Malware
The Malware object describes the classification of known malicious software, which is intentionally designed to cause damage to a computer, server, client, or computer network.
Attributes
Caption | Name | Type | Description |
---|---|---|---|
Classification IDs | classification_ids |
Integer[] |
The list of normalized identifiers of the malware classifications. Reference: STIX Malware Types
|
Classifications | classifications |
String[] |
The list of malware classifications, normalized to the captions of the classification_ids values. In the case of 'Other', they are defined by the event source.
|
CVE UIDs | cve_uids |
String[] |
The common vulnerabilities and exposures (CVE) unique identifiers.
|
CVE List | cves |
CVE[] | List of Common Vulnerabilities and Exposures (CVE). |
Name | name |
String | The malware name, as reported by the detection engine. |
Path | path |
Path Name | The filesystem path of the malware that was observed. |
Provider | provider |
String | The provider of the malware information. |
Raw Data | raw_data |
JSON | The event data as received from the event source. |
Record ID | record_id |
String | Unique identifier for the object |
Unique ID | uid |
String | The malware unique identifier, as reported by the detection engine. For example a virus id or an IPS signature id. |
Unmapped Data | unmapped |
Unmapped[] | The attributes that are not mapped to the event schema. The names and values of those attributes are specific to the event source. |
Relationships
Inbound Relationships
These objects and events reference Malware in their attributes:
- Network Activity
- Network File Activity
- RDP Activity
- SMB Activity
- Module Activity
- File System Activity
- Web Resources Activity
- Security Finding
- Registry Key Activity
- Email Delivery Activity
- Email File Activity
- HTTP Activity
- Registry Value Activity
- SSH Activity
- Process Activity
- Scheduled Job Activity
- System Activity
- Event Log Activity
- Datastore Activity
- Email Activity
- Tunnel Activity
- Memory Activity
- Data Security Finding
- Email URL Activity
- FTP Activity
- NTP Activity
- DHCP Activity
- DNS Activity
- Detection Finding
- Windows Resource Activity
- Network
- Kernel Activity
- Kernel Extension Activity
- Windows Service Activity
Outbound Relationships
Malware references the following objects and events in its attributes:
This page describes qdm-1.3.2+ocsf-1.3.0
Updated about 1 month ago