Data Sets - Unique Fields
Data_Set
Field
Description
botnet_tracker
c2
Command & Control for botnet
breach_data
breach_date
timestamp of breach data file, or date of breach discovery
breach_data
breach_line_data
raw data string from breach data file, typically in a [user:password] format
breach_data
breach_name
common name for the breach, or name of the file containing breach data
darkweb
site_name
name of website
darkweb
site_type
dark website category
darkweb
site_url
link to url (.onion) where indicator was identified
darkweb_forum
post_author
name of user posting forum content
darkweb_forum
post_category
category assigned by forum or post author
darkweb_forum
post_content
content of the forum post
darkweb_forum
post_reply_author
name of user replying to original post content
darkweb_forum
post_reply_content
content of reply post
darkweb_forum
post_reply_timestamp
timestamp or reply post
darkweb_forum
post_timestamp
timestamp of original post
darkweb_forum
post_title
title of the forum post
darkweb_marketplace
item_category
category assigned by marketplace or vendor
darkweb_marketplace
item_description
description of item being sold
darkweb_marketplace
item_price
price of item being sold (as listed)
darkweb_marketplace
item_title
name of the item being sold
darkweb_marketplace
item_vendor
vendor selling the item
darkweb_ransomware
victim_address
address of ransomware victim
darkweb_ransomware
victim_description
description of leaked information
darkweb_ransomware
victim_domain
domain (website) of ransomware victim
darkweb_ransomware
victim_email
email address listed as contact for victim company
darkweb_ransomware
victim_files
name of files leaked
darkweb_ransomware
victim_name
name of ransomware victim
darkweb_ransomware
victim_phone
phone number listed as contact for victim company
darkweb_ransomware
victim_published_data_size
volume of data being leaked
keylogger_data
attacker_server
name of keylogger endpoint from which output was observed
keylogger_data
password_redact
populated with '' if password was captured by keylogger
keylogger_data
username
observed username captured captured by keylogger (if applicable)
keylogger_data
victim_src_ip
IP address observed sending keylogger outputs. While named victim_src_ip, this IP may not always represent a victim, for example if non-keylogger data was observed sending information to the endpoint
keylogger_data
victim_whois
Whois of victim_src_ip
keylogger_data
description
name of keylogger output file- this can define the type of keylogger variant, such as Predator or Hawkeye
malicious_email_detections
detection_shortname
normalized antivirus name
malicious_email_detections
detection_name
antivirus detection name
malicious_email_detections
vendor
antivirus vendor
malicious_emails
detection
number of postivie antivirus detections
malicious_emails
email_type
type of email: either MSG or EML
malicious_emails_context
detections
complete list of antivirus detection names
malicious_emails_context
recipients
email account(s) receiving malicous email
malicious_emails_context
sender
email account sending email
malicious_emails_context
subject_line
observed subject line
malicious_emails_context
targets
organization receiving malicious email
open_cloud_buckets
bucket
AWS or Azure server where data is hosted
open_cloud_buckets
id
AWS or Azure server ID number
open_cloud_buckets
type
AWS or Azure
open_cloud_bucket_files
filename
name of the file hosted on AWS or Azure server
open_cloud_bucket_files
full_path
path of file being hosted on AWS or Azure server
open_cloud_bucket_files
size
size of file (bytes)
open_cloud_bucket_files
type
AWS or Azure
sinkhole_traffic
count_rec
observation count for given IP (indicator)
sinkhole_traffic
cs_asn
sinkhole_traffic
cs_bytes
sinkhole_traffic
cs_cookie
sinkhole_traffic
cs_host
sinkhole_traffic
cs_referrer
sinkhole_traffic
cs_ua
sinkhole_traffic
cs_username
sinkhole_traffic
cs_version
sinkhole_traffic
sc_bytes
sinkhole_traffic
sc_status
sinkhole_traffic
sc_substatus
sinkhole_traffic
sc_win32_status
sinkhole_traffic
tag
defines whether sikhole is APT or crimeware/botnet
source_code_secrets
git_account
user associated with the code repository
source_code_secrets
git_host
service hosting the code repository
source_code_secrets
matches
indicator from the code repository which matches a signature
source_code_secrets
matching_file
file name of the code repository file containing match (indicator)
source_code_secrets
repository_name
title of code repository
source_code_secrets
signature_name
description of the signature which triggered the match (indicator)
threat_recon
comment
free form field for analyst comments
threat_recon
process_type
defines whether an indicator was manually added (Direct) or programmatically derived(Derived_*)
threat_recon
rdata
DNS rdata record (if applicable)
threat_recon
root_node
Origin of derived indicator: only applicable for Derived_ process types
threat_recon
rrname
DNS rrname record (if applicable)
threat_recon
source
either Wapack_Propriety or Wapack_OSINT
threat_recon
tag
used for identifying other characteristics of indicator such as dynamic domain or cif indicator
Last updated