OSINT

osint

The OSINT (Open Source Intelligence) object contains details related to an indicator such as the indicator itself, related indicators, geolocation, registrar information, subdomains, analyst commentary, and other contextual information. This information can be used to further enrich a detection or finding by providing decisioning support to other analysts and engineers.

Attributes

CaptionNameTypeDescription
Related DNS AnswersanswersDNS Answer[]

Any pertinent DNS answers information related to an indicator or OSINT analysis.

MITRE ATT&CK® and ATLAS™ DetailsattacksMITRE ATT&CK® & ATLAS™[]

MITRE ATT&CK Tactics, Techniques, and/or Procedures (TTPs) pertinent to an indicator or OSINT analysis.

Autonomous Systemautonomous_systemAutonomous System[]

Any pertinent autonomous system information related to an indicator or OSINT analysis.

CampaigncampaignCampaign[]

The campaign object describes details about the campaign that was the source of the activity.

CategorycategoryString

Categorizes the threat indicator based on its functional or operational role.

Analyst CommentscommentString

Analyst commentary or source commentary about an indicator or OSINT analysis.

ConfidenceconfidenceString

The confidence of an indicator being malicious and/or pertinent, normalized to the caption of the confidence_id value. In the case of 'Other', it is defined by the event source or analyst.

Confidence IDconfidence_idInteger

The normalized confidence refers to the accuracy of collected information related to the OSINT or how pertinent an indicator or analysis is to a specific event or finding. A low confidence means that the information collected or analysis conducted lacked detail or is not accurate enough to qualify an indicator as fully malicious.

  • 0: Unknown (UNKNOWN)
  • 1: Low (LOW)
  • 2: Medium (MEDIUM)
  • 3: High (HIGH)
  • 99: Other (OTHER)
Created Timecreated_timeTimestamp

The timestamp when the indicator was initially created or identified.

CreatorcreatorUser[]

Entity:USER
The identifier of the user, system, or organization that contributed the indicator.

DescriptiondescString

A detailed explanation of the indicator, including its context, purpose, and relevance.

Detection Patterndetection_patternString

The specific detection pattern or signature associated with the indicator.

Detection Patterndetection_pattern_typeString

The detection pattern type, normalized to the caption of the detection_pattern_type_id value. In the case of 'Other', it is defined by the event source.

Detection Pattern Type IDdetection_pattern_type_idInteger

Specifies the type of detection pattern used to identify the associated threat indicator.

  • 0: Unknown (UNKNOWN)
  • 1: STIX (STIX)
  • 2: PCRE (PCRE)
  • 3: SIGMA (SIGMA)
  • 4: Snort (SNORT)
  • 5: Suricata (SURICATA)
  • 6: YARA (YARA)
  • 99: Other (OTHER)
Related EmailemailEmail[]

Entity:EMAIL
Any email information pertinent to an indicator or OSINT analysis.

Related Email Authenticationemail_authEmail Authentication[]

Any email authentication information pertinent to an indicator or OSINT analysis.

Expiration Timeexpiration_timeTimestamp

The expiration date of the indicator, after which it is no longer considered reliable.

External IDexternal_uidString

A unique identifier assigned by an external system for cross-referencing.

Related FilefileFile[]

Entity:FILE
Any pertinent file information related to an indicator or OSINT analysis.

Intrusion Setsintrusion_setsString[]

A grouping of adversarial behaviors and resources believed to be associated with specific threat actors or campaigns. Intrusion sets often encompass multiple campaigns and are used to organize related activities under a common label.

Kill Chainkill_chainKill Chain Phase[]

Lockheed Martin Kill Chain Phases pertinent to an indicator or OSINT analysis.

LabelslabelsString[]

Tags or keywords associated with the indicator to enhance searchability.

Geo LocationlocationGeo Location[]

Entity:GEO_LOCATION
Any pertinent geolocation information related to an indicator or OSINT analysis.

MalwaremalwareMalware[]

A list of Malware objects, describing details about the identified malware.

Modified Timemodified_timeTimestamp

The timestamp of the last modification or update to the indicator.

NamenameString

The name is a pointer/reference to an attribute within the OCSF event data. For example: file.name.

Raw Dataraw_dataJSON

Group:context
The event data as received from the event source.

Record IDrecord_idString

Group:primary
Unique identifier for the object

ReferencesreferencesString[]

Provides a reference to an external source of information related to the CTI being represented. This may include a URL, a document, or some other type of reference that provides additional context or information about the CTI.

Reputation ScoresreputationReputation[]

Related reputational analysis from third-party engines and analysts for a given indicator or OSINT analysis.

Risk Scorerisk_scoreInteger

A numerical representation of the threat indicator’s risk level.

Related Script DatascriptScript[]

Any pertinent script information related to an indicator or OSINT analysis.

SeverityseverityString

Represents the severity level of the threat indicator, typically reflecting its potential impact or damage.

Severity IDseverity_idInteger

The normalized severity level of the threat indicator, typically reflecting its potential impact or damage.

  • 0: Unknown (UNKNOWN)
  • 1: Informational (INFORMATIONAL)
  • 2: Low (LOW)
  • 3: Medium (MEDIUM)
  • 4: High (HIGH)
  • 5: Critical (CRITICAL)
  • 6: Fatal (FATAL)
  • 99: Other (OTHER)
Related Digital SignaturessignaturesDigital Signature[]

Any digital signatures or hashes related to an indicator or OSINT analysis.

Source URLsrc_urlURL String

Entity:URL_STRING
The source URL of an indicator or OSINT analysis, e.g., a URL back to a TIP, report, or otherwise.

Related SubdomainssubdomainsString[]

Any pertinent subdomain information - such as those generated by a Domain Generation Algorithm - related to an indicator or OSINT analysis.

Related SubnetsubnetSubnet

Entity:SUBNET
A CIDR or network block related to an indicator or OSINT analysis.

Threat Actorthreat_actorThreat Actor[]

A threat actor is an individual or group that conducts malicious cyber activities, often with financial, political, or ideological motives.

Traffic Light ProtocoltlpString

The Traffic Light Protocol was created to facilitate greater sharing of potentially sensitive information and more effective collaboration. TLP provides a simple and intuitive schema for indicating with whom potentially sensitive information can be shared.

  • AMBER: TLP:AMBER (TLPAMBER)
  • AMBER STRICT: TLP:AMBER+STRICT (TLPAMBER+STRICT)
  • CLEAR: TLP:CLEAR (TLPCLEAR)
  • GREEN: TLP:GREEN (TLPGREEN)
  • RED: TLP:RED (TLPRED)
  • WHITE: TLP:WHITE (TLPWHITE)
TypetypeString

The OSINT indicator type.

Indicator Type IDtype_idInteger

The OSINT indicator type ID.

  • 0: Unknown (UNKNOWN)
  • 1: IP Address (IP_ADDRESS)
  • 2: Domain (DOMAIN)
  • 3: Hostname (HOSTNAME)
  • 4: Hash (HASH)
  • 5: URL (URL)
  • 6: User Agent (USER_AGENT)
  • 7: Digital Certificate (DIGITAL_CERTIFICATE)
  • 8: Email (EMAIL)
  • 9: Email Address (EMAIL_ADDRESS)
  • 10: Vulnerability (VULNERABILITY)
  • 11: File (FILE)
  • 12: Registry Key (REGISTRY_KEY)
  • 13: Registry Value (REGISTRY_VALUE)
  • 14: Command Line (COMMAND_LINE)
  • 99: Other (OTHER)
Unique IDuidString

The unique identifier for the OSINT object.

UnmappedunmappedUnmapped[]

Data from the source that was not mapped into the schema.

Uploaded Timeuploaded_timeTimestamp

The timestamp indicating when the associated indicator or intelligence was added to the system or repository.

IndicatorvalueString

The actual indicator value in scope, e.g., a SHA-256 hash hexdigest or a domain name.

Vendor Namevendor_nameString

The vendor name of a tool which generates intelligence or provides indicators.

Related VulnerabilitiesvulnerabilitiesVulnerability Details[]

Any vulnerabilities related to an indicator or OSINT analysis.

WHOISwhoisWHOIS[]

Any pertinent WHOIS information related to an indicator or OSINT analysis.

Relationships

OSINT shown in context

Inbound Relationships

These objects and events reference OSINT in their attributes:

Outbound Relationships

OSINT references the following objects and events in its attributes:

This page describes qdm-1.5.1+ocsf-1.6.0