Aller au contenu
Auto-Generated Documentation

This set of documentation is automatically generated from source, and will help ensure any change to functionality will always be documented and available on release.

Indicator

Object containing associated indicators enriching the event.

Field Type Description Required Default
confidence Keyword Identifies the vendor-neutral confidence rating using the None/Low/Medium/High scale defined in Appendix A of the STIX 2.1 framework. Vendor-specific confidence scales may be added as custom fields. Optional None
description Text Describes the type of action conducted by the threat. Optional None
email Email None Optional None
provider Keyword The name of the indicator’s provider. Optional None
reference Keyword Reference URL linking to additional information about this indicator. Optional None
scanner_stats Integer Count of AV/EDR vendors that successfully detected malicious file or URL. Optional None
sightings Integer Number of times this indicator was observed conducting threat activity. Optional None
ip IP Identifies a threat indicator as an IP address (irrespective of direction). Optional None
type Keyword Type of indicator as represented by Cyber Observable in STIX 2.0. Optional None
first_seen Date The date and time when intelligence source first reported sighting this indicator. Optional None
last_seen Date The date and time when intelligence source last reported sighting this indicator. Optional None