Spaces:
Paused
Paused
Upload udm_field_list_v2.csv
Browse files- udm_field_list_v2.csv +989 -0
udm_field_list_v2.csv
ADDED
@@ -0,0 +1,989 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
1 |
+
UDM_Field,Description
|
2 |
+
metadata,"Entity metadata such as timestamp, product, etc."
|
3 |
+
entity,Noun in the UDM event that this entity represents.
|
4 |
+
relations,"One or more relationships between the entity (a) and other entities, including the relationship type and related entity."
|
5 |
+
additional,"Important entity data that cannot be adequately represented within
|
6 |
+
the formal sections of the Entity."
|
7 |
+
risk_score,Stores information related to the entity's risk score.
|
8 |
+
metric,"Stores statistical metrics about the entity. Used if metadata.entity_type
|
9 |
+
is METRIC."
|
10 |
+
product_entity_id,"A vendor-specific identifier that uniquely identifies the entity
|
11 |
+
(e.g. a GUID, LDAP, OID, or similar)."
|
12 |
+
collected_timestamp,"GMT timestamp when the entity information was collected by the vendor's
|
13 |
+
local collection infrastructure."
|
14 |
+
creation_timestamp,"GMT timestamp when the entity described by the product_entity_id was
|
15 |
+
created on the system where data was collected."
|
16 |
+
interval,"Valid existence time range for the version of the entity represented by
|
17 |
+
this entity data."
|
18 |
+
vendor_name,Vendor name of the product that produced the entity information.
|
19 |
+
product_name,Product name that produced the entity information.
|
20 |
+
feed,Vendor feed name for a threat indicator feed.
|
21 |
+
product_version,Version of the product that produced the entity information.
|
22 |
+
entity_type,"Entity type.
|
23 |
+
If an entity has multiple possible types, this specifies the most specific
|
24 |
+
type."
|
25 |
+
description,Human-readable description of the entity.
|
26 |
+
threat,"Metadata provided by a threat intelligence feed that identified the
|
27 |
+
entity as malicious."
|
28 |
+
source_type,The source of the entity.
|
29 |
+
source_labels,Entity source metadata labels.
|
30 |
+
event_metadata,Metadata field from the event.
|
31 |
+
risk_version,Version of the risk score calculation algorithm.
|
32 |
+
risk_window,"Time window used when computing the risk score for an entity, for
|
33 |
+
example 24 hours or 7 days."
|
34 |
+
DEPRECATED_risk_score,Deprecated risk score.
|
35 |
+
risk_delta,"Represents the change in risk score for an entity between the end of the
|
36 |
+
previous time window and the end of the current time window."
|
37 |
+
detections_count,Number of detections that make up the risk score within the time window.
|
38 |
+
first_detection_time,"Timestamp of the first detection within the specified time window.
|
39 |
+
This field is empty when there are no detections."
|
40 |
+
last_detection_time,"Timestamp of the last detection within the specified time window.
|
41 |
+
This field is empty when there are no detections."
|
42 |
+
risk_score,Raw risk score for the entity.
|
43 |
+
normalized_risk_score,Normalized risk score for the entity. This value is between 0-1000.
|
44 |
+
risk_window_size,Risk window duration for the Entity.
|
45 |
+
raw_risk_delta,"Represents the change in raw risk score for an entity between the end of
|
46 |
+
the previous time window and the end of the current time window."
|
47 |
+
first_seen,Timestamp of the first time the entity was seen in the environment.
|
48 |
+
last_seen,Timestamp of the last time the entity was seen in the environment.
|
49 |
+
sum_measure,Sum of all precomputed measures for the given metric.
|
50 |
+
total_events,Total number of events used to calculate the given precomputed metric.
|
51 |
+
metric_name,Name of the analytic.
|
52 |
+
dimensions,All group by clauses used to calculate the metric.
|
53 |
+
export_window,Export window for which the metric was exported.
|
54 |
+
value,Value of the aggregated measure.
|
55 |
+
aggregate_function,Function used to calculate the aggregated measure.
|
56 |
+
entity,Entity (b) that the primary entity (a) is related to.
|
57 |
+
entity_type,Type of the related entity (b) in this relationship.
|
58 |
+
relationship,Type of relationship.
|
59 |
+
direction,"Directionality of relationship between primary entity (a) and the
|
60 |
+
related entity (b)."
|
61 |
+
uid,UID of the relationship.
|
62 |
+
entity_label,Label to identify the Noun of the relation.
|
63 |
+
previous_range_end_time,End time of the previous time window.
|
64 |
+
risk_score_delta,Difference in the normalized risk score from the previous recorded value.
|
65 |
+
previous_risk_score,Risk score from previous risk window
|
66 |
+
risk_score_numeric_delta,Numeric change between current and previous risk score
|
67 |
+
metadata,"Event metadata such as timestamp, source product, etc."
|
68 |
+
additional,"Any important vendor-specific event data that cannot be adequately
|
69 |
+
represented within the formal sections of the UDM model."
|
70 |
+
principal,"Represents the acting entity that originates the activity
|
71 |
+
described in the event. The principal must include at least one machine
|
72 |
+
detail (hostname, MACs, IPs, port, product-specific identifiers like an
|
73 |
+
EDR asset ID) or user detail (for example, username), and optionally
|
74 |
+
include process details. It must NOT include any of the following fields:
|
75 |
+
email, files, registry keys, or values."
|
76 |
+
src,"Represents a source entity being acted upon by the participant along with
|
77 |
+
the device or process context for the source object (the machine where the
|
78 |
+
|
79 |
+
source object resides). For example, if user U copies file A on machine X
|
80 |
+
to file B on machine Y, both file A and machine X would be specified in the
|
81 |
+
|
82 |
+
src portion of the UDM event."
|
83 |
+
target,"Represents a target entity being referenced by the event or an object on
|
84 |
+
the target entity. For example, in a firewall connection from device A to
|
85 |
+
device B, A is described as the principal and B is described as the target.
|
86 |
+
For a process injection by process C into target process D, process C is
|
87 |
+
described as the principal and process D is described as the target."
|
88 |
+
intermediary,"Represents details on one or more intermediate entities processing activity
|
89 |
+
described in the event. This includes device details about a proxy server
|
90 |
+
or SMTP relay server. If an active event (that has a principal and
|
91 |
+
possibly target) passes through any intermediaries, they're added here.
|
92 |
+
Intermediaries can impact the overall action, for example blocking or
|
93 |
+
modifying an ongoing request. A rule of thumb here is that 'principal',
|
94 |
+
'target', and description of the initial action should be the same
|
95 |
+
regardless of the intermediary or its action. A successful network
|
96 |
+
connection from A->B should look the same in principal/target/intermediary
|
97 |
+
as one blocked by firewall C: principal: A, target: B (intermediary: C)."
|
98 |
+
observer,"Represents an observer entity (for example, a packet sniffer or
|
99 |
+
network-based vulnerability scanner), which is not a direct intermediary,
|
100 |
+
but which observes and reports on the event in question."
|
101 |
+
about,"Represents entities referenced by the event that are not otherwise
|
102 |
+
described in principal, src, target, intermediary or observer. For example,
|
103 |
+
it could be used to track email file attachments, domains/URLs/IPs embedded
|
104 |
+
within an email body, and DLLs that are loaded during a PROCESS_LAUNCH
|
105 |
+
event."
|
106 |
+
security_result,A list of security results.
|
107 |
+
network,"All network details go here, including sub-messages with details on each
|
108 |
+
protocol (for example, DHCP, DNS, or HTTP)."
|
109 |
+
extensions,"All other first-class, event-specific metadata goes in this message.
|
110 |
+
Don't place protocol metadata in Extensions; put it in Network."
|
111 |
+
auth,An authentication extension.
|
112 |
+
vulns,A vulnerability extension.
|
113 |
+
id,ID of the UDM event. Can be used for raw and normalized event retrieval.
|
114 |
+
product_log_id,"A vendor-specific event identifier to uniquely identify the event (for example: a
|
115 |
+
GUID)."
|
116 |
+
event_timestamp,The GMT timestamp when the event was generated.
|
117 |
+
collected_timestamp,"The GMT timestamp when the event was collected by the vendor's local
|
118 |
+
collection infrastructure."
|
119 |
+
ingested_timestamp,The GMT timestamp when the event was ingested (received) by Google Security Operations.
|
120 |
+
event_type,"The event type.
|
121 |
+
If an event has multiple possible types, this specifies the most specific
|
122 |
+
type."
|
123 |
+
vendor_name,The name of the product vendor.
|
124 |
+
product_name,The name of the product.
|
125 |
+
product_version,The version of the product.
|
126 |
+
product_event_type,"A short, descriptive, human-readable, product-specific event name or type
|
127 |
+
(for example: ""Scanned X"", ""User account created"", ""process_start"")."
|
128 |
+
product_deployment_id,The deployment identifier assigned by the vendor for a product deployment.
|
129 |
+
description,A human-readable unparsable description of the event.
|
130 |
+
url_back_to_product,A URL that takes the user to the source product console for this event.
|
131 |
+
ingestion_labels,User-configured ingestion metadata labels.
|
132 |
+
tags,"Tags added by Google Security Operations after an event is parsed. It is an error to
|
133 |
+
populate this field from within a parser."
|
134 |
+
enrichment_state,The enrichment state.
|
135 |
+
log_type,The string value of log type.
|
136 |
+
base_labels,Data access labels on the base event.
|
137 |
+
enrichment_labels,"Data access labels from all the contextual events used to enrich the base
|
138 |
+
event."
|
139 |
+
sent_bytes,The number of bytes sent.
|
140 |
+
received_bytes,The number of bytes received.
|
141 |
+
sent_packets,The number of packets sent.
|
142 |
+
received_packets,The number of packets received.
|
143 |
+
session_duration,"The duration of the session as the number of seconds and nanoseconds.
|
144 |
+
For seconds, network.session_duration.seconds, the type is a 64-bit
|
145 |
+
integer. For nanoseconds, network.session_duration.nanos, the type is a
|
146 |
+
32-bit integer."
|
147 |
+
session_id,The ID of the network session.
|
148 |
+
parent_session_id,The ID of the parent network session.
|
149 |
+
application_protocol_version,"The version of the application protocol. e.g. ""1.1, 2.0"""
|
150 |
+
community_id,Community ID network flow value.
|
151 |
+
direction,The direction of network traffic.
|
152 |
+
ip_protocol,The IP protocol.
|
153 |
+
application_protocol,The application protocol.
|
154 |
+
ftp,FTP info.
|
155 |
+
email,Email info for the sender/recipient.
|
156 |
+
dns,DNS info.
|
157 |
+
dhcp,DHCP info.
|
158 |
+
http,HTTP info.
|
159 |
+
tls,TLS info.
|
160 |
+
smtp,"SMTP info.
|
161 |
+
Store fields specific to SMTP not covered by Email."
|
162 |
+
asn,Autonomous system number.
|
163 |
+
dns_domain,DNS domain name.
|
164 |
+
carrier_name,Carrier identification.
|
165 |
+
organization_name,Organization name (e.g Google).
|
166 |
+
ip_subnet_range,Associated human-readable IP subnet range (e.g. 10.1.2.0/24).
|
167 |
+
hostname,"Client hostname or domain name field.
|
168 |
+
Hostname also doubles as the domain for remote entities."
|
169 |
+
domain,Information about the domain.
|
170 |
+
artifact,Information about an artifact.
|
171 |
+
url_metadata,Information about the URL.
|
172 |
+
asset_id,The asset ID.
|
173 |
+
user,Information about the user.
|
174 |
+
user_management_chain,"Information about the user's management chain (reporting hierarchy).
|
175 |
+
Note: user_management_chain is only populated when data is exported to
|
176 |
+
BigQuery since recursive fields (e.g. user.managers) are not supported by
|
177 |
+
BigQuery."
|
178 |
+
group,Information about the group.
|
179 |
+
process,Information about the process.
|
180 |
+
process_ancestors,"Information about the process's ancestors ordered from immediate ancestor
|
181 |
+
(parent process) to root.
|
182 |
+
Note: process_ancestors is only populated when data is exported to BigQuery
|
183 |
+
|
184 |
+
since recursive fields (e.g. process.parent_process) are not supported by
|
185 |
+
BigQuery."
|
186 |
+
asset,Information about the asset.
|
187 |
+
ip,A list of IP addresses associated with a network connection.
|
188 |
+
nat_ip,A list of NAT translated IP addresses associated with a network connection.
|
189 |
+
port,"Source or destination network port number when a specific network
|
190 |
+
connection is described within an event."
|
191 |
+
nat_port,"NAT external network port number when a specific network connection is
|
192 |
+
described within an event."
|
193 |
+
mac,List of MAC addresses associated with a device.
|
194 |
+
administrative_domain,"Domain which the device belongs to (for example, the Microsoft Windows
|
195 |
+
domain)."
|
196 |
+
namespace,"Namespace which the device belongs to, such as ""AD forest"".
|
197 |
+
Uses for this field include Microsoft Windows AD forest, the name of
|
198 |
+
|
199 |
+
subsidiary, or the name of acquisition."
|
200 |
+
URL,The URL.
|
201 |
+
file,Information about the file.
|
202 |
+
email,"Email address.
|
203 |
+
Only filled in for security_result.about"
|
204 |
+
registry,Registry information.
|
205 |
+
application,"The name of an application or service.
|
206 |
+
Some SSO solutions only capture the name of a target application
|
207 |
+
such as ""Atlassian"" or ""Google""."
|
208 |
+
platform,Platform.
|
209 |
+
platform_version,"Platform version. For example,
|
210 |
+
""Microsoft Windows 1803""."
|
211 |
+
platform_patch_level,"Platform patch level.
|
212 |
+
For example, ""Build 17134.48"""
|
213 |
+
cloud,"Cloud metadata.
|
214 |
+
Deprecated: cloud should be populated in entity Attribute as generic
|
215 |
+
metadata (e.g. asset.attribute.cloud)."
|
216 |
+
location,"Physical location. For cloud environments, set the region in
|
217 |
+
location.name."
|
218 |
+
ip_location,Deprecated: use ip_geo_artifact.location instead.
|
219 |
+
ip_geo_artifact,"Enriched geographic information corresponding to an IP address.
|
220 |
+
Specifically, location and network data."
|
221 |
+
resource,"Information about the resource (e.g. scheduled task, calendar entry).
|
222 |
+
This field should not be used for files, registry, or processes because
|
223 |
+
these objects are already part of Noun."
|
224 |
+
resource_ancestors,"Information about the resource's ancestors ordered from immediate ancestor
|
225 |
+
(starting with parent resource)."
|
226 |
+
labels,"Labels are key-value pairs.
|
227 |
+
For example: key = ""env"", value = ""prod"".
|
228 |
+
Deprecated: labels should be populated in entity Attribute as generic
|
229 |
+
metadata (e.g. user.attribute.labels)."
|
230 |
+
object_reference,Finding to which the Analyst updated the feedback.
|
231 |
+
investigation,Analyst feedback/investigation for alerts.
|
232 |
+
network,"Network details, including sub-messages with details on each protocol
|
233 |
+
(for example, DHCP, DNS, or HTTP)."
|
234 |
+
security_result,A list of security results.
|
235 |
+
about,"If the security result is about a specific entity (Noun), add it here."
|
236 |
+
category,The security category.
|
237 |
+
category_details,"For vendor-specific categories. For web categorization, put type in here
|
238 |
+
|
239 |
+
such as ""gambling"" or ""porn""."
|
240 |
+
threat_name,"A vendor-assigned classification common across multiple customers
|
241 |
+
(e.g. ""W32/File-A"", ""Slammer"")."
|
242 |
+
rule_set,"The result's rule set identifier.
|
243 |
+
(e.g. ""windows-threats"")"
|
244 |
+
rule_set_display_name,The curated detections rule set display name.
|
245 |
+
ruleset_category_display_name,"The curated detection rule set category display name.
|
246 |
+
(for example, if rule_set_display_name is ""CDIR SCC Enhanced Exfiltration"",
|
247 |
+
the rule_set_category is ""Cloud Threats"")."
|
248 |
+
rule_id,"A vendor-specific ID and name for a rule, varying by observerer type
|
249 |
+
(e.g. ""08123"", ""5d2b44d0-5ef6-40f5-a704-47d61d3babbe"")."
|
250 |
+
rule_name,"Name of the security rule
|
251 |
+
(e.g. ""BlockInboundToOracle"")."
|
252 |
+
rule_version,"Version of the security rule.
|
253 |
+
(e.g. ""v1.1"", ""00001"", ""1604709794"", ""2020-11-16T23:04:19+00:00"").
|
254 |
+
Note that rule versions are source-dependant and lexical ordering
|
255 |
+
|
256 |
+
should not be assumed."
|
257 |
+
rule_type,The type of security rule.
|
258 |
+
rule_author,Author of the security rule.
|
259 |
+
rule_labels,"A list of rule labels that can't be captured by the other fields
|
260 |
+
in security result
|
261 |
+
(e.g. ""reference : AnotherRule"", ""contributor : John"")."
|
262 |
+
alert_state,The alerting types of this security result.
|
263 |
+
detection_fields,"An ordered list of values, that represent fields in detections for a
|
264 |
+
|
265 |
+
security finding. This list represents mapping of names of requested
|
266 |
+
entities to their values (i.e. the security result matched variables) ."
|
267 |
+
outcomes,"A list of outcomes that represent the results of this security finding.
|
268 |
+
This list represents a mapping of names of the requested outcomes,
|
269 |
+
to their values."
|
270 |
+
summary,"A human readable summary (e.g. ""failed login occurred"")"
|
271 |
+
description,"A human readable description (e.g. ""user password was wrong"")"
|
272 |
+
action,Actions taken for this event.
|
273 |
+
action_details,The detail of the action taken as provided by the vendor.
|
274 |
+
severity,The severity of the result.
|
275 |
+
confidence,The confidence level of the result as estimated by the product.
|
276 |
+
priority,The priority of the result.
|
277 |
+
risk_score,The risk score of the security result.
|
278 |
+
confidence_score,The confidence score of the security result.
|
279 |
+
analytics_metadata,Stores metadata about each risk analytic metric the rule uses.
|
280 |
+
severity_details,Vendor-specific severity.
|
281 |
+
confidence_details,"Additional detail with regards to the confidence of a security event as
|
282 |
+
estimated by the product vendor."
|
283 |
+
priority_details,Vendor-specific information about the security result priority.
|
284 |
+
url_back_to_product,URL that takes the user to the source product console for this event.
|
285 |
+
threat_id,Vendor-specific ID for a threat.
|
286 |
+
threat_feed_name,Vendor feed name for a threat indicator feed.
|
287 |
+
threat_id_namespace,"The attribute threat_id_namespace qualifies threat_id with an ID namespace
|
288 |
+
to get an
|
289 |
+
unique ID. The attribute threat_id by itself is not unique across Google SecOps
|
290 |
+
as it is a vendor specific ID."
|
291 |
+
threat_status,Current status of the threat
|
292 |
+
attack_details,MITRE ATT&CK details.
|
293 |
+
first_discovered_time,First time the IoC threat was discovered in the provider.
|
294 |
+
associations,Associations related to the threat.
|
295 |
+
campaigns,Campaigns using this IOC threat.
|
296 |
+
verdict,"Verdict about the IoC from the provider.
|
297 |
+
This field is now deprecated. Use VerdictInfo instead."
|
298 |
+
last_updated_time,Last time the IoC threat was updated in the provider.
|
299 |
+
verdict_info,Verdict information about the IoC from the provider.
|
300 |
+
threat_verdict,GCTI threat verdict on the security result entity.
|
301 |
+
last_discovered_time,Last time the IoC was seen in the provider data.
|
302 |
+
analytic,Name of the analytic.
|
303 |
+
ip,IP address of the artifact.
|
304 |
+
prevalence,The prevalence of the artifact within the customer's environment.
|
305 |
+
first_seen_time,First seen timestamp of the IP in the customer's environment.
|
306 |
+
last_seen_time,Last seen timestamp of the IP address in the customer's environment.
|
307 |
+
location,Location of the Artifact's IP address.
|
308 |
+
network,Network information related to the Artifact's IP address.
|
309 |
+
as_owner,Owner of the Autonomous System to which the IP address belongs.
|
310 |
+
asn,Autonomous System Number to which the IP address belongs.
|
311 |
+
jarm,"The JARM hash for the IP address.
|
312 |
+
(https://engineering.salesforce.com/easily-identify-malicious-servers-on-the-internet-with-jarm-e095edac525a)."
|
313 |
+
last_https_certificate,SSL certificate information about the IP address.
|
314 |
+
last_https_certificate_date,Most recent date for the certificate in VirusTotal.
|
315 |
+
regional_internet_registry,"RIR (one of the current RIRs: AFRINIC, ARIN, APNIC, LACNIC or RIPE NCC)."
|
316 |
+
tags,Identification attributes
|
317 |
+
whois,WHOIS information as returned from the pertinent WHOIS server.
|
318 |
+
whois_date,Date of the last update of the WHOIS record in VirusTotal.
|
319 |
+
product_object_id,"A vendor-specific identifier to uniquely identify the entity (a GUID or
|
320 |
+
|
321 |
+
similar)."
|
322 |
+
hostname,Asset hostname or domain name field.
|
323 |
+
asset_id,"The asset ID. Value must contain the ':' character. For example,
|
324 |
+
cs:abcdd23434."
|
325 |
+
ip,A list of IP addresses associated with an asset.
|
326 |
+
mac,List of MAC addresses associated with an asset.
|
327 |
+
nat_ip,List of NAT IP addresses associated with an asset.
|
328 |
+
first_seen_time,"The first observed time for an asset.
|
329 |
+
The value is calculated on the basis of the
|
330 |
+
first time the identifier was observed."
|
331 |
+
hardware,The asset hardware specifications.
|
332 |
+
platform_software,The asset operating system platform software.
|
333 |
+
software,The asset software details.
|
334 |
+
location,Location of the asset.
|
335 |
+
category,"The category of the asset (e.g. ""End User Asset"", ""Workstation"", ""Server"")."
|
336 |
+
type,The type of the asset (e.g. workstation or laptop or server).
|
337 |
+
network_domain,"The network domain of the asset (e.g. ""corp.acme.com"")"
|
338 |
+
creation_time,"Time the asset was created or provisioned.
|
339 |
+
Deprecate: creation_time should be populated in Attribute as generic
|
340 |
+
metadata."
|
341 |
+
first_discover_time,"Time the asset was first discovered (by asset management/discoverability
|
342 |
+
|
343 |
+
software)."
|
344 |
+
last_discover_time,"Time the asset was last discovered (by asset management/discoverability
|
345 |
+
|
346 |
+
software)."
|
347 |
+
system_last_update_time,"Time the asset system or OS was last updated.
|
348 |
+
For all other operations that are not system updates (such as resizing a
|
349 |
+
VM), use Attribute.last_update_time."
|
350 |
+
last_boot_time,Time the asset was last boot started.
|
351 |
+
labels,"Metadata labels for the asset.
|
352 |
+
Deprecated: labels should be populated in Attribute as generic metadata."
|
353 |
+
deployment_status,The deployment status of the asset for device lifecycle purposes.
|
354 |
+
vulnerabilities,Vulnerabilities discovered on asset.
|
355 |
+
attribute,Generic entity metadata attributes of the asset.
|
356 |
+
version,ATT&CK version (e.g. 12.1).
|
357 |
+
tactics,Tactics employed.
|
358 |
+
techniques,Techniques employed.
|
359 |
+
id,"Tactic ID (e.g. ""TA0043"")."
|
360 |
+
name,"Tactic Name (e.g. ""Reconnaissance"")"
|
361 |
+
id,"Technique ID (e.g. ""T1595"")."
|
362 |
+
name,"Technique Name (e.g. ""Active Scanning"")."
|
363 |
+
subtechnique_id,"Subtechnique ID (e.g. ""T1595.001"")."
|
364 |
+
subtechnique_name,"Subtechnique Name (e.g. ""Scanning IP Blocks"")."
|
365 |
+
cloud,"Cloud metadata attributes such as project ID, account ID, or organizational
|
366 |
+
hierarchy."
|
367 |
+
labels,"Set of labels for the entity. Should only be used for product labels (for
|
368 |
+
example, Google Cloud resource labels or Azure AD sensitivity labels.
|
369 |
+
Should not be used for arbitrary key-value mappings."
|
370 |
+
permissions,"System permissions for IAM entity
|
371 |
+
(human principal, service account, group)."
|
372 |
+
roles,"System IAM roles to be assumed by resources to use the role's permissions
|
373 |
+
for access control."
|
374 |
+
creation_time,Time the resource or entity was created or provisioned.
|
375 |
+
last_update_time,Time the resource or entity was last updated.
|
376 |
+
type,The type of authentication.
|
377 |
+
mechanism,The authentication mechanism.
|
378 |
+
auth_details,The vendor defined details of the authentication.
|
379 |
+
version,Certificate version.
|
380 |
+
serial,Certificate serial number.
|
381 |
+
subject,Subject of the certificate.
|
382 |
+
issuer,Issuer of the certificate.
|
383 |
+
md5,"The MD5 hash of the certificate, as a hex-encoded string."
|
384 |
+
sha1,"The SHA1 hash of the certificate, as a hex-encoded string."
|
385 |
+
sha256,"The SHA256 hash of the certificate, as a hex-encoded string."
|
386 |
+
not_before,Indicates when the certificate is first valid.
|
387 |
+
not_after,Indicates when the certificate is no longer valid.
|
388 |
+
environment,The Cloud environment.
|
389 |
+
vpc,"The cloud environment VPC.
|
390 |
+
Deprecated."
|
391 |
+
project,"The cloud environment project information.
|
392 |
+
Deprecated: Use Resource.resource_ancestors"
|
393 |
+
availability_zone,"The cloud environment availability zone (different from region which is
|
394 |
+
location.name)."
|
395 |
+
type,Type.
|
396 |
+
value,Value.
|
397 |
+
ttl,Time to live.
|
398 |
+
priority,Priority.
|
399 |
+
retry,Retry.
|
400 |
+
refresh,Refresh.
|
401 |
+
minimum,Minimum.
|
402 |
+
expire,Expire.
|
403 |
+
serial,Serial.
|
404 |
+
rname,Rname.
|
405 |
+
opcode,The BOOTP op code.
|
406 |
+
htype,Hardware address type.
|
407 |
+
hlen,Hardware address length.
|
408 |
+
hops,Hardware ops.
|
409 |
+
transaction_id,Transaction ID.
|
410 |
+
seconds,Seconds elapsed since client began address acquisition/renewal process.
|
411 |
+
flags,Flags.
|
412 |
+
ciaddr,Client IP address (ciaddr).
|
413 |
+
yiaddr,Your IP address (yiaddr).
|
414 |
+
siaddr,IP address of the next bootstrap server.
|
415 |
+
giaddr,Relay agent IP address (giaddr).
|
416 |
+
chaddr,Client hardware address (chaddr).
|
417 |
+
sname,Server name that the client wishes to boot from.
|
418 |
+
file,Boot image filename.
|
419 |
+
options,List of DHCP options.
|
420 |
+
type,DHCP message type.
|
421 |
+
lease_time_seconds,"Lease time in seconds. See RFC2132, section 9.2."
|
422 |
+
client_hostname,"Client hostname. See RFC2132, section 3.14."
|
423 |
+
client_identifier,"Client identifier. See RFC2132, section 9.14."
|
424 |
+
requested_address,"Requested IP address. See RFC2132, section 9.1."
|
425 |
+
code,Code. See RFC1533.
|
426 |
+
data,Data.
|
427 |
+
id,DNS query id.
|
428 |
+
response,Set to true if the event is a DNS response. See QR field from RFC1035.
|
429 |
+
opcode,"The DNS OpCode used to specify the type of DNS query
|
430 |
+
(for example, QUERY, IQUERY, or STATUS)."
|
431 |
+
authoritative,"Other DNS header flags. See RFC1035, section 4.1.1."
|
432 |
+
truncated,Whether the DNS response was truncated.
|
433 |
+
recursion_desired,Whether a recursive DNS lookup is desired.
|
434 |
+
recursion_available,Whether a recursive DNS lookup is available.
|
435 |
+
response_code,Response code. See RCODE from RFC1035.
|
436 |
+
questions,A list of domain protocol message questions.
|
437 |
+
answers,A list of answers to the domain name query.
|
438 |
+
authority,"A list of domain name servers which verified the answers to the domain name
|
439 |
+
queries."
|
440 |
+
additional,"A list of additional domain name servers that can be used to verify the
|
441 |
+
answer to the domain."
|
442 |
+
name,The domain name.
|
443 |
+
type,The code specifying the type of the query.
|
444 |
+
class,The code specifying the class of the query.
|
445 |
+
prevalence,The prevalence of the domain within the customer's environment.
|
446 |
+
name,The name of the owner of the resource record.
|
447 |
+
type,The code specifying the type of the resource record.
|
448 |
+
class,The code specifying the class of the resource record.
|
449 |
+
ttl,"The time interval for which the resource record can be cached before the
|
450 |
+
|
451 |
+
source of the information should again be queried."
|
452 |
+
data,"The payload or response to the DNS question for all responses encoded in
|
453 |
+
UTF-8 format"
|
454 |
+
binary_data,"The raw bytes of any non-UTF8 strings that might be included as part of a
|
455 |
+
DNS response."
|
456 |
+
name,The domain name.
|
457 |
+
prevalence,The prevalence of the domain within the customer's environment.
|
458 |
+
first_seen_time,First seen timestamp of the domain in the customer's environment.
|
459 |
+
last_seen_time,Last seen timestamp of the domain in the customer's environment.
|
460 |
+
registrar,"Registrar name . FOr example, ""Wild West Domains, Inc. (R120-LROR)"",
|
461 |
+
""GoDaddy.com, LLC"", or ""PDR LTD. D/B/A PUBLICDOMAINREGISTRY.COM""."
|
462 |
+
contact_email,Contact email address.
|
463 |
+
whois_server,Whois server name.
|
464 |
+
name_server,Repeated list of name servers.
|
465 |
+
creation_time,Domain creation time.
|
466 |
+
update_time,Last updated time.
|
467 |
+
expiration_time,Expiration time.
|
468 |
+
audit_update_time,Audit updated time.
|
469 |
+
status,"Domain status. See
|
470 |
+
https://www.icann.org/resources/pages/epp-status-codes-2014-06-16-en
|
471 |
+
for meanings of possible values"
|
472 |
+
registrant,Parsed contact information for the registrant of the domain.
|
473 |
+
admin,Parsed contact information for the administrative contact for the domain.
|
474 |
+
tech,Parsed contact information for the technical contact for the domain
|
475 |
+
billing,Parsed contact information for the billing contact of the domain.
|
476 |
+
zone,Parsed contact information for the zone.
|
477 |
+
whois_record_raw_text,WHOIS raw text.
|
478 |
+
registry_data_raw_text,Registry Data raw text.
|
479 |
+
iana_registrar_id,"IANA Registrar ID. See
|
480 |
+
https://www.iana.org/assignments/registrar-ids/registrar-ids.xhtml"
|
481 |
+
private_registration,"Indicates whether the domain appears to be using a private registration
|
482 |
+
|
483 |
+
service to mask the owner's contact information."
|
484 |
+
categories,Categories assign to the domain as retrieved from VirusTotal.
|
485 |
+
favicon,Includes difference hash and MD5 hash of the domain's favicon.
|
486 |
+
jarm,Domain's JARM hash.
|
487 |
+
last_dns_records,Domain's DNS records from the last scan.
|
488 |
+
last_dns_records_time,Date when the DNS records list was retrieved by VirusTotal.
|
489 |
+
last_https_certificate,SSL certificate object retrieved last time the domain was analyzed.
|
490 |
+
last_https_certificate_time,When the certificate was retrieved by VirusTotal.
|
491 |
+
popularity_ranks,"Domain's position in popularity ranks such as Alexa, Quantcast, Statvoo,
|
492 |
+
etc"
|
493 |
+
tags,List of representative attributes.
|
494 |
+
whois_time,Date of the last update of the WHOIS record.
|
495 |
+
from,The 'from' address.
|
496 |
+
reply_to,The 'reply to' address.
|
497 |
+
to,A list of 'to' addresses.
|
498 |
+
cc,A list of 'cc' addresses.
|
499 |
+
bcc,A list of 'bcc' addresses.
|
500 |
+
mail_id,The mail (or message) ID.
|
501 |
+
subject,The subject line(s) of the email.
|
502 |
+
bounce_address,"The envelope from address.
|
503 |
+
https://en.wikipedia.org/wiki/Bounce_address"
|
504 |
+
raw_md5,Favicon's MD5 hash.
|
505 |
+
dhash,Difference hash.
|
506 |
+
sha256,"The SHA256 hash of the file, as a hex-encoded string."
|
507 |
+
md5,"The MD5 hash of the file, as a hex-encoded string."
|
508 |
+
sha1,"The SHA1 hash of the file, as a hex-encoded string."
|
509 |
+
size,The size of the file in bytes.
|
510 |
+
full_path,The full path identifying the location of the file on the system.
|
511 |
+
mime_type,"The MIME (Multipurpose Internet Mail Extensions) type of the file,
|
512 |
+
for example ""PE"", ""PDF"", or ""powershell script""."
|
513 |
+
file_metadata,"Metadata associated with the file.
|
514 |
+
Deprecate FileMetadata in favor of using fields in File."
|
515 |
+
security_result,"Google Cloud Threat Intelligence (GCTI) security result for the file
|
516 |
+
including threat context and detection metadata."
|
517 |
+
pe_file,Metadata about the Portable Executable (PE) file.
|
518 |
+
ssdeep,Ssdeep of the file
|
519 |
+
vhash,Vhash of the file.
|
520 |
+
ahash,Deprecated. Use authentihash instead.
|
521 |
+
authentihash,Authentihash of the file.
|
522 |
+
file_type,FileType field.
|
523 |
+
capabilities_tags,Capabilities tags.
|
524 |
+
names,Names fields.
|
525 |
+
tags,Tags for the file.
|
526 |
+
last_modification_time,Timestamp when the file was last updated.
|
527 |
+
prevalence,Prevalence of the file hash in the customer's environment.
|
528 |
+
first_seen_time,Timestamp the file was first seen in the customer's environment.
|
529 |
+
last_seen_time,Timestamp the file was last seen in the customer's environment.
|
530 |
+
stat_mode,"The mode of the file. A bit string indicating the permissions and
|
531 |
+
privileges of the file."
|
532 |
+
stat_inode,The file identifier. Unique identifier of object within a file system.
|
533 |
+
stat_dev,The file system identifier to which the object belongs.
|
534 |
+
stat_nlink,Number of links to file.
|
535 |
+
stat_flags,User defined flags for file.
|
536 |
+
last_analysis_time,Timestamp the file was last analysed.
|
537 |
+
embedded_urls,Embedded URLs found in the file.
|
538 |
+
embedded_domains,Embedded domains found in the file.
|
539 |
+
embedded_ips,Embedded IP addresses found in the file.
|
540 |
+
exif_info,Exif metadata from different file formats extracted by exiftool.
|
541 |
+
signature_info,File signature information extracted from different tools.
|
542 |
+
pdf_info,Information about the PDF file structure.
|
543 |
+
first_submission_time,First submission time of the file.
|
544 |
+
last_submission_time,Last submission time of the file.
|
545 |
+
main_icon,Icon's relevant hashes.
|
546 |
+
id,Code sign identifier.
|
547 |
+
format,Code sign format.
|
548 |
+
compilation_time,Code sign timestamp
|
549 |
+
imphash,Imphash of the file.
|
550 |
+
entry_point,info.pe-entry-point.
|
551 |
+
entry_point_exiftool,info.exiftool.EntryPoint.
|
552 |
+
compilation_time,info.pe-timestamp.
|
553 |
+
compilation_exiftool_time,info.exiftool.TimeStamp.
|
554 |
+
section,FilemetadataSection fields.
|
555 |
+
imports,FilemetadataImports fields.
|
556 |
+
resource,FilemetadataPeResourceInfo fields.
|
557 |
+
resources_type_count,Deprecated: use resources_type_count_str.
|
558 |
+
resources_language_count,Deprecated: use resources_language_count_str.
|
559 |
+
resources_type_count_str,"Number of resources by resource type.
|
560 |
+
Example: RT_ICON: 10, RT_DIALOG: 5"
|
561 |
+
resources_language_count_str,"Number of resources by language.
|
562 |
+
Example: NEUTRAL: 20, ENGLISH US: 10"
|
563 |
+
signature_info,"FilemetadataSignatureInfo field.
|
564 |
+
deprecated, user File.signature_info instead."
|
565 |
+
verification_message,"Status of the certificate.
|
566 |
+
Valid values are ""Signed"", ""Unsigned"" or a description of the certificate
|
567 |
+
anomaly, if found."
|
568 |
+
verified,"True if verification_message == ""Signed"""
|
569 |
+
signer,Deprecated: use signers field.
|
570 |
+
signers,"File metadata signer information.
|
571 |
+
The order of the signers matters. Each element is a higher level
|
572 |
+
authority, being the last the root authority."
|
573 |
+
x509,List of certificates.
|
574 |
+
command,The FTP command.
|
575 |
+
product_object_id,"Product globally unique user object identifier, such as an LDAP Object
|
576 |
+
Identifier."
|
577 |
+
creation_time,"Group creation time.
|
578 |
+
Deprecated: creation_time should be populated in Attribute as generic
|
579 |
+
metadata."
|
580 |
+
group_display_name,"Group display name. e.g. ""Finance""."
|
581 |
+
attribute,Generic entity metadata attributes of the group.
|
582 |
+
email_addresses,Email addresses of the group.
|
583 |
+
windows_sid,Microsoft Windows SID of the group.
|
584 |
+
serial_number,Hardware serial number.
|
585 |
+
manufacturer,Hardware manufacturer.
|
586 |
+
model,Hardware model.
|
587 |
+
cpu_platform,"Platform of the hardware CPU (e.g. ""Intel Broadwell"")."
|
588 |
+
cpu_model,"Model description of the hardware CPU
|
589 |
+
(e.g. ""2.8 GHz Quad-Core Intel Core i5"")."
|
590 |
+
cpu_clock_speed,Clock speed of the hardware CPU in MHz.
|
591 |
+
cpu_max_clock_speed,Maximum possible clock speed of the hardware CPU in MHz.
|
592 |
+
cpu_number_cores,Number of CPU cores.
|
593 |
+
ram,Amount of the hardware ramdom access memory (RAM) in Mb.
|
594 |
+
method,"The HTTP request method
|
595 |
+
(e.g. ""GET"", ""POST"", ""PATCH"", ""DELETE"")."
|
596 |
+
referral_url,The URL for the HTTP referer.
|
597 |
+
user_agent,"The User-Agent request header which includes the application type,
|
598 |
+
operating system, software vendor or software version of the requesting
|
599 |
+
|
600 |
+
software user agent."
|
601 |
+
response_code,"The response status code, for example
|
602 |
+
200, 302, 404, or 500."
|
603 |
+
parsed_user_agent,The parsed user_agent string.
|
604 |
+
verdict,Describes reason a finding investigation was resolved.
|
605 |
+
reputation,Describes whether a finding was useful or not-useful.
|
606 |
+
severity_score,Severity score for a finding set by an analyst.
|
607 |
+
status,Describes the workflow status of a finding.
|
608 |
+
comments,Comment added by the Analyst.
|
609 |
+
priority,Priority of the Alert or Finding set by analyst.
|
610 |
+
root_cause,Root cause of the Alert or Finding set by analyst.
|
611 |
+
reason,Reason for closing the Case or Alert.
|
612 |
+
risk_score,Risk score for a finding set by an analyst.
|
613 |
+
key,The key.
|
614 |
+
value,The value.
|
615 |
+
rbac_enabled,Indicates whether this label can be used for Data RBAC
|
616 |
+
city,The city.
|
617 |
+
state,The state.
|
618 |
+
country_or_region,The country or region.
|
619 |
+
name,"Custom location name (e.g. building or site name like ""London Office"").
|
620 |
+
For cloud environments, this is the region (e.g. ""us-west2"")."
|
621 |
+
desk_name,"Desk name or individual location, typically for an employee in an
|
622 |
+
office.
|
623 |
+
(e.g. ""IN-BLR-BCPC-11-1121D"")."
|
624 |
+
floor_name,"Floor name, number or a combination of the two for a building.
|
625 |
+
(e.g. ""1-A"")."
|
626 |
+
region_latitude,Deprecated: use region_coordinates.
|
627 |
+
region_longitude,Deprecated: use region_coordinates.
|
628 |
+
region_coordinates,"Coordinates for the associated region.
|
629 |
+
See https://cloud.google.com/vision/docs/reference/rest/v1/LatLng
|
630 |
+
for a description of the fields."
|
631 |
+
js,"Number of /JS tags found in the PDF file. Should be the same as
|
632 |
+
javascript field in normal scenarios."
|
633 |
+
javascript,"Number of /JavaScript tags found in the PDF file. Should be the same as
|
634 |
+
the js field in normal scenarios."
|
635 |
+
launch_action_count,Number of /Launch tags found in the PDF file.
|
636 |
+
object_stream_count,Number of object streams.
|
637 |
+
endobj_count,Number of object definitions (endobj keyword).
|
638 |
+
header,PDF version.
|
639 |
+
acroform,Number of /AcroForm tags found in the PDF.
|
640 |
+
autoaction,Number of /AA tags found in the PDF.
|
641 |
+
embedded_file,Number of /EmbeddedFile tags found in the PDF.
|
642 |
+
encrypted,"Whether the document is encrypted or not. This is defined by the /Encrypt
|
643 |
+
tag."
|
644 |
+
flash,Number of /RichMedia tags found in the PDF.
|
645 |
+
jbig2_compression,Number of /JBIG2Decode tags found in the PDF.
|
646 |
+
obj_count,Number of objects definitions (obj keyword).
|
647 |
+
endstream_count,Number of defined stream objects (stream keyword).
|
648 |
+
page_count,Number of pages in the PDF.
|
649 |
+
stream_count,Number of defined stream objects (stream keyword).
|
650 |
+
openaction,Number of /OpenAction tags found in the PDF.
|
651 |
+
startxref,Number of startxref keywords in the PDF.
|
652 |
+
suspicious_colors,Number of colors expressed with more than 3 bytes (CVE-2009-3459).
|
653 |
+
trailer,Number of trailer keywords in the PDF.
|
654 |
+
xfa,Number of \XFA tags found in the PDF.
|
655 |
+
xref,Number of xref keywords in the PDF.
|
656 |
+
import_hash,Hash of PE imports.
|
657 |
+
name,Name of the permission (e.g. chronicle.analyst.updateRule).
|
658 |
+
description,Description of the permission (e.g. 'Ability to update detect rules').
|
659 |
+
type,Type of the permission.
|
660 |
+
platform,The platform operating system.
|
661 |
+
platform_version,"The platform software version (
|
662 |
+
e.g. ""Microsoft Windows 1803"")."
|
663 |
+
platform_patch_level,"The platform software patch level (
|
664 |
+
e.g. ""Build 17134.48"", ""SP1"")."
|
665 |
+
giver,Name of the rank serial number hexdump.
|
666 |
+
rank,Rank position.
|
667 |
+
ingestion_time,Timestamp when the rank was ingested.
|
668 |
+
rolling_max,"The maximum number of assets per day accessing the resource over the
|
669 |
+
trailing day_count days."
|
670 |
+
day_count,The number of days over which rolling_max is calculated.
|
671 |
+
rolling_max_sub_domains,"The maximum number of assets per day accessing the domain along with
|
672 |
+
|
673 |
+
sub-domains over the trailing day_count days. This field is only valid for
|
674 |
+
domains."
|
675 |
+
day_max,The max prevalence score in a day interval window.
|
676 |
+
day_max_sub_domains,"The max prevalence score in a day interval window across sub-domains. This
|
677 |
+
field is only valid for domains."
|
678 |
+
pid,The process ID.
|
679 |
+
parent_pid,"The ID of the parent process.
|
680 |
+
Deprecated: use parent_process.pid instead."
|
681 |
+
parent_process,Information about the parent process.
|
682 |
+
file,Information about the file in use by the process.
|
683 |
+
command_line,The command line command that created the process.
|
684 |
+
command_line_history,The command line history of the process.
|
685 |
+
product_specific_process_id,A product specific process id.
|
686 |
+
access_mask,A bit mask representing the level of access.
|
687 |
+
integrity_level_rid,The Microsoft Windows integrity level relative ID (RID) of the process.
|
688 |
+
token_elevation_type,"The elevation type of the process on Microsoft Windows. This determines if
|
689 |
+
any privileges are removed when UAC is enabled."
|
690 |
+
product_specific_parent_process_id,"A product specific id for the parent process.
|
691 |
+
Please use parent_process.product_specific_process_id instead."
|
692 |
+
registry_key,"Registry key associated with an application or system component
|
693 |
+
(e.g., HKEY_, HKCU\Environment...)."
|
694 |
+
registry_value_name,"Name of the registry value associated with an application or system
|
695 |
+
component (e.g. TEMP)."
|
696 |
+
registry_value_data,"Data associated with a registry value
|
697 |
+
(e.g. %USERPROFILE%\Local Settings\Temp)."
|
698 |
+
type,Deprecated: use resource_type instead.
|
699 |
+
resource_type,Resource type.
|
700 |
+
resource_subtype,"Resource sub-type (e.g. ""BigQuery"", ""Bigtable"")."
|
701 |
+
id,Deprecated: Use resource.name or resource.product_object_id.
|
702 |
+
name,"The full name of the resource. For example,
|
703 |
+
Google Cloud: //cloudresourcemanager.googleapis.com/projects/wombat-123,
|
704 |
+
and AWS: arn:aws:iam::123456789012:user/johndoe."
|
705 |
+
parent,"The parent of the resource.
|
706 |
+
For a database table, the parent is the database. For a storage object,
|
707 |
+
the bucket name. Deprecated: use resource_ancestors.name."
|
708 |
+
product_object_id,"A vendor-specific identifier to uniquely identify the entity (a GUID,
|
709 |
+
OID, or similar)"
|
710 |
+
attribute,Generic entity metadata attributes of the resource.
|
711 |
+
name,System role name for user.
|
712 |
+
description,System role description for user.
|
713 |
+
type,System role type for well known roles.
|
714 |
+
cert_signature,Certificate's signature and algorithm.
|
715 |
+
extension,(DEPRECATED) certificate's extension.
|
716 |
+
cert_extensions,Certificate's extensions.
|
717 |
+
first_seen_time,Date the certificate was first retrieved by VirusTotal.
|
718 |
+
issuer,Certificate's issuer data.
|
719 |
+
ec,EC public key information.
|
720 |
+
serial_number,Certificate's serial number hexdump.
|
721 |
+
signature_algorithm,"Algorithm used for the signature (for example, ""sha1RSA"")."
|
722 |
+
size,Certificate content length.
|
723 |
+
subject,Certificate's subject data.
|
724 |
+
thumbprint,Certificate's content SHA1 hash.
|
725 |
+
thumbprint_sha256,Certificate's content SHA256 hash.
|
726 |
+
validity,Certificate's validity period.
|
727 |
+
version,"Certificate version (typically ""V1"", ""V2"" or ""V3"")."
|
728 |
+
keyid,Key hexdump.
|
729 |
+
serial_number,Serial number hexdump.
|
730 |
+
signature,Signature.
|
731 |
+
signature_algorithm,Algorithm.
|
732 |
+
p,p component hexdump.
|
733 |
+
q,q component hexdump.
|
734 |
+
g,g component hexdump.
|
735 |
+
pub,Public key hexdump.
|
736 |
+
oid,Curve name.
|
737 |
+
pub,Public key hexdump.
|
738 |
+
ca,Whether the subject acts as a certificate authority (CA) or not.
|
739 |
+
subject_key_id,Identifies the public key being certified.
|
740 |
+
authority_key_id,"Identifies the public key to be used to verify the signature on this
|
741 |
+
certificate or CRL."
|
742 |
+
key_usage,The purpose for which the certified public key is used.
|
743 |
+
ca_info_access,"Authority information access locations are URLs that are added to a
|
744 |
+
certificate in its authority information access extension."
|
745 |
+
crl_distribution_points,"CRL distribution points to which a certificate user should refer to
|
746 |
+
ascertain if the certificate has been revoked."
|
747 |
+
extended_key_usage,"One or more purposes for which the certified public key may be used, in
|
748 |
+
addition to or in place of the basic purposes indicated in the key usage
|
749 |
+
extension field."
|
750 |
+
subject_alternative_name,"Contains one or more alternative names, using any of a variety of name
|
751 |
+
forms, for the entity that is bound by the CA to the certified public
|
752 |
+
key."
|
753 |
+
certificate_policies,"Different certificate policies will relate to different applications
|
754 |
+
which may use the certified key."
|
755 |
+
netscape_cert_comment,Used to include free-form text comments inside certificates.
|
756 |
+
cert_template_name_dc,"BMP data value ""DomainController"". See MS Q291010."
|
757 |
+
netscape_certificate,"Identify whether the certificate subject is an SSL client, an SSL server,
|
758 |
+
or a CA."
|
759 |
+
pe_logotype,Whether the certificate includes a logotype.
|
760 |
+
old_authority_key_id,Whether the certificate has an old authority key identifier extension.
|
761 |
+
algorithm,"Any of ""RSA"", ""DSA"" or ""EC"". Indicates the algorithm used to generate the
|
762 |
+
certificate."
|
763 |
+
rsa,RSA public key information.
|
764 |
+
key_size,Key size.
|
765 |
+
modulus,Key modulus hexdump.
|
766 |
+
exponent,Key exponent hexdump.
|
767 |
+
country_name,C: Country name.
|
768 |
+
common_name,CN: CommonName.
|
769 |
+
locality,L: Locality.
|
770 |
+
organization,O: Organization.
|
771 |
+
organizational_unit,OU: OrganizationalUnit.
|
772 |
+
state_or_province_name,ST: StateOrProvinceName.
|
773 |
+
expiry_time,Expiry date.
|
774 |
+
issue_time,Issue date.
|
775 |
+
confidence_score,Confidence score of the verdict.
|
776 |
+
verdict_time,Timestamp at which the verdict was generated.
|
777 |
+
verdict_response,Details of the verdict.
|
778 |
+
id,Unique association id generated by mandiant.
|
779 |
+
country_code,Country from which the threat actor/ malware is originated.
|
780 |
+
type,Signifies the type of association.
|
781 |
+
name,Name of the threat actor/malware.
|
782 |
+
description,Human readable description about the association.
|
783 |
+
role,Role of the malware. Not applicable for threat actor.
|
784 |
+
source_country,Name of the country the threat originated from.
|
785 |
+
alias,Different aliases of the threat actor given by different sources.
|
786 |
+
first_reference_time,First time the threat actor was referenced or seen.
|
787 |
+
last_reference_time,Last time the threat actor was referenced or seen.
|
788 |
+
industries_affected,List of industries the threat actor affects.
|
789 |
+
associated_actors,"List of associated threat actors for a malware. Not applicable for threat
|
790 |
+
actors."
|
791 |
+
region_code,"Name of the country, the threat is originating from."
|
792 |
+
sponsor_region,Sponsor region of the threat actor.
|
793 |
+
targeted_regions,Targeted regions.
|
794 |
+
tags,Tags.
|
795 |
+
name,Name of the alias.
|
796 |
+
company,Name of the provider who gave the association's name.
|
797 |
+
ioc_stats_type,Describes the source of the IoCStat.
|
798 |
+
first_level_source,"Name of first level IoC source, for example Mandiant or a third-party."
|
799 |
+
second_level_source,"Name of the second-level IoC source, for example Crowdsourced Threat
|
800 |
+
Analysis or Knowledge Graph."
|
801 |
+
benign_count,Count of responses where the IoC was identified as benign.
|
802 |
+
quality,Level of confidence in the IoC mapping extracted from the source.
|
803 |
+
malicious_count,Count of responses where the IoC was identified as malicious.
|
804 |
+
response_count,Total number of response from the source.
|
805 |
+
source_count,Number of sources from which information was extracted.
|
806 |
+
source_provider,Source provider giving the ML verdict.
|
807 |
+
benign_count,Count of responses where this IoC was marked benign.
|
808 |
+
malicious_count,Count of responses where this IoC was marked malicious.
|
809 |
+
confidence_score,Confidence score of the verdict.
|
810 |
+
mandiant_sources,List of mandiant sources from which the verdict was generated.
|
811 |
+
third_party_sources,List of third-party sources from which the verdict was generated.
|
812 |
+
name,Name of the IoC source.
|
813 |
+
benign_count,Count of responses where this IoC was marked benign.
|
814 |
+
malicious_count,Count of responses where this IoC was marked malicious.
|
815 |
+
quality,Quality of the IoC mapping extracted from the source.
|
816 |
+
response_count,Total response count from this source.
|
817 |
+
source_count,Number of sources from which intelligence was extracted.
|
818 |
+
threat_intelligence_sources,Different threat intelligence sources from which IoC info was extracted.
|
819 |
+
source_count,Number of sources from which intelligence was extracted.
|
820 |
+
response_count,Total response count across all sources.
|
821 |
+
neighbour_influence,Describes the neighbour influence of the verdict.
|
822 |
+
verdict,ML Verdict provided by sources like Mandiant.
|
823 |
+
analyst_verdict,Human analyst verdict provided by sources like Mandiant.
|
824 |
+
source_count,Number of sources from which intelligence was extracted.
|
825 |
+
response_count,Total response count across all sources.
|
826 |
+
neighbour_influence,Describes the near neighbor influence of the verdict.
|
827 |
+
verdict_type,Type of verdict.
|
828 |
+
source_provider,Source provider giving the machine learning verdict.
|
829 |
+
benign_count,Count of responses where this IoC was marked as benign.
|
830 |
+
malicious_count,Count of responses where this IoC was marked as malicious.
|
831 |
+
confidence_score,Confidence score of the verdict.
|
832 |
+
ioc_stats,List of IoCStats from which the verdict was generated.
|
833 |
+
verdict_time,Timestamp when the verdict was generated.
|
834 |
+
verdict_response,Details about the verdict.
|
835 |
+
global_customer_count,Global customer count over the last 30 days
|
836 |
+
global_hits_count,Global hit count over the last 30 days.
|
837 |
+
pwn,"Whether one or more Mandiant incident response customers had this
|
838 |
+
indicator in their environment."
|
839 |
+
category_details,Tags related to the verdict.
|
840 |
+
pwn_first_tagged_time,The timestamp of the first time a pwn was associated to this entity.
|
841 |
+
sigcheck,Signature information extracted from the sigcheck tool.
|
842 |
+
codesign,Signature information extracted from the codesign utility.
|
843 |
+
name,"Common name of the signers/certificate.
|
844 |
+
The order of the signers matters. Each element is a higher level
|
845 |
+
authority, the last being the root authority."
|
846 |
+
status,"It can say ""Valid"" or state the problem with the certificate if any (e.g.
|
847 |
+
""This certificate or one of the certificates in the certificate chain is
|
848 |
+
not time valid."")."
|
849 |
+
valid_usage,"Indicates which situations the certificate is valid for (e.g. ""Code
|
850 |
+
Signing"")."
|
851 |
+
cert_issuer,Company that issued the certificate.
|
852 |
+
helo,The client's 'HELO'/'EHLO' string.
|
853 |
+
mail_from,The client's 'MAIL FROM' string.
|
854 |
+
rcpt_to,The client's 'RCPT TO' string(s).
|
855 |
+
server_response,The server's response(s) to the client.
|
856 |
+
message_path,The message's path (extracted from the headers).
|
857 |
+
is_webmail,If the message was sent via a webmail client.
|
858 |
+
is_tls,If the connection switched to TLS.
|
859 |
+
name,The name of the software.
|
860 |
+
version,The version of the software.
|
861 |
+
permissions,"System permissions granted to the software.
|
862 |
+
For example, ""android.permission.WRITE_EXTERNAL_STORAGE"""
|
863 |
+
description,The description of the software.
|
864 |
+
vendor_name,The name of the software vendor.
|
865 |
+
tenant_id,A list of subtenant ids that this event belongs to.
|
866 |
+
data_tap_config_name,A list of sink name values defined in DataTap configurations.
|
867 |
+
interval,Interval duration of the leave.
|
868 |
+
description,Description of the leave if available (e.g. 'Vacation').
|
869 |
+
client,Certificate information for the client certificate.
|
870 |
+
server,Certificate information for the server certificate.
|
871 |
+
cipher,Cipher used during the connection.
|
872 |
+
curve,Elliptical curve used for a given cipher.
|
873 |
+
version,TLS version.
|
874 |
+
version_protocol,Protocol.
|
875 |
+
established,Indicates whether the TLS negotiation was successful.
|
876 |
+
next_protocol,Protocol to be used for tunnel.
|
877 |
+
resumed,"Indicates whether the TLS connection was resumed from a previous
|
878 |
+
TLS negotiation."
|
879 |
+
certificate,Client certificate.
|
880 |
+
ja3,"JA3 hash from the TLS ClientHello, as a hex-encoded string."
|
881 |
+
server_name,"Host name of the server, that the client is connecting to."
|
882 |
+
supported_ciphers,Ciphers supported by the client during client hello.
|
883 |
+
certificate,Server certificate.
|
884 |
+
ja3s,"JA3 hash from the TLS ServerHello, as a hex-encoded string."
|
885 |
+
tracker,Tracker name.
|
886 |
+
id,"Tracker ID, if available."
|
887 |
+
timestamp,Tracker ingestion date.
|
888 |
+
URL,Tracker script URL.
|
889 |
+
URL,URL.
|
890 |
+
categories,Categorisation done by VirusTotal partners.
|
891 |
+
favicon,Difference hash and MD5 hash of the URL's.
|
892 |
+
html_meta,Meta tags (only for URLs downloading HTML).
|
893 |
+
last_final_url,"If the original URL redirects, where does it end."
|
894 |
+
last_http_response_code,HTTP response code of the last response.
|
895 |
+
last_http_response_content_length,Length in bytes of the content received.
|
896 |
+
last_http_response_content_sha256,URL response body's SHA256 hash.
|
897 |
+
last_http_response_cookies,Website's cookies.
|
898 |
+
last_http_response_headers,Headers and values of the last HTTP response.
|
899 |
+
tags,Tags.
|
900 |
+
title,Webpage title.
|
901 |
+
trackers,Trackers found in the URL in a historical manner.
|
902 |
+
product_object_id,"A vendor-specific identifier to uniquely identify the entity (e.g. a GUID,
|
903 |
+
LDAP, OID, or similar)."
|
904 |
+
userid,The ID of the user.
|
905 |
+
user_display_name,"The display name of the user
|
906 |
+
(e.g. ""John Locke"")."
|
907 |
+
first_name,"First name of the user (e.g. ""John"")."
|
908 |
+
middle_name,Middle name of the user.
|
909 |
+
last_name,"Last name of the user (e.g. ""Locke"")."
|
910 |
+
phone_numbers,Phone numbers for the user.
|
911 |
+
personal_address,Personal address of the user.
|
912 |
+
attribute,Generic entity metadata attributes of the user.
|
913 |
+
first_seen_time,"The first observed time for a user.
|
914 |
+
The value is calculated on the basis of the
|
915 |
+
first time the identifier was observed."
|
916 |
+
account_type,"Type of user account (for example, service, domain, or cloud). This is
|
917 |
+
|
918 |
+
somewhat aligned to: https://attack.mitre.org/techniques/T1078/"
|
919 |
+
groupid,"The ID of the group that the user belongs to.
|
920 |
+
Deprecated in favor of the repeated group_identifiers field."
|
921 |
+
group_identifiers,"Product object identifiers of the group(s) the user belongs to
|
922 |
+
A vendor-specific identifier to uniquely identify the group(s) the user
|
923 |
+
belongs to (a GUID, LDAP OID, or similar)."
|
924 |
+
windows_sid,The Microsoft Windows SID of the user.
|
925 |
+
email_addresses,Email addresses of the user.
|
926 |
+
employee_id,Human capital management identifier.
|
927 |
+
title,User job title.
|
928 |
+
company_name,User job company name.
|
929 |
+
department,User job department
|
930 |
+
office_address,User job office location.
|
931 |
+
managers,User job manager(s).
|
932 |
+
hire_date,User job employment hire date.
|
933 |
+
termination_date,User job employment termination date.
|
934 |
+
time_off,User time off leaves from active work.
|
935 |
+
last_login_time,User last login timestamp.
|
936 |
+
last_password_change_time,User last password change timestamp.
|
937 |
+
password_expiration_time,User password expiration timestamp.
|
938 |
+
account_expiration_time,User account expiration timestamp.
|
939 |
+
account_lockout_time,User account lockout timestamp.
|
940 |
+
last_bad_password_attempt_time,User last bad password attempt timestamp.
|
941 |
+
user_authentication_status,System authentication status for user.
|
942 |
+
role_name,"System role name for user.
|
943 |
+
Deprecated: use attribute.roles."
|
944 |
+
role_description,"System role description for user.
|
945 |
+
Deprecated: use attribute.roles."
|
946 |
+
user_role,"System role for user.
|
947 |
+
Deprecated: use attribute.roles."
|
948 |
+
vulnerabilities,A list of vulnerabilities.
|
949 |
+
about,"If the vulnerability is about a specific noun (e.g. executable),
|
950 |
+
then add it here."
|
951 |
+
name,"Name of the vulnerability (e.g. ""Unsupported OS Version detected"")."
|
952 |
+
description,Description of the vulnerability.
|
953 |
+
vendor,Vendor of scan that discovered vulnerability.
|
954 |
+
scan_start_time,"If the vulnerability was discovered during an asset scan, then this
|
955 |
+
field should be populated with the time the scan started.
|
956 |
+
This field can be left unset if the start time is not available or not
|
957 |
+
applicable."
|
958 |
+
scan_end_time,"If the vulnerability was discovered during an asset scan, then this field
|
959 |
+
|
960 |
+
should be populated with the time the scan ended.
|
961 |
+
This field can be left unset if the end time is not available or not
|
962 |
+
applicable."
|
963 |
+
first_found,"Products that maintain a history of vuln scans should populate first_found
|
964 |
+
with the time that a scan first detected the vulnerability on this asset."
|
965 |
+
last_found,"Products that maintain a history of vuln scans should populate last_found
|
966 |
+
with the time that a scan last detected the vulnerability on this asset."
|
967 |
+
severity,The severity of the vulnerability.
|
968 |
+
severity_details,Vendor-specific severity
|
969 |
+
cvss_base_score,"CVSS Base Score in the range of 0.0 to 10.0.
|
970 |
+
Useful for sorting."
|
971 |
+
cvss_vector,"Vector of CVSS properties (e.g. ""AV:L/AC:H/Au:N/C:N/I:P/A:C"")
|
972 |
+
Can be linked to via:
|
973 |
+
|
974 |
+
https://nvd.nist.gov/vuln-metrics/cvss/v2-calculator"
|
975 |
+
cvss_version,Version of CVSS Vector/Score.
|
976 |
+
cve_id,"Common Vulnerabilities and Exposures Id.
|
977 |
+
https://en.wikipedia.org/wiki/Common_Vulnerabilities_and_Exposures
|
978 |
+
https://cve.mitre.org/about/faqs.html#what_is_cve_id"
|
979 |
+
cve_description,"Common Vulnerabilities and Exposures Description.
|
980 |
+
https://cve.mitre.org/about/faqs.html#what_is_cve_record"
|
981 |
+
vendor_vulnerability_id,Vendor specific vulnerability id (e.g. Microsoft security bulletin id).
|
982 |
+
vendor_knowledge_base_article_id,"Vendor specific knowledge base article (e.g. ""KBXXXXXX"" from Microsoft).
|
983 |
+
https://en.wikipedia.org/wiki/Microsoft_Knowledge_Base
|
984 |
+
https://access.redhat.com/knowledgebase"
|
985 |
+
name,Certificate name.
|
986 |
+
algorithm,Certificate algorithm.
|
987 |
+
thumbprint,Certificate thumbprint.
|
988 |
+
cert_issuer,Issuer of the certificate.
|
989 |
+
serial_number,Certificate serial number.
|