \"John Smith\",\n \"reporterPhone\": \"555-555-5555\",\n \"reporterOrg\": \"Contoso\",\n \"discloseEmail\": \"TRUE||FALSE\",\n \"reporterNotes\": \"Sources are at liberty to elaborate on what their organization does if it's relevant to their reports as a whole.\"\n },\n \"reports\": [\n {\n \"report\": {\n \"batchID\": \"Group/Campaign Identifier\",\n \"relatedCases\": [ \"ID\", \"ID\", \"...\" ],\n \"reportNotes\": \"This is a brief summary of what I have found...\",\n \"TLP\": \"AMBER||GREEN||WHITE\",\n \"disclosureNotes\": \"Sources are at liberty to specify additional intended limits of the sharing: these must be adhered to.\",\n \"threats\": [\n {\n \"threat\": {\n \"threatType\": \"Activity||Content\",\n \"threatSubType\": \"CNC||FRAUD||DOS||SPAM||MALWARE||INTRUSION_ATTEMPT||PORT_SCAN||WEB_CRAWL||PHISHING||THREAT_TYPE_UNSPECIFIED\",\n \"sampleType\":\"Base64\",\n \"sourceIp\": \"1.1.1.1\",\n \"destinationIp\": \"2.2.2.2\",\n \"sourcePort\": \"PORT\",\n \"destinationPort\": \"PORT\",\n \"sourceUrl\": \"URL\",\n \"destinationUrl\": \"URL\",\n \"protocol\": \"PROTOCOL_NUMBER\",\n \"byteCount\": \"BYTES\",\n \"packetCount\": \"PACKETS\",\n \"date\": \"yyyy-mm-dd\",\n \"time\": \"00:00:00\",\n \"timeZone\": \"-0000\",\n \"sample\": \"logs of observed activity; must be of type specified above\"\n }\n }\n ]\n }\n }\n ]\n}" } } -} \ No newline at end of file +}