@@ -7726,6 +7726,280 @@ example: `https://attack.mitre.org/groups/G0037/`
7726
7726
7727
7727
// ===============================================================
7728
7728
7729
+ |
7730
+ [[field-threat-indicator-confidence]]
7731
+ <<field-threat-indicator-confidence, threat.indicator.confidence>>
7732
+
7733
+ | beta:[ This field is beta and subject to change. ]
7734
+
7735
+ Identifies the confidence rating assigned by the provider using STIX confidence scales.
7736
+
7737
+ Recommended values:
7738
+
7739
+ * Not Specified, None, Low, Medium, High
7740
+
7741
+ * 0-10
7742
+
7743
+ * Admirality Scale (1-6)
7744
+
7745
+ * DNI Scale (5-95)
7746
+
7747
+ * WEP Scale (Impossible - Certain)
7748
+
7749
+ type: keyword
7750
+
7751
+
7752
+
7753
+ example: `High`
7754
+
7755
+ | extended
7756
+
7757
+ // ===============================================================
7758
+
7759
+ |
7760
+ [[field-threat-indicator-description]]
7761
+ <<field-threat-indicator-description, threat.indicator.description>>
7762
+
7763
+ | beta:[ This field is beta and subject to change. ]
7764
+
7765
+ Describes the type of action conducted by the threat.
7766
+
7767
+ type: keyword
7768
+
7769
+
7770
+
7771
+ example: `IP x.x.x.x was observed delivering the Angler EK.`
7772
+
7773
+ | extended
7774
+
7775
+ // ===============================================================
7776
+
7777
+ |
7778
+ [[field-threat-indicator-email-address]]
7779
+ <<field-threat-indicator-email-address, threat.indicator.email.address>>
7780
+
7781
+ | beta:[ This field is beta and subject to change. ]
7782
+
7783
+ Identifies a threat indicator as an email address (irrespective of direction).
7784
+
7785
+ type: keyword
7786
+
7787
+
7788
+
7789
+ example: `phish@example.com`
7790
+
7791
+ | extended
7792
+
7793
+ // ===============================================================
7794
+
7795
+ |
7796
+ [[field-threat-indicator-first-seen]]
7797
+ <<field-threat-indicator-first-seen, threat.indicator.first_seen>>
7798
+
7799
+ | beta:[ This field is beta and subject to change. ]
7800
+
7801
+ The date and time when intelligence source first reported sighting this indicator.
7802
+
7803
+ type: date
7804
+
7805
+
7806
+
7807
+ example: `2020-11-05T17:25:47.000Z`
7808
+
7809
+ | extended
7810
+
7811
+ // ===============================================================
7812
+
7813
+ |
7814
+ [[field-threat-indicator-ip]]
7815
+ <<field-threat-indicator-ip, threat.indicator.ip>>
7816
+
7817
+ | beta:[ This field is beta and subject to change. ]
7818
+
7819
+ Identifies a threat indicator as an IP address (irrespective of direction).
7820
+
7821
+ type: ip
7822
+
7823
+
7824
+
7825
+ example: `1.2.3.4`
7826
+
7827
+ | extended
7828
+
7829
+ // ===============================================================
7830
+
7831
+ |
7832
+ [[field-threat-indicator-last-seen]]
7833
+ <<field-threat-indicator-last-seen, threat.indicator.last_seen>>
7834
+
7835
+ | beta:[ This field is beta and subject to change. ]
7836
+
7837
+ The date and time when intelligence source last reported sighting this indicator.
7838
+
7839
+ type: date
7840
+
7841
+
7842
+
7843
+ example: `2020-11-05T17:25:47.000Z`
7844
+
7845
+ | extended
7846
+
7847
+ // ===============================================================
7848
+
7849
+ |
7850
+ [[field-threat-indicator-marking-tlp]]
7851
+ <<field-threat-indicator-marking-tlp, threat.indicator.marking.tlp>>
7852
+
7853
+ | beta:[ This field is beta and subject to change. ]
7854
+
7855
+ Traffic Light Protocol sharing markings.
7856
+
7857
+ Recommended values are:
7858
+
7859
+ * WHITE
7860
+
7861
+ * GREEN
7862
+
7863
+ * AMBER
7864
+
7865
+ * RED
7866
+
7867
+ type: keyword
7868
+
7869
+
7870
+
7871
+ example: `WHITE`
7872
+
7873
+ | extended
7874
+
7875
+ // ===============================================================
7876
+
7877
+ |
7878
+ [[field-threat-indicator-modified-at]]
7879
+ <<field-threat-indicator-modified-at, threat.indicator.modified_at>>
7880
+
7881
+ | beta:[ This field is beta and subject to change. ]
7882
+
7883
+ The date and time when intelligence source last modified information for this indicator.
7884
+
7885
+ type: date
7886
+
7887
+
7888
+
7889
+ example: `2020-11-05T17:25:47.000Z`
7890
+
7891
+ | extended
7892
+
7893
+ // ===============================================================
7894
+
7895
+ |
7896
+ [[field-threat-indicator-port]]
7897
+ <<field-threat-indicator-port, threat.indicator.port>>
7898
+
7899
+ | beta:[ This field is beta and subject to change. ]
7900
+
7901
+ Identifies a threat indicator as a port number (irrespective of direction).
7902
+
7903
+ type: long
7904
+
7905
+
7906
+
7907
+ example: `443`
7908
+
7909
+ | extended
7910
+
7911
+ // ===============================================================
7912
+
7913
+ |
7914
+ [[field-threat-indicator-scanner-stats]]
7915
+ <<field-threat-indicator-scanner-stats, threat.indicator.scanner_stats>>
7916
+
7917
+ | beta:[ This field is beta and subject to change. ]
7918
+
7919
+ Count of AV/EDR vendors that successfully detected malicious file or URL.
7920
+
7921
+ type: long
7922
+
7923
+
7924
+
7925
+ example: `4`
7926
+
7927
+ | extended
7928
+
7929
+ // ===============================================================
7930
+
7931
+ |
7932
+ [[field-threat-indicator-sightings]]
7933
+ <<field-threat-indicator-sightings, threat.indicator.sightings>>
7934
+
7935
+ | beta:[ This field is beta and subject to change. ]
7936
+
7937
+ Number of times this indicator was observed conducting threat activity.
7938
+
7939
+ type: long
7940
+
7941
+
7942
+
7943
+ example: `20`
7944
+
7945
+ | extended
7946
+
7947
+ // ===============================================================
7948
+
7949
+ |
7950
+ [[field-threat-indicator-type]]
7951
+ <<field-threat-indicator-type, threat.indicator.type>>
7952
+
7953
+ | beta:[ This field is beta and subject to change. ]
7954
+
7955
+ Type of indicator as represented by Cyber Observable in STIX 2.0.
7956
+
7957
+ Recommended values:
7958
+
7959
+ * autonomous-system
7960
+
7961
+ * artifact
7962
+
7963
+ * directory
7964
+
7965
+ * domain-name
7966
+
7967
+ * email-addr
7968
+
7969
+ * file
7970
+
7971
+ * ipv4-addr
7972
+
7973
+ * ipv6-addr
7974
+
7975
+ * mac-addr
7976
+
7977
+ * mutex
7978
+
7979
+ * port
7980
+
7981
+ * process
7982
+
7983
+ * software
7984
+
7985
+ * url
7986
+
7987
+ * user-account
7988
+
7989
+ * windows-registry-key
7990
+
7991
+ * x509-certificate
7992
+
7993
+ type: keyword
7994
+
7995
+
7996
+
7997
+ example: `ipv4-addr`
7998
+
7999
+ | extended
8000
+
8001
+ // ===============================================================
8002
+
7729
8003
|
7730
8004
[[field-threat-software-id]]
7731
8005
<<field-threat-software-id, threat.software.id>>
0 commit comments