Threat Detection Opportunity.
| JSON representation |
|---|
{ "summary": string, "mitreInfo": { object ( |
| Fields | |
|---|---|
summary |
Concise, one sentence summary. |
mitreInfo |
MITRE ATT&CK details for the Threat Detection Opportunity. |
supportingEvidence[] |
Free-form text of supporting evidence for the Threat Detection Opportunity extracted from the threat. |
observables |
Detection opportunity observables - hostnames, IP's, etc. |
logTypes[] |
Output only. Resource names of log types associated with the Threat Detection Opportunity. |
MitreInfo
MITRE ATT&CK details for the Threat Detection Opportunity.
| JSON representation |
|---|
{ "tactics": [ string ], "techniques": [ string ], "platform": string, "procedure": string, "detectionStrategy": string } |
| Fields | |
|---|---|
tactics[] |
Optional. MITRE ATT&CK tactics. |
techniques[] |
Optional. MITRE ATT&CK techniques. |
platform |
Platform the technique is associated with. |
procedure |
MITRE ATT&CK procedure. |
detectionStrategy |
Detection strategy for the Threat Detection Opportunity. |
ObservableCollection
Detection opportunity observables.
| JSON representation |
|---|
{ "atomics": { object ( |
| Fields | |
|---|---|
atomics |
Context-free IOCs. |
procedures |
Context-dependent tactics, techniques, and procedures. |
AtomicIndicatorCollection
Context-free IOCs.
| JSON representation |
|---|
{ "hashes": [ string ], "domains": [ string ], "urls": [ string ], "ipAddresses": [ string ], "emails": [ string ], "ports": [ integer ] } |
| Fields | |
|---|---|
hashes[] |
File hashes associated with the threat. |
domains[] |
Domains associated with the threat. |
urls[] |
URLs associated with the threat. |
ipAddresses[] |
IP addresses associated with the threat. |
emails[] |
Email addresses associated with the threat. |
ports[] |
Ports associated with the threat. |
ProcedureCollection
Context-dependent tactics, techniques, and procedures.
| JSON representation |
|---|
{ "files": [ string ], "registryKeys": [ string ], "processes": [ string ], "parentProcesses": [ string ], "userAccounts": [ string ] } |
| Fields | |
|---|---|
files[] |
Files associated with the threat. |
registryKeys[] |
Registry keys associated with the threat. |
processes[] |
Processes associated with the threat. |
parentProcesses[] |
Parent process names associated with the threat. |
userAccounts[] |
User accounts associated with the threat. |