Secure Malware Analytics
Formerly known as Threat Grid, the REST APIs allow users to submit samples for analysis as part of an investigation or research. The indicators and data from the analysis are indexed and searchable making it easy to use for triage, hunting, or threat intelligence. This allows analysts to query the data and find, for example, additional pieces of infrastructure that an attacker is using in a campaign, methods of persistence a family of malware uses, host or network indicators that follow similar naming conventions, host indicators that families of malware leave behind, etc.
What can you do with Secure Malware Analytics APIs?

Sample Analysis
- Submit Files for analysis
- Parse results for indicators
- Take action in the environment

Context and Enrichment
- Associate indicators with a malware family
- Link a payload delivery to a Word Doc
- Correlate host and network indicators

Threat Hunting
- Find naming patterns in files or domains
- Map out infrastructure used in a campaign
- Collect command line arguments used by malware
Get started with the Learning Labs
The purpose of this learning lab is to understand the basics of the Cisco Threat Grid platform.
The purpose of this learning lab is to understand the basics of the Cisco Threat Grid API and how to easily operationalize the threat intelligence it makes available.
Find sample code and scripts
Questions? We are here to help.
Bring your questions to the Cisco Security Developer community! Engage, collaborate and share with your fellow experts in the developer forum.