Detection Finding
Detection Finding is a searchable entity at the top of Query's UI.
detection_finding (2004)
A Detection Finding describes detections or alerts generated by security products using correlation engines, detection engines or other methodologies. Note: if the product is a security control, the security_control
profile should be applied and its attacks
information should be duplicated into the finding_info
object.
Contents
Attributes
Caption | Name | Type | Is Array | Default | Description |
---|---|---|---|---|---|
Action | action | String |
The normalized caption of action_id .
|
||
Action ID | action_id | Integer |
The action taken by a control or other policy-based system leading to an outcome or disposition. Dispositions conform to an action of 1 'Allowed' or 2 'Denied' in most cases. Note that 99 'Other' is not an option. No action would equate to 1 'Allowed'. An unknown action may still correspond to a known disposition. Refer to disposition_id for the outcome of the action.
|
||
Activity ID | activity_id | Integer |
The normalized identifier of the finding activity.
|
||
Activity | activity_name | String |
The finding activity name, as defined by the activity_id .
|
||
Actor | actor | Actor | The actor object describes details about the user/role/process that was the source of the activity. | ||
API Details | api | API | Describes details about a typical API (Application Programming Interface) call. | ||
MITRE ATT&CK® Details | attacks | MITRE ATT&CK® | An array of MITRE ATT&CK® objects describing the tactics, techniques & sub-techniques identified by a security control or finding. | ||
Authorization Information | authorizations | Authorization Result | Provides details about an authorization, such as authorization outcome, and any associated policies related to the activity/event. | ||
Category | category_name | String | The event category name, as defined by category_uid value. | ||
Category ID | category_uid | Integer |
The category unique identifier of the event.
|
||
Class | class_name | String | The event class name, as defined by class_uid value. | ||
Class ID | class_uid | Integer |
The unique identifier of a class. A class describes the attributes available in an event.
|
||
Cloud | cloud | Cloud | Describes details about the Cloud environment where the event was originally created or logged. | ||
Comment | comment | String | A user provided comment about the finding. | ||
Confidence | confidence | Integer |
The confidence of the reported event severity as a percentage: 0%-100%.
Deprecated since 1.1.0: Deprecated in upgrade from ocsf-0.31.1 to qdm-1.1.0 |
||
Confidence Id | confidence_id | Integer |
The normalized confidence refers to the accuracy of the rule that created the finding. A rule with a low confidence means that the finding scope is wide and may create finding reports that may not be malicious in nature.
|
||
Confidence Score | confidence_score | Integer | The confidence score as reported by the event source. | ||
Count | count | Integer | 1 | The number of times that events in the same logical group occurred during the event Start Time to End Time period. | |
Data | data | JSON |
Additional data that is associated with the event.
Deprecated since 1.1.0: Deprecated in upgrade from ocsf-0.31.1 to qdm-1.1.0 |
||
Device | device | Device | An addressable device, computer system or host. | ||
Disposition | disposition | String | The disposition name, normalized to the caption of the disposition_id value. In the case of 'Other', it is defined by the event source. | ||
Disposition ID | disposition_id | Integer |
Describes the outcome or action taken by a security control, such as access control checks, malware detections or various types of policy violations.
|
||
Duration | duration | Integer |
The event duration or aggregate time, the amount of time the event covers from start_time to end_time in milliseconds.
|
||
End Time | end_time | Timestamp | The time of the most recent event included in the finding. | ||
Enrichments | enrichments | Enrichment |
The additional information from an external data source, which is associated with the event or a finding. For example add location information for the IP address in the DNS answers:[{"name": "answers.ip", "value": "92.24.47.250", "type": "location", "data": {"city": "Socotra", "continent": "Asia", "coordinates": [-25.4153, 17.0743], "country": "YE", "desc": "Yemen"}}]
|
||
Evidence Artifacts | evidences | Evidence Artifacts | Describes various evidence artifacts associated to the activity/activities that triggered a security detection. | ||
Finding Information | finding_info | Finding Information | Describes the supporting information about a generated finding. | ||
Firewall Rule | firewall_rule | Firewall Rule | The firewall rule that triggered the event. | ||
Impact | impact | String | The impact , normalized to the caption of the impact_id value. In the case of 'Other', it is defined by the event source. | ||
Impact ID | impact_id | Integer |
The normalized impact of the finding.
|
||
Impact | impact_score | Integer | The impact of the finding, valid range 0-100. | ||
Malware | malware | Malware | A list of Malware objects, describing details about the identified malware. | ||
Message | message | String | The description of the event/finding, as defined by the source. | ||
Metadata | metadata | Metadata | The metadata associated with the event or a finding. | ||
Observables | observables | Observable | The observables associated with the event or a finding. | ||
Raw Data | raw_data | JSON | The event data as received from the event source. | ||
Record ID | record_id | String | Unique idenifier for the event | ||
Remediation Guidance | remediation | Remediation | Describes the recommended remediation steps to address identified issue(s). | ||
Affected Resources | resources | Resource Details | Describes details about resources that were the target of the activity that triggered the finding. | ||
Risk Details | risk_details | String | Describes the risk associated with the finding. | ||
Risk Level | risk_level | String | The risk level, normalized to the caption of the risk_level_id value. In the case of 'Other', it is defined by the event source. | ||
Risk Level ID | risk_level_id | Integer |
The normalized risk level id.
|
||
Risk Score | risk_score | Integer | The risk score as reported by the event source. | ||
Severity | severity | String | The event/finding severity, normalized to the caption of the severity_id value. In the case of 'Other', it is defined by the source. | ||
Severity ID | severity_id | Integer |
The normalized identifier of the event/finding severity. The normalized severity is a measurement the effort and expense required to manage and resolve an event or incident. Smaller numerical values represent lower impact events, and larger numerical values represent higher impact events.
|
||
Start Time | start_time | Timestamp | The time of the least recent event included in the finding. | ||
Status | status | String | The normalized status of the Finding set by the consumer normalized to the caption of the status_id value. In the case of 'Other', it is defined by the source. | ||
Status Code | status_code | String |
The event status code, as reported by the event source. For example, in a Windows Failed Authentication event, this would be the value of 'Failure Code', e.g. 0x18. |
||
Status Details | status_detail | String | The status details contains additional information about the event/finding outcome. | ||
Status ID | status_id | Integer |
The normalized status identifier of the Finding, set by the consumer.
|
||
Event Time | time | Timestamp | The normalized event occurrence time or the finding creation time. | ||
Timezone Offset | timezone_offset | Integer |
The number of minutes that the reported event time is ahead or behind UTC, in the range -1,080 to +1,080.
|
||
Type Name | type_name | String | The event/finding type name, as defined by the type_uid. | ||
Type ID | type_uid | Long |
The event/finding type ID. It identifies the event's semantics and structure. The value is calculated by the logging system as: class_uid * 100 + activity_id .
|
||
Unmapped Data | unmapped | Unmapped | The attributes that are not mapped to the event schema. The names and values of those attributes are specific to the event source. | ||
Vulnerabilities | vulnerabilities | Vulnerability Details | Describes vulnerabilities reported in a Detection Finding. |
References
Referenced By
Context
JSON
{
"uid": 4,
"caption": "Detection Finding",
"category": "findings",
"description": "A Detection Finding describes detections or alerts generated by security products using correlation engines, detection engines or other methodologies. Note: if the product is a security control, the <code>security_control</code> profile should be applied and its <code>attacks</code> information should be duplicated into the <code>finding_info</code> object.",
"extends": "finding",
"name": "detection_finding",
"profiles": [
"security_control"
],
"attributes": {
"$include": [
"profiles/security_control.json"
],
"evidences": {
"group": "primary",
"requirement": "recommended",
"caption": "Evidence Artifacts",
"description": "Describes various evidence artifacts associated to the activity/activities that triggered a security detection.",
"is_array": true,
"type": "evidences"
},
"impact": {
"group": "context",
"requirement": "optional",
"caption": "Impact",
"description": "The impact , normalized to the caption of the impact_id value. In the case of 'Other', it is defined by the event source.",
"type": "string_t"
},
"impact_id": {
"group": "context",
"requirement": "optional",
"caption": "Impact ID",
"description": "The normalized impact of the finding.",
"enum": {
"0": {
"caption": "Unknown",
"description": "The normalized impact is unknown."
},
"1": {
"caption": "Low"
},
"2": {
"caption": "Medium"
},
"3": {
"caption": "High"
},
"4": {
"caption": "Critical"
},
"99": {
"caption": "Other",
"description": "The impact is not mapped. See the <code>impact</code> attribute, which contains a data source specific value."
}
},
"sibling": "impact",
"type": "integer_t"
},
"impact_score": {
"group": "context",
"requirement": "optional",
"caption": "Impact",
"description": "The impact of the finding, valid range 0-100.",
"type": "integer_t"
},
"remediation": {
"group": "context",
"requirement": "optional",
"caption": "Remediation Guidance",
"description": "Describes the recommended remediation steps to address identified issue(s).",
"type": "remediation"
},
"resources": {
"caption": "Affected Resources",
"description": "Describes details about resources that were the target of the activity that triggered the finding.",
"group": "context",
"requirement": "recommended",
"is_array": true,
"type": "resource_details"
},
"risk_level": {
"group": "context",
"requirement": "optional",
"caption": "Risk Level",
"description": "The risk level, normalized to the caption of the risk_level_id value. In the case of 'Other', it is defined by the event source.",
"type": "string_t"
},
"risk_level_id": {
"group": "context",
"requirement": "optional",
"caption": "Risk Level ID",
"description": "The normalized risk level id.",
"enum": {
"0": {
"caption": "Info"
},
"1": {
"caption": "Low"
},
"2": {
"caption": "Medium"
},
"3": {
"caption": "High"
},
"4": {
"caption": "Critical"
}
},
"sibling": "risk_level",
"type": "integer_t"
},
"risk_score": {
"group": "context",
"requirement": "optional",
"caption": "Risk Score",
"description": "The risk score as reported by the event source.",
"type": "integer_t"
},
"risk_details": {
"group": "context",
"requirement": "optional",
"caption": "Risk Details",
"description": "Describes the risk associated with the finding.",
"type": "string_t"
},
"vulnerabilities": {
"description": "Describes vulnerabilities reported in a Detection Finding.",
"group": "context",
"requirement": "optional",
"caption": "Vulnerabilities",
"is_array": true,
"type": "vulnerability"
},
"action": {
"caption": "Action",
"description": "The normalized caption of <code>action_id</code>.",
"requirement": "optional",
"type": "string_t"
},
"action_id": {
"caption": "Action ID",
"description": "The action taken by a control or other policy-based system leading to an outcome or disposition. Dispositions conform to an action of <code>1</code> 'Allowed' or <code>2</code> 'Denied' in most cases. Note that <code>99</code> 'Other' is not an option. No action would equate to <code>1</code> 'Allowed'. An unknown action may still correspond to a known disposition. Refer to <code>disposition_id</code> for the outcome of the action.",
"enum": {
"0": {
"caption": "Unknown",
"description": "The action was unknown. The <code>disposition_id</code> attribute may still be set to a non-unknown value, for example 'Count', 'Uncorrected', 'Isolated', 'Quarantined' or 'Exonerated'."
},
"1": {
"caption": "Allowed",
"description": "The activity was allowed. The <code>disposition_id</code> attribute should be set to a value that conforms to this action, for example 'Allowed', 'Approved', 'Delayed', 'No Action', 'Count' etc."
},
"2": {
"caption": "Denied",
"description": "The attempted activity was denied. The <code>disposition_id</code> attribute should be set to a value that conforms to this action, for example 'Blocked', 'Rejected', 'Quarantined', 'Isolated', 'Dropped', 'Access Revoked, etc."
},
"99": {
"caption": "Other",
"description": "The action was not mapped. See the <code>action</code> attribute, which contains a data source specific value."
}
},
"requirement": "required",
"type": "integer_t",
"sibling": "action"
},
"attacks": {
"requirement": "optional",
"caption": "MITRE ATT&CK\u00ae Details",
"description": "An array of <a target='_blank' href='https://attack.mitre.org'>MITRE ATT&CK\u00ae</a> objects describing the tactics, techniques & sub-techniques identified by a security control or finding.",
"is_array": true,
"type": "attack"
},
"authorizations": {
"requirement": "optional",
"caption": "Authorization Information",
"description": "Provides details about an authorization, such as authorization outcome, and any associated policies related to the activity/event.",
"is_array": true,
"type": "authorization"
},
"disposition": {
"requirement": "optional",
"caption": "Disposition",
"description": "The disposition name, normalized to the caption of the disposition_id value. In the case of 'Other', it is defined by the event source.",
"type": "string_t"
},
"disposition_id": {
"requirement": "recommended",
"enum": {
"99": {
"caption": "Other",
"description": "The disposition is not listed. The <code>disposition</code> attribute should be populated with a source specific caption."
},
"0": {
"caption": "Unknown",
"description": "The disposition was not known."
},
"1": {
"caption": "Allowed",
"description": "Granted access or allowed the action to the protected resource."
},
"2": {
"caption": "Blocked",
"description": "Denied access or blocked the action to the protected resource."
},
"3": {
"caption": "Quarantined",
"description": "A suspicious file or other content was moved to a benign location."
},
"4": {
"caption": "Isolated",
"description": "A session was isolated on the network or within a browser."
},
"5": {
"caption": "Deleted",
"description": "A file or other content was deleted."
},
"6": {
"caption": "Dropped",
"description": "The request was detected as a threat and resulted in the connection being dropped."
},
"7": {
"caption": "Custom Action",
"description": "A custom action was executed such as running of a command script. Use the <code>message</code> attribute of the base class for details."
},
"8": {
"caption": "Approved",
"description": "A request or submission was approved. For example, when a form was properly filled out and submitted. This is distinct from <code>1</code> 'Allowed'."
},
"9": {
"caption": "Restored",
"description": "A quarantined file or other content was restored to its original location."
},
"10": {
"caption": "Exonerated",
"description": "A suspicious or risky entity was deemed to no longer be suspicious (re-scored)."
},
"11": {
"caption": "Corrected",
"description": "A corrupt file or configuration was corrected."
},
"12": {
"caption": "Partially Corrected",
"description": "A corrupt file or configuration was partially corrected."
},
"13": {
"caption": "Uncorrected",
"description": "A corrupt file or configuration was not corrected."
},
"14": {
"caption": "Delayed",
"description": "An operation was delayed, for example if a restart was required to finish the operation."
},
"15": {
"caption": "Detected",
"description": "Suspicious activity or a policy violation was detected without further action."
},
"16": {
"caption": "No Action",
"description": "The outcome of an operation had no action taken."
},
"17": {
"caption": "Logged",
"description": "The operation or action was logged without further action."
},
"18": {
"caption": "Tagged",
"description": "A file or other entity was marked with extended attributes."
},
"19": {
"caption": "Alert",
"description": "The request or activity was detected as a threat and resulted in a notification but request was not blocked."
},
"20": {
"caption": "Count",
"description": "Counted the request or activity but did not determine whether to allow it or block it."
},
"21": {
"caption": "Reset",
"description": "The request was detected as a threat and resulted in the connection being reset."
},
"22": {
"caption": "Captcha",
"description": "Required the end user to solve a CAPTCHA puzzle to prove that a human being is sending the request."
},
"23": {
"caption": "Challenge",
"description": "Ran a silent challenge that required the client session to verify that it's a browser, and not a bot."
},
"24": {
"caption": "Access Revoked",
"description": "The requestor's access has been revoked due to security policy enforcements. Note: use the <code>Host</code> profile if the <code>User</code> or <code>Actor</code> requestor is not present in the event class."
},
"25": {
"caption": "Rejected",
"description": "A request or submission was rejected. For example, when a form was improperly filled out and submitted. This is distinct from <code>2</code> 'Blocked'."
},
"26": {
"caption": "Unauthorized",
"description": "An attempt to access a resource was denied due to an authorization check that failed. This is a more specific disposition than <code>2</code> 'Blocked' and can be complemented with the <code>authorizations</code> attribute for more detail."
},
"27": {
"caption": "Error",
"description": "An error occurred during the processing of the activity or request. Use the <code>message</code> attribute of the base class for details."
}
},
"caption": "Disposition ID",
"description": "Describes the outcome or action taken by a security control, such as access control checks, malware detections or various types of policy violations.",
"sibling": "disposition",
"type": "integer_t"
},
"firewall_rule": {
"requirement": "optional",
"caption": "Firewall Rule",
"description": "The firewall rule that triggered the event.",
"type": "firewall_rule"
},
"malware": {
"requirement": "optional",
"caption": "Malware",
"description": "A list of Malware objects, describing details about the identified malware.",
"is_array": true,
"type": "malware"
},
"activity_name": {
"description": "The finding activity name, as defined by the <code>activity_id</code>.",
"requirement": "optional",
"caption": "Activity",
"type": "string_t"
},
"activity_id": {
"description": "The normalized identifier of the finding activity.",
"enum": {
"1": {
"caption": "Create",
"description": "A finding was created."
},
"2": {
"caption": "Update",
"description": "A finding was updated."
},
"3": {
"caption": "Close",
"description": "A finding was closed."
},
"0": {
"caption": "Unknown",
"description": "The event activity is unknown."
},
"99": {
"caption": "Other",
"description": "The event activity is not mapped. See the <code>activity_name</code> attribute, which contains a data source specific value."
}
},
"requirement": "required",
"caption": "Activity ID",
"sibling": "activity_name",
"type": "integer_t"
},
"comment": {
"description": "A user provided comment about the finding.",
"group": "context",
"requirement": "optional",
"caption": "Comment",
"type": "string_t"
},
"confidence": {
"group": "context",
"requirement": "optional",
"caption": "Confidence",
"description": "The confidence of the reported event severity as a percentage: 0%-100%.",
"type": "integer_t",
"@deprecated": {
"since": "1.1.0",
"message": "Deprecated in upgrade from ocsf-0.31.1 to qdm-1.1.0"
}
},
"confidence_id": {
"group": "context",
"requirement": "recommended",
"caption": "Confidence Id",
"description": "The normalized confidence refers to the accuracy of the rule that created the finding. A rule with a low confidence means that the finding scope is wide and may create finding reports that may not be malicious in nature.",
"enum": {
"0": {
"caption": "Unknown",
"description": "The normalized confidence is unknown."
},
"1": {
"caption": "Low"
},
"2": {
"caption": "Medium"
},
"3": {
"caption": "High"
},
"99": {
"caption": "Other",
"description": "The confidence is not mapped to the defined enum values. See the <code>confidence</code> attribute, which contains a data source specific value."
}
},
"type": "integer_t"
},
"confidence_score": {
"group": "context",
"requirement": "optional",
"caption": "Confidence Score",
"description": "The confidence score as reported by the event source.",
"type": "integer_t"
},
"device": {
"description": "An addressable device, computer system or host.",
"group": "primary",
"requirement": "recommended",
"caption": "Device",
"type": "device"
},
"end_time": {
"description": "The time of the most recent event included in the finding.",
"requirement": "optional",
"caption": "End Time",
"type": "timestamp_t"
},
"finding_info": {
"group": "primary",
"requirement": "required",
"caption": "Finding Information",
"description": "Describes the supporting information about a generated finding.",
"type": "finding_info"
},
"start_time": {
"description": "The time of the least recent event included in the finding.",
"requirement": "optional",
"caption": "Start Time",
"type": "timestamp_t"
},
"status": {
"description": "The normalized status of the Finding set by the consumer normalized to the caption of the status_id value. In the case of 'Other', it is defined by the source.",
"group": "context",
"requirement": "optional",
"caption": "Status",
"type": "string_t"
},
"status_id": {
"description": "The normalized status identifier of the Finding, set by the consumer.",
"group": "context",
"requirement": "recommended",
"enum": {
"1": {
"caption": "New",
"description": "The Finding is new and yet to be reviewed."
},
"2": {
"caption": "In Progress",
"description": "The Finding is under review."
},
"3": {
"caption": "Suppressed",
"description": "The Finding was reviewed, determined to be benign or a false positive and is now suppressed."
},
"4": {
"caption": "Resolved",
"description": "The Finding was reviewed, remediated and is now considered resolved."
},
"99": {
"caption": "Other",
"description": "The event status is not mapped. See the <code>status</code> attribute, which contains a data source specific value."
},
"0": {
"caption": "Unknown",
"description": "The status is unknown."
}
},
"caption": "Status ID",
"sibling": "status",
"type": "integer_t"
},
"actor": {
"requirement": "optional",
"caption": "Actor",
"description": "The actor object describes details about the user/role/process that was the source of the activity.",
"type": "actor"
},
"enrichments": {
"group": "context",
"requirement": "optional",
"caption": "Enrichments",
"description": "The additional information from an external data source, which is associated with the event or a finding. For example add location information for the IP address in the DNS answers:</p><code>[{\"name\": \"answers.ip\", \"value\": \"92.24.47.250\", \"type\": \"location\", \"data\": {\"city\": \"Socotra\", \"continent\": \"Asia\", \"coordinates\": [-25.4153, 17.0743], \"country\": \"YE\", \"desc\": \"Yemen\"}}]</code>",
"is_array": true,
"type": "enrichment"
},
"message": {
"group": "primary",
"requirement": "recommended",
"caption": "Message",
"description": "The description of the event/finding, as defined by the source.",
"type": "string_t"
},
"metadata": {
"group": "context",
"requirement": "required",
"caption": "Metadata",
"description": "The metadata associated with the event or a finding.",
"type": "metadata"
},
"observables": {
"group": "primary",
"requirement": "recommended",
"caption": "Observables",
"description": "The observables associated with the event or a finding.",
"is_array": true,
"type": "observable"
},
"raw_data": {
"group": "context",
"requirement": "optional",
"caption": "Raw Data",
"description": "The event data as received from the event source.",
"type": "json_t"
},
"severity": {
"group": "classification",
"requirement": "optional",
"caption": "Severity",
"description": "The event/finding severity, normalized to the caption of the severity_id value. In the case of 'Other', it is defined by the source.",
"type": "string_t"
},
"severity_id": {
"group": "classification",
"requirement": "required",
"caption": "Severity ID",
"description": "<p>The normalized identifier of the event/finding severity.</p>The normalized severity is a measurement the effort and expense required to manage and resolve an event or incident. Smaller numerical values represent lower impact events, and larger numerical values represent higher impact events.",
"enum": {
"99": {
"caption": "Other",
"description": "The event/finding severity is not mapped. See the <code>severity</code> attribute, which contains a data source specific value."
},
"0": {
"caption": "Unknown",
"description": "The event severity is not known."
},
"1": {
"caption": "Informational",
"description": "Informational message. No action required."
},
"2": {
"caption": "Low",
"description": "The user decides if action is needed."
},
"3": {
"caption": "Medium",
"description": "Action is required but the situation is not serious at this time."
},
"4": {
"caption": "High",
"description": "Action is required immediately."
},
"5": {
"caption": "Critical",
"description": "Action is required immediately and the scope is broad."
},
"6": {
"caption": "Fatal",
"description": "An error occurred but it is too late to take remedial action."
}
},
"sibling": "severity",
"type": "integer_t"
},
"status_code": {
"group": "primary",
"requirement": "recommended",
"caption": "Status Code",
"description": "The event status code, as reported by the event source.<br /><br />For example, in a Windows Failed Authentication event, this would be the value of 'Failure Code', e.g. 0x18.",
"type": "string_t"
},
"status_detail": {
"group": "primary",
"requirement": "recommended",
"caption": "Status Details",
"description": "The status details contains additional information about the event/finding outcome.",
"type": "string_t"
},
"unmapped": {
"group": "context",
"requirement": "optional",
"caption": "Unmapped Data",
"description": "The attributes that are not mapped to the event schema. The names and values of those attributes are specific to the event source.",
"type": "unmapped",
"is_array": true
},
"category_name": {
"requirement": "optional",
"caption": "Category",
"description": "The event category name, as defined by category_uid value.",
"type": "string_t"
},
"category_uid": {
"enum": {
"2": {
"caption": "Findings",
"description": "Findings events report findings, detections, and possible resolutions of malware, anomalies, or other actions performed by security products."
}
},
"requirement": "required",
"caption": "Category ID",
"description": "The category unique identifier of the event.",
"sibling": "category_name",
"type": "integer_t"
},
"class_name": {
"requirement": "optional",
"caption": "Class",
"description": "The event class name, as defined by class_uid value.",
"type": "string_t"
},
"class_uid": {
"enum": {
"2004": {
"caption": "Detection Finding",
"description": "A Detection Finding describes detections or alerts generated by security products using correlation engines, detection engines or other methodologies. Note: if the product is a security control, the <code>security_control</code> profile should be applied and its <code>attacks</code> information should be duplicated into the <code>finding_info</code> object."
}
},
"requirement": "required",
"caption": "Class ID",
"description": "The unique identifier of a class. A class describes the attributes available in an event.",
"sibling": "class_name",
"type": "integer_t"
},
"type_name": {
"requirement": "optional",
"caption": "Type Name",
"description": "The event/finding type name, as defined by the type_uid.",
"type": "string_t"
},
"type_uid": {
"requirement": "required",
"caption": "Type ID",
"description": "The event/finding type ID. It identifies the event's semantics and structure. The value is calculated by the logging system as: <code>class_uid * 100 + activity_id</code>.",
"sibling": "type_name",
"type": "long_t",
"enum": {
"200401": {
"caption": "Detection Finding: Create"
},
"200402": {
"caption": "Detection Finding: Update"
},
"200403": {
"caption": "Detection Finding: Close"
},
"200400": {
"caption": "Detection Finding: Unknown"
},
"200499": {
"caption": "Detection Finding: Other"
}
}
},
"count": {
"requirement": "optional",
"caption": "Count",
"description": "The number of times that events in the same logical group occurred during the event <strong>Start Time</strong> to <strong>End Time</strong> period.",
"type": "integer_t",
"default": 1
},
"duration": {
"requirement": "optional",
"caption": "Duration",
"description": "The event duration or aggregate time, the amount of time the event covers from <code>start_time</code> to <code>end_time</code> in milliseconds.",
"type": "integer_t"
},
"time": {
"requirement": "required",
"caption": "Event Time",
"description": "The normalized event occurrence time or the finding creation time.",
"type": "timestamp_t"
},
"timezone_offset": {
"requirement": "recommended",
"caption": "Timezone Offset",
"description": "The number of minutes that the reported event <code>time</code> is ahead or behind UTC, in the range -1,080 to +1,080.",
"type": "integer_t"
},
"cloud": {
"requirement": "required",
"group": "primary",
"caption": "Cloud",
"description": "Describes details about the Cloud environment where the event was originally created or logged.",
"type": "cloud"
},
"api": {
"requirement": "optional",
"group": "context",
"caption": "API Details",
"description": "Describes details about a typical API (Application Programming Interface) call.",
"type": "api"
},
"data": {
"description": "Additional data that is associated with the event.",
"requirement": "optional",
"caption": "Data",
"type": "json_t",
"@deprecated": {
"since": "1.1.0",
"message": "Deprecated in upgrade from ocsf-0.31.1 to qdm-1.1.0"
}
},
"record_id": {
"description": "Unique idenifier for the event",
"group": "primary",
"requirement": "required",
"caption": "Record ID",
"type": "string_t"
}
}
}