Skip to main content
Version: 6.0

Hash Data Model

Attention!

To ensure compatibility and consistency, data is aligned to ECS (Elastic Common Schema). Additional fields that start with a capital letter are also used. These fields are not part of ECS, but are required to enrich information for this IoC type.

The fields below must be present in index documents that describe indicators of compromise (IoC).


Main Information

FieldDescription
threat.indicator.nameArray of hash values used as indicators (MD5, SHA1, and SHA256). Main field for matching.
threat.indicator.typeIndicator type. Always file here.
event.providerThreat data provider (for example: CTT, ThreatFox).
threat.indicator.providerAlternative field for IoC source/provider.

File Details

FieldDescription
threat.indicator.file.nameOriginal or known filename associated with the hash.
threat.indicator.file.md5File hash calculated with MD5.
threat.indicator.file.sha1File hash calculated with SHA1.
threat.indicator.file.sha256File hash calculated with SHA256.

Scoring and Classification

FieldDescription
Threat.indicator.severitySeverity score from SIEM (for example: Low, Medium, High).
threat.indicator.confidenceConfidence level from the IoC provider (for example: Low, Medium, High).
Threat.indicator.risk_scoreNumeric risk score calculated by SIEM (event.risk_score / 10).
Threat.indicator.categoryThreat category associated with the IoC (for example: malware, ransomware, dropper).
event.risk_scoreRisk score assigned by the IoC provider (0 to 100).

Threat Context

FieldDescription
Threat.indicator.ttpRelated tactics, techniques, and procedures (TTPs) from MITRE ATT&CK.
threat.indicator.descriptionText description or additional threat details.
tagsList of tags or related vulnerabilities.
Threat.indicator.blacklistsBlacklists where this IoC was observed.

Time Attributes

FieldDescription
threat.indicator.first_seenDate and time when the IoC was first observed by the provider.
threat.indicator.last_seenDate and time of the latest IoC update.
Threat.indicator.lifetimeIndicator lifetime.

False Positive Handling

FieldDescription
Threat.indicator.fp.alarmFlag indicating a potential false positive.
Threat.indicator.fp.descriptionDescription of why the IoC can be a false positive.

Data Model for Correlation

The fields below must be present in index documents that describe user file interactions. For all such sources containing this data, add the alias: sm_threat_intelligence_alerts_hash.

File Information

FieldDescription
file.nameFile name detected in the event.
file.pathFull file path on the host.
file.hash.md5MD5 hash from the event. Key field for correlation.
file.hash.sha1SHA1 hash from the event. Key field for correlation.
file.hash.sha256SHA256 hash from the event. Key field for correlation.

Host and User Information

FieldDescription
host.nameHost name where the event occurred.
winlog.user.nameUsername in whose context the event occurred.