POST /api/reset
Hard reset the application state by clearing all cached data and uploaded files.Response
Example
Behavior
- Clears
processed_filesin-memory cache - Deletes all files in
chronos_uploads/directory - Deletes all files in
chronos_output/directory - Resets application to fresh state
POST /api/yara_scan/
Scan ingested CSV text content against compiled YARA rules for malware detection.Path Parameters
CSV filename from ingestion (e.g.,
import_Security_1704067200.csv)Response
Example
Supported YARA Rules
The scanner uses 7 YARA rule files fromrules/yara/:
- Ransomware: LockBit, QILIN/Agenda, generic ransomware patterns
- C2 Frameworks: Cobalt Strike, Sliver, Metasploit
- Infostealers: Credential theft patterns
- LOLBins: Living-off-the-land binary abuse
- Webshells: PHP, ASP.NET webshell detection
- macOS Persistence: LaunchAgents, LaunchDaemons abuse
YARA scanning is CPU-intensive for large datasets. Consider filtering data before scanning.
POST /api/document/extract_iocs
Extract Indicators of Compromise (IOCs) from ingested forensic data.Request Body
CSV filename from ingestion
Response
Example
IOC Extraction Logic
The endpoint uses regex patterns to extract:- IPv4 addresses: Standard dotted-quad notation
- Domains: FQDN patterns (excluding internal/private)
- MD5/SHA1/SHA256 hashes: Hex string patterns
- File paths: Windows and Unix path structures
- Registry keys: Windows registry hive paths
- URLs: HTTP/HTTPS URLs with full validation
POST /api/document/check_xlsx
Validate XLSX file structure and check for potential corruption or malicious content.Request Body
XLSX filename to validate
Response
Example
Validation Checks
- ZIP structure integrity (XLSX is ZIP-based)
- XML schema validation for workbook/worksheet files
- Relationship integrity between sheets
- Detection of macro-enabled files (.xlsm)
- External link detection (potential data exfiltration)
GET /api/enrichment/config
Retrieve threat intelligence enrichment configuration.Response
Example
POST /api/enrichment/lookup
Enrich IOCs with threat intelligence from configured providers.Request Body
IOC type:
"ip", "domain", "hash", "url"IOC value to lookup (e.g.,
"192.168.1.100")Response
Example
Caching
Enrichment results are cached inengine/enrichment_cache.py to reduce API calls and respect rate limits. Cache TTL is 24 hours by default.
Enrichment requires valid API keys configured in
.env file. See Installation Guide for setup instructions.Next Steps
API Overview
API architecture and authentication
Analysis Endpoints
Timeline queries and forensic reports
Export Endpoints
Multi-format export capabilities
Detection Rules
Configure YARA and Sigma rules