Connector API

The Synqly Connector APIs provide a unifying interface and data model for all supported service Providers.

See the Synqly Overview for more information.

Download OpenAPI description
Languages
Servers
Synqly
https://api.synqly.com/

Assets

Operations

Edr

Operations

Hooks

Operations

Identity

Operations

Notifications

Operations

Operations

Operations

Siem

Operations

Sink

Operations

Storage

Operations

Ticketing

Operations

Vulnerabilities

Operations

Query Findings

Request

Query vulnerability findings

Query
metaArray of strings or null

Add metadata to the response by invoking meta functions. Documentation for meta functions is available at https://docs.synqly.com/api-reference/meta-functions. Not all meta function are available at every endpoint.

limitinteger or null

Number of finding reports to return. Defaults to 50.

cursorstring or null

Start search from cursor position.

filterArray of strings or null

Filter results by this query. For more information on filtering, refer to the Vulnerability Filtering Guide. Defaults to no filter. If used more than once, the queries are ANDed together.

curl -i -X GET \
  'https://api.synqly.com/v1/vulnerabilities/findings?cursor=string&filter=string&limit=0&meta=string' \
  -H 'Authorization: Bearer <YOUR_TOKEN_HERE>'

Responses

Bodyapplication/json
resultArray of objects(ocsfv1.3.0securityfindingSecurityFinding)required
result[].​activity_idinteger(ocsfv1.3.0securityfindingActivityId)required

ActivityId is an enum, and the following values are allowed. 0 - Unknown: The event activity is unknown. 1 - Create: A security finding was created. 2 - Update: A security finding was updated. 3 - Close: A security finding was closed. 99 - Other: The event activity is not mapped. See the activity_name attribute, which contains a data source specific value.

result[].​category_uidinteger(ocsfv1.3.0securityfindingCategoryUid)required

CategoryUid is an enum, and the following values are allowed. 2 - Findings: Findings events report findings, detections, and possible resolutions of malware, anomalies, or other actions performed by security products.

result[].​class_uidinteger(ocsfv1.3.0securityfindingClassUid)required

ClassUid is an enum, and the following values are allowed. 2001 - SecurityFinding: Security Finding events describe findings, detections, anomalies, alerts and/or actions performed by security products

result[].​findingobject(ocsfv1.3.0securityfindingFinding)required

The Finding object describes metadata related to a security finding generated by a security tool or system.

result[].​finding.​titlestringrequired

A title or a brief phrase summarizing the reported finding.

result[].​finding.​uidstringrequired

The unique identifier of the reported finding.

result[].​finding.​created_timeinteger(ocsfv1.3.0securityfindingTimestamp)

The timestamp format is the number of milliseconds since the Epoch 01/01/1970 00:00:00 UTC. For example 1618524549901.

result[].​finding.​created_time_dtstring or null(date-time)

The time when the finding was created.

result[].​finding.​descstring or null

The description of the reported finding.

result[].​finding.​first_seen_timeinteger(ocsfv1.3.0securityfindingTimestamp)

The timestamp format is the number of milliseconds since the Epoch 01/01/1970 00:00:00 UTC. For example 1618524549901.

result[].​finding.​first_seen_time_dtstring or null(date-time)

The time when the finding was first observed.

result[].​finding.​last_seen_timeinteger(ocsfv1.3.0securityfindingTimestamp)

The timestamp format is the number of milliseconds since the Epoch 01/01/1970 00:00:00 UTC. For example 1618524549901.

result[].​finding.​last_seen_time_dtstring or null(date-time)

The time when the finding was most recently observed.

result[].​finding.​modified_timeinteger(ocsfv1.3.0securityfindingTimestamp)

The timestamp format is the number of milliseconds since the Epoch 01/01/1970 00:00:00 UTC. For example 1618524549901.

result[].​finding.​modified_time_dtstring or null(date-time)

The time when the finding was last modified.

result[].​finding.​product_uidstring or null

The unique identifier of the product that reported the finding.

result[].​finding.​related_eventsArray of objects or null(ocsfv1.3.0securityfindingRelatedEvent)

Describes events and/or other findings related to the finding as identified by the security product.

result[].​finding.​remediationobject(ocsfv1.3.0securityfindingRemediation)

The Remediation object describes the recommended remediation steps to address identified issue(s).

result[].​finding.​src_urlstring(ocsfv1.3.0securityfindingURLString)

Uniform Resource Locator (URL) string. For example: http://www.example.com/download/trouble.exe.

result[].​finding.​supporting_dataany or null

Additional data supporting a finding as provided by security tool

result[].​finding.​typesArray of strings or null

One or more types of the reported finding.

result[].​metadataobject(ocsfv1.3.0securityfindingMetadata)required

The Metadata object describes the metadata associated with the event. Defined by D3FEND d3f:Metadata.

result[].​metadata.​productobject(ocsfv1.3.0securityfindingProduct)required

The Product object describes characteristics of a software product.

result[].​metadata.​product.​vendor_namestringrequired

The name of the vendor of the product.

result[].​metadata.​product.​cpe_namestring or null

The Common Platform Enumeration (CPE) name as described by (NIST) For example: cpe:/a:apple:safari:16.2.

result[].​metadata.​product.​featureobject(ocsfv1.3.0securityfindingFeature)

The Feature object provides information about the software product feature that generated a specific event. It encompasses details related to the capabilities, components, user interface (UI) design, and performance upgrades associated with the feature.

result[].​metadata.​product.​langstring or null

The two letter lower case language codes, as defined by ISO 639-1. For example: en (English), de (German), or fr (French).

result[].​metadata.​product.​namestring or null

The name of the product.

result[].​metadata.​product.​pathstring or null

The installation path of the product.

result[].​metadata.​product.​uidstring or null

The unique identifier of the product.

result[].​metadata.​product.​url_stringstring(ocsfv1.3.0securityfindingURLString)

Uniform Resource Locator (URL) string. For example: http://www.example.com/download/trouble.exe.

result[].​metadata.​product.​versionstring or null

The version of the product, as defined by the event source. For example: 2013.1.3-beta.

result[].​metadata.​versionstringrequired

The version of the OCSF schema, using Semantic Versioning Specification (SemVer). For example: 1.0.0. Event consumers use the version to determine the available event attributes.

result[].​metadata.​correlation_uidstring or null

The unique identifier used to correlate events.

result[].​metadata.​event_codestring or null

The Event ID or Code that the product uses to describe the event.

result[].​metadata.​extensionobject(ocsfv1.3.0securityfindingExtension)

The OCSF Schema Extension object provides detailed information about the schema extension used to construct the event. The schema extensions are registered in the extensions.md file.

result[].​metadata.​extensionsArray of objects or null(ocsfv1.3.0securityfindingExtension)

The schema extensions used to create the event.

result[].​metadata.​labelsArray of strings or null

The list of category labels attached to the event or specific attributes. Labels are user defined tags or aliases added at normalization time.

For example: ["network", "connection.ip:destination", "device.ip:source"]
result[].​metadata.​log_levelstring or null

The audit level at which an event was generated.

result[].​metadata.​log_namestring or null

The event log name. For example, syslog file name or Windows logging subsystem: Security.

result[].​metadata.​log_providerstring or null

The logging provider or logging service that logged the event. For example, Microsoft-Windows-Security-Auditing.

result[].​metadata.​log_versionstring or null

The event log schema version that specifies the format of the original event. For example syslog version or Cisco Log Schema Version.

result[].​metadata.​logged_timeinteger(ocsfv1.3.0securityfindingTimestamp)

The timestamp format is the number of milliseconds since the Epoch 01/01/1970 00:00:00 UTC. For example 1618524549901.

result[].​metadata.​logged_time_dtstring or null(date-time)

The time when the logging system collected and logged the event.

This attribute is distinct from the event time in that event time typically contain the time extracted from the original event. Most of the time, these two times will be different.
result[].​metadata.​loggersArray of objects or null(ocsfv1.3.0securityfindingLogger)

An array of Logger objects that describe the devices and logging products between the event source and its eventual destination. Note, this attribute can be used when there is a complex end-to-end path of event flow.

result[].​metadata.​modified_timeinteger(ocsfv1.3.0securityfindingTimestamp)

The timestamp format is the number of milliseconds since the Epoch 01/01/1970 00:00:00 UTC. For example 1618524549901.

result[].​metadata.​modified_time_dtstring or null(date-time)

The time when the event was last modified or enriched.

result[].​metadata.​original_timestring or null

The original event time as reported by the event source. For example, the time in the original format from system event log such as Syslog on Unix/Linux and the System event file on Windows. Omit if event is generated instead of collected via logs.

result[].​metadata.​processed_timeinteger(ocsfv1.3.0securityfindingTimestamp)

The timestamp format is the number of milliseconds since the Epoch 01/01/1970 00:00:00 UTC. For example 1618524549901.

result[].​metadata.​processed_time_dtstring or null(date-time)

The event processed time, such as an ETL operation.

result[].​metadata.​profilesArray of strings or null

The list of profiles used to create the event. Profiles should be referenced by their name attribute for core profiles, or extension/name for profiles from extensions.

result[].​metadata.​sequenceinteger or null

Sequence number of the event. The sequence number is a value available in some events, to make the exact ordering of events unambiguous, regardless of the event time precision.

result[].​metadata.​tenant_uidstring or null

The unique tenant identifier.

result[].​metadata.​uidstring or null

The logging system-assigned unique identifier of an event instance.

result[].​severity_idinteger(ocsfv1.3.0securityfindingSeverityId)required

SeverityId is an enum, and the following values are allowed. 0 - Unknown: The event/finding severity is unknown. 1 - Informational: Informational message. No action required. 2 - Low: The user decides if action is needed. 3 - Medium: Action is required but the situation is not serious at this time. 4 - High: Action is required immediately. 5 - Critical: Action is required immediately and the scope is broad. 6 - Fatal: An error occurred but it is too late to take remedial action. 99 - Other: The event/finding severity is not mapped. See the severity attribute, which contains a data source specific value.

result[].​state_idinteger(ocsfv1.3.0securityfindingStateId)required

StateId is an enum, and the following values are allowed. 0 - Unknown: The state is unknown. 1 - New: The finding is new and yet to be reviewed. 2 - InProgress: The finding is under review. 3 - Suppressed: The finding was reviewed, considered as a false positive and is now suppressed. 4 - Resolved: The finding was reviewed and remediated and is now considered resolved. 99 - Other: The state is not mapped. See the state attribute, which contains a data source specific value.

result[].​timeinteger(ocsfv1.3.0securityfindingTimestamp)required

The timestamp format is the number of milliseconds since the Epoch 01/01/1970 00:00:00 UTC. For example 1618524549901.

result[].​type_uidinteger(ocsfv1.3.0securityfindingTypeUid)required

TypeUid is an enum, and the following values are allowed. 200100 - Unknown 200101 - Create: A security finding was created. 200102 - Update: A security finding was updated. 200103 - Close: A security finding was closed. 200199 - Other

result[].​activity_namestring or null

The event activity name, as defined by the activity_id.

result[].​analyticobject(ocsfv1.3.0securityfindingAnalytic)

The Analytic object contains details about the analytic technique used to analyze and derive insights from the data or information that led to the creation of a finding or conclusion.

result[].​apiobject(ocsfv1.3.0securityfindingApi)

The API, or Application Programming Interface, object represents information pertaining to an API request and response.

result[].​attacksArray of objects or null(ocsfv1.3.0securityfindingAttack)

The attack object describes the technique and associated tactics as defined by ATT&CK MatrixTM.

result[].​category_namestring or null

The event category name, as defined by category_uid value: Findings.

result[].​cis_cscArray of objects or null(ocsfv1.3.0securityfindingCisCsc)

The CIS Critical Security Controls is a list of top 20 actions and practices an organization’s security team can take on such that cyber attacks or malware, are minimized and prevented.

result[].​cloudobject(ocsfv1.3.0securityfindingCloud)

The Cloud object contains information about a cloud account such as AWS Account ID, regions, etc.

result[].​complianceobject(ocsfv1.3.0securityfindingCompliance)

The Compliance object contains information about Industry and Regulatory Framework standards, controls and requirements.

result[].​confidencestring or null

The confidence, normalized to the caption of the confidence_id value. In the case of 'Other', it is defined by the event source.

result[].​confidence_idinteger(ocsfv1.3.0securityfindingConfidenceId)

ConfidenceId is an enum, and the following values are allowed. 0 - Unknown: The normalized confidence is unknown. 1 - Low 2 - Medium 3 - High 99 - Other: The confidence is not mapped to the defined enum values. See the confidence attribute, which contains a data source specific value.

result[].​confidence_scoreinteger or null

The confidence score as reported by the event source.

result[].​countinteger or null

The number of times that events in the same logical group occurred during the event Start Time to End Time period.

result[].​custom_fieldsobject(ocsfv1.3.0securityfindingObject)

An unordered collection of attributes. It defines a set of attributes available in all objects. It can be also used as a generic object to log objects that are not otherwise defined by the schema.

result[].​data_sourcesArray of strings or null

A list of data sources utilized in generation of the finding.

result[].​durationinteger or null

The event duration or aggregate time, the amount of time the event covers from start_time to end_time in milliseconds.

result[].​end_timeinteger(ocsfv1.3.0securityfindingTimestamp)

The timestamp format is the number of milliseconds since the Epoch 01/01/1970 00:00:00 UTC. For example 1618524549901.

result[].​end_time_dtstring or null(date-time)

The end time of a time period, or the time of the most recent event included in the aggregate event.

result[].​enrichmentsArray of objects or null(ocsfv1.3.0securityfindingEnrichment)

The additional information from an external data source, which is associated with the event or a finding. For example add location information for the IP address in the DNS answers:

[{"name": "answers.ip", "value": "92.24.47.250", "type": "location", "data": {"city": "Socotra", "continent": "Asia", "coordinates": [-25.4153, 17.0743], "country": "YE", "desc": "Yemen"}}]

result[].​evidenceany or null

The data the finding exposes to the analyst.

result[].​impactstring or null

The impact , normalized to the caption of the impact_id value. In the case of 'Other', it is defined by the event source.

result[].​impact_idinteger(ocsfv1.3.0securityfindingImpactId)

ImpactId is an enum, and the following values are allowed. 0 - Unknown: The normalized impact is unknown. 1 - Low 2 - Medium 3 - High 4 - Critical 99 - Other: The impact is not mapped. See the impact attribute, which contains a data source specific value.

result[].​impact_scoreinteger or null

The impact of the finding, valid range 0-100.

result[].​kill_chainArray of objects or null(ocsfv1.3.0securityfindingKillChainPhase)

The Cyber Kill Chain® provides a detailed description of each phase and its associated activities within the broader context of a cyber attack.

result[].​malwareArray of objects or null(ocsfv1.3.0securityfindingMalware)

A list of Malware objects, describing details about the identified malware.

result[].​messagestring or null

The description of the event/finding, as defined by the source.

result[].​nistArray of strings or null

The NIST Cybersecurity Framework recommendations for managing the cybersecurity risk.

result[].​observablesArray of objects or null(ocsfv1.3.0securityfindingObservable)

The observables associated with the event or a finding.

result[].​osintArray of objects or null(ocsfv1.3.0securityfindingOsint)

The OSINT (Open Source Intelligence) object contains details related to an indicator such as the indicator itself, related indicators, geolocation, registrar information, subdomains, analyst commentary, and other contextual information. This information can be used to further enrich a detection or finding by providing decisioning support to other analysts and engineers.

result[].​processobject(ocsfv1.3.0securityfindingProcess)

The Process object describes a running instance of a launched program. Defined by D3FEND d3f:Process.

result[].​raw_datastring or null

The raw event/finding data as received from the source.

result[].​resourcesArray of objects or null(ocsfv1.3.0securityfindingResourceDetails)

Describes details about resources that were affected by the activity/event.

result[].​risk_levelstring or null

The risk level, normalized to the caption of the risk_level_id value.

result[].​risk_level_idinteger(ocsfv1.3.0securityfindingRiskLevelId)

RiskLevelId is an enum, and the following values are allowed. 0 - Info 1 - Low 2 - Medium 3 - High 4 - Critical 99 - Other: The risk level is not mapped. See the risk_level attribute, which contains a data source specific value.

result[].​risk_scoreinteger or null

The risk score as reported by the event source.

result[].​severitystring or null

The event/finding severity, normalized to the caption of the severity_id value. In the case of 'Other', it is defined by the source.

result[].​start_timeinteger(ocsfv1.3.0securityfindingTimestamp)

The timestamp format is the number of milliseconds since the Epoch 01/01/1970 00:00:00 UTC. For example 1618524549901.

result[].​start_time_dtstring or null(date-time)

The start time of a time period, or the time of the least recent event included in the aggregate event.

result[].​statestring or null

The normalized state of a security finding.

result[].​statusstring or null

The event status, normalized to the caption of the status_id value. In the case of 'Other', it is defined by the event source.

result[].​status_codestring or null

The event status code, as reported by the event source.

For example, in a Windows Failed Authentication event, this would be the value of 'Failure Code', e.g. 0x18.

result[].​status_detailstring or null

The status detail contains additional information about the event/finding outcome.

result[].​status_idinteger(ocsfv1.3.0securityfindingStatusId)

StatusId is an enum, and the following values are allowed. 0 - Unknown: The status is unknown. 1 - Success 2 - Failure 99 - Other: The event status is not mapped. See the status attribute, which contains a data source specific value.

result[].​time_dtstring or null(date-time)

The normalized event occurrence time or the finding creation time.

result[].​timezone_offsetinteger or null

The number of minutes that the reported event time is ahead or behind UTC, in the range -1,080 to +1,080.

result[].​type_namestring or null

The event/finding type name, as defined by the type_uid.

result[].​unmappedobject(ocsfv1.3.0securityfindingObject)

An unordered collection of attributes. It defines a set of attributes available in all objects. It can be also used as a generic object to log objects that are not otherwise defined by the schema.

result[].​vulnerabilitiesArray of objects or null(ocsfv1.3.0securityfindingVulnerability)

This object describes vulnerabilities reported in a security finding.

cursorstringrequired

Cursor to use to retrieve the next page of results

statusstring(QueryStatus)required
Enum"PENDING""COMPLETE"
metaobject(MetaResponse)
Response
application/json
{ "result": [ {} ], "cursor": "string", "meta": { "stats": {}, "api": {} }, "status": "PENDING" }

Create Findings

Request

Create findings (bulk) in a vulnerability scanning system

Bodyapplication/jsonrequired
findingsArray of objects(ocsfv1.3.0securityfindingSecurityFinding)required
findings[].​activity_idinteger(ocsfv1.3.0securityfindingActivityId)required

ActivityId is an enum, and the following values are allowed. 0 - Unknown: The event activity is unknown. 1 - Create: A security finding was created. 2 - Update: A security finding was updated. 3 - Close: A security finding was closed. 99 - Other: The event activity is not mapped. See the activity_name attribute, which contains a data source specific value.

findings[].​category_uidinteger(ocsfv1.3.0securityfindingCategoryUid)required

CategoryUid is an enum, and the following values are allowed. 2 - Findings: Findings events report findings, detections, and possible resolutions of malware, anomalies, or other actions performed by security products.

findings[].​class_uidinteger(ocsfv1.3.0securityfindingClassUid)required

ClassUid is an enum, and the following values are allowed. 2001 - SecurityFinding: Security Finding events describe findings, detections, anomalies, alerts and/or actions performed by security products

findings[].​findingobject(ocsfv1.3.0securityfindingFinding)required

The Finding object describes metadata related to a security finding generated by a security tool or system.

findings[].​finding.​titlestringrequired

A title or a brief phrase summarizing the reported finding.

findings[].​finding.​uidstringrequired

The unique identifier of the reported finding.

findings[].​finding.​created_timeinteger(ocsfv1.3.0securityfindingTimestamp)

The timestamp format is the number of milliseconds since the Epoch 01/01/1970 00:00:00 UTC. For example 1618524549901.

findings[].​finding.​created_time_dtstring or null(date-time)

The time when the finding was created.

findings[].​finding.​descstring or null

The description of the reported finding.

findings[].​finding.​first_seen_timeinteger(ocsfv1.3.0securityfindingTimestamp)

The timestamp format is the number of milliseconds since the Epoch 01/01/1970 00:00:00 UTC. For example 1618524549901.

findings[].​finding.​first_seen_time_dtstring or null(date-time)

The time when the finding was first observed.

findings[].​finding.​last_seen_timeinteger(ocsfv1.3.0securityfindingTimestamp)

The timestamp format is the number of milliseconds since the Epoch 01/01/1970 00:00:00 UTC. For example 1618524549901.

findings[].​finding.​last_seen_time_dtstring or null(date-time)

The time when the finding was most recently observed.

findings[].​finding.​modified_timeinteger(ocsfv1.3.0securityfindingTimestamp)

The timestamp format is the number of milliseconds since the Epoch 01/01/1970 00:00:00 UTC. For example 1618524549901.

findings[].​finding.​modified_time_dtstring or null(date-time)

The time when the finding was last modified.

findings[].​finding.​product_uidstring or null

The unique identifier of the product that reported the finding.

findings[].​finding.​related_eventsArray of objects or null(ocsfv1.3.0securityfindingRelatedEvent)

Describes events and/or other findings related to the finding as identified by the security product.

findings[].​finding.​remediationobject(ocsfv1.3.0securityfindingRemediation)

The Remediation object describes the recommended remediation steps to address identified issue(s).

findings[].​finding.​src_urlstring(ocsfv1.3.0securityfindingURLString)

Uniform Resource Locator (URL) string. For example: http://www.example.com/download/trouble.exe.

findings[].​finding.​supporting_dataany or null

Additional data supporting a finding as provided by security tool

findings[].​finding.​typesArray of strings or null

One or more types of the reported finding.

findings[].​metadataobject(ocsfv1.3.0securityfindingMetadata)required

The Metadata object describes the metadata associated with the event. Defined by D3FEND d3f:Metadata.

findings[].​metadata.​productobject(ocsfv1.3.0securityfindingProduct)required

The Product object describes characteristics of a software product.

findings[].​metadata.​product.​vendor_namestringrequired

The name of the vendor of the product.

findings[].​metadata.​product.​cpe_namestring or null

The Common Platform Enumeration (CPE) name as described by (NIST) For example: cpe:/a:apple:safari:16.2.

findings[].​metadata.​product.​featureobject(ocsfv1.3.0securityfindingFeature)

The Feature object provides information about the software product feature that generated a specific event. It encompasses details related to the capabilities, components, user interface (UI) design, and performance upgrades associated with the feature.

findings[].​metadata.​product.​langstring or null

The two letter lower case language codes, as defined by ISO 639-1. For example: en (English), de (German), or fr (French).

findings[].​metadata.​product.​namestring or null

The name of the product.

findings[].​metadata.​product.​pathstring or null

The installation path of the product.

findings[].​metadata.​product.​uidstring or null

The unique identifier of the product.

findings[].​metadata.​product.​url_stringstring(ocsfv1.3.0securityfindingURLString)

Uniform Resource Locator (URL) string. For example: http://www.example.com/download/trouble.exe.

findings[].​metadata.​product.​versionstring or null

The version of the product, as defined by the event source. For example: 2013.1.3-beta.

findings[].​metadata.​versionstringrequired

The version of the OCSF schema, using Semantic Versioning Specification (SemVer). For example: 1.0.0. Event consumers use the version to determine the available event attributes.

findings[].​metadata.​correlation_uidstring or null

The unique identifier used to correlate events.

findings[].​metadata.​event_codestring or null

The Event ID or Code that the product uses to describe the event.

findings[].​metadata.​extensionobject(ocsfv1.3.0securityfindingExtension)

The OCSF Schema Extension object provides detailed information about the schema extension used to construct the event. The schema extensions are registered in the extensions.md file.

findings[].​metadata.​extensionsArray of objects or null(ocsfv1.3.0securityfindingExtension)

The schema extensions used to create the event.

findings[].​metadata.​labelsArray of strings or null

The list of category labels attached to the event or specific attributes. Labels are user defined tags or aliases added at normalization time.

For example: ["network", "connection.ip:destination", "device.ip:source"]
findings[].​metadata.​log_levelstring or null

The audit level at which an event was generated.

findings[].​metadata.​log_namestring or null

The event log name. For example, syslog file name or Windows logging subsystem: Security.

findings[].​metadata.​log_providerstring or null

The logging provider or logging service that logged the event. For example, Microsoft-Windows-Security-Auditing.

findings[].​metadata.​log_versionstring or null

The event log schema version that specifies the format of the original event. For example syslog version or Cisco Log Schema Version.

findings[].​metadata.​logged_timeinteger(ocsfv1.3.0securityfindingTimestamp)

The timestamp format is the number of milliseconds since the Epoch 01/01/1970 00:00:00 UTC. For example 1618524549901.

findings[].​metadata.​logged_time_dtstring or null(date-time)

The time when the logging system collected and logged the event.

This attribute is distinct from the event time in that event time typically contain the time extracted from the original event. Most of the time, these two times will be different.
findings[].​metadata.​loggersArray of objects or null(ocsfv1.3.0securityfindingLogger)

An array of Logger objects that describe the devices and logging products between the event source and its eventual destination. Note, this attribute can be used when there is a complex end-to-end path of event flow.

findings[].​metadata.​modified_timeinteger(ocsfv1.3.0securityfindingTimestamp)

The timestamp format is the number of milliseconds since the Epoch 01/01/1970 00:00:00 UTC. For example 1618524549901.

findings[].​metadata.​modified_time_dtstring or null(date-time)

The time when the event was last modified or enriched.

findings[].​metadata.​original_timestring or null

The original event time as reported by the event source. For example, the time in the original format from system event log such as Syslog on Unix/Linux and the System event file on Windows. Omit if event is generated instead of collected via logs.

findings[].​metadata.​processed_timeinteger(ocsfv1.3.0securityfindingTimestamp)

The timestamp format is the number of milliseconds since the Epoch 01/01/1970 00:00:00 UTC. For example 1618524549901.

findings[].​metadata.​processed_time_dtstring or null(date-time)

The event processed time, such as an ETL operation.

findings[].​metadata.​profilesArray of strings or null

The list of profiles used to create the event. Profiles should be referenced by their name attribute for core profiles, or extension/name for profiles from extensions.

findings[].​metadata.​sequenceinteger or null

Sequence number of the event. The sequence number is a value available in some events, to make the exact ordering of events unambiguous, regardless of the event time precision.

findings[].​metadata.​tenant_uidstring or null

The unique tenant identifier.

findings[].​metadata.​uidstring or null

The logging system-assigned unique identifier of an event instance.

findings[].​severity_idinteger(ocsfv1.3.0securityfindingSeverityId)required

SeverityId is an enum, and the following values are allowed. 0 - Unknown: The event/finding severity is unknown. 1 - Informational: Informational message. No action required. 2 - Low: The user decides if action is needed. 3 - Medium: Action is required but the situation is not serious at this time. 4 - High: Action is required immediately. 5 - Critical: Action is required immediately and the scope is broad. 6 - Fatal: An error occurred but it is too late to take remedial action. 99 - Other: The event/finding severity is not mapped. See the severity attribute, which contains a data source specific value.

findings[].​state_idinteger(ocsfv1.3.0securityfindingStateId)required

StateId is an enum, and the following values are allowed. 0 - Unknown: The state is unknown. 1 - New: The finding is new and yet to be reviewed. 2 - InProgress: The finding is under review. 3 - Suppressed: The finding was reviewed, considered as a false positive and is now suppressed. 4 - Resolved: The finding was reviewed and remediated and is now considered resolved. 99 - Other: The state is not mapped. See the state attribute, which contains a data source specific value.

findings[].​timeinteger(ocsfv1.3.0securityfindingTimestamp)required

The timestamp format is the number of milliseconds since the Epoch 01/01/1970 00:00:00 UTC. For example 1618524549901.

findings[].​type_uidinteger(ocsfv1.3.0securityfindingTypeUid)required

TypeUid is an enum, and the following values are allowed. 200100 - Unknown 200101 - Create: A security finding was created. 200102 - Update: A security finding was updated. 200103 - Close: A security finding was closed. 200199 - Other

findings[].​activity_namestring or null

The event activity name, as defined by the activity_id.

findings[].​analyticobject(ocsfv1.3.0securityfindingAnalytic)

The Analytic object contains details about the analytic technique used to analyze and derive insights from the data or information that led to the creation of a finding or conclusion.

findings[].​apiobject(ocsfv1.3.0securityfindingApi)

The API, or Application Programming Interface, object represents information pertaining to an API request and response.

findings[].​attacksArray of objects or null(ocsfv1.3.0securityfindingAttack)

The attack object describes the technique and associated tactics as defined by ATT&CK MatrixTM.

findings[].​category_namestring or null

The event category name, as defined by category_uid value: Findings.

findings[].​cis_cscArray of objects or null(ocsfv1.3.0securityfindingCisCsc)

The CIS Critical Security Controls is a list of top 20 actions and practices an organization’s security team can take on such that cyber attacks or malware, are minimized and prevented.

findings[].​cloudobject(ocsfv1.3.0securityfindingCloud)

The Cloud object contains information about a cloud account such as AWS Account ID, regions, etc.

findings[].​complianceobject(ocsfv1.3.0securityfindingCompliance)

The Compliance object contains information about Industry and Regulatory Framework standards, controls and requirements.

findings[].​confidencestring or null

The confidence, normalized to the caption of the confidence_id value. In the case of 'Other', it is defined by the event source.

findings[].​confidence_idinteger(ocsfv1.3.0securityfindingConfidenceId)

ConfidenceId is an enum, and the following values are allowed. 0 - Unknown: The normalized confidence is unknown. 1 - Low 2 - Medium 3 - High 99 - Other: The confidence is not mapped to the defined enum values. See the confidence attribute, which contains a data source specific value.

findings[].​confidence_scoreinteger or null

The confidence score as reported by the event source.

findings[].​countinteger or null

The number of times that events in the same logical group occurred during the event Start Time to End Time period.

findings[].​custom_fieldsobject(ocsfv1.3.0securityfindingObject)

An unordered collection of attributes. It defines a set of attributes available in all objects. It can be also used as a generic object to log objects that are not otherwise defined by the schema.

findings[].​data_sourcesArray of strings or null

A list of data sources utilized in generation of the finding.

findings[].​durationinteger or null

The event duration or aggregate time, the amount of time the event covers from start_time to end_time in milliseconds.

findings[].​end_timeinteger(ocsfv1.3.0securityfindingTimestamp)

The timestamp format is the number of milliseconds since the Epoch 01/01/1970 00:00:00 UTC. For example 1618524549901.

findings[].​end_time_dtstring or null(date-time)

The end time of a time period, or the time of the most recent event included in the aggregate event.

findings[].​enrichmentsArray of objects or null(ocsfv1.3.0securityfindingEnrichment)

The additional information from an external data source, which is associated with the event or a finding. For example add location information for the IP address in the DNS answers:

[{"name": "answers.ip", "value": "92.24.47.250", "type": "location", "data": {"city": "Socotra", "continent": "Asia", "coordinates": [-25.4153, 17.0743], "country": "YE", "desc": "Yemen"}}]

findings[].​evidenceany or null

The data the finding exposes to the analyst.

findings[].​impactstring or null

The impact , normalized to the caption of the impact_id value. In the case of 'Other', it is defined by the event source.

findings[].​impact_idinteger(ocsfv1.3.0securityfindingImpactId)

ImpactId is an enum, and the following values are allowed. 0 - Unknown: The normalized impact is unknown. 1 - Low 2 - Medium 3 - High 4 - Critical 99 - Other: The impact is not mapped. See the impact attribute, which contains a data source specific value.

findings[].​impact_scoreinteger or null

The impact of the finding, valid range 0-100.

findings[].​kill_chainArray of objects or null(ocsfv1.3.0securityfindingKillChainPhase)

The Cyber Kill Chain® provides a detailed description of each phase and its associated activities within the broader context of a cyber attack.

findings[].​malwareArray of objects or null(ocsfv1.3.0securityfindingMalware)

A list of Malware objects, describing details about the identified malware.

findings[].​messagestring or null

The description of the event/finding, as defined by the source.

findings[].​nistArray of strings or null

The NIST Cybersecurity Framework recommendations for managing the cybersecurity risk.

findings[].​observablesArray of objects or null(ocsfv1.3.0securityfindingObservable)

The observables associated with the event or a finding.

findings[].​osintArray of objects or null(ocsfv1.3.0securityfindingOsint)

The OSINT (Open Source Intelligence) object contains details related to an indicator such as the indicator itself, related indicators, geolocation, registrar information, subdomains, analyst commentary, and other contextual information. This information can be used to further enrich a detection or finding by providing decisioning support to other analysts and engineers.

findings[].​processobject(ocsfv1.3.0securityfindingProcess)

The Process object describes a running instance of a launched program. Defined by D3FEND d3f:Process.

findings[].​raw_datastring or null

The raw event/finding data as received from the source.

findings[].​resourcesArray of objects or null(ocsfv1.3.0securityfindingResourceDetails)

Describes details about resources that were affected by the activity/event.

findings[].​risk_levelstring or null

The risk level, normalized to the caption of the risk_level_id value.

findings[].​risk_level_idinteger(ocsfv1.3.0securityfindingRiskLevelId)

RiskLevelId is an enum, and the following values are allowed. 0 - Info 1 - Low 2 - Medium 3 - High 4 - Critical 99 - Other: The risk level is not mapped. See the risk_level attribute, which contains a data source specific value.

findings[].​risk_scoreinteger or null

The risk score as reported by the event source.

findings[].​severitystring or null

The event/finding severity, normalized to the caption of the severity_id value. In the case of 'Other', it is defined by the source.

findings[].​start_timeinteger(ocsfv1.3.0securityfindingTimestamp)

The timestamp format is the number of milliseconds since the Epoch 01/01/1970 00:00:00 UTC. For example 1618524549901.

findings[].​start_time_dtstring or null(date-time)

The start time of a time period, or the time of the least recent event included in the aggregate event.

findings[].​statestring or null

The normalized state of a security finding.

findings[].​statusstring or null

The event status, normalized to the caption of the status_id value. In the case of 'Other', it is defined by the event source.

findings[].​status_codestring or null

The event status code, as reported by the event source.

For example, in a Windows Failed Authentication event, this would be the value of 'Failure Code', e.g. 0x18.

findings[].​status_detailstring or null

The status detail contains additional information about the event/finding outcome.

findings[].​status_idinteger(ocsfv1.3.0securityfindingStatusId)

StatusId is an enum, and the following values are allowed. 0 - Unknown: The status is unknown. 1 - Success 2 - Failure 99 - Other: The event status is not mapped. See the status attribute, which contains a data source specific value.

findings[].​time_dtstring or null(date-time)

The normalized event occurrence time or the finding creation time.

findings[].​timezone_offsetinteger or null

The number of minutes that the reported event time is ahead or behind UTC, in the range -1,080 to +1,080.

findings[].​type_namestring or null

The event/finding type name, as defined by the type_uid.

findings[].​unmappedobject(ocsfv1.3.0securityfindingObject)

An unordered collection of attributes. It defines a set of attributes available in all objects. It can be also used as a generic object to log objects that are not otherwise defined by the schema.

findings[].​vulnerabilitiesArray of objects or null(ocsfv1.3.0securityfindingVulnerability)

This object describes vulnerabilities reported in a security finding.

curl -i -X POST \
  https://api.synqly.com/v1/vulnerabilities/findings/bulk \
  -H 'Authorization: Bearer <YOUR_TOKEN_HERE>' \
  -H 'Content-Type: application/json' \
  -d '{
    "findings": [
      {
        "activity_id": 0,
        "activity_name": "string",
        "analytic": {
          "category": "string",
          "desc": "string",
          "name": "string",
          "related_analytics": [
            {}
          ],
          "type": "string",
          "type_id": 0,
          "uid": "string",
          "version": "string"
        },
        "api": {
          "group": {
            "desc": "string",
            "domain": "string",
            "name": "string",
            "privileges": [
              "string"
            ],
            "type": "string",
            "uid": "string"
          },
          "operation": "string",
          "request": {
            "containers": [
              {
                "hash": {},
                "image": {
                  "labels": []
                },
                "name": "string",
                "network_driver": "string",
                "orchestrator": "string",
                "pod_uuid": "string",
                "runtime": "string",
                "size": 0,
                "tag": "string",
                "uid": "string"
              }
            ],
            "data": null,
            "flags": [
              "string"
            ],
            "uid": "string"
          },
          "response": {
            "code": 0,
            "containers": [
              {
                "hash": {},
                "image": {
                  "labels": []
                },
                "name": "string",
                "network_driver": "string",
                "orchestrator": "string",
                "pod_uuid": "string",
                "runtime": "string",
                "size": 0,
                "tag": "string",
                "uid": "string"
              }
            ],
            "data": null,
            "error": "string",
            "error_message": "string",
            "flags": [
              "string"
            ],
            "message": "string"
          },
          "service": {
            "labels": [
              "string"
            ],
            "name": "string",
            "uid": "string",
            "version": "string"
          },
          "version": "string"
        },
        "attacks": [
          {
            "sub_technique": {
              "name": "string",
              "src_url": "string",
              "uid": "string"
            },
            "tactic": {
              "name": "string",
              "src_url": "string",
              "uid": "string"
            },
            "tactics": [
              {
                "name": "string",
                "src_url": "string",
                "uid": "string"
              }
            ],
            "technique": {
              "name": "string",
              "src_url": "string",
              "uid": "string"
            },
            "version": "string"
          }
        ],
        "category_name": "string",
        "category_uid": 0,
        "cis_csc": [
          {
            "control": "string",
            "version": "string"
          }
        ],
        "class_uid": 0,
        "cloud": {
          "account": {
            "labels": [
              "string"
            ],
            "name": "string",
            "type": "string",
            "type_id": 0,
            "uid": "string"
          },
          "org": {
            "name": "string",
            "ou_name": "string",
            "ou_uid": "string",
            "uid": "string"
          },
          "project_uid": "string",
          "provider": "string",
          "region": "string",
          "zone": "string"
        },
        "compliance": {
          "compliance_references": [
            {
              "avg_timespan": {
                "duration": 0,
                "duration_days": 0,
                "duration_hours": 0,
                "duration_mins": 0,
                "duration_months": 0,
                "duration_secs": 0,
                "duration_weeks": 0,
                "duration_years": 0,
                "type": "string",
                "type_id": 0
              },
              "bulletin": "string",
              "classification": "string",
              "created_time": 0,
              "created_time_dt": "2019-08-24T14:15:22Z",
              "install_state": "string",
              "install_state_id": 0,
              "is_superseded": true,
              "os": {
                "build": "string",
                "country": "string",
                "cpe_name": "string",
                "cpu_bits": 0,
                "edition": "string",
                "lang": "string",
                "name": "string",
                "sp_name": "string",
                "sp_ver": 0,
                "type": "string",
                "type_id": 0,
                "version": "string"
              },
              "product": {
                "cpe_name": "string",
                "feature": {},
                "lang": "string",
                "name": "string",
                "path": "string",
                "uid": "string",
                "url_string": "string",
                "vendor_name": "string",
                "version": "string"
              },
              "severity": "string",
              "size": 0,
              "src_url": "string",
              "title": "string",
              "uid": "string"
            }
          ],
          "compliance_standards": [
            {
              "avg_timespan": {
                "duration": 0,
                "duration_days": 0,
                "duration_hours": 0,
                "duration_mins": 0,
                "duration_months": 0,
                "duration_secs": 0,
                "duration_weeks": 0,
                "duration_years": 0,
                "type": "string",
                "type_id": 0
              },
              "bulletin": "string",
              "classification": "string",
              "created_time": 0,
              "created_time_dt": "2019-08-24T14:15:22Z",
              "install_state": "string",
              "install_state_id": 0,
              "is_superseded": true,
              "os": {
                "build": "string",
                "country": "string",
                "cpe_name": "string",
                "cpu_bits": 0,
                "edition": "string",
                "lang": "string",
                "name": "string",
                "sp_name": "string",
                "sp_ver": 0,
                "type": "string",
                "type_id": 0,
                "version": "string"
              },
              "product": {
                "cpe_name": "string",
                "feature": {},
                "lang": "string",
                "name": "string",
                "path": "string",
                "uid": "string",
                "url_string": "string",
                "vendor_name": "string",
                "version": "string"
              },
              "severity": "string",
              "size": 0,
              "src_url": "string",
              "title": "string",
              "uid": "string"
            }
          ],
          "control": "string",
          "requirements": [
            "string"
          ],
          "standards": [
            "string"
          ],
          "status": "string",
          "status_code": "string",
          "status_detail": "string",
          "status_id": 0
        },
        "confidence": "string",
        "confidence_id": 0,
        "confidence_score": 0,
        "count": 0,
        "custom_fields": {},
        "data_sources": [
          "string"
        ],
        "duration": 0,
        "end_time": 0,
        "end_time_dt": "2019-08-24T14:15:22Z",
        "enrichments": [
          {
            "created_time": 0,
            "created_time_dt": "2019-08-24T14:15:22Z",
            "data": null,
            "desc": "string",
            "name": "string",
            "provider": "string",
            "reputation": {
              "base_score": 0.1,
              "provider": "string",
              "score": "string",
              "score_id": 0
            },
            "short_desc": "string",
            "src_url": "string",
            "type": "string",
            "value": "string"
          }
        ],
        "evidence": null,
        "finding": {
          "created_time": 0,
          "created_time_dt": "2019-08-24T14:15:22Z",
          "desc": "string",
          "first_seen_time": 0,
          "first_seen_time_dt": "2019-08-24T14:15:22Z",
          "last_seen_time": 0,
          "last_seen_time_dt": "2019-08-24T14:15:22Z",
          "modified_time": 0,
          "modified_time_dt": "2019-08-24T14:15:22Z",
          "product_uid": "string",
          "related_events": [
            {
              "attacks": [
                {
                  "tactics": []
                }
              ],
              "kill_chain": [
                {}
              ],
              "observables": [
                {}
              ],
              "product_uid": "string",
              "type": "string",
              "type_name": "string",
              "type_uid": 0,
              "uid": "string"
            }
          ],
          "remediation": {
            "desc": "string",
            "kb_article_list": [
              {
                "avg_timespan": {},
                "bulletin": "string",
                "classification": "string",
                "created_time": 0,
                "created_time_dt": "2019-08-24T14:15:22Z",
                "install_state": "string",
                "install_state_id": 0,
                "is_superseded": true,
                "os": {},
                "product": {},
                "severity": "string",
                "size": 0,
                "src_url": "string",
                "title": "string",
                "uid": "string"
              }
            ],
            "kb_articles": [
              "string"
            ],
            "references": [
              "string"
            ]
          },
          "src_url": "string",
          "supporting_data": null,
          "title": "string",
          "types": [
            "string"
          ],
          "uid": "string"
        },
        "impact": "string",
        "impact_id": 0,
        "impact_score": 0,
        "kill_chain": [
          {
            "phase": "string",
            "phase_id": 0
          }
        ],
        "malware": [
          {
            "classification_ids": [
              0
            ],
            "classifications": [
              "string"
            ],
            "cves": [
              {
                "created_time": 0,
                "created_time_dt": "2019-08-24T14:15:22Z",
                "cvss": [
                  null
                ],
                "cwe": {},
                "cwe_uid": "string",
                "cwe_url": "string",
                "desc": "string",
                "epss": {},
                "modified_time": 0,
                "modified_time_dt": "2019-08-24T14:15:22Z",
                "product": {},
                "references": [
                  null
                ],
                "title": "string",
                "type": "string",
                "uid": "string"
              }
            ],
            "name": "string",
            "path": "string",
            "provider": "string",
            "uid": "string"
          }
        ],
        "message": "string",
        "metadata": {
          "correlation_uid": "string",
          "event_code": "string",
          "extension": {
            "name": "string",
            "uid": "string",
            "version": "string"
          },
          "extensions": [
            {
              "name": "string",
              "uid": "string",
              "version": "string"
            }
          ],
          "labels": [
            "string"
          ],
          "log_level": "string",
          "log_name": "string",
          "log_provider": "string",
          "log_version": "string",
          "logged_time": 0,
          "logged_time_dt": "2019-08-24T14:15:22Z",
          "loggers": [
            {
              "device": {
                "agent_list": [
                  null
                ],
                "autoscale_uid": "string",
                "boot_time": 0,
                "boot_time_dt": "2019-08-24T14:15:22Z",
                "container": {},
                "created_time": 0,
                "created_time_dt": "2019-08-24T14:15:22Z",
                "desc": "string",
                "domain": "string",
                "first_seen_time": 0,
                "first_seen_time_dt": "2019-08-24T14:15:22Z",
                "groups": [
                  null
                ],
                "hostname": "string",
                "hw_info": {},
                "hypervisor": "string",
                "image": {
                  "labels": []
                },
                "imei": "string",
                "instance_uid": "string",
                "interface_name": "string",
                "interface_uid": "string",
                "ip": "string",
                "ip_addresses": [
                  null
                ],
                "is_compliant": true,
                "is_managed": true,
                "is_personal": true,
                "is_trusted": true,
                "last_seen_time": 0,
                "last_seen_time_dt": "2019-08-24T14:15:22Z",
                "location": {
                  "coordinates": []
                },
                "mac": "string",
                "mac_addresses": [
                  null
                ],
                "modified_time": 0,
                "modified_time_dt": "2019-08-24T14:15:22Z",
                "name": "string",
                "namespace_pid": 0,
                "netbios_names": [
                  null
                ],
                "network_interfaces": [
                  null
                ],
                "network_status": "string",
                "network_status_id": 0,
                "org": {},
                "os": {},
                "owner": {
                  "groups": [],
                  "privileges": []
                },
                "region": "string",
                "risk_level": "string",
                "risk_level_id": 0,
                "risk_score": 0,
                "subnet": "string",
                "subnet_uid": "string",
                "sw_info": [
                  null
                ],
                "type": "string",
                "type_id": 0,
                "uid": "string",
                "uid_alt": "string",
                "vendor": {},
                "vlan_uid": "string",
                "vpc_uid": "string",
                "zone": "string"
              },
              "log_level": "string",
              "log_name": "string",
              "log_provider": "string",
              "log_version": "string",
              "logged_time": 0,
              "logged_time_dt": "2019-08-24T14:15:22Z",
              "name": "string",
              "product": {
                "cpe_name": "string",
                "feature": {},
                "lang": "string",
                "name": "string",
                "path": "string",
                "uid": "string",
                "url_string": "string",
                "vendor_name": "string",
                "version": "string"
              },
              "transmit_time": 0,
              "transmit_time_dt": "2019-08-24T14:15:22Z",
              "uid": "string",
              "version": "string"
            }
          ],
          "modified_time": 0,
          "modified_time_dt": "2019-08-24T14:15:22Z",
          "original_time": "string",
          "processed_time": 0,
          "processed_time_dt": "2019-08-24T14:15:22Z",
          "product": {
            "cpe_name": "string",
            "feature": {
              "name": "string",
              "uid": "string",
              "version": "string"
            },
            "lang": "string",
            "name": "string",
            "path": "string",
            "uid": "string",
            "url_string": "string",
            "vendor_name": "string",
            "version": "string"
          },
          "profiles": [
            "string"
          ],
          "sequence": 0,
          "tenant_uid": "string",
          "uid": "string",
          "version": "string"
        },
        "nist": [
          "string"
        ],
        "observables": [
          {
            "name": "string",
            "reputation": {
              "base_score": 0.1,
              "provider": "string",
              "score": "string",
              "score_id": 0
            },
            "type": "string",
            "type_id": 0,
            "value": "string"
          }
        ],
        "osint": [
          {
            "answers": [
              {
                "class": "string",
                "flag_ids": [
                  null
                ],
                "flags": [
                  null
                ],
                "packet_uid": 0,
                "rdata": "string",
                "ttl": 0,
                "type": "string"
              }
            ],
            "attacks": [
              {
                "sub_technique": {},
                "tactic": {},
                "tactics": [
                  null
                ],
                "technique": {},
                "version": "string"
              }
            ],
            "autonomous_system": {
              "name": "string",
              "number": 0
            },
            "comment": "string",
            "confidence": "string",
            "confidence_id": 0,
            "email": {
              "cc": [
                "string"
              ],
              "delivered_to": "string",
              "from": "string",
              "message_uid": "string",
              "raw_header": "string",
              "reply_to": "string",
              "size": 0,
              "smtp_from": "string",
              "smtp_to": [
                "string"
              ],
              "subject": "string",
              "to": [
                "string"
              ],
              "uid": "string",
              "x_originating_ip": [
                "string"
              ]
            },
            "email_auth": {
              "dkim": "string",
              "dkim_domain": "string",
              "dkim_signature": "string",
              "dmarc": "string",
              "dmarc_override": "string",
              "dmarc_policy": "string",
              "spf": "string"
            },
            "kill_chain": [
              {
                "phase": "string",
                "phase_id": 0
              }
            ],
            "location": {
              "city": "string",
              "continent": "string",
              "coordinates": [
                0.1
              ],
              "country": "string",
              "desc": "string",
              "geohash": "string",
              "is_on_premises": true,
              "isp": "string",
              "lat": 0.1,
              "long": 0.1,
              "postal_code": "string",
              "provider": "string",
              "region": "string"
            },
            "name": "string",
            "signatures": [
              {
                "algorithm": "string",
                "algorithm_id": 0,
                "certificate": {
                  "fingerprints": []
                },
                "created_time": 0,
                "created_time_dt": "2019-08-24T14:15:22Z",
                "developer_uid": "string",
                "digest": {},
                "state": "string",
                "state_id": 0
              }
            ],
            "src_url": "string",
            "subdomains": [
              "string"
            ],
            "tlp": "string",
            "type": "string",
            "type_id": 0,
            "uid": "string",
            "value": "string",
            "vendor_name": "string",
            "vulnerabilities": [
              {
                "affected_code": [
                  null
                ],
                "affected_packages": [
                  null
                ],
                "cve": {
                  "cvss": [],
                  "references": []
                },
                "cwe": {},
                "desc": "string",
                "first_seen_time": 0,
                "first_seen_time_dt": "2019-08-24T14:15:22Z",
                "fix_available": true,
                "is_exploit_available": true,
                "is_fix_available": true,
                "kb_article_list": [
                  null
                ],
                "kb_articles": [
                  null
                ],
                "last_seen_time": 0,
                "last_seen_time_dt": "2019-08-24T14:15:22Z",
                "packages": [
                  null
                ],
                "references": [
                  null
                ],
                "related_vulnerabilities": [
                  null
                ],
                "remediation": {
                  "kb_article_list": [],
                  "kb_articles": [],
                  "references": []
                },
                "severity": "string",
                "title": "string",
                "vendor_name": "string"
              }
            ],
            "whois": {
              "autonomous_system": {
                "name": "string",
                "number": 0
              },
              "created_time": 0,
              "created_time_dt": "2019-08-24T14:15:22Z",
              "dnssec_status": "string",
              "dnssec_status_id": 0,
              "domain": "string",
              "domain_contacts": [
                {}
              ],
              "email_addr": "string",
              "last_seen_time": 0,
              "last_seen_time_dt": "2019-08-24T14:15:22Z",
              "name_servers": [
                "string"
              ],
              "phone_number": "string",
              "registrar": "string",
              "status": "string",
              "subdomains": [
                "string"
              ],
              "subnet": "string"
            }
          }
        ],
        "process": {
          "auid": 0,
          "cmd_line": "string",
          "container": {
            "hash": {
              "algorithm": "string",
              "algorithm_id": 0,
              "value": "string"
            },
            "image": {
              "labels": [
                "string"
              ],
              "name": "string",
              "path": "string",
              "tag": "string",
              "uid": "string"
            },
            "name": "string",
            "network_driver": "string",
            "orchestrator": "string",
            "pod_uuid": "string",
            "runtime": "string",
            "size": 0,
            "tag": "string",
            "uid": "string"
          },
          "created_time": 0,
          "created_time_dt": "2019-08-24T14:15:22Z",
          "egid": 0,
          "euid": 0,
          "file": {
            "accessed_time": 0,
            "accessed_time_dt": "2019-08-24T14:15:22Z",
            "accessor": {
              "account": {
                "labels": [
                  null
                ],
                "name": "string",
                "type": "string",
                "type_id": 0,
                "uid": "string"
              },
              "credential_uid": "string",
              "domain": "string",
              "email_addr": "string",
              "full_name": "string",
              "groups": [
                {
                  "privileges": []
                }
              ],
              "ldap_person": {
                "cost_center": "string",
                "created_time": 0,
                "created_time_dt": "2019-08-24T14:15:22Z",
                "deleted_time": 0,
                "deleted_time_dt": "2019-08-24T14:15:22Z",
                "email_addrs": [
                  null
                ],
                "employee_uid": "string",
                "given_name": "string",
                "hire_time": 0,
                "hire_time_dt": "2019-08-24T14:15:22Z",
                "job_title": "string",
                "labels": [
                  null
                ],
                "last_login_time": 0,
                "last_login_time_dt": "2019-08-24T14:15:22Z",
                "ldap_cn": "string",
                "ldap_dn": "string",
                "leave_time": 0,
                "leave_time_dt": "2019-08-24T14:15:22Z",
                "location": {
                  "coordinates": []
                },
                "manager": {},
                "modified_time": 0,
                "modified_time_dt": "2019-08-24T14:15:22Z",
                "office_location": "string",
                "surname": "string"
              },
              "mfa_status": "string",
              "mfa_status_id": 0,
              "name": "string",
              "org": {
                "name": "string",
                "ou_name": "string",
                "ou_uid": "string",
                "uid": "string"
              },
              "privileges": [
                "string"
              ],
              "risk_level": "string",
              "risk_level_id": 0,
              "risk_score": 0,
              "type": "string",
              "type_id": 0,
              "uid": "string",
              "uid_alt": "string",
              "user_status": "string",
              "user_status_id": 0
            },
            "attributes": 0,
            "company_name": "string",
            "confidentiality": "string",
            "confidentiality_id": 0,
            "created_time": 0,
            "created_time_dt": "2019-08-24T14:15:22Z",
            "creator": {
              "account": {
                "labels": [
                  null
                ],
                "name": "string",
                "type": "string",
                "type_id": 0,
                "uid": "string"
              },
              "credential_uid": "string",
              "domain": "string",
              "email_addr": "string",
              "full_name": "string",
              "groups": [
                {
                  "privileges": []
                }
              ],
              "ldap_person": {
                "cost_center": "string",
                "created_time": 0,
                "created_time_dt": "2019-08-24T14:15:22Z",
                "deleted_time": 0,
                "deleted_time_dt": "2019-08-24T14:15:22Z",
                "email_addrs": [
                  null
                ],
                "employee_uid": "string",
                "given_name": "string",
                "hire_time": 0,
                "hire_time_dt": "2019-08-24T14:15:22Z",
                "job_title": "string",
                "labels": [
                  null
                ],
                "last_login_time": 0,
                "last_login_time_dt": "2019-08-24T14:15:22Z",
                "ldap_cn": "string",
                "ldap_dn": "string",
                "leave_time": 0,
                "leave_time_dt": "2019-08-24T14:15:22Z",
                "location": {
                  "coordinates": []
                },
                "manager": {},
                "modified_time": 0,
                "modified_time_dt": "2019-08-24T14:15:22Z",
                "office_location": "string",
                "surname": "string"
              },
              "mfa_status": "string",
              "mfa_status_id": 0,
              "name": "string",
              "org": {
                "name": "string",
                "ou_name": "string",
                "ou_uid": "string",
                "uid": "string"
              },
              "privileges": [
                "string"
              ],
              "risk_level": "string",
              "risk_level_id": 0,
              "risk_score": 0,
              "type": "string",
              "type_id": 0,
              "uid": "string",
              "uid_alt": "string",
              "user_status": "string",
              "user_status_id": 0
            },
            "desc": "string",
            "ext": "string",
            "hashes": [
              {
                "algorithm": "string",
                "algorithm_id": 0,
                "value": "string"
              }
            ],
            "is_system": true,
            "mime_type": "string",
            "modified_time": 0,
            "modified_time_dt": "2019-08-24T14:15:22Z",
            "modifier": {
              "account": {
                "labels": [
                  null
                ],
                "name": "string",
                "type": "string",
                "type_id": 0,
                "uid": "string"
              },
              "credential_uid": "string",
              "domain": "string",
              "email_addr": "string",
              "full_name": "string",
              "groups": [
                {
                  "privileges": []
                }
              ],
              "ldap_person": {
                "cost_center": "string",
                "created_time": 0,
                "created_time_dt": "2019-08-24T14:15:22Z",
                "deleted_time": 0,
                "deleted_time_dt": "2019-08-24T14:15:22Z",
                "email_addrs": [
                  null
                ],
                "employee_uid": "string",
                "given_name": "string",
                "hire_time": 0,
                "hire_time_dt": "2019-08-24T14:15:22Z",
                "job_title": "string",
                "labels": [
                  null
                ],
                "last_login_time": 0,
                "last_login_time_dt": "2019-08-24T14:15:22Z",
                "ldap_cn": "string",
                "ldap_dn": "string",
                "leave_time": 0,
                "leave_time_dt": "2019-08-24T14:15:22Z",
                "location": {
                  "coordinates": []
                },
                "manager": {},
                "modified_time": 0,
                "modified_time_dt": "2019-08-24T14:15:22Z",
                "office_location": "string",
                "surname": "string"
              },
              "mfa_status": "string",
              "mfa_status_id": 0,
              "name": "string",
              "org": {
                "name": "string",
                "ou_name": "string",
                "ou_uid": "string",
                "uid": "string"
              },
              "privileges": [
                "string"
              ],
              "risk_level": "string",
              "risk_level_id": 0,
              "risk_score": 0,
              "type": "string",
              "type_id": 0,
              "uid": "string",
              "uid_alt": "string",
              "user_status": "string",
              "user_status_id": 0
            },
            "name": "string",
            "owner": {
              "account": {
                "labels": [
                  null
                ],
                "name": "string",
                "type": "string",
                "type_id": 0,
                "uid": "string"
              },
              "credential_uid": "string",
              "domain": "string",
              "email_addr": "string",
              "full_name": "string",
              "groups": [
                {
                  "privileges": []
                }
              ],
              "ldap_person": {
                "cost_center": "string",
                "created_time": 0,
                "created_time_dt": "2019-08-24T14:15:22Z",
                "deleted_time": 0,
                "deleted_time_dt": "2019-08-24T14:15:22Z",
                "email_addrs": [
                  null
                ],
                "employee_uid": "string",
                "given_name": "string",
                "hire_time": 0,
                "hire_time_dt": "2019-08-24T14:15:22Z",
                "job_title": "string",
                "labels": [
                  null
                ],
                "last_login_time": 0,
                "last_login_time_dt": "2019-08-24T14:15:22Z",
                "ldap_cn": "string",
                "ldap_dn": "string",
                "leave_time": 0,
                "leave_time_dt": "2019-08-24T14:15:22Z",
                "location": {
                  "coordinates": []
                },
                "manager": {},
                "modified_time": 0,
                "modified_time_dt": "2019-08-24T14:15:22Z",
                "office_location": "string",
                "surname": "string"
              },
              "mfa_status": "string",
              "mfa_status_id": 0,
              "name": "string",
              "org": {
                "name": "string",
                "ou_name": "string",
                "ou_uid": "string",
                "uid": "string"
              },
              "privileges": [
                "string"
              ],
              "risk_level": "string",
              "risk_level_id": 0,
              "risk_score": 0,
              "type": "string",
              "type_id": 0,
              "uid": "string",
              "uid_alt": "string",
              "user_status": "string",
              "user_status_id": 0
            },
            "parent_folder": "string",
            "path": "string",
            "product": {
              "cpe_name": "string",
              "feature": {
                "name": "string",
                "uid": "string",
                "version": "string"
              },
              "lang": "string",
              "name": "string",
              "path": "string",
              "uid": "string",
              "url_string": "string",
              "vendor_name": "string",
              "version": "string"
            },
            "security_descriptor": "string",
            "signature": {
              "algorithm": "string",
              "algorithm_id": 0,
              "certificate": {
                "created_time": 0,
                "created_time_dt": "2019-08-24T14:15:22Z",
                "expiration_time": 0,
                "expiration_time_dt": "2019-08-24T14:15:22Z",
                "fingerprints": [
                  null
                ],
                "is_self_signed": true,
                "issuer": "string",
                "serial_number": "string",
                "subject": "string",
                "uid": "string",
                "version": "string"
              },
              "created_time": 0,
              "created_time_dt": "2019-08-24T14:15:22Z",
              "developer_uid": "string",
              "digest": {
                "algorithm": "string",
                "algorithm_id": 0,
                "value": "string"
              },
              "state": "string",
              "state_id": 0
            },
            "size": 0,
            "type": "string",
            "type_id": 0,
            "uid": "string",
            "version": "string",
            "xattributes": {}
          },
          "group": {
            "desc": "string",
            "domain": "string",
            "name": "string",
            "privileges": [
              "string"
            ],
            "type": "string",
            "uid": "string"
          },
          "integrity": "string",
          "integrity_id": 0,
          "lineage": [
            "string"
          ],
          "loaded_modules": [
            "string"
          ],
          "name": "string",
          "namespace_pid": 0,
          "parent_process": {},
          "pid": 0,
          "sandbox": "string",
          "session": {
            "count": 0,
            "created_time": 0,
            "created_time_dt": "2019-08-24T14:15:22Z",
            "credential_uid": "string",
            "expiration_reason": "string",
            "expiration_time": 0,
            "expiration_time_dt": "2019-08-24T14:15:22Z",
            "is_mfa": true,
            "is_remote": true,
            "is_vpn": true,
            "issuer": "string",
            "terminal": "string",
            "uid": "string",
            "uid_alt": "string",
            "uuid": "string"
          },
          "terminated_time": 0,
          "terminated_time_dt": "2019-08-24T14:15:22Z",
          "tid": 0,
          "uid": "string",
          "user": {
            "account": {
              "labels": [
                "string"
              ],
              "name": "string",
              "type": "string",
              "type_id": 0,
              "uid": "string"
            },
            "credential_uid": "string",
            "domain": "string",
            "email_addr": "string",
            "full_name": "string",
            "groups": [
              {
                "desc": "string",
                "domain": "string",
                "name": "string",
                "privileges": [
                  null
                ],
                "type": "string",
                "uid": "string"
              }
            ],
            "ldap_person": {
              "cost_center": "string",
              "created_time": 0,
              "created_time_dt": "2019-08-24T14:15:22Z",
              "deleted_time": 0,
              "deleted_time_dt": "2019-08-24T14:15:22Z",
              "email_addrs": [
                "string"
              ],
              "employee_uid": "string",
              "given_name": "string",
              "hire_time": 0,
              "hire_time_dt": "2019-08-24T14:15:22Z",
              "job_title": "string",
              "labels": [
                "string"
              ],
              "last_login_time": 0,
              "last_login_time_dt": "2019-08-24T14:15:22Z",
              "ldap_cn": "string",
              "ldap_dn": "string",
              "leave_time": 0,
              "leave_time_dt": "2019-08-24T14:15:22Z",
              "location": {
                "city": "string",
                "continent": "string",
                "coordinates": [
                  null
                ],
                "country": "string",
                "desc": "string",
                "geohash": "string",
                "is_on_premises": true,
                "isp": "string",
                "lat": 0.1,
                "long": 0.1,
                "postal_code": "string",
                "provider": "string",
                "region": "string"
              },
              "manager": {},
              "modified_time": 0,
              "modified_time_dt": "2019-08-24T14:15:22Z",
              "office_location": "string",
              "surname": "string"
            },
            "mfa_status": "string",
            "mfa_status_id": 0,
            "name": "string",
            "org": {
              "name": "string",
              "ou_name": "string",
              "ou_uid": "string",
              "uid": "string"
            },
            "privileges": [
              "string"
            ],
            "risk_level": "string",
            "risk_level_id": 0,
            "risk_score": 0,
            "type": "string",
            "type_id": 0,
            "uid": "string",
            "uid_alt": "string",
            "user_status": "string",
            "user_status_id": 0
          },
          "xattributes": {}
        },
        "raw_data": "string",
        "resources": [
          {
            "agent_list": [
              {
                "name": "string",
                "type": "string",
                "type_id": 0,
                "uid": "string",
                "uid_alt": "string",
                "vendor_name": "string",
                "version": "string"
              }
            ],
            "cloud_partition": "string",
            "criticality": "string",
            "data": null,
            "group": {
              "desc": "string",
              "domain": "string",
              "name": "string",
              "privileges": [
                "string"
              ],
              "type": "string",
              "uid": "string"
            },
            "labels": [
              "string"
            ],
            "name": "string",
            "namespace": "string",
            "owner": {
              "account": {
                "labels": [
                  null
                ],
                "name": "string",
                "type": "string",
                "type_id": 0,
                "uid": "string"
              },
              "credential_uid": "string",
              "domain": "string",
              "email_addr": "string",
              "full_name": "string",
              "groups": [
                {
                  "privileges": []
                }
              ],
              "ldap_person": {
                "cost_center": "string",
                "created_time": 0,
                "created_time_dt": "2019-08-24T14:15:22Z",
                "deleted_time": 0,
                "deleted_time_dt": "2019-08-24T14:15:22Z",
                "email_addrs": [
                  null
                ],
                "employee_uid": "string",
                "given_name": "string",
                "hire_time": 0,
                "hire_time_dt": "2019-08-24T14:15:22Z",
                "job_title": "string",
                "labels": [
                  null
                ],
                "last_login_time": 0,
                "last_login_time_dt": "2019-08-24T14:15:22Z",
                "ldap_cn": "string",
                "ldap_dn": "string",
                "leave_time": 0,
                "leave_time_dt": "2019-08-24T14:15:22Z",
                "location": {
                  "coordinates": []
                },
                "manager": {},
                "modified_time": 0,
                "modified_time_dt": "2019-08-24T14:15:22Z",
                "office_location": "string",
                "surname": "string"
              },
              "mfa_status": "string",
              "mfa_status_id": 0,
              "name": "string",
              "org": {
                "name": "string",
                "ou_name": "string",
                "ou_uid": "string",
                "uid": "string"
              },
              "privileges": [
                "string"
              ],
              "risk_level": "string",
              "risk_level_id": 0,
              "risk_score": 0,
              "type": "string",
              "type_id": 0,
              "uid": "string",
              "uid_alt": "string",
              "user_status": "string",
              "user_status_id": 0
            },
            "region": "string",
            "type": "string",
            "uid": "string",
            "version": "string"
          }
        ],
        "risk_level": "string",
        "risk_level_id": 0,
        "risk_score": 0,
        "severity": "string",
        "severity_id": 0,
        "start_time": 0,
        "start_time_dt": "2019-08-24T14:15:22Z",
        "state": "string",
        "state_id": 0,
        "status": "string",
        "status_code": "string",
        "status_detail": "string",
        "status_id": 0,
        "time": 0,
        "time_dt": "2019-08-24T14:15:22Z",
        "timezone_offset": 0,
        "type_name": "string",
        "type_uid": 0,
        "unmapped": {},
        "vulnerabilities": [
          {
            "affected_code": [
              {
                "end_line": 0,
                "file": {
                  "hashes": []
                },
                "owner": {
                  "groups": [],
                  "privileges": []
                },
                "remediation": {
                  "kb_article_list": [],
                  "kb_articles": [],
                  "references": []
                },
                "start_line": 0
              }
            ],
            "affected_packages": [
              {
                "architecture": "string",
                "cpe_name": "string",
                "epoch": 0,
                "fixed_in_version": "string",
                "hash": {},
                "license": "string",
                "name": "string",
                "package_manager": "string",
                "path": "string",
                "purl": "string",
                "release": "string",
                "remediation": {
                  "kb_article_list": [],
                  "kb_articles": [],
                  "references": []
                },
                "type": "string",
                "type_id": 0,
                "vendor_name": "string",
                "version": "string"
              }
            ],
            "cve": {
              "created_time": 0,
              "created_time_dt": "2019-08-24T14:15:22Z",
              "cvss": [
                {
                  "metrics": []
                }
              ],
              "cwe": {
                "caption": "string",
                "src_url": "string",
                "uid": "string"
              },
              "cwe_uid": "string",
              "cwe_url": "string",
              "desc": "string",
              "epss": {
                "created_time": 0,
                "created_time_dt": "2019-08-24T14:15:22Z",
                "percentile": 0.1,
                "score": "string",
                "version": "string"
              },
              "modified_time": 0,
              "modified_time_dt": "2019-08-24T14:15:22Z",
              "product": {
                "cpe_name": "string",
                "feature": {},
                "lang": "string",
                "name": "string",
                "path": "string",
                "uid": "string",
                "url_string": "string",
                "vendor_name": "string",
                "version": "string"
              },
              "references": [
                "string"
              ],
              "title": "string",
              "type": "string",
              "uid": "string"
            },
            "cwe": {
              "caption": "string",
              "src_url": "string",
              "uid": "string"
            },
            "desc": "string",
            "first_seen_time": 0,
            "first_seen_time_dt": "2019-08-24T14:15:22Z",
            "fix_available": true,
            "is_exploit_available": true,
            "is_fix_available": true,
            "kb_article_list": [
              {
                "avg_timespan": {},
                "bulletin": "string",
                "classification": "string",
                "created_time": 0,
                "created_time_dt": "2019-08-24T14:15:22Z",
                "install_state": "string",
                "install_state_id": 0,
                "is_superseded": true,
                "os": {},
                "product": {},
                "severity": "string",
                "size": 0,
                "src_url": "string",
                "title": "string",
                "uid": "string"
              }
            ],
            "kb_articles": [
              "string"
            ],
            "last_seen_time": 0,
            "last_seen_time_dt": "2019-08-24T14:15:22Z",
            "packages": [
              {
                "architecture": "string",
                "cpe_name": "string",
                "epoch": 0,
                "hash": {},
                "license": "string",
                "name": "string",
                "purl": "string",
                "release": "string",
                "type": "string",
                "type_id": 0,
                "vendor_name": "string",
                "version": "string"
              }
            ],
            "references": [
              "string"
            ],
            "related_vulnerabilities": [
              "string"
            ],
            "remediation": {
              "desc": "string",
              "kb_article_list": [
                {}
              ],
              "kb_articles": [
                "string"
              ],
              "references": [
                "string"
              ]
            },
            "severity": "string",
            "title": "string",
            "vendor_name": "string"
          }
        ]
      }
    ]
  }'

Responses

Bodyapplication/json
statusstring(QueryStatus)required
Enum"PENDING""COMPLETE"
errorsArray of objects or null(CreateFindingsError)

Provides additional details about any errors encountered during the create/import operation.

metaobject(MetaResponse)
Response
application/json
{ "status": "PENDING", "errors": [ {} ], "meta": { "stats": {}, "api": {} } }

Update Finding

Request

update a finding in a vulnerability scanning system

Path
findingIdstringrequired

Uid of the Finding (URL encoded). This will be finding.uid in the OCSF model.

Bodyapplication/jsonrequired
severity_idinteger(ocsfv1.3.0securityfindingSeverityId)required

SeverityId is an enum, and the following values are allowed. 0 - Unknown: The event/finding severity is unknown. 1 - Informational: Informational message. No action required. 2 - Low: The user decides if action is needed. 3 - Medium: Action is required but the situation is not serious at this time. 4 - High: Action is required immediately. 5 - Critical: Action is required immediately and the scope is broad. 6 - Fatal: An error occurred but it is too late to take remedial action. 99 - Other: The event/finding severity is not mapped. See the severity attribute, which contains a data source specific value.

severitystring(VulnerabilitySeverityFilterValue)

Values supported by using severity as a filter. Supports [eq] and [in] operators. For example, severity[eq]critical or severity[in]critical, high.

Enum"critical""high""medium""low""info"
statestring(VulnerabilityStateFilterValue)

The normalized state identifier of a security finding

Enum"Unknown""New""InProgress""Resolved""Other"
unmappedNucleusFindingState (object)(ProviderSpecificFindingState)
One of:
curl -i -X PUT \
  'https://api.synqly.com/v1/vulnerabilities/findings/{findingId}' \
  -H 'Authorization: Bearer <YOUR_TOKEN_HERE>' \
  -H 'Content-Type: application/json' \
  -d '{
    "severity_id": 0,
    "severity": "critical",
    "state": "Unknown",
    "unmapped": {
      "type": "nucleus",
      "due_date": "2019-08-24T14:15:22Z",
      "comment": "string"
    }
  }'

Responses

Response
No content

Query Assets

Request

Query assets in a vulnerability scanning system

Query
metaArray of strings or null

Add metadata to the response by invoking meta functions. Documentation for meta functions is available at https://docs.synqly.com/api-reference/meta-functions. Not all meta function are available at every endpoint.

limitinteger or null

Number of assets to return. Defaults to 50.

cursorstring or null

Start search from cursor position.

filterArray of strings or null

Filter results by this query. For more information on filtering, refer to the Vulnerability Filtering Guide. Defaults to no filter. If used more than once, the queries are ANDed together.

curl -i -X GET \
  'https://api.synqly.com/v1/vulnerabilities/assets?cursor=string&filter=string&limit=0&meta=string' \
  -H 'Authorization: Bearer <YOUR_TOKEN_HERE>'

Responses

Bodyapplication/json
resultArray of objects(ocsfv1.3.0inventoryinfoInventoryInfo)required
result[].​activity_idinteger(ocsfv1.3.0inventoryinfoActivityId)required

ActivityId is an enum, and the following values are allowed. 0 - Unknown: The event activity is unknown. 1 - Log: The discovered information is via a log. 2 - Collect: The discovered information is via a collection process. 99 - Other: The event activity is not mapped. See the activity_name attribute, which contains a data source specific value.

result[].​category_uidinteger(ocsfv1.3.0inventoryinfoCategoryUid)required

CategoryUid is an enum, and the following values are allowed. 5 - Discovery: Discovery events report the existence and state of devices, files, configurations, processes, registry keys, and other objects.

result[].​class_uidinteger(ocsfv1.3.0inventoryinfoClassUid)required

ClassUid is an enum, and the following values are allowed. 5001 - DeviceInventoryInfo: Device Inventory Info events report device inventory data that is either logged or proactively collected. For example, when collecting device information from a CMDB or running a network sweep of connected devices.

result[].​deviceobject(ocsfv1.3.0inventoryinfoDevice)required

The Device object represents an addressable computer system or host, which is typically connected to a computer network and participates in the transmission or processing of data within the computer network. Defined by D3FEND d3f:Host.

result[].​device.​type_idinteger(ocsfv1.3.0inventoryinfoDevice_TypeId)required
result[].​device.​agent_listArray of objects or null(ocsfv1.3.0inventoryinfoAgent)

A list of agent objects associated with a device, endpoint, or resource.

result[].​device.​autoscale_uidstring or null

The unique identifier of the cloud autoscale configuration.

result[].​device.​boot_timeinteger(ocsfv1.3.0inventoryinfoTimestamp)

The timestamp format is the number of milliseconds since the Epoch 01/01/1970 00:00:00 UTC. For example 1618524549901.

result[].​device.​boot_time_dtstring or null(date-time)

The time the system was booted.

result[].​device.​containerobject(ocsfv1.3.0inventoryinfoContainer)

The Container object describes an instance of a specific container. A container is a prepackaged, portable system image that runs isolated on an existing system using a container runtime like containerd.

result[].​device.​created_timeinteger(ocsfv1.3.0inventoryinfoTimestamp)

The timestamp format is the number of milliseconds since the Epoch 01/01/1970 00:00:00 UTC. For example 1618524549901.

result[].​device.​created_time_dtstring or null(date-time)

The time when the device was known to have been created.

result[].​device.​descstring or null

The description of the device, ordinarily as reported by the operating system.

result[].​device.​domainstring or null

The network domain where the device resides. For example: work.example.com.

result[].​device.​first_seen_timeinteger(ocsfv1.3.0inventoryinfoTimestamp)

The timestamp format is the number of milliseconds since the Epoch 01/01/1970 00:00:00 UTC. For example 1618524549901.

result[].​device.​first_seen_time_dtstring or null(date-time)

The initial discovery time of the device.

result[].​device.​groupsArray of objects or null(ocsfv1.3.0inventoryinfoGroup)

The group names to which the device belongs. For example: ["Windows Laptops", "Engineering"].

result[].​device.​hostnamestring(ocsfv1.3.0inventoryinfoHostname)

Unique name assigned to a device connected to a computer network. A domain name in general is an Internet address that can be resolved through the Domain Name System (DNS). For example: r2-d2.example.com.

result[].​device.​hw_infoobject(ocsfv1.3.0inventoryinfoDeviceHwInfo)

The Device Hardware Information object contains details and specifications of the physical components that make up a device. This information provides an overview of the hardware capabilities, configuration, and characteristics of the device.

result[].​device.​hypervisorstring or null

The name of the hypervisor running on the device. For example, Xen, VMware, Hyper-V, VirtualBox, etc.

result[].​device.​imageobject(ocsfv1.3.0inventoryinfoImage)

The Image object provides a description of a specific Virtual Machine (VM) or Container image. Defined by D3FEND d3f:ContainerImage.

result[].​device.​imeistring or null

The International Mobile Station Equipment Identifier that is associated with the device.

result[].​device.​instance_uidstring or null

The unique identifier of a VM instance.

result[].​device.​interface_namestring or null

The name of the network interface (e.g. eth2).

result[].​device.​interface_uidstring or null

The unique identifier of the network interface.

result[].​device.​ipstring(ocsfv1.3.0inventoryinfoIPAddress)

Internet Protocol address (IP address), in either IPv4 or IPv6 format. For example, 192.168.200.24 or 2001:0db8:85a3:0000:0000:8a2e:0370:7334.

result[].​device.​ip_addressesArray of strings or null

A list of IP addresses available on the device

result[].​device.​is_compliantboolean or null

The event occurred on a compliant device.

result[].​device.​is_managedboolean or null

The event occurred on a managed device.

result[].​device.​is_personalboolean or null

The event occurred on a personal device.

result[].​device.​is_trustedboolean or null

The event occurred on a trusted device.

result[].​device.​last_seen_timeinteger(ocsfv1.3.0inventoryinfoTimestamp)

The timestamp format is the number of milliseconds since the Epoch 01/01/1970 00:00:00 UTC. For example 1618524549901.

result[].​device.​last_seen_time_dtstring or null(date-time)

The most recent discovery time of the device.

result[].​device.​locationobject(ocsfv1.3.0inventoryinfoLocation)

The Geo Location object describes a geographical location, usually associated with an IP address. Defined by D3FEND d3f:PhysicalLocation.

result[].​device.​macstring(ocsfv1.3.0inventoryinfoMACAddress)

Media Access Control (MAC) address. For example: 18:36:F3:98:4F:9A.

result[].​device.​mac_addressesArray of strings or null

A list of MAC addresses available on the device

result[].​device.​modified_timeinteger(ocsfv1.3.0inventoryinfoTimestamp)

The timestamp format is the number of milliseconds since the Epoch 01/01/1970 00:00:00 UTC. For example 1618524549901.

result[].​device.​modified_time_dtstring or null(date-time)

The time when the device was last known to have been modified.

result[].​device.​namestring or null

The alternate device name, ordinarily as assigned by an administrator.

Note: The Name could be any other string that helps to identify the device, such as a phone number; for example 310-555-1234.

result[].​device.​namespace_pidinteger or null

If running under a process namespace (such as in a container), the process identifier within that process namespace.

result[].​device.​netbios_namesArray of strings or null

A list of NetBIOS names available on the device

result[].​device.​network_interfacesArray of objects or null(ocsfv1.3.0inventoryinfoNetworkInterface)

The network interfaces that are associated with the device, one for each unique MAC address/IP address/hostname/name combination.

Note: The first element of the array is the network information that pertains to the event.

result[].​device.​network_statusstring or null

The network isolation status of the endpoiint

result[].​device.​network_status_idinteger(ocsfv1.3.0inventoryinfoDevice_NetworkStatusId)

DeviceNetworkStatusId is an enum, and the following values are allowed. 1 - NotIsolated: Device is not isolated from the network. 2 - Isolated: Device is isolated from the network. 99 - Unknown: The network isolation status is unknown.

result[].​device.​orgobject(ocsfv1.3.0inventoryinfoOrganization)

The Organization object describes characteristics of an organization or company and its division if any.

result[].​device.​osobject(ocsfv1.3.0inventoryinfoOs)

The Operating System (OS) object describes characteristics of an OS, such as Linux or Windows. Defined by D3FEND d3f:OperatingSystem.

result[].​device.​ownerobject(ocsfv1.3.0inventoryinfoUser)

The User object describes the characteristics of a user/person or a security principal. Defined by D3FEND d3f:UserAccount.

result[].​device.​regionstring or null

The region where the virtual machine is located. For example, an AWS Region.

result[].​device.​risk_levelstring or null

The risk level, normalized to the caption of the risk_level_id value.

result[].​device.​risk_level_idinteger(ocsfv1.3.0inventoryinfoDevice_RiskLevelId)

DeviceRiskLevelId is an enum, and the following values are allowed. 0 - Info 1 - Low 2 - Medium 3 - High 4 - Critical 99 - Other: The risk level is not mapped. See the risk_level attribute, which contains a data source specific value.

result[].​device.​risk_scoreinteger or null

The risk score as reported by the event source.

result[].​device.​subnetstring(ocsfv1.3.0inventoryinfoSubnet)

The subnet represented in a CIDR notation, using the format network_address/prefix_length. The network_address can be in either IPv4 or IPv6 format. The prefix length indicates the number of bits used for the network portion, and the remaining bits are available for host addresses within that subnet.

For example:
  • 192.168.1.0/24
  • 2001:0db8:85a3:0000::/64

result[].​device.​subnet_uidstring or null

The unique identifier of a virtual subnet.

result[].​device.​sw_infoArray of objects or null(ocsfv1.3.0inventoryinfoProduct)

The list of software contained on a device

result[].​device.​typestring or null

The device type. For example: unknown, server, desktop, laptop, tablet, mobile, virtual, browser, plc, scada, dcs, cnc, scientific, medical, lighting, energy, transportation other.

result[].​device.​uidstring or null

The unique identifier of the device. For example the Windows TargetSID or AWS EC2 ARN.

result[].​device.​uid_altstring or null

An alternate unique identifier of the device if any. For example the ActiveDirectory DN.

result[].​device.​vendorobject(ocsfv1.3.0inventoryinfoOrganization)

The Organization object describes characteristics of an organization or company and its division if any.

result[].​device.​vlan_uidstring or null

The Virtual LAN identifier.

result[].​device.​vpc_uidstring or null

The unique identifier of the Virtual Private Cloud (VPC).

result[].​device.​zonestring or null

The network zone or LAN segment.

result[].​metadataobject(ocsfv1.3.0inventoryinfoMetadata)required

The Metadata object describes the metadata associated with the event. Defined by D3FEND d3f:Metadata.

result[].​metadata.​productobject(ocsfv1.3.0inventoryinfoProduct)required

The Product object describes characteristics of a software product.

result[].​metadata.​product.​vendor_namestringrequired

The name of the vendor of the product.

result[].​metadata.​product.​cpe_namestring or null

The Common Platform Enumeration (CPE) name as described by (NIST) For example: cpe:/a:apple:safari:16.2.

result[].​metadata.​product.​featureobject(ocsfv1.3.0inventoryinfoFeature)

The Feature object provides information about the software product feature that generated a specific event. It encompasses details related to the capabilities, components, user interface (UI) design, and performance upgrades associated with the feature.

result[].​metadata.​product.​langstring or null

The two letter lower case language codes, as defined by ISO 639-1. For example: en (English), de (German), or fr (French).

result[].​metadata.​product.​namestring or null

The name of the product.

result[].​metadata.​product.​pathstring or null

The installation path of the product.

result[].​metadata.​product.​uidstring or null

The unique identifier of the product.

result[].​metadata.​product.​url_stringstring(ocsfv1.3.0inventoryinfoURLString)

Uniform Resource Locator (URL) string. For example: http://www.example.com/download/trouble.exe.

result[].​metadata.​product.​versionstring or null

The version of the product, as defined by the event source. For example: 2013.1.3-beta.

result[].​metadata.​versionstringrequired

The version of the OCSF schema, using Semantic Versioning Specification (SemVer). For example: 1.0.0. Event consumers use the version to determine the available event attributes.

result[].​metadata.​correlation_uidstring or null

The unique identifier used to correlate events.

result[].​metadata.​event_codestring or null

The Event ID or Code that the product uses to describe the event.

result[].​metadata.​extensionobject(ocsfv1.3.0inventoryinfoExtension)

The OCSF Schema Extension object provides detailed information about the schema extension used to construct the event. The schema extensions are registered in the extensions.md file.

result[].​metadata.​extensionsArray of objects or null(ocsfv1.3.0inventoryinfoExtension)

The schema extensions used to create the event.

result[].​metadata.​labelsArray of strings or null

The list of category labels attached to the event or specific attributes. Labels are user defined tags or aliases added at normalization time.

For example: ["network", "connection.ip:destination", "device.ip:source"]
result[].​metadata.​log_levelstring or null

The audit level at which an event was generated.

result[].​metadata.​log_namestring or null

The event log name. For example, syslog file name or Windows logging subsystem: Security.

result[].​metadata.​log_providerstring or null

The logging provider or logging service that logged the event. For example, Microsoft-Windows-Security-Auditing.

result[].​metadata.​log_versionstring or null

The event log schema version that specifies the format of the original event. For example syslog version or Cisco Log Schema Version.

result[].​metadata.​logged_timeinteger(ocsfv1.3.0inventoryinfoTimestamp)

The timestamp format is the number of milliseconds since the Epoch 01/01/1970 00:00:00 UTC. For example 1618524549901.

result[].​metadata.​logged_time_dtstring or null(date-time)

The time when the logging system collected and logged the event.

This attribute is distinct from the event time in that event time typically contain the time extracted from the original event. Most of the time, these two times will be different.
result[].​metadata.​loggersArray of objects or null(ocsfv1.3.0inventoryinfoLogger)

An array of Logger objects that describe the devices and logging products between the event source and its eventual destination. Note, this attribute can be used when there is a complex end-to-end path of event flow.

result[].​metadata.​modified_timeinteger(ocsfv1.3.0inventoryinfoTimestamp)

The timestamp format is the number of milliseconds since the Epoch 01/01/1970 00:00:00 UTC. For example 1618524549901.

result[].​metadata.​modified_time_dtstring or null(date-time)

The time when the event was last modified or enriched.

result[].​metadata.​original_timestring or null

The original event time as reported by the event source. For example, the time in the original format from system event log such as Syslog on Unix/Linux and the System event file on Windows. Omit if event is generated instead of collected via logs.

result[].​metadata.​processed_timeinteger(ocsfv1.3.0inventoryinfoTimestamp)

The timestamp format is the number of milliseconds since the Epoch 01/01/1970 00:00:00 UTC. For example 1618524549901.

result[].​metadata.​processed_time_dtstring or null(date-time)

The event processed time, such as an ETL operation.

result[].​metadata.​profilesArray of strings or null

The list of profiles used to create the event. Profiles should be referenced by their name attribute for core profiles, or extension/name for profiles from extensions.

result[].​metadata.​sequenceinteger or null

Sequence number of the event. The sequence number is a value available in some events, to make the exact ordering of events unambiguous, regardless of the event time precision.

result[].​metadata.​tenant_uidstring or null

The unique tenant identifier.

result[].​metadata.​uidstring or null

The logging system-assigned unique identifier of an event instance.

result[].​severity_idinteger(ocsfv1.3.0inventoryinfoSeverityId)required

SeverityId is an enum, and the following values are allowed. 0 - Unknown: The event/finding severity is unknown. 1 - Informational: Informational message. No action required. 2 - Low: The user decides if action is needed. 3 - Medium: Action is required but the situation is not serious at this time. 4 - High: Action is required immediately. 5 - Critical: Action is required immediately and the scope is broad. 6 - Fatal: An error occurred but it is too late to take remedial action. 99 - Other: The event/finding severity is not mapped. See the severity attribute, which contains a data source specific value.

result[].​timeinteger(ocsfv1.3.0inventoryinfoTimestamp)required

The timestamp format is the number of milliseconds since the Epoch 01/01/1970 00:00:00 UTC. For example 1618524549901.

result[].​type_uidinteger(ocsfv1.3.0inventoryinfoTypeUid)required

TypeUid is an enum, and the following values are allowed. 500100 - Unknown 500101 - Log: The discovered information is via a log. 500102 - Collect: The discovered information is via a collection process. 500199 - Other

result[].​activity_namestring or null

The event activity name, as defined by the activity_id.

result[].​actorobject(ocsfv1.3.0inventoryinfoActor)

The Actor object contains details about the user, role, application, service, or process that initiated or performed a specific activity.

result[].​apiobject(ocsfv1.3.0inventoryinfoApi)

The API, or Application Programming Interface, object represents information pertaining to an API request and response.

result[].​category_namestring or null

The event category name, as defined by category_uid value: Discovery.

result[].​cloudobject(ocsfv1.3.0inventoryinfoCloud)

The Cloud object contains information about a cloud account such as AWS Account ID, regions, etc.

result[].​countinteger or null

The number of times that events in the same logical group occurred during the event Start Time to End Time period.

result[].​custom_fieldsobject(ocsfv1.3.0inventoryinfoObject)

An unordered collection of attributes. It defines a set of attributes available in all objects. It can be also used as a generic object to log objects that are not otherwise defined by the schema.

result[].​durationinteger or null

The event duration or aggregate time, the amount of time the event covers from start_time to end_time in milliseconds.

result[].​end_timeinteger(ocsfv1.3.0inventoryinfoTimestamp)

The timestamp format is the number of milliseconds since the Epoch 01/01/1970 00:00:00 UTC. For example 1618524549901.

result[].​end_time_dtstring or null(date-time)

The end time of a time period, or the time of the most recent event included in the aggregate event.

result[].​enrichmentsArray of objects or null(ocsfv1.3.0inventoryinfoEnrichment)

The additional information from an external data source, which is associated with the event or a finding. For example add location information for the IP address in the DNS answers:

[{"name": "answers.ip", "value": "92.24.47.250", "type": "location", "data": {"city": "Socotra", "continent": "Asia", "coordinates": [-25.4153, 17.0743], "country": "YE", "desc": "Yemen"}}]

result[].​messagestring or null

The description of the event/finding, as defined by the source.

result[].​observablesArray of objects or null(ocsfv1.3.0inventoryinfoObservable)

The observables associated with the event or a finding.

result[].​osintArray of objects or null(ocsfv1.3.0inventoryinfoOsint)

The OSINT (Open Source Intelligence) object contains details related to an indicator such as the indicator itself, related indicators, geolocation, registrar information, subdomains, analyst commentary, and other contextual information. This information can be used to further enrich a detection or finding by providing decisioning support to other analysts and engineers.

result[].​raw_datastring or null

The raw event/finding data as received from the source.

result[].​severitystring or null

The event/finding severity, normalized to the caption of the severity_id value. In the case of 'Other', it is defined by the source.

result[].​start_timeinteger(ocsfv1.3.0inventoryinfoTimestamp)

The timestamp format is the number of milliseconds since the Epoch 01/01/1970 00:00:00 UTC. For example 1618524549901.

result[].​start_time_dtstring or null(date-time)

The start time of a time period, or the time of the least recent event included in the aggregate event.

result[].​statusstring or null

The event status, normalized to the caption of the status_id value. In the case of 'Other', it is defined by the event source.

result[].​status_codestring or null

The event status code, as reported by the event source.

For example, in a Windows Failed Authentication event, this would be the value of 'Failure Code', e.g. 0x18.

result[].​status_detailstring or null

The status detail contains additional information about the event/finding outcome.

result[].​status_idinteger(ocsfv1.3.0inventoryinfoStatusId)

StatusId is an enum, and the following values are allowed. 0 - Unknown: The status is unknown. 1 - Success 2 - Failure 99 - Other: The event status is not mapped. See the status attribute, which contains a data source specific value.

result[].​time_dtstring or null(date-time)

The normalized event occurrence time or the finding creation time.

result[].​timezone_offsetinteger or null

The number of minutes that the reported event time is ahead or behind UTC, in the range -1,080 to +1,080.

result[].​type_namestring or null

The event/finding type name, as defined by the type_uid.

result[].​unmappedobject(ocsfv1.3.0inventoryinfoObject)

An unordered collection of attributes. It defines a set of attributes available in all objects. It can be also used as a generic object to log objects that are not otherwise defined by the schema.

cursorstringrequired

Cursor to use to retrieve the next page of results

statusstring(QueryStatus)required
Enum"PENDING""COMPLETE"
metaobject(MetaResponse)
Response
application/json
{ "result": [ {} ], "cursor": "string", "meta": { "stats": {}, "api": {} }, "status": "PENDING" }

Create Asset

Request

Create assets in a vulnerability scanning system

Bodyapplication/jsonrequired
assetobject(ocsfv1.3.0inventoryinfoInventoryInfo)required

Device Inventory Info events report device inventory data that is either logged or proactively collected. For example, when collecting device information from a CMDB or running a network sweep of connected devices.

asset.​activity_idinteger(ocsfv1.3.0inventoryinfoActivityId)required

ActivityId is an enum, and the following values are allowed. 0 - Unknown: The event activity is unknown. 1 - Log: The discovered information is via a log. 2 - Collect: The discovered information is via a collection process. 99 - Other: The event activity is not mapped. See the activity_name attribute, which contains a data source specific value.

asset.​category_uidinteger(ocsfv1.3.0inventoryinfoCategoryUid)required

CategoryUid is an enum, and the following values are allowed. 5 - Discovery: Discovery events report the existence and state of devices, files, configurations, processes, registry keys, and other objects.

asset.​class_uidinteger(ocsfv1.3.0inventoryinfoClassUid)required

ClassUid is an enum, and the following values are allowed. 5001 - DeviceInventoryInfo: Device Inventory Info events report device inventory data that is either logged or proactively collected. For example, when collecting device information from a CMDB or running a network sweep of connected devices.

asset.​deviceobject(ocsfv1.3.0inventoryinfoDevice)required

The Device object represents an addressable computer system or host, which is typically connected to a computer network and participates in the transmission or processing of data within the computer network. Defined by D3FEND d3f:Host.

asset.​device.​type_idinteger(ocsfv1.3.0inventoryinfoDevice_TypeId)required
asset.​device.​agent_listArray of objects or null(ocsfv1.3.0inventoryinfoAgent)

A list of agent objects associated with a device, endpoint, or resource.

asset.​device.​autoscale_uidstring or null

The unique identifier of the cloud autoscale configuration.

asset.​device.​boot_timeinteger(ocsfv1.3.0inventoryinfoTimestamp)

The timestamp format is the number of milliseconds since the Epoch 01/01/1970 00:00:00 UTC. For example 1618524549901.

asset.​device.​boot_time_dtstring or null(date-time)

The time the system was booted.

asset.​device.​containerobject(ocsfv1.3.0inventoryinfoContainer)

The Container object describes an instance of a specific container. A container is a prepackaged, portable system image that runs isolated on an existing system using a container runtime like containerd.

asset.​device.​created_timeinteger(ocsfv1.3.0inventoryinfoTimestamp)

The timestamp format is the number of milliseconds since the Epoch 01/01/1970 00:00:00 UTC. For example 1618524549901.

asset.​device.​created_time_dtstring or null(date-time)

The time when the device was known to have been created.

asset.​device.​descstring or null

The description of the device, ordinarily as reported by the operating system.

asset.​device.​domainstring or null

The network domain where the device resides. For example: work.example.com.

asset.​device.​first_seen_timeinteger(ocsfv1.3.0inventoryinfoTimestamp)

The timestamp format is the number of milliseconds since the Epoch 01/01/1970 00:00:00 UTC. For example 1618524549901.

asset.​device.​first_seen_time_dtstring or null(date-time)

The initial discovery time of the device.

asset.​device.​groupsArray of objects or null(ocsfv1.3.0inventoryinfoGroup)

The group names to which the device belongs. For example: ["Windows Laptops", "Engineering"].

asset.​device.​hostnamestring(ocsfv1.3.0inventoryinfoHostname)

Unique name assigned to a device connected to a computer network. A domain name in general is an Internet address that can be resolved through the Domain Name System (DNS). For example: r2-d2.example.com.

asset.​device.​hw_infoobject(ocsfv1.3.0inventoryinfoDeviceHwInfo)

The Device Hardware Information object contains details and specifications of the physical components that make up a device. This information provides an overview of the hardware capabilities, configuration, and characteristics of the device.

asset.​device.​hypervisorstring or null

The name of the hypervisor running on the device. For example, Xen, VMware, Hyper-V, VirtualBox, etc.

asset.​device.​imageobject(ocsfv1.3.0inventoryinfoImage)

The Image object provides a description of a specific Virtual Machine (VM) or Container image. Defined by D3FEND d3f:ContainerImage.

asset.​device.​imeistring or null

The International Mobile Station Equipment Identifier that is associated with the device.

asset.​device.​instance_uidstring or null

The unique identifier of a VM instance.

asset.​device.​interface_namestring or null

The name of the network interface (e.g. eth2).

asset.​device.​interface_uidstring or null

The unique identifier of the network interface.

asset.​device.​ipstring(ocsfv1.3.0inventoryinfoIPAddress)

Internet Protocol address (IP address), in either IPv4 or IPv6 format. For example, 192.168.200.24 or 2001:0db8:85a3:0000:0000:8a2e:0370:7334.

asset.​device.​ip_addressesArray of strings or null

A list of IP addresses available on the device

asset.​device.​is_compliantboolean or null

The event occurred on a compliant device.

asset.​device.​is_managedboolean or null

The event occurred on a managed device.

asset.​device.​is_personalboolean or null

The event occurred on a personal device.

asset.​device.​is_trustedboolean or null

The event occurred on a trusted device.

asset.​device.​last_seen_timeinteger(ocsfv1.3.0inventoryinfoTimestamp)

The timestamp format is the number of milliseconds since the Epoch 01/01/1970 00:00:00 UTC. For example 1618524549901.

asset.​device.​last_seen_time_dtstring or null(date-time)

The most recent discovery time of the device.

asset.​device.​locationobject(ocsfv1.3.0inventoryinfoLocation)

The Geo Location object describes a geographical location, usually associated with an IP address. Defined by D3FEND d3f:PhysicalLocation.

asset.​device.​macstring(ocsfv1.3.0inventoryinfoMACAddress)

Media Access Control (MAC) address. For example: 18:36:F3:98:4F:9A.

asset.​device.​mac_addressesArray of strings or null

A list of MAC addresses available on the device

asset.​device.​modified_timeinteger(ocsfv1.3.0inventoryinfoTimestamp)

The timestamp format is the number of milliseconds since the Epoch 01/01/1970 00:00:00 UTC. For example 1618524549901.

asset.​device.​modified_time_dtstring or null(date-time)

The time when the device was last known to have been modified.

asset.​device.​namestring or null

The alternate device name, ordinarily as assigned by an administrator.

Note: The Name could be any other string that helps to identify the device, such as a phone number; for example 310-555-1234.

asset.​device.​namespace_pidinteger or null

If running under a process namespace (such as in a container), the process identifier within that process namespace.

asset.​device.​netbios_namesArray of strings or null

A list of NetBIOS names available on the device

asset.​device.​network_interfacesArray of objects or null(ocsfv1.3.0inventoryinfoNetworkInterface)

The network interfaces that are associated with the device, one for each unique MAC address/IP address/hostname/name combination.

Note: The first element of the array is the network information that pertains to the event.

asset.​device.​network_statusstring or null

The network isolation status of the endpoiint

asset.​device.​network_status_idinteger(ocsfv1.3.0inventoryinfoDevice_NetworkStatusId)

DeviceNetworkStatusId is an enum, and the following values are allowed. 1 - NotIsolated: Device is not isolated from the network. 2 - Isolated: Device is isolated from the network. 99 - Unknown: The network isolation status is unknown.

asset.​device.​orgobject(ocsfv1.3.0inventoryinfoOrganization)

The Organization object describes characteristics of an organization or company and its division if any.

asset.​device.​osobject(ocsfv1.3.0inventoryinfoOs)

The Operating System (OS) object describes characteristics of an OS, such as Linux or Windows. Defined by D3FEND d3f:OperatingSystem.

asset.​device.​ownerobject(ocsfv1.3.0inventoryinfoUser)

The User object describes the characteristics of a user/person or a security principal. Defined by D3FEND d3f:UserAccount.

asset.​device.​regionstring or null

The region where the virtual machine is located. For example, an AWS Region.

asset.​device.​risk_levelstring or null

The risk level, normalized to the caption of the risk_level_id value.

asset.​device.​risk_level_idinteger(ocsfv1.3.0inventoryinfoDevice_RiskLevelId)

DeviceRiskLevelId is an enum, and the following values are allowed. 0 - Info 1 - Low 2 - Medium 3 - High 4 - Critical 99 - Other: The risk level is not mapped. See the risk_level attribute, which contains a data source specific value.

asset.​device.​risk_scoreinteger or null

The risk score as reported by the event source.

asset.​device.​subnetstring(ocsfv1.3.0inventoryinfoSubnet)

The subnet represented in a CIDR notation, using the format network_address/prefix_length. The network_address can be in either IPv4 or IPv6 format. The prefix length indicates the number of bits used for the network portion, and the remaining bits are available for host addresses within that subnet.

For example:
  • 192.168.1.0/24
  • 2001:0db8:85a3:0000::/64

asset.​device.​subnet_uidstring or null

The unique identifier of a virtual subnet.

asset.​device.​sw_infoArray of objects or null(ocsfv1.3.0inventoryinfoProduct)

The list of software contained on a device

asset.​device.​typestring or null

The device type. For example: unknown, server, desktop, laptop, tablet, mobile, virtual, browser, plc, scada, dcs, cnc, scientific, medical, lighting, energy, transportation other.

asset.​device.​uidstring or null

The unique identifier of the device. For example the Windows TargetSID or AWS EC2 ARN.

asset.​device.​uid_altstring or null

An alternate unique identifier of the device if any. For example the ActiveDirectory DN.

asset.​device.​vendorobject(ocsfv1.3.0inventoryinfoOrganization)

The Organization object describes characteristics of an organization or company and its division if any.

asset.​device.​vlan_uidstring or null

The Virtual LAN identifier.

asset.​device.​vpc_uidstring or null

The unique identifier of the Virtual Private Cloud (VPC).

asset.​device.​zonestring or null

The network zone or LAN segment.

asset.​metadataobject(ocsfv1.3.0inventoryinfoMetadata)required

The Metadata object describes the metadata associated with the event. Defined by D3FEND d3f:Metadata.

asset.​metadata.​productobject(ocsfv1.3.0inventoryinfoProduct)required

The Product object describes characteristics of a software product.

asset.​metadata.​product.​vendor_namestringrequired

The name of the vendor of the product.

asset.​metadata.​product.​cpe_namestring or null

The Common Platform Enumeration (CPE) name as described by (NIST) For example: cpe:/a:apple:safari:16.2.

asset.​metadata.​product.​featureobject(ocsfv1.3.0inventoryinfoFeature)

The Feature object provides information about the software product feature that generated a specific event. It encompasses details related to the capabilities, components, user interface (UI) design, and performance upgrades associated with the feature.

asset.​metadata.​product.​langstring or null

The two letter lower case language codes, as defined by ISO 639-1. For example: en (English), de (German), or fr (French).

asset.​metadata.​product.​namestring or null

The name of the product.

asset.​metadata.​product.​pathstring or null

The installation path of the product.

asset.​metadata.​product.​uidstring or null

The unique identifier of the product.

asset.​metadata.​product.​url_stringstring(ocsfv1.3.0inventoryinfoURLString)

Uniform Resource Locator (URL) string. For example: http://www.example.com/download/trouble.exe.

asset.​metadata.​product.​versionstring or null

The version of the product, as defined by the event source. For example: 2013.1.3-beta.

asset.​metadata.​versionstringrequired

The version of the OCSF schema, using Semantic Versioning Specification (SemVer). For example: 1.0.0. Event consumers use the version to determine the available event attributes.

asset.​metadata.​correlation_uidstring or null

The unique identifier used to correlate events.

asset.​metadata.​event_codestring or null

The Event ID or Code that the product uses to describe the event.

asset.​metadata.​extensionobject(ocsfv1.3.0inventoryinfoExtension)

The OCSF Schema Extension object provides detailed information about the schema extension used to construct the event. The schema extensions are registered in the extensions.md file.

asset.​metadata.​extensionsArray of objects or null(ocsfv1.3.0inventoryinfoExtension)

The schema extensions used to create the event.

asset.​metadata.​labelsArray of strings or null

The list of category labels attached to the event or specific attributes. Labels are user defined tags or aliases added at normalization time.

For example: ["network", "connection.ip:destination", "device.ip:source"]
asset.​metadata.​log_levelstring or null

The audit level at which an event was generated.

asset.​metadata.​log_namestring or null

The event log name. For example, syslog file name or Windows logging subsystem: Security.

asset.​metadata.​log_providerstring or null

The logging provider or logging service that logged the event. For example, Microsoft-Windows-Security-Auditing.

asset.​metadata.​log_versionstring or null

The event log schema version that specifies the format of the original event. For example syslog version or Cisco Log Schema Version.

asset.​metadata.​logged_timeinteger(ocsfv1.3.0inventoryinfoTimestamp)

The timestamp format is the number of milliseconds since the Epoch 01/01/1970 00:00:00 UTC. For example 1618524549901.

asset.​metadata.​logged_time_dtstring or null(date-time)

The time when the logging system collected and logged the event.

This attribute is distinct from the event time in that event time typically contain the time extracted from the original event. Most of the time, these two times will be different.
asset.​metadata.​loggersArray of objects or null(ocsfv1.3.0inventoryinfoLogger)

An array of Logger objects that describe the devices and logging products between the event source and its eventual destination. Note, this attribute can be used when there is a complex end-to-end path of event flow.

asset.​metadata.​modified_timeinteger(ocsfv1.3.0inventoryinfoTimestamp)

The timestamp format is the number of milliseconds since the Epoch 01/01/1970 00:00:00 UTC. For example 1618524549901.

asset.​metadata.​modified_time_dtstring or null(date-time)

The time when the event was last modified or enriched.

asset.​metadata.​original_timestring or null

The original event time as reported by the event source. For example, the time in the original format from system event log such as Syslog on Unix/Linux and the System event file on Windows. Omit if event is generated instead of collected via logs.

asset.​metadata.​processed_timeinteger(ocsfv1.3.0inventoryinfoTimestamp)

The timestamp format is the number of milliseconds since the Epoch 01/01/1970 00:00:00 UTC. For example 1618524549901.

asset.​metadata.​processed_time_dtstring or null(date-time)

The event processed time, such as an ETL operation.

asset.​metadata.​profilesArray of strings or null

The list of profiles used to create the event. Profiles should be referenced by their name attribute for core profiles, or extension/name for profiles from extensions.

asset.​metadata.​sequenceinteger or null

Sequence number of the event. The sequence number is a value available in some events, to make the exact ordering of events unambiguous, regardless of the event time precision.

asset.​metadata.​tenant_uidstring or null

The unique tenant identifier.

asset.​metadata.​uidstring or null

The logging system-assigned unique identifier of an event instance.

asset.​severity_idinteger(ocsfv1.3.0inventoryinfoSeverityId)required

SeverityId is an enum, and the following values are allowed. 0 - Unknown: The event/finding severity is unknown. 1 - Informational: Informational message. No action required. 2 - Low: The user decides if action is needed. 3 - Medium: Action is required but the situation is not serious at this time. 4 - High: Action is required immediately. 5 - Critical: Action is required immediately and the scope is broad. 6 - Fatal: An error occurred but it is too late to take remedial action. 99 - Other: The event/finding severity is not mapped. See the severity attribute, which contains a data source specific value.

asset.​timeinteger(ocsfv1.3.0inventoryinfoTimestamp)required

The timestamp format is the number of milliseconds since the Epoch 01/01/1970 00:00:00 UTC. For example 1618524549901.

asset.​type_uidinteger(ocsfv1.3.0inventoryinfoTypeUid)required

TypeUid is an enum, and the following values are allowed. 500100 - Unknown 500101 - Log: The discovered information is via a log. 500102 - Collect: The discovered information is via a collection process. 500199 - Other

asset.​activity_namestring or null

The event activity name, as defined by the activity_id.

asset.​actorobject(ocsfv1.3.0inventoryinfoActor)

The Actor object contains details about the user, role, application, service, or process that initiated or performed a specific activity.

asset.​apiobject(ocsfv1.3.0inventoryinfoApi)

The API, or Application Programming Interface, object represents information pertaining to an API request and response.

asset.​category_namestring or null

The event category name, as defined by category_uid value: Discovery.

asset.​cloudobject(ocsfv1.3.0inventoryinfoCloud)

The Cloud object contains information about a cloud account such as AWS Account ID, regions, etc.

asset.​countinteger or null

The number of times that events in the same logical group occurred during the event Start Time to End Time period.

asset.​custom_fieldsobject(ocsfv1.3.0inventoryinfoObject)

An unordered collection of attributes. It defines a set of attributes available in all objects. It can be also used as a generic object to log objects that are not otherwise defined by the schema.

asset.​durationinteger or null

The event duration or aggregate time, the amount of time the event covers from start_time to end_time in milliseconds.

asset.​end_timeinteger(ocsfv1.3.0inventoryinfoTimestamp)

The timestamp format is the number of milliseconds since the Epoch 01/01/1970 00:00:00 UTC. For example 1618524549901.

asset.​end_time_dtstring or null(date-time)

The end time of a time period, or the time of the most recent event included in the aggregate event.

asset.​enrichmentsArray of objects or null(ocsfv1.3.0inventoryinfoEnrichment)

The additional information from an external data source, which is associated with the event or a finding. For example add location information for the IP address in the DNS answers:

[{"name": "answers.ip", "value": "92.24.47.250", "type": "location", "data": {"city": "Socotra", "continent": "Asia", "coordinates": [-25.4153, 17.0743], "country": "YE", "desc": "Yemen"}}]

asset.​messagestring or null

The description of the event/finding, as defined by the source.

asset.​observablesArray of objects or null(ocsfv1.3.0inventoryinfoObservable)

The observables associated with the event or a finding.

asset.​osintArray of objects or null(ocsfv1.3.0inventoryinfoOsint)

The OSINT (Open Source Intelligence) object contains details related to an indicator such as the indicator itself, related indicators, geolocation, registrar information, subdomains, analyst commentary, and other contextual information. This information can be used to further enrich a detection or finding by providing decisioning support to other analysts and engineers.

asset.​raw_datastring or null

The raw event/finding data as received from the source.

asset.​severitystring or null

The event/finding severity, normalized to the caption of the severity_id value. In the case of 'Other', it is defined by the source.

asset.​start_timeinteger(ocsfv1.3.0inventoryinfoTimestamp)

The timestamp format is the number of milliseconds since the Epoch 01/01/1970 00:00:00 UTC. For example 1618524549901.

asset.​start_time_dtstring or null(date-time)

The start time of a time period, or the time of the least recent event included in the aggregate event.

asset.​statusstring or null

The event status, normalized to the caption of the status_id value. In the case of 'Other', it is defined by the event source.

asset.​status_codestring or null

The event status code, as reported by the event source.

For example, in a Windows Failed Authentication event, this would be the value of 'Failure Code', e.g. 0x18.

asset.​status_detailstring or null

The status detail contains additional information about the event/finding outcome.

asset.​status_idinteger(ocsfv1.3.0inventoryinfoStatusId)

StatusId is an enum, and the following values are allowed. 0 - Unknown: The status is unknown. 1 - Success 2 - Failure 99 - Other: The event status is not mapped. See the status attribute, which contains a data source specific value.

asset.​time_dtstring or null(date-time)

The normalized event occurrence time or the finding creation time.

asset.​timezone_offsetinteger or null

The number of minutes that the reported event time is ahead or behind UTC, in the range -1,080 to +1,080.

asset.​type_namestring or null

The event/finding type name, as defined by the type_uid.

asset.​unmappedobject(ocsfv1.3.0inventoryinfoObject)

An unordered collection of attributes. It defines a set of attributes available in all objects. It can be also used as a generic object to log objects that are not otherwise defined by the schema.

source_namestringrequired

Name of the source that created the asset.

curl -i -X POST \
  https://api.synqly.com/v1/vulnerabilities/assets \
  -H 'Authorization: Bearer <YOUR_TOKEN_HERE>' \
  -H 'Content-Type: application/json' \
  -d '{
    "asset": {
      "activity_id": 0,
      "activity_name": "string",
      "actor": {
        "app_name": "string",
        "app_uid": "string",
        "authorizations": [
          {
            "decision": "string",
            "policy": {
              "desc": "string",
              "group": {
                "desc": "string",
                "domain": "string",
                "name": "string",
                "privileges": [
                  null
                ],
                "type": "string",
                "uid": "string"
              },
              "is_applied": true,
              "name": "string",
              "uid": "string",
              "version": "string"
            }
          }
        ],
        "idp": {
          "name": "string",
          "uid": "string"
        },
        "invoked_by": "string",
        "process": {
          "auid": 0,
          "cmd_line": "string",
          "container": {
            "hash": {
              "algorithm": "string",
              "algorithm_id": 0,
              "value": "string"
            },
            "image": {
              "labels": [
                "string"
              ],
              "name": "string",
              "path": "string",
              "tag": "string",
              "uid": "string"
            },
            "name": "string",
            "network_driver": "string",
            "orchestrator": "string",
            "pod_uuid": "string",
            "runtime": "string",
            "size": 0,
            "tag": "string",
            "uid": "string"
          },
          "created_time": 0,
          "created_time_dt": "2019-08-24T14:15:22Z",
          "egid": 0,
          "euid": 0,
          "file": {
            "accessed_time": 0,
            "accessed_time_dt": "2019-08-24T14:15:22Z",
            "accessor": {
              "account": {
                "labels": [
                  null
                ],
                "name": "string",
                "type": "string",
                "type_id": 0,
                "uid": "string"
              },
              "credential_uid": "string",
              "domain": "string",
              "email_addr": "string",
              "full_name": "string",
              "groups": [
                {
                  "privileges": []
                }
              ],
              "ldap_person": {
                "cost_center": "string",
                "created_time": 0,
                "created_time_dt": "2019-08-24T14:15:22Z",
                "deleted_time": 0,
                "deleted_time_dt": "2019-08-24T14:15:22Z",
                "email_addrs": [
                  null
                ],
                "employee_uid": "string",
                "given_name": "string",
                "hire_time": 0,
                "hire_time_dt": "2019-08-24T14:15:22Z",
                "job_title": "string",
                "labels": [
                  null
                ],
                "last_login_time": 0,
                "last_login_time_dt": "2019-08-24T14:15:22Z",
                "ldap_cn": "string",
                "ldap_dn": "string",
                "leave_time": 0,
                "leave_time_dt": "2019-08-24T14:15:22Z",
                "location": {
                  "coordinates": []
                },
                "manager": {},
                "modified_time": 0,
                "modified_time_dt": "2019-08-24T14:15:22Z",
                "office_location": "string",
                "surname": "string"
              },
              "mfa_status": "string",
              "mfa_status_id": 0,
              "name": "string",
              "org": {
                "name": "string",
                "ou_name": "string",
                "ou_uid": "string",
                "uid": "string"
              },
              "privileges": [
                "string"
              ],
              "risk_level": "string",
              "risk_level_id": 0,
              "risk_score": 0,
              "type": "string",
              "type_id": 0,
              "uid": "string",
              "uid_alt": "string",
              "user_status": "string",
              "user_status_id": 0
            },
            "attributes": 0,
            "company_name": "string",
            "confidentiality": "string",
            "confidentiality_id": 0,
            "created_time": 0,
            "created_time_dt": "2019-08-24T14:15:22Z",
            "creator": {
              "account": {
                "labels": [
                  null
                ],
                "name": "string",
                "type": "string",
                "type_id": 0,
                "uid": "string"
              },
              "credential_uid": "string",
              "domain": "string",
              "email_addr": "string",
              "full_name": "string",
              "groups": [
                {
                  "privileges": []
                }
              ],
              "ldap_person": {
                "cost_center": "string",
                "created_time": 0,
                "created_time_dt": "2019-08-24T14:15:22Z",
                "deleted_time": 0,
                "deleted_time_dt": "2019-08-24T14:15:22Z",
                "email_addrs": [
                  null
                ],
                "employee_uid": "string",
                "given_name": "string",
                "hire_time": 0,
                "hire_time_dt": "2019-08-24T14:15:22Z",
                "job_title": "string",
                "labels": [
                  null
                ],
                "last_login_time": 0,
                "last_login_time_dt": "2019-08-24T14:15:22Z",
                "ldap_cn": "string",
                "ldap_dn": "string",
                "leave_time": 0,
                "leave_time_dt": "2019-08-24T14:15:22Z",
                "location": {
                  "coordinates": []
                },
                "manager": {},
                "modified_time": 0,
                "modified_time_dt": "2019-08-24T14:15:22Z",
                "office_location": "string",
                "surname": "string"
              },
              "mfa_status": "string",
              "mfa_status_id": 0,
              "name": "string",
              "org": {
                "name": "string",
                "ou_name": "string",
                "ou_uid": "string",
                "uid": "string"
              },
              "privileges": [
                "string"
              ],
              "risk_level": "string",
              "risk_level_id": 0,
              "risk_score": 0,
              "type": "string",
              "type_id": 0,
              "uid": "string",
              "uid_alt": "string",
              "user_status": "string",
              "user_status_id": 0
            },
            "desc": "string",
            "ext": "string",
            "hashes": [
              {
                "algorithm": "string",
                "algorithm_id": 0,
                "value": "string"
              }
            ],
            "is_system": true,
            "mime_type": "string",
            "modified_time": 0,
            "modified_time_dt": "2019-08-24T14:15:22Z",
            "modifier": {
              "account": {
                "labels": [
                  null
                ],
                "name": "string",
                "type": "string",
                "type_id": 0,
                "uid": "string"
              },
              "credential_uid": "string",
              "domain": "string",
              "email_addr": "string",
              "full_name": "string",
              "groups": [
                {
                  "privileges": []
                }
              ],
              "ldap_person": {
                "cost_center": "string",
                "created_time": 0,
                "created_time_dt": "2019-08-24T14:15:22Z",
                "deleted_time": 0,
                "deleted_time_dt": "2019-08-24T14:15:22Z",
                "email_addrs": [
                  null
                ],
                "employee_uid": "string",
                "given_name": "string",
                "hire_time": 0,
                "hire_time_dt": "2019-08-24T14:15:22Z",
                "job_title": "string",
                "labels": [
                  null
                ],
                "last_login_time": 0,
                "last_login_time_dt": "2019-08-24T14:15:22Z",
                "ldap_cn": "string",
                "ldap_dn": "string",
                "leave_time": 0,
                "leave_time_dt": "2019-08-24T14:15:22Z",
                "location": {
                  "coordinates": []
                },
                "manager": {},
                "modified_time": 0,
                "modified_time_dt": "2019-08-24T14:15:22Z",
                "office_location": "string",
                "surname": "string"
              },
              "mfa_status": "string",
              "mfa_status_id": 0,
              "name": "string",
              "org": {
                "name": "string",
                "ou_name": "string",
                "ou_uid": "string",
                "uid": "string"
              },
              "privileges": [
                "string"
              ],
              "risk_level": "string",
              "risk_level_id": 0,
              "risk_score": 0,
              "type": "string",
              "type_id": 0,
              "uid": "string",
              "uid_alt": "string",
              "user_status": "string",
              "user_status_id": 0
            },
            "name": "string",
            "owner": {
              "account": {
                "labels": [
                  null
                ],
                "name": "string",
                "type": "string",
                "type_id": 0,
                "uid": "string"
              },
              "credential_uid": "string",
              "domain": "string",
              "email_addr": "string",
              "full_name": "string",
              "groups": [
                {
                  "privileges": []
                }
              ],
              "ldap_person": {
                "cost_center": "string",
                "created_time": 0,
                "created_time_dt": "2019-08-24T14:15:22Z",
                "deleted_time": 0,
                "deleted_time_dt": "2019-08-24T14:15:22Z",
                "email_addrs": [
                  null
                ],
                "employee_uid": "string",
                "given_name": "string",
                "hire_time": 0,
                "hire_time_dt": "2019-08-24T14:15:22Z",
                "job_title": "string",
                "labels": [
                  null
                ],
                "last_login_time": 0,
                "last_login_time_dt": "2019-08-24T14:15:22Z",
                "ldap_cn": "string",
                "ldap_dn": "string",
                "leave_time": 0,
                "leave_time_dt": "2019-08-24T14:15:22Z",
                "location": {
                  "coordinates": []
                },
                "manager": {},
                "modified_time": 0,
                "modified_time_dt": "2019-08-24T14:15:22Z",
                "office_location": "string",
                "surname": "string"
              },
              "mfa_status": "string",
              "mfa_status_id": 0,
              "name": "string",
              "org": {
                "name": "string",
                "ou_name": "string",
                "ou_uid": "string",
                "uid": "string"
              },
              "privileges": [
                "string"
              ],
              "risk_level": "string",
              "risk_level_id": 0,
              "risk_score": 0,
              "type": "string",
              "type_id": 0,
              "uid": "string",
              "uid_alt": "string",
              "user_status": "string",
              "user_status_id": 0
            },
            "parent_folder": "string",
            "path": "string",
            "product": {
              "cpe_name": "string",
              "feature": {
                "name": "string",
                "uid": "string",
                "version": "string"
              },
              "lang": "string",
              "name": "string",
              "path": "string",
              "uid": "string",
              "url_string": "string",
              "vendor_name": "string",
              "version": "string"
            },
            "security_descriptor": "string",
            "signature": {
              "algorithm": "string",
              "algorithm_id": 0,
              "certificate": {
                "created_time": 0,
                "created_time_dt": "2019-08-24T14:15:22Z",
                "expiration_time": 0,
                "expiration_time_dt": "2019-08-24T14:15:22Z",
                "fingerprints": [
                  null
                ],
                "is_self_signed": true,
                "issuer": "string",
                "serial_number": "string",
                "subject": "string",
                "uid": "string",
                "version": "string"
              },
              "created_time": 0,
              "created_time_dt": "2019-08-24T14:15:22Z",
              "developer_uid": "string",
              "digest": {
                "algorithm": "string",
                "algorithm_id": 0,
                "value": "string"
              },
              "state": "string",
              "state_id": 0
            },
            "size": 0,
            "type": "string",
            "type_id": 0,
            "uid": "string",
            "version": "string",
            "xattributes": {}
          },
          "group": {
            "desc": "string",
            "domain": "string",
            "name": "string",
            "privileges": [
              "string"
            ],
            "type": "string",
            "uid": "string"
          },
          "integrity": "string",
          "integrity_id": 0,
          "lineage": [
            "string"
          ],
          "loaded_modules": [
            "string"
          ],
          "name": "string",
          "namespace_pid": 0,
          "parent_process": {},
          "pid": 0,
          "sandbox": "string",
          "session": {
            "count": 0,
            "created_time": 0,
            "created_time_dt": "2019-08-24T14:15:22Z",
            "credential_uid": "string",
            "expiration_reason": "string",
            "expiration_time": 0,
            "expiration_time_dt": "2019-08-24T14:15:22Z",
            "is_mfa": true,
            "is_remote": true,
            "is_vpn": true,
            "issuer": "string",
            "terminal": "string",
            "uid": "string",
            "uid_alt": "string",
            "uuid": "string"
          },
          "terminated_time": 0,
          "terminated_time_dt": "2019-08-24T14:15:22Z",
          "tid": 0,
          "uid": "string",
          "user": {
            "account": {
              "labels": [
                "string"
              ],
              "name": "string",
              "type": "string",
              "type_id": 0,
              "uid": "string"
            },
            "credential_uid": "string",
            "domain": "string",
            "email_addr": "string",
            "full_name": "string",
            "groups": [
              {
                "desc": "string",
                "domain": "string",
                "name": "string",
                "privileges": [
                  null
                ],
                "type": "string",
                "uid": "string"
              }
            ],
            "ldap_person": {
              "cost_center": "string",
              "created_time": 0,
              "created_time_dt": "2019-08-24T14:15:22Z",
              "deleted_time": 0,
              "deleted_time_dt": "2019-08-24T14:15:22Z",
              "email_addrs": [
                "string"
              ],
              "employee_uid": "string",
              "given_name": "string",
              "hire_time": 0,
              "hire_time_dt": "2019-08-24T14:15:22Z",
              "job_title": "string",
              "labels": [
                "string"
              ],
              "last_login_time": 0,
              "last_login_time_dt": "2019-08-24T14:15:22Z",
              "ldap_cn": "string",
              "ldap_dn": "string",
              "leave_time": 0,
              "leave_time_dt": "2019-08-24T14:15:22Z",
              "location": {
                "city": "string",
                "continent": "string",
                "coordinates": [
                  null
                ],
                "country": "string",
                "desc": "string",
                "geohash": "string",
                "is_on_premises": true,
                "isp": "string",
                "lat": 0.1,
                "long": 0.1,
                "postal_code": "string",
                "provider": "string",
                "region": "string"
              },
              "manager": {},
              "modified_time": 0,
              "modified_time_dt": "2019-08-24T14:15:22Z",
              "office_location": "string",
              "surname": "string"
            },
            "mfa_status": "string",
            "mfa_status_id": 0,
            "name": "string",
            "org": {
              "name": "string",
              "ou_name": "string",
              "ou_uid": "string",
              "uid": "string"
            },
            "privileges": [
              "string"
            ],
            "risk_level": "string",
            "risk_level_id": 0,
            "risk_score": 0,
            "type": "string",
            "type_id": 0,
            "uid": "string",
            "uid_alt": "string",
            "user_status": "string",
            "user_status_id": 0
          },
          "xattributes": {}
        },
        "session": {
          "count": 0,
          "created_time": 0,
          "created_time_dt": "2019-08-24T14:15:22Z",
          "credential_uid": "string",
          "expiration_reason": "string",
          "expiration_time": 0,
          "expiration_time_dt": "2019-08-24T14:15:22Z",
          "is_mfa": true,
          "is_remote": true,
          "is_vpn": true,
          "issuer": "string",
          "terminal": "string",
          "uid": "string",
          "uid_alt": "string",
          "uuid": "string"
        },
        "user": {
          "account": {
            "labels": [
              "string"
            ],
            "name": "string",
            "type": "string",
            "type_id": 0,
            "uid": "string"
          },
          "credential_uid": "string",
          "domain": "string",
          "email_addr": "string",
          "full_name": "string",
          "groups": [
            {
              "desc": "string",
              "domain": "string",
              "name": "string",
              "privileges": [
                "string"
              ],
              "type": "string",
              "uid": "string"
            }
          ],
          "ldap_person": {
            "cost_center": "string",
            "created_time": 0,
            "created_time_dt": "2019-08-24T14:15:22Z",
            "deleted_time": 0,
            "deleted_time_dt": "2019-08-24T14:15:22Z",
            "email_addrs": [
              "string"
            ],
            "employee_uid": "string",
            "given_name": "string",
            "hire_time": 0,
            "hire_time_dt": "2019-08-24T14:15:22Z",
            "job_title": "string",
            "labels": [
              "string"
            ],
            "last_login_time": 0,
            "last_login_time_dt": "2019-08-24T14:15:22Z",
            "ldap_cn": "string",
            "ldap_dn": "string",
            "leave_time": 0,
            "leave_time_dt": "2019-08-24T14:15:22Z",
            "location": {
              "city": "string",
              "continent": "string",
              "coordinates": [
                0.1
              ],
              "country": "string",
              "desc": "string",
              "geohash": "string",
              "is_on_premises": true,
              "isp": "string",
              "lat": 0.1,
              "long": 0.1,
              "postal_code": "string",
              "provider": "string",
              "region": "string"
            },
            "manager": {},
            "modified_time": 0,
            "modified_time_dt": "2019-08-24T14:15:22Z",
            "office_location": "string",
            "surname": "string"
          },
          "mfa_status": "string",
          "mfa_status_id": 0,
          "name": "string",
          "org": {
            "name": "string",
            "ou_name": "string",
            "ou_uid": "string",
            "uid": "string"
          },
          "privileges": [
            "string"
          ],
          "risk_level": "string",
          "risk_level_id": 0,
          "risk_score": 0,
          "type": "string",
          "type_id": 0,
          "uid": "string",
          "uid_alt": "string",
          "user_status": "string",
          "user_status_id": 0
        }
      },
      "api": {
        "group": {
          "desc": "string",
          "domain": "string",
          "name": "string",
          "privileges": [
            "string"
          ],
          "type": "string",
          "uid": "string"
        },
        "operation": "string",
        "request": {
          "containers": [
            {
              "hash": {
                "algorithm": "string",
                "algorithm_id": 0,
                "value": "string"
              },
              "image": {
                "labels": [
                  null
                ],
                "name": "string",
                "path": "string",
                "tag": "string",
                "uid": "string"
              },
              "name": "string",
              "network_driver": "string",
              "orchestrator": "string",
              "pod_uuid": "string",
              "runtime": "string",
              "size": 0,
              "tag": "string",
              "uid": "string"
            }
          ],
          "data": null,
          "flags": [
            "string"
          ],
          "uid": "string"
        },
        "response": {
          "code": 0,
          "containers": [
            {
              "hash": {
                "algorithm": "string",
                "algorithm_id": 0,
                "value": "string"
              },
              "image": {
                "labels": [
                  null
                ],
                "name": "string",
                "path": "string",
                "tag": "string",
                "uid": "string"
              },
              "name": "string",
              "network_driver": "string",
              "orchestrator": "string",
              "pod_uuid": "string",
              "runtime": "string",
              "size": 0,
              "tag": "string",
              "uid": "string"
            }
          ],
          "data": null,
          "error": "string",
          "error_message": "string",
          "flags": [
            "string"
          ],
          "message": "string"
        },
        "service": {
          "labels": [
            "string"
          ],
          "name": "string",
          "uid": "string",
          "version": "string"
        },
        "version": "string"
      },
      "category_name": "string",
      "category_uid": 0,
      "class_uid": 0,
      "cloud": {
        "account": {
          "labels": [
            "string"
          ],
          "name": "string",
          "type": "string",
          "type_id": 0,
          "uid": "string"
        },
        "org": {
          "name": "string",
          "ou_name": "string",
          "ou_uid": "string",
          "uid": "string"
        },
        "project_uid": "string",
        "provider": "string",
        "region": "string",
        "zone": "string"
      },
      "count": 0,
      "custom_fields": {},
      "device": {
        "agent_list": [
          {
            "name": "string",
            "type": "string",
            "type_id": 0,
            "uid": "string",
            "uid_alt": "string",
            "vendor_name": "string",
            "version": "string"
          }
        ],
        "autoscale_uid": "string",
        "boot_time": 0,
        "boot_time_dt": "2019-08-24T14:15:22Z",
        "container": {
          "hash": {
            "algorithm": "string",
            "algorithm_id": 0,
            "value": "string"
          },
          "image": {
            "labels": [
              "string"
            ],
            "name": "string",
            "path": "string",
            "tag": "string",
            "uid": "string"
          },
          "name": "string",
          "network_driver": "string",
          "orchestrator": "string",
          "pod_uuid": "string",
          "runtime": "string",
          "size": 0,
          "tag": "string",
          "uid": "string"
        },
        "created_time": 0,
        "created_time_dt": "2019-08-24T14:15:22Z",
        "desc": "string",
        "domain": "string",
        "first_seen_time": 0,
        "first_seen_time_dt": "2019-08-24T14:15:22Z",
        "groups": [
          {
            "desc": "string",
            "domain": "string",
            "name": "string",
            "privileges": [
              "string"
            ],
            "type": "string",
            "uid": "string"
          }
        ],
        "hostname": "string",
        "hw_info": {
          "bios_date": "string",
          "bios_manufacturer": "string",
          "bios_uid": "string",
          "bios_ver": "string",
          "chassis": "string",
          "cpu_bits": 0,
          "cpu_cores": 0,
          "cpu_count": 0,
          "cpu_speed": 0,
          "cpu_type": "string",
          "desktop_display": {
            "color_depth": 0,
            "physical_height": 0,
            "physical_orientation": 0,
            "physical_width": 0,
            "scale_factor": 0
          },
          "keyboard_info": {
            "function_keys": 0,
            "ime": "string",
            "keyboard_layout": "string",
            "keyboard_subtype": 0,
            "keyboard_type": "string"
          },
          "ram_size": 0,
          "serial_number": "string"
        },
        "hypervisor": "string",
        "image": {
          "labels": [
            "string"
          ],
          "name": "string",
          "path": "string",
          "tag": "string",
          "uid": "string"
        },
        "imei": "string",
        "instance_uid": "string",
        "interface_name": "string",
        "interface_uid": "string",
        "ip": "string",
        "ip_addresses": [
          "string"
        ],
        "is_compliant": true,
        "is_managed": true,
        "is_personal": true,
        "is_trusted": true,
        "last_seen_time": 0,
        "last_seen_time_dt": "2019-08-24T14:15:22Z",
        "location": {
          "city": "string",
          "continent": "string",
          "coordinates": [
            0.1
          ],
          "country": "string",
          "desc": "string",
          "geohash": "string",
          "is_on_premises": true,
          "isp": "string",
          "lat": 0.1,
          "long": 0.1,
          "postal_code": "string",
          "provider": "string",
          "region": "string"
        },
        "mac": "string",
        "mac_addresses": [
          "string"
        ],
        "modified_time": 0,
        "modified_time_dt": "2019-08-24T14:15:22Z",
        "name": "string",
        "namespace_pid": 0,
        "netbios_names": [
          "string"
        ],
        "network_interfaces": [
          {
            "hostname": "string",
            "ip": "string",
            "ip_addresses": [
              "string"
            ],
            "mac": "string",
            "mac_addresses": [
              "string"
            ],
            "name": "string",
            "namespace": "string",
            "subnet_prefix": 0,
            "type": "string",
            "type_id": 0,
            "uid": "string"
          }
        ],
        "network_status": "string",
        "network_status_id": 0,
        "org": {
          "name": "string",
          "ou_name": "string",
          "ou_uid": "string",
          "uid": "string"
        },
        "os": {
          "build": "string",
          "country": "string",
          "cpe_name": "string",
          "cpu_bits": 0,
          "edition": "string",
          "lang": "string",
          "name": "string",
          "sp_name": "string",
          "sp_ver": 0,
          "type": "string",
          "type_id": 0,
          "version": "string"
        },
        "owner": {
          "account": {
            "labels": [
              "string"
            ],
            "name": "string",
            "type": "string",
            "type_id": 0,
            "uid": "string"
          },
          "credential_uid": "string",
          "domain": "string",
          "email_addr": "string",
          "full_name": "string",
          "groups": [
            {
              "desc": "string",
              "domain": "string",
              "name": "string",
              "privileges": [
                "string"
              ],
              "type": "string",
              "uid": "string"
            }
          ],
          "ldap_person": {
            "cost_center": "string",
            "created_time": 0,
            "created_time_dt": "2019-08-24T14:15:22Z",
            "deleted_time": 0,
            "deleted_time_dt": "2019-08-24T14:15:22Z",
            "email_addrs": [
              "string"
            ],
            "employee_uid": "string",
            "given_name": "string",
            "hire_time": 0,
            "hire_time_dt": "2019-08-24T14:15:22Z",
            "job_title": "string",
            "labels": [
              "string"
            ],
            "last_login_time": 0,
            "last_login_time_dt": "2019-08-24T14:15:22Z",
            "ldap_cn": "string",
            "ldap_dn": "string",
            "leave_time": 0,
            "leave_time_dt": "2019-08-24T14:15:22Z",
            "location": {
              "city": "string",
              "continent": "string",
              "coordinates": [
                0.1
              ],
              "country": "string",
              "desc": "string",
              "geohash": "string",
              "is_on_premises": true,
              "isp": "string",
              "lat": 0.1,
              "long": 0.1,
              "postal_code": "string",
              "provider": "string",
              "region": "string"
            },
            "manager": {},
            "modified_time": 0,
            "modified_time_dt": "2019-08-24T14:15:22Z",
            "office_location": "string",
            "surname": "string"
          },
          "mfa_status": "string",
          "mfa_status_id": 0,
          "name": "string",
          "org": {
            "name": "string",
            "ou_name": "string",
            "ou_uid": "string",
            "uid": "string"
          },
          "privileges": [
            "string"
          ],
          "risk_level": "string",
          "risk_level_id": 0,
          "risk_score": 0,
          "type": "string",
          "type_id": 0,
          "uid": "string",
          "uid_alt": "string",
          "user_status": "string",
          "user_status_id": 0
        },
        "region": "string",
        "risk_level": "string",
        "risk_level_id": 0,
        "risk_score": 0,
        "subnet": "string",
        "subnet_uid": "string",
        "sw_info": [
          {
            "cpe_name": "string",
            "feature": {
              "name": "string",
              "uid": "string",
              "version": "string"
            },
            "lang": "string",
            "name": "string",
            "path": "string",
            "uid": "string",
            "url_string": "string",
            "vendor_name": "string",
            "version": "string"
          }
        ],
        "type": "string",
        "type_id": 0,
        "uid": "string",
        "uid_alt": "string",
        "vendor": {
          "name": "string",
          "ou_name": "string",
          "ou_uid": "string",
          "uid": "string"
        },
        "vlan_uid": "string",
        "vpc_uid": "string",
        "zone": "string"
      },
      "duration": 0,
      "end_time": 0,
      "end_time_dt": "2019-08-24T14:15:22Z",
      "enrichments": [
        {
          "created_time": 0,
          "created_time_dt": "2019-08-24T14:15:22Z",
          "data": null,
          "desc": "string",
          "name": "string",
          "provider": "string",
          "reputation": {
            "base_score": 0.1,
            "provider": "string",
            "score": "string",
            "score_id": 0
          },
          "short_desc": "string",
          "src_url": "string",
          "type": "string",
          "value": "string"
        }
      ],
      "message": "string",
      "metadata": {
        "correlation_uid": "string",
        "event_code": "string",
        "extension": {
          "name": "string",
          "uid": "string",
          "version": "string"
        },
        "extensions": [
          {
            "name": "string",
            "uid": "string",
            "version": "string"
          }
        ],
        "labels": [
          "string"
        ],
        "log_level": "string",
        "log_name": "string",
        "log_provider": "string",
        "log_version": "string",
        "logged_time": 0,
        "logged_time_dt": "2019-08-24T14:15:22Z",
        "loggers": [
          {
            "device": {
              "agent_list": [
                {}
              ],
              "autoscale_uid": "string",
              "boot_time": 0,
              "boot_time_dt": "2019-08-24T14:15:22Z",
              "container": {
                "hash": {},
                "image": {
                  "labels": []
                },
                "name": "string",
                "network_driver": "string",
                "orchestrator": "string",
                "pod_uuid": "string",
                "runtime": "string",
                "size": 0,
                "tag": "string",
                "uid": "string"
              },
              "created_time": 0,
              "created_time_dt": "2019-08-24T14:15:22Z",
              "desc": "string",
              "domain": "string",
              "first_seen_time": 0,
              "first_seen_time_dt": "2019-08-24T14:15:22Z",
              "groups": [
                {
                  "privileges": []
                }
              ],
              "hostname": "string",
              "hw_info": {
                "bios_date": "string",
                "bios_manufacturer": "string",
                "bios_uid": "string",
                "bios_ver": "string",
                "chassis": "string",
                "cpu_bits": 0,
                "cpu_cores": 0,
                "cpu_count": 0,
                "cpu_speed": 0,
                "cpu_type": "string",
                "desktop_display": {},
                "keyboard_info": {},
                "ram_size": 0,
                "serial_number": "string"
              },
              "hypervisor": "string",
              "image": {
                "labels": [
                  null
                ],
                "name": "string",
                "path": "string",
                "tag": "string",
                "uid": "string"
              },
              "imei": "string",
              "instance_uid": "string",
              "interface_name": "string",
              "interface_uid": "string",
              "ip": "string",
              "ip_addresses": [
                "string"
              ],
              "is_compliant": true,
              "is_managed": true,
              "is_personal": true,
              "is_trusted": true,
              "last_seen_time": 0,
              "last_seen_time_dt": "2019-08-24T14:15:22Z",
              "location": {
                "city": "string",
                "continent": "string",
                "coordinates": [
                  null
                ],
                "country": "string",
                "desc": "string",
                "geohash": "string",
                "is_on_premises": true,
                "isp": "string",
                "lat": 0.1,
                "long": 0.1,
                "postal_code": "string",
                "provider": "string",
                "region": "string"
              },
              "mac": "string",
              "mac_addresses": [
                "string"
              ],
              "modified_time": 0,
              "modified_time_dt": "2019-08-24T14:15:22Z",
              "name": "string",
              "namespace_pid": 0,
              "netbios_names": [
                "string"
              ],
              "network_interfaces": [
                {
                  "ip_addresses": [],
                  "mac_addresses": []
                }
              ],
              "network_status": "string",
              "network_status_id": 0,
              "org": {
                "name": "string",
                "ou_name": "string",
                "ou_uid": "string",
                "uid": "string"
              },
              "os": {
                "build": "string",
                "country": "string",
                "cpe_name": "string",
                "cpu_bits": 0,
                "edition": "string",
                "lang": "string",
                "name": "string",
                "sp_name": "string",
                "sp_ver": 0,
                "type": "string",
                "type_id": 0,
                "version": "string"
              },
              "owner": {
                "account": {
                  "labels": []
                },
                "credential_uid": "string",
                "domain": "string",
                "email_addr": "string",
                "full_name": "string",
                "groups": [
                  null
                ],
                "ldap_person": {
                  "email_addrs": [],
                  "labels": []
                },
                "mfa_status": "string",
                "mfa_status_id": 0,
                "name": "string",
                "org": {},
                "privileges": [
                  null
                ],
                "risk_level": "string",
                "risk_level_id": 0,
                "risk_score": 0,
                "type": "string",
                "type_id": 0,
                "uid": "string",
                "uid_alt": "string",
                "user_status": "string",
                "user_status_id": 0
              },
              "region": "string",
              "risk_level": "string",
              "risk_level_id": 0,
              "risk_score": 0,
              "subnet": "string",
              "subnet_uid": "string",
              "sw_info": [
                {}
              ],
              "type": "string",
              "type_id": 0,
              "uid": "string",
              "uid_alt": "string",
              "vendor": {
                "name": "string",
                "ou_name": "string",
                "ou_uid": "string",
                "uid": "string"
              },
              "vlan_uid": "string",
              "vpc_uid": "string",
              "zone": "string"
            },
            "log_level": "string",
            "log_name": "string",
            "log_provider": "string",
            "log_version": "string",
            "logged_time": 0,
            "logged_time_dt": "2019-08-24T14:15:22Z",
            "name": "string",
            "product": {
              "cpe_name": "string",
              "feature": {
                "name": "string",
                "uid": "string",
                "version": "string"
              },
              "lang": "string",
              "name": "string",
              "path": "string",
              "uid": "string",
              "url_string": "string",
              "vendor_name": "string",
              "version": "string"
            },
            "transmit_time": 0,
            "transmit_time_dt": "2019-08-24T14:15:22Z",
            "uid": "string",
            "version": "string"
          }
        ],
        "modified_time": 0,
        "modified_time_dt": "2019-08-24T14:15:22Z",
        "original_time": "string",
        "processed_time": 0,
        "processed_time_dt": "2019-08-24T14:15:22Z",
        "product": {
          "cpe_name": "string",
          "feature": {
            "name": "string",
            "uid": "string",
            "version": "string"
          },
          "lang": "string",
          "name": "string",
          "path": "string",
          "uid": "string",
          "url_string": "string",
          "vendor_name": "string",
          "version": "string"
        },
        "profiles": [
          "string"
        ],
        "sequence": 0,
        "tenant_uid": "string",
        "uid": "string",
        "version": "string"
      },
      "observables": [
        {
          "name": "string",
          "reputation": {
            "base_score": 0.1,
            "provider": "string",
            "score": "string",
            "score_id": 0
          },
          "type": "string",
          "type_id": 0,
          "value": "string"
        }
      ],
      "osint": [
        {
          "answers": [
            {
              "class": "string",
              "flag_ids": [
                0
              ],
              "flags": [
                "string"
              ],
              "packet_uid": 0,
              "rdata": "string",
              "ttl": 0,
              "type": "string"
            }
          ],
          "attacks": [
            {
              "sub_technique": {
                "name": "string",
                "src_url": "string",
                "uid": "string"
              },
              "tactic": {
                "name": "string",
                "src_url": "string",
                "uid": "string"
              },
              "tactics": [
                {}
              ],
              "technique": {
                "name": "string",
                "src_url": "string",
                "uid": "string"
              },
              "version": "string"
            }
          ],
          "autonomous_system": {
            "name": "string",
            "number": 0
          },
          "comment": "string",
          "confidence": "string",
          "confidence_id": 0,
          "email": {
            "cc": [
              "string"
            ],
            "delivered_to": "string",
            "from": "string",
            "message_uid": "string",
            "raw_header": "string",
            "reply_to": "string",
            "size": 0,
            "smtp_from": "string",
            "smtp_to": [
              "string"
            ],
            "subject": "string",
            "to": [
              "string"
            ],
            "uid": "string",
            "x_originating_ip": [
              "string"
            ]
          },
          "email_auth": {
            "dkim": "string",
            "dkim_domain": "string",
            "dkim_signature": "string",
            "dmarc": "string",
            "dmarc_override": "string",
            "dmarc_policy": "string",
            "spf": "string"
          },
          "kill_chain": [
            {
              "phase": "string",
              "phase_id": 0
            }
          ],
          "location": {
            "city": "string",
            "continent": "string",
            "coordinates": [
              0.1
            ],
            "country": "string",
            "desc": "string",
            "geohash": "string",
            "is_on_premises": true,
            "isp": "string",
            "lat": 0.1,
            "long": 0.1,
            "postal_code": "string",
            "provider": "string",
            "region": "string"
          },
          "name": "string",
          "signatures": [
            {
              "algorithm": "string",
              "algorithm_id": 0,
              "certificate": {
                "created_time": 0,
                "created_time_dt": "2019-08-24T14:15:22Z",
                "expiration_time": 0,
                "expiration_time_dt": "2019-08-24T14:15:22Z",
                "fingerprints": [
                  null
                ],
                "is_self_signed": true,
                "issuer": "string",
                "serial_number": "string",
                "subject": "string",
                "uid": "string",
                "version": "string"
              },
              "created_time": 0,
              "created_time_dt": "2019-08-24T14:15:22Z",
              "developer_uid": "string",
              "digest": {
                "algorithm": "string",
                "algorithm_id": 0,
                "value": "string"
              },
              "state": "string",
              "state_id": 0
            }
          ],
          "src_url": "string",
          "subdomains": [
            "string"
          ],
          "tlp": "string",
          "type": "string",
          "type_id": 0,
          "uid": "string",
          "value": "string",
          "vendor_name": "string",
          "vulnerabilities": [
            {
              "affected_code": [
                {}
              ],
              "affected_packages": [
                {}
              ],
              "cve": {
                "created_time": 0,
                "created_time_dt": "2019-08-24T14:15:22Z",
                "cvss": [
                  null
                ],
                "cwe": {},
                "cwe_uid": "string",
                "cwe_url": "string",
                "desc": "string",
                "epss": {},
                "modified_time": 0,
                "modified_time_dt": "2019-08-24T14:15:22Z",
                "product": {},
                "references": [
                  null
                ],
                "title": "string",
                "type": "string",
                "uid": "string"
              },
              "cwe": {
                "caption": "string",
                "src_url": "string",
                "uid": "string"
              },
              "desc": "string",
              "first_seen_time": 0,
              "first_seen_time_dt": "2019-08-24T14:15:22Z",
              "fix_available": true,
              "is_exploit_available": true,
              "is_fix_available": true,
              "kb_article_list": [
                {}
              ],
              "kb_articles": [
                "string"
              ],
              "last_seen_time": 0,
              "last_seen_time_dt": "2019-08-24T14:15:22Z",
              "packages": [
                {}
              ],
              "references": [
                "string"
              ],
              "related_vulnerabilities": [
                "string"
              ],
              "remediation": {
                "desc": "string",
                "kb_article_list": [
                  null
                ],
                "kb_articles": [
                  null
                ],
                "references": [
                  null
                ]
              },
              "severity": "string",
              "title": "string",
              "vendor_name": "string"
            }
          ],
          "whois": {
            "autonomous_system": {
              "name": "string",
              "number": 0
            },
            "created_time": 0,
            "created_time_dt": "2019-08-24T14:15:22Z",
            "dnssec_status": "string",
            "dnssec_status_id": 0,
            "domain": "string",
            "domain_contacts": [
              {
                "email_addr": "string",
                "location": {
                  "coordinates": []
                },
                "name": "string",
                "phone_number": "string",
                "type": "string",
                "type_id": 0,
                "uid": "string"
              }
            ],
            "email_addr": "string",
            "last_seen_time": 0,
            "last_seen_time_dt": "2019-08-24T14:15:22Z",
            "name_servers": [
              "string"
            ],
            "phone_number": "string",
            "registrar": "string",
            "status": "string",
            "subdomains": [
              "string"
            ],
            "subnet": "string"
          }
        }
      ],
      "raw_data": "string",
      "severity": "string",
      "severity_id": 0,
      "start_time": 0,
      "start_time_dt": "2019-08-24T14:15:22Z",
      "status": "string",
      "status_code": "string",
      "status_detail": "string",
      "status_id": 0,
      "time": 0,
      "time_dt": "2019-08-24T14:15:22Z",
      "timezone_offset": 0,
      "type_name": "string",
      "type_uid": 0,
      "unmapped": {}
    },
    "source_name": "string"
  }'

Responses

Bodyapplication/json
deviceobject(CreateAssetDevice)required
device.​uidstringrequired

ID of the device.

metaobject(MetaResponse)
Response
application/json
{ "device": { "uid": "string" }, "meta": { "stats": {}, "api": {} } }

Update Asset

Request

update an asset in a vulnerability scanning system

Path
assetIdstringrequired

Uid of the Asset. This will be devices.uid in the OCSF model.

Bodyapplication/jsonrequired
assetobject(ocsfv1.3.0inventoryinfoInventoryInfo)required

Device Inventory Info events report device inventory data that is either logged or proactively collected. For example, when collecting device information from a CMDB or running a network sweep of connected devices.

asset.​activity_idinteger(ocsfv1.3.0inventoryinfoActivityId)required

ActivityId is an enum, and the following values are allowed. 0 - Unknown: The event activity is unknown. 1 - Log: The discovered information is via a log. 2 - Collect: The discovered information is via a collection process. 99 - Other: The event activity is not mapped. See the activity_name attribute, which contains a data source specific value.

asset.​category_uidinteger(ocsfv1.3.0inventoryinfoCategoryUid)required

CategoryUid is an enum, and the following values are allowed. 5 - Discovery: Discovery events report the existence and state of devices, files, configurations, processes, registry keys, and other objects.

asset.​class_uidinteger(ocsfv1.3.0inventoryinfoClassUid)required

ClassUid is an enum, and the following values are allowed. 5001 - DeviceInventoryInfo: Device Inventory Info events report device inventory data that is either logged or proactively collected. For example, when collecting device information from a CMDB or running a network sweep of connected devices.

asset.​deviceobject(ocsfv1.3.0inventoryinfoDevice)required

The Device object represents an addressable computer system or host, which is typically connected to a computer network and participates in the transmission or processing of data within the computer network. Defined by D3FEND d3f:Host.

asset.​device.​type_idinteger(ocsfv1.3.0inventoryinfoDevice_TypeId)required
asset.​device.​agent_listArray of objects or null(ocsfv1.3.0inventoryinfoAgent)

A list of agent objects associated with a device, endpoint, or resource.

asset.​device.​autoscale_uidstring or null

The unique identifier of the cloud autoscale configuration.

asset.​device.​boot_timeinteger(ocsfv1.3.0inventoryinfoTimestamp)

The timestamp format is the number of milliseconds since the Epoch 01/01/1970 00:00:00 UTC. For example 1618524549901.

asset.​device.​boot_time_dtstring or null(date-time)

The time the system was booted.

asset.​device.​containerobject(ocsfv1.3.0inventoryinfoContainer)

The Container object describes an instance of a specific container. A container is a prepackaged, portable system image that runs isolated on an existing system using a container runtime like containerd.

asset.​device.​created_timeinteger(ocsfv1.3.0inventoryinfoTimestamp)

The timestamp format is the number of milliseconds since the Epoch 01/01/1970 00:00:00 UTC. For example 1618524549901.

asset.​device.​created_time_dtstring or null(date-time)

The time when the device was known to have been created.

asset.​device.​descstring or null

The description of the device, ordinarily as reported by the operating system.

asset.​device.​domainstring or null

The network domain where the device resides. For example: work.example.com.

asset.​device.​first_seen_timeinteger(ocsfv1.3.0inventoryinfoTimestamp)

The timestamp format is the number of milliseconds since the Epoch 01/01/1970 00:00:00 UTC. For example 1618524549901.

asset.​device.​first_seen_time_dtstring or null(date-time)

The initial discovery time of the device.

asset.​device.​groupsArray of objects or null(ocsfv1.3.0inventoryinfoGroup)

The group names to which the device belongs. For example: ["Windows Laptops", "Engineering"].

asset.​device.​hostnamestring(ocsfv1.3.0inventoryinfoHostname)

Unique name assigned to a device connected to a computer network. A domain name in general is an Internet address that can be resolved through the Domain Name System (DNS). For example: r2-d2.example.com.

asset.​device.​hw_infoobject(ocsfv1.3.0inventoryinfoDeviceHwInfo)

The Device Hardware Information object contains details and specifications of the physical components that make up a device. This information provides an overview of the hardware capabilities, configuration, and characteristics of the device.

asset.​device.​hypervisorstring or null

The name of the hypervisor running on the device. For example, Xen, VMware, Hyper-V, VirtualBox, etc.

asset.​device.​imageobject(ocsfv1.3.0inventoryinfoImage)

The Image object provides a description of a specific Virtual Machine (VM) or Container image. Defined by D3FEND d3f:ContainerImage.

asset.​device.​imeistring or null

The International Mobile Station Equipment Identifier that is associated with the device.

asset.​device.​instance_uidstring or null

The unique identifier of a VM instance.

asset.​device.​interface_namestring or null

The name of the network interface (e.g. eth2).

asset.​device.​interface_uidstring or null

The unique identifier of the network interface.

asset.​device.​ipstring(ocsfv1.3.0inventoryinfoIPAddress)

Internet Protocol address (IP address), in either IPv4 or IPv6 format. For example, 192.168.200.24 or 2001:0db8:85a3:0000:0000:8a2e:0370:7334.

asset.​device.​ip_addressesArray of strings or null

A list of IP addresses available on the device

asset.​device.​is_compliantboolean or null

The event occurred on a compliant device.

asset.​device.​is_managedboolean or null

The event occurred on a managed device.

asset.​device.​is_personalboolean or null

The event occurred on a personal device.

asset.​device.​is_trustedboolean or null

The event occurred on a trusted device.

asset.​device.​last_seen_timeinteger(ocsfv1.3.0inventoryinfoTimestamp)

The timestamp format is the number of milliseconds since the Epoch 01/01/1970 00:00:00 UTC. For example 1618524549901.

asset.​device.​last_seen_time_dtstring or null(date-time)

The most recent discovery time of the device.

asset.​device.​locationobject(ocsfv1.3.0inventoryinfoLocation)

The Geo Location object describes a geographical location, usually associated with an IP address. Defined by D3FEND d3f:PhysicalLocation.

asset.​device.​macstring(ocsfv1.3.0inventoryinfoMACAddress)

Media Access Control (MAC) address. For example: 18:36:F3:98:4F:9A.

asset.​device.​mac_addressesArray of strings or null

A list of MAC addresses available on the device

asset.​device.​modified_timeinteger(ocsfv1.3.0inventoryinfoTimestamp)

The timestamp format is the number of milliseconds since the Epoch 01/01/1970 00:00:00 UTC. For example 1618524549901.

asset.​device.​modified_time_dtstring or null(date-time)

The time when the device was last known to have been modified.

asset.​device.​namestring or null

The alternate device name, ordinarily as assigned by an administrator.

Note: The Name could be any other string that helps to identify the device, such as a phone number; for example 310-555-1234.

asset.​device.​namespace_pidinteger or null

If running under a process namespace (such as in a container), the process identifier within that process namespace.

asset.​device.​netbios_namesArray of strings or null

A list of NetBIOS names available on the device

asset.​device.​network_interfacesArray of objects or null(ocsfv1.3.0inventoryinfoNetworkInterface)

The network interfaces that are associated with the device, one for each unique MAC address/IP address/hostname/name combination.

Note: The first element of the array is the network information that pertains to the event.

asset.​device.​network_statusstring or null

The network isolation status of the endpoiint

asset.​device.​network_status_idinteger(ocsfv1.3.0inventoryinfoDevice_NetworkStatusId)

DeviceNetworkStatusId is an enum, and the following values are allowed. 1 - NotIsolated: Device is not isolated from the network. 2 - Isolated: Device is isolated from the network. 99 - Unknown: The network isolation status is unknown.

asset.​device.​orgobject(ocsfv1.3.0inventoryinfoOrganization)

The Organization object describes characteristics of an organization or company and its division if any.

asset.​device.​osobject(ocsfv1.3.0inventoryinfoOs)

The Operating System (OS) object describes characteristics of an OS, such as Linux or Windows. Defined by D3FEND d3f:OperatingSystem.

asset.​device.​ownerobject(ocsfv1.3.0inventoryinfoUser)

The User object describes the characteristics of a user/person or a security principal. Defined by D3FEND d3f:UserAccount.

asset.​device.​regionstring or null

The region where the virtual machine is located. For example, an AWS Region.

asset.​device.​risk_levelstring or null

The risk level, normalized to the caption of the risk_level_id value.

asset.​device.​risk_level_idinteger(ocsfv1.3.0inventoryinfoDevice_RiskLevelId)

DeviceRiskLevelId is an enum, and the following values are allowed. 0 - Info 1 - Low 2 - Medium 3 - High 4 - Critical 99 - Other: The risk level is not mapped. See the risk_level attribute, which contains a data source specific value.

asset.​device.​risk_scoreinteger or null

The risk score as reported by the event source.

asset.​device.​subnetstring(ocsfv1.3.0inventoryinfoSubnet)

The subnet represented in a CIDR notation, using the format network_address/prefix_length. The network_address can be in either IPv4 or IPv6 format. The prefix length indicates the number of bits used for the network portion, and the remaining bits are available for host addresses within that subnet.

For example:
  • 192.168.1.0/24
  • 2001:0db8:85a3:0000::/64

asset.​device.​subnet_uidstring or null

The unique identifier of a virtual subnet.

asset.​device.​sw_infoArray of objects or null(ocsfv1.3.0inventoryinfoProduct)

The list of software contained on a device

asset.​device.​typestring or null

The device type. For example: unknown, server, desktop, laptop, tablet, mobile, virtual, browser, plc, scada, dcs, cnc, scientific, medical, lighting, energy, transportation other.

asset.​device.​uidstring or null

The unique identifier of the device. For example the Windows TargetSID or AWS EC2 ARN.

asset.​device.​uid_altstring or null

An alternate unique identifier of the device if any. For example the ActiveDirectory DN.

asset.​device.​vendorobject(ocsfv1.3.0inventoryinfoOrganization)

The Organization object describes characteristics of an organization or company and its division if any.

asset.​device.​vlan_uidstring or null

The Virtual LAN identifier.

asset.​device.​vpc_uidstring or null

The unique identifier of the Virtual Private Cloud (VPC).

asset.​device.​zonestring or null

The network zone or LAN segment.

asset.​metadataobject(ocsfv1.3.0inventoryinfoMetadata)required

The Metadata object describes the metadata associated with the event. Defined by D3FEND d3f:Metadata.

asset.​metadata.​productobject(ocsfv1.3.0inventoryinfoProduct)required

The Product object describes characteristics of a software product.

asset.​metadata.​product.​vendor_namestringrequired

The name of the vendor of the product.

asset.​metadata.​product.​cpe_namestring or null

The Common Platform Enumeration (CPE) name as described by (NIST) For example: cpe:/a:apple:safari:16.2.

asset.​metadata.​product.​featureobject(ocsfv1.3.0inventoryinfoFeature)

The Feature object provides information about the software product feature that generated a specific event. It encompasses details related to the capabilities, components, user interface (UI) design, and performance upgrades associated with the feature.

asset.​metadata.​product.​langstring or null

The two letter lower case language codes, as defined by ISO 639-1. For example: en (English), de (German), or fr (French).

asset.​metadata.​product.​namestring or null

The name of the product.

asset.​metadata.​product.​pathstring or null

The installation path of the product.

asset.​metadata.​product.​uidstring or null

The unique identifier of the product.

asset.​metadata.​product.​url_stringstring(ocsfv1.3.0inventoryinfoURLString)

Uniform Resource Locator (URL) string. For example: http://www.example.com/download/trouble.exe.

asset.​metadata.​product.​versionstring or null

The version of the product, as defined by the event source. For example: 2013.1.3-beta.

asset.​metadata.​versionstringrequired

The version of the OCSF schema, using Semantic Versioning Specification (SemVer). For example: 1.0.0. Event consumers use the version to determine the available event attributes.

asset.​metadata.​correlation_uidstring or null

The unique identifier used to correlate events.

asset.​metadata.​event_codestring or null

The Event ID or Code that the product uses to describe the event.

asset.​metadata.​extensionobject(ocsfv1.3.0inventoryinfoExtension)

The OCSF Schema Extension object provides detailed information about the schema extension used to construct the event. The schema extensions are registered in the extensions.md file.

asset.​metadata.​extensionsArray of objects or null(ocsfv1.3.0inventoryinfoExtension)

The schema extensions used to create the event.

asset.​metadata.​labelsArray of strings or null

The list of category labels attached to the event or specific attributes. Labels are user defined tags or aliases added at normalization time.

For example: ["network", "connection.ip:destination", "device.ip:source"]
asset.​metadata.​log_levelstring or null

The audit level at which an event was generated.

asset.​metadata.​log_namestring or null

The event log name. For example, syslog file name or Windows logging subsystem: Security.

asset.​metadata.​log_providerstring or null

The logging provider or logging service that logged the event. For example, Microsoft-Windows-Security-Auditing.

asset.​metadata.​log_versionstring or null

The event log schema version that specifies the format of the original event. For example syslog version or Cisco Log Schema Version.

asset.​metadata.​logged_timeinteger(ocsfv1.3.0inventoryinfoTimestamp)

The timestamp format is the number of milliseconds since the Epoch 01/01/1970 00:00:00 UTC. For example 1618524549901.

asset.​metadata.​logged_time_dtstring or null(date-time)

The time when the logging system collected and logged the event.

This attribute is distinct from the event time in that event time typically contain the time extracted from the original event. Most of the time, these two times will be different.
asset.​metadata.​loggersArray of objects or null(ocsfv1.3.0inventoryinfoLogger)

An array of Logger objects that describe the devices and logging products between the event source and its eventual destination. Note, this attribute can be used when there is a complex end-to-end path of event flow.

asset.​metadata.​modified_timeinteger(ocsfv1.3.0inventoryinfoTimestamp)

The timestamp format is the number of milliseconds since the Epoch 01/01/1970 00:00:00 UTC. For example 1618524549901.

asset.​metadata.​modified_time_dtstring or null(date-time)

The time when the event was last modified or enriched.

asset.​metadata.​original_timestring or null

The original event time as reported by the event source. For example, the time in the original format from system event log such as Syslog on Unix/Linux and the System event file on Windows. Omit if event is generated instead of collected via logs.

asset.​metadata.​processed_timeinteger(ocsfv1.3.0inventoryinfoTimestamp)

The timestamp format is the number of milliseconds since the Epoch 01/01/1970 00:00:00 UTC. For example 1618524549901.

asset.​metadata.​processed_time_dtstring or null(date-time)

The event processed time, such as an ETL operation.

asset.​metadata.​profilesArray of strings or null

The list of profiles used to create the event. Profiles should be referenced by their name attribute for core profiles, or extension/name for profiles from extensions.

asset.​metadata.​sequenceinteger or null

Sequence number of the event. The sequence number is a value available in some events, to make the exact ordering of events unambiguous, regardless of the event time precision.

asset.​metadata.​tenant_uidstring or null

The unique tenant identifier.

asset.​metadata.​uidstring or null

The logging system-assigned unique identifier of an event instance.

asset.​severity_idinteger(ocsfv1.3.0inventoryinfoSeverityId)required

SeverityId is an enum, and the following values are allowed. 0 - Unknown: The event/finding severity is unknown. 1 - Informational: Informational message. No action required. 2 - Low: The user decides if action is needed. 3 - Medium: Action is required but the situation is not serious at this time. 4 - High: Action is required immediately. 5 - Critical: Action is required immediately and the scope is broad. 6 - Fatal: An error occurred but it is too late to take remedial action. 99 - Other: The event/finding severity is not mapped. See the severity attribute, which contains a data source specific value.

asset.​timeinteger(ocsfv1.3.0inventoryinfoTimestamp)required

The timestamp format is the number of milliseconds since the Epoch 01/01/1970 00:00:00 UTC. For example 1618524549901.

asset.​type_uidinteger(ocsfv1.3.0inventoryinfoTypeUid)required

TypeUid is an enum, and the following values are allowed. 500100 - Unknown 500101 - Log: The discovered information is via a log. 500102 - Collect: The discovered information is via a collection process. 500199 - Other

asset.​activity_namestring or null

The event activity name, as defined by the activity_id.

asset.​actorobject(ocsfv1.3.0inventoryinfoActor)

The Actor object contains details about the user, role, application, service, or process that initiated or performed a specific activity.

asset.​apiobject(ocsfv1.3.0inventoryinfoApi)

The API, or Application Programming Interface, object represents information pertaining to an API request and response.

asset.​category_namestring or null

The event category name, as defined by category_uid value: Discovery.

asset.​cloudobject(ocsfv1.3.0inventoryinfoCloud)

The Cloud object contains information about a cloud account such as AWS Account ID, regions, etc.

asset.​countinteger or null

The number of times that events in the same logical group occurred during the event Start Time to End Time period.

asset.​custom_fieldsobject(ocsfv1.3.0inventoryinfoObject)

An unordered collection of attributes. It defines a set of attributes available in all objects. It can be also used as a generic object to log objects that are not otherwise defined by the schema.

asset.​durationinteger or null

The event duration or aggregate time, the amount of time the event covers from start_time to end_time in milliseconds.

asset.​end_timeinteger(ocsfv1.3.0inventoryinfoTimestamp)

The timestamp format is the number of milliseconds since the Epoch 01/01/1970 00:00:00 UTC. For example 1618524549901.

asset.​end_time_dtstring or null(date-time)

The end time of a time period, or the time of the most recent event included in the aggregate event.

asset.​enrichmentsArray of objects or null(ocsfv1.3.0inventoryinfoEnrichment)

The additional information from an external data source, which is associated with the event or a finding. For example add location information for the IP address in the DNS answers:

[{"name": "answers.ip", "value": "92.24.47.250", "type": "location", "data": {"city": "Socotra", "continent": "Asia", "coordinates": [-25.4153, 17.0743], "country": "YE", "desc": "Yemen"}}]

asset.​messagestring or null

The description of the event/finding, as defined by the source.

asset.​observablesArray of objects or null(ocsfv1.3.0inventoryinfoObservable)

The observables associated with the event or a finding.

asset.​osintArray of objects or null(ocsfv1.3.0inventoryinfoOsint)

The OSINT (Open Source Intelligence) object contains details related to an indicator such as the indicator itself, related indicators, geolocation, registrar information, subdomains, analyst commentary, and other contextual information. This information can be used to further enrich a detection or finding by providing decisioning support to other analysts and engineers.

asset.​raw_datastring or null

The raw event/finding data as received from the source.

asset.​severitystring or null

The event/finding severity, normalized to the caption of the severity_id value. In the case of 'Other', it is defined by the source.

asset.​start_timeinteger(ocsfv1.3.0inventoryinfoTimestamp)

The timestamp format is the number of milliseconds since the Epoch 01/01/1970 00:00:00 UTC. For example 1618524549901.

asset.​start_time_dtstring or null(date-time)

The start time of a time period, or the time of the least recent event included in the aggregate event.

asset.​statusstring or null

The event status, normalized to the caption of the status_id value. In the case of 'Other', it is defined by the event source.

asset.​status_codestring or null

The event status code, as reported by the event source.

For example, in a Windows Failed Authentication event, this would be the value of 'Failure Code', e.g. 0x18.

asset.​status_detailstring or null

The status detail contains additional information about the event/finding outcome.

asset.​status_idinteger(ocsfv1.3.0inventoryinfoStatusId)

StatusId is an enum, and the following values are allowed. 0 - Unknown: The status is unknown. 1 - Success 2 - Failure 99 - Other: The event status is not mapped. See the status attribute, which contains a data source specific value.

asset.​time_dtstring or null(date-time)

The normalized event occurrence time or the finding creation time.

asset.​timezone_offsetinteger or null

The number of minutes that the reported event time is ahead or behind UTC, in the range -1,080 to +1,080.

asset.​type_namestring or null

The event/finding type name, as defined by the type_uid.

asset.​unmappedobject(ocsfv1.3.0inventoryinfoObject)

An unordered collection of attributes. It defines a set of attributes available in all objects. It can be also used as a generic object to log objects that are not otherwise defined by the schema.

source_namestringrequired

Name of the source that created the asset.

curl -i -X PUT \
  'https://api.synqly.com/v1/vulnerabilities/assets/{assetId}' \
  -H 'Authorization: Bearer <YOUR_TOKEN_HERE>' \
  -H 'Content-Type: application/json' \
  -d '{
    "asset": {
      "activity_id": 0,
      "activity_name": "string",
      "actor": {
        "app_name": "string",
        "app_uid": "string",
        "authorizations": [
          {
            "decision": "string",
            "policy": {
              "desc": "string",
              "group": {
                "desc": "string",
                "domain": "string",
                "name": "string",
                "privileges": [
                  null
                ],
                "type": "string",
                "uid": "string"
              },
              "is_applied": true,
              "name": "string",
              "uid": "string",
              "version": "string"
            }
          }
        ],
        "idp": {
          "name": "string",
          "uid": "string"
        },
        "invoked_by": "string",
        "process": {
          "auid": 0,
          "cmd_line": "string",
          "container": {
            "hash": {
              "algorithm": "string",
              "algorithm_id": 0,
              "value": "string"
            },
            "image": {
              "labels": [
                "string"
              ],
              "name": "string",
              "path": "string",
              "tag": "string",
              "uid": "string"
            },
            "name": "string",
            "network_driver": "string",
            "orchestrator": "string",
            "pod_uuid": "string",
            "runtime": "string",
            "size": 0,
            "tag": "string",
            "uid": "string"
          },
          "created_time": 0,
          "created_time_dt": "2019-08-24T14:15:22Z",
          "egid": 0,
          "euid": 0,
          "file": {
            "accessed_time": 0,
            "accessed_time_dt": "2019-08-24T14:15:22Z",
            "accessor": {
              "account": {
                "labels": [
                  null
                ],
                "name": "string",
                "type": "string",
                "type_id": 0,
                "uid": "string"
              },
              "credential_uid": "string",
              "domain": "string",
              "email_addr": "string",
              "full_name": "string",
              "groups": [
                {
                  "privileges": []
                }
              ],
              "ldap_person": {
                "cost_center": "string",
                "created_time": 0,
                "created_time_dt": "2019-08-24T14:15:22Z",
                "deleted_time": 0,
                "deleted_time_dt": "2019-08-24T14:15:22Z",
                "email_addrs": [
                  null
                ],
                "employee_uid": "string",
                "given_name": "string",
                "hire_time": 0,
                "hire_time_dt": "2019-08-24T14:15:22Z",
                "job_title": "string",
                "labels": [
                  null
                ],
                "last_login_time": 0,
                "last_login_time_dt": "2019-08-24T14:15:22Z",
                "ldap_cn": "string",
                "ldap_dn": "string",
                "leave_time": 0,
                "leave_time_dt": "2019-08-24T14:15:22Z",
                "location": {
                  "coordinates": []
                },
                "manager": {},
                "modified_time": 0,
                "modified_time_dt": "2019-08-24T14:15:22Z",
                "office_location": "string",
                "surname": "string"
              },
              "mfa_status": "string",
              "mfa_status_id": 0,
              "name": "string",
              "org": {
                "name": "string",
                "ou_name": "string",
                "ou_uid": "string",
                "uid": "string"
              },
              "privileges": [
                "string"
              ],
              "risk_level": "string",
              "risk_level_id": 0,
              "risk_score": 0,
              "type": "string",
              "type_id": 0,
              "uid": "string",
              "uid_alt": "string",
              "user_status": "string",
              "user_status_id": 0
            },
            "attributes": 0,
            "company_name": "string",
            "confidentiality": "string",
            "confidentiality_id": 0,
            "created_time": 0,
            "created_time_dt": "2019-08-24T14:15:22Z",
            "creator": {
              "account": {
                "labels": [
                  null
                ],
                "name": "string",
                "type": "string",
                "type_id": 0,
                "uid": "string"
              },
              "credential_uid": "string",
              "domain": "string",
              "email_addr": "string",
              "full_name": "string",
              "groups": [
                {
                  "privileges": []
                }
              ],
              "ldap_person": {
                "cost_center": "string",
                "created_time": 0,
                "created_time_dt": "2019-08-24T14:15:22Z",
                "deleted_time": 0,
                "deleted_time_dt": "2019-08-24T14:15:22Z",
                "email_addrs": [
                  null
                ],
                "employee_uid": "string",
                "given_name": "string",
                "hire_time": 0,
                "hire_time_dt": "2019-08-24T14:15:22Z",
                "job_title": "string",
                "labels": [
                  null
                ],
                "last_login_time": 0,
                "last_login_time_dt": "2019-08-24T14:15:22Z",
                "ldap_cn": "string",
                "ldap_dn": "string",
                "leave_time": 0,
                "leave_time_dt": "2019-08-24T14:15:22Z",
                "location": {
                  "coordinates": []
                },
                "manager": {},
                "modified_time": 0,
                "modified_time_dt": "2019-08-24T14:15:22Z",
                "office_location": "string",
                "surname": "string"
              },
              "mfa_status": "string",
              "mfa_status_id": 0,
              "name": "string",
              "org": {
                "name": "string",
                "ou_name": "string",
                "ou_uid": "string",
                "uid": "string"
              },
              "privileges": [
                "string"
              ],
              "risk_level": "string",
              "risk_level_id": 0,
              "risk_score": 0,
              "type": "string",
              "type_id": 0,
              "uid": "string",
              "uid_alt": "string",
              "user_status": "string",
              "user_status_id": 0
            },
            "desc": "string",
            "ext": "string",
            "hashes": [
              {
                "algorithm": "string",
                "algorithm_id": 0,
                "value": "string"
              }
            ],
            "is_system": true,
            "mime_type": "string",
            "modified_time": 0,
            "modified_time_dt": "2019-08-24T14:15:22Z",
            "modifier": {
              "account": {
                "labels": [
                  null
                ],
                "name": "string",
                "type": "string",
                "type_id": 0,
                "uid": "string"
              },
              "credential_uid": "string",
              "domain": "string",
              "email_addr": "string",
              "full_name": "string",
              "groups": [
                {
                  "privileges": []
                }
              ],
              "ldap_person": {
                "cost_center": "string",
                "created_time": 0,
                "created_time_dt": "2019-08-24T14:15:22Z",
                "deleted_time": 0,
                "deleted_time_dt": "2019-08-24T14:15:22Z",
                "email_addrs": [
                  null
                ],
                "employee_uid": "string",
                "given_name": "string",
                "hire_time": 0,
                "hire_time_dt": "2019-08-24T14:15:22Z",
                "job_title": "string",
                "labels": [
                  null
                ],
                "last_login_time": 0,
                "last_login_time_dt": "2019-08-24T14:15:22Z",
                "ldap_cn": "string",
                "ldap_dn": "string",
                "leave_time": 0,
                "leave_time_dt": "2019-08-24T14:15:22Z",
                "location": {
                  "coordinates": []
                },
                "manager": {},
                "modified_time": 0,
                "modified_time_dt": "2019-08-24T14:15:22Z",
                "office_location": "string",
                "surname": "string"
              },
              "mfa_status": "string",
              "mfa_status_id": 0,
              "name": "string",
              "org": {
                "name": "string",
                "ou_name": "string",
                "ou_uid": "string",
                "uid": "string"
              },
              "privileges": [
                "string"
              ],
              "risk_level": "string",
              "risk_level_id": 0,
              "risk_score": 0,
              "type": "string",
              "type_id": 0,
              "uid": "string",
              "uid_alt": "string",
              "user_status": "string",
              "user_status_id": 0
            },
            "name": "string",
            "owner": {
              "account": {
                "labels": [
                  null
                ],
                "name": "string",
                "type": "string",
                "type_id": 0,
                "uid": "string"
              },
              "credential_uid": "string",
              "domain": "string",
              "email_addr": "string",
              "full_name": "string",
              "groups": [
                {
                  "privileges": []
                }
              ],
              "ldap_person": {
                "cost_center": "string",
                "created_time": 0,
                "created_time_dt": "2019-08-24T14:15:22Z",
                "deleted_time": 0,
                "deleted_time_dt": "2019-08-24T14:15:22Z",
                "email_addrs": [
                  null
                ],
                "employee_uid": "string",
                "given_name": "string",
                "hire_time": 0,
                "hire_time_dt": "2019-08-24T14:15:22Z",
                "job_title": "string",
                "labels": [
                  null
                ],
                "last_login_time": 0,
                "last_login_time_dt": "2019-08-24T14:15:22Z",
                "ldap_cn": "string",
                "ldap_dn": "string",
                "leave_time": 0,
                "leave_time_dt": "2019-08-24T14:15:22Z",
                "location": {
                  "coordinates": []
                },
                "manager": {},
                "modified_time": 0,
                "modified_time_dt": "2019-08-24T14:15:22Z",
                "office_location": "string",
                "surname": "string"
              },
              "mfa_status": "string",
              "mfa_status_id": 0,
              "name": "string",
              "org": {
                "name": "string",
                "ou_name": "string",
                "ou_uid": "string",
                "uid": "string"
              },
              "privileges": [
                "string"
              ],
              "risk_level": "string",
              "risk_level_id": 0,
              "risk_score": 0,
              "type": "string",
              "type_id": 0,
              "uid": "string",
              "uid_alt": "string",
              "user_status": "string",
              "user_status_id": 0
            },
            "parent_folder": "string",
            "path": "string",
            "product": {
              "cpe_name": "string",
              "feature": {
                "name": "string",
                "uid": "string",
                "version": "string"
              },
              "lang": "string",
              "name": "string",
              "path": "string",
              "uid": "string",
              "url_string": "string",
              "vendor_name": "string",
              "version": "string"
            },
            "security_descriptor": "string",
            "signature": {
              "algorithm": "string",
              "algorithm_id": 0,
              "certificate": {
                "created_time": 0,
                "created_time_dt": "2019-08-24T14:15:22Z",
                "expiration_time": 0,
                "expiration_time_dt": "2019-08-24T14:15:22Z",
                "fingerprints": [
                  null
                ],
                "is_self_signed": true,
                "issuer": "string",
                "serial_number": "string",
                "subject": "string",
                "uid": "string",
                "version": "string"
              },
              "created_time": 0,
              "created_time_dt": "2019-08-24T14:15:22Z",
              "developer_uid": "string",
              "digest": {
                "algorithm": "string",
                "algorithm_id": 0,
                "value": "string"
              },
              "state": "string",
              "state_id": 0
            },
            "size": 0,
            "type": "string",
            "type_id": 0,
            "uid": "string",
            "version": "string",
            "xattributes": {}
          },
          "group": {
            "desc": "string",
            "domain": "string",
            "name": "string",
            "privileges": [
              "string"
            ],
            "type": "string",
            "uid": "string"
          },
          "integrity": "string",
          "integrity_id": 0,
          "lineage": [
            "string"
          ],
          "loaded_modules": [
            "string"
          ],
          "name": "string",
          "namespace_pid": 0,
          "parent_process": {},
          "pid": 0,
          "sandbox": "string",
          "session": {
            "count": 0,
            "created_time": 0,
            "created_time_dt": "2019-08-24T14:15:22Z",
            "credential_uid": "string",
            "expiration_reason": "string",
            "expiration_time": 0,
            "expiration_time_dt": "2019-08-24T14:15:22Z",
            "is_mfa": true,
            "is_remote": true,
            "is_vpn": true,
            "issuer": "string",
            "terminal": "string",
            "uid": "string",
            "uid_alt": "string",
            "uuid": "string"
          },
          "terminated_time": 0,
          "terminated_time_dt": "2019-08-24T14:15:22Z",
          "tid": 0,
          "uid": "string",
          "user": {
            "account": {
              "labels": [
                "string"
              ],
              "name": "string",
              "type": "string",
              "type_id": 0,
              "uid": "string"
            },
            "credential_uid": "string",
            "domain": "string",
            "email_addr": "string",
            "full_name": "string",
            "groups": [
              {
                "desc": "string",
                "domain": "string",
                "name": "string",
                "privileges": [
                  null
                ],
                "type": "string",
                "uid": "string"
              }
            ],
            "ldap_person": {
              "cost_center": "string",
              "created_time": 0,
              "created_time_dt": "2019-08-24T14:15:22Z",
              "deleted_time": 0,
              "deleted_time_dt": "2019-08-24T14:15:22Z",
              "email_addrs": [
                "string"
              ],
              "employee_uid": "string",
              "given_name": "string",
              "hire_time": 0,
              "hire_time_dt": "2019-08-24T14:15:22Z",
              "job_title": "string",
              "labels": [
                "string"
              ],
              "last_login_time": 0,
              "last_login_time_dt": "2019-08-24T14:15:22Z",
              "ldap_cn": "string",
              "ldap_dn": "string",
              "leave_time": 0,
              "leave_time_dt": "2019-08-24T14:15:22Z",
              "location": {
                "city": "string",
                "continent": "string",
                "coordinates": [
                  null
                ],
                "country": "string",
                "desc": "string",
                "geohash": "string",
                "is_on_premises": true,
                "isp": "string",
                "lat": 0.1,
                "long": 0.1,
                "postal_code": "string",
                "provider": "string",
                "region": "string"
              },
              "manager": {},
              "modified_time": 0,
              "modified_time_dt": "2019-08-24T14:15:22Z",
              "office_location": "string",
              "surname": "string"
            },
            "mfa_status": "string",
            "mfa_status_id": 0,
            "name": "string",
            "org": {
              "name": "string",
              "ou_name": "string",
              "ou_uid": "string",
              "uid": "string"
            },
            "privileges": [
              "string"
            ],
            "risk_level": "string",
            "risk_level_id": 0,
            "risk_score": 0,
            "type": "string",
            "type_id": 0,
            "uid": "string",
            "uid_alt": "string",
            "user_status": "string",
            "user_status_id": 0
          },
          "xattributes": {}
        },
        "session": {
          "count": 0,
          "created_time": 0,
          "created_time_dt": "2019-08-24T14:15:22Z",
          "credential_uid": "string",
          "expiration_reason": "string",
          "expiration_time": 0,
          "expiration_time_dt": "2019-08-24T14:15:22Z",
          "is_mfa": true,
          "is_remote": true,
          "is_vpn": true,
          "issuer": "string",
          "terminal": "string",
          "uid": "string",
          "uid_alt": "string",
          "uuid": "string"
        },
        "user": {
          "account": {
            "labels": [
              "string"
            ],
            "name": "string",
            "type": "string",
            "type_id": 0,
            "uid": "string"
          },
          "credential_uid": "string",
          "domain": "string",
          "email_addr": "string",
          "full_name": "string",
          "groups": [
            {
              "desc": "string",
              "domain": "string",
              "name": "string",
              "privileges": [
                "string"
              ],
              "type": "string",
              "uid": "string"
            }
          ],
          "ldap_person": {
            "cost_center": "string",
            "created_time": 0,
            "created_time_dt": "2019-08-24T14:15:22Z",
            "deleted_time": 0,
            "deleted_time_dt": "2019-08-24T14:15:22Z",
            "email_addrs": [
              "string"
            ],
            "employee_uid": "string",
            "given_name": "string",
            "hire_time": 0,
            "hire_time_dt": "2019-08-24T14:15:22Z",
            "job_title": "string",
            "labels": [
              "string"
            ],
            "last_login_time": 0,
            "last_login_time_dt": "2019-08-24T14:15:22Z",
            "ldap_cn": "string",
            "ldap_dn": "string",
            "leave_time": 0,
            "leave_time_dt": "2019-08-24T14:15:22Z",
            "location": {
              "city": "string",
              "continent": "string",
              "coordinates": [
                0.1
              ],
              "country": "string",
              "desc": "string",
              "geohash": "string",
              "is_on_premises": true,
              "isp": "string",
              "lat": 0.1,
              "long": 0.1,
              "postal_code": "string",
              "provider": "string",
              "region": "string"
            },
            "manager": {},
            "modified_time": 0,
            "modified_time_dt": "2019-08-24T14:15:22Z",
            "office_location": "string",
            "surname": "string"
          },
          "mfa_status": "string",
          "mfa_status_id": 0,
          "name": "string",
          "org": {
            "name": "string",
            "ou_name": "string",
            "ou_uid": "string",
            "uid": "string"
          },
          "privileges": [
            "string"
          ],
          "risk_level": "string",
          "risk_level_id": 0,
          "risk_score": 0,
          "type": "string",
          "type_id": 0,
          "uid": "string",
          "uid_alt": "string",
          "user_status": "string",
          "user_status_id": 0
        }
      },
      "api": {
        "group": {
          "desc": "string",
          "domain": "string",
          "name": "string",
          "privileges": [
            "string"
          ],
          "type": "string",
          "uid": "string"
        },
        "operation": "string",
        "request": {
          "containers": [
            {
              "hash": {
                "algorithm": "string",
                "algorithm_id": 0,
                "value": "string"
              },
              "image": {
                "labels": [
                  null
                ],
                "name": "string",
                "path": "string",
                "tag": "string",
                "uid": "string"
              },
              "name": "string",
              "network_driver": "string",
              "orchestrator": "string",
              "pod_uuid": "string",
              "runtime": "string",
              "size": 0,
              "tag": "string",
              "uid": "string"
            }
          ],
          "data": null,
          "flags": [
            "string"
          ],
          "uid": "string"
        },
        "response": {
          "code": 0,
          "containers": [
            {
              "hash": {
                "algorithm": "string",
                "algorithm_id": 0,
                "value": "string"
              },
              "image": {
                "labels": [
                  null
                ],
                "name": "string",
                "path": "string",
                "tag": "string",
                "uid": "string"
              },
              "name": "string",
              "network_driver": "string",
              "orchestrator": "string",
              "pod_uuid": "string",
              "runtime": "string",
              "size": 0,
              "tag": "string",
              "uid": "string"
            }
          ],
          "data": null,
          "error": "string",
          "error_message": "string",
          "flags": [
            "string"
          ],
          "message": "string"
        },
        "service": {
          "labels": [
            "string"
          ],
          "name": "string",
          "uid": "string",
          "version": "string"
        },
        "version": "string"
      },
      "category_name": "string",
      "category_uid": 0,
      "class_uid": 0,
      "cloud": {
        "account": {
          "labels": [
            "string"
          ],
          "name": "string",
          "type": "string",
          "type_id": 0,
          "uid": "string"
        },
        "org": {
          "name": "string",
          "ou_name": "string",
          "ou_uid": "string",
          "uid": "string"
        },
        "project_uid": "string",
        "provider": "string",
        "region": "string",
        "zone": "string"
      },
      "count": 0,
      "custom_fields": {},
      "device": {
        "agent_list": [
          {
            "name": "string",
            "type": "string",
            "type_id": 0,
            "uid": "string",
            "uid_alt": "string",
            "vendor_name": "string",
            "version": "string"
          }
        ],
        "autoscale_uid": "string",
        "boot_time": 0,
        "boot_time_dt": "2019-08-24T14:15:22Z",
        "container": {
          "hash": {
            "algorithm": "string",
            "algorithm_id": 0,
            "value": "string"
          },
          "image": {
            "labels": [
              "string"
            ],
            "name": "string",
            "path": "string",
            "tag": "string",
            "uid": "string"
          },
          "name": "string",
          "network_driver": "string",
          "orchestrator": "string",
          "pod_uuid": "string",
          "runtime": "string",
          "size": 0,
          "tag": "string",
          "uid": "string"
        },
        "created_time": 0,
        "created_time_dt": "2019-08-24T14:15:22Z",
        "desc": "string",
        "domain": "string",
        "first_seen_time": 0,
        "first_seen_time_dt": "2019-08-24T14:15:22Z",
        "groups": [
          {
            "desc": "string",
            "domain": "string",
            "name": "string",
            "privileges": [
              "string"
            ],
            "type": "string",
            "uid": "string"
          }
        ],
        "hostname": "string",
        "hw_info": {
          "bios_date": "string",
          "bios_manufacturer": "string",
          "bios_uid": "string",
          "bios_ver": "string",
          "chassis": "string",
          "cpu_bits": 0,
          "cpu_cores": 0,
          "cpu_count": 0,
          "cpu_speed": 0,
          "cpu_type": "string",
          "desktop_display": {
            "color_depth": 0,
            "physical_height": 0,
            "physical_orientation": 0,
            "physical_width": 0,
            "scale_factor": 0
          },
          "keyboard_info": {
            "function_keys": 0,
            "ime": "string",
            "keyboard_layout": "string",
            "keyboard_subtype": 0,
            "keyboard_type": "string"
          },
          "ram_size": 0,
          "serial_number": "string"
        },
        "hypervisor": "string",
        "image": {
          "labels": [
            "string"
          ],
          "name": "string",
          "path": "string",
          "tag": "string",
          "uid": "string"
        },
        "imei": "string",
        "instance_uid": "string",
        "interface_name": "string",
        "interface_uid": "string",
        "ip": "string",
        "ip_addresses": [
          "string"
        ],
        "is_compliant": true,
        "is_managed": true,
        "is_personal": true,
        "is_trusted": true,
        "last_seen_time": 0,
        "last_seen_time_dt": "2019-08-24T14:15:22Z",
        "location": {
          "city": "string",
          "continent": "string",
          "coordinates": [
            0.1
          ],
          "country": "string",
          "desc": "string",
          "geohash": "string",
          "is_on_premises": true,
          "isp": "string",
          "lat": 0.1,
          "long": 0.1,
          "postal_code": "string",
          "provider": "string",
          "region": "string"
        },
        "mac": "string",
        "mac_addresses": [
          "string"
        ],
        "modified_time": 0,
        "modified_time_dt": "2019-08-24T14:15:22Z",
        "name": "string",
        "namespace_pid": 0,
        "netbios_names": [
          "string"
        ],
        "network_interfaces": [
          {
            "hostname": "string",
            "ip": "string",
            "ip_addresses": [
              "string"
            ],
            "mac": "string",
            "mac_addresses": [
              "string"
            ],
            "name": "string",
            "namespace": "string",
            "subnet_prefix": 0,
            "type": "string",
            "type_id": 0,
            "uid": "string"
          }
        ],
        "network_status": "string",
        "network_status_id": 0,
        "org": {
          "name": "string",
          "ou_name": "string",
          "ou_uid": "string",
          "uid": "string"
        },
        "os": {
          "build": "string",
          "country": "string",
          "cpe_name": "string",
          "cpu_bits": 0,
          "edition": "string",
          "lang": "string",
          "name": "string",
          "sp_name": "string",
          "sp_ver": 0,
          "type": "string",
          "type_id": 0,
          "version": "string"
        },
        "owner": {
          "account": {
            "labels": [
              "string"
            ],
            "name": "string",
            "type": "string",
            "type_id": 0,
            "uid": "string"
          },
          "credential_uid": "string",
          "domain": "string",
          "email_addr": "string",
          "full_name": "string",
          "groups": [
            {
              "desc": "string",
              "domain": "string",
              "name": "string",
              "privileges": [
                "string"
              ],
              "type": "string",
              "uid": "string"
            }
          ],
          "ldap_person": {
            "cost_center": "string",
            "created_time": 0,
            "created_time_dt": "2019-08-24T14:15:22Z",
            "deleted_time": 0,
            "deleted_time_dt": "2019-08-24T14:15:22Z",
            "email_addrs": [
              "string"
            ],
            "employee_uid": "string",
            "given_name": "string",
            "hire_time": 0,
            "hire_time_dt": "2019-08-24T14:15:22Z",
            "job_title": "string",
            "labels": [
              "string"
            ],
            "last_login_time": 0,
            "last_login_time_dt": "2019-08-24T14:15:22Z",
            "ldap_cn": "string",
            "ldap_dn": "string",
            "leave_time": 0,
            "leave_time_dt": "2019-08-24T14:15:22Z",
            "location": {
              "city": "string",
              "continent": "string",
              "coordinates": [
                0.1
              ],
              "country": "string",
              "desc": "string",
              "geohash": "string",
              "is_on_premises": true,
              "isp": "string",
              "lat": 0.1,
              "long": 0.1,
              "postal_code": "string",
              "provider": "string",
              "region": "string"
            },
            "manager": {},
            "modified_time": 0,
            "modified_time_dt": "2019-08-24T14:15:22Z",
            "office_location": "string",
            "surname": "string"
          },
          "mfa_status": "string",
          "mfa_status_id": 0,
          "name": "string",
          "org": {
            "name": "string",
            "ou_name": "string",
            "ou_uid": "string",
            "uid": "string"
          },
          "privileges": [
            "string"
          ],
          "risk_level": "string",
          "risk_level_id": 0,
          "risk_score": 0,
          "type": "string",
          "type_id": 0,
          "uid": "string",
          "uid_alt": "string",
          "user_status": "string",
          "user_status_id": 0
        },
        "region": "string",
        "risk_level": "string",
        "risk_level_id": 0,
        "risk_score": 0,
        "subnet": "string",
        "subnet_uid": "string",
        "sw_info": [
          {
            "cpe_name": "string",
            "feature": {
              "name": "string",
              "uid": "string",
              "version": "string"
            },
            "lang": "string",
            "name": "string",
            "path": "string",
            "uid": "string",
            "url_string": "string",
            "vendor_name": "string",
            "version": "string"
          }
        ],
        "type": "string",
        "type_id": 0,
        "uid": "string",
        "uid_alt": "string",
        "vendor": {
          "name": "string",
          "ou_name": "string",
          "ou_uid": "string",
          "uid": "string"
        },
        "vlan_uid": "string",
        "vpc_uid": "string",
        "zone": "string"
      },
      "duration": 0,
      "end_time": 0,
      "end_time_dt": "2019-08-24T14:15:22Z",
      "enrichments": [
        {
          "created_time": 0,
          "created_time_dt": "2019-08-24T14:15:22Z",
          "data": null,
          "desc": "string",
          "name": "string",
          "provider": "string",
          "reputation": {
            "base_score": 0.1,
            "provider": "string",
            "score": "string",
            "score_id": 0
          },
          "short_desc": "string",
          "src_url": "string",
          "type": "string",
          "value": "string"
        }
      ],
      "message": "string",
      "metadata": {
        "correlation_uid": "string",
        "event_code": "string",
        "extension": {
          "name": "string",
          "uid": "string",
          "version": "string"
        },
        "extensions": [
          {
            "name": "string",
            "uid": "string",
            "version": "string"
          }
        ],
        "labels": [
          "string"
        ],
        "log_level": "string",
        "log_name": "string",
        "log_provider": "string",
        "log_version": "string",
        "logged_time": 0,
        "logged_time_dt": "2019-08-24T14:15:22Z",
        "loggers": [
          {
            "device": {
              "agent_list": [
                {}
              ],
              "autoscale_uid": "string",
              "boot_time": 0,
              "boot_time_dt": "2019-08-24T14:15:22Z",
              "container": {
                "hash": {},
                "image": {
                  "labels": []
                },
                "name": "string",
                "network_driver": "string",
                "orchestrator": "string",
                "pod_uuid": "string",
                "runtime": "string",
                "size": 0,
                "tag": "string",
                "uid": "string"
              },
              "created_time": 0,
              "created_time_dt": "2019-08-24T14:15:22Z",
              "desc": "string",
              "domain": "string",
              "first_seen_time": 0,
              "first_seen_time_dt": "2019-08-24T14:15:22Z",
              "groups": [
                {
                  "privileges": []
                }
              ],
              "hostname": "string",
              "hw_info": {
                "bios_date": "string",
                "bios_manufacturer": "string",
                "bios_uid": "string",
                "bios_ver": "string",
                "chassis": "string",
                "cpu_bits": 0,
                "cpu_cores": 0,
                "cpu_count": 0,
                "cpu_speed": 0,
                "cpu_type": "string",
                "desktop_display": {},
                "keyboard_info": {},
                "ram_size": 0,
                "serial_number": "string"
              },
              "hypervisor": "string",
              "image": {
                "labels": [
                  null
                ],
                "name": "string",
                "path": "string",
                "tag": "string",
                "uid": "string"
              },
              "imei": "string",
              "instance_uid": "string",
              "interface_name": "string",
              "interface_uid": "string",
              "ip": "string",
              "ip_addresses": [
                "string"
              ],
              "is_compliant": true,
              "is_managed": true,
              "is_personal": true,
              "is_trusted": true,
              "last_seen_time": 0,
              "last_seen_time_dt": "2019-08-24T14:15:22Z",
              "location": {
                "city": "string",
                "continent": "string",
                "coordinates": [
                  null
                ],
                "country": "string",
                "desc": "string",
                "geohash": "string",
                "is_on_premises": true,
                "isp": "string",
                "lat": 0.1,
                "long": 0.1,
                "postal_code": "string",
                "provider": "string",
                "region": "string"
              },
              "mac": "string",
              "mac_addresses": [
                "string"
              ],
              "modified_time": 0,
              "modified_time_dt": "2019-08-24T14:15:22Z",
              "name": "string",
              "namespace_pid": 0,
              "netbios_names": [
                "string"
              ],
              "network_interfaces": [
                {
                  "ip_addresses": [],
                  "mac_addresses": []
                }
              ],
              "network_status": "string",
              "network_status_id": 0,
              "org": {
                "name": "string",
                "ou_name": "string",
                "ou_uid": "string",
                "uid": "string"
              },
              "os": {
                "build": "string",
                "country": "string",
                "cpe_name": "string",
                "cpu_bits": 0,
                "edition": "string",
                "lang": "string",
                "name": "string",
                "sp_name": "string",
                "sp_ver": 0,
                "type": "string",
                "type_id": 0,
                "version": "string"
              },
              "owner": {
                "account": {
                  "labels": []
                },
                "credential_uid": "string",
                "domain": "string",
                "email_addr": "string",
                "full_name": "string",
                "groups": [
                  null
                ],
                "ldap_person": {
                  "email_addrs": [],
                  "labels": []
                },
                "mfa_status": "string",
                "mfa_status_id": 0,
                "name": "string",
                "org": {},
                "privileges": [
                  null
                ],
                "risk_level": "string",
                "risk_level_id": 0,
                "risk_score": 0,
                "type": "string",
                "type_id": 0,
                "uid": "string",
                "uid_alt": "string",
                "user_status": "string",
                "user_status_id": 0
              },
              "region": "string",
              "risk_level": "string",
              "risk_level_id": 0,
              "risk_score": 0,
              "subnet": "string",
              "subnet_uid": "string",
              "sw_info": [
                {}
              ],
              "type": "string",
              "type_id": 0,
              "uid": "string",
              "uid_alt": "string",
              "vendor": {
                "name": "string",
                "ou_name": "string",
                "ou_uid": "string",
                "uid": "string"
              },
              "vlan_uid": "string",
              "vpc_uid": "string",
              "zone": "string"
            },
            "log_level": "string",
            "log_name": "string",
            "log_provider": "string",
            "log_version": "string",
            "logged_time": 0,
            "logged_time_dt": "2019-08-24T14:15:22Z",
            "name": "string",
            "product": {
              "cpe_name": "string",
              "feature": {
                "name": "string",
                "uid": "string",
                "version": "string"
              },
              "lang": "string",
              "name": "string",
              "path": "string",
              "uid": "string",
              "url_string": "string",
              "vendor_name": "string",
              "version": "string"
            },
            "transmit_time": 0,
            "transmit_time_dt": "2019-08-24T14:15:22Z",
            "uid": "string",
            "version": "string"
          }
        ],
        "modified_time": 0,
        "modified_time_dt": "2019-08-24T14:15:22Z",
        "original_time": "string",
        "processed_time": 0,
        "processed_time_dt": "2019-08-24T14:15:22Z",
        "product": {
          "cpe_name": "string",
          "feature": {
            "name": "string",
            "uid": "string",
            "version": "string"
          },
          "lang": "string",
          "name": "string",
          "path": "string",
          "uid": "string",
          "url_string": "string",
          "vendor_name": "string",
          "version": "string"
        },
        "profiles": [
          "string"
        ],
        "sequence": 0,
        "tenant_uid": "string",
        "uid": "string",
        "version": "string"
      },
      "observables": [
        {
          "name": "string",
          "reputation": {
            "base_score": 0.1,
            "provider": "string",
            "score": "string",
            "score_id": 0
          },
          "type": "string",
          "type_id": 0,
          "value": "string"
        }
      ],
      "osint": [
        {
          "answers": [
            {
              "class": "string",
              "flag_ids": [
                0
              ],
              "flags": [
                "string"
              ],
              "packet_uid": 0,
              "rdata": "string",
              "ttl": 0,
              "type": "string"
            }
          ],
          "attacks": [
            {
              "sub_technique": {
                "name": "string",
                "src_url": "string",
                "uid": "string"
              },
              "tactic": {
                "name": "string",
                "src_url": "string",
                "uid": "string"
              },
              "tactics": [
                {}
              ],
              "technique": {
                "name": "string",
                "src_url": "string",
                "uid": "string"
              },
              "version": "string"
            }
          ],
          "autonomous_system": {
            "name": "string",
            "number": 0
          },
          "comment": "string",
          "confidence": "string",
          "confidence_id": 0,
          "email": {
            "cc": [
              "string"
            ],
            "delivered_to": "string",
            "from": "string",
            "message_uid": "string",
            "raw_header": "string",
            "reply_to": "string",
            "size": 0,
            "smtp_from": "string",
            "smtp_to": [
              "string"
            ],
            "subject": "string",
            "to": [
              "string"
            ],
            "uid": "string",
            "x_originating_ip": [
              "string"
            ]
          },
          "email_auth": {
            "dkim": "string",
            "dkim_domain": "string",
            "dkim_signature": "string",
            "dmarc": "string",
            "dmarc_override": "string",
            "dmarc_policy": "string",
            "spf": "string"
          },
          "kill_chain": [
            {
              "phase": "string",
              "phase_id": 0
            }
          ],
          "location": {
            "city": "string",
            "continent": "string",
            "coordinates": [
              0.1
            ],
            "country": "string",
            "desc": "string",
            "geohash": "string",
            "is_on_premises": true,
            "isp": "string",
            "lat": 0.1,
            "long": 0.1,
            "postal_code": "string",
            "provider": "string",
            "region": "string"
          },
          "name": "string",
          "signatures": [
            {
              "algorithm": "string",
              "algorithm_id": 0,
              "certificate": {
                "created_time": 0,
                "created_time_dt": "2019-08-24T14:15:22Z",
                "expiration_time": 0,
                "expiration_time_dt": "2019-08-24T14:15:22Z",
                "fingerprints": [
                  null
                ],
                "is_self_signed": true,
                "issuer": "string",
                "serial_number": "string",
                "subject": "string",
                "uid": "string",
                "version": "string"
              },
              "created_time": 0,
              "created_time_dt": "2019-08-24T14:15:22Z",
              "developer_uid": "string",
              "digest": {
                "algorithm": "string",
                "algorithm_id": 0,
                "value": "string"
              },
              "state": "string",
              "state_id": 0
            }
          ],
          "src_url": "string",
          "subdomains": [
            "string"
          ],
          "tlp": "string",
          "type": "string",
          "type_id": 0,
          "uid": "string",
          "value": "string",
          "vendor_name": "string",
          "vulnerabilities": [
            {
              "affected_code": [
                {}
              ],
              "affected_packages": [
                {}
              ],
              "cve": {
                "created_time": 0,
                "created_time_dt": "2019-08-24T14:15:22Z",
                "cvss": [
                  null
                ],
                "cwe": {},
                "cwe_uid": "string",
                "cwe_url": "string",
                "desc": "string",
                "epss": {},
                "modified_time": 0,
                "modified_time_dt": "2019-08-24T14:15:22Z",
                "product": {},
                "references": [
                  null
                ],
                "title": "string",
                "type": "string",
                "uid": "string"
              },
              "cwe": {
                "caption": "string",
                "src_url": "string",
                "uid": "string"
              },
              "desc": "string",
              "first_seen_time": 0,
              "first_seen_time_dt": "2019-08-24T14:15:22Z",
              "fix_available": true,
              "is_exploit_available": true,
              "is_fix_available": true,
              "kb_article_list": [
                {}
              ],
              "kb_articles": [
                "string"
              ],
              "last_seen_time": 0,
              "last_seen_time_dt": "2019-08-24T14:15:22Z",
              "packages": [
                {}
              ],
              "references": [
                "string"
              ],
              "related_vulnerabilities": [
                "string"
              ],
              "remediation": {
                "desc": "string",
                "kb_article_list": [
                  null
                ],
                "kb_articles": [
                  null
                ],
                "references": [
                  null
                ]
              },
              "severity": "string",
              "title": "string",
              "vendor_name": "string"
            }
          ],
          "whois": {
            "autonomous_system": {
              "name": "string",
              "number": 0
            },
            "created_time": 0,
            "created_time_dt": "2019-08-24T14:15:22Z",
            "dnssec_status": "string",
            "dnssec_status_id": 0,
            "domain": "string",
            "domain_contacts": [
              {
                "email_addr": "string",
                "location": {
                  "coordinates": []
                },
                "name": "string",
                "phone_number": "string",
                "type": "string",
                "type_id": 0,
                "uid": "string"
              }
            ],
            "email_addr": "string",
            "last_seen_time": 0,
            "last_seen_time_dt": "2019-08-24T14:15:22Z",
            "name_servers": [
              "string"
            ],
            "phone_number": "string",
            "registrar": "string",
            "status": "string",
            "subdomains": [
              "string"
            ],
            "subnet": "string"
          }
        }
      ],
      "raw_data": "string",
      "severity": "string",
      "severity_id": 0,
      "start_time": 0,
      "start_time_dt": "2019-08-24T14:15:22Z",
      "status": "string",
      "status_code": "string",
      "status_detail": "string",
      "status_id": 0,
      "time": 0,
      "time_dt": "2019-08-24T14:15:22Z",
      "timezone_offset": 0,
      "type_name": "string",
      "type_uid": 0,
      "unmapped": {}
    },
    "source_name": "string"
  }'

Responses

Bodyapplication/json
activity_idinteger(ocsfv1.3.0inventoryinfoActivityId)required

ActivityId is an enum, and the following values are allowed. 0 - Unknown: The event activity is unknown. 1 - Log: The discovered information is via a log. 2 - Collect: The discovered information is via a collection process. 99 - Other: The event activity is not mapped. See the activity_name attribute, which contains a data source specific value.

category_uidinteger(ocsfv1.3.0inventoryinfoCategoryUid)required

CategoryUid is an enum, and the following values are allowed. 5 - Discovery: Discovery events report the existence and state of devices, files, configurations, processes, registry keys, and other objects.

class_uidinteger(ocsfv1.3.0inventoryinfoClassUid)required

ClassUid is an enum, and the following values are allowed. 5001 - DeviceInventoryInfo: Device Inventory Info events report device inventory data that is either logged or proactively collected. For example, when collecting device information from a CMDB or running a network sweep of connected devices.

deviceobject(ocsfv1.3.0inventoryinfoDevice)required

The Device object represents an addressable computer system or host, which is typically connected to a computer network and participates in the transmission or processing of data within the computer network. Defined by D3FEND d3f:Host.

device.​type_idinteger(ocsfv1.3.0inventoryinfoDevice_TypeId)required
device.​agent_listArray of objects or null(ocsfv1.3.0inventoryinfoAgent)

A list of agent objects associated with a device, endpoint, or resource.

device.​autoscale_uidstring or null

The unique identifier of the cloud autoscale configuration.

device.​boot_timeinteger(ocsfv1.3.0inventoryinfoTimestamp)

The timestamp format is the number of milliseconds since the Epoch 01/01/1970 00:00:00 UTC. For example 1618524549901.

device.​boot_time_dtstring or null(date-time)

The time the system was booted.

device.​containerobject(ocsfv1.3.0inventoryinfoContainer)

The Container object describes an instance of a specific container. A container is a prepackaged, portable system image that runs isolated on an existing system using a container runtime like containerd.

device.​created_timeinteger(ocsfv1.3.0inventoryinfoTimestamp)

The timestamp format is the number of milliseconds since the Epoch 01/01/1970 00:00:00 UTC. For example 1618524549901.

device.​created_time_dtstring or null(date-time)

The time when the device was known to have been created.

device.​descstring or null

The description of the device, ordinarily as reported by the operating system.

device.​domainstring or null

The network domain where the device resides. For example: work.example.com.

device.​first_seen_timeinteger(ocsfv1.3.0inventoryinfoTimestamp)

The timestamp format is the number of milliseconds since the Epoch 01/01/1970 00:00:00 UTC. For example 1618524549901.

device.​first_seen_time_dtstring or null(date-time)

The initial discovery time of the device.

device.​groupsArray of objects or null(ocsfv1.3.0inventoryinfoGroup)

The group names to which the device belongs. For example: ["Windows Laptops", "Engineering"].

device.​hostnamestring(ocsfv1.3.0inventoryinfoHostname)

Unique name assigned to a device connected to a computer network. A domain name in general is an Internet address that can be resolved through the Domain Name System (DNS). For example: r2-d2.example.com.

device.​hw_infoobject(ocsfv1.3.0inventoryinfoDeviceHwInfo)

The Device Hardware Information object contains details and specifications of the physical components that make up a device. This information provides an overview of the hardware capabilities, configuration, and characteristics of the device.

device.​hypervisorstring or null

The name of the hypervisor running on the device. For example, Xen, VMware, Hyper-V, VirtualBox, etc.

device.​imageobject(ocsfv1.3.0inventoryinfoImage)

The Image object provides a description of a specific Virtual Machine (VM) or Container image. Defined by D3FEND d3f:ContainerImage.

device.​imeistring or null

The International Mobile Station Equipment Identifier that is associated with the device.

device.​instance_uidstring or null

The unique identifier of a VM instance.

device.​interface_namestring or null

The name of the network interface (e.g. eth2).

device.​interface_uidstring or null

The unique identifier of the network interface.

device.​ipstring(ocsfv1.3.0inventoryinfoIPAddress)

Internet Protocol address (IP address), in either IPv4 or IPv6 format. For example, 192.168.200.24 or 2001:0db8:85a3:0000:0000:8a2e:0370:7334.

device.​ip_addressesArray of strings or null

A list of IP addresses available on the device

device.​is_compliantboolean or null

The event occurred on a compliant device.

device.​is_managedboolean or null

The event occurred on a managed device.

device.​is_personalboolean or null

The event occurred on a personal device.

device.​is_trustedboolean or null

The event occurred on a trusted device.

device.​last_seen_timeinteger(ocsfv1.3.0inventoryinfoTimestamp)

The timestamp format is the number of milliseconds since the Epoch 01/01/1970 00:00:00 UTC. For example 1618524549901.

device.​last_seen_time_dtstring or null(date-time)

The most recent discovery time of the device.

device.​locationobject(ocsfv1.3.0inventoryinfoLocation)

The Geo Location object describes a geographical location, usually associated with an IP address. Defined by D3FEND d3f:PhysicalLocation.

device.​macstring(ocsfv1.3.0inventoryinfoMACAddress)

Media Access Control (MAC) address. For example: 18:36:F3:98:4F:9A.

device.​mac_addressesArray of strings or null

A list of MAC addresses available on the device

device.​modified_timeinteger(ocsfv1.3.0inventoryinfoTimestamp)

The timestamp format is the number of milliseconds since the Epoch 01/01/1970 00:00:00 UTC. For example 1618524549901.

device.​modified_time_dtstring or null(date-time)

The time when the device was last known to have been modified.

device.​namestring or null

The alternate device name, ordinarily as assigned by an administrator.

Note: The Name could be any other string that helps to identify the device, such as a phone number; for example 310-555-1234.

device.​namespace_pidinteger or null

If running under a process namespace (such as in a container), the process identifier within that process namespace.

device.​netbios_namesArray of strings or null

A list of NetBIOS names available on the device

device.​network_interfacesArray of objects or null(ocsfv1.3.0inventoryinfoNetworkInterface)

The network interfaces that are associated with the device, one for each unique MAC address/IP address/hostname/name combination.

Note: The first element of the array is the network information that pertains to the event.

device.​network_statusstring or null

The network isolation status of the endpoiint

device.​network_status_idinteger(ocsfv1.3.0inventoryinfoDevice_NetworkStatusId)

DeviceNetworkStatusId is an enum, and the following values are allowed. 1 - NotIsolated: Device is not isolated from the network. 2 - Isolated: Device is isolated from the network. 99 - Unknown: The network isolation status is unknown.

device.​orgobject(ocsfv1.3.0inventoryinfoOrganization)

The Organization object describes characteristics of an organization or company and its division if any.

device.​osobject(ocsfv1.3.0inventoryinfoOs)

The Operating System (OS) object describes characteristics of an OS, such as Linux or Windows. Defined by D3FEND d3f:OperatingSystem.

device.​ownerobject(ocsfv1.3.0inventoryinfoUser)

The User object describes the characteristics of a user/person or a security principal. Defined by D3FEND d3f:UserAccount.

device.​regionstring or null

The region where the virtual machine is located. For example, an AWS Region.

device.​risk_levelstring or null

The risk level, normalized to the caption of the risk_level_id value.

device.​risk_level_idinteger(ocsfv1.3.0inventoryinfoDevice_RiskLevelId)

DeviceRiskLevelId is an enum, and the following values are allowed. 0 - Info 1 - Low 2 - Medium 3 - High 4 - Critical 99 - Other: The risk level is not mapped. See the risk_level attribute, which contains a data source specific value.

device.​risk_scoreinteger or null

The risk score as reported by the event source.

device.​subnetstring(ocsfv1.3.0inventoryinfoSubnet)

The subnet represented in a CIDR notation, using the format network_address/prefix_length. The network_address can be in either IPv4 or IPv6 format. The prefix length indicates the number of bits used for the network portion, and the remaining bits are available for host addresses within that subnet.

For example:
  • 192.168.1.0/24
  • 2001:0db8:85a3:0000::/64

device.​subnet_uidstring or null

The unique identifier of a virtual subnet.

device.​sw_infoArray of objects or null(ocsfv1.3.0inventoryinfoProduct)

The list of software contained on a device

device.​typestring or null

The device type. For example: unknown, server, desktop, laptop, tablet, mobile, virtual, browser, plc, scada, dcs, cnc, scientific, medical, lighting, energy, transportation other.

device.​uidstring or null

The unique identifier of the device. For example the Windows TargetSID or AWS EC2 ARN.

device.​uid_altstring or null

An alternate unique identifier of the device if any. For example the ActiveDirectory DN.

device.​vendorobject(ocsfv1.3.0inventoryinfoOrganization)

The Organization object describes characteristics of an organization or company and its division if any.

device.​vlan_uidstring or null

The Virtual LAN identifier.

device.​vpc_uidstring or null

The unique identifier of the Virtual Private Cloud (VPC).

device.​zonestring or null

The network zone or LAN segment.

metadataobject(ocsfv1.3.0inventoryinfoMetadata)required

The Metadata object describes the metadata associated with the event. Defined by D3FEND d3f:Metadata.

metadata.​productobject(ocsfv1.3.0inventoryinfoProduct)required

The Product object describes characteristics of a software product.

metadata.​product.​vendor_namestringrequired

The name of the vendor of the product.

metadata.​product.​cpe_namestring or null

The Common Platform Enumeration (CPE) name as described by (NIST) For example: cpe:/a:apple:safari:16.2.

metadata.​product.​featureobject(ocsfv1.3.0inventoryinfoFeature)

The Feature object provides information about the software product feature that generated a specific event. It encompasses details related to the capabilities, components, user interface (UI) design, and performance upgrades associated with the feature.

metadata.​product.​langstring or null

The two letter lower case language codes, as defined by ISO 639-1. For example: en (English), de (German), or fr (French).

metadata.​product.​namestring or null

The name of the product.

metadata.​product.​pathstring or null

The installation path of the product.

metadata.​product.​uidstring or null

The unique identifier of the product.

metadata.​product.​url_stringstring(ocsfv1.3.0inventoryinfoURLString)

Uniform Resource Locator (URL) string. For example: http://www.example.com/download/trouble.exe.

metadata.​product.​versionstring or null

The version of the product, as defined by the event source. For example: 2013.1.3-beta.

metadata.​versionstringrequired

The version of the OCSF schema, using Semantic Versioning Specification (SemVer). For example: 1.0.0. Event consumers use the version to determine the available event attributes.

metadata.​correlation_uidstring or null

The unique identifier used to correlate events.

metadata.​event_codestring or null

The Event ID or Code that the product uses to describe the event.

metadata.​extensionobject(ocsfv1.3.0inventoryinfoExtension)

The OCSF Schema Extension object provides detailed information about the schema extension used to construct the event. The schema extensions are registered in the extensions.md file.

metadata.​extensionsArray of objects or null(ocsfv1.3.0inventoryinfoExtension)

The schema extensions used to create the event.

metadata.​labelsArray of strings or null

The list of category labels attached to the event or specific attributes. Labels are user defined tags or aliases added at normalization time.

For example: ["network", "connection.ip:destination", "device.ip:source"]
metadata.​log_levelstring or null

The audit level at which an event was generated.

metadata.​log_namestring or null

The event log name. For example, syslog file name or Windows logging subsystem: Security.

metadata.​log_providerstring or null

The logging provider or logging service that logged the event. For example, Microsoft-Windows-Security-Auditing.

metadata.​log_versionstring or null

The event log schema version that specifies the format of the original event. For example syslog version or Cisco Log Schema Version.

metadata.​logged_timeinteger(ocsfv1.3.0inventoryinfoTimestamp)

The timestamp format is the number of milliseconds since the Epoch 01/01/1970 00:00:00 UTC. For example 1618524549901.

metadata.​logged_time_dtstring or null(date-time)

The time when the logging system collected and logged the event.

This attribute is distinct from the event time in that event time typically contain the time extracted from the original event. Most of the time, these two times will be different.
metadata.​loggersArray of objects or null(ocsfv1.3.0inventoryinfoLogger)

An array of Logger objects that describe the devices and logging products between the event source and its eventual destination. Note, this attribute can be used when there is a complex end-to-end path of event flow.

metadata.​modified_timeinteger(ocsfv1.3.0inventoryinfoTimestamp)

The timestamp format is the number of milliseconds since the Epoch 01/01/1970 00:00:00 UTC. For example 1618524549901.

metadata.​modified_time_dtstring or null(date-time)

The time when the event was last modified or enriched.

metadata.​original_timestring or null

The original event time as reported by the event source. For example, the time in the original format from system event log such as Syslog on Unix/Linux and the System event file on Windows. Omit if event is generated instead of collected via logs.

metadata.​processed_timeinteger(ocsfv1.3.0inventoryinfoTimestamp)

The timestamp format is the number of milliseconds since the Epoch 01/01/1970 00:00:00 UTC. For example 1618524549901.

metadata.​processed_time_dtstring or null(date-time)

The event processed time, such as an ETL operation.

metadata.​profilesArray of strings or null

The list of profiles used to create the event. Profiles should be referenced by their name attribute for core profiles, or extension/name for profiles from extensions.

metadata.​sequenceinteger or null

Sequence number of the event. The sequence number is a value available in some events, to make the exact ordering of events unambiguous, regardless of the event time precision.

metadata.​tenant_uidstring or null

The unique tenant identifier.

metadata.​uidstring or null

The logging system-assigned unique identifier of an event instance.

severity_idinteger(ocsfv1.3.0inventoryinfoSeverityId)required

SeverityId is an enum, and the following values are allowed. 0 - Unknown: The event/finding severity is unknown. 1 - Informational: Informational message. No action required. 2 - Low: The user decides if action is needed. 3 - Medium: Action is required but the situation is not serious at this time. 4 - High: Action is required immediately. 5 - Critical: Action is required immediately and the scope is broad. 6 - Fatal: An error occurred but it is too late to take remedial action. 99 - Other: The event/finding severity is not mapped. See the severity attribute, which contains a data source specific value.

timeinteger(ocsfv1.3.0inventoryinfoTimestamp)required

The timestamp format is the number of milliseconds since the Epoch 01/01/1970 00:00:00 UTC. For example 1618524549901.

type_uidinteger(ocsfv1.3.0inventoryinfoTypeUid)required

TypeUid is an enum, and the following values are allowed. 500100 - Unknown 500101 - Log: The discovered information is via a log. 500102 - Collect: The discovered information is via a collection process. 500199 - Other

activity_namestring or null

The event activity name, as defined by the activity_id.

actorobject(ocsfv1.3.0inventoryinfoActor)

The Actor object contains details about the user, role, application, service, or process that initiated or performed a specific activity.

apiobject(ocsfv1.3.0inventoryinfoApi)

The API, or Application Programming Interface, object represents information pertaining to an API request and response.

category_namestring or null

The event category name, as defined by category_uid value: Discovery.

cloudobject(ocsfv1.3.0inventoryinfoCloud)

The Cloud object contains information about a cloud account such as AWS Account ID, regions, etc.

countinteger or null

The number of times that events in the same logical group occurred during the event Start Time to End Time period.

custom_fieldsobject(ocsfv1.3.0inventoryinfoObject)

An unordered collection of attributes. It defines a set of attributes available in all objects. It can be also used as a generic object to log objects that are not otherwise defined by the schema.

durationinteger or null

The event duration or aggregate time, the amount of time the event covers from start_time to end_time in milliseconds.

end_timeinteger(ocsfv1.3.0inventoryinfoTimestamp)

The timestamp format is the number of milliseconds since the Epoch 01/01/1970 00:00:00 UTC. For example 1618524549901.

end_time_dtstring or null(date-time)

The end time of a time period, or the time of the most recent event included in the aggregate event.

enrichmentsArray of objects or null(ocsfv1.3.0inventoryinfoEnrichment)

The additional information from an external data source, which is associated with the event or a finding. For example add location information for the IP address in the DNS answers:

[{"name": "answers.ip", "value": "92.24.47.250", "type": "location", "data": {"city": "Socotra", "continent": "Asia", "coordinates": [-25.4153, 17.0743], "country": "YE", "desc": "Yemen"}}]

messagestring or null

The description of the event/finding, as defined by the source.

observablesArray of objects or null(ocsfv1.3.0inventoryinfoObservable)

The observables associated with the event or a finding.

osintArray of objects or null(ocsfv1.3.0inventoryinfoOsint)

The OSINT (Open Source Intelligence) object contains details related to an indicator such as the indicator itself, related indicators, geolocation, registrar information, subdomains, analyst commentary, and other contextual information. This information can be used to further enrich a detection or finding by providing decisioning support to other analysts and engineers.

raw_datastring or null

The raw event/finding data as received from the source.

severitystring or null

The event/finding severity, normalized to the caption of the severity_id value. In the case of 'Other', it is defined by the source.

start_timeinteger(ocsfv1.3.0inventoryinfoTimestamp)

The timestamp format is the number of milliseconds since the Epoch 01/01/1970 00:00:00 UTC. For example 1618524549901.

start_time_dtstring or null(date-time)

The start time of a time period, or the time of the least recent event included in the aggregate event.

statusstring or null

The event status, normalized to the caption of the status_id value. In the case of 'Other', it is defined by the event source.

status_codestring or null

The event status code, as reported by the event source.

For example, in a Windows Failed Authentication event, this would be the value of 'Failure Code', e.g. 0x18.

status_detailstring or null

The status detail contains additional information about the event/finding outcome.

status_idinteger(ocsfv1.3.0inventoryinfoStatusId)

StatusId is an enum, and the following values are allowed. 0 - Unknown: The status is unknown. 1 - Success 2 - Failure 99 - Other: The event status is not mapped. See the status attribute, which contains a data source specific value.

time_dtstring or null(date-time)

The normalized event occurrence time or the finding creation time.

timezone_offsetinteger or null

The number of minutes that the reported event time is ahead or behind UTC, in the range -1,080 to +1,080.

type_namestring or null

The event/finding type name, as defined by the type_uid.

unmappedobject(ocsfv1.3.0inventoryinfoObject)

An unordered collection of attributes. It defines a set of attributes available in all objects. It can be also used as a generic object to log objects that are not otherwise defined by the schema.

Response
application/json
{ "activity_id": 0, "activity_name": "string", "actor": { "app_name": "string", "app_uid": "string", "authorizations": [], "idp": {}, "invoked_by": "string", "process": {}, "session": {}, "user": {} }, "api": { "group": {}, "operation": "string", "request": {}, "response": {}, "service": {}, "version": "string" }, "category_name": "string", "category_uid": 0, "class_uid": 0, "cloud": { "account": {}, "org": {}, "project_uid": "string", "provider": "string", "region": "string", "zone": "string" }, "count": 0, "custom_fields": {}, "device": { "agent_list": [], "autoscale_uid": "string", "boot_time": 0, "boot_time_dt": "2019-08-24T14:15:22Z", "container": {}, "created_time": 0, "created_time_dt": "2019-08-24T14:15:22Z", "desc": "string", "domain": "string", "first_seen_time": 0, "first_seen_time_dt": "2019-08-24T14:15:22Z", "groups": [], "hostname": "string", "hw_info": {}, "hypervisor": "string", "image": {}, "imei": "string", "instance_uid": "string", "interface_name": "string", "interface_uid": "string", "ip": "string", "ip_addresses": [], "is_compliant": true, "is_managed": true, "is_personal": true, "is_trusted": true, "last_seen_time": 0, "last_seen_time_dt": "2019-08-24T14:15:22Z", "location": {}, "mac": "string", "mac_addresses": [], "modified_time": 0, "modified_time_dt": "2019-08-24T14:15:22Z", "name": "string", "namespace_pid": 0, "netbios_names": [], "network_interfaces": [], "network_status": "string", "network_status_id": 0, "org": {}, "os": {}, "owner": {}, "region": "string", "risk_level": "string", "risk_level_id": 0, "risk_score": 0, "subnet": "string", "subnet_uid": "string", "sw_info": [], "type": "string", "type_id": 0, "uid": "string", "uid_alt": "string", "vendor": {}, "vlan_uid": "string", "vpc_uid": "string", "zone": "string" }, "duration": 0, "end_time": 0, "end_time_dt": "2019-08-24T14:15:22Z", "enrichments": [ {} ], "message": "string", "metadata": { "correlation_uid": "string", "event_code": "string", "extension": {}, "extensions": [], "labels": [], "log_level": "string", "log_name": "string", "log_provider": "string", "log_version": "string", "logged_time": 0, "logged_time_dt": "2019-08-24T14:15:22Z", "loggers": [], "modified_time": 0, "modified_time_dt": "2019-08-24T14:15:22Z", "original_time": "string", "processed_time": 0, "processed_time_dt": "2019-08-24T14:15:22Z", "product": {}, "profiles": [], "sequence": 0, "tenant_uid": "string", "uid": "string", "version": "string" }, "observables": [ {} ], "osint": [ {} ], "raw_data": "string", "severity": "string", "severity_id": 0, "start_time": 0, "start_time_dt": "2019-08-24T14:15:22Z", "status": "string", "status_code": "string", "status_detail": "string", "status_id": 0, "time": 0, "time_dt": "2019-08-24T14:15:22Z", "timezone_offset": 0, "type_name": "string", "type_uid": 0, "unmapped": {} }

Query Scans

Request

Query scans in a vulnerability scanning system

Query
metaArray of strings or null

Add metadata to the response by invoking meta functions. Documentation for meta functions is available at https://docs.synqly.com/api-reference/meta-functions. Not all meta function are available at every endpoint.

limitinteger or null

Number of scans to return. Defaults to 50.

cursorstring or null

Start search from cursor position.

curl -i -X GET \
  'https://api.synqly.com/v1/vulnerabilities/scans?cursor=string&limit=0&meta=string' \
  -H 'Authorization: Bearer <YOUR_TOKEN_HERE>'

Responses

Bodyapplication/json
resultArray of objects(ScanConfiguration)required
result[].​uidstringrequired

ID of the scan.

result[].​namestringrequired

Name of the scan.

result[].​creation_timeinteger or null

Time when the scan was created.

result[].​last_modified_timeinteger or null

Time when the scan was last modified.

result[].​ownerobject(User)
result[].​scheduleobject(ScanSchedule)
cursorstringrequired

Cursor to use to retrieve the next page of results

metaobject(MetaResponse)
Response
application/json
{ "result": [ {} ], "cursor": "string", "meta": { "stats": {}, "api": {} } }

Get Scan Activity

Request

Get a list of activity generated by a configured scan.

Path
scan_idstringrequired

ID of the scan to get its activity.

curl -i -X GET \
  'https://api.synqly.com/v1/vulnerabilities/scans/{scan_id}/activity' \
  -H 'Authorization: Bearer <YOUR_TOKEN_HERE>'

Responses

Bodyapplication/json
resultobject(ocsfv1.3.0scanactivityScanActivity)required

Scan events report the start, completion, and results of a scan job. The scan event includes the number of items that were scanned and the number of detections that were resolved.

result.​activity_idinteger(ocsfv1.3.0scanactivityActivityId)required

ActivityId is an enum, and the following values are allowed. 0 - Unknown: The event activity is unknown. 1 - Started: The scan was started. 2 - Completed: The scan was completed. 3 - Cancelled: The scan was cancelled. 4 - DurationViolation: The allocated scan time was insufficient to complete the requested scan. 5 - PauseViolation: The scan was paused, either by the user or by program constraints (e.g. scans that are suspended during certain time intervals), and not resumed within the allotted time. 6 - Error: The scan could not be completed due to an internal error. 7 - Paused: The scan was paused. 8 - Resumed: The scan was resumed from the pause point. 9 - Restarted: The scan restarted from the beginning of the file enumeration. 10 - Delayed: The user delayed the scan. 99 - Other: The event activity is not mapped. See the activity_name attribute, which contains a data source specific value.

result.​category_uidinteger(ocsfv1.3.0scanactivityCategoryUid)required

CategoryUid is an enum, and the following values are allowed. 6 - ApplicationActivity: Application Activity events report detailed information about the behavior of applications and services.

result.​class_uidinteger(ocsfv1.3.0scanactivityClassUid)required

ClassUid is an enum, and the following values are allowed. 6007 - ScanActivity: Scan events report the start, completion, and results of a scan job. The scan event includes the number of items that were scanned and the number of detections that were resolved.

result.​metadataobject(ocsfv1.3.0scanactivityMetadata)required

The Metadata object describes the metadata associated with the event. Defined by D3FEND d3f:Metadata.

result.​metadata.​productobject(ocsfv1.3.0scanactivityProduct)required

The Product object describes characteristics of a software product.

result.​metadata.​product.​vendor_namestringrequired

The name of the vendor of the product.

result.​metadata.​product.​cpe_namestring or null

The Common Platform Enumeration (CPE) name as described by (NIST) For example: cpe:/a:apple:safari:16.2.

result.​metadata.​product.​featureobject(ocsfv1.3.0scanactivityFeature)

The Feature object provides information about the software product feature that generated a specific event. It encompasses details related to the capabilities, components, user interface (UI) design, and performance upgrades associated with the feature.

result.​metadata.​product.​langstring or null

The two letter lower case language codes, as defined by ISO 639-1. For example: en (English), de (German), or fr (French).

result.​metadata.​product.​namestring or null

The name of the product.

result.​metadata.​product.​pathstring or null

The installation path of the product.

result.​metadata.​product.​uidstring or null

The unique identifier of the product.

result.​metadata.​product.​url_stringstring(ocsfv1.3.0scanactivityURLString)

Uniform Resource Locator (URL) string. For example: http://www.example.com/download/trouble.exe.

result.​metadata.​product.​versionstring or null

The version of the product, as defined by the event source. For example: 2013.1.3-beta.

result.​metadata.​versionstringrequired

The version of the OCSF schema, using Semantic Versioning Specification (SemVer). For example: 1.0.0. Event consumers use the version to determine the available event attributes.

result.​metadata.​correlation_uidstring or null

The unique identifier used to correlate events.

result.​metadata.​event_codestring or null

The Event ID or Code that the product uses to describe the event.

result.​metadata.​extensionobject(ocsfv1.3.0scanactivityExtension)

The OCSF Schema Extension object provides detailed information about the schema extension used to construct the event. The schema extensions are registered in the extensions.md file.

result.​metadata.​extensionsArray of objects or null(ocsfv1.3.0scanactivityExtension)

The schema extensions used to create the event.

result.​metadata.​labelsArray of strings or null

The list of category labels attached to the event or specific attributes. Labels are user defined tags or aliases added at normalization time.

For example: ["network", "connection.ip:destination", "device.ip:source"]
result.​metadata.​log_levelstring or null

The audit level at which an event was generated.

result.​metadata.​log_namestring or null

The event log name. For example, syslog file name or Windows logging subsystem: Security.

result.​metadata.​log_providerstring or null

The logging provider or logging service that logged the event. For example, Microsoft-Windows-Security-Auditing.

result.​metadata.​log_versionstring or null

The event log schema version that specifies the format of the original event. For example syslog version or Cisco Log Schema Version.

result.​metadata.​logged_timeinteger(ocsfv1.3.0scanactivityTimestamp)

The timestamp format is the number of milliseconds since the Epoch 01/01/1970 00:00:00 UTC. For example 1618524549901.

result.​metadata.​logged_time_dtstring or null(date-time)

The time when the logging system collected and logged the event.

This attribute is distinct from the event time in that event time typically contain the time extracted from the original event. Most of the time, these two times will be different.
result.​metadata.​loggersArray of objects or null(ocsfv1.3.0scanactivityLogger)

An array of Logger objects that describe the devices and logging products between the event source and its eventual destination. Note, this attribute can be used when there is a complex end-to-end path of event flow.

result.​metadata.​modified_timeinteger(ocsfv1.3.0scanactivityTimestamp)

The timestamp format is the number of milliseconds since the Epoch 01/01/1970 00:00:00 UTC. For example 1618524549901.

result.​metadata.​modified_time_dtstring or null(date-time)

The time when the event was last modified or enriched.

result.​metadata.​original_timestring or null

The original event time as reported by the event source. For example, the time in the original format from system event log such as Syslog on Unix/Linux and the System event file on Windows. Omit if event is generated instead of collected via logs.

result.​metadata.​processed_timeinteger(ocsfv1.3.0scanactivityTimestamp)

The timestamp format is the number of milliseconds since the Epoch 01/01/1970 00:00:00 UTC. For example 1618524549901.

result.​metadata.​processed_time_dtstring or null(date-time)

The event processed time, such as an ETL operation.

result.​metadata.​profilesArray of strings or null

The list of profiles used to create the event. Profiles should be referenced by their name attribute for core profiles, or extension/name for profiles from extensions.

result.​metadata.​sequenceinteger or null

Sequence number of the event. The sequence number is a value available in some events, to make the exact ordering of events unambiguous, regardless of the event time precision.

result.​metadata.​tenant_uidstring or null

The unique tenant identifier.

result.​metadata.​uidstring or null

The logging system-assigned unique identifier of an event instance.

result.​scanobject(ocsfv1.3.0scanactivityScan)required

The Scan object describes characteristics of a proactive scan.

result.​scan.​type_idinteger(ocsfv1.3.0scanactivityScan_TypeId)required

ScanTypeId is an enum, and the following values are allowed. 0 - Unknown: The type is unknown. 1 - Manual: The scan was manually initiated by the user or administrator. 2 - Scheduled: The scan was started based on scheduler. 3 - UpdatedContent: The scan was triggered by a content update. 4 - QuarantinedItems: The scan was triggered by newly quarantined items. 5 - AttachedMedia: The scan was triggered by the attachment of removable media. 6 - UserLogon: The scan was started due to a user logon. 7 - ELAM: The scan was triggered by an Early Launch Anti-Malware (ELAM) detection. 99 - Other: The scan type id is not mapped. See the type attribute, which contains a data source specific value.

result.​scan.​namestring or null

The administrator-supplied or application-generated name of the scan. For example: "Home office weekly user database scan", "Scan folders for viruses", "Full system virus scan"

result.​scan.​targetsArray of strings or null

Hosts or IP addresses targeted by the scan.

result.​scan.​typestring or null

The type of scan.

result.​scan.​uidstring or null

The application-defined unique identifier assigned to an instance of a scan.

result.​severity_idinteger(ocsfv1.3.0scanactivitySeverityId)required

SeverityId is an enum, and the following values are allowed. 0 - Unknown: The event/finding severity is unknown. 1 - Informational: Informational message. No action required. 2 - Low: The user decides if action is needed. 3 - Medium: Action is required but the situation is not serious at this time. 4 - High: Action is required immediately. 5 - Critical: Action is required immediately and the scope is broad. 6 - Fatal: An error occurred but it is too late to take remedial action. 99 - Other: The event/finding severity is not mapped. See the severity attribute, which contains a data source specific value.

result.​timeinteger(ocsfv1.3.0scanactivityTimestamp)required

The timestamp format is the number of milliseconds since the Epoch 01/01/1970 00:00:00 UTC. For example 1618524549901.

result.​type_uidinteger(ocsfv1.3.0scanactivityTypeUid)required

TypeUid is an enum, and the following values are allowed. 600700 - Unknown 600701 - Started: The scan was started. 600702 - Completed: The scan was completed. 600703 - Cancelled: The scan was cancelled. 600704 - DurationViolation: The allocated scan time was insufficient to complete the requested scan. 600705 - PauseViolation: The scan was paused, either by the user or by program constraints (e.g. scans that are suspended during certain time intervals), and not resumed within the allotted time. 600706 - Error: The scan could not be completed due to an internal error. 600707 - Paused: The scan was paused. 600708 - Resumed: The scan was resumed from the pause point. 600709 - Restarted: The scan restarted from the beginning of the file enumeration. 600710 - Delayed: The user delayed the scan. 600799 - Other

result.​activity_namestring or null

The event activity name, as defined by the activity_id.

result.​actorobject(ocsfv1.3.0scanactivityActor)

The Actor object contains details about the user, role, application, service, or process that initiated or performed a specific activity.

result.​agent_listArray of objects or null(ocsfv1.3.0scanactivityAgent)

The agents that were used to scan the devices.

result.​apiobject(ocsfv1.3.0scanactivityApi)

The API, or Application Programming Interface, object represents information pertaining to an API request and response.

result.​category_namestring or null

The event category name, as defined by category_uid value: Application Activity.

result.​cloudobject(ocsfv1.3.0scanactivityCloud)

The Cloud object contains information about a cloud account such as AWS Account ID, regions, etc.

result.​command_uidstring or null

The command identifier that is associated with this scan event. This ID uniquely identifies the proactive scan command, e.g., if remotely initiated.

result.​countinteger or null

The number of times that events in the same logical group occurred during the event Start Time to End Time period.

result.​custom_fieldsobject(ocsfv1.3.0scanactivityObject)

An unordered collection of attributes. It defines a set of attributes available in all objects. It can be also used as a generic object to log objects that are not otherwise defined by the schema.

result.​deviceobject(ocsfv1.3.0scanactivityDevice)

The Device object represents an addressable computer system or host, which is typically connected to a computer network and participates in the transmission or processing of data within the computer network. Defined by D3FEND d3f:Host.

result.​durationinteger or null

The duration of the scan

result.​end_timeinteger(ocsfv1.3.0scanactivityTimestamp)

The timestamp format is the number of milliseconds since the Epoch 01/01/1970 00:00:00 UTC. For example 1618524549901.

result.​end_time_dtstring or null(date-time)

The end time of the scan job.

result.​enrichmentsArray of objects or null(ocsfv1.3.0scanactivityEnrichment)

The additional information from an external data source, which is associated with the event or a finding. For example add location information for the IP address in the DNS answers:

[{"name": "answers.ip", "value": "92.24.47.250", "type": "location", "data": {"city": "Socotra", "continent": "Asia", "coordinates": [-25.4153, 17.0743], "country": "YE", "desc": "Yemen"}}]

result.​messagestring or null

The description of the event/finding, as defined by the source.

result.​num_detectionsinteger or null

The number of detections.

result.​num_filesinteger or null

The number of files scanned.

result.​num_foldersinteger or null

The number of folders scanned.

result.​num_hostsinteger or null

The number of hosts that were scanned.

result.​num_network_itemsinteger or null

The number of network items scanned.

result.​num_processesinteger or null

The number of processes scanned.

result.​num_registry_itemsinteger or null

The number of registry items scanned.

result.​num_resolutionsinteger or null

The number of items that were resolved.

result.​num_skipped_itemsinteger or null

The number of skipped items.

result.​num_trusted_itemsinteger or null

The number of trusted items.

result.​observablesArray of objects or null(ocsfv1.3.0scanactivityObservable)

The observables associated with the event or a finding.

result.​osintArray of objects or null(ocsfv1.3.0scanactivityOsint)

The OSINT (Open Source Intelligence) object contains details related to an indicator such as the indicator itself, related indicators, geolocation, registrar information, subdomains, analyst commentary, and other contextual information. This information can be used to further enrich a detection or finding by providing decisioning support to other analysts and engineers.

result.​policyobject(ocsfv1.3.0scanactivityPolicy)

The Policy object describes the policies that are applicable.

Policy attributes provide traceability to the operational state of the security product at the time that the event was captured, facilitating forensics, troubleshooting, and policy tuning/adjustments.

result.​raw_datastring or null

The raw event/finding data as received from the source.

result.​schedule_uidstring or null

The unique identifier of the schedule associated with a scan job.

result.​severitystring or null

The event/finding severity, normalized to the caption of the severity_id value. In the case of 'Other', it is defined by the source.

result.​start_timeinteger(ocsfv1.3.0scanactivityTimestamp)

The timestamp format is the number of milliseconds since the Epoch 01/01/1970 00:00:00 UTC. For example 1618524549901.

result.​start_time_dtstring or null(date-time)

The start time of the scan job.

result.​statusstring or null

The event status, normalized to the caption of the status_id value. In the case of 'Other', it is defined by the event source.

result.​status_codestring or null

The event status code, as reported by the event source.

For example, in a Windows Failed Authentication event, this would be the value of 'Failure Code', e.g. 0x18.

result.​status_detailstring or null

The status detail contains additional information about the event/finding outcome.

result.​status_idinteger(ocsfv1.3.0scanactivityStatusId)

StatusId is an enum, and the following values are allowed. 0 - Unknown: The status is unknown. 1 - Success 2 - Failure 99 - Other: The event status is not mapped. See the status attribute, which contains a data source specific value.

result.​time_dtstring or null(date-time)

The normalized event occurrence time or the finding creation time.

result.​timezone_offsetinteger or null

The number of minutes that the reported event time is ahead or behind UTC, in the range -1,080 to +1,080.

result.​totalinteger or null

The total number of items that were scanned; zero if no items were scanned.

result.​type_namestring or null

The event/finding type name, as defined by the type_uid.

result.​unmappedobject(ocsfv1.3.0scanactivityObject)

An unordered collection of attributes. It defines a set of attributes available in all objects. It can be also used as a generic object to log objects that are not otherwise defined by the schema.

metaobject(MetaResponse)
Response
application/json
{ "result": { "activity_id": 0, "activity_name": "string", "actor": {}, "agent_list": [], "api": {}, "category_name": "string", "category_uid": 0, "class_uid": 0, "cloud": {}, "command_uid": "string", "count": 0, "custom_fields": {}, "device": {}, "duration": 0, "end_time": 0, "end_time_dt": "2019-08-24T14:15:22Z", "enrichments": [], "message": "string", "metadata": {}, "num_detections": 0, "num_files": 0, "num_folders": 0, "num_hosts": 0, "num_network_items": 0, "num_processes": 0, "num_registry_items": 0, "num_resolutions": 0, "num_skipped_items": 0, "num_trusted_items": 0, "observables": [], "osint": [], "policy": {}, "raw_data": "string", "scan": {}, "schedule_uid": "string", "severity": "string", "severity_id": 0, "start_time": 0, "start_time_dt": "2019-08-24T14:15:22Z", "status": "string", "status_code": "string", "status_detail": "string", "status_id": 0, "time": 0, "time_dt": "2019-08-24T14:15:22Z", "timezone_offset": 0, "total": 0, "type_name": "string", "type_uid": 0, "unmapped": {} }, "meta": { "stats": {}, "api": {} } }