Spaces:
Paused
Paused
Upload udm_field_list_v2.csv
Browse files- udm_field_list_v2.csv +989 -0
udm_field_list_v2.csv
ADDED
|
@@ -0,0 +1,989 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
UDM_Field,Description
|
| 2 |
+
metadata,"Entity metadata such as timestamp, product, etc."
|
| 3 |
+
entity,Noun in the UDM event that this entity represents.
|
| 4 |
+
relations,"One or more relationships between the entity (a) and other entities, including the relationship type and related entity."
|
| 5 |
+
additional,"Important entity data that cannot be adequately represented within
|
| 6 |
+
the formal sections of the Entity."
|
| 7 |
+
risk_score,Stores information related to the entity's risk score.
|
| 8 |
+
metric,"Stores statistical metrics about the entity. Used if metadata.entity_type
|
| 9 |
+
is METRIC."
|
| 10 |
+
product_entity_id,"A vendor-specific identifier that uniquely identifies the entity
|
| 11 |
+
(e.g. a GUID, LDAP, OID, or similar)."
|
| 12 |
+
collected_timestamp,"GMT timestamp when the entity information was collected by the vendor's
|
| 13 |
+
local collection infrastructure."
|
| 14 |
+
creation_timestamp,"GMT timestamp when the entity described by the product_entity_id was
|
| 15 |
+
created on the system where data was collected."
|
| 16 |
+
interval,"Valid existence time range for the version of the entity represented by
|
| 17 |
+
this entity data."
|
| 18 |
+
vendor_name,Vendor name of the product that produced the entity information.
|
| 19 |
+
product_name,Product name that produced the entity information.
|
| 20 |
+
feed,Vendor feed name for a threat indicator feed.
|
| 21 |
+
product_version,Version of the product that produced the entity information.
|
| 22 |
+
entity_type,"Entity type.
|
| 23 |
+
If an entity has multiple possible types, this specifies the most specific
|
| 24 |
+
type."
|
| 25 |
+
description,Human-readable description of the entity.
|
| 26 |
+
threat,"Metadata provided by a threat intelligence feed that identified the
|
| 27 |
+
entity as malicious."
|
| 28 |
+
source_type,The source of the entity.
|
| 29 |
+
source_labels,Entity source metadata labels.
|
| 30 |
+
event_metadata,Metadata field from the event.
|
| 31 |
+
risk_version,Version of the risk score calculation algorithm.
|
| 32 |
+
risk_window,"Time window used when computing the risk score for an entity, for
|
| 33 |
+
example 24 hours or 7 days."
|
| 34 |
+
DEPRECATED_risk_score,Deprecated risk score.
|
| 35 |
+
risk_delta,"Represents the change in risk score for an entity between the end of the
|
| 36 |
+
previous time window and the end of the current time window."
|
| 37 |
+
detections_count,Number of detections that make up the risk score within the time window.
|
| 38 |
+
first_detection_time,"Timestamp of the first detection within the specified time window.
|
| 39 |
+
This field is empty when there are no detections."
|
| 40 |
+
last_detection_time,"Timestamp of the last detection within the specified time window.
|
| 41 |
+
This field is empty when there are no detections."
|
| 42 |
+
risk_score,Raw risk score for the entity.
|
| 43 |
+
normalized_risk_score,Normalized risk score for the entity. This value is between 0-1000.
|
| 44 |
+
risk_window_size,Risk window duration for the Entity.
|
| 45 |
+
raw_risk_delta,"Represents the change in raw risk score for an entity between the end of
|
| 46 |
+
the previous time window and the end of the current time window."
|
| 47 |
+
first_seen,Timestamp of the first time the entity was seen in the environment.
|
| 48 |
+
last_seen,Timestamp of the last time the entity was seen in the environment.
|
| 49 |
+
sum_measure,Sum of all precomputed measures for the given metric.
|
| 50 |
+
total_events,Total number of events used to calculate the given precomputed metric.
|
| 51 |
+
metric_name,Name of the analytic.
|
| 52 |
+
dimensions,All group by clauses used to calculate the metric.
|
| 53 |
+
export_window,Export window for which the metric was exported.
|
| 54 |
+
value,Value of the aggregated measure.
|
| 55 |
+
aggregate_function,Function used to calculate the aggregated measure.
|
| 56 |
+
entity,Entity (b) that the primary entity (a) is related to.
|
| 57 |
+
entity_type,Type of the related entity (b) in this relationship.
|
| 58 |
+
relationship,Type of relationship.
|
| 59 |
+
direction,"Directionality of relationship between primary entity (a) and the
|
| 60 |
+
related entity (b)."
|
| 61 |
+
uid,UID of the relationship.
|
| 62 |
+
entity_label,Label to identify the Noun of the relation.
|
| 63 |
+
previous_range_end_time,End time of the previous time window.
|
| 64 |
+
risk_score_delta,Difference in the normalized risk score from the previous recorded value.
|
| 65 |
+
previous_risk_score,Risk score from previous risk window
|
| 66 |
+
risk_score_numeric_delta,Numeric change between current and previous risk score
|
| 67 |
+
metadata,"Event metadata such as timestamp, source product, etc."
|
| 68 |
+
additional,"Any important vendor-specific event data that cannot be adequately
|
| 69 |
+
represented within the formal sections of the UDM model."
|
| 70 |
+
principal,"Represents the acting entity that originates the activity
|
| 71 |
+
described in the event. The principal must include at least one machine
|
| 72 |
+
detail (hostname, MACs, IPs, port, product-specific identifiers like an
|
| 73 |
+
EDR asset ID) or user detail (for example, username), and optionally
|
| 74 |
+
include process details. It must NOT include any of the following fields:
|
| 75 |
+
email, files, registry keys, or values."
|
| 76 |
+
src,"Represents a source entity being acted upon by the participant along with
|
| 77 |
+
the device or process context for the source object (the machine where the
|
| 78 |
+
|
| 79 |
+
source object resides). For example, if user U copies file A on machine X
|
| 80 |
+
to file B on machine Y, both file A and machine X would be specified in the
|
| 81 |
+
|
| 82 |
+
src portion of the UDM event."
|
| 83 |
+
target,"Represents a target entity being referenced by the event or an object on
|
| 84 |
+
the target entity. For example, in a firewall connection from device A to
|
| 85 |
+
device B, A is described as the principal and B is described as the target.
|
| 86 |
+
For a process injection by process C into target process D, process C is
|
| 87 |
+
described as the principal and process D is described as the target."
|
| 88 |
+
intermediary,"Represents details on one or more intermediate entities processing activity
|
| 89 |
+
described in the event. This includes device details about a proxy server
|
| 90 |
+
or SMTP relay server. If an active event (that has a principal and
|
| 91 |
+
possibly target) passes through any intermediaries, they're added here.
|
| 92 |
+
Intermediaries can impact the overall action, for example blocking or
|
| 93 |
+
modifying an ongoing request. A rule of thumb here is that 'principal',
|
| 94 |
+
'target', and description of the initial action should be the same
|
| 95 |
+
regardless of the intermediary or its action. A successful network
|
| 96 |
+
connection from A->B should look the same in principal/target/intermediary
|
| 97 |
+
as one blocked by firewall C: principal: A, target: B (intermediary: C)."
|
| 98 |
+
observer,"Represents an observer entity (for example, a packet sniffer or
|
| 99 |
+
network-based vulnerability scanner), which is not a direct intermediary,
|
| 100 |
+
but which observes and reports on the event in question."
|
| 101 |
+
about,"Represents entities referenced by the event that are not otherwise
|
| 102 |
+
described in principal, src, target, intermediary or observer. For example,
|
| 103 |
+
it could be used to track email file attachments, domains/URLs/IPs embedded
|
| 104 |
+
within an email body, and DLLs that are loaded during a PROCESS_LAUNCH
|
| 105 |
+
event."
|
| 106 |
+
security_result,A list of security results.
|
| 107 |
+
network,"All network details go here, including sub-messages with details on each
|
| 108 |
+
protocol (for example, DHCP, DNS, or HTTP)."
|
| 109 |
+
extensions,"All other first-class, event-specific metadata goes in this message.
|
| 110 |
+
Don't place protocol metadata in Extensions; put it in Network."
|
| 111 |
+
auth,An authentication extension.
|
| 112 |
+
vulns,A vulnerability extension.
|
| 113 |
+
id,ID of the UDM event. Can be used for raw and normalized event retrieval.
|
| 114 |
+
product_log_id,"A vendor-specific event identifier to uniquely identify the event (for example: a
|
| 115 |
+
GUID)."
|
| 116 |
+
event_timestamp,The GMT timestamp when the event was generated.
|
| 117 |
+
collected_timestamp,"The GMT timestamp when the event was collected by the vendor's local
|
| 118 |
+
collection infrastructure."
|
| 119 |
+
ingested_timestamp,The GMT timestamp when the event was ingested (received) by Google Security Operations.
|
| 120 |
+
event_type,"The event type.
|
| 121 |
+
If an event has multiple possible types, this specifies the most specific
|
| 122 |
+
type."
|
| 123 |
+
vendor_name,The name of the product vendor.
|
| 124 |
+
product_name,The name of the product.
|
| 125 |
+
product_version,The version of the product.
|
| 126 |
+
product_event_type,"A short, descriptive, human-readable, product-specific event name or type
|
| 127 |
+
(for example: ""Scanned X"", ""User account created"", ""process_start"")."
|
| 128 |
+
product_deployment_id,The deployment identifier assigned by the vendor for a product deployment.
|
| 129 |
+
description,A human-readable unparsable description of the event.
|
| 130 |
+
url_back_to_product,A URL that takes the user to the source product console for this event.
|
| 131 |
+
ingestion_labels,User-configured ingestion metadata labels.
|
| 132 |
+
tags,"Tags added by Google Security Operations after an event is parsed. It is an error to
|
| 133 |
+
populate this field from within a parser."
|
| 134 |
+
enrichment_state,The enrichment state.
|
| 135 |
+
log_type,The string value of log type.
|
| 136 |
+
base_labels,Data access labels on the base event.
|
| 137 |
+
enrichment_labels,"Data access labels from all the contextual events used to enrich the base
|
| 138 |
+
event."
|
| 139 |
+
sent_bytes,The number of bytes sent.
|
| 140 |
+
received_bytes,The number of bytes received.
|
| 141 |
+
sent_packets,The number of packets sent.
|
| 142 |
+
received_packets,The number of packets received.
|
| 143 |
+
session_duration,"The duration of the session as the number of seconds and nanoseconds.
|
| 144 |
+
For seconds, network.session_duration.seconds, the type is a 64-bit
|
| 145 |
+
integer. For nanoseconds, network.session_duration.nanos, the type is a
|
| 146 |
+
32-bit integer."
|
| 147 |
+
session_id,The ID of the network session.
|
| 148 |
+
parent_session_id,The ID of the parent network session.
|
| 149 |
+
application_protocol_version,"The version of the application protocol. e.g. ""1.1, 2.0"""
|
| 150 |
+
community_id,Community ID network flow value.
|
| 151 |
+
direction,The direction of network traffic.
|
| 152 |
+
ip_protocol,The IP protocol.
|
| 153 |
+
application_protocol,The application protocol.
|
| 154 |
+
ftp,FTP info.
|
| 155 |
+
email,Email info for the sender/recipient.
|
| 156 |
+
dns,DNS info.
|
| 157 |
+
dhcp,DHCP info.
|
| 158 |
+
http,HTTP info.
|
| 159 |
+
tls,TLS info.
|
| 160 |
+
smtp,"SMTP info.
|
| 161 |
+
Store fields specific to SMTP not covered by Email."
|
| 162 |
+
asn,Autonomous system number.
|
| 163 |
+
dns_domain,DNS domain name.
|
| 164 |
+
carrier_name,Carrier identification.
|
| 165 |
+
organization_name,Organization name (e.g Google).
|
| 166 |
+
ip_subnet_range,Associated human-readable IP subnet range (e.g. 10.1.2.0/24).
|
| 167 |
+
hostname,"Client hostname or domain name field.
|
| 168 |
+
Hostname also doubles as the domain for remote entities."
|
| 169 |
+
domain,Information about the domain.
|
| 170 |
+
artifact,Information about an artifact.
|
| 171 |
+
url_metadata,Information about the URL.
|
| 172 |
+
asset_id,The asset ID.
|
| 173 |
+
user,Information about the user.
|
| 174 |
+
user_management_chain,"Information about the user's management chain (reporting hierarchy).
|
| 175 |
+
Note: user_management_chain is only populated when data is exported to
|
| 176 |
+
BigQuery since recursive fields (e.g. user.managers) are not supported by
|
| 177 |
+
BigQuery."
|
| 178 |
+
group,Information about the group.
|
| 179 |
+
process,Information about the process.
|
| 180 |
+
process_ancestors,"Information about the process's ancestors ordered from immediate ancestor
|
| 181 |
+
(parent process) to root.
|
| 182 |
+
Note: process_ancestors is only populated when data is exported to BigQuery
|
| 183 |
+
|
| 184 |
+
since recursive fields (e.g. process.parent_process) are not supported by
|
| 185 |
+
BigQuery."
|
| 186 |
+
asset,Information about the asset.
|
| 187 |
+
ip,A list of IP addresses associated with a network connection.
|
| 188 |
+
nat_ip,A list of NAT translated IP addresses associated with a network connection.
|
| 189 |
+
port,"Source or destination network port number when a specific network
|
| 190 |
+
connection is described within an event."
|
| 191 |
+
nat_port,"NAT external network port number when a specific network connection is
|
| 192 |
+
described within an event."
|
| 193 |
+
mac,List of MAC addresses associated with a device.
|
| 194 |
+
administrative_domain,"Domain which the device belongs to (for example, the Microsoft Windows
|
| 195 |
+
domain)."
|
| 196 |
+
namespace,"Namespace which the device belongs to, such as ""AD forest"".
|
| 197 |
+
Uses for this field include Microsoft Windows AD forest, the name of
|
| 198 |
+
|
| 199 |
+
subsidiary, or the name of acquisition."
|
| 200 |
+
URL,The URL.
|
| 201 |
+
file,Information about the file.
|
| 202 |
+
email,"Email address.
|
| 203 |
+
Only filled in for security_result.about"
|
| 204 |
+
registry,Registry information.
|
| 205 |
+
application,"The name of an application or service.
|
| 206 |
+
Some SSO solutions only capture the name of a target application
|
| 207 |
+
such as ""Atlassian"" or ""Google""."
|
| 208 |
+
platform,Platform.
|
| 209 |
+
platform_version,"Platform version. For example,
|
| 210 |
+
""Microsoft Windows 1803""."
|
| 211 |
+
platform_patch_level,"Platform patch level.
|
| 212 |
+
For example, ""Build 17134.48"""
|
| 213 |
+
cloud,"Cloud metadata.
|
| 214 |
+
Deprecated: cloud should be populated in entity Attribute as generic
|
| 215 |
+
metadata (e.g. asset.attribute.cloud)."
|
| 216 |
+
location,"Physical location. For cloud environments, set the region in
|
| 217 |
+
location.name."
|
| 218 |
+
ip_location,Deprecated: use ip_geo_artifact.location instead.
|
| 219 |
+
ip_geo_artifact,"Enriched geographic information corresponding to an IP address.
|
| 220 |
+
Specifically, location and network data."
|
| 221 |
+
resource,"Information about the resource (e.g. scheduled task, calendar entry).
|
| 222 |
+
This field should not be used for files, registry, or processes because
|
| 223 |
+
these objects are already part of Noun."
|
| 224 |
+
resource_ancestors,"Information about the resource's ancestors ordered from immediate ancestor
|
| 225 |
+
(starting with parent resource)."
|
| 226 |
+
labels,"Labels are key-value pairs.
|
| 227 |
+
For example: key = ""env"", value = ""prod"".
|
| 228 |
+
Deprecated: labels should be populated in entity Attribute as generic
|
| 229 |
+
metadata (e.g. user.attribute.labels)."
|
| 230 |
+
object_reference,Finding to which the Analyst updated the feedback.
|
| 231 |
+
investigation,Analyst feedback/investigation for alerts.
|
| 232 |
+
network,"Network details, including sub-messages with details on each protocol
|
| 233 |
+
(for example, DHCP, DNS, or HTTP)."
|
| 234 |
+
security_result,A list of security results.
|
| 235 |
+
about,"If the security result is about a specific entity (Noun), add it here."
|
| 236 |
+
category,The security category.
|
| 237 |
+
category_details,"For vendor-specific categories. For web categorization, put type in here
|
| 238 |
+
|
| 239 |
+
such as ""gambling"" or ""porn""."
|
| 240 |
+
threat_name,"A vendor-assigned classification common across multiple customers
|
| 241 |
+
(e.g. ""W32/File-A"", ""Slammer"")."
|
| 242 |
+
rule_set,"The result's rule set identifier.
|
| 243 |
+
(e.g. ""windows-threats"")"
|
| 244 |
+
rule_set_display_name,The curated detections rule set display name.
|
| 245 |
+
ruleset_category_display_name,"The curated detection rule set category display name.
|
| 246 |
+
(for example, if rule_set_display_name is ""CDIR SCC Enhanced Exfiltration"",
|
| 247 |
+
the rule_set_category is ""Cloud Threats"")."
|
| 248 |
+
rule_id,"A vendor-specific ID and name for a rule, varying by observerer type
|
| 249 |
+
(e.g. ""08123"", ""5d2b44d0-5ef6-40f5-a704-47d61d3babbe"")."
|
| 250 |
+
rule_name,"Name of the security rule
|
| 251 |
+
(e.g. ""BlockInboundToOracle"")."
|
| 252 |
+
rule_version,"Version of the security rule.
|
| 253 |
+
(e.g. ""v1.1"", ""00001"", ""1604709794"", ""2020-11-16T23:04:19+00:00"").
|
| 254 |
+
Note that rule versions are source-dependant and lexical ordering
|
| 255 |
+
|
| 256 |
+
should not be assumed."
|
| 257 |
+
rule_type,The type of security rule.
|
| 258 |
+
rule_author,Author of the security rule.
|
| 259 |
+
rule_labels,"A list of rule labels that can't be captured by the other fields
|
| 260 |
+
in security result
|
| 261 |
+
(e.g. ""reference : AnotherRule"", ""contributor : John"")."
|
| 262 |
+
alert_state,The alerting types of this security result.
|
| 263 |
+
detection_fields,"An ordered list of values, that represent fields in detections for a
|
| 264 |
+
|
| 265 |
+
security finding. This list represents mapping of names of requested
|
| 266 |
+
entities to their values (i.e. the security result matched variables) ."
|
| 267 |
+
outcomes,"A list of outcomes that represent the results of this security finding.
|
| 268 |
+
This list represents a mapping of names of the requested outcomes,
|
| 269 |
+
to their values."
|
| 270 |
+
summary,"A human readable summary (e.g. ""failed login occurred"")"
|
| 271 |
+
description,"A human readable description (e.g. ""user password was wrong"")"
|
| 272 |
+
action,Actions taken for this event.
|
| 273 |
+
action_details,The detail of the action taken as provided by the vendor.
|
| 274 |
+
severity,The severity of the result.
|
| 275 |
+
confidence,The confidence level of the result as estimated by the product.
|
| 276 |
+
priority,The priority of the result.
|
| 277 |
+
risk_score,The risk score of the security result.
|
| 278 |
+
confidence_score,The confidence score of the security result.
|
| 279 |
+
analytics_metadata,Stores metadata about each risk analytic metric the rule uses.
|
| 280 |
+
severity_details,Vendor-specific severity.
|
| 281 |
+
confidence_details,"Additional detail with regards to the confidence of a security event as
|
| 282 |
+
estimated by the product vendor."
|
| 283 |
+
priority_details,Vendor-specific information about the security result priority.
|
| 284 |
+
url_back_to_product,URL that takes the user to the source product console for this event.
|
| 285 |
+
threat_id,Vendor-specific ID for a threat.
|
| 286 |
+
threat_feed_name,Vendor feed name for a threat indicator feed.
|
| 287 |
+
threat_id_namespace,"The attribute threat_id_namespace qualifies threat_id with an ID namespace
|
| 288 |
+
to get an
|
| 289 |
+
unique ID. The attribute threat_id by itself is not unique across Google SecOps
|
| 290 |
+
as it is a vendor specific ID."
|
| 291 |
+
threat_status,Current status of the threat
|
| 292 |
+
attack_details,MITRE ATT&CK details.
|
| 293 |
+
first_discovered_time,First time the IoC threat was discovered in the provider.
|
| 294 |
+
associations,Associations related to the threat.
|
| 295 |
+
campaigns,Campaigns using this IOC threat.
|
| 296 |
+
verdict,"Verdict about the IoC from the provider.
|
| 297 |
+
This field is now deprecated. Use VerdictInfo instead."
|
| 298 |
+
last_updated_time,Last time the IoC threat was updated in the provider.
|
| 299 |
+
verdict_info,Verdict information about the IoC from the provider.
|
| 300 |
+
threat_verdict,GCTI threat verdict on the security result entity.
|
| 301 |
+
last_discovered_time,Last time the IoC was seen in the provider data.
|
| 302 |
+
analytic,Name of the analytic.
|
| 303 |
+
ip,IP address of the artifact.
|
| 304 |
+
prevalence,The prevalence of the artifact within the customer's environment.
|
| 305 |
+
first_seen_time,First seen timestamp of the IP in the customer's environment.
|
| 306 |
+
last_seen_time,Last seen timestamp of the IP address in the customer's environment.
|
| 307 |
+
location,Location of the Artifact's IP address.
|
| 308 |
+
network,Network information related to the Artifact's IP address.
|
| 309 |
+
as_owner,Owner of the Autonomous System to which the IP address belongs.
|
| 310 |
+
asn,Autonomous System Number to which the IP address belongs.
|
| 311 |
+
jarm,"The JARM hash for the IP address.
|
| 312 |
+
(https://engineering.salesforce.com/easily-identify-malicious-servers-on-the-internet-with-jarm-e095edac525a)."
|
| 313 |
+
last_https_certificate,SSL certificate information about the IP address.
|
| 314 |
+
last_https_certificate_date,Most recent date for the certificate in VirusTotal.
|
| 315 |
+
regional_internet_registry,"RIR (one of the current RIRs: AFRINIC, ARIN, APNIC, LACNIC or RIPE NCC)."
|
| 316 |
+
tags,Identification attributes
|
| 317 |
+
whois,WHOIS information as returned from the pertinent WHOIS server.
|
| 318 |
+
whois_date,Date of the last update of the WHOIS record in VirusTotal.
|
| 319 |
+
product_object_id,"A vendor-specific identifier to uniquely identify the entity (a GUID or
|
| 320 |
+
|
| 321 |
+
similar)."
|
| 322 |
+
hostname,Asset hostname or domain name field.
|
| 323 |
+
asset_id,"The asset ID. Value must contain the ':' character. For example,
|
| 324 |
+
cs:abcdd23434."
|
| 325 |
+
ip,A list of IP addresses associated with an asset.
|
| 326 |
+
mac,List of MAC addresses associated with an asset.
|
| 327 |
+
nat_ip,List of NAT IP addresses associated with an asset.
|
| 328 |
+
first_seen_time,"The first observed time for an asset.
|
| 329 |
+
The value is calculated on the basis of the
|
| 330 |
+
first time the identifier was observed."
|
| 331 |
+
hardware,The asset hardware specifications.
|
| 332 |
+
platform_software,The asset operating system platform software.
|
| 333 |
+
software,The asset software details.
|
| 334 |
+
location,Location of the asset.
|
| 335 |
+
category,"The category of the asset (e.g. ""End User Asset"", ""Workstation"", ""Server"")."
|
| 336 |
+
type,The type of the asset (e.g. workstation or laptop or server).
|
| 337 |
+
network_domain,"The network domain of the asset (e.g. ""corp.acme.com"")"
|
| 338 |
+
creation_time,"Time the asset was created or provisioned.
|
| 339 |
+
Deprecate: creation_time should be populated in Attribute as generic
|
| 340 |
+
metadata."
|
| 341 |
+
first_discover_time,"Time the asset was first discovered (by asset management/discoverability
|
| 342 |
+
|
| 343 |
+
software)."
|
| 344 |
+
last_discover_time,"Time the asset was last discovered (by asset management/discoverability
|
| 345 |
+
|
| 346 |
+
software)."
|
| 347 |
+
system_last_update_time,"Time the asset system or OS was last updated.
|
| 348 |
+
For all other operations that are not system updates (such as resizing a
|
| 349 |
+
VM), use Attribute.last_update_time."
|
| 350 |
+
last_boot_time,Time the asset was last boot started.
|
| 351 |
+
labels,"Metadata labels for the asset.
|
| 352 |
+
Deprecated: labels should be populated in Attribute as generic metadata."
|
| 353 |
+
deployment_status,The deployment status of the asset for device lifecycle purposes.
|
| 354 |
+
vulnerabilities,Vulnerabilities discovered on asset.
|
| 355 |
+
attribute,Generic entity metadata attributes of the asset.
|
| 356 |
+
version,ATT&CK version (e.g. 12.1).
|
| 357 |
+
tactics,Tactics employed.
|
| 358 |
+
techniques,Techniques employed.
|
| 359 |
+
id,"Tactic ID (e.g. ""TA0043"")."
|
| 360 |
+
name,"Tactic Name (e.g. ""Reconnaissance"")"
|
| 361 |
+
id,"Technique ID (e.g. ""T1595"")."
|
| 362 |
+
name,"Technique Name (e.g. ""Active Scanning"")."
|
| 363 |
+
subtechnique_id,"Subtechnique ID (e.g. ""T1595.001"")."
|
| 364 |
+
subtechnique_name,"Subtechnique Name (e.g. ""Scanning IP Blocks"")."
|
| 365 |
+
cloud,"Cloud metadata attributes such as project ID, account ID, or organizational
|
| 366 |
+
hierarchy."
|
| 367 |
+
labels,"Set of labels for the entity. Should only be used for product labels (for
|
| 368 |
+
example, Google Cloud resource labels or Azure AD sensitivity labels.
|
| 369 |
+
Should not be used for arbitrary key-value mappings."
|
| 370 |
+
permissions,"System permissions for IAM entity
|
| 371 |
+
(human principal, service account, group)."
|
| 372 |
+
roles,"System IAM roles to be assumed by resources to use the role's permissions
|
| 373 |
+
for access control."
|
| 374 |
+
creation_time,Time the resource or entity was created or provisioned.
|
| 375 |
+
last_update_time,Time the resource or entity was last updated.
|
| 376 |
+
type,The type of authentication.
|
| 377 |
+
mechanism,The authentication mechanism.
|
| 378 |
+
auth_details,The vendor defined details of the authentication.
|
| 379 |
+
version,Certificate version.
|
| 380 |
+
serial,Certificate serial number.
|
| 381 |
+
subject,Subject of the certificate.
|
| 382 |
+
issuer,Issuer of the certificate.
|
| 383 |
+
md5,"The MD5 hash of the certificate, as a hex-encoded string."
|
| 384 |
+
sha1,"The SHA1 hash of the certificate, as a hex-encoded string."
|
| 385 |
+
sha256,"The SHA256 hash of the certificate, as a hex-encoded string."
|
| 386 |
+
not_before,Indicates when the certificate is first valid.
|
| 387 |
+
not_after,Indicates when the certificate is no longer valid.
|
| 388 |
+
environment,The Cloud environment.
|
| 389 |
+
vpc,"The cloud environment VPC.
|
| 390 |
+
Deprecated."
|
| 391 |
+
project,"The cloud environment project information.
|
| 392 |
+
Deprecated: Use Resource.resource_ancestors"
|
| 393 |
+
availability_zone,"The cloud environment availability zone (different from region which is
|
| 394 |
+
location.name)."
|
| 395 |
+
type,Type.
|
| 396 |
+
value,Value.
|
| 397 |
+
ttl,Time to live.
|
| 398 |
+
priority,Priority.
|
| 399 |
+
retry,Retry.
|
| 400 |
+
refresh,Refresh.
|
| 401 |
+
minimum,Minimum.
|
| 402 |
+
expire,Expire.
|
| 403 |
+
serial,Serial.
|
| 404 |
+
rname,Rname.
|
| 405 |
+
opcode,The BOOTP op code.
|
| 406 |
+
htype,Hardware address type.
|
| 407 |
+
hlen,Hardware address length.
|
| 408 |
+
hops,Hardware ops.
|
| 409 |
+
transaction_id,Transaction ID.
|
| 410 |
+
seconds,Seconds elapsed since client began address acquisition/renewal process.
|
| 411 |
+
flags,Flags.
|
| 412 |
+
ciaddr,Client IP address (ciaddr).
|
| 413 |
+
yiaddr,Your IP address (yiaddr).
|
| 414 |
+
siaddr,IP address of the next bootstrap server.
|
| 415 |
+
giaddr,Relay agent IP address (giaddr).
|
| 416 |
+
chaddr,Client hardware address (chaddr).
|
| 417 |
+
sname,Server name that the client wishes to boot from.
|
| 418 |
+
file,Boot image filename.
|
| 419 |
+
options,List of DHCP options.
|
| 420 |
+
type,DHCP message type.
|
| 421 |
+
lease_time_seconds,"Lease time in seconds. See RFC2132, section 9.2."
|
| 422 |
+
client_hostname,"Client hostname. See RFC2132, section 3.14."
|
| 423 |
+
client_identifier,"Client identifier. See RFC2132, section 9.14."
|
| 424 |
+
requested_address,"Requested IP address. See RFC2132, section 9.1."
|
| 425 |
+
code,Code. See RFC1533.
|
| 426 |
+
data,Data.
|
| 427 |
+
id,DNS query id.
|
| 428 |
+
response,Set to true if the event is a DNS response. See QR field from RFC1035.
|
| 429 |
+
opcode,"The DNS OpCode used to specify the type of DNS query
|
| 430 |
+
(for example, QUERY, IQUERY, or STATUS)."
|
| 431 |
+
authoritative,"Other DNS header flags. See RFC1035, section 4.1.1."
|
| 432 |
+
truncated,Whether the DNS response was truncated.
|
| 433 |
+
recursion_desired,Whether a recursive DNS lookup is desired.
|
| 434 |
+
recursion_available,Whether a recursive DNS lookup is available.
|
| 435 |
+
response_code,Response code. See RCODE from RFC1035.
|
| 436 |
+
questions,A list of domain protocol message questions.
|
| 437 |
+
answers,A list of answers to the domain name query.
|
| 438 |
+
authority,"A list of domain name servers which verified the answers to the domain name
|
| 439 |
+
queries."
|
| 440 |
+
additional,"A list of additional domain name servers that can be used to verify the
|
| 441 |
+
answer to the domain."
|
| 442 |
+
name,The domain name.
|
| 443 |
+
type,The code specifying the type of the query.
|
| 444 |
+
class,The code specifying the class of the query.
|
| 445 |
+
prevalence,The prevalence of the domain within the customer's environment.
|
| 446 |
+
name,The name of the owner of the resource record.
|
| 447 |
+
type,The code specifying the type of the resource record.
|
| 448 |
+
class,The code specifying the class of the resource record.
|
| 449 |
+
ttl,"The time interval for which the resource record can be cached before the
|
| 450 |
+
|
| 451 |
+
source of the information should again be queried."
|
| 452 |
+
data,"The payload or response to the DNS question for all responses encoded in
|
| 453 |
+
UTF-8 format"
|
| 454 |
+
binary_data,"The raw bytes of any non-UTF8 strings that might be included as part of a
|
| 455 |
+
DNS response."
|
| 456 |
+
name,The domain name.
|
| 457 |
+
prevalence,The prevalence of the domain within the customer's environment.
|
| 458 |
+
first_seen_time,First seen timestamp of the domain in the customer's environment.
|
| 459 |
+
last_seen_time,Last seen timestamp of the domain in the customer's environment.
|
| 460 |
+
registrar,"Registrar name . FOr example, ""Wild West Domains, Inc. (R120-LROR)"",
|
| 461 |
+
""GoDaddy.com, LLC"", or ""PDR LTD. D/B/A PUBLICDOMAINREGISTRY.COM""."
|
| 462 |
+
contact_email,Contact email address.
|
| 463 |
+
whois_server,Whois server name.
|
| 464 |
+
name_server,Repeated list of name servers.
|
| 465 |
+
creation_time,Domain creation time.
|
| 466 |
+
update_time,Last updated time.
|
| 467 |
+
expiration_time,Expiration time.
|
| 468 |
+
audit_update_time,Audit updated time.
|
| 469 |
+
status,"Domain status. See
|
| 470 |
+
https://www.icann.org/resources/pages/epp-status-codes-2014-06-16-en
|
| 471 |
+
for meanings of possible values"
|
| 472 |
+
registrant,Parsed contact information for the registrant of the domain.
|
| 473 |
+
admin,Parsed contact information for the administrative contact for the domain.
|
| 474 |
+
tech,Parsed contact information for the technical contact for the domain
|
| 475 |
+
billing,Parsed contact information for the billing contact of the domain.
|
| 476 |
+
zone,Parsed contact information for the zone.
|
| 477 |
+
whois_record_raw_text,WHOIS raw text.
|
| 478 |
+
registry_data_raw_text,Registry Data raw text.
|
| 479 |
+
iana_registrar_id,"IANA Registrar ID. See
|
| 480 |
+
https://www.iana.org/assignments/registrar-ids/registrar-ids.xhtml"
|
| 481 |
+
private_registration,"Indicates whether the domain appears to be using a private registration
|
| 482 |
+
|
| 483 |
+
service to mask the owner's contact information."
|
| 484 |
+
categories,Categories assign to the domain as retrieved from VirusTotal.
|
| 485 |
+
favicon,Includes difference hash and MD5 hash of the domain's favicon.
|
| 486 |
+
jarm,Domain's JARM hash.
|
| 487 |
+
last_dns_records,Domain's DNS records from the last scan.
|
| 488 |
+
last_dns_records_time,Date when the DNS records list was retrieved by VirusTotal.
|
| 489 |
+
last_https_certificate,SSL certificate object retrieved last time the domain was analyzed.
|
| 490 |
+
last_https_certificate_time,When the certificate was retrieved by VirusTotal.
|
| 491 |
+
popularity_ranks,"Domain's position in popularity ranks such as Alexa, Quantcast, Statvoo,
|
| 492 |
+
etc"
|
| 493 |
+
tags,List of representative attributes.
|
| 494 |
+
whois_time,Date of the last update of the WHOIS record.
|
| 495 |
+
from,The 'from' address.
|
| 496 |
+
reply_to,The 'reply to' address.
|
| 497 |
+
to,A list of 'to' addresses.
|
| 498 |
+
cc,A list of 'cc' addresses.
|
| 499 |
+
bcc,A list of 'bcc' addresses.
|
| 500 |
+
mail_id,The mail (or message) ID.
|
| 501 |
+
subject,The subject line(s) of the email.
|
| 502 |
+
bounce_address,"The envelope from address.
|
| 503 |
+
https://en.wikipedia.org/wiki/Bounce_address"
|
| 504 |
+
raw_md5,Favicon's MD5 hash.
|
| 505 |
+
dhash,Difference hash.
|
| 506 |
+
sha256,"The SHA256 hash of the file, as a hex-encoded string."
|
| 507 |
+
md5,"The MD5 hash of the file, as a hex-encoded string."
|
| 508 |
+
sha1,"The SHA1 hash of the file, as a hex-encoded string."
|
| 509 |
+
size,The size of the file in bytes.
|
| 510 |
+
full_path,The full path identifying the location of the file on the system.
|
| 511 |
+
mime_type,"The MIME (Multipurpose Internet Mail Extensions) type of the file,
|
| 512 |
+
for example ""PE"", ""PDF"", or ""powershell script""."
|
| 513 |
+
file_metadata,"Metadata associated with the file.
|
| 514 |
+
Deprecate FileMetadata in favor of using fields in File."
|
| 515 |
+
security_result,"Google Cloud Threat Intelligence (GCTI) security result for the file
|
| 516 |
+
including threat context and detection metadata."
|
| 517 |
+
pe_file,Metadata about the Portable Executable (PE) file.
|
| 518 |
+
ssdeep,Ssdeep of the file
|
| 519 |
+
vhash,Vhash of the file.
|
| 520 |
+
ahash,Deprecated. Use authentihash instead.
|
| 521 |
+
authentihash,Authentihash of the file.
|
| 522 |
+
file_type,FileType field.
|
| 523 |
+
capabilities_tags,Capabilities tags.
|
| 524 |
+
names,Names fields.
|
| 525 |
+
tags,Tags for the file.
|
| 526 |
+
last_modification_time,Timestamp when the file was last updated.
|
| 527 |
+
prevalence,Prevalence of the file hash in the customer's environment.
|
| 528 |
+
first_seen_time,Timestamp the file was first seen in the customer's environment.
|
| 529 |
+
last_seen_time,Timestamp the file was last seen in the customer's environment.
|
| 530 |
+
stat_mode,"The mode of the file. A bit string indicating the permissions and
|
| 531 |
+
privileges of the file."
|
| 532 |
+
stat_inode,The file identifier. Unique identifier of object within a file system.
|
| 533 |
+
stat_dev,The file system identifier to which the object belongs.
|
| 534 |
+
stat_nlink,Number of links to file.
|
| 535 |
+
stat_flags,User defined flags for file.
|
| 536 |
+
last_analysis_time,Timestamp the file was last analysed.
|
| 537 |
+
embedded_urls,Embedded URLs found in the file.
|
| 538 |
+
embedded_domains,Embedded domains found in the file.
|
| 539 |
+
embedded_ips,Embedded IP addresses found in the file.
|
| 540 |
+
exif_info,Exif metadata from different file formats extracted by exiftool.
|
| 541 |
+
signature_info,File signature information extracted from different tools.
|
| 542 |
+
pdf_info,Information about the PDF file structure.
|
| 543 |
+
first_submission_time,First submission time of the file.
|
| 544 |
+
last_submission_time,Last submission time of the file.
|
| 545 |
+
main_icon,Icon's relevant hashes.
|
| 546 |
+
id,Code sign identifier.
|
| 547 |
+
format,Code sign format.
|
| 548 |
+
compilation_time,Code sign timestamp
|
| 549 |
+
imphash,Imphash of the file.
|
| 550 |
+
entry_point,info.pe-entry-point.
|
| 551 |
+
entry_point_exiftool,info.exiftool.EntryPoint.
|
| 552 |
+
compilation_time,info.pe-timestamp.
|
| 553 |
+
compilation_exiftool_time,info.exiftool.TimeStamp.
|
| 554 |
+
section,FilemetadataSection fields.
|
| 555 |
+
imports,FilemetadataImports fields.
|
| 556 |
+
resource,FilemetadataPeResourceInfo fields.
|
| 557 |
+
resources_type_count,Deprecated: use resources_type_count_str.
|
| 558 |
+
resources_language_count,Deprecated: use resources_language_count_str.
|
| 559 |
+
resources_type_count_str,"Number of resources by resource type.
|
| 560 |
+
Example: RT_ICON: 10, RT_DIALOG: 5"
|
| 561 |
+
resources_language_count_str,"Number of resources by language.
|
| 562 |
+
Example: NEUTRAL: 20, ENGLISH US: 10"
|
| 563 |
+
signature_info,"FilemetadataSignatureInfo field.
|
| 564 |
+
deprecated, user File.signature_info instead."
|
| 565 |
+
verification_message,"Status of the certificate.
|
| 566 |
+
Valid values are ""Signed"", ""Unsigned"" or a description of the certificate
|
| 567 |
+
anomaly, if found."
|
| 568 |
+
verified,"True if verification_message == ""Signed"""
|
| 569 |
+
signer,Deprecated: use signers field.
|
| 570 |
+
signers,"File metadata signer information.
|
| 571 |
+
The order of the signers matters. Each element is a higher level
|
| 572 |
+
authority, being the last the root authority."
|
| 573 |
+
x509,List of certificates.
|
| 574 |
+
command,The FTP command.
|
| 575 |
+
product_object_id,"Product globally unique user object identifier, such as an LDAP Object
|
| 576 |
+
Identifier."
|
| 577 |
+
creation_time,"Group creation time.
|
| 578 |
+
Deprecated: creation_time should be populated in Attribute as generic
|
| 579 |
+
metadata."
|
| 580 |
+
group_display_name,"Group display name. e.g. ""Finance""."
|
| 581 |
+
attribute,Generic entity metadata attributes of the group.
|
| 582 |
+
email_addresses,Email addresses of the group.
|
| 583 |
+
windows_sid,Microsoft Windows SID of the group.
|
| 584 |
+
serial_number,Hardware serial number.
|
| 585 |
+
manufacturer,Hardware manufacturer.
|
| 586 |
+
model,Hardware model.
|
| 587 |
+
cpu_platform,"Platform of the hardware CPU (e.g. ""Intel Broadwell"")."
|
| 588 |
+
cpu_model,"Model description of the hardware CPU
|
| 589 |
+
(e.g. ""2.8 GHz Quad-Core Intel Core i5"")."
|
| 590 |
+
cpu_clock_speed,Clock speed of the hardware CPU in MHz.
|
| 591 |
+
cpu_max_clock_speed,Maximum possible clock speed of the hardware CPU in MHz.
|
| 592 |
+
cpu_number_cores,Number of CPU cores.
|
| 593 |
+
ram,Amount of the hardware ramdom access memory (RAM) in Mb.
|
| 594 |
+
method,"The HTTP request method
|
| 595 |
+
(e.g. ""GET"", ""POST"", ""PATCH"", ""DELETE"")."
|
| 596 |
+
referral_url,The URL for the HTTP referer.
|
| 597 |
+
user_agent,"The User-Agent request header which includes the application type,
|
| 598 |
+
operating system, software vendor or software version of the requesting
|
| 599 |
+
|
| 600 |
+
software user agent."
|
| 601 |
+
response_code,"The response status code, for example
|
| 602 |
+
200, 302, 404, or 500."
|
| 603 |
+
parsed_user_agent,The parsed user_agent string.
|
| 604 |
+
verdict,Describes reason a finding investigation was resolved.
|
| 605 |
+
reputation,Describes whether a finding was useful or not-useful.
|
| 606 |
+
severity_score,Severity score for a finding set by an analyst.
|
| 607 |
+
status,Describes the workflow status of a finding.
|
| 608 |
+
comments,Comment added by the Analyst.
|
| 609 |
+
priority,Priority of the Alert or Finding set by analyst.
|
| 610 |
+
root_cause,Root cause of the Alert or Finding set by analyst.
|
| 611 |
+
reason,Reason for closing the Case or Alert.
|
| 612 |
+
risk_score,Risk score for a finding set by an analyst.
|
| 613 |
+
key,The key.
|
| 614 |
+
value,The value.
|
| 615 |
+
rbac_enabled,Indicates whether this label can be used for Data RBAC
|
| 616 |
+
city,The city.
|
| 617 |
+
state,The state.
|
| 618 |
+
country_or_region,The country or region.
|
| 619 |
+
name,"Custom location name (e.g. building or site name like ""London Office"").
|
| 620 |
+
For cloud environments, this is the region (e.g. ""us-west2"")."
|
| 621 |
+
desk_name,"Desk name or individual location, typically for an employee in an
|
| 622 |
+
office.
|
| 623 |
+
(e.g. ""IN-BLR-BCPC-11-1121D"")."
|
| 624 |
+
floor_name,"Floor name, number or a combination of the two for a building.
|
| 625 |
+
(e.g. ""1-A"")."
|
| 626 |
+
region_latitude,Deprecated: use region_coordinates.
|
| 627 |
+
region_longitude,Deprecated: use region_coordinates.
|
| 628 |
+
region_coordinates,"Coordinates for the associated region.
|
| 629 |
+
See https://cloud.google.com/vision/docs/reference/rest/v1/LatLng
|
| 630 |
+
for a description of the fields."
|
| 631 |
+
js,"Number of /JS tags found in the PDF file. Should be the same as
|
| 632 |
+
javascript field in normal scenarios."
|
| 633 |
+
javascript,"Number of /JavaScript tags found in the PDF file. Should be the same as
|
| 634 |
+
the js field in normal scenarios."
|
| 635 |
+
launch_action_count,Number of /Launch tags found in the PDF file.
|
| 636 |
+
object_stream_count,Number of object streams.
|
| 637 |
+
endobj_count,Number of object definitions (endobj keyword).
|
| 638 |
+
header,PDF version.
|
| 639 |
+
acroform,Number of /AcroForm tags found in the PDF.
|
| 640 |
+
autoaction,Number of /AA tags found in the PDF.
|
| 641 |
+
embedded_file,Number of /EmbeddedFile tags found in the PDF.
|
| 642 |
+
encrypted,"Whether the document is encrypted or not. This is defined by the /Encrypt
|
| 643 |
+
tag."
|
| 644 |
+
flash,Number of /RichMedia tags found in the PDF.
|
| 645 |
+
jbig2_compression,Number of /JBIG2Decode tags found in the PDF.
|
| 646 |
+
obj_count,Number of objects definitions (obj keyword).
|
| 647 |
+
endstream_count,Number of defined stream objects (stream keyword).
|
| 648 |
+
page_count,Number of pages in the PDF.
|
| 649 |
+
stream_count,Number of defined stream objects (stream keyword).
|
| 650 |
+
openaction,Number of /OpenAction tags found in the PDF.
|
| 651 |
+
startxref,Number of startxref keywords in the PDF.
|
| 652 |
+
suspicious_colors,Number of colors expressed with more than 3 bytes (CVE-2009-3459).
|
| 653 |
+
trailer,Number of trailer keywords in the PDF.
|
| 654 |
+
xfa,Number of \XFA tags found in the PDF.
|
| 655 |
+
xref,Number of xref keywords in the PDF.
|
| 656 |
+
import_hash,Hash of PE imports.
|
| 657 |
+
name,Name of the permission (e.g. chronicle.analyst.updateRule).
|
| 658 |
+
description,Description of the permission (e.g. 'Ability to update detect rules').
|
| 659 |
+
type,Type of the permission.
|
| 660 |
+
platform,The platform operating system.
|
| 661 |
+
platform_version,"The platform software version (
|
| 662 |
+
e.g. ""Microsoft Windows 1803"")."
|
| 663 |
+
platform_patch_level,"The platform software patch level (
|
| 664 |
+
e.g. ""Build 17134.48"", ""SP1"")."
|
| 665 |
+
giver,Name of the rank serial number hexdump.
|
| 666 |
+
rank,Rank position.
|
| 667 |
+
ingestion_time,Timestamp when the rank was ingested.
|
| 668 |
+
rolling_max,"The maximum number of assets per day accessing the resource over the
|
| 669 |
+
trailing day_count days."
|
| 670 |
+
day_count,The number of days over which rolling_max is calculated.
|
| 671 |
+
rolling_max_sub_domains,"The maximum number of assets per day accessing the domain along with
|
| 672 |
+
|
| 673 |
+
sub-domains over the trailing day_count days. This field is only valid for
|
| 674 |
+
domains."
|
| 675 |
+
day_max,The max prevalence score in a day interval window.
|
| 676 |
+
day_max_sub_domains,"The max prevalence score in a day interval window across sub-domains. This
|
| 677 |
+
field is only valid for domains."
|
| 678 |
+
pid,The process ID.
|
| 679 |
+
parent_pid,"The ID of the parent process.
|
| 680 |
+
Deprecated: use parent_process.pid instead."
|
| 681 |
+
parent_process,Information about the parent process.
|
| 682 |
+
file,Information about the file in use by the process.
|
| 683 |
+
command_line,The command line command that created the process.
|
| 684 |
+
command_line_history,The command line history of the process.
|
| 685 |
+
product_specific_process_id,A product specific process id.
|
| 686 |
+
access_mask,A bit mask representing the level of access.
|
| 687 |
+
integrity_level_rid,The Microsoft Windows integrity level relative ID (RID) of the process.
|
| 688 |
+
token_elevation_type,"The elevation type of the process on Microsoft Windows. This determines if
|
| 689 |
+
any privileges are removed when UAC is enabled."
|
| 690 |
+
product_specific_parent_process_id,"A product specific id for the parent process.
|
| 691 |
+
Please use parent_process.product_specific_process_id instead."
|
| 692 |
+
registry_key,"Registry key associated with an application or system component
|
| 693 |
+
(e.g., HKEY_, HKCU\Environment...)."
|
| 694 |
+
registry_value_name,"Name of the registry value associated with an application or system
|
| 695 |
+
component (e.g. TEMP)."
|
| 696 |
+
registry_value_data,"Data associated with a registry value
|
| 697 |
+
(e.g. %USERPROFILE%\Local Settings\Temp)."
|
| 698 |
+
type,Deprecated: use resource_type instead.
|
| 699 |
+
resource_type,Resource type.
|
| 700 |
+
resource_subtype,"Resource sub-type (e.g. ""BigQuery"", ""Bigtable"")."
|
| 701 |
+
id,Deprecated: Use resource.name or resource.product_object_id.
|
| 702 |
+
name,"The full name of the resource. For example,
|
| 703 |
+
Google Cloud: //cloudresourcemanager.googleapis.com/projects/wombat-123,
|
| 704 |
+
and AWS: arn:aws:iam::123456789012:user/johndoe."
|
| 705 |
+
parent,"The parent of the resource.
|
| 706 |
+
For a database table, the parent is the database. For a storage object,
|
| 707 |
+
the bucket name. Deprecated: use resource_ancestors.name."
|
| 708 |
+
product_object_id,"A vendor-specific identifier to uniquely identify the entity (a GUID,
|
| 709 |
+
OID, or similar)"
|
| 710 |
+
attribute,Generic entity metadata attributes of the resource.
|
| 711 |
+
name,System role name for user.
|
| 712 |
+
description,System role description for user.
|
| 713 |
+
type,System role type for well known roles.
|
| 714 |
+
cert_signature,Certificate's signature and algorithm.
|
| 715 |
+
extension,(DEPRECATED) certificate's extension.
|
| 716 |
+
cert_extensions,Certificate's extensions.
|
| 717 |
+
first_seen_time,Date the certificate was first retrieved by VirusTotal.
|
| 718 |
+
issuer,Certificate's issuer data.
|
| 719 |
+
ec,EC public key information.
|
| 720 |
+
serial_number,Certificate's serial number hexdump.
|
| 721 |
+
signature_algorithm,"Algorithm used for the signature (for example, ""sha1RSA"")."
|
| 722 |
+
size,Certificate content length.
|
| 723 |
+
subject,Certificate's subject data.
|
| 724 |
+
thumbprint,Certificate's content SHA1 hash.
|
| 725 |
+
thumbprint_sha256,Certificate's content SHA256 hash.
|
| 726 |
+
validity,Certificate's validity period.
|
| 727 |
+
version,"Certificate version (typically ""V1"", ""V2"" or ""V3"")."
|
| 728 |
+
keyid,Key hexdump.
|
| 729 |
+
serial_number,Serial number hexdump.
|
| 730 |
+
signature,Signature.
|
| 731 |
+
signature_algorithm,Algorithm.
|
| 732 |
+
p,p component hexdump.
|
| 733 |
+
q,q component hexdump.
|
| 734 |
+
g,g component hexdump.
|
| 735 |
+
pub,Public key hexdump.
|
| 736 |
+
oid,Curve name.
|
| 737 |
+
pub,Public key hexdump.
|
| 738 |
+
ca,Whether the subject acts as a certificate authority (CA) or not.
|
| 739 |
+
subject_key_id,Identifies the public key being certified.
|
| 740 |
+
authority_key_id,"Identifies the public key to be used to verify the signature on this
|
| 741 |
+
certificate or CRL."
|
| 742 |
+
key_usage,The purpose for which the certified public key is used.
|
| 743 |
+
ca_info_access,"Authority information access locations are URLs that are added to a
|
| 744 |
+
certificate in its authority information access extension."
|
| 745 |
+
crl_distribution_points,"CRL distribution points to which a certificate user should refer to
|
| 746 |
+
ascertain if the certificate has been revoked."
|
| 747 |
+
extended_key_usage,"One or more purposes for which the certified public key may be used, in
|
| 748 |
+
addition to or in place of the basic purposes indicated in the key usage
|
| 749 |
+
extension field."
|
| 750 |
+
subject_alternative_name,"Contains one or more alternative names, using any of a variety of name
|
| 751 |
+
forms, for the entity that is bound by the CA to the certified public
|
| 752 |
+
key."
|
| 753 |
+
certificate_policies,"Different certificate policies will relate to different applications
|
| 754 |
+
which may use the certified key."
|
| 755 |
+
netscape_cert_comment,Used to include free-form text comments inside certificates.
|
| 756 |
+
cert_template_name_dc,"BMP data value ""DomainController"". See MS Q291010."
|
| 757 |
+
netscape_certificate,"Identify whether the certificate subject is an SSL client, an SSL server,
|
| 758 |
+
or a CA."
|
| 759 |
+
pe_logotype,Whether the certificate includes a logotype.
|
| 760 |
+
old_authority_key_id,Whether the certificate has an old authority key identifier extension.
|
| 761 |
+
algorithm,"Any of ""RSA"", ""DSA"" or ""EC"". Indicates the algorithm used to generate the
|
| 762 |
+
certificate."
|
| 763 |
+
rsa,RSA public key information.
|
| 764 |
+
key_size,Key size.
|
| 765 |
+
modulus,Key modulus hexdump.
|
| 766 |
+
exponent,Key exponent hexdump.
|
| 767 |
+
country_name,C: Country name.
|
| 768 |
+
common_name,CN: CommonName.
|
| 769 |
+
locality,L: Locality.
|
| 770 |
+
organization,O: Organization.
|
| 771 |
+
organizational_unit,OU: OrganizationalUnit.
|
| 772 |
+
state_or_province_name,ST: StateOrProvinceName.
|
| 773 |
+
expiry_time,Expiry date.
|
| 774 |
+
issue_time,Issue date.
|
| 775 |
+
confidence_score,Confidence score of the verdict.
|
| 776 |
+
verdict_time,Timestamp at which the verdict was generated.
|
| 777 |
+
verdict_response,Details of the verdict.
|
| 778 |
+
id,Unique association id generated by mandiant.
|
| 779 |
+
country_code,Country from which the threat actor/ malware is originated.
|
| 780 |
+
type,Signifies the type of association.
|
| 781 |
+
name,Name of the threat actor/malware.
|
| 782 |
+
description,Human readable description about the association.
|
| 783 |
+
role,Role of the malware. Not applicable for threat actor.
|
| 784 |
+
source_country,Name of the country the threat originated from.
|
| 785 |
+
alias,Different aliases of the threat actor given by different sources.
|
| 786 |
+
first_reference_time,First time the threat actor was referenced or seen.
|
| 787 |
+
last_reference_time,Last time the threat actor was referenced or seen.
|
| 788 |
+
industries_affected,List of industries the threat actor affects.
|
| 789 |
+
associated_actors,"List of associated threat actors for a malware. Not applicable for threat
|
| 790 |
+
actors."
|
| 791 |
+
region_code,"Name of the country, the threat is originating from."
|
| 792 |
+
sponsor_region,Sponsor region of the threat actor.
|
| 793 |
+
targeted_regions,Targeted regions.
|
| 794 |
+
tags,Tags.
|
| 795 |
+
name,Name of the alias.
|
| 796 |
+
company,Name of the provider who gave the association's name.
|
| 797 |
+
ioc_stats_type,Describes the source of the IoCStat.
|
| 798 |
+
first_level_source,"Name of first level IoC source, for example Mandiant or a third-party."
|
| 799 |
+
second_level_source,"Name of the second-level IoC source, for example Crowdsourced Threat
|
| 800 |
+
Analysis or Knowledge Graph."
|
| 801 |
+
benign_count,Count of responses where the IoC was identified as benign.
|
| 802 |
+
quality,Level of confidence in the IoC mapping extracted from the source.
|
| 803 |
+
malicious_count,Count of responses where the IoC was identified as malicious.
|
| 804 |
+
response_count,Total number of response from the source.
|
| 805 |
+
source_count,Number of sources from which information was extracted.
|
| 806 |
+
source_provider,Source provider giving the ML verdict.
|
| 807 |
+
benign_count,Count of responses where this IoC was marked benign.
|
| 808 |
+
malicious_count,Count of responses where this IoC was marked malicious.
|
| 809 |
+
confidence_score,Confidence score of the verdict.
|
| 810 |
+
mandiant_sources,List of mandiant sources from which the verdict was generated.
|
| 811 |
+
third_party_sources,List of third-party sources from which the verdict was generated.
|
| 812 |
+
name,Name of the IoC source.
|
| 813 |
+
benign_count,Count of responses where this IoC was marked benign.
|
| 814 |
+
malicious_count,Count of responses where this IoC was marked malicious.
|
| 815 |
+
quality,Quality of the IoC mapping extracted from the source.
|
| 816 |
+
response_count,Total response count from this source.
|
| 817 |
+
source_count,Number of sources from which intelligence was extracted.
|
| 818 |
+
threat_intelligence_sources,Different threat intelligence sources from which IoC info was extracted.
|
| 819 |
+
source_count,Number of sources from which intelligence was extracted.
|
| 820 |
+
response_count,Total response count across all sources.
|
| 821 |
+
neighbour_influence,Describes the neighbour influence of the verdict.
|
| 822 |
+
verdict,ML Verdict provided by sources like Mandiant.
|
| 823 |
+
analyst_verdict,Human analyst verdict provided by sources like Mandiant.
|
| 824 |
+
source_count,Number of sources from which intelligence was extracted.
|
| 825 |
+
response_count,Total response count across all sources.
|
| 826 |
+
neighbour_influence,Describes the near neighbor influence of the verdict.
|
| 827 |
+
verdict_type,Type of verdict.
|
| 828 |
+
source_provider,Source provider giving the machine learning verdict.
|
| 829 |
+
benign_count,Count of responses where this IoC was marked as benign.
|
| 830 |
+
malicious_count,Count of responses where this IoC was marked as malicious.
|
| 831 |
+
confidence_score,Confidence score of the verdict.
|
| 832 |
+
ioc_stats,List of IoCStats from which the verdict was generated.
|
| 833 |
+
verdict_time,Timestamp when the verdict was generated.
|
| 834 |
+
verdict_response,Details about the verdict.
|
| 835 |
+
global_customer_count,Global customer count over the last 30 days
|
| 836 |
+
global_hits_count,Global hit count over the last 30 days.
|
| 837 |
+
pwn,"Whether one or more Mandiant incident response customers had this
|
| 838 |
+
indicator in their environment."
|
| 839 |
+
category_details,Tags related to the verdict.
|
| 840 |
+
pwn_first_tagged_time,The timestamp of the first time a pwn was associated to this entity.
|
| 841 |
+
sigcheck,Signature information extracted from the sigcheck tool.
|
| 842 |
+
codesign,Signature information extracted from the codesign utility.
|
| 843 |
+
name,"Common name of the signers/certificate.
|
| 844 |
+
The order of the signers matters. Each element is a higher level
|
| 845 |
+
authority, the last being the root authority."
|
| 846 |
+
status,"It can say ""Valid"" or state the problem with the certificate if any (e.g.
|
| 847 |
+
""This certificate or one of the certificates in the certificate chain is
|
| 848 |
+
not time valid."")."
|
| 849 |
+
valid_usage,"Indicates which situations the certificate is valid for (e.g. ""Code
|
| 850 |
+
Signing"")."
|
| 851 |
+
cert_issuer,Company that issued the certificate.
|
| 852 |
+
helo,The client's 'HELO'/'EHLO' string.
|
| 853 |
+
mail_from,The client's 'MAIL FROM' string.
|
| 854 |
+
rcpt_to,The client's 'RCPT TO' string(s).
|
| 855 |
+
server_response,The server's response(s) to the client.
|
| 856 |
+
message_path,The message's path (extracted from the headers).
|
| 857 |
+
is_webmail,If the message was sent via a webmail client.
|
| 858 |
+
is_tls,If the connection switched to TLS.
|
| 859 |
+
name,The name of the software.
|
| 860 |
+
version,The version of the software.
|
| 861 |
+
permissions,"System permissions granted to the software.
|
| 862 |
+
For example, ""android.permission.WRITE_EXTERNAL_STORAGE"""
|
| 863 |
+
description,The description of the software.
|
| 864 |
+
vendor_name,The name of the software vendor.
|
| 865 |
+
tenant_id,A list of subtenant ids that this event belongs to.
|
| 866 |
+
data_tap_config_name,A list of sink name values defined in DataTap configurations.
|
| 867 |
+
interval,Interval duration of the leave.
|
| 868 |
+
description,Description of the leave if available (e.g. 'Vacation').
|
| 869 |
+
client,Certificate information for the client certificate.
|
| 870 |
+
server,Certificate information for the server certificate.
|
| 871 |
+
cipher,Cipher used during the connection.
|
| 872 |
+
curve,Elliptical curve used for a given cipher.
|
| 873 |
+
version,TLS version.
|
| 874 |
+
version_protocol,Protocol.
|
| 875 |
+
established,Indicates whether the TLS negotiation was successful.
|
| 876 |
+
next_protocol,Protocol to be used for tunnel.
|
| 877 |
+
resumed,"Indicates whether the TLS connection was resumed from a previous
|
| 878 |
+
TLS negotiation."
|
| 879 |
+
certificate,Client certificate.
|
| 880 |
+
ja3,"JA3 hash from the TLS ClientHello, as a hex-encoded string."
|
| 881 |
+
server_name,"Host name of the server, that the client is connecting to."
|
| 882 |
+
supported_ciphers,Ciphers supported by the client during client hello.
|
| 883 |
+
certificate,Server certificate.
|
| 884 |
+
ja3s,"JA3 hash from the TLS ServerHello, as a hex-encoded string."
|
| 885 |
+
tracker,Tracker name.
|
| 886 |
+
id,"Tracker ID, if available."
|
| 887 |
+
timestamp,Tracker ingestion date.
|
| 888 |
+
URL,Tracker script URL.
|
| 889 |
+
URL,URL.
|
| 890 |
+
categories,Categorisation done by VirusTotal partners.
|
| 891 |
+
favicon,Difference hash and MD5 hash of the URL's.
|
| 892 |
+
html_meta,Meta tags (only for URLs downloading HTML).
|
| 893 |
+
last_final_url,"If the original URL redirects, where does it end."
|
| 894 |
+
last_http_response_code,HTTP response code of the last response.
|
| 895 |
+
last_http_response_content_length,Length in bytes of the content received.
|
| 896 |
+
last_http_response_content_sha256,URL response body's SHA256 hash.
|
| 897 |
+
last_http_response_cookies,Website's cookies.
|
| 898 |
+
last_http_response_headers,Headers and values of the last HTTP response.
|
| 899 |
+
tags,Tags.
|
| 900 |
+
title,Webpage title.
|
| 901 |
+
trackers,Trackers found in the URL in a historical manner.
|
| 902 |
+
product_object_id,"A vendor-specific identifier to uniquely identify the entity (e.g. a GUID,
|
| 903 |
+
LDAP, OID, or similar)."
|
| 904 |
+
userid,The ID of the user.
|
| 905 |
+
user_display_name,"The display name of the user
|
| 906 |
+
(e.g. ""John Locke"")."
|
| 907 |
+
first_name,"First name of the user (e.g. ""John"")."
|
| 908 |
+
middle_name,Middle name of the user.
|
| 909 |
+
last_name,"Last name of the user (e.g. ""Locke"")."
|
| 910 |
+
phone_numbers,Phone numbers for the user.
|
| 911 |
+
personal_address,Personal address of the user.
|
| 912 |
+
attribute,Generic entity metadata attributes of the user.
|
| 913 |
+
first_seen_time,"The first observed time for a user.
|
| 914 |
+
The value is calculated on the basis of the
|
| 915 |
+
first time the identifier was observed."
|
| 916 |
+
account_type,"Type of user account (for example, service, domain, or cloud). This is
|
| 917 |
+
|
| 918 |
+
somewhat aligned to: https://attack.mitre.org/techniques/T1078/"
|
| 919 |
+
groupid,"The ID of the group that the user belongs to.
|
| 920 |
+
Deprecated in favor of the repeated group_identifiers field."
|
| 921 |
+
group_identifiers,"Product object identifiers of the group(s) the user belongs to
|
| 922 |
+
A vendor-specific identifier to uniquely identify the group(s) the user
|
| 923 |
+
belongs to (a GUID, LDAP OID, or similar)."
|
| 924 |
+
windows_sid,The Microsoft Windows SID of the user.
|
| 925 |
+
email_addresses,Email addresses of the user.
|
| 926 |
+
employee_id,Human capital management identifier.
|
| 927 |
+
title,User job title.
|
| 928 |
+
company_name,User job company name.
|
| 929 |
+
department,User job department
|
| 930 |
+
office_address,User job office location.
|
| 931 |
+
managers,User job manager(s).
|
| 932 |
+
hire_date,User job employment hire date.
|
| 933 |
+
termination_date,User job employment termination date.
|
| 934 |
+
time_off,User time off leaves from active work.
|
| 935 |
+
last_login_time,User last login timestamp.
|
| 936 |
+
last_password_change_time,User last password change timestamp.
|
| 937 |
+
password_expiration_time,User password expiration timestamp.
|
| 938 |
+
account_expiration_time,User account expiration timestamp.
|
| 939 |
+
account_lockout_time,User account lockout timestamp.
|
| 940 |
+
last_bad_password_attempt_time,User last bad password attempt timestamp.
|
| 941 |
+
user_authentication_status,System authentication status for user.
|
| 942 |
+
role_name,"System role name for user.
|
| 943 |
+
Deprecated: use attribute.roles."
|
| 944 |
+
role_description,"System role description for user.
|
| 945 |
+
Deprecated: use attribute.roles."
|
| 946 |
+
user_role,"System role for user.
|
| 947 |
+
Deprecated: use attribute.roles."
|
| 948 |
+
vulnerabilities,A list of vulnerabilities.
|
| 949 |
+
about,"If the vulnerability is about a specific noun (e.g. executable),
|
| 950 |
+
then add it here."
|
| 951 |
+
name,"Name of the vulnerability (e.g. ""Unsupported OS Version detected"")."
|
| 952 |
+
description,Description of the vulnerability.
|
| 953 |
+
vendor,Vendor of scan that discovered vulnerability.
|
| 954 |
+
scan_start_time,"If the vulnerability was discovered during an asset scan, then this
|
| 955 |
+
field should be populated with the time the scan started.
|
| 956 |
+
This field can be left unset if the start time is not available or not
|
| 957 |
+
applicable."
|
| 958 |
+
scan_end_time,"If the vulnerability was discovered during an asset scan, then this field
|
| 959 |
+
|
| 960 |
+
should be populated with the time the scan ended.
|
| 961 |
+
This field can be left unset if the end time is not available or not
|
| 962 |
+
applicable."
|
| 963 |
+
first_found,"Products that maintain a history of vuln scans should populate first_found
|
| 964 |
+
with the time that a scan first detected the vulnerability on this asset."
|
| 965 |
+
last_found,"Products that maintain a history of vuln scans should populate last_found
|
| 966 |
+
with the time that a scan last detected the vulnerability on this asset."
|
| 967 |
+
severity,The severity of the vulnerability.
|
| 968 |
+
severity_details,Vendor-specific severity
|
| 969 |
+
cvss_base_score,"CVSS Base Score in the range of 0.0 to 10.0.
|
| 970 |
+
Useful for sorting."
|
| 971 |
+
cvss_vector,"Vector of CVSS properties (e.g. ""AV:L/AC:H/Au:N/C:N/I:P/A:C"")
|
| 972 |
+
Can be linked to via:
|
| 973 |
+
|
| 974 |
+
https://nvd.nist.gov/vuln-metrics/cvss/v2-calculator"
|
| 975 |
+
cvss_version,Version of CVSS Vector/Score.
|
| 976 |
+
cve_id,"Common Vulnerabilities and Exposures Id.
|
| 977 |
+
https://en.wikipedia.org/wiki/Common_Vulnerabilities_and_Exposures
|
| 978 |
+
https://cve.mitre.org/about/faqs.html#what_is_cve_id"
|
| 979 |
+
cve_description,"Common Vulnerabilities and Exposures Description.
|
| 980 |
+
https://cve.mitre.org/about/faqs.html#what_is_cve_record"
|
| 981 |
+
vendor_vulnerability_id,Vendor specific vulnerability id (e.g. Microsoft security bulletin id).
|
| 982 |
+
vendor_knowledge_base_article_id,"Vendor specific knowledge base article (e.g. ""KBXXXXXX"" from Microsoft).
|
| 983 |
+
https://en.wikipedia.org/wiki/Microsoft_Knowledge_Base
|
| 984 |
+
https://access.redhat.com/knowledgebase"
|
| 985 |
+
name,Certificate name.
|
| 986 |
+
algorithm,Certificate algorithm.
|
| 987 |
+
thumbprint,Certificate thumbprint.
|
| 988 |
+
cert_issuer,Issuer of the certificate.
|
| 989 |
+
serial_number,Certificate serial number.
|