@@ -7735,6 +7735,280 @@ example: `https://attack.mitre.org/groups/G0037/`
7735
7735
7736
7736
// ===============================================================
7737
7737
7738
+ |
7739
+ [[field-threat-indicator-confidence]]
7740
+ <<field-threat-indicator-confidence, threat.indicator.confidence>>
7741
+
7742
+ | beta:[ This field is beta and subject to change. ]
7743
+
7744
+ Identifies the confidence rating assigned by the provider using STIX confidence scales.
7745
+
7746
+ Recommended values:
7747
+
7748
+ * Not Specified, None, Low, Medium, High
7749
+
7750
+ * 0-10
7751
+
7752
+ * Admirality Scale (1-6)
7753
+
7754
+ * DNI Scale (5-95)
7755
+
7756
+ * WEP Scale (Impossible - Certain)
7757
+
7758
+ type: keyword
7759
+
7760
+
7761
+
7762
+ example: `High`
7763
+
7764
+ | extended
7765
+
7766
+ // ===============================================================
7767
+
7768
+ |
7769
+ [[field-threat-indicator-description]]
7770
+ <<field-threat-indicator-description, threat.indicator.description>>
7771
+
7772
+ | beta:[ This field is beta and subject to change. ]
7773
+
7774
+ Describes the type of action conducted by the threat.
7775
+
7776
+ type: keyword
7777
+
7778
+
7779
+
7780
+ example: `IP x.x.x.x was observed delivering the Angler EK.`
7781
+
7782
+ | extended
7783
+
7784
+ // ===============================================================
7785
+
7786
+ |
7787
+ [[field-threat-indicator-email-address]]
7788
+ <<field-threat-indicator-email-address, threat.indicator.email.address>>
7789
+
7790
+ | beta:[ This field is beta and subject to change. ]
7791
+
7792
+ Identifies a threat indicator as an email address (irrespective of direction).
7793
+
7794
+ type: keyword
7795
+
7796
+
7797
+
7798
+ example: `phish@example.com`
7799
+
7800
+ | extended
7801
+
7802
+ // ===============================================================
7803
+
7804
+ |
7805
+ [[field-threat-indicator-first-seen]]
7806
+ <<field-threat-indicator-first-seen, threat.indicator.first_seen>>
7807
+
7808
+ | beta:[ This field is beta and subject to change. ]
7809
+
7810
+ The date and time when intelligence source first reported sighting this indicator.
7811
+
7812
+ type: date
7813
+
7814
+
7815
+
7816
+ example: `2020-11-05T17:25:47.000Z`
7817
+
7818
+ | extended
7819
+
7820
+ // ===============================================================
7821
+
7822
+ |
7823
+ [[field-threat-indicator-ip]]
7824
+ <<field-threat-indicator-ip, threat.indicator.ip>>
7825
+
7826
+ | beta:[ This field is beta and subject to change. ]
7827
+
7828
+ Identifies a threat indicator as an IP address (irrespective of direction).
7829
+
7830
+ type: ip
7831
+
7832
+
7833
+
7834
+ example: `1.2.3.4`
7835
+
7836
+ | extended
7837
+
7838
+ // ===============================================================
7839
+
7840
+ |
7841
+ [[field-threat-indicator-last-seen]]
7842
+ <<field-threat-indicator-last-seen, threat.indicator.last_seen>>
7843
+
7844
+ | beta:[ This field is beta and subject to change. ]
7845
+
7846
+ The date and time when intelligence source last reported sighting this indicator.
7847
+
7848
+ type: date
7849
+
7850
+
7851
+
7852
+ example: `2020-11-05T17:25:47.000Z`
7853
+
7854
+ | extended
7855
+
7856
+ // ===============================================================
7857
+
7858
+ |
7859
+ [[field-threat-indicator-marking-tlp]]
7860
+ <<field-threat-indicator-marking-tlp, threat.indicator.marking.tlp>>
7861
+
7862
+ | beta:[ This field is beta and subject to change. ]
7863
+
7864
+ Traffic Light Protocol sharing markings.
7865
+
7866
+ Recommended values are:
7867
+
7868
+ * WHITE
7869
+
7870
+ * GREEN
7871
+
7872
+ * AMBER
7873
+
7874
+ * RED
7875
+
7876
+ type: keyword
7877
+
7878
+
7879
+
7880
+ example: `WHITE`
7881
+
7882
+ | extended
7883
+
7884
+ // ===============================================================
7885
+
7886
+ |
7887
+ [[field-threat-indicator-modified-at]]
7888
+ <<field-threat-indicator-modified-at, threat.indicator.modified_at>>
7889
+
7890
+ | beta:[ This field is beta and subject to change. ]
7891
+
7892
+ The date and time when intelligence source last modified information for this indicator.
7893
+
7894
+ type: date
7895
+
7896
+
7897
+
7898
+ example: `2020-11-05T17:25:47.000Z`
7899
+
7900
+ | extended
7901
+
7902
+ // ===============================================================
7903
+
7904
+ |
7905
+ [[field-threat-indicator-port]]
7906
+ <<field-threat-indicator-port, threat.indicator.port>>
7907
+
7908
+ | beta:[ This field is beta and subject to change. ]
7909
+
7910
+ Identifies a threat indicator as a port number (irrespective of direction).
7911
+
7912
+ type: long
7913
+
7914
+
7915
+
7916
+ example: `443`
7917
+
7918
+ | extended
7919
+
7920
+ // ===============================================================
7921
+
7922
+ |
7923
+ [[field-threat-indicator-scanner-stats]]
7924
+ <<field-threat-indicator-scanner-stats, threat.indicator.scanner_stats>>
7925
+
7926
+ | beta:[ This field is beta and subject to change. ]
7927
+
7928
+ Count of AV/EDR vendors that successfully detected malicious file or URL.
7929
+
7930
+ type: long
7931
+
7932
+
7933
+
7934
+ example: `4`
7935
+
7936
+ | extended
7937
+
7938
+ // ===============================================================
7939
+
7940
+ |
7941
+ [[field-threat-indicator-sightings]]
7942
+ <<field-threat-indicator-sightings, threat.indicator.sightings>>
7943
+
7944
+ | beta:[ This field is beta and subject to change. ]
7945
+
7946
+ Number of times this indicator was observed conducting threat activity.
7947
+
7948
+ type: long
7949
+
7950
+
7951
+
7952
+ example: `20`
7953
+
7954
+ | extended
7955
+
7956
+ // ===============================================================
7957
+
7958
+ |
7959
+ [[field-threat-indicator-type]]
7960
+ <<field-threat-indicator-type, threat.indicator.type>>
7961
+
7962
+ | beta:[ This field is beta and subject to change. ]
7963
+
7964
+ Type of indicator as represented by Cyber Observable in STIX 2.0.
7965
+
7966
+ Recommended values:
7967
+
7968
+ * autonomous-system
7969
+
7970
+ * artifact
7971
+
7972
+ * directory
7973
+
7974
+ * domain-name
7975
+
7976
+ * email-addr
7977
+
7978
+ * file
7979
+
7980
+ * ipv4-addr
7981
+
7982
+ * ipv6-addr
7983
+
7984
+ * mac-addr
7985
+
7986
+ * mutex
7987
+
7988
+ * port
7989
+
7990
+ * process
7991
+
7992
+ * software
7993
+
7994
+ * url
7995
+
7996
+ * user-account
7997
+
7998
+ * windows-registry-key
7999
+
8000
+ * x509-certificate
8001
+
8002
+ type: keyword
8003
+
8004
+
8005
+
8006
+ example: `ipv4-addr`
8007
+
8008
+ | extended
8009
+
8010
+ // ===============================================================
8011
+
7738
8012
|
7739
8013
[[field-threat-software-id]]
7740
8014
<<field-threat-software-id, threat.software.id>>
0 commit comments