Synapse Data Model - Forms
Forms
Forms are derived from types, or base types. Forms represent node types in the graph.
auth:access
An instance of using creds to access a resource.
The base type for the form can be found at auth:access.
- Properties:
name
type
doc
:creds
The credentials used to attempt access.
:time
The time of the access attempt.
:success
Set to true if the access was successful.
:person
The person who attempted access.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
auth:creds
A unique set of credentials used to access a resource.
The base type for the form can be found at auth:creds.
- Properties:
name
type
doc
opts
The email address used to identify the user.
:user
The user name used to identify the user.
:phone
The phone number used to identify the user.
:passwd
The password used to authenticate.
:passwdhash
The password hash used to authenticate.
:account
The account that the creds allow access to.
:website
The base URL of the website that the credentials allow access to.
:host
The host that the credentials allow access to.
:wifi:ssid
The WiFi SSID that the credentials allow access to.
:web:acct
Deprecated. Use :service:account.
Deprecated:
True
:service:account
The service account that the credentials allow access to.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
belief:subscriber
A contact which subscribes to a belief system.
The base type for the form can be found at belief:subscriber.
- Properties:
name
type
doc
:contact
The contact which subscribes to the belief system.
:system
The belief system to which the contact subscribes.
:began
The time that the contact began to be a subscriber to the belief system.
:ended
The time when the contact ceased to be a subscriber to the belief system.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
belief:subscriber
-(follows)>
belief:tenet
The subscriber is assessed to generally adhere to the specific tenet.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
belief:system
A belief system such as an ideology, philosophy, or religion.
The base type for the form can be found at belief:system.
- Properties:
name
type
doc
opts
:name
The name of the belief system.
:desc
A description of the belief system.
Display:
{'hint': 'text'}
:type
A taxonometric type for the belief system.
:began
The time that the belief system was first observed.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
belief:system
-(has)>
belief:tenet
The belief system includes the tenet.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
belief:system:type:taxonomy
A hierarchical taxonomy of belief system types.
The base type for the form can be found at belief:system:type:taxonomy.
- Properties:
name
type
doc
opts
:title
A brief title of the definition.
:summary
Deprecated. Please use title/desc.
Deprecated:True
Display:{'hint': 'text'}
:desc
A definition of the taxonomy entry.
Display:
{'hint': 'text'}
:sort
A display sort order for siblings.
:base
The base taxon.
Read Only:
True
:depth
The depth indexed from 0.
Read Only:
True
:parent
The taxonomy parent.
Read Only:
True
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
belief:tenet
A concrete tenet potentially shared by multiple belief systems.
The base type for the form can be found at belief:tenet.
- Properties:
name
type
doc
opts
:name
The name of the tenet.
:desc
A description of the tenet.
Display:
{'hint': 'text'}
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
belief:subscriber
-(follows)>
belief:tenet
The subscriber is assessed to generally adhere to the specific tenet.
belief:system
-(has)>
belief:tenet
The belief system includes the tenet.
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
biz:bundle
A bundle allows construction of products which bundle instances of other products.
The base type for the form can be found at biz:bundle.
- Properties:
name
type
doc
opts
:count
The number of instances of the product or service included in the bundle.
:price
The price of the bundle.
:product
The product included in the bundle.
:service
The service included in the bundle.
:deal
Deprecated. Please use econ:receipt:item for instances of bundles being sold.
Deprecated:
True
:purchase
Deprecated. Please use econ:receipt:item for instances of bundles being sold.
Deprecated:
True
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
biz:deal
A sales or procurement effort in pursuit of a purchase.
The base type for the form can be found at biz:deal.
- Properties:
name
type
doc
opts
:id
strip:True
An identifier for the deal.
:title
A title for the deal.
:type
The type of deal.
Display:
{'hint': 'taxonomy'}
:status
The status of the deal.
Display:
{'hint': 'taxonomy'}
:updated
The last time the deal had a significant update.
:contacted
The last time the contacts communicated about the deal.
:rfp
The RFP that the deal is in response to.
:buyer
The primary contact information for the buyer.
:buyer:org
The buyer org.
:buyer:orgname
The reported ou:name of the buyer org.
:buyer:orgfqdn
The reported inet:fqdn of the buyer org.
:seller
The primary contact information for the seller.
:seller:org
The seller org.
:seller:orgname
The reported ou:name of the seller org.
:seller:orgfqdn
The reported inet:fqdn of the seller org.
:currency
The currency of econ:price values associated with the deal.
:buyer:budget
The buyers budget for the eventual purchase.
:buyer:deadline
When the buyer intends to make a decision.
:offer:price
The total price of the offered products.
:offer:expires
When the offer expires.
:purchase
Records a purchase resulting from the deal.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
biz:dealstatus
A deal/rfp status taxonomy.
The base type for the form can be found at biz:dealstatus.
- Properties:
name
type
doc
opts
:title
A brief title of the definition.
:summary
Deprecated. Please use title/desc.
Deprecated:True
Display:{'hint': 'text'}
:desc
A definition of the taxonomy entry.
Display:
{'hint': 'text'}
:sort
A display sort order for siblings.
:base
The base taxon.
Read Only:
True
:depth
The depth indexed from 0.
Read Only:
True
:parent
The taxonomy parent.
Read Only:
True
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
biz:dealtype
A deal type taxonomy.
The base type for the form can be found at biz:dealtype.
- Properties:
name
type
doc
opts
:title
A brief title of the definition.
:summary
Deprecated. Please use title/desc.
Deprecated:True
Display:{'hint': 'text'}
:desc
A definition of the taxonomy entry.
Display:
{'hint': 'text'}
:sort
A display sort order for siblings.
:base
The base taxon.
Read Only:
True
:depth
The depth indexed from 0.
Read Only:
True
:parent
The taxonomy parent.
Read Only:
True
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
biz:listing
A product or service being listed for sale at a given price by a specific seller.
The base type for the form can be found at biz:listing.
- Properties:
name
type
doc
:seller
The contact information for the seller.
:product
The product being offered.
:service
The service being offered.
:current
Set to true if the offer is still current.
:time
The first known offering of this product/service by the organization for the asking price.
:expires
Set if the offer has a known expiration date.
:price
The asking price of the product or service.
:currency
The currency of the asking price.
:count:total
min:0
The number of instances for sale.
:count:remaining
min:0
The current remaining number of instances for sale.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
biz:prodtype
A product type taxonomy.
The base type for the form can be found at biz:prodtype.
- Properties:
name
type
doc
opts
:title
A brief title of the definition.
:summary
Deprecated. Please use title/desc.
Deprecated:True
Display:{'hint': 'text'}
:desc
A definition of the taxonomy entry.
Display:
{'hint': 'text'}
:sort
A display sort order for siblings.
:base
The base taxon.
Read Only:
True
:depth
The depth indexed from 0.
Read Only:
True
:parent
The taxonomy parent.
Read Only:
True
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
biz:product
A product which is available for purchase.
The base type for the form can be found at biz:product.
- Properties:
name
type
doc
opts
:name
The name of the product.
:type
The type of product.
Display:
{'hint': 'taxonomy'}
:summary
A brief summary of the product.
Display:
{'hint': 'text'}
:maker
A contact for the maker of the product.
:madeby:org
Deprecated. Please use biz:product:maker.
Deprecated:
True
:madeby:orgname
Deprecated. Please use biz:product:maker.
Deprecated:
True
:madeby:orgfqdn
Deprecated. Please use biz:product:maker.
Deprecated:
True
:price:retail
The MSRP price of the product.
:price:bottom
The minimum offered or observed price of the product.
:price:currency
The currency of the retail and bottom price properties.
:bundles
An array of bundles included with the product.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
biz:rfp
An RFP (Request for Proposal) soliciting proposals.
The base type for the form can be found at biz:rfp.
- Properties:
name
type
doc
opts
:ext:id
An externally specified identifier for the RFP.
:title
The title of the RFP.
:summary
A brief summary of the RFP.
Display:
{'hint': 'text'}
:status
The status of the RFP.
Display:
{'hint': 'enum'}
:url
The official URL for the RFP.
:file
The RFP document.
:posted
The date/time that the RFP was posted.
:quesdue
The date/time that questions are due.
:propdue
The date/time that proposals are due.
:contact
The contact information given for the org requesting offers.
:purchases
Any known purchases that resulted from the RFP.
:requirements
A typed array which indexes each field.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
biz:service
A service which is performed by a specific organization.
The base type for the form can be found at biz:service.
- Properties:
name
type
doc
opts
:provider
The contact info of the entity which performs the service.
:name
The name of the service being performed.
:summary
A brief summary of the service.
Display:
{'hint': 'text'}
:type
A taxonomy of service types.
:launched
The time when the operator first made the service available.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
biz:stake
A stake or partial ownership in a company.
The base type for the form can be found at biz:stake.
- Properties:
name
type
doc
:vitals
The ou:vitals snapshot this stake is part of.
:org
The resolved org.
:orgname
The org name as reported by the source of the vitals.
:orgfqdn
The org FQDN as reported by the source of the vitals.
:name
An arbitrary name for this stake. Can be non-contact like “pool”.
:asof
The time the stake is being measured. Likely as part of an ou:vitals.
:shares
The number of shares represented by the stake.
:invested
The amount of money invested in the cap table iteration.
:value
The monetary value of the stake.
:percent
The percentage ownership represented by this stake.
:owner
Contact information of the owner of the stake.
:purchase
The purchase event for the stake.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
crypto:algorithm
A cryptographic algorithm name.
The base type for the form can be found at crypto:algorithm.
An example of crypto:algorithm
:
aes256
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
crypto:currency:address
An individual crypto currency address.
The base type for the form can be found at crypto:currency:address.
An example of crypto:currency:address
:
btc/1BvBMSEYstWetqTFn5Au4m4GFg7xJaNVN2
- Properties:
name
type
doc
opts
:coin
The crypto coin to which the address belongs.
Read Only:
True
:seed
The cryptographic key and or password used to generate the address.
:iden
The coin specific address identifier.
Read Only:
True
:desc
A free-form description of the address.
:contact
The primary contact for the crypto currency address.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
crypto:currency:block
An individual crypto currency block record on the blockchain.
The base type for the form can be found at crypto:currency:block.
- Properties:
name
type
doc
opts
:coin
The coin/blockchain this block resides on.
Read Only:
True
:offset
The index of this block.
Read Only:
True
:hash
The unique hash for the block.
:minedby
The address which mined the block.
:time
Time timestamp embedded in the block by the miner.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
crypto:currency:client
A fused node representing a crypto currency address used by an Internet client.
The base type for the form can be found at crypto:currency:client.
An example of crypto:currency:client
:
(1.2.3.4, (btc, 1BvBMSEYstWetqTFn5Au4m4GFg7xJaNVN2))
- Properties:
name
type
doc
opts
:inetaddr
The Internet client address observed using the crypto currency address.
Read Only:
True
:coinaddr
The crypto currency address observed in use by the Internet client.
Read Only:
True
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
crypto:currency:coin
An individual crypto currency type.
The base type for the form can be found at crypto:currency:coin.
An example of crypto:currency:coin
:
btc
- Properties:
name
type
doc
:name
The full name of the crypto coin.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
crypto:currency:transaction
An individual crypto currency transaction recorded on the blockchain.
The base type for the form can be found at crypto:currency:transaction.
- Properties:
name
type
doc
opts
:hash
The unique transaction hash for the transaction.
:desc
An analyst specified description of the transaction.
:block
The block which records the transaction.
:block:coin
The coin/blockchain of the block which records this transaction.
:block:offset
The offset of the block which records this transaction.
:success
Set to true if the transaction was successfully executed and recorded.
:status:code
A coin specific status code which may represent an error reason.
:status:message
A coin specific status message which may contain an error reason.
:to
The destination address of the transaction.
:from
The source address of the transaction.
:inputs
Deprecated. Please use crypto:payment:input:transaction.
Deprecated:
True
:outputs
Deprecated. Please use crypto:payment:output:transaction.
Deprecated:
True
:fee
The total fee paid to execute the transaction.
:value
The total value of the transaction.
:time
The time this transaction was initiated.
:eth:gasused
The amount of gas used to execute this transaction.
:eth:gaslimit
The ETH gas limit specified for this transaction.
:eth:gasprice
The gas price (in ETH) specified for this transaction.
:contract:input
Input value to a smart contract call.
:contract:output
Output value of a smart contract call.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
crypto:key
A cryptographic key and algorithm.
The base type for the form can be found at crypto:key.
- Properties:
name
type
doc
opts
:algorithm
The cryptographic algorithm which uses the key material.
Example:
aes256
:mode
The algorithm specific mode in use.
:iv
The hex encoded initialization vector.
:iv:text
Set only if the :iv property decodes to ASCII.
:public
The hex encoded public key material if the algorithm has a public/private key pair.
:public:text
Set only if the :public property decodes to ASCII.
:public:md5
The MD5 hash of the public key in raw binary form.
:public:sha1
The SHA1 hash of the public key in raw binary form.
:public:sha256
The SHA256 hash of the public key in raw binary form.
:private
The hex encoded private key material. All symmetric keys are private.
:private:text
Set only if the :private property decodes to ASCII.
:private:md5
The MD5 hash of the private key in raw binary form.
:private:sha1
The SHA1 hash of the private key in raw binary form.
:private:sha256
The SHA256 hash of the private key in raw binary form.
:seed:passwd
The seed password used to generate the key material.
:seed:algorithm
The algorithm used to generate the key from the seed password.
Example:
pbkdf2
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
crypto:payment:input
A payment made into a transaction.
The base type for the form can be found at crypto:payment:input.
- Properties:
name
type
doc
:transaction
The transaction the payment was input to.
:address
The address which paid into the transaction.
:value
The value of the currency paid into the transaction.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
crypto:payment:output
A payment received from a transaction.
The base type for the form can be found at crypto:payment:output.
- Properties:
name
type
doc
:transaction
The transaction the payment was output from.
:address
The address which received payment from the transaction.
:value
The value of the currency received from the transaction.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
crypto:smart:contract
A smart contract.
The base type for the form can be found at crypto:smart:contract.
- Properties:
name
type
doc
:transaction
The transaction which created the contract.
:address
The address of the contract.
:bytecode
The bytecode which implements the contract.
:token:name
The ERC-20 token name.
:token:symbol
The ERC-20 token symbol.
:token:totalsupply
The ERC-20 totalSupply value.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
crypto:smart:effect:burntoken
A smart contract effect which destroys a non-fungible token.
The base type for the form can be found at crypto:smart:effect:burntoken.
- Properties:
name
type
doc
:token
The non-fungible token that was destroyed.
:index
The order of the effect within the effects of one transaction.
:transaction
The transaction where the smart contract was called.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
crypto:smart:effect:edittokensupply
A smart contract effect which increases or decreases the supply of a fungible token.
The base type for the form can be found at crypto:smart:effect:edittokensupply.
- Properties:
name
type
doc
:contract
The contract which defines the tokens.
:amount
The number of tokens added or removed if negative.
:totalsupply
The total supply of tokens after this modification.
:index
The order of the effect within the effects of one transaction.
:transaction
The transaction where the smart contract was called.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
crypto:smart:effect:minttoken
A smart contract effect which creates a new non-fungible token.
The base type for the form can be found at crypto:smart:effect:minttoken.
- Properties:
name
type
doc
:token
The non-fungible token that was created.
:index
The order of the effect within the effects of one transaction.
:transaction
The transaction where the smart contract was called.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
crypto:smart:effect:proxytoken
A smart contract effect which grants a non-owner address the ability to manipulate a specific non-fungible token.
The base type for the form can be found at crypto:smart:effect:proxytoken.
- Properties:
name
type
doc
:owner
The address granting proxy authority to manipulate non-fungible tokens.
:proxy
The address granted proxy authority to manipulate non-fungible tokens.
:token
The specific token being granted access to.
:index
The order of the effect within the effects of one transaction.
:transaction
The transaction where the smart contract was called.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
crypto:smart:effect:proxytokenall
A smart contract effect which grants a non-owner address the ability to manipulate all non-fungible tokens of the owner.
The base type for the form can be found at crypto:smart:effect:proxytokenall.
- Properties:
name
type
doc
:contract
The contract which defines the tokens.
:owner
The address granting/denying proxy authority to manipulate all non-fungible tokens of the owner.
:proxy
The address granted/denied proxy authority to manipulate all non-fungible tokens of the owner.
:approval
The approval status.
:index
The order of the effect within the effects of one transaction.
:transaction
The transaction where the smart contract was called.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
crypto:smart:effect:proxytokens
A smart contract effect which grants a non-owner address the ability to manipulate fungible tokens.
The base type for the form can be found at crypto:smart:effect:proxytokens.
- Properties:
name
type
doc
:contract
The contract which defines the tokens.
:owner
The address granting proxy authority to manipulate fungible tokens.
:proxy
The address granted proxy authority to manipulate fungible tokens.
:amount
The hex encoded amount of tokens the proxy is allowed to manipulate.
:index
The order of the effect within the effects of one transaction.
:transaction
The transaction where the smart contract was called.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
crypto:smart:effect:transfertoken
A smart contract effect which transfers ownership of a non-fungible token.
The base type for the form can be found at crypto:smart:effect:transfertoken.
- Properties:
name
type
doc
:token
The non-fungible token that was transferred.
:from
The address the NFT was transferred from.
:to
The address the NFT was transferred to.
:index
The order of the effect within the effects of one transaction.
:transaction
The transaction where the smart contract was called.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
crypto:smart:effect:transfertokens
A smart contract effect which transfers fungible tokens.
The base type for the form can be found at crypto:smart:effect:transfertokens.
- Properties:
name
type
doc
:contract
The contract which defines the tokens.
:from
The address the tokens were transferred from.
:to
The address the tokens were transferred to.
:amount
The number of tokens transferred.
:index
The order of the effect within the effects of one transaction.
:transaction
The transaction where the smart contract was called.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
crypto:smart:token
A token managed by a smart contract.
The base type for the form can be found at crypto:smart:token.
- Properties:
name
type
doc
opts
:contract
The smart contract which defines and manages the token.
Read Only:
True
:tokenid
The token ID.
Read Only:
True
:owner
The address which currently owns the token.
:nft:url
The URL which hosts the NFT metadata.
:nft:meta
The raw NFT metadata.
:nft:meta:name
The name field from the NFT metadata.
:nft:meta:description
The description field from the NFT metadata.
Display:
{'hint': 'text'}
:nft:meta:image
The image URL from the NFT metadata.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
crypto:x509:cert
A unique X.509 certificate.
The base type for the form can be found at crypto:x509:cert.
- Properties:
name
type
doc
:file
The file that the certificate metadata was parsed from.
:subject
The subject identifier, commonly in X.500/LDAP format, to which the certificate was issued.
:issuer
The Distinguished Name (DN) of the Certificate Authority (CA) which issued the certificate.
:issuer:cert
The certificate used by the issuer to sign this certificate.
:serial
zeropad:40
The certificate serial number as a big endian hex value.
:version
enums:((0, 'v1'), (2, 'v3'))
The version integer in the certificate. (ex. 2 == v3 ).
:validity:notbefore
The timestamp for the beginning of the certificate validity period.
:validity:notafter
The timestamp for the end of the certificate validity period.
:md5
The MD5 fingerprint for the certificate.
:sha1
The SHA1 fingerprint for the certificate.
:sha256
The SHA256 fingerprint for the certificate.
:rsa:key
The optional RSA public key associated with the certificate.
:algo
The X.509 signature algorithm OID.
:signature
The hexadecimal representation of the digital signature.
:ext:sans
The Subject Alternate Names (SANs) listed in the certificate.
:ext:crls
A list of Subject Alternate Names (SANs) for Distribution Points.
:identities:fqdns
The fused list of FQDNs identified by the cert CN and SANs.
:identities:emails
The fused list of e-mail addresses identified by the cert CN and SANs.
:identities:ipv4s
The fused list of IPv4 addresses identified by the cert CN and SANs.
:identities:ipv6s
The fused list of IPv6 addresses identified by the cert CN and SANs.
:identities:urls
The fused list of URLs identified by the cert CN and SANs.
:crl:urls
The extracted URL values from the CRLs extension.
:selfsigned
Whether this is a self-signed certificate.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
crypto:x509:crl
A unique X.509 Certificate Revocation List.
The base type for the form can be found at crypto:x509:crl.
- Properties:
name
type
doc
:file
The file containing the CRL.
:url
The URL where the CRL was published.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
crypto:x509:revoked
A revocation relationship between a CRL and an X.509 certificate.
The base type for the form can be found at crypto:x509:revoked.
- Properties:
name
type
doc
opts
:crl
The CRL which revoked the certificate.
Read Only:
True
:cert
The certificate revoked by the CRL.
Read Only:
True
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
crypto:x509:signedfile
A digital signature relationship between an X.509 certificate and a file.
The base type for the form can be found at crypto:x509:signedfile.
- Properties:
name
type
doc
opts
:cert
The certificate for the key which signed the file.
Read Only:
True
:file
The file which was signed by the certificates key.
Read Only:
True
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
doc:policy
Guiding principles used to reach a set of goals.
The base type for the form can be found at doc:policy.
- Properties:
name
type
doc
:id
strip:True
The policy ID.
:name
The policy name.
:type
The type of policy.
:text
The text of the policy.
:file
The file which contains the policy.
:created
The time that the policy was created.
:updated
The time that the policy was last updated.
:author
The contact information of the primary author.
:contributors
An array of contacts which contributed to the policy.
:version
The version of the policy.
:supersedes
An array of policies which are superseded by this policy.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
doc:policy:type:taxonomy
A taxonomy of policy types.
The base type for the form can be found at doc:policy:type:taxonomy.
- Properties:
name
type
doc
opts
:title
A brief title of the definition.
:summary
Deprecated. Please use title/desc.
Deprecated:True
Display:{'hint': 'text'}
:desc
A definition of the taxonomy entry.
Display:
{'hint': 'text'}
:sort
A display sort order for siblings.
:base
The base taxon.
Read Only:
True
:depth
The depth indexed from 0.
Read Only:
True
:parent
The taxonomy parent.
Read Only:
True
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
doc:requirement
A single requirement, often defined by a standard.
The base type for the form can be found at doc:requirement.
- Properties:
name
type
doc
opts
:summary
A summary of the requirement definition.
Display:
{'hint': 'text'}
:optional
Set to true if the requirement is optional as defined by the standard.
:priority
The priority of the requirement as defined by the standard.
:standard
The standard which defined the requirement.
:id
strip:True
The requirement ID.
:name
The requirement name.
:type
The type of requirement.
:text
The text of the requirement.
:file
The file which contains the requirement.
:created
The time that the requirement was created.
:updated
The time that the requirement was last updated.
:author
The contact information of the primary author.
:contributors
An array of contacts which contributed to the requirement.
:version
The version of the requirement.
:supersedes
An array of requirements which are superseded by this requirement.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
doc:requirement:type:taxonomy
A taxonomy of requirement types.
The base type for the form can be found at doc:requirement:type:taxonomy.
- Properties:
name
type
doc
opts
:title
A brief title of the definition.
:summary
Deprecated. Please use title/desc.
Deprecated:True
Display:{'hint': 'text'}
:desc
A definition of the taxonomy entry.
Display:
{'hint': 'text'}
:sort
A display sort order for siblings.
:base
The base taxon.
Read Only:
True
:depth
The depth indexed from 0.
Read Only:
True
:parent
The taxonomy parent.
Read Only:
True
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
doc:resume
A CV/resume document.
The base type for the form can be found at doc:resume.
- Properties:
name
type
doc
opts
:contact
Contact information for subject of the resume.
:summary
The summary of qualifications from the resume.
Display:
{'hint': 'text'}
:workhist
Work history described in the resume.
:education
Education experience described in the resume.
:achievements
Achievements described in the resume.
:id
strip:True
The resume ID.
:name
The resume name.
:type
The type of resume.
:text
The text of the resume.
:file
The file which contains the resume.
:created
The time that the resume was created.
:updated
The time that the resume was last updated.
:author
The contact information of the primary author.
:contributors
An array of contacts which contributed to the resume.
:version
The version of the resume.
:supersedes
An array of resumes which are superseded by this resume.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
doc:resume:type:taxonomy
A taxonomy of resume types.
The base type for the form can be found at doc:resume:type:taxonomy.
- Properties:
name
type
doc
opts
:title
A brief title of the definition.
:summary
Deprecated. Please use title/desc.
Deprecated:True
Display:{'hint': 'text'}
:desc
A definition of the taxonomy entry.
Display:
{'hint': 'text'}
:sort
A display sort order for siblings.
:base
The base taxon.
Read Only:
True
:depth
The depth indexed from 0.
Read Only:
True
:parent
The taxonomy parent.
Read Only:
True
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
doc:standard
A group of requirements which define how to implement a policy or goal.
The base type for the form can be found at doc:standard.
- Properties:
name
type
doc
:policy
The policy which was used to derive the standard.
:id
strip:True
The standard ID.
:name
The standard name.
:type
The type of standard.
:text
The text of the standard.
:file
The file which contains the standard.
:created
The time that the standard was created.
:updated
The time that the standard was last updated.
:author
The contact information of the primary author.
:contributors
An array of contacts which contributed to the standard.
:version
The version of the standard.
:supersedes
An array of standards which are superseded by this standard.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
doc:standard:type:taxonomy
A taxonomy of standard types.
The base type for the form can be found at doc:standard:type:taxonomy.
- Properties:
name
type
doc
opts
:title
A brief title of the definition.
:summary
Deprecated. Please use title/desc.
Deprecated:True
Display:{'hint': 'text'}
:desc
A definition of the taxonomy entry.
Display:
{'hint': 'text'}
:sort
A display sort order for siblings.
:base
The base taxon.
Read Only:
True
:depth
The depth indexed from 0.
Read Only:
True
:parent
The taxonomy parent.
Read Only:
True
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
econ:acct:balance
A snapshot of the balance of an account at a point in time.
The base type for the form can be found at econ:acct:balance.
- Properties:
name
type
doc
opts
:time
The time the balance was recorded.
:instrument
The financial instrument holding the balance.
:pay:card
Deprecated. Please use :instrument.
Deprecated:
True
:crypto:address
Deprecated. Please use :instrument.
Deprecated:
True
:amount
The account balance at the time.
:currency
The currency of the balance amount.
:delta
The change since last regular sample.
:total:received
The total amount of currency received by the account.
:total:sent
The total amount of currency sent from the account.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
econ:acct:invoice
An invoice issued requesting payment.
The base type for the form can be found at econ:acct:invoice.
- Properties:
name
type
doc
:issued
The time that the invoice was issued to the recipient.
:issuer
The contact information for the entity who issued the invoice.
:purchase
The purchase that the invoice is requesting payment for.
:recipient
The contact information for the intended recipient of the invoice.
:due
The time by which the payment is due.
:paid
Set to true if the invoice has been paid in full.
:amount
The balance due.
:currency
The currency that the invoice specifies for payment.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
econ:acct:payment
A payment or crypto currency transaction.
The base type for the form can be found at econ:acct:payment.
- Properties:
name
type
doc
opts
:txnid
strip:True
A payment processor specific transaction id.
:fee
The transaction fee paid by the recipient to the payment processor.
:from:cash
Set to true if the payment input was in cash.
:to:instrument
The payment instrument which received funds from the payment.
:from:instrument
The payment instrument used to make the payment.
:from:account
Deprecated. Please use :from:instrument.
Deprecated:
True
:from:pay:card
Deprecated. Please use :from:instrument.
Deprecated:
True
:from:contract
A contract used as an aggregate payment source.
:from:coinaddr
Deprecated. Please use :from:instrument.
Deprecated:
True
:from:contact
Contact information for the entity making the payment.
:to:cash
Set to true if the payment output was in cash.
:to:account
Deprecated. Please use :to:instrument.
Deprecated:
True
:to:coinaddr
Deprecated. Please use :to:instrument.
Deprecated:
True
:to:contact
Contact information for the person/org being paid.
:to:contract
A contract used as an aggregate payment destination.
:time
The time the payment was processed.
:purchase
The purchase which the payment was paying for.
:amount
The amount of money transferred in the payment.
:currency
The currency of the payment.
:memo
A small note specified by the payer common in financial transactions.
:crypto:transaction
A crypto currency transaction that initiated the payment.
:invoice
The invoice that the payment applies to.
:receipt
The receipt that was issued for the payment.
:place
The place where the payment occurred.
:place:name
The name of the place where the payment occurred.
:place:address
The address of the place where the payment occurred.
:place:loc
The loc of the place where the payment occurred.
:place:latlong
The latlong where the payment occurred.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:bank:statement
-(has)>
econ:acct:payment
The bank statement includes the payment.
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
econ:acct:receipt
A receipt issued as proof of payment.
The base type for the form can be found at econ:acct:receipt.
- Properties:
name
type
doc
:issued
The time the receipt was issued.
:purchase
The purchase that the receipt confirms payment for.
:issuer
The contact information for the entity who issued the receipt.
:recipient
The contact information for the entity who received the receipt.
:currency
The currency that the receipt uses to specify the price.
:amount
The price that the receipt confirms was paid.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
econ:acquired
Deprecated. Please use econ:purchase -(acquired)> *.
The base type for the form can be found at econ:acquired.
- Properties:
name
type
doc
opts
:purchase
The purchase event which acquired an item.
Read Only:
True
:item
A reference to the item that was acquired.
Read Only:
True
:item:form
The form of item purchased.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
econ:bank:aba:rtn
An American Bank Association (ABA) routing transit number (RTN).
The base type for the form can be found at econ:bank:aba:rtn.
- Properties:
name
type
doc
:bank
The bank which was issued the ABA RTN.
:bank:name
The name which is registered for this ABA RTN.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
econ:bank:account
A bank account.
The base type for the form can be found at econ:bank:account.
- Properties:
name
type
doc
:type
The type of bank account.
:aba:rtn
The ABA routing transit number for the bank which issued the account.
:number
regex:[0-9]+
The account number.
:iban
The IBAN for the account.
:issuer
The bank which issued the account.
:issuer:name
The name of the bank which issued the account.
:currency
The currency of the account balance.
:balance
The most recently known bank balance information.
:contact
The primary contact for the bank account.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
econ:bank:account:type:taxonomy
A bank account type taxonomy.
The base type for the form can be found at econ:bank:account:type:taxonomy.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
econ:bank:balance
A balance contained by a bank account at a point in time.
The base type for the form can be found at econ:bank:balance.
- Properties:
name
type
doc
:time
The time that the account balance was observed.
:amount
The amount of currency available at the time.
:account
The bank account which contained the balance amount.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
econ:bank:iban
An International Bank Account Number.
The base type for the form can be found at econ:bank:iban.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
econ:bank:statement
A statement of bank account payment activity over a period of time.
The base type for the form can be found at econ:bank:statement.
- Properties:
name
type
doc
:account
The bank account used to compute the statement.
:period
The period that the statement includes.
:starting:balance
The account balance at the beginning of the statement period.
:ending:balance
The account balance at the end of the statement period.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
econ:bank:statement
-(has)>
econ:acct:payment
The bank statement includes the payment.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
econ:bank:swift:bic
A Society for Worldwide Interbank Financial Telecommunication (SWIFT) Business Identifier Code (BIC).
The base type for the form can be found at econ:bank:swift:bic.
- Properties:
name
type
doc
:business
The business which is the registered owner of the SWIFT BIC.
:office
The branch or office which is specified in the last 3 digits of the SWIFT BIC.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
econ:currency
The name of a system of money in general use.
The base type for the form can be found at econ:currency.
An example of econ:currency
:
usd
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
econ:fin:bar
A sample of the open, close, high, low prices of a security in a specific time window.
The base type for the form can be found at econ:fin:bar.
- Properties:
name
type
doc
:security
The security measured by the bar.
:ival
The interval of measurement.
:price:open
The opening price of the security.
:price:close
The closing price of the security.
:price:low
The low price of the security.
:price:high
The high price of the security.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
econ:fin:exchange
A financial exchange where securities are traded.
The base type for the form can be found at econ:fin:exchange.
- Properties:
name
type
doc
opts
:name
A simple name for the exchange.
Example:
nasdaq
:org
The organization that operates the exchange.
:currency
The currency used for all transactions in the exchange.
Example:
usd
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
econ:fin:security
A financial security which is typically traded on an exchange.
The base type for the form can be found at econ:fin:security.
- Properties:
name
type
doc
:exchange
The exchange on which the security is traded.
:ticker
The identifier for this security within the exchange.
:type
A user defined type such as stock, bond, option, future, or forex.
:price
The last known/available price of the security.
:time
The time of the last know price sample.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
econ:fin:tick
A sample of the price of a security at a single moment in time.
The base type for the form can be found at econ:fin:tick.
- Properties:
name
type
doc
:security
The security measured by the tick.
:time
The time the price was sampled.
:price
The price of the security at the time.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
econ:pay:card
A single payment card.
The base type for the form can be found at econ:pay:card.
- Properties:
name
type
doc
:pan
The payment card number.
:pan:mii
The payment card MII.
:pan:iin
The payment card IIN.
:name
The name as it appears on the card.
:expr
The expiration date for the card.
:cvv
The Card Verification Value on the card.
:pin
The Personal Identification Number on the card.
:account
A bank account associated with the payment card.
:contact
The primary contact for the payment card.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
econ:pay:iin
An Issuer Id Number (IIN).
The base type for the form can be found at econ:pay:iin.
- Properties:
name
type
doc
:org
The issuer organization.
:name
lower:True
The registered name of the issuer.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
econ:purchase
A purchase event.
The base type for the form can be found at econ:purchase.
- Properties:
name
type
doc
:by:contact
The contact information used to make the purchase.
:from:contact
The contact information used to sell the item.
:time
The time of the purchase.
:place
The place where the purchase took place.
:paid
Set to True if the purchase has been paid in full.
:paid:time
The point in time where the purchase was paid in full.
:settled
The point in time where the purchase was settled.
:campaign
The campaign that the purchase was in support of.
:price
The econ:price of the purchase.
:currency
The econ:price of the purchase.
:listing
The purchase was made based on the given listing.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
econ:receipt:item
A line item included as part of a purchase.
The base type for the form can be found at econ:receipt:item.
- Properties:
name
type
doc
:purchase
The purchase that contains this line item.
:count
min:1
The number of items included in this line item.
:price
The total cost of this receipt line item.
:product
The product being being purchased in this line item.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
edge:has
A digraph edge which records that N1 has N2.
The base type for the form can be found at edge:has.
- Properties:
name
type
doc
opts
:n1
The node definition type for a (form,valu) compound field.
Read Only:
True
:n1:form
The base string type.
Read Only:
True
:n2
The node definition type for a (form,valu) compound field.
Read Only:
True
:n2:form
The base string type.
Read Only:
True
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
edge:refs
A digraph edge which records that N1 refers to or contains N2.
The base type for the form can be found at edge:refs.
- Properties:
name
type
doc
opts
:n1
The node definition type for a (form,valu) compound field.
Read Only:
True
:n1:form
The base string type.
Read Only:
True
:n2
The node definition type for a (form,valu) compound field.
Read Only:
True
:n2:form
The base string type.
Read Only:
True
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
edge:wentto
A digraph edge which records that N1 went to N2 at a specific time.
The base type for the form can be found at edge:wentto.
- Properties:
name
type
doc
opts
:n1
The node definition type for a (form,valu) compound field.
Read Only:
True
:n1:form
The base string type.
Read Only:
True
:n2
The node definition type for a (form,valu) compound field.
Read Only:
True
:n2:form
The base string type.
Read Only:
True
:time
A date/time value.
Read Only:
True
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
edu:class
An instance of an edu:course taught at a given time.
The base type for the form can be found at edu:class.
- Properties:
name
type
doc
:course
The course being taught in the class.
:instructor
The primary instructor for the class.
:assistants
An array of assistant/co-instructor contacts.
:date:first
The date of the first day of class.
:date:last
The date of the last day of class.
:isvirtual
Set if the class is known to be virtual.
:virtual:url
The URL a student would use to attend the virtual class.
:virtual:provider
Contact info for the virtual infrastructure provider.
:place
The place that the class is held.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
edu:course
A course of study taught by an org.
The base type for the form can be found at edu:course.
- Properties:
name
type
doc
opts
:name
The name of the course.
Example:
organic chemistry for beginners
:desc
A brief course description.
:code
The course catalog number or designator.
Example:
chem101
:institution
The org or department which teaches the course.
:prereqs
The pre-requisite courses for taking this course.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
entity:name
A name used to refer to an entity.
The base type for the form can be found at entity:name.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
file:archive:entry
An archive entry representing a file and metadata within a parent archive file.
The base type for the form can be found at file:archive:entry.
- Properties:
name
type
doc
:parent
The parent archive file.
:file
The file contained within the archive.
:path
The file path of the archived file.
:user
The name of the user who owns the archived file.
:added
The time that the file was added to the archive.
:created
The created time of the archived file.
:modified
The modified time of the archived file.
:comment
The comment field for the file entry within the archive.
:posix:uid
The POSIX UID of the user who owns the archived file.
:posix:gid
The POSIX GID of the group who owns the archived file.
:posix:perms
The POSIX permissions mask of the archived file.
:archived:size
The encoded or compressed size of the archived file within the parent.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
file:attachment
A file attachment.
The base type for the form can be found at file:attachment.
- Properties:
name
type
doc
:name
The name of the attached file.
:text
Any text associated with the file such as alt-text for images.
:file
The file which was attached.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
file:base
A file name with no path.
The base type for the form can be found at file:base.
An example of file:base
:
woot.exe
- Properties:
name
type
doc
opts
:ext
The file extension (if any).
Read Only:
True
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
file:bytes
The file bytes type with SHA256 based primary property.
The base type for the form can be found at file:bytes.
- Properties:
name
type
doc
:size
The file size in bytes.
:md5
The md5 hash of the file.
:sha1
The sha1 hash of the file.
:sha256
The sha256 hash of the file.
:sha512
The sha512 hash of the file.
:name
The best known base name for the file.
:mime
The “best” mime type name for the file.
:mime:x509:cn
The Common Name (CN) attribute of the x509 Subject.
:mime:pe:size
The size of the executable file according to the PE file header.
:mime:pe:imphash
The PE import hash of the file as calculated by pefile; https://github.com/erocarrera/pefile .
:mime:pe:compiled
The compile time of the file according to the PE header.
:mime:pe:pdbpath
The PDB string according to the PE.
:mime:pe:exports:time
The export time of the file according to the PE.
:mime:pe:exports:libname
The export library name according to the PE.
:mime:pe:richhdr
The sha256 hash of the rich header bytes.
:exe:compiler
The software used to compile the file.
:exe:packer
The packer software used to encode the file.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
file:bytes
-(refs)>
it:dev:str
The source file contains the target string.
file:bytes
-(uses)>
math:algorithm
The file uses the algorithm.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
file:filepath
The fused knowledge of the association of a file:bytes node and a file:path.
The base type for the form can be found at file:filepath.
- Properties:
name
type
doc
opts
:file
The file seen at a path.
Read Only:
True
:path
The path a file was seen at.
Read Only:
True
:path:dir
The parent directory.
Read Only:
True
:path:base
The name of the file.
Read Only:
True
:path:base:ext
The extension of the file name.
Read Only:
True
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
file:ismime
Records one, of potentially multiple, mime types for a given file.
The base type for the form can be found at file:ismime.
- Properties:
name
type
doc
opts
:file
The file node that is an instance of the named mime type.
Read Only:
True
:mime
The mime type of the file.
Read Only:
True
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
file:mime
A file mime name string.
The base type for the form can be found at file:mime.
An example of file:mime
:
text/plain
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
file:mime:gif
The GUID of a set of mime metadata for a .gif file.
The base type for the form can be found at file:mime:gif.
- Properties:
name
type
doc
:desc
MIME specific description field extracted from metadata.
:comment
MIME specific comment field extracted from metadata.
:created
MIME specific creation timestamp extracted from metadata.
:imageid
MIME specific unique identifier extracted from metadata.
:author
MIME specific contact information extracted from metadata.
:latlong
MIME specific lat/long information extracted from metadata.
:altitude
MIME specific altitude information extracted from metadata.
:text
The text contained within the image.
:file
The file that the mime info was parsed from.
:file:offs
The optional offset where the mime info was parsed from.
:file:data
A mime specific arbitrary data structure for non-indexed data.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
file:mime:jpg
The GUID of a set of mime metadata for a .jpg file.
The base type for the form can be found at file:mime:jpg.
- Properties:
name
type
doc
:desc
MIME specific description field extracted from metadata.
:comment
MIME specific comment field extracted from metadata.
:created
MIME specific creation timestamp extracted from metadata.
:imageid
MIME specific unique identifier extracted from metadata.
:author
MIME specific contact information extracted from metadata.
:latlong
MIME specific lat/long information extracted from metadata.
:altitude
MIME specific altitude information extracted from metadata.
:text
The text contained within the image.
:file
The file that the mime info was parsed from.
:file:offs
The optional offset where the mime info was parsed from.
:file:data
A mime specific arbitrary data structure for non-indexed data.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
file:mime:lnk
The GUID of the metadata pulled from a Windows shortcut or LNK file.
The base type for the form can be found at file:mime:lnk.
- Properties:
name
type
doc
opts
:flags
The flags specified by the LNK header that control the structure of the LNK file.
:entry:primary
The primary file path contained within the FileEntry structure of the LNK file.
:entry:secondary
The secondary file path contained within the FileEntry structure of the LNK file.
:entry:extended
The extended file path contained within the extended FileEntry structure of the LNK file.
:entry:localized
The localized file path reconstructed from references within the extended FileEntry structure of the LNK file.
:entry:icon
The icon file path contained within the StringData structure of the LNK file.
:environment:path
The target file path contained within the EnvironmentVariableDataBlock structure of the LNK file.
:environment:icon
The icon file path contained within the IconEnvironmentDataBlock structure of the LNK file.
:iconindex
A resource index for an icon within an icon location.
:working
The working directory used when activating the link target.
:relative
strip:True
The relative target path string contained within the StringData structure of the LNK file.
:arguments
The command line arguments passed to the target file when the LNK file is activated.
:desc
The description of the LNK file contained within the StringData section of the LNK file.
Display:
{'hint': 'text'}
:target:attrs
The attributes of the target file according to the LNK header.
:target:size
The size of the target file according to the LNK header. The LNK format specifies that this is only the lower 32 bits of the target file size.
:target:created
The creation time of the target file according to the LNK header.
:target:accessed
The access time of the target file according to the LNK header.
:target:written
The write time of the target file according to the LNK header.
:driveserial
The drive serial number of the volume the link target is stored on.
:machineid
The NetBIOS name of the machine where the link target was last located.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
file:mime:macho:loadcmd
A generic load command pulled from the Mach-O headers.
The base type for the form can be found at file:mime:macho:loadcmd.
- Properties:
name
type
doc
:file
The Mach-O file containing the load command.
:type
enums:((1, 'segment'), (2, 'symbol table'), (3, 'gdb symbol table'), (4, 'thread'), (5, 'unix thread'), (6, 'fixed VM shared library'), (7, 'fixed VM shared library identification'), (8, 'object identification'), (9, 'fixed VM file inclusion'), (10, 'prepage'), (11, 'dynamic link-edit symbol table'), (12, 'load dynamically linked shared library'), (13, 'dynamically linked shared library identifier'), (14, 'load dynamic linker'), (15, 'dynamic linker identification'), (16, 'prebound dynamically linked shared library'), (17, 'image routines'), (18, 'sub framework'), (19, 'sub umbrella'), (20, 'sub client'), (21, 'sub library'), (22, 'two level namespace lookup hints'), (23, 'prebind checksum'), (24, 'weak import dynamically linked shared library'), (25, '64bit segment'), (26, '64bit image routines'), (27, 'uuid'), (28, 'runpath additions'), (29, 'code signature'), (30, 'split segment info'), (31, 'load and re-export dynamic library'), (32, 'delay load of dynamic library'), (33, 'encrypted segment information'), (34, 'compressed dynamic library information'), (35, 'load upward dylib'), (36, 'minimum osx version'), (37, 'minimum ios version'), (38, 'compressed table of function start addresses'), (39, 'environment variable string for dynamic library'), (40, 'unix thread replacement'), (41, 'table of non-instructions in __text'), (42, 'source version used to build binary'), (43, 'Code signing DRs copied from linked dynamic libraries'))
The type of the load command.
:size
The size of the load command structure in bytes.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
file:mime:macho:section
A section inside a Mach-O binary denoting a named region of bytes inside a segment.
The base type for the form can be found at file:mime:macho:section.
- Properties:
name
type
doc
:segment
The Mach-O segment that contains this section.
:name
Name of the section.
:size
Size of the section in bytes.
:type
enums:((0, 'regular'), (1, 'zero fill on demand'), (2, 'only literal C strings'), (3, 'only 4 byte literals'), (4, 'only 8 byte literals'), (5, 'only pointers to literals'), (6, 'only non-lazy symbol pointers'), (7, 'only lazy symbol pointers'), (8, 'only symbol stubs'), (9, 'only function pointers for init'), (10, 'only function pointers for fini'), (11, 'contains symbols to be coalesced'), (12, 'zero fill on deman (greater than 4gb)'), (13, 'only pairs of function pointers for interposing'), (14, 'only 16 byte literals'), (15, 'dtrace object format'), (16, 'only lazy symbols pointers to lazy dynamic libraries'))
The type of the section.
:sha256
The sha256 hash of the bytes of the Mach-O section.
:offset
The file offset to the beginning of the section.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
file:mime:macho:segment
A named region of bytes inside a Mach-O binary.
The base type for the form can be found at file:mime:macho:segment.
- Properties:
name
type
doc
:name
The name of the Mach-O segment.
:memsize
The size of the segment in bytes, when resident in memory, according to the load command structure.
:disksize
The size of the segment in bytes, when on disk, according to the load command structure.
:sha256
The sha256 hash of the bytes of the segment.
:offset
The file offset to the beginning of the segment.
:file
The Mach-O file containing the load command.
:type
enums:((1, 'segment'), (2, 'symbol table'), (3, 'gdb symbol table'), (4, 'thread'), (5, 'unix thread'), (6, 'fixed VM shared library'), (7, 'fixed VM shared library identification'), (8, 'object identification'), (9, 'fixed VM file inclusion'), (10, 'prepage'), (11, 'dynamic link-edit symbol table'), (12, 'load dynamically linked shared library'), (13, 'dynamically linked shared library identifier'), (14, 'load dynamic linker'), (15, 'dynamic linker identification'), (16, 'prebound dynamically linked shared library'), (17, 'image routines'), (18, 'sub framework'), (19, 'sub umbrella'), (20, 'sub client'), (21, 'sub library'), (22, 'two level namespace lookup hints'), (23, 'prebind checksum'), (24, 'weak import dynamically linked shared library'), (25, '64bit segment'), (26, '64bit image routines'), (27, 'uuid'), (28, 'runpath additions'), (29, 'code signature'), (30, 'split segment info'), (31, 'load and re-export dynamic library'), (32, 'delay load of dynamic library'), (33, 'encrypted segment information'), (34, 'compressed dynamic library information'), (35, 'load upward dylib'), (36, 'minimum osx version'), (37, 'minimum ios version'), (38, 'compressed table of function start addresses'), (39, 'environment variable string for dynamic library'), (40, 'unix thread replacement'), (41, 'table of non-instructions in __text'), (42, 'source version used to build binary'), (43, 'Code signing DRs copied from linked dynamic libraries'))
The type of the load command.
:size
The size of the load command structure in bytes.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
file:mime:macho:uuid
A specific load command denoting a UUID used to uniquely identify the Mach-O binary.
The base type for the form can be found at file:mime:macho:uuid.
- Properties:
name
type
doc
:uuid
The UUID of the Mach-O application (as defined in an LC_UUID load command).
:file
The Mach-O file containing the load command.
:type
enums:((1, 'segment'), (2, 'symbol table'), (3, 'gdb symbol table'), (4, 'thread'), (5, 'unix thread'), (6, 'fixed VM shared library'), (7, 'fixed VM shared library identification'), (8, 'object identification'), (9, 'fixed VM file inclusion'), (10, 'prepage'), (11, 'dynamic link-edit symbol table'), (12, 'load dynamically linked shared library'), (13, 'dynamically linked shared library identifier'), (14, 'load dynamic linker'), (15, 'dynamic linker identification'), (16, 'prebound dynamically linked shared library'), (17, 'image routines'), (18, 'sub framework'), (19, 'sub umbrella'), (20, 'sub client'), (21, 'sub library'), (22, 'two level namespace lookup hints'), (23, 'prebind checksum'), (24, 'weak import dynamically linked shared library'), (25, '64bit segment'), (26, '64bit image routines'), (27, 'uuid'), (28, 'runpath additions'), (29, 'code signature'), (30, 'split segment info'), (31, 'load and re-export dynamic library'), (32, 'delay load of dynamic library'), (33, 'encrypted segment information'), (34, 'compressed dynamic library information'), (35, 'load upward dylib'), (36, 'minimum osx version'), (37, 'minimum ios version'), (38, 'compressed table of function start addresses'), (39, 'environment variable string for dynamic library'), (40, 'unix thread replacement'), (41, 'table of non-instructions in __text'), (42, 'source version used to build binary'), (43, 'Code signing DRs copied from linked dynamic libraries'))
The type of the load command.
:size
The size of the load command structure in bytes.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
file:mime:macho:version
A specific load command used to denote the version of the source used to build the Mach-O binary.
The base type for the form can be found at file:mime:macho:version.
- Properties:
name
type
doc
:version
The version of the Mach-O file encoded in an LC_VERSION load command.
:file
The Mach-O file containing the load command.
:type
enums:((1, 'segment'), (2, 'symbol table'), (3, 'gdb symbol table'), (4, 'thread'), (5, 'unix thread'), (6, 'fixed VM shared library'), (7, 'fixed VM shared library identification'), (8, 'object identification'), (9, 'fixed VM file inclusion'), (10, 'prepage'), (11, 'dynamic link-edit symbol table'), (12, 'load dynamically linked shared library'), (13, 'dynamically linked shared library identifier'), (14, 'load dynamic linker'), (15, 'dynamic linker identification'), (16, 'prebound dynamically linked shared library'), (17, 'image routines'), (18, 'sub framework'), (19, 'sub umbrella'), (20, 'sub client'), (21, 'sub library'), (22, 'two level namespace lookup hints'), (23, 'prebind checksum'), (24, 'weak import dynamically linked shared library'), (25, '64bit segment'), (26, '64bit image routines'), (27, 'uuid'), (28, 'runpath additions'), (29, 'code signature'), (30, 'split segment info'), (31, 'load and re-export dynamic library'), (32, 'delay load of dynamic library'), (33, 'encrypted segment information'), (34, 'compressed dynamic library information'), (35, 'load upward dylib'), (36, 'minimum osx version'), (37, 'minimum ios version'), (38, 'compressed table of function start addresses'), (39, 'environment variable string for dynamic library'), (40, 'unix thread replacement'), (41, 'table of non-instructions in __text'), (42, 'source version used to build binary'), (43, 'Code signing DRs copied from linked dynamic libraries'))
The type of the load command.
:size
The size of the load command structure in bytes.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
file:mime:msdoc
The GUID of a set of mime metadata for a Microsoft Word file.
The base type for the form can be found at file:mime:msdoc.
- Properties:
name
type
doc
:title
The title extracted from Microsoft Office metadata.
:author
The author extracted from Microsoft Office metadata.
:subject
The subject extracted from Microsoft Office metadata.
:application
The creating_application extracted from Microsoft Office metadata.
:created
The create_time extracted from Microsoft Office metadata.
:lastsaved
The last_saved_time extracted from Microsoft Office metadata.
:file
The file that the mime info was parsed from.
:file:offs
The optional offset where the mime info was parsed from.
:file:data
A mime specific arbitrary data structure for non-indexed data.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
file:mime:msppt
The GUID of a set of mime metadata for a Microsoft Powerpoint file.
The base type for the form can be found at file:mime:msppt.
- Properties:
name
type
doc
:title
The title extracted from Microsoft Office metadata.
:author
The author extracted from Microsoft Office metadata.
:subject
The subject extracted from Microsoft Office metadata.
:application
The creating_application extracted from Microsoft Office metadata.
:created
The create_time extracted from Microsoft Office metadata.
:lastsaved
The last_saved_time extracted from Microsoft Office metadata.
:file
The file that the mime info was parsed from.
:file:offs
The optional offset where the mime info was parsed from.
:file:data
A mime specific arbitrary data structure for non-indexed data.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
file:mime:msxls
The GUID of a set of mime metadata for a Microsoft Excel file.
The base type for the form can be found at file:mime:msxls.
- Properties:
name
type
doc
:title
The title extracted from Microsoft Office metadata.
:author
The author extracted from Microsoft Office metadata.
:subject
The subject extracted from Microsoft Office metadata.
:application
The creating_application extracted from Microsoft Office metadata.
:created
The create_time extracted from Microsoft Office metadata.
:lastsaved
The last_saved_time extracted from Microsoft Office metadata.
:file
The file that the mime info was parsed from.
:file:offs
The optional offset where the mime info was parsed from.
:file:data
A mime specific arbitrary data structure for non-indexed data.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
file:mime:pe:export
The fused knowledge of a file:bytes node containing a pe named export.
The base type for the form can be found at file:mime:pe:export.
- Properties:
name
type
doc
opts
:file
The file containing the export.
Read Only:
True
:name
The name of the export in the file.
Read Only:
True
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
file:mime:pe:resource
The fused knowledge of a file:bytes node containing a pe resource.
The base type for the form can be found at file:mime:pe:resource.
- Properties:
name
type
doc
opts
:file
The file containing the resource.
Read Only:
True
:type
The typecode for the resource.
Read Only:
True
:langid
The language code for the resource.
Read Only:
True
:resource
The sha256 hash of the resource bytes.
Read Only:
True
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
file:mime:pe:section
The fused knowledge a file:bytes node containing a pe section.
The base type for the form can be found at file:mime:pe:section.
- Properties:
name
type
doc
opts
:file
The file containing the section.
Read Only:
True
:name
The textual name of the section.
Read Only:
True
:sha256
The sha256 hash of the section. Relocations must be zeroed before hashing.
Read Only:
True
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
file:mime:pe:vsvers:info
knowledge of a file:bytes node containing vsvers info.
The base type for the form can be found at file:mime:pe:vsvers:info.
- Properties:
name
type
doc
opts
:file
The file containing the vsversion keyval pair.
Read Only:
True
:keyval
The vsversion info keyval in this file:bytes node.
Read Only:
True
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
file:mime:pe:vsvers:keyval
A key value pair found in a PE vsversion info structure.
The base type for the form can be found at file:mime:pe:vsvers:keyval.
- Properties:
name
type
doc
opts
:name
The key for the vsversion keyval pair.
Read Only:
True
:value
The value for the vsversion keyval pair.
Read Only:
True
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
file:mime:png
The GUID of a set of mime metadata for a .png file.
The base type for the form can be found at file:mime:png.
- Properties:
name
type
doc
:desc
MIME specific description field extracted from metadata.
:comment
MIME specific comment field extracted from metadata.
:created
MIME specific creation timestamp extracted from metadata.
:imageid
MIME specific unique identifier extracted from metadata.
:author
MIME specific contact information extracted from metadata.
:latlong
MIME specific lat/long information extracted from metadata.
:altitude
MIME specific altitude information extracted from metadata.
:text
The text contained within the image.
:file
The file that the mime info was parsed from.
:file:offs
The optional offset where the mime info was parsed from.
:file:data
A mime specific arbitrary data structure for non-indexed data.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
file:mime:rtf
The GUID of a set of mime metadata for a .rtf file.
The base type for the form can be found at file:mime:rtf.
- Properties:
name
type
doc
:guid
The parsed GUID embedded in the .rtf file.
:file
The file that the mime info was parsed from.
:file:offs
The optional offset where the mime info was parsed from.
:file:data
A mime specific arbitrary data structure for non-indexed data.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
file:mime:tif
The GUID of a set of mime metadata for a .tif file.
The base type for the form can be found at file:mime:tif.
- Properties:
name
type
doc
:desc
MIME specific description field extracted from metadata.
:comment
MIME specific comment field extracted from metadata.
:created
MIME specific creation timestamp extracted from metadata.
:imageid
MIME specific unique identifier extracted from metadata.
:author
MIME specific contact information extracted from metadata.
:latlong
MIME specific lat/long information extracted from metadata.
:altitude
MIME specific altitude information extracted from metadata.
:text
The text contained within the image.
:file
The file that the mime info was parsed from.
:file:offs
The optional offset where the mime info was parsed from.
:file:data
A mime specific arbitrary data structure for non-indexed data.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
file:path
A normalized file path.
The base type for the form can be found at file:path.
An example of file:path
:
c:/windows/system32/calc.exe
- Properties:
name
type
doc
opts
:dir
The parent directory.
Read Only:
True
:base
The file base name.
Read Only:
True
:base:ext
The file extension.
Read Only:
True
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
file:string
Deprecated. Please use the edge -(refs)> it:dev:str.
The base type for the form can be found at file:string.
- Properties:
name
type
doc
opts
:file
The file containing the string.
Read Only:
True
:string
The string contained in this file:bytes node.
Read Only:
True
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
file:subfile
A parent file that fully contains the specified child file.
The base type for the form can be found at file:subfile.
- Properties:
name
type
doc
opts
:parent
The parent file containing the child file.
Read Only:
True
:child
The child file contained in the parent file.
Read Only:
True
:name
Deprecated, please use the :path property.
Deprecated:
True
:path
The path that the parent uses to refer to the child file.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
geo:name
An unstructured place name or address.
The base type for the form can be found at geo:name.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
geo:nloc
Records a node latitude/longitude in space-time.
The base type for the form can be found at geo:nloc.
- Properties:
name
type
doc
opts
:ndef
The node with location in geospace and time.
Read Only:
True
:ndef:form
The form of node referenced by the ndef.
Read Only:
True
:latlong
The latitude/longitude the node was observed.
Read Only:
True
:time
The time the node was observed at location.
Read Only:
True
:place
The place corresponding to the latlong property.
:loc
The geo-political location string for the node.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
geo:place
A GUID for a geographic place.
The base type for the form can be found at geo:place.
- Properties:
name
type
doc
opts
:id
strip:True
A type specific identifier such as an airport ID.
:name
The name of the place.
alts:
('names',)
:type
The type of place.
:names
An array of alternative place names.
:parent
Deprecated. Please use a -(contains)> edge.
Deprecated:
True
:desc
A long form description of the place.
:loc
The geo-political location string for the node.
:address
The street/mailing address for the place.
:geojson
A GeoJSON representation of the place.
:latlong
The lat/long position for the place.
:bbox
A bounding box which encompasses the place.
:radius
An approximate radius to use for bounding box calculation.
:photo
The image file to use as the primary image of the place.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
geo:place
-(contains)>
geo:place
The source place completely contains the target place.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
geo:place
-(contains)>
geo:place
None
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
geo:place:taxonomy
A taxonomy of place types.
The base type for the form can be found at geo:place:taxonomy.
- Properties:
name
type
doc
opts
:title
A brief title of the definition.
:summary
Deprecated. Please use title/desc.
Deprecated:True
Display:{'hint': 'text'}
:desc
A definition of the taxonomy entry.
Display:
{'hint': 'text'}
:sort
A display sort order for siblings.
:base
The base taxon.
Read Only:
True
:depth
The depth indexed from 0.
Read Only:
True
:parent
The taxonomy parent.
Read Only:
True
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
geo:telem
The geospatial position and physical characteristics of a node at a given time.
The base type for the form can be found at geo:telem.
- Properties:
name
type
doc
opts
:time
The time that the telemetry measurements were taken.
:desc
A description of the telemetry sample.
:latlong
Deprecated. Please use :place:latlong.
Deprecated:
True
:accuracy
Deprecated. Please use :place:latlong:accuracy.
Deprecated:
True
:node
The node that was observed at the associated time and place.
:phys:mass
The mass of the object.
:phys:volume
The cubed volume of the object.
:phys:length
The length of the object.
:phys:width
The width of the object.
:phys:height
The height of the object.
:place
The place where the object was located.
:place:loc
The geopolitical location of the object.
:place:name
The name of the place where the object was located.
:place:address
The postal address of the place where the object was located.
:place:latlong
The latlong where the object was located.
:place:latlong:accuracy
The accuracy of the latlong where the object was located.
:place:country
The country where the object was located.
:place:country:code
The country code where the object was located.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
gov:cn:icp
A Chinese Internet Content Provider ID.
The base type for the form can be found at gov:cn:icp.
- Properties:
name
type
doc
:org
The org with the Internet Content Provider ID.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
gov:cn:mucd
A Chinese PLA MUCD.
The base type for the form can be found at gov:cn:mucd.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
gov:us:cage
A Commercial and Government Entity (CAGE) code.
The base type for the form can be found at gov:us:cage.
- Properties:
name
type
doc
:name0
The name of the organization.
:name1
lower:True
Name Part 1.
:street
lower:True
The base string type.
:city
lower:True
The base string type.
:state
lower:True
The base string type.
:zip
A US Postal Zip Code.
:cc
The 2 digit ISO 3166 country code.
:country
lower:True
The base string type.
:phone0
A phone number.
:phone1
A phone number.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
gov:us:ssn
A US Social Security Number (SSN).
The base type for the form can be found at gov:us:ssn.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
gov:us:zip
A US Postal Zip Code.
The base type for the form can be found at gov:us:zip.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
graph:cluster
A generic node, used in conjunction with Edge types, to cluster arbitrary nodes to a single node in the model.
The base type for the form can be found at graph:cluster.
- Properties:
name
type
doc
:name
lower:True
A human friendly name for the cluster.
:desc
lower:True
A human friendly long form description for the cluster.
:type
lower:True
An optional type field used to group clusters.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
graph:edge
A generic digraph edge to show relationships outside the model.
The base type for the form can be found at graph:edge.
- Properties:
name
type
doc
opts
:n1
The node definition type for a (form,valu) compound field.
Read Only:
True
:n1:form
The base string type.
Read Only:
True
:n2
The node definition type for a (form,valu) compound field.
Read Only:
True
:n2:form
The base string type.
Read Only:
True
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
graph:event
A generic event node to represent events outside the model.
The base type for the form can be found at graph:event.
- Properties:
name
type
doc
:time
The time of the event.
:type
A arbitrary type string for the event.
:name
A name for the event.
:data
Arbitrary non-indexed msgpack data attached to the event.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
graph:node
A generic node used to represent objects outside the model.
The base type for the form can be found at graph:node.
- Properties:
name
type
doc
:type
The type name for the non-model node.
:name
A human readable name for this record.
:data
Arbitrary non-indexed msgpack data attached to the node.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
graph:timeedge
A generic digraph time edge to show relationships outside the model.
The base type for the form can be found at graph:timeedge.
- Properties:
name
type
doc
opts
:time
A date/time value.
Read Only:
True
:n1
The node definition type for a (form,valu) compound field.
Read Only:
True
:n1:form
The base string type.
Read Only:
True
:n2
The node definition type for a (form,valu) compound field.
Read Only:
True
:n2:form
The base string type.
Read Only:
True
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
hash:md5
A hex encoded MD5 hash.
The base type for the form can be found at hash:md5.
An example of hash:md5
:
d41d8cd98f00b204e9800998ecf8427e
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
hash:sha1
A hex encoded SHA1 hash.
The base type for the form can be found at hash:sha1.
An example of hash:sha1
:
da39a3ee5e6b4b0d3255bfef95601890afd80709
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
hash:sha256
A hex encoded SHA256 hash.
The base type for the form can be found at hash:sha256.
An example of hash:sha256
:
ad9f4fe922b61e674a09530831759843b1880381de686a43460a76864ca0340c
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
hash:sha384
A hex encoded SHA384 hash.
The base type for the form can be found at hash:sha384.
An example of hash:sha384
:
d425f1394e418ce01ed1579069a8bfaa1da8f32cf823982113ccbef531fa36bda9987f389c5af05b5e28035242efab6c
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
hash:sha512
A hex encoded SHA512 hash.
The base type for the form can be found at hash:sha512.
An example of hash:sha512
:
ca74fe2ff2d03b29339ad7d08ba21d192077fece1715291c7b43c20c9136cd132788239189f3441a87eb23ce2660aa243f334295902c904b5520f6e80ab91f11
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
inet:asn
An Autonomous System Number (ASN).
The base type for the form can be found at inet:asn.
- Properties:
name
type
doc
:name
lower:True
The name of the organization currently responsible for the ASN.
:owner
The guid of the organization currently responsible for the ASN.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
inet:asnet4
An Autonomous System Number (ASN) and its associated IPv4 address range.
The base type for the form can be found at inet:asnet4.
An example of inet:asnet4
:
(54959, (1.2.3.4, 1.2.3.20))
- Properties:
name
type
doc
opts
:asn
The Autonomous System Number (ASN) of the netblock.
Read Only:
True
:net4
The IPv4 address range assigned to the ASN.
Read Only:
True
:net4:min
The first IPv4 in the range assigned to the ASN.
Read Only:
True
:net4:max
The last IPv4 in the range assigned to the ASN.
Read Only:
True
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
inet:asnet6
An Autonomous System Number (ASN) and its associated IPv6 address range.
The base type for the form can be found at inet:asnet6.
An example of inet:asnet6
:
(54959, (ff::00, ff::02))
- Properties:
name
type
doc
opts
:asn
The Autonomous System Number (ASN) of the netblock.
Read Only:
True
:net6
The IPv6 address range assigned to the ASN.
Read Only:
True
:net6:min
The first IPv6 in the range assigned to the ASN.
Read Only:
True
:net6:max
The last IPv6 in the range assigned to the ASN.
Read Only:
True
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
inet:cidr4
An IPv4 address block in Classless Inter-Domain Routing (CIDR) notation.
The base type for the form can be found at inet:cidr4.
An example of inet:cidr4
:
1.2.3.0/24
- Properties:
name
type
doc
opts
:broadcast
The broadcast IP address from the CIDR notation.
Read Only:
True
:mask
The mask from the CIDR notation.
Read Only:
True
:network
The network IP address from the CIDR notation.
Read Only:
True
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
inet:cidr6
An IPv6 address block in Classless Inter-Domain Routing (CIDR) notation.
The base type for the form can be found at inet:cidr6.
An example of inet:cidr6
:
2001:db8::/101
- Properties:
name
type
doc
opts
:broadcast
The broadcast IP address from the CIDR notation.
Read Only:
True
:mask
The mask from the CIDR notation.
Read Only:
True
:network
The network IP address from the CIDR notation.
Read Only:
True
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
inet:client
A network client address.
The base type for the form can be found at inet:client.
An example of inet:client
:
tcp://1.2.3.4:80
- Properties:
name
type
doc
opts
:proto
lower:True
The network protocol of the client.
Read Only:
True
:ipv4
The IPv4 of the client.
Read Only:
True
:ipv6
The IPv6 of the client.
Read Only:
True
:host
The it:host node for the client.
Read Only:
True
:port
The client tcp/udp port.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
inet:dns:a
The result of a DNS A record lookup.
The base type for the form can be found at inet:dns:a.
An example of inet:dns:a
:
(vertex.link,1.2.3.4)
- Properties:
name
type
doc
opts
:fqdn
The domain queried for its DNS A record.
Read Only:
True
:ipv4
The IPv4 address returned in the A record.
Read Only:
True
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
inet:dns:aaaa
The result of a DNS AAAA record lookup.
The base type for the form can be found at inet:dns:aaaa.
An example of inet:dns:aaaa
:
(vertex.link,2607:f8b0:4004:809::200e)
- Properties:
name
type
doc
opts
:fqdn
The domain queried for its DNS AAAA record.
Read Only:
True
:ipv6
The IPv6 address returned in the AAAA record.
Read Only:
True
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
inet:dns:answer
A single answer from within a DNS reply.
The base type for the form can be found at inet:dns:answer.
- Properties:
name
type
doc
:ttl
The base 64 bit signed integer type.
:request
A single instance of a DNS resolver request and optional reply info.
:a
The DNS A record returned by the lookup.
:ns
The DNS NS record returned by the lookup.
:rev
The DNS PTR record returned by the lookup.
:aaaa
The DNS AAAA record returned by the lookup.
:rev6
The DNS PTR record returned by the lookup of an IPv6 address.
:cname
The DNS CNAME record returned by the lookup.
:mx
The DNS MX record returned by the lookup.
:mx:priority
The DNS MX record priority.
:soa
The domain queried for its SOA record.
:txt
The DNS TXT record returned by the lookup.
:time
The time that the DNS response was transmitted.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
inet:dns:cname
The result of a DNS CNAME record lookup.
The base type for the form can be found at inet:dns:cname.
An example of inet:dns:cname
:
(foo.vertex.link,vertex.link)
- Properties:
name
type
doc
opts
:fqdn
The domain queried for its CNAME record.
Read Only:
True
:cname
The domain returned in the CNAME record.
Read Only:
True
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
inet:dns:dynreg
A dynamic DNS registration.
The base type for the form can be found at inet:dns:dynreg.
- Properties:
name
type
doc
:fqdn
The FQDN registered within a dynamic DNS provider.
:provider
The organization which provides the dynamic DNS FQDN.
:provider:name
The name of the organization which provides the dynamic DNS FQDN.
:provider:fqdn
The FQDN of the organization which provides the dynamic DNS FQDN.
:contact
The contact information of the registrant.
:created
The time that the dynamic DNS registration was first created.
:client
The network client address used to register the dynamic FQDN.
:client:ipv4
The client IPv4 address used to register the dynamic FQDN.
:client:ipv6
The client IPv6 address used to register the dynamic FQDN.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
inet:dns:mx
The result of a DNS MX record lookup.
The base type for the form can be found at inet:dns:mx.
An example of inet:dns:mx
:
(vertex.link,mail.vertex.link)
- Properties:
name
type
doc
opts
:fqdn
The domain queried for its MX record.
Read Only:
True
:mx
The domain returned in the MX record.
Read Only:
True
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
inet:dns:ns
The result of a DNS NS record lookup.
The base type for the form can be found at inet:dns:ns.
An example of inet:dns:ns
:
(vertex.link,ns.dnshost.com)
- Properties:
name
type
doc
opts
:zone
The domain queried for its DNS NS record.
Read Only:
True
:ns
The domain returned in the NS record.
Read Only:
True
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
inet:dns:query
A DNS query unique to a given client.
The base type for the form can be found at inet:dns:query.
An example of inet:dns:query
:
(1.2.3.4, woot.com, 1)
- Properties:
name
type
doc
opts
:client
A network client address.
Read Only:
True
:name
A DNS query name string. Likely an FQDN but not always.
Read Only:
True
:name:ipv4
An IPv4 address.
:name:ipv6
An IPv6 address.
:name:fqdn
A Fully Qualified Domain Name (FQDN).
:type
The base 64 bit signed integer type.
Read Only:
True
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
inet:dns:request
A single instance of a DNS resolver request and optional reply info.
The base type for the form can be found at inet:dns:request.
- Properties:
name
type
doc
:time
A date/time value.
:query
A DNS query unique to a given client.
:query:name
A DNS query name string. Likely an FQDN but not always.
:query:name:ipv4
An IPv4 address.
:query:name:ipv6
An IPv6 address.
:query:name:fqdn
A Fully Qualified Domain Name (FQDN).
:query:type
The base 64 bit signed integer type.
:server
A network server address.
:reply:code
enums:((0, 'NOERROR'), (1, 'FORMERR'), (2, 'SERVFAIL'), (3, 'NXDOMAIN'), (4, 'NOTIMP'), (5, 'REFUSED'), (6, 'YXDOMAIN'), (7, 'YXRRSET'), (8, 'NXRRSET'), (9, 'NOTAUTH'), (10, 'NOTZONE'), (11, 'DSOTYPENI'), (16, 'BADSIG'), (17, 'BADKEY'), (18, 'BADTIME'), (19, 'BADMODE'), (20, 'BADNAME'), (21, 'BADALG'), (22, 'BADTRUNC'), (23, 'BADCOOKIE'))
enums:strict:False
The DNS server response code.
:exe
The file containing the code that attempted the DNS lookup.
:proc
The process that attempted the DNS lookup.
:host
The host that attempted the DNS lookup.
:sandbox:file
The initial sample given to a sandbox environment to analyze.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
inet:dns:rev
The transformed result of a DNS PTR record lookup.
The base type for the form can be found at inet:dns:rev.
An example of inet:dns:rev
:
(1.2.3.4,vertex.link)
- Properties:
name
type
doc
opts
:ipv4
The IPv4 address queried for its DNS PTR record.
Read Only:
True
:fqdn
The domain returned in the PTR record.
Read Only:
True
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
inet:dns:rev6
The transformed result of a DNS PTR record for an IPv6 address.
The base type for the form can be found at inet:dns:rev6.
An example of inet:dns:rev6
:
(2607:f8b0:4004:809::200e,vertex.link)
- Properties:
name
type
doc
opts
:ipv6
The IPv6 address queried for its DNS PTR record.
Read Only:
True
:fqdn
The domain returned in the PTR record.
Read Only:
True
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
inet:dns:soa
The result of a DNS SOA record lookup.
The base type for the form can be found at inet:dns:soa.
- Properties:
name
type
doc
:fqdn
The domain queried for its SOA record.
:ns
The domain (MNAME) returned in the SOA record.
The email address (RNAME) returned in the SOA record.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
inet:dns:txt
The result of a DNS TXT record lookup.
The base type for the form can be found at inet:dns:txt.
An example of inet:dns:txt
:
(hehe.vertex.link,"fancy TXT record")
- Properties:
name
type
doc
opts
:fqdn
The domain queried for its TXT record.
Read Only:
True
:txt
The string returned in the TXT record.
Read Only:
True
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
inet:dns:wild:a
A DNS A wild card record and the IPv4 it resolves to.
The base type for the form can be found at inet:dns:wild:a.
- Properties:
name
type
doc
opts
:fqdn
The domain containing a wild card record.
Read Only:
True
:ipv4
The IPv4 address returned by wild card resolutions.
Read Only:
True
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
inet:dns:wild:aaaa
A DNS AAAA wild card record and the IPv6 it resolves to.
The base type for the form can be found at inet:dns:wild:aaaa.
- Properties:
name
type
doc
opts
:fqdn
The domain containing a wild card record.
Read Only:
True
:ipv6
The IPv6 address returned by wild card resolutions.
Read Only:
True
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
inet:download
An instance of a file downloaded from a server.
The base type for the form can be found at inet:download.
- Properties:
name
type
doc
:time
The time the file was downloaded.
:fqdn
The FQDN used to resolve the server.
:file
The file that was downloaded.
:server
The inet:addr of the server.
:server:host
The it:host node for the server.
:server:ipv4
The IPv4 of the server.
:server:ipv6
The IPv6 of the server.
:server:port
The server tcp/udp port.
:server:proto
lower:True
The server network layer protocol.
:client
The inet:addr of the client.
:client:host
The it:host node for the client.
:client:ipv4
The IPv4 of the client.
:client:ipv6
The IPv6 of the client.
:client:port
The client tcp/udp port.
:client:proto
lower:True
The client network layer protocol.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
inet:egress
A host using a specific network egress client address.
The base type for the form can be found at inet:egress.
- Properties:
name
type
doc
:host
The host that used the network egress.
:host:iface
The interface which the host used to connect out via the egress.
:account
The service account which used the client address to egress.
:client
The client address the host used as a network egress.
:client:ipv4
The client IPv4 address the host used as a network egress.
:client:ipv6
The client IPv6 address the host used as a network egress.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
inet:email
An e-mail address.
The base type for the form can be found at inet:email.
- Properties:
name
type
doc
opts
:user
The username of the email address.
Read Only:
True
:fqdn
The domain of the email address.
Read Only:
True
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
inet:email:header
A unique email message header.
The base type for the form can be found at inet:email:header.
- Properties:
name
type
doc
opts
:name
The name of the email header.
Read Only:
True
:value
The value of the email header.
Read Only:
True
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
inet:email:message
An individual email message delivered to an inbox.
The base type for the form can be found at inet:email:message.
- Properties:
name
type
doc
opts
:id
strip:True
The ID parsed from the “message-id” header.
:to
The email address of the recipient.
:from
The email address of the sender.
:replyto
The email address parsed from the “reply-to” header.
:cc
Email addresses parsed from the “cc” header.
:subject
The email message subject parsed from the “subject” header.
:body
The body of the email message.
Display:
{'hint': 'text'}
:date
The time the email message was delivered.
:bytes
The file bytes which contain the email message.
:headers
type: inet:email:headerAn array of email headers from the message.
:received:from:ipv4
The sending SMTP server IPv4, potentially from the Received: header.
:received:from:ipv6
The sending SMTP server IPv6, potentially from the Received: header.
:received:from:fqdn
The sending server FQDN, potentially from the Received: header.
:flow
The inet:flow which delivered the message.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
inet:email:message:attachment
A file which was attached to an email message.
The base type for the form can be found at inet:email:message:attachment.
- Properties:
name
type
doc
opts
:message
The message containing the attached file.
Read Only:
True
:file
The attached file.
Read Only:
True
:name
The name of the attached file.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
inet:email:message:link
A url/link embedded in an email message.
The base type for the form can be found at inet:email:message:link.
- Properties:
name
type
doc
opts
:message
The message containing the embedded link.
Read Only:
True
:url
The url contained within the email message.
Read Only:
True
:text
The displayed hyperlink text if it was not the raw URL.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
inet:flow
An individual network connection between a given source and destination.
The base type for the form can be found at inet:flow.
- Properties:
name
type
doc
opts
:time
The time the network connection was initiated.
:duration
The duration of the flow in seconds.
:from
The ingest source file/iden. Used for reparsing.
:dst
The destination address / port for a connection.
:dst:ipv4
The destination IPv4 address.
:dst:ipv6
The destination IPv6 address.
:dst:port
The destination port.
:dst:proto
lower:True
The destination protocol.
:dst:host
The guid of the destination host.
:dst:proc
The guid of the destination process.
:dst:exe
The file (executable) that received the connection.
:dst:txfiles
An array of files sent by the destination host.
:dst:txcount
The number of packets sent by the destination host.
:dst:txbytes
The number of bytes sent by the destination host.
:dst:handshake
A text representation of the initial handshake sent by the server.
Display:
{'hint': 'text'}
:src
The source address / port for a connection.
:src:ipv4
The source IPv4 address.
:src:ipv6
The source IPv6 address.
:src:port
The source port.
:src:proto
lower:True
The source protocol.
:src:host
The guid of the source host.
:src:proc
The guid of the source process.
:src:exe
The file (executable) that created the connection.
:src:txfiles
An array of files sent by the source host.
:src:txcount
The number of packets sent by the source host.
:src:txbytes
The number of bytes sent by the source host.
:tot:txcount
The number of packets sent in both directions.
:tot:txbytes
The number of bytes sent in both directions.
:src:handshake
A text representation of the initial handshake sent by the client.
Display:
{'hint': 'text'}
:dst:cpes
An array of NIST CPEs identified on the destination host.
:dst:softnames
An array of software names identified on the destination host.
:src:cpes
An array of NIST CPEs identified on the source host.
:src:softnames
An array of software names identified on the source host.
:ip:proto
The IP protocol number of the flow.
:ip:tcp:flags
An aggregation of observed TCP flags commonly provided by flow APIs.
:sandbox:file
The initial sample given to a sandbox environment to analyze.
:src:ssl:cert
The x509 certificate sent by the client as part of an SSL/TLS negotiation.
:dst:ssl:cert
The x509 certificate sent by the server as part of an SSL/TLS negotiation.
:src:rdp:hostname
The hostname sent by the client as part of an RDP session setup.
:src:rdp:keyboard:layout
The keyboard layout sent by the client as part of an RDP session setup.
:src:ssh:key
The key sent by the client as part of an SSH session setup.
:dst:ssh:key
The key sent by the server as part of an SSH session setup.
:capture:host
The host which captured the flow.
:raw
A raw record used to create the flow which may contain additional protocol details.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
inet:fqdn
A Fully Qualified Domain Name (FQDN).
The base type for the form can be found at inet:fqdn.
An example of inet:fqdn
:
vertex.link
- Properties:
name
type
doc
opts
:domain
The parent domain for the FQDN.
Read Only:
True
:host
lower:True
The host part of the FQDN.
Read Only:
True
:issuffix
True if the FQDN is considered a suffix.
:iszone
True if the FQDN is considered a zone.
:zone
The zone level parent for this FQDN.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
inet:group
A group name string.
The base type for the form can be found at inet:group.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
inet:http:param
An HTTP request path query parameter.
The base type for the form can be found at inet:http:param.
- Properties:
name
type
doc
opts
:name
lower:True
The name of the HTTP query parameter.
Read Only:
True
:value
The value of the HTTP query parameter.
Read Only:
True
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
inet:http:request
A single HTTP request.
The base type for the form can be found at inet:http:request.
- Properties:
name
type
doc
:method
The HTTP request method string.
:path
The requested HTTP path (without query parameters).
:url
The reconstructed URL for the request if known.
:query
The HTTP query string which optionally follows the path.
:headers
An array of HTTP headers from the request.
:body
The body of the HTTP request.
:referer
The referer URL parsed from the “Referer:” header in the request.
:cookies
An array of HTTP cookie values parsed from the “Cookies:” header in the request.
:response:time
A date/time value.
:response:code
The base 64 bit signed integer type.
:response:reason
The base string type.
:response:headers
An array of HTTP headers from the response.
:response:body
The file bytes type with SHA256 based primary property.
:session
The HTTP session this request was part of.
:flow
The raw inet:flow containing the request.
:client
The inet:addr of the client.
:client:ipv4
The server IPv4 address that the request was sent from.
:client:ipv6
The server IPv6 address that the request was sent from.
:client:host
The host that the request was sent from.
:server
The inet:addr of the server.
:server:ipv4
The server IPv4 address that the request was sent to.
:server:ipv6
The server IPv6 address that the request was sent to.
:server:port
The server port that the request was sent to.
:server:host
The host that the request was sent to.
:exe
The executable file which caused the activity.
:proc
The host process which caused the activity.
:thread
The host thread which caused the activity.
:host
The host on which the activity occurred.
:time
The time that the activity started.
:sandbox:file
The initial sample given to a sandbox environment to analyze.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
inet:http:request:header
An HTTP request header.
The base type for the form can be found at inet:http:request:header.
- Properties:
name
type
doc
opts
:name
The name of the HTTP request header.
Read Only:
True
:value
The value of the HTTP request header.
Read Only:
True
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
inet:http:response:header
An HTTP response header.
The base type for the form can be found at inet:http:response:header.
- Properties:
name
type
doc
opts
:name
The name of the HTTP response header.
Read Only:
True
:value
The value of the HTTP response header.
Read Only:
True
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
inet:http:session
An HTTP session.
The base type for the form can be found at inet:http:session.
- Properties:
name
type
doc
:contact
The ps:contact which owns the session.
:cookies
An array of cookies used to identify this specific session.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
inet:iface
A network interface with a set of associated protocol addresses.
The base type for the form can be found at inet:iface.
- Properties:
name
type
doc
opts
:host
The guid of the host the interface is associated with.
:name
strip:True
The interface name.
Example:
eth0
:network
The guid of the it:network the interface connected to.
:type
lower:True
The free-form interface type.
:mac
The ethernet (MAC) address of the interface.
:ipv4
The IPv4 address of the interface.
:ipv6
The IPv6 address of the interface.
:phone
The telephone number of the interface.
:wifi:ssid
The wifi SSID of the interface.
:wifi:bssid
The wifi BSSID of the interface.
:adid
An advertising ID associated with the interface.
:mob:imei
The IMEI of the interface.
:mob:imsi
The IMSI of the interface.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
inet:ipv4
An IPv4 address.
The base type for the form can be found at inet:ipv4.
An example of inet:ipv4
:
1.2.3.4
- Properties:
name
type
doc
:asn
The ASN to which the IPv4 address is currently assigned.
:latlong
The best known latitude/longitude for the node.
:loc
The geo-political location string for the IPv4.
:place
The geo:place associated with the latlong property.
:type
The type of IP address (e.g., private, multicast, etc.).
:dns:rev
The most current DNS reverse lookup for the IPv4.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
inet:whois:iprec
-(ipwhois)>
inet:ipv4
The source IP whois record describes the target IPv4 address.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
inet:ipv6
An IPv6 address.
The base type for the form can be found at inet:ipv6.
An example of inet:ipv6
:
2607:f8b0:4004:809::200e
- Properties:
name
type
doc
:asn
The ASN to which the IPv6 address is currently assigned.
:ipv4
The mapped ipv4.
:latlong
The last known latitude/longitude for the node.
:place
The geo:place associated with the latlong property.
:dns:rev
The most current DNS reverse lookup for the IPv6.
:loc
The geo-political location string for the IPv6.
:type
The type of IP address (e.g., private, multicast, etc.).
:scope
enums:reserved,interface-local,link-local,realm-local,admin-local,site-local,organization-local,global,unassigned
The IPv6 scope of the address (e.g., global, link-local, etc.).
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
inet:whois:iprec
-(ipwhois)>
inet:ipv6
The source IP whois record describes the target IPv6 address.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
inet:mac
A 48-bit Media Access Control (MAC) address.
The base type for the form can be found at inet:mac.
An example of inet:mac
:
aa:bb:cc:dd:ee:ff
- Properties:
name
type
doc
:vendor
The vendor associated with the 24-bit prefix of a MAC address.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
inet:passwd
A password string.
The base type for the form can be found at inet:passwd.
- Properties:
name
type
doc
opts
:md5
The MD5 hash of the password.
Read Only:
True
:sha1
The SHA1 hash of the password.
Read Only:
True
:sha256
The SHA256 hash of the password.
Read Only:
True
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
inet:proto
A network protocol name.
The base type for the form can be found at inet:proto.
- Properties:
name
type
doc
:port
The default port this protocol typically uses if applicable.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
inet:rfc2822:addr
An RFC 2822 Address field.
The base type for the form can be found at inet:rfc2822:addr.
An example of inet:rfc2822:addr
:
"Visi Kenshoto" <visi@vertex.link>
- Properties:
name
type
doc
opts
:name
The name field parsed from an RFC 2822 address string.
Read Only:
True
The email field parsed from an RFC 2822 address string.
Read Only:
True
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
inet:search:query
An instance of a search query issued to a search engine.
The base type for the form can be found at inet:search:query.
- Properties:
name
type
doc
opts
:text
The search query text.
Display:
{'hint': 'text'}
:time
The time the web search was issued.
:acct
The account that the query was issued as.
:host
The host that issued the query.
:engine
lower:True
A simple name for the search engine used.
Example:
:request
The HTTP request used to issue the query.
:account
The account which initiated the action.
:success
Set to true if the action was successful.
:rule
The rule which allowed or denied the action.
:error:code
strip:True
The platform specific error code if the action was unsuccessful.
:error:reason
strip:True
The platform specific friendly error reason if the action was unsuccessful.
:platform
The platform where the action was initiated.
:instance
The platform instance where the action was initiated.
:session
The session which initiated the action.
:client
The network address of the client which initiated the action.
:client:host
The client host which initiated the action.
:server
The network address of the server which handled the action.
:server:host
The server host which handled the action.
:id
strip:True
A platform specific ID which identifies the node.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
inet:search:result
A single result from a web search.
The base type for the form can be found at inet:search:result.
- Properties:
name
type
doc
:query
The search query that produced the result.
:title
lower:True
The title of the matching web page.
:rank
The rank/order of the query result.
:url
The URL hosting the matching content.
:text
lower:True
Extracted/matched text from the matched content.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
inet:server
A network server address.
The base type for the form can be found at inet:server.
An example of inet:server
:
tcp://1.2.3.4:80
- Properties:
name
type
doc
opts
:proto
lower:True
The network protocol of the server.
Read Only:
True
:ipv4
The IPv4 of the server.
Read Only:
True
:ipv6
The IPv6 of the server.
Read Only:
True
:host
The it:host node for the server.
Read Only:
True
:port
The server tcp/udp port.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
inet:servfile
A file hosted on a server for access over a network protocol.
The base type for the form can be found at inet:servfile.
- Properties:
name
type
doc
opts
:file
The file hosted by the server.
Read Only:
True
:server
The inet:addr of the server.
Read Only:
True
:server:proto
lower:True
The network protocol of the server.
Read Only:
True
:server:ipv4
The IPv4 of the server.
Read Only:
True
:server:ipv6
The IPv6 of the server.
Read Only:
True
:server:host
The it:host node for the server.
Read Only:
True
:server:port
The server tcp/udp port.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
inet:service:access
Represents a user access request to a service resource.
The base type for the form can be found at inet:service:access.
- Properties:
name
type
doc
:resource
The resource which the account attempted to access.
:type
enums:((10, 'create'), (30, 'read'), (40, 'update'), (50, 'delete'), (60, 'list'), (70, 'execute'))
The type of access requested.
:time
The time that the account initiated the action.
:account
The account which initiated the action.
:success
Set to true if the action was successful.
:rule
The rule which allowed or denied the action.
:error:code
strip:True
The platform specific error code if the action was unsuccessful.
:error:reason
strip:True
The platform specific friendly error reason if the action was unsuccessful.
:platform
The platform where the action was initiated.
:instance
The platform instance where the action was initiated.
:session
The session which initiated the action.
:client
The network address of the client which initiated the action.
:client:host
The client host which initiated the action.
:server
The network address of the server which handled the action.
:server:host
The server host which handled the action.
:id
strip:True
A platform specific ID which identifies the node.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
inet:service:account
An account within a service platform. Accounts may be instance specific.
The base type for the form can be found at inet:service:account.
- Properties:
name
type
doc
:user
The current user name of the account.
The current email address associated with the account.
:tenant
The tenant which contains the account.
:profile
The primary contact information for the account.
:url
The primary URL associated with the account.
:status
The status of the account.
:period
The period when the account existed.
:creator
The service account which created the account.
:remover
The service account which removed or decommissioned the account.
:id
strip:True
A platform specific ID which identifies the account.
:platform
The platform which defines the account.
:instance
The platform instance which defines the account.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
inet:service:bucket
A file/blob storage object within a service architecture.
The base type for the form can be found at inet:service:bucket.
- Properties:
name
type
doc
:name
The name of the service resource.
:url
The primary URL associated with the bucket.
:status
The status of the bucket.
:period
The period when the bucket existed.
:creator
The service account which created the bucket.
:remover
The service account which removed or decommissioned the bucket.
:id
strip:True
A platform specific ID which identifies the bucket.
:platform
The platform which defines the bucket.
:instance
The platform instance which defines the bucket.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
inet:service:bucket:item
An individual file stored within a bucket.
The base type for the form can be found at inet:service:bucket:item.
- Properties:
name
type
doc
:bucket
The bucket which contains the item.
:file
The bytes stored within the bucket item.
:file:name
The name of the file stored in the bucket item.
:url
The primary URL associated with the bucket item.
:status
The status of the bucket item.
:period
The period when the bucket item existed.
:creator
The service account which created the bucket item.
:remover
The service account which removed or decommissioned the bucket item.
:id
strip:True
A platform specific ID which identifies the bucket item.
:platform
The platform which defines the bucket item.
:instance
The platform instance which defines the bucket item.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
inet:service:channel
A channel used to distribute messages.
The base type for the form can be found at inet:service:channel.
- Properties:
name
type
doc
:name
The name of the channel.
:period
The time period where the channel was available.
:url
The primary URL associated with the channel.
:status
The status of the channel.
:creator
The service account which created the channel.
:remover
The service account which removed or decommissioned the channel.
:id
strip:True
A platform specific ID which identifies the channel.
:platform
The platform which defines the channel.
:instance
The platform instance which defines the channel.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
inet:service:channel:member
Represents a service account being a member of a channel.
The base type for the form can be found at inet:service:channel:member.
- Properties:
name
type
doc
:channel
The channel that the account was a member of.
:account
The account that was a member of the channel.
:period
The time period where the account was a member of the channel.
:url
The primary URL associated with the channel membership.
:status
The status of the channel membership.
:creator
The service account which created the channel membership.
:remover
The service account which removed or decommissioned the channel membership.
:id
strip:True
A platform specific ID which identifies the channel membership.
:platform
The platform which defines the channel membership.
:instance
The platform instance which defines the channel membership.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
inet:service:emote
An emote or reaction by an account.
The base type for the form can be found at inet:service:emote.
- Properties:
name
type
doc
opts
:about
The node that the emote is about.
:text
strip:True
The unicode or emote text of the reaction.
Example:
:partyparrot:
:url
The primary URL associated with the emote.
:status
The status of the emote.
:period
The period when the emote existed.
:creator
The service account which created the emote.
:remover
The service account which removed or decommissioned the emote.
:id
strip:True
A platform specific ID which identifies the emote.
:platform
The platform which defines the emote.
:instance
The platform instance which defines the emote.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
inet:service:group
A group or role which contains member accounts.
The base type for the form can be found at inet:service:group.
- Properties:
name
type
doc
:name
The name of the group on this platform.
:profile
Current detailed contact information for this group.
:url
The primary URL associated with the group.
:status
The status of the group.
:period
The period when the group existed.
:creator
The service account which created the group.
:remover
The service account which removed or decommissioned the group.
:id
strip:True
A platform specific ID which identifies the group.
:platform
The platform which defines the group.
:instance
The platform instance which defines the group.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
inet:service:group:member
Represents a service account being a member of a group.
The base type for the form can be found at inet:service:group:member.
- Properties:
name
type
doc
:account
The account that is a member of the group.
:group
The group that the account is a member of.
:period
The time period when the account was a member of the group.
:url
The primary URL associated with the group membership.
:status
The status of the group membership.
:creator
The service account which created the group membership.
:remover
The service account which removed or decommissioned the group membership.
:id
strip:True
A platform specific ID which identifies the group membership.
:platform
The platform which defines the group membership.
:instance
The platform instance which defines the group membership.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
inet:service:instance
An instance of the platform such as Slack or Discord instances.
The base type for the form can be found at inet:service:instance.
- Properties:
name
type
doc
opts
:id
strip:True
A platform specific ID to identify the service instance.
Example:
B8ZS2
:platform
The platform which defines the service instance.
:url
The primary URL which identifies the service instance.
Example:
https://v.vtx.lk/slack
:name
The name of the service instance.
Example:
synapse users slack
:desc
A description of the service instance.
Display:
{'hint': 'text'}
:period
The time period where the instance existed.
:status
The status of this instance.
:creator
The service account which created the instance.
:owner
The service account which owns the instance.
:tenant
The tenant which contains the instance.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
inet:service:login
A login event for a service account.
The base type for the form can be found at inet:service:login.
- Properties:
name
type
doc
:method
The type of authentication used for the login. For example “password” or “multifactor.sms”.
:time
The time that the account initiated the action.
:account
The account which initiated the action.
:success
Set to true if the action was successful.
:rule
The rule which allowed or denied the action.
:error:code
strip:True
The platform specific error code if the action was unsuccessful.
:error:reason
strip:True
The platform specific friendly error reason if the action was unsuccessful.
:platform
The platform where the action was initiated.
:instance
The platform instance where the action was initiated.
:session
The session which initiated the action.
:client
The network address of the client which initiated the action.
:client:host
The client host which initiated the action.
:server
The network address of the server which handled the action.
:server:host
The server host which handled the action.
:id
strip:True
A platform specific ID which identifies the node.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
inet:service:message
A message or post created by an account.
The base type for the form can be found at inet:service:message.
- Properties:
name
type
doc
opts
:account
The account which sent the message.
:to
The destination account. Used for direct messages.
:url
The URL where the message may be viewed.
:group
The group that the message was sent to.
:channel
The channel that the message was sent to.
:thread
The thread which contains the message.
:public
Set to true if the message is publicly visible.
:title
The message title.
:text
The text body of the message.
Display:
{'hint': 'text'}
:status
The message status.
:replyto
The message that this message was sent in reply to. Used for message threading.
:repost
The original message reposted by this message.
:links
An array of links contained within the message.
:attachments
An array of files attached to the message.
:place
The place that the message was sent from.
:place:name
The name of the place that the message was sent from.
:client:address
Deprecated. Please use :client.
Deprecated:
True
:client:software
The client software version used to send the message.
:client:software:name
The name of the client software used to send the message.
:file
The raw file that the message was extracted from.
:type
The type of message.
:time
The time that the account initiated the action.
:success
Set to true if the action was successful.
:rule
The rule which allowed or denied the action.
:error:code
strip:True
The platform specific error code if the action was unsuccessful.
:error:reason
strip:True
The platform specific friendly error reason if the action was unsuccessful.
:platform
The platform where the action was initiated.
:instance
The platform instance where the action was initiated.
:session
The session which initiated the action.
:client
The network address of the client which initiated the action.
:client:host
The client host which initiated the action.
:server
The network address of the server which handled the action.
:server:host
The server host which handled the action.
:id
strip:True
A platform specific ID which identifies the node.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
inet:service:message:attachment
A file attachment included within a message.
The base type for the form can be found at inet:service:message:attachment.
- Properties:
name
type
doc
:name
The name of the attached file.
:text
Any text associated with the file such as alt-text for images.
:file
The file which was attached to the message.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
inet:service:message:link
A URL link included within a message.
The base type for the form can be found at inet:service:message:link.
- Properties:
name
type
doc
:title
strip:True
The title text for the link.
:url
The URL which was attached to the message.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
inet:service:message:type:taxonomy
A message type taxonomy.
The base type for the form can be found at inet:service:message:type:taxonomy.
- Properties:
name
type
doc
opts
:title
A brief title of the definition.
:summary
Deprecated. Please use title/desc.
Deprecated:True
Display:{'hint': 'text'}
:desc
A definition of the taxonomy entry.
Display:
{'hint': 'text'}
:sort
A display sort order for siblings.
:base
The base taxon.
Read Only:
True
:depth
The depth indexed from 0.
Read Only:
True
:parent
The taxonomy parent.
Read Only:
True
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
inet:service:permission
A permission which may be granted to a service account or role.
The base type for the form can be found at inet:service:permission.
- Properties:
name
type
doc
:name
The name of the permission.
:type
The type of permission.
:url
The primary URL associated with the permission.
:status
The status of the permission.
:period
The period when the permission existed.
:creator
The service account which created the permission.
:remover
The service account which removed or decommissioned the permission.
:id
strip:True
A platform specific ID which identifies the permission.
:platform
The platform which defines the permission.
:instance
The platform instance which defines the permission.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
inet:service:permission:type:taxonomy
A permission type taxonomy.
The base type for the form can be found at inet:service:permission:type:taxonomy.
- Properties:
name
type
doc
opts
:title
A brief title of the definition.
:summary
Deprecated. Please use title/desc.
Deprecated:True
Display:{'hint': 'text'}
:desc
A definition of the taxonomy entry.
Display:
{'hint': 'text'}
:sort
A display sort order for siblings.
:base
The base taxon.
Read Only:
True
:depth
The depth indexed from 0.
Read Only:
True
:parent
The taxonomy parent.
Read Only:
True
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
inet:service:platform
A network platform which provides services.
The base type for the form can be found at inet:service:platform.
- Properties:
name
type
doc
opts
:url
The primary URL of the platform.
Example:
https://twitter.com
:name
A friendly name for the platform.
Example:
:desc
A description of the service platform.
Display:
{'hint': 'text'}
:provider
The organization which operates the platform.
:provider:name
The name of the organization which operates the platform.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
inet:service:relationship
A relationship between two service objects.
The base type for the form can be found at inet:service:relationship.
- Properties:
name
type
doc
opts
:source
The source object.
:target
The target object.
:type
The type of relationship between the source and the target.
Example:
follows
:url
The primary URL associated with the relationship.
:status
The status of the relationship.
:period
The period when the relationship existed.
:creator
The service account which created the relationship.
:remover
The service account which removed or decommissioned the relationship.
:id
strip:True
A platform specific ID which identifies the relationship.
:platform
The platform which defines the relationship.
:instance
The platform instance which defines the relationship.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
inet:service:relationship:type:taxonomy
A service object relationship type taxonomy.
The base type for the form can be found at inet:service:relationship:type:taxonomy.
- Properties:
name
type
doc
opts
:title
A brief title of the definition.
:summary
Deprecated. Please use title/desc.
Deprecated:True
Display:{'hint': 'text'}
:desc
A definition of the taxonomy entry.
Display:
{'hint': 'text'}
:sort
A display sort order for siblings.
:base
The base taxon.
Read Only:
True
:depth
The depth indexed from 0.
Read Only:
True
:parent
The taxonomy parent.
Read Only:
True
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
inet:service:resource
A generic resource provided by the service architecture.
The base type for the form can be found at inet:service:resource.
- Properties:
name
type
doc
opts
:name
The name of the service resource.
:desc
A description of the service resource.
Display:
{'hint': 'text'}
:url
The primary URL where the resource is available from the service.
:type
The resource type. For example “rpc.endpoint”.
:status
The status of the resource.
:period
The period when the resource existed.
:creator
The service account which created the resource.
:remover
The service account which removed or decommissioned the resource.
:id
strip:True
A platform specific ID which identifies the resource.
:platform
The platform which defines the resource.
:instance
The platform instance which defines the resource.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
inet:service:resource:type:taxonomy
A taxonomy of inet service resource types.
The base type for the form can be found at inet:service:resource:type:taxonomy.
- Properties:
name
type
doc
opts
:title
A brief title of the definition.
:summary
Deprecated. Please use title/desc.
Deprecated:True
Display:{'hint': 'text'}
:desc
A definition of the taxonomy entry.
Display:
{'hint': 'text'}
:sort
A display sort order for siblings.
:base
The base taxon.
Read Only:
True
:depth
The depth indexed from 0.
Read Only:
True
:parent
The taxonomy parent.
Read Only:
True
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
inet:service:rule
A rule which grants or denies a permission to a service account or role.
The base type for the form can be found at inet:service:rule.
- Properties:
name
type
doc
:permission
The permission which is granted.
:denied
Set to (true) to denote that the rule is an explicit deny.
:object
interface:inet:service:object
The object that the permission controls access to.
:grantee
forms:('inet:service:account', 'inet:service:group')
The user or role which is granted the permission.
:url
The primary URL associated with the rule.
:status
The status of the rule.
:period
The period when the rule existed.
:creator
The service account which created the rule.
:remover
The service account which removed or decommissioned the rule.
:id
strip:True
A platform specific ID which identifies the rule.
:platform
The platform which defines the rule.
:instance
The platform instance which defines the rule.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:ruleset
-(has)>
inet:service:rule
The meta:ruleset includes the inet:service:rule.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:mitigation
-(uses)>
inet:service:rule
The mitigation uses the service rule.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
inet:service:session
An authenticated session.
The base type for the form can be found at inet:service:session.
- Properties:
name
type
doc
:creator
The account which authenticated to create the session.
:period
The period where the session was valid.
:http:session
The HTTP session associated with the service session.
:url
The primary URL associated with the session.
:status
The status of the session.
:remover
The service account which removed or decommissioned the session.
:id
strip:True
A platform specific ID which identifies the session.
:platform
The platform which defines the session.
:instance
The platform instance which defines the session.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
inet:service:subscription
A subscription to a service platform or instance.
The base type for the form can be found at inet:service:subscription.
- Properties:
name
type
doc
:level
A platform specific subscription level.
:pay:instrument
The primary payment instrument used to pay for the subscription.
:subscriber
The subscriber who owns the subscription.
:url
The primary URL associated with the subscription.
:status
The status of the subscription.
:period
The period when the subscription existed.
:creator
The service account which created the subscription.
:remover
The service account which removed or decommissioned the subscription.
:id
strip:True
A platform specific ID which identifies the subscription.
:platform
The platform which defines the subscription.
:instance
The platform instance which defines the subscription.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
inet:service:subscription:level:taxonomy
A taxonomy of platform specific subscription levels.
The base type for the form can be found at inet:service:subscription:level:taxonomy.
- Properties:
name
type
doc
opts
:title
A brief title of the definition.
:summary
Deprecated. Please use title/desc.
Deprecated:True
Display:{'hint': 'text'}
:desc
A definition of the taxonomy entry.
Display:
{'hint': 'text'}
:sort
A display sort order for siblings.
:base
The base taxon.
Read Only:
True
:depth
The depth indexed from 0.
Read Only:
True
:parent
The taxonomy parent.
Read Only:
True
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
inet:service:tenant
A tenant which groups accounts and instances.
The base type for the form can be found at inet:service:tenant.
- Properties:
name
type
doc
:profile
The primary contact information for the tenant.
:url
The primary URL associated with the tenant.
:status
The status of the tenant.
:period
The period when the tenant existed.
:creator
The service account which created the tenant.
:remover
The service account which removed or decommissioned the tenant.
:id
strip:True
A platform specific ID which identifies the tenant.
:platform
The platform which defines the tenant.
:instance
The platform instance which defines the tenant.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
inet:service:thread
A message thread.
The base type for the form can be found at inet:service:thread.
- Properties:
name
type
doc
:title
The title of the thread.
:channel
The channel that contains the thread.
:message
The message which initiated the thread.
:url
The primary URL associated with the thread.
:status
The status of the thread.
:period
The period when the thread existed.
:creator
The service account which created the thread.
:remover
The service account which removed or decommissioned the thread.
:id
strip:True
A platform specific ID which identifies the thread.
:platform
The platform which defines the thread.
:instance
The platform instance which defines the thread.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
inet:ssl:cert
Deprecated. Please use inet:tls:servercert or inet:tls:clientcert.
The base type for the form can be found at inet:ssl:cert.
- Properties:
name
type
doc
opts
:file
The file bytes for the SSL certificate.
Read Only:
True
:server
The server that presented the SSL certificate.
Read Only:
True
:server:ipv4
The SSL server IPv4 address.
Read Only:
True
:server:ipv6
The SSL server IPv6 address.
Read Only:
True
:server:port
The SSL server listening port.
Read Only:
True
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
inet:ssl:jarmhash
A TLS JARM fingerprint hash.
The base type for the form can be found at inet:ssl:jarmhash.
- Properties:
name
type
doc
opts
:ciphers
The encoded cipher and TLS version of the server.
Read Only:
True
:extensions
The truncated SHA256 of the TLS server extensions.
Read Only:
True
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
inet:ssl:jarmsample
A JARM hash sample taken from a server.
The base type for the form can be found at inet:ssl:jarmsample.
- Properties:
name
type
doc
opts
:jarmhash
The JARM hash computed from the server responses.
Read Only:
True
:server
The server that was sampled to compute the JARM hash.
Read Only:
True
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
inet:tls:clientcert
An x509 certificate sent by a client for TLS.
The base type for the form can be found at inet:tls:clientcert.
An example of inet:tls:clientcert
:
(1.2.3.4:443, 3fdf364e081c14997b291852d1f23868)
- Properties:
name
type
doc
opts
:client
The client associated with the x509 certificate.
Read Only:
True
:cert
The x509 certificate sent by the client.
Read Only:
True
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
inet:tls:handshake
An instance of a TLS handshake between a server and client.
The base type for the form can be found at inet:tls:handshake.
- Properties:
name
type
doc
:time
The time the handshake was initiated.
:flow
The raw inet:flow associated with the handshake.
:server
The TLS server during the handshake.
:server:cert
The x509 certificate sent by the server during the handshake.
:server:fingerprint:ja3
The JA3S finger of the server.
:client
The TLS client during the handshake.
:client:cert
The x509 certificate sent by the client during the handshake.
:client:fingerprint:ja3
The JA3 fingerprint of the client.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
inet:tls:ja3:sample
A JA3 sample taken from a client.
The base type for the form can be found at inet:tls:ja3:sample.
- Properties:
name
type
doc
opts
:client
The client that was sampled to produce the JA3 hash.
Read Only:
True
:ja3
The JA3 hash computed from the client’s TLS hello packet.
Read Only:
True
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
inet:tls:ja3s:sample
A JA3 sample taken from a server.
The base type for the form can be found at inet:tls:ja3s:sample.
- Properties:
name
type
doc
opts
:server
The server that was sampled to produce the JA3S hash.
Read Only:
True
:ja3s
The JA3S hash computed from the server’s TLS hello packet.
Read Only:
True
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
inet:tls:servercert
An x509 certificate sent by a server for TLS.
The base type for the form can be found at inet:tls:servercert.
An example of inet:tls:servercert
:
(1.2.3.4:443, c7437790af01ae1bb2f8f3b684c70bf8)
- Properties:
name
type
doc
opts
:server
The server associated with the x509 certificate.
Read Only:
True
:cert
The x509 certificate sent by the server.
Read Only:
True
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
inet:tunnel
A specific sequence of hosts forwarding connections such as a VPN or proxy.
The base type for the form can be found at inet:tunnel.
- Properties:
name
type
doc
:anon
Indicates that this tunnel provides anonymization.
:type
The type of tunnel such as vpn or proxy.
:ingress
The server where client traffic enters the tunnel.
:egress
The server where client traffic leaves the tunnel.
:operator
The contact information for the tunnel operator.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
inet:tunnel:type:taxonomy
A taxonomy of network tunnel types.
The base type for the form can be found at inet:tunnel:type:taxonomy.
- Properties:
name
type
doc
opts
:title
A brief title of the definition.
:summary
Deprecated. Please use title/desc.
Deprecated:True
Display:{'hint': 'text'}
:desc
A definition of the taxonomy entry.
Display:
{'hint': 'text'}
:sort
A display sort order for siblings.
:base
The base taxon.
Read Only:
True
:depth
The depth indexed from 0.
Read Only:
True
:parent
The taxonomy parent.
Read Only:
True
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
inet:url
A Universal Resource Locator (URL).
The base type for the form can be found at inet:url.
An example of inet:url
:
http://www.woot.com/files/index.html
- Properties:
name
type
doc
opts
:fqdn
The fqdn used in the URL (e.g., http://www.woot.com/page.html).
Read Only:
True
:ipv4
The IPv4 address used in the URL (e.g., http://1.2.3.4/page.html).
Read Only:
True
:ipv6
The IPv6 address used in the URL.
Read Only:
True
:passwd
The optional password used to access the URL.
Read Only:
True
:base
The base scheme, user/pass, fqdn, port and path w/o parameters.
Read Only:
True
:path
The path in the URL w/o parameters.
Read Only:
True
:params
The URL parameter string.
Read Only:
True
:port
The port of the URL. URLs prefixed with http will be set to port 80 and URLs prefixed with https will be set to port 443 unless otherwise specified.
Read Only:
True
:proto
lower:True
The protocol in the URL.
Read Only:
True
:user
The optional username used to access the URL.
Read Only:
True
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:dev:repo
-(has)>
inet:url
The repo has content hosted at the URL.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
inet:url:mirror
A URL mirror site.
The base type for the form can be found at inet:url:mirror.
- Properties:
name
type
doc
opts
:of
The URL being mirrored.
Read Only:
True
:at
The URL of the mirror.
Read Only:
True
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
inet:urlfile
A file hosted at a specific Universal Resource Locator (URL).
The base type for the form can be found at inet:urlfile.
- Properties:
name
type
doc
opts
:url
The URL where the file was hosted.
Read Only:
True
:file
The file that was hosted at the URL.
Read Only:
True
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
inet:urlredir
A URL that redirects to another URL, such as via a URL shortening service or an HTTP 302 response.
The base type for the form can be found at inet:urlredir.
An example of inet:urlredir
:
(http://foo.com/,http://bar.com/)
- Properties:
name
type
doc
opts
:src
The original/source URL before redirect.
Read Only:
True
:src:fqdn
The FQDN within the src URL (if present).
Read Only:
True
:dst
The redirected/destination URL.
Read Only:
True
:dst:fqdn
The FQDN within the dst URL (if present).
Read Only:
True
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
inet:user
A username string.
The base type for the form can be found at inet:user.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
inet:web:acct
An account with a given Internet-based site or service.
The base type for the form can be found at inet:web:acct.
An example of inet:web:acct
:
twitter.com/invisig0th
- Properties:
name
type
doc
opts
:avatar
The file representing the avatar (e.g., profile picture) for the account.
:banner
The file representing the banner for the account.
:dob
A self-declared date of birth for the account (if the account belongs to a person).
The email address associated with the account.
:linked:accts
Linked accounts specified in the account profile.
:latlong
The last known latitude/longitude for the node.
:place
The geo:place associated with the latlong property.
:loc
A self-declared location for the account.
:name
The localized name associated with the account (may be different from the account identifier, e.g., a display name).
:name:en
The English version of the name associated with the (may be different from the account identifier, e.g., a display name).
Deprecated:
True
:aliases
An array of alternate names for the user.
:occupation
lower:True
A self-declared occupation for the account.
:passwd
The current password for the account.
:phone
The phone number associated with the account.
:realname
The localized version of the real name of the account owner / registrant.
:realname:en
The English version of the real name of the account owner / registrant.
Deprecated:
True
:signup
The date and time the account was registered.
:signup:client
The client address used to sign up for the account.
:signup:client:ipv4
The IPv4 address used to sign up for the account.
:signup:client:ipv6
The IPv6 address used to sign up for the account.
:site
The site or service associated with the account.
Read Only:
True
:tagline
The text of the account status or tag line.
:url
The service provider URL where the account is hosted.
:user
The unique identifier for the account (may be different from the common name or display name).
Read Only:
True
:webpage
A related URL specified by the account (e.g., a personal or company web page, blog, etc.).
:recovery:email
An email address registered as a recovery email address for the account.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
inet:web:action
An instance of an account performing an action at an Internet-based site or service.
The base type for the form can be found at inet:web:action.
- Properties:
name
type
doc
:act
The action performed by the account.
:acct
The web account associated with the action.
:acct:site
The site or service associated with the account.
:acct:user
The unique identifier for the account.
:time
The date and time the account performed the action.
:client
The source client address of the action.
:client:ipv4
The source IPv4 address of the action.
:client:ipv6
The source IPv6 address of the action.
:loc
The location of the user executing the web action.
:latlong
The latlong of the user when executing the web action.
:place
The geo:place of the user when executing the web action.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
inet:web:attachment
An instance of a file being sent to a web service by an account.
The base type for the form can be found at inet:web:attachment.
- Properties:
name
type
doc
opts
:acct
The account that uploaded the file.
:post
The optional web post that the file was attached to.
:mesg
The optional web message that the file was attached to.
:proto
The protocol used to transmit the file to the web service.
Example:
https
:interactive
Set to true if the upload was interactive. False if automated.
:file
The file that was sent.
:name
The name of the file at the time it was sent.
:time
The time the file was sent.
:client
The client address which initiated the upload.
:client:ipv4
The IPv4 address of the client that initiated the upload.
:client:ipv6
The IPv6 address of the client that initiated the upload.
:place
The place the file was sent from.
:place:loc
The geopolitical location that the file was sent from.
:place:name
The reported name of the place that the file was sent from.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
inet:web:channel
A channel within a web service or instance such as slack or discord.
The base type for the form can be found at inet:web:channel.
- Properties:
name
type
doc
opts
:url
The primary URL used to identify the channel.
Example:
https://app.slack.com/client/T2XK1223Y/C2XHHNDS7
:id
strip:True
The operator specified ID of this channel.
Example:
C2XHHNDS7
:instance
The instance which contains the channel.
:name
strip:True
The visible name of the channel.
Example:
general
:topic
strip:True
The visible topic of the channel.
Example:
Synapse Discussion - Feel free to invite others!
:created
The time the channel was created.
:creator
The account which created the channel.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
inet:web:chprofile
A change to a web account. Used to capture historical properties associated with an account, as opposed to current data in the inet:web:acct node.
The base type for the form can be found at inet:web:chprofile.
- Properties:
name
type
doc
:acct
The web account associated with the change.
:acct:site
The site or service associated with the account.
:acct:user
The unique identifier for the account.
:client
The source address used to make the account change.
:client:ipv4
The source IPv4 address used to make the account change.
:client:ipv6
The source IPv6 address used to make the account change.
:time
The date and time when the account change occurred.
:pv
The prop=valu of the account property that was changed. Valu should be the old / original value, while the new value should be updated on the inet:web:acct form.
:pv:prop
The property that was changed.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
inet:web:file
A file posted by a web account.
The base type for the form can be found at inet:web:file.
- Properties:
name
type
doc
opts
:acct
The account that owns or is associated with the file.
Read Only:
True
:acct:site
The site or service associated with the account.
Read Only:
True
:acct:user
The unique identifier for the account.
Read Only:
True
:file
The file owned by or associated with the account.
Read Only:
True
:name
The name of the file owned by or associated with the account.
:posted
Deprecated. Instance data belongs on inet:web:attachment.
Deprecated:
True
:client
Deprecated. Instance data belongs on inet:web:attachment.
Deprecated:
True
:client:ipv4
Deprecated. Instance data belongs on inet:web:attachment.
Deprecated:
True
:client:ipv6
Deprecated. Instance data belongs on inet:web:attachment.
Deprecated:
True
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
inet:web:follows
A web account follows or is connected to another web account.
The base type for the form can be found at inet:web:follows.
- Properties:
name
type
doc
opts
:follower
The account following an account.
Read Only:
True
:followee
The account followed by an account.
Read Only:
True
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
inet:web:group
A group hosted within or registered with a given Internet-based site or service.
The base type for the form can be found at inet:web:group.
An example of inet:web:group
:
somesite.com/mycoolgroup
- Properties:
name
type
doc
opts
:site
The site or service associated with the group.
Read Only:
True
:id
The site-specific unique identifier for the group (may be different from the common name or display name).
Read Only:
True
:name
The localized name associated with the group (may be different from the account identifier, e.g., a display name).
:aliases
An array of alternate names for the group.
:name:en
The English version of the name associated with the group (may be different from the localized name).
Deprecated:
True
:url
The service provider URL where the group is hosted.
:avatar
The file representing the avatar (e.g., profile picture) for the group.
:desc
The text of the description of the group.
:webpage
A related URL specified by the group (e.g., primary web site, etc.).
:loc
lower:True
A self-declared location for the group.
:latlong
The last known latitude/longitude for the node.
:place
The geo:place associated with the latlong property.
:signup
The date and time the group was created on the site.
:signup:client
The client address used to create the group.
:signup:client:ipv4
The IPv4 address used to create the group.
:signup:client:ipv6
The IPv6 address used to create the group.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
inet:web:hashtag
A hashtag used in a web post.
The base type for the form can be found at inet:web:hashtag.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
inet:web:instance
An instance of a web service such as slack or discord.
The base type for the form can be found at inet:web:instance.
- Properties:
name
type
doc
opts
:url
The primary URL used to identify the instance.
Example:
https://app.slack.com/client/T2XK1223Y
:id
strip:True
The operator specified ID of this instance.
Example:
T2XK1223Y
:name
strip:True
The visible name of the instance.
Example:
vertex synapse
:created
The time the instance was created.
:creator
The account which created the instance.
:owner
The organization which created the instance.
:owner:fqdn
The FQDN of the organization which created the instance. Used for entity resolution.
Example:
vertex.link
:owner:name
The name of the organization which created the instance. Used for entity resolution.
Example:
the vertex project, llc.
:operator
The organization which operates the instance.
:operator:name
The name of the organization which operates the instance. Used for entity resolution.
Example:
slack
:operator:fqdn
The FQDN of the organization which operates the instance. Used for entity resolution.
Example:
slack.com
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
inet:web:logon
An instance of an account authenticating to an Internet-based site or service.
The base type for the form can be found at inet:web:logon.
- Properties:
name
type
doc
:acct
The web account associated with the logon event.
:acct:site
The site or service associated with the account.
:acct:user
The unique identifier for the account.
:time
The date and time the account logged into the service.
:client
The source address of the logon.
:client:ipv4
The source IPv4 address of the logon.
:client:ipv6
The source IPv6 address of the logon.
:logout
The date and time the account logged out of the service.
:loc
The location of the user executing the logon.
:latlong
The latlong of the user executing the logon.
:place
The geo:place of the user executing the logon.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
inet:web:memb
Deprecated. Please use inet:web:member.
The base type for the form can be found at inet:web:memb.
- Properties:
name
type
doc
opts
:acct
The account that is a member of the group.
Read Only:
True
:group
The group that the account is a member of.
Read Only:
True
:title
lower:True
The title or status of the member (e.g., admin, new member, etc.).
:joined
The date / time the account joined the group.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
inet:web:member
Represents a web account membership in a channel or group.
The base type for the form can be found at inet:web:member.
- Properties:
name
type
doc
:acct
The account that is a member of the group or channel.
:group
The group that the account is a member of.
:channel
The channel that the account is a member of.
:added
The date / time the account was added to the group or channel.
:removed
The date / time the account was removed from the group or channel.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
inet:web:mesg
A message sent from one web account to another web account or channel.
The base type for the form can be found at inet:web:mesg.
An example of inet:web:mesg
:
((twitter.com, invisig0th), (twitter.com, gobbles), 20041012130220)
- Properties:
name
type
doc
opts
:from
The web account that sent the message.
Read Only:
True
:to
The web account that received the message.
Read Only:
True
:client
The source address of the message.
:client:ipv4
The source IPv4 address of the message.
:client:ipv6
The source IPv6 address of the message.
:time
The date and time at which the message was sent.
Read Only:
True
:url
The URL where the message is posted / visible.
:text
The text of the message.
Display:
{'hint': 'text'}
:deleted
The message was deleted.
:file
The file attached to or sent with the message.
:place
The place that the message was reportedly sent from.
:place:name
The name of the place that the message was reportedly sent from. Used for entity resolution.
:instance
The instance where the message was sent.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
inet:web:post
A post made by a web account.
The base type for the form can be found at inet:web:post.
- Properties:
name
type
doc
opts
:acct
The web account that made the post.
:acct:site
The site or service associated with the account.
:client
The source address of the post.
:client:ipv4
The source IPv4 address of the post.
:client:ipv6
The source IPv6 address of the post.
:acct:user
The unique identifier for the account.
:text
The text of the post.
Display:
{'hint': 'text'}
:time
The date and time that the post was made.
:deleted
The message was deleted by the poster.
:url
The URL where the post is published / visible.
:file
The file that was attached to the post.
:replyto
The post that this post is in reply to.
:repost
The original post that this is a repost of.
:hashtags
Hashtags mentioned within the post.
:mentions:users
Accounts mentioned within the post.
:mentions:groups
Groups mentioned within the post.
:loc
The location that the post was reportedly sent from.
:place
The place that the post was reportedly sent from.
:place:name
The name of the place that the post was reportedly sent from. Used for entity resolution.
:latlong
The place that the post was reportedly sent from.
:channel
The channel where the post was made.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
inet:web:post:link
A link contained within post text.
The base type for the form can be found at inet:web:post:link.
- Properties:
name
type
doc
:post
The post containing the embedded link.
:url
The url that the link forwards to.
:text
The displayed hyperlink text if it was not the raw URL.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
inet:whois:contact
An individual contact from a domain whois record.
The base type for the form can be found at inet:whois:contact.
- Properties:
name
type
doc
opts
:rec
The whois record containing the contact data.
Read Only:
True
:rec:fqdn
The domain associated with the whois record.
Read Only:
True
:rec:asof
The date of the whois record.
Read Only:
True
:type
lower:True
The contact type (e.g., registrar, registrant, admin, billing, tech, etc.).
Read Only:
True
:id
lower:True
The ID associated with the contact.
:name
lower:True
The name of the contact.
The email address of the contact.
:orgname
The name of the contact organization.
:address
lower:True
The content of the street address field(s) of the contact.
:city
lower:True
The content of the city field of the contact.
:state
lower:True
The content of the state field of the contact.
:country
lower:True
The two-letter country code of the contact.
:phone
The content of the phone field of the contact.
:fax
The content of the fax field of the contact.
:url
The URL specified for the contact.
:whois:fqdn
The whois server FQDN for the given contact (most likely a registrar).
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
inet:whois:email
An email address associated with an FQDN via whois registration text.
The base type for the form can be found at inet:whois:email.
- Properties:
name
type
doc
opts
:fqdn
The domain with a whois record containing the email address.
Read Only:
True
The email address associated with the domain whois record.
Read Only:
True
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
inet:whois:ipcontact
An individual contact from an IP block record.
The base type for the form can be found at inet:whois:ipcontact.
- Properties:
name
type
doc
:contact
Contact information associated with a registration.
:asof
The date of the record.
:created
The “created” time from the record.
:updated
The “last updated” time from the record.
:role
lower:True
The primary role for the contact.
:roles
Additional roles assigned to the contact.
:asn
The associated Autonomous System Number (ASN).
:id
The registry unique identifier (e.g. NET-74-0-0-0-1).
:links
URLs provided with the record.
:status
lower:True
The state of the registered contact (e.g. validated, obscured).
:contacts
Additional contacts referenced by this contact.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
inet:whois:ipquery
Query details used to retrieve an IP record.
The base type for the form can be found at inet:whois:ipquery.
- Properties:
name
type
doc
:time
The time the request was made.
:url
The query URL when using the HTTP RDAP Protocol.
:fqdn
The FQDN of the host server when using the legacy WHOIS Protocol.
:ipv4
The IPv4 address queried.
:ipv6
The IPv6 address queried.
:success
Whether the host returned a valid response for the query.
:rec
The resulting record from the query.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
inet:whois:iprec
An IPv4/IPv6 block registration record.
The base type for the form can be found at inet:whois:iprec.
- Properties:
name
type
doc
opts
:net4
The IPv4 address range assigned.
:net4:min
The first IPv4 in the range assigned.
:net4:max
The last IPv4 in the range assigned.
:net6
The IPv6 address range assigned.
:net6:min
The first IPv6 in the range assigned.
:net6:max
The last IPv6 in the range assigned.
:asof
The date of the record.
:created
The “created” time from the record.
:updated
The “last updated” time from the record.
:text
lower:True
The full text of the record.
Display:
{'hint': 'text'}
:desc
lower:True
Notes concerning the record.
Display:
{'hint': 'text'}
:asn
The associated Autonomous System Number (ASN).
:id
The registry unique identifier (e.g. NET-74-0-0-0-1).
:name
The name assigned to the network by the registrant.
:parentid
The registry unique identifier of the parent whois record (e.g. NET-74-0-0-0-0).
:registrant
Deprecated. Add the registrant inet:whois:ipcontact to the :contacts array.
Deprecated:
True
:contacts
Additional contacts from the record.
:country
The two-letter ISO 3166 country code.
:status
lower:True
The state of the registered network.
:type
lower:True
The classification of the registered network (e.g. direct allocation).
:links
URLs provided with the record.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
inet:whois:iprec
-(ipwhois)>
inet:ipv4
The source IP whois record describes the target IPv4 address.
inet:whois:iprec
-(ipwhois)>
inet:ipv6
The source IP whois record describes the target IPv6 address.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
inet:whois:rar
A domain registrar.
The base type for the form can be found at inet:whois:rar.
An example of inet:whois:rar
:
godaddy, inc.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
inet:whois:rec
A domain whois record.
The base type for the form can be found at inet:whois:rec.
- Properties:
name
type
doc
opts
:fqdn
The domain associated with the whois record.
Read Only:
True
:asof
The date of the whois record.
Read Only:
True
:text
lower:True
The full text of the whois record.
Display:
{'hint': 'text'}
:created
The “created” time from the whois record.
:updated
The “last updated” time from the whois record.
:expires
The “expires” time from the whois record.
:registrar
The registrar name from the whois record.
:registrant
The registrant name from the whois record.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
inet:whois:recns
A nameserver associated with a domain whois record.
The base type for the form can be found at inet:whois:recns.
- Properties:
name
type
doc
opts
:ns
A nameserver for a domain as listed in the domain whois record.
Read Only:
True
:rec
The whois record containing the nameserver data.
Read Only:
True
:rec:fqdn
The domain associated with the whois record.
Read Only:
True
:rec:asof
The date of the whois record.
Read Only:
True
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
inet:whois:reg
A domain registrant.
The base type for the form can be found at inet:whois:reg.
An example of inet:whois:reg
:
woot hostmaster
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
inet:whois:regid
The registry unique identifier of the registration record.
The base type for the form can be found at inet:whois:regid.
An example of inet:whois:regid
:
NET-10-0-0-0-1
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
inet:wifi:ap
An SSID/MAC address combination for a wireless access point.
The base type for the form can be found at inet:wifi:ap.
- Properties:
name
type
doc
opts
:ssid
The SSID for the wireless access point.
Read Only:
True
:bssid
The MAC address for the wireless access point.
Read Only:
True
:latlong
The best known latitude/longitude for the wireless access point.
:accuracy
The reported accuracy of the latlong telemetry reading.
:channel
The WIFI channel that the AP was last observed operating on.
:encryption
The type of encryption used by the WIFI AP such as “wpa2”.
:place
The geo:place associated with the latlong property.
:loc
The geo-political location string for the wireless access point.
:org
The organization that owns/operates the access point.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
inet:wifi:ssid
A WiFi service set identifier (SSID) name.
The base type for the form can be found at inet:wifi:ssid.
An example of inet:wifi:ssid
:
The Vertex Project
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
iso:oid
An ISO Object Identifier string.
The base type for the form can be found at iso:oid.
- Properties:
name
type
doc
:descr
A description of the value or meaning of the OID.
:identifier
The string identifier for the deepest tree element.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
it:account
A GUID that represents an account on a host or network.
The base type for the form can be found at it:account.
- Properties:
name
type
doc
opts
:user
The username associated with the account.
:contact
Additional contact information associated with this account.
:host
The host where the account is registered.
:domain
The authentication domain where the account is registered.
:posix:uid
The user ID of the account.
Example:
1001
:posix:gid
The primary group ID of the account.
Example:
1001
:posix:gecos
The GECOS field for the POSIX account.
:posix:home
The path to the POSIX account’s home directory.
Example:
/home/visi
:posix:shell
The path to the POSIX account’s default shell.
Example:
/bin/bash
:windows:sid
The Microsoft Windows Security Identifier of the account.
:groups
An array of groups that the account is a member of.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
it:adid
An advertising identification string.
The base type for the form can be found at it:adid.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
it:app:snort:hit
An instance of a snort rule hit.
The base type for the form can be found at it:app:snort:hit.
- Properties:
name
type
doc
:rule
The snort rule that matched the file.
:flow
The inet:flow that matched the snort rule.
:src
The source address of flow that caused the hit.
:src:ipv4
The source IPv4 address of the flow that caused the hit.
:src:ipv6
The source IPv6 address of the flow that caused the hit.
:src:port
The source port of the flow that caused the hit.
:dst
The destination address of the trigger.
:dst:ipv4
The destination IPv4 address of the flow that caused the hit.
:dst:ipv6
The destination IPv4 address of the flow that caused the hit.
:dst:port
The destination port of the flow that caused the hit.
:time
The time of the network flow that caused the hit.
:sensor
The sensor host node that produced the hit.
:version
The version of the rule at the time of match.
:dropped
Set to true if the network traffic was dropped due to the match.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
it:app:snort:rule
A snort rule.
The base type for the form can be found at it:app:snort:rule.
- Properties:
name
type
doc
opts
:id
The snort rule id.
:text
The snort rule text.
Display:
{'hint': 'text'}
:name
The name of the snort rule.
:desc
A brief description of the snort rule.
Display:
{'hint': 'text'}
:engine
The snort engine ID which can parse and evaluate the rule text.
:version
The current version of the rule.
:author
Contact info for the author of the rule.
:created
The time the rule was initially created.
:updated
The time the rule was most recently modified.
:enabled
The rule enabled status to be used for snort evaluation engines.
:family
The name of the software family the rule is designed to detect.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:ruleset
-(has)>
it:app:snort:rule
The meta:ruleset includes the it:app:snort:rule.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:mitigation
-(uses)>
it:app:snort:rule
The mitigation uses the Snort rule.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
it:app:yara:match
A YARA rule match to a file.
The base type for the form can be found at it:app:yara:match.
- Properties:
name
type
doc
opts
:rule
The YARA rule that matched the file.
Read Only:
True
:file
The file that matched the YARA rule.
Read Only:
True
:version
The most recent version of the rule evaluated as a match.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
it:app:yara:netmatch
An instance of a YARA rule network hunting match.
The base type for the form can be found at it:app:yara:netmatch.
- Properties:
name
type
doc
:rule
The YARA rule that triggered the match.
:version
The most recent version of the rule evaluated as a match.
:node
forms:('inet:fqdn', 'inet:ipv4', 'inet:ipv6', 'inet:url')
The node which matched the rule.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
it:app:yara:procmatch
An instance of a YARA rule match to a process.
The base type for the form can be found at it:app:yara:procmatch.
- Properties:
name
type
doc
:rule
The YARA rule that matched the process.
:proc
The process that matched the YARA rule.
:time
The time that the YARA engine matched the process to the rule.
:version
The most recent version of the rule evaluated as a match.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
it:app:yara:rule
A YARA rule unique identifier.
The base type for the form can be found at it:app:yara:rule.
- Properties:
name
type
doc
opts
:text
The YARA rule text.
Display:
{'hint': 'text', 'syntax': 'yara'}
:ext:id
The YARA rule ID from an external system.
:url
A URL which documents the YARA rule.
:name
The name of the YARA rule.
:author
Contact info for the author of the YARA rule.
:version
The current version of the rule.
:created
The time the YARA rule was initially created.
:updated
The time the YARA rule was most recently modified.
:enabled
The rule enabled status to be used for YARA evaluation engines.
:family
The name of the software family the rule is designed to detect.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:ruleset
-(has)>
it:app:yara:rule
The meta:ruleset includes the it:app:yara:rule.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:mitigation
-(uses)>
it:app:yara:rule
The mitigation uses the YARA rule.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
it:auth:passwdhash
An instance of a password hash.
The base type for the form can be found at it:auth:passwdhash.
- Properties:
name
type
doc
:salt
The (optional) hex encoded salt value used to calculate the password hash.
:hash:md5
The MD5 password hash value.
:hash:sha1
The SHA1 password hash value.
:hash:sha256
The SHA256 password hash value.
:hash:sha512
The SHA512 password hash value.
:hash:lm
The LM password hash value.
:hash:ntlm
The NTLM password hash value.
:passwd
The (optional) clear text password for this password hash.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
it:av:filehit
Deprecated. Please use it:av:scan:result.
The base type for the form can be found at it:av:filehit.
- Properties:
name
type
doc
opts
:file
The file that triggered the signature hit.
Read Only:
True
:sig
The signature that the file triggered on.
Read Only:
True
:sig:name
The signature name.
Read Only:
True
:sig:soft
The anti-virus product which contains the signature.
Read Only:
True
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
it:av:prochit
Deprecated. Please use it:av:scan:result.
The base type for the form can be found at it:av:prochit.
- Properties:
name
type
doc
:proc
The file that triggered the signature hit.
:sig
The signature that the file triggered on.
:time
The time that the AV engine detected the signature.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
it:av:scan:result
The result of running an antivirus scanner.
The base type for the form can be found at it:av:scan:result.
- Properties:
name
type
doc
:time
The time the scan was run.
:verdict
enums:((10, 'benign'), (20, 'unknown'), (30, 'suspicious'), (40, 'malicious'))
The scanner provided verdict for the scan.
:scanner
The scanner software used to produce the result.
:scanner:name
The name of the scanner software.
:signame
The name of the signature returned by the scanner.
:categories
A list of categories for the result returned by the scanner.
:target:file
The file that was scanned to produce the result.
:target:proc
The process that was scanned to produce the result.
:target:host
The host that was scanned to produce the result.
:target:fqdn
The FQDN that was scanned to produce the result.
:target:url
The URL that was scanned to produce the result.
:target:ipv4
The IPv4 address that was scanned to produce the result.
:target:ipv6
The IPv6 address that was scanned to produce the result.
:multi:scan
Set if this result was part of running multiple scanners.
:multi:count
min:0
The total number of scanners which were run by a multi-scanner.
:multi:count:benign
min:0
The number of scanners which returned a benign verdict.
:multi:count:unknown
min:0
The number of scanners which returned a unknown/unsupported verdict.
:multi:count:suspicious
min:0
The number of scanners which returned a suspicious verdict.
:multi:count:malicious
min:0
The number of scanners which returned a malicious verdict.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
it:av:sig
Deprecated. Please use it:av:scan:result.
The base type for the form can be found at it:av:sig.
- Properties:
name
type
doc
opts
:soft
The anti-virus product which contains the signature.
Read Only:
True
:name
The signature name.
Read Only:
True
:desc
A free-form description of the signature.
Display:
{'hint': 'text'}
:url
A reference URL for information about the signature.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
it:av:signame
An antivirus signature name.
The base type for the form can be found at it:av:signame.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
it:cmd
A unique command-line string.
The base type for the form can be found at it:cmd.
An example of it:cmd
:
foo.exe --dostuff bar
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
it:cmd:history
A single command executed within a session.
The base type for the form can be found at it:cmd:history.
- Properties:
name
type
doc
:cmd
The command that was executed.
:session
The session that contains this history entry.
:time
The time that the command was executed.
:index
Used to order the commands when times are not available.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
it:cmd:session
A command line session with multiple commands run over time.
The base type for the form can be found at it:cmd:session.
- Properties:
name
type
doc
:host
The host where the command line session was executed.
:proc
The process which was interpreting this command line session.
:period
The period over which the command line session was running.
:file
The file containing the command history such as a .bash_history file.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
it:dev:int
A developer selected integer constant.
The base type for the form can be found at it:dev:int.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
it:dev:mutex
A string representing a mutex.
The base type for the form can be found at it:dev:mutex.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
it:dev:pipe
A string representing a named pipe.
The base type for the form can be found at it:dev:pipe.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
it:dev:regkey
A Windows registry key.
The base type for the form can be found at it:dev:regkey.
An example of it:dev:regkey
:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
it:dev:regval
A Windows registry key/value pair.
The base type for the form can be found at it:dev:regval.
- Properties:
name
type
doc
:key
The Windows registry key.
:str
The value of the registry key, if the value is a string.
:int
The value of the registry key, if the value is an integer.
:bytes
The file representing the value of the registry key, if the value is binary data.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
it:dev:repo
A version control system instance.
The base type for the form can be found at it:dev:repo.
- Properties:
name
type
doc
opts
:name
The name of the repository.
:desc
A free-form description of the repository.
Display:
{'hint': 'text'}
:created
Deprecated. Please use :period.
Deprecated:
True
:url
The URL where the repository is hosted.
:type
The type of the version control system used.
Example:
svn
:submodules
type: it:dev:repo:commitAn array of other repos that this repo has as submodules, pinned at specific commits.
:status
The status of the repository.
:period
The period when the repository existed.
:creator
The service account which created the repository.
:remover
The service account which removed or decommissioned the repository.
:id
strip:True
A platform specific ID which identifies the repository.
:platform
The platform which defines the repository.
:instance
The platform instance which defines the repository.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
it:dev:repo
-(has)>
inet:url
The repo has content hosted at the URL.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
it:dev:repo:branch
A branch in a version control system instance.
The base type for the form can be found at it:dev:repo:branch.
- Properties:
name
type
doc
opts
:parent
The branch this branch was branched from.
:start
The commit in the parent branch this branch was created at.
:name
strip:True
The name of the branch.
:url
The URL where the branch is hosted.
:created
Deprecated. Please use :period.
Deprecated:
True
:merged
The time this branch was merged back into its parent.
:deleted
Deprecated. Please use :period.
Deprecated:
True
:status
The status of the repository branch.
:period
The period when the repository branch existed.
:creator
The service account which created the repository branch.
:remover
The service account which removed or decommissioned the repository branch.
:id
strip:True
A platform specific ID which identifies the repository branch.
:platform
The platform which defines the repository branch.
:instance
The platform instance which defines the repository branch.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
it:dev:repo:commit
A commit to a repository.
The base type for the form can be found at it:dev:repo:commit.
- Properties:
name
type
doc
opts
:repo
The repository the commit lives in.
:parents
type: it:dev:repo:commitThe commit or commits this commit is immediately based on.
:branch
The name of the branch the commit was made to.
:mesg
The commit message describing the changes in the commit.
Display:
{'hint': 'text'}
:id
strip:True
The version control system specific commit identifier.
:created
Deprecated. Please use :period.
Deprecated:
True
:url
The URL where the commit is hosted.
:status
The status of the repository commit.
:period
The period when the repository commit existed.
:creator
The service account which created the repository commit.
:remover
The service account which removed or decommissioned the repository commit.
:platform
The platform which defines the repository commit.
:instance
The platform instance which defines the repository commit.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
it:dev:repo:diff
A diff of a file being applied in a single commit.
The base type for the form can be found at it:dev:repo:diff.
- Properties:
name
type
doc
:commit
The commit that produced this diff.
:file
The file after the commit has been applied.
:path
The path to the file in the repo that the diff is being applied to.
:url
The URL where the diff is hosted.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
it:dev:repo:diff:comment
A comment on a diff in a repository.
The base type for the form can be found at it:dev:repo:diff:comment.
- Properties:
name
type
doc
opts
:diff
The diff the comment is being added to.
:text
The body of the comment.
Display:
{'hint': 'text'}
:replyto
The comment that this comment is replying to.
:line
The line in the file that is being commented on.
:offset
The offset in the line in the file that is being commented on.
:url
The URL where the comment is hosted.
:created
Deprecated. Please use :period.
Deprecated:
True
:updated
The time the comment was updated.
:status
The status of the repository diff comment.
:period
The period when the repository diff comment existed.
:creator
The service account which created the repository diff comment.
:remover
The service account which removed or decommissioned the repository diff comment.
:id
strip:True
A platform specific ID which identifies the repository diff comment.
:platform
The platform which defines the repository diff comment.
:instance
The platform instance which defines the repository diff comment.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
it:dev:repo:issue
An issue raised in a repository.
The base type for the form can be found at it:dev:repo:issue.
- Properties:
name
type
doc
opts
:repo
The repo where the issue was logged.
:title
The title of the issue.
:desc
The text describing the issue.
Display:
{'hint': 'text'}
:created
Deprecated. Please use :period.
Deprecated:
True
:updated
The time the issue was updated.
:url
The URL where the issue is hosted.
:id
strip:True
The ID of the issue in the repository system.
:status
The status of the repository issue.
:period
The period when the repository issue existed.
:creator
The service account which created the repository issue.
:remover
The service account which removed or decommissioned the repository issue.
:platform
The platform which defines the repository issue.
:instance
The platform instance which defines the repository issue.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
it:dev:repo:issue:comment
A comment on an issue in a repository.
The base type for the form can be found at it:dev:repo:issue:comment.
- Properties:
name
type
doc
opts
:issue
The issue thread that the comment was made in.
:text
The body of the comment.
Display:
{'hint': 'text'}
:replyto
The comment that this comment is replying to.
:url
The URL where the comment is hosted.
:created
Deprecated. Please use :period.
Deprecated:
True
:updated
The time the comment was updated.
:status
The status of the repository issue comment.
:period
The period when the repository issue comment existed.
:creator
The service account which created the repository issue comment.
:remover
The service account which removed or decommissioned the repository issue comment.
:id
strip:True
A platform specific ID which identifies the repository issue comment.
:platform
The platform which defines the repository issue comment.
:instance
The platform instance which defines the repository issue comment.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
it:dev:repo:issue:label
A label applied to a repository issue.
The base type for the form can be found at it:dev:repo:issue:label.
- Properties:
name
type
doc
opts
:issue
The issue the label was applied to.
:label
The label that was applied to the issue.
:applied
Deprecated. Please use :period.
Deprecated:
True
:removed
Deprecated. Please use :period.
Deprecated:
True
:url
The primary URL associated with the repository issue label.
:status
The status of the repository issue label.
:period
The period when the repository issue label existed.
:creator
The service account which created the repository issue label.
:remover
The service account which removed or decommissioned the repository issue label.
:id
strip:True
A platform specific ID which identifies the repository issue label.
:platform
The platform which defines the repository issue label.
:instance
The platform instance which defines the repository issue label.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
it:dev:repo:label
A developer selected label.
The base type for the form can be found at it:dev:repo:label.
- Properties:
name
type
doc
opts
:id
strip:True
The ID of the label.
:title
The human friendly name of the label.
:desc
The description of the label.
Display:
{'hint': 'text'}
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
it:dev:repo:remote
A remote repo that is tracked for changes/branches/etc.
The base type for the form can be found at it:dev:repo:remote.
- Properties:
name
type
doc
opts
:name
The name the repo is using for the remote repo.
Example:
origin
:url
The URL the repo is using to access the remote repo.
:repo
The repo that is tracking the remote repo.
:remote
The instance of the remote repo.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
it:dev:repo:type:taxonomy
A version control system type taxonomy.
The base type for the form can be found at it:dev:repo:type:taxonomy.
- Properties:
name
type
doc
opts
:title
A brief title of the definition.
:summary
Deprecated. Please use title/desc.
Deprecated:True
Display:{'hint': 'text'}
:desc
A definition of the taxonomy entry.
Display:
{'hint': 'text'}
:sort
A display sort order for siblings.
:base
The base taxon.
Read Only:
True
:depth
The depth indexed from 0.
Read Only:
True
:parent
The taxonomy parent.
Read Only:
True
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
it:dev:str
A developer selected string.
The base type for the form can be found at it:dev:str.
- Properties:
name
type
doc
:norm
lower:True
Lower case normalized version of the it:dev:str.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
file:bytes
-(refs)>
it:dev:str
The source file contains the target string.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
it:domain
A logical boundary of authentication and configuration such as a windows domain.
The base type for the form can be found at it:domain.
- Properties:
name
type
doc
:name
The name of the domain.
:desc
A brief description of the domain.
:org
The org that operates the given domain.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
it:exec:bind
An instance of a host binding a listening port.
The base type for the form can be found at it:exec:bind.
- Properties:
name
type
doc
:proc
The main process executing code that bound the listening port.
:host
The host running the process that bound the listening port. Typically the same host referenced in :proc, if present.
:exe
The specific file containing code that bound the listening port. May or may not be the same :exe specified in :proc, if present.
:time
The time the port was bound.
:server
The inet:addr of the server when binding the port.
:server:ipv4
The IPv4 address specified to bind().
:server:ipv6
The IPv6 address specified to bind().
:server:port
The bound (listening) TCP port.
:sandbox:file
The initial sample given to a sandbox environment to analyze.
:thread
The host thread which caused the activity.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
it:exec:file:add
An instance of a host adding a file to a filesystem.
The base type for the form can be found at it:exec:file:add.
- Properties:
name
type
doc
:proc
The main process executing code that created the new file.
:host
The host running the process that created the new file. Typically the same host referenced in :proc, if present.
:exe
The specific file containing code that created the new file. May or may not be the same :exe specified in :proc, if present.
:time
The time the file was created.
:path
The path where the file was created.
:path:dir
The parent directory of the file path (parsed from :path).
:path:ext
The file extension of the file name (parsed from :path).
:path:base
The final component of the file path (parsed from :path).
:file
The file that was created.
:sandbox:file
The initial sample given to a sandbox environment to analyze.
:thread
The host thread which caused the activity.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
it:exec:file:del
An instance of a host deleting a file from a filesystem.
The base type for the form can be found at it:exec:file:del.
- Properties:
name
type
doc
:proc
The main process executing code that deleted the file.
:host
The host running the process that deleted the file. Typically the same host referenced in :proc, if present.
:exe
The specific file containing code that deleted the file. May or may not be the same :exe specified in :proc, if present.
:time
The time the file was deleted.
:path
The path where the file was deleted.
:path:dir
The parent directory of the file path (parsed from :path).
:path:ext
The file extension of the file name (parsed from :path).
:path:base
The final component of the file path (parsed from :path).
:file
The file that was deleted.
:sandbox:file
The initial sample given to a sandbox environment to analyze.
:thread
The host thread which caused the activity.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
it:exec:file:read
An instance of a host reading a file from a filesystem.
The base type for the form can be found at it:exec:file:read.
- Properties:
name
type
doc
:proc
The main process executing code that read the file.
:host
The host running the process that read the file. Typically the same host referenced in :proc, if present.
:exe
The specific file containing code that read the file. May or may not be the same :exe specified in :proc, if present.
:time
The time the file was read.
:path
The path where the file was read.
:path:dir
The parent directory of the file path (parsed from :path).
:path:ext
The file extension of the file name (parsed from :path).
:path:base
The final component of the file path (parsed from :path).
:file
The file that was read.
:sandbox:file
The initial sample given to a sandbox environment to analyze.
:thread
The host thread which caused the activity.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
it:exec:file:write
An instance of a host writing a file to a filesystem.
The base type for the form can be found at it:exec:file:write.
- Properties:
name
type
doc
:proc
The main process executing code that wrote to / modified the existing file.
:host
The host running the process that wrote to the file. Typically the same host referenced in :proc, if present.
:exe
The specific file containing code that wrote to the file. May or may not be the same :exe specified in :proc, if present.
:time
The time the file was written to/modified.
:path
The path where the file was written to/modified.
:path:dir
The parent directory of the file path (parsed from :path).
:path:ext
The file extension of the file name (parsed from :path).
:path:base
The final component of the file path (parsed from :path).
:file
The file that was modified.
:sandbox:file
The initial sample given to a sandbox environment to analyze.
:thread
The host thread which caused the activity.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
it:exec:loadlib
A library load event in a process.
The base type for the form can be found at it:exec:loadlib.
- Properties:
name
type
doc
:proc
The process where the library was loaded.
:va
The base memory address where the library was loaded in the process.
:loaded
The time the library was loaded.
:unloaded
The time the library was unloaded.
:path
The path that the library was loaded from.
:file
The library file that was loaded.
:sandbox:file
The initial sample given to a sandbox environment to analyze.
:exe
The executable file which caused the activity.
:thread
The host thread which caused the activity.
:host
The host on which the activity occurred.
:time
The time that the activity started.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
it:exec:mmap
A memory mapped segment located in a process.
The base type for the form can be found at it:exec:mmap.
- Properties:
name
type
doc
:proc
The process where the memory was mapped.
:va
The base memory address where the map was created in the process.
:size
The size of the memory map in bytes.
:perms:read
True if the mmap is mapped with read permissions.
:perms:write
True if the mmap is mapped with write permissions.
:perms:execute
True if the mmap is mapped with execute permissions.
:created
The time the memory map was created.
:deleted
The time the memory map was deleted.
:path
The file path if the mmap is a mapped view of a file.
:hash:sha256
A SHA256 hash of the memory map. Bytes may optionally be present in the axon.
:sandbox:file
The initial sample given to a sandbox environment to analyze.
:exe
The executable file which caused the activity.
:thread
The host thread which caused the activity.
:host
The host on which the activity occurred.
:time
The time that the activity started.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
it:exec:mutex
A mutex created by a process at runtime.
The base type for the form can be found at it:exec:mutex.
- Properties:
name
type
doc
:proc
The main process executing code that created the mutex.
:host
The host running the process that created the mutex. Typically the same host referenced in :proc, if present.
:exe
The specific file containing code that created the mutex. May or may not be the same :exe specified in :proc, if present.
:time
The time the mutex was created.
:name
The mutex string.
:sandbox:file
The initial sample given to a sandbox environment to analyze.
:thread
The host thread which caused the activity.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
it:exec:pipe
A named pipe created by a process at runtime.
The base type for the form can be found at it:exec:pipe.
- Properties:
name
type
doc
:proc
The main process executing code that created the named pipe.
:host
The host running the process that created the named pipe. Typically the same host referenced in :proc, if present.
:exe
The specific file containing code that created the named pipe. May or may not be the same :exe specified in :proc, if present.
:time
The time the named pipe was created.
:name
The named pipe string.
:sandbox:file
The initial sample given to a sandbox environment to analyze.
:thread
The host thread which caused the activity.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
it:exec:proc
A process executing on a host. May be an actual (e.g., endpoint) or virtual (e.g., malware sandbox) host.
The base type for the form can be found at it:exec:proc.
- Properties:
name
type
doc
opts
:host
The host that executed the process. May be an actual or a virtual / notional host.
:exe
The file considered the “main” executable for the process. For example, rundll32.exe may be considered the “main” executable for DLLs loaded by that program.
:cmd
The command string used to launch the process, including any command line parameters.
Display:
{'hint': 'text'}
:cmd:history
The command history entry which caused this process to be run.
:pid
The process ID.
:time
The start time for the process.
:name
The display name specified by the process.
:exited
The time the process exited.
:exitcode
The exit code for the process.
:user
The user name of the process owner.
Deprecated:
True
:account
The account of the process owner.
:path
The path to the executable of the process.
:path:base
The file basename of the executable of the process.
:src:exe
Deprecated. Create :src:proc and set :path.
Deprecated:
True
:src:proc
The process which created the process.
:killedby
The process which killed this process.
:sandbox:file
The initial sample given to a sandbox environment to analyze.
:proc
The host process which caused the activity.
:thread
The host thread which caused the activity.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
it:exec:query
An instance of an executed query.
The base type for the form can be found at it:exec:query.
- Properties:
name
type
doc
:text
The query string that was executed.
:opts
An opaque JSON object containing query parameters and options.
:api:url
The URL of the API endpoint the query was sent to.
:language
The name of the language that the query is expressed in.
:offset
The offset of the last record consumed from the query.
:synuser
The synapse user who executed the query.
:service:platform
The service platform which was queried.
:service:instance
The service instance which was queried.
:service:account
The service account which ran the query.
:exe
The executable file which caused the activity.
:proc
The host process which caused the activity.
:thread
The host thread which caused the activity.
:host
The host on which the activity occurred.
:time
The time that the activity started.
:sandbox:file
The initial sample given to a sandbox environment to analyze.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
it:exec:reg:del
An instance of a host deleting a registry key.
The base type for the form can be found at it:exec:reg:del.
- Properties:
name
type
doc
:proc
The main process executing code that deleted data from the registry.
:host
The host running the process that deleted data from the registry. Typically the same host referenced in :proc, if present.
:exe
The specific file containing code that deleted data from the registry. May or may not be the same :exe referenced in :proc, if present.
:time
The time the data from the registry was deleted.
:reg
The registry key or value that was deleted.
:sandbox:file
The initial sample given to a sandbox environment to analyze.
:thread
The host thread which caused the activity.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
it:exec:reg:get
An instance of a host getting a registry key.
The base type for the form can be found at it:exec:reg:get.
- Properties:
name
type
doc
:proc
The main process executing code that read the registry.
:host
The host running the process that read the registry. Typically the same host referenced in :proc, if present.
:exe
The specific file containing code that read the registry. May or may not be the same :exe referenced in :proc, if present.
:time
The time the registry was read.
:reg
The registry key or value that was read.
:sandbox:file
The initial sample given to a sandbox environment to analyze.
:thread
The host thread which caused the activity.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
it:exec:reg:set
An instance of a host creating or setting a registry key.
The base type for the form can be found at it:exec:reg:set.
- Properties:
name
type
doc
:proc
The main process executing code that wrote to the registry.
:host
The host running the process that wrote to the registry. Typically the same host referenced in :proc, if present.
:exe
The specific file containing code that wrote to the registry. May or may not be the same :exe referenced in :proc, if present.
:time
The time the registry was written to.
:reg
The registry key or value that was written to.
:sandbox:file
The initial sample given to a sandbox environment to analyze.
:thread
The host thread which caused the activity.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
it:exec:thread
A thread executing in a process.
The base type for the form can be found at it:exec:thread.
- Properties:
name
type
doc
:proc
The process which contains the thread.
:created
The time the thread was created.
:exited
The time the thread exited.
:exitcode
The exit code or return value for the thread.
:src:proc
An external process which created the thread.
:src:thread
The thread which created this thread.
:sandbox:file
The initial sample given to a sandbox environment to analyze.
:exe
The executable file which caused the activity.
:thread
The host thread which caused the activity.
:host
The host on which the activity occurred.
:time
The time that the activity started.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
it:exec:url
An instance of a host requesting a URL using any protocol scheme.
The base type for the form can be found at it:exec:url.
- Properties:
name
type
doc
:proc
The main process executing code that requested the URL.
:browser
The software version of the browser.
:host
The host running the process that requested the URL. Typically the same host referenced in :proc, if present.
:exe
The specific file containing code that requested the URL. May or may not be the same :exe specified in :proc, if present.
:time
The time the URL was requested.
:url
The URL that was requested.
:page:pdf
The rendered DOM saved as a PDF file.
:page:html
The rendered DOM saved as an HTML file.
:page:image
The rendered DOM saved as an image.
:http:request
The HTTP request made to retrieve the initial URL contents.
:client
The address of the client during the URL retrieval.
:client:ipv4
The IPv4 of the client during the URL retrieval.
:client:ipv6
The IPv6 of the client during the URL retrieval.
:client:port
The client port during the URL retrieval.
:sandbox:file
The initial sample given to a sandbox environment to analyze.
:thread
The host thread which caused the activity.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
it:fs:file
A file on a host.
The base type for the form can be found at it:fs:file.
- Properties:
name
type
doc
:host
The host containing the file.
:path
The path for the file.
:path:dir
The parent directory of the file path (parsed from :path).
:path:ext
The file extension of the file name (parsed from :path).
:path:base
The final component of the file path (parsed from :path).
:file
The file on the host.
:ctime
The file creation time.
:mtime
The file modification time.
:atime
The file access time.
:user
The owner of the file.
:group
The group owner of the file.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
it:group
A GUID that represents a group on a host or network.
The base type for the form can be found at it:group.
- Properties:
name
type
doc
opts
:name
The name of the group.
:desc
A brief description of the group.
:host
The host where the group is registered.
:domain
The authentication domain where the group is registered.
:groups
Groups that are a member of this group.
:posix:gid
The primary group ID of the account.
Example:
1001
:windows:sid
The Microsoft Windows Security Identifier of the group.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
it:host
A GUID that represents a host or system.
The base type for the form can be found at it:host.
- Properties:
name
type
doc
opts
:name
The name of the host or system.
:desc
A free-form description of the host.
:domain
The authentication domain that the host is a member of.
:ipv4
The last known ipv4 address for the host.
:latlong
The last known location for the host.
:place
The place where the host resides.
:loc
The geo-political location string for the node.
:os
The operating system of the host.
:os:name
A software product name for the host operating system. Used for entity resolution.
:hardware
The hardware specification for this host.
:manu
Please use :hardware::manufacturer:name.
Deprecated:
True
:model
Please use :hardware::model.
Deprecated:
True
:serial
The serial number of the host.
:operator
The operator of the host.
:org
The org that operates the given host.
:ext:id
An external identifier for the host.
:keyboard:layout
The primary keyboard layout configured on the host.
:keyboard:language
The primary keyboard input language configured on the host.
:image
The container image or OS image running on the host.
:url
The primary URL associated with the host.
:status
The status of the host.
:period
The period when the host existed.
:creator
The service account which created the host.
:remover
The service account which removed or decommissioned the host.
:id
strip:True
A platform specific ID which identifies the host.
:platform
The platform which defines the host.
:instance
The platform instance which defines the host.
:phys:mass
The mass of the physical host.
:phys:volume
The cubed volume of the physical host.
:phys:length
The length of the physical host.
:phys:width
The width of the physical host.
:phys:height
The height of the physical host.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
it:host:tenancy
A time window where a host was a tenant run by another host.
The base type for the form can be found at it:host:tenancy.
- Properties:
name
type
doc
:lessor
The host which provides runtime resources to the tenant host.
:tenant
The host which is run within the resources provided by the lessor.
:url
The primary URL associated with the host tenancy.
:status
The status of the host tenancy.
:period
The period when the host tenancy existed.
:creator
The service account which created the host tenancy.
:remover
The service account which removed or decommissioned the host tenancy.
:id
strip:True
A platform specific ID which identifies the host tenancy.
:platform
The platform which defines the host tenancy.
:instance
The platform instance which defines the host tenancy.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
it:hostname
The name of a host or system.
The base type for the form can be found at it:hostname.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
it:hostsoft
A version of a software product which is present on a given host.
The base type for the form can be found at it:hostsoft.
- Properties:
name
type
doc
opts
:host
Host with the software.
Read Only:
True
:softver
Software on the host.
Read Only:
True
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
it:hosturl
A url hosted on or served by a host or system.
The base type for the form can be found at it:hosturl.
- Properties:
name
type
doc
opts
:host
Host serving a url.
Read Only:
True
:url
URL available on the host.
Read Only:
True
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
it:log:event
A GUID representing an individual log event.
The base type for the form can be found at it:log:event.
- Properties:
name
type
doc
opts
:mesg
The log message text.
:type
A taxonometric type for the log event.
Example:
windows.eventlog.securitylog
:severity
enums:((10, 'debug'), (20, 'info'), (30, 'notice'), (40, 'warning'), (50, 'err'), (60, 'crit'), (70, 'alert'), (80, 'emerg'))
A log level integer that increases with severity.
:data
A raw JSON record of the log event.
:ext:id
An external id that uniquely identifies this log entry.
:product
The software which produced the log entry.
:service:platform
The service platform which generated the log event.
:service:instance
The service instance which generated the log event.
:service:account
The service account which generated the log event.
:exe
The executable file which caused the activity.
:proc
The host process which caused the activity.
:thread
The host thread which caused the activity.
:host
The host on which the activity occurred.
:time
The time that the activity started.
:sandbox:file
The initial sample given to a sandbox environment to analyze.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
it:log:event:type:taxonomy
A taxonomy of log event types.
The base type for the form can be found at it:log:event:type:taxonomy.
- Properties:
name
type
doc
opts
:title
A brief title of the definition.
:summary
Deprecated. Please use title/desc.
Deprecated:True
Display:{'hint': 'text'}
:desc
A definition of the taxonomy entry.
Display:
{'hint': 'text'}
:sort
A display sort order for siblings.
:base
The base taxon.
Read Only:
True
:depth
The depth indexed from 0.
Read Only:
True
:parent
The taxonomy parent.
Read Only:
True
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
it:logon
A GUID that represents an individual logon/logoff event.
The base type for the form can be found at it:logon.
- Properties:
name
type
doc
:time
The time the logon occurred.
:success
Set to false to indicate an unsuccessful logon attempt.
:logoff:time
The time the logon session ended.
:host
The host that the account logged in to.
:account
The account that logged in.
:creds
The credentials that were used for the logon.
:duration
The duration of the logon session.
:client:host
The host where the logon originated.
:client:ipv4
The IPv4 where the logon originated.
:client:ipv6
The IPv6 where the logon originated.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
it:mitre:attack:campaign
A MITRE ATT&CK Campaign ID.
The base type for the form can be found at it:mitre:attack:campaign.
An example of it:mitre:attack:campaign
:
C0028
- Properties:
name
type
doc
opts
:name
The primary name for the ATT&CK campaign.
:names
An array of alternate names for the ATT&CK campaign.
:desc
strip:True
A description of the ATT&CK campaign.
Display:
{'hint': 'text'}
:url
The URL that documents the ATT&CK campaign.
:groups
An array of ATT&CK group IDs attributed to the campaign.
:software
An array of ATT&CK software IDs used in the campaign.
:techniques
An array of ATT&CK technique IDs used in the campaign.
:matrices
The ATT&CK matrices which define the campaign.
:references
An array of URLs that document the ATT&CK campaign.
:period
The time interval when the campaign was active.
:created
The time that the campaign was created by MITRE.
:updated
The time that the campaign was last updated by MITRE.
:tag
Deprecated. Please use ou:campaign:tag.
Deprecated:
True
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
it:mitre:attack:data:component
A MITRE ATT&CK data component.
The base type for the form can be found at it:mitre:attack:data:component.
- Properties:
name
type
doc
opts
:name
The name of the data component.
Read Only:
True
:description
A description of the data component.
Display:
{'hint': 'text'}
:datasource
The datasource this data component belongs to.
Read Only:
True
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
it:mitre:attack:datasource
A MITRE ATT&CK Datasource ID.
The base type for the form can be found at it:mitre:attack:datasource.
An example of it:mitre:attack:datasource
:
DS0026
- Properties:
name
type
doc
opts
:name
The name of the datasource.
:description
A description of the datasource.
Display:
{'hint': 'text'}
:references
An array of URLs that document the datasource.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
it:mitre:attack:flow
A MITRE ATT&CK Flow diagram.
The base type for the form can be found at it:mitre:attack:flow.
- Properties:
name
type
doc
:name
The name of the attack-flow diagram.
:data
schema:{'$schema': 'https://json-schema.org/draft/2020-12/schema', '$id': 'https://center-for-threat-informed-defense.github.io/attack-flow/schema/attack-flow-schema-2.0.0.json', 'title': 'Attack Flow STIX 2.1 Extension', 'description': 'This schema is the normative definition of the STIX 2.1 extension `extension-definition--fb9c968a-745b-4ade-9b25-c324172197f4`. It extends STIX with additional STIX Data Objects (SDOs) that model Attack Flow concepts.', 'type': 'object', 'unevaluatedProperties': False, 'allOf': ({'$ref': 'http://raw.githubusercontent.com/oasis-open/cti-stix2-json-schemas/stix2.1/schemas/common/core.json'},), 'properties': {'type': {'const': 'bundle'}, 'objects': {'type': 'array', 'items': {'$comment': 'Try each of the Attack Flow types in order, eventually falling through to the STIX common object definition.', 'if': {'type': 'object', 'properties': {'type': {'type': 'string', 'const': 'attack-flow'}}}, 'then': {'$ref': 'https://center-for-threat-informed-defense.github.io/attack-flow/schema/attack-flow-schema-2.0.0.json#/$defs/attack-flow'}, 'else': {'if': {'type': 'object', 'properties': {'type': {'type': 'string', 'const': 'attack-action'}}}, 'then': {'$ref': 'https://center-for-threat-informed-defense.github.io/attack-flow/schema/attack-flow-schema-2.0.0.json#/$defs/attack-action'}, 'else': {'if': {'type': 'object', 'properties': {'type': {'type': 'string', 'const': 'attack-asset'}}}, 'then': {'$ref': 'https://center-for-threat-informed-defense.github.io/attack-flow/schema/attack-flow-schema-2.0.0.json#/$defs/attack-asset'}, 'else': {'if': {'type': 'object', 'properties': {'type': {'type': 'string', 'const': 'attack-condition'}}}, 'then': {'$ref': 'https://center-for-threat-informed-defense.github.io/attack-flow/schema/attack-flow-schema-2.0.0.json#/$defs/attack-condition'}, 'else': {'if': {'type': 'object', 'properties': {'type': {'type': 'string', 'const': 'attack-operator'}}}, 'then': {'$ref': 'https://center-for-threat-informed-defense.github.io/attack-flow/schema/attack-flow-schema-2.0.0.json#/$defs/attack-operator'}, 'else': {'$comment': 'All Attack Flow SDOs implement the required common properties.', '$ref': 'http://raw.githubusercontent.com/oasis-open/cti-stix2-json-schemas/stix2.1/schemas/common/core.json'}}}}}}, '$comment': "Attack Flow documents MUST have ONLY ONE 'attack-flow' type. That is enforced here with the 'contains', 'minContains', and 'maxContains'", 'contains': {'$ref': 'https://center-for-threat-informed-defense.github.io/attack-flow/schema/attack-flow-schema-2.0.0.json#/$defs/attack-flow'}, 'minContains': 1, 'maxContains': 1}}, '$defs': {'attack-flow': {'description': 'Every Attack Flow document **MUST** contain exactly one ``attack-flow
object. It provides metadata for name and description, starting points for the flow of actions, and can be referenced from other STIX objects.’, ‘type’: ‘object’, ‘allOf’: ({‘$ref’: ‘http://raw.githubusercontent.com/oasis-open/cti-stix2-json-schemas/stix2.1/schemas/common/core.json’},), ‘properties’: {‘type’: {‘description’: ‘The type MUST beattack-flow
.’, ‘type’: ‘string’, ‘const’: ‘attack-flow’}, ‘spec_version’: {‘description’: ‘The version MUST be2.1
.’, ‘type’: ‘string’, ‘const’: ‘2.1’}, ‘name’: {‘description’: ‘The name of the Attack Flow.’, ‘type’: ‘string’}, ‘description’: {‘description’: ‘A description of the overall Attack Flow.’, ‘type’: ‘string’}, ‘scope’: {‘description’: ‘Indicates what type of behavior the Attack Flow describes: a specific incident, a campaign, etc.’, ‘type’: ‘string’, ‘enum’: (‘incident’, ‘campaign’, ‘threat-actor’, ‘malware’, ‘other’)}, ‘start_refs’: {‘description’: ‘A list of objects that start the flow.’, ‘type’: ‘array’, ‘items’: {‘allOf’: ({‘$ref’: ‘http://raw.githubusercontent.com/oasis-open/cti-stix2-json-schemas/stix2.1/schemas/common/identifier.json’}, {‘pattern’: ‘^(attack-action|attack-condition)–‘})}, ‘minItems’: 1}, ‘extensions’: {‘$ref’: ‘https://center-for-threat-informed-defense.github.io/attack-flow/schema/attack-flow-schema-2.0.0.json#/$defs/extensions’}}, ‘required’: (‘type’, ‘spec_version’, ‘name’, ‘start_refs’, ‘scope’, ‘extensions’), ‘x-exampleObject’: ‘attack-flow–e9ec3a4b-f787-4e81-a3d9-4cfe017ebc2f’}, ‘attack-action’: {‘description’: ‘Anattack-action
object represents the execution of a particular technique, i.e. a discrete unit of adverary behavior.’, ‘type’: ‘object’, ‘allOf’: ({‘$ref’: ‘http://raw.githubusercontent.com/oasis-open/cti-stix2-json-schemas/stix2.1/schemas/common/core.json’},), ‘properties’: {‘type’: {‘description’: ‘The type MUST beattack-action
.’, ‘type’: ‘string’, ‘const’: ‘attack-action’}, ‘spec_version’: {‘description’: ‘The version MUST be2.1
.’, ‘type’: ‘string’, ‘const’: ‘2.1’}, ‘name’: {‘description’: ‘The name of the technique, or if a specific technique is not known, then the name of the tactic.’, ‘type’: ‘string’}, ‘tactic_id’: {‘description’: ‘A tactic identifier or shortname that may reference an authoritative collection of tactics, e.g. ATT&CK.’, ‘type’: ‘string’}, ‘tactic_ref’: {‘description’: “A reference to the tactic’s STIX representation. For ATT&CK, this should be anx-mitre-tactic
object.”, ‘allOf’: ({‘$ref’: ‘http://raw.githubusercontent.com/oasis-open/cti-stix2-json-schemas/stix2.1/schemas/common/identifier.json’},)}, ‘technique_id’: {‘description’: ‘A technique identifier or shortname that may reference an authoritative collection of techniques, e.g. ATT&CK.’, ‘type’: ‘string’}, ‘technique_ref’: {‘description’: “A reference to the technique’s STIX representation.”, ‘allOf’: ({‘$ref’: ‘http://raw.githubusercontent.com/oasis-open/cti-stix2-json-schemas/stix2.1/schemas/common/identifier.json’}, {‘pattern’: ‘^attack-pattern–‘})}, ‘description’: {‘description’: ‘A description of the adversary behavior, e.g. what they did, how they did it, and why. This field may contain prose as well as technical information, but consider usingcommand_ref
for providing technical details about technique execution.’, ‘type’: ‘string’}, ‘execution_start’: {‘description’: ‘Timestamp indicating when the execution of this action began.’, ‘$ref’: ‘https://raw.githubusercontent.com/oasis-open/cti-stix2-json-schemas/stix2.1/schemas/common/timestamp.json’}, ‘execution_end’: {‘description’: ‘Timestamp indicating when the execution of this action ended.’, ‘$ref’: ‘https://raw.githubusercontent.com/oasis-open/cti-stix2-json-schemas/stix2.1/schemas/common/timestamp.json’}, ‘command_ref’: {‘description’: ‘Describe tools or commands executed by the attacker by referring to a STIX Process object, which can represent commands, environment variables, process image, etc.’, ‘allOf’: ({‘$ref’: ‘http://raw.githubusercontent.com/oasis-open/cti-stix2-json-schemas/stix2.1/schemas/common/identifier.json’}, {‘pattern’: ‘^process–‘})}, ‘asset_refs’: {‘description’: ‘The assets involved in this action, i.e. where this action modifies or depends on the state of the asset.’, ‘type’: ‘array’, ‘items’: {‘allOf’: ({‘$ref’: ‘http://raw.githubusercontent.com/oasis-open/cti-stix2-json-schemas/stix2.1/schemas/common/identifier.json’}, {‘pattern’: ‘^(attack-asset)–‘})}, ‘minItems’: 1}, ‘effect_refs’: {‘description’: ‘The potential effects that result from executing this action. (See: effects.)’, ‘type’: ‘array’, ‘items’: {‘allOf’: ({‘$ref’: ‘http://raw.githubusercontent.com/oasis-open/cti-stix2-json-schemas/stix2.1/schemas/common/identifier.json’}, {‘pattern’: ‘^(attack-action|attack-operator|attack-condition)–‘})}, ‘minItems’: 1}, ‘extensions’: {‘$ref’: ‘https://center-for-threat-informed-defense.github.io/attack-flow/schema/attack-flow-schema-2.0.0.json#/$defs/extensions’}}, ‘required’: (‘type’, ‘spec_version’, ‘name’, ‘extensions’), ‘x-exampleObject’: ‘attack-action–37345417-3ee0-4e11-b421-1d4be68e6f15’}, ‘attack-asset’: {‘description’: ‘An asset is any object that is the subject or target of an action. Assets can be technical assets (such as machines and data) or non-technical assets such as people and physical systems. Actions typically either modify or depend upon the state of an asset in some way.nnNote that assets are not applicable in all contexts. For example, public threat reports may not include enough detail to represent the assets in a flow, or the flow might represent aggregate behavior (at the campaign or actor level) for which it does not make sense to specify an asset. Assets should be used to add context to a flow when the underlying intelligence contains sufficient detail to do so.’, ‘type’: ‘object’, ‘allOf’: ({‘$ref’: ‘http://raw.githubusercontent.com/oasis-open/cti-stix2-json-schemas/stix2.1/schemas/common/core.json’},), ‘properties’: {‘type’: {‘description’: ‘The type MUST beattack-asset
.’, ‘type’: ‘string’, ‘const’: ‘attack-asset’}, ‘spec_version’: {‘description’: ‘The version MUST be2.1
.’, ‘type’: ‘string’, ‘const’: ‘2.1’}, ‘name’: {‘description’: ‘An name for the asset.’, ‘type’: ‘string’}, ‘description’: {‘description’: ‘A description of the asset.’, ‘type’: ‘string’}, ‘object_ref’: {‘description’: ‘A reference to any STIX data object (i.e. SDO) or observable (i.e. SCO) that contains structured data about this asset.’, ‘$ref’: ‘http://raw.githubusercontent.com/oasis-open/cti-stix2-json-schemas/stix2.1/schemas/common/identifier.json’}, ‘extensions’: {‘$ref’: ‘https://center-for-threat-informed-defense.github.io/attack-flow/schema/attack-flow-schema-2.0.0.json#/$defs/extensions’}}, ‘required’: (‘type’, ‘spec_version’, ‘name’, ‘extensions’), ‘x-exampleObject’: ‘attack-asset–f7edf4aa-29ec-47aa-b4f6-c42dfbe2ac20’}, ‘attack-condition’: {‘description’: “Anattack-condition
object represents some possible condition, outcome, or state that could occur. Conditions can be used to split flows based on the success or failure of an action, or to provide further description of an action’s results.”, ‘type’: ‘object’, ‘allOf’: ({‘$ref’: ‘http://raw.githubusercontent.com/oasis-open/cti-stix2-json-schemas/stix2.1/schemas/common/core.json’},), ‘properties’: {‘type’: {‘description’: ‘The type MUST beattack-condition
.’, ‘type’: ‘string’, ‘const’: ‘attack-condition’}, ‘spec_version’: {‘description’: ‘The version MUST be2.1
.’, ‘type’: ‘string’, ‘const’: ‘2.1’}, ‘description’: {‘description’: ‘The condition that is evaluated, usually based on the success or failure of the preceding action.’, ‘type’: ‘string’}, ‘pattern’: {‘description’: ‘(This is an experimental feature.) The detection pattern for this condition may be expressed as a STIX Pattern or another appropriate language such as SNORT, YARA, etc.’, ‘type’: ‘string’}, ‘pattern_type’: {‘description’: ‘(This is an experimental feature.) The pattern langauge used in this condition. The value for this property should come from the STIXpattern-type-ov
open vocabulary.’, ‘type’: ‘string’}, ‘pattern_version’: {‘description’: ‘(This is an experimental feature.) The version of the pattern language used for the data in thepattern
property. For the STIX Pattern language, the default value is determined by thespec_version
of the condition object.’, ‘type’: ‘string’}, ‘on_true_refs’: {‘description’: ‘When the condition istrue
, the flow continues to these objects.’, ‘type’: ‘array’, ‘items’: {‘allOf’: ({‘$ref’: ‘http://raw.githubusercontent.com/oasis-open/cti-stix2-json-schemas/stix2.1/schemas/common/identifier.json’}, {‘pattern’: ‘^(attack-action|attack-operator|attack-condition)–‘})}, ‘minItems’: 1}, ‘on_false_refs’: {‘description’: ‘When the condition isfalse
, the flow continues to these objects. (If there are no objects, then the flow halts at this node.)’, ‘type’: ‘array’, ‘items’: {‘allOf’: ({‘$ref’: ‘http://raw.githubusercontent.com/oasis-open/cti-stix2-json-schemas/stix2.1/schemas/common/identifier.json’}, {‘pattern’: ‘^(attack-action|attack-operator|attack-condition)–‘})}, ‘minItems’: 1}, ‘extensions’: {‘$ref’: ‘https://center-for-threat-informed-defense.github.io/attack-flow/schema/attack-flow-schema-2.0.0.json#/$defs/extensions’}}, ‘required’: (‘type’, ‘spec_version’, ‘description’, ‘extensions’), ‘x-exampleObject’: ‘attack-condition–7e809f5b-319a-4b3f-82fe-e4dc09af5088’}, ‘attack-operator’: {‘description’: ‘Anattack-operator
object joins multiple attack paths together using boolean logic.’, ‘type’: ‘object’, ‘allOf’: ({‘$ref’: ‘http://raw.githubusercontent.com/oasis-open/cti-stix2-json-schemas/stix2.1/schemas/common/core.json’},), ‘properties’: {‘type’: {‘description’: ‘The type MUST beattack-operator
.’, ‘type’: ‘string’, ‘const’: ‘attack-operator’}, ‘spec_version’: {‘description’: ‘The version MUST be2.1
.’, ‘type’: ‘string’, ‘const’: ‘2.1’}, ‘operator’: {‘description’: ‘The logical operator to apply to the input effects.’, ‘type’: ‘string’, ‘enum’: (‘AND’, ‘OR’)}, ‘effect_refs’: {‘description’: ‘The effects, outcomes, or states that result when this operator evaluates totrue
. If the operator evaluates tofalse
, then the flow halts. (See: effects.)’, ‘type’: ‘array’, ‘items’: {‘allOf’: ({‘$ref’: ‘http://raw.githubusercontent.com/oasis-open/cti-stix2-json-schemas/stix2.1/schemas/common/identifier.json’}, {‘pattern’: ‘^(attack-action|attack-operator|attack-condition)–‘})}, ‘minItems’: 1}, ‘extensions’: {‘$ref’: ‘https://center-for-threat-informed-defense.github.io/attack-flow/schema/attack-flow-schema-2.0.0.json#/$defs/extensions’}}, ‘required’: (‘type’, ‘spec_version’, ‘operator’, ‘extensions’), ‘x-exampleObject’: ‘attack-operator–609d7adf-a3d2-44e8-82de-4b30e3fb97be’}, ‘extensions’: {‘type’: ‘object’, ‘properties’: {‘extension-definition–fb9c968a-745b-4ade-9b25-c324172197f4’: {‘type’: ‘object’, ‘properties’: {‘extension_type’: {‘type’: ‘string’, ‘const’: ‘new-sdo’}}, ‘required’: (‘extension_type’,)}}, ‘required’: (‘extension-definition–fb9c968a-745b-4ade-9b25-c324172197f4’,)}}}``The ATT&CK Flow diagram. Schema version 2.0.0 enforced.
:created
The time that the diagram was created.
:updated
The time that the diagram was last updated.
:author:user
The Synapse user that created the node.
:author:contact
The contact information for the author of the ATT&CK Flow diagram.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
it:mitre:attack:group
A MITRE ATT&CK Group ID.
The base type for the form can be found at it:mitre:attack:group.
An example of it:mitre:attack:group
:
G0100
- Properties:
name
type
doc
opts
:org
Used to map an ATT&CK group to a synapse ou:org.
:name
The primary name for the ATT&CK group.
:names
An array of alternate names for the ATT&CK group.
:desc
A description of the ATT&CK group.
Display:
{'hint': 'text'}
:isnow
If deprecated, this field may contain the current value for the group.
:url
The URL that documents the ATT&CK group.
:tag
Deprecated. Please use a risk:threat:tag.
Deprecated:
True
:references
An array of URLs that document the ATT&CK group.
:techniques
An array of ATT&CK technique IDs used by the group.
:software
An array of ATT&CK software IDs used by the group.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
it:mitre:attack:mitigation
A MITRE ATT&CK Mitigation ID.
The base type for the form can be found at it:mitre:attack:mitigation.
An example of it:mitre:attack:mitigation
:
M1036
- Properties:
name
type
doc
opts
:name
The primary name for the ATT&CK mitigation.
:matrix
The ATT&CK matrix which defines the mitigation.
:desc
strip:True
A description of the ATT&CK mitigation.
Display:
{'hint': 'text'}
:url
The URL that documents the ATT&CK mitigation.
:tag
Deprecated. Please use risk:mitigation:tag.
Deprecated:
True
:references
An array of URLs that document the ATT&CK mitigation.
:addresses
An array of ATT&CK technique IDs addressed by the mitigation.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
it:mitre:attack:software
A MITRE ATT&CK Software ID.
The base type for the form can be found at it:mitre:attack:software.
An example of it:mitre:attack:software
:
S0154
- Properties:
name
type
doc
opts
:software
Used to map an ATT&CK software to a synapse it:prod:soft.
:name
The primary name for the ATT&CK software.
:names
Associated names for the ATT&CK software.
:desc
strip:True
A description of the ATT&CK software.
Display:
{'hint': 'text'}
:isnow
If deprecated, this field may contain the current value for the software.
:url
The URL that documents the ATT&CK software.
:tag
Deprecated. Please use risk:tool:software:tag.
Deprecated:
True
:references
An array of URLs that document the ATT&CK software.
:techniques
An array of techniques used by the software.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
it:mitre:attack:tactic
A MITRE ATT&CK Tactic ID.
The base type for the form can be found at it:mitre:attack:tactic.
An example of it:mitre:attack:tactic
:
TA0040
- Properties:
name
type
doc
opts
:name
strip:True
The primary name for the ATT&CK tactic.
:matrix
The ATT&CK matrix which defines the tactic.
:desc
A description of the ATT&CK tactic.
Display:
{'hint': 'text'}
:url
The URL that documents the ATT&CK tactic.
:tag
Deprecated.
Deprecated:
True
:references
An array of URLs that document the ATT&CK tactic.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
it:mitre:attack:technique
A MITRE ATT&CK Technique ID.
The base type for the form can be found at it:mitre:attack:technique.
An example of it:mitre:attack:technique
:
T1548
- Properties:
name
type
doc
opts
:name
The primary name for the ATT&CK technique.
:matrix
The ATT&CK matrix which defines the technique.
:status
The status of this ATT&CK technique.
:isnow
If deprecated, this field may contain the current value for the technique.
:desc
strip:True
A description of the ATT&CK technique.
Display:
{'hint': 'text'}
:url
The URL that documents the ATT&CK technique.
:tag
Deprecated. Please use ou:technique:tag.
Deprecated:
True
:references
An array of URLs that document the ATT&CK technique.
:parent
The parent ATT&CK technique on this sub-technique.
:tactics
An array of ATT&CK tactics that include this technique.
:data:components
An array of MITRE ATT&CK data components that detect the ATT&CK technique.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
it:network
A GUID that represents a logical network.
The base type for the form can be found at it:network.
- Properties:
name
type
doc
:name
The name of the network.
:desc
A brief description of the network.
:type
The type of network.
:org
The org that owns/operates the network.
:net4
The optional contiguous IPv4 address range of this network.
:net6
The optional contiguous IPv6 address range of this network.
:dns:resolvers
An array of DNS servers configured to resolve requests for hosts on the network.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
it:network:type:taxonomy
A taxonomy of network types.
The base type for the form can be found at it:network:type:taxonomy.
- Properties:
name
type
doc
opts
:title
A brief title of the definition.
:summary
Deprecated. Please use title/desc.
Deprecated:True
Display:{'hint': 'text'}
:desc
A definition of the taxonomy entry.
Display:
{'hint': 'text'}
:sort
A display sort order for siblings.
:base
The base taxon.
Read Only:
True
:depth
The depth indexed from 0.
Read Only:
True
:parent
The taxonomy parent.
Read Only:
True
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
it:os:android:aaid
Deprecated. Please use it:adid.
The base type for the form can be found at it:os:android:aaid.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
it:os:android:ibroadcast
The given software broadcasts the given Android intent.
The base type for the form can be found at it:os:android:ibroadcast.
- Properties:
name
type
doc
opts
:app
The app software which broadcasts the android intent.
Read Only:
True
:intent
The android intent which is broadcast by the app.
Read Only:
True
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
it:os:android:ilisten
The given software listens for an android intent.
The base type for the form can be found at it:os:android:ilisten.
- Properties:
name
type
doc
opts
:app
The app software which listens for the android intent.
Read Only:
True
:intent
The android intent which is listened for by the app.
Read Only:
True
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
it:os:android:intent
An android intent string.
The base type for the form can be found at it:os:android:intent.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
it:os:android:perm
An android permission string.
The base type for the form can be found at it:os:android:perm.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
it:os:android:reqperm
The given software requests the android permission.
The base type for the form can be found at it:os:android:reqperm.
- Properties:
name
type
doc
opts
:app
The android app which requests the permission.
Read Only:
True
:perm
The android permission requested by the app.
Read Only:
True
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
it:os:ios:idfa
Deprecated. Please use it:adid.
The base type for the form can be found at it:os:ios:idfa.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
it:prod:component
A specific instance of an it:prod:hardware most often as part of an it:host.
The base type for the form can be found at it:prod:component.
- Properties:
name
type
doc
:hardware
The hardware specification of this component.
:serial
The serial number of this component.
:host
The it:host which has this component installed.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
it:prod:hardware
A specification for a piece of IT hardware.
The base type for the form can be found at it:prod:hardware.
- Properties:
name
type
doc
opts
:name
The display name for this hardware specification.
:type
The type of hardware.
:desc
A brief description of the hardware.
Display:
{'hint': 'text'}
:cpe
The NIST CPE 2.3 string specifying this hardware.
:manufacturer
The organization that manufactures this hardware.
:manufacturer:name
The name of the organization that manufactures this hardware.
:make
Deprecated. Please use :manufacturer:name.
Deprecated:
True
:model
The model name or number for this hardware specification.
:version
Version string associated with this hardware specification.
:released
The initial release date for this hardware.
:parts
An array of it:prod:hardware parts included in this hardware specification.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:mitigation
-(uses)>
it:prod:hardware
The mitigation uses the hardware.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
it:prod:hardwaretype
An IT hardware type taxonomy.
The base type for the form can be found at it:prod:hardwaretype.
- Properties:
name
type
doc
opts
:title
A brief title of the definition.
:summary
Deprecated. Please use title/desc.
Deprecated:True
Display:{'hint': 'text'}
:desc
A definition of the taxonomy entry.
Display:
{'hint': 'text'}
:sort
A display sort order for siblings.
:base
The base taxon.
Read Only:
True
:depth
The depth indexed from 0.
Read Only:
True
:parent
The taxonomy parent.
Read Only:
True
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
it:prod:soft
A software product.
The base type for the form can be found at it:prod:soft.
- Properties:
name
type
doc
opts
:id
strip:True
An ID for the software.
:name
Name of the software.
alts:
('names',)
:type
The software type.
:names
Observed/variant names for this software.
:desc
A description of the software.
Display:
{'hint': 'text'}
:desc:short
lower:True
A short description of the software.
:cpe
The NIST CPE 2.3 string specifying this software.
:author
The contact information of the org or person who authored the software.
:author:org
Deprecated. Please use :author to link to a ps:contact.
Deprecated:
True
:author:acct
Deprecated. Please use :author to link to a ps:contact.
Deprecated:
True
:author:email
Deprecated. Please use :author to link to a ps:contact.
Deprecated:
True
:author:person
Deprecated. Please use :author to link to a ps:contact.
Deprecated:
True
:url
URL relevant for the software.
:isos
Set to True if the software is an operating system.
:islib
Set to True if the software is a library.
:techniques
Deprecated for scalability. Please use -(uses)> ou:technique.
Deprecated:
True
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
it:prod:soft
-(uses)>
ou:technique
The software uses the technique.
it:prod:soft
-(uses)>
risk:vuln
The software uses the vulnerability.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
it:prod:soft:taxonomy
A software type taxonomy.
The base type for the form can be found at it:prod:soft:taxonomy.
- Properties:
name
type
doc
opts
:title
A brief title of the definition.
:summary
Deprecated. Please use title/desc.
Deprecated:True
Display:{'hint': 'text'}
:desc
A definition of the taxonomy entry.
Display:
{'hint': 'text'}
:sort
A display sort order for siblings.
:base
The base taxon.
Read Only:
True
:depth
The depth indexed from 0.
Read Only:
True
:parent
The taxonomy parent.
Read Only:
True
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
it:prod:softfile
A file is distributed by a specific software version.
The base type for the form can be found at it:prod:softfile.
- Properties:
name
type
doc
opts
:soft
The software which distributes the file.
Read Only:
True
:file
The file distributed by the software.
Read Only:
True
:path
The default installation path of the file.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
it:prod:softid
An identifier issued to a given host by a specific software application.
The base type for the form can be found at it:prod:softid.
- Properties:
name
type
doc
:id
The ID issued by the software to the host.
:host
The host which was issued the ID by the software.
:soft
The software which issued the ID to the host.
:soft:name
The name of the software which issued the ID to the host.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
it:prod:softlib
A software version contains a library software version.
The base type for the form can be found at it:prod:softlib.
- Properties:
name
type
doc
opts
:soft
The software version that contains the library.
Read Only:
True
:lib
The library software version.
Read Only:
True
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
it:prod:softname
A software product name.
The base type for the form can be found at it:prod:softname.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
it:prod:softos
The software version is known to be compatible with the given os software version.
The base type for the form can be found at it:prod:softos.
- Properties:
name
type
doc
opts
:soft
The software which can run on the operating system.
Read Only:
True
:os
The operating system which the software can run on.
Read Only:
True
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
it:prod:softreg
A registry entry is created by a specific software version.
The base type for the form can be found at it:prod:softreg.
- Properties:
name
type
doc
opts
:softver
The software which creates the registry entry.
Read Only:
True
:regval
The registry entry created by the software.
Read Only:
True
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
it:prod:softver
A specific version of a software product.
The base type for the form can be found at it:prod:softver.
- Properties:
name
type
doc
opts
:software
Software associated with this version instance.
:software:name
Deprecated. Please use it:prod:softver:name.
Deprecated:
True
:name
Name of the software version.
alts:
('names',)
:names
Observed/variant names for this software version.
:desc
A description of the software.
Display:
{'hint': 'text'}
:cpe
The NIST CPE 2.3 string specifying this software version.
:cves
A list of CVEs that apply to this software version.
:vers
Version string associated with this version instance.
:vers:norm
lower:True
Normalized version of the version string.
:arch
Software architecture.
:released
Timestamp for when this version of the software was released.
:semver
System normalized semantic version number.
:semver:major
Deprecated. Please use semver range queries.
Deprecated:
True
:semver:minor
Deprecated. Please use semver range queries.
Deprecated:
True
:semver:patch
Deprecated. Please use semver range queries.
Deprecated:
True
:semver:pre
Deprecated.
Deprecated:
True
:semver:build
Deprecated.
Deprecated:
True
:url
URL where a specific version of the software is available from.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
it:prod:softver
-(uses)>
math:algorithm
The software uses the algorithm.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:mitigation
-(uses)>
it:prod:softver
The mitigation uses the software version.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
it:query
A unique query string.
The base type for the form can be found at it:query.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
it:reveng:filefunc
An instance of a function in an executable.
The base type for the form can be found at it:reveng:filefunc.
- Properties:
name
type
doc
opts
:function
The guid matching the function.
Read Only:
True
:file
The file that contains the function.
Read Only:
True
:va
The virtual address of the first codeblock of the function.
:rank
The function rank score used to evaluate if it exhibits interesting behavior.
:complexity
The complexity of the function.
:funccalls
Other function calls within the scope of the function.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
it:reveng:funcstr
A reference to a string inside a function.
The base type for the form can be found at it:reveng:funcstr.
- Properties:
name
type
doc
opts
:function
The guid matching the function.
Read Only:
True
:string
The string that the function references.
Read Only:
True
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
it:reveng:function
A function inside an executable.
The base type for the form can be found at it:reveng:function.
- Properties:
name
type
doc
:name
The name of the function.
:description
Notes concerning the function.
:impcalls
Calls to imported library functions within the scope of the function.
:strings
An array of strings referenced within the function.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
it:reveng:impfunc
A function from an imported library.
The base type for the form can be found at it:reveng:impfunc.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
it:screenshot
A screenshot of a host.
The base type for the form can be found at it:screenshot.
- Properties:
name
type
doc
opts
:image
The image file.
:desc
A brief description of the screenshot.
Display:
{'hint': 'text'}
:exe
The executable file which caused the activity.
:proc
The host process which caused the activity.
:thread
The host thread which caused the activity.
:host
The host on which the activity occurred.
:time
The time that the activity started.
:sandbox:file
The initial sample given to a sandbox environment to analyze.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
it:sec:c2:config
An extracted C2 config from an executable.
The base type for the form can be found at it:sec:c2:config.
- Properties:
name
type
doc
:family
The name of the software family which uses the config.
:file
The file that the C2 config was extracted from.
:decoys
An array of URLs used as decoy connections to obfuscate the C2 servers.
:servers
An array of connection URLs built from host/port/passwd combinations.
:proxies
An array of proxy URLs used to communicate with the C2 server.
:listens
An array of listen URLs that the software should bind.
:dns:resolvers
type: inet:serverAn array of inet:servers to use when resolving DNS names.
:mutex
The mutex that the software uses to prevent multiple-installations.
:campaigncode
The operator selected string used to identify the campaign or group of targets.
:crypto:key
Static key material used to encrypt C2 communications.
:connect:delay
The time delay from first execution to connecting to the C2 server.
:connect:interval
The configured duration to sleep between connections to the C2 server.
:raw
A JSON blob containing the raw config extracted from the binary.
:http:headers
type: inet:http:headerAn array of HTTP headers that the sample should transmit to the C2 server.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
it:sec:cpe
A NIST CPE 2.3 Formatted String.
The base type for the form can be found at it:sec:cpe.
- Properties:
name
type
doc
opts
:v2_2
The CPE 2.2 string which is equivalent to the primary property.
:part
The “part” field from the CPE 2.3 string.
Read Only:
True
:vendor
The “vendor” field from the CPE 2.3 string.
Read Only:
True
:product
The “product” field from the CPE 2.3 string.
Read Only:
True
:version
The “version” field from the CPE 2.3 string.
Read Only:
True
:update
The “update” field from the CPE 2.3 string.
Read Only:
True
:edition
The “edition” field from the CPE 2.3 string.
Read Only:
True
:language
The “language” field from the CPE 2.3 string.
Read Only:
True
:sw_edition
The “sw_edition” field from the CPE 2.3 string.
Read Only:
True
:target_sw
The “target_sw” field from the CPE 2.3 string.
Read Only:
True
:target_hw
The “target_hw” field from the CPE 2.3 string.
Read Only:
True
:other
The “other” field from the CPE 2.3 string.
Read Only:
True
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
it:sec:cve
A vulnerability as designated by a Common Vulnerabilities and Exposures (CVE) number.
The base type for the form can be found at it:sec:cve.
An example of it:sec:cve
:
cve-2012-0158
- Properties:
name
type
doc
opts
:desc
Deprecated. Please use risk:vuln:cve:desc.
Deprecated:
True
:url
Deprecated. Please use risk:vuln:cve:url.
Deprecated:
True
:references
Deprecated. Please use risk:vuln:cve:references.
Deprecated:
True
:nist:nvd:source
The name of the organization which reported the vulnerability to NIST.
:nist:nvd:published
The date the vulnerability was first published in the NVD.
:nist:nvd:modified
ismax:True
The date the vulnerability was last modified in the NVD.
:cisa:kev:name
The name of the vulnerability according to the CISA KEV database.
:cisa:kev:desc
The description of the vulnerability according to the CISA KEV database.
:cisa:kev:action
The action to mitigate the vulnerability according to the CISA KEV database.
:cisa:kev:vendor
The vendor name listed in the CISA KEV database.
:cisa:kev:product
The product name listed in the CISA KEV database.
:cisa:kev:added
The date the vulnerability was added to the CISA KEV database.
:cisa:kev:duedate
The date the action is due according to the CISA KEV database.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
it:sec:cwe
NIST NVD Common Weaknesses Enumeration Specification.
The base type for the form can be found at it:sec:cwe.
An example of it:sec:cwe
:
CWE-120
- Properties:
name
type
doc
opts
:name
The CWE description field.
Example:
Buffer Copy without Checking Size of Input (Classic Buffer Overflow)
:desc
The CWE description field.
Display:
{'hint': 'text'}
:url
A URL linking this CWE to a full description.
:parents
An array of ChildOf CWE Relationships.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
it:sec:metrics
A node used to track metrics of an organization’s infosec program.
The base type for the form can be found at it:sec:metrics.
- Properties:
name
type
doc
:org
The organization whose security program is being measured.
:org:name
The organization name. Used for entity resolution.
:org:fqdn
The organization FQDN. Used for entity resolution.
:period
The time period used to compute the metrics.
:alerts:meantime:triage
The mean time to triage alerts generated within the time period.
:alerts:count
The total number of alerts generated within the time period.
:alerts:falsepos
The number of alerts generated within the time period that were determined to be false positives.
:assets:hosts
The total number of hosts within scope for the information security program.
:assets:users
The total number of users within scope for the information security program.
:assets:vulns:count
The number of asset vulnerabilities being tracked at the end of the time period.
:assets:vulns:preexisting
The number of asset vulnerabilities being tracked at the beginning of the time period.
:assets:vulns:discovered
The number of asset vulnerabilities discovered during the time period.
:assets:vulns:mitigated
The number of asset vulnerabilities mitigated during the time period.
:assets:vulns:meantime:mitigate
The mean time to mitigate for vulnerable assets mitigated during the time period.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
it:sec:stix:bundle
A STIX bundle.
The base type for the form can be found at it:sec:stix:bundle.
- Properties:
name
type
doc
:id
The id field from the STIX bundle.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
it:sec:stix:indicator
A STIX indicator pattern.
The base type for the form can be found at it:sec:stix:indicator.
- Properties:
name
type
doc
:id
The STIX id field from the indicator pattern.
:name
The name of the STIX indicator pattern.
:confidence
The confidence field from the STIX indicator.
:revoked
The revoked field from the STIX indicator.
:description
The description field from the STIX indicator.
:pattern
The STIX indicator pattern text.
:pattern_type
The STIX indicator pattern type.
:created
The time that the indicator pattern was first created.
:updated
The time that the indicator pattern was last modified.
:labels
The label strings embedded in the STIX indicator pattern.
:valid_from
The valid_from field from the STIX indicator.
:valid_until
The valid_until field from the STIX indicator.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
it:sec:vuln:scan
An instance of running a vulnerability scan.
The base type for the form can be found at it:sec:vuln:scan.
- Properties:
name
type
doc
opts
:time
The time that the scan was started.
:desc
Description of the scan and scope.
Display:
{'hint': 'text'}
:ext:id
An externally generated ID for the scan.
:ext:url
An external URL which documents the scan.
:software
The scanning software used.
:software:name
The name of the scanner software.
:operator
Contact information for the scan operator.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
it:sec:vuln:scan:result
A vulnerability scan result for an asset.
The base type for the form can be found at it:sec:vuln:scan:result.
- Properties:
name
type
doc
:scan
The scan that discovered the vulnerability in the asset.
:vuln
The vulnerability detected in the asset.
:asset
The node which is vulnerable.
:desc
A description of the vulnerability and how it was detected in the asset.
:time
The time that the scan result was produced.
:ext:id
An externally generated ID for the scan result.
:ext:url
An external URL which documents the scan result.
:mitigation
The mitigation used to address this asset vulnerability.
:mitigated
The time that the vulnerability in the asset was mitigated.
:priority
The priority of mitigating the vulnerability.
:severity
The severity of the vulnerability in the asset. Use “none” for no vulnerability discovered.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
it:software:image
The base image used to create a container or OS.
The base type for the form can be found at it:software:image.
- Properties:
name
type
doc
:name
The name of the image.
:type
The type of software image.
:published
The time the image was published.
:publisher
The contact information of the org or person who published the image.
:parents
type: it:software:imageAn array of parent images in precedence order.
:url
The primary URL associated with the software image.
:status
The status of the software image.
:period
The period when the software image existed.
:creator
The service account which created the software image.
:remover
The service account which removed or decommissioned the software image.
:id
strip:True
A platform specific ID which identifies the software image.
:platform
The platform which defines the software image.
:instance
The platform instance which defines the software image.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
it:storage:mount
A storage volume that has been attached to an image.
The base type for the form can be found at it:storage:mount.
- Properties:
name
type
doc
:host
The host that has mounted the volume.
:volume
The volume that the host has mounted.
:path
The path where the volume is mounted in the host filesystem.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
it:storage:volume
A physical or logical storage volume that can be attached to a physical/virtual machine or container.
The base type for the form can be found at it:storage:volume.
- Properties:
name
type
doc
:id
strip:True
The unique volume ID.
:name
The name of the volume.
:type
The type of storage volume.
:size
min:0
The size of the volume in bytes.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
it:storage:volume:type:taxonomy
A taxonomy of storage volume types.
The base type for the form can be found at it:storage:volume:type:taxonomy.
An example of it:storage:volume:type:taxonomy
:
network.smb
- Properties:
name
type
doc
opts
:title
A brief title of the definition.
:summary
Deprecated. Please use title/desc.
Deprecated:True
Display:{'hint': 'text'}
:desc
A definition of the taxonomy entry.
Display:
{'hint': 'text'}
:sort
A display sort order for siblings.
:base
The base taxon.
Read Only:
True
:depth
The depth indexed from 0.
Read Only:
True
:parent
The taxonomy parent.
Read Only:
True
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
lang:idiom
Deprecated. Please use lang:translation.
The base type for the form can be found at lang:idiom.
- Properties:
name
type
doc
opts
:url
Authoritative URL for the idiom.
:desc:en
English description.
Display:
{'hint': 'text'}
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
lang:language
A specific written or spoken language.
The base type for the form can be found at lang:language.
- Properties:
name
type
doc
:code
The language code for this language.
:name
The primary name of the language.
:names
An array of alternative names for the language.
:skill
The skill used to annotate proficiency in the language.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
lang:name
A name used to refer to a language.
The base type for the form can be found at lang:name.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
lang:phrase
A small group of words which stand together as a concept.
The base type for the form can be found at lang:phrase.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
lang:trans
Deprecated. Please use lang:translation.
The base type for the form can be found at lang:trans.
- Properties:
name
type
doc
opts
:text:en
English translation.
Display:
{'hint': 'text'}
:desc:en
English description.
Display:
{'hint': 'text'}
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
lang:translation
A translation of text from one language to another.
The base type for the form can be found at lang:translation.
- Properties:
name
type
doc
opts
:input
The input text.
Example:
hola
:input:lang
The input language code.
:output
The output text.
Example:
hi
:output:lang
The output language code.
:desc
A description of the meaning of the output.
Example:
A standard greeting
:engine
The translation engine version used.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
mat:item
A GUID assigned to a material object.
The base type for the form can be found at mat:item.
- Properties:
name
type
doc
opts
:name
lower:True
The name of the material item.
:type
The taxonomy type of the item.
:spec
The specification which defines this item.
:latlong
Deprecated. Please use :place:latlong.
Deprecated:
True
:loc
Deprecated. Please use :place:loc.
Deprecated:
True
:phys:mass
The mass of the item.
:phys:volume
The cubed volume of the item.
:phys:length
The length of the item.
:phys:width
The width of the item.
:phys:height
The height of the item.
:place
The place where the item was located.
:place:loc
The geopolitical location of the item.
:place:name
The name of the place where the item was located.
:place:address
The postal address of the place where the item was located.
:place:latlong
The latlong where the item was located.
:place:latlong:accuracy
The accuracy of the latlong where the item was located.
:place:country
The country where the item was located.
:place:country:code
The country code where the item was located.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
mat:itemimage
The base type for compound node fields.
The base type for the form can be found at mat:itemimage.
- Properties:
name
type
doc
opts
:item
The item contained within the image file.
Read Only:
True
:file
The file containing an image of the item.
Read Only:
True
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
mat:spec
A GUID assigned to a material specification.
The base type for the form can be found at mat:spec.
- Properties:
name
type
doc
:name
lower:True
The name of the material specification.
:type
The taxonomy type for the specification.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
mat:specimage
The base type for compound node fields.
The base type for the form can be found at mat:specimage.
- Properties:
name
type
doc
opts
:spec
The spec contained within the image file.
Read Only:
True
:file
The file containing an image of the spec.
Read Only:
True
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
math:algorithm
A mathematical algorithm.
The base type for the form can be found at math:algorithm.
- Properties:
name
type
doc
opts
:name
The name of the algorithm.
:type
The type of algorithm.
:desc
A description of the algorithm.
Display:
{'hint': 'text'}
:created
The time that the algorithm was authored.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
file:bytes
-(uses)>
math:algorithm
The file uses the algorithm.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
it:prod:softver
-(uses)>
math:algorithm
The software uses the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
math:algorithm
The tool uses the algorithm.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
math:algorithm:type:taxonomy
A hierarchical taxonomy of algorithm types.
The base type for the form can be found at math:algorithm:type:taxonomy.
- Properties:
name
type
doc
opts
:title
A brief title of the definition.
:summary
Deprecated. Please use title/desc.
Deprecated:True
Display:{'hint': 'text'}
:desc
A definition of the taxonomy entry.
Display:
{'hint': 'text'}
:sort
A display sort order for siblings.
:base
The base taxon.
Read Only:
True
:depth
The depth indexed from 0.
Read Only:
True
:parent
The taxonomy parent.
Read Only:
True
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
media:news
A GUID for a news article or report.
The base type for the form can be found at media:news.
- Properties:
name
type
doc
opts
:url
The (optional) URL where the news was published.
Example:
http://cnn.com/news/mars-lander.html
:url:fqdn
The FQDN within the news URL.
Example:
cnn.com
:type
A taxonomy for the type of reporting or news.
:file
The (optional) file blob containing or published as the news.
:title
lower:True
Title/Headline for the news.
Example:mars lander reaches mars
Display:{'hint': 'text'}
:summary
A brief summary of the news item.
Example:lorum ipsum
Display:{'hint': 'text'}
:publisher
The organization which published the news.
:publisher:name
The name of the publishing org used to publish the news.
:published
The date the news item was published.
Example:
20161201180433
:updated
ismax:True
The last time the news item was updated.
Example:
20161201180433
:org
Deprecated. Please use :publisher:name.
Deprecated:
True
:author
Deprecated. Please use :authors array of ps:contact nodes.
Deprecated:
True
:authors
An array of authors of the news item.
:rss:feed
The RSS feed that published the news.
:ext:id
An external identifier specified by the publisher.
:topics
An array of relevant topics discussed in the report.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
media:news:taxonomy
A taxonomy of types or sources of news.
The base type for the form can be found at media:news:taxonomy.
- Properties:
name
type
doc
opts
:title
A brief title of the definition.
:summary
Deprecated. Please use title/desc.
Deprecated:True
Display:{'hint': 'text'}
:desc
A definition of the taxonomy entry.
Display:
{'hint': 'text'}
:sort
A display sort order for siblings.
:base
The base taxon.
Read Only:
True
:depth
The depth indexed from 0.
Read Only:
True
:parent
The taxonomy parent.
Read Only:
True
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
media:topic
A topic string.
The base type for the form can be found at media:topic.
- Properties:
name
type
doc
:desc
A brief description of the topic.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
meta:aggregate
A node which represents an aggregate count of a specific type.
The base type for the form can be found at meta:aggregate.
- Properties:
name
type
doc
opts
:type
The type of items being counted in aggregate.
Example:
casualties.civilian
:time
The time that the count was computed.
:count
The number of items counted in aggregate.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
meta:aggregate:type:taxonomy
A type of item being counted in aggregate.
The base type for the form can be found at meta:aggregate:type:taxonomy.
- Properties:
name
type
doc
opts
:title
A brief title of the definition.
:summary
Deprecated. Please use title/desc.
Deprecated:True
Display:{'hint': 'text'}
:desc
A definition of the taxonomy entry.
Display:
{'hint': 'text'}
:sort
A display sort order for siblings.
:base
The base taxon.
Read Only:
True
:depth
The depth indexed from 0.
Read Only:
True
:parent
The taxonomy parent.
Read Only:
True
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
meta:event
An analytically relevant event in a curated timeline.
The base type for the form can be found at meta:event.
- Properties:
name
type
doc
opts
:timeline
The timeline containing the event.
:title
A title for the event.
:summary
A prose summary of the event.
Display:
{'hint': 'text'}
:time
The time that the event occurred.
:index
The index of this event in a timeline without exact times.
:duration
The duration of the event.
:type
Type of event.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
meta:event
-(caused)>
risk:outage
The event caused the outage.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
meta:event:taxonomy
A taxonomy of event types for meta:event nodes.
The base type for the form can be found at meta:event:taxonomy.
- Properties:
name
type
doc
opts
:title
A brief title of the definition.
:summary
Deprecated. Please use title/desc.
Deprecated:True
Display:{'hint': 'text'}
:desc
A definition of the taxonomy entry.
Display:
{'hint': 'text'}
:sort
A display sort order for siblings.
:base
The base taxon.
Read Only:
True
:depth
The depth indexed from 0.
Read Only:
True
:parent
The taxonomy parent.
Read Only:
True
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
meta:feed
A data feed provided by a specific source.
The base type for the form can be found at meta:feed.
- Properties:
name
type
doc
:name
A name for the feed.
:type
The type of data feed.
:source
The meta:source which provides the feed.
:url
The URL of the feed API endpoint.
:query
The query logic associated with generating the feed output.
:opts
An opaque JSON object containing feed parameters and options.
:period
The time window over which results have been ingested.
:latest
The time of the last record consumed from the feed.
:offset
The offset of the last record consumed from the feed.
:cursor
strip:True
A cursor used to track ingest offset within the feed.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
meta:feed
-(found)>
*
The meta:feed produced the target node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
meta:feed:type:taxonomy
A data feed type taxonomy.
The base type for the form can be found at meta:feed:type:taxonomy.
- Properties:
name
type
doc
opts
:title
A brief title of the definition.
:summary
Deprecated. Please use title/desc.
Deprecated:True
Display:{'hint': 'text'}
:desc
A definition of the taxonomy entry.
Display:
{'hint': 'text'}
:sort
A display sort order for siblings.
:base
The base taxon.
Read Only:
True
:depth
The depth indexed from 0.
Read Only:
True
:parent
The taxonomy parent.
Read Only:
True
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
meta:note
An analyst note about nodes linked with -(about)> edges.
The base type for the form can be found at meta:note.
- Properties:
name
type
doc
opts
:type
The note type.
:text
The analyst authored note text.
Display:
{'hint': 'text', 'syntax': 'markdown'}
:author
The contact information of the author.
:creator
The synapse user who authored the note.
:created
The time the note was created.
:updated
The time the note was updated.
:replyto
The note is a reply to the specified note.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
meta:note
-(about)>
*
The meta:note is about the target node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
meta:note:type:taxonomy
An analyst note type taxonomy.
The base type for the form can be found at meta:note:type:taxonomy.
- Properties:
name
type
doc
opts
:title
A brief title of the definition.
:summary
Deprecated. Please use title/desc.
Deprecated:True
Display:{'hint': 'text'}
:desc
A definition of the taxonomy entry.
Display:
{'hint': 'text'}
:sort
A display sort order for siblings.
:base
The base taxon.
Read Only:
True
:depth
The depth indexed from 0.
Read Only:
True
:parent
The taxonomy parent.
Read Only:
True
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
meta:rule
A generic rule linked to matches with -(matches)> edges.
The base type for the form can be found at meta:rule.
- Properties:
name
type
doc
opts
:name
A name for the rule.
:type
The rule type.
:desc
A description of the rule.
Display:
{'hint': 'text'}
:text
The text of the rule logic.
Display:
{'hint': 'text'}
:author
The contact information of the rule author.
:created
The time the rule was initially created.
:updated
The time the rule was most recently modified.
:url
A URL which documents the rule.
:ext:id
An external identifier for the rule.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:ruleset
-(has)>
meta:rule
The meta:ruleset includes the meta:rule.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:mitigation
-(uses)>
meta:rule
The mitigation uses the rule.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
meta:rule:type:taxonomy
A taxonomy for meta:rule types.
The base type for the form can be found at meta:rule:type:taxonomy.
- Properties:
name
type
doc
opts
:title
A brief title of the definition.
:summary
Deprecated. Please use title/desc.
Deprecated:True
Display:{'hint': 'text'}
:desc
A definition of the taxonomy entry.
Display:
{'hint': 'text'}
:sort
A display sort order for siblings.
:base
The base taxon.
Read Only:
True
:depth
The depth indexed from 0.
Read Only:
True
:parent
The taxonomy parent.
Read Only:
True
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
meta:ruleset
A set of rules linked with -(has)> edges.
The base type for the form can be found at meta:ruleset.
- Properties:
name
type
doc
opts
:name
A name for the ruleset.
:type
The ruleset type.
:desc
A description of the ruleset.
Display:
{'hint': 'text'}
:author
The contact information of the ruleset author.
:created
The time the ruleset was initially created.
:updated
The time the ruleset was most recently modified.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
meta:ruleset
-(has)>
meta:rule
The meta:ruleset includes the meta:rule.
meta:ruleset
-(has)>
inet:service:rule
The meta:ruleset includes the inet:service:rule.
meta:ruleset
-(has)>
it:app:snort:rule
The meta:ruleset includes the it:app:snort:rule.
meta:ruleset
-(has)>
it:app:yara:rule
The meta:ruleset includes the it:app:yara:rule.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
meta:seen
Annotates that the data in a node was obtained from or observed by a given source.
The base type for the form can be found at meta:seen.
- Properties:
name
type
doc
opts
:source
The source which observed or provided the node.
Read Only:
True
:node
The node which was observed by or received from the source.
Read Only:
True
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
meta:source
A data source unique identifier.
The base type for the form can be found at meta:source.
- Properties:
name
type
doc
:name
lower:True
A human friendly name for the source.
:type
lower:True
An optional type field used to group sources.
:url
A URL which documents the meta source.
:ingest:cursor
Used by ingest logic to capture the current ingest cursor within a feed.
:ingest:latest
Used by ingest logic to capture the last time a feed ingest ran.
:ingest:offset
Used by ingest logic to capture the current ingest offset within a feed.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
meta:source
-(seen)>
*
The meta:source observed the target node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
meta:timeline
A curated timeline of analytically relevant events.
The base type for the form can be found at meta:timeline.
- Properties:
name
type
doc
opts
:title
A title for the timeline.
Example:
The history of the Vertex Project
:summary
A prose summary of the timeline.
Display:
{'hint': 'text'}
:type
The type of timeline.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
meta:timeline:taxonomy
A taxonomy of timeline types for meta:timeline nodes.
The base type for the form can be found at meta:timeline:taxonomy.
- Properties:
name
type
doc
opts
:title
A brief title of the definition.
:summary
Deprecated. Please use title/desc.
Deprecated:True
Display:{'hint': 'text'}
:desc
A definition of the taxonomy entry.
Display:
{'hint': 'text'}
:sort
A display sort order for siblings.
:base
The base taxon.
Read Only:
True
:depth
The depth indexed from 0.
Read Only:
True
:parent
The taxonomy parent.
Read Only:
True
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
ou:asset
A node for tracking assets which belong to an organization.
The base type for the form can be found at ou:asset.
- Properties:
name
type
doc
:org
The organization which owns the asset.
:id
strip:True
The ID of the asset.
:name
The name of the assset.
:period
The period of time when the asset was being tracked.
:status
The current status of the asset.
:type
The asset type.
:priority
The overall priority of protecting the asset.
:priority:confidentiality
The priority of protecting the confidentiality of the asset.
:priority:integrity
The priority of protecting the integrity of the asset.
:priority:availability
The priority of protecting the availability of the asset.
:node
The node which represents the asset.
:place
The place where the asset is deployed.
:owner
The contact information of the owner or administrator of the asset.
:operator
The contact information of the user or operator of the asset.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
ou:asset:status:taxonomy
An asset status taxonomy.
The base type for the form can be found at ou:asset:status:taxonomy.
- Properties:
name
type
doc
opts
:title
A brief title of the definition.
:summary
Deprecated. Please use title/desc.
Deprecated:True
Display:{'hint': 'text'}
:desc
A definition of the taxonomy entry.
Display:
{'hint': 'text'}
:sort
A display sort order for siblings.
:base
The base taxon.
Read Only:
True
:depth
The depth indexed from 0.
Read Only:
True
:parent
The taxonomy parent.
Read Only:
True
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
ou:asset:type:taxonomy
An asset type taxonomy.
The base type for the form can be found at ou:asset:type:taxonomy.
- Properties:
name
type
doc
opts
:title
A brief title of the definition.
:summary
Deprecated. Please use title/desc.
Deprecated:True
Display:{'hint': 'text'}
:desc
A definition of the taxonomy entry.
Display:
{'hint': 'text'}
:sort
A display sort order for siblings.
:base
The base taxon.
Read Only:
True
:depth
The depth indexed from 0.
Read Only:
True
:parent
The taxonomy parent.
Read Only:
True
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
ou:attendee
A node representing a person attending a meeting, conference, or event.
The base type for the form can be found at ou:attendee.
- Properties:
name
type
doc
:person
The contact information for the person who attended the event.
:arrived
The time when the person arrived.
:departed
The time when the person departed.
:roles
List of the roles the person had at the event.
:meet
The meeting that the person attended.
:conference
The conference that the person attended.
:conference:event
The conference event that the person attended.
:contest
The contest that the person attended.
:preso
The presentation that the person attended.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
ou:award
An award issued by an organization.
The base type for the form can be found at ou:award.
- Properties:
name
type
doc
opts
:name
The name of the award.
Example:
Bachelors of Science
:type
The type of award.
Example:
certification
:org
The organization which issues the award.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
ou:campaign
Represents an org’s activity in pursuit of a goal.
The base type for the form can be found at ou:campaign.
- Properties:
name
type
doc
opts
:org
The org carrying out the campaign.
:org:name
The name of the org responsible for the campaign. Used for entity resolution.
:org:fqdn
The FQDN of the org responsible for the campaign. Used for entity resolution.
:goal
The assessed primary goal of the campaign.
alts:
('goals',)
:slogan
The slogan used by the campaign.
:actors
Actors who participated in the campaign.
:goals
Additional assessed goals of the campaign.
:success
Records the success/failure status of the campaign if known.
:name
A terse name of the campaign.
alts:('names',)
Example:operation overlord
:names
An array of alternate names for the campaign.
:reporter
The organization reporting on the campaign.
:reporter:name
The name of the organization reporting on the campaign.
:type
Deprecated. Use the :camptype taxonomy.
Deprecated:
True
:sophistication
The assessed sophistication of the campaign.
:timeline
A timeline of significant events related to the campaign.
:camptype
The campaign type taxonomy.
Display:
{'hint': 'taxonomy'}
:desc
A description of the campaign.
Display:
{'hint': 'text'}
:period
The time interval when the organization was running the campaign.
:cost
The actual cost to the organization.
:budget
The budget allocated by the organization to execute the campaign.
:currency
The currency used to record econ:price properties.
:goal:revenue
A goal for revenue resulting from the campaign.
:result:revenue
The revenue resulting from the campaign.
:goal:pop
A goal for the number of people affected by the campaign.
:result:pop
The count of people affected by the campaign.
:team
The org team responsible for carrying out the campaign.
:conflict
The conflict in which this campaign is a primary participant.
:techniques
Deprecated for scalability. Please use -(uses)> ou:technique.
Deprecated:
True
:tag
The tag used to annotate nodes that are associated with the campaign.
:mitre:attack:campaign
A mapping to a MITRE ATT&CK campaign if applicable.
:ext:id
strip:True
An external identifier for the campaign.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
ou:technique
The campaign used the technique.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
ou:campname
A campaign name.
The base type for the form can be found at ou:campname.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
ou:camptype
An campaign type taxonomy.
The base type for the form can be found at ou:camptype.
- Properties:
name
type
doc
opts
:title
A brief title of the definition.
:summary
Deprecated. Please use title/desc.
Deprecated:True
Display:{'hint': 'text'}
:desc
A definition of the taxonomy entry.
Display:
{'hint': 'text'}
:sort
A display sort order for siblings.
:base
The base taxon.
Read Only:
True
:depth
The depth indexed from 0.
Read Only:
True
:parent
The taxonomy parent.
Read Only:
True
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
ou:candidate
A candidate being considered for a role within an organization.
The base type for the form can be found at ou:candidate.
- Properties:
name
type
doc
:org
The organization considering the candidate.
:contact
The contact information of the candidate.
:method
The method by which the candidate came under consideration.
:submitted
The time the candidate was submitted for consideration.
:intro
strip:True
An introduction or cover letter text submitted by the candidate.
:resume
The candidate’s resume or CV.
:opening
The opening that the candidate is being considered for.
:agent
The contact information of an agent who advocates for the candidate.
:recruiter
The contact information of a recruiter who works on behalf of the organization.
:attachments
An array of additional files submitted by the candidate.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
ou:candidate:method:taxonomy
A taxonomy of methods by which a candidate came under consideration.
The base type for the form can be found at ou:candidate:method:taxonomy.
- Properties:
name
type
doc
opts
:title
A brief title of the definition.
:summary
Deprecated. Please use title/desc.
Deprecated:True
Display:{'hint': 'text'}
:desc
A definition of the taxonomy entry.
Display:
{'hint': 'text'}
:sort
A display sort order for siblings.
:base
The base taxon.
Read Only:
True
:depth
The depth indexed from 0.
Read Only:
True
:parent
The taxonomy parent.
Read Only:
True
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
ou:conference
A conference with a name and sponsoring org.
The base type for the form can be found at ou:conference.
- Properties:
name
type
doc
opts
:org
The org which created/managed the conference.
:organizer
Contact information for the primary organizer of the conference.
:sponsors
An array of contacts which sponsored the conference.
:name
The full name of the conference.
alts:('names',)
Example:defcon 2017
:names
An array of alternate names for the conference.
:desc
lower:True
A description of the conference.
Example:annual cybersecurity conference
Display:{'hint': 'text'}
:base
The base name which is shared by all conference instances.
Example:
defcon
:start
The conference start date / time.
:end
The conference end date / time.
:place
The geo:place node where the conference was held.
:url
The inet:url node for the conference website.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
ou:conference:attendee
Deprecated. Please use ou:attendee.
The base type for the form can be found at ou:conference:attendee.
- Properties:
name
type
doc
opts
:conference
The conference which was attended.
Read Only:
True
:person
The person who attended the conference.
Read Only:
True
:arrived
The time when a person arrived to the conference.
:departed
The time when a person departed from the conference.
:role:staff
The person worked as staff at the conference.
:role:speaker
The person was a speaker or presenter at the conference.
:roles
List of the roles the person had at the conference.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
ou:conference:event
A conference event with a name and associated conference.
The base type for the form can be found at ou:conference:event.
- Properties:
name
type
doc
opts
:conference
The conference to which the event is associated.
Read Only:
True
:organizer
Contact information for the primary organizer of the event.
:sponsors
An array of contacts which sponsored the event.
:place
The geo:place where the event occurred.
:name
lower:True
The name of the conference event.
Example:
foobar conference dinner
:desc
lower:True
A description of the conference event.
Example:foobar conference networking dinner at ridge hotel
Display:{'hint': 'text'}
:url
The inet:url node for the conference event website.
:contact
Contact info for the event.
:start
The event start date / time.
:end
The event end date / time.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
ou:conference:event:attendee
Deprecated. Please use ou:attendee.
The base type for the form can be found at ou:conference:event:attendee.
- Properties:
name
type
doc
opts
:event
The conference event which was attended.
Read Only:
True
:person
The person who attended the conference event.
Read Only:
True
:arrived
The time when a person arrived to the conference event.
:departed
The time when a person departed from the conference event.
:roles
List of the roles the person had at the conference event.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
ou:conflict
Represents a conflict where two or more campaigns have mutually exclusive goals.
The base type for the form can be found at ou:conflict.
- Properties:
name
type
doc
:name
onespace:True
The name of the conflict.
:started
The time the conflict began.
:ended
The time the conflict ended.
:timeline
A timeline of significant events related to the conflict.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
ou:contest
A competitive event resulting in a ranked set of participants.
The base type for the form can be found at ou:contest.
- Properties:
name
type
doc
opts
:name
The name of the contest.
Example:
defcon ctf 2020
:type
The type of contest.
Example:
cyber ctf
:family
A name for a series of recurring contests.
Example:
defcon ctf
:desc
lower:True
A description of the contest.
Example:the capture-the-flag event hosted at defcon 2020
Display:{'hint': 'text'}
:url
The contest website URL.
:start
The contest start date / time.
:end
The contest end date / time.
:loc
The geopolitical affiliation of the contest.
:place
The geo:place where the contest was held.
:latlong
The latlong where the contest was held.
:conference
The conference that the contest is associated with.
:contests
An array of sub-contests that contributed to the rankings.
:sponsors
Contact information for contest sponsors.
:organizers
Contact information for contest organizers.
:participants
Contact information for contest participants.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
ou:contest:result
The results from a single contest participant.
The base type for the form can be found at ou:contest:result.
- Properties:
name
type
doc
opts
:contest
The contest that the participant took part in.
Read Only:
True
:participant
The participant in the contest.
Read Only:
True
:rank
The participant’s rank order in the contest.
:score
The participant’s final score in the contest.
:period
The period of time when the participant competed in the contest.
:url
The contest result website URL.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
ou:contract
An contract between multiple entities.
The base type for the form can be found at ou:contract.
- Properties:
name
type
doc
opts
:title
A terse title for the contract.
:type
The type of contract.
:sponsor
The contract sponsor.
:parties
The non-sponsor entities bound by the contract.
:document
The best/current contract document.
:signed
The date that the contract signing was complete.
:begins
The date that the contract goes into effect.
:expires
The date that the contract expires.
:completed
The date that the contract was completed.
:terminated
The date that the contract was terminated.
:award:price
The value of the contract at time of award.
:budget:price
The amount of money budgeted for the contract.
:currency
The currency of the econ:price values.
:purchase
Purchase details of the contract.
:requirements
The requirements levied upon the parties.
:types
A list of types that apply to the contract.
Deprecated:
True
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
ou:contribution
Represents a specific instance of contributing material support to a campaign.
The base type for the form can be found at ou:contribution.
- Properties:
name
type
doc
:from
The contact information of the contributor.
:campaign
The campaign receiving the contribution.
:value
The assessed value of the contribution.
:currency
The currency used for the assessed value.
:time
The time the contribution occurred.
:material:spec
The specification of material items contributed.
:material:count
The number of material items contributed.
:monetary:payment
Payment details for a monetary contribution.
:personnel:count
Number of personnel contributed to the campaign.
:personnel:jobtitle
Title or designation for the contributed personnel.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
ou:conttype
A contract type taxonomy.
The base type for the form can be found at ou:conttype.
- Properties:
name
type
doc
opts
:title
A brief title of the definition.
:summary
Deprecated. Please use title/desc.
Deprecated:True
Display:{'hint': 'text'}
:desc
A definition of the taxonomy entry.
Display:
{'hint': 'text'}
:sort
A display sort order for siblings.
:base
The base taxon.
Read Only:
True
:depth
The depth indexed from 0.
Read Only:
True
:parent
The taxonomy parent.
Read Only:
True
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
ou:employment
An employment type taxonomy.
The base type for the form can be found at ou:employment.
An example of ou:employment
:
fulltime.salary
- Properties:
name
type
doc
opts
:title
A brief title of the definition.
:summary
Deprecated. Please use title/desc.
Deprecated:True
Display:{'hint': 'text'}
:desc
A definition of the taxonomy entry.
Display:
{'hint': 'text'}
:sort
A display sort order for siblings.
:base
The base taxon.
Read Only:
True
:depth
The depth indexed from 0.
Read Only:
True
:parent
The taxonomy parent.
Read Only:
True
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
ou:enacted
An organization enacting a document.
The base type for the form can be found at ou:enacted.
- Properties:
name
type
doc
:org
The organization which is enacting the document.
:doc
forms:('doc:policy', 'doc:standard', 'doc:requirement')
The document enacted by the organization.
:scope
The scope of responsbility for the assignee to enact the document.
:id
strip:True
The ID of the adoption task.
:project
The project containing the adoption task.
:status
The status of the adoption task.
:priority
The priority of the adoption task.
:created
The time the adoption task was created.
:updated
The time the adoption task was last updated.
:due
The time the adoption task must be complete.
:completed
The time the adoption task was completed.
:creator
The user which created the adoption task.
:assignee
The user assigned to complete the adoption task.
:ext:creator
The contact information of the creator from an external system.
:ext:assignee
The contact information of the assignee from an external system.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
ou:enacted:status:taxonomy
A taxonomy of enacted statuses.
The base type for the form can be found at ou:enacted:status:taxonomy.
- Properties:
name
type
doc
opts
:title
A brief title of the definition.
:summary
Deprecated. Please use title/desc.
Deprecated:True
Display:{'hint': 'text'}
:desc
A definition of the taxonomy entry.
Display:
{'hint': 'text'}
:sort
A display sort order for siblings.
:base
The base taxon.
Read Only:
True
:depth
The depth indexed from 0.
Read Only:
True
:parent
The taxonomy parent.
Read Only:
True
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
ou:goal
An assessed or stated goal which may be abstract or org specific.
The base type for the form can be found at ou:goal.
- Properties:
name
type
doc
opts
:name
A terse name for the goal.
alts:
('names',)
:names
An array of alternate names for the goal. Used to merge/resolve goals.
:type
A type taxonomy entry for the goal.
:desc
A description of the goal.
Display:
{'hint': 'text'}
:prev
Deprecated. Please use ou:goal:type taxonomy.
Deprecated:
True
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
ou:goal:type:taxonomy
A taxonomy of goal types.
The base type for the form can be found at ou:goal:type:taxonomy.
- Properties:
name
type
doc
opts
:title
A brief title of the definition.
:summary
Deprecated. Please use title/desc.
Deprecated:True
Display:{'hint': 'text'}
:desc
A definition of the taxonomy entry.
Display:
{'hint': 'text'}
:sort
A display sort order for siblings.
:base
The base taxon.
Read Only:
True
:depth
The depth indexed from 0.
Read Only:
True
:parent
The taxonomy parent.
Read Only:
True
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
ou:goalname
A goal name.
The base type for the form can be found at ou:goalname.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
ou:hasalias
The knowledge that an organization has an alias.
The base type for the form can be found at ou:hasalias.
- Properties:
name
type
doc
opts
:org
The org guid which has the alias.
Read Only:
True
:alias
Alias for the organization.
Read Only:
True
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
ou:hasgoal
Deprecated. Please use ou:org:goals.
The base type for the form can be found at ou:hasgoal.
- Properties:
name
type
doc
opts
:org
The org which has the goal.
Read Only:
True
:goal
The goal which the org has.
Read Only:
True
:stated
Set to true/false if the goal is known to be self stated.
:window
Set if a goal has a limited time window.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
ou:id:number
A unique id number issued by a specific organization.
The base type for the form can be found at ou:id:number.
- Properties:
name
type
doc
opts
:type
The type of org ID.
Read Only:
True
:value
The value of the org ID.
Read Only:
True
:status
A freeform status such as valid, suspended, expired.
:issued
The time at which the org issued the ID number.
:expires
The time at which the ID number expires.
:issuer
The contact information of the office which issued the ID number.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
ou:id:type
A type of id number issued by an org.
The base type for the form can be found at ou:id:type.
- Properties:
name
type
doc
opts
:org
The org which issues id numbers of this type.
:name
The friendly name of the ID number type.
alts:
('names',)
:names
An array of alternate names for the ID number type.
:url
The official URL of the issuer.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
ou:id:update
A status update to an org:id:number.
The base type for the form can be found at ou:id:update.
- Properties:
name
type
doc
:number
The id number that was updated.
:status
The updated status of the id number.
:time
The date/time that the id number was updated.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
ou:industry
An industry classification type.
The base type for the form can be found at ou:industry.
- Properties:
name
type
doc
opts
:name
The name of the industry.
alts:
('names',)
:type
A taxonomy entry for the industry.
:names
An array of alternative names for the industry.
:reporter
The organization reporting on the industry.
:reporter:name
The name of the organization reporting on the industry.
:subs
Deprecated. Please use ou:industry:type taxonomy.
Deprecated:
True
:sic
An array of SIC codes that map to the industry.
:naics
An array of NAICS codes that map to the industry.
:isic
An array of ISIC codes that map to the industry.
:desc
A description of the industry.
Display:
{'hint': 'text'}
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
ou:industry
The attack targeted the industry.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:compromise
-(targets)>
ou:industry
The compromise was assessed to be based on the victim’s role in the industry.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
ou:industry
The threat cluster targets the industry.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
ou:industry:type:taxonomy
An industry type taxonomy.
The base type for the form can be found at ou:industry:type:taxonomy.
- Properties:
name
type
doc
opts
:title
A brief title of the definition.
:summary
Deprecated. Please use title/desc.
Deprecated:True
Display:{'hint': 'text'}
:desc
A definition of the taxonomy entry.
Display:
{'hint': 'text'}
:sort
A display sort order for siblings.
:base
The base taxon.
Read Only:
True
:depth
The depth indexed from 0.
Read Only:
True
:parent
The taxonomy parent.
Read Only:
True
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
ou:industryname
The name of an industry.
The base type for the form can be found at ou:industryname.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
ou:jobtitle
A title for a position within an org.
The base type for the form can be found at ou:jobtitle.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
ou:jobtype
A taxonomy of job types.
The base type for the form can be found at ou:jobtype.
An example of ou:jobtype
:
it.dev.python
- Properties:
name
type
doc
opts
:title
A brief title of the definition.
:summary
Deprecated. Please use title/desc.
Deprecated:True
Display:{'hint': 'text'}
:desc
A definition of the taxonomy entry.
Display:
{'hint': 'text'}
:sort
A display sort order for siblings.
:base
The base taxon.
Read Only:
True
:depth
The depth indexed from 0.
Read Only:
True
:parent
The taxonomy parent.
Read Only:
True
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
ou:meet
An informal meeting of people which has no title or sponsor. See also: ou:conference.
The base type for the form can be found at ou:meet.
- Properties:
name
type
doc
:name
lower:True
A human friendly name for the meeting.
:start
The date / time the meet starts.
:end
The date / time the meet ends.
:place
The geo:place node where the meet was held.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
ou:meet:attendee
Deprecated. Please use ou:attendee.
The base type for the form can be found at ou:meet:attendee.
- Properties:
name
type
doc
opts
:meet
The meeting which was attended.
Read Only:
True
:person
The person who attended the meeting.
Read Only:
True
:arrived
The time when a person arrived to the meeting.
:departed
The time when a person departed from the meeting.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
ou:member
Deprecated. Please use ou:position.
The base type for the form can be found at ou:member.
- Properties:
name
type
doc
opts
:org
The GUID of the org the person is a member of.
Read Only:
True
:person
The GUID of the person that is a member of an org.
Read Only:
True
:title
The persons normalized title.
:start
ismin:True
Earliest known association of the person with the org.
:end
ismax:True
Most recent known association of the person with the org.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
ou:name
The name of an organization. This may be a formal name or informal name of the organization.
The base type for the form can be found at ou:name.
An example of ou:name
:
acme corporation
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
ou:opening
A job/work opening within an org.
The base type for the form can be found at ou:opening.
- Properties:
name
type
doc
:org
The org which has the opening.
:orgname
The name of the organization as listed in the opening.
:orgfqdn
The FQDN of the organization as listed in the opening.
:posted
The date/time that the job opening was posted.
:removed
The date/time that the job opening was removed.
:postings
URLs where the opening is listed.
:contact
The contact details to inquire about the opening.
:loc
The geopolitical boundary of the opening.
:jobtype
The job type taxonomy.
:employment
The type of employment.
:jobtitle
The title of the opening.
:remote
Set to true if the opening will allow a fully remote worker.
:yearlypay
The yearly income associated with the opening.
:paycurrency
The currency that the yearly pay was delivered in.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
ou:org
A GUID for a human organization such as a company or military unit.
The base type for the form can be found at ou:org.
- Properties:
name
type
doc
opts
:loc
Location for an organization.
:name
The localized name of an organization.
alts:
('names',)
:type
The type of organization.
Deprecated:
True
:motto
The motto used by the organization.
:orgtype
The type of organization.
Display:
{'hint': 'taxonomy'}
:vitals
The most recent/accurate ou:vitals for the org.
:desc
A description of the org.
Display:
{'hint': 'text'}
:logo
An image file representing the logo for the organization.
:names
A list of alternate names for the organization.
:alias
Deprecated. Please use ou:org:names.
Deprecated:
True
:phone
The primary phone number for the organization.
:sic
The Standard Industrial Classification code for the organization.
Deprecated:
True
:naics
The North American Industry Classification System code for the organization.
Deprecated:
True
:industries
The industries associated with the org.
:us:cage
The Commercial and Government Entity (CAGE) code for the organization.
:founded
The date on which the org was founded.
:dissolved
The date on which the org was dissolved.
:url
The primary url for the organization.
:subs
An set of sub-organizations.
:orgchart
The root node for an orgchart made up ou:position nodes.
:hq
A collection of contact information for the “main office” of an org.
:locations
An array of contacts for facilities operated by the org.
:country
The organization’s country of origin.
:country:code
The 2 digit ISO 3166 country code for the organization’s country of origin.
:dns:mx
An array of MX domains used by email addresses issued by the org.
:techniques
Deprecated for scalability. Please use -(uses)> ou:technique.
Deprecated:
True
:goals
The assessed goals of the organization.
:tag
A base tag used to encode assessments made by the organization.
:ext:id
strip:True
An external identifier for the organization.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
ou:technique
The org uses the technique.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
ou:org:has
An org owns, controls, or has exclusive use of an object or resource, potentially during a specific period of time.
The base type for the form can be found at ou:org:has.
- Properties:
name
type
doc
opts
:org
The org who owns or controls the object or resource.
Read Only:
True
:node
The object or resource that is owned or controlled by the org.
Read Only:
True
:node:form
The form of the object or resource that is owned or controlled by the org.
Read Only:
True
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
ou:orgnet4
An organization’s IPv4 netblock.
The base type for the form can be found at ou:orgnet4.
- Properties:
name
type
doc
opts
:org
The org guid which owns the netblock.
Read Only:
True
:net
Netblock owned by the organization.
Read Only:
True
:name
The name that the organization assigns to this netblock.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
ou:orgnet6
An organization’s IPv6 netblock.
The base type for the form can be found at ou:orgnet6.
- Properties:
name
type
doc
opts
:org
The org guid which owns the netblock.
Read Only:
True
:net
Netblock owned by the organization.
Read Only:
True
:name
The name that the organization assigns to this netblock.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
ou:orgtype
An org type taxonomy.
The base type for the form can be found at ou:orgtype.
- Properties:
name
type
doc
opts
:title
A brief title of the definition.
:summary
Deprecated. Please use title/desc.
Deprecated:True
Display:{'hint': 'text'}
:desc
A definition of the taxonomy entry.
Display:
{'hint': 'text'}
:sort
A display sort order for siblings.
:base
The base taxon.
Read Only:
True
:depth
The depth indexed from 0.
Read Only:
True
:parent
The taxonomy parent.
Read Only:
True
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
ou:position
A position within an org. May be organized into an org chart.
The base type for the form can be found at ou:position.
- Properties:
name
type
doc
:org
The org which has the position.
:team
The team that the position is a member of.
:contact
The contact info for the person who holds the position.
:title
The title of the position.
:reports
An array of positions which report to this position.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
ou:preso
A webinar, conference talk, or other type of presentation.
The base type for the form can be found at ou:preso.
- Properties:
name
type
doc
opts
:organizer
Contact information for the primary organizer of the presentation.
:sponsors
A set of contacts which sponsored the presentation.
:presenters
A set of contacts which gave the presentation.
:title
lower:True
The full name of the presentation.
Example:
Synapse 101 - 2021/06/22
:desc
lower:True
A description of the presentation.
Display:
{'hint': 'text'}
:time
The scheduled presentation start time.
:duration
The scheduled duration of the presentation.
:loc
The geopolitical location string for where the presentation was given.
:place
The geo:place node where the presentation was held.
:deck:url
The URL hosting a copy of the presentation materials.
:deck:file
A file containing the presentation materials.
:attendee:url
The URL visited by live attendees of the presentation.
:recording:url
The URL hosting a recording of the presentation.
:recording:file
A file containing a recording of the presentation.
:conference
The conference which hosted the presentation.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
ou:requirement
A specific requirement.
The base type for the form can be found at ou:requirement.
- Properties:
name
type
doc
opts
:name
A name for the requirement.
:type
The type of requirement.
:text
The text of the stated requirement.
Display:
{'hint': 'text'}
:optional
Set to true if the requirement is optional.
:priority
The priority of the requirement.
:goal
The goal that the requirement is designed to achieve.
:active
Set to true if the requirement is currently active.
:issued
The time that the requirement was first issued.
:period
The time window where the goal must be met. Can be ongoing.
:issuer
The contact information of the entity which issued the requirement.
:assignee
The contact information of the entity which is assigned to meet the requirement.
:deps
A list of sub-requirements which must be met to complete the requirement.
:deps:min
min:0
The minimum number dependant requirements which must be met. If unset, assume all must be met.
- Source Edges:
source
verb
target
doc
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
ou:requirement:type:taxonomy
A taxonomy of requirement types.
The base type for the form can be found at ou:requirement:type:taxonomy.
- Properties:
name
type
doc
opts
:title
A brief title of the definition.
:summary
Deprecated. Please use title/desc.
Deprecated:True
Display:{'hint': 'text'}
:desc
A definition of the taxonomy entry.
Display:
{'hint': 'text'}
:sort
A display sort order for siblings.
:base
The base taxon.
Read Only:
True
:depth
The depth indexed from 0.
Read Only:
True
:parent
The taxonomy parent.
Read Only:
True
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
ou:suborg
Any parent/child relationship between two orgs. May represent ownership, organizational structure, etc.
The base type for the form can be found at ou:suborg.
- Properties:
name
type
doc
opts
:org
The org which owns the sub organization.
Read Only:
True
:sub
The sub org which owned by the org.
Read Only:
True
:perc
The optional percentage of sub which is owned by org.
:founded
The date on which the suborg relationship was founded.
:dissolved
The date on which the suborg relationship was dissolved.
:current
Bool indicating if the suborg relationship still current.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
ou:team
A GUID for a team within an organization.
The base type for the form can be found at ou:team.
- Properties:
name
type
doc
:org
A GUID for a human organization such as a company or military unit.
:name
The name of an organization. This may be a formal name or informal name of the organization.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
ou:technique
A specific technique used to achieve a goal.
The base type for the form can be found at ou:technique.
- Properties:
name
type
doc
opts
:name
The normalized name of the technique.
:type
The taxonomy classification of the technique.
:sophistication
The assessed sophistication of the technique.
:desc
A description of the technique.
Display:
{'hint': 'text'}
:tag
The tag used to annotate nodes where the technique was employed.
:mitre:attack:technique
A mapping to a MITRE ATT&CK technique if applicable.
:reporter
The organization reporting on the technique.
:reporter:name
The name of the organization reporting on the technique.
:ext:id
strip:True
An external identifier for the technique.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
ou:technique
-(uses)>
risk:vuln
The technique uses the vulnerability.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
it:prod:soft
-(uses)>
ou:technique
The software uses the technique.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
ou:technique
The campaign used the technique.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
ou:technique
The org uses the technique.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
ou:technique
The attacker used the technique in the attack.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:compromise
-(uses)>
ou:technique
The attacker used the technique in the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:extortion
-(uses)>
ou:technique
The attacker used the technique to extort the victim.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:mitigation
-(addresses)>
ou:technique
The mitigation addresses the technique.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
ou:technique
The threat cluster uses the technique.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
ou:technique
The tool uses the technique.
risk:tool:software
-(uses)>
*
The tool uses the target node.
risk:vuln
-(uses)>
ou:technique
The vulnerability uses the technique.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
ou:technique:taxonomy
An analyst defined taxonomy to classify techniques in different disciplines.
The base type for the form can be found at ou:technique:taxonomy.
- Properties:
name
type
doc
opts
:title
A brief title of the definition.
:summary
Deprecated. Please use title/desc.
Deprecated:True
Display:{'hint': 'text'}
:desc
A definition of the taxonomy entry.
Display:
{'hint': 'text'}
:sort
A display sort order for siblings.
:base
The base taxon.
Read Only:
True
:depth
The depth indexed from 0.
Read Only:
True
:parent
The taxonomy parent.
Read Only:
True
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
ou:user
A user name within an organization.
The base type for the form can be found at ou:user.
- Properties:
name
type
doc
opts
:org
The org guid which owns the netblock.
Read Only:
True
:user
The username associated with the organization.
Read Only:
True
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
ou:vitals
Vital statistics about an org for a given time period.
The base type for the form can be found at ou:vitals.
- Properties:
name
type
doc
:asof
The time that the vitals represent.
:org
The resolved org.
:orgname
The org name as reported by the source of the vitals.
:orgfqdn
The org FQDN as reported by the source of the vitals.
:currency
The currency of the econ:price values.
:costs
The costs/expenditures over the period.
:budget
The budget allocated for the period.
:revenue
The gross revenue over the period.
:profit
The net profit over the period.
:valuation
The assessed value of the org.
:shares
The number of shares outstanding.
:population
The population of the org.
:delta:costs
The change in costs over last period.
:delta:revenue
The change in revenue over last period.
:delta:profit
The change in profit over last period.
:delta:valuation
The change in valuation over last period.
:delta:population
The change in population over last period.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
phys:contained
A node which represents a physical object containing another physical object.
The base type for the form can be found at phys:contained.
- Properties:
name
type
doc
:type
The type of container relationship.
:period
The period where the container held the object.
:object
The object held within the container.
:container
The container which held the object.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
phys:contained:type:taxonomy
A taxonomy for types of contained relationships.
The base type for the form can be found at phys:contained:type:taxonomy.
- Properties:
name
type
doc
opts
:title
A brief title of the definition.
:summary
Deprecated. Please use title/desc.
Deprecated:True
Display:{'hint': 'text'}
:desc
A definition of the taxonomy entry.
Display:
{'hint': 'text'}
:sort
A display sort order for siblings.
:base
The base taxon.
Read Only:
True
:depth
The depth indexed from 0.
Read Only:
True
:parent
The taxonomy parent.
Read Only:
True
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
plan:phase
A phase within a planning system which may be used to group steps within a procedure.
The base type for the form can be found at plan:phase.
- Properties:
name
type
doc
opts
:title
The title of the phase.
Example:
Reconnaissance Phase
:summary
A summary of the definition of the phase.
Display:
{'hint': 'text'}
:index
The index of this phase within the phases of the system.
:url
A URL which links to the full documentation about the phase.
:system
The planning system which defines this phase.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
plan:procedure
A procedure consisting of steps.
The base type for the form can be found at plan:procedure.
- Properties:
name
type
doc
opts
:title
The name of the procedure.
Example:
Network Reconnaissance Procedure
:summary
A summary of the purpose and use cases for the procedure.
Display:
{'hint': 'text'}
:author
The contact of the person or organization which authored the procedure.
:created
The time the procedure was created.
:updated
The time the procedure was last updated.
:version
The version of the procedure.
:system
The planning system which defines this procedure.
:type
A type classification for the procedure.
:inputs
An array of inputs required to execute the procedure.
:firststep
The first step in the procedure.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
plan:procedure:link
A link between steps in a procedure.
The base type for the form can be found at plan:procedure:link.
- Properties:
name
type
doc
:condition
Set to true/false if this link is conditional based on a decision step.
:next
The next step in the plan.
:procedure
The procedure which defines the link.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
plan:procedure:step
A step within a procedure.
The base type for the form can be found at plan:procedure:step.
- Properties:
name
type
doc
opts
:phase
The phase that the step belongs within.
:procedure
The procedure which defines the step.
:title
The title of the step.
Example:
Scan the IPv4 address range for open ports
:summary
A summary of the tasks executed within the step.
:outputs
An array of variables defined in this step.
:techniques
An array of techniques used when executing this step.
:links
An array of links to subsequent steps.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
plan:procedure:type:taxonomy
A taxonomy of procedure types.
The base type for the form can be found at plan:procedure:type:taxonomy.
- Properties:
name
type
doc
opts
:title
A brief title of the definition.
:summary
Deprecated. Please use title/desc.
Deprecated:True
Display:{'hint': 'text'}
:desc
A definition of the taxonomy entry.
Display:
{'hint': 'text'}
:sort
A display sort order for siblings.
:base
The base taxon.
Read Only:
True
:depth
The depth indexed from 0.
Read Only:
True
:parent
The taxonomy parent.
Read Only:
True
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
plan:procedure:variable
A variable used by a procedure.
The base type for the form can be found at plan:procedure:variable.
- Properties:
name
type
doc
:name
The name of the variable.
:type
The type for the input. Types are specific to the planning system.
:default
The optional default value if the procedure is invoked without the input.
:procedure
The procedure which defines the variable.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
plan:system
A planning or behavioral analysis system that defines phases and procedures.
The base type for the form can be found at plan:system.
- Properties:
name
type
doc
opts
:name
The name of the planning system.
Example:
mitre att&ck flow
:summary
A summary of the purpose and use case for the planning system.
Display:
{'hint': 'text'}
:author
The contact of the person or organization which authored the system.
:created
The time the planning system was first created.
:updated
The time the planning system was last updated.
:version
The version of the planning system.
:url
The primary URL which documents the planning system.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
pol:candidate
A candidate for office in a specific race.
The base type for the form can be found at pol:candidate.
- Properties:
name
type
doc
:id
strip:True
A unique ID for the candidate issued by an election authority.
:contact
The contact information of the candidate.
:race
The race the candidate is participating in.
:campaign
The official campaign to elect the candidate.
:winner
Records the outcome of the race.
:party
The declared political party of the candidate.
:incumbent
Set to true if the candidate is an incumbent in this race.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
pol:country
A GUID for a country.
The base type for the form can be found at pol:country.
- Properties:
name
type
doc
opts
:flag
A thumbnail image of the flag of the country.
:iso2
The 2 digit ISO 3166 country code.
:iso3
The 3 digit ISO 3166 country code.
:isonum
The ISO integer country code.
:pop
Deprecated. Please use :vitals::population.
Deprecated:
True
:tld
A Fully Qualified Domain Name (FQDN).
:name
The name of the country.
alts:
('names',)
:names
An array of alternate or localized names for the country.
:government
The ou:org node which represents the government of the country.
:place
A geo:place node representing the geospatial properties of the country.
:founded
The date that the country was founded.
:dissolved
The date that the country was dissolved.
:vitals
The most recent known vitals for the country.
:currencies
The official currencies used in the country.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
pol:election
An election involving one or more races for office.
The base type for the form can be found at pol:election.
- Properties:
name
type
doc
opts
:name
The name of the election.
Example:
2022 united states congressional midterm election
:time
The date of the election.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
pol:immigration:status
A node which tracks the immigration status of a contact.
The base type for the form can be found at pol:immigration:status.
- Properties:
name
type
doc
opts
:contact
The contact information for the immigration status record.
:country
The country that the contact is/has immigrated to.
:type
A taxonomy entry for the immigration status type.
Example:
citizen.naturalized
:state
enums:requested,active,rejected,revoked,renounced
The state of the immigration status.
:began
The time when the status was granted to the contact.
:ended
The time when the status no longer applied to the contact.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
pol:immigration:status:type:taxonomy
A taxonomy of immigration types.
The base type for the form can be found at pol:immigration:status:type:taxonomy.
- Properties:
name
type
doc
opts
:title
A brief title of the definition.
:summary
Deprecated. Please use title/desc.
Deprecated:True
Display:{'hint': 'text'}
:desc
A definition of the taxonomy entry.
Display:
{'hint': 'text'}
:sort
A display sort order for siblings.
:base
The base taxon.
Read Only:
True
:depth
The depth indexed from 0.
Read Only:
True
:parent
The taxonomy parent.
Read Only:
True
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
pol:office
An elected or appointed office.
The base type for the form can be found at pol:office.
- Properties:
name
type
doc
opts
:title
The title of the political office.
Example:
united states senator
:position
The position this office holds in the org chart for the governing body.
:termlimit
The maximum number of times a single person may hold the office.
:govbody
The governmental body which contains the office.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
pol:pollingplace
An official place where ballots may be cast for a specific election.
The base type for the form can be found at pol:pollingplace.
- Properties:
name
type
doc
:election
The election that the polling place is designated for.
:name
The name of the polling place at the time of the election. This may differ from the official place name.
:place
The place where votes were cast.
:opens
The time that the polling place is scheduled to open.
:closes
The time that the polling place is scheduled to close.
:opened
The time that the polling place opened.
:closed
The time that the polling place closed.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
pol:race
An individual race for office.
The base type for the form can be found at pol:race.
- Properties:
name
type
doc
:election
The election that includes the race.
:office
The political office that the candidates in the race are running for.
:voters
The number of eligible voters for this race.
:turnout
The number of individuals who voted in this race.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
pol:term
A term in office held by a specific individual.
The base type for the form can be found at pol:term.
- Properties:
name
type
doc
:office
The office held for the term.
:start
The start of the term of office.
:end
The end of the term of office.
:race
The race that determined who held office during the term.
:contact
The contact information of the person who held office during the term.
:party
The political party of the person who held office during the term.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
pol:vitals
A set of vital statistics about a country.
The base type for the form can be found at pol:vitals.
- Properties:
name
type
doc
:country
The country that the statistics are about.
:asof
The time that the vitals were measured.
:area
The area of the country.
:population
The total number of people living in the country.
:currency
The national currency.
:econ:currency
The currency used to record price properties.
:econ:gdp
The gross domestic product of the country.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
proj:attachment
A file attachment added to a ticket or comment.
The base type for the form can be found at proj:attachment.
- Properties:
name
type
doc
:name
The name of the file that was attached.
:file
The file that was attached.
:creator
The synapse user who added the attachment.
:created
The time the attachment was added.
:ticket
The ticket the attachment was added to.
:comment
The comment the attachment was added to.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
proj:comment
A user comment on a ticket.
The base type for the form can be found at proj:comment.
- Properties:
name
type
doc
:creator
The synapse user who added the comment.
:created
The time the comment was added.
:updated
ismax:True
The last time the comment was updated.
:ticket
The ticket the comment was added to.
:text
The text of the comment.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
proj:epic
A collection of tickets related to a topic.
The base type for the form can be found at proj:epic.
- Properties:
name
type
doc
:name
onespace:True
The name of the epic.
:project
The project containing the epic.
:creator
The synapse user who created the epic.
:created
The time the epic was created.
:updated
ismax:True
The last time the epic was updated.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
proj:project
A project in a ticketing system.
The base type for the form can be found at proj:project.
- Properties:
name
type
doc
opts
:name
The project name.
:type
The project type.
:desc
The project description.
Display:
{'hint': 'text'}
:creator
The synapse user who created the project.
:created
The time the project was created.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
proj:project:type:taxonomy
A type taxonomy for projects.
The base type for the form can be found at proj:project:type:taxonomy.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
proj:sprint
A timeboxed period to complete a set amount of work.
The base type for the form can be found at proj:sprint.
- Properties:
name
type
doc
:name
The name of the sprint.
:status
enums:planned,current,completed
The sprint status.
:project
The project containing the sprint.
:creator
The synapse user who created the sprint.
:created
The date the sprint was created.
:period
The interval for the sprint.
:desc
A description of the sprint.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
proj:ticket
A ticket in a ticketing system.
The base type for the form can be found at proj:ticket.
- Properties:
name
type
doc
opts
:ext:id
strip:True
Deprecated. Please use :id.
Deprecated:
True
:ext:url
A URL to the ticket in an external system.
:epic
The epic that includes the ticket.
:name
onespace:True
The name of the ticket.
:desc
A description of the ticket.
:points
Optional SCRUM style story points value.
:status
enums:((0, 'new'), (10, 'in validation'), (20, 'in backlog'), (30, 'in sprint'), (40, 'in progress'), (50, 'in review'), (60, 'completed'), (70, 'done'), (80, 'blocked'))
The ticket completion status.
:sprint
The sprint that contains the ticket.
:type
The type of ticket.
Example:
bug
:id
strip:True
The ID of the ticket.
:project
The project containing the ticket.
:priority
The priority of the ticket.
:created
The time the ticket was created.
:updated
The time the ticket was last updated.
:due
The time the ticket must be complete.
:completed
The time the ticket was completed.
:creator
The user which created the ticket.
:assignee
The user assigned to complete the ticket.
:ext:creator
The contact information of the creator from an external system.
:ext:assignee
The contact information of the assignee from an external system.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
ps:achievement
An instance of an individual receiving an award.
The base type for the form can be found at ps:achievement.
- Properties:
name
type
doc
:awardee
The recipient of the award.
:award
The award bestowed on the awardee.
:awarded
The date the award was granted to the awardee.
:expires
The date the award or certification expires.
:revoked
The date the award was revoked by the org.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
ps:contact
A GUID for a contact info record.
The base type for the form can be found at ps:contact.
- Properties:
name
type
doc
opts
:org
The org which this contact represents.
:type
The type of contact which may be used for entity resolution.
:asof
A date/time value.
date:
The time this contact was created or modified.
:person
The ps:person GUID which owns this contact.
:vitals
The most recent known vitals for the contact.
:name
The person name listed for the contact.
alts:
('names',)
:bio
A brief bio provided for the contact.
:desc
A description of this contact.
:title
The job/org title listed for this contact.
alts:
('titles',)
:titles
An array of alternate titles for the contact.
:photo
The photo listed for this contact.
:orgname
The listed org/company name for this contact.
alts:
('orgnames',)
:orgfqdn
The listed org/company FQDN for this contact.
:user
The username or handle for this contact.
alts:
('users',)
:service:accounts
The service accounts associated with this contact.
:web:acct
Deprecated. Use :service:accounts.
Deprecated:
True
:web:group
Deprecated. Use inet:service:group:profile to link to a group.
Deprecated:
True
:birth:place
A fully resolved place of birth for this contact.
:birth:place:loc
The loc of the place of birth of this contact.
:birth:place:name
The name of the place of birth of this contact.
:death:place
A fully resolved place of death for this contact.
:death:place:loc
The loc of the place of death of this contact.
:death:place:name
The name of the place of death of this contact.
:dob
The date of birth for this contact.
:dod
The date of death for this contact.
:url
The home or main site for this contact.
The main email address for this contact.
alts:
('emails',)
:email:work
The work email address for this contact.
:loc
Best known contact geopolitical location.
:address
The street address listed for the contact.
Display:
{'hint': 'text'}
:place
The place associated with this contact.
:place:name
The reported name of the place associated with this contact.
:phone
The main phone number for this contact.
:phone:fax
The fax number for this contact.
:phone:work
The work phone number for this contact.
:id
strip:True
A type or source specific unique ID for the contact.
:id:number
An ID number issued by an org and associated with this contact.
alts:
('id:numbers',)
:adid
A Advertising ID associated with this contact.
:imid
An IMID associated with the contact.
:imid:imei
An IMEI associated with the contact.
:imid:imsi
An IMSI associated with the contact.
:names
An array of associated names/aliases for the person.
:orgnames
An array of associated names/aliases for the organization.
:emails
An array of secondary/associated email addresses.
:web:accts
Deprecated. Use :service:accounts.
Deprecated:
True
:id:numbers
An array of secondary/associated IDs.
:users
An array of secondary/associated user names.
:crypto:address
A crypto currency address associated with the contact.
:lang
The language specified for the contact.
alts:
('langs',)
:langs
type: lang:languageAn array of alternative languages specified for the contact.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
ps:contact:type:taxonomy
A taxonomy of contact types.
The base type for the form can be found at ps:contact:type:taxonomy.
- Properties:
name
type
doc
opts
:title
A brief title of the definition.
:summary
Deprecated. Please use title/desc.
Deprecated:True
Display:{'hint': 'text'}
:desc
A definition of the taxonomy entry.
Display:
{'hint': 'text'}
:sort
A display sort order for siblings.
:base
The base taxon.
Read Only:
True
:depth
The depth indexed from 0.
Read Only:
True
:parent
The taxonomy parent.
Read Only:
True
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
ps:contactlist
A GUID for a list of associated contacts.
The base type for the form can be found at ps:contactlist.
- Properties:
name
type
doc
opts
:contacts
The array of contacts contained in the list.
:source:host
The host from which the contact list was extracted.
:source:file
The file from which the contact list was extracted.
:source:acct
Deprecated. Use :source:account.
Deprecated:
True
:source:account
The service account from which the contact list was extracted.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
ps:education
A period of education for an individual.
The base type for the form can be found at ps:education.
- Properties:
name
type
doc
:student
The contact of the person being educated.
:institution
The contact info for the org providing educational services.
:attended:first
The first date the student attended a class.
:attended:last
The last date the student attended a class.
:classes
The classes attended by the student.
:achievement
The achievement awarded to the individual.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
ps:name
An arbitrary, lower spaced string with normalized whitespace.
The base type for the form can be found at ps:name.
An example of ps:name
:
robert grey
- Properties:
name
type
doc
:sur
The surname part of the name.
:middle
The middle name part of the name.
:given
The given name part of the name.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
ps:person
A GUID for a person.
The base type for the form can be found at ps:person.
- Properties:
name
type
doc
opts
:dob
The date on which the person was born.
:dod
The date on which the person died.
:img
Deprecated: use ps:person:photo.
Deprecated:
True
:photo
The primary image of a person.
:nick
A username commonly used by the person.
:vitals
The most recent known vitals for the person.
:name
The localized name for the person.
alts:
('names',)
:name:sur
The surname of the person.
:name:middle
The middle name of the person.
:name:given
The given name of the person.
:names
Variations of the name for the person.
:nicks
Usernames used by the person.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
ps:person:has
Deprecated. Please use ps:person -(has)>.
The base type for the form can be found at ps:person:has.
- Properties:
name
type
doc
opts
:person
The person who owns or controls the object or resource.
Read Only:
True
:node
The object or resource that is owned or controlled by the person.
Read Only:
True
:node:form
The form of the object or resource that is owned or controlled by the person.
Read Only:
True
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
ps:persona
Deprecated. Please use ps:contact.
The base type for the form can be found at ps:persona.
- Properties:
name
type
doc
:person
The real person behind the persona.
:dob
The Date of Birth (DOB) if known.
:img
The primary image of a suspected person.
:nick
A username commonly used by the suspected person.
:name
The localized name for the suspected person.
:name:sur
The surname of the suspected person.
:name:middle
The middle name of the suspected person.
:name:given
The given name of the suspected person.
:names
Variations of the name for a persona.
:nicks
Usernames used by the persona.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
ps:persona:has
Deprecated. Please use ps:contact -(has)>.
The base type for the form can be found at ps:persona:has.
- Properties:
name
type
doc
opts
:persona
The persona who owns or controls the object or resource.
Read Only:
True
:node
The object or resource that is owned or controlled by the persona.
Read Only:
True
:node:form
The form of the object or resource that is owned or controlled by the persona.
Read Only:
True
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
ps:proficiency
The assessment that a given contact possesses a specific skill.
The base type for the form can be found at ps:proficiency.
- Properties:
name
type
doc
:skill
The skill in which the contact is proficient.
:contact
The contact which is proficient in the skill.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
ps:skill
A specific skill which a person or organization may have.
The base type for the form can be found at ps:skill.
- Properties:
name
type
doc
:name
The name of the skill.
:type
The type of skill as a taxonomy.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
ps:skill:type:taxonomy
A taxonomy of skill types.
The base type for the form can be found at ps:skill:type:taxonomy.
- Properties:
name
type
doc
opts
:title
A brief title of the definition.
:summary
Deprecated. Please use title/desc.
Deprecated:True
Display:{'hint': 'text'}
:desc
A definition of the taxonomy entry.
Display:
{'hint': 'text'}
:sort
A display sort order for siblings.
:base
The base taxon.
Read Only:
True
:depth
The depth indexed from 0.
Read Only:
True
:parent
The taxonomy parent.
Read Only:
True
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
ps:tokn
A single name element (potentially given or sur).
The base type for the form can be found at ps:tokn.
An example of ps:tokn
:
robert
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
ps:vitals
Statistics and demographic data about a person or contact.
The base type for the form can be found at ps:vitals.
- Properties:
name
type
doc
:asof
The time the vitals were gathered or computed.
:contact
The contact that the vitals are about.
:person
The person that the vitals are about.
:height
The height of the person or contact.
:weight
The weight of the person or contact.
:econ:currency
The currency that the price values are recorded using.
:econ:net:worth
The net worth of the contact.
:econ:annual:income
The yearly income of the contact.
:phys:mass
The mass of the person.
:phys:volume
The cubed volume of the person.
:phys:length
The length of the person.
:phys:width
The width of the person.
:phys:height
The height of the person.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
ps:workhist
An entry in a contact’s work history.
The base type for the form can be found at ps:workhist.
- Properties:
name
type
doc
:contact
The contact which has the work history.
:org
The org that this work history orgname refers to.
:orgname
The reported name of the org the contact worked for.
:orgfqdn
The reported fqdn of the org the contact worked for.
:jobtype
The type of job.
:employment
The type of employment.
:jobtitle
The job title.
:started
The date that the contact began working.
:ended
The date that the contact stopped working.
:duration
The duration of the period of work.
:pay
The estimated/average yearly pay for the work.
:currency
The currency that the yearly pay was delivered in.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
risk:alert
An instance of an alert which indicates the presence of a risk.
The base type for the form can be found at risk:alert.
- Properties:
name
type
doc
opts
:type
A type for the alert, as a taxonomy entry.
:name
A brief name for the alert.
:desc
A free-form description / overview of the alert.
Display:
{'hint': 'text'}
:status
enums:((0, 'new'), (10, 'enrichment'), (20, 'todo'), (30, 'analysis'), (40, 'remediation'), (50, 'done'))
The status of the alert.
:benign
Set to true if the alert has been confirmed benign. Set to false if malicious.
:priority
A priority rank for the alert.
:severity
A severity rank for the alert.
:verdict
A verdict about why the alert is malicious or benign, as a taxonomy entry.
Example:
benign.false_positive
:assignee
The Synapse user who is assigned to investigate the alert.
:ext:assignee
The alert assignee contact information from an external system.
:engine
The software that generated the alert.
:detected
The time the alerted condition was detected.
:vuln
The optional vulnerability that the alert indicates.
:attack
A confirmed attack that this alert indicates.
:url
A URL which documents the alert.
:ext:id
An external identifier for the alert.
:host
The host which generated the alert.
:service:platform
The service platform which generated the alert.
:service:instance
The service instance which generated the alert.
:service:account
The service account which generated the alert.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
risk:alert:taxonomy
A taxonomy of alert types.
The base type for the form can be found at risk:alert:taxonomy.
- Properties:
name
type
doc
opts
:title
A brief title of the definition.
:summary
Deprecated. Please use title/desc.
Deprecated:True
Display:{'hint': 'text'}
:desc
A definition of the taxonomy entry.
Display:
{'hint': 'text'}
:sort
A display sort order for siblings.
:base
The base taxon.
Read Only:
True
:depth
The depth indexed from 0.
Read Only:
True
:parent
The taxonomy parent.
Read Only:
True
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
risk:alert:verdict:taxonomy
A taxonomy of verdicts for the origin and validity of the alert.
The base type for the form can be found at risk:alert:verdict:taxonomy.
- Properties:
name
type
doc
opts
:title
A brief title of the definition.
:summary
Deprecated. Please use title/desc.
Deprecated:True
Display:{'hint': 'text'}
:desc
A definition of the taxonomy entry.
Display:
{'hint': 'text'}
:sort
A display sort order for siblings.
:base
The base taxon.
Read Only:
True
:depth
The depth indexed from 0.
Read Only:
True
:parent
The taxonomy parent.
Read Only:
True
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
risk:attack
An instance of an actor attacking a target.
The base type for the form can be found at risk:attack.
- Properties:
name
type
doc
opts
:desc
A description of the attack.
Display:
{'hint': 'text'}
:type
A type for the attack, as a taxonomy entry.
Example:
cno.phishing
:reporter
The organization reporting on the attack.
:reporter:name
The name of the organization reporting on the attack.
:time
Set if the time of the attack is known.
:detected
The first confirmed detection time of the attack.
:success
Set if the attack was known to have succeeded or not.
:targeted
Set if the attack was assessed to be targeted or not.
:goal
The tactical goal of this specific attack.
:campaign
Set if the attack was part of a larger campaign.
:compromise
A compromise that this attack contributed to.
:severity
A severity rank for the attack.
:sophistication
The assessed sophistication of the attack.
:prev
The previous/parent attack in a list or hierarchy.
:actor:org
Deprecated. Please use :attacker to allow entity resolution.
Deprecated:
True
:actor:person
Deprecated. Please use :attacker to allow entity resolution.
Deprecated:
True
:attacker
Contact information representing the attacker.
:target
Deprecated. Please use -(targets)> light weight edges.
Deprecated:
True
:target:org
Deprecated. Please use -(targets)> light weight edges.
Deprecated:
True
:target:host
Deprecated. Please use -(targets)> light weight edges.
Deprecated:
True
:target:person
Deprecated. Please use -(targets)> light weight edges.
Deprecated:
True
:target:place
Deprecated. Please use -(targets)> light weight edges.
Deprecated:
True
:via:ipv4
Deprecated. Please use -(uses)> light weight edges.
Deprecated:
True
:via:ipv6
Deprecated. Please use -(uses)> light weight edges.
Deprecated:
True
:via:email
Deprecated. Please use -(uses)> light weight edges.
Deprecated:
True
:via:phone
Deprecated. Please use -(uses)> light weight edges.
Deprecated:
True
:used:vuln
Deprecated. Please use -(uses)> light weight edges.
Deprecated:
True
:used:url
Deprecated. Please use -(uses)> light weight edges.
Deprecated:
True
:used:host
Deprecated. Please use -(uses)> light weight edges.
Deprecated:
True
:used:email
Deprecated. Please use -(uses)> light weight edges.
Deprecated:
True
:used:file
Deprecated. Please use -(uses)> light weight edges.
Deprecated:
True
:used:server
Deprecated. Please use -(uses)> light weight edges.
Deprecated:
True
:used:software
Deprecated. Please use -(uses)> light weight edges.
Deprecated:
True
:techniques
Deprecated for scalability. Please use -(uses)> ou:technique.
Deprecated:
True
:url
A URL which documents the attack.
:ext:id
An external unique ID for the attack.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
risk:attack
-(caused)>
risk:outage
The attack caused the outage.
risk:attack
-(targets)>
ou:industry
The attack targeted the industry.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
ou:technique
The attacker used the technique in the attack.
risk:attack
-(uses)>
risk:vuln
The attack used the vulnerability.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
risk:attacktype
A taxonomy of attack types.
The base type for the form can be found at risk:attacktype.
- Properties:
name
type
doc
opts
:title
A brief title of the definition.
:summary
Deprecated. Please use title/desc.
Deprecated:True
Display:{'hint': 'text'}
:desc
A definition of the taxonomy entry.
Display:
{'hint': 'text'}
:sort
A display sort order for siblings.
:base
The base taxon.
Read Only:
True
:depth
The depth indexed from 0.
Read Only:
True
:parent
The taxonomy parent.
Read Only:
True
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
risk:availability
A taxonomy of availability status values.
The base type for the form can be found at risk:availability.
- Properties:
name
type
doc
opts
:title
A brief title of the definition.
:summary
Deprecated. Please use title/desc.
Deprecated:True
Display:{'hint': 'text'}
:desc
A definition of the taxonomy entry.
Display:
{'hint': 'text'}
:sort
A display sort order for siblings.
:base
The base taxon.
Read Only:
True
:depth
The depth indexed from 0.
Read Only:
True
:parent
The taxonomy parent.
Read Only:
True
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
risk:compromise
A compromise and its aggregate impact. The compromise is the result of a successful attack.
The base type for the form can be found at risk:compromise.
- Properties:
name
type
doc
opts
:name
A brief name for the compromise event.
:desc
A prose description of the compromise event.
Display:
{'hint': 'text'}
:reporter
The organization reporting on the compromise.
:reporter:name
The name of the organization reporting on the compromise.
:ext:id
An external unique ID for the compromise.
:url
A URL which documents the compromise.
:type
A type for the compromise, as a taxonomy entry.
Example:
cno.breach
:vector
The attack assessed to be the initial compromise vector.
:target
Contact information representing the target.
:attacker
Contact information representing the attacker.
:campaign
The campaign that this compromise is part of.
:time
Earliest known evidence of compromise.
:lasttime
Last known evidence of compromise.
:duration
The duration of the compromise.
:detected
The first confirmed detection time of the compromise.
:loss:pii
The number of records compromised which contain PII.
:loss:econ
The total economic cost of the compromise.
:loss:life
The total loss of life due to the compromise.
:loss:bytes
An estimate of the volume of data compromised.
:ransom:paid
The value of the ransom paid by the target.
:ransom:price
The value of the ransom demanded by the attacker.
:response:cost
The economic cost of the response and mitigation efforts.
:theft:price
The total value of the theft of assets.
:econ:currency
The currency type for the econ:price fields.
:severity
A severity rank for the compromise.
:goal
The assessed primary goal of the attacker for the compromise.
:goals
An array of assessed attacker goals for the compromise.
:techniques
Deprecated for scalability. Please use -(uses)> ou:technique.
Deprecated:
True
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:compromise
-(targets)>
ou:industry
The compromise was assessed to be based on the victim’s role in the industry.
risk:compromise
-(uses)>
ou:technique
The attacker used the technique in the compromise.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
risk:compromisetype
A taxonomy of compromise types.
The base type for the form can be found at risk:compromisetype.
An example of risk:compromisetype
:
cno.breach
- Properties:
name
type
doc
opts
:title
A brief title of the definition.
:summary
Deprecated. Please use title/desc.
Deprecated:True
Display:{'hint': 'text'}
:desc
A definition of the taxonomy entry.
Display:
{'hint': 'text'}
:sort
A display sort order for siblings.
:base
The base taxon.
Read Only:
True
:depth
The depth indexed from 0.
Read Only:
True
:parent
The taxonomy parent.
Read Only:
True
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
risk:extortion
An event where an attacker attempted to extort a victim.
The base type for the form can be found at risk:extortion.
- Properties:
name
type
doc
opts
:name
A name for the extortion event.
:desc
A description of the extortion event.
Display:
{'hint': 'text'}
:reporter
The organization reporting on the extortion event.
:reporter:name
The name of the organization reporting on the extortion event.
:demanded
The time that the attacker made their demands.
:deadline
The time that the demand must be met.
:goal
The goal of the attacker in extorting the victim.
:type
A type taxonomy for the extortion event.
:attacker
The extortion attacker identity.
:target
The extortion target identity.
:success
Set to true if the victim met the attacker’s demands.
:enacted
Set to true if attacker carried out the threat.
:public
Set to true if the attacker publicly announced the extortion.
:public:url
The URL where the attacker publicly announced the extortion.
:compromise
The compromise which allowed the attacker to extort the target.
:demanded:payment:price
The payment price which was demanded.
:demanded:payment:currency
The currency in which payment was demanded.
:paid:price
The total price paid by the target of the extortion.
:payments
Payments made from the target to the attacker.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:extortion
-(uses)>
ou:technique
The attacker used the technique to extort the victim.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
risk:extortion:type:taxonomy
A taxonomy of extortion event types.
The base type for the form can be found at risk:extortion:type:taxonomy.
- Properties:
name
type
doc
opts
:title
A brief title of the definition.
:summary
Deprecated. Please use title/desc.
Deprecated:True
Display:{'hint': 'text'}
:desc
A definition of the taxonomy entry.
Display:
{'hint': 'text'}
:sort
A display sort order for siblings.
:base
The base taxon.
Read Only:
True
:depth
The depth indexed from 0.
Read Only:
True
:parent
The taxonomy parent.
Read Only:
True
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
risk:hasvuln
Deprecated. Please use risk:vulnerable.
The base type for the form can be found at risk:hasvuln.
- Properties:
name
type
doc
:vuln
The vulnerability present in the target.
:person
The vulnerable person.
:org
The vulnerable org.
:place
The vulnerable place.
:software
The vulnerable software.
:hardware
The vulnerable hardware.
:spec
The vulnerable material specification.
:item
The vulnerable material item.
:host
The vulnerable host.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
risk:leak
An event where information was disclosed without permission.
The base type for the form can be found at risk:leak.
- Properties:
name
type
doc
opts
:name
A simple name for the leak event.
:desc
A description of the leak event.
Display:
{'hint': 'text'}
:reporter
The organization reporting on the leak event.
:reporter:name
The name of the organization reporting on the leak event.
:disclosed
The time the leaked information was disclosed.
:owner
The owner of the leaked information.
:leaker
The identity which leaked the information.
:recipient
The identity which received the leaked information.
:type
A type taxonomy for the leak.
:goal
The goal of the leaker in disclosing the information.
:compromise
The compromise which allowed the leaker access to the information.
:extortion
The extortion event which used the threat of the leak as leverage.
:public
Set to true if the leaked information was made publicly available.
:public:url
The URL where the leaked information was made publicly available.
:size:bytes
min:0
The total size of the leaked data in bytes.
:size:count
min:0
The number of files included in the leaked data.
:size:percent
The total percent of the data leaked.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
risk:leak
-(enabled)>
risk:leak
The source leak enabled the target leak to occur.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(enabled)>
risk:leak
None
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
risk:leak:type:taxonomy
A taxonomy of leak event types.
The base type for the form can be found at risk:leak:type:taxonomy.
- Properties:
name
type
doc
opts
:title
A brief title of the definition.
:summary
Deprecated. Please use title/desc.
Deprecated:True
Display:{'hint': 'text'}
:desc
A definition of the taxonomy entry.
Display:
{'hint': 'text'}
:sort
A display sort order for siblings.
:base
The base taxon.
Read Only:
True
:depth
The depth indexed from 0.
Read Only:
True
:parent
The taxonomy parent.
Read Only:
True
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
risk:mitigation
A mitigation for a specific risk:vuln.
The base type for the form can be found at risk:mitigation.
- Properties:
name
type
doc
opts
:vuln
The vulnerability that this mitigation addresses.
:name
A brief name for this risk mitigation.
:type
A taxonomy type entry for the mitigation.
:desc
A description of the mitigation approach for the vulnerability.
Display:
{'hint': 'text'}
:software
Deprecated. Please use risk:mitigation -(uses)> it:prod:softver.
Deprecated:
True
:hardware
Deprecated. Please use risk:mitigation -(uses)> it:prod:hardware.
Deprecated:
True
:reporter
The organization reporting on the mitigation.
:reporter:name
The name of the organization reporting on the mitigation.
:mitre:attack:mitigation
A mapping to a MITRE ATT&CK mitigation if applicable.
:tag
The tag used to annotate nodes which have the mitigation in place.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
risk:mitigation
-(addresses)>
ou:technique
The mitigation addresses the technique.
risk:mitigation
-(uses)>
meta:rule
The mitigation uses the rule.
risk:mitigation
-(uses)>
it:app:yara:rule
The mitigation uses the YARA rule.
risk:mitigation
-(uses)>
it:app:snort:rule
The mitigation uses the Snort rule.
risk:mitigation
-(uses)>
inet:service:rule
The mitigation uses the service rule.
risk:mitigation
-(uses)>
it:prod:softver
The mitigation uses the software version.
risk:mitigation
-(uses)>
it:prod:hardware
The mitigation uses the hardware.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
risk:mitigation:type:taxonomy
A taxonomy of mitigation types.
The base type for the form can be found at risk:mitigation:type:taxonomy.
- Properties:
name
type
doc
opts
:title
A brief title of the definition.
:summary
Deprecated. Please use title/desc.
Deprecated:True
Display:{'hint': 'text'}
:desc
A definition of the taxonomy entry.
Display:
{'hint': 'text'}
:sort
A display sort order for siblings.
:base
The base taxon.
Read Only:
True
:depth
The depth indexed from 0.
Read Only:
True
:parent
The taxonomy parent.
Read Only:
True
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
risk:outage
An outage event which affected resource availability.
The base type for the form can be found at risk:outage.
- Properties:
name
type
doc
opts
:name
A name for the outage event.
:period
The time period where the outage impacted availability.
:type
The type of outage.
Example:
service.power
:cause
The outage cause type.
Example:
nature.earthquake
:attack
An attack which caused the outage.
:provider
The organization which experienced the outage event.
:provider:name
The name of the organization which experienced the outage event.
:reporter
The organization reporting on the outage event.
:reporter:name
The name of the organization reporting on the outage event.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:event
-(caused)>
risk:outage
The event caused the outage.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(caused)>
risk:outage
The attack caused the outage.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
risk:outage:cause:taxonomy
An outage cause taxonomy.
The base type for the form can be found at risk:outage:cause:taxonomy.
- Properties:
name
type
doc
opts
:title
A brief title of the definition.
:summary
Deprecated. Please use title/desc.
Deprecated:True
Display:{'hint': 'text'}
:desc
A definition of the taxonomy entry.
Display:
{'hint': 'text'}
:sort
A display sort order for siblings.
:base
The base taxon.
Read Only:
True
:depth
The depth indexed from 0.
Read Only:
True
:parent
The taxonomy parent.
Read Only:
True
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
risk:outage:type:taxonomy
An outage type taxonomy.
The base type for the form can be found at risk:outage:type:taxonomy.
- Properties:
name
type
doc
opts
:title
A brief title of the definition.
:summary
Deprecated. Please use title/desc.
Deprecated:True
Display:{'hint': 'text'}
:desc
A definition of the taxonomy entry.
Display:
{'hint': 'text'}
:sort
A display sort order for siblings.
:base
The base taxon.
Read Only:
True
:depth
The depth indexed from 0.
Read Only:
True
:parent
The taxonomy parent.
Read Only:
True
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
risk:technique:masquerade
Represents the assessment that a node is designed to resemble another in order to mislead.
The base type for the form can be found at risk:technique:masquerade.
- Properties:
name
type
doc
:node
The node masquerading as another.
:period
The time period when the masquerading was active.
:target
The being masqueraded as.
:technique
The specific technique which describes the type of masquerading.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
risk:threat
A threat cluster or subgraph of threat activity, as reported by a specific organization.
The base type for the form can be found at risk:threat.
- Properties:
name
type
doc
opts
:name
A brief descriptive name for the threat cluster.
Example:
apt1 (mandiant)
:type
A type for the threat, as a taxonomy entry.
:desc
A description of the threat cluster.
:tag
The tag used to annotate nodes that are associated with the threat cluster.
:active
An interval for when the threat cluster is assessed to have been active.
:activity
The most recently assessed activity level of the threat cluster.
:reporter
The organization reporting on the threat cluster.
:reporter:name
The name of the organization reporting on the threat cluster.
:reporter:discovered
The time that the reporting organization first discovered the threat cluster.
:reporter:published
The time that the reporting organization first publicly disclosed the threat cluster.
:org
The authoritative organization for the threat cluster.
:org:loc
The reporting organization’s assessed location of the threat cluster.
:org:name
The reporting organization’s name for the threat cluster.
alts:('org:names',)
Example:apt1
:org:names
An array of alternate names for the threat cluster, according to the reporting organization.
:country
The reporting organization’s assessed country of origin of the threat cluster.
:country:code
The 2 digit ISO 3166 country code for the threat cluster’s assessed country of origin.
:goals
The reporting organization’s assessed goals of the threat cluster.
:sophistication
The reporting organization’s assessed sophistication of the threat cluster.
:techniques
Deprecated for scalability. Please use -(uses)> ou:technique.
Deprecated:
True
:merged:time
The time that the reporting organization merged this threat cluster into another.
:merged:isnow
The threat cluster that the reporting organization merged this cluster into.
:mitre:attack:group
A mapping to a MITRE ATT&CK group if applicable.
:ext:id
strip:True
An external identifier for the threat.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
risk:threat
-(targets)>
ou:industry
The threat cluster targets the industry.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
ou:technique
The threat cluster uses the technique.
risk:threat
-(uses)>
risk:vuln
The threat cluster uses the vulnerability.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
risk:threat:type:taxonomy
A taxonomy of threat types.
The base type for the form can be found at risk:threat:type:taxonomy.
- Properties:
name
type
doc
opts
:title
A brief title of the definition.
:summary
Deprecated. Please use title/desc.
Deprecated:True
Display:{'hint': 'text'}
:desc
A definition of the taxonomy entry.
Display:
{'hint': 'text'}
:sort
A display sort order for siblings.
:base
The base taxon.
Read Only:
True
:depth
The depth indexed from 0.
Read Only:
True
:parent
The taxonomy parent.
Read Only:
True
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
risk:tool:software
A software tool used in threat activity, as reported by a specific organization.
The base type for the form can be found at risk:tool:software.
- Properties:
name
type
doc
opts
:tag
The tag used to annotate nodes that are associated with the tool.
Example:
rep.mandiant.tabcteng
:desc
A description of the tool.
:type
A type for the tool, as a taxonomy entry.
:used
An interval for when the tool is assessed to have been deployed.
:availability
The reporting organization’s assessed availability of the tool.
:sophistication
The reporting organization’s assessed sophistication of the tool.
:reporter
The organization reporting on the tool.
:reporter:name
The name of the organization reporting on the tool.
:reporter:discovered
The time that the reporting organization first discovered the tool.
:reporter:published
The time that the reporting organization first publicly disclosed the tool.
:soft
The authoritative software family for the tool.
:soft:name
The reporting organization’s name for the tool.
alts:
('soft:names',)
:soft:names
An array of alternate names for the tool, according to the reporting organization.
:techniques
Deprecated for scalability. Please use -(uses)> ou:technique.
Deprecated:
True
:mitre:attack:software
A mapping to a MITRE ATT&CK software if applicable.
:id
strip:True
An ID for the tool.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
risk:tool:software
-(uses)>
math:algorithm
The tool uses the algorithm.
risk:tool:software
-(uses)>
ou:technique
The tool uses the technique.
risk:tool:software
-(uses)>
risk:vuln
The tool uses the vulnerability.
risk:tool:software
-(uses)>
*
The tool uses the target node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
risk:tool:software:taxonomy
A taxonomy of software / tool types.
The base type for the form can be found at risk:tool:software:taxonomy.
- Properties:
name
type
doc
opts
:title
A brief title of the definition.
:summary
Deprecated. Please use title/desc.
Deprecated:True
Display:{'hint': 'text'}
:desc
A definition of the taxonomy entry.
Display:
{'hint': 'text'}
:sort
A display sort order for siblings.
:base
The base taxon.
Read Only:
True
:depth
The depth indexed from 0.
Read Only:
True
:parent
The taxonomy parent.
Read Only:
True
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
risk:vuln
A unique vulnerability.
The base type for the form can be found at risk:vuln.
- Properties:
name
type
doc
opts
:name
A user specified name for the vulnerability.
alts:
('names',)
:names
An array of alternate names for the vulnerability.
:type
A taxonomy type entry for the vulnerability.
:desc
A description of the vulnerability.
Display:
{'hint': 'text'}
:severity
The severity of the vulnerability.
:priority
The priority of the vulnerability.
:reporter
The organization reporting on the vulnerability.
:reporter:name
The name of the organization reporting on the vulnerability.
:mitigated
Set to true if a mitigation/fix is available for the vulnerability.
:exploited
Set to true if the vulnerability has been exploited in the wild.
:timeline:discovered
ismin:True
The earliest known discovery time for the vulnerability.
:timeline:published
ismin:True
The earliest known time the vulnerability was published.
:timeline:vendor:notified
ismin:True
The earliest known vendor notification time for the vulnerability.
:timeline:vendor:fixed
ismin:True
The earliest known time the vendor issued a fix for the vulnerability.
:timeline:exploited
ismin:True
The earliest known time when the vulnerability was exploited in the wild.
:id
strip:True
An identifier for the vulnerability.
:tag
A tag used to annotate the presence or use of the vulnerability.
:cve
The CVE ID of the vulnerability.
:cve:desc
The description of the vulnerability according to the CVE database.
Display:
{'hint': 'text'}
:cve:url
A URL linking this vulnerability to the CVE description.
:cve:references
An array of documentation URLs provided by the CVE database.
:nist:nvd:source
Deprecated. Please use it:sec:cve:nist:nvd:source.
Deprecated:
True
:nist:nvd:published
Deprecated. Please use it:sec:cve:nist:nvd:published.
Deprecated:
True
:nist:nvd:modified
ismax:True
Deprecated. Please use it:sec:cve:nist:nvd:modified.
Deprecated:
True
:cisa:kev:name
Deprecated. Please use it:sec:cve:cisa:kev:name.
Deprecated:
True
:cisa:kev:desc
Deprecated. Please use it:sec:cve:cisa:kev:desc.
Deprecated:
True
:cisa:kev:action
Deprecated. Please use it:sec:cve:cisa:kev:action.
Deprecated:
True
:cisa:kev:vendor
Deprecated. Please use it:sec:cve:cisa:kev:vendor.
Deprecated:
True
:cisa:kev:product
Deprecated. Please use it:sec:cve:cisa:kev:product.
Deprecated:
True
:cisa:kev:added
Deprecated. Please use it:sec:cve:cisa:kev:added.
Deprecated:
True
:cisa:kev:duedate
Deprecated. Please use it:sec:cve:cisa:kev:duedate.
Deprecated:
True
:cvss:v2
The CVSS v2 vector for the vulnerability.
:cvss:v2_0:score
The CVSS v2.0 overall score for the vulnerability.
:cvss:v2_0:score:base
The CVSS v2.0 base score for the vulnerability.
:cvss:v2_0:score:temporal
The CVSS v2.0 temporal score for the vulnerability.
:cvss:v2_0:score:environmental
The CVSS v2.0 environmental score for the vulnerability.
:cvss:v3
The CVSS v3 vector for the vulnerability.
:cvss:v3_0:score
The CVSS v3.0 overall score for the vulnerability.
:cvss:v3_0:score:base
The CVSS v3.0 base score for the vulnerability.
:cvss:v3_0:score:temporal
The CVSS v3.0 temporal score for the vulnerability.
:cvss:v3_0:score:environmental
The CVSS v3.0 environmental score for the vulnerability.
:cvss:v3_1:score
The CVSS v3.1 overall score for the vulnerability.
:cvss:v3_1:score:base
The CVSS v3.1 base score for the vulnerability.
:cvss:v3_1:score:temporal
The CVSS v3.1 temporal score for the vulnerability.
:cvss:v3_1:score:environmental
The CVSS v3.1 environmental score for the vulnerability.
:cvss:av
enums:N,A,P,L
Deprecated. Please use :cvss:v3.
Deprecated:
True
:cvss:ac
enums:L,H
Deprecated. Please use :cvss:v3.
Display:{'enums': (('Low', 'L'), ('High', 'H'))}
Deprecated:True
:cvss:pr
enums:N,L,H
Deprecated. Please use :cvss:v3.
Display:{'enums': ({'title': 'None', 'value': 'N', 'doc': 'FIXME privs stuff'}, {'title': 'Low', 'value': 'L', 'doc': 'FIXME privs stuff'}, {'title': 'High', 'value': 'H', 'doc': 'FIXME privs stuff'})}
Deprecated:True
:cvss:ui
enums:N,R
Deprecated. Please use :cvss:v3.
Deprecated:
True
:cvss:s
enums:U,C
Deprecated. Please use :cvss:v3.
Deprecated:
True
:cvss:c
enums:N,L,H
Deprecated. Please use :cvss:v3.
Deprecated:
True
:cvss:i
enums:N,L,H
Deprecated. Please use :cvss:v3.
Deprecated:
True
:cvss:a
enums:N,L,H
Deprecated. Please use :cvss:v3.
Deprecated:
True
:cvss:e
enums:X,U,P,F,H
Deprecated. Please use :cvss:v3.
Deprecated:
True
:cvss:rl
enums:X,O,T,W,U
Deprecated. Please use :cvss:v3.
Deprecated:
True
:cvss:rc
enums:X,U,R,C
Deprecated. Please use :cvss:v3.
Deprecated:
True
:cvss:mav
enums:X,N,A,L,P
Deprecated. Please use :cvss:v3.
Deprecated:
True
:cvss:mac
enums:X,L,H
Deprecated. Please use :cvss:v3.
Deprecated:
True
:cvss:mpr
enums:X,N,L,H
Deprecated. Please use :cvss:v3.
Deprecated:
True
:cvss:mui
enums:X,N,R
Deprecated. Please use :cvss:v3.
Deprecated:
True
:cvss:ms
enums:X,U,C
Deprecated. Please use :cvss:v3.
Deprecated:
True
:cvss:mc
enums:X,N,L,H
Deprecated. Please use :cvss:v3.
Deprecated:
True
:cvss:mi
enums:X,N,L,H
Deprecated. Please use :cvss:v3.
Deprecated:
True
:cvss:ma
enums:X,N,L,H
Deprecated. Please use :cvss:v3.
Deprecated:
True
:cvss:cr
enums:X,L,M,H
Deprecated. Please use :cvss:v3.
Deprecated:
True
:cvss:ir
enums:X,L,M,H
Deprecated. Please use :cvss:v3.
Deprecated:
True
:cvss:ar
enums:X,L,M,H
Deprecated. Please use :cvss:v3.
Deprecated:
True
:cvss:score
Deprecated. Please use version specific score properties.
Deprecated:
True
:cvss:score:base
Deprecated. Please use version specific score properties.
Deprecated:
True
:cvss:score:temporal
Deprecated. Please use version specific score properties.
Deprecated:
True
:cvss:score:environmental
Deprecated. Please use version specific score properties.
Deprecated:
True
:cwes
An array of MITRE CWE values that apply to the vulnerability.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
risk:vuln
-(uses)>
ou:technique
The vulnerability uses the technique.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
it:prod:soft
-(uses)>
risk:vuln
The software uses the vulnerability.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
ou:technique
-(uses)>
risk:vuln
The technique uses the vulnerability.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
risk:vuln
The attack used the vulnerability.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
risk:vuln
The threat cluster uses the vulnerability.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
risk:vuln
The tool uses the vulnerability.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
risk:vuln:soft:range
A contiguous range of software versions which contain a vulnerability.
The base type for the form can be found at risk:vuln:soft:range.
- Properties:
name
type
doc
:vuln
The vulnerability present in this software version range.
:version:min
The minimum version which is vulnerable in this range.
:version:max
The maximum version which is vulnerable in this range.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
risk:vuln:type:taxonomy
A taxonomy of vulnerability types.
The base type for the form can be found at risk:vuln:type:taxonomy.
- Properties:
name
type
doc
opts
:title
A brief title of the definition.
:summary
Deprecated. Please use title/desc.
Deprecated:True
Display:{'hint': 'text'}
:desc
A definition of the taxonomy entry.
Display:
{'hint': 'text'}
:sort
A display sort order for siblings.
:base
The base taxon.
Read Only:
True
:depth
The depth indexed from 0.
Read Only:
True
:parent
The taxonomy parent.
Read Only:
True
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
risk:vulnerable
Indicates that a node is susceptible to a vulnerability.
The base type for the form can be found at risk:vulnerable.
- Properties:
name
type
doc
:vuln
The vulnerability that the node is susceptible to.
:technique
The technique that the node is susceptible to.
:period
The time window where the node was vulnerable.
:node
The node which is vulnerable.
:mitigated
Set to true if the vulnerable node has been mitigated.
:mitigations
The mitigations which were used to address the vulnerable node.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
risk:vulnname
A vulnerability name such as log4j or rowhammer.
The base type for the form can be found at risk:vulnname.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
rsa:key
An RSA keypair modulus and public exponent.
The base type for the form can be found at rsa:key.
- Properties:
name
type
doc
opts
:mod
The RSA key modulus.
Read Only:
True
:pub:exp
The public exponent of the key.
Read Only:
True
:bits
The length of the modulus in bits.
:priv:exp
The private exponent of the key.
:priv:p
One of the two private primes.
:priv:q
One of the two private primes.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
sci:evidence
An assessment of how an observation supports or refutes a hypothesis.
The base type for the form can be found at sci:evidence.
- Properties:
name
type
doc
opts
:hypothesis
The hypothesis which the evidence supports or refutes.
:observation
The observation which supports or refutes the hypothesis.
:summary
A summary of how the observation supports or refutes the hypothesis.
Display:
{'hint': 'text'}
:refutes
Set to true if the evidence refutes the hypothesis or false if it supports the hypothesis.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
sci:experiment
An instance of running an experiment.
The base type for the form can be found at sci:experiment.
- Properties:
name
type
doc
opts
:name
The name of the experiment.
:summary
A summary of the experiment.
Display:
{'hint': 'text'}
:time
The time when the experiment was initiated.
:type
The type of experiment as a user defined taxonomy.
:window
The time window where the experiment was run.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
sci:experiment:type:taxonomy
A taxonomy of experiment types.
The base type for the form can be found at sci:experiment:type:taxonomy.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
sci:hypothesis
A hypothesis or theory.
The base type for the form can be found at sci:hypothesis.
- Properties:
name
type
doc
opts
:name
The name of the hypothesis.
:type
The type of hypothesis as a user defined taxonomy.
:summary
A summary of the hypothesis.
Display:
{'hint': 'text'}
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
sci:hypothesis:type:taxonomy
A taxonomy of hypothesis types.
The base type for the form can be found at sci:hypothesis:type:taxonomy.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
sci:observation
An observation which may have resulted from an experiment.
The base type for the form can be found at sci:observation.
- Properties:
name
type
doc
opts
:experiment
The experiment which produced the observation.
:summary
A summary of the observation.
Display:
{'hint': 'text'}
:time
The time that the observation occurred.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
syn:cmd
A Synapse storm command.
The base type for the form can be found at syn:cmd.
- Properties:
name
type
doc
opts
:doc
strip:True
Description of the command.
Display:
{'hint': 'text'}
:package
strip:True
Storm package which provided the command.
:svciden
strip:True
Storm service iden which provided the package.
:input
The list of forms accepted by the command as input.
Deprecated:True
uniq:True
sorted:True
Read Only:True
:output
The list of forms produced by the command as output.
Deprecated:True
uniq:True
sorted:True
Read Only:True
:nodedata
type: syn:nodedataThe list of nodedata that may be added by the command.
Deprecated:True
uniq:True
sorted:True
Read Only:True
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
syn:cron
A Cortex cron job.
The base type for the form can be found at syn:cron.
- Properties:
name
type
doc
opts
:doc
A description of the cron job.
Display:
{'hint': 'text'}
:name
A user friendly name/alias for the cron job.
:storm
The storm query executed by the cron job.
Read Only:True
Display:{'hint': 'text'}
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
syn:form
A Synapse form used for representing nodes in the graph.
The base type for the form can be found at syn:form.
- Properties:
name
type
doc
opts
:doc
strip:True
The docstring for the form.
Read Only:
True
:type
Synapse type for this form.
Read Only:
True
:runt
Whether or not the form is runtime only.
Read Only:
True
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
syn:prop
A Synapse property.
The base type for the form can be found at syn:prop.
- Properties:
name
type
doc
opts
:doc
strip:True
Description of the property definition.
:form
The form of the property.
Read Only:
True
:type
The synapse type for this property.
Read Only:
True
:relname
strip:True
Relative property name.
Read Only:
True
:univ
Specifies if a prop is universal.
Read Only:
True
:base
strip:True
Base name of the property.
Read Only:
True
:ro
If the property is read-only after being set.
Read Only:
True
:extmodel
If the property is an extended model property or not.
Read Only:
True
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
syn:tag
The base type for a synapse tag.
The base type for the form can be found at syn:tag.
- Properties:
name
type
doc
opts
:up
The parent tag for the tag.
Read Only:
True
:isnow
Set to an updated tag if the tag has been renamed.
:doc
A short definition for the tag.
Display:
{'hint': 'text'}
:doc:url
A URL link to additional documentation about the tag.
:depth
How deep the tag is in the hierarchy.
Read Only:
True
:title
A display title for the tag.
:base
The tag base name. Eg baz for foo.bar.baz .
Read Only:
True
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
syn:tagprop
A user defined tag property.
The base type for the form can be found at syn:tagprop.
- Properties:
name
type
doc
opts
:doc
strip:True
Description of the tagprop definition.
:type
The synapse type for this tagprop.
Read Only:
True
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
syn:trigger
A Cortex trigger.
The base type for the form can be found at syn:trigger.
- Properties:
name
type
doc
opts
:vers
Trigger version.
Read Only:
True
:doc
A documentation string describing the trigger.
Display:
{'hint': 'text'}
:name
A user friendly name/alias for the trigger.
:cond
The trigger condition.
Read Only:
True
:user
User who owns the trigger.
Read Only:
True
:storm
The Storm query for the trigger.
Read Only:True
Display:{'hint': 'text'}
:enabled
Trigger enabled status.
Read Only:
True
:form
Form the trigger is watching for.
:verb
Edge verb the trigger is watching for.
:n2form
N2 form the trigger is watching for.
:prop
Property the trigger is watching for.
:tag
Tag the trigger is watching for.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
syn:type
A Synapse type used for normalizing nodes and properties.
The base type for the form can be found at syn:type.
- Properties:
name
type
doc
opts
:doc
strip:True
The docstring for the type.
Read Only:
True
:ctor
strip:True
The python ctor path for the type object.
Read Only:
True
:subof
Type which this inherits from.
Read Only:
True
:opts
Arbitrary type options.
Read Only:
True
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
tel:call
A guid for a telephone call record.
The base type for the form can be found at tel:call.
- Properties:
name
type
doc
opts
:src
The source phone number for a call.
:dst
The destination phone number for a call.
:time
The time the call was initiated.
:duration
The duration of the call in seconds.
:connected
Indicator of whether the call was connected.
:text
The text transcription of the call.
Display:
{'hint': 'text'}
:file
A file containing related media.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
tel:mob:carrier
The fusion of a MCC/MNC.
The base type for the form can be found at tel:mob:carrier.
- Properties:
name
type
doc
opts
:mcc
ITU Mobile Country Code.
Read Only:
True
:mnc
ITU Mobile Network Code.
Read Only:
True
:org
Organization operating the carrier.
:loc
Location the carrier operates from.
:tadig
The TADIG code issued to the carrier.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
tel:mob:cell
A mobile cell site which a phone may connect to.
The base type for the form can be found at tel:mob:cell.
- Properties:
name
type
doc
opts
:carrier
Mobile carrier.
Read Only:
True
:carrier:mcc
Mobile Country Code.
Read Only:
True
:carrier:mnc
Mobile Network Code.
Read Only:
True
:lac
Location Area Code. LTE networks may call this a TAC.
Read Only:
True
:cid
The Cell ID.
Read Only:
True
:radio
Cell radio type.
:latlong
Last known location of the cell site.
:loc
Location at which the cell is operated.
:place
The place associated with the latlong property.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
tel:mob:imei
An International Mobile Equipment Id.
The base type for the form can be found at tel:mob:imei.
An example of tel:mob:imei
:
490154203237518
- Properties:
name
type
doc
opts
:tac
The Type Allocate Code within the IMEI.
Read Only:
True
:serial
The serial number within the IMEI.
Read Only:
True
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
tel:mob:imid
Fused knowledge of an IMEI/IMSI used together.
The base type for the form can be found at tel:mob:imid.
An example of tel:mob:imid
:
(490154203237518, 310150123456789)
- Properties:
name
type
doc
opts
:imei
The IMEI for the phone hardware.
Read Only:
True
:imsi
The IMSI for the phone subscriber.
Read Only:
True
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
tel:mob:imsi
An International Mobile Subscriber Id.
The base type for the form can be found at tel:mob:imsi.
An example of tel:mob:imsi
:
310150123456789
- Properties:
name
type
doc
opts
:mcc
The Mobile Country Code.
Read Only:
True
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
tel:mob:imsiphone
Fused knowledge of an IMSI assigned phone number.
The base type for the form can be found at tel:mob:imsiphone.
An example of tel:mob:imsiphone
:
(310150123456789, "+7(495) 124-59-83")
- Properties:
name
type
doc
opts
:phone
The phone number assigned to the IMSI.
Read Only:
True
:imsi
The IMSI with the assigned phone number.
Read Only:
True
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
tel:mob:mcc
ITU Mobile Country Code.
The base type for the form can be found at tel:mob:mcc.
- Properties:
name
type
doc
:loc
Location assigned to the MCC.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
tel:mob:tac
A mobile Type Allocation Code.
The base type for the form can be found at tel:mob:tac.
An example of tel:mob:tac
:
49015420
- Properties:
name
type
doc
:org
The org guid for the manufacturer.
:manu
lower:1
The TAC manufacturer name.
:model
lower:1
The TAC model name.
:internal
lower:1
The TAC internal model name.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
tel:mob:tadig
A Transferred Account Data Interchange Group number issued to a GSM carrier.
The base type for the form can be found at tel:mob:tadig.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
tel:mob:telem
A single mobile telemetry measurement.
The base type for the form can be found at tel:mob:telem.
- Properties:
name
type
doc
opts
:time
A date/time value.
:latlong
A Lat/Long string specifying a point on Earth.
:http:request
The HTTP request that the telemetry was extracted from.
:host
The host that generated the mobile telemetry data.
:place
The place representing the location of the mobile telemetry sample.
:loc
The geo-political location of the mobile telemetry sample.
:accuracy
The reported accuracy of the latlong telemetry reading.
:cell
A mobile cell site which a phone may connect to.
:cell:carrier
The fusion of a MCC/MNC.
:imsi
An International Mobile Subscriber Id.
:imei
An International Mobile Equipment Id.
:phone
A phone number.
:mac
A 48-bit Media Access Control (MAC) address.
:ipv4
An IPv4 address.
:ipv6
An IPv6 address.
:wifi
An SSID/MAC address combination for a wireless access point.
:wifi:ssid
A WiFi service set identifier (SSID) name.
:wifi:bssid
A 48-bit Media Access Control (MAC) address.
:adid
The advertising ID of the mobile telemetry sample.
:aaid
Deprecated. Please use :adid.
Deprecated:
True
:idfa
Deprecated. Please use :adid.
Deprecated:
True
:name
An arbitrary, lower spaced string with normalized whitespace.
An e-mail address.
:acct
Deprecated, use :account.
Deprecated:
True
:account
The service account which is associated with the tracked device.
:app
A specific version of a software product.
:data
Arbitrary json compatible data.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
tel:phone
A phone number.
The base type for the form can be found at tel:phone.
An example of tel:phone
:
+15558675309
- Properties:
name
type
doc
:type
The type of phone number.
:loc
The location associated with the number.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
tel:phone:type:taxonomy
A taxonomy of phone number types.
The base type for the form can be found at tel:phone:type:taxonomy.
- Properties:
name
type
doc
opts
:title
A brief title of the definition.
:summary
Deprecated. Please use title/desc.
Deprecated:True
Display:{'hint': 'text'}
:desc
A definition of the taxonomy entry.
Display:
{'hint': 'text'}
:sort
A display sort order for siblings.
:base
The base taxon.
Read Only:
True
:depth
The depth indexed from 0.
Read Only:
True
:parent
The taxonomy parent.
Read Only:
True
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
tel:txtmesg
A guid for an individual text message.
The base type for the form can be found at tel:txtmesg.
- Properties:
name
type
doc
opts
:from
The phone number assigned to the sender.
:to
The phone number assigned to the primary recipient.
:recipients
An array of phone numbers for additional recipients of the message.
:svctype
The message service type (sms, mms, rcs).
:time
The time the message was sent.
:text
The text of the message.
Display:
{'hint': 'text'}
:file
A file containing related media.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
transport:air:craft
An individual aircraft.
The base type for the form can be found at transport:air:craft.
- Properties:
name
type
doc
opts
:tailnum
The aircraft tail number.
:type
The type of aircraft.
:make
Deprecated. Please use :manufacturer:name.
Deprecated:
True
:operator
The contact information of the operator of the aircraft.
:built
The date when the aircraft was built.
:manufacturer
The organization which manufactured the aircraft.
:manufacturer:name
The name of the organization which manufactured the aircraft.
:model
The model of the aircraft.
:serial
strip:True
The manufacturer assigned serial number of the aircraft.
:max:occupants
min:0
The maximum number of occupants the aircraft can hold.
:max:cargo:mass
The maximum mass the aircraft can carry as cargo.
:max:cargo:volume
The maximum volume the aircraft can carry as cargo.
:owner
The contact information of the owner of the aircraft.
:phys:mass
The mass of the aircraft.
:phys:volume
The cubed volume of the aircraft.
:phys:length
The length of the aircraft.
:phys:width
The width of the aircraft.
:phys:height
The height of the aircraft.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
transport:air:flight
An individual instance of a flight.
The base type for the form can be found at transport:air:flight.
- Properties:
name
type
doc
opts
:num
The flight number of this flight.
:tailnum
The tail/registration number at the time the aircraft flew this flight.
:cancelled
Deprecated. Please use :status.
Deprecated:
True
:carrier
Deprecated. Please use :operator.
Deprecated:
True
:craft
Deprecated. Please use :vehicle.
Deprecated:
True
:to:port
Deprecated. Please use :arrival:place.
Deprecated:
True
:from:port
Deprecated. Please use :departure:place.
Deprecated:
True
:stops
type: transport:air:portDeprecated. Please use transport:stop.
Deprecated:
True
:status
enums:scheduled,cancelled,in-progress,completed,aborted,failed,unknown
The status of the flight.
:occupants
min:0
The number of occupants of the aircraft on this flight.
:cargo:mass
The cargo mass carried by the aircraft on this flight.
:cargo:volume
The cargo volume carried by the aircraft on this flight.
:operator
The contact information of the operator of the flight.
:vehicle
The aircraft which traveled the flight.
:duration
The actual duration.
:departed
The actual departure time.
:departed:place
The actual departure airport.
:departed:point
The actual departure gate.
:arrived
The actual arrival time.
:arrived:place
The actual arrival airport.
:arrived:point
The actual arrival gate.
:scheduled:duration
The scheduled duration.
:scheduled:departure
The scheduled departure time.
:scheduled:departure:place
The scheduled departure airport.
:scheduled:departure:point
The scheduled departure gate.
:scheduled:arrival
The scheduled arrival time.
:scheduled:arrival:place
The scheduled arrival airport.
:scheduled:arrival:point
The scheduled arrival gate.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
transport:air:flightnum
A commercial flight designator including airline and serial.
The base type for the form can be found at transport:air:flightnum.
An example of transport:air:flightnum
:
ua2437
- Properties:
name
type
doc
:carrier
The org which operates the given flight number.
:to:port
The most recently registered destination for the flight number.
:from:port
The most recently registered origin for the flight number.
:stops
type: transport:air:portAn ordered list of aiport codes for the flight segments.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
transport:air:occupant
Deprecated. Please use transport:occupant.
The base type for the form can be found at transport:air:occupant.
- Properties:
name
type
doc
opts
:type
lower:True
Deprecated. Please use transport:occupant.
Deprecated:
True
:flight
Deprecated. Please use transport:occupant.
Deprecated:
True
:seat
lower:True
Deprecated. Please use transport:occupant.
Deprecated:
True
:contact
Deprecated. Please use transport:occupant.
Deprecated:
True
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
transport:air:port
An IATA assigned airport code.
The base type for the form can be found at transport:air:port.
- Properties:
name
type
doc
:name
The name of the airport.
:place
The place where the IATA airport code is assigned.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
transport:air:tailnum
An aircraft registration number or military aircraft serial number.
The base type for the form can be found at transport:air:tailnum.
An example of transport:air:tailnum
:
ff023
- Properties:
name
type
doc
:loc
The geopolitical location that the tailnumber is allocated to.
:type
A type which may be specific to the country prefix.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
transport:air:telem
A telemetry sample from an aircraft in transit.
The base type for the form can be found at transport:air:telem.
- Properties:
name
type
doc
:flight
The flight being measured.
:latlong
The lat/lon of the aircraft at the time.
:loc
The location of the aircraft at the time.
:place
The place that the lat/lon geocodes to.
:accuracy
The horizontal accuracy of the latlong sample.
:course
The direction, in degrees from true North, that the aircraft is traveling.
:heading
The direction, in degrees from true North, that the nose of the aircraft is pointed.
:speed
The ground speed of the aircraft at the time.
:airspeed
The air speed of the aircraft at the time.
:verticalspeed
relative:True
The relative vertical speed of the aircraft at the time.
:altitude
The altitude of the aircraft at the time.
:altitude:accuracy
The vertical accuracy of the altitude measurement.
:time
The time the telemetry sample was taken.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
transport:cargo
Cargo being carried by a vehicle on a trip.
The base type for the form can be found at transport:cargo.
- Properties:
name
type
doc
:object
The physical object being transported.
:trip
The trip being taken by the cargo.
:vehicle
The vehicle used to transport the cargo.
:container
The container in which the cargo was shipped.
:loaded
The time when the cargo was loaded.
:loaded:place
The place where the cargo was loaded.
:loaded:point
The point where the cargo was loaded such as an airport gate or train platform.
:unloaded
The time when the cargo was unloaded.
:unloaded:place
The place where the cargo was unloaded.
:unloaded:point
The point where the cargo was unloaded such as an airport gate or train platform.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
transport:land:drive
A drive taken by a land vehicle.
The base type for the form can be found at transport:land:drive.
- Properties:
name
type
doc
:status
enums:scheduled,cancelled,in-progress,completed,aborted,failed,unknown
The status of the drive.
:occupants
min:0
The number of occupants of the vehicle on this drive.
:cargo:mass
The cargo mass carried by the vehicle on this drive.
:cargo:volume
The cargo volume carried by the vehicle on this drive.
:operator
The contact information of the operator of the drive.
:vehicle
The vehicle which traveled the drive.
:duration
The actual duration.
:departed
The actual departure time.
:departed:place
The actual departure place.
:departed:point
The actual departure point.
:arrived
The actual arrival time.
:arrived:place
The actual arrival place.
:arrived:point
The actual arrival point.
:scheduled:duration
The scheduled duration.
:scheduled:departure
The scheduled departure time.
:scheduled:departure:place
The scheduled departure place.
:scheduled:departure:point
The scheduled departure point.
:scheduled:arrival
The scheduled arrival time.
:scheduled:arrival:place
The scheduled arrival place.
:scheduled:arrival:point
The scheduled arrival point.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
transport:land:license
A license to operate a land vehicle issued to a contact.
The base type for the form can be found at transport:land:license.
- Properties:
name
type
doc
:id
strip:True
The license ID.
:contact
The contact info of the licensee.
:issued
The time the license was issued.
:expires
The time the license expires.
:issuer
The org which issued the license.
:issuer:name
The name of the org which issued the license.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
transport:land:registration
Registration issued to a contact for a land vehicle.
The base type for the form can be found at transport:land:registration.
- Properties:
name
type
doc
:id
strip:True
The vehicle registration ID or license plate.
:contact
The contact info of the registrant.
:license
The license used to register the vehicle.
:issued
The time the vehicle registration was issued.
:expires
The time the vehicle registration expires.
:vehicle
The vehicle being registered.
:issuer
The org which issued the registration.
:issuer:name
The name of the org which issued the registration.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
transport:land:vehicle
An individual land based vehicle.
The base type for the form can be found at transport:land:vehicle.
- Properties:
name
type
doc
opts
:type
The type of land vehicle.
:desc
A description of the vehicle.
:serial
strip:True
The serial number or VIN of the vehicle.
:make
Deprecated. Please use :manufacturer:name.
Deprecated:
True
:registration
The current vehicle registration information.
:operator
The contact information of the operator of the vehicle.
:built
The date when the vehicle was built.
:manufacturer
The organization which manufactured the vehicle.
:manufacturer:name
The name of the organization which manufactured the vehicle.
:model
The model of the vehicle.
:max:occupants
min:0
The maximum number of occupants the vehicle can hold.
:max:cargo:mass
The maximum mass the vehicle can carry as cargo.
:max:cargo:volume
The maximum volume the vehicle can carry as cargo.
:owner
The contact information of the owner of the vehicle.
:phys:mass
The mass of the vehicle.
:phys:volume
The cubed volume of the vehicle.
:phys:length
The length of the vehicle.
:phys:width
The width of the vehicle.
:phys:height
The height of the vehicle.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
transport:land:vehicle:type:taxonomy
A type taxonomy for land vehicles.
The base type for the form can be found at transport:land:vehicle:type:taxonomy.
- Properties:
name
type
doc
opts
:title
A brief title of the definition.
:summary
Deprecated. Please use title/desc.
Deprecated:True
Display:{'hint': 'text'}
:desc
A definition of the taxonomy entry.
Display:
{'hint': 'text'}
:sort
A display sort order for siblings.
:base
The base taxon.
Read Only:
True
:depth
The depth indexed from 0.
Read Only:
True
:parent
The taxonomy parent.
Read Only:
True
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
transport:occupant
An occupant of a vehicle on a trip.
The base type for the form can be found at transport:occupant.
- Properties:
name
type
doc
:role
The role of the occupant such as captain, crew, passenger.
:contact
Contact information of the occupant.
:trip
The trip, such as a flight or train ride, being taken by the occupant.
:vehicle
The vehicle that transported the occupant.
:seat
strip:True
The seat which the occupant sat in. Likely in a vehicle specific format.
:boarded
The time when the occupant boarded the vehicle.
:boarded:place
The place where the occupant boarded the vehicle.
:boarded:point
The boarding point such as an airport gate or train platform.
:disembarked
The time when the occupant disembarked from the vehicle.
:disembarked:place
The place where the occupant disembarked the vehicle.
:disembarked:point
The disembarkation point such as an airport gate or train platform.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
transport:occupant:role:taxonomy
A taxonomy of transportation occupant roles.
The base type for the form can be found at transport:occupant:role:taxonomy.
- Properties:
name
type
doc
opts
:title
A brief title of the definition.
:summary
Deprecated. Please use title/desc.
Deprecated:True
Display:{'hint': 'text'}
:desc
A definition of the taxonomy entry.
Display:
{'hint': 'text'}
:sort
A display sort order for siblings.
:base
The base taxon.
Read Only:
True
:depth
The depth indexed from 0.
Read Only:
True
:parent
The taxonomy parent.
Read Only:
True
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
transport:rail:car
An individual train car.
The base type for the form can be found at transport:rail:car.
- Properties:
name
type
doc
:type
The type of rail car.
:built
The date when the train car was built.
:manufacturer
The organization which manufactured the train car.
:manufacturer:name
The name of the organization which manufactured the train car.
:model
The model of the train car.
:serial
strip:True
The manufacturer assigned serial number of the train car.
:max:occupants
min:0
The maximum number of occupants the train car can hold.
:max:cargo:mass
The maximum mass the train car can carry as cargo.
:max:cargo:volume
The maximum volume the train car can carry as cargo.
:owner
The contact information of the owner of the train car.
:phys:mass
The mass of the train car.
:phys:volume
The cubed volume of the train car.
:phys:length
The length of the train car.
:phys:width
The width of the train car.
:phys:height
The height of the train car.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
transport:rail:car:type:taxonomy
A hierarchical taxonomy of rail car types.
The base type for the form can be found at transport:rail:car:type:taxonomy.
An example of transport:rail:car:type:taxonomy
:
engine.diesel
- Properties:
name
type
doc
opts
:title
A brief title of the definition.
:summary
Deprecated. Please use title/desc.
Deprecated:True
Display:{'hint': 'text'}
:desc
A definition of the taxonomy entry.
Display:
{'hint': 'text'}
:sort
A display sort order for siblings.
:base
The base taxon.
Read Only:
True
:depth
The depth indexed from 0.
Read Only:
True
:parent
The taxonomy parent.
Read Only:
True
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
transport:rail:consist
A group of rail cars and locomotives connected together.
The base type for the form can be found at transport:rail:consist.
- Properties:
name
type
doc
:cars
The rail cars, including locomotives, which compose the consist.
:operator
The contact information of the operator of the train.
:built
The date when the train was built.
:manufacturer
The organization which manufactured the train.
:manufacturer:name
The name of the organization which manufactured the train.
:model
The model of the train.
:serial
strip:True
The manufacturer assigned serial number of the train.
:max:occupants
min:0
The maximum number of occupants the train can hold.
:max:cargo:mass
The maximum mass the train can carry as cargo.
:max:cargo:volume
The maximum volume the train can carry as cargo.
:owner
The contact information of the owner of the train.
:phys:mass
The mass of the train.
:phys:volume
The cubed volume of the train.
:phys:length
The length of the train.
:phys:width
The width of the train.
:phys:height
The height of the train.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
transport:rail:train
An individual instance of a consist of train cars running a route.
The base type for the form can be found at transport:rail:train.
- Properties:
name
type
doc
:id
strip:True
The ID assigned to the train.
:status
enums:scheduled,cancelled,in-progress,completed,aborted,failed,unknown
The status of the train trip.
:occupants
min:0
The number of occupants of the train on this train trip.
:cargo:mass
The cargo mass carried by the train on this train trip.
:cargo:volume
The cargo volume carried by the train on this train trip.
:operator
The contact information of the operator of the train trip.
:vehicle
The train which traveled the train trip.
:duration
The actual duration.
:departed
The actual departure time.
:departed:place
The actual departure station.
:departed:point
The actual departure gate.
:arrived
The actual arrival time.
:arrived:place
The actual arrival station.
:arrived:point
The actual arrival gate.
:scheduled:duration
The scheduled duration.
:scheduled:departure
The scheduled departure time.
:scheduled:departure:place
The scheduled departure station.
:scheduled:departure:point
The scheduled departure gate.
:scheduled:arrival
The scheduled arrival time.
:scheduled:arrival:place
The scheduled arrival station.
:scheduled:arrival:point
The scheduled arrival gate.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
transport:sea:telem
A telemetry sample from a vessel in transit.
The base type for the form can be found at transport:sea:telem.
- Properties:
name
type
doc
:vessel
The vessel being measured.
:time
The time the telemetry was sampled.
:latlong
The lat/lon of the vessel at the time.
:loc
The location of the vessel at the time.
:place
The place that the lat/lon geocodes to.
:accuracy
The horizontal accuracy of the latlong sample.
:course
The direction, in degrees from true North, that the vessel is traveling.
:heading
The direction, in degrees from true North, that the bow of the vessel is pointed.
:speed
The speed of the vessel at the time.
:draft
The keel depth at the time.
:airdraft
The maximum height of the ship from the waterline.
:destination
The fully resolved destination that the vessel has declared.
:destination:name
The name of the destination that the vessel has declared.
:destination:eta
The estimated time of arrival that the vessel has declared.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
transport:sea:vessel
An individual sea vessel.
The base type for the form can be found at transport:sea:vessel.
- Properties:
name
type
doc
opts
:imo
The International Maritime Organization number for the vessel.
:type
The type of vessel.
:name
The name of the vessel.
:length
Deprecated. Please use :phys:length.
Deprecated:
True
:beam
The official overall vessel beam.
:flag
The country the vessel is flagged to.
:mmsi
The Maritime Mobile Service Identifier assigned to the vessel.
:make
Deprecated. Please use :manufacturer:name.
Deprecated:
True
:operator
The contact information of the operator.
:built
The date when the vessel was built.
:manufacturer
The organization which manufactured the vessel.
:manufacturer:name
The name of the organization which manufactured the vessel.
:model
The model of the vessel.
:serial
strip:True
The manufacturer assigned serial number of the vessel.
:max:occupants
min:0
The maximum number of occupants the vessel can hold.
:max:cargo:mass
The maximum mass the vessel can carry as cargo.
:max:cargo:volume
The maximum volume the vessel can carry as cargo.
:owner
The contact information of the owner of the vessel.
:phys:mass
The mass of the vessel.
:phys:volume
The cubed volume of the vessel.
:phys:length
The length of the vessel.
:phys:width
The width of the vessel.
:phys:height
The height of the vessel.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
transport:sea:vessel:type:taxonomy
A hierarchical taxonomy of sea vessel types.
The base type for the form can be found at transport:sea:vessel:type:taxonomy.
- Properties:
name
type
doc
opts
:title
A brief title of the definition.
:summary
Deprecated. Please use title/desc.
Deprecated:True
Display:{'hint': 'text'}
:desc
A definition of the taxonomy entry.
Display:
{'hint': 'text'}
:sort
A display sort order for siblings.
:base
The base taxon.
Read Only:
True
:depth
The depth indexed from 0.
Read Only:
True
:parent
The taxonomy parent.
Read Only:
True
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
transport:shipping:container
An individual shipping container.
The base type for the form can be found at transport:shipping:container.
- Properties:
name
type
doc
:built
The date when the shipping container was built.
:manufacturer
The organization which manufactured the shipping container.
:manufacturer:name
The name of the organization which manufactured the shipping container.
:model
The model of the shipping container.
:serial
strip:True
The manufacturer assigned serial number of the shipping container.
:max:occupants
min:0
The maximum number of occupants the shipping container can hold.
:max:cargo:mass
The maximum mass the shipping container can carry as cargo.
:max:cargo:volume
The maximum volume the shipping container can carry as cargo.
:owner
The contact information of the owner of the shipping container.
:phys:mass
The mass of the shipping container.
:phys:volume
The cubed volume of the shipping container.
:phys:length
The length of the shipping container.
:phys:width
The width of the shipping container.
:phys:height
The height of the shipping container.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
transport:stop
A stop made by a vehicle on a trip.
The base type for the form can be found at transport:stop.
- Properties:
name
type
doc
:trip
The trip which contains the stop.
:duration
The actual duration.
:departed
The actual departure time.
:departed:place
The actual departure place.
:departed:point
The actual departure point.
:arrived
The actual arrival time.
:arrived:place
The actual arrival place.
:arrived:point
The actual arrival point.
:scheduled:duration
The scheduled duration.
:scheduled:departure
The scheduled departure time.
:scheduled:departure:place
The scheduled departure place.
:scheduled:departure:point
The scheduled departure point.
:scheduled:arrival
The scheduled arrival time.
:scheduled:arrival:place
The scheduled arrival place.
:scheduled:arrival:point
The scheduled arrival point.
- Source Edges:
source
verb
target
doc
*
-(meets)>
ou:requirement
The requirement is met by the source node.
*
-(refs)>
*
The source node contains a reference to the target node.
*
-(seenat)>
geo:telem
Deprecated. Please use geo:telem:node.
- Target Edges:
source
verb
target
doc
*
-(refs)>
*
None
econ:purchase
-(acquired)>
*
The purchase was used to acquire the target node.
it:app:snort:rule
-(detects)>
*
The snort rule is intended for use in detecting the target node.
it:app:yara:rule
-(detects)>
*
The YARA rule is intended for use in detecting the target node.
it:exec:query
-(found)>
*
The target node was returned as a result of running the query.
math:algorithm
-(generates)>
*
The target node was generated by the algorithm.
meta:feed
-(found)>
*
The meta:feed produced the target node.
meta:note
-(about)>
*
The meta:note is about the target node.
meta:rule
-(detects)>
*
The meta:rule is designed to detect instances of the target node.
meta:rule
-(matches)>
*
The meta:rule has matched on target node.
meta:source
-(seen)>
*
The meta:source observed the target node.
ou:campaign
-(targets)>
*
The campaign targeted the target nodes.
ou:campaign
-(uses)>
*
The campaign made use of the target node.
ou:contribution
-(includes)>
*
The contribution includes the specific node.
ou:org
-(has)>
*
The organization is or was in possession of the target node.
ou:org
-(owns)>
*
The organization owns or owned the target node.
ou:org
-(targets)>
*
The organization targets the target node.
ou:org
-(uses)>
*
The ou:org makes use of the target node.
plan:procedure:step
-(uses)>
*
The step in the procedure makes use of the target node.
ps:contact
-(has)>
*
The contact is or was in possession of the target node.
ps:contact
-(owns)>
*
The contact owns or owned the target node.
ps:person
-(has)>
*
The person is or was in possession of the target node.
ps:person
-(owns)>
*
The person owns or owned the target node.
risk:attack
-(targets)>
*
The attack targeted the target node.
risk:attack
-(uses)>
*
The attack used the target node to facilitate the attack.
risk:compromise
-(stole)>
*
The target node was stolen or copied as a result of the compromise.
risk:extortion
-(leveraged)>
*
The extortion event was based on attacker access to the target node.
risk:leak
-(leaked)>
*
The leak included the disclosure of the target node.
risk:outage
-(impacted)>
*
The outage event impacted the availability of the target node.
risk:threat
-(targets)>
*
The threat cluster targeted the target node.
risk:threat
-(uses)>
*
The threat cluster uses the target node.
risk:tool:software
-(uses)>
*
The tool uses the target node.
sci:evidence
-(has)>
*
The evidence includes observations from the target nodes.
sci:experiment
-(uses)>
*
The experiment used the target nodes when it was run.
sci:observation
-(has)>
*
The observations are summarized from the target nodes.
Universal Properties
Universal props are system level properties which may be present on every node.
These properties are not specific to a particular form and exist outside of a particular namespace.
.created
The time the node was created in the cortex. It has the following property options set:
Read Only:
True
The universal property type is time. Its type has the following options set:
ismin:
True
.seen
The time interval for first/last observation of the node.
The universal property type is ival.