01-01: File detected as malware |
01-02: File detected as safe (trusted) |
01-03: File detected as Potentially Unwanted Application (PUA) |
01-04: Parent-Child relation |
01-05: Domain of the url where the file is downloaded |
01-06: IP of the host where the file is download |
01-07: Url of the host where the file is download |
01-08: Hash of file dropped by malware |
01-09: .pcap formatted network analysis dump of malware files |
01-10: Phishing Email attachments |
02-01: Malware File Paths |
02-02: PUA File Paths |
02-03: Clean File Paths |
02-04: File paths WRD by malware |
02-05: Created process path by malware |
03-01: Domain hosting malware files |
03-02: Domain hosting Potentially Unwanted Application (PUA) files |
03-03: Domain hosting only safe files |
03-04: Spammer Domains |
03-05: Domain that send only promotional or spam emails |
03-06: Domains hosting at least one phishing URL |
03-07: Domain that send only clean emails |
03-08: Domain that send only mixed type emails |
03-09: List of email addresses on that domain that send only spam emails |
03-10: List of email addresses on that domain that send only promotinal or spam emails |
03-11: List of email addresses on that domain that send only phishing emails |
03-12: List of email addresses on that domain that send only clean emails |
03-13: List of email addresses on that domain that send only mixed emails |
03-14: Domain which sends emails to non-existing/unknown accounts |
03-15: Malware connecting to Domains |
03-16: Domains sending an email but has no MX record |
03-17: Domains that only safe files are connecting to |
03-18: Domain that are safe to send clean emails |
03-19: Malware Command and Control Server Domains |
03-20: Domains of drop sites for logs or stolen credentials |
03-21: Spyware Reporting Server Domains |
03-22: Questionable Gaming Site Domains |
03-23: Driveby Source Domains |
03-24: Chat Server Domains |
03-25: Tor Node Domains |
03-26: Known compromised or Hostile Domains |
03-27: P2P Node Domains |
03-28: Proxy Host Domains |
03-29: IP Check Services Domains |
03-30: Domains Target of a DDoS |
03-31: Domains Performing Scanning |
03-32: SSH or other brute forcer Domains |
03-33: Domains of Fake AV and AS Products |
03-34: Domains Related to a Dynamic DNS Entry or Request |
03-35: Abused or free TLD Related Domains |
03-36: Domains related to Self Signed SSL or other suspicious encryption |
03-37: Blackhole or Sinkhole Domains |
03-38: Domains related to GoToMyPC and similar remote access services |
03-39: DDoS Source Domains |
03-40: Reserved |
03-41: Domains of Malicious URLs in FLS |
03-42: ET All Feeds Unified |
03-43: Botnet Domains |
03-44: Suspicious Domains |
03-45: (Potentially Clean) Domains that shall be used as ignore list for blacklisting operations. |
03-46: Domains and the hashes of malwares related to that domain |
03-47: Domains and the hashes of malwares hosted by that domain |
03-48: Deceptive Domain - Targeted Brands |
03-49: Domains and related PUA hashes mapping |
04-01: IP hosting malware files |
04-02: IP hosting Potentially Unwanted Application (PUA) files |
04-03: IP hosting only safe files |
04-04: IPs that are blacklisted for sending only spam emails |
04-05: IPs that are whitelisted for sending only clean (ham) emails |
04-06: The range owner (as an organization) of the ip address |
04-07: Spammer IPs |
04-08: IP that send only promotional or spam emails |
04-09: IP that send only phishing emails |
04-10: IP that send only clean emails |
04-11: IP that send only mixed type (spam or clean) emails |
04-12: List of email addresses on that ip that send only spam emails |
04-13: List of email addresses on that ip that send only promotinal or spam emails |
04-14: List of email addresses on that ip that send only phishing emails |
04-15: List of email addresses on that ip that send only clean emails |
04-16: List of email addresses on that ip that send only mixed emails |
04-17: IPs that doesn't have a reverse DNS record |
04-18: IP address which sends emails to non-existing/unknown accounts |
04-19: Malware connecting to IP address |
04-20: IP address that only clean files are connecting to |
04-21: IP address that are sending only clean emails |
04-22: Malware Command and Control Server IPs |
04-23: Known Infected Bot IPs |
04-24: IPs of drop sites for logs or stolen credentials |
04-25: Spyware Reporting Server IPs |
04-26: Questionable Gaming Site IPs |
04-27: Driveby Source IPs |
04-28: Chat Server IPs |
04-29: Tor Node IPs |
04-30: Known compromised or Hostile IPs |
04-31: IPs of P2P Nodes |
04-32: IPs of Proxy Hosts |
04-33: IPs of IP Check Services |
04-34: IPs targeted by a DDoS Attack |
04-35: IPs of Hosts Performing Scanning |
04-36: SSH or other brute forcer IPs |
04-37: IPs of Fake AV and AS Products |
04-38: IPs Related to a Dynamic DNS Entry or Request |
04-39: Abused or free TLD Related IPs |
04-40: IPs related to Self Signed SSL or other suspicious encryption |
04-41: IPs of Blackhole or Sinkhole systems |
04-42: IPs of GoToMyPC and similar remote access services |
04-43: DDoS Source IPs |
04-44: IP that send only spam emails |
04-45: ET All Feeds Unified |
04-46: (Potentially Clean) IPs that shall be used as ignore list for blacklisting operations. |
04-47: IPs and the hashes of malwares related to that IP |
04-48: UDP IPs and the hashes of malware files connecting to that IP via UDP protocol |
04-49: IPs and hashes of related PUA files to that IP |
05-01: The business industry category of the range owner |
05-02: The range owner (as an organization) that sends spam emails |
05-03: The range owner (as an organization) that sends promotional emails |
05-04: The range owner (as an organization) that sends emails with unsub urls |
05-05: The range owner (as an organization) that sends phishing emails |
05-06: The range owner (as an organization) that sends clean emails |
05-07: The range owner (as an organization) that sends mixed emails |
06-01: URLs that redirects to malware files |
06-02: Final URLs that redirects to phishing files |
06-03: Landing URL that redirects to phishing files |
06-04: URL that redirects to Potentially Unwanted Application (PUA) files |
06-05: URLs that redirects to safe files |
06-06: URL that redirects to spam sites |
06-07: URL that redirects to unsubscription pages |
06-08: List of email addresses that send only spam emails that used this url |
06-09: List of email addresses that send only promotional emails that used this url |
06-10: List of email addresses that send only phishing emails that used this url |
06-11: List of email addresses that send only clean emails that used this url |
06-12: List of email addresses that send only mixed emails that used this url |
06-13: Malware connecting to url |
06-14: Url classified as high risk url |
06-15: Url classified as spyware |
06-16: Regular expressions of phishing urls |
06-17: Url that only clean (safe) files are connecting to |
06-18: List of urls that are used to check certificate revocations lists |
06-19: URL patterns of malware files |
06-20: URL patterns extracted from urls that malware connect to |
06-21: URLs that are used to check certificate revocations via CRL |
06-22: Malicious URLs in FLS |
06-23: URL confidence score calculation |
06-24: URLs and the hashes of malwares related to that URL |
06-25: URLs and the hashes of malwares hosted at that URL |
06-26: Deceptive URL - Targeted Brands |
06-28: URLs and hashes of related PUA files |
07-01: Registrant Organization that send only spam emails |
07-02: Registrant Organization that send only promotional or spam emails |
07-03: Registrant Organization that send only phishing emails |
07-04: Registrant Organization that send only clean emails |
07-05: Registrant Organization that send only mixed type (spam or clean) emails |
08-01: Trusted Vendor List |
08-02: Grey Vendor List (that produces only PUA Files) |
09-01: Code Signing Certificate that are used to sign only safe files |
09-02: Code Signing Certificate that are used to sign only PUA files |
10-01: Code snippets that are used to initiate malicious activities (fileless malwares) |
11-01: Registry entries that are used to initiate malicious activities (fileless malwares) |
11-02: Registry entries QOWD by malware |
12-01: Email address that sends only spam emails |
12-02: Email address that sends only promotional or spam emails |
12-03: Email address that sends only phishing emails |
12-04: Email address that sends only clean emails |
12-05: Email address that sends any kind of emails (spam and clean mixed) |
12-06: Email address which sends emails to non-existing/unknown accounts |
12-07: Email address of which is replied from another user |
12-08: Email address that sends emails with image-only content |
12-09: Email address that's seen only today |
13-01: Common subjects of spam emails |
13-02: Common subjects of promotional emails |
13-03: Common subjects of phishing emails |
13-04: Subjects of phishing emails and email counts |
14-01: Common attachment names of spam emails |
14-02: Common attachment names of promotional emails |
14-03: Common attachment names of phishing emails |
15-01: Domain name of which is replied from another domain's user |
16-01: List of texts of urls in spam emails |
16-02: List of texts of urls in promotional emails |
16-03: List of texts of urls in phishing emails |
17-01: A list of relation, between email address and domains of urls found in the email |
18-01: Human readable strings in malware binaries |
19-01: Mutexes created by malware files |
20-01: Payload hashes of malware HTTP requests |
20-02: PE section hashes of malware files |
21-01: Windows Services Created/Stopped/Started by malware |