schemas/v1/alerts/rule_detection_event.yaml (6,398 lines of code) (raw):

'@timestamp': dashed_name: timestamp description: 'Date/time when the event originated. This is the date/time extracted from the event, typically representing when the event was generated by the source. If the event source has no original timestamp, this value is typically populated by the first time the event was received by the pipeline. Required field for all events.' example: '2016-05-23T08:05:34.853Z' flat_name: '@timestamp' level: core name: '@timestamp' normalize: [] required: true short: Date/time when the event originated. type: date Events: dashed_name: Events description: events array flat_name: Events level: custom name: Events normalize: [] short: events array type: object Responses.@timestamp: dashed_name: Responses-timestamp description: Timestamp in which action was taken flat_name: Responses.@timestamp format: string level: custom name: '@timestamp' normalize: [] short: Timestamp in which action was taken type: date Responses.action: dashed_name: Responses-action description: Dictionary representing requested response action flat_name: Responses.action level: custom name: action normalize: [] short: Dictionary representing requested response action type: nested Responses.action.action: dashed_name: Responses-action-action description: Response action name flat_name: Responses.action.action ignore_above: 1024 level: custom name: action.action normalize: [] short: Response action name type: keyword Responses.action.field: dashed_name: Responses-action-field description: Field in the triggering event to use as input for action flat_name: Responses.action.field level: custom name: action.field normalize: [] norms: false short: Field in the triggering event to use as input for action type: text Responses.action.file.attributes: dashed_name: Responses-action-file-attributes description: Destination file attributes flat_name: Responses.action.file.attributes ignore_above: 1024 level: custom name: action.file.attributes normalize: [] short: Destination file attributes type: keyword Responses.action.file.path: dashed_name: Responses-action-file-path description: Destination file path flat_name: Responses.action.file.path ignore_above: 1024 level: custom name: action.file.path normalize: [] short: Destination file path type: keyword Responses.action.file.reason: dashed_name: Responses-action-file-reason description: Combined USN file modification reason flat_name: Responses.action.file.reason level: custom name: action.file.reason normalize: [] short: Combined USN file modification reason type: long Responses.action.key.actions: dashed_name: Responses-action-key-actions description: Actions taken by Registry Rollback for key flat_name: Responses.action.key.actions ignore_above: 1024 level: custom name: action.key.actions normalize: [] short: Actions taken by Registry Rollback for key type: keyword Responses.action.key.path: dashed_name: Responses-action-key-path description: NT path of registry key recovered by Rollback flat_name: Responses.action.key.path ignore_above: 1024 level: custom name: action.key.path normalize: [] short: NT path of registry key recovered by Rollback type: keyword Responses.action.key.values: dashed_name: Responses-action-key-values description: Values modified flat_name: Responses.action.key.values level: custom name: action.key.values normalize: [] short: Values modified type: object Responses.action.key.values.actions: dashed_name: Responses-action-key-values-actions description: Actions taken by Registry Rollback for value flat_name: Responses.action.key.values.actions ignore_above: 1024 level: custom name: action.key.values.actions normalize: [] short: Actions taken by Registry Rollback for value type: keyword Responses.action.key.values.name: dashed_name: Responses-action-key-values-name description: Value name recovered by Rollback flat_name: Responses.action.key.values.name ignore_above: 1024 level: custom name: action.key.values.name normalize: [] short: Value name recovered by Rollback type: keyword Responses.action.process.message: dashed_name: Responses-action-process-message description: Status message for Process Rollback flat_name: Responses.action.process.message ignore_above: 1024 level: custom name: action.process.message normalize: [] short: Status message for Process Rollback type: keyword Responses.action.process.path: dashed_name: Responses-action-process-path description: Path of process killed by Process Rollback flat_name: Responses.action.process.path ignore_above: 1024 level: custom name: action.process.path normalize: [] short: Path of process killed by Process Rollback type: keyword Responses.action.process.result: dashed_name: Responses-action-process-result description: Result code for Process Rollback flat_name: Responses.action.process.result level: custom name: action.process.result normalize: [] short: Result code for Process Rollback type: long Responses.action.source.attributes: dashed_name: Responses-action-source-attributes description: Source file attributes flat_name: Responses.action.source.attributes ignore_above: 1024 level: custom name: action.source.attributes normalize: [] short: Source file attributes type: keyword Responses.action.source.path: dashed_name: Responses-action-source-path description: Source file path flat_name: Responses.action.source.path ignore_above: 1024 level: custom name: action.source.path normalize: [] short: Source file path type: keyword Responses.action.state: dashed_name: Responses-action-state description: Index of event in events array to use for field lookup flat_name: Responses.action.state level: custom name: action.state normalize: [] short: Index of event in events array to use for field lookup type: long Responses.action.tree: dashed_name: Responses-action-tree description: Indicates whether or not an action was taken against an entire process tree flat_name: Responses.action.tree level: custom name: action.tree normalize: [] short: Indicates whether or not an action was taken against an entire process tree type: boolean Responses.message: dashed_name: Responses-message description: Result message flat_name: Responses.message level: custom name: message normalize: [] norms: false short: Result message type: text Responses.process: dashed_name: Responses-process description: Dictionary representing process information flat_name: Responses.process level: custom name: process normalize: [] short: Dictionary representing process information type: nested Responses.process.entity_id: dashed_name: Responses-process-entity-id description: Entity id of actionable process flat_name: Responses.process.entity_id level: custom name: process.entity_id normalize: [] norms: false short: Entity id of actionable process type: text Responses.process.name: dashed_name: Responses-process-name description: Name of actionable process flat_name: Responses.process.name ignore_above: 1024 level: custom name: process.name normalize: [] short: Name of actionable process type: keyword Responses.process.pid: dashed_name: Responses-process-pid description: pid of actionable process flat_name: Responses.process.pid level: custom name: process.pid normalize: [] short: pid of actionable process type: long Responses.result: dashed_name: Responses-result description: Response action result code flat_name: Responses.result level: custom name: result normalize: [] short: Response action result code type: long destination.geo.city_name: dashed_name: destination-geo-city-name description: City name. example: Montreal flat_name: destination.geo.city_name ignore_above: 1024 level: core name: city_name normalize: [] original_fieldset: geo short: City name. type: keyword destination.geo.continent_code: dashed_name: destination-geo-continent-code description: Two-letter code representing continent's name. example: NA flat_name: destination.geo.continent_code ignore_above: 1024 level: core name: continent_code normalize: [] original_fieldset: geo short: Continent code. type: keyword destination.geo.continent_name: dashed_name: destination-geo-continent-name description: Name of the continent. example: North America flat_name: destination.geo.continent_name ignore_above: 1024 level: core name: continent_name normalize: [] original_fieldset: geo short: Name of the continent. type: keyword destination.geo.country_iso_code: dashed_name: destination-geo-country-iso-code description: Country ISO code. example: CA flat_name: destination.geo.country_iso_code ignore_above: 1024 level: core name: country_iso_code normalize: [] original_fieldset: geo short: Country ISO code. type: keyword destination.geo.country_name: dashed_name: destination-geo-country-name description: Country name. example: Canada flat_name: destination.geo.country_name ignore_above: 1024 level: core name: country_name normalize: [] original_fieldset: geo short: Country name. type: keyword destination.geo.location: dashed_name: destination-geo-location description: Longitude and latitude. example: '{ "lon": -73.614830, "lat": 45.505918 }' flat_name: destination.geo.location level: core name: location normalize: [] original_fieldset: geo short: Longitude and latitude. type: geo_point destination.geo.name: dashed_name: destination-geo-name description: 'User-defined description of a location, at the level of granularity they care about. Could be the name of their data centers, the floor number, if this describes a local physical entity, city names. Not typically used in automated geolocation.' example: boston-dc flat_name: destination.geo.name ignore_above: 1024 level: extended name: name normalize: [] original_fieldset: geo short: User-defined description of a location. type: keyword destination.geo.postal_code: dashed_name: destination-geo-postal-code description: 'Postal code associated with the location. Values appropriate for this field may also be known as a postcode or ZIP code and will vary widely from country to country.' example: 94040 flat_name: destination.geo.postal_code ignore_above: 1024 level: core name: postal_code normalize: [] original_fieldset: geo short: Postal code. type: keyword destination.geo.region_iso_code: dashed_name: destination-geo-region-iso-code description: Region ISO code. example: CA-QC flat_name: destination.geo.region_iso_code ignore_above: 1024 level: core name: region_iso_code normalize: [] original_fieldset: geo short: Region ISO code. type: keyword destination.geo.region_name: dashed_name: destination-geo-region-name description: Region name. example: Quebec flat_name: destination.geo.region_name ignore_above: 1024 level: core name: region_name normalize: [] original_fieldset: geo short: Region name. type: keyword destination.geo.timezone: dashed_name: destination-geo-timezone description: The time zone of the location, such as IANA time zone name. example: America/Argentina/Buenos_Aires flat_name: destination.geo.timezone ignore_above: 1024 level: core name: timezone normalize: [] original_fieldset: geo short: Time zone. type: keyword message: dashed_name: message description: 'For log events the message field contains the log message, optimized for viewing in a log viewer. For structured logs without an original message field, other fields can be concatenated to form a human-readable summary of the event. If multiple messages exist, they can be combined into one message.' example: Hello World flat_name: message level: core name: message normalize: [] short: Log message optimized for viewing in a log viewer. type: match_only_text process.Ext: dashed_name: process-Ext description: Object for all custom defined fields to live in. flat_name: process.Ext level: custom name: Ext normalize: [] short: Object for all custom defined fields to live in. type: object process.Ext.ancestry: dashed_name: process-Ext-ancestry description: An array of entity_ids indicating the ancestors for this event flat_name: process.Ext.ancestry ignore_above: 1024 level: custom name: Ext.ancestry normalize: [] short: An array of entity_ids indicating the ancestors for this event type: keyword process.Ext.api.behaviors: dashed_name: process-Ext-api-behaviors description: "A list of observed behaviors.\n \"cross-process\" - the observed\ \ activity was between two processes\n \"parent-child\" - the observed activity\ \ was between a parent process and its child\n \"native_api\" - a call was made\ \ directly to the Native API rather than the Win32 API\n \"direct_syscall\" -\ \ a syscall instruction originated outside of the Native API layer\n \"proxy_call\"\ \ - the call stack may indicate of a proxied API call to mask the true source\n\ \ \"sensitive_api\" - executable non-image memory is unexpectedly calling a sensitive\ \ API\n \"shellcode\" - suspicious executable non-image memory is calling a sensitive\ \ API\n \"image_hooked\" - an entry in the callstack appears to have been hooked\n\ \ \"image_indirect_call\" - an entry in the callstack was preceded by a call\ \ to a dynamically resolved function\n \"image_rop\" - no call instruction preceded\ \ an entry in the call stack\n \"image_rwx\" - an entry in the callstack is writable\n\ \ \"unbacked_rwx\" - an entry in the callstack is non-image and writable\n \"\ truncated_stack\" - call stack is unexpected truncated due to malicious tampering\ \ or system load\n \"allocate_shellcode\" - a region of non-image executable\ \ memory allocated more executable memory\n \"execute_fluctuation\" - the PAGE_EXECUTE\ \ protection is unexpectedly fluctuating\n \"write_fluctuation\" - the PAGE_WRITE\ \ protection of executable memory is unexpectedly fluctuating\n \"hook_api\"\ \ - a change to the memory protection of a small executable image memory region\ \ was made\n \"hollow_image\" - a change to the memory protection of a large\ \ executable image memory region was made\n \"hook_unbacked\" - a change to the\ \ memory protection of a small executable non-image memory was made\n \"hollow_unbacked\"\ \ - a change to the memory protection of a large executable non-image memory was\ \ made\n \"guarded_code\" - executable memory was unexpectedly marked as PAGE_GUARD\n\ \ \"hidden_code\" - executable memory was unexpectedly marked as PAGE_NOACCESS\n\ \ \"execute_shellcode\" - a region of non-image executable memory was unexpectedly\ \ transferred control\n \"hardware_breakpoint_set\" - a hardware breakpoint was\ \ set\n \"rapid_background_polling\" - a suspicious process which does rapid\ \ input polling via GetAsyncKeyState API was observed\n \"multiple_polling_processes\"\ \ - multiple suspicious processes which do rapid input polling via the GetAsyncKeyState\ \ API were observed\n \"pid_spoofing\" - The acting process details may have\ \ been spoofed to hide the true origin\n \"legacy_api\" - a deprecated or superseded\ \ API was called" example: '[ "cross-process", "rapid_background_polling", "multiple_polling_processes", "native_api", "shellcode" ]' flat_name: process.Ext.api.behaviors ignore_above: 1024 level: custom name: behaviors normalize: [] original_fieldset: api short: A list of observed behaviors. type: keyword process.Ext.api.name: dashed_name: process-Ext-api-name description: The name of the API, usually the name of the function or system call. example: VirtualAlloc flat_name: process.Ext.api.name ignore_above: 1024 level: custom name: name normalize: [] original_fieldset: api short: The name of the API, usually the name of the function or system call. type: keyword process.Ext.api.parameters: dashed_name: process-Ext-api-parameters description: Parameter values passed to the API call. flat_name: process.Ext.api.parameters level: custom name: parameters normalize: [] original_fieldset: api short: Parameter values passed to the API call. type: object process.Ext.api.parameters.app_name: dashed_name: process-Ext-api-parameters-app-name description: The application name requesting the AMSI scan. example: PowerShell flat_name: process.Ext.api.parameters.app_name ignore_above: 1024 level: custom name: parameters.app_name normalize: [] original_fieldset: api short: The application name requesting the AMSI scan. type: keyword process.Ext.api.parameters.content_name: dashed_name: process-Ext-api-parameters-content-name description: The content name, typically a filename, associated with an AMSI scan. example: C:\script.ps1 flat_name: process.Ext.api.parameters.content_name ignore_above: 1024 level: custom name: parameters.content_name normalize: [] original_fieldset: api short: The content name, typically a filename, associated with an AMSI scan. type: keyword process.Ext.api.summary: dashed_name: process-Ext-api-summary description: The summary of the API call and its parameters. example: VirtualAllocEx( file.exe, NULL, 0x42000, COMMIT|RESERVE, RWX ) flat_name: process.Ext.api.summary ignore_above: 1024 level: custom name: summary normalize: [] original_fieldset: api short: The summary of the API call and its parameters. type: keyword process.Ext.code_signature: dashed_name: process-Ext-code-signature description: Nested version of ECS code_signature fieldset. flat_name: process.Ext.code_signature level: custom name: Ext.code_signature normalize: [] short: Nested version of ECS code_signature fieldset. type: nested process.Ext.code_signature.exists: dashed_name: process-Ext-code-signature-exists description: Boolean to capture if a signature is present. example: 'true' flat_name: process.Ext.code_signature.exists level: custom name: Ext.code_signature.exists normalize: [] short: Boolean to capture if a signature is present. type: boolean process.Ext.code_signature.status: dashed_name: process-Ext-code-signature-status description: 'Additional information about the certificate status. This is useful for logging cryptographic errors with the certificate validity or trust status. Leave unpopulated if the validity or trust of the certificate was unchecked.' example: ERROR_UNTRUSTED_ROOT flat_name: process.Ext.code_signature.status ignore_above: 1024 level: custom name: Ext.code_signature.status normalize: [] short: Additional information about the certificate status. type: keyword process.Ext.code_signature.subject_name: dashed_name: process-Ext-code-signature-subject-name description: Subject name of the code signer example: Microsoft Corporation flat_name: process.Ext.code_signature.subject_name ignore_above: 1024 level: custom name: Ext.code_signature.subject_name normalize: [] short: Subject name of the code signer type: keyword process.Ext.code_signature.trusted: dashed_name: process-Ext-code-signature-trusted description: 'Stores the trust status of the certificate chain. Validating the trust of the certificate chain may be complicated, and this field should only be populated by tools that actively check the status.' example: 'true' flat_name: process.Ext.code_signature.trusted level: custom name: Ext.code_signature.trusted normalize: [] short: Stores the trust status of the certificate chain. type: boolean process.Ext.created_suspended: dashed_name: process-Ext-created-suspended description: A heuristic indicating if the CREATE_SUSPENDED flag was passed to the Win32 CreateProcess API. Not valid for direct syscalls. example: 'true' flat_name: process.Ext.created_suspended level: custom name: Ext.created_suspended normalize: [] short: A heuristic indicating if the CREATE_SUSPENDED flag was passed to the Win32 CreateProcess API. type: boolean process.Ext.protection: dashed_name: process-Ext-protection description: Indicates the protection level of this process. Uses the same syntax as Process Explorer. Examples include PsProtectedSignerWinTcb, PsProtectedSignerWinTcb-Light, and PsProtectedSignerWindows-Light. flat_name: process.Ext.protection ignore_above: 1024 level: custom name: Ext.protection normalize: [] short: OS-level protections granted to this process type: keyword process.Ext.token.integrity_level_name: dashed_name: process-Ext-token-integrity-level-name description: Human readable integrity level. example: one of "system", "high", "medium", "low", "untrusted" flat_name: process.Ext.token.integrity_level_name ignore_above: 1024 level: custom name: integrity_level_name normalize: [] original_fieldset: token short: Human readable integrity level. type: keyword process.code_signature.exists: dashed_name: process-code-signature-exists description: Boolean to capture if a signature is present. example: 'true' flat_name: process.code_signature.exists level: core name: exists normalize: [] original_fieldset: code_signature short: Boolean to capture if a signature is present. type: boolean process.code_signature.status: dashed_name: process-code-signature-status description: 'Additional information about the certificate status. This is useful for logging cryptographic errors with the certificate validity or trust status. Leave unpopulated if the validity or trust of the certificate was unchecked.' example: ERROR_UNTRUSTED_ROOT flat_name: process.code_signature.status ignore_above: 1024 level: extended name: status normalize: [] original_fieldset: code_signature short: Additional information about the certificate status. type: keyword process.code_signature.subject_name: dashed_name: process-code-signature-subject-name description: Subject name of the code signer example: Microsoft Corporation flat_name: process.code_signature.subject_name ignore_above: 1024 level: core name: subject_name normalize: [] original_fieldset: code_signature short: Subject name of the code signer type: keyword process.code_signature.trusted: dashed_name: process-code-signature-trusted description: 'Stores the trust status of the certificate chain. Validating the trust of the certificate chain may be complicated, and this field should only be populated by tools that actively check the status.' example: 'true' flat_name: process.code_signature.trusted level: extended name: trusted normalize: [] original_fieldset: code_signature short: Stores the trust status of the certificate chain. type: boolean process.command_line: dashed_name: process-command-line description: 'Full command line that started the process, including the absolute path to the executable, and all arguments. Some arguments may be filtered to protect sensitive information.' example: /usr/bin/ssh -l user 10.0.0.16 flat_name: process.command_line level: extended multi_fields: - flat_name: process.command_line.caseless ignore_above: 1024 name: caseless normalizer: lowercase type: keyword - flat_name: process.command_line.text name: text norms: false type: text name: command_line normalize: [] short: Full command line that started the process. type: wildcard process.entity_id: dashed_name: process-entity-id description: 'Unique identifier for the process. The implementation of this is specified by the data source, but some examples of what could be used here are a process-generated UUID, Sysmon Process GUIDs, or a hash of some uniquely identifying components of a process. Constructing a globally unique identifier is a common practice to mitigate PID reuse as well as to identify a specific process over time, across multiple monitored hosts.' example: c2c455d9f99375d flat_name: process.entity_id ignore_above: 1024 level: extended name: entity_id normalize: [] short: Unique identifier for the process. type: keyword process.executable: dashed_name: process-executable description: Absolute path to the process executable. example: /usr/bin/ssh flat_name: process.executable ignore_above: 1024 level: extended multi_fields: - flat_name: process.executable.caseless ignore_above: 1024 name: caseless normalizer: lowercase type: keyword - flat_name: process.executable.text name: text norms: false type: text name: executable normalize: [] short: Absolute path to the process executable. type: keyword process.name: dashed_name: process-name description: 'Process name. Sometimes called program name or similar.' example: ssh flat_name: process.name ignore_above: 1024 level: extended multi_fields: - flat_name: process.name.caseless ignore_above: 1024 name: caseless normalizer: lowercase type: keyword - flat_name: process.name.text name: text norms: false type: text name: name normalize: [] short: Process name. type: keyword process.pid: dashed_name: process-pid description: Process id. example: 4242 flat_name: process.pid format: string level: core name: pid normalize: [] short: Process id. type: long process.thread.Ext: dashed_name: process-thread-Ext description: Object for all custom defined fields to live in. flat_name: process.thread.Ext level: custom name: thread.Ext normalize: [] short: Object for all custom defined fields to live in. type: object process.thread.Ext.call_stack_final_hook_module: dashed_name: process-thread-Ext-call-stack-final-hook-module description: The module that installed the final API hook in the call stack. flat_name: process.thread.Ext.call_stack_final_hook_module level: custom name: thread.Ext.call_stack_final_hook_module normalize: [] short: The module that installed the final API hook in the call stack. type: nested process.thread.Ext.call_stack_final_hook_module.code_signature: dashed_name: process-thread-Ext-call-stack-final-hook-module-code-signature description: Code signature of the call_stack_final_hook_module. flat_name: process.thread.Ext.call_stack_final_hook_module.code_signature level: custom name: thread.Ext.call_stack_final_hook_module.code_signature normalize: [] short: Code signature of the call_stack_final_hook_module. type: nested process.thread.Ext.call_stack_final_hook_module.code_signature.exists: dashed_name: process-thread-Ext-call-stack-final-hook-module-code-signature-exists description: Boolean to capture if a signature is present. example: 'true' flat_name: process.thread.Ext.call_stack_final_hook_module.code_signature.exists level: custom name: thread.Ext.call_stack_final_hook_module.code_signature.exists normalize: [] short: Boolean to capture if a signature is present. type: boolean process.thread.Ext.call_stack_final_hook_module.code_signature.status: dashed_name: process-thread-Ext-call-stack-final-hook-module-code-signature-status description: 'Additional information about the certificate status. This is useful for logging cryptographic errors with the certificate validity or trust status. Leave unpopulated if the validity or trust of the certificate was unchecked.' example: ERROR_UNTRUSTED_ROOT flat_name: process.thread.Ext.call_stack_final_hook_module.code_signature.status ignore_above: 1024 level: custom name: thread.Ext.call_stack_final_hook_module.code_signature.status normalize: [] short: Additional information about the certificate status. type: keyword process.thread.Ext.call_stack_final_hook_module.code_signature.subject_name: dashed_name: process-thread-Ext-call-stack-final-hook-module-code-signature-subject-name description: Subject name of the code signer example: Microsoft Corporation flat_name: process.thread.Ext.call_stack_final_hook_module.code_signature.subject_name ignore_above: 1024 level: custom name: thread.Ext.call_stack_final_hook_module.code_signature.subject_name normalize: [] short: Subject name of the code signer type: keyword process.thread.Ext.call_stack_final_hook_module.code_signature.trusted: dashed_name: process-thread-Ext-call-stack-final-hook-module-code-signature-trusted description: 'Stores the trust status of the certificate chain. Validating the trust of the certificate chain may be complicated, and this field should only be populated by tools that actively check the status.' example: 'true' flat_name: process.thread.Ext.call_stack_final_hook_module.code_signature.trusted level: custom name: thread.Ext.call_stack_final_hook_module.code_signature.trusted normalize: [] short: Stores the trust status of the certificate chain. type: boolean process.thread.Ext.call_stack_final_hook_module.hash: dashed_name: process-thread-Ext-call-stack-final-hook-module-hash description: Hashes of the call_stack_final_hook_module. flat_name: process.thread.Ext.call_stack_final_hook_module.hash level: custom name: thread.Ext.call_stack_final_hook_module.hash normalize: [] short: Hashes of the call_stack_final_hook_module. type: object process.thread.Ext.call_stack_final_hook_module.hash.sha256: dashed_name: process-thread-Ext-call-stack-final-hook-module-hash-sha256 description: The sha256 of the call_stack_final_hook_module. example: d25ff1e6c6460a7f9de39198d182058c1712726008d187e1953b83abe977e4a0 flat_name: process.thread.Ext.call_stack_final_hook_module.hash.sha256 ignore_above: 1024 level: custom name: thread.Ext.call_stack_final_hook_module.hash.sha256 normalize: [] short: The sha256 of the call_stack_final_hook_module. type: keyword process.thread.Ext.call_stack_final_hook_module.path: dashed_name: process-thread-Ext-call-stack-final-hook-module-path description: The file path of the call_stack_final_hook_module. example: C:\Program Files\Example\example.dll flat_name: process.thread.Ext.call_stack_final_hook_module.path ignore_above: 1024 level: custom name: thread.Ext.call_stack_final_hook_module.path normalize: [] short: The file path of the call_stack_final_hook_module. type: keyword process.thread.Ext.call_stack_final_user_module: dashed_name: process-thread-Ext-call-stack-final-user-module description: The final non-win32 module in the call stack. flat_name: process.thread.Ext.call_stack_final_user_module level: custom name: thread.Ext.call_stack_final_user_module normalize: [] short: The final non-win32 module in the call stack. type: nested process.thread.Ext.call_stack_final_user_module.code_signature: dashed_name: process-thread-Ext-call-stack-final-user-module-code-signature description: Code signature of the call_stack_final_user_module. flat_name: process.thread.Ext.call_stack_final_user_module.code_signature level: custom name: thread.Ext.call_stack_final_user_module.code_signature normalize: [] short: Code signature of the call_stack_final_user_module. type: nested process.thread.Ext.call_stack_final_user_module.code_signature.exists: dashed_name: process-thread-Ext-call-stack-final-user-module-code-signature-exists description: Boolean to capture if a signature is present. example: 'true' flat_name: process.thread.Ext.call_stack_final_user_module.code_signature.exists level: custom name: thread.Ext.call_stack_final_user_module.code_signature.exists normalize: [] short: Boolean to capture if a signature is present. type: boolean process.thread.Ext.call_stack_final_user_module.code_signature.status: dashed_name: process-thread-Ext-call-stack-final-user-module-code-signature-status description: 'Additional information about the certificate status. This is useful for logging cryptographic errors with the certificate validity or trust status. Leave unpopulated if the validity or trust of the certificate was unchecked.' example: ERROR_UNTRUSTED_ROOT flat_name: process.thread.Ext.call_stack_final_user_module.code_signature.status ignore_above: 1024 level: custom name: thread.Ext.call_stack_final_user_module.code_signature.status normalize: [] short: Additional information about the certificate status. type: keyword process.thread.Ext.call_stack_final_user_module.code_signature.subject_name: dashed_name: process-thread-Ext-call-stack-final-user-module-code-signature-subject-name description: Subject name of the code signer example: Microsoft Corporation flat_name: process.thread.Ext.call_stack_final_user_module.code_signature.subject_name ignore_above: 1024 level: custom name: thread.Ext.call_stack_final_user_module.code_signature.subject_name normalize: [] short: Subject name of the code signer type: keyword process.thread.Ext.call_stack_final_user_module.code_signature.trusted: dashed_name: process-thread-Ext-call-stack-final-user-module-code-signature-trusted description: 'Stores the trust status of the certificate chain. Validating the trust of the certificate chain may be complicated, and this field should only be populated by tools that actively check the status.' example: 'true' flat_name: process.thread.Ext.call_stack_final_user_module.code_signature.trusted level: custom name: thread.Ext.call_stack_final_user_module.code_signature.trusted normalize: [] short: Stores the trust status of the certificate chain. type: boolean process.thread.Ext.call_stack_final_user_module.hash: dashed_name: process-thread-Ext-call-stack-final-user-module-hash description: Hashes of the call_stack_final_user_module. flat_name: process.thread.Ext.call_stack_final_user_module.hash level: custom name: thread.Ext.call_stack_final_user_module.hash normalize: [] short: Hashes of the call_stack_final_user_module. type: object process.thread.Ext.call_stack_final_user_module.hash.sha256: dashed_name: process-thread-Ext-call-stack-final-user-module-hash-sha256 description: The sha256 of the call_stack_final_user_module. example: d25ff1e6c6460a7f9de39198d182058c1712726008d187e1953b83abe977e4a0 flat_name: process.thread.Ext.call_stack_final_user_module.hash.sha256 ignore_above: 1024 level: custom name: thread.Ext.call_stack_final_user_module.hash.sha256 normalize: [] short: The sha256 of the call_stack_final_user_module. type: keyword process.thread.Ext.call_stack_final_user_module.name: dashed_name: process-thread-Ext-call-stack-final-user-module-name description: The file name of the call_stack_final_user_module. example: example.dll flat_name: process.thread.Ext.call_stack_final_user_module.name ignore_above: 1024 level: custom name: thread.Ext.call_stack_final_user_module.name normalize: [] short: The file name of the call_stack_final_user_module. type: keyword process.thread.Ext.call_stack_final_user_module.path: dashed_name: process-thread-Ext-call-stack-final-user-module-path description: The file path of the call_stack_final_user_module. example: C:\Program Files\Example\example.dll flat_name: process.thread.Ext.call_stack_final_user_module.path ignore_above: 1024 level: custom name: thread.Ext.call_stack_final_user_module.path normalize: [] short: The file path of the call_stack_final_user_module. type: keyword process.thread.Ext.call_stack_summary: dashed_name: process-thread-Ext-call-stack-summary description: Concatentation of the non-repeated modules in the call stack. example: ntdll.dll|example.exe|kernel32.dll|ntdll.dll flat_name: process.thread.Ext.call_stack_summary ignore_above: 1024 level: custom name: thread.Ext.call_stack_summary normalize: [] short: Concatentation of the non-repeated modules in the call stack. type: keyword process.thread.id: dashed_name: process-thread-id description: Thread ID. example: 4242 flat_name: process.thread.id format: string level: extended name: thread.id normalize: [] short: Thread ID. type: long source.geo.city_name: dashed_name: source-geo-city-name description: City name. example: Montreal flat_name: source.geo.city_name ignore_above: 1024 level: core name: city_name normalize: [] original_fieldset: geo short: City name. type: keyword source.geo.continent_code: dashed_name: source-geo-continent-code description: Two-letter code representing continent's name. example: NA flat_name: source.geo.continent_code ignore_above: 1024 level: core name: continent_code normalize: [] original_fieldset: geo short: Continent code. type: keyword source.geo.continent_name: dashed_name: source-geo-continent-name description: Name of the continent. example: North America flat_name: source.geo.continent_name ignore_above: 1024 level: core name: continent_name normalize: [] original_fieldset: geo short: Name of the continent. type: keyword source.geo.country_iso_code: dashed_name: source-geo-country-iso-code description: Country ISO code. example: CA flat_name: source.geo.country_iso_code ignore_above: 1024 level: core name: country_iso_code normalize: [] original_fieldset: geo short: Country ISO code. type: keyword source.geo.country_name: dashed_name: source-geo-country-name description: Country name. example: Canada flat_name: source.geo.country_name ignore_above: 1024 level: core name: country_name normalize: [] original_fieldset: geo short: Country name. type: keyword source.geo.location: dashed_name: source-geo-location description: Longitude and latitude. example: '{ "lon": -73.614830, "lat": 45.505918 }' flat_name: source.geo.location level: core name: location normalize: [] original_fieldset: geo short: Longitude and latitude. type: geo_point source.geo.name: dashed_name: source-geo-name description: 'User-defined description of a location, at the level of granularity they care about. Could be the name of their data centers, the floor number, if this describes a local physical entity, city names. Not typically used in automated geolocation.' example: boston-dc flat_name: source.geo.name ignore_above: 1024 level: extended name: name normalize: [] original_fieldset: geo short: User-defined description of a location. type: keyword source.geo.postal_code: dashed_name: source-geo-postal-code description: 'Postal code associated with the location. Values appropriate for this field may also be known as a postcode or ZIP code and will vary widely from country to country.' example: 94040 flat_name: source.geo.postal_code ignore_above: 1024 level: core name: postal_code normalize: [] original_fieldset: geo short: Postal code. type: keyword source.geo.region_iso_code: dashed_name: source-geo-region-iso-code description: Region ISO code. example: CA-QC flat_name: source.geo.region_iso_code ignore_above: 1024 level: core name: region_iso_code normalize: [] original_fieldset: geo short: Region ISO code. type: keyword source.geo.region_name: dashed_name: source-geo-region-name description: Region name. example: Quebec flat_name: source.geo.region_name ignore_above: 1024 level: core name: region_name normalize: [] original_fieldset: geo short: Region name. type: keyword source.geo.timezone: dashed_name: source-geo-timezone description: The time zone of the location, such as IANA time zone name. example: America/Argentina/Buenos_Aires flat_name: source.geo.timezone ignore_above: 1024 level: core name: timezone normalize: [] original_fieldset: geo short: Time zone. type: keyword threat.enrichments: dashed_name: threat-enrichments description: A list of associated indicators objects enriching the event, and the context of that association/enrichment. flat_name: threat.enrichments level: extended name: enrichments normalize: - array short: List of objects containing indicators enriching the event. type: nested threat.enrichments.indicator: dashed_name: threat-enrichments-indicator description: Object containing associated indicators enriching the event. flat_name: threat.enrichments.indicator level: extended name: enrichments.indicator normalize: [] short: Object containing indicators enriching the event. type: object threat.enrichments.indicator.file.Ext: dashed_name: threat-enrichments-indicator-file-Ext description: Object for all custom defined fields to live in. flat_name: threat.enrichments.indicator.file.Ext level: custom name: Ext normalize: [] original_fieldset: file short: Object for all custom defined fields to live in. type: object threat.enrichments.indicator.file.Ext.code_signature: dashed_name: threat-enrichments-indicator-file-Ext-code-signature description: Nested version of ECS code_signature fieldset. flat_name: threat.enrichments.indicator.file.Ext.code_signature level: custom name: Ext.code_signature normalize: [] original_fieldset: file short: Nested version of ECS code_signature fieldset. type: nested threat.enrichments.indicator.file.Ext.code_signature.exists: dashed_name: threat-enrichments-indicator-file-Ext-code-signature-exists description: Boolean to capture if a signature is present. example: 'true' flat_name: threat.enrichments.indicator.file.Ext.code_signature.exists level: core name: Ext.code_signature.exists normalize: [] original_fieldset: file short: Boolean to capture if a signature is present. type: boolean threat.enrichments.indicator.file.Ext.code_signature.status: dashed_name: threat-enrichments-indicator-file-Ext-code-signature-status description: 'Additional information about the certificate status. This is useful for logging cryptographic errors with the certificate validity or trust status. Leave unpopulated if the validity or trust of the certificate was unchecked.' example: ERROR_UNTRUSTED_ROOT flat_name: threat.enrichments.indicator.file.Ext.code_signature.status ignore_above: 1024 level: custom name: Ext.code_signature.status normalize: [] original_fieldset: file short: Additional information about the certificate status. type: keyword threat.enrichments.indicator.file.Ext.code_signature.subject_name: dashed_name: threat-enrichments-indicator-file-Ext-code-signature-subject-name description: Subject name of the code signer example: Microsoft Corporation flat_name: threat.enrichments.indicator.file.Ext.code_signature.subject_name ignore_above: 1024 level: core name: Ext.code_signature.subject_name normalize: [] original_fieldset: file short: Subject name of the code signer type: keyword threat.enrichments.indicator.file.Ext.code_signature.trusted: dashed_name: threat-enrichments-indicator-file-Ext-code-signature-trusted description: 'Stores the trust status of the certificate chain. Validating the trust of the certificate chain may be complicated, and this field should only be populated by tools that actively check the status.' example: 'true' flat_name: threat.enrichments.indicator.file.Ext.code_signature.trusted level: custom name: Ext.code_signature.trusted normalize: [] original_fieldset: file short: Stores the trust status of the certificate chain. type: boolean threat.enrichments.indicator.file.Ext.code_signature.valid: dashed_name: threat-enrichments-indicator-file-Ext-code-signature-valid description: 'Boolean to capture if the digital signature is verified against the binary content. Leave unpopulated if a certificate was unchecked.' example: 'true' flat_name: threat.enrichments.indicator.file.Ext.code_signature.valid level: custom name: Ext.code_signature.valid normalize: [] original_fieldset: file short: Boolean to capture if the digital signature is verified against the binary content. type: boolean threat.enrichments.indicator.file.Ext.device.bus_type: dashed_name: threat-enrichments-indicator-file-Ext-device-bus-type description: Bus type of the device, such as Nvme, Usb, FileBackedVirtual,... etc. flat_name: threat.enrichments.indicator.file.Ext.device.bus_type ignore_above: 1024 level: custom name: Ext.device.bus_type normalize: [] original_fieldset: file short: Bus type of the device. type: keyword threat.enrichments.indicator.file.Ext.device.dos_name: dashed_name: threat-enrichments-indicator-file-Ext-device-dos-name description: DOS name of the device. DOS device name is in the format of driver letters such as C:, D:,... flat_name: threat.enrichments.indicator.file.Ext.device.dos_name ignore_above: 1024 level: custom name: Ext.device.dos_name normalize: [] original_fieldset: file short: DOS name of the device. type: keyword threat.enrichments.indicator.file.Ext.device.nt_name: dashed_name: threat-enrichments-indicator-file-Ext-device-nt-name description: 'NT name of the device. NT device name is in the format such as: \Device\HarddiskVolume2' flat_name: threat.enrichments.indicator.file.Ext.device.nt_name ignore_above: 1024 level: custom name: Ext.device.nt_name normalize: [] original_fieldset: file short: NT name of the device. type: keyword threat.enrichments.indicator.file.Ext.device.product_id: dashed_name: threat-enrichments-indicator-file-Ext-device-product-id description: ProductID of the device. It is provided by the vendor of the device if any. flat_name: threat.enrichments.indicator.file.Ext.device.product_id ignore_above: 1024 level: custom name: Ext.device.product_id normalize: [] original_fieldset: file short: ProductID of the device. type: keyword threat.enrichments.indicator.file.Ext.device.serial_number: dashed_name: threat-enrichments-indicator-file-Ext-device-serial-number description: Serial Number of the device. It is provided by the vendor of the device if any. flat_name: threat.enrichments.indicator.file.Ext.device.serial_number ignore_above: 1024 level: custom name: Ext.device.serial_number normalize: [] original_fieldset: file short: Serial Number of the device. type: keyword threat.enrichments.indicator.file.Ext.device.vendor_id: dashed_name: threat-enrichments-indicator-file-Ext-device-vendor-id description: VendorID of the device. It is provided by the vendor of the device. flat_name: threat.enrichments.indicator.file.Ext.device.vendor_id ignore_above: 1024 level: custom name: Ext.device.vendor_id normalize: [] original_fieldset: file short: VendorID of the device. type: keyword threat.enrichments.indicator.file.Ext.entropy: dashed_name: threat-enrichments-indicator-file-Ext-entropy description: Entropy calculation of file's header and footer used to check file integrity. flat_name: threat.enrichments.indicator.file.Ext.entropy level: custom name: Ext.entropy normalize: [] original_fieldset: file short: File entropy value type: double threat.enrichments.indicator.file.Ext.entry_modified: dashed_name: threat-enrichments-indicator-file-Ext-entry-modified description: Time of last status change. See `st_ctim` member of `struct stat`. flat_name: threat.enrichments.indicator.file.Ext.entry_modified level: custom name: Ext.entry_modified normalize: [] original_fieldset: file short: Time of last status change. See `st_ctim` member of `struct stat`. type: double threat.enrichments.indicator.file.Ext.header_bytes: dashed_name: threat-enrichments-indicator-file-Ext-header-bytes description: First 16 bytes of file used to check file integrity. flat_name: threat.enrichments.indicator.file.Ext.header_bytes ignore_above: 1024 level: custom name: Ext.header_bytes normalize: [] original_fieldset: file short: Header bytes type: keyword threat.enrichments.indicator.file.Ext.header_data: dashed_name: threat-enrichments-indicator-file-Ext-header-data description: First 16 bytes of file used to check file integrity. flat_name: threat.enrichments.indicator.file.Ext.header_data level: custom name: Ext.header_data normalize: [] norms: false original_fieldset: file short: Header data type: text threat.enrichments.indicator.file.Ext.malware_classification.features.data.buffer: dashed_name: threat-enrichments-indicator-file-Ext-malware-classification-features-data-buffer description: The features extracted from this file and evaluated by the model. Usually an array of floats. Likely zlib-encoded. flat_name: threat.enrichments.indicator.file.Ext.malware_classification.features.data.buffer ignore_above: 1024 level: custom name: features.data.buffer normalize: [] original_fieldset: malware_classification short: The features extracted from this file and evaluated by the model. Usually an array of floats. Likely zlib-encoded. type: keyword threat.enrichments.indicator.file.Ext.malware_classification.features.data.decompressed_size: dashed_name: threat-enrichments-indicator-file-Ext-malware-classification-features-data-decompressed-size description: The decompressed size of buffer. flat_name: threat.enrichments.indicator.file.Ext.malware_classification.features.data.decompressed_size level: custom name: features.data.decompressed_size normalize: [] original_fieldset: malware_classification short: The decompressed size of buffer. type: integer threat.enrichments.indicator.file.Ext.malware_classification.features.data.encoding: dashed_name: threat-enrichments-indicator-file-Ext-malware-classification-features-data-encoding description: The encoding of buffer (e.g. zlib). flat_name: threat.enrichments.indicator.file.Ext.malware_classification.features.data.encoding ignore_above: 1024 level: custom name: features.data.encoding normalize: [] original_fieldset: malware_classification short: The encoding of buffer (e.g. zlib). type: keyword threat.enrichments.indicator.file.Ext.malware_classification.identifier: dashed_name: threat-enrichments-indicator-file-Ext-malware-classification-identifier description: The model's unique identifier. flat_name: threat.enrichments.indicator.file.Ext.malware_classification.identifier ignore_above: 1024 level: custom name: identifier normalize: [] original_fieldset: malware_classification short: The model's unique identifier. type: keyword threat.enrichments.indicator.file.Ext.malware_classification.score: dashed_name: threat-enrichments-indicator-file-Ext-malware-classification-score description: The score produced by the classification model. flat_name: threat.enrichments.indicator.file.Ext.malware_classification.score level: custom name: score normalize: [] original_fieldset: malware_classification short: The score produced by the classification model. type: double threat.enrichments.indicator.file.Ext.malware_classification.threshold: dashed_name: threat-enrichments-indicator-file-Ext-malware-classification-threshold description: The score threshold for the model. Files that score above this threshold are considered malicious. flat_name: threat.enrichments.indicator.file.Ext.malware_classification.threshold level: custom name: threshold normalize: [] original_fieldset: malware_classification short: The score threshold for the model. Files that score above this threshold are considered malicious. type: double threat.enrichments.indicator.file.Ext.malware_classification.upx_packed: dashed_name: threat-enrichments-indicator-file-Ext-malware-classification-upx-packed description: Whether UPX packing was detected. flat_name: threat.enrichments.indicator.file.Ext.malware_classification.upx_packed level: custom name: upx_packed normalize: [] original_fieldset: malware_classification short: Whether UPX packing was detected. type: boolean threat.enrichments.indicator.file.Ext.malware_classification.version: dashed_name: threat-enrichments-indicator-file-Ext-malware-classification-version description: The version of the model used. flat_name: threat.enrichments.indicator.file.Ext.malware_classification.version ignore_above: 1024 level: custom name: version normalize: [] original_fieldset: malware_classification short: The version of the model used. type: keyword threat.enrichments.indicator.file.Ext.malware_signature: dashed_name: threat-enrichments-indicator-file-Ext-malware-signature description: Nested version of malware_signature fieldset. flat_name: threat.enrichments.indicator.file.Ext.malware_signature level: custom name: Ext.malware_signature normalize: [] original_fieldset: file short: Nested version of malware_signature fieldset. type: nested threat.enrichments.indicator.file.Ext.malware_signature.all_names: dashed_name: threat-enrichments-indicator-file-Ext-malware-signature-all-names description: The concatenated names of all yara signatures flat_name: threat.enrichments.indicator.file.Ext.malware_signature.all_names level: custom name: Ext.malware_signature.all_names normalize: [] norms: false original_fieldset: file short: Yara signature names type: text threat.enrichments.indicator.file.Ext.malware_signature.identifier: dashed_name: threat-enrichments-indicator-file-Ext-malware-signature-identifier description: Malware artifact identifier. flat_name: threat.enrichments.indicator.file.Ext.malware_signature.identifier level: custom name: Ext.malware_signature.identifier normalize: [] norms: false original_fieldset: file short: Malware artifact identifier type: text threat.enrichments.indicator.file.Ext.malware_signature.primary: dashed_name: threat-enrichments-indicator-file-Ext-malware-signature-primary description: Primary malware signature match. flat_name: threat.enrichments.indicator.file.Ext.malware_signature.primary level: custom name: Ext.malware_signature.primary normalize: [] original_fieldset: file short: Primary malware signature match type: nested threat.enrichments.indicator.file.Ext.malware_signature.primary.matches: dashed_name: threat-enrichments-indicator-file-Ext-malware-signature-primary-matches description: An array of bytes representing yara signature matches flat_name: threat.enrichments.indicator.file.Ext.malware_signature.primary.matches level: custom name: Ext.malware_signature.primary.matches normalize: - array original_fieldset: file short: signature match bytes type: nested threat.enrichments.indicator.file.Ext.malware_signature.primary.signature: dashed_name: threat-enrichments-indicator-file-Ext-malware-signature-primary-signature description: Primary malware signature match. flat_name: threat.enrichments.indicator.file.Ext.malware_signature.primary.signature level: custom name: Ext.malware_signature.primary.signature normalize: [] original_fieldset: file short: Primary malware signature match type: nested threat.enrichments.indicator.file.Ext.malware_signature.primary.signature.hash: dashed_name: threat-enrichments-indicator-file-Ext-malware-signature-primary-signature-hash description: Primary malware signature hash. flat_name: threat.enrichments.indicator.file.Ext.malware_signature.primary.signature.hash level: custom name: Ext.malware_signature.primary.signature.hash normalize: [] original_fieldset: file short: Primary malware signature hash type: nested threat.enrichments.indicator.file.Ext.malware_signature.primary.signature.hash.sha256: dashed_name: threat-enrichments-indicator-file-Ext-malware-signature-primary-signature-hash-sha256 description: Primary malware signature sha256. flat_name: threat.enrichments.indicator.file.Ext.malware_signature.primary.signature.hash.sha256 ignore_above: 1024 level: custom name: Ext.malware_signature.primary.signature.hash.sha256 normalize: [] original_fieldset: file short: Primary malware signature sha256 type: keyword threat.enrichments.indicator.file.Ext.malware_signature.primary.signature.id: dashed_name: threat-enrichments-indicator-file-Ext-malware-signature-primary-signature-id description: Primary malware signature id. flat_name: threat.enrichments.indicator.file.Ext.malware_signature.primary.signature.id ignore_above: 1024 level: custom name: Ext.malware_signature.primary.signature.id normalize: [] original_fieldset: file short: Primary malware signature id type: keyword threat.enrichments.indicator.file.Ext.malware_signature.primary.signature.name: dashed_name: threat-enrichments-indicator-file-Ext-malware-signature-primary-signature-name description: Primary malware signature name. flat_name: threat.enrichments.indicator.file.Ext.malware_signature.primary.signature.name ignore_above: 1024 level: custom name: Ext.malware_signature.primary.signature.name normalize: [] original_fieldset: file short: Primary malware signature name type: keyword threat.enrichments.indicator.file.Ext.malware_signature.secondary: dashed_name: threat-enrichments-indicator-file-Ext-malware-signature-secondary description: An array of malware signature matches flat_name: threat.enrichments.indicator.file.Ext.malware_signature.secondary level: custom name: Ext.malware_signature.secondary normalize: - array original_fieldset: file short: secondary signature matches type: nested threat.enrichments.indicator.file.Ext.malware_signature.version: dashed_name: threat-enrichments-indicator-file-Ext-malware-signature-version description: Primary malware signature version. flat_name: threat.enrichments.indicator.file.Ext.malware_signature.version ignore_above: 1024 level: custom name: Ext.malware_signature.version normalize: [] original_fieldset: file short: Primary malware signature version type: keyword threat.enrichments.indicator.file.Ext.monotonic_id: dashed_name: threat-enrichments-indicator-file-Ext-monotonic-id description: File event monotonic ID. flat_name: threat.enrichments.indicator.file.Ext.monotonic_id level: custom name: Ext.monotonic_id normalize: [] original_fieldset: file short: File event monotonic ID type: unsigned_long threat.enrichments.indicator.file.Ext.original: dashed_name: threat-enrichments-indicator-file-Ext-original description: Original file information during a modification event. flat_name: threat.enrichments.indicator.file.Ext.original level: custom name: Ext.original normalize: [] original_fieldset: file short: Original file information during a modification event. type: object threat.enrichments.indicator.file.Ext.original.gid: dashed_name: threat-enrichments-indicator-file-Ext-original-gid description: Primary group ID (GID) of the file. example: '1001' flat_name: threat.enrichments.indicator.file.Ext.original.gid ignore_above: 1024 level: custom name: Ext.original.gid normalize: [] original_fieldset: file short: Primary group ID (GID) of the file. type: keyword threat.enrichments.indicator.file.Ext.original.group: dashed_name: threat-enrichments-indicator-file-Ext-original-group description: Primary group name of the file. example: alice flat_name: threat.enrichments.indicator.file.Ext.original.group ignore_above: 1024 level: custom name: Ext.original.group normalize: [] original_fieldset: file short: Primary group name of the file. type: keyword threat.enrichments.indicator.file.Ext.original.mode: dashed_name: threat-enrichments-indicator-file-Ext-original-mode description: Original file mode prior to a modification event flat_name: threat.enrichments.indicator.file.Ext.original.mode ignore_above: 1024 level: custom name: Ext.original.mode normalize: [] original_fieldset: file short: Original file mode prior to a modification event type: keyword threat.enrichments.indicator.file.Ext.original.name: dashed_name: threat-enrichments-indicator-file-Ext-original-name description: Original file name prior to a modification event flat_name: threat.enrichments.indicator.file.Ext.original.name ignore_above: 1024 level: custom name: Ext.original.name normalize: [] original_fieldset: file short: Original file name prior to a modification event type: keyword threat.enrichments.indicator.file.Ext.original.owner: dashed_name: threat-enrichments-indicator-file-Ext-original-owner description: File owner's username. example: alice flat_name: threat.enrichments.indicator.file.Ext.original.owner ignore_above: 1024 level: custom name: Ext.original.owner normalize: [] original_fieldset: file short: File owner's username. type: keyword threat.enrichments.indicator.file.Ext.original.path: dashed_name: threat-enrichments-indicator-file-Ext-original-path description: Original file path prior to a modification event flat_name: threat.enrichments.indicator.file.Ext.original.path ignore_above: 1024 level: custom name: Ext.original.path normalize: [] original_fieldset: file short: Original file path prior to a modification event type: keyword threat.enrichments.indicator.file.Ext.original.uid: dashed_name: threat-enrichments-indicator-file-Ext-original-uid description: The user ID (UID) or security identifier (SID) of the file owner. example: '1001' flat_name: threat.enrichments.indicator.file.Ext.original.uid ignore_above: 1024 level: custom name: Ext.original.uid normalize: [] original_fieldset: file short: The user ID (UID) or security identifier (SID) of the file owner. type: keyword threat.enrichments.indicator.file.Ext.quarantine_message: dashed_name: threat-enrichments-indicator-file-Ext-quarantine-message description: Message describing quarantine results. flat_name: threat.enrichments.indicator.file.Ext.quarantine_message ignore_above: 1024 level: custom name: Ext.quarantine_message normalize: [] original_fieldset: file short: Message describing quarantine results. type: keyword threat.enrichments.indicator.file.Ext.quarantine_path: dashed_name: threat-enrichments-indicator-file-Ext-quarantine-path description: Path on endpoint the quarantined file was originally. flat_name: threat.enrichments.indicator.file.Ext.quarantine_path ignore_above: 1024 level: custom name: Ext.quarantine_path normalize: [] original_fieldset: file short: Path on endpoint the quarantined file was originally. type: keyword threat.enrichments.indicator.file.Ext.quarantine_result: dashed_name: threat-enrichments-indicator-file-Ext-quarantine-result description: Boolean representing whether or not file quarantine succeeded. flat_name: threat.enrichments.indicator.file.Ext.quarantine_result level: custom name: Ext.quarantine_result normalize: [] original_fieldset: file short: Boolean representing whether or not file quarantine succeeded. type: boolean threat.enrichments.indicator.file.Ext.temp_file_path: dashed_name: threat-enrichments-indicator-file-Ext-temp-file-path description: Path on endpoint where a copy of the file is being stored. Used to make ephemeral files retrievable. flat_name: threat.enrichments.indicator.file.Ext.temp_file_path ignore_above: 1024 level: custom name: Ext.temp_file_path normalize: [] original_fieldset: file short: Path on endpoint where a copy of the file is being stored. Used to make ephemeral files retrievable. type: keyword threat.enrichments.indicator.file.Ext.windows: dashed_name: threat-enrichments-indicator-file-Ext-windows description: Platform-specific Windows fields flat_name: threat.enrichments.indicator.file.Ext.windows level: custom name: Ext.windows normalize: [] original_fieldset: file short: Platform-specific Windows fields type: object threat.enrichments.indicator.file.Ext.windows.zone_identifier: dashed_name: threat-enrichments-indicator-file-Ext-windows-zone-identifier description: Windows zone identifier for a file flat_name: threat.enrichments.indicator.file.Ext.windows.zone_identifier ignore_above: 1024 level: custom name: Ext.windows.zone_identifier normalize: [] original_fieldset: file short: Windows zone identifier for a file type: keyword threat.enrichments.indicator.file.accessed: dashed_name: threat-enrichments-indicator-file-accessed description: 'Last time the file was accessed. Note that not all filesystems keep track of access time.' flat_name: threat.enrichments.indicator.file.accessed level: extended name: accessed normalize: [] original_fieldset: file short: Last time the file was accessed. type: date threat.enrichments.indicator.file.attributes: dashed_name: threat-enrichments-indicator-file-attributes description: 'Array of file attributes. Attributes names will vary by platform. Here''s a non-exhaustive list of values that are expected in this field: archive, compressed, directory, encrypted, execute, hidden, read, readonly, system, write.' example: '["readonly", "system"]' flat_name: threat.enrichments.indicator.file.attributes ignore_above: 1024 level: extended name: attributes normalize: - array original_fieldset: file short: Array of file attributes. type: keyword threat.enrichments.indicator.file.code_signature.exists: dashed_name: threat-enrichments-indicator-file-code-signature-exists description: Boolean to capture if a signature is present. example: 'true' flat_name: threat.enrichments.indicator.file.code_signature.exists level: core name: exists normalize: [] original_fieldset: code_signature short: Boolean to capture if a signature is present. type: boolean threat.enrichments.indicator.file.code_signature.signing_id: dashed_name: threat-enrichments-indicator-file-code-signature-signing-id description: 'The identifier used to sign the process. This is used to identify the application manufactured by a software vendor. The field is relevant to Apple *OS only.' example: com.apple.xpc.proxy flat_name: threat.enrichments.indicator.file.code_signature.signing_id ignore_above: 1024 level: extended name: signing_id normalize: [] original_fieldset: code_signature short: The identifier used to sign the process. type: keyword threat.enrichments.indicator.file.code_signature.status: dashed_name: threat-enrichments-indicator-file-code-signature-status description: 'Additional information about the certificate status. This is useful for logging cryptographic errors with the certificate validity or trust status. Leave unpopulated if the validity or trust of the certificate was unchecked.' example: ERROR_UNTRUSTED_ROOT flat_name: threat.enrichments.indicator.file.code_signature.status ignore_above: 1024 level: extended name: status normalize: [] original_fieldset: code_signature short: Additional information about the certificate status. type: keyword threat.enrichments.indicator.file.code_signature.subject_name: dashed_name: threat-enrichments-indicator-file-code-signature-subject-name description: Subject name of the code signer example: Microsoft Corporation flat_name: threat.enrichments.indicator.file.code_signature.subject_name ignore_above: 1024 level: core name: subject_name normalize: [] original_fieldset: code_signature short: Subject name of the code signer type: keyword threat.enrichments.indicator.file.code_signature.team_id: dashed_name: threat-enrichments-indicator-file-code-signature-team-id description: 'The team identifier used to sign the process. This is used to identify the team or vendor of a software product. The field is relevant to Apple *OS only.' example: EQHXZ8M8AV flat_name: threat.enrichments.indicator.file.code_signature.team_id ignore_above: 1024 level: extended name: team_id normalize: [] original_fieldset: code_signature short: The team identifier used to sign the process. type: keyword threat.enrichments.indicator.file.code_signature.trusted: dashed_name: threat-enrichments-indicator-file-code-signature-trusted description: 'Stores the trust status of the certificate chain. Validating the trust of the certificate chain may be complicated, and this field should only be populated by tools that actively check the status.' example: 'true' flat_name: threat.enrichments.indicator.file.code_signature.trusted level: extended name: trusted normalize: [] original_fieldset: code_signature short: Stores the trust status of the certificate chain. type: boolean threat.enrichments.indicator.file.code_signature.valid: dashed_name: threat-enrichments-indicator-file-code-signature-valid description: 'Boolean to capture if the digital signature is verified against the binary content. Leave unpopulated if a certificate was unchecked.' example: 'true' flat_name: threat.enrichments.indicator.file.code_signature.valid level: extended name: valid normalize: [] original_fieldset: code_signature short: Boolean to capture if the digital signature is verified against the binary content. type: boolean threat.enrichments.indicator.file.created: dashed_name: threat-enrichments-indicator-file-created description: 'File creation time. Note that not all filesystems store the creation time.' flat_name: threat.enrichments.indicator.file.created level: extended name: created normalize: [] original_fieldset: file short: File creation time. type: date threat.enrichments.indicator.file.ctime: dashed_name: threat-enrichments-indicator-file-ctime description: 'Last time the file attributes or metadata changed. Note that changes to the file content will update `mtime`. This implies `ctime` will be adjusted at the same time, since `mtime` is an attribute of the file.' flat_name: threat.enrichments.indicator.file.ctime level: extended name: ctime normalize: [] original_fieldset: file short: Last time the file attributes or metadata changed. type: date threat.enrichments.indicator.file.device: dashed_name: threat-enrichments-indicator-file-device description: Device that is the source of the file. example: sda flat_name: threat.enrichments.indicator.file.device ignore_above: 1024 level: extended name: device normalize: [] original_fieldset: file short: Device that is the source of the file. type: keyword threat.enrichments.indicator.file.directory: dashed_name: threat-enrichments-indicator-file-directory description: Directory where the file is located. It should include the drive letter, when appropriate. example: /home/alice flat_name: threat.enrichments.indicator.file.directory ignore_above: 1024 level: extended name: directory normalize: [] original_fieldset: file short: Directory where the file is located. type: keyword threat.enrichments.indicator.file.drive_letter: dashed_name: threat-enrichments-indicator-file-drive-letter description: 'Drive letter where the file is located. This field is only relevant on Windows. The value should be uppercase, and not include the colon.' example: C flat_name: threat.enrichments.indicator.file.drive_letter ignore_above: 1 level: extended name: drive_letter normalize: [] original_fieldset: file short: Drive letter where the file is located. type: keyword threat.enrichments.indicator.file.elf.architecture: dashed_name: threat-enrichments-indicator-file-elf-architecture description: Machine architecture of the ELF file. example: x86-64 flat_name: threat.enrichments.indicator.file.elf.architecture ignore_above: 1024 level: extended name: architecture normalize: [] original_fieldset: elf short: Machine architecture of the ELF file. type: keyword threat.enrichments.indicator.file.elf.byte_order: dashed_name: threat-enrichments-indicator-file-elf-byte-order description: Byte sequence of ELF file. example: Little Endian flat_name: threat.enrichments.indicator.file.elf.byte_order ignore_above: 1024 level: extended name: byte_order normalize: [] original_fieldset: elf short: Byte sequence of ELF file. type: keyword threat.enrichments.indicator.file.elf.cpu_type: dashed_name: threat-enrichments-indicator-file-elf-cpu-type description: CPU type of the ELF file. example: Intel flat_name: threat.enrichments.indicator.file.elf.cpu_type ignore_above: 1024 level: extended name: cpu_type normalize: [] original_fieldset: elf short: CPU type of the ELF file. type: keyword threat.enrichments.indicator.file.elf.creation_date: dashed_name: threat-enrichments-indicator-file-elf-creation-date description: Extracted when possible from the file's metadata. Indicates when it was built or compiled. It can also be faked by malware creators. flat_name: threat.enrichments.indicator.file.elf.creation_date level: extended name: creation_date normalize: [] original_fieldset: elf short: Build or compile date. type: date threat.enrichments.indicator.file.elf.exports: dashed_name: threat-enrichments-indicator-file-elf-exports description: List of exported element names and types. flat_name: threat.enrichments.indicator.file.elf.exports level: extended name: exports normalize: - array original_fieldset: elf short: List of exported element names and types. type: flattened threat.enrichments.indicator.file.elf.go_import_hash: dashed_name: threat-enrichments-indicator-file-elf-go-import-hash description: 'A hash of the Go language imports in an ELF file excluding standard library imports. An import hash can be used to fingerprint binaries even after recompilation or other code-level transformations have occurred, which would change more traditional hash values. The algorithm used to calculate the Go symbol hash and a reference implementation are available [here](https://github.com/elastic/toutoumomoma).' example: 10bddcb4cee42080f76c88d9ff964491 flat_name: threat.enrichments.indicator.file.elf.go_import_hash ignore_above: 1024 level: extended name: go_import_hash normalize: [] original_fieldset: elf short: A hash of the Go language imports in an ELF file. type: keyword threat.enrichments.indicator.file.elf.go_imports: dashed_name: threat-enrichments-indicator-file-elf-go-imports description: List of imported Go language element names and types. flat_name: threat.enrichments.indicator.file.elf.go_imports level: extended name: go_imports normalize: [] original_fieldset: elf short: List of imported Go language element names and types. type: flattened threat.enrichments.indicator.file.elf.go_imports_names_entropy: dashed_name: threat-enrichments-indicator-file-elf-go-imports-names-entropy description: Shannon entropy calculation from the list of Go imports. flat_name: threat.enrichments.indicator.file.elf.go_imports_names_entropy format: number level: extended name: go_imports_names_entropy normalize: [] original_fieldset: elf short: Shannon entropy calculation from the list of Go imports. type: long threat.enrichments.indicator.file.elf.go_imports_names_var_entropy: dashed_name: threat-enrichments-indicator-file-elf-go-imports-names-var-entropy description: Variance for Shannon entropy calculation from the list of Go imports. flat_name: threat.enrichments.indicator.file.elf.go_imports_names_var_entropy format: number level: extended name: go_imports_names_var_entropy normalize: [] original_fieldset: elf short: Variance for Shannon entropy calculation from the list of Go imports. type: long threat.enrichments.indicator.file.elf.go_stripped: dashed_name: threat-enrichments-indicator-file-elf-go-stripped description: Set to true if the file is a Go executable that has had its symbols stripped or obfuscated and false if an unobfuscated Go executable. flat_name: threat.enrichments.indicator.file.elf.go_stripped level: extended name: go_stripped normalize: [] original_fieldset: elf short: Whether the file is a stripped or obfuscated Go executable. type: boolean threat.enrichments.indicator.file.elf.header.abi_version: dashed_name: threat-enrichments-indicator-file-elf-header-abi-version description: Version of the ELF Application Binary Interface (ABI). flat_name: threat.enrichments.indicator.file.elf.header.abi_version ignore_above: 1024 level: extended name: header.abi_version normalize: [] original_fieldset: elf short: Version of the ELF Application Binary Interface (ABI). type: keyword threat.enrichments.indicator.file.elf.header.class: dashed_name: threat-enrichments-indicator-file-elf-header-class description: Header class of the ELF file. flat_name: threat.enrichments.indicator.file.elf.header.class ignore_above: 1024 level: extended name: header.class normalize: [] original_fieldset: elf short: Header class of the ELF file. type: keyword threat.enrichments.indicator.file.elf.header.data: dashed_name: threat-enrichments-indicator-file-elf-header-data description: Data table of the ELF header. flat_name: threat.enrichments.indicator.file.elf.header.data ignore_above: 1024 level: extended name: header.data normalize: [] original_fieldset: elf short: Data table of the ELF header. type: keyword threat.enrichments.indicator.file.elf.header.entrypoint: dashed_name: threat-enrichments-indicator-file-elf-header-entrypoint description: Header entrypoint of the ELF file. flat_name: threat.enrichments.indicator.file.elf.header.entrypoint format: string level: extended name: header.entrypoint normalize: [] original_fieldset: elf short: Header entrypoint of the ELF file. type: long threat.enrichments.indicator.file.elf.header.object_version: dashed_name: threat-enrichments-indicator-file-elf-header-object-version description: '"0x1" for original ELF files.' flat_name: threat.enrichments.indicator.file.elf.header.object_version ignore_above: 1024 level: extended name: header.object_version normalize: [] original_fieldset: elf short: '"0x1" for original ELF files.' type: keyword threat.enrichments.indicator.file.elf.header.os_abi: dashed_name: threat-enrichments-indicator-file-elf-header-os-abi description: Application Binary Interface (ABI) of the Linux OS. flat_name: threat.enrichments.indicator.file.elf.header.os_abi ignore_above: 1024 level: extended name: header.os_abi normalize: [] original_fieldset: elf short: Application Binary Interface (ABI) of the Linux OS. type: keyword threat.enrichments.indicator.file.elf.header.type: dashed_name: threat-enrichments-indicator-file-elf-header-type description: Header type of the ELF file. flat_name: threat.enrichments.indicator.file.elf.header.type ignore_above: 1024 level: extended name: header.type normalize: [] original_fieldset: elf short: Header type of the ELF file. type: keyword threat.enrichments.indicator.file.elf.header.version: dashed_name: threat-enrichments-indicator-file-elf-header-version description: Version of the ELF header. flat_name: threat.enrichments.indicator.file.elf.header.version ignore_above: 1024 level: extended name: header.version normalize: [] original_fieldset: elf short: Version of the ELF header. type: keyword threat.enrichments.indicator.file.elf.import_hash: dashed_name: threat-enrichments-indicator-file-elf-import-hash description: 'A hash of the imports in an ELF file. An import hash can be used to fingerprint binaries even after recompilation or other code-level transformations have occurred, which would change more traditional hash values. This is an ELF implementation of the Windows PE imphash.' example: d41d8cd98f00b204e9800998ecf8427e flat_name: threat.enrichments.indicator.file.elf.import_hash ignore_above: 1024 level: extended name: import_hash normalize: [] original_fieldset: elf short: A hash of the imports in an ELF file. type: keyword threat.enrichments.indicator.file.elf.imports: dashed_name: threat-enrichments-indicator-file-elf-imports description: List of imported element names and types. flat_name: threat.enrichments.indicator.file.elf.imports level: extended name: imports normalize: - array original_fieldset: elf short: List of imported element names and types. type: flattened threat.enrichments.indicator.file.elf.imports_names_entropy: dashed_name: threat-enrichments-indicator-file-elf-imports-names-entropy description: Shannon entropy calculation from the list of imported element names and types. flat_name: threat.enrichments.indicator.file.elf.imports_names_entropy format: number level: extended name: imports_names_entropy normalize: [] original_fieldset: elf short: Shannon entropy calculation from the list of imported element names and types. type: long threat.enrichments.indicator.file.elf.imports_names_var_entropy: dashed_name: threat-enrichments-indicator-file-elf-imports-names-var-entropy description: Variance for Shannon entropy calculation from the list of imported element names and types. flat_name: threat.enrichments.indicator.file.elf.imports_names_var_entropy format: number level: extended name: imports_names_var_entropy normalize: [] original_fieldset: elf short: Variance for Shannon entropy calculation from the list of imported element names and types. type: long threat.enrichments.indicator.file.elf.sections: dashed_name: threat-enrichments-indicator-file-elf-sections description: 'An array containing an object for each section of the ELF file. The keys that should be present in these objects are defined by sub-fields underneath `elf.sections.*`.' flat_name: threat.enrichments.indicator.file.elf.sections level: extended name: sections normalize: - array original_fieldset: elf short: Section information of the ELF file. type: nested threat.enrichments.indicator.file.elf.sections.chi2: dashed_name: threat-enrichments-indicator-file-elf-sections-chi2 description: Chi-square probability distribution of the section. flat_name: threat.enrichments.indicator.file.elf.sections.chi2 format: number level: extended name: sections.chi2 normalize: [] original_fieldset: elf short: Chi-square probability distribution of the section. type: long threat.enrichments.indicator.file.elf.sections.entropy: dashed_name: threat-enrichments-indicator-file-elf-sections-entropy description: Shannon entropy calculation from the section. flat_name: threat.enrichments.indicator.file.elf.sections.entropy format: number level: extended name: sections.entropy normalize: [] original_fieldset: elf short: Shannon entropy calculation from the section. type: long threat.enrichments.indicator.file.elf.sections.flags: dashed_name: threat-enrichments-indicator-file-elf-sections-flags description: ELF Section List flags. flat_name: threat.enrichments.indicator.file.elf.sections.flags ignore_above: 1024 level: extended name: sections.flags normalize: [] original_fieldset: elf short: ELF Section List flags. type: keyword threat.enrichments.indicator.file.elf.sections.name: dashed_name: threat-enrichments-indicator-file-elf-sections-name description: ELF Section List name. flat_name: threat.enrichments.indicator.file.elf.sections.name ignore_above: 1024 level: extended name: sections.name normalize: [] original_fieldset: elf short: ELF Section List name. type: keyword threat.enrichments.indicator.file.elf.sections.physical_offset: dashed_name: threat-enrichments-indicator-file-elf-sections-physical-offset description: ELF Section List offset. flat_name: threat.enrichments.indicator.file.elf.sections.physical_offset ignore_above: 1024 level: extended name: sections.physical_offset normalize: [] original_fieldset: elf short: ELF Section List offset. type: keyword threat.enrichments.indicator.file.elf.sections.physical_size: dashed_name: threat-enrichments-indicator-file-elf-sections-physical-size description: ELF Section List physical size. flat_name: threat.enrichments.indicator.file.elf.sections.physical_size format: bytes level: extended name: sections.physical_size normalize: [] original_fieldset: elf short: ELF Section List physical size. type: long threat.enrichments.indicator.file.elf.sections.type: dashed_name: threat-enrichments-indicator-file-elf-sections-type description: ELF Section List type. flat_name: threat.enrichments.indicator.file.elf.sections.type ignore_above: 1024 level: extended name: sections.type normalize: [] original_fieldset: elf short: ELF Section List type. type: keyword threat.enrichments.indicator.file.elf.sections.var_entropy: dashed_name: threat-enrichments-indicator-file-elf-sections-var-entropy description: Variance for Shannon entropy calculation from the section. flat_name: threat.enrichments.indicator.file.elf.sections.var_entropy format: number level: extended name: sections.var_entropy normalize: [] original_fieldset: elf short: Variance for Shannon entropy calculation from the section. type: long threat.enrichments.indicator.file.elf.sections.virtual_address: dashed_name: threat-enrichments-indicator-file-elf-sections-virtual-address description: ELF Section List virtual address. flat_name: threat.enrichments.indicator.file.elf.sections.virtual_address format: string level: extended name: sections.virtual_address normalize: [] original_fieldset: elf short: ELF Section List virtual address. type: long threat.enrichments.indicator.file.elf.sections.virtual_size: dashed_name: threat-enrichments-indicator-file-elf-sections-virtual-size description: ELF Section List virtual size. flat_name: threat.enrichments.indicator.file.elf.sections.virtual_size format: string level: extended name: sections.virtual_size normalize: [] original_fieldset: elf short: ELF Section List virtual size. type: long threat.enrichments.indicator.file.elf.segments: dashed_name: threat-enrichments-indicator-file-elf-segments description: 'An array containing an object for each segment of the ELF file. The keys that should be present in these objects are defined by sub-fields underneath `elf.segments.*`.' flat_name: threat.enrichments.indicator.file.elf.segments level: extended name: segments normalize: - array original_fieldset: elf short: ELF object segment list. type: nested threat.enrichments.indicator.file.elf.segments.sections: dashed_name: threat-enrichments-indicator-file-elf-segments-sections description: ELF object segment sections. flat_name: threat.enrichments.indicator.file.elf.segments.sections ignore_above: 1024 level: extended name: segments.sections normalize: [] original_fieldset: elf short: ELF object segment sections. type: keyword threat.enrichments.indicator.file.elf.segments.type: dashed_name: threat-enrichments-indicator-file-elf-segments-type description: ELF object segment type. flat_name: threat.enrichments.indicator.file.elf.segments.type ignore_above: 1024 level: extended name: segments.type normalize: [] original_fieldset: elf short: ELF object segment type. type: keyword threat.enrichments.indicator.file.elf.shared_libraries: dashed_name: threat-enrichments-indicator-file-elf-shared-libraries description: List of shared libraries used by this ELF object. flat_name: threat.enrichments.indicator.file.elf.shared_libraries ignore_above: 1024 level: extended name: shared_libraries normalize: - array original_fieldset: elf short: List of shared libraries used by this ELF object. type: keyword threat.enrichments.indicator.file.elf.telfhash: dashed_name: threat-enrichments-indicator-file-elf-telfhash description: telfhash symbol hash for ELF file. flat_name: threat.enrichments.indicator.file.elf.telfhash ignore_above: 1024 level: extended name: telfhash normalize: [] original_fieldset: elf short: telfhash hash for ELF file. type: keyword threat.enrichments.indicator.file.extension: dashed_name: threat-enrichments-indicator-file-extension description: 'File extension, excluding the leading dot. Note that when the file name has multiple extensions (example.tar.gz), only the last one should be captured ("gz", not "tar.gz").' example: png flat_name: threat.enrichments.indicator.file.extension ignore_above: 1024 level: extended name: extension normalize: [] original_fieldset: file short: File extension, excluding the leading dot. type: keyword threat.enrichments.indicator.file.gid: dashed_name: threat-enrichments-indicator-file-gid description: Primary group ID (GID) of the file. example: '1001' flat_name: threat.enrichments.indicator.file.gid ignore_above: 1024 level: extended name: gid normalize: [] original_fieldset: file short: Primary group ID (GID) of the file. type: keyword threat.enrichments.indicator.file.group: dashed_name: threat-enrichments-indicator-file-group description: Primary group name of the file. example: alice flat_name: threat.enrichments.indicator.file.group ignore_above: 1024 level: extended name: group normalize: [] original_fieldset: file short: Primary group name of the file. type: keyword threat.enrichments.indicator.file.hash.md5: dashed_name: threat-enrichments-indicator-file-hash-md5 description: MD5 hash. flat_name: threat.enrichments.indicator.file.hash.md5 ignore_above: 1024 level: extended name: md5 normalize: [] original_fieldset: hash short: MD5 hash. type: keyword threat.enrichments.indicator.file.hash.sha1: dashed_name: threat-enrichments-indicator-file-hash-sha1 description: SHA1 hash. flat_name: threat.enrichments.indicator.file.hash.sha1 ignore_above: 1024 level: extended name: sha1 normalize: [] original_fieldset: hash short: SHA1 hash. type: keyword threat.enrichments.indicator.file.hash.sha256: dashed_name: threat-enrichments-indicator-file-hash-sha256 description: SHA256 hash. flat_name: threat.enrichments.indicator.file.hash.sha256 ignore_above: 1024 level: extended name: sha256 normalize: [] original_fieldset: hash short: SHA256 hash. type: keyword threat.enrichments.indicator.file.hash.sha512: dashed_name: threat-enrichments-indicator-file-hash-sha512 description: SHA512 hash. flat_name: threat.enrichments.indicator.file.hash.sha512 ignore_above: 1024 level: extended name: sha512 normalize: [] original_fieldset: hash short: SHA512 hash. type: keyword threat.enrichments.indicator.file.hash.ssdeep: dashed_name: threat-enrichments-indicator-file-hash-ssdeep description: SSDEEP hash. flat_name: threat.enrichments.indicator.file.hash.ssdeep ignore_above: 1024 level: extended name: ssdeep normalize: [] original_fieldset: hash short: SSDEEP hash. type: keyword threat.enrichments.indicator.file.inode: dashed_name: threat-enrichments-indicator-file-inode description: Inode representing the file in the filesystem. example: '256383' flat_name: threat.enrichments.indicator.file.inode ignore_above: 1024 level: extended name: inode normalize: [] original_fieldset: file short: Inode representing the file in the filesystem. type: keyword threat.enrichments.indicator.file.mime_type: dashed_name: threat-enrichments-indicator-file-mime-type description: MIME type should identify the format of the file or stream of bytes using https://www.iana.org/assignments/media-types/media-types.xhtml[IANA official types], where possible. When more than one type is applicable, the most specific type should be used. flat_name: threat.enrichments.indicator.file.mime_type ignore_above: 1024 level: extended name: mime_type normalize: [] original_fieldset: file short: Media type of file, document, or arrangement of bytes. type: keyword threat.enrichments.indicator.file.mode: dashed_name: threat-enrichments-indicator-file-mode description: Mode of the file in octal representation. example: '0640' flat_name: threat.enrichments.indicator.file.mode ignore_above: 1024 level: extended name: mode normalize: [] original_fieldset: file short: Mode of the file in octal representation. type: keyword threat.enrichments.indicator.file.mtime: dashed_name: threat-enrichments-indicator-file-mtime description: Last time the file content was modified. flat_name: threat.enrichments.indicator.file.mtime level: extended name: mtime normalize: [] original_fieldset: file short: Last time the file content was modified. type: date threat.enrichments.indicator.file.name: dashed_name: threat-enrichments-indicator-file-name description: Name of the file including the extension, without the directory. example: example.png flat_name: threat.enrichments.indicator.file.name ignore_above: 1024 level: extended name: name normalize: [] original_fieldset: file short: Name of the file including the extension, without the directory. type: keyword threat.enrichments.indicator.file.owner: dashed_name: threat-enrichments-indicator-file-owner description: File owner's username. example: alice flat_name: threat.enrichments.indicator.file.owner ignore_above: 1024 level: extended name: owner normalize: [] original_fieldset: file short: File owner's username. type: keyword threat.enrichments.indicator.file.path: dashed_name: threat-enrichments-indicator-file-path description: Full path to the file, including the file name. It should include the drive letter, when appropriate. example: /home/alice/example.png flat_name: threat.enrichments.indicator.file.path ignore_above: 1024 level: extended multi_fields: - flat_name: threat.enrichments.indicator.file.path.caseless ignore_above: 1024 name: caseless normalizer: lowercase type: keyword - flat_name: threat.enrichments.indicator.file.path.text name: text norms: false type: text name: path normalize: [] original_fieldset: file short: Full path to the file, including the file name. type: keyword threat.enrichments.indicator.file.pe.architecture: dashed_name: threat-enrichments-indicator-file-pe-architecture description: CPU architecture target for the file. example: x64 flat_name: threat.enrichments.indicator.file.pe.architecture ignore_above: 1024 level: extended name: architecture normalize: [] original_fieldset: pe short: CPU architecture target for the file. type: keyword threat.enrichments.indicator.file.pe.company: dashed_name: threat-enrichments-indicator-file-pe-company description: Internal company name of the file, provided at compile-time. example: Microsoft Corporation flat_name: threat.enrichments.indicator.file.pe.company ignore_above: 1024 level: extended name: company normalize: [] original_fieldset: pe short: Internal company name of the file, provided at compile-time. type: keyword threat.enrichments.indicator.file.pe.description: dashed_name: threat-enrichments-indicator-file-pe-description description: Internal description of the file, provided at compile-time. example: Paint flat_name: threat.enrichments.indicator.file.pe.description ignore_above: 1024 level: extended name: description normalize: [] original_fieldset: pe short: Internal description of the file, provided at compile-time. type: keyword threat.enrichments.indicator.file.pe.file_version: dashed_name: threat-enrichments-indicator-file-pe-file-version description: Internal version of the file, provided at compile-time. example: 6.3.9600.17415 flat_name: threat.enrichments.indicator.file.pe.file_version ignore_above: 1024 level: extended name: file_version normalize: [] original_fieldset: pe short: Process name. type: keyword threat.enrichments.indicator.file.pe.imphash: dashed_name: threat-enrichments-indicator-file-pe-imphash description: 'A hash of the imports in a PE file. An imphash -- or import hash -- can be used to fingerprint binaries even after recompilation or other code-level transformations have occurred, which would change more traditional hash values. Learn more at https://www.fireeye.com/blog/threat-research/2014/01/tracking-malware-import-hashing.html.' example: 0c6803c4e922103c4dca5963aad36ddf flat_name: threat.enrichments.indicator.file.pe.imphash ignore_above: 1024 level: extended name: imphash normalize: [] original_fieldset: pe short: A hash of the imports in a PE file. type: keyword threat.enrichments.indicator.file.pe.original_file_name: dashed_name: threat-enrichments-indicator-file-pe-original-file-name description: Internal name of the file, provided at compile-time. example: MSPAINT.EXE flat_name: threat.enrichments.indicator.file.pe.original_file_name ignore_above: 1024 level: extended name: original_file_name normalize: [] original_fieldset: pe short: Internal name of the file, provided at compile-time. type: keyword threat.enrichments.indicator.file.pe.product: dashed_name: threat-enrichments-indicator-file-pe-product description: Internal product name of the file, provided at compile-time. example: "Microsoft\xAE Windows\xAE Operating System" flat_name: threat.enrichments.indicator.file.pe.product ignore_above: 1024 level: extended name: product normalize: [] original_fieldset: pe short: Internal product name of the file, provided at compile-time. type: keyword threat.enrichments.indicator.file.size: dashed_name: threat-enrichments-indicator-file-size description: 'File size in bytes. Only relevant when `file.type` is "file".' example: 16384 flat_name: threat.enrichments.indicator.file.size level: extended name: size normalize: [] original_fieldset: file short: File size in bytes. type: long threat.enrichments.indicator.file.target_path: dashed_name: threat-enrichments-indicator-file-target-path description: Target path for symlinks. flat_name: threat.enrichments.indicator.file.target_path ignore_above: 1024 level: extended multi_fields: - flat_name: threat.enrichments.indicator.file.target_path.caseless ignore_above: 1024 name: caseless normalizer: lowercase type: keyword - flat_name: threat.enrichments.indicator.file.target_path.text name: text norms: false type: text name: target_path normalize: [] original_fieldset: file short: Target path for symlinks. type: keyword threat.enrichments.indicator.file.type: dashed_name: threat-enrichments-indicator-file-type description: File type (file, dir, or symlink). example: file flat_name: threat.enrichments.indicator.file.type ignore_above: 1024 level: extended name: type normalize: [] original_fieldset: file short: File type (file, dir, or symlink). type: keyword threat.enrichments.indicator.file.uid: dashed_name: threat-enrichments-indicator-file-uid description: The user ID (UID) or security identifier (SID) of the file owner. example: '1001' flat_name: threat.enrichments.indicator.file.uid ignore_above: 1024 level: extended name: uid normalize: [] original_fieldset: file short: The user ID (UID) or security identifier (SID) of the file owner. type: keyword threat.enrichments.indicator.first_seen: dashed_name: threat-enrichments-indicator-first-seen description: The date and time when intelligence source first reported sighting this indicator. example: '2020-11-05T17:25:47.000Z' flat_name: threat.enrichments.indicator.first_seen level: extended name: enrichments.indicator.first_seen normalize: [] short: Date/time indicator was first reported. type: date threat.enrichments.indicator.geo.city_name: dashed_name: threat-enrichments-indicator-geo-city-name description: City name. example: Montreal flat_name: threat.enrichments.indicator.geo.city_name ignore_above: 1024 level: core name: city_name normalize: [] original_fieldset: geo short: City name. type: keyword threat.enrichments.indicator.geo.continent_code: dashed_name: threat-enrichments-indicator-geo-continent-code description: Two-letter code representing continent's name. example: NA flat_name: threat.enrichments.indicator.geo.continent_code ignore_above: 1024 level: core name: continent_code normalize: [] original_fieldset: geo short: Continent code. type: keyword threat.enrichments.indicator.geo.continent_name: dashed_name: threat-enrichments-indicator-geo-continent-name description: Name of the continent. example: North America flat_name: threat.enrichments.indicator.geo.continent_name ignore_above: 1024 level: core name: continent_name normalize: [] original_fieldset: geo short: Name of the continent. type: keyword threat.enrichments.indicator.geo.country_iso_code: dashed_name: threat-enrichments-indicator-geo-country-iso-code description: Country ISO code. example: CA flat_name: threat.enrichments.indicator.geo.country_iso_code ignore_above: 1024 level: core name: country_iso_code normalize: [] original_fieldset: geo short: Country ISO code. type: keyword threat.enrichments.indicator.geo.country_name: dashed_name: threat-enrichments-indicator-geo-country-name description: Country name. example: Canada flat_name: threat.enrichments.indicator.geo.country_name ignore_above: 1024 level: core name: country_name normalize: [] original_fieldset: geo short: Country name. type: keyword threat.enrichments.indicator.geo.location: dashed_name: threat-enrichments-indicator-geo-location description: Longitude and latitude. example: '{ "lon": -73.614830, "lat": 45.505918 }' flat_name: threat.enrichments.indicator.geo.location level: core name: location normalize: [] original_fieldset: geo short: Longitude and latitude. type: geo_point threat.enrichments.indicator.geo.name: dashed_name: threat-enrichments-indicator-geo-name description: 'User-defined description of a location, at the level of granularity they care about. Could be the name of their data centers, the floor number, if this describes a local physical entity, city names. Not typically used in automated geolocation.' example: boston-dc flat_name: threat.enrichments.indicator.geo.name ignore_above: 1024 level: extended name: name normalize: [] original_fieldset: geo short: User-defined description of a location. type: keyword threat.enrichments.indicator.geo.postal_code: dashed_name: threat-enrichments-indicator-geo-postal-code description: 'Postal code associated with the location. Values appropriate for this field may also be known as a postcode or ZIP code and will vary widely from country to country.' example: 94040 flat_name: threat.enrichments.indicator.geo.postal_code ignore_above: 1024 level: core name: postal_code normalize: [] original_fieldset: geo short: Postal code. type: keyword threat.enrichments.indicator.geo.region_iso_code: dashed_name: threat-enrichments-indicator-geo-region-iso-code description: Region ISO code. example: CA-QC flat_name: threat.enrichments.indicator.geo.region_iso_code ignore_above: 1024 level: core name: region_iso_code normalize: [] original_fieldset: geo short: Region ISO code. type: keyword threat.enrichments.indicator.geo.region_name: dashed_name: threat-enrichments-indicator-geo-region-name description: Region name. example: Quebec flat_name: threat.enrichments.indicator.geo.region_name ignore_above: 1024 level: core name: region_name normalize: [] original_fieldset: geo short: Region name. type: keyword threat.enrichments.indicator.geo.timezone: dashed_name: threat-enrichments-indicator-geo-timezone description: The time zone of the location, such as IANA time zone name. example: America/Argentina/Buenos_Aires flat_name: threat.enrichments.indicator.geo.timezone ignore_above: 1024 level: core name: timezone normalize: [] original_fieldset: geo short: Time zone. type: keyword threat.enrichments.indicator.ip: dashed_name: threat-enrichments-indicator-ip description: Identifies a threat indicator as an IP address (irrespective of direction). example: 1.2.3.4 flat_name: threat.enrichments.indicator.ip level: extended name: enrichments.indicator.ip normalize: [] short: Indicator IP address type: ip threat.enrichments.indicator.last_seen: dashed_name: threat-enrichments-indicator-last-seen description: The date and time when intelligence source last reported sighting this indicator. example: '2020-11-05T17:25:47.000Z' flat_name: threat.enrichments.indicator.last_seen level: extended name: enrichments.indicator.last_seen normalize: [] short: Date/time indicator was last reported. type: date threat.enrichments.indicator.marking.tlp: dashed_name: threat-enrichments-indicator-marking-tlp description: Traffic Light Protocol sharing markings. example: CLEAR expected_values: - WHITE - CLEAR - GREEN - AMBER - AMBER+STRICT - RED flat_name: threat.enrichments.indicator.marking.tlp ignore_above: 1024 level: extended name: enrichments.indicator.marking.tlp normalize: [] short: Indicator TLP marking type: keyword threat.enrichments.indicator.modified_at: dashed_name: threat-enrichments-indicator-modified-at description: The date and time when intelligence source last modified information for this indicator. example: '2020-11-05T17:25:47.000Z' flat_name: threat.enrichments.indicator.modified_at level: extended name: enrichments.indicator.modified_at normalize: [] short: Date/time indicator was last updated. type: date threat.enrichments.indicator.port: dashed_name: threat-enrichments-indicator-port description: Identifies a threat indicator as a port number (irrespective of direction). example: 443 flat_name: threat.enrichments.indicator.port level: extended name: enrichments.indicator.port normalize: [] short: Indicator port type: long threat.enrichments.indicator.provider: dashed_name: threat-enrichments-indicator-provider description: The name of the indicator's provider. example: lrz_urlhaus flat_name: threat.enrichments.indicator.provider ignore_above: 1024 level: extended name: enrichments.indicator.provider normalize: [] short: Indicator provider type: keyword threat.enrichments.indicator.reference: dashed_name: threat-enrichments-indicator-reference description: Reference URL linking to additional information about this indicator. example: https://system.example.com/indicator/0001234 flat_name: threat.enrichments.indicator.reference ignore_above: 1024 level: extended name: enrichments.indicator.reference normalize: [] short: Indicator reference URL type: keyword threat.enrichments.indicator.registry.data.bytes: dashed_name: threat-enrichments-indicator-registry-data-bytes description: 'Original bytes written with base64 encoding. For Windows registry operations, such as SetValueEx and RegQueryValueEx, this corresponds to the data pointed by `lp_data`. This is optional but provides better recoverability and should be populated for REG_BINARY encoded values.' example: ZQBuAC0AVQBTAAAAZQBuAAAAAAA= flat_name: threat.enrichments.indicator.registry.data.bytes ignore_above: 1024 level: extended name: data.bytes normalize: [] original_fieldset: registry short: Original bytes written with base64 encoding. type: keyword threat.enrichments.indicator.registry.data.strings: dashed_name: threat-enrichments-indicator-registry-data-strings description: 'Content when writing string types. Populated as an array when writing string data to the registry. For single string registry types (REG_SZ, REG_EXPAND_SZ), this should be an array with one string. For sequences of string with REG_MULTI_SZ, this array will be variable length. For numeric data, such as REG_DWORD and REG_QWORD, this should be populated with the decimal representation (e.g `"1"`).' example: '["C:\rta\red_ttp\bin\myapp.exe"]' flat_name: threat.enrichments.indicator.registry.data.strings level: core name: data.strings normalize: - array original_fieldset: registry short: List of strings representing what was written to the registry. type: wildcard threat.enrichments.indicator.registry.data.type: dashed_name: threat-enrichments-indicator-registry-data-type description: Standard registry type for encoding contents example: REG_SZ flat_name: threat.enrichments.indicator.registry.data.type ignore_above: 1024 level: core name: data.type normalize: [] original_fieldset: registry short: Standard registry type for encoding contents type: keyword threat.enrichments.indicator.registry.hive: dashed_name: threat-enrichments-indicator-registry-hive description: Abbreviated name for the hive. example: HKLM flat_name: threat.enrichments.indicator.registry.hive ignore_above: 1024 level: core name: hive normalize: [] original_fieldset: registry short: Abbreviated name for the hive. type: keyword threat.enrichments.indicator.registry.key: dashed_name: threat-enrichments-indicator-registry-key description: Hive-relative path of keys. example: SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\winword.exe flat_name: threat.enrichments.indicator.registry.key ignore_above: 1024 level: core name: key normalize: [] original_fieldset: registry short: Hive-relative path of keys. type: keyword threat.enrichments.indicator.registry.path: dashed_name: threat-enrichments-indicator-registry-path description: Full path, including hive, key and value example: HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\winword.exe\Debugger flat_name: threat.enrichments.indicator.registry.path ignore_above: 1024 level: core name: path normalize: [] original_fieldset: registry short: Full path, including hive, key and value type: keyword threat.enrichments.indicator.registry.value: dashed_name: threat-enrichments-indicator-registry-value description: Name of the value written. example: Debugger flat_name: threat.enrichments.indicator.registry.value ignore_above: 1024 level: core name: value normalize: [] original_fieldset: registry short: Name of the value written. type: keyword threat.enrichments.indicator.scanner_stats: dashed_name: threat-enrichments-indicator-scanner-stats description: Count of AV/EDR vendors that successfully detected malicious file or URL. example: 4 flat_name: threat.enrichments.indicator.scanner_stats level: extended name: enrichments.indicator.scanner_stats normalize: [] short: Scanner statistics type: long threat.enrichments.indicator.sightings: dashed_name: threat-enrichments-indicator-sightings description: Number of times this indicator was observed conducting threat activity. example: 20 flat_name: threat.enrichments.indicator.sightings level: extended name: enrichments.indicator.sightings normalize: [] short: Number of times indicator observed type: long threat.enrichments.indicator.type: dashed_name: threat-enrichments-indicator-type description: Type of indicator as represented by Cyber Observable in STIX 2.0. example: ipv4-addr expected_values: - autonomous-system - artifact - directory - domain-name - email-addr - file - ipv4-addr - ipv6-addr - mac-addr - mutex - port - process - software - url - user-account - windows-registry-key - x509-certificate flat_name: threat.enrichments.indicator.type ignore_above: 1024 level: extended name: enrichments.indicator.type normalize: [] short: Type of indicator type: keyword threat.enrichments.indicator.url.domain: dashed_name: threat-enrichments-indicator-url-domain description: 'Domain of the url, such as "www.elastic.co". In some cases a URL may refer to an IP and/or port directly, without a domain name. In this case, the IP address would go to the `domain` field. If the URL contains a literal IPv6 address enclosed by `[` and `]` (IETF RFC 2732), the `[` and `]` characters should also be captured in the `domain` field.' example: www.elastic.co flat_name: threat.enrichments.indicator.url.domain ignore_above: 1024 level: extended name: domain normalize: [] original_fieldset: url short: Domain of the url. type: keyword threat.enrichments.indicator.url.extension: dashed_name: threat-enrichments-indicator-url-extension description: 'The field contains the file extension from the original request url, excluding the leading dot. The file extension is only set if it exists, as not every url has a file extension. The leading period must not be included. For example, the value must be "png", not ".png". Note that when the file name has multiple extensions (example.tar.gz), only the last one should be captured ("gz", not "tar.gz").' example: png flat_name: threat.enrichments.indicator.url.extension ignore_above: 1024 level: extended name: extension normalize: [] original_fieldset: url short: File extension from the request url, excluding the leading dot. type: keyword threat.enrichments.indicator.url.fragment: dashed_name: threat-enrichments-indicator-url-fragment description: 'Portion of the url after the `#`, such as "top". The `#` is not part of the fragment.' flat_name: threat.enrichments.indicator.url.fragment ignore_above: 1024 level: extended name: fragment normalize: [] original_fieldset: url short: Portion of the url after the `#`. type: keyword threat.enrichments.indicator.url.full: dashed_name: threat-enrichments-indicator-url-full description: If full URLs are important to your use case, they should be stored in `url.full`, whether this field is reconstructed or present in the event source. example: https://www.elastic.co:443/search?q=elasticsearch#top flat_name: threat.enrichments.indicator.url.full level: extended multi_fields: - flat_name: threat.enrichments.indicator.url.full.text name: text type: match_only_text name: full normalize: [] original_fieldset: url short: Full unparsed URL. type: wildcard threat.enrichments.indicator.url.original: dashed_name: threat-enrichments-indicator-url-original description: 'Unmodified original url as seen in the event source. Note that in network monitoring, the observed URL may be a full URL, whereas in access logs, the URL is often just represented as a path. This field is meant to represent the URL as it was observed, complete or not.' example: https://www.elastic.co:443/search?q=elasticsearch#top or /search?q=elasticsearch flat_name: threat.enrichments.indicator.url.original level: extended multi_fields: - flat_name: threat.enrichments.indicator.url.original.text name: text type: match_only_text name: original normalize: [] original_fieldset: url short: Unmodified original url as seen in the event source. type: wildcard threat.enrichments.indicator.url.password: dashed_name: threat-enrichments-indicator-url-password description: Password of the request. flat_name: threat.enrichments.indicator.url.password ignore_above: 1024 level: extended name: password normalize: [] original_fieldset: url short: Password of the request. type: keyword threat.enrichments.indicator.url.path: dashed_name: threat-enrichments-indicator-url-path description: Path of the request, such as "/search". flat_name: threat.enrichments.indicator.url.path level: extended name: path normalize: [] original_fieldset: url short: Path of the request, such as "/search". type: wildcard threat.enrichments.indicator.url.port: dashed_name: threat-enrichments-indicator-url-port description: Port of the request, such as 443. example: 443 flat_name: threat.enrichments.indicator.url.port format: string level: extended name: port normalize: [] original_fieldset: url short: Port of the request, such as 443. type: long threat.enrichments.indicator.url.query: dashed_name: threat-enrichments-indicator-url-query description: 'The query field describes the query string of the request, such as "q=elasticsearch". The `?` is excluded from the query string. If a URL contains no `?`, there is no query field. If there is a `?` but no query, the query field exists with an empty string. The `exists` query can be used to differentiate between the two cases.' flat_name: threat.enrichments.indicator.url.query ignore_above: 1024 level: extended name: query normalize: [] original_fieldset: url short: Query string of the request. type: keyword threat.enrichments.indicator.url.registered_domain: dashed_name: threat-enrichments-indicator-url-registered-domain description: 'The highest registered url domain, stripped of the subdomain. For example, the registered domain for "foo.example.com" is "example.com". This value can be determined precisely with a list like the public suffix list (http://publicsuffix.org). Trying to approximate this by simply taking the last two labels will not work well for TLDs such as "co.uk".' example: example.com flat_name: threat.enrichments.indicator.url.registered_domain ignore_above: 1024 level: extended name: registered_domain normalize: [] original_fieldset: url short: The highest registered url domain, stripped of the subdomain. type: keyword threat.enrichments.indicator.url.scheme: dashed_name: threat-enrichments-indicator-url-scheme description: 'Scheme of the request, such as "https". Note: The `:` is not part of the scheme.' example: https flat_name: threat.enrichments.indicator.url.scheme ignore_above: 1024 level: extended name: scheme normalize: [] original_fieldset: url short: Scheme of the url. type: keyword threat.enrichments.indicator.url.subdomain: dashed_name: threat-enrichments-indicator-url-subdomain description: 'The subdomain portion of a fully qualified domain name includes all of the names except the host name under the registered_domain. In a partially qualified domain, or if the the qualification level of the full name cannot be determined, subdomain contains all of the names below the registered domain. For example the subdomain portion of "www.east.mydomain.co.uk" is "east". If the domain has multiple levels of subdomain, such as "sub2.sub1.example.com", the subdomain field should contain "sub2.sub1", with no trailing period.' example: east flat_name: threat.enrichments.indicator.url.subdomain ignore_above: 1024 level: extended name: subdomain normalize: [] original_fieldset: url short: The subdomain of the domain. type: keyword threat.enrichments.indicator.url.top_level_domain: dashed_name: threat-enrichments-indicator-url-top-level-domain description: 'The effective top level domain (eTLD), also known as the domain suffix, is the last part of the domain name. For example, the top level domain for example.com is "com". This value can be determined precisely with a list like the public suffix list (http://publicsuffix.org). Trying to approximate this by simply taking the last label will not work well for effective TLDs such as "co.uk".' example: co.uk flat_name: threat.enrichments.indicator.url.top_level_domain ignore_above: 1024 level: extended name: top_level_domain normalize: [] original_fieldset: url short: The effective top level domain (com, org, net, co.uk). type: keyword threat.enrichments.indicator.url.username: dashed_name: threat-enrichments-indicator-url-username description: Username of the request. flat_name: threat.enrichments.indicator.url.username ignore_above: 1024 level: extended name: username normalize: [] original_fieldset: url short: Username of the request. type: keyword threat.enrichments.indicator.x509.alternative_names: dashed_name: threat-enrichments-indicator-x509-alternative-names description: List of subject alternative names (SAN). Name types vary by certificate authority and certificate type but commonly contain IP addresses, DNS names (and wildcards), and email addresses. example: '*.elastic.co' flat_name: threat.enrichments.indicator.x509.alternative_names ignore_above: 1024 level: extended name: alternative_names normalize: - array original_fieldset: x509 short: List of subject alternative names (SAN). type: keyword threat.enrichments.indicator.x509.issuer.common_name: dashed_name: threat-enrichments-indicator-x509-issuer-common-name description: List of common name (CN) of issuing certificate authority. example: Example SHA2 High Assurance Server CA flat_name: threat.enrichments.indicator.x509.issuer.common_name ignore_above: 1024 level: extended name: issuer.common_name normalize: - array original_fieldset: x509 short: List of common name (CN) of issuing certificate authority. type: keyword threat.enrichments.indicator.x509.issuer.country: dashed_name: threat-enrichments-indicator-x509-issuer-country description: List of country \(C) codes example: US flat_name: threat.enrichments.indicator.x509.issuer.country ignore_above: 1024 level: extended name: issuer.country normalize: - array original_fieldset: x509 short: List of country \(C) codes type: keyword threat.enrichments.indicator.x509.issuer.distinguished_name: dashed_name: threat-enrichments-indicator-x509-issuer-distinguished-name description: Distinguished name (DN) of issuing certificate authority. example: C=US, O=Example Inc, OU=www.example.com, CN=Example SHA2 High Assurance Server CA flat_name: threat.enrichments.indicator.x509.issuer.distinguished_name ignore_above: 1024 level: extended name: issuer.distinguished_name normalize: [] original_fieldset: x509 short: Distinguished name (DN) of issuing certificate authority. type: keyword threat.enrichments.indicator.x509.issuer.locality: dashed_name: threat-enrichments-indicator-x509-issuer-locality description: List of locality names (L) example: Mountain View flat_name: threat.enrichments.indicator.x509.issuer.locality ignore_above: 1024 level: extended name: issuer.locality normalize: - array original_fieldset: x509 short: List of locality names (L) type: keyword threat.enrichments.indicator.x509.issuer.organization: dashed_name: threat-enrichments-indicator-x509-issuer-organization description: List of organizations (O) of issuing certificate authority. example: Example Inc flat_name: threat.enrichments.indicator.x509.issuer.organization ignore_above: 1024 level: extended name: issuer.organization normalize: - array original_fieldset: x509 short: List of organizations (O) of issuing certificate authority. type: keyword threat.enrichments.indicator.x509.issuer.organizational_unit: dashed_name: threat-enrichments-indicator-x509-issuer-organizational-unit description: List of organizational units (OU) of issuing certificate authority. example: www.example.com flat_name: threat.enrichments.indicator.x509.issuer.organizational_unit ignore_above: 1024 level: extended name: issuer.organizational_unit normalize: - array original_fieldset: x509 short: List of organizational units (OU) of issuing certificate authority. type: keyword threat.enrichments.indicator.x509.issuer.state_or_province: dashed_name: threat-enrichments-indicator-x509-issuer-state-or-province description: List of state or province names (ST, S, or P) example: California flat_name: threat.enrichments.indicator.x509.issuer.state_or_province ignore_above: 1024 level: extended name: issuer.state_or_province normalize: - array original_fieldset: x509 short: List of state or province names (ST, S, or P) type: keyword threat.enrichments.indicator.x509.not_after: dashed_name: threat-enrichments-indicator-x509-not-after description: Time at which the certificate is no longer considered valid. example: '2020-07-16T03:15:39Z' flat_name: threat.enrichments.indicator.x509.not_after level: extended name: not_after normalize: [] original_fieldset: x509 short: Time at which the certificate is no longer considered valid. type: date threat.enrichments.indicator.x509.not_before: dashed_name: threat-enrichments-indicator-x509-not-before description: Time at which the certificate is first considered valid. example: '2019-08-16T01:40:25Z' flat_name: threat.enrichments.indicator.x509.not_before level: extended name: not_before normalize: [] original_fieldset: x509 short: Time at which the certificate is first considered valid. type: date threat.enrichments.indicator.x509.public_key_algorithm: dashed_name: threat-enrichments-indicator-x509-public-key-algorithm description: Algorithm used to generate the public key. example: RSA flat_name: threat.enrichments.indicator.x509.public_key_algorithm ignore_above: 1024 level: extended name: public_key_algorithm normalize: [] original_fieldset: x509 short: Algorithm used to generate the public key. type: keyword threat.enrichments.indicator.x509.public_key_curve: dashed_name: threat-enrichments-indicator-x509-public-key-curve description: The curve used by the elliptic curve public key algorithm. This is algorithm specific. example: nistp521 flat_name: threat.enrichments.indicator.x509.public_key_curve ignore_above: 1024 level: extended name: public_key_curve normalize: [] original_fieldset: x509 short: The curve used by the elliptic curve public key algorithm. This is algorithm specific. type: keyword threat.enrichments.indicator.x509.public_key_exponent: dashed_name: threat-enrichments-indicator-x509-public-key-exponent description: Exponent used to derive the public key. This is algorithm specific. doc_values: false example: 65537 flat_name: threat.enrichments.indicator.x509.public_key_exponent index: false level: extended name: public_key_exponent normalize: [] original_fieldset: x509 short: Exponent used to derive the public key. This is algorithm specific. type: long threat.enrichments.indicator.x509.public_key_size: dashed_name: threat-enrichments-indicator-x509-public-key-size description: The size of the public key space in bits. example: 2048 flat_name: threat.enrichments.indicator.x509.public_key_size level: extended name: public_key_size normalize: [] original_fieldset: x509 short: The size of the public key space in bits. type: long threat.enrichments.indicator.x509.serial_number: dashed_name: threat-enrichments-indicator-x509-serial-number description: Unique serial number issued by the certificate authority. For consistency, if this value is alphanumeric, it should be formatted without colons and uppercase characters. example: 55FBB9C7DEBF09809D12CCAA flat_name: threat.enrichments.indicator.x509.serial_number ignore_above: 1024 level: extended name: serial_number normalize: [] original_fieldset: x509 short: Unique serial number issued by the certificate authority. type: keyword threat.enrichments.indicator.x509.signature_algorithm: dashed_name: threat-enrichments-indicator-x509-signature-algorithm description: Identifier for certificate signature algorithm. We recommend using names found in Go Lang Crypto library. See https://github.com/golang/go/blob/go1.14/src/crypto/x509/x509.go#L337-L353. example: SHA256-RSA flat_name: threat.enrichments.indicator.x509.signature_algorithm ignore_above: 1024 level: extended name: signature_algorithm normalize: [] original_fieldset: x509 short: Identifier for certificate signature algorithm. type: keyword threat.enrichments.indicator.x509.subject.common_name: dashed_name: threat-enrichments-indicator-x509-subject-common-name description: List of common names (CN) of subject. example: shared.global.example.net flat_name: threat.enrichments.indicator.x509.subject.common_name ignore_above: 1024 level: extended name: subject.common_name normalize: - array original_fieldset: x509 short: List of common names (CN) of subject. type: keyword threat.enrichments.indicator.x509.subject.country: dashed_name: threat-enrichments-indicator-x509-subject-country description: List of country \(C) code example: US flat_name: threat.enrichments.indicator.x509.subject.country ignore_above: 1024 level: extended name: subject.country normalize: - array original_fieldset: x509 short: List of country \(C) code type: keyword threat.enrichments.indicator.x509.subject.distinguished_name: dashed_name: threat-enrichments-indicator-x509-subject-distinguished-name description: Distinguished name (DN) of the certificate subject entity. example: C=US, ST=California, L=San Francisco, O=Example, Inc., CN=shared.global.example.net flat_name: threat.enrichments.indicator.x509.subject.distinguished_name ignore_above: 1024 level: extended name: subject.distinguished_name normalize: [] original_fieldset: x509 short: Distinguished name (DN) of the certificate subject entity. type: keyword threat.enrichments.indicator.x509.subject.locality: dashed_name: threat-enrichments-indicator-x509-subject-locality description: List of locality names (L) example: San Francisco flat_name: threat.enrichments.indicator.x509.subject.locality ignore_above: 1024 level: extended name: subject.locality normalize: - array original_fieldset: x509 short: List of locality names (L) type: keyword threat.enrichments.indicator.x509.subject.organization: dashed_name: threat-enrichments-indicator-x509-subject-organization description: List of organizations (O) of subject. example: Example, Inc. flat_name: threat.enrichments.indicator.x509.subject.organization ignore_above: 1024 level: extended name: subject.organization normalize: - array original_fieldset: x509 short: List of organizations (O) of subject. type: keyword threat.enrichments.indicator.x509.subject.organizational_unit: dashed_name: threat-enrichments-indicator-x509-subject-organizational-unit description: List of organizational units (OU) of subject. flat_name: threat.enrichments.indicator.x509.subject.organizational_unit ignore_above: 1024 level: extended name: subject.organizational_unit normalize: - array original_fieldset: x509 short: List of organizational units (OU) of subject. type: keyword threat.enrichments.indicator.x509.subject.state_or_province: dashed_name: threat-enrichments-indicator-x509-subject-state-or-province description: List of state or province names (ST, S, or P) example: California flat_name: threat.enrichments.indicator.x509.subject.state_or_province ignore_above: 1024 level: extended name: subject.state_or_province normalize: - array original_fieldset: x509 short: List of state or province names (ST, S, or P) type: keyword threat.enrichments.indicator.x509.version_number: dashed_name: threat-enrichments-indicator-x509-version-number description: Version of x509 format. example: 3 flat_name: threat.enrichments.indicator.x509.version_number ignore_above: 1024 level: extended name: version_number normalize: [] original_fieldset: x509 short: Version of x509 format. type: keyword threat.enrichments.matched.atomic: dashed_name: threat-enrichments-matched-atomic description: Identifies the atomic indicator value that matched a local environment endpoint or network event. example: bad-domain.com flat_name: threat.enrichments.matched.atomic ignore_above: 1024 level: extended name: enrichments.matched.atomic normalize: [] short: Matched indicator value type: keyword threat.enrichments.matched.field: dashed_name: threat-enrichments-matched-field description: Identifies the field of the atomic indicator that matched a local environment endpoint or network event. example: file.hash.sha256 flat_name: threat.enrichments.matched.field ignore_above: 1024 level: extended name: enrichments.matched.field normalize: [] short: Matched indicator field type: keyword threat.enrichments.matched.id: dashed_name: threat-enrichments-matched-id description: Identifies the _id of the indicator document enriching the event. example: ff93aee5-86a1-4a61-b0e6-0cdc313d01b5 flat_name: threat.enrichments.matched.id ignore_above: 1024 level: extended name: enrichments.matched.id normalize: [] short: Matched indicator identifier type: keyword threat.enrichments.matched.index: dashed_name: threat-enrichments-matched-index description: Identifies the _index of the indicator document enriching the event. example: filebeat-8.0.0-2021.05.23-000011 flat_name: threat.enrichments.matched.index ignore_above: 1024 level: extended name: enrichments.matched.index normalize: [] short: Matched indicator index type: keyword threat.enrichments.matched.type: dashed_name: threat-enrichments-matched-type description: Identifies the type of match that caused the event to be enriched with the given indicator example: indicator_match_rule flat_name: threat.enrichments.matched.type ignore_above: 1024 level: extended name: enrichments.matched.type normalize: [] short: Type of indicator match type: keyword threat.framework: dashed_name: threat-framework description: Name of the threat framework used to further categorize and classify the tactic and technique of the reported threat. Framework classification can be provided by detecting systems, evaluated at ingest time, or retrospectively tagged to events. example: MITRE ATT&CK flat_name: threat.framework ignore_above: 1024 level: extended name: framework normalize: [] short: Threat classification framework. type: keyword threat.group.alias: dashed_name: threat-group-alias description: "The alias(es) of the group for a set of related intrusion activity\ \ that are tracked by a common name in the security community.\nWhile not required,\ \ you can use a MITRE ATT&CK\xAE group alias(es)." example: '[ "Magecart Group 6" ]' flat_name: threat.group.alias ignore_above: 1024 level: extended name: group.alias normalize: - array short: Alias of the group. type: keyword threat.group.id: dashed_name: threat-group-id description: "The id of the group for a set of related intrusion activity that are\ \ tracked by a common name in the security community.\nWhile not required, you\ \ can use a MITRE ATT&CK\xAE group id." example: G0037 flat_name: threat.group.id ignore_above: 1024 level: extended name: group.id normalize: [] short: ID of the group. type: keyword threat.group.name: dashed_name: threat-group-name description: "The name of the group for a set of related intrusion activity that\ \ are tracked by a common name in the security community.\nWhile not required,\ \ you can use a MITRE ATT&CK\xAE group name." example: FIN6 flat_name: threat.group.name ignore_above: 1024 level: extended name: group.name normalize: [] short: Name of the group. type: keyword threat.group.reference: dashed_name: threat-group-reference description: "The reference URL of the group for a set of related intrusion activity\ \ that are tracked by a common name in the security community.\nWhile not required,\ \ you can use a MITRE ATT&CK\xAE group reference URL." example: https://attack.mitre.org/groups/G0037/ flat_name: threat.group.reference ignore_above: 1024 level: extended name: group.reference normalize: [] short: Reference URL of the group. type: keyword threat.indicator.as.number: dashed_name: threat-indicator-as-number description: Unique number allocated to the autonomous system. The autonomous system number (ASN) uniquely identifies each network on the Internet. example: 15169 flat_name: threat.indicator.as.number level: extended name: number normalize: [] original_fieldset: as short: Unique number allocated to the autonomous system. type: long threat.indicator.as.organization.name: dashed_name: threat-indicator-as-organization-name description: Organization name. example: Google LLC flat_name: threat.indicator.as.organization.name ignore_above: 1024 level: extended multi_fields: - flat_name: threat.indicator.as.organization.name.text name: text type: match_only_text name: organization.name normalize: [] original_fieldset: as short: Organization name. type: keyword threat.indicator.confidence: dashed_name: threat-indicator-confidence description: Identifies the vendor-neutral confidence rating using the None/Low/Medium/High scale defined in Appendix A of the STIX 2.1 framework. Vendor-specific confidence scales may be added as custom fields. example: Medium expected_values: - Not Specified - None - Low - Medium - High flat_name: threat.indicator.confidence ignore_above: 1024 level: extended name: indicator.confidence normalize: [] short: Indicator confidence rating type: keyword threat.indicator.description: dashed_name: threat-indicator-description description: Describes the type of action conducted by the threat. example: IP x.x.x.x was observed delivering the Angler EK. flat_name: threat.indicator.description ignore_above: 1024 level: extended name: indicator.description normalize: [] short: Indicator description type: keyword threat.indicator.email.address: dashed_name: threat-indicator-email-address description: Identifies a threat indicator as an email address (irrespective of direction). example: phish@example.com flat_name: threat.indicator.email.address ignore_above: 1024 level: extended name: indicator.email.address normalize: [] short: Indicator email address type: keyword threat.indicator.file.Ext: dashed_name: threat-indicator-file-Ext description: Object for all custom defined fields to live in. flat_name: threat.indicator.file.Ext level: custom name: Ext normalize: [] original_fieldset: file short: Object for all custom defined fields to live in. type: object threat.indicator.file.Ext.code_signature: dashed_name: threat-indicator-file-Ext-code-signature description: Nested version of ECS code_signature fieldset. flat_name: threat.indicator.file.Ext.code_signature level: custom name: Ext.code_signature normalize: [] original_fieldset: file short: Nested version of ECS code_signature fieldset. type: nested threat.indicator.file.Ext.code_signature.exists: dashed_name: threat-indicator-file-Ext-code-signature-exists description: Boolean to capture if a signature is present. example: 'true' flat_name: threat.indicator.file.Ext.code_signature.exists level: core name: Ext.code_signature.exists normalize: [] original_fieldset: file short: Boolean to capture if a signature is present. type: boolean threat.indicator.file.Ext.code_signature.status: dashed_name: threat-indicator-file-Ext-code-signature-status description: 'Additional information about the certificate status. This is useful for logging cryptographic errors with the certificate validity or trust status. Leave unpopulated if the validity or trust of the certificate was unchecked.' example: ERROR_UNTRUSTED_ROOT flat_name: threat.indicator.file.Ext.code_signature.status ignore_above: 1024 level: custom name: Ext.code_signature.status normalize: [] original_fieldset: file short: Additional information about the certificate status. type: keyword threat.indicator.file.Ext.code_signature.subject_name: dashed_name: threat-indicator-file-Ext-code-signature-subject-name description: Subject name of the code signer example: Microsoft Corporation flat_name: threat.indicator.file.Ext.code_signature.subject_name ignore_above: 1024 level: core name: Ext.code_signature.subject_name normalize: [] original_fieldset: file short: Subject name of the code signer type: keyword threat.indicator.file.Ext.code_signature.trusted: dashed_name: threat-indicator-file-Ext-code-signature-trusted description: 'Stores the trust status of the certificate chain. Validating the trust of the certificate chain may be complicated, and this field should only be populated by tools that actively check the status.' example: 'true' flat_name: threat.indicator.file.Ext.code_signature.trusted level: custom name: Ext.code_signature.trusted normalize: [] original_fieldset: file short: Stores the trust status of the certificate chain. type: boolean threat.indicator.file.Ext.code_signature.valid: dashed_name: threat-indicator-file-Ext-code-signature-valid description: 'Boolean to capture if the digital signature is verified against the binary content. Leave unpopulated if a certificate was unchecked.' example: 'true' flat_name: threat.indicator.file.Ext.code_signature.valid level: custom name: Ext.code_signature.valid normalize: [] original_fieldset: file short: Boolean to capture if the digital signature is verified against the binary content. type: boolean threat.indicator.file.Ext.device.bus_type: dashed_name: threat-indicator-file-Ext-device-bus-type description: Bus type of the device, such as Nvme, Usb, FileBackedVirtual,... etc. flat_name: threat.indicator.file.Ext.device.bus_type ignore_above: 1024 level: custom name: Ext.device.bus_type normalize: [] original_fieldset: file short: Bus type of the device. type: keyword threat.indicator.file.Ext.device.dos_name: dashed_name: threat-indicator-file-Ext-device-dos-name description: DOS name of the device. DOS device name is in the format of driver letters such as C:, D:,... flat_name: threat.indicator.file.Ext.device.dos_name ignore_above: 1024 level: custom name: Ext.device.dos_name normalize: [] original_fieldset: file short: DOS name of the device. type: keyword threat.indicator.file.Ext.device.nt_name: dashed_name: threat-indicator-file-Ext-device-nt-name description: 'NT name of the device. NT device name is in the format such as: \Device\HarddiskVolume2' flat_name: threat.indicator.file.Ext.device.nt_name ignore_above: 1024 level: custom name: Ext.device.nt_name normalize: [] original_fieldset: file short: NT name of the device. type: keyword threat.indicator.file.Ext.device.product_id: dashed_name: threat-indicator-file-Ext-device-product-id description: ProductID of the device. It is provided by the vendor of the device if any. flat_name: threat.indicator.file.Ext.device.product_id ignore_above: 1024 level: custom name: Ext.device.product_id normalize: [] original_fieldset: file short: ProductID of the device. type: keyword threat.indicator.file.Ext.device.serial_number: dashed_name: threat-indicator-file-Ext-device-serial-number description: Serial Number of the device. It is provided by the vendor of the device if any. flat_name: threat.indicator.file.Ext.device.serial_number ignore_above: 1024 level: custom name: Ext.device.serial_number normalize: [] original_fieldset: file short: Serial Number of the device. type: keyword threat.indicator.file.Ext.device.vendor_id: dashed_name: threat-indicator-file-Ext-device-vendor-id description: VendorID of the device. It is provided by the vendor of the device. flat_name: threat.indicator.file.Ext.device.vendor_id ignore_above: 1024 level: custom name: Ext.device.vendor_id normalize: [] original_fieldset: file short: VendorID of the device. type: keyword threat.indicator.file.Ext.entropy: dashed_name: threat-indicator-file-Ext-entropy description: Entropy calculation of file's header and footer used to check file integrity. flat_name: threat.indicator.file.Ext.entropy level: custom name: Ext.entropy normalize: [] original_fieldset: file short: File entropy value type: double threat.indicator.file.Ext.entry_modified: dashed_name: threat-indicator-file-Ext-entry-modified description: Time of last status change. See `st_ctim` member of `struct stat`. flat_name: threat.indicator.file.Ext.entry_modified level: custom name: Ext.entry_modified normalize: [] original_fieldset: file short: Time of last status change. See `st_ctim` member of `struct stat`. type: double threat.indicator.file.Ext.header_bytes: dashed_name: threat-indicator-file-Ext-header-bytes description: First 16 bytes of file used to check file integrity. flat_name: threat.indicator.file.Ext.header_bytes ignore_above: 1024 level: custom name: Ext.header_bytes normalize: [] original_fieldset: file short: Header bytes type: keyword threat.indicator.file.Ext.header_data: dashed_name: threat-indicator-file-Ext-header-data description: First 16 bytes of file used to check file integrity. flat_name: threat.indicator.file.Ext.header_data level: custom name: Ext.header_data normalize: [] norms: false original_fieldset: file short: Header data type: text threat.indicator.file.Ext.malware_classification.features.data.buffer: dashed_name: threat-indicator-file-Ext-malware-classification-features-data-buffer description: The features extracted from this file and evaluated by the model. Usually an array of floats. Likely zlib-encoded. flat_name: threat.indicator.file.Ext.malware_classification.features.data.buffer ignore_above: 1024 level: custom name: features.data.buffer normalize: [] original_fieldset: malware_classification short: The features extracted from this file and evaluated by the model. Usually an array of floats. Likely zlib-encoded. type: keyword threat.indicator.file.Ext.malware_classification.features.data.decompressed_size: dashed_name: threat-indicator-file-Ext-malware-classification-features-data-decompressed-size description: The decompressed size of buffer. flat_name: threat.indicator.file.Ext.malware_classification.features.data.decompressed_size level: custom name: features.data.decompressed_size normalize: [] original_fieldset: malware_classification short: The decompressed size of buffer. type: integer threat.indicator.file.Ext.malware_classification.features.data.encoding: dashed_name: threat-indicator-file-Ext-malware-classification-features-data-encoding description: The encoding of buffer (e.g. zlib). flat_name: threat.indicator.file.Ext.malware_classification.features.data.encoding ignore_above: 1024 level: custom name: features.data.encoding normalize: [] original_fieldset: malware_classification short: The encoding of buffer (e.g. zlib). type: keyword threat.indicator.file.Ext.malware_classification.identifier: dashed_name: threat-indicator-file-Ext-malware-classification-identifier description: The model's unique identifier. flat_name: threat.indicator.file.Ext.malware_classification.identifier ignore_above: 1024 level: custom name: identifier normalize: [] original_fieldset: malware_classification short: The model's unique identifier. type: keyword threat.indicator.file.Ext.malware_classification.score: dashed_name: threat-indicator-file-Ext-malware-classification-score description: The score produced by the classification model. flat_name: threat.indicator.file.Ext.malware_classification.score level: custom name: score normalize: [] original_fieldset: malware_classification short: The score produced by the classification model. type: double threat.indicator.file.Ext.malware_classification.threshold: dashed_name: threat-indicator-file-Ext-malware-classification-threshold description: The score threshold for the model. Files that score above this threshold are considered malicious. flat_name: threat.indicator.file.Ext.malware_classification.threshold level: custom name: threshold normalize: [] original_fieldset: malware_classification short: The score threshold for the model. Files that score above this threshold are considered malicious. type: double threat.indicator.file.Ext.malware_classification.upx_packed: dashed_name: threat-indicator-file-Ext-malware-classification-upx-packed description: Whether UPX packing was detected. flat_name: threat.indicator.file.Ext.malware_classification.upx_packed level: custom name: upx_packed normalize: [] original_fieldset: malware_classification short: Whether UPX packing was detected. type: boolean threat.indicator.file.Ext.malware_classification.version: dashed_name: threat-indicator-file-Ext-malware-classification-version description: The version of the model used. flat_name: threat.indicator.file.Ext.malware_classification.version ignore_above: 1024 level: custom name: version normalize: [] original_fieldset: malware_classification short: The version of the model used. type: keyword threat.indicator.file.Ext.malware_signature: dashed_name: threat-indicator-file-Ext-malware-signature description: Nested version of malware_signature fieldset. flat_name: threat.indicator.file.Ext.malware_signature level: custom name: Ext.malware_signature normalize: [] original_fieldset: file short: Nested version of malware_signature fieldset. type: nested threat.indicator.file.Ext.malware_signature.all_names: dashed_name: threat-indicator-file-Ext-malware-signature-all-names description: The concatenated names of all yara signatures flat_name: threat.indicator.file.Ext.malware_signature.all_names level: custom name: Ext.malware_signature.all_names normalize: [] norms: false original_fieldset: file short: Yara signature names type: text threat.indicator.file.Ext.malware_signature.identifier: dashed_name: threat-indicator-file-Ext-malware-signature-identifier description: Malware artifact identifier. flat_name: threat.indicator.file.Ext.malware_signature.identifier level: custom name: Ext.malware_signature.identifier normalize: [] norms: false original_fieldset: file short: Malware artifact identifier type: text threat.indicator.file.Ext.malware_signature.primary: dashed_name: threat-indicator-file-Ext-malware-signature-primary description: Primary malware signature match. flat_name: threat.indicator.file.Ext.malware_signature.primary level: custom name: Ext.malware_signature.primary normalize: [] original_fieldset: file short: Primary malware signature match type: nested threat.indicator.file.Ext.malware_signature.primary.matches: dashed_name: threat-indicator-file-Ext-malware-signature-primary-matches description: An array of bytes representing yara signature matches flat_name: threat.indicator.file.Ext.malware_signature.primary.matches level: custom name: Ext.malware_signature.primary.matches normalize: - array original_fieldset: file short: signature match bytes type: nested threat.indicator.file.Ext.malware_signature.primary.signature: dashed_name: threat-indicator-file-Ext-malware-signature-primary-signature description: Primary malware signature match. flat_name: threat.indicator.file.Ext.malware_signature.primary.signature level: custom name: Ext.malware_signature.primary.signature normalize: [] original_fieldset: file short: Primary malware signature match type: nested threat.indicator.file.Ext.malware_signature.primary.signature.hash: dashed_name: threat-indicator-file-Ext-malware-signature-primary-signature-hash description: Primary malware signature hash. flat_name: threat.indicator.file.Ext.malware_signature.primary.signature.hash level: custom name: Ext.malware_signature.primary.signature.hash normalize: [] original_fieldset: file short: Primary malware signature hash type: nested threat.indicator.file.Ext.malware_signature.primary.signature.hash.sha256: dashed_name: threat-indicator-file-Ext-malware-signature-primary-signature-hash-sha256 description: Primary malware signature sha256. flat_name: threat.indicator.file.Ext.malware_signature.primary.signature.hash.sha256 ignore_above: 1024 level: custom name: Ext.malware_signature.primary.signature.hash.sha256 normalize: [] original_fieldset: file short: Primary malware signature sha256 type: keyword threat.indicator.file.Ext.malware_signature.primary.signature.id: dashed_name: threat-indicator-file-Ext-malware-signature-primary-signature-id description: Primary malware signature id. flat_name: threat.indicator.file.Ext.malware_signature.primary.signature.id ignore_above: 1024 level: custom name: Ext.malware_signature.primary.signature.id normalize: [] original_fieldset: file short: Primary malware signature id type: keyword threat.indicator.file.Ext.malware_signature.primary.signature.name: dashed_name: threat-indicator-file-Ext-malware-signature-primary-signature-name description: Primary malware signature name. flat_name: threat.indicator.file.Ext.malware_signature.primary.signature.name ignore_above: 1024 level: custom name: Ext.malware_signature.primary.signature.name normalize: [] original_fieldset: file short: Primary malware signature name type: keyword threat.indicator.file.Ext.malware_signature.secondary: dashed_name: threat-indicator-file-Ext-malware-signature-secondary description: An array of malware signature matches flat_name: threat.indicator.file.Ext.malware_signature.secondary level: custom name: Ext.malware_signature.secondary normalize: - array original_fieldset: file short: secondary signature matches type: nested threat.indicator.file.Ext.malware_signature.version: dashed_name: threat-indicator-file-Ext-malware-signature-version description: Primary malware signature version. flat_name: threat.indicator.file.Ext.malware_signature.version ignore_above: 1024 level: custom name: Ext.malware_signature.version normalize: [] original_fieldset: file short: Primary malware signature version type: keyword threat.indicator.file.Ext.monotonic_id: dashed_name: threat-indicator-file-Ext-monotonic-id description: File event monotonic ID. flat_name: threat.indicator.file.Ext.monotonic_id level: custom name: Ext.monotonic_id normalize: [] original_fieldset: file short: File event monotonic ID type: unsigned_long threat.indicator.file.Ext.original: dashed_name: threat-indicator-file-Ext-original description: Original file information during a modification event. flat_name: threat.indicator.file.Ext.original level: custom name: Ext.original normalize: [] original_fieldset: file short: Original file information during a modification event. type: object threat.indicator.file.Ext.original.gid: dashed_name: threat-indicator-file-Ext-original-gid description: Primary group ID (GID) of the file. example: '1001' flat_name: threat.indicator.file.Ext.original.gid ignore_above: 1024 level: custom name: Ext.original.gid normalize: [] original_fieldset: file short: Primary group ID (GID) of the file. type: keyword threat.indicator.file.Ext.original.group: dashed_name: threat-indicator-file-Ext-original-group description: Primary group name of the file. example: alice flat_name: threat.indicator.file.Ext.original.group ignore_above: 1024 level: custom name: Ext.original.group normalize: [] original_fieldset: file short: Primary group name of the file. type: keyword threat.indicator.file.Ext.original.mode: dashed_name: threat-indicator-file-Ext-original-mode description: Original file mode prior to a modification event flat_name: threat.indicator.file.Ext.original.mode ignore_above: 1024 level: custom name: Ext.original.mode normalize: [] original_fieldset: file short: Original file mode prior to a modification event type: keyword threat.indicator.file.Ext.original.name: dashed_name: threat-indicator-file-Ext-original-name description: Original file name prior to a modification event flat_name: threat.indicator.file.Ext.original.name ignore_above: 1024 level: custom name: Ext.original.name normalize: [] original_fieldset: file short: Original file name prior to a modification event type: keyword threat.indicator.file.Ext.original.owner: dashed_name: threat-indicator-file-Ext-original-owner description: File owner's username. example: alice flat_name: threat.indicator.file.Ext.original.owner ignore_above: 1024 level: custom name: Ext.original.owner normalize: [] original_fieldset: file short: File owner's username. type: keyword threat.indicator.file.Ext.original.path: dashed_name: threat-indicator-file-Ext-original-path description: Original file path prior to a modification event flat_name: threat.indicator.file.Ext.original.path ignore_above: 1024 level: custom name: Ext.original.path normalize: [] original_fieldset: file short: Original file path prior to a modification event type: keyword threat.indicator.file.Ext.original.uid: dashed_name: threat-indicator-file-Ext-original-uid description: The user ID (UID) or security identifier (SID) of the file owner. example: '1001' flat_name: threat.indicator.file.Ext.original.uid ignore_above: 1024 level: custom name: Ext.original.uid normalize: [] original_fieldset: file short: The user ID (UID) or security identifier (SID) of the file owner. type: keyword threat.indicator.file.Ext.quarantine_message: dashed_name: threat-indicator-file-Ext-quarantine-message description: Message describing quarantine results. flat_name: threat.indicator.file.Ext.quarantine_message ignore_above: 1024 level: custom name: Ext.quarantine_message normalize: [] original_fieldset: file short: Message describing quarantine results. type: keyword threat.indicator.file.Ext.quarantine_path: dashed_name: threat-indicator-file-Ext-quarantine-path description: Path on endpoint the quarantined file was originally. flat_name: threat.indicator.file.Ext.quarantine_path ignore_above: 1024 level: custom name: Ext.quarantine_path normalize: [] original_fieldset: file short: Path on endpoint the quarantined file was originally. type: keyword threat.indicator.file.Ext.quarantine_result: dashed_name: threat-indicator-file-Ext-quarantine-result description: Boolean representing whether or not file quarantine succeeded. flat_name: threat.indicator.file.Ext.quarantine_result level: custom name: Ext.quarantine_result normalize: [] original_fieldset: file short: Boolean representing whether or not file quarantine succeeded. type: boolean threat.indicator.file.Ext.temp_file_path: dashed_name: threat-indicator-file-Ext-temp-file-path description: Path on endpoint where a copy of the file is being stored. Used to make ephemeral files retrievable. flat_name: threat.indicator.file.Ext.temp_file_path ignore_above: 1024 level: custom name: Ext.temp_file_path normalize: [] original_fieldset: file short: Path on endpoint where a copy of the file is being stored. Used to make ephemeral files retrievable. type: keyword threat.indicator.file.Ext.windows: dashed_name: threat-indicator-file-Ext-windows description: Platform-specific Windows fields flat_name: threat.indicator.file.Ext.windows level: custom name: Ext.windows normalize: [] original_fieldset: file short: Platform-specific Windows fields type: object threat.indicator.file.Ext.windows.zone_identifier: dashed_name: threat-indicator-file-Ext-windows-zone-identifier description: Windows zone identifier for a file flat_name: threat.indicator.file.Ext.windows.zone_identifier ignore_above: 1024 level: custom name: Ext.windows.zone_identifier normalize: [] original_fieldset: file short: Windows zone identifier for a file type: keyword threat.indicator.file.accessed: dashed_name: threat-indicator-file-accessed description: 'Last time the file was accessed. Note that not all filesystems keep track of access time.' flat_name: threat.indicator.file.accessed level: extended name: accessed normalize: [] original_fieldset: file short: Last time the file was accessed. type: date threat.indicator.file.attributes: dashed_name: threat-indicator-file-attributes description: 'Array of file attributes. Attributes names will vary by platform. Here''s a non-exhaustive list of values that are expected in this field: archive, compressed, directory, encrypted, execute, hidden, read, readonly, system, write.' example: '["readonly", "system"]' flat_name: threat.indicator.file.attributes ignore_above: 1024 level: extended name: attributes normalize: - array original_fieldset: file short: Array of file attributes. type: keyword threat.indicator.file.code_signature.exists: dashed_name: threat-indicator-file-code-signature-exists description: Boolean to capture if a signature is present. example: 'true' flat_name: threat.indicator.file.code_signature.exists level: core name: exists normalize: [] original_fieldset: code_signature short: Boolean to capture if a signature is present. type: boolean threat.indicator.file.code_signature.signing_id: dashed_name: threat-indicator-file-code-signature-signing-id description: 'The identifier used to sign the process. This is used to identify the application manufactured by a software vendor. The field is relevant to Apple *OS only.' example: com.apple.xpc.proxy flat_name: threat.indicator.file.code_signature.signing_id ignore_above: 1024 level: extended name: signing_id normalize: [] original_fieldset: code_signature short: The identifier used to sign the process. type: keyword threat.indicator.file.code_signature.status: dashed_name: threat-indicator-file-code-signature-status description: 'Additional information about the certificate status. This is useful for logging cryptographic errors with the certificate validity or trust status. Leave unpopulated if the validity or trust of the certificate was unchecked.' example: ERROR_UNTRUSTED_ROOT flat_name: threat.indicator.file.code_signature.status ignore_above: 1024 level: extended name: status normalize: [] original_fieldset: code_signature short: Additional information about the certificate status. type: keyword threat.indicator.file.code_signature.subject_name: dashed_name: threat-indicator-file-code-signature-subject-name description: Subject name of the code signer example: Microsoft Corporation flat_name: threat.indicator.file.code_signature.subject_name ignore_above: 1024 level: core name: subject_name normalize: [] original_fieldset: code_signature short: Subject name of the code signer type: keyword threat.indicator.file.code_signature.team_id: dashed_name: threat-indicator-file-code-signature-team-id description: 'The team identifier used to sign the process. This is used to identify the team or vendor of a software product. The field is relevant to Apple *OS only.' example: EQHXZ8M8AV flat_name: threat.indicator.file.code_signature.team_id ignore_above: 1024 level: extended name: team_id normalize: [] original_fieldset: code_signature short: The team identifier used to sign the process. type: keyword threat.indicator.file.code_signature.trusted: dashed_name: threat-indicator-file-code-signature-trusted description: 'Stores the trust status of the certificate chain. Validating the trust of the certificate chain may be complicated, and this field should only be populated by tools that actively check the status.' example: 'true' flat_name: threat.indicator.file.code_signature.trusted level: extended name: trusted normalize: [] original_fieldset: code_signature short: Stores the trust status of the certificate chain. type: boolean threat.indicator.file.code_signature.valid: dashed_name: threat-indicator-file-code-signature-valid description: 'Boolean to capture if the digital signature is verified against the binary content. Leave unpopulated if a certificate was unchecked.' example: 'true' flat_name: threat.indicator.file.code_signature.valid level: extended name: valid normalize: [] original_fieldset: code_signature short: Boolean to capture if the digital signature is verified against the binary content. type: boolean threat.indicator.file.created: dashed_name: threat-indicator-file-created description: 'File creation time. Note that not all filesystems store the creation time.' flat_name: threat.indicator.file.created level: extended name: created normalize: [] original_fieldset: file short: File creation time. type: date threat.indicator.file.ctime: dashed_name: threat-indicator-file-ctime description: 'Last time the file attributes or metadata changed. Note that changes to the file content will update `mtime`. This implies `ctime` will be adjusted at the same time, since `mtime` is an attribute of the file.' flat_name: threat.indicator.file.ctime level: extended name: ctime normalize: [] original_fieldset: file short: Last time the file attributes or metadata changed. type: date threat.indicator.file.device: dashed_name: threat-indicator-file-device description: Device that is the source of the file. example: sda flat_name: threat.indicator.file.device ignore_above: 1024 level: extended name: device normalize: [] original_fieldset: file short: Device that is the source of the file. type: keyword threat.indicator.file.directory: dashed_name: threat-indicator-file-directory description: Directory where the file is located. It should include the drive letter, when appropriate. example: /home/alice flat_name: threat.indicator.file.directory ignore_above: 1024 level: extended name: directory normalize: [] original_fieldset: file short: Directory where the file is located. type: keyword threat.indicator.file.drive_letter: dashed_name: threat-indicator-file-drive-letter description: 'Drive letter where the file is located. This field is only relevant on Windows. The value should be uppercase, and not include the colon.' example: C flat_name: threat.indicator.file.drive_letter ignore_above: 1 level: extended name: drive_letter normalize: [] original_fieldset: file short: Drive letter where the file is located. type: keyword threat.indicator.file.elf.architecture: dashed_name: threat-indicator-file-elf-architecture description: Machine architecture of the ELF file. example: x86-64 flat_name: threat.indicator.file.elf.architecture ignore_above: 1024 level: extended name: architecture normalize: [] original_fieldset: elf short: Machine architecture of the ELF file. type: keyword threat.indicator.file.elf.byte_order: dashed_name: threat-indicator-file-elf-byte-order description: Byte sequence of ELF file. example: Little Endian flat_name: threat.indicator.file.elf.byte_order ignore_above: 1024 level: extended name: byte_order normalize: [] original_fieldset: elf short: Byte sequence of ELF file. type: keyword threat.indicator.file.elf.cpu_type: dashed_name: threat-indicator-file-elf-cpu-type description: CPU type of the ELF file. example: Intel flat_name: threat.indicator.file.elf.cpu_type ignore_above: 1024 level: extended name: cpu_type normalize: [] original_fieldset: elf short: CPU type of the ELF file. type: keyword threat.indicator.file.elf.creation_date: dashed_name: threat-indicator-file-elf-creation-date description: Extracted when possible from the file's metadata. Indicates when it was built or compiled. It can also be faked by malware creators. flat_name: threat.indicator.file.elf.creation_date level: extended name: creation_date normalize: [] original_fieldset: elf short: Build or compile date. type: date threat.indicator.file.elf.exports: dashed_name: threat-indicator-file-elf-exports description: List of exported element names and types. flat_name: threat.indicator.file.elf.exports level: extended name: exports normalize: - array original_fieldset: elf short: List of exported element names and types. type: flattened threat.indicator.file.elf.go_import_hash: dashed_name: threat-indicator-file-elf-go-import-hash description: 'A hash of the Go language imports in an ELF file excluding standard library imports. An import hash can be used to fingerprint binaries even after recompilation or other code-level transformations have occurred, which would change more traditional hash values. The algorithm used to calculate the Go symbol hash and a reference implementation are available [here](https://github.com/elastic/toutoumomoma).' example: 10bddcb4cee42080f76c88d9ff964491 flat_name: threat.indicator.file.elf.go_import_hash ignore_above: 1024 level: extended name: go_import_hash normalize: [] original_fieldset: elf short: A hash of the Go language imports in an ELF file. type: keyword threat.indicator.file.elf.go_imports: dashed_name: threat-indicator-file-elf-go-imports description: List of imported Go language element names and types. flat_name: threat.indicator.file.elf.go_imports level: extended name: go_imports normalize: [] original_fieldset: elf short: List of imported Go language element names and types. type: flattened threat.indicator.file.elf.go_imports_names_entropy: dashed_name: threat-indicator-file-elf-go-imports-names-entropy description: Shannon entropy calculation from the list of Go imports. flat_name: threat.indicator.file.elf.go_imports_names_entropy format: number level: extended name: go_imports_names_entropy normalize: [] original_fieldset: elf short: Shannon entropy calculation from the list of Go imports. type: long threat.indicator.file.elf.go_imports_names_var_entropy: dashed_name: threat-indicator-file-elf-go-imports-names-var-entropy description: Variance for Shannon entropy calculation from the list of Go imports. flat_name: threat.indicator.file.elf.go_imports_names_var_entropy format: number level: extended name: go_imports_names_var_entropy normalize: [] original_fieldset: elf short: Variance for Shannon entropy calculation from the list of Go imports. type: long threat.indicator.file.elf.go_stripped: dashed_name: threat-indicator-file-elf-go-stripped description: Set to true if the file is a Go executable that has had its symbols stripped or obfuscated and false if an unobfuscated Go executable. flat_name: threat.indicator.file.elf.go_stripped level: extended name: go_stripped normalize: [] original_fieldset: elf short: Whether the file is a stripped or obfuscated Go executable. type: boolean threat.indicator.file.elf.header.abi_version: dashed_name: threat-indicator-file-elf-header-abi-version description: Version of the ELF Application Binary Interface (ABI). flat_name: threat.indicator.file.elf.header.abi_version ignore_above: 1024 level: extended name: header.abi_version normalize: [] original_fieldset: elf short: Version of the ELF Application Binary Interface (ABI). type: keyword threat.indicator.file.elf.header.class: dashed_name: threat-indicator-file-elf-header-class description: Header class of the ELF file. flat_name: threat.indicator.file.elf.header.class ignore_above: 1024 level: extended name: header.class normalize: [] original_fieldset: elf short: Header class of the ELF file. type: keyword threat.indicator.file.elf.header.data: dashed_name: threat-indicator-file-elf-header-data description: Data table of the ELF header. flat_name: threat.indicator.file.elf.header.data ignore_above: 1024 level: extended name: header.data normalize: [] original_fieldset: elf short: Data table of the ELF header. type: keyword threat.indicator.file.elf.header.entrypoint: dashed_name: threat-indicator-file-elf-header-entrypoint description: Header entrypoint of the ELF file. flat_name: threat.indicator.file.elf.header.entrypoint format: string level: extended name: header.entrypoint normalize: [] original_fieldset: elf short: Header entrypoint of the ELF file. type: long threat.indicator.file.elf.header.object_version: dashed_name: threat-indicator-file-elf-header-object-version description: '"0x1" for original ELF files.' flat_name: threat.indicator.file.elf.header.object_version ignore_above: 1024 level: extended name: header.object_version normalize: [] original_fieldset: elf short: '"0x1" for original ELF files.' type: keyword threat.indicator.file.elf.header.os_abi: dashed_name: threat-indicator-file-elf-header-os-abi description: Application Binary Interface (ABI) of the Linux OS. flat_name: threat.indicator.file.elf.header.os_abi ignore_above: 1024 level: extended name: header.os_abi normalize: [] original_fieldset: elf short: Application Binary Interface (ABI) of the Linux OS. type: keyword threat.indicator.file.elf.header.type: dashed_name: threat-indicator-file-elf-header-type description: Header type of the ELF file. flat_name: threat.indicator.file.elf.header.type ignore_above: 1024 level: extended name: header.type normalize: [] original_fieldset: elf short: Header type of the ELF file. type: keyword threat.indicator.file.elf.header.version: dashed_name: threat-indicator-file-elf-header-version description: Version of the ELF header. flat_name: threat.indicator.file.elf.header.version ignore_above: 1024 level: extended name: header.version normalize: [] original_fieldset: elf short: Version of the ELF header. type: keyword threat.indicator.file.elf.import_hash: dashed_name: threat-indicator-file-elf-import-hash description: 'A hash of the imports in an ELF file. An import hash can be used to fingerprint binaries even after recompilation or other code-level transformations have occurred, which would change more traditional hash values. This is an ELF implementation of the Windows PE imphash.' example: d41d8cd98f00b204e9800998ecf8427e flat_name: threat.indicator.file.elf.import_hash ignore_above: 1024 level: extended name: import_hash normalize: [] original_fieldset: elf short: A hash of the imports in an ELF file. type: keyword threat.indicator.file.elf.imports: dashed_name: threat-indicator-file-elf-imports description: List of imported element names and types. flat_name: threat.indicator.file.elf.imports level: extended name: imports normalize: - array original_fieldset: elf short: List of imported element names and types. type: flattened threat.indicator.file.elf.imports_names_entropy: dashed_name: threat-indicator-file-elf-imports-names-entropy description: Shannon entropy calculation from the list of imported element names and types. flat_name: threat.indicator.file.elf.imports_names_entropy format: number level: extended name: imports_names_entropy normalize: [] original_fieldset: elf short: Shannon entropy calculation from the list of imported element names and types. type: long threat.indicator.file.elf.imports_names_var_entropy: dashed_name: threat-indicator-file-elf-imports-names-var-entropy description: Variance for Shannon entropy calculation from the list of imported element names and types. flat_name: threat.indicator.file.elf.imports_names_var_entropy format: number level: extended name: imports_names_var_entropy normalize: [] original_fieldset: elf short: Variance for Shannon entropy calculation from the list of imported element names and types. type: long threat.indicator.file.elf.sections: dashed_name: threat-indicator-file-elf-sections description: 'An array containing an object for each section of the ELF file. The keys that should be present in these objects are defined by sub-fields underneath `elf.sections.*`.' flat_name: threat.indicator.file.elf.sections level: extended name: sections normalize: - array original_fieldset: elf short: Section information of the ELF file. type: nested threat.indicator.file.elf.sections.chi2: dashed_name: threat-indicator-file-elf-sections-chi2 description: Chi-square probability distribution of the section. flat_name: threat.indicator.file.elf.sections.chi2 format: number level: extended name: sections.chi2 normalize: [] original_fieldset: elf short: Chi-square probability distribution of the section. type: long threat.indicator.file.elf.sections.entropy: dashed_name: threat-indicator-file-elf-sections-entropy description: Shannon entropy calculation from the section. flat_name: threat.indicator.file.elf.sections.entropy format: number level: extended name: sections.entropy normalize: [] original_fieldset: elf short: Shannon entropy calculation from the section. type: long threat.indicator.file.elf.sections.flags: dashed_name: threat-indicator-file-elf-sections-flags description: ELF Section List flags. flat_name: threat.indicator.file.elf.sections.flags ignore_above: 1024 level: extended name: sections.flags normalize: [] original_fieldset: elf short: ELF Section List flags. type: keyword threat.indicator.file.elf.sections.name: dashed_name: threat-indicator-file-elf-sections-name description: ELF Section List name. flat_name: threat.indicator.file.elf.sections.name ignore_above: 1024 level: extended name: sections.name normalize: [] original_fieldset: elf short: ELF Section List name. type: keyword threat.indicator.file.elf.sections.physical_offset: dashed_name: threat-indicator-file-elf-sections-physical-offset description: ELF Section List offset. flat_name: threat.indicator.file.elf.sections.physical_offset ignore_above: 1024 level: extended name: sections.physical_offset normalize: [] original_fieldset: elf short: ELF Section List offset. type: keyword threat.indicator.file.elf.sections.physical_size: dashed_name: threat-indicator-file-elf-sections-physical-size description: ELF Section List physical size. flat_name: threat.indicator.file.elf.sections.physical_size format: bytes level: extended name: sections.physical_size normalize: [] original_fieldset: elf short: ELF Section List physical size. type: long threat.indicator.file.elf.sections.type: dashed_name: threat-indicator-file-elf-sections-type description: ELF Section List type. flat_name: threat.indicator.file.elf.sections.type ignore_above: 1024 level: extended name: sections.type normalize: [] original_fieldset: elf short: ELF Section List type. type: keyword threat.indicator.file.elf.sections.var_entropy: dashed_name: threat-indicator-file-elf-sections-var-entropy description: Variance for Shannon entropy calculation from the section. flat_name: threat.indicator.file.elf.sections.var_entropy format: number level: extended name: sections.var_entropy normalize: [] original_fieldset: elf short: Variance for Shannon entropy calculation from the section. type: long threat.indicator.file.elf.sections.virtual_address: dashed_name: threat-indicator-file-elf-sections-virtual-address description: ELF Section List virtual address. flat_name: threat.indicator.file.elf.sections.virtual_address format: string level: extended name: sections.virtual_address normalize: [] original_fieldset: elf short: ELF Section List virtual address. type: long threat.indicator.file.elf.sections.virtual_size: dashed_name: threat-indicator-file-elf-sections-virtual-size description: ELF Section List virtual size. flat_name: threat.indicator.file.elf.sections.virtual_size format: string level: extended name: sections.virtual_size normalize: [] original_fieldset: elf short: ELF Section List virtual size. type: long threat.indicator.file.elf.segments: dashed_name: threat-indicator-file-elf-segments description: 'An array containing an object for each segment of the ELF file. The keys that should be present in these objects are defined by sub-fields underneath `elf.segments.*`.' flat_name: threat.indicator.file.elf.segments level: extended name: segments normalize: - array original_fieldset: elf short: ELF object segment list. type: nested threat.indicator.file.elf.segments.sections: dashed_name: threat-indicator-file-elf-segments-sections description: ELF object segment sections. flat_name: threat.indicator.file.elf.segments.sections ignore_above: 1024 level: extended name: segments.sections normalize: [] original_fieldset: elf short: ELF object segment sections. type: keyword threat.indicator.file.elf.segments.type: dashed_name: threat-indicator-file-elf-segments-type description: ELF object segment type. flat_name: threat.indicator.file.elf.segments.type ignore_above: 1024 level: extended name: segments.type normalize: [] original_fieldset: elf short: ELF object segment type. type: keyword threat.indicator.file.elf.shared_libraries: dashed_name: threat-indicator-file-elf-shared-libraries description: List of shared libraries used by this ELF object. flat_name: threat.indicator.file.elf.shared_libraries ignore_above: 1024 level: extended name: shared_libraries normalize: - array original_fieldset: elf short: List of shared libraries used by this ELF object. type: keyword threat.indicator.file.elf.telfhash: dashed_name: threat-indicator-file-elf-telfhash description: telfhash symbol hash for ELF file. flat_name: threat.indicator.file.elf.telfhash ignore_above: 1024 level: extended name: telfhash normalize: [] original_fieldset: elf short: telfhash hash for ELF file. type: keyword threat.indicator.file.extension: dashed_name: threat-indicator-file-extension description: 'File extension, excluding the leading dot. Note that when the file name has multiple extensions (example.tar.gz), only the last one should be captured ("gz", not "tar.gz").' example: png flat_name: threat.indicator.file.extension ignore_above: 1024 level: extended name: extension normalize: [] original_fieldset: file short: File extension, excluding the leading dot. type: keyword threat.indicator.file.gid: dashed_name: threat-indicator-file-gid description: Primary group ID (GID) of the file. example: '1001' flat_name: threat.indicator.file.gid ignore_above: 1024 level: extended name: gid normalize: [] original_fieldset: file short: Primary group ID (GID) of the file. type: keyword threat.indicator.file.group: dashed_name: threat-indicator-file-group description: Primary group name of the file. example: alice flat_name: threat.indicator.file.group ignore_above: 1024 level: extended name: group normalize: [] original_fieldset: file short: Primary group name of the file. type: keyword threat.indicator.file.hash.md5: dashed_name: threat-indicator-file-hash-md5 description: MD5 hash. flat_name: threat.indicator.file.hash.md5 ignore_above: 1024 level: extended name: md5 normalize: [] original_fieldset: hash short: MD5 hash. type: keyword threat.indicator.file.hash.sha1: dashed_name: threat-indicator-file-hash-sha1 description: SHA1 hash. flat_name: threat.indicator.file.hash.sha1 ignore_above: 1024 level: extended name: sha1 normalize: [] original_fieldset: hash short: SHA1 hash. type: keyword threat.indicator.file.hash.sha256: dashed_name: threat-indicator-file-hash-sha256 description: SHA256 hash. flat_name: threat.indicator.file.hash.sha256 ignore_above: 1024 level: extended name: sha256 normalize: [] original_fieldset: hash short: SHA256 hash. type: keyword threat.indicator.file.hash.sha512: dashed_name: threat-indicator-file-hash-sha512 description: SHA512 hash. flat_name: threat.indicator.file.hash.sha512 ignore_above: 1024 level: extended name: sha512 normalize: [] original_fieldset: hash short: SHA512 hash. type: keyword threat.indicator.file.hash.ssdeep: dashed_name: threat-indicator-file-hash-ssdeep description: SSDEEP hash. flat_name: threat.indicator.file.hash.ssdeep ignore_above: 1024 level: extended name: ssdeep normalize: [] original_fieldset: hash short: SSDEEP hash. type: keyword threat.indicator.file.inode: dashed_name: threat-indicator-file-inode description: Inode representing the file in the filesystem. example: '256383' flat_name: threat.indicator.file.inode ignore_above: 1024 level: extended name: inode normalize: [] original_fieldset: file short: Inode representing the file in the filesystem. type: keyword threat.indicator.file.mime_type: dashed_name: threat-indicator-file-mime-type description: MIME type should identify the format of the file or stream of bytes using https://www.iana.org/assignments/media-types/media-types.xhtml[IANA official types], where possible. When more than one type is applicable, the most specific type should be used. flat_name: threat.indicator.file.mime_type ignore_above: 1024 level: extended name: mime_type normalize: [] original_fieldset: file short: Media type of file, document, or arrangement of bytes. type: keyword threat.indicator.file.mode: dashed_name: threat-indicator-file-mode description: Mode of the file in octal representation. example: '0640' flat_name: threat.indicator.file.mode ignore_above: 1024 level: extended name: mode normalize: [] original_fieldset: file short: Mode of the file in octal representation. type: keyword threat.indicator.file.mtime: dashed_name: threat-indicator-file-mtime description: Last time the file content was modified. flat_name: threat.indicator.file.mtime level: extended name: mtime normalize: [] original_fieldset: file short: Last time the file content was modified. type: date threat.indicator.file.name: dashed_name: threat-indicator-file-name description: Name of the file including the extension, without the directory. example: example.png flat_name: threat.indicator.file.name ignore_above: 1024 level: extended name: name normalize: [] original_fieldset: file short: Name of the file including the extension, without the directory. type: keyword threat.indicator.file.owner: dashed_name: threat-indicator-file-owner description: File owner's username. example: alice flat_name: threat.indicator.file.owner ignore_above: 1024 level: extended name: owner normalize: [] original_fieldset: file short: File owner's username. type: keyword threat.indicator.file.path: dashed_name: threat-indicator-file-path description: Full path to the file, including the file name. It should include the drive letter, when appropriate. example: /home/alice/example.png flat_name: threat.indicator.file.path ignore_above: 1024 level: extended multi_fields: - flat_name: threat.indicator.file.path.caseless ignore_above: 1024 name: caseless normalizer: lowercase type: keyword - flat_name: threat.indicator.file.path.text name: text norms: false type: text name: path normalize: [] original_fieldset: file short: Full path to the file, including the file name. type: keyword threat.indicator.file.pe.architecture: dashed_name: threat-indicator-file-pe-architecture description: CPU architecture target for the file. example: x64 flat_name: threat.indicator.file.pe.architecture ignore_above: 1024 level: extended name: architecture normalize: [] original_fieldset: pe short: CPU architecture target for the file. type: keyword threat.indicator.file.pe.company: dashed_name: threat-indicator-file-pe-company description: Internal company name of the file, provided at compile-time. example: Microsoft Corporation flat_name: threat.indicator.file.pe.company ignore_above: 1024 level: extended name: company normalize: [] original_fieldset: pe short: Internal company name of the file, provided at compile-time. type: keyword threat.indicator.file.pe.description: dashed_name: threat-indicator-file-pe-description description: Internal description of the file, provided at compile-time. example: Paint flat_name: threat.indicator.file.pe.description ignore_above: 1024 level: extended name: description normalize: [] original_fieldset: pe short: Internal description of the file, provided at compile-time. type: keyword threat.indicator.file.pe.file_version: dashed_name: threat-indicator-file-pe-file-version description: Internal version of the file, provided at compile-time. example: 6.3.9600.17415 flat_name: threat.indicator.file.pe.file_version ignore_above: 1024 level: extended name: file_version normalize: [] original_fieldset: pe short: Process name. type: keyword threat.indicator.file.pe.imphash: dashed_name: threat-indicator-file-pe-imphash description: 'A hash of the imports in a PE file. An imphash -- or import hash -- can be used to fingerprint binaries even after recompilation or other code-level transformations have occurred, which would change more traditional hash values. Learn more at https://www.fireeye.com/blog/threat-research/2014/01/tracking-malware-import-hashing.html.' example: 0c6803c4e922103c4dca5963aad36ddf flat_name: threat.indicator.file.pe.imphash ignore_above: 1024 level: extended name: imphash normalize: [] original_fieldset: pe short: A hash of the imports in a PE file. type: keyword threat.indicator.file.pe.original_file_name: dashed_name: threat-indicator-file-pe-original-file-name description: Internal name of the file, provided at compile-time. example: MSPAINT.EXE flat_name: threat.indicator.file.pe.original_file_name ignore_above: 1024 level: extended name: original_file_name normalize: [] original_fieldset: pe short: Internal name of the file, provided at compile-time. type: keyword threat.indicator.file.pe.product: dashed_name: threat-indicator-file-pe-product description: Internal product name of the file, provided at compile-time. example: "Microsoft\xAE Windows\xAE Operating System" flat_name: threat.indicator.file.pe.product ignore_above: 1024 level: extended name: product normalize: [] original_fieldset: pe short: Internal product name of the file, provided at compile-time. type: keyword threat.indicator.file.size: dashed_name: threat-indicator-file-size description: 'File size in bytes. Only relevant when `file.type` is "file".' example: 16384 flat_name: threat.indicator.file.size level: extended name: size normalize: [] original_fieldset: file short: File size in bytes. type: long threat.indicator.file.target_path: dashed_name: threat-indicator-file-target-path description: Target path for symlinks. flat_name: threat.indicator.file.target_path ignore_above: 1024 level: extended multi_fields: - flat_name: threat.indicator.file.target_path.caseless ignore_above: 1024 name: caseless normalizer: lowercase type: keyword - flat_name: threat.indicator.file.target_path.text name: text norms: false type: text name: target_path normalize: [] original_fieldset: file short: Target path for symlinks. type: keyword threat.indicator.file.type: dashed_name: threat-indicator-file-type description: File type (file, dir, or symlink). example: file flat_name: threat.indicator.file.type ignore_above: 1024 level: extended name: type normalize: [] original_fieldset: file short: File type (file, dir, or symlink). type: keyword threat.indicator.file.uid: dashed_name: threat-indicator-file-uid description: The user ID (UID) or security identifier (SID) of the file owner. example: '1001' flat_name: threat.indicator.file.uid ignore_above: 1024 level: extended name: uid normalize: [] original_fieldset: file short: The user ID (UID) or security identifier (SID) of the file owner. type: keyword threat.indicator.first_seen: dashed_name: threat-indicator-first-seen description: The date and time when intelligence source first reported sighting this indicator. example: '2020-11-05T17:25:47.000Z' flat_name: threat.indicator.first_seen level: extended name: indicator.first_seen normalize: [] short: Date/time indicator was first reported. type: date threat.indicator.geo.city_name: dashed_name: threat-indicator-geo-city-name description: City name. example: Montreal flat_name: threat.indicator.geo.city_name ignore_above: 1024 level: core name: city_name normalize: [] original_fieldset: geo short: City name. type: keyword threat.indicator.geo.continent_code: dashed_name: threat-indicator-geo-continent-code description: Two-letter code representing continent's name. example: NA flat_name: threat.indicator.geo.continent_code ignore_above: 1024 level: core name: continent_code normalize: [] original_fieldset: geo short: Continent code. type: keyword threat.indicator.geo.continent_name: dashed_name: threat-indicator-geo-continent-name description: Name of the continent. example: North America flat_name: threat.indicator.geo.continent_name ignore_above: 1024 level: core name: continent_name normalize: [] original_fieldset: geo short: Name of the continent. type: keyword threat.indicator.geo.country_iso_code: dashed_name: threat-indicator-geo-country-iso-code description: Country ISO code. example: CA flat_name: threat.indicator.geo.country_iso_code ignore_above: 1024 level: core name: country_iso_code normalize: [] original_fieldset: geo short: Country ISO code. type: keyword threat.indicator.geo.country_name: dashed_name: threat-indicator-geo-country-name description: Country name. example: Canada flat_name: threat.indicator.geo.country_name ignore_above: 1024 level: core name: country_name normalize: [] original_fieldset: geo short: Country name. type: keyword threat.indicator.geo.location: dashed_name: threat-indicator-geo-location description: Longitude and latitude. example: '{ "lon": -73.614830, "lat": 45.505918 }' flat_name: threat.indicator.geo.location level: core name: location normalize: [] original_fieldset: geo short: Longitude and latitude. type: geo_point threat.indicator.geo.name: dashed_name: threat-indicator-geo-name description: 'User-defined description of a location, at the level of granularity they care about. Could be the name of their data centers, the floor number, if this describes a local physical entity, city names. Not typically used in automated geolocation.' example: boston-dc flat_name: threat.indicator.geo.name ignore_above: 1024 level: extended name: name normalize: [] original_fieldset: geo short: User-defined description of a location. type: keyword threat.indicator.geo.postal_code: dashed_name: threat-indicator-geo-postal-code description: 'Postal code associated with the location. Values appropriate for this field may also be known as a postcode or ZIP code and will vary widely from country to country.' example: 94040 flat_name: threat.indicator.geo.postal_code ignore_above: 1024 level: core name: postal_code normalize: [] original_fieldset: geo short: Postal code. type: keyword threat.indicator.geo.region_iso_code: dashed_name: threat-indicator-geo-region-iso-code description: Region ISO code. example: CA-QC flat_name: threat.indicator.geo.region_iso_code ignore_above: 1024 level: core name: region_iso_code normalize: [] original_fieldset: geo short: Region ISO code. type: keyword threat.indicator.geo.region_name: dashed_name: threat-indicator-geo-region-name description: Region name. example: Quebec flat_name: threat.indicator.geo.region_name ignore_above: 1024 level: core name: region_name normalize: [] original_fieldset: geo short: Region name. type: keyword threat.indicator.geo.timezone: dashed_name: threat-indicator-geo-timezone description: The time zone of the location, such as IANA time zone name. example: America/Argentina/Buenos_Aires flat_name: threat.indicator.geo.timezone ignore_above: 1024 level: core name: timezone normalize: [] original_fieldset: geo short: Time zone. type: keyword threat.indicator.ip: dashed_name: threat-indicator-ip description: Identifies a threat indicator as an IP address (irrespective of direction). example: 1.2.3.4 flat_name: threat.indicator.ip level: extended name: indicator.ip normalize: [] short: Indicator IP address type: ip threat.indicator.last_seen: dashed_name: threat-indicator-last-seen description: The date and time when intelligence source last reported sighting this indicator. example: '2020-11-05T17:25:47.000Z' flat_name: threat.indicator.last_seen level: extended name: indicator.last_seen normalize: [] short: Date/time indicator was last reported. type: date threat.indicator.marking.tlp: dashed_name: threat-indicator-marking-tlp description: Traffic Light Protocol sharing markings. example: CLEAR expected_values: - WHITE - CLEAR - GREEN - AMBER - AMBER+STRICT - RED flat_name: threat.indicator.marking.tlp ignore_above: 1024 level: extended name: indicator.marking.tlp normalize: [] short: Indicator TLP marking type: keyword threat.indicator.modified_at: dashed_name: threat-indicator-modified-at description: The date and time when intelligence source last modified information for this indicator. example: '2020-11-05T17:25:47.000Z' flat_name: threat.indicator.modified_at level: extended name: indicator.modified_at normalize: [] short: Date/time indicator was last updated. type: date threat.indicator.port: dashed_name: threat-indicator-port description: Identifies a threat indicator as a port number (irrespective of direction). example: 443 flat_name: threat.indicator.port level: extended name: indicator.port normalize: [] short: Indicator port type: long threat.indicator.provider: dashed_name: threat-indicator-provider description: The name of the indicator's provider. example: lrz_urlhaus flat_name: threat.indicator.provider ignore_above: 1024 level: extended name: indicator.provider normalize: [] short: Indicator provider type: keyword threat.indicator.reference: dashed_name: threat-indicator-reference description: Reference URL linking to additional information about this indicator. example: https://system.example.com/indicator/0001234 flat_name: threat.indicator.reference ignore_above: 1024 level: extended name: indicator.reference normalize: [] short: Indicator reference URL type: keyword threat.indicator.registry.data.bytes: dashed_name: threat-indicator-registry-data-bytes description: 'Original bytes written with base64 encoding. For Windows registry operations, such as SetValueEx and RegQueryValueEx, this corresponds to the data pointed by `lp_data`. This is optional but provides better recoverability and should be populated for REG_BINARY encoded values.' example: ZQBuAC0AVQBTAAAAZQBuAAAAAAA= flat_name: threat.indicator.registry.data.bytes ignore_above: 1024 level: extended name: data.bytes normalize: [] original_fieldset: registry short: Original bytes written with base64 encoding. type: keyword threat.indicator.registry.data.strings: dashed_name: threat-indicator-registry-data-strings description: 'Content when writing string types. Populated as an array when writing string data to the registry. For single string registry types (REG_SZ, REG_EXPAND_SZ), this should be an array with one string. For sequences of string with REG_MULTI_SZ, this array will be variable length. For numeric data, such as REG_DWORD and REG_QWORD, this should be populated with the decimal representation (e.g `"1"`).' example: '["C:\rta\red_ttp\bin\myapp.exe"]' flat_name: threat.indicator.registry.data.strings level: core name: data.strings normalize: - array original_fieldset: registry short: List of strings representing what was written to the registry. type: wildcard threat.indicator.registry.data.type: dashed_name: threat-indicator-registry-data-type description: Standard registry type for encoding contents example: REG_SZ flat_name: threat.indicator.registry.data.type ignore_above: 1024 level: core name: data.type normalize: [] original_fieldset: registry short: Standard registry type for encoding contents type: keyword threat.indicator.registry.hive: dashed_name: threat-indicator-registry-hive description: Abbreviated name for the hive. example: HKLM flat_name: threat.indicator.registry.hive ignore_above: 1024 level: core name: hive normalize: [] original_fieldset: registry short: Abbreviated name for the hive. type: keyword threat.indicator.registry.key: dashed_name: threat-indicator-registry-key description: Hive-relative path of keys. example: SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\winword.exe flat_name: threat.indicator.registry.key ignore_above: 1024 level: core name: key normalize: [] original_fieldset: registry short: Hive-relative path of keys. type: keyword threat.indicator.registry.path: dashed_name: threat-indicator-registry-path description: Full path, including hive, key and value example: HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\winword.exe\Debugger flat_name: threat.indicator.registry.path ignore_above: 1024 level: core name: path normalize: [] original_fieldset: registry short: Full path, including hive, key and value type: keyword threat.indicator.registry.value: dashed_name: threat-indicator-registry-value description: Name of the value written. example: Debugger flat_name: threat.indicator.registry.value ignore_above: 1024 level: core name: value normalize: [] original_fieldset: registry short: Name of the value written. type: keyword threat.indicator.scanner_stats: dashed_name: threat-indicator-scanner-stats description: Count of AV/EDR vendors that successfully detected malicious file or URL. example: 4 flat_name: threat.indicator.scanner_stats level: extended name: indicator.scanner_stats normalize: [] short: Scanner statistics type: long threat.indicator.sightings: dashed_name: threat-indicator-sightings description: Number of times this indicator was observed conducting threat activity. example: 20 flat_name: threat.indicator.sightings level: extended name: indicator.sightings normalize: [] short: Number of times indicator observed type: long threat.indicator.type: dashed_name: threat-indicator-type description: Type of indicator as represented by Cyber Observable in STIX 2.0. example: ipv4-addr expected_values: - autonomous-system - artifact - directory - domain-name - email-addr - file - ipv4-addr - ipv6-addr - mac-addr - mutex - port - process - software - url - user-account - windows-registry-key - x509-certificate flat_name: threat.indicator.type ignore_above: 1024 level: extended name: indicator.type normalize: [] short: Type of indicator type: keyword threat.indicator.url.domain: dashed_name: threat-indicator-url-domain description: 'Domain of the url, such as "www.elastic.co". In some cases a URL may refer to an IP and/or port directly, without a domain name. In this case, the IP address would go to the `domain` field. If the URL contains a literal IPv6 address enclosed by `[` and `]` (IETF RFC 2732), the `[` and `]` characters should also be captured in the `domain` field.' example: www.elastic.co flat_name: threat.indicator.url.domain ignore_above: 1024 level: extended name: domain normalize: [] original_fieldset: url short: Domain of the url. type: keyword threat.indicator.url.extension: dashed_name: threat-indicator-url-extension description: 'The field contains the file extension from the original request url, excluding the leading dot. The file extension is only set if it exists, as not every url has a file extension. The leading period must not be included. For example, the value must be "png", not ".png". Note that when the file name has multiple extensions (example.tar.gz), only the last one should be captured ("gz", not "tar.gz").' example: png flat_name: threat.indicator.url.extension ignore_above: 1024 level: extended name: extension normalize: [] original_fieldset: url short: File extension from the request url, excluding the leading dot. type: keyword threat.indicator.url.fragment: dashed_name: threat-indicator-url-fragment description: 'Portion of the url after the `#`, such as "top". The `#` is not part of the fragment.' flat_name: threat.indicator.url.fragment ignore_above: 1024 level: extended name: fragment normalize: [] original_fieldset: url short: Portion of the url after the `#`. type: keyword threat.indicator.url.full: dashed_name: threat-indicator-url-full description: If full URLs are important to your use case, they should be stored in `url.full`, whether this field is reconstructed or present in the event source. example: https://www.elastic.co:443/search?q=elasticsearch#top flat_name: threat.indicator.url.full level: extended multi_fields: - flat_name: threat.indicator.url.full.text name: text type: match_only_text name: full normalize: [] original_fieldset: url short: Full unparsed URL. type: wildcard threat.indicator.url.original: dashed_name: threat-indicator-url-original description: 'Unmodified original url as seen in the event source. Note that in network monitoring, the observed URL may be a full URL, whereas in access logs, the URL is often just represented as a path. This field is meant to represent the URL as it was observed, complete or not.' example: https://www.elastic.co:443/search?q=elasticsearch#top or /search?q=elasticsearch flat_name: threat.indicator.url.original level: extended multi_fields: - flat_name: threat.indicator.url.original.text name: text type: match_only_text name: original normalize: [] original_fieldset: url short: Unmodified original url as seen in the event source. type: wildcard threat.indicator.url.password: dashed_name: threat-indicator-url-password description: Password of the request. flat_name: threat.indicator.url.password ignore_above: 1024 level: extended name: password normalize: [] original_fieldset: url short: Password of the request. type: keyword threat.indicator.url.path: dashed_name: threat-indicator-url-path description: Path of the request, such as "/search". flat_name: threat.indicator.url.path level: extended name: path normalize: [] original_fieldset: url short: Path of the request, such as "/search". type: wildcard threat.indicator.url.port: dashed_name: threat-indicator-url-port description: Port of the request, such as 443. example: 443 flat_name: threat.indicator.url.port format: string level: extended name: port normalize: [] original_fieldset: url short: Port of the request, such as 443. type: long threat.indicator.url.query: dashed_name: threat-indicator-url-query description: 'The query field describes the query string of the request, such as "q=elasticsearch". The `?` is excluded from the query string. If a URL contains no `?`, there is no query field. If there is a `?` but no query, the query field exists with an empty string. The `exists` query can be used to differentiate between the two cases.' flat_name: threat.indicator.url.query ignore_above: 1024 level: extended name: query normalize: [] original_fieldset: url short: Query string of the request. type: keyword threat.indicator.url.registered_domain: dashed_name: threat-indicator-url-registered-domain description: 'The highest registered url domain, stripped of the subdomain. For example, the registered domain for "foo.example.com" is "example.com". This value can be determined precisely with a list like the public suffix list (http://publicsuffix.org). Trying to approximate this by simply taking the last two labels will not work well for TLDs such as "co.uk".' example: example.com flat_name: threat.indicator.url.registered_domain ignore_above: 1024 level: extended name: registered_domain normalize: [] original_fieldset: url short: The highest registered url domain, stripped of the subdomain. type: keyword threat.indicator.url.scheme: dashed_name: threat-indicator-url-scheme description: 'Scheme of the request, such as "https". Note: The `:` is not part of the scheme.' example: https flat_name: threat.indicator.url.scheme ignore_above: 1024 level: extended name: scheme normalize: [] original_fieldset: url short: Scheme of the url. type: keyword threat.indicator.url.subdomain: dashed_name: threat-indicator-url-subdomain description: 'The subdomain portion of a fully qualified domain name includes all of the names except the host name under the registered_domain. In a partially qualified domain, or if the the qualification level of the full name cannot be determined, subdomain contains all of the names below the registered domain. For example the subdomain portion of "www.east.mydomain.co.uk" is "east". If the domain has multiple levels of subdomain, such as "sub2.sub1.example.com", the subdomain field should contain "sub2.sub1", with no trailing period.' example: east flat_name: threat.indicator.url.subdomain ignore_above: 1024 level: extended name: subdomain normalize: [] original_fieldset: url short: The subdomain of the domain. type: keyword threat.indicator.url.top_level_domain: dashed_name: threat-indicator-url-top-level-domain description: 'The effective top level domain (eTLD), also known as the domain suffix, is the last part of the domain name. For example, the top level domain for example.com is "com". This value can be determined precisely with a list like the public suffix list (http://publicsuffix.org). Trying to approximate this by simply taking the last label will not work well for effective TLDs such as "co.uk".' example: co.uk flat_name: threat.indicator.url.top_level_domain ignore_above: 1024 level: extended name: top_level_domain normalize: [] original_fieldset: url short: The effective top level domain (com, org, net, co.uk). type: keyword threat.indicator.url.username: dashed_name: threat-indicator-url-username description: Username of the request. flat_name: threat.indicator.url.username ignore_above: 1024 level: extended name: username normalize: [] original_fieldset: url short: Username of the request. type: keyword threat.indicator.x509.alternative_names: dashed_name: threat-indicator-x509-alternative-names description: List of subject alternative names (SAN). Name types vary by certificate authority and certificate type but commonly contain IP addresses, DNS names (and wildcards), and email addresses. example: '*.elastic.co' flat_name: threat.indicator.x509.alternative_names ignore_above: 1024 level: extended name: alternative_names normalize: - array original_fieldset: x509 short: List of subject alternative names (SAN). type: keyword threat.indicator.x509.issuer.common_name: dashed_name: threat-indicator-x509-issuer-common-name description: List of common name (CN) of issuing certificate authority. example: Example SHA2 High Assurance Server CA flat_name: threat.indicator.x509.issuer.common_name ignore_above: 1024 level: extended name: issuer.common_name normalize: - array original_fieldset: x509 short: List of common name (CN) of issuing certificate authority. type: keyword threat.indicator.x509.issuer.country: dashed_name: threat-indicator-x509-issuer-country description: List of country \(C) codes example: US flat_name: threat.indicator.x509.issuer.country ignore_above: 1024 level: extended name: issuer.country normalize: - array original_fieldset: x509 short: List of country \(C) codes type: keyword threat.indicator.x509.issuer.distinguished_name: dashed_name: threat-indicator-x509-issuer-distinguished-name description: Distinguished name (DN) of issuing certificate authority. example: C=US, O=Example Inc, OU=www.example.com, CN=Example SHA2 High Assurance Server CA flat_name: threat.indicator.x509.issuer.distinguished_name ignore_above: 1024 level: extended name: issuer.distinguished_name normalize: [] original_fieldset: x509 short: Distinguished name (DN) of issuing certificate authority. type: keyword threat.indicator.x509.issuer.locality: dashed_name: threat-indicator-x509-issuer-locality description: List of locality names (L) example: Mountain View flat_name: threat.indicator.x509.issuer.locality ignore_above: 1024 level: extended name: issuer.locality normalize: - array original_fieldset: x509 short: List of locality names (L) type: keyword threat.indicator.x509.issuer.organization: dashed_name: threat-indicator-x509-issuer-organization description: List of organizations (O) of issuing certificate authority. example: Example Inc flat_name: threat.indicator.x509.issuer.organization ignore_above: 1024 level: extended name: issuer.organization normalize: - array original_fieldset: x509 short: List of organizations (O) of issuing certificate authority. type: keyword threat.indicator.x509.issuer.organizational_unit: dashed_name: threat-indicator-x509-issuer-organizational-unit description: List of organizational units (OU) of issuing certificate authority. example: www.example.com flat_name: threat.indicator.x509.issuer.organizational_unit ignore_above: 1024 level: extended name: issuer.organizational_unit normalize: - array original_fieldset: x509 short: List of organizational units (OU) of issuing certificate authority. type: keyword threat.indicator.x509.issuer.state_or_province: dashed_name: threat-indicator-x509-issuer-state-or-province description: List of state or province names (ST, S, or P) example: California flat_name: threat.indicator.x509.issuer.state_or_province ignore_above: 1024 level: extended name: issuer.state_or_province normalize: - array original_fieldset: x509 short: List of state or province names (ST, S, or P) type: keyword threat.indicator.x509.not_after: dashed_name: threat-indicator-x509-not-after description: Time at which the certificate is no longer considered valid. example: '2020-07-16T03:15:39Z' flat_name: threat.indicator.x509.not_after level: extended name: not_after normalize: [] original_fieldset: x509 short: Time at which the certificate is no longer considered valid. type: date threat.indicator.x509.not_before: dashed_name: threat-indicator-x509-not-before description: Time at which the certificate is first considered valid. example: '2019-08-16T01:40:25Z' flat_name: threat.indicator.x509.not_before level: extended name: not_before normalize: [] original_fieldset: x509 short: Time at which the certificate is first considered valid. type: date threat.indicator.x509.public_key_algorithm: dashed_name: threat-indicator-x509-public-key-algorithm description: Algorithm used to generate the public key. example: RSA flat_name: threat.indicator.x509.public_key_algorithm ignore_above: 1024 level: extended name: public_key_algorithm normalize: [] original_fieldset: x509 short: Algorithm used to generate the public key. type: keyword threat.indicator.x509.public_key_curve: dashed_name: threat-indicator-x509-public-key-curve description: The curve used by the elliptic curve public key algorithm. This is algorithm specific. example: nistp521 flat_name: threat.indicator.x509.public_key_curve ignore_above: 1024 level: extended name: public_key_curve normalize: [] original_fieldset: x509 short: The curve used by the elliptic curve public key algorithm. This is algorithm specific. type: keyword threat.indicator.x509.public_key_exponent: dashed_name: threat-indicator-x509-public-key-exponent description: Exponent used to derive the public key. This is algorithm specific. doc_values: false example: 65537 flat_name: threat.indicator.x509.public_key_exponent index: false level: extended name: public_key_exponent normalize: [] original_fieldset: x509 short: Exponent used to derive the public key. This is algorithm specific. type: long threat.indicator.x509.public_key_size: dashed_name: threat-indicator-x509-public-key-size description: The size of the public key space in bits. example: 2048 flat_name: threat.indicator.x509.public_key_size level: extended name: public_key_size normalize: [] original_fieldset: x509 short: The size of the public key space in bits. type: long threat.indicator.x509.serial_number: dashed_name: threat-indicator-x509-serial-number description: Unique serial number issued by the certificate authority. For consistency, if this value is alphanumeric, it should be formatted without colons and uppercase characters. example: 55FBB9C7DEBF09809D12CCAA flat_name: threat.indicator.x509.serial_number ignore_above: 1024 level: extended name: serial_number normalize: [] original_fieldset: x509 short: Unique serial number issued by the certificate authority. type: keyword threat.indicator.x509.signature_algorithm: dashed_name: threat-indicator-x509-signature-algorithm description: Identifier for certificate signature algorithm. We recommend using names found in Go Lang Crypto library. See https://github.com/golang/go/blob/go1.14/src/crypto/x509/x509.go#L337-L353. example: SHA256-RSA flat_name: threat.indicator.x509.signature_algorithm ignore_above: 1024 level: extended name: signature_algorithm normalize: [] original_fieldset: x509 short: Identifier for certificate signature algorithm. type: keyword threat.indicator.x509.subject.common_name: dashed_name: threat-indicator-x509-subject-common-name description: List of common names (CN) of subject. example: shared.global.example.net flat_name: threat.indicator.x509.subject.common_name ignore_above: 1024 level: extended name: subject.common_name normalize: - array original_fieldset: x509 short: List of common names (CN) of subject. type: keyword threat.indicator.x509.subject.country: dashed_name: threat-indicator-x509-subject-country description: List of country \(C) code example: US flat_name: threat.indicator.x509.subject.country ignore_above: 1024 level: extended name: subject.country normalize: - array original_fieldset: x509 short: List of country \(C) code type: keyword threat.indicator.x509.subject.distinguished_name: dashed_name: threat-indicator-x509-subject-distinguished-name description: Distinguished name (DN) of the certificate subject entity. example: C=US, ST=California, L=San Francisco, O=Example, Inc., CN=shared.global.example.net flat_name: threat.indicator.x509.subject.distinguished_name ignore_above: 1024 level: extended name: subject.distinguished_name normalize: [] original_fieldset: x509 short: Distinguished name (DN) of the certificate subject entity. type: keyword threat.indicator.x509.subject.locality: dashed_name: threat-indicator-x509-subject-locality description: List of locality names (L) example: San Francisco flat_name: threat.indicator.x509.subject.locality ignore_above: 1024 level: extended name: subject.locality normalize: - array original_fieldset: x509 short: List of locality names (L) type: keyword threat.indicator.x509.subject.organization: dashed_name: threat-indicator-x509-subject-organization description: List of organizations (O) of subject. example: Example, Inc. flat_name: threat.indicator.x509.subject.organization ignore_above: 1024 level: extended name: subject.organization normalize: - array original_fieldset: x509 short: List of organizations (O) of subject. type: keyword threat.indicator.x509.subject.organizational_unit: dashed_name: threat-indicator-x509-subject-organizational-unit description: List of organizational units (OU) of subject. flat_name: threat.indicator.x509.subject.organizational_unit ignore_above: 1024 level: extended name: subject.organizational_unit normalize: - array original_fieldset: x509 short: List of organizational units (OU) of subject. type: keyword threat.indicator.x509.subject.state_or_province: dashed_name: threat-indicator-x509-subject-state-or-province description: List of state or province names (ST, S, or P) example: California flat_name: threat.indicator.x509.subject.state_or_province ignore_above: 1024 level: extended name: subject.state_or_province normalize: - array original_fieldset: x509 short: List of state or province names (ST, S, or P) type: keyword threat.indicator.x509.version_number: dashed_name: threat-indicator-x509-version-number description: Version of x509 format. example: 3 flat_name: threat.indicator.x509.version_number ignore_above: 1024 level: extended name: version_number normalize: [] original_fieldset: x509 short: Version of x509 format. type: keyword threat.software.id: dashed_name: threat-software-id description: "The id of the software used by this threat to conduct behavior commonly\ \ modeled using MITRE ATT&CK\xAE.\nWhile not required, you can use a MITRE ATT&CK\xAE\ \ software id." example: S0552 flat_name: threat.software.id ignore_above: 1024 level: extended name: software.id normalize: [] short: ID of the software type: keyword threat.software.name: dashed_name: threat-software-name description: "The name of the software used by this threat to conduct behavior commonly\ \ modeled using MITRE ATT&CK\xAE.\nWhile not required, you can use a MITRE ATT&CK\xAE\ \ software name." example: AdFind flat_name: threat.software.name ignore_above: 1024 level: extended name: software.name normalize: [] short: Name of the software. type: keyword threat.software.platforms: dashed_name: threat-software-platforms description: "The platforms of the software used by this threat to conduct behavior\ \ commonly modeled using MITRE ATT&CK\xAE.\nWhile not required, you can use MITRE\ \ ATT&CK\xAE software platform values." example: '[ "Windows" ]' expected_values: - AWS - Azure - Azure AD - GCP - Linux - macOS - Network - Office 365 - SaaS - Windows flat_name: threat.software.platforms ignore_above: 1024 level: extended name: software.platforms normalize: - array short: Platforms of the software. type: keyword threat.software.reference: dashed_name: threat-software-reference description: "The reference URL of the software used by this threat to conduct behavior\ \ commonly modeled using MITRE ATT&CK\xAE.\nWhile not required, you can use a\ \ MITRE ATT&CK\xAE software reference URL." example: https://attack.mitre.org/software/S0552/ flat_name: threat.software.reference ignore_above: 1024 level: extended name: software.reference normalize: [] short: Software reference URL. type: keyword threat.software.type: dashed_name: threat-software-type description: "The type of software used by this threat to conduct behavior commonly\ \ modeled using MITRE ATT&CK\xAE.\nWhile not required, you can use a MITRE ATT&CK\xAE\ \ software type." example: Tool expected_values: - Malware - Tool flat_name: threat.software.type ignore_above: 1024 level: extended name: software.type normalize: [] short: Software type. type: keyword threat.tactic.id: dashed_name: threat-tactic-id description: "The id of tactic used by this threat. You can use a MITRE ATT&CK\xAE\ \ tactic, for example. (ex. https://attack.mitre.org/tactics/TA0002/ )" example: TA0002 flat_name: threat.tactic.id ignore_above: 1024 level: extended name: tactic.id normalize: - array short: Threat tactic id. type: keyword threat.tactic.name: dashed_name: threat-tactic-name description: "Name of the type of tactic used by this threat. You can use a MITRE\ \ ATT&CK\xAE tactic, for example. (ex. https://attack.mitre.org/tactics/TA0002/)" example: Execution flat_name: threat.tactic.name ignore_above: 1024 level: extended name: tactic.name normalize: - array short: Threat tactic. type: keyword threat.tactic.reference: dashed_name: threat-tactic-reference description: "The reference url of tactic used by this threat. You can use a MITRE\ \ ATT&CK\xAE tactic, for example. (ex. https://attack.mitre.org/tactics/TA0002/\ \ )" example: https://attack.mitre.org/tactics/TA0002/ flat_name: threat.tactic.reference ignore_above: 1024 level: extended name: tactic.reference normalize: - array short: Threat tactic URL reference. type: keyword threat.technique.id: dashed_name: threat-technique-id description: "The id of technique used by this threat. You can use a MITRE ATT&CK\xAE\ \ technique, for example. (ex. https://attack.mitre.org/techniques/T1059/)" example: T1059 flat_name: threat.technique.id ignore_above: 1024 level: extended name: technique.id normalize: - array short: Threat technique id. type: keyword threat.technique.name: dashed_name: threat-technique-name description: "The name of technique used by this threat. You can use a MITRE ATT&CK\xAE\ \ technique, for example. (ex. https://attack.mitre.org/techniques/T1059/)" example: Command and Scripting Interpreter flat_name: threat.technique.name ignore_above: 1024 level: extended multi_fields: - flat_name: threat.technique.name.text name: text type: match_only_text name: technique.name normalize: - array short: Threat technique name. type: keyword threat.technique.reference: dashed_name: threat-technique-reference description: "The reference url of technique used by this threat. You can use a\ \ MITRE ATT&CK\xAE technique, for example. (ex. https://attack.mitre.org/techniques/T1059/)" example: https://attack.mitre.org/techniques/T1059/ flat_name: threat.technique.reference ignore_above: 1024 level: extended name: technique.reference normalize: - array short: Threat technique URL reference. type: keyword threat.technique.subtechnique.id: dashed_name: threat-technique-subtechnique-id description: "The full id of subtechnique used by this threat. You can use a MITRE\ \ ATT&CK\xAE subtechnique, for example. (ex. https://attack.mitre.org/techniques/T1059/001/)" example: T1059.001 flat_name: threat.technique.subtechnique.id ignore_above: 1024 level: extended name: technique.subtechnique.id normalize: - array short: Threat subtechnique id. type: keyword threat.technique.subtechnique.name: dashed_name: threat-technique-subtechnique-name description: "The name of subtechnique used by this threat. You can use a MITRE\ \ ATT&CK\xAE subtechnique, for example. (ex. https://attack.mitre.org/techniques/T1059/001/)" example: PowerShell flat_name: threat.technique.subtechnique.name ignore_above: 1024 level: extended multi_fields: - flat_name: threat.technique.subtechnique.name.text name: text type: match_only_text name: technique.subtechnique.name normalize: - array short: Threat subtechnique name. type: keyword threat.technique.subtechnique.reference: dashed_name: threat-technique-subtechnique-reference description: "The reference url of subtechnique used by this threat. You can use\ \ a MITRE ATT&CK\xAE subtechnique, for example. (ex. https://attack.mitre.org/techniques/T1059/001/)" example: https://attack.mitre.org/techniques/T1059/001/ flat_name: threat.technique.subtechnique.reference ignore_above: 1024 level: extended name: technique.subtechnique.reference normalize: - array short: Threat subtechnique URL reference. type: keyword