Name |
Input Entity |
|
Name |
Input Entity |
[RF] ASN to Intelligence Summary |
AS |
|
[RF] Email Address to Intelligence Summary |
Email Address |
[RF] ASN to RFDoc |
AS |
|
[RF] Email Address to RFDoc |
Email Address |
[RF] Alias to Intelligence Summary |
Alias |
|
[RF] Filename to Metrics |
Filename |
[RF] Alias to RFDoc |
Alias |
|
[RF] Filename to RFDoc |
Filename |
[RF] Analyst Note to Attack Vector |
AnalystNote |
|
[RF] Hash to Analyst Notes |
Hash |
[RF] Analyst Note to Domain |
AnalystNote |
|
[RF] Hash to Domain |
Hash |
[RF] Analyst Note to Email |
AnalystNote |
|
[RF] Hash to Hash |
Hash |
[RF] Analyst Note to Filename |
AnalystNote |
|
[RF] Hash to IP Address |
Hash |
[RF] Analyst Note to Hash |
AnalystNote |
|
[RF] Hash to Intelligence Summary |
Hash |
[RF] Analyst Note to IP Address |
AnalystNote |
|
[RF] Hash to Malware |
Hash |
[RF] Analyst Note to Malware |
AnalystNote |
|
[RF] Hash to RFDoc |
Hash |
[RF] Analyst Note to Malware Category |
AnalystNote |
|
[RF] Hash to URL |
Hash |
[RF] Analyst Note to Malware Signature |
AnalystNote |
|
[RF] Hash to Vulnerability |
Hash |
[RF] Analyst Note to Registry Key |
AnalystNote |
|
[RF] IP to ASN |
IPv4 Address |
[RF] Analyst Note to URL |
AnalystNote |
|
[RF] IP to Analyst Notes |
IPv4 Address |
[RF] Analyst Note to Vulnerability |
AnalystNote |
|
[RF] IP to Domain |
IPv4 Address |
[RF] Attack Vector to Intelligence Summary |
Attack Vector |
|
[RF] IP to Hash |
IPv4 Address |
[RF] Attack Vector to RFDoc |
Attack Vector |
|
[RF] IP to IP Address |
IPv4 Address |
[RF] Company to Intelligence Summary |
Company |
|
[RF] IP to Intelligence Summary |
IPv4 Address |
[RF] Company to RFDoc |
Company |
|
[RF] IP to Location |
IPv4 Address |
[RF] Domain to Analyst Notes |
Domain |
|
[RF] IP to Malware |
IPv4 Address |
[RF] Domain to Domain |
Domain |
|
[RF] IP to Organization |
IPv4 Address |
[RF] Domain to Hash |
Domain |
|
[RF] IP to RFDoc |
IPv4 Address |
[RF] Domain to IP Address |
Domain |
|
[RF] IP to URL |
IPv4 Address |
[RF] Domain to Intelligence Summary |
Domain |
|
[RF] IP to Vulnerability |
IPv4 Address |
[RF] Domain to Malware |
Domain |
|
[RF] MX Record to Analyst Notes |
MX Record |
[RF] Domain to RFDoc |
Domain |
|
[RF] MX Record to Domain |
MX Record |
[RF] Domain to URL |
Domain |
|
[RF] MX Record to Hash |
MX Record |
[RF] Domain to Vulnerability |
Domain |
|
[RF] MX Record to IP |
MX Record |
[RF] MX Record to Intelligence Summary |
MX Record |
|
[RF] Operation to Metrics |
Operation |
[RF] MX Record to Malware |
MX Record |
|
[RF] Operation to RFDoc |
Operation |
[RF] MX Record to RFDoc |
MX Record |
|
[RF] Organization to Intelligence Summary |
Organization |
[RF] MX Record to URL |
MX Record |
|
[RF] Organization to RFDoc |
Organization |
[RF] MX Record to Vulnerability |
MX Record |
|
[RF] Phrase to Alias |
Phrase |
[RF] Malware Category to RFDoc |
Malware Category |
|
[RF] Phrase to Company |
Phrase |
[RF] Malware Sig to Metrics |
Malware Signature |
|
[RF] Phrase to Intelligence Summary |
Phrase |
[RF] Malware Sig to RFDoc |
Malware Signature |
|
[RF] Phrase to Operation |
Phrase |
[RF] Malware to Analyst Notes |
Malware |
|
[RF] Phrase to Organization |
Phrase |
[RF] Malware to Domain |
Malware |
|
[RF] Phrase to RFDoc |
Phrase |
[RF] Malware to Email |
Malware |
|
[RF] Phrase to RFSource |
Phrase |
[RF] Malware to Hash |
Malware |
|
[RF] RFDoc to Attack Vector |
Recorded Future Doc |
[RF] Malware to IP |
Malware |
|
[RF] RFDoc to Domain |
Recorded Future Doc |
[RF] Malware to Intelligence Summary |
Malware |
|
[RF] RFDoc to Filename |
Recorded Future Doc |
[RF] Malware to Malware |
Malware |
|
[RF] RFDoc to Hash |
Recorded Future Doc |
[RF] Malware to RFDoc |
Malware |
|
[RF] RFDoc to IP Address |
Recorded Future Doc |
[RF] Malware to URL |
Malware |
|
[RF] RFDoc to Malware |
Recorded Future Doc |
[RF] Malware to Vulnerability |
Malware |
|
[RF] RFDoc to Malware Category |
Recorded Future Doc |
[RF] Mutex to RFDoc |
Mutex |
|
[RF] RFDoc to Malware Signature |
Recorded Future Doc |
[RF] NS Record to Analyst Notes |
NS Record |
|
[RF] RFDoc to RFSource |
Recorded Future Doc |
[RF] NS Record to Domain |
NS Record |
|
[RF] RFDoc to Registry Key |
Recorded Future Doc |
[RF] NS Record to Hash |
NS Record |
|
[RF] RFDoc to URL |
Recorded Future Doc |
[RF] NS Record to IP |
NS Record |
|
[RF] RFDoc to Vulnerability |
Recorded Future Doc |
[RF] NS Record to Intelligence Summary |
NS Record |
|
[RF] Registry Key to Intelligence Summary |
Registry Entry |
[RF] NS Record to Malware |
NS Record |
|
[RF] Registry Key to RFDoc |
Registry Entry |
[RF] NS Record to RFDoc |
NS Record |
|
[RF] URL to Intelligence Summary |
URL |
[RF] NS Record to URL |
NS Record |
|
[RF] URL to RFDoc |
URL |
[RF] NS Record to Vulnerability |
NS Record |
|
[RF] Vulnerability to Analyst Notes |
Vulnerability |
[RF] Vulnerability to Domain |
Vulnerability |
|
[RF] Vulnerability to URL |
Vulnerability |
[RF] Vulnerability to Hash |
Vulnerability |
|
[RF] Vulnerability to Vulnerability |
Vulnerability |
[RF] Vulnerability to IP |
Vulnerability |
|
[RF] Vulnerability to RFDoc |
Vulnerability |
[RF] Vulnerability to Intelligence Summary |
Vulnerability |
|
[RF] Vulnerability to Malware |
Vulnerability |
Additional Notes:
As per the improvements made in 2018 (see this support page), transforms that return hashes only show "risky" hashes (i.e., with a risk score of 65 or greater).