{"type":"api","title":"Search for Sighting entities using a ES query syntax and field filters","meta":{"id":"/apps/pubhub/media/cisco-xdr-api-docs/fa9197522b1e6452b6dbfc472555dcc7ceeb71bd/2c61df32-bc97-34af-969d-a2ce06b8e459","info":{"title":"CTIA","description":"A Threat Intelligence API service\n\n This API provides a mechanism for making Judgements on the Disposition\n of Observables, which are then distilled into a final Verdict. A\n Disposition is a statement regarding the malicious, or otherwise,\n nature of an Observable.\n\n The Judgements can be grouped into Indicators, which can be associated\n with Campaigns, Actors and TTPs. Feedback can be given on specific\n Judgements, indicating agreement or disagreement, or clarification.\n\n When an Observable with a malicious Verdict is seen, it can be recorded as\n a Sighting, and the Relations that Observable had with other Observables can\n be recorded as well.\n\n We support a pre-defined set of Observable Types. Each Observable Type has a\n specific form of natural identifier, its ID, which is almost always\n the default way it is represented when observed in the wild.\n\n * Ipv4/IPv6 -- 192.168.1.1\n * Domain/Hostname -- foo.com, www.bar.com\n * SHA256 -- the sha256 checksum of a file, or other data blob\n * MD5 -- the md5 checksum of a file, or other data blob\n * SHA1 -- the sha1 checksum of a file, or other data blob\n * URL -- A minimal form of the URL\n\n The Verdict is derived from all of the Judgements on that Observable which\n have not yet expired. The highest priority Judgement becomes the\n active verdict. If there is more than one Judgement with that\n priority, than Clean disposition has priority over all others, then\n Malicious disposition, and so on down to Unknown.\n\n \u003ca href='/doc/README.md'\u003eCTIA Documentation\u003c/a\u003e","contact":{"name":"Cisco Security Business Group -- Advanced Threat ","url":"http://github.com/threatgrid/ctia","email":"cisco-intel-api-support@cisco.com"},"license":{"name":"All Rights Reserved","url":""},"version":"2.24.0"},"security":[{"oAuth2":["integration:read","private-intel:read","profile:read","inspect:read","users:read","invite:read","enrich:read","oauth:read","response:read","global-intel:read","ao:read","playbook:read"]}],"tags":[{"name":"Actor","description":"Actor operations"},{"name":"Asset","description":"Asset operations"},{"name":"Asset Mapping","description":"Asset Mapping operations"},{"name":"Asset Properties","description":"Asset Properties operations"},{"name":"Attack Pattern","description":"Attack Pattern operations"},{"name":"Campaign","description":"Campaign operations"},{"name":"Casebook","description":"Casebook operations"},{"name":"COA","description":"COA operations"},{"name":"Event","description":"Events operations"},{"name":"Feed","description":"Feed operations"},{"name":"Incident","description":"Incident operations"},{"name":"Indicator","description":"Indicator operations"},{"name":"Judgement","description":"Judgement operations"},{"name":"Malware","description":"Malware operations"},{"name":"Relationship","description":"Relationship operations"},{"name":"Sighting","description":"Sighting operations"},{"name":"Target Record","description":"Target Record operations"},{"name":"Tool","description":"Tool operations"}],"x-parser-conf":{"serverConfig":"select","overview":{"markdownPath":"reference/private-intel/overview.md","uri":"private-intel-ctia-api-guide"},"disableAuthEditing":true,"exampleAsDefault":true,"oAuth2":{"clientId":"client-546e34fc-c6bf-4951-ac69-f6d7987a7814","clientSecret":"MYw4_E_tBdFwUwrX6WFYKVD5LQrG2k7XrJ5J046wWE0s1gAKCxJ8VA","proxyEnabled":false},"meta":{"useProxy":true}},"openapi":"3.0.1","servers":[{"url":"https://private.intel.amp.cisco.com"}],"securitySchemes":{"oAuth2":{"type":"oauth2","flows":{"clientCredentials":{"tokenUrl":"https://visibility.amp.cisco.com/iroh/oauth2/token","scopes":{"telemetry":"Collect application data for analytics","integration:read":"Manage your modules","private-intel:read":"Access Private Intelligence","admin":"Provide admin privileges","cognitive":"Cognitive Integration","profile:read":"Get your profile information","inspect:read":"Extract Observables and data from text","asset":"Access and modify your assets","event":"Read IROH Events","feedback":"Submit Customer Feedback","sse":"SSE Integration. Manage your Devices.","registry":"Manage registry entries","users:read":"Manage users of your organization","investigation":"Perform threat analysis investigation","invite:read":"Invite users into your organization","casebook":"Access and modify your casebooks","playbook:read":"Access and modify your playbooks","orbital":"Orbital Integration.","enrich:read":"Query your configured modules for threat intelligence","oauth:read":"Manage OAuth2 Clients","vault":"Grants access to Module Vaults","response:read":"List and execute response actions using configured modules","notification":"Receive notifications from integrations","global-intel:read":"Access AMP Global Intelligence","webhook":"Manage your Webhooks","ao:read":"AO Integration."}}}}}},"spec":{"tags":["Sighting"],"summary":"Search for Sighting entities using a ES query syntax and field filters","description":"Requires capability search-sighting.","parameters":[{"name":"sort_order","in":"query","description":"Sort direction","schema":{"type":"string","enum":["desc","asc"]}},{"name":"observables.value","in":"query","schema":{"type":"string"}},{"name":"tlp","in":"query","schema":{"type":"string"}},{"name":"from","in":"query","schema":{"type":"string","format":"date-time"}},{"name":"sort_by","in":"query","description":"Sort result on fields.\n\nThe following fields are supported: confidence, count, id, language, observed_time.end_time, observed_time.start_time, observed_time.start_time,timestamp, revision, schema_version, sensor, source, source_uri, timestamp, title, tlp\n\nFields can be combined with ',' and sort order can be specified by ':asc' and ':desc'. For example:\n\n- confidence # sort by confidence ascending\n- confidence:desc # sort by confidence descending\n- confidence,count:desc # sort by confidence ascending, then count descending","schema":{"type":"string"}},{"name":"fields","in":"query","style":"form","explode":true,"schema":{"type":"array","items":{"type":"string","enum":["observed_time.end_time","confidence","tlp","id","timestamp","revision","sensor","count","observed_time.start_time","schema_version","title","source","source_uri","language"]}}},{"name":"search_after","in":"query","description":"Pagination stateless cursor","style":"form","explode":true,"schema":{"type":"array","items":{"type":"string"}}},{"name":"observables.type","in":"query","schema":{"type":"string"}},{"name":"language","in":"query","schema":{"type":"string"}},{"name":"id","in":"query","schema":{"type":"string"}},{"name":"limit","in":"query","description":"Pagination Limit","schema":{"type":"integer","format":"int64"}},{"name":"search_fields","in":"query","description":"'fields' key of Elasticsearch Fulltext Query.","style":"form","explode":true,"schema":{"type":"array","items":{"type":"string","enum":["id","short_description","observables.value","title","source","targets.observables.value","description"]}}},{"name":"offset","in":"query","description":"Pagination Offset","schema":{"type":"integer","format":"int64"}},{"name":"source","in":"query","schema":{"type":"string"}},{"name":"sensor","in":"query","schema":{"type":"string"}},{"name":"query","in":"query","schema":{"type":"string"}},{"name":"simple_query","in":"query","description":"Query String with simple query format","schema":{"type":"string"}},{"name":"revision","in":"query","schema":{"type":"integer","format":"int64"}},{"name":"to","in":"query","schema":{"type":"string","format":"date-time"}}],"responses":{"200":{"description":"","content":{"application/json":{"schema":{"type":"array","items":{"type":"object","properties":{"description":{"type":"string","description":"A description of object, which may be detailed.","example":"string"},"authorized_groups":{"type":"array","items":{"type":"string"}},"schema_version":{"type":"string"},"revision":{"type":"integer","description":"A monotonically increasing revision, incremented each time the object is changed.","format":"int64","example":10},"relations":{"type":"array","description":"Provide any context we can about where the observable came from.","example":[{"origin":"string","origin_uri":"string","relation":"Allocated","relation_info":{"keyword":"anything"},"source":{"value":"1.2.3.4","type":"ip"},"related":{"value":"1.2.3.4","type":"ip"}}],"items":{"required":["origin","related","relation","source"],"type":"object","properties":{"origin":{"type":"string","example":"string"},"origin_uri":{"type":"string","description":"A URI","example":"string"},"relation":{"type":"string","example":"Allocated"},"relation_info":{"type":"object","additionalProperties":{"type":"object","example":"anything"},"example":{"keyword":"anything"},"$$ref":"#/components/schemas/NewSightingRelationsRelationInfo"},"source":{"required":["type","value"],"type":"object","properties":{"value":{"type":"string","description":"The value of the observable.","example":"1.2.3.4"},"type":{"type":"string","description":"The type of observable.","example":"ip","enum":["file_path","mac_address","trend_micro_id","cybereason_id","process_args","s1_agent_id","device","hostname","certificate_common_name","serial_number","meraki_network_id","url","certificate_serial","meraki_org_id","cisco_cm_id","registry_key","process_path","darktrace_id","process_username","cortex_agent_id","orbital_node_id","process_uid","ngfw_name","user","certificate_issuer","ipv6","email","cisco_uc_id","sha256","crowdstrike_id","sha1","registry_name","md5","ip","domain","email_subject","imei","ngfw_id","amp_computer_guid","ms_machine_id","mutex","processor_id","swc_device_id","registry_path","odns_identity","odns_identity_label","cisco_mid","process_name","pki_serial","meraki_node_sn","email_messageid","imsi","user_agent","process_hash","file_name"]}},"additionalProperties":false,"description":"An AssetMapping is a record that a specific Observable maps to an Asset for an indicated period of time.","example":{"value":"1.2.3.4","type":"ip"},"$$ref":"#/components/schemas/Observable"},"related":{"required":["type","value"],"type":"object","properties":{"value":{"type":"string","description":"The value of the observable.","example":"1.2.3.4"},"type":{"type":"string","description":"The type of observable.","example":"ip","enum":["file_path","mac_address","trend_micro_id","cybereason_id","process_args","s1_agent_id","device","hostname","certificate_common_name","serial_number","meraki_network_id","url","certificate_serial","meraki_org_id","cisco_cm_id","registry_key","process_path","darktrace_id","process_username","cortex_agent_id","orbital_node_id","process_uid","ngfw_name","user","certificate_issuer","ipv6","email","cisco_uc_id","sha256","crowdstrike_id","sha1","registry_name","md5","ip","domain","email_subject","imei","ngfw_id","amp_computer_guid","ms_machine_id","mutex","processor_id","swc_device_id","registry_path","odns_identity","odns_identity_label","cisco_mid","process_name","pki_serial","meraki_node_sn","email_messageid","imsi","user_agent","process_hash","file_name"]}},"additionalProperties":false,"description":"An AssetMapping is a record that a specific Observable maps to an Asset for an indicated period of time.","example":{"value":"1.2.3.4","type":"ip"},"$$ref":"#/components/schemas/Observable"}},"additionalProperties":false,"description":"A relation inside a Sighting.","example":{"origin":"string","origin_uri":"string","relation":"Allocated","relation_info":{"keyword":"anything"},"source":{"value":"1.2.3.4","type":"ip"},"related":{"value":"1.2.3.4","type":"ip"}},"$$ref":"#/components/schemas/ObservedRelation"}},"sensor_coordinates":{"required":["observables","type"],"type":"object","properties":{"type":{"type":"string","description":"The sensor/actuator name that best fits a device.","example":"endpoint"},"observables":{"type":"array","example":[{"value":"1.2.3.4","type":"ip"}],"items":{"required":["type","value"],"type":"object","properties":{"value":{"type":"string","description":"The value of the observable.","example":"1.2.3.4"},"type":{"type":"string","description":"The type of observable.","example":"ip","enum":["file_path","mac_address","trend_micro_id","cybereason_id","process_args","s1_agent_id","device","hostname","certificate_common_name","serial_number","meraki_network_id","url","certificate_serial","meraki_org_id","cisco_cm_id","registry_key","process_path","darktrace_id","process_username","cortex_agent_id","orbital_node_id","process_uid","ngfw_name","user","certificate_issuer","ipv6","email","cisco_uc_id","sha256","crowdstrike_id","sha1","registry_name","md5","ip","domain","email_subject","imei","ngfw_id","amp_computer_guid","ms_machine_id","mutex","processor_id","swc_device_id","registry_path","odns_identity","odns_identity_label","cisco_mid","process_name","pki_serial","meraki_node_sn","email_messageid","imsi","user_agent","process_hash","file_name"]}},"additionalProperties":false,"description":"An AssetMapping is a record that a specific Observable maps to an Asset for an indicated period of time.","example":{"value":"1.2.3.4","type":"ip"},"$$ref":"#/components/schemas/Observable"}},"os":{"type":"string","example":"string"}},"additionalProperties":false,"description":"Describes the device that made the sighting (sensor) and contains identifying observables for the sensor.","example":{"type":"endpoint","observables":[{"value":"1.2.3.4","type":"ip"}],"os":"string"},"$$ref":"#/components/schemas/SensorCoordinates"},"observables":{"type":"array","description":"The object(s) of interest.","example":[{"value":"1.2.3.4","type":"ip"}],"items":{"required":["type","value"],"type":"object","properties":{"value":{"type":"string","description":"The value of the observable.","example":"1.2.3.4"},"type":{"type":"string","description":"The type of observable.","example":"ip","enum":["file_path","mac_address","trend_micro_id","cybereason_id","process_args","s1_agent_id","device","hostname","certificate_common_name","serial_number","meraki_network_id","url","certificate_serial","meraki_org_id","cisco_cm_id","registry_key","process_path","darktrace_id","process_username","cortex_agent_id","orbital_node_id","process_uid","ngfw_name","user","certificate_issuer","ipv6","email","cisco_uc_id","sha256","crowdstrike_id","sha1","registry_name","md5","ip","domain","email_subject","imei","ngfw_id","amp_computer_guid","ms_machine_id","mutex","processor_id","swc_device_id","registry_path","odns_identity","odns_identity_label","cisco_mid","process_name","pki_serial","meraki_node_sn","email_messageid","imsi","user_agent","process_hash","file_name"]}},"additionalProperties":false,"description":"An AssetMapping is a record that a specific Observable maps to an Asset for an indicated period of time.","example":{"value":"1.2.3.4","type":"ip"},"$$ref":"#/components/schemas/Observable"}},"authorized_users":{"type":"array","items":{"type":"string"}},"type":{"type":"string","example":"sighting","enum":["sighting"]},"created":{"type":"string","format":"date-time"},"source":{"type":"string","description":"Represents the source of the intelligence that led to the creation of the entity.","example":"string"},"external_ids":{"type":"array","description":"It is used to store a list of external identifiers that can be linked to the incident, providing a reliable and manageable way to correlate and group related events across multiple data sources. It is especially useful in larger organizations that rely on multiple security information and event management (SIEM) systems to detect security incidents. For instance, it can be used to track events across different network sensors, intrusion detection and prevention systems (IDPS), or log management platforms. \n The field can also be used to facilitate automation and orchestration workflows, where additional information can be shared among incident management systems. It can be used to cross-reference with other external tools such as threat intelligence feeds and vulnerability scanners.","example":["string"],"items":{"type":"string"}},"modified":{"type":"string","format":"date-time"},"targets":{"type":"array","description":"May include one or more targets that observed the associated indicator. Targets can include network devices, host devices, or other entities that are capable of detecting indicators of compromise.\n\nCan be used to assess the scope of potential threats, helping analysts understand which devices or components of the network may be vulnerable to attack. For example, if a particular malware strain is detected on several different systems within an organization, the `targets` field may indicate which systems are affected and which may need to be isolated or patched to prevent further spread.","example":[{"type":"endpoint","observables":[{"value":"1.2.3.4","type":"ip"}],"observed_time":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"os":"string"}],"items":{"required":["observables","observed_time","type"],"type":"object","properties":{"type":{"type":"string","description":"The sensor/actuator name that best fits a device.","example":"endpoint"},"observables":{"type":"array","example":[{"value":"1.2.3.4","type":"ip"}],"items":{"required":["type","value"],"type":"object","properties":{"value":{"type":"string","description":"The value of the observable.","example":"1.2.3.4"},"type":{"type":"string","description":"The type of observable.","example":"ip","enum":["file_path","mac_address","trend_micro_id","cybereason_id","process_args","s1_agent_id","device","hostname","certificate_common_name","serial_number","meraki_network_id","url","certificate_serial","meraki_org_id","cisco_cm_id","registry_key","process_path","darktrace_id","process_username","cortex_agent_id","orbital_node_id","process_uid","ngfw_name","user","certificate_issuer","ipv6","email","cisco_uc_id","sha256","crowdstrike_id","sha1","registry_name","md5","ip","domain","email_subject","imei","ngfw_id","amp_computer_guid","ms_machine_id","mutex","processor_id","swc_device_id","registry_path","odns_identity","odns_identity_label","cisco_mid","process_name","pki_serial","meraki_node_sn","email_messageid","imsi","user_agent","process_hash","file_name"]}},"additionalProperties":false,"description":"An AssetMapping is a record that a specific Observable maps to an Asset for an indicated period of time.","example":{"value":"1.2.3.4","type":"ip"},"$$ref":"#/components/schemas/Observable"}},"observed_time":{"required":["start_time"],"type":"object","properties":{"start_time":{"type":"string","description":"Time of the observation. If the observation was made over a period of time, than this field indicates the start of that period.","format":"date-time","example":"2016-01-01T01:01:01Z"},"end_time":{"type":"string","description":"If the observation was made over a period of time, than this field indicates the end of that period.","format":"date-time","example":"2016-01-01T01:01:01Z"}},"additionalProperties":false,"description":"Period of time when a cyber observation is valid. `start_time` must come before `end_time` (if specified).","example":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"$$ref":"#/components/schemas/ObservedTime"},"os":{"type":"string","example":"string"}},"additionalProperties":false,"description":"Describes the target of the sighting and contains identifying observables for the target.","example":{"type":"endpoint","observables":[{"value":"1.2.3.4","type":"ip"}],"observed_time":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"os":"string"},"$$ref":"#/components/schemas/IdentitySpecification"}},"short_description":{"type":"string","description":"A single line, short summary of the object.","example":"string"},"title":{"type":"string","description":"A short title for this object, used as primary display and reference value.","example":"string"},"resolution":{"type":"string","description":"Represents the disposition or actions taken on the associated threat intelligence.","example":"detected"},"internal":{"type":"boolean","description":"If `true`, indicates that the sighting was reported from internal sources, such as an organization's own internal security tools or SOC.\n Internal sightings are often considered more reliable and actionable than external sightings, which are reported from external sources and may have a lower level of trustworthiness. Internal sightings can provide more context and can help identify potential threats that are unique to a particular environment or organization.\n Internal sightings can also help organizations prioritize their security response efforts by identifying threats that are specific to their environment and may not yet be widely known.","example":false},"external_references":{"type":"array","description":"Specifies a list of external references which refers to non-CTIM information.\n\nSimilar to `external_ids` field with major differences:\n\n- `external_ids` field is used to store a list of external identifiers that can be used to link entities across different data sources. These identifiers are typically standardized and well-known, such as CVE IDs, US-CERT advisories, or other industry-standard threat intelligence feeds. The `external_ids` field can be used to facilitate automation and orchestration workflows, where additional information can be shared among incident management systems. \n\n- `external_references` field, on the other hand, is used to provide a more general mechanism for linking entities to external sources of information. The `external_references` field can include references to blog posts, articles, external documents, threat intelligence reports, and other sources of information that may not have a standardized format or identifier.","example":[{"source_name":"string","description":"string","url":"string","hashes":["string"],"external_id":"string"}],"items":{"required":["source_name"],"type":"object","properties":{"source_name":{"type":"string","description":"The source within which the external-reference is defined (system, registry, organization, etc.)","example":"string"},"description":{"type":"string","description":"Markdown string with at most 5000 characters.","example":"string"},"url":{"type":"string","description":"A URL reference to an external resource.","example":"string"},"hashes":{"type":"array","description":"Specifies a dictionary of hashes for the contents of the url.","example":["string"],"items":{"type":"string"}},"external_id":{"type":"string","description":"An identifier for the external reference content.","example":"string"}},"additionalProperties":false,"description":"External references are used to describe pointers to information represented outside of CTIM. For example, a Malware object could use an external reference to indicate an ID for that malware in an external database or a report could use references to represent source material.","example":{"source_name":"string","description":"string","url":"string","hashes":["string"],"external_id":"string"},"$$ref":"#/components/schemas/ExternalReference"}},"source_uri":{"type":"string","description":"URI of the source of the intelligence that led to the creation of the entity.","example":"string"},"language":{"type":"string","description":"The `language` field is used to specify the primary language of the affected system or the target of an attack. It can be used to provide additional context and information about the entity. The primary purpose of this field is to help analysts filter and prioritize entities based on their knowledge and expertise of different languages.\n\nFor example, if an incident involves an attack on a system in a country where a specific language is predominant, the `language` field can be used to indicate that language, which can help analysts to quickly identify and respond to incidents that may be geographically or culturally relevant. This information can be used to prioritize incidents based on their potential impact. The `language` field can also be used to help with correlation of incidents across different systems and regions, as well as to help with data analysis and reporting.","example":"string"},"id":{"type":"string","description":"Globally unique URI identifying this object.","example":"string"},"count":{"type":"integer","description":"The number of times an indicator was observed within a certain period of time.\nFor example, if an IP address associated with known malicious activity is observed once within a period of time, it may indicate a low-level threat. However, if the same IP address is observed multiple times within a short time frame, it may indicate a more severe and persistent threat.\nIt can also be used to prioritize security alerts and indicate the urgency of a response. High counts indicate that an indicator is actively being used in a larger campaign, while low counts may indicate isolated incidents.","format":"int64","example":10},"severity":{"type":"string","example":"Critical","enum":["Medium","Info","Unknown","None","High","Critical","Low"]},"tlp":{"type":"string","description":"TLP stands for [Traffic Light Protocol](https://www.us-cert.gov/tlp), which indicates precisely how a resource is intended to be shared, replicated, copied, etc.\n\nIt is used to indicate the sensitivity of the information contained within the message. This allows recipients to determine the appropriate handling and dissemination of the information based on their clearance level and need-to-know.\n\nFor example, an entity containing information about a critical vulnerability in a widely-used software might be marked as `red`, indicating that it should only be shared with a small group of highly trusted individuals who need to know in order to take appropriate action. On the other hand, a message containing more general information about security threats might be marked as `amber` or `green`, indicating that it can be shared more broadly within an organization.","example":"green","enum":["white","green","red","amber"]},"context":{"type":"object","properties":{"http_events":{"type":"array","description":"a list of `HTTPType`","example":[{"process_guid":10,"traffic":{"destination_host_name":"string","protocol":10,"source_ip":"string","destination_subnet":"string","destination_ip":"string","source_subnet":"string","destination_port":10,"direction":"incoming","source_port":10},"method":"CONNECT","time":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"type":"HTTPEvent","host":"string","process_name":"string","process_id":10,"process_username":"string","query":"string","encrypted":true,"url_port":10}],"items":{"required":["host","process_id","process_name","time","traffic","type"],"type":"object","properties":{"process_guid":{"type":"integer","format":"int64","example":10},"traffic":{"required":["destination_ip","destination_port","direction","protocol","source_ip","source_port"],"type":"object","properties":{"destination_host_name":{"type":"string","example":"string"},"protocol":{"type":"integer","description":"The IP [protocol id](https://www.iana.org/assignments/protocol-numbers/protocol-numbers.xhtml)","format":"int64","example":10},"source_ip":{"type":"string","example":"string"},"destination_subnet":{"type":"string","example":"string"},"destination_ip":{"type":"string","example":"string"},"source_subnet":{"type":"string","example":"string"},"destination_port":{"type":"integer","format":"int64","example":10},"direction":{"type":"string","example":"incoming","enum":["incoming","outgoing"]},"source_port":{"type":"integer","format":"int64","example":10}},"additionalProperties":false,"example":{"destination_host_name":"string","protocol":10,"source_ip":"string","destination_subnet":"string","destination_ip":"string","source_subnet":"string","destination_port":10,"direction":"incoming","source_port":10},"$$ref":"#/components/schemas/Traffic"},"method":{"type":"string","example":"CONNECT","enum":["OPTIONS","PATCH","TRACE","HEAD","POST","CONNECT","GET","PUT"]},"time":{"required":["start_time"],"type":"object","properties":{"start_time":{"type":"string","description":"Time of the observation. If the observation was made over a period of time, than this field indicates the start of that period.","format":"date-time","example":"2016-01-01T01:01:01Z"},"end_time":{"type":"string","description":"If the observation was made over a period of time, than this field indicates the end of that period.","format":"date-time","example":"2016-01-01T01:01:01Z"}},"additionalProperties":false,"description":"Period of time when a cyber observation is valid. `start_time` must come before `end_time` (if specified).","example":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"$$ref":"#/components/schemas/ObservedTime"},"type":{"type":"string","example":"HTTPEvent","enum":["HTTPEvent"]},"host":{"type":"string","description":"String with at most 1024 characters.","example":"string"},"process_name":{"type":"string","description":"String with at most 1024 characters.","example":"string"},"process_id":{"type":"integer","format":"int64","example":10},"process_username":{"type":"string","description":"String with at most 1024 characters.","example":"string"},"query":{"type":"string","description":"String with at most 5000 characters.","example":"string"},"encrypted":{"type":"boolean","example":true},"url_port":{"type":"integer","format":"int64","example":10}},"additionalProperties":false,"example":{"process_guid":10,"traffic":{"destination_host_name":"string","protocol":10,"source_ip":"string","destination_subnet":"string","destination_ip":"string","source_subnet":"string","destination_port":10,"direction":"incoming","source_port":10},"method":"CONNECT","time":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"type":"HTTPEvent","host":"string","process_name":"string","process_id":10,"process_username":"string","query":"string","encrypted":true,"url_port":10},"$$ref":"#/components/schemas/HTTPType"}},"process_create_events":{"type":"array","description":"a list of `ProcessCreate`","example":[{"parent_process_name":"string","process_guid":10,"parent_process_guid":10,"process_disposition":"string","parent_process_size":10,"process_size":10,"time":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"parent_process_disposition":"string","type":"ProcessCreateEvent","parent_process_username":"string","parent_process_id":10,"parent_process_args":"string","process_name":"string","process_hash":"string","process_id":10,"parent_process_hash":"string","process_username":"string","parent_creation_time":"2016-01-01T01:01:01.000Z","process_args":"string"}],"items":{"required":["process_id","process_name","time","type"],"type":"object","properties":{"parent_process_name":{"type":"string","description":"String with at most 1024 characters.","example":"string"},"process_guid":{"type":"integer","format":"int64","example":10},"parent_process_guid":{"type":"integer","format":"int64","example":10},"process_disposition":{"type":"string","description":"String with at most 1024 characters.","example":"string"},"parent_process_size":{"type":"integer","format":"int64","example":10},"process_size":{"type":"integer","format":"int64","example":10},"time":{"required":["start_time"],"type":"object","properties":{"start_time":{"type":"string","description":"Time of the observation. If the observation was made over a period of time, than this field indicates the start of that period.","format":"date-time","example":"2016-01-01T01:01:01Z"},"end_time":{"type":"string","description":"If the observation was made over a period of time, than this field indicates the end of that period.","format":"date-time","example":"2016-01-01T01:01:01Z"}},"additionalProperties":false,"description":"Period of time when a cyber observation is valid. `start_time` must come before `end_time` (if specified).","example":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"$$ref":"#/components/schemas/ObservedTime"},"parent_process_disposition":{"type":"string","description":"String with at most 1024 characters.","example":"string"},"type":{"type":"string","example":"ProcessCreateEvent","enum":["ProcessCreateEvent"]},"parent_process_username":{"type":"string","description":"String with at most 1024 characters.","example":"string"},"parent_process_id":{"type":"integer","format":"int64","example":10},"parent_process_args":{"type":"string","description":"String with at most 2048 characters.","example":"string"},"process_name":{"type":"string","description":"String with at most 1024 characters.","example":"string"},"process_hash":{"type":"string","description":"String with at most 2048 characters.","example":"string"},"process_id":{"type":"integer","format":"int64","example":10},"parent_process_hash":{"type":"string","description":"String with at most 2048 characters.","example":"string"},"process_username":{"type":"string","description":"String with at most 1024 characters.","example":"string"},"parent_creation_time":{"type":"string","description":"Schema definition for all date or timestamp values. Serialized as a string, the field should follow the rules of the [ISO8601](https://en.wikipedia.org/wiki/ISO_8601) standard.","format":"date-time","example":"2016-01-01T01:01:01Z"},"process_args":{"type":"string","description":"String with at most 2048 characters.","example":"string"}},"additionalProperties":false,"example":{"parent_process_name":"string","process_guid":10,"parent_process_guid":10,"process_disposition":"string","parent_process_size":10,"process_size":10,"time":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"parent_process_disposition":"string","type":"ProcessCreateEvent","parent_process_username":"string","parent_process_id":10,"parent_process_args":"string","process_name":"string","process_hash":"string","process_id":10,"parent_process_hash":"string","process_username":"string","parent_creation_time":"2016-01-01T01:01:01.000Z","process_args":"string"},"$$ref":"#/components/schemas/ProcessCreateType"}},"registry_delete_events":{"type":"array","description":"a list of `RegistryDeleteType`","example":[{"time":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"process_id":10,"process_name":"string","process_guid":10,"process_username":"string","registry_key":"string","type":"RegistryDeleteEvent","registry_value":"string"}],"items":{"required":["process_id","process_name","registry_key","time","type"],"type":"object","properties":{"time":{"required":["start_time"],"type":"object","properties":{"start_time":{"type":"string","description":"Time of the observation. If the observation was made over a period of time, than this field indicates the start of that period.","format":"date-time","example":"2016-01-01T01:01:01Z"},"end_time":{"type":"string","description":"If the observation was made over a period of time, than this field indicates the end of that period.","format":"date-time","example":"2016-01-01T01:01:01Z"}},"additionalProperties":false,"description":"Period of time when a cyber observation is valid. `start_time` must come before `end_time` (if specified).","example":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"$$ref":"#/components/schemas/ObservedTime"},"process_id":{"type":"integer","format":"int64","example":10},"process_name":{"type":"string","description":"String with at most 1024 characters.","example":"string"},"process_guid":{"type":"integer","format":"int64","example":10},"process_username":{"type":"string","description":"String with at most 1024 characters.","example":"string"},"registry_key":{"type":"string","description":"String with at most 1024 characters.","example":"string"},"type":{"type":"string","example":"RegistryDeleteEvent","enum":["RegistryDeleteEvent"]},"registry_value":{"type":"string","description":"String with at most 2048 characters.","example":"string"}},"additionalProperties":false,"example":{"time":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"process_id":10,"process_name":"string","process_guid":10,"process_username":"string","registry_key":"string","type":"RegistryDeleteEvent","registry_value":"string"},"$$ref":"#/components/schemas/RegistryDeleteType"}},"file_modify_events":{"type":"array","description":"a list of `FileModifyType`","example":[{"file_name":"string","process_guid":10,"time":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"type":"FileModifyEvent","file_path":"string","process_name":"string","process_id":10,"process_username":"string","failed":false}],"items":{"required":["file_name","file_path","process_id","process_name","time","type"],"type":"object","properties":{"file_name":{"type":"string","description":"String with at most 1024 characters.","example":"string"},"process_guid":{"type":"integer","format":"int64","example":10},"time":{"required":["start_time"],"type":"object","properties":{"start_time":{"type":"string","description":"Time of the observation. If the observation was made over a period of time, than this field indicates the start of that period.","format":"date-time","example":"2016-01-01T01:01:01Z"},"end_time":{"type":"string","description":"If the observation was made over a period of time, than this field indicates the end of that period.","format":"date-time","example":"2016-01-01T01:01:01Z"}},"additionalProperties":false,"description":"Period of time when a cyber observation is valid. `start_time` must come before `end_time` (if specified).","example":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"$$ref":"#/components/schemas/ObservedTime"},"type":{"type":"string","example":"FileModifyEvent","enum":["FileModifyEvent"]},"file_path":{"type":"string","description":"String with at most 2048 characters.","example":"string"},"process_name":{"type":"string","description":"String with at most 1024 characters.","example":"string"},"process_id":{"type":"integer","format":"int64","example":10},"process_username":{"type":"string","description":"String with at most 1024 characters.","example":"string"},"failed":{"type":"boolean","example":false}},"additionalProperties":false,"example":{"file_name":"string","process_guid":10,"time":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"type":"FileModifyEvent","file_path":"string","process_name":"string","process_id":10,"process_username":"string","failed":false},"$$ref":"#/components/schemas/FileModifyType"}},"registry_set_events":{"type":"array","description":"a list of `RegistrySetType`","example":[{"process_guid":10,"registry_data":"string","time":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"type":"RegistrySetEvent","registry_data_length":10,"registry_value":"string","registry_key":"string","process_name":"string","process_id":10,"process_username":"string"}],"items":{"required":["process_id","process_name","registry_key","registry_value","time","type"],"type":"object","properties":{"process_guid":{"type":"integer","format":"int64","example":10},"registry_data":{"type":"string","description":"String with at most 5000 characters.","example":"string"},"time":{"required":["start_time"],"type":"object","properties":{"start_time":{"type":"string","description":"Time of the observation. If the observation was made over a period of time, than this field indicates the start of that period.","format":"date-time","example":"2016-01-01T01:01:01Z"},"end_time":{"type":"string","description":"If the observation was made over a period of time, than this field indicates the end of that period.","format":"date-time","example":"2016-01-01T01:01:01Z"}},"additionalProperties":false,"description":"Period of time when a cyber observation is valid. `start_time` must come before `end_time` (if specified).","example":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"$$ref":"#/components/schemas/ObservedTime"},"type":{"type":"string","example":"RegistrySetEvent","enum":["RegistrySetEvent"]},"registry_data_length":{"type":"integer","format":"int64","example":10},"registry_value":{"type":"string","description":"String with at most 2048 characters.","example":"string"},"registry_key":{"type":"string","description":"String with at most 1024 characters.","example":"string"},"process_name":{"type":"string","description":"String with at most 1024 characters.","example":"string"},"process_id":{"type":"integer","format":"int64","example":10},"process_username":{"type":"string","description":"String with at most 1024 characters.","example":"string"}},"additionalProperties":false,"example":{"process_guid":10,"registry_data":"string","time":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"type":"RegistrySetEvent","registry_data_length":10,"registry_value":"string","registry_key":"string","process_name":"string","process_id":10,"process_username":"string"},"$$ref":"#/components/schemas/RegistrySetType"}},"file_create_events":{"type":"array","description":"a list of `FileCreateType`","example":[{"file_name":"string","process_guid":10,"time":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"type":"FileCreateEvent","file_path":"string","process_name":"string","process_id":10,"process_username":"string","failed":false}],"items":{"required":["file_name","file_path","process_id","process_name","time","type"],"type":"object","properties":{"file_name":{"type":"string","description":"String with at most 1024 characters.","example":"string"},"process_guid":{"type":"integer","format":"int64","example":10},"time":{"required":["start_time"],"type":"object","properties":{"start_time":{"type":"string","description":"Time of the observation. If the observation was made over a period of time, than this field indicates the start of that period.","format":"date-time","example":"2016-01-01T01:01:01Z"},"end_time":{"type":"string","description":"If the observation was made over a period of time, than this field indicates the end of that period.","format":"date-time","example":"2016-01-01T01:01:01Z"}},"additionalProperties":false,"description":"Period of time when a cyber observation is valid. `start_time` must come before `end_time` (if specified).","example":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"$$ref":"#/components/schemas/ObservedTime"},"type":{"type":"string","example":"FileCreateEvent","enum":["FileCreateEvent"]},"file_path":{"type":"string","description":"String with at most 2048 characters.","example":"string"},"process_name":{"type":"string","description":"String with at most 1024 characters.","example":"string"},"process_id":{"type":"integer","format":"int64","example":10},"process_username":{"type":"string","description":"String with at most 1024 characters.","example":"string"},"failed":{"type":"boolean","example":false}},"additionalProperties":false,"example":{"file_name":"string","process_guid":10,"time":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"type":"FileCreateEvent","file_path":"string","process_name":"string","process_id":10,"process_username":"string","failed":false},"$$ref":"#/components/schemas/FileCreateType"}},"registry_create_events":{"type":"array","description":"a list of `RegistryCreateType`","example":[{"time":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"process_id":10,"process_name":"string","process_guid":10,"process_username":"string","registry_key":"string","type":"RegistryCreateEvent"}],"items":{"required":["process_id","process_name","registry_key","time","type"],"type":"object","properties":{"time":{"required":["start_time"],"type":"object","properties":{"start_time":{"type":"string","description":"Time of the observation. If the observation was made over a period of time, than this field indicates the start of that period.","format":"date-time","example":"2016-01-01T01:01:01Z"},"end_time":{"type":"string","description":"If the observation was made over a period of time, than this field indicates the end of that period.","format":"date-time","example":"2016-01-01T01:01:01Z"}},"additionalProperties":false,"description":"Period of time when a cyber observation is valid. `start_time` must come before `end_time` (if specified).","example":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"$$ref":"#/components/schemas/ObservedTime"},"process_id":{"type":"integer","format":"int64","example":10},"process_name":{"type":"string","description":"String with at most 1024 characters.","example":"string"},"process_guid":{"type":"integer","format":"int64","example":10},"process_username":{"type":"string","description":"String with at most 1024 characters.","example":"string"},"registry_key":{"type":"string","description":"String with at most 1024 characters.","example":"string"},"type":{"type":"string","example":"RegistryCreateEvent","enum":["RegistryCreateEvent"]}},"additionalProperties":false,"example":{"time":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"process_id":10,"process_name":"string","process_guid":10,"process_username":"string","registry_key":"string","type":"RegistryCreateEvent"},"$$ref":"#/components/schemas/RegistryCreateType"}},"library_load_events":{"type":"array","description":"a list of `LibraryLoadType`","example":[{"time":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"process_id":10,"process_name":"string","process_guid":10,"process_username":"string","type":"LibraryLoadEvent","dll_library_name":"string","dll_library_path":"string"}],"items":{"required":["dll_library_name","dll_library_path","process_id","process_name","time","type"],"type":"object","properties":{"time":{"required":["start_time"],"type":"object","properties":{"start_time":{"type":"string","description":"Time of the observation. If the observation was made over a period of time, than this field indicates the start of that period.","format":"date-time","example":"2016-01-01T01:01:01Z"},"end_time":{"type":"string","description":"If the observation was made over a period of time, than this field indicates the end of that period.","format":"date-time","example":"2016-01-01T01:01:01Z"}},"additionalProperties":false,"description":"Period of time when a cyber observation is valid. `start_time` must come before `end_time` (if specified).","example":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"$$ref":"#/components/schemas/ObservedTime"},"process_id":{"type":"integer","format":"int64","example":10},"process_name":{"type":"string","description":"String with at most 1024 characters.","example":"string"},"process_guid":{"type":"integer","format":"int64","example":10},"process_username":{"type":"string","description":"String with at most 1024 characters.","example":"string"},"type":{"type":"string","example":"LibraryLoadEvent","enum":["LibraryLoadEvent"]},"dll_library_name":{"type":"string","description":"String with at most 1024 characters.","example":"string"},"dll_library_path":{"type":"string","description":"String with at most 2048 characters.","example":"string"}},"additionalProperties":false,"example":{"time":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"process_id":10,"process_name":"string","process_guid":10,"process_username":"string","type":"LibraryLoadEvent","dll_library_name":"string","dll_library_path":"string"},"$$ref":"#/components/schemas/LibraryLoadType"}},"file_move_events":{"type":"array","description":"a list of `FileMoveType`","example":[{"file_name":"string","process_guid":10,"time":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"type":"FileMoveEvent","old_name":"string","file_path":"string","process_name":"string","process_id":10,"process_username":"string","new_name":"string"}],"items":{"required":["file_name","file_path","new_name","old_name","process_id","process_name","time","type"],"type":"object","properties":{"file_name":{"type":"string","description":"String with at most 1024 characters.","example":"string"},"process_guid":{"type":"integer","format":"int64","example":10},"time":{"required":["start_time"],"type":"object","properties":{"start_time":{"type":"string","description":"Time of the observation. If the observation was made over a period of time, than this field indicates the start of that period.","format":"date-time","example":"2016-01-01T01:01:01Z"},"end_time":{"type":"string","description":"If the observation was made over a period of time, than this field indicates the end of that period.","format":"date-time","example":"2016-01-01T01:01:01Z"}},"additionalProperties":false,"description":"Period of time when a cyber observation is valid. `start_time` must come before `end_time` (if specified).","example":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"$$ref":"#/components/schemas/ObservedTime"},"type":{"type":"string","example":"FileMoveEvent","enum":["FileMoveEvent"]},"old_name":{"type":"string","description":"String with at most 1024 characters.","example":"string"},"file_path":{"type":"string","description":"String with at most 2048 characters.","example":"string"},"process_name":{"type":"string","description":"String with at most 1024 characters.","example":"string"},"process_id":{"type":"integer","format":"int64","example":10},"process_username":{"type":"string","description":"String with at most 1024 characters.","example":"string"},"new_name":{"type":"string","description":"String with at most 1024 characters.","example":"string"}},"additionalProperties":false,"example":{"file_name":"string","process_guid":10,"time":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"type":"FileMoveEvent","old_name":"string","file_path":"string","process_name":"string","process_id":10,"process_username":"string","new_name":"string"},"$$ref":"#/components/schemas/FileMoveType"}},"file_delete_events":{"type":"array","description":"a list of `FileDeleteType`","example":[{"file_name":"string","process_guid":10,"time":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"type":"FileDeleteEvent","file_path":"string","process_name":"string","process_id":10,"process_username":"string","failed":false}],"items":{"required":["file_name","file_path","process_id","process_name","time","type"],"type":"object","properties":{"file_name":{"type":"string","description":"String with at most 1024 characters.","example":"string"},"process_guid":{"type":"integer","format":"int64","example":10},"time":{"required":["start_time"],"type":"object","properties":{"start_time":{"type":"string","description":"Time of the observation. If the observation was made over a period of time, than this field indicates the start of that period.","format":"date-time","example":"2016-01-01T01:01:01Z"},"end_time":{"type":"string","description":"If the observation was made over a period of time, than this field indicates the end of that period.","format":"date-time","example":"2016-01-01T01:01:01Z"}},"additionalProperties":false,"description":"Period of time when a cyber observation is valid. `start_time` must come before `end_time` (if specified).","example":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"$$ref":"#/components/schemas/ObservedTime"},"type":{"type":"string","example":"FileDeleteEvent","enum":["FileDeleteEvent"]},"file_path":{"type":"string","description":"String with at most 2048 characters.","example":"string"},"process_name":{"type":"string","description":"String with at most 1024 characters.","example":"string"},"process_id":{"type":"integer","format":"int64","example":10},"process_username":{"type":"string","description":"String with at most 1024 characters.","example":"string"},"failed":{"type":"boolean","example":false}},"additionalProperties":false,"example":{"file_name":"string","process_guid":10,"time":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"type":"FileDeleteEvent","file_path":"string","process_name":"string","process_id":10,"process_username":"string","failed":false},"$$ref":"#/components/schemas/FileDeleteType"}},"netflow_events":{"type":"array","description":"a list of `NetflowType`","example":[{"parent_process_name":"string","byte_count_in":10,"process_guid":10,"process_path":"string","traffic":{"destination_host_name":"string","protocol":10,"source_ip":"string","destination_subnet":"string","destination_ip":"string","source_subnet":"string","destination_port":10,"direction":"incoming","source_port":10},"flow_time":"2016-01-01T01:01:01.000Z","time":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"parent_process_account":"string","type":"NetflowEvent","process_account_type":"string","parent_process_path":"string","parent_process_id":10,"parent_process_args":"string","process_name":"string","process_account":"string","parent_process_account_type":"string","process_hash":"string","process_id":10,"parent_process_hash":"string","process_username":"string","byte_count_out":10,"process_args":"string"}],"items":{"required":["process_id","process_name","time","traffic","type"],"type":"object","properties":{"parent_process_name":{"type":"string","description":"String with at most 1024 characters.","example":"string"},"byte_count_in":{"type":"integer","format":"int64","example":10},"process_guid":{"type":"integer","format":"int64","example":10},"process_path":{"type":"string","description":"String with at most 1024 characters.","example":"string"},"traffic":{"required":["destination_ip","destination_port","direction","protocol","source_ip","source_port"],"type":"object","properties":{"destination_host_name":{"type":"string","example":"string"},"protocol":{"type":"integer","description":"The IP [protocol id](https://www.iana.org/assignments/protocol-numbers/protocol-numbers.xhtml)","format":"int64","example":10},"source_ip":{"type":"string","example":"string"},"destination_subnet":{"type":"string","example":"string"},"destination_ip":{"type":"string","example":"string"},"source_subnet":{"type":"string","example":"string"},"destination_port":{"type":"integer","format":"int64","example":10},"direction":{"type":"string","example":"incoming","enum":["incoming","outgoing"]},"source_port":{"type":"integer","format":"int64","example":10}},"additionalProperties":false,"example":{"destination_host_name":"string","protocol":10,"source_ip":"string","destination_subnet":"string","destination_ip":"string","source_subnet":"string","destination_port":10,"direction":"incoming","source_port":10},"$$ref":"#/components/schemas/Traffic"},"flow_time":{"type":"string","description":"Schema definition for all date or timestamp values. Serialized as a string, the field should follow the rules of the [ISO8601](https://en.wikipedia.org/wiki/ISO_8601) standard.","format":"date-time","example":"2016-01-01T01:01:01Z"},"time":{"required":["start_time"],"type":"object","properties":{"start_time":{"type":"string","description":"Time of the observation. If the observation was made over a period of time, than this field indicates the start of that period.","format":"date-time","example":"2016-01-01T01:01:01Z"},"end_time":{"type":"string","description":"If the observation was made over a period of time, than this field indicates the end of that period.","format":"date-time","example":"2016-01-01T01:01:01Z"}},"additionalProperties":false,"description":"Period of time when a cyber observation is valid. `start_time` must come before `end_time` (if specified).","example":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"$$ref":"#/components/schemas/ObservedTime"},"parent_process_account":{"type":"string","description":"String with at most 1024 characters.","example":"string"},"type":{"type":"string","example":"NetflowEvent","enum":["NetflowEvent"]},"process_account_type":{"type":"string","description":"String with at most 1024 characters.","example":"string"},"parent_process_path":{"type":"string","description":"String with at most 1024 characters.","example":"string"},"parent_process_id":{"type":"integer","format":"int64","example":10},"parent_process_args":{"type":"string","description":"String with at most 1024 characters.","example":"string"},"process_name":{"type":"string","description":"String with at most 1024 characters.","example":"string"},"process_account":{"type":"string","description":"String with at most 1024 characters.","example":"string"},"parent_process_account_type":{"type":"string","description":"String with at most 1024 characters.","example":"string"},"process_hash":{"type":"string","description":"String with at most 1024 characters.","example":"string"},"process_id":{"type":"integer","format":"int64","example":10},"parent_process_hash":{"type":"string","description":"String with at most 1024 characters.","example":"string"},"process_username":{"type":"string","description":"String with at most 1024 characters.","example":"string"},"byte_count_out":{"type":"integer","format":"int64","example":10},"process_args":{"type":"string","description":"String with at most 1024 characters.","example":"string"}},"additionalProperties":false,"example":{"parent_process_name":"string","byte_count_in":10,"process_guid":10,"process_path":"string","traffic":{"destination_host_name":"string","protocol":10,"source_ip":"string","destination_subnet":"string","destination_ip":"string","source_subnet":"string","destination_port":10,"direction":"incoming","source_port":10},"flow_time":"2016-01-01T01:01:01.000Z","time":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"parent_process_account":"string","type":"NetflowEvent","process_account_type":"string","parent_process_path":"string","parent_process_id":10,"parent_process_args":"string","process_name":"string","process_account":"string","parent_process_account_type":"string","process_hash":"string","process_id":10,"parent_process_hash":"string","process_username":"string","byte_count_out":10,"process_args":"string"},"$$ref":"#/components/schemas/NetflowType"}},"registry_rename_events":{"type":"array","description":"a list of `RegistryRenameType`","example":[{"time":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"process_id":10,"process_name":"string","process_guid":10,"process_username":"string","registry_key":"string","type":"RegistryRenameEvent","registry_old_key":"string"}],"items":{"required":["process_id","process_name","registry_key","registry_old_key","time","type"],"type":"object","properties":{"time":{"required":["start_time"],"type":"object","properties":{"start_time":{"type":"string","description":"Time of the observation. If the observation was made over a period of time, than this field indicates the start of that period.","format":"date-time","example":"2016-01-01T01:01:01Z"},"end_time":{"type":"string","description":"If the observation was made over a period of time, than this field indicates the end of that period.","format":"date-time","example":"2016-01-01T01:01:01Z"}},"additionalProperties":false,"description":"Period of time when a cyber observation is valid. `start_time` must come before `end_time` (if specified).","example":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"$$ref":"#/components/schemas/ObservedTime"},"process_id":{"type":"integer","format":"int64","example":10},"process_name":{"type":"string","description":"String with at most 1024 characters.","example":"string"},"process_guid":{"type":"integer","format":"int64","example":10},"process_username":{"type":"string","description":"String with at most 1024 characters.","example":"string"},"registry_key":{"type":"string","description":"String with at most 1024 characters.","example":"string"},"type":{"type":"string","example":"RegistryRenameEvent","enum":["RegistryRenameEvent"]},"registry_old_key":{"type":"string","description":"String with at most 1024 characters.","example":"string"}},"additionalProperties":false,"example":{"time":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"process_id":10,"process_name":"string","process_guid":10,"process_username":"string","registry_key":"string","type":"RegistryRenameEvent","registry_old_key":"string"},"$$ref":"#/components/schemas/RegistryRenameType"}}},"additionalProperties":false,"description":"Context including the event type that best fits the type of the sighting.","example":{"http_events":[{"process_guid":10,"traffic":{"destination_host_name":"string","protocol":10,"source_ip":"string","destination_subnet":"string","destination_ip":"string","source_subnet":"string","destination_port":10,"direction":"incoming","source_port":10},"method":"CONNECT","time":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"type":"HTTPEvent","host":"string","process_name":"string","process_id":10,"process_username":"string","query":"string","encrypted":true,"url_port":10}],"process_create_events":[{"parent_process_name":"string","process_guid":10,"parent_process_guid":10,"process_disposition":"string","parent_process_size":10,"process_size":10,"time":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"parent_process_disposition":"string","type":"ProcessCreateEvent","parent_process_username":"string","parent_process_id":10,"parent_process_args":"string","process_name":"string","process_hash":"string","process_id":10,"parent_process_hash":"string","process_username":"string","parent_creation_time":"2016-01-01T01:01:01.000Z","process_args":"string"}],"registry_delete_events":[{"time":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"process_id":10,"process_name":"string","process_guid":10,"process_username":"string","registry_key":"string","type":"RegistryDeleteEvent","registry_value":"string"}],"file_modify_events":[{"file_name":"string","process_guid":10,"time":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"type":"FileModifyEvent","file_path":"string","process_name":"string","process_id":10,"process_username":"string","failed":false}],"registry_set_events":[{"process_guid":10,"registry_data":"string","time":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"type":"RegistrySetEvent","registry_data_length":10,"registry_value":"string","registry_key":"string","process_name":"string","process_id":10,"process_username":"string"}],"file_create_events":[{"file_name":"string","process_guid":10,"time":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"type":"FileCreateEvent","file_path":"string","process_name":"string","process_id":10,"process_username":"string","failed":false}],"registry_create_events":[{"time":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"process_id":10,"process_name":"string","process_guid":10,"process_username":"string","registry_key":"string","type":"RegistryCreateEvent"}],"library_load_events":[{"time":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"process_id":10,"process_name":"string","process_guid":10,"process_username":"string","type":"LibraryLoadEvent","dll_library_name":"string","dll_library_path":"string"}],"file_move_events":[{"file_name":"string","process_guid":10,"time":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"type":"FileMoveEvent","old_name":"string","file_path":"string","process_name":"string","process_id":10,"process_username":"string","new_name":"string"}],"file_delete_events":[{"file_name":"string","process_guid":10,"time":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"type":"FileDeleteEvent","file_path":"string","process_name":"string","process_id":10,"process_username":"string","failed":false}],"netflow_events":[{"parent_process_name":"string","byte_count_in":10,"process_guid":10,"process_path":"string","traffic":{"destination_host_name":"string","protocol":10,"source_ip":"string","destination_subnet":"string","destination_ip":"string","source_subnet":"string","destination_port":10,"direction":"incoming","source_port":10},"flow_time":"2016-01-01T01:01:01.000Z","time":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"parent_process_account":"string","type":"NetflowEvent","process_account_type":"string","parent_process_path":"string","parent_process_id":10,"parent_process_args":"string","process_name":"string","process_account":"string","parent_process_account_type":"string","process_hash":"string","process_id":10,"parent_process_hash":"string","process_username":"string","byte_count_out":10,"process_args":"string"}],"registry_rename_events":[{"time":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"process_id":10,"process_name":"string","process_guid":10,"process_username":"string","registry_key":"string","type":"RegistryRenameEvent","registry_old_key":"string"}]},"$$ref":"#/components/schemas/Context"},"client_id":{"type":"string"},"groups":{"type":"array","items":{"type":"string"}},"timestamp":{"type":"string","description":"The time this object was created at, or last modified.","format":"date-time","example":"2016-01-01T01:01:01Z"},"confidence":{"type":"string","example":"High","enum":["Medium","Info","Unknown","None","High","Low"]},"observed_time":{"required":["start_time"],"type":"object","properties":{"start_time":{"type":"string","description":"Time of the observation. If the observation was made over a period of time, than this field indicates the start of that period.","format":"date-time","example":"2016-01-01T01:01:01Z"},"end_time":{"type":"string","description":"If the observation was made over a period of time, than this field indicates the end of that period.","format":"date-time","example":"2016-01-01T01:01:01Z"}},"additionalProperties":false,"description":"Period of time when a cyber observation is valid. `start_time` must come before `end_time` (if specified).","example":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"$$ref":"#/components/schemas/ObservedTime"},"owner":{"type":"string"},"sensor":{"type":"string","description":"The OpenC2 Actuator name that best fits the device that is creating this sighting (e.g. network.firewall)","example":"endpoint"},"data":{"required":["columns","rows"],"type":"object","properties":{"columns":{"type":"array","description":"an ordered list of column definitions","example":[{"name":"string","type":"integer","description":"string","required":true,"short_description":"string"}],"items":{"required":["name","type"],"type":"object","properties":{"name":{"type":"string","example":"string"},"type":{"type":"string","example":"integer","enum":["url","string","observable","number","integer","markdown"]},"description":{"type":"string","description":"Markdown string with at most 5000 characters.","example":"string"},"required":{"type":"boolean","description":"If `true`, the row entries for this column cannot contain `nulls`. Defaults to `true`.","example":true},"short_description":{"type":"string","example":"string"}},"additionalProperties":false,"example":{"name":"string","type":"integer","description":"string","required":true,"short_description":"string"},"$$ref":"#/components/schemas/ColumnDefinition"}},"rows":{"type":"array","description":"an ordered list of rows","example":[["anything"]],"items":{"type":"array","items":{"type":"object"}}},"row_count":{"type":"integer","description":"The number of rows in the data table.","format":"int64","example":10}},"additionalProperties":false,"description":"An embedded data table for the Sighting.","example":{"columns":[{"name":"string","type":"integer","description":"string","required":true,"short_description":"string"}],"rows":[["anything"]],"row_count":10},"$$ref":"#/components/schemas/SightingDataTable"}},"additionalProperties":false,"description":"A sighting indicates that a particular entity or [indicator](indicator.md) was observed in an environment and can be an indication of a current or potential threat.","example":{"description":"string","schema_version":"1.3.18","revision":10,"relations":[{"origin":"string","origin_uri":"string","relation":"Allocated","relation_info":{"keyword":"anything"},"source":{"value":"1.2.3.4","type":"ip"},"related":{"value":"1.2.3.4","type":"ip"}}],"sensor_coordinates":{"type":"endpoint","observables":[{"value":"1.2.3.4","type":"ip"}],"os":"string"},"observables":[{"value":"1.2.3.4","type":"ip"}],"type":"sighting","source":"string","external_ids":["string"],"targets":[{"type":"endpoint","observables":[{"value":"1.2.3.4","type":"ip"}],"observed_time":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"os":"string"}],"short_description":"string","title":"string","resolution":"detected","internal":false,"external_references":[{"source_name":"string","description":"string","url":"string","hashes":["string"],"external_id":"string"}],"source_uri":"string","language":"string","id":"string","count":10,"severity":"Critical","tlp":"green","context":{"http_events":[{"process_guid":10,"traffic":{"destination_host_name":"string","protocol":10,"source_ip":"string","destination_subnet":"string","destination_ip":"string","source_subnet":"string","destination_port":10,"direction":"incoming","source_port":10},"method":"CONNECT","time":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"type":"HTTPEvent","host":"string","process_name":"string","process_id":10,"process_username":"string","query":"string","encrypted":true,"url_port":10}],"process_create_events":[{"parent_process_name":"string","process_guid":10,"parent_process_guid":10,"process_disposition":"string","parent_process_size":10,"process_size":10,"time":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"parent_process_disposition":"string","type":"ProcessCreateEvent","parent_process_username":"string","parent_process_id":10,"parent_process_args":"string","process_name":"string","process_hash":"string","process_id":10,"parent_process_hash":"string","process_username":"string","parent_creation_time":"2016-01-01T01:01:01.000Z","process_args":"string"}],"registry_delete_events":[{"time":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"process_id":10,"process_name":"string","process_guid":10,"process_username":"string","registry_key":"string","type":"RegistryDeleteEvent","registry_value":"string"}],"file_modify_events":[{"file_name":"string","process_guid":10,"time":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"type":"FileModifyEvent","file_path":"string","process_name":"string","process_id":10,"process_username":"string","failed":false}],"registry_set_events":[{"process_guid":10,"registry_data":"string","time":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"type":"RegistrySetEvent","registry_data_length":10,"registry_value":"string","registry_key":"string","process_name":"string","process_id":10,"process_username":"string"}],"file_create_events":[{"file_name":"string","process_guid":10,"time":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"type":"FileCreateEvent","file_path":"string","process_name":"string","process_id":10,"process_username":"string","failed":false}],"registry_create_events":[{"time":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"process_id":10,"process_name":"string","process_guid":10,"process_username":"string","registry_key":"string","type":"RegistryCreateEvent"}],"library_load_events":[{"time":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"process_id":10,"process_name":"string","process_guid":10,"process_username":"string","type":"LibraryLoadEvent","dll_library_name":"string","dll_library_path":"string"}],"file_move_events":[{"file_name":"string","process_guid":10,"time":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"type":"FileMoveEvent","old_name":"string","file_path":"string","process_name":"string","process_id":10,"process_username":"string","new_name":"string"}],"file_delete_events":[{"file_name":"string","process_guid":10,"time":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"type":"FileDeleteEvent","file_path":"string","process_name":"string","process_id":10,"process_username":"string","failed":false}],"netflow_events":[{"parent_process_name":"string","byte_count_in":10,"process_guid":10,"process_path":"string","traffic":{"destination_host_name":"string","protocol":10,"source_ip":"string","destination_subnet":"string","destination_ip":"string","source_subnet":"string","destination_port":10,"direction":"incoming","source_port":10},"flow_time":"2016-01-01T01:01:01.000Z","time":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"parent_process_account":"string","type":"NetflowEvent","process_account_type":"string","parent_process_path":"string","parent_process_id":10,"parent_process_args":"string","process_name":"string","process_account":"string","parent_process_account_type":"string","process_hash":"string","process_id":10,"parent_process_hash":"string","process_username":"string","byte_count_out":10,"process_args":"string"}],"registry_rename_events":[{"time":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"process_id":10,"process_name":"string","process_guid":10,"process_username":"string","registry_key":"string","type":"RegistryRenameEvent","registry_old_key":"string"}]},"timestamp":"2016-01-01T01:01:01.000Z","confidence":"High","observed_time":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"sensor":"endpoint","data":{"columns":[{"name":"string","type":"integer","description":"string","required":true,"short_description":"string"}],"rows":[["anything"]],"row_count":10}},"$$ref":"#/components/schemas/PartialSighting"}}},"application/x-yaml":{"schema":{"type":"array","items":{"type":"object","properties":{"description":{"type":"string","description":"A description of object, which may be detailed.","example":"string"},"authorized_groups":{"type":"array","items":{"type":"string"}},"schema_version":{"type":"string"},"revision":{"type":"integer","description":"A monotonically increasing revision, incremented each time the object is changed.","format":"int64","example":10},"relations":{"type":"array","description":"Provide any context we can about where the observable came from.","example":[{"origin":"string","origin_uri":"string","relation":"Allocated","relation_info":{"keyword":"anything"},"source":{"value":"1.2.3.4","type":"ip"},"related":{"value":"1.2.3.4","type":"ip"}}],"items":{"required":["origin","related","relation","source"],"type":"object","properties":{"origin":{"type":"string","example":"string"},"origin_uri":{"type":"string","description":"A URI","example":"string"},"relation":{"type":"string","example":"Allocated"},"relation_info":{"type":"object","additionalProperties":{"type":"object","example":"anything"},"example":{"keyword":"anything"},"$$ref":"#/components/schemas/NewSightingRelationsRelationInfo"},"source":{"required":["type","value"],"type":"object","properties":{"value":{"type":"string","description":"The value of the observable.","example":"1.2.3.4"},"type":{"type":"string","description":"The type of observable.","example":"ip","enum":["file_path","mac_address","trend_micro_id","cybereason_id","process_args","s1_agent_id","device","hostname","certificate_common_name","serial_number","meraki_network_id","url","certificate_serial","meraki_org_id","cisco_cm_id","registry_key","process_path","darktrace_id","process_username","cortex_agent_id","orbital_node_id","process_uid","ngfw_name","user","certificate_issuer","ipv6","email","cisco_uc_id","sha256","crowdstrike_id","sha1","registry_name","md5","ip","domain","email_subject","imei","ngfw_id","amp_computer_guid","ms_machine_id","mutex","processor_id","swc_device_id","registry_path","odns_identity","odns_identity_label","cisco_mid","process_name","pki_serial","meraki_node_sn","email_messageid","imsi","user_agent","process_hash","file_name"]}},"additionalProperties":false,"description":"An AssetMapping is a record that a specific Observable maps to an Asset for an indicated period of time.","example":{"value":"1.2.3.4","type":"ip"},"$$ref":"#/components/schemas/Observable"},"related":{"required":["type","value"],"type":"object","properties":{"value":{"type":"string","description":"The value of the observable.","example":"1.2.3.4"},"type":{"type":"string","description":"The type of observable.","example":"ip","enum":["file_path","mac_address","trend_micro_id","cybereason_id","process_args","s1_agent_id","device","hostname","certificate_common_name","serial_number","meraki_network_id","url","certificate_serial","meraki_org_id","cisco_cm_id","registry_key","process_path","darktrace_id","process_username","cortex_agent_id","orbital_node_id","process_uid","ngfw_name","user","certificate_issuer","ipv6","email","cisco_uc_id","sha256","crowdstrike_id","sha1","registry_name","md5","ip","domain","email_subject","imei","ngfw_id","amp_computer_guid","ms_machine_id","mutex","processor_id","swc_device_id","registry_path","odns_identity","odns_identity_label","cisco_mid","process_name","pki_serial","meraki_node_sn","email_messageid","imsi","user_agent","process_hash","file_name"]}},"additionalProperties":false,"description":"An AssetMapping is a record that a specific Observable maps to an Asset for an indicated period of time.","example":{"value":"1.2.3.4","type":"ip"},"$$ref":"#/components/schemas/Observable"}},"additionalProperties":false,"description":"A relation inside a Sighting.","example":{"origin":"string","origin_uri":"string","relation":"Allocated","relation_info":{"keyword":"anything"},"source":{"value":"1.2.3.4","type":"ip"},"related":{"value":"1.2.3.4","type":"ip"}},"$$ref":"#/components/schemas/ObservedRelation"}},"sensor_coordinates":{"required":["observables","type"],"type":"object","properties":{"type":{"type":"string","description":"The sensor/actuator name that best fits a device.","example":"endpoint"},"observables":{"type":"array","example":[{"value":"1.2.3.4","type":"ip"}],"items":{"required":["type","value"],"type":"object","properties":{"value":{"type":"string","description":"The value of the observable.","example":"1.2.3.4"},"type":{"type":"string","description":"The type of observable.","example":"ip","enum":["file_path","mac_address","trend_micro_id","cybereason_id","process_args","s1_agent_id","device","hostname","certificate_common_name","serial_number","meraki_network_id","url","certificate_serial","meraki_org_id","cisco_cm_id","registry_key","process_path","darktrace_id","process_username","cortex_agent_id","orbital_node_id","process_uid","ngfw_name","user","certificate_issuer","ipv6","email","cisco_uc_id","sha256","crowdstrike_id","sha1","registry_name","md5","ip","domain","email_subject","imei","ngfw_id","amp_computer_guid","ms_machine_id","mutex","processor_id","swc_device_id","registry_path","odns_identity","odns_identity_label","cisco_mid","process_name","pki_serial","meraki_node_sn","email_messageid","imsi","user_agent","process_hash","file_name"]}},"additionalProperties":false,"description":"An AssetMapping is a record that a specific Observable maps to an Asset for an indicated period of time.","example":{"value":"1.2.3.4","type":"ip"},"$$ref":"#/components/schemas/Observable"}},"os":{"type":"string","example":"string"}},"additionalProperties":false,"description":"Describes the device that made the sighting (sensor) and contains identifying observables for the sensor.","example":{"type":"endpoint","observables":[{"value":"1.2.3.4","type":"ip"}],"os":"string"},"$$ref":"#/components/schemas/SensorCoordinates"},"observables":{"type":"array","description":"The object(s) of interest.","example":[{"value":"1.2.3.4","type":"ip"}],"items":{"required":["type","value"],"type":"object","properties":{"value":{"type":"string","description":"The value of the observable.","example":"1.2.3.4"},"type":{"type":"string","description":"The type of observable.","example":"ip","enum":["file_path","mac_address","trend_micro_id","cybereason_id","process_args","s1_agent_id","device","hostname","certificate_common_name","serial_number","meraki_network_id","url","certificate_serial","meraki_org_id","cisco_cm_id","registry_key","process_path","darktrace_id","process_username","cortex_agent_id","orbital_node_id","process_uid","ngfw_name","user","certificate_issuer","ipv6","email","cisco_uc_id","sha256","crowdstrike_id","sha1","registry_name","md5","ip","domain","email_subject","imei","ngfw_id","amp_computer_guid","ms_machine_id","mutex","processor_id","swc_device_id","registry_path","odns_identity","odns_identity_label","cisco_mid","process_name","pki_serial","meraki_node_sn","email_messageid","imsi","user_agent","process_hash","file_name"]}},"additionalProperties":false,"description":"An AssetMapping is a record that a specific Observable maps to an Asset for an indicated period of time.","example":{"value":"1.2.3.4","type":"ip"},"$$ref":"#/components/schemas/Observable"}},"authorized_users":{"type":"array","items":{"type":"string"}},"type":{"type":"string","example":"sighting","enum":["sighting"]},"created":{"type":"string","format":"date-time"},"source":{"type":"string","description":"Represents the source of the intelligence that led to the creation of the entity.","example":"string"},"external_ids":{"type":"array","description":"It is used to store a list of external identifiers that can be linked to the incident, providing a reliable and manageable way to correlate and group related events across multiple data sources. It is especially useful in larger organizations that rely on multiple security information and event management (SIEM) systems to detect security incidents. For instance, it can be used to track events across different network sensors, intrusion detection and prevention systems (IDPS), or log management platforms. \n The field can also be used to facilitate automation and orchestration workflows, where additional information can be shared among incident management systems. It can be used to cross-reference with other external tools such as threat intelligence feeds and vulnerability scanners.","example":["string"],"items":{"type":"string"}},"modified":{"type":"string","format":"date-time"},"targets":{"type":"array","description":"May include one or more targets that observed the associated indicator. Targets can include network devices, host devices, or other entities that are capable of detecting indicators of compromise.\n\nCan be used to assess the scope of potential threats, helping analysts understand which devices or components of the network may be vulnerable to attack. For example, if a particular malware strain is detected on several different systems within an organization, the `targets` field may indicate which systems are affected and which may need to be isolated or patched to prevent further spread.","example":[{"type":"endpoint","observables":[{"value":"1.2.3.4","type":"ip"}],"observed_time":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"os":"string"}],"items":{"required":["observables","observed_time","type"],"type":"object","properties":{"type":{"type":"string","description":"The sensor/actuator name that best fits a device.","example":"endpoint"},"observables":{"type":"array","example":[{"value":"1.2.3.4","type":"ip"}],"items":{"required":["type","value"],"type":"object","properties":{"value":{"type":"string","description":"The value of the observable.","example":"1.2.3.4"},"type":{"type":"string","description":"The type of observable.","example":"ip","enum":["file_path","mac_address","trend_micro_id","cybereason_id","process_args","s1_agent_id","device","hostname","certificate_common_name","serial_number","meraki_network_id","url","certificate_serial","meraki_org_id","cisco_cm_id","registry_key","process_path","darktrace_id","process_username","cortex_agent_id","orbital_node_id","process_uid","ngfw_name","user","certificate_issuer","ipv6","email","cisco_uc_id","sha256","crowdstrike_id","sha1","registry_name","md5","ip","domain","email_subject","imei","ngfw_id","amp_computer_guid","ms_machine_id","mutex","processor_id","swc_device_id","registry_path","odns_identity","odns_identity_label","cisco_mid","process_name","pki_serial","meraki_node_sn","email_messageid","imsi","user_agent","process_hash","file_name"]}},"additionalProperties":false,"description":"An AssetMapping is a record that a specific Observable maps to an Asset for an indicated period of time.","example":{"value":"1.2.3.4","type":"ip"},"$$ref":"#/components/schemas/Observable"}},"observed_time":{"required":["start_time"],"type":"object","properties":{"start_time":{"type":"string","description":"Time of the observation. If the observation was made over a period of time, than this field indicates the start of that period.","format":"date-time","example":"2016-01-01T01:01:01Z"},"end_time":{"type":"string","description":"If the observation was made over a period of time, than this field indicates the end of that period.","format":"date-time","example":"2016-01-01T01:01:01Z"}},"additionalProperties":false,"description":"Period of time when a cyber observation is valid. `start_time` must come before `end_time` (if specified).","example":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"$$ref":"#/components/schemas/ObservedTime"},"os":{"type":"string","example":"string"}},"additionalProperties":false,"description":"Describes the target of the sighting and contains identifying observables for the target.","example":{"type":"endpoint","observables":[{"value":"1.2.3.4","type":"ip"}],"observed_time":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"os":"string"},"$$ref":"#/components/schemas/IdentitySpecification"}},"short_description":{"type":"string","description":"A single line, short summary of the object.","example":"string"},"title":{"type":"string","description":"A short title for this object, used as primary display and reference value.","example":"string"},"resolution":{"type":"string","description":"Represents the disposition or actions taken on the associated threat intelligence.","example":"detected"},"internal":{"type":"boolean","description":"If `true`, indicates that the sighting was reported from internal sources, such as an organization's own internal security tools or SOC.\n Internal sightings are often considered more reliable and actionable than external sightings, which are reported from external sources and may have a lower level of trustworthiness. Internal sightings can provide more context and can help identify potential threats that are unique to a particular environment or organization.\n Internal sightings can also help organizations prioritize their security response efforts by identifying threats that are specific to their environment and may not yet be widely known.","example":false},"external_references":{"type":"array","description":"Specifies a list of external references which refers to non-CTIM information.\n\nSimilar to `external_ids` field with major differences:\n\n- `external_ids` field is used to store a list of external identifiers that can be used to link entities across different data sources. These identifiers are typically standardized and well-known, such as CVE IDs, US-CERT advisories, or other industry-standard threat intelligence feeds. The `external_ids` field can be used to facilitate automation and orchestration workflows, where additional information can be shared among incident management systems. \n\n- `external_references` field, on the other hand, is used to provide a more general mechanism for linking entities to external sources of information. The `external_references` field can include references to blog posts, articles, external documents, threat intelligence reports, and other sources of information that may not have a standardized format or identifier.","example":[{"source_name":"string","description":"string","url":"string","hashes":["string"],"external_id":"string"}],"items":{"required":["source_name"],"type":"object","properties":{"source_name":{"type":"string","description":"The source within which the external-reference is defined (system, registry, organization, etc.)","example":"string"},"description":{"type":"string","description":"Markdown string with at most 5000 characters.","example":"string"},"url":{"type":"string","description":"A URL reference to an external resource.","example":"string"},"hashes":{"type":"array","description":"Specifies a dictionary of hashes for the contents of the url.","example":["string"],"items":{"type":"string"}},"external_id":{"type":"string","description":"An identifier for the external reference content.","example":"string"}},"additionalProperties":false,"description":"External references are used to describe pointers to information represented outside of CTIM. For example, a Malware object could use an external reference to indicate an ID for that malware in an external database or a report could use references to represent source material.","example":{"source_name":"string","description":"string","url":"string","hashes":["string"],"external_id":"string"},"$$ref":"#/components/schemas/ExternalReference"}},"source_uri":{"type":"string","description":"URI of the source of the intelligence that led to the creation of the entity.","example":"string"},"language":{"type":"string","description":"The `language` field is used to specify the primary language of the affected system or the target of an attack. It can be used to provide additional context and information about the entity. The primary purpose of this field is to help analysts filter and prioritize entities based on their knowledge and expertise of different languages.\n\nFor example, if an incident involves an attack on a system in a country where a specific language is predominant, the `language` field can be used to indicate that language, which can help analysts to quickly identify and respond to incidents that may be geographically or culturally relevant. This information can be used to prioritize incidents based on their potential impact. The `language` field can also be used to help with correlation of incidents across different systems and regions, as well as to help with data analysis and reporting.","example":"string"},"id":{"type":"string","description":"Globally unique URI identifying this object.","example":"string"},"count":{"type":"integer","description":"The number of times an indicator was observed within a certain period of time.\nFor example, if an IP address associated with known malicious activity is observed once within a period of time, it may indicate a low-level threat. However, if the same IP address is observed multiple times within a short time frame, it may indicate a more severe and persistent threat.\nIt can also be used to prioritize security alerts and indicate the urgency of a response. High counts indicate that an indicator is actively being used in a larger campaign, while low counts may indicate isolated incidents.","format":"int64","example":10},"severity":{"type":"string","example":"Critical","enum":["Medium","Info","Unknown","None","High","Critical","Low"]},"tlp":{"type":"string","description":"TLP stands for [Traffic Light Protocol](https://www.us-cert.gov/tlp), which indicates precisely how a resource is intended to be shared, replicated, copied, etc.\n\nIt is used to indicate the sensitivity of the information contained within the message. This allows recipients to determine the appropriate handling and dissemination of the information based on their clearance level and need-to-know.\n\nFor example, an entity containing information about a critical vulnerability in a widely-used software might be marked as `red`, indicating that it should only be shared with a small group of highly trusted individuals who need to know in order to take appropriate action. On the other hand, a message containing more general information about security threats might be marked as `amber` or `green`, indicating that it can be shared more broadly within an organization.","example":"green","enum":["white","green","red","amber"]},"context":{"type":"object","properties":{"http_events":{"type":"array","description":"a list of `HTTPType`","example":[{"process_guid":10,"traffic":{"destination_host_name":"string","protocol":10,"source_ip":"string","destination_subnet":"string","destination_ip":"string","source_subnet":"string","destination_port":10,"direction":"incoming","source_port":10},"method":"CONNECT","time":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"type":"HTTPEvent","host":"string","process_name":"string","process_id":10,"process_username":"string","query":"string","encrypted":true,"url_port":10}],"items":{"required":["host","process_id","process_name","time","traffic","type"],"type":"object","properties":{"process_guid":{"type":"integer","format":"int64","example":10},"traffic":{"required":["destination_ip","destination_port","direction","protocol","source_ip","source_port"],"type":"object","properties":{"destination_host_name":{"type":"string","example":"string"},"protocol":{"type":"integer","description":"The IP [protocol id](https://www.iana.org/assignments/protocol-numbers/protocol-numbers.xhtml)","format":"int64","example":10},"source_ip":{"type":"string","example":"string"},"destination_subnet":{"type":"string","example":"string"},"destination_ip":{"type":"string","example":"string"},"source_subnet":{"type":"string","example":"string"},"destination_port":{"type":"integer","format":"int64","example":10},"direction":{"type":"string","example":"incoming","enum":["incoming","outgoing"]},"source_port":{"type":"integer","format":"int64","example":10}},"additionalProperties":false,"example":{"destination_host_name":"string","protocol":10,"source_ip":"string","destination_subnet":"string","destination_ip":"string","source_subnet":"string","destination_port":10,"direction":"incoming","source_port":10},"$$ref":"#/components/schemas/Traffic"},"method":{"type":"string","example":"CONNECT","enum":["OPTIONS","PATCH","TRACE","HEAD","POST","CONNECT","GET","PUT"]},"time":{"required":["start_time"],"type":"object","properties":{"start_time":{"type":"string","description":"Time of the observation. If the observation was made over a period of time, than this field indicates the start of that period.","format":"date-time","example":"2016-01-01T01:01:01Z"},"end_time":{"type":"string","description":"If the observation was made over a period of time, than this field indicates the end of that period.","format":"date-time","example":"2016-01-01T01:01:01Z"}},"additionalProperties":false,"description":"Period of time when a cyber observation is valid. `start_time` must come before `end_time` (if specified).","example":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"$$ref":"#/components/schemas/ObservedTime"},"type":{"type":"string","example":"HTTPEvent","enum":["HTTPEvent"]},"host":{"type":"string","description":"String with at most 1024 characters.","example":"string"},"process_name":{"type":"string","description":"String with at most 1024 characters.","example":"string"},"process_id":{"type":"integer","format":"int64","example":10},"process_username":{"type":"string","description":"String with at most 1024 characters.","example":"string"},"query":{"type":"string","description":"String with at most 5000 characters.","example":"string"},"encrypted":{"type":"boolean","example":true},"url_port":{"type":"integer","format":"int64","example":10}},"additionalProperties":false,"example":{"process_guid":10,"traffic":{"destination_host_name":"string","protocol":10,"source_ip":"string","destination_subnet":"string","destination_ip":"string","source_subnet":"string","destination_port":10,"direction":"incoming","source_port":10},"method":"CONNECT","time":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"type":"HTTPEvent","host":"string","process_name":"string","process_id":10,"process_username":"string","query":"string","encrypted":true,"url_port":10},"$$ref":"#/components/schemas/HTTPType"}},"process_create_events":{"type":"array","description":"a list of `ProcessCreate`","example":[{"parent_process_name":"string","process_guid":10,"parent_process_guid":10,"process_disposition":"string","parent_process_size":10,"process_size":10,"time":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"parent_process_disposition":"string","type":"ProcessCreateEvent","parent_process_username":"string","parent_process_id":10,"parent_process_args":"string","process_name":"string","process_hash":"string","process_id":10,"parent_process_hash":"string","process_username":"string","parent_creation_time":"2016-01-01T01:01:01.000Z","process_args":"string"}],"items":{"required":["process_id","process_name","time","type"],"type":"object","properties":{"parent_process_name":{"type":"string","description":"String with at most 1024 characters.","example":"string"},"process_guid":{"type":"integer","format":"int64","example":10},"parent_process_guid":{"type":"integer","format":"int64","example":10},"process_disposition":{"type":"string","description":"String with at most 1024 characters.","example":"string"},"parent_process_size":{"type":"integer","format":"int64","example":10},"process_size":{"type":"integer","format":"int64","example":10},"time":{"required":["start_time"],"type":"object","properties":{"start_time":{"type":"string","description":"Time of the observation. If the observation was made over a period of time, than this field indicates the start of that period.","format":"date-time","example":"2016-01-01T01:01:01Z"},"end_time":{"type":"string","description":"If the observation was made over a period of time, than this field indicates the end of that period.","format":"date-time","example":"2016-01-01T01:01:01Z"}},"additionalProperties":false,"description":"Period of time when a cyber observation is valid. `start_time` must come before `end_time` (if specified).","example":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"$$ref":"#/components/schemas/ObservedTime"},"parent_process_disposition":{"type":"string","description":"String with at most 1024 characters.","example":"string"},"type":{"type":"string","example":"ProcessCreateEvent","enum":["ProcessCreateEvent"]},"parent_process_username":{"type":"string","description":"String with at most 1024 characters.","example":"string"},"parent_process_id":{"type":"integer","format":"int64","example":10},"parent_process_args":{"type":"string","description":"String with at most 2048 characters.","example":"string"},"process_name":{"type":"string","description":"String with at most 1024 characters.","example":"string"},"process_hash":{"type":"string","description":"String with at most 2048 characters.","example":"string"},"process_id":{"type":"integer","format":"int64","example":10},"parent_process_hash":{"type":"string","description":"String with at most 2048 characters.","example":"string"},"process_username":{"type":"string","description":"String with at most 1024 characters.","example":"string"},"parent_creation_time":{"type":"string","description":"Schema definition for all date or timestamp values. Serialized as a string, the field should follow the rules of the [ISO8601](https://en.wikipedia.org/wiki/ISO_8601) standard.","format":"date-time","example":"2016-01-01T01:01:01Z"},"process_args":{"type":"string","description":"String with at most 2048 characters.","example":"string"}},"additionalProperties":false,"example":{"parent_process_name":"string","process_guid":10,"parent_process_guid":10,"process_disposition":"string","parent_process_size":10,"process_size":10,"time":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"parent_process_disposition":"string","type":"ProcessCreateEvent","parent_process_username":"string","parent_process_id":10,"parent_process_args":"string","process_name":"string","process_hash":"string","process_id":10,"parent_process_hash":"string","process_username":"string","parent_creation_time":"2016-01-01T01:01:01.000Z","process_args":"string"},"$$ref":"#/components/schemas/ProcessCreateType"}},"registry_delete_events":{"type":"array","description":"a list of `RegistryDeleteType`","example":[{"time":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"process_id":10,"process_name":"string","process_guid":10,"process_username":"string","registry_key":"string","type":"RegistryDeleteEvent","registry_value":"string"}],"items":{"required":["process_id","process_name","registry_key","time","type"],"type":"object","properties":{"time":{"required":["start_time"],"type":"object","properties":{"start_time":{"type":"string","description":"Time of the observation. If the observation was made over a period of time, than this field indicates the start of that period.","format":"date-time","example":"2016-01-01T01:01:01Z"},"end_time":{"type":"string","description":"If the observation was made over a period of time, than this field indicates the end of that period.","format":"date-time","example":"2016-01-01T01:01:01Z"}},"additionalProperties":false,"description":"Period of time when a cyber observation is valid. `start_time` must come before `end_time` (if specified).","example":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"$$ref":"#/components/schemas/ObservedTime"},"process_id":{"type":"integer","format":"int64","example":10},"process_name":{"type":"string","description":"String with at most 1024 characters.","example":"string"},"process_guid":{"type":"integer","format":"int64","example":10},"process_username":{"type":"string","description":"String with at most 1024 characters.","example":"string"},"registry_key":{"type":"string","description":"String with at most 1024 characters.","example":"string"},"type":{"type":"string","example":"RegistryDeleteEvent","enum":["RegistryDeleteEvent"]},"registry_value":{"type":"string","description":"String with at most 2048 characters.","example":"string"}},"additionalProperties":false,"example":{"time":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"process_id":10,"process_name":"string","process_guid":10,"process_username":"string","registry_key":"string","type":"RegistryDeleteEvent","registry_value":"string"},"$$ref":"#/components/schemas/RegistryDeleteType"}},"file_modify_events":{"type":"array","description":"a list of `FileModifyType`","example":[{"file_name":"string","process_guid":10,"time":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"type":"FileModifyEvent","file_path":"string","process_name":"string","process_id":10,"process_username":"string","failed":false}],"items":{"required":["file_name","file_path","process_id","process_name","time","type"],"type":"object","properties":{"file_name":{"type":"string","description":"String with at most 1024 characters.","example":"string"},"process_guid":{"type":"integer","format":"int64","example":10},"time":{"required":["start_time"],"type":"object","properties":{"start_time":{"type":"string","description":"Time of the observation. If the observation was made over a period of time, than this field indicates the start of that period.","format":"date-time","example":"2016-01-01T01:01:01Z"},"end_time":{"type":"string","description":"If the observation was made over a period of time, than this field indicates the end of that period.","format":"date-time","example":"2016-01-01T01:01:01Z"}},"additionalProperties":false,"description":"Period of time when a cyber observation is valid. `start_time` must come before `end_time` (if specified).","example":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"$$ref":"#/components/schemas/ObservedTime"},"type":{"type":"string","example":"FileModifyEvent","enum":["FileModifyEvent"]},"file_path":{"type":"string","description":"String with at most 2048 characters.","example":"string"},"process_name":{"type":"string","description":"String with at most 1024 characters.","example":"string"},"process_id":{"type":"integer","format":"int64","example":10},"process_username":{"type":"string","description":"String with at most 1024 characters.","example":"string"},"failed":{"type":"boolean","example":false}},"additionalProperties":false,"example":{"file_name":"string","process_guid":10,"time":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"type":"FileModifyEvent","file_path":"string","process_name":"string","process_id":10,"process_username":"string","failed":false},"$$ref":"#/components/schemas/FileModifyType"}},"registry_set_events":{"type":"array","description":"a list of `RegistrySetType`","example":[{"process_guid":10,"registry_data":"string","time":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"type":"RegistrySetEvent","registry_data_length":10,"registry_value":"string","registry_key":"string","process_name":"string","process_id":10,"process_username":"string"}],"items":{"required":["process_id","process_name","registry_key","registry_value","time","type"],"type":"object","properties":{"process_guid":{"type":"integer","format":"int64","example":10},"registry_data":{"type":"string","description":"String with at most 5000 characters.","example":"string"},"time":{"required":["start_time"],"type":"object","properties":{"start_time":{"type":"string","description":"Time of the observation. If the observation was made over a period of time, than this field indicates the start of that period.","format":"date-time","example":"2016-01-01T01:01:01Z"},"end_time":{"type":"string","description":"If the observation was made over a period of time, than this field indicates the end of that period.","format":"date-time","example":"2016-01-01T01:01:01Z"}},"additionalProperties":false,"description":"Period of time when a cyber observation is valid. `start_time` must come before `end_time` (if specified).","example":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"$$ref":"#/components/schemas/ObservedTime"},"type":{"type":"string","example":"RegistrySetEvent","enum":["RegistrySetEvent"]},"registry_data_length":{"type":"integer","format":"int64","example":10},"registry_value":{"type":"string","description":"String with at most 2048 characters.","example":"string"},"registry_key":{"type":"string","description":"String with at most 1024 characters.","example":"string"},"process_name":{"type":"string","description":"String with at most 1024 characters.","example":"string"},"process_id":{"type":"integer","format":"int64","example":10},"process_username":{"type":"string","description":"String with at most 1024 characters.","example":"string"}},"additionalProperties":false,"example":{"process_guid":10,"registry_data":"string","time":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"type":"RegistrySetEvent","registry_data_length":10,"registry_value":"string","registry_key":"string","process_name":"string","process_id":10,"process_username":"string"},"$$ref":"#/components/schemas/RegistrySetType"}},"file_create_events":{"type":"array","description":"a list of `FileCreateType`","example":[{"file_name":"string","process_guid":10,"time":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"type":"FileCreateEvent","file_path":"string","process_name":"string","process_id":10,"process_username":"string","failed":false}],"items":{"required":["file_name","file_path","process_id","process_name","time","type"],"type":"object","properties":{"file_name":{"type":"string","description":"String with at most 1024 characters.","example":"string"},"process_guid":{"type":"integer","format":"int64","example":10},"time":{"required":["start_time"],"type":"object","properties":{"start_time":{"type":"string","description":"Time of the observation. If the observation was made over a period of time, than this field indicates the start of that period.","format":"date-time","example":"2016-01-01T01:01:01Z"},"end_time":{"type":"string","description":"If the observation was made over a period of time, than this field indicates the end of that period.","format":"date-time","example":"2016-01-01T01:01:01Z"}},"additionalProperties":false,"description":"Period of time when a cyber observation is valid. `start_time` must come before `end_time` (if specified).","example":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"$$ref":"#/components/schemas/ObservedTime"},"type":{"type":"string","example":"FileCreateEvent","enum":["FileCreateEvent"]},"file_path":{"type":"string","description":"String with at most 2048 characters.","example":"string"},"process_name":{"type":"string","description":"String with at most 1024 characters.","example":"string"},"process_id":{"type":"integer","format":"int64","example":10},"process_username":{"type":"string","description":"String with at most 1024 characters.","example":"string"},"failed":{"type":"boolean","example":false}},"additionalProperties":false,"example":{"file_name":"string","process_guid":10,"time":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"type":"FileCreateEvent","file_path":"string","process_name":"string","process_id":10,"process_username":"string","failed":false},"$$ref":"#/components/schemas/FileCreateType"}},"registry_create_events":{"type":"array","description":"a list of `RegistryCreateType`","example":[{"time":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"process_id":10,"process_name":"string","process_guid":10,"process_username":"string","registry_key":"string","type":"RegistryCreateEvent"}],"items":{"required":["process_id","process_name","registry_key","time","type"],"type":"object","properties":{"time":{"required":["start_time"],"type":"object","properties":{"start_time":{"type":"string","description":"Time of the observation. If the observation was made over a period of time, than this field indicates the start of that period.","format":"date-time","example":"2016-01-01T01:01:01Z"},"end_time":{"type":"string","description":"If the observation was made over a period of time, than this field indicates the end of that period.","format":"date-time","example":"2016-01-01T01:01:01Z"}},"additionalProperties":false,"description":"Period of time when a cyber observation is valid. `start_time` must come before `end_time` (if specified).","example":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"$$ref":"#/components/schemas/ObservedTime"},"process_id":{"type":"integer","format":"int64","example":10},"process_name":{"type":"string","description":"String with at most 1024 characters.","example":"string"},"process_guid":{"type":"integer","format":"int64","example":10},"process_username":{"type":"string","description":"String with at most 1024 characters.","example":"string"},"registry_key":{"type":"string","description":"String with at most 1024 characters.","example":"string"},"type":{"type":"string","example":"RegistryCreateEvent","enum":["RegistryCreateEvent"]}},"additionalProperties":false,"example":{"time":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"process_id":10,"process_name":"string","process_guid":10,"process_username":"string","registry_key":"string","type":"RegistryCreateEvent"},"$$ref":"#/components/schemas/RegistryCreateType"}},"library_load_events":{"type":"array","description":"a list of `LibraryLoadType`","example":[{"time":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"process_id":10,"process_name":"string","process_guid":10,"process_username":"string","type":"LibraryLoadEvent","dll_library_name":"string","dll_library_path":"string"}],"items":{"required":["dll_library_name","dll_library_path","process_id","process_name","time","type"],"type":"object","properties":{"time":{"required":["start_time"],"type":"object","properties":{"start_time":{"type":"string","description":"Time of the observation. If the observation was made over a period of time, than this field indicates the start of that period.","format":"date-time","example":"2016-01-01T01:01:01Z"},"end_time":{"type":"string","description":"If the observation was made over a period of time, than this field indicates the end of that period.","format":"date-time","example":"2016-01-01T01:01:01Z"}},"additionalProperties":false,"description":"Period of time when a cyber observation is valid. `start_time` must come before `end_time` (if specified).","example":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"$$ref":"#/components/schemas/ObservedTime"},"process_id":{"type":"integer","format":"int64","example":10},"process_name":{"type":"string","description":"String with at most 1024 characters.","example":"string"},"process_guid":{"type":"integer","format":"int64","example":10},"process_username":{"type":"string","description":"String with at most 1024 characters.","example":"string"},"type":{"type":"string","example":"LibraryLoadEvent","enum":["LibraryLoadEvent"]},"dll_library_name":{"type":"string","description":"String with at most 1024 characters.","example":"string"},"dll_library_path":{"type":"string","description":"String with at most 2048 characters.","example":"string"}},"additionalProperties":false,"example":{"time":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"process_id":10,"process_name":"string","process_guid":10,"process_username":"string","type":"LibraryLoadEvent","dll_library_name":"string","dll_library_path":"string"},"$$ref":"#/components/schemas/LibraryLoadType"}},"file_move_events":{"type":"array","description":"a list of `FileMoveType`","example":[{"file_name":"string","process_guid":10,"time":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"type":"FileMoveEvent","old_name":"string","file_path":"string","process_name":"string","process_id":10,"process_username":"string","new_name":"string"}],"items":{"required":["file_name","file_path","new_name","old_name","process_id","process_name","time","type"],"type":"object","properties":{"file_name":{"type":"string","description":"String with at most 1024 characters.","example":"string"},"process_guid":{"type":"integer","format":"int64","example":10},"time":{"required":["start_time"],"type":"object","properties":{"start_time":{"type":"string","description":"Time of the observation. If the observation was made over a period of time, than this field indicates the start of that period.","format":"date-time","example":"2016-01-01T01:01:01Z"},"end_time":{"type":"string","description":"If the observation was made over a period of time, than this field indicates the end of that period.","format":"date-time","example":"2016-01-01T01:01:01Z"}},"additionalProperties":false,"description":"Period of time when a cyber observation is valid. `start_time` must come before `end_time` (if specified).","example":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"$$ref":"#/components/schemas/ObservedTime"},"type":{"type":"string","example":"FileMoveEvent","enum":["FileMoveEvent"]},"old_name":{"type":"string","description":"String with at most 1024 characters.","example":"string"},"file_path":{"type":"string","description":"String with at most 2048 characters.","example":"string"},"process_name":{"type":"string","description":"String with at most 1024 characters.","example":"string"},"process_id":{"type":"integer","format":"int64","example":10},"process_username":{"type":"string","description":"String with at most 1024 characters.","example":"string"},"new_name":{"type":"string","description":"String with at most 1024 characters.","example":"string"}},"additionalProperties":false,"example":{"file_name":"string","process_guid":10,"time":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"type":"FileMoveEvent","old_name":"string","file_path":"string","process_name":"string","process_id":10,"process_username":"string","new_name":"string"},"$$ref":"#/components/schemas/FileMoveType"}},"file_delete_events":{"type":"array","description":"a list of `FileDeleteType`","example":[{"file_name":"string","process_guid":10,"time":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"type":"FileDeleteEvent","file_path":"string","process_name":"string","process_id":10,"process_username":"string","failed":false}],"items":{"required":["file_name","file_path","process_id","process_name","time","type"],"type":"object","properties":{"file_name":{"type":"string","description":"String with at most 1024 characters.","example":"string"},"process_guid":{"type":"integer","format":"int64","example":10},"time":{"required":["start_time"],"type":"object","properties":{"start_time":{"type":"string","description":"Time of the observation. If the observation was made over a period of time, than this field indicates the start of that period.","format":"date-time","example":"2016-01-01T01:01:01Z"},"end_time":{"type":"string","description":"If the observation was made over a period of time, than this field indicates the end of that period.","format":"date-time","example":"2016-01-01T01:01:01Z"}},"additionalProperties":false,"description":"Period of time when a cyber observation is valid. `start_time` must come before `end_time` (if specified).","example":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"$$ref":"#/components/schemas/ObservedTime"},"type":{"type":"string","example":"FileDeleteEvent","enum":["FileDeleteEvent"]},"file_path":{"type":"string","description":"String with at most 2048 characters.","example":"string"},"process_name":{"type":"string","description":"String with at most 1024 characters.","example":"string"},"process_id":{"type":"integer","format":"int64","example":10},"process_username":{"type":"string","description":"String with at most 1024 characters.","example":"string"},"failed":{"type":"boolean","example":false}},"additionalProperties":false,"example":{"file_name":"string","process_guid":10,"time":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"type":"FileDeleteEvent","file_path":"string","process_name":"string","process_id":10,"process_username":"string","failed":false},"$$ref":"#/components/schemas/FileDeleteType"}},"netflow_events":{"type":"array","description":"a list of `NetflowType`","example":[{"parent_process_name":"string","byte_count_in":10,"process_guid":10,"process_path":"string","traffic":{"destination_host_name":"string","protocol":10,"source_ip":"string","destination_subnet":"string","destination_ip":"string","source_subnet":"string","destination_port":10,"direction":"incoming","source_port":10},"flow_time":"2016-01-01T01:01:01.000Z","time":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"parent_process_account":"string","type":"NetflowEvent","process_account_type":"string","parent_process_path":"string","parent_process_id":10,"parent_process_args":"string","process_name":"string","process_account":"string","parent_process_account_type":"string","process_hash":"string","process_id":10,"parent_process_hash":"string","process_username":"string","byte_count_out":10,"process_args":"string"}],"items":{"required":["process_id","process_name","time","traffic","type"],"type":"object","properties":{"parent_process_name":{"type":"string","description":"String with at most 1024 characters.","example":"string"},"byte_count_in":{"type":"integer","format":"int64","example":10},"process_guid":{"type":"integer","format":"int64","example":10},"process_path":{"type":"string","description":"String with at most 1024 characters.","example":"string"},"traffic":{"required":["destination_ip","destination_port","direction","protocol","source_ip","source_port"],"type":"object","properties":{"destination_host_name":{"type":"string","example":"string"},"protocol":{"type":"integer","description":"The IP [protocol id](https://www.iana.org/assignments/protocol-numbers/protocol-numbers.xhtml)","format":"int64","example":10},"source_ip":{"type":"string","example":"string"},"destination_subnet":{"type":"string","example":"string"},"destination_ip":{"type":"string","example":"string"},"source_subnet":{"type":"string","example":"string"},"destination_port":{"type":"integer","format":"int64","example":10},"direction":{"type":"string","example":"incoming","enum":["incoming","outgoing"]},"source_port":{"type":"integer","format":"int64","example":10}},"additionalProperties":false,"example":{"destination_host_name":"string","protocol":10,"source_ip":"string","destination_subnet":"string","destination_ip":"string","source_subnet":"string","destination_port":10,"direction":"incoming","source_port":10},"$$ref":"#/components/schemas/Traffic"},"flow_time":{"type":"string","description":"Schema definition for all date or timestamp values. Serialized as a string, the field should follow the rules of the [ISO8601](https://en.wikipedia.org/wiki/ISO_8601) standard.","format":"date-time","example":"2016-01-01T01:01:01Z"},"time":{"required":["start_time"],"type":"object","properties":{"start_time":{"type":"string","description":"Time of the observation. If the observation was made over a period of time, than this field indicates the start of that period.","format":"date-time","example":"2016-01-01T01:01:01Z"},"end_time":{"type":"string","description":"If the observation was made over a period of time, than this field indicates the end of that period.","format":"date-time","example":"2016-01-01T01:01:01Z"}},"additionalProperties":false,"description":"Period of time when a cyber observation is valid. `start_time` must come before `end_time` (if specified).","example":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"$$ref":"#/components/schemas/ObservedTime"},"parent_process_account":{"type":"string","description":"String with at most 1024 characters.","example":"string"},"type":{"type":"string","example":"NetflowEvent","enum":["NetflowEvent"]},"process_account_type":{"type":"string","description":"String with at most 1024 characters.","example":"string"},"parent_process_path":{"type":"string","description":"String with at most 1024 characters.","example":"string"},"parent_process_id":{"type":"integer","format":"int64","example":10},"parent_process_args":{"type":"string","description":"String with at most 1024 characters.","example":"string"},"process_name":{"type":"string","description":"String with at most 1024 characters.","example":"string"},"process_account":{"type":"string","description":"String with at most 1024 characters.","example":"string"},"parent_process_account_type":{"type":"string","description":"String with at most 1024 characters.","example":"string"},"process_hash":{"type":"string","description":"String with at most 1024 characters.","example":"string"},"process_id":{"type":"integer","format":"int64","example":10},"parent_process_hash":{"type":"string","description":"String with at most 1024 characters.","example":"string"},"process_username":{"type":"string","description":"String with at most 1024 characters.","example":"string"},"byte_count_out":{"type":"integer","format":"int64","example":10},"process_args":{"type":"string","description":"String with at most 1024 characters.","example":"string"}},"additionalProperties":false,"example":{"parent_process_name":"string","byte_count_in":10,"process_guid":10,"process_path":"string","traffic":{"destination_host_name":"string","protocol":10,"source_ip":"string","destination_subnet":"string","destination_ip":"string","source_subnet":"string","destination_port":10,"direction":"incoming","source_port":10},"flow_time":"2016-01-01T01:01:01.000Z","time":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"parent_process_account":"string","type":"NetflowEvent","process_account_type":"string","parent_process_path":"string","parent_process_id":10,"parent_process_args":"string","process_name":"string","process_account":"string","parent_process_account_type":"string","process_hash":"string","process_id":10,"parent_process_hash":"string","process_username":"string","byte_count_out":10,"process_args":"string"},"$$ref":"#/components/schemas/NetflowType"}},"registry_rename_events":{"type":"array","description":"a list of `RegistryRenameType`","example":[{"time":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"process_id":10,"process_name":"string","process_guid":10,"process_username":"string","registry_key":"string","type":"RegistryRenameEvent","registry_old_key":"string"}],"items":{"required":["process_id","process_name","registry_key","registry_old_key","time","type"],"type":"object","properties":{"time":{"required":["start_time"],"type":"object","properties":{"start_time":{"type":"string","description":"Time of the observation. If the observation was made over a period of time, than this field indicates the start of that period.","format":"date-time","example":"2016-01-01T01:01:01Z"},"end_time":{"type":"string","description":"If the observation was made over a period of time, than this field indicates the end of that period.","format":"date-time","example":"2016-01-01T01:01:01Z"}},"additionalProperties":false,"description":"Period of time when a cyber observation is valid. `start_time` must come before `end_time` (if specified).","example":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"$$ref":"#/components/schemas/ObservedTime"},"process_id":{"type":"integer","format":"int64","example":10},"process_name":{"type":"string","description":"String with at most 1024 characters.","example":"string"},"process_guid":{"type":"integer","format":"int64","example":10},"process_username":{"type":"string","description":"String with at most 1024 characters.","example":"string"},"registry_key":{"type":"string","description":"String with at most 1024 characters.","example":"string"},"type":{"type":"string","example":"RegistryRenameEvent","enum":["RegistryRenameEvent"]},"registry_old_key":{"type":"string","description":"String with at most 1024 characters.","example":"string"}},"additionalProperties":false,"example":{"time":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"process_id":10,"process_name":"string","process_guid":10,"process_username":"string","registry_key":"string","type":"RegistryRenameEvent","registry_old_key":"string"},"$$ref":"#/components/schemas/RegistryRenameType"}}},"additionalProperties":false,"description":"Context including the event type that best fits the type of the sighting.","example":{"http_events":[{"process_guid":10,"traffic":{"destination_host_name":"string","protocol":10,"source_ip":"string","destination_subnet":"string","destination_ip":"string","source_subnet":"string","destination_port":10,"direction":"incoming","source_port":10},"method":"CONNECT","time":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"type":"HTTPEvent","host":"string","process_name":"string","process_id":10,"process_username":"string","query":"string","encrypted":true,"url_port":10}],"process_create_events":[{"parent_process_name":"string","process_guid":10,"parent_process_guid":10,"process_disposition":"string","parent_process_size":10,"process_size":10,"time":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"parent_process_disposition":"string","type":"ProcessCreateEvent","parent_process_username":"string","parent_process_id":10,"parent_process_args":"string","process_name":"string","process_hash":"string","process_id":10,"parent_process_hash":"string","process_username":"string","parent_creation_time":"2016-01-01T01:01:01.000Z","process_args":"string"}],"registry_delete_events":[{"time":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"process_id":10,"process_name":"string","process_guid":10,"process_username":"string","registry_key":"string","type":"RegistryDeleteEvent","registry_value":"string"}],"file_modify_events":[{"file_name":"string","process_guid":10,"time":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"type":"FileModifyEvent","file_path":"string","process_name":"string","process_id":10,"process_username":"string","failed":false}],"registry_set_events":[{"process_guid":10,"registry_data":"string","time":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"type":"RegistrySetEvent","registry_data_length":10,"registry_value":"string","registry_key":"string","process_name":"string","process_id":10,"process_username":"string"}],"file_create_events":[{"file_name":"string","process_guid":10,"time":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"type":"FileCreateEvent","file_path":"string","process_name":"string","process_id":10,"process_username":"string","failed":false}],"registry_create_events":[{"time":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"process_id":10,"process_name":"string","process_guid":10,"process_username":"string","registry_key":"string","type":"RegistryCreateEvent"}],"library_load_events":[{"time":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"process_id":10,"process_name":"string","process_guid":10,"process_username":"string","type":"LibraryLoadEvent","dll_library_name":"string","dll_library_path":"string"}],"file_move_events":[{"file_name":"string","process_guid":10,"time":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"type":"FileMoveEvent","old_name":"string","file_path":"string","process_name":"string","process_id":10,"process_username":"string","new_name":"string"}],"file_delete_events":[{"file_name":"string","process_guid":10,"time":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"type":"FileDeleteEvent","file_path":"string","process_name":"string","process_id":10,"process_username":"string","failed":false}],"netflow_events":[{"parent_process_name":"string","byte_count_in":10,"process_guid":10,"process_path":"string","traffic":{"destination_host_name":"string","protocol":10,"source_ip":"string","destination_subnet":"string","destination_ip":"string","source_subnet":"string","destination_port":10,"direction":"incoming","source_port":10},"flow_time":"2016-01-01T01:01:01.000Z","time":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"parent_process_account":"string","type":"NetflowEvent","process_account_type":"string","parent_process_path":"string","parent_process_id":10,"parent_process_args":"string","process_name":"string","process_account":"string","parent_process_account_type":"string","process_hash":"string","process_id":10,"parent_process_hash":"string","process_username":"string","byte_count_out":10,"process_args":"string"}],"registry_rename_events":[{"time":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"process_id":10,"process_name":"string","process_guid":10,"process_username":"string","registry_key":"string","type":"RegistryRenameEvent","registry_old_key":"string"}]},"$$ref":"#/components/schemas/Context"},"client_id":{"type":"string"},"groups":{"type":"array","items":{"type":"string"}},"timestamp":{"type":"string","description":"The time this object was created at, or last modified.","format":"date-time","example":"2016-01-01T01:01:01Z"},"confidence":{"type":"string","example":"High","enum":["Medium","Info","Unknown","None","High","Low"]},"observed_time":{"required":["start_time"],"type":"object","properties":{"start_time":{"type":"string","description":"Time of the observation. If the observation was made over a period of time, than this field indicates the start of that period.","format":"date-time","example":"2016-01-01T01:01:01Z"},"end_time":{"type":"string","description":"If the observation was made over a period of time, than this field indicates the end of that period.","format":"date-time","example":"2016-01-01T01:01:01Z"}},"additionalProperties":false,"description":"Period of time when a cyber observation is valid. `start_time` must come before `end_time` (if specified).","example":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"$$ref":"#/components/schemas/ObservedTime"},"owner":{"type":"string"},"sensor":{"type":"string","description":"The OpenC2 Actuator name that best fits the device that is creating this sighting (e.g. network.firewall)","example":"endpoint"},"data":{"required":["columns","rows"],"type":"object","properties":{"columns":{"type":"array","description":"an ordered list of column definitions","example":[{"name":"string","type":"integer","description":"string","required":true,"short_description":"string"}],"items":{"required":["name","type"],"type":"object","properties":{"name":{"type":"string","example":"string"},"type":{"type":"string","example":"integer","enum":["url","string","observable","number","integer","markdown"]},"description":{"type":"string","description":"Markdown string with at most 5000 characters.","example":"string"},"required":{"type":"boolean","description":"If `true`, the row entries for this column cannot contain `nulls`. Defaults to `true`.","example":true},"short_description":{"type":"string","example":"string"}},"additionalProperties":false,"example":{"name":"string","type":"integer","description":"string","required":true,"short_description":"string"},"$$ref":"#/components/schemas/ColumnDefinition"}},"rows":{"type":"array","description":"an ordered list of rows","example":[["anything"]],"items":{"type":"array","items":{"type":"object"}}},"row_count":{"type":"integer","description":"The number of rows in the data table.","format":"int64","example":10}},"additionalProperties":false,"description":"An embedded data table for the Sighting.","example":{"columns":[{"name":"string","type":"integer","description":"string","required":true,"short_description":"string"}],"rows":[["anything"]],"row_count":10},"$$ref":"#/components/schemas/SightingDataTable"}},"additionalProperties":false,"description":"A sighting indicates that a particular entity or [indicator](indicator.md) was observed in an environment and can be an indication of a current or potential threat.","example":{"description":"string","schema_version":"1.3.18","revision":10,"relations":[{"origin":"string","origin_uri":"string","relation":"Allocated","relation_info":{"keyword":"anything"},"source":{"value":"1.2.3.4","type":"ip"},"related":{"value":"1.2.3.4","type":"ip"}}],"sensor_coordinates":{"type":"endpoint","observables":[{"value":"1.2.3.4","type":"ip"}],"os":"string"},"observables":[{"value":"1.2.3.4","type":"ip"}],"type":"sighting","source":"string","external_ids":["string"],"targets":[{"type":"endpoint","observables":[{"value":"1.2.3.4","type":"ip"}],"observed_time":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"os":"string"}],"short_description":"string","title":"string","resolution":"detected","internal":false,"external_references":[{"source_name":"string","description":"string","url":"string","hashes":["string"],"external_id":"string"}],"source_uri":"string","language":"string","id":"string","count":10,"severity":"Critical","tlp":"green","context":{"http_events":[{"process_guid":10,"traffic":{"destination_host_name":"string","protocol":10,"source_ip":"string","destination_subnet":"string","destination_ip":"string","source_subnet":"string","destination_port":10,"direction":"incoming","source_port":10},"method":"CONNECT","time":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"type":"HTTPEvent","host":"string","process_name":"string","process_id":10,"process_username":"string","query":"string","encrypted":true,"url_port":10}],"process_create_events":[{"parent_process_name":"string","process_guid":10,"parent_process_guid":10,"process_disposition":"string","parent_process_size":10,"process_size":10,"time":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"parent_process_disposition":"string","type":"ProcessCreateEvent","parent_process_username":"string","parent_process_id":10,"parent_process_args":"string","process_name":"string","process_hash":"string","process_id":10,"parent_process_hash":"string","process_username":"string","parent_creation_time":"2016-01-01T01:01:01.000Z","process_args":"string"}],"registry_delete_events":[{"time":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"process_id":10,"process_name":"string","process_guid":10,"process_username":"string","registry_key":"string","type":"RegistryDeleteEvent","registry_value":"string"}],"file_modify_events":[{"file_name":"string","process_guid":10,"time":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"type":"FileModifyEvent","file_path":"string","process_name":"string","process_id":10,"process_username":"string","failed":false}],"registry_set_events":[{"process_guid":10,"registry_data":"string","time":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"type":"RegistrySetEvent","registry_data_length":10,"registry_value":"string","registry_key":"string","process_name":"string","process_id":10,"process_username":"string"}],"file_create_events":[{"file_name":"string","process_guid":10,"time":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"type":"FileCreateEvent","file_path":"string","process_name":"string","process_id":10,"process_username":"string","failed":false}],"registry_create_events":[{"time":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"process_id":10,"process_name":"string","process_guid":10,"process_username":"string","registry_key":"string","type":"RegistryCreateEvent"}],"library_load_events":[{"time":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"process_id":10,"process_name":"string","process_guid":10,"process_username":"string","type":"LibraryLoadEvent","dll_library_name":"string","dll_library_path":"string"}],"file_move_events":[{"file_name":"string","process_guid":10,"time":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"type":"FileMoveEvent","old_name":"string","file_path":"string","process_name":"string","process_id":10,"process_username":"string","new_name":"string"}],"file_delete_events":[{"file_name":"string","process_guid":10,"time":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"type":"FileDeleteEvent","file_path":"string","process_name":"string","process_id":10,"process_username":"string","failed":false}],"netflow_events":[{"parent_process_name":"string","byte_count_in":10,"process_guid":10,"process_path":"string","traffic":{"destination_host_name":"string","protocol":10,"source_ip":"string","destination_subnet":"string","destination_ip":"string","source_subnet":"string","destination_port":10,"direction":"incoming","source_port":10},"flow_time":"2016-01-01T01:01:01.000Z","time":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"parent_process_account":"string","type":"NetflowEvent","process_account_type":"string","parent_process_path":"string","parent_process_id":10,"parent_process_args":"string","process_name":"string","process_account":"string","parent_process_account_type":"string","process_hash":"string","process_id":10,"parent_process_hash":"string","process_username":"string","byte_count_out":10,"process_args":"string"}],"registry_rename_events":[{"time":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"process_id":10,"process_name":"string","process_guid":10,"process_username":"string","registry_key":"string","type":"RegistryRenameEvent","registry_old_key":"string"}]},"timestamp":"2016-01-01T01:01:01.000Z","confidence":"High","observed_time":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"sensor":"endpoint","data":{"columns":[{"name":"string","type":"integer","description":"string","required":true,"short_description":"string"}],"rows":[["anything"]],"row_count":10}},"$$ref":"#/components/schemas/PartialSighting"}}},"application/edn":{"schema":{"type":"array","items":{"type":"object","properties":{"description":{"type":"string","description":"A description of object, which may be detailed.","example":"string"},"authorized_groups":{"type":"array","items":{"type":"string"}},"schema_version":{"type":"string"},"revision":{"type":"integer","description":"A monotonically increasing revision, incremented each time the object is changed.","format":"int64","example":10},"relations":{"type":"array","description":"Provide any context we can about where the observable came from.","example":[{"origin":"string","origin_uri":"string","relation":"Allocated","relation_info":{"keyword":"anything"},"source":{"value":"1.2.3.4","type":"ip"},"related":{"value":"1.2.3.4","type":"ip"}}],"items":{"required":["origin","related","relation","source"],"type":"object","properties":{"origin":{"type":"string","example":"string"},"origin_uri":{"type":"string","description":"A URI","example":"string"},"relation":{"type":"string","example":"Allocated"},"relation_info":{"type":"object","additionalProperties":{"type":"object","example":"anything"},"example":{"keyword":"anything"},"$$ref":"#/components/schemas/NewSightingRelationsRelationInfo"},"source":{"required":["type","value"],"type":"object","properties":{"value":{"type":"string","description":"The value of the observable.","example":"1.2.3.4"},"type":{"type":"string","description":"The type of observable.","example":"ip","enum":["file_path","mac_address","trend_micro_id","cybereason_id","process_args","s1_agent_id","device","hostname","certificate_common_name","serial_number","meraki_network_id","url","certificate_serial","meraki_org_id","cisco_cm_id","registry_key","process_path","darktrace_id","process_username","cortex_agent_id","orbital_node_id","process_uid","ngfw_name","user","certificate_issuer","ipv6","email","cisco_uc_id","sha256","crowdstrike_id","sha1","registry_name","md5","ip","domain","email_subject","imei","ngfw_id","amp_computer_guid","ms_machine_id","mutex","processor_id","swc_device_id","registry_path","odns_identity","odns_identity_label","cisco_mid","process_name","pki_serial","meraki_node_sn","email_messageid","imsi","user_agent","process_hash","file_name"]}},"additionalProperties":false,"description":"An AssetMapping is a record that a specific Observable maps to an Asset for an indicated period of time.","example":{"value":"1.2.3.4","type":"ip"},"$$ref":"#/components/schemas/Observable"},"related":{"required":["type","value"],"type":"object","properties":{"value":{"type":"string","description":"The value of the observable.","example":"1.2.3.4"},"type":{"type":"string","description":"The type of observable.","example":"ip","enum":["file_path","mac_address","trend_micro_id","cybereason_id","process_args","s1_agent_id","device","hostname","certificate_common_name","serial_number","meraki_network_id","url","certificate_serial","meraki_org_id","cisco_cm_id","registry_key","process_path","darktrace_id","process_username","cortex_agent_id","orbital_node_id","process_uid","ngfw_name","user","certificate_issuer","ipv6","email","cisco_uc_id","sha256","crowdstrike_id","sha1","registry_name","md5","ip","domain","email_subject","imei","ngfw_id","amp_computer_guid","ms_machine_id","mutex","processor_id","swc_device_id","registry_path","odns_identity","odns_identity_label","cisco_mid","process_name","pki_serial","meraki_node_sn","email_messageid","imsi","user_agent","process_hash","file_name"]}},"additionalProperties":false,"description":"An AssetMapping is a record that a specific Observable maps to an Asset for an indicated period of time.","example":{"value":"1.2.3.4","type":"ip"},"$$ref":"#/components/schemas/Observable"}},"additionalProperties":false,"description":"A relation inside a Sighting.","example":{"origin":"string","origin_uri":"string","relation":"Allocated","relation_info":{"keyword":"anything"},"source":{"value":"1.2.3.4","type":"ip"},"related":{"value":"1.2.3.4","type":"ip"}},"$$ref":"#/components/schemas/ObservedRelation"}},"sensor_coordinates":{"required":["observables","type"],"type":"object","properties":{"type":{"type":"string","description":"The sensor/actuator name that best fits a device.","example":"endpoint"},"observables":{"type":"array","example":[{"value":"1.2.3.4","type":"ip"}],"items":{"required":["type","value"],"type":"object","properties":{"value":{"type":"string","description":"The value of the observable.","example":"1.2.3.4"},"type":{"type":"string","description":"The type of observable.","example":"ip","enum":["file_path","mac_address","trend_micro_id","cybereason_id","process_args","s1_agent_id","device","hostname","certificate_common_name","serial_number","meraki_network_id","url","certificate_serial","meraki_org_id","cisco_cm_id","registry_key","process_path","darktrace_id","process_username","cortex_agent_id","orbital_node_id","process_uid","ngfw_name","user","certificate_issuer","ipv6","email","cisco_uc_id","sha256","crowdstrike_id","sha1","registry_name","md5","ip","domain","email_subject","imei","ngfw_id","amp_computer_guid","ms_machine_id","mutex","processor_id","swc_device_id","registry_path","odns_identity","odns_identity_label","cisco_mid","process_name","pki_serial","meraki_node_sn","email_messageid","imsi","user_agent","process_hash","file_name"]}},"additionalProperties":false,"description":"An AssetMapping is a record that a specific Observable maps to an Asset for an indicated period of time.","example":{"value":"1.2.3.4","type":"ip"},"$$ref":"#/components/schemas/Observable"}},"os":{"type":"string","example":"string"}},"additionalProperties":false,"description":"Describes the device that made the sighting (sensor) and contains identifying observables for the sensor.","example":{"type":"endpoint","observables":[{"value":"1.2.3.4","type":"ip"}],"os":"string"},"$$ref":"#/components/schemas/SensorCoordinates"},"observables":{"type":"array","description":"The object(s) of interest.","example":[{"value":"1.2.3.4","type":"ip"}],"items":{"required":["type","value"],"type":"object","properties":{"value":{"type":"string","description":"The value of the observable.","example":"1.2.3.4"},"type":{"type":"string","description":"The type of observable.","example":"ip","enum":["file_path","mac_address","trend_micro_id","cybereason_id","process_args","s1_agent_id","device","hostname","certificate_common_name","serial_number","meraki_network_id","url","certificate_serial","meraki_org_id","cisco_cm_id","registry_key","process_path","darktrace_id","process_username","cortex_agent_id","orbital_node_id","process_uid","ngfw_name","user","certificate_issuer","ipv6","email","cisco_uc_id","sha256","crowdstrike_id","sha1","registry_name","md5","ip","domain","email_subject","imei","ngfw_id","amp_computer_guid","ms_machine_id","mutex","processor_id","swc_device_id","registry_path","odns_identity","odns_identity_label","cisco_mid","process_name","pki_serial","meraki_node_sn","email_messageid","imsi","user_agent","process_hash","file_name"]}},"additionalProperties":false,"description":"An AssetMapping is a record that a specific Observable maps to an Asset for an indicated period of time.","example":{"value":"1.2.3.4","type":"ip"},"$$ref":"#/components/schemas/Observable"}},"authorized_users":{"type":"array","items":{"type":"string"}},"type":{"type":"string","example":"sighting","enum":["sighting"]},"created":{"type":"string","format":"date-time"},"source":{"type":"string","description":"Represents the source of the intelligence that led to the creation of the entity.","example":"string"},"external_ids":{"type":"array","description":"It is used to store a list of external identifiers that can be linked to the incident, providing a reliable and manageable way to correlate and group related events across multiple data sources. It is especially useful in larger organizations that rely on multiple security information and event management (SIEM) systems to detect security incidents. For instance, it can be used to track events across different network sensors, intrusion detection and prevention systems (IDPS), or log management platforms. \n The field can also be used to facilitate automation and orchestration workflows, where additional information can be shared among incident management systems. It can be used to cross-reference with other external tools such as threat intelligence feeds and vulnerability scanners.","example":["string"],"items":{"type":"string"}},"modified":{"type":"string","format":"date-time"},"targets":{"type":"array","description":"May include one or more targets that observed the associated indicator. Targets can include network devices, host devices, or other entities that are capable of detecting indicators of compromise.\n\nCan be used to assess the scope of potential threats, helping analysts understand which devices or components of the network may be vulnerable to attack. For example, if a particular malware strain is detected on several different systems within an organization, the `targets` field may indicate which systems are affected and which may need to be isolated or patched to prevent further spread.","example":[{"type":"endpoint","observables":[{"value":"1.2.3.4","type":"ip"}],"observed_time":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"os":"string"}],"items":{"required":["observables","observed_time","type"],"type":"object","properties":{"type":{"type":"string","description":"The sensor/actuator name that best fits a device.","example":"endpoint"},"observables":{"type":"array","example":[{"value":"1.2.3.4","type":"ip"}],"items":{"required":["type","value"],"type":"object","properties":{"value":{"type":"string","description":"The value of the observable.","example":"1.2.3.4"},"type":{"type":"string","description":"The type of observable.","example":"ip","enum":["file_path","mac_address","trend_micro_id","cybereason_id","process_args","s1_agent_id","device","hostname","certificate_common_name","serial_number","meraki_network_id","url","certificate_serial","meraki_org_id","cisco_cm_id","registry_key","process_path","darktrace_id","process_username","cortex_agent_id","orbital_node_id","process_uid","ngfw_name","user","certificate_issuer","ipv6","email","cisco_uc_id","sha256","crowdstrike_id","sha1","registry_name","md5","ip","domain","email_subject","imei","ngfw_id","amp_computer_guid","ms_machine_id","mutex","processor_id","swc_device_id","registry_path","odns_identity","odns_identity_label","cisco_mid","process_name","pki_serial","meraki_node_sn","email_messageid","imsi","user_agent","process_hash","file_name"]}},"additionalProperties":false,"description":"An AssetMapping is a record that a specific Observable maps to an Asset for an indicated period of time.","example":{"value":"1.2.3.4","type":"ip"},"$$ref":"#/components/schemas/Observable"}},"observed_time":{"required":["start_time"],"type":"object","properties":{"start_time":{"type":"string","description":"Time of the observation. If the observation was made over a period of time, than this field indicates the start of that period.","format":"date-time","example":"2016-01-01T01:01:01Z"},"end_time":{"type":"string","description":"If the observation was made over a period of time, than this field indicates the end of that period.","format":"date-time","example":"2016-01-01T01:01:01Z"}},"additionalProperties":false,"description":"Period of time when a cyber observation is valid. `start_time` must come before `end_time` (if specified).","example":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"$$ref":"#/components/schemas/ObservedTime"},"os":{"type":"string","example":"string"}},"additionalProperties":false,"description":"Describes the target of the sighting and contains identifying observables for the target.","example":{"type":"endpoint","observables":[{"value":"1.2.3.4","type":"ip"}],"observed_time":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"os":"string"},"$$ref":"#/components/schemas/IdentitySpecification"}},"short_description":{"type":"string","description":"A single line, short summary of the object.","example":"string"},"title":{"type":"string","description":"A short title for this object, used as primary display and reference value.","example":"string"},"resolution":{"type":"string","description":"Represents the disposition or actions taken on the associated threat intelligence.","example":"detected"},"internal":{"type":"boolean","description":"If `true`, indicates that the sighting was reported from internal sources, such as an organization's own internal security tools or SOC.\n Internal sightings are often considered more reliable and actionable than external sightings, which are reported from external sources and may have a lower level of trustworthiness. Internal sightings can provide more context and can help identify potential threats that are unique to a particular environment or organization.\n Internal sightings can also help organizations prioritize their security response efforts by identifying threats that are specific to their environment and may not yet be widely known.","example":false},"external_references":{"type":"array","description":"Specifies a list of external references which refers to non-CTIM information.\n\nSimilar to `external_ids` field with major differences:\n\n- `external_ids` field is used to store a list of external identifiers that can be used to link entities across different data sources. These identifiers are typically standardized and well-known, such as CVE IDs, US-CERT advisories, or other industry-standard threat intelligence feeds. The `external_ids` field can be used to facilitate automation and orchestration workflows, where additional information can be shared among incident management systems. \n\n- `external_references` field, on the other hand, is used to provide a more general mechanism for linking entities to external sources of information. The `external_references` field can include references to blog posts, articles, external documents, threat intelligence reports, and other sources of information that may not have a standardized format or identifier.","example":[{"source_name":"string","description":"string","url":"string","hashes":["string"],"external_id":"string"}],"items":{"required":["source_name"],"type":"object","properties":{"source_name":{"type":"string","description":"The source within which the external-reference is defined (system, registry, organization, etc.)","example":"string"},"description":{"type":"string","description":"Markdown string with at most 5000 characters.","example":"string"},"url":{"type":"string","description":"A URL reference to an external resource.","example":"string"},"hashes":{"type":"array","description":"Specifies a dictionary of hashes for the contents of the url.","example":["string"],"items":{"type":"string"}},"external_id":{"type":"string","description":"An identifier for the external reference content.","example":"string"}},"additionalProperties":false,"description":"External references are used to describe pointers to information represented outside of CTIM. For example, a Malware object could use an external reference to indicate an ID for that malware in an external database or a report could use references to represent source material.","example":{"source_name":"string","description":"string","url":"string","hashes":["string"],"external_id":"string"},"$$ref":"#/components/schemas/ExternalReference"}},"source_uri":{"type":"string","description":"URI of the source of the intelligence that led to the creation of the entity.","example":"string"},"language":{"type":"string","description":"The `language` field is used to specify the primary language of the affected system or the target of an attack. It can be used to provide additional context and information about the entity. The primary purpose of this field is to help analysts filter and prioritize entities based on their knowledge and expertise of different languages.\n\nFor example, if an incident involves an attack on a system in a country where a specific language is predominant, the `language` field can be used to indicate that language, which can help analysts to quickly identify and respond to incidents that may be geographically or culturally relevant. This information can be used to prioritize incidents based on their potential impact. The `language` field can also be used to help with correlation of incidents across different systems and regions, as well as to help with data analysis and reporting.","example":"string"},"id":{"type":"string","description":"Globally unique URI identifying this object.","example":"string"},"count":{"type":"integer","description":"The number of times an indicator was observed within a certain period of time.\nFor example, if an IP address associated with known malicious activity is observed once within a period of time, it may indicate a low-level threat. However, if the same IP address is observed multiple times within a short time frame, it may indicate a more severe and persistent threat.\nIt can also be used to prioritize security alerts and indicate the urgency of a response. High counts indicate that an indicator is actively being used in a larger campaign, while low counts may indicate isolated incidents.","format":"int64","example":10},"severity":{"type":"string","example":"Critical","enum":["Medium","Info","Unknown","None","High","Critical","Low"]},"tlp":{"type":"string","description":"TLP stands for [Traffic Light Protocol](https://www.us-cert.gov/tlp), which indicates precisely how a resource is intended to be shared, replicated, copied, etc.\n\nIt is used to indicate the sensitivity of the information contained within the message. This allows recipients to determine the appropriate handling and dissemination of the information based on their clearance level and need-to-know.\n\nFor example, an entity containing information about a critical vulnerability in a widely-used software might be marked as `red`, indicating that it should only be shared with a small group of highly trusted individuals who need to know in order to take appropriate action. On the other hand, a message containing more general information about security threats might be marked as `amber` or `green`, indicating that it can be shared more broadly within an organization.","example":"green","enum":["white","green","red","amber"]},"context":{"type":"object","properties":{"http_events":{"type":"array","description":"a list of `HTTPType`","example":[{"process_guid":10,"traffic":{"destination_host_name":"string","protocol":10,"source_ip":"string","destination_subnet":"string","destination_ip":"string","source_subnet":"string","destination_port":10,"direction":"incoming","source_port":10},"method":"CONNECT","time":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"type":"HTTPEvent","host":"string","process_name":"string","process_id":10,"process_username":"string","query":"string","encrypted":true,"url_port":10}],"items":{"required":["host","process_id","process_name","time","traffic","type"],"type":"object","properties":{"process_guid":{"type":"integer","format":"int64","example":10},"traffic":{"required":["destination_ip","destination_port","direction","protocol","source_ip","source_port"],"type":"object","properties":{"destination_host_name":{"type":"string","example":"string"},"protocol":{"type":"integer","description":"The IP [protocol id](https://www.iana.org/assignments/protocol-numbers/protocol-numbers.xhtml)","format":"int64","example":10},"source_ip":{"type":"string","example":"string"},"destination_subnet":{"type":"string","example":"string"},"destination_ip":{"type":"string","example":"string"},"source_subnet":{"type":"string","example":"string"},"destination_port":{"type":"integer","format":"int64","example":10},"direction":{"type":"string","example":"incoming","enum":["incoming","outgoing"]},"source_port":{"type":"integer","format":"int64","example":10}},"additionalProperties":false,"example":{"destination_host_name":"string","protocol":10,"source_ip":"string","destination_subnet":"string","destination_ip":"string","source_subnet":"string","destination_port":10,"direction":"incoming","source_port":10},"$$ref":"#/components/schemas/Traffic"},"method":{"type":"string","example":"CONNECT","enum":["OPTIONS","PATCH","TRACE","HEAD","POST","CONNECT","GET","PUT"]},"time":{"required":["start_time"],"type":"object","properties":{"start_time":{"type":"string","description":"Time of the observation. If the observation was made over a period of time, than this field indicates the start of that period.","format":"date-time","example":"2016-01-01T01:01:01Z"},"end_time":{"type":"string","description":"If the observation was made over a period of time, than this field indicates the end of that period.","format":"date-time","example":"2016-01-01T01:01:01Z"}},"additionalProperties":false,"description":"Period of time when a cyber observation is valid. `start_time` must come before `end_time` (if specified).","example":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"$$ref":"#/components/schemas/ObservedTime"},"type":{"type":"string","example":"HTTPEvent","enum":["HTTPEvent"]},"host":{"type":"string","description":"String with at most 1024 characters.","example":"string"},"process_name":{"type":"string","description":"String with at most 1024 characters.","example":"string"},"process_id":{"type":"integer","format":"int64","example":10},"process_username":{"type":"string","description":"String with at most 1024 characters.","example":"string"},"query":{"type":"string","description":"String with at most 5000 characters.","example":"string"},"encrypted":{"type":"boolean","example":true},"url_port":{"type":"integer","format":"int64","example":10}},"additionalProperties":false,"example":{"process_guid":10,"traffic":{"destination_host_name":"string","protocol":10,"source_ip":"string","destination_subnet":"string","destination_ip":"string","source_subnet":"string","destination_port":10,"direction":"incoming","source_port":10},"method":"CONNECT","time":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"type":"HTTPEvent","host":"string","process_name":"string","process_id":10,"process_username":"string","query":"string","encrypted":true,"url_port":10},"$$ref":"#/components/schemas/HTTPType"}},"process_create_events":{"type":"array","description":"a list of `ProcessCreate`","example":[{"parent_process_name":"string","process_guid":10,"parent_process_guid":10,"process_disposition":"string","parent_process_size":10,"process_size":10,"time":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"parent_process_disposition":"string","type":"ProcessCreateEvent","parent_process_username":"string","parent_process_id":10,"parent_process_args":"string","process_name":"string","process_hash":"string","process_id":10,"parent_process_hash":"string","process_username":"string","parent_creation_time":"2016-01-01T01:01:01.000Z","process_args":"string"}],"items":{"required":["process_id","process_name","time","type"],"type":"object","properties":{"parent_process_name":{"type":"string","description":"String with at most 1024 characters.","example":"string"},"process_guid":{"type":"integer","format":"int64","example":10},"parent_process_guid":{"type":"integer","format":"int64","example":10},"process_disposition":{"type":"string","description":"String with at most 1024 characters.","example":"string"},"parent_process_size":{"type":"integer","format":"int64","example":10},"process_size":{"type":"integer","format":"int64","example":10},"time":{"required":["start_time"],"type":"object","properties":{"start_time":{"type":"string","description":"Time of the observation. If the observation was made over a period of time, than this field indicates the start of that period.","format":"date-time","example":"2016-01-01T01:01:01Z"},"end_time":{"type":"string","description":"If the observation was made over a period of time, than this field indicates the end of that period.","format":"date-time","example":"2016-01-01T01:01:01Z"}},"additionalProperties":false,"description":"Period of time when a cyber observation is valid. `start_time` must come before `end_time` (if specified).","example":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"$$ref":"#/components/schemas/ObservedTime"},"parent_process_disposition":{"type":"string","description":"String with at most 1024 characters.","example":"string"},"type":{"type":"string","example":"ProcessCreateEvent","enum":["ProcessCreateEvent"]},"parent_process_username":{"type":"string","description":"String with at most 1024 characters.","example":"string"},"parent_process_id":{"type":"integer","format":"int64","example":10},"parent_process_args":{"type":"string","description":"String with at most 2048 characters.","example":"string"},"process_name":{"type":"string","description":"String with at most 1024 characters.","example":"string"},"process_hash":{"type":"string","description":"String with at most 2048 characters.","example":"string"},"process_id":{"type":"integer","format":"int64","example":10},"parent_process_hash":{"type":"string","description":"String with at most 2048 characters.","example":"string"},"process_username":{"type":"string","description":"String with at most 1024 characters.","example":"string"},"parent_creation_time":{"type":"string","description":"Schema definition for all date or timestamp values. Serialized as a string, the field should follow the rules of the [ISO8601](https://en.wikipedia.org/wiki/ISO_8601) standard.","format":"date-time","example":"2016-01-01T01:01:01Z"},"process_args":{"type":"string","description":"String with at most 2048 characters.","example":"string"}},"additionalProperties":false,"example":{"parent_process_name":"string","process_guid":10,"parent_process_guid":10,"process_disposition":"string","parent_process_size":10,"process_size":10,"time":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"parent_process_disposition":"string","type":"ProcessCreateEvent","parent_process_username":"string","parent_process_id":10,"parent_process_args":"string","process_name":"string","process_hash":"string","process_id":10,"parent_process_hash":"string","process_username":"string","parent_creation_time":"2016-01-01T01:01:01.000Z","process_args":"string"},"$$ref":"#/components/schemas/ProcessCreateType"}},"registry_delete_events":{"type":"array","description":"a list of `RegistryDeleteType`","example":[{"time":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"process_id":10,"process_name":"string","process_guid":10,"process_username":"string","registry_key":"string","type":"RegistryDeleteEvent","registry_value":"string"}],"items":{"required":["process_id","process_name","registry_key","time","type"],"type":"object","properties":{"time":{"required":["start_time"],"type":"object","properties":{"start_time":{"type":"string","description":"Time of the observation. If the observation was made over a period of time, than this field indicates the start of that period.","format":"date-time","example":"2016-01-01T01:01:01Z"},"end_time":{"type":"string","description":"If the observation was made over a period of time, than this field indicates the end of that period.","format":"date-time","example":"2016-01-01T01:01:01Z"}},"additionalProperties":false,"description":"Period of time when a cyber observation is valid. `start_time` must come before `end_time` (if specified).","example":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"$$ref":"#/components/schemas/ObservedTime"},"process_id":{"type":"integer","format":"int64","example":10},"process_name":{"type":"string","description":"String with at most 1024 characters.","example":"string"},"process_guid":{"type":"integer","format":"int64","example":10},"process_username":{"type":"string","description":"String with at most 1024 characters.","example":"string"},"registry_key":{"type":"string","description":"String with at most 1024 characters.","example":"string"},"type":{"type":"string","example":"RegistryDeleteEvent","enum":["RegistryDeleteEvent"]},"registry_value":{"type":"string","description":"String with at most 2048 characters.","example":"string"}},"additionalProperties":false,"example":{"time":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"process_id":10,"process_name":"string","process_guid":10,"process_username":"string","registry_key":"string","type":"RegistryDeleteEvent","registry_value":"string"},"$$ref":"#/components/schemas/RegistryDeleteType"}},"file_modify_events":{"type":"array","description":"a list of `FileModifyType`","example":[{"file_name":"string","process_guid":10,"time":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"type":"FileModifyEvent","file_path":"string","process_name":"string","process_id":10,"process_username":"string","failed":false}],"items":{"required":["file_name","file_path","process_id","process_name","time","type"],"type":"object","properties":{"file_name":{"type":"string","description":"String with at most 1024 characters.","example":"string"},"process_guid":{"type":"integer","format":"int64","example":10},"time":{"required":["start_time"],"type":"object","properties":{"start_time":{"type":"string","description":"Time of the observation. If the observation was made over a period of time, than this field indicates the start of that period.","format":"date-time","example":"2016-01-01T01:01:01Z"},"end_time":{"type":"string","description":"If the observation was made over a period of time, than this field indicates the end of that period.","format":"date-time","example":"2016-01-01T01:01:01Z"}},"additionalProperties":false,"description":"Period of time when a cyber observation is valid. `start_time` must come before `end_time` (if specified).","example":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"$$ref":"#/components/schemas/ObservedTime"},"type":{"type":"string","example":"FileModifyEvent","enum":["FileModifyEvent"]},"file_path":{"type":"string","description":"String with at most 2048 characters.","example":"string"},"process_name":{"type":"string","description":"String with at most 1024 characters.","example":"string"},"process_id":{"type":"integer","format":"int64","example":10},"process_username":{"type":"string","description":"String with at most 1024 characters.","example":"string"},"failed":{"type":"boolean","example":false}},"additionalProperties":false,"example":{"file_name":"string","process_guid":10,"time":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"type":"FileModifyEvent","file_path":"string","process_name":"string","process_id":10,"process_username":"string","failed":false},"$$ref":"#/components/schemas/FileModifyType"}},"registry_set_events":{"type":"array","description":"a list of `RegistrySetType`","example":[{"process_guid":10,"registry_data":"string","time":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"type":"RegistrySetEvent","registry_data_length":10,"registry_value":"string","registry_key":"string","process_name":"string","process_id":10,"process_username":"string"}],"items":{"required":["process_id","process_name","registry_key","registry_value","time","type"],"type":"object","properties":{"process_guid":{"type":"integer","format":"int64","example":10},"registry_data":{"type":"string","description":"String with at most 5000 characters.","example":"string"},"time":{"required":["start_time"],"type":"object","properties":{"start_time":{"type":"string","description":"Time of the observation. If the observation was made over a period of time, than this field indicates the start of that period.","format":"date-time","example":"2016-01-01T01:01:01Z"},"end_time":{"type":"string","description":"If the observation was made over a period of time, than this field indicates the end of that period.","format":"date-time","example":"2016-01-01T01:01:01Z"}},"additionalProperties":false,"description":"Period of time when a cyber observation is valid. `start_time` must come before `end_time` (if specified).","example":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"$$ref":"#/components/schemas/ObservedTime"},"type":{"type":"string","example":"RegistrySetEvent","enum":["RegistrySetEvent"]},"registry_data_length":{"type":"integer","format":"int64","example":10},"registry_value":{"type":"string","description":"String with at most 2048 characters.","example":"string"},"registry_key":{"type":"string","description":"String with at most 1024 characters.","example":"string"},"process_name":{"type":"string","description":"String with at most 1024 characters.","example":"string"},"process_id":{"type":"integer","format":"int64","example":10},"process_username":{"type":"string","description":"String with at most 1024 characters.","example":"string"}},"additionalProperties":false,"example":{"process_guid":10,"registry_data":"string","time":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"type":"RegistrySetEvent","registry_data_length":10,"registry_value":"string","registry_key":"string","process_name":"string","process_id":10,"process_username":"string"},"$$ref":"#/components/schemas/RegistrySetType"}},"file_create_events":{"type":"array","description":"a list of `FileCreateType`","example":[{"file_name":"string","process_guid":10,"time":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"type":"FileCreateEvent","file_path":"string","process_name":"string","process_id":10,"process_username":"string","failed":false}],"items":{"required":["file_name","file_path","process_id","process_name","time","type"],"type":"object","properties":{"file_name":{"type":"string","description":"String with at most 1024 characters.","example":"string"},"process_guid":{"type":"integer","format":"int64","example":10},"time":{"required":["start_time"],"type":"object","properties":{"start_time":{"type":"string","description":"Time of the observation. If the observation was made over a period of time, than this field indicates the start of that period.","format":"date-time","example":"2016-01-01T01:01:01Z"},"end_time":{"type":"string","description":"If the observation was made over a period of time, than this field indicates the end of that period.","format":"date-time","example":"2016-01-01T01:01:01Z"}},"additionalProperties":false,"description":"Period of time when a cyber observation is valid. `start_time` must come before `end_time` (if specified).","example":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"$$ref":"#/components/schemas/ObservedTime"},"type":{"type":"string","example":"FileCreateEvent","enum":["FileCreateEvent"]},"file_path":{"type":"string","description":"String with at most 2048 characters.","example":"string"},"process_name":{"type":"string","description":"String with at most 1024 characters.","example":"string"},"process_id":{"type":"integer","format":"int64","example":10},"process_username":{"type":"string","description":"String with at most 1024 characters.","example":"string"},"failed":{"type":"boolean","example":false}},"additionalProperties":false,"example":{"file_name":"string","process_guid":10,"time":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"type":"FileCreateEvent","file_path":"string","process_name":"string","process_id":10,"process_username":"string","failed":false},"$$ref":"#/components/schemas/FileCreateType"}},"registry_create_events":{"type":"array","description":"a list of `RegistryCreateType`","example":[{"time":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"process_id":10,"process_name":"string","process_guid":10,"process_username":"string","registry_key":"string","type":"RegistryCreateEvent"}],"items":{"required":["process_id","process_name","registry_key","time","type"],"type":"object","properties":{"time":{"required":["start_time"],"type":"object","properties":{"start_time":{"type":"string","description":"Time of the observation. If the observation was made over a period of time, than this field indicates the start of that period.","format":"date-time","example":"2016-01-01T01:01:01Z"},"end_time":{"type":"string","description":"If the observation was made over a period of time, than this field indicates the end of that period.","format":"date-time","example":"2016-01-01T01:01:01Z"}},"additionalProperties":false,"description":"Period of time when a cyber observation is valid. `start_time` must come before `end_time` (if specified).","example":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"$$ref":"#/components/schemas/ObservedTime"},"process_id":{"type":"integer","format":"int64","example":10},"process_name":{"type":"string","description":"String with at most 1024 characters.","example":"string"},"process_guid":{"type":"integer","format":"int64","example":10},"process_username":{"type":"string","description":"String with at most 1024 characters.","example":"string"},"registry_key":{"type":"string","description":"String with at most 1024 characters.","example":"string"},"type":{"type":"string","example":"RegistryCreateEvent","enum":["RegistryCreateEvent"]}},"additionalProperties":false,"example":{"time":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"process_id":10,"process_name":"string","process_guid":10,"process_username":"string","registry_key":"string","type":"RegistryCreateEvent"},"$$ref":"#/components/schemas/RegistryCreateType"}},"library_load_events":{"type":"array","description":"a list of `LibraryLoadType`","example":[{"time":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"process_id":10,"process_name":"string","process_guid":10,"process_username":"string","type":"LibraryLoadEvent","dll_library_name":"string","dll_library_path":"string"}],"items":{"required":["dll_library_name","dll_library_path","process_id","process_name","time","type"],"type":"object","properties":{"time":{"required":["start_time"],"type":"object","properties":{"start_time":{"type":"string","description":"Time of the observation. If the observation was made over a period of time, than this field indicates the start of that period.","format":"date-time","example":"2016-01-01T01:01:01Z"},"end_time":{"type":"string","description":"If the observation was made over a period of time, than this field indicates the end of that period.","format":"date-time","example":"2016-01-01T01:01:01Z"}},"additionalProperties":false,"description":"Period of time when a cyber observation is valid. `start_time` must come before `end_time` (if specified).","example":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"$$ref":"#/components/schemas/ObservedTime"},"process_id":{"type":"integer","format":"int64","example":10},"process_name":{"type":"string","description":"String with at most 1024 characters.","example":"string"},"process_guid":{"type":"integer","format":"int64","example":10},"process_username":{"type":"string","description":"String with at most 1024 characters.","example":"string"},"type":{"type":"string","example":"LibraryLoadEvent","enum":["LibraryLoadEvent"]},"dll_library_name":{"type":"string","description":"String with at most 1024 characters.","example":"string"},"dll_library_path":{"type":"string","description":"String with at most 2048 characters.","example":"string"}},"additionalProperties":false,"example":{"time":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"process_id":10,"process_name":"string","process_guid":10,"process_username":"string","type":"LibraryLoadEvent","dll_library_name":"string","dll_library_path":"string"},"$$ref":"#/components/schemas/LibraryLoadType"}},"file_move_events":{"type":"array","description":"a list of `FileMoveType`","example":[{"file_name":"string","process_guid":10,"time":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"type":"FileMoveEvent","old_name":"string","file_path":"string","process_name":"string","process_id":10,"process_username":"string","new_name":"string"}],"items":{"required":["file_name","file_path","new_name","old_name","process_id","process_name","time","type"],"type":"object","properties":{"file_name":{"type":"string","description":"String with at most 1024 characters.","example":"string"},"process_guid":{"type":"integer","format":"int64","example":10},"time":{"required":["start_time"],"type":"object","properties":{"start_time":{"type":"string","description":"Time of the observation. If the observation was made over a period of time, than this field indicates the start of that period.","format":"date-time","example":"2016-01-01T01:01:01Z"},"end_time":{"type":"string","description":"If the observation was made over a period of time, than this field indicates the end of that period.","format":"date-time","example":"2016-01-01T01:01:01Z"}},"additionalProperties":false,"description":"Period of time when a cyber observation is valid. `start_time` must come before `end_time` (if specified).","example":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"$$ref":"#/components/schemas/ObservedTime"},"type":{"type":"string","example":"FileMoveEvent","enum":["FileMoveEvent"]},"old_name":{"type":"string","description":"String with at most 1024 characters.","example":"string"},"file_path":{"type":"string","description":"String with at most 2048 characters.","example":"string"},"process_name":{"type":"string","description":"String with at most 1024 characters.","example":"string"},"process_id":{"type":"integer","format":"int64","example":10},"process_username":{"type":"string","description":"String with at most 1024 characters.","example":"string"},"new_name":{"type":"string","description":"String with at most 1024 characters.","example":"string"}},"additionalProperties":false,"example":{"file_name":"string","process_guid":10,"time":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"type":"FileMoveEvent","old_name":"string","file_path":"string","process_name":"string","process_id":10,"process_username":"string","new_name":"string"},"$$ref":"#/components/schemas/FileMoveType"}},"file_delete_events":{"type":"array","description":"a list of `FileDeleteType`","example":[{"file_name":"string","process_guid":10,"time":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"type":"FileDeleteEvent","file_path":"string","process_name":"string","process_id":10,"process_username":"string","failed":false}],"items":{"required":["file_name","file_path","process_id","process_name","time","type"],"type":"object","properties":{"file_name":{"type":"string","description":"String with at most 1024 characters.","example":"string"},"process_guid":{"type":"integer","format":"int64","example":10},"time":{"required":["start_time"],"type":"object","properties":{"start_time":{"type":"string","description":"Time of the observation. If the observation was made over a period of time, than this field indicates the start of that period.","format":"date-time","example":"2016-01-01T01:01:01Z"},"end_time":{"type":"string","description":"If the observation was made over a period of time, than this field indicates the end of that period.","format":"date-time","example":"2016-01-01T01:01:01Z"}},"additionalProperties":false,"description":"Period of time when a cyber observation is valid. `start_time` must come before `end_time` (if specified).","example":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"$$ref":"#/components/schemas/ObservedTime"},"type":{"type":"string","example":"FileDeleteEvent","enum":["FileDeleteEvent"]},"file_path":{"type":"string","description":"String with at most 2048 characters.","example":"string"},"process_name":{"type":"string","description":"String with at most 1024 characters.","example":"string"},"process_id":{"type":"integer","format":"int64","example":10},"process_username":{"type":"string","description":"String with at most 1024 characters.","example":"string"},"failed":{"type":"boolean","example":false}},"additionalProperties":false,"example":{"file_name":"string","process_guid":10,"time":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"type":"FileDeleteEvent","file_path":"string","process_name":"string","process_id":10,"process_username":"string","failed":false},"$$ref":"#/components/schemas/FileDeleteType"}},"netflow_events":{"type":"array","description":"a list of `NetflowType`","example":[{"parent_process_name":"string","byte_count_in":10,"process_guid":10,"process_path":"string","traffic":{"destination_host_name":"string","protocol":10,"source_ip":"string","destination_subnet":"string","destination_ip":"string","source_subnet":"string","destination_port":10,"direction":"incoming","source_port":10},"flow_time":"2016-01-01T01:01:01.000Z","time":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"parent_process_account":"string","type":"NetflowEvent","process_account_type":"string","parent_process_path":"string","parent_process_id":10,"parent_process_args":"string","process_name":"string","process_account":"string","parent_process_account_type":"string","process_hash":"string","process_id":10,"parent_process_hash":"string","process_username":"string","byte_count_out":10,"process_args":"string"}],"items":{"required":["process_id","process_name","time","traffic","type"],"type":"object","properties":{"parent_process_name":{"type":"string","description":"String with at most 1024 characters.","example":"string"},"byte_count_in":{"type":"integer","format":"int64","example":10},"process_guid":{"type":"integer","format":"int64","example":10},"process_path":{"type":"string","description":"String with at most 1024 characters.","example":"string"},"traffic":{"required":["destination_ip","destination_port","direction","protocol","source_ip","source_port"],"type":"object","properties":{"destination_host_name":{"type":"string","example":"string"},"protocol":{"type":"integer","description":"The IP [protocol id](https://www.iana.org/assignments/protocol-numbers/protocol-numbers.xhtml)","format":"int64","example":10},"source_ip":{"type":"string","example":"string"},"destination_subnet":{"type":"string","example":"string"},"destination_ip":{"type":"string","example":"string"},"source_subnet":{"type":"string","example":"string"},"destination_port":{"type":"integer","format":"int64","example":10},"direction":{"type":"string","example":"incoming","enum":["incoming","outgoing"]},"source_port":{"type":"integer","format":"int64","example":10}},"additionalProperties":false,"example":{"destination_host_name":"string","protocol":10,"source_ip":"string","destination_subnet":"string","destination_ip":"string","source_subnet":"string","destination_port":10,"direction":"incoming","source_port":10},"$$ref":"#/components/schemas/Traffic"},"flow_time":{"type":"string","description":"Schema definition for all date or timestamp values. Serialized as a string, the field should follow the rules of the [ISO8601](https://en.wikipedia.org/wiki/ISO_8601) standard.","format":"date-time","example":"2016-01-01T01:01:01Z"},"time":{"required":["start_time"],"type":"object","properties":{"start_time":{"type":"string","description":"Time of the observation. If the observation was made over a period of time, than this field indicates the start of that period.","format":"date-time","example":"2016-01-01T01:01:01Z"},"end_time":{"type":"string","description":"If the observation was made over a period of time, than this field indicates the end of that period.","format":"date-time","example":"2016-01-01T01:01:01Z"}},"additionalProperties":false,"description":"Period of time when a cyber observation is valid. `start_time` must come before `end_time` (if specified).","example":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"$$ref":"#/components/schemas/ObservedTime"},"parent_process_account":{"type":"string","description":"String with at most 1024 characters.","example":"string"},"type":{"type":"string","example":"NetflowEvent","enum":["NetflowEvent"]},"process_account_type":{"type":"string","description":"String with at most 1024 characters.","example":"string"},"parent_process_path":{"type":"string","description":"String with at most 1024 characters.","example":"string"},"parent_process_id":{"type":"integer","format":"int64","example":10},"parent_process_args":{"type":"string","description":"String with at most 1024 characters.","example":"string"},"process_name":{"type":"string","description":"String with at most 1024 characters.","example":"string"},"process_account":{"type":"string","description":"String with at most 1024 characters.","example":"string"},"parent_process_account_type":{"type":"string","description":"String with at most 1024 characters.","example":"string"},"process_hash":{"type":"string","description":"String with at most 1024 characters.","example":"string"},"process_id":{"type":"integer","format":"int64","example":10},"parent_process_hash":{"type":"string","description":"String with at most 1024 characters.","example":"string"},"process_username":{"type":"string","description":"String with at most 1024 characters.","example":"string"},"byte_count_out":{"type":"integer","format":"int64","example":10},"process_args":{"type":"string","description":"String with at most 1024 characters.","example":"string"}},"additionalProperties":false,"example":{"parent_process_name":"string","byte_count_in":10,"process_guid":10,"process_path":"string","traffic":{"destination_host_name":"string","protocol":10,"source_ip":"string","destination_subnet":"string","destination_ip":"string","source_subnet":"string","destination_port":10,"direction":"incoming","source_port":10},"flow_time":"2016-01-01T01:01:01.000Z","time":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"parent_process_account":"string","type":"NetflowEvent","process_account_type":"string","parent_process_path":"string","parent_process_id":10,"parent_process_args":"string","process_name":"string","process_account":"string","parent_process_account_type":"string","process_hash":"string","process_id":10,"parent_process_hash":"string","process_username":"string","byte_count_out":10,"process_args":"string"},"$$ref":"#/components/schemas/NetflowType"}},"registry_rename_events":{"type":"array","description":"a list of `RegistryRenameType`","example":[{"time":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"process_id":10,"process_name":"string","process_guid":10,"process_username":"string","registry_key":"string","type":"RegistryRenameEvent","registry_old_key":"string"}],"items":{"required":["process_id","process_name","registry_key","registry_old_key","time","type"],"type":"object","properties":{"time":{"required":["start_time"],"type":"object","properties":{"start_time":{"type":"string","description":"Time of the observation. If the observation was made over a period of time, than this field indicates the start of that period.","format":"date-time","example":"2016-01-01T01:01:01Z"},"end_time":{"type":"string","description":"If the observation was made over a period of time, than this field indicates the end of that period.","format":"date-time","example":"2016-01-01T01:01:01Z"}},"additionalProperties":false,"description":"Period of time when a cyber observation is valid. `start_time` must come before `end_time` (if specified).","example":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"$$ref":"#/components/schemas/ObservedTime"},"process_id":{"type":"integer","format":"int64","example":10},"process_name":{"type":"string","description":"String with at most 1024 characters.","example":"string"},"process_guid":{"type":"integer","format":"int64","example":10},"process_username":{"type":"string","description":"String with at most 1024 characters.","example":"string"},"registry_key":{"type":"string","description":"String with at most 1024 characters.","example":"string"},"type":{"type":"string","example":"RegistryRenameEvent","enum":["RegistryRenameEvent"]},"registry_old_key":{"type":"string","description":"String with at most 1024 characters.","example":"string"}},"additionalProperties":false,"example":{"time":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"process_id":10,"process_name":"string","process_guid":10,"process_username":"string","registry_key":"string","type":"RegistryRenameEvent","registry_old_key":"string"},"$$ref":"#/components/schemas/RegistryRenameType"}}},"additionalProperties":false,"description":"Context including the event type that best fits the type of the sighting.","example":{"http_events":[{"process_guid":10,"traffic":{"destination_host_name":"string","protocol":10,"source_ip":"string","destination_subnet":"string","destination_ip":"string","source_subnet":"string","destination_port":10,"direction":"incoming","source_port":10},"method":"CONNECT","time":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"type":"HTTPEvent","host":"string","process_name":"string","process_id":10,"process_username":"string","query":"string","encrypted":true,"url_port":10}],"process_create_events":[{"parent_process_name":"string","process_guid":10,"parent_process_guid":10,"process_disposition":"string","parent_process_size":10,"process_size":10,"time":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"parent_process_disposition":"string","type":"ProcessCreateEvent","parent_process_username":"string","parent_process_id":10,"parent_process_args":"string","process_name":"string","process_hash":"string","process_id":10,"parent_process_hash":"string","process_username":"string","parent_creation_time":"2016-01-01T01:01:01.000Z","process_args":"string"}],"registry_delete_events":[{"time":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"process_id":10,"process_name":"string","process_guid":10,"process_username":"string","registry_key":"string","type":"RegistryDeleteEvent","registry_value":"string"}],"file_modify_events":[{"file_name":"string","process_guid":10,"time":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"type":"FileModifyEvent","file_path":"string","process_name":"string","process_id":10,"process_username":"string","failed":false}],"registry_set_events":[{"process_guid":10,"registry_data":"string","time":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"type":"RegistrySetEvent","registry_data_length":10,"registry_value":"string","registry_key":"string","process_name":"string","process_id":10,"process_username":"string"}],"file_create_events":[{"file_name":"string","process_guid":10,"time":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"type":"FileCreateEvent","file_path":"string","process_name":"string","process_id":10,"process_username":"string","failed":false}],"registry_create_events":[{"time":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"process_id":10,"process_name":"string","process_guid":10,"process_username":"string","registry_key":"string","type":"RegistryCreateEvent"}],"library_load_events":[{"time":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"process_id":10,"process_name":"string","process_guid":10,"process_username":"string","type":"LibraryLoadEvent","dll_library_name":"string","dll_library_path":"string"}],"file_move_events":[{"file_name":"string","process_guid":10,"time":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"type":"FileMoveEvent","old_name":"string","file_path":"string","process_name":"string","process_id":10,"process_username":"string","new_name":"string"}],"file_delete_events":[{"file_name":"string","process_guid":10,"time":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"type":"FileDeleteEvent","file_path":"string","process_name":"string","process_id":10,"process_username":"string","failed":false}],"netflow_events":[{"parent_process_name":"string","byte_count_in":10,"process_guid":10,"process_path":"string","traffic":{"destination_host_name":"string","protocol":10,"source_ip":"string","destination_subnet":"string","destination_ip":"string","source_subnet":"string","destination_port":10,"direction":"incoming","source_port":10},"flow_time":"2016-01-01T01:01:01.000Z","time":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"parent_process_account":"string","type":"NetflowEvent","process_account_type":"string","parent_process_path":"string","parent_process_id":10,"parent_process_args":"string","process_name":"string","process_account":"string","parent_process_account_type":"string","process_hash":"string","process_id":10,"parent_process_hash":"string","process_username":"string","byte_count_out":10,"process_args":"string"}],"registry_rename_events":[{"time":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"process_id":10,"process_name":"string","process_guid":10,"process_username":"string","registry_key":"string","type":"RegistryRenameEvent","registry_old_key":"string"}]},"$$ref":"#/components/schemas/Context"},"client_id":{"type":"string"},"groups":{"type":"array","items":{"type":"string"}},"timestamp":{"type":"string","description":"The time this object was created at, or last modified.","format":"date-time","example":"2016-01-01T01:01:01Z"},"confidence":{"type":"string","example":"High","enum":["Medium","Info","Unknown","None","High","Low"]},"observed_time":{"required":["start_time"],"type":"object","properties":{"start_time":{"type":"string","description":"Time of the observation. If the observation was made over a period of time, than this field indicates the start of that period.","format":"date-time","example":"2016-01-01T01:01:01Z"},"end_time":{"type":"string","description":"If the observation was made over a period of time, than this field indicates the end of that period.","format":"date-time","example":"2016-01-01T01:01:01Z"}},"additionalProperties":false,"description":"Period of time when a cyber observation is valid. `start_time` must come before `end_time` (if specified).","example":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"$$ref":"#/components/schemas/ObservedTime"},"owner":{"type":"string"},"sensor":{"type":"string","description":"The OpenC2 Actuator name that best fits the device that is creating this sighting (e.g. network.firewall)","example":"endpoint"},"data":{"required":["columns","rows"],"type":"object","properties":{"columns":{"type":"array","description":"an ordered list of column definitions","example":[{"name":"string","type":"integer","description":"string","required":true,"short_description":"string"}],"items":{"required":["name","type"],"type":"object","properties":{"name":{"type":"string","example":"string"},"type":{"type":"string","example":"integer","enum":["url","string","observable","number","integer","markdown"]},"description":{"type":"string","description":"Markdown string with at most 5000 characters.","example":"string"},"required":{"type":"boolean","description":"If `true`, the row entries for this column cannot contain `nulls`. Defaults to `true`.","example":true},"short_description":{"type":"string","example":"string"}},"additionalProperties":false,"example":{"name":"string","type":"integer","description":"string","required":true,"short_description":"string"},"$$ref":"#/components/schemas/ColumnDefinition"}},"rows":{"type":"array","description":"an ordered list of rows","example":[["anything"]],"items":{"type":"array","items":{"type":"object"}}},"row_count":{"type":"integer","description":"The number of rows in the data table.","format":"int64","example":10}},"additionalProperties":false,"description":"An embedded data table for the Sighting.","example":{"columns":[{"name":"string","type":"integer","description":"string","required":true,"short_description":"string"}],"rows":[["anything"]],"row_count":10},"$$ref":"#/components/schemas/SightingDataTable"}},"additionalProperties":false,"description":"A sighting indicates that a particular entity or [indicator](indicator.md) was observed in an environment and can be an indication of a current or potential threat.","example":{"description":"string","schema_version":"1.3.18","revision":10,"relations":[{"origin":"string","origin_uri":"string","relation":"Allocated","relation_info":{"keyword":"anything"},"source":{"value":"1.2.3.4","type":"ip"},"related":{"value":"1.2.3.4","type":"ip"}}],"sensor_coordinates":{"type":"endpoint","observables":[{"value":"1.2.3.4","type":"ip"}],"os":"string"},"observables":[{"value":"1.2.3.4","type":"ip"}],"type":"sighting","source":"string","external_ids":["string"],"targets":[{"type":"endpoint","observables":[{"value":"1.2.3.4","type":"ip"}],"observed_time":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"os":"string"}],"short_description":"string","title":"string","resolution":"detected","internal":false,"external_references":[{"source_name":"string","description":"string","url":"string","hashes":["string"],"external_id":"string"}],"source_uri":"string","language":"string","id":"string","count":10,"severity":"Critical","tlp":"green","context":{"http_events":[{"process_guid":10,"traffic":{"destination_host_name":"string","protocol":10,"source_ip":"string","destination_subnet":"string","destination_ip":"string","source_subnet":"string","destination_port":10,"direction":"incoming","source_port":10},"method":"CONNECT","time":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"type":"HTTPEvent","host":"string","process_name":"string","process_id":10,"process_username":"string","query":"string","encrypted":true,"url_port":10}],"process_create_events":[{"parent_process_name":"string","process_guid":10,"parent_process_guid":10,"process_disposition":"string","parent_process_size":10,"process_size":10,"time":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"parent_process_disposition":"string","type":"ProcessCreateEvent","parent_process_username":"string","parent_process_id":10,"parent_process_args":"string","process_name":"string","process_hash":"string","process_id":10,"parent_process_hash":"string","process_username":"string","parent_creation_time":"2016-01-01T01:01:01.000Z","process_args":"string"}],"registry_delete_events":[{"time":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"process_id":10,"process_name":"string","process_guid":10,"process_username":"string","registry_key":"string","type":"RegistryDeleteEvent","registry_value":"string"}],"file_modify_events":[{"file_name":"string","process_guid":10,"time":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"type":"FileModifyEvent","file_path":"string","process_name":"string","process_id":10,"process_username":"string","failed":false}],"registry_set_events":[{"process_guid":10,"registry_data":"string","time":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"type":"RegistrySetEvent","registry_data_length":10,"registry_value":"string","registry_key":"string","process_name":"string","process_id":10,"process_username":"string"}],"file_create_events":[{"file_name":"string","process_guid":10,"time":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"type":"FileCreateEvent","file_path":"string","process_name":"string","process_id":10,"process_username":"string","failed":false}],"registry_create_events":[{"time":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"process_id":10,"process_name":"string","process_guid":10,"process_username":"string","registry_key":"string","type":"RegistryCreateEvent"}],"library_load_events":[{"time":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"process_id":10,"process_name":"string","process_guid":10,"process_username":"string","type":"LibraryLoadEvent","dll_library_name":"string","dll_library_path":"string"}],"file_move_events":[{"file_name":"string","process_guid":10,"time":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"type":"FileMoveEvent","old_name":"string","file_path":"string","process_name":"string","process_id":10,"process_username":"string","new_name":"string"}],"file_delete_events":[{"file_name":"string","process_guid":10,"time":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"type":"FileDeleteEvent","file_path":"string","process_name":"string","process_id":10,"process_username":"string","failed":false}],"netflow_events":[{"parent_process_name":"string","byte_count_in":10,"process_guid":10,"process_path":"string","traffic":{"destination_host_name":"string","protocol":10,"source_ip":"string","destination_subnet":"string","destination_ip":"string","source_subnet":"string","destination_port":10,"direction":"incoming","source_port":10},"flow_time":"2016-01-01T01:01:01.000Z","time":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"parent_process_account":"string","type":"NetflowEvent","process_account_type":"string","parent_process_path":"string","parent_process_id":10,"parent_process_args":"string","process_name":"string","process_account":"string","parent_process_account_type":"string","process_hash":"string","process_id":10,"parent_process_hash":"string","process_username":"string","byte_count_out":10,"process_args":"string"}],"registry_rename_events":[{"time":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"process_id":10,"process_name":"string","process_guid":10,"process_username":"string","registry_key":"string","type":"RegistryRenameEvent","registry_old_key":"string"}]},"timestamp":"2016-01-01T01:01:01.000Z","confidence":"High","observed_time":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"sensor":"endpoint","data":{"columns":[{"name":"string","type":"integer","description":"string","required":true,"short_description":"string"}],"rows":[["anything"]],"row_count":10}},"$$ref":"#/components/schemas/PartialSighting"}}},"application/transit+json":{"schema":{"type":"array","items":{"type":"object","properties":{"description":{"type":"string","description":"A description of object, which may be detailed.","example":"string"},"authorized_groups":{"type":"array","items":{"type":"string"}},"schema_version":{"type":"string"},"revision":{"type":"integer","description":"A monotonically increasing revision, incremented each time the object is changed.","format":"int64","example":10},"relations":{"type":"array","description":"Provide any context we can about where the observable came from.","example":[{"origin":"string","origin_uri":"string","relation":"Allocated","relation_info":{"keyword":"anything"},"source":{"value":"1.2.3.4","type":"ip"},"related":{"value":"1.2.3.4","type":"ip"}}],"items":{"required":["origin","related","relation","source"],"type":"object","properties":{"origin":{"type":"string","example":"string"},"origin_uri":{"type":"string","description":"A URI","example":"string"},"relation":{"type":"string","example":"Allocated"},"relation_info":{"type":"object","additionalProperties":{"type":"object","example":"anything"},"example":{"keyword":"anything"},"$$ref":"#/components/schemas/NewSightingRelationsRelationInfo"},"source":{"required":["type","value"],"type":"object","properties":{"value":{"type":"string","description":"The value of the observable.","example":"1.2.3.4"},"type":{"type":"string","description":"The type of observable.","example":"ip","enum":["file_path","mac_address","trend_micro_id","cybereason_id","process_args","s1_agent_id","device","hostname","certificate_common_name","serial_number","meraki_network_id","url","certificate_serial","meraki_org_id","cisco_cm_id","registry_key","process_path","darktrace_id","process_username","cortex_agent_id","orbital_node_id","process_uid","ngfw_name","user","certificate_issuer","ipv6","email","cisco_uc_id","sha256","crowdstrike_id","sha1","registry_name","md5","ip","domain","email_subject","imei","ngfw_id","amp_computer_guid","ms_machine_id","mutex","processor_id","swc_device_id","registry_path","odns_identity","odns_identity_label","cisco_mid","process_name","pki_serial","meraki_node_sn","email_messageid","imsi","user_agent","process_hash","file_name"]}},"additionalProperties":false,"description":"An AssetMapping is a record that a specific Observable maps to an Asset for an indicated period of time.","example":{"value":"1.2.3.4","type":"ip"},"$$ref":"#/components/schemas/Observable"},"related":{"required":["type","value"],"type":"object","properties":{"value":{"type":"string","description":"The value of the observable.","example":"1.2.3.4"},"type":{"type":"string","description":"The type of observable.","example":"ip","enum":["file_path","mac_address","trend_micro_id","cybereason_id","process_args","s1_agent_id","device","hostname","certificate_common_name","serial_number","meraki_network_id","url","certificate_serial","meraki_org_id","cisco_cm_id","registry_key","process_path","darktrace_id","process_username","cortex_agent_id","orbital_node_id","process_uid","ngfw_name","user","certificate_issuer","ipv6","email","cisco_uc_id","sha256","crowdstrike_id","sha1","registry_name","md5","ip","domain","email_subject","imei","ngfw_id","amp_computer_guid","ms_machine_id","mutex","processor_id","swc_device_id","registry_path","odns_identity","odns_identity_label","cisco_mid","process_name","pki_serial","meraki_node_sn","email_messageid","imsi","user_agent","process_hash","file_name"]}},"additionalProperties":false,"description":"An AssetMapping is a record that a specific Observable maps to an Asset for an indicated period of time.","example":{"value":"1.2.3.4","type":"ip"},"$$ref":"#/components/schemas/Observable"}},"additionalProperties":false,"description":"A relation inside a Sighting.","example":{"origin":"string","origin_uri":"string","relation":"Allocated","relation_info":{"keyword":"anything"},"source":{"value":"1.2.3.4","type":"ip"},"related":{"value":"1.2.3.4","type":"ip"}},"$$ref":"#/components/schemas/ObservedRelation"}},"sensor_coordinates":{"required":["observables","type"],"type":"object","properties":{"type":{"type":"string","description":"The sensor/actuator name that best fits a device.","example":"endpoint"},"observables":{"type":"array","example":[{"value":"1.2.3.4","type":"ip"}],"items":{"required":["type","value"],"type":"object","properties":{"value":{"type":"string","description":"The value of the observable.","example":"1.2.3.4"},"type":{"type":"string","description":"The type of observable.","example":"ip","enum":["file_path","mac_address","trend_micro_id","cybereason_id","process_args","s1_agent_id","device","hostname","certificate_common_name","serial_number","meraki_network_id","url","certificate_serial","meraki_org_id","cisco_cm_id","registry_key","process_path","darktrace_id","process_username","cortex_agent_id","orbital_node_id","process_uid","ngfw_name","user","certificate_issuer","ipv6","email","cisco_uc_id","sha256","crowdstrike_id","sha1","registry_name","md5","ip","domain","email_subject","imei","ngfw_id","amp_computer_guid","ms_machine_id","mutex","processor_id","swc_device_id","registry_path","odns_identity","odns_identity_label","cisco_mid","process_name","pki_serial","meraki_node_sn","email_messageid","imsi","user_agent","process_hash","file_name"]}},"additionalProperties":false,"description":"An AssetMapping is a record that a specific Observable maps to an Asset for an indicated period of time.","example":{"value":"1.2.3.4","type":"ip"},"$$ref":"#/components/schemas/Observable"}},"os":{"type":"string","example":"string"}},"additionalProperties":false,"description":"Describes the device that made the sighting (sensor) and contains identifying observables for the sensor.","example":{"type":"endpoint","observables":[{"value":"1.2.3.4","type":"ip"}],"os":"string"},"$$ref":"#/components/schemas/SensorCoordinates"},"observables":{"type":"array","description":"The object(s) of interest.","example":[{"value":"1.2.3.4","type":"ip"}],"items":{"required":["type","value"],"type":"object","properties":{"value":{"type":"string","description":"The value of the observable.","example":"1.2.3.4"},"type":{"type":"string","description":"The type of observable.","example":"ip","enum":["file_path","mac_address","trend_micro_id","cybereason_id","process_args","s1_agent_id","device","hostname","certificate_common_name","serial_number","meraki_network_id","url","certificate_serial","meraki_org_id","cisco_cm_id","registry_key","process_path","darktrace_id","process_username","cortex_agent_id","orbital_node_id","process_uid","ngfw_name","user","certificate_issuer","ipv6","email","cisco_uc_id","sha256","crowdstrike_id","sha1","registry_name","md5","ip","domain","email_subject","imei","ngfw_id","amp_computer_guid","ms_machine_id","mutex","processor_id","swc_device_id","registry_path","odns_identity","odns_identity_label","cisco_mid","process_name","pki_serial","meraki_node_sn","email_messageid","imsi","user_agent","process_hash","file_name"]}},"additionalProperties":false,"description":"An AssetMapping is a record that a specific Observable maps to an Asset for an indicated period of time.","example":{"value":"1.2.3.4","type":"ip"},"$$ref":"#/components/schemas/Observable"}},"authorized_users":{"type":"array","items":{"type":"string"}},"type":{"type":"string","example":"sighting","enum":["sighting"]},"created":{"type":"string","format":"date-time"},"source":{"type":"string","description":"Represents the source of the intelligence that led to the creation of the entity.","example":"string"},"external_ids":{"type":"array","description":"It is used to store a list of external identifiers that can be linked to the incident, providing a reliable and manageable way to correlate and group related events across multiple data sources. It is especially useful in larger organizations that rely on multiple security information and event management (SIEM) systems to detect security incidents. For instance, it can be used to track events across different network sensors, intrusion detection and prevention systems (IDPS), or log management platforms. \n The field can also be used to facilitate automation and orchestration workflows, where additional information can be shared among incident management systems. It can be used to cross-reference with other external tools such as threat intelligence feeds and vulnerability scanners.","example":["string"],"items":{"type":"string"}},"modified":{"type":"string","format":"date-time"},"targets":{"type":"array","description":"May include one or more targets that observed the associated indicator. Targets can include network devices, host devices, or other entities that are capable of detecting indicators of compromise.\n\nCan be used to assess the scope of potential threats, helping analysts understand which devices or components of the network may be vulnerable to attack. For example, if a particular malware strain is detected on several different systems within an organization, the `targets` field may indicate which systems are affected and which may need to be isolated or patched to prevent further spread.","example":[{"type":"endpoint","observables":[{"value":"1.2.3.4","type":"ip"}],"observed_time":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"os":"string"}],"items":{"required":["observables","observed_time","type"],"type":"object","properties":{"type":{"type":"string","description":"The sensor/actuator name that best fits a device.","example":"endpoint"},"observables":{"type":"array","example":[{"value":"1.2.3.4","type":"ip"}],"items":{"required":["type","value"],"type":"object","properties":{"value":{"type":"string","description":"The value of the observable.","example":"1.2.3.4"},"type":{"type":"string","description":"The type of observable.","example":"ip","enum":["file_path","mac_address","trend_micro_id","cybereason_id","process_args","s1_agent_id","device","hostname","certificate_common_name","serial_number","meraki_network_id","url","certificate_serial","meraki_org_id","cisco_cm_id","registry_key","process_path","darktrace_id","process_username","cortex_agent_id","orbital_node_id","process_uid","ngfw_name","user","certificate_issuer","ipv6","email","cisco_uc_id","sha256","crowdstrike_id","sha1","registry_name","md5","ip","domain","email_subject","imei","ngfw_id","amp_computer_guid","ms_machine_id","mutex","processor_id","swc_device_id","registry_path","odns_identity","odns_identity_label","cisco_mid","process_name","pki_serial","meraki_node_sn","email_messageid","imsi","user_agent","process_hash","file_name"]}},"additionalProperties":false,"description":"An AssetMapping is a record that a specific Observable maps to an Asset for an indicated period of time.","example":{"value":"1.2.3.4","type":"ip"},"$$ref":"#/components/schemas/Observable"}},"observed_time":{"required":["start_time"],"type":"object","properties":{"start_time":{"type":"string","description":"Time of the observation. If the observation was made over a period of time, than this field indicates the start of that period.","format":"date-time","example":"2016-01-01T01:01:01Z"},"end_time":{"type":"string","description":"If the observation was made over a period of time, than this field indicates the end of that period.","format":"date-time","example":"2016-01-01T01:01:01Z"}},"additionalProperties":false,"description":"Period of time when a cyber observation is valid. `start_time` must come before `end_time` (if specified).","example":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"$$ref":"#/components/schemas/ObservedTime"},"os":{"type":"string","example":"string"}},"additionalProperties":false,"description":"Describes the target of the sighting and contains identifying observables for the target.","example":{"type":"endpoint","observables":[{"value":"1.2.3.4","type":"ip"}],"observed_time":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"os":"string"},"$$ref":"#/components/schemas/IdentitySpecification"}},"short_description":{"type":"string","description":"A single line, short summary of the object.","example":"string"},"title":{"type":"string","description":"A short title for this object, used as primary display and reference value.","example":"string"},"resolution":{"type":"string","description":"Represents the disposition or actions taken on the associated threat intelligence.","example":"detected"},"internal":{"type":"boolean","description":"If `true`, indicates that the sighting was reported from internal sources, such as an organization's own internal security tools or SOC.\n Internal sightings are often considered more reliable and actionable than external sightings, which are reported from external sources and may have a lower level of trustworthiness. Internal sightings can provide more context and can help identify potential threats that are unique to a particular environment or organization.\n Internal sightings can also help organizations prioritize their security response efforts by identifying threats that are specific to their environment and may not yet be widely known.","example":false},"external_references":{"type":"array","description":"Specifies a list of external references which refers to non-CTIM information.\n\nSimilar to `external_ids` field with major differences:\n\n- `external_ids` field is used to store a list of external identifiers that can be used to link entities across different data sources. These identifiers are typically standardized and well-known, such as CVE IDs, US-CERT advisories, or other industry-standard threat intelligence feeds. The `external_ids` field can be used to facilitate automation and orchestration workflows, where additional information can be shared among incident management systems. \n\n- `external_references` field, on the other hand, is used to provide a more general mechanism for linking entities to external sources of information. The `external_references` field can include references to blog posts, articles, external documents, threat intelligence reports, and other sources of information that may not have a standardized format or identifier.","example":[{"source_name":"string","description":"string","url":"string","hashes":["string"],"external_id":"string"}],"items":{"required":["source_name"],"type":"object","properties":{"source_name":{"type":"string","description":"The source within which the external-reference is defined (system, registry, organization, etc.)","example":"string"},"description":{"type":"string","description":"Markdown string with at most 5000 characters.","example":"string"},"url":{"type":"string","description":"A URL reference to an external resource.","example":"string"},"hashes":{"type":"array","description":"Specifies a dictionary of hashes for the contents of the url.","example":["string"],"items":{"type":"string"}},"external_id":{"type":"string","description":"An identifier for the external reference content.","example":"string"}},"additionalProperties":false,"description":"External references are used to describe pointers to information represented outside of CTIM. For example, a Malware object could use an external reference to indicate an ID for that malware in an external database or a report could use references to represent source material.","example":{"source_name":"string","description":"string","url":"string","hashes":["string"],"external_id":"string"},"$$ref":"#/components/schemas/ExternalReference"}},"source_uri":{"type":"string","description":"URI of the source of the intelligence that led to the creation of the entity.","example":"string"},"language":{"type":"string","description":"The `language` field is used to specify the primary language of the affected system or the target of an attack. It can be used to provide additional context and information about the entity. The primary purpose of this field is to help analysts filter and prioritize entities based on their knowledge and expertise of different languages.\n\nFor example, if an incident involves an attack on a system in a country where a specific language is predominant, the `language` field can be used to indicate that language, which can help analysts to quickly identify and respond to incidents that may be geographically or culturally relevant. This information can be used to prioritize incidents based on their potential impact. The `language` field can also be used to help with correlation of incidents across different systems and regions, as well as to help with data analysis and reporting.","example":"string"},"id":{"type":"string","description":"Globally unique URI identifying this object.","example":"string"},"count":{"type":"integer","description":"The number of times an indicator was observed within a certain period of time.\nFor example, if an IP address associated with known malicious activity is observed once within a period of time, it may indicate a low-level threat. However, if the same IP address is observed multiple times within a short time frame, it may indicate a more severe and persistent threat.\nIt can also be used to prioritize security alerts and indicate the urgency of a response. High counts indicate that an indicator is actively being used in a larger campaign, while low counts may indicate isolated incidents.","format":"int64","example":10},"severity":{"type":"string","example":"Critical","enum":["Medium","Info","Unknown","None","High","Critical","Low"]},"tlp":{"type":"string","description":"TLP stands for [Traffic Light Protocol](https://www.us-cert.gov/tlp), which indicates precisely how a resource is intended to be shared, replicated, copied, etc.\n\nIt is used to indicate the sensitivity of the information contained within the message. This allows recipients to determine the appropriate handling and dissemination of the information based on their clearance level and need-to-know.\n\nFor example, an entity containing information about a critical vulnerability in a widely-used software might be marked as `red`, indicating that it should only be shared with a small group of highly trusted individuals who need to know in order to take appropriate action. On the other hand, a message containing more general information about security threats might be marked as `amber` or `green`, indicating that it can be shared more broadly within an organization.","example":"green","enum":["white","green","red","amber"]},"context":{"type":"object","properties":{"http_events":{"type":"array","description":"a list of `HTTPType`","example":[{"process_guid":10,"traffic":{"destination_host_name":"string","protocol":10,"source_ip":"string","destination_subnet":"string","destination_ip":"string","source_subnet":"string","destination_port":10,"direction":"incoming","source_port":10},"method":"CONNECT","time":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"type":"HTTPEvent","host":"string","process_name":"string","process_id":10,"process_username":"string","query":"string","encrypted":true,"url_port":10}],"items":{"required":["host","process_id","process_name","time","traffic","type"],"type":"object","properties":{"process_guid":{"type":"integer","format":"int64","example":10},"traffic":{"required":["destination_ip","destination_port","direction","protocol","source_ip","source_port"],"type":"object","properties":{"destination_host_name":{"type":"string","example":"string"},"protocol":{"type":"integer","description":"The IP [protocol id](https://www.iana.org/assignments/protocol-numbers/protocol-numbers.xhtml)","format":"int64","example":10},"source_ip":{"type":"string","example":"string"},"destination_subnet":{"type":"string","example":"string"},"destination_ip":{"type":"string","example":"string"},"source_subnet":{"type":"string","example":"string"},"destination_port":{"type":"integer","format":"int64","example":10},"direction":{"type":"string","example":"incoming","enum":["incoming","outgoing"]},"source_port":{"type":"integer","format":"int64","example":10}},"additionalProperties":false,"example":{"destination_host_name":"string","protocol":10,"source_ip":"string","destination_subnet":"string","destination_ip":"string","source_subnet":"string","destination_port":10,"direction":"incoming","source_port":10},"$$ref":"#/components/schemas/Traffic"},"method":{"type":"string","example":"CONNECT","enum":["OPTIONS","PATCH","TRACE","HEAD","POST","CONNECT","GET","PUT"]},"time":{"required":["start_time"],"type":"object","properties":{"start_time":{"type":"string","description":"Time of the observation. If the observation was made over a period of time, than this field indicates the start of that period.","format":"date-time","example":"2016-01-01T01:01:01Z"},"end_time":{"type":"string","description":"If the observation was made over a period of time, than this field indicates the end of that period.","format":"date-time","example":"2016-01-01T01:01:01Z"}},"additionalProperties":false,"description":"Period of time when a cyber observation is valid. `start_time` must come before `end_time` (if specified).","example":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"$$ref":"#/components/schemas/ObservedTime"},"type":{"type":"string","example":"HTTPEvent","enum":["HTTPEvent"]},"host":{"type":"string","description":"String with at most 1024 characters.","example":"string"},"process_name":{"type":"string","description":"String with at most 1024 characters.","example":"string"},"process_id":{"type":"integer","format":"int64","example":10},"process_username":{"type":"string","description":"String with at most 1024 characters.","example":"string"},"query":{"type":"string","description":"String with at most 5000 characters.","example":"string"},"encrypted":{"type":"boolean","example":true},"url_port":{"type":"integer","format":"int64","example":10}},"additionalProperties":false,"example":{"process_guid":10,"traffic":{"destination_host_name":"string","protocol":10,"source_ip":"string","destination_subnet":"string","destination_ip":"string","source_subnet":"string","destination_port":10,"direction":"incoming","source_port":10},"method":"CONNECT","time":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"type":"HTTPEvent","host":"string","process_name":"string","process_id":10,"process_username":"string","query":"string","encrypted":true,"url_port":10},"$$ref":"#/components/schemas/HTTPType"}},"process_create_events":{"type":"array","description":"a list of `ProcessCreate`","example":[{"parent_process_name":"string","process_guid":10,"parent_process_guid":10,"process_disposition":"string","parent_process_size":10,"process_size":10,"time":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"parent_process_disposition":"string","type":"ProcessCreateEvent","parent_process_username":"string","parent_process_id":10,"parent_process_args":"string","process_name":"string","process_hash":"string","process_id":10,"parent_process_hash":"string","process_username":"string","parent_creation_time":"2016-01-01T01:01:01.000Z","process_args":"string"}],"items":{"required":["process_id","process_name","time","type"],"type":"object","properties":{"parent_process_name":{"type":"string","description":"String with at most 1024 characters.","example":"string"},"process_guid":{"type":"integer","format":"int64","example":10},"parent_process_guid":{"type":"integer","format":"int64","example":10},"process_disposition":{"type":"string","description":"String with at most 1024 characters.","example":"string"},"parent_process_size":{"type":"integer","format":"int64","example":10},"process_size":{"type":"integer","format":"int64","example":10},"time":{"required":["start_time"],"type":"object","properties":{"start_time":{"type":"string","description":"Time of the observation. If the observation was made over a period of time, than this field indicates the start of that period.","format":"date-time","example":"2016-01-01T01:01:01Z"},"end_time":{"type":"string","description":"If the observation was made over a period of time, than this field indicates the end of that period.","format":"date-time","example":"2016-01-01T01:01:01Z"}},"additionalProperties":false,"description":"Period of time when a cyber observation is valid. `start_time` must come before `end_time` (if specified).","example":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"$$ref":"#/components/schemas/ObservedTime"},"parent_process_disposition":{"type":"string","description":"String with at most 1024 characters.","example":"string"},"type":{"type":"string","example":"ProcessCreateEvent","enum":["ProcessCreateEvent"]},"parent_process_username":{"type":"string","description":"String with at most 1024 characters.","example":"string"},"parent_process_id":{"type":"integer","format":"int64","example":10},"parent_process_args":{"type":"string","description":"String with at most 2048 characters.","example":"string"},"process_name":{"type":"string","description":"String with at most 1024 characters.","example":"string"},"process_hash":{"type":"string","description":"String with at most 2048 characters.","example":"string"},"process_id":{"type":"integer","format":"int64","example":10},"parent_process_hash":{"type":"string","description":"String with at most 2048 characters.","example":"string"},"process_username":{"type":"string","description":"String with at most 1024 characters.","example":"string"},"parent_creation_time":{"type":"string","description":"Schema definition for all date or timestamp values. Serialized as a string, the field should follow the rules of the [ISO8601](https://en.wikipedia.org/wiki/ISO_8601) standard.","format":"date-time","example":"2016-01-01T01:01:01Z"},"process_args":{"type":"string","description":"String with at most 2048 characters.","example":"string"}},"additionalProperties":false,"example":{"parent_process_name":"string","process_guid":10,"parent_process_guid":10,"process_disposition":"string","parent_process_size":10,"process_size":10,"time":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"parent_process_disposition":"string","type":"ProcessCreateEvent","parent_process_username":"string","parent_process_id":10,"parent_process_args":"string","process_name":"string","process_hash":"string","process_id":10,"parent_process_hash":"string","process_username":"string","parent_creation_time":"2016-01-01T01:01:01.000Z","process_args":"string"},"$$ref":"#/components/schemas/ProcessCreateType"}},"registry_delete_events":{"type":"array","description":"a list of `RegistryDeleteType`","example":[{"time":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"process_id":10,"process_name":"string","process_guid":10,"process_username":"string","registry_key":"string","type":"RegistryDeleteEvent","registry_value":"string"}],"items":{"required":["process_id","process_name","registry_key","time","type"],"type":"object","properties":{"time":{"required":["start_time"],"type":"object","properties":{"start_time":{"type":"string","description":"Time of the observation. If the observation was made over a period of time, than this field indicates the start of that period.","format":"date-time","example":"2016-01-01T01:01:01Z"},"end_time":{"type":"string","description":"If the observation was made over a period of time, than this field indicates the end of that period.","format":"date-time","example":"2016-01-01T01:01:01Z"}},"additionalProperties":false,"description":"Period of time when a cyber observation is valid. `start_time` must come before `end_time` (if specified).","example":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"$$ref":"#/components/schemas/ObservedTime"},"process_id":{"type":"integer","format":"int64","example":10},"process_name":{"type":"string","description":"String with at most 1024 characters.","example":"string"},"process_guid":{"type":"integer","format":"int64","example":10},"process_username":{"type":"string","description":"String with at most 1024 characters.","example":"string"},"registry_key":{"type":"string","description":"String with at most 1024 characters.","example":"string"},"type":{"type":"string","example":"RegistryDeleteEvent","enum":["RegistryDeleteEvent"]},"registry_value":{"type":"string","description":"String with at most 2048 characters.","example":"string"}},"additionalProperties":false,"example":{"time":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"process_id":10,"process_name":"string","process_guid":10,"process_username":"string","registry_key":"string","type":"RegistryDeleteEvent","registry_value":"string"},"$$ref":"#/components/schemas/RegistryDeleteType"}},"file_modify_events":{"type":"array","description":"a list of `FileModifyType`","example":[{"file_name":"string","process_guid":10,"time":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"type":"FileModifyEvent","file_path":"string","process_name":"string","process_id":10,"process_username":"string","failed":false}],"items":{"required":["file_name","file_path","process_id","process_name","time","type"],"type":"object","properties":{"file_name":{"type":"string","description":"String with at most 1024 characters.","example":"string"},"process_guid":{"type":"integer","format":"int64","example":10},"time":{"required":["start_time"],"type":"object","properties":{"start_time":{"type":"string","description":"Time of the observation. If the observation was made over a period of time, than this field indicates the start of that period.","format":"date-time","example":"2016-01-01T01:01:01Z"},"end_time":{"type":"string","description":"If the observation was made over a period of time, than this field indicates the end of that period.","format":"date-time","example":"2016-01-01T01:01:01Z"}},"additionalProperties":false,"description":"Period of time when a cyber observation is valid. `start_time` must come before `end_time` (if specified).","example":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"$$ref":"#/components/schemas/ObservedTime"},"type":{"type":"string","example":"FileModifyEvent","enum":["FileModifyEvent"]},"file_path":{"type":"string","description":"String with at most 2048 characters.","example":"string"},"process_name":{"type":"string","description":"String with at most 1024 characters.","example":"string"},"process_id":{"type":"integer","format":"int64","example":10},"process_username":{"type":"string","description":"String with at most 1024 characters.","example":"string"},"failed":{"type":"boolean","example":false}},"additionalProperties":false,"example":{"file_name":"string","process_guid":10,"time":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"type":"FileModifyEvent","file_path":"string","process_name":"string","process_id":10,"process_username":"string","failed":false},"$$ref":"#/components/schemas/FileModifyType"}},"registry_set_events":{"type":"array","description":"a list of `RegistrySetType`","example":[{"process_guid":10,"registry_data":"string","time":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"type":"RegistrySetEvent","registry_data_length":10,"registry_value":"string","registry_key":"string","process_name":"string","process_id":10,"process_username":"string"}],"items":{"required":["process_id","process_name","registry_key","registry_value","time","type"],"type":"object","properties":{"process_guid":{"type":"integer","format":"int64","example":10},"registry_data":{"type":"string","description":"String with at most 5000 characters.","example":"string"},"time":{"required":["start_time"],"type":"object","properties":{"start_time":{"type":"string","description":"Time of the observation. If the observation was made over a period of time, than this field indicates the start of that period.","format":"date-time","example":"2016-01-01T01:01:01Z"},"end_time":{"type":"string","description":"If the observation was made over a period of time, than this field indicates the end of that period.","format":"date-time","example":"2016-01-01T01:01:01Z"}},"additionalProperties":false,"description":"Period of time when a cyber observation is valid. `start_time` must come before `end_time` (if specified).","example":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"$$ref":"#/components/schemas/ObservedTime"},"type":{"type":"string","example":"RegistrySetEvent","enum":["RegistrySetEvent"]},"registry_data_length":{"type":"integer","format":"int64","example":10},"registry_value":{"type":"string","description":"String with at most 2048 characters.","example":"string"},"registry_key":{"type":"string","description":"String with at most 1024 characters.","example":"string"},"process_name":{"type":"string","description":"String with at most 1024 characters.","example":"string"},"process_id":{"type":"integer","format":"int64","example":10},"process_username":{"type":"string","description":"String with at most 1024 characters.","example":"string"}},"additionalProperties":false,"example":{"process_guid":10,"registry_data":"string","time":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"type":"RegistrySetEvent","registry_data_length":10,"registry_value":"string","registry_key":"string","process_name":"string","process_id":10,"process_username":"string"},"$$ref":"#/components/schemas/RegistrySetType"}},"file_create_events":{"type":"array","description":"a list of `FileCreateType`","example":[{"file_name":"string","process_guid":10,"time":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"type":"FileCreateEvent","file_path":"string","process_name":"string","process_id":10,"process_username":"string","failed":false}],"items":{"required":["file_name","file_path","process_id","process_name","time","type"],"type":"object","properties":{"file_name":{"type":"string","description":"String with at most 1024 characters.","example":"string"},"process_guid":{"type":"integer","format":"int64","example":10},"time":{"required":["start_time"],"type":"object","properties":{"start_time":{"type":"string","description":"Time of the observation. If the observation was made over a period of time, than this field indicates the start of that period.","format":"date-time","example":"2016-01-01T01:01:01Z"},"end_time":{"type":"string","description":"If the observation was made over a period of time, than this field indicates the end of that period.","format":"date-time","example":"2016-01-01T01:01:01Z"}},"additionalProperties":false,"description":"Period of time when a cyber observation is valid. `start_time` must come before `end_time` (if specified).","example":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"$$ref":"#/components/schemas/ObservedTime"},"type":{"type":"string","example":"FileCreateEvent","enum":["FileCreateEvent"]},"file_path":{"type":"string","description":"String with at most 2048 characters.","example":"string"},"process_name":{"type":"string","description":"String with at most 1024 characters.","example":"string"},"process_id":{"type":"integer","format":"int64","example":10},"process_username":{"type":"string","description":"String with at most 1024 characters.","example":"string"},"failed":{"type":"boolean","example":false}},"additionalProperties":false,"example":{"file_name":"string","process_guid":10,"time":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"type":"FileCreateEvent","file_path":"string","process_name":"string","process_id":10,"process_username":"string","failed":false},"$$ref":"#/components/schemas/FileCreateType"}},"registry_create_events":{"type":"array","description":"a list of `RegistryCreateType`","example":[{"time":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"process_id":10,"process_name":"string","process_guid":10,"process_username":"string","registry_key":"string","type":"RegistryCreateEvent"}],"items":{"required":["process_id","process_name","registry_key","time","type"],"type":"object","properties":{"time":{"required":["start_time"],"type":"object","properties":{"start_time":{"type":"string","description":"Time of the observation. If the observation was made over a period of time, than this field indicates the start of that period.","format":"date-time","example":"2016-01-01T01:01:01Z"},"end_time":{"type":"string","description":"If the observation was made over a period of time, than this field indicates the end of that period.","format":"date-time","example":"2016-01-01T01:01:01Z"}},"additionalProperties":false,"description":"Period of time when a cyber observation is valid. `start_time` must come before `end_time` (if specified).","example":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"$$ref":"#/components/schemas/ObservedTime"},"process_id":{"type":"integer","format":"int64","example":10},"process_name":{"type":"string","description":"String with at most 1024 characters.","example":"string"},"process_guid":{"type":"integer","format":"int64","example":10},"process_username":{"type":"string","description":"String with at most 1024 characters.","example":"string"},"registry_key":{"type":"string","description":"String with at most 1024 characters.","example":"string"},"type":{"type":"string","example":"RegistryCreateEvent","enum":["RegistryCreateEvent"]}},"additionalProperties":false,"example":{"time":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"process_id":10,"process_name":"string","process_guid":10,"process_username":"string","registry_key":"string","type":"RegistryCreateEvent"},"$$ref":"#/components/schemas/RegistryCreateType"}},"library_load_events":{"type":"array","description":"a list of `LibraryLoadType`","example":[{"time":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"process_id":10,"process_name":"string","process_guid":10,"process_username":"string","type":"LibraryLoadEvent","dll_library_name":"string","dll_library_path":"string"}],"items":{"required":["dll_library_name","dll_library_path","process_id","process_name","time","type"],"type":"object","properties":{"time":{"required":["start_time"],"type":"object","properties":{"start_time":{"type":"string","description":"Time of the observation. If the observation was made over a period of time, than this field indicates the start of that period.","format":"date-time","example":"2016-01-01T01:01:01Z"},"end_time":{"type":"string","description":"If the observation was made over a period of time, than this field indicates the end of that period.","format":"date-time","example":"2016-01-01T01:01:01Z"}},"additionalProperties":false,"description":"Period of time when a cyber observation is valid. `start_time` must come before `end_time` (if specified).","example":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"$$ref":"#/components/schemas/ObservedTime"},"process_id":{"type":"integer","format":"int64","example":10},"process_name":{"type":"string","description":"String with at most 1024 characters.","example":"string"},"process_guid":{"type":"integer","format":"int64","example":10},"process_username":{"type":"string","description":"String with at most 1024 characters.","example":"string"},"type":{"type":"string","example":"LibraryLoadEvent","enum":["LibraryLoadEvent"]},"dll_library_name":{"type":"string","description":"String with at most 1024 characters.","example":"string"},"dll_library_path":{"type":"string","description":"String with at most 2048 characters.","example":"string"}},"additionalProperties":false,"example":{"time":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"process_id":10,"process_name":"string","process_guid":10,"process_username":"string","type":"LibraryLoadEvent","dll_library_name":"string","dll_library_path":"string"},"$$ref":"#/components/schemas/LibraryLoadType"}},"file_move_events":{"type":"array","description":"a list of `FileMoveType`","example":[{"file_name":"string","process_guid":10,"time":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"type":"FileMoveEvent","old_name":"string","file_path":"string","process_name":"string","process_id":10,"process_username":"string","new_name":"string"}],"items":{"required":["file_name","file_path","new_name","old_name","process_id","process_name","time","type"],"type":"object","properties":{"file_name":{"type":"string","description":"String with at most 1024 characters.","example":"string"},"process_guid":{"type":"integer","format":"int64","example":10},"time":{"required":["start_time"],"type":"object","properties":{"start_time":{"type":"string","description":"Time of the observation. If the observation was made over a period of time, than this field indicates the start of that period.","format":"date-time","example":"2016-01-01T01:01:01Z"},"end_time":{"type":"string","description":"If the observation was made over a period of time, than this field indicates the end of that period.","format":"date-time","example":"2016-01-01T01:01:01Z"}},"additionalProperties":false,"description":"Period of time when a cyber observation is valid. `start_time` must come before `end_time` (if specified).","example":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"$$ref":"#/components/schemas/ObservedTime"},"type":{"type":"string","example":"FileMoveEvent","enum":["FileMoveEvent"]},"old_name":{"type":"string","description":"String with at most 1024 characters.","example":"string"},"file_path":{"type":"string","description":"String with at most 2048 characters.","example":"string"},"process_name":{"type":"string","description":"String with at most 1024 characters.","example":"string"},"process_id":{"type":"integer","format":"int64","example":10},"process_username":{"type":"string","description":"String with at most 1024 characters.","example":"string"},"new_name":{"type":"string","description":"String with at most 1024 characters.","example":"string"}},"additionalProperties":false,"example":{"file_name":"string","process_guid":10,"time":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"type":"FileMoveEvent","old_name":"string","file_path":"string","process_name":"string","process_id":10,"process_username":"string","new_name":"string"},"$$ref":"#/components/schemas/FileMoveType"}},"file_delete_events":{"type":"array","description":"a list of `FileDeleteType`","example":[{"file_name":"string","process_guid":10,"time":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"type":"FileDeleteEvent","file_path":"string","process_name":"string","process_id":10,"process_username":"string","failed":false}],"items":{"required":["file_name","file_path","process_id","process_name","time","type"],"type":"object","properties":{"file_name":{"type":"string","description":"String with at most 1024 characters.","example":"string"},"process_guid":{"type":"integer","format":"int64","example":10},"time":{"required":["start_time"],"type":"object","properties":{"start_time":{"type":"string","description":"Time of the observation. If the observation was made over a period of time, than this field indicates the start of that period.","format":"date-time","example":"2016-01-01T01:01:01Z"},"end_time":{"type":"string","description":"If the observation was made over a period of time, than this field indicates the end of that period.","format":"date-time","example":"2016-01-01T01:01:01Z"}},"additionalProperties":false,"description":"Period of time when a cyber observation is valid. `start_time` must come before `end_time` (if specified).","example":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"$$ref":"#/components/schemas/ObservedTime"},"type":{"type":"string","example":"FileDeleteEvent","enum":["FileDeleteEvent"]},"file_path":{"type":"string","description":"String with at most 2048 characters.","example":"string"},"process_name":{"type":"string","description":"String with at most 1024 characters.","example":"string"},"process_id":{"type":"integer","format":"int64","example":10},"process_username":{"type":"string","description":"String with at most 1024 characters.","example":"string"},"failed":{"type":"boolean","example":false}},"additionalProperties":false,"example":{"file_name":"string","process_guid":10,"time":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"type":"FileDeleteEvent","file_path":"string","process_name":"string","process_id":10,"process_username":"string","failed":false},"$$ref":"#/components/schemas/FileDeleteType"}},"netflow_events":{"type":"array","description":"a list of `NetflowType`","example":[{"parent_process_name":"string","byte_count_in":10,"process_guid":10,"process_path":"string","traffic":{"destination_host_name":"string","protocol":10,"source_ip":"string","destination_subnet":"string","destination_ip":"string","source_subnet":"string","destination_port":10,"direction":"incoming","source_port":10},"flow_time":"2016-01-01T01:01:01.000Z","time":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"parent_process_account":"string","type":"NetflowEvent","process_account_type":"string","parent_process_path":"string","parent_process_id":10,"parent_process_args":"string","process_name":"string","process_account":"string","parent_process_account_type":"string","process_hash":"string","process_id":10,"parent_process_hash":"string","process_username":"string","byte_count_out":10,"process_args":"string"}],"items":{"required":["process_id","process_name","time","traffic","type"],"type":"object","properties":{"parent_process_name":{"type":"string","description":"String with at most 1024 characters.","example":"string"},"byte_count_in":{"type":"integer","format":"int64","example":10},"process_guid":{"type":"integer","format":"int64","example":10},"process_path":{"type":"string","description":"String with at most 1024 characters.","example":"string"},"traffic":{"required":["destination_ip","destination_port","direction","protocol","source_ip","source_port"],"type":"object","properties":{"destination_host_name":{"type":"string","example":"string"},"protocol":{"type":"integer","description":"The IP [protocol id](https://www.iana.org/assignments/protocol-numbers/protocol-numbers.xhtml)","format":"int64","example":10},"source_ip":{"type":"string","example":"string"},"destination_subnet":{"type":"string","example":"string"},"destination_ip":{"type":"string","example":"string"},"source_subnet":{"type":"string","example":"string"},"destination_port":{"type":"integer","format":"int64","example":10},"direction":{"type":"string","example":"incoming","enum":["incoming","outgoing"]},"source_port":{"type":"integer","format":"int64","example":10}},"additionalProperties":false,"example":{"destination_host_name":"string","protocol":10,"source_ip":"string","destination_subnet":"string","destination_ip":"string","source_subnet":"string","destination_port":10,"direction":"incoming","source_port":10},"$$ref":"#/components/schemas/Traffic"},"flow_time":{"type":"string","description":"Schema definition for all date or timestamp values. Serialized as a string, the field should follow the rules of the [ISO8601](https://en.wikipedia.org/wiki/ISO_8601) standard.","format":"date-time","example":"2016-01-01T01:01:01Z"},"time":{"required":["start_time"],"type":"object","properties":{"start_time":{"type":"string","description":"Time of the observation. If the observation was made over a period of time, than this field indicates the start of that period.","format":"date-time","example":"2016-01-01T01:01:01Z"},"end_time":{"type":"string","description":"If the observation was made over a period of time, than this field indicates the end of that period.","format":"date-time","example":"2016-01-01T01:01:01Z"}},"additionalProperties":false,"description":"Period of time when a cyber observation is valid. `start_time` must come before `end_time` (if specified).","example":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"$$ref":"#/components/schemas/ObservedTime"},"parent_process_account":{"type":"string","description":"String with at most 1024 characters.","example":"string"},"type":{"type":"string","example":"NetflowEvent","enum":["NetflowEvent"]},"process_account_type":{"type":"string","description":"String with at most 1024 characters.","example":"string"},"parent_process_path":{"type":"string","description":"String with at most 1024 characters.","example":"string"},"parent_process_id":{"type":"integer","format":"int64","example":10},"parent_process_args":{"type":"string","description":"String with at most 1024 characters.","example":"string"},"process_name":{"type":"string","description":"String with at most 1024 characters.","example":"string"},"process_account":{"type":"string","description":"String with at most 1024 characters.","example":"string"},"parent_process_account_type":{"type":"string","description":"String with at most 1024 characters.","example":"string"},"process_hash":{"type":"string","description":"String with at most 1024 characters.","example":"string"},"process_id":{"type":"integer","format":"int64","example":10},"parent_process_hash":{"type":"string","description":"String with at most 1024 characters.","example":"string"},"process_username":{"type":"string","description":"String with at most 1024 characters.","example":"string"},"byte_count_out":{"type":"integer","format":"int64","example":10},"process_args":{"type":"string","description":"String with at most 1024 characters.","example":"string"}},"additionalProperties":false,"example":{"parent_process_name":"string","byte_count_in":10,"process_guid":10,"process_path":"string","traffic":{"destination_host_name":"string","protocol":10,"source_ip":"string","destination_subnet":"string","destination_ip":"string","source_subnet":"string","destination_port":10,"direction":"incoming","source_port":10},"flow_time":"2016-01-01T01:01:01.000Z","time":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"parent_process_account":"string","type":"NetflowEvent","process_account_type":"string","parent_process_path":"string","parent_process_id":10,"parent_process_args":"string","process_name":"string","process_account":"string","parent_process_account_type":"string","process_hash":"string","process_id":10,"parent_process_hash":"string","process_username":"string","byte_count_out":10,"process_args":"string"},"$$ref":"#/components/schemas/NetflowType"}},"registry_rename_events":{"type":"array","description":"a list of `RegistryRenameType`","example":[{"time":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"process_id":10,"process_name":"string","process_guid":10,"process_username":"string","registry_key":"string","type":"RegistryRenameEvent","registry_old_key":"string"}],"items":{"required":["process_id","process_name","registry_key","registry_old_key","time","type"],"type":"object","properties":{"time":{"required":["start_time"],"type":"object","properties":{"start_time":{"type":"string","description":"Time of the observation. If the observation was made over a period of time, than this field indicates the start of that period.","format":"date-time","example":"2016-01-01T01:01:01Z"},"end_time":{"type":"string","description":"If the observation was made over a period of time, than this field indicates the end of that period.","format":"date-time","example":"2016-01-01T01:01:01Z"}},"additionalProperties":false,"description":"Period of time when a cyber observation is valid. `start_time` must come before `end_time` (if specified).","example":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"$$ref":"#/components/schemas/ObservedTime"},"process_id":{"type":"integer","format":"int64","example":10},"process_name":{"type":"string","description":"String with at most 1024 characters.","example":"string"},"process_guid":{"type":"integer","format":"int64","example":10},"process_username":{"type":"string","description":"String with at most 1024 characters.","example":"string"},"registry_key":{"type":"string","description":"String with at most 1024 characters.","example":"string"},"type":{"type":"string","example":"RegistryRenameEvent","enum":["RegistryRenameEvent"]},"registry_old_key":{"type":"string","description":"String with at most 1024 characters.","example":"string"}},"additionalProperties":false,"example":{"time":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"process_id":10,"process_name":"string","process_guid":10,"process_username":"string","registry_key":"string","type":"RegistryRenameEvent","registry_old_key":"string"},"$$ref":"#/components/schemas/RegistryRenameType"}}},"additionalProperties":false,"description":"Context including the event type that best fits the type of the sighting.","example":{"http_events":[{"process_guid":10,"traffic":{"destination_host_name":"string","protocol":10,"source_ip":"string","destination_subnet":"string","destination_ip":"string","source_subnet":"string","destination_port":10,"direction":"incoming","source_port":10},"method":"CONNECT","time":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"type":"HTTPEvent","host":"string","process_name":"string","process_id":10,"process_username":"string","query":"string","encrypted":true,"url_port":10}],"process_create_events":[{"parent_process_name":"string","process_guid":10,"parent_process_guid":10,"process_disposition":"string","parent_process_size":10,"process_size":10,"time":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"parent_process_disposition":"string","type":"ProcessCreateEvent","parent_process_username":"string","parent_process_id":10,"parent_process_args":"string","process_name":"string","process_hash":"string","process_id":10,"parent_process_hash":"string","process_username":"string","parent_creation_time":"2016-01-01T01:01:01.000Z","process_args":"string"}],"registry_delete_events":[{"time":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"process_id":10,"process_name":"string","process_guid":10,"process_username":"string","registry_key":"string","type":"RegistryDeleteEvent","registry_value":"string"}],"file_modify_events":[{"file_name":"string","process_guid":10,"time":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"type":"FileModifyEvent","file_path":"string","process_name":"string","process_id":10,"process_username":"string","failed":false}],"registry_set_events":[{"process_guid":10,"registry_data":"string","time":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"type":"RegistrySetEvent","registry_data_length":10,"registry_value":"string","registry_key":"string","process_name":"string","process_id":10,"process_username":"string"}],"file_create_events":[{"file_name":"string","process_guid":10,"time":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"type":"FileCreateEvent","file_path":"string","process_name":"string","process_id":10,"process_username":"string","failed":false}],"registry_create_events":[{"time":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"process_id":10,"process_name":"string","process_guid":10,"process_username":"string","registry_key":"string","type":"RegistryCreateEvent"}],"library_load_events":[{"time":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"process_id":10,"process_name":"string","process_guid":10,"process_username":"string","type":"LibraryLoadEvent","dll_library_name":"string","dll_library_path":"string"}],"file_move_events":[{"file_name":"string","process_guid":10,"time":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"type":"FileMoveEvent","old_name":"string","file_path":"string","process_name":"string","process_id":10,"process_username":"string","new_name":"string"}],"file_delete_events":[{"file_name":"string","process_guid":10,"time":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"type":"FileDeleteEvent","file_path":"string","process_name":"string","process_id":10,"process_username":"string","failed":false}],"netflow_events":[{"parent_process_name":"string","byte_count_in":10,"process_guid":10,"process_path":"string","traffic":{"destination_host_name":"string","protocol":10,"source_ip":"string","destination_subnet":"string","destination_ip":"string","source_subnet":"string","destination_port":10,"direction":"incoming","source_port":10},"flow_time":"2016-01-01T01:01:01.000Z","time":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"parent_process_account":"string","type":"NetflowEvent","process_account_type":"string","parent_process_path":"string","parent_process_id":10,"parent_process_args":"string","process_name":"string","process_account":"string","parent_process_account_type":"string","process_hash":"string","process_id":10,"parent_process_hash":"string","process_username":"string","byte_count_out":10,"process_args":"string"}],"registry_rename_events":[{"time":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"process_id":10,"process_name":"string","process_guid":10,"process_username":"string","registry_key":"string","type":"RegistryRenameEvent","registry_old_key":"string"}]},"$$ref":"#/components/schemas/Context"},"client_id":{"type":"string"},"groups":{"type":"array","items":{"type":"string"}},"timestamp":{"type":"string","description":"The time this object was created at, or last modified.","format":"date-time","example":"2016-01-01T01:01:01Z"},"confidence":{"type":"string","example":"High","enum":["Medium","Info","Unknown","None","High","Low"]},"observed_time":{"required":["start_time"],"type":"object","properties":{"start_time":{"type":"string","description":"Time of the observation. If the observation was made over a period of time, than this field indicates the start of that period.","format":"date-time","example":"2016-01-01T01:01:01Z"},"end_time":{"type":"string","description":"If the observation was made over a period of time, than this field indicates the end of that period.","format":"date-time","example":"2016-01-01T01:01:01Z"}},"additionalProperties":false,"description":"Period of time when a cyber observation is valid. `start_time` must come before `end_time` (if specified).","example":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"$$ref":"#/components/schemas/ObservedTime"},"owner":{"type":"string"},"sensor":{"type":"string","description":"The OpenC2 Actuator name that best fits the device that is creating this sighting (e.g. network.firewall)","example":"endpoint"},"data":{"required":["columns","rows"],"type":"object","properties":{"columns":{"type":"array","description":"an ordered list of column definitions","example":[{"name":"string","type":"integer","description":"string","required":true,"short_description":"string"}],"items":{"required":["name","type"],"type":"object","properties":{"name":{"type":"string","example":"string"},"type":{"type":"string","example":"integer","enum":["url","string","observable","number","integer","markdown"]},"description":{"type":"string","description":"Markdown string with at most 5000 characters.","example":"string"},"required":{"type":"boolean","description":"If `true`, the row entries for this column cannot contain `nulls`. Defaults to `true`.","example":true},"short_description":{"type":"string","example":"string"}},"additionalProperties":false,"example":{"name":"string","type":"integer","description":"string","required":true,"short_description":"string"},"$$ref":"#/components/schemas/ColumnDefinition"}},"rows":{"type":"array","description":"an ordered list of rows","example":[["anything"]],"items":{"type":"array","items":{"type":"object"}}},"row_count":{"type":"integer","description":"The number of rows in the data table.","format":"int64","example":10}},"additionalProperties":false,"description":"An embedded data table for the Sighting.","example":{"columns":[{"name":"string","type":"integer","description":"string","required":true,"short_description":"string"}],"rows":[["anything"]],"row_count":10},"$$ref":"#/components/schemas/SightingDataTable"}},"additionalProperties":false,"description":"A sighting indicates that a particular entity or [indicator](indicator.md) was observed in an environment and can be an indication of a current or potential threat.","example":{"description":"string","schema_version":"1.3.18","revision":10,"relations":[{"origin":"string","origin_uri":"string","relation":"Allocated","relation_info":{"keyword":"anything"},"source":{"value":"1.2.3.4","type":"ip"},"related":{"value":"1.2.3.4","type":"ip"}}],"sensor_coordinates":{"type":"endpoint","observables":[{"value":"1.2.3.4","type":"ip"}],"os":"string"},"observables":[{"value":"1.2.3.4","type":"ip"}],"type":"sighting","source":"string","external_ids":["string"],"targets":[{"type":"endpoint","observables":[{"value":"1.2.3.4","type":"ip"}],"observed_time":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"os":"string"}],"short_description":"string","title":"string","resolution":"detected","internal":false,"external_references":[{"source_name":"string","description":"string","url":"string","hashes":["string"],"external_id":"string"}],"source_uri":"string","language":"string","id":"string","count":10,"severity":"Critical","tlp":"green","context":{"http_events":[{"process_guid":10,"traffic":{"destination_host_name":"string","protocol":10,"source_ip":"string","destination_subnet":"string","destination_ip":"string","source_subnet":"string","destination_port":10,"direction":"incoming","source_port":10},"method":"CONNECT","time":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"type":"HTTPEvent","host":"string","process_name":"string","process_id":10,"process_username":"string","query":"string","encrypted":true,"url_port":10}],"process_create_events":[{"parent_process_name":"string","process_guid":10,"parent_process_guid":10,"process_disposition":"string","parent_process_size":10,"process_size":10,"time":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"parent_process_disposition":"string","type":"ProcessCreateEvent","parent_process_username":"string","parent_process_id":10,"parent_process_args":"string","process_name":"string","process_hash":"string","process_id":10,"parent_process_hash":"string","process_username":"string","parent_creation_time":"2016-01-01T01:01:01.000Z","process_args":"string"}],"registry_delete_events":[{"time":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"process_id":10,"process_name":"string","process_guid":10,"process_username":"string","registry_key":"string","type":"RegistryDeleteEvent","registry_value":"string"}],"file_modify_events":[{"file_name":"string","process_guid":10,"time":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"type":"FileModifyEvent","file_path":"string","process_name":"string","process_id":10,"process_username":"string","failed":false}],"registry_set_events":[{"process_guid":10,"registry_data":"string","time":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"type":"RegistrySetEvent","registry_data_length":10,"registry_value":"string","registry_key":"string","process_name":"string","process_id":10,"process_username":"string"}],"file_create_events":[{"file_name":"string","process_guid":10,"time":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"type":"FileCreateEvent","file_path":"string","process_name":"string","process_id":10,"process_username":"string","failed":false}],"registry_create_events":[{"time":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"process_id":10,"process_name":"string","process_guid":10,"process_username":"string","registry_key":"string","type":"RegistryCreateEvent"}],"library_load_events":[{"time":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"process_id":10,"process_name":"string","process_guid":10,"process_username":"string","type":"LibraryLoadEvent","dll_library_name":"string","dll_library_path":"string"}],"file_move_events":[{"file_name":"string","process_guid":10,"time":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"type":"FileMoveEvent","old_name":"string","file_path":"string","process_name":"string","process_id":10,"process_username":"string","new_name":"string"}],"file_delete_events":[{"file_name":"string","process_guid":10,"time":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"type":"FileDeleteEvent","file_path":"string","process_name":"string","process_id":10,"process_username":"string","failed":false}],"netflow_events":[{"parent_process_name":"string","byte_count_in":10,"process_guid":10,"process_path":"string","traffic":{"destination_host_name":"string","protocol":10,"source_ip":"string","destination_subnet":"string","destination_ip":"string","source_subnet":"string","destination_port":10,"direction":"incoming","source_port":10},"flow_time":"2016-01-01T01:01:01.000Z","time":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"parent_process_account":"string","type":"NetflowEvent","process_account_type":"string","parent_process_path":"string","parent_process_id":10,"parent_process_args":"string","process_name":"string","process_account":"string","parent_process_account_type":"string","process_hash":"string","process_id":10,"parent_process_hash":"string","process_username":"string","byte_count_out":10,"process_args":"string"}],"registry_rename_events":[{"time":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"process_id":10,"process_name":"string","process_guid":10,"process_username":"string","registry_key":"string","type":"RegistryRenameEvent","registry_old_key":"string"}]},"timestamp":"2016-01-01T01:01:01.000Z","confidence":"High","observed_time":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"sensor":"endpoint","data":{"columns":[{"name":"string","type":"integer","description":"string","required":true,"short_description":"string"}],"rows":[["anything"]],"row_count":10}},"$$ref":"#/components/schemas/PartialSighting"}}},"application/transit+msgpack":{"schema":{"type":"array","items":{"type":"object","properties":{"description":{"type":"string","description":"A description of object, which may be detailed.","example":"string"},"authorized_groups":{"type":"array","items":{"type":"string"}},"schema_version":{"type":"string"},"revision":{"type":"integer","description":"A monotonically increasing revision, incremented each time the object is changed.","format":"int64","example":10},"relations":{"type":"array","description":"Provide any context we can about where the observable came from.","example":[{"origin":"string","origin_uri":"string","relation":"Allocated","relation_info":{"keyword":"anything"},"source":{"value":"1.2.3.4","type":"ip"},"related":{"value":"1.2.3.4","type":"ip"}}],"items":{"required":["origin","related","relation","source"],"type":"object","properties":{"origin":{"type":"string","example":"string"},"origin_uri":{"type":"string","description":"A URI","example":"string"},"relation":{"type":"string","example":"Allocated"},"relation_info":{"type":"object","additionalProperties":{"type":"object","example":"anything"},"example":{"keyword":"anything"},"$$ref":"#/components/schemas/NewSightingRelationsRelationInfo"},"source":{"required":["type","value"],"type":"object","properties":{"value":{"type":"string","description":"The value of the observable.","example":"1.2.3.4"},"type":{"type":"string","description":"The type of observable.","example":"ip","enum":["file_path","mac_address","trend_micro_id","cybereason_id","process_args","s1_agent_id","device","hostname","certificate_common_name","serial_number","meraki_network_id","url","certificate_serial","meraki_org_id","cisco_cm_id","registry_key","process_path","darktrace_id","process_username","cortex_agent_id","orbital_node_id","process_uid","ngfw_name","user","certificate_issuer","ipv6","email","cisco_uc_id","sha256","crowdstrike_id","sha1","registry_name","md5","ip","domain","email_subject","imei","ngfw_id","amp_computer_guid","ms_machine_id","mutex","processor_id","swc_device_id","registry_path","odns_identity","odns_identity_label","cisco_mid","process_name","pki_serial","meraki_node_sn","email_messageid","imsi","user_agent","process_hash","file_name"]}},"additionalProperties":false,"description":"An AssetMapping is a record that a specific Observable maps to an Asset for an indicated period of time.","example":{"value":"1.2.3.4","type":"ip"},"$$ref":"#/components/schemas/Observable"},"related":{"required":["type","value"],"type":"object","properties":{"value":{"type":"string","description":"The value of the observable.","example":"1.2.3.4"},"type":{"type":"string","description":"The type of observable.","example":"ip","enum":["file_path","mac_address","trend_micro_id","cybereason_id","process_args","s1_agent_id","device","hostname","certificate_common_name","serial_number","meraki_network_id","url","certificate_serial","meraki_org_id","cisco_cm_id","registry_key","process_path","darktrace_id","process_username","cortex_agent_id","orbital_node_id","process_uid","ngfw_name","user","certificate_issuer","ipv6","email","cisco_uc_id","sha256","crowdstrike_id","sha1","registry_name","md5","ip","domain","email_subject","imei","ngfw_id","amp_computer_guid","ms_machine_id","mutex","processor_id","swc_device_id","registry_path","odns_identity","odns_identity_label","cisco_mid","process_name","pki_serial","meraki_node_sn","email_messageid","imsi","user_agent","process_hash","file_name"]}},"additionalProperties":false,"description":"An AssetMapping is a record that a specific Observable maps to an Asset for an indicated period of time.","example":{"value":"1.2.3.4","type":"ip"},"$$ref":"#/components/schemas/Observable"}},"additionalProperties":false,"description":"A relation inside a Sighting.","example":{"origin":"string","origin_uri":"string","relation":"Allocated","relation_info":{"keyword":"anything"},"source":{"value":"1.2.3.4","type":"ip"},"related":{"value":"1.2.3.4","type":"ip"}},"$$ref":"#/components/schemas/ObservedRelation"}},"sensor_coordinates":{"required":["observables","type"],"type":"object","properties":{"type":{"type":"string","description":"The sensor/actuator name that best fits a device.","example":"endpoint"},"observables":{"type":"array","example":[{"value":"1.2.3.4","type":"ip"}],"items":{"required":["type","value"],"type":"object","properties":{"value":{"type":"string","description":"The value of the observable.","example":"1.2.3.4"},"type":{"type":"string","description":"The type of observable.","example":"ip","enum":["file_path","mac_address","trend_micro_id","cybereason_id","process_args","s1_agent_id","device","hostname","certificate_common_name","serial_number","meraki_network_id","url","certificate_serial","meraki_org_id","cisco_cm_id","registry_key","process_path","darktrace_id","process_username","cortex_agent_id","orbital_node_id","process_uid","ngfw_name","user","certificate_issuer","ipv6","email","cisco_uc_id","sha256","crowdstrike_id","sha1","registry_name","md5","ip","domain","email_subject","imei","ngfw_id","amp_computer_guid","ms_machine_id","mutex","processor_id","swc_device_id","registry_path","odns_identity","odns_identity_label","cisco_mid","process_name","pki_serial","meraki_node_sn","email_messageid","imsi","user_agent","process_hash","file_name"]}},"additionalProperties":false,"description":"An AssetMapping is a record that a specific Observable maps to an Asset for an indicated period of time.","example":{"value":"1.2.3.4","type":"ip"},"$$ref":"#/components/schemas/Observable"}},"os":{"type":"string","example":"string"}},"additionalProperties":false,"description":"Describes the device that made the sighting (sensor) and contains identifying observables for the sensor.","example":{"type":"endpoint","observables":[{"value":"1.2.3.4","type":"ip"}],"os":"string"},"$$ref":"#/components/schemas/SensorCoordinates"},"observables":{"type":"array","description":"The object(s) of interest.","example":[{"value":"1.2.3.4","type":"ip"}],"items":{"required":["type","value"],"type":"object","properties":{"value":{"type":"string","description":"The value of the observable.","example":"1.2.3.4"},"type":{"type":"string","description":"The type of observable.","example":"ip","enum":["file_path","mac_address","trend_micro_id","cybereason_id","process_args","s1_agent_id","device","hostname","certificate_common_name","serial_number","meraki_network_id","url","certificate_serial","meraki_org_id","cisco_cm_id","registry_key","process_path","darktrace_id","process_username","cortex_agent_id","orbital_node_id","process_uid","ngfw_name","user","certificate_issuer","ipv6","email","cisco_uc_id","sha256","crowdstrike_id","sha1","registry_name","md5","ip","domain","email_subject","imei","ngfw_id","amp_computer_guid","ms_machine_id","mutex","processor_id","swc_device_id","registry_path","odns_identity","odns_identity_label","cisco_mid","process_name","pki_serial","meraki_node_sn","email_messageid","imsi","user_agent","process_hash","file_name"]}},"additionalProperties":false,"description":"An AssetMapping is a record that a specific Observable maps to an Asset for an indicated period of time.","example":{"value":"1.2.3.4","type":"ip"},"$$ref":"#/components/schemas/Observable"}},"authorized_users":{"type":"array","items":{"type":"string"}},"type":{"type":"string","example":"sighting","enum":["sighting"]},"created":{"type":"string","format":"date-time"},"source":{"type":"string","description":"Represents the source of the intelligence that led to the creation of the entity.","example":"string"},"external_ids":{"type":"array","description":"It is used to store a list of external identifiers that can be linked to the incident, providing a reliable and manageable way to correlate and group related events across multiple data sources. It is especially useful in larger organizations that rely on multiple security information and event management (SIEM) systems to detect security incidents. For instance, it can be used to track events across different network sensors, intrusion detection and prevention systems (IDPS), or log management platforms. \n The field can also be used to facilitate automation and orchestration workflows, where additional information can be shared among incident management systems. It can be used to cross-reference with other external tools such as threat intelligence feeds and vulnerability scanners.","example":["string"],"items":{"type":"string"}},"modified":{"type":"string","format":"date-time"},"targets":{"type":"array","description":"May include one or more targets that observed the associated indicator. Targets can include network devices, host devices, or other entities that are capable of detecting indicators of compromise.\n\nCan be used to assess the scope of potential threats, helping analysts understand which devices or components of the network may be vulnerable to attack. For example, if a particular malware strain is detected on several different systems within an organization, the `targets` field may indicate which systems are affected and which may need to be isolated or patched to prevent further spread.","example":[{"type":"endpoint","observables":[{"value":"1.2.3.4","type":"ip"}],"observed_time":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"os":"string"}],"items":{"required":["observables","observed_time","type"],"type":"object","properties":{"type":{"type":"string","description":"The sensor/actuator name that best fits a device.","example":"endpoint"},"observables":{"type":"array","example":[{"value":"1.2.3.4","type":"ip"}],"items":{"required":["type","value"],"type":"object","properties":{"value":{"type":"string","description":"The value of the observable.","example":"1.2.3.4"},"type":{"type":"string","description":"The type of observable.","example":"ip","enum":["file_path","mac_address","trend_micro_id","cybereason_id","process_args","s1_agent_id","device","hostname","certificate_common_name","serial_number","meraki_network_id","url","certificate_serial","meraki_org_id","cisco_cm_id","registry_key","process_path","darktrace_id","process_username","cortex_agent_id","orbital_node_id","process_uid","ngfw_name","user","certificate_issuer","ipv6","email","cisco_uc_id","sha256","crowdstrike_id","sha1","registry_name","md5","ip","domain","email_subject","imei","ngfw_id","amp_computer_guid","ms_machine_id","mutex","processor_id","swc_device_id","registry_path","odns_identity","odns_identity_label","cisco_mid","process_name","pki_serial","meraki_node_sn","email_messageid","imsi","user_agent","process_hash","file_name"]}},"additionalProperties":false,"description":"An AssetMapping is a record that a specific Observable maps to an Asset for an indicated period of time.","example":{"value":"1.2.3.4","type":"ip"},"$$ref":"#/components/schemas/Observable"}},"observed_time":{"required":["start_time"],"type":"object","properties":{"start_time":{"type":"string","description":"Time of the observation. If the observation was made over a period of time, than this field indicates the start of that period.","format":"date-time","example":"2016-01-01T01:01:01Z"},"end_time":{"type":"string","description":"If the observation was made over a period of time, than this field indicates the end of that period.","format":"date-time","example":"2016-01-01T01:01:01Z"}},"additionalProperties":false,"description":"Period of time when a cyber observation is valid. `start_time` must come before `end_time` (if specified).","example":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"$$ref":"#/components/schemas/ObservedTime"},"os":{"type":"string","example":"string"}},"additionalProperties":false,"description":"Describes the target of the sighting and contains identifying observables for the target.","example":{"type":"endpoint","observables":[{"value":"1.2.3.4","type":"ip"}],"observed_time":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"os":"string"},"$$ref":"#/components/schemas/IdentitySpecification"}},"short_description":{"type":"string","description":"A single line, short summary of the object.","example":"string"},"title":{"type":"string","description":"A short title for this object, used as primary display and reference value.","example":"string"},"resolution":{"type":"string","description":"Represents the disposition or actions taken on the associated threat intelligence.","example":"detected"},"internal":{"type":"boolean","description":"If `true`, indicates that the sighting was reported from internal sources, such as an organization's own internal security tools or SOC.\n Internal sightings are often considered more reliable and actionable than external sightings, which are reported from external sources and may have a lower level of trustworthiness. Internal sightings can provide more context and can help identify potential threats that are unique to a particular environment or organization.\n Internal sightings can also help organizations prioritize their security response efforts by identifying threats that are specific to their environment and may not yet be widely known.","example":false},"external_references":{"type":"array","description":"Specifies a list of external references which refers to non-CTIM information.\n\nSimilar to `external_ids` field with major differences:\n\n- `external_ids` field is used to store a list of external identifiers that can be used to link entities across different data sources. These identifiers are typically standardized and well-known, such as CVE IDs, US-CERT advisories, or other industry-standard threat intelligence feeds. The `external_ids` field can be used to facilitate automation and orchestration workflows, where additional information can be shared among incident management systems. \n\n- `external_references` field, on the other hand, is used to provide a more general mechanism for linking entities to external sources of information. The `external_references` field can include references to blog posts, articles, external documents, threat intelligence reports, and other sources of information that may not have a standardized format or identifier.","example":[{"source_name":"string","description":"string","url":"string","hashes":["string"],"external_id":"string"}],"items":{"required":["source_name"],"type":"object","properties":{"source_name":{"type":"string","description":"The source within which the external-reference is defined (system, registry, organization, etc.)","example":"string"},"description":{"type":"string","description":"Markdown string with at most 5000 characters.","example":"string"},"url":{"type":"string","description":"A URL reference to an external resource.","example":"string"},"hashes":{"type":"array","description":"Specifies a dictionary of hashes for the contents of the url.","example":["string"],"items":{"type":"string"}},"external_id":{"type":"string","description":"An identifier for the external reference content.","example":"string"}},"additionalProperties":false,"description":"External references are used to describe pointers to information represented outside of CTIM. For example, a Malware object could use an external reference to indicate an ID for that malware in an external database or a report could use references to represent source material.","example":{"source_name":"string","description":"string","url":"string","hashes":["string"],"external_id":"string"},"$$ref":"#/components/schemas/ExternalReference"}},"source_uri":{"type":"string","description":"URI of the source of the intelligence that led to the creation of the entity.","example":"string"},"language":{"type":"string","description":"The `language` field is used to specify the primary language of the affected system or the target of an attack. It can be used to provide additional context and information about the entity. The primary purpose of this field is to help analysts filter and prioritize entities based on their knowledge and expertise of different languages.\n\nFor example, if an incident involves an attack on a system in a country where a specific language is predominant, the `language` field can be used to indicate that language, which can help analysts to quickly identify and respond to incidents that may be geographically or culturally relevant. This information can be used to prioritize incidents based on their potential impact. The `language` field can also be used to help with correlation of incidents across different systems and regions, as well as to help with data analysis and reporting.","example":"string"},"id":{"type":"string","description":"Globally unique URI identifying this object.","example":"string"},"count":{"type":"integer","description":"The number of times an indicator was observed within a certain period of time.\nFor example, if an IP address associated with known malicious activity is observed once within a period of time, it may indicate a low-level threat. However, if the same IP address is observed multiple times within a short time frame, it may indicate a more severe and persistent threat.\nIt can also be used to prioritize security alerts and indicate the urgency of a response. High counts indicate that an indicator is actively being used in a larger campaign, while low counts may indicate isolated incidents.","format":"int64","example":10},"severity":{"type":"string","example":"Critical","enum":["Medium","Info","Unknown","None","High","Critical","Low"]},"tlp":{"type":"string","description":"TLP stands for [Traffic Light Protocol](https://www.us-cert.gov/tlp), which indicates precisely how a resource is intended to be shared, replicated, copied, etc.\n\nIt is used to indicate the sensitivity of the information contained within the message. This allows recipients to determine the appropriate handling and dissemination of the information based on their clearance level and need-to-know.\n\nFor example, an entity containing information about a critical vulnerability in a widely-used software might be marked as `red`, indicating that it should only be shared with a small group of highly trusted individuals who need to know in order to take appropriate action. On the other hand, a message containing more general information about security threats might be marked as `amber` or `green`, indicating that it can be shared more broadly within an organization.","example":"green","enum":["white","green","red","amber"]},"context":{"type":"object","properties":{"http_events":{"type":"array","description":"a list of `HTTPType`","example":[{"process_guid":10,"traffic":{"destination_host_name":"string","protocol":10,"source_ip":"string","destination_subnet":"string","destination_ip":"string","source_subnet":"string","destination_port":10,"direction":"incoming","source_port":10},"method":"CONNECT","time":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"type":"HTTPEvent","host":"string","process_name":"string","process_id":10,"process_username":"string","query":"string","encrypted":true,"url_port":10}],"items":{"required":["host","process_id","process_name","time","traffic","type"],"type":"object","properties":{"process_guid":{"type":"integer","format":"int64","example":10},"traffic":{"required":["destination_ip","destination_port","direction","protocol","source_ip","source_port"],"type":"object","properties":{"destination_host_name":{"type":"string","example":"string"},"protocol":{"type":"integer","description":"The IP [protocol id](https://www.iana.org/assignments/protocol-numbers/protocol-numbers.xhtml)","format":"int64","example":10},"source_ip":{"type":"string","example":"string"},"destination_subnet":{"type":"string","example":"string"},"destination_ip":{"type":"string","example":"string"},"source_subnet":{"type":"string","example":"string"},"destination_port":{"type":"integer","format":"int64","example":10},"direction":{"type":"string","example":"incoming","enum":["incoming","outgoing"]},"source_port":{"type":"integer","format":"int64","example":10}},"additionalProperties":false,"example":{"destination_host_name":"string","protocol":10,"source_ip":"string","destination_subnet":"string","destination_ip":"string","source_subnet":"string","destination_port":10,"direction":"incoming","source_port":10},"$$ref":"#/components/schemas/Traffic"},"method":{"type":"string","example":"CONNECT","enum":["OPTIONS","PATCH","TRACE","HEAD","POST","CONNECT","GET","PUT"]},"time":{"required":["start_time"],"type":"object","properties":{"start_time":{"type":"string","description":"Time of the observation. If the observation was made over a period of time, than this field indicates the start of that period.","format":"date-time","example":"2016-01-01T01:01:01Z"},"end_time":{"type":"string","description":"If the observation was made over a period of time, than this field indicates the end of that period.","format":"date-time","example":"2016-01-01T01:01:01Z"}},"additionalProperties":false,"description":"Period of time when a cyber observation is valid. `start_time` must come before `end_time` (if specified).","example":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"$$ref":"#/components/schemas/ObservedTime"},"type":{"type":"string","example":"HTTPEvent","enum":["HTTPEvent"]},"host":{"type":"string","description":"String with at most 1024 characters.","example":"string"},"process_name":{"type":"string","description":"String with at most 1024 characters.","example":"string"},"process_id":{"type":"integer","format":"int64","example":10},"process_username":{"type":"string","description":"String with at most 1024 characters.","example":"string"},"query":{"type":"string","description":"String with at most 5000 characters.","example":"string"},"encrypted":{"type":"boolean","example":true},"url_port":{"type":"integer","format":"int64","example":10}},"additionalProperties":false,"example":{"process_guid":10,"traffic":{"destination_host_name":"string","protocol":10,"source_ip":"string","destination_subnet":"string","destination_ip":"string","source_subnet":"string","destination_port":10,"direction":"incoming","source_port":10},"method":"CONNECT","time":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"type":"HTTPEvent","host":"string","process_name":"string","process_id":10,"process_username":"string","query":"string","encrypted":true,"url_port":10},"$$ref":"#/components/schemas/HTTPType"}},"process_create_events":{"type":"array","description":"a list of `ProcessCreate`","example":[{"parent_process_name":"string","process_guid":10,"parent_process_guid":10,"process_disposition":"string","parent_process_size":10,"process_size":10,"time":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"parent_process_disposition":"string","type":"ProcessCreateEvent","parent_process_username":"string","parent_process_id":10,"parent_process_args":"string","process_name":"string","process_hash":"string","process_id":10,"parent_process_hash":"string","process_username":"string","parent_creation_time":"2016-01-01T01:01:01.000Z","process_args":"string"}],"items":{"required":["process_id","process_name","time","type"],"type":"object","properties":{"parent_process_name":{"type":"string","description":"String with at most 1024 characters.","example":"string"},"process_guid":{"type":"integer","format":"int64","example":10},"parent_process_guid":{"type":"integer","format":"int64","example":10},"process_disposition":{"type":"string","description":"String with at most 1024 characters.","example":"string"},"parent_process_size":{"type":"integer","format":"int64","example":10},"process_size":{"type":"integer","format":"int64","example":10},"time":{"required":["start_time"],"type":"object","properties":{"start_time":{"type":"string","description":"Time of the observation. If the observation was made over a period of time, than this field indicates the start of that period.","format":"date-time","example":"2016-01-01T01:01:01Z"},"end_time":{"type":"string","description":"If the observation was made over a period of time, than this field indicates the end of that period.","format":"date-time","example":"2016-01-01T01:01:01Z"}},"additionalProperties":false,"description":"Period of time when a cyber observation is valid. `start_time` must come before `end_time` (if specified).","example":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"$$ref":"#/components/schemas/ObservedTime"},"parent_process_disposition":{"type":"string","description":"String with at most 1024 characters.","example":"string"},"type":{"type":"string","example":"ProcessCreateEvent","enum":["ProcessCreateEvent"]},"parent_process_username":{"type":"string","description":"String with at most 1024 characters.","example":"string"},"parent_process_id":{"type":"integer","format":"int64","example":10},"parent_process_args":{"type":"string","description":"String with at most 2048 characters.","example":"string"},"process_name":{"type":"string","description":"String with at most 1024 characters.","example":"string"},"process_hash":{"type":"string","description":"String with at most 2048 characters.","example":"string"},"process_id":{"type":"integer","format":"int64","example":10},"parent_process_hash":{"type":"string","description":"String with at most 2048 characters.","example":"string"},"process_username":{"type":"string","description":"String with at most 1024 characters.","example":"string"},"parent_creation_time":{"type":"string","description":"Schema definition for all date or timestamp values. Serialized as a string, the field should follow the rules of the [ISO8601](https://en.wikipedia.org/wiki/ISO_8601) standard.","format":"date-time","example":"2016-01-01T01:01:01Z"},"process_args":{"type":"string","description":"String with at most 2048 characters.","example":"string"}},"additionalProperties":false,"example":{"parent_process_name":"string","process_guid":10,"parent_process_guid":10,"process_disposition":"string","parent_process_size":10,"process_size":10,"time":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"parent_process_disposition":"string","type":"ProcessCreateEvent","parent_process_username":"string","parent_process_id":10,"parent_process_args":"string","process_name":"string","process_hash":"string","process_id":10,"parent_process_hash":"string","process_username":"string","parent_creation_time":"2016-01-01T01:01:01.000Z","process_args":"string"},"$$ref":"#/components/schemas/ProcessCreateType"}},"registry_delete_events":{"type":"array","description":"a list of `RegistryDeleteType`","example":[{"time":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"process_id":10,"process_name":"string","process_guid":10,"process_username":"string","registry_key":"string","type":"RegistryDeleteEvent","registry_value":"string"}],"items":{"required":["process_id","process_name","registry_key","time","type"],"type":"object","properties":{"time":{"required":["start_time"],"type":"object","properties":{"start_time":{"type":"string","description":"Time of the observation. If the observation was made over a period of time, than this field indicates the start of that period.","format":"date-time","example":"2016-01-01T01:01:01Z"},"end_time":{"type":"string","description":"If the observation was made over a period of time, than this field indicates the end of that period.","format":"date-time","example":"2016-01-01T01:01:01Z"}},"additionalProperties":false,"description":"Period of time when a cyber observation is valid. `start_time` must come before `end_time` (if specified).","example":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"$$ref":"#/components/schemas/ObservedTime"},"process_id":{"type":"integer","format":"int64","example":10},"process_name":{"type":"string","description":"String with at most 1024 characters.","example":"string"},"process_guid":{"type":"integer","format":"int64","example":10},"process_username":{"type":"string","description":"String with at most 1024 characters.","example":"string"},"registry_key":{"type":"string","description":"String with at most 1024 characters.","example":"string"},"type":{"type":"string","example":"RegistryDeleteEvent","enum":["RegistryDeleteEvent"]},"registry_value":{"type":"string","description":"String with at most 2048 characters.","example":"string"}},"additionalProperties":false,"example":{"time":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"process_id":10,"process_name":"string","process_guid":10,"process_username":"string","registry_key":"string","type":"RegistryDeleteEvent","registry_value":"string"},"$$ref":"#/components/schemas/RegistryDeleteType"}},"file_modify_events":{"type":"array","description":"a list of `FileModifyType`","example":[{"file_name":"string","process_guid":10,"time":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"type":"FileModifyEvent","file_path":"string","process_name":"string","process_id":10,"process_username":"string","failed":false}],"items":{"required":["file_name","file_path","process_id","process_name","time","type"],"type":"object","properties":{"file_name":{"type":"string","description":"String with at most 1024 characters.","example":"string"},"process_guid":{"type":"integer","format":"int64","example":10},"time":{"required":["start_time"],"type":"object","properties":{"start_time":{"type":"string","description":"Time of the observation. If the observation was made over a period of time, than this field indicates the start of that period.","format":"date-time","example":"2016-01-01T01:01:01Z"},"end_time":{"type":"string","description":"If the observation was made over a period of time, than this field indicates the end of that period.","format":"date-time","example":"2016-01-01T01:01:01Z"}},"additionalProperties":false,"description":"Period of time when a cyber observation is valid. `start_time` must come before `end_time` (if specified).","example":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"$$ref":"#/components/schemas/ObservedTime"},"type":{"type":"string","example":"FileModifyEvent","enum":["FileModifyEvent"]},"file_path":{"type":"string","description":"String with at most 2048 characters.","example":"string"},"process_name":{"type":"string","description":"String with at most 1024 characters.","example":"string"},"process_id":{"type":"integer","format":"int64","example":10},"process_username":{"type":"string","description":"String with at most 1024 characters.","example":"string"},"failed":{"type":"boolean","example":false}},"additionalProperties":false,"example":{"file_name":"string","process_guid":10,"time":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"type":"FileModifyEvent","file_path":"string","process_name":"string","process_id":10,"process_username":"string","failed":false},"$$ref":"#/components/schemas/FileModifyType"}},"registry_set_events":{"type":"array","description":"a list of `RegistrySetType`","example":[{"process_guid":10,"registry_data":"string","time":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"type":"RegistrySetEvent","registry_data_length":10,"registry_value":"string","registry_key":"string","process_name":"string","process_id":10,"process_username":"string"}],"items":{"required":["process_id","process_name","registry_key","registry_value","time","type"],"type":"object","properties":{"process_guid":{"type":"integer","format":"int64","example":10},"registry_data":{"type":"string","description":"String with at most 5000 characters.","example":"string"},"time":{"required":["start_time"],"type":"object","properties":{"start_time":{"type":"string","description":"Time of the observation. If the observation was made over a period of time, than this field indicates the start of that period.","format":"date-time","example":"2016-01-01T01:01:01Z"},"end_time":{"type":"string","description":"If the observation was made over a period of time, than this field indicates the end of that period.","format":"date-time","example":"2016-01-01T01:01:01Z"}},"additionalProperties":false,"description":"Period of time when a cyber observation is valid. `start_time` must come before `end_time` (if specified).","example":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"$$ref":"#/components/schemas/ObservedTime"},"type":{"type":"string","example":"RegistrySetEvent","enum":["RegistrySetEvent"]},"registry_data_length":{"type":"integer","format":"int64","example":10},"registry_value":{"type":"string","description":"String with at most 2048 characters.","example":"string"},"registry_key":{"type":"string","description":"String with at most 1024 characters.","example":"string"},"process_name":{"type":"string","description":"String with at most 1024 characters.","example":"string"},"process_id":{"type":"integer","format":"int64","example":10},"process_username":{"type":"string","description":"String with at most 1024 characters.","example":"string"}},"additionalProperties":false,"example":{"process_guid":10,"registry_data":"string","time":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"type":"RegistrySetEvent","registry_data_length":10,"registry_value":"string","registry_key":"string","process_name":"string","process_id":10,"process_username":"string"},"$$ref":"#/components/schemas/RegistrySetType"}},"file_create_events":{"type":"array","description":"a list of `FileCreateType`","example":[{"file_name":"string","process_guid":10,"time":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"type":"FileCreateEvent","file_path":"string","process_name":"string","process_id":10,"process_username":"string","failed":false}],"items":{"required":["file_name","file_path","process_id","process_name","time","type"],"type":"object","properties":{"file_name":{"type":"string","description":"String with at most 1024 characters.","example":"string"},"process_guid":{"type":"integer","format":"int64","example":10},"time":{"required":["start_time"],"type":"object","properties":{"start_time":{"type":"string","description":"Time of the observation. If the observation was made over a period of time, than this field indicates the start of that period.","format":"date-time","example":"2016-01-01T01:01:01Z"},"end_time":{"type":"string","description":"If the observation was made over a period of time, than this field indicates the end of that period.","format":"date-time","example":"2016-01-01T01:01:01Z"}},"additionalProperties":false,"description":"Period of time when a cyber observation is valid. `start_time` must come before `end_time` (if specified).","example":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"$$ref":"#/components/schemas/ObservedTime"},"type":{"type":"string","example":"FileCreateEvent","enum":["FileCreateEvent"]},"file_path":{"type":"string","description":"String with at most 2048 characters.","example":"string"},"process_name":{"type":"string","description":"String with at most 1024 characters.","example":"string"},"process_id":{"type":"integer","format":"int64","example":10},"process_username":{"type":"string","description":"String with at most 1024 characters.","example":"string"},"failed":{"type":"boolean","example":false}},"additionalProperties":false,"example":{"file_name":"string","process_guid":10,"time":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"type":"FileCreateEvent","file_path":"string","process_name":"string","process_id":10,"process_username":"string","failed":false},"$$ref":"#/components/schemas/FileCreateType"}},"registry_create_events":{"type":"array","description":"a list of `RegistryCreateType`","example":[{"time":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"process_id":10,"process_name":"string","process_guid":10,"process_username":"string","registry_key":"string","type":"RegistryCreateEvent"}],"items":{"required":["process_id","process_name","registry_key","time","type"],"type":"object","properties":{"time":{"required":["start_time"],"type":"object","properties":{"start_time":{"type":"string","description":"Time of the observation. If the observation was made over a period of time, than this field indicates the start of that period.","format":"date-time","example":"2016-01-01T01:01:01Z"},"end_time":{"type":"string","description":"If the observation was made over a period of time, than this field indicates the end of that period.","format":"date-time","example":"2016-01-01T01:01:01Z"}},"additionalProperties":false,"description":"Period of time when a cyber observation is valid. `start_time` must come before `end_time` (if specified).","example":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"$$ref":"#/components/schemas/ObservedTime"},"process_id":{"type":"integer","format":"int64","example":10},"process_name":{"type":"string","description":"String with at most 1024 characters.","example":"string"},"process_guid":{"type":"integer","format":"int64","example":10},"process_username":{"type":"string","description":"String with at most 1024 characters.","example":"string"},"registry_key":{"type":"string","description":"String with at most 1024 characters.","example":"string"},"type":{"type":"string","example":"RegistryCreateEvent","enum":["RegistryCreateEvent"]}},"additionalProperties":false,"example":{"time":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"process_id":10,"process_name":"string","process_guid":10,"process_username":"string","registry_key":"string","type":"RegistryCreateEvent"},"$$ref":"#/components/schemas/RegistryCreateType"}},"library_load_events":{"type":"array","description":"a list of `LibraryLoadType`","example":[{"time":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"process_id":10,"process_name":"string","process_guid":10,"process_username":"string","type":"LibraryLoadEvent","dll_library_name":"string","dll_library_path":"string"}],"items":{"required":["dll_library_name","dll_library_path","process_id","process_name","time","type"],"type":"object","properties":{"time":{"required":["start_time"],"type":"object","properties":{"start_time":{"type":"string","description":"Time of the observation. If the observation was made over a period of time, than this field indicates the start of that period.","format":"date-time","example":"2016-01-01T01:01:01Z"},"end_time":{"type":"string","description":"If the observation was made over a period of time, than this field indicates the end of that period.","format":"date-time","example":"2016-01-01T01:01:01Z"}},"additionalProperties":false,"description":"Period of time when a cyber observation is valid. `start_time` must come before `end_time` (if specified).","example":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"$$ref":"#/components/schemas/ObservedTime"},"process_id":{"type":"integer","format":"int64","example":10},"process_name":{"type":"string","description":"String with at most 1024 characters.","example":"string"},"process_guid":{"type":"integer","format":"int64","example":10},"process_username":{"type":"string","description":"String with at most 1024 characters.","example":"string"},"type":{"type":"string","example":"LibraryLoadEvent","enum":["LibraryLoadEvent"]},"dll_library_name":{"type":"string","description":"String with at most 1024 characters.","example":"string"},"dll_library_path":{"type":"string","description":"String with at most 2048 characters.","example":"string"}},"additionalProperties":false,"example":{"time":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"process_id":10,"process_name":"string","process_guid":10,"process_username":"string","type":"LibraryLoadEvent","dll_library_name":"string","dll_library_path":"string"},"$$ref":"#/components/schemas/LibraryLoadType"}},"file_move_events":{"type":"array","description":"a list of `FileMoveType`","example":[{"file_name":"string","process_guid":10,"time":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"type":"FileMoveEvent","old_name":"string","file_path":"string","process_name":"string","process_id":10,"process_username":"string","new_name":"string"}],"items":{"required":["file_name","file_path","new_name","old_name","process_id","process_name","time","type"],"type":"object","properties":{"file_name":{"type":"string","description":"String with at most 1024 characters.","example":"string"},"process_guid":{"type":"integer","format":"int64","example":10},"time":{"required":["start_time"],"type":"object","properties":{"start_time":{"type":"string","description":"Time of the observation. If the observation was made over a period of time, than this field indicates the start of that period.","format":"date-time","example":"2016-01-01T01:01:01Z"},"end_time":{"type":"string","description":"If the observation was made over a period of time, than this field indicates the end of that period.","format":"date-time","example":"2016-01-01T01:01:01Z"}},"additionalProperties":false,"description":"Period of time when a cyber observation is valid. `start_time` must come before `end_time` (if specified).","example":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"$$ref":"#/components/schemas/ObservedTime"},"type":{"type":"string","example":"FileMoveEvent","enum":["FileMoveEvent"]},"old_name":{"type":"string","description":"String with at most 1024 characters.","example":"string"},"file_path":{"type":"string","description":"String with at most 2048 characters.","example":"string"},"process_name":{"type":"string","description":"String with at most 1024 characters.","example":"string"},"process_id":{"type":"integer","format":"int64","example":10},"process_username":{"type":"string","description":"String with at most 1024 characters.","example":"string"},"new_name":{"type":"string","description":"String with at most 1024 characters.","example":"string"}},"additionalProperties":false,"example":{"file_name":"string","process_guid":10,"time":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"type":"FileMoveEvent","old_name":"string","file_path":"string","process_name":"string","process_id":10,"process_username":"string","new_name":"string"},"$$ref":"#/components/schemas/FileMoveType"}},"file_delete_events":{"type":"array","description":"a list of `FileDeleteType`","example":[{"file_name":"string","process_guid":10,"time":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"type":"FileDeleteEvent","file_path":"string","process_name":"string","process_id":10,"process_username":"string","failed":false}],"items":{"required":["file_name","file_path","process_id","process_name","time","type"],"type":"object","properties":{"file_name":{"type":"string","description":"String with at most 1024 characters.","example":"string"},"process_guid":{"type":"integer","format":"int64","example":10},"time":{"required":["start_time"],"type":"object","properties":{"start_time":{"type":"string","description":"Time of the observation. If the observation was made over a period of time, than this field indicates the start of that period.","format":"date-time","example":"2016-01-01T01:01:01Z"},"end_time":{"type":"string","description":"If the observation was made over a period of time, than this field indicates the end of that period.","format":"date-time","example":"2016-01-01T01:01:01Z"}},"additionalProperties":false,"description":"Period of time when a cyber observation is valid. `start_time` must come before `end_time` (if specified).","example":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"$$ref":"#/components/schemas/ObservedTime"},"type":{"type":"string","example":"FileDeleteEvent","enum":["FileDeleteEvent"]},"file_path":{"type":"string","description":"String with at most 2048 characters.","example":"string"},"process_name":{"type":"string","description":"String with at most 1024 characters.","example":"string"},"process_id":{"type":"integer","format":"int64","example":10},"process_username":{"type":"string","description":"String with at most 1024 characters.","example":"string"},"failed":{"type":"boolean","example":false}},"additionalProperties":false,"example":{"file_name":"string","process_guid":10,"time":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"type":"FileDeleteEvent","file_path":"string","process_name":"string","process_id":10,"process_username":"string","failed":false},"$$ref":"#/components/schemas/FileDeleteType"}},"netflow_events":{"type":"array","description":"a list of `NetflowType`","example":[{"parent_process_name":"string","byte_count_in":10,"process_guid":10,"process_path":"string","traffic":{"destination_host_name":"string","protocol":10,"source_ip":"string","destination_subnet":"string","destination_ip":"string","source_subnet":"string","destination_port":10,"direction":"incoming","source_port":10},"flow_time":"2016-01-01T01:01:01.000Z","time":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"parent_process_account":"string","type":"NetflowEvent","process_account_type":"string","parent_process_path":"string","parent_process_id":10,"parent_process_args":"string","process_name":"string","process_account":"string","parent_process_account_type":"string","process_hash":"string","process_id":10,"parent_process_hash":"string","process_username":"string","byte_count_out":10,"process_args":"string"}],"items":{"required":["process_id","process_name","time","traffic","type"],"type":"object","properties":{"parent_process_name":{"type":"string","description":"String with at most 1024 characters.","example":"string"},"byte_count_in":{"type":"integer","format":"int64","example":10},"process_guid":{"type":"integer","format":"int64","example":10},"process_path":{"type":"string","description":"String with at most 1024 characters.","example":"string"},"traffic":{"required":["destination_ip","destination_port","direction","protocol","source_ip","source_port"],"type":"object","properties":{"destination_host_name":{"type":"string","example":"string"},"protocol":{"type":"integer","description":"The IP [protocol id](https://www.iana.org/assignments/protocol-numbers/protocol-numbers.xhtml)","format":"int64","example":10},"source_ip":{"type":"string","example":"string"},"destination_subnet":{"type":"string","example":"string"},"destination_ip":{"type":"string","example":"string"},"source_subnet":{"type":"string","example":"string"},"destination_port":{"type":"integer","format":"int64","example":10},"direction":{"type":"string","example":"incoming","enum":["incoming","outgoing"]},"source_port":{"type":"integer","format":"int64","example":10}},"additionalProperties":false,"example":{"destination_host_name":"string","protocol":10,"source_ip":"string","destination_subnet":"string","destination_ip":"string","source_subnet":"string","destination_port":10,"direction":"incoming","source_port":10},"$$ref":"#/components/schemas/Traffic"},"flow_time":{"type":"string","description":"Schema definition for all date or timestamp values. Serialized as a string, the field should follow the rules of the [ISO8601](https://en.wikipedia.org/wiki/ISO_8601) standard.","format":"date-time","example":"2016-01-01T01:01:01Z"},"time":{"required":["start_time"],"type":"object","properties":{"start_time":{"type":"string","description":"Time of the observation. If the observation was made over a period of time, than this field indicates the start of that period.","format":"date-time","example":"2016-01-01T01:01:01Z"},"end_time":{"type":"string","description":"If the observation was made over a period of time, than this field indicates the end of that period.","format":"date-time","example":"2016-01-01T01:01:01Z"}},"additionalProperties":false,"description":"Period of time when a cyber observation is valid. `start_time` must come before `end_time` (if specified).","example":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"$$ref":"#/components/schemas/ObservedTime"},"parent_process_account":{"type":"string","description":"String with at most 1024 characters.","example":"string"},"type":{"type":"string","example":"NetflowEvent","enum":["NetflowEvent"]},"process_account_type":{"type":"string","description":"String with at most 1024 characters.","example":"string"},"parent_process_path":{"type":"string","description":"String with at most 1024 characters.","example":"string"},"parent_process_id":{"type":"integer","format":"int64","example":10},"parent_process_args":{"type":"string","description":"String with at most 1024 characters.","example":"string"},"process_name":{"type":"string","description":"String with at most 1024 characters.","example":"string"},"process_account":{"type":"string","description":"String with at most 1024 characters.","example":"string"},"parent_process_account_type":{"type":"string","description":"String with at most 1024 characters.","example":"string"},"process_hash":{"type":"string","description":"String with at most 1024 characters.","example":"string"},"process_id":{"type":"integer","format":"int64","example":10},"parent_process_hash":{"type":"string","description":"String with at most 1024 characters.","example":"string"},"process_username":{"type":"string","description":"String with at most 1024 characters.","example":"string"},"byte_count_out":{"type":"integer","format":"int64","example":10},"process_args":{"type":"string","description":"String with at most 1024 characters.","example":"string"}},"additionalProperties":false,"example":{"parent_process_name":"string","byte_count_in":10,"process_guid":10,"process_path":"string","traffic":{"destination_host_name":"string","protocol":10,"source_ip":"string","destination_subnet":"string","destination_ip":"string","source_subnet":"string","destination_port":10,"direction":"incoming","source_port":10},"flow_time":"2016-01-01T01:01:01.000Z","time":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"parent_process_account":"string","type":"NetflowEvent","process_account_type":"string","parent_process_path":"string","parent_process_id":10,"parent_process_args":"string","process_name":"string","process_account":"string","parent_process_account_type":"string","process_hash":"string","process_id":10,"parent_process_hash":"string","process_username":"string","byte_count_out":10,"process_args":"string"},"$$ref":"#/components/schemas/NetflowType"}},"registry_rename_events":{"type":"array","description":"a list of `RegistryRenameType`","example":[{"time":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"process_id":10,"process_name":"string","process_guid":10,"process_username":"string","registry_key":"string","type":"RegistryRenameEvent","registry_old_key":"string"}],"items":{"required":["process_id","process_name","registry_key","registry_old_key","time","type"],"type":"object","properties":{"time":{"required":["start_time"],"type":"object","properties":{"start_time":{"type":"string","description":"Time of the observation. If the observation was made over a period of time, than this field indicates the start of that period.","format":"date-time","example":"2016-01-01T01:01:01Z"},"end_time":{"type":"string","description":"If the observation was made over a period of time, than this field indicates the end of that period.","format":"date-time","example":"2016-01-01T01:01:01Z"}},"additionalProperties":false,"description":"Period of time when a cyber observation is valid. `start_time` must come before `end_time` (if specified).","example":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"$$ref":"#/components/schemas/ObservedTime"},"process_id":{"type":"integer","format":"int64","example":10},"process_name":{"type":"string","description":"String with at most 1024 characters.","example":"string"},"process_guid":{"type":"integer","format":"int64","example":10},"process_username":{"type":"string","description":"String with at most 1024 characters.","example":"string"},"registry_key":{"type":"string","description":"String with at most 1024 characters.","example":"string"},"type":{"type":"string","example":"RegistryRenameEvent","enum":["RegistryRenameEvent"]},"registry_old_key":{"type":"string","description":"String with at most 1024 characters.","example":"string"}},"additionalProperties":false,"example":{"time":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"process_id":10,"process_name":"string","process_guid":10,"process_username":"string","registry_key":"string","type":"RegistryRenameEvent","registry_old_key":"string"},"$$ref":"#/components/schemas/RegistryRenameType"}}},"additionalProperties":false,"description":"Context including the event type that best fits the type of the sighting.","example":{"http_events":[{"process_guid":10,"traffic":{"destination_host_name":"string","protocol":10,"source_ip":"string","destination_subnet":"string","destination_ip":"string","source_subnet":"string","destination_port":10,"direction":"incoming","source_port":10},"method":"CONNECT","time":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"type":"HTTPEvent","host":"string","process_name":"string","process_id":10,"process_username":"string","query":"string","encrypted":true,"url_port":10}],"process_create_events":[{"parent_process_name":"string","process_guid":10,"parent_process_guid":10,"process_disposition":"string","parent_process_size":10,"process_size":10,"time":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"parent_process_disposition":"string","type":"ProcessCreateEvent","parent_process_username":"string","parent_process_id":10,"parent_process_args":"string","process_name":"string","process_hash":"string","process_id":10,"parent_process_hash":"string","process_username":"string","parent_creation_time":"2016-01-01T01:01:01.000Z","process_args":"string"}],"registry_delete_events":[{"time":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"process_id":10,"process_name":"string","process_guid":10,"process_username":"string","registry_key":"string","type":"RegistryDeleteEvent","registry_value":"string"}],"file_modify_events":[{"file_name":"string","process_guid":10,"time":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"type":"FileModifyEvent","file_path":"string","process_name":"string","process_id":10,"process_username":"string","failed":false}],"registry_set_events":[{"process_guid":10,"registry_data":"string","time":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"type":"RegistrySetEvent","registry_data_length":10,"registry_value":"string","registry_key":"string","process_name":"string","process_id":10,"process_username":"string"}],"file_create_events":[{"file_name":"string","process_guid":10,"time":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"type":"FileCreateEvent","file_path":"string","process_name":"string","process_id":10,"process_username":"string","failed":false}],"registry_create_events":[{"time":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"process_id":10,"process_name":"string","process_guid":10,"process_username":"string","registry_key":"string","type":"RegistryCreateEvent"}],"library_load_events":[{"time":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"process_id":10,"process_name":"string","process_guid":10,"process_username":"string","type":"LibraryLoadEvent","dll_library_name":"string","dll_library_path":"string"}],"file_move_events":[{"file_name":"string","process_guid":10,"time":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"type":"FileMoveEvent","old_name":"string","file_path":"string","process_name":"string","process_id":10,"process_username":"string","new_name":"string"}],"file_delete_events":[{"file_name":"string","process_guid":10,"time":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"type":"FileDeleteEvent","file_path":"string","process_name":"string","process_id":10,"process_username":"string","failed":false}],"netflow_events":[{"parent_process_name":"string","byte_count_in":10,"process_guid":10,"process_path":"string","traffic":{"destination_host_name":"string","protocol":10,"source_ip":"string","destination_subnet":"string","destination_ip":"string","source_subnet":"string","destination_port":10,"direction":"incoming","source_port":10},"flow_time":"2016-01-01T01:01:01.000Z","time":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"parent_process_account":"string","type":"NetflowEvent","process_account_type":"string","parent_process_path":"string","parent_process_id":10,"parent_process_args":"string","process_name":"string","process_account":"string","parent_process_account_type":"string","process_hash":"string","process_id":10,"parent_process_hash":"string","process_username":"string","byte_count_out":10,"process_args":"string"}],"registry_rename_events":[{"time":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"process_id":10,"process_name":"string","process_guid":10,"process_username":"string","registry_key":"string","type":"RegistryRenameEvent","registry_old_key":"string"}]},"$$ref":"#/components/schemas/Context"},"client_id":{"type":"string"},"groups":{"type":"array","items":{"type":"string"}},"timestamp":{"type":"string","description":"The time this object was created at, or last modified.","format":"date-time","example":"2016-01-01T01:01:01Z"},"confidence":{"type":"string","example":"High","enum":["Medium","Info","Unknown","None","High","Low"]},"observed_time":{"required":["start_time"],"type":"object","properties":{"start_time":{"type":"string","description":"Time of the observation. If the observation was made over a period of time, than this field indicates the start of that period.","format":"date-time","example":"2016-01-01T01:01:01Z"},"end_time":{"type":"string","description":"If the observation was made over a period of time, than this field indicates the end of that period.","format":"date-time","example":"2016-01-01T01:01:01Z"}},"additionalProperties":false,"description":"Period of time when a cyber observation is valid. `start_time` must come before `end_time` (if specified).","example":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"$$ref":"#/components/schemas/ObservedTime"},"owner":{"type":"string"},"sensor":{"type":"string","description":"The OpenC2 Actuator name that best fits the device that is creating this sighting (e.g. network.firewall)","example":"endpoint"},"data":{"required":["columns","rows"],"type":"object","properties":{"columns":{"type":"array","description":"an ordered list of column definitions","example":[{"name":"string","type":"integer","description":"string","required":true,"short_description":"string"}],"items":{"required":["name","type"],"type":"object","properties":{"name":{"type":"string","example":"string"},"type":{"type":"string","example":"integer","enum":["url","string","observable","number","integer","markdown"]},"description":{"type":"string","description":"Markdown string with at most 5000 characters.","example":"string"},"required":{"type":"boolean","description":"If `true`, the row entries for this column cannot contain `nulls`. Defaults to `true`.","example":true},"short_description":{"type":"string","example":"string"}},"additionalProperties":false,"example":{"name":"string","type":"integer","description":"string","required":true,"short_description":"string"},"$$ref":"#/components/schemas/ColumnDefinition"}},"rows":{"type":"array","description":"an ordered list of rows","example":[["anything"]],"items":{"type":"array","items":{"type":"object"}}},"row_count":{"type":"integer","description":"The number of rows in the data table.","format":"int64","example":10}},"additionalProperties":false,"description":"An embedded data table for the Sighting.","example":{"columns":[{"name":"string","type":"integer","description":"string","required":true,"short_description":"string"}],"rows":[["anything"]],"row_count":10},"$$ref":"#/components/schemas/SightingDataTable"}},"additionalProperties":false,"description":"A sighting indicates that a particular entity or [indicator](indicator.md) was observed in an environment and can be an indication of a current or potential threat.","example":{"description":"string","schema_version":"1.3.18","revision":10,"relations":[{"origin":"string","origin_uri":"string","relation":"Allocated","relation_info":{"keyword":"anything"},"source":{"value":"1.2.3.4","type":"ip"},"related":{"value":"1.2.3.4","type":"ip"}}],"sensor_coordinates":{"type":"endpoint","observables":[{"value":"1.2.3.4","type":"ip"}],"os":"string"},"observables":[{"value":"1.2.3.4","type":"ip"}],"type":"sighting","source":"string","external_ids":["string"],"targets":[{"type":"endpoint","observables":[{"value":"1.2.3.4","type":"ip"}],"observed_time":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"os":"string"}],"short_description":"string","title":"string","resolution":"detected","internal":false,"external_references":[{"source_name":"string","description":"string","url":"string","hashes":["string"],"external_id":"string"}],"source_uri":"string","language":"string","id":"string","count":10,"severity":"Critical","tlp":"green","context":{"http_events":[{"process_guid":10,"traffic":{"destination_host_name":"string","protocol":10,"source_ip":"string","destination_subnet":"string","destination_ip":"string","source_subnet":"string","destination_port":10,"direction":"incoming","source_port":10},"method":"CONNECT","time":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"type":"HTTPEvent","host":"string","process_name":"string","process_id":10,"process_username":"string","query":"string","encrypted":true,"url_port":10}],"process_create_events":[{"parent_process_name":"string","process_guid":10,"parent_process_guid":10,"process_disposition":"string","parent_process_size":10,"process_size":10,"time":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"parent_process_disposition":"string","type":"ProcessCreateEvent","parent_process_username":"string","parent_process_id":10,"parent_process_args":"string","process_name":"string","process_hash":"string","process_id":10,"parent_process_hash":"string","process_username":"string","parent_creation_time":"2016-01-01T01:01:01.000Z","process_args":"string"}],"registry_delete_events":[{"time":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"process_id":10,"process_name":"string","process_guid":10,"process_username":"string","registry_key":"string","type":"RegistryDeleteEvent","registry_value":"string"}],"file_modify_events":[{"file_name":"string","process_guid":10,"time":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"type":"FileModifyEvent","file_path":"string","process_name":"string","process_id":10,"process_username":"string","failed":false}],"registry_set_events":[{"process_guid":10,"registry_data":"string","time":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"type":"RegistrySetEvent","registry_data_length":10,"registry_value":"string","registry_key":"string","process_name":"string","process_id":10,"process_username":"string"}],"file_create_events":[{"file_name":"string","process_guid":10,"time":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"type":"FileCreateEvent","file_path":"string","process_name":"string","process_id":10,"process_username":"string","failed":false}],"registry_create_events":[{"time":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"process_id":10,"process_name":"string","process_guid":10,"process_username":"string","registry_key":"string","type":"RegistryCreateEvent"}],"library_load_events":[{"time":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"process_id":10,"process_name":"string","process_guid":10,"process_username":"string","type":"LibraryLoadEvent","dll_library_name":"string","dll_library_path":"string"}],"file_move_events":[{"file_name":"string","process_guid":10,"time":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"type":"FileMoveEvent","old_name":"string","file_path":"string","process_name":"string","process_id":10,"process_username":"string","new_name":"string"}],"file_delete_events":[{"file_name":"string","process_guid":10,"time":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"type":"FileDeleteEvent","file_path":"string","process_name":"string","process_id":10,"process_username":"string","failed":false}],"netflow_events":[{"parent_process_name":"string","byte_count_in":10,"process_guid":10,"process_path":"string","traffic":{"destination_host_name":"string","protocol":10,"source_ip":"string","destination_subnet":"string","destination_ip":"string","source_subnet":"string","destination_port":10,"direction":"incoming","source_port":10},"flow_time":"2016-01-01T01:01:01.000Z","time":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"parent_process_account":"string","type":"NetflowEvent","process_account_type":"string","parent_process_path":"string","parent_process_id":10,"parent_process_args":"string","process_name":"string","process_account":"string","parent_process_account_type":"string","process_hash":"string","process_id":10,"parent_process_hash":"string","process_username":"string","byte_count_out":10,"process_args":"string"}],"registry_rename_events":[{"time":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"process_id":10,"process_name":"string","process_guid":10,"process_username":"string","registry_key":"string","type":"RegistryRenameEvent","registry_old_key":"string"}]},"timestamp":"2016-01-01T01:01:01.000Z","confidence":"High","observed_time":{"start_time":"2016-01-01T01:01:01.000Z","end_time":"2016-01-01T01:01:01.000Z"},"sensor":"endpoint","data":{"columns":[{"name":"string","type":"integer","description":"string","required":true,"short_description":"string"}],"rows":[["anything"]],"row_count":10}},"$$ref":"#/components/schemas/PartialSighting"}}}}}},"security":[{"oAuth2":["integration:read","private-intel:read","profile:read","inspect:read","users:read","invite:read","enrich:read","oauth:read","response:read","global-intel:read","ao:read","playbook:read"]}],"method":"get","path":"/ctia/sighting/search"}}