The Fingerprint object provides detailed information about a digital fingerprint, which is a compact representation of data used to identify a longer piece of information, such as a public key or file content. It contains the algorithm and value of the fingerprint, enabling efficient and reliable identification of the associated data.
Attributes
Section titled “Attributes”algorithm_id
- Type:
integer_t - Requirement: required
- Values:
0-Unknown: The algorithm is unknown.1-MD5: MD5 message-digest algorithm producing a 128-bit (16-byte) hash value.2-SHA-1: Secure Hash Algorithm 1 producing a 160-bit (20-byte) hash value.3-SHA-256: Secure Hash Algorithm 2 producing a 256-bit (32-byte) hash value.4-SHA-512: Secure Hash Algorithm 2 producing a 512-bit (64-byte) hash value.5-CTPH: The ssdeep generated fuzzy checksum. Also known as Context Triggered Piecewise Hash (CTPH).6-TLSH: The TLSH fuzzy hashing algorithm.7-quickXorHash: Microsoft simple non-cryptographic hash algorithm that works by XORing the bytes in a circular-shifting fashion.8-SHA-224: Secure Hash Algorithm 2 producing a 224-bit (28-byte) hash value.9-SHA-384: Secure Hash Algorithm 2 producing a 384-bit (48-byte) hash value.10-SHA-512/224: Secure Hash Algorithm 2 producing a 512-bit (64-byte) hash value truncated to a 224-bit (28-byte) hash value.11-SHA-512/256: Secure Hash Algorithm 2 producing a 512-bit (64-byte) hash value truncated to a 256-bit (32-byte) hash value.12-SHA3-224: Secure Hash Algorithm 3 producing a 224-bit (28-byte) hash value.13-SHA3-256: Secure Hash Algorithm 3 producing a 256-bit (32-byte) hash value.14-SHA3-384: Secure Hash Algorithm 3 producing a 384-bit (48-byte) hash value.15-SHA3-512: Secure Hash Algorithm 3 producing a 512-bit (64-byte) hash value.16-xxHash H3 64-bit: xxHash H3 producing a 64-bit hash value.17-xxHash H3 128-bit: xxHash H3 producing a 128-bit hash value.99-Other: The algorithm is not mapped. See thealgorithmattribute, which contains a data source specific value.
The identifier of the normalized hash algorithm, which was used to create the digital fingerprint.
value
- Type:
file_hash_t - Requirement: required
The digital fingerprint value.
algorithm
- Type:
string_t - Requirement: optional
The hash algorithm used to create the digital fingerprint, normalized to the caption of algorithm_id. In the case of Other, it is defined by the event source.
Used By
Section titled “Used By”account_changeadmin_group_queryairborne_broadcast_activityapi_activityapplication_errorapplication_lifecycleapplication_security_posture_findingauthenticationauthorize_sessionbase_eventcloud_resources_inventory_infocompliance_findingconfig_statedata_security_findingdatastore_activitydetection_findingdevice_config_state_changedhcp_activitydns_activitydrone_flights_activityemail_activityemail_file_activityemail_url_activityentity_managementevent_log_actvityevidence_infofile_activityfile_hostingfile_queryfile_remediation_activityfolder_queryftp_activitygroup_managementhttp_activityiam_analysis_findingincident_findinginventory_infojob_querykernel_activitykernel_extension_activitykernel_object_querymemory_activitymodule_activitymodule_querynetwork_activitynetwork_connection_querynetwork_file_activitynetwork_remediation_activitynetworks_queryntp_activityosint_inventory_infopatch_stateperipheral_activityperipheral_device_queryprocess_activityprocess_queryprocess_remediation_activityrdp_activityremediation_activityscan_activityscheduled_job_activityscript_activitysecurity_findingservice_querysession_querysmb_activitysoftware_infossh_activitystartup_item_querytunnel_activityuser_accessuser_inventoryuser_queryvulnerability_findingweb_resource_access_activityweb_resources_activitywin/prefetch_querywin/registry_key_activitywin/registry_key_querywin/registry_value_activitywin/registry_value_querywin/windows_resource_activitywin/windows_service_activity