Monitor Fields

DTM Monitor & Research Tools Fields | Docs

Excerpt

When creating Monitors in Digital Threat Monitoring (DTM), the Topics you select for your Monitor Conditions are actually search groups. These search groups match your values against a set of related entity types making it easier to build effective Monitors.


When creating Monitors in Digital Threat Monitoring (DTM), the Topics you select for your Monitor Conditions are actually search groups. These search groups match your values against a set of related entity types making it easier to build effective Monitors.

For example, using the Network Information topic with a must contain Operator and a value of acme.com would match if acme.com was found in a domain name, URL, or Typosquatted domain. This is because the Network Information topic searches across all of those entity types.

The following table includes the available fields in the monitors and the type of data you should enter.

Monitor TopicMonitor API TopicMonitor Matches on Topics &
Research Tools Entities
Description
Bank Identification Numbergroup_binbinComplete Bank Identification Number
bin_foreignForeign (non-US) Bank Identification number
bin_partialPartial Bank Identification number
Brandgroup_brandidentity_nameA name of a person, place, company, or thing
nameA name of a person, place, company, or thing
organizationThe name of an organization
productThe name of a product
brandBrand name or trademark
product_batch_nameA batch number for a product
Cryptogroup_cryptoatom_addressWallet address for the Cosmos (ATOM) cryptocurrency
bch_addressWallet address for the Bitcoin Cash (BCH) cryptocurrency
btc_addressWallet address for the Bitcoin (BTC) cryptocurrency
dash_addressWallet address for the Dash cryptocurrency
doge_addressWallet address for the Doge cryptocurrency
ltc_addressWallet address for the Litecoin cryptocurrency
xlm_addressWallet address for the Stellar (XLM) cryptocurrency
xmr_addressWallet address for the Monero (XMR) cryptocurrency
zec_addressWallet address for the Zcash (ZEC) cryptocurrency
Filenames & Pathsgroup_pathsfilenameA name or identifier for a file
pathA location of a file or folder on a filesystem
registry_keyA path in the Windows registry
Free Text Searchkeyword
Will text search all fields of the document for the given keyword(s)
Hashgroup_hashmd5_hashA MD5 cryptographic hash
sha1_hashA SHA1 cryptographic hash
sha256_hashA SHA256 cryptographic hash
Industrylabel_industrylabel_industryIndustry code of the affected industries of the original document
{
  'ind.aeromil': 'Aerospace and Defense',
  'ind.agri': 'Agriculture',
  'ind.auto': 'Automotive',
  'ind.chemmat': 'Chemicals & Materials',
  'ind.civil': 'Civil Society & Non-Profits',
  'ind.constructeng': 'Construction & Engineering',
  'ind.edu': 'Education',
  'ind.energyutils': 'Energy & Utilities',
  'ind.fin': 'Financial Services',
  'ind.gov': 'Governments',
  'ind.health': 'Healthcare',
  'ind.hosp': 'Hospitality',
  'ind.legalprofserv': 'Legal & Professional Services',
  'ind.manuf': 'Manufacturing',
  'ind.mediaentertain': 'Media & Entertainment',
  'ind.oilgas': 'Oil & Gas',
  'ind.pharma': 'Pharmaceuticals',
  'ind.retail': 'Retail',
  'ind.tech': 'Technology',
  'ind.telecom': 'Telecommunications',
  'ind.transport': 'Transportation'
}
Languagelabel_languagelabel_languageTwo-character ISO 639-1 language code specifying the detected language type
Locationsgroup_locationcityA city or locality name
countryA country or nationality name
location_nameThe name of a physical place or location
Lucene Text Query (Advanced)lucene
Searches all text fields of documents based on the Lucene query syntax
For more information about using Lucene in DTM, see Lucene Queries in DTM
Mime-Typelabel_typelabel_typeDetected MIME type of the originating document. Valid types include: application/font-sfnt, application/javascript, application/json, application/octet-stream, application/pdf, application/pgp-keys, application/postscript, application/vmd.ms-opentype, application/appleworks3, application/dosexec, application/x-empty, application/x-sqlite3, application/x-tar, application/x-wine-extension-ini, application/x-xar, image/gif, image/svg, image/xvg+xml, image/x-portable-greymap, message/news, message/rfc822, text/html, text/plain, text/troff, text/x-asm, text/x-awk, text/x-c, text/x-c++, text/x-diff, text/x-fortran, text/x-java, text/x-lisp, text/x-m4, text/x-makefile, text/x-ms-regedit, text/x-mdos-batch, text/x-objective-c, text/x-pascal, text/x-perl, text/x-php, text/x-po, text/x-python, text/x-ruby, text/x-shellscript, text/x-tex, text/xml, text/x-sgi-movie
Network Informationgroup_networkdomainAn RFC1035 domain name
ipv4_addressAn IPv4 Address
ipv6_addressAn IPv6 Address
typosquatted_domainAccepts a plain fully qualified domain name (not URL's) and will attempt to detect and alert when similar domains are registered
urlAn RFC1738 uniform resource locator (URL)
Person or Identitygroup_identityclient_identifierAn OpenID client identifier
email_addressAn RFC5322 e-mail address
identity_nameA name of a person, place, company, or thing
nameA name of a person, place, company, or thing
phone_numberA partial or complete phone number
telegram_user_nameA username for the Telegram messaging platform
twitter_handleA user name for the Twitter platform
Search Collection Typedoc_typedoc_typeThe specific document type to match, valid types include:
  • Compromised Credentials
  • Document Analysis (supported in API only)
  • Domain Discovery
  • Email (supported in API only)
  • Forum Posts
  • Messages
  • Pastes
  • Shop Listings
  • Web Content
Threat Typelabel_threatPre-defined listThreat specifier of the original document. Valid types include:
  • information-security/anonymization: Anonymization
  • information-security/apt: Advanced Persistent Threat
  • information-security/botnet: Botnet
  • information-security/compromised: Compromised Infrastructure
  • information-security/doxing: Personal Information Disclosure
  • information-security/exploit: Exploit
  • information-security/health-risk: Health Risk
  • information-security/information-leak: Information Leak
  • information-security/information-leak/confidential: Confidential Document Leak
  • information-security/information-leak/credentials: Credential Leak
  • information-security/information-leak/payment-cards: Credit Cards
  • information-security/malicious-activity: Malicious Activity
  • information-security/malicious-infrastructure: Malicious Infrastructure
  • information-security/malware -> Malware
  • information-security/malware/ransomware: Ransomware
  • information-security/malware/ransomware-victim-listing: Ransomware Victim Listing
  • information-security/phishing: Phishing
  • information-security/security-research: Security Research
  • information-security/spam: Spam
Threat Intelgroup_threatscveA Common Vulnerabilities and Exposures (CVE) Identifier
threat_group_nameThe name of a threat group
threat_nameThe name of a particular type of threat
service_nameThe name of a service
cweA Common Weakness Enumeration (CWE) Identifier
Tokens & Keygroup_keysaccess_tokenAccess token used by applications to authenticate against protected resources
crypto_key_privateAsymmetric cryptography private key
crypto_key_publicAsymmetric cryptograph public key
password_plaintextA detected plaintext password
predict_password_plaintextA detected plaintext password (lower confidence)