Pack Contributors:
- Francisco Javier Fernández Jiménez
- Timothy Roberts
Contributions are welcome and appreciated. For more info, visit our Contribution Guide.
This Content Pack will get you up and running in no-time and provide you with the most commonly used incident & indicator fields and types.
Contributions are welcome and appreciated. For more info, visit our Contribution Guide.
Contributions are welcome and appreciated. For more info, visit our Contribution Guide.
Name | Description |
---|---|
Mail Listener - Classifier | Classifies phishing email messages. |
Mail Listener - Incoming Mapper | Maps incoming phishing email messages fields. |
Name | Description |
---|---|
Policy ID | |
Device Internal IPs | |
Application Id | Application Id |
External Category ID | |
OS Version | OS Version |
Protocol names | |
Domain Squatting Result | The result of the domain-squatting check for the attacker's email. |
Approver | The person who approved or needs to approve the request. |
Region | |
User Block Status | |
File Creation Date | |
Error Message | The error message that contains details about the error that occurred. |
Operation Name | |
Group ID | |
Tools | |
Mobile Phone | |
RemovedFromCampaigns | |
Child Process | |
Detected Endpoints | |
Device Id | Device Id |
Detection End Time | |
Parent Process Name | |
First Name | First Name |
Destination Network | |
Source MAC Address | The source MAC address in an event. |
Application Name | Application Name |
Policy Recommendation | |
Org Unit | |
Src | Source |
External End Time | |
File Name | |
Risk Name | |
External Confidence | |
Process Name | |
File Size | File Size |
Policy Remediable | |
Timezone | |
Technique ID | |
Verification Method | The method used to verify the user. |
User Engagement Response | |
Srcs | The source values. |
Password Reset Successfully | Whether the password has been successfully reset. |
Post Nat Source Port | The source port after NAT. |
Additional Email Addresses | |
userAccountControl | userAccountControl |
Display Name | Display Name |
Job Code | Job Code |
Unique Ports | |
SKU Name | |
Alert Type ID | |
Events | The events associated with the offense. |
Related Report | |
Username | The username of the account who logged in. |
Command Line Verdict | |
Alert ID | Alert ID as received from the integration JSON |
String Similarity Results | |
Is Active | Alert status |
Source Priority | |
Parent Process SHA256 | |
Report Name | |
Event Descriptions | The description of the event name. |
Tool Usage Found | |
Employee Email | The email address of the employee. |
Device OS Name | |
Registry Hive | |
External Severity | |
Comment | The comments related with the incident |
Country Code Number | |
Attack Mode | Attack mode as received from the integration JSON |
Account ID | |
Affected Users | |
Exposure Level | |
Suspicious Executions Found | |
CVSS Confidentiality Requirement | The CVSS confidentiality requirement of the asset. |
Log Source Name | The log source name associated with the event. |
Source Id | |
Device Hash | Device Hash |
ASN Name | |
CVSS Availability Requirement | The CVSS availability requirement for the asset. |
similarIncidents | |
Compliance Notes | Notes regarding the assets compliance. |
User Groups | |
Device Model | Device Model |
Zip Code | Zip Code |
Scenario | |
Last Mirrored Time Stamp | The last time the incident was mirrored in. |
Domain Updated Date | |
Technical User | The technical user of the asset. |
Detected External Hosts | Detected external hosts |
Birthday | Person's Birthday |
Number of Related Incidents | |
OutgoingMirrorError | |
Last Update Time | |
Registry Key | |
Tenant Name | Tenant Name |
Post Nat Source IP | The source IP address after NAT. |
External Status | |
Detected Users | Detected users |
Dest | Destination |
Device Name | Device Name |
Number Of Found Related Alerts | Medium or Higher Severity Alerts |
Event ID | Event ID |
Rendered HTML | The HTML content in a rendered form. |
Parent Process Path | |
Ticket Opened Date | |
Detection URL | URL of the ExtraHop Reveal(x) detection |
Triggered Security Profile | Triggered Security Profile |
File MD5 | |
User SID | |
Source Category | |
Categories | The categories for the incident. |
Closing Reason | The closing reason |
Dst Ports | The destination ports of the event. |
Src NT Domain | Source NT Domain |
Agents ID | |
CMD line | |
External Sub Category ID | |
Alert Malicious | Whether the alert is malicious. |
Time to Assignment | The time it took from when the incident was created until a user was assigned to it. |
Cloud Region List | |
Users Details | |
Last Modified By | |
Last Seen | |
Location Region | Location Region |
CVE ID | |
Registration Email | |
Account Member Of | |
Number Of Log Sources | The number of log sources related to the offense. |
Policy Details | |
IP Blocked Status | |
CVE Published | |
Given Name | Given Name |
Ticket Acknowledged Date | |
SSDeep | |
Endpoints Details | |
Referenced Resource Name | |
External Sub Category Name | |
Parent CMD line | |
Email Sent Successfully | Whether the email has been successfully sent. |
Detected Internal IPs | Detected internal IPs |
CVSS Collateral Damage Potential | The CVSS collateral damage potential of the asset. |
Process Names | |
Alert URL | Alert URL as received from the integration JSON |
Country Code | |
Street Address | |
Process Path | |
Rating | |
Tactic ID | |
Resource URL | |
Cloud Account ID | |
Vendor ID | |
Duration | |
User Id | User Id |
MAC Address | MAC Address |
Endpoint | |
Verification Status | The status of the user verification. |
Source Hostname | The hostname that performed the port scan. |
Endpoint Isolation Status | |
Agent ID | Agent ID |
Incident Link | |
Destination Geolocation | The destination geolocation of the event. |
Changed | The user who changed this incident |
Hostnames | The hostname in the event. |
Appliance ID | Appliance ID as received from the integration JSON |
External Link | |
Surname | Surname |
Alert Source | |
External ID | |
Part of Campaign | The ID of the campaign incident of which the current incident is part of. |
Assigned User | Assigned User |
Alert Category | The category of the alert |
Full Name | Person's Full Name |
Source Geolocation | The source geolocation of the event. |
Similar incidents Dbot | |
Start Time | The time when the offense started. |
Destination Networks | |
PID | PID |
Process ID | |
Org Level 2 | |
High Risky Users | |
Dest Hostname | Destination hostname |
Project ID | |
Technical Owner | The technical owner of the asset. |
Number of similar files | |
Device MAC Address | |
Parent Process IDs | |
Src Ports | The source ports of the event. |
OS | The operating system. |
CVSS Integrity Requirement | The CVSS integrity requirement for the asset. |
User Anomaly Count | |
DNS Name | The DNS name of the asset. |
Source Status | |
Escalation | |
Agent Version | Reporting Agent/Sensor Version |
Cost Center Code | Cost Center Code |
Resource ID | |
Threat Hunting Detected IP | |
Usernames | The username in the event. |
Policy Actions | |
Source External IPs | |
Device External IP | Device External IP |
URL SSL Verification | Indicates whether the URLs passed the SSL certificate verification. |
Pre Nat Destination Port | The destination port before NAT. |
Approval Status | The status for the approval of the request. |
Source Username | The username that was the source of the attack. |
Process Creation Time | |
SHA512 | SHA512 |
Source Port | The source port that was used |
Policy Type | |
Device OU | Device's OU path in Active Directory |
Cloud Service | |
Resource Type | |
IP Reputation | |
Device External IPs | |
Rule Name | The name of a YARA rule |
User Agent | |
Detection ID | |
Src OS | Src OS |
Triage SLA | The time it took to investigate and enrich incident information. |
End Time | The time when the offense ended. |
Region ID | |
Title | Title |
Device Status | |
Related Alerts | |
Detected External IPs | Detected external IPs |
Employee Display Name | The display name of the employee. |
ASN | |
Verdict | |
Ticket Number | |
Cloud Instance ID | Cloud Instance ID |
Attack Patterns | |
Macro Source Code | In case there's a macro in a Microsoft file such as docm, xlsm or pptm, this field will hold the source code of the macro. |
Alert Attack Time | |
Src Hostname | Source hostname |
Failed Logon Events Timeframe | The timeframe which the failed logon events occurred in. |
Org Level 1 | |
Threat Family Name | Threat Family Name Associated with an Attacking Vector. I.E. Meterpreter as toolkit or Extortion\ÖżFraud\Espionage |
IncomingMirrorError | |
Process MD5 | |
Sensor Name | |
Cloud Resource List | |
Password Changed Date | |
External Addresses | |
Alert Acknowledgement | Alert acknowledgement as received from the integration JSON |
Source Updated by | |
Destination MAC Address | The destination MAC address in an event. |
OS Type | OS Type |
Technique | |
Protocol | Protocol |
Account Name | Account Name |
CVSS | |
Command Line | Command Line |
File SHA256 | |
External Category Name | |
Close Time | The closing time. |
Related Endpoints | |
City | |
Personal Email | |
Custom Query Results | |
Registry Value Type | |
High Level Categories | The high level categories in the events. |
Asset ID | |
Resource Name | |
Critical Assets | A table of critical assets involved in the incident, including the name and asset type. |
File Names | |
app channel name | |
Threat Hunting Detected Hostnames | |
Post Nat Destination IP | The destination IP address after NAT. |
MITRE Tactic Name | |
Additional Indicators | |
Alert Rules | |
Policy Severity | |
Blocked Action | Blocked Action |
Device Time | The time from the original logging device when the event occurred. |
Source Networks | |
SKU TIER | |
Destination Port | The destination port used. |
Dsts | The destination values. |
MITRE Tactic ID | |
Source IPV6 | The source IPV6 address. |
App message | |
Technical Owner Contact | The contact details for the technical owner. |
Asset Name | |
Cloud Operation Type | |
Department | Department |
EmailCampaignCanvas | |
Category Count | The number of categories that are associated with the offense. |
Isolated | Isolated |
Manager Name | Manager Name |
Identity Type | |
Detected Internal Hosts | Detected internal hosts |
Block Indicators Status | |
First Seen | |
Log Source Type | The log source type associated with the event. |
Detected User | |
Sub Category | The sub category |
SHA256 | SHA256 |
CVE | |
Destination IPs | The destination IPs of the event. |
File SHA1 | |
Event Names | The event name (translated QID ) in the event. |
Classification | Incident Classification |
High Risky Hosts | |
Parent Process CMD | |
State | State |
Alert Name | Alert name as received from the integration JSON |
Risk Score | |
Device OS Version | |
MITRE Technique ID | |
Job Family | Job Family |
Vendor Product | |
Last Name | Last Name |
Source Created By | |
Policy URI | |
Source IPs | The source IPs of the event. |
File Relationships | |
Subtype | Subtype |
Phone Number | Phone number |
Item Owner Email | |
Low Level Categories Events | The low level category of the event. |
Failed Logon Events | The number of failed logon events in a specific timeframe. Can be used with reference to the "Failed Logon Events Timeframe" field. |
Risk Rating | |
Internal Addresses | |
Registry Value | |
Device Local IP | Device Local IP |
App | |
SHA1 | SHA1 |
Domain Name | |
Detected IPs | |
Follow Up | True if marked for follow up. |
Acquisition Hire | |
Use Case Description | |
Dest NT Domain | Destination NT Domain |
Destination Hostname | Destination hostname |
Src User | Source User |
Status Reason | |
Tags | |
Device Username | The username of the user that owns the device |
Work Phone | |
Item Owner | |
Process SHA256 | |
Cost Center | Cost Center |
External Start Time | |
File Upload | Used to upload files to incidents in a way that would make them distinguishable from the rest of the incident files. This field can be used, for example, to execute commands on manually uploaded files with the click of an incident layout button. |
Campaign Name | |
Vulnerable Product | |
Bugtraq | |
Ticket Closed Date | |
Job Function | Job Function |
Reporter Email Address | The email address of the user who reported the email. |
Tactic | |
Policy Deleted | |
Related Campaign | |
EmailCampaignSummary | |
File Path | |
URLs | |
Remediation SLA | The time it took since remediation of the incident began, and until it ended. |
Referenced Resource ID | |
sAMAccountName | User sAMAAccountName |
Detection SLA | The time it took from incident creation until the maliciousness was determined. |
Parent Process | |
Raw Event | The unparsed event data. |
Appliance Name | Appliance name as received from the integration JSON |
Account Status | |
Threat Name | Define the threat name such as malware/exploit/phishing/etc |
Process CMD | |
Process Paths | |
Alert tags | |
Source Network | |
Dest OS | Destination OS |
Destination IP | The IP address the impossible traveler logged in to. |
UUID | UUID as received from the integration JSON |
Log Source | Log Source |
Source Create time | |
Affected Hosts | |
Pre Nat Source Port | The source port before NAT. |
Investigation Stage | The stage of the investigation. |
Post Nat Destination Port | The destination port after NAT. |
Org Level 3 | |
Incident Duration | How long it took for the playbook of the incident to finish, from the moment it started. |
Destination IPV6 | The destination IPV6 address. |
Country | The country from which the user logged in. |
Audit Logs | |
Team name | |
Detection Update Time | |
Location | Location |
MITRE Technique Name | |
Protocols | |
Assignment Group | |
External Last Updated Time | |
User Creation Time | |
EmailCampaignSnippets | |
List Of Rules - Event | The list of rules associated to an event. |
Policy Description | |
External System ID | |
Domain Registrar Abuse Email | |
Parent Process MD5 | |
Event Type | Event Type |
Suspicious Executions | |
Objective | |
User Risk Level | |
Signature | |
Selected Indicators | Includes the indicators selected by the user. |
MD5 | MD5 |
Alert Action | Alert action as received from the integration JSON |
Mobile Device Model | |
Source Urgency | Source Urgency |
Leadership | |
File Paths | |
Additional Data | |
Sensor IP | |
Traffic Direction | The direction of the traffic in the event. |
CMD | |
Pre Nat Source IP | The source IP before NAT. |
Caller | |
Manager Email Address | |
Protocol - Event | The network protocol in the event. |
File Hash | |
File Access Date | |
Vulnerability Category | |
Error Code | |
Last Modified On | |
Country Name | Country Name |
Primary Email Address | |
Source IP | The IP Address that the user initially logged in from. |
EmailCampaignMutualIndicators | |
Containment SLA | The time it took to contain the incident. |
Parent Process File Path | |
Description | The description of the incident |
Hunt Results Count | |
Closing User | The closing user. |
Employee Manager Email | The email address of the employee's manager. |
Application Path | |
Users | |
Event Action | Action taken on user accounts - Create, Update, Deactivate, Reactivate |
Name | Description |
---|---|
Reconnaissance | |
Exploit | |
UnknownBinary | |
Exfiltration | |
Hunt | |
Defacement | |
Authentication | |
Indicator Feed | |
Vulnerability | |
Simulation | |
DoS | |
C2Communication | |
Policy Violation | |
Network | |
Job | |
Lateral Movement |
Name | Description |
---|---|
Commands | |
Cost Center | |
ASN | |
Port | |
Admin Country | |
Processors | |
Quarantined | Whether the indicator is quarantined or isolated |
Subdomains | |
Username | |
Admin Name | |
Force Sync | Whether to force user synchronization. |
Operating System Version | |
Org Unit | |
Name Field | |
Entry ID | |
Category | |
Action | |
Cost Center Code | |
File Type | |
Resource Level | |
Signed | |
Operating System Refs | |
Actor | |
Signature Algorithm | |
Groups | |
Surname | Surname |
Organizational Unit (OU) | |
Community Notes | |
Query Language | |
Malware types | |
STIX Malware Types | |
Display Name | |
Is Malware Family | |
Admin Phone | |
CVSS3 | |
STIX Threat Actor Types | |
Domain Referring Subnets | |
Subject Alternative Names | |
Registrant Name | |
Threat Actor Types | |
Traffic Light Protocol | TLP is a set of designations used to ensure that sensitive information is shared with the appropriate audience. It employs four colors to indicate expected sharing boundaries to be applied by the recipient(s). |
Leadership | |
Signature Description | |
Hostname | |
Roles | |
Primary Motivation | |
Infrastructure Types | |
Org Level 2 | |
Expiration Date | |
Certificate Validation Checks | |
Mobile Phone | |
Rank | Used to display rank from different sources |
Key Value | |
Goals | |
Secondary Motivations | |
Registrar Abuse Address | |
State | |
Public Key | |
Assigned user | |
STIX Goals | |
Device Model | |
Subject | |
Report type | |
Internal | |
Memory | |
Definition | |
Detections | |
Country Code Number | |
Country Name | |
Report Object References | A list of STIX IDs referenced in the report. |
SWID | Specifies the Software Identification (SWID) tags entry for the software |
CVSS Score | |
City | City |
Publications | |
Positive Detections | Number of engines that positively detected the indicator as malicious |
Paths | |
Registrant Country | |
STIX Sophistication | |
DHCP Server | |
Whois Records | |
First Seen By Source | The first time the indicator was seen by the source vendor. |
Published | |
Admin Email | |
Reports | |
Aliases | Alternative names used to identify this object |
Domain Referring IPs | |
Zip Code | |
Organization Last Seen | Date and time when the indicator was last seen in the organization. |
Issuer DN | Issuer Distinguished Name |
Blocked | |
Number of subkeys | |
Registrar Abuse Network | |
Version | |
Registrar Name | |
imphash | |
STIX Roles | |
Source Original Severity | The original score/severity provided by the source without DBot translation. |
Acquisition Hire | Whether the employee is an acquisition hire. |
Product | |
Samples | |
Path | |
Feed Related Indicators | |
Detection Engines | Total number of engines that checked the indicator |
Is Processed | |
DNS Records | |
Creation Date | |
STIX Tool Types | |
Subject DN | Subject Distinguished Name |
Registrar Abuse Name | |
Manager Name | Manager Name |
Certificates | |
Domain IDN Name | |
Signature Original Name | |
Registrar Abuse Country | |
Organization First Seen | Date and time when the indicator was first seen in the organization. |
Signature Internal Name | |
Registrant Phone | |
Job Function | |
Location Region | |
OS Version | |
Languages | Specifies the languages supported by the software. The value of each list member MUST be a language code conformant to - RFC5646. |
Author | |
CPE | Specifies the Common Platform Enumeration (CPE) entry for the software, if available. The value for this property MUST be a CPE v2.3 entry from the official NVD CPE Dictionary |
CVSS Table | |
X.509 v3 Extensions | |
Registrar Abuse Email | |
Service | The specific service of a feed integration from which an indicator was ingested. |
Updated Date | |
Given Name | Given Name |
Geo Location | |
Targets | |
Capabilities | |
SSDeep | |
Domains | |
CVSS | |
Street Address | |
Signature Copyright | |
CVSS Vector | |
Short Description | |
CVE Description | |
Org Level 1 | |
Processor | |
Objective | |
Tool Version | |
Name Servers | |
MD5 | |
Kill Chain Phases | The list of Kill Chain Phases for which this object is used. |
Vulnerabilities | |
Job Family | |
Behavior | |
Org Level 3 | |
Serial Number | |
SHA512 | |
Name | |
Industry sectors | Industry sector is an open vocabulary that describes industrial and commercial sectors. |
Architecture | |
Issuer | |
Associated File Names | |
Threat Types | The threat category associated to this indicator by the source vendor. For example, Phishing, Command \u0026 Control, TOR, etc. |
Global Prevalence | The number of times the indicator is detected across all organizations. |
Email Address | |
IP Address | |
Account Type | |
Certificate Signature | |
Associations | Known associations to other pieces of Threat Data. |
Office365Category | |
Reported By | The source that reported this indicator. Can be a feed, an incident, or users. |
Geo Country | |
Mitre ID | |
STIX Kill Chain Phases | The list of Kill Chain Phases for which this object is used. |
SPKI SHA256 | SHA256 fingerprint of Subject Public Key Info |
Domain Status | |
Vulnerable Products | |
CVSS Version | |
File Extension | |
Country Code | |
Size | |
Validity Not Before | Specifies the date on which the certificate validity period begins. |
Signature File Version | |
Region | |
Certificate Names | |
Mitre Tactics | |
Source Priority | |
Download URL | |
Last Seen By Source | The last time the indicator was seen by the Source vendor. |
Validity Not After | Specifies the date on which the certificate validity period ends. |
Malware Family | |
Domain Name | |
STIX ID | An identifier uniquely identifies a STIX Object and MAY do so in a deterministic way |
Identity class | The type of entity that this Identity describes, e.g., an individual or organization. |
Sophistication | |
MAC Address | |
Vendor | |
Description | |
Personal Email | |
STIX Resource Level | |
Confidence | |
Registrant Email | |
STIX Primary Motivation. | |
STIX Tool Version | |
Registrar Abuse Phone | |
BIOS Version | |
Office365ExpressRoute | |
DNS | |
Location | |
Signature Authentihash | |
PEM | Certificate in PEM format. |
Title | Title |
Implementation Languages | |
SHA1 | |
AS Owner | |
Operating System | |
SHA256 | |
STIX Secondary Motivations | |
Applications | |
Indicator Identification | |
CVE Modified | |
Organization Type | |
Department | Department |
Extension | |
STIX Description | |
Campaign | |
Job Code | Job Code |
STIX Is Malware Family | |
Manager Email Address | |
Assigned role | |
Work Phone | |
Tags | |
Office365Required | |
Tool Types | |
User ID | |
Organization | |
Organization Prevalence | The number of times the indicator is detected in the organization. |
STIX Aliases | Alternative names used to identify this object |
Name | Description |
---|---|
Tool Indicator | Tool Indicator Layout |
Campaign | Campaign Indicator Layout |
ASN | ASN Indicator Layout |
Host Indicator | Host indicator layout |
Intrusion Set | Intrusion Set Layout |
Registry Key Indicator | Registry Key Indicator Layout |
IP Indicator | IP Indicator Layout |
Course of Action | Course of Action Indicator Layout |
Tactic Layout | Tactic Indicator Layout |
Account Indicator | Account Indicator Layout |
Threat Actor | Threat Actor Indicator Layout |
Report | Report Indicator Layout |
CVE Indicator | CVE Indicator Layout |
Indicator Feed Incident | |
Identity | Identity indicator layout |
Email Indicator | Email Indicator Layout |
X509 Certificate | CVE Indicator Layout |
Domain Indicator | Domain Indicator Layout |
Mutex | Mutex indicator layout |
URL Indicator | URL Indicator Layout |
Software | Software Indicator Layout |
Attack Pattern | Attack Pattern Indicator Layout |
Infrastructure | Infrastructure Indicator Layout |
File Indicator | File Indicator Layout |
Malware Indicator | Malware Indicator Layout |
Vulnerability Incident | |
Location | Location indicator layout |
Name | Description |
---|---|
IPv6CIDR | |
Attack Pattern | |
File SHA-1 | |
Software | |
CIDR | |
IPv6 | |
Location | |
CVE | |
Malware | |
Threat Actor | |
Tool | |
File MD5 | |
Onion Address | |
Identity | |
Course of Action | |
Domain | |
Tactic | |
URL | |
DomainGlob | |
Infrastructure | |
X509 Certificate | |
ssdeep | |
Host | |
Account | |
File | |
Mutex | |
File SHA-256 | |
Report | |
Intrusion Set | |
ASN | |
Campaign | |
Registry Key | |
IP |
Name | Description |
---|---|
Mail Listener - Classifier | Classifies phishing email messages. |
Mail Listener - Incoming Mapper | Maps incoming phishing email messages fields. |
Name | Description |
---|---|
Risk Score | |
Job Code | Job Code |
OS Type | OS Type |
IP Reputation | |
Objective | |
Unique Ports | |
Location Region | Location Region |
Tenant Name | Tenant Name |
Threat Family Name | Threat Family Name Associated with an Attacking Vector. I.E. Meterpreter as toolkit or Extortion\ÖżFraud\Espionage |
Source Status | |
Device OS Version | |
Email Sent Successfully | Whether the email has been successfully sent. |
Related Alerts | |
External Link | |
Category Count | The number of categories that are associated with the offense. |
Domain Updated Date | |
Subtype | Subtype |
File Relationships | |
Follow Up | True if marked for follow up. |
Similar incidents Dbot | |
External Confidence | |
Parent Process CMD | |
URLs | |
External Category ID | |
Investigation Stage | The stage of the investigation. |
Failed Logon Events Timeframe | The timeframe which the failed logon events occurred in. |
Employee Email | The email address of the employee. |
Org Level 3 | |
Original Events | The events associated with the offense. |
Technique | |
SHA1 | SHA1 |
City | |
Audit Logs | |
Vendor Product | |
Country Code | |
Application Path | |
Macro Source Code | In case there's a macro in a Microsoft file such as docm, xlsm or pptm, this field will hold the source code of the macro. |
File Access Date | |
Approval Status | The status for the approval of the request. |
Tactic | |
CVSS Collateral Damage Potential | The CVSS collateral damage potential of the asset. |
Event ID | Event ID |
Original Alert Name | Alert name as received from the integration JSON |
CVSS | |
Source Create time | |
Source Geolocation | The source geolocation of the event. |
Last Modified By | |
Employee Display Name | The display name of the employee. |
Department | Department |
Parent Process Name | |
URL SSL Verification | Indicates whether the URLs passed the SSL certificate verification. |
User Block Status | |
Classification | Incident Classification |
Display Name | Display Name |
Log Source Name | The log source name associated with the event. |
OS | The operating system. |
User SID | |
Changed | The user who changed this incident |
Policy Details | |
Affected Hosts | |
SKU TIER | |
Related Endpoints | |
External End Time | |
Cloud Account ID | |
Endpoints Details | |
Cost Center | Cost Center |
Duration | |
Account Member Of | |
High Risky Hosts | |
Post Nat Destination Port | The destination port after NAT. |
First Name | First Name |
File Creation Date | |
Manager Email Address | |
Suspicious Executions | |
Birthday | Person's Birthday |
User Engagement Response | |
Users Details | |
Post Nat Source IP | The source IP address after NAT. |
Leadership | |
Detection ID | |
Parent Process MD5 | |
Related Report | |
Domain Squatting Result | The result of the domain-squatting check for the attacker's email. |
Device Name | Device Name |
Password Reset Successfully | Whether the password has been successfully reset. |
MITRE Tactic ID | |
State | State |
Src OS | Src OS |
Device OS Name | |
Source Urgency | Source Urgency |
Endpoint Isolation Status | |
Acquisition Hire | |
Event Action | Action taken on user accounts - Create, Update, Deactivate, Reactivate |
Mobile Device Model | |
Account ID | |
Rendered HTML | The HTML content in a rendered form. |
Part of Campaign | The ID of the campaign incident of which the current incident is part of. |
Country Code Number | |
Hunt Results Count | |
Work Phone | |
Incident Link | |
Agents ID | |
Original Description | The description of the incident |
External Last Updated Time | |
App message | |
External Category Name | |
Policy ID | |
Risk Rating | |
Source Category | |
Cloud Instance ID | Cloud Instance ID |
Approver | The person who approved or needs to approve the request. |
userAccountControl | userAccountControl |
Status Reason | |
Ticket Acknowledged Date | |
Raw Event | The unparsed event data. |
Process SHA256 | |
Technical Owner Contact | The contact details for the technical owner. |
Threat Name | Define the threat name such as malware/exploit/phishing/etc |
Assignment Group | |
Process Creation Time | |
Process CMD | |
Pre Nat Source IP | The source IP before NAT. |
Phone Number | Phone number |
Password Changed Date | |
Surname | Surname |
Manager Name | Manager Name |
Policy Remediable | |
Operation Name | |
Failed Logon Events | The number of failed logon events in a specific timeframe. Can be used with reference to the "Failed Logon Events Timeframe" field. |
Start Time | The time when the offense started. |
ASN | |
Technical User | The technical user of the asset. |
Scenario | |
IncomingMirrorError | |
End Time | The time when the offense ended. |
Original Alert ID | Alert ID as received from the integration JSON |
Zip Code | Zip Code |
CVSS Confidentiality Requirement | The CVSS confidentiality requirement of the asset. |
Job Function | Job Function |
Referenced Resource ID | |
Device Internal IPs | |
Region ID | |
Rating | |
Vulnerability Category | |
Additional Data | |
EmailCampaignSnippets | |
Detection SLA | The time it took from incident creation until the maliciousness was determined. |
Org Unit | |
Custom Query Results | |
IP Blocked Status | |
Parent Process IDs | |
Triggered Security Profile | Triggered Security Profile |
Affected Users | |
CVSS Availability Requirement | The CVSS availability requirement for the asset. |
Cloud Service | |
Critical Assets | A table of critical assets involved in the incident, including the name and asset type. |
Internal Addresses | |
Original Alert Source | |
MITRE Technique ID | |
Caller | |
Policy Type | |
Identity Type | |
Cost Center Code | Cost Center Code |
Reporter Email Address | The email address of the user who reported the email. |
Source Priority | |
Alert tags | |
String Similarity Results | |
Closing Reason | The closing reason |
Process ID | |
Attack Mode | Attack mode as received from the integration JSON |
File Hash | |
Related Campaign | |
Suspicious Executions Found | |
Full Name | Person's Full Name |
Traffic Direction | The direction of the traffic in the event. |
Triage SLA | The time it took to investigate and enrich incident information. |
UUID | UUID as received from the integration JSON |
EmailCampaignSummary | |
EmailCampaignCanvas | |
Last Update Time | |
Policy Actions | |
MITRE Tactic Name | |
Post Nat Source Port | The source port after NAT. |
Vendor ID | |
Tactic ID | |
Destination IPV6 | The destination IPV6 address. |
Additional Email Addresses | |
Attack Patterns | |
CVSS Integrity Requirement | The CVSS integrity requirement for the asset. |
Street Address | |
Mobile Phone | |
Policy URI | |
External Severity | |
Timezone | |
Detection End Time | |
Verification Method | The method used to verify the user. |
Job Family | Job Family |
Device OU | Device's OU path in Active Directory |
Parent Process SHA256 | |
Item Owner Email | |
Device Id | Device Id |
Blocked Action | Blocked Action |
Compliance Notes | Notes regarding the assets compliance. |
Org Level 1 | |
Destination Networks | |
Device External IPs | |
Log Source Type | The log source type associated with the event. |
CVE ID | |
File Size | File Size |
Assigned User | Assigned User |
Number of Related Incidents | |
Domain Name | |
Primary Email Address | |
Technique ID | |
Ticket Number | |
Verdict | |
Project ID | |
SKU Name | |
Process Paths | |
Registry Value | |
ASN Name | |
Block Indicators Status | |
Bugtraq | |
Given Name | Given Name |
similarIncidents | |
Registry Value Type | |
List Of Rules - Event | The list of rules associated to an event. |
Title | Title |
Dsts | The destination values. |
Policy Severity | |
External Status | |
Is Active | Alert status |
Employee Manager Email | The email address of the employee's manager. |
External Start Time | |
Comment | The comments related with the incident |
Last Name | Last Name |
Process Names | |
User Id | User Id |
Process MD5 | |
Alert Acknowledgement | Alert acknowledgement as received from the integration JSON |
Last Mirrored Time Stamp | The last time the incident was mirrored in. |
Domain Registrar Abuse Email | |
Sub Category | The sub category |
Rule Name | The name of a YARA rule |
High Risky Users | |
Protocol names | |
Registry Key | |
Detected Internal Hosts | Detected internal hosts |
Number of similar files | |
Number Of Log Sources | The number of log sources related to the offense. |
External System ID | |
Tools | |
Source Id | |
MITRE Technique Name | |
User Creation Time | |
Asset ID | |
Detected Endpoints | |
OutgoingMirrorError | |
Closing User | The closing user. |
Device Status | |
Log Source | Log Source |
Escalation | |
Selected Indicators | Includes the indicators selected by the user. |
Vulnerable Product | |
Policy Deleted | |
Pre Nat Destination Port | The destination port before NAT. |
Group ID | |
Close Time | The closing time. |
Account Status | |
Alert Action | Alert action as received from the integration JSON |
Dest OS | Destination OS |
Report Name | |
Resource URL | |
Policy Recommendation | |
Campaign Name | |
Verification Status | The status of the user verification. |
app channel name | |
sAMAccountName | User sAMAAccountName |
External Sub Category ID | |
CVE Published | |
Destination Geolocation | The destination geolocation of the event. |
External Sub Category Name | |
Tool Usage Found | |
Device Hash | Device Hash |
Item Owner | |
Resource Type | |
Referenced Resource Name | |
Location | Location |
Last Seen | |
Sensor IP | |
Alert Malicious | Whether the alert is malicious. |
Time to Assignment | The time it took from when the incident was created until a user was assigned to it. |
Source External IPs | |
File SHA1 | |
Org Level 2 | |
Alert Rules | |
CVE | |
Agent Version | Reporting Agent/Sensor Version |
Registry Hive | |
Event Names | The event name (translated QID ) in the event. |
Asset Name | |
Cloud Region List | |
Ticket Closed Date | |
First Seen | |
Post Nat Destination IP | The destination IP address after NAT. |
Resource Name | |
Number Of Found Related Alerts | Medium or Higher Severity Alerts |
Policy Description | |
Device Time | The time from the original logging device when the event occurred. |
Isolated | Isolated |
Signature | |
Technical Owner | The technical owner of the asset. |
Additional Indicators | |
RemovedFromCampaigns | |
Pre Nat Source Port | The source port before NAT. |
Risk Name | |
Alert Type ID | |
Cloud Resource List | |
Exposure Level | |
Registration Email | |
Use Case Description | |
Detected External IPs | Detected external IPs |
Command Line Verdict | |
Parent Process Path | |
Team name | |
Error Code | |
Event Descriptions | The description of the event name. |
Source Networks | |
Parent Process File Path | |
Device MAC Address | |
EmailCampaignMutualIndicators | |
Personal Email | |
User Anomaly Count | |
Region | |
User Groups | |
Source Created By | |
Containment SLA | The time it took to contain the incident. |
Error Message | The error message that contains details about the error that occurred. |
SSDeep | |
Last Modified On | |
SHA512 | SHA512 |
Remediation SLA | The time it took since remediation of the incident began, and until it ended. |
Source Updated by | |
Low Level Categories Events | The low level category of the event. |
Detection URL | URL of the ExtraHop Reveal(x) detection |
Device Model | Device Model |
Name | Description |
---|---|
Reconnaissance | |
Exfiltration | |
Lateral Movement | |
Policy Violation | |
Simulation | |
UnknownBinary | |
Authentication | |
Indicator Feed | |
Job | |
Network | |
Hunt | |
C2Communication | |
Defacement | |
DoS | |
Vulnerability | |
Exploit |
Name | Description |
---|---|
Threat Actor Types | |
Domain Name | |
Last Seen By Source | The last time the indicator was seen by the Source vendor. |
Assigned role | |
STIX Aliases | Alternative names used to identify this object |
Objective | |
Reports | |
STIX Resource Level | |
Admin Phone | |
Zip Code | |
Languages | Specifies the languages supported by the software. The value of each list member MUST be a language code conformant to - RFC5646. |
Subdomains | |
Org Unit | |
Display Name | |
Admin Name | |
Domains | |
Identity class | The type of entity that this Identity describes, e.g., an individual or organization. |
Kill Chain Phases | The list of Kill Chain Phases for which this object is used. |
Vendor | |
Force Sync | Whether to force user synchronization. |
Groups | |
Job Family | |
Org Level 2 | |
IP Address | |
Operating System Version | |
Malware types | |
Issuer DN | Issuer Distinguished Name |
Work Phone | |
Registrant Email | |
Job Code | Job Code |
Number of subkeys | |
Validity Not After | Specifies the date on which the certificate validity period ends. |
Office365ExpressRoute | |
STIX Malware Types | |
Rank | Used to display rank from different sources |
Size | |
Signature Algorithm | |
STIX Secondary Motivations | |
Threat Types | The threat category associated to this indicator by the source vendor. For example, Phishing, Command \u0026 Control, TOR, etc. |
Country Code | |
Query Language | |
Category | |
Roles | |
File Type | |
DNS | |
STIX Roles | |
Industry sectors | Industry sector is an open vocabulary that describes industrial and commercial sectors. |
AS Owner | |
STIX Description | |
Signature Copyright | |
Primary Motivation | |
STIX Sophistication | |
Device Model | |
OS Version | |
Campaign | |
ASN | |
Mobile Phone | |
Department | Department |
Aliases | Alternative names used to identify this object |
STIX Is Malware Family | |
Updated Date | |
Sophistication | |
Registrant Phone | |
Mitre ID | |
Cost Center Code | |
Action | |
Public Key | |
Given Name | Given Name |
Domain Referring Subnets | |
Commands | |
SSDeep | |
Source Original Severity | The original score/severity provided by the source without DBot translation. |
STIX Kill Chain Phases | The list of Kill Chain Phases for which this object is used. |
Organizational Unit (OU) | |
Org Level 1 | |
CVSS Vector | |
Subject | |
Actor | |
Registrar Abuse Network | |
Signed | |
Office365Category | |
STIX Threat Actor Types | |
Applications | |
Infrastructure Types | |
Registrant Name | |
Title | Title |
Goals | |
Organization First Seen | Date and time when the indicator was first seen in the organization. |
Architecture | |
Report Object References | A list of STIX IDs referenced in the report. |
Feed Related Indicators | |
Signature Description | |
Blocked | |
CVSS Score | |
Registrar Abuse Phone | |
Issuer | |
Street Address | |
Tool Types | |
First Seen By Source | The first time the indicator was seen by the source vendor. |
Resource Level | |
Confidence | |
Organization | |
Global Prevalence | The number of times the indicator is detected across all organizations. |
Registrar Abuse Address | |
Location | |
Organization Prevalence | The number of times the indicator is detected in the organization. |
Capabilities | |
Hostname | |
Region | |
Signature Original Name | |
Download URL | |
Operating System Refs | |
Geo Location | |
Office365Required | |
Signature File Version | |
Country Code Number | |
CVE Modified | |
Tool Version | |
Paths | |
State | |
Indicator Identification | |
Signature Internal Name | |
Certificate Names | |
Extension | |
Is Processed | |
Vulnerabilities | |
Assigned user | |
Mitre Tactics | |
SHA256 | |
CVSS Version | |
City | City |
Processor | |
Entry ID | |
Admin Email | |
Registrar Abuse Country | |
User ID | |
Community Notes | |
Manager Email Address | |
Domain Status | |
Path | |
Detection Engines | Total number of engines that checked the indicator |
Memory | |
SPKI SHA256 | SHA256 fingerprint of Subject Public Key Info |
Subject DN | Subject Distinguished Name |
Tags | |
DHCP Server | |
Short Description | |
imphash | |
DNS Records | |
Username | |
Name | |
Definition | |
Email Address | |
Whois Records | |
Cost Center | |
Version | |
Subject Alternative Names | |
Targets | |
Source Priority | |
Country Name | |
Registrar Abuse Name | |
Signature Authentihash | |
Org Level 3 | |
Registrar Name | |
Product | |
Organization Last Seen | Date and time when the indicator was last seen in the organization. |
Surname | Surname |
Publications | |
Geo Country | |
X.509 v3 Extensions | |
Name Servers | |
Positive Detections | Number of engines that positively detected the indicator as malicious |
Acquisition Hire | Whether the employee is an acquisition hire. |
Registrar Abuse Email | |
STIX Primary Motivation. | |
Implementation Languages | |
CVE Description | |
CVSS3 | |
BIOS Version | |
Name Field | |
Domain Referring IPs | |
STIX Goals | |
Traffic Light Protocol | TLP is a set of designations used to ensure that sensitive information is shared with the appropriate audience. It employs four colors to indicate expected sharing boundaries to be applied by the recipient(s). |
Serial Number | |
Certificate Signature | |
Detections | |
Secondary Motivations | |
Operating System | |
Malware Family | |
Key Value | |
Validity Not Before | Specifies the date on which the certificate validity period begins. |
Certificate Validation Checks | |
Reported By | The source that reported this indicator. Can be a feed, an incident, or users. |
SHA1 | |
Port | |
Job Function | |
Is Malware Family | |
Report type | |
Associated File Names | |
STIX Tool Version | |
Admin Country | |
Behavior | |
STIX ID | An identifier uniquely identifies a STIX Object and MAY do so in a deterministic way |
PEM | Certificate in PEM format. |
Vulnerable Products | |
Personal Email | |
SHA512 | |
Quarantined | Whether the indicator is quarantined or isolated |
Expiration Date | |
Leadership | |
CVSS Table | |
File Extension | |
CVSS | |
Domain IDN Name | |
Certificates | |
MD5 | |
Samples | |
STIX Tool Types | |
SWID | Specifies the Software Identification (SWID) tags entry for the software |
CPE | Specifies the Common Platform Enumeration (CPE) entry for the software, if available. The value for this property MUST be a CPE v2.3 entry from the official NVD CPE Dictionary |
Registrant Country | |
Service | The specific service of a feed integration from which an indicator was ingested. |
Author | |
Published | |
Internal | |
Location Region | |
Organization Type | |
Associations | Known associations to other pieces of Threat Data. |
Creation Date | |
Processors | |
Description | |
Manager Name | Manager Name |
Account Type |
Name | Description |
---|---|
Vulnerability Layout Rule | |
Indicator Feed Layout Rule |
Name | Description |
---|---|
Course of Action | Course of Action Indicator Layout |
Report | Report Indicator Layout |
Malware Indicator | Malware Indicator Layout |
Attack Pattern | Attack Pattern Indicator Layout |
Mutex | Mutex indicator layout |
X509 Certificate | CVE Indicator Layout |
Campaign | Campaign Indicator Layout |
Threat Actor | Threat Actor Indicator Layout |
IP Indicator | IP Indicator Layout |
CVE Indicator | CVE Indicator Layout |
Registry Key Indicator | Registry Key Indicator Layout |
Intrusion Set | Intrusion Set Layout |
Software | Software Indicator Layout |
ASN | ASN Indicator Layout |
Tool Indicator | Tool Indicator Layout |
Host Indicator | Host indicator layout |
Domain Indicator | Domain Indicator Layout |
File Indicator | File Indicator Layout |
URL Indicator | URL Indicator Layout |
Infrastructure | Infrastructure Indicator Layout |
Indicator Feed Incident | |
Tactic Layout | Tactic Indicator Layout |
Email Indicator | Email Indicator Layout |
Account Indicator | Account Indicator Layout |
Location | Location indicator layout |
Identity | Identity indicator layout |
Vulnerability Incident |
Name | Description |
---|---|
Report | |
Malware | |
Location | |
Intrusion Set | |
File | |
Domain | |
CVE | |
Account | |
Attack Pattern | |
Mutex | |
Infrastructure | |
Onion Address | |
File MD5 | |
CIDR | |
Threat Actor | |
IPv6 | |
ssdeep | |
Campaign | |
Software | |
DomainGlob | |
Tool | |
Identity | |
File SHA-256 | |
Tactic | |
File SHA-1 | |
Host | |
X509 Certificate | |
IP | |
Course of Action | |
URL | |
ASN | |
IPv6CIDR | |
Registry Key |
Pack Name | Pack By |
---|---|
Base | By: Cortex XSOAR |
Common Scripts | By: Cortex XSOAR |
Pack Name | Pack By |
---|---|
Base | By: Cortex XSOAR |
Common Scripts | By: Cortex XSOAR |
Cortex REST API | By: Cortex XSOAR |
Username
Added the CrowdStrike Falcon OFP Detection
incident type as an associated type.
Cloud Service
Added the CrowdStrike Falcon OFP Detection
incident type as an associated type.
First Seen
Added the CrowdStrike Falcon OFP Detection
incident type as an associated type.
Last Seen
Added the CrowdStrike Falcon OFP Detection
incident type as an associated type.
Display Name
Added the CrowdStrike Falcon OFP Detection
incident type as an associated type.
Device Id
Added the CrowdStrike Falcon OFP Detection
incident type as an associated type.
Vendor Product
Added the CrowdStrike Falcon OFP Detection
incident type as an associated type.
Last Update Time
Added the CrowdStrike Falcon OFP Detection
incident type as an associated type.
User Id
Added the CrowdStrike Falcon OFP Detection
incident type as an associated type.
Added new number field which represents the number of times the indicator is detected in the organization.
Added new number field which represents the number of times the indicator is detected across all organizations.
Added new date field which represents when the indicator was first seen in the organization.
Added new date field which represents when the indicator was last seen in the organization.
File
Added default mapping to the indicator fields:
CLI Name | Context Path |
---|---|
organizationprevalence |
File.OrganizationPrevalence |
globalprevalence |
File.GlobalPrevalence |
organizationfirstseen |
File.OrganizationFirstSeen |
organizationlastseen |
File.OrganizationLastSeen |
firstseenbysource |
File.FirstSeenBySource |
lastseenbysource |
File.LastSeenBySource |
Domain
Added default mapping to the indicator fields:
CLI Name | Context Path |
---|---|
organizationprevalence |
Domain.OrganizationPrevalence |
globalprevalence |
Domain.GlobalPrevalence |
organizationfirstseen |
Domain.OrganizationFirstSeen |
organizationlastseen |
Domain.OrganizationLastSeen |
firstseenbysource |
Domain.FirstSeenBySource |
lastseenbysource |
Domain.LastSeenBySource |
URL
Added default mapping to the indicator fields:
CLI Name | Context Path |
---|---|
organizationprevalence |
URL.OrganizationPrevalence |
globalprevalence |
URL.GlobalPrevalence |
organizationfirstseen |
URL.OrganizationFirstSeen |
organizationlastseen |
URL.OrganizationLastSeen |
firstseenbysource |
URL.FirstSeenBySource |
lastseenbysource |
URL.LastSeenBySource |
IP
Added default mapping to the indicator fields:
CLI Name | Context Path |
---|---|
organizationprevalence |
IP.OrganizationPrevalence |
globalprevalence |
IP.GlobalPrevalence |
organizationfirstseen |
IP.OrganizationFirstSeen |
organizationlastseen |
IP.OrganizationLastSeen |
firstseenbysource |
IP.FirstSeenBySource |
lastseenbysource |
IP.LastSeenBySource |
IPv6
Added default mapping to the indicator fields:
| CLI Name | Context Path |
| --- | --- |
| organizationprevalence
| IPv6.OrganizationPrevalence |
| globalprevalence
| IPv6.GlobalPrevalence |
| organizationfirstseen
| IPv6.OrganizationFirstSeen |
| organizationlastseen
| IPv6.OrganizationLastSeen |
| firstseenbysource
| IPv6.FirstSeenBySource |
| lastseenbysource
| IPv6.LastSeenBySource |
Account Indicator
Changed the name of the "Reputation" section in quick-view to "Verdict" as per the convention.
Domain Indicator
Changed the name of the "Reputation" section in quick-view to "Verdict" as per the convention.
File Indicator
Changed the name of the "Reputation" section in quick-view to "Verdict" as per the convention.
Registry Key Indicator
Changed the name of the "Reputation" in quick-view section to "Verdict" as per the convention.
Email Indicator
Fixed an issue with the indicator layout quick-view missing the "Verdict" section.
File Indicator
Updated layout with canvas
tab.
Account Indicator
Updated layout with canvas
tab.
Report
Updated layout with canvas
tab.
Threat Actor
Updated layout with canvas
tab.
URL Indicator
Updated layout with canvas
tab.
X509 Certificate
Updated layout with canvas
tab.
Mutex
Updated layout with canvas
tab.
Campaign
Updated layout with canvas
tab.
Location
Updated layout with canvas
tab.
Tool Indicator
Updated layout with canvas
tab.
Attack Pattern
Updated layout with canvas
tab.
Infrastructure
Updated layout with canvas
tab.
IP Indicator
Updated layout with canvas
tab.
Malware Indicator
Updated layout with canvas
tab.
Course of Action
Updated layout with canvas
tab.
Host Indicator
Updated layout with canvas
tab.
Tool
Updated layout with canvas
tab.
Email Indicator
Updated layout with canvas
tab.
CVE Indicator
Updated layout with canvas
tab.
Domain Indicator
Updated layout with canvas
tab.
Identity
Updated layout with canvas
tab.
Software
Updated layout with canvas
tab.
Intrusion Set
Updated layout with canvas
tab.
ASN
Updated layout with canvas
tab.
Registry Key Indicator
Updated layout with canvas
tab.
Malware
Updated layout with canvas
tab.
External ID
Added support for the External ID field in the Exabeam Security Operations Platform.
Last Modified On
Added support for the Last Modified On field in the Exabeam Security Operations Platform.
Risk Score
Added support for the Risk Score field in the Exabeam Security Operations Platform.
File Indicator
Updated the layout to support enrichment excluded indicators - added a toggle switch when editing the indicator to mark it as "Enrichment Excluded", Once excluded, the "Enrich" buttons will be disabled, a new banner will be displayed next to the indicator value, and a field called "Enrichment Excluded" will be added to the layout and will show as "True". (From Cortex XSOAR 8.8)
Domain Indicator
Updated the layout to support enrichment excluded indicators - added a toggle switch when editing the indicator to mark it as "Enrichment Excluded", Once excluded, the "Enrich" buttons will be disabled, a new banner will be displayed next to the indicator value, and a field called "Enrichment Excluded" will be added to the layout and will show as "True". (From Cortex XSOAR 8.8)
URL Indicator
Updated the layout to support enrichment excluded indicators - added a toggle switch when editing the indicator to mark it as "Enrichment Excluded", Once excluded, the "Enrich" buttons will be disabled, a new banner will be displayed next to the indicator value, and a field called "Enrichment Excluded" will be added to the layout and will show as "True". (From Cortex XSOAR 8.8)
Email Indicator
Updated the layout to support enrichment excluded indicators - added a toggle switch when editing the indicator to mark it as "Enrichment Excluded", Once excluded, the "Enrich" buttons will be disabled, a new banner will be displayed next to the indicator value, and a field called "Enrichment Excluded" will be added to the layout and will show as "True". (From Cortex XSOAR 8.8)
IP Indicator
Updated the layout to support enrichment excluded indicators - added a toggle switch when editing the indicator to mark it as "Enrichment Excluded", Once excluded, the "Enrich" buttons will be disabled, a new banner will be displayed next to the indicator value, and a field called "Enrichment Excluded" will be added to the layout and will show as "True". (From Cortex XSOAR 8.8)
Location
Added support for incident type Exabeam Notable User.
Department
Added support for incident type Exabeam Notable User.
End Time
Added support for incident type Exabeam Notable User.
Work Phone
Added support for incident type Exabeam Notable User.
Start Time
Added support for incident type Exabeam Notable User.
First Seen
Added support for incident type Exabeam Notable User.
Last Seen
Added support for incident type Exabeam Notable User.
Mobile Phone
Added support for incident type Exabeam Notable User.
Manager Name
Added support for incident type Exabeam Notable User.
User Groups
Added support for incident type Exabeam Notable User.
Title
Added support for incident type Exabeam Notable User.
Email
Added support for incident type Exabeam Notable User.
Username
Added support for incident type Exabeam Notable User.
Risk Score
Added support for incident type Exabeam Notable User.
Display Name
Added the CrowdStrike Falcon On-Demand Scans Detection
incident type as an associated type.
Last Update Time
Added the CrowdStrike Falcon On-Demand Scans Detection
incident type as an associated type.
Vendor Product
Added the CrowdStrike Falcon On-Demand Scans Detection
incident type as an associated type.
Device Id
Added the CrowdStrike Falcon On-Demand Scans Detection
incident type as an associated type.
Cloud Service
Added the CrowdStrike Falcon OFP Detection
incident type as an associated type.
First Seen
Added the CrowdStrike Falcon OFP Detection
incident type as an associated type.
Last Seen
Added the CrowdStrike Falcon OFP Detection
incident type as an associated type.
Display Name
Added the CrowdStrike Falcon OFP Detection
incident type as an associated type.
Device Id
Added the CrowdStrike Falcon OFP Detection
incident type as an associated type.
Vendor Product
Added the CrowdStrike Falcon OFP Detection
incident type as an associated type.
Last Update Time
Added the CrowdStrike Falcon OFP Detection
incident type as an associated type.
User Id
Added the CrowdStrike Falcon OFP Detection
incident type as an associated type.
Added new number field which represents the number of times the indicator is detected in the organization.
Added new number field which represents the number of times the indicator is detected across all organizations.
Added new date field which represents when the indicator was first seen in the organization.
Added new date field which represents when the indicator was last seen in the organization.
File
Added default mapping to the indicator fields:
CLI Name | Context Path |
---|---|
organizationprevalence |
File.OrganizationPrevalence |
globalprevalence |
File.GlobalPrevalence |
organizationfirstseen |
File.OrganizationFirstSeen |
organizationlastseen |
File.OrganizationLastSeen |
firstseenbysource |
File.FirstSeenBySource |
lastseenbysource |
File.LastSeenBySource |
Domain
Added default mapping to the indicator fields:
CLI Name | Context Path |
---|---|
organizationprevalence |
Domain.OrganizationPrevalence |
globalprevalence |
Domain.GlobalPrevalence |
organizationfirstseen |
Domain.OrganizationFirstSeen |
organizationlastseen |
Domain.OrganizationLastSeen |
firstseenbysource |
Domain.FirstSeenBySource |
lastseenbysource |
Domain.LastSeenBySource |
URL
Added default mapping to the indicator fields:
CLI Name | Context Path |
---|---|
organizationprevalence |
URL.OrganizationPrevalence |
globalprevalence |
URL.GlobalPrevalence |
organizationfirstseen |
URL.OrganizationFirstSeen |
organizationlastseen |
URL.OrganizationLastSeen |
firstseenbysource |
URL.FirstSeenBySource |
lastseenbysource |
URL.LastSeenBySource |
IP
Added default mapping to the indicator fields:
CLI Name | Context Path |
---|---|
organizationprevalence |
IP.OrganizationPrevalence |
globalprevalence |
IP.GlobalPrevalence |
organizationfirstseen |
IP.OrganizationFirstSeen |
organizationlastseen |
IP.OrganizationLastSeen |
firstseenbysource |
IP.FirstSeenBySource |
lastseenbysource |
IP.LastSeenBySource |
IPv6
Added default mapping to the indicator fields:
| CLI Name | Context Path |
| --- | --- |
| organizationprevalence
| IPv6.OrganizationPrevalence |
| globalprevalence
| IPv6.GlobalPrevalence |
| organizationfirstseen
| IPv6.OrganizationFirstSeen |
| organizationlastseen
| IPv6.OrganizationLastSeen |
| firstseenbysource
| IPv6.FirstSeenBySource |
| lastseenbysource
| IPv6.LastSeenBySource |
Account Indicator
Changed the name of the "Reputation" section in quick-view to "Verdict" as per the convention.
Domain Indicator
Changed the name of the "Reputation" section in quick-view to "Verdict" as per the convention.
File Indicator
Changed the name of the "Reputation" section in quick-view to "Verdict" as per the convention.
Registry Key Indicator
Changed the name of the "Reputation" in quick-view section to "Verdict" as per the convention.
Email Indicator
Fixed an issue with the indicator layout quick-view missing the "Verdict" section.
File Indicator
Updated layout with canvas
tab.
Account Indicator
Updated layout with canvas
tab.
Report
Updated layout with canvas
tab.
Threat Actor
Updated layout with canvas
tab.
URL Indicator
Updated layout with canvas
tab.
X509 Certificate
Updated layout with canvas
tab.
Mutex
Updated layout with canvas
tab.
Campaign
Updated layout with canvas
tab.
Location
Updated layout with canvas
tab.
Tool Indicator
Updated layout with canvas
tab.
Attack Pattern
Updated layout with canvas
tab.
Infrastructure
Updated layout with canvas
tab.
IP Indicator
Updated layout with canvas
tab.
Malware Indicator
Updated layout with canvas
tab.
Course of Action
Updated layout with canvas
tab.
Host Indicator
Updated layout with canvas
tab.
Tool
Updated layout with canvas
tab.
Email Indicator
Updated layout with canvas
tab.
CVE Indicator
Updated layout with canvas
tab.
Domain Indicator
Updated layout with canvas
tab.
Identity
Updated layout with canvas
tab.
Software
Updated layout with canvas
tab.
Intrusion Set
Updated layout with canvas
tab.
ASN
Updated layout with canvas
tab.
Registry Key Indicator
Updated layout with canvas
tab.
Malware
Updated layout with canvas
tab.
File Indicator
Updated the layout to support enrichment excluded indicators - added a toggle switch when editing the indicator to mark it as "Enrichment Excluded", Once excluded, the "Enrich" buttons will be disabled, a new banner will be displayed next to the indicator value, and a field called "Enrichment Excluded" will be added to the layout and will show as "True". (From Cortex XSOAR 8.8)
Domain Indicator
Updated the layout to support enrichment excluded indicators - added a toggle switch when editing the indicator to mark it as "Enrichment Excluded", Once excluded, the "Enrich" buttons will be disabled, a new banner will be displayed next to the indicator value, and a field called "Enrichment Excluded" will be added to the layout and will show as "True". (From Cortex XSOAR 8.8)
URL Indicator
Updated the layout to support enrichment excluded indicators - added a toggle switch when editing the indicator to mark it as "Enrichment Excluded", Once excluded, the "Enrich" buttons will be disabled, a new banner will be displayed next to the indicator value, and a field called "Enrichment Excluded" will be added to the layout and will show as "True". (From Cortex XSOAR 8.8)
Email Indicator
Updated the layout to support enrichment excluded indicators - added a toggle switch when editing the indicator to mark it as "Enrichment Excluded", Once excluded, the "Enrich" buttons will be disabled, a new banner will be displayed next to the indicator value, and a field called "Enrichment Excluded" will be added to the layout and will show as "True". (From Cortex XSOAR 8.8)
IP Indicator
Updated the layout to support enrichment excluded indicators - added a toggle switch when editing the indicator to mark it as "Enrichment Excluded", Once excluded, the "Enrich" buttons will be disabled, a new banner will be displayed next to the indicator value, and a field called "Enrichment Excluded" will be added to the layout and will show as "True". (From Cortex XSOAR 8.8)
Location
Added support for incident type Exabeam Notable User.
Department
Added support for incident type Exabeam Notable User.
End Time
Added support for incident type Exabeam Notable User.
Work Phone
Added support for incident type Exabeam Notable User.
Start Time
Added support for incident type Exabeam Notable User.
First Seen
Added support for incident type Exabeam Notable User.
Last Seen
Added support for incident type Exabeam Notable User.
Mobile Phone
Added support for incident type Exabeam Notable User.
Manager Name
Added support for incident type Exabeam Notable User.
User Groups
Added support for incident type Exabeam Notable User.
Title
Added support for incident type Exabeam Notable User.
Email
Added support for incident type Exabeam Notable User.
Risk Score
Added support for incident type Exabeam Notable User.
Display Name
Added the CrowdStrike Falcon On-Demand Scans Detection
incident type as an associated type.
Last Update Time
Added the CrowdStrike Falcon On-Demand Scans Detection
incident type as an associated type.
Vendor Product
Added the CrowdStrike Falcon On-Demand Scans Detection
incident type as an associated type.
Device Id
Added the CrowdStrike Falcon On-Demand Scans Detection
incident type as an associated type.
Certification | Certified | Read more |
Supported By | Cortex | |
Created | July 26, 2020 | |
Last Release | July 3, 2025 |