Data Sets - Unique Fields
Data_Set
Field
Description
botnet_tracker
asn
Autonomous System Number
botnet_tracker
attribution
botnet associated with network traffic
botnet_tracker
c2
Command & Control node (if identified)
breach_data
breach_date
timestamp of breach data file
breach_data
breach_line_data
raw breach data (typically username:password format) observed in breach data file
breach_data
breach_name
name of file containing breach data, or common name of the breach
keylogger_data
password_redact
populated with '' if password was captured by keylogger
keylogger_data
username
observed username captured captured by keylogger (if applicable)
keylogger_data
victim_src_ip
IP address observed sending keylogger outputs. While named victim_src_ip, this IP may not always represent a victim, for example if non-keylogger data was observed sending information to the endpoint
keylogger_data
victim_whois
Whois of victim_src_ip
keylogger_data
description
name of keylogger output file- this can define the type of keylogger variant, such as Predator or Hawkeye
malicious_email_detections
detection_shortname
normalized antivirus name
malicious_email_detections
detection_name
antivirus detection name
malicious_email_detections
vendor
antivirus vendor
malicious_emails
detection
number of postivie antivirus detections
malicious_emails
email_type
type of email: either MSG or EML
malicious_emails_context
detections
complete list of antivirus detection names
malicious_emails_context
recipients
email account(s) receiving malicous email
malicious_emails_context
sender
email account sending email
malicious_emails_context
subject_line
observed subject line
malicious_emails_context
targets
organization receiving malicious email
sinkhole_traffic
count_rec
observation count for given IP (indicator)
sinkhole_traffic
cs_asn
sinkhole_traffic
cs_bytes
sinkhole_traffic
cs_cookie
sinkhole_traffic
cs_host
sinkhole_traffic
cs_referrer
sinkhole_traffic
cs_ua
sinkhole_traffic
cs_username
sinkhole_traffic
cs_version
sinkhole_traffic
sc_bytes
sinkhole_traffic
sc_status
sinkhole_traffic
sc_substatus
sinkhole_traffic
sc_win32_status
sinkhole_traffic
tag
defines whether sikhole is APT or crimeware/botnet
threat_recon
comment
free form field for analyst comments
threat_recon
process_type
defines whether an indicator was manually added (Direct) or programmatically derived(Derived_*)
threat_recon
rdata
DNS rdata record (if applicable)
threat_recon
root_node
Origin of derived indicator: only applicable for Derived_ process types
threat_recon
rrname
DNS rrname record (if applicable)
threat_recon
source
either Wapack_Propriety or Wapack_OSINT
threat_recon
tag
used for identifying other characteristics of indicator such as dynamic domain or cif indicator
Last updated
Was this helpful?