Skip to content

Class: WindowsEvidences

Extends the evidences object to add Windows specific fields

URI: ocsf:WindowsEvidences

 classDiagram
    class WindowsEvidences
    click WindowsEvidences href "../WindowsEvidences/"
      Evidences <|-- WindowsEvidences
        click Evidences href "../Evidences/"

      WindowsEvidences : actor





        WindowsEvidences --> "0..1 _recommended_" Actor : actor
        click Actor href "../Actor/"



      WindowsEvidences : api





        WindowsEvidences --> "0..1 _recommended_" Api : api
        click Api href "../Api/"



      WindowsEvidences : connection_info





        WindowsEvidences --> "0..1 _recommended_" NetworkConnectionInfo : connection_info
        click NetworkConnectionInfo href "../NetworkConnectionInfo/"



      WindowsEvidences : container





        WindowsEvidences --> "0..1 _recommended_" Container : container
        click Container href "../Container/"



      WindowsEvidences : data

      WindowsEvidences : database





        WindowsEvidences --> "0..1 _recommended_" Database : database
        click Database href "../Database/"



      WindowsEvidences : databucket





        WindowsEvidences --> "0..1 _recommended_" Databucket : databucket
        click Databucket href "../Databucket/"



      WindowsEvidences : device





        WindowsEvidences --> "0..1 _recommended_" Device : device
        click Device href "../Device/"



      WindowsEvidences : dst_endpoint





        WindowsEvidences --> "0..1 _recommended_" NetworkEndpoint : dst_endpoint
        click NetworkEndpoint href "../NetworkEndpoint/"



      WindowsEvidences : email





        WindowsEvidences --> "0..1 _recommended_" Email : email
        click Email href "../Email/"



      WindowsEvidences : file





        WindowsEvidences --> "0..1 _recommended_" File : file
        click File href "../File/"



      WindowsEvidences : http_request





        WindowsEvidences --> "0..1 _recommended_" HttpRequest : http_request
        click HttpRequest href "../HttpRequest/"



      WindowsEvidences : http_response





        WindowsEvidences --> "0..1 _recommended_" HttpResponse : http_response
        click HttpResponse href "../HttpResponse/"



      WindowsEvidences : ja4_fingerprint_list





        WindowsEvidences --> "* _recommended_" Ja4Fingerprint : ja4_fingerprint_list
        click Ja4Fingerprint href "../Ja4Fingerprint/"



      WindowsEvidences : job





        WindowsEvidences --> "0..1 _recommended_" Job : job
        click Job href "../Job/"



      WindowsEvidences : name

      WindowsEvidences : process





        WindowsEvidences --> "0..1 _recommended_" Process : process
        click Process href "../Process/"



      WindowsEvidences : query





        WindowsEvidences --> "0..1 _recommended_" DnsQuery : query
        click DnsQuery href "../DnsQuery/"



      WindowsEvidences : reg_key





        WindowsEvidences --> "0..1 _recommended_" RegKey : reg_key
        click RegKey href "../RegKey/"



      WindowsEvidences : reg_value





        WindowsEvidences --> "0..1 _recommended_" RegValue : reg_value
        click RegValue href "../RegValue/"



      WindowsEvidences : resources





        WindowsEvidences --> "* _recommended_" ResourceDetails : resources
        click ResourceDetails href "../ResourceDetails/"



      WindowsEvidences : script





        WindowsEvidences --> "0..1 _recommended_" Script : script
        click Script href "../Script/"



      WindowsEvidences : src_endpoint





        WindowsEvidences --> "0..1 _recommended_" NetworkEndpoint : src_endpoint
        click NetworkEndpoint href "../NetworkEndpoint/"



      WindowsEvidences : tls





        WindowsEvidences --> "0..1 _recommended_" Tls : tls
        click Tls href "../Tls/"



      WindowsEvidences : uid

      WindowsEvidences : url





        WindowsEvidences --> "0..1 _recommended_" Url : url
        click Url href "../Url/"



      WindowsEvidences : user





        WindowsEvidences --> "0..1 _recommended_" User : user
        click User href "../User/"



      WindowsEvidences : verdict

      WindowsEvidences : verdict_id





        WindowsEvidences --> "0..1" EvidencesVerdictIdEnum : verdict_id
        click EvidencesVerdictIdEnum href "../EvidencesVerdictIdEnum/"



      WindowsEvidences : win_service





        WindowsEvidences --> "0..1 _recommended_" WinService : win_service
        click WinService href "../WinService/"



Inheritance

Slots

Name Cardinality and Range Description Inheritance
reg_key 0..1 recommended
RegKey
Describes details about the registry key that triggered the detection direct
reg_value 0..1 recommended
RegValue
Describes details about the registry value that triggered the detection direct
win_service 0..1 recommended
WinService
Describes details about the Windows service that triggered the detection direct
actor 0..1 recommended
Actor
Describes details about the user/role/process that was the source of the Evidences
api 0..1 recommended
Api
Describes details about the API call associated to the activity that triggere... Evidences
connection_info 0..1 recommended
NetworkConnectionInfo
Describes details about the network connection associated to the activity tha... Evidences
container 0..1 recommended
Container
Describes details about the container associated to the activity that trigger... Evidences
data 0..1
String
Additional evidence data that is not accounted for in the specific evidence Evidences
database 0..1 recommended
Database
Describes details about the database associated to the activity that triggere... Evidences
databucket 0..1 recommended
Databucket
Describes details about the databucket associated to the activity that Evidences
device 0..1 recommended
Device
An addressable device, computer system or host associated to the activity tha... Evidences
dst_endpoint 0..1 recommended
NetworkEndpoint
Describes details about the destination of the network activity that triggere... Evidences
email 0..1 recommended
Email
The email object associated to the activity that triggered the detection Evidences
file 0..1 recommended
File
Describes details about the file associated to the activity that triggered th... Evidences
http_request 0..1 recommended
HttpRequest
Describes details about the http request associated to the activity that Evidences
http_response 0..1 recommended
HttpResponse
Describes details about the http response associated to the activity that Evidences
ja4_fingerprint_list * recommended
Ja4Fingerprint
Describes details about the JA4+ fingerprints that triggered the detection Evidences
job 0..1 recommended
Job
Describes details about the scheduled job that was associated with the activi... Evidences
name 0..1 recommended
String
The naming convention or type identifier of the evidence associated with the Entity, Evidences
process 0..1 recommended
Process
Describes details about the process associated to the activity that triggered Evidences
query 0..1 recommended
DnsQuery
Describes details about the DNS query associated to the activity that trigger... Evidences
resources * recommended
ResourceDetails
Describes details about the cloud resources directly related to activity that Evidences
script 0..1 recommended
Script
Describes details about the script that was associated with the activity that Evidences
src_endpoint 0..1 recommended
NetworkEndpoint
Describes details about the source of the network activity that triggered the Evidences
tls 0..1 recommended
Tls
Describes details about the Transport Layer Security (TLS) activity that Evidences
uid 0..1 recommended
String
The unique identifier of the evidence associated with the security detection Entity, Evidences
url 0..1 recommended
Url
The URL object that pertains to the event or object associated to the activit... Evidences
user 0..1 recommended
User
Describes details about the user that was the target or somehow else associat... Evidences
verdict 0..1
String
The normalized verdict of the evidence associated with the security detection Evidences
verdict_id 0..1
EvidencesVerdictIdEnum
The normalized verdict (or status) ID of the evidence associated with the Evidences

Rules

Rule Applied Preconditions Postconditions Elseconditions
any_of [{'slot_conditions': {'actor': {'required': True}}}, {'slot_conditions': {'api': {'required': True}}}, {'slot_conditions': {'connection_info': {'required': True}}}, {'slot_conditions': {'data': {'required': True}}}, {'slot_conditions': {'database': {'required': True}}}, {'slot_conditions': {'databucket': {'required': True}}}, {'slot_conditions': {'device': {'required': True}}}, {'slot_conditions': {'dst_endpoint': {'required': True}}}, {'slot_conditions': {'email': {'required': True}}}, {'slot_conditions': {'file': {'required': True}}}, {'slot_conditions': {'process': {'required': True}}}, {'slot_conditions': {'query': {'required': True}}}, {'slot_conditions': {'src_endpoint': {'required': True}}}, {'slot_conditions': {'url': {'required': True}}}, {'slot_conditions': {'user': {'required': True}}}, {'slot_conditions': {'job': {'required': True}}}, {'slot_conditions': {'script': {'required': True}}}, {'slot_conditions': {'reg_key': {'required': True}}}, {'slot_conditions': {'reg_value': {'required': True}}}, {'slot_conditions': {'win_service': {'required': True}}}]

In Subsets

Aliases

  • Windows Evidence Artifacts

Identifier and Mapping Information

Annotations

property value
ocsf_constraints {"at_least_one": ["actor", "api", "connection_info", "data", "database",
"databucket", "device", "dst_endpoint", "email", "file", "process", "query",
"src_endpoint", "url", "user", "job", "script", "reg_key", "reg_value",
"win_service"]}
ocsf_extension windows

Schema Source

Mappings

Mapping Type Mapped Value
self ocsf:WindowsEvidences
native ocsf:WindowsEvidences

LinkML Source

Direct

name: WindowsEvidences
annotations:
  ocsf_constraints:
    tag: ocsf_constraints
    value: '{"at_least_one": ["actor", "api", "connection_info", "data", "database",

      "databucket", "device", "dst_endpoint", "email", "file", "process", "query",

      "src_endpoint", "url", "user", "job", "script", "reg_key", "reg_value",

      "win_service"]}'
  ocsf_extension:
    tag: ocsf_extension
    value: windows
description: Extends the evidences object to add Windows specific fields
in_subset:
- windows_extension_subset
from_schema: https://w3id.org/lmodel/ocsf
aliases:
- Windows Evidence Artifacts
is_a: Evidences
slots:
- reg_key
- reg_value
- win_service
slot_usage:
  reg_key:
    name: reg_key
    description: Describes details about the registry key that triggered the detection.
    recommended: true
  reg_value:
    name: reg_value
    description: Describes details about the registry value that triggered the detection.
    recommended: true
  win_service:
    name: win_service
    description: Describes details about the Windows service that triggered the detection.
    recommended: true
rules:
- postconditions:
    any_of:
    - slot_conditions:
        actor:
          name: actor
          required: true
    - slot_conditions:
        api:
          name: api
          required: true
    - slot_conditions:
        connection_info:
          name: connection_info
          required: true
    - slot_conditions:
        data:
          name: data
          required: true
    - slot_conditions:
        database:
          name: database
          required: true
    - slot_conditions:
        databucket:
          name: databucket
          required: true
    - slot_conditions:
        device:
          name: device
          required: true
    - slot_conditions:
        dst_endpoint:
          name: dst_endpoint
          required: true
    - slot_conditions:
        email:
          name: email
          required: true
    - slot_conditions:
        file:
          name: file
          required: true
    - slot_conditions:
        process:
          name: process
          required: true
    - slot_conditions:
        query:
          name: query
          required: true
    - slot_conditions:
        src_endpoint:
          name: src_endpoint
          required: true
    - slot_conditions:
        url:
          name: url
          required: true
    - slot_conditions:
        user:
          name: user
          required: true
    - slot_conditions:
        job:
          name: job
          required: true
    - slot_conditions:
        script:
          name: script
          required: true
    - slot_conditions:
        reg_key:
          name: reg_key
          required: true
    - slot_conditions:
        reg_value:
          name: reg_value
          required: true
    - slot_conditions:
        win_service:
          name: win_service
          required: true
  description: 'OCSF at_least_one: at least one of [''actor'', ''api'', ''connection_info'',
    ''data'',

    ''database'', ''databucket'', ''device'', ''dst_endpoint'', ''email'', ''file'',
    ''process'',

    ''query'', ''src_endpoint'', ''url'', ''user'', ''job'', ''script'', ''reg_key'',

    ''reg_value'', ''win_service''] must be set.'

Induced

name: WindowsEvidences
annotations:
  ocsf_constraints:
    tag: ocsf_constraints
    value: '{"at_least_one": ["actor", "api", "connection_info", "data", "database",

      "databucket", "device", "dst_endpoint", "email", "file", "process", "query",

      "src_endpoint", "url", "user", "job", "script", "reg_key", "reg_value",

      "win_service"]}'
  ocsf_extension:
    tag: ocsf_extension
    value: windows
description: Extends the evidences object to add Windows specific fields
in_subset:
- windows_extension_subset
from_schema: https://w3id.org/lmodel/ocsf
aliases:
- Windows Evidence Artifacts
is_a: Evidences
slot_usage:
  reg_key:
    name: reg_key
    description: Describes details about the registry key that triggered the detection.
    recommended: true
  reg_value:
    name: reg_value
    description: Describes details about the registry value that triggered the detection.
    recommended: true
  win_service:
    name: win_service
    description: Describes details about the Windows service that triggered the detection.
    recommended: true
attributes:
  reg_key:
    name: reg_key
    annotations:
      ocsf_extension:
        tag: ocsf_extension
        value: windows
    description: Describes details about the registry key that triggered the detection.
    from_schema: https://w3id.org/lmodel/ocsf
    aliases:
    - Registry Key
    rank: 1000
    alias: reg_key
    owner: WindowsEvidences
    domain_of:
    - WindowsEvidences
    - WindowsQueryEvidence
    - RegistryKeyActivity
    - RegistryKeyQuery
    range: RegKey
    recommended: true
  reg_value:
    name: reg_value
    annotations:
      ocsf_extension:
        tag: ocsf_extension
        value: windows
    description: Describes details about the registry value that triggered the detection.
    from_schema: https://w3id.org/lmodel/ocsf
    aliases:
    - Registry Value
    rank: 1000
    alias: reg_value
    owner: WindowsEvidences
    domain_of:
    - WindowsEvidences
    - WindowsQueryEvidence
    - RegistryValueActivity
    - RegistryValueQuery
    range: RegValue
    recommended: true
  win_service:
    name: win_service
    annotations:
      ocsf_extension:
        tag: ocsf_extension
        value: windows
    description: Describes details about the Windows service that triggered the detection.
    from_schema: https://w3id.org/lmodel/ocsf
    aliases:
    - Windows Service
    rank: 1000
    alias: win_service
    owner: WindowsEvidences
    domain_of:
    - WindowsEvidences
    - WindowsStartupItem
    - WindowsServiceActivity
    range: WinService
    recommended: true
  actor:
    name: actor
    description: 'Describes details about the user/role/process that was the source
      of the

      activity that triggered the detection.'
    from_schema: https://w3id.org/lmodel/ocsf
    aliases:
    - Actor
    rank: 1000
    alias: actor
    owner: WindowsEvidences
    domain_of:
    - Evidences
    - HostProfile
    - ApiActivity
    - DatastoreActivity
    - FileHosting
    - ConfigState
    - DeviceConfigStateChange
    - InventoryInfo
    - OsintInventoryInfo
    - SoftwareInfo
    - UserInventory
    - DataSecurityFinding
    - IamEvent
    - NetworkFileActivity
    - SystemEvent
    - EventLogActvity
    - FileActivity
    - KernelExtensionActivity
    - ModuleActivity
    - ProcessActivity
    - ScheduledJobActivity
    - RegistryKeyActivity
    - RegistryValueActivity
    range: Actor
    recommended: true
  api:
    name: api
    description: 'Describes details about the API call associated to the activity
      that triggered

      the detection.'
    from_schema: https://w3id.org/lmodel/ocsf
    aliases:
    - API Details
    rank: 1000
    alias: api
    owner: WindowsEvidences
    domain_of:
    - Evidences
    - CloudProfile
    - ApiActivity
    range: Api
    recommended: true
  connection_info:
    name: connection_info
    description: 'Describes details about the network connection associated to the
      activity that

      triggered the detection.'
    from_schema: https://w3id.org/lmodel/ocsf
    aliases:
    - Connection Info
    rank: 1000
    alias: connection_info
    owner: WindowsEvidences
    domain_of:
    - QueryEvidence
    - Evidences
    - FileHosting
    - NetworkConnectionQuery
    - NetworkEvent
    - DnsActivity
    - NetworkFileActivity
    - RdpActivity
    - TunnelActivity
    - NetworkRemediationActivity
    - UnmannedSystemsEvent
    range: NetworkConnectionInfo
    recommended: true
  container:
    name: container
    description: 'Describes details about the container associated to the activity
      that triggered

      the detection.'
    from_schema: https://w3id.org/lmodel/ocsf
    aliases:
    - Container
    rank: 1000
    alias: container
    owner: WindowsEvidences
    domain_of:
    - Evidences
    - ContainerProfile
    - CloudResourcesInventoryInfo
    range: Container
    recommended: true
  data:
    name: data
    description: 'Additional evidence data that is not accounted for in the specific
      evidence

      attributes.<code> Use only when absolutely necessary.</code>'
    from_schema: https://w3id.org/lmodel/ocsf
    aliases:
    - Data
    rank: 1000
    alias: data
    owner: WindowsEvidences
    domain_of:
    - Request
    - Response
    - TlsExtension
    - Resource
    - ApplicationObject
    - Edge
    - Enrichment
    - Evidences
    - ManagedEntity
    - Node
    - Policy
    - QueryInfo
    - WebResource
    - RegValue
    range: string
  database:
    name: database
    description: 'Describes details about the database associated to the activity
      that triggered

      the detection.'
    from_schema: https://w3id.org/lmodel/ocsf
    aliases:
    - Database
    rank: 1000
    alias: database
    owner: WindowsEvidences
    domain_of:
    - Evidences
    - DatastoreActivity
    - CloudResourcesInventoryInfo
    - DataSecurityFinding
    range: Database
    recommended: true
  databucket:
    name: databucket
    description: 'Describes details about the databucket associated to the activity
      that

      triggered the detection.'
    from_schema: https://w3id.org/lmodel/ocsf
    aliases:
    - Databucket
    rank: 1000
    alias: databucket
    owner: WindowsEvidences
    domain_of:
    - Evidences
    - DatastoreActivity
    - CloudResourcesInventoryInfo
    - DataSecurityFinding
    range: Databucket
    recommended: true
  device:
    name: device
    description: 'An addressable device, computer system or host associated to the
      activity that

      triggered the detection.'
    from_schema: https://w3id.org/lmodel/ocsf
    aliases:
    - Device
    rank: 1000
    alias: device
    owner: WindowsEvidences
    domain_of:
    - AuthFactor
    - Evidences
    - Logger
    - ManagedEntity
    - HostProfile
    - ConfigState
    - DeviceConfigStateChange
    - EvidenceInfo
    - InventoryInfo
    - PatchState
    - SoftwareInfo
    - DataSecurityFinding
    - Finding
    - RdpActivity
    - TunnelActivity
    - SystemEvent
    - EventLogActvity
    range: Device
    recommended: true
  dst_endpoint:
    name: dst_endpoint
    description: 'Describes details about the destination of the network activity
      that triggered

      the detection.'
    from_schema: https://w3id.org/lmodel/ocsf
    aliases:
    - Destination Endpoint
    rank: 1000
    alias: dst_endpoint
    owner: WindowsEvidences
    domain_of:
    - Evidences
    - LoadBalancer
    - ApiActivity
    - DatastoreActivity
    - FileHosting
    - WebResourcesActivity
    - DataSecurityFinding
    - Authentication
    - AuthorizeSession
    - NetworkEvent
    - DhcpActivity
    - DnsActivity
    - EmailActivity
    - NetworkActivity
    - NetworkFileActivity
    - TunnelActivity
    - EventLogActvity
    - UnmannedSystemsEvent
    - AirborneBroadcastActivity
    range: NetworkEndpoint
    recommended: true
  email:
    name: email
    description: The email object associated to the activity that triggered the detection.
    from_schema: https://w3id.org/lmodel/ocsf
    aliases:
    - Email
    rank: 1000
    alias: email
    owner: WindowsEvidences
    domain_of:
    - Osint
    - Evidences
    - ManagedEntity
    - EmailActivity
    range: Email
    recommended: true
  file:
    name: file
    description: 'Describes details about the file associated to the activity that
      triggered the

      detection.'
    from_schema: https://w3id.org/lmodel/ocsf
    aliases:
    - File
    rank: 1000
    alias: file
    owner: WindowsEvidences
    domain_of:
    - Osint
    - QueryEvidence
    - Script
    - AffectedCode
    - Databucket
    - Evidences
    - Job
    - KernelDriver
    - Module
    - Process
    - FileHosting
    - FileQuery
    - DataSecurityFinding
    - EmailFileActivity
    - FtpActivity
    - HttpActivity
    - NetworkFileActivity
    - RdpActivity
    - SmbActivity
    - SshActivity
    - FileRemediationActivity
    - EventLogActvity
    - FileActivity
    range: File
    recommended: true
  http_request:
    name: http_request
    description: 'Describes details about the http request associated to the activity
      that

      triggered the detection.'
    from_schema: https://w3id.org/lmodel/ocsf
    aliases:
    - HTTP Request
    rank: 1000
    alias: http_request
    owner: WindowsEvidences
    domain_of:
    - Evidences
    - ApiActivity
    - DatastoreActivity
    - FileHosting
    - WebResourceAccessActivity
    - WebResourcesActivity
    - IamEvent
    - HttpActivity
    range: HttpRequest
    recommended: true
  http_response:
    name: http_response
    description: 'Describes details about the http response associated to the activity
      that

      triggered the detection.'
    from_schema: https://w3id.org/lmodel/ocsf
    aliases:
    - HTTP Response
    rank: 1000
    alias: http_response
    owner: WindowsEvidences
    domain_of:
    - Evidences
    - ApiActivity
    - DatastoreActivity
    - FileHosting
    - WebResourceAccessActivity
    - WebResourcesActivity
    - IamEvent
    - HttpActivity
    range: HttpResponse
    recommended: true
  ja4_fingerprint_list:
    name: ja4_fingerprint_list
    description: Describes details about the JA4+ fingerprints that triggered the
      detection.
    from_schema: https://w3id.org/lmodel/ocsf
    aliases:
    - JA4+ Fingerprints
    rank: 1000
    alias: ja4_fingerprint_list
    owner: WindowsEvidences
    domain_of:
    - Evidences
    - NetworkEvent
    range: Ja4Fingerprint
    recommended: true
    multivalued: true
  job:
    name: job
    description: 'Describes details about the scheduled job that was associated with
      the activity

      that triggered the detection.'
    from_schema: https://w3id.org/lmodel/ocsf
    aliases:
    - Job
    rank: 1000
    alias: job
    owner: WindowsEvidences
    domain_of:
    - QueryEvidence
    - StartupItem
    - Evidences
    - JobQuery
    - ScheduledJobActivity
    range: Job
    recommended: true
  name:
    name: name
    description: 'The naming convention or type identifier of the evidence associated
      with the

      security detection. For example, the <code>@odata.type</code> from Microsoft

      Graph Alerts V2 or <code>display_name</code> from CrowdStrike Falcon Incident

      Behaviors.'
    from_schema: https://w3id.org/lmodel/ocsf
    aliases:
    - Name
    rank: 1000
    alias: name
    owner: WindowsEvidences
    domain_of:
    - AnalysisTarget
    - Observable
    - Os
    - Osint
    - Package
    - Parameter
    - PrivilegeInfo
    - San
    - Scim
    - Script
    - ServicePrivilegeAnalysis
    - SoftwareComponent
    - Sso
    - StartupItem
    - ThreatActor
    - Token
    - Entity
    - Resource
    - Account
    - Agent
    - AiModel
    - Aircraft
    - Analytic
    - ApplicationObject
    - Assessment
    - AutonomousSystem
    - Campaign
    - Check
    - CisBenchmark
    - CisBenchmarkResult
    - CisControl
    - ClassifierDetails
    - Container
    - D3fTactic
    - D3fTechnique
    - Database
    - Databucket
    - DomainContact
    - Edge
    - Endpoint
    - Enrichment
    - EnvironmentVariable
    - Evidences
    - Extension
    - Feature
    - File
    - Graph
    - Group
    - HttpCookie
    - HttpHeader
    - Idp
    - Image
    - Job
    - Kernel
    - KeyValueObject
    - LoadBalancer
    - Logger
    - Malware
    - ManagedEntity
    - MessageContext
    - Metric
    - Mitigation
    - NetworkInterface
    - Node
    - Organization
    - PeripheralDevice
    - Policy
    - ProcessEntity
    - Product
    - QueryInfo
    - Reporter
    - ResourceDetails
    - Rule
    - Scan
    - Service
    - SubTechnique
    - Table
    - Tactic
    - Technique
    - Trait
    - TransformationInfo
    - UnmannedAerialSystem
    - User
    - WebResource
    - Device
    - FtpActivity
    - RegValue
    - WinResource
    - WinService
    - PrefetchQuery
    range: string
    recommended: true
  process:
    name: process
    description: 'Describes details about the process associated to the activity that
      triggered

      the detection.'
    from_schema: https://w3id.org/lmodel/ocsf
    aliases:
    - Process
    rank: 1000
    alias: process
    owner: WindowsEvidences
    domain_of:
    - QueryEvidence
    - StartupItem
    - Actor
    - Evidences
    - ModuleQuery
    - NetworkConnectionQuery
    - ProcessQuery
    - SecurityFinding
    - ProcessRemediationActivity
    - MemoryActivity
    - ProcessActivity
    range: Process
    recommended: true
  query:
    name: query
    description: 'Describes details about the DNS query associated to the activity
      that triggered

      the detection.'
    from_schema: https://w3id.org/lmodel/ocsf
    aliases:
    - DNS Query
    rank: 1000
    alias: query
    owner: WindowsEvidences
    domain_of:
    - Evidences
    - DnsActivity
    range: DnsQuery
    recommended: true
  resources:
    name: resources
    description: 'Describes details about the cloud resources directly related to
      activity that

      triggered the detection. For resources impacted by the detection, use

      <code>Affected Resources</code> at the top-level of the finding.'
    from_schema: https://w3id.org/lmodel/ocsf
    aliases:
    - Resources Array
    rank: 1000
    alias: resources
    owner: WindowsEvidences
    domain_of:
    - Evidences
    - ApiActivity
    - CloudResourcesInventoryInfo
    - ApplicationSecurityPostureFinding
    - ComplianceFinding
    - DataSecurityFinding
    - DetectionFinding
    - IamAnalysisFinding
    - SecurityFinding
    - VulnerabilityFinding
    - UserAccess
    range: ResourceDetails
    recommended: true
    multivalued: true
  script:
    name: script
    description: 'Describes details about the script that was associated with the
      activity that

      triggered the detection.'
    from_schema: https://w3id.org/lmodel/ocsf
    aliases:
    - Script
    rank: 1000
    alias: script
    owner: WindowsEvidences
    domain_of:
    - Osint
    - Evidences
    - ScriptActivity
    range: Script
    recommended: true
  src_endpoint:
    name: src_endpoint
    description: 'Describes details about the source of the network activity that
      triggered the

      detection.'
    from_schema: https://w3id.org/lmodel/ocsf
    aliases:
    - Source Endpoint
    rank: 1000
    alias: src_endpoint
    owner: WindowsEvidences
    domain_of:
    - Evidences
    - ApiActivity
    - DatastoreActivity
    - FileHosting
    - WebResourceAccessActivity
    - WebResourcesActivity
    - DataSecurityFinding
    - IamEvent
    - NetworkEvent
    - DhcpActivity
    - EmailActivity
    - NetworkActivity
    - NetworkFileActivity
    - TunnelActivity
    - EventLogActvity
    - UnmannedSystemsEvent
    - AirborneBroadcastActivity
    - DroneFlightsActivity
    range: NetworkEndpoint
    recommended: true
  tls:
    name: tls
    description: 'Describes details about the Transport Layer Security (TLS) activity
      that

      triggered the detection.'
    from_schema: https://w3id.org/lmodel/ocsf
    aliases:
    - TLS
    rank: 1000
    alias: tls
    owner: WindowsEvidences
    domain_of:
    - Evidences
    - WebResourceAccessActivity
    - WebResourcesActivity
    - NetworkEvent
    - UnmannedSystemsEvent
    range: Tls
    recommended: true
  uid:
    name: uid
    description: 'The unique identifier of the evidence associated with the security
      detection.

      For example, the <code>activity_id</code> from CrowdStrike Falcon Alerts or

      <code>behavior_id</code> from CrowdStrike Falcon Incident Behaviors.'
    from_schema: https://w3id.org/lmodel/ocsf
    aliases:
    - Unique ID
    rank: 1000
    alias: uid
    owner: WindowsEvidences
    domain_of:
    - Osint
    - Package
    - ProgrammaticCredential
    - RelatedEvent
    - Request
    - Sbom
    - Scim
    - Script
    - Session
    - Span
    - Sso
    - Ticket
    - Token
    - Trace
    - Entity
    - Resource
    - Account
    - Advisory
    - Agent
    - AiModel
    - Aircraft
    - Analytic
    - ApplicationObject
    - Assessment
    - Certificate
    - Check
    - ClassifierDetails
    - Container
    - Cve
    - Cwe
    - D3fTactic
    - D3fTechnique
    - DataClassification
    - Database
    - Databucket
    - DomainContact
    - Edge
    - Email
    - Endpoint
    - Evidences
    - Extension
    - Feature
    - File
    - FindingObject
    - FindingInfo
    - Graph
    - Group
    - HttpRequest
    - Idp
    - Image
    - KbArticle
    - LoadBalancer
    - Logger
    - Malware
    - ManagedEntity
    - MessageContext
    - Metadata
    - Mitigation
    - NetworkConnectionInfo
    - NetworkEndpoint
    - NetworkInterface
    - Node
    - Organization
    - PeripheralDevice
    - Policy
    - ProcessEntity
    - Product
    - QueryInfo
    - Reporter
    - Rule
    - Scan
    - Service
    - SubTechnique
    - Table
    - Tactic
    - Technique
    - Trait
    - TransformationInfo
    - UnmannedAerialSystem
    - User
    - WebResource
    - Device
    - WinResource
    range: string
    recommended: true
  url:
    name: url
    description: 'The URL object that pertains to the event or object associated to
      the activity

      that triggered the detection.'
    from_schema: https://w3id.org/lmodel/ocsf
    aliases:
    - URL
    rank: 1000
    alias: url
    owner: WindowsEvidences
    domain_of:
    - ApplicationObject
    - Evidences
    - File
    - HttpRequest
    - EmailUrlActivity
    - NetworkActivity
    range: Url
    recommended: true
  user:
    name: user
    description: 'Describes details about the user that was the target or somehow
      else associated

      with the activity that triggered the detection.'
    from_schema: https://w3id.org/lmodel/ocsf
    aliases:
    - User
    rank: 1000
    alias: user
    owner: WindowsEvidences
    domain_of:
    - QueryEvidence
    - Actor
    - Evidences
    - Job
    - ManagedEntity
    - Process
    - UserInventory
    - UserQuery
    - IamAnalysisFinding
    - AccountChange
    - Authentication
    - AuthorizeSession
    - GroupManagement
    - UserAccess
    - RdpActivity
    - TunnelActivity
    range: User
    recommended: true
  verdict:
    name: verdict
    description: The normalized verdict of the evidence associated with the security
      detection.
    from_schema: https://w3id.org/lmodel/ocsf
    aliases:
    - Verdict
    rank: 1000
    alias: verdict
    owner: WindowsEvidences
    domain_of:
    - Evidences
    - IncidentProfile
    - IncidentFinding
    range: string
  verdict_id:
    name: verdict_id
    annotations:
      sibling:
        tag: sibling
        value: verdict
    description: 'The normalized verdict (or status) ID of the evidence associated
      with the

      security detection. For example, Microsoft Graph Security Alerts contain a

      <code>verdict</code> enumeration for each type of <code>evidence</code>

      associated with the Alert. This is typically set by an automated investigation

      process or an analyst/investigator assigned to the finding.'
    from_schema: https://w3id.org/lmodel/ocsf
    aliases:
    - Verdict ID
    rank: 1000
    alias: verdict_id
    owner: WindowsEvidences
    domain_of:
    - Evidences
    - IncidentProfile
    - IncidentFinding
    range: EvidencesVerdictIdEnum
rules:
- postconditions:
    any_of:
    - slot_conditions:
        actor:
          name: actor
          required: true
    - slot_conditions:
        api:
          name: api
          required: true
    - slot_conditions:
        connection_info:
          name: connection_info
          required: true
    - slot_conditions:
        data:
          name: data
          required: true
    - slot_conditions:
        database:
          name: database
          required: true
    - slot_conditions:
        databucket:
          name: databucket
          required: true
    - slot_conditions:
        device:
          name: device
          required: true
    - slot_conditions:
        dst_endpoint:
          name: dst_endpoint
          required: true
    - slot_conditions:
        email:
          name: email
          required: true
    - slot_conditions:
        file:
          name: file
          required: true
    - slot_conditions:
        process:
          name: process
          required: true
    - slot_conditions:
        query:
          name: query
          required: true
    - slot_conditions:
        src_endpoint:
          name: src_endpoint
          required: true
    - slot_conditions:
        url:
          name: url
          required: true
    - slot_conditions:
        user:
          name: user
          required: true
    - slot_conditions:
        job:
          name: job
          required: true
    - slot_conditions:
        script:
          name: script
          required: true
    - slot_conditions:
        reg_key:
          name: reg_key
          required: true
    - slot_conditions:
        reg_value:
          name: reg_value
          required: true
    - slot_conditions:
        win_service:
          name: win_service
          required: true
  description: 'OCSF at_least_one: at least one of [''actor'', ''api'', ''connection_info'',
    ''data'',

    ''database'', ''databucket'', ''device'', ''dst_endpoint'', ''email'', ''file'',
    ''process'',

    ''query'', ''src_endpoint'', ''url'', ''user'', ''job'', ''script'', ''reg_key'',

    ''reg_value'', ''win_service''] must be set.'