[{"data":1,"prerenderedAt":5745},["ShallowReactive",2],{"data-types-zh":3,"markdown-type-log-zh":21,"data-versions-log-zh":22,"data-categories-log-1.0-zh":28,"dictionaries-zh":317,"all-types-search-data-zh":5470,"data-sources-zh-log--":5706,"tags-zh-log--":5731},[4,9,13,17],{"dataType":5,"dataTypeChName":6,"description":7,"label":8,"value":5},"log","","由操作系统、应用程序或安全设备按时间顺序生成的事件记录。日志提供了不可篡改的审计追踪，用于监控系统状态、调查可疑活动以及在事后进行取证分析。","日志",{"dataType":10,"dataTypeChName":6,"description":11,"label":12,"value":10},"alert","由安全系统（如SIEM、IDS或防火墙）自动生成的通知，表示预定义的安全规则或异常检测阈值已被触发。","告警",{"dataType":14,"dataTypeChName":6,"description":15,"label":16,"value":14},"asset","指组织中任何具有价值并需要保护的数据、设备或系统组成部分，包括硬件、软件、信息及网络资源。","资产",{"dataType":18,"dataTypeChName":6,"description":19,"label":20,"value":18},"incident","指已确认或即将发生的违反组织安全策略、可接受使用政策或标准安全实践的行为。安全事件通常由告警经调查后升级而来，需要协调响应以控制影响。","安全事件","# 日志  ## 描述  由操作系统、应用程序或安全设备按时间顺序生成的事件记录。日志提供了不可篡改的审计追踪，用于监控系统状态、调查可疑活动以及在事后进行取证分析。  ## 基本信息  - **类型标识**: `log` - **数据类型**: `log`  ## 子分类列表  本类型包含以下子分类：  ### 身份认证与访问  - **ID**: `authentication_and_access` - **描述**: 该日志类型记录网络基础设施内的身份验证尝试、访问控制事件以及用户身份验证活动。 - **包含事件类型**: 3 个 - **详细信息**: [查看详情](https://www.ocim.tech/osim/data/category/authentication_and_access/index.html.md)  ### 数据安全审计  - **ID**: `data_security_audit` - **描述**: 记录数据访问、修改及安全相关活动的详细日志，用于合规性审查和取证分析。 - **包含事件类型**: 2 个 - **详细信息**: [查看详情](https://www.ocim.tech/osim/data/category/data_security_audit/index.html.md)  ### 网络会话审计  - **ID**: `network_session_audit` - **描述**: 网络会话审计日志记录了设备间通信会话的详细数据，包括时间戳、源/目标IP地址、端口及协议信息，用于安全分析。 - **包含事件类型**: 22 个 - **详细信息**: [查看详情](https://www.ocim.tech/osim/data/category/network_session_audit/index.html.md)  ### 主机行为审计  - **ID**: `host_behavior_audit` - **描述**: 该日志类型记录主机活动的详细审计轨迹，包括用户命令、进程执行和系统修改，用于安全监控和取证分析。 - **包含事件类型**: 14 个 - **详细信息**: [查看详情](https://www.ocim.tech/osim/data/category/host_behavior_audit/index.html.md)  ### 运维监控审计  - **ID**: `operation_monitoring_audit` - **描述**: 该日志类型记录运维监控活动的详细审计轨迹，包括系统性能指标、配置变更和管理访问事件，用于合规性审查与安全分析。 - **包含事件类型**: 4 个 - **详细信息**: [查看详情](https://www.ocim.tech/osim/data/category/operation_monitoring_audit/index.html.md)",[23],{"value":24,"label":25,"verDesc":26,"isLatest":27},"1.0","v1.0","Default Version",true,[29,59,80,209,291],{"id":30,"title":31,"description":32,"count":33,"subcates":34},"authentication_and_access","身份认证与访问","该日志类型记录网络基础设施内的身份验证尝试、访问控制事件以及用户身份验证活动。",3,[35,44,51],{"name":36,"id":37,"numericId":38,"dataSource":39,"tag":42},"应用访问认证","authentication_access_app_auth",52,[40,41],"VPN系统","零信任",[43],"暴力破解",{"name":45,"id":46,"numericId":47,"dataSource":48,"tag":50},"主机登录认证","authentication_access_host_login",53,[49],"EDR系统",[43],{"name":52,"id":53,"numericId":54,"dataSource":55,"tag":58},"网络登录认证","authentication_network_login",54,[56,57,40,41],"防火墙","NDR系统",[43],{"id":60,"title":61,"description":62,"count":63,"subcates":64},"data_security_audit","数据安全审计","记录数据访问、修改及安全相关活动的详细日志，用于合规性审查和取证分析。",2,[65,73],{"name":66,"id":67,"numericId":68,"dataSource":69,"tag":71},"数据库审计","data_security_audit_db_operation",55,[70,57],"数据库审计系统",[72],"数据泄露",{"name":74,"id":75,"numericId":76,"dataSource":77,"tag":79},"文件通信审计","data_security_audit_file_communication",56,[78,57],"网络DLP系统",[72],{"id":81,"title":82,"description":83,"count":84,"subcates":85},"network_session_audit","网络会话审计","网络会话审计日志记录了设备间通信会话的详细数据，包括时间戳、源/目标IP地址、端口及协议信息，用于安全分析。",22,[86,91,96,101,107,113,118,126,130,135,140,147,157,162,167,172,177,182,187,192,199,204],{"name":87,"id":88,"numericId":89,"dataSource":90,"tag":-1},"DNP3审计","network_session_audit_dnp3",57,[57],{"name":92,"id":93,"numericId":94,"dataSource":95,"tag":-1},"FTP审计","network_session_audit_ftp",58,[57],{"name":97,"id":98,"numericId":99,"dataSource":100,"tag":-1},"NFS审计","network_session_audit_nfs",59,[57],{"name":102,"id":103,"numericId":104,"dataSource":105,"tag":106},"RDP审计","network_session_audit_rdp",60,[57],[43],{"name":108,"id":109,"numericId":110,"dataSource":111,"tag":112},"SSH审计","network_session_audit_ssh",61,[57],[43],{"name":114,"id":115,"numericId":116,"dataSource":117,"tag":-1},"TELNET审计","network_session_audit_telnet",62,[57],{"name":119,"id":120,"numericId":121,"dataSource":122,"tag":124},"流量会话审计","network_session_audit_traffic",63,[123,57,41],"堡垒机",[125,72],"拒绝服务攻击",{"name":66,"id":127,"numericId":128,"dataSource":129,"tag":-1},"network_session_db_audit",64,[70,57],{"name":131,"id":132,"numericId":133,"dataSource":134,"tag":-1},"DHCP审计","network_session_dhcp_audit",65,[57],{"name":136,"id":137,"numericId":138,"dataSource":139,"tag":-1},"DNS审计","network_session_dns_audit",66,[57],{"name":141,"id":142,"numericId":143,"dataSource":144,"tag":145},"电子邮件协议审计","network_session_email_protocol_audit",67,[56,57],[146],"钓鱼邮件",{"name":148,"id":149,"numericId":150,"dataSource":151,"tag":154},"HTTP审计","network_session_http_audit",68,[152,56,78,57,153],"API风险监测系统","WAF",[43,155,156],"Web攻击","Webshell",{"name":158,"id":159,"numericId":160,"dataSource":161,"tag":-1},"KRB5审计","network_session_krb5_audit",69,[57],{"name":163,"id":164,"numericId":165,"dataSource":166,"tag":-1},"LDAP审计","network_session_ldap_audit",70,[57],{"name":168,"id":169,"numericId":170,"dataSource":171,"tag":-1},"MODBUS审计","network_session_modbus_audit",71,[57],{"name":173,"id":174,"numericId":175,"dataSource":176,"tag":-1},"MQTT审计","network_session_mqtt_audit",72,[57],{"name":178,"id":179,"numericId":180,"dataSource":181,"tag":-1},"网络访问控制","network_session_network_access_control",73,[56],{"name":183,"id":184,"numericId":185,"dataSource":186,"tag":-1},"NAT地址转换","network_session_network_address_translation",74,[56],{"name":188,"id":189,"numericId":190,"dataSource":191,"tag":-1},"RADIUS审计","network_session_radius_audit",75,[57],{"name":193,"id":194,"numericId":195,"dataSource":196,"tag":197},"SMB审计","network_session_smb_audit",76,[57],[198],"勒索软件",{"name":200,"id":201,"numericId":202,"dataSource":203,"tag":-1},"TFTP审计","network_session_tftp_audit",77,[57],{"name":205,"id":206,"numericId":207,"dataSource":208,"tag":-1},"TLS审计","network_session_tls_audit",78,[57],{"id":210,"title":211,"description":212,"count":213,"subcates":214},"host_behavior_audit","主机行为审计","该日志类型记录主机活动的详细审计轨迹，包括用户命令、进程执行和系统修改，用于安全监控和取证分析。",14,[215,220,226,234,239,244,250,256,261,266,271,276,281,286],{"name":216,"id":217,"numericId":218,"dataSource":219,"tag":-1},"账户操作审计","host_behavior_audit_account_behavior",79,[49],{"name":221,"id":222,"numericId":223,"dataSource":224,"tag":225},"域名请求审计","host_behavior_audit_domain_request",80,[49],[198],{"name":227,"id":228,"numericId":229,"dataSource":230,"tag":233},"文件审计","host_behavior_audit_file_operation",81,[231,232,49],"防病毒","终端DLP系统",[198,156],{"name":235,"id":236,"numericId":237,"dataSource":238,"tag":-1},"模块加载审计","host_behavior_audit_module_load",82,[49],{"name":240,"id":241,"numericId":242,"dataSource":243,"tag":-1},"命名管道审计","host_behavior_audit_named_pipe",83,[49],{"name":245,"id":246,"numericId":247,"dataSource":248,"tag":249},"网络通信审计","host_behavior_audit_network_behavior",84,[49],[198,156],{"name":251,"id":252,"numericId":253,"dataSource":254,"tag":255},"进程审计","host_behavior_audit_process_operation",85,[49],[198,156],{"name":257,"id":258,"numericId":259,"dataSource":260,"tag":-1},"注册表审计","host_behavior_audit_registry_operation",86,[49],{"name":262,"id":263,"numericId":264,"dataSource":265,"tag":-1},"远程线程创建","host_behavior_audit_remote_thread_creation",87,[49],{"name":267,"id":268,"numericId":269,"dataSource":270,"tag":-1},"计划任务审计","host_behavior_audit_scheduled_task_operation",88,[49],{"name":272,"id":273,"numericId":274,"dataSource":275,"tag":-1},"脚本执行审计","host_behavior_audit_script_execution",89,[49],{"name":277,"id":278,"numericId":279,"dataSource":280,"tag":-1},"WinRM审计","host_behavior_audit_winrm",90,[49],{"name":282,"id":283,"numericId":284,"dataSource":285,"tag":-1},"WMI审计","host_behavior_audit_wmi",91,[49],{"name":287,"id":288,"numericId":289,"dataSource":290,"tag":-1},"服务操作审计","host_behavior_service",92,[49],{"id":292,"title":293,"description":294,"count":295,"subcates":296},"operation_monitoring_audit","运维监控审计","该日志类型记录运维监控活动的详细审计轨迹，包括系统性能指标、配置变更和管理访问事件，用于合规性审查与安全分析。",4,[297,302,307,312],{"name":298,"id":299,"numericId":300,"dataSource":301,"tag":-1},"文件传输","operation_monitoring_audit_file_transfer",93,[123],{"name":303,"id":304,"numericId":305,"dataSource":306,"tag":-1},"图像文字","operation_monitoring_audit_image_text",94,[123],{"name":308,"id":309,"numericId":310,"dataSource":311,"tag":-1},"系统运维操作","operation_monitoring_audit_system_operations",95,[123],{"name":313,"id":314,"numericId":315,"dataSource":316,"tag":-1},"命令操作","operation_monitoring_command",96,[123],[318,331,337,347,374,385,390,395,401,406,413,419,424,431,436,441,446,451,456,461,466,479,484,489,494,499,504,509,515,520,525,541,546,552,557,562,583,588,593,598,603,608,612,617,622,696,701,721,726,731,736,741,746,762,767,772,807,812,817,822,827,863,868,873,878,883,888,906,910,915,939,944,1178,1183,1188,1193,1198,1203,1208,1213,1234,1239,1244,1249,1254,1259,1264,1269,1274,1279,1284,1289,1294,1299,1304,1309,1314,1319,1324,1357,1362,1367,1372,1377,1382,1387,1392,1397,1402,1407,1412,1417,1422,1427,1499,1504,1509,1514,1519,1524,1529,1534,1539,1554,1559,1564,1588,1612,1617,1622,1640,1645,1650,1655,1660,1665,1670,1675,1680,1685,1690,1695,1700,1705,1710,1748,1753,1758,1763,1768,1773,1778,1783,1788,1793,1798,1837,1842,1847,1852,1857,1862,1867,1872,1877,1882,1887,1892,1903,1908,1913,1919,1924,1929,1934,1939,1944,1949,1954,1959,1964,1975,1980,1985,1990,1995,2000,2005,2010,2015,2020,2025,2030,2035,2040,2045,2050,2055,2060,2065,2070,2075,2080,2085,2090,2128,2133,2138,2143,2148,2153,2158,2163,2168,2172,2186,2228,2233,2238,2243,2248,2253,2258,2417,2422,2427,2432,2437,2442,2447,2452,2457,2478,2483,2488,2493,2498,2503,2508,2525,2530,2535,2540,2545,3154,3159,3164,3169,3174,3179,3197,3218,3223,3228,3233,3238,3243,3248,3253,3258,3263,3268,3273,3278,3283,3304,3309,3314,3319,3324,3329,3406,3411,3416,3421,3426,3431,3436,3441,3446,3451,3456,3461,3466,3471,3476,3481,3486,3491,3496,3501,3506,3511,3516,3521,3526,3531,3536,3541,3546,3551,3556,3561,3566,3571,3576,3581,3715,3720,3851,3856,3861,3866,3871,3876,3881,3886,3891,3896,3901,3906,3911,3916,3921,3926,3931,3936,3941,3946,3951,3956,3961,3966,3971,3976,3981,3986,4004,4009,4014,4019,4024,4029,4034,4039,4044,4049,4054,4059,4077,4082,4087,4092,4097,4138,4143,4148,4153,4158,4163,4168,4173,4178,4183,4188,4193,4198,4203,4218,4223,4228,4252,4257,4262,4267,4272,4277,4282,4321,4326,4331,4355,4360,4365,4383,4388,4393,4398,4403,4408,4413,4448,4453,4458,4463,4468,4473,4565,4570,4575,4580,4585,4590,4595,4600,4605,4610,4615,4651,4655,4660,4665,4670,4675,4680,4685,4690,4695,4700,4705,4710,4722,4727,4732,4758,4763,4768,4773,4788,4793,4798,4828,4833,4838,4856,4861,4866,4871,4876,4881,4886,4891,4896,4901,4906,4911,4916,4921,4926,4931,4936,4941,4946,4951,4956,4961,5127,5132,5137,5142,5147,5152,5157,5162,5167,5172,5177,5182,5187,5192,5197,5202,5207,5212,5217,5222,5227,5232,5237,5242,5247,5252,5257,5262,5267,5272,5277,5282,5287,5292,5297,5302,5307,5312,5317,5322,5327,5332,5337,5342,5347,5352,5357,5362,5377,5382,5387,5392,5397,5402,5407,5412,5416,5421,5426,5431,5436,5441,5446,5451,5455,5460,5465],{"fieldName":319,"label":320,"description":321,"type":322,"subcate_ids":323,"enum":330},"sha256","文件SHA-256哈希值","文件内容的SHA-256密码学哈希值，用于唯一标识和验证文件完整性。格式要求为64位十六进制字符串，字符集为0-9、a-f（大小写不敏感）。","string",[229,324,325,326,327,213,328,329],1,10,11,13,15,16,null,{"fieldName":332,"label":333,"description":334,"type":335,"subcate_ids":336,"enum":330},"mixedDomainMode","混合域模式","该字段表示Active Directory是否启用混合身份验证模式。字段值为布尔类型，仅接受 true 或 false 两种取值，分别代表启用和未启用状态。","boolean",[],{"fieldName":338,"label":339,"description":340,"type":322,"subcate_ids":341,"enum":330},"dbName","数据库名称","数据库管理系统(DBMS)中数据库实例的逻辑名称。字段类型为字符串，命名应清晰标识特定数据库实例。",[68,128,342,343,344,345,346],20,21,28,29,31,{"fieldName":348,"label":349,"description":350,"type":322,"subcate_ids":351,"enum":330},"assetAlias","资产别名","资产别名，用于对资产进行自定义命名，便于查看和识别。",[352,353,344,345,354,346,355,356,357,358,359,360,361,362,363,364,365,366,367,368,369,370,371,372,373],26,27,30,32,33,34,35,36,37,38,39,40,41,42,43,44,45,46,47,48,49,50,{"fieldName":375,"label":376,"description":377,"type":322,"subcate_ids":378,"enum":330},"responseHeader","响应头","响应头字段包含HTTP网络请求中服务器返回给客户端的元数据和服务器信息，用于描述响应内容（如内容类型、长度等）和服务器状态。该字段为字符串类型，其内容需符合HTTP协议标准规范。",[76,150,63,379,380,381,382,383,342,343,384],6,7,8,9,12,25,{"fieldName":386,"label":387,"description":388,"type":322,"subcate_ids":389,"enum":330},"confPath","配置文件路径","配置文件路径，表示应用程序或系统服务的配置文件在系统中的完整存储路径。该路径应为绝对路径，使用POSIX标准路径格式，例如以“/”开头的Unix/Linux路径或以盘符开头的Windows路径。",[218,344,365],{"fieldName":391,"label":392,"description":393,"type":322,"subcate_ids":394,"enum":330},"sshServerVersion","SSH服务器版本","该字段表示SSH服务器在协议握手过程中声明的协议版本标识，用于标识服务器支持的SSH协议版本。",[110],{"fieldName":396,"label":397,"description":398,"type":322,"subcate_ids":399,"enum":330},"responseCode","响应码","响应码是网络请求后服务器返回的状态码，用于表示请求的处理结果。",[38,54,68,76,94,128,138,143,150,170,195,63,33,379,380,381,382,383,400,342,343,384],17,{"fieldName":402,"label":403,"description":404,"type":322,"subcate_ids":405,"enum":330},"loginGuid","登录GUID","登录会话的全局唯一标识符，用于唯一标识一次登录会话。格式为标准的GUID格式，通常为32位十六进制数字，以连字符分隔为5组，形式如：xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx，其中每个x为0-9或a-f的十六进制字符。",[47],{"fieldName":407,"label":408,"description":409,"type":322,"subcate_ids":410,"enum":330},"processStartTime","进程启动时间","进程启动时间，指操作系统成功创建进程实例的精确时间。格式要求为标准的日期时间字符串，具体格式为：yyyy-mm-dd HH:mm:ss。",[223,229,237,242,247,253,264,274,324,411,325,326,327,213,328,329,412],5,18,{"fieldName":414,"label":415,"description":416,"type":322,"subcate_ids":417,"enum":330},"cvssVersion","CVSS版本","通用漏洞评分系统(CVSS)的版本标识符。此字段用于区分不同版本的CVSS评估标准，例如CVSSv2.0、CVSSv3.0或CVSSv3.1。格式通常为固定字符串“CVSSv”后跟主版本号和可选的次版本号（例如，CVSSv3.1）。",[84,418,384],23,{"fieldName":420,"label":421,"description":422,"type":322,"subcate_ids":423,"enum":330},"oldUacValue","旧UAC值","旧UAC值，表示用户账号在更改前的用户账号控制 (UAC) 值。该值为十六进制字符串格式，通常以“0x”前缀开头，后跟一个或多个十六进制数字（0-9， A-F）。",[218],{"fieldName":425,"label":426,"description":427,"type":322,"subcate_ids":428,"enum":330},"ruleId","规则ID","规则ID是触发策略的安全规则唯一标识符。其值应为字符串类型，通常由字母、数字或特定符号组成，用于在系统中唯一标识一条安全规则。",[324,63,33,295,411,379,380,381,382,325,326,383,327,213,328,329,400,412,429,342,343,84,418,430,384],19,24,{"fieldName":432,"label":433,"description":434,"type":322,"subcate_ids":435,"enum":330},"httpReferer","请求Referer","HTTP请求的来源页面URL，即浏览器在发送当前请求时所来自的页面的完整地址。格式必须符合URL规范，通常以协议（如http://或https://）开头，包含域名和可选的路径、查询参数等组成部分。",[68,76,150,380,381,382,383,400,342,343,384],{"fieldName":437,"label":438,"description":439,"type":322,"subcate_ids":440,"enum":330},"fileList","文件列表","记录邮件中所有附件的文件名集合，格式为以逗号分隔的字符串。文件名应仅包含合法字符，避免包含特殊字符如换行符、引号或路径分隔符。",[143,295],{"fieldName":442,"label":443,"description":444,"type":322,"subcate_ids":445,"enum":330},"dataSourceAddress","数据来源地址","数据来源地址，指提供数据的设备网络地址。该字段必须是合法的IP地址格式，支持IPv4和IPv6地址。IPv4地址为点分十进制格式（如192.168.1.5），IPv6地址为冒号分隔的十六进制格式。",[38,47,54,68,76,89,94,99,104,110,116,121,128,133,138,143,150,160,165,170,175,180,185,190,195,202,207,218,223,229,237,242,247,253,259,264,269,274,279,284,289,300,305,310,315,324,63,33,295,411,379,380,381,382,325,326,383,327,213,328,329,400,412,429,342,343,84,418,430,384],{"fieldName":447,"label":448,"description":449,"type":322,"subcate_ids":450,"enum":330},"otherInfo","其他","该字段用于记录与资产或事件相关的其他补充信息。",[352,353,344,345,354,346,355,356,357,358,359,360,361,362,363,364,365,366,367,368,369,370,371,372,373],{"fieldName":452,"label":453,"description":454,"type":322,"subcate_ids":455,"enum":330},"timesTill","票据过期时间","票据的绝对过期时间，表示Kerberos票据在该时间点后将失效。时间格式必须符合yyyy-mm-dd HH:mm:ss的规范。",[160],{"fieldName":457,"label":458,"description":459,"type":322,"subcate_ids":460,"enum":330},"machineCode","机器码","机器码是日志来源设备的唯一标识符（设备ID），主要用于设备级联追踪。该字段值应保持全局唯一性，若无现成的设备ID，可参考硬件编码或基于许可证（license）信息生成。格式上，它必须为字符串，允许使用的字符包括大写字母（A-Z）、小写字母（a-z）和数字（0-9）。长度无固定限制，但应保证其唯一性和可管理性。",[38,47,54,68,76,89,94,99,104,110,116,121,128,133,138,143,150,160,165,170,175,180,185,190,195,202,207,218,223,229,237,242,247,253,259,264,269,274,279,284,289,300,305,310,315,324,63,33,295,411,379,380,381,382,325,326,383,327,213,328,329,400,412,429,342,343,84,418,430,384],{"fieldName":462,"label":463,"description":464,"type":322,"subcate_ids":465,"enum":330},"srcGeoCity","来源城市","该字段表示网络连接发起方IP地址所对应的城市级别行政区域名称。其值为字符串类型，该信息通常由IP地址归属地查询服务提供，无特定的格式或字符集强制要求，但建议保持名称的一致性。",[38,54,68,76,89,94,99,104,110,116,121,128,133,138,143,150,160,165,170,175,180,185,190,195,202,207,223,247,300,305,310,315,324,63,33,295,411,379,380,381,382,325,326,383,327,213,328,329,400,412,429,342,343],{"fieldName":467,"label":468,"description":469,"type":470,"subcate_ids":471,"enum":472},"dnsType","DNS操作类型","DNS操作类型，标识DNS协议消息的操作方向类型。该字段为枚举类型，可选值包括：query (查询) 和 response (响应)。","enum",[138],{"response":473,"query":476},{"description":474,"label":475},"DNS响应结果","响应",{"description":477,"label":478},"DNS查询请求","查询",{"fieldName":480,"label":481,"description":482,"type":322,"subcate_ids":483,"enum":330},"subTechniqueId","ATT&CK子技术ID","该字段表示攻击行为在MITRE ATT&CK框架中对应的具体攻击子技术的唯一标识符。其格式为ATT&CK技术ID后加小数点与三位数字编号，例如 `T1566.001`。该标识符应符合MITRE ATT&CK官方规范。",[324,63,33,295,411,379,380,381,382,325,326,383,327,213,328,329,400,412,429,342,343,84,418,430,384],{"fieldName":485,"label":486,"description":487,"type":322,"subcate_ids":488,"enum":330},"osUser","操作系统用户名","在操作系统层面进行身份验证或执行操作的用户标识。该字段为字符串类型，通常由字母、数字、下划线、点或连字符等字符组成。",[68,342,343],{"fieldName":490,"label":491,"description":492,"type":322,"subcate_ids":493,"enum":330},"imageLoaded","加载项路径","该字段记录进程运行时加载的动态链接库或驱动模块在文件系统中的完整路径。格式为字符串，应使用操作系统标准的文件路径格式表示，例如Windows系统采用盘符加反斜杠分隔的路径（如C:\\Program Files\\...），Linux/Unix系统采用正斜杠分隔的绝对路径（如/usr/lib/...）。路径中不应包含环境变量或相对路径符号（如.、..、~）。",[237,412],{"fieldName":495,"label":496,"description":497,"type":322,"subcate_ids":498,"enum":330},"destLoginGuid","目标登录GUID","目标系统上特定登录会话或登录请求的唯一标识符，通常为GUID（全局唯一标识符）格式。",[47],{"fieldName":500,"label":501,"description":502,"type":322,"subcate_ids":503,"enum":330},"assetUserMail","资产使用人联系邮箱","资产使用人的联系邮箱，用于安全联络。格式要求：必须符合标准邮箱地址格式，包含@符号和有效域名。",[352,353,344,345,354,346,355,356,357,358,359,360,361,362,363,364,365,366,367,368,369,370,371,372,373],{"fieldName":505,"label":506,"description":507,"type":335,"subcate_ids":508,"enum":330},"isDomestic","是否国产化","该字段用于标识资产是否属于国产化设备或在国内采购。",[352,353,344,345,354,346,355,356,357,358,359,360,361,362,363,364,365,366,367,368,369,370,371,372,373],{"fieldName":510,"label":511,"description":512,"type":513,"subcate_ids":514,"enum":330},"peakBytesRate","峰值字节速率","峰值字节速率，表示网络接口或系统在特定时间段内传输的最大字节速率，单位为Bps（字节每秒）。该字段为整型数值，其值应大于等于0，用于量化网络流量或数据传输的最高瞬时速度。","integer",[33,429],{"fieldName":516,"label":517,"description":518,"type":322,"subcate_ids":519,"enum":330},"deviceSendProductName","设备产品名称","设备产品名称用于标识生成日志的软件或硬件产品的官方标准名称。格式为字符串，需使用明确、规范的官方产品名称。",[38,47,54,68,76,89,94,99,104,110,116,121,128,133,138,143,150,160,165,170,175,180,185,190,195,202,207,218,223,229,237,242,247,253,259,264,269,274,279,284,289,300,305,310,315,324,63,33,295,411,379,380,381,382,325,326,383,327,213,328,329,400,412,429,342,343,84,418,430,384],{"fieldName":521,"label":522,"description":523,"type":322,"subcate_ids":524,"enum":330},"dhcpAddress","DHCP分配IP地址","该字段记录DHCP服务器动态分配给客户端的IP地址。该值必须符合标准的IPv4或IPv6地址格式规范。",[133],{"fieldName":526,"label":527,"description":528,"type":470,"subcate_ids":529,"enum":530},"assetUsability","可用性","该字段表示资产能够按预期运行并提供服务的程度。",[352,353,344,345,354,346,355,356,357,358,359,360,361,362,363,364,365,366,367,368,369,370,371,372,373],{"high":531,"low":533,"veryHigh":535,"medium":537,"ignorable":539},{"description":532,"label":532},"高",{"description":534,"label":534},"低",{"description":536,"label":536},"非常高",{"description":538,"label":538},"中",{"description":540,"label":540},"可忽略",{"fieldName":542,"label":543,"description":544,"type":322,"subcate_ids":545,"enum":330},"newThreadId","新线程ID","新创建线程的系统分配的唯一数字标识符。内容应为有效的数字序列，通常表示操作系统为线程分配的非负整数值。",[264,412],{"fieldName":547,"label":548,"description":549,"type":322,"subcate_ids":550,"enum":330},"assignee","负责人","负责人字段用于标识负责安全事件调查和响应的主要责任人。其值应为字符串类型，通常为责任人的用户名、工号或姓名。",[551],51,{"fieldName":553,"label":554,"description":555,"type":322,"subcate_ids":556,"enum":330},"srcGeoCityCode","来源城市代码","该字段表示网络请求来源的城市地理编码，用于标识来源城市。格式为字符串类型，通常使用城市名称或标准城市代码表示。",[223,247],{"fieldName":558,"label":559,"description":560,"type":322,"subcate_ids":561,"enum":330},"phishingEmail","钓鱼邮箱","钓鱼邮箱是指用于发起网络钓鱼攻击的恶意发件人邮箱地址。字段内容必须符合标准电子邮件地址格式，即包含本地部分、@符号和域名部分。",[379],{"fieldName":563,"label":564,"description":565,"type":470,"subcate_ids":566,"enum":567},"openLevel","开放等级","该字段表示各类资产（数据、API、服务等）的开放程度，用于定义信息的访问和传播范围。其值为预定义的枚举类型，必须在指定范围内选取。可选值包括：confidential (机密等级)，表示高度敏感，仅限极少数授权人员访问；internal_use (内部使用)，表示仅限于组织内部人员使用；limited_disclosure (受限公开)，表示可在特定条件下向外部有限实体公开；public_disclosure (公开等级)，表示可向公众公开；open_standard (开放标准)，表示遵循开放标准，鼓励广泛使用和互操作。",[353],{"open_standard":568,"internal_use":571,"limited_disclosure":574,"public_disclosure":577,"confidential":580},{"description":569,"label":570},"遵循开放标准，可自由使用和分发的资产","开放标准",{"description":572,"label":573},"限于组织内部使用的资产，禁止对外披露","内部使用",{"description":575,"label":576},"在特定条件下可向外部披露的资产","受限公开",{"description":578,"label":579},"可向公众开放的资产，符合开放标准","公开等级",{"description":581,"label":582},"最高敏感度资产，访问受到严格限制","机密等级",{"fieldName":584,"label":585,"description":586,"type":322,"subcate_ids":587,"enum":330},"responseBody","响应体","该字段表示HTTP网络请求响应客户端接收到的响应内容。格式为字符串，内容通常为文本、JSON、XML或HTML等。",[38,76,150,379,380,381,382,383,342,343,384],{"fieldName":589,"label":590,"description":591,"type":322,"subcate_ids":592,"enum":330},"registrar","注册商","注册商的官方名称，即提供域名注册服务的机构或公司。该字段为字符串类型，应使用完整的机构名称，不包含特殊字符。",[369],{"fieldName":594,"label":595,"description":596,"type":322,"subcate_ids":597,"enum":330},"userParameters","用户参数","Active Directory用户账号的自定义配置参数。",[218],{"fieldName":599,"label":600,"description":601,"type":322,"subcate_ids":602,"enum":330},"displayName","显示名称","显示名称用于用户友好展示的别名。",[218,289],{"fieldName":604,"label":605,"description":606,"type":322,"subcate_ids":607,"enum":330},"responseOs","响应操作系统","该字段标识服务器在响应中透露的操作系统类型和版本信息。通常包含操作系统名称（如Linux、Windows）及其版本号（如Ubuntu 20.04、Windows Server 2019）。",[76,195],{"fieldName":609,"label":609,"description":610,"type":322,"subcate_ids":611,"enum":330},"icon","该字段用于表示对象的图形化图标，通过视觉符号指代特定事物或功能。其值为图标文件的名称或路径，通常为字符串格式，例如PNG、JPG、SVG或ICO等常见图像格式的文件名。",[355,356,357,359],{"fieldName":613,"label":614,"description":615,"type":322,"subcate_ids":616,"enum":330},"destMacAddress","目的MAC地址","目的MAC地址表示网络数据帧接收方的媒体访问控制地址。格式要求：必须为标准MAC地址格式，即6组由冒号分隔的十六进制字节（xx:xx:xx:xx:xx:xx），每组两个字符，取值范围为00-FF。",[38,54,68,76,89,94,99,104,110,116,121,128,133,138,143,150,160,165,170,175,180,185,190,195,202,207,223,247,300,305,315,324,63,33,295,411,379,380,381,382,325,326,383,327,213,328,329,400,412,429,342,343],{"fieldName":618,"label":619,"description":620,"type":322,"subcate_ids":621,"enum":330},"dataPath","数据路径","数据路径是指数据库或应用程序数据文件的存储路径。其格式为字符串，内容应为有效的文件系统路径，支持绝对路径或相对路径表示。路径字符串通常由目录名和文件名组成，使用正斜杠（/）或反斜杠（\\）作为分隔符。",[344],{"fieldName":623,"label":624,"description":625,"type":470,"subcate_ids":626,"enum":627},"unitType","单位类型","单位类型表示资产所属组织实体的行业与性质分类，用于资产归属管理、安全策略制定及合规性审计。该字段为枚举类型，其值必须为预定义的可选字符串之一，例如：party_committee (党委机关), large_state_owned_enterprise (大型国企), company (企业), public_institution (事业单位), individual (个人) 等可选值。",[352,353,344,345,354,346,355,356,357,358,359,360,361,362,363,364,365,366,367,368,369,370,371,372,373],{"medical_institution":628,"other":631,"individual":633,"religious_group":636,"impartial_organization":639,"foreign_cultural_center":642,"large_state_owned_enterprise":645,"overseas_institution":648,"district_county":651,"foundation":654,"social_organization":657,"law_firm":660,"collective_economy":663,"defense_agency":666,"mass_organization":669,"government":672,"public_institution":675,"private_non_enterprise":678,"company":681,"forensic_institution":684,"party_committee":687,"commission_bureau":690,"notary_organization":693},{"description":629,"label":630},"依法成立，从事疾病诊断、治疗活动的医院、卫生院、诊所等机构。","医疗机构",{"description":632,"label":448},"不属于上述类别的其他类型组织机构。",{"description":634,"label":635},"以自然人身份作为资产所有者或使用者，不属于任何组织机构。","个人",{"description":637,"label":638},"由信教公民自愿组成，为团结信教公民和开展宗教活动而依法成立的社团组织。","宗教团体",{"description":640,"label":641},"泛指从事独立、客观的评估、认证、仲裁等活动的第三方机构。","公正机构",{"description":643,"label":644},"外国政府在中国境内设立，旨在促进两国文化交流与合作的非营利性机构。","外国在华文化中心",{"description":646,"label":647},"由国务院国有资产监督管理委员会或地方政府监管的大型国有独资或控股企业。","大型国企",{"description":649,"label":650},"在中国大陆以外地区（包括港澳台及外国）合法注册或设立的机构实体。","境外机构",{"description":652,"label":653},"作为一级行政区划和行政管理层级的市辖区或县的统称，具有完整的政府职能。","区县",{"description":655,"label":656},"利用自然人、法人或者其他组织捐赠的财产，以从事公益事业为目的而成立的非营利性法人。","基金会",{"description":658,"label":659},"中国公民自愿组成，为实现会员共同意愿，按照其章程开展活动的非营利性社会组织，需在民政部门登记。","社会团体",{"description":661,"label":662},"依法设立，为当事人提供法律服务的机构，主要包括律师事务所。","律师执业机构",{"description":664,"label":665},"生产资料归部分劳动者共同所有的公有制经济形式，如农村集体经济组织、城镇集体企业等。","集体经济",{"description":667,"label":668},"负责国家防务和武装力量建设的机构，如中央军事委员会各部门及下属单位。","国防机构",{"description":670,"label":671},"人民团体和群众团体的统称，是中国共产党领导下的特定社会群体组织，如工会、共青团、妇联等。","群团组织",{"description":673,"label":674},"国家各级行政机关，包括国务院各部委、地方政府及其组成部门，行使行政管理职能。","政府机关",{"description":676,"label":677},"由国家行政机关举办，从事教育、科技、文化、卫生等活动的社会服务组织，具有法人资格。","事业单位",{"description":679,"label":680},"企业事业单位、社会团体和其他社会力量以及公民个人利用非国有资产举办的，从事非营利性社会服务活动的社会组织。","民办非企业",{"description":682,"label":683},"以营利为目的，从事商业活动的法人或非法人组织，包括私营企业、外商投资企业等。","企业",{"description":685,"label":686},"经司法行政机关审核登记，取得《司法鉴定许可证》，在诉讼活动中提供司法鉴定服务的法人或其他组织。","司法鉴定机构",{"description":688,"label":689},"中国共产党各级委员会的办事机构，属于政治领导机关。","党委机关",{"description":691,"label":692},"对地方政府中委员会、办公室、局的统称，是承担具体行政管理职能的工作部门。","委办局",{"description":694,"label":695},"依法设立，不以营利为目的，依法独立行使公证职能、承担民事责任的证明机构。","公证机构",{"fieldName":697,"label":698,"description":699,"type":322,"subcate_ids":700,"enum":330},"deviceAddress","设备IP地址","设备产生日志时的IP地址，用于标识日志来源设备。格式要求：必须为有效的IPv4或IPv6地址格式。",[38,47,54,68,76,89,94,99,104,110,116,121,128,133,138,143,150,160,165,170,175,180,185,190,195,202,207,218,223,229,237,242,247,253,259,264,269,274,279,284,289,300,305,310,315,324,63,33,295,411,379,380,381,382,325,326,383,327,213,328,329,400,412,429,342,343,84,418,430,384],{"fieldName":702,"label":703,"description":704,"type":470,"subcate_ids":705,"enum":706},"unitAffiliation","单位直属性质","该字段表示资产所属单位的直属监管关系分类，用于标识单位在行政管理层级中的隶属关系。",[352,353,344,345,354,346,355,356,357,358,359,360,361,362,363,364,365,366,367,368,369,370,371,372,373],{"other":707,"provincial":709,"municipal":712,"district_county":715,"central_government":718},{"description":708,"label":448},"不属于上述明确级别的其他隶属关系。",{"description":710,"label":711},"由省、自治区、直辖市政府或党委直接管理和领导的机构。","省直属",{"description":713,"label":714},"由设区的市（地级市）政府或党委直接管理和领导的机构。","市直属",{"description":716,"label":717},"由市辖区、县级市或县政府直接管理和领导的机构。","区县直属",{"description":719,"label":720},"由中共中央、国务院或其组成部门直接管理和领导的机构。","中央直属",{"fieldName":722,"label":723,"description":724,"type":322,"subcate_ids":725,"enum":330},"destGeoCountry","目的国家","目的国家，指网络连接接收方IP地址所对应的国家名称。该字段值为国家或地区的完整中文名称，例如“中国”、“美国”等。",[38,54,68,76,89,94,99,104,110,116,121,128,133,138,143,150,160,165,170,175,180,185,190,195,202,207,223,247,300,305,310,315,324,63,33,295,411,379,380,381,382,325,326,383,327,213,328,329,400,412,429,342,343],{"fieldName":727,"label":728,"description":729,"type":322,"subcate_ids":730,"enum":330},"parentProcessId","父进程ID","父进程ID是操作系统分配给父进程的唯一数字标识符，通常为非负整数。",[223,229,237,242,247,253,264,274,324,411,325,326,327,213,328,329,412],{"fieldName":732,"label":733,"description":734,"type":322,"subcate_ids":735,"enum":330},"wmiDestination","WMI目标","WMI事件消费者执行的目标路径，通常为文件系统路径格式，应遵循Windows或Unix-like系统的路径规范，例如使用反斜杠（\\）或正斜杠（/）作为目录分隔符，且路径应指向有效的可执行文件或脚本。",[284],{"fieldName":737,"label":738,"description":739,"type":322,"subcate_ids":740,"enum":330},"subTechniqueName","ATT&CK子技术名称","该字段表示攻击行为在MITRE ATT&CK框架中对应的具体攻击子技术的官方名称。名称格式应符合MITRE ATT&CK官方定义，通常为英文短语，采用驼峰命名法或空格分隔的单词组合，例如“Spearphishing Attachment”。",[324,63,33,295,411,379,380,381,382,325,326,383,327,213,328,329,400,412,429,342,343,84,418,430,384],{"fieldName":742,"label":743,"description":744,"type":322,"subcate_ids":745,"enum":330},"requestBody","HTTP请求体","HTTP网络请求客户端向服务器发送请求时传递的数据内容，通常包含请求参数、表单数据或JSON体。",[76,150,170,63,379,380,381,382,383,342,343,384],{"fieldName":747,"label":748,"description":749,"type":470,"subcate_ids":750,"enum":751},"assetImportance","重要程度","资产的重要程度等级，用于标识资产在网络安全防护中的优先级和价值。",[352,353,344,345,354,346,355,356,357,358,359,360,361,362,363,364,365,366,367,368,369,370,371,372,373],{"important":752,"core":754,"other":756,"common":758,"classified":760},{"description":753,"label":753},"重要资产",{"description":755,"label":755},"核心资产",{"description":757,"label":757},"其它资产",{"description":759,"label":759},"普通资产",{"description":761,"label":761},"涉密资产",{"fieldName":763,"label":764,"description":765,"type":322,"subcate_ids":766,"enum":330},"unitId","单位ID","资产所属单位的唯一标识符。",[352,353,344,345,354,346,355,356,357,358,359,360,361,362,363,364,365,366,367,368,369,370,371,372,373],{"fieldName":768,"label":769,"description":770,"type":322,"subcate_ids":771,"enum":330},"clientPrg","客户端程序","该字段用于标识连接数据库或其他服务的客户端应用程序名称，通常为客户端软件或驱动程序的名称。",[68,128,342,343],{"fieldName":773,"label":774,"description":775,"type":470,"subcate_ids":776,"enum":777},"cloudStorageType","云存储类型","云存储类型是指云计算存储服务的标准化分类，用于标识所使用的存储服务类别。该字段为枚举类型，必须从预定义的可选值列表中选取，常见值包括：objectStorage（对象存储）、blockStorage（块存储）、fileStorage（文件存储）、archiveStorage（归档存储）和databaseStorage（数据库存储）等选项。输入值需确保与指定的枚举值完全匹配。",[373],{"fileStorage":778,"other":781,"backupStorage":783,"temporaryStorage":786,"objectStorage":789,"databaseStorage":792,"blockStorage":795,"edgeStorage":798,"hybridStorage":801,"archiveStorage":804},{"description":779,"label":780},"基于文件的共享存储服务，如AWS EFS、Azure Files","文件存储",{"description":782,"label":448},"其他类型的存储类型",{"description":784,"label":785},"专用备份和恢复服务存储，如AWS Backup、Azure Backup","备份存储",{"description":787,"label":788},"计算实例的临时或缓存存储，数据不持久化","临时存储",{"description":790,"label":791},"基于对象的非结构化数据存储服务，如AWS S3、Azure Blob Storage","对象存储",{"description":793,"label":794},"托管数据库服务的底层存储，如AWS RDS、Azure SQL Database存储","数据库存储",{"description":796,"label":797},"块级存储设备，可挂载到计算实例，如AWS EBS、Azure Disk Storage","块存储",{"description":799,"label":800},"边缘计算场景下的分布式存储服务","边缘存储",{"description":802,"label":803},"连接本地和云环境的混合存储解决方案","混合存储",{"description":805,"label":806},"低成本长期数据归档存储，如AWS Glacier、Azure Archive Storage","归档存储",{"fieldName":808,"label":809,"description":810,"type":322,"subcate_ids":811,"enum":330},"originalFileName","原始文件名","原始文件名，指文件在被处理、重命名或上传前的原始名称。",[229,237,253,412],{"fieldName":813,"label":814,"description":815,"type":322,"subcate_ids":816,"enum":330},"managementAddress","管理IP","管理IP地址，用于设备带外管理、远程访问和系统维护。该字段必须是有效的IPv4或IPv6地址格式。",[360,361],{"fieldName":818,"label":819,"description":820,"type":322,"subcate_ids":821,"enum":330},"dataSize","数据大小","该字段表示数据库表占用的物理存储空间大小。其值为一个字符串，通常由数字和单位组成，例如“41MB”。",[346],{"fieldName":823,"label":824,"description":825,"type":322,"subcate_ids":826,"enum":330},"timePasswordLastSet","密码最后设置时间","记录用户最后一次修改密码的时间，格式为yyyy-mm-dd HH:mm:ss。",[218],{"fieldName":828,"label":829,"description":830,"type":470,"subcate_ids":831,"enum":832},"queryType","查询类型","该字段标识DNS查询请求的资源记录类型。其值必须为预定义的枚举字符串，例如：A (IPv4地址记录)、AAAA (IPv6地址记录)、CNAME (规范名称记录)、MX (邮件交换记录)、TXT (文本记录)等。",[138],{"A":833,"TXT":836,"SOA":839,"NS":842,"SRV":845,"CNAME":848,"MX":851,"ANY":854,"AAAA":857,"PTR":860},{"description":834,"label":835},"主机IPv4地址记录，最常见的DNS查询类型","IPv4地址记录",{"description":837,"label":838},"文本信息记录，常用于DNS隧道和SPF验证","文本记录",{"description":840,"label":841},"区域授权起始记录，用于DNS区域管理","起始授权记录",{"description":843,"label":844},"权威域名服务器记录，用于DNS基础设施分析","域名服务器记录",{"description":846,"label":847},"服务定位记录，用于特定服务发现","服务定位记录",{"description":849,"label":850},"域名别名记录，用于域名重定向分析","规范名称记录",{"description":852,"label":853},"邮件服务器记录，用于邮件基础设施分析","邮件交换记录",{"description":855,"label":856},"请求所有可用记录，常用于DNS侦察和放大攻击","所有记录类型",{"description":858,"label":859},"主机IPv6地址记录，用于IPv6网络检测","IPv6地址记录",{"description":861,"label":862},"反向DNS查找记录，用于IP到域名映射","指针记录",{"fieldName":864,"label":865,"description":866,"type":322,"subcate_ids":867,"enum":330},"lockoutDuration","锁定持续时间","锁定持续时间表示由于超出锁定阈值而锁定帐户的时间量，单位为分钟。该字段应为正整数，表示锁定时长（单位：分钟）。",[],{"fieldName":869,"label":870,"description":871,"type":322,"subcate_ids":872,"enum":330},"createTime","创建时间","该字段记录系统对象、文件或资源的初始创建时间。时间格式必须为yyyy-mm-dd HH:mm:ss。",[352,353,344,345,354,346,355,356,357,358,359,360,361,362,363,364,365,366,367,368,369,370,371,372,373,551],{"fieldName":874,"label":875,"description":876,"type":335,"subcate_ids":877,"enum":330},"isNull","是否为空","标识数据库列是否允许存储NULL值。该字段为布尔类型，取值为true或false，其中true表示允许存储NULL值，false表示不允许存储NULL值。",[345],{"fieldName":879,"label":880,"description":881,"type":322,"subcate_ids":882,"enum":330},"cnvd","CNVD漏洞标识符","CNVD漏洞标识符是由国家信息安全漏洞共享平台(CNVD)颁发的漏洞唯一标识编号，用于唯一标识和追踪漏洞。其格式为固定字符串\"CNVD-\"后接年份、连字符和序列号，例如\"CNVD-2022-10627\"。该字段为字符串类型，需严格遵循\"CNVD-YYYY-NNNNN\"的格式规范，其中YYYY为四位数年份，NNNNN为漏洞序列号。",[84,418,384],{"fieldName":884,"label":885,"description":886,"type":322,"subcate_ids":887,"enum":330},"softwareSerialNumber","软件序列号","软件的序列号，用于标识软件授权的唯一序列号。通常由数字、字母及连字符（-）等字符组成。",[365],{"fieldName":889,"label":890,"description":891,"type":470,"subcate_ids":892,"enum":893},"IoCLevel","情报危害等级","情报IOC的危害程度评估等级，采用枚举类型表示，可选值包括：Critical（严重）、High（高）、Medium（中）、Low（低）、Info（信息）。",[325,326,327,213,328,329],{"High":894,"Low":896,"Medium":898,"Critical":900,"Info":903},{"description":895,"label":532},"高威胁级别，与活跃攻击活动强相关，需要立即调查和响应",{"description":897,"label":534},"低威胁级别，可疑但风险有限，建议观察和记录",{"description":899,"label":538},"中等威胁级别，与已知恶意活动相关，需要关注和监控",{"description":901,"label":902},"严重威胁级别，确认的恶意活动，需要紧急处置和遏制","严重",{"description":904,"label":905},"信息级别，仅用于参考和上下文分析，不构成直接威胁","信息",{"fieldName":907,"label":548,"description":908,"type":322,"subcate_ids":909,"enum":330},"assetOwnerName","资产责任人的姓名。",[352,353,344,345,354,346,355,356,357,358,359,360,361,362,363,364,365,366,367,368,369,370,371,372,373],{"fieldName":911,"label":912,"description":913,"type":322,"subcate_ids":914,"enum":330},"parentProcessMd5","父进程MD5","父进程可执行文件的MD5哈希值，用于唯一标识该文件。格式要求：必须是一个32位的十六进制字符串，由数字0-9及大写字母A-F组成，不包含连字符或其他分隔符。",[223,229,237,242,247,253,264,274,324,411,325,326,327,213,328,329,412],{"fieldName":916,"label":917,"description":918,"type":470,"subcate_ids":919,"enum":920},"certType","证书类型","证书类型用于标识不同安全用途的数字证书的类别。本字段为枚举类型，其值必须为预设的可选值之一，具体包括：SSL（SSL/TLS证书）、CodeSigning（代码签名证书）、ClientAuth（客户端身份证书）、Email（电子邮件证书）、EVSSL（扩展验证SSL证书）及其他可能的指定类型。",[368],{"Email":921,"ClientAuth":924,"SelfSigned":927,"SSL":930,"CodeSigning":933,"EVSSL":936},{"description":922,"label":923},"用于电子邮件加密和数字签名","电子邮件证书",{"description":925,"label":926},"用于客户端身份验证和双向SSL认证","客户端身份证书",{"description":928,"label":929},"未经第三方证书颁发机构签名的证书","自签名证书",{"description":931,"label":932},"用于网站和服务器的安全通信加密","SSL/TLS证书",{"description":934,"label":935},"用于软件和代码的数字签名验证","代码签名证书",{"description":937,"label":938},"扩展验证型SSL证书，提供最高级别身份验证","扩展验证SSL证书",{"fieldName":940,"label":941,"description":942,"type":322,"subcate_ids":943,"enum":330},"isp","网络服务提供商","该字段标识互联网服务提供商的名称，用于记录网络流量或事件来源的运营商信息。",[370,372,373],{"fieldName":945,"label":946,"description":947,"type":470,"subcate_ids":948,"enum":949},"incidentType","安全事件类型","安全事件类型字段用于标识安全事件的主要攻击分类和技术类别，采用层级路径格式表示。该字段为枚举类型，必须从预定义的可选值中选择，每个值均为一个字符串形式的路径。",[551],{"/Malware/MaliciousCodeHostingSite":950,"/DevOps/InfrastructureFailure":953,"/NetAttack/SignalInterference":956,"/NetAttack/DomainRedirect":959,"/NetAttack/DNSPoisoning":962,"/ViolateOp/PrivilegeAbuse":965,"/Malware/Miner":968,"/InformationSec/Others":971,"/AbnormalBehavior/Access":974,"/Others/Others":977,"/InformationSec/Reactionary":980,"/ViolateOp/PrivilegeEscalation":983,"/ViolateOp/UnauthResource":986,"/DataSec/DataTampering":989,"/NetAttack/BGPHijack":992,"/DataSec/DataLeakage":995,"/DevOps/TechnicalFailure":998,"/NetAttack/DomainHijack":1001,"/ViolateOp/Deliberate":1004,"/Majeure/PublicHealth":1007,"/Malware/Worm":1010,"/NetAttack/BackdoorImplantation":1013,"/Malware/MaliciousCodeEmbedded":1016,"/Malware/Botnet":1019,"/NetAttack/Scan":1022,"/NetAttack/VulnExploit":1025,"/DataSec/DataFake":1028,"/Malware/Others":1031,"/AbnormalBehavior/Traffic":1034,"/NetAttack/WLANHijack":1037,"/NetAttack/CompromisedHost":1040,"/InformationSec/RightsInfringement":1043,"/NetAttack/BroadcastFraud":1046,"/InformationSec/Violent":1049,"/NetAttack/WebTempering":1052,"/NetAttack/TrafficHijack":1055,"/InformationSec/InformationSpamming":1058,"/Majeure/NaturalDisaster":1061,"/NetAttack/Credential":1064,"/NetAttack/BackdoorExploit":1067,"/ViolateOp/BehaviorDenial":1070,"/DataSec/DataPoisoning":1073,"/DataSec/PrivacyInvasion":1076,"/DataSec/PositionDetection":1079,"/InformationSec/NetworkFraud":1082,"/Malware/ComputerVirus":1085,"/DataSec/DataIntercept":1088,"/ViolateOp/Copyright":1091,"/ViolateOp/Others":1094,"/Majeure/IncidentDisaster":1097,"/DataSec/Others":1100,"/AbnormalBehavior/Others":1103,"/ViolateOp/Misoperation":1106,"/SafetyHazard/NetVuln":1109,"/DataSec/DataTheft":1112,"/DevOps/PhysicalDamage":1115,"/Majeure/Others":1118,"/NetAttack/Phishing":1121,"/NetAttack/DOS":1124,"/DataSec/DataAbuse":1127,"/DataSec/DataLoss":1130,"/DevOps/Others":1133,"/SafetyHazard/NetConfigFlaw":1136,"/InformationSec/FalseInformation":1139,"/Malware/Trojan":1142,"/InformationSec/Porn":1145,"/NetAttack/SupplyChain":1148,"/NetAttack/Others":1151,"/SafetyHazard/Others":1154,"/Malware/BlendedAttack":1157,"/Majeure/SocialSec":1160,"/ViolateOp/PersonnelAvailability":1163,"/NetAttack/APT":1166,"/DataSec/SocialEngineering":1169,"/DevOps/Radiation":1172,"/Malware/Ransomware":1175},{"description":951,"label":952},"恶意代码宿主站点事件:诱使目标用户到存储恶意代码的宿主站点下载恶意代码；","恶意代码宿主站点事件",{"description":954,"label":955},"配套设施故障事件:支撑网络运行的配套设施发生故障.例如：电力供应故障、照明系统故障、温湿度控制系统故障等；","配套设施故障事件",{"description":957,"label":958},"信号干扰事件：通过技术手段阻碍有线或无线信号在网络中正常传播；","信号干扰事件",{"description":960,"label":961},"域名转嫁事件:把自己的域名指向一个不属于自己的IP地址，导致针对该域名的攻击都将被引向所指向的IP地址；","域名转嫁事件",{"description":963,"label":964},"DNS污染事件:利用刻意制造或无意制造的DNS数据包，把域名指向不正确的IP地址；","DNS污染事件",{"description":966,"label":967},"权限滥用事件：由于网络服务端功能开放过多或权限限制不严格，导致攻击者通过直接或间接调用权限的方式进行攻击；","权限滥用事件",{"description":969,"label":970},"挖矿病毒事件：以获得数字加密货币为目的，控制他人的计算机并植入挖矿病毒程序完成大量运算","挖矿病毒事件",{"description":972,"label":973},"其他信息内容安全事件：不在以上子类之中的信息内容安全事件。","其他信息内容安全事件",{"description":975,"label":976},"访问异常事件：因网络软硬件运行环境发生变化导致不能提供服务；","访问异常事件",{"description":978,"label":979},"其他事件指未归为上述分类的网络安全事件。","其他事件",{"description":981,"label":982},"反动宣传事件：利用网络传播煽动颠覆国家政权、推翻社会主义制度.煽动分裂国家、破坏国家统一等危害国家安全、荣誉和利益的非法信息：","反动宣传事件",{"description":984,"label":985},"权限伪造事件：为了欺骗制造虚假权限；","权限伪造事件",{"description":987,"label":988},"资源未授权使用事件:未经授权访问资源；","资源未授权使用事件",{"description":990,"label":991},"数据篡改事件:未经授权接触或修改数据；","数据篡改事件",{"description":993,"label":994},"BGP劫持攻击事件:通过BGP恶意操纵网络路由路径；","BGP劫持攻击事件",{"description":996,"label":997},"数据泄露事件:无意或恶意通过技术手段使数据或敏感个人信息对外公开泄露：","数据泄露事件",{"description":999,"label":1000},"技术故障事件：网络中软硬件的自然缺陷、设计缺陷或运行环境发生变化而引起系统故障，例如：硬件故障、软件故障、过载等；","技术故障事件",{"description":1002,"label":1003},"域名劫持事件:通过攻击或伪造DNS的方式蓄意或恶意诱导用户访问非预期的指定IP地址（网站）；","域名劫持事件",{"description":1005,"label":1006},"故意违规操作事件：故意执行非法操作；","故意违规操作事件",{"description":1008,"label":1009},"公共卫生事件：传染病疫情等导致信息和信息系统受损；","公共卫生事件",{"description":1011,"label":1012},"网络端虫事件：利用网络缺陷，蓄意制造或通过网络自动复制并传播网络蠕虫；","网络蠕虫事件",{"description":1014,"label":1015},"后门植入事件：非法在网络中创建能够持续获取其管理权限的后门；","后门植入事件",{"description":1017,"label":1018},"恶意代码内嵌网页事件：在访问被嵌入恶意代码而受到污损的网页时，该恶意代码在访问该网页的计算机系统中安装恶意软件；","恶意代码内嵌网页事件",{"description":1020,"label":1021},"僵尸网络事件：利用僵尸工具程序形成僵尸网络；","僵尸网络事件",{"description":1023,"label":1024},"网络扫描探测事件：利用网络扫描软件获取有关网络配置、端口、服务和现有脆弱性等信息；","网络扫描探测事件",{"description":1026,"label":1027},"漏洞利用事件：通过挖掘并利用网络配置缺陷、通信协议缺陷或应用程序缺陷等漏洞对网络实施攻击；","漏洞利用事件",{"description":1029,"label":1030},"数据假冒事件：非法或未经许可使用、伪造数据；","数据假冒事件",{"description":1032,"label":1033},"其他恶意程序事件:不在以上子类之中的恶意程序事件。","其他恶意程序事件",{"description":1035,"label":1036},"流量异常事件：网络流量行为模式偏离正常基线；","流量异常事件",{"description":1038,"label":1039},"WLAN劫持事件:通过口令破解、固件替换等方法非法获取无线局域网的控制权限；","WLAN劫持事件",{"description":1041,"label":1042},"失陷主机事件：攻击者获得某主机的控制权后.能以该主机为跳板继续攻击组织内网其他主机；","失陷主机事件",{"description":1044,"label":1045},"权益侵害事件：利用网络传播的信息侵害了社会组织或公民的合法权益；","权益侵害事件",{"description":1047,"label":1048},"广播欺诈事件:通过广播欺骗的方式干扰网络数据包正常传输或窃取网络用户敏感信息；","广播欺诈事件",{"description":1050,"label":1051},"暴恐宣扬事件:利用网络宣扬恐怖主义、极端主义，煽动民族仇恨、民族歧视的信息，引起社会恐慌和动乱；","暴恐宣扬事件",{"description":1053,"label":1054},"网页篡改事件:通过恶意破坏或更改网页内容影响网站声誉或破坏网页及网站可用性；","网页篡改事件",{"description":1056,"label":1057},"流量劫持事件：通过恶意诱导或非法强制用户访问特定网络资源造成用户流量损失；","流量劫持事件",{"description":1059,"label":1060},"信息滥发事件:利用网络传播未经接收者准许的信息，例如：垃圾邮件等；","信息滥发事件",{"description":1062,"label":1063},"自然灾害事件：大自然的极端现象导致信息和信息系统受损，例如：地震、火山、洪水、暴风、闪电、海啸、崩塌等；","自然灾害事件",{"description":1065,"label":1066},"凭据攻击事件：破解口令.解析登录口令或凭据等；","凭据攻击事件",{"description":1068,"label":1069},"后门利用事件:恶意利用软件或硬件系统设计过程中未经严格验证所留下的接口、功能模块、程序等，非法获取网络管理权限；","后门利用事件",{"description":1071,"label":1072},"行为抵赖事件:用户否认其有害行为；","行为抵赖事件",{"description":1074,"label":1075},"训练数据的概率分布，导致模型在某些特定条件下产生分类或聚类错误；","数据投毒事件",{"description":1077,"label":1078},"隐私侵犯事件:无意或恶意侵犯网络中存在的敏感个人信息；","隐私侵犯事件",{"description":1080,"label":1081},"位置检测事件:非法检测系统、个人的地理位置信息或敏感数据的存储位置；","位置检测事件",{"description":1083,"label":1084},"网络欺诈事件:恶意利用技术或非技术手段对特定或不特定目标通过网络进行欺诈以非法获取信息或钱财；","网络欺诈事件",{"description":1086,"label":1087},"计算机病毒事件:制造、传播或利用恶意程序，影响计算机使用,破坏计算机功能，毁坏或窃取数据；","计算机病毒事件",{"description":1089,"label":1090},"数据拦截事件:在数据到达目标接收者之前非法捕获数据；","数据拦截事件",{"description":1092,"label":1093},"版权违反事件:违反版权要求安装使用商业软件或其他受版权保护的材料；","版权违反事件",{"description":1095,"label":1096},"其他违规操作事件：不在以上子类之中的违规操作事件。","其他违规操作事件",{"description":1098,"label":1099},"事故灾难事件：具有灾难性后果的事故导致信息和信息系统受损，例如：公共设施和设备事故、环境污染事故等","事故灾难事件",{"description":1101,"label":1102},"其他数据安全事件:不在以上子类之中的数据安全事件。","其他数据安全事件",{"description":1104,"label":1105},"其他异常行为事件:不在以上子类之中的异常行为事件。","其他异常行为事件",{"description":1107,"label":1108},"误操作事件:无意地执行错误操作；","误操作事件",{"description":1110,"label":1111},"网络漏洞事件：因操作系统、应用程序或安全协议开发及设计过程中，对安全性考虑不充分而出现安全隐患；","网络漏洞事件",{"description":1113,"label":1114},"数据窃取事件:未经授权利用技术手段（例如窃听、间谍等）偷窃数据；","数据窃取事件",{"description":1116,"label":1117},"物理损害事件：故意或意外的物理行动造成网络环境或网络设备损坏.例如：失火、漏水、静电、设备毁坏或丢失等；","物理损害事件",{"description":1119,"label":1120},"其他不可抗力事件：不在以上子类之中的不可抗力事件。","其他不可抗力事件",{"description":1122,"label":1123},"网络钓鱼事件：利用欺诈性网络技术诱使用户泄露重要数据或个人信息；","网络钓鱼事件",{"description":1125,"label":1126},"拒绝服务事件：通过非正常使用网络资源（诸如CPU、内存、磁盘空间或网络带宽）影响或破坏网络可用性，例如：DDOS等；","拒绝服务事件",{"description":1128,"label":1129},"数据滥用事件:无意或恶意滥用数据","数据滥用事件",{"description":1131,"label":1132},"数据损失事件：因误操作、人为蓄意或软硬件缺陷等因素导致数据损失；","数据损失事件",{"description":1134,"label":1135},"其他设备设施故障事件：不在以上子类之中的设备设施故障事件。","其他设备设施故障事件",{"description":1137,"label":1138},"网络配置合规缺陷事件：由于软硬件安全配置不合理或缺省配置，不符合网络安全要求而产生安全缺陷或隐患；","网络配置缺陷事件",{"description":1140,"label":1141},"虚假信息传播事件：利用网络编造并传播虚假信息来扰乱经济秩序和社会秩序.造成负面影响；","虚假信息传播事件",{"description":1143,"label":1144},"特洛伊木马事件：制造、传播或利用具有远程控制功能的恶意程序，实现非法窃取或截获数据；","特洛伊木马事件",{"description":1146,"label":1147},"色情传播事件：利用网络传播违背社会伦理道德的淫秽色情信息；","色情传播事件",{"description":1149,"label":1150},"供应链攻击事件:通过利用供应链管理中存在的脆弱性，感染合法应用来分发恶意程序：","供应链攻击事件",{"description":1152,"label":1153},"其他网络攻击事件:不在以上子类之中的网络攻击事件。","其他网络攻击事件",{"description":1155,"label":1156},"其他安全隐患事件:不在以上子类之中的安全隐患事件。","其他安全隐患事件",{"description":1158,"label":1159},"混合攻击程序事件:利用多种方法传播和利用多种恶意程序.例如，一个计算机病毒在侵入计算机系统后在系统中安装木马程序；","混合攻击程序事件",{"description":1161,"label":1162},"社会安全事件：危害国家和社会的突发性群体性事件导致信息和信息系统受损.例如：恐怖袭击事件等；","社会安全事件",{"description":1164,"label":1165},"人员可用性破坏事件:人力资源受损，导致人员缺失或缺席；","人员可用性破坏事件",{"description":1167,"label":1168},"APT事件：通过对特定对象展开持续有效的攻击活动.这种攻击活动具有极强的隐蔽性和针对性，通常会运用受感染的各种介质、供应链和社会工程学等多种手段实施先进的、持久的且有效的威胁和攻击","APT事件",{"description":1170,"label":1171},"社会工程事件:通过非技术手段（如心理学、话术等）诱导他人泄露数据或执行行动；","社会工程事件",{"description":1173,"label":1174},"辐射干扰事件：因辐射产生干扰影响网络正常运行.例如：电磁辐射、电磁脉冲、电子干扰、电压波动、热辐射等；","辐射干扰事件",{"description":1176,"label":1177},"勒索软件事件:采取加密或屏蔽用户操作等方式劫持用户对系统或数据的访问权，并籍此向用户索取赎金；","勒索软件事件",{"fieldName":1179,"label":1180,"description":1181,"type":322,"subcate_ids":1182,"enum":330},"language","语言","该字段标识软件开发或脚本执行使用的编程语言名称，应为常见的编程语言名称，例如Python、Java、JavaScript、C++等，不包含版本号或特定方言信息。",[366],{"fieldName":1184,"label":1185,"description":1186,"type":322,"subcate_ids":1187,"enum":330},"assetGeoCityCode","资产所处市代码","资产所在城市的行政区划代码，采用国家标准的行政区划编码格式。",[352,353,344,345,354,346,355,356,357,358,359,360,361,362,363,364,365,366,367,368,369,370,371,372,373],{"fieldName":1189,"label":1190,"description":1191,"type":322,"subcate_ids":1192,"enum":330},"victimPort","受害者端口","受害者网络服务端口号，表示遭受威胁攻击或风险影响的受害者服务所使用的端口。格式为端口号，取值范围为0-65535，多个端口号使用英文逗号分隔。",[324,63,33,295,411,379,380,381,382,325,326,383,327,213,328,329,400,412,429,342,343],{"fieldName":1194,"label":1195,"description":1196,"type":322,"subcate_ids":1197,"enum":330},"deviceName","设备名称","设备名称，用于标识日志生成设备的名称，可添加资产属性（如总部、下级等）。",[38,47,54,68,76,89,94,99,104,110,116,121,128,133,138,143,150,160,165,170,175,180,185,190,195,202,207,218,223,229,237,242,247,253,259,264,269,274,279,284,289,300,305,310,315,324,63,33,295,411,379,380,381,382,325,326,383,327,213,328,329,400,412,429,342,343,84,418,430,384],{"fieldName":1199,"label":1200,"description":1201,"type":322,"subcate_ids":1202,"enum":330},"callTrace","函数调用栈","函数调用栈记录了线程创建时刻的函数调用序列，包含模块名和内存地址偏移。格式为由竖线“|”分隔的多个调用帧，每个调用帧的格式为“模块文件完整路径+十六进制内存偏移量”。模块路径应使用标准文件系统路径格式，内存偏移量应为不带“0x”前缀的十六进制数字。",[412],{"fieldName":1204,"label":1205,"description":1206,"type":322,"subcate_ids":1207,"enum":330},"isv","独立软件开发商","该字段用于标识网站、应用程序或软件产品的独立开发服务提供商名称。",[359],{"fieldName":1209,"label":1210,"description":1211,"type":322,"subcate_ids":1212,"enum":330},"objectType","对象类型","标识系统对象的分类类型，例如Directory（目录）、File（文件）、User（用户）等。该字段为字符串类型，用于明确区分系统中不同种类的资源对象。",[38,259,412],{"fieldName":1214,"label":1215,"description":1216,"type":470,"subcate_ids":1217,"enum":1218},"wechatSubjectType","微信主体类型","微信公众平台认证主体的类型分类。枚举类型，可选值包括：individual（个人主体）、enterprise（企业主体）、government（政府主体）、media（媒体主体）、other（其他主体）。",[357],{"other":1219,"government":1222,"individual":1225,"enterprise":1228,"media":1231},{"description":1220,"label":1221},"其他类型的微信公众号认证主体","其他主体",{"description":1223,"label":1224},"政府机构认证的微信公众号主体","政府主体",{"description":1226,"label":1227},"个人身份认证的微信公众号主体","个人主体",{"description":1229,"label":1230},"企业或组织机构认证的微信公众号主体","企业主体",{"description":1232,"label":1233},"媒体机构认证的微信公众号主体","媒体主体",{"fieldName":1235,"label":1236,"description":1237,"type":322,"subcate_ids":1238,"enum":330},"nicModel","网卡型号","网卡型号，指网络接口控制器（NIC）的硬件型号标识，用于唯一标识网卡设备，通常包含制造商、接口类型和速率规格等信息。",[360,361,362,364],{"fieldName":1240,"label":1241,"description":1242,"type":322,"subcate_ids":1243,"enum":330},"payload","载荷内容","该字段表示攻击活动中传输的恶意载荷内容，例如注入的代码或恶意数据。",[295,411,379,381,382,383,343],{"fieldName":1245,"label":1246,"description":1247,"type":322,"subcate_ids":1248,"enum":330},"runUser","执行用户","执行系统进程或服务的用户账号名称，应为有效的系统用户名。",[363,365],{"fieldName":1250,"label":1251,"description":1252,"type":322,"subcate_ids":1253,"enum":330},"virusFamily","病毒家族","该字段表示病毒的家族分类，指具有共同代码基础、攻击手法或作者关联的病毒分组。",[325,326,327,213,328,329],{"fieldName":1255,"label":1256,"description":1257,"type":322,"subcate_ids":1258,"enum":330},"destHostName","目标主机名","目标主机名（目标标识）指网络连接或安全事件中目标设备的网络标识，它可以是 DNS 主机名（含 FQDN）、NetBIOS 名称、本地主机名或 IP 地址；若访问时包含非标准端口，则通常应在标识后附加 :端口号（如 192.168.1.1:8080 或 host.example.com:8443）。",[38,54,68,76,121,150,195,300,305,310,315,63,33,379,380,381,382,383,400,342,343,384],{"fieldName":1260,"label":1261,"description":1262,"type":322,"subcate_ids":1263,"enum":330},"middlewareVersion","中间件版本","该字段表示中间件软件的具体版本号。版本号通常遵循主版本号.次版本号.修订号（如 8.0.1）或类似的数字序列格式，也可能包含字母和分隔符（如 “v2.1-beta”）。",[367],{"fieldName":1265,"label":1266,"description":1267,"type":322,"subcate_ids":1268,"enum":330},"sidHistory","对象SIDHistory属性","Active Directory对象的SID历史属性，用于记录用户或组对象先前使用的安全标识符。该字段为字符串类型，其值必须符合Windows安全标识符格式规范，具体格式为：以“S-1-”开头的字符串，后跟一系列由连字符分隔的数字标识符。例如：S-1-5-21-3623811015-3361044348-30300820-1013。",[218],{"fieldName":1270,"label":1271,"description":1272,"type":335,"subcate_ids":1273,"enum":330},"isExecutable","是否可执行","该字段用于标识文件是否具有可执行格式（如PE、ELF）或执行权限。其值为布尔类型，仅允许取 `true` 或 `false`。",[],{"fieldName":1275,"label":1276,"description":1277,"type":322,"subcate_ids":1278,"enum":330},"componentName","组件名称","组件名称是系统内部组件的功能名称标识，用于唯一标识一个软件模块或功能单元。格式要求：必须为有效的字符串，通常采用小写字母、数字和连字符（-）的组合，遵循常见的命名约定（如Maven artifactId或软件包名称）。",[366],{"fieldName":1280,"label":1281,"description":1282,"type":322,"subcate_ids":1283,"enum":330},"pipeName","管道名称","字段用于标识Windows命名管道或SMB共享管道的完整路径名称。其格式为UNC路径，通常以双反斜杠`\\\\`开头，后跟主机名或IP地址以及共享资源路径，例如`\\\\server\\pipe\\pipename`或`\\\\192.168.56.20\\IPC$`。该字段为字符串类型，需符合Windows命名管道或SMB共享的标准命名规范。",[195,242,412],{"fieldName":1285,"label":1286,"description":1287,"type":322,"subcate_ids":1288,"enum":330},"techniqueId","ATT&CK技术ID","该字段表示攻击行为在MITRE ATT&CK框架中对应的具体攻击技术的唯一标识符。格式为ATT&CK技术ID标准格式，通常以字母“T”开头，后接4位数字，例如：T1566。",[324,63,33,295,411,379,380,381,382,325,326,383,327,213,328,329,400,412,429,342,343,84,418,430,384],{"fieldName":1290,"label":1291,"description":1292,"type":322,"subcate_ids":1293,"enum":330},"srcGeoLatitude","来源纬度","该字段表示网络连接发起方IP地址所对应的地理纬度坐标，以字符串格式存储。纬度坐标应遵循十进制表示法，取值范围为-90.000000到90.000000，其中北纬为正，南纬为负。",[38,54,68,76,89,94,99,104,110,116,121,128,133,138,143,150,160,165,170,175,180,185,190,195,202,207,223,247,300,305,310,315,324,63,33,295,411,379,380,381,382,325,326,383,327,213,328,329,400,412,429,342,343],{"fieldName":1295,"label":1296,"description":1297,"type":322,"subcate_ids":1298,"enum":330},"domainBehaviorVersion","域行为版本","域功能级别版本号，用于标识Active Directory域的功能级别，格式为整数形式的版本号。该字段为字符串类型，存储对应的版本数字。",[],{"fieldName":1300,"label":1301,"description":1302,"type":322,"subcate_ids":1303,"enum":330},"eventId","事件ID","事件ID是日志事件的全局唯一标识符，通常采用UUID或时间戳序列等不可重复算法生成。格式应为标准的UUID字符串，例如：550e8400-e29b-41d4-a716-446655440000。要求全局唯一，不可重复。",[38,47,54,68,76,89,94,99,104,110,116,121,128,133,138,143,150,160,165,170,175,180,185,190,195,202,207,218,223,229,237,242,247,253,259,264,269,274,279,284,289,300,305,310,315,324,63,33,295,411,379,380,381,382,325,326,383,327,213,328,329,400,412,429,342,343,84,418,430,384],{"fieldName":1305,"label":1306,"description":1307,"type":322,"subcate_ids":1308,"enum":330},"grantedAccess","访问标识","访问标识表示进程或线程被授予的系统资源访问权限掩码，通常以十六进制数表示，通常以\"0x\"前缀开头，后跟十六进制数字（0-9， a-f）",[412],{"fieldName":1310,"label":1311,"description":1312,"type":322,"subcate_ids":1313,"enum":330},"image","进程路径","该字段表示进程可执行文件在文件系统中的完整路径。路径格式应符合操作系统规范，通常为字符串形式，例如以斜杠（/）开头的绝对路径（Linux/Unix系统）或包含盘符和反斜杠的路径（Windows系统）。",[47,223,229,237,242,247,253,259,264,274,324,411,325,326,327,213,328,329,412],{"fieldName":1315,"label":1316,"description":1317,"type":322,"subcate_ids":1318,"enum":330},"unitName","单位名称","单位名称，表示资产所属单位的名称。",[352,353,344,345,354,346,355,356,357,358,359,360,361,362,363,364,365,366,367,368,369,370,371,372,373],{"fieldName":1320,"label":1321,"description":1322,"type":322,"subcate_ids":1323,"enum":330},"virusName","病毒名称","病毒的名称，用于唯一标识和识别特定的病毒或恶意软件。格式为字符串类型，通常包含病毒家族、类型、变种等层级信息。",[325,326,383,327,213,328,329],{"fieldName":1325,"label":1326,"description":1327,"type":470,"subcate_ids":1328,"enum":1329},"ldapOpType","LDAP操作类型","该字段表示轻量级目录访问协议(LDAP)请求的具体操作类型。其值必须为预定义的枚举字符串，有效值包括但不限于：bind (绑定操作)、unbind (解绑操作)、search (搜索操作)、compare (比较操作)、add (添加操作)。",[165],{"Add":1330,"Delete":1333,"Bind":1336,"Search":1339,"Extended":1342,"Compare":1345,"Modify":1348,"Unbind":1351,"ModifyDn":1354},{"description":1331,"label":1332},"Add new directory entry","Add Operation",{"description":1334,"label":1335},"Delete directory entry","Delete Operation",{"description":1337,"label":1338},"LDAP authentication and session establishment","Bind Operation",{"description":1340,"label":1341},"Directory entry search query","Search Operation",{"description":1343,"label":1344},"LDAP extended operation","Extended Operation",{"description":1346,"label":1347},"Attribute value comparison","Comparison Operation",{"description":1349,"label":1350},"Modify directory entry attributes","Modify Operation",{"description":1352,"label":1353},"LDAP session termination","Unbind Operation",{"description":1355,"label":1356},"Modify entry identifier","Modify DN",{"fieldName":1358,"label":1359,"description":1360,"type":513,"subcate_ids":1361,"enum":330},"affectAssetPort","受影响资产端口","该字段表示攻击或风险的受影响资产的网络服务端口号，用于标识网络服务。格式要求：端口号必须是整数类型，取值范围为0-65535。",[84,418,430,384],{"fieldName":1363,"label":1364,"description":1365,"type":322,"subcate_ids":1366,"enum":330},"accountType","账号类型","账号类型，指用户账号基于功能、权限和使用场景的分类。本字段为字符串类型，通常取值为描述账号类型的文本，如“VPN账号”、“系统管理员账号”、“普通用户账号”等。根据实际业务场景填写具体类型名称。",[352],{"fieldName":1368,"label":1369,"description":1370,"type":322,"subcate_ids":1371,"enum":330},"relateId","关联ID","关联ID用于关联相关安全事件或资产信息的唯一标识符，格式为字符串。",[352,353,344,345,354,346,355,356,357,358,359,360,361,362,363,364,365,366,367,368,369,370,371,372,373],{"fieldName":1373,"label":1374,"description":1375,"type":513,"subcate_ids":1376,"enum":330},"destTransPort","转换后目的端口","该字段表示在目的网络地址转换（DNAT）或端口重定向过程中，目的端口号被修改后的最终端口值。格式为整数，取值范围为0到65535。",[185],{"fieldName":1378,"label":1379,"description":1380,"type":322,"subcate_ids":1381,"enum":330},"srcGeoCountry","来源国家","该字段表示网络连接发起方IP地址所对应的国家或地区信息。",[38,54,68,76,89,94,99,104,110,116,121,128,133,138,143,150,160,165,170,175,180,185,190,195,202,207,223,247,300,305,310,315,324,63,33,295,411,379,380,381,382,325,326,383,327,213,328,329,400,412,429,342,343],{"fieldName":1383,"label":1384,"description":1385,"type":322,"subcate_ids":1386,"enum":330},"cmdContent","命令行内容","命令行内容，指在计算机系统或终端中执行的具体命令字符串。内容通常为ASCII或UTF-8编码的可读文本。",[195,305,315],{"fieldName":1388,"label":1389,"description":1390,"type":322,"subcate_ids":1391,"enum":330},"attackerAddress","攻击者","发起威胁攻击的攻击者源IP地址，格式要求：必须是符合IPv4或IPv6标准的IP地址格式，例如IPv4的点分十进制表示法（如192.168.22.35）或IPv6的冒号分隔十六进制表示法。",[324,63,33,295,411,379,380,381,382,325,326,383,327,213,328,329,400,412,429,342,343],{"fieldName":1393,"label":1394,"description":1395,"type":322,"subcate_ids":1396,"enum":330},"dataRetentionPolicy","数据保留策略","数据保留策略，用于定义数据在存储系统中的保留时长和处置方式。该字段为字符串类型，用于描述具体的保留策略。常见的格式包括但不限于：以天、月、年为单位的时长描述。",[373],{"fieldName":1398,"label":1399,"description":1400,"type":322,"subcate_ids":1401,"enum":330},"kernelVersion","内核版本","内核版本信息，表示操作系统内核的具体版本号。通常遵循主版本号.次版本号.修订号-发布版本的格式。",[360,361,362],{"fieldName":1403,"label":1404,"description":1405,"type":322,"subcate_ids":1406,"enum":330},"sshClientVersion","SSH客户端版本","SSH客户端使用的协议版本标识，通常表示SSH协议的主版本号。",[110],{"fieldName":1408,"label":1409,"description":1410,"type":322,"subcate_ids":1411,"enum":330},"tacticId","ATT&CK战术ID","攻击行为在MITRE ATT&CK框架中对应的战术阶段唯一标识符。格式必须符合ATT&CK官方定义的战术ID规范，通常以“TA”为前缀，后跟四位或五位数字，例如“TA0001”。",[324,63,33,295,411,379,380,381,382,325,326,383,327,213,328,329,400,412,429,342,343,84,418,430,384],{"fieldName":1413,"label":1414,"description":1415,"type":322,"subcate_ids":1416,"enum":330},"assetUser","使用人","使用资产的人员姓名，格式为字符串类型。",[352,353,344,345,354,346,355,356,357,358,359,360,361,362,363,364,365,366,367,368,369,370,371,372,373],{"fieldName":1418,"label":1419,"description":1420,"type":322,"subcate_ids":1421,"enum":330},"assetGeoCountry","资产所处国家","资产当前所在的国家名称，使用ISO 3166-1标准中的国家名称（例如：中国、美国）。取值应为完整且标准的国家名称，避免使用简称或代码。",[352,353,344,345,354,346,355,356,357,358,359,360,361,362,363,364,365,366,367,368,369,370,371,372,373],{"fieldName":1423,"label":1424,"description":1425,"type":322,"subcate_ids":1426,"enum":330},"accessControlPolicy","访问控制策略","访问控制策略的配置信息，用于定义资源的访问权限规则。该字段存储具体的策略配置内容，通常包含访问控制规则、条件、动作等结构化信息。",[373],{"fieldName":1428,"label":1429,"description":1430,"type":470,"subcate_ids":1431,"enum":1432},"logType","日志类型","该字段标识日志事件的功能或对象实体分类。其值为预定义的枚举字符串，例如：alert（告警类日志）、traffic（网络通信类日志）、process（进程操作类日志）、command（命令执行类日志）、file（文件操作类日志）等。",[38,47,54,68,76,89,94,99,104,110,116,121,128,133,138,143,150,160,165,170,175,180,185,190,195,202,207,218,223,229,237,242,247,253,259,264,269,274,279,284,289,300,305,310,315,324,63,33,295,411,379,380,381,382,325,326,383,327,213,328,329,400,412,429,342,343,84,418,430,384],{"app":1433,"registry":1436,"process":1439,"module":1442,"winrm":1445,"thread":1448,"command":1451,"system_resource":1454,"wmi":1457,"file":1460,"task":1463,"driver":1466,"alert":1469,"service":1472,"domain":1475,"system_operation":1478,"pipe":1481,"config":1484,"account":1487,"others":1490,"traffic":1493,"status":1496},{"description":1434,"label":1435},"应用程序运行日志，记录应用程序启动、运行、错误和业务操作","应用程序类日志",{"description":1437,"label":1438},"Windows注册表操作日志，记录注册表键值创建、修改和删除操作","注册表操作类日志",{"description":1440,"label":1441},"进程生命周期管理日志，记录进程创建、终止、注入等操作","进程操作类日志",{"description":1443,"label":1444},"程序模块管理日志，记录DLL、SO等模块的加载、卸载和内存映射","模块操作类日志",{"description":1446,"label":1447},"Windows远程管理日志，记录远程PowerShell命令执行和系统管理操作","WinRM操作类日志",{"description":1449,"label":1450},"线程管理日志，记录线程创建、终止、挂起和优先级变更操作","线程操作类日志",{"description":1452,"label":1453},"命令行和脚本执行日志，记录系统命令、PowerShell和Shell命令执行","命令执行类日志",{"description":1455,"label":1456},"系统资源使用日志，记录CPU、内存、磁盘和网络资源使用情况","系统资源类日志",{"description":1458,"label":1459},"Windows管理规范操作日志，记录WMI查询、事件订阅和代码执行","WMI操作类日志",{"description":1461,"label":1462},"文件系统操作日志，记录文件创建、修改、删除、访问等操作","文件操作类日志",{"description":1464,"label":1465},"计划任务和作业日志，记录定时任务创建、执行、修改和删除操作","任务操作类日志",{"description":1467,"label":1468},"设备驱动程序日志，记录内核驱动加载、卸载和运行状态","驱动操作类日志",{"description":1470,"label":1471},"安全告警事件日志，包含威胁检测、异常行为和安全风险告警","告警类日志",{"description":1473,"label":1474},"系统服务管理日志，记录Windows/Linux服务的创建、启动、停止和配置变更","服务操作类日志",{"description":1476,"label":1477},"域名解析和查询日志，记录DNS查询、域名解析和网络定位操作","域名操作类日志",{"description":1479,"label":1480},"系统级管理操作日志，记录系统维护、管理和控制操作","系统操作类日志",{"description":1482,"label":1483},"进程间通信日志，记录命名管道创建、连接、数据传输操作","管道操作类日志",{"description":1485,"label":1486},"系统配置变更日志，记录安全策略、系统设置和配置修改操作","配置操作类日志",{"description":1488,"label":1489},"用户账户管理日志，记录用户登录、注销、权限变更和账户管理操作","账号操作类日志",{"description":1491,"label":1492},"未分类的其他日志类型，包含无法归入上述分类的日志事件","其他类型日志",{"description":1494,"label":1495},"网络流量和通信会话日志，记录网络连接、数据传输和协议通信","网络通信类日志",{"description":1497,"label":1498},"系统运行状态日志，记录系统启动、关机、重启和运行状态变更","系统状态类日志",{"fieldName":1500,"label":1501,"description":1502,"type":335,"subcate_ids":1503,"enum":330},"privilegedRun","特权模式运行","该字段表示容器是否以特权模式运行，具有对主机的访问权限，基于Docker运行时安全标准。其格式为布尔值，仅允许取 `true` 或 `false` 两种值。",[363],{"fieldName":1505,"label":1506,"description":1507,"type":322,"subcate_ids":1508,"enum":330},"pnpDeviceName","即插即用设备名","该字段用于标识Windows系统中即插即用设备的完整名称和路径信息。其值为字符串类型，通常包含设备在操作系统中的逻辑驱动器盘符、设备制造商名称、设备型号及序列号等详细信息，各组成部分之间以特定分隔符（如空格或反斜杠）连接。",[],{"fieldName":1510,"label":1511,"description":1512,"type":322,"subcate_ids":1513,"enum":330},"requestMethod","请求方法","网络请求客户端向服务器发送请求时使用的HTTP请求方法类型，如GET、POST、PUT、DELETE等标准方法。该字段值必须统一使用大写英文字母表示",[38,54,76,94,116,150,63,33,379,380,381,382,383,400,342,343,384,353],{"fieldName":1515,"label":1516,"description":1517,"type":322,"subcate_ids":1518,"enum":330},"srcLoginId","源登录ID","源登录ID是指在网络通信中发起操作或请求时使用的用户登录标识符，用于唯一标识发起方用户。",[47,218,269],{"fieldName":1520,"label":1521,"description":1522,"type":322,"subcate_ids":1523,"enum":330},"tamperedPageUrl","被篡改网页URL","该字段记录未经授权修改后的受损网页URL地址，格式需符合标准URL规范，通常包含协议类型（如http、https）、域名和路径等组成部分。",[382],{"fieldName":1525,"label":1526,"description":1527,"type":322,"subcate_ids":1528,"enum":330},"executeType","执行方式","该字段表示命令的执行方式，用于标识命令是通过何种机制或协议执行的，例如通过WinRM（Windows远程管理）进行本地执行或远程执行。该字段为字符串类型，应使用有意义的描述性值，例如\"local\"表示本地执行，\"remote\"表示远程执行。",[279],{"fieldName":1530,"label":1531,"description":1532,"type":322,"subcate_ids":1533,"enum":330},"processChain","进程链","进程链表示从系统初始化到当前进程的完整进程派生序列，用于追溯进程的创建来源。格式为由箭头符号“→”连接的进程名称与进程ID对，每个进程对格式为“进程名称(进程ID)”，例如：systemd(1) → sshd(4326) → bash(14617)。",[253,324,411,325,326,327,213,328,329,412],{"fieldName":1535,"label":1536,"description":1537,"type":322,"subcate_ids":1538,"enum":330},"httpVersion","HTTP协议版本","该字段标识HTTP网络请求中使用的协议版本。格式为字符串，必须符合HTTP协议版本的标准表示格式，例如\"HTTP/1.0\"、\"HTTP/1.1\"或\"HTTP/2\"。",[54,76,150,380,381,342,343],{"fieldName":1540,"label":1541,"description":1542,"type":470,"subcate_ids":1543,"enum":1544},"assetProtectStatus","资产防护状态","资产安全防护机制或服务的运行状态。",[352,353,344,345,354,346,355,356,357,358,359,360,361,362,363,364,365,366,367,368,369,370,371,372,373],{"under_protection":1545,"unprotected":1548,"unknown":1551},{"description":1546,"label":1547},"资产的安全防护服务（如防火墙、终端防护、入侵检测等）正在正常运行并生效","防护中",{"description":1549,"label":1550},"资产未启用或未部署任何主动的安全防护措施","未防护",{"description":1552,"label":1553},"资产的防护状态未能被检测或获取，安全状况不明确","未知",{"fieldName":1555,"label":1556,"description":1557,"type":322,"subcate_ids":1558,"enum":330},"srcUserId","源用户ID","源用户ID是发起网络连接或操作的用户唯一标识符，通常用于标识操作主体。该字段为字符串类型，格式因系统或协议而异，常见格式包括Windows安全标识符（SID，如示例“S-1-5-18”）、用户名、用户全局唯一标识符（GUID）或数字ID等。",[47,218,269,300,305,315],{"fieldName":1560,"label":1561,"description":1562,"type":322,"subcate_ids":1563,"enum":330},"userLoginHours","用户登录时间","用户账户的登录时间限制，定义了用户可以登录系统的时间范围。",[218],{"fieldName":1565,"label":1566,"description":1567,"type":470,"subcate_ids":1568,"enum":1569},"osType","操作系统类型","操作系统所属的类别。枚举字段，取值范围必须为以下预设值之一：Windows（表示Windows系统）、Linux（表示Linux系统）、Unix（表示Unix系统）、MacOS（表示macOS系统）、Android（表示Android系统）。",[84,418,430,384,355,360,361,362],{"Unix":1570,"Linux":1573,"MacOS":1576,"Windows":1579,"iOS":1582,"Android":1585},{"description":1571,"label":1572},"Unix及类Unix操作系统","Unix系统",{"description":1574,"label":1575},"Linux内核操作系统发行版","Linux系统",{"description":1577,"label":1578},"Apple macOS操作系统","macOS系统",{"description":1580,"label":1581},"Microsoft Windows操作系统家族","Windows系统",{"description":1583,"label":1584},"Apple iOS移动操作系统","iOS系统",{"description":1586,"label":1587},"Google Android移动操作系统","Android系统",{"fieldName":1589,"label":1590,"description":1591,"type":470,"subcate_ids":1592,"enum":1593},"wmiType","WMI类型","WMI事件消费者的具体类别分类，枚举类型，可选值包括：CommandLineEventConsumer（命令行事件消费者）、ActiveScriptEventConsumer（活动脚本事件消费者）、NTEventLogEventConsumer（NT事件日志消费者）、SMTPEventConsumer（SMTP事件消费者）、LogFileEventConsumer（日志文件事件消费者）等。",[284],{"ActiveScriptEventConsumer":1594,"LogFileEventConsumer":1597,"CommandLineEventConsumer":1600,"SMTPEventConsumer":1603,"NTEventLogEventConsumer":1606,"Other":1609},{"description":1595,"label":1596},"执行VBScript或JScript脚本的WMI消费者类型","活动脚本事件消费者",{"description":1598,"label":1599},"向日志文件写入条目的WMI消费者类型","日志文件事件消费者",{"description":1601,"label":1602},"执行命令行命令的WMI消费者类型","命令行事件消费者",{"description":1604,"label":1605},"通过SMTP发送电子邮件的WMI消费者类型","SMTP事件消费者",{"description":1607,"label":1608},"向Windows事件日志写入条目的WMI消费者类型","NT事件日志消费者",{"description":1610,"label":1611},"其他未分类的WMI消费者类型","其他类型",{"fieldName":1613,"label":1614,"description":1615,"type":322,"subcate_ids":1616,"enum":330},"company","公司","该字段记录软件供应商或服务提供商的法定注册公司全称。应采用标准的公司全名，避免使用简称或缩写。",[237,365,369,371],{"fieldName":1618,"label":1619,"description":1620,"type":322,"subcate_ids":1621,"enum":330},"newFilename","新文件名","新文件名指经过重命名操作后的文件名称，包含完整的文件路径信息。该字段为字符串类型，应遵循操作系统文件路径的格式规范，通常包含目录路径和文件名，例如以正斜杠（/）开头的Unix/Linux风格路径或包含盘符和反斜杠（\\）的Windows风格路径。",[300],{"fieldName":1623,"label":1624,"description":1625,"type":470,"subcate_ids":1626,"enum":1627},"protectionLevel","等保等级","该字段表示根据关键信息基础设施保护分级制度确定的资产等级。",[352,353,344,345,354,346,355,356,357,358,359,360,361,362,363,364,365,366,367,368,369,370,371,372,373],{"0":1628,"1":1630,"2":1632,"3":1634,"4":1636,"5":1638},{"description":1629,"label":1629},"非等保系统",{"description":1631,"label":1631},"第一级(自主保护级)",{"description":1633,"label":1633},"第二级(指导保护级)",{"description":1635,"label":1635},"第三级(监督保护级)",{"description":1637,"label":1637},"第四级(强制保护级)",{"description":1639,"label":1639},"第五级(专控保护级)",{"fieldName":1641,"label":1642,"description":1643,"type":322,"subcate_ids":1644,"enum":330},"errPath","错误日志路径","该字段表示应用程序错误日志文件的存储路径，用于记录错误日志的存储位置。路径格式应符合操作系统文件路径规范。",[344],{"fieldName":1646,"label":1647,"description":1648,"type":322,"subcate_ids":1649,"enum":330},"webFramework","Web框架","该字段标识网站服务所使用的后端开发框架名称。格式为字符串，应使用框架的标准或通用名称，例如 Django, Flask, Spring Boot 等。",[359],{"fieldName":1651,"label":1652,"description":1653,"type":322,"subcate_ids":1654,"enum":330},"appName","应用名称","该字段表示被访问或引用的应用名称，用于标识产生该日志的应用程序或服务。其值为字符串类型，通常为应用的自定义名称或标识符。",[38,400],{"fieldName":1656,"label":1657,"description":1658,"type":322,"subcate_ids":1659,"enum":330},"certIssuer","证书颁发者","证书颁发者的名称，即颁发证书的机构或实体的标识。该字段为字符串类型，通常包含证书颁发机构的可辨识名称（DN）或其通用名称（CN）。取值应符合X.509证书规范中对颁发者名称的格式约定。",[368],{"fieldName":1661,"label":1662,"description":1663,"type":513,"subcate_ids":1664,"enum":330},"length","长度","长度表示目标对象的大小限制，例如数据库列定义中指定的最大字符数或数值精度。",[345],{"fieldName":1666,"label":1667,"description":1668,"type":322,"subcate_ids":1669,"enum":330},"dbType","数据库类型","数据库管理系统(DBMS)的类型标识，用于指明所使用的具体数据库产品。常见取值包括但不限于：MYSQL, ORACLE, SQLSERVER, POSTGRESQL, MARIADB, DB2, MONGODB, REDIS等。",[68,128,342,343,84,344],{"fieldName":1671,"label":1389,"description":1672,"type":1673,"subcate_ids":1674,"enum":330},"attacker","攻击者是指在攻击活动中使用的所有唯一源IP地址集合，用于标识攻击来源。该字段为数组类型，每个元素必须符合IP地址格式要求，即有效的IPv4或IPv6地址。","array",[551],{"fieldName":1676,"label":1677,"description":1678,"type":322,"subcate_ids":1679,"enum":330},"delegationList","委派列表","该字段表示允许用户或服务主体将其权限或委托授权给的对象列表。其值为一个字符串，内容需符合特定的服务主体名称（SPN）格式。格式通常为“服务类/主机名[:端口]”，其中服务类标识服务类型，主机名为完全限定域名（FQDN）或NetBIOS名称，端口为可选。",[218],{"fieldName":1681,"label":1682,"description":1683,"type":322,"subcate_ids":1684,"enum":330},"message","描述","用于记录日志或告警的详细描述信息，以文本字符串形式存储。内容通常包含对安全事件、系统活动或异常情况的说明、上下文及关键参数。",[38,47,54,68,76,89,94,99,104,110,116,121,128,133,138,143,150,160,165,170,175,180,185,190,195,202,207,218,223,229,237,242,247,253,259,264,269,274,279,284,289,300,305,310,315,324,63,33,295,411,379,380,381,382,325,326,383,327,213,328,329,400,412,429,342,343,84,418,430,384],{"fieldName":1686,"label":1687,"description":1688,"type":322,"subcate_ids":1689,"enum":330},"userName","用户名称","用户名称，指用户的真实姓名。",[38,54,121,300,305,310,315,400],{"fieldName":1691,"label":1692,"description":1693,"type":322,"subcate_ids":1694,"enum":330},"env","环境变量","环境变量，指操作系统或容器中设置的环境变量，用于配置应用程序或系统的运行参数。格式为键值对，通常以字符串形式表示，多个键值对之间用逗号分隔，键和值之间用冒号分隔。",[363],{"fieldName":1696,"label":1697,"description":1698,"type":322,"subcate_ids":1699,"enum":330},"assetGroup","归属资产组","该字段表示资产所属的组织组或部门名称。",[352,353,344,345,354,346,355,356,357,358,359,360,361,362,363,364,365,366,367,368,369,370,371,372,373],{"fieldName":1701,"label":1702,"description":1703,"type":322,"subcate_ids":1704,"enum":330},"regValue","注册表值名称","该字段存储Windows注册表键值中存储的实际配置数据。其值为字符串类型，内容为注册表项的具体数值或配置信息。",[259,412],{"fieldName":1706,"label":1707,"description":1708,"type":513,"subcate_ids":1709,"enum":330},"srcTransPort","转换后源端口","转换后源端口表示在网络地址转换（NAT）或端口地址转换（PAT）过程中，源端口号被修改后的值。该字段为整数类型，取值范围为0到65535，需符合TCP/UDP端口号规范。",[121,185],{"fieldName":1711,"label":1712,"description":1713,"type":470,"subcate_ids":1714,"enum":1715},"cloudInstanceType","云实例类型","云实例类型表示云计算实例的标准化规格分类，用于标识实例的计算、内存、存储等资源配置特性。该字段为枚举类型，其取值必须为预定义的可选值之一，例如：generalPurpose (通用型)、computeOptimized (计算优化型)、memoryOptimized (内存优化型)、storageOptimized (存储优化型) 或 gpuAccelerated (GPU加速型) 等。",[372],{"other":1716,"fpgaAccelerated":1718,"generalPurpose":1721,"burstable":1724,"micro":1727,"highPerformanceCompute":1730,"memoryOptimized":1733,"storageOptimized":1736,"computeOptimized":1739,"edgeOptimized":1742,"gpuAccelerated":1745},{"description":1717,"label":448},"其他类型的实例类型",{"description":1719,"label":1720},"配备FPGA，适用于可定制硬件加速工作负载","FPGA加速型",{"description":1722,"label":1723},"平衡计算、内存和网络资源的通用实例类型","通用型",{"description":1725,"label":1726},"提供基准性能并可突发至更高性能的实例类型","突发性能型",{"description":1728,"label":1729},"低配置实例，适用于轻量级工作负载和测试环境","微型实例",{"description":1731,"label":1732},"专为高性能计算工作负载优化的实例类型","高性能计算型",{"description":1734,"label":1735},"高内存容量，适用于内存密集型应用","内存优化型",{"description":1737,"label":1738},"高存储性能和容量，适用于I/O密集型工作负载","存储优化型",{"description":1740,"label":1741},"高性能处理器，适用于计算密集型工作负载","计算优化型",{"description":1743,"label":1744},"专为边缘计算场景优化的实例类型","边缘优化型",{"description":1746,"label":1747},"配备GPU，适用于图形处理、机器学习和高性能计算","GPU加速型",{"fieldName":1749,"label":1750,"description":1751,"type":322,"subcate_ids":1752,"enum":330},"developer","开发者","该字段用于标识移动应用、软件产品或系统组件等的开发实体名称，通常指公司、组织或个人的正式名称。",[355,356],{"fieldName":1754,"label":1755,"description":1756,"type":322,"subcate_ids":1757,"enum":330},"maintainEndTime","维保结束时间","资产维护保养的结束时间，采用标准的日期时间格式，格式要求为yyyy-mm-dd HH:mm:ss。",[360,361,362],{"fieldName":1759,"label":1760,"description":1761,"type":322,"subcate_ids":1762,"enum":330},"copyright","版权信息","该字段用于声明数字内容的版权归属信息，需使用字符串格式提供明确的版权所有者名称、机构或相关声明文本。",[355],{"fieldName":1764,"label":1765,"description":1766,"type":322,"subcate_ids":1767,"enum":330},"bccUserName","密送人","该字段记录邮件密送接收方的邮箱地址集合，多个地址应以英文分号分隔。每个邮箱地址需符合标准的电子邮件地址格式，通常包含本地部分、@符号和域名部分。",[143,295,379,342],{"fieldName":1769,"label":1770,"description":1771,"type":322,"subcate_ids":1772,"enum":330},"publicKey","公钥信息","公钥信息字段表示数字证书中包含的公钥技术参数，用于标识加密算法或密钥类型。",[368],{"fieldName":1774,"label":1775,"description":1776,"type":322,"subcate_ids":1777,"enum":330},"maxPasswordAge","最大密码使用天数","最大密码使用天数，表示密码策略要求的密码最长有效天数，超过此天数后密码必须修改。该字段值为整数，单位为天。",[],{"fieldName":1779,"label":1780,"description":1781,"type":322,"subcate_ids":1782,"enum":330},"srcTransMacAddress","转换后的源MAC地址","转换后的源MAC地址，指在二层网络传输过程中，经过MAC地址转换（如代理、隧道封装）或受网络攻击（如ARP欺骗）影响后，数据包中呈现的源MAC地址。该字段必须符合标准的MAC地址格式，即六个两位十六进制数，以冒号分隔，格式为：xx:xx:xx:xx:xx:xx，其中x为0-9或a-f。",[],{"fieldName":1784,"label":1785,"description":1786,"type":322,"subcate_ids":1787,"enum":330},"destProcessId","目标进程ID","目标进程ID，指跨进程操作或注入操作中目标进程的PID。其值为进程标识符，通常为非负整数形式的字符串。",[264,412],{"fieldName":1789,"label":1790,"description":1791,"type":322,"subcate_ids":1792,"enum":330},"pluginPath","插件路径","插件路径字段表示应用程序插件模块的安装路径，其值为一个字符串，通常是一个操作系统文件系统的绝对路径。格式上，它应符合操作系统文件路径的规范，例如在Unix/Linux系统中以正斜杠（/）开头，在Windows系统中可能包含盘符和反斜杠（\\）。",[344],{"fieldName":1794,"label":1795,"description":1796,"type":322,"subcate_ids":1797,"enum":330},"sm3","文件SM3哈希值","文件SM3哈希值，使用SM3算法计算的文件内容密码学哈希值。该值为固定长度的十六进制字符串，长度为64个字符，由数字0-9和小写字母a-f组成。",[324,325,326,327,213,328,329],{"fieldName":1799,"label":1800,"description":1801,"type":470,"subcate_ids":1802,"enum":1803},"phishingType","钓鱼类型","该字段表示网络钓鱼攻击的具体传播渠道分类，必须从预定义的枚举值中选择。可选值包括：emailPhishing (邮件钓鱼)、smsPhishing (短信钓鱼)、instantMessagingPhishing (即时通讯钓鱼)、socialMediaPhishing (社交媒体钓鱼)、qrCodePhishing (二维码钓鱼)等选项。",[379],{"smsPhishing":1804,"maliciousAdPhishing":1807,"multiChannelPhishing":1810,"forumBlogPhishing":1813,"instantMessagingPhishing":1816,"qrCodePhishing":1819,"voicePhishing":1822,"emailPhishing":1825,"socialMediaPhishing":1828,"websiteSpoofing":1831,"wifiPhishing":1834},{"description":1805,"label":1806},"通过手机短信发送虚假中奖、退税等信息，诱骗用户点击恶意链接","短信钓鱼",{"description":1808,"label":1809},"在搜索引擎、中小网站或网页中投放恶意广告，用户点击后触发恶意代码或跳转至钓鱼网站","恶意广告钓鱼",{"description":1811,"label":1812},"攻击始于电子邮件等渠道，随后扩展到短信、即时通讯、社交媒体等多种渠道协同进行的钓鱼攻击","多渠道钓鱼",{"description":1814,"label":1815},"通过在论坛、博客、SNS网站中批量发布钓鱼网站链接进行传播","论坛博客钓鱼",{"description":1817,"label":1818},"通过QQ、MSN、阿里旺旺等客户端聊天工具或Slack等云协作工具发送钓鱼链接","即时通讯钓鱼",{"description":1820,"label":1821},"通过伪装成优惠、返利等内容的二维码，诱骗用户扫描后访问钓鱼网站","二维码钓鱼",{"description":1823,"label":1824},"通过语音电话进行网络钓鱼攻击","语音钓鱼",{"description":1826,"label":1827},"通过垃圾邮件、钓鱼邮件与鱼叉式钓鱼邮件传播恶意链接或附件","邮件钓鱼",{"description":1829,"label":1830},"通过微博、Twitter、Facebook、Instagram等社交平台及广告功能散布钓鱼链接","社交媒体钓鱼",{"description":1832,"label":1833},"通过误植域名（Typosquatting）或完全仿冒知名网站，诱使用户在虚假网站上输入敏感信息","网站仿冒",{"description":1835,"label":1836},"架设与公共WiFi热点同名的虚假网络，窃取接入用户的个人资料","WiFi钓鱼",{"fieldName":1838,"label":1839,"description":1840,"type":322,"subcate_ids":1841,"enum":330},"algorithm","加密算法","该字段表示用于数据加密的安全算法类型，通常采用标准算法名称标识，如AES-256等。",[328],{"fieldName":1843,"label":1844,"description":1845,"type":322,"subcate_ids":1846,"enum":330},"departmentHeadName","部门负责人名称","该字段表示部门负责人的姓名。",[352,353,344,345,354,346,355,356,357,358,359,360,361,362,363,364,365,366,367,368,369,370,371,372,373],{"fieldName":1848,"label":1849,"description":1850,"type":322,"subcate_ids":1851,"enum":330},"imageName","镜像名称","镜像名称，指容器运行时使用的完整镜像标识，需包含仓库地址、镜像名称及标签三部分。格式要求为字符串，通常遵循`[仓库地址/]镜像名:标签`的规范。",[363],{"fieldName":1853,"label":1854,"description":1855,"type":322,"subcate_ids":1856,"enum":330},"assetGeoProvince","资产所处省份","资产当前所在的省份名称，应遵循国家行政区划标准命名。",[352,353,344,345,354,346,355,356,357,358,359,360,361,362,363,364,365,366,367,368,369,370,371,372,373],{"fieldName":1858,"label":1859,"description":1860,"type":335,"subcate_ids":1861,"enum":330},"signed","是否签名","标识目标对象是否包含有效的数字签名证书。该字段为布尔类型，取值为 true 或 false，表示“是”或“否”。",[237,412],{"fieldName":1863,"label":1864,"description":1865,"type":322,"subcate_ids":1866,"enum":330},"systemIncludeDevList","设备清单","设备资产清单，包含设备类型、型号、序列号等唯一标识信息，用于资产跟踪、库存管理和安全审计。应包含设备品牌、型号、序列号等关键信息，多个设备信息可使用逗号或分号分隔。",[358],{"fieldName":1868,"label":1869,"description":1870,"type":322,"subcate_ids":1871,"enum":330},"parentCommandLine","父进程命令行","父进程启动时传入的完整命令行字符串。",[223,247,253,324,411,325,326,327,213,328,329,412],{"fieldName":1873,"label":1874,"description":1875,"type":322,"subcate_ids":1876,"enum":330},"columnType","列类型","列类型表示数据库列的数据类型分类，例如数值型、字符型、日期型等。",[345],{"fieldName":1878,"label":1879,"description":1880,"type":322,"subcate_ids":1881,"enum":330},"lockoutThreshold","锁定阈值","锁定阈值表示账号被锁定前允许的无效登录尝试次数。格式为字符串类型，应使用整数表示。取值应为大于或等于0的整数，其中0通常表示不启用锁定功能。",[],{"fieldName":1883,"label":1884,"description":1885,"type":513,"subcate_ids":1886,"enum":330},"minPasswordLength","最小密码长度","最小密码长度，表示密码策略要求的最小密码字符数，非负整数。",[],{"fieldName":1888,"label":1889,"description":1890,"type":322,"subcate_ids":1891,"enum":330},"validTime","有效时间","有效时间表示证书的有效期时间范围，格式为yyyy-mm-dd至yyyy-mm-dd，其中起始日期和结束日期均需符合标准日期格式，且结束日期必须晚于起始日期。",[368],{"fieldName":1893,"label":1894,"description":1895,"type":470,"subcate_ids":1896,"enum":1897},"assetIntegrity","完整性","完整性等级，表示资产未经授权篡改的潜在影响程度。",[352,353,344,345,354,346,355,356,357,358,359,360,361,362,363,364,365,366,367,368,369,370,371,372,373],{"high":1898,"low":1899,"veryHigh":1900,"medium":1901,"ignorable":1902},{"description":532,"label":532},{"description":534,"label":534},{"description":536,"label":536},{"description":538,"label":538},{"description":540,"label":540},{"fieldName":1904,"label":1905,"description":1906,"type":322,"subcate_ids":1907,"enum":330},"commandLine","进程命令行","进程命令行是启动进程时传入的完整命令行字符串，用于记录执行进程的具体命令和参数。",[223,237,242,247,253,264,274,324,411,325,326,327,213,328,329,412],{"fieldName":1909,"label":1910,"description":1911,"type":322,"subcate_ids":1912,"enum":330},"status","状态","标识操作、请求或系统组件的当前执行状态。该字段为字符串类型，通常用于表示事务或流程的结果。",[195,289,352,363],{"fieldName":1914,"label":1915,"description":1916,"type":1917,"subcate_ids":1918,"enum":330},"pktsIn","流进数据包数","该字段统计网络接口或会话在入方向接收到的数据包总数。其值为非负长整型数字，表示数据包的绝对数量。","long",[121,33,429],{"fieldName":1920,"label":1921,"description":1922,"type":322,"subcate_ids":1923,"enum":330},"supervisoryUnitName","所属监管单位","该字段表示对资产具有监管权限的单位名称。",[352,353,344,345,354,346,355,356,357,358,359,360,361,362,363,364,365,366,367,368,369,370,371,372,373],{"fieldName":1925,"label":1926,"description":1927,"type":322,"subcate_ids":1928,"enum":330},"assetGeoProvinceCode","资产所处省代码","资产所在省份的行政区划代码，采用国家标准的行政区划代码格式。",[352,353,344,345,354,346,355,356,357,358,359,360,361,362,363,364,365,366,367,368,369,370,371,372,373],{"fieldName":1930,"label":1931,"description":1932,"type":322,"subcate_ids":1933,"enum":330},"orgId","组织架构","该字段表示资产所属的组织架构标识，格式为字符串类型，通常由系统自动生成或分配，用于唯一标识组织架构。",[352,353,344,345,354,346,355,356,357,358,359,360,361,362,363,364,365,366,367,368,369,370,371,372,373],{"fieldName":1935,"label":1936,"description":1937,"type":322,"subcate_ids":1938,"enum":330},"processId","进程ID","进程ID是操作系统分配给进程的唯一数字标识符，用于在操作系统中唯一标识一个正在运行的进程。该字段为字符串类型，通常由数字组成，长度和具体值取决于操作系统和进程状态。",[47,223,229,237,242,247,253,259,264,274,324,411,325,326,327,213,328,329,412,365],{"fieldName":1940,"label":1941,"description":1942,"type":322,"subcate_ids":1943,"enum":330},"vpcId","虚拟私有云ID","虚拟私有云(VPC)的唯一标识符，由云服务商分配。",[372],{"fieldName":1945,"label":1946,"description":1947,"type":322,"subcate_ids":1948,"enum":330},"appletId","小程序ID","小程序ID是用于唯一标识一个小程序的字符串标识符。",[356],{"fieldName":1950,"label":1951,"description":1952,"type":322,"subcate_ids":1953,"enum":330},"smbClientVersion","SMB客户端版本","该字段表示客户端使用的SMB协议版本标识。其值为字符串类型，通常由客户端在建立SMB会话时协商或声明，用于标识其支持的SMB协议版本。",[76,195],{"fieldName":1955,"label":1956,"description":1957,"type":322,"subcate_ids":1958,"enum":330},"affectAssetIp","受影响资产IP","受影响资产IP地址，指在安全事件中遭受攻击或面临风险的资产所对应的IP地址。该字段为字符串类型，必须符合标准的IPv4或IPv6地址格式。",[84,418,430,384],{"fieldName":1960,"label":1961,"description":1962,"type":322,"subcate_ids":1963,"enum":330},"product","产品名称","该字段表示与进程或文件相关联的软件或应用程序的产品名称。格式为字符串，通常包含软件供应商和产品名称，支持包含注册商标符号（如®）等特殊字符。",[237],{"fieldName":1965,"label":1966,"description":1967,"type":470,"subcate_ids":1968,"enum":1969},"assetConfidentiality","机密性","该字段表示资产的机密性等级，用于评估未经授权披露信息可能造成的潜在影响程度。",[352,353,344,345,354,346,355,356,357,358,359,360,361,362,363,364,365,366,367,368,369,370,371,372,373],{"high":1970,"low":1971,"veryHigh":1972,"medium":1973,"ignorable":1974},{"description":532,"label":532},{"description":534,"label":534},{"description":536,"label":536},{"description":538,"label":538},{"description":540,"label":540},{"fieldName":1976,"label":1977,"description":1978,"type":322,"subcate_ids":1979,"enum":330},"srcTransAddress","转换后源IP地址","转换后源IP地址是指经过网络地址转换（NAT）、代理服务器或VPN隧道封装处理后，数据包在网络层呈现的源IP地址。该字段必须符合IP地址格式规范，即点分十进制表示的IPv4地址（例如：192.168.1.1）或符合RFC标准的IPv6地址。",[38,47,54,68,121,128,150,185],{"fieldName":1981,"label":1982,"description":1983,"type":322,"subcate_ids":1984,"enum":330},"dbVersion","数据库版本","数据库管理系统(DBMS)的版本号，通常由主版本号、次版本号等数字和点号组成，格式因具体数据库产品而异，如“15.1”、“5.7.38”。",[344],{"fieldName":1986,"label":1987,"description":1988,"type":322,"subcate_ids":1989,"enum":330},"suggestion","处置建议","该字段用于提供针对威胁攻击的标准化响应和修复建议指导，其内容为字符串文本。建议内容应清晰、专业、具有可操作性，用于指导安全人员或系统进行后续处置。",[324,63,33,295,411,379,380,381,382,325,326,383,327,213,328,329,400,412,429,342,343,84,418,430,384],{"fieldName":1991,"label":1992,"description":1993,"type":322,"subcate_ids":1994,"enum":330},"regNewName","注册表新键名","注册表操作事件中修改后的注册表键名，为字符串类型。该字段应遵循操作系统的注册表键名命名规范，通常可包含字母、数字、下划线、连字符、点以及反斜杠路径分隔符。",[259,412],{"fieldName":1996,"label":1997,"description":1998,"type":322,"subcate_ids":1999,"enum":330},"updateTime","更新时间","数据信息最后更新的时间戳，采用标准时间格式，格式要求为：yyyy-mm-dd HH:mm:ss。",[352,353,344,345,354,346,355,356,357,358,359,360,361,362,363,364,365,366,367,368,369,370,371,372,373],{"fieldName":2001,"label":2002,"description":2003,"type":322,"subcate_ids":2004,"enum":330},"osName","操作系统","该字段表示目标设备或系统所使用的操作系统具体发行版名称和版本标识信息。格式为字符串，通常包含操作系统名称和版本号。",[84,418,430,384,360,361,362,364,372],{"fieldName":2006,"label":2007,"description":2008,"type":322,"subcate_ids":2009,"enum":330},"storageInfo","存储信息","存储设备配置、容量和状态信息的文本描述。内容应包含设备类型、总容量、已用容量、剩余容量及文件系统等关键信息。",[364,373],{"fieldName":2011,"label":2012,"description":2013,"type":322,"subcate_ids":2014,"enum":330},"url","URL地址","URL地址用于记录统一资源定位符(URL)的完整地址信息。该字段为字符串类型，需符合标准的URL格式规范，通常包含协议（如http、https）、主机名、路径及可选的查询参数和片段标识符等组成部分。",[359],{"fieldName":2016,"label":2017,"description":2018,"type":322,"subcate_ids":2019,"enum":330},"passwordHistoryLength","密码历史记录大小","该字段指定密码策略中保存的历史密码数量，用于防止用户重复使用旧密码。取值应为非负整数，表示系统保留的最近密码记录条数。",[],{"fieldName":2021,"label":2022,"description":2023,"type":322,"subcate_ids":2024,"enum":330},"destGeoLatitude","目的纬度","目的纬度表示网络连接接收方IP地址所对应的地理纬度坐标。该值为字符串类型，通常以十进制小数形式表示，取值范围为-90.000000到90.000000。",[38,54,68,76,89,94,99,104,110,116,121,128,133,138,143,150,160,165,170,175,180,185,190,195,202,207,223,247,300,305,310,315,324,63,33,295,411,379,380,381,382,325,326,383,327,213,328,329,400,412,429,342,343],{"fieldName":2026,"label":2027,"description":2028,"type":322,"subcate_ids":2029,"enum":330},"maintainStartTime","维保开始时间","维保开始时间是指资产维护保养的开始时间，采用标准的日期时间格式，格式要求为yyyy-mm-dd HH:mm:ss。",[360,361,362],{"fieldName":2031,"label":2032,"description":2033,"type":322,"subcate_ids":2034,"enum":330},"responseContentType","响应内容类型","响应内容类型标识网络请求响应头中的内容类型，用于描述返回数据的媒体类型格式和字符编码。格式应符合HTTP标准的内容类型规范，通常由主类型和子类型组成，可选参数包括字符编码等，例如\"application/json; charset=utf-8\"。取值应为有效的MIME类型字符串。",[38,76,150,63,379,380,381,382,383,342,343,384],{"fieldName":2036,"label":2037,"description":2038,"type":322,"subcate_ids":2039,"enum":330},"deviceModel","设备型号","设备型号用于标识设备制造商定义的产品型号代码，精确区分不同硬件规格、功能和配置。其值为字符串，通常由字母、数字及特定符号（如连字符、下划线）组成。",[360,361,362],{"fieldName":2041,"label":2042,"description":2043,"type":322,"subcate_ids":2044,"enum":330},"hostAddress","主机IP","主机IP地址，用于标识主机在网络中的位置。必须符合IPv4或IPv6地址格式规范。IPv4地址为点分十进制格式，由四个0-255的十进制数组成，以点分隔。IPv6地址为冒号分隔的十六进制数格式。",[47,218,223,229,237,242,247,253,259,264,269,274,279,284,289,324,63,411,380,325,326,327,213,328,329,412,342,360,361,362,363,365,366,367,371],{"fieldName":2046,"label":2047,"description":2048,"type":322,"subcate_ids":2049,"enum":330},"md5","文件MD5","文件MD5值，表示使用MD5算法计算的文件内容哈希值。该值必须为32位十六进制字符串，不区分大小写，用于唯一标识文件内容。",[76,229,237,300,324,411,325,326,327,213,328,329,412,342,343],{"fieldName":2051,"label":2052,"description":2053,"type":322,"subcate_ids":2054,"enum":330},"columnName","列名","列名是数据库表中数据列的逻辑名称，用于标识具体的数据字段。",[345],{"fieldName":2056,"label":2057,"description":2058,"type":322,"subcate_ids":2059,"enum":330},"parentProcessName","父进程名称","该字段表示创建当前进程的父进程的可执行文件名称。此字段但应避免包含路径信息，仅保留纯名称。",[223,229,237,242,247,253,264,274,324,411,325,326,327,213,328,329,412],{"fieldName":2061,"label":2062,"description":2063,"type":322,"subcate_ids":2064,"enum":330},"subnetId","子网ID","子网ID是云服务商分配的子网唯一标识符，用于标识特定的子网资源。",[372],{"fieldName":2066,"label":2067,"description":2068,"type":322,"subcate_ids":2069,"enum":330},"commonName","通用名称","该字段表示证书主题中的通用名称(CN)，通常为证书绑定的完全限定域名，其值应为符合DNS命名规范的字符串。",[368],{"fieldName":2071,"label":2072,"description":2073,"type":322,"subcate_ids":2074,"enum":330},"vulDescription","漏洞描述","漏洞的技术特性和潜在风险描述。该字段内容为文本字符串，应清晰、准确地阐述漏洞的成因、技术细节、可能被利用的方式以及可能造成的安全影响。",[411,381,84,418,384],{"fieldName":2076,"label":2077,"description":2078,"type":322,"subcate_ids":2079,"enum":330},"parentProcessGuid","父进程GUID","父进程实例的全局唯一标识符，用于唯一标识操作系统中的父进程实例。该字段为字符串类型，通常采用标准的GUID格式，由32位十六进制数字组成，并以连字符分隔为5组。",[223,229,237,242,247,253,264,274,324,411,325,326,327,213,328,329,412],{"fieldName":2081,"label":2082,"description":2083,"type":322,"subcate_ids":2084,"enum":330},"srcHostName","来源主机名","该字段表示网络连接或威胁攻击中发起方的主机名。主机名可以是NetBIOS名称、DNS主机名或本地配置的机器名。格式为字符串，通常遵循主机名的通用命名规范。",[47,104],{"fieldName":2086,"label":2087,"description":2088,"type":322,"subcate_ids":2089,"enum":330},"dvcAction","设备处置动作","设备处置动作字段记录安全设备对检测到的威胁或异常行为采取的自动处置动作，例如阻断、放行、隔离或告警，取值应为描述处置动作的字符串。",[324,63,33,295,411,379,380,381,382,325,326,383,327,213,328,329,400,412,429,342,343],{"fieldName":2091,"label":2092,"description":2093,"type":470,"subcate_ids":2094,"enum":2095},"exfiltrationChannel","泄露渠道","该字段标识数据泄露事件中数据被传输到外部的具体渠道。其值必须为预定义的枚举字符串，可选值包括但不限于：removableMedia（可移动介质）、networkProtocols（网络协议传输）、emailSystems（邮件系统）、messagingApps（即时通讯应用）、cloudServices（云服务）等。",[342],{"cloudServices":2096,"databaseTools":2099,"networkProtocols":2102,"physicalCapture":2105,"other":2108,"messagingApps":2110,"applicationApis":2113,"webInterfaces":2116,"removableMedia":2119,"emailSystems":2122,"remoteConnections":2125},{"description":2097,"label":2098},"通过网盘、云存储等云服务上传和分享数据","云服务",{"description":2100,"label":2101},"通过数据库管理工具导出大量结构化数据","数据库工具",{"description":2103,"label":2104},"通过网络共享、FTP、SMB等协议传输数据","网络协议传输",{"description":2106,"label":2107},"通过打印、截图、剪切板、拍照等物理方式捕获数据","物理捕获",{"description":2109,"label":448},"其他类型的泄露方式",{"description":2111,"label":2112},"通过微信、QQ、Telegram等即时通讯应用发送数据","即时通讯应用",{"description":2114,"label":2115},"通过应用程序API接口批量获取和传输数据","应用API",{"description":2117,"label":2118},"通过HTTPS网页表单、在线服务等Web界面传输数据","Web界面",{"description":2120,"label":2121},"通过USB设备、移动硬盘、光盘等可移动介质拷贝数据","可移动介质",{"description":2123,"label":2124},"通过网页邮箱、邮件客户端等电子邮件系统发送数据","邮件系统",{"description":2126,"label":2127},"通过远程控制软件、VPN、蓝牙等远程连接传输数据","远程连接",{"fieldName":2129,"label":2130,"description":2131,"type":322,"subcate_ids":2132,"enum":330},"ntlmsspDomain","NTLMSSP域名","该字段表示NTLM安全支持程序（NTLMSSP）协议中用于身份验证的域名。值为字符串类型，通常为NetBIOS名称或DNS域名，需符合操作系统及域环境的命名规范。",[195],{"fieldName":2134,"label":2135,"description":2136,"type":322,"subcate_ids":2137,"enum":330},"parentProcessStartTime","父进程启动时间","父进程实例的创建时刻的精确时间，格式为 yyyy-mm-dd HH:mm:ss。",[223,229,237,242,247,253,264,274,324,411,325,326,327,213,328,329,412],{"fieldName":2139,"label":2140,"description":2141,"type":322,"subcate_ids":2142,"enum":330},"requestOs","请求操作系统","标识网络请求中客户端使用的操作系统类型和版本信息。字段值为字符串类型，应包含操作系统名称及版本号，如“Windows 10”、“Mac OS X 10.13”、“Android 12”等。",[76,195],{"fieldName":2144,"label":2145,"description":2146,"type":322,"subcate_ids":2147,"enum":330},"processGuid","进程GUID","进程实例的全局唯一标识符，通常采用UUID格式，符合标准的UUID v4格式规范，即32位十六进制数字，以连字符分隔为5组。",[223,229,237,242,247,253,259,264,274,324,411,325,326,327,213,328,329,412],{"fieldName":2149,"label":2150,"description":2151,"type":322,"subcate_ids":2152,"enum":330},"processName","进程名称","进程可执行文件的基本名称，不包含路径信息。",[223,229,237,242,247,253,259,264,274,324,411,326,327,213,328,329,412,342],{"fieldName":2154,"label":2155,"description":2156,"type":322,"subcate_ids":2157,"enum":330},"parentImage","父进程路径","该字段表示父进程可执行文件在文件系统中的完整路径。其值应为符合操作系统规范的字符串格式，通常为绝对路径，例如以斜杠（/）开头的Unix/Linux路径或以盘符（如C:\\）开头的Windows路径。路径中不应包含非法字符，且长度应在系统允许的范围内。示例：/usr/bin/bash 或 C:\\Windows\\System32\\cmd.exe。",[223,229,237,242,247,253,264,274,324,411,325,326,327,213,328,329,412],{"fieldName":2159,"label":2160,"description":2161,"type":322,"subcate_ids":2162,"enum":330},"closeReason","关闭原因","该字段用于记录安全事件关闭的具体原因和解决状态。值为字符串类型，应简洁明了地描述关闭事件的原因。",[551],{"fieldName":2164,"label":2165,"description":2166,"type":322,"subcate_ids":2167,"enum":330},"fileVersion","文件版本","文件版本号，通常用于标识软件的更新或补丁版本。格式通常为由点分隔的数字序列，例如“主版本号.次版本号.修订号.构建号”。",[237],{"fieldName":2169,"label":585,"description":2170,"type":322,"subcate_ids":2171,"enum":330},"responseMsg","响应体记录网络请求、系统处理请求、回复请求或发起操作行为后返回的消息内容。",[68,94,116,128,190,63],{"fieldName":2173,"label":2174,"description":2175,"type":470,"subcate_ids":2176,"enum":2177},"incidentLevel","事件级别","安全事件的严重程度等级，用于评估事件的影响范围和紧急程度。取值范围为枚举类型，可选值包括：Critical（严重）、High（高）、Medium（中）、Low（低），需严格使用给定的枚举值。",[551],{"High":2178,"Low":2180,"Medium":2182,"Critical":2184},{"description":2179,"label":532},"对业务运营有显著影响的安全事件，需要优先处理",{"description":2181,"label":534},"影响较小的安全事件，可按照常规流程处理",{"description":2183,"label":538},"对业务有一定影响的安全事件，需要按计划处理",{"description":2185,"label":902},"造成重大业务影响的安全事件，需要立即响应",{"fieldName":2187,"label":2188,"description":2189,"type":470,"subcate_ids":2190,"enum":2191},"icmpType","ICMP类型","该字段表示ICMP协议报文类型代码，用于标识ICMP消息的具体类型。其值必须为预定义的枚举字符串，常见的可选值包括：EchoReply (回显应答)、DestinationUnreachable (目的不可达)、SourceQuench (源站抑制)、Redirect (重定向)、EchoRequest (回显请求)等。",[],{"AddressMaskReply":2192,"SourceQuench":2194,"ParameterProblem":2197,"TimeExceeded":2199,"EchoRequest":2201,"InformationRequest":2204,"InformationReply":2206,"RouterSolicitation":2208,"Redirect":2210,"Timestamp":2213,"EchoReply":2215,"DestinationUnreachable":2218,"AddressMaskRequest":2220,"TimestampReply":2222,"RouterAdvertisement":2224,"Other":2226},{"description":2193,"label":2193},"地址掩码应答",{"description":2195,"label":2196},"源站抑制（拥塞控制）","源站抑制",{"description":2198,"label":2198},"参数问题",{"description":2200,"label":2200},"超时",{"description":2202,"label":2203},"回显请求（Ping请求）","回显请求",{"description":2205,"label":2205},"信息请求",{"description":2207,"label":2207},"信息应答",{"description":2209,"label":2209},"路由器请求",{"description":2211,"label":2212},"路由重定向","重定向",{"description":2214,"label":2214},"时间戳",{"description":2216,"label":2217},"回显应答（Ping应答）","回显应答",{"description":2219,"label":2219},"目的不可达",{"description":2221,"label":2221},"地址掩码请求",{"description":2223,"label":2223},"时间戳应答",{"description":2225,"label":2225},"路由器通告",{"description":2227,"label":448},"其他未知的ICMP类型",{"fieldName":2229,"label":2230,"description":2231,"type":322,"subcate_ids":2232,"enum":330},"netId","安全域","资产所属安全域的唯一标识，主要用于解决安全域冲突。",[352,353,344,345,354,346,355,356,357,358,359,360,361,362,363,364,365,366,367,368,369,370,371,372,373],{"fieldName":2234,"label":2235,"description":2236,"type":322,"subcate_ids":2237,"enum":330},"processMd5","进程MD5","进程可执行文件的MD5哈希值，用于唯一标识和校验文件。该值为32个字符的十六进制字符串，由数字0-9和小写字母a-f组成，格式必须符合标准的MD5摘要算法输出格式。",[223,229,237,242,247,253,259,264,274,324,411,325,326,327,213,328,329,412],{"fieldName":2239,"label":2240,"description":2241,"type":1673,"subcate_ids":2242,"enum":330},"alertTypes","告警类型列表","记录安全事件关联的所有告警分类类型集合。字段值为字符串数组，每个数组元素为一个告警分类类型字符串。",[551],{"fieldName":2244,"label":2245,"description":2246,"type":322,"subcate_ids":2247,"enum":330},"assetSource","资产来源","资产来源，表示资产的获取途径，例如发现资产的设备IP地址或手工录入的操作人员名称。",[352,353,344,345,354,346,355,356,357,358,359,360,361,362,363,364,365,366,367,368,369,370,371,372,373],{"fieldName":2249,"label":2250,"description":2251,"type":322,"subcate_ids":2252,"enum":330},"assetDescription","资产描述","资产描述是对资产的详细说明，包括但不限于资产类型、主要用途、所属部门、使用人及其他相关信息。此字段为字符串类型，内容应简明扼要，准确反映资产特征和状态。",[352,353,344,345,354,346,355,356,357,358,359,360,361,362,363,364,365,366,367,368,369,370,371,372,373],{"fieldName":2254,"label":2255,"description":2256,"type":322,"subcate_ids":2257,"enum":330},"subnetMask","子网掩码","子网掩码用于在IP地址中划分网络部分和主机部分。该字段为字符串类型，其值必须是有效的点分十进制格式的IPv4子网掩码，由四段0-255之间的十进制数组成，中间用点号分隔。",[370],{"fieldName":2259,"label":2260,"description":2261,"type":470,"subcate_ids":2262,"enum":2263},"tiSubcategory","威胁情报子分类","该字段表示威胁情报IOC的情报子分类，用于标识具体的威胁类型或归属类别。格式为字符串枚举类型，必须从预定义的可选值中选择，例如：/WhiteList/Others 表示白名单，/C2/Sinkhole 表示安全机构接管的C2服务器，/C2/Trojan 表示木马类恶意文件回连，/C2/Virus 表示病毒类恶意文件回连，/C2/Worm 表示蠕虫类恶意文件回连。所有可选值均采用分层路径格式进行组织。",[324,325,326,327,213,328,329],{"/Spam/Others":2264,"/Info/IDC":2267,"/Info/DNS":2270,"/PUA/ADHost":2273,"/Phishing/Others":2276,"/Info/DDNS":2279,"/Spam/Email":2282,"/Info/Bogon":2285,"/Malware/Miner":2288,"/Info/Proxy":2291,"/Info/CDN":2294,"/Others/Others":2297,"/Exploit/WebExploit":2300,"/C2/PasswordSteal":2303,"/Info/BTTracker":2306,"/PUA/Porn":2309,"/C2/Trojan":2312,"/Malware/Others":2315,"/Info/Others":2318,"/C2/Rootkit":2321,"/BruteForce/HTTP":2324,"/Spider/Others":2327,"/Scanner/Others":2330,"/Info/VPN":2333,"/PUA/HackTool":2336,"/WhiteList/Others":2339,"/C2/Sinkhole":2342,"/Suspicious/DGA":2345,"/Compromised/Others":2348,"/BruteForce/Credenti":2351,"/C2/Spyware":2354,"/BruteForce/Others":2357,"/C2/Backdoor":2360,"/PUA/MonitoringTool":2363,"/C2/Worm":2366,"/Suspicious/Others":2369,"/Exploit/Others":2372,"/Info/Tor":2375,"/C2/DDoS":2378,"/C2/Ransomware":2381,"/Spam/Message":2384,"/C2/Virus":2387,"/Exploit/HostExploit":2390,"/BruteForce/Services":2393,"/Info/SEC":2396,"/Info/EDU":2399,"/C2/Others":2402,"/Info/DynamicIP":2405,"/PUA/Gambling":2408,"/PUA/Others":2411,"/C2/KeyLogger":2414},{"description":2265,"label":2266},"其他类型的垃圾信息和骚扰内容源","其他垃圾信息",{"description":2268,"label":2269},"互联网数据中心服务器和托管服务","IDC服务器",{"description":2271,"label":2272},"域名系统服务器和解析服务","DNS服务器",{"description":2274,"label":2275},"广告软件和相关跟踪服务的网络地址","广告软件地址",{"description":2277,"label":2278},"网络钓鱼攻击和欺诈网站地址","钓鱼地址",{"description":2280,"label":2281},"动态域名解析服务地址","动态域名",{"description":2283,"label":2284},"垃圾邮件发送源和相关基础设施","垃圾邮件",{"description":2286,"label":2287},"未分配和保留的IP地址空间","保留地址",{"description":2289,"label":2290},"加密货币挖矿恶意软件的矿池连接通信","矿池回连",{"description":2292,"label":2293},"代理服务器和匿名访问服务","代理地址",{"description":2295,"label":2296},"内容分发网络服务器和边缘节点","CDN服务器",{"description":2298,"label":2299},"未分类和其他类型的威胁情报","其他类未知情报",{"description":2301,"label":2302},"针对Web应用程序漏洞的攻击利用活动","Web漏洞利用",{"description":2304,"label":2305},"密码窃取恶意软件的命令与控制通信，用于凭证收集","密码窃取类恶意文件回连",{"description":2307,"label":2308},"BitTorrent跟踪器和P2P文件共享服务","BT服务器",{"description":2310,"label":2311},"成人内容和可能包含恶意软件的网络地址","色情网站",{"description":2313,"label":2314},"木马类恶意软件的命令与控制通信，用于远程控制受感染系统","木马类恶意文件回连",{"description":2316,"label":2317},"其他类型的恶意软件域名连接活动","其他恶意域名回连",{"description":2319,"label":2320},"其他信息类威胁情报标识","其他类信息情报",{"description":2322,"label":2323},"Rootkit的命令与控制通信，用于隐藏恶意活动","Rootkit类恶意文件回连",{"description":2325,"label":2326},"针对Web应用的HTTP协议暴力破解攻击","HTTP暴力破解",{"description":2328,"label":2329},"网络爬虫和自动化内容采集活动","爬虫地址",{"description":2331,"label":2332},"网络扫描和侦察活动源地址","扫描地址",{"description":2334,"label":2335},"虚拟专用网络服务和出口节点","VPN地址",{"description":2337,"label":2338},"黑客工具和攻击框架相关的网络连接","黑客攻击回连",{"description":2340,"label":2341},"可信实体和资源的白名单标识，用于减少误报","白名单",{"description":2343,"label":2344},"被安全机构接管的命令与控制服务器，用于威胁研究和监测","安全机构接管C2",{"description":2346,"label":2347},"域名生成算法（DGA）生成的恶意域名","DGA地址",{"description":2349,"label":2350},"被入侵并控制的傀儡主机和僵尸节点","傀儡机",{"description":2352,"label":2353},"使用泄露凭证进行撞库攻击的源地址","撞库攻击",{"description":2355,"label":2356},"间谍软件的命令与控制通信，用于情报收集和监视","间谍软件类恶意文件回连",{"description":2358,"label":2359},"其他类型的暴力破解和凭证填充攻击","其他暴力破解",{"description":2361,"label":2362},"后门程序的命令与控制通信，提供未授权系统访问","后门类恶意文件回连",{"description":2364,"label":2365},"监控和监视软件的网络通信活动","监控工具回连",{"description":2367,"label":2368},"网络蠕虫的命令与控制通信，通过网络传播感染","蠕虫类恶意文件回连",{"description":2370,"label":2371},"其他可疑和潜在恶意的网络地址","其他可疑地址",{"description":2373,"label":2374},"其他类型的漏洞利用和攻击活动","其他类漏洞利用",{"description":2376,"label":2377},"Tor匿名网络节点和出口中继","Tor网络地址",{"description":2379,"label":2380},"DDoS僵尸网络的命令与控制通信，用于分布式拒绝服务攻击","DDoS类恶意文件回连",{"description":2382,"label":2383},"勒索软件的命令与控制通信，用于数据加密和勒索支付","勒索软件类恶意文件回连",{"description":2385,"label":2386},"即时消息和社交媒体垃圾信息源","垃圾信息",{"description":2388,"label":2389},"计算机病毒的命令与控制通信，具有自我复制能力","病毒类恶意文件回连",{"description":2391,"label":2392},"针对操作系统和主机软件漏洞的攻击利用","主机漏洞利用",{"description":2394,"label":2395},"针对网络服务的暴力破解攻击源","服务暴力破解",{"description":2397,"label":2398},"搜索引擎爬虫和索引服务地址","搜索引擎爬虫地址",{"description":2400,"label":2401},"教育机构和学术网络地址","教育网",{"description":2403,"label":2404},"其他类型的命令与控制服务器通信","其他C2回连",{"description":2406,"label":2407},"动态分配的IP地址范围","动态IP",{"description":2409,"label":2410},"在线赌博和相关欺诈活动的网络地址","博彩网站",{"description":2412,"label":2413},"其他可能不需要的应用程序网络连接","其他类不受欢迎地址回连",{"description":2415,"label":2416},"键盘记录器的命令与控制通信，用于捕获用户输入","键盘记录类恶意文件回连",{"fieldName":2418,"label":2419,"description":2420,"type":322,"subcate_ids":2421,"enum":330},"softwareName","软件名称","该字段用于标识在系统或设备上安装的软件产品的官方名称。",[84,418,430,355,365,371],{"fieldName":2423,"label":2424,"description":2425,"type":513,"subcate_ids":2426,"enum":330},"synCount","SYN包数量","该字段统计TCP三次握手过程中发送的同步(SYN)数据包数量。其值为非负整数，表示特定时间窗口或连接中观察到的SYN包总数。",[33],{"fieldName":2428,"label":2429,"description":2430,"type":1673,"subcate_ids":2431,"enum":330},"installedComponents","已安装组件","已安装组件清单，描述软件产品中已安装的功能组件、插件和依赖模块的完整信息。每个数组元素应为字符串类型，建议包含组件名称和版本号等关键标识信息。",[365],{"fieldName":2433,"label":2434,"description":2435,"type":322,"subcate_ids":2436,"enum":330},"gpuModel","GPU型号","图形处理器型号标识，包含厂商、架构和计算能力规格信息。该字段为字符串类型，通常为制造商定义的特定型号名称。",[360,361,362],{"fieldName":2438,"label":2439,"description":2440,"type":322,"subcate_ids":2441,"enum":330},"threatActorOrg","威胁组织名称","该字段用于记录已知恶意组织或威胁行为者团体的名称。",[324,325,326,327,213,328,329],{"fieldName":2443,"label":2444,"description":2445,"type":322,"subcate_ids":2446,"enum":330},"destGeoRegion","目的地区","该字段表示网络连接接收方IP地址所对应的中国省级行政区域名称，用于标识网络流量的地理目的地。其值应为中国省级行政区划的规范名称，例如“浙江省”、“北京市”或“新疆维吾尔自治区”等，不包含“省”、“市”、“自治区”等后缀的简称（如“浙江”、“北京”、“新疆”）也可接受。该字段为字符串类型，无特定字符集或长度限制，但应确保名称的准确性和一致性。",[38,54,68,76,89,94,99,104,110,116,121,128,133,138,143,150,160,165,170,175,180,185,190,195,202,207,223,247,300,305,310,315,324,63,33,295,411,379,380,381,382,325,326,383,327,213,328,329,400,412,429,342,343],{"fieldName":2448,"label":2449,"description":2450,"type":322,"subcate_ids":2451,"enum":330},"wechatId","微信号","微信公众号的唯一标识符，用于确认公众号的唯一性。该字段为字符串类型，格式为英文字母、数字及部分特殊字符的组合，需符合微信官方对公众号ID的定义规则。",[357],{"fieldName":2453,"label":2454,"description":2455,"type":322,"subcate_ids":2456,"enum":330},"podName","Pod名称","Pod名称是Kubernetes集群中Pod资源的唯一标识符。该字段为字符串类型，其命名需遵循Kubernetes命名规范。",[363],{"fieldName":2458,"label":2459,"description":2460,"type":470,"subcate_ids":2461,"enum":2462},"integrityLevel","完整性级别","完整性级别表示Windows安全模型中进程的权限级别，用于标识进程的信任和权限等级。该字段为枚举类型，其取值必须为预定义的字符串常量，可选值包括：Untrusted（不信任）、Low（低级别）、Medium（中级别）、High（高级别）和System（系统级别）。",[253,324,411,325,326,327,213,328,329,412],{"High":2463,"Untrusted":2466,"Low":2469,"Medium":2472,"System":2475},{"description":2464,"label":2465},"提升的管理员权限，需要UAC确认或管理员权限","高级别",{"description":2467,"label":2468},"匿名进程级别，最低权限，通常用于匿名网络访问","不信任",{"description":2470,"label":2471},"受限权限级别，用于保护模式进程如Internet Explorer","低级别",{"description":2473,"label":2474},"标准用户权限级别，大多数用户进程运行在此级别","中级别",{"description":2476,"label":2477},"系统核心权限，Windows服务和内核组件运行级别","系统级别",{"fieldName":2479,"label":2480,"description":2481,"type":335,"subcate_ids":2482,"enum":330},"isInternetAttack","是否互联网攻击","该字段用于标识攻击源是否来自互联网外部网络。字段类型为布尔值，取值为 true 或 false，其中 true 表示攻击源来自互联网，false 表示攻击源非来自互联网。",[551],{"fieldName":2484,"label":2485,"description":2486,"type":335,"subcate_ids":2487,"enum":330},"initiated","是否主动发起","标识网络连接是由本地端点主动发起还是被动接受。格式必须为布尔值，只能取 true 或 false，其中 true 表示连接由本地端点主动发起，false 表示连接由本地端点被动接受。",[247,63,380,412],{"fieldName":2489,"label":2490,"description":2491,"type":322,"subcate_ids":2492,"enum":330},"accountName","账号名","账号名是系统中用户账号的可读标识。格式为字符串，通常由字母、数字及部分特殊字符（如下划线、点号）组成。",[289],{"fieldName":2494,"label":2495,"description":2496,"type":513,"subcate_ids":2497,"enum":330},"peakPackagesRate","峰值数据包速率","峰值数据包速率，记录网络接口或系统在特定时间段内每秒处理的最大数据包数量，单位是包每秒（pps）。该字段为非负整数，用于衡量网络流量的瞬时峰值负载。",[33,429],{"fieldName":2499,"label":2500,"description":2501,"type":322,"subcate_ids":2502,"enum":330},"sql","SQL语句","SQL语句是提交给数据库执行的标准化查询语言，通常用于数据查询、插入、更新或删除操作。格式上，它必须是一个符合SQL语法规范的字符串，可以包含字母、数字、运算符、空格及特定的SQL关键字和符号。",[68,128,342,343],{"fieldName":2504,"label":2505,"description":2506,"type":322,"subcate_ids":2507,"enum":330},"busSystemName","业务系统名称","业务系统的名称标识，用于唯一标识一个业务系统。格式要求：字符串类型，长度限制为1-128个字符，支持中英文、数字、下划线和短横线，且不能以特殊字符开头或结尾。",[358],{"fieldName":2509,"label":2510,"description":2511,"type":470,"subcate_ids":2512,"enum":2513},"signatureStatus","签名状态","该字段表示数字签名验证的结果状态。取值必须为以下枚举值之一：Valid（有效）、Invalid（无效）、Unsigned（未签名）或Unknown（未知）。",[237,412],{"Unsigned":2514,"Unknown":2517,"Valid":2519,"Invalid":2522},{"description":2515,"label":2516},"文件或代码未包含数字签名","未签名",{"description":2518,"label":1553},"签名状态无法确定",{"description":2520,"label":2521},"数字签名验证通过","有效",{"description":2523,"label":2524},"数字签名验证失败","无效",{"fieldName":2526,"label":2527,"description":2528,"type":322,"subcate_ids":2529,"enum":330},"sslCertificate","SSL证书信息","SSL/TLS加密连接中使用的X.509数字证书的主体标识信息，通常包含颁发者、使用者通用名、组织及国家等字段。格式为符合X.509标准的证书主题专有名称（Subject Distinguished Name）字符串，例如“C=US, O=Let's Encrypt, CN=Let's Encrypt Authority X3”。其中常见属性键包括C（国家）、ST（州/省）、L（地区）、O（组织）、OU（组织单位）、CN（通用名称）等。",[359],{"fieldName":2531,"label":2532,"description":2533,"type":322,"subcate_ids":2534,"enum":330},"filePermissions","文件权限","文件或目录的访问权限设置，采用类Unix系统的符号表示法，通常为9位字符，分别代表所有者、所属组和其他用户的读、写、执行权限。常见格式为类似`rw-r--r--`的字符串，其中`r`表示读，`w`表示写，`x`表示执行，`-`表示无对应权限。",[229,412],{"fieldName":2536,"label":2537,"description":2538,"type":322,"subcate_ids":2539,"enum":330},"logPath","日志路径","日志文件在文件系统中的存储路径，用于定位应用程序或系统服务的日志文件。路径格式应符合操作系统的文件路径规范，例如Unix/Linux系统使用正斜杠（/）作为目录分隔符，路径通常以根目录（/）或当前用户目录（~）开始。",[344],{"fieldName":2541,"label":2542,"description":2543,"type":322,"subcate_ids":2544,"enum":330},"assetId","资产ID","资产ID是系统中资产的全局唯一标识符，格式为字符串。",[352,353,344,345,354,346,355,356,357,358,359,360,361,362,363,364,365,366,367,368,369,370,371,372,373],{"fieldName":2546,"label":2547,"description":2548,"type":470,"subcate_ids":2549,"enum":2550},"ruleType","规则类型","规则类型标识安全设备（如防火墙、IDS、IPS、EDR等）产生告警时对应的安全检测规则类型，反映设备内置规则库对特定攻击模式或异常行为的分类。该字段为枚举类型，其值是一个表示威胁类别的层级路径字符串，格式通常为“/一级分类/二级分类”。",[324,63,33,295,411,379,380,381,382,325,326,383,327,213,328,329,400,412,429,342,343,84,418,430,384],{"/MITM/Others":2551,"/Scan/VulScan":2554,"/SuspTraffic/AccessAnomaly":2557,"/InherentModelRisk/KnowledgeDefects":2560,"/Malware/Miner":2563,"/Malware/Virus":2566,"/Malware/RootkitBootkit":2569,"/SuspEndpoint/SuspDriver":2572,"/SuspTraffic/MaliciousDomain":2575,"/WebAttack/InfoLeak":2578,"/Malware/Fileless":2581,"/SupplyChain/VectorEmbedding":2584,"/SuspEndpoint/TraceEradication":2587,"/SuspEndpoint/PrivilegeEscalation":2590,"/SuspEndpoint/SuspCommand":2593,"/Audit/Exfiltration":2596,"/IllegalData/RightsInfringement":2599,"/Malware/HackTool":2602,"/WebAttack/Others":2605,"/SuspEndpoint/OpAbnormaly":2608,"/Malware/PUP":2611,"/AccountRisk/SuspModify":2614,"/ConfigRisk/Database":2617,"/SuspEndpoint/Others":2620,"/IllegalData/InadequateSecurityRequirements":2623,"/Malware/Prank":2626,"/WebAttack/SQLInjection":2629,"/SuspEndpoint/SuspiciousSpread":2632,"/WebAttack/CodeInjection":2635,"/DataLeakage/ModelTheft":2638,"/InherentModelRisk/ReasoningLogic":2641,"/Phishing/SocialMediaPhishing":2644,"/SuspEndpoint/FileTempering":2646,"/MITM/BGPHijackingAttack":2649,"/WebAttack/XSS":2652,"/IllegalData/ViolatingSocialistCoreValues":2655,"/PromptInjection/Indirect":2658,"/InherentModelRisk/Robustness":2661,"/IllegalData/DiscriminatoryContent":2664,"/Credential/PTT":2667,"/DataSteal/UnauthorizedAccess":2670,"/Credential/PTK":2673,"/Credential/PTH":2676,"/SuspEndpoint/RemoteExec":2679,"/AgentSec/IdentitySession":2682,"/SuspEndpoint/SuspConnection":2685,"/WebAttack/RFI":2688,"/Malware/Trojan":2691,"/WebAttack/SSRF":2694,"/SupplyChain/Infrastructure":2697,"/WebAttack/Hotlinking":2700,"/Exploit/DeviceVul":2703,"/SuspTraffic/Tunnel":2706,"/WebAttack/CSRF":2709,"/AccountRisk/Others":2712,"/SuspEndpoint/SuspFile":2715,"/WebAttack/FileWrite":2718,"/DataMisuse/GovAudit":2721,"/WebAttack/MemoryShell":2724,"/MITM/TrafficHijacking":2727,"/WebAttack/FileRead":2730,"/SuspTraffic/RemoteCtrl":2733,"/WebAttack/DirTraversal":2736,"/Phishing/Others":2739,"/SuspEndpoint/CommandAndControl":2742,"/DevOps/DeviceError":2745,"/Malware/Bot":2748,"/ConfigRisk/Others":2751,"/DataMisuse/IllegalDataCollect":2754,"/Audit/IllegalSoft":2757,"/Exploit/SoftVul":2760,"/SuspEndpoint/DefenseEvasion":2763,"/AccountRisk/SuspAccount":2766,"/DataSteal/Others":2769,"/Malware/Others":2772,"/WebAttack/FileDownload":2775,"/SuspEndpoint/SuspProcess":2778,"/Audit/IllegalOp":2781,"/AgentSec/ConfigurationManipulation":2784,"/DataLeakage/Sensitive":2787,"/Malware/Webshell":2790,"/Scan/WebScan":2793,"/SuspEndpoint/SuspRegistry":2796,"/Malware/BrowserHijacker":2799,"/SupplyChain/PoisonBackdoor":2802,"/DataLeakage/Property":2805,"/SuspTraffic/SuspProtocol":2808,"/WebAttack/CommandExec":2811,"/Malware/Backdoor":2814,"/Phishing/EmailPhishing":2817,"/SuspEndpoint/SuspProcessAccess":2819,"/DataMisuse/Others":2822,"/Audit/ConfigChange":2825,"/SupplyChain/Artifacts":2828,"/SuspTraffic/RemoteService":2831,"/SuspEndpoint/ProcessInjection":2834,"/Exploit/DOS":2837,"/AgentSec/ToolRegistration":2840,"/DevOps/Others":2843,"/SupplyChain/PoisonData":2846,"/DataTampering/WebsiteDefacement":2849,"/AccountRisk/SuspBehavior":2852,"/Malware/Keylogger":2855,"/SuspTraffic/SuspContent":2858,"/WebAttack/LFI":2861,"/DataTampering/FileTampering":2864,"/SuspEndpoint/SuspThread":2867,"/DataTampering/HiddenLinkInjection":2870,"/DataLeakage/Membership":2873,"/Exploit/RemoteService":2876,"/Credential/Others":2879,"/Others/Others":2882,"/DataSteal/DataDrip":2885,"/Malware/VirusGenerator":2888,"/Credential/TokenHijacking":2891,"/SuspEndpoint/ReverseShell":2894,"/SupplyChain/Hardware":2897,"/SupplyChain/PoisonTarget":2900,"/DataMisuse/OutDomain":2903,"/Malware/Worm":2906,"/DataSteal/DatabaseConnect":2909,"/AccountRisk/SuspLogin":2912,"/WebAttack/WebshellRequest":2915,"/Credential/Steal":2918,"/Audit/Others":2921,"/DevOps/DatabaseError":2924,"/Scan/Others":2927,"/MITM/WLANHijacking":2930,"/SuspEndpoint/Persistence":2933,"/Audit/IllegalAccess":2936,"/WebAttack/FileParsingVul":2939,"/Malware/PenetrationTool":2942,"/WebAttack/XXE":2945,"/SupplyChain/Software":2948,"/DDOS/DDOS":2951,"/DataSteal/DatabaseDump":2954,"/Exploit/Shellcode":2957,"/ConfigRisk/Service":2960,"/ConfigRisk/WeakPassword":2963,"/ConfigRisk/DeviceConf":2966,"/SuspEndpoint/ImageLoaded":2969,"/Scan/HostScan":2972,"/SuspTraffic/MaliciousIP":2975,"/IllegalData/CommercialViolations":2978,"/SuspEndpoint/WMI":2981,"/Malware/CheatProgram":2984,"/DevOps/HostError":2987,"/AccountRisk/BruteForce":2990,"/SuspEndpoint/SuspOpenPort":2993,"/Malware/MaliciousScript":2996,"/SuspEndpoint/ExternalScan":2999,"/ConfigRisk/ClearTextCredit":3002,"/Scan/NetworkScan":3005,"/WebAttack/WebshellUpload":3008,"/AgentSec/UpdateMechanism":3011,"/SupplyChain/PoisonModel":3014,"/Malware/Ransomware":3017,"/Malware/MaliciousMail":3019,"/Scan/ServScan":3022,"/InherentModelRisk/UnsafeDesign":3025,"/DevOps/WebError":3028,"/Malware/Exploit":3031,"/SuspEndpoint/RemoteService":3034,"/WebAttack/WebTempering":3037,"/DataMisuse/Abroad":3040,"/SuspTraffic/TrafficAnomaly":3043,"/Malware/VirTool":3046,"/WebAttack/FileUpload":3049,"/ConfigRisk/Exploit":3052,"/DataTampering/Others":3055,"/InherentModelRisk/BehavioralConsistency":3058,"/SuspEndpoint/Attack":3061,"/DataLeakage/TrainingData":3064,"/WebAttack/BypassAccCtrl":3067,"/Phishing/WebPhishing":3070,"/Malware/Spyware":3073,"/InherentModelRisk/SocietalEthical":3076,"/SuspEndpoint/SuspPipeEvents":3079,"/Malware/MaliciousAdware":3082,"/Malware/Downloader":3085,"/ConfigRisk/HTTPServer":3088,"/Malware/MacroVirus":3091,"/Exploit/SystemVul":3094,"/Scan/SystemScan":3097,"/Audit/OpAudit":3100,"/AgentSec/ToolInvocation":3103,"/DataLeakage/SystemPrompt":3106,"/PromptInjection/Direct":3109,"/Exploit/Others":3112,"/Scan/PortScan":3115,"/Scan/Scanner":3118,"/DataLeakage/DataReconstruction":3121,"/DataSteal/APICrawling":3124,"/Malware/TrojanDropper":3127,"/ConfigRisk/MidWare":3130,"/SuspTraffic/Others":3133,"/SuspEndpoint/FilelessAttack":3136,"/SuspEndpoint/InformationGathering":3139,"/Credential/Forgery":3142,"/DataMisuse/IllegalDataUse":3145,"/SuspTraffic/MaliciousCert":3148,"/WebAttack/CRLF":3151},{"description":2552,"label":2553},"其他形式的中间人攻击","中间人攻击其他类型",{"description":2555,"label":2556},"外部网络发起的针对非Web应用的漏洞扫描，包括配置错误、系统漏洞和应用漏洞，表现出自动化行为特征。攻击目标：服务器。","漏洞扫描",{"description":2558,"label":2559},"内网主机检测到用户访问行为异常告警：用户访问行为偏离正常基线，或检测到异常域/服务访问。","可疑流量访问异常",{"description":2561,"label":2562},"模型知识的准确性、时效性或安全性不足，包括过时信息或敏感训练数据的记忆。","知识缺陷",{"description":2564,"label":2565},"内部网络主机包含恶意挖矿文件、进程或挖矿通信。例如：1. 内部网络查询矿池域名（受害者：内部源地址，无攻击者）。2. 内部网络与矿池通信（内部 -> 外部，受害者源地址，无攻击者）。3. 终端检测到挖矿程序（资产IP为受害者，无攻击者）。4. 挖矿恶意软件回连C2（内部 -> 外部，外部目标地址为攻击者，罕见情况）。","挖矿恶意软件",{"description":2567,"label":2568},"内网主机感染具有传染性的病毒。该病毒可感染可执行文件、文档文件等，使每个被感染文件均包含病毒代码。","传染性病毒",{"description":2570,"label":2571},"Rootkit和Bootkit均为旨在隐藏系统内恶意活动痕迹的恶意软件，使其难以检测和清除。Rootkit通常嵌入操作系统内核或系统文件以隐藏恶意进程、文件和注册表项；Bootkit则通过侵入系统启动过程，在系统启动时加载并执行恶意代码。","Rootkit/Bootkit病毒",{"description":2573,"label":2574},"内网主机加载未知或未签名驱动程序文件。","可疑驱动",{"description":2576,"label":2577},"内网主机请求恶意域名。恶意域名包括挖矿域名、C2域名、钓鱼域名及：1.可疑动态域名，如3322、org；2.内网穿透代理域名，如ngrok域名；3.疑似DGA域名；4.其他类型可疑域名。","可疑恶意域名",{"description":2579,"label":2580},"由于Web服务器配置不当，外部攻击者利用漏洞获取服务器敏感信息。敏感信息包括密码、密钥、证书、会话标识符、许可证、私有数据（如短信内容）、授权凭证、个人数据，以及程序文件、配置文件、日志文件、备份文件等。注意与横向移动/敏感数据泄露类型的区分。","Web攻击-信息泄露",{"description":2582,"label":2583},"内部网络主机包含无文件恶意软件。","无文件恶意软件",{"description":2585,"label":2586},"使用LLM的RAG系统中存在的重大安全风险。向量/嵌入生成、存储或检索中的弱点可能导致恶意内容注入、输出操纵或敏感数据访问。","向量与嵌入漏洞",{"description":2588,"label":2589},"内网主机发现系统存在删除、修改或隐藏日志文件、系统文件或痕迹清理工具的迹象，可能表明攻击者试图隐藏其活动。","可疑痕迹清除",{"description":2591,"label":2592},"内网主机检测到用户账户尝试或成功提升权限，这可能表明攻击者正试图获取更高的系统访问权限以进行更广泛的攻击。","可疑终端权限提升",{"description":2594,"label":2595},"内网主机检测到可疑命令告警。包括：1. 用户执行未授权或异常命令；2. 短时间内频繁执行特定命令，可能表明存在自动化攻击。","可疑命令",{"description":2597,"label":2598},"监测内网主机对外传输或发送数据的行为，例如：1. 上传文件至外部FTP服务器；2. 发送大邮件附件至外部邮箱；3. 同步文件至云存储；4. 向外部HTTP服务器提交数据等。审计数据传输行为而非内容本身。","数据外泄审计",{"description":2600,"label":2601},"侵犯他人合法权益的内容，包括隐私侵犯、诽谤和声誉损害。","权利侵犯",{"description":2603,"label":2604},"内部网络主机包含黑客工具。这些是黑客用于渗透系统、窃取信息或执行其他恶意活动的工具。","黑客工具",{"description":2606,"label":2607},"外部IP发起的其他类型Web攻击行为。","Web攻击-其他类型",{"description":2609,"label":2610},"内网主机的异常操作，如日志删除、授予root权限等。","可疑终端操作异常",{"description":2612,"label":2613},"内网主机检测到流氓软件、广告软件、灰产软件或可疑程序的通信行为。例如：1. 流氓软件外泄机器信息；2. 广告软件回连C2服务器；3. 其他可疑软件通信模式。通常用于检测内到外的流量。","恶意PUP程序",{"description":2615,"label":2616},"记录异常账户变更行为，如频繁权限修改和频繁密码更改。告警目标地址为内部网络。","账号可疑修改",{"description":2618,"label":2619},"数据库配置不当可能导致数据泄露、服务器被攻陷等危害。风险资产位于内网（目的地址）。","数据库配置风险",{"description":2621,"label":2622},"内网主机的其他异常行为。","可疑终端其他异常行为",{"description":2624,"label":2625},"在高安全服务类型中使用的生成式AI可能产生不准确或不可靠的内容。","安全要求不足",{"description":2627,"label":2628},"内网主机存在恶作剧程序。此类程序不会对系统造成严重损害，但可能执行如更改桌面背景或播放声音等恶作剧行为。","恶作剧程序",{"description":2630,"label":2631},"外部网络针对Web应用或Web框架发起的SQL注入攻击。","Web攻击-SQL注入",{"description":2633,"label":2634},"内网主机通过共享文件夹、可移动介质、远程拷贝等方式传播可疑代码。","可疑终端传播",{"description":2636,"label":2637},"从外部网络发起的攻击行为，利用中间件、框架或Web组件漏洞注入精心构造的可执行代码(如Java、PHP等)，实现服务器远程命令执行。","Web攻击-代码注入",{"description":2639,"label":2640},"恶意行为者未经授权访问或复制LLM模型，可能涉及对模型架构的逆向工程或专有算法与参数的提取，导致知识产权盗窃或未经授权的副本传播。","模型窃取",{"description":2642,"label":2643},"模型缺乏可靠的逻辑推理和因果推断能力，经常产生'幻觉'或荒谬结论。","推理逻辑缺陷",{"description":2645,"label":1830},"通过社交媒体平台冒充可信个人或组织发送链接或文件，诱骗用户执行操作的钓鱼攻击。",{"description":2647,"label":2648},"内网主机文件遭到篡改。敏感主机文件包括：应用安全配置文件、防火墙配置、网络服务配置等。篡改易导致安全防护失效、权限提升等危害。","敏感文件篡改",{"description":2650,"label":2651},"通过恶意宣告BGP路由来操纵互联网路径，实现误导拦截流量或篡改数据等目的。常见攻击手段包括广播虚假前缀宣告，使被攻陷路由器进一步污染其他路由器的路由信息，甚至可能传播至骨干网。","BGP劫持攻击",{"description":2653,"label":2654},"从外部网络发起的跨站脚本(XSS)攻击。通过利用Web开发过程中遗留的漏洞，将恶意JavaScript代码注入网页，攻击访问该站点的正常用户的浏览器。","跨站脚本攻击",{"description":2656,"label":2657},"与社会主义核心价值观相矛盾或削弱的内容。","违反社会主义核心价值观",{"description":2659,"label":2660},"通过污染模型检索的外部数据源（如网页、文档）实现的注入攻击。","间接提示注入",{"description":2662,"label":2663},"由于深度神经网络的非线性和大规模特性，AI系统易受复杂操作环境或恶意干扰影响，导致性能下降或决策错误。","鲁棒性缺陷",{"description":2665,"label":2666},"对个人或群体表现出歧视、偏见或仇恨的内容。","歧视性内容",{"description":2668,"label":2669},"攻击者获取或窃取Kerberos系统中用于身份验证的票据，随后利用这些票据代表合法用户访问网络资源。","票据传递攻击",{"description":2671,"label":2672},"未授权访问指攻击者在未经适当授权的情况下非法访问系统或数据的行为，通常意图窃取或破坏数据。","未授权访问",{"description":2674,"label":2675},"攻击者获取用户的加密密钥，并利用该密钥加密发送至系统的数据，借此访问受限资源并执行敏感操作。","凭据PTK攻击",{"description":2677,"label":2678},"攻击者通过获取用户的NTLM或LM哈希值（无需明文密码），访问Windows网络中的其他机器。该方法利用了Windows域环境中的哈希传递机制，使攻击者无需用户实际密码即可访问受保护资源。","哈希传递攻击",{"description":2680,"label":2681},"内网主机发现系统检测到尝试使用远程执行工具或恶意利用远程服务执行未授权命令或脚本的行为。","可疑远程执行",{"description":2683,"label":2684},"攻击者利用认证、令牌管理和会话机制中的漏洞提升权限、冒充身份或越权访问数据。","身份会话滥用",{"description":2686,"label":2687},"网络连接事件记录主机上的TCP/UDP连接，如攻击者扫描、恶意程序外联、隧道建立、横向移动及反向Shell连接等。","可疑连接",{"description":2689,"label":2690},"外部发起的攻击利用目标应用中实现的动态文件包含机制，通过操控提交参数控制应用运行时引用远程服务器上的恶意文件路径，可能实现远程代码执行、植入webshell等恶意功能。","Web攻击-远程文件包含",{"description":2692,"label":2693},"检测到内网主机的木马通信活动。","木马程序",{"description":2695,"label":2696},"外部网络发起的服务端请求伪造（SSRF）攻击。攻击者伪造服务端请求向与其通信的内网主机发送数据，通常用于从外网探测或攻击内网服务。","Web攻击-SSRF",{"description":2698,"label":2699},"针对支持AI开发和部署管道的基础设施（如云服务器、Kubernetes集群）的攻击。攻击者可能利用漏洞进行未经授权的访问，导致系统/网络被入侵或模型完整性被破坏。","基础设施入侵",{"description":2701,"label":2702},"攻击者在外站引用目标网站资源，造成目标网站资源被非法使用或耗尽。","Web攻击-盗链",{"description":2704,"label":2705},"从外网发起的针对特定设备的漏洞攻击行为，包括：网络设备漏洞、安全设备漏洞、物联网设备漏洞、专用设备漏洞等。","设备漏洞利用",{"description":2707,"label":2708},"内网主机发送或接收隧道通信数据包。隧道协议将其他协议的数据帧或数据包封装在新的数据包头中进行传输，到达目的地后解封装并转发至实际目标。例如HTTP隧道、DNS隧道和VPN等。例如：1. 检测隧道通信流量特征，如DNS隧道；2. 识别常见隧道工具特征，包括代理隧道/隐蔽隧道。内网\u003C->外网，源地址可能不同。","可疑隧道流量",{"description":2710,"label":2711},"从外部网络发起的跨站请求伪造(CSRF)攻击，利用合法用户的cookie伪造身份请求访问网站。","Web攻击-CSRF",{"description":2713,"label":2714},"其他账户异常事件的告警","账号其他风险",{"description":2716,"label":2717},"在内网主机上检测到可疑文件。","可疑文件",{"description":2719,"label":2720},"攻击者利用系统或应用漏洞非法写入恶意文件或植入恶意代码，可能通过文件写入行为实现系统入侵、权限提升或执行恶意操作。","Web攻击-文件写入",{"description":2722,"label":2723},"针对医疗行业特定系统，组织实体未经许可获取特定数据的行为。","政府审计数据滥用",{"description":2725,"label":2726},"内存驻留型恶意软件（内存马）攻击指攻击者将恶意代码注入目标系统内存，创建常驻内存的恶意程序以实现对系统的长期控制。内存马攻击通常难以通过传统文件系统扫描和杀毒软件检测，因其在磁盘上不留痕迹。该攻击方式常用于窃取敏感信息、执行远程控制或破坏系统功能的网络攻击中。","Web攻击-内存马",{"description":2728,"label":2729},"攻击者非法截获并操纵网络流量，以获取敏感信息或控制网络资源。","流量劫持",{"description":2731,"label":2732},"攻击者访问服务器上的文件，可能获取敏感信息、执行任意命令或破坏系统。","Web攻击-文件读取",{"description":2734,"label":2735},"内网主机与C2服务器通信，检测流量中的远程控制特征及可疑响应，例如：1. 内网向外网发送命令行标识信息（如cmd/powershell）；2. 内网执行常见命令后向外网传输回显信息；3. 检测特定远程控制工具的通信特征。常见远程控制采用反向连接（内->外网），也存在正向连接（外->内网），受害者为内网主机。","可疑远程控制流量",{"description":2737,"label":2738},"由于Web服务器配置不当或Web应用对用户输入文件名安全性校验不足导致的安全漏洞，外部攻击者可通过特殊字符绕过服务器安全限制，尝试访问任意文件(包括Web根目录之外的文件)、读取敏感文件甚至执行系统命令。","Web攻击-目录遍历",{"description":2740,"label":2741},"包括但不限于邮件钓鱼、社交媒体钓鱼、网站钓鱼等通过各类通信渠道实施的钓鱼攻击。","其他钓鱼攻击",{"description":2743,"label":2744},"命令与控制（C2）指攻击者远程发出指令并管理被入侵设备的行为，通常用于协调数据窃取、网络攻击或恶意软件传播等恶意活动。","可疑端点命令与控制",{"description":2746,"label":2747},"设备故障可分为以下类型，受影响的风险资产为内网环境（目的地址）：设备在其生命周期内因磨损或操作使用暂时丧失规定功能。1. 突发性故障：突然发生的故障。发生时间随机且难以预测，导致设备功能完全丧失。2. 渐发性故障：因设备性能逐渐劣化引发的故障。进展缓慢且规律可循，导致功能部分丧失。","设备故障",{"description":2749,"label":2750},"在内网主机上检测到与僵尸病毒相关的恶意文件、进程或通信。","僵尸病毒",{"description":2752,"label":2753},"其他配置风险事件告警。","其他配置风险",{"description":2755,"label":2756},"违反个人信息监管政策或标准的风险警示，表明可能存在非法或不合规的个人信息收集行为。","非法数据收集",{"description":2758,"label":2759},"内网主机存在涉及不合规应用的进程或通信流量。包括：1. 违反国家规定的应用：涉及恶意扣费、隐私窃取、赌博、色情或破坏国家统一的内容。具体规定参见：http://report.12377.cn:13225/mainNotice.html；2. 违反组织或公司政策的应用，如禁止的游戏、即时通讯软件或股票交易应用。审计类型，默认严重级别为低。不涉及攻击者或受害者。","非法软件审计",{"description":2761,"label":2762},"从外网发起的针对常见第三方软件（如浏览器、Office程序、Adobe应用）或服务器中间件（如Redis、Apache、Nginx）的漏洞攻击。","软件漏洞利用",{"description":2764,"label":2765},"内网主机发现尝试通过卸载/禁用安全软件、混淆/加密数据和脚本，或滥用可信进程来隐藏和伪装其恶意软件，以绕过检测的行为。","可疑终端防御规避",{"description":2767,"label":2768},"可疑账户指可能被用于掩盖攻击者活动、实现持久访问或执行未授权操作的账户。包括：后门账户、隐藏账户、影子账户等。","可疑账户",{"description":2770,"label":2771},"其他数据外泄活动。","其他数据窃取",{"description":2773,"label":2774},"其他恶意软件告警。","其他恶意软件",{"description":2776,"label":2777},"攻击者利用系统或应用漏洞从目标系统非法下载敏感或恶意文件。通过文件下载行为，攻击者可能获取系统信息、窃取用户数据或传播恶意软件。","Web攻击-文件下载",{"description":2779,"label":2780},"检测到内网主机存在可疑进程行为，包括：1.异常进程名、异常进程创建关系、异常进程命令行参数等；2.其他异常进程行为，如权限异常、状态异常、启动方式或频率异常等。","可疑进程",{"description":2782,"label":2783},"包括内网中各类未授权操作的告警，例如：1. 未知设备接入网络、非安全计算机处理涉密文件等；2. 绕过堡垒机访问生产环境；3. 其他违反法律法规和公司政策的操作。不涉及攻击者或受害者。","非法操作审计",{"description":2785,"label":2786},"攻击者篡改配置文件、偏好设置或加载机制，以持久操控AI系统行为或植入后门。","配置操纵滥用",{"description":2788,"label":2789},"涉及PII个人身份信息、财务数据、PHI医疗健康信息或企业机密等敏感信息的泄露事件。","敏感信息泄露",{"description":2791,"label":2792},"内网主机存在网页后门文件。文件内容具有网页后门特征，或访问该文件可能导致执行系统命令、查看文件内容等操作。需区别于网络攻击/网页后门请求，若后门扫描探测或请求尝试来自外网，则应归类为网络攻击/网页后门请求。","网页后门",{"description":2794,"label":2795},"外部网络发起的针对Web应用漏洞的扫描活动，包括敏感目录扫描、网站后门检测、爬虫扫描、SQL注入以及其他各种Web应用漏洞扫描，表现出自动化行为特征。攻击目标：Web业务系统。","Web扫描",{"description":2797,"label":2798},"检测内网主机对注册表进行增删改等可疑操作。","可疑注册表",{"description":2800,"label":2801},"内网主机存在浏览器劫持行为，通常用于篡改用户浏览器设置（如搜索页和主页），以实现定向广告投放或恶意流量重定向。","浏览器劫持",{"description":2803,"label":2804},"需要在被投毒样本和测试样本之间创建后门模式，要求同时控制训练和测试数据。","后门投毒",{"description":2806,"label":2807},"旨在从训练数据集中提取全局信息（如部分训练样本是否包含某些敏感属性）的攻击行为。","属性推断攻击",{"description":2809,"label":2810},"可疑协议流量指检测到使用非常见或异常网络协议的流量，可能表明存在潜在安全威胁，如恶意活动或未经授权的通信。","可疑协议异常流量",{"description":2812,"label":2813},"从外部网络发起的攻击，利用具有系统命令执行功能的Web应用，通过命令拼接、黑名单绕过等技术实现服务器任意系统命令执行。","Web攻击-命令执行",{"description":2815,"label":2816},"在内网主机通信流量中检测到疑似后门程序通信特征。","后门程序",{"description":2818,"label":146},"通过伪装成合法来源发送邮件，诱导收件人点击恶意链接或提供个人信息，以窃取敏感数据或实施恶意攻击。",{"description":2820,"label":2821},"当进程打开另一个进程时，报告进程访问事件。此操作通常涉及对目标进程地址空间的信息查询或读写操作。可检测读取进程内存内容的黑客工具（如Lsass.exe）以窃取凭证进行哈希传递攻击。","可疑进程访问",{"description":2823,"label":2824},"其他数据滥用行为。","其他数据滥用行为",{"description":2826,"label":2827},"对配置修改行为的审计，包括：修改防火墙配置、修改路由表、修改DNS服务器地址、修改服务器配置参数等。审计类型，默认级别为低。不涉及攻击者或受害者。","配置变更审计",{"description":2829,"label":2830},"由存在漏洞或被恶意篡改的第三方库、框架、插件或扩展引入的安全威胁。","第三方插件风险",{"description":2832,"label":2833},"远程服务异常流量指在远程服务连接过程中检测到的异常或可疑网络流量，可能表明存在未经授权的访问尝试、数据泄露或其他恶意活动。","可疑远程服务流量",{"description":2835,"label":2836},"内网主机检测到异常进程注入告警。恶意代码被注入到进程中，导致其与合法进程共享地址空间。","可疑进程注入",{"description":2838,"label":2839},"拒绝服务(DoS)漏洞攻击指外部发起的针对系统服务、应用服务或终端软件的攻击，可导致系统崩溃、服务中断或应用故障。","拒绝服务漏洞利用",{"description":2841,"label":2842},"攻击者通过污染工具描述、模式定义或标识符，利用工具注册机制中的漏洞操控AI系统行为。","工具注册滥用",{"description":2844,"label":2845},"其他运维监控事件，风险资产为内网（目的地址）。","运维其他事件",{"description":2847,"label":2848},"操纵训练数据以破坏模型完整性。被污染的数据可能导致结果失真、输出偏颇、后门触发或用户信任丧失。","数据投毒",{"description":2850,"label":2851},"网站篡改指攻击者未经授权修改或破坏网站内容的行为。通常涉及更改网站文本、图像或其他媒体内容以传播虚假信息、展示恶意消息、推广特定观点或品牌，甚至羞辱和损害网站声誉。网站篡改是常见的数据篡改攻击，旨在通过修改网页内容实现特定恶意目的。","网站篡改",{"description":2853,"label":2854},"账户异常行为的告警。常见场景包括：垃圾邮件发送 - 账户发送垃圾邮件（内网 -> SMTP服务器）。数据窃取 - 下载大量敏感文件（内网 -> 内网）。可疑访问 - 尝试登录关键服务器（内网 -> 内网）。攻击者未知，受害者：涉事账户。","账号可疑行为",{"description":2856,"label":2857},"内部网络主机感染了键盘记录器。这是一种专门设计用于记录用户击键的恶意软件，用于窃取密码和其他敏感信息。","键盘记录器",{"description":2859,"label":2860},"内网主机请求恶意服务（如挂马、仿冒、欺诈），或发送/接收的数据包内容包含钓鱼尝试、敏感信息等可疑元素。","可疑内容",{"description":2862,"label":2863},"外部网络发起的攻击利用目标应用中实现的动态文件包含机制，通过操控提交参数控制应用运行时路径指向本地敏感文件，可能实现敏感文件泄露、篡改或写入webshell等功能。","Web攻击-本地文件包含",{"description":2865,"label":2866},"文件篡改指攻击者未经授权修改、删除或破坏文件内容的行为。此类攻击可能导致数据损坏、信息泄露或系统不稳定。","文件篡改",{"description":2868,"label":2869},"内网主机存在远程线程注入等行为。","可疑线程",{"description":2871,"label":2872},"暗链注入指攻击者将恶意链接隐蔽插入网站页面的行为。这些链接通常对用户不可见，但会被搜索引擎爬虫索引，从而影响搜索结果、提升恶意网站排名或引导流量至恶意网站。暗链注入是一种数据篡改攻击，旨在利用网站可信度和流量为攻击者牟利，同时可能对被感染网站的搜索引擎优化（SEO）产生负面影响。","暗链注入",{"description":2874,"label":2875},"旨在判定特定记录是否包含在用于统计操作的数据集或机器学习模型训练数据中的攻击行为。","成员推断攻击",{"description":2877,"label":2878},"针对网络远程服务（如远程桌面、数据库、文件共享等）的漏洞扫描和攻击尝试，旨在利用服务弱点获取目标系统控制权。","远程服务漏洞利用",{"description":2880,"label":2881},"其他凭证攻击告警。","其他凭证攻击",{"description":2883,"label":2884},"非攻击行为、业务相关异常活动等。通常风险较低且难以定性。","其他威胁类型",{"description":2886,"label":2887},"在较长时间内小批量检索指定类型数据，总数据量达到一定阈值。","数据渗出",{"description":2889,"label":2890},"内网主机存在病毒生成器。该工具用于生成或创建新病毒，可能包含生成自定义病毒代码的功能。","病毒生成器",{"description":2892,"label":2893},"攻击者拦截或复制用于身份验证的网络令牌（如OAuth令牌、JWT令牌等），随后利用这些令牌冒充合法用户执行操作。","令牌劫持",{"description":2895,"label":2896},"内网主机发现系统检测到内部进程与外部IP的异常通信，可能表明攻击者通过反向Shell技术远程控制受控主机。","疑似反向Shell",{"description":2898,"label":2899},"攻击者通过篡改、伪造或利用硬件设备和固件中的漏洞，破坏构建或运行在硬件上的AI系统的安全性。","硬件平台风险",{"description":2901,"label":2902},"一种改变特定目标样本预测结果的攻击。控制训练标签的攻击者可通过标签翻转实现此目的。","定向投毒",{"description":2904,"label":2905},"数据从内部可信域流向外部不可信域。","跨域数据流动",{"description":2907,"label":2908},"检测到内网主机的网络蠕虫通信活动。","网络蠕虫",{"description":2910,"label":2911},"数据库连接窃取指攻击者获取数据库连接凭证以未经授权访问数据库的恶意行为，从而窃取敏感数据或执行未授权操作。","数据库连接窃取",{"description":2913,"label":2914},"此类主要包括异常行为审计，如：异常登录地点、异常登录时间、可疑登录账户和异常登录结果。告警的源地址不区分内外网，而目标地址为内部网络。默认情况下，从内部网络到外部网络的异常登录尝试不会触发告警。如果发生相关告警，应归类为：主机异常/其他。","账号可疑登录",{"description":2916,"label":2917},"外部攻击者尝试访问webshell以进行命令控制、文件查看等操作。注意与恶意程序/webshell后门的区分；此处主要包括webshell请求尝试和webshell页面扫描。已确认的webshell通信（如服务端响应webshell命令、服务端返回webshell单行命令或webshell木马特征）应归类至恶意程序类别。","Web攻击-Webshell请求",{"description":2919,"label":2920},"攻击者通过多种手段（如键盘记录、钓鱼攻击、社会工程等）获取用户登录凭据，随后利用这些凭据访问系统。","凭据窃取",{"description":2922,"label":2923},"其他行为审计事件的告警","其他审计",{"description":2925,"label":2926},"数据库故障可分为以下类型，受影响的风险资产为内网环境（目的地址）：1. 事务内部故障 2. 系统故障 3. 介质故障 4. 计算机病毒故障。","数据库故障",{"description":2928,"label":2929},"外部网络发起的其他类型的探测和扫描攻击事件。","其他扫描",{"description":2931,"label":2932},"利用应用缺陷、协议漏洞及配置错误等安全隐患劫持WiFi流量的网络行为。例如劫持后可展示低俗广告和非法内容，或导致WiFi覆盖范围内大面积断网。","无线局域网劫持",{"description":2934,"label":2935},"内网主机发现的持久化机制，如服务创建、注册表修改和文件系统变更，可能被用于确保攻击者在系统上的长期存在。","可疑终端持久化",{"description":2937,"label":2938},"内网主机访问禁止访问的网站。包括：1. 涉及恶意扣费、隐私窃取、赌博、暴力、色情或分裂活动的内容。具体规定参见：http://report.12377.cn:13225/mainNotice.html；2. 违反公司政策的内容，如游戏网站、招聘网站或电商平台。不涉及攻击者或受害者。","非法访问审计",{"description":2940,"label":2941},"中间件(如IIS、Apache、Nginx等)在文件解析过程中存在漏洞，攻击者可利用该漏洞实现未授权文件解析。","Web攻击-文件解析漏洞",{"description":2943,"label":2944},"内网主机存在被恶意利用的渗透工具。这些工具本用于安全测试或渗透测试目的，但可能被非法用于攻击系统。","渗透工具",{"description":2946,"label":2947},"从外部网络发起的XXE(XML外部实体)注入攻击。当允许外部实体引用时，构造恶意内容可导致任意文件读取、系统命令执行、内网端口扫描及对内网Web服务的攻击。","XML外部实体注入攻击",{"description":2949,"label":2950},"攻击者通过污染或利用AI项目开发的软件工具链依赖项，植入后门或漏洞。","软件开发工具风险",{"description":2952,"label":2953},"从外部网络发起的DDoS攻击，针对服务器或应用程序。包括：流量型DDoS、应用层DDoS等。主要攻击特征：流量异常激增、带宽饱和；接收来自不同来源的大量SYN包、UDP包等；存在反射型DDoS特征——源端口对应常见反射服务如NTP、DNS、SSDP、Memcached等。主要影响：网络瘫痪、服务中断及业务运营停摆。","分布式拒绝服务攻击",{"description":2955,"label":2956},"通过数据库运维工具下载数据库文件，将数据从一个数据库迁移或复制到另一个数据库的行为。","数据库转储窃取",{"description":2958,"label":2959},"检测到特定shellcode通信的数据包特征或识别出包含shellcode签名的恶意文件。常见场景包括：反向shell载荷传输（内->外通信）；包含载荷的恶意文件（通过邮件外->内或下载链接内->外）等。","Shellcode利用",{"description":2961,"label":2962},"SSH、FTP等网络服务存在不安全配置，包括连接IP和方法不受限制、未设置最大登录尝试次数等。风险资产位于内部网络（目标地址）。","服务配置风险",{"description":2964,"label":2965},"审计成功登录的弱密码事件；容易被攻击者猜测或暴力破解工具破解的密码被视为弱密码，如'123'、'abc'等。该账号/系统存在弱密码漏洞风险。受影响资产位于内部网络（目标地址）。","弱密码配置风险",{"description":2967,"label":2968},"设备缺乏适当的安全配置，可能导致数据泄露、服务器被入侵等危害。风险资产位于内部网络（目标地址）。","设备配置风险",{"description":2970,"label":2971},"记录特定进程中加载的模块，包括加载进程、哈希值和签名信息。","可疑终端镜像加载",{"description":2973,"label":2974},"外部网络发起的针对IP段内服务器可用性的探测行为；通过ping或TCP连接尝试等方法确认目标IP是否在线并响应。攻击目标：服务器。","主机扫描",{"description":2976,"label":2977},"内网主机与恶意IP通信。恶意IP包括矿池IP、黑产IP等。","恶意IP地址",{"description":2979,"label":2980},"违反商业法律法规的内容。","商业违规",{"description":2982,"label":2983},"内网主机检测到WMI利用告警。使用Windows管理规范(WMI)执行了未授权操作，可能用于信息收集或远程控制目的。","可疑WMI利用",{"description":2985,"label":2986},"内网主机正在运行作弊程序。这类工具虽为游戏或其他软件设计，但可能被恶意利用以获取敏感信息或控制系统。","作弊程序",{"description":2988,"label":2989},"主机故障可分为以下类型，受影响的风险资产为内网环境（目的地址）：检测到的由各种原因导致的主机故障包括：1. 系统硬件问题，主要由SCSI卡、主板、RAID卡、HBA卡、网卡和硬盘等硬件设备引起。此类情况下需查明具体硬件故障细节并通过更换硬件解决。2. 外围硬件问题，主要由网络问题引起。此时应重点排查主机网络设备和网络参数。3. 主机软件问题，主要由系统内核漏洞、应用软件缺陷或驱动程序错误导致。解决方法包括升级内核、修复程序缺陷或更新驱动。4. 主机系统配置问题，主要由系统参数设置不当引起。可通过恢复系统默认设置或关闭防火墙解决。","主机故障",{"description":2991,"label":2992},"攻击者采用枚举方法系统地尝试用户名和密码组合进行登录尝试。攻击目标：用户账户。此类攻击的受害者必须是内部网络目标。常见的暴力破解和弱密码枚举尝试属于此类别。从内部网络发起的针对外部网络的暴力破解攻击归类为：主机异常/主机外部攻击。","账号暴力破解",{"description":2994,"label":2995},"内网主机上开放了非常见端口。","可疑开放端口",{"description":2997,"label":2998},"内部网络主机运行具有恶意行为特征的脚本，例如启用PowerShell或修改注册表项。","恶意脚本",{"description":3000,"label":3001},"由内网主机发起的一类针对外网的扫描行为，其目标为外部网络。","可疑终端外部扫描",{"description":3003,"label":3004},"敏感信息在数据传输过程中未经加密传输。敏感信息包括密码、加密密钥、证书、会话标识符、私有数据（如消息内容）、授权凭证、个人数据，以及程序文件、配置文件、日志文件、备份文件等。风险资产位于内网（目的地址）。","明文凭据传输风险",{"description":3006,"label":3007},"网络扫描是指扫描网络上所有设备和系统的过程，以获取网络拓扑、设备状态和开放端口等信息。常用于安全审计、资产管理和漏洞检测，以识别潜在安全风险并优化网络配置。","网络扫描",{"description":3009,"label":3010},"攻击者尝试上传webshell后门文件以获取目标服务器控制权。","Web攻击-Webshell上传",{"description":3012,"label":3013},"攻击者利用工具更新机制的信任模型和自动化特性推送恶意更新，以实现持久控制或突发攻击。","更新机制滥用",{"description":3015,"label":3016},"在模型部署前篡改或注入恶意代码。","模型投毒",{"description":3018,"label":198},"内网主机感染勒索软件。包括：1. 勒索软件通信（内→外）；2. 勒索软件域名查询（无攻击者参与）；3. 终端检测到勒索软件（资产IP为受害者，无攻击者参与）；4. 检测到其他勒索软件行为特征（如传播、访问Tor网络等）。",{"description":3020,"label":3021},"内部网络主机在收到的邮件中检测到恶意程序。这些程序具有恶意软件的特征，或在执行时可能下载并执行病毒、安装后门等。","恶意邮件",{"description":3023,"label":3024},"外部网络发起的针对服务器开放服务的扫描行为。包括批量探测常见服务端口可用性，以及发送特定数据包检测服务端程序版本信息。攻击目标：服务器。","服务扫描",{"description":3026,"label":3027},"由于设计和/或实现不安全导致的LLM连接工具被利用，可能因意外、模糊或被操控的输出引发破坏性操作。","工具设计不安全",{"description":3029,"label":3030},"Web应用故障可分为以下类型，受影响风险资产位于内网环境（目的地址）：1. 因流量突增导致服务器负载过高引发的故障。2. 程序源代码运行时错误或代码逻辑缺陷导致的故障。3. 服务超时导致运行异常引发的故障。","Web应用故障",{"description":3032,"label":3033},"内部网络主机包含恶意利用工具。这些是专门设计用于利用已知系统或软件漏洞执行未授权操作的工具。","恶意利用工具",{"description":3035,"label":3036},"检测到内网主机上运行未知远程服务，该服务可能包含已知漏洞，攻击者可利用其执行远程代码。","可疑远程服务利用",{"description":3038,"label":3039},"外部攻击者利用漏洞或植入的webshell，通过注入钓鱼链接、违禁内容、暗链、欺诈材料等方式尝试篡改合法网页。","Web攻击-网页篡改",{"description":3041,"label":3042},"从海外地址访问国内数据，或主动将数据从国内地址传输至海外目的地。","跨境数据传输",{"description":3044,"label":3045},"内网主机检测流量异常告警：网络流量偏离正常基线。","可疑流量异常",{"description":3047,"label":3048},"内网主机存在代码混淆工具。该工具用于混淆软件代码，使其难以理解和逆向工程，通常被用来隐藏恶意软件的真实意图。","代码混淆工具",{"description":3050,"label":3051},"从外部网络发起的攻击行为，利用文件上传功能绕过或未充分校验用户输入，导致直接上传恶意文件。","Web攻击-文件上传",{"description":3053,"label":3054},"服务器未及时进行补丁更新或安全配置，导致存在漏洞被利用的风险。","漏洞利用风险",{"description":3056,"label":3057},"其他数据篡改类告警。","其他数据篡改告警",{"description":3059,"label":3060},"模型表现出不稳定、不一致的行为或无法可靠遵循指令，显示出失调迹象。","行为一致性缺陷",{"description":3062,"label":3063},"内部网络主机发起针对外部网络的漏洞利用、暴力破解、基于Web的攻击等行为。","可疑端点攻击",{"description":3065,"label":3066},"通过成员推理或模型逆向工程等方法提取训练数据。","训练数据提取",{"description":3068,"label":3069},"外网发起的针对权限提升漏洞的攻击行为，包括水平权限提升尝试、认证绕过漏洞尝试及其他类似类型。","Web攻击绕过访问控制",{"description":3071,"label":3072},"创建模仿合法网站外观的欺骗性网页，诱骗用户输入登录凭证或信用卡信息等个人信息。","网页钓鱼",{"description":3074,"label":3075},"内网主机流量中检测到间谍软件的通信特征。","间谍软件",{"description":3077,"label":3078},"模型输出或行为包含偏见、歧视、有害内容或与人类价值观和伦理标准不符。","社会伦理缺陷",{"description":3080,"label":3081},"创建命名管道时生成，恶意软件常利用命名管道进行进程间通信。","可疑管道事件",{"description":3083,"label":3084},"恶意广告是指通过在线广告平台发布的恶意内容，意图欺骗或诱骗用户。这些广告可能将用户重定向到恶意网站、下载恶意软件或泄露个人敏感信息。","恶意广告软件",{"description":3086,"label":3087},"内网主机感染木马下载器，此类恶意软件会在受控系统下载并安装其他恶意程序。","木马下载器",{"description":3089,"label":3090},"HTTP服务器启用了PUT、DELETE、OPTIONS和TRACE等非常用方法，可能导致服务器信息泄露和内容篡改。风险资产位于内部网络（目标地址）。","HTTP服务器配置风险",{"description":3092,"label":3093},"内部网络主机感染了宏病毒。这类病毒通过利用文档编辑软件中的宏功能（如Microsoft Office中的VBA宏）进行传播。","宏病毒",{"description":3095,"label":3096},"从外网发起的针对Linux、Windows等操作系统内核漏洞或原生应用漏洞的攻击。","系统漏洞利用",{"description":3098,"label":3099},"系统扫描是指对计算机系统进行全面检查和分析的过程，以检测漏洞、恶意软件、配置错误和其他潜在安全问题。通过系统扫描，可以识别并修复安全风险，确保系统的稳定性和安全性。","系统扫描",{"description":3101,"label":3102},"包括需审计日志记录的操作，如敏感操作（如权限修改、批量数据查询）和高危操作（如数据删除、系统文件修改或删除、日志清除）。审计类型默认设置为低级别。不涉及攻击者或受害者。","操作审计",{"description":3104,"label":3105},"攻击者在工具调用过程中操纵输入参数和数据传递，以执行恶意命令或访问敏感数据。","工具调用滥用",{"description":3107,"label":3108},"专门提取系统指令和提示信息。","系统提示提取",{"description":3110,"label":3111},"直接向模型发送覆盖指令的行为。","直接提示注入",{"description":3113,"label":3114},"从外网发起的其他类型漏洞利用攻击事件。","漏洞利用其他事件",{"description":3116,"label":3117},"外部网络发起的针对服务器开放端口的扫描行为，表现出自动化行为特征。攻击目标：服务器。","端口扫描",{"description":3119,"label":3120},"在外部网络扫描过程中检测到特定扫描器的指纹特征。攻击目标：服务器。","扫描器指纹",{"description":3122,"label":3123},"基于对聚合数据的访问权限，通过逆向工程手段获取个人用户记录或敏感基础设施记录的私有信息的攻击行为。","数据重构攻击",{"description":3125,"label":3126},"当主体实体在单位时间内API访问次数超过阈值，且返回的指定类型数据结果去重计数超过一定阈值时触发。","API数据爬取",{"description":3128,"label":3129},"内网主机存在木马释放器。此类程序本身不含恶意代码，但其用途是释放并激活其他木马程序。","木马释放器",{"description":3131,"label":3132},"中间件缺乏安全配置，可能导致数据泄露、服务器被入侵等危害。风险资产位于内部网络（目标地址）。","中间件配置风险",{"description":3134,"label":3135},"内网主机发起的可疑通信。包括：可疑会话连接、异常协议数据包、与4444/2745等可疑端口的通信行为。","可疑流量其他",{"description":3137,"label":3138},"在内网主机发现系统上未创建文件，但执行了代码或修改了系统设置。这可能表明存在无文件攻击，攻击者直接在内存中执行恶意代码。","可疑终端无文件攻击",{"description":3140,"label":3141},"内网主机检测到异常的本地信息收集行为。这可能表明攻击者正在收集本地系统信息，如用户列表和系统配置。","可疑终端信息收集",{"description":3143,"label":3144},"攻击者创建或修改凭证（如用户名和密码、数字证书、令牌等），在未经合法用户授权的情况下获取对系统或网络资源的未授权访问权限。","凭证伪造",{"description":3146,"label":3147},"违反法律法规或其他相关规定，非法或不当执行数据处理操作。","非法数据使用",{"description":3149,"label":3150},"内网主机安装恶意证书或访问携带恶意证书的URL。例如：1.通过SSL/TLS证书信息检测访问恶意HTTPS网站；2.通过证书的SNI信息检测可疑域名。内网->外网。","可疑恶意证书",{"description":3152,"label":3153},"外网发起的HTTP CRLF注入攻击。HTTP协议使用CRLF符号（回车换行）进行分隔。攻击者在请求中注入恶意换行符以绕过网站安全检查。","Web攻击CRLF注入",{"fieldName":3155,"label":3156,"description":3157,"type":1673,"subcate_ids":3158,"enum":330},"victim","受害者","记录受攻击影响的所有唯一目标IP地址集合，以数组形式存储。数组中的每个元素必须是有效的IPv4或IPv6地址格式。IPv4地址格式为点分十进制（如：192.168.1.1），IPv6地址格式需符合标准表示法（如：2001:0db8:85a3:0000:0000:8a2e:0370:7334或压缩格式）。",[551],{"fieldName":3160,"label":3161,"description":3162,"type":322,"subcate_ids":3163,"enum":330},"interfaceName","网络接口名称","该字段标识网络流量经过的物理或逻辑接口名称，用于在系统中唯一标识一个网络接口。格式为字符串，通常遵循操作系统或网络设备的命名规范，例如以太网接口可能命名为 “eth0”、“enp8s0”，无线接口可能命名为 “wlan0”。",[89,94,99,104,110,116,121,128,133,138,143,150,160,165,170,175,190,195,202,207],{"fieldName":3165,"label":3166,"description":3167,"type":322,"subcate_ids":3168,"enum":330},"incidentName","事件名称","该字段用于标识安全事件的简要概括名称。",[551],{"fieldName":3170,"label":3171,"description":3172,"type":322,"subcate_ids":3173,"enum":330},"wechatSubjectName","微信主体名称","微信公众平台认证主体的名称，通常为企业、组织或机构的官方注册名称。",[357],{"fieldName":3175,"label":3176,"description":3177,"type":322,"subcate_ids":3178,"enum":330},"userPrincipalName","用户主体名称","用户主体名称是客户端进行身份验证的服务的唯一标识符，通常采用电子邮件地址格式。其格式要求为：由用户名、@符号和域名组成。",[218],{"fieldName":3180,"label":3181,"description":3182,"type":470,"subcate_ids":3183,"enum":3184},"direction","数据流方向","基于源和目标IP地址的网络位置分类数据流方向。该字段为枚举类型，表示数据流在内外网之间的流向，具体取值及含义如下：11 表示外网访问外网；10 表示外网访问内网；01 表示内网访问外网；00 表示内网访问内网。",[38,54,68,76,89,94,99,104,110,116,121,128,133,138,143,150,160,165,170,175,180,185,190,195,202,207,223,247,300,305,310,315,324,63,33,295,411,379,380,381,382,325,326,383,327,213,328,329,400,412,429,342,343],{"10":3185,"11":3188,"00":3191,"01":3194},{"description":3186,"label":3187},"来源IP为外部IP，目的IP为内部IP，数据方向：外访问内","外访问内",{"description":3189,"label":3190},"来源IP为外部IP，目的IP为外部IP，数据方向：外访问外","外访问外",{"description":3192,"label":3193},"来源IP为内部IP，目的IP为内部IP，数据方向：内访问内","内访问内",{"description":3195,"label":3196},"来源IP为内部IP，目的IP为外部IP，数据方向：内访问外","内访问外",{"fieldName":3198,"label":3199,"description":3200,"type":470,"subcate_ids":3201,"enum":3202},"incidentStatus","事件状态","标识安全事件在响应生命周期中的当前处理状态。该字段为枚举类型，其值必须为预定义的字符串。可选值为：Analysising (分析中)、Error (错误)、Ignore (忽略)、Pending (待处置)、Disposed (已处置)。",[551],{"Ignore":3203,"Error":3206,"Pending":3209,"Analysising":3212,"Disposed":3215},{"description":3204,"label":3205},"经过分析不需要处置的事件","忽略",{"description":3207,"label":3208},"分析过程中自动化剧本执行流程错误终止的事件","错误",{"description":3210,"label":3211},"经过分析需要处置的事件","待处置",{"description":3213,"label":3214},"正在分析中的事件","分析中",{"description":3216,"label":3217},"已经完成处置关闭的事件","已处置",{"fieldName":3219,"label":3220,"description":3221,"type":322,"subcate_ids":3222,"enum":330},"vulOrg","漏洞系统研制厂商","该字段用于标识存在漏洞的软件或硬件产品的原始研发或生产厂商名称，例如操作系统、应用程序或硬件设备的供应商。值为字符串类型，建议使用厂商官方常用名称或简称，避免使用缩写或内部代号。",[411,381],{"fieldName":3224,"label":3225,"description":3226,"type":513,"subcate_ids":3227,"enum":330},"assetPort","资产端口","资产对外提供服务的网络端口号。端口号必须是整数，取值范围为0-65535。",[371],{"fieldName":3229,"label":3230,"description":3231,"type":322,"subcate_ids":3232,"enum":330},"executablePath","可执行文件路径","可执行文件在文件系统中的完整存储路径，需为有效的文件系统路径字符串，通常采用绝对路径表示，如Unix/Linux系统下的路径格式。",[344,365],{"fieldName":3234,"label":3235,"description":3236,"type":322,"subcate_ids":3237,"enum":330},"assetMacAddress","资产MAC地址","资产的媒体访问控制地址，用于唯一标识网络设备。格式必须为小写字母和数字组成的MAC地址，采用冒号分隔的六组十六进制数，每组两位，格式为xx:xx:xx:xx:xx:xx。",[352,353,344,345,354,346,355,356,357,358,359,360,361,362,363,364,365,366,367,368,369,370,371,372,373],{"fieldName":3239,"label":3240,"description":3241,"type":322,"subcate_ids":3242,"enum":330},"originalPageUrl","原始网页URL","原始网页URL是指篡改前合法网页的URL地址，用于标识网页篡改事件发生前的原始访问路径。该字段格式必须符合标准的URL规范，通常包含协议（如http或https）、域名或IP地址、端口（可选）、路径及查询参数（可选）等部分。",[382],{"fieldName":3244,"label":3245,"description":3246,"type":513,"subcate_ids":3247,"enum":330},"rstCount","RST包数量","该字段用于统计TCP连接中接收或发送的复位(RST)数据包数量。其值为非负整数，表示RST包的具体个数。",[33],{"fieldName":3249,"label":3250,"description":3251,"type":513,"subcate_ids":3252,"enum":330},"alertCount","告警数量","该字段用于统计安全事件关联的告警总数。其值应为非负整数，表示告警的具体数量。",[551],{"fieldName":3254,"label":3255,"description":3256,"type":322,"subcate_ids":3257,"enum":330},"departmentHeadMail","部门负责人邮箱","部门负责人的电子邮箱地址，用于接收相关通知和联系。格式要求：必须符合标准的电子邮件地址格式，包含有效的用户名和域名部分，使用@符号分隔。",[352,353,344,345,354,346,355,356,357,358,359,360,361,362,363,364,365,366,367,368,369,370,371,372,373],{"fieldName":3259,"label":3260,"description":3261,"type":322,"subcate_ids":3262,"enum":330},"requestDomain","请求域名","标识网络请求目标的域名信息，格式要求为有效的域名格式，如\"www.example.com\"，需符合RFC 1035标准，由字母、数字和连字符组成，以点号分隔各级标签。",[138,223,324,379,325,327,328,329,412,355,356,357,369],{"fieldName":3264,"label":3265,"description":3266,"type":322,"subcate_ids":3267,"enum":330},"objectName","对象名称","对象名称，指访问或操作的目标对象名称，例如数据库名、应用名、文件名等。",[38],{"fieldName":3269,"label":3270,"description":3271,"type":322,"subcate_ids":3272,"enum":330},"requestHeader","请求头","请求头是HTTP网络请求中客户端向服务器发送请求时用于传递附加信息、客户端特性及身份验证等元数据的部分，其内容应为符合HTTP协议规范的字符串。",[76,150,63,379,380,381,382,383,342,343,384],{"fieldName":3274,"label":3275,"description":3276,"type":322,"subcate_ids":3277,"enum":330},"srcMacAddress","源MAC地址","源MAC地址表示网络数据帧发送方的媒体访问控制地址。格式要求：必须为标准MAC地址格式，即6组由冒号分隔的十六进制字节（xx:xx:xx:xx:xx:xx），每组两个字符，取值范围为00-FF。",[38,54,68,76,89,94,99,104,110,116,121,128,133,138,143,150,160,165,170,175,180,185,190,195,202,207,223,247,300,305,310,315,324,63,33,295,411,379,380,381,382,325,326,383,327,213,328,329,400,412,429,342,343],{"fieldName":3279,"label":3280,"description":3281,"type":335,"subcate_ids":3282,"enum":330},"sensitiveFile","是否敏感文件","该字段标识文件是否包含敏感数据，如密码、密钥、个人信息等。其值为布尔类型，仅允许取 `true` 或 `false`。",[354],{"fieldName":3284,"label":3285,"description":3286,"type":470,"subcate_ids":3287,"enum":3288},"queryClass","查询类别","DNS查询所适用的网络类别。可选值包括：IN (Internet类别)、CH (Chaos类别)、HS (Hesiod类别)、NONE (无类别)、ANY (任意类别)。",[],{"IN":3289,"CH":3292,"HS":3295,"NONE":3298,"ANY":3301},{"description":3290,"label":3291},"Internet协议类别，绝大多数DNS查询使用此类别","Internet类别",{"description":3293,"label":3294},"Chaos网络类别，用于特定系统查询，可能表示侦察活动","Chaos类别",{"description":3296,"label":3297},"Hesiod系统类别，用于特定网络服务","Hesiod类别",{"description":3299,"label":3300},"无特定协议类别，用于更新操作","无类别",{"description":3302,"label":3303},"任意协议类别，可能表示异常查询","任意类别",{"fieldName":3305,"label":3306,"description":3307,"type":322,"subcate_ids":3308,"enum":330},"mainboard","主板","主板字段记录计算机主板的制造商和型号信息。该字段为字符串类型，用于描述主板硬件。通常包含主板制造商名称、产品系列或具体型号。",[360,361,362],{"fieldName":3310,"label":3311,"description":3312,"type":322,"subcate_ids":3313,"enum":330},"requestContentType","请求内容类型","请求内容类型，对应网络请求头中的Content-Type字段，用于描述请求数据的格式和字符编码。其值通常为标准MIME类型字符串，格式规范为“主类型/子类型”，并可附加参数（如字符集）。常见示例包括“application/json”、“text/html; charset=utf-8”等。",[38,150,63,379,380,381,382,383,342,343,384],{"fieldName":3315,"label":3316,"description":3317,"type":322,"subcate_ids":3318,"enum":330},"fileName","文件名称","文件的基本名称，不包含路径信息。格式要求：字符串类型，长度不超过255个字符，支持常见操作系统允许的文件名字符集（如字母、数字、下划线、点、连字符等），应避免使用系统保留字符和路径分隔符。",[76,94,99,150,195,202,229,300,324,381,325,326,383,327,213,328,329,412,342,343,354,355],{"fieldName":3320,"label":3321,"description":3322,"type":322,"subcate_ids":3323,"enum":330},"loginId","登录ID","系统分配的登录会话标识符，用于唯一标识用户的登录会话。该字段为字符串类型，通常为数字或字母数字组合的序列。",[47],{"fieldName":3325,"label":3326,"description":3327,"type":322,"subcate_ids":3328,"enum":330},"assetOwnerPhone","负责人联系方式","资产负责人的联系方式，用于标识资产责任人的联系电话号码。",[352,353,344,345,354,346,355,356,357,358,359,360,361,362,363,364,365,366,367,368,369,370,371,372,373],{"fieldName":3330,"label":3331,"description":3332,"type":470,"subcate_ids":3333,"enum":3334},"assetCategory","资产分类","资产分类是指从资产管理角度对资产进行的分类。该字段为枚举类型，取值范围包括：database (数据库)、data_table (数据表)、data_field (数据字段)、account (账号)、api (API) 等预设可选值。",[352,353,344,345,354,346,355,356,357,358,359,360,361,362,363,364,365,366,367,368,369,370,371,372,373],{"container":3335,"server":3338,"website":3341,"other":3344,"cloud_storage":3346,"official_account":3349,"certificate":3352,"data_field":3355,"terminal":3358,"ip_address":3361,"database":3364,"file":3367,"mini_program":3370,"port":3373,"data_table":3376,"domain":3379,"virtual_machine":3382,"cloud_server":3385,"api":3388,"application_software":3391,"device":3394,"account":3397,"mobile_app":3400,"system_software":3403},{"description":3336,"label":3337},"操作系统级别的虚拟化技术，用于打包、分发和运行应用及其依赖环境。","容器",{"description":3339,"label":3340},"部署在本地数据中心的物理计算设备，用于提供网络服务或运行企业应用。","服务器",{"description":3342,"label":3343},"通过HTTP/HTTPS协议提供访问的网页集合与应用，是常见的对外服务与攻击面。","Web网站",{"description":3345,"label":448},"未包含在上述分类中的其他类型资产。",{"description":3347,"label":3348},"由云服务商提供的对象、块或文件存储服务，如AWS S3、阿里云OSS。","云存储",{"description":3350,"label":3351},"在微信等社交媒体平台上运营的官方账户，用于发布信息、提供服务并与用户互动。","公众号",{"description":3353,"label":3354},"数字证书，用于实现身份认证、数据加密和通信安全的电子凭证。","证书",{"description":3356,"label":3357},"数据表或数据结构中的最小数据单元，用于存储特定类型的属性值。","数据字段",{"description":3359,"label":3360},"用户直接操作的计算设备端点，包括个人电脑、ATM机、信息终端等。","终端",{"description":3362,"label":3363},"互联网协议地址，用于在网络中唯一标识和定位一个设备或接口。","IP地址",{"description":3365,"label":3366},"结构化数据存储系统，如MySQL、Oracle等关系型数据库或MongoDB等非关系型数据库。","数据库",{"description":3368,"label":3369},"存储在文件系统中的数据集合，可以是文档、可执行程序、配置文件或多媒体内容等。","文件",{"description":3371,"label":3372},"无需下载安装即可在超级应用（如微信、支付宝）内使用的轻量级应用程序。","小程序",{"description":3374,"label":3375},"网络通信中的逻辑端点，与IP地址结合，用于区分同一设备上的不同服务。","端口",{"description":3377,"label":3378},"数据库中的核心存储单元，用于存储具有相同结构的数据记录集合。","数据表",{"description":3380,"label":3381},"互联网上的地址标识，用于定位网站和服务，是网络资产的关键入口点。","域名",{"description":3383,"label":3384},"通过虚拟化技术，在物理服务器上模拟出的完整、独立的计算机系统环境。","虚拟机",{"description":3386,"label":3387},"由云服务商（如AWS EC2、阿里云ECS）提供的、作为服务管理的弹性计算实例。","云服务器",{"description":3389,"label":3390},"应用程序编程接口，提供标准化方式供软件组件之间进行交互和数据交换。","API",{"description":3392,"label":3393},"为满足特定用途或解决特定问题而设计的软件，如办公软件、ERP、CRM系统等。","应用软件",{"description":3395,"label":3396},"广义的硬件设备，包括网络设备、物联网设备、办公设备等物理实体。","设备",{"description":3398,"label":3399},"用于访问系统、应用或服务的数字身份凭证，包括用户账号、服务账号等。","账号",{"description":3401,"label":3402},"移动设备应用程序，通常指运行在iOS或Android等移动操作系统上的客户端软件。","APP",{"description":3404,"label":3405},"为计算机运行提供基础服务的软件，如操作系统、数据库管理系统、中间件等。","系统软件",{"fieldName":3407,"label":3408,"description":3409,"type":322,"subcate_ids":3410,"enum":330},"fileGuid","文件GUID","文件的全局唯一标识符，通常为32位十六进制字符串，不包含连字符，用于在系统中唯一标识一个文件。",[229,342],{"fieldName":3412,"label":3413,"description":3414,"type":322,"subcate_ids":3415,"enum":330},"cdnVendor","CDN厂商","该字段用于标识内容分发网络(CDN)服务提供商的官方名称。格式为字符串，通常为厂商的完整商业名称或公认的简称。",[359],{"fieldName":3417,"label":3418,"description":3419,"type":322,"subcate_ids":3420,"enum":330},"destNtDomain","目的NT域","目的设备所属的Windows NT域名称。格式为字符串，通常用于标识Windows网络环境中的域。",[47,218],{"fieldName":3422,"label":3423,"description":3424,"type":322,"subcate_ids":3425,"enum":330},"homeDir","主目录","该字段表示用户账户配置的主目录在文件系统中的绝对路径。路径格式应符合操作系统的规范，例如在Windows系统中通常为驱动器盘符加冒号后接反斜杠分隔的目录结构（如 `C:\\Users\\\u003Cusername>`），在Linux/Unix系统中通常为正斜杠分隔的目录结构（如 `/home/\u003Cusername>`）。",[218],{"fieldName":3427,"label":3428,"description":3429,"type":322,"subcate_ids":3430,"enum":330},"assetDepartmentName","管理部门（单位）名称","管理部门（单位）名称，指负责管理资产的部门或单位的全称。",[352,353,344,345,354,346,355,356,357,358,359,360,361,362,363,364,365,366,367,368,369,370,371,372,373],{"fieldName":3432,"label":3433,"description":3434,"type":322,"subcate_ids":3435,"enum":330},"tableName","表名称","关系型数据库中的数据表逻辑名称，表名称应为字符串类型，遵循数据库命名规范，通常由字母、数字和下划线组成。",[345,346],{"fieldName":3437,"label":3438,"description":3439,"type":513,"subcate_ids":3440,"enum":330},"bytesCount","字节数量","该字段统计网络会话或时间窗口内传输的字节累计数量。其值为非负整数，表示传输的总字节数。",[],{"fieldName":3442,"label":3443,"description":3444,"type":322,"subcate_ids":3445,"enum":330},"srcGeoRegionCode","来源地区代码","网络请求来源的地区地理编码，采用ISO 3166-1 alpha-2标准的两字母国家/地区代码，表示来源IP地址对应的国家或地区。该字段为字符串类型，必须由大写英文字母组成。",[223,247],{"fieldName":3447,"label":3448,"description":3449,"type":322,"subcate_ids":3450,"enum":330},"assetGeoRegion","资产具体地理位置","该字段表示资产实际所在的物理地理位置区域，用于记录资产的具体地理位置信息。格式为字符串类型，使用标准的地理位置描述格式，如\"省/市/区\"或\"国家/省/市\"的层级结构。",[352,353,344,345,354,346,355,356,357,358,359,360,361,362,363,364,365,366,367,368,369,370,371,372,373],{"fieldName":3452,"label":3453,"description":3454,"type":322,"subcate_ids":3455,"enum":330},"queryStatus","查询状态","DNS协议查询请求的响应状态码，用于表示DNS查询操作的结果。常见的状态码中，0通常表示DNS查询成功。该字段为字符串类型，具体取值遵循DNS协议标准定义的状态码。",[223,412],{"fieldName":3457,"label":3458,"description":3459,"type":322,"subcate_ids":3460,"enum":330},"userAccountControl","用户账号控制","用户账号控制属性是Windows Active Directory中用于表示账户多种设置的位掩码。该字段值为字符串类型，通常以十六进制或十进制字符串形式表示。",[218],{"fieldName":3462,"label":3463,"description":3464,"type":322,"subcate_ids":3465,"enum":330},"eventNum","Windows事件编号","Windows事件编号，用于标识Windows终端操作系统事件的唯一数字编号，格式为字符串类型，通常由微软定义的事件ID组成，例如登录成功事件编号为4624。",[],{"fieldName":3467,"label":3468,"description":3469,"type":335,"subcate_ids":3470,"enum":330},"forceLogoff","强制注销","该字段用于控制在用户登录时间到期后是否强制注销用户会话。其值为布尔类型，仅允许使用 `true` 或 `false` 表示。`true` 表示启用强制注销，`false` 表示不启用。",[],{"fieldName":3472,"label":3473,"description":3474,"type":1917,"subcate_ids":3475,"enum":330},"durationTime","持续时间","持续时间表示事件或操作从开始到结束的完整时间长度，以秒为单位。该字段为长整型数值，应大于等于0。",[68,121,138,429,551],{"fieldName":3477,"label":3478,"description":3479,"type":322,"subcate_ids":3480,"enum":330},"assetGeoLongitude","资产地理经度","资产所在位置的经度坐标，采用十进制表示，遵循WGS84地理坐标系标准。格式要求为字符串类型，表示范围为-180.000000至180.000000之间的浮点数。",[352,353,344,345,354,346,355,356,357,358,359,360,361,362,363,364,365,366,367,368,369,370,371,372,373],{"fieldName":3482,"label":3483,"description":3484,"type":322,"subcate_ids":3485,"enum":330},"minPasswordAge","最小密码使用天数","该字段表示密码修改策略要求密码必须使用的最短天数。其值为非负整数，以天为单位。",[],{"fieldName":3487,"label":3488,"description":3489,"type":322,"subcate_ids":3490,"enum":330},"cpuLimit","CPU限制","该字段表示容器可使用的CPU资源上限，支持使用mCPU单位或核数两种格式进行表示。格式要求：若以mCPU为单位，则数值后需加小写字母'm'，例如'500m'表示500毫核（即0.5核）；若以核数为单位，则可直接使用整数或小数，例如'0.5'或'1'。该值为字符串类型。",[363],{"fieldName":3492,"label":3493,"description":3494,"type":322,"subcate_ids":3495,"enum":330},"ldapOpCode","LDAP操作码","轻量级目录访问协议(LDAP)请求的操作类型代码，通常为十六进制字符串形式。",[165],{"fieldName":3497,"label":3498,"description":3499,"type":322,"subcate_ids":3500,"enum":330},"componentVersion","组件版本","该字段用于标识软件组件、插件或库的完整版本信息，其值为字符串类型。通常遵循语义化版本控制规范（如主版本号.次版本号.修订号）。",[366],{"fieldName":3502,"label":3503,"description":3504,"type":322,"subcate_ids":3505,"enum":330},"destUserName","目标用户名","该字段表示网络连接、系统访问或安全事件的目标主体用户身份名称。其值为字符串类型，具体内容应为操作系统或应用程序中定义的有效用户名。",[38,47,76,121,143,300,305,315,295,379,342],{"fieldName":3507,"label":3508,"description":3509,"type":322,"subcate_ids":3510,"enum":330},"destUserId","目标用户ID","目标用户的唯一标识符，通常用于标识网络连接的接收方或目标用户。",[47,218,300,305,315],{"fieldName":3512,"label":3513,"description":3514,"type":322,"subcate_ids":3515,"enum":330},"relateInfo","关联信息","关联信息字段用于描述与主操作用户名存在关联关系的各类信息。其内容为由分号分隔的键值对列表，每个键值对使用冒号分隔。键通常为大写英文字母组成的标识符，值则为对应的具体信息。其中，若值为IP地址，应符合IPv4或IPv6格式；若值为URL，应符合通用URL格式规范；若值为端口，应在0-65535范围内。其他信息应使用明确的字符串表示。",[68,128,342,343],{"fieldName":3517,"label":3518,"description":3519,"type":322,"subcate_ids":3520,"enum":330},"passwd","密码","密码是用户用于验证身份或访问权限的一组秘密字符，通常为字符串类型。建议使用强密码策略，长度建议在8到128个字符之间，可包含大小写字母、数字及特殊字符。",[54,190,63,381,430,352],{"fieldName":3522,"label":3523,"description":3524,"type":322,"subcate_ids":3525,"enum":330},"destGeoAddress","目的详细地址","目的详细地址，描述网络连接接收方IP地址所对应的详细地址信息。格式为字符串，应包含国家、省/州、城市、街道等层级的详细信息，以构成一个完整的物理位置描述。",[38,54,68,76,89,94,99,104,110,116,121,128,133,138,143,150,160,165,170,175,180,185,190,195,202,207,223,247,300,305,310,315,324,63,33,295,411,379,380,381,382,325,326,383,327,213,328,329,400,412,429,342,343],{"fieldName":3527,"label":3528,"description":3529,"type":322,"subcate_ids":3530,"enum":330},"expirationTime","过期时间","域名注册有效期的截止时间，采用标准的日期时间格式表示。格式要求为 yyyy-mm-dd HH:mm:ss，例如 2024-01-15 12:00:00。",[218,369],{"fieldName":3532,"label":3533,"description":3534,"type":1673,"subcate_ids":3535,"enum":330},"alertNames","告警名称列表","告警名称列表，记录安全事件生命周期中关联的所有告警规则名称集合。该字段为字符串数组，数组内每个元素为一个告警名称字符串。",[551],{"fieldName":3537,"label":3538,"description":3539,"type":322,"subcate_ids":3540,"enum":330},"cabinetPosition","机柜位置","机柜位置用于标识资产所在机柜的物理位置。",[352,353,344,345,354,346,355,356,357,358,359,360,361,362,363,364,365,366,367,368,369,370,371,372,373],{"fieldName":3542,"label":3543,"description":3544,"type":322,"subcate_ids":3545,"enum":330},"taskName","任务名称","任务名称或标题，用于标识和识别特定任务。",[269],{"fieldName":3547,"label":3548,"description":3549,"type":322,"subcate_ids":3550,"enum":330},"middlewareName","中间件名","中间件软件的产品名称，例如：Tomcat、Nginx、Apache等。",[367],{"fieldName":3552,"label":3553,"description":3554,"type":1673,"subcate_ids":3555,"enum":330},"destAddrList","目的IP列表","目的IP列表记录安全事件中所有唯一目的IP地址的集合。该字段为数组类型，每个元素必须是合法的IPv4或IPv6地址格式。",[551],{"fieldName":3557,"label":3558,"description":3559,"type":322,"subcate_ids":3560,"enum":330},"fileOwner","文件所有者","文件的所有者用户名称，格式为字符串类型，通常为操作系统中的有效用户名，支持字母、数字、下划线等常见字符。",[229,412],{"fieldName":3562,"label":3563,"description":3564,"type":322,"subcate_ids":3565,"enum":330},"assetRegion","资产区域","资产的逻辑部署位置，例如DMZ区、内网等。",[352,353,344,345,354,346,355,356,357,358,359,360,361,362,363,364,365,366,367,368,369,370,371,372,373],{"fieldName":3567,"label":3568,"description":3569,"type":322,"subcate_ids":3570,"enum":330},"scriptPath","脚本路径","脚本路径指被执行的脚本文件在文件系统中的完整路径，其值应为有效的文件系统路径字符串，格式应符合操作系统规范，例如在Unix/Linux系统中以正斜杠（/）分隔目录，在Windows系统中以反斜杠（\\）或正斜杠（/）分隔目录。",[218,274],{"fieldName":3572,"label":3573,"description":3574,"type":322,"subcate_ids":3575,"enum":330},"hostName","主机名称","主机在网络中的标识名称，通常用于在局域网或DNS系统中识别特定设备，例如NetBIOS名称或DNS主机名。格式要求：必须为有效的字符串，允许使用字母、数字、连字符（-）和点号（.），但不得以连字符或点号开头或结尾。",[68,223,229,247,253,324,63,411,380,325,326,327,213,328,329,412,342,343,418,430,360,361,362,363,365,366,367,371],{"fieldName":3577,"label":3578,"description":3579,"type":322,"subcate_ids":3580,"enum":330},"assetGeoCountyCode","资产所在区县代码","资产物理位置区县的行政区划代码，遵循国家行政区划编码标准。",[352,353,344,345,354,346,355,356,357,358,359,360,361,362,363,364,365,366,367,368,369,370,371,372,373],{"fieldName":3582,"label":3583,"description":3584,"type":470,"subcate_ids":3585,"enum":3586},"appProtocol","应用协议","应用协议字段表示OSI模型中应用层使用的协议类型。该字段为枚举类型，取值范围应在预定义的协议标识符列表中。",[38,47,54,68,76,89,94,99,104,110,116,121,128,133,138,143,150,160,165,170,175,180,185,190,195,202,207,223,247,300,305,310,315,324,63,33,295,411,379,380,381,382,325,326,383,327,213,328,329,400,412,429,342,343,365],{"discard":3587,"auth":3589,"ssh":3591,"echo":3593,"snmp":3595,"ldaps":3597,"nntp":3599,"ldap":3601,"telnet":3603,"x11":3605,"mysql":3607,"https":3609,"radius":3611,"netbios-ns":3613,"snmptrap":3615,"wins":3617,"oracle":3619,"printer":3621,"dns":3623,"rtsp":3625,"nnsp":3627,"dhcpv6-server":3629,"ipx":3631,"netbios-dgm":3633,"pop2":3635,"pop3":3637,"chargen":3639,"http":3641,"sftp":3643,"nfs":3645,"qotd":3647,"uucp":3649,"squid":3651,"daytime":3653,"telnets":3655,"smb":3657,"bgp":3659,"tacacs":3661,"tftp":3663,"isakmp":3665,"irc":3667,"rcp":3669,"postgres":3671,"finger":3673,"ftps":3675,"imap":3677,"ftp":3679,"smtp":3681,"dhcpv6-client":3683,"ms-sql-m":3685,"ircs":3687,"ntp":3689,"ms-sql-s":3691,"bootpc":3693,"pop3s":3695,"rsync":3697,"timbuktu":3699,"nntps":3701,"sunrpc":3703,"imaps":3705,"ircd":3707,"bootps":3709,"netbios-ssn":3711,"rdp":3713},{"description":3588,"label":3588},"discard",{"description":3590,"label":3590},"auth",{"description":3592,"label":3592},"ssh",{"description":3594,"label":3594},"echo",{"description":3596,"label":3596},"snmp",{"description":3598,"label":3598},"ldaps",{"description":3600,"label":3600},"nntp",{"description":3602,"label":3602},"ldap",{"description":3604,"label":3604},"telnet",{"description":3606,"label":3606},"x11",{"description":3608,"label":3608},"mysql",{"description":3610,"label":3610},"https",{"description":3612,"label":3612},"radius",{"description":3614,"label":3614},"netbios-ns",{"description":3616,"label":3616},"snmptrap",{"description":3618,"label":3618},"wins",{"description":3620,"label":3620},"oracle",{"description":3622,"label":3622},"printer",{"description":3624,"label":3624},"dns",{"description":3626,"label":3626},"rtsp",{"description":3628,"label":3628},"nnsp",{"description":3630,"label":3630},"dhcpv6-server",{"description":3632,"label":3632},"ipx",{"description":3634,"label":3634},"netbios-dgm",{"description":3636,"label":3636},"pop2",{"description":3638,"label":3638},"pop3",{"description":3640,"label":3640},"chargen",{"description":3642,"label":3642},"http",{"description":3644,"label":3644},"sftp",{"description":3646,"label":3646},"nfs",{"description":3648,"label":3648},"qotd",{"description":3650,"label":3650},"uucp",{"description":3652,"label":3652},"squid",{"description":3654,"label":3654},"daytime",{"description":3656,"label":3656},"telnets",{"description":3658,"label":3658},"smb",{"description":3660,"label":3660},"bgp",{"description":3662,"label":3662},"tacacs",{"description":3664,"label":3664},"tftp",{"description":3666,"label":3666},"isakmp",{"description":3668,"label":3668},"irc",{"description":3670,"label":3670},"rcp",{"description":3672,"label":3672},"postgres",{"description":3674,"label":3674},"finger",{"description":3676,"label":3676},"ftps",{"description":3678,"label":3678},"imap",{"description":3680,"label":3680},"ftp",{"description":3682,"label":3682},"smtp",{"description":3684,"label":3684},"dhcpv6-client",{"description":3686,"label":3686},"ms-sql-m",{"description":3688,"label":3688},"ircs",{"description":3690,"label":3690},"ntp",{"description":3692,"label":3692},"ms-sql-s",{"description":3694,"label":3694},"bootpc",{"description":3696,"label":3696},"pop3s",{"description":3698,"label":3698},"rsync",{"description":3700,"label":3700},"timbuktu",{"description":3702,"label":3702},"nntps",{"description":3704,"label":3704},"sunrpc",{"description":3706,"label":3706},"imaps",{"description":3708,"label":3708},"ircd",{"description":3710,"label":3710},"bootps",{"description":3712,"label":3712},"netbios-ssn",{"description":3714,"label":3714},"rdp",{"fieldName":3716,"label":3717,"description":3718,"type":335,"subcate_ids":3719,"enum":330},"isCrossBorder","是否涉及出境","标识文件或数据是否涉及国家边境传输。字段类型为布尔值，取值为true或false，分别表示涉及出境和不涉及出境。",[354],{"fieldName":3721,"label":3722,"description":3723,"type":470,"subcate_ids":3724,"enum":3725},"industry","所属行业","资产所属的国民经济行业分类，用于标识资产所在领域的业务性质、监管环境和安全要求。",[352,353,344,345,354,346,355,356,357,358,359,360,361,362,363,364,365,366,367,368,369,370,371,372,373],{"insurance":3726,"medical":3729,"other":3732,"education":3734,"information_services":3737,"social_security":3740,"electric_power":3743,"judiciary":3746,"industry_commerce":3749,"telecommunications":3752,"banking":3755,"securities":3758,"agriculture":3761,"government":3764,"civil_aviation":3767,"development_reform":3770,"audit":3773,"customs":3776,"construction":3779,"railway":3782,"publicity":3785,"social_insurance":3788,"water_conservancy":3791,"energy":3794,"defense_technology":3797,"environmental_protection":3800,"public_utilities":3803,"commerce_trade":3806,"transportation":3809,"broadcasting":3812,"commercial_internet":3815,"diplomacy":3818,"public_finance":3821,"science_technology":3824,"culture":3827,"public_security":3830,"quality_supervision":3833,"postal":3836,"taxation":3839,"finance":3842,"land_resources":3845,"statistics":3848},{"description":3727,"label":3728},"从事各类保险业务经营，通过契约形式集中资金并提供风险保障的金融行业。","保险行业",{"description":3730,"label":3731},"从事疾病诊断、治疗、预防、康复以及公共卫生服务的行业。","医疗",{"description":3733,"label":448},"未包含在上述分类中的其他行业或领域。",{"description":3735,"label":3736},"从事各级各类教育、培训及相关支持服务的行业。","教育",{"description":3738,"label":3739},"从事信息技术咨询、软件开发、数据处理、系统集成及互联网平台服务等的行业。","信息服务",{"description":3741,"label":3742},"负责人力资源管理、就业服务、劳动关系协调及社会保险经办管理的行政机关。","人事劳动和社会保障",{"description":3744,"label":3745},"从事电力生产（发电）、输送（输配电）和供应的行业。","电力行业",{"description":3747,"label":3748},"负责司法行政工作，包括监狱管理、律师公证、法律援助、普法宣传等的行政机关。","司法",{"description":3750,"label":3751},"负责市场主体登记注册、市场监管、反垄断、消费者权益保护等市场监督管理的行政机关。","工商行政管理",{"description":3753,"label":3754},"从事固定及移动通信网络运营、互联网接入及信息传送服务的行业。","电信",{"description":3756,"label":3757},"从事吸收存款、发放贷款、办理结算等业务的金融中介机构。","银行",{"description":3759,"label":3760},"从事证券发行、交易、投资咨询、资产管理等业务的金融行业。","证券行业",{"description":3762,"label":3763},"从事种植业、林业、畜牧业、渔业等农业生产及相关服务的行业。","农业",{"description":3765,"label":3766},"国家各级权力机关、行政机关、司法机关等履行公共管理与服务职能的机构。","政府",{"description":3768,"label":3769},"从事民用航空运输、机场服务、空中交通管制及航空保障的行业。","民航",{"description":3771,"label":3772},"负责拟定并组织实施国民经济和社会发展战略、规划，推进经济体制改革的宏观调控部门。","发展改革",{"description":3774,"label":3775},"依法对政府及企事业单位财政、财务收支的真实、合法和效益进行独立监督的行政机关。","审计",{"description":3777,"label":3778},"负责对进出境货物、物品及运输工具进行监管、征税、缉私的国家行政机关。","海关",{"description":3780,"label":3781},"从事房屋建筑、土木工程、建筑安装及装饰装修等工程活动的行业。","建筑",{"description":3783,"label":3784},"从事国家铁路、地方铁路及城市轨道交通的运营、建设与管理的行业。","铁路",{"description":3786,"label":3787},"负责意识形态、新闻出版、思想道德建设及精神文明创建的职能领域。","宣传",{"description":3789,"label":3790},"负责养老保险、医疗保险、失业保险、工伤保险、生育保险等社会保险经办管理的机构。","社保",{"description":3792,"label":3793},"从事防洪、灌溉、供水、水力发电、水土保持等水利工程建设与管理的行业。","水利",{"description":3795,"label":3796},"从事煤炭、石油、天然气、电力、新能源等能源资源开采、生产与供应的行业。","能源",{"description":3798,"label":3799},"从事武器装备科研、生产及相关配套服务，服务于国防建设的战略性产业。","国防科技工业",{"description":3801,"label":3802},"负责环境污染防治、生态保护、环境监测与执法等环境保护管理的行政机关。","环境保护",{"description":3804,"label":3805},"面向社会提供自来水、燃气、供热、公共交通等基础性、公益性服务的行业。","公共事业",{"description":3807,"label":3808},"从事商品批发、零售、进出口贸易及相关服务的行业。","商业贸易",{"description":3810,"label":3811},"从事旅客和货物运输、仓储及交通辅助服务的行业。","交通",{"description":3813,"label":3814},"从事广播、电视节目制作、播出、传输以及相关网络视听服务的行业。","广电",{"description":3816,"label":3817},"指向社会公众提供互联网信息服务的营利性企业。","经营性公众互联网",{"description":3819,"label":3820},"负责处理国家对外关系、维护国家主权与利益、开展国际交流与合作的行政机关。","外交",{"description":3822,"label":3823},"负责政府收支、财税政策、国有资产管理等宏观经济管理的行政机关。","财政",{"description":3825,"label":3826},"从事科学研究、技术开发、成果转化及高新技术产业化的领域。","科技行业",{"description":3828,"label":3829},"从事新闻出版、广播影视、文化艺术、文物保护等文化事业与产业的领域。","文化",{"description":3831,"label":3832},"承担维护国家安全和社会治安秩序、打击犯罪等职能的行政机关。","公安",{"description":3834,"label":3835},"负责产品质量、计量、标准化、认证认可及出入境检验检疫监督管理的行政机关。","质量监督检验检疫",{"description":3837,"label":3838},"从事信件、包裹等邮件寄递以及邮政金融、快递物流服务的行业。","邮政",{"description":3840,"label":3841},"负责税收征收、管理和稽查的国家行政机关。","税务",{"description":3843,"label":3844},"从事资金融通、信用活动及相关金融服务的行业总称，包括银行、证券、保险等。","金融",{"description":3846,"label":3847},"负责土地、矿产、海洋等自然资源规划、管理、保护与合理利用的行政机关。","国土资源",{"description":3849,"label":3850},"负责组织实施国民经济和社会发展情况统计调查、分析与发布的行政机关。","统计",{"fieldName":3852,"label":3853,"description":3854,"type":322,"subcate_ids":3855,"enum":330},"busSystemVersion","业务系统版本","业务系统的具体版本号，格式为字符串类型，通常采用主版本号.次版本号.修订号的格式。",[358],{"fieldName":3857,"label":3858,"description":3859,"type":322,"subcate_ids":3860,"enum":330},"appletName","小程序名称","小程序产品的名称标识，用于区分不同的小程序产品。",[356],{"fieldName":3862,"label":3863,"description":3864,"type":322,"subcate_ids":3865,"enum":330},"cve","CVE编号","该字段表示通用漏洞披露(CVE)标准漏洞标识符，用于唯一标识一个公开的网络安全漏洞。其格式必须严格遵循“CVE-YYYY-NNNN…”模式，其中YYYY为4位数字的年份，NNNN…为漏洞在该年份中的序列号（数字位数不固定）。例如：CVE-2012-3152。",[411,381,84,418,384],{"fieldName":3867,"label":3868,"description":3869,"type":322,"subcate_ids":3870,"enum":330},"osVersion","操作系统版本","操作系统版本号，描述设备运行的操作系统的具体版本信息。通常由主版本号、次版本号、修订号等部分组成。",[84,418,430,384,360,361,362],{"fieldName":3872,"label":3873,"description":3874,"type":322,"subcate_ids":3875,"enum":330},"threatActorOrgId","威胁组织ID","威胁情报IOC所属组织或家族的唯一标识符，通常采用UUID格式的字符串，由32位十六进制数字组成。",[],{"fieldName":3877,"label":3878,"description":3879,"type":322,"subcate_ids":3880,"enum":330},"requestUrl","请求URL","该字段表示HTTP请求URL中从根路径'/'开始到查询字符串'?'之前的部分，用于标识请求的资源路径。其值必须是一个合法的URL路径字符串，通常以'/'开头，不应包含协议、域名、端口或查询参数（即'?'及之后的内容）。字符串内容应符合URL路径的通用规范，可以包含字母、数字以及特定的安全字符（如-._~!$&'()*+,;=:@%）。",[38,54,68,76,150,63,33,379,380,381,382,383,400,342,343,384,353],{"fieldName":3882,"label":3883,"description":3884,"type":1673,"subcate_ids":3885,"enum":330},"securityGroupIds","安全组ID列表","该字段表示云服务商分配的网络安全组（Security Group）的唯一标识符列表。",[372],{"fieldName":3887,"label":3888,"description":3889,"type":322,"subcate_ids":3890,"enum":330},"assetUserPhone","资产使用人联系手机号","资产使用人的联系手机号，用于安全联络，必须符合手机号码格式规范。",[352,353,344,345,354,346,355,356,357,358,359,360,361,362,363,364,365,366,367,368,369,370,371,372,373],{"fieldName":3892,"label":3893,"description":3894,"type":322,"subcate_ids":3895,"enum":330},"failReason","失败原因","记录操作失败的具体技术原因和上下文信息，通常为字符串文本，用于说明导致失败的详细技术细节或环境因素。",[47],{"fieldName":3897,"label":3898,"description":3899,"type":322,"subcate_ids":3900,"enum":330},"fileGroup","文件所属组","文件或目录的所有权归属组，表示文件在系统中的组权限归属。",[229,412],{"fieldName":3902,"label":3903,"description":3904,"type":322,"subcate_ids":3905,"enum":330},"vulDetector","漏洞发现者","漏洞发现者字段记录首次发现并报告该漏洞的个人、组织或研究团队的名称。",[411,381],{"fieldName":3907,"label":3908,"description":3909,"type":1673,"subcate_ids":3910,"enum":330},"participants","参与人","该字段记录参与安全事件响应和处理的所有相关人员列表，存储格式为字符串数组。",[551],{"fieldName":3912,"label":3913,"description":3914,"type":1917,"subcate_ids":3915,"enum":330},"bytesOut","响应字节数","响应字节数，用于统计服务器响应消息的字节总量。该字段为长整型数值，其值必须为非负整数，表示字节数。",[38,68,121,138,150,180,33,429,342],{"fieldName":3917,"label":3918,"description":3919,"type":322,"subcate_ids":3920,"enum":330},"vmName","虚拟机名称","虚拟机在虚拟化环境中的可读标识名称，用于唯一区分不同的虚拟机实例。格式为字符串类型，通常由字母、数字、连字符（-）或下划线（_）组成。",[364],{"fieldName":3922,"label":3923,"description":3924,"type":322,"subcate_ids":3925,"enum":330},"vulName","漏洞名称","漏洞的标准化描述性名称，用于唯一标识特定漏洞类型。通常遵循行业通用命名规范，如CVE编号、CNVD编号或厂商公开的漏洞公告名称。",[411,381,84,418,384],{"fieldName":3927,"label":3928,"description":3929,"type":335,"subcate_ids":3930,"enum":330},"isCriticalInfra","是否关基资产","表示资产是否属于国家标准定义的关键基础设施。该字段为布尔类型，仅接受 true 或 false 两种取值。",[352,353,344,345,354,346,355,356,357,358,359,360,361,362,363,364,365,366,367,368,369,370,371,372,373],{"fieldName":3932,"label":3933,"description":3934,"type":322,"subcate_ids":3935,"enum":330},"registrarEmail","注册商邮箱","注册商邮箱是域名注册商的官方联系邮箱地址。该字段应遵循标准邮箱地址格式，包含有效的用户名和域名部分，使用@符号分隔，且域名部分应包含有效的顶级域名。",[369],{"fieldName":3937,"label":3938,"description":3939,"type":322,"subcate_ids":3940,"enum":330},"sessionId","会话ID","会话ID用于标识网络连接或应用会话的唯一全局标识符。",[],{"fieldName":3942,"label":3943,"description":3944,"type":322,"subcate_ids":3945,"enum":330},"storageLimit","存储限制","可使用的存储资源上限，需指定数值和单位，支持Gi、Ti等单位，例如10Gi表示10吉字节。格式要求为数字后接单位标识，单位需大写，如Gi、Ti，数值需为正数。",[363],{"fieldName":3947,"label":3948,"description":3949,"type":322,"subcate_ids":3950,"enum":330},"licenseKey","许可密钥","许可密钥是用于验证用户合法使用软件或硬件产品的唯一识别码。其格式通常为一系列由连字符分隔的字母数字组合，示例格式如：XXXXX-XXXXX-XXXXX-XXXXX-XXXXX。",[365],{"fieldName":3952,"label":3953,"description":3954,"type":335,"subcate_ids":3955,"enum":330},"isCriticalProtection","是否等保资产","表示资产是否被归类为需要特殊保护措施的关键基础设施。该字段为布尔类型，取值为 true 或 false。",[352,353,344,345,354,346,355,356,357,358,359,360,361,362,363,364,365,366,367,368,369,370,371,372,373],{"fieldName":3957,"label":3958,"description":3959,"type":322,"subcate_ids":3960,"enum":330},"taskContent","任务内容","任务内容字段用于描述计划任务的具体内容或配置信息，通常包含命令、脚本路径及参数。",[269],{"fieldName":3962,"label":3963,"description":3964,"type":335,"subcate_ids":3965,"enum":330},"isClassified","是否涉密","表示资产是否包含或处理涉密信息。该字段为布尔类型，取值必须为 true 或 false，分别代表“是”与“否”。",[352,353,344,345,354,346,355,356,357,358,359,360,361,362,363,364,365,366,367,368,369,370,371,372,373],{"fieldName":3967,"label":3968,"description":3969,"type":322,"subcate_ids":3970,"enum":330},"endTime","结束时间","记录事件活动结束的精确时间。时间格式必须为标准的日期时间字符串，格式为yyyy-mm-dd HH:mm:ss。",[38,47,54,68,76,89,94,99,104,110,116,121,128,133,138,143,150,160,165,170,175,180,185,190,195,202,207,218,223,229,237,242,247,253,259,264,269,274,279,284,289,300,305,310,315,324,63,33,295,411,379,380,381,382,325,326,383,327,213,328,329,400,412,429,342,343,84,418,430,384],{"fieldName":3972,"label":3973,"description":3974,"type":513,"subcate_ids":3975,"enum":330},"finCount","FIN包数量","统计TCP连接正常终止过程中发送的结束(FIN)数据包数量。该字段为非负整数，表示FIN包的数量。",[33],{"fieldName":3977,"label":3978,"description":3979,"type":322,"subcate_ids":3980,"enum":330},"operation","操作","该字段标识系统或用户执行的具体操作行为。其值为描述操作类型的字符串。",[],{"fieldName":3982,"label":3983,"description":3984,"type":1917,"subcate_ids":3985,"enum":330},"dataSetSize","数据集大小","数据集大小，指SQL查询返回的结果数据集在内存或网络传输中的估算大小，通常以字节为单位。该字段值为长整型（long），表示一个非负整数。",[68,128,342,343],{"fieldName":3987,"label":3988,"description":3989,"type":470,"subcate_ids":3990,"enum":3991},"IoCType","情报分类","该字段表示威胁情报指标的类型，用于分类不同的威胁情报数据。格式要求：必须为预定义的枚举值之一，包括url（URL地址）、ip（IP地址）、file（文件哈希）、email（邮箱地址）和domain（域名）。",[324,325,326,327,213,328,329],{"file":3992,"ip":3995,"domain":3997,"url":3999,"email":4001},{"description":3993,"label":3994},"恶意软件、可疑文件的密码学哈希值，包括MD5、SHA1、SHA256等算法","文件哈希",{"description":3996,"label":3363},"恶意活动相关的IPv4或IPv6地址，常用于命令控制服务器或攻击源标识",{"description":3998,"label":3381},"恶意软件命令控制、网络钓鱼或欺诈活动使用的域名",{"description":4000,"label":2012},"恶意软件分发、钓鱼攻击或命令控制服务器使用的统一资源定位符",{"description":4002,"label":4003},"网络钓鱼、垃圾邮件或社会工程攻击中使用的电子邮件地址","邮箱地址",{"fieldName":4005,"label":4006,"description":4007,"type":322,"subcate_ids":4008,"enum":330},"registrationTime","注册时间","域名在注册商系统中成功注册的精确时间。格式要求：必须为符合ISO 8601扩展格式的日期时间字符串，具体格式为yyyy-mm-dd HH:mm:ss。",[369],{"fieldName":4010,"label":4011,"description":4012,"type":322,"subcate_ids":4013,"enum":330},"fileDescription","文件描述","文件描述字段用于记录文件或进程的功能或用途信息。",[237],{"fieldName":4015,"label":4016,"description":4017,"type":322,"subcate_ids":4018,"enum":330},"serviceType","服务类型","服务类型，用于标识在网络侧通过端口暴露或在终端侧操作系统内部运行的应用程序服务类型。",[190,289,295,371],{"fieldName":4020,"label":4021,"description":4022,"type":335,"subcate_ids":4023,"enum":330},"fileEncrypted","文件是否加密","该字段标识文件内容是否经过加密算法保护。该字段为布尔类型，仅允许取值为 true 或 false，分别表示文件已加密和文件未加密。",[229,342],{"fieldName":4025,"label":4026,"description":4027,"type":322,"subcate_ids":4028,"enum":330},"techniqueName","ATT&CK技术名称","ATT&CK技术名称，指攻击行为在MITRE ATT&CK框架中对应的具体攻击技术的名称。该字段为字符串类型，其值应符合MITRE ATT&CK官方技术命名规范，通常为英文短语或特定术语，例如“Phishing”。",[324,63,33,295,411,379,380,381,382,325,326,383,327,213,328,329,400,412,429,342,343,84,418,430,384],{"fieldName":4030,"label":4031,"description":4032,"type":322,"subcate_ids":4033,"enum":330},"cpuModel","CPU型号","CPU型号，表示中央处理器的具体型号规格，包含厂商、架构和型号等信息。",[360,361,362,364,372],{"fieldName":4035,"label":4036,"description":4037,"type":322,"subcate_ids":4038,"enum":330},"deviceReceiptTime","设备接收时间","该字段记录设备采集器本地接收并生成日志事件的精确时间。时间格式必须为标准的日期时间字符串，格式为yyyy-mm-dd HH:mm:ss。",[38,47,54,68,76,89,94,99,104,110,116,121,128,133,138,143,150,160,165,170,175,180,185,190,195,202,207,218,223,229,237,242,247,253,259,264,269,274,279,284,289,300,305,310,315,324,63,33,295,411,379,380,381,382,325,326,383,327,213,328,329,400,412,429,342,343,84,418,430,384],{"fieldName":4040,"label":4041,"description":4042,"type":322,"subcate_ids":4043,"enum":330},"modifyTime","修改时间","修改时间表示文件或对象的最后修改时间。该字段为字符串类型，必须遵循标准的日期时间格式，格式为：yyyy-mm-dd HH:mm:ss。",[],{"fieldName":4045,"label":4046,"description":4047,"type":322,"subcate_ids":4048,"enum":330},"responseAddress","返回的IP地址","该字段记录DNS查询响应中返回的IP地址信息。其值必须符合IP地址的标准格式，即IPv4点分十进制格式（如：192.168.1.1）或IPv6格式（如：2001:0db8:85a3:0000:0000:8a2e:0370:7334）。",[138,223,412],{"fieldName":4050,"label":4051,"description":4052,"type":513,"subcate_ids":4053,"enum":330},"timesPermin","尝试频率","统计每分钟内特定操作或认证尝试的次数。该字段为整数类型，表示事件发生的频率计数，取值应大于等于0。",[63,380],{"fieldName":4055,"label":4056,"description":4057,"type":322,"subcate_ids":4058,"enum":330},"primaryGroupId","主要组ID","主要组ID是用户所属主要组的唯一标识符，格式为字符串，通常由数字组成，用于唯一标识用户的主要组。",[218],{"fieldName":4060,"label":4061,"description":4062,"type":470,"subcate_ids":4063,"enum":4064},"unitRole","单位角色","资产所属单位的功能角色分类。",[352,353,344,345,354,346,355,356,357,358,359,360,361,362,363,364,365,366,367,368,369,370,371,372,373],{"collaborative_unit":4065,"general_unit":4068,"key_unit":4071,"regulatory_unit":4074},{"description":4066,"label":4067},"在特定事务或项目中与主管单位紧密配合，承担协同执行或联合管理职责的相关单位。","协同单位",{"description":4069,"label":4070},"在管理体系内遵循常规管理要求，承担标准安全责任与义务的一般性单位。","普通单位",{"description":4072,"label":4073},"因业务重要性、系统关键性或安全风险较高等因素，需要被重点管理和保障的核心单位。","重点单位",{"description":4075,"label":4076},"在管理体系内承担主要监管、指导或审批职责的上级或主管单位。","监管单位",{"fieldName":4078,"label":4079,"description":4080,"type":322,"subcate_ids":4081,"enum":330},"icp","ICP备案号","ICP备案号是工业和信息化部颁发的互联网内容提供商备案编号，用于标识在中国境内提供互联网信息服务的合法备案主体。该字段为字符串类型，格式通常为“省份简称+ICP备+数字序列+号”。",[359,369],{"fieldName":4083,"label":4084,"description":4085,"type":322,"subcate_ids":4086,"enum":330},"officialAccountName","公众号名称","公众号的官方认证名称，表示在微信公众平台上经过认证的公众号名称。",[357],{"fieldName":4088,"label":4089,"description":4090,"type":513,"subcate_ids":4091,"enum":330},"processCount","进程数","该字段表示当前系统或资产上与特定事件或资产相关联的正在运行的进程总数。格式要求：必须为非负整数。",[],{"fieldName":4093,"label":4094,"description":4095,"type":322,"subcate_ids":4096,"enum":330},"vlanId","VLAN","VLAN标识符，用于唯一标识IEEE 802.1Q虚拟局域网。格式为字符串类型，表示一个数字ID。",[370],{"fieldName":4098,"label":4099,"description":4100,"type":470,"subcate_ids":4101,"enum":4102},"tiCategory","威胁情报分类","威胁情报分类，表示威胁情报IOC的情报分类。该字段为枚举类型，必须从预定义的可选值中选择一个，例如：/WhiteList（白名单）、/C2（C&C地址）、/Malware（恶意通信地址）、/PUA（不受欢迎地址）、/Exploit（漏洞利用）等。",[324,325,326,327,213,328,329],{"/Malware":4103,"/Phishing":4106,"/Compromised":4108,"/Info":4110,"/Spam":4113,"/Suspicious":4115,"/BruteForce":4118,"/WhiteList":4120,"/Others":4122,"/Spider":4125,"/Scanner":4127,"/PUA":4129,"/Exploit":4132,"/C2":4135},{"description":4104,"label":4105},"与恶意软件相关的通信地址，包括病毒、蠕虫、勒索软件等下载或更新服务器","恶意通信地址",{"description":4107,"label":2278},"网络钓鱼网站或邮件服务器地址，伪装成可信实体骗取敏感信息",{"description":4109,"label":2350},"已被入侵的主机地址，被攻击者控制用于发起进一步攻击",{"description":4111,"label":4112},"上下文信息类威胁情报，包括攻击组织、战术技术和程序等信息","信息类情报",{"description":4114,"label":2386},"垃圾邮件或垃圾信息源地址，发送未经请求的批量商业或恶意信息",{"description":4116,"label":4117},"行为异常或具有潜在威胁的指标，需要进一步安全分析和调查","可疑类情报",{"description":4119,"label":43},"暴力破解攻击源地址，系统化尝试猜测认证凭证和密码",{"description":4121,"label":2341},"可信实体或指标列表，用于减少误报和排除合法流量",{"description":4123,"label":4124},"不属于上述标准分类的其他类型威胁情报指标","其他类情报",{"description":4126,"label":2329},"网络爬虫或机器人地址，自动抓取网页内容可能用于信息收集",{"description":4128,"label":2332},"网络扫描活动源地址，探测网络漏洞、开放端口和服务信息",{"description":4130,"label":4131},"可能不需要的应用程序相关地址，虽非恶意但可能带来隐私或安全风险","不受欢迎地址",{"description":4133,"label":4134},"漏洞利用工具或攻击代码相关地址，用于软件漏洞攻击和权限提升","漏洞利用",{"description":4136,"label":4137},"命令与控制服务器地址，恶意软件与攻击者通信的控制通道","C&C地址",{"fieldName":4139,"label":4140,"description":4141,"type":322,"subcate_ids":4142,"enum":330},"startAddress","起始地址","起始地址是新线程开始执行的内存虚拟地址，指向线程代码的入口点。格式要求为十六进制字符串，通常以\"0x\"前缀开头，后跟十六进制数字（0-9， a-f）。",[264,412],{"fieldName":4144,"label":4145,"description":4146,"type":322,"subcate_ids":4147,"enum":330},"homePath","主目录路径","该字段表示用户主目录的本地路径或环境变量解析路径。其值应为符合操作系统规范的文件系统路径字符串，可以包含盘符、目录分隔符（如反斜杠`\\`或正斜杠`/`）以及环境变量引用（例如`%USERPROFILE%`或`$HOME`）。",[218],{"fieldName":4149,"label":4150,"description":4151,"type":322,"subcate_ids":4152,"enum":330},"idc","IDC服务商","该字段表示托管资产的互联网数据中心(IDC)的服务提供商名称。字段值为字符串类型，需使用规范、完整的数据中心服务商名称。",[372,373],{"fieldName":4154,"label":4155,"description":4156,"type":322,"subcate_ids":4157,"enum":330},"deviceSerialNumber","设备序列号","设备序列号是硬件设备制造商分配的唯一序列标识符，用于唯一标识设备。",[360,361,362,367],{"fieldName":4159,"label":4160,"description":4161,"type":322,"subcate_ids":4162,"enum":330},"backupPolicy","备份策略","备份策略配置，用于定义数据备份和恢复的执行规则与计划。格式为字符串类型，通常包含策略的启用状态、备份频率、保留周期等具体配置信息。",[373],{"fieldName":4164,"label":4165,"description":4166,"type":322,"subcate_ids":4167,"enum":330},"authPackageName","认证包名称","认证包名称是Windows安全支持提供程序接口(SSPI)使用的身份验证包名称，用于标识特定的认证机制。该字段为字符串类型，需符合Windows SSPI的规范定义。",[],{"fieldName":4169,"label":4170,"description":4171,"type":322,"subcate_ids":4172,"enum":330},"name","概要名称","概要名称是日志或告警的简要标题或标识，用于快速识别事件内容。该字段为字符串类型，需保持简洁明了。",[38,47,54,68,76,89,94,99,104,110,116,121,128,133,138,143,150,160,165,170,175,180,185,190,195,202,207,218,223,229,237,242,247,253,259,264,269,274,279,284,289,300,305,310,315,324,63,33,295,411,379,380,381,382,325,326,383,327,213,328,329,400,412,429,342,343,84,418,430,384],{"fieldName":4174,"label":4175,"description":4176,"type":322,"subcate_ids":4177,"enum":330},"shareName","共享名称","共享资源的名称，用于标识可通过网络访问的共享资源（例如文件共享、打印机）。该字段为字符串类型，其格式通常遵循Windows网络共享的通用命名约定（UNC）。",[76,195],{"fieldName":4179,"label":4180,"description":4181,"type":322,"subcate_ids":4182,"enum":330},"ticketHash","票据哈希","该字段存储Kerberos认证协议中经过哈希算法处理后的凭证特征值，用于唯一标识认证票据。其值为一个固定长度的字符串，通常由特定哈希算法（如SHA-256）生成，表现为一个十六进制编码的哈希值。",[160],{"fieldName":4184,"label":4185,"description":4186,"type":322,"subcate_ids":4187,"enum":330},"compatibility","兼容性","该字段描述软件或硬件产品与操作系统版本的兼容性范围。通常以文本形式说明支持的操作系统名称、版本号及架构要求。",[355],{"fieldName":4189,"label":4190,"description":4191,"type":322,"subcate_ids":4192,"enum":330},"wmiConsumer","WMI消费者","该字段表示处理WMI事件的消费者名称。其值通常为包含消费者名称的字符串，格式应符合WMI事件消费者对象的命名规范。",[],{"fieldName":4194,"label":4195,"description":4196,"type":322,"subcate_ids":4197,"enum":330},"vulCode","漏洞编号","漏洞编号，指按照CNVD、CNNVD等国家标准漏洞库定义的格式进行标识的漏洞唯一标识符。格式需符合相应标准编号规范，通常为“标准前缀-年份-序列号”的结构，例如CNVD-YYYY-XXXXX或CNNVD-YYYY-XXX。",[411,381],{"fieldName":4199,"label":4200,"description":4201,"type":1917,"subcate_ids":4202,"enum":330},"bytesInAndOut","总字节数","该字段用于统计网络接口或会话中双向传输的字节累计总量，即入站与出站字节数之和。其值为长整型（long）数字，表示字节数量，必须为非负整数。",[33,429],{"fieldName":4204,"label":4205,"description":4206,"type":470,"subcate_ids":4207,"enum":4208},"passwordComplexity","密码复杂度","密码策略的复杂度等级，用于定义密码必须满足的复杂性要求。取值必须为预定义的枚举值之一：Low (低复杂度)、Medium (中等复杂度) 或 High (高复杂度)。",[],{"High":4209,"Low":4212,"Medium":4215},{"description":4210,"label":4211},"要求大小写字母、数字和特殊字符组合，高强度安全要求","高复杂度",{"description":4213,"label":4214},"基础密码要求，通常仅要求最小长度","低复杂度",{"description":4216,"label":4217},"要求混合字符类型（字母+数字），中等长度要求","中等复杂度",{"fieldName":4219,"label":4220,"description":4221,"type":513,"subcate_ids":4222,"enum":330},"connectCount","连接数量","连接数量是指统计当前活跃的网络连接会话总数。该字段为整数类型，取值范围为0到4294967295，代表非负的连接数量统计值。",[],{"fieldName":4224,"label":4225,"description":4226,"type":322,"subcate_ids":4227,"enum":330},"assetGeoCity","资产所处城市","资产当前所在的城市名称，使用字符串格式表示。",[352,353,344,345,354,346,355,356,357,358,359,360,361,362,363,364,365,366,367,368,369,370,371,372,373],{"fieldName":4229,"label":4230,"description":4231,"type":470,"subcate_ids":4232,"enum":4233},"licenseType","许可类型","许可类型标识软件许可证的法律授权类型，该字段为枚举类型，必须从以下预定义值中选择其一：PublicDomain（公共领域许可）、Permissive（宽松许可）、LGPL（GNU宽通用公共许可）、Copyleft（著佐权许可）、Proprietary（专有许可），或其他（Other）。取值必须与示例值格式完全一致。",[365],{"Copyleft":4234,"Copyright":4237,"LGPL":4240,"Permissive":4243,"Proprietary":4246,"PublicDomain":4249},{"description":4235,"label":4236},"要求衍生作品保持相同授权的许可证，如GPL","著佐权许可",{"description":4238,"label":4239},"保留所有权利的版权声明，需明确授权才能使用","版权保留许可",{"description":4241,"label":4242},"GNU较宽松公共许可证，允许与专有软件链接","GNU宽通用公共许可",{"description":4244,"label":4245},"限制极少的开源许可证，如MIT、BSD、Apache许可证","宽松许可",{"description":4247,"label":4248},"传统商业软件许可，限制复制、修改和再分发","专有许可",{"description":4250,"label":4251},"作品已进入公共领域，无版权限制，可自由使用","公共领域许可",{"fieldName":4253,"label":4254,"description":4255,"type":1673,"subcate_ids":4256,"enum":330},"scanIpList","扫描IP列表","记录网络扫描活动中被探测的目标IP地址集合。格式要求：数组中的每个元素必须是合法的IPv4或IPv6地址格式。",[380],{"fieldName":4258,"label":4259,"description":4260,"type":322,"subcate_ids":4261,"enum":330},"destServiceName","目标服务名称","该字段表示被访问或引用的目标服务名称，例如主机名、数据库实例名或应用服务标识。",[47],{"fieldName":4263,"label":4264,"description":4265,"type":322,"subcate_ids":4266,"enum":330},"transMode","传输模式","数据传输采用的协议模式，通常用于指定文件传输或数据交换的协议格式。本字段为字符串类型，常见取值为表示特定传输模式的标识符，例如 \"netascii\"（网络ASCII模式）、\"octet\"（二进制八位字节模式）或 \"mail\"（邮件模式）。",[76,202],{"fieldName":4268,"label":4269,"description":4270,"type":322,"subcate_ids":4271,"enum":330},"ruleName","规则名称","规则名称是安全规则的描述性标识。该字段为字符串类型，建议使用简洁、明确且能概括规则内容的名称。名称中可包含漏洞编号、攻击类型或防护对象等关键信息，以提高可读性和识别度。",[324,63,33,295,411,379,380,381,382,325,326,383,327,213,328,329,400,412,429,342,343,84,418,430,384],{"fieldName":4273,"label":4274,"description":4275,"type":1917,"subcate_ids":4276,"enum":330},"pktsOut","流出数据包数","流出数据包数，用于统计网络接口或会话发送的出方向数据包总数。该字段值为非负长整型数值。",[121,33,429],{"fieldName":4278,"label":4279,"description":4280,"type":322,"subcate_ids":4281,"enum":330},"closeUser","关闭操作者","该字段标识执行事件关闭操作的用户或系统实体。其值为字符串类型，用于记录关闭操作的发起者。",[551],{"fieldName":4283,"label":4284,"description":4285,"type":470,"subcate_ids":4286,"enum":4287},"machineType","机器类型","标识设备的物理形态特征、部署架构和运行环境类型。本字段为枚举类型，有效值包括但不限于：physicalServer（物理服务器）、virtualMachine（虚拟机）、container（容器）、cloudInstance（云实例）、workstation（工作站）等预定义选项，需从中选择其一。",[360,361],{"virtualMachine":4288,"container":4290,"networkDevice":4292,"iotDevice":4295,"other":4298,"storageDevice":4300,"mobileDevice":4303,"cloudInstance":4306,"workstation":4309,"securityDevice":4312,"physicalServer":4315,"laptop":4318},{"description":4289,"label":3384},"在虚拟化平台上运行的虚拟化实例",{"description":4291,"label":3337},"容器化运行环境实例",{"description":4293,"label":4294},"交换机、路由器等网络基础设施设备","网络设备",{"description":4296,"label":4297},"物联网终端和边缘计算设备","物联网设备",{"description":4299,"label":1611},"未分类的其他设备类型",{"description":4301,"label":4302},"NAS、SAN等专用存储设备","存储设备",{"description":4304,"label":4305},"智能手机、平板等移动终端","移动设备",{"description":4307,"label":4308},"云服务商提供的计算实例","云实例",{"description":4310,"label":4311},"桌面工作站设备","工作站",{"description":4313,"label":4314},"防火墙、IDS/IPS等专用安全设备","安全设备",{"description":4316,"label":4317},"独立物理硬件设备，部署在本地数据中心","物理服务器",{"description":4319,"label":4320},"便携式移动计算设备","笔记本电脑",{"fieldName":4322,"label":4323,"description":4324,"type":322,"subcate_ids":4325,"enum":330},"departmentHeadPhone","部门负责人手机号","部门负责人的手机号码。格式要求：必须是有效的手机号码格式。",[352,353,344,345,354,346,355,356,357,358,359,360,361,362,363,364,365,366,367,368,369,370,371,372,373],{"fieldName":4327,"label":4328,"description":4329,"type":322,"subcate_ids":4330,"enum":330},"destGeoCity","目的城市","目的城市是指网络连接接收方IP地址所对应的城市级别行政区域名称。该字段为字符串类型，需使用标准城市名称。",[38,54,68,76,89,94,99,104,110,116,121,128,133,138,143,150,160,165,170,175,180,185,190,195,202,207,223,247,300,305,310,315,324,63,33,295,411,379,380,381,382,325,326,383,327,213,328,329,400,412,429,342,343],{"fieldName":4332,"label":4333,"description":4334,"type":470,"subcate_ids":4335,"enum":4336},"shareProperty","共享属性","共享属性用于定义各类资产的共享权限和范围分类。本字段为枚举类型，其值必须为预定义的选项之一，不可随意填写。可选值包括：no_sharing (禁止共享)、internal_share (内部共享)、department_share (部门共享)、partner_share (合作伙伴共享)、public_share (公开共享)。",[353],{"department_share":4337,"internal_share":4340,"no_sharing":4343,"public_share":4346,"conditional_share":4349,"partner_share":4352},{"description":4338,"label":4339},"资产可在特定部门或业务单元内共享","部门共享",{"description":4341,"label":4342},"资产可在组织内部共享，但禁止向外部提供","内部共享",{"description":4344,"label":4345},"资产禁止任何形式的共享，仅限所有者使用","禁止共享",{"description":4347,"label":4348},"资产可对外公开共享，需符合相关法律法规","公开共享",{"description":4350,"label":4351},"资产在满足特定条件时可共享，如认证授权后","条件共享",{"description":4353,"label":4354},"资产可与授权的业务合作伙伴共享","合作伙伴共享",{"fieldName":4356,"label":4357,"description":4358,"type":513,"subcate_ids":4359,"enum":330},"severity","安全威胁等级","标识日志或告警的安全威胁严重程度等级。该字段为整型数值，取值范围为0至10，每个数值对应特定的威胁级别：0表示无风险，1-3表示低危，4-6表示中危，7-9表示高危，10表示危急。",[38,47,54,68,76,89,94,99,104,110,116,121,128,133,138,143,150,160,165,170,175,180,185,190,195,202,207,218,223,229,237,242,247,253,259,264,269,274,279,284,289,300,305,310,315,324,63,33,295,411,379,380,381,382,325,326,383,327,213,328,329,400,412,429,342,343,84,418,430,384],{"fieldName":4361,"label":4362,"description":4363,"type":322,"subcate_ids":4364,"enum":330},"webServerSoftware","Web服务器软件","该字段表示网站服务运行的服务器软件名称，例如Nginx、Apache等。",[384],{"fieldName":4366,"label":4367,"description":4368,"type":470,"subcate_ids":4369,"enum":4370},"mailType","邮件格式","该字段标识邮件内容的格式类型，其值为枚举类型，必须在指定的枚举值范围内取值，包括：text（纯文本格式）、html（HTML格式）、multipart（多部分格式）以及others（其他格式）。",[143,295,379],{"multipart":4371,"html":4374,"text":4377,"others":4380},{"description":4372,"label":4373},"邮件内容包含多个部分，如文本、HTML和附件","多部分格式",{"description":4375,"label":4376},"邮件内容为HTML格式，可能包含富文本和脚本","HTML格式",{"description":4378,"label":4379},"邮件内容为纯文本格式","纯文本",{"description":4381,"label":4382},"其他邮件内容格式，如富文本格式等","其他格式",{"fieldName":4384,"label":4385,"description":4386,"type":322,"subcate_ids":4387,"enum":330},"memorySize","内存大小","内存的总容量信息，表示目标系统或设备的内存大小。格式为数值加单位，单位通常为GB、MB等，例如：3.68GB。",[360,361,362,363,364,372],{"fieldName":4389,"label":4390,"description":4391,"type":322,"subcate_ids":4392,"enum":330},"mailContent","邮件内容","邮件的主要文本内容体，包含邮件的详细信息和通信内容。",[143,295,379,342],{"fieldName":4394,"label":4395,"description":4396,"type":322,"subcate_ids":4397,"enum":330},"cnnvd","CNNVD漏洞标识符","中国国家信息安全漏洞库(CNNVD)颁发的漏洞唯一标识符。该标识符遵循特定的命名格式，通常以“CNNVD-”为前缀，后接年份和月份（格式为YYYYMM），最后是三位数字的序列号，各部分之间用连字符“-”连接。完整的标准格式为：CNNVD-YYYYMM-NNN，其中NNN代表从001开始的三位顺序编号。",[84,418,384],{"fieldName":4399,"label":4400,"description":4401,"type":322,"subcate_ids":4402,"enum":330},"incidentDataSource","安全事件数据源","安全事件数据源字段用于标识安全事件数据的原始来源系统和检测机制，例如安全设备、日志系统、威胁情报平台或人工报告等。",[551],{"fieldName":4404,"label":4405,"description":4406,"type":335,"subcate_ids":4407,"enum":330},"publicFile","是否公开文件","该字段用于标识文件是否对外公开可访问。取值为布尔类型，仅接受 `true` 或 `false`。`true` 表示文件对外公开，`false` 表示文件不对外公开。",[354],{"fieldName":4409,"label":4410,"description":4411,"type":513,"subcate_ids":4412,"enum":330},"listenPort","监听端口","监听端口是服务进程监听的网络端口号，用于接收和处理网络连接请求。端口号必须是整数类型，取值范围为0到65535。",[344],{"fieldName":4414,"label":4415,"description":4416,"type":470,"subcate_ids":4417,"enum":4418},"fileType","文件类型","文件类型，基于文件格式和扩展名进行分类。其值为预定义的枚举字符串，包括但不限于：Executable（可执行文件）、Script（脚本文件）、Document（文档文件）、Archive（压缩归档）、Configuration（配置文件）等共10个可选值。取值必须严格匹配预定义的枚举值。",[229,324,412,342,343,354],{"Script":4419,"Archive":4422,"Configuration":4425,"Log":4428,"Media":4431,"Database":4434,"Executable":4437,"Document":4440,"System":4443,"Other":4446},{"description":4420,"label":4421},"需要解释器执行的脚本文件，如PS1、JS、PY等","脚本文件",{"description":4423,"label":4424},"压缩和归档文件，如ZIP、RAR、TAR等","压缩归档",{"description":4426,"label":4427},"系统和应用配置文件，如XML、JSON、CONF等","配置文件",{"description":4429,"label":4430},"系统和应用程序日志文件，如LOG、EVTX、AUDIT等","日志文件",{"description":4432,"label":4433},"图像、音频、视频文件，如JPG、MP4、MP3等","媒体文件",{"description":4435,"label":4436},"数据库相关文件，如MDF、DB、SQL等","数据库文件",{"description":4438,"label":4439},"可直接执行的程序文件，如EXE、DLL、BAT等","可执行文件",{"description":4441,"label":4442},"办公文档和文本文件，如PDF、DOC、XLS等","文档文件",{"description":4444,"label":4445},"操作系统核心文件，如SYS、DRV、BIN等","系统文件",{"description":4447,"label":1611},"未分类的其他文件类型",{"fieldName":4449,"label":4450,"description":4451,"type":322,"subcate_ids":4452,"enum":330},"gateway","默认网关","默认网关IP地址，用于标识网络设备的出口网关。必须符合IP地址格式规范，即由四个0-255之间的十进制整数组成，以点号分隔，例如：192.168.1.1。",[370],{"fieldName":4454,"label":4455,"description":4456,"type":322,"subcate_ids":4457,"enum":330},"srcNtDomain","来源NT域","来源设备所属的Windows NT域名，用于标识源设备在Windows网络中的域成员身份。该字段为字符串类型，通常由字母、数字、连字符(-)和点号(.)组成。",[47,218,269],{"fieldName":4459,"label":4460,"description":4461,"type":322,"subcate_ids":4462,"enum":330},"defaultValue","默认值","默认值指数据库列在插入新记录时，若未显式指定值，系统将自动赋予的初始值。",[345],{"fieldName":4464,"label":4465,"description":4466,"type":322,"subcate_ids":4467,"enum":330},"diskModel","硬盘型号","硬盘型号信息，用于标识存储设备的具体硬盘型号。该字段为字符串类型，通常由厂商定义的型号标识符组成。",[360,361,362,364,372],{"fieldName":4469,"label":4470,"description":4471,"type":322,"subcate_ids":4472,"enum":330},"assetAddress","资产IP地址","资产在管理系统中所记录的唯一网络标识符，用于定位和访问该资产。格式要求：必须符合标准的IPv4或IPv6地址格式，例如点分十进制表示法（如192.168.1.1）或IPv6的冒号分隔十六进制表示法。",[352,353,344,345,354,346,355,356,357,358,359,360,361,362,363,364,365,366,367,368,369,370,371,372,373],{"fieldName":4474,"label":4475,"description":4476,"type":470,"subcate_ids":4477,"enum":4478},"opType","操作类型","操作类型，标识事件中对目标对象执行的具体操作行为。本字段为枚举类型，其值必须为预定义的操作类型字符串，例如：read（读取）、write（写入）、create（创建）、delete（删除）、modify（修改）等。",[38,47,54,68,76,89,94,99,104,110,116,121,128,133,138,143,150,160,165,170,175,180,185,190,195,202,207,218,223,229,237,242,247,253,259,264,269,274,279,284,289,300,305,310,315,324,63,33,295,411,379,380,381,382,325,326,383,327,213,328,329,400,412,429,342,343,84,418,430,384],{"resetPassword":4479,"access":4482,"addedGroup":4485,"login":4488,"delete":4491,"listen":4494,"logout":4497,"load":4500,"removedGroup":4503,"enable":4506,"create":4509,"lock":4512,"write":4515,"connect":4518,"others":4521,"combine":4524,"receive":4527,"read":4530,"unlock":4533,"query":4536,"start":4538,"execute":4541,"changePassword":4544,"modify":4547,"stop":4550,"rename":4553,"disable":4556,"setValue":4559,"send":4562},{"description":4480,"label":4481},"密码重置操作，包括管理员重置用户密码、密码恢复等","重置密码",{"description":4483,"label":4484},"资源访问操作，包括进程访问、内存访问、共享资源访问等","访问",{"description":4486,"label":4487},"组成员添加操作，包括用户添加到组、计算机加入域等","添加至组",{"description":4489,"label":4490},"身份认证成功操作，包括系统登录、应用登录、远程访问登录等","登录",{"description":4492,"label":4493},"删除对象操作，包括文件删除、注册表项删除、用户账户删除等","删除",{"description":4495,"label":4496},"网络监听操作，包括端口监听、会话监听、事件监听等","监听",{"description":4498,"label":4499},"会话终止操作，包括用户登出、会话超时、强制注销等","登出",{"description":4501,"label":4502},"模块加载操作，包括驱动加载、DLL加载、插件加载等","加载",{"description":4504,"label":4505},"组成员移除操作，包括用户从组中移除、计算机脱离域等","组中移除",{"description":4507,"label":4508},"对象启用操作，包括用户账户启用、服务启用、策略启用等","启用",{"description":4510,"label":4511},"创建新对象操作，包括文件创建、进程创建、用户账户创建等","创建",{"description":4513,"label":4514},"对象锁定操作，包括用户账户锁定、会话锁定、资源锁定等","锁定",{"description":4516,"label":4517},"写入数据操作，包括文件写入、注册表修改、配置变更等","写入",{"description":4519,"label":4520},"网络连接操作，包括网络连接建立、会话创建、远程连接等","连接",{"description":4522,"label":4523},"未分类的其他操作类型","其他操作",{"description":4525,"label":4526},"复合操作类型，表示多个操作的组合执行","组合操作",{"description":4528,"label":4529},"数据接收操作，包括网络数据接收、邮件接收、消息接收等","接收",{"description":4531,"label":4532},"读取数据操作，包括文件读取、注册表查询、内存读取等","读取",{"description":4534,"label":4535},"对象解锁操作，包括用户账户解锁、会话解锁、资源解锁等","解锁",{"description":4537,"label":478},"数据查询操作，包括数据库查询、目录查询、信息检索等",{"description":4539,"label":4540},"服务启动操作，包括系统服务启动、计划任务触发、守护进程启动等","启动",{"description":4542,"label":4543},"程序执行操作，包括进程启动、命令执行、脚本运行等","执行",{"description":4545,"label":4546},"密码修改操作，包括用户密码修改、服务账户密码变更等","修改密码",{"description":4548,"label":4549},"修改对象属性操作，包括文件属性修改、权限变更、配置调整等","修改",{"description":4551,"label":4552},"服务停止操作，包括系统服务停止、进程终止、任务结束等","停止",{"description":4554,"label":4555},"对象重命名操作，包括文件重命名、账户重命名、服务重命名等","重命名",{"description":4557,"label":4558},"对象禁用操作，包括用户账户禁用、服务禁用、策略禁用等","禁用",{"description":4560,"label":4561},"键值设置操作，包括注册表键值设置、配置参数设置、环境变量设置等","设置键值",{"description":4563,"label":4564},"数据发送操作，包括网络数据发送、邮件发送、消息发送等","发送",{"fieldName":4566,"label":4567,"description":4568,"type":322,"subcate_ids":4569,"enum":330},"samAccountName","安全帐户管理器帐户名","安全帐户管理器(SAM)中的用户登录名，用于在Windows域或本地系统中标识用户身份。该字段为字符串类型，通常遵循以下格式要求：长度一般不超过20个字符，允许使用的字符包括字母、数字以及部分特殊符号（如连字符、下划线、点号）。",[218],{"fieldName":4571,"label":4572,"description":4573,"type":322,"subcate_ids":4574,"enum":330},"srcGeoCountyCode","来源区县代码","表示网络流量或事件来源的行政区划县/区级代码，采用国家行政区划编码标准（例如GB/T 2260）。格式为字符串，通常为6位数字代码，其中前两位代表省级，中间两位代表地市级，后两位代表县/区级。",[223,247],{"fieldName":4576,"label":4577,"description":4578,"type":513,"subcate_ids":4579,"enum":330},"srcPort","源端口","源端口是指网络连接发起方的端口号，用于标识发起通信的应用程序或服务。端口号必须是整数，取值范围为0到65535，其中0通常保留，1到1023为知名端口，1024到49151为注册端口，49152到65535为动态或私有端口。",[38,47,54,68,76,89,94,99,104,110,116,121,128,133,138,143,150,160,165,170,175,180,185,190,195,202,207,223,247,300,305,310,315,324,63,33,295,411,379,380,381,382,325,326,383,327,213,328,329,400,412,429,342,343],{"fieldName":4581,"label":4582,"description":4583,"type":322,"subcate_ids":4584,"enum":330},"assetGeoLatitude","资产地理纬度","资产所在位置的纬度坐标，采用十进制表示，符合WGS84地理坐标系标准。格式要求为浮点数字符串，表示北纬或南纬的度数，取值范围为-90.000000至90.000000。",[352,353,344,345,354,346,355,356,357,358,359,360,361,362,363,364,365,366,367,368,369,370,371,372,373],{"fieldName":4586,"label":4587,"description":4588,"type":322,"subcate_ids":4589,"enum":330},"destTransAddress","转换后目的IP","该字段表示经过目的网络地址转换（DNAT）、端口转发或负载均衡处理后，数据包在网络层最终到达的目的IP地址。字段值必须符合IP地址格式规范，即IPv4点分十进制格式（如 192.168.1.1）或IPv6标准格式。",[185],{"fieldName":4591,"label":4592,"description":4593,"type":322,"subcate_ids":4594,"enum":330},"destAddress","目的IP","目的IP地址，标识网络通信连接的目标IP地址。格式要求：必须符合IP地址格式规范，支持IPv4（如192.168.1.1）或IPv6（如2001:0db8:85a3:0000:0000:8a2e:0370:7334）地址表示法。",[38,47,54,68,76,89,94,99,104,110,116,121,128,133,138,143,150,160,165,170,175,180,185,190,195,202,207,223,247,300,305,315,324,63,33,295,411,379,380,381,382,325,326,383,327,213,328,329,400,412,429,342,343],{"fieldName":4596,"label":4597,"description":4598,"type":322,"subcate_ids":4599,"enum":330},"XFF","XFF头","XFF头字段用于识别通过HTTP代理或负载均衡方式连接到Web服务器的客户端最原始的IP地址。",[54,76,99,150,190,202,324,63,33,295,411,379,380,381,382,400,429,342,343],{"fieldName":4601,"label":4602,"description":4603,"type":322,"subcate_ids":4604,"enum":330},"requestCookies","请求Cookie","请求Cookie是网站服务器发送到浏览器并存储的小型文本文件，用于在后续请求中识别用户身份或记录状态。其格式为标准的HTTP Cookie字符串，通常由多个以分号和空格分隔的键值对组成。",[150,63,379,380,381,382,383,384],{"fieldName":4606,"label":4607,"description":4608,"type":322,"subcate_ids":4609,"enum":330},"wmiFilter","WMI筛选器","WMI筛选器用于过滤和选择特定WMI事件的筛选器名称，其值为字符串类型。该字段通常包含WMI事件筛选器的唯一标识符，格式应符合WMI查询语言（WQL）的命名规范或特定的筛选器路径格式。",[],{"fieldName":4611,"label":4612,"description":4613,"type":1673,"subcate_ids":4614,"enum":330},"srcAddrList","来源IP列表","该字段记录安全事件中所有唯一源IP地址的集合。字段值为字符串数组，每个数组元素必须是一个合法的IPv4或IPv6地址。",[551],{"fieldName":4616,"label":4617,"description":4618,"type":470,"subcate_ids":4619,"enum":4620},"kerberosMsgType","Kerberos消息类型","Kerberos协议中的消息类型，用于标识认证过程中不同阶段的各种请求和响应。该字段为枚举类型，其值必须为预定义的可选值之一，例如：AS_REQ（认证服务请求）、AS_REP（认证服务响应）、TGS_REQ（票据授权服务请求）、TGS_REP（票据授权服务响应）、AP_REQ（应用请求）等。",[160],{"AP_REQ":4621,"AP_REP":4624,"KRB_CRED":4627,"KRB_ERROR":4630,"KRB_PRIV":4633,"AS_REQ":4636,"AS_REP":4639,"KRB_SAFE":4642,"TGS_REQ":4645,"TGS_REP":4648},{"description":4622,"label":4623},"应用请求，客户端向服务出示服务票据","应用请求",{"description":4625,"label":4626},"应用响应，服务端对AP-REQ的验证响应","应用响应",{"description":4628,"label":4629},"Kerberos凭据消息，用于凭据转发","凭据消息",{"description":4631,"label":4632},"Kerberos错误消息，返回认证错误信息","错误消息",{"description":4634,"label":4635},"Kerberos私有消息，提供机密性保护","私有消息",{"description":4637,"label":4638},"认证服务请求，客户端向KDC请求TGT票据","认证服务请求",{"description":4640,"label":4641},"KDC对AS-REQ的响应，返回加密的TGT","认证服务响应",{"description":4643,"label":4644},"Kerberos安全消息，提供完整性和校验","安全消息",{"description":4646,"label":4647},"票据授权服务请求，使用TGT请求服务票据","票据授权服务请求",{"description":4649,"label":4650},"KDC对TGS-REQ的响应，返回服务票据","票据授权服务响应",{"fieldName":4652,"label":2230,"description":4653,"type":322,"subcate_ids":4654,"enum":330},"securityZone","该字段表示基于安全目的划分到的逻辑或物理网络区段。",[352,353,344,345,354,346,355,356,357,358,359,360,361,362,363,364,365,366,367,368,369,370,371,372,373],{"fieldName":4656,"label":4657,"description":4658,"type":322,"subcate_ids":4659,"enum":330},"relateUserName","关联用户名","该字段用于标识与主操作用户名存在关联关系的辅助用户名信息。",[68,128,342,343],{"fieldName":4661,"label":4662,"description":4663,"type":322,"subcate_ids":4664,"enum":330},"timesFrom","票据生效时间","票据的生效时间，在此之前票据不可用。时间格式必须为 yyyy-mm-dd HH:mm:ss。",[160],{"fieldName":4666,"label":4667,"description":4668,"type":322,"subcate_ids":4669,"enum":330},"vulPublicTime","漏洞公开时间","漏洞首次在公共渠道披露的精确时间。格式要求为年-月-日 时:分:秒，即 yyyy-mm-dd HH:mm:ss。",[84,418,384],{"fieldName":4671,"label":4672,"description":4673,"type":322,"subcate_ids":4674,"enum":330},"srcUserName","源用户名","源用户名指发起网络连接、系统访问或安全事件的主体用户身份名称。",[38,47,54,68,76,116,121,128,143,150,165,190,195,218,269,300,305,310,315,63,295,379,400,342,343,430,352],{"fieldName":4676,"label":4677,"description":4678,"type":322,"subcate_ids":4679,"enum":330},"srcAddress","来源IP","来源IP地址，指网络连接或安全事件的发起方所使用的IP地址。该字段必须符合IP地址格式规范，支持IPv4和IPv6地址。IPv4地址为点分十进制格式（如：192.168.1.1），IPv6地址为冒号分隔的十六进制格式（如：2001:0db8:85a3:0000:0000:8a2e:0370:7334）。",[38,47,54,68,76,89,94,99,104,110,116,121,128,133,138,143,150,160,165,170,175,180,185,190,195,202,207,223,247,300,305,310,315,324,63,33,295,411,379,380,381,382,325,326,383,327,213,328,329,400,412,429,342,343],{"fieldName":4681,"label":4682,"description":4683,"type":322,"subcate_ids":4684,"enum":330},"systemRequirement","系统要求","描述软件或硬件产品正常运行所需的最低或推荐系统配置要求。",[365],{"fieldName":4686,"label":4687,"description":4688,"type":322,"subcate_ids":4689,"enum":330},"attackerPort","攻击者端口","攻击者发起攻击时使用的网络端口号。格式为字符串，表示端口号数值，取值范围为0-65535，多个端口号使用英文逗号分隔。",[324,63,33,295,411,379,380,381,382,325,326,383,327,213,328,329,400,412,429,342,343],{"fieldName":4691,"label":4692,"description":4693,"type":322,"subcate_ids":4694,"enum":330},"srcGeoCountryCode","来源国家代码","网络请求来源的国家地理编码，遵循ISO 3166-1 alpha-2标准的两字母国家代码格式，例如：US代表美国，CN代表中国。",[223,247],{"fieldName":4696,"label":4697,"description":4698,"type":1673,"subcate_ids":4699,"enum":330},"dependencies","依赖组件列表","该字段以数组形式记录软件运行所依赖的外部组件、库和模块的完整清单。每个元素应为字符串，建议采用“组件名称 版本号”的简洁格式进行描述。",[365],{"fieldName":4701,"label":4702,"description":4703,"type":322,"subcate_ids":4704,"enum":330},"productVendorName","产品厂商名称","产品厂商名称字段用于标识安全产品厂商的官方全称。格式为字符串，无特定字符集限制，但应使用厂商在工商注册或官方宣传中使用的标准名称，以确保一致性和准确性。",[38,47,54,68,76,89,94,99,104,110,116,121,128,133,138,143,150,160,165,170,175,180,185,190,195,202,207,218,223,229,237,242,247,253,259,264,269,274,279,284,289,300,305,310,315,324,63,33,295,411,379,380,381,382,325,326,383,327,213,328,329,400,412,429,342,343,84,418,430,384],{"fieldName":4706,"label":4707,"description":4708,"type":322,"subcate_ids":4709,"enum":330},"cvssVector","CVSS向量","通用漏洞评分系统(CVSS)向量字符串，用于以标准化格式描述漏洞的各个度量维度的取值。该字符串必须遵循CVSS官方定义的向量格式规范，通常以版本标识符（如\"CVSS:3.0/\"或\"CVSS:3.1/\"）开头，后跟一系列由斜杠分隔的度量项/值对（例如\"AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N\"）。",[84,418,384],{"fieldName":4711,"label":4712,"description":4713,"type":470,"subcate_ids":4714,"enum":4715},"transProtocol","传输协议","传输层协议类型，表示OSI模型中传输层使用的协议。可选值包括：TCP（传输控制协议）、UDP（用户数据报协议）等标准传输层协议。",[38,54,68,76,89,94,99,104,110,116,121,128,133,138,143,150,160,165,170,175,180,185,190,195,202,207,223,247,300,305,310,315,324,63,33,295,411,379,380,381,382,325,326,383,327,213,328,329,400,412,429,342,343,371],{"TCP":4716,"UDP":4719},{"description":4717,"label":4718},"面向连接的可靠传输协议，提供数据包顺序传输、错误检测和重传机制","传输控制协议",{"description":4720,"label":4721},"无连接的不可靠传输协议，提供低延迟的数据传输，适用于实时应用","用户数据报协议",{"fieldName":4723,"label":4724,"description":4725,"type":322,"subcate_ids":4726,"enum":330},"fileCreateTime","文件创建时间","文件最初创建的时间。格式必须为yyyy-mm-dd HH:mm:ss，例如：2023-10-15 14:30:00。",[229,412],{"fieldName":4728,"label":4729,"description":4730,"type":322,"subcate_ids":4731,"enum":330},"busSystemId","业务系统ID","业务系统的唯一标识符，用于唯一标识一个业务系统。",[358,365],{"fieldName":4733,"label":4734,"description":4735,"type":470,"subcate_ids":4736,"enum":4737},"webTamperType","网页篡改类型","网页篡改类型，用于标识网页内容、结构或功能被恶意修改的具体类型。该字段为枚举类型，其值必须为预定义的字符串，有效取值范围包括：contentReplacement（内容替换）、hiddenLinkInjection（暗链植入）、visibleLinkInjection（明链植入）、jsScriptHijacking（JS脚本劫持）、metaTampering（页面元数据篡改）、other（其他）等可选值。",[382],{"other":4738,"jsScriptHijacking":4740,"hiddenLinkInjection":4743,"visibleLinkInjection":4746,"metaTampering":4749,"contentReplacement":4752,"islandPageInjection":4755},{"description":4739,"label":1611},"未分类的其他网页篡改类型",{"description":4741,"label":4742},"通过植入恶意JS脚本，识别搜索引擎爬虫并返回篡改内容，进行流量劫持或跳转","JS脚本劫持",{"description":4744,"label":4745},"在页面中隐蔽地插入恶意链接，通常通过SEO手段提升非法网站搜索排名，正常访问不易察觉","暗链植入",{"description":4747,"label":4748},"在页面中明显植入与网站主体无关的链接，包括广告或违规内容链接","明链植入",{"description":4750,"label":4751},"篡改网页的TDK（标题、描述、关键词），通常用于SEO作弊或引导至非法网站","页面元数据篡改",{"description":4753,"label":4754},"攻击者直接替换网站原有内容，例如将首页替换为黑页或炫技页面","内容替换",{"description":4756,"label":4757},"在网站目录内生成全新的、包含违规内容且无内部链接引用的独立页面","孤岛页面植入",{"fieldName":4759,"label":4760,"description":4761,"type":322,"subcate_ids":4762,"enum":330},"relateAddress","关联IP","关联IP是与主操作用户存在关联关系的辅助IP地址信息，用于记录三层关联情况下的网络地址信息。例如在数据库审计中的站库分离场景中，此字段可用于关联用户登录Web服务器时的网络地址。该字段值必须为有效的IPv4或IPv6地址格式。",[38,54,68,128,342,343],{"fieldName":4764,"label":4765,"description":4766,"type":322,"subcate_ids":4767,"enum":330},"pubSecFilingNumber","公安备案号","公安备案号是由公安机关颁发的网站备案编号，用于标识网站的备案信息。格式通常包含行政区划代码、备案机关标识和序列号。",[359,369],{"fieldName":4769,"label":4770,"description":4771,"type":322,"subcate_ids":4772,"enum":330},"smbServerVersion","SMB服务器版本","服务器消息块(SMB)协议版本标识，用于识别远程SMB服务器的具体协议版本。",[76,195],{"fieldName":4774,"label":4775,"description":4776,"type":470,"subcate_ids":4777,"enum":4778},"catOutcome","结果分类","该字段用于标识事件操作或攻击的最终结果状态。其值为预定义的枚举类型，当前主要可选值包括：OK（表示操作成功）、FAIL（表示操作失败）、Attempt（表示尝试性操作）。取值应严格限定在系统定义的枚举值范围内。",[38,47,54,68,76,89,94,99,104,110,116,121,128,133,138,143,150,160,165,170,175,180,185,190,195,202,207,218,223,229,237,242,247,253,259,264,269,274,279,284,289,300,305,310,315,324,63,33,295,411,379,380,381,382,325,326,383,327,213,328,329,400,412,429,342,343,84,418,430,384],{"Attempt":4779,"OK":4782,"FAIL":4785},{"description":4780,"label":4781},"事件已发生，但是无法明确成功或失败","尝试",{"description":4783,"label":4784},"可以合理的推测事件已成功","成功",{"description":4786,"label":4787},"可以合理的推测事件已失败","失败",{"fieldName":4789,"label":4790,"description":4791,"type":322,"subcate_ids":4792,"enum":330},"softwareVersion","软件版本","软件版本号，用于标识软件发布的版本信息。通常遵循主版本号.次版本号.修订号（如：15.6.1）或包含字母前缀（如：v15.6.1）的格式。",[84,418,430,355,365,371],{"fieldName":4794,"label":4795,"description":4796,"type":322,"subcate_ids":4797,"enum":330},"scriptContent","脚本内容","脚本文件的实际内容，包括可执行代码或命令。内容为字符串格式，应包含有效的脚本语言语法或系统命令。",[274],{"fieldName":4799,"label":4800,"description":4801,"type":470,"subcate_ids":4802,"enum":4803},"killChain","攻击链","攻击链字段用于描述攻击行为在攻击生命周期中所处的具体阶段。该字段为枚举类型，其值必须为预定义的字符串常量，可选值包括但不限于：KC_Reconnaissance（侦查）、KC_Delivery（投递）、KC_Exploitation（利用）、KC_CommandControl（命令控制）、KC_InternalRecon（内部侦查）等。",[324,63,33,295,411,379,380,381,382,325,326,383,327,213,328,329,400,412,429,342,343,84,418,430,384],{"KC_Reconnaissance":4804,"KC_Profit":4807,"KC_InternalRecon":4810,"KC_CommandControl":4813,"KC_Delivery":4816,"KC_Others":4819,"KC_Exploitation":4822,"KC_LateralMov":4825},{"description":4805,"label":4806},"网络攻击者选择目标，进行初步渗透并尝试发现信息系统版本、架构、漏洞等信息的过程。该过程可能涉及到多种方法，比如对web服务的扫描、对主机开放端口的探测等。通常该阶段的攻击有大量类似的行为，几乎都为攻击失败。","侦查",{"description":4808,"label":4809},"网络攻击者成功向目标植入恶意程序后，采取具体行动来达到其目标，例如恶意加密目标主机设备上的文件、窃取和破坏数据、利用设备资源获取挖矿等，通常该阶段的告警意味着被攻击的目标可能已经失陷。","获利",{"description":4811,"label":4812},"攻击者通过某些手段登录成功进入目标网络系统(如窃取vpn账户、猜解远程控制窗口等)，并且在目标网络系统进行服务探测、信息收集的过程。该过程也可能是黑客成功获取了内部设备的权限，远程操控该设备进行。","内部侦查",{"description":4814,"label":4815},"网络攻击者利用植入的后门或恶意程序，对受害设备进行远程控制。过程中可能由攻击者发送指令，唤醒或操控受害主机上的后门，执行相关命令；也可能由受害设备上运行的程序主动发起回连请求，向黑客传递信息数据。通常该阶段的告警意味着被攻击的目标可能已经失陷。","命令控制",{"description":4817,"label":4818},"遭受攻击的设备接收或感染恶意程序、钓鱼邮件及黑客工具的阶段。投递过程可以是主动的，例如终端用户主动下载互联网恶意程序或接收钓鱼邮件附件等；也可以是被动的，例如攻击者使用开放服务的接口，上传木马、后门、远控程序等。从而让攻击者成功获取到受害设备的控制权限。","投递",{"description":4820,"label":4821},"非攻击行为，如配置错误、设备故障等。","无",{"description":4823,"label":4824},"网络攻击者在获取到目标的基本信息后，尝试利用目标可能存在的漏洞或缺陷进行针对性渗透攻击。利用过程可能成功，也可能失败（例如被防火墙、IPS设备、终端病毒防护程序阻断）。","利用",{"description":4826,"label":4827},"信息系统内的设备失陷，或黑客窃取了登录口令后，攻击者在内部系统进行横向移动，尝试获取更多设备权限的过程。该过程主要涉及到内对内的漏洞利用和敏感操作等攻击，通常该阶段的告警意味着被攻击的目标可能已经失陷。","横向渗透",{"fieldName":4829,"label":4830,"description":4831,"type":322,"subcate_ids":4832,"enum":330},"collectorReceiptTime","采集器接收时间","采集器接收日志事件的精确时间，时间格式必须为标准的日期时间字符串，格式要求为yyyy-mm-dd HH:mm:ss。",[38,47,54,68,76,89,94,99,104,110,116,121,128,133,138,143,150,160,165,170,175,180,185,190,195,202,207,218,223,229,237,242,247,253,259,264,269,274,279,284,289,300,305,310,315,324,63,33,295,411,379,380,381,382,325,326,383,327,213,328,329,400,412,429,342,343,84,418,430,384],{"fieldName":4834,"label":4835,"description":4836,"type":322,"subcate_ids":4837,"enum":330},"signature","签名信息","签名信息用于验证文件或数据完整性的数字签名或证书信息，其格式为字符串。该字段通常包含签名算法标识、签名值或证书颁发者与主题等文本信息。",[237,412,368],{"fieldName":4839,"label":4840,"description":4841,"type":470,"subcate_ids":4842,"enum":4843},"portStatus","端口状态","端口状态表示网络端口的当前运行状态。该字段为枚举类型，其值必须为预定义的字符串，可选范围包括：open (开放)、closed (关闭)、filtered (过滤)、unfiltered (未过滤)。",[371],{"filtered":4844,"closed":4847,"unfiltered":4850,"open":4853},{"description":4845,"label":4846},"端口状态被防火墙过滤无法确定","过滤",{"description":4848,"label":4849},"端口存在但未在监听","关闭",{"description":4851,"label":4852},"端口可访问但状态未知","未过滤",{"description":4854,"label":4855},"端口正在监听连接请求","开放",{"fieldName":4857,"label":4858,"description":4859,"type":322,"subcate_ids":4860,"enum":330},"assetOwnerMail","负责人邮箱","负责人邮箱，用于标识资产负责人的电子邮箱地址。格式必须符合标准电子邮件地址规范，包含有效的用户名和域名部分。",[352,353,344,345,354,346,355,356,357,358,359,360,361,362,363,364,365,366,367,368,369,370,371,372,373],{"fieldName":4862,"label":4863,"description":4864,"type":1673,"subcate_ids":4865,"enum":330},"assetTag","资产标签","资产标签，用于标识端口扫描后分配给资产的服务识别标签。字段类型为字符串数组，每个标签应为非空字符串。",[352,353,344,345,354,346,355,356,357,358,359,360,361,362,363,364,365,366,367,368,369,370,371,372,373],{"fieldName":4867,"label":4868,"description":4869,"type":513,"subcate_ids":4870,"enum":330},"flowPackets","数据包数量","统计网络会话或时间窗口内传输的数据包累计数量。该字段为整型数值，表示无符号的计数。",[33],{"fieldName":4872,"label":4873,"description":4874,"type":322,"subcate_ids":4875,"enum":330},"loginUser","登录用户","该字段表示成功登录系统的用户账号标识。格式要求：用户账号应为字符串类型，通常由字母、数字、下划线等常见字符组成。",[342],{"fieldName":4877,"label":4878,"description":4879,"type":322,"subcate_ids":4880,"enum":330},"mailSubject","邮件主题","邮件主题行内容，用于概括邮件的主要目的和内容概要。",[143,295,379,342],{"fieldName":4882,"label":4883,"description":4884,"type":322,"subcate_ids":4885,"enum":330},"startModule","起始模块","该字段表示线程开始执行的模块名称，格式为字符串类型，通常记录可执行文件或动态链接库的名称，示例为\"ntdll.dll\"或\"kernel32.dll\"。",[264,412],{"fieldName":4887,"label":4888,"description":4889,"type":322,"subcate_ids":4890,"enum":330},"startTime","开始时间","该字段记录事件活动开始的精确时间。时间格式必须为标准的日期时间字符串，格式为yyyy-mm-dd HH:mm:ss。",[38,47,54,68,76,89,94,99,104,110,116,121,128,133,138,143,150,160,165,170,175,180,185,190,195,202,207,218,223,229,237,242,247,253,259,264,269,274,279,284,289,300,305,310,315,324,63,33,295,411,379,380,381,382,325,326,383,327,213,328,329,400,412,429,342,343,84,418,430,384],{"fieldName":4892,"label":4893,"description":4894,"type":322,"subcate_ids":4895,"enum":330},"assetGeoAddress","资产物理地址","资产所处的详细物理地址，包括街道、楼宇、楼层及房间号等信息。",[352,353,344,345,354,346,355,356,357,358,359,360,361,362,363,364,365,366,367,368,369,370,371,372,373],{"fieldName":4897,"label":4898,"description":4899,"type":322,"subcate_ids":4900,"enum":330},"srcGeoAddress","来源详细地址","该字段表示网络连接发起方IP地址所对应的详细地址描述，用于定位来源的具体物理或行政位置。其值为字符串类型，通常包含国家、省份、城市、区县、街道及门牌号等层级信息。",[38,54,68,76,89,94,99,104,110,116,121,128,133,138,143,150,160,165,170,175,180,185,190,195,202,207,223,247,300,305,310,315,324,63,33,295,411,379,380,381,382,325,326,383,327,213,328,329,400,412,429,342,343],{"fieldName":4902,"label":4903,"description":4904,"type":322,"subcate_ids":4905,"enum":330},"srcThreadId","源线程ID","源线程ID指创建新线程的父线程TID，用于分析线程间关系和检测线程注入等安全场景。其值为操作系统分配的数字标识符，通常为十进制数字字符串，需确保为有效非负整数格式。",[412],{"fieldName":4907,"label":4908,"description":4909,"type":335,"subcate_ids":4910,"enum":330},"isCdn","是否CDN","标识目标是否为内容分发网络(CDN)节点。该字段为布尔类型，取值为 true 或 false。",[359],{"fieldName":4912,"label":4913,"description":4914,"type":513,"subcate_ids":4915,"enum":330},"passwordExpirationPolicy","密码过期策略","密码策略要求的密码有效期，单位为天，必须是正整数。",[],{"fieldName":4917,"label":4918,"description":4919,"type":322,"subcate_ids":4920,"enum":330},"icmpCode","ICMP响应码","ICMP响应码表示ICMP协议中返回的响应代码。该字段为字符串类型，用于标识ICMP报文的具体类型或错误状态。",[],{"fieldName":4922,"label":4923,"description":4924,"type":1917,"subcate_ids":4925,"enum":330},"responseTime","响应时间","该字段记录网络请求从客户端发送到完整接收服务器响应的时间间隔，单位为毫秒。其值为长整型数字，表示一个非负的时间长度。",[342,343],{"fieldName":4927,"label":4928,"description":4929,"type":322,"subcate_ids":4930,"enum":330},"errorMessage","错误信息","该字段用于记录系统、服务或应用程序在运行或交互过程中返回的详细错误描述信息，通常包含错误代码、错误原因、问题上下文或具体错误说明。",[128,165],{"fieldName":4932,"label":4933,"description":4934,"type":322,"subcate_ids":4935,"enum":330},"requestParameters","请求参数","请求参数是网络请求中携带的参数内容，用于传递客户端向服务器发送的具体数据。参数内容通常为字符串格式，可以是查询字符串、表单数据、JSON对象或其他序列化形式，具体格式取决于请求类型（如GET、POST等）和内容类型（Content-Type）。",[76,94,116],{"fieldName":4937,"label":4938,"description":4939,"type":322,"subcate_ids":4940,"enum":330},"assetGeoCounty","资产所在区县","资产物理位置所处的区县全称。应采用标准的行政区划名称，避免使用简称或俗称。",[352,353,344,345,354,346,355,356,357,358,359,360,361,362,363,364,365,366,367,368,369,370,371,372,373],{"fieldName":4942,"label":4943,"description":4944,"type":322,"subcate_ids":4945,"enum":330},"userAgent","用户代理","用户代理字符串，用于标识发起请求的客户端（用户代理）的匿名化信息，通常包含客户端的操作系统、浏览器类型、版本、设备类型等。格式需符合HTTP标准的User-Agent字符串。",[38,54,76,150,379,380,381,382,383,400,342,343,384],{"fieldName":4947,"label":4948,"description":4949,"type":322,"subcate_ids":4950,"enum":330},"passwordProperties","密码属性","Windows用户账户密码策略的密码属性配置。",[],{"fieldName":4952,"label":4953,"description":4954,"type":322,"subcate_ids":4955,"enum":330},"ipVersion","IP版本","该字段表示互联网协议（IP）的版本标识。格式为字符串，目前主要包括“IPv4”和“IPv6”。",[352,353,344,345,354,346,355,356,357,358,359,360,361,362,363,364,365,366,367,368,369,370,371,372,373],{"fieldName":4957,"label":4958,"description":4959,"type":322,"subcate_ids":4960,"enum":330},"attackerInfo","攻击者信息","攻击者信息字段包含溯源到的攻击者相关信息，如攻击者账号、姓名、邮箱等。字段值为字符串格式，内容应包含关键属性及其对应值。",[],{"fieldName":4962,"label":4963,"description":4964,"type":470,"subcate_ids":4965,"enum":4966},"deviceAssetSubTypeId","设备子类型ID","设备子类型ID是设备类型子分类的唯一数字标识符，用于标识具体的设备子类型。该字段为枚举类型，取值应在系统定义的枚举值范围内。",[38,47,54,68,76,89,94,99,104,110,116,121,128,133,138,143,150,160,165,170,175,180,185,190,195,202,207,218,223,229,237,242,247,253,259,264,269,274,279,284,289,300,305,310,315,324,63,33,295,411,379,380,381,382,325,326,383,327,213,328,329,400,412,429,342,343,84,418,430,384,360,361,362],{"1":4967,"2":4970,"3":4973,"4":4976,"5":4979,"6":4982,"7":4985,"8":4987,"9":4990,"10":4993,"11":4996,"12":4999,"13":5002,"14":5005,"15":5008,"16":5011,"17":5014,"18":5017,"19":5020,"20":5023,"21":5026,"22":5029,"23":5032,"24":5034,"25":5037,"26":5040,"27":5043,"28":5046,"29":5049,"30":5052,"31":5055,"32":5058,"33":5061,"34":5064,"35":5067,"36":5070,"37":5073,"38":5076,"39":5079,"43":5082,"44":5085,"45":5088,"51":5091,"52":5094,"53":5097,"55":5100,"56":5102,"57":5105,"58":5108,"59":5111,"60":5114,"61":5116,"62":5118,"63":5121,"65":5124},{"description":4968,"label":4969},"Microsoft Windows操作系统","Windows",{"description":4971,"label":4972},"类Unix操作系统，包括Linux和BSD变种","Nix",{"description":4974,"label":4975},"网络路由设备，用于在网络之间转发数据包","路由器",{"description":4977,"label":4978},"网络交换设备，用于在局域网内连接设备并转发数据帧","交换机",{"description":4980,"label":4981},"虚拟专用网络设备，提供安全的远程访问和站点到站点连接","VPN",{"description":4983,"label":4984},"负载均衡设备，用于分发网络流量以提高性能和可靠性","负载均衡",{"description":4986,"label":56},"网络安全设备，用于控制进出网络的流量基于安全规则",{"description":4988,"label":4989},"网络隔离设备，用于在安全级别不同的网络之间进行安全数据交换","网闸",{"description":4991,"label":4992},"入侵检测系统，用于监控网络或系统活动以检测恶意行为","入侵检测系统(IDS)",{"description":4994,"label":4995},"入侵防护系统，在检测到威胁时主动阻止恶意流量","入侵防护系统(IPS)",{"description":4997,"label":4998},"统一威胁管理设备，集成多种安全功能如防火墙、防病毒和入侵防护","统一威胁管理(UTM)",{"description":5000,"label":5001},"下一代防火墙，提供应用层检测、深度包检查和高级威胁防护","下一代防火墙",{"description":5003,"label":5004},"Web应用防火墙，专门保护Web应用程序免受SQL注入、XSS等攻击","Web应用防火墙(WAF)",{"description":5006,"label":5007},"网络流量监测设备，用于实时分析和监控网络流量模式","流量监测设备",{"description":5009,"label":5010},"网页防篡改系统，保护网站内容不被未经授权修改","网页防篡改",{"description":5012,"label":5013},"抗分布式拒绝服务攻击系统，缓解DDoS攻击以保护服务可用性","抗DDoS系统",{"description":5015,"label":5016},"防病毒系统，检测和清除恶意软件、病毒和木马","防病毒系统",{"description":5018,"label":5019},"防间谍软件系统，防止间谍软件窃取敏感信息和监控用户活动","防间谍系统",{"description":5021,"label":5022},"数据防泄密系统，监控和防止敏感数据通过各类渠道泄露","防泄密系统",{"description":5024,"label":5025},"邮件审计系统，监控和审计电子邮件内容以符合安全策略和合规要求","邮件审计系统",{"description":5027,"label":5028},"身份和访问管理系统，管理用户身份认证、授权和权限","身份管理系统",{"description":5030,"label":5031},"流量清洗系统，过滤恶意流量以保护网络资源和业务连续性","流量清洗系统",{"description":5033,"label":70},"数据库审计系统，监控和记录数据库访问、操作和权限变更",{"description":5035,"label":5036},"Web审计系统，审计Web应用程序的访问、操作和安全事件","Web审计系统",{"description":5038,"label":5039},"运维审计系统，监控和记录系统运维操作，防止越权访问","运维审计系统",{"description":5041,"label":5042},"上网行为审计系统，监控和审计员工网络使用行为以符合安全策略","上网行为审计系统",{"description":5044,"label":5045},"统一审计网关，集中收集、规范化和分析各类审计日志","统一审计网关",{"description":5047,"label":5048},"日志审计系统，收集、存储、分析和告警系统安全日志","日志审计系统",{"description":5050,"label":5051},"安全管理系统，集成安全管理功能如策略管理、风险管理和事件响应","安全管理系统",{"description":5053,"label":5054},"蜜罐系统，诱骗攻击者以收集攻击信息和分析攻击手法","蜜罐系统",{"description":5056,"label":5057},"应用程序漏洞扫描器，检测Web应用和移动应用的安全漏洞","应用扫描器",{"description":5059,"label":5060},"网络漏洞扫描器，扫描网络设备、服务和端口以发现安全漏洞","网络扫描器",{"description":5062,"label":5063},"主机漏洞扫描器，扫描操作系统和应用程序漏洞及配置问题","主机扫描器",{"description":5065,"label":5066},"Web服务器软件，如IIS、Apache、Nginx等，托管网站和应用","WEB服务器",{"description":5068,"label":5069},"数据库服务器软件，如MySQL、Oracle、SQL Server等，存储和管理数据","数据库服务器",{"description":5071,"label":5072},"邮件服务器软件，如Exchange、Postfix等，处理电子邮件收发","邮件服务器",{"description":5074,"label":5075},"存储服务器，提供数据存储、备份和共享服务","存储服务器",{"description":5077,"label":5078},"FTP服务器，提供文件传输协议服务，支持文件上传下载","FTP服务器",{"description":5080,"label":5081},"应用服务器，运行企业应用程序和业务逻辑，如Java EE、.NET应用","应用服务器",{"description":5083,"label":5084},"Windows系统审计代理，收集Windows事件日志和系统活动","Windows审计代理",{"description":5086,"label":5087},"类Unix系统审计代理，收集Linux/Unix系统日志和审计数据","Nix审计代理",{"description":5089,"label":5090},"Windows管理规范审计代理，通过WMI收集系统信息和事件","WMI审计代理",{"description":5092,"label":5093},"日志采集器，从各种数据源收集和转发日志数据","采集器",{"description":5095,"label":5096},"通信服务器，处理网络通信、消息传递和协议转换","通信服务器",{"description":5098,"label":5099},"安全事件关联引擎，分析日志数据以检测复杂安全事件","关联引擎",{"description":5101,"label":448},"其他未分类的设备类型",{"description":5103,"label":5104},"端点检测与响应系统，监控主机活动、检测威胁并响应安全事件","主机安全管理系统(EDR)",{"description":5106,"label":5107},"虚拟化平台设备，如VMware ESXi、Hyper-V等，运行虚拟机","虚拟化设备",{"description":5109,"label":5110},"网络连接的打印机设备，支持网络打印功能","网络打印机",{"description":5112,"label":5113},"高级持久威胁检测系统，针对APT攻击进行监测和防护","APT",{"description":5115,"label":2272},"域名系统服务器，提供域名解析服务和DNS安全防护",{"description":5117,"label":152},"API风险监测系统，监控API接口的安全风险和使用异常",{"description":5119,"label":5120},"API安全网关，保护API接口免受攻击，提供认证、授权和限流","API安全网关",{"description":5122,"label":5123},"脆弱性扫描系统，全面扫描系统、网络和应用漏洞","脆弱性扫描系统",{"description":5125,"label":5126},"统一端点安全系统，集成终端防护、检测和响应功能","UES",{"fieldName":5128,"label":5129,"description":5130,"type":322,"subcate_ids":5131,"enum":330},"srcGeoRegion","来源地区","该字段表示网络连接发起方IP地址所对应的省级行政区域名称，用于标识流量的地理来源。其值应为中国省级行政区划的名称，例如“北京市”、“浙江省”、“新疆维吾尔自治区”等，或国际公认的国家及地区名称。格式为字符串，无固定长度限制，建议使用标准、完整的官方名称以确保一致性和准确性。",[38,54,68,76,89,94,99,104,110,116,121,128,133,138,143,150,160,165,170,175,180,185,190,195,202,207,223,247,300,305,310,315,324,63,33,295,411,379,380,381,382,325,326,383,327,213,328,329,400,412,429,342,343],{"fieldName":5133,"label":5134,"description":5135,"type":322,"subcate_ids":5136,"enum":330},"tacticName","ATT&CK战术名称","攻击行为在MITRE ATT&CK框架中对应的战术阶段名称，用于标识攻击在杀伤链中所处的阶段。此字段为字符串类型，取值应为MITRE ATT&CK框架中定义的官方战术名称，例如：Initial Access, Execution, Persistence, Privilege Escalation等。",[324,63,33,295,411,379,380,381,382,325,326,383,327,213,328,329,400,412,429,342,343,84,418,430,384],{"fieldName":5138,"label":5139,"description":5140,"type":322,"subcate_ids":5141,"enum":330},"softwareList","软件列表","软件列表字段记录系统或设备上安装的第三方应用程序和软件组件的清单。该字段为字符串类型，其内容应为用逗号分隔的软件名称列表。",[358],{"fieldName":5143,"label":5144,"description":5145,"type":1917,"subcate_ids":5146,"enum":330},"eventCount","事件数量","事件数量字段用于统计相同类型或相关事件的发生次数。通常为非负整数。",[38,47,54,68,76,89,94,99,104,110,116,121,128,133,138,143,150,160,165,170,175,180,185,190,195,202,207,218,223,229,237,242,247,253,259,264,269,274,279,284,289,300,305,310,315,324,63,33,295,411,379,380,381,382,325,326,383,327,213,328,329,400,412,429,342,343,84,418,430,384],{"fieldName":5148,"label":5149,"description":5150,"type":322,"subcate_ids":5151,"enum":330},"wmiName","WMI名称","WMI名称是Windows Management Instrumentation的类名、属性名或命名空间路径。其格式通常遵循WMI的命名规范，例如类名可能为Win32_Process、命名空间路径可能为root\\cimv2。",[284],{"fieldName":5153,"label":5154,"description":5155,"type":322,"subcate_ids":5156,"enum":330},"volumeMounts","挂载卷","挂载卷字段用于配置容器与宿主机之间的持久化存储挂载，其值为一个字符串，描述挂载的详细信息。通常格式为：主机路径：\u003C宿主机路径>，容器路径：\u003C容器内路径>。其中宿主机路径和容器内路径应为有效的文件系统绝对路径。",[363],{"fieldName":5158,"label":5159,"description":5160,"type":322,"subcate_ids":5161,"enum":330},"containerName","容器实例名称","容器运行时实例的自定义标识名称，用于唯一标识容器实例。命名应遵循容器运行时命名规范，通常支持字母、数字、连字符(-)和下划线(_)的组合。",[363],{"fieldName":5163,"label":5164,"description":5165,"type":1673,"subcate_ids":5166,"enum":330},"alertDevices","告警来源设备","告警来源设备字段记录生成告警的安全设备和传感器信息集合，格式为字符串数组。每个数组元素应为描述设备名称及标识信息的字符串，通常包含设备名称和IP地址等关键信息。",[551],{"fieldName":5168,"label":5169,"description":5170,"type":322,"subcate_ids":5171,"enum":330},"serviceImage","服务路径","服务所在的进程文件的完整路径及参数，采用字符串格式表示，支持包含文件名和启动参数。",[289],{"fieldName":5173,"label":5174,"description":5175,"type":322,"subcate_ids":5176,"enum":330},"srcGeoLongitude","来源经度","来源经度表示网络连接发起方IP地址所对应的地理经度坐标。格式为十进制浮点数字符串，取值范围为-180.000000到180.000000，保留小数点后六位，使用点号（.）作为小数点分隔符，负值表示西经，正值表示东经。",[38,54,68,76,89,94,99,104,110,116,121,128,133,138,143,150,160,165,170,175,180,185,190,195,202,207,223,247,300,305,310,315,324,63,33,295,411,379,380,381,382,325,326,383,327,213,328,329,400,412,429,342,343],{"fieldName":5178,"label":5179,"description":5180,"type":1673,"subcate_ids":5181,"enum":330},"tag","标签","该字段用于标识告警的特征或分类标签集合。格式要求：必须为字符串数组。每个标签应为非空字符串，内容通常为描述告警特征或分类的文本，如“端口扫描”、“非法外连”等。",[],{"fieldName":5183,"label":5184,"description":5185,"type":322,"subcate_ids":5186,"enum":330},"privilegeList","权限集合","权限集合字段用于描述系统或文件所拥有的访问控制权限。",[218,354],{"fieldName":5188,"label":5189,"description":5190,"type":322,"subcate_ids":5191,"enum":330},"cncve","CNCVE漏洞标识符","CNCVE漏洞标识符是国家信息安全漏洞共享平台颁发的漏洞唯一标识符，用于唯一标识一个漏洞。其格式必须严格遵循“CNCVE-YYYY-NNNNN”的规范，其中“CNCVE”为固定前缀，其后跟随一个连字符“-”；“YYYY”代表四位数字的年份；之后是另一个连字符“-”；“NNNNN”代表五位数字的序列号。整个标识符需保持大写字母格式。",[84,384],{"fieldName":5193,"label":5194,"description":5195,"type":322,"subcate_ids":5196,"enum":330},"installPath","安装路径","安装路径是指应用程序或软件在操作系统中的安装目录位置，其值应为有效的文件系统路径字符串。",[365],{"fieldName":5198,"label":5199,"description":5200,"type":322,"subcate_ids":5201,"enum":330},"orgName","组织架构名称","资产所属组织架构的名称，应为字符串类型，表示组织架构的完整名称。",[352,353,344,345,354,346,355,356,357,358,359,360,361,362,363,364,365,366,367,368,369,370,371,372,373],{"fieldName":5203,"label":5204,"description":5205,"type":322,"subcate_ids":5206,"enum":330},"destGeoLongitude","目的经度","目的经度是指网络连接接收方IP地址所对应的地理经度坐标。格式为十进制小数形式的字符串，取值范围为-180.000000至180.000000。",[38,54,68,76,89,94,99,104,110,116,121,128,133,138,143,150,160,165,170,175,180,185,190,195,202,207,223,247,300,305,310,315,324,63,33,295,411,379,380,381,382,325,326,383,327,213,328,329,400,412,429,342,343],{"fieldName":5208,"label":5209,"description":5210,"type":322,"subcate_ids":5211,"enum":330},"ccUserName","抄送人","抄送人字段用于记录邮件抄送接收方的邮箱地址集合。该字段值为字符串类型，其内容应为一个或多个符合RFC 5322标准的有效邮箱地址。多个地址之间通常使用逗号分隔。",[143,295,379,342],{"fieldName":5213,"label":5214,"description":5215,"type":322,"subcate_ids":5216,"enum":330},"startType","启动类型","该字段表示服务或程序的启动类型，用于描述其启动方式，例如自动、手动或禁用。",[289],{"fieldName":5218,"label":5219,"description":5220,"type":322,"subcate_ids":5221,"enum":330},"softwarePort","软件端口号","软件运行时监听的网络端口号。格式要求：端口号必须是有效的网络端口，取值范围为0到65535。通常0-1023为知名端口，1024-49151为注册端口，49152-65535为动态或私有端口。",[365],{"fieldName":5223,"label":5224,"description":5225,"type":322,"subcate_ids":5226,"enum":330},"cvssBaseScore","cvss基础分值","该字段表示通用漏洞评分系统(CVSS)基础度量组计算的评分值，用于衡量漏洞的固有严重性。取值为字符串类型，格式为一个小数点后保留一位的浮点数，表示范围为0.0至10.0。",[84,418,384],{"fieldName":5228,"label":5229,"description":5230,"type":322,"subcate_ids":5231,"enum":330},"networkInfo","网络配置信息","网络设备或虚拟机的网络配置信息，包含IP地址和MAC地址等。IP地址格式为点分十进制，如192.168.1.1；MAC地址格式支持冒号分隔（xx:xx:xx:xx:xx:xx）或短横线分隔（xx-xx-xx-xx-xx-xx），如70-00-55-98-C7-00。多个配置项建议以逗号分隔。",[363,364,372],{"fieldName":5233,"label":5234,"description":5235,"type":1917,"subcate_ids":5236,"enum":330},"fileSize","文件大小","文件内容的字节大小，表示文件的存储空间占用情况，单位是字节。",[76,229,300,324,412,342,343,354,355],{"fieldName":5238,"label":5239,"description":5240,"type":322,"subcate_ids":5241,"enum":330},"processUserName","进程用户名","该字段表示执行进程的操作系统用户账号。格式要求：用户名应为有效的操作系统用户标识，通常由字母、数字、下划线等字符组成。",[223,229,237,242,247,253,259,264,274,324,411,325,326,327,213,328,329,412],{"fieldName":5243,"label":5244,"description":5245,"type":322,"subcate_ids":5246,"enum":330},"publisher","发布者","该字段用于标识软件、数字证书或内容发布方的官方实体名称。字段值为字符串类型，应填写发布方的完整、正式名称，例如软件公司、开源基金会或组织机构的官方全称。",[366],{"fieldName":5248,"label":5249,"description":5250,"type":322,"subcate_ids":5251,"enum":330},"wmiQuery","WMI查询条件","WMI查询条件是指用于从Windows系统检索管理信息和事件数据的查询语句，通常采用WMI查询语言（WQL）格式。",[284],{"fieldName":5253,"label":5254,"description":5255,"type":322,"subcate_ids":5256,"enum":330},"startFunction","起始函数","起始函数是新线程开始执行的入口点函数名称，格式为字符串类型，仅支持字母、数字和下划线的组合。",[264,412],{"fieldName":5258,"label":5259,"description":5260,"type":322,"subcate_ids":5261,"enum":330},"userWorkstations","用户工作站","用户可从中登录的计算机的NetBIOS或DNS名称列表，以逗号分隔。格式要求：多个计算机名称之间使用英文逗号分隔，每个名称应为有效的NetBIOS名称或DNS主机名。",[218],{"fieldName":5263,"label":5264,"description":5265,"type":322,"subcate_ids":5266,"enum":330},"IoC","失陷指标","失陷指标是用于识别和检测网络安全威胁的特定指标或标志，其具体内容可以是恶意文件的哈希值、可疑网络地址、可疑域名等。当该字段值为IP地址时，需符合IPv4或IPv6的标准格式；为域名时，需符合标准的域名格式；为文件哈希时，需为有效的MD5、SHA-1或SHA-256等哈希值字符串。",[324,325,326,327,213,328,329],{"fieldName":5268,"label":5269,"description":5270,"type":1917,"subcate_ids":5271,"enum":330},"lockoutObservationWindow","锁定观察窗口","锁定观察窗口是系统用于监控和记录失败登录尝试的时间范围。该字段为长整型数值，单位为分钟，表示一个持续的时间长度，必须为大于0的整数。",[],{"fieldName":5273,"label":5274,"description":5275,"type":513,"subcate_ids":5276,"enum":330},"peakFlowsRate","峰值流量速率","峰值流量速率，指网络流量的峰值传输速率，基于RFC 2215流量规范标准，单位为Mbps（兆比特每秒）。该字段为整型数值，表示具体的速率值。",[33],{"fieldName":5278,"label":5279,"description":5280,"type":322,"subcate_ids":5281,"enum":330},"targetObject","操作对象","标识事件操作直接作用的目标系统对象，通常用于记录被操作的系统资源路径、注册表键值、文件路径等。内容应明确标识目标对象，如Windows注册表路径示例：HKLM\\\\SOFTWARE\\\\WOW6432Node\\\\Microsoft\\\\Windows\\\\CurrentVersion\\\\Run\\\\新项 #1。",[259,412],{"fieldName":5283,"label":5284,"description":5285,"type":322,"subcate_ids":5286,"enum":330},"deviceVendor","设备厂商","硬件设备或软件产品的制造商或供应商名称，用于资产识别、漏洞影响范围分析和供应链安全管理。",[360,361,362],{"fieldName":5288,"label":5289,"description":5290,"type":322,"subcate_ids":5291,"enum":330},"newStartType","新启动方式","新启动方式是指服务配置修改后的新启动方式。",[289],{"fieldName":5293,"label":5294,"description":5295,"type":1917,"subcate_ids":5296,"enum":330},"pktsInAndOut","总数据包数","总数据包数是指统计网络接口或会话中双向传输的数据包累计总数。该字段值为非负长整数。",[33,429],{"fieldName":5298,"label":5299,"description":5300,"type":322,"subcate_ids":5301,"enum":330},"latestActivityTime","最近发生时间","该字段记录安全事件中最后一次活动或告警触发的时间。格式必须为标准的日期时间字符串，具体要求为：yyyy-mm-dd HH:mm:ss，例如 2024-12-27 19:28:22。",[551],{"fieldName":5303,"label":5304,"description":5305,"type":513,"subcate_ids":5306,"enum":330},"destPort","目的端口","目的端口是网络连接接收方的端口号，用于标识接收方应用程序或服务。该字段为整数类型，取值范围为0-65535，其中0-1023为知名端口，1024-49151为注册端口，49152-65535为动态或私有端口。",[38,47,54,68,76,89,94,99,104,110,116,121,128,133,138,143,150,160,165,170,175,180,185,190,195,202,207,223,247,300,305,315,324,63,33,295,411,379,380,381,382,325,326,383,327,213,328,329,400,412,429,342,343],{"fieldName":5308,"label":5309,"description":5310,"type":322,"subcate_ids":5311,"enum":330},"destLoginId","目标登录ID","目标系统或服务的登录标识符，通常用于标识用户或实体在目标系统上的身份。",[47],{"fieldName":5313,"label":5314,"description":5315,"type":322,"subcate_ids":5316,"enum":330},"whois","whios信息","whois字段用于存储基于WHOIS协议查询得到的完整域名注册信息。该字段内容需包含域名注册人、注册商、创建日期、名称服务器等关键信息。",[369],{"fieldName":5318,"label":5319,"description":5320,"type":335,"subcate_ids":5321,"enum":330},"isPrimary","是否主键","该字段用于标识数据库列是否被定义为主键。其值为布尔类型，只能取 true 或 false。",[345],{"fieldName":5323,"label":5324,"description":5325,"type":322,"subcate_ids":5326,"enum":330},"hypervisor","虚拟化管理程序","该字段用于标识虚拟化平台中管理和运行虚拟机实例的底层软件系统。其值为描述虚拟化管理程序名称及版本号的字符串，通常由厂商名称、产品名称和版本号组成。",[364],{"fieldName":5328,"label":5329,"description":5330,"type":322,"subcate_ids":5331,"enum":330},"closeTime","关闭时间","closeTime字段表示事件处置完成并被正式关闭的时间。该字段为字符串类型，必须遵循严格的日期时间格式：yyyy-mm-dd HH:mm:ss，例如2025-01-14 11:18:31。",[551],{"fieldName":5333,"label":5334,"description":5335,"type":513,"subcate_ids":5336,"enum":330},"dropPackagesRate","丢包速率","丢包速率表示统计网络传输过程中丢失的数据包速率，单位为每秒数据包个数（pps）。该字段为整型数值，取值范围为非负整数。",[33],{"fieldName":5338,"label":5339,"description":5340,"type":1917,"subcate_ids":5341,"enum":330},"bytesIn","请求字节数","该字段用于统计客户端请求消息的字节总量，其值为非负长整型。",[38,68,121,138,150,180,33,429,342],{"fieldName":5343,"label":5344,"description":5345,"type":322,"subcate_ids":5346,"enum":330},"wmiEventNamespace","WMI事件命名空间","WMI事件筛选器所属的命名空间路径，用于标识WMI提供程序中的特定类别层次结构。格式为WMI命名空间的标准路径字符串，各层级之间使用反斜杠“\\\\”分隔。",[],{"fieldName":5348,"label":5349,"description":5350,"type":1917,"subcate_ids":5351,"enum":330},"cost","耗时","该字段记录命令、脚本或程序执行的耗时，单位为毫秒。其值为长整型（long），表示从操作开始到结束所经过的时间长度，必须为非负整数。",[128],{"fieldName":5353,"label":5354,"description":5355,"type":322,"subcate_ids":5356,"enum":330},"machineAccountQuota","机器帐户配额","该字段表示Active Directory中允许创建的最大计算机账号数量，格式为字符串类型，通常为数字字符串，表示配额数值。",[],{"fieldName":5358,"label":5359,"description":5360,"type":1673,"subcate_ids":5361,"enum":330},"scanPortList","扫描端口列表","该字段记录网络扫描活动中被探测的目标端口号集合，每个端口号必须为整数类型，取值范围为0到65535，表示有效端口号。",[380],{"fieldName":5363,"label":5364,"description":5365,"type":470,"subcate_ids":5366,"enum":5367},"confidence","告警置信度","告警置信度表示对威胁检测、归因或分析结果准确性的等级评估指标。该字段为枚举类型，可选值包括：Low（低置信度）、Medium（中置信度）和High（高置信度）。",[324,63,33,295,411,379,380,381,382,325,326,383,327,213,328,329,400,412,429,342,343,84,418,430,384],{"High":5368,"Low":5371,"Medium":5374},{"description":5369,"label":5370},"告警信息误报率极低，可信度很高","高置信度",{"description":5372,"label":5373},"告警信息基于单一、不确定的指标，可能存在误报，需要进一步验证","低置信度",{"description":5375,"label":5376},"告警信息具有一定可靠性，但仍需分析确认","中置信度",{"fieldName":5378,"label":5379,"description":5380,"type":322,"subcate_ids":5381,"enum":330},"filePath","文件目录","该字段表示文件在文件系统中的存储目录路径。路径格式应符合操作系统规范，例如Windows系统使用反斜杠（\\）作为目录分隔符，而Linux/Unix系统使用正斜杠（/）。",[195,229,300,324,326,327,213,328,329,412,342,343],{"fieldName":5383,"label":5384,"description":5385,"type":322,"subcate_ids":5386,"enum":330},"webTitle","网站标题","网站标题，指网页的标题文本内容。字段类型为字符串，内容通常来源于HTML文档的\u003Ctitle>标签。",[359],{"fieldName":5388,"label":5389,"description":5390,"type":322,"subcate_ids":5391,"enum":330},"deviceVersion","设备版本","设备版本标识设备固件、操作系统或嵌入式软件的完整版本信息。版本号通常采用多段数字格式，如主版本号.次版本号.修订号.构建号等。",[38,47,54,68,76,89,94,99,104,110,116,121,128,133,138,143,150,160,165,170,175,180,185,190,195,202,207,218,223,229,237,242,247,253,259,264,269,274,279,284,289,300,305,310,315,324,63,33,295,411,379,380,381,382,325,326,383,327,213,328,329,400,412,429,342,343,84,418,430,384,360,361],{"fieldName":5393,"label":5394,"description":5395,"type":322,"subcate_ids":5396,"enum":330},"resourceUri","资源URI","资源URI字段用于标识特定资源的统一资源标识符，其值应符合URI标准格式规范，通常以协议类型开头（如http、https、ftp等），后跟资源路径。",[279],{"fieldName":5398,"label":5399,"description":5400,"type":513,"subcate_ids":5401,"enum":330},"columnCount","列数","该字段表示数据库表中定义的列总数，其值应为非负整数。",[346],{"fieldName":5403,"label":5404,"description":5405,"type":322,"subcate_ids":5406,"enum":330},"serviceName","服务名称","服务名称，指在系统或应用程序中运行的服务标识。",[38,289,400,84,418,430,371],{"fieldName":5408,"label":5409,"description":5410,"type":322,"subcate_ids":5411,"enum":330},"oldStartType","原启动方式","该字段记录修改前的原始启动方式，用于标识系统或服务在变更前的启动配置状态。",[289],{"fieldName":5413,"label":3156,"description":5414,"type":322,"subcate_ids":5415,"enum":330},"victimAddress","受害者IP地址，指遭受威胁攻击或风险影响的目标IP地址。格式要求：必须是符合IPv4或IPv6标准的IP地址格式，例如IPv4的点分十进制表示法（如192.168.22.35）或IPv6的冒号分隔十六进制表示法。",[324,63,33,295,411,379,380,381,382,325,326,383,327,213,328,329,400,412,429,342,343],{"fieldName":5417,"label":5418,"description":5419,"type":322,"subcate_ids":5420,"enum":330},"requestUrlQuery","请求URI","该字段表示HTTP请求URL中从根路径符“/”开始到查询字符串末尾的部分，即包括路径和查询参数。格式要求：必须为有效的URI路径及查询字符串，以“/”开头，可以包含字母、数字、连字符、下划线、点号以及查询参数（以“?”开头，参数间以“&”分隔）。",[38,54,68,76,150,63,33,379,380,381,382,383,400,342,343,384],{"fieldName":5422,"label":5423,"description":5424,"type":322,"subcate_ids":5425,"enum":330},"destImage","目标进程路径","目标进程的可执行文件完整路径，用于记录跨进程操作中目标进程的路径信息。该字段为字符串类型，应提供包含盘符、目录和文件名的完整绝对路径，例如Windows系统的可执行文件路径格式。",[264,412],{"fieldName":5427,"label":5428,"description":5429,"type":513,"subcate_ids":5430,"enum":330},"managementPort","管理端口","该字段表示用于设备带外管理、远程访问和系统维护的网络端口号。端口号必须是整数，取值范围为0到65535。其中，0到1023为公认端口，1024到49151为注册端口，49152到65535为动态或私有端口。",[360,361],{"fieldName":5432,"label":5433,"description":5434,"type":1673,"subcate_ids":5435,"enum":330},"alertIds","告警ID列表","记录安全事件关联的所有告警唯一标识符集合。该字段为字符串数组，数组内每个元素应为表示告警唯一标识符的字符串。",[551],{"fieldName":5437,"label":5438,"description":5439,"type":322,"subcate_ids":5440,"enum":330},"targetFilename","目标文件","目标文件是指系统操作或文件操作中涉及的文件的完整路径。格式要求：必须是有效的文件路径字符串，路径分隔符为正斜杠（/）或反斜杠（\\）。示例值：/data1/uacp/shell/uacpClient.sh。",[229,326,327,213,328,329,412,342],{"fieldName":5442,"label":5443,"description":5444,"type":322,"subcate_ids":5445,"enum":330},"namespace","命名空间","命名空间是Kubernetes集群中的逻辑隔离单元，用于资源分组和访问控制。该字段为字符串类型，其值需遵循Kubernetes命名空间命名规范。",[363],{"fieldName":5447,"label":5448,"description":5449,"type":322,"subcate_ids":5450,"enum":330},"assetName","资产名称","资产名称，用于标识资产的易读名称。",[352,353,344,345,354,346,355,356,357,358,359,360,361,362,363,364,365,366,367,368,369,370,371,372,373],{"fieldName":5452,"label":1301,"description":5453,"type":322,"subcate_ids":5454,"enum":330},"incidentId","事件ID是安全事件的全局唯一标识符，通常采用UUID或时间戳序列等不可重复算法生成，以保证其唯一性。",[551],{"fieldName":5456,"label":5457,"description":5458,"type":322,"subcate_ids":5459,"enum":330},"newUacValue","新UAC值","新UAC值表示用户账号在更改后的用户账号控制 (UAC) 值。该字段为字符串类型，通常以十六进制格式表示。",[218],{"fieldName":5461,"label":5462,"description":5463,"type":322,"subcate_ids":5464,"enum":330},"destInfo","目标信息","目标信息，指尝试登录的目标计算机或服务的具体标识，例如主机名、IP地址或服务名称。格式要求：通常为字符串格式，可以是有效的域名、IPv4地址、IPv6地址或主机名。",[47],{"fieldName":5466,"label":5467,"description":5468,"type":322,"subcate_ids":5469,"enum":330},"parentProcessUserName","父进程用户名","父进程在操作系统中的用户账号名称，用于标识启动该进程的用户身份。",[223,229,237,242,247,253,264,274,324,411,325,326,327,213,328,329,412],{"log":5471,"alert":5475,"asset":5603,"incident":5696},{"categories":5472,"versions":5473,"categoriesByVersion":5474},["Reactive",28],["Reactive",22],{"1.0":5472},{"categories":5476,"versions":5600,"categoriesByVersion":5602},[5477,5518,5549,5566,5578],{"id":5478,"title":5479,"description":5480,"count":382,"subcates":5481},"network_attack","网络攻击","监控并预警针对网络基础设施的恶意活动，包括入侵尝试、DDoS攻击和未经授权的访问。",[5482,5486,5490,5495,5500,5503,5507,5511,5514],{"name":5483,"id":5484,"numericId":324,"dataSource":5485,"tag":-1},"后门利用","network_attack_backdoor_exploit",[49,57],{"name":5487,"id":5488,"numericId":63,"dataSource":5489,"tag":-1},"凭据攻击","network_attack_credential_attack",[49,57],{"name":5491,"id":5492,"numericId":33,"dataSource":5493,"tag":-1},"拒绝服务","network_attack_dos",[5494,56,153],"抗DDOS系统",{"name":5496,"id":5497,"numericId":295,"dataSource":5498,"tag":-1},"邮件威胁","network_attack_email_threat",[5499,57],"反垃圾邮件网关",{"name":2392,"id":5501,"numericId":411,"dataSource":5502,"tag":-1},"network_attack_host_exploit",[49,57],{"name":5504,"id":5505,"numericId":379,"dataSource":5506,"tag":-1},"网络钓鱼","network_attack_phishing",[5499,57,153],{"name":5508,"id":5509,"numericId":380,"dataSource":5510,"tag":-1},"扫描探测","network_attack_scan_probe",[49,5054,57],{"name":155,"id":5512,"numericId":381,"dataSource":5513,"tag":-1},"network_attack_web",[5054,57,153],{"name":5515,"id":5516,"numericId":382,"dataSource":5517,"tag":-1},"网页篡改","network_attack_web_tampering",[57,153],{"id":5519,"title":5520,"description":5521,"count":380,"subcates":5522},"malware","恶意程序","告警检测检测到恶意软件，该软件旨在破坏、损害或未经授权访问计算机系统。",[5523,5527,5531,5535,5539,5542,5545],{"name":5524,"id":5525,"numericId":325,"dataSource":5526,"tag":-1},"僵尸网络","malware_botnet",[231,49,56,57],{"name":5528,"id":5529,"numericId":326,"dataSource":5530,"tag":-1},"计算机病毒","malware_computer_virus",[231,49,56,57],{"name":5532,"id":5533,"numericId":383,"dataSource":5534,"tag":-1},"恶意代码内嵌网页","malware_embedded_webpage",[57,153],{"name":5536,"id":5537,"numericId":327,"dataSource":5538,"tag":-1},"挖矿软件","malware_mining",[231,49,56,57],{"name":2908,"id":5540,"numericId":213,"dataSource":5541,"tag":-1},"malware_network_worm",[231,49,56,57],{"name":198,"id":5543,"numericId":328,"dataSource":5544,"tag":-1},"malware_ransomware",[231,49,56,57],{"name":5546,"id":5547,"numericId":329,"dataSource":5548,"tag":-1},"特洛伊木马","malware_trojan",[231,49,56,57],{"id":5550,"title":5551,"description":5552,"count":33,"subcates":5553},"anomalous_behavior","异常行为","该告警类型用于监测和报告偏离既定基准行为的异常或可疑活动，这些活动可能表明存在安全威胁或系统已遭入侵。",[5554,5558,5562],{"name":5555,"id":5556,"numericId":400,"dataSource":5557,"tag":-1},"访问异常","abnormal_behavior_access_anomaly",[57,41],{"name":5559,"id":5560,"numericId":412,"dataSource":5561,"tag":-1},"主机行为异常","abnormal_behavior_host_abnormality",[49],{"name":5563,"id":5564,"numericId":429,"dataSource":5565,"tag":-1},"流量异常","abnormal_behavior_traffic_anomaly",[56,57],{"id":5567,"title":5568,"description":5569,"count":63,"subcates":5570},"data_security","数据安全","监控并预警潜在的数据泄露、未授权访问或敏感信息泄漏。",[5571,5574],{"name":72,"id":5572,"numericId":342,"dataSource":5573,"tag":-1},"data_security_data_leak",[152,70,232,78],{"name":5575,"id":5576,"numericId":343,"dataSource":5577,"tag":-1},"数据篡改","data_security_tampering",[152,70],{"id":5579,"title":5580,"description":5581,"count":295,"subcates":5582},"vulnerability_configuration_risk","漏洞配置风险","告警检测由于系统配置错误或存在漏洞的设置可能被攻击者利用，从而造成潜在安全风险。",[5583,5588,5592,5596],{"name":5584,"id":5585,"numericId":84,"dataSource":5586,"tag":-1},"数据库风险","vulnerability_configuration_database_risk",[5587],"漏洞扫描器",{"name":5589,"id":5590,"numericId":418,"dataSource":5591,"tag":-1},"主机漏洞风险","vulnerability_configuration_host_risk",[5587],{"name":5593,"id":5594,"numericId":430,"dataSource":5595,"tag":-1},"弱口令风险","vulnerability_configuration_weak_password",[5587],{"name":5597,"id":5598,"numericId":384,"dataSource":5599,"tag":-1},"网站漏洞风险","vulnerability_configuration_website_risk",[5587],[5601],{"value":24,"label":25,"verDesc":26,"isLatest":27},{"1.0":5476},{"categories":5604,"versions":5693,"categoriesByVersion":5695},[5605,5622,5638,5649,5658,5671,5684],{"id":5606,"title":5607,"description":5608,"count":379,"subcates":5609},"data_asset","数据资产","数据资产是指对组织具有价值的任何结构化或非结构化数据，包括需要保护的敏感信息、知识产权或运营数据。",[5610,5612,5614,5616,5618,5620],{"name":3399,"id":5611,"numericId":352,"dataSource":-1,"tag":-1},"data_asset_account",{"name":3390,"id":5613,"numericId":353,"dataSource":-1,"tag":-1},"data_asset_api",{"name":3366,"id":5615,"numericId":344,"dataSource":-1,"tag":-1},"data_asset_database",{"name":3357,"id":5617,"numericId":345,"dataSource":-1,"tag":-1},"data_asset_field",{"name":3369,"id":5619,"numericId":354,"dataSource":-1,"tag":-1},"data_asset_file",{"name":3378,"id":5621,"numericId":346,"dataSource":-1,"tag":-1},"data_asset_table",{"id":5623,"title":5624,"description":5625,"count":411,"subcates":5626},"business_asset","业务资产","业务资产代表支撑组织运营的关键IT资源、系统或服务，需要防范网络威胁加以保护。",[5627,5629,5631,5633,5636],{"name":3402,"id":5628,"numericId":355,"dataSource":-1,"tag":-1},"business_asset_app",{"name":3372,"id":5630,"numericId":356,"dataSource":-1,"tag":-1},"business_asset_mini_program",{"name":3351,"id":5632,"numericId":357,"dataSource":-1,"tag":-1},"business_asset_public_account",{"name":5634,"id":5635,"numericId":358,"dataSource":-1,"tag":-1},"业务系统","business_asset_system",{"name":3343,"id":5637,"numericId":359,"dataSource":-1,"tag":-1},"business_asset_web_site",{"id":5639,"title":5640,"description":5641,"count":33,"subcates":5642},"physical_asset","物理资产","物理资产是指IT环境中需要安全监控和保护的有形硬件设备和基础设施组件。",[5643,5645,5647],{"name":3396,"id":5644,"numericId":360,"dataSource":-1,"tag":-1},"physical_asset_device",{"name":3340,"id":5646,"numericId":361,"dataSource":-1,"tag":-1},"physical_asset_server",{"name":3360,"id":5648,"numericId":362,"dataSource":-1,"tag":-1},"physical_asset_terminal",{"id":5650,"title":5651,"description":5652,"count":63,"subcates":5653},"virtual_asset","虚拟资产","虚拟资产指需要安全监控和防范网络威胁的数字资源，如加密货币、NFT或虚拟基础设施等。",[5654,5656],{"name":3337,"id":5655,"numericId":363,"dataSource":-1,"tag":-1},"virtual_asset_container",{"name":3384,"id":5657,"numericId":364,"dataSource":-1,"tag":-1},"virtual_asset_vm",{"id":5659,"title":5660,"description":5661,"count":33,"subcates":5662},"software_asset","软件资产","软件资产指安装在组织IT基础设施中使用或管理的任何软件应用程序或系统，包括版本、许可证和漏洞等详细信息。",[5663,5665,5668],{"name":3393,"id":5664,"numericId":365,"dataSource":-1,"tag":-1},"software_asset_application",{"name":5666,"id":5667,"numericId":366,"dataSource":-1,"tag":-1},"组件","software_asset_component",{"name":5669,"id":5670,"numericId":367,"dataSource":-1,"tag":-1},"中间件","software_asset_middleware",{"id":5672,"title":5673,"description":5674,"count":295,"subcates":5675},"network_asset","网络资产","网络资产指连接到网络并需要监控和保护的所有设备、系统或资源，包括服务器、工作站和物联网设备。",[5676,5678,5680,5682],{"name":3354,"id":5677,"numericId":368,"dataSource":-1,"tag":-1},"network_asset_certificate",{"name":3381,"id":5679,"numericId":369,"dataSource":-1,"tag":-1},"network_asset_domain",{"name":3363,"id":5681,"numericId":370,"dataSource":-1,"tag":-1},"network_asset_ip_address",{"name":3375,"id":5683,"numericId":371,"dataSource":-1,"tag":-1},"network_asset_port",{"id":5685,"title":5686,"description":5687,"count":63,"subcates":5688},"cloud_asset","云资产","云资产表示托管在云环境中的任何虚拟化资源或服务，包括虚拟机、存储和应用程序。",[5689,5691],{"name":3387,"id":5690,"numericId":372,"dataSource":-1,"tag":-1},"cloud_asset_ecs",{"name":3348,"id":5692,"numericId":373,"dataSource":-1,"tag":-1},"cloud_asset_storage",[5694],{"value":24,"label":25,"verDesc":26,"isLatest":27},{"1.0":5604},{"categories":5697,"versions":5703,"categoriesByVersion":5705},[5698],{"id":5699,"title":20,"description":5700,"count":324,"subcates":5701},"security_incident","安全事件指任何已确认违反或即将威胁违反计算机安全策略、可接受使用政策或标准安全实践的行为。",[5702],{"name":20,"id":5699,"numericId":551,"dataSource":-1,"tag":-1},[5704],{"value":24,"label":25,"verDesc":26,"isLatest":27},{"1.0":5697},[5707,5709,5711,5713,5715,5717,5719,5721,5723,5725,5727,5729],{"label":70,"key":5708},"Database Audit System",{"label":56,"key":5710},"Firewall",{"label":153,"key":5712},"Web Application Firewall",{"label":231,"key":5714},"Antivirus",{"label":123,"key":5716},"Bastion Host",{"label":57,"key":5718},"Network Detection and Response",{"label":49,"key":5720},"Endpoint Detection And Response",{"label":40,"key":5722},"VPN System",{"label":78,"key":5724},"Network DLP System",{"label":232,"key":5726},"Endpoint DLP System",{"label":152,"key":5728},"API Risk Monitoring System",{"label":41,"key":5730},"Zero Trust",[5732,5734,5736,5737,5739,5741,5743],{"label":43,"key":5733},"Brute Force",{"label":155,"key":5735},"Web Attack",{"label":156,"key":156},{"label":72,"key":5738},"Data Leakage",{"label":198,"key":5740},"Ransomware",{"label":146,"key":5742},"Phishing",{"label":125,"key":5744},"DDOS",1775524372747]