You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
@@ -122,10 +121,10 @@ class DetectionFinding(Finding, BaseModel):
122
121
- Class (class_name) [Optional]: The event class name, as defined by class_uid value: Detection Finding.
123
122
- Class ID (class_uid): The unique identifier of a class. A Class describes the attributes available in an event.
124
123
- Cloud (cloud) [Optional]: Describes details about the Cloud environment where the event was originally created or logged.
125
-
- Container (container) [Optional]: Describes the container details.
126
124
- Count (count) [Optional]: Number of times similar events occurred within a specified timeframe.
127
125
- Duration (duration) [Optional]: Time span of the event, from start to end, in milliseconds.
128
126
- Event Time (time) [Required]: The standardized time when the event occurred or the finding was created.
127
+
- Event Time (time_dt) [Optional]: The standardized time when the event occurred or the finding was created, in datetime format.
129
128
- Evidence Artifacts (evidences) [Optional]: Artifacts related to the security detection activities.
130
129
- Impact (impact) [Optional]: The impact, normalized to the caption of the impact_id value. In the case of 'Other', it is defined by the event source.
131
130
- Impact Score (impact_score) [Optional]: The impact of the finding, valid range 0-100.
@@ -135,32 +134,26 @@ class DetectionFinding(Finding, BaseModel):
135
134
- Risk Level ID (risk_level_id) [Optional]: The normalized risk level id.
136
135
- Risk Score (risk_score) [Optional]: The risk score as reported by the event source.
137
136
- Risk Details (risk_details) [Optional]: Additional details about the risk.
137
+
- Status ID (status_id) [Optional]: The normalized identifier of the event/finding severity.
138
138
- Timezone Offset (timezone_offset) [Optional]: Difference in minutes from UTC.
139
139
- Type ID (type_uid): The event/finding type ID. It identifies the event's semantics and structure. The value is calculated by the logging system as: class_uid * 100 + activity_id.
140
140
- Type Name (type_name) [Optional]: The event/finding type name, as defined by the type_uid.
141
141
- Vulnerabilities (vulnerabilities) [Optional]: Vulnerabilities identified in the finding.
142
142
143
143
If the Cloud profile is needed:
144
144
- API Details (api) [Optional]: Describes details about a typical API (Application Programming Interface) call.
145
-
- Cloud (cloud): Describes details about the Cloud environment where the event was originally created or logged.
146
-
147
-
If the Container profile is needed:
148
-
- Container (container) [Recommended]: The information describing an instance of a container. A container is a prepackaged, portable system image that runs isolated on an existing system using a container runtime like containerd.
149
-
- Namespace PID (namespace_pid) [Recommended]: If running under a process namespace (such as in a container), the process identifier within that process namespace.
145
+
- Cloud (cloud): Describes details about the Cloud environment where the event was originally created or logged
Copy file name to clipboardExpand all lines: py_ocsf_models/events/findings/finding.py
+21-9Lines changed: 21 additions & 9 deletions
Original file line number
Diff line number
Diff line change
@@ -79,13 +79,17 @@ class FindingInformation(BaseModel):
79
79
Attributes:
80
80
- Analytic (analytic) [Recommended]: The analytic technique used to analyze and derive insights from the data or information that led to the finding or conclusion.
81
81
- Created Time (created_time) [Optional]: The time when the finding was created.
82
+
- Created Time DT (created_time_dt) [Optional]: The time when the finding was created in datetime format.
82
83
- Data Sources (data_sources) [Optional]: A list of data sources utilized in generation of the finding.
83
84
- Description (desc) [Optional]: The description of the reported finding.
84
-
- First Seen (first_seen_time) [Optional]: The time when the finding was first observed. It can differ from the created_time datetime, which reflects the time this finding was created.
85
+
- First Seen (first_seen_time) [Optional]: The time when the finding was first observed.
86
+
- First Seen DT (first_seen_time_dt) [Optional]: The time when the finding was first observed in datetime format.
85
87
- Kill Chain (kill_chain) [Optional]: The Cyber Kill Chain® provides a detailed description of each phase and its associated activities within the broader context of a cyber attack.
86
-
- Last Seen (last_seen_time) [Optional]: The time when the finding was most recently observed. It can differ from the modified_time datetime, which reflects the time this finding was last modified.
88
+
- Last Seen (last_seen_time) [Optional]: The time when the finding was last observed.
89
+
- Last Seen DT (last_seen_time_dt) [Optional]: The time when the finding was last observed in datetime format.
87
90
- MITRE ATT&CK® Details (attacks) [Optional]: The MITRE ATT&CK® technique and associated tactics related to the finding.
88
91
- Modified Time (modified_time) [Optional]: The time when the finding was last modified.
92
+
- Modified Time DT (modified_time_dt) [Optional]: The time when the finding was last modified in datetime format.
89
93
- Product Identifier (product_uid) [Optional]: The unique identifier of the product that reported the finding.
90
94
- Related Analytics (related_analytics) [Optional]: Other analytics related to this finding.
91
95
- Related Events (related_events) [Optional]: Describes events and/or other findings related to the finding as identified by the security product.
@@ -96,14 +100,18 @@ class FindingInformation(BaseModel):
96
100
"""
97
101
98
102
analytic: Optional[Analytic]
99
-
created_time: Optional[datetime]
103
+
created_time: Optional[int]
104
+
created_time_dt: Optional[datetime]
100
105
data_sources: Optional[List[str]]
101
106
desc: Optional[str]
102
-
first_seen_time: Optional[datetime]
107
+
first_seen_time: Optional[int]
108
+
first_seen_time_dt: Optional[datetime]
103
109
kill_chain: Optional[List[KillChainPhase]]
104
-
last_seen_time: Optional[datetime]
110
+
last_seen_time: Optional[int]
111
+
last_seen_time_dt: Optional[datetime]
105
112
attacks: Optional[List[MITREAttack]]
106
-
modified_time: Optional[datetime]
113
+
modified_time: Optional[int]
114
+
modified_time_dt: Optional[datetime]
107
115
product_uid: Optional[str]
108
116
related_analytics: Optional[List[Analytic]]
109
117
related_events: Optional[List[RelatedEvent]]
@@ -161,9 +169,11 @@ class Finding(BaseEvent, BaseModel):
161
169
- Confidence (confidence) [Optional]: The confidence, normalized to the caption of the confidence_id value. In the case of 'Other', it is defined by the event source.
162
170
- Confidence ID (confidence_id) [Optional]: Represents the accuracy of the detection rule. A low confidence indicates a broad finding scope that may include benign events.
163
171
- Confidence Score (confidence_score) [Optional]: The confidence score as reported by the event source.
164
-
- End Time (end_time) [Optional]: datetime of the most recent event included in the finding.
172
+
- End Time (end_time) [Optional]: Time of the latest event included in the finding.
173
+
- End Time DT (end_time_dt) [Optional]: Time of the latest event included in the finding in datetime format.
165
174
- Finding Information (finding_info) [Required]: Describes the supporting information about a generated finding.
166
175
- Start Time (start_time) [Optional]: Time of the earliest event included in the finding.
176
+
- Start Time DT (start_time_dt) [Optional]: Time of the earliest event included in the finding in datetime
167
177
168
178
"""
169
179
@@ -173,6 +183,8 @@ class Finding(BaseEvent, BaseModel):
Copy file name to clipboardExpand all lines: py_ocsf_models/objects/vulnerability_details.py
+6-2Lines changed: 6 additions & 2 deletions
Original file line number
Diff line number
Diff line change
@@ -19,8 +19,10 @@ class VulnerabilityDetails(BaseModel):
19
19
- Description (desc) [Optional]: The description of the vulnerability.
20
20
- Exploit Availability (is_exploit_available) [Optional]: Indicates if an exploit or a PoC (proof-of-concept) is available for the reported vulnerability.
21
21
- First Seen (first_seen_time) [Optional]: The time when the vulnerability was first observed.
22
+
- First Seen (first_seen_time_dt) [Optional]: The time when the vulnerability was first observed in datetime format.
22
23
- Knowledgebase Articles (kb_article_list) [Optional]: A list of KB articles or patches related to an endpoint. A KB Article contains metadata that describes the patch or an update.
23
24
- Last Seen (last_seen_time) [Optional]: The time when the vulnerability was most recently observed.
25
+
- Last Seen (last_seen_time_dt) [Optional]: The time when the vulnerability was most recently observed in datetime format.
24
26
- References (references) [Recommended]: A list of reference URLs with additional information about the vulnerability.
25
27
- Related Vulnerabilities (related_vulnerabilities) [Optional]: List of vulnerabilities that are related to this vulnerability.
26
28
- Remediation Guidance (remediation) [Optional]: The remediation recommendations on how to mitigate the identified vulnerability.
@@ -36,9 +38,11 @@ class VulnerabilityDetails(BaseModel):
0 commit comments