Galatea007 commited on
Commit
e1ab91f
·
verified ·
1 Parent(s): ed7314a

Upload udm_field_list_v2.csv

Browse files
Files changed (1) hide show
  1. udm_field_list_v2.csv +989 -0
udm_field_list_v2.csv ADDED
@@ -0,0 +1,989 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ UDM_Field,Description
2
+ metadata,"Entity metadata such as timestamp, product, etc."
3
+ entity,Noun in the UDM event that this entity represents.
4
+ relations,"One or more relationships between the entity (a) and other entities, including the relationship type and related entity."
5
+ additional,"Important entity data that cannot be adequately represented within
6
+ the formal sections of the Entity."
7
+ risk_score,Stores information related to the entity's risk score.
8
+ metric,"Stores statistical metrics about the entity. Used if metadata.entity_type
9
+ is METRIC."
10
+ product_entity_id,"A vendor-specific identifier that uniquely identifies the entity
11
+ (e.g. a GUID, LDAP, OID, or similar)."
12
+ collected_timestamp,"GMT timestamp when the entity information was collected by the vendor's
13
+ local collection infrastructure."
14
+ creation_timestamp,"GMT timestamp when the entity described by the product_entity_id was
15
+ created on the system where data was collected."
16
+ interval,"Valid existence time range for the version of the entity represented by
17
+ this entity data."
18
+ vendor_name,Vendor name of the product that produced the entity information.
19
+ product_name,Product name that produced the entity information.
20
+ feed,Vendor feed name for a threat indicator feed.
21
+ product_version,Version of the product that produced the entity information.
22
+ entity_type,"Entity type.
23
+ If an entity has multiple possible types, this specifies the most specific
24
+ type."
25
+ description,Human-readable description of the entity.
26
+ threat,"Metadata provided by a threat intelligence feed that identified the
27
+ entity as malicious."
28
+ source_type,The source of the entity.
29
+ source_labels,Entity source metadata labels.
30
+ event_metadata,Metadata field from the event.
31
+ risk_version,Version of the risk score calculation algorithm.
32
+ risk_window,"Time window used when computing the risk score for an entity, for
33
+ example 24 hours or 7 days."
34
+ DEPRECATED_risk_score,Deprecated risk score.
35
+ risk_delta,"Represents the change in risk score for an entity between the end of the
36
+ previous time window and the end of the current time window."
37
+ detections_count,Number of detections that make up the risk score within the time window.
38
+ first_detection_time,"Timestamp of the first detection within the specified time window.
39
+ This field is empty when there are no detections."
40
+ last_detection_time,"Timestamp of the last detection within the specified time window.
41
+ This field is empty when there are no detections."
42
+ risk_score,Raw risk score for the entity.
43
+ normalized_risk_score,Normalized risk score for the entity. This value is between 0-1000.
44
+ risk_window_size,Risk window duration for the Entity.
45
+ raw_risk_delta,"Represents the change in raw risk score for an entity between the end of
46
+ the previous time window and the end of the current time window."
47
+ first_seen,Timestamp of the first time the entity was seen in the environment.
48
+ last_seen,Timestamp of the last time the entity was seen in the environment.
49
+ sum_measure,Sum of all precomputed measures for the given metric.
50
+ total_events,Total number of events used to calculate the given precomputed metric.
51
+ metric_name,Name of the analytic.
52
+ dimensions,All group by clauses used to calculate the metric.
53
+ export_window,Export window for which the metric was exported.
54
+ value,Value of the aggregated measure.
55
+ aggregate_function,Function used to calculate the aggregated measure.
56
+ entity,Entity (b) that the primary entity (a) is related to.
57
+ entity_type,Type of the related entity (b) in this relationship.
58
+ relationship,Type of relationship.
59
+ direction,"Directionality of relationship between primary entity (a) and the
60
+ related entity (b)."
61
+ uid,UID of the relationship.
62
+ entity_label,Label to identify the Noun of the relation.
63
+ previous_range_end_time,End time of the previous time window.
64
+ risk_score_delta,Difference in the normalized risk score from the previous recorded value.
65
+ previous_risk_score,Risk score from previous risk window
66
+ risk_score_numeric_delta,Numeric change between current and previous risk score
67
+ metadata,"Event metadata such as timestamp, source product, etc."
68
+ additional,"Any important vendor-specific event data that cannot be adequately
69
+ represented within the formal sections of the UDM model."
70
+ principal,"Represents the acting entity that originates the activity
71
+ described in the event. The principal must include at least one machine
72
+ detail (hostname, MACs, IPs, port, product-specific identifiers like an
73
+ EDR asset ID) or user detail (for example, username), and optionally
74
+ include process details. It must NOT include any of the following fields:
75
+ email, files, registry keys, or values."
76
+ src,"Represents a source entity being acted upon by the participant along with
77
+ the device or process context for the source object (the machine where the
78
+
79
+ source object resides). For example, if user U copies file A on machine X
80
+ to file B on machine Y, both file A and machine X would be specified in the
81
+
82
+ src portion of the UDM event."
83
+ target,"Represents a target entity being referenced by the event or an object on
84
+ the target entity. For example, in a firewall connection from device A to
85
+ device B, A is described as the principal and B is described as the target.
86
+ For a process injection by process C into target process D, process C is
87
+ described as the principal and process D is described as the target."
88
+ intermediary,"Represents details on one or more intermediate entities processing activity
89
+ described in the event. This includes device details about a proxy server
90
+ or SMTP relay server. If an active event (that has a principal and
91
+ possibly target) passes through any intermediaries, they're added here.
92
+ Intermediaries can impact the overall action, for example blocking or
93
+ modifying an ongoing request. A rule of thumb here is that 'principal',
94
+ 'target', and description of the initial action should be the same
95
+ regardless of the intermediary or its action. A successful network
96
+ connection from A->B should look the same in principal/target/intermediary
97
+ as one blocked by firewall C: principal: A, target: B (intermediary: C)."
98
+ observer,"Represents an observer entity (for example, a packet sniffer or
99
+ network-based vulnerability scanner), which is not a direct intermediary,
100
+ but which observes and reports on the event in question."
101
+ about,"Represents entities referenced by the event that are not otherwise
102
+ described in principal, src, target, intermediary or observer. For example,
103
+ it could be used to track email file attachments, domains/URLs/IPs embedded
104
+ within an email body, and DLLs that are loaded during a PROCESS_LAUNCH
105
+ event."
106
+ security_result,A list of security results.
107
+ network,"All network details go here, including sub-messages with details on each
108
+ protocol (for example, DHCP, DNS, or HTTP)."
109
+ extensions,"All other first-class, event-specific metadata goes in this message.
110
+ Don't place protocol metadata in Extensions; put it in Network."
111
+ auth,An authentication extension.
112
+ vulns,A vulnerability extension.
113
+ id,ID of the UDM event. Can be used for raw and normalized event retrieval.
114
+ product_log_id,"A vendor-specific event identifier to uniquely identify the event (for example: a
115
+ GUID)."
116
+ event_timestamp,The GMT timestamp when the event was generated.
117
+ collected_timestamp,"The GMT timestamp when the event was collected by the vendor's local
118
+ collection infrastructure."
119
+ ingested_timestamp,The GMT timestamp when the event was ingested (received) by Google Security Operations.
120
+ event_type,"The event type.
121
+ If an event has multiple possible types, this specifies the most specific
122
+ type."
123
+ vendor_name,The name of the product vendor.
124
+ product_name,The name of the product.
125
+ product_version,The version of the product.
126
+ product_event_type,"A short, descriptive, human-readable, product-specific event name or type
127
+ (for example: ""Scanned X"", ""User account created"", ""process_start"")."
128
+ product_deployment_id,The deployment identifier assigned by the vendor for a product deployment.
129
+ description,A human-readable unparsable description of the event.
130
+ url_back_to_product,A URL that takes the user to the source product console for this event.
131
+ ingestion_labels,User-configured ingestion metadata labels.
132
+ tags,"Tags added by Google Security Operations after an event is parsed. It is an error to
133
+ populate this field from within a parser."
134
+ enrichment_state,The enrichment state.
135
+ log_type,The string value of log type.
136
+ base_labels,Data access labels on the base event.
137
+ enrichment_labels,"Data access labels from all the contextual events used to enrich the base
138
+ event."
139
+ sent_bytes,The number of bytes sent.
140
+ received_bytes,The number of bytes received.
141
+ sent_packets,The number of packets sent.
142
+ received_packets,The number of packets received.
143
+ session_duration,"The duration of the session as the number of seconds and nanoseconds.
144
+ For seconds, network.session_duration.seconds, the type is a 64-bit
145
+ integer. For nanoseconds, network.session_duration.nanos, the type is a
146
+ 32-bit integer."
147
+ session_id,The ID of the network session.
148
+ parent_session_id,The ID of the parent network session.
149
+ application_protocol_version,"The version of the application protocol. e.g. ""1.1, 2.0"""
150
+ community_id,Community ID network flow value.
151
+ direction,The direction of network traffic.
152
+ ip_protocol,The IP protocol.
153
+ application_protocol,The application protocol.
154
+ ftp,FTP info.
155
+ email,Email info for the sender/recipient.
156
+ dns,DNS info.
157
+ dhcp,DHCP info.
158
+ http,HTTP info.
159
+ tls,TLS info.
160
+ smtp,"SMTP info.
161
+ Store fields specific to SMTP not covered by Email."
162
+ asn,Autonomous system number.
163
+ dns_domain,DNS domain name.
164
+ carrier_name,Carrier identification.
165
+ organization_name,Organization name (e.g Google).
166
+ ip_subnet_range,Associated human-readable IP subnet range (e.g. 10.1.2.0/24).
167
+ hostname,"Client hostname or domain name field.
168
+ Hostname also doubles as the domain for remote entities."
169
+ domain,Information about the domain.
170
+ artifact,Information about an artifact.
171
+ url_metadata,Information about the URL.
172
+ asset_id,The asset ID.
173
+ user,Information about the user.
174
+ user_management_chain,"Information about the user's management chain (reporting hierarchy).
175
+ Note: user_management_chain is only populated when data is exported to
176
+ BigQuery since recursive fields (e.g. user.managers) are not supported by
177
+ BigQuery."
178
+ group,Information about the group.
179
+ process,Information about the process.
180
+ process_ancestors,"Information about the process's ancestors ordered from immediate ancestor
181
+ (parent process) to root.
182
+ Note: process_ancestors is only populated when data is exported to BigQuery
183
+
184
+ since recursive fields (e.g. process.parent_process) are not supported by
185
+ BigQuery."
186
+ asset,Information about the asset.
187
+ ip,A list of IP addresses associated with a network connection.
188
+ nat_ip,A list of NAT translated IP addresses associated with a network connection.
189
+ port,"Source or destination network port number when a specific network
190
+ connection is described within an event."
191
+ nat_port,"NAT external network port number when a specific network connection is
192
+ described within an event."
193
+ mac,List of MAC addresses associated with a device.
194
+ administrative_domain,"Domain which the device belongs to (for example, the Microsoft Windows
195
+ domain)."
196
+ namespace,"Namespace which the device belongs to, such as ""AD forest"".
197
+ Uses for this field include Microsoft Windows AD forest, the name of
198
+
199
+ subsidiary, or the name of acquisition."
200
+ URL,The URL.
201
+ file,Information about the file.
202
+ email,"Email address.
203
+ Only filled in for security_result.about"
204
+ registry,Registry information.
205
+ application,"The name of an application or service.
206
+ Some SSO solutions only capture the name of a target application
207
+ such as ""Atlassian"" or ""Google""."
208
+ platform,Platform.
209
+ platform_version,"Platform version. For example,
210
+ ""Microsoft Windows 1803""."
211
+ platform_patch_level,"Platform patch level.
212
+ For example, ""Build 17134.48"""
213
+ cloud,"Cloud metadata.
214
+ Deprecated: cloud should be populated in entity Attribute as generic
215
+ metadata (e.g. asset.attribute.cloud)."
216
+ location,"Physical location. For cloud environments, set the region in
217
+ location.name."
218
+ ip_location,Deprecated: use ip_geo_artifact.location instead.
219
+ ip_geo_artifact,"Enriched geographic information corresponding to an IP address.
220
+ Specifically, location and network data."
221
+ resource,"Information about the resource (e.g. scheduled task, calendar entry).
222
+ This field should not be used for files, registry, or processes because
223
+ these objects are already part of Noun."
224
+ resource_ancestors,"Information about the resource's ancestors ordered from immediate ancestor
225
+ (starting with parent resource)."
226
+ labels,"Labels are key-value pairs.
227
+ For example: key = ""env"", value = ""prod"".
228
+ Deprecated: labels should be populated in entity Attribute as generic
229
+ metadata (e.g. user.attribute.labels)."
230
+ object_reference,Finding to which the Analyst updated the feedback.
231
+ investigation,Analyst feedback/investigation for alerts.
232
+ network,"Network details, including sub-messages with details on each protocol
233
+ (for example, DHCP, DNS, or HTTP)."
234
+ security_result,A list of security results.
235
+ about,"If the security result is about a specific entity (Noun), add it here."
236
+ category,The security category.
237
+ category_details,"For vendor-specific categories. For web categorization, put type in here
238
+
239
+ such as ""gambling"" or ""porn""."
240
+ threat_name,"A vendor-assigned classification common across multiple customers
241
+ (e.g. ""W32/File-A"", ""Slammer"")."
242
+ rule_set,"The result's rule set identifier.
243
+ (e.g. ""windows-threats"")"
244
+ rule_set_display_name,The curated detections rule set display name.
245
+ ruleset_category_display_name,"The curated detection rule set category display name.
246
+ (for example, if rule_set_display_name is ""CDIR SCC Enhanced Exfiltration"",
247
+ the rule_set_category is ""Cloud Threats"")."
248
+ rule_id,"A vendor-specific ID and name for a rule, varying by observerer type
249
+ (e.g. ""08123"", ""5d2b44d0-5ef6-40f5-a704-47d61d3babbe"")."
250
+ rule_name,"Name of the security rule
251
+ (e.g. ""BlockInboundToOracle"")."
252
+ rule_version,"Version of the security rule.
253
+ (e.g. ""v1.1"", ""00001"", ""1604709794"", ""2020-11-16T23:04:19+00:00"").
254
+ Note that rule versions are source-dependant and lexical ordering
255
+
256
+ should not be assumed."
257
+ rule_type,The type of security rule.
258
+ rule_author,Author of the security rule.
259
+ rule_labels,"A list of rule labels that can't be captured by the other fields
260
+ in security result
261
+ (e.g. ""reference : AnotherRule"", ""contributor : John"")."
262
+ alert_state,The alerting types of this security result.
263
+ detection_fields,"An ordered list of values, that represent fields in detections for a
264
+
265
+ security finding. This list represents mapping of names of requested
266
+ entities to their values (i.e. the security result matched variables) ."
267
+ outcomes,"A list of outcomes that represent the results of this security finding.
268
+ This list represents a mapping of names of the requested outcomes,
269
+ to their values."
270
+ summary,"A human readable summary (e.g. ""failed login occurred"")"
271
+ description,"A human readable description (e.g. ""user password was wrong"")"
272
+ action,Actions taken for this event.
273
+ action_details,The detail of the action taken as provided by the vendor.
274
+ severity,The severity of the result.
275
+ confidence,The confidence level of the result as estimated by the product.
276
+ priority,The priority of the result.
277
+ risk_score,The risk score of the security result.
278
+ confidence_score,The confidence score of the security result.
279
+ analytics_metadata,Stores metadata about each risk analytic metric the rule uses.
280
+ severity_details,Vendor-specific severity.
281
+ confidence_details,"Additional detail with regards to the confidence of a security event as
282
+ estimated by the product vendor."
283
+ priority_details,Vendor-specific information about the security result priority.
284
+ url_back_to_product,URL that takes the user to the source product console for this event.
285
+ threat_id,Vendor-specific ID for a threat.
286
+ threat_feed_name,Vendor feed name for a threat indicator feed.
287
+ threat_id_namespace,"The attribute threat_id_namespace qualifies threat_id with an ID namespace
288
+ to get an
289
+ unique ID. The attribute threat_id by itself is not unique across Google SecOps
290
+ as it is a vendor specific ID."
291
+ threat_status,Current status of the threat
292
+ attack_details,MITRE ATT&CK details.
293
+ first_discovered_time,First time the IoC threat was discovered in the provider.
294
+ associations,Associations related to the threat.
295
+ campaigns,Campaigns using this IOC threat.
296
+ verdict,"Verdict about the IoC from the provider.
297
+ This field is now deprecated. Use VerdictInfo instead."
298
+ last_updated_time,Last time the IoC threat was updated in the provider.
299
+ verdict_info,Verdict information about the IoC from the provider.
300
+ threat_verdict,GCTI threat verdict on the security result entity.
301
+ last_discovered_time,Last time the IoC was seen in the provider data.
302
+ analytic,Name of the analytic.
303
+ ip,IP address of the artifact.
304
+ prevalence,The prevalence of the artifact within the customer's environment.
305
+ first_seen_time,First seen timestamp of the IP in the customer's environment.
306
+ last_seen_time,Last seen timestamp of the IP address in the customer's environment.
307
+ location,Location of the Artifact's IP address.
308
+ network,Network information related to the Artifact's IP address.
309
+ as_owner,Owner of the Autonomous System to which the IP address belongs.
310
+ asn,Autonomous System Number to which the IP address belongs.
311
+ jarm,"The JARM hash for the IP address.
312
+ (https://engineering.salesforce.com/easily-identify-malicious-servers-on-the-internet-with-jarm-e095edac525a)."
313
+ last_https_certificate,SSL certificate information about the IP address.
314
+ last_https_certificate_date,Most recent date for the certificate in VirusTotal.
315
+ regional_internet_registry,"RIR (one of the current RIRs: AFRINIC, ARIN, APNIC, LACNIC or RIPE NCC)."
316
+ tags,Identification attributes
317
+ whois,WHOIS information as returned from the pertinent WHOIS server.
318
+ whois_date,Date of the last update of the WHOIS record in VirusTotal.
319
+ product_object_id,"A vendor-specific identifier to uniquely identify the entity (a GUID or
320
+
321
+ similar)."
322
+ hostname,Asset hostname or domain name field.
323
+ asset_id,"The asset ID. Value must contain the ':' character. For example,
324
+ cs:abcdd23434."
325
+ ip,A list of IP addresses associated with an asset.
326
+ mac,List of MAC addresses associated with an asset.
327
+ nat_ip,List of NAT IP addresses associated with an asset.
328
+ first_seen_time,"The first observed time for an asset.
329
+ The value is calculated on the basis of the
330
+ first time the identifier was observed."
331
+ hardware,The asset hardware specifications.
332
+ platform_software,The asset operating system platform software.
333
+ software,The asset software details.
334
+ location,Location of the asset.
335
+ category,"The category of the asset (e.g. ""End User Asset"", ""Workstation"", ""Server"")."
336
+ type,The type of the asset (e.g. workstation or laptop or server).
337
+ network_domain,"The network domain of the asset (e.g. ""corp.acme.com"")"
338
+ creation_time,"Time the asset was created or provisioned.
339
+ Deprecate: creation_time should be populated in Attribute as generic
340
+ metadata."
341
+ first_discover_time,"Time the asset was first discovered (by asset management/discoverability
342
+
343
+ software)."
344
+ last_discover_time,"Time the asset was last discovered (by asset management/discoverability
345
+
346
+ software)."
347
+ system_last_update_time,"Time the asset system or OS was last updated.
348
+ For all other operations that are not system updates (such as resizing a
349
+ VM), use Attribute.last_update_time."
350
+ last_boot_time,Time the asset was last boot started.
351
+ labels,"Metadata labels for the asset.
352
+ Deprecated: labels should be populated in Attribute as generic metadata."
353
+ deployment_status,The deployment status of the asset for device lifecycle purposes.
354
+ vulnerabilities,Vulnerabilities discovered on asset.
355
+ attribute,Generic entity metadata attributes of the asset.
356
+ version,ATT&CK version (e.g. 12.1).
357
+ tactics,Tactics employed.
358
+ techniques,Techniques employed.
359
+ id,"Tactic ID (e.g. ""TA0043"")."
360
+ name,"Tactic Name (e.g. ""Reconnaissance"")"
361
+ id,"Technique ID (e.g. ""T1595"")."
362
+ name,"Technique Name (e.g. ""Active Scanning"")."
363
+ subtechnique_id,"Subtechnique ID (e.g. ""T1595.001"")."
364
+ subtechnique_name,"Subtechnique Name (e.g. ""Scanning IP Blocks"")."
365
+ cloud,"Cloud metadata attributes such as project ID, account ID, or organizational
366
+ hierarchy."
367
+ labels,"Set of labels for the entity. Should only be used for product labels (for
368
+ example, Google Cloud resource labels or Azure AD sensitivity labels.
369
+ Should not be used for arbitrary key-value mappings."
370
+ permissions,"System permissions for IAM entity
371
+ (human principal, service account, group)."
372
+ roles,"System IAM roles to be assumed by resources to use the role's permissions
373
+ for access control."
374
+ creation_time,Time the resource or entity was created or provisioned.
375
+ last_update_time,Time the resource or entity was last updated.
376
+ type,The type of authentication.
377
+ mechanism,The authentication mechanism.
378
+ auth_details,The vendor defined details of the authentication.
379
+ version,Certificate version.
380
+ serial,Certificate serial number.
381
+ subject,Subject of the certificate.
382
+ issuer,Issuer of the certificate.
383
+ md5,"The MD5 hash of the certificate, as a hex-encoded string."
384
+ sha1,"The SHA1 hash of the certificate, as a hex-encoded string."
385
+ sha256,"The SHA256 hash of the certificate, as a hex-encoded string."
386
+ not_before,Indicates when the certificate is first valid.
387
+ not_after,Indicates when the certificate is no longer valid.
388
+ environment,The Cloud environment.
389
+ vpc,"The cloud environment VPC.
390
+ Deprecated."
391
+ project,"The cloud environment project information.
392
+ Deprecated: Use Resource.resource_ancestors"
393
+ availability_zone,"The cloud environment availability zone (different from region which is
394
+ location.name)."
395
+ type,Type.
396
+ value,Value.
397
+ ttl,Time to live.
398
+ priority,Priority.
399
+ retry,Retry.
400
+ refresh,Refresh.
401
+ minimum,Minimum.
402
+ expire,Expire.
403
+ serial,Serial.
404
+ rname,Rname.
405
+ opcode,The BOOTP op code.
406
+ htype,Hardware address type.
407
+ hlen,Hardware address length.
408
+ hops,Hardware ops.
409
+ transaction_id,Transaction ID.
410
+ seconds,Seconds elapsed since client began address acquisition/renewal process.
411
+ flags,Flags.
412
+ ciaddr,Client IP address (ciaddr).
413
+ yiaddr,Your IP address (yiaddr).
414
+ siaddr,IP address of the next bootstrap server.
415
+ giaddr,Relay agent IP address (giaddr).
416
+ chaddr,Client hardware address (chaddr).
417
+ sname,Server name that the client wishes to boot from.
418
+ file,Boot image filename.
419
+ options,List of DHCP options.
420
+ type,DHCP message type.
421
+ lease_time_seconds,"Lease time in seconds. See RFC2132, section 9.2."
422
+ client_hostname,"Client hostname. See RFC2132, section 3.14."
423
+ client_identifier,"Client identifier. See RFC2132, section 9.14."
424
+ requested_address,"Requested IP address. See RFC2132, section 9.1."
425
+ code,Code. See RFC1533.
426
+ data,Data.
427
+ id,DNS query id.
428
+ response,Set to true if the event is a DNS response. See QR field from RFC1035.
429
+ opcode,"The DNS OpCode used to specify the type of DNS query
430
+ (for example, QUERY, IQUERY, or STATUS)."
431
+ authoritative,"Other DNS header flags. See RFC1035, section 4.1.1."
432
+ truncated,Whether the DNS response was truncated.
433
+ recursion_desired,Whether a recursive DNS lookup is desired.
434
+ recursion_available,Whether a recursive DNS lookup is available.
435
+ response_code,Response code. See RCODE from RFC1035.
436
+ questions,A list of domain protocol message questions.
437
+ answers,A list of answers to the domain name query.
438
+ authority,"A list of domain name servers which verified the answers to the domain name
439
+ queries."
440
+ additional,"A list of additional domain name servers that can be used to verify the
441
+ answer to the domain."
442
+ name,The domain name.
443
+ type,The code specifying the type of the query.
444
+ class,The code specifying the class of the query.
445
+ prevalence,The prevalence of the domain within the customer's environment.
446
+ name,The name of the owner of the resource record.
447
+ type,The code specifying the type of the resource record.
448
+ class,The code specifying the class of the resource record.
449
+ ttl,"The time interval for which the resource record can be cached before the
450
+
451
+ source of the information should again be queried."
452
+ data,"The payload or response to the DNS question for all responses encoded in
453
+ UTF-8 format"
454
+ binary_data,"The raw bytes of any non-UTF8 strings that might be included as part of a
455
+ DNS response."
456
+ name,The domain name.
457
+ prevalence,The prevalence of the domain within the customer's environment.
458
+ first_seen_time,First seen timestamp of the domain in the customer's environment.
459
+ last_seen_time,Last seen timestamp of the domain in the customer's environment.
460
+ registrar,"Registrar name . FOr example, ""Wild West Domains, Inc. (R120-LROR)"",
461
+ ""GoDaddy.com, LLC"", or ""PDR LTD. D/B/A PUBLICDOMAINREGISTRY.COM""."
462
+ contact_email,Contact email address.
463
+ whois_server,Whois server name.
464
+ name_server,Repeated list of name servers.
465
+ creation_time,Domain creation time.
466
+ update_time,Last updated time.
467
+ expiration_time,Expiration time.
468
+ audit_update_time,Audit updated time.
469
+ status,"Domain status. See
470
+ https://www.icann.org/resources/pages/epp-status-codes-2014-06-16-en
471
+ for meanings of possible values"
472
+ registrant,Parsed contact information for the registrant of the domain.
473
+ admin,Parsed contact information for the administrative contact for the domain.
474
+ tech,Parsed contact information for the technical contact for the domain
475
+ billing,Parsed contact information for the billing contact of the domain.
476
+ zone,Parsed contact information for the zone.
477
+ whois_record_raw_text,WHOIS raw text.
478
+ registry_data_raw_text,Registry Data raw text.
479
+ iana_registrar_id,"IANA Registrar ID. See
480
+ https://www.iana.org/assignments/registrar-ids/registrar-ids.xhtml"
481
+ private_registration,"Indicates whether the domain appears to be using a private registration
482
+
483
+ service to mask the owner's contact information."
484
+ categories,Categories assign to the domain as retrieved from VirusTotal.
485
+ favicon,Includes difference hash and MD5 hash of the domain's favicon.
486
+ jarm,Domain's JARM hash.
487
+ last_dns_records,Domain's DNS records from the last scan.
488
+ last_dns_records_time,Date when the DNS records list was retrieved by VirusTotal.
489
+ last_https_certificate,SSL certificate object retrieved last time the domain was analyzed.
490
+ last_https_certificate_time,When the certificate was retrieved by VirusTotal.
491
+ popularity_ranks,"Domain's position in popularity ranks such as Alexa, Quantcast, Statvoo,
492
+ etc"
493
+ tags,List of representative attributes.
494
+ whois_time,Date of the last update of the WHOIS record.
495
+ from,The 'from' address.
496
+ reply_to,The 'reply to' address.
497
+ to,A list of 'to' addresses.
498
+ cc,A list of 'cc' addresses.
499
+ bcc,A list of 'bcc' addresses.
500
+ mail_id,The mail (or message) ID.
501
+ subject,The subject line(s) of the email.
502
+ bounce_address,"The envelope from address.
503
+ https://en.wikipedia.org/wiki/Bounce_address"
504
+ raw_md5,Favicon's MD5 hash.
505
+ dhash,Difference hash.
506
+ sha256,"The SHA256 hash of the file, as a hex-encoded string."
507
+ md5,"The MD5 hash of the file, as a hex-encoded string."
508
+ sha1,"The SHA1 hash of the file, as a hex-encoded string."
509
+ size,The size of the file in bytes.
510
+ full_path,The full path identifying the location of the file on the system.
511
+ mime_type,"The MIME (Multipurpose Internet Mail Extensions) type of the file,
512
+ for example ""PE"", ""PDF"", or ""powershell script""."
513
+ file_metadata,"Metadata associated with the file.
514
+ Deprecate FileMetadata in favor of using fields in File."
515
+ security_result,"Google Cloud Threat Intelligence (GCTI) security result for the file
516
+ including threat context and detection metadata."
517
+ pe_file,Metadata about the Portable Executable (PE) file.
518
+ ssdeep,Ssdeep of the file
519
+ vhash,Vhash of the file.
520
+ ahash,Deprecated. Use authentihash instead.
521
+ authentihash,Authentihash of the file.
522
+ file_type,FileType field.
523
+ capabilities_tags,Capabilities tags.
524
+ names,Names fields.
525
+ tags,Tags for the file.
526
+ last_modification_time,Timestamp when the file was last updated.
527
+ prevalence,Prevalence of the file hash in the customer's environment.
528
+ first_seen_time,Timestamp the file was first seen in the customer's environment.
529
+ last_seen_time,Timestamp the file was last seen in the customer's environment.
530
+ stat_mode,"The mode of the file. A bit string indicating the permissions and
531
+ privileges of the file."
532
+ stat_inode,The file identifier. Unique identifier of object within a file system.
533
+ stat_dev,The file system identifier to which the object belongs.
534
+ stat_nlink,Number of links to file.
535
+ stat_flags,User defined flags for file.
536
+ last_analysis_time,Timestamp the file was last analysed.
537
+ embedded_urls,Embedded URLs found in the file.
538
+ embedded_domains,Embedded domains found in the file.
539
+ embedded_ips,Embedded IP addresses found in the file.
540
+ exif_info,Exif metadata from different file formats extracted by exiftool.
541
+ signature_info,File signature information extracted from different tools.
542
+ pdf_info,Information about the PDF file structure.
543
+ first_submission_time,First submission time of the file.
544
+ last_submission_time,Last submission time of the file.
545
+ main_icon,Icon's relevant hashes.
546
+ id,Code sign identifier.
547
+ format,Code sign format.
548
+ compilation_time,Code sign timestamp
549
+ imphash,Imphash of the file.
550
+ entry_point,info.pe-entry-point.
551
+ entry_point_exiftool,info.exiftool.EntryPoint.
552
+ compilation_time,info.pe-timestamp.
553
+ compilation_exiftool_time,info.exiftool.TimeStamp.
554
+ section,FilemetadataSection fields.
555
+ imports,FilemetadataImports fields.
556
+ resource,FilemetadataPeResourceInfo fields.
557
+ resources_type_count,Deprecated: use resources_type_count_str.
558
+ resources_language_count,Deprecated: use resources_language_count_str.
559
+ resources_type_count_str,"Number of resources by resource type.
560
+ Example: RT_ICON: 10, RT_DIALOG: 5"
561
+ resources_language_count_str,"Number of resources by language.
562
+ Example: NEUTRAL: 20, ENGLISH US: 10"
563
+ signature_info,"FilemetadataSignatureInfo field.
564
+ deprecated, user File.signature_info instead."
565
+ verification_message,"Status of the certificate.
566
+ Valid values are ""Signed"", ""Unsigned"" or a description of the certificate
567
+ anomaly, if found."
568
+ verified,"True if verification_message == ""Signed"""
569
+ signer,Deprecated: use signers field.
570
+ signers,"File metadata signer information.
571
+ The order of the signers matters. Each element is a higher level
572
+ authority, being the last the root authority."
573
+ x509,List of certificates.
574
+ command,The FTP command.
575
+ product_object_id,"Product globally unique user object identifier, such as an LDAP Object
576
+ Identifier."
577
+ creation_time,"Group creation time.
578
+ Deprecated: creation_time should be populated in Attribute as generic
579
+ metadata."
580
+ group_display_name,"Group display name. e.g. ""Finance""."
581
+ attribute,Generic entity metadata attributes of the group.
582
+ email_addresses,Email addresses of the group.
583
+ windows_sid,Microsoft Windows SID of the group.
584
+ serial_number,Hardware serial number.
585
+ manufacturer,Hardware manufacturer.
586
+ model,Hardware model.
587
+ cpu_platform,"Platform of the hardware CPU (e.g. ""Intel Broadwell"")."
588
+ cpu_model,"Model description of the hardware CPU
589
+ (e.g. ""2.8 GHz Quad-Core Intel Core i5"")."
590
+ cpu_clock_speed,Clock speed of the hardware CPU in MHz.
591
+ cpu_max_clock_speed,Maximum possible clock speed of the hardware CPU in MHz.
592
+ cpu_number_cores,Number of CPU cores.
593
+ ram,Amount of the hardware ramdom access memory (RAM) in Mb.
594
+ method,"The HTTP request method
595
+ (e.g. ""GET"", ""POST"", ""PATCH"", ""DELETE"")."
596
+ referral_url,The URL for the HTTP referer.
597
+ user_agent,"The User-Agent request header which includes the application type,
598
+ operating system, software vendor or software version of the requesting
599
+
600
+ software user agent."
601
+ response_code,"The response status code, for example
602
+ 200, 302, 404, or 500."
603
+ parsed_user_agent,The parsed user_agent string.
604
+ verdict,Describes reason a finding investigation was resolved.
605
+ reputation,Describes whether a finding was useful or not-useful.
606
+ severity_score,Severity score for a finding set by an analyst.
607
+ status,Describes the workflow status of a finding.
608
+ comments,Comment added by the Analyst.
609
+ priority,Priority of the Alert or Finding set by analyst.
610
+ root_cause,Root cause of the Alert or Finding set by analyst.
611
+ reason,Reason for closing the Case or Alert.
612
+ risk_score,Risk score for a finding set by an analyst.
613
+ key,The key.
614
+ value,The value.
615
+ rbac_enabled,Indicates whether this label can be used for Data RBAC
616
+ city,The city.
617
+ state,The state.
618
+ country_or_region,The country or region.
619
+ name,"Custom location name (e.g. building or site name like ""London Office"").
620
+ For cloud environments, this is the region (e.g. ""us-west2"")."
621
+ desk_name,"Desk name or individual location, typically for an employee in an
622
+ office.
623
+ (e.g. ""IN-BLR-BCPC-11-1121D"")."
624
+ floor_name,"Floor name, number or a combination of the two for a building.
625
+ (e.g. ""1-A"")."
626
+ region_latitude,Deprecated: use region_coordinates.
627
+ region_longitude,Deprecated: use region_coordinates.
628
+ region_coordinates,"Coordinates for the associated region.
629
+ See https://cloud.google.com/vision/docs/reference/rest/v1/LatLng
630
+ for a description of the fields."
631
+ js,"Number of /JS tags found in the PDF file. Should be the same as
632
+ javascript field in normal scenarios."
633
+ javascript,"Number of /JavaScript tags found in the PDF file. Should be the same as
634
+ the js field in normal scenarios."
635
+ launch_action_count,Number of /Launch tags found in the PDF file.
636
+ object_stream_count,Number of object streams.
637
+ endobj_count,Number of object definitions (endobj keyword).
638
+ header,PDF version.
639
+ acroform,Number of /AcroForm tags found in the PDF.
640
+ autoaction,Number of /AA tags found in the PDF.
641
+ embedded_file,Number of /EmbeddedFile tags found in the PDF.
642
+ encrypted,"Whether the document is encrypted or not. This is defined by the /Encrypt
643
+ tag."
644
+ flash,Number of /RichMedia tags found in the PDF.
645
+ jbig2_compression,Number of /JBIG2Decode tags found in the PDF.
646
+ obj_count,Number of objects definitions (obj keyword).
647
+ endstream_count,Number of defined stream objects (stream keyword).
648
+ page_count,Number of pages in the PDF.
649
+ stream_count,Number of defined stream objects (stream keyword).
650
+ openaction,Number of /OpenAction tags found in the PDF.
651
+ startxref,Number of startxref keywords in the PDF.
652
+ suspicious_colors,Number of colors expressed with more than 3 bytes (CVE-2009-3459).
653
+ trailer,Number of trailer keywords in the PDF.
654
+ xfa,Number of \XFA tags found in the PDF.
655
+ xref,Number of xref keywords in the PDF.
656
+ import_hash,Hash of PE imports.
657
+ name,Name of the permission (e.g. chronicle.analyst.updateRule).
658
+ description,Description of the permission (e.g. 'Ability to update detect rules').
659
+ type,Type of the permission.
660
+ platform,The platform operating system.
661
+ platform_version,"The platform software version (
662
+ e.g. ""Microsoft Windows 1803"")."
663
+ platform_patch_level,"The platform software patch level (
664
+ e.g. ""Build 17134.48"", ""SP1"")."
665
+ giver,Name of the rank serial number hexdump.
666
+ rank,Rank position.
667
+ ingestion_time,Timestamp when the rank was ingested.
668
+ rolling_max,"The maximum number of assets per day accessing the resource over the
669
+ trailing day_count days."
670
+ day_count,The number of days over which rolling_max is calculated.
671
+ rolling_max_sub_domains,"The maximum number of assets per day accessing the domain along with
672
+
673
+ sub-domains over the trailing day_count days. This field is only valid for
674
+ domains."
675
+ day_max,The max prevalence score in a day interval window.
676
+ day_max_sub_domains,"The max prevalence score in a day interval window across sub-domains. This
677
+ field is only valid for domains."
678
+ pid,The process ID.
679
+ parent_pid,"The ID of the parent process.
680
+ Deprecated: use parent_process.pid instead."
681
+ parent_process,Information about the parent process.
682
+ file,Information about the file in use by the process.
683
+ command_line,The command line command that created the process.
684
+ command_line_history,The command line history of the process.
685
+ product_specific_process_id,A product specific process id.
686
+ access_mask,A bit mask representing the level of access.
687
+ integrity_level_rid,The Microsoft Windows integrity level relative ID (RID) of the process.
688
+ token_elevation_type,"The elevation type of the process on Microsoft Windows. This determines if
689
+ any privileges are removed when UAC is enabled."
690
+ product_specific_parent_process_id,"A product specific id for the parent process.
691
+ Please use parent_process.product_specific_process_id instead."
692
+ registry_key,"Registry key associated with an application or system component
693
+ (e.g., HKEY_, HKCU\Environment...)."
694
+ registry_value_name,"Name of the registry value associated with an application or system
695
+ component (e.g. TEMP)."
696
+ registry_value_data,"Data associated with a registry value
697
+ (e.g. %USERPROFILE%\Local Settings\Temp)."
698
+ type,Deprecated: use resource_type instead.
699
+ resource_type,Resource type.
700
+ resource_subtype,"Resource sub-type (e.g. ""BigQuery"", ""Bigtable"")."
701
+ id,Deprecated: Use resource.name or resource.product_object_id.
702
+ name,"The full name of the resource. For example,
703
+ Google Cloud: //cloudresourcemanager.googleapis.com/projects/wombat-123,
704
+ and AWS: arn:aws:iam::123456789012:user/johndoe."
705
+ parent,"The parent of the resource.
706
+ For a database table, the parent is the database. For a storage object,
707
+ the bucket name. Deprecated: use resource_ancestors.name."
708
+ product_object_id,"A vendor-specific identifier to uniquely identify the entity (a GUID,
709
+ OID, or similar)"
710
+ attribute,Generic entity metadata attributes of the resource.
711
+ name,System role name for user.
712
+ description,System role description for user.
713
+ type,System role type for well known roles.
714
+ cert_signature,Certificate's signature and algorithm.
715
+ extension,(DEPRECATED) certificate's extension.
716
+ cert_extensions,Certificate's extensions.
717
+ first_seen_time,Date the certificate was first retrieved by VirusTotal.
718
+ issuer,Certificate's issuer data.
719
+ ec,EC public key information.
720
+ serial_number,Certificate's serial number hexdump.
721
+ signature_algorithm,"Algorithm used for the signature (for example, ""sha1RSA"")."
722
+ size,Certificate content length.
723
+ subject,Certificate's subject data.
724
+ thumbprint,Certificate's content SHA1 hash.
725
+ thumbprint_sha256,Certificate's content SHA256 hash.
726
+ validity,Certificate's validity period.
727
+ version,"Certificate version (typically ""V1"", ""V2"" or ""V3"")."
728
+ keyid,Key hexdump.
729
+ serial_number,Serial number hexdump.
730
+ signature,Signature.
731
+ signature_algorithm,Algorithm.
732
+ p,p component hexdump.
733
+ q,q component hexdump.
734
+ g,g component hexdump.
735
+ pub,Public key hexdump.
736
+ oid,Curve name.
737
+ pub,Public key hexdump.
738
+ ca,Whether the subject acts as a certificate authority (CA) or not.
739
+ subject_key_id,Identifies the public key being certified.
740
+ authority_key_id,"Identifies the public key to be used to verify the signature on this
741
+ certificate or CRL."
742
+ key_usage,The purpose for which the certified public key is used.
743
+ ca_info_access,"Authority information access locations are URLs that are added to a
744
+ certificate in its authority information access extension."
745
+ crl_distribution_points,"CRL distribution points to which a certificate user should refer to
746
+ ascertain if the certificate has been revoked."
747
+ extended_key_usage,"One or more purposes for which the certified public key may be used, in
748
+ addition to or in place of the basic purposes indicated in the key usage
749
+ extension field."
750
+ subject_alternative_name,"Contains one or more alternative names, using any of a variety of name
751
+ forms, for the entity that is bound by the CA to the certified public
752
+ key."
753
+ certificate_policies,"Different certificate policies will relate to different applications
754
+ which may use the certified key."
755
+ netscape_cert_comment,Used to include free-form text comments inside certificates.
756
+ cert_template_name_dc,"BMP data value ""DomainController"". See MS Q291010."
757
+ netscape_certificate,"Identify whether the certificate subject is an SSL client, an SSL server,
758
+ or a CA."
759
+ pe_logotype,Whether the certificate includes a logotype.
760
+ old_authority_key_id,Whether the certificate has an old authority key identifier extension.
761
+ algorithm,"Any of ""RSA"", ""DSA"" or ""EC"". Indicates the algorithm used to generate the
762
+ certificate."
763
+ rsa,RSA public key information.
764
+ key_size,Key size.
765
+ modulus,Key modulus hexdump.
766
+ exponent,Key exponent hexdump.
767
+ country_name,C: Country name.
768
+ common_name,CN: CommonName.
769
+ locality,L: Locality.
770
+ organization,O: Organization.
771
+ organizational_unit,OU: OrganizationalUnit.
772
+ state_or_province_name,ST: StateOrProvinceName.
773
+ expiry_time,Expiry date.
774
+ issue_time,Issue date.
775
+ confidence_score,Confidence score of the verdict.
776
+ verdict_time,Timestamp at which the verdict was generated.
777
+ verdict_response,Details of the verdict.
778
+ id,Unique association id generated by mandiant.
779
+ country_code,Country from which the threat actor/ malware is originated.
780
+ type,Signifies the type of association.
781
+ name,Name of the threat actor/malware.
782
+ description,Human readable description about the association.
783
+ role,Role of the malware. Not applicable for threat actor.
784
+ source_country,Name of the country the threat originated from.
785
+ alias,Different aliases of the threat actor given by different sources.
786
+ first_reference_time,First time the threat actor was referenced or seen.
787
+ last_reference_time,Last time the threat actor was referenced or seen.
788
+ industries_affected,List of industries the threat actor affects.
789
+ associated_actors,"List of associated threat actors for a malware. Not applicable for threat
790
+ actors."
791
+ region_code,"Name of the country, the threat is originating from."
792
+ sponsor_region,Sponsor region of the threat actor.
793
+ targeted_regions,Targeted regions.
794
+ tags,Tags.
795
+ name,Name of the alias.
796
+ company,Name of the provider who gave the association's name.
797
+ ioc_stats_type,Describes the source of the IoCStat.
798
+ first_level_source,"Name of first level IoC source, for example Mandiant or a third-party."
799
+ second_level_source,"Name of the second-level IoC source, for example Crowdsourced Threat
800
+ Analysis or Knowledge Graph."
801
+ benign_count,Count of responses where the IoC was identified as benign.
802
+ quality,Level of confidence in the IoC mapping extracted from the source.
803
+ malicious_count,Count of responses where the IoC was identified as malicious.
804
+ response_count,Total number of response from the source.
805
+ source_count,Number of sources from which information was extracted.
806
+ source_provider,Source provider giving the ML verdict.
807
+ benign_count,Count of responses where this IoC was marked benign.
808
+ malicious_count,Count of responses where this IoC was marked malicious.
809
+ confidence_score,Confidence score of the verdict.
810
+ mandiant_sources,List of mandiant sources from which the verdict was generated.
811
+ third_party_sources,List of third-party sources from which the verdict was generated.
812
+ name,Name of the IoC source.
813
+ benign_count,Count of responses where this IoC was marked benign.
814
+ malicious_count,Count of responses where this IoC was marked malicious.
815
+ quality,Quality of the IoC mapping extracted from the source.
816
+ response_count,Total response count from this source.
817
+ source_count,Number of sources from which intelligence was extracted.
818
+ threat_intelligence_sources,Different threat intelligence sources from which IoC info was extracted.
819
+ source_count,Number of sources from which intelligence was extracted.
820
+ response_count,Total response count across all sources.
821
+ neighbour_influence,Describes the neighbour influence of the verdict.
822
+ verdict,ML Verdict provided by sources like Mandiant.
823
+ analyst_verdict,Human analyst verdict provided by sources like Mandiant.
824
+ source_count,Number of sources from which intelligence was extracted.
825
+ response_count,Total response count across all sources.
826
+ neighbour_influence,Describes the near neighbor influence of the verdict.
827
+ verdict_type,Type of verdict.
828
+ source_provider,Source provider giving the machine learning verdict.
829
+ benign_count,Count of responses where this IoC was marked as benign.
830
+ malicious_count,Count of responses where this IoC was marked as malicious.
831
+ confidence_score,Confidence score of the verdict.
832
+ ioc_stats,List of IoCStats from which the verdict was generated.
833
+ verdict_time,Timestamp when the verdict was generated.
834
+ verdict_response,Details about the verdict.
835
+ global_customer_count,Global customer count over the last 30 days
836
+ global_hits_count,Global hit count over the last 30 days.
837
+ pwn,"Whether one or more Mandiant incident response customers had this
838
+ indicator in their environment."
839
+ category_details,Tags related to the verdict.
840
+ pwn_first_tagged_time,The timestamp of the first time a pwn was associated to this entity.
841
+ sigcheck,Signature information extracted from the sigcheck tool.
842
+ codesign,Signature information extracted from the codesign utility.
843
+ name,"Common name of the signers/certificate.
844
+ The order of the signers matters. Each element is a higher level
845
+ authority, the last being the root authority."
846
+ status,"It can say ""Valid"" or state the problem with the certificate if any (e.g.
847
+ ""This certificate or one of the certificates in the certificate chain is
848
+ not time valid."")."
849
+ valid_usage,"Indicates which situations the certificate is valid for (e.g. ""Code
850
+ Signing"")."
851
+ cert_issuer,Company that issued the certificate.
852
+ helo,The client's 'HELO'/'EHLO' string.
853
+ mail_from,The client's 'MAIL FROM' string.
854
+ rcpt_to,The client's 'RCPT TO' string(s).
855
+ server_response,The server's response(s) to the client.
856
+ message_path,The message's path (extracted from the headers).
857
+ is_webmail,If the message was sent via a webmail client.
858
+ is_tls,If the connection switched to TLS.
859
+ name,The name of the software.
860
+ version,The version of the software.
861
+ permissions,"System permissions granted to the software.
862
+ For example, ""android.permission.WRITE_EXTERNAL_STORAGE"""
863
+ description,The description of the software.
864
+ vendor_name,The name of the software vendor.
865
+ tenant_id,A list of subtenant ids that this event belongs to.
866
+ data_tap_config_name,A list of sink name values defined in DataTap configurations.
867
+ interval,Interval duration of the leave.
868
+ description,Description of the leave if available (e.g. 'Vacation').
869
+ client,Certificate information for the client certificate.
870
+ server,Certificate information for the server certificate.
871
+ cipher,Cipher used during the connection.
872
+ curve,Elliptical curve used for a given cipher.
873
+ version,TLS version.
874
+ version_protocol,Protocol.
875
+ established,Indicates whether the TLS negotiation was successful.
876
+ next_protocol,Protocol to be used for tunnel.
877
+ resumed,"Indicates whether the TLS connection was resumed from a previous
878
+ TLS negotiation."
879
+ certificate,Client certificate.
880
+ ja3,"JA3 hash from the TLS ClientHello, as a hex-encoded string."
881
+ server_name,"Host name of the server, that the client is connecting to."
882
+ supported_ciphers,Ciphers supported by the client during client hello.
883
+ certificate,Server certificate.
884
+ ja3s,"JA3 hash from the TLS ServerHello, as a hex-encoded string."
885
+ tracker,Tracker name.
886
+ id,"Tracker ID, if available."
887
+ timestamp,Tracker ingestion date.
888
+ URL,Tracker script URL.
889
+ URL,URL.
890
+ categories,Categorisation done by VirusTotal partners.
891
+ favicon,Difference hash and MD5 hash of the URL's.
892
+ html_meta,Meta tags (only for URLs downloading HTML).
893
+ last_final_url,"If the original URL redirects, where does it end."
894
+ last_http_response_code,HTTP response code of the last response.
895
+ last_http_response_content_length,Length in bytes of the content received.
896
+ last_http_response_content_sha256,URL response body's SHA256 hash.
897
+ last_http_response_cookies,Website's cookies.
898
+ last_http_response_headers,Headers and values of the last HTTP response.
899
+ tags,Tags.
900
+ title,Webpage title.
901
+ trackers,Trackers found in the URL in a historical manner.
902
+ product_object_id,"A vendor-specific identifier to uniquely identify the entity (e.g. a GUID,
903
+ LDAP, OID, or similar)."
904
+ userid,The ID of the user.
905
+ user_display_name,"The display name of the user
906
+ (e.g. ""John Locke"")."
907
+ first_name,"First name of the user (e.g. ""John"")."
908
+ middle_name,Middle name of the user.
909
+ last_name,"Last name of the user (e.g. ""Locke"")."
910
+ phone_numbers,Phone numbers for the user.
911
+ personal_address,Personal address of the user.
912
+ attribute,Generic entity metadata attributes of the user.
913
+ first_seen_time,"The first observed time for a user.
914
+ The value is calculated on the basis of the
915
+ first time the identifier was observed."
916
+ account_type,"Type of user account (for example, service, domain, or cloud). This is
917
+
918
+ somewhat aligned to: https://attack.mitre.org/techniques/T1078/"
919
+ groupid,"The ID of the group that the user belongs to.
920
+ Deprecated in favor of the repeated group_identifiers field."
921
+ group_identifiers,"Product object identifiers of the group(s) the user belongs to
922
+ A vendor-specific identifier to uniquely identify the group(s) the user
923
+ belongs to (a GUID, LDAP OID, or similar)."
924
+ windows_sid,The Microsoft Windows SID of the user.
925
+ email_addresses,Email addresses of the user.
926
+ employee_id,Human capital management identifier.
927
+ title,User job title.
928
+ company_name,User job company name.
929
+ department,User job department
930
+ office_address,User job office location.
931
+ managers,User job manager(s).
932
+ hire_date,User job employment hire date.
933
+ termination_date,User job employment termination date.
934
+ time_off,User time off leaves from active work.
935
+ last_login_time,User last login timestamp.
936
+ last_password_change_time,User last password change timestamp.
937
+ password_expiration_time,User password expiration timestamp.
938
+ account_expiration_time,User account expiration timestamp.
939
+ account_lockout_time,User account lockout timestamp.
940
+ last_bad_password_attempt_time,User last bad password attempt timestamp.
941
+ user_authentication_status,System authentication status for user.
942
+ role_name,"System role name for user.
943
+ Deprecated: use attribute.roles."
944
+ role_description,"System role description for user.
945
+ Deprecated: use attribute.roles."
946
+ user_role,"System role for user.
947
+ Deprecated: use attribute.roles."
948
+ vulnerabilities,A list of vulnerabilities.
949
+ about,"If the vulnerability is about a specific noun (e.g. executable),
950
+ then add it here."
951
+ name,"Name of the vulnerability (e.g. ""Unsupported OS Version detected"")."
952
+ description,Description of the vulnerability.
953
+ vendor,Vendor of scan that discovered vulnerability.
954
+ scan_start_time,"If the vulnerability was discovered during an asset scan, then this
955
+ field should be populated with the time the scan started.
956
+ This field can be left unset if the start time is not available or not
957
+ applicable."
958
+ scan_end_time,"If the vulnerability was discovered during an asset scan, then this field
959
+
960
+ should be populated with the time the scan ended.
961
+ This field can be left unset if the end time is not available or not
962
+ applicable."
963
+ first_found,"Products that maintain a history of vuln scans should populate first_found
964
+ with the time that a scan first detected the vulnerability on this asset."
965
+ last_found,"Products that maintain a history of vuln scans should populate last_found
966
+ with the time that a scan last detected the vulnerability on this asset."
967
+ severity,The severity of the vulnerability.
968
+ severity_details,Vendor-specific severity
969
+ cvss_base_score,"CVSS Base Score in the range of 0.0 to 10.0.
970
+ Useful for sorting."
971
+ cvss_vector,"Vector of CVSS properties (e.g. ""AV:L/AC:H/Au:N/C:N/I:P/A:C"")
972
+ Can be linked to via:
973
+
974
+ https://nvd.nist.gov/vuln-metrics/cvss/v2-calculator"
975
+ cvss_version,Version of CVSS Vector/Score.
976
+ cve_id,"Common Vulnerabilities and Exposures Id.
977
+ https://en.wikipedia.org/wiki/Common_Vulnerabilities_and_Exposures
978
+ https://cve.mitre.org/about/faqs.html#what_is_cve_id"
979
+ cve_description,"Common Vulnerabilities and Exposures Description.
980
+ https://cve.mitre.org/about/faqs.html#what_is_cve_record"
981
+ vendor_vulnerability_id,Vendor specific vulnerability id (e.g. Microsoft security bulletin id).
982
+ vendor_knowledge_base_article_id,"Vendor specific knowledge base article (e.g. ""KBXXXXXX"" from Microsoft).
983
+ https://en.wikipedia.org/wiki/Microsoft_Knowledge_Base
984
+ https://access.redhat.com/knowledgebase"
985
+ name,Certificate name.
986
+ algorithm,Certificate algorithm.
987
+ thumbprint,Certificate thumbprint.
988
+ cert_issuer,Issuer of the certificate.
989
+ serial_number,Certificate serial number.