UDM_Field,Description metadata,"Entity metadata such as timestamp, product, etc." entity,Noun in the UDM event that this entity represents. relations,"One or more relationships between the entity (a) and other entities, including the relationship type and related entity." additional,"Important entity data that cannot be adequately represented within the formal sections of the Entity." risk_score,Stores information related to the entity's risk score. metric,"Stores statistical metrics about the entity. Used if metadata.entity_type is METRIC." product_entity_id,"A vendor-specific identifier that uniquely identifies the entity (e.g. a GUID, LDAP, OID, or similar)." collected_timestamp,"GMT timestamp when the entity information was collected by the vendor's local collection infrastructure." creation_timestamp,"GMT timestamp when the entity described by the product_entity_id was created on the system where data was collected." interval,"Valid existence time range for the version of the entity represented by this entity data." vendor_name,Vendor name of the product that produced the entity information. product_name,Product name that produced the entity information. feed,Vendor feed name for a threat indicator feed. product_version,Version of the product that produced the entity information. entity_type,"Entity type. If an entity has multiple possible types, this specifies the most specific type." description,Human-readable description of the entity. threat,"Metadata provided by a threat intelligence feed that identified the entity as malicious." source_type,The source of the entity. source_labels,Entity source metadata labels. event_metadata,Metadata field from the event. risk_version,Version of the risk score calculation algorithm. risk_window,"Time window used when computing the risk score for an entity, for example 24 hours or 7 days." DEPRECATED_risk_score,Deprecated risk score. risk_delta,"Represents the change in risk score for an entity between the end of the previous time window and the end of the current time window." detections_count,Number of detections that make up the risk score within the time window. first_detection_time,"Timestamp of the first detection within the specified time window. This field is empty when there are no detections." last_detection_time,"Timestamp of the last detection within the specified time window. This field is empty when there are no detections." risk_score,Raw risk score for the entity. normalized_risk_score,Normalized risk score for the entity. This value is between 0-1000. risk_window_size,Risk window duration for the Entity. raw_risk_delta,"Represents the change in raw risk score for an entity between the end of the previous time window and the end of the current time window." first_seen,Timestamp of the first time the entity was seen in the environment. last_seen,Timestamp of the last time the entity was seen in the environment. sum_measure,Sum of all precomputed measures for the given metric. total_events,Total number of events used to calculate the given precomputed metric. metric_name,Name of the analytic. dimensions,All group by clauses used to calculate the metric. export_window,Export window for which the metric was exported. value,Value of the aggregated measure. aggregate_function,Function used to calculate the aggregated measure. entity,Entity (b) that the primary entity (a) is related to. entity_type,Type of the related entity (b) in this relationship. relationship,Type of relationship. direction,"Directionality of relationship between primary entity (a) and the related entity (b)." uid,UID of the relationship. entity_label,Label to identify the Noun of the relation. previous_range_end_time,End time of the previous time window. risk_score_delta,Difference in the normalized risk score from the previous recorded value. previous_risk_score,Risk score from previous risk window risk_score_numeric_delta,Numeric change between current and previous risk score metadata,"Event metadata such as timestamp, source product, etc." additional,"Any important vendor-specific event data that cannot be adequately represented within the formal sections of the UDM model." principal,"Represents the acting entity that originates the activity described in the event. The principal must include at least one machine detail (hostname, MACs, IPs, port, product-specific identifiers like an EDR asset ID) or user detail (for example, username), and optionally include process details. It must NOT include any of the following fields: email, files, registry keys, or values." src,"Represents a source entity being acted upon by the participant along with the device or process context for the source object (the machine where the source object resides). For example, if user U copies file A on machine X to file B on machine Y, both file A and machine X would be specified in the src portion of the UDM event." target,"Represents a target entity being referenced by the event or an object on the target entity. For example, in a firewall connection from device A to device B, A is described as the principal and B is described as the target. For a process injection by process C into target process D, process C is described as the principal and process D is described as the target." intermediary,"Represents details on one or more intermediate entities processing activity described in the event. This includes device details about a proxy server or SMTP relay server. If an active event (that has a principal and possibly target) passes through any intermediaries, they're added here. Intermediaries can impact the overall action, for example blocking or modifying an ongoing request. A rule of thumb here is that 'principal', 'target', and description of the initial action should be the same regardless of the intermediary or its action. A successful network connection from A->B should look the same in principal/target/intermediary as one blocked by firewall C: principal: A, target: B (intermediary: C)." observer,"Represents an observer entity (for example, a packet sniffer or network-based vulnerability scanner), which is not a direct intermediary, but which observes and reports on the event in question." about,"Represents entities referenced by the event that are not otherwise described in principal, src, target, intermediary or observer. For example, it could be used to track email file attachments, domains/URLs/IPs embedded within an email body, and DLLs that are loaded during a PROCESS_LAUNCH event." security_result,A list of security results. network,"All network details go here, including sub-messages with details on each protocol (for example, DHCP, DNS, or HTTP)." extensions,"All other first-class, event-specific metadata goes in this message. Don't place protocol metadata in Extensions; put it in Network." auth,An authentication extension. vulns,A vulnerability extension. id,ID of the UDM event. Can be used for raw and normalized event retrieval. product_log_id,"A vendor-specific event identifier to uniquely identify the event (for example: a GUID)." event_timestamp,The GMT timestamp when the event was generated. collected_timestamp,"The GMT timestamp when the event was collected by the vendor's local collection infrastructure." ingested_timestamp,The GMT timestamp when the event was ingested (received) by Google Security Operations. event_type,"The event type. If an event has multiple possible types, this specifies the most specific type." vendor_name,The name of the product vendor. product_name,The name of the product. product_version,The version of the product. product_event_type,"A short, descriptive, human-readable, product-specific event name or type (for example: ""Scanned X"", ""User account created"", ""process_start"")." product_deployment_id,The deployment identifier assigned by the vendor for a product deployment. description,A human-readable unparsable description of the event. url_back_to_product,A URL that takes the user to the source product console for this event. ingestion_labels,User-configured ingestion metadata labels. tags,"Tags added by Google Security Operations after an event is parsed. It is an error to populate this field from within a parser." enrichment_state,The enrichment state. log_type,The string value of log type. base_labels,Data access labels on the base event. enrichment_labels,"Data access labels from all the contextual events used to enrich the base event." sent_bytes,The number of bytes sent. received_bytes,The number of bytes received. sent_packets,The number of packets sent. received_packets,The number of packets received. session_duration,"The duration of the session as the number of seconds and nanoseconds. For seconds, network.session_duration.seconds, the type is a 64-bit integer. For nanoseconds, network.session_duration.nanos, the type is a 32-bit integer." session_id,The ID of the network session. parent_session_id,The ID of the parent network session. application_protocol_version,"The version of the application protocol. e.g. ""1.1, 2.0""" community_id,Community ID network flow value. direction,The direction of network traffic. ip_protocol,The IP protocol. application_protocol,The application protocol. ftp,FTP info. email,Email info for the sender/recipient. dns,DNS info. dhcp,DHCP info. http,HTTP info. tls,TLS info. smtp,"SMTP info. Store fields specific to SMTP not covered by Email." asn,Autonomous system number. dns_domain,DNS domain name. carrier_name,Carrier identification. organization_name,Organization name (e.g Google). ip_subnet_range,Associated human-readable IP subnet range (e.g. 10.1.2.0/24). hostname,"Client hostname or domain name field. Hostname also doubles as the domain for remote entities." domain,Information about the domain. artifact,Information about an artifact. url_metadata,Information about the URL. asset_id,The asset ID. user,Information about the user. user_management_chain,"Information about the user's management chain (reporting hierarchy). Note: user_management_chain is only populated when data is exported to BigQuery since recursive fields (e.g. user.managers) are not supported by BigQuery." group,Information about the group. process,Information about the process. process_ancestors,"Information about the process's ancestors ordered from immediate ancestor (parent process) to root. Note: process_ancestors is only populated when data is exported to BigQuery since recursive fields (e.g. process.parent_process) are not supported by BigQuery." asset,Information about the asset. ip,A list of IP addresses associated with a network connection. nat_ip,A list of NAT translated IP addresses associated with a network connection. port,"Source or destination network port number when a specific network connection is described within an event." nat_port,"NAT external network port number when a specific network connection is described within an event." mac,List of MAC addresses associated with a device. administrative_domain,"Domain which the device belongs to (for example, the Microsoft Windows domain)." namespace,"Namespace which the device belongs to, such as ""AD forest"". Uses for this field include Microsoft Windows AD forest, the name of subsidiary, or the name of acquisition." URL,The URL. file,Information about the file. email,"Email address. Only filled in for security_result.about" registry,Registry information. application,"The name of an application or service. Some SSO solutions only capture the name of a target application such as ""Atlassian"" or ""Google""." platform,Platform. platform_version,"Platform version. For example, ""Microsoft Windows 1803""." platform_patch_level,"Platform patch level. For example, ""Build 17134.48""" cloud,"Cloud metadata. Deprecated: cloud should be populated in entity Attribute as generic metadata (e.g. asset.attribute.cloud)." location,"Physical location. For cloud environments, set the region in location.name." ip_location,Deprecated: use ip_geo_artifact.location instead. ip_geo_artifact,"Enriched geographic information corresponding to an IP address. Specifically, location and network data." resource,"Information about the resource (e.g. scheduled task, calendar entry). This field should not be used for files, registry, or processes because these objects are already part of Noun." resource_ancestors,"Information about the resource's ancestors ordered from immediate ancestor (starting with parent resource)." labels,"Labels are key-value pairs. For example: key = ""env"", value = ""prod"". Deprecated: labels should be populated in entity Attribute as generic metadata (e.g. user.attribute.labels)." object_reference,Finding to which the Analyst updated the feedback. investigation,Analyst feedback/investigation for alerts. network,"Network details, including sub-messages with details on each protocol (for example, DHCP, DNS, or HTTP)." security_result,A list of security results. about,"If the security result is about a specific entity (Noun), add it here." category,The security category. category_details,"For vendor-specific categories. For web categorization, put type in here such as ""gambling"" or ""porn""." threat_name,"A vendor-assigned classification common across multiple customers (e.g. ""W32/File-A"", ""Slammer"")." rule_set,"The result's rule set identifier. (e.g. ""windows-threats"")" rule_set_display_name,The curated detections rule set display name. ruleset_category_display_name,"The curated detection rule set category display name. (for example, if rule_set_display_name is ""CDIR SCC Enhanced Exfiltration"", the rule_set_category is ""Cloud Threats"")." rule_id,"A vendor-specific ID and name for a rule, varying by observerer type (e.g. ""08123"", ""5d2b44d0-5ef6-40f5-a704-47d61d3babbe"")." rule_name,"Name of the security rule (e.g. ""BlockInboundToOracle"")." rule_version,"Version of the security rule. (e.g. ""v1.1"", ""00001"", ""1604709794"", ""2020-11-16T23:04:19+00:00""). Note that rule versions are source-dependant and lexical ordering should not be assumed." rule_type,The type of security rule. rule_author,Author of the security rule. rule_labels,"A list of rule labels that can't be captured by the other fields in security result (e.g. ""reference : AnotherRule"", ""contributor : John"")." alert_state,The alerting types of this security result. detection_fields,"An ordered list of values, that represent fields in detections for a security finding. This list represents mapping of names of requested entities to their values (i.e. the security result matched variables) ." outcomes,"A list of outcomes that represent the results of this security finding. This list represents a mapping of names of the requested outcomes, to their values." summary,"A human readable summary (e.g. ""failed login occurred"")" description,"A human readable description (e.g. ""user password was wrong"")" action,Actions taken for this event. action_details,The detail of the action taken as provided by the vendor. severity,The severity of the result. confidence,The confidence level of the result as estimated by the product. priority,The priority of the result. risk_score,The risk score of the security result. confidence_score,The confidence score of the security result. analytics_metadata,Stores metadata about each risk analytic metric the rule uses. severity_details,Vendor-specific severity. confidence_details,"Additional detail with regards to the confidence of a security event as estimated by the product vendor." priority_details,Vendor-specific information about the security result priority. url_back_to_product,URL that takes the user to the source product console for this event. threat_id,Vendor-specific ID for a threat. threat_feed_name,Vendor feed name for a threat indicator feed. threat_id_namespace,"The attribute threat_id_namespace qualifies threat_id with an ID namespace to get an unique ID. The attribute threat_id by itself is not unique across Google SecOps as it is a vendor specific ID." threat_status,Current status of the threat attack_details,MITRE ATT&CK details. first_discovered_time,First time the IoC threat was discovered in the provider. associations,Associations related to the threat. campaigns,Campaigns using this IOC threat. verdict,"Verdict about the IoC from the provider. This field is now deprecated. Use VerdictInfo instead." last_updated_time,Last time the IoC threat was updated in the provider. verdict_info,Verdict information about the IoC from the provider. threat_verdict,GCTI threat verdict on the security result entity. last_discovered_time,Last time the IoC was seen in the provider data. analytic,Name of the analytic. ip,IP address of the artifact. prevalence,The prevalence of the artifact within the customer's environment. first_seen_time,First seen timestamp of the IP in the customer's environment. last_seen_time,Last seen timestamp of the IP address in the customer's environment. location,Location of the Artifact's IP address. network,Network information related to the Artifact's IP address. as_owner,Owner of the Autonomous System to which the IP address belongs. asn,Autonomous System Number to which the IP address belongs. jarm,"The JARM hash for the IP address. (https://engineering.salesforce.com/easily-identify-malicious-servers-on-the-internet-with-jarm-e095edac525a)." last_https_certificate,SSL certificate information about the IP address. last_https_certificate_date,Most recent date for the certificate in VirusTotal. regional_internet_registry,"RIR (one of the current RIRs: AFRINIC, ARIN, APNIC, LACNIC or RIPE NCC)." tags,Identification attributes whois,WHOIS information as returned from the pertinent WHOIS server. whois_date,Date of the last update of the WHOIS record in VirusTotal. product_object_id,"A vendor-specific identifier to uniquely identify the entity (a GUID or similar)." hostname,Asset hostname or domain name field. asset_id,"The asset ID. Value must contain the ':' character. For example, cs:abcdd23434." ip,A list of IP addresses associated with an asset. mac,List of MAC addresses associated with an asset. nat_ip,List of NAT IP addresses associated with an asset. first_seen_time,"The first observed time for an asset. The value is calculated on the basis of the first time the identifier was observed." hardware,The asset hardware specifications. platform_software,The asset operating system platform software. software,The asset software details. location,Location of the asset. category,"The category of the asset (e.g. ""End User Asset"", ""Workstation"", ""Server"")." type,The type of the asset (e.g. workstation or laptop or server). network_domain,"The network domain of the asset (e.g. ""corp.acme.com"")" creation_time,"Time the asset was created or provisioned. Deprecate: creation_time should be populated in Attribute as generic metadata." first_discover_time,"Time the asset was first discovered (by asset management/discoverability software)." last_discover_time,"Time the asset was last discovered (by asset management/discoverability software)." system_last_update_time,"Time the asset system or OS was last updated. For all other operations that are not system updates (such as resizing a VM), use Attribute.last_update_time." last_boot_time,Time the asset was last boot started. labels,"Metadata labels for the asset. Deprecated: labels should be populated in Attribute as generic metadata." deployment_status,The deployment status of the asset for device lifecycle purposes. vulnerabilities,Vulnerabilities discovered on asset. attribute,Generic entity metadata attributes of the asset. version,ATT&CK version (e.g. 12.1). tactics,Tactics employed. techniques,Techniques employed. id,"Tactic ID (e.g. ""TA0043"")." name,"Tactic Name (e.g. ""Reconnaissance"")" id,"Technique ID (e.g. ""T1595"")." name,"Technique Name (e.g. ""Active Scanning"")." subtechnique_id,"Subtechnique ID (e.g. ""T1595.001"")." subtechnique_name,"Subtechnique Name (e.g. ""Scanning IP Blocks"")." cloud,"Cloud metadata attributes such as project ID, account ID, or organizational hierarchy." labels,"Set of labels for the entity. Should only be used for product labels (for example, Google Cloud resource labels or Azure AD sensitivity labels. Should not be used for arbitrary key-value mappings." permissions,"System permissions for IAM entity (human principal, service account, group)." roles,"System IAM roles to be assumed by resources to use the role's permissions for access control." creation_time,Time the resource or entity was created or provisioned. last_update_time,Time the resource or entity was last updated. type,The type of authentication. mechanism,The authentication mechanism. auth_details,The vendor defined details of the authentication. version,Certificate version. serial,Certificate serial number. subject,Subject of the certificate. issuer,Issuer of the certificate. md5,"The MD5 hash of the certificate, as a hex-encoded string." sha1,"The SHA1 hash of the certificate, as a hex-encoded string." sha256,"The SHA256 hash of the certificate, as a hex-encoded string." not_before,Indicates when the certificate is first valid. not_after,Indicates when the certificate is no longer valid. environment,The Cloud environment. vpc,"The cloud environment VPC. Deprecated." project,"The cloud environment project information. Deprecated: Use Resource.resource_ancestors" availability_zone,"The cloud environment availability zone (different from region which is location.name)." type,Type. value,Value. ttl,Time to live. priority,Priority. retry,Retry. refresh,Refresh. minimum,Minimum. expire,Expire. serial,Serial. rname,Rname. opcode,The BOOTP op code. htype,Hardware address type. hlen,Hardware address length. hops,Hardware ops. transaction_id,Transaction ID. seconds,Seconds elapsed since client began address acquisition/renewal process. flags,Flags. ciaddr,Client IP address (ciaddr). yiaddr,Your IP address (yiaddr). siaddr,IP address of the next bootstrap server. giaddr,Relay agent IP address (giaddr). chaddr,Client hardware address (chaddr). sname,Server name that the client wishes to boot from. file,Boot image filename. options,List of DHCP options. type,DHCP message type. lease_time_seconds,"Lease time in seconds. See RFC2132, section 9.2." client_hostname,"Client hostname. See RFC2132, section 3.14." client_identifier,"Client identifier. See RFC2132, section 9.14." requested_address,"Requested IP address. See RFC2132, section 9.1." code,Code. See RFC1533. data,Data. id,DNS query id. response,Set to true if the event is a DNS response. See QR field from RFC1035. opcode,"The DNS OpCode used to specify the type of DNS query (for example, QUERY, IQUERY, or STATUS)." authoritative,"Other DNS header flags. See RFC1035, section 4.1.1." truncated,Whether the DNS response was truncated. recursion_desired,Whether a recursive DNS lookup is desired. recursion_available,Whether a recursive DNS lookup is available. response_code,Response code. See RCODE from RFC1035. questions,A list of domain protocol message questions. answers,A list of answers to the domain name query. authority,"A list of domain name servers which verified the answers to the domain name queries." additional,"A list of additional domain name servers that can be used to verify the answer to the domain." name,The domain name. type,The code specifying the type of the query. class,The code specifying the class of the query. prevalence,The prevalence of the domain within the customer's environment. name,The name of the owner of the resource record. type,The code specifying the type of the resource record. class,The code specifying the class of the resource record. ttl,"The time interval for which the resource record can be cached before the source of the information should again be queried." data,"The payload or response to the DNS question for all responses encoded in UTF-8 format" binary_data,"The raw bytes of any non-UTF8 strings that might be included as part of a DNS response." name,The domain name. prevalence,The prevalence of the domain within the customer's environment. first_seen_time,First seen timestamp of the domain in the customer's environment. last_seen_time,Last seen timestamp of the domain in the customer's environment. registrar,"Registrar name . FOr example, ""Wild West Domains, Inc. (R120-LROR)"", ""GoDaddy.com, LLC"", or ""PDR LTD. D/B/A PUBLICDOMAINREGISTRY.COM""." contact_email,Contact email address. whois_server,Whois server name. name_server,Repeated list of name servers. creation_time,Domain creation time. update_time,Last updated time. expiration_time,Expiration time. audit_update_time,Audit updated time. status,"Domain status. See https://www.icann.org/resources/pages/epp-status-codes-2014-06-16-en for meanings of possible values" registrant,Parsed contact information for the registrant of the domain. admin,Parsed contact information for the administrative contact for the domain. tech,Parsed contact information for the technical contact for the domain billing,Parsed contact information for the billing contact of the domain. zone,Parsed contact information for the zone. whois_record_raw_text,WHOIS raw text. registry_data_raw_text,Registry Data raw text. iana_registrar_id,"IANA Registrar ID. See https://www.iana.org/assignments/registrar-ids/registrar-ids.xhtml" private_registration,"Indicates whether the domain appears to be using a private registration service to mask the owner's contact information." categories,Categories assign to the domain as retrieved from VirusTotal. favicon,Includes difference hash and MD5 hash of the domain's favicon. jarm,Domain's JARM hash. last_dns_records,Domain's DNS records from the last scan. last_dns_records_time,Date when the DNS records list was retrieved by VirusTotal. last_https_certificate,SSL certificate object retrieved last time the domain was analyzed. last_https_certificate_time,When the certificate was retrieved by VirusTotal. popularity_ranks,"Domain's position in popularity ranks such as Alexa, Quantcast, Statvoo, etc" tags,List of representative attributes. whois_time,Date of the last update of the WHOIS record. from,The 'from' address. reply_to,The 'reply to' address. to,A list of 'to' addresses. cc,A list of 'cc' addresses. bcc,A list of 'bcc' addresses. mail_id,The mail (or message) ID. subject,The subject line(s) of the email. bounce_address,"The envelope from address. https://en.wikipedia.org/wiki/Bounce_address" raw_md5,Favicon's MD5 hash. dhash,Difference hash. sha256,"The SHA256 hash of the file, as a hex-encoded string." md5,"The MD5 hash of the file, as a hex-encoded string." sha1,"The SHA1 hash of the file, as a hex-encoded string." size,The size of the file in bytes. full_path,The full path identifying the location of the file on the system. mime_type,"The MIME (Multipurpose Internet Mail Extensions) type of the file, for example ""PE"", ""PDF"", or ""powershell script""." file_metadata,"Metadata associated with the file. Deprecate FileMetadata in favor of using fields in File." security_result,"Google Cloud Threat Intelligence (GCTI) security result for the file including threat context and detection metadata." pe_file,Metadata about the Portable Executable (PE) file. ssdeep,Ssdeep of the file vhash,Vhash of the file. ahash,Deprecated. Use authentihash instead. authentihash,Authentihash of the file. file_type,FileType field. capabilities_tags,Capabilities tags. names,Names fields. tags,Tags for the file. last_modification_time,Timestamp when the file was last updated. prevalence,Prevalence of the file hash in the customer's environment. first_seen_time,Timestamp the file was first seen in the customer's environment. last_seen_time,Timestamp the file was last seen in the customer's environment. stat_mode,"The mode of the file. A bit string indicating the permissions and privileges of the file." stat_inode,The file identifier. Unique identifier of object within a file system. stat_dev,The file system identifier to which the object belongs. stat_nlink,Number of links to file. stat_flags,User defined flags for file. last_analysis_time,Timestamp the file was last analysed. embedded_urls,Embedded URLs found in the file. embedded_domains,Embedded domains found in the file. embedded_ips,Embedded IP addresses found in the file. exif_info,Exif metadata from different file formats extracted by exiftool. signature_info,File signature information extracted from different tools. pdf_info,Information about the PDF file structure. first_submission_time,First submission time of the file. last_submission_time,Last submission time of the file. main_icon,Icon's relevant hashes. id,Code sign identifier. format,Code sign format. compilation_time,Code sign timestamp imphash,Imphash of the file. entry_point,info.pe-entry-point. entry_point_exiftool,info.exiftool.EntryPoint. compilation_time,info.pe-timestamp. compilation_exiftool_time,info.exiftool.TimeStamp. section,FilemetadataSection fields. imports,FilemetadataImports fields. resource,FilemetadataPeResourceInfo fields. resources_type_count,Deprecated: use resources_type_count_str. resources_language_count,Deprecated: use resources_language_count_str. resources_type_count_str,"Number of resources by resource type. Example: RT_ICON: 10, RT_DIALOG: 5" resources_language_count_str,"Number of resources by language. Example: NEUTRAL: 20, ENGLISH US: 10" signature_info,"FilemetadataSignatureInfo field. deprecated, user File.signature_info instead." verification_message,"Status of the certificate. Valid values are ""Signed"", ""Unsigned"" or a description of the certificate anomaly, if found." verified,"True if verification_message == ""Signed""" signer,Deprecated: use signers field. signers,"File metadata signer information. The order of the signers matters. Each element is a higher level authority, being the last the root authority." x509,List of certificates. command,The FTP command. product_object_id,"Product globally unique user object identifier, such as an LDAP Object Identifier." creation_time,"Group creation time. Deprecated: creation_time should be populated in Attribute as generic metadata." group_display_name,"Group display name. e.g. ""Finance""." attribute,Generic entity metadata attributes of the group. email_addresses,Email addresses of the group. windows_sid,Microsoft Windows SID of the group. serial_number,Hardware serial number. manufacturer,Hardware manufacturer. model,Hardware model. cpu_platform,"Platform of the hardware CPU (e.g. ""Intel Broadwell"")." cpu_model,"Model description of the hardware CPU (e.g. ""2.8 GHz Quad-Core Intel Core i5"")." cpu_clock_speed,Clock speed of the hardware CPU in MHz. cpu_max_clock_speed,Maximum possible clock speed of the hardware CPU in MHz. cpu_number_cores,Number of CPU cores. ram,Amount of the hardware ramdom access memory (RAM) in Mb. method,"The HTTP request method (e.g. ""GET"", ""POST"", ""PATCH"", ""DELETE"")." referral_url,The URL for the HTTP referer. user_agent,"The User-Agent request header which includes the application type, operating system, software vendor or software version of the requesting software user agent." response_code,"The response status code, for example 200, 302, 404, or 500." parsed_user_agent,The parsed user_agent string. verdict,Describes reason a finding investigation was resolved. reputation,Describes whether a finding was useful or not-useful. severity_score,Severity score for a finding set by an analyst. status,Describes the workflow status of a finding. comments,Comment added by the Analyst. priority,Priority of the Alert or Finding set by analyst. root_cause,Root cause of the Alert or Finding set by analyst. reason,Reason for closing the Case or Alert. risk_score,Risk score for a finding set by an analyst. key,The key. value,The value. rbac_enabled,Indicates whether this label can be used for Data RBAC city,The city. state,The state. country_or_region,The country or region. name,"Custom location name (e.g. building or site name like ""London Office""). For cloud environments, this is the region (e.g. ""us-west2"")." desk_name,"Desk name or individual location, typically for an employee in an office. (e.g. ""IN-BLR-BCPC-11-1121D"")." floor_name,"Floor name, number or a combination of the two for a building. (e.g. ""1-A"")." region_latitude,Deprecated: use region_coordinates. region_longitude,Deprecated: use region_coordinates. region_coordinates,"Coordinates for the associated region. See https://cloud.google.com/vision/docs/reference/rest/v1/LatLng for a description of the fields." js,"Number of /JS tags found in the PDF file. Should be the same as javascript field in normal scenarios." javascript,"Number of /JavaScript tags found in the PDF file. Should be the same as the js field in normal scenarios." launch_action_count,Number of /Launch tags found in the PDF file. object_stream_count,Number of object streams. endobj_count,Number of object definitions (endobj keyword). header,PDF version. acroform,Number of /AcroForm tags found in the PDF. autoaction,Number of /AA tags found in the PDF. embedded_file,Number of /EmbeddedFile tags found in the PDF. encrypted,"Whether the document is encrypted or not. This is defined by the /Encrypt tag." flash,Number of /RichMedia tags found in the PDF. jbig2_compression,Number of /JBIG2Decode tags found in the PDF. obj_count,Number of objects definitions (obj keyword). endstream_count,Number of defined stream objects (stream keyword). page_count,Number of pages in the PDF. stream_count,Number of defined stream objects (stream keyword). openaction,Number of /OpenAction tags found in the PDF. startxref,Number of startxref keywords in the PDF. suspicious_colors,Number of colors expressed with more than 3 bytes (CVE-2009-3459). trailer,Number of trailer keywords in the PDF. xfa,Number of \XFA tags found in the PDF. xref,Number of xref keywords in the PDF. import_hash,Hash of PE imports. name,Name of the permission (e.g. chronicle.analyst.updateRule). description,Description of the permission (e.g. 'Ability to update detect rules'). type,Type of the permission. platform,The platform operating system. platform_version,"The platform software version ( e.g. ""Microsoft Windows 1803"")." platform_patch_level,"The platform software patch level ( e.g. ""Build 17134.48"", ""SP1"")." giver,Name of the rank serial number hexdump. rank,Rank position. ingestion_time,Timestamp when the rank was ingested. rolling_max,"The maximum number of assets per day accessing the resource over the trailing day_count days." day_count,The number of days over which rolling_max is calculated. rolling_max_sub_domains,"The maximum number of assets per day accessing the domain along with sub-domains over the trailing day_count days. This field is only valid for domains." day_max,The max prevalence score in a day interval window. day_max_sub_domains,"The max prevalence score in a day interval window across sub-domains. This field is only valid for domains." pid,The process ID. parent_pid,"The ID of the parent process. Deprecated: use parent_process.pid instead." parent_process,Information about the parent process. file,Information about the file in use by the process. command_line,The command line command that created the process. command_line_history,The command line history of the process. product_specific_process_id,A product specific process id. access_mask,A bit mask representing the level of access. integrity_level_rid,The Microsoft Windows integrity level relative ID (RID) of the process. token_elevation_type,"The elevation type of the process on Microsoft Windows. This determines if any privileges are removed when UAC is enabled." product_specific_parent_process_id,"A product specific id for the parent process. Please use parent_process.product_specific_process_id instead." registry_key,"Registry key associated with an application or system component (e.g., HKEY_, HKCU\Environment...)." registry_value_name,"Name of the registry value associated with an application or system component (e.g. TEMP)." registry_value_data,"Data associated with a registry value (e.g. %USERPROFILE%\Local Settings\Temp)." type,Deprecated: use resource_type instead. resource_type,Resource type. resource_subtype,"Resource sub-type (e.g. ""BigQuery"", ""Bigtable"")." id,Deprecated: Use resource.name or resource.product_object_id. name,"The full name of the resource. For example, Google Cloud: //cloudresourcemanager.googleapis.com/projects/wombat-123, and AWS: arn:aws:iam::123456789012:user/johndoe." parent,"The parent of the resource. For a database table, the parent is the database. For a storage object, the bucket name. Deprecated: use resource_ancestors.name." product_object_id,"A vendor-specific identifier to uniquely identify the entity (a GUID, OID, or similar)" attribute,Generic entity metadata attributes of the resource. name,System role name for user. description,System role description for user. type,System role type for well known roles. cert_signature,Certificate's signature and algorithm. extension,(DEPRECATED) certificate's extension. cert_extensions,Certificate's extensions. first_seen_time,Date the certificate was first retrieved by VirusTotal. issuer,Certificate's issuer data. ec,EC public key information. serial_number,Certificate's serial number hexdump. signature_algorithm,"Algorithm used for the signature (for example, ""sha1RSA"")." size,Certificate content length. subject,Certificate's subject data. thumbprint,Certificate's content SHA1 hash. thumbprint_sha256,Certificate's content SHA256 hash. validity,Certificate's validity period. version,"Certificate version (typically ""V1"", ""V2"" or ""V3"")." keyid,Key hexdump. serial_number,Serial number hexdump. signature,Signature. signature_algorithm,Algorithm. p,p component hexdump. q,q component hexdump. g,g component hexdump. pub,Public key hexdump. oid,Curve name. pub,Public key hexdump. ca,Whether the subject acts as a certificate authority (CA) or not. subject_key_id,Identifies the public key being certified. authority_key_id,"Identifies the public key to be used to verify the signature on this certificate or CRL." key_usage,The purpose for which the certified public key is used. ca_info_access,"Authority information access locations are URLs that are added to a certificate in its authority information access extension." crl_distribution_points,"CRL distribution points to which a certificate user should refer to ascertain if the certificate has been revoked." extended_key_usage,"One or more purposes for which the certified public key may be used, in addition to or in place of the basic purposes indicated in the key usage extension field." subject_alternative_name,"Contains one or more alternative names, using any of a variety of name forms, for the entity that is bound by the CA to the certified public key." certificate_policies,"Different certificate policies will relate to different applications which may use the certified key." netscape_cert_comment,Used to include free-form text comments inside certificates. cert_template_name_dc,"BMP data value ""DomainController"". See MS Q291010." netscape_certificate,"Identify whether the certificate subject is an SSL client, an SSL server, or a CA." pe_logotype,Whether the certificate includes a logotype. old_authority_key_id,Whether the certificate has an old authority key identifier extension. algorithm,"Any of ""RSA"", ""DSA"" or ""EC"". Indicates the algorithm used to generate the certificate." rsa,RSA public key information. key_size,Key size. modulus,Key modulus hexdump. exponent,Key exponent hexdump. country_name,C: Country name. common_name,CN: CommonName. locality,L: Locality. organization,O: Organization. organizational_unit,OU: OrganizationalUnit. state_or_province_name,ST: StateOrProvinceName. expiry_time,Expiry date. issue_time,Issue date. confidence_score,Confidence score of the verdict. verdict_time,Timestamp at which the verdict was generated. verdict_response,Details of the verdict. id,Unique association id generated by mandiant. country_code,Country from which the threat actor/ malware is originated. type,Signifies the type of association. name,Name of the threat actor/malware. description,Human readable description about the association. role,Role of the malware. Not applicable for threat actor. source_country,Name of the country the threat originated from. alias,Different aliases of the threat actor given by different sources. first_reference_time,First time the threat actor was referenced or seen. last_reference_time,Last time the threat actor was referenced or seen. industries_affected,List of industries the threat actor affects. associated_actors,"List of associated threat actors for a malware. Not applicable for threat actors." region_code,"Name of the country, the threat is originating from." sponsor_region,Sponsor region of the threat actor. targeted_regions,Targeted regions. tags,Tags. name,Name of the alias. company,Name of the provider who gave the association's name. ioc_stats_type,Describes the source of the IoCStat. first_level_source,"Name of first level IoC source, for example Mandiant or a third-party." second_level_source,"Name of the second-level IoC source, for example Crowdsourced Threat Analysis or Knowledge Graph." benign_count,Count of responses where the IoC was identified as benign. quality,Level of confidence in the IoC mapping extracted from the source. malicious_count,Count of responses where the IoC was identified as malicious. response_count,Total number of response from the source. source_count,Number of sources from which information was extracted. source_provider,Source provider giving the ML verdict. benign_count,Count of responses where this IoC was marked benign. malicious_count,Count of responses where this IoC was marked malicious. confidence_score,Confidence score of the verdict. mandiant_sources,List of mandiant sources from which the verdict was generated. third_party_sources,List of third-party sources from which the verdict was generated. name,Name of the IoC source. benign_count,Count of responses where this IoC was marked benign. malicious_count,Count of responses where this IoC was marked malicious. quality,Quality of the IoC mapping extracted from the source. response_count,Total response count from this source. source_count,Number of sources from which intelligence was extracted. threat_intelligence_sources,Different threat intelligence sources from which IoC info was extracted. source_count,Number of sources from which intelligence was extracted. response_count,Total response count across all sources. neighbour_influence,Describes the neighbour influence of the verdict. verdict,ML Verdict provided by sources like Mandiant. analyst_verdict,Human analyst verdict provided by sources like Mandiant. source_count,Number of sources from which intelligence was extracted. response_count,Total response count across all sources. neighbour_influence,Describes the near neighbor influence of the verdict. verdict_type,Type of verdict. source_provider,Source provider giving the machine learning verdict. benign_count,Count of responses where this IoC was marked as benign. malicious_count,Count of responses where this IoC was marked as malicious. confidence_score,Confidence score of the verdict. ioc_stats,List of IoCStats from which the verdict was generated. verdict_time,Timestamp when the verdict was generated. verdict_response,Details about the verdict. global_customer_count,Global customer count over the last 30 days global_hits_count,Global hit count over the last 30 days. pwn,"Whether one or more Mandiant incident response customers had this indicator in their environment." category_details,Tags related to the verdict. pwn_first_tagged_time,The timestamp of the first time a pwn was associated to this entity. sigcheck,Signature information extracted from the sigcheck tool. codesign,Signature information extracted from the codesign utility. name,"Common name of the signers/certificate. The order of the signers matters. Each element is a higher level authority, the last being the root authority." status,"It can say ""Valid"" or state the problem with the certificate if any (e.g. ""This certificate or one of the certificates in the certificate chain is not time valid."")." valid_usage,"Indicates which situations the certificate is valid for (e.g. ""Code Signing"")." cert_issuer,Company that issued the certificate. helo,The client's 'HELO'/'EHLO' string. mail_from,The client's 'MAIL FROM' string. rcpt_to,The client's 'RCPT TO' string(s). server_response,The server's response(s) to the client. message_path,The message's path (extracted from the headers). is_webmail,If the message was sent via a webmail client. is_tls,If the connection switched to TLS. name,The name of the software. version,The version of the software. permissions,"System permissions granted to the software. For example, ""android.permission.WRITE_EXTERNAL_STORAGE""" description,The description of the software. vendor_name,The name of the software vendor. tenant_id,A list of subtenant ids that this event belongs to. data_tap_config_name,A list of sink name values defined in DataTap configurations. interval,Interval duration of the leave. description,Description of the leave if available (e.g. 'Vacation'). client,Certificate information for the client certificate. server,Certificate information for the server certificate. cipher,Cipher used during the connection. curve,Elliptical curve used for a given cipher. version,TLS version. version_protocol,Protocol. established,Indicates whether the TLS negotiation was successful. next_protocol,Protocol to be used for tunnel. resumed,"Indicates whether the TLS connection was resumed from a previous TLS negotiation." certificate,Client certificate. ja3,"JA3 hash from the TLS ClientHello, as a hex-encoded string." server_name,"Host name of the server, that the client is connecting to." supported_ciphers,Ciphers supported by the client during client hello. certificate,Server certificate. ja3s,"JA3 hash from the TLS ServerHello, as a hex-encoded string." tracker,Tracker name. id,"Tracker ID, if available." timestamp,Tracker ingestion date. URL,Tracker script URL. URL,URL. categories,Categorisation done by VirusTotal partners. favicon,Difference hash and MD5 hash of the URL's. html_meta,Meta tags (only for URLs downloading HTML). last_final_url,"If the original URL redirects, where does it end." last_http_response_code,HTTP response code of the last response. last_http_response_content_length,Length in bytes of the content received. last_http_response_content_sha256,URL response body's SHA256 hash. last_http_response_cookies,Website's cookies. last_http_response_headers,Headers and values of the last HTTP response. tags,Tags. title,Webpage title. trackers,Trackers found in the URL in a historical manner. product_object_id,"A vendor-specific identifier to uniquely identify the entity (e.g. a GUID, LDAP, OID, or similar)." userid,The ID of the user. user_display_name,"The display name of the user (e.g. ""John Locke"")." first_name,"First name of the user (e.g. ""John"")." middle_name,Middle name of the user. last_name,"Last name of the user (e.g. ""Locke"")." phone_numbers,Phone numbers for the user. personal_address,Personal address of the user. attribute,Generic entity metadata attributes of the user. first_seen_time,"The first observed time for a user. The value is calculated on the basis of the first time the identifier was observed." account_type,"Type of user account (for example, service, domain, or cloud). This is somewhat aligned to: https://attack.mitre.org/techniques/T1078/" groupid,"The ID of the group that the user belongs to. Deprecated in favor of the repeated group_identifiers field." group_identifiers,"Product object identifiers of the group(s) the user belongs to A vendor-specific identifier to uniquely identify the group(s) the user belongs to (a GUID, LDAP OID, or similar)." windows_sid,The Microsoft Windows SID of the user. email_addresses,Email addresses of the user. employee_id,Human capital management identifier. title,User job title. company_name,User job company name. department,User job department office_address,User job office location. managers,User job manager(s). hire_date,User job employment hire date. termination_date,User job employment termination date. time_off,User time off leaves from active work. last_login_time,User last login timestamp. last_password_change_time,User last password change timestamp. password_expiration_time,User password expiration timestamp. account_expiration_time,User account expiration timestamp. account_lockout_time,User account lockout timestamp. last_bad_password_attempt_time,User last bad password attempt timestamp. user_authentication_status,System authentication status for user. role_name,"System role name for user. Deprecated: use attribute.roles." role_description,"System role description for user. Deprecated: use attribute.roles." user_role,"System role for user. Deprecated: use attribute.roles." vulnerabilities,A list of vulnerabilities. about,"If the vulnerability is about a specific noun (e.g. executable), then add it here." name,"Name of the vulnerability (e.g. ""Unsupported OS Version detected"")." description,Description of the vulnerability. vendor,Vendor of scan that discovered vulnerability. scan_start_time,"If the vulnerability was discovered during an asset scan, then this field should be populated with the time the scan started. This field can be left unset if the start time is not available or not applicable." scan_end_time,"If the vulnerability was discovered during an asset scan, then this field should be populated with the time the scan ended. This field can be left unset if the end time is not available or not applicable." first_found,"Products that maintain a history of vuln scans should populate first_found with the time that a scan first detected the vulnerability on this asset." last_found,"Products that maintain a history of vuln scans should populate last_found with the time that a scan last detected the vulnerability on this asset." severity,The severity of the vulnerability. severity_details,Vendor-specific severity cvss_base_score,"CVSS Base Score in the range of 0.0 to 10.0. Useful for sorting." cvss_vector,"Vector of CVSS properties (e.g. ""AV:L/AC:H/Au:N/C:N/I:P/A:C"") Can be linked to via: https://nvd.nist.gov/vuln-metrics/cvss/v2-calculator" cvss_version,Version of CVSS Vector/Score. cve_id,"Common Vulnerabilities and Exposures Id. https://en.wikipedia.org/wiki/Common_Vulnerabilities_and_Exposures https://cve.mitre.org/about/faqs.html#what_is_cve_id" cve_description,"Common Vulnerabilities and Exposures Description. https://cve.mitre.org/about/faqs.html#what_is_cve_record" vendor_vulnerability_id,Vendor specific vulnerability id (e.g. Microsoft security bulletin id). vendor_knowledge_base_article_id,"Vendor specific knowledge base article (e.g. ""KBXXXXXX"" from Microsoft). https://en.wikipedia.org/wiki/Microsoft_Knowledge_Base https://access.redhat.com/knowledgebase" name,Certificate name. algorithm,Certificate algorithm. thumbprint,Certificate thumbprint. cert_issuer,Issuer of the certificate. serial_number,Certificate serial number.