Sighting A sighting indicates that a particular entity or indicator was observed in an environment and can be an indication of a current or potential threat.
Property | Type | Description | Required? |
---|---|---|---|
confidence | HighMedLowString | ✓ | |
count | Integer | The number of times an indicator was observed within a certain period of time. For example, if an IP address associated with known malicious activity is observed once within a period of time, it may indicate a low-level threat. However, if the same IP address is observed multiple times within a short time frame, it may indicate a more severe and persistent threat. It can also be used to prioritize security alerts and indicate the urgency of a response. High counts indicate that an indicator is actively being used in a larger campaign, while low counts may indicate isolated incidents. | ✓ |
id | String | Globally unique URI identifying this object. | ✓ |
observed_time | ObservedTime Object | ✓ | |
schema_version | String | CTIM schema version for this entity. | ✓ |
type | SightingTypeIdentifierString | ✓ | |
context | Context Object | Context including the event type that best fits the type of the sighting. | |
data | SightingDataTable Object | An embedded data table for the Sighting. | |
description | MarkdownString | A description of object, which may be detailed. | |
external_ids | String List | It is used to store a list of external identifiers that can be linked to the incident, providing a reliable and manageable way to correlate and group related events across multiple data sources. It is especially useful in larger organizations that rely on multiple security information and event management (SIEM) systems to detect security incidents. For instance, it can be used to track events across different network sensors, intrusion detection and prevention systems (IDPS), or log management platforms. The field can also be used to facilitate automation and orchestration workflows, where additional information can be shared among incident management systems. It can be used to cross-reference with other external tools such as threat intelligence feeds and vulnerability scanners. | |
external_references | ExternalReference Object List | Specifies a list of external references which refers to non-CTIM information. Similar to external_ids field with major differences: - external_ids field is used to store a list of external identifiers that can be used to link entities across different data sources. These identifiers are typically standardized and well-known, such as CVE IDs, US-CERT advisories, or other industry-standard threat intelligence feeds. The external_ids field can be used to facilitate automation and orchestration workflows, where additional information can be shared among incident management systems. - external_references field, on the other hand, is used to provide a more general mechanism for linking entities to external sources of information. The external_references field can include references to blog posts, articles, external documents, threat intelligence reports, and other sources of information that may not have a standardized format or identifier. | |
internal | Boolean | If true , indicates that the sighting was reported from internal sources, such as an organization's own internal security tools or SOC. Internal sightings are often considered more reliable and actionable than external sightings, which are reported from external sources and may have a lower level of trustworthiness. Internal sightings can provide more context and can help identify potential threats that are unique to a particular environment or organization. Internal sightings can also help organizations prioritize their security response efforts by identifying threats that are specific to their environment and may not yet be widely known. | |
language | ShortStringString | The language field is used to specify the primary language of the affected system or the target of an attack. It can be used to provide additional context and information about the entity. The primary purpose of this field is to help analysts filter and prioritize entities based on their knowledge and expertise of different languages. For example, if an incident involves an attack on a system in a country where a specific language is predominant, the language field can be used to indicate that language, which can help analysts to quickly identify and respond to incidents that may be geographically or culturally relevant. This information can be used to prioritize incidents based on their potential impact. The language field can also be used to help with correlation of incidents across different systems and regions, as well as to help with data analysis and reporting. | |
observables | Observable Object List | The object(s) of interest. | |
relations | ObservedRelation Object List | Provide any context we can about where the observable came from. | |
resolution | ResolutionString | Represents the disposition or actions taken on the associated threat intelligence. | |
revision | Integer | A monotonically increasing revision, incremented each time the object is changed. | |
sensor | SensorString | The OpenC2 Actuator name that best fits the device that is creating this sighting (e.g. network.firewall) | |
sensor_coordinates | SensorCoordinates Object | ||
severity | SeverityString | ||
short_description | MedStringString | A single line, short summary of the object. | |
source | MedStringString | Represents the source of the intelligence that led to the creation of the entity. | |
source_uri | String | URI of the source of the intelligence that led to the creation of the entity. | |
targets | IdentitySpecification Object List | May include one or more targets that observed the associated indicator. Targets can include network devices, host devices, or other entities that are capable of detecting indicators of compromise. Can be used to assess the scope of potential threats, helping analysts understand which devices or components of the network may be vulnerable to attack. For example, if a particular malware strain is detected on several different systems within an organization, the targets field may indicate which systems are affected and which may need to be isolated or patched to prevent further spread. | |
timestamp | Inst (Date) | The time this object was created at, or last modified. | |
title | ShortStringString | A short title for this object, used as primary display and reference value. | |
tlp | TLPString | TLP stands for Traffic Light Protocol, which indicates precisely how a resource is intended to be shared, replicated, copied, etc. It is used to indicate the sensitivity of the information contained within the message. This allows recipients to determine the appropriate handling and dissemination of the information based on their clearance level and need-to-know. For example, an entity containing information about a critical vulnerability in a widely-used software might be marked as red , indicating that it should only be shared with a small group of highly trusted individuals who need to know in order to take appropriate action. On the other hand, a message containing more general information about security threats might be marked as amber or green , indicating that it can be shared more broadly within an organization. |
This entry is required
Context including the event type that best fits the type of the sighting.
The number of times an indicator was observed within a certain period of time. For example, if an IP address associated with known malicious activity is observed once within a period of time, it may indicate a low-level threat. However, if the same IP address is observed multiple times within a short time frame, it may indicate a more severe and persistent threat. It can also be used to prioritize security alerts and indicate the urgency of a response. High counts indicate that an indicator is actively being used in a larger campaign, while low counts may indicate isolated incidents.
This entry is required
An embedded data table for the Sighting.
A description of object, which may be detailed.
This entry is optional
It is used to store a list of external identifiers that can be linked to the incident, providing a reliable and manageable way to correlate and group related events across multiple data sources. It is especially useful in larger organizations that rely on multiple security information and event management (SIEM) systems to detect security incidents. For instance, it can be used to track events across different network sensors, intrusion detection and prevention systems (IDPS), or log management platforms. The field can also be used to facilitate automation and orchestration workflows, where additional information can be shared among incident management systems. It can be used to cross-reference with other external tools such as threat intelligence feeds and vulnerability scanners.
Specifies a list of external references which refers to non-CTIM information.
Similar to external_ids
field with major differences:
external_ids
field is used to store a list of external identifiers that can be used to link entities across different data sources. These identifiers are typically standardized and well-known, such as CVE IDs, US-CERT advisories, or other industry-standard threat intelligence feeds. The external_ids
field can be used to facilitate automation and orchestration workflows, where additional information can be shared among incident management systems.
external_references
field, on the other hand, is used to provide a more general mechanism for linking entities to external sources of information. The external_references
field can include references to blog posts, articles, external documents, threat intelligence reports, and other sources of information that may not have a standardized format or identifier.
Globally unique URI identifying this object.
This entry is required
https://www.domain.com/ctia/judgement/judgement-de305d54-75b4-431b-adb2-eb6b9e546014
for a Judgement. This ID type compares to the STIX id field. The optional STIX idref field is not used.If true
, indicates that the sighting was reported from internal sources, such as an organization's own internal security tools or SOC.
Internal sightings are often considered more reliable and actionable than external sightings, which are reported from external sources and may have a lower level of trustworthiness. Internal sightings can provide more context and can help identify potential threats that are unique to a particular environment or organization.
Internal sightings can also help organizations prioritize their security response efforts by identifying threats that are specific to their environment and may not yet be widely known.
The language
field is used to specify the primary language of the affected system or the target of an attack. It can be used to provide additional context and information about the entity. The primary purpose of this field is to help analysts filter and prioritize entities based on their knowledge and expertise of different languages.
For example, if an incident involves an attack on a system in a country where a specific language is predominant, the language
field can be used to indicate that language, which can help analysts to quickly identify and respond to incidents that may be geographically or culturally relevant. This information can be used to prioritize incidents based on their potential impact. The language
field can also be used to help with correlation of incidents across different systems and regions, as well as to help with data analysis and reporting.
This entry is optional
The object(s) of interest.
Provide any context we can about where the observable came from.
Represents the disposition or actions taken on the associated threat intelligence.
This entry is optional
A monotonically increasing revision, incremented each time the object is changed.
This entry is optional
CTIM schema version for this entity.
This entry is required
The OpenC2 Actuator name that best fits the device that is creating this sighting (e.g. network.firewall)
This entry is optional
This entry is optional
A single line, short summary of the object.
This entry is optional
Represents the source of the intelligence that led to the creation of the entity.
This entry is optional
URI of the source of the intelligence that led to the creation of the entity.
This entry is optional
May include one or more targets that observed the associated indicator. Targets can include network devices, host devices, or other entities that are capable of detecting indicators of compromise.
Can be used to assess the scope of potential threats, helping analysts understand which devices or components of the network may be vulnerable to attack. For example, if a particular malware strain is detected on several different systems within an organization, the targets
field may indicate which systems are affected and which may need to be isolated or patched to prevent further spread.
The time this object was created at, or last modified.
This entry is optional
A short title for this object, used as primary display and reference value.
This entry is optional
TLP stands for Traffic Light Protocol, which indicates precisely how a resource is intended to be shared, replicated, copied, etc.
It is used to indicate the sensitivity of the information contained within the message. This allows recipients to determine the appropriate handling and dissemination of the information based on their clearance level and need-to-know.
For example, an entity containing information about a critical vulnerability in a widely-used software might be marked as red
, indicating that it should only be shared with a small group of highly trusted individuals who need to know in order to take appropriate action. On the other hand, a message containing more general information about security threats might be marked as amber
or green
, indicating that it can be shared more broadly within an organization.
This entry is optional
This entry is required
ExternalReference External references are used to describe pointers to information represented outside of CTIM. For example, a Malware object could use an external reference to indicate an ID for that malware in an external database or a report could use references to represent source material.
Property | Type | Description | Required? |
---|---|---|---|
source_name | MedStringString | The source within which the external-reference is defined (system, registry, organization, etc.) | ✓ |
description | MarkdownString | ||
external_id | String | An identifier for the external reference content. | |
hashes | String List | Specifies a dictionary of hashes for the contents of the url. | |
url | String | A URL reference to an external resource. |
This entry is optional
An identifier for the external reference content.
Specifies a dictionary of hashes for the contents of the url.
The source within which the external-reference is defined (system, registry, organization, etc.)
This entry is required
A URL reference to an external resource.
This entry is optional
ObservedTime Period of time when a cyber observation is valid. start_time
must come before end_time
(if specified).
Property | Type | Description | Required? |
---|---|---|---|
start_time | Inst (Date) | Time of the observation. If the observation was made over a period of time, than this field indicates the start of that period. | ✓ |
end_time | Inst (Date) | If the observation was made over a period of time, than this field indicates the end of that period. |
If the observation was made over a period of time, than this field indicates the end of that period.
This entry is optional
Time of the observation. If the observation was made over a period of time, than this field indicates the start of that period.
This entry is required
SightingDataTable An embedded data table for sightings data.
Property | Type | Description | Required? |
---|---|---|---|
columns | ColumnDefinition Object List | an ordered list of column definitions | ✓ |
rows | Anything List | an ordered list of rows | ✓ |
row_count | Integer | The number of rows in the data table. |
an ordered list of column definitions
The number of rows in the data table.
an ordered list of rows
Property | Type | Description | Required? |
---|---|---|---|
name | String | ✓ | |
type | ColumnTypeString | ✓ | |
description | MarkdownString | ||
required | Boolean | If true , the row entries for this column cannot contain nulls . Defaults to true . | |
short_description | String |
This entry is optional
If true
, the row entries for this column cannot contain nulls
. Defaults to true
.
This entry is required
SensorCoordinates Describes the device that made the sighting (sensor) and contains identifying observables for the sensor.
Property | Type | Description | Required? |
---|---|---|---|
observables | Observable Object List | ✓ | |
type | SensorString | ✓ | |
os | String |
This entry is required
Observable A simple, atomic value which has a consistent identity, and is stable enough to be attributed an intent or nature. This is the classic 'indicator' which might appear in a data feed of bad IPs, or bad Domains. These do not exist as objects within the CTIA storage model, so you never create an observable.
Property | Type | Description | Required? |
---|---|---|---|
type | ObservableTypeIdentifierString | The type of observable. | ✓ |
value | String | The value of the observable. | ✓ |
The type of observable.
This entry is required
The value of the observable.
IdentitySpecification Describes the target of the sighting and contains identifying observables for the target.
Property | Type | Description | Required? |
---|---|---|---|
observables | Observable Object List | ✓ | |
observed_time | ObservedTime Object | ✓ | |
type | SensorString | ✓ | |
os | String |
This entry is required
ObservedTime Period of time when a cyber observation is valid. start_time
must come before end_time
(if specified).
Property | Type | Description | Required? |
---|---|---|---|
start_time | Inst (Date) | Time of the observation. If the observation was made over a period of time, than this field indicates the start of that period. | ✓ |
end_time | Inst (Date) | If the observation was made over a period of time, than this field indicates the end of that period. |
If the observation was made over a period of time, than this field indicates the end of that period.
This entry is optional
Time of the observation. If the observation was made over a period of time, than this field indicates the start of that period.
This entry is required
Observable A simple, atomic value which has a consistent identity, and is stable enough to be attributed an intent or nature. This is the classic 'indicator' which might appear in a data feed of bad IPs, or bad Domains. These do not exist as objects within the CTIA storage model, so you never create an observable.
Property | Type | Description | Required? |
---|---|---|---|
type | ObservableTypeIdentifierString | The type of observable. | ✓ |
value | String | The value of the observable. | ✓ |
The type of observable.
This entry is required
The value of the observable.
Observable A simple, atomic value which has a consistent identity, and is stable enough to be attributed an intent or nature. This is the classic 'indicator' which might appear in a data feed of bad IPs, or bad Domains. These do not exist as objects within the CTIA storage model, so you never create an observable.
Property | Type | Description | Required? |
---|---|---|---|
type | ObservableTypeIdentifierString | The type of observable. | ✓ |
value | String | The value of the observable. | ✓ |
The type of observable.
This entry is required
The value of the observable.
ObservedRelation A relation inside a Sighting.
Property | Type | Description | Required? |
---|---|---|---|
origin | String | ✓ | |
related | Observable Object | ✓ | |
relation | ObservableRelationTypeString | ✓ | |
source | Observable Object | ✓ | |
origin_uri | String | ||
relation_info | Object |
This entry is optional
This entry is required
Observable A simple, atomic value which has a consistent identity, and is stable enough to be attributed an intent or nature. This is the classic 'indicator' which might appear in a data feed of bad IPs, or bad Domains. These do not exist as objects within the CTIA storage model, so you never create an observable.
Property | Type | Description | Required? |
---|---|---|---|
type | ObservableTypeIdentifierString | The type of observable. | ✓ |
value | String | The value of the observable. | ✓ |
The type of observable.
This entry is required
The value of the observable.
Observable A simple, atomic value which has a consistent identity, and is stable enough to be attributed an intent or nature. This is the classic 'indicator' which might appear in a data feed of bad IPs, or bad Domains. These do not exist as objects within the CTIA storage model, so you never create an observable.
Property | Type | Description | Required? |
---|---|---|---|
type | ObservableTypeIdentifierString | The type of observable. | ✓ |
value | String | The value of the observable. | ✓ |
The type of observable.
This entry is required
The value of the observable.
Property | Type | Description | Required? |
---|---|---|---|
Keyword | Anything | ✓ |
Property | Type | Description | Required? |
---|---|---|---|
file_create_events | FileCreateType Object List | a list of FileCreateType | |
file_delete_events | FileDeleteType Object List | a list of FileDeleteType | |
file_modify_events | FileModifyType Object List | a list of FileModifyType | |
file_move_events | FileMoveType Object List | a list of FileMoveType | |
http_events | HTTPType Object List | a list of HTTPType | |
library_load_events | LibraryLoadType Object List | a list of LibraryLoadType | |
netflow_events | NetflowType Object List | a list of NetflowType | |
process_create_events | ProcessCreateType Object List | a list of ProcessCreate | |
registry_create_events | RegistryCreateType Object List | a list of RegistryCreateType | |
registry_delete_events | RegistryDeleteType Object List | a list of RegistryDeleteType | |
registry_rename_events | RegistryRenameType Object List | a list of RegistryRenameType | |
registry_set_events | RegistrySetType Object List | a list of RegistrySetType |
a list of FileCreateType
a list of FileDeleteType
a list of FileModifyType
a list of FileMoveType
a list of HTTPType
a list of LibraryLoadType
a list of NetflowType
a list of ProcessCreate
a list of RegistryCreateType
a list of RegistryDeleteType
a list of RegistryRenameType
a list of RegistrySetType
Property | Type | Description | Required? |
---|---|---|---|
process_id | Integer | ✓ | |
process_name | ShortStringString | ✓ | |
registry_key | ShortStringString | ✓ | |
registry_old_key | ShortStringString | ✓ | |
time | ObservedTime Object | ✓ | |
type | RegistryRenameTypeIdentifierString | ✓ | |
process_guid | Integer | ||
process_username | ShortStringString |
This entry is required
This entry is optional
This entry is required
This entry is required
This entry is required
ObservedTime Period of time when a cyber observation is valid. start_time
must come before end_time
(if specified).
Property | Type | Description | Required? |
---|---|---|---|
start_time | Inst (Date) | Time of the observation. If the observation was made over a period of time, than this field indicates the start of that period. | ✓ |
end_time | Inst (Date) | If the observation was made over a period of time, than this field indicates the end of that period. |
If the observation was made over a period of time, than this field indicates the end of that period.
This entry is optional
Time of the observation. If the observation was made over a period of time, than this field indicates the start of that period.
This entry is required
Property | Type | Description | Required? |
---|---|---|---|
process_id | Integer | ✓ | |
process_name | ShortStringString | ✓ | |
registry_key | ShortStringString | ✓ | |
time | ObservedTime Object | ✓ | |
type | RegistryDeleteTypeIdentifierString | ✓ | |
process_guid | Integer | ||
process_username | ShortStringString | ||
registry_value | MedStringString |
This entry is required
This entry is optional
This entry is required
This entry is optional
This entry is required
ObservedTime Period of time when a cyber observation is valid. start_time
must come before end_time
(if specified).
Property | Type | Description | Required? |
---|---|---|---|
start_time | Inst (Date) | Time of the observation. If the observation was made over a period of time, than this field indicates the start of that period. | ✓ |
end_time | Inst (Date) | If the observation was made over a period of time, than this field indicates the end of that period. |
If the observation was made over a period of time, than this field indicates the end of that period.
This entry is optional
Time of the observation. If the observation was made over a period of time, than this field indicates the start of that period.
This entry is required
Property | Type | Description | Required? |
---|---|---|---|
process_id | Integer | ✓ | |
process_name | ShortStringString | ✓ | |
registry_key | ShortStringString | ✓ | |
registry_value | MedStringString | ✓ | |
time | ObservedTime Object | ✓ | |
type | RegistrySetTypeIdentifierString | ✓ | |
process_guid | Integer | ||
process_username | ShortStringString | ||
registry_data | LongStringString | ||
registry_data_length | Integer |
This entry is required
This entry is optional
This entry is optional
This entry is required
This entry is required
This entry is required
ObservedTime Period of time when a cyber observation is valid. start_time
must come before end_time
(if specified).
Property | Type | Description | Required? |
---|---|---|---|
start_time | Inst (Date) | Time of the observation. If the observation was made over a period of time, than this field indicates the start of that period. | ✓ |
end_time | Inst (Date) | If the observation was made over a period of time, than this field indicates the end of that period. |
If the observation was made over a period of time, than this field indicates the end of that period.
This entry is optional
Time of the observation. If the observation was made over a period of time, than this field indicates the start of that period.
This entry is required
Property | Type | Description | Required? |
---|---|---|---|
process_id | Integer | ✓ | |
process_name | ShortStringString | ✓ | |
registry_key | ShortStringString | ✓ | |
time | ObservedTime Object | ✓ | |
type | RegistryCreateTypeIdentifierString | ✓ | |
process_guid | Integer | ||
process_username | ShortStringString |
This entry is required
This entry is optional
This entry is required
This entry is required
ObservedTime Period of time when a cyber observation is valid. start_time
must come before end_time
(if specified).
Property | Type | Description | Required? |
---|---|---|---|
start_time | Inst (Date) | Time of the observation. If the observation was made over a period of time, than this field indicates the start of that period. | ✓ |
end_time | Inst (Date) | If the observation was made over a period of time, than this field indicates the end of that period. |
If the observation was made over a period of time, than this field indicates the end of that period.
This entry is optional
Time of the observation. If the observation was made over a period of time, than this field indicates the start of that period.
This entry is required
Property | Type | Description | Required? |
---|---|---|---|
host | ShortStringString | ✓ | |
process_id | Integer | ✓ | |
process_name | ShortStringString | ✓ | |
time | ObservedTime Object | ✓ | |
traffic | Traffic Object | ✓ | |
type | HTTPTypeIdentifierString | ✓ | |
encrypted | Boolean | ||
method | HTTPMethodString | ||
process_guid | Integer | ||
process_username | ShortStringString | ||
query | LongStringString | ||
url_port | Integer |
This entry is required
This entry is optional
This entry is required
This entry is optional
This entry is optional
This entry is required
Property | Type | Description | Required? |
---|---|---|---|
destination_ip | String | ✓ | |
destination_port | Integer | ✓ | |
direction | TrafficDirectionString | ✓ | |
protocol | Integer | The IP protocol id | ✓ |
source_ip | String | ✓ | |
source_port | Integer | ✓ | |
destination_host_name | String | ||
destination_subnet | String | ||
source_subnet | String |
This entry is required
The IP protocol id
ObservedTime Period of time when a cyber observation is valid. start_time
must come before end_time
(if specified).
Property | Type | Description | Required? |
---|---|---|---|
start_time | Inst (Date) | Time of the observation. If the observation was made over a period of time, than this field indicates the start of that period. | ✓ |
end_time | Inst (Date) | If the observation was made over a period of time, than this field indicates the end of that period. |
If the observation was made over a period of time, than this field indicates the end of that period.
This entry is optional
Time of the observation. If the observation was made over a period of time, than this field indicates the start of that period.
This entry is required
Property | Type | Description | Required? |
---|---|---|---|
process_id | Integer | ✓ | |
process_name | ShortStringString | ✓ | |
time | ObservedTime Object | ✓ | |
traffic | Traffic Object | ✓ | |
type | NetflowTypeIdentifierString | ✓ | |
byte_count_in | Integer | ||
byte_count_out | Integer | ||
flow_time | Inst (Date) | ||
parent_process_account | ShortStringString | ||
parent_process_account_type | ShortStringString | ||
parent_process_args | ShortStringString | ||
parent_process_hash | ShortStringString | ||
parent_process_id | Integer | ||
parent_process_name | ShortStringString | ||
parent_process_path | ShortStringString | ||
process_account | ShortStringString | ||
process_account_type | ShortStringString | ||
process_args | ShortStringString | ||
process_guid | Integer | ||
process_hash | ShortStringString | ||
process_path | ShortStringString | ||
process_username | ShortStringString |
This entry is optional
This entry is optional
This entry is optional
This entry is optional
This entry is optional
This entry is optional
This entry is optional
This entry is optional
This entry is optional
This entry is optional
This entry is optional
This entry is required
This entry is optional
This entry is optional
This entry is required
Property | Type | Description | Required? |
---|---|---|---|
destination_ip | String | ✓ | |
destination_port | Integer | ✓ | |
direction | TrafficDirectionString | ✓ | |
protocol | Integer | The IP protocol id | ✓ |
source_ip | String | ✓ | |
source_port | Integer | ✓ | |
destination_host_name | String | ||
destination_subnet | String | ||
source_subnet | String |
This entry is required
The IP protocol id
ObservedTime Period of time when a cyber observation is valid. start_time
must come before end_time
(if specified).
Property | Type | Description | Required? |
---|---|---|---|
start_time | Inst (Date) | Time of the observation. If the observation was made over a period of time, than this field indicates the start of that period. | ✓ |
end_time | Inst (Date) | If the observation was made over a period of time, than this field indicates the end of that period. |
If the observation was made over a period of time, than this field indicates the end of that period.
This entry is optional
Time of the observation. If the observation was made over a period of time, than this field indicates the start of that period.
This entry is required
Property | Type | Description | Required? |
---|---|---|---|
file_name | ShortStringString | ✓ | |
file_path | MedStringString | ✓ | |
new_name | ShortStringString | ✓ | |
old_name | ShortStringString | ✓ | |
process_id | Integer | ✓ | |
process_name | ShortStringString | ✓ | |
time | ObservedTime Object | ✓ | |
type | FileMoveTypeIdentifierString | ✓ | |
process_guid | Integer | ||
process_username | ShortStringString |
This entry is required
This entry is required
This entry is required
This entry is required
This entry is required
This entry is optional
This entry is required
ObservedTime Period of time when a cyber observation is valid. start_time
must come before end_time
(if specified).
Property | Type | Description | Required? |
---|---|---|---|
start_time | Inst (Date) | Time of the observation. If the observation was made over a period of time, than this field indicates the start of that period. | ✓ |
end_time | Inst (Date) | If the observation was made over a period of time, than this field indicates the end of that period. |
If the observation was made over a period of time, than this field indicates the end of that period.
This entry is optional
Time of the observation. If the observation was made over a period of time, than this field indicates the start of that period.
This entry is required
Property | Type | Description | Required? |
---|---|---|---|
file_name | ShortStringString | ✓ | |
file_path | MedStringString | ✓ | |
process_id | Integer | ✓ | |
process_name | ShortStringString | ✓ | |
time | ObservedTime Object | ✓ | |
type | FileModifyTypeIdentifierString | ✓ | |
failed | Boolean | ||
process_guid | Integer | ||
process_username | ShortStringString |
This entry is required
This entry is required
This entry is required
This entry is optional
This entry is required
ObservedTime Period of time when a cyber observation is valid. start_time
must come before end_time
(if specified).
Property | Type | Description | Required? |
---|---|---|---|
start_time | Inst (Date) | Time of the observation. If the observation was made over a period of time, than this field indicates the start of that period. | ✓ |
end_time | Inst (Date) | If the observation was made over a period of time, than this field indicates the end of that period. |
If the observation was made over a period of time, than this field indicates the end of that period.
This entry is optional
Time of the observation. If the observation was made over a period of time, than this field indicates the start of that period.
This entry is required
Property | Type | Description | Required? |
---|---|---|---|
file_name | ShortStringString | ✓ | |
file_path | MedStringString | ✓ | |
process_id | Integer | ✓ | |
process_name | ShortStringString | ✓ | |
time | ObservedTime Object | ✓ | |
type | FileDeleteTypeIdentifierString | ✓ | |
failed | Boolean | ||
process_guid | Integer | ||
process_username | ShortStringString |
This entry is required
This entry is required
This entry is required
This entry is optional
This entry is required
ObservedTime Period of time when a cyber observation is valid. start_time
must come before end_time
(if specified).
Property | Type | Description | Required? |
---|---|---|---|
start_time | Inst (Date) | Time of the observation. If the observation was made over a period of time, than this field indicates the start of that period. | ✓ |
end_time | Inst (Date) | If the observation was made over a period of time, than this field indicates the end of that period. |
If the observation was made over a period of time, than this field indicates the end of that period.
This entry is optional
Time of the observation. If the observation was made over a period of time, than this field indicates the start of that period.
This entry is required
Property | Type | Description | Required? |
---|---|---|---|
file_name | ShortStringString | ✓ | |
file_path | MedStringString | ✓ | |
process_id | Integer | ✓ | |
process_name | ShortStringString | ✓ | |
time | ObservedTime Object | ✓ | |
type | FileCreateTypeIdentifierString | ✓ | |
failed | Boolean | ||
process_guid | Integer | ||
process_username | ShortStringString |
This entry is required
This entry is required
This entry is required
This entry is optional
This entry is required
ObservedTime Period of time when a cyber observation is valid. start_time
must come before end_time
(if specified).
Property | Type | Description | Required? |
---|---|---|---|
start_time | Inst (Date) | Time of the observation. If the observation was made over a period of time, than this field indicates the start of that period. | ✓ |
end_time | Inst (Date) | If the observation was made over a period of time, than this field indicates the end of that period. |
If the observation was made over a period of time, than this field indicates the end of that period.
This entry is optional
Time of the observation. If the observation was made over a period of time, than this field indicates the start of that period.
This entry is required
Property | Type | Description | Required? |
---|---|---|---|
dll_library_name | ShortStringString | ✓ | |
dll_library_path | MedStringString | ✓ | |
process_id | Integer | ✓ | |
process_name | ShortStringString | ✓ | |
time | ObservedTime Object | ✓ | |
type | LibraryLoadTypeIdentifierString | ✓ | |
process_guid | Integer | ||
process_username | ShortStringString |
This entry is required
This entry is required
This entry is required
This entry is optional
This entry is required
ObservedTime Period of time when a cyber observation is valid. start_time
must come before end_time
(if specified).
Property | Type | Description | Required? |
---|---|---|---|
start_time | Inst (Date) | Time of the observation. If the observation was made over a period of time, than this field indicates the start of that period. | ✓ |
end_time | Inst (Date) | If the observation was made over a period of time, than this field indicates the end of that period. |
If the observation was made over a period of time, than this field indicates the end of that period.
This entry is optional
Time of the observation. If the observation was made over a period of time, than this field indicates the start of that period.
This entry is required
Property | Type | Description | Required? |
---|---|---|---|
process_id | Integer | ✓ | |
process_name | ShortStringString | ✓ | |
time | ObservedTime Object | ✓ | |
type | ProcessCreateTypeIdentifierString | ✓ | |
parent_creation_time | Inst (Date) | ||
parent_process_args | MedStringString | ||
parent_process_disposition | ShortStringString | ||
parent_process_guid | Integer | ||
parent_process_hash | MedStringString | ||
parent_process_id | Integer | ||
parent_process_name | ShortStringString | ||
parent_process_size | Integer | ||
parent_process_username | ShortStringString | ||
process_args | MedStringString | ||
process_disposition | ShortStringString | ||
process_guid | Integer | ||
process_hash | MedStringString | ||
process_size | Integer | ||
process_username | ShortStringString |
This entry is optional
This entry is optional
This entry is optional
This entry is optional
This entry is optional
This entry is optional
This entry is optional
This entry is optional
This entry is optional
This entry is required
This entry is optional
This entry is required
ObservedTime Period of time when a cyber observation is valid. start_time
must come before end_time
(if specified).
Property | Type | Description | Required? |
---|---|---|---|
start_time | Inst (Date) | Time of the observation. If the observation was made over a period of time, than this field indicates the start of that period. | ✓ |
end_time | Inst (Date) | If the observation was made over a period of time, than this field indicates the end of that period. |
If the observation was made over a period of time, than this field indicates the end of that period.
This entry is optional
Time of the observation. If the observation was made over a period of time, than this field indicates the start of that period.
This entry is required
Can you improve this documentation? These fine people already did:
Stephen Sloan, Ag Ibragimov, Guillaume Erétéo, Matthieu Sprunck, jyoverma, Guillaume Buisson, Scott McLeod, Ambrose Bonnaire-Sergeant, Craig Brozefsky, Yann Esposito, t2sw, bswanson, Yann Esposito (Yogsototh), Kirill Chernyshov, Mark Herman & Guillaume ERETEOEdit on GitHub
cljdoc is a website building & hosting documentation for Clojure/Script libraries
× close