schemas/v1/alerts/ransomware_event.yaml (9,701 lines of code) (raw):
'@timestamp':
dashed_name: timestamp
description: 'Date/time when the event originated.
This is the date/time extracted from the event, typically representing when the
event was generated by the source.
If the event source has no original timestamp, this value is typically populated
by the first time the event was received by the pipeline.
Required field for all events.'
example: '2016-05-23T08:05:34.853Z'
flat_name: '@timestamp'
level: core
name: '@timestamp'
normalize: []
required: true
short: Date/time when the event originated.
type: date
Endpoint.policy:
dashed_name: Endpoint-policy
description: The policy fields are used to hold information about applied policy.
flat_name: Endpoint.policy
level: custom
name: policy
normalize: []
short: The policy fields are used to hold information about applied policy.
type: object
Endpoint.policy.applied:
dashed_name: Endpoint-policy-applied
description: information about the policy that is applied
flat_name: Endpoint.policy.applied
level: custom
name: policy.applied
normalize: []
short: information about the policy that is applied
type: object
Endpoint.policy.applied.artifacts:
dashed_name: Endpoint-policy-applied-artifacts
description: information about protection artifacts applied.
flat_name: Endpoint.policy.applied.artifacts
level: custom
name: policy.applied.artifacts
normalize: []
short: information about protection artifacts applied.
type: object
Endpoint.policy.applied.artifacts.global:
dashed_name: Endpoint-policy-applied-artifacts-global
description: information about global protection artifacts applied.
flat_name: Endpoint.policy.applied.artifacts.global
level: custom
name: policy.applied.artifacts.global
normalize: []
short: information about global protection artifacts applied.
type: object
Endpoint.policy.applied.artifacts.global.channel:
dashed_name: Endpoint-policy-applied-artifacts-global-channel
description: global artifacts rollout channel
flat_name: Endpoint.policy.applied.artifacts.global.channel
ignore_above: 1024
level: custom
name: policy.applied.artifacts.global.channel
normalize: []
short: global artifacts rollout channel
type: keyword
Endpoint.policy.applied.artifacts.global.identifiers:
dashed_name: Endpoint-policy-applied-artifacts-global-identifiers
description: the identifiers of global artifacts applied.
flat_name: Endpoint.policy.applied.artifacts.global.identifiers
level: custom
name: policy.applied.artifacts.global.identifiers
normalize: []
short: the identifiers of global artifacts applied.
type: nested
Endpoint.policy.applied.artifacts.global.identifiers.name:
dashed_name: Endpoint-policy-applied-artifacts-global-identifiers-name
description: the name of global artifact applied.
flat_name: Endpoint.policy.applied.artifacts.global.identifiers.name
ignore_above: 1024
level: custom
name: policy.applied.artifacts.global.identifiers.name
normalize: []
short: the name of global artifact applied.
type: keyword
Endpoint.policy.applied.artifacts.global.identifiers.sha256:
dashed_name: Endpoint-policy-applied-artifacts-global-identifiers-sha256
description: the sha256 of global artifacts applied.
flat_name: Endpoint.policy.applied.artifacts.global.identifiers.sha256
ignore_above: 1024
level: custom
name: policy.applied.artifacts.global.identifiers.sha256
normalize: []
short: the sha256 of global artifacts applied.
type: keyword
Endpoint.policy.applied.artifacts.global.snapshot:
dashed_name: Endpoint-policy-applied-artifacts-global-snapshot
description: the snapshot date of applied global artifacts or 'latest'
flat_name: Endpoint.policy.applied.artifacts.global.snapshot
ignore_above: 1024
level: custom
name: policy.applied.artifacts.global.snapshot
normalize: []
short: the snapshot date of applied global artifacts or 'latest'
type: keyword
Endpoint.policy.applied.artifacts.global.update_age:
dashed_name: Endpoint-policy-applied-artifacts-global-update-age
description: number of days since global artifacts were made up-to-date
flat_name: Endpoint.policy.applied.artifacts.global.update_age
level: custom
name: policy.applied.artifacts.global.update_age
normalize: []
short: number of days since global artifacts were made up-to-date
type: unsigned_long
Endpoint.policy.applied.artifacts.global.version:
dashed_name: Endpoint-policy-applied-artifacts-global-version
description: the version of global artifacts applied.
flat_name: Endpoint.policy.applied.artifacts.global.version
ignore_above: 1024
level: custom
name: policy.applied.artifacts.global.version
normalize: []
short: the version of global artifacts applied.
type: keyword
Endpoint.policy.applied.artifacts.user:
dashed_name: Endpoint-policy-applied-artifacts-user
description: information about user protection artifacts applied.
flat_name: Endpoint.policy.applied.artifacts.user
level: custom
name: policy.applied.artifacts.user
normalize: []
short: information about user protection artifacts applied.
type: object
Endpoint.policy.applied.artifacts.user.identifiers:
dashed_name: Endpoint-policy-applied-artifacts-user-identifiers
description: the identifiers of user artifacts applied.
flat_name: Endpoint.policy.applied.artifacts.user.identifiers
level: custom
name: policy.applied.artifacts.user.identifiers
normalize: []
short: the identifiers of user artifacts applied.
type: nested
Endpoint.policy.applied.artifacts.user.identifiers.name:
dashed_name: Endpoint-policy-applied-artifacts-user-identifiers-name
description: the name of user artifact applied.
flat_name: Endpoint.policy.applied.artifacts.user.identifiers.name
ignore_above: 1024
level: custom
name: policy.applied.artifacts.user.identifiers.name
normalize: []
short: the name of user artifact applied.
type: keyword
Endpoint.policy.applied.artifacts.user.identifiers.sha256:
dashed_name: Endpoint-policy-applied-artifacts-user-identifiers-sha256
description: the sha256 of user artifacts applied.
flat_name: Endpoint.policy.applied.artifacts.user.identifiers.sha256
ignore_above: 1024
level: custom
name: policy.applied.artifacts.user.identifiers.sha256
normalize: []
short: the sha256 of user artifacts applied.
type: keyword
Endpoint.policy.applied.artifacts.user.version:
dashed_name: Endpoint-policy-applied-artifacts-user-version
description: the version of user artifacts applied.
flat_name: Endpoint.policy.applied.artifacts.user.version
ignore_above: 1024
level: custom
name: policy.applied.artifacts.user.version
normalize: []
short: the version of user artifacts applied.
type: keyword
Endpoint.policy.applied.id:
dashed_name: Endpoint-policy-applied-id
description: the id of the applied policy
flat_name: Endpoint.policy.applied.id
ignore_above: 1024
level: custom
name: policy.applied.id
normalize: []
short: the id of the applied policy
type: keyword
Endpoint.policy.applied.name:
dashed_name: Endpoint-policy-applied-name
description: the name of this applied policy
flat_name: Endpoint.policy.applied.name
ignore_above: 1024
level: custom
name: policy.applied.name
normalize: []
short: the name of this applied policy
type: keyword
Endpoint.policy.applied.status:
dashed_name: Endpoint-policy-applied-status
description: the status of the applied policy
flat_name: Endpoint.policy.applied.status
ignore_above: 1024
level: custom
name: policy.applied.status
normalize: []
short: the status of the applied policy
type: keyword
Endpoint.policy.applied.version:
dashed_name: Endpoint-policy-applied-version
description: the version of this applied policy
flat_name: Endpoint.policy.applied.version
ignore_above: 1024
level: custom
name: policy.applied.version
normalize: []
short: the version of this applied policy
type: keyword
Ransomware.child_processes.executable:
dashed_name: Ransomware-child-processes-executable
description: Absolute path to the process executable.
example: /usr/bin/ssh
flat_name: Ransomware.child_processes.executable
ignore_above: 1024
level: custom
multi_fields:
- flat_name: Ransomware.child_processes.executable.text
name: text
norms: false
type: text
name: executable
normalize: []
original_fieldset: Ransomware
short: Absolute path to the process executable.
type: keyword
Ransomware.child_processes.feature:
dashed_name: Ransomware-child-processes-feature
description: Ransomware feature which triggered the alert.
flat_name: Ransomware.child_processes.feature
ignore_above: 1024
level: custom
name: feature
normalize: []
original_fieldset: Ransomware
short: Ransomware feature which triggered the alert.
type: keyword
Ransomware.child_processes.files:
dashed_name: Ransomware-child-processes-files
description: Information about each file event attributed to the ransomware. Expected
to be an array.
flat_name: Ransomware.child_processes.files
level: custom
name: files
normalize:
- array
original_fieldset: Ransomware
short: Information about each file event attributed to the ransomware. Expected
to be an array.
type: nested
Ransomware.child_processes.files.data:
dashed_name: Ransomware-child-processes-files-data
description: File header or MBR bytes.
flat_name: Ransomware.child_processes.files.data
ignore_above: 1024
level: custom
name: files.data
normalize: []
original_fieldset: Ransomware
short: File header or MBR bytes.
type: keyword
Ransomware.child_processes.files.entropy:
dashed_name: Ransomware-child-processes-files-entropy
description: Entropy of file contents.
flat_name: Ransomware.child_processes.files.entropy
level: custom
name: files.entropy
normalize: []
original_fieldset: Ransomware
short: Entropy of file contents.
type: double
Ransomware.child_processes.files.extension:
dashed_name: Ransomware-child-processes-files-extension
description: File extension, excluding the leading dot.
flat_name: Ransomware.child_processes.files.extension
ignore_above: 1024
level: custom
name: files.extension
normalize: []
original_fieldset: Ransomware
short: File extension, excluding the leading dot.
type: keyword
Ransomware.child_processes.files.metrics:
dashed_name: Ransomware-child-processes-files-metrics
description: Suspicious ransomware behaviours associated with the file event.
flat_name: Ransomware.child_processes.files.metrics
ignore_above: 1024
level: custom
name: files.metrics
normalize:
- array
original_fieldset: Ransomware
short: Suspicious ransomware behaviours associated with the file event.
type: keyword
Ransomware.child_processes.files.operation:
dashed_name: Ransomware-child-processes-files-operation
description: Operation applied to file.
flat_name: Ransomware.child_processes.files.operation
ignore_above: 1024
level: custom
name: files.operation
normalize: []
original_fieldset: Ransomware
short: Operation applied to file.
type: keyword
Ransomware.child_processes.files.original.extension:
dashed_name: Ransomware-child-processes-files-original-extension
description: Original file extension prior to the file event.
flat_name: Ransomware.child_processes.files.original.extension
ignore_above: 1024
level: custom
name: files.original.extension
normalize: []
original_fieldset: Ransomware
short: Original file extension prior to the file event.
type: keyword
Ransomware.child_processes.files.original.path:
dashed_name: Ransomware-child-processes-files-original-path
description: Original file path prior to the file event.
flat_name: Ransomware.child_processes.files.original.path
ignore_above: 1024
level: custom
name: files.original.path
normalize: []
original_fieldset: Ransomware
short: Original file path prior to the file event.
type: keyword
Ransomware.child_processes.files.path:
dashed_name: Ransomware-child-processes-files-path
description: Full path to the file, including the file name.
flat_name: Ransomware.child_processes.files.path
ignore_above: 1024
level: custom
name: files.path
normalize: []
original_fieldset: Ransomware
short: Full path to the file, including the file name.
type: keyword
Ransomware.child_processes.files.score:
dashed_name: Ransomware-child-processes-files-score
description: Ransomware score for this particular file event.
flat_name: Ransomware.child_processes.files.score
level: custom
name: files.score
normalize: []
original_fieldset: Ransomware
short: Ransomware score for this particular file event.
type: double
Ransomware.child_processes.pid:
dashed_name: Ransomware-child-processes-pid
description: Process id.
example: 4242
flat_name: Ransomware.child_processes.pid
format: string
level: custom
name: pid
normalize: []
original_fieldset: Ransomware
short: Process id.
type: long
Ransomware.child_processes.score:
dashed_name: Ransomware-child-processes-score
description: Total ransomware score for aggregated file events.
flat_name: Ransomware.child_processes.score
level: custom
name: score
normalize: []
original_fieldset: Ransomware
short: Total ransomware score for aggregated file events.
type: double
Ransomware.child_processes.version:
dashed_name: Ransomware-child-processes-version
description: Ransomware artifact version.
flat_name: Ransomware.child_processes.version
ignore_above: 1024
level: custom
name: version
normalize: []
original_fieldset: Ransomware
short: Ransomware artifact version.
type: keyword
Ransomware.executable:
dashed_name: Ransomware-executable
description: Absolute path to the process executable.
example: /usr/bin/ssh
flat_name: Ransomware.executable
ignore_above: 1024
level: custom
multi_fields:
- flat_name: Ransomware.executable.text
name: text
norms: false
type: text
name: executable
normalize: []
short: Absolute path to the process executable.
type: keyword
Ransomware.feature:
dashed_name: Ransomware-feature
description: Ransomware feature which triggered the alert.
flat_name: Ransomware.feature
ignore_above: 1024
level: custom
name: feature
normalize: []
short: Ransomware feature which triggered the alert.
type: keyword
Ransomware.files:
dashed_name: Ransomware-files
description: Information about each file event attributed to the ransomware. Expected
to be an array.
flat_name: Ransomware.files
level: custom
name: files
normalize:
- array
short: Information about each file event attributed to the ransomware. Expected
to be an array.
type: nested
Ransomware.files.data:
dashed_name: Ransomware-files-data
description: File header or MBR bytes.
flat_name: Ransomware.files.data
ignore_above: 1024
level: custom
name: files.data
normalize: []
short: File header or MBR bytes.
type: keyword
Ransomware.files.entropy:
dashed_name: Ransomware-files-entropy
description: Entropy of file contents.
flat_name: Ransomware.files.entropy
level: custom
name: files.entropy
normalize: []
short: Entropy of file contents.
type: double
Ransomware.files.extension:
dashed_name: Ransomware-files-extension
description: File extension, excluding the leading dot.
flat_name: Ransomware.files.extension
ignore_above: 1024
level: custom
name: files.extension
normalize: []
short: File extension, excluding the leading dot.
type: keyword
Ransomware.files.metrics:
dashed_name: Ransomware-files-metrics
description: Suspicious ransomware behaviours associated with the file event.
flat_name: Ransomware.files.metrics
ignore_above: 1024
level: custom
name: files.metrics
normalize:
- array
short: Suspicious ransomware behaviours associated with the file event.
type: keyword
Ransomware.files.operation:
dashed_name: Ransomware-files-operation
description: Operation applied to file.
flat_name: Ransomware.files.operation
ignore_above: 1024
level: custom
name: files.operation
normalize: []
short: Operation applied to file.
type: keyword
Ransomware.files.original.extension:
dashed_name: Ransomware-files-original-extension
description: Original file extension prior to the file event.
flat_name: Ransomware.files.original.extension
ignore_above: 1024
level: custom
name: files.original.extension
normalize: []
short: Original file extension prior to the file event.
type: keyword
Ransomware.files.original.path:
dashed_name: Ransomware-files-original-path
description: Original file path prior to the file event.
flat_name: Ransomware.files.original.path
ignore_above: 1024
level: custom
name: files.original.path
normalize: []
short: Original file path prior to the file event.
type: keyword
Ransomware.files.path:
dashed_name: Ransomware-files-path
description: Full path to the file, including the file name.
flat_name: Ransomware.files.path
ignore_above: 1024
level: custom
name: files.path
normalize: []
short: Full path to the file, including the file name.
type: keyword
Ransomware.files.score:
dashed_name: Ransomware-files-score
description: Ransomware score for this particular file event.
flat_name: Ransomware.files.score
level: custom
name: files.score
normalize: []
short: Ransomware score for this particular file event.
type: double
Ransomware.pid:
dashed_name: Ransomware-pid
description: Process id.
example: 4242
flat_name: Ransomware.pid
format: string
level: custom
name: pid
normalize: []
short: Process id.
type: long
Ransomware.score:
dashed_name: Ransomware-score
description: Total ransomware score for aggregated file events.
flat_name: Ransomware.score
level: custom
name: score
normalize: []
short: Total ransomware score for aggregated file events.
type: double
Ransomware.version:
dashed_name: Ransomware-version
description: Ransomware artifact version.
flat_name: Ransomware.version
ignore_above: 1024
level: custom
name: version
normalize: []
short: Ransomware artifact version.
type: keyword
agent.ephemeral_id:
dashed_name: agent-ephemeral-id
description: 'Ephemeral identifier of this agent (if one exists).
This id normally changes across restarts, but `agent.id` does not.'
example: 8a4f500f
flat_name: agent.ephemeral_id
ignore_above: 1024
level: extended
name: ephemeral_id
normalize: []
short: Ephemeral identifier of this agent.
type: keyword
agent.id:
dashed_name: agent-id
description: 'Unique identifier of this agent (if one exists).
Example: For Beats this would be beat.id.'
example: 8a4f500d
flat_name: agent.id
ignore_above: 1024
level: core
name: id
normalize: []
short: Unique identifier of this agent.
type: keyword
agent.name:
dashed_name: agent-name
description: 'Custom name of the agent.
This is a name that can be given to an agent. This can be helpful if for example
two Filebeat instances are running on the same host but a human readable separation
is needed on which Filebeat instance data is coming from.'
example: foo
flat_name: agent.name
ignore_above: 1024
level: core
name: name
normalize: []
short: Custom name of the agent.
type: keyword
agent.type:
dashed_name: agent-type
description: 'Type of the agent.
The agent type always stays the same and should be given by the agent used. In
case of Filebeat the agent would always be Filebeat also if two Filebeat instances
are run on the same machine.'
example: filebeat
flat_name: agent.type
ignore_above: 1024
level: core
name: type
normalize: []
short: Type of the agent.
type: keyword
agent.version:
dashed_name: agent-version
description: Version of the agent.
example: 6.0.0-rc2
flat_name: agent.version
ignore_above: 1024
level: core
name: version
normalize: []
short: Version of the agent.
type: keyword
data_stream.dataset:
dashed_name: data-stream-dataset
description: Data stream dataset name.
example: nginx.access
flat_name: data_stream.dataset
level: custom
name: dataset
normalize: []
short: The field can contain anything that makes sense to signify the source of
the data.
type: constant_keyword
data_stream.namespace:
dashed_name: data-stream-namespace
description: Data stream namespace.
example: production
flat_name: data_stream.namespace
level: custom
name: namespace
normalize: []
short: A user defined namespace. Namespaces are useful to allow grouping of data.
type: constant_keyword
data_stream.type:
dashed_name: data-stream-type
description: Data stream type.
example: logs
flat_name: data_stream.type
level: custom
name: type
normalize: []
short: An overarching type for the data stream.
type: constant_keyword
destination.geo.city_name:
dashed_name: destination-geo-city-name
description: City name.
example: Montreal
flat_name: destination.geo.city_name
ignore_above: 1024
level: core
name: city_name
normalize: []
original_fieldset: geo
short: City name.
type: keyword
destination.geo.continent_code:
dashed_name: destination-geo-continent-code
description: Two-letter code representing continent's name.
example: NA
flat_name: destination.geo.continent_code
ignore_above: 1024
level: core
name: continent_code
normalize: []
original_fieldset: geo
short: Continent code.
type: keyword
destination.geo.continent_name:
dashed_name: destination-geo-continent-name
description: Name of the continent.
example: North America
flat_name: destination.geo.continent_name
ignore_above: 1024
level: core
name: continent_name
normalize: []
original_fieldset: geo
short: Name of the continent.
type: keyword
destination.geo.country_iso_code:
dashed_name: destination-geo-country-iso-code
description: Country ISO code.
example: CA
flat_name: destination.geo.country_iso_code
ignore_above: 1024
level: core
name: country_iso_code
normalize: []
original_fieldset: geo
short: Country ISO code.
type: keyword
destination.geo.country_name:
dashed_name: destination-geo-country-name
description: Country name.
example: Canada
flat_name: destination.geo.country_name
ignore_above: 1024
level: core
name: country_name
normalize: []
original_fieldset: geo
short: Country name.
type: keyword
destination.geo.location:
dashed_name: destination-geo-location
description: Longitude and latitude.
example: '{ "lon": -73.614830, "lat": 45.505918 }'
flat_name: destination.geo.location
level: core
name: location
normalize: []
original_fieldset: geo
short: Longitude and latitude.
type: geo_point
destination.geo.name:
dashed_name: destination-geo-name
description: 'User-defined description of a location, at the level of granularity
they care about.
Could be the name of their data centers, the floor number, if this describes a
local physical entity, city names.
Not typically used in automated geolocation.'
example: boston-dc
flat_name: destination.geo.name
ignore_above: 1024
level: extended
name: name
normalize: []
original_fieldset: geo
short: User-defined description of a location.
type: keyword
destination.geo.postal_code:
dashed_name: destination-geo-postal-code
description: 'Postal code associated with the location.
Values appropriate for this field may also be known as a postcode or ZIP code
and will vary widely from country to country.'
example: 94040
flat_name: destination.geo.postal_code
ignore_above: 1024
level: core
name: postal_code
normalize: []
original_fieldset: geo
short: Postal code.
type: keyword
destination.geo.region_iso_code:
dashed_name: destination-geo-region-iso-code
description: Region ISO code.
example: CA-QC
flat_name: destination.geo.region_iso_code
ignore_above: 1024
level: core
name: region_iso_code
normalize: []
original_fieldset: geo
short: Region ISO code.
type: keyword
destination.geo.region_name:
dashed_name: destination-geo-region-name
description: Region name.
example: Quebec
flat_name: destination.geo.region_name
ignore_above: 1024
level: core
name: region_name
normalize: []
original_fieldset: geo
short: Region name.
type: keyword
destination.geo.timezone:
dashed_name: destination-geo-timezone
description: The time zone of the location, such as IANA time zone name.
example: America/Argentina/Buenos_Aires
flat_name: destination.geo.timezone
ignore_above: 1024
level: core
name: timezone
normalize: []
original_fieldset: geo
short: Time zone.
type: keyword
dll.Ext:
dashed_name: dll-Ext
description: Object for all custom defined fields to live in.
flat_name: dll.Ext
level: custom
name: Ext
normalize: []
short: Object for all custom defined fields to live in.
type: object
dll.Ext.code_signature:
dashed_name: dll-Ext-code-signature
description: Nested version of ECS code_signature fieldset.
flat_name: dll.Ext.code_signature
level: custom
name: Ext.code_signature
normalize: []
short: Nested version of ECS code_signature fieldset.
type: nested
dll.Ext.code_signature.exists:
dashed_name: dll-Ext-code-signature-exists
description: Boolean to capture if a signature is present.
example: 'true'
flat_name: dll.Ext.code_signature.exists
level: custom
name: Ext.code_signature.exists
normalize: []
short: Boolean to capture if a signature is present.
type: boolean
dll.Ext.code_signature.status:
dashed_name: dll-Ext-code-signature-status
description: 'Additional information about the certificate status.
This is useful for logging cryptographic errors with the certificate validity
or trust status. Leave unpopulated if the validity or trust of the certificate
was unchecked.'
example: ERROR_UNTRUSTED_ROOT
flat_name: dll.Ext.code_signature.status
ignore_above: 1024
level: custom
name: Ext.code_signature.status
normalize: []
short: Additional information about the certificate status.
type: keyword
dll.Ext.code_signature.subject_name:
dashed_name: dll-Ext-code-signature-subject-name
description: Subject name of the code signer
example: Microsoft Corporation
flat_name: dll.Ext.code_signature.subject_name
ignore_above: 1024
level: custom
name: Ext.code_signature.subject_name
normalize: []
short: Subject name of the code signer
type: keyword
dll.Ext.code_signature.trusted:
dashed_name: dll-Ext-code-signature-trusted
description: 'Stores the trust status of the certificate chain.
Validating the trust of the certificate chain may be complicated, and this field
should only be populated by tools that actively check the status.'
example: 'true'
flat_name: dll.Ext.code_signature.trusted
level: custom
name: Ext.code_signature.trusted
normalize: []
short: Stores the trust status of the certificate chain.
type: boolean
dll.Ext.code_signature.valid:
dashed_name: dll-Ext-code-signature-valid
description: 'Boolean to capture if the digital signature is verified against the
binary content.
Leave unpopulated if a certificate was unchecked.'
example: 'true'
flat_name: dll.Ext.code_signature.valid
level: custom
name: Ext.code_signature.valid
normalize: []
short: Boolean to capture if the digital signature is verified against the binary
content.
type: boolean
dll.Ext.compile_time:
dashed_name: dll-Ext-compile-time
description: Timestamp from when the module was compiled.
flat_name: dll.Ext.compile_time
level: custom
name: Ext.compile_time
normalize: []
short: Timestamp from when the module was compiled.
type: date
dll.Ext.mapped_address:
dashed_name: dll-Ext-mapped-address
description: The base address where this module is loaded.
flat_name: dll.Ext.mapped_address
level: custom
name: Ext.mapped_address
normalize: []
short: The base address where this module is loaded.
type: unsigned_long
dll.Ext.mapped_size:
dashed_name: dll-Ext-mapped-size
description: The size of this module's memory mapping, in bytes.
flat_name: dll.Ext.mapped_size
level: custom
name: Ext.mapped_size
normalize: []
short: The size of this module's memory mapping, in bytes.
type: unsigned_long
dll.code_signature.exists:
dashed_name: dll-code-signature-exists
description: Boolean to capture if a signature is present.
example: 'true'
flat_name: dll.code_signature.exists
level: core
name: exists
normalize: []
original_fieldset: code_signature
short: Boolean to capture if a signature is present.
type: boolean
dll.code_signature.signing_id:
dashed_name: dll-code-signature-signing-id
description: 'The identifier used to sign the process.
This is used to identify the application manufactured by a software vendor. The
field is relevant to Apple *OS only.'
example: com.apple.xpc.proxy
flat_name: dll.code_signature.signing_id
ignore_above: 1024
level: extended
name: signing_id
normalize: []
original_fieldset: code_signature
short: The identifier used to sign the process.
type: keyword
dll.code_signature.status:
dashed_name: dll-code-signature-status
description: 'Additional information about the certificate status.
This is useful for logging cryptographic errors with the certificate validity
or trust status. Leave unpopulated if the validity or trust of the certificate
was unchecked.'
example: ERROR_UNTRUSTED_ROOT
flat_name: dll.code_signature.status
ignore_above: 1024
level: extended
name: status
normalize: []
original_fieldset: code_signature
short: Additional information about the certificate status.
type: keyword
dll.code_signature.subject_name:
dashed_name: dll-code-signature-subject-name
description: Subject name of the code signer
example: Microsoft Corporation
flat_name: dll.code_signature.subject_name
ignore_above: 1024
level: core
name: subject_name
normalize: []
original_fieldset: code_signature
short: Subject name of the code signer
type: keyword
dll.code_signature.team_id:
dashed_name: dll-code-signature-team-id
description: 'The team identifier used to sign the process.
This is used to identify the team or vendor of a software product. The field is
relevant to Apple *OS only.'
example: EQHXZ8M8AV
flat_name: dll.code_signature.team_id
ignore_above: 1024
level: extended
name: team_id
normalize: []
original_fieldset: code_signature
short: The team identifier used to sign the process.
type: keyword
dll.code_signature.trusted:
dashed_name: dll-code-signature-trusted
description: 'Stores the trust status of the certificate chain.
Validating the trust of the certificate chain may be complicated, and this field
should only be populated by tools that actively check the status.'
example: 'true'
flat_name: dll.code_signature.trusted
level: extended
name: trusted
normalize: []
original_fieldset: code_signature
short: Stores the trust status of the certificate chain.
type: boolean
dll.code_signature.valid:
dashed_name: dll-code-signature-valid
description: 'Boolean to capture if the digital signature is verified against the
binary content.
Leave unpopulated if a certificate was unchecked.'
example: 'true'
flat_name: dll.code_signature.valid
level: extended
name: valid
normalize: []
original_fieldset: code_signature
short: Boolean to capture if the digital signature is verified against the binary
content.
type: boolean
dll.hash.md5:
dashed_name: dll-hash-md5
description: MD5 hash.
flat_name: dll.hash.md5
ignore_above: 1024
level: extended
name: md5
normalize: []
original_fieldset: hash
short: MD5 hash.
type: keyword
dll.hash.sha1:
dashed_name: dll-hash-sha1
description: SHA1 hash.
flat_name: dll.hash.sha1
ignore_above: 1024
level: extended
name: sha1
normalize: []
original_fieldset: hash
short: SHA1 hash.
type: keyword
dll.hash.sha256:
dashed_name: dll-hash-sha256
description: SHA256 hash.
flat_name: dll.hash.sha256
ignore_above: 1024
level: extended
name: sha256
normalize: []
original_fieldset: hash
short: SHA256 hash.
type: keyword
dll.hash.sha512:
dashed_name: dll-hash-sha512
description: SHA512 hash.
flat_name: dll.hash.sha512
ignore_above: 1024
level: extended
name: sha512
normalize: []
original_fieldset: hash
short: SHA512 hash.
type: keyword
dll.name:
dashed_name: dll-name
description: 'Name of the library.
This generally maps to the name of the file on disk.'
example: kernel32.dll
flat_name: dll.name
ignore_above: 1024
level: core
name: name
normalize: []
short: Name of the library.
type: keyword
dll.path:
dashed_name: dll-path
description: Full file path of the library.
example: C:\Windows\System32\kernel32.dll
flat_name: dll.path
ignore_above: 1024
level: extended
name: path
normalize: []
short: Full file path of the library.
type: keyword
dll.pe.company:
dashed_name: dll-pe-company
description: Internal company name of the file, provided at compile-time.
example: Microsoft Corporation
flat_name: dll.pe.company
ignore_above: 1024
level: extended
name: company
normalize: []
original_fieldset: pe
short: Internal company name of the file, provided at compile-time.
type: keyword
dll.pe.description:
dashed_name: dll-pe-description
description: Internal description of the file, provided at compile-time.
example: Paint
flat_name: dll.pe.description
ignore_above: 1024
level: extended
name: description
normalize: []
original_fieldset: pe
short: Internal description of the file, provided at compile-time.
type: keyword
dll.pe.file_version:
dashed_name: dll-pe-file-version
description: Internal version of the file, provided at compile-time.
example: 6.3.9600.17415
flat_name: dll.pe.file_version
ignore_above: 1024
level: extended
name: file_version
normalize: []
original_fieldset: pe
short: Process name.
type: keyword
dll.pe.imphash:
dashed_name: dll-pe-imphash
description: 'A hash of the imports in a PE file. An imphash -- or import hash --
can be used to fingerprint binaries even after recompilation or other code-level
transformations have occurred, which would change more traditional hash values.
Learn more at https://www.fireeye.com/blog/threat-research/2014/01/tracking-malware-import-hashing.html.'
example: 0c6803c4e922103c4dca5963aad36ddf
flat_name: dll.pe.imphash
ignore_above: 1024
level: extended
name: imphash
normalize: []
original_fieldset: pe
short: A hash of the imports in a PE file.
type: keyword
dll.pe.original_file_name:
dashed_name: dll-pe-original-file-name
description: Internal name of the file, provided at compile-time.
example: MSPAINT.EXE
flat_name: dll.pe.original_file_name
ignore_above: 1024
level: extended
name: original_file_name
normalize: []
original_fieldset: pe
short: Internal name of the file, provided at compile-time.
type: keyword
dll.pe.product:
dashed_name: dll-pe-product
description: Internal product name of the file, provided at compile-time.
example: "Microsoft\xAE Windows\xAE Operating System"
flat_name: dll.pe.product
ignore_above: 1024
level: extended
name: product
normalize: []
original_fieldset: pe
short: Internal product name of the file, provided at compile-time.
type: keyword
ecs.version:
dashed_name: ecs-version
description: 'ECS version this event conforms to. `ecs.version` is a required field
and must exist in all events.
When querying across multiple indices -- which may conform to slightly different
ECS versions -- this field lets integrations adjust to the schema version of the
events.'
example: 1.0.0
flat_name: ecs.version
ignore_above: 1024
level: core
name: version
normalize: []
required: true
short: ECS version this event conforms to.
type: keyword
elastic.agent:
dashed_name: elastic-agent
description: The agent fields contain data about the Elastic Agent. The Elastic
Agent is the management agent that manages other agents or process on the host.
flat_name: elastic.agent
level: custom
name: agent
normalize: []
short: The agent fields contain data about the Elastic Agent.
type: object
elastic.agent.id:
dashed_name: elastic-agent-id
description: Unique identifier of this elastic agent (if one exists).
example: c2a9093e-e289-4c0a-aa44-8c32a414fa7a
flat_name: elastic.agent.id
ignore_above: 1024
level: custom
name: agent.id
normalize: []
short: Unique identifier of this elastic agent (if one exists).
type: keyword
event.action:
dashed_name: event-action
description: 'The action captured by the event.
This describes the information in the event. It is more specific than `event.category`.
Examples are `group-add`, `process-started`, `file-created`. The value is normally
defined by the implementer.'
example: user-password-change
flat_name: event.action
ignore_above: 1024
level: core
name: action
normalize: []
short: The action captured by the event.
type: keyword
event.category:
allowed_values:
- description: Events in this category annotate API calls that occured on a system.
Typical sources for those events could be from the Operating System level through
the native libraries (for example Windows Win32, Linux libc, etc.), or managed
sources of events (such as ETW, syslog), but can also include network protocols
(such as SOAP, RPC, Websocket, REST, etc.)
expected_event_types:
- access
- admin
- allowed
- change
- creation
- deletion
- denied
- end
- info
- start
- user
name: api
- description: Events in this category are related to the challenge and response
process in which credentials are supplied and verified to allow the creation
of a session. Common sources for these logs are Windows event logs and ssh logs.
Visualize and analyze events in this category to look for failed logins, and
other authentication-related activity.
expected_event_types:
- start
- end
- info
name: authentication
- description: 'Events in the configuration category have to deal with creating,
modifying, or deleting the settings or parameters of an application, process,
or system.
Example sources include security policy change logs, configuration auditing
logging, and system integrity monitoring.'
expected_event_types:
- access
- change
- creation
- deletion
- info
name: configuration
- description: The database category denotes events and metrics relating to a data
storage and retrieval system. Note that use of this category is not limited
to relational database systems. Examples include event logs from MS SQL, MySQL,
Elasticsearch, MongoDB, etc. Use this category to visualize and analyze database
activity such as accesses and changes.
expected_event_types:
- access
- change
- info
- error
name: database
- description: 'Events in the driver category have to do with operating system device
drivers and similar software entities such as Windows drivers, kernel extensions,
kernel modules, etc.
Use events and metrics in this category to visualize and analyze driver-related
activity and status on hosts.'
expected_event_types:
- change
- end
- info
- start
name: driver
- description: 'This category is used for events relating to email messages, email
attachments, and email network or protocol activity.
Emails events can be produced by email security gateways, mail transfer agents,
email cloud service providers, or mail server monitoring applications.'
expected_event_types:
- info
name: email
- description: Relating to a set of information that has been created on, or has
existed on a filesystem. Use this category of events to visualize and analyze
the creation, access, and deletions of files. Events in this category can come
from both host-based and network-based sources. An example source of a network-based
detection of a file transfer would be the Zeek file.log.
expected_event_types:
- access
- change
- creation
- deletion
- info
name: file
- description: 'Use this category to visualize and analyze information such as host
inventory or host lifecycle events.
Most of the events in this category can usually be observed from the outside,
such as from a hypervisor or a control plane''s point of view. Some can also
be seen from within, such as "start" or "end".
Note that this category is for information about hosts themselves; it is not
meant to capture activity "happening on a host".'
expected_event_types:
- access
- change
- end
- info
- start
name: host
- description: Identity and access management (IAM) events relating to users, groups,
and administration. Use this category to visualize and analyze IAM-related logs
and data from active directory, LDAP, Okta, Duo, and other IAM systems.
expected_event_types:
- admin
- change
- creation
- deletion
- group
- info
- user
name: iam
- description: Relating to intrusion detections from IDS/IPS systems and functions,
both network and host-based. Use this category to visualize and analyze intrusion
detection alerts from systems such as Snort, Suricata, and Palo Alto threat
detections.
expected_event_types:
- allowed
- denied
- info
name: intrusion_detection
- description: Events in this category refer to the loading of a library, such as
(dll / so / dynlib), into a process. Use this category to visualize and analyze
library loading related activity on hosts. Keep in mind that driver related
activity will be captured under the "driver" category above.
expected_event_types:
- start
name: library
- description: Malware detection events and alerts. Use this category to visualize
and analyze malware detections from EDR/EPP systems such as Elastic Endpoint
Security, Symantec Endpoint Protection, Crowdstrike, and network IDS/IPS systems
such as Suricata, or other sources of malware-related events such as Palo Alto
Networks threat logs and Wildfire logs.
expected_event_types:
- info
name: malware
- description: Relating to all network activity, including network connection lifecycle,
network traffic, and essentially any event that includes an IP address. Many
events containing decoded network protocol transactions fit into this category.
Use events in this category to visualize or analyze counts of network ports,
protocols, addresses, geolocation information, etc.
expected_event_types:
- access
- allowed
- connection
- denied
- end
- info
- protocol
- start
name: network
- description: Relating to software packages installed on hosts. Use this category
to visualize and analyze inventory of software installed on various hosts, or
to determine host vulnerability in the absence of vulnerability scan data.
expected_event_types:
- access
- change
- deletion
- info
- installation
- start
name: package
- description: Use this category of events to visualize and analyze process-specific
information such as lifecycle events or process ancestry.
expected_event_types:
- access
- change
- end
- info
- start
name: process
- description: Having to do with settings and assets stored in the Windows registry.
Use this category to visualize and analyze activity such as registry access
and modifications.
expected_event_types:
- access
- change
- creation
- deletion
name: registry
- description: The session category is applied to events and metrics regarding logical
persistent connections to hosts and services. Use this category to visualize
and analyze interactive or automated persistent connections between assets.
Data for this category may come from Windows Event logs, SSH logs, or stateless
sessions such as HTTP cookie-based sessions, etc.
expected_event_types:
- start
- end
- info
name: session
- description: Use this category to visualize and analyze events describing threat
actors' targets, motives, or behaviors.
expected_event_types:
- indicator
name: threat
- description: Relating to vulnerability scan results. Use this category to analyze
vulnerabilities detected by Tenable, Qualys, internal scanners, and other vulnerability
management sources.
expected_event_types:
- info
name: vulnerability
- description: 'Relating to web server access. Use this category to create a dashboard
of web server/proxy activity from apache, IIS, nginx web servers, etc. Note:
events from network observers such as Zeek http log may also be included in
this category.'
expected_event_types:
- access
- error
- info
name: web
dashed_name: event-category
description: 'This is one of four ECS Categorization Fields, and indicates the second
level in the ECS category hierarchy.
`event.category` represents the "big buckets" of ECS categories. For example,
filtering on `event.category:process` yields all events relating to process activity.
This field is closely related to `event.type`, which is used as a subcategory.
This field is an array. This will allow proper categorization of some events that
fall in multiple categories.'
example: authentication
flat_name: event.category
ignore_above: 1024
level: core
name: category
normalize:
- array
short: Event category. The second categorization field in the hierarchy.
type: keyword
event.code:
dashed_name: event-code
description: 'Identification code for this event, if one exists.
Some event sources use event codes to identify messages unambiguously, regardless
of message language or wording adjustments over time. An example of this is the
Windows Event ID.'
example: 4648
flat_name: event.code
ignore_above: 1024
level: extended
name: code
normalize: []
short: Identification code for this event.
type: keyword
event.created:
dashed_name: event-created
description: '`event.created` contains the date/time when the event was first read
by an agent, or by your pipeline.
This field is distinct from `@timestamp` in that `@timestamp` typically contain
the time extracted from the original event.
In most situations, these two timestamps will be slightly different. The difference
can be used to calculate the delay between your source generating an event, and
the time when your agent first processed it. This can be used to monitor your
agent''s or pipeline''s ability to keep up with your event source.
In case the two timestamps are identical, `@timestamp` should be used.'
example: '2016-05-23T08:05:34.857Z'
flat_name: event.created
level: core
name: created
normalize: []
short: Time when the event was first read by an agent or by your pipeline.
type: date
event.dataset:
dashed_name: event-dataset
description: 'Name of the dataset.
If an event source publishes more than one type of log or events (e.g. access
log, error log), the dataset is used to specify which one the event comes from.
It''s recommended but not required to start the dataset name with the module name,
followed by a dot, then the dataset name.'
example: apache.access
flat_name: event.dataset
ignore_above: 1024
level: core
name: dataset
normalize: []
short: Name of the dataset.
type: keyword
event.hash:
dashed_name: event-hash
description: Hash (perhaps logstash fingerprint) of raw field to be able to demonstrate
log integrity.
example: 123456789012345678901234567890ABCD
flat_name: event.hash
ignore_above: 1024
level: extended
name: hash
normalize: []
short: Hash (perhaps logstash fingerprint) of raw field to be able to demonstrate
log integrity.
type: keyword
event.id:
dashed_name: event-id
description: Unique ID to describe the event.
example: 8a4f500d
flat_name: event.id
ignore_above: 1024
level: core
name: id
normalize: []
short: Unique ID to describe the event.
type: keyword
event.ingested:
dashed_name: event-ingested
description: 'Timestamp when an event arrived in the central data store.
This is different from `@timestamp`, which is when the event originally occurred. It''s
also different from `event.created`, which is meant to capture the first time
an agent saw the event.
In normal conditions, assuming no tampering, the timestamps should chronologically
look like this: `@timestamp` < `event.created` < `event.ingested`.'
example: '2016-05-23T08:05:35.101Z'
flat_name: event.ingested
level: core
name: ingested
normalize: []
short: Timestamp when an event arrived in the central data store.
type: date
event.kind:
allowed_values:
- description: 'This value indicates an event such as an alert or notable event,
triggered by a detection rule executing externally to the Elastic Stack.
`event.kind:alert` is often populated for events coming from firewalls, intrusion
detection systems, endpoint detection and response systems, and so on.
This value is not used by Elastic solutions for alert documents that are created
by rules executing within the Kibana alerting framework.'
name: alert
- beta: This event categorization value is beta and subject to change.
description: 'This value indicates events whose primary purpose is to store an
inventory of assets/entities and their attributes. Assets/entities are objects
(such as users and hosts) that are expected to be subjects of detailed analysis
within the system.
Examples include lists of user identities or accounts ingested from directory
services such as Active Directory (AD), inventory of hosts pulled from configuration
management databases (CMDB), and lists of cloud storage buckets pulled from
cloud provider APIs.
This value is used by Elastic Security for asset management solutions. `event.kind:
asset` is not used for normal system events or logs that are coming from an
asset/entity, nor is it used for system events or logs coming from a directory
or CMDB system.'
name: asset
- description: 'The `enrichment` value indicates an event collected to provide additional
context, often to other events.
An example is collecting indicators of compromise (IOCs) from a threat intelligence
provider with the intent to use those values to enrich other events. The IOC
events from the intelligence provider should be categorized as `event.kind:enrichment`.'
name: enrichment
- description: This value is the most general and most common value for this field.
It is used to represent events that indicate that something happened.
name: event
- description: 'This value is used to indicate that this event describes a numeric
measurement taken at given point in time.
Examples include CPU utilization, memory usage, or device temperature.
Metric events are often collected on a predictable frequency, such as once every
few seconds, or once a minute, but can also be used to describe ad-hoc numeric
metric queries.'
name: metric
- description: 'The state value is similar to metric, indicating that this event
describes a measurement taken at given point in time, except that the measurement
does not result in a numeric value, but rather one of a fixed set of categorical
values that represent conditions or states.
Examples include periodic events reporting Elasticsearch cluster state (green/yellow/red),
the state of a TCP connection (open, closed, fin_wait, etc.), the state of a
host with respect to a software vulnerability (vulnerable, not vulnerable),
and the state of a system regarding compliance with a regulatory standard (compliant,
not compliant).
Note that an event that describes a change of state would not use `event.kind:state`,
but instead would use ''event.kind:event'' since a state change fits the more
general event definition of something that happened.
State events are often collected on a predictable frequency, such as once every
few seconds, once a minute, once an hour, or once a day, but can also be used
to describe ad-hoc state queries.'
name: state
- description: This value indicates that an error occurred during the ingestion
of this event, and that event data may be missing, inconsistent, or incorrect.
`event.kind:pipeline_error` is often associated with parsing errors.
name: pipeline_error
- description: 'This value is used by Elastic solutions (e.g., Security, Observability)
for alert documents that are created by rules executing within the Kibana alerting
framework.
Usage of this value is reserved, and data ingestion pipelines must not populate
`event.kind` with the value "signal".'
name: signal
dashed_name: event-kind
description: 'This is one of four ECS Categorization Fields, and indicates the highest
level in the ECS category hierarchy.
`event.kind` gives high-level information about what type of information the event
contains, without being specific to the contents of the event. For example, values
of this field distinguish alert events from metric events.
The value of this field can be used to inform how these kinds of events should
be handled. They may warrant different retention, different access control, it
may also help understand whether the data is coming in at a regular interval or
not.'
example: alert
flat_name: event.kind
ignore_above: 1024
level: core
name: kind
normalize: []
short: The kind of the event. The highest categorization field in the hierarchy.
type: keyword
event.module:
dashed_name: event-module
description: 'Name of the module this data is coming from.
If your monitoring agent supports the concept of modules or plugins to process
events of a given source (e.g. Apache logs), `event.module` should contain the
name of this module.'
example: apache
flat_name: event.module
ignore_above: 1024
level: core
name: module
normalize: []
short: Name of the module this data is coming from.
type: keyword
event.outcome:
allowed_values:
- description: Indicates that this event describes a failed result. A common example
is `event.category:file AND event.type:access AND event.outcome:failure` to
indicate that a file access was attempted, but was not successful.
name: failure
- description: Indicates that this event describes a successful result. A common
example is `event.category:file AND event.type:create AND event.outcome:success`
to indicate that a file was successfully created.
name: success
- description: Indicates that this event describes only an attempt for which the
result is unknown from the perspective of the event producer. For example, if
the event contains information only about the request side of a transaction
that results in a response, populating `event.outcome:unknown` in the request
event is appropriate. The unknown value should not be used when an outcome doesn't
make logical sense for the event. In such cases `event.outcome` should not be
populated.
name: unknown
dashed_name: event-outcome
description: 'This is one of four ECS Categorization Fields, and indicates the lowest
level in the ECS category hierarchy.
`event.outcome` simply denotes whether the event represents a success or a failure
from the perspective of the entity that produced the event.
Note that when a single transaction is described in multiple events, each event
may populate different values of `event.outcome`, according to their perspective.
Also note that in the case of a compound event (a single event that contains multiple
logical events), this field should be populated with the value that best captures
the overall success or failure from the perspective of the event producer.
Further note that not all events will have an associated outcome. For example,
this field is generally not populated for metric events, events with `event.type:info`,
or any events for which an outcome does not make logical sense.'
example: success
flat_name: event.outcome
ignore_above: 1024
level: core
name: outcome
normalize: []
short: The outcome of the event. The lowest level categorization field in the hierarchy.
type: keyword
event.provider:
dashed_name: event-provider
description: 'Source of the event.
Event transports such as Syslog or the Windows Event Log typically mention the
source of an event. It can be the name of the software that generated the event
(e.g. Sysmon, httpd), or of a subsystem of the operating system (kernel, Microsoft-Windows-Security-Auditing).'
example: kernel
flat_name: event.provider
ignore_above: 1024
level: extended
name: provider
normalize: []
short: Source of the event.
type: keyword
event.sequence:
dashed_name: event-sequence
description: 'Sequence number of the event.
The sequence number is a value published by some event sources, to make the exact
ordering of events unambiguous, regardless of the timestamp precision.'
flat_name: event.sequence
format: string
level: extended
name: sequence
normalize: []
short: Sequence number of the event.
type: long
event.severity:
dashed_name: event-severity
description: 'The numeric severity of the event according to your event source.
What the different severity values mean can be different between sources and use
cases. It''s up to the implementer to make sure severities are consistent across
events from the same source.
The Syslog severity belongs in `log.syslog.severity.code`. `event.severity` is
meant to represent the severity according to the event source (e.g. firewall,
IDS). If the event source does not publish its own severity, you may optionally
copy the `log.syslog.severity.code` to `event.severity`.'
example: 7
flat_name: event.severity
format: string
level: core
name: severity
normalize: []
short: Numeric severity of the event.
type: long
event.type:
allowed_values:
- description: The access event type is used for the subset of events within a category
that indicate that something was accessed. Common examples include `event.category:database
AND event.type:access`, or `event.category:file AND event.type:access`. Note
for file access, both directory listings and file opens should be included in
this subcategory. You can further distinguish access operations using the ECS
`event.action` field.
name: access
- description: 'The admin event type is used for the subset of events within a category
that are related to admin objects. For example, administrative changes within
an IAM framework that do not specifically affect a user or group (e.g., adding
new applications to a federation solution or connecting discrete forests in
Active Directory) would fall into this subcategory. Common example: `event.category:iam
AND event.type:change AND event.type:admin`. You can further distinguish admin
operations using the ECS `event.action` field.'
name: admin
- description: The allowed event type is used for the subset of events within a
category that indicate that something was allowed. Common examples include `event.category:network
AND event.type:connection AND event.type:allowed` (to indicate a network firewall
event for which the firewall disposition was to allow the connection to complete)
and `event.category:intrusion_detection AND event.type:allowed` (to indicate
a network intrusion prevention system event for which the IPS disposition was
to allow the connection to complete). You can further distinguish allowed operations
using the ECS `event.action` field, populating with values of your choosing,
such as "allow", "detect", or "pass".
name: allowed
- description: The change event type is used for the subset of events within a category
that indicate that something has changed. If semantics best describe an event
as modified, then include them in this subcategory. Common examples include
`event.category:process AND event.type:change`, and `event.category:file AND
event.type:change`. You can further distinguish change operations using the
ECS `event.action` field.
name: change
- description: Used primarily with `event.category:network` this value is used for
the subset of network traffic that includes sufficient information for the event
to be included in flow or connection analysis. Events in this subcategory will
contain at least source and destination IP addresses, source and destination
TCP/UDP ports, and will usually contain counts of bytes and/or packets transferred.
Events in this subcategory may contain unidirectional or bidirectional information,
including summary information. Use this subcategory to visualize and analyze
network connections. Flow analysis, including Netflow, IPFIX, and other flow-related
events fit in this subcategory. Note that firewall events from many Next-Generation
Firewall (NGFW) devices will also fit into this subcategory. A common filter
for flow/connection information would be `event.category:network AND event.type:connection
AND event.type:end` (to view or analyze all completed network connections, ignoring
mid-flow reports). You can further distinguish connection events using the ECS
`event.action` field, populating with values of your choosing, such as "timeout",
or "reset".
name: connection
- description: The "creation" event type is used for the subset of events within
a category that indicate that something was created. A common example is `event.category:file
AND event.type:creation`.
name: creation
- description: The deletion event type is used for the subset of events within a
category that indicate that something was deleted. A common example is `event.category:file
AND event.type:deletion` to indicate that a file has been deleted.
name: deletion
- description: The denied event type is used for the subset of events within a category
that indicate that something was denied. Common examples include `event.category:network
AND event.type:denied` (to indicate a network firewall event for which the firewall
disposition was to deny the connection) and `event.category:intrusion_detection
AND event.type:denied` (to indicate a network intrusion prevention system event
for which the IPS disposition was to deny the connection to complete). You can
further distinguish denied operations using the ECS `event.action` field, populating
with values of your choosing, such as "blocked", "dropped", or "quarantined".
name: denied
- description: The end event type is used for the subset of events within a category
that indicate something has ended. A common example is `event.category:process
AND event.type:end`.
name: end
- description: The error event type is used for the subset of events within a category
that indicate or describe an error. A common example is `event.category:database
AND event.type:error`. Note that pipeline errors that occur during the event
ingestion process should not use this `event.type` value. Instead, they should
use `event.kind:pipeline_error`.
name: error
- description: 'The group event type is used for the subset of events within a category
that are related to group objects. Common example: `event.category:iam AND event.type:creation
AND event.type:group`. You can further distinguish group operations using the
ECS `event.action` field.'
name: group
- description: 'The indicator event type is used for the subset of events within
a category that contain details about indicators of compromise (IOCs).
A common example is `event.category:threat AND event.type:indicator`.'
name: indicator
- description: The info event type is used for the subset of events within a category
that indicate that they are purely informational, and don't report a state change,
or any type of action. For example, an initial run of a file integrity monitoring
system (FIM), where an agent reports all files under management, would fall
into the "info" subcategory. Similarly, an event containing a dump of all currently
running processes (as opposed to reporting that a process started/ended) would
fall into the "info" subcategory. An additional common examples is `event.category:intrusion_detection
AND event.type:info`.
name: info
- description: The installation event type is used for the subset of events within
a category that indicate that something was installed. A common example is `event.category:package`
AND `event.type:installation`.
name: installation
- description: The protocol event type is used for the subset of events within a
category that indicate that they contain protocol details or analysis, beyond
simply identifying the protocol. Generally, network events that contain specific
protocol details will fall into this subcategory. A common example is `event.category:network
AND event.type:protocol AND event.type:connection AND event.type:end` (to indicate
that the event is a network connection event sent at the end of a connection
that also includes a protocol detail breakdown). Note that events that only
indicate the name or id of the protocol should not use the protocol value. Further
note that when the protocol subcategory is used, the identified protocol is
populated in the ECS `network.protocol` field.
name: protocol
- description: The start event type is used for the subset of events within a category
that indicate something has started. A common example is `event.category:process
AND event.type:start`.
name: start
- description: 'The user event type is used for the subset of events within a category
that are related to user objects. Common example: `event.category:iam AND event.type:deletion
AND event.type:user`. You can further distinguish user operations using the
ECS `event.action` field.'
name: user
dashed_name: event-type
description: 'This is one of four ECS Categorization Fields, and indicates the third
level in the ECS category hierarchy.
`event.type` represents a categorization "sub-bucket" that, when used along with
the `event.category` field values, enables filtering events down to a level appropriate
for single visualization.
This field is an array. This will allow proper categorization of some events that
fall in multiple event types.'
flat_name: event.type
ignore_above: 1024
level: core
name: type
normalize:
- array
short: Event type. The third categorization field in the hierarchy.
type: keyword
group.Ext:
dashed_name: group-Ext
description: Object for all custom defined fields to live in.
flat_name: group.Ext
level: custom
name: Ext
normalize: []
short: Object for all custom defined fields to live in.
type: object
group.Ext.real:
dashed_name: group-Ext-real
description: Group info prior to any setgid operations.
flat_name: group.Ext.real
level: custom
name: Ext.real
normalize: []
short: Group info prior to any setgid operations.
type: object
group.Ext.real.id:
dashed_name: group-Ext-real-id
description: Unique identifier for the group on the system/platform.
flat_name: group.Ext.real.id
ignore_above: 1024
level: custom
name: Ext.real.id
normalize: []
short: Unique identifier for the group on the system/platform.
type: keyword
group.Ext.real.name:
dashed_name: group-Ext-real-name
description: Name of the group.
flat_name: group.Ext.real.name
ignore_above: 1024
level: custom
name: Ext.real.name
normalize: []
short: Name of the group.
type: keyword
group.domain:
dashed_name: group-domain
description: Name of the directory the group is a member of. For example, an LDAP
or Active Directory domain name.
flat_name: group.domain
ignore_above: 1024
level: extended
name: domain
normalize: []
short: Name of the directory the group is a member of.
type: keyword
group.id:
dashed_name: group-id
description: Unique identifier for the group on the system/platform.
flat_name: group.id
ignore_above: 1024
level: extended
name: id
normalize: []
short: Unique identifier for the group on the system/platform.
type: keyword
group.name:
dashed_name: group-name
description: Name of the group.
flat_name: group.name
ignore_above: 1024
level: extended
name: name
normalize: []
short: Name of the group.
type: keyword
host.architecture:
dashed_name: host-architecture
description: Operating system architecture.
example: x86_64
flat_name: host.architecture
ignore_above: 1024
level: core
name: architecture
normalize: []
short: Operating system architecture.
type: keyword
host.domain:
dashed_name: host-domain
description: 'Name of the domain of which the host is a member.
For example, on Windows this could be the host''s Active Directory domain or NetBIOS
domain name. For Linux this could be the domain of the host''s LDAP provider.'
example: CONTOSO
flat_name: host.domain
ignore_above: 1024
level: extended
name: domain
normalize: []
short: Name of the directory the group is a member of.
type: keyword
host.geo.city_name:
dashed_name: host-geo-city-name
description: City name.
example: Montreal
flat_name: host.geo.city_name
ignore_above: 1024
level: core
name: city_name
normalize: []
original_fieldset: geo
short: City name.
type: keyword
host.geo.continent_code:
dashed_name: host-geo-continent-code
description: Two-letter code representing continent's name.
example: NA
flat_name: host.geo.continent_code
ignore_above: 1024
level: core
name: continent_code
normalize: []
original_fieldset: geo
short: Continent code.
type: keyword
host.geo.continent_name:
dashed_name: host-geo-continent-name
description: Name of the continent.
example: North America
flat_name: host.geo.continent_name
ignore_above: 1024
level: core
name: continent_name
normalize: []
original_fieldset: geo
short: Name of the continent.
type: keyword
host.geo.country_iso_code:
dashed_name: host-geo-country-iso-code
description: Country ISO code.
example: CA
flat_name: host.geo.country_iso_code
ignore_above: 1024
level: core
name: country_iso_code
normalize: []
original_fieldset: geo
short: Country ISO code.
type: keyword
host.geo.country_name:
dashed_name: host-geo-country-name
description: Country name.
example: Canada
flat_name: host.geo.country_name
ignore_above: 1024
level: core
name: country_name
normalize: []
original_fieldset: geo
short: Country name.
type: keyword
host.geo.location:
dashed_name: host-geo-location
description: Longitude and latitude.
example: '{ "lon": -73.614830, "lat": 45.505918 }'
flat_name: host.geo.location
level: core
name: location
normalize: []
original_fieldset: geo
short: Longitude and latitude.
type: geo_point
host.geo.name:
dashed_name: host-geo-name
description: 'User-defined description of a location, at the level of granularity
they care about.
Could be the name of their data centers, the floor number, if this describes a
local physical entity, city names.
Not typically used in automated geolocation.'
example: boston-dc
flat_name: host.geo.name
ignore_above: 1024
level: extended
name: name
normalize: []
original_fieldset: geo
short: User-defined description of a location.
type: keyword
host.geo.postal_code:
dashed_name: host-geo-postal-code
description: 'Postal code associated with the location.
Values appropriate for this field may also be known as a postcode or ZIP code
and will vary widely from country to country.'
example: 94040
flat_name: host.geo.postal_code
ignore_above: 1024
level: core
name: postal_code
normalize: []
original_fieldset: geo
short: Postal code.
type: keyword
host.geo.region_iso_code:
dashed_name: host-geo-region-iso-code
description: Region ISO code.
example: CA-QC
flat_name: host.geo.region_iso_code
ignore_above: 1024
level: core
name: region_iso_code
normalize: []
original_fieldset: geo
short: Region ISO code.
type: keyword
host.geo.region_name:
dashed_name: host-geo-region-name
description: Region name.
example: Quebec
flat_name: host.geo.region_name
ignore_above: 1024
level: core
name: region_name
normalize: []
original_fieldset: geo
short: Region name.
type: keyword
host.geo.timezone:
dashed_name: host-geo-timezone
description: The time zone of the location, such as IANA time zone name.
example: America/Argentina/Buenos_Aires
flat_name: host.geo.timezone
ignore_above: 1024
level: core
name: timezone
normalize: []
original_fieldset: geo
short: Time zone.
type: keyword
host.hostname:
dashed_name: host-hostname
description: 'Hostname of the host.
It normally contains what the `hostname` command returns on the host machine.'
flat_name: host.hostname
ignore_above: 1024
level: core
name: hostname
normalize: []
short: Hostname of the host.
type: keyword
host.id:
dashed_name: host-id
description: 'Unique host id.
As hostname is not always unique, use values that are meaningful in your environment.
Example: The current usage of `beat.name`.'
flat_name: host.id
ignore_above: 1024
level: core
name: id
normalize: []
short: Unique host id.
type: keyword
host.ip:
dashed_name: host-ip
description: Host ip addresses.
flat_name: host.ip
level: core
name: ip
normalize:
- array
short: Host ip addresses.
type: ip
host.mac:
dashed_name: host-mac
description: 'Host MAC addresses.
The notation format from RFC 7042 is suggested: Each octet (that is, 8-bit byte)
is represented by two [uppercase] hexadecimal digits giving the value of the octet
as an unsigned integer. Successive octets are separated by a hyphen.'
example: '["00-00-5E-00-53-23", "00-00-5E-00-53-24"]'
flat_name: host.mac
ignore_above: 1024
level: core
name: mac
normalize:
- array
pattern: ^[A-F0-9]{2}(-[A-F0-9]{2}){5,}$
short: Host MAC addresses.
type: keyword
host.name:
dashed_name: host-name
description: 'Name of the host.
It can contain what hostname returns on Unix systems, the fully qualified domain
name (FQDN), or a name specified by the user. The recommended value is the lowercase
FQDN of the host.'
flat_name: host.name
ignore_above: 1024
level: core
name: name
normalize: []
short: Name of the host.
type: keyword
host.os.Ext:
dashed_name: host-os-Ext
description: Object for all custom defined fields to live in.
flat_name: host.os.Ext
level: custom
name: Ext
normalize: []
original_fieldset: os
short: Object for all custom defined fields to live in.
type: object
host.os.Ext.variant:
dashed_name: host-os-Ext-variant
description: A string value or phrase that further aid to classify or qualify the
operating system (OS). For example the distribution for a Linux OS will be entered
in this field.
example: Ubuntu
flat_name: host.os.Ext.variant
ignore_above: 1024
level: custom
name: Ext.variant
normalize: []
original_fieldset: os
short: A string value or phrase that further aid to classify or qualify the operating
system (OS).
type: keyword
host.os.family:
dashed_name: host-os-family
description: OS family (such as redhat, debian, freebsd, windows).
example: debian
flat_name: host.os.family
ignore_above: 1024
level: extended
name: family
normalize: []
original_fieldset: os
short: OS family (such as redhat, debian, freebsd, windows).
type: keyword
host.os.full:
dashed_name: host-os-full
description: Operating system name, including the version or code name.
example: Mac OS Mojave
flat_name: host.os.full
ignore_above: 1024
level: extended
multi_fields:
- flat_name: host.os.full.caseless
ignore_above: 1024
name: caseless
normalizer: lowercase
type: keyword
- flat_name: host.os.full.text
name: text
norms: false
type: text
name: full
normalize: []
original_fieldset: os
short: Operating system name, including the version or code name.
type: keyword
host.os.kernel:
dashed_name: host-os-kernel
description: Operating system kernel version as a raw string.
example: 4.4.0-112-generic
flat_name: host.os.kernel
ignore_above: 1024
level: extended
name: kernel
normalize: []
original_fieldset: os
short: Operating system kernel version as a raw string.
type: keyword
host.os.name:
dashed_name: host-os-name
description: Operating system name, without the version.
example: Mac OS X
flat_name: host.os.name
ignore_above: 1024
level: extended
multi_fields:
- flat_name: host.os.name.caseless
ignore_above: 1024
name: caseless
normalizer: lowercase
type: keyword
- flat_name: host.os.name.text
name: text
norms: false
type: text
name: name
normalize: []
original_fieldset: os
short: Operating system name, without the version.
type: keyword
host.os.platform:
dashed_name: host-os-platform
description: Operating system platform (such centos, ubuntu, windows).
example: darwin
flat_name: host.os.platform
ignore_above: 1024
level: extended
name: platform
normalize: []
original_fieldset: os
short: Operating system platform (such centos, ubuntu, windows).
type: keyword
host.os.type:
dashed_name: host-os-type
description: 'Use the `os.type` field to categorize the operating system into one
of the broad commercial families.
If the OS you''re dealing with is not listed as an expected value, the field should
not be populated. Please let us know by opening an issue with ECS, to propose
its addition.'
example: macos
expected_values:
- linux
- macos
- unix
- windows
- ios
- android
flat_name: host.os.type
ignore_above: 1024
level: extended
name: type
normalize: []
original_fieldset: os
short: 'Which commercial OS family (one of: linux, macos, unix, windows, ios or
android).'
type: keyword
host.os.version:
dashed_name: host-os-version
description: Operating system version as a raw string.
example: 10.14.1
flat_name: host.os.version
ignore_above: 1024
level: extended
name: version
normalize: []
original_fieldset: os
short: Operating system version as a raw string.
type: keyword
host.type:
dashed_name: host-type
description: 'Type of host.
For Cloud providers this can be the machine type like `t2.medium`. If vm, this
could be the container, for example, or other information meaningful in your environment.'
flat_name: host.type
ignore_above: 1024
level: core
name: type
normalize: []
short: Type of host.
type: keyword
host.uptime:
dashed_name: host-uptime
description: Seconds the host has been up.
example: 1325
flat_name: host.uptime
level: extended
name: uptime
normalize: []
short: Seconds the host has been up.
type: long
host.user.Ext:
dashed_name: host-user-Ext
description: Object for all custom defined fields to live in.
flat_name: host.user.Ext
level: custom
name: Ext
normalize: []
original_fieldset: user
short: Object for all custom defined fields to live in.
type: object
host.user.Ext.real:
dashed_name: host-user-Ext-real
description: User info prior to any setuid operations.
flat_name: host.user.Ext.real
level: custom
name: Ext.real
normalize: []
original_fieldset: user
short: User info prior to any setuid operations.
type: object
host.user.Ext.real.id:
dashed_name: host-user-Ext-real-id
description: One or multiple unique identifiers of the user.
flat_name: host.user.Ext.real.id
ignore_above: 1024
level: custom
name: Ext.real.id
normalize: []
original_fieldset: user
short: One or multiple unique identifiers of the user.
type: keyword
host.user.Ext.real.name:
dashed_name: host-user-Ext-real-name
description: Short name or login of the user.
flat_name: host.user.Ext.real.name
ignore_above: 1024
level: custom
name: Ext.real.name
normalize: []
original_fieldset: user
short: Short name or login of the user.
type: keyword
host.user.domain:
dashed_name: host-user-domain
description: 'Name of the directory the user is a member of.
For example, an LDAP or Active Directory domain name.'
flat_name: host.user.domain
ignore_above: 1024
level: extended
name: domain
normalize: []
original_fieldset: user
short: Name of the directory the user is a member of.
type: keyword
host.user.email:
dashed_name: host-user-email
description: User email address.
flat_name: host.user.email
ignore_above: 1024
level: extended
name: email
normalize: []
original_fieldset: user
short: User email address.
type: keyword
host.user.full_name:
dashed_name: host-user-full-name
description: User's full name, if available.
example: Albert Einstein
flat_name: host.user.full_name
ignore_above: 1024
level: extended
multi_fields:
- flat_name: host.user.full_name.text
name: text
type: match_only_text
name: full_name
normalize: []
original_fieldset: user
short: User's full name, if available.
type: keyword
host.user.group.Ext:
dashed_name: host-user-group-Ext
description: Object for all custom defined fields to live in.
flat_name: host.user.group.Ext
level: custom
name: Ext
normalize: []
original_fieldset: group
short: Object for all custom defined fields to live in.
type: object
host.user.group.Ext.real:
dashed_name: host-user-group-Ext-real
description: Group info prior to any setgid operations.
flat_name: host.user.group.Ext.real
level: custom
name: Ext.real
normalize: []
original_fieldset: group
short: Group info prior to any setgid operations.
type: object
host.user.group.Ext.real.id:
dashed_name: host-user-group-Ext-real-id
description: Unique identifier for the group on the system/platform.
flat_name: host.user.group.Ext.real.id
ignore_above: 1024
level: custom
name: Ext.real.id
normalize: []
original_fieldset: group
short: Unique identifier for the group on the system/platform.
type: keyword
host.user.group.Ext.real.name:
dashed_name: host-user-group-Ext-real-name
description: Name of the group.
flat_name: host.user.group.Ext.real.name
ignore_above: 1024
level: custom
name: Ext.real.name
normalize: []
original_fieldset: group
short: Name of the group.
type: keyword
host.user.group.domain:
dashed_name: host-user-group-domain
description: Name of the directory the group is a member of. For example, an LDAP
or Active Directory domain name.
flat_name: host.user.group.domain
ignore_above: 1024
level: extended
name: domain
normalize: []
original_fieldset: group
short: Name of the directory the group is a member of.
type: keyword
host.user.group.id:
dashed_name: host-user-group-id
description: Unique identifier for the group on the system/platform.
flat_name: host.user.group.id
ignore_above: 1024
level: extended
name: id
normalize: []
original_fieldset: group
short: Unique identifier for the group on the system/platform.
type: keyword
host.user.group.name:
dashed_name: host-user-group-name
description: Name of the group.
flat_name: host.user.group.name
ignore_above: 1024
level: extended
name: name
normalize: []
original_fieldset: group
short: Name of the group.
type: keyword
host.user.hash:
dashed_name: host-user-hash
description: 'Unique user hash to correlate information for a user in anonymized
form.
Useful if `user.id` or `user.name` contain confidential information and cannot
be used.'
flat_name: host.user.hash
ignore_above: 1024
level: extended
name: hash
normalize: []
original_fieldset: user
short: Unique user hash to correlate information for a user in anonymized form.
type: keyword
host.user.id:
dashed_name: host-user-id
description: Unique identifier of the user.
example: S-1-5-21-202424912787-2692429404-2351956786-1000
flat_name: host.user.id
ignore_above: 1024
level: core
name: id
normalize: []
original_fieldset: user
short: Unique identifier of the user.
type: keyword
host.user.name:
dashed_name: host-user-name
description: Short name or login of the user.
example: a.einstein
flat_name: host.user.name
ignore_above: 1024
level: core
multi_fields:
- flat_name: host.user.name.text
name: text
type: match_only_text
name: name
normalize: []
original_fieldset: user
short: Short name or login of the user.
type: keyword
message:
dashed_name: message
description: 'For log events the message field contains the log message, optimized
for viewing in a log viewer.
For structured logs without an original message field, other fields can be concatenated
to form a human-readable summary of the event.
If multiple messages exist, they can be combined into one message.'
example: Hello World
flat_name: message
level: core
name: message
normalize: []
short: Log message optimized for viewing in a log viewer.
type: match_only_text
process.Ext:
dashed_name: process-Ext
description: Object for all custom defined fields to live in.
flat_name: process.Ext
level: custom
name: Ext
normalize: []
short: Object for all custom defined fields to live in.
type: object
process.Ext.ancestry:
dashed_name: process-Ext-ancestry
description: An array of entity_ids indicating the ancestors for this event
flat_name: process.Ext.ancestry
ignore_above: 1024
level: custom
name: Ext.ancestry
normalize: []
short: An array of entity_ids indicating the ancestors for this event
type: keyword
process.Ext.authentication_id:
dashed_name: process-Ext-authentication-id
description: Process authentication ID
flat_name: process.Ext.authentication_id
ignore_above: 1024
level: custom
name: Ext.authentication_id
normalize: []
short: Process authentication ID
type: keyword
process.Ext.code_signature:
dashed_name: process-Ext-code-signature
description: Nested version of ECS code_signature fieldset.
flat_name: process.Ext.code_signature
level: custom
name: Ext.code_signature
normalize: []
short: Nested version of ECS code_signature fieldset.
type: nested
process.Ext.code_signature.exists:
dashed_name: process-Ext-code-signature-exists
description: Boolean to capture if a signature is present.
example: 'true'
flat_name: process.Ext.code_signature.exists
level: custom
name: Ext.code_signature.exists
normalize: []
short: Boolean to capture if a signature is present.
type: boolean
process.Ext.code_signature.status:
dashed_name: process-Ext-code-signature-status
description: 'Additional information about the certificate status.
This is useful for logging cryptographic errors with the certificate validity
or trust status. Leave unpopulated if the validity or trust of the certificate
was unchecked.'
example: ERROR_UNTRUSTED_ROOT
flat_name: process.Ext.code_signature.status
ignore_above: 1024
level: custom
name: Ext.code_signature.status
normalize: []
short: Additional information about the certificate status.
type: keyword
process.Ext.code_signature.subject_name:
dashed_name: process-Ext-code-signature-subject-name
description: Subject name of the code signer
example: Microsoft Corporation
flat_name: process.Ext.code_signature.subject_name
ignore_above: 1024
level: custom
name: Ext.code_signature.subject_name
normalize: []
short: Subject name of the code signer
type: keyword
process.Ext.code_signature.trusted:
dashed_name: process-Ext-code-signature-trusted
description: 'Stores the trust status of the certificate chain.
Validating the trust of the certificate chain may be complicated, and this field
should only be populated by tools that actively check the status.'
example: 'true'
flat_name: process.Ext.code_signature.trusted
level: custom
name: Ext.code_signature.trusted
normalize: []
short: Stores the trust status of the certificate chain.
type: boolean
process.Ext.code_signature.valid:
dashed_name: process-Ext-code-signature-valid
description: 'Boolean to capture if the digital signature is verified against the
binary content.
Leave unpopulated if a certificate was unchecked.'
example: 'true'
flat_name: process.Ext.code_signature.valid
level: custom
name: Ext.code_signature.valid
normalize: []
short: Boolean to capture if the digital signature is verified against the binary
content.
type: boolean
process.Ext.protection:
dashed_name: process-Ext-protection
description: Indicates the protection level of this process. Uses the same syntax
as Process Explorer. Examples include PsProtectedSignerWinTcb, PsProtectedSignerWinTcb-Light,
and PsProtectedSignerWindows-Light.
flat_name: process.Ext.protection
ignore_above: 1024
level: custom
name: Ext.protection
normalize: []
short: OS-level protections granted to this process
type: keyword
process.Ext.services:
dashed_name: process-Ext-services
description: Services running in this process.
flat_name: process.Ext.services
ignore_above: 1024
level: custom
name: Ext.services
normalize: []
short: Services running in this process.
type: keyword
process.Ext.session:
dashed_name: process-Ext-session
description: Session information for the current process
flat_name: process.Ext.session
ignore_above: 1024
level: custom
name: Ext.session
normalize: []
short: Session information for the current process
type: keyword
process.Ext.token.domain:
dashed_name: process-Ext-token-domain
description: Domain of token user.
flat_name: process.Ext.token.domain
ignore_above: 1024
level: custom
name: domain
normalize: []
original_fieldset: token
short: Domain of token user.
type: keyword
process.Ext.token.elevation:
dashed_name: process-Ext-token-elevation
description: Whether the token is elevated or not
flat_name: process.Ext.token.elevation
level: custom
name: elevation
normalize: []
original_fieldset: token
short: Whether the token is elevated or not
type: boolean
process.Ext.token.elevation_type:
dashed_name: process-Ext-token-elevation-type
description: What level of elevation the token has
example: one of "default", "full", "limited"
flat_name: process.Ext.token.elevation_type
ignore_above: 1024
level: custom
name: elevation_type
normalize: []
original_fieldset: token
short: What level of elevation the token has
type: keyword
process.Ext.token.impersonation_level:
dashed_name: process-Ext-token-impersonation-level
description: Impersonation level. Only valid for impersonation tokens.
flat_name: process.Ext.token.impersonation_level
ignore_above: 1024
level: custom
name: impersonation_level
normalize: []
original_fieldset: token
short: Impersonation level. Only valid for impersonation tokens.
type: keyword
process.Ext.token.integrity_level:
dashed_name: process-Ext-token-integrity-level
description: Numeric integrity level.
flat_name: process.Ext.token.integrity_level
level: custom
name: integrity_level
normalize: []
original_fieldset: token
short: Numeric integrity level.
type: long
process.Ext.token.integrity_level_name:
dashed_name: process-Ext-token-integrity-level-name
description: Human readable integrity level.
example: one of "system", "high", "medium", "low", "untrusted"
flat_name: process.Ext.token.integrity_level_name
ignore_above: 1024
level: custom
name: integrity_level_name
normalize: []
original_fieldset: token
short: Human readable integrity level.
type: keyword
process.Ext.token.is_appcontainer:
dashed_name: process-Ext-token-is-appcontainer
description: Whether or not this is an appcontainer token.
flat_name: process.Ext.token.is_appcontainer
level: custom
name: is_appcontainer
normalize: []
original_fieldset: token
short: Whether or not this is an appcontainer token.
type: boolean
process.Ext.token.privileges:
dashed_name: process-Ext-token-privileges
description: Array describing the privileges associated with the token.
flat_name: process.Ext.token.privileges
level: custom
name: privileges
normalize: []
original_fieldset: token
short: Array describing the privileges associated with the token.
type: nested
process.Ext.token.privileges.description:
dashed_name: process-Ext-token-privileges-description
description: Description of the privilege.
flat_name: process.Ext.token.privileges.description
ignore_above: 1024
level: custom
name: privileges.description
normalize: []
original_fieldset: token
short: Description of the privilege.
type: keyword
process.Ext.token.privileges.enabled:
dashed_name: process-Ext-token-privileges-enabled
description: Whether or not the privilege is enabled.
flat_name: process.Ext.token.privileges.enabled
level: custom
name: privileges.enabled
normalize: []
original_fieldset: token
short: Whether or not the privilege is enabled.
type: boolean
process.Ext.token.privileges.name:
dashed_name: process-Ext-token-privileges-name
description: Name of the privilege.
flat_name: process.Ext.token.privileges.name
ignore_above: 1024
level: custom
name: privileges.name
normalize: []
original_fieldset: token
short: Name of the privilege.
type: keyword
process.Ext.token.sid:
dashed_name: process-Ext-token-sid
description: Token user's Security Identifier (SID).
flat_name: process.Ext.token.sid
ignore_above: 1024
level: custom
name: sid
normalize: []
original_fieldset: token
short: Token user's Security Identifier (SID).
type: keyword
process.Ext.token.type:
dashed_name: process-Ext-token-type
description: Type of the token, either primary or impersonation.
flat_name: process.Ext.token.type
ignore_above: 1024
level: custom
name: type
normalize: []
original_fieldset: token
short: Type of the token, either primary or impersonation.
type: keyword
process.Ext.token.user:
dashed_name: process-Ext-token-user
description: Username of token owner.
flat_name: process.Ext.token.user
ignore_above: 1024
level: custom
name: user
normalize: []
original_fieldset: token
short: Username of token owner.
type: keyword
process.Ext.user:
dashed_name: process-Ext-user
description: User associated with the running process.
flat_name: process.Ext.user
ignore_above: 1024
level: custom
name: Ext.user
normalize: []
short: User associated with the running process.
type: keyword
process.args:
dashed_name: process-args
description: 'Array of process arguments, starting with the absolute path to the
executable.
May be filtered to protect sensitive information.'
example: '["/usr/bin/ssh", "-l", "user", "10.0.0.16"]'
flat_name: process.args
ignore_above: 1024
level: extended
name: args
normalize:
- array
short: Array of process arguments.
type: keyword
process.args_count:
dashed_name: process-args-count
description: 'Length of the process.args array.
This field can be useful for querying or performing bucket analysis on how many
arguments were provided to start a process. More arguments may be an indication
of suspicious activity.'
example: 4
flat_name: process.args_count
level: extended
name: args_count
normalize: []
short: Length of the process.args array.
type: long
process.code_signature.exists:
dashed_name: process-code-signature-exists
description: Boolean to capture if a signature is present.
example: 'true'
flat_name: process.code_signature.exists
level: core
name: exists
normalize: []
original_fieldset: code_signature
short: Boolean to capture if a signature is present.
type: boolean
process.code_signature.signing_id:
dashed_name: process-code-signature-signing-id
description: 'The identifier used to sign the process.
This is used to identify the application manufactured by a software vendor. The
field is relevant to Apple *OS only.'
example: com.apple.xpc.proxy
flat_name: process.code_signature.signing_id
ignore_above: 1024
level: extended
name: signing_id
normalize: []
original_fieldset: code_signature
short: The identifier used to sign the process.
type: keyword
process.code_signature.status:
dashed_name: process-code-signature-status
description: 'Additional information about the certificate status.
This is useful for logging cryptographic errors with the certificate validity
or trust status. Leave unpopulated if the validity or trust of the certificate
was unchecked.'
example: ERROR_UNTRUSTED_ROOT
flat_name: process.code_signature.status
ignore_above: 1024
level: extended
name: status
normalize: []
original_fieldset: code_signature
short: Additional information about the certificate status.
type: keyword
process.code_signature.subject_name:
dashed_name: process-code-signature-subject-name
description: Subject name of the code signer
example: Microsoft Corporation
flat_name: process.code_signature.subject_name
ignore_above: 1024
level: core
name: subject_name
normalize: []
original_fieldset: code_signature
short: Subject name of the code signer
type: keyword
process.code_signature.team_id:
dashed_name: process-code-signature-team-id
description: 'The team identifier used to sign the process.
This is used to identify the team or vendor of a software product. The field is
relevant to Apple *OS only.'
example: EQHXZ8M8AV
flat_name: process.code_signature.team_id
ignore_above: 1024
level: extended
name: team_id
normalize: []
original_fieldset: code_signature
short: The team identifier used to sign the process.
type: keyword
process.code_signature.trusted:
dashed_name: process-code-signature-trusted
description: 'Stores the trust status of the certificate chain.
Validating the trust of the certificate chain may be complicated, and this field
should only be populated by tools that actively check the status.'
example: 'true'
flat_name: process.code_signature.trusted
level: extended
name: trusted
normalize: []
original_fieldset: code_signature
short: Stores the trust status of the certificate chain.
type: boolean
process.code_signature.valid:
dashed_name: process-code-signature-valid
description: 'Boolean to capture if the digital signature is verified against the
binary content.
Leave unpopulated if a certificate was unchecked.'
example: 'true'
flat_name: process.code_signature.valid
level: extended
name: valid
normalize: []
original_fieldset: code_signature
short: Boolean to capture if the digital signature is verified against the binary
content.
type: boolean
process.command_line:
dashed_name: process-command-line
description: 'Full command line that started the process, including the absolute
path to the executable, and all arguments.
Some arguments may be filtered to protect sensitive information.'
example: /usr/bin/ssh -l user 10.0.0.16
flat_name: process.command_line
level: extended
multi_fields:
- flat_name: process.command_line.caseless
ignore_above: 1024
name: caseless
normalizer: lowercase
type: keyword
- flat_name: process.command_line.text
name: text
norms: false
type: text
name: command_line
normalize: []
short: Full command line that started the process.
type: wildcard
process.entity_id:
dashed_name: process-entity-id
description: 'Unique identifier for the process.
The implementation of this is specified by the data source, but some examples
of what could be used here are a process-generated UUID, Sysmon Process GUIDs,
or a hash of some uniquely identifying components of a process.
Constructing a globally unique identifier is a common practice to mitigate PID
reuse as well as to identify a specific process over time, across multiple monitored
hosts.'
example: c2c455d9f99375d
flat_name: process.entity_id
ignore_above: 1024
level: extended
name: entity_id
normalize: []
short: Unique identifier for the process.
type: keyword
process.executable:
dashed_name: process-executable
description: Absolute path to the process executable.
example: /usr/bin/ssh
flat_name: process.executable
ignore_above: 1024
level: extended
multi_fields:
- flat_name: process.executable.caseless
ignore_above: 1024
name: caseless
normalizer: lowercase
type: keyword
- flat_name: process.executable.text
name: text
norms: false
type: text
name: executable
normalize: []
short: Absolute path to the process executable.
type: keyword
process.exit_code:
dashed_name: process-exit-code
description: 'The exit code of the process, if this is a termination event.
The field should be absent if there is no exit code for the event (e.g. process
start).'
example: 137
flat_name: process.exit_code
level: extended
name: exit_code
normalize: []
short: The exit code of the process.
type: long
process.hash.md5:
dashed_name: process-hash-md5
description: MD5 hash.
flat_name: process.hash.md5
ignore_above: 1024
level: extended
name: md5
normalize: []
original_fieldset: hash
short: MD5 hash.
type: keyword
process.hash.sha1:
dashed_name: process-hash-sha1
description: SHA1 hash.
flat_name: process.hash.sha1
ignore_above: 1024
level: extended
name: sha1
normalize: []
original_fieldset: hash
short: SHA1 hash.
type: keyword
process.hash.sha256:
dashed_name: process-hash-sha256
description: SHA256 hash.
flat_name: process.hash.sha256
ignore_above: 1024
level: extended
name: sha256
normalize: []
original_fieldset: hash
short: SHA256 hash.
type: keyword
process.hash.sha512:
dashed_name: process-hash-sha512
description: SHA512 hash.
flat_name: process.hash.sha512
ignore_above: 1024
level: extended
name: sha512
normalize: []
original_fieldset: hash
short: SHA512 hash.
type: keyword
process.name:
dashed_name: process-name
description: 'Process name.
Sometimes called program name or similar.'
example: ssh
flat_name: process.name
ignore_above: 1024
level: extended
multi_fields:
- flat_name: process.name.caseless
ignore_above: 1024
name: caseless
normalizer: lowercase
type: keyword
- flat_name: process.name.text
name: text
norms: false
type: text
name: name
normalize: []
short: Process name.
type: keyword
process.parent.Ext:
dashed_name: process-parent-Ext
description: Object for all custom defined fields to live in.
flat_name: process.parent.Ext
level: custom
name: Ext
normalize: []
original_fieldset: process
short: Object for all custom defined fields to live in.
type: object
process.parent.Ext.code_signature:
dashed_name: process-parent-Ext-code-signature
description: Nested version of ECS code_signature fieldset.
flat_name: process.parent.Ext.code_signature
level: custom
name: Ext.code_signature
normalize: []
original_fieldset: process
short: Nested version of ECS code_signature fieldset.
type: nested
process.parent.Ext.code_signature.exists:
dashed_name: process-parent-Ext-code-signature-exists
description: Boolean to capture if a signature is present.
example: 'true'
flat_name: process.parent.Ext.code_signature.exists
level: custom
name: Ext.code_signature.exists
normalize: []
original_fieldset: process
short: Boolean to capture if a signature is present.
type: boolean
process.parent.Ext.code_signature.status:
dashed_name: process-parent-Ext-code-signature-status
description: 'Additional information about the certificate status.
This is useful for logging cryptographic errors with the certificate validity
or trust status. Leave unpopulated if the validity or trust of the certificate
was unchecked.'
example: ERROR_UNTRUSTED_ROOT
flat_name: process.parent.Ext.code_signature.status
ignore_above: 1024
level: custom
name: Ext.code_signature.status
normalize: []
original_fieldset: process
short: Additional information about the certificate status.
type: keyword
process.parent.Ext.code_signature.subject_name:
dashed_name: process-parent-Ext-code-signature-subject-name
description: Subject name of the code signer
example: Microsoft Corporation
flat_name: process.parent.Ext.code_signature.subject_name
ignore_above: 1024
level: custom
name: Ext.code_signature.subject_name
normalize: []
original_fieldset: process
short: Subject name of the code signer
type: keyword
process.parent.Ext.code_signature.trusted:
dashed_name: process-parent-Ext-code-signature-trusted
description: 'Stores the trust status of the certificate chain.
Validating the trust of the certificate chain may be complicated, and this field
should only be populated by tools that actively check the status.'
example: 'true'
flat_name: process.parent.Ext.code_signature.trusted
level: custom
name: Ext.code_signature.trusted
normalize: []
original_fieldset: process
short: Stores the trust status of the certificate chain.
type: boolean
process.parent.Ext.code_signature.valid:
dashed_name: process-parent-Ext-code-signature-valid
description: 'Boolean to capture if the digital signature is verified against the
binary content.
Leave unpopulated if a certificate was unchecked.'
example: 'true'
flat_name: process.parent.Ext.code_signature.valid
level: custom
name: Ext.code_signature.valid
normalize: []
original_fieldset: process
short: Boolean to capture if the digital signature is verified against the binary
content.
type: boolean
process.parent.Ext.protection:
dashed_name: process-parent-Ext-protection
description: Indicates the protection level of this process. Uses the same syntax
as Process Explorer. Examples include PsProtectedSignerWinTcb, PsProtectedSignerWinTcb-Light,
and PsProtectedSignerWindows-Light.
flat_name: process.parent.Ext.protection
ignore_above: 1024
level: custom
name: Ext.protection
normalize: []
original_fieldset: process
short: OS-level protections granted to this process
type: keyword
process.parent.Ext.real:
dashed_name: process-parent-Ext-real
description: The field set containing process info in case of any pid spoofing.
This is mainly useful for process.parent.
flat_name: process.parent.Ext.real
level: custom
name: Ext.real
normalize: []
original_fieldset: process
short: The field set containing process info in case of any pid spoofing. This is
mainly useful for process.parent.
type: object
process.parent.Ext.real.pid:
dashed_name: process-parent-Ext-real-pid
description: For process.parent this will be the ppid of the process that actually
spawned the current process.
flat_name: process.parent.Ext.real.pid
level: custom
name: Ext.real.pid
normalize: []
original_fieldset: process
short: The real pid of the process if ppid spoofing is happening.
type: long
process.parent.args:
dashed_name: process-parent-args
description: 'Array of process arguments, starting with the absolute path to the
executable.
May be filtered to protect sensitive information.'
example: '["/usr/bin/ssh", "-l", "user", "10.0.0.16"]'
flat_name: process.parent.args
ignore_above: 1024
level: extended
name: args
normalize:
- array
original_fieldset: process
short: Array of process arguments.
type: keyword
process.parent.args_count:
dashed_name: process-parent-args-count
description: 'Length of the process.args array.
This field can be useful for querying or performing bucket analysis on how many
arguments were provided to start a process. More arguments may be an indication
of suspicious activity.'
example: 4
flat_name: process.parent.args_count
level: extended
name: args_count
normalize: []
original_fieldset: process
short: Length of the process.args array.
type: long
process.parent.code_signature.exists:
dashed_name: process-parent-code-signature-exists
description: Boolean to capture if a signature is present.
example: 'true'
flat_name: process.parent.code_signature.exists
level: core
name: exists
normalize: []
original_fieldset: code_signature
short: Boolean to capture if a signature is present.
type: boolean
process.parent.code_signature.signing_id:
dashed_name: process-parent-code-signature-signing-id
description: 'The identifier used to sign the process.
This is used to identify the application manufactured by a software vendor. The
field is relevant to Apple *OS only.'
example: com.apple.xpc.proxy
flat_name: process.parent.code_signature.signing_id
ignore_above: 1024
level: extended
name: signing_id
normalize: []
original_fieldset: code_signature
short: The identifier used to sign the process.
type: keyword
process.parent.code_signature.status:
dashed_name: process-parent-code-signature-status
description: 'Additional information about the certificate status.
This is useful for logging cryptographic errors with the certificate validity
or trust status. Leave unpopulated if the validity or trust of the certificate
was unchecked.'
example: ERROR_UNTRUSTED_ROOT
flat_name: process.parent.code_signature.status
ignore_above: 1024
level: extended
name: status
normalize: []
original_fieldset: code_signature
short: Additional information about the certificate status.
type: keyword
process.parent.code_signature.subject_name:
dashed_name: process-parent-code-signature-subject-name
description: Subject name of the code signer
example: Microsoft Corporation
flat_name: process.parent.code_signature.subject_name
ignore_above: 1024
level: core
name: subject_name
normalize: []
original_fieldset: code_signature
short: Subject name of the code signer
type: keyword
process.parent.code_signature.team_id:
dashed_name: process-parent-code-signature-team-id
description: 'The team identifier used to sign the process.
This is used to identify the team or vendor of a software product. The field is
relevant to Apple *OS only.'
example: EQHXZ8M8AV
flat_name: process.parent.code_signature.team_id
ignore_above: 1024
level: extended
name: team_id
normalize: []
original_fieldset: code_signature
short: The team identifier used to sign the process.
type: keyword
process.parent.code_signature.trusted:
dashed_name: process-parent-code-signature-trusted
description: 'Stores the trust status of the certificate chain.
Validating the trust of the certificate chain may be complicated, and this field
should only be populated by tools that actively check the status.'
example: 'true'
flat_name: process.parent.code_signature.trusted
level: extended
name: trusted
normalize: []
original_fieldset: code_signature
short: Stores the trust status of the certificate chain.
type: boolean
process.parent.code_signature.valid:
dashed_name: process-parent-code-signature-valid
description: 'Boolean to capture if the digital signature is verified against the
binary content.
Leave unpopulated if a certificate was unchecked.'
example: 'true'
flat_name: process.parent.code_signature.valid
level: extended
name: valid
normalize: []
original_fieldset: code_signature
short: Boolean to capture if the digital signature is verified against the binary
content.
type: boolean
process.parent.command_line:
dashed_name: process-parent-command-line
description: 'Full command line that started the process, including the absolute
path to the executable, and all arguments.
Some arguments may be filtered to protect sensitive information.'
example: /usr/bin/ssh -l user 10.0.0.16
flat_name: process.parent.command_line
level: extended
multi_fields:
- flat_name: process.parent.command_line.caseless
ignore_above: 1024
name: caseless
normalizer: lowercase
type: keyword
- flat_name: process.parent.command_line.text
name: text
norms: false
type: text
name: command_line
normalize: []
original_fieldset: process
short: Full command line that started the process.
type: wildcard
process.parent.entity_id:
dashed_name: process-parent-entity-id
description: 'Unique identifier for the process.
The implementation of this is specified by the data source, but some examples
of what could be used here are a process-generated UUID, Sysmon Process GUIDs,
or a hash of some uniquely identifying components of a process.
Constructing a globally unique identifier is a common practice to mitigate PID
reuse as well as to identify a specific process over time, across multiple monitored
hosts.'
example: c2c455d9f99375d
flat_name: process.parent.entity_id
ignore_above: 1024
level: extended
name: entity_id
normalize: []
original_fieldset: process
short: Unique identifier for the process.
type: keyword
process.parent.executable:
dashed_name: process-parent-executable
description: Absolute path to the process executable.
example: /usr/bin/ssh
flat_name: process.parent.executable
ignore_above: 1024
level: extended
multi_fields:
- flat_name: process.parent.executable.caseless
ignore_above: 1024
name: caseless
normalizer: lowercase
type: keyword
- flat_name: process.parent.executable.text
name: text
norms: false
type: text
name: executable
normalize: []
original_fieldset: process
short: Absolute path to the process executable.
type: keyword
process.parent.exit_code:
dashed_name: process-parent-exit-code
description: 'The exit code of the process, if this is a termination event.
The field should be absent if there is no exit code for the event (e.g. process
start).'
example: 137
flat_name: process.parent.exit_code
level: extended
name: exit_code
normalize: []
original_fieldset: process
short: The exit code of the process.
type: long
process.parent.hash.md5:
dashed_name: process-parent-hash-md5
description: MD5 hash.
flat_name: process.parent.hash.md5
ignore_above: 1024
level: extended
name: md5
normalize: []
original_fieldset: hash
short: MD5 hash.
type: keyword
process.parent.hash.sha1:
dashed_name: process-parent-hash-sha1
description: SHA1 hash.
flat_name: process.parent.hash.sha1
ignore_above: 1024
level: extended
name: sha1
normalize: []
original_fieldset: hash
short: SHA1 hash.
type: keyword
process.parent.hash.sha256:
dashed_name: process-parent-hash-sha256
description: SHA256 hash.
flat_name: process.parent.hash.sha256
ignore_above: 1024
level: extended
name: sha256
normalize: []
original_fieldset: hash
short: SHA256 hash.
type: keyword
process.parent.hash.sha512:
dashed_name: process-parent-hash-sha512
description: SHA512 hash.
flat_name: process.parent.hash.sha512
ignore_above: 1024
level: extended
name: sha512
normalize: []
original_fieldset: hash
short: SHA512 hash.
type: keyword
process.parent.name:
dashed_name: process-parent-name
description: 'Process name.
Sometimes called program name or similar.'
example: ssh
flat_name: process.parent.name
ignore_above: 1024
level: extended
multi_fields:
- flat_name: process.parent.name.caseless
ignore_above: 1024
name: caseless
normalizer: lowercase
type: keyword
- flat_name: process.parent.name.text
name: text
norms: false
type: text
name: name
normalize: []
original_fieldset: process
short: Process name.
type: keyword
process.parent.pgid:
dashed_name: process-parent-pgid
description: 'Deprecated for removal in next major version release. This field is
superseded by `process.group_leader.pid`.
Identifier of the group of processes the process belongs to.'
flat_name: process.parent.pgid
format: string
level: extended
name: pgid
normalize: []
original_fieldset: process
short: Deprecated identifier of the group of processes the process belongs to.
type: long
process.parent.pid:
dashed_name: process-parent-pid
description: Process id.
example: 4242
flat_name: process.parent.pid
format: string
level: core
name: pid
normalize: []
original_fieldset: process
short: Process id.
type: long
process.parent.ppid:
dashed_name: process-parent-ppid
description: Parent process' pid.
example: 4241
flat_name: process.parent.ppid
format: string
level: extended
name: ppid
normalize: []
original_fieldset: process
short: Parent process' pid.
type: long
process.parent.start:
dashed_name: process-parent-start
description: The time the process started.
example: '2016-05-23T08:05:34.853Z'
flat_name: process.parent.start
level: extended
name: start
normalize: []
original_fieldset: process
short: The time the process started.
type: date
process.parent.thread.id:
dashed_name: process-parent-thread-id
description: Thread ID.
example: 4242
flat_name: process.parent.thread.id
format: string
level: extended
name: thread.id
normalize: []
original_fieldset: process
short: Thread ID.
type: long
process.parent.thread.name:
dashed_name: process-parent-thread-name
description: Thread name.
example: thread-0
flat_name: process.parent.thread.name
ignore_above: 1024
level: extended
name: thread.name
normalize: []
original_fieldset: process
short: Thread name.
type: keyword
process.parent.title:
dashed_name: process-parent-title
description: 'Process title.
The proctitle, some times the same as process name. Can also be different: for
example a browser setting its title to the web page currently opened.'
flat_name: process.parent.title
ignore_above: 1024
level: extended
multi_fields:
- flat_name: process.parent.title.text
name: text
type: match_only_text
name: title
normalize: []
original_fieldset: process
short: Process title.
type: keyword
process.parent.uptime:
dashed_name: process-parent-uptime
description: Seconds the process has been up.
example: 1325
flat_name: process.parent.uptime
level: extended
name: uptime
normalize: []
original_fieldset: process
short: Seconds the process has been up.
type: long
process.parent.working_directory:
dashed_name: process-parent-working-directory
description: The working directory of the process.
example: /home/alice
flat_name: process.parent.working_directory
ignore_above: 1024
level: extended
multi_fields:
- flat_name: process.parent.working_directory.caseless
ignore_above: 1024
name: caseless
normalizer: lowercase
type: keyword
- flat_name: process.parent.working_directory.text
name: text
norms: false
type: text
name: working_directory
normalize: []
original_fieldset: process
short: The working directory of the process.
type: keyword
process.pe.company:
dashed_name: process-pe-company
description: Internal company name of the file, provided at compile-time.
example: Microsoft Corporation
flat_name: process.pe.company
ignore_above: 1024
level: extended
name: company
normalize: []
original_fieldset: pe
short: Internal company name of the file, provided at compile-time.
type: keyword
process.pe.description:
dashed_name: process-pe-description
description: Internal description of the file, provided at compile-time.
example: Paint
flat_name: process.pe.description
ignore_above: 1024
level: extended
name: description
normalize: []
original_fieldset: pe
short: Internal description of the file, provided at compile-time.
type: keyword
process.pe.file_version:
dashed_name: process-pe-file-version
description: Internal version of the file, provided at compile-time.
example: 6.3.9600.17415
flat_name: process.pe.file_version
ignore_above: 1024
level: extended
name: file_version
normalize: []
original_fieldset: pe
short: Process name.
type: keyword
process.pe.imphash:
dashed_name: process-pe-imphash
description: 'A hash of the imports in a PE file. An imphash -- or import hash --
can be used to fingerprint binaries even after recompilation or other code-level
transformations have occurred, which would change more traditional hash values.
Learn more at https://www.fireeye.com/blog/threat-research/2014/01/tracking-malware-import-hashing.html.'
example: 0c6803c4e922103c4dca5963aad36ddf
flat_name: process.pe.imphash
ignore_above: 1024
level: extended
name: imphash
normalize: []
original_fieldset: pe
short: A hash of the imports in a PE file.
type: keyword
process.pe.original_file_name:
dashed_name: process-pe-original-file-name
description: Internal name of the file, provided at compile-time.
example: MSPAINT.EXE
flat_name: process.pe.original_file_name
ignore_above: 1024
level: extended
name: original_file_name
normalize: []
original_fieldset: pe
short: Internal name of the file, provided at compile-time.
type: keyword
process.pe.product:
dashed_name: process-pe-product
description: Internal product name of the file, provided at compile-time.
example: "Microsoft\xAE Windows\xAE Operating System"
flat_name: process.pe.product
ignore_above: 1024
level: extended
name: product
normalize: []
original_fieldset: pe
short: Internal product name of the file, provided at compile-time.
type: keyword
process.pgid:
dashed_name: process-pgid
description: 'Deprecated for removal in next major version release. This field is
superseded by `process.group_leader.pid`.
Identifier of the group of processes the process belongs to.'
flat_name: process.pgid
format: string
level: extended
name: pgid
normalize: []
short: Deprecated identifier of the group of processes the process belongs to.
type: long
process.pid:
dashed_name: process-pid
description: Process id.
example: 4242
flat_name: process.pid
format: string
level: core
name: pid
normalize: []
short: Process id.
type: long
process.ppid:
dashed_name: process-ppid
description: Parent process' pid.
example: 4241
flat_name: process.ppid
format: string
level: extended
name: ppid
normalize: []
short: Parent process' pid.
type: long
process.start:
dashed_name: process-start
description: The time the process started.
example: '2016-05-23T08:05:34.853Z'
flat_name: process.start
level: extended
name: start
normalize: []
short: The time the process started.
type: date
process.thread.Ext:
dashed_name: process-thread-Ext
description: Object for all custom defined fields to live in.
flat_name: process.thread.Ext
level: custom
name: thread.Ext
normalize: []
short: Object for all custom defined fields to live in.
type: object
process.thread.Ext.call_stack:
dashed_name: process-thread-Ext-call-stack
description: Fields describing a stack frame. call_stack is expected to be an array
where each array element represents a stack frame.
enabled: false
flat_name: process.thread.Ext.call_stack
level: custom
name: call_stack
normalize: []
original_fieldset: call_stack
short: Fields describing a stack frame.
type: object
process.thread.Ext.call_stack.instruction_pointer:
dashed_name: process-thread-Ext-call-stack-instruction-pointer
description: The return address of this stack frame.
flat_name: process.thread.Ext.call_stack.instruction_pointer
ignore_above: 1024
level: custom
name: instruction_pointer
normalize: []
original_fieldset: call_stack
short: The return address of this stack frame.
type: keyword
process.thread.Ext.call_stack.memory_section.memory_address:
dashed_name: process-thread-Ext-call-stack-memory-section-memory-address
description: Base address of the memory region containing `instruction_pointer`. Corresponds
to `MEMORY_BASIC_INFORMATION.BaseAddress`
doc_values: false
flat_name: process.thread.Ext.call_stack.memory_section.memory_address
index: false
level: custom
name: memory_section.memory_address
normalize: []
original_fieldset: call_stack
short: Base address of the memory region containing `instruction_pointer`.
type: keyword
process.thread.Ext.call_stack.memory_section.memory_size:
dashed_name: process-thread-Ext-call-stack-memory-section-memory-size
description: Size of the memory region containing `instruction_pointer`. Corresponds
to `MEMORY_BASIC_INFORMATION.RegionSize`
doc_values: false
flat_name: process.thread.Ext.call_stack.memory_section.memory_size
index: false
level: custom
name: memory_section.memory_size
normalize: []
original_fieldset: call_stack
short: Size of the memory region containing `instruction_pointer`. Corresponds
to `MEMORY_BASIC_INFORMATION.RegionSize`
type: keyword
process.thread.Ext.call_stack.memory_section.protection:
dashed_name: process-thread-Ext-call-stack-memory-section-protection
description: Memory protection flags of this memory region. Corresponds to `MEMORY_BASIC_INFORMATION.Protect`
flat_name: process.thread.Ext.call_stack.memory_section.protection
ignore_above: 1024
level: custom
name: memory_section.protection
normalize: []
original_fieldset: call_stack
short: Memory protection flags of this memory region. Corresponds to `MEMORY_BASIC_INFORMATION.Protect`
type: keyword
process.thread.Ext.call_stack.module_path:
dashed_name: process-thread-Ext-call-stack-module-path
description: The path to the DLL/module containing `instruction_pointer`.
flat_name: process.thread.Ext.call_stack.module_path
ignore_above: 1024
level: custom
name: module_path
normalize: []
original_fieldset: call_stack
short: The path to the DLL/module containing `instruction_pointer`.
type: keyword
process.thread.Ext.call_stack.rva:
dashed_name: process-thread-Ext-call-stack-rva
description: The relative virtual address of `instruction_pointer`. Computed as
`instruction_pointer - MEMORY_BASIC_INFORMATION.AllocationBase`.
flat_name: process.thread.Ext.call_stack.rva
ignore_above: 1024
level: custom
name: rva
normalize: []
original_fieldset: call_stack
short: The relative virtual address of `instruction_pointer`.
type: keyword
process.thread.Ext.call_stack.symbol_info:
dashed_name: process-thread-Ext-call-stack-symbol-info
description: The nearest symbol for `instruction_pointer`.
flat_name: process.thread.Ext.call_stack.symbol_info
ignore_above: 1024
level: custom
name: symbol_info
normalize: []
original_fieldset: call_stack
short: The nearest symbol for `instruction_pointer`.
type: keyword
process.thread.Ext.service:
dashed_name: process-thread-Ext-service
description: Service associated with the thread.
example: VaultSvc
flat_name: process.thread.Ext.service
ignore_above: 1024
level: custom
name: thread.Ext.service
normalize: []
short: Service associated with the thread.
type: keyword
process.thread.Ext.start:
dashed_name: process-thread-Ext-start
description: The time the thread started.
example: '2016-05-23T08:05:34.853Z'
flat_name: process.thread.Ext.start
level: custom
name: thread.Ext.start
normalize: []
short: The time the thread started.
type: date
process.thread.Ext.start_address:
dashed_name: process-thread-Ext-start-address
description: Memory address where the thread began execution.
example: 4194304
flat_name: process.thread.Ext.start_address
level: custom
name: thread.Ext.start_address
normalize: []
short: Memory address where the thread began execution.
type: unsigned_long
process.thread.Ext.start_address_module:
dashed_name: process-thread-Ext-start-address-module
description: The dll/module where the thread began execution.
example: C:\Program Files\VMware\VMware Tools\vmtoolsd.exe
flat_name: process.thread.Ext.start_address_module
ignore_above: 1024
level: custom
name: thread.Ext.start_address_module
normalize: []
short: The dll/module where the thread began execution.
type: keyword
process.thread.Ext.token.domain:
dashed_name: process-thread-Ext-token-domain
description: Domain of token user.
flat_name: process.thread.Ext.token.domain
ignore_above: 1024
level: custom
name: domain
normalize: []
original_fieldset: token
short: Domain of token user.
type: keyword
process.thread.Ext.token.elevation:
dashed_name: process-thread-Ext-token-elevation
description: Whether the token is elevated or not
flat_name: process.thread.Ext.token.elevation
level: custom
name: elevation
normalize: []
original_fieldset: token
short: Whether the token is elevated or not
type: boolean
process.thread.Ext.token.elevation_type:
dashed_name: process-thread-Ext-token-elevation-type
description: What level of elevation the token has
example: one of "default", "full", "limited"
flat_name: process.thread.Ext.token.elevation_type
ignore_above: 1024
level: custom
name: elevation_type
normalize: []
original_fieldset: token
short: What level of elevation the token has
type: keyword
process.thread.Ext.token.impersonation_level:
dashed_name: process-thread-Ext-token-impersonation-level
description: Impersonation level. Only valid for impersonation tokens.
flat_name: process.thread.Ext.token.impersonation_level
ignore_above: 1024
level: custom
name: impersonation_level
normalize: []
original_fieldset: token
short: Impersonation level. Only valid for impersonation tokens.
type: keyword
process.thread.Ext.token.integrity_level:
dashed_name: process-thread-Ext-token-integrity-level
description: Numeric integrity level.
flat_name: process.thread.Ext.token.integrity_level
level: custom
name: integrity_level
normalize: []
original_fieldset: token
short: Numeric integrity level.
type: long
process.thread.Ext.token.integrity_level_name:
dashed_name: process-thread-Ext-token-integrity-level-name
description: Human readable integrity level.
example: one of "system", "high", "medium", "low", "untrusted"
flat_name: process.thread.Ext.token.integrity_level_name
ignore_above: 1024
level: custom
name: integrity_level_name
normalize: []
original_fieldset: token
short: Human readable integrity level.
type: keyword
process.thread.Ext.token.is_appcontainer:
dashed_name: process-thread-Ext-token-is-appcontainer
description: Whether or not this is an appcontainer token.
flat_name: process.thread.Ext.token.is_appcontainer
level: custom
name: is_appcontainer
normalize: []
original_fieldset: token
short: Whether or not this is an appcontainer token.
type: boolean
process.thread.Ext.token.privileges:
dashed_name: process-thread-Ext-token-privileges
description: Array describing the privileges associated with the token.
flat_name: process.thread.Ext.token.privileges
level: custom
name: privileges
normalize: []
original_fieldset: token
short: Array describing the privileges associated with the token.
type: nested
process.thread.Ext.token.privileges.description:
dashed_name: process-thread-Ext-token-privileges-description
description: Description of the privilege.
flat_name: process.thread.Ext.token.privileges.description
ignore_above: 1024
level: custom
name: privileges.description
normalize: []
original_fieldset: token
short: Description of the privilege.
type: keyword
process.thread.Ext.token.privileges.enabled:
dashed_name: process-thread-Ext-token-privileges-enabled
description: Whether or not the privilege is enabled.
flat_name: process.thread.Ext.token.privileges.enabled
level: custom
name: privileges.enabled
normalize: []
original_fieldset: token
short: Whether or not the privilege is enabled.
type: boolean
process.thread.Ext.token.privileges.name:
dashed_name: process-thread-Ext-token-privileges-name
description: Name of the privilege.
flat_name: process.thread.Ext.token.privileges.name
ignore_above: 1024
level: custom
name: privileges.name
normalize: []
original_fieldset: token
short: Name of the privilege.
type: keyword
process.thread.Ext.token.sid:
dashed_name: process-thread-Ext-token-sid
description: Token user's Security Identifier (SID).
flat_name: process.thread.Ext.token.sid
ignore_above: 1024
level: custom
name: sid
normalize: []
original_fieldset: token
short: Token user's Security Identifier (SID).
type: keyword
process.thread.Ext.token.type:
dashed_name: process-thread-Ext-token-type
description: Type of the token, either primary or impersonation.
flat_name: process.thread.Ext.token.type
ignore_above: 1024
level: custom
name: type
normalize: []
original_fieldset: token
short: Type of the token, either primary or impersonation.
type: keyword
process.thread.Ext.token.user:
dashed_name: process-thread-Ext-token-user
description: Username of token owner.
flat_name: process.thread.Ext.token.user
ignore_above: 1024
level: custom
name: user
normalize: []
original_fieldset: token
short: Username of token owner.
type: keyword
process.thread.Ext.uptime:
dashed_name: process-thread-Ext-uptime
description: Seconds since thread started.
flat_name: process.thread.Ext.uptime
level: custom
name: thread.Ext.uptime
normalize: []
short: Seconds since thread started.
type: long
process.thread.id:
dashed_name: process-thread-id
description: Thread ID.
example: 4242
flat_name: process.thread.id
format: string
level: extended
name: thread.id
normalize: []
short: Thread ID.
type: long
process.thread.name:
dashed_name: process-thread-name
description: Thread name.
example: thread-0
flat_name: process.thread.name
ignore_above: 1024
level: extended
name: thread.name
normalize: []
short: Thread name.
type: keyword
process.title:
dashed_name: process-title
description: 'Process title.
The proctitle, some times the same as process name. Can also be different: for
example a browser setting its title to the web page currently opened.'
flat_name: process.title
ignore_above: 1024
level: extended
multi_fields:
- flat_name: process.title.text
name: text
type: match_only_text
name: title
normalize: []
short: Process title.
type: keyword
process.uptime:
dashed_name: process-uptime
description: Seconds the process has been up.
example: 1325
flat_name: process.uptime
level: extended
name: uptime
normalize: []
short: Seconds the process has been up.
type: long
process.working_directory:
dashed_name: process-working-directory
description: The working directory of the process.
example: /home/alice
flat_name: process.working_directory
ignore_above: 1024
level: extended
multi_fields:
- flat_name: process.working_directory.caseless
ignore_above: 1024
name: caseless
normalizer: lowercase
type: keyword
- flat_name: process.working_directory.text
name: text
norms: false
type: text
name: working_directory
normalize: []
short: The working directory of the process.
type: keyword
rule.author:
dashed_name: rule-author
description: Name, organization, or pseudonym of the author or authors who created
the rule used to generate this event.
example: '["Star-Lord"]'
flat_name: rule.author
ignore_above: 1024
level: extended
name: author
normalize:
- array
short: Rule author
type: keyword
rule.category:
dashed_name: rule-category
description: A categorization value keyword used by the entity using the rule for
detection of this event.
example: Attempted Information Leak
flat_name: rule.category
ignore_above: 1024
level: extended
name: category
normalize: []
short: Rule category
type: keyword
rule.description:
dashed_name: rule-description
description: The description of the rule generating the event.
example: Block requests to public DNS over HTTPS / TLS protocols
flat_name: rule.description
ignore_above: 1024
level: extended
name: description
normalize: []
short: Rule description
type: keyword
rule.id:
dashed_name: rule-id
description: A rule ID that is unique within the scope of an agent, observer, or
other entity using the rule for detection of this event.
example: 101
flat_name: rule.id
ignore_above: 1024
level: extended
name: id
normalize: []
short: Rule ID
type: keyword
rule.license:
dashed_name: rule-license
description: Name of the license under which the rule used to generate this event
is made available.
example: Apache 2.0
flat_name: rule.license
ignore_above: 1024
level: extended
name: license
normalize: []
short: Rule license
type: keyword
rule.name:
dashed_name: rule-name
description: The name of the rule or signature generating the event.
example: BLOCK_DNS_over_TLS
flat_name: rule.name
ignore_above: 1024
level: extended
name: name
normalize: []
short: Rule name
type: keyword
rule.reference:
dashed_name: rule-reference
description: 'Reference URL to additional information about the rule used to generate
this event.
The URL can point to the vendor''s documentation about the rule. If that''s not
available, it can also be a link to a more general page describing this type of
alert.'
example: https://en.wikipedia.org/wiki/DNS_over_TLS
flat_name: rule.reference
ignore_above: 1024
level: extended
name: reference
normalize: []
short: Rule reference URL
type: keyword
rule.ruleset:
dashed_name: rule-ruleset
description: Name of the ruleset, policy, group, or parent category in which the
rule used to generate this event is a member.
example: Standard_Protocol_Filters
flat_name: rule.ruleset
ignore_above: 1024
level: extended
name: ruleset
normalize: []
short: Rule ruleset
type: keyword
rule.uuid:
dashed_name: rule-uuid
description: A rule ID that is unique within the scope of a set or group of agents,
observers, or other entities using the rule for detection of this event.
example: 1100110011
flat_name: rule.uuid
ignore_above: 1024
level: extended
name: uuid
normalize: []
short: Rule UUID
type: keyword
rule.version:
dashed_name: rule-version
description: The version / revision of the rule being used for analysis.
example: 1.1
flat_name: rule.version
ignore_above: 1024
level: extended
name: version
normalize: []
short: Rule version
type: keyword
source.geo.city_name:
dashed_name: source-geo-city-name
description: City name.
example: Montreal
flat_name: source.geo.city_name
ignore_above: 1024
level: core
name: city_name
normalize: []
original_fieldset: geo
short: City name.
type: keyword
source.geo.continent_code:
dashed_name: source-geo-continent-code
description: Two-letter code representing continent's name.
example: NA
flat_name: source.geo.continent_code
ignore_above: 1024
level: core
name: continent_code
normalize: []
original_fieldset: geo
short: Continent code.
type: keyword
source.geo.continent_name:
dashed_name: source-geo-continent-name
description: Name of the continent.
example: North America
flat_name: source.geo.continent_name
ignore_above: 1024
level: core
name: continent_name
normalize: []
original_fieldset: geo
short: Name of the continent.
type: keyword
source.geo.country_iso_code:
dashed_name: source-geo-country-iso-code
description: Country ISO code.
example: CA
flat_name: source.geo.country_iso_code
ignore_above: 1024
level: core
name: country_iso_code
normalize: []
original_fieldset: geo
short: Country ISO code.
type: keyword
source.geo.country_name:
dashed_name: source-geo-country-name
description: Country name.
example: Canada
flat_name: source.geo.country_name
ignore_above: 1024
level: core
name: country_name
normalize: []
original_fieldset: geo
short: Country name.
type: keyword
source.geo.location:
dashed_name: source-geo-location
description: Longitude and latitude.
example: '{ "lon": -73.614830, "lat": 45.505918 }'
flat_name: source.geo.location
level: core
name: location
normalize: []
original_fieldset: geo
short: Longitude and latitude.
type: geo_point
source.geo.name:
dashed_name: source-geo-name
description: 'User-defined description of a location, at the level of granularity
they care about.
Could be the name of their data centers, the floor number, if this describes a
local physical entity, city names.
Not typically used in automated geolocation.'
example: boston-dc
flat_name: source.geo.name
ignore_above: 1024
level: extended
name: name
normalize: []
original_fieldset: geo
short: User-defined description of a location.
type: keyword
source.geo.postal_code:
dashed_name: source-geo-postal-code
description: 'Postal code associated with the location.
Values appropriate for this field may also be known as a postcode or ZIP code
and will vary widely from country to country.'
example: 94040
flat_name: source.geo.postal_code
ignore_above: 1024
level: core
name: postal_code
normalize: []
original_fieldset: geo
short: Postal code.
type: keyword
source.geo.region_iso_code:
dashed_name: source-geo-region-iso-code
description: Region ISO code.
example: CA-QC
flat_name: source.geo.region_iso_code
ignore_above: 1024
level: core
name: region_iso_code
normalize: []
original_fieldset: geo
short: Region ISO code.
type: keyword
source.geo.region_name:
dashed_name: source-geo-region-name
description: Region name.
example: Quebec
flat_name: source.geo.region_name
ignore_above: 1024
level: core
name: region_name
normalize: []
original_fieldset: geo
short: Region name.
type: keyword
source.geo.timezone:
dashed_name: source-geo-timezone
description: The time zone of the location, such as IANA time zone name.
example: America/Argentina/Buenos_Aires
flat_name: source.geo.timezone
ignore_above: 1024
level: core
name: timezone
normalize: []
original_fieldset: geo
short: Time zone.
type: keyword
threat.enrichments:
dashed_name: threat-enrichments
description: A list of associated indicators objects enriching the event, and the
context of that association/enrichment.
flat_name: threat.enrichments
level: extended
name: enrichments
normalize:
- array
short: List of objects containing indicators enriching the event.
type: nested
threat.enrichments.indicator:
dashed_name: threat-enrichments-indicator
description: Object containing associated indicators enriching the event.
flat_name: threat.enrichments.indicator
level: extended
name: enrichments.indicator
normalize: []
short: Object containing indicators enriching the event.
type: object
threat.enrichments.indicator.file.Ext:
dashed_name: threat-enrichments-indicator-file-Ext
description: Object for all custom defined fields to live in.
flat_name: threat.enrichments.indicator.file.Ext
level: custom
name: Ext
normalize: []
original_fieldset: file
short: Object for all custom defined fields to live in.
type: object
threat.enrichments.indicator.file.Ext.code_signature:
dashed_name: threat-enrichments-indicator-file-Ext-code-signature
description: Nested version of ECS code_signature fieldset.
flat_name: threat.enrichments.indicator.file.Ext.code_signature
level: custom
name: Ext.code_signature
normalize: []
original_fieldset: file
short: Nested version of ECS code_signature fieldset.
type: nested
threat.enrichments.indicator.file.Ext.code_signature.exists:
dashed_name: threat-enrichments-indicator-file-Ext-code-signature-exists
description: Boolean to capture if a signature is present.
example: 'true'
flat_name: threat.enrichments.indicator.file.Ext.code_signature.exists
level: core
name: Ext.code_signature.exists
normalize: []
original_fieldset: file
short: Boolean to capture if a signature is present.
type: boolean
threat.enrichments.indicator.file.Ext.code_signature.status:
dashed_name: threat-enrichments-indicator-file-Ext-code-signature-status
description: 'Additional information about the certificate status.
This is useful for logging cryptographic errors with the certificate validity
or trust status. Leave unpopulated if the validity or trust of the certificate
was unchecked.'
example: ERROR_UNTRUSTED_ROOT
flat_name: threat.enrichments.indicator.file.Ext.code_signature.status
ignore_above: 1024
level: custom
name: Ext.code_signature.status
normalize: []
original_fieldset: file
short: Additional information about the certificate status.
type: keyword
threat.enrichments.indicator.file.Ext.code_signature.subject_name:
dashed_name: threat-enrichments-indicator-file-Ext-code-signature-subject-name
description: Subject name of the code signer
example: Microsoft Corporation
flat_name: threat.enrichments.indicator.file.Ext.code_signature.subject_name
ignore_above: 1024
level: core
name: Ext.code_signature.subject_name
normalize: []
original_fieldset: file
short: Subject name of the code signer
type: keyword
threat.enrichments.indicator.file.Ext.code_signature.trusted:
dashed_name: threat-enrichments-indicator-file-Ext-code-signature-trusted
description: 'Stores the trust status of the certificate chain.
Validating the trust of the certificate chain may be complicated, and this field
should only be populated by tools that actively check the status.'
example: 'true'
flat_name: threat.enrichments.indicator.file.Ext.code_signature.trusted
level: custom
name: Ext.code_signature.trusted
normalize: []
original_fieldset: file
short: Stores the trust status of the certificate chain.
type: boolean
threat.enrichments.indicator.file.Ext.code_signature.valid:
dashed_name: threat-enrichments-indicator-file-Ext-code-signature-valid
description: 'Boolean to capture if the digital signature is verified against the
binary content.
Leave unpopulated if a certificate was unchecked.'
example: 'true'
flat_name: threat.enrichments.indicator.file.Ext.code_signature.valid
level: custom
name: Ext.code_signature.valid
normalize: []
original_fieldset: file
short: Boolean to capture if the digital signature is verified against the binary
content.
type: boolean
threat.enrichments.indicator.file.Ext.device.bus_type:
dashed_name: threat-enrichments-indicator-file-Ext-device-bus-type
description: Bus type of the device, such as Nvme, Usb, FileBackedVirtual,... etc.
flat_name: threat.enrichments.indicator.file.Ext.device.bus_type
ignore_above: 1024
level: custom
name: Ext.device.bus_type
normalize: []
original_fieldset: file
short: Bus type of the device.
type: keyword
threat.enrichments.indicator.file.Ext.device.dos_name:
dashed_name: threat-enrichments-indicator-file-Ext-device-dos-name
description: DOS name of the device. DOS device name is in the format of driver
letters such as C:, D:,...
flat_name: threat.enrichments.indicator.file.Ext.device.dos_name
ignore_above: 1024
level: custom
name: Ext.device.dos_name
normalize: []
original_fieldset: file
short: DOS name of the device.
type: keyword
threat.enrichments.indicator.file.Ext.device.nt_name:
dashed_name: threat-enrichments-indicator-file-Ext-device-nt-name
description: 'NT name of the device. NT device name is in the format such as: \Device\HarddiskVolume2'
flat_name: threat.enrichments.indicator.file.Ext.device.nt_name
ignore_above: 1024
level: custom
name: Ext.device.nt_name
normalize: []
original_fieldset: file
short: NT name of the device.
type: keyword
threat.enrichments.indicator.file.Ext.device.product_id:
dashed_name: threat-enrichments-indicator-file-Ext-device-product-id
description: ProductID of the device. It is provided by the vendor of the device
if any.
flat_name: threat.enrichments.indicator.file.Ext.device.product_id
ignore_above: 1024
level: custom
name: Ext.device.product_id
normalize: []
original_fieldset: file
short: ProductID of the device.
type: keyword
threat.enrichments.indicator.file.Ext.device.serial_number:
dashed_name: threat-enrichments-indicator-file-Ext-device-serial-number
description: Serial Number of the device. It is provided by the vendor of the device
if any.
flat_name: threat.enrichments.indicator.file.Ext.device.serial_number
ignore_above: 1024
level: custom
name: Ext.device.serial_number
normalize: []
original_fieldset: file
short: Serial Number of the device.
type: keyword
threat.enrichments.indicator.file.Ext.device.vendor_id:
dashed_name: threat-enrichments-indicator-file-Ext-device-vendor-id
description: VendorID of the device. It is provided by the vendor of the device.
flat_name: threat.enrichments.indicator.file.Ext.device.vendor_id
ignore_above: 1024
level: custom
name: Ext.device.vendor_id
normalize: []
original_fieldset: file
short: VendorID of the device.
type: keyword
threat.enrichments.indicator.file.Ext.entropy:
dashed_name: threat-enrichments-indicator-file-Ext-entropy
description: Entropy calculation of file's header and footer used to check file
integrity.
flat_name: threat.enrichments.indicator.file.Ext.entropy
level: custom
name: Ext.entropy
normalize: []
original_fieldset: file
short: File entropy value
type: double
threat.enrichments.indicator.file.Ext.entry_modified:
dashed_name: threat-enrichments-indicator-file-Ext-entry-modified
description: Time of last status change. See `st_ctim` member of `struct stat`.
flat_name: threat.enrichments.indicator.file.Ext.entry_modified
level: custom
name: Ext.entry_modified
normalize: []
original_fieldset: file
short: Time of last status change. See `st_ctim` member of `struct stat`.
type: double
threat.enrichments.indicator.file.Ext.header_bytes:
dashed_name: threat-enrichments-indicator-file-Ext-header-bytes
description: First 16 bytes of file used to check file integrity.
flat_name: threat.enrichments.indicator.file.Ext.header_bytes
ignore_above: 1024
level: custom
name: Ext.header_bytes
normalize: []
original_fieldset: file
short: Header bytes
type: keyword
threat.enrichments.indicator.file.Ext.header_data:
dashed_name: threat-enrichments-indicator-file-Ext-header-data
description: First 16 bytes of file used to check file integrity.
flat_name: threat.enrichments.indicator.file.Ext.header_data
level: custom
name: Ext.header_data
normalize: []
norms: false
original_fieldset: file
short: Header data
type: text
threat.enrichments.indicator.file.Ext.malware_classification.features.data.buffer:
dashed_name: threat-enrichments-indicator-file-Ext-malware-classification-features-data-buffer
description: The features extracted from this file and evaluated by the model. Usually
an array of floats. Likely zlib-encoded.
flat_name: threat.enrichments.indicator.file.Ext.malware_classification.features.data.buffer
ignore_above: 1024
level: custom
name: features.data.buffer
normalize: []
original_fieldset: malware_classification
short: The features extracted from this file and evaluated by the model. Usually
an array of floats. Likely zlib-encoded.
type: keyword
threat.enrichments.indicator.file.Ext.malware_classification.features.data.decompressed_size:
dashed_name: threat-enrichments-indicator-file-Ext-malware-classification-features-data-decompressed-size
description: The decompressed size of buffer.
flat_name: threat.enrichments.indicator.file.Ext.malware_classification.features.data.decompressed_size
level: custom
name: features.data.decompressed_size
normalize: []
original_fieldset: malware_classification
short: The decompressed size of buffer.
type: integer
threat.enrichments.indicator.file.Ext.malware_classification.features.data.encoding:
dashed_name: threat-enrichments-indicator-file-Ext-malware-classification-features-data-encoding
description: The encoding of buffer (e.g. zlib).
flat_name: threat.enrichments.indicator.file.Ext.malware_classification.features.data.encoding
ignore_above: 1024
level: custom
name: features.data.encoding
normalize: []
original_fieldset: malware_classification
short: The encoding of buffer (e.g. zlib).
type: keyword
threat.enrichments.indicator.file.Ext.malware_classification.identifier:
dashed_name: threat-enrichments-indicator-file-Ext-malware-classification-identifier
description: The model's unique identifier.
flat_name: threat.enrichments.indicator.file.Ext.malware_classification.identifier
ignore_above: 1024
level: custom
name: identifier
normalize: []
original_fieldset: malware_classification
short: The model's unique identifier.
type: keyword
threat.enrichments.indicator.file.Ext.malware_classification.score:
dashed_name: threat-enrichments-indicator-file-Ext-malware-classification-score
description: The score produced by the classification model.
flat_name: threat.enrichments.indicator.file.Ext.malware_classification.score
level: custom
name: score
normalize: []
original_fieldset: malware_classification
short: The score produced by the classification model.
type: double
threat.enrichments.indicator.file.Ext.malware_classification.threshold:
dashed_name: threat-enrichments-indicator-file-Ext-malware-classification-threshold
description: The score threshold for the model. Files that score above this threshold
are considered malicious.
flat_name: threat.enrichments.indicator.file.Ext.malware_classification.threshold
level: custom
name: threshold
normalize: []
original_fieldset: malware_classification
short: The score threshold for the model. Files that score above this threshold
are considered malicious.
type: double
threat.enrichments.indicator.file.Ext.malware_classification.upx_packed:
dashed_name: threat-enrichments-indicator-file-Ext-malware-classification-upx-packed
description: Whether UPX packing was detected.
flat_name: threat.enrichments.indicator.file.Ext.malware_classification.upx_packed
level: custom
name: upx_packed
normalize: []
original_fieldset: malware_classification
short: Whether UPX packing was detected.
type: boolean
threat.enrichments.indicator.file.Ext.malware_classification.version:
dashed_name: threat-enrichments-indicator-file-Ext-malware-classification-version
description: The version of the model used.
flat_name: threat.enrichments.indicator.file.Ext.malware_classification.version
ignore_above: 1024
level: custom
name: version
normalize: []
original_fieldset: malware_classification
short: The version of the model used.
type: keyword
threat.enrichments.indicator.file.Ext.malware_signature:
dashed_name: threat-enrichments-indicator-file-Ext-malware-signature
description: Nested version of malware_signature fieldset.
flat_name: threat.enrichments.indicator.file.Ext.malware_signature
level: custom
name: Ext.malware_signature
normalize: []
original_fieldset: file
short: Nested version of malware_signature fieldset.
type: nested
threat.enrichments.indicator.file.Ext.malware_signature.all_names:
dashed_name: threat-enrichments-indicator-file-Ext-malware-signature-all-names
description: The concatenated names of all yara signatures
flat_name: threat.enrichments.indicator.file.Ext.malware_signature.all_names
level: custom
name: Ext.malware_signature.all_names
normalize: []
norms: false
original_fieldset: file
short: Yara signature names
type: text
threat.enrichments.indicator.file.Ext.malware_signature.identifier:
dashed_name: threat-enrichments-indicator-file-Ext-malware-signature-identifier
description: Malware artifact identifier.
flat_name: threat.enrichments.indicator.file.Ext.malware_signature.identifier
level: custom
name: Ext.malware_signature.identifier
normalize: []
norms: false
original_fieldset: file
short: Malware artifact identifier
type: text
threat.enrichments.indicator.file.Ext.malware_signature.primary:
dashed_name: threat-enrichments-indicator-file-Ext-malware-signature-primary
description: Primary malware signature match.
flat_name: threat.enrichments.indicator.file.Ext.malware_signature.primary
level: custom
name: Ext.malware_signature.primary
normalize: []
original_fieldset: file
short: Primary malware signature match
type: nested
threat.enrichments.indicator.file.Ext.malware_signature.primary.matches:
dashed_name: threat-enrichments-indicator-file-Ext-malware-signature-primary-matches
description: An array of bytes representing yara signature matches
flat_name: threat.enrichments.indicator.file.Ext.malware_signature.primary.matches
level: custom
name: Ext.malware_signature.primary.matches
normalize:
- array
original_fieldset: file
short: signature match bytes
type: nested
threat.enrichments.indicator.file.Ext.malware_signature.primary.signature:
dashed_name: threat-enrichments-indicator-file-Ext-malware-signature-primary-signature
description: Primary malware signature match.
flat_name: threat.enrichments.indicator.file.Ext.malware_signature.primary.signature
level: custom
name: Ext.malware_signature.primary.signature
normalize: []
original_fieldset: file
short: Primary malware signature match
type: nested
threat.enrichments.indicator.file.Ext.malware_signature.primary.signature.hash:
dashed_name: threat-enrichments-indicator-file-Ext-malware-signature-primary-signature-hash
description: Primary malware signature hash.
flat_name: threat.enrichments.indicator.file.Ext.malware_signature.primary.signature.hash
level: custom
name: Ext.malware_signature.primary.signature.hash
normalize: []
original_fieldset: file
short: Primary malware signature hash
type: nested
threat.enrichments.indicator.file.Ext.malware_signature.primary.signature.hash.sha256:
dashed_name: threat-enrichments-indicator-file-Ext-malware-signature-primary-signature-hash-sha256
description: Primary malware signature sha256.
flat_name: threat.enrichments.indicator.file.Ext.malware_signature.primary.signature.hash.sha256
ignore_above: 1024
level: custom
name: Ext.malware_signature.primary.signature.hash.sha256
normalize: []
original_fieldset: file
short: Primary malware signature sha256
type: keyword
threat.enrichments.indicator.file.Ext.malware_signature.primary.signature.id:
dashed_name: threat-enrichments-indicator-file-Ext-malware-signature-primary-signature-id
description: Primary malware signature id.
flat_name: threat.enrichments.indicator.file.Ext.malware_signature.primary.signature.id
ignore_above: 1024
level: custom
name: Ext.malware_signature.primary.signature.id
normalize: []
original_fieldset: file
short: Primary malware signature id
type: keyword
threat.enrichments.indicator.file.Ext.malware_signature.primary.signature.name:
dashed_name: threat-enrichments-indicator-file-Ext-malware-signature-primary-signature-name
description: Primary malware signature name.
flat_name: threat.enrichments.indicator.file.Ext.malware_signature.primary.signature.name
ignore_above: 1024
level: custom
name: Ext.malware_signature.primary.signature.name
normalize: []
original_fieldset: file
short: Primary malware signature name
type: keyword
threat.enrichments.indicator.file.Ext.malware_signature.secondary:
dashed_name: threat-enrichments-indicator-file-Ext-malware-signature-secondary
description: An array of malware signature matches
flat_name: threat.enrichments.indicator.file.Ext.malware_signature.secondary
level: custom
name: Ext.malware_signature.secondary
normalize:
- array
original_fieldset: file
short: secondary signature matches
type: nested
threat.enrichments.indicator.file.Ext.malware_signature.version:
dashed_name: threat-enrichments-indicator-file-Ext-malware-signature-version
description: Primary malware signature version.
flat_name: threat.enrichments.indicator.file.Ext.malware_signature.version
ignore_above: 1024
level: custom
name: Ext.malware_signature.version
normalize: []
original_fieldset: file
short: Primary malware signature version
type: keyword
threat.enrichments.indicator.file.Ext.monotonic_id:
dashed_name: threat-enrichments-indicator-file-Ext-monotonic-id
description: File event monotonic ID.
flat_name: threat.enrichments.indicator.file.Ext.monotonic_id
level: custom
name: Ext.monotonic_id
normalize: []
original_fieldset: file
short: File event monotonic ID
type: unsigned_long
threat.enrichments.indicator.file.Ext.original:
dashed_name: threat-enrichments-indicator-file-Ext-original
description: Original file information during a modification event.
flat_name: threat.enrichments.indicator.file.Ext.original
level: custom
name: Ext.original
normalize: []
original_fieldset: file
short: Original file information during a modification event.
type: object
threat.enrichments.indicator.file.Ext.original.gid:
dashed_name: threat-enrichments-indicator-file-Ext-original-gid
description: Primary group ID (GID) of the file.
example: '1001'
flat_name: threat.enrichments.indicator.file.Ext.original.gid
ignore_above: 1024
level: custom
name: Ext.original.gid
normalize: []
original_fieldset: file
short: Primary group ID (GID) of the file.
type: keyword
threat.enrichments.indicator.file.Ext.original.group:
dashed_name: threat-enrichments-indicator-file-Ext-original-group
description: Primary group name of the file.
example: alice
flat_name: threat.enrichments.indicator.file.Ext.original.group
ignore_above: 1024
level: custom
name: Ext.original.group
normalize: []
original_fieldset: file
short: Primary group name of the file.
type: keyword
threat.enrichments.indicator.file.Ext.original.mode:
dashed_name: threat-enrichments-indicator-file-Ext-original-mode
description: Original file mode prior to a modification event
flat_name: threat.enrichments.indicator.file.Ext.original.mode
ignore_above: 1024
level: custom
name: Ext.original.mode
normalize: []
original_fieldset: file
short: Original file mode prior to a modification event
type: keyword
threat.enrichments.indicator.file.Ext.original.name:
dashed_name: threat-enrichments-indicator-file-Ext-original-name
description: Original file name prior to a modification event
flat_name: threat.enrichments.indicator.file.Ext.original.name
ignore_above: 1024
level: custom
name: Ext.original.name
normalize: []
original_fieldset: file
short: Original file name prior to a modification event
type: keyword
threat.enrichments.indicator.file.Ext.original.owner:
dashed_name: threat-enrichments-indicator-file-Ext-original-owner
description: File owner's username.
example: alice
flat_name: threat.enrichments.indicator.file.Ext.original.owner
ignore_above: 1024
level: custom
name: Ext.original.owner
normalize: []
original_fieldset: file
short: File owner's username.
type: keyword
threat.enrichments.indicator.file.Ext.original.path:
dashed_name: threat-enrichments-indicator-file-Ext-original-path
description: Original file path prior to a modification event
flat_name: threat.enrichments.indicator.file.Ext.original.path
ignore_above: 1024
level: custom
name: Ext.original.path
normalize: []
original_fieldset: file
short: Original file path prior to a modification event
type: keyword
threat.enrichments.indicator.file.Ext.original.uid:
dashed_name: threat-enrichments-indicator-file-Ext-original-uid
description: The user ID (UID) or security identifier (SID) of the file owner.
example: '1001'
flat_name: threat.enrichments.indicator.file.Ext.original.uid
ignore_above: 1024
level: custom
name: Ext.original.uid
normalize: []
original_fieldset: file
short: The user ID (UID) or security identifier (SID) of the file owner.
type: keyword
threat.enrichments.indicator.file.Ext.quarantine_message:
dashed_name: threat-enrichments-indicator-file-Ext-quarantine-message
description: Message describing quarantine results.
flat_name: threat.enrichments.indicator.file.Ext.quarantine_message
ignore_above: 1024
level: custom
name: Ext.quarantine_message
normalize: []
original_fieldset: file
short: Message describing quarantine results.
type: keyword
threat.enrichments.indicator.file.Ext.quarantine_path:
dashed_name: threat-enrichments-indicator-file-Ext-quarantine-path
description: Path on endpoint the quarantined file was originally.
flat_name: threat.enrichments.indicator.file.Ext.quarantine_path
ignore_above: 1024
level: custom
name: Ext.quarantine_path
normalize: []
original_fieldset: file
short: Path on endpoint the quarantined file was originally.
type: keyword
threat.enrichments.indicator.file.Ext.quarantine_result:
dashed_name: threat-enrichments-indicator-file-Ext-quarantine-result
description: Boolean representing whether or not file quarantine succeeded.
flat_name: threat.enrichments.indicator.file.Ext.quarantine_result
level: custom
name: Ext.quarantine_result
normalize: []
original_fieldset: file
short: Boolean representing whether or not file quarantine succeeded.
type: boolean
threat.enrichments.indicator.file.Ext.temp_file_path:
dashed_name: threat-enrichments-indicator-file-Ext-temp-file-path
description: Path on endpoint where a copy of the file is being stored. Used to
make ephemeral files retrievable.
flat_name: threat.enrichments.indicator.file.Ext.temp_file_path
ignore_above: 1024
level: custom
name: Ext.temp_file_path
normalize: []
original_fieldset: file
short: Path on endpoint where a copy of the file is being stored. Used to make
ephemeral files retrievable.
type: keyword
threat.enrichments.indicator.file.Ext.windows:
dashed_name: threat-enrichments-indicator-file-Ext-windows
description: Platform-specific Windows fields
flat_name: threat.enrichments.indicator.file.Ext.windows
level: custom
name: Ext.windows
normalize: []
original_fieldset: file
short: Platform-specific Windows fields
type: object
threat.enrichments.indicator.file.Ext.windows.zone_identifier:
dashed_name: threat-enrichments-indicator-file-Ext-windows-zone-identifier
description: Windows zone identifier for a file
flat_name: threat.enrichments.indicator.file.Ext.windows.zone_identifier
ignore_above: 1024
level: custom
name: Ext.windows.zone_identifier
normalize: []
original_fieldset: file
short: Windows zone identifier for a file
type: keyword
threat.enrichments.indicator.file.accessed:
dashed_name: threat-enrichments-indicator-file-accessed
description: 'Last time the file was accessed.
Note that not all filesystems keep track of access time.'
flat_name: threat.enrichments.indicator.file.accessed
level: extended
name: accessed
normalize: []
original_fieldset: file
short: Last time the file was accessed.
type: date
threat.enrichments.indicator.file.attributes:
dashed_name: threat-enrichments-indicator-file-attributes
description: 'Array of file attributes.
Attributes names will vary by platform. Here''s a non-exhaustive list of values
that are expected in this field: archive, compressed, directory, encrypted, execute,
hidden, read, readonly, system, write.'
example: '["readonly", "system"]'
flat_name: threat.enrichments.indicator.file.attributes
ignore_above: 1024
level: extended
name: attributes
normalize:
- array
original_fieldset: file
short: Array of file attributes.
type: keyword
threat.enrichments.indicator.file.code_signature.exists:
dashed_name: threat-enrichments-indicator-file-code-signature-exists
description: Boolean to capture if a signature is present.
example: 'true'
flat_name: threat.enrichments.indicator.file.code_signature.exists
level: core
name: exists
normalize: []
original_fieldset: code_signature
short: Boolean to capture if a signature is present.
type: boolean
threat.enrichments.indicator.file.code_signature.signing_id:
dashed_name: threat-enrichments-indicator-file-code-signature-signing-id
description: 'The identifier used to sign the process.
This is used to identify the application manufactured by a software vendor. The
field is relevant to Apple *OS only.'
example: com.apple.xpc.proxy
flat_name: threat.enrichments.indicator.file.code_signature.signing_id
ignore_above: 1024
level: extended
name: signing_id
normalize: []
original_fieldset: code_signature
short: The identifier used to sign the process.
type: keyword
threat.enrichments.indicator.file.code_signature.status:
dashed_name: threat-enrichments-indicator-file-code-signature-status
description: 'Additional information about the certificate status.
This is useful for logging cryptographic errors with the certificate validity
or trust status. Leave unpopulated if the validity or trust of the certificate
was unchecked.'
example: ERROR_UNTRUSTED_ROOT
flat_name: threat.enrichments.indicator.file.code_signature.status
ignore_above: 1024
level: extended
name: status
normalize: []
original_fieldset: code_signature
short: Additional information about the certificate status.
type: keyword
threat.enrichments.indicator.file.code_signature.subject_name:
dashed_name: threat-enrichments-indicator-file-code-signature-subject-name
description: Subject name of the code signer
example: Microsoft Corporation
flat_name: threat.enrichments.indicator.file.code_signature.subject_name
ignore_above: 1024
level: core
name: subject_name
normalize: []
original_fieldset: code_signature
short: Subject name of the code signer
type: keyword
threat.enrichments.indicator.file.code_signature.team_id:
dashed_name: threat-enrichments-indicator-file-code-signature-team-id
description: 'The team identifier used to sign the process.
This is used to identify the team or vendor of a software product. The field is
relevant to Apple *OS only.'
example: EQHXZ8M8AV
flat_name: threat.enrichments.indicator.file.code_signature.team_id
ignore_above: 1024
level: extended
name: team_id
normalize: []
original_fieldset: code_signature
short: The team identifier used to sign the process.
type: keyword
threat.enrichments.indicator.file.code_signature.trusted:
dashed_name: threat-enrichments-indicator-file-code-signature-trusted
description: 'Stores the trust status of the certificate chain.
Validating the trust of the certificate chain may be complicated, and this field
should only be populated by tools that actively check the status.'
example: 'true'
flat_name: threat.enrichments.indicator.file.code_signature.trusted
level: extended
name: trusted
normalize: []
original_fieldset: code_signature
short: Stores the trust status of the certificate chain.
type: boolean
threat.enrichments.indicator.file.code_signature.valid:
dashed_name: threat-enrichments-indicator-file-code-signature-valid
description: 'Boolean to capture if the digital signature is verified against the
binary content.
Leave unpopulated if a certificate was unchecked.'
example: 'true'
flat_name: threat.enrichments.indicator.file.code_signature.valid
level: extended
name: valid
normalize: []
original_fieldset: code_signature
short: Boolean to capture if the digital signature is verified against the binary
content.
type: boolean
threat.enrichments.indicator.file.created:
dashed_name: threat-enrichments-indicator-file-created
description: 'File creation time.
Note that not all filesystems store the creation time.'
flat_name: threat.enrichments.indicator.file.created
level: extended
name: created
normalize: []
original_fieldset: file
short: File creation time.
type: date
threat.enrichments.indicator.file.ctime:
dashed_name: threat-enrichments-indicator-file-ctime
description: 'Last time the file attributes or metadata changed.
Note that changes to the file content will update `mtime`. This implies `ctime`
will be adjusted at the same time, since `mtime` is an attribute of the file.'
flat_name: threat.enrichments.indicator.file.ctime
level: extended
name: ctime
normalize: []
original_fieldset: file
short: Last time the file attributes or metadata changed.
type: date
threat.enrichments.indicator.file.device:
dashed_name: threat-enrichments-indicator-file-device
description: Device that is the source of the file.
example: sda
flat_name: threat.enrichments.indicator.file.device
ignore_above: 1024
level: extended
name: device
normalize: []
original_fieldset: file
short: Device that is the source of the file.
type: keyword
threat.enrichments.indicator.file.directory:
dashed_name: threat-enrichments-indicator-file-directory
description: Directory where the file is located. It should include the drive letter,
when appropriate.
example: /home/alice
flat_name: threat.enrichments.indicator.file.directory
ignore_above: 1024
level: extended
name: directory
normalize: []
original_fieldset: file
short: Directory where the file is located.
type: keyword
threat.enrichments.indicator.file.drive_letter:
dashed_name: threat-enrichments-indicator-file-drive-letter
description: 'Drive letter where the file is located. This field is only relevant
on Windows.
The value should be uppercase, and not include the colon.'
example: C
flat_name: threat.enrichments.indicator.file.drive_letter
ignore_above: 1
level: extended
name: drive_letter
normalize: []
original_fieldset: file
short: Drive letter where the file is located.
type: keyword
threat.enrichments.indicator.file.elf.architecture:
dashed_name: threat-enrichments-indicator-file-elf-architecture
description: Machine architecture of the ELF file.
example: x86-64
flat_name: threat.enrichments.indicator.file.elf.architecture
ignore_above: 1024
level: extended
name: architecture
normalize: []
original_fieldset: elf
short: Machine architecture of the ELF file.
type: keyword
threat.enrichments.indicator.file.elf.byte_order:
dashed_name: threat-enrichments-indicator-file-elf-byte-order
description: Byte sequence of ELF file.
example: Little Endian
flat_name: threat.enrichments.indicator.file.elf.byte_order
ignore_above: 1024
level: extended
name: byte_order
normalize: []
original_fieldset: elf
short: Byte sequence of ELF file.
type: keyword
threat.enrichments.indicator.file.elf.cpu_type:
dashed_name: threat-enrichments-indicator-file-elf-cpu-type
description: CPU type of the ELF file.
example: Intel
flat_name: threat.enrichments.indicator.file.elf.cpu_type
ignore_above: 1024
level: extended
name: cpu_type
normalize: []
original_fieldset: elf
short: CPU type of the ELF file.
type: keyword
threat.enrichments.indicator.file.elf.creation_date:
dashed_name: threat-enrichments-indicator-file-elf-creation-date
description: Extracted when possible from the file's metadata. Indicates when it
was built or compiled. It can also be faked by malware creators.
flat_name: threat.enrichments.indicator.file.elf.creation_date
level: extended
name: creation_date
normalize: []
original_fieldset: elf
short: Build or compile date.
type: date
threat.enrichments.indicator.file.elf.exports:
dashed_name: threat-enrichments-indicator-file-elf-exports
description: List of exported element names and types.
flat_name: threat.enrichments.indicator.file.elf.exports
level: extended
name: exports
normalize:
- array
original_fieldset: elf
short: List of exported element names and types.
type: flattened
threat.enrichments.indicator.file.elf.go_import_hash:
dashed_name: threat-enrichments-indicator-file-elf-go-import-hash
description: 'A hash of the Go language imports in an ELF file excluding standard
library imports. An import hash can be used to fingerprint binaries even after
recompilation or other code-level transformations have occurred, which would change
more traditional hash values.
The algorithm used to calculate the Go symbol hash and a reference implementation
are available [here](https://github.com/elastic/toutoumomoma).'
example: 10bddcb4cee42080f76c88d9ff964491
flat_name: threat.enrichments.indicator.file.elf.go_import_hash
ignore_above: 1024
level: extended
name: go_import_hash
normalize: []
original_fieldset: elf
short: A hash of the Go language imports in an ELF file.
type: keyword
threat.enrichments.indicator.file.elf.go_imports:
dashed_name: threat-enrichments-indicator-file-elf-go-imports
description: List of imported Go language element names and types.
flat_name: threat.enrichments.indicator.file.elf.go_imports
level: extended
name: go_imports
normalize: []
original_fieldset: elf
short: List of imported Go language element names and types.
type: flattened
threat.enrichments.indicator.file.elf.go_imports_names_entropy:
dashed_name: threat-enrichments-indicator-file-elf-go-imports-names-entropy
description: Shannon entropy calculation from the list of Go imports.
flat_name: threat.enrichments.indicator.file.elf.go_imports_names_entropy
format: number
level: extended
name: go_imports_names_entropy
normalize: []
original_fieldset: elf
short: Shannon entropy calculation from the list of Go imports.
type: long
threat.enrichments.indicator.file.elf.go_imports_names_var_entropy:
dashed_name: threat-enrichments-indicator-file-elf-go-imports-names-var-entropy
description: Variance for Shannon entropy calculation from the list of Go imports.
flat_name: threat.enrichments.indicator.file.elf.go_imports_names_var_entropy
format: number
level: extended
name: go_imports_names_var_entropy
normalize: []
original_fieldset: elf
short: Variance for Shannon entropy calculation from the list of Go imports.
type: long
threat.enrichments.indicator.file.elf.go_stripped:
dashed_name: threat-enrichments-indicator-file-elf-go-stripped
description: Set to true if the file is a Go executable that has had its symbols
stripped or obfuscated and false if an unobfuscated Go executable.
flat_name: threat.enrichments.indicator.file.elf.go_stripped
level: extended
name: go_stripped
normalize: []
original_fieldset: elf
short: Whether the file is a stripped or obfuscated Go executable.
type: boolean
threat.enrichments.indicator.file.elf.header.abi_version:
dashed_name: threat-enrichments-indicator-file-elf-header-abi-version
description: Version of the ELF Application Binary Interface (ABI).
flat_name: threat.enrichments.indicator.file.elf.header.abi_version
ignore_above: 1024
level: extended
name: header.abi_version
normalize: []
original_fieldset: elf
short: Version of the ELF Application Binary Interface (ABI).
type: keyword
threat.enrichments.indicator.file.elf.header.class:
dashed_name: threat-enrichments-indicator-file-elf-header-class
description: Header class of the ELF file.
flat_name: threat.enrichments.indicator.file.elf.header.class
ignore_above: 1024
level: extended
name: header.class
normalize: []
original_fieldset: elf
short: Header class of the ELF file.
type: keyword
threat.enrichments.indicator.file.elf.header.data:
dashed_name: threat-enrichments-indicator-file-elf-header-data
description: Data table of the ELF header.
flat_name: threat.enrichments.indicator.file.elf.header.data
ignore_above: 1024
level: extended
name: header.data
normalize: []
original_fieldset: elf
short: Data table of the ELF header.
type: keyword
threat.enrichments.indicator.file.elf.header.entrypoint:
dashed_name: threat-enrichments-indicator-file-elf-header-entrypoint
description: Header entrypoint of the ELF file.
flat_name: threat.enrichments.indicator.file.elf.header.entrypoint
format: string
level: extended
name: header.entrypoint
normalize: []
original_fieldset: elf
short: Header entrypoint of the ELF file.
type: long
threat.enrichments.indicator.file.elf.header.object_version:
dashed_name: threat-enrichments-indicator-file-elf-header-object-version
description: '"0x1" for original ELF files.'
flat_name: threat.enrichments.indicator.file.elf.header.object_version
ignore_above: 1024
level: extended
name: header.object_version
normalize: []
original_fieldset: elf
short: '"0x1" for original ELF files.'
type: keyword
threat.enrichments.indicator.file.elf.header.os_abi:
dashed_name: threat-enrichments-indicator-file-elf-header-os-abi
description: Application Binary Interface (ABI) of the Linux OS.
flat_name: threat.enrichments.indicator.file.elf.header.os_abi
ignore_above: 1024
level: extended
name: header.os_abi
normalize: []
original_fieldset: elf
short: Application Binary Interface (ABI) of the Linux OS.
type: keyword
threat.enrichments.indicator.file.elf.header.type:
dashed_name: threat-enrichments-indicator-file-elf-header-type
description: Header type of the ELF file.
flat_name: threat.enrichments.indicator.file.elf.header.type
ignore_above: 1024
level: extended
name: header.type
normalize: []
original_fieldset: elf
short: Header type of the ELF file.
type: keyword
threat.enrichments.indicator.file.elf.header.version:
dashed_name: threat-enrichments-indicator-file-elf-header-version
description: Version of the ELF header.
flat_name: threat.enrichments.indicator.file.elf.header.version
ignore_above: 1024
level: extended
name: header.version
normalize: []
original_fieldset: elf
short: Version of the ELF header.
type: keyword
threat.enrichments.indicator.file.elf.import_hash:
dashed_name: threat-enrichments-indicator-file-elf-import-hash
description: 'A hash of the imports in an ELF file. An import hash can be used to
fingerprint binaries even after recompilation or other code-level transformations
have occurred, which would change more traditional hash values.
This is an ELF implementation of the Windows PE imphash.'
example: d41d8cd98f00b204e9800998ecf8427e
flat_name: threat.enrichments.indicator.file.elf.import_hash
ignore_above: 1024
level: extended
name: import_hash
normalize: []
original_fieldset: elf
short: A hash of the imports in an ELF file.
type: keyword
threat.enrichments.indicator.file.elf.imports:
dashed_name: threat-enrichments-indicator-file-elf-imports
description: List of imported element names and types.
flat_name: threat.enrichments.indicator.file.elf.imports
level: extended
name: imports
normalize:
- array
original_fieldset: elf
short: List of imported element names and types.
type: flattened
threat.enrichments.indicator.file.elf.imports_names_entropy:
dashed_name: threat-enrichments-indicator-file-elf-imports-names-entropy
description: Shannon entropy calculation from the list of imported element names
and types.
flat_name: threat.enrichments.indicator.file.elf.imports_names_entropy
format: number
level: extended
name: imports_names_entropy
normalize: []
original_fieldset: elf
short: Shannon entropy calculation from the list of imported element names and types.
type: long
threat.enrichments.indicator.file.elf.imports_names_var_entropy:
dashed_name: threat-enrichments-indicator-file-elf-imports-names-var-entropy
description: Variance for Shannon entropy calculation from the list of imported
element names and types.
flat_name: threat.enrichments.indicator.file.elf.imports_names_var_entropy
format: number
level: extended
name: imports_names_var_entropy
normalize: []
original_fieldset: elf
short: Variance for Shannon entropy calculation from the list of imported element
names and types.
type: long
threat.enrichments.indicator.file.elf.sections:
dashed_name: threat-enrichments-indicator-file-elf-sections
description: 'An array containing an object for each section of the ELF file.
The keys that should be present in these objects are defined by sub-fields underneath
`elf.sections.*`.'
flat_name: threat.enrichments.indicator.file.elf.sections
level: extended
name: sections
normalize:
- array
original_fieldset: elf
short: Section information of the ELF file.
type: nested
threat.enrichments.indicator.file.elf.sections.chi2:
dashed_name: threat-enrichments-indicator-file-elf-sections-chi2
description: Chi-square probability distribution of the section.
flat_name: threat.enrichments.indicator.file.elf.sections.chi2
format: number
level: extended
name: sections.chi2
normalize: []
original_fieldset: elf
short: Chi-square probability distribution of the section.
type: long
threat.enrichments.indicator.file.elf.sections.entropy:
dashed_name: threat-enrichments-indicator-file-elf-sections-entropy
description: Shannon entropy calculation from the section.
flat_name: threat.enrichments.indicator.file.elf.sections.entropy
format: number
level: extended
name: sections.entropy
normalize: []
original_fieldset: elf
short: Shannon entropy calculation from the section.
type: long
threat.enrichments.indicator.file.elf.sections.flags:
dashed_name: threat-enrichments-indicator-file-elf-sections-flags
description: ELF Section List flags.
flat_name: threat.enrichments.indicator.file.elf.sections.flags
ignore_above: 1024
level: extended
name: sections.flags
normalize: []
original_fieldset: elf
short: ELF Section List flags.
type: keyword
threat.enrichments.indicator.file.elf.sections.name:
dashed_name: threat-enrichments-indicator-file-elf-sections-name
description: ELF Section List name.
flat_name: threat.enrichments.indicator.file.elf.sections.name
ignore_above: 1024
level: extended
name: sections.name
normalize: []
original_fieldset: elf
short: ELF Section List name.
type: keyword
threat.enrichments.indicator.file.elf.sections.physical_offset:
dashed_name: threat-enrichments-indicator-file-elf-sections-physical-offset
description: ELF Section List offset.
flat_name: threat.enrichments.indicator.file.elf.sections.physical_offset
ignore_above: 1024
level: extended
name: sections.physical_offset
normalize: []
original_fieldset: elf
short: ELF Section List offset.
type: keyword
threat.enrichments.indicator.file.elf.sections.physical_size:
dashed_name: threat-enrichments-indicator-file-elf-sections-physical-size
description: ELF Section List physical size.
flat_name: threat.enrichments.indicator.file.elf.sections.physical_size
format: bytes
level: extended
name: sections.physical_size
normalize: []
original_fieldset: elf
short: ELF Section List physical size.
type: long
threat.enrichments.indicator.file.elf.sections.type:
dashed_name: threat-enrichments-indicator-file-elf-sections-type
description: ELF Section List type.
flat_name: threat.enrichments.indicator.file.elf.sections.type
ignore_above: 1024
level: extended
name: sections.type
normalize: []
original_fieldset: elf
short: ELF Section List type.
type: keyword
threat.enrichments.indicator.file.elf.sections.var_entropy:
dashed_name: threat-enrichments-indicator-file-elf-sections-var-entropy
description: Variance for Shannon entropy calculation from the section.
flat_name: threat.enrichments.indicator.file.elf.sections.var_entropy
format: number
level: extended
name: sections.var_entropy
normalize: []
original_fieldset: elf
short: Variance for Shannon entropy calculation from the section.
type: long
threat.enrichments.indicator.file.elf.sections.virtual_address:
dashed_name: threat-enrichments-indicator-file-elf-sections-virtual-address
description: ELF Section List virtual address.
flat_name: threat.enrichments.indicator.file.elf.sections.virtual_address
format: string
level: extended
name: sections.virtual_address
normalize: []
original_fieldset: elf
short: ELF Section List virtual address.
type: long
threat.enrichments.indicator.file.elf.sections.virtual_size:
dashed_name: threat-enrichments-indicator-file-elf-sections-virtual-size
description: ELF Section List virtual size.
flat_name: threat.enrichments.indicator.file.elf.sections.virtual_size
format: string
level: extended
name: sections.virtual_size
normalize: []
original_fieldset: elf
short: ELF Section List virtual size.
type: long
threat.enrichments.indicator.file.elf.segments:
dashed_name: threat-enrichments-indicator-file-elf-segments
description: 'An array containing an object for each segment of the ELF file.
The keys that should be present in these objects are defined by sub-fields underneath
`elf.segments.*`.'
flat_name: threat.enrichments.indicator.file.elf.segments
level: extended
name: segments
normalize:
- array
original_fieldset: elf
short: ELF object segment list.
type: nested
threat.enrichments.indicator.file.elf.segments.sections:
dashed_name: threat-enrichments-indicator-file-elf-segments-sections
description: ELF object segment sections.
flat_name: threat.enrichments.indicator.file.elf.segments.sections
ignore_above: 1024
level: extended
name: segments.sections
normalize: []
original_fieldset: elf
short: ELF object segment sections.
type: keyword
threat.enrichments.indicator.file.elf.segments.type:
dashed_name: threat-enrichments-indicator-file-elf-segments-type
description: ELF object segment type.
flat_name: threat.enrichments.indicator.file.elf.segments.type
ignore_above: 1024
level: extended
name: segments.type
normalize: []
original_fieldset: elf
short: ELF object segment type.
type: keyword
threat.enrichments.indicator.file.elf.shared_libraries:
dashed_name: threat-enrichments-indicator-file-elf-shared-libraries
description: List of shared libraries used by this ELF object.
flat_name: threat.enrichments.indicator.file.elf.shared_libraries
ignore_above: 1024
level: extended
name: shared_libraries
normalize:
- array
original_fieldset: elf
short: List of shared libraries used by this ELF object.
type: keyword
threat.enrichments.indicator.file.elf.telfhash:
dashed_name: threat-enrichments-indicator-file-elf-telfhash
description: telfhash symbol hash for ELF file.
flat_name: threat.enrichments.indicator.file.elf.telfhash
ignore_above: 1024
level: extended
name: telfhash
normalize: []
original_fieldset: elf
short: telfhash hash for ELF file.
type: keyword
threat.enrichments.indicator.file.extension:
dashed_name: threat-enrichments-indicator-file-extension
description: 'File extension, excluding the leading dot.
Note that when the file name has multiple extensions (example.tar.gz), only the
last one should be captured ("gz", not "tar.gz").'
example: png
flat_name: threat.enrichments.indicator.file.extension
ignore_above: 1024
level: extended
name: extension
normalize: []
original_fieldset: file
short: File extension, excluding the leading dot.
type: keyword
threat.enrichments.indicator.file.gid:
dashed_name: threat-enrichments-indicator-file-gid
description: Primary group ID (GID) of the file.
example: '1001'
flat_name: threat.enrichments.indicator.file.gid
ignore_above: 1024
level: extended
name: gid
normalize: []
original_fieldset: file
short: Primary group ID (GID) of the file.
type: keyword
threat.enrichments.indicator.file.group:
dashed_name: threat-enrichments-indicator-file-group
description: Primary group name of the file.
example: alice
flat_name: threat.enrichments.indicator.file.group
ignore_above: 1024
level: extended
name: group
normalize: []
original_fieldset: file
short: Primary group name of the file.
type: keyword
threat.enrichments.indicator.file.hash.md5:
dashed_name: threat-enrichments-indicator-file-hash-md5
description: MD5 hash.
flat_name: threat.enrichments.indicator.file.hash.md5
ignore_above: 1024
level: extended
name: md5
normalize: []
original_fieldset: hash
short: MD5 hash.
type: keyword
threat.enrichments.indicator.file.hash.sha1:
dashed_name: threat-enrichments-indicator-file-hash-sha1
description: SHA1 hash.
flat_name: threat.enrichments.indicator.file.hash.sha1
ignore_above: 1024
level: extended
name: sha1
normalize: []
original_fieldset: hash
short: SHA1 hash.
type: keyword
threat.enrichments.indicator.file.hash.sha256:
dashed_name: threat-enrichments-indicator-file-hash-sha256
description: SHA256 hash.
flat_name: threat.enrichments.indicator.file.hash.sha256
ignore_above: 1024
level: extended
name: sha256
normalize: []
original_fieldset: hash
short: SHA256 hash.
type: keyword
threat.enrichments.indicator.file.hash.sha512:
dashed_name: threat-enrichments-indicator-file-hash-sha512
description: SHA512 hash.
flat_name: threat.enrichments.indicator.file.hash.sha512
ignore_above: 1024
level: extended
name: sha512
normalize: []
original_fieldset: hash
short: SHA512 hash.
type: keyword
threat.enrichments.indicator.file.hash.ssdeep:
dashed_name: threat-enrichments-indicator-file-hash-ssdeep
description: SSDEEP hash.
flat_name: threat.enrichments.indicator.file.hash.ssdeep
ignore_above: 1024
level: extended
name: ssdeep
normalize: []
original_fieldset: hash
short: SSDEEP hash.
type: keyword
threat.enrichments.indicator.file.inode:
dashed_name: threat-enrichments-indicator-file-inode
description: Inode representing the file in the filesystem.
example: '256383'
flat_name: threat.enrichments.indicator.file.inode
ignore_above: 1024
level: extended
name: inode
normalize: []
original_fieldset: file
short: Inode representing the file in the filesystem.
type: keyword
threat.enrichments.indicator.file.mime_type:
dashed_name: threat-enrichments-indicator-file-mime-type
description: MIME type should identify the format of the file or stream of bytes
using https://www.iana.org/assignments/media-types/media-types.xhtml[IANA official
types], where possible. When more than one type is applicable, the most specific
type should be used.
flat_name: threat.enrichments.indicator.file.mime_type
ignore_above: 1024
level: extended
name: mime_type
normalize: []
original_fieldset: file
short: Media type of file, document, or arrangement of bytes.
type: keyword
threat.enrichments.indicator.file.mode:
dashed_name: threat-enrichments-indicator-file-mode
description: Mode of the file in octal representation.
example: '0640'
flat_name: threat.enrichments.indicator.file.mode
ignore_above: 1024
level: extended
name: mode
normalize: []
original_fieldset: file
short: Mode of the file in octal representation.
type: keyword
threat.enrichments.indicator.file.mtime:
dashed_name: threat-enrichments-indicator-file-mtime
description: Last time the file content was modified.
flat_name: threat.enrichments.indicator.file.mtime
level: extended
name: mtime
normalize: []
original_fieldset: file
short: Last time the file content was modified.
type: date
threat.enrichments.indicator.file.name:
dashed_name: threat-enrichments-indicator-file-name
description: Name of the file including the extension, without the directory.
example: example.png
flat_name: threat.enrichments.indicator.file.name
ignore_above: 1024
level: extended
name: name
normalize: []
original_fieldset: file
short: Name of the file including the extension, without the directory.
type: keyword
threat.enrichments.indicator.file.owner:
dashed_name: threat-enrichments-indicator-file-owner
description: File owner's username.
example: alice
flat_name: threat.enrichments.indicator.file.owner
ignore_above: 1024
level: extended
name: owner
normalize: []
original_fieldset: file
short: File owner's username.
type: keyword
threat.enrichments.indicator.file.path:
dashed_name: threat-enrichments-indicator-file-path
description: Full path to the file, including the file name. It should include the
drive letter, when appropriate.
example: /home/alice/example.png
flat_name: threat.enrichments.indicator.file.path
ignore_above: 1024
level: extended
multi_fields:
- flat_name: threat.enrichments.indicator.file.path.caseless
ignore_above: 1024
name: caseless
normalizer: lowercase
type: keyword
- flat_name: threat.enrichments.indicator.file.path.text
name: text
norms: false
type: text
name: path
normalize: []
original_fieldset: file
short: Full path to the file, including the file name.
type: keyword
threat.enrichments.indicator.file.pe.architecture:
dashed_name: threat-enrichments-indicator-file-pe-architecture
description: CPU architecture target for the file.
example: x64
flat_name: threat.enrichments.indicator.file.pe.architecture
ignore_above: 1024
level: extended
name: architecture
normalize: []
original_fieldset: pe
short: CPU architecture target for the file.
type: keyword
threat.enrichments.indicator.file.pe.company:
dashed_name: threat-enrichments-indicator-file-pe-company
description: Internal company name of the file, provided at compile-time.
example: Microsoft Corporation
flat_name: threat.enrichments.indicator.file.pe.company
ignore_above: 1024
level: extended
name: company
normalize: []
original_fieldset: pe
short: Internal company name of the file, provided at compile-time.
type: keyword
threat.enrichments.indicator.file.pe.description:
dashed_name: threat-enrichments-indicator-file-pe-description
description: Internal description of the file, provided at compile-time.
example: Paint
flat_name: threat.enrichments.indicator.file.pe.description
ignore_above: 1024
level: extended
name: description
normalize: []
original_fieldset: pe
short: Internal description of the file, provided at compile-time.
type: keyword
threat.enrichments.indicator.file.pe.file_version:
dashed_name: threat-enrichments-indicator-file-pe-file-version
description: Internal version of the file, provided at compile-time.
example: 6.3.9600.17415
flat_name: threat.enrichments.indicator.file.pe.file_version
ignore_above: 1024
level: extended
name: file_version
normalize: []
original_fieldset: pe
short: Process name.
type: keyword
threat.enrichments.indicator.file.pe.imphash:
dashed_name: threat-enrichments-indicator-file-pe-imphash
description: 'A hash of the imports in a PE file. An imphash -- or import hash --
can be used to fingerprint binaries even after recompilation or other code-level
transformations have occurred, which would change more traditional hash values.
Learn more at https://www.fireeye.com/blog/threat-research/2014/01/tracking-malware-import-hashing.html.'
example: 0c6803c4e922103c4dca5963aad36ddf
flat_name: threat.enrichments.indicator.file.pe.imphash
ignore_above: 1024
level: extended
name: imphash
normalize: []
original_fieldset: pe
short: A hash of the imports in a PE file.
type: keyword
threat.enrichments.indicator.file.pe.original_file_name:
dashed_name: threat-enrichments-indicator-file-pe-original-file-name
description: Internal name of the file, provided at compile-time.
example: MSPAINT.EXE
flat_name: threat.enrichments.indicator.file.pe.original_file_name
ignore_above: 1024
level: extended
name: original_file_name
normalize: []
original_fieldset: pe
short: Internal name of the file, provided at compile-time.
type: keyword
threat.enrichments.indicator.file.pe.product:
dashed_name: threat-enrichments-indicator-file-pe-product
description: Internal product name of the file, provided at compile-time.
example: "Microsoft\xAE Windows\xAE Operating System"
flat_name: threat.enrichments.indicator.file.pe.product
ignore_above: 1024
level: extended
name: product
normalize: []
original_fieldset: pe
short: Internal product name of the file, provided at compile-time.
type: keyword
threat.enrichments.indicator.file.size:
dashed_name: threat-enrichments-indicator-file-size
description: 'File size in bytes.
Only relevant when `file.type` is "file".'
example: 16384
flat_name: threat.enrichments.indicator.file.size
level: extended
name: size
normalize: []
original_fieldset: file
short: File size in bytes.
type: long
threat.enrichments.indicator.file.target_path:
dashed_name: threat-enrichments-indicator-file-target-path
description: Target path for symlinks.
flat_name: threat.enrichments.indicator.file.target_path
ignore_above: 1024
level: extended
multi_fields:
- flat_name: threat.enrichments.indicator.file.target_path.caseless
ignore_above: 1024
name: caseless
normalizer: lowercase
type: keyword
- flat_name: threat.enrichments.indicator.file.target_path.text
name: text
norms: false
type: text
name: target_path
normalize: []
original_fieldset: file
short: Target path for symlinks.
type: keyword
threat.enrichments.indicator.file.type:
dashed_name: threat-enrichments-indicator-file-type
description: File type (file, dir, or symlink).
example: file
flat_name: threat.enrichments.indicator.file.type
ignore_above: 1024
level: extended
name: type
normalize: []
original_fieldset: file
short: File type (file, dir, or symlink).
type: keyword
threat.enrichments.indicator.file.uid:
dashed_name: threat-enrichments-indicator-file-uid
description: The user ID (UID) or security identifier (SID) of the file owner.
example: '1001'
flat_name: threat.enrichments.indicator.file.uid
ignore_above: 1024
level: extended
name: uid
normalize: []
original_fieldset: file
short: The user ID (UID) or security identifier (SID) of the file owner.
type: keyword
threat.enrichments.indicator.first_seen:
dashed_name: threat-enrichments-indicator-first-seen
description: The date and time when intelligence source first reported sighting
this indicator.
example: '2020-11-05T17:25:47.000Z'
flat_name: threat.enrichments.indicator.first_seen
level: extended
name: enrichments.indicator.first_seen
normalize: []
short: Date/time indicator was first reported.
type: date
threat.enrichments.indicator.geo.city_name:
dashed_name: threat-enrichments-indicator-geo-city-name
description: City name.
example: Montreal
flat_name: threat.enrichments.indicator.geo.city_name
ignore_above: 1024
level: core
name: city_name
normalize: []
original_fieldset: geo
short: City name.
type: keyword
threat.enrichments.indicator.geo.continent_code:
dashed_name: threat-enrichments-indicator-geo-continent-code
description: Two-letter code representing continent's name.
example: NA
flat_name: threat.enrichments.indicator.geo.continent_code
ignore_above: 1024
level: core
name: continent_code
normalize: []
original_fieldset: geo
short: Continent code.
type: keyword
threat.enrichments.indicator.geo.continent_name:
dashed_name: threat-enrichments-indicator-geo-continent-name
description: Name of the continent.
example: North America
flat_name: threat.enrichments.indicator.geo.continent_name
ignore_above: 1024
level: core
name: continent_name
normalize: []
original_fieldset: geo
short: Name of the continent.
type: keyword
threat.enrichments.indicator.geo.country_iso_code:
dashed_name: threat-enrichments-indicator-geo-country-iso-code
description: Country ISO code.
example: CA
flat_name: threat.enrichments.indicator.geo.country_iso_code
ignore_above: 1024
level: core
name: country_iso_code
normalize: []
original_fieldset: geo
short: Country ISO code.
type: keyword
threat.enrichments.indicator.geo.country_name:
dashed_name: threat-enrichments-indicator-geo-country-name
description: Country name.
example: Canada
flat_name: threat.enrichments.indicator.geo.country_name
ignore_above: 1024
level: core
name: country_name
normalize: []
original_fieldset: geo
short: Country name.
type: keyword
threat.enrichments.indicator.geo.location:
dashed_name: threat-enrichments-indicator-geo-location
description: Longitude and latitude.
example: '{ "lon": -73.614830, "lat": 45.505918 }'
flat_name: threat.enrichments.indicator.geo.location
level: core
name: location
normalize: []
original_fieldset: geo
short: Longitude and latitude.
type: geo_point
threat.enrichments.indicator.geo.name:
dashed_name: threat-enrichments-indicator-geo-name
description: 'User-defined description of a location, at the level of granularity
they care about.
Could be the name of their data centers, the floor number, if this describes a
local physical entity, city names.
Not typically used in automated geolocation.'
example: boston-dc
flat_name: threat.enrichments.indicator.geo.name
ignore_above: 1024
level: extended
name: name
normalize: []
original_fieldset: geo
short: User-defined description of a location.
type: keyword
threat.enrichments.indicator.geo.postal_code:
dashed_name: threat-enrichments-indicator-geo-postal-code
description: 'Postal code associated with the location.
Values appropriate for this field may also be known as a postcode or ZIP code
and will vary widely from country to country.'
example: 94040
flat_name: threat.enrichments.indicator.geo.postal_code
ignore_above: 1024
level: core
name: postal_code
normalize: []
original_fieldset: geo
short: Postal code.
type: keyword
threat.enrichments.indicator.geo.region_iso_code:
dashed_name: threat-enrichments-indicator-geo-region-iso-code
description: Region ISO code.
example: CA-QC
flat_name: threat.enrichments.indicator.geo.region_iso_code
ignore_above: 1024
level: core
name: region_iso_code
normalize: []
original_fieldset: geo
short: Region ISO code.
type: keyword
threat.enrichments.indicator.geo.region_name:
dashed_name: threat-enrichments-indicator-geo-region-name
description: Region name.
example: Quebec
flat_name: threat.enrichments.indicator.geo.region_name
ignore_above: 1024
level: core
name: region_name
normalize: []
original_fieldset: geo
short: Region name.
type: keyword
threat.enrichments.indicator.geo.timezone:
dashed_name: threat-enrichments-indicator-geo-timezone
description: The time zone of the location, such as IANA time zone name.
example: America/Argentina/Buenos_Aires
flat_name: threat.enrichments.indicator.geo.timezone
ignore_above: 1024
level: core
name: timezone
normalize: []
original_fieldset: geo
short: Time zone.
type: keyword
threat.enrichments.indicator.ip:
dashed_name: threat-enrichments-indicator-ip
description: Identifies a threat indicator as an IP address (irrespective of direction).
example: 1.2.3.4
flat_name: threat.enrichments.indicator.ip
level: extended
name: enrichments.indicator.ip
normalize: []
short: Indicator IP address
type: ip
threat.enrichments.indicator.last_seen:
dashed_name: threat-enrichments-indicator-last-seen
description: The date and time when intelligence source last reported sighting this
indicator.
example: '2020-11-05T17:25:47.000Z'
flat_name: threat.enrichments.indicator.last_seen
level: extended
name: enrichments.indicator.last_seen
normalize: []
short: Date/time indicator was last reported.
type: date
threat.enrichments.indicator.marking.tlp:
dashed_name: threat-enrichments-indicator-marking-tlp
description: Traffic Light Protocol sharing markings.
example: CLEAR
expected_values:
- WHITE
- CLEAR
- GREEN
- AMBER
- AMBER+STRICT
- RED
flat_name: threat.enrichments.indicator.marking.tlp
ignore_above: 1024
level: extended
name: enrichments.indicator.marking.tlp
normalize: []
short: Indicator TLP marking
type: keyword
threat.enrichments.indicator.modified_at:
dashed_name: threat-enrichments-indicator-modified-at
description: The date and time when intelligence source last modified information
for this indicator.
example: '2020-11-05T17:25:47.000Z'
flat_name: threat.enrichments.indicator.modified_at
level: extended
name: enrichments.indicator.modified_at
normalize: []
short: Date/time indicator was last updated.
type: date
threat.enrichments.indicator.port:
dashed_name: threat-enrichments-indicator-port
description: Identifies a threat indicator as a port number (irrespective of direction).
example: 443
flat_name: threat.enrichments.indicator.port
level: extended
name: enrichments.indicator.port
normalize: []
short: Indicator port
type: long
threat.enrichments.indicator.provider:
dashed_name: threat-enrichments-indicator-provider
description: The name of the indicator's provider.
example: lrz_urlhaus
flat_name: threat.enrichments.indicator.provider
ignore_above: 1024
level: extended
name: enrichments.indicator.provider
normalize: []
short: Indicator provider
type: keyword
threat.enrichments.indicator.reference:
dashed_name: threat-enrichments-indicator-reference
description: Reference URL linking to additional information about this indicator.
example: https://system.example.com/indicator/0001234
flat_name: threat.enrichments.indicator.reference
ignore_above: 1024
level: extended
name: enrichments.indicator.reference
normalize: []
short: Indicator reference URL
type: keyword
threat.enrichments.indicator.registry.data.bytes:
dashed_name: threat-enrichments-indicator-registry-data-bytes
description: 'Original bytes written with base64 encoding.
For Windows registry operations, such as SetValueEx and RegQueryValueEx, this
corresponds to the data pointed by `lp_data`. This is optional but provides better
recoverability and should be populated for REG_BINARY encoded values.'
example: ZQBuAC0AVQBTAAAAZQBuAAAAAAA=
flat_name: threat.enrichments.indicator.registry.data.bytes
ignore_above: 1024
level: extended
name: data.bytes
normalize: []
original_fieldset: registry
short: Original bytes written with base64 encoding.
type: keyword
threat.enrichments.indicator.registry.data.strings:
dashed_name: threat-enrichments-indicator-registry-data-strings
description: 'Content when writing string types.
Populated as an array when writing string data to the registry. For single string
registry types (REG_SZ, REG_EXPAND_SZ), this should be an array with one string.
For sequences of string with REG_MULTI_SZ, this array will be variable length.
For numeric data, such as REG_DWORD and REG_QWORD, this should be populated with
the decimal representation (e.g `"1"`).'
example: '["C:\rta\red_ttp\bin\myapp.exe"]'
flat_name: threat.enrichments.indicator.registry.data.strings
level: core
name: data.strings
normalize:
- array
original_fieldset: registry
short: List of strings representing what was written to the registry.
type: wildcard
threat.enrichments.indicator.registry.data.type:
dashed_name: threat-enrichments-indicator-registry-data-type
description: Standard registry type for encoding contents
example: REG_SZ
flat_name: threat.enrichments.indicator.registry.data.type
ignore_above: 1024
level: core
name: data.type
normalize: []
original_fieldset: registry
short: Standard registry type for encoding contents
type: keyword
threat.enrichments.indicator.registry.hive:
dashed_name: threat-enrichments-indicator-registry-hive
description: Abbreviated name for the hive.
example: HKLM
flat_name: threat.enrichments.indicator.registry.hive
ignore_above: 1024
level: core
name: hive
normalize: []
original_fieldset: registry
short: Abbreviated name for the hive.
type: keyword
threat.enrichments.indicator.registry.key:
dashed_name: threat-enrichments-indicator-registry-key
description: Hive-relative path of keys.
example: SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\winword.exe
flat_name: threat.enrichments.indicator.registry.key
ignore_above: 1024
level: core
name: key
normalize: []
original_fieldset: registry
short: Hive-relative path of keys.
type: keyword
threat.enrichments.indicator.registry.path:
dashed_name: threat-enrichments-indicator-registry-path
description: Full path, including hive, key and value
example: HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution
Options\winword.exe\Debugger
flat_name: threat.enrichments.indicator.registry.path
ignore_above: 1024
level: core
name: path
normalize: []
original_fieldset: registry
short: Full path, including hive, key and value
type: keyword
threat.enrichments.indicator.registry.value:
dashed_name: threat-enrichments-indicator-registry-value
description: Name of the value written.
example: Debugger
flat_name: threat.enrichments.indicator.registry.value
ignore_above: 1024
level: core
name: value
normalize: []
original_fieldset: registry
short: Name of the value written.
type: keyword
threat.enrichments.indicator.scanner_stats:
dashed_name: threat-enrichments-indicator-scanner-stats
description: Count of AV/EDR vendors that successfully detected malicious file or
URL.
example: 4
flat_name: threat.enrichments.indicator.scanner_stats
level: extended
name: enrichments.indicator.scanner_stats
normalize: []
short: Scanner statistics
type: long
threat.enrichments.indicator.sightings:
dashed_name: threat-enrichments-indicator-sightings
description: Number of times this indicator was observed conducting threat activity.
example: 20
flat_name: threat.enrichments.indicator.sightings
level: extended
name: enrichments.indicator.sightings
normalize: []
short: Number of times indicator observed
type: long
threat.enrichments.indicator.type:
dashed_name: threat-enrichments-indicator-type
description: Type of indicator as represented by Cyber Observable in STIX 2.0.
example: ipv4-addr
expected_values:
- autonomous-system
- artifact
- directory
- domain-name
- email-addr
- file
- ipv4-addr
- ipv6-addr
- mac-addr
- mutex
- port
- process
- software
- url
- user-account
- windows-registry-key
- x509-certificate
flat_name: threat.enrichments.indicator.type
ignore_above: 1024
level: extended
name: enrichments.indicator.type
normalize: []
short: Type of indicator
type: keyword
threat.enrichments.indicator.url.domain:
dashed_name: threat-enrichments-indicator-url-domain
description: 'Domain of the url, such as "www.elastic.co".
In some cases a URL may refer to an IP and/or port directly, without a domain
name. In this case, the IP address would go to the `domain` field.
If the URL contains a literal IPv6 address enclosed by `[` and `]` (IETF RFC 2732),
the `[` and `]` characters should also be captured in the `domain` field.'
example: www.elastic.co
flat_name: threat.enrichments.indicator.url.domain
ignore_above: 1024
level: extended
name: domain
normalize: []
original_fieldset: url
short: Domain of the url.
type: keyword
threat.enrichments.indicator.url.extension:
dashed_name: threat-enrichments-indicator-url-extension
description: 'The field contains the file extension from the original request url,
excluding the leading dot.
The file extension is only set if it exists, as not every url has a file extension.
The leading period must not be included. For example, the value must be "png",
not ".png".
Note that when the file name has multiple extensions (example.tar.gz), only the
last one should be captured ("gz", not "tar.gz").'
example: png
flat_name: threat.enrichments.indicator.url.extension
ignore_above: 1024
level: extended
name: extension
normalize: []
original_fieldset: url
short: File extension from the request url, excluding the leading dot.
type: keyword
threat.enrichments.indicator.url.fragment:
dashed_name: threat-enrichments-indicator-url-fragment
description: 'Portion of the url after the `#`, such as "top".
The `#` is not part of the fragment.'
flat_name: threat.enrichments.indicator.url.fragment
ignore_above: 1024
level: extended
name: fragment
normalize: []
original_fieldset: url
short: Portion of the url after the `#`.
type: keyword
threat.enrichments.indicator.url.full:
dashed_name: threat-enrichments-indicator-url-full
description: If full URLs are important to your use case, they should be stored
in `url.full`, whether this field is reconstructed or present in the event source.
example: https://www.elastic.co:443/search?q=elasticsearch#top
flat_name: threat.enrichments.indicator.url.full
level: extended
multi_fields:
- flat_name: threat.enrichments.indicator.url.full.text
name: text
type: match_only_text
name: full
normalize: []
original_fieldset: url
short: Full unparsed URL.
type: wildcard
threat.enrichments.indicator.url.original:
dashed_name: threat-enrichments-indicator-url-original
description: 'Unmodified original url as seen in the event source.
Note that in network monitoring, the observed URL may be a full URL, whereas in
access logs, the URL is often just represented as a path.
This field is meant to represent the URL as it was observed, complete or not.'
example: https://www.elastic.co:443/search?q=elasticsearch#top or /search?q=elasticsearch
flat_name: threat.enrichments.indicator.url.original
level: extended
multi_fields:
- flat_name: threat.enrichments.indicator.url.original.text
name: text
type: match_only_text
name: original
normalize: []
original_fieldset: url
short: Unmodified original url as seen in the event source.
type: wildcard
threat.enrichments.indicator.url.password:
dashed_name: threat-enrichments-indicator-url-password
description: Password of the request.
flat_name: threat.enrichments.indicator.url.password
ignore_above: 1024
level: extended
name: password
normalize: []
original_fieldset: url
short: Password of the request.
type: keyword
threat.enrichments.indicator.url.path:
dashed_name: threat-enrichments-indicator-url-path
description: Path of the request, such as "/search".
flat_name: threat.enrichments.indicator.url.path
level: extended
name: path
normalize: []
original_fieldset: url
short: Path of the request, such as "/search".
type: wildcard
threat.enrichments.indicator.url.port:
dashed_name: threat-enrichments-indicator-url-port
description: Port of the request, such as 443.
example: 443
flat_name: threat.enrichments.indicator.url.port
format: string
level: extended
name: port
normalize: []
original_fieldset: url
short: Port of the request, such as 443.
type: long
threat.enrichments.indicator.url.query:
dashed_name: threat-enrichments-indicator-url-query
description: 'The query field describes the query string of the request, such as
"q=elasticsearch".
The `?` is excluded from the query string. If a URL contains no `?`, there is
no query field. If there is a `?` but no query, the query field exists with an
empty string. The `exists` query can be used to differentiate between the two
cases.'
flat_name: threat.enrichments.indicator.url.query
ignore_above: 1024
level: extended
name: query
normalize: []
original_fieldset: url
short: Query string of the request.
type: keyword
threat.enrichments.indicator.url.registered_domain:
dashed_name: threat-enrichments-indicator-url-registered-domain
description: 'The highest registered url domain, stripped of the subdomain.
For example, the registered domain for "foo.example.com" is "example.com".
This value can be determined precisely with a list like the public suffix list
(http://publicsuffix.org). Trying to approximate this by simply taking the last
two labels will not work well for TLDs such as "co.uk".'
example: example.com
flat_name: threat.enrichments.indicator.url.registered_domain
ignore_above: 1024
level: extended
name: registered_domain
normalize: []
original_fieldset: url
short: The highest registered url domain, stripped of the subdomain.
type: keyword
threat.enrichments.indicator.url.scheme:
dashed_name: threat-enrichments-indicator-url-scheme
description: 'Scheme of the request, such as "https".
Note: The `:` is not part of the scheme.'
example: https
flat_name: threat.enrichments.indicator.url.scheme
ignore_above: 1024
level: extended
name: scheme
normalize: []
original_fieldset: url
short: Scheme of the url.
type: keyword
threat.enrichments.indicator.url.subdomain:
dashed_name: threat-enrichments-indicator-url-subdomain
description: 'The subdomain portion of a fully qualified domain name includes all
of the names except the host name under the registered_domain. In a partially
qualified domain, or if the the qualification level of the full name cannot be
determined, subdomain contains all of the names below the registered domain.
For example the subdomain portion of "www.east.mydomain.co.uk" is "east". If the
domain has multiple levels of subdomain, such as "sub2.sub1.example.com", the
subdomain field should contain "sub2.sub1", with no trailing period.'
example: east
flat_name: threat.enrichments.indicator.url.subdomain
ignore_above: 1024
level: extended
name: subdomain
normalize: []
original_fieldset: url
short: The subdomain of the domain.
type: keyword
threat.enrichments.indicator.url.top_level_domain:
dashed_name: threat-enrichments-indicator-url-top-level-domain
description: 'The effective top level domain (eTLD), also known as the domain suffix,
is the last part of the domain name. For example, the top level domain for example.com
is "com".
This value can be determined precisely with a list like the public suffix list
(http://publicsuffix.org). Trying to approximate this by simply taking the last
label will not work well for effective TLDs such as "co.uk".'
example: co.uk
flat_name: threat.enrichments.indicator.url.top_level_domain
ignore_above: 1024
level: extended
name: top_level_domain
normalize: []
original_fieldset: url
short: The effective top level domain (com, org, net, co.uk).
type: keyword
threat.enrichments.indicator.url.username:
dashed_name: threat-enrichments-indicator-url-username
description: Username of the request.
flat_name: threat.enrichments.indicator.url.username
ignore_above: 1024
level: extended
name: username
normalize: []
original_fieldset: url
short: Username of the request.
type: keyword
threat.enrichments.indicator.x509.alternative_names:
dashed_name: threat-enrichments-indicator-x509-alternative-names
description: List of subject alternative names (SAN). Name types vary by certificate
authority and certificate type but commonly contain IP addresses, DNS names (and
wildcards), and email addresses.
example: '*.elastic.co'
flat_name: threat.enrichments.indicator.x509.alternative_names
ignore_above: 1024
level: extended
name: alternative_names
normalize:
- array
original_fieldset: x509
short: List of subject alternative names (SAN).
type: keyword
threat.enrichments.indicator.x509.issuer.common_name:
dashed_name: threat-enrichments-indicator-x509-issuer-common-name
description: List of common name (CN) of issuing certificate authority.
example: Example SHA2 High Assurance Server CA
flat_name: threat.enrichments.indicator.x509.issuer.common_name
ignore_above: 1024
level: extended
name: issuer.common_name
normalize:
- array
original_fieldset: x509
short: List of common name (CN) of issuing certificate authority.
type: keyword
threat.enrichments.indicator.x509.issuer.country:
dashed_name: threat-enrichments-indicator-x509-issuer-country
description: List of country \(C) codes
example: US
flat_name: threat.enrichments.indicator.x509.issuer.country
ignore_above: 1024
level: extended
name: issuer.country
normalize:
- array
original_fieldset: x509
short: List of country \(C) codes
type: keyword
threat.enrichments.indicator.x509.issuer.distinguished_name:
dashed_name: threat-enrichments-indicator-x509-issuer-distinguished-name
description: Distinguished name (DN) of issuing certificate authority.
example: C=US, O=Example Inc, OU=www.example.com, CN=Example SHA2 High Assurance
Server CA
flat_name: threat.enrichments.indicator.x509.issuer.distinguished_name
ignore_above: 1024
level: extended
name: issuer.distinguished_name
normalize: []
original_fieldset: x509
short: Distinguished name (DN) of issuing certificate authority.
type: keyword
threat.enrichments.indicator.x509.issuer.locality:
dashed_name: threat-enrichments-indicator-x509-issuer-locality
description: List of locality names (L)
example: Mountain View
flat_name: threat.enrichments.indicator.x509.issuer.locality
ignore_above: 1024
level: extended
name: issuer.locality
normalize:
- array
original_fieldset: x509
short: List of locality names (L)
type: keyword
threat.enrichments.indicator.x509.issuer.organization:
dashed_name: threat-enrichments-indicator-x509-issuer-organization
description: List of organizations (O) of issuing certificate authority.
example: Example Inc
flat_name: threat.enrichments.indicator.x509.issuer.organization
ignore_above: 1024
level: extended
name: issuer.organization
normalize:
- array
original_fieldset: x509
short: List of organizations (O) of issuing certificate authority.
type: keyword
threat.enrichments.indicator.x509.issuer.organizational_unit:
dashed_name: threat-enrichments-indicator-x509-issuer-organizational-unit
description: List of organizational units (OU) of issuing certificate authority.
example: www.example.com
flat_name: threat.enrichments.indicator.x509.issuer.organizational_unit
ignore_above: 1024
level: extended
name: issuer.organizational_unit
normalize:
- array
original_fieldset: x509
short: List of organizational units (OU) of issuing certificate authority.
type: keyword
threat.enrichments.indicator.x509.issuer.state_or_province:
dashed_name: threat-enrichments-indicator-x509-issuer-state-or-province
description: List of state or province names (ST, S, or P)
example: California
flat_name: threat.enrichments.indicator.x509.issuer.state_or_province
ignore_above: 1024
level: extended
name: issuer.state_or_province
normalize:
- array
original_fieldset: x509
short: List of state or province names (ST, S, or P)
type: keyword
threat.enrichments.indicator.x509.not_after:
dashed_name: threat-enrichments-indicator-x509-not-after
description: Time at which the certificate is no longer considered valid.
example: '2020-07-16T03:15:39Z'
flat_name: threat.enrichments.indicator.x509.not_after
level: extended
name: not_after
normalize: []
original_fieldset: x509
short: Time at which the certificate is no longer considered valid.
type: date
threat.enrichments.indicator.x509.not_before:
dashed_name: threat-enrichments-indicator-x509-not-before
description: Time at which the certificate is first considered valid.
example: '2019-08-16T01:40:25Z'
flat_name: threat.enrichments.indicator.x509.not_before
level: extended
name: not_before
normalize: []
original_fieldset: x509
short: Time at which the certificate is first considered valid.
type: date
threat.enrichments.indicator.x509.public_key_algorithm:
dashed_name: threat-enrichments-indicator-x509-public-key-algorithm
description: Algorithm used to generate the public key.
example: RSA
flat_name: threat.enrichments.indicator.x509.public_key_algorithm
ignore_above: 1024
level: extended
name: public_key_algorithm
normalize: []
original_fieldset: x509
short: Algorithm used to generate the public key.
type: keyword
threat.enrichments.indicator.x509.public_key_curve:
dashed_name: threat-enrichments-indicator-x509-public-key-curve
description: The curve used by the elliptic curve public key algorithm. This is
algorithm specific.
example: nistp521
flat_name: threat.enrichments.indicator.x509.public_key_curve
ignore_above: 1024
level: extended
name: public_key_curve
normalize: []
original_fieldset: x509
short: The curve used by the elliptic curve public key algorithm. This is algorithm
specific.
type: keyword
threat.enrichments.indicator.x509.public_key_exponent:
dashed_name: threat-enrichments-indicator-x509-public-key-exponent
description: Exponent used to derive the public key. This is algorithm specific.
doc_values: false
example: 65537
flat_name: threat.enrichments.indicator.x509.public_key_exponent
index: false
level: extended
name: public_key_exponent
normalize: []
original_fieldset: x509
short: Exponent used to derive the public key. This is algorithm specific.
type: long
threat.enrichments.indicator.x509.public_key_size:
dashed_name: threat-enrichments-indicator-x509-public-key-size
description: The size of the public key space in bits.
example: 2048
flat_name: threat.enrichments.indicator.x509.public_key_size
level: extended
name: public_key_size
normalize: []
original_fieldset: x509
short: The size of the public key space in bits.
type: long
threat.enrichments.indicator.x509.serial_number:
dashed_name: threat-enrichments-indicator-x509-serial-number
description: Unique serial number issued by the certificate authority. For consistency,
if this value is alphanumeric, it should be formatted without colons and uppercase
characters.
example: 55FBB9C7DEBF09809D12CCAA
flat_name: threat.enrichments.indicator.x509.serial_number
ignore_above: 1024
level: extended
name: serial_number
normalize: []
original_fieldset: x509
short: Unique serial number issued by the certificate authority.
type: keyword
threat.enrichments.indicator.x509.signature_algorithm:
dashed_name: threat-enrichments-indicator-x509-signature-algorithm
description: Identifier for certificate signature algorithm. We recommend using
names found in Go Lang Crypto library. See https://github.com/golang/go/blob/go1.14/src/crypto/x509/x509.go#L337-L353.
example: SHA256-RSA
flat_name: threat.enrichments.indicator.x509.signature_algorithm
ignore_above: 1024
level: extended
name: signature_algorithm
normalize: []
original_fieldset: x509
short: Identifier for certificate signature algorithm.
type: keyword
threat.enrichments.indicator.x509.subject.common_name:
dashed_name: threat-enrichments-indicator-x509-subject-common-name
description: List of common names (CN) of subject.
example: shared.global.example.net
flat_name: threat.enrichments.indicator.x509.subject.common_name
ignore_above: 1024
level: extended
name: subject.common_name
normalize:
- array
original_fieldset: x509
short: List of common names (CN) of subject.
type: keyword
threat.enrichments.indicator.x509.subject.country:
dashed_name: threat-enrichments-indicator-x509-subject-country
description: List of country \(C) code
example: US
flat_name: threat.enrichments.indicator.x509.subject.country
ignore_above: 1024
level: extended
name: subject.country
normalize:
- array
original_fieldset: x509
short: List of country \(C) code
type: keyword
threat.enrichments.indicator.x509.subject.distinguished_name:
dashed_name: threat-enrichments-indicator-x509-subject-distinguished-name
description: Distinguished name (DN) of the certificate subject entity.
example: C=US, ST=California, L=San Francisco, O=Example, Inc., CN=shared.global.example.net
flat_name: threat.enrichments.indicator.x509.subject.distinguished_name
ignore_above: 1024
level: extended
name: subject.distinguished_name
normalize: []
original_fieldset: x509
short: Distinguished name (DN) of the certificate subject entity.
type: keyword
threat.enrichments.indicator.x509.subject.locality:
dashed_name: threat-enrichments-indicator-x509-subject-locality
description: List of locality names (L)
example: San Francisco
flat_name: threat.enrichments.indicator.x509.subject.locality
ignore_above: 1024
level: extended
name: subject.locality
normalize:
- array
original_fieldset: x509
short: List of locality names (L)
type: keyword
threat.enrichments.indicator.x509.subject.organization:
dashed_name: threat-enrichments-indicator-x509-subject-organization
description: List of organizations (O) of subject.
example: Example, Inc.
flat_name: threat.enrichments.indicator.x509.subject.organization
ignore_above: 1024
level: extended
name: subject.organization
normalize:
- array
original_fieldset: x509
short: List of organizations (O) of subject.
type: keyword
threat.enrichments.indicator.x509.subject.organizational_unit:
dashed_name: threat-enrichments-indicator-x509-subject-organizational-unit
description: List of organizational units (OU) of subject.
flat_name: threat.enrichments.indicator.x509.subject.organizational_unit
ignore_above: 1024
level: extended
name: subject.organizational_unit
normalize:
- array
original_fieldset: x509
short: List of organizational units (OU) of subject.
type: keyword
threat.enrichments.indicator.x509.subject.state_or_province:
dashed_name: threat-enrichments-indicator-x509-subject-state-or-province
description: List of state or province names (ST, S, or P)
example: California
flat_name: threat.enrichments.indicator.x509.subject.state_or_province
ignore_above: 1024
level: extended
name: subject.state_or_province
normalize:
- array
original_fieldset: x509
short: List of state or province names (ST, S, or P)
type: keyword
threat.enrichments.indicator.x509.version_number:
dashed_name: threat-enrichments-indicator-x509-version-number
description: Version of x509 format.
example: 3
flat_name: threat.enrichments.indicator.x509.version_number
ignore_above: 1024
level: extended
name: version_number
normalize: []
original_fieldset: x509
short: Version of x509 format.
type: keyword
threat.enrichments.matched.atomic:
dashed_name: threat-enrichments-matched-atomic
description: Identifies the atomic indicator value that matched a local environment
endpoint or network event.
example: bad-domain.com
flat_name: threat.enrichments.matched.atomic
ignore_above: 1024
level: extended
name: enrichments.matched.atomic
normalize: []
short: Matched indicator value
type: keyword
threat.enrichments.matched.field:
dashed_name: threat-enrichments-matched-field
description: Identifies the field of the atomic indicator that matched a local environment
endpoint or network event.
example: file.hash.sha256
flat_name: threat.enrichments.matched.field
ignore_above: 1024
level: extended
name: enrichments.matched.field
normalize: []
short: Matched indicator field
type: keyword
threat.enrichments.matched.id:
dashed_name: threat-enrichments-matched-id
description: Identifies the _id of the indicator document enriching the event.
example: ff93aee5-86a1-4a61-b0e6-0cdc313d01b5
flat_name: threat.enrichments.matched.id
ignore_above: 1024
level: extended
name: enrichments.matched.id
normalize: []
short: Matched indicator identifier
type: keyword
threat.enrichments.matched.index:
dashed_name: threat-enrichments-matched-index
description: Identifies the _index of the indicator document enriching the event.
example: filebeat-8.0.0-2021.05.23-000011
flat_name: threat.enrichments.matched.index
ignore_above: 1024
level: extended
name: enrichments.matched.index
normalize: []
short: Matched indicator index
type: keyword
threat.enrichments.matched.type:
dashed_name: threat-enrichments-matched-type
description: Identifies the type of match that caused the event to be enriched with
the given indicator
example: indicator_match_rule
flat_name: threat.enrichments.matched.type
ignore_above: 1024
level: extended
name: enrichments.matched.type
normalize: []
short: Type of indicator match
type: keyword
threat.framework:
dashed_name: threat-framework
description: Name of the threat framework used to further categorize and classify
the tactic and technique of the reported threat. Framework classification can
be provided by detecting systems, evaluated at ingest time, or retrospectively
tagged to events.
example: MITRE ATT&CK
flat_name: threat.framework
ignore_above: 1024
level: extended
name: framework
normalize: []
short: Threat classification framework.
type: keyword
threat.group.alias:
dashed_name: threat-group-alias
description: "The alias(es) of the group for a set of related intrusion activity\
\ that are tracked by a common name in the security community.\nWhile not required,\
\ you can use a MITRE ATT&CK\xAE group alias(es)."
example: '[ "Magecart Group 6" ]'
flat_name: threat.group.alias
ignore_above: 1024
level: extended
name: group.alias
normalize:
- array
short: Alias of the group.
type: keyword
threat.group.id:
dashed_name: threat-group-id
description: "The id of the group for a set of related intrusion activity that are\
\ tracked by a common name in the security community.\nWhile not required, you\
\ can use a MITRE ATT&CK\xAE group id."
example: G0037
flat_name: threat.group.id
ignore_above: 1024
level: extended
name: group.id
normalize: []
short: ID of the group.
type: keyword
threat.group.name:
dashed_name: threat-group-name
description: "The name of the group for a set of related intrusion activity that\
\ are tracked by a common name in the security community.\nWhile not required,\
\ you can use a MITRE ATT&CK\xAE group name."
example: FIN6
flat_name: threat.group.name
ignore_above: 1024
level: extended
name: group.name
normalize: []
short: Name of the group.
type: keyword
threat.group.reference:
dashed_name: threat-group-reference
description: "The reference URL of the group for a set of related intrusion activity\
\ that are tracked by a common name in the security community.\nWhile not required,\
\ you can use a MITRE ATT&CK\xAE group reference URL."
example: https://attack.mitre.org/groups/G0037/
flat_name: threat.group.reference
ignore_above: 1024
level: extended
name: group.reference
normalize: []
short: Reference URL of the group.
type: keyword
threat.indicator.as.number:
dashed_name: threat-indicator-as-number
description: Unique number allocated to the autonomous system. The autonomous system
number (ASN) uniquely identifies each network on the Internet.
example: 15169
flat_name: threat.indicator.as.number
level: extended
name: number
normalize: []
original_fieldset: as
short: Unique number allocated to the autonomous system.
type: long
threat.indicator.as.organization.name:
dashed_name: threat-indicator-as-organization-name
description: Organization name.
example: Google LLC
flat_name: threat.indicator.as.organization.name
ignore_above: 1024
level: extended
multi_fields:
- flat_name: threat.indicator.as.organization.name.text
name: text
type: match_only_text
name: organization.name
normalize: []
original_fieldset: as
short: Organization name.
type: keyword
threat.indicator.confidence:
dashed_name: threat-indicator-confidence
description: Identifies the vendor-neutral confidence rating using the None/Low/Medium/High
scale defined in Appendix A of the STIX 2.1 framework. Vendor-specific confidence
scales may be added as custom fields.
example: Medium
expected_values:
- Not Specified
- None
- Low
- Medium
- High
flat_name: threat.indicator.confidence
ignore_above: 1024
level: extended
name: indicator.confidence
normalize: []
short: Indicator confidence rating
type: keyword
threat.indicator.description:
dashed_name: threat-indicator-description
description: Describes the type of action conducted by the threat.
example: IP x.x.x.x was observed delivering the Angler EK.
flat_name: threat.indicator.description
ignore_above: 1024
level: extended
name: indicator.description
normalize: []
short: Indicator description
type: keyword
threat.indicator.email.address:
dashed_name: threat-indicator-email-address
description: Identifies a threat indicator as an email address (irrespective of
direction).
example: phish@example.com
flat_name: threat.indicator.email.address
ignore_above: 1024
level: extended
name: indicator.email.address
normalize: []
short: Indicator email address
type: keyword
threat.indicator.file.Ext:
dashed_name: threat-indicator-file-Ext
description: Object for all custom defined fields to live in.
flat_name: threat.indicator.file.Ext
level: custom
name: Ext
normalize: []
original_fieldset: file
short: Object for all custom defined fields to live in.
type: object
threat.indicator.file.Ext.code_signature:
dashed_name: threat-indicator-file-Ext-code-signature
description: Nested version of ECS code_signature fieldset.
flat_name: threat.indicator.file.Ext.code_signature
level: custom
name: Ext.code_signature
normalize: []
original_fieldset: file
short: Nested version of ECS code_signature fieldset.
type: nested
threat.indicator.file.Ext.code_signature.exists:
dashed_name: threat-indicator-file-Ext-code-signature-exists
description: Boolean to capture if a signature is present.
example: 'true'
flat_name: threat.indicator.file.Ext.code_signature.exists
level: core
name: Ext.code_signature.exists
normalize: []
original_fieldset: file
short: Boolean to capture if a signature is present.
type: boolean
threat.indicator.file.Ext.code_signature.status:
dashed_name: threat-indicator-file-Ext-code-signature-status
description: 'Additional information about the certificate status.
This is useful for logging cryptographic errors with the certificate validity
or trust status. Leave unpopulated if the validity or trust of the certificate
was unchecked.'
example: ERROR_UNTRUSTED_ROOT
flat_name: threat.indicator.file.Ext.code_signature.status
ignore_above: 1024
level: custom
name: Ext.code_signature.status
normalize: []
original_fieldset: file
short: Additional information about the certificate status.
type: keyword
threat.indicator.file.Ext.code_signature.subject_name:
dashed_name: threat-indicator-file-Ext-code-signature-subject-name
description: Subject name of the code signer
example: Microsoft Corporation
flat_name: threat.indicator.file.Ext.code_signature.subject_name
ignore_above: 1024
level: core
name: Ext.code_signature.subject_name
normalize: []
original_fieldset: file
short: Subject name of the code signer
type: keyword
threat.indicator.file.Ext.code_signature.trusted:
dashed_name: threat-indicator-file-Ext-code-signature-trusted
description: 'Stores the trust status of the certificate chain.
Validating the trust of the certificate chain may be complicated, and this field
should only be populated by tools that actively check the status.'
example: 'true'
flat_name: threat.indicator.file.Ext.code_signature.trusted
level: custom
name: Ext.code_signature.trusted
normalize: []
original_fieldset: file
short: Stores the trust status of the certificate chain.
type: boolean
threat.indicator.file.Ext.code_signature.valid:
dashed_name: threat-indicator-file-Ext-code-signature-valid
description: 'Boolean to capture if the digital signature is verified against the
binary content.
Leave unpopulated if a certificate was unchecked.'
example: 'true'
flat_name: threat.indicator.file.Ext.code_signature.valid
level: custom
name: Ext.code_signature.valid
normalize: []
original_fieldset: file
short: Boolean to capture if the digital signature is verified against the binary
content.
type: boolean
threat.indicator.file.Ext.device.bus_type:
dashed_name: threat-indicator-file-Ext-device-bus-type
description: Bus type of the device, such as Nvme, Usb, FileBackedVirtual,... etc.
flat_name: threat.indicator.file.Ext.device.bus_type
ignore_above: 1024
level: custom
name: Ext.device.bus_type
normalize: []
original_fieldset: file
short: Bus type of the device.
type: keyword
threat.indicator.file.Ext.device.dos_name:
dashed_name: threat-indicator-file-Ext-device-dos-name
description: DOS name of the device. DOS device name is in the format of driver
letters such as C:, D:,...
flat_name: threat.indicator.file.Ext.device.dos_name
ignore_above: 1024
level: custom
name: Ext.device.dos_name
normalize: []
original_fieldset: file
short: DOS name of the device.
type: keyword
threat.indicator.file.Ext.device.nt_name:
dashed_name: threat-indicator-file-Ext-device-nt-name
description: 'NT name of the device. NT device name is in the format such as: \Device\HarddiskVolume2'
flat_name: threat.indicator.file.Ext.device.nt_name
ignore_above: 1024
level: custom
name: Ext.device.nt_name
normalize: []
original_fieldset: file
short: NT name of the device.
type: keyword
threat.indicator.file.Ext.device.product_id:
dashed_name: threat-indicator-file-Ext-device-product-id
description: ProductID of the device. It is provided by the vendor of the device
if any.
flat_name: threat.indicator.file.Ext.device.product_id
ignore_above: 1024
level: custom
name: Ext.device.product_id
normalize: []
original_fieldset: file
short: ProductID of the device.
type: keyword
threat.indicator.file.Ext.device.serial_number:
dashed_name: threat-indicator-file-Ext-device-serial-number
description: Serial Number of the device. It is provided by the vendor of the device
if any.
flat_name: threat.indicator.file.Ext.device.serial_number
ignore_above: 1024
level: custom
name: Ext.device.serial_number
normalize: []
original_fieldset: file
short: Serial Number of the device.
type: keyword
threat.indicator.file.Ext.device.vendor_id:
dashed_name: threat-indicator-file-Ext-device-vendor-id
description: VendorID of the device. It is provided by the vendor of the device.
flat_name: threat.indicator.file.Ext.device.vendor_id
ignore_above: 1024
level: custom
name: Ext.device.vendor_id
normalize: []
original_fieldset: file
short: VendorID of the device.
type: keyword
threat.indicator.file.Ext.entropy:
dashed_name: threat-indicator-file-Ext-entropy
description: Entropy calculation of file's header and footer used to check file
integrity.
flat_name: threat.indicator.file.Ext.entropy
level: custom
name: Ext.entropy
normalize: []
original_fieldset: file
short: File entropy value
type: double
threat.indicator.file.Ext.entry_modified:
dashed_name: threat-indicator-file-Ext-entry-modified
description: Time of last status change. See `st_ctim` member of `struct stat`.
flat_name: threat.indicator.file.Ext.entry_modified
level: custom
name: Ext.entry_modified
normalize: []
original_fieldset: file
short: Time of last status change. See `st_ctim` member of `struct stat`.
type: double
threat.indicator.file.Ext.header_bytes:
dashed_name: threat-indicator-file-Ext-header-bytes
description: First 16 bytes of file used to check file integrity.
flat_name: threat.indicator.file.Ext.header_bytes
ignore_above: 1024
level: custom
name: Ext.header_bytes
normalize: []
original_fieldset: file
short: Header bytes
type: keyword
threat.indicator.file.Ext.header_data:
dashed_name: threat-indicator-file-Ext-header-data
description: First 16 bytes of file used to check file integrity.
flat_name: threat.indicator.file.Ext.header_data
level: custom
name: Ext.header_data
normalize: []
norms: false
original_fieldset: file
short: Header data
type: text
threat.indicator.file.Ext.malware_classification.features.data.buffer:
dashed_name: threat-indicator-file-Ext-malware-classification-features-data-buffer
description: The features extracted from this file and evaluated by the model. Usually
an array of floats. Likely zlib-encoded.
flat_name: threat.indicator.file.Ext.malware_classification.features.data.buffer
ignore_above: 1024
level: custom
name: features.data.buffer
normalize: []
original_fieldset: malware_classification
short: The features extracted from this file and evaluated by the model. Usually
an array of floats. Likely zlib-encoded.
type: keyword
threat.indicator.file.Ext.malware_classification.features.data.decompressed_size:
dashed_name: threat-indicator-file-Ext-malware-classification-features-data-decompressed-size
description: The decompressed size of buffer.
flat_name: threat.indicator.file.Ext.malware_classification.features.data.decompressed_size
level: custom
name: features.data.decompressed_size
normalize: []
original_fieldset: malware_classification
short: The decompressed size of buffer.
type: integer
threat.indicator.file.Ext.malware_classification.features.data.encoding:
dashed_name: threat-indicator-file-Ext-malware-classification-features-data-encoding
description: The encoding of buffer (e.g. zlib).
flat_name: threat.indicator.file.Ext.malware_classification.features.data.encoding
ignore_above: 1024
level: custom
name: features.data.encoding
normalize: []
original_fieldset: malware_classification
short: The encoding of buffer (e.g. zlib).
type: keyword
threat.indicator.file.Ext.malware_classification.identifier:
dashed_name: threat-indicator-file-Ext-malware-classification-identifier
description: The model's unique identifier.
flat_name: threat.indicator.file.Ext.malware_classification.identifier
ignore_above: 1024
level: custom
name: identifier
normalize: []
original_fieldset: malware_classification
short: The model's unique identifier.
type: keyword
threat.indicator.file.Ext.malware_classification.score:
dashed_name: threat-indicator-file-Ext-malware-classification-score
description: The score produced by the classification model.
flat_name: threat.indicator.file.Ext.malware_classification.score
level: custom
name: score
normalize: []
original_fieldset: malware_classification
short: The score produced by the classification model.
type: double
threat.indicator.file.Ext.malware_classification.threshold:
dashed_name: threat-indicator-file-Ext-malware-classification-threshold
description: The score threshold for the model. Files that score above this threshold
are considered malicious.
flat_name: threat.indicator.file.Ext.malware_classification.threshold
level: custom
name: threshold
normalize: []
original_fieldset: malware_classification
short: The score threshold for the model. Files that score above this threshold
are considered malicious.
type: double
threat.indicator.file.Ext.malware_classification.upx_packed:
dashed_name: threat-indicator-file-Ext-malware-classification-upx-packed
description: Whether UPX packing was detected.
flat_name: threat.indicator.file.Ext.malware_classification.upx_packed
level: custom
name: upx_packed
normalize: []
original_fieldset: malware_classification
short: Whether UPX packing was detected.
type: boolean
threat.indicator.file.Ext.malware_classification.version:
dashed_name: threat-indicator-file-Ext-malware-classification-version
description: The version of the model used.
flat_name: threat.indicator.file.Ext.malware_classification.version
ignore_above: 1024
level: custom
name: version
normalize: []
original_fieldset: malware_classification
short: The version of the model used.
type: keyword
threat.indicator.file.Ext.malware_signature:
dashed_name: threat-indicator-file-Ext-malware-signature
description: Nested version of malware_signature fieldset.
flat_name: threat.indicator.file.Ext.malware_signature
level: custom
name: Ext.malware_signature
normalize: []
original_fieldset: file
short: Nested version of malware_signature fieldset.
type: nested
threat.indicator.file.Ext.malware_signature.all_names:
dashed_name: threat-indicator-file-Ext-malware-signature-all-names
description: The concatenated names of all yara signatures
flat_name: threat.indicator.file.Ext.malware_signature.all_names
level: custom
name: Ext.malware_signature.all_names
normalize: []
norms: false
original_fieldset: file
short: Yara signature names
type: text
threat.indicator.file.Ext.malware_signature.identifier:
dashed_name: threat-indicator-file-Ext-malware-signature-identifier
description: Malware artifact identifier.
flat_name: threat.indicator.file.Ext.malware_signature.identifier
level: custom
name: Ext.malware_signature.identifier
normalize: []
norms: false
original_fieldset: file
short: Malware artifact identifier
type: text
threat.indicator.file.Ext.malware_signature.primary:
dashed_name: threat-indicator-file-Ext-malware-signature-primary
description: Primary malware signature match.
flat_name: threat.indicator.file.Ext.malware_signature.primary
level: custom
name: Ext.malware_signature.primary
normalize: []
original_fieldset: file
short: Primary malware signature match
type: nested
threat.indicator.file.Ext.malware_signature.primary.matches:
dashed_name: threat-indicator-file-Ext-malware-signature-primary-matches
description: An array of bytes representing yara signature matches
flat_name: threat.indicator.file.Ext.malware_signature.primary.matches
level: custom
name: Ext.malware_signature.primary.matches
normalize:
- array
original_fieldset: file
short: signature match bytes
type: nested
threat.indicator.file.Ext.malware_signature.primary.signature:
dashed_name: threat-indicator-file-Ext-malware-signature-primary-signature
description: Primary malware signature match.
flat_name: threat.indicator.file.Ext.malware_signature.primary.signature
level: custom
name: Ext.malware_signature.primary.signature
normalize: []
original_fieldset: file
short: Primary malware signature match
type: nested
threat.indicator.file.Ext.malware_signature.primary.signature.hash:
dashed_name: threat-indicator-file-Ext-malware-signature-primary-signature-hash
description: Primary malware signature hash.
flat_name: threat.indicator.file.Ext.malware_signature.primary.signature.hash
level: custom
name: Ext.malware_signature.primary.signature.hash
normalize: []
original_fieldset: file
short: Primary malware signature hash
type: nested
threat.indicator.file.Ext.malware_signature.primary.signature.hash.sha256:
dashed_name: threat-indicator-file-Ext-malware-signature-primary-signature-hash-sha256
description: Primary malware signature sha256.
flat_name: threat.indicator.file.Ext.malware_signature.primary.signature.hash.sha256
ignore_above: 1024
level: custom
name: Ext.malware_signature.primary.signature.hash.sha256
normalize: []
original_fieldset: file
short: Primary malware signature sha256
type: keyword
threat.indicator.file.Ext.malware_signature.primary.signature.id:
dashed_name: threat-indicator-file-Ext-malware-signature-primary-signature-id
description: Primary malware signature id.
flat_name: threat.indicator.file.Ext.malware_signature.primary.signature.id
ignore_above: 1024
level: custom
name: Ext.malware_signature.primary.signature.id
normalize: []
original_fieldset: file
short: Primary malware signature id
type: keyword
threat.indicator.file.Ext.malware_signature.primary.signature.name:
dashed_name: threat-indicator-file-Ext-malware-signature-primary-signature-name
description: Primary malware signature name.
flat_name: threat.indicator.file.Ext.malware_signature.primary.signature.name
ignore_above: 1024
level: custom
name: Ext.malware_signature.primary.signature.name
normalize: []
original_fieldset: file
short: Primary malware signature name
type: keyword
threat.indicator.file.Ext.malware_signature.secondary:
dashed_name: threat-indicator-file-Ext-malware-signature-secondary
description: An array of malware signature matches
flat_name: threat.indicator.file.Ext.malware_signature.secondary
level: custom
name: Ext.malware_signature.secondary
normalize:
- array
original_fieldset: file
short: secondary signature matches
type: nested
threat.indicator.file.Ext.malware_signature.version:
dashed_name: threat-indicator-file-Ext-malware-signature-version
description: Primary malware signature version.
flat_name: threat.indicator.file.Ext.malware_signature.version
ignore_above: 1024
level: custom
name: Ext.malware_signature.version
normalize: []
original_fieldset: file
short: Primary malware signature version
type: keyword
threat.indicator.file.Ext.monotonic_id:
dashed_name: threat-indicator-file-Ext-monotonic-id
description: File event monotonic ID.
flat_name: threat.indicator.file.Ext.monotonic_id
level: custom
name: Ext.monotonic_id
normalize: []
original_fieldset: file
short: File event monotonic ID
type: unsigned_long
threat.indicator.file.Ext.original:
dashed_name: threat-indicator-file-Ext-original
description: Original file information during a modification event.
flat_name: threat.indicator.file.Ext.original
level: custom
name: Ext.original
normalize: []
original_fieldset: file
short: Original file information during a modification event.
type: object
threat.indicator.file.Ext.original.gid:
dashed_name: threat-indicator-file-Ext-original-gid
description: Primary group ID (GID) of the file.
example: '1001'
flat_name: threat.indicator.file.Ext.original.gid
ignore_above: 1024
level: custom
name: Ext.original.gid
normalize: []
original_fieldset: file
short: Primary group ID (GID) of the file.
type: keyword
threat.indicator.file.Ext.original.group:
dashed_name: threat-indicator-file-Ext-original-group
description: Primary group name of the file.
example: alice
flat_name: threat.indicator.file.Ext.original.group
ignore_above: 1024
level: custom
name: Ext.original.group
normalize: []
original_fieldset: file
short: Primary group name of the file.
type: keyword
threat.indicator.file.Ext.original.mode:
dashed_name: threat-indicator-file-Ext-original-mode
description: Original file mode prior to a modification event
flat_name: threat.indicator.file.Ext.original.mode
ignore_above: 1024
level: custom
name: Ext.original.mode
normalize: []
original_fieldset: file
short: Original file mode prior to a modification event
type: keyword
threat.indicator.file.Ext.original.name:
dashed_name: threat-indicator-file-Ext-original-name
description: Original file name prior to a modification event
flat_name: threat.indicator.file.Ext.original.name
ignore_above: 1024
level: custom
name: Ext.original.name
normalize: []
original_fieldset: file
short: Original file name prior to a modification event
type: keyword
threat.indicator.file.Ext.original.owner:
dashed_name: threat-indicator-file-Ext-original-owner
description: File owner's username.
example: alice
flat_name: threat.indicator.file.Ext.original.owner
ignore_above: 1024
level: custom
name: Ext.original.owner
normalize: []
original_fieldset: file
short: File owner's username.
type: keyword
threat.indicator.file.Ext.original.path:
dashed_name: threat-indicator-file-Ext-original-path
description: Original file path prior to a modification event
flat_name: threat.indicator.file.Ext.original.path
ignore_above: 1024
level: custom
name: Ext.original.path
normalize: []
original_fieldset: file
short: Original file path prior to a modification event
type: keyword
threat.indicator.file.Ext.original.uid:
dashed_name: threat-indicator-file-Ext-original-uid
description: The user ID (UID) or security identifier (SID) of the file owner.
example: '1001'
flat_name: threat.indicator.file.Ext.original.uid
ignore_above: 1024
level: custom
name: Ext.original.uid
normalize: []
original_fieldset: file
short: The user ID (UID) or security identifier (SID) of the file owner.
type: keyword
threat.indicator.file.Ext.quarantine_message:
dashed_name: threat-indicator-file-Ext-quarantine-message
description: Message describing quarantine results.
flat_name: threat.indicator.file.Ext.quarantine_message
ignore_above: 1024
level: custom
name: Ext.quarantine_message
normalize: []
original_fieldset: file
short: Message describing quarantine results.
type: keyword
threat.indicator.file.Ext.quarantine_path:
dashed_name: threat-indicator-file-Ext-quarantine-path
description: Path on endpoint the quarantined file was originally.
flat_name: threat.indicator.file.Ext.quarantine_path
ignore_above: 1024
level: custom
name: Ext.quarantine_path
normalize: []
original_fieldset: file
short: Path on endpoint the quarantined file was originally.
type: keyword
threat.indicator.file.Ext.quarantine_result:
dashed_name: threat-indicator-file-Ext-quarantine-result
description: Boolean representing whether or not file quarantine succeeded.
flat_name: threat.indicator.file.Ext.quarantine_result
level: custom
name: Ext.quarantine_result
normalize: []
original_fieldset: file
short: Boolean representing whether or not file quarantine succeeded.
type: boolean
threat.indicator.file.Ext.temp_file_path:
dashed_name: threat-indicator-file-Ext-temp-file-path
description: Path on endpoint where a copy of the file is being stored. Used to
make ephemeral files retrievable.
flat_name: threat.indicator.file.Ext.temp_file_path
ignore_above: 1024
level: custom
name: Ext.temp_file_path
normalize: []
original_fieldset: file
short: Path on endpoint where a copy of the file is being stored. Used to make
ephemeral files retrievable.
type: keyword
threat.indicator.file.Ext.windows:
dashed_name: threat-indicator-file-Ext-windows
description: Platform-specific Windows fields
flat_name: threat.indicator.file.Ext.windows
level: custom
name: Ext.windows
normalize: []
original_fieldset: file
short: Platform-specific Windows fields
type: object
threat.indicator.file.Ext.windows.zone_identifier:
dashed_name: threat-indicator-file-Ext-windows-zone-identifier
description: Windows zone identifier for a file
flat_name: threat.indicator.file.Ext.windows.zone_identifier
ignore_above: 1024
level: custom
name: Ext.windows.zone_identifier
normalize: []
original_fieldset: file
short: Windows zone identifier for a file
type: keyword
threat.indicator.file.accessed:
dashed_name: threat-indicator-file-accessed
description: 'Last time the file was accessed.
Note that not all filesystems keep track of access time.'
flat_name: threat.indicator.file.accessed
level: extended
name: accessed
normalize: []
original_fieldset: file
short: Last time the file was accessed.
type: date
threat.indicator.file.attributes:
dashed_name: threat-indicator-file-attributes
description: 'Array of file attributes.
Attributes names will vary by platform. Here''s a non-exhaustive list of values
that are expected in this field: archive, compressed, directory, encrypted, execute,
hidden, read, readonly, system, write.'
example: '["readonly", "system"]'
flat_name: threat.indicator.file.attributes
ignore_above: 1024
level: extended
name: attributes
normalize:
- array
original_fieldset: file
short: Array of file attributes.
type: keyword
threat.indicator.file.code_signature.exists:
dashed_name: threat-indicator-file-code-signature-exists
description: Boolean to capture if a signature is present.
example: 'true'
flat_name: threat.indicator.file.code_signature.exists
level: core
name: exists
normalize: []
original_fieldset: code_signature
short: Boolean to capture if a signature is present.
type: boolean
threat.indicator.file.code_signature.signing_id:
dashed_name: threat-indicator-file-code-signature-signing-id
description: 'The identifier used to sign the process.
This is used to identify the application manufactured by a software vendor. The
field is relevant to Apple *OS only.'
example: com.apple.xpc.proxy
flat_name: threat.indicator.file.code_signature.signing_id
ignore_above: 1024
level: extended
name: signing_id
normalize: []
original_fieldset: code_signature
short: The identifier used to sign the process.
type: keyword
threat.indicator.file.code_signature.status:
dashed_name: threat-indicator-file-code-signature-status
description: 'Additional information about the certificate status.
This is useful for logging cryptographic errors with the certificate validity
or trust status. Leave unpopulated if the validity or trust of the certificate
was unchecked.'
example: ERROR_UNTRUSTED_ROOT
flat_name: threat.indicator.file.code_signature.status
ignore_above: 1024
level: extended
name: status
normalize: []
original_fieldset: code_signature
short: Additional information about the certificate status.
type: keyword
threat.indicator.file.code_signature.subject_name:
dashed_name: threat-indicator-file-code-signature-subject-name
description: Subject name of the code signer
example: Microsoft Corporation
flat_name: threat.indicator.file.code_signature.subject_name
ignore_above: 1024
level: core
name: subject_name
normalize: []
original_fieldset: code_signature
short: Subject name of the code signer
type: keyword
threat.indicator.file.code_signature.team_id:
dashed_name: threat-indicator-file-code-signature-team-id
description: 'The team identifier used to sign the process.
This is used to identify the team or vendor of a software product. The field is
relevant to Apple *OS only.'
example: EQHXZ8M8AV
flat_name: threat.indicator.file.code_signature.team_id
ignore_above: 1024
level: extended
name: team_id
normalize: []
original_fieldset: code_signature
short: The team identifier used to sign the process.
type: keyword
threat.indicator.file.code_signature.trusted:
dashed_name: threat-indicator-file-code-signature-trusted
description: 'Stores the trust status of the certificate chain.
Validating the trust of the certificate chain may be complicated, and this field
should only be populated by tools that actively check the status.'
example: 'true'
flat_name: threat.indicator.file.code_signature.trusted
level: extended
name: trusted
normalize: []
original_fieldset: code_signature
short: Stores the trust status of the certificate chain.
type: boolean
threat.indicator.file.code_signature.valid:
dashed_name: threat-indicator-file-code-signature-valid
description: 'Boolean to capture if the digital signature is verified against the
binary content.
Leave unpopulated if a certificate was unchecked.'
example: 'true'
flat_name: threat.indicator.file.code_signature.valid
level: extended
name: valid
normalize: []
original_fieldset: code_signature
short: Boolean to capture if the digital signature is verified against the binary
content.
type: boolean
threat.indicator.file.created:
dashed_name: threat-indicator-file-created
description: 'File creation time.
Note that not all filesystems store the creation time.'
flat_name: threat.indicator.file.created
level: extended
name: created
normalize: []
original_fieldset: file
short: File creation time.
type: date
threat.indicator.file.ctime:
dashed_name: threat-indicator-file-ctime
description: 'Last time the file attributes or metadata changed.
Note that changes to the file content will update `mtime`. This implies `ctime`
will be adjusted at the same time, since `mtime` is an attribute of the file.'
flat_name: threat.indicator.file.ctime
level: extended
name: ctime
normalize: []
original_fieldset: file
short: Last time the file attributes or metadata changed.
type: date
threat.indicator.file.device:
dashed_name: threat-indicator-file-device
description: Device that is the source of the file.
example: sda
flat_name: threat.indicator.file.device
ignore_above: 1024
level: extended
name: device
normalize: []
original_fieldset: file
short: Device that is the source of the file.
type: keyword
threat.indicator.file.directory:
dashed_name: threat-indicator-file-directory
description: Directory where the file is located. It should include the drive letter,
when appropriate.
example: /home/alice
flat_name: threat.indicator.file.directory
ignore_above: 1024
level: extended
name: directory
normalize: []
original_fieldset: file
short: Directory where the file is located.
type: keyword
threat.indicator.file.drive_letter:
dashed_name: threat-indicator-file-drive-letter
description: 'Drive letter where the file is located. This field is only relevant
on Windows.
The value should be uppercase, and not include the colon.'
example: C
flat_name: threat.indicator.file.drive_letter
ignore_above: 1
level: extended
name: drive_letter
normalize: []
original_fieldset: file
short: Drive letter where the file is located.
type: keyword
threat.indicator.file.elf.architecture:
dashed_name: threat-indicator-file-elf-architecture
description: Machine architecture of the ELF file.
example: x86-64
flat_name: threat.indicator.file.elf.architecture
ignore_above: 1024
level: extended
name: architecture
normalize: []
original_fieldset: elf
short: Machine architecture of the ELF file.
type: keyword
threat.indicator.file.elf.byte_order:
dashed_name: threat-indicator-file-elf-byte-order
description: Byte sequence of ELF file.
example: Little Endian
flat_name: threat.indicator.file.elf.byte_order
ignore_above: 1024
level: extended
name: byte_order
normalize: []
original_fieldset: elf
short: Byte sequence of ELF file.
type: keyword
threat.indicator.file.elf.cpu_type:
dashed_name: threat-indicator-file-elf-cpu-type
description: CPU type of the ELF file.
example: Intel
flat_name: threat.indicator.file.elf.cpu_type
ignore_above: 1024
level: extended
name: cpu_type
normalize: []
original_fieldset: elf
short: CPU type of the ELF file.
type: keyword
threat.indicator.file.elf.creation_date:
dashed_name: threat-indicator-file-elf-creation-date
description: Extracted when possible from the file's metadata. Indicates when it
was built or compiled. It can also be faked by malware creators.
flat_name: threat.indicator.file.elf.creation_date
level: extended
name: creation_date
normalize: []
original_fieldset: elf
short: Build or compile date.
type: date
threat.indicator.file.elf.exports:
dashed_name: threat-indicator-file-elf-exports
description: List of exported element names and types.
flat_name: threat.indicator.file.elf.exports
level: extended
name: exports
normalize:
- array
original_fieldset: elf
short: List of exported element names and types.
type: flattened
threat.indicator.file.elf.go_import_hash:
dashed_name: threat-indicator-file-elf-go-import-hash
description: 'A hash of the Go language imports in an ELF file excluding standard
library imports. An import hash can be used to fingerprint binaries even after
recompilation or other code-level transformations have occurred, which would change
more traditional hash values.
The algorithm used to calculate the Go symbol hash and a reference implementation
are available [here](https://github.com/elastic/toutoumomoma).'
example: 10bddcb4cee42080f76c88d9ff964491
flat_name: threat.indicator.file.elf.go_import_hash
ignore_above: 1024
level: extended
name: go_import_hash
normalize: []
original_fieldset: elf
short: A hash of the Go language imports in an ELF file.
type: keyword
threat.indicator.file.elf.go_imports:
dashed_name: threat-indicator-file-elf-go-imports
description: List of imported Go language element names and types.
flat_name: threat.indicator.file.elf.go_imports
level: extended
name: go_imports
normalize: []
original_fieldset: elf
short: List of imported Go language element names and types.
type: flattened
threat.indicator.file.elf.go_imports_names_entropy:
dashed_name: threat-indicator-file-elf-go-imports-names-entropy
description: Shannon entropy calculation from the list of Go imports.
flat_name: threat.indicator.file.elf.go_imports_names_entropy
format: number
level: extended
name: go_imports_names_entropy
normalize: []
original_fieldset: elf
short: Shannon entropy calculation from the list of Go imports.
type: long
threat.indicator.file.elf.go_imports_names_var_entropy:
dashed_name: threat-indicator-file-elf-go-imports-names-var-entropy
description: Variance for Shannon entropy calculation from the list of Go imports.
flat_name: threat.indicator.file.elf.go_imports_names_var_entropy
format: number
level: extended
name: go_imports_names_var_entropy
normalize: []
original_fieldset: elf
short: Variance for Shannon entropy calculation from the list of Go imports.
type: long
threat.indicator.file.elf.go_stripped:
dashed_name: threat-indicator-file-elf-go-stripped
description: Set to true if the file is a Go executable that has had its symbols
stripped or obfuscated and false if an unobfuscated Go executable.
flat_name: threat.indicator.file.elf.go_stripped
level: extended
name: go_stripped
normalize: []
original_fieldset: elf
short: Whether the file is a stripped or obfuscated Go executable.
type: boolean
threat.indicator.file.elf.header.abi_version:
dashed_name: threat-indicator-file-elf-header-abi-version
description: Version of the ELF Application Binary Interface (ABI).
flat_name: threat.indicator.file.elf.header.abi_version
ignore_above: 1024
level: extended
name: header.abi_version
normalize: []
original_fieldset: elf
short: Version of the ELF Application Binary Interface (ABI).
type: keyword
threat.indicator.file.elf.header.class:
dashed_name: threat-indicator-file-elf-header-class
description: Header class of the ELF file.
flat_name: threat.indicator.file.elf.header.class
ignore_above: 1024
level: extended
name: header.class
normalize: []
original_fieldset: elf
short: Header class of the ELF file.
type: keyword
threat.indicator.file.elf.header.data:
dashed_name: threat-indicator-file-elf-header-data
description: Data table of the ELF header.
flat_name: threat.indicator.file.elf.header.data
ignore_above: 1024
level: extended
name: header.data
normalize: []
original_fieldset: elf
short: Data table of the ELF header.
type: keyword
threat.indicator.file.elf.header.entrypoint:
dashed_name: threat-indicator-file-elf-header-entrypoint
description: Header entrypoint of the ELF file.
flat_name: threat.indicator.file.elf.header.entrypoint
format: string
level: extended
name: header.entrypoint
normalize: []
original_fieldset: elf
short: Header entrypoint of the ELF file.
type: long
threat.indicator.file.elf.header.object_version:
dashed_name: threat-indicator-file-elf-header-object-version
description: '"0x1" for original ELF files.'
flat_name: threat.indicator.file.elf.header.object_version
ignore_above: 1024
level: extended
name: header.object_version
normalize: []
original_fieldset: elf
short: '"0x1" for original ELF files.'
type: keyword
threat.indicator.file.elf.header.os_abi:
dashed_name: threat-indicator-file-elf-header-os-abi
description: Application Binary Interface (ABI) of the Linux OS.
flat_name: threat.indicator.file.elf.header.os_abi
ignore_above: 1024
level: extended
name: header.os_abi
normalize: []
original_fieldset: elf
short: Application Binary Interface (ABI) of the Linux OS.
type: keyword
threat.indicator.file.elf.header.type:
dashed_name: threat-indicator-file-elf-header-type
description: Header type of the ELF file.
flat_name: threat.indicator.file.elf.header.type
ignore_above: 1024
level: extended
name: header.type
normalize: []
original_fieldset: elf
short: Header type of the ELF file.
type: keyword
threat.indicator.file.elf.header.version:
dashed_name: threat-indicator-file-elf-header-version
description: Version of the ELF header.
flat_name: threat.indicator.file.elf.header.version
ignore_above: 1024
level: extended
name: header.version
normalize: []
original_fieldset: elf
short: Version of the ELF header.
type: keyword
threat.indicator.file.elf.import_hash:
dashed_name: threat-indicator-file-elf-import-hash
description: 'A hash of the imports in an ELF file. An import hash can be used to
fingerprint binaries even after recompilation or other code-level transformations
have occurred, which would change more traditional hash values.
This is an ELF implementation of the Windows PE imphash.'
example: d41d8cd98f00b204e9800998ecf8427e
flat_name: threat.indicator.file.elf.import_hash
ignore_above: 1024
level: extended
name: import_hash
normalize: []
original_fieldset: elf
short: A hash of the imports in an ELF file.
type: keyword
threat.indicator.file.elf.imports:
dashed_name: threat-indicator-file-elf-imports
description: List of imported element names and types.
flat_name: threat.indicator.file.elf.imports
level: extended
name: imports
normalize:
- array
original_fieldset: elf
short: List of imported element names and types.
type: flattened
threat.indicator.file.elf.imports_names_entropy:
dashed_name: threat-indicator-file-elf-imports-names-entropy
description: Shannon entropy calculation from the list of imported element names
and types.
flat_name: threat.indicator.file.elf.imports_names_entropy
format: number
level: extended
name: imports_names_entropy
normalize: []
original_fieldset: elf
short: Shannon entropy calculation from the list of imported element names and types.
type: long
threat.indicator.file.elf.imports_names_var_entropy:
dashed_name: threat-indicator-file-elf-imports-names-var-entropy
description: Variance for Shannon entropy calculation from the list of imported
element names and types.
flat_name: threat.indicator.file.elf.imports_names_var_entropy
format: number
level: extended
name: imports_names_var_entropy
normalize: []
original_fieldset: elf
short: Variance for Shannon entropy calculation from the list of imported element
names and types.
type: long
threat.indicator.file.elf.sections:
dashed_name: threat-indicator-file-elf-sections
description: 'An array containing an object for each section of the ELF file.
The keys that should be present in these objects are defined by sub-fields underneath
`elf.sections.*`.'
flat_name: threat.indicator.file.elf.sections
level: extended
name: sections
normalize:
- array
original_fieldset: elf
short: Section information of the ELF file.
type: nested
threat.indicator.file.elf.sections.chi2:
dashed_name: threat-indicator-file-elf-sections-chi2
description: Chi-square probability distribution of the section.
flat_name: threat.indicator.file.elf.sections.chi2
format: number
level: extended
name: sections.chi2
normalize: []
original_fieldset: elf
short: Chi-square probability distribution of the section.
type: long
threat.indicator.file.elf.sections.entropy:
dashed_name: threat-indicator-file-elf-sections-entropy
description: Shannon entropy calculation from the section.
flat_name: threat.indicator.file.elf.sections.entropy
format: number
level: extended
name: sections.entropy
normalize: []
original_fieldset: elf
short: Shannon entropy calculation from the section.
type: long
threat.indicator.file.elf.sections.flags:
dashed_name: threat-indicator-file-elf-sections-flags
description: ELF Section List flags.
flat_name: threat.indicator.file.elf.sections.flags
ignore_above: 1024
level: extended
name: sections.flags
normalize: []
original_fieldset: elf
short: ELF Section List flags.
type: keyword
threat.indicator.file.elf.sections.name:
dashed_name: threat-indicator-file-elf-sections-name
description: ELF Section List name.
flat_name: threat.indicator.file.elf.sections.name
ignore_above: 1024
level: extended
name: sections.name
normalize: []
original_fieldset: elf
short: ELF Section List name.
type: keyword
threat.indicator.file.elf.sections.physical_offset:
dashed_name: threat-indicator-file-elf-sections-physical-offset
description: ELF Section List offset.
flat_name: threat.indicator.file.elf.sections.physical_offset
ignore_above: 1024
level: extended
name: sections.physical_offset
normalize: []
original_fieldset: elf
short: ELF Section List offset.
type: keyword
threat.indicator.file.elf.sections.physical_size:
dashed_name: threat-indicator-file-elf-sections-physical-size
description: ELF Section List physical size.
flat_name: threat.indicator.file.elf.sections.physical_size
format: bytes
level: extended
name: sections.physical_size
normalize: []
original_fieldset: elf
short: ELF Section List physical size.
type: long
threat.indicator.file.elf.sections.type:
dashed_name: threat-indicator-file-elf-sections-type
description: ELF Section List type.
flat_name: threat.indicator.file.elf.sections.type
ignore_above: 1024
level: extended
name: sections.type
normalize: []
original_fieldset: elf
short: ELF Section List type.
type: keyword
threat.indicator.file.elf.sections.var_entropy:
dashed_name: threat-indicator-file-elf-sections-var-entropy
description: Variance for Shannon entropy calculation from the section.
flat_name: threat.indicator.file.elf.sections.var_entropy
format: number
level: extended
name: sections.var_entropy
normalize: []
original_fieldset: elf
short: Variance for Shannon entropy calculation from the section.
type: long
threat.indicator.file.elf.sections.virtual_address:
dashed_name: threat-indicator-file-elf-sections-virtual-address
description: ELF Section List virtual address.
flat_name: threat.indicator.file.elf.sections.virtual_address
format: string
level: extended
name: sections.virtual_address
normalize: []
original_fieldset: elf
short: ELF Section List virtual address.
type: long
threat.indicator.file.elf.sections.virtual_size:
dashed_name: threat-indicator-file-elf-sections-virtual-size
description: ELF Section List virtual size.
flat_name: threat.indicator.file.elf.sections.virtual_size
format: string
level: extended
name: sections.virtual_size
normalize: []
original_fieldset: elf
short: ELF Section List virtual size.
type: long
threat.indicator.file.elf.segments:
dashed_name: threat-indicator-file-elf-segments
description: 'An array containing an object for each segment of the ELF file.
The keys that should be present in these objects are defined by sub-fields underneath
`elf.segments.*`.'
flat_name: threat.indicator.file.elf.segments
level: extended
name: segments
normalize:
- array
original_fieldset: elf
short: ELF object segment list.
type: nested
threat.indicator.file.elf.segments.sections:
dashed_name: threat-indicator-file-elf-segments-sections
description: ELF object segment sections.
flat_name: threat.indicator.file.elf.segments.sections
ignore_above: 1024
level: extended
name: segments.sections
normalize: []
original_fieldset: elf
short: ELF object segment sections.
type: keyword
threat.indicator.file.elf.segments.type:
dashed_name: threat-indicator-file-elf-segments-type
description: ELF object segment type.
flat_name: threat.indicator.file.elf.segments.type
ignore_above: 1024
level: extended
name: segments.type
normalize: []
original_fieldset: elf
short: ELF object segment type.
type: keyword
threat.indicator.file.elf.shared_libraries:
dashed_name: threat-indicator-file-elf-shared-libraries
description: List of shared libraries used by this ELF object.
flat_name: threat.indicator.file.elf.shared_libraries
ignore_above: 1024
level: extended
name: shared_libraries
normalize:
- array
original_fieldset: elf
short: List of shared libraries used by this ELF object.
type: keyword
threat.indicator.file.elf.telfhash:
dashed_name: threat-indicator-file-elf-telfhash
description: telfhash symbol hash for ELF file.
flat_name: threat.indicator.file.elf.telfhash
ignore_above: 1024
level: extended
name: telfhash
normalize: []
original_fieldset: elf
short: telfhash hash for ELF file.
type: keyword
threat.indicator.file.extension:
dashed_name: threat-indicator-file-extension
description: 'File extension, excluding the leading dot.
Note that when the file name has multiple extensions (example.tar.gz), only the
last one should be captured ("gz", not "tar.gz").'
example: png
flat_name: threat.indicator.file.extension
ignore_above: 1024
level: extended
name: extension
normalize: []
original_fieldset: file
short: File extension, excluding the leading dot.
type: keyword
threat.indicator.file.gid:
dashed_name: threat-indicator-file-gid
description: Primary group ID (GID) of the file.
example: '1001'
flat_name: threat.indicator.file.gid
ignore_above: 1024
level: extended
name: gid
normalize: []
original_fieldset: file
short: Primary group ID (GID) of the file.
type: keyword
threat.indicator.file.group:
dashed_name: threat-indicator-file-group
description: Primary group name of the file.
example: alice
flat_name: threat.indicator.file.group
ignore_above: 1024
level: extended
name: group
normalize: []
original_fieldset: file
short: Primary group name of the file.
type: keyword
threat.indicator.file.hash.md5:
dashed_name: threat-indicator-file-hash-md5
description: MD5 hash.
flat_name: threat.indicator.file.hash.md5
ignore_above: 1024
level: extended
name: md5
normalize: []
original_fieldset: hash
short: MD5 hash.
type: keyword
threat.indicator.file.hash.sha1:
dashed_name: threat-indicator-file-hash-sha1
description: SHA1 hash.
flat_name: threat.indicator.file.hash.sha1
ignore_above: 1024
level: extended
name: sha1
normalize: []
original_fieldset: hash
short: SHA1 hash.
type: keyword
threat.indicator.file.hash.sha256:
dashed_name: threat-indicator-file-hash-sha256
description: SHA256 hash.
flat_name: threat.indicator.file.hash.sha256
ignore_above: 1024
level: extended
name: sha256
normalize: []
original_fieldset: hash
short: SHA256 hash.
type: keyword
threat.indicator.file.hash.sha512:
dashed_name: threat-indicator-file-hash-sha512
description: SHA512 hash.
flat_name: threat.indicator.file.hash.sha512
ignore_above: 1024
level: extended
name: sha512
normalize: []
original_fieldset: hash
short: SHA512 hash.
type: keyword
threat.indicator.file.hash.ssdeep:
dashed_name: threat-indicator-file-hash-ssdeep
description: SSDEEP hash.
flat_name: threat.indicator.file.hash.ssdeep
ignore_above: 1024
level: extended
name: ssdeep
normalize: []
original_fieldset: hash
short: SSDEEP hash.
type: keyword
threat.indicator.file.inode:
dashed_name: threat-indicator-file-inode
description: Inode representing the file in the filesystem.
example: '256383'
flat_name: threat.indicator.file.inode
ignore_above: 1024
level: extended
name: inode
normalize: []
original_fieldset: file
short: Inode representing the file in the filesystem.
type: keyword
threat.indicator.file.mime_type:
dashed_name: threat-indicator-file-mime-type
description: MIME type should identify the format of the file or stream of bytes
using https://www.iana.org/assignments/media-types/media-types.xhtml[IANA official
types], where possible. When more than one type is applicable, the most specific
type should be used.
flat_name: threat.indicator.file.mime_type
ignore_above: 1024
level: extended
name: mime_type
normalize: []
original_fieldset: file
short: Media type of file, document, or arrangement of bytes.
type: keyword
threat.indicator.file.mode:
dashed_name: threat-indicator-file-mode
description: Mode of the file in octal representation.
example: '0640'
flat_name: threat.indicator.file.mode
ignore_above: 1024
level: extended
name: mode
normalize: []
original_fieldset: file
short: Mode of the file in octal representation.
type: keyword
threat.indicator.file.mtime:
dashed_name: threat-indicator-file-mtime
description: Last time the file content was modified.
flat_name: threat.indicator.file.mtime
level: extended
name: mtime
normalize: []
original_fieldset: file
short: Last time the file content was modified.
type: date
threat.indicator.file.name:
dashed_name: threat-indicator-file-name
description: Name of the file including the extension, without the directory.
example: example.png
flat_name: threat.indicator.file.name
ignore_above: 1024
level: extended
name: name
normalize: []
original_fieldset: file
short: Name of the file including the extension, without the directory.
type: keyword
threat.indicator.file.owner:
dashed_name: threat-indicator-file-owner
description: File owner's username.
example: alice
flat_name: threat.indicator.file.owner
ignore_above: 1024
level: extended
name: owner
normalize: []
original_fieldset: file
short: File owner's username.
type: keyword
threat.indicator.file.path:
dashed_name: threat-indicator-file-path
description: Full path to the file, including the file name. It should include the
drive letter, when appropriate.
example: /home/alice/example.png
flat_name: threat.indicator.file.path
ignore_above: 1024
level: extended
multi_fields:
- flat_name: threat.indicator.file.path.caseless
ignore_above: 1024
name: caseless
normalizer: lowercase
type: keyword
- flat_name: threat.indicator.file.path.text
name: text
norms: false
type: text
name: path
normalize: []
original_fieldset: file
short: Full path to the file, including the file name.
type: keyword
threat.indicator.file.pe.architecture:
dashed_name: threat-indicator-file-pe-architecture
description: CPU architecture target for the file.
example: x64
flat_name: threat.indicator.file.pe.architecture
ignore_above: 1024
level: extended
name: architecture
normalize: []
original_fieldset: pe
short: CPU architecture target for the file.
type: keyword
threat.indicator.file.pe.company:
dashed_name: threat-indicator-file-pe-company
description: Internal company name of the file, provided at compile-time.
example: Microsoft Corporation
flat_name: threat.indicator.file.pe.company
ignore_above: 1024
level: extended
name: company
normalize: []
original_fieldset: pe
short: Internal company name of the file, provided at compile-time.
type: keyword
threat.indicator.file.pe.description:
dashed_name: threat-indicator-file-pe-description
description: Internal description of the file, provided at compile-time.
example: Paint
flat_name: threat.indicator.file.pe.description
ignore_above: 1024
level: extended
name: description
normalize: []
original_fieldset: pe
short: Internal description of the file, provided at compile-time.
type: keyword
threat.indicator.file.pe.file_version:
dashed_name: threat-indicator-file-pe-file-version
description: Internal version of the file, provided at compile-time.
example: 6.3.9600.17415
flat_name: threat.indicator.file.pe.file_version
ignore_above: 1024
level: extended
name: file_version
normalize: []
original_fieldset: pe
short: Process name.
type: keyword
threat.indicator.file.pe.imphash:
dashed_name: threat-indicator-file-pe-imphash
description: 'A hash of the imports in a PE file. An imphash -- or import hash --
can be used to fingerprint binaries even after recompilation or other code-level
transformations have occurred, which would change more traditional hash values.
Learn more at https://www.fireeye.com/blog/threat-research/2014/01/tracking-malware-import-hashing.html.'
example: 0c6803c4e922103c4dca5963aad36ddf
flat_name: threat.indicator.file.pe.imphash
ignore_above: 1024
level: extended
name: imphash
normalize: []
original_fieldset: pe
short: A hash of the imports in a PE file.
type: keyword
threat.indicator.file.pe.original_file_name:
dashed_name: threat-indicator-file-pe-original-file-name
description: Internal name of the file, provided at compile-time.
example: MSPAINT.EXE
flat_name: threat.indicator.file.pe.original_file_name
ignore_above: 1024
level: extended
name: original_file_name
normalize: []
original_fieldset: pe
short: Internal name of the file, provided at compile-time.
type: keyword
threat.indicator.file.pe.product:
dashed_name: threat-indicator-file-pe-product
description: Internal product name of the file, provided at compile-time.
example: "Microsoft\xAE Windows\xAE Operating System"
flat_name: threat.indicator.file.pe.product
ignore_above: 1024
level: extended
name: product
normalize: []
original_fieldset: pe
short: Internal product name of the file, provided at compile-time.
type: keyword
threat.indicator.file.size:
dashed_name: threat-indicator-file-size
description: 'File size in bytes.
Only relevant when `file.type` is "file".'
example: 16384
flat_name: threat.indicator.file.size
level: extended
name: size
normalize: []
original_fieldset: file
short: File size in bytes.
type: long
threat.indicator.file.target_path:
dashed_name: threat-indicator-file-target-path
description: Target path for symlinks.
flat_name: threat.indicator.file.target_path
ignore_above: 1024
level: extended
multi_fields:
- flat_name: threat.indicator.file.target_path.caseless
ignore_above: 1024
name: caseless
normalizer: lowercase
type: keyword
- flat_name: threat.indicator.file.target_path.text
name: text
norms: false
type: text
name: target_path
normalize: []
original_fieldset: file
short: Target path for symlinks.
type: keyword
threat.indicator.file.type:
dashed_name: threat-indicator-file-type
description: File type (file, dir, or symlink).
example: file
flat_name: threat.indicator.file.type
ignore_above: 1024
level: extended
name: type
normalize: []
original_fieldset: file
short: File type (file, dir, or symlink).
type: keyword
threat.indicator.file.uid:
dashed_name: threat-indicator-file-uid
description: The user ID (UID) or security identifier (SID) of the file owner.
example: '1001'
flat_name: threat.indicator.file.uid
ignore_above: 1024
level: extended
name: uid
normalize: []
original_fieldset: file
short: The user ID (UID) or security identifier (SID) of the file owner.
type: keyword
threat.indicator.first_seen:
dashed_name: threat-indicator-first-seen
description: The date and time when intelligence source first reported sighting
this indicator.
example: '2020-11-05T17:25:47.000Z'
flat_name: threat.indicator.first_seen
level: extended
name: indicator.first_seen
normalize: []
short: Date/time indicator was first reported.
type: date
threat.indicator.geo.city_name:
dashed_name: threat-indicator-geo-city-name
description: City name.
example: Montreal
flat_name: threat.indicator.geo.city_name
ignore_above: 1024
level: core
name: city_name
normalize: []
original_fieldset: geo
short: City name.
type: keyword
threat.indicator.geo.continent_code:
dashed_name: threat-indicator-geo-continent-code
description: Two-letter code representing continent's name.
example: NA
flat_name: threat.indicator.geo.continent_code
ignore_above: 1024
level: core
name: continent_code
normalize: []
original_fieldset: geo
short: Continent code.
type: keyword
threat.indicator.geo.continent_name:
dashed_name: threat-indicator-geo-continent-name
description: Name of the continent.
example: North America
flat_name: threat.indicator.geo.continent_name
ignore_above: 1024
level: core
name: continent_name
normalize: []
original_fieldset: geo
short: Name of the continent.
type: keyword
threat.indicator.geo.country_iso_code:
dashed_name: threat-indicator-geo-country-iso-code
description: Country ISO code.
example: CA
flat_name: threat.indicator.geo.country_iso_code
ignore_above: 1024
level: core
name: country_iso_code
normalize: []
original_fieldset: geo
short: Country ISO code.
type: keyword
threat.indicator.geo.country_name:
dashed_name: threat-indicator-geo-country-name
description: Country name.
example: Canada
flat_name: threat.indicator.geo.country_name
ignore_above: 1024
level: core
name: country_name
normalize: []
original_fieldset: geo
short: Country name.
type: keyword
threat.indicator.geo.location:
dashed_name: threat-indicator-geo-location
description: Longitude and latitude.
example: '{ "lon": -73.614830, "lat": 45.505918 }'
flat_name: threat.indicator.geo.location
level: core
name: location
normalize: []
original_fieldset: geo
short: Longitude and latitude.
type: geo_point
threat.indicator.geo.name:
dashed_name: threat-indicator-geo-name
description: 'User-defined description of a location, at the level of granularity
they care about.
Could be the name of their data centers, the floor number, if this describes a
local physical entity, city names.
Not typically used in automated geolocation.'
example: boston-dc
flat_name: threat.indicator.geo.name
ignore_above: 1024
level: extended
name: name
normalize: []
original_fieldset: geo
short: User-defined description of a location.
type: keyword
threat.indicator.geo.postal_code:
dashed_name: threat-indicator-geo-postal-code
description: 'Postal code associated with the location.
Values appropriate for this field may also be known as a postcode or ZIP code
and will vary widely from country to country.'
example: 94040
flat_name: threat.indicator.geo.postal_code
ignore_above: 1024
level: core
name: postal_code
normalize: []
original_fieldset: geo
short: Postal code.
type: keyword
threat.indicator.geo.region_iso_code:
dashed_name: threat-indicator-geo-region-iso-code
description: Region ISO code.
example: CA-QC
flat_name: threat.indicator.geo.region_iso_code
ignore_above: 1024
level: core
name: region_iso_code
normalize: []
original_fieldset: geo
short: Region ISO code.
type: keyword
threat.indicator.geo.region_name:
dashed_name: threat-indicator-geo-region-name
description: Region name.
example: Quebec
flat_name: threat.indicator.geo.region_name
ignore_above: 1024
level: core
name: region_name
normalize: []
original_fieldset: geo
short: Region name.
type: keyword
threat.indicator.geo.timezone:
dashed_name: threat-indicator-geo-timezone
description: The time zone of the location, such as IANA time zone name.
example: America/Argentina/Buenos_Aires
flat_name: threat.indicator.geo.timezone
ignore_above: 1024
level: core
name: timezone
normalize: []
original_fieldset: geo
short: Time zone.
type: keyword
threat.indicator.ip:
dashed_name: threat-indicator-ip
description: Identifies a threat indicator as an IP address (irrespective of direction).
example: 1.2.3.4
flat_name: threat.indicator.ip
level: extended
name: indicator.ip
normalize: []
short: Indicator IP address
type: ip
threat.indicator.last_seen:
dashed_name: threat-indicator-last-seen
description: The date and time when intelligence source last reported sighting this
indicator.
example: '2020-11-05T17:25:47.000Z'
flat_name: threat.indicator.last_seen
level: extended
name: indicator.last_seen
normalize: []
short: Date/time indicator was last reported.
type: date
threat.indicator.marking.tlp:
dashed_name: threat-indicator-marking-tlp
description: Traffic Light Protocol sharing markings.
example: CLEAR
expected_values:
- WHITE
- CLEAR
- GREEN
- AMBER
- AMBER+STRICT
- RED
flat_name: threat.indicator.marking.tlp
ignore_above: 1024
level: extended
name: indicator.marking.tlp
normalize: []
short: Indicator TLP marking
type: keyword
threat.indicator.modified_at:
dashed_name: threat-indicator-modified-at
description: The date and time when intelligence source last modified information
for this indicator.
example: '2020-11-05T17:25:47.000Z'
flat_name: threat.indicator.modified_at
level: extended
name: indicator.modified_at
normalize: []
short: Date/time indicator was last updated.
type: date
threat.indicator.port:
dashed_name: threat-indicator-port
description: Identifies a threat indicator as a port number (irrespective of direction).
example: 443
flat_name: threat.indicator.port
level: extended
name: indicator.port
normalize: []
short: Indicator port
type: long
threat.indicator.provider:
dashed_name: threat-indicator-provider
description: The name of the indicator's provider.
example: lrz_urlhaus
flat_name: threat.indicator.provider
ignore_above: 1024
level: extended
name: indicator.provider
normalize: []
short: Indicator provider
type: keyword
threat.indicator.reference:
dashed_name: threat-indicator-reference
description: Reference URL linking to additional information about this indicator.
example: https://system.example.com/indicator/0001234
flat_name: threat.indicator.reference
ignore_above: 1024
level: extended
name: indicator.reference
normalize: []
short: Indicator reference URL
type: keyword
threat.indicator.registry.data.bytes:
dashed_name: threat-indicator-registry-data-bytes
description: 'Original bytes written with base64 encoding.
For Windows registry operations, such as SetValueEx and RegQueryValueEx, this
corresponds to the data pointed by `lp_data`. This is optional but provides better
recoverability and should be populated for REG_BINARY encoded values.'
example: ZQBuAC0AVQBTAAAAZQBuAAAAAAA=
flat_name: threat.indicator.registry.data.bytes
ignore_above: 1024
level: extended
name: data.bytes
normalize: []
original_fieldset: registry
short: Original bytes written with base64 encoding.
type: keyword
threat.indicator.registry.data.strings:
dashed_name: threat-indicator-registry-data-strings
description: 'Content when writing string types.
Populated as an array when writing string data to the registry. For single string
registry types (REG_SZ, REG_EXPAND_SZ), this should be an array with one string.
For sequences of string with REG_MULTI_SZ, this array will be variable length.
For numeric data, such as REG_DWORD and REG_QWORD, this should be populated with
the decimal representation (e.g `"1"`).'
example: '["C:\rta\red_ttp\bin\myapp.exe"]'
flat_name: threat.indicator.registry.data.strings
level: core
name: data.strings
normalize:
- array
original_fieldset: registry
short: List of strings representing what was written to the registry.
type: wildcard
threat.indicator.registry.data.type:
dashed_name: threat-indicator-registry-data-type
description: Standard registry type for encoding contents
example: REG_SZ
flat_name: threat.indicator.registry.data.type
ignore_above: 1024
level: core
name: data.type
normalize: []
original_fieldset: registry
short: Standard registry type for encoding contents
type: keyword
threat.indicator.registry.hive:
dashed_name: threat-indicator-registry-hive
description: Abbreviated name for the hive.
example: HKLM
flat_name: threat.indicator.registry.hive
ignore_above: 1024
level: core
name: hive
normalize: []
original_fieldset: registry
short: Abbreviated name for the hive.
type: keyword
threat.indicator.registry.key:
dashed_name: threat-indicator-registry-key
description: Hive-relative path of keys.
example: SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\winword.exe
flat_name: threat.indicator.registry.key
ignore_above: 1024
level: core
name: key
normalize: []
original_fieldset: registry
short: Hive-relative path of keys.
type: keyword
threat.indicator.registry.path:
dashed_name: threat-indicator-registry-path
description: Full path, including hive, key and value
example: HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution
Options\winword.exe\Debugger
flat_name: threat.indicator.registry.path
ignore_above: 1024
level: core
name: path
normalize: []
original_fieldset: registry
short: Full path, including hive, key and value
type: keyword
threat.indicator.registry.value:
dashed_name: threat-indicator-registry-value
description: Name of the value written.
example: Debugger
flat_name: threat.indicator.registry.value
ignore_above: 1024
level: core
name: value
normalize: []
original_fieldset: registry
short: Name of the value written.
type: keyword
threat.indicator.scanner_stats:
dashed_name: threat-indicator-scanner-stats
description: Count of AV/EDR vendors that successfully detected malicious file or
URL.
example: 4
flat_name: threat.indicator.scanner_stats
level: extended
name: indicator.scanner_stats
normalize: []
short: Scanner statistics
type: long
threat.indicator.sightings:
dashed_name: threat-indicator-sightings
description: Number of times this indicator was observed conducting threat activity.
example: 20
flat_name: threat.indicator.sightings
level: extended
name: indicator.sightings
normalize: []
short: Number of times indicator observed
type: long
threat.indicator.type:
dashed_name: threat-indicator-type
description: Type of indicator as represented by Cyber Observable in STIX 2.0.
example: ipv4-addr
expected_values:
- autonomous-system
- artifact
- directory
- domain-name
- email-addr
- file
- ipv4-addr
- ipv6-addr
- mac-addr
- mutex
- port
- process
- software
- url
- user-account
- windows-registry-key
- x509-certificate
flat_name: threat.indicator.type
ignore_above: 1024
level: extended
name: indicator.type
normalize: []
short: Type of indicator
type: keyword
threat.indicator.url.domain:
dashed_name: threat-indicator-url-domain
description: 'Domain of the url, such as "www.elastic.co".
In some cases a URL may refer to an IP and/or port directly, without a domain
name. In this case, the IP address would go to the `domain` field.
If the URL contains a literal IPv6 address enclosed by `[` and `]` (IETF RFC 2732),
the `[` and `]` characters should also be captured in the `domain` field.'
example: www.elastic.co
flat_name: threat.indicator.url.domain
ignore_above: 1024
level: extended
name: domain
normalize: []
original_fieldset: url
short: Domain of the url.
type: keyword
threat.indicator.url.extension:
dashed_name: threat-indicator-url-extension
description: 'The field contains the file extension from the original request url,
excluding the leading dot.
The file extension is only set if it exists, as not every url has a file extension.
The leading period must not be included. For example, the value must be "png",
not ".png".
Note that when the file name has multiple extensions (example.tar.gz), only the
last one should be captured ("gz", not "tar.gz").'
example: png
flat_name: threat.indicator.url.extension
ignore_above: 1024
level: extended
name: extension
normalize: []
original_fieldset: url
short: File extension from the request url, excluding the leading dot.
type: keyword
threat.indicator.url.fragment:
dashed_name: threat-indicator-url-fragment
description: 'Portion of the url after the `#`, such as "top".
The `#` is not part of the fragment.'
flat_name: threat.indicator.url.fragment
ignore_above: 1024
level: extended
name: fragment
normalize: []
original_fieldset: url
short: Portion of the url after the `#`.
type: keyword
threat.indicator.url.full:
dashed_name: threat-indicator-url-full
description: If full URLs are important to your use case, they should be stored
in `url.full`, whether this field is reconstructed or present in the event source.
example: https://www.elastic.co:443/search?q=elasticsearch#top
flat_name: threat.indicator.url.full
level: extended
multi_fields:
- flat_name: threat.indicator.url.full.text
name: text
type: match_only_text
name: full
normalize: []
original_fieldset: url
short: Full unparsed URL.
type: wildcard
threat.indicator.url.original:
dashed_name: threat-indicator-url-original
description: 'Unmodified original url as seen in the event source.
Note that in network monitoring, the observed URL may be a full URL, whereas in
access logs, the URL is often just represented as a path.
This field is meant to represent the URL as it was observed, complete or not.'
example: https://www.elastic.co:443/search?q=elasticsearch#top or /search?q=elasticsearch
flat_name: threat.indicator.url.original
level: extended
multi_fields:
- flat_name: threat.indicator.url.original.text
name: text
type: match_only_text
name: original
normalize: []
original_fieldset: url
short: Unmodified original url as seen in the event source.
type: wildcard
threat.indicator.url.password:
dashed_name: threat-indicator-url-password
description: Password of the request.
flat_name: threat.indicator.url.password
ignore_above: 1024
level: extended
name: password
normalize: []
original_fieldset: url
short: Password of the request.
type: keyword
threat.indicator.url.path:
dashed_name: threat-indicator-url-path
description: Path of the request, such as "/search".
flat_name: threat.indicator.url.path
level: extended
name: path
normalize: []
original_fieldset: url
short: Path of the request, such as "/search".
type: wildcard
threat.indicator.url.port:
dashed_name: threat-indicator-url-port
description: Port of the request, such as 443.
example: 443
flat_name: threat.indicator.url.port
format: string
level: extended
name: port
normalize: []
original_fieldset: url
short: Port of the request, such as 443.
type: long
threat.indicator.url.query:
dashed_name: threat-indicator-url-query
description: 'The query field describes the query string of the request, such as
"q=elasticsearch".
The `?` is excluded from the query string. If a URL contains no `?`, there is
no query field. If there is a `?` but no query, the query field exists with an
empty string. The `exists` query can be used to differentiate between the two
cases.'
flat_name: threat.indicator.url.query
ignore_above: 1024
level: extended
name: query
normalize: []
original_fieldset: url
short: Query string of the request.
type: keyword
threat.indicator.url.registered_domain:
dashed_name: threat-indicator-url-registered-domain
description: 'The highest registered url domain, stripped of the subdomain.
For example, the registered domain for "foo.example.com" is "example.com".
This value can be determined precisely with a list like the public suffix list
(http://publicsuffix.org). Trying to approximate this by simply taking the last
two labels will not work well for TLDs such as "co.uk".'
example: example.com
flat_name: threat.indicator.url.registered_domain
ignore_above: 1024
level: extended
name: registered_domain
normalize: []
original_fieldset: url
short: The highest registered url domain, stripped of the subdomain.
type: keyword
threat.indicator.url.scheme:
dashed_name: threat-indicator-url-scheme
description: 'Scheme of the request, such as "https".
Note: The `:` is not part of the scheme.'
example: https
flat_name: threat.indicator.url.scheme
ignore_above: 1024
level: extended
name: scheme
normalize: []
original_fieldset: url
short: Scheme of the url.
type: keyword
threat.indicator.url.subdomain:
dashed_name: threat-indicator-url-subdomain
description: 'The subdomain portion of a fully qualified domain name includes all
of the names except the host name under the registered_domain. In a partially
qualified domain, or if the the qualification level of the full name cannot be
determined, subdomain contains all of the names below the registered domain.
For example the subdomain portion of "www.east.mydomain.co.uk" is "east". If the
domain has multiple levels of subdomain, such as "sub2.sub1.example.com", the
subdomain field should contain "sub2.sub1", with no trailing period.'
example: east
flat_name: threat.indicator.url.subdomain
ignore_above: 1024
level: extended
name: subdomain
normalize: []
original_fieldset: url
short: The subdomain of the domain.
type: keyword
threat.indicator.url.top_level_domain:
dashed_name: threat-indicator-url-top-level-domain
description: 'The effective top level domain (eTLD), also known as the domain suffix,
is the last part of the domain name. For example, the top level domain for example.com
is "com".
This value can be determined precisely with a list like the public suffix list
(http://publicsuffix.org). Trying to approximate this by simply taking the last
label will not work well for effective TLDs such as "co.uk".'
example: co.uk
flat_name: threat.indicator.url.top_level_domain
ignore_above: 1024
level: extended
name: top_level_domain
normalize: []
original_fieldset: url
short: The effective top level domain (com, org, net, co.uk).
type: keyword
threat.indicator.url.username:
dashed_name: threat-indicator-url-username
description: Username of the request.
flat_name: threat.indicator.url.username
ignore_above: 1024
level: extended
name: username
normalize: []
original_fieldset: url
short: Username of the request.
type: keyword
threat.indicator.x509.alternative_names:
dashed_name: threat-indicator-x509-alternative-names
description: List of subject alternative names (SAN). Name types vary by certificate
authority and certificate type but commonly contain IP addresses, DNS names (and
wildcards), and email addresses.
example: '*.elastic.co'
flat_name: threat.indicator.x509.alternative_names
ignore_above: 1024
level: extended
name: alternative_names
normalize:
- array
original_fieldset: x509
short: List of subject alternative names (SAN).
type: keyword
threat.indicator.x509.issuer.common_name:
dashed_name: threat-indicator-x509-issuer-common-name
description: List of common name (CN) of issuing certificate authority.
example: Example SHA2 High Assurance Server CA
flat_name: threat.indicator.x509.issuer.common_name
ignore_above: 1024
level: extended
name: issuer.common_name
normalize:
- array
original_fieldset: x509
short: List of common name (CN) of issuing certificate authority.
type: keyword
threat.indicator.x509.issuer.country:
dashed_name: threat-indicator-x509-issuer-country
description: List of country \(C) codes
example: US
flat_name: threat.indicator.x509.issuer.country
ignore_above: 1024
level: extended
name: issuer.country
normalize:
- array
original_fieldset: x509
short: List of country \(C) codes
type: keyword
threat.indicator.x509.issuer.distinguished_name:
dashed_name: threat-indicator-x509-issuer-distinguished-name
description: Distinguished name (DN) of issuing certificate authority.
example: C=US, O=Example Inc, OU=www.example.com, CN=Example SHA2 High Assurance
Server CA
flat_name: threat.indicator.x509.issuer.distinguished_name
ignore_above: 1024
level: extended
name: issuer.distinguished_name
normalize: []
original_fieldset: x509
short: Distinguished name (DN) of issuing certificate authority.
type: keyword
threat.indicator.x509.issuer.locality:
dashed_name: threat-indicator-x509-issuer-locality
description: List of locality names (L)
example: Mountain View
flat_name: threat.indicator.x509.issuer.locality
ignore_above: 1024
level: extended
name: issuer.locality
normalize:
- array
original_fieldset: x509
short: List of locality names (L)
type: keyword
threat.indicator.x509.issuer.organization:
dashed_name: threat-indicator-x509-issuer-organization
description: List of organizations (O) of issuing certificate authority.
example: Example Inc
flat_name: threat.indicator.x509.issuer.organization
ignore_above: 1024
level: extended
name: issuer.organization
normalize:
- array
original_fieldset: x509
short: List of organizations (O) of issuing certificate authority.
type: keyword
threat.indicator.x509.issuer.organizational_unit:
dashed_name: threat-indicator-x509-issuer-organizational-unit
description: List of organizational units (OU) of issuing certificate authority.
example: www.example.com
flat_name: threat.indicator.x509.issuer.organizational_unit
ignore_above: 1024
level: extended
name: issuer.organizational_unit
normalize:
- array
original_fieldset: x509
short: List of organizational units (OU) of issuing certificate authority.
type: keyword
threat.indicator.x509.issuer.state_or_province:
dashed_name: threat-indicator-x509-issuer-state-or-province
description: List of state or province names (ST, S, or P)
example: California
flat_name: threat.indicator.x509.issuer.state_or_province
ignore_above: 1024
level: extended
name: issuer.state_or_province
normalize:
- array
original_fieldset: x509
short: List of state or province names (ST, S, or P)
type: keyword
threat.indicator.x509.not_after:
dashed_name: threat-indicator-x509-not-after
description: Time at which the certificate is no longer considered valid.
example: '2020-07-16T03:15:39Z'
flat_name: threat.indicator.x509.not_after
level: extended
name: not_after
normalize: []
original_fieldset: x509
short: Time at which the certificate is no longer considered valid.
type: date
threat.indicator.x509.not_before:
dashed_name: threat-indicator-x509-not-before
description: Time at which the certificate is first considered valid.
example: '2019-08-16T01:40:25Z'
flat_name: threat.indicator.x509.not_before
level: extended
name: not_before
normalize: []
original_fieldset: x509
short: Time at which the certificate is first considered valid.
type: date
threat.indicator.x509.public_key_algorithm:
dashed_name: threat-indicator-x509-public-key-algorithm
description: Algorithm used to generate the public key.
example: RSA
flat_name: threat.indicator.x509.public_key_algorithm
ignore_above: 1024
level: extended
name: public_key_algorithm
normalize: []
original_fieldset: x509
short: Algorithm used to generate the public key.
type: keyword
threat.indicator.x509.public_key_curve:
dashed_name: threat-indicator-x509-public-key-curve
description: The curve used by the elliptic curve public key algorithm. This is
algorithm specific.
example: nistp521
flat_name: threat.indicator.x509.public_key_curve
ignore_above: 1024
level: extended
name: public_key_curve
normalize: []
original_fieldset: x509
short: The curve used by the elliptic curve public key algorithm. This is algorithm
specific.
type: keyword
threat.indicator.x509.public_key_exponent:
dashed_name: threat-indicator-x509-public-key-exponent
description: Exponent used to derive the public key. This is algorithm specific.
doc_values: false
example: 65537
flat_name: threat.indicator.x509.public_key_exponent
index: false
level: extended
name: public_key_exponent
normalize: []
original_fieldset: x509
short: Exponent used to derive the public key. This is algorithm specific.
type: long
threat.indicator.x509.public_key_size:
dashed_name: threat-indicator-x509-public-key-size
description: The size of the public key space in bits.
example: 2048
flat_name: threat.indicator.x509.public_key_size
level: extended
name: public_key_size
normalize: []
original_fieldset: x509
short: The size of the public key space in bits.
type: long
threat.indicator.x509.serial_number:
dashed_name: threat-indicator-x509-serial-number
description: Unique serial number issued by the certificate authority. For consistency,
if this value is alphanumeric, it should be formatted without colons and uppercase
characters.
example: 55FBB9C7DEBF09809D12CCAA
flat_name: threat.indicator.x509.serial_number
ignore_above: 1024
level: extended
name: serial_number
normalize: []
original_fieldset: x509
short: Unique serial number issued by the certificate authority.
type: keyword
threat.indicator.x509.signature_algorithm:
dashed_name: threat-indicator-x509-signature-algorithm
description: Identifier for certificate signature algorithm. We recommend using
names found in Go Lang Crypto library. See https://github.com/golang/go/blob/go1.14/src/crypto/x509/x509.go#L337-L353.
example: SHA256-RSA
flat_name: threat.indicator.x509.signature_algorithm
ignore_above: 1024
level: extended
name: signature_algorithm
normalize: []
original_fieldset: x509
short: Identifier for certificate signature algorithm.
type: keyword
threat.indicator.x509.subject.common_name:
dashed_name: threat-indicator-x509-subject-common-name
description: List of common names (CN) of subject.
example: shared.global.example.net
flat_name: threat.indicator.x509.subject.common_name
ignore_above: 1024
level: extended
name: subject.common_name
normalize:
- array
original_fieldset: x509
short: List of common names (CN) of subject.
type: keyword
threat.indicator.x509.subject.country:
dashed_name: threat-indicator-x509-subject-country
description: List of country \(C) code
example: US
flat_name: threat.indicator.x509.subject.country
ignore_above: 1024
level: extended
name: subject.country
normalize:
- array
original_fieldset: x509
short: List of country \(C) code
type: keyword
threat.indicator.x509.subject.distinguished_name:
dashed_name: threat-indicator-x509-subject-distinguished-name
description: Distinguished name (DN) of the certificate subject entity.
example: C=US, ST=California, L=San Francisco, O=Example, Inc., CN=shared.global.example.net
flat_name: threat.indicator.x509.subject.distinguished_name
ignore_above: 1024
level: extended
name: subject.distinguished_name
normalize: []
original_fieldset: x509
short: Distinguished name (DN) of the certificate subject entity.
type: keyword
threat.indicator.x509.subject.locality:
dashed_name: threat-indicator-x509-subject-locality
description: List of locality names (L)
example: San Francisco
flat_name: threat.indicator.x509.subject.locality
ignore_above: 1024
level: extended
name: subject.locality
normalize:
- array
original_fieldset: x509
short: List of locality names (L)
type: keyword
threat.indicator.x509.subject.organization:
dashed_name: threat-indicator-x509-subject-organization
description: List of organizations (O) of subject.
example: Example, Inc.
flat_name: threat.indicator.x509.subject.organization
ignore_above: 1024
level: extended
name: subject.organization
normalize:
- array
original_fieldset: x509
short: List of organizations (O) of subject.
type: keyword
threat.indicator.x509.subject.organizational_unit:
dashed_name: threat-indicator-x509-subject-organizational-unit
description: List of organizational units (OU) of subject.
flat_name: threat.indicator.x509.subject.organizational_unit
ignore_above: 1024
level: extended
name: subject.organizational_unit
normalize:
- array
original_fieldset: x509
short: List of organizational units (OU) of subject.
type: keyword
threat.indicator.x509.subject.state_or_province:
dashed_name: threat-indicator-x509-subject-state-or-province
description: List of state or province names (ST, S, or P)
example: California
flat_name: threat.indicator.x509.subject.state_or_province
ignore_above: 1024
level: extended
name: subject.state_or_province
normalize:
- array
original_fieldset: x509
short: List of state or province names (ST, S, or P)
type: keyword
threat.indicator.x509.version_number:
dashed_name: threat-indicator-x509-version-number
description: Version of x509 format.
example: 3
flat_name: threat.indicator.x509.version_number
ignore_above: 1024
level: extended
name: version_number
normalize: []
original_fieldset: x509
short: Version of x509 format.
type: keyword
threat.software.id:
dashed_name: threat-software-id
description: "The id of the software used by this threat to conduct behavior commonly\
\ modeled using MITRE ATT&CK\xAE.\nWhile not required, you can use a MITRE ATT&CK\xAE\
\ software id."
example: S0552
flat_name: threat.software.id
ignore_above: 1024
level: extended
name: software.id
normalize: []
short: ID of the software
type: keyword
threat.software.name:
dashed_name: threat-software-name
description: "The name of the software used by this threat to conduct behavior commonly\
\ modeled using MITRE ATT&CK\xAE.\nWhile not required, you can use a MITRE ATT&CK\xAE\
\ software name."
example: AdFind
flat_name: threat.software.name
ignore_above: 1024
level: extended
name: software.name
normalize: []
short: Name of the software.
type: keyword
threat.software.platforms:
dashed_name: threat-software-platforms
description: "The platforms of the software used by this threat to conduct behavior\
\ commonly modeled using MITRE ATT&CK\xAE.\nWhile not required, you can use MITRE\
\ ATT&CK\xAE software platform values."
example: '[ "Windows" ]'
expected_values:
- AWS
- Azure
- Azure AD
- GCP
- Linux
- macOS
- Network
- Office 365
- SaaS
- Windows
flat_name: threat.software.platforms
ignore_above: 1024
level: extended
name: software.platforms
normalize:
- array
short: Platforms of the software.
type: keyword
threat.software.reference:
dashed_name: threat-software-reference
description: "The reference URL of the software used by this threat to conduct behavior\
\ commonly modeled using MITRE ATT&CK\xAE.\nWhile not required, you can use a\
\ MITRE ATT&CK\xAE software reference URL."
example: https://attack.mitre.org/software/S0552/
flat_name: threat.software.reference
ignore_above: 1024
level: extended
name: software.reference
normalize: []
short: Software reference URL.
type: keyword
threat.software.type:
dashed_name: threat-software-type
description: "The type of software used by this threat to conduct behavior commonly\
\ modeled using MITRE ATT&CK\xAE.\nWhile not required, you can use a MITRE ATT&CK\xAE\
\ software type."
example: Tool
expected_values:
- Malware
- Tool
flat_name: threat.software.type
ignore_above: 1024
level: extended
name: software.type
normalize: []
short: Software type.
type: keyword
threat.tactic.id:
dashed_name: threat-tactic-id
description: "The id of tactic used by this threat. You can use a MITRE ATT&CK\xAE\
\ tactic, for example. (ex. https://attack.mitre.org/tactics/TA0002/ )"
example: TA0002
flat_name: threat.tactic.id
ignore_above: 1024
level: extended
name: tactic.id
normalize:
- array
short: Threat tactic id.
type: keyword
threat.tactic.name:
dashed_name: threat-tactic-name
description: "Name of the type of tactic used by this threat. You can use a MITRE\
\ ATT&CK\xAE tactic, for example. (ex. https://attack.mitre.org/tactics/TA0002/)"
example: Execution
flat_name: threat.tactic.name
ignore_above: 1024
level: extended
name: tactic.name
normalize:
- array
short: Threat tactic.
type: keyword
threat.tactic.reference:
dashed_name: threat-tactic-reference
description: "The reference url of tactic used by this threat. You can use a MITRE\
\ ATT&CK\xAE tactic, for example. (ex. https://attack.mitre.org/tactics/TA0002/\
\ )"
example: https://attack.mitre.org/tactics/TA0002/
flat_name: threat.tactic.reference
ignore_above: 1024
level: extended
name: tactic.reference
normalize:
- array
short: Threat tactic URL reference.
type: keyword
threat.technique.id:
dashed_name: threat-technique-id
description: "The id of technique used by this threat. You can use a MITRE ATT&CK\xAE\
\ technique, for example. (ex. https://attack.mitre.org/techniques/T1059/)"
example: T1059
flat_name: threat.technique.id
ignore_above: 1024
level: extended
name: technique.id
normalize:
- array
short: Threat technique id.
type: keyword
threat.technique.name:
dashed_name: threat-technique-name
description: "The name of technique used by this threat. You can use a MITRE ATT&CK\xAE\
\ technique, for example. (ex. https://attack.mitre.org/techniques/T1059/)"
example: Command and Scripting Interpreter
flat_name: threat.technique.name
ignore_above: 1024
level: extended
multi_fields:
- flat_name: threat.technique.name.text
name: text
type: match_only_text
name: technique.name
normalize:
- array
short: Threat technique name.
type: keyword
threat.technique.reference:
dashed_name: threat-technique-reference
description: "The reference url of technique used by this threat. You can use a\
\ MITRE ATT&CK\xAE technique, for example. (ex. https://attack.mitre.org/techniques/T1059/)"
example: https://attack.mitre.org/techniques/T1059/
flat_name: threat.technique.reference
ignore_above: 1024
level: extended
name: technique.reference
normalize:
- array
short: Threat technique URL reference.
type: keyword
threat.technique.subtechnique.id:
dashed_name: threat-technique-subtechnique-id
description: "The full id of subtechnique used by this threat. You can use a MITRE\
\ ATT&CK\xAE subtechnique, for example. (ex. https://attack.mitre.org/techniques/T1059/001/)"
example: T1059.001
flat_name: threat.technique.subtechnique.id
ignore_above: 1024
level: extended
name: technique.subtechnique.id
normalize:
- array
short: Threat subtechnique id.
type: keyword
threat.technique.subtechnique.name:
dashed_name: threat-technique-subtechnique-name
description: "The name of subtechnique used by this threat. You can use a MITRE\
\ ATT&CK\xAE subtechnique, for example. (ex. https://attack.mitre.org/techniques/T1059/001/)"
example: PowerShell
flat_name: threat.technique.subtechnique.name
ignore_above: 1024
level: extended
multi_fields:
- flat_name: threat.technique.subtechnique.name.text
name: text
type: match_only_text
name: technique.subtechnique.name
normalize:
- array
short: Threat subtechnique name.
type: keyword
threat.technique.subtechnique.reference:
dashed_name: threat-technique-subtechnique-reference
description: "The reference url of subtechnique used by this threat. You can use\
\ a MITRE ATT&CK\xAE subtechnique, for example. (ex. https://attack.mitre.org/techniques/T1059/001/)"
example: https://attack.mitre.org/techniques/T1059/001/
flat_name: threat.technique.subtechnique.reference
ignore_above: 1024
level: extended
name: technique.subtechnique.reference
normalize:
- array
short: Threat subtechnique URL reference.
type: keyword
user.Ext:
dashed_name: user-Ext
description: Object for all custom defined fields to live in.
flat_name: user.Ext
level: custom
name: Ext
normalize: []
short: Object for all custom defined fields to live in.
type: object
user.Ext.real:
dashed_name: user-Ext-real
description: User info prior to any setuid operations.
flat_name: user.Ext.real
level: custom
name: Ext.real
normalize: []
short: User info prior to any setuid operations.
type: object
user.Ext.real.id:
dashed_name: user-Ext-real-id
description: One or multiple unique identifiers of the user.
flat_name: user.Ext.real.id
ignore_above: 1024
level: custom
name: Ext.real.id
normalize: []
short: One or multiple unique identifiers of the user.
type: keyword
user.Ext.real.name:
dashed_name: user-Ext-real-name
description: Short name or login of the user.
flat_name: user.Ext.real.name
ignore_above: 1024
level: custom
name: Ext.real.name
normalize: []
short: Short name or login of the user.
type: keyword
user.domain:
dashed_name: user-domain
description: 'Name of the directory the user is a member of.
For example, an LDAP or Active Directory domain name.'
flat_name: user.domain
ignore_above: 1024
level: extended
name: domain
normalize: []
short: Name of the directory the user is a member of.
type: keyword
user.email:
dashed_name: user-email
description: User email address.
flat_name: user.email
ignore_above: 1024
level: extended
name: email
normalize: []
short: User email address.
type: keyword
user.full_name:
dashed_name: user-full-name
description: User's full name, if available.
example: Albert Einstein
flat_name: user.full_name
ignore_above: 1024
level: extended
multi_fields:
- flat_name: user.full_name.text
name: text
type: match_only_text
name: full_name
normalize: []
short: User's full name, if available.
type: keyword
user.group.Ext:
dashed_name: user-group-Ext
description: Object for all custom defined fields to live in.
flat_name: user.group.Ext
level: custom
name: Ext
normalize: []
original_fieldset: group
short: Object for all custom defined fields to live in.
type: object
user.group.Ext.real:
dashed_name: user-group-Ext-real
description: Group info prior to any setgid operations.
flat_name: user.group.Ext.real
level: custom
name: Ext.real
normalize: []
original_fieldset: group
short: Group info prior to any setgid operations.
type: object
user.group.Ext.real.id:
dashed_name: user-group-Ext-real-id
description: Unique identifier for the group on the system/platform.
flat_name: user.group.Ext.real.id
ignore_above: 1024
level: custom
name: Ext.real.id
normalize: []
original_fieldset: group
short: Unique identifier for the group on the system/platform.
type: keyword
user.group.Ext.real.name:
dashed_name: user-group-Ext-real-name
description: Name of the group.
flat_name: user.group.Ext.real.name
ignore_above: 1024
level: custom
name: Ext.real.name
normalize: []
original_fieldset: group
short: Name of the group.
type: keyword
user.group.domain:
dashed_name: user-group-domain
description: Name of the directory the group is a member of. For example, an LDAP
or Active Directory domain name.
flat_name: user.group.domain
ignore_above: 1024
level: extended
name: domain
normalize: []
original_fieldset: group
short: Name of the directory the group is a member of.
type: keyword
user.group.id:
dashed_name: user-group-id
description: Unique identifier for the group on the system/platform.
flat_name: user.group.id
ignore_above: 1024
level: extended
name: id
normalize: []
original_fieldset: group
short: Unique identifier for the group on the system/platform.
type: keyword
user.group.name:
dashed_name: user-group-name
description: Name of the group.
flat_name: user.group.name
ignore_above: 1024
level: extended
name: name
normalize: []
original_fieldset: group
short: Name of the group.
type: keyword
user.hash:
dashed_name: user-hash
description: 'Unique user hash to correlate information for a user in anonymized
form.
Useful if `user.id` or `user.name` contain confidential information and cannot
be used.'
flat_name: user.hash
ignore_above: 1024
level: extended
name: hash
normalize: []
short: Unique user hash to correlate information for a user in anonymized form.
type: keyword
user.id:
dashed_name: user-id
description: Unique identifier of the user.
example: S-1-5-21-202424912787-2692429404-2351956786-1000
flat_name: user.id
ignore_above: 1024
level: core
name: id
normalize: []
short: Unique identifier of the user.
type: keyword
user.name:
dashed_name: user-name
description: Short name or login of the user.
example: a.einstein
flat_name: user.name
ignore_above: 1024
level: core
multi_fields:
- flat_name: user.name.text
name: text
type: match_only_text
name: name
normalize: []
short: Short name or login of the user.
type: keyword