threatintel.discovery
Introduction
The tags beginning with threatintel.discovery
identify events generated by discovery scanners.
Valid tags and data tables
The full tag must have 4 levels. The first two are fixed as threatintel.discovery
. The third level identifies the product and the fourth indicates the type of events sent.
These are the valid tags and corresponding data tables that will receive the parsers' data:
Product / Service | Tags | Data tables |
---|---|---|
Arachni Web Application Security Scanner Framework |
|
|
Nmap Network Scanner |
|
|
For more information, read more About Devo tags.
Table structure
These are the fields displayed in these tables:
threatintel.discovery.arachni.scan
Field | Type | Extra fields |
---|---|---|
eventdate |
|
|
name |
|
|
severity |
|
|
vector_type |
|
|
response_code |
|
|
response_ip_address |
|
|
response_headers_string |
|
|
cwe |
|
|
cwe_url |
|
|
request_url |
|
|
request_headers_string |
|
|
request_effective_body |
|
|
request_method |
|
|
new |
|
|
hostchain |
| ✓ |
tag |
| ✓ |
rawMessage |
| ✓ |
threatintel.discovery.nmap.scan
Field | Type | Extra fields |
---|---|---|
eventdate |
|
|
host |
|
|
hostname |
|
|
hostname_type |
|
|
protocol |
|
|
port |
|
|
name |
|
|
state |
|
|
product |
|
|
extrainfo |
|
|
reason |
|
|
version |
|
|
conf |
|
|
cpe |
|
|
hostchain |
| ✓ |
tag |
| ✓ |
rawMessage |
| ✓ |