[{"data":1,"prerenderedAt":2910},["ShallowReactive",2],{"page-data-data_security-zh":3,"categories-data_security-search-data-zh":56,"markdown-data_security-data_security_data_leak-zh":2899,"data-sources-zh--data_security-data_security_data_leak":2900,"tags-zh--data_security-data_security_data_leak":2909},{"dataTypes":4,"versionsMap":22,"activeType":11,"schema":35,"siblingSchemas":39},[5,10,14,18],{"dataType":6,"dataTypeChName":7,"description":8,"label":9,"value":6},"log","","由操作系统、应用程序或安全设备按时间顺序生成的事件记录。日志提供了不可篡改的审计追踪，用于监控系统状态、调查可疑活动以及在事后进行取证分析。","日志",{"dataType":11,"dataTypeChName":7,"description":12,"label":13,"value":11},"alert","由安全系统（如SIEM、IDS或防火墙）自动生成的通知，表示预定义的安全规则或异常检测阈值已被触发。","告警",{"dataType":15,"dataTypeChName":7,"description":16,"label":17,"value":15},"asset","指组织中任何具有价值并需要保护的数据、设备或系统组成部分，包括硬件、软件、信息及网络资源。","资产",{"dataType":19,"dataTypeChName":7,"description":20,"label":21,"value":19},"incident","指已确认或即将发生的违反组织安全策略、可接受使用政策或标准安全实践的行为。安全事件通常由告警经调查后升级而来，需要协调响应以控制影响。","安全事件",{"log":23,"alert":29,"asset":31,"incident":33},[24],{"value":25,"label":26,"verDesc":27,"isLatest":28},"1.0","v1.0","Default Version",true,[30],{"value":25,"label":26,"verDesc":27,"isLatest":28},[32],{"value":25,"label":26,"verDesc":27,"isLatest":28},[34],{"value":25,"label":26,"verDesc":27,"isLatest":28},{"id":36,"title":37,"description":38,"dataType":11},"data_security","数据安全","监控并预警潜在的数据泄露、未授权访问或敏感信息泄漏。",[40,44,48,35,52],{"id":41,"title":42,"description":43,"dataType":11},"network_attack","网络攻击","监控并预警针对网络基础设施的恶意活动，包括入侵尝试、DDoS攻击和未经授权的访问。",{"id":45,"title":46,"description":47,"dataType":11},"malware","恶意程序","告警检测检测到恶意软件，该软件旨在破坏、损害或未经授权访问计算机系统。",{"id":49,"title":50,"description":51,"dataType":11},"anomalous_behavior","异常行为","该告警类型用于监测和报告偏离既定基准行为的异常或可疑活动，这些活动可能表明存在安全威胁或系统已遭入侵。",{"id":53,"title":54,"description":55,"dataType":11},"vulnerability_configuration_risk","漏洞配置风险","告警检测由于系统配置错误或存在漏洞的设置可能被攻击者利用，从而造成潜在安全风险。",{"data_security":57},{"categoryId":36,"fields":58,"subCategories":2890},[59,71,78,85,91,97,103,109,115,121,128,134,140,146,152,159,165,171,177,183,189,195,201,207,213,219,225,231,282,288,294,300,346,353,359,366,372,378,384,607,613,619,625,631,637,643,649,655,662,680,773,894,900,906,912,918,924,930,936,942,948,954,960,966,972,978,984,990,996,1010,1144,1150,1170,1176,1182,1188,1194,1200,1206,1212,1218,1256,1274,1280,2094,2100,2106,2112,2118,2124,2130,2136,2142,2148,2154,2160,2166,2172,2178,2184,2190,2196,2202,2208,2214,2219,2222,2225,2228,2230,2236,2239,2242,2245,2248,2306,2309,2312,2315,2318,2321,2324,2327,2330,2333,2339,2364,2396,2399,2402,2405,2408,2411,2414,2417,2420,2423,2426,2429,2432,2435,2438,2441,2444,2447,2450,2455,2522,2525,2532,2535,2538,2541,2544,2547,2550,2553,2556,2567,2573,2576,2781,2784,2787,2790,2793,2796,2799,2802,2805,2808,2811,2814,2817,2820,2823,2826,2829,2832,2835,2838,2841,2844,2847,2850,2853,2856,2859,2862,2864,2866,2878,2881,2884,2887],{"id":60,"fieldName":60,"fieldType":61,"displayName":62,"importance":63,"description":64,"tag":-1,"dataSource":65,"enumValues":68,"categoryId":36,"subCategoryId":69,"subCategoryName":70},"requestMethod","string","请求方法","RECOMMENDED","网络请求客户端向服务器发送请求时使用的HTTP请求方法类型，如GET、POST、PUT、DELETE等标准方法。该字段值必须统一使用大写英文字母表示",[66,67],"API风险监测系统","网络DLP系统",[],"data_security_data_leak","数据泄露",{"id":72,"fieldName":72,"fieldType":61,"displayName":73,"importance":74,"description":75,"tag":-1,"dataSource":76,"enumValues":77,"categoryId":36,"subCategoryId":69,"subCategoryName":70},"httpVersion","HTTP协议版本","OPTIONAL","该字段标识HTTP网络请求中使用的协议版本。格式为字符串，必须符合HTTP协议版本的标准表示格式，例如\"HTTP/1.0\"、\"HTTP/1.1\"或\"HTTP/2\"。",[66,67],[],{"id":79,"fieldName":79,"fieldType":61,"displayName":80,"importance":74,"description":81,"tag":-1,"dataSource":82,"enumValues":84,"categoryId":36,"subCategoryId":69,"subCategoryName":70},"httpReferer","请求Referer","HTTP请求的来源页面URL，即浏览器在发送当前请求时所来自的页面的完整地址。格式必须符合URL规范，通常以协议（如http://或https://）开头，包含域名和可选的路径、查询参数等组成部分。",[66,83,67],"数据库审计系统",[],{"id":86,"fieldName":86,"fieldType":61,"displayName":87,"importance":63,"description":88,"tag":-1,"dataSource":89,"enumValues":90,"categoryId":36,"subCategoryId":69,"subCategoryName":70},"userAgent","用户代理","用户代理字符串，用于标识发起请求的客户端（用户代理）的匿名化信息，通常包含客户端的操作系统、浏览器类型、版本、设备类型等。格式需符合HTTP标准的User-Agent字符串。",[66,67],[],{"id":92,"fieldName":92,"fieldType":61,"displayName":93,"importance":63,"description":94,"tag":-1,"dataSource":95,"enumValues":96,"categoryId":36,"subCategoryId":69,"subCategoryName":70},"responseCode","响应码","响应码是网络请求后服务器返回的状态码，用于表示请求的处理结果。",[66,67],[],{"id":98,"fieldName":98,"fieldType":61,"displayName":99,"importance":63,"description":100,"tag":-1,"dataSource":101,"enumValues":102,"categoryId":36,"subCategoryId":69,"subCategoryName":70},"requestHeader","请求头","请求头是HTTP网络请求中客户端向服务器发送请求时用于传递附加信息、客户端特性及身份验证等元数据的部分，其内容应为符合HTTP协议规范的字符串。",[66,67],[],{"id":104,"fieldName":104,"fieldType":61,"displayName":105,"importance":63,"description":106,"tag":-1,"dataSource":107,"enumValues":108,"categoryId":36,"subCategoryId":69,"subCategoryName":70},"responseHeader","响应头","响应头字段包含HTTP网络请求中服务器返回给客户端的元数据和服务器信息，用于描述响应内容（如内容类型、长度等）和服务器状态。该字段为字符串类型，其内容需符合HTTP协议标准规范。",[66,67],[],{"id":110,"fieldName":110,"fieldType":61,"displayName":111,"importance":74,"description":112,"tag":-1,"dataSource":113,"enumValues":114,"categoryId":36,"subCategoryId":69,"subCategoryName":70},"requestContentType","请求内容类型","请求内容类型，对应网络请求头中的Content-Type字段，用于描述请求数据的格式和字符编码。其值通常为标准MIME类型字符串，格式规范为“主类型/子类型”，并可附加参数（如字符集）。常见示例包括“application/json”、“text/html; charset=utf-8”等。",[66],[],{"id":116,"fieldName":116,"fieldType":61,"displayName":117,"importance":74,"description":118,"tag":-1,"dataSource":119,"enumValues":120,"categoryId":36,"subCategoryId":69,"subCategoryName":70},"responseContentType","响应内容类型","响应内容类型标识网络请求响应头中的内容类型，用于描述返回数据的媒体类型格式和字符编码。格式应符合HTTP标准的内容类型规范，通常由主类型和子类型组成，可选参数包括字符编码等，例如\"application/json; charset=utf-8\"。取值应为有效的MIME类型字符串。",[66,67],[],{"id":122,"fieldName":122,"fieldType":123,"displayName":124,"importance":74,"description":125,"tag":-1,"dataSource":126,"enumValues":127,"categoryId":36,"subCategoryId":69,"subCategoryName":70},"bytesOut","long","响应字节数","响应字节数，用于统计服务器响应消息的字节总量。该字段为长整型数值，其值必须为非负整数，表示字节数。",[66,67],[],{"id":129,"fieldName":129,"fieldType":123,"displayName":130,"importance":74,"description":131,"tag":-1,"dataSource":132,"enumValues":133,"categoryId":36,"subCategoryId":69,"subCategoryName":70},"bytesIn","请求字节数","该字段用于统计客户端请求消息的字节总量，其值为非负长整型。",[66,67],[],{"id":135,"fieldName":135,"fieldType":61,"displayName":136,"importance":63,"description":137,"tag":-1,"dataSource":138,"enumValues":139,"categoryId":36,"subCategoryId":69,"subCategoryName":70},"requestBody","HTTP请求体","HTTP网络请求客户端向服务器发送请求时传递的数据内容，通常包含请求参数、表单数据或JSON体。",[66,67],[],{"id":141,"fieldName":141,"fieldType":61,"displayName":142,"importance":63,"description":143,"tag":-1,"dataSource":144,"enumValues":145,"categoryId":36,"subCategoryId":69,"subCategoryName":70},"responseBody","响应体","该字段表示HTTP网络请求响应客户端接收到的响应内容。格式为字符串，内容通常为文本、JSON、XML或HTML等。",[66,67],[],{"id":147,"fieldName":147,"fieldType":123,"displayName":148,"importance":74,"description":149,"tag":-1,"dataSource":150,"enumValues":151,"categoryId":36,"subCategoryId":69,"subCategoryName":70},"responseTime","响应时间","该字段记录网络请求从客户端发送到完整接收服务器响应的时间间隔，单位为毫秒。其值为长整型数字，表示一个非负的时间长度。",[66,67],[],{"id":153,"fieldName":153,"fieldType":61,"displayName":154,"importance":63,"description":155,"tag":-1,"dataSource":156,"enumValues":158,"categoryId":36,"subCategoryId":69,"subCategoryName":70},"fileName","文件名称","文件的基本名称，不包含路径信息。格式要求：字符串类型，长度不超过255个字符，支持常见操作系统允许的文件名字符集（如字母、数字、下划线、点、连字符等），应避免使用系统保留字符和路径分隔符。",[66,157,67],"终端DLP系统",[],{"id":160,"fieldName":160,"fieldType":61,"displayName":161,"importance":74,"description":162,"tag":-1,"dataSource":163,"enumValues":164,"categoryId":36,"subCategoryId":69,"subCategoryName":70},"loginUser","登录用户","该字段表示成功登录系统的用户账号标识。格式要求：用户账号应为字符串类型，通常由字母、数字、下划线等常见字符组成。",[67],[],{"id":166,"fieldName":166,"fieldType":61,"displayName":167,"importance":74,"description":168,"tag":-1,"dataSource":169,"enumValues":170,"categoryId":36,"subCategoryId":69,"subCategoryName":70},"mailSubject","邮件主题","邮件主题行内容，用于概括邮件的主要目的和内容概要。",[67],[],{"id":172,"fieldName":172,"fieldType":61,"displayName":173,"importance":74,"description":174,"tag":-1,"dataSource":175,"enumValues":176,"categoryId":36,"subCategoryId":69,"subCategoryName":70},"srcUserName","源用户名","源用户名指发起网络连接、系统访问或安全事件的主体用户身份名称。",[66,83,67],[],{"id":178,"fieldName":178,"fieldType":61,"displayName":179,"importance":74,"description":180,"tag":-1,"dataSource":181,"enumValues":182,"categoryId":36,"subCategoryId":69,"subCategoryName":70},"destUserName","目标用户名","该字段表示网络连接、系统访问或安全事件的目标主体用户身份名称。其值为字符串类型，具体内容应为操作系统或应用程序中定义的有效用户名。",[67],[],{"id":184,"fieldName":184,"fieldType":61,"displayName":185,"importance":74,"description":186,"tag":-1,"dataSource":187,"enumValues":188,"categoryId":36,"subCategoryId":69,"subCategoryName":70},"mailContent","邮件内容","邮件的主要文本内容体，包含邮件的详细信息和通信内容。",[67],[],{"id":190,"fieldName":190,"fieldType":61,"displayName":191,"importance":74,"description":192,"tag":-1,"dataSource":193,"enumValues":194,"categoryId":36,"subCategoryId":69,"subCategoryName":70},"clientPrg","客户端程序","该字段用于标识连接数据库或其他服务的客户端应用程序名称，通常为客户端软件或驱动程序的名称。",[83,67],[],{"id":196,"fieldName":196,"fieldType":61,"displayName":197,"importance":74,"description":198,"tag":-1,"dataSource":199,"enumValues":200,"categoryId":36,"subCategoryId":69,"subCategoryName":70},"ccUserName","抄送人","抄送人字段用于记录邮件抄送接收方的邮箱地址集合。该字段值为字符串类型，其内容应为一个或多个符合RFC 5322标准的有效邮箱地址。多个地址之间通常使用逗号分隔。",[67],[],{"id":202,"fieldName":202,"fieldType":61,"displayName":203,"importance":74,"description":204,"tag":-1,"dataSource":205,"enumValues":206,"categoryId":36,"subCategoryId":69,"subCategoryName":70},"bccUserName","密送人","该字段记录邮件密送接收方的邮箱地址集合，多个地址应以英文分号分隔。每个邮箱地址需符合标准的电子邮件地址格式，通常包含本地部分、@符号和域名部分。",[67],[],{"id":208,"fieldName":208,"fieldType":61,"displayName":209,"importance":63,"description":210,"tag":-1,"dataSource":211,"enumValues":212,"categoryId":36,"subCategoryId":69,"subCategoryName":70},"requestUrl","请求URL","该字段表示HTTP请求URL中从根路径'/'开始到查询字符串'?'之前的部分，用于标识请求的资源路径。其值必须是一个合法的URL路径字符串，通常以'/'开头，不应包含协议、域名、端口或查询参数（即'?'及之后的内容）。字符串内容应符合URL路径的通用规范，可以包含字母、数字以及特定的安全字符（如-._~!$&'()*+,;=:@%）。",[66,83,67],[],{"id":214,"fieldName":214,"fieldType":61,"displayName":215,"importance":63,"description":216,"tag":-1,"dataSource":217,"enumValues":218,"categoryId":36,"subCategoryId":69,"subCategoryName":70},"requestUrlQuery","请求URI","该字段表示HTTP请求URL中从根路径符“/”开始到查询字符串末尾的部分，即包括路径和查询参数。格式要求：必须为有效的URI路径及查询字符串，以“/”开头，可以包含字母、数字、连字符、下划线、点号以及查询参数（以“?”开头，参数间以“&”分隔）。",[66,83,67],[],{"id":220,"fieldName":220,"fieldType":61,"displayName":221,"importance":74,"description":222,"tag":-1,"dataSource":223,"enumValues":224,"categoryId":36,"subCategoryId":69,"subCategoryName":70},"XFF","XFF头","XFF头字段用于识别通过HTTP代理或负载均衡方式连接到Web服务器的客户端最原始的IP地址。",[66],[],{"id":226,"fieldName":226,"fieldType":61,"displayName":227,"importance":74,"description":228,"tag":-1,"dataSource":229,"enumValues":230,"categoryId":36,"subCategoryId":69,"subCategoryName":70},"hostName","主机名称","主机在网络中的标识名称，通常用于在局域网或DNS系统中识别特定设备，例如NetBIOS名称或DNS主机名。格式要求：必须为有效的字符串，允许使用字母、数字、连字符（-）和点号（.），但不得以连字符或点号开头或结尾。",[83,157],[],{"id":232,"fieldName":232,"fieldType":233,"displayName":234,"importance":63,"description":235,"tag":-1,"dataSource":236,"enumValues":237,"categoryId":36,"subCategoryId":69,"subCategoryName":70},"exfiltrationChannel","enum","泄露渠道","该字段标识数据泄露事件中数据被传输到外部的具体渠道。其值必须为预定义的枚举字符串，可选值包括但不限于：removableMedia（可移动介质）、networkProtocols（网络协议传输）、emailSystems（邮件系统）、messagingApps（即时通讯应用）、cloudServices（云服务）等。",[157],[238,242,246,250,254,258,262,266,270,274,278],{"value":239,"title":240,"description":241},"removableMedia","可移动介质","通过USB设备、移动硬盘、光盘等可移动介质拷贝数据",{"value":243,"title":244,"description":245},"networkProtocols","网络协议传输","通过网络共享、FTP、SMB等协议传输数据",{"value":247,"title":248,"description":249},"emailSystems","邮件系统","通过网页邮箱、邮件客户端等电子邮件系统发送数据",{"value":251,"title":252,"description":253},"messagingApps","即时通讯应用","通过微信、QQ、Telegram等即时通讯应用发送数据",{"value":255,"title":256,"description":257},"cloudServices","云服务","通过网盘、云存储等云服务上传和分享数据",{"value":259,"title":260,"description":261},"webInterfaces","Web界面","通过HTTPS网页表单、在线服务等Web界面传输数据",{"value":263,"title":264,"description":265},"remoteConnections","远程连接","通过远程控制软件、VPN、蓝牙等远程连接传输数据",{"value":267,"title":268,"description":269},"physicalCapture","物理捕获","通过打印、截图、剪切板、拍照等物理方式捕获数据",{"value":271,"title":272,"description":273},"databaseTools","数据库工具","通过数据库管理工具导出大量结构化数据",{"value":275,"title":276,"description":277},"applicationApis","应用API","通过应用程序API接口批量获取和传输数据",{"value":279,"title":280,"description":281},"other","其他","其他类型的泄露方式",{"id":283,"fieldName":283,"fieldType":61,"displayName":284,"importance":63,"description":285,"tag":-1,"dataSource":286,"enumValues":287,"categoryId":36,"subCategoryId":69,"subCategoryName":70},"filePath","文件目录","该字段表示文件在文件系统中的存储目录路径。路径格式应符合操作系统规范，例如Windows系统使用反斜杠（\\）作为目录分隔符，而Linux/Unix系统使用正斜杠（/）。",[157],[],{"id":289,"fieldName":289,"fieldType":61,"displayName":290,"importance":63,"description":291,"tag":-1,"dataSource":292,"enumValues":293,"categoryId":36,"subCategoryId":69,"subCategoryName":70},"md5","文件MD5","文件MD5值，表示使用MD5算法计算的文件内容哈希值。该值必须为32位十六进制字符串，不区分大小写，用于唯一标识文件内容。",[157,67],[],{"id":295,"fieldName":295,"fieldType":123,"displayName":296,"importance":74,"description":297,"tag":-1,"dataSource":298,"enumValues":299,"categoryId":36,"subCategoryId":69,"subCategoryName":70},"fileSize","文件大小","文件内容的字节大小，表示文件的存储空间占用情况，单位是字节。",[157,67],[],{"id":301,"fieldName":301,"fieldType":233,"displayName":302,"importance":74,"description":303,"tag":-1,"dataSource":304,"enumValues":305,"categoryId":36,"subCategoryId":69,"subCategoryName":70},"fileType","文件类型","文件类型，基于文件格式和扩展名进行分类。其值为预定义的枚举字符串，包括但不限于：Executable（可执行文件）、Script（脚本文件）、Document（文档文件）、Archive（压缩归档）、Configuration（配置文件）等共10个可选值。取值必须严格匹配预定义的枚举值。",[157],[306,310,314,318,322,326,330,334,338,342],{"value":307,"title":308,"description":309},"Executable","可执行文件","可直接执行的程序文件，如EXE、DLL、BAT等",{"value":311,"title":312,"description":313},"Script","脚本文件","需要解释器执行的脚本文件，如PS1、JS、PY等",{"value":315,"title":316,"description":317},"Document","文档文件","办公文档和文本文件，如PDF、DOC、XLS等",{"value":319,"title":320,"description":321},"Archive","压缩归档","压缩和归档文件，如ZIP、RAR、TAR等",{"value":323,"title":324,"description":325},"Configuration","配置文件","系统和应用配置文件，如XML、JSON、CONF等",{"value":327,"title":328,"description":329},"Log","日志文件","系统和应用程序日志文件，如LOG、EVTX、AUDIT等",{"value":331,"title":332,"description":333},"Media","媒体文件","图像、音频、视频文件，如JPG、MP4、MP3等",{"value":335,"title":336,"description":337},"System","系统文件","操作系统核心文件，如SYS、DRV、BIN等",{"value":339,"title":340,"description":341},"Database","数据库文件","数据库相关文件，如MDF、DB、SQL等",{"value":343,"title":344,"description":345},"Other","其他类型","未分类的其他文件类型",{"id":347,"fieldName":347,"fieldType":348,"displayName":349,"importance":74,"description":350,"tag":-1,"dataSource":351,"enumValues":352,"categoryId":36,"subCategoryId":69,"subCategoryName":70},"fileEncrypted","boolean","文件是否加密","该字段标识文件内容是否经过加密算法保护。该字段为布尔类型，仅允许取值为 true 或 false，分别表示文件已加密和文件未加密。",[157],[],{"id":354,"fieldName":354,"fieldType":61,"displayName":355,"importance":74,"description":356,"tag":-1,"dataSource":357,"enumValues":358,"categoryId":36,"subCategoryId":69,"subCategoryName":70},"fileGuid","文件GUID","文件的全局唯一标识符，通常为32位十六进制字符串，不包含连字符，用于在系统中唯一标识一个文件。",[157],[],{"id":360,"fieldName":360,"fieldType":61,"displayName":361,"importance":362,"description":363,"tag":-1,"dataSource":364,"enumValues":365,"categoryId":36,"subCategoryId":69,"subCategoryName":70},"machineCode","机器码","REQUIRED","机器码是日志来源设备的唯一标识符（设备ID），主要用于设备级联追踪。该字段值应保持全局唯一性，若无现成的设备ID，可参考硬件编码或基于许可证（license）信息生成。格式上，它必须为字符串，允许使用的字符包括大写字母（A-Z）、小写字母（a-z）和数字（0-9）。长度无固定限制，但应保证其唯一性和可管理性。",[66,83,157,67],[],{"id":367,"fieldName":367,"fieldType":61,"displayName":368,"importance":362,"description":369,"tag":-1,"dataSource":370,"enumValues":371,"categoryId":36,"subCategoryId":69,"subCategoryName":70},"productVendorName","产品厂商名称","产品厂商名称字段用于标识安全产品厂商的官方全称。格式为字符串，无特定字符集限制，但应使用厂商在工商注册或官方宣传中使用的标准名称，以确保一致性和准确性。",[66,83,157,67],[],{"id":373,"fieldName":373,"fieldType":61,"displayName":374,"importance":362,"description":375,"tag":-1,"dataSource":376,"enumValues":377,"categoryId":36,"subCategoryId":69,"subCategoryName":70},"deviceSendProductName","设备产品名称","设备产品名称用于标识生成日志的软件或硬件产品的官方标准名称。格式为字符串，需使用明确、规范的官方产品名称。",[66,83,157,67],[],{"id":379,"fieldName":379,"fieldType":61,"displayName":380,"importance":362,"description":381,"tag":-1,"dataSource":382,"enumValues":383,"categoryId":36,"subCategoryId":69,"subCategoryName":70},"deviceName","设备名称","设备名称，用于标识日志生成设备的名称，可添加资产属性（如总部、下级等）。",[66,83,157,67],[],{"id":385,"fieldName":385,"fieldType":233,"displayName":386,"importance":362,"description":387,"tag":-1,"dataSource":388,"enumValues":389,"categoryId":36,"subCategoryId":69,"subCategoryName":70},"deviceAssetSubTypeId","设备子类型ID","设备子类型ID是设备类型子分类的唯一数字标识符，用于标识具体的设备子类型。该字段为枚举类型，取值应在系统定义的枚举值范围内。",[66,83,157,67],[390,394,398,402,406,410,414,418,422,426,430,434,438,442,446,450,454,458,462,466,470,474,478,481,485,489,493,497,501,505,509,513,517,521,525,529,533,537,541,545,549,553,557,561,565,569,572,576,580,584,588,592,595,599,603],{"value":391,"title":392,"description":393},"1","Windows","Microsoft Windows操作系统",{"value":395,"title":396,"description":397},"2","Nix","类Unix操作系统，包括Linux和BSD变种",{"value":399,"title":400,"description":401},"3","路由器","网络路由设备，用于在网络之间转发数据包",{"value":403,"title":404,"description":405},"4","交换机","网络交换设备，用于在局域网内连接设备并转发数据帧",{"value":407,"title":408,"description":409},"5","VPN","虚拟专用网络设备，提供安全的远程访问和站点到站点连接",{"value":411,"title":412,"description":413},"6","负载均衡","负载均衡设备，用于分发网络流量以提高性能和可靠性",{"value":415,"title":416,"description":417},"7","防火墙","网络安全设备，用于控制进出网络的流量基于安全规则",{"value":419,"title":420,"description":421},"8","网闸","网络隔离设备，用于在安全级别不同的网络之间进行安全数据交换",{"value":423,"title":424,"description":425},"9","入侵检测系统(IDS)","入侵检测系统，用于监控网络或系统活动以检测恶意行为",{"value":427,"title":428,"description":429},"10","入侵防护系统(IPS)","入侵防护系统，在检测到威胁时主动阻止恶意流量",{"value":431,"title":432,"description":433},"11","统一威胁管理(UTM)","统一威胁管理设备，集成多种安全功能如防火墙、防病毒和入侵防护",{"value":435,"title":436,"description":437},"12","下一代防火墙","下一代防火墙，提供应用层检测、深度包检查和高级威胁防护",{"value":439,"title":440,"description":441},"13","Web应用防火墙(WAF)","Web应用防火墙，专门保护Web应用程序免受SQL注入、XSS等攻击",{"value":443,"title":444,"description":445},"14","流量监测设备","网络流量监测设备，用于实时分析和监控网络流量模式",{"value":447,"title":448,"description":449},"15","网页防篡改","网页防篡改系统，保护网站内容不被未经授权修改",{"value":451,"title":452,"description":453},"16","抗DDoS系统","抗分布式拒绝服务攻击系统，缓解DDoS攻击以保护服务可用性",{"value":455,"title":456,"description":457},"17","防病毒系统","防病毒系统，检测和清除恶意软件、病毒和木马",{"value":459,"title":460,"description":461},"18","防间谍系统","防间谍软件系统，防止间谍软件窃取敏感信息和监控用户活动",{"value":463,"title":464,"description":465},"19","防泄密系统","数据防泄密系统，监控和防止敏感数据通过各类渠道泄露",{"value":467,"title":468,"description":469},"20","邮件审计系统","邮件审计系统，监控和审计电子邮件内容以符合安全策略和合规要求",{"value":471,"title":472,"description":473},"21","身份管理系统","身份和访问管理系统，管理用户身份认证、授权和权限",{"value":475,"title":476,"description":477},"22","流量清洗系统","流量清洗系统，过滤恶意流量以保护网络资源和业务连续性",{"value":479,"title":83,"description":480},"23","数据库审计系统，监控和记录数据库访问、操作和权限变更",{"value":482,"title":483,"description":484},"24","Web审计系统","Web审计系统，审计Web应用程序的访问、操作和安全事件",{"value":486,"title":487,"description":488},"25","运维审计系统","运维审计系统，监控和记录系统运维操作，防止越权访问",{"value":490,"title":491,"description":492},"26","上网行为审计系统","上网行为审计系统，监控和审计员工网络使用行为以符合安全策略",{"value":494,"title":495,"description":496},"27","统一审计网关","统一审计网关，集中收集、规范化和分析各类审计日志",{"value":498,"title":499,"description":500},"28","日志审计系统","日志审计系统，收集、存储、分析和告警系统安全日志",{"value":502,"title":503,"description":504},"29","安全管理系统","安全管理系统，集成安全管理功能如策略管理、风险管理和事件响应",{"value":506,"title":507,"description":508},"30","蜜罐系统","蜜罐系统，诱骗攻击者以收集攻击信息和分析攻击手法",{"value":510,"title":511,"description":512},"31","应用扫描器","应用程序漏洞扫描器，检测Web应用和移动应用的安全漏洞",{"value":514,"title":515,"description":516},"32","网络扫描器","网络漏洞扫描器，扫描网络设备、服务和端口以发现安全漏洞",{"value":518,"title":519,"description":520},"33","主机扫描器","主机漏洞扫描器，扫描操作系统和应用程序漏洞及配置问题",{"value":522,"title":523,"description":524},"34","WEB服务器","Web服务器软件，如IIS、Apache、Nginx等，托管网站和应用",{"value":526,"title":527,"description":528},"35","数据库服务器","数据库服务器软件，如MySQL、Oracle、SQL Server等，存储和管理数据",{"value":530,"title":531,"description":532},"36","邮件服务器","邮件服务器软件，如Exchange、Postfix等，处理电子邮件收发",{"value":534,"title":535,"description":536},"37","存储服务器","存储服务器，提供数据存储、备份和共享服务",{"value":538,"title":539,"description":540},"38","FTP服务器","FTP服务器，提供文件传输协议服务，支持文件上传下载",{"value":542,"title":543,"description":544},"39","应用服务器","应用服务器，运行企业应用程序和业务逻辑，如Java EE、.NET应用",{"value":546,"title":547,"description":548},"43","Windows审计代理","Windows系统审计代理，收集Windows事件日志和系统活动",{"value":550,"title":551,"description":552},"44","Nix审计代理","类Unix系统审计代理，收集Linux/Unix系统日志和审计数据",{"value":554,"title":555,"description":556},"45","WMI审计代理","Windows管理规范审计代理，通过WMI收集系统信息和事件",{"value":558,"title":559,"description":560},"51","采集器","日志采集器，从各种数据源收集和转发日志数据",{"value":562,"title":563,"description":564},"52","通信服务器","通信服务器，处理网络通信、消息传递和协议转换",{"value":566,"title":567,"description":568},"53","关联引擎","安全事件关联引擎，分析日志数据以检测复杂安全事件",{"value":570,"title":280,"description":571},"55","其他未分类的设备类型",{"value":573,"title":574,"description":575},"56","主机安全管理系统(EDR)","端点检测与响应系统，监控主机活动、检测威胁并响应安全事件",{"value":577,"title":578,"description":579},"57","虚拟化设备","虚拟化平台设备，如VMware ESXi、Hyper-V等，运行虚拟机",{"value":581,"title":582,"description":583},"58","网络打印机","网络连接的打印机设备，支持网络打印功能",{"value":585,"title":586,"description":587},"59","APT","高级持久威胁检测系统，针对APT攻击进行监测和防护",{"value":589,"title":590,"description":591},"60","DNS服务器","域名系统服务器，提供域名解析服务和DNS安全防护",{"value":593,"title":66,"description":594},"61","API风险监测系统，监控API接口的安全风险和使用异常",{"value":596,"title":597,"description":598},"62","API安全网关","API安全网关，保护API接口免受攻击，提供认证、授权和限流",{"value":600,"title":601,"description":602},"63","脆弱性扫描系统","脆弱性扫描系统，全面扫描系统、网络和应用漏洞",{"value":604,"title":605,"description":606},"65","UES","统一端点安全系统，集成终端防护、检测和响应功能",{"id":608,"fieldName":608,"fieldType":61,"displayName":609,"importance":362,"description":610,"tag":-1,"dataSource":611,"enumValues":612,"categoryId":36,"subCategoryId":69,"subCategoryName":70},"deviceAddress","设备IP地址","设备产生日志时的IP地址，用于标识日志来源设备。格式要求：必须为有效的IPv4或IPv6地址格式。",[66,83,157,67],[],{"id":614,"fieldName":614,"fieldType":61,"displayName":615,"importance":362,"description":616,"tag":-1,"dataSource":617,"enumValues":618,"categoryId":36,"subCategoryId":69,"subCategoryName":70},"eventId","事件ID","事件ID是日志事件的全局唯一标识符，通常采用UUID或时间戳序列等不可重复算法生成。格式应为标准的UUID字符串，例如：550e8400-e29b-41d4-a716-446655440000。要求全局唯一，不可重复。",[66,83,157,67],[],{"id":620,"fieldName":620,"fieldType":61,"displayName":621,"importance":362,"description":622,"tag":-1,"dataSource":623,"enumValues":624,"categoryId":36,"subCategoryId":69,"subCategoryName":70},"name","概要名称","概要名称是日志或告警的简要标题或标识，用于快速识别事件内容。该字段为字符串类型，需保持简洁明了。",[66,83,157,67],[],{"id":626,"fieldName":626,"fieldType":61,"displayName":627,"importance":74,"description":628,"tag":-1,"dataSource":629,"enumValues":630,"categoryId":36,"subCategoryId":69,"subCategoryName":70},"message","描述","用于记录日志或告警的详细描述信息，以文本字符串形式存储。内容通常包含对安全事件、系统活动或异常情况的说明、上下文及关键参数。",[66,83,157,67],[],{"id":632,"fieldName":632,"fieldType":61,"displayName":633,"importance":362,"description":634,"tag":-1,"dataSource":635,"enumValues":636,"categoryId":36,"subCategoryId":69,"subCategoryName":70},"startTime","开始时间","该字段记录事件活动开始的精确时间。时间格式必须为标准的日期时间字符串，格式为yyyy-mm-dd HH:mm:ss。",[66,83,157,67],[],{"id":638,"fieldName":638,"fieldType":61,"displayName":639,"importance":362,"description":640,"tag":-1,"dataSource":641,"enumValues":642,"categoryId":36,"subCategoryId":69,"subCategoryName":70},"endTime","结束时间","记录事件活动结束的精确时间。时间格式必须为标准的日期时间字符串，格式为yyyy-mm-dd HH:mm:ss。",[66,83,157,67],[],{"id":644,"fieldName":644,"fieldType":61,"displayName":645,"importance":74,"description":646,"tag":-1,"dataSource":647,"enumValues":648,"categoryId":36,"subCategoryId":69,"subCategoryName":70},"deviceReceiptTime","设备接收时间","该字段记录设备采集器本地接收并生成日志事件的精确时间。时间格式必须为标准的日期时间字符串，格式为yyyy-mm-dd HH:mm:ss。",[66,83,157,67],[],{"id":650,"fieldName":650,"fieldType":61,"displayName":651,"importance":362,"description":652,"tag":-1,"dataSource":653,"enumValues":654,"categoryId":36,"subCategoryId":69,"subCategoryName":70},"collectorReceiptTime","采集器接收时间","采集器接收日志事件的精确时间，时间格式必须为标准的日期时间字符串，格式要求为yyyy-mm-dd HH:mm:ss。",[66,83,157,67],[],{"id":656,"fieldName":656,"fieldType":657,"displayName":658,"importance":362,"description":659,"tag":-1,"dataSource":660,"enumValues":661,"categoryId":36,"subCategoryId":69,"subCategoryName":70},"severity","integer","安全威胁等级","标识日志或告警的安全威胁严重程度等级。该字段为整型数值，取值范围为0至10，每个数值对应特定的威胁级别：0表示无风险，1-3表示低危，4-6表示中危，7-9表示高危，10表示危急。",[66,83,157,67],[],{"id":663,"fieldName":663,"fieldType":233,"displayName":664,"importance":362,"description":665,"tag":-1,"dataSource":666,"enumValues":667,"categoryId":36,"subCategoryId":69,"subCategoryName":70},"catOutcome","结果分类","该字段用于标识事件操作或攻击的最终结果状态。其值为预定义的枚举类型，当前主要可选值包括：OK（表示操作成功）、FAIL（表示操作失败）、Attempt（表示尝试性操作）。取值应严格限定在系统定义的枚举值范围内。",[66,83,157,67],[668,672,676],{"value":669,"title":670,"description":671},"OK","成功","可以合理的推测事件已成功",{"value":673,"title":674,"description":675},"FAIL","失败","可以合理的推测事件已失败",{"value":677,"title":678,"description":679},"Attempt","尝试","事件已发生，但是无法明确成功或失败",{"id":681,"fieldName":681,"fieldType":233,"displayName":682,"importance":362,"description":683,"tag":-1,"dataSource":684,"enumValues":685,"categoryId":36,"subCategoryId":69,"subCategoryName":70},"logType","日志类型","该字段标识日志事件的功能或对象实体分类。其值为预定义的枚举字符串，例如：alert（告警类日志）、traffic（网络通信类日志）、process（进程操作类日志）、command（命令执行类日志）、file（文件操作类日志）等。",[66,83,157,67],[686,689,693,697,701,705,709,713,717,721,725,729,733,737,741,745,749,753,757,761,765,769],{"value":11,"title":687,"description":688},"告警类日志","安全告警事件日志，包含威胁检测、异常行为和安全风险告警",{"value":690,"title":691,"description":692},"traffic","网络通信类日志","网络流量和通信会话日志，记录网络连接、数据传输和协议通信",{"value":694,"title":695,"description":696},"process","进程操作类日志","进程生命周期管理日志，记录进程创建、终止、注入等操作",{"value":698,"title":699,"description":700},"command","命令执行类日志","命令行和脚本执行日志，记录系统命令、PowerShell和Shell命令执行",{"value":702,"title":703,"description":704},"file","文件操作类日志","文件系统操作日志，记录文件创建、修改、删除、访问等操作",{"value":706,"title":707,"description":708},"account","账号操作类日志","用户账户管理日志，记录用户登录、注销、权限变更和账户管理操作",{"value":710,"title":711,"description":712},"config","配置操作类日志","系统配置变更日志，记录安全策略、系统设置和配置修改操作",{"value":714,"title":715,"description":716},"status","系统状态类日志","系统运行状态日志，记录系统启动、关机、重启和运行状态变更",{"value":718,"title":719,"description":720},"system_operation","系统操作类日志","系统级管理操作日志，记录系统维护、管理和控制操作",{"value":722,"title":723,"description":724},"system_resource","系统资源类日志","系统资源使用日志，记录CPU、内存、磁盘和网络资源使用情况",{"value":726,"title":727,"description":728},"domain","域名操作类日志","域名解析和查询日志，记录DNS查询、域名解析和网络定位操作",{"value":730,"title":731,"description":732},"registry","注册表操作类日志","Windows注册表操作日志，记录注册表键值创建、修改和删除操作",{"value":734,"title":735,"description":736},"app","应用程序类日志","应用程序运行日志，记录应用程序启动、运行、错误和业务操作",{"value":738,"title":739,"description":740},"service","服务操作类日志","系统服务管理日志，记录Windows/Linux服务的创建、启动、停止和配置变更",{"value":742,"title":743,"description":744},"task","任务操作类日志","计划任务和作业日志，记录定时任务创建、执行、修改和删除操作",{"value":746,"title":747,"description":748},"thread","线程操作类日志","线程管理日志，记录线程创建、终止、挂起和优先级变更操作",{"value":750,"title":751,"description":752},"module","模块操作类日志","程序模块管理日志，记录DLL、SO等模块的加载、卸载和内存映射",{"value":754,"title":755,"description":756},"driver","驱动操作类日志","设备驱动程序日志，记录内核驱动加载、卸载和运行状态",{"value":758,"title":759,"description":760},"pipe","管道操作类日志","进程间通信日志，记录命名管道创建、连接、数据传输操作",{"value":762,"title":763,"description":764},"wmi","WMI操作类日志","Windows管理规范操作日志，记录WMI查询、事件订阅和代码执行",{"value":766,"title":767,"description":768},"winrm","WinRM操作类日志","Windows远程管理日志，记录远程PowerShell命令执行和系统管理操作",{"value":770,"title":771,"description":772},"others","其他类型日志","未分类的其他日志类型，包含无法归入上述分类的日志事件",{"id":774,"fieldName":774,"fieldType":233,"displayName":775,"importance":63,"description":776,"tag":-1,"dataSource":777,"enumValues":778,"categoryId":36,"subCategoryId":69,"subCategoryName":70},"opType","操作类型","操作类型，标识事件中对目标对象执行的具体操作行为。本字段为枚举类型，其值必须为预定义的操作类型字符串，例如：read（读取）、write（写入）、create（创建）、delete（删除）、modify（修改）等。",[66,83,157,67],[779,783,787,791,795,799,803,807,811,815,819,823,827,831,835,839,843,846,850,854,858,862,866,870,874,878,882,886,890],{"value":780,"title":781,"description":782},"read","读取","读取数据操作，包括文件读取、注册表查询、内存读取等",{"value":784,"title":785,"description":786},"write","写入","写入数据操作，包括文件写入、注册表修改、配置变更等",{"value":788,"title":789,"description":790},"create","创建","创建新对象操作，包括文件创建、进程创建、用户账户创建等",{"value":792,"title":793,"description":794},"delete","删除","删除对象操作，包括文件删除、注册表项删除、用户账户删除等",{"value":796,"title":797,"description":798},"modify","修改","修改对象属性操作，包括文件属性修改、权限变更、配置调整等",{"value":800,"title":801,"description":802},"login","登录","身份认证成功操作，包括系统登录、应用登录、远程访问登录等",{"value":804,"title":805,"description":806},"logout","登出","会话终止操作，包括用户登出、会话超时、强制注销等",{"value":808,"title":809,"description":810},"execute","执行","程序执行操作，包括进程启动、命令执行、脚本运行等",{"value":812,"title":813,"description":814},"start","启动","服务启动操作，包括系统服务启动、计划任务触发、守护进程启动等",{"value":816,"title":817,"description":818},"stop","停止","服务停止操作，包括系统服务停止、进程终止、任务结束等",{"value":820,"title":821,"description":822},"access","访问","资源访问操作，包括进程访问、内存访问、共享资源访问等",{"value":824,"title":825,"description":826},"connect","连接","网络连接操作，包括网络连接建立、会话创建、远程连接等",{"value":828,"title":829,"description":830},"load","加载","模块加载操作，包括驱动加载、DLL加载、插件加载等",{"value":832,"title":833,"description":834},"send","发送","数据发送操作，包括网络数据发送、邮件发送、消息发送等",{"value":836,"title":837,"description":838},"receive","接收","数据接收操作，包括网络数据接收、邮件接收、消息接收等",{"value":840,"title":841,"description":842},"combine","组合操作","复合操作类型，表示多个操作的组合执行",{"value":770,"title":844,"description":845},"其他操作","未分类的其他操作类型",{"value":847,"title":848,"description":849},"query","查询","数据查询操作，包括数据库查询、目录查询、信息检索等",{"value":851,"title":852,"description":853},"rename","重命名","对象重命名操作，包括文件重命名、账户重命名、服务重命名等",{"value":855,"title":856,"description":857},"listen","监听","网络监听操作，包括端口监听、会话监听、事件监听等",{"value":859,"title":860,"description":861},"setValue","设置键值","键值设置操作，包括注册表键值设置、配置参数设置、环境变量设置等",{"value":863,"title":864,"description":865},"addedGroup","添加至组","组成员添加操作，包括用户添加到组、计算机加入域等",{"value":867,"title":868,"description":869},"removedGroup","组中移除","组成员移除操作，包括用户从组中移除、计算机脱离域等",{"value":871,"title":872,"description":873},"changePassword","修改密码","密码修改操作，包括用户密码修改、服务账户密码变更等",{"value":875,"title":876,"description":877},"resetPassword","重置密码","密码重置操作，包括管理员重置用户密码、密码恢复等",{"value":879,"title":880,"description":881},"disable","禁用","对象禁用操作，包括用户账户禁用、服务禁用、策略禁用等",{"value":883,"title":884,"description":885},"enable","启用","对象启用操作，包括用户账户启用、服务启用、策略启用等",{"value":887,"title":888,"description":889},"lock","锁定","对象锁定操作，包括用户账户锁定、会话锁定、资源锁定等",{"value":891,"title":892,"description":893},"unlock","解锁","对象解锁操作，包括用户账户解锁、会话解锁、资源解锁等",{"id":895,"fieldName":895,"fieldType":657,"displayName":896,"importance":74,"description":897,"tag":-1,"dataSource":898,"enumValues":899,"categoryId":36,"subCategoryId":69,"subCategoryName":70},"srcPort","源端口","源端口是指网络连接发起方的端口号，用于标识发起通信的应用程序或服务。端口号必须是整数，取值范围为0到65535，其中0通常保留，1到1023为知名端口，1024到49151为注册端口，49152到65535为动态或私有端口。",[66,83,67],[],{"id":901,"fieldName":901,"fieldType":657,"displayName":902,"importance":74,"description":903,"tag":-1,"dataSource":904,"enumValues":905,"categoryId":36,"subCategoryId":69,"subCategoryName":70},"destPort","目的端口","目的端口是网络连接接收方的端口号，用于标识接收方应用程序或服务。该字段为整数类型，取值范围为0-65535，其中0-1023为知名端口，1024-49151为注册端口，49152-65535为动态或私有端口。",[66,83,67],[],{"id":907,"fieldName":907,"fieldType":61,"displayName":908,"importance":74,"description":909,"tag":-1,"dataSource":910,"enumValues":911,"categoryId":36,"subCategoryId":69,"subCategoryName":70},"srcMacAddress","源MAC地址","源MAC地址表示网络数据帧发送方的媒体访问控制地址。格式要求：必须为标准MAC地址格式，即6组由冒号分隔的十六进制字节（xx:xx:xx:xx:xx:xx），每组两个字符，取值范围为00-FF。",[66,83,67],[],{"id":913,"fieldName":913,"fieldType":61,"displayName":914,"importance":74,"description":915,"tag":-1,"dataSource":916,"enumValues":917,"categoryId":36,"subCategoryId":69,"subCategoryName":70},"destMacAddress","目的MAC地址","目的MAC地址表示网络数据帧接收方的媒体访问控制地址。格式要求：必须为标准MAC地址格式，即6组由冒号分隔的十六进制字节（xx:xx:xx:xx:xx:xx），每组两个字符，取值范围为00-FF。",[66,83,67],[],{"id":919,"fieldName":919,"fieldType":61,"displayName":920,"importance":74,"description":921,"tag":-1,"dataSource":922,"enumValues":923,"categoryId":36,"subCategoryId":69,"subCategoryName":70},"srcGeoCountry","来源国家","该字段表示网络连接发起方IP地址所对应的国家或地区信息。",[66,83,67],[],{"id":925,"fieldName":925,"fieldType":61,"displayName":926,"importance":74,"description":927,"tag":-1,"dataSource":928,"enumValues":929,"categoryId":36,"subCategoryId":69,"subCategoryName":70},"srcGeoRegion","来源地区","该字段表示网络连接发起方IP地址所对应的省级行政区域名称，用于标识流量的地理来源。其值应为中国省级行政区划的名称，例如“北京市”、“浙江省”、“新疆维吾尔自治区”等，或国际公认的国家及地区名称。格式为字符串，无固定长度限制，建议使用标准、完整的官方名称以确保一致性和准确性。",[66,83,67],[],{"id":931,"fieldName":931,"fieldType":61,"displayName":932,"importance":74,"description":933,"tag":-1,"dataSource":934,"enumValues":935,"categoryId":36,"subCategoryId":69,"subCategoryName":70},"srcGeoCity","来源城市","该字段表示网络连接发起方IP地址所对应的城市级别行政区域名称。其值为字符串类型，该信息通常由IP地址归属地查询服务提供，无特定的格式或字符集强制要求，但建议保持名称的一致性。",[66,83,67],[],{"id":937,"fieldName":937,"fieldType":61,"displayName":938,"importance":74,"description":939,"tag":-1,"dataSource":940,"enumValues":941,"categoryId":36,"subCategoryId":69,"subCategoryName":70},"srcGeoAddress","来源详细地址","该字段表示网络连接发起方IP地址所对应的详细地址描述，用于定位来源的具体物理或行政位置。其值为字符串类型，通常包含国家、省份、城市、区县、街道及门牌号等层级信息。",[66,83,67],[],{"id":943,"fieldName":943,"fieldType":61,"displayName":944,"importance":74,"description":945,"tag":-1,"dataSource":946,"enumValues":947,"categoryId":36,"subCategoryId":69,"subCategoryName":70},"srcGeoLatitude","来源纬度","该字段表示网络连接发起方IP地址所对应的地理纬度坐标，以字符串格式存储。纬度坐标应遵循十进制表示法，取值范围为-90.000000到90.000000，其中北纬为正，南纬为负。",[66,83,67],[],{"id":949,"fieldName":949,"fieldType":61,"displayName":950,"importance":74,"description":951,"tag":-1,"dataSource":952,"enumValues":953,"categoryId":36,"subCategoryId":69,"subCategoryName":70},"srcGeoLongitude","来源经度","来源经度表示网络连接发起方IP地址所对应的地理经度坐标。格式为十进制浮点数字符串，取值范围为-180.000000到180.000000，保留小数点后六位，使用点号（.）作为小数点分隔符，负值表示西经，正值表示东经。",[66,83,67],[],{"id":955,"fieldName":955,"fieldType":61,"displayName":956,"importance":74,"description":957,"tag":-1,"dataSource":958,"enumValues":959,"categoryId":36,"subCategoryId":69,"subCategoryName":70},"destGeoCountry","目的国家","目的国家，指网络连接接收方IP地址所对应的国家名称。该字段值为国家或地区的完整中文名称，例如“中国”、“美国”等。",[66,83,67],[],{"id":961,"fieldName":961,"fieldType":61,"displayName":962,"importance":74,"description":963,"tag":-1,"dataSource":964,"enumValues":965,"categoryId":36,"subCategoryId":69,"subCategoryName":70},"destGeoRegion","目的地区","该字段表示网络连接接收方IP地址所对应的中国省级行政区域名称，用于标识网络流量的地理目的地。其值应为中国省级行政区划的规范名称，例如“浙江省”、“北京市”或“新疆维吾尔自治区”等，不包含“省”、“市”、“自治区”等后缀的简称（如“浙江”、“北京”、“新疆”）也可接受。该字段为字符串类型，无特定字符集或长度限制，但应确保名称的准确性和一致性。",[66,83,67],[],{"id":967,"fieldName":967,"fieldType":61,"displayName":968,"importance":74,"description":969,"tag":-1,"dataSource":970,"enumValues":971,"categoryId":36,"subCategoryId":69,"subCategoryName":70},"destGeoCity","目的城市","目的城市是指网络连接接收方IP地址所对应的城市级别行政区域名称。该字段为字符串类型，需使用标准城市名称。",[66,83,67],[],{"id":973,"fieldName":973,"fieldType":61,"displayName":974,"importance":74,"description":975,"tag":-1,"dataSource":976,"enumValues":977,"categoryId":36,"subCategoryId":69,"subCategoryName":70},"destGeoAddress","目的详细地址","目的详细地址，描述网络连接接收方IP地址所对应的详细地址信息。格式为字符串，应包含国家、省/州、城市、街道等层级的详细信息，以构成一个完整的物理位置描述。",[66,83,67],[],{"id":979,"fieldName":979,"fieldType":61,"displayName":980,"importance":74,"description":981,"tag":-1,"dataSource":982,"enumValues":983,"categoryId":36,"subCategoryId":69,"subCategoryName":70},"destGeoLatitude","目的纬度","目的纬度表示网络连接接收方IP地址所对应的地理纬度坐标。该值为字符串类型，通常以十进制小数形式表示，取值范围为-90.000000到90.000000。",[66,83,67],[],{"id":985,"fieldName":985,"fieldType":61,"displayName":986,"importance":74,"description":987,"tag":-1,"dataSource":988,"enumValues":989,"categoryId":36,"subCategoryId":69,"subCategoryName":70},"destGeoLongitude","目的经度","目的经度是指网络连接接收方IP地址所对应的地理经度坐标。格式为十进制小数形式的字符串，取值范围为-180.000000至180.000000。",[66,83,67],[],{"id":991,"fieldName":991,"fieldType":61,"displayName":992,"importance":63,"description":993,"tag":-1,"dataSource":994,"enumValues":995,"categoryId":36,"subCategoryId":69,"subCategoryName":70},"dataSourceAddress","数据来源地址","数据来源地址，指提供数据的设备网络地址。该字段必须是合法的IP地址格式，支持IPv4和IPv6地址。IPv4地址为点分十进制格式（如192.168.1.5），IPv6地址为冒号分隔的十六进制格式。",[66,83,157,67],[],{"id":997,"fieldName":997,"fieldType":233,"displayName":998,"importance":74,"description":999,"tag":-1,"dataSource":1000,"enumValues":1001,"categoryId":36,"subCategoryId":69,"subCategoryName":70},"transProtocol","传输协议","传输层协议类型，表示OSI模型中传输层使用的协议。可选值包括：TCP（传输控制协议）、UDP（用户数据报协议）等标准传输层协议。",[66,83,67],[1002,1006],{"value":1003,"title":1004,"description":1005},"TCP","传输控制协议","面向连接的可靠传输协议，提供数据包顺序传输、错误检测和重传机制",{"value":1007,"title":1008,"description":1009},"UDP","用户数据报协议","无连接的不可靠传输协议，提供低延迟的数据传输，适用于实时应用",{"id":1011,"fieldName":1011,"fieldType":233,"displayName":1012,"importance":74,"description":1013,"tag":-1,"dataSource":1014,"enumValues":1015,"categoryId":36,"subCategoryId":69,"subCategoryName":70},"appProtocol","应用协议","应用协议字段表示OSI模型中应用层使用的协议类型。该字段为枚举类型，取值范围应在预定义的协议标识符列表中。",[66,83,67],[1016,1018,1020,1022,1024,1026,1028,1030,1032,1034,1036,1038,1040,1042,1044,1046,1048,1050,1052,1054,1056,1058,1060,1062,1064,1066,1068,1070,1072,1074,1076,1078,1080,1082,1084,1086,1088,1090,1092,1094,1096,1098,1100,1102,1104,1106,1108,1110,1112,1114,1116,1118,1120,1122,1124,1126,1128,1130,1132,1134,1136,1138,1140,1142],{"value":1017,"title":1017,"description":1017},"http",{"value":1019,"title":1019,"description":1019},"https",{"value":1021,"title":1021,"description":1021},"dns",{"value":1023,"title":1023,"description":1023},"ssh",{"value":1025,"title":1025,"description":1025},"telnet",{"value":1027,"title":1027,"description":1027},"telnets",{"value":1029,"title":1029,"description":1029},"rsync",{"value":1031,"title":1031,"description":1031},"tftp",{"value":1033,"title":1033,"description":1033},"ftp",{"value":1035,"title":1035,"description":1035},"sftp",{"value":1037,"title":1037,"description":1037},"smb",{"value":1039,"title":1039,"description":1039},"ntp",{"value":1041,"title":1041,"description":1041},"mysql",{"value":1043,"title":1043,"description":1043},"ms-sql-s",{"value":1045,"title":1045,"description":1045},"ms-sql-m",{"value":1047,"title":1047,"description":1047},"oracle",{"value":1049,"title":1049,"description":1049},"nfs",{"value":1051,"title":1051,"description":1051},"pop2",{"value":1053,"title":1053,"description":1053},"pop3",{"value":1055,"title":1055,"description":1055},"pop3s",{"value":1057,"title":1057,"description":1057},"smtp",{"value":1059,"title":1059,"description":1059},"imap",{"value":1061,"title":1061,"description":1061},"imaps",{"value":1063,"title":1063,"description":1063},"chargen",{"value":1065,"title":1065,"description":1065},"qotd",{"value":1067,"title":1067,"description":1067},"x11",{"value":1069,"title":1069,"description":1069},"uucp",{"value":1071,"title":1071,"description":1071},"rcp",{"value":1073,"title":1073,"description":1073},"postgres",{"value":1075,"title":1075,"description":1075},"bootps",{"value":1077,"title":1077,"description":1077},"bootpc",{"value":1079,"title":1079,"description":1079},"squid",{"value":1081,"title":1081,"description":1081},"ftps",{"value":1083,"title":1083,"description":1083},"ircs",{"value":1085,"title":1085,"description":1085},"echo",{"value":1087,"title":1087,"description":1087},"sunrpc",{"value":1089,"title":1089,"description":1089},"auth",{"value":1091,"title":1091,"description":1091},"tacacs",{"value":1093,"title":1093,"description":1093},"nntp",{"value":1095,"title":1095,"description":1095},"radius",{"value":1097,"title":1097,"description":1097},"netbios-ns",{"value":1099,"title":1099,"description":1099},"netbios-dgm",{"value":1101,"title":1101,"description":1101},"netbios-ssn",{"value":1103,"title":1103,"description":1103},"wins",{"value":1105,"title":1105,"description":1105},"snmp",{"value":1107,"title":1107,"description":1107},"snmptrap",{"value":1109,"title":1109,"description":1109},"bgp",{"value":1111,"title":1111,"description":1111},"irc",{"value":1113,"title":1113,"description":1113},"ldap",{"value":1115,"title":1115,"description":1115},"ldaps",{"value":1117,"title":1117,"description":1117},"timbuktu",{"value":1119,"title":1119,"description":1119},"nnsp",{"value":1121,"title":1121,"description":1121},"daytime",{"value":1123,"title":1123,"description":1123},"ircd",{"value":1125,"title":1125,"description":1125},"isakmp",{"value":1127,"title":1127,"description":1127},"printer",{"value":1129,"title":1129,"description":1129},"dhcpv6-client",{"value":1131,"title":1131,"description":1131},"dhcpv6-server",{"value":1133,"title":1133,"description":1133},"rtsp",{"value":1135,"title":1135,"description":1135},"nntps",{"value":1137,"title":1137,"description":1137},"discard",{"value":1139,"title":1139,"description":1139},"ipx",{"value":1141,"title":1141,"description":1141},"finger",{"value":1143,"title":1143,"description":1143},"rdp",{"id":1145,"fieldName":1145,"fieldType":61,"displayName":1146,"importance":74,"description":1147,"tag":-1,"dataSource":1148,"enumValues":1149,"categoryId":36,"subCategoryId":69,"subCategoryName":70},"dvcAction","设备处置动作","设备处置动作字段记录安全设备对检测到的威胁或异常行为采取的自动处置动作，例如阻断、放行、隔离或告警，取值应为描述处置动作的字符串。",[66,83,157,67],[],{"id":1151,"fieldName":1151,"fieldType":233,"displayName":1152,"importance":63,"description":1153,"tag":-1,"dataSource":1154,"enumValues":1155,"categoryId":36,"subCategoryId":69,"subCategoryName":70},"direction","数据流方向","基于源和目标IP地址的网络位置分类数据流方向。该字段为枚举类型，表示数据流在内外网之间的流向，具体取值及含义如下：11 表示外网访问外网；10 表示外网访问内网；01 表示内网访问外网；00 表示内网访问内网。",[66,83,67],[1156,1159,1162,1166],{"value":431,"title":1157,"description":1158},"外访问外","来源IP为外部IP，目的IP为外部IP，数据方向：外访问外",{"value":427,"title":1160,"description":1161},"外访问内","来源IP为外部IP，目的IP为内部IP，数据方向：外访问内",{"value":1163,"title":1164,"description":1165},"01","内访问外","来源IP为内部IP，目的IP为外部IP，数据方向：内访问外",{"value":1167,"title":1168,"description":1169},"00","内访问内","来源IP为内部IP，目的IP为内部IP，数据方向：内访问内",{"id":1171,"fieldName":1171,"fieldType":61,"displayName":1172,"importance":74,"description":1173,"tag":-1,"dataSource":1174,"enumValues":1175,"categoryId":36,"subCategoryId":69,"subCategoryName":70},"deviceVersion","设备版本","设备版本标识设备固件、操作系统或嵌入式软件的完整版本信息。版本号通常采用多段数字格式，如主版本号.次版本号.修订号.构建号等。",[66,83,157,67],[],{"id":1177,"fieldName":1177,"fieldType":61,"displayName":1178,"importance":63,"description":1179,"tag":-1,"dataSource":1180,"enumValues":1181,"categoryId":36,"subCategoryId":69,"subCategoryName":70},"srcAddress","来源IP","来源IP地址，指网络连接或安全事件的发起方所使用的IP地址。该字段必须符合IP地址格式规范，支持IPv4和IPv6地址。IPv4地址为点分十进制格式（如：192.168.1.1），IPv6地址为冒号分隔的十六进制格式（如：2001:0db8:85a3:0000:0000:8a2e:0370:7334）。",[66,83,67],[],{"id":1183,"fieldName":1183,"fieldType":61,"displayName":1184,"importance":63,"description":1185,"tag":-1,"dataSource":1186,"enumValues":1187,"categoryId":36,"subCategoryId":69,"subCategoryName":70},"destAddress","目的IP","目的IP地址，标识网络通信连接的目标IP地址。格式要求：必须符合IP地址格式规范，支持IPv4（如192.168.1.1）或IPv6（如2001:0db8:85a3:0000:0000:8a2e:0370:7334）地址表示法。",[66,83,67],[],{"id":1189,"fieldName":1189,"fieldType":61,"displayName":1190,"importance":74,"description":1191,"tag":-1,"dataSource":1192,"enumValues":1193,"categoryId":36,"subCategoryId":69,"subCategoryName":70},"subTechniqueId","ATT&CK子技术ID","该字段表示攻击行为在MITRE ATT&CK框架中对应的具体攻击子技术的唯一标识符。其格式为ATT&CK技术ID后加小数点与三位数字编号，例如 `T1566.001`。该标识符应符合MITRE ATT&CK官方规范。",[66,83,157,67],[],{"id":1195,"fieldName":1195,"fieldType":61,"displayName":1196,"importance":74,"description":1197,"tag":-1,"dataSource":1198,"enumValues":1199,"categoryId":36,"subCategoryId":69,"subCategoryName":70},"techniqueName","ATT&CK技术名称","ATT&CK技术名称，指攻击行为在MITRE ATT&CK框架中对应的具体攻击技术的名称。该字段为字符串类型，其值应符合MITRE ATT&CK官方技术命名规范，通常为英文短语或特定术语，例如“Phishing”。",[66,83,157,67],[],{"id":1201,"fieldName":1201,"fieldType":61,"displayName":1202,"importance":74,"description":1203,"tag":-1,"dataSource":1204,"enumValues":1205,"categoryId":36,"subCategoryId":69,"subCategoryName":70},"techniqueId","ATT&CK技术ID","该字段表示攻击行为在MITRE ATT&CK框架中对应的具体攻击技术的唯一标识符。格式为ATT&CK技术ID标准格式，通常以字母“T”开头，后接4位数字，例如：T1566。",[66,83,157,67],[],{"id":1207,"fieldName":1207,"fieldType":61,"displayName":1208,"importance":74,"description":1209,"tag":-1,"dataSource":1210,"enumValues":1211,"categoryId":36,"subCategoryId":69,"subCategoryName":70},"tacticName","ATT&CK战术名称","攻击行为在MITRE ATT&CK框架中对应的战术阶段名称，用于标识攻击在杀伤链中所处的阶段。此字段为字符串类型，取值应为MITRE ATT&CK框架中定义的官方战术名称，例如：Initial Access, Execution, Persistence, Privilege Escalation等。",[66,83,157,67],[],{"id":1213,"fieldName":1213,"fieldType":61,"displayName":1214,"importance":74,"description":1215,"tag":-1,"dataSource":1216,"enumValues":1217,"categoryId":36,"subCategoryId":69,"subCategoryName":70},"tacticId","ATT&CK战术ID","攻击行为在MITRE ATT&CK框架中对应的战术阶段唯一标识符。格式必须符合ATT&CK官方定义的战术ID规范，通常以“TA”为前缀，后跟四位或五位数字，例如“TA0001”。",[66,83,157,67],[],{"id":1219,"fieldName":1219,"fieldType":233,"displayName":1220,"importance":74,"description":1221,"tag":-1,"dataSource":1222,"enumValues":1223,"categoryId":36,"subCategoryId":69,"subCategoryName":70},"killChain","攻击链","攻击链字段用于描述攻击行为在攻击生命周期中所处的具体阶段。该字段为枚举类型，其值必须为预定义的字符串常量，可选值包括但不限于：KC_Reconnaissance（侦查）、KC_Delivery（投递）、KC_Exploitation（利用）、KC_CommandControl（命令控制）、KC_InternalRecon（内部侦查）等。",[66,83,157,67],[1224,1228,1232,1236,1240,1244,1248,1252],{"value":1225,"title":1226,"description":1227},"KC_Reconnaissance","侦查","网络攻击者选择目标，进行初步渗透并尝试发现信息系统版本、架构、漏洞等信息的过程。该过程可能涉及到多种方法，比如对web服务的扫描、对主机开放端口的探测等。通常该阶段的攻击有大量类似的行为，几乎都为攻击失败。",{"value":1229,"title":1230,"description":1231},"KC_Delivery","投递","遭受攻击的设备接收或感染恶意程序、钓鱼邮件及黑客工具的阶段。投递过程可以是主动的，例如终端用户主动下载互联网恶意程序或接收钓鱼邮件附件等；也可以是被动的，例如攻击者使用开放服务的接口，上传木马、后门、远控程序等。从而让攻击者成功获取到受害设备的控制权限。",{"value":1233,"title":1234,"description":1235},"KC_Exploitation","利用","网络攻击者在获取到目标的基本信息后，尝试利用目标可能存在的漏洞或缺陷进行针对性渗透攻击。利用过程可能成功，也可能失败（例如被防火墙、IPS设备、终端病毒防护程序阻断）。",{"value":1237,"title":1238,"description":1239},"KC_CommandControl","命令控制","网络攻击者利用植入的后门或恶意程序，对受害设备进行远程控制。过程中可能由攻击者发送指令，唤醒或操控受害主机上的后门，执行相关命令；也可能由受害设备上运行的程序主动发起回连请求，向黑客传递信息数据。通常该阶段的告警意味着被攻击的目标可能已经失陷。",{"value":1241,"title":1242,"description":1243},"KC_InternalRecon","内部侦查","攻击者通过某些手段登录成功进入目标网络系统(如窃取vpn账户、猜解远程控制窗口等)，并且在目标网络系统进行服务探测、信息收集的过程。该过程也可能是黑客成功获取了内部设备的权限，远程操控该设备进行。",{"value":1245,"title":1246,"description":1247},"KC_LateralMov","横向渗透","信息系统内的设备失陷，或黑客窃取了登录口令后，攻击者在内部系统进行横向移动，尝试获取更多设备权限的过程。该过程主要涉及到内对内的漏洞利用和敏感操作等攻击，通常该阶段的告警意味着被攻击的目标可能已经失陷。",{"value":1249,"title":1250,"description":1251},"KC_Profit","获利","网络攻击者成功向目标植入恶意程序后，采取具体行动来达到其目标，例如恶意加密目标主机设备上的文件、窃取和破坏数据、利用设备资源获取挖矿等，通常该阶段的告警意味着被攻击的目标可能已经失陷。",{"value":1253,"title":1254,"description":1255},"KC_Others","无","非攻击行为，如配置错误、设备故障等。",{"id":1257,"fieldName":1257,"fieldType":233,"displayName":1258,"importance":74,"description":1259,"tag":-1,"dataSource":1260,"enumValues":1261,"categoryId":36,"subCategoryId":69,"subCategoryName":70},"confidence","告警置信度","告警置信度表示对威胁检测、归因或分析结果准确性的等级评估指标。该字段为枚举类型，可选值包括：Low（低置信度）、Medium（中置信度）和High（高置信度）。",[66,83,157,67],[1262,1266,1270],{"value":1263,"title":1264,"description":1265},"Low","低置信度","告警信息基于单一、不确定的指标，可能存在误报，需要进一步验证",{"value":1267,"title":1268,"description":1269},"Medium","中置信度","告警信息具有一定可靠性，但仍需分析确认",{"value":1271,"title":1272,"description":1273},"High","高置信度","告警信息误报率极低，可信度很高",{"id":1275,"fieldName":1275,"fieldType":61,"displayName":1276,"importance":74,"description":1277,"tag":-1,"dataSource":1278,"enumValues":1279,"categoryId":36,"subCategoryId":69,"subCategoryName":70},"ruleId","规则ID","规则ID是触发策略的安全规则唯一标识符。其值应为字符串类型，通常由字母、数字或特定符号组成，用于在系统中唯一标识一条安全规则。",[66,83,157,67],[],{"id":1281,"fieldName":1281,"fieldType":233,"displayName":1282,"importance":362,"description":1283,"tag":-1,"dataSource":1284,"enumValues":1285,"categoryId":36,"subCategoryId":69,"subCategoryName":70},"ruleType","规则类型","规则类型标识安全设备（如防火墙、IDS、IPS、EDR等）产生告警时对应的安全检测规则类型，反映设备内置规则库对特定攻击模式或异常行为的分类。该字段为枚举类型，其值是一个表示威胁类别的层级路径字符串，格式通常为“/一级分类/二级分类”。",[66,83,157,67],[1286,1290,1294,1298,1302,1306,1310,1314,1318,1322,1326,1330,1334,1338,1342,1346,1350,1354,1358,1362,1366,1370,1374,1378,1382,1386,1390,1394,1398,1402,1406,1410,1414,1418,1422,1426,1430,1434,1438,1442,1446,1450,1454,1458,1462,1466,1470,1474,1478,1482,1486,1490,1494,1498,1502,1506,1510,1514,1518,1522,1526,1530,1534,1538,1542,1546,1550,1554,1558,1562,1566,1570,1574,1578,1582,1586,1590,1594,1598,1602,1606,1610,1614,1618,1622,1626,1630,1634,1638,1642,1646,1650,1654,1658,1662,1666,1670,1674,1678,1682,1686,1690,1694,1698,1702,1706,1710,1714,1718,1722,1726,1730,1734,1738,1742,1746,1750,1754,1758,1762,1766,1770,1774,1778,1782,1786,1790,1794,1798,1802,1806,1810,1814,1818,1822,1826,1830,1834,1838,1842,1846,1850,1854,1858,1862,1866,1870,1874,1878,1882,1886,1890,1894,1898,1902,1906,1910,1914,1918,1922,1926,1930,1934,1938,1942,1946,1950,1954,1958,1962,1966,1970,1974,1978,1982,1986,1990,1994,1998,2002,2006,2010,2014,2018,2022,2026,2030,2034,2038,2042,2046,2050,2054,2058,2062,2066,2070,2074,2078,2082,2086,2090],{"value":1287,"title":1288,"description":1289},"/AccountRisk/BruteForce","账号暴力破解","攻击者采用枚举方法系统地尝试用户名和密码组合进行登录尝试。攻击目标：用户账户。此类攻击的受害者必须是内部网络目标。常见的暴力破解和弱密码枚举尝试属于此类别。从内部网络发起的针对外部网络的暴力破解攻击归类为：主机异常/主机外部攻击。",{"value":1291,"title":1292,"description":1293},"/AccountRisk/Others","账号其他风险","其他账户异常事件的告警",{"value":1295,"title":1296,"description":1297},"/AccountRisk/SuspAccount","可疑账户","可疑账户指可能被用于掩盖攻击者活动、实现持久访问或执行未授权操作的账户。包括：后门账户、隐藏账户、影子账户等。",{"value":1299,"title":1300,"description":1301},"/AccountRisk/SuspBehavior","账号可疑行为","账户异常行为的告警。常见场景包括：垃圾邮件发送 - 账户发送垃圾邮件（内网 -> SMTP服务器）。数据窃取 - 下载大量敏感文件（内网 -> 内网）。可疑访问 - 尝试登录关键服务器（内网 -> 内网）。攻击者未知，受害者：涉事账户。",{"value":1303,"title":1304,"description":1305},"/AccountRisk/SuspLogin","账号可疑登录","此类主要包括异常行为审计，如：异常登录地点、异常登录时间、可疑登录账户和异常登录结果。告警的源地址不区分内外网，而目标地址为内部网络。默认情况下，从内部网络到外部网络的异常登录尝试不会触发告警。如果发生相关告警，应归类为：主机异常/其他。",{"value":1307,"title":1308,"description":1309},"/AccountRisk/SuspModify","账号可疑修改","记录异常账户变更行为，如频繁权限修改和频繁密码更改。告警目标地址为内部网络。",{"value":1311,"title":1312,"description":1313},"/AgentSec/ConfigurationManipulation","配置操纵滥用","攻击者篡改配置文件、偏好设置或加载机制，以持久操控AI系统行为或植入后门。",{"value":1315,"title":1316,"description":1317},"/AgentSec/IdentitySession","身份会话滥用","攻击者利用认证、令牌管理和会话机制中的漏洞提升权限、冒充身份或越权访问数据。",{"value":1319,"title":1320,"description":1321},"/AgentSec/ToolInvocation","工具调用滥用","攻击者在工具调用过程中操纵输入参数和数据传递，以执行恶意命令或访问敏感数据。",{"value":1323,"title":1324,"description":1325},"/AgentSec/ToolRegistration","工具注册滥用","攻击者通过污染工具描述、模式定义或标识符，利用工具注册机制中的漏洞操控AI系统行为。",{"value":1327,"title":1328,"description":1329},"/AgentSec/UpdateMechanism","更新机制滥用","攻击者利用工具更新机制的信任模型和自动化特性推送恶意更新，以实现持久控制或突发攻击。",{"value":1331,"title":1332,"description":1333},"/Audit/ConfigChange","配置变更审计","对配置修改行为的审计，包括：修改防火墙配置、修改路由表、修改DNS服务器地址、修改服务器配置参数等。审计类型，默认级别为低。不涉及攻击者或受害者。",{"value":1335,"title":1336,"description":1337},"/Audit/Exfiltration","数据外泄审计","监测内网主机对外传输或发送数据的行为，例如：1. 上传文件至外部FTP服务器；2. 发送大邮件附件至外部邮箱；3. 同步文件至云存储；4. 向外部HTTP服务器提交数据等。审计数据传输行为而非内容本身。",{"value":1339,"title":1340,"description":1341},"/Audit/IllegalAccess","非法访问审计","内网主机访问禁止访问的网站。包括：1. 涉及恶意扣费、隐私窃取、赌博、暴力、色情或分裂活动的内容。具体规定参见：http://report.12377.cn:13225/mainNotice.html；2. 违反公司政策的内容，如游戏网站、招聘网站或电商平台。不涉及攻击者或受害者。",{"value":1343,"title":1344,"description":1345},"/Audit/IllegalOp","非法操作审计","包括内网中各类未授权操作的告警，例如：1. 未知设备接入网络、非安全计算机处理涉密文件等；2. 绕过堡垒机访问生产环境；3. 其他违反法律法规和公司政策的操作。不涉及攻击者或受害者。",{"value":1347,"title":1348,"description":1349},"/Audit/IllegalSoft","非法软件审计","内网主机存在涉及不合规应用的进程或通信流量。包括：1. 违反国家规定的应用：涉及恶意扣费、隐私窃取、赌博、色情或破坏国家统一的内容。具体规定参见：http://report.12377.cn:13225/mainNotice.html；2. 违反组织或公司政策的应用，如禁止的游戏、即时通讯软件或股票交易应用。审计类型，默认严重级别为低。不涉及攻击者或受害者。",{"value":1351,"title":1352,"description":1353},"/Audit/OpAudit","操作审计","包括需审计日志记录的操作，如敏感操作（如权限修改、批量数据查询）和高危操作（如数据删除、系统文件修改或删除、日志清除）。审计类型默认设置为低级别。不涉及攻击者或受害者。",{"value":1355,"title":1356,"description":1357},"/Audit/Others","其他审计","其他行为审计事件的告警",{"value":1359,"title":1360,"description":1361},"/ConfigRisk/ClearTextCredit","明文凭据传输风险","敏感信息在数据传输过程中未经加密传输。敏感信息包括密码、加密密钥、证书、会话标识符、私有数据（如消息内容）、授权凭证、个人数据，以及程序文件、配置文件、日志文件、备份文件等。风险资产位于内网（目的地址）。",{"value":1363,"title":1364,"description":1365},"/ConfigRisk/Database","数据库配置风险","数据库配置不当可能导致数据泄露、服务器被攻陷等危害。风险资产位于内网（目的地址）。",{"value":1367,"title":1368,"description":1369},"/ConfigRisk/DeviceConf","设备配置风险","设备缺乏适当的安全配置，可能导致数据泄露、服务器被入侵等危害。风险资产位于内部网络（目标地址）。",{"value":1371,"title":1372,"description":1373},"/ConfigRisk/Exploit","漏洞利用风险","服务器未及时进行补丁更新或安全配置，导致存在漏洞被利用的风险。",{"value":1375,"title":1376,"description":1377},"/ConfigRisk/HTTPServer","HTTP服务器配置风险","HTTP服务器启用了PUT、DELETE、OPTIONS和TRACE等非常用方法，可能导致服务器信息泄露和内容篡改。风险资产位于内部网络（目标地址）。",{"value":1379,"title":1380,"description":1381},"/ConfigRisk/MidWare","中间件配置风险","中间件缺乏安全配置，可能导致数据泄露、服务器被入侵等危害。风险资产位于内部网络（目标地址）。",{"value":1383,"title":1384,"description":1385},"/ConfigRisk/Others","其他配置风险","其他配置风险事件告警。",{"value":1387,"title":1388,"description":1389},"/ConfigRisk/Service","服务配置风险","SSH、FTP等网络服务存在不安全配置，包括连接IP和方法不受限制、未设置最大登录尝试次数等。风险资产位于内部网络（目标地址）。",{"value":1391,"title":1392,"description":1393},"/ConfigRisk/WeakPassword","弱密码配置风险","审计成功登录的弱密码事件；容易被攻击者猜测或暴力破解工具破解的密码被视为弱密码，如'123'、'abc'等。该账号/系统存在弱密码漏洞风险。受影响资产位于内部网络（目标地址）。",{"value":1395,"title":1396,"description":1397},"/Credential/Forgery","凭证伪造","攻击者创建或修改凭证（如用户名和密码、数字证书、令牌等），在未经合法用户授权的情况下获取对系统或网络资源的未授权访问权限。",{"value":1399,"title":1400,"description":1401},"/Credential/Others","其他凭证攻击","其他凭证攻击告警。",{"value":1403,"title":1404,"description":1405},"/Credential/PTH","哈希传递攻击","攻击者通过获取用户的NTLM或LM哈希值（无需明文密码），访问Windows网络中的其他机器。该方法利用了Windows域环境中的哈希传递机制，使攻击者无需用户实际密码即可访问受保护资源。",{"value":1407,"title":1408,"description":1409},"/Credential/PTK","凭据PTK攻击","攻击者获取用户的加密密钥，并利用该密钥加密发送至系统的数据，借此访问受限资源并执行敏感操作。",{"value":1411,"title":1412,"description":1413},"/Credential/PTT","票据传递攻击","攻击者获取或窃取Kerberos系统中用于身份验证的票据，随后利用这些票据代表合法用户访问网络资源。",{"value":1415,"title":1416,"description":1417},"/Credential/Steal","凭据窃取","攻击者通过多种手段（如键盘记录、钓鱼攻击、社会工程等）获取用户登录凭据，随后利用这些凭据访问系统。",{"value":1419,"title":1420,"description":1421},"/Credential/TokenHijacking","令牌劫持","攻击者拦截或复制用于身份验证的网络令牌（如OAuth令牌、JWT令牌等），随后利用这些令牌冒充合法用户执行操作。",{"value":1423,"title":1424,"description":1425},"/DDOS/DDOS","分布式拒绝服务攻击","从外部网络发起的DDoS攻击，针对服务器或应用程序。包括：流量型DDoS、应用层DDoS等。主要攻击特征：流量异常激增、带宽饱和；接收来自不同来源的大量SYN包、UDP包等；存在反射型DDoS特征——源端口对应常见反射服务如NTP、DNS、SSDP、Memcached等。主要影响：网络瘫痪、服务中断及业务运营停摆。",{"value":1427,"title":1428,"description":1429},"/DataLeakage/DataReconstruction","数据重构攻击","基于对聚合数据的访问权限，通过逆向工程手段获取个人用户记录或敏感基础设施记录的私有信息的攻击行为。",{"value":1431,"title":1432,"description":1433},"/DataLeakage/Membership","成员推断攻击","旨在判定特定记录是否包含在用于统计操作的数据集或机器学习模型训练数据中的攻击行为。",{"value":1435,"title":1436,"description":1437},"/DataLeakage/ModelTheft","模型窃取","恶意行为者未经授权访问或复制LLM模型，可能涉及对模型架构的逆向工程或专有算法与参数的提取，导致知识产权盗窃或未经授权的副本传播。",{"value":1439,"title":1440,"description":1441},"/DataLeakage/Property","属性推断攻击","旨在从训练数据集中提取全局信息（如部分训练样本是否包含某些敏感属性）的攻击行为。",{"value":1443,"title":1444,"description":1445},"/DataLeakage/Sensitive","敏感信息泄露","涉及PII个人身份信息、财务数据、PHI医疗健康信息或企业机密等敏感信息的泄露事件。",{"value":1447,"title":1448,"description":1449},"/DataLeakage/SystemPrompt","系统提示提取","专门提取系统指令和提示信息。",{"value":1451,"title":1452,"description":1453},"/DataLeakage/TrainingData","训练数据提取","通过成员推理或模型逆向工程等方法提取训练数据。",{"value":1455,"title":1456,"description":1457},"/DataMisuse/Abroad","跨境数据传输","从海外地址访问国内数据，或主动将数据从国内地址传输至海外目的地。",{"value":1459,"title":1460,"description":1461},"/DataMisuse/GovAudit","政府审计数据滥用","针对医疗行业特定系统，组织实体未经许可获取特定数据的行为。",{"value":1463,"title":1464,"description":1465},"/DataMisuse/IllegalDataCollect","非法数据收集","违反个人信息监管政策或标准的风险警示，表明可能存在非法或不合规的个人信息收集行为。",{"value":1467,"title":1468,"description":1469},"/DataMisuse/IllegalDataUse","非法数据使用","违反法律法规或其他相关规定，非法或不当执行数据处理操作。",{"value":1471,"title":1472,"description":1473},"/DataMisuse/Others","其他数据滥用行为","其他数据滥用行为。",{"value":1475,"title":1476,"description":1477},"/DataMisuse/OutDomain","跨域数据流动","数据从内部可信域流向外部不可信域。",{"value":1479,"title":1480,"description":1481},"/DataSteal/APICrawling","API数据爬取","当主体实体在单位时间内API访问次数超过阈值，且返回的指定类型数据结果去重计数超过一定阈值时触发。",{"value":1483,"title":1484,"description":1485},"/DataSteal/DataDrip","数据渗出","在较长时间内小批量检索指定类型数据，总数据量达到一定阈值。",{"value":1487,"title":1488,"description":1489},"/DataSteal/DatabaseConnect","数据库连接窃取","数据库连接窃取指攻击者获取数据库连接凭证以未经授权访问数据库的恶意行为，从而窃取敏感数据或执行未授权操作。",{"value":1491,"title":1492,"description":1493},"/DataSteal/DatabaseDump","数据库转储窃取","通过数据库运维工具下载数据库文件，将数据从一个数据库迁移或复制到另一个数据库的行为。",{"value":1495,"title":1496,"description":1497},"/DataSteal/Others","其他数据窃取","其他数据外泄活动。",{"value":1499,"title":1500,"description":1501},"/DataSteal/UnauthorizedAccess","未授权访问","未授权访问指攻击者在未经适当授权的情况下非法访问系统或数据的行为，通常意图窃取或破坏数据。",{"value":1503,"title":1504,"description":1505},"/DataTampering/FileTampering","文件篡改","文件篡改指攻击者未经授权修改、删除或破坏文件内容的行为。此类攻击可能导致数据损坏、信息泄露或系统不稳定。",{"value":1507,"title":1508,"description":1509},"/DataTampering/HiddenLinkInjection","暗链注入","暗链注入指攻击者将恶意链接隐蔽插入网站页面的行为。这些链接通常对用户不可见，但会被搜索引擎爬虫索引，从而影响搜索结果、提升恶意网站排名或引导流量至恶意网站。暗链注入是一种数据篡改攻击，旨在利用网站可信度和流量为攻击者牟利，同时可能对被感染网站的搜索引擎优化（SEO）产生负面影响。",{"value":1511,"title":1512,"description":1513},"/DataTampering/Others","其他数据篡改告警","其他数据篡改类告警。",{"value":1515,"title":1516,"description":1517},"/DataTampering/WebsiteDefacement","网站篡改","网站篡改指攻击者未经授权修改或破坏网站内容的行为。通常涉及更改网站文本、图像或其他媒体内容以传播虚假信息、展示恶意消息、推广特定观点或品牌，甚至羞辱和损害网站声誉。网站篡改是常见的数据篡改攻击，旨在通过修改网页内容实现特定恶意目的。",{"value":1519,"title":1520,"description":1521},"/DevOps/DatabaseError","数据库故障","数据库故障可分为以下类型，受影响的风险资产为内网环境（目的地址）：1. 事务内部故障 2. 系统故障 3. 介质故障 4. 计算机病毒故障。",{"value":1523,"title":1524,"description":1525},"/DevOps/DeviceError","设备故障","设备故障可分为以下类型，受影响的风险资产为内网环境（目的地址）：设备在其生命周期内因磨损或操作使用暂时丧失规定功能。1. 突发性故障：突然发生的故障。发生时间随机且难以预测，导致设备功能完全丧失。2. 渐发性故障：因设备性能逐渐劣化引发的故障。进展缓慢且规律可循，导致功能部分丧失。",{"value":1527,"title":1528,"description":1529},"/DevOps/HostError","主机故障","主机故障可分为以下类型，受影响的风险资产为内网环境（目的地址）：检测到的由各种原因导致的主机故障包括：1. 系统硬件问题，主要由SCSI卡、主板、RAID卡、HBA卡、网卡和硬盘等硬件设备引起。此类情况下需查明具体硬件故障细节并通过更换硬件解决。2. 外围硬件问题，主要由网络问题引起。此时应重点排查主机网络设备和网络参数。3. 主机软件问题，主要由系统内核漏洞、应用软件缺陷或驱动程序错误导致。解决方法包括升级内核、修复程序缺陷或更新驱动。4. 主机系统配置问题，主要由系统参数设置不当引起。可通过恢复系统默认设置或关闭防火墙解决。",{"value":1531,"title":1532,"description":1533},"/DevOps/Others","运维其他事件","其他运维监控事件，风险资产为内网（目的地址）。",{"value":1535,"title":1536,"description":1537},"/DevOps/WebError","Web应用故障","Web应用故障可分为以下类型，受影响风险资产位于内网环境（目的地址）：1. 因流量突增导致服务器负载过高引发的故障。2. 程序源代码运行时错误或代码逻辑缺陷导致的故障。3. 服务超时导致运行异常引发的故障。",{"value":1539,"title":1540,"description":1541},"/Exploit/DOS","拒绝服务漏洞利用","拒绝服务(DoS)漏洞攻击指外部发起的针对系统服务、应用服务或终端软件的攻击，可导致系统崩溃、服务中断或应用故障。",{"value":1543,"title":1544,"description":1545},"/Exploit/DeviceVul","设备漏洞利用","从外网发起的针对特定设备的漏洞攻击行为，包括：网络设备漏洞、安全设备漏洞、物联网设备漏洞、专用设备漏洞等。",{"value":1547,"title":1548,"description":1549},"/Exploit/Others","漏洞利用其他事件","从外网发起的其他类型漏洞利用攻击事件。",{"value":1551,"title":1552,"description":1553},"/Exploit/RemoteService","远程服务漏洞利用","针对网络远程服务（如远程桌面、数据库、文件共享等）的漏洞扫描和攻击尝试，旨在利用服务弱点获取目标系统控制权。",{"value":1555,"title":1556,"description":1557},"/Exploit/Shellcode","Shellcode利用","检测到特定shellcode通信的数据包特征或识别出包含shellcode签名的恶意文件。常见场景包括：反向shell载荷传输（内->外通信）；包含载荷的恶意文件（通过邮件外->内或下载链接内->外）等。",{"value":1559,"title":1560,"description":1561},"/Exploit/SoftVul","软件漏洞利用","从外网发起的针对常见第三方软件（如浏览器、Office程序、Adobe应用）或服务器中间件（如Redis、Apache、Nginx）的漏洞攻击。",{"value":1563,"title":1564,"description":1565},"/Exploit/SystemVul","系统漏洞利用","从外网发起的针对Linux、Windows等操作系统内核漏洞或原生应用漏洞的攻击。",{"value":1567,"title":1568,"description":1569},"/IllegalData/CommercialViolations","商业违规","违反商业法律法规的内容。",{"value":1571,"title":1572,"description":1573},"/IllegalData/DiscriminatoryContent","歧视性内容","对个人或群体表现出歧视、偏见或仇恨的内容。",{"value":1575,"title":1576,"description":1577},"/IllegalData/InadequateSecurityRequirements","安全要求不足","在高安全服务类型中使用的生成式AI可能产生不准确或不可靠的内容。",{"value":1579,"title":1580,"description":1581},"/IllegalData/RightsInfringement","权利侵犯","侵犯他人合法权益的内容，包括隐私侵犯、诽谤和声誉损害。",{"value":1583,"title":1584,"description":1585},"/IllegalData/ViolatingSocialistCoreValues","违反社会主义核心价值观","与社会主义核心价值观相矛盾或削弱的内容。",{"value":1587,"title":1588,"description":1589},"/InherentModelRisk/BehavioralConsistency","行为一致性缺陷","模型表现出不稳定、不一致的行为或无法可靠遵循指令，显示出失调迹象。",{"value":1591,"title":1592,"description":1593},"/InherentModelRisk/KnowledgeDefects","知识缺陷","模型知识的准确性、时效性或安全性不足，包括过时信息或敏感训练数据的记忆。",{"value":1595,"title":1596,"description":1597},"/InherentModelRisk/ReasoningLogic","推理逻辑缺陷","模型缺乏可靠的逻辑推理和因果推断能力，经常产生'幻觉'或荒谬结论。",{"value":1599,"title":1600,"description":1601},"/InherentModelRisk/Robustness","鲁棒性缺陷","由于深度神经网络的非线性和大规模特性，AI系统易受复杂操作环境或恶意干扰影响，导致性能下降或决策错误。",{"value":1603,"title":1604,"description":1605},"/InherentModelRisk/SocietalEthical","社会伦理缺陷","模型输出或行为包含偏见、歧视、有害内容或与人类价值观和伦理标准不符。",{"value":1607,"title":1608,"description":1609},"/InherentModelRisk/UnsafeDesign","工具设计不安全","由于设计和/或实现不安全导致的LLM连接工具被利用，可能因意外、模糊或被操控的输出引发破坏性操作。",{"value":1611,"title":1612,"description":1613},"/MITM/BGPHijackingAttack","BGP劫持攻击","通过恶意宣告BGP路由来操纵互联网路径，实现误导拦截流量或篡改数据等目的。常见攻击手段包括广播虚假前缀宣告，使被攻陷路由器进一步污染其他路由器的路由信息，甚至可能传播至骨干网。",{"value":1615,"title":1616,"description":1617},"/MITM/Others","中间人攻击其他类型","其他形式的中间人攻击",{"value":1619,"title":1620,"description":1621},"/MITM/TrafficHijacking","流量劫持","攻击者非法截获并操纵网络流量，以获取敏感信息或控制网络资源。",{"value":1623,"title":1624,"description":1625},"/MITM/WLANHijacking","无线局域网劫持","利用应用缺陷、协议漏洞及配置错误等安全隐患劫持WiFi流量的网络行为。例如劫持后可展示低俗广告和非法内容，或导致WiFi覆盖范围内大面积断网。",{"value":1627,"title":1628,"description":1629},"/Malware/Backdoor","后门程序","在内网主机通信流量中检测到疑似后门程序通信特征。",{"value":1631,"title":1632,"description":1633},"/Malware/Bot","僵尸病毒","在内网主机上检测到与僵尸病毒相关的恶意文件、进程或通信。",{"value":1635,"title":1636,"description":1637},"/Malware/BrowserHijacker","浏览器劫持","内网主机存在浏览器劫持行为，通常用于篡改用户浏览器设置（如搜索页和主页），以实现定向广告投放或恶意流量重定向。",{"value":1639,"title":1640,"description":1641},"/Malware/CheatProgram","作弊程序","内网主机正在运行作弊程序。这类工具虽为游戏或其他软件设计，但可能被恶意利用以获取敏感信息或控制系统。",{"value":1643,"title":1644,"description":1645},"/Malware/Downloader","木马下载器","内网主机感染木马下载器，此类恶意软件会在受控系统下载并安装其他恶意程序。",{"value":1647,"title":1648,"description":1649},"/Malware/Exploit","恶意利用工具","内部网络主机包含恶意利用工具。这些是专门设计用于利用已知系统或软件漏洞执行未授权操作的工具。",{"value":1651,"title":1652,"description":1653},"/Malware/Fileless","无文件恶意软件","内部网络主机包含无文件恶意软件。",{"value":1655,"title":1656,"description":1657},"/Malware/HackTool","黑客工具","内部网络主机包含黑客工具。这些是黑客用于渗透系统、窃取信息或执行其他恶意活动的工具。",{"value":1659,"title":1660,"description":1661},"/Malware/Keylogger","键盘记录器","内部网络主机感染了键盘记录器。这是一种专门设计用于记录用户击键的恶意软件，用于窃取密码和其他敏感信息。",{"value":1663,"title":1664,"description":1665},"/Malware/MacroVirus","宏病毒","内部网络主机感染了宏病毒。这类病毒通过利用文档编辑软件中的宏功能（如Microsoft Office中的VBA宏）进行传播。",{"value":1667,"title":1668,"description":1669},"/Malware/MaliciousAdware","恶意广告软件","恶意广告是指通过在线广告平台发布的恶意内容，意图欺骗或诱骗用户。这些广告可能将用户重定向到恶意网站、下载恶意软件或泄露个人敏感信息。",{"value":1671,"title":1672,"description":1673},"/Malware/MaliciousMail","恶意邮件","内部网络主机在收到的邮件中检测到恶意程序。这些程序具有恶意软件的特征，或在执行时可能下载并执行病毒、安装后门等。",{"value":1675,"title":1676,"description":1677},"/Malware/MaliciousScript","恶意脚本","内部网络主机运行具有恶意行为特征的脚本，例如启用PowerShell或修改注册表项。",{"value":1679,"title":1680,"description":1681},"/Malware/Miner","挖矿恶意软件","内部网络主机包含恶意挖矿文件、进程或挖矿通信。例如：1. 内部网络查询矿池域名（受害者：内部源地址，无攻击者）。2. 内部网络与矿池通信（内部 -> 外部，受害者源地址，无攻击者）。3. 终端检测到挖矿程序（资产IP为受害者，无攻击者）。4. 挖矿恶意软件回连C2（内部 -> 外部，外部目标地址为攻击者，罕见情况）。",{"value":1683,"title":1684,"description":1685},"/Malware/Others","其他恶意软件","其他恶意软件告警。",{"value":1687,"title":1688,"description":1689},"/Malware/PUP","恶意PUP程序","内网主机检测到流氓软件、广告软件、灰产软件或可疑程序的通信行为。例如：1. 流氓软件外泄机器信息；2. 广告软件回连C2服务器；3. 其他可疑软件通信模式。通常用于检测内到外的流量。",{"value":1691,"title":1692,"description":1693},"/Malware/PenetrationTool","渗透工具","内网主机存在被恶意利用的渗透工具。这些工具本用于安全测试或渗透测试目的，但可能被非法用于攻击系统。",{"value":1695,"title":1696,"description":1697},"/Malware/Prank","恶作剧程序","内网主机存在恶作剧程序。此类程序不会对系统造成严重损害，但可能执行如更改桌面背景或播放声音等恶作剧行为。",{"value":1699,"title":1700,"description":1701},"/Malware/Ransomware","勒索软件","内网主机感染勒索软件。包括：1. 勒索软件通信（内→外）；2. 勒索软件域名查询（无攻击者参与）；3. 终端检测到勒索软件（资产IP为受害者，无攻击者参与）；4. 检测到其他勒索软件行为特征（如传播、访问Tor网络等）。",{"value":1703,"title":1704,"description":1705},"/Malware/RootkitBootkit","Rootkit/Bootkit病毒","Rootkit和Bootkit均为旨在隐藏系统内恶意活动痕迹的恶意软件，使其难以检测和清除。Rootkit通常嵌入操作系统内核或系统文件以隐藏恶意进程、文件和注册表项；Bootkit则通过侵入系统启动过程，在系统启动时加载并执行恶意代码。",{"value":1707,"title":1708,"description":1709},"/Malware/Spyware","间谍软件","内网主机流量中检测到间谍软件的通信特征。",{"value":1711,"title":1712,"description":1713},"/Malware/Trojan","木马程序","检测到内网主机的木马通信活动。",{"value":1715,"title":1716,"description":1717},"/Malware/TrojanDropper","木马释放器","内网主机存在木马释放器。此类程序本身不含恶意代码，但其用途是释放并激活其他木马程序。",{"value":1719,"title":1720,"description":1721},"/Malware/VirTool","代码混淆工具","内网主机存在代码混淆工具。该工具用于混淆软件代码，使其难以理解和逆向工程，通常被用来隐藏恶意软件的真实意图。",{"value":1723,"title":1724,"description":1725},"/Malware/Virus","传染性病毒","内网主机感染具有传染性的病毒。该病毒可感染可执行文件、文档文件等，使每个被感染文件均包含病毒代码。",{"value":1727,"title":1728,"description":1729},"/Malware/VirusGenerator","病毒生成器","内网主机存在病毒生成器。该工具用于生成或创建新病毒，可能包含生成自定义病毒代码的功能。",{"value":1731,"title":1732,"description":1733},"/Malware/Webshell","网页后门","内网主机存在网页后门文件。文件内容具有网页后门特征，或访问该文件可能导致执行系统命令、查看文件内容等操作。需区别于网络攻击/网页后门请求，若后门扫描探测或请求尝试来自外网，则应归类为网络攻击/网页后门请求。",{"value":1735,"title":1736,"description":1737},"/Malware/Worm","网络蠕虫","检测到内网主机的网络蠕虫通信活动。",{"value":1739,"title":1740,"description":1741},"/Others/Others","其他威胁类型","非攻击行为、业务相关异常活动等。通常风险较低且难以定性。",{"value":1743,"title":1744,"description":1745},"/Phishing/EmailPhishing","钓鱼邮件","通过伪装成合法来源发送邮件，诱导收件人点击恶意链接或提供个人信息，以窃取敏感数据或实施恶意攻击。",{"value":1747,"title":1748,"description":1749},"/Phishing/Others","其他钓鱼攻击","包括但不限于邮件钓鱼、社交媒体钓鱼、网站钓鱼等通过各类通信渠道实施的钓鱼攻击。",{"value":1751,"title":1752,"description":1753},"/Phishing/SocialMediaPhishing","社交媒体钓鱼","通过社交媒体平台冒充可信个人或组织发送链接或文件，诱骗用户执行操作的钓鱼攻击。",{"value":1755,"title":1756,"description":1757},"/Phishing/WebPhishing","网页钓鱼","创建模仿合法网站外观的欺骗性网页，诱骗用户输入登录凭证或信用卡信息等个人信息。",{"value":1759,"title":1760,"description":1761},"/PromptInjection/Direct","直接提示注入","直接向模型发送覆盖指令的行为。",{"value":1763,"title":1764,"description":1765},"/PromptInjection/Indirect","间接提示注入","通过污染模型检索的外部数据源（如网页、文档）实现的注入攻击。",{"value":1767,"title":1768,"description":1769},"/Scan/HostScan","主机扫描","外部网络发起的针对IP段内服务器可用性的探测行为；通过ping或TCP连接尝试等方法确认目标IP是否在线并响应。攻击目标：服务器。",{"value":1771,"title":1772,"description":1773},"/Scan/NetworkScan","网络扫描","网络扫描是指扫描网络上所有设备和系统的过程，以获取网络拓扑、设备状态和开放端口等信息。常用于安全审计、资产管理和漏洞检测，以识别潜在安全风险并优化网络配置。",{"value":1775,"title":1776,"description":1777},"/Scan/Others","其他扫描","外部网络发起的其他类型的探测和扫描攻击事件。",{"value":1779,"title":1780,"description":1781},"/Scan/PortScan","端口扫描","外部网络发起的针对服务器开放端口的扫描行为，表现出自动化行为特征。攻击目标：服务器。",{"value":1783,"title":1784,"description":1785},"/Scan/Scanner","扫描器指纹","在外部网络扫描过程中检测到特定扫描器的指纹特征。攻击目标：服务器。",{"value":1787,"title":1788,"description":1789},"/Scan/ServScan","服务扫描","外部网络发起的针对服务器开放服务的扫描行为。包括批量探测常见服务端口可用性，以及发送特定数据包检测服务端程序版本信息。攻击目标：服务器。",{"value":1791,"title":1792,"description":1793},"/Scan/SystemScan","系统扫描","系统扫描是指对计算机系统进行全面检查和分析的过程，以检测漏洞、恶意软件、配置错误和其他潜在安全问题。通过系统扫描，可以识别并修复安全风险，确保系统的稳定性和安全性。",{"value":1795,"title":1796,"description":1797},"/Scan/VulScan","漏洞扫描","外部网络发起的针对非Web应用的漏洞扫描，包括配置错误、系统漏洞和应用漏洞，表现出自动化行为特征。攻击目标：服务器。",{"value":1799,"title":1800,"description":1801},"/Scan/WebScan","Web扫描","外部网络发起的针对Web应用漏洞的扫描活动，包括敏感目录扫描、网站后门检测、爬虫扫描、SQL注入以及其他各种Web应用漏洞扫描，表现出自动化行为特征。攻击目标：Web业务系统。",{"value":1803,"title":1804,"description":1805},"/SupplyChain/Artifacts","第三方插件风险","由存在漏洞或被恶意篡改的第三方库、框架、插件或扩展引入的安全威胁。",{"value":1807,"title":1808,"description":1809},"/SupplyChain/Hardware","硬件平台风险","攻击者通过篡改、伪造或利用硬件设备和固件中的漏洞，破坏构建或运行在硬件上的AI系统的安全性。",{"value":1811,"title":1812,"description":1813},"/SupplyChain/Infrastructure","基础设施入侵","针对支持AI开发和部署管道的基础设施（如云服务器、Kubernetes集群）的攻击。攻击者可能利用漏洞进行未经授权的访问，导致系统/网络被入侵或模型完整性被破坏。",{"value":1815,"title":1816,"description":1817},"/SupplyChain/PoisonBackdoor","后门投毒","需要在被投毒样本和测试样本之间创建后门模式，要求同时控制训练和测试数据。",{"value":1819,"title":1820,"description":1821},"/SupplyChain/PoisonData","数据投毒","操纵训练数据以破坏模型完整性。被污染的数据可能导致结果失真、输出偏颇、后门触发或用户信任丧失。",{"value":1823,"title":1824,"description":1825},"/SupplyChain/PoisonModel","模型投毒","在模型部署前篡改或注入恶意代码。",{"value":1827,"title":1828,"description":1829},"/SupplyChain/PoisonTarget","定向投毒","一种改变特定目标样本预测结果的攻击。控制训练标签的攻击者可通过标签翻转实现此目的。",{"value":1831,"title":1832,"description":1833},"/SupplyChain/Software","软件开发工具风险","攻击者通过污染或利用AI项目开发的软件工具链依赖项，植入后门或漏洞。",{"value":1835,"title":1836,"description":1837},"/SupplyChain/VectorEmbedding","向量与嵌入漏洞","使用LLM的RAG系统中存在的重大安全风险。向量/嵌入生成、存储或检索中的弱点可能导致恶意内容注入、输出操纵或敏感数据访问。",{"value":1839,"title":1840,"description":1841},"/SuspEndpoint/Attack","可疑端点攻击","内部网络主机发起针对外部网络的漏洞利用、暴力破解、基于Web的攻击等行为。",{"value":1843,"title":1844,"description":1845},"/SuspEndpoint/CommandAndControl","可疑端点命令与控制","命令与控制（C2）指攻击者远程发出指令并管理被入侵设备的行为，通常用于协调数据窃取、网络攻击或恶意软件传播等恶意活动。",{"value":1847,"title":1848,"description":1849},"/SuspEndpoint/DefenseEvasion","可疑终端防御规避","内网主机发现尝试通过卸载/禁用安全软件、混淆/加密数据和脚本，或滥用可信进程来隐藏和伪装其恶意软件，以绕过检测的行为。",{"value":1851,"title":1852,"description":1853},"/SuspEndpoint/ExternalScan","可疑终端外部扫描","由内网主机发起的一类针对外网的扫描行为，其目标为外部网络。",{"value":1855,"title":1856,"description":1857},"/SuspEndpoint/FileTempering","敏感文件篡改","内网主机文件遭到篡改。敏感主机文件包括：应用安全配置文件、防火墙配置、网络服务配置等。篡改易导致安全防护失效、权限提升等危害。",{"value":1859,"title":1860,"description":1861},"/SuspEndpoint/FilelessAttack","可疑终端无文件攻击","在内网主机发现系统上未创建文件，但执行了代码或修改了系统设置。这可能表明存在无文件攻击，攻击者直接在内存中执行恶意代码。",{"value":1863,"title":1864,"description":1865},"/SuspEndpoint/ImageLoaded","可疑终端镜像加载","记录特定进程中加载的模块，包括加载进程、哈希值和签名信息。",{"value":1867,"title":1868,"description":1869},"/SuspEndpoint/InformationGathering","可疑终端信息收集","内网主机检测到异常的本地信息收集行为。这可能表明攻击者正在收集本地系统信息，如用户列表和系统配置。",{"value":1871,"title":1872,"description":1873},"/SuspEndpoint/OpAbnormaly","可疑终端操作异常","内网主机的异常操作，如日志删除、授予root权限等。",{"value":1875,"title":1876,"description":1877},"/SuspEndpoint/Others","可疑终端其他异常行为","内网主机的其他异常行为。",{"value":1879,"title":1880,"description":1881},"/SuspEndpoint/Persistence","可疑终端持久化","内网主机发现的持久化机制，如服务创建、注册表修改和文件系统变更，可能被用于确保攻击者在系统上的长期存在。",{"value":1883,"title":1884,"description":1885},"/SuspEndpoint/PrivilegeEscalation","可疑终端权限提升","内网主机检测到用户账户尝试或成功提升权限，这可能表明攻击者正试图获取更高的系统访问权限以进行更广泛的攻击。",{"value":1887,"title":1888,"description":1889},"/SuspEndpoint/ProcessInjection","可疑进程注入","内网主机检测到异常进程注入告警。恶意代码被注入到进程中，导致其与合法进程共享地址空间。",{"value":1891,"title":1892,"description":1893},"/SuspEndpoint/RemoteExec","可疑远程执行","内网主机发现系统检测到尝试使用远程执行工具或恶意利用远程服务执行未授权命令或脚本的行为。",{"value":1895,"title":1896,"description":1897},"/SuspEndpoint/RemoteService","可疑远程服务利用","检测到内网主机上运行未知远程服务，该服务可能包含已知漏洞，攻击者可利用其执行远程代码。",{"value":1899,"title":1900,"description":1901},"/SuspEndpoint/ReverseShell","疑似反向Shell","内网主机发现系统检测到内部进程与外部IP的异常通信，可能表明攻击者通过反向Shell技术远程控制受控主机。",{"value":1903,"title":1904,"description":1905},"/SuspEndpoint/SuspCommand","可疑命令","内网主机检测到可疑命令告警。包括：1. 用户执行未授权或异常命令；2. 短时间内频繁执行特定命令，可能表明存在自动化攻击。",{"value":1907,"title":1908,"description":1909},"/SuspEndpoint/SuspConnection","可疑连接","网络连接事件记录主机上的TCP/UDP连接，如攻击者扫描、恶意程序外联、隧道建立、横向移动及反向Shell连接等。",{"value":1911,"title":1912,"description":1913},"/SuspEndpoint/SuspDriver","可疑驱动","内网主机加载未知或未签名驱动程序文件。",{"value":1915,"title":1916,"description":1917},"/SuspEndpoint/SuspFile","可疑文件","在内网主机上检测到可疑文件。",{"value":1919,"title":1920,"description":1921},"/SuspEndpoint/SuspOpenPort","可疑开放端口","内网主机上开放了非常见端口。",{"value":1923,"title":1924,"description":1925},"/SuspEndpoint/SuspPipeEvents","可疑管道事件","创建命名管道时生成，恶意软件常利用命名管道进行进程间通信。",{"value":1927,"title":1928,"description":1929},"/SuspEndpoint/SuspProcess","可疑进程","检测到内网主机存在可疑进程行为，包括：1.异常进程名、异常进程创建关系、异常进程命令行参数等；2.其他异常进程行为，如权限异常、状态异常、启动方式或频率异常等。",{"value":1931,"title":1932,"description":1933},"/SuspEndpoint/SuspProcessAccess","可疑进程访问","当进程打开另一个进程时，报告进程访问事件。此操作通常涉及对目标进程地址空间的信息查询或读写操作。可检测读取进程内存内容的黑客工具（如Lsass.exe）以窃取凭证进行哈希传递攻击。",{"value":1935,"title":1936,"description":1937},"/SuspEndpoint/SuspRegistry","可疑注册表","检测内网主机对注册表进行增删改等可疑操作。",{"value":1939,"title":1940,"description":1941},"/SuspEndpoint/SuspThread","可疑线程","内网主机存在远程线程注入等行为。",{"value":1943,"title":1944,"description":1945},"/SuspEndpoint/SuspiciousSpread","可疑终端传播","内网主机通过共享文件夹、可移动介质、远程拷贝等方式传播可疑代码。",{"value":1947,"title":1948,"description":1949},"/SuspEndpoint/TraceEradication","可疑痕迹清除","内网主机发现系统存在删除、修改或隐藏日志文件、系统文件或痕迹清理工具的迹象，可能表明攻击者试图隐藏其活动。",{"value":1951,"title":1952,"description":1953},"/SuspEndpoint/WMI","可疑WMI利用","内网主机检测到WMI利用告警。使用Windows管理规范(WMI)执行了未授权操作，可能用于信息收集或远程控制目的。",{"value":1955,"title":1956,"description":1957},"/SuspTraffic/AccessAnomaly","可疑流量访问异常","内网主机检测到用户访问行为异常告警：用户访问行为偏离正常基线，或检测到异常域/服务访问。",{"value":1959,"title":1960,"description":1961},"/SuspTraffic/MaliciousCert","可疑恶意证书","内网主机安装恶意证书或访问携带恶意证书的URL。例如：1.通过SSL/TLS证书信息检测访问恶意HTTPS网站；2.通过证书的SNI信息检测可疑域名。内网->外网。",{"value":1963,"title":1964,"description":1965},"/SuspTraffic/MaliciousDomain","可疑恶意域名","内网主机请求恶意域名。恶意域名包括挖矿域名、C2域名、钓鱼域名及：1.可疑动态域名，如3322、org；2.内网穿透代理域名，如ngrok域名；3.疑似DGA域名；4.其他类型可疑域名。",{"value":1967,"title":1968,"description":1969},"/SuspTraffic/MaliciousIP","恶意IP地址","内网主机与恶意IP通信。恶意IP包括矿池IP、黑产IP等。",{"value":1971,"title":1972,"description":1973},"/SuspTraffic/Others","可疑流量其他","内网主机发起的可疑通信。包括：可疑会话连接、异常协议数据包、与4444/2745等可疑端口的通信行为。",{"value":1975,"title":1976,"description":1977},"/SuspTraffic/RemoteCtrl","可疑远程控制流量","内网主机与C2服务器通信，检测流量中的远程控制特征及可疑响应，例如：1. 内网向外网发送命令行标识信息（如cmd/powershell）；2. 内网执行常见命令后向外网传输回显信息；3. 检测特定远程控制工具的通信特征。常见远程控制采用反向连接（内->外网），也存在正向连接（外->内网），受害者为内网主机。",{"value":1979,"title":1980,"description":1981},"/SuspTraffic/RemoteService","可疑远程服务流量","远程服务异常流量指在远程服务连接过程中检测到的异常或可疑网络流量，可能表明存在未经授权的访问尝试、数据泄露或其他恶意活动。",{"value":1983,"title":1984,"description":1985},"/SuspTraffic/SuspContent","可疑内容","内网主机请求恶意服务（如挂马、仿冒、欺诈），或发送/接收的数据包内容包含钓鱼尝试、敏感信息等可疑元素。",{"value":1987,"title":1988,"description":1989},"/SuspTraffic/SuspProtocol","可疑协议异常流量","可疑协议流量指检测到使用非常见或异常网络协议的流量，可能表明存在潜在安全威胁，如恶意活动或未经授权的通信。",{"value":1991,"title":1992,"description":1993},"/SuspTraffic/TrafficAnomaly","可疑流量异常","内网主机检测流量异常告警：网络流量偏离正常基线。",{"value":1995,"title":1996,"description":1997},"/SuspTraffic/Tunnel","可疑隧道流量","内网主机发送或接收隧道通信数据包。隧道协议将其他协议的数据帧或数据包封装在新的数据包头中进行传输，到达目的地后解封装并转发至实际目标。例如HTTP隧道、DNS隧道和VPN等。例如：1. 检测隧道通信流量特征，如DNS隧道；2. 识别常见隧道工具特征，包括代理隧道/隐蔽隧道。内网\u003C->外网，源地址可能不同。",{"value":1999,"title":2000,"description":2001},"/WebAttack/BypassAccCtrl","Web攻击绕过访问控制","外网发起的针对权限提升漏洞的攻击行为，包括水平权限提升尝试、认证绕过漏洞尝试及其他类似类型。",{"value":2003,"title":2004,"description":2005},"/WebAttack/CRLF","Web攻击CRLF注入","外网发起的HTTP CRLF注入攻击。HTTP协议使用CRLF符号（回车换行）进行分隔。攻击者在请求中注入恶意换行符以绕过网站安全检查。",{"value":2007,"title":2008,"description":2009},"/WebAttack/CSRF","Web攻击-CSRF","从外部网络发起的跨站请求伪造(CSRF)攻击，利用合法用户的cookie伪造身份请求访问网站。",{"value":2011,"title":2012,"description":2013},"/WebAttack/CodeInjection","Web攻击-代码注入","从外部网络发起的攻击行为，利用中间件、框架或Web组件漏洞注入精心构造的可执行代码(如Java、PHP等)，实现服务器远程命令执行。",{"value":2015,"title":2016,"description":2017},"/WebAttack/CommandExec","Web攻击-命令执行","从外部网络发起的攻击，利用具有系统命令执行功能的Web应用，通过命令拼接、黑名单绕过等技术实现服务器任意系统命令执行。",{"value":2019,"title":2020,"description":2021},"/WebAttack/DirTraversal","Web攻击-目录遍历","由于Web服务器配置不当或Web应用对用户输入文件名安全性校验不足导致的安全漏洞，外部攻击者可通过特殊字符绕过服务器安全限制，尝试访问任意文件(包括Web根目录之外的文件)、读取敏感文件甚至执行系统命令。",{"value":2023,"title":2024,"description":2025},"/WebAttack/FileDownload","Web攻击-文件下载","攻击者利用系统或应用漏洞从目标系统非法下载敏感或恶意文件。通过文件下载行为，攻击者可能获取系统信息、窃取用户数据或传播恶意软件。",{"value":2027,"title":2028,"description":2029},"/WebAttack/FileParsingVul","Web攻击-文件解析漏洞","中间件(如IIS、Apache、Nginx等)在文件解析过程中存在漏洞，攻击者可利用该漏洞实现未授权文件解析。",{"value":2031,"title":2032,"description":2033},"/WebAttack/FileRead","Web攻击-文件读取","攻击者访问服务器上的文件，可能获取敏感信息、执行任意命令或破坏系统。",{"value":2035,"title":2036,"description":2037},"/WebAttack/FileUpload","Web攻击-文件上传","从外部网络发起的攻击行为，利用文件上传功能绕过或未充分校验用户输入，导致直接上传恶意文件。",{"value":2039,"title":2040,"description":2041},"/WebAttack/FileWrite","Web攻击-文件写入","攻击者利用系统或应用漏洞非法写入恶意文件或植入恶意代码，可能通过文件写入行为实现系统入侵、权限提升或执行恶意操作。",{"value":2043,"title":2044,"description":2045},"/WebAttack/Hotlinking","Web攻击-盗链","攻击者在外站引用目标网站资源，造成目标网站资源被非法使用或耗尽。",{"value":2047,"title":2048,"description":2049},"/WebAttack/InfoLeak","Web攻击-信息泄露","由于Web服务器配置不当，外部攻击者利用漏洞获取服务器敏感信息。敏感信息包括密码、密钥、证书、会话标识符、许可证、私有数据（如短信内容）、授权凭证、个人数据，以及程序文件、配置文件、日志文件、备份文件等。注意与横向移动/敏感数据泄露类型的区分。",{"value":2051,"title":2052,"description":2053},"/WebAttack/LFI","Web攻击-本地文件包含","外部网络发起的攻击利用目标应用中实现的动态文件包含机制，通过操控提交参数控制应用运行时路径指向本地敏感文件，可能实现敏感文件泄露、篡改或写入webshell等功能。",{"value":2055,"title":2056,"description":2057},"/WebAttack/MemoryShell","Web攻击-内存马","内存驻留型恶意软件（内存马）攻击指攻击者将恶意代码注入目标系统内存，创建常驻内存的恶意程序以实现对系统的长期控制。内存马攻击通常难以通过传统文件系统扫描和杀毒软件检测，因其在磁盘上不留痕迹。该攻击方式常用于窃取敏感信息、执行远程控制或破坏系统功能的网络攻击中。",{"value":2059,"title":2060,"description":2061},"/WebAttack/Others","Web攻击-其他类型","外部IP发起的其他类型Web攻击行为。",{"value":2063,"title":2064,"description":2065},"/WebAttack/RFI","Web攻击-远程文件包含","外部发起的攻击利用目标应用中实现的动态文件包含机制，通过操控提交参数控制应用运行时引用远程服务器上的恶意文件路径，可能实现远程代码执行、植入webshell等恶意功能。",{"value":2067,"title":2068,"description":2069},"/WebAttack/SQLInjection","Web攻击-SQL注入","外部网络针对Web应用或Web框架发起的SQL注入攻击。",{"value":2071,"title":2072,"description":2073},"/WebAttack/SSRF","Web攻击-SSRF","外部网络发起的服务端请求伪造（SSRF）攻击。攻击者伪造服务端请求向与其通信的内网主机发送数据，通常用于从外网探测或攻击内网服务。",{"value":2075,"title":2076,"description":2077},"/WebAttack/WebTempering","Web攻击-网页篡改","外部攻击者利用漏洞或植入的webshell，通过注入钓鱼链接、违禁内容、暗链、欺诈材料等方式尝试篡改合法网页。",{"value":2079,"title":2080,"description":2081},"/WebAttack/WebshellRequest","Web攻击-Webshell请求","外部攻击者尝试访问webshell以进行命令控制、文件查看等操作。注意与恶意程序/webshell后门的区分；此处主要包括webshell请求尝试和webshell页面扫描。已确认的webshell通信（如服务端响应webshell命令、服务端返回webshell单行命令或webshell木马特征）应归类至恶意程序类别。",{"value":2083,"title":2084,"description":2085},"/WebAttack/WebshellUpload","Web攻击-Webshell上传","攻击者尝试上传webshell后门文件以获取目标服务器控制权。",{"value":2087,"title":2088,"description":2089},"/WebAttack/XSS","跨站脚本攻击","从外部网络发起的跨站脚本(XSS)攻击。通过利用Web开发过程中遗留的漏洞，将恶意JavaScript代码注入网页，攻击访问该站点的正常用户的浏览器。",{"value":2091,"title":2092,"description":2093},"/WebAttack/XXE","XML外部实体注入攻击","从外部网络发起的XXE(XML外部实体)注入攻击。当允许外部实体引用时，构造恶意内容可导致任意文件读取、系统命令执行、内网端口扫描及对内网Web服务的攻击。",{"id":2095,"fieldName":2095,"fieldType":61,"displayName":2096,"importance":74,"description":2097,"tag":-1,"dataSource":2098,"enumValues":2099,"categoryId":36,"subCategoryId":69,"subCategoryName":70},"ruleName","规则名称","规则名称是安全规则的描述性标识。该字段为字符串类型，建议使用简洁、明确且能概括规则内容的名称。名称中可包含漏洞编号、攻击类型或防护对象等关键信息，以提高可读性和识别度。",[66,83,157,67],[],{"id":2101,"fieldName":2101,"fieldType":61,"displayName":2102,"importance":74,"description":2103,"tag":-1,"dataSource":2104,"enumValues":2105,"categoryId":36,"subCategoryId":69,"subCategoryName":70},"attackerAddress","攻击者","发起威胁攻击的攻击者源IP地址，格式要求：必须是符合IPv4或IPv6标准的IP地址格式，例如IPv4的点分十进制表示法（如192.168.22.35）或IPv6的冒号分隔十六进制表示法。",[66,83,67],[],{"id":2107,"fieldName":2107,"fieldType":61,"displayName":2108,"importance":74,"description":2109,"tag":-1,"dataSource":2110,"enumValues":2111,"categoryId":36,"subCategoryId":69,"subCategoryName":70},"victimAddress","受害者","受害者IP地址，指遭受威胁攻击或风险影响的目标IP地址。格式要求：必须是符合IPv4或IPv6标准的IP地址格式，例如IPv4的点分十进制表示法（如192.168.22.35）或IPv6的冒号分隔十六进制表示法。",[66,83,67],[],{"id":2113,"fieldName":2113,"fieldType":61,"displayName":2114,"importance":74,"description":2115,"tag":-1,"dataSource":2116,"enumValues":2117,"categoryId":36,"subCategoryId":69,"subCategoryName":70},"subTechniqueName","ATT&CK子技术名称","该字段表示攻击行为在MITRE ATT&CK框架中对应的具体攻击子技术的官方名称。名称格式应符合MITRE ATT&CK官方定义，通常为英文短语，采用驼峰命名法或空格分隔的单词组合，例如“Spearphishing Attachment”。",[66,83,157,67],[],{"id":2119,"fieldName":2119,"fieldType":61,"displayName":2120,"importance":74,"description":2121,"tag":-1,"dataSource":2122,"enumValues":2123,"categoryId":36,"subCategoryId":69,"subCategoryName":70},"suggestion","处置建议","该字段用于提供针对威胁攻击的标准化响应和修复建议指导，其内容为字符串文本。建议内容应清晰、专业、具有可操作性，用于指导安全人员或系统进行后续处置。",[66,83,157,67],[],{"id":2125,"fieldName":2125,"fieldType":61,"displayName":2126,"importance":74,"description":2127,"tag":-1,"dataSource":2128,"enumValues":2129,"categoryId":36,"subCategoryId":69,"subCategoryName":70},"victimPort","受害者端口","受害者网络服务端口号，表示遭受威胁攻击或风险影响的受害者服务所使用的端口。格式为端口号，取值范围为0-65535，多个端口号使用英文逗号分隔。",[66,83,67],[],{"id":2131,"fieldName":2131,"fieldType":61,"displayName":2132,"importance":74,"description":2133,"tag":-1,"dataSource":2134,"enumValues":2135,"categoryId":36,"subCategoryId":69,"subCategoryName":70},"attackerPort","攻击者端口","攻击者发起攻击时使用的网络端口号。格式为字符串，表示端口号数值，取值范围为0-65535，多个端口号使用英文逗号分隔。",[66,83,67],[],{"id":2137,"fieldName":2137,"fieldType":123,"displayName":2138,"importance":74,"description":2139,"tag":-1,"dataSource":2140,"enumValues":2141,"categoryId":36,"subCategoryId":69,"subCategoryName":70},"dataSetSize","数据集大小","数据集大小，指SQL查询返回的结果数据集在内存或网络传输中的估算大小，通常以字节为单位。该字段值为长整型（long），表示一个非负整数。",[83],[],{"id":2143,"fieldName":2143,"fieldType":61,"displayName":2144,"importance":63,"description":2145,"tag":-1,"dataSource":2146,"enumValues":2147,"categoryId":36,"subCategoryId":69,"subCategoryName":70},"sql","SQL语句","SQL语句是提交给数据库执行的标准化查询语言，通常用于数据查询、插入、更新或删除操作。格式上，它必须是一个符合SQL语法规范的字符串，可以包含字母、数字、运算符、空格及特定的SQL关键字和符号。",[83],[],{"id":2149,"fieldName":2149,"fieldType":61,"displayName":2150,"importance":63,"description":2151,"tag":-1,"dataSource":2152,"enumValues":2153,"categoryId":36,"subCategoryId":69,"subCategoryName":70},"dbName","数据库名称","数据库管理系统(DBMS)中数据库实例的逻辑名称。字段类型为字符串，命名应清晰标识特定数据库实例。",[83],[],{"id":2155,"fieldName":2155,"fieldType":61,"displayName":2156,"importance":63,"description":2157,"tag":-1,"dataSource":2158,"enumValues":2159,"categoryId":36,"subCategoryId":69,"subCategoryName":70},"dbType","数据库类型","数据库管理系统(DBMS)的类型标识，用于指明所使用的具体数据库产品。常见取值包括但不限于：MYSQL, ORACLE, SQLSERVER, POSTGRESQL, MARIADB, DB2, MONGODB, REDIS等。",[83],[],{"id":2161,"fieldName":2161,"fieldType":61,"displayName":2162,"importance":74,"description":2163,"tag":-1,"dataSource":2164,"enumValues":2165,"categoryId":36,"subCategoryId":69,"subCategoryName":70},"relateUserName","关联用户名","该字段用于标识与主操作用户名存在关联关系的辅助用户名信息。",[83],[],{"id":2167,"fieldName":2167,"fieldType":61,"displayName":2168,"importance":74,"description":2169,"tag":-1,"dataSource":2170,"enumValues":2171,"categoryId":36,"subCategoryId":69,"subCategoryName":70},"relateAddress","关联IP","关联IP是与主操作用户存在关联关系的辅助IP地址信息，用于记录三层关联情况下的网络地址信息。例如在数据库审计中的站库分离场景中，此字段可用于关联用户登录Web服务器时的网络地址。该字段值必须为有效的IPv4或IPv6地址格式。",[83],[],{"id":2173,"fieldName":2173,"fieldType":61,"displayName":2174,"importance":74,"description":2175,"tag":-1,"dataSource":2176,"enumValues":2177,"categoryId":36,"subCategoryId":69,"subCategoryName":70},"relateInfo","关联信息","关联信息字段用于描述与主操作用户名存在关联关系的各类信息。其内容为由分号分隔的键值对列表，每个键值对使用冒号分隔。键通常为大写英文字母组成的标识符，值则为对应的具体信息。其中，若值为IP地址，应符合IPv4或IPv6格式；若值为URL，应符合通用URL格式规范；若值为端口，应在0-65535范围内。其他信息应使用明确的字符串表示。",[83],[],{"id":2179,"fieldName":2179,"fieldType":61,"displayName":2180,"importance":74,"description":2181,"tag":-1,"dataSource":2182,"enumValues":2183,"categoryId":36,"subCategoryId":69,"subCategoryName":70},"osUser","操作系统用户名","在操作系统层面进行身份验证或执行操作的用户标识。该字段为字符串类型，通常由字母、数字、下划线、点或连字符等字符组成。",[83],[],{"id":2185,"fieldName":2185,"fieldType":123,"displayName":2186,"importance":63,"description":2187,"tag":-1,"dataSource":2188,"enumValues":2189,"categoryId":36,"subCategoryId":69,"subCategoryName":70},"eventCount","事件数量","事件数量字段用于统计相同类型或相关事件的发生次数。通常为非负整数。",[66,83,157,67],[],{"id":2191,"fieldName":2191,"fieldType":61,"displayName":2192,"importance":74,"description":2193,"tag":-1,"dataSource":2194,"enumValues":2195,"categoryId":36,"subCategoryId":69,"subCategoryName":70},"destHostName","目标主机名","目标主机名（目标标识）指网络连接或安全事件中目标设备的网络标识，它可以是 DNS 主机名（含 FQDN）、NetBIOS 名称、本地主机名或 IP 地址；若访问时包含非标准端口，则通常应在标识后附加 :端口号（如 192.168.1.1:8080 或 host.example.com:8443）。",[66,83,67],[],{"id":2197,"fieldName":2197,"fieldType":61,"displayName":2198,"importance":74,"description":2199,"tag":-1,"dataSource":2200,"enumValues":2201,"categoryId":36,"subCategoryId":69,"subCategoryName":70},"hostAddress","主机IP","主机IP地址，用于标识主机在网络中的位置。必须符合IPv4或IPv6地址格式规范。IPv4地址为点分十进制格式，由四个0-255的十进制数组成，以点分隔。IPv6地址为冒号分隔的十六进制数格式。",[157],[],{"id":2203,"fieldName":2203,"fieldType":61,"displayName":2204,"importance":74,"description":2205,"tag":-1,"dataSource":2206,"enumValues":2207,"categoryId":36,"subCategoryId":69,"subCategoryName":70},"processName","进程名称","进程可执行文件的基本名称，不包含路径信息。",[157],[],{"id":2209,"fieldName":2209,"fieldType":61,"displayName":2210,"importance":74,"description":2211,"tag":-1,"dataSource":2212,"enumValues":2213,"categoryId":36,"subCategoryId":69,"subCategoryName":70},"targetFilename","目标文件","目标文件是指系统操作或文件操作中涉及的文件的完整路径。格式要求：必须是有效的文件路径字符串，路径分隔符为正斜杠（/）或反斜杠（\\）。示例值：/data1/uacp/shell/uacpClient.sh。",[157],[],{"id":2191,"fieldName":2191,"fieldType":61,"displayName":2192,"importance":63,"description":2193,"tag":-1,"dataSource":2215,"enumValues":2216,"categoryId":36,"subCategoryId":2217,"subCategoryName":2218},[66,83],[],"data_security_tampering","数据篡改",{"id":208,"fieldName":208,"fieldType":61,"displayName":209,"importance":63,"description":210,"tag":-1,"dataSource":2220,"enumValues":2221,"categoryId":36,"subCategoryId":2217,"subCategoryName":2218},[66,83],[],{"id":214,"fieldName":214,"fieldType":61,"displayName":215,"importance":63,"description":216,"tag":-1,"dataSource":2223,"enumValues":2224,"categoryId":36,"subCategoryId":2217,"subCategoryName":2218},[66,83],[],{"id":153,"fieldName":153,"fieldType":61,"displayName":154,"importance":63,"description":155,"tag":-1,"dataSource":2226,"enumValues":2227,"categoryId":36,"subCategoryId":2217,"subCategoryName":2218},[66],[],{"id":283,"fieldName":283,"fieldType":61,"displayName":284,"importance":63,"description":285,"tag":-1,"dataSource":-1,"enumValues":2229,"categoryId":36,"subCategoryId":2217,"subCategoryName":2218},[],{"id":2231,"fieldName":2231,"fieldType":61,"displayName":2232,"importance":74,"description":2233,"tag":-1,"dataSource":2234,"enumValues":2235,"categoryId":36,"subCategoryId":2217,"subCategoryName":2218},"payload","载荷内容","该字段表示攻击活动中传输的恶意载荷内容，例如注入的代码或恶意数据。",[66,83],[],{"id":360,"fieldName":360,"fieldType":61,"displayName":361,"importance":362,"description":363,"tag":-1,"dataSource":2237,"enumValues":2238,"categoryId":36,"subCategoryId":2217,"subCategoryName":2218},[66,83],[],{"id":367,"fieldName":367,"fieldType":61,"displayName":368,"importance":362,"description":369,"tag":-1,"dataSource":2240,"enumValues":2241,"categoryId":36,"subCategoryId":2217,"subCategoryName":2218},[66,83],[],{"id":373,"fieldName":373,"fieldType":61,"displayName":374,"importance":362,"description":375,"tag":-1,"dataSource":2243,"enumValues":2244,"categoryId":36,"subCategoryId":2217,"subCategoryName":2218},[66,83],[],{"id":379,"fieldName":379,"fieldType":61,"displayName":380,"importance":362,"description":381,"tag":-1,"dataSource":2246,"enumValues":2247,"categoryId":36,"subCategoryId":2217,"subCategoryName":2218},[66,83],[],{"id":385,"fieldName":385,"fieldType":233,"displayName":386,"importance":362,"description":387,"tag":-1,"dataSource":2249,"enumValues":2250,"categoryId":36,"subCategoryId":2217,"subCategoryName":2218},[66,83],[2251,2252,2253,2254,2255,2256,2257,2258,2259,2260,2261,2262,2263,2264,2265,2266,2267,2268,2269,2270,2271,2272,2273,2274,2275,2276,2277,2278,2279,2280,2281,2282,2283,2284,2285,2286,2287,2288,2289,2290,2291,2292,2293,2294,2295,2296,2297,2298,2299,2300,2301,2302,2303,2304,2305],{"value":391,"title":392,"description":393},{"value":395,"title":396,"description":397},{"value":399,"title":400,"description":401},{"value":403,"title":404,"description":405},{"value":407,"title":408,"description":409},{"value":411,"title":412,"description":413},{"value":415,"title":416,"description":417},{"value":419,"title":420,"description":421},{"value":423,"title":424,"description":425},{"value":427,"title":428,"description":429},{"value":431,"title":432,"description":433},{"value":435,"title":436,"description":437},{"value":439,"title":440,"description":441},{"value":443,"title":444,"description":445},{"value":447,"title":448,"description":449},{"value":451,"title":452,"description":453},{"value":455,"title":456,"description":457},{"value":459,"title":460,"description":461},{"value":463,"title":464,"description":465},{"value":467,"title":468,"description":469},{"value":471,"title":472,"description":473},{"value":475,"title":476,"description":477},{"value":479,"title":83,"description":480},{"value":482,"title":483,"description":484},{"value":486,"title":487,"description":488},{"value":490,"title":491,"description":492},{"value":494,"title":495,"description":496},{"value":498,"title":499,"description":500},{"value":502,"title":503,"description":504},{"value":506,"title":507,"description":508},{"value":510,"title":511,"description":512},{"value":514,"title":515,"description":516},{"value":518,"title":519,"description":520},{"value":522,"title":523,"description":524},{"value":526,"title":527,"description":528},{"value":530,"title":531,"description":532},{"value":534,"title":535,"description":536},{"value":538,"title":539,"description":540},{"value":542,"title":543,"description":544},{"value":546,"title":547,"description":548},{"value":550,"title":551,"description":552},{"value":554,"title":555,"description":556},{"value":558,"title":559,"description":560},{"value":562,"title":563,"description":564},{"value":566,"title":567,"description":568},{"value":570,"title":280,"description":571},{"value":573,"title":574,"description":575},{"value":577,"title":578,"description":579},{"value":581,"title":582,"description":583},{"value":585,"title":586,"description":587},{"value":589,"title":590,"description":591},{"value":593,"title":66,"description":594},{"value":596,"title":597,"description":598},{"value":600,"title":601,"description":602},{"value":604,"title":605,"description":606},{"id":608,"fieldName":608,"fieldType":61,"displayName":609,"importance":362,"description":610,"tag":-1,"dataSource":2307,"enumValues":2308,"categoryId":36,"subCategoryId":2217,"subCategoryName":2218},[66,83],[],{"id":614,"fieldName":614,"fieldType":61,"displayName":615,"importance":362,"description":616,"tag":-1,"dataSource":2310,"enumValues":2311,"categoryId":36,"subCategoryId":2217,"subCategoryName":2218},[66,83],[],{"id":620,"fieldName":620,"fieldType":61,"displayName":621,"importance":362,"description":622,"tag":-1,"dataSource":2313,"enumValues":2314,"categoryId":36,"subCategoryId":2217,"subCategoryName":2218},[66,83],[],{"id":626,"fieldName":626,"fieldType":61,"displayName":627,"importance":74,"description":628,"tag":-1,"dataSource":2316,"enumValues":2317,"categoryId":36,"subCategoryId":2217,"subCategoryName":2218},[66,83],[],{"id":632,"fieldName":632,"fieldType":61,"displayName":633,"importance":362,"description":634,"tag":-1,"dataSource":2319,"enumValues":2320,"categoryId":36,"subCategoryId":2217,"subCategoryName":2218},[66,83],[],{"id":638,"fieldName":638,"fieldType":61,"displayName":639,"importance":362,"description":640,"tag":-1,"dataSource":2322,"enumValues":2323,"categoryId":36,"subCategoryId":2217,"subCategoryName":2218},[66,83],[],{"id":644,"fieldName":644,"fieldType":61,"displayName":645,"importance":74,"description":646,"tag":-1,"dataSource":2325,"enumValues":2326,"categoryId":36,"subCategoryId":2217,"subCategoryName":2218},[66,83],[],{"id":650,"fieldName":650,"fieldType":61,"displayName":651,"importance":362,"description":652,"tag":-1,"dataSource":2328,"enumValues":2329,"categoryId":36,"subCategoryId":2217,"subCategoryName":2218},[66,83],[],{"id":656,"fieldName":656,"fieldType":657,"displayName":658,"importance":362,"description":659,"tag":-1,"dataSource":2331,"enumValues":2332,"categoryId":36,"subCategoryId":2217,"subCategoryName":2218},[66,83],[],{"id":663,"fieldName":663,"fieldType":233,"displayName":664,"importance":362,"description":665,"tag":-1,"dataSource":2334,"enumValues":2335,"categoryId":36,"subCategoryId":2217,"subCategoryName":2218},[66,83],[2336,2337,2338],{"value":669,"title":670,"description":671},{"value":673,"title":674,"description":675},{"value":677,"title":678,"description":679},{"id":681,"fieldName":681,"fieldType":233,"displayName":682,"importance":362,"description":683,"tag":-1,"dataSource":2340,"enumValues":2341,"categoryId":36,"subCategoryId":2217,"subCategoryName":2218},[66,83],[2342,2343,2344,2345,2346,2347,2348,2349,2350,2351,2352,2353,2354,2355,2356,2357,2358,2359,2360,2361,2362,2363],{"value":11,"title":687,"description":688},{"value":690,"title":691,"description":692},{"value":694,"title":695,"description":696},{"value":698,"title":699,"description":700},{"value":702,"title":703,"description":704},{"value":706,"title":707,"description":708},{"value":710,"title":711,"description":712},{"value":714,"title":715,"description":716},{"value":718,"title":719,"description":720},{"value":722,"title":723,"description":724},{"value":726,"title":727,"description":728},{"value":730,"title":731,"description":732},{"value":734,"title":735,"description":736},{"value":738,"title":739,"description":740},{"value":742,"title":743,"description":744},{"value":746,"title":747,"description":748},{"value":750,"title":751,"description":752},{"value":754,"title":755,"description":756},{"value":758,"title":759,"description":760},{"value":762,"title":763,"description":764},{"value":766,"title":767,"description":768},{"value":770,"title":771,"description":772},{"id":774,"fieldName":774,"fieldType":233,"displayName":775,"importance":63,"description":776,"tag":-1,"dataSource":2365,"enumValues":2366,"categoryId":36,"subCategoryId":2217,"subCategoryName":2218},[66,83],[2367,2368,2369,2370,2371,2372,2373,2374,2375,2376,2377,2378,2379,2380,2381,2382,2383,2384,2385,2386,2387,2388,2389,2390,2391,2392,2393,2394,2395],{"value":780,"title":781,"description":782},{"value":784,"title":785,"description":786},{"value":788,"title":789,"description":790},{"value":792,"title":793,"description":794},{"value":796,"title":797,"description":798},{"value":800,"title":801,"description":802},{"value":804,"title":805,"description":806},{"value":808,"title":809,"description":810},{"value":812,"title":813,"description":814},{"value":816,"title":817,"description":818},{"value":820,"title":821,"description":822},{"value":824,"title":825,"description":826},{"value":828,"title":829,"description":830},{"value":832,"title":833,"description":834},{"value":836,"title":837,"description":838},{"value":840,"title":841,"description":842},{"value":770,"title":844,"description":845},{"value":847,"title":848,"description":849},{"value":851,"title":852,"description":853},{"value":855,"title":856,"description":857},{"value":859,"title":860,"description":861},{"value":863,"title":864,"description":865},{"value":867,"title":868,"description":869},{"value":871,"title":872,"description":873},{"value":875,"title":876,"description":877},{"value":879,"title":880,"description":881},{"value":883,"title":884,"description":885},{"value":887,"title":888,"description":889},{"value":891,"title":892,"description":893},{"id":220,"fieldName":220,"fieldType":61,"displayName":221,"importance":74,"description":222,"tag":-1,"dataSource":2397,"enumValues":2398,"categoryId":36,"subCategoryId":2217,"subCategoryName":2218},[66],[],{"id":895,"fieldName":895,"fieldType":657,"displayName":896,"importance":74,"description":897,"tag":-1,"dataSource":2400,"enumValues":2401,"categoryId":36,"subCategoryId":2217,"subCategoryName":2218},[66,83],[],{"id":901,"fieldName":901,"fieldType":657,"displayName":902,"importance":74,"description":903,"tag":-1,"dataSource":2403,"enumValues":2404,"categoryId":36,"subCategoryId":2217,"subCategoryName":2218},[66,83],[],{"id":907,"fieldName":907,"fieldType":61,"displayName":908,"importance":74,"description":909,"tag":-1,"dataSource":2406,"enumValues":2407,"categoryId":36,"subCategoryId":2217,"subCategoryName":2218},[66,83],[],{"id":913,"fieldName":913,"fieldType":61,"displayName":914,"importance":74,"description":915,"tag":-1,"dataSource":2409,"enumValues":2410,"categoryId":36,"subCategoryId":2217,"subCategoryName":2218},[66,83],[],{"id":919,"fieldName":919,"fieldType":61,"displayName":920,"importance":74,"description":921,"tag":-1,"dataSource":2412,"enumValues":2413,"categoryId":36,"subCategoryId":2217,"subCategoryName":2218},[66,83],[],{"id":925,"fieldName":925,"fieldType":61,"displayName":926,"importance":74,"description":927,"tag":-1,"dataSource":2415,"enumValues":2416,"categoryId":36,"subCategoryId":2217,"subCategoryName":2218},[66,83],[],{"id":931,"fieldName":931,"fieldType":61,"displayName":932,"importance":74,"description":933,"tag":-1,"dataSource":2418,"enumValues":2419,"categoryId":36,"subCategoryId":2217,"subCategoryName":2218},[66,83],[],{"id":937,"fieldName":937,"fieldType":61,"displayName":938,"importance":74,"description":939,"tag":-1,"dataSource":2421,"enumValues":2422,"categoryId":36,"subCategoryId":2217,"subCategoryName":2218},[66,83],[],{"id":943,"fieldName":943,"fieldType":61,"displayName":944,"importance":74,"description":945,"tag":-1,"dataSource":2424,"enumValues":2425,"categoryId":36,"subCategoryId":2217,"subCategoryName":2218},[66,83],[],{"id":949,"fieldName":949,"fieldType":61,"displayName":950,"importance":74,"description":951,"tag":-1,"dataSource":2427,"enumValues":2428,"categoryId":36,"subCategoryId":2217,"subCategoryName":2218},[66,83],[],{"id":955,"fieldName":955,"fieldType":61,"displayName":956,"importance":74,"description":957,"tag":-1,"dataSource":2430,"enumValues":2431,"categoryId":36,"subCategoryId":2217,"subCategoryName":2218},[66,83],[],{"id":961,"fieldName":961,"fieldType":61,"displayName":962,"importance":74,"description":963,"tag":-1,"dataSource":2433,"enumValues":2434,"categoryId":36,"subCategoryId":2217,"subCategoryName":2218},[66,83],[],{"id":967,"fieldName":967,"fieldType":61,"displayName":968,"importance":74,"description":969,"tag":-1,"dataSource":2436,"enumValues":2437,"categoryId":36,"subCategoryId":2217,"subCategoryName":2218},[66,83],[],{"id":973,"fieldName":973,"fieldType":61,"displayName":974,"importance":74,"description":975,"tag":-1,"dataSource":2439,"enumValues":2440,"categoryId":36,"subCategoryId":2217,"subCategoryName":2218},[66,83],[],{"id":979,"fieldName":979,"fieldType":61,"displayName":980,"importance":74,"description":981,"tag":-1,"dataSource":2442,"enumValues":2443,"categoryId":36,"subCategoryId":2217,"subCategoryName":2218},[66,83],[],{"id":985,"fieldName":985,"fieldType":61,"displayName":986,"importance":74,"description":987,"tag":-1,"dataSource":2445,"enumValues":2446,"categoryId":36,"subCategoryId":2217,"subCategoryName":2218},[66,83],[],{"id":991,"fieldName":991,"fieldType":61,"displayName":992,"importance":63,"description":993,"tag":-1,"dataSource":2448,"enumValues":2449,"categoryId":36,"subCategoryId":2217,"subCategoryName":2218},[66,83],[],{"id":997,"fieldName":997,"fieldType":233,"displayName":998,"importance":74,"description":999,"tag":-1,"dataSource":2451,"enumValues":2452,"categoryId":36,"subCategoryId":2217,"subCategoryName":2218},[66,83],[2453,2454],{"value":1003,"title":1004,"description":1005},{"value":1007,"title":1008,"description":1009},{"id":1011,"fieldName":1011,"fieldType":233,"displayName":1012,"importance":74,"description":1013,"tag":-1,"dataSource":2456,"enumValues":2457,"categoryId":36,"subCategoryId":2217,"subCategoryName":2218},[66,83],[2458,2459,2460,2461,2462,2463,2464,2465,2466,2467,2468,2469,2470,2471,2472,2473,2474,2475,2476,2477,2478,2479,2480,2481,2482,2483,2484,2485,2486,2487,2488,2489,2490,2491,2492,2493,2494,2495,2496,2497,2498,2499,2500,2501,2502,2503,2504,2505,2506,2507,2508,2509,2510,2511,2512,2513,2514,2515,2516,2517,2518,2519,2520,2521],{"value":1017,"title":1017,"description":1017},{"value":1019,"title":1019,"description":1019},{"value":1021,"title":1021,"description":1021},{"value":1023,"title":1023,"description":1023},{"value":1025,"title":1025,"description":1025},{"value":1027,"title":1027,"description":1027},{"value":1029,"title":1029,"description":1029},{"value":1031,"title":1031,"description":1031},{"value":1033,"title":1033,"description":1033},{"value":1035,"title":1035,"description":1035},{"value":1037,"title":1037,"description":1037},{"value":1039,"title":1039,"description":1039},{"value":1041,"title":1041,"description":1041},{"value":1043,"title":1043,"description":1043},{"value":1045,"title":1045,"description":1045},{"value":1047,"title":1047,"description":1047},{"value":1049,"title":1049,"description":1049},{"value":1051,"title":1051,"description":1051},{"value":1053,"title":1053,"description":1053},{"value":1055,"title":1055,"description":1055},{"value":1057,"title":1057,"description":1057},{"value":1059,"title":1059,"description":1059},{"value":1061,"title":1061,"description":1061},{"value":1063,"title":1063,"description":1063},{"value":1065,"title":1065,"description":1065},{"value":1067,"title":1067,"description":1067},{"value":1069,"title":1069,"description":1069},{"value":1071,"title":1071,"description":1071},{"value":1073,"title":1073,"description":1073},{"value":1075,"title":1075,"description":1075},{"value":1077,"title":1077,"description":1077},{"value":1079,"title":1079,"description":1079},{"value":1081,"title":1081,"description":1081},{"value":1083,"title":1083,"description":1083},{"value":1085,"title":1085,"description":1085},{"value":1087,"title":1087,"description":1087},{"value":1089,"title":1089,"description":1089},{"value":1091,"title":1091,"description":1091},{"value":1093,"title":1093,"description":1093},{"value":1095,"title":1095,"description":1095},{"value":1097,"title":1097,"description":1097},{"value":1099,"title":1099,"description":1099},{"value":1101,"title":1101,"description":1101},{"value":1103,"title":1103,"description":1103},{"value":1105,"title":1105,"description":1105},{"value":1107,"title":1107,"description":1107},{"value":1109,"title":1109,"description":1109},{"value":1111,"title":1111,"description":1111},{"value":1113,"title":1113,"description":1113},{"value":1115,"title":1115,"description":1115},{"value":1117,"title":1117,"description":1117},{"value":1119,"title":1119,"description":1119},{"value":1121,"title":1121,"description":1121},{"value":1123,"title":1123,"description":1123},{"value":1125,"title":1125,"description":1125},{"value":1127,"title":1127,"description":1127},{"value":1129,"title":1129,"description":1129},{"value":1131,"title":1131,"description":1131},{"value":1133,"title":1133,"description":1133},{"value":1135,"title":1135,"description":1135},{"value":1137,"title":1137,"description":1137},{"value":1139,"title":1139,"description":1139},{"value":1141,"title":1141,"description":1141},{"value":1143,"title":1143,"description":1143},{"id":1145,"fieldName":1145,"fieldType":61,"displayName":1146,"importance":74,"description":1147,"tag":-1,"dataSource":2523,"enumValues":2524,"categoryId":36,"subCategoryId":2217,"subCategoryName":2218},[66,83],[],{"id":1151,"fieldName":1151,"fieldType":233,"displayName":1152,"importance":63,"description":1153,"tag":-1,"dataSource":2526,"enumValues":2527,"categoryId":36,"subCategoryId":2217,"subCategoryName":2218},[66,83],[2528,2529,2530,2531],{"value":431,"title":1157,"description":1158},{"value":427,"title":1160,"description":1161},{"value":1163,"title":1164,"description":1165},{"value":1167,"title":1168,"description":1169},{"id":1171,"fieldName":1171,"fieldType":61,"displayName":1172,"importance":74,"description":1173,"tag":-1,"dataSource":2533,"enumValues":2534,"categoryId":36,"subCategoryId":2217,"subCategoryName":2218},[66,83],[],{"id":1177,"fieldName":1177,"fieldType":61,"displayName":1178,"importance":63,"description":1179,"tag":-1,"dataSource":2536,"enumValues":2537,"categoryId":36,"subCategoryId":2217,"subCategoryName":2218},[66,83],[],{"id":1183,"fieldName":1183,"fieldType":61,"displayName":1184,"importance":63,"description":1185,"tag":-1,"dataSource":2539,"enumValues":2540,"categoryId":36,"subCategoryId":2217,"subCategoryName":2218},[66,83],[],{"id":1189,"fieldName":1189,"fieldType":61,"displayName":1190,"importance":74,"description":1191,"tag":-1,"dataSource":2542,"enumValues":2543,"categoryId":36,"subCategoryId":2217,"subCategoryName":2218},[66,83],[],{"id":1195,"fieldName":1195,"fieldType":61,"displayName":1196,"importance":74,"description":1197,"tag":-1,"dataSource":2545,"enumValues":2546,"categoryId":36,"subCategoryId":2217,"subCategoryName":2218},[66,83],[],{"id":1201,"fieldName":1201,"fieldType":61,"displayName":1202,"importance":74,"description":1203,"tag":-1,"dataSource":2548,"enumValues":2549,"categoryId":36,"subCategoryId":2217,"subCategoryName":2218},[66,83],[],{"id":1207,"fieldName":1207,"fieldType":61,"displayName":1208,"importance":74,"description":1209,"tag":-1,"dataSource":2551,"enumValues":2552,"categoryId":36,"subCategoryId":2217,"subCategoryName":2218},[66,83],[],{"id":1213,"fieldName":1213,"fieldType":61,"displayName":1214,"importance":74,"description":1215,"tag":-1,"dataSource":2554,"enumValues":2555,"categoryId":36,"subCategoryId":2217,"subCategoryName":2218},[66,83],[],{"id":1219,"fieldName":1219,"fieldType":233,"displayName":1220,"importance":74,"description":1221,"tag":-1,"dataSource":2557,"enumValues":2558,"categoryId":36,"subCategoryId":2217,"subCategoryName":2218},[66,83],[2559,2560,2561,2562,2563,2564,2565,2566],{"value":1225,"title":1226,"description":1227},{"value":1229,"title":1230,"description":1231},{"value":1233,"title":1234,"description":1235},{"value":1237,"title":1238,"description":1239},{"value":1241,"title":1242,"description":1243},{"value":1245,"title":1246,"description":1247},{"value":1249,"title":1250,"description":1251},{"value":1253,"title":1254,"description":1255},{"id":1257,"fieldName":1257,"fieldType":233,"displayName":1258,"importance":74,"description":1259,"tag":-1,"dataSource":2568,"enumValues":2569,"categoryId":36,"subCategoryId":2217,"subCategoryName":2218},[66,83],[2570,2571,2572],{"value":1263,"title":1264,"description":1265},{"value":1267,"title":1268,"description":1269},{"value":1271,"title":1272,"description":1273},{"id":1275,"fieldName":1275,"fieldType":61,"displayName":1276,"importance":74,"description":1277,"tag":-1,"dataSource":2574,"enumValues":2575,"categoryId":36,"subCategoryId":2217,"subCategoryName":2218},[66,83],[],{"id":1281,"fieldName":1281,"fieldType":233,"displayName":1282,"importance":362,"description":1283,"tag":-1,"dataSource":2577,"enumValues":2578,"categoryId":36,"subCategoryId":2217,"subCategoryName":2218},[66,83],[2579,2580,2581,2582,2583,2584,2585,2586,2587,2588,2589,2590,2591,2592,2593,2594,2595,2596,2597,2598,2599,2600,2601,2602,2603,2604,2605,2606,2607,2608,2609,2610,2611,2612,2613,2614,2615,2616,2617,2618,2619,2620,2621,2622,2623,2624,2625,2626,2627,2628,2629,2630,2631,2632,2633,2634,2635,2636,2637,2638,2639,2640,2641,2642,2643,2644,2645,2646,2647,2648,2649,2650,2651,2652,2653,2654,2655,2656,2657,2658,2659,2660,2661,2662,2663,2664,2665,2666,2667,2668,2669,2670,2671,2672,2673,2674,2675,2676,2677,2678,2679,2680,2681,2682,2683,2684,2685,2686,2687,2688,2689,2690,2691,2692,2693,2694,2695,2696,2697,2698,2699,2700,2701,2702,2703,2704,2705,2706,2707,2708,2709,2710,2711,2712,2713,2714,2715,2716,2717,2718,2719,2720,2721,2722,2723,2724,2725,2726,2727,2728,2729,2730,2731,2732,2733,2734,2735,2736,2737,2738,2739,2740,2741,2742,2743,2744,2745,2746,2747,2748,2749,2750,2751,2752,2753,2754,2755,2756,2757,2758,2759,2760,2761,2762,2763,2764,2765,2766,2767,2768,2769,2770,2771,2772,2773,2774,2775,2776,2777,2778,2779,2780],{"value":1287,"title":1288,"description":1289},{"value":1291,"title":1292,"description":1293},{"value":1295,"title":1296,"description":1297},{"value":1299,"title":1300,"description":1301},{"value":1303,"title":1304,"description":1305},{"value":1307,"title":1308,"description":1309},{"value":1311,"title":1312,"description":1313},{"value":1315,"title":1316,"description":1317},{"value":1319,"title":1320,"description":1321},{"value":1323,"title":1324,"description":1325},{"value":1327,"title":1328,"description":1329},{"value":1331,"title":1332,"description":1333},{"value":1335,"title":1336,"description":1337},{"value":1339,"title":1340,"description":1341},{"value":1343,"title":1344,"description":1345},{"value":1347,"title":1348,"description":1349},{"value":1351,"title":1352,"description":1353},{"value":1355,"title":1356,"description":1357},{"value":1359,"title":1360,"description":1361},{"value":1363,"title":1364,"description":1365},{"value":1367,"title":1368,"description":1369},{"value":1371,"title":1372,"description":1373},{"value":1375,"title":1376,"description":1377},{"value":1379,"title":1380,"description":1381},{"value":1383,"title":1384,"description":1385},{"value":1387,"title":1388,"description":1389},{"value":1391,"title":1392,"description":1393},{"value":1395,"title":1396,"description":1397},{"value":1399,"title":1400,"description":1401},{"value":1403,"title":1404,"description":1405},{"value":1407,"title":1408,"description":1409},{"value":1411,"title":1412,"description":1413},{"value":1415,"title":1416,"description":1417},{"value":1419,"title":1420,"description":1421},{"value":1423,"title":1424,"description":1425},{"value":1427,"title":1428,"description":1429},{"value":1431,"title":1432,"description":1433},{"value":1435,"title":1436,"description":1437},{"value":1439,"title":1440,"description":1441},{"value":1443,"title":1444,"description":1445},{"value":1447,"title":1448,"description":1449},{"value":1451,"title":1452,"description":1453},{"value":1455,"title":1456,"description":1457},{"value":1459,"title":1460,"description":1461},{"value":1463,"title":1464,"description":1465},{"value":1467,"title":1468,"description":1469},{"value":1471,"title":1472,"description":1473},{"value":1475,"title":1476,"description":1477},{"value":1479,"title":1480,"description":1481},{"value":1483,"title":1484,"description":1485},{"value":1487,"title":1488,"description":1489},{"value":1491,"title":1492,"description":1493},{"value":1495,"title":1496,"description":1497},{"value":1499,"title":1500,"description":1501},{"value":1503,"title":1504,"description":1505},{"value":1507,"title":1508,"description":1509},{"value":1511,"title":1512,"description":1513},{"value":1515,"title":1516,"description":1517},{"value":1519,"title":1520,"description":1521},{"value":1523,"title":1524,"description":1525},{"value":1527,"title":1528,"description":1529},{"value":1531,"title":1532,"description":1533},{"value":1535,"title":1536,"description":1537},{"value":1539,"title":1540,"description":1541},{"value":1543,"title":1544,"description":1545},{"value":1547,"title":1548,"description":1549},{"value":1551,"title":1552,"description":1553},{"value":1555,"title":1556,"description":1557},{"value":1559,"title":1560,"description":1561},{"value":1563,"title":1564,"description":1565},{"value":1567,"title":1568,"description":1569},{"value":1571,"title":1572,"description":1573},{"value":1575,"title":1576,"description":1577},{"value":1579,"title":1580,"description":1581},{"value":1583,"title":1584,"description":1585},{"value":1587,"title":1588,"description":1589},{"value":1591,"title":1592,"description":1593},{"value":1595,"title":1596,"description":1597},{"value":1599,"title":1600,"description":1601},{"value":1603,"title":1604,"description":1605},{"value":1607,"title":1608,"description":1609},{"value":1611,"title":1612,"description":1613},{"value":1615,"title":1616,"description":1617},{"value":1619,"title":1620,"description":1621},{"value":1623,"title":1624,"description":1625},{"value":1627,"title":1628,"description":1629},{"value":1631,"title":1632,"description":1633},{"value":1635,"title":1636,"description":1637},{"value":1639,"title":1640,"description":1641},{"value":1643,"title":1644,"description":1645},{"value":1647,"title":1648,"description":1649},{"value":1651,"title":1652,"description":1653},{"value":1655,"title":1656,"description":1657},{"value":1659,"title":1660,"description":1661},{"value":1663,"title":1664,"description":1665},{"value":1667,"title":1668,"description":1669},{"value":1671,"title":1672,"description":1673},{"value":1675,"title":1676,"description":1677},{"value":1679,"title":1680,"description":1681},{"value":1683,"title":1684,"description":1685},{"value":1687,"title":1688,"description":1689},{"value":1691,"title":1692,"description":1693},{"value":1695,"title":1696,"description":1697},{"value":1699,"title":1700,"description":1701},{"value":1703,"title":1704,"description":1705},{"value":1707,"title":1708,"description":1709},{"value":1711,"title":1712,"description":1713},{"value":1715,"title":1716,"description":1717},{"value":1719,"title":1720,"description":1721},{"value":1723,"title":1724,"description":1725},{"value":1727,"title":1728,"description":1729},{"value":1731,"title":1732,"description":1733},{"value":1735,"title":1736,"description":1737},{"value":1739,"title":1740,"description":1741},{"value":1743,"title":1744,"description":1745},{"value":1747,"title":1748,"description":1749},{"value":1751,"title":1752,"description":1753},{"value":1755,"title":1756,"description":1757},{"value":1759,"title":1760,"description":1761},{"value":1763,"title":1764,"description":1765},{"value":1767,"title":1768,"description":1769},{"value":1771,"title":1772,"description":1773},{"value":1775,"title":1776,"description":1777},{"value":1779,"title":1780,"description":1781},{"value":1783,"title":1784,"description":1785},{"value":1787,"title":1788,"description":1789},{"value":1791,"title":1792,"description":1793},{"value":1795,"title":1796,"description":1797},{"value":1799,"title":1800,"description":1801},{"value":1803,"title":1804,"description":1805},{"value":1807,"title":1808,"description":1809},{"value":1811,"title":1812,"description":1813},{"value":1815,"title":1816,"description":1817},{"value":1819,"title":1820,"description":1821},{"value":1823,"title":1824,"description":1825},{"value":1827,"title":1828,"description":1829},{"value":1831,"title":1832,"description":1833},{"value":1835,"title":1836,"description":1837},{"value":1839,"title":1840,"description":1841},{"value":1843,"title":1844,"description":1845},{"value":1847,"title":1848,"description":1849},{"value":1851,"title":1852,"description":1853},{"value":1855,"title":1856,"description":1857},{"value":1859,"title":1860,"description":1861},{"value":1863,"title":1864,"description":1865},{"value":1867,"title":1868,"description":1869},{"value":1871,"title":1872,"description":1873},{"value":1875,"title":1876,"description":1877},{"value":1879,"title":1880,"description":1881},{"value":1883,"title":1884,"description":1885},{"value":1887,"title":1888,"description":1889},{"value":1891,"title":1892,"description":1893},{"value":1895,"title":1896,"description":1897},{"value":1899,"title":1900,"description":1901},{"value":1903,"title":1904,"description":1905},{"value":1907,"title":1908,"description":1909},{"value":1911,"title":1912,"description":1913},{"value":1915,"title":1916,"description":1917},{"value":1919,"title":1920,"description":1921},{"value":1923,"title":1924,"description":1925},{"value":1927,"title":1928,"description":1929},{"value":1931,"title":1932,"description":1933},{"value":1935,"title":1936,"description":1937},{"value":1939,"title":1940,"description":1941},{"value":1943,"title":1944,"description":1945},{"value":1947,"title":1948,"description":1949},{"value":1951,"title":1952,"description":1953},{"value":1955,"title":1956,"description":1957},{"value":1959,"title":1960,"description":1961},{"value":1963,"title":1964,"description":1965},{"value":1967,"title":1968,"description":1969},{"value":1971,"title":1972,"description":1973},{"value":1975,"title":1976,"description":1977},{"value":1979,"title":1980,"description":1981},{"value":1983,"title":1984,"description":1985},{"value":1987,"title":1988,"description":1989},{"value":1991,"title":1992,"description":1993},{"value":1995,"title":1996,"description":1997},{"value":1999,"title":2000,"description":2001},{"value":2003,"title":2004,"description":2005},{"value":2007,"title":2008,"description":2009},{"value":2011,"title":2012,"description":2013},{"value":2015,"title":2016,"description":2017},{"value":2019,"title":2020,"description":2021},{"value":2023,"title":2024,"description":2025},{"value":2027,"title":2028,"description":2029},{"value":2031,"title":2032,"description":2033},{"value":2035,"title":2036,"description":2037},{"value":2039,"title":2040,"description":2041},{"value":2043,"title":2044,"description":2045},{"value":2047,"title":2048,"description":2049},{"value":2051,"title":2052,"description":2053},{"value":2055,"title":2056,"description":2057},{"value":2059,"title":2060,"description":2061},{"value":2063,"title":2064,"description":2065},{"value":2067,"title":2068,"description":2069},{"value":2071,"title":2072,"description":2073},{"value":2075,"title":2076,"description":2077},{"value":2079,"title":2080,"description":2081},{"value":2083,"title":2084,"description":2085},{"value":2087,"title":2088,"description":2089},{"value":2091,"title":2092,"description":2093},{"id":2095,"fieldName":2095,"fieldType":61,"displayName":2096,"importance":74,"description":2097,"tag":-1,"dataSource":2782,"enumValues":2783,"categoryId":36,"subCategoryId":2217,"subCategoryName":2218},[66,83],[],{"id":2101,"fieldName":2101,"fieldType":61,"displayName":2102,"importance":74,"description":2103,"tag":-1,"dataSource":2785,"enumValues":2786,"categoryId":36,"subCategoryId":2217,"subCategoryName":2218},[66,83],[],{"id":2107,"fieldName":2107,"fieldType":61,"displayName":2108,"importance":74,"description":2109,"tag":-1,"dataSource":2788,"enumValues":2789,"categoryId":36,"subCategoryId":2217,"subCategoryName":2218},[66,83],[],{"id":2113,"fieldName":2113,"fieldType":61,"displayName":2114,"importance":74,"description":2115,"tag":-1,"dataSource":2791,"enumValues":2792,"categoryId":36,"subCategoryId":2217,"subCategoryName":2218},[66,83],[],{"id":2119,"fieldName":2119,"fieldType":61,"displayName":2120,"importance":74,"description":2121,"tag":-1,"dataSource":2794,"enumValues":2795,"categoryId":36,"subCategoryId":2217,"subCategoryName":2218},[66,83],[],{"id":2125,"fieldName":2125,"fieldType":61,"displayName":2126,"importance":74,"description":2127,"tag":-1,"dataSource":2797,"enumValues":2798,"categoryId":36,"subCategoryId":2217,"subCategoryName":2218},[66,83],[],{"id":2131,"fieldName":2131,"fieldType":61,"displayName":2132,"importance":74,"description":2133,"tag":-1,"dataSource":2800,"enumValues":2801,"categoryId":36,"subCategoryId":2217,"subCategoryName":2218},[66,83],[],{"id":2137,"fieldName":2137,"fieldType":123,"displayName":2138,"importance":74,"description":2139,"tag":-1,"dataSource":2803,"enumValues":2804,"categoryId":36,"subCategoryId":2217,"subCategoryName":2218},[83],[],{"id":2143,"fieldName":2143,"fieldType":61,"displayName":2144,"importance":63,"description":2145,"tag":-1,"dataSource":2806,"enumValues":2807,"categoryId":36,"subCategoryId":2217,"subCategoryName":2218},[83],[],{"id":2149,"fieldName":2149,"fieldType":61,"displayName":2150,"importance":63,"description":2151,"tag":-1,"dataSource":2809,"enumValues":2810,"categoryId":36,"subCategoryId":2217,"subCategoryName":2218},[83],[],{"id":2155,"fieldName":2155,"fieldType":61,"displayName":2156,"importance":63,"description":2157,"tag":-1,"dataSource":2812,"enumValues":2813,"categoryId":36,"subCategoryId":2217,"subCategoryName":2218},[83],[],{"id":141,"fieldName":141,"fieldType":61,"displayName":142,"importance":63,"description":143,"tag":-1,"dataSource":2815,"enumValues":2816,"categoryId":36,"subCategoryId":2217,"subCategoryName":2218},[66],[],{"id":2161,"fieldName":2161,"fieldType":61,"displayName":2162,"importance":74,"description":2163,"tag":-1,"dataSource":2818,"enumValues":2819,"categoryId":36,"subCategoryId":2217,"subCategoryName":2218},[83],[],{"id":2167,"fieldName":2167,"fieldType":61,"displayName":2168,"importance":74,"description":2169,"tag":-1,"dataSource":2821,"enumValues":2822,"categoryId":36,"subCategoryId":2217,"subCategoryName":2218},[83],[],{"id":2173,"fieldName":2173,"fieldType":61,"displayName":2174,"importance":74,"description":2175,"tag":-1,"dataSource":2824,"enumValues":2825,"categoryId":36,"subCategoryId":2217,"subCategoryName":2218},[83],[],{"id":190,"fieldName":190,"fieldType":61,"displayName":191,"importance":74,"description":192,"tag":-1,"dataSource":2827,"enumValues":2828,"categoryId":36,"subCategoryId":2217,"subCategoryName":2218},[83],[],{"id":226,"fieldName":226,"fieldType":61,"displayName":227,"importance":74,"description":228,"tag":-1,"dataSource":2830,"enumValues":2831,"categoryId":36,"subCategoryId":2217,"subCategoryName":2218},[83],[],{"id":2179,"fieldName":2179,"fieldType":61,"displayName":2180,"importance":74,"description":2181,"tag":-1,"dataSource":2833,"enumValues":2834,"categoryId":36,"subCategoryId":2217,"subCategoryName":2218},[83],[],{"id":79,"fieldName":79,"fieldType":61,"displayName":80,"importance":74,"description":81,"tag":-1,"dataSource":2836,"enumValues":2837,"categoryId":36,"subCategoryId":2217,"subCategoryName":2218},[66,83],[],{"id":98,"fieldName":98,"fieldType":61,"displayName":99,"importance":63,"description":100,"tag":-1,"dataSource":2839,"enumValues":2840,"categoryId":36,"subCategoryId":2217,"subCategoryName":2218},[66],[],{"id":135,"fieldName":135,"fieldType":61,"displayName":136,"importance":63,"description":137,"tag":-1,"dataSource":2842,"enumValues":2843,"categoryId":36,"subCategoryId":2217,"subCategoryName":2218},[66],[],{"id":60,"fieldName":60,"fieldType":61,"displayName":62,"importance":63,"description":64,"tag":-1,"dataSource":2845,"enumValues":2846,"categoryId":36,"subCategoryId":2217,"subCategoryName":2218},[66],[],{"id":110,"fieldName":110,"fieldType":61,"displayName":111,"importance":74,"description":112,"tag":-1,"dataSource":2848,"enumValues":2849,"categoryId":36,"subCategoryId":2217,"subCategoryName":2218},[66],[],{"id":104,"fieldName":104,"fieldType":61,"displayName":105,"importance":74,"description":106,"tag":-1,"dataSource":2851,"enumValues":2852,"categoryId":36,"subCategoryId":2217,"subCategoryName":2218},[66],[],{"id":92,"fieldName":92,"fieldType":61,"displayName":93,"importance":63,"description":94,"tag":-1,"dataSource":2854,"enumValues":2855,"categoryId":36,"subCategoryId":2217,"subCategoryName":2218},[66],[],{"id":116,"fieldName":116,"fieldType":61,"displayName":117,"importance":74,"description":118,"tag":-1,"dataSource":2857,"enumValues":2858,"categoryId":36,"subCategoryId":2217,"subCategoryName":2218},[66],[],{"id":147,"fieldName":147,"fieldType":123,"displayName":148,"importance":74,"description":149,"tag":-1,"dataSource":2860,"enumValues":2861,"categoryId":36,"subCategoryId":2217,"subCategoryName":2218},[66],[],{"id":289,"fieldName":289,"fieldType":61,"displayName":290,"importance":63,"description":291,"tag":-1,"dataSource":-1,"enumValues":2863,"categoryId":36,"subCategoryId":2217,"subCategoryName":2218},[],{"id":295,"fieldName":295,"fieldType":123,"displayName":296,"importance":74,"description":297,"tag":-1,"dataSource":-1,"enumValues":2865,"categoryId":36,"subCategoryId":2217,"subCategoryName":2218},[],{"id":301,"fieldName":301,"fieldType":233,"displayName":302,"importance":74,"description":303,"tag":-1,"dataSource":-1,"enumValues":2867,"categoryId":36,"subCategoryId":2217,"subCategoryName":2218},[2868,2869,2870,2871,2872,2873,2874,2875,2876,2877],{"value":307,"title":308,"description":309},{"value":311,"title":312,"description":313},{"value":315,"title":316,"description":317},{"value":319,"title":320,"description":321},{"value":323,"title":324,"description":325},{"value":327,"title":328,"description":329},{"value":331,"title":332,"description":333},{"value":335,"title":336,"description":337},{"value":339,"title":340,"description":341},{"value":343,"title":344,"description":345},{"id":2185,"fieldName":2185,"fieldType":123,"displayName":2186,"importance":63,"description":2187,"tag":-1,"dataSource":2879,"enumValues":2880,"categoryId":36,"subCategoryId":2217,"subCategoryName":2218},[66,83],[],{"id":72,"fieldName":72,"fieldType":61,"displayName":73,"importance":74,"description":75,"tag":-1,"dataSource":2882,"enumValues":2883,"categoryId":36,"subCategoryId":2217,"subCategoryName":2218},[66],[],{"id":86,"fieldName":86,"fieldType":61,"displayName":87,"importance":74,"description":88,"tag":-1,"dataSource":2885,"enumValues":2886,"categoryId":36,"subCategoryId":2217,"subCategoryName":2218},[66],[],{"id":172,"fieldName":172,"fieldType":61,"displayName":173,"importance":74,"description":174,"tag":-1,"dataSource":2888,"enumValues":2889,"categoryId":36,"subCategoryId":2217,"subCategoryName":2218},[66,83],[],[2891,2895],{"categoryDesc":2892,"categoryId":69,"categoryName":70,"dataSource":2893,"id":2894},"监测并预警敏感数据的未授权访问或暴露，提示潜在的数据泄露风险。",[66,83,157,67],20,{"categoryDesc":2896,"categoryId":2217,"categoryName":2218,"dataSource":2897,"id":2898},"告警表明数据遭到未经授权的修改或篡改，可能损害数据的完整性和安全性。",[66,83],21,"# 数据泄露  **路径**: 告警 > 数据安全 > 数据泄露  ## 描述  监测并预警敏感数据的未授权访问或暴露，提示潜在的数据泄露风险。  ## 基本信息  - **分类ID**: `data_security_data_leak` - **所属主分类**: 数据安全 (`data_security`) - **所属类型**: 告警  ## 字段定义  本事件类型包含以下字段：  | 字段ID | 字段名称 | 数据类型 | 重要性 | 描述 | |--------|---------|---------|--------|------| | `requestMethod` | 请求方法 | `string` | RECOMMENDED | 网络请求客户端向服务器发送请求时使用的HTTP请求方法类型，如GET、POST、PUT、DELETE等标准方法。该字段值必须统一使用大写英文字母表示 | | `httpVersion` | HTTP协议版本 | `string` | OPTIONAL | 该字段标识HTTP网络请求中使用的协议版本。格式为字符串，必须符合HTTP协议版本的标准表示格式，例如\"HTTP/1.0\"、\"HTTP/1.1\"或\"HTTP/2\"。 | | `httpReferer` | 请求Referer | `string` | OPTIONAL | HTTP请求的来源页面URL，即浏览器在发送当前请求时所来自的页面的完整地址。格式必须符合URL规范，通常以协议（如http://或https://）开头，包含域名和可选的路径、查询参数等组成部分。 | | `userAgent` | 用户代理 | `string` | RECOMMENDED | 用户代理字符串，用于标识发起请求的客户端（用户代理）的匿名化信息，通常包含客户端的操作系统、浏览器类型、版本、设备类型等。格式需符合HTTP标准的User-Agent字符串。 | | `responseCode` | 响应码 | `string` | RECOMMENDED | 响应码是网络请求后服务器返回的状态码，用于表示请求的处理结果。 | | `requestHeader` | 请求头 | `string` | RECOMMENDED | 请求头是HTTP网络请求中客户端向服务器发送请求时用于传递附加信息、客户端特性及身份验证等元数据的部分，其内容应为符合HTTP协议规范的字符串。 | | `responseHeader` | 响应头 | `string` | RECOMMENDED | 响应头字段包含HTTP网络请求中服务器返回给客户端的元数据和服务器信息，用于描述响应内容（如内容类型、长度等）和服务器状态。该字段为字符串类型，其内容需符合HTTP协议标准规范。 | | `requestContentType` | 请求内容类型 | `string` | OPTIONAL | 请求内容类型，对应网络请求头中的Content-Type字段，用于描述请求数据的格式和字符编码。其值通常为标准MIME类型字符串，格式规范为“主类型/子类型”，并可附加参数（如字符集）。常见示例包括“application/json”、“text/html; charset=utf-8”等。 | | `responseContentType` | 响应内容类型 | `string` | OPTIONAL | 响应内容类型标识网络请求响应头中的内容类型，用于描述返回数据的媒体类型格式和字符编码。格式应符合HTTP标准的内容类型规范，通常由主类型和子类型组成，可选参数包括字符编码等，例如\"application/json; charset=utf-8\"。取值应为有效的MIME类型字符串。 | | `bytesOut` | 响应字节数 | `long` | OPTIONAL | 响应字节数，用于统计服务器响应消息的字节总量。该字段为长整型数值，其值必须为非负整数，表示字节数。 | | `bytesIn` | 请求字节数 | `long` | OPTIONAL | 该字段用于统计客户端请求消息的字节总量，其值为非负长整型。 | | `requestBody` | HTTP请求体 | `string` | RECOMMENDED | HTTP网络请求客户端向服务器发送请求时传递的数据内容，通常包含请求参数、表单数据或JSON体。 | | `responseBody` | 响应体 | `string` | RECOMMENDED | 该字段表示HTTP网络请求响应客户端接收到的响应内容。格式为字符串，内容通常为文本、JSON、XML或HTML等。 | | `responseTime` | 响应时间 | `long` | OPTIONAL | 该字段记录网络请求从客户端发送到完整接收服务器响应的时间间隔，单位为毫秒。其值为长整型数字，表示一个非负的时间长度。 | | `fileName` | 文件名称 | `string` | RECOMMENDED | 文件的基本名称，不包含路径信息。格式要求：字符串类型，长度不超过255个字符，支持常见操作系统允许的文件名字符集（如字母、数字、下划线、点、连字符等），应避免使用系统保留字符和路径分隔符。 | | `loginUser` | 登录用户 | `string` | OPTIONAL | 该字段表示成功登录系统的用户账号标识。格式要求：用户账号应为字符串类型，通常由字母、数字、下划线等常见字符组成。 | | `mailSubject` | 邮件主题 | `string` | OPTIONAL | 邮件主题行内容，用于概括邮件的主要目的和内容概要。 | | `srcUserName` | 源用户名 | `string` | OPTIONAL | 源用户名指发起网络连接、系统访问或安全事件的主体用户身份名称。 | | `destUserName` | 目标用户名 | `string` | OPTIONAL | 该字段表示网络连接、系统访问或安全事件的目标主体用户身份名称。其值为字符串类型，具体内容应为操作系统或应用程序中定义的有效用户名。 | | `mailContent` | 邮件内容 | `string` | OPTIONAL | 邮件的主要文本内容体，包含邮件的详细信息和通信内容。 | | `clientPrg` | 客户端程序 | `string` | OPTIONAL | 该字段用于标识连接数据库或其他服务的客户端应用程序名称，通常为客户端软件或驱动程序的名称。 | | `ccUserName` | 抄送人 | `string` | OPTIONAL | 抄送人字段用于记录邮件抄送接收方的邮箱地址集合。该字段值为字符串类型，其内容应为一个或多个符合RFC 5322标准的有效邮箱地址。多个地址之间通常使用逗号分隔。 | | `bccUserName` | 密送人 | `string` | OPTIONAL | 该字段记录邮件密送接收方的邮箱地址集合，多个地址应以英文分号分隔。每个邮箱地址需符合标准的电子邮件地址格式，通常包含本地部分、@符号和域名部分。 | | `requestUrl` | 请求URL | `string` | RECOMMENDED | 该字段表示HTTP请求URL中从根路径'/'开始到查询字符串'?'之前的部分，用于标识请求的资源路径。其值必须是一个合法的URL路径字符串，通常以'/'开头，不应包含协议、域名、端口或查询参数（即'?'及之后的内容）。字符串内容应符合URL路径的通用规范，可以包含字母、数字以及特定的安全字符（如-._~!$&'()*+,;=:@%）。 | | `requestUrlQuery` | 请求URI | `string` | RECOMMENDED | 该字段表示HTTP请求URL中从根路径符“/”开始到查询字符串末尾的部分，即包括路径和查询参数。格式要求：必须为有效的URI路径及查询字符串，以“/”开头，可以包含字母、数字、连字符、下划线、点号以及查询参数（以“?”开头，参数间以“&”分隔）。 | | `XFF` | XFF头 | `string` | OPTIONAL | XFF头字段用于识别通过HTTP代理或负载均衡方式连接到Web服务器的客户端最原始的IP地址。 | | `hostName` | 主机名称 | `string` | OPTIONAL | 主机在网络中的标识名称，通常用于在局域网或DNS系统中识别特定设备，例如NetBIOS名称或DNS主机名。格式要求：必须为有效的字符串，允许使用字母、数字、连字符（-）和点号（.），但不得以连字符或点号开头或结尾。 | | `exfiltrationChannel` | 泄露渠道 | `enum` | RECOMMENDED | 该字段标识数据泄露事件中数据被传输到外部的具体渠道。其值必须为预定义的枚举字符串，可选值包括但不限于：removableMedia（可移动介质）、networkProtocols（网络协议传输）、emailSystems（邮件系统）、messagingApps（即时通讯应用）、cloudServices（云服务）等。 |  **枚举值详情：**  | 枚举值 | 名称 | 描述 | |--------|------|------| | `removableMedia` | 可移动介质 | 通过USB设备、移动硬盘、光盘等可移动介质拷贝数据 | | `networkProtocols` | 网络协议传输 | 通过网络共享、FTP、SMB等协议传输数据 | | `emailSystems` | 邮件系统 | 通过网页邮箱、邮件客户端等电子邮件系统发送数据 | | `messagingApps` | 即时通讯应用 | 通过微信、QQ、Telegram等即时通讯应用发送数据 | | `cloudServices` | 云服务 | 通过网盘、云存储等云服务上传和分享数据 | | `webInterfaces` | Web界面 | 通过HTTPS网页表单、在线服务等Web界面传输数据 | | `remoteConnections` | 远程连接 | 通过远程控制软件、VPN、蓝牙等远程连接传输数据 | | `physicalCapture` | 物理捕获 | 通过打印、截图、剪切板、拍照等物理方式捕获数据 | | `databaseTools` | 数据库工具 | 通过数据库管理工具导出大量结构化数据 | | `applicationApis` | 应用API | 通过应用程序API接口批量获取和传输数据 | | `other` | 其他 | 其他类型的泄露方式 |  | `filePath` | 文件目录 | `string` | RECOMMENDED | 该字段表示文件在文件系统中的存储目录路径。路径格式应符合操作系统规范，例如Windows系统使用反斜杠（\\）作为目录分隔符，而Linux/Unix系统使用正斜杠（/）。 | | `md5` | 文件MD5 | `string` | RECOMMENDED | 文件MD5值，表示使用MD5算法计算的文件内容哈希值。该值必须为32位十六进制字符串，不区分大小写，用于唯一标识文件内容。 | | `fileSize` | 文件大小 | `long` | OPTIONAL | 文件内容的字节大小，表示文件的存储空间占用情况，单位是字节。 | | `fileType` | 文件类型 | `enum` | OPTIONAL | 文件类型，基于文件格式和扩展名进行分类。其值为预定义的枚举字符串，包括但不限于：Executable（可执行文件）、Script（脚本文件）、Document（文档文件）、Archive（压缩归档）、Configuration（配置文件）等共10个可选值。取值必须严格匹配预定义的枚举值。 |  **枚举值详情：**  | 枚举值 | 名称 | 描述 | |--------|------|------| | `Executable` | 可执行文件 | 可直接执行的程序文件，如EXE、DLL、BAT等 | | `Script` | 脚本文件 | 需要解释器执行的脚本文件，如PS1、JS、PY等 | | `Document` | 文档文件 | 办公文档和文本文件，如PDF、DOC、XLS等 | | `Archive` | 压缩归档 | 压缩和归档文件，如ZIP、RAR、TAR等 | | `Configuration` | 配置文件 | 系统和应用配置文件，如XML、JSON、CONF等 | | `Log` | 日志文件 | 系统和应用程序日志文件，如LOG、EVTX、AUDIT等 | | `Media` | 媒体文件 | 图像、音频、视频文件，如JPG、MP4、MP3等 | | `System` | 系统文件 | 操作系统核心文件，如SYS、DRV、BIN等 | | `Database` | 数据库文件 | 数据库相关文件，如MDF、DB、SQL等 | | `Other` | 其他类型 | 未分类的其他文件类型 |  | `fileEncrypted` | 文件是否加密 | `boolean` | OPTIONAL | 该字段标识文件内容是否经过加密算法保护。该字段为布尔类型，仅允许取值为 true 或 false，分别表示文件已加密和文件未加密。 | | `fileGuid` | 文件GUID | `string` | OPTIONAL | 文件的全局唯一标识符，通常为32位十六进制字符串，不包含连字符，用于在系统中唯一标识一个文件。 | | `machineCode` | 机器码 | `string` | REQUIRED | 机器码是日志来源设备的唯一标识符（设备ID），主要用于设备级联追踪。该字段值应保持全局唯一性，若无现成的设备ID，可参考硬件编码或基于许可证（license）信息生成。格式上，它必须为字符串，允许使用的字符包括大写字母（A-Z）、小写字母（a-z）和数字（0-9）。长度无固定限制，但应保证其唯一性和可管理性。 | | `productVendorName` | 产品厂商名称 | `string` | REQUIRED | 产品厂商名称字段用于标识安全产品厂商的官方全称。格式为字符串，无特定字符集限制，但应使用厂商在工商注册或官方宣传中使用的标准名称，以确保一致性和准确性。 | | `deviceSendProductName` | 设备产品名称 | `string` | REQUIRED | 设备产品名称用于标识生成日志的软件或硬件产品的官方标准名称。格式为字符串，需使用明确、规范的官方产品名称。 | | `deviceName` | 设备名称 | `string` | REQUIRED | 设备名称，用于标识日志生成设备的名称，可添加资产属性（如总部、下级等）。 | | `deviceAssetSubTypeId` | 设备子类型ID | `enum` | REQUIRED | 设备子类型ID是设备类型子分类的唯一数字标识符，用于标识具体的设备子类型。该字段为枚举类型，取值应在系统定义的枚举值范围内。 |  **枚举值详情：**  | 枚举值 | 名称 | 描述 | |--------|------|------| | `1` | Windows | Microsoft Windows操作系统 | | `2` | Nix | 类Unix操作系统，包括Linux和BSD变种 | | `3` | 路由器 | 网络路由设备，用于在网络之间转发数据包 | | `4` | 交换机 | 网络交换设备，用于在局域网内连接设备并转发数据帧 | | `5` | VPN | 虚拟专用网络设备，提供安全的远程访问和站点到站点连接 | | `6` | 负载均衡 | 负载均衡设备，用于分发网络流量以提高性能和可靠性 | | `7` | 防火墙 | 网络安全设备，用于控制进出网络的流量基于安全规则 | | `8` | 网闸 | 网络隔离设备，用于在安全级别不同的网络之间进行安全数据交换 | | `9` | 入侵检测系统(IDS) | 入侵检测系统，用于监控网络或系统活动以检测恶意行为 | | `10` | 入侵防护系统(IPS) | 入侵防护系统，在检测到威胁时主动阻止恶意流量 | | `11` | 统一威胁管理(UTM) | 统一威胁管理设备，集成多种安全功能如防火墙、防病毒和入侵防护 | | `12` | 下一代防火墙 | 下一代防火墙，提供应用层检测、深度包检查和高级威胁防护 | | `13` | Web应用防火墙(WAF) | Web应用防火墙，专门保护Web应用程序免受SQL注入、XSS等攻击 | | `14` | 流量监测设备 | 网络流量监测设备，用于实时分析和监控网络流量模式 | | `15` | 网页防篡改 | 网页防篡改系统，保护网站内容不被未经授权修改 | | `16` | 抗DDoS系统 | 抗分布式拒绝服务攻击系统，缓解DDoS攻击以保护服务可用性 | | `17` | 防病毒系统 | 防病毒系统，检测和清除恶意软件、病毒和木马 | | `18` | 防间谍系统 | 防间谍软件系统，防止间谍软件窃取敏感信息和监控用户活动 | | `19` | 防泄密系统 | 数据防泄密系统，监控和防止敏感数据通过各类渠道泄露 | | `20` | 邮件审计系统 | 邮件审计系统，监控和审计电子邮件内容以符合安全策略和合规要求 | | `21` | 身份管理系统 | 身份和访问管理系统，管理用户身份认证、授权和权限 | | `22` | 流量清洗系统 | 流量清洗系统，过滤恶意流量以保护网络资源和业务连续性 | | `23` | 数据库审计系统 | 数据库审计系统，监控和记录数据库访问、操作和权限变更 | | `24` | Web审计系统 | Web审计系统，审计Web应用程序的访问、操作和安全事件 | | `25` | 运维审计系统 | 运维审计系统，监控和记录系统运维操作，防止越权访问 | | `26` | 上网行为审计系统 | 上网行为审计系统，监控和审计员工网络使用行为以符合安全策略 | | `27` | 统一审计网关 | 统一审计网关，集中收集、规范化和分析各类审计日志 | | `28` | 日志审计系统 | 日志审计系统，收集、存储、分析和告警系统安全日志 | | `29` | 安全管理系统 | 安全管理系统，集成安全管理功能如策略管理、风险管理和事件响应 | | `30` | 蜜罐系统 | 蜜罐系统，诱骗攻击者以收集攻击信息和分析攻击手法 | | `31` | 应用扫描器 | 应用程序漏洞扫描器，检测Web应用和移动应用的安全漏洞 | | `32` | 网络扫描器 | 网络漏洞扫描器，扫描网络设备、服务和端口以发现安全漏洞 | | `33` | 主机扫描器 | 主机漏洞扫描器，扫描操作系统和应用程序漏洞及配置问题 | | `34` | WEB服务器 | Web服务器软件，如IIS、Apache、Nginx等，托管网站和应用 | | `35` | 数据库服务器 | 数据库服务器软件，如MySQL、Oracle、SQL Server等，存储和管理数据 | | `36` | 邮件服务器 | 邮件服务器软件，如Exchange、Postfix等，处理电子邮件收发 | | `37` | 存储服务器 | 存储服务器，提供数据存储、备份和共享服务 | | `38` | FTP服务器 | FTP服务器，提供文件传输协议服务，支持文件上传下载 | | `39` | 应用服务器 | 应用服务器，运行企业应用程序和业务逻辑，如Java EE、.NET应用 | | `43` | Windows审计代理 | Windows系统审计代理，收集Windows事件日志和系统活动 | | `44` | Nix审计代理 | 类Unix系统审计代理，收集Linux/Unix系统日志和审计数据 | | `45` | WMI审计代理 | Windows管理规范审计代理，通过WMI收集系统信息和事件 | | `51` | 采集器 | 日志采集器，从各种数据源收集和转发日志数据 | | `52` | 通信服务器 | 通信服务器，处理网络通信、消息传递和协议转换 | | `53` | 关联引擎 | 安全事件关联引擎，分析日志数据以检测复杂安全事件 | | `55` | 其他 | 其他未分类的设备类型 | | `56` | 主机安全管理系统(EDR) | 端点检测与响应系统，监控主机活动、检测威胁并响应安全事件 | | `57` | 虚拟化设备 | 虚拟化平台设备，如VMware ESXi、Hyper-V等，运行虚拟机 | | `58` | 网络打印机 | 网络连接的打印机设备，支持网络打印功能 | | `59` | APT | 高级持久威胁检测系统，针对APT攻击进行监测和防护 | | `60` | DNS服务器 | 域名系统服务器，提供域名解析服务和DNS安全防护 | | `61` | API风险监测系统 | API风险监测系统，监控API接口的安全风险和使用异常 | | `62` | API安全网关 | API安全网关，保护API接口免受攻击，提供认证、授权和限流 | | `63` | 脆弱性扫描系统 | 脆弱性扫描系统，全面扫描系统、网络和应用漏洞 | | `65` | UES | 统一端点安全系统，集成终端防护、检测和响应功能 |  | `deviceAddress` | 设备IP地址 | `string` | REQUIRED | 设备产生日志时的IP地址，用于标识日志来源设备。格式要求：必须为有效的IPv4或IPv6地址格式。 | | `eventId` | 事件ID | `string` | REQUIRED | 事件ID是日志事件的全局唯一标识符，通常采用UUID或时间戳序列等不可重复算法生成。格式应为标准的UUID字符串，例如：550e8400-e29b-41d4-a716-446655440000。要求全局唯一，不可重复。 | | `name` | 概要名称 | `string` | REQUIRED | 概要名称是日志或告警的简要标题或标识，用于快速识别事件内容。该字段为字符串类型，需保持简洁明了。 | | `message` | 描述 | `string` | OPTIONAL | 用于记录日志或告警的详细描述信息，以文本字符串形式存储。内容通常包含对安全事件、系统活动或异常情况的说明、上下文及关键参数。 | | `startTime` | 开始时间 | `string` | REQUIRED | 该字段记录事件活动开始的精确时间。时间格式必须为标准的日期时间字符串，格式为yyyy-mm-dd HH:mm:ss。 | | `endTime` | 结束时间 | `string` | REQUIRED | 记录事件活动结束的精确时间。时间格式必须为标准的日期时间字符串，格式为yyyy-mm-dd HH:mm:ss。 | | `deviceReceiptTime` | 设备接收时间 | `string` | OPTIONAL | 该字段记录设备采集器本地接收并生成日志事件的精确时间。时间格式必须为标准的日期时间字符串，格式为yyyy-mm-dd HH:mm:ss。 | | `collectorReceiptTime` | 采集器接收时间 | `string` | REQUIRED | 采集器接收日志事件的精确时间，时间格式必须为标准的日期时间字符串，格式要求为yyyy-mm-dd HH:mm:ss。 | | `severity` | 安全威胁等级 | `integer` | REQUIRED | 标识日志或告警的安全威胁严重程度等级。该字段为整型数值，取值范围为0至10，每个数值对应特定的威胁级别：0表示无风险，1-3表示低危，4-6表示中危，7-9表示高危，10表示危急。 | | `catOutcome` | 结果分类 | `enum` | REQUIRED | 该字段用于标识事件操作或攻击的最终结果状态。其值为预定义的枚举类型，当前主要可选值包括：OK（表示操作成功）、FAIL（表示操作失败）、Attempt（表示尝试性操作）。取值应严格限定在系统定义的枚举值范围内。 |  **枚举值详情：**  | 枚举值 | 名称 | 描述 | |--------|------|------| | `OK` | 成功 | 可以合理的推测事件已成功 | | `FAIL` | 失败 | 可以合理的推测事件已失败 | | `Attempt` | 尝试 | 事件已发生，但是无法明确成功或失败 |  | `logType` | 日志类型 | `enum` | REQUIRED | 该字段标识日志事件的功能或对象实体分类。其值为预定义的枚举字符串，例如：alert（告警类日志）、traffic（网络通信类日志）、process（进程操作类日志）、command（命令执行类日志）、file（文件操作类日志）等。 |  **枚举值详情：**  | 枚举值 | 名称 | 描述 | |--------|------|------| | `alert` | 告警类日志 | 安全告警事件日志，包含威胁检测、异常行为和安全风险告警 | | `traffic` | 网络通信类日志 | 网络流量和通信会话日志，记录网络连接、数据传输和协议通信 | | `process` | 进程操作类日志 | 进程生命周期管理日志，记录进程创建、终止、注入等操作 | | `command` | 命令执行类日志 | 命令行和脚本执行日志，记录系统命令、PowerShell和Shell命令执行 | | `file` | 文件操作类日志 | 文件系统操作日志，记录文件创建、修改、删除、访问等操作 | | `account` | 账号操作类日志 | 用户账户管理日志，记录用户登录、注销、权限变更和账户管理操作 | | `config` | 配置操作类日志 | 系统配置变更日志，记录安全策略、系统设置和配置修改操作 | | `status` | 系统状态类日志 | 系统运行状态日志，记录系统启动、关机、重启和运行状态变更 | | `system_operation` | 系统操作类日志 | 系统级管理操作日志，记录系统维护、管理和控制操作 | | `system_resource` | 系统资源类日志 | 系统资源使用日志，记录CPU、内存、磁盘和网络资源使用情况 | | `domain` | 域名操作类日志 | 域名解析和查询日志，记录DNS查询、域名解析和网络定位操作 | | `registry` | 注册表操作类日志 | Windows注册表操作日志，记录注册表键值创建、修改和删除操作 | | `app` | 应用程序类日志 | 应用程序运行日志，记录应用程序启动、运行、错误和业务操作 | | `service` | 服务操作类日志 | 系统服务管理日志，记录Windows/Linux服务的创建、启动、停止和配置变更 | | `task` | 任务操作类日志 | 计划任务和作业日志，记录定时任务创建、执行、修改和删除操作 | | `thread` | 线程操作类日志 | 线程管理日志，记录线程创建、终止、挂起和优先级变更操作 | | `module` | 模块操作类日志 | 程序模块管理日志，记录DLL、SO等模块的加载、卸载和内存映射 | | `driver` | 驱动操作类日志 | 设备驱动程序日志，记录内核驱动加载、卸载和运行状态 | | `pipe` | 管道操作类日志 | 进程间通信日志，记录命名管道创建、连接、数据传输操作 | | `wmi` | WMI操作类日志 | Windows管理规范操作日志，记录WMI查询、事件订阅和代码执行 | | `winrm` | WinRM操作类日志 | Windows远程管理日志，记录远程PowerShell命令执行和系统管理操作 | | `others` | 其他类型日志 | 未分类的其他日志类型，包含无法归入上述分类的日志事件 |  | `opType` | 操作类型 | `enum` | RECOMMENDED | 操作类型，标识事件中对目标对象执行的具体操作行为。本字段为枚举类型，其值必须为预定义的操作类型字符串，例如：read（读取）、write（写入）、create（创建）、delete（删除）、modify（修改）等。 |  **枚举值详情：**  | 枚举值 | 名称 | 描述 | |--------|------|------| | `read` | 读取 | 读取数据操作，包括文件读取、注册表查询、内存读取等 | | `write` | 写入 | 写入数据操作，包括文件写入、注册表修改、配置变更等 | | `create` | 创建 | 创建新对象操作，包括文件创建、进程创建、用户账户创建等 | | `delete` | 删除 | 删除对象操作，包括文件删除、注册表项删除、用户账户删除等 | | `modify` | 修改 | 修改对象属性操作，包括文件属性修改、权限变更、配置调整等 | | `login` | 登录 | 身份认证成功操作，包括系统登录、应用登录、远程访问登录等 | | `logout` | 登出 | 会话终止操作，包括用户登出、会话超时、强制注销等 | | `execute` | 执行 | 程序执行操作，包括进程启动、命令执行、脚本运行等 | | `start` | 启动 | 服务启动操作，包括系统服务启动、计划任务触发、守护进程启动等 | | `stop` | 停止 | 服务停止操作，包括系统服务停止、进程终止、任务结束等 | | `access` | 访问 | 资源访问操作，包括进程访问、内存访问、共享资源访问等 | | `connect` | 连接 | 网络连接操作，包括网络连接建立、会话创建、远程连接等 | | `load` | 加载 | 模块加载操作，包括驱动加载、DLL加载、插件加载等 | | `send` | 发送 | 数据发送操作，包括网络数据发送、邮件发送、消息发送等 | | `receive` | 接收 | 数据接收操作，包括网络数据接收、邮件接收、消息接收等 | | `combine` | 组合操作 | 复合操作类型，表示多个操作的组合执行 | | `others` | 其他操作 | 未分类的其他操作类型 | | `query` | 查询 | 数据查询操作，包括数据库查询、目录查询、信息检索等 | | `rename` | 重命名 | 对象重命名操作，包括文件重命名、账户重命名、服务重命名等 | | `listen` | 监听 | 网络监听操作，包括端口监听、会话监听、事件监听等 | | `setValue` | 设置键值 | 键值设置操作，包括注册表键值设置、配置参数设置、环境变量设置等 | | `addedGroup` | 添加至组 | 组成员添加操作，包括用户添加到组、计算机加入域等 | | `removedGroup` | 组中移除 | 组成员移除操作，包括用户从组中移除、计算机脱离域等 | | `changePassword` | 修改密码 | 密码修改操作，包括用户密码修改、服务账户密码变更等 | | `resetPassword` | 重置密码 | 密码重置操作，包括管理员重置用户密码、密码恢复等 | | `disable` | 禁用 | 对象禁用操作，包括用户账户禁用、服务禁用、策略禁用等 | | `enable` | 启用 | 对象启用操作，包括用户账户启用、服务启用、策略启用等 | | `lock` | 锁定 | 对象锁定操作，包括用户账户锁定、会话锁定、资源锁定等 | | `unlock` | 解锁 | 对象解锁操作，包括用户账户解锁、会话解锁、资源解锁等 |  | `srcPort` | 源端口 | `integer` | OPTIONAL | 源端口是指网络连接发起方的端口号，用于标识发起通信的应用程序或服务。端口号必须是整数，取值范围为0到65535，其中0通常保留，1到1023为知名端口，1024到49151为注册端口，49152到65535为动态或私有端口。 | | `destPort` | 目的端口 | `integer` | OPTIONAL | 目的端口是网络连接接收方的端口号，用于标识接收方应用程序或服务。该字段为整数类型，取值范围为0-65535，其中0-1023为知名端口，1024-49151为注册端口，49152-65535为动态或私有端口。 | | `srcMacAddress` | 源MAC地址 | `string` | OPTIONAL | 源MAC地址表示网络数据帧发送方的媒体访问控制地址。格式要求：必须为标准MAC地址格式，即6组由冒号分隔的十六进制字节（xx:xx:xx:xx:xx:xx），每组两个字符，取值范围为00-FF。 | | `destMacAddress` | 目的MAC地址 | `string` | OPTIONAL | 目的MAC地址表示网络数据帧接收方的媒体访问控制地址。格式要求：必须为标准MAC地址格式，即6组由冒号分隔的十六进制字节（xx:xx:xx:xx:xx:xx），每组两个字符，取值范围为00-FF。 | | `srcGeoCountry` | 来源国家 | `string` | OPTIONAL | 该字段表示网络连接发起方IP地址所对应的国家或地区信息。 | | `srcGeoRegion` | 来源地区 | `string` | OPTIONAL | 该字段表示网络连接发起方IP地址所对应的省级行政区域名称，用于标识流量的地理来源。其值应为中国省级行政区划的名称，例如“北京市”、“浙江省”、“新疆维吾尔自治区”等，或国际公认的国家及地区名称。格式为字符串，无固定长度限制，建议使用标准、完整的官方名称以确保一致性和准确性。 | | `srcGeoCity` | 来源城市 | `string` | OPTIONAL | 该字段表示网络连接发起方IP地址所对应的城市级别行政区域名称。其值为字符串类型，该信息通常由IP地址归属地查询服务提供，无特定的格式或字符集强制要求，但建议保持名称的一致性。 | | `srcGeoAddress` | 来源详细地址 | `string` | OPTIONAL | 该字段表示网络连接发起方IP地址所对应的详细地址描述，用于定位来源的具体物理或行政位置。其值为字符串类型，通常包含国家、省份、城市、区县、街道及门牌号等层级信息。 | | `srcGeoLatitude` | 来源纬度 | `string` | OPTIONAL | 该字段表示网络连接发起方IP地址所对应的地理纬度坐标，以字符串格式存储。纬度坐标应遵循十进制表示法，取值范围为-90.000000到90.000000，其中北纬为正，南纬为负。 | | `srcGeoLongitude` | 来源经度 | `string` | OPTIONAL | 来源经度表示网络连接发起方IP地址所对应的地理经度坐标。格式为十进制浮点数字符串，取值范围为-180.000000到180.000000，保留小数点后六位，使用点号（.）作为小数点分隔符，负值表示西经，正值表示东经。 | | `destGeoCountry` | 目的国家 | `string` | OPTIONAL | 目的国家，指网络连接接收方IP地址所对应的国家名称。该字段值为国家或地区的完整中文名称，例如“中国”、“美国”等。 | | `destGeoRegion` | 目的地区 | `string` | OPTIONAL | 该字段表示网络连接接收方IP地址所对应的中国省级行政区域名称，用于标识网络流量的地理目的地。其值应为中国省级行政区划的规范名称，例如“浙江省”、“北京市”或“新疆维吾尔自治区”等，不包含“省”、“市”、“自治区”等后缀的简称（如“浙江”、“北京”、“新疆”）也可接受。该字段为字符串类型，无特定字符集或长度限制，但应确保名称的准确性和一致性。 | | `destGeoCity` | 目的城市 | `string` | OPTIONAL | 目的城市是指网络连接接收方IP地址所对应的城市级别行政区域名称。该字段为字符串类型，需使用标准城市名称。 | | `destGeoAddress` | 目的详细地址 | `string` | OPTIONAL | 目的详细地址，描述网络连接接收方IP地址所对应的详细地址信息。格式为字符串，应包含国家、省/州、城市、街道等层级的详细信息，以构成一个完整的物理位置描述。 | | `destGeoLatitude` | 目的纬度 | `string` | OPTIONAL | 目的纬度表示网络连接接收方IP地址所对应的地理纬度坐标。该值为字符串类型，通常以十进制小数形式表示，取值范围为-90.000000到90.000000。 | | `destGeoLongitude` | 目的经度 | `string` | OPTIONAL | 目的经度是指网络连接接收方IP地址所对应的地理经度坐标。格式为十进制小数形式的字符串，取值范围为-180.000000至180.000000。 | | `dataSourceAddress` | 数据来源地址 | `string` | RECOMMENDED | 数据来源地址，指提供数据的设备网络地址。该字段必须是合法的IP地址格式，支持IPv4和IPv6地址。IPv4地址为点分十进制格式（如192.168.1.5），IPv6地址为冒号分隔的十六进制格式。 | | `transProtocol` | 传输协议 | `enum` | OPTIONAL | 传输层协议类型，表示OSI模型中传输层使用的协议。可选值包括：TCP（传输控制协议）、UDP（用户数据报协议）等标准传输层协议。 |  **枚举值详情：**  | 枚举值 | 名称 | 描述 | |--------|------|------| | `TCP` | 传输控制协议 | 面向连接的可靠传输协议，提供数据包顺序传输、错误检测和重传机制 | | `UDP` | 用户数据报协议 | 无连接的不可靠传输协议，提供低延迟的数据传输，适用于实时应用 |  | `appProtocol` | 应用协议 | `enum` | OPTIONAL | 应用协议字段表示OSI模型中应用层使用的协议类型。该字段为枚举类型，取值范围应在预定义的协议标识符列表中。 |  **枚举值详情：**  | 枚举值 | 名称 | 描述 | |--------|------|------| | `http` | http | http | | `https` | https | https | | `dns` | dns | dns | | `ssh` | ssh | ssh | | `telnet` | telnet | telnet | | `telnets` | telnets | telnets | | `rsync` | rsync | rsync | | `tftp` | tftp | tftp | | `ftp` | ftp | ftp | | `sftp` | sftp | sftp | | `smb` | smb | smb | | `ntp` | ntp | ntp | | `mysql` | mysql | mysql | | `ms-sql-s` | ms-sql-s | ms-sql-s | | `ms-sql-m` | ms-sql-m | ms-sql-m | | `oracle` | oracle | oracle | | `nfs` | nfs | nfs | | `pop2` | pop2 | pop2 | | `pop3` | pop3 | pop3 | | `pop3s` | pop3s | pop3s | | `smtp` | smtp | smtp | | `imap` | imap | imap | | `imaps` | imaps | imaps | | `chargen` | chargen | chargen | | `qotd` | qotd | qotd | | `x11` | x11 | x11 | | `uucp` | uucp | uucp | | `rcp` | rcp | rcp | | `postgres` | postgres | postgres | | `bootps` | bootps | bootps | | `bootpc` | bootpc | bootpc | | `squid` | squid | squid | | `ftps` | ftps | ftps | | `ircs` | ircs | ircs | | `echo` | echo | echo | | `sunrpc` | sunrpc | sunrpc | | `auth` | auth | auth | | `tacacs` | tacacs | tacacs | | `nntp` | nntp | nntp | | `radius` | radius | radius | | `netbios-ns` | netbios-ns | netbios-ns | | `netbios-dgm` | netbios-dgm | netbios-dgm | | `netbios-ssn` | netbios-ssn | netbios-ssn | | `wins` | wins | wins | | `snmp` | snmp | snmp | | `snmptrap` | snmptrap | snmptrap | | `bgp` | bgp | bgp | | `irc` | irc | irc | | `ldap` | ldap | ldap | | `ldaps` | ldaps | ldaps | | `timbuktu` | timbuktu | timbuktu | | `nnsp` | nnsp | nnsp | | `daytime` | daytime | daytime | | `ircd` | ircd | ircd | | `isakmp` | isakmp | isakmp | | `printer` | printer | printer | | `dhcpv6-client` | dhcpv6-client | dhcpv6-client | | `dhcpv6-server` | dhcpv6-server | dhcpv6-server | | `rtsp` | rtsp | rtsp | | `nntps` | nntps | nntps | | `discard` | discard | discard | | `ipx` | ipx | ipx | | `finger` | finger | finger | | `rdp` | rdp | rdp |  | `dvcAction` | 设备处置动作 | `string` | OPTIONAL | 设备处置动作字段记录安全设备对检测到的威胁或异常行为采取的自动处置动作，例如阻断、放行、隔离或告警，取值应为描述处置动作的字符串。 | | `direction` | 数据流方向 | `enum` | RECOMMENDED | 基于源和目标IP地址的网络位置分类数据流方向。该字段为枚举类型，表示数据流在内外网之间的流向，具体取值及含义如下：11 表示外网访问外网；10 表示外网访问内网；01 表示内网访问外网；00 表示内网访问内网。 |  **枚举值详情：**  | 枚举值 | 名称 | 描述 | |--------|------|------| | `11` | 外访问外 | 来源IP为外部IP，目的IP为外部IP，数据方向：外访问外 | | `10` | 外访问内 | 来源IP为外部IP，目的IP为内部IP，数据方向：外访问内 | | `01` | 内访问外 | 来源IP为内部IP，目的IP为外部IP，数据方向：内访问外 | | `00` | 内访问内 | 来源IP为内部IP，目的IP为内部IP，数据方向：内访问内 |  | `deviceVersion` | 设备版本 | `string` | OPTIONAL | 设备版本标识设备固件、操作系统或嵌入式软件的完整版本信息。版本号通常采用多段数字格式，如主版本号.次版本号.修订号.构建号等。 | | `srcAddress` | 来源IP | `string` | RECOMMENDED | 来源IP地址，指网络连接或安全事件的发起方所使用的IP地址。该字段必须符合IP地址格式规范，支持IPv4和IPv6地址。IPv4地址为点分十进制格式（如：192.168.1.1），IPv6地址为冒号分隔的十六进制格式（如：2001:0db8:85a3:0000:0000:8a2e:0370:7334）。 | | `destAddress` | 目的IP | `string` | RECOMMENDED | 目的IP地址，标识网络通信连接的目标IP地址。格式要求：必须符合IP地址格式规范，支持IPv4（如192.168.1.1）或IPv6（如2001:0db8:85a3:0000:0000:8a2e:0370:7334）地址表示法。 | | `subTechniqueId` | ATT&CK子技术ID | `string` | OPTIONAL | 该字段表示攻击行为在MITRE ATT&CK框架中对应的具体攻击子技术的唯一标识符。其格式为ATT&CK技术ID后加小数点与三位数字编号，例如 `T1566.001`。该标识符应符合MITRE ATT&CK官方规范。 | | `techniqueName` | ATT&CK技术名称 | `string` | OPTIONAL | ATT&CK技术名称，指攻击行为在MITRE ATT&CK框架中对应的具体攻击技术的名称。该字段为字符串类型，其值应符合MITRE ATT&CK官方技术命名规范，通常为英文短语或特定术语，例如“Phishing”。 | | `techniqueId` | ATT&CK技术ID | `string` | OPTIONAL | 该字段表示攻击行为在MITRE ATT&CK框架中对应的具体攻击技术的唯一标识符。格式为ATT&CK技术ID标准格式，通常以字母“T”开头，后接4位数字，例如：T1566。 | | `tacticName` | ATT&CK战术名称 | `string` | OPTIONAL | 攻击行为在MITRE ATT&CK框架中对应的战术阶段名称，用于标识攻击在杀伤链中所处的阶段。此字段为字符串类型，取值应为MITRE ATT&CK框架中定义的官方战术名称，例如：Initial Access, Execution, Persistence, Privilege Escalation等。 | | `tacticId` | ATT&CK战术ID | `string` | OPTIONAL | 攻击行为在MITRE ATT&CK框架中对应的战术阶段唯一标识符。格式必须符合ATT&CK官方定义的战术ID规范，通常以“TA”为前缀，后跟四位或五位数字，例如“TA0001”。 | | `killChain` | 攻击链 | `enum` | OPTIONAL | 攻击链字段用于描述攻击行为在攻击生命周期中所处的具体阶段。该字段为枚举类型，其值必须为预定义的字符串常量，可选值包括但不限于：KC_Reconnaissance（侦查）、KC_Delivery（投递）、KC_Exploitation（利用）、KC_CommandControl（命令控制）、KC_InternalRecon（内部侦查）等。 |  **枚举值详情：**  | 枚举值 | 名称 | 描述 | |--------|------|------| | `KC_Reconnaissance` | 侦查 | 网络攻击者选择目标，进行初步渗透并尝试发现信息系统版本、架构、漏洞等信息的过程。该过程可能涉及到多种方法，比如对web服务的扫描、对主机开放端口的探测等。通常该阶段的攻击有大量类似的行为，几乎都为攻击失败。 | | `KC_Delivery` | 投递 | 遭受攻击的设备接收或感染恶意程序、钓鱼邮件及黑客工具的阶段。投递过程可以是主动的，例如终端用户主动下载互联网恶意程序或接收钓鱼邮件附件等；也可以是被动的，例如攻击者使用开放服务的接口，上传木马、后门、远控程序等。从而让攻击者成功获取到受害设备的控制权限。 | | `KC_Exploitation` | 利用 | 网络攻击者在获取到目标的基本信息后，尝试利用目标可能存在的漏洞或缺陷进行针对性渗透攻击。利用过程可能成功，也可能失败（例如被防火墙、IPS设备、终端病毒防护程序阻断）。 | | `KC_CommandControl` | 命令控制 | 网络攻击者利用植入的后门或恶意程序，对受害设备进行远程控制。过程中可能由攻击者发送指令，唤醒或操控受害主机上的后门，执行相关命令；也可能由受害设备上运行的程序主动发起回连请求，向黑客传递信息数据。通常该阶段的告警意味着被攻击的目标可能已经失陷。 | | `KC_InternalRecon` | 内部侦查 | 攻击者通过某些手段登录成功进入目标网络系统(如窃取vpn账户、猜解远程控制窗口等)，并且在目标网络系统进行服务探测、信息收集的过程。该过程也可能是黑客成功获取了内部设备的权限，远程操控该设备进行。 | | `KC_LateralMov` | 横向渗透 | 信息系统内的设备失陷，或黑客窃取了登录口令后，攻击者在内部系统进行横向移动，尝试获取更多设备权限的过程。该过程主要涉及到内对内的漏洞利用和敏感操作等攻击，通常该阶段的告警意味着被攻击的目标可能已经失陷。 | | `KC_Profit` | 获利 | 网络攻击者成功向目标植入恶意程序后，采取具体行动来达到其目标，例如恶意加密目标主机设备上的文件、窃取和破坏数据、利用设备资源获取挖矿等，通常该阶段的告警意味着被攻击的目标可能已经失陷。 | | `KC_Others` | 无 | 非攻击行为，如配置错误、设备故障等。 |  | `confidence` | 告警置信度 | `enum` | OPTIONAL | 告警置信度表示对威胁检测、归因或分析结果准确性的等级评估指标。该字段为枚举类型，可选值包括：Low（低置信度）、Medium（中置信度）和High（高置信度）。 |  **枚举值详情：**  | 枚举值 | 名称 | 描述 | |--------|------|------| | `Low` | 低置信度 | 告警信息基于单一、不确定的指标，可能存在误报，需要进一步验证 | | `Medium` | 中置信度 | 告警信息具有一定可靠性，但仍需分析确认 | | `High` | 高置信度 | 告警信息误报率极低，可信度很高 |  | `ruleId` | 规则ID | `string` | OPTIONAL | 规则ID是触发策略的安全规则唯一标识符。其值应为字符串类型，通常由字母、数字或特定符号组成，用于在系统中唯一标识一条安全规则。 | | `ruleType` | 规则类型 | `enum` | REQUIRED | 规则类型标识安全设备（如防火墙、IDS、IPS、EDR等）产生告警时对应的安全检测规则类型，反映设备内置规则库对特定攻击模式或异常行为的分类。该字段为枚举类型，其值是一个表示威胁类别的层级路径字符串，格式通常为“/一级分类/二级分类”。 |  **枚举值详情：**  | 枚举值 | 名称 | 描述 | |--------|------|------| | `/AccountRisk/BruteForce` | 账号暴力破解 | 攻击者采用枚举方法系统地尝试用户名和密码组合进行登录尝试。攻击目标：用户账户。此类攻击的受害者必须是内部网络目标。常见的暴力破解和弱密码枚举尝试属于此类别。从内部网络发起的针对外部网络的暴力破解攻击归类为：主机异常/主机外部攻击。 | | `/AccountRisk/Others` | 账号其他风险 | 其他账户异常事件的告警 | | `/AccountRisk/SuspAccount` | 可疑账户 | 可疑账户指可能被用于掩盖攻击者活动、实现持久访问或执行未授权操作的账户。包括：后门账户、隐藏账户、影子账户等。 | | `/AccountRisk/SuspBehavior` | 账号可疑行为 | 账户异常行为的告警。常见场景包括：垃圾邮件发送 - 账户发送垃圾邮件（内网 -> SMTP服务器）。数据窃取 - 下载大量敏感文件（内网 -> 内网）。可疑访问 - 尝试登录关键服务器（内网 -> 内网）。攻击者未知，受害者：涉事账户。 | | `/AccountRisk/SuspLogin` | 账号可疑登录 | 此类主要包括异常行为审计，如：异常登录地点、异常登录时间、可疑登录账户和异常登录结果。告警的源地址不区分内外网，而目标地址为内部网络。默认情况下，从内部网络到外部网络的异常登录尝试不会触发告警。如果发生相关告警，应归类为：主机异常/其他。 | | `/AccountRisk/SuspModify` | 账号可疑修改 | 记录异常账户变更行为，如频繁权限修改和频繁密码更改。告警目标地址为内部网络。 | | `/AgentSec/ConfigurationManipulation` | 配置操纵滥用 | 攻击者篡改配置文件、偏好设置或加载机制，以持久操控AI系统行为或植入后门。 | | `/AgentSec/IdentitySession` | 身份会话滥用 | 攻击者利用认证、令牌管理和会话机制中的漏洞提升权限、冒充身份或越权访问数据。 | | `/AgentSec/ToolInvocation` | 工具调用滥用 | 攻击者在工具调用过程中操纵输入参数和数据传递，以执行恶意命令或访问敏感数据。 | | `/AgentSec/ToolRegistration` | 工具注册滥用 | 攻击者通过污染工具描述、模式定义或标识符，利用工具注册机制中的漏洞操控AI系统行为。 | | `/AgentSec/UpdateMechanism` | 更新机制滥用 | 攻击者利用工具更新机制的信任模型和自动化特性推送恶意更新，以实现持久控制或突发攻击。 | | `/Audit/ConfigChange` | 配置变更审计 | 对配置修改行为的审计，包括：修改防火墙配置、修改路由表、修改DNS服务器地址、修改服务器配置参数等。审计类型，默认级别为低。不涉及攻击者或受害者。 | | `/Audit/Exfiltration` | 数据外泄审计 | 监测内网主机对外传输或发送数据的行为，例如：1. 上传文件至外部FTP服务器；2. 发送大邮件附件至外部邮箱；3. 同步文件至云存储；4. 向外部HTTP服务器提交数据等。审计数据传输行为而非内容本身。 | | `/Audit/IllegalAccess` | 非法访问审计 | 内网主机访问禁止访问的网站。包括：1. 涉及恶意扣费、隐私窃取、赌博、暴力、色情或分裂活动的内容。具体规定参见：http://report.12377.cn:13225/mainNotice.html；2. 违反公司政策的内容，如游戏网站、招聘网站或电商平台。不涉及攻击者或受害者。 | | `/Audit/IllegalOp` | 非法操作审计 | 包括内网中各类未授权操作的告警，例如：1. 未知设备接入网络、非安全计算机处理涉密文件等；2. 绕过堡垒机访问生产环境；3. 其他违反法律法规和公司政策的操作。不涉及攻击者或受害者。 | | `/Audit/IllegalSoft` | 非法软件审计 | 内网主机存在涉及不合规应用的进程或通信流量。包括：1. 违反国家规定的应用：涉及恶意扣费、隐私窃取、赌博、色情或破坏国家统一的内容。具体规定参见：http://report.12377.cn:13225/mainNotice.html；2. 违反组织或公司政策的应用，如禁止的游戏、即时通讯软件或股票交易应用。审计类型，默认严重级别为低。不涉及攻击者或受害者。 | | `/Audit/OpAudit` | 操作审计 | 包括需审计日志记录的操作，如敏感操作（如权限修改、批量数据查询）和高危操作（如数据删除、系统文件修改或删除、日志清除）。审计类型默认设置为低级别。不涉及攻击者或受害者。 | | `/Audit/Others` | 其他审计 | 其他行为审计事件的告警 | | `/ConfigRisk/ClearTextCredit` | 明文凭据传输风险 | 敏感信息在数据传输过程中未经加密传输。敏感信息包括密码、加密密钥、证书、会话标识符、私有数据（如消息内容）、授权凭证、个人数据，以及程序文件、配置文件、日志文件、备份文件等。风险资产位于内网（目的地址）。 | | `/ConfigRisk/Database` | 数据库配置风险 | 数据库配置不当可能导致数据泄露、服务器被攻陷等危害。风险资产位于内网（目的地址）。 | | `/ConfigRisk/DeviceConf` | 设备配置风险 | 设备缺乏适当的安全配置，可能导致数据泄露、服务器被入侵等危害。风险资产位于内部网络（目标地址）。 | | `/ConfigRisk/Exploit` | 漏洞利用风险 | 服务器未及时进行补丁更新或安全配置，导致存在漏洞被利用的风险。 | | `/ConfigRisk/HTTPServer` | HTTP服务器配置风险 | HTTP服务器启用了PUT、DELETE、OPTIONS和TRACE等非常用方法，可能导致服务器信息泄露和内容篡改。风险资产位于内部网络（目标地址）。 | | `/ConfigRisk/MidWare` | 中间件配置风险 | 中间件缺乏安全配置，可能导致数据泄露、服务器被入侵等危害。风险资产位于内部网络（目标地址）。 | | `/ConfigRisk/Others` | 其他配置风险 | 其他配置风险事件告警。 | | `/ConfigRisk/Service` | 服务配置风险 | SSH、FTP等网络服务存在不安全配置，包括连接IP和方法不受限制、未设置最大登录尝试次数等。风险资产位于内部网络（目标地址）。 | | `/ConfigRisk/WeakPassword` | 弱密码配置风险 | 审计成功登录的弱密码事件；容易被攻击者猜测或暴力破解工具破解的密码被视为弱密码，如'123'、'abc'等。该账号/系统存在弱密码漏洞风险。受影响资产位于内部网络（目标地址）。 | | `/Credential/Forgery` | 凭证伪造 | 攻击者创建或修改凭证（如用户名和密码、数字证书、令牌等），在未经合法用户授权的情况下获取对系统或网络资源的未授权访问权限。 | | `/Credential/Others` | 其他凭证攻击 | 其他凭证攻击告警。 | | `/Credential/PTH` | 哈希传递攻击 | 攻击者通过获取用户的NTLM或LM哈希值（无需明文密码），访问Windows网络中的其他机器。该方法利用了Windows域环境中的哈希传递机制，使攻击者无需用户实际密码即可访问受保护资源。 | | `/Credential/PTK` | 凭据PTK攻击 | 攻击者获取用户的加密密钥，并利用该密钥加密发送至系统的数据，借此访问受限资源并执行敏感操作。 | | `/Credential/PTT` | 票据传递攻击 | 攻击者获取或窃取Kerberos系统中用于身份验证的票据，随后利用这些票据代表合法用户访问网络资源。 | | `/Credential/Steal` | 凭据窃取 | 攻击者通过多种手段（如键盘记录、钓鱼攻击、社会工程等）获取用户登录凭据，随后利用这些凭据访问系统。 | | `/Credential/TokenHijacking` | 令牌劫持 | 攻击者拦截或复制用于身份验证的网络令牌（如OAuth令牌、JWT令牌等），随后利用这些令牌冒充合法用户执行操作。 | | `/DDOS/DDOS` | 分布式拒绝服务攻击 | 从外部网络发起的DDoS攻击，针对服务器或应用程序。包括：流量型DDoS、应用层DDoS等。主要攻击特征：流量异常激增、带宽饱和；接收来自不同来源的大量SYN包、UDP包等；存在反射型DDoS特征——源端口对应常见反射服务如NTP、DNS、SSDP、Memcached等。主要影响：网络瘫痪、服务中断及业务运营停摆。 | | `/DataLeakage/DataReconstruction` | 数据重构攻击 | 基于对聚合数据的访问权限，通过逆向工程手段获取个人用户记录或敏感基础设施记录的私有信息的攻击行为。 | | `/DataLeakage/Membership` | 成员推断攻击 | 旨在判定特定记录是否包含在用于统计操作的数据集或机器学习模型训练数据中的攻击行为。 | | `/DataLeakage/ModelTheft` | 模型窃取 | 恶意行为者未经授权访问或复制LLM模型，可能涉及对模型架构的逆向工程或专有算法与参数的提取，导致知识产权盗窃或未经授权的副本传播。 | | `/DataLeakage/Property` | 属性推断攻击 | 旨在从训练数据集中提取全局信息（如部分训练样本是否包含某些敏感属性）的攻击行为。 | | `/DataLeakage/Sensitive` | 敏感信息泄露 | 涉及PII个人身份信息、财务数据、PHI医疗健康信息或企业机密等敏感信息的泄露事件。 | | `/DataLeakage/SystemPrompt` | 系统提示提取 | 专门提取系统指令和提示信息。 | | `/DataLeakage/TrainingData` | 训练数据提取 | 通过成员推理或模型逆向工程等方法提取训练数据。 | | `/DataMisuse/Abroad` | 跨境数据传输 | 从海外地址访问国内数据，或主动将数据从国内地址传输至海外目的地。 | | `/DataMisuse/GovAudit` | 政府审计数据滥用 | 针对医疗行业特定系统，组织实体未经许可获取特定数据的行为。 | | `/DataMisuse/IllegalDataCollect` | 非法数据收集 | 违反个人信息监管政策或标准的风险警示，表明可能存在非法或不合规的个人信息收集行为。 | | `/DataMisuse/IllegalDataUse` | 非法数据使用 | 违反法律法规或其他相关规定，非法或不当执行数据处理操作。 | | `/DataMisuse/Others` | 其他数据滥用行为 | 其他数据滥用行为。 | | `/DataMisuse/OutDomain` | 跨域数据流动 | 数据从内部可信域流向外部不可信域。 | | `/DataSteal/APICrawling` | API数据爬取 | 当主体实体在单位时间内API访问次数超过阈值，且返回的指定类型数据结果去重计数超过一定阈值时触发。 | | `/DataSteal/DataDrip` | 数据渗出 | 在较长时间内小批量检索指定类型数据，总数据量达到一定阈值。 | | `/DataSteal/DatabaseConnect` | 数据库连接窃取 | 数据库连接窃取指攻击者获取数据库连接凭证以未经授权访问数据库的恶意行为，从而窃取敏感数据或执行未授权操作。 | | `/DataSteal/DatabaseDump` | 数据库转储窃取 | 通过数据库运维工具下载数据库文件，将数据从一个数据库迁移或复制到另一个数据库的行为。 | | `/DataSteal/Others` | 其他数据窃取 | 其他数据外泄活动。 | | `/DataSteal/UnauthorizedAccess` | 未授权访问 | 未授权访问指攻击者在未经适当授权的情况下非法访问系统或数据的行为，通常意图窃取或破坏数据。 | | `/DataTampering/FileTampering` | 文件篡改 | 文件篡改指攻击者未经授权修改、删除或破坏文件内容的行为。此类攻击可能导致数据损坏、信息泄露或系统不稳定。 | | `/DataTampering/HiddenLinkInjection` | 暗链注入 | 暗链注入指攻击者将恶意链接隐蔽插入网站页面的行为。这些链接通常对用户不可见，但会被搜索引擎爬虫索引，从而影响搜索结果、提升恶意网站排名或引导流量至恶意网站。暗链注入是一种数据篡改攻击，旨在利用网站可信度和流量为攻击者牟利，同时可能对被感染网站的搜索引擎优化（SEO）产生负面影响。 | | `/DataTampering/Others` | 其他数据篡改告警 | 其他数据篡改类告警。 | | `/DataTampering/WebsiteDefacement` | 网站篡改 | 网站篡改指攻击者未经授权修改或破坏网站内容的行为。通常涉及更改网站文本、图像或其他媒体内容以传播虚假信息、展示恶意消息、推广特定观点或品牌，甚至羞辱和损害网站声誉。网站篡改是常见的数据篡改攻击，旨在通过修改网页内容实现特定恶意目的。 | | `/DevOps/DatabaseError` | 数据库故障 | 数据库故障可分为以下类型，受影响的风险资产为内网环境（目的地址）：1. 事务内部故障 2. 系统故障 3. 介质故障 4. 计算机病毒故障。 | | `/DevOps/DeviceError` | 设备故障 | 设备故障可分为以下类型，受影响的风险资产为内网环境（目的地址）：设备在其生命周期内因磨损或操作使用暂时丧失规定功能。1. 突发性故障：突然发生的故障。发生时间随机且难以预测，导致设备功能完全丧失。2. 渐发性故障：因设备性能逐渐劣化引发的故障。进展缓慢且规律可循，导致功能部分丧失。 | | `/DevOps/HostError` | 主机故障 | 主机故障可分为以下类型，受影响的风险资产为内网环境（目的地址）：检测到的由各种原因导致的主机故障包括：1. 系统硬件问题，主要由SCSI卡、主板、RAID卡、HBA卡、网卡和硬盘等硬件设备引起。此类情况下需查明具体硬件故障细节并通过更换硬件解决。2. 外围硬件问题，主要由网络问题引起。此时应重点排查主机网络设备和网络参数。3. 主机软件问题，主要由系统内核漏洞、应用软件缺陷或驱动程序错误导致。解决方法包括升级内核、修复程序缺陷或更新驱动。4. 主机系统配置问题，主要由系统参数设置不当引起。可通过恢复系统默认设置或关闭防火墙解决。 | | `/DevOps/Others` | 运维其他事件 | 其他运维监控事件，风险资产为内网（目的地址）。 | | `/DevOps/WebError` | Web应用故障 | Web应用故障可分为以下类型，受影响风险资产位于内网环境（目的地址）：1. 因流量突增导致服务器负载过高引发的故障。2. 程序源代码运行时错误或代码逻辑缺陷导致的故障。3. 服务超时导致运行异常引发的故障。 | | `/Exploit/DOS` | 拒绝服务漏洞利用 | 拒绝服务(DoS)漏洞攻击指外部发起的针对系统服务、应用服务或终端软件的攻击，可导致系统崩溃、服务中断或应用故障。 | | `/Exploit/DeviceVul` | 设备漏洞利用 | 从外网发起的针对特定设备的漏洞攻击行为，包括：网络设备漏洞、安全设备漏洞、物联网设备漏洞、专用设备漏洞等。 | | `/Exploit/Others` | 漏洞利用其他事件 | 从外网发起的其他类型漏洞利用攻击事件。 | | `/Exploit/RemoteService` | 远程服务漏洞利用 | 针对网络远程服务（如远程桌面、数据库、文件共享等）的漏洞扫描和攻击尝试，旨在利用服务弱点获取目标系统控制权。 | | `/Exploit/Shellcode` | Shellcode利用 | 检测到特定shellcode通信的数据包特征或识别出包含shellcode签名的恶意文件。常见场景包括：反向shell载荷传输（内->外通信）；包含载荷的恶意文件（通过邮件外->内或下载链接内->外）等。 | | `/Exploit/SoftVul` | 软件漏洞利用 | 从外网发起的针对常见第三方软件（如浏览器、Office程序、Adobe应用）或服务器中间件（如Redis、Apache、Nginx）的漏洞攻击。 | | `/Exploit/SystemVul` | 系统漏洞利用 | 从外网发起的针对Linux、Windows等操作系统内核漏洞或原生应用漏洞的攻击。 | | `/IllegalData/CommercialViolations` | 商业违规 | 违反商业法律法规的内容。 | | `/IllegalData/DiscriminatoryContent` | 歧视性内容 | 对个人或群体表现出歧视、偏见或仇恨的内容。 | | `/IllegalData/InadequateSecurityRequirements` | 安全要求不足 | 在高安全服务类型中使用的生成式AI可能产生不准确或不可靠的内容。 | | `/IllegalData/RightsInfringement` | 权利侵犯 | 侵犯他人合法权益的内容，包括隐私侵犯、诽谤和声誉损害。 | | `/IllegalData/ViolatingSocialistCoreValues` | 违反社会主义核心价值观 | 与社会主义核心价值观相矛盾或削弱的内容。 | | `/InherentModelRisk/BehavioralConsistency` | 行为一致性缺陷 | 模型表现出不稳定、不一致的行为或无法可靠遵循指令，显示出失调迹象。 | | `/InherentModelRisk/KnowledgeDefects` | 知识缺陷 | 模型知识的准确性、时效性或安全性不足，包括过时信息或敏感训练数据的记忆。 | | `/InherentModelRisk/ReasoningLogic` | 推理逻辑缺陷 | 模型缺乏可靠的逻辑推理和因果推断能力，经常产生'幻觉'或荒谬结论。 | | `/InherentModelRisk/Robustness` | 鲁棒性缺陷 | 由于深度神经网络的非线性和大规模特性，AI系统易受复杂操作环境或恶意干扰影响，导致性能下降或决策错误。 | | `/InherentModelRisk/SocietalEthical` | 社会伦理缺陷 | 模型输出或行为包含偏见、歧视、有害内容或与人类价值观和伦理标准不符。 | | `/InherentModelRisk/UnsafeDesign` | 工具设计不安全 | 由于设计和/或实现不安全导致的LLM连接工具被利用，可能因意外、模糊或被操控的输出引发破坏性操作。 | | `/MITM/BGPHijackingAttack` | BGP劫持攻击 | 通过恶意宣告BGP路由来操纵互联网路径，实现误导拦截流量或篡改数据等目的。常见攻击手段包括广播虚假前缀宣告，使被攻陷路由器进一步污染其他路由器的路由信息，甚至可能传播至骨干网。 | | `/MITM/Others` | 中间人攻击其他类型 | 其他形式的中间人攻击 | | `/MITM/TrafficHijacking` | 流量劫持 | 攻击者非法截获并操纵网络流量，以获取敏感信息或控制网络资源。 | | `/MITM/WLANHijacking` | 无线局域网劫持 | 利用应用缺陷、协议漏洞及配置错误等安全隐患劫持WiFi流量的网络行为。例如劫持后可展示低俗广告和非法内容，或导致WiFi覆盖范围内大面积断网。 | | `/Malware/Backdoor` | 后门程序 | 在内网主机通信流量中检测到疑似后门程序通信特征。 | | `/Malware/Bot` | 僵尸病毒 | 在内网主机上检测到与僵尸病毒相关的恶意文件、进程或通信。 | | `/Malware/BrowserHijacker` | 浏览器劫持 | 内网主机存在浏览器劫持行为，通常用于篡改用户浏览器设置（如搜索页和主页），以实现定向广告投放或恶意流量重定向。 | | `/Malware/CheatProgram` | 作弊程序 | 内网主机正在运行作弊程序。这类工具虽为游戏或其他软件设计，但可能被恶意利用以获取敏感信息或控制系统。 | | `/Malware/Downloader` | 木马下载器 | 内网主机感染木马下载器，此类恶意软件会在受控系统下载并安装其他恶意程序。 | | `/Malware/Exploit` | 恶意利用工具 | 内部网络主机包含恶意利用工具。这些是专门设计用于利用已知系统或软件漏洞执行未授权操作的工具。 | | `/Malware/Fileless` | 无文件恶意软件 | 内部网络主机包含无文件恶意软件。 | | `/Malware/HackTool` | 黑客工具 | 内部网络主机包含黑客工具。这些是黑客用于渗透系统、窃取信息或执行其他恶意活动的工具。 | | `/Malware/Keylogger` | 键盘记录器 | 内部网络主机感染了键盘记录器。这是一种专门设计用于记录用户击键的恶意软件，用于窃取密码和其他敏感信息。 | | `/Malware/MacroVirus` | 宏病毒 | 内部网络主机感染了宏病毒。这类病毒通过利用文档编辑软件中的宏功能（如Microsoft Office中的VBA宏）进行传播。 | | `/Malware/MaliciousAdware` | 恶意广告软件 | 恶意广告是指通过在线广告平台发布的恶意内容，意图欺骗或诱骗用户。这些广告可能将用户重定向到恶意网站、下载恶意软件或泄露个人敏感信息。 | | `/Malware/MaliciousMail` | 恶意邮件 | 内部网络主机在收到的邮件中检测到恶意程序。这些程序具有恶意软件的特征，或在执行时可能下载并执行病毒、安装后门等。 | | `/Malware/MaliciousScript` | 恶意脚本 | 内部网络主机运行具有恶意行为特征的脚本，例如启用PowerShell或修改注册表项。 | | `/Malware/Miner` | 挖矿恶意软件 | 内部网络主机包含恶意挖矿文件、进程或挖矿通信。例如：1. 内部网络查询矿池域名（受害者：内部源地址，无攻击者）。2. 内部网络与矿池通信（内部 -> 外部，受害者源地址，无攻击者）。3. 终端检测到挖矿程序（资产IP为受害者，无攻击者）。4. 挖矿恶意软件回连C2（内部 -> 外部，外部目标地址为攻击者，罕见情况）。 | | `/Malware/Others` | 其他恶意软件 | 其他恶意软件告警。 | | `/Malware/PUP` | 恶意PUP程序 | 内网主机检测到流氓软件、广告软件、灰产软件或可疑程序的通信行为。例如：1. 流氓软件外泄机器信息；2. 广告软件回连C2服务器；3. 其他可疑软件通信模式。通常用于检测内到外的流量。 | | `/Malware/PenetrationTool` | 渗透工具 | 内网主机存在被恶意利用的渗透工具。这些工具本用于安全测试或渗透测试目的，但可能被非法用于攻击系统。 | | `/Malware/Prank` | 恶作剧程序 | 内网主机存在恶作剧程序。此类程序不会对系统造成严重损害，但可能执行如更改桌面背景或播放声音等恶作剧行为。 | | `/Malware/Ransomware` | 勒索软件 | 内网主机感染勒索软件。包括：1. 勒索软件通信（内→外）；2. 勒索软件域名查询（无攻击者参与）；3. 终端检测到勒索软件（资产IP为受害者，无攻击者参与）；4. 检测到其他勒索软件行为特征（如传播、访问Tor网络等）。 | | `/Malware/RootkitBootkit` | Rootkit/Bootkit病毒 | Rootkit和Bootkit均为旨在隐藏系统内恶意活动痕迹的恶意软件，使其难以检测和清除。Rootkit通常嵌入操作系统内核或系统文件以隐藏恶意进程、文件和注册表项；Bootkit则通过侵入系统启动过程，在系统启动时加载并执行恶意代码。 | | `/Malware/Spyware` | 间谍软件 | 内网主机流量中检测到间谍软件的通信特征。 | | `/Malware/Trojan` | 木马程序 | 检测到内网主机的木马通信活动。 | | `/Malware/TrojanDropper` | 木马释放器 | 内网主机存在木马释放器。此类程序本身不含恶意代码，但其用途是释放并激活其他木马程序。 | | `/Malware/VirTool` | 代码混淆工具 | 内网主机存在代码混淆工具。该工具用于混淆软件代码，使其难以理解和逆向工程，通常被用来隐藏恶意软件的真实意图。 | | `/Malware/Virus` | 传染性病毒 | 内网主机感染具有传染性的病毒。该病毒可感染可执行文件、文档文件等，使每个被感染文件均包含病毒代码。 | | `/Malware/VirusGenerator` | 病毒生成器 | 内网主机存在病毒生成器。该工具用于生成或创建新病毒，可能包含生成自定义病毒代码的功能。 | | `/Malware/Webshell` | 网页后门 | 内网主机存在网页后门文件。文件内容具有网页后门特征，或访问该文件可能导致执行系统命令、查看文件内容等操作。需区别于网络攻击/网页后门请求，若后门扫描探测或请求尝试来自外网，则应归类为网络攻击/网页后门请求。 | | `/Malware/Worm` | 网络蠕虫 | 检测到内网主机的网络蠕虫通信活动。 | | `/Others/Others` | 其他威胁类型 | 非攻击行为、业务相关异常活动等。通常风险较低且难以定性。 | | `/Phishing/EmailPhishing` | 钓鱼邮件 | 通过伪装成合法来源发送邮件，诱导收件人点击恶意链接或提供个人信息，以窃取敏感数据或实施恶意攻击。 | | `/Phishing/Others` | 其他钓鱼攻击 | 包括但不限于邮件钓鱼、社交媒体钓鱼、网站钓鱼等通过各类通信渠道实施的钓鱼攻击。 | | `/Phishing/SocialMediaPhishing` | 社交媒体钓鱼 | 通过社交媒体平台冒充可信个人或组织发送链接或文件，诱骗用户执行操作的钓鱼攻击。 | | `/Phishing/WebPhishing` | 网页钓鱼 | 创建模仿合法网站外观的欺骗性网页，诱骗用户输入登录凭证或信用卡信息等个人信息。 | | `/PromptInjection/Direct` | 直接提示注入 | 直接向模型发送覆盖指令的行为。 | | `/PromptInjection/Indirect` | 间接提示注入 | 通过污染模型检索的外部数据源（如网页、文档）实现的注入攻击。 | | `/Scan/HostScan` | 主机扫描 | 外部网络发起的针对IP段内服务器可用性的探测行为；通过ping或TCP连接尝试等方法确认目标IP是否在线并响应。攻击目标：服务器。 | | `/Scan/NetworkScan` | 网络扫描 | 网络扫描是指扫描网络上所有设备和系统的过程，以获取网络拓扑、设备状态和开放端口等信息。常用于安全审计、资产管理和漏洞检测，以识别潜在安全风险并优化网络配置。 | | `/Scan/Others` | 其他扫描 | 外部网络发起的其他类型的探测和扫描攻击事件。 | | `/Scan/PortScan` | 端口扫描 | 外部网络发起的针对服务器开放端口的扫描行为，表现出自动化行为特征。攻击目标：服务器。 | | `/Scan/Scanner` | 扫描器指纹 | 在外部网络扫描过程中检测到特定扫描器的指纹特征。攻击目标：服务器。 | | `/Scan/ServScan` | 服务扫描 | 外部网络发起的针对服务器开放服务的扫描行为。包括批量探测常见服务端口可用性，以及发送特定数据包检测服务端程序版本信息。攻击目标：服务器。 | | `/Scan/SystemScan` | 系统扫描 | 系统扫描是指对计算机系统进行全面检查和分析的过程，以检测漏洞、恶意软件、配置错误和其他潜在安全问题。通过系统扫描，可以识别并修复安全风险，确保系统的稳定性和安全性。 | | `/Scan/VulScan` | 漏洞扫描 | 外部网络发起的针对非Web应用的漏洞扫描，包括配置错误、系统漏洞和应用漏洞，表现出自动化行为特征。攻击目标：服务器。 | | `/Scan/WebScan` | Web扫描 | 外部网络发起的针对Web应用漏洞的扫描活动，包括敏感目录扫描、网站后门检测、爬虫扫描、SQL注入以及其他各种Web应用漏洞扫描，表现出自动化行为特征。攻击目标：Web业务系统。 | | `/SupplyChain/Artifacts` | 第三方插件风险 | 由存在漏洞或被恶意篡改的第三方库、框架、插件或扩展引入的安全威胁。 | | `/SupplyChain/Hardware` | 硬件平台风险 | 攻击者通过篡改、伪造或利用硬件设备和固件中的漏洞，破坏构建或运行在硬件上的AI系统的安全性。 | | `/SupplyChain/Infrastructure` | 基础设施入侵 | 针对支持AI开发和部署管道的基础设施（如云服务器、Kubernetes集群）的攻击。攻击者可能利用漏洞进行未经授权的访问，导致系统/网络被入侵或模型完整性被破坏。 | | `/SupplyChain/PoisonBackdoor` | 后门投毒 | 需要在被投毒样本和测试样本之间创建后门模式，要求同时控制训练和测试数据。 | | `/SupplyChain/PoisonData` | 数据投毒 | 操纵训练数据以破坏模型完整性。被污染的数据可能导致结果失真、输出偏颇、后门触发或用户信任丧失。 | | `/SupplyChain/PoisonModel` | 模型投毒 | 在模型部署前篡改或注入恶意代码。 | | `/SupplyChain/PoisonTarget` | 定向投毒 | 一种改变特定目标样本预测结果的攻击。控制训练标签的攻击者可通过标签翻转实现此目的。 | | `/SupplyChain/Software` | 软件开发工具风险 | 攻击者通过污染或利用AI项目开发的软件工具链依赖项，植入后门或漏洞。 | | `/SupplyChain/VectorEmbedding` | 向量与嵌入漏洞 | 使用LLM的RAG系统中存在的重大安全风险。向量/嵌入生成、存储或检索中的弱点可能导致恶意内容注入、输出操纵或敏感数据访问。 | | `/SuspEndpoint/Attack` | 可疑端点攻击 | 内部网络主机发起针对外部网络的漏洞利用、暴力破解、基于Web的攻击等行为。 | | `/SuspEndpoint/CommandAndControl` | 可疑端点命令与控制 | 命令与控制（C2）指攻击者远程发出指令并管理被入侵设备的行为，通常用于协调数据窃取、网络攻击或恶意软件传播等恶意活动。 | | `/SuspEndpoint/DefenseEvasion` | 可疑终端防御规避 | 内网主机发现尝试通过卸载/禁用安全软件、混淆/加密数据和脚本，或滥用可信进程来隐藏和伪装其恶意软件，以绕过检测的行为。 | | `/SuspEndpoint/ExternalScan` | 可疑终端外部扫描 | 由内网主机发起的一类针对外网的扫描行为，其目标为外部网络。 | | `/SuspEndpoint/FileTempering` | 敏感文件篡改 | 内网主机文件遭到篡改。敏感主机文件包括：应用安全配置文件、防火墙配置、网络服务配置等。篡改易导致安全防护失效、权限提升等危害。 | | `/SuspEndpoint/FilelessAttack` | 可疑终端无文件攻击 | 在内网主机发现系统上未创建文件，但执行了代码或修改了系统设置。这可能表明存在无文件攻击，攻击者直接在内存中执行恶意代码。 | | `/SuspEndpoint/ImageLoaded` | 可疑终端镜像加载 | 记录特定进程中加载的模块，包括加载进程、哈希值和签名信息。 | | `/SuspEndpoint/InformationGathering` | 可疑终端信息收集 | 内网主机检测到异常的本地信息收集行为。这可能表明攻击者正在收集本地系统信息，如用户列表和系统配置。 | | `/SuspEndpoint/OpAbnormaly` | 可疑终端操作异常 | 内网主机的异常操作，如日志删除、授予root权限等。 | | `/SuspEndpoint/Others` | 可疑终端其他异常行为 | 内网主机的其他异常行为。 | | `/SuspEndpoint/Persistence` | 可疑终端持久化 | 内网主机发现的持久化机制，如服务创建、注册表修改和文件系统变更，可能被用于确保攻击者在系统上的长期存在。 | | `/SuspEndpoint/PrivilegeEscalation` | 可疑终端权限提升 | 内网主机检测到用户账户尝试或成功提升权限，这可能表明攻击者正试图获取更高的系统访问权限以进行更广泛的攻击。 | | `/SuspEndpoint/ProcessInjection` | 可疑进程注入 | 内网主机检测到异常进程注入告警。恶意代码被注入到进程中，导致其与合法进程共享地址空间。 | | `/SuspEndpoint/RemoteExec` | 可疑远程执行 | 内网主机发现系统检测到尝试使用远程执行工具或恶意利用远程服务执行未授权命令或脚本的行为。 | | `/SuspEndpoint/RemoteService` | 可疑远程服务利用 | 检测到内网主机上运行未知远程服务，该服务可能包含已知漏洞，攻击者可利用其执行远程代码。 | | `/SuspEndpoint/ReverseShell` | 疑似反向Shell | 内网主机发现系统检测到内部进程与外部IP的异常通信，可能表明攻击者通过反向Shell技术远程控制受控主机。 | | `/SuspEndpoint/SuspCommand` | 可疑命令 | 内网主机检测到可疑命令告警。包括：1. 用户执行未授权或异常命令；2. 短时间内频繁执行特定命令，可能表明存在自动化攻击。 | | `/SuspEndpoint/SuspConnection` | 可疑连接 | 网络连接事件记录主机上的TCP/UDP连接，如攻击者扫描、恶意程序外联、隧道建立、横向移动及反向Shell连接等。 | | `/SuspEndpoint/SuspDriver` | 可疑驱动 | 内网主机加载未知或未签名驱动程序文件。 | | `/SuspEndpoint/SuspFile` | 可疑文件 | 在内网主机上检测到可疑文件。 | | `/SuspEndpoint/SuspOpenPort` | 可疑开放端口 | 内网主机上开放了非常见端口。 | | `/SuspEndpoint/SuspPipeEvents` | 可疑管道事件 | 创建命名管道时生成，恶意软件常利用命名管道进行进程间通信。 | | `/SuspEndpoint/SuspProcess` | 可疑进程 | 检测到内网主机存在可疑进程行为，包括：1.异常进程名、异常进程创建关系、异常进程命令行参数等；2.其他异常进程行为，如权限异常、状态异常、启动方式或频率异常等。 | | `/SuspEndpoint/SuspProcessAccess` | 可疑进程访问 | 当进程打开另一个进程时，报告进程访问事件。此操作通常涉及对目标进程地址空间的信息查询或读写操作。可检测读取进程内存内容的黑客工具（如Lsass.exe）以窃取凭证进行哈希传递攻击。 | | `/SuspEndpoint/SuspRegistry` | 可疑注册表 | 检测内网主机对注册表进行增删改等可疑操作。 | | `/SuspEndpoint/SuspThread` | 可疑线程 | 内网主机存在远程线程注入等行为。 | | `/SuspEndpoint/SuspiciousSpread` | 可疑终端传播 | 内网主机通过共享文件夹、可移动介质、远程拷贝等方式传播可疑代码。 | | `/SuspEndpoint/TraceEradication` | 可疑痕迹清除 | 内网主机发现系统存在删除、修改或隐藏日志文件、系统文件或痕迹清理工具的迹象，可能表明攻击者试图隐藏其活动。 | | `/SuspEndpoint/WMI` | 可疑WMI利用 | 内网主机检测到WMI利用告警。使用Windows管理规范(WMI)执行了未授权操作，可能用于信息收集或远程控制目的。 | | `/SuspTraffic/AccessAnomaly` | 可疑流量访问异常 | 内网主机检测到用户访问行为异常告警：用户访问行为偏离正常基线，或检测到异常域/服务访问。 | | `/SuspTraffic/MaliciousCert` | 可疑恶意证书 | 内网主机安装恶意证书或访问携带恶意证书的URL。例如：1.通过SSL/TLS证书信息检测访问恶意HTTPS网站；2.通过证书的SNI信息检测可疑域名。内网->外网。 | | `/SuspTraffic/MaliciousDomain` | 可疑恶意域名 | 内网主机请求恶意域名。恶意域名包括挖矿域名、C2域名、钓鱼域名及：1.可疑动态域名，如3322、org；2.内网穿透代理域名，如ngrok域名；3.疑似DGA域名；4.其他类型可疑域名。 | | `/SuspTraffic/MaliciousIP` | 恶意IP地址 | 内网主机与恶意IP通信。恶意IP包括矿池IP、黑产IP等。 | | `/SuspTraffic/Others` | 可疑流量其他 | 内网主机发起的可疑通信。包括：可疑会话连接、异常协议数据包、与4444/2745等可疑端口的通信行为。 | | `/SuspTraffic/RemoteCtrl` | 可疑远程控制流量 | 内网主机与C2服务器通信，检测流量中的远程控制特征及可疑响应，例如：1. 内网向外网发送命令行标识信息（如cmd/powershell）；2. 内网执行常见命令后向外网传输回显信息；3. 检测特定远程控制工具的通信特征。常见远程控制采用反向连接（内->外网），也存在正向连接（外->内网），受害者为内网主机。 | | `/SuspTraffic/RemoteService` | 可疑远程服务流量 | 远程服务异常流量指在远程服务连接过程中检测到的异常或可疑网络流量，可能表明存在未经授权的访问尝试、数据泄露或其他恶意活动。 | | `/SuspTraffic/SuspContent` | 可疑内容 | 内网主机请求恶意服务（如挂马、仿冒、欺诈），或发送/接收的数据包内容包含钓鱼尝试、敏感信息等可疑元素。 | | `/SuspTraffic/SuspProtocol` | 可疑协议异常流量 | 可疑协议流量指检测到使用非常见或异常网络协议的流量，可能表明存在潜在安全威胁，如恶意活动或未经授权的通信。 | | `/SuspTraffic/TrafficAnomaly` | 可疑流量异常 | 内网主机检测流量异常告警：网络流量偏离正常基线。 | | `/SuspTraffic/Tunnel` | 可疑隧道流量 | 内网主机发送或接收隧道通信数据包。隧道协议将其他协议的数据帧或数据包封装在新的数据包头中进行传输，到达目的地后解封装并转发至实际目标。例如HTTP隧道、DNS隧道和VPN等。例如：1. 检测隧道通信流量特征，如DNS隧道；2. 识别常见隧道工具特征，包括代理隧道/隐蔽隧道。内网\u003C->外网，源地址可能不同。 | | `/WebAttack/BypassAccCtrl` | Web攻击绕过访问控制 | 外网发起的针对权限提升漏洞的攻击行为，包括水平权限提升尝试、认证绕过漏洞尝试及其他类似类型。 | | `/WebAttack/CRLF` | Web攻击CRLF注入 | 外网发起的HTTP CRLF注入攻击。HTTP协议使用CRLF符号（回车换行）进行分隔。攻击者在请求中注入恶意换行符以绕过网站安全检查。 | | `/WebAttack/CSRF` | Web攻击-CSRF | 从外部网络发起的跨站请求伪造(CSRF)攻击，利用合法用户的cookie伪造身份请求访问网站。 | | `/WebAttack/CodeInjection` | Web攻击-代码注入 | 从外部网络发起的攻击行为，利用中间件、框架或Web组件漏洞注入精心构造的可执行代码(如Java、PHP等)，实现服务器远程命令执行。 | | `/WebAttack/CommandExec` | Web攻击-命令执行 | 从外部网络发起的攻击，利用具有系统命令执行功能的Web应用，通过命令拼接、黑名单绕过等技术实现服务器任意系统命令执行。 | | `/WebAttack/DirTraversal` | Web攻击-目录遍历 | 由于Web服务器配置不当或Web应用对用户输入文件名安全性校验不足导致的安全漏洞，外部攻击者可通过特殊字符绕过服务器安全限制，尝试访问任意文件(包括Web根目录之外的文件)、读取敏感文件甚至执行系统命令。 | | `/WebAttack/FileDownload` | Web攻击-文件下载 | 攻击者利用系统或应用漏洞从目标系统非法下载敏感或恶意文件。通过文件下载行为，攻击者可能获取系统信息、窃取用户数据或传播恶意软件。 | | `/WebAttack/FileParsingVul` | Web攻击-文件解析漏洞 | 中间件(如IIS、Apache、Nginx等)在文件解析过程中存在漏洞，攻击者可利用该漏洞实现未授权文件解析。 | | `/WebAttack/FileRead` | Web攻击-文件读取 | 攻击者访问服务器上的文件，可能获取敏感信息、执行任意命令或破坏系统。 | | `/WebAttack/FileUpload` | Web攻击-文件上传 | 从外部网络发起的攻击行为，利用文件上传功能绕过或未充分校验用户输入，导致直接上传恶意文件。 | | `/WebAttack/FileWrite` | Web攻击-文件写入 | 攻击者利用系统或应用漏洞非法写入恶意文件或植入恶意代码，可能通过文件写入行为实现系统入侵、权限提升或执行恶意操作。 | | `/WebAttack/Hotlinking` | Web攻击-盗链 | 攻击者在外站引用目标网站资源，造成目标网站资源被非法使用或耗尽。 | | `/WebAttack/InfoLeak` | Web攻击-信息泄露 | 由于Web服务器配置不当，外部攻击者利用漏洞获取服务器敏感信息。敏感信息包括密码、密钥、证书、会话标识符、许可证、私有数据（如短信内容）、授权凭证、个人数据，以及程序文件、配置文件、日志文件、备份文件等。注意与横向移动/敏感数据泄露类型的区分。 | | `/WebAttack/LFI` | Web攻击-本地文件包含 | 外部网络发起的攻击利用目标应用中实现的动态文件包含机制，通过操控提交参数控制应用运行时路径指向本地敏感文件，可能实现敏感文件泄露、篡改或写入webshell等功能。 | | `/WebAttack/MemoryShell` | Web攻击-内存马 | 内存驻留型恶意软件（内存马）攻击指攻击者将恶意代码注入目标系统内存，创建常驻内存的恶意程序以实现对系统的长期控制。内存马攻击通常难以通过传统文件系统扫描和杀毒软件检测，因其在磁盘上不留痕迹。该攻击方式常用于窃取敏感信息、执行远程控制或破坏系统功能的网络攻击中。 | | `/WebAttack/Others` | Web攻击-其他类型 | 外部IP发起的其他类型Web攻击行为。 | | `/WebAttack/RFI` | Web攻击-远程文件包含 | 外部发起的攻击利用目标应用中实现的动态文件包含机制，通过操控提交参数控制应用运行时引用远程服务器上的恶意文件路径，可能实现远程代码执行、植入webshell等恶意功能。 | | `/WebAttack/SQLInjection` | Web攻击-SQL注入 | 外部网络针对Web应用或Web框架发起的SQL注入攻击。 | | `/WebAttack/SSRF` | Web攻击-SSRF | 外部网络发起的服务端请求伪造（SSRF）攻击。攻击者伪造服务端请求向与其通信的内网主机发送数据，通常用于从外网探测或攻击内网服务。 | | `/WebAttack/WebTempering` | Web攻击-网页篡改 | 外部攻击者利用漏洞或植入的webshell，通过注入钓鱼链接、违禁内容、暗链、欺诈材料等方式尝试篡改合法网页。 | | `/WebAttack/WebshellRequest` | Web攻击-Webshell请求 | 外部攻击者尝试访问webshell以进行命令控制、文件查看等操作。注意与恶意程序/webshell后门的区分；此处主要包括webshell请求尝试和webshell页面扫描。已确认的webshell通信（如服务端响应webshell命令、服务端返回webshell单行命令或webshell木马特征）应归类至恶意程序类别。 | | `/WebAttack/WebshellUpload` | Web攻击-Webshell上传 | 攻击者尝试上传webshell后门文件以获取目标服务器控制权。 | | `/WebAttack/XSS` | 跨站脚本攻击 | 从外部网络发起的跨站脚本(XSS)攻击。通过利用Web开发过程中遗留的漏洞，将恶意JavaScript代码注入网页，攻击访问该站点的正常用户的浏览器。 | | `/WebAttack/XXE` | XML外部实体注入攻击 | 从外部网络发起的XXE(XML外部实体)注入攻击。当允许外部实体引用时，构造恶意内容可导致任意文件读取、系统命令执行、内网端口扫描及对内网Web服务的攻击。 |  | `ruleName` | 规则名称 | `string` | OPTIONAL | 规则名称是安全规则的描述性标识。该字段为字符串类型，建议使用简洁、明确且能概括规则内容的名称。名称中可包含漏洞编号、攻击类型或防护对象等关键信息，以提高可读性和识别度。 | | `attackerAddress` | 攻击者 | `string` | OPTIONAL | 发起威胁攻击的攻击者源IP地址，格式要求：必须是符合IPv4或IPv6标准的IP地址格式，例如IPv4的点分十进制表示法（如192.168.22.35）或IPv6的冒号分隔十六进制表示法。 | | `victimAddress` | 受害者 | `string` | OPTIONAL | 受害者IP地址，指遭受威胁攻击或风险影响的目标IP地址。格式要求：必须是符合IPv4或IPv6标准的IP地址格式，例如IPv4的点分十进制表示法（如192.168.22.35）或IPv6的冒号分隔十六进制表示法。 | | `subTechniqueName` | ATT&CK子技术名称 | `string` | OPTIONAL | 该字段表示攻击行为在MITRE ATT&CK框架中对应的具体攻击子技术的官方名称。名称格式应符合MITRE ATT&CK官方定义，通常为英文短语，采用驼峰命名法或空格分隔的单词组合，例如“Spearphishing Attachment”。 | | `suggestion` | 处置建议 | `string` | OPTIONAL | 该字段用于提供针对威胁攻击的标准化响应和修复建议指导，其内容为字符串文本。建议内容应清晰、专业、具有可操作性，用于指导安全人员或系统进行后续处置。 | | `victimPort` | 受害者端口 | `string` | OPTIONAL | 受害者网络服务端口号，表示遭受威胁攻击或风险影响的受害者服务所使用的端口。格式为端口号，取值范围为0-65535，多个端口号使用英文逗号分隔。 | | `attackerPort` | 攻击者端口 | `string` | OPTIONAL | 攻击者发起攻击时使用的网络端口号。格式为字符串，表示端口号数值，取值范围为0-65535，多个端口号使用英文逗号分隔。 | | `dataSetSize` | 数据集大小 | `long` | OPTIONAL | 数据集大小，指SQL查询返回的结果数据集在内存或网络传输中的估算大小，通常以字节为单位。该字段值为长整型（long），表示一个非负整数。 | | `sql` | SQL语句 | `string` | RECOMMENDED | SQL语句是提交给数据库执行的标准化查询语言，通常用于数据查询、插入、更新或删除操作。格式上，它必须是一个符合SQL语法规范的字符串，可以包含字母、数字、运算符、空格及特定的SQL关键字和符号。 | | `dbName` | 数据库名称 | `string` | RECOMMENDED | 数据库管理系统(DBMS)中数据库实例的逻辑名称。字段类型为字符串，命名应清晰标识特定数据库实例。 | | `dbType` | 数据库类型 | `string` | RECOMMENDED | 数据库管理系统(DBMS)的类型标识，用于指明所使用的具体数据库产品。常见取值包括但不限于：MYSQL, ORACLE, SQLSERVER, POSTGRESQL, MARIADB, DB2, MONGODB, REDIS等。 | | `relateUserName` | 关联用户名 | `string` | OPTIONAL | 该字段用于标识与主操作用户名存在关联关系的辅助用户名信息。 | | `relateAddress` | 关联IP | `string` | OPTIONAL | 关联IP是与主操作用户存在关联关系的辅助IP地址信息，用于记录三层关联情况下的网络地址信息。例如在数据库审计中的站库分离场景中，此字段可用于关联用户登录Web服务器时的网络地址。该字段值必须为有效的IPv4或IPv6地址格式。 | | `relateInfo` | 关联信息 | `string` | OPTIONAL | 关联信息字段用于描述与主操作用户名存在关联关系的各类信息。其内容为由分号分隔的键值对列表，每个键值对使用冒号分隔。键通常为大写英文字母组成的标识符，值则为对应的具体信息。其中，若值为IP地址，应符合IPv4或IPv6格式；若值为URL，应符合通用URL格式规范；若值为端口，应在0-65535范围内。其他信息应使用明确的字符串表示。 | | `osUser` | 操作系统用户名 | `string` | OPTIONAL | 在操作系统层面进行身份验证或执行操作的用户标识。该字段为字符串类型，通常由字母、数字、下划线、点或连字符等字符组成。 | | `eventCount` | 事件数量 | `long` | RECOMMENDED | 事件数量字段用于统计相同类型或相关事件的发生次数。通常为非负整数。 | | `destHostName` | 目标主机名 | `string` | OPTIONAL | 目标主机名（目标标识）指网络连接或安全事件中目标设备的网络标识，它可以是 DNS 主机名（含 FQDN）、NetBIOS 名称、本地主机名或 IP 地址；若访问时包含非标准端口，则通常应在标识后附加 :端口号（如 192.168.1.1:8080 或 host.example.com:8443）。 | | `hostAddress` | 主机IP | `string` | OPTIONAL | 主机IP地址，用于标识主机在网络中的位置。必须符合IPv4或IPv6地址格式规范。IPv4地址为点分十进制格式，由四个0-255的十进制数组成，以点分隔。IPv6地址为冒号分隔的十六进制数格式。 | | `processName` | 进程名称 | `string` | OPTIONAL | 进程可执行文件的基本名称，不包含路径信息。 | | `targetFilename` | 目标文件 | `string` | OPTIONAL | 目标文件是指系统操作或文件操作中涉及的文件的完整路径。格式要求：必须是有效的文件路径字符串，路径分隔符为正斜杠（/）或反斜杠（\\）。示例值：/data1/uacp/shell/uacpClient.sh。 |  ### 字段统计  - **总字段数**: 104 - **必填字段**: 15 - **推荐字段**: 22 - **可选字段**: 67  ### 数据类型分布  - **boolean**: 1 个字段 - **string**: 82 个字段 - **integer**: 3 个字段 - **enum**: 12 个字段 - **long**: 6 个字段",[2901,2903,2905,2907],{"label":83,"key":2902},"Database Audit System",{"label":67,"key":2904},"Network DLP System",{"label":157,"key":2906},"Endpoint DLP System",{"label":66,"key":2908},"API Risk Monitoring System",[],1776855178611]