The Malware object describes the classification of known malicious software, which is intentionally designed to cause damage to a computer, server, client, or computer network.
- Extends:
_entity
Attributes
Section titled “Attributes”classification_ids
- Type:
integer_t - Requirement: required
- Values:
0-Unknown: The classification is unknown.1-Adware2-Backdoor3-Bot4-Bootkit5-DDOS6-Downloader7-Dropper8-Exploit-Kit9-Keylogger10-Ransomware11-Remote-Access-Trojan13-Resource-Exploitation14-Rogue-Security-Software15-Rootkit16-Screen-Capture17-Spyware18-Trojan19-Virus20-Webshell21-Wiper22-Worm99-Other: The classification is not mapped. See theclassificationsattribute, which contains a data source specific value.
The list of normalized identifiers of the malware classifications. Reference: STIX Malware Types
name
- Type:
string_t - Requirement: recommended
The malware name, as reported by the detection engine.
path
- Type:
string_t - Requirement: recommended
The filesystem path of the malware that was observed.
provider
- Type:
string_t - Requirement: recommended
The provider of the malware information.
uid
- Type:
string_t - Requirement: recommended
The malware unique identifier, as reported by the detection engine. For example a virus id or an IPS signature id.
classifications
- Type:
string_t - Requirement: optional
The list of malware classifications, normalized to the captions of the classification_ids values. In the case of ‘Other’, they are defined by the event source.
cves
- Type:
cve - Requirement: optional
List of Common Vulnerabilities and Exposures (CVE).
Constraints
Section titled “Constraints”At least one of: name, uid
Used By
Section titled “Used By”account_changeadmin_group_queryairborne_broadcast_activityapi_activityapplication_errorapplication_lifecycleauthenticationauthorize_sessionbase_eventcloud_resources_inventory_infocompliance_findingconfig_statedata_security_findingdatastore_activitydetection_findingdevice_config_state_changedhcp_activitydns_activitydrone_flights_activityemail_activityemail_file_activityemail_url_activityentity_managementevent_log_actvityfile_activityfile_hostingfile_queryfile_remediation_activityfolder_queryftp_activitygroup_managementhttp_activityincident_findinginventory_infojob_querykernel_activitykernel_extension_activitykernel_object_querymemory_activitymodule_activitymodule_querynetwork_activitynetwork_connection_querynetwork_file_activitynetwork_remediation_activitynetworks_queryntp_activityosint_inventory_infopatch_stateperipheral_device_queryprocess_activityprocess_queryprocess_remediation_activityrdp_activityremediation_activityscan_activityscheduled_job_activityscript_activitysecurity_findingservice_querysession_querysmb_activitysoftware_infossh_activitystartup_item_querytunnel_activityuser_accessuser_inventoryuser_queryvulnerability_findingweb_resource_access_activityweb_resources_activitywin/prefetch_querywin/registry_key_activitywin/registry_key_querywin/registry_value_activitywin/registry_value_querywin/windows_resource_activitywin/windows_service_activity