Spaces:
Paused
Paused
UDM_Field,Description | |
metadata,"Entity metadata such as timestamp, product, etc." | |
entity,Noun in the UDM event that this entity represents. | |
relations,"One or more relationships between the entity (a) and other entities, including the relationship type and related entity." | |
additional,"Important entity data that cannot be adequately represented within | |
the formal sections of the Entity." | |
risk_score,Stores information related to the entity's risk score. | |
metric,"Stores statistical metrics about the entity. Used if metadata.entity_type | |
is METRIC." | |
product_entity_id,"A vendor-specific identifier that uniquely identifies the entity | |
(e.g. a GUID, LDAP, OID, or similar)." | |
collected_timestamp,"GMT timestamp when the entity information was collected by the vendor's | |
local collection infrastructure." | |
creation_timestamp,"GMT timestamp when the entity described by the product_entity_id was | |
created on the system where data was collected." | |
interval,"Valid existence time range for the version of the entity represented by | |
this entity data." | |
vendor_name,Vendor name of the product that produced the entity information. | |
product_name,Product name that produced the entity information. | |
feed,Vendor feed name for a threat indicator feed. | |
product_version,Version of the product that produced the entity information. | |
entity_type,"Entity type. | |
If an entity has multiple possible types, this specifies the most specific | |
type." | |
description,Human-readable description of the entity. | |
threat,"Metadata provided by a threat intelligence feed that identified the | |
entity as malicious." | |
source_type,The source of the entity. | |
source_labels,Entity source metadata labels. | |
event_metadata,Metadata field from the event. | |
risk_version,Version of the risk score calculation algorithm. | |
risk_window,"Time window used when computing the risk score for an entity, for | |
example 24 hours or 7 days." | |
DEPRECATED_risk_score,Deprecated risk score. | |
risk_delta,"Represents the change in risk score for an entity between the end of the | |
previous time window and the end of the current time window." | |
detections_count,Number of detections that make up the risk score within the time window. | |
first_detection_time,"Timestamp of the first detection within the specified time window. | |
This field is empty when there are no detections." | |
last_detection_time,"Timestamp of the last detection within the specified time window. | |
This field is empty when there are no detections." | |
risk_score,Raw risk score for the entity. | |
normalized_risk_score,Normalized risk score for the entity. This value is between 0-1000. | |
risk_window_size,Risk window duration for the Entity. | |
raw_risk_delta,"Represents the change in raw risk score for an entity between the end of | |
the previous time window and the end of the current time window." | |
first_seen,Timestamp of the first time the entity was seen in the environment. | |
last_seen,Timestamp of the last time the entity was seen in the environment. | |
sum_measure,Sum of all precomputed measures for the given metric. | |
total_events,Total number of events used to calculate the given precomputed metric. | |
metric_name,Name of the analytic. | |
dimensions,All group by clauses used to calculate the metric. | |
export_window,Export window for which the metric was exported. | |
value,Value of the aggregated measure. | |
aggregate_function,Function used to calculate the aggregated measure. | |
entity,Entity (b) that the primary entity (a) is related to. | |
entity_type,Type of the related entity (b) in this relationship. | |
relationship,Type of relationship. | |
direction,"Directionality of relationship between primary entity (a) and the | |
related entity (b)." | |
uid,UID of the relationship. | |
entity_label,Label to identify the Noun of the relation. | |
previous_range_end_time,End time of the previous time window. | |
risk_score_delta,Difference in the normalized risk score from the previous recorded value. | |
previous_risk_score,Risk score from previous risk window | |
risk_score_numeric_delta,Numeric change between current and previous risk score | |
metadata,"Event metadata such as timestamp, source product, etc." | |
additional,"Any important vendor-specific event data that cannot be adequately | |
represented within the formal sections of the UDM model." | |
principal,"Represents the acting entity that originates the activity | |
described in the event. The principal must include at least one machine | |
detail (hostname, MACs, IPs, port, product-specific identifiers like an | |
EDR asset ID) or user detail (for example, username), and optionally | |
include process details. It must NOT include any of the following fields: | |
email, files, registry keys, or values." | |
src,"Represents a source entity being acted upon by the participant along with | |
the device or process context for the source object (the machine where the | |
source object resides). For example, if user U copies file A on machine X | |
to file B on machine Y, both file A and machine X would be specified in the | |
src portion of the UDM event." | |
target,"Represents a target entity being referenced by the event or an object on | |
the target entity. For example, in a firewall connection from device A to | |
device B, A is described as the principal and B is described as the target. | |
For a process injection by process C into target process D, process C is | |
described as the principal and process D is described as the target." | |
intermediary,"Represents details on one or more intermediate entities processing activity | |
described in the event. This includes device details about a proxy server | |
or SMTP relay server. If an active event (that has a principal and | |
possibly target) passes through any intermediaries, they're added here. | |
Intermediaries can impact the overall action, for example blocking or | |
modifying an ongoing request. A rule of thumb here is that 'principal', | |
'target', and description of the initial action should be the same | |
regardless of the intermediary or its action. A successful network | |
connection from A->B should look the same in principal/target/intermediary | |
as one blocked by firewall C: principal: A, target: B (intermediary: C)." | |
observer,"Represents an observer entity (for example, a packet sniffer or | |
network-based vulnerability scanner), which is not a direct intermediary, | |
but which observes and reports on the event in question." | |
about,"Represents entities referenced by the event that are not otherwise | |
described in principal, src, target, intermediary or observer. For example, | |
it could be used to track email file attachments, domains/URLs/IPs embedded | |
within an email body, and DLLs that are loaded during a PROCESS_LAUNCH | |
event." | |
security_result,A list of security results. | |
network,"All network details go here, including sub-messages with details on each | |
protocol (for example, DHCP, DNS, or HTTP)." | |
extensions,"All other first-class, event-specific metadata goes in this message. | |
Don't place protocol metadata in Extensions; put it in Network." | |
auth,An authentication extension. | |
vulns,A vulnerability extension. | |
id,ID of the UDM event. Can be used for raw and normalized event retrieval. | |
product_log_id,"A vendor-specific event identifier to uniquely identify the event (for example: a | |
GUID)." | |
event_timestamp,The GMT timestamp when the event was generated. | |
collected_timestamp,"The GMT timestamp when the event was collected by the vendor's local | |
collection infrastructure." | |
ingested_timestamp,The GMT timestamp when the event was ingested (received) by Google Security Operations. | |
event_type,"The event type. | |
If an event has multiple possible types, this specifies the most specific | |
type." | |
vendor_name,The name of the product vendor. | |
product_name,The name of the product. | |
product_version,The version of the product. | |
product_event_type,"A short, descriptive, human-readable, product-specific event name or type | |
(for example: ""Scanned X"", ""User account created"", ""process_start"")." | |
product_deployment_id,The deployment identifier assigned by the vendor for a product deployment. | |
description,A human-readable unparsable description of the event. | |
url_back_to_product,A URL that takes the user to the source product console for this event. | |
ingestion_labels,User-configured ingestion metadata labels. | |
tags,"Tags added by Google Security Operations after an event is parsed. It is an error to | |
populate this field from within a parser." | |
enrichment_state,The enrichment state. | |
log_type,The string value of log type. | |
base_labels,Data access labels on the base event. | |
enrichment_labels,"Data access labels from all the contextual events used to enrich the base | |
event." | |
sent_bytes,The number of bytes sent. | |
received_bytes,The number of bytes received. | |
sent_packets,The number of packets sent. | |
received_packets,The number of packets received. | |
session_duration,"The duration of the session as the number of seconds and nanoseconds. | |
For seconds, network.session_duration.seconds, the type is a 64-bit | |
integer. For nanoseconds, network.session_duration.nanos, the type is a | |
32-bit integer." | |
session_id,The ID of the network session. | |
parent_session_id,The ID of the parent network session. | |
application_protocol_version,"The version of the application protocol. e.g. ""1.1, 2.0""" | |
community_id,Community ID network flow value. | |
direction,The direction of network traffic. | |
ip_protocol,The IP protocol. | |
application_protocol,The application protocol. | |
ftp,FTP info. | |
email,Email info for the sender/recipient. | |
dns,DNS info. | |
dhcp,DHCP info. | |
http,HTTP info. | |
tls,TLS info. | |
smtp,"SMTP info. | |
Store fields specific to SMTP not covered by Email." | |
asn,Autonomous system number. | |
dns_domain,DNS domain name. | |
carrier_name,Carrier identification. | |
organization_name,Organization name (e.g Google). | |
ip_subnet_range,Associated human-readable IP subnet range (e.g. 10.1.2.0/24). | |
hostname,"Client hostname or domain name field. | |
Hostname also doubles as the domain for remote entities." | |
domain,Information about the domain. | |
artifact,Information about an artifact. | |
url_metadata,Information about the URL. | |
asset_id,The asset ID. | |
user,Information about the user. | |
user_management_chain,"Information about the user's management chain (reporting hierarchy). | |
Note: user_management_chain is only populated when data is exported to | |
BigQuery since recursive fields (e.g. user.managers) are not supported by | |
BigQuery." | |
group,Information about the group. | |
process,Information about the process. | |
process_ancestors,"Information about the process's ancestors ordered from immediate ancestor | |
(parent process) to root. | |
Note: process_ancestors is only populated when data is exported to BigQuery | |
since recursive fields (e.g. process.parent_process) are not supported by | |
BigQuery." | |
asset,Information about the asset. | |
ip,A list of IP addresses associated with a network connection. | |
nat_ip,A list of NAT translated IP addresses associated with a network connection. | |
port,"Source or destination network port number when a specific network | |
connection is described within an event." | |
nat_port,"NAT external network port number when a specific network connection is | |
described within an event." | |
mac,List of MAC addresses associated with a device. | |
administrative_domain,"Domain which the device belongs to (for example, the Microsoft Windows | |
domain)." | |
namespace,"Namespace which the device belongs to, such as ""AD forest"". | |
Uses for this field include Microsoft Windows AD forest, the name of | |
subsidiary, or the name of acquisition." | |
URL,The URL. | |
file,Information about the file. | |
email,"Email address. | |
Only filled in for security_result.about" | |
registry,Registry information. | |
application,"The name of an application or service. | |
Some SSO solutions only capture the name of a target application | |
such as ""Atlassian"" or ""Google""." | |
platform,Platform. | |
platform_version,"Platform version. For example, | |
""Microsoft Windows 1803""." | |
platform_patch_level,"Platform patch level. | |
For example, ""Build 17134.48""" | |
cloud,"Cloud metadata. | |
Deprecated: cloud should be populated in entity Attribute as generic | |
metadata (e.g. asset.attribute.cloud)." | |
location,"Physical location. For cloud environments, set the region in | |
location.name." | |
ip_location,Deprecated: use ip_geo_artifact.location instead. | |
ip_geo_artifact,"Enriched geographic information corresponding to an IP address. | |
Specifically, location and network data." | |
resource,"Information about the resource (e.g. scheduled task, calendar entry). | |
This field should not be used for files, registry, or processes because | |
these objects are already part of Noun." | |
resource_ancestors,"Information about the resource's ancestors ordered from immediate ancestor | |
(starting with parent resource)." | |
labels,"Labels are key-value pairs. | |
For example: key = ""env"", value = ""prod"". | |
Deprecated: labels should be populated in entity Attribute as generic | |
metadata (e.g. user.attribute.labels)." | |
object_reference,Finding to which the Analyst updated the feedback. | |
investigation,Analyst feedback/investigation for alerts. | |
network,"Network details, including sub-messages with details on each protocol | |
(for example, DHCP, DNS, or HTTP)." | |
security_result,A list of security results. | |
about,"If the security result is about a specific entity (Noun), add it here." | |
category,The security category. | |
category_details,"For vendor-specific categories. For web categorization, put type in here | |
such as ""gambling"" or ""porn""." | |
threat_name,"A vendor-assigned classification common across multiple customers | |
(e.g. ""W32/File-A"", ""Slammer"")." | |
rule_set,"The result's rule set identifier. | |
(e.g. ""windows-threats"")" | |
rule_set_display_name,The curated detections rule set display name. | |
ruleset_category_display_name,"The curated detection rule set category display name. | |
(for example, if rule_set_display_name is ""CDIR SCC Enhanced Exfiltration"", | |
the rule_set_category is ""Cloud Threats"")." | |
rule_id,"A vendor-specific ID and name for a rule, varying by observerer type | |
(e.g. ""08123"", ""5d2b44d0-5ef6-40f5-a704-47d61d3babbe"")." | |
rule_name,"Name of the security rule | |
(e.g. ""BlockInboundToOracle"")." | |
rule_version,"Version of the security rule. | |
(e.g. ""v1.1"", ""00001"", ""1604709794"", ""2020-11-16T23:04:19+00:00""). | |
Note that rule versions are source-dependant and lexical ordering | |
should not be assumed." | |
rule_type,The type of security rule. | |
rule_author,Author of the security rule. | |
rule_labels,"A list of rule labels that can't be captured by the other fields | |
in security result | |
(e.g. ""reference : AnotherRule"", ""contributor : John"")." | |
alert_state,The alerting types of this security result. | |
detection_fields,"An ordered list of values, that represent fields in detections for a | |
security finding. This list represents mapping of names of requested | |
entities to their values (i.e. the security result matched variables) ." | |
outcomes,"A list of outcomes that represent the results of this security finding. | |
This list represents a mapping of names of the requested outcomes, | |
to their values." | |
summary,"A human readable summary (e.g. ""failed login occurred"")" | |
description,"A human readable description (e.g. ""user password was wrong"")" | |
action,Actions taken for this event. | |
action_details,The detail of the action taken as provided by the vendor. | |
severity,The severity of the result. | |
confidence,The confidence level of the result as estimated by the product. | |
priority,The priority of the result. | |
risk_score,The risk score of the security result. | |
confidence_score,The confidence score of the security result. | |
analytics_metadata,Stores metadata about each risk analytic metric the rule uses. | |
severity_details,Vendor-specific severity. | |
confidence_details,"Additional detail with regards to the confidence of a security event as | |
estimated by the product vendor." | |
priority_details,Vendor-specific information about the security result priority. | |
url_back_to_product,URL that takes the user to the source product console for this event. | |
threat_id,Vendor-specific ID for a threat. | |
threat_feed_name,Vendor feed name for a threat indicator feed. | |
threat_id_namespace,"The attribute threat_id_namespace qualifies threat_id with an ID namespace | |
to get an | |
unique ID. The attribute threat_id by itself is not unique across Google SecOps | |
as it is a vendor specific ID." | |
threat_status,Current status of the threat | |
attack_details,MITRE ATT&CK details. | |
first_discovered_time,First time the IoC threat was discovered in the provider. | |
associations,Associations related to the threat. | |
campaigns,Campaigns using this IOC threat. | |
verdict,"Verdict about the IoC from the provider. | |
This field is now deprecated. Use VerdictInfo instead." | |
last_updated_time,Last time the IoC threat was updated in the provider. | |
verdict_info,Verdict information about the IoC from the provider. | |
threat_verdict,GCTI threat verdict on the security result entity. | |
last_discovered_time,Last time the IoC was seen in the provider data. | |
analytic,Name of the analytic. | |
ip,IP address of the artifact. | |
prevalence,The prevalence of the artifact within the customer's environment. | |
first_seen_time,First seen timestamp of the IP in the customer's environment. | |
last_seen_time,Last seen timestamp of the IP address in the customer's environment. | |
location,Location of the Artifact's IP address. | |
network,Network information related to the Artifact's IP address. | |
as_owner,Owner of the Autonomous System to which the IP address belongs. | |
asn,Autonomous System Number to which the IP address belongs. | |
jarm,"The JARM hash for the IP address. | |
(https://engineering.salesforce.com/easily-identify-malicious-servers-on-the-internet-with-jarm-e095edac525a)." | |
last_https_certificate,SSL certificate information about the IP address. | |
last_https_certificate_date,Most recent date for the certificate in VirusTotal. | |
regional_internet_registry,"RIR (one of the current RIRs: AFRINIC, ARIN, APNIC, LACNIC or RIPE NCC)." | |
tags,Identification attributes | |
whois,WHOIS information as returned from the pertinent WHOIS server. | |
whois_date,Date of the last update of the WHOIS record in VirusTotal. | |
product_object_id,"A vendor-specific identifier to uniquely identify the entity (a GUID or | |
similar)." | |
hostname,Asset hostname or domain name field. | |
asset_id,"The asset ID. Value must contain the ':' character. For example, | |
cs:abcdd23434." | |
ip,A list of IP addresses associated with an asset. | |
mac,List of MAC addresses associated with an asset. | |
nat_ip,List of NAT IP addresses associated with an asset. | |
first_seen_time,"The first observed time for an asset. | |
The value is calculated on the basis of the | |
first time the identifier was observed." | |
hardware,The asset hardware specifications. | |
platform_software,The asset operating system platform software. | |
software,The asset software details. | |
location,Location of the asset. | |
category,"The category of the asset (e.g. ""End User Asset"", ""Workstation"", ""Server"")." | |
type,The type of the asset (e.g. workstation or laptop or server). | |
network_domain,"The network domain of the asset (e.g. ""corp.acme.com"")" | |
creation_time,"Time the asset was created or provisioned. | |
Deprecate: creation_time should be populated in Attribute as generic | |
metadata." | |
first_discover_time,"Time the asset was first discovered (by asset management/discoverability | |
software)." | |
last_discover_time,"Time the asset was last discovered (by asset management/discoverability | |
software)." | |
system_last_update_time,"Time the asset system or OS was last updated. | |
For all other operations that are not system updates (such as resizing a | |
VM), use Attribute.last_update_time." | |
last_boot_time,Time the asset was last boot started. | |
labels,"Metadata labels for the asset. | |
Deprecated: labels should be populated in Attribute as generic metadata." | |
deployment_status,The deployment status of the asset for device lifecycle purposes. | |
vulnerabilities,Vulnerabilities discovered on asset. | |
attribute,Generic entity metadata attributes of the asset. | |
version,ATT&CK version (e.g. 12.1). | |
tactics,Tactics employed. | |
techniques,Techniques employed. | |
id,"Tactic ID (e.g. ""TA0043"")." | |
name,"Tactic Name (e.g. ""Reconnaissance"")" | |
id,"Technique ID (e.g. ""T1595"")." | |
name,"Technique Name (e.g. ""Active Scanning"")." | |
subtechnique_id,"Subtechnique ID (e.g. ""T1595.001"")." | |
subtechnique_name,"Subtechnique Name (e.g. ""Scanning IP Blocks"")." | |
cloud,"Cloud metadata attributes such as project ID, account ID, or organizational | |
hierarchy." | |
labels,"Set of labels for the entity. Should only be used for product labels (for | |
example, Google Cloud resource labels or Azure AD sensitivity labels. | |
Should not be used for arbitrary key-value mappings." | |
permissions,"System permissions for IAM entity | |
(human principal, service account, group)." | |
roles,"System IAM roles to be assumed by resources to use the role's permissions | |
for access control." | |
creation_time,Time the resource or entity was created or provisioned. | |
last_update_time,Time the resource or entity was last updated. | |
type,The type of authentication. | |
mechanism,The authentication mechanism. | |
auth_details,The vendor defined details of the authentication. | |
version,Certificate version. | |
serial,Certificate serial number. | |
subject,Subject of the certificate. | |
issuer,Issuer of the certificate. | |
md5,"The MD5 hash of the certificate, as a hex-encoded string." | |
sha1,"The SHA1 hash of the certificate, as a hex-encoded string." | |
sha256,"The SHA256 hash of the certificate, as a hex-encoded string." | |
not_before,Indicates when the certificate is first valid. | |
not_after,Indicates when the certificate is no longer valid. | |
environment,The Cloud environment. | |
vpc,"The cloud environment VPC. | |
Deprecated." | |
project,"The cloud environment project information. | |
Deprecated: Use Resource.resource_ancestors" | |
availability_zone,"The cloud environment availability zone (different from region which is | |
location.name)." | |
type,Type. | |
value,Value. | |
ttl,Time to live. | |
priority,Priority. | |
retry,Retry. | |
refresh,Refresh. | |
minimum,Minimum. | |
expire,Expire. | |
serial,Serial. | |
rname,Rname. | |
opcode,The BOOTP op code. | |
htype,Hardware address type. | |
hlen,Hardware address length. | |
hops,Hardware ops. | |
transaction_id,Transaction ID. | |
seconds,Seconds elapsed since client began address acquisition/renewal process. | |
flags,Flags. | |
ciaddr,Client IP address (ciaddr). | |
yiaddr,Your IP address (yiaddr). | |
siaddr,IP address of the next bootstrap server. | |
giaddr,Relay agent IP address (giaddr). | |
chaddr,Client hardware address (chaddr). | |
sname,Server name that the client wishes to boot from. | |
file,Boot image filename. | |
options,List of DHCP options. | |
type,DHCP message type. | |
lease_time_seconds,"Lease time in seconds. See RFC2132, section 9.2." | |
client_hostname,"Client hostname. See RFC2132, section 3.14." | |
client_identifier,"Client identifier. See RFC2132, section 9.14." | |
requested_address,"Requested IP address. See RFC2132, section 9.1." | |
code,Code. See RFC1533. | |
data,Data. | |
id,DNS query id. | |
response,Set to true if the event is a DNS response. See QR field from RFC1035. | |
opcode,"The DNS OpCode used to specify the type of DNS query | |
(for example, QUERY, IQUERY, or STATUS)." | |
authoritative,"Other DNS header flags. See RFC1035, section 4.1.1." | |
truncated,Whether the DNS response was truncated. | |
recursion_desired,Whether a recursive DNS lookup is desired. | |
recursion_available,Whether a recursive DNS lookup is available. | |
response_code,Response code. See RCODE from RFC1035. | |
questions,A list of domain protocol message questions. | |
answers,A list of answers to the domain name query. | |
authority,"A list of domain name servers which verified the answers to the domain name | |
queries." | |
additional,"A list of additional domain name servers that can be used to verify the | |
answer to the domain." | |
name,The domain name. | |
type,The code specifying the type of the query. | |
class,The code specifying the class of the query. | |
prevalence,The prevalence of the domain within the customer's environment. | |
name,The name of the owner of the resource record. | |
type,The code specifying the type of the resource record. | |
class,The code specifying the class of the resource record. | |
ttl,"The time interval for which the resource record can be cached before the | |
source of the information should again be queried." | |
data,"The payload or response to the DNS question for all responses encoded in | |
UTF-8 format" | |
binary_data,"The raw bytes of any non-UTF8 strings that might be included as part of a | |
DNS response." | |
name,The domain name. | |
prevalence,The prevalence of the domain within the customer's environment. | |
first_seen_time,First seen timestamp of the domain in the customer's environment. | |
last_seen_time,Last seen timestamp of the domain in the customer's environment. | |
registrar,"Registrar name . FOr example, ""Wild West Domains, Inc. (R120-LROR)"", | |
""GoDaddy.com, LLC"", or ""PDR LTD. D/B/A PUBLICDOMAINREGISTRY.COM""." | |
contact_email,Contact email address. | |
whois_server,Whois server name. | |
name_server,Repeated list of name servers. | |
creation_time,Domain creation time. | |
update_time,Last updated time. | |
expiration_time,Expiration time. | |
audit_update_time,Audit updated time. | |
status,"Domain status. See | |
https://www.icann.org/resources/pages/epp-status-codes-2014-06-16-en | |
for meanings of possible values" | |
registrant,Parsed contact information for the registrant of the domain. | |
admin,Parsed contact information for the administrative contact for the domain. | |
tech,Parsed contact information for the technical contact for the domain | |
billing,Parsed contact information for the billing contact of the domain. | |
zone,Parsed contact information for the zone. | |
whois_record_raw_text,WHOIS raw text. | |
registry_data_raw_text,Registry Data raw text. | |
iana_registrar_id,"IANA Registrar ID. See | |
https://www.iana.org/assignments/registrar-ids/registrar-ids.xhtml" | |
private_registration,"Indicates whether the domain appears to be using a private registration | |
service to mask the owner's contact information." | |
categories,Categories assign to the domain as retrieved from VirusTotal. | |
favicon,Includes difference hash and MD5 hash of the domain's favicon. | |
jarm,Domain's JARM hash. | |
last_dns_records,Domain's DNS records from the last scan. | |
last_dns_records_time,Date when the DNS records list was retrieved by VirusTotal. | |
last_https_certificate,SSL certificate object retrieved last time the domain was analyzed. | |
last_https_certificate_time,When the certificate was retrieved by VirusTotal. | |
popularity_ranks,"Domain's position in popularity ranks such as Alexa, Quantcast, Statvoo, | |
etc" | |
tags,List of representative attributes. | |
whois_time,Date of the last update of the WHOIS record. | |
from,The 'from' address. | |
reply_to,The 'reply to' address. | |
to,A list of 'to' addresses. | |
cc,A list of 'cc' addresses. | |
bcc,A list of 'bcc' addresses. | |
mail_id,The mail (or message) ID. | |
subject,The subject line(s) of the email. | |
bounce_address,"The envelope from address. | |
https://en.wikipedia.org/wiki/Bounce_address" | |
raw_md5,Favicon's MD5 hash. | |
dhash,Difference hash. | |
sha256,"The SHA256 hash of the file, as a hex-encoded string." | |
md5,"The MD5 hash of the file, as a hex-encoded string." | |
sha1,"The SHA1 hash of the file, as a hex-encoded string." | |
size,The size of the file in bytes. | |
full_path,The full path identifying the location of the file on the system. | |
mime_type,"The MIME (Multipurpose Internet Mail Extensions) type of the file, | |
for example ""PE"", ""PDF"", or ""powershell script""." | |
file_metadata,"Metadata associated with the file. | |
Deprecate FileMetadata in favor of using fields in File." | |
security_result,"Google Cloud Threat Intelligence (GCTI) security result for the file | |
including threat context and detection metadata." | |
pe_file,Metadata about the Portable Executable (PE) file. | |
ssdeep,Ssdeep of the file | |
vhash,Vhash of the file. | |
ahash,Deprecated. Use authentihash instead. | |
authentihash,Authentihash of the file. | |
file_type,FileType field. | |
capabilities_tags,Capabilities tags. | |
names,Names fields. | |
tags,Tags for the file. | |
last_modification_time,Timestamp when the file was last updated. | |
prevalence,Prevalence of the file hash in the customer's environment. | |
first_seen_time,Timestamp the file was first seen in the customer's environment. | |
last_seen_time,Timestamp the file was last seen in the customer's environment. | |
stat_mode,"The mode of the file. A bit string indicating the permissions and | |
privileges of the file." | |
stat_inode,The file identifier. Unique identifier of object within a file system. | |
stat_dev,The file system identifier to which the object belongs. | |
stat_nlink,Number of links to file. | |
stat_flags,User defined flags for file. | |
last_analysis_time,Timestamp the file was last analysed. | |
embedded_urls,Embedded URLs found in the file. | |
embedded_domains,Embedded domains found in the file. | |
embedded_ips,Embedded IP addresses found in the file. | |
exif_info,Exif metadata from different file formats extracted by exiftool. | |
signature_info,File signature information extracted from different tools. | |
pdf_info,Information about the PDF file structure. | |
first_submission_time,First submission time of the file. | |
last_submission_time,Last submission time of the file. | |
main_icon,Icon's relevant hashes. | |
id,Code sign identifier. | |
format,Code sign format. | |
compilation_time,Code sign timestamp | |
imphash,Imphash of the file. | |
entry_point,info.pe-entry-point. | |
entry_point_exiftool,info.exiftool.EntryPoint. | |
compilation_time,info.pe-timestamp. | |
compilation_exiftool_time,info.exiftool.TimeStamp. | |
section,FilemetadataSection fields. | |
imports,FilemetadataImports fields. | |
resource,FilemetadataPeResourceInfo fields. | |
resources_type_count,Deprecated: use resources_type_count_str. | |
resources_language_count,Deprecated: use resources_language_count_str. | |
resources_type_count_str,"Number of resources by resource type. | |
Example: RT_ICON: 10, RT_DIALOG: 5" | |
resources_language_count_str,"Number of resources by language. | |
Example: NEUTRAL: 20, ENGLISH US: 10" | |
signature_info,"FilemetadataSignatureInfo field. | |
deprecated, user File.signature_info instead." | |
verification_message,"Status of the certificate. | |
Valid values are ""Signed"", ""Unsigned"" or a description of the certificate | |
anomaly, if found." | |
verified,"True if verification_message == ""Signed""" | |
signer,Deprecated: use signers field. | |
signers,"File metadata signer information. | |
The order of the signers matters. Each element is a higher level | |
authority, being the last the root authority." | |
x509,List of certificates. | |
command,The FTP command. | |
product_object_id,"Product globally unique user object identifier, such as an LDAP Object | |
Identifier." | |
creation_time,"Group creation time. | |
Deprecated: creation_time should be populated in Attribute as generic | |
metadata." | |
group_display_name,"Group display name. e.g. ""Finance""." | |
attribute,Generic entity metadata attributes of the group. | |
email_addresses,Email addresses of the group. | |
windows_sid,Microsoft Windows SID of the group. | |
serial_number,Hardware serial number. | |
manufacturer,Hardware manufacturer. | |
model,Hardware model. | |
cpu_platform,"Platform of the hardware CPU (e.g. ""Intel Broadwell"")." | |
cpu_model,"Model description of the hardware CPU | |
(e.g. ""2.8 GHz Quad-Core Intel Core i5"")." | |
cpu_clock_speed,Clock speed of the hardware CPU in MHz. | |
cpu_max_clock_speed,Maximum possible clock speed of the hardware CPU in MHz. | |
cpu_number_cores,Number of CPU cores. | |
ram,Amount of the hardware ramdom access memory (RAM) in Mb. | |
method,"The HTTP request method | |
(e.g. ""GET"", ""POST"", ""PATCH"", ""DELETE"")." | |
referral_url,The URL for the HTTP referer. | |
user_agent,"The User-Agent request header which includes the application type, | |
operating system, software vendor or software version of the requesting | |
software user agent." | |
response_code,"The response status code, for example | |
200, 302, 404, or 500." | |
parsed_user_agent,The parsed user_agent string. | |
verdict,Describes reason a finding investigation was resolved. | |
reputation,Describes whether a finding was useful or not-useful. | |
severity_score,Severity score for a finding set by an analyst. | |
status,Describes the workflow status of a finding. | |
comments,Comment added by the Analyst. | |
priority,Priority of the Alert or Finding set by analyst. | |
root_cause,Root cause of the Alert or Finding set by analyst. | |
reason,Reason for closing the Case or Alert. | |
risk_score,Risk score for a finding set by an analyst. | |
key,The key. | |
value,The value. | |
rbac_enabled,Indicates whether this label can be used for Data RBAC | |
city,The city. | |
state,The state. | |
country_or_region,The country or region. | |
name,"Custom location name (e.g. building or site name like ""London Office""). | |
For cloud environments, this is the region (e.g. ""us-west2"")." | |
desk_name,"Desk name or individual location, typically for an employee in an | |
office. | |
(e.g. ""IN-BLR-BCPC-11-1121D"")." | |
floor_name,"Floor name, number or a combination of the two for a building. | |
(e.g. ""1-A"")." | |
region_latitude,Deprecated: use region_coordinates. | |
region_longitude,Deprecated: use region_coordinates. | |
region_coordinates,"Coordinates for the associated region. | |
See https://cloud.google.com/vision/docs/reference/rest/v1/LatLng | |
for a description of the fields." | |
js,"Number of /JS tags found in the PDF file. Should be the same as | |
javascript field in normal scenarios." | |
javascript,"Number of /JavaScript tags found in the PDF file. Should be the same as | |
the js field in normal scenarios." | |
launch_action_count,Number of /Launch tags found in the PDF file. | |
object_stream_count,Number of object streams. | |
endobj_count,Number of object definitions (endobj keyword). | |
header,PDF version. | |
acroform,Number of /AcroForm tags found in the PDF. | |
autoaction,Number of /AA tags found in the PDF. | |
embedded_file,Number of /EmbeddedFile tags found in the PDF. | |
encrypted,"Whether the document is encrypted or not. This is defined by the /Encrypt | |
tag." | |
flash,Number of /RichMedia tags found in the PDF. | |
jbig2_compression,Number of /JBIG2Decode tags found in the PDF. | |
obj_count,Number of objects definitions (obj keyword). | |
endstream_count,Number of defined stream objects (stream keyword). | |
page_count,Number of pages in the PDF. | |
stream_count,Number of defined stream objects (stream keyword). | |
openaction,Number of /OpenAction tags found in the PDF. | |
startxref,Number of startxref keywords in the PDF. | |
suspicious_colors,Number of colors expressed with more than 3 bytes (CVE-2009-3459). | |
trailer,Number of trailer keywords in the PDF. | |
xfa,Number of \XFA tags found in the PDF. | |
xref,Number of xref keywords in the PDF. | |
import_hash,Hash of PE imports. | |
name,Name of the permission (e.g. chronicle.analyst.updateRule). | |
description,Description of the permission (e.g. 'Ability to update detect rules'). | |
type,Type of the permission. | |
platform,The platform operating system. | |
platform_version,"The platform software version ( | |
e.g. ""Microsoft Windows 1803"")." | |
platform_patch_level,"The platform software patch level ( | |
e.g. ""Build 17134.48"", ""SP1"")." | |
giver,Name of the rank serial number hexdump. | |
rank,Rank position. | |
ingestion_time,Timestamp when the rank was ingested. | |
rolling_max,"The maximum number of assets per day accessing the resource over the | |
trailing day_count days." | |
day_count,The number of days over which rolling_max is calculated. | |
rolling_max_sub_domains,"The maximum number of assets per day accessing the domain along with | |
sub-domains over the trailing day_count days. This field is only valid for | |
domains." | |
day_max,The max prevalence score in a day interval window. | |
day_max_sub_domains,"The max prevalence score in a day interval window across sub-domains. This | |
field is only valid for domains." | |
pid,The process ID. | |
parent_pid,"The ID of the parent process. | |
Deprecated: use parent_process.pid instead." | |
parent_process,Information about the parent process. | |
file,Information about the file in use by the process. | |
command_line,The command line command that created the process. | |
command_line_history,The command line history of the process. | |
product_specific_process_id,A product specific process id. | |
access_mask,A bit mask representing the level of access. | |
integrity_level_rid,The Microsoft Windows integrity level relative ID (RID) of the process. | |
token_elevation_type,"The elevation type of the process on Microsoft Windows. This determines if | |
any privileges are removed when UAC is enabled." | |
product_specific_parent_process_id,"A product specific id for the parent process. | |
Please use parent_process.product_specific_process_id instead." | |
registry_key,"Registry key associated with an application or system component | |
(e.g., HKEY_, HKCU\Environment...)." | |
registry_value_name,"Name of the registry value associated with an application or system | |
component (e.g. TEMP)." | |
registry_value_data,"Data associated with a registry value | |
(e.g. %USERPROFILE%\Local Settings\Temp)." | |
type,Deprecated: use resource_type instead. | |
resource_type,Resource type. | |
resource_subtype,"Resource sub-type (e.g. ""BigQuery"", ""Bigtable"")." | |
id,Deprecated: Use resource.name or resource.product_object_id. | |
name,"The full name of the resource. For example, | |
Google Cloud: //cloudresourcemanager.googleapis.com/projects/wombat-123, | |
and AWS: arn:aws:iam::123456789012:user/johndoe." | |
parent,"The parent of the resource. | |
For a database table, the parent is the database. For a storage object, | |
the bucket name. Deprecated: use resource_ancestors.name." | |
product_object_id,"A vendor-specific identifier to uniquely identify the entity (a GUID, | |
OID, or similar)" | |
attribute,Generic entity metadata attributes of the resource. | |
name,System role name for user. | |
description,System role description for user. | |
type,System role type for well known roles. | |
cert_signature,Certificate's signature and algorithm. | |
extension,(DEPRECATED) certificate's extension. | |
cert_extensions,Certificate's extensions. | |
first_seen_time,Date the certificate was first retrieved by VirusTotal. | |
issuer,Certificate's issuer data. | |
ec,EC public key information. | |
serial_number,Certificate's serial number hexdump. | |
signature_algorithm,"Algorithm used for the signature (for example, ""sha1RSA"")." | |
size,Certificate content length. | |
subject,Certificate's subject data. | |
thumbprint,Certificate's content SHA1 hash. | |
thumbprint_sha256,Certificate's content SHA256 hash. | |
validity,Certificate's validity period. | |
version,"Certificate version (typically ""V1"", ""V2"" or ""V3"")." | |
keyid,Key hexdump. | |
serial_number,Serial number hexdump. | |
signature,Signature. | |
signature_algorithm,Algorithm. | |
p,p component hexdump. | |
q,q component hexdump. | |
g,g component hexdump. | |
pub,Public key hexdump. | |
oid,Curve name. | |
pub,Public key hexdump. | |
ca,Whether the subject acts as a certificate authority (CA) or not. | |
subject_key_id,Identifies the public key being certified. | |
authority_key_id,"Identifies the public key to be used to verify the signature on this | |
certificate or CRL." | |
key_usage,The purpose for which the certified public key is used. | |
ca_info_access,"Authority information access locations are URLs that are added to a | |
certificate in its authority information access extension." | |
crl_distribution_points,"CRL distribution points to which a certificate user should refer to | |
ascertain if the certificate has been revoked." | |
extended_key_usage,"One or more purposes for which the certified public key may be used, in | |
addition to or in place of the basic purposes indicated in the key usage | |
extension field." | |
subject_alternative_name,"Contains one or more alternative names, using any of a variety of name | |
forms, for the entity that is bound by the CA to the certified public | |
key." | |
certificate_policies,"Different certificate policies will relate to different applications | |
which may use the certified key." | |
netscape_cert_comment,Used to include free-form text comments inside certificates. | |
cert_template_name_dc,"BMP data value ""DomainController"". See MS Q291010." | |
netscape_certificate,"Identify whether the certificate subject is an SSL client, an SSL server, | |
or a CA." | |
pe_logotype,Whether the certificate includes a logotype. | |
old_authority_key_id,Whether the certificate has an old authority key identifier extension. | |
algorithm,"Any of ""RSA"", ""DSA"" or ""EC"". Indicates the algorithm used to generate the | |
certificate." | |
rsa,RSA public key information. | |
key_size,Key size. | |
modulus,Key modulus hexdump. | |
exponent,Key exponent hexdump. | |
country_name,C: Country name. | |
common_name,CN: CommonName. | |
locality,L: Locality. | |
organization,O: Organization. | |
organizational_unit,OU: OrganizationalUnit. | |
state_or_province_name,ST: StateOrProvinceName. | |
expiry_time,Expiry date. | |
issue_time,Issue date. | |
confidence_score,Confidence score of the verdict. | |
verdict_time,Timestamp at which the verdict was generated. | |
verdict_response,Details of the verdict. | |
id,Unique association id generated by mandiant. | |
country_code,Country from which the threat actor/ malware is originated. | |
type,Signifies the type of association. | |
name,Name of the threat actor/malware. | |
description,Human readable description about the association. | |
role,Role of the malware. Not applicable for threat actor. | |
source_country,Name of the country the threat originated from. | |
alias,Different aliases of the threat actor given by different sources. | |
first_reference_time,First time the threat actor was referenced or seen. | |
last_reference_time,Last time the threat actor was referenced or seen. | |
industries_affected,List of industries the threat actor affects. | |
associated_actors,"List of associated threat actors for a malware. Not applicable for threat | |
actors." | |
region_code,"Name of the country, the threat is originating from." | |
sponsor_region,Sponsor region of the threat actor. | |
targeted_regions,Targeted regions. | |
tags,Tags. | |
name,Name of the alias. | |
company,Name of the provider who gave the association's name. | |
ioc_stats_type,Describes the source of the IoCStat. | |
first_level_source,"Name of first level IoC source, for example Mandiant or a third-party." | |
second_level_source,"Name of the second-level IoC source, for example Crowdsourced Threat | |
Analysis or Knowledge Graph." | |
benign_count,Count of responses where the IoC was identified as benign. | |
quality,Level of confidence in the IoC mapping extracted from the source. | |
malicious_count,Count of responses where the IoC was identified as malicious. | |
response_count,Total number of response from the source. | |
source_count,Number of sources from which information was extracted. | |
source_provider,Source provider giving the ML verdict. | |
benign_count,Count of responses where this IoC was marked benign. | |
malicious_count,Count of responses where this IoC was marked malicious. | |
confidence_score,Confidence score of the verdict. | |
mandiant_sources,List of mandiant sources from which the verdict was generated. | |
third_party_sources,List of third-party sources from which the verdict was generated. | |
name,Name of the IoC source. | |
benign_count,Count of responses where this IoC was marked benign. | |
malicious_count,Count of responses where this IoC was marked malicious. | |
quality,Quality of the IoC mapping extracted from the source. | |
response_count,Total response count from this source. | |
source_count,Number of sources from which intelligence was extracted. | |
threat_intelligence_sources,Different threat intelligence sources from which IoC info was extracted. | |
source_count,Number of sources from which intelligence was extracted. | |
response_count,Total response count across all sources. | |
neighbour_influence,Describes the neighbour influence of the verdict. | |
verdict,ML Verdict provided by sources like Mandiant. | |
analyst_verdict,Human analyst verdict provided by sources like Mandiant. | |
source_count,Number of sources from which intelligence was extracted. | |
response_count,Total response count across all sources. | |
neighbour_influence,Describes the near neighbor influence of the verdict. | |
verdict_type,Type of verdict. | |
source_provider,Source provider giving the machine learning verdict. | |
benign_count,Count of responses where this IoC was marked as benign. | |
malicious_count,Count of responses where this IoC was marked as malicious. | |
confidence_score,Confidence score of the verdict. | |
ioc_stats,List of IoCStats from which the verdict was generated. | |
verdict_time,Timestamp when the verdict was generated. | |
verdict_response,Details about the verdict. | |
global_customer_count,Global customer count over the last 30 days | |
global_hits_count,Global hit count over the last 30 days. | |
pwn,"Whether one or more Mandiant incident response customers had this | |
indicator in their environment." | |
category_details,Tags related to the verdict. | |
pwn_first_tagged_time,The timestamp of the first time a pwn was associated to this entity. | |
sigcheck,Signature information extracted from the sigcheck tool. | |
codesign,Signature information extracted from the codesign utility. | |
name,"Common name of the signers/certificate. | |
The order of the signers matters. Each element is a higher level | |
authority, the last being the root authority." | |
status,"It can say ""Valid"" or state the problem with the certificate if any (e.g. | |
""This certificate or one of the certificates in the certificate chain is | |
not time valid."")." | |
valid_usage,"Indicates which situations the certificate is valid for (e.g. ""Code | |
Signing"")." | |
cert_issuer,Company that issued the certificate. | |
helo,The client's 'HELO'/'EHLO' string. | |
mail_from,The client's 'MAIL FROM' string. | |
rcpt_to,The client's 'RCPT TO' string(s). | |
server_response,The server's response(s) to the client. | |
message_path,The message's path (extracted from the headers). | |
is_webmail,If the message was sent via a webmail client. | |
is_tls,If the connection switched to TLS. | |
name,The name of the software. | |
version,The version of the software. | |
permissions,"System permissions granted to the software. | |
For example, ""android.permission.WRITE_EXTERNAL_STORAGE""" | |
description,The description of the software. | |
vendor_name,The name of the software vendor. | |
tenant_id,A list of subtenant ids that this event belongs to. | |
data_tap_config_name,A list of sink name values defined in DataTap configurations. | |
interval,Interval duration of the leave. | |
description,Description of the leave if available (e.g. 'Vacation'). | |
client,Certificate information for the client certificate. | |
server,Certificate information for the server certificate. | |
cipher,Cipher used during the connection. | |
curve,Elliptical curve used for a given cipher. | |
version,TLS version. | |
version_protocol,Protocol. | |
established,Indicates whether the TLS negotiation was successful. | |
next_protocol,Protocol to be used for tunnel. | |
resumed,"Indicates whether the TLS connection was resumed from a previous | |
TLS negotiation." | |
certificate,Client certificate. | |
ja3,"JA3 hash from the TLS ClientHello, as a hex-encoded string." | |
server_name,"Host name of the server, that the client is connecting to." | |
supported_ciphers,Ciphers supported by the client during client hello. | |
certificate,Server certificate. | |
ja3s,"JA3 hash from the TLS ServerHello, as a hex-encoded string." | |
tracker,Tracker name. | |
id,"Tracker ID, if available." | |
timestamp,Tracker ingestion date. | |
URL,Tracker script URL. | |
URL,URL. | |
categories,Categorisation done by VirusTotal partners. | |
favicon,Difference hash and MD5 hash of the URL's. | |
html_meta,Meta tags (only for URLs downloading HTML). | |
last_final_url,"If the original URL redirects, where does it end." | |
last_http_response_code,HTTP response code of the last response. | |
last_http_response_content_length,Length in bytes of the content received. | |
last_http_response_content_sha256,URL response body's SHA256 hash. | |
last_http_response_cookies,Website's cookies. | |
last_http_response_headers,Headers and values of the last HTTP response. | |
tags,Tags. | |
title,Webpage title. | |
trackers,Trackers found in the URL in a historical manner. | |
product_object_id,"A vendor-specific identifier to uniquely identify the entity (e.g. a GUID, | |
LDAP, OID, or similar)." | |
userid,The ID of the user. | |
user_display_name,"The display name of the user | |
(e.g. ""John Locke"")." | |
first_name,"First name of the user (e.g. ""John"")." | |
middle_name,Middle name of the user. | |
last_name,"Last name of the user (e.g. ""Locke"")." | |
phone_numbers,Phone numbers for the user. | |
personal_address,Personal address of the user. | |
attribute,Generic entity metadata attributes of the user. | |
first_seen_time,"The first observed time for a user. | |
The value is calculated on the basis of the | |
first time the identifier was observed." | |
account_type,"Type of user account (for example, service, domain, or cloud). This is | |
somewhat aligned to: https://attack.mitre.org/techniques/T1078/" | |
groupid,"The ID of the group that the user belongs to. | |
Deprecated in favor of the repeated group_identifiers field." | |
group_identifiers,"Product object identifiers of the group(s) the user belongs to | |
A vendor-specific identifier to uniquely identify the group(s) the user | |
belongs to (a GUID, LDAP OID, or similar)." | |
windows_sid,The Microsoft Windows SID of the user. | |
email_addresses,Email addresses of the user. | |
employee_id,Human capital management identifier. | |
title,User job title. | |
company_name,User job company name. | |
department,User job department | |
office_address,User job office location. | |
managers,User job manager(s). | |
hire_date,User job employment hire date. | |
termination_date,User job employment termination date. | |
time_off,User time off leaves from active work. | |
last_login_time,User last login timestamp. | |
last_password_change_time,User last password change timestamp. | |
password_expiration_time,User password expiration timestamp. | |
account_expiration_time,User account expiration timestamp. | |
account_lockout_time,User account lockout timestamp. | |
last_bad_password_attempt_time,User last bad password attempt timestamp. | |
user_authentication_status,System authentication status for user. | |
role_name,"System role name for user. | |
Deprecated: use attribute.roles." | |
role_description,"System role description for user. | |
Deprecated: use attribute.roles." | |
user_role,"System role for user. | |
Deprecated: use attribute.roles." | |
vulnerabilities,A list of vulnerabilities. | |
about,"If the vulnerability is about a specific noun (e.g. executable), | |
then add it here." | |
name,"Name of the vulnerability (e.g. ""Unsupported OS Version detected"")." | |
description,Description of the vulnerability. | |
vendor,Vendor of scan that discovered vulnerability. | |
scan_start_time,"If the vulnerability was discovered during an asset scan, then this | |
field should be populated with the time the scan started. | |
This field can be left unset if the start time is not available or not | |
applicable." | |
scan_end_time,"If the vulnerability was discovered during an asset scan, then this field | |
should be populated with the time the scan ended. | |
This field can be left unset if the end time is not available or not | |
applicable." | |
first_found,"Products that maintain a history of vuln scans should populate first_found | |
with the time that a scan first detected the vulnerability on this asset." | |
last_found,"Products that maintain a history of vuln scans should populate last_found | |
with the time that a scan last detected the vulnerability on this asset." | |
severity,The severity of the vulnerability. | |
severity_details,Vendor-specific severity | |
cvss_base_score,"CVSS Base Score in the range of 0.0 to 10.0. | |
Useful for sorting." | |
cvss_vector,"Vector of CVSS properties (e.g. ""AV:L/AC:H/Au:N/C:N/I:P/A:C"") | |
Can be linked to via: | |
https://nvd.nist.gov/vuln-metrics/cvss/v2-calculator" | |
cvss_version,Version of CVSS Vector/Score. | |
cve_id,"Common Vulnerabilities and Exposures Id. | |
https://en.wikipedia.org/wiki/Common_Vulnerabilities_and_Exposures | |
https://cve.mitre.org/about/faqs.html#what_is_cve_id" | |
cve_description,"Common Vulnerabilities and Exposures Description. | |
https://cve.mitre.org/about/faqs.html#what_is_cve_record" | |
vendor_vulnerability_id,Vendor specific vulnerability id (e.g. Microsoft security bulletin id). | |
vendor_knowledge_base_article_id,"Vendor specific knowledge base article (e.g. ""KBXXXXXX"" from Microsoft). | |
https://en.wikipedia.org/wiki/Microsoft_Knowledge_Base | |
https://access.redhat.com/knowledgebase" | |
name,Certificate name. | |
algorithm,Certificate algorithm. | |
thumbprint,Certificate thumbprint. | |
cert_issuer,Issuer of the certificate. | |
serial_number,Certificate serial number. | |