Synapse Data Model - Forms
Forms
Forms are derived from types, or base types. Forms represent node types in the graph.
auth:access
An instance of using creds to access a resource.
The base type for the form can be found at auth:access.
- Properties:
name
type
doc
:creds
The credentials used to attempt access.
:time
The time of the access attempt.
:success
Set to true if the access was successful.
:person
The person who attempted access.
- Source Edges:
source
verb
target
doc
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
The source node was seen at the geo:telem node place and time.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
auth:creds
A unique set of credentials used to access a resource.
The base type for the form can be found at auth:creds.
- Properties:
name
type
doc
The email address used to identify the user.
:user
The user name used to identify the user.
:phone
The phone number used to identify the user.
:passwd
The password used to authenticate.
:passwdhash
The password hash used to authenticate.
:account
The account that the creds allow access to.
:website
The base URL of the website that the credentials allow access to.
:host
The host that the credentials allow access to.
:wifi:ssid
The WiFi SSID that the credentials allow access to.
:web:acct
The web account that the credentials allow access to.
- Source Edges:
source
verb
target
doc
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
The source node was seen at the geo:telem node place and time.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
belief:subscriber
A contact which subscribes to a belief system.
The base type for the form can be found at belief:subscriber.
- Properties:
name
type
doc
:contact
The contact which subscribes to the belief system.
:system
The belief system to which the contact subscribes.
:began
The time that the contact began to be a subscriber to the belief system.
:ended
The time when the contact ceased to be a subscriber to the belief system.
- Source Edges:
source
verb
target
doc
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
The source node was seen at the geo:telem node place and time.
belief:subscriber
-(follows)>
belief:tenet
The subscriber is assessed to generally adhere to the specific tenet.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
belief:system
A belief system such as an ideology, philosophy, or religion.
The base type for the form can be found at belief:system.
- Properties:
name
type
doc
opts
:name
The name of the belief system.
:desc
A description of the belief system.
Display:
{'hint': 'text'}
:type
A taxonometric type for the belief system.
:began
The time that the belief system was first observed.
- Source Edges:
source
verb
target
doc
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
The source node was seen at the geo:telem node place and time.
belief:system
-(has)>
belief:tenet
The belief system includes the tenet.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
belief:system:type:taxonomy
A hierarchical taxonomy of belief system types.
The base type for the form can be found at belief:system:type:taxonomy.
- Properties:
name
type
doc
opts
:title
A brief title of the definition.
:summary
Deprecated. Please use title/desc.
Deprecated:True
Display:{'hint': 'text'}
:desc
A definition of the taxonomy entry.
Display:
{'hint': 'text'}
:sort
A display sort order for siblings.
:base
The base taxon.
Read Only:
True
:depth
The depth indexed from 0.
Read Only:
True
:parent
The taxonomy parent.
Read Only:
True
- Source Edges:
source
verb
target
doc
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
The source node was seen at the geo:telem node place and time.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
belief:tenet
A concrete tenet potentially shared by multiple belief systems.
The base type for the form can be found at belief:tenet.
- Properties:
name
type
doc
opts
:name
The name of the tenet.
:desc
A description of the tenet.
Display:
{'hint': 'text'}
- Source Edges:
source
verb
target
doc
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
The source node was seen at the geo:telem node place and time.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
belief:subscriber
-(follows)>
belief:tenet
The subscriber is assessed to generally adhere to the specific tenet.
belief:system
-(has)>
belief:tenet
The belief system includes the tenet.
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
biz:bundle
A bundle allows construction of products which bundle instances of other products.
The base type for the form can be found at biz:bundle.
- Properties:
name
type
doc
opts
:count
The number of instances of the product or service included in the bundle.
:price
The price of the bundle.
:product
The product included in the bundle.
:service
The service included in the bundle.
:deal
Deprecated. Please use econ:receipt:item for instances of bundles being sold.
Deprecated:
True
:purchase
Deprecated. Please use econ:receipt:item for instances of bundles being sold.
Deprecated:
True
- Source Edges:
source
verb
target
doc
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
The source node was seen at the geo:telem node place and time.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
biz:deal
A sales or procurement effort in pursuit of a purchase.
The base type for the form can be found at biz:deal.
- Properties:
name
type
doc
opts
:title
A title for the deal.
:type
The type of deal.
Display:
{'hint': 'taxonomy'}
:status
The status of the deal.
Display:
{'hint': 'taxonomy'}
:updated
The last time the deal had a significant update.
:contacted
The last time the contacts communicated about the deal.
:rfp
The RFP that the deal is in response to.
:buyer
The primary contact information for the buyer.
:buyer:org
The buyer org.
:buyer:orgname
The reported ou:name of the buyer org.
:buyer:orgfqdn
The reported inet:fqdn of the buyer org.
:seller
The primary contact information for the seller.
:seller:org
The seller org.
:seller:orgname
The reported ou:name of the seller org.
:seller:orgfqdn
The reported inet:fqdn of the seller org.
:currency
The currency of econ:price values associated with the deal.
:buyer:budget
The buyers budget for the eventual purchase.
:buyer:deadline
When the buyer intends to make a decision.
:offer:price
The total price of the offered products.
:offer:expires
When the offer expires.
:purchase
Records a purchase resulting from the deal.
- Source Edges:
source
verb
target
doc
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
The source node was seen at the geo:telem node place and time.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
biz:dealstatus
A deal/rfp status taxonomy.
The base type for the form can be found at biz:dealstatus.
- Properties:
name
type
doc
opts
:title
A brief title of the definition.
:summary
Deprecated. Please use title/desc.
Deprecated:True
Display:{'hint': 'text'}
:desc
A definition of the taxonomy entry.
Display:
{'hint': 'text'}
:sort
A display sort order for siblings.
:base
The base taxon.
Read Only:
True
:depth
The depth indexed from 0.
Read Only:
True
:parent
The taxonomy parent.
Read Only:
True
- Source Edges:
source
verb
target
doc
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
The source node was seen at the geo:telem node place and time.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
biz:dealtype
A deal type taxonomy.
The base type for the form can be found at biz:dealtype.
- Properties:
name
type
doc
opts
:title
A brief title of the definition.
:summary
Deprecated. Please use title/desc.
Deprecated:True
Display:{'hint': 'text'}
:desc
A definition of the taxonomy entry.
Display:
{'hint': 'text'}
:sort
A display sort order for siblings.
:base
The base taxon.
Read Only:
True
:depth
The depth indexed from 0.
Read Only:
True
:parent
The taxonomy parent.
Read Only:
True
- Source Edges:
source
verb
target
doc
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
The source node was seen at the geo:telem node place and time.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
biz:listing
A product or service being listed for sale at a given price by a specific seller.
The base type for the form can be found at biz:listing.
- Properties:
name
type
doc
:seller
The contact information for the seller.
:product
The product being offered.
:service
The service being offered.
:current
Set to true if the offer is still current.
:time
The first known offering of this product/service by the organization for the asking price.
:expires
Set if the offer has a known expiration date.
:price
The asking price of the product or service.
:currency
The currency of the asking price.
- Source Edges:
source
verb
target
doc
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
The source node was seen at the geo:telem node place and time.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
biz:prodtype
A product type taxonomy.
The base type for the form can be found at biz:prodtype.
- Properties:
name
type
doc
opts
:title
A brief title of the definition.
:summary
Deprecated. Please use title/desc.
Deprecated:True
Display:{'hint': 'text'}
:desc
A definition of the taxonomy entry.
Display:
{'hint': 'text'}
:sort
A display sort order for siblings.
:base
The base taxon.
Read Only:
True
:depth
The depth indexed from 0.
Read Only:
True
:parent
The taxonomy parent.
Read Only:
True
- Source Edges:
source
verb
target
doc
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
The source node was seen at the geo:telem node place and time.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
biz:product
A product which is available for purchase.
The base type for the form can be found at biz:product.
- Properties:
name
type
doc
opts
:name
The name of the product.
:type
The type of product.
Display:
{'hint': 'taxonomy'}
:summary
A brief summary of the product.
Display:
{'hint': 'text'}
:maker
A contact for the maker of the product.
:madeby:org
Deprecated. Please use biz:product:maker.
Deprecated:
True
:madeby:orgname
Deprecated. Please use biz:product:maker.
Deprecated:
True
:madeby:orgfqdn
Deprecated. Please use biz:product:maker.
Deprecated:
True
:price:retail
The MSRP price of the product.
:price:bottom
The minimum offered or observed price of the product.
:price:currency
The currency of the retail and bottom price properties.
:bundles
An array of bundles included with the product.
- Source Edges:
source
verb
target
doc
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
The source node was seen at the geo:telem node place and time.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
biz:rfp
An RFP (Request for Proposal) soliciting proposals.
The base type for the form can be found at biz:rfp.
- Properties:
name
type
doc
opts
:ext:id
An externally specified identifier for the RFP.
:title
The title of the RFP.
:summary
A brief summary of the RFP.
Display:
{'hint': 'text'}
:status
The status of the RFP.
Display:
{'hint': 'enum'}
:url
The official URL for the RFP.
:file
The RFP document.
:posted
The date/time that the RFP was posted.
:quesdue
The date/time that questions are due.
:propdue
The date/time that proposals are due.
:contact
The contact information given for the org requesting offers.
:purchases
Any known purchases that resulted from the RFP.
:requirements
A typed array which indexes each field.
- Source Edges:
source
verb
target
doc
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
The source node was seen at the geo:telem node place and time.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
biz:service
A service which is performed by a specific organization.
The base type for the form can be found at biz:service.
- Properties:
name
type
doc
opts
:provider
The contact info of the entity which performs the service.
:name
The name of the service being performed.
:summary
A brief summary of the service.
Display:
{'hint': 'text'}
:type
A taxonomy of service types.
:launched
The time when the operator first made the service available.
- Source Edges:
source
verb
target
doc
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
The source node was seen at the geo:telem node place and time.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
biz:stake
A stake or partial ownership in a company.
The base type for the form can be found at biz:stake.
- Properties:
name
type
doc
:vitals
The ou:vitals snapshot this stake is part of.
:org
The resolved org.
:orgname
The org name as reported by the source of the vitals.
:orgfqdn
The org FQDN as reported by the source of the vitals.
:name
An arbitrary name for this stake. Can be non-contact like “pool”.
:asof
The time the stake is being measured. Likely as part of an ou:vitals.
:shares
The number of shares represented by the stake.
:invested
The amount of money invested in the cap table iteration.
:value
The monetary value of the stake.
:percent
The percentage ownership represented by this stake.
:owner
Contact information of the owner of the stake.
:purchase
The purchase event for the stake.
- Source Edges:
source
verb
target
doc
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
The source node was seen at the geo:telem node place and time.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
crypto:algorithm
A cryptographic algorithm name.
The base type for the form can be found at crypto:algorithm.
An example of crypto:algorithm
:
aes256
- Source Edges:
source
verb
target
doc
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
The source node was seen at the geo:telem node place and time.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
crypto:currency:address
An individual crypto currency address.
The base type for the form can be found at crypto:currency:address.
An example of crypto:currency:address
:
btc/1BvBMSEYstWetqTFn5Au4m4GFg7xJaNVN2
- Properties:
name
type
doc
opts
:coin
The crypto coin to which the address belongs.
Read Only:
True
:seed
The cryptographic key and or password used to generate the address.
:iden
The coin specific address identifier.
Read Only:
True
:desc
A free-form description of the address.
:contact
Contact information associated with the address.
- Source Edges:
source
verb
target
doc
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
The source node was seen at the geo:telem node place and time.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
crypto:currency:block
An individual crypto currency block record on the blockchain.
The base type for the form can be found at crypto:currency:block.
- Properties:
name
type
doc
opts
:coin
The coin/blockchain this block resides on.
Read Only:
True
:offset
The index of this block.
Read Only:
True
:hash
The unique hash for the block.
:minedby
The address which mined the block.
:time
Time timestamp embedded in the block by the miner.
- Source Edges:
source
verb
target
doc
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
The source node was seen at the geo:telem node place and time.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
crypto:currency:client
A fused node representing a crypto currency address used by an Internet client.
The base type for the form can be found at crypto:currency:client.
An example of crypto:currency:client
:
(1.2.3.4, (btc, 1BvBMSEYstWetqTFn5Au4m4GFg7xJaNVN2))
- Properties:
name
type
doc
opts
:inetaddr
The Internet client address observed using the crypto currency address.
Read Only:
True
:coinaddr
The crypto currency address observed in use by the Internet client.
Read Only:
True
- Source Edges:
source
verb
target
doc
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
The source node was seen at the geo:telem node place and time.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
crypto:currency:coin
An individual crypto currency type.
The base type for the form can be found at crypto:currency:coin.
An example of crypto:currency:coin
:
btc
- Properties:
name
type
doc
:name
The full name of the crypto coin.
- Source Edges:
source
verb
target
doc
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
The source node was seen at the geo:telem node place and time.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
crypto:currency:transaction
An individual crypto currency transaction recorded on the blockchain.
The base type for the form can be found at crypto:currency:transaction.
- Properties:
name
type
doc
opts
:hash
The unique transaction hash for the transaction.
:desc
An analyst specified description of the transaction.
:block
The block which records the transaction.
:block:coin
The coin/blockchain of the block which records this transaction.
:block:offset
The offset of the block which records this transaction.
:success
Set to true if the transaction was successfully executed and recorded.
:status:code
A coin specific status code which may represent an error reason.
:status:message
A coin specific status message which may contain an error reason.
:to
The destination address of the transaction.
:from
The source address of the transaction.
:inputs
Deprecated. Please use crypto:payment:input:transaction.
Deprecated:
True
:outputs
Deprecated. Please use crypto:payment:output:transaction.
Deprecated:
True
:fee
The total fee paid to execute the transaction.
:value
The total value of the transaction.
:time
The time this transaction was initiated.
:eth:gasused
The amount of gas used to execute this transaction.
:eth:gaslimit
The ETH gas limit specified for this transaction.
:eth:gasprice
The gas price (in ETH) specified for this transaction.
:contract:input
Input value to a smart contract call.
:contract:output
Output value of a smart contract call.
- Source Edges:
source
verb
target
doc
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
The source node was seen at the geo:telem node place and time.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
crypto:key
A cryptographic key and algorithm.
The base type for the form can be found at crypto:key.
- Properties:
name
type
doc
opts
:algorithm
The cryptographic algorithm which uses the key material.
Example:
aes256
:mode
The algorithm specific mode in use.
:iv
The hex encoded initialization vector.
:public
The hex encoded public key material if the algorithm has a public/private key pair.
:public:md5
The MD5 hash of the public key in raw binary form.
:public:sha1
The SHA1 hash of the public key in raw binary form.
:public:sha256
The SHA256 hash of the public key in raw binary form.
:private
The hex encoded private key material. All symmetric keys are private.
:private:md5
The MD5 hash of the private key in raw binary form.
:private:sha1
The SHA1 hash of the private key in raw binary form.
:private:sha256
The SHA256 hash of the private key in raw binary form.
:seed:passwd
The seed password used to generate the key material.
:seed:algorithm
The algorithm used to generate the key from the seed password.
Example:
pbkdf2
- Source Edges:
source
verb
target
doc
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
The source node was seen at the geo:telem node place and time.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
crypto:payment:input
A payment made into a transaction.
The base type for the form can be found at crypto:payment:input.
- Properties:
name
type
doc
:transaction
The transaction the payment was input to.
:address
The address which paid into the transaction.
:value
The value of the currency paid into the transaction.
- Source Edges:
source
verb
target
doc
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
The source node was seen at the geo:telem node place and time.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
crypto:payment:output
A payment received from a transaction.
The base type for the form can be found at crypto:payment:output.
- Properties:
name
type
doc
:transaction
The transaction the payment was output from.
:address
The address which received payment from the transaction.
:value
The value of the currency received from the transaction.
- Source Edges:
source
verb
target
doc
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
The source node was seen at the geo:telem node place and time.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
crypto:smart:contract
A smart contract.
The base type for the form can be found at crypto:smart:contract.
- Properties:
name
type
doc
:transaction
The transaction which created the contract.
:address
The address of the contract.
:bytecode
The bytecode which implements the contract.
:token:name
The ERC-20 token name.
:token:symbol
The ERC-20 token symbol.
:token:totalsupply
The ERC-20 totalSupply value.
- Source Edges:
source
verb
target
doc
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
The source node was seen at the geo:telem node place and time.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
crypto:smart:effect:burntoken
A smart contract effect which destroys a non-fungible token.
The base type for the form can be found at crypto:smart:effect:burntoken.
- Properties:
name
type
doc
:token
The non-fungible token that was destroyed.
:index
The order of the effect within the effects of one transaction.
:transaction
The transaction where the smart contract was called.
- Source Edges:
source
verb
target
doc
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
The source node was seen at the geo:telem node place and time.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
crypto:smart:effect:edittokensupply
A smart contract effect which increases or decreases the supply of a fungible token.
The base type for the form can be found at crypto:smart:effect:edittokensupply.
- Properties:
name
type
doc
:contract
The contract which defines the tokens.
:amount
The number of tokens added or removed if negative.
:totalsupply
The total supply of tokens after this modification.
:index
The order of the effect within the effects of one transaction.
:transaction
The transaction where the smart contract was called.
- Source Edges:
source
verb
target
doc
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
The source node was seen at the geo:telem node place and time.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
crypto:smart:effect:minttoken
A smart contract effect which creates a new non-fungible token.
The base type for the form can be found at crypto:smart:effect:minttoken.
- Properties:
name
type
doc
:token
The non-fungible token that was created.
:index
The order of the effect within the effects of one transaction.
:transaction
The transaction where the smart contract was called.
- Source Edges:
source
verb
target
doc
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
The source node was seen at the geo:telem node place and time.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
crypto:smart:effect:proxytoken
A smart contract effect which grants a non-owner address the ability to manipulate a specific non-fungible token.
The base type for the form can be found at crypto:smart:effect:proxytoken.
- Properties:
name
type
doc
:owner
The address granting proxy authority to manipulate non-fungible tokens.
:proxy
The address granted proxy authority to manipulate non-fungible tokens.
:token
The specific token being granted access to.
:index
The order of the effect within the effects of one transaction.
:transaction
The transaction where the smart contract was called.
- Source Edges:
source
verb
target
doc
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
The source node was seen at the geo:telem node place and time.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
crypto:smart:effect:proxytokenall
A smart contract effect which grants a non-owner address the ability to manipulate all non-fungible tokens of the owner.
The base type for the form can be found at crypto:smart:effect:proxytokenall.
- Properties:
name
type
doc
:contract
The contract which defines the tokens.
:owner
The address granting/denying proxy authority to manipulate all non-fungible tokens of the owner.
:proxy
The address granted/denied proxy authority to manipulate all non-fungible tokens of the owner.
:approval
The approval status.
:index
The order of the effect within the effects of one transaction.
:transaction
The transaction where the smart contract was called.
- Source Edges:
source
verb
target
doc
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
The source node was seen at the geo:telem node place and time.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
crypto:smart:effect:proxytokens
A smart contract effect which grants a non-owner address the ability to manipulate fungible tokens.
The base type for the form can be found at crypto:smart:effect:proxytokens.
- Properties:
name
type
doc
:contract
The contract which defines the tokens.
:owner
The address granting proxy authority to manipulate fungible tokens.
:proxy
The address granted proxy authority to manipulate fungible tokens.
:amount
The hex encoded amount of tokens the proxy is allowed to manipulate.
:index
The order of the effect within the effects of one transaction.
:transaction
The transaction where the smart contract was called.
- Source Edges:
source
verb
target
doc
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
The source node was seen at the geo:telem node place and time.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
crypto:smart:effect:transfertoken
A smart contract effect which transfers ownership of a non-fungible token.
The base type for the form can be found at crypto:smart:effect:transfertoken.
- Properties:
name
type
doc
:token
The non-fungible token that was transferred.
:from
The address the NFT was transferred from.
:to
The address the NFT was transferred to.
:index
The order of the effect within the effects of one transaction.
:transaction
The transaction where the smart contract was called.
- Source Edges:
source
verb
target
doc
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
The source node was seen at the geo:telem node place and time.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
crypto:smart:effect:transfertokens
A smart contract effect which transfers fungible tokens.
The base type for the form can be found at crypto:smart:effect:transfertokens.
- Properties:
name
type
doc
:contract
The contract which defines the tokens.
:from
The address the tokens were transferred from.
:to
The address the tokens were transferred to.
:amount
The number of tokens transferred.
:index
The order of the effect within the effects of one transaction.
:transaction
The transaction where the smart contract was called.
- Source Edges:
source
verb
target
doc
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
The source node was seen at the geo:telem node place and time.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
crypto:smart:token
A token managed by a smart contract.
The base type for the form can be found at crypto:smart:token.
- Properties:
name
type
doc
opts
:contract
The smart contract which defines and manages the token.
Read Only:
True
:tokenid
The token ID.
Read Only:
True
:owner
The address which currently owns the token.
:nft:url
The URL which hosts the NFT metadata.
:nft:meta
The raw NFT metadata.
:nft:meta:name
The name field from the NFT metadata.
:nft:meta:description
The description field from the NFT metadata.
Display:
{'hint': 'text'}
:nft:meta:image
The image URL from the NFT metadata.
- Source Edges:
source
verb
target
doc
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
The source node was seen at the geo:telem node place and time.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
crypto:x509:cert
A unique X.509 certificate.
The base type for the form can be found at crypto:x509:cert.
- Properties:
name
type
doc
:file
The file that the certificate metadata was parsed from.
:subject
The subject identifier, commonly in X.500/LDAP format, to which the certificate was issued.
:issuer
The Distinguished Name (DN) of the Certificate Authority (CA) which issued the certificate.
:issuer:cert
The certificate used by the issuer to sign this certificate.
:serial
zeropad:40
The certificate serial number as a big endian hex value.
:version
enums:((0, 'v1'), (2, 'v3'))
The version integer in the certificate. (ex. 2 == v3 ).
:validity:notbefore
The timestamp for the beginning of the certificate validity period.
:validity:notafter
The timestamp for the end of the certificate validity period.
:md5
The MD5 fingerprint for the certificate.
:sha1
The SHA1 fingerprint for the certificate.
:sha256
The SHA256 fingerprint for the certificate.
:rsa:key
The optional RSA public key associated with the certificate.
:algo
The X.509 signature algorithm OID.
:signature
The hexadecimal representation of the digital signature.
:ext:sans
The Subject Alternate Names (SANs) listed in the certificate.
:ext:crls
A list of Subject Alternate Names (SANs) for Distribution Points.
:identities:fqdns
The fused list of FQDNs identified by the cert CN and SANs.
:identities:emails
The fused list of e-mail addresses identified by the cert CN and SANs.
:identities:ipv4s
The fused list of IPv4 addresses identified by the cert CN and SANs.
:identities:ipv6s
The fused list of IPv6 addresses identified by the cert CN and SANs.
:identities:urls
The fused list of URLs identified by the cert CN and SANs.
:crl:urls
The extracted URL values from the CRLs extension.
:selfsigned
Whether this is a self-signed certificate.
- Source Edges:
source
verb
target
doc
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
The source node was seen at the geo:telem node place and time.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
crypto:x509:crl
A unique X.509 Certificate Revocation List.
The base type for the form can be found at crypto:x509:crl.
- Properties:
name
type
doc
:file
The file containing the CRL.
:url
The URL where the CRL was published.
- Source Edges:
source
verb
target
doc
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
The source node was seen at the geo:telem node place and time.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
crypto:x509:revoked
A revocation relationship between a CRL and an X.509 certificate.
The base type for the form can be found at crypto:x509:revoked.
- Properties:
name
type
doc
opts
:crl
The CRL which revoked the certificate.
Read Only:
True
:cert
The certificate revoked by the CRL.
Read Only:
True
- Source Edges:
source
verb
target
doc
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
The source node was seen at the geo:telem node place and time.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
crypto:x509:signedfile
A digital signature relationship between an X.509 certificate and a file.
The base type for the form can be found at crypto:x509:signedfile.
- Properties:
name
type
doc
opts
:cert
The certificate for the key which signed the file.
Read Only:
True
:file
The file which was signed by the certificates key.
Read Only:
True
- Source Edges:
source
verb
target
doc
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
The source node was seen at the geo:telem node place and time.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
econ:acct:balance
A snapshot of the balance of an account at a point in time.
The base type for the form can be found at econ:acct:balance.
- Properties:
name
type
doc
:time
The time the balance was recorded.
:pay:card
The payment card holding the balance.
:crypto:address
The crypto currency address holding the balance.
:amount
The account balance at the time.
:currency
The currency of the balance amount.
:delta
The change since last regular sample.
:total:received
The total amount of currency received by the account.
:total:sent
The total amount of currency sent from the account.
- Source Edges:
source
verb
target
doc
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
The source node was seen at the geo:telem node place and time.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
econ:acct:payment
A payment or crypto currency transaction.
The base type for the form can be found at econ:acct:payment.
- Properties:
name
type
doc
:txnid
strip:True
A payment processor specific transaction id.
:fee
The transaction fee paid by the recipient to the payment processor.
:from:pay:card
The payment card making the payment.
:from:contract
A contract used as an aggregate payment source.
:from:coinaddr
The crypto currency address making the payment.
:from:contact
Contact information for the entity making the payment.
:to:coinaddr
The crypto currency address receiving the payment.
:to:contact
Contact information for the person/org being paid.
:to:contract
A contract used as an aggregate payment destination.
:time
The time the payment was processed.
:purchase
The purchase which the payment was paying for.
:amount
The amount of money transferred in the payment.
:currency
The currency of the payment.
:memo
A small note specified by the payer common in financial transactions.
:crypto:transaction
A crypto currency transaction that initiated the payment.
- Source Edges:
source
verb
target
doc
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
The source node was seen at the geo:telem node place and time.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
econ:acquired
Deprecated. Please use econ:purchase -(acquired)> *.
The base type for the form can be found at econ:acquired.
- Properties:
name
type
doc
opts
:purchase
The purchase event which acquired an item.
Read Only:
True
:item
A reference to the item that was acquired.
Read Only:
True
:item:form
The form of item purchased.
- Source Edges:
source
verb
target
doc
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
The source node was seen at the geo:telem node place and time.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
econ:fin:bar
A sample of the open, close, high, low prices of a security in a specific time window.
The base type for the form can be found at econ:fin:bar.
- Properties:
name
type
doc
:security
The security measured by the bar.
:ival
The interval of measurement.
:price:open
The opening price of the security.
:price:close
The closing price of the security.
:price:low
The low price of the security.
:price:high
The high price of the security.
- Source Edges:
source
verb
target
doc
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
The source node was seen at the geo:telem node place and time.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
econ:fin:exchange
A financial exchange where securities are traded.
The base type for the form can be found at econ:fin:exchange.
- Properties:
name
type
doc
opts
:name
A simple name for the exchange.
Example:
nasdaq
:org
The organization that operates the exchange.
:currency
The currency used for all transactions in the exchange.
Example:
usd
- Source Edges:
source
verb
target
doc
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
The source node was seen at the geo:telem node place and time.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
econ:fin:security
A financial security which is typically traded on an exchange.
The base type for the form can be found at econ:fin:security.
- Properties:
name
type
doc
:exchange
The exchange on which the security is traded.
:ticker
The identifier for this security within the exchange.
:type
A user defined type such as stock, bond, option, future, or forex.
:price
The last known/available price of the security.
:time
The time of the last know price sample.
- Source Edges:
source
verb
target
doc
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
The source node was seen at the geo:telem node place and time.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
econ:fin:tick
A sample of the price of a security at a single moment in time.
The base type for the form can be found at econ:fin:tick.
- Properties:
name
type
doc
:security
The security measured by the tick.
:time
The time the price was sampled.
:price
The price of the security at the time.
- Source Edges:
source
verb
target
doc
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
The source node was seen at the geo:telem node place and time.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
econ:pay:card
A single payment card.
The base type for the form can be found at econ:pay:card.
- Properties:
name
type
doc
:pan
The payment card number.
:pan:mii
The payment card MII.
:pan:iin
The payment card IIN.
:name
The name as it appears on the card.
:expr
The expiration date for the card.
:cvv
The Card Verification Value on the card.
:pin
The Personal Identification Number on the card.
- Source Edges:
source
verb
target
doc
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
The source node was seen at the geo:telem node place and time.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
econ:pay:iin
An Issuer Id Number (IIN).
The base type for the form can be found at econ:pay:iin.
- Properties:
name
type
doc
:org
The issuer organization.
:name
lower:True
The registered name of the issuer.
- Source Edges:
source
verb
target
doc
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
The source node was seen at the geo:telem node place and time.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
econ:purchase
A purchase event.
The base type for the form can be found at econ:purchase.
- Properties:
name
type
doc
:by:contact
The contact information used to make the purchase.
:from:contact
The contact information used to sell the item.
:time
The time of the purchase.
:place
The place where the purchase took place.
:paid
Set to True if the purchase has been paid in full.
:paid:time
The point in time where the purchase was paid in full.
:settled
The point in time where the purchase was settled.
:campaign
The campaign that the purchase was in support of.
:price
The econ:price of the purchase.
:currency
The econ:price of the purchase.
- Source Edges:
source
verb
target
doc
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
The source node was seen at the geo:telem node place and time.
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
econ:receipt:item
A line item included as part of a purchase.
The base type for the form can be found at econ:receipt:item.
- Properties:
name
type
doc
:purchase
The purchase that contains this line item.
:count
min:1
The number of items included in this line item.
:price
The total cost of this receipt line item.
:product
The product being being purchased in this line item.
- Source Edges:
source
verb
target
doc
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
The source node was seen at the geo:telem node place and time.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
edge:has
A digraph edge which records that N1 has N2.
The base type for the form can be found at edge:has.
- Properties:
name
type
doc
opts
:n1
The node definition type for a (form,valu) compound field.
Read Only:
True
:n1:form
The base string type.
Read Only:
True
:n2
The node definition type for a (form,valu) compound field.
Read Only:
True
:n2:form
The base string type.
Read Only:
True
- Source Edges:
source
verb
target
doc
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
The source node was seen at the geo:telem node place and time.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
edge:refs
A digraph edge which records that N1 refers to or contains N2.
The base type for the form can be found at edge:refs.
- Properties:
name
type
doc
opts
:n1
The node definition type for a (form,valu) compound field.
Read Only:
True
:n1:form
The base string type.
Read Only:
True
:n2
The node definition type for a (form,valu) compound field.
Read Only:
True
:n2:form
The base string type.
Read Only:
True
- Source Edges:
source
verb
target
doc
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
The source node was seen at the geo:telem node place and time.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
edge:wentto
A digraph edge which records that N1 went to N2 at a specific time.
The base type for the form can be found at edge:wentto.
- Properties:
name
type
doc
opts
:n1
The node definition type for a (form,valu) compound field.
Read Only:
True
:n1:form
The base string type.
Read Only:
True
:n2
The node definition type for a (form,valu) compound field.
Read Only:
True
:n2:form
The base string type.
Read Only:
True
:time
A date/time value.
Read Only:
True
- Source Edges:
source
verb
target
doc
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
The source node was seen at the geo:telem node place and time.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
edu:class
An instance of an edu:course taught at a given time.
The base type for the form can be found at edu:class.
- Properties:
name
type
doc
:course
The course being taught in the class.
:instructor
The primary instructor for the class.
:assistants
An array of assistant/co-instructor contacts.
:date:first
The date of the first day of class.
:date:last
The date of the last day of class.
:isvirtual
Set if the class is known to be virtual.
:virtual:url
The URL a student would use to attend the virtual class.
:virtual:provider
Contact info for the virtual infrastructure provider.
:place
The place that the class is held.
- Source Edges:
source
verb
target
doc
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
The source node was seen at the geo:telem node place and time.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
edu:course
A course of study taught by an org.
The base type for the form can be found at edu:course.
- Properties:
name
type
doc
opts
:name
The name of the course.
Example:
organic chemistry for beginners
:desc
A brief course description.
:code
The course catalog number or designator.
Example:
chem101
:institution
The org or department which teaches the course.
:prereqs
The pre-requisite courses for taking this course.
- Source Edges:
source
verb
target
doc
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
The source node was seen at the geo:telem node place and time.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
file:archive:entry
An archive entry representing a file and metadata within a parent archive file.
The base type for the form can be found at file:archive:entry.
- Properties:
name
type
doc
:parent
The parent archive file.
:file
The file contained within the archive.
:path
The file path of the archived file.
:user
The name of the user who owns the archived file.
:added
The time that the file was added to the archive.
:created
The created time of the archived file.
:modified
The modified time of the archived file.
:comment
The comment field for the file entry within the archive.
:posix:uid
The POSIX UID of the user who owns the archived file.
:posix:gid
The POSIX GID of the group who owns the archived file.
:posix:perms
The POSIX permissions mask of the archived file.
:archived:size
The encoded or compressed size of the archived file within the parent.
- Source Edges:
source
verb
target
doc
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
The source node was seen at the geo:telem node place and time.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
file:base
A file name with no path.
The base type for the form can be found at file:base.
An example of file:base
:
woot.exe
- Properties:
name
type
doc
opts
:ext
The file extension (if any).
Read Only:
True
- Source Edges:
source
verb
target
doc
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
The source node was seen at the geo:telem node place and time.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
file:bytes
The file bytes type with SHA256 based primary property.
The base type for the form can be found at file:bytes.
- Properties:
name
type
doc
:size
The file size in bytes.
:md5
The md5 hash of the file.
:sha1
The sha1 hash of the file.
:sha256
The sha256 hash of the file.
:sha512
The sha512 hash of the file.
:name
The best known base name for the file.
:mime
The “best” mime type name for the file.
:mime:x509:cn
The Common Name (CN) attribute of the x509 Subject.
:mime:pe:size
The size of the executable file according to the PE file header.
:mime:pe:imphash
The PE import hash of the file as calculated by pefile; https://github.com/erocarrera/pefile .
:mime:pe:compiled
The compile time of the file according to the PE header.
:mime:pe:pdbpath
The PDB string according to the PE.
:mime:pe:exports:time
The export time of the file according to the PE.
:mime:pe:exports:libname
The export library name according to the PE.
:mime:pe:richhdr
The sha256 hash of the rich header bytes.
:exe:compiler
The software used to compile the file.
:exe:packer
The packer software used to encode the file.
- Source Edges:
source
verb
target
doc
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
The source node was seen at the geo:telem node place and time.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
file:filepath
The fused knowledge of the association of a file:bytes node and a file:path.
The base type for the form can be found at file:filepath.
- Properties:
name
type
doc
opts
:file
The file seen at a path.
Read Only:
True
:path
The path a file was seen at.
Read Only:
True
:path:dir
The parent directory.
Read Only:
True
:path:base
The name of the file.
Read Only:
True
:path:base:ext
The extension of the file name.
Read Only:
True
- Source Edges:
source
verb
target
doc
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
The source node was seen at the geo:telem node place and time.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
file:ismime
Records one, of potentially multiple, mime types for a given file.
The base type for the form can be found at file:ismime.
- Properties:
name
type
doc
opts
:file
The file node that is an instance of the named mime type.
Read Only:
True
:mime
The mime type of the file.
Read Only:
True
- Source Edges:
source
verb
target
doc
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
The source node was seen at the geo:telem node place and time.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
file:mime
A file mime name string.
The base type for the form can be found at file:mime.
An example of file:mime
:
text/plain
- Source Edges:
source
verb
target
doc
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
The source node was seen at the geo:telem node place and time.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
file:mime:gif
The GUID of a set of mime metadata for a .gif file.
The base type for the form can be found at file:mime:gif.
- Properties:
name
type
doc
:desc
MIME specific description field extracted from metadata.
:comment
MIME specific comment field extracted from metadata.
:created
MIME specific creation timestamp extracted from metadata.
:imageid
MIME specific unique identifier extracted from metadata.
:author
MIME specific contact information extracted from metadata.
:latlong
MIME specific lat/long information extracted from metadata.
:altitude
MIME specific altitude information extracted from metadata.
:file
The file that the mime info was parsed from.
:file:offs
The optional offset where the mime info was parsed from.
:file:data
A mime specific arbitrary data structure for non-indexed data.
- Source Edges:
source
verb
target
doc
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
The source node was seen at the geo:telem node place and time.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
file:mime:jpg
The GUID of a set of mime metadata for a .jpg file.
The base type for the form can be found at file:mime:jpg.
- Properties:
name
type
doc
:desc
MIME specific description field extracted from metadata.
:comment
MIME specific comment field extracted from metadata.
:created
MIME specific creation timestamp extracted from metadata.
:imageid
MIME specific unique identifier extracted from metadata.
:author
MIME specific contact information extracted from metadata.
:latlong
MIME specific lat/long information extracted from metadata.
:altitude
MIME specific altitude information extracted from metadata.
:file
The file that the mime info was parsed from.
:file:offs
The optional offset where the mime info was parsed from.
:file:data
A mime specific arbitrary data structure for non-indexed data.
- Source Edges:
source
verb
target
doc
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
The source node was seen at the geo:telem node place and time.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
file:mime:macho:loadcmd
A generic load command pulled from the Mach-O headers.
The base type for the form can be found at file:mime:macho:loadcmd.
- Properties:
name
type
doc
:file
The Mach-O file containing the load command.
:type
enums:((1, 'segment'), (2, 'symbol table'), (3, 'gdb symbol table'), (4, 'thread'), (5, 'unix thread'), (6, 'fixed VM shared library'), (7, 'fixed VM shared library identification'), (8, 'object identification'), (9, 'fixed VM file inclusion'), (10, 'prepage'), (11, 'dynamic link-edit symbol table'), (12, 'load dynamically linked shared library'), (13, 'dynamically linked shared library identifier'), (14, 'load dynamic linker'), (15, 'dynamic linker identification'), (16, 'prebound dynamically linked shared library'), (17, 'image routines'), (18, 'sub framework'), (19, 'sub umbrella'), (20, 'sub client'), (21, 'sub library'), (22, 'two level namespace lookup hints'), (23, 'prebind checksum'), (24, 'weak import dynamically linked shared library'), (25, '64bit segment'), (26, '64bit image routines'), (27, 'uuid'), (28, 'runpath additions'), (29, 'code signature'), (30, 'split segment info'), (31, 'load and re-export dynamic library'), (32, 'delay load of dynamic library'), (33, 'encrypted segment information'), (34, 'compressed dynamic library information'), (35, 'load upward dylib'), (36, 'minimum osx version'), (37, 'minimum ios version'), (38, 'compressed table of function start addresses'), (39, 'environment variable string for dynamic library'), (40, 'unix thread replacement'), (41, 'table of non-instructions in __text'), (42, 'source version used to build binary'), (43, 'Code signing DRs copied from linked dynamic libraries'))
The type of the load command.
:size
The size of the load command structure in bytes.
- Source Edges:
source
verb
target
doc
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
The source node was seen at the geo:telem node place and time.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
file:mime:macho:section
A section inside a Mach-O binary denoting a named region of bytes inside a segment.
The base type for the form can be found at file:mime:macho:section.
- Properties:
name
type
doc
:segment
The Mach-O segment that contains this section.
:name
Name of the section.
:size
Size of the section in bytes.
:type
enums:((0, 'regular'), (1, 'zero fill on demand'), (2, 'only literal C strings'), (3, 'only 4 byte literals'), (4, 'only 8 byte literals'), (5, 'only pointers to literals'), (6, 'only non-lazy symbol pointers'), (7, 'only lazy symbol pointers'), (8, 'only symbol stubs'), (9, 'only function pointers for init'), (10, 'only function pointers for fini'), (11, 'contains symbols to be coalesced'), (12, 'zero fill on deman (greater than 4gb)'), (13, 'only pairs of function pointers for interposing'), (14, 'only 16 byte literals'), (15, 'dtrace object format'), (16, 'only lazy symbols pointers to lazy dynamic libraries'))
The type of the section.
:sha256
The sha256 hash of the bytes of the Mach-O section.
:offset
The file offset to the beginning of the section.
- Source Edges:
source
verb
target
doc
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
The source node was seen at the geo:telem node place and time.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
file:mime:macho:segment
A named region of bytes inside a Mach-O binary.
The base type for the form can be found at file:mime:macho:segment.
- Properties:
name
type
doc
:name
The name of the Mach-O segment.
:memsize
The size of the segment in bytes, when resident in memory, according to the load command structure.
:disksize
The size of the segment in bytes, when on disk, according to the load command structure.
:sha256
The sha256 hash of the bytes of the segment.
:offset
The file offset to the beginning of the segment.
:file
The Mach-O file containing the load command.
:type
enums:((1, 'segment'), (2, 'symbol table'), (3, 'gdb symbol table'), (4, 'thread'), (5, 'unix thread'), (6, 'fixed VM shared library'), (7, 'fixed VM shared library identification'), (8, 'object identification'), (9, 'fixed VM file inclusion'), (10, 'prepage'), (11, 'dynamic link-edit symbol table'), (12, 'load dynamically linked shared library'), (13, 'dynamically linked shared library identifier'), (14, 'load dynamic linker'), (15, 'dynamic linker identification'), (16, 'prebound dynamically linked shared library'), (17, 'image routines'), (18, 'sub framework'), (19, 'sub umbrella'), (20, 'sub client'), (21, 'sub library'), (22, 'two level namespace lookup hints'), (23, 'prebind checksum'), (24, 'weak import dynamically linked shared library'), (25, '64bit segment'), (26, '64bit image routines'), (27, 'uuid'), (28, 'runpath additions'), (29, 'code signature'), (30, 'split segment info'), (31, 'load and re-export dynamic library'), (32, 'delay load of dynamic library'), (33, 'encrypted segment information'), (34, 'compressed dynamic library information'), (35, 'load upward dylib'), (36, 'minimum osx version'), (37, 'minimum ios version'), (38, 'compressed table of function start addresses'), (39, 'environment variable string for dynamic library'), (40, 'unix thread replacement'), (41, 'table of non-instructions in __text'), (42, 'source version used to build binary'), (43, 'Code signing DRs copied from linked dynamic libraries'))
The type of the load command.
:size
The size of the load command structure in bytes.
- Source Edges:
source
verb
target
doc
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
The source node was seen at the geo:telem node place and time.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
file:mime:macho:uuid
A specific load command denoting a UUID used to uniquely identify the Mach-O binary.
The base type for the form can be found at file:mime:macho:uuid.
- Properties:
name
type
doc
:uuid
The UUID of the Mach-O application (as defined in an LC_UUID load command).
:file
The Mach-O file containing the load command.
:type
enums:((1, 'segment'), (2, 'symbol table'), (3, 'gdb symbol table'), (4, 'thread'), (5, 'unix thread'), (6, 'fixed VM shared library'), (7, 'fixed VM shared library identification'), (8, 'object identification'), (9, 'fixed VM file inclusion'), (10, 'prepage'), (11, 'dynamic link-edit symbol table'), (12, 'load dynamically linked shared library'), (13, 'dynamically linked shared library identifier'), (14, 'load dynamic linker'), (15, 'dynamic linker identification'), (16, 'prebound dynamically linked shared library'), (17, 'image routines'), (18, 'sub framework'), (19, 'sub umbrella'), (20, 'sub client'), (21, 'sub library'), (22, 'two level namespace lookup hints'), (23, 'prebind checksum'), (24, 'weak import dynamically linked shared library'), (25, '64bit segment'), (26, '64bit image routines'), (27, 'uuid'), (28, 'runpath additions'), (29, 'code signature'), (30, 'split segment info'), (31, 'load and re-export dynamic library'), (32, 'delay load of dynamic library'), (33, 'encrypted segment information'), (34, 'compressed dynamic library information'), (35, 'load upward dylib'), (36, 'minimum osx version'), (37, 'minimum ios version'), (38, 'compressed table of function start addresses'), (39, 'environment variable string for dynamic library'), (40, 'unix thread replacement'), (41, 'table of non-instructions in __text'), (42, 'source version used to build binary'), (43, 'Code signing DRs copied from linked dynamic libraries'))
The type of the load command.
:size
The size of the load command structure in bytes.
- Source Edges:
source
verb
target
doc
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
The source node was seen at the geo:telem node place and time.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
file:mime:macho:version
A specific load command used to denote the version of the source used to build the Mach-O binary.
The base type for the form can be found at file:mime:macho:version.
- Properties:
name
type
doc
:version
The version of the Mach-O file encoded in an LC_VERSION load command.
:file
The Mach-O file containing the load command.
:type
enums:((1, 'segment'), (2, 'symbol table'), (3, 'gdb symbol table'), (4, 'thread'), (5, 'unix thread'), (6, 'fixed VM shared library'), (7, 'fixed VM shared library identification'), (8, 'object identification'), (9, 'fixed VM file inclusion'), (10, 'prepage'), (11, 'dynamic link-edit symbol table'), (12, 'load dynamically linked shared library'), (13, 'dynamically linked shared library identifier'), (14, 'load dynamic linker'), (15, 'dynamic linker identification'), (16, 'prebound dynamically linked shared library'), (17, 'image routines'), (18, 'sub framework'), (19, 'sub umbrella'), (20, 'sub client'), (21, 'sub library'), (22, 'two level namespace lookup hints'), (23, 'prebind checksum'), (24, 'weak import dynamically linked shared library'), (25, '64bit segment'), (26, '64bit image routines'), (27, 'uuid'), (28, 'runpath additions'), (29, 'code signature'), (30, 'split segment info'), (31, 'load and re-export dynamic library'), (32, 'delay load of dynamic library'), (33, 'encrypted segment information'), (34, 'compressed dynamic library information'), (35, 'load upward dylib'), (36, 'minimum osx version'), (37, 'minimum ios version'), (38, 'compressed table of function start addresses'), (39, 'environment variable string for dynamic library'), (40, 'unix thread replacement'), (41, 'table of non-instructions in __text'), (42, 'source version used to build binary'), (43, 'Code signing DRs copied from linked dynamic libraries'))
The type of the load command.
:size
The size of the load command structure in bytes.
- Source Edges:
source
verb
target
doc
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
The source node was seen at the geo:telem node place and time.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
file:mime:msdoc
The GUID of a set of mime metadata for a Microsoft Word file.
The base type for the form can be found at file:mime:msdoc.
- Properties:
name
type
doc
:title
The title extracted from Microsoft Office metadata.
:author
The author extracted from Microsoft Office metadata.
:subject
The subject extracted from Microsoft Office metadata.
:application
The creating_application extracted from Microsoft Office metadata.
:created
The create_time extracted from Microsoft Office metadata.
:lastsaved
The last_saved_time extracted from Microsoft Office metadata.
:file
The file that the mime info was parsed from.
:file:offs
The optional offset where the mime info was parsed from.
:file:data
A mime specific arbitrary data structure for non-indexed data.
- Source Edges:
source
verb
target
doc
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
The source node was seen at the geo:telem node place and time.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
file:mime:msppt
The GUID of a set of mime metadata for a Microsoft Powerpoint file.
The base type for the form can be found at file:mime:msppt.
- Properties:
name
type
doc
:title
The title extracted from Microsoft Office metadata.
:author
The author extracted from Microsoft Office metadata.
:subject
The subject extracted from Microsoft Office metadata.
:application
The creating_application extracted from Microsoft Office metadata.
:created
The create_time extracted from Microsoft Office metadata.
:lastsaved
The last_saved_time extracted from Microsoft Office metadata.
:file
The file that the mime info was parsed from.
:file:offs
The optional offset where the mime info was parsed from.
:file:data
A mime specific arbitrary data structure for non-indexed data.
- Source Edges:
source
verb
target
doc
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
The source node was seen at the geo:telem node place and time.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
file:mime:msxls
The GUID of a set of mime metadata for a Microsoft Excel file.
The base type for the form can be found at file:mime:msxls.
- Properties:
name
type
doc
:title
The title extracted from Microsoft Office metadata.
:author
The author extracted from Microsoft Office metadata.
:subject
The subject extracted from Microsoft Office metadata.
:application
The creating_application extracted from Microsoft Office metadata.
:created
The create_time extracted from Microsoft Office metadata.
:lastsaved
The last_saved_time extracted from Microsoft Office metadata.
:file
The file that the mime info was parsed from.
:file:offs
The optional offset where the mime info was parsed from.
:file:data
A mime specific arbitrary data structure for non-indexed data.
- Source Edges:
source
verb
target
doc
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
The source node was seen at the geo:telem node place and time.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
file:mime:pe:export
The fused knowledge of a file:bytes node containing a pe named export.
The base type for the form can be found at file:mime:pe:export.
- Properties:
name
type
doc
opts
:file
The file containing the export.
Read Only:
True
:name
The name of the export in the file.
Read Only:
True
- Source Edges:
source
verb
target
doc
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
The source node was seen at the geo:telem node place and time.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
file:mime:pe:resource
The fused knowledge of a file:bytes node containing a pe resource.
The base type for the form can be found at file:mime:pe:resource.
- Properties:
name
type
doc
opts
:file
The file containing the resource.
Read Only:
True
:type
The typecode for the resource.
Read Only:
True
:langid
The language code for the resource.
Read Only:
True
:resource
The sha256 hash of the resource bytes.
Read Only:
True
- Source Edges:
source
verb
target
doc
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
The source node was seen at the geo:telem node place and time.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
file:mime:pe:section
The fused knowledge a file:bytes node containing a pe section.
The base type for the form can be found at file:mime:pe:section.
- Properties:
name
type
doc
opts
:file
The file containing the section.
Read Only:
True
:name
The textual name of the section.
Read Only:
True
:sha256
The sha256 hash of the section. Relocations must be zeroed before hashing.
Read Only:
True
- Source Edges:
source
verb
target
doc
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
The source node was seen at the geo:telem node place and time.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
file:mime:pe:vsvers:info
knowledge of a file:bytes node containing vsvers info.
The base type for the form can be found at file:mime:pe:vsvers:info.
- Properties:
name
type
doc
opts
:file
The file containing the vsversion keyval pair.
Read Only:
True
:keyval
The vsversion info keyval in this file:bytes node.
Read Only:
True
- Source Edges:
source
verb
target
doc
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
The source node was seen at the geo:telem node place and time.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
file:mime:pe:vsvers:keyval
A key value pair found in a PE vsversion info structure.
The base type for the form can be found at file:mime:pe:vsvers:keyval.
- Properties:
name
type
doc
opts
:name
The key for the vsversion keyval pair.
Read Only:
True
:value
The value for the vsversion keyval pair.
Read Only:
True
- Source Edges:
source
verb
target
doc
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
The source node was seen at the geo:telem node place and time.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
file:mime:png
The GUID of a set of mime metadata for a .png file.
The base type for the form can be found at file:mime:png.
- Properties:
name
type
doc
:desc
MIME specific description field extracted from metadata.
:comment
MIME specific comment field extracted from metadata.
:created
MIME specific creation timestamp extracted from metadata.
:imageid
MIME specific unique identifier extracted from metadata.
:author
MIME specific contact information extracted from metadata.
:latlong
MIME specific lat/long information extracted from metadata.
:altitude
MIME specific altitude information extracted from metadata.
:file
The file that the mime info was parsed from.
:file:offs
The optional offset where the mime info was parsed from.
:file:data
A mime specific arbitrary data structure for non-indexed data.
- Source Edges:
source
verb
target
doc
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
The source node was seen at the geo:telem node place and time.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
file:mime:rtf
The GUID of a set of mime metadata for a .rtf file.
The base type for the form can be found at file:mime:rtf.
- Properties:
name
type
doc
:guid
The parsed GUID embedded in the .rtf file.
:file
The file that the mime info was parsed from.
:file:offs
The optional offset where the mime info was parsed from.
:file:data
A mime specific arbitrary data structure for non-indexed data.
- Source Edges:
source
verb
target
doc
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
The source node was seen at the geo:telem node place and time.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
file:mime:tif
The GUID of a set of mime metadata for a .tif file.
The base type for the form can be found at file:mime:tif.
- Properties:
name
type
doc
:desc
MIME specific description field extracted from metadata.
:comment
MIME specific comment field extracted from metadata.
:created
MIME specific creation timestamp extracted from metadata.
:imageid
MIME specific unique identifier extracted from metadata.
:author
MIME specific contact information extracted from metadata.
:latlong
MIME specific lat/long information extracted from metadata.
:altitude
MIME specific altitude information extracted from metadata.
:file
The file that the mime info was parsed from.
:file:offs
The optional offset where the mime info was parsed from.
:file:data
A mime specific arbitrary data structure for non-indexed data.
- Source Edges:
source
verb
target
doc
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
The source node was seen at the geo:telem node place and time.
- Target Edges:
source
verb
target
doc