File Threat Intelligence
Insights from threat intelligence platforms about files
Attributes
Caption | Name | Type | Description |
---|---|---|---|
Details | details |
String | Details about the IP address. |
Filenames | filenames |
String[] | The names a file is known by. |
Findings | findings |
Finding[] | The findings from threat intelligence platforms |
Fingerprints | fingerprints |
Fingerprint[] | An array of known fingerprints for the file. |
First Seen | first_seen_time |
Timestamp | The initial detection time of the activity or object. See specific usage |
Labels | labels |
String[] | The labels or tags in the intelligence. |
Last Seen | last_seen_time |
Timestamp | The most recent detection time of the activity or object. See specific usage. |
Raw Data | raw_data |
JSON | The event data as received from the event source. |
Record ID | record_id |
String | Unique identifier for the object |
Additional references for more information. | references |
String[] | A list of reference URLs supporting the finding/detection. |
Reputations | reputations |
Reputation[] | Reputation score as reported by provider |
Unmapped Data | unmapped |
Unmapped[] | The attributes that are not mapped to the event schema. The names and values of those attributes are specific to the event source. |
Vendor Name | vendor_name |
String | The vendor that provided the intelligence. |
Relationships
Outbound Relationships
File Threat Intelligence references the following objects and events in its attributes:
This page describes qdm-1.3.2+ocsf-1.3.0
Updated about 2 months ago