This document provides a data dictionary for the data stored in the following NoSQL MongoDB databases:
assessment
- Risk/Vulnerability Assessment (RVA) management datacyhy
- Cyber Hygiene port and vulnerability scanningpca
- Phishing Campaign Assessment management datascan
- Domains gathered from Cyber Hygiene, GSA, the End of Term Web Archive, or self-reported
- SPF/DMARC/STARTTLS trustworthy email scanning
- HTTPS web server scanning
- SSL server scanning
- Certificates and pre-certificates from Certificate Transparency logs
This information is organized by database and collection (table).
- cves Collection
- host_scans Collection
- hosts Collection
- kevs Collection
- notifications Collection
- places Collection
- port_scans Collection
- reports Collection
- requests Collection
- snapshots Collection
- tallies Collection
- tickets Collection
- vuln_scans Collection
- applications Collection
- assessments Collection
- campaigns Collection
- clicks Collection
- customers Collection
- emails Collection
- templates Collection
- user_reports Collection
- users Collection
- certs Collection
- domains Collection
- https_scan Collection
- precerts Collection
- sslyze_scan Collection
- trustymail Collection
_id
[ObjectId]: Assessment ID (RV0XXX for RVA/HVA/PCA or VR0XXX for VADR)appendix_a_signed_date
[ISO date]: Date Appendix A was signedappendix_a_signed
[boolean]: Was Appendix A signed?appendix_b_signed
[boolean]: Was Appendix B signed?assessment_completed
[ISO date]: Date when assessment was completedassessment_name
[string]: Assessment Name (Usually customer name and assessment type)assessment_status
[string]: Assessment Status (Open -> Planning -> Testing -> Reporting -> Wrap Up -> Completed)assessment_summary
[string]: Assessment Summary (ASMT_ID / ASMT_NAME)assessment_type
[string]: Assessment Type (RVA, HVA, RPT, PCA, VADR)ci_systems
[list]: If any subsystems assessed belong to a different critical infrastructure category from theci_type
field, it will be listed here (For example, Hoover Dam would beci_type: CI_WATER
andci_systems: [CI_ENERGY]
for electric)ci_type
[string]: Critical Infrastructure Type (Selected from among 16 CI Sectors)contractor_count
[integer]: Number of contractors assignedcreated
[ISO date]: Date ticket was createddraft_completed
[ISO date]: Date when draft report is sent to the customerelection
[boolean]: Is this assessment election-related?external_testing_begin
[ISO date]: Date of beginning of external testingexternal_testing_end
[ISO date]: Date of end of external testingfed_count
[integer]: Number of Federal operators assignedfed_lead
[string]: Federal Team Lead assigned to the assessmentgroup_project
[string]: Group or Projectinternal_testing_begin
[ISO date]: Date of beginning of internal testinginternal_testing_city
[string]: Location (city) of on-site testing, if applicableinternal_testing_end
[ISO date]: Date of end of internal testinglast_change
[ISO date]: Last update datemanagement_request
[string/boolean]: Source (if any) for assessments requested by management (DHS, NCCIC, EOP, false)mandated_category
[string/boolean]: Category (if any) for mandated assessments (Aviation, Elections, FERC, HI, Pipeline, EOP, false)operators
[list]: List of operator names (contractor or federal)report_final_date
[integer]: Date when report is marked Finalrequested_services
[list]: NCATS services requested for this engagementroe_number
[integer]: ROE Number (assigned by NCATS)roe_signed
[boolean]: ROE Signedroe_signed_date
[ISO date]: Date ROE is signedsector
[string]: Fed/State/Local/Tribal/Territorial/Critical Infrastructurestakeholder_id
[string]: TBDstakeholder_name
[string]: Stakeholder Namestakeholder_state
[string]: State where stakeholder is locatedtesting_begin
[ISO date]: Date when all testing beginstesting_complete
[ISO date]: Date on which all testing is completedtesting_phase
[list]: The currently-active phase(s) of testing
_id
[ObjectId]: Unique key for DB to identify individual findingAssessment Type
[string]: Type of Assessment [RVA, HVA, RPT]CI Subtype
[string]: Identifies which of 16 Critical Infrastructure sectors customer belongs to, if anyCustom Finding Name
[string]: Custom name for finding identified by Fed Team Lead, if applicableDefault Finding Severity
[string]: Default level of severity for this type of finding. Please see notes in Severity for more info on how Fed Team Leads assign severity ratings.FED/SLTT/CI
[string]: Customer SectorFY
[string]: Fiscal Year during which testing was conducted. Due to ever-changing cybersecurity landscape, more current data is recommended when conducting analysisInt/Ext
[string]: Was the finding identified during Internal or External testing?Man/Tool
[string]: Was the finding identified manually or with a tool (Burp Suite, Cobalt Strike, Nessus, etc.) Tool will not be identifiedMitigate Finding Response Date
[ISO date]: Date on which customer responded with Mitigation dataMitigated Finding Status
[string]: Mitigation status as reported by customer during 180-day mitigation survey. Note-survey is optional and self-reported, no validation performed by NCATS that mitigations were performed as stated. Please be careful using this metric.Name
[string]: Name of FindingNCATS ID
[integer]: Standard number assigned by NCATS to the Finding NameNCSF
[array]: This array will list which controls in the NICE Cybersecurity Framework are applicable to the finding identified. This is a more universal standard than NIST 800-53NIST 800-53
[array]: This array will list which controls in NIST 800-53 are applicable to the finding identified. As NIST 800-53 is a Federal standard, this is more applicable for Federal customersRVA ID
[string]: Assessment ID during which finding was identified. Note - this number identifies the customer when paired with information from Assessments collection. This number is provided with Findings info to identify unique assessments.Service
[string]: RVA service during which finding was identifiedSeverity
[string]: Ranking of severity assigned by Fed Team Lead. Severity can vary depending on importance of the system, or other environmental factors [Low, Medium, High, Critical]Std Text Modify
[string]: Was there a custom Finding name provided?
The data in this collection is derived from the National Vulnerability Database CVE feeds.
_id
[string]: Common Vulnerabilities and Exposures identifiercvss_score
[decimal]: CVSS base scorecvss_version
[string]: CVSS version used for the CVSS base scoreseverity
[decimal]: CVSS severity rating
The data in this collection is derived from IP addresses supplied by the CyHy stakeholders.
_id
[ObjectId]: Internal database id of this host scan documentaccuracy
[integer]: Confidence rating by scanner in OS class guessclasses
[list of dictionaries]: Guesses for OS class (comes directly from scanner; see nmap details here)hostname
[string]: Hostname, if one was detectedip
[string]: IP address that was scannedip_int
[long integer]: Integer version of IP address that was scannedlatest
[boolean]: Is this the latest scan of this host?line
[integer]: Line number in the nmap OS database corresponding to the OS class guessname
[string]: Type of host detected (best guess, comes directly from scanner)owner
[string]: Organization that claims the IP address associated with this scansnapshots
[list of ObjectIds]: Snapshots that include this scansource
[string]: Source of the scan (e.g. "nmap")time
[ISO date]: Timestamp indicating when the scan occurred
The data in this collection is derived from IP addresses supplied by the CyHy stakeholders.
_id
[long integer]: Integer version of this host document’s IP addressip
[string]: IP address corresponding to this host documentlast_change
[ISO date]: Timestamp indicating when this host document was last updatedlatest_scan
[dictionary]: Timestamps indicating last time host completed each scan stageloc
[list]: Longitude and latitude of host, according to geolocation databasepriority
[integer]: Scan priority of this host document, from -16 (most urgent) to 1 (least urgent)- -16: Most severe vulnerability detected on this host is Critical severity
- -8: Most severe vulnerability detected on this host is High severity
- -4: Most severe vulnerability detected on this host is Medium severity
- -2: Most severe vulnerability detected on this host is Low severity
- -1: No vulnerabilities detected on this host
- 1: Host document represents a "dark space" IP address; i.e. live host not detected
next_scan
[ISO date]: Timestamp indicating when this host document is scheduled to be scanned next; a value of null indicates that the host document has a status other than "DONE" (i.e. currently queued up for a scan or running a scan)owner
[string]: Organization that claims the IP address associated with this host documentr
[decimal]: A random number between 0 and 1 used to randomize scan orderstage
[string]: Current scan stage for this host document- "NETSCAN1" - Port scan of top 30 most-common ports
- "NETSCAN2" - Port scan of next 970 most-common ports
- "PORTSCAN" - Full port scan of all 65,535 ports
- "VULNSCAN" - Vulnerability scan
state
[dictionary]: Current state of this host document- reason [string]: Reason given by the port scanner as to whether or not this host document represents a live host
- up [boolean]: Whether or not a live host was detected at this host document’s IP address by the port scanner
status
[string]: Current scan status for this host document:- "WAITING" - Waiting to be for scanning
- "READY" - Ready to be assigned to a scanner
- "RUNNING" - Currently being scanned
- "DONE" - Latest scan has completed
The data in this collection is derived from the JSON feed of the CISA Known Exploited Vulnerabilities Catalog.
_id
[string]: Common Vulnerabilities and Exposures identifier for a Known Exploited Vulnerability (KEV)known_ransomware
[boolean]: Is the vulnerability in this KEV known to have been leveraged as part of a ransomware campaign?
The data in this collection is generated as part of Cyber Hygiene, whenever a new ticket is created after detection of a Critical or High-severity vulnerability, or detection of a potentially-risky service.
_id
[ObjectId]: Internal database id of this notification documentgenerated_for
[list]: Organizations that have already generated a notification PDF document that includes the data from the ticket referenced in this notificationticket_id
[ObjectId]: Internal database identifier for the ticket that this notification refers toticket_owner
[string]: The organization that owns the ticket that this notification refers to
The data in this collection is derived from the "Government Units" and
"Populated Places" Topical Gazetteers files
from USGS.
Please see the File formats for Domestic Geographic Names
document
for more information about the data in these fields.
_id
[long integer]: Feature ID corresponding to this placename
[string]: Full name of this placeclass
[string]: Class of this place ("COUNTY", "STATE", "Populated Place", "Civil")state
[string]: Two-letter postal abbreviation of the state where this place isstate_fips
[string]: FIPS code for the state where this place isstate_name
[string]: Full name of the state where this place iscounty
[string]: Full name of the county where this place iscounty_fips
[string]: FIPS code for the county where this place iscountry
[string]: Two-letter abbreviation of the country where this place iscountry_name
[string]: Full name of the country where this place islatitude_dms
[string]: Latitude of this place, in degrees, minutes, and seconds in the format DDMMSS(N/S)longitude_dms
[string]: Longitude of this place, in degrees, minutes, and seconds in the format DDDMMSS(E/W)latitude_dec
[decimal]: Latitude of this place, in decimal degreeslongitude_dec
[decimal]: Longitude of this place, in decimal degreeselevation_meters
[integer]: Elevation of this place, in meterselevation_feet
[integer]: Elevation of this place, in feet
The data in this collection is derived from IP addresses supplied by the CyHy stakeholders.
_id
[ObjectId]: Internal database id of this port scan documentip
[string]: IP address of the host that was port scannedip_int
[long integer]: Integer version of IP address that was port scannedlatest
[boolean]: Is this the latest scan of this port?owner
[string]: Organization that claims the IP address associated with this port scanport
[integer]: Number of the port that was scannedprotocol
[string]: Protocol for this port scan ("tcp" or "udp")reason
[string]: Why this port is determined to be open, as reported by the port scannerservice
[dictionary]: Details about this port, as reported by the scannersnapshots
[list of ObjectIds]: Snapshots that include this port scansource
[string]: Source of the scan (e.g. "nmap")state
[string]: State of the port, as reported by the scanner; see nmap states heretime
[ISO date]: Timestamp indicating when the port was scanned
The data in this collection is generated as part of Cyber Hygiene report creation process.
_id
[ObjectId]: Internal database id of this report documentgenerated_time
[ISO date]: Timestamp indicating when this report or scorecard was generatedowner
[string]: Organization that this report was created for; a value of null indicates that this report was a scorecard that contained results for multiple organizationsreport_types
[list of strings]: Type of report that was generated- "CYBEX" - Cyber Exposure scorecard
- "CYHY" - Cyber Hygiene report
snapshot_oid
[ObjectId]: Snapshot that was the basis for this Cyber Hygiene report (value is null for Cyber Exposure scorecards)
The data in this collection is derived from data supplied by the CyHy stakeholders.
_id
[string]: Organization identifier (corresponds to owner field in many collections)agency
[dictionary]: Details about the organizationacronym
[string]: Organization acronymcontacts
[list of dictionaries]: Contact details for the organizationemail
[string]: Contact email addressname
[string]: Contact namephone
[string]: Contact phone numbertype
[string]: Contact type ("TECHNICAL" or "DISTRO")
location
[dictionary]: Organization location details, typically represents headquarters or base of operations for organizations that are spread across multiple localitiescountry
[string]: Two-letter abbreviation of the countrycountry_name
[string]: Full name of the countrycounty
[string]: Full name of the countycounty_fips
[string]: FIPS code of the countygnis_id
[long integer]: GNIS ID of the locationname
[string]: Full name of the locationstate
[string]: Two-letter postal abbreviation of the statestate_fips
[string]: FIPS code for the statestate_name
[string]: Full name of the state
name
[string]: Full name of the organizationtype
[string]: Organization type ("FEDERAL", "STATE", "LOCAL", "TRIBAL", "TERRITORIAL", "PRIVATE")
children
[list of strings]: Identifiers of organizations that are children of this organizationenrolled
[ISO date]: Timestamp indicating when this organization was enrolled in the Cyber Hygiene serviceinit_stage
[string]: First scan stage for this organizationkey
[string]: Password used to encrypt reports for this organizationnetworks
[list of strings]: CIDR blocks of IP addresses claimed by this organizationperiod_start
[ISO date]: Timestamp indicating when scanning can begin for this organizationreport_period
[string]: Frequency of reports; only current supported value is "WEEKLY"report_types
[list of strings]: Types of reports that this organization receives ("CYHY", "CYBEX")retired
[boolean]: Whether or not this organization is currently subscribed to the Cyber Hygiene servicescan_limits
[list of dictionaries]: Limits on scan concurrencyconcurrent
[integer]: Number of concurrent scans of that typescanType
[string]: Type of scan to limit ("NETSCAN1", "NETSCAN2", "PORTSCAN", "VULNSCAN")
scan_types
[list of strings]: Types of scanning that this organization receives; only current supported value is "CYHY"scheduler
[string]: Name of the scheduler used to schedule scans; only current supported value is "PERSISTENT1"stakeholder
[boolean]: Whether or not this organization is considered to be a CyHy stakeholderwindows
[list of dictionaries]: Windows when the organization allows us to scanday
[string]: Day that scanning is allowedstart
[string]: Time of day when scanning is allowed to startduration
[integer]: Duration of scan window, in hours
The data in this collection is derived from IP addresses supplied by the CyHy stakeholders.
_id
[ObjectId]: Internal database id of this snapshot documentaddresses_scanned
[integer]: Number of IP addresses included in this snapshot that have been fully scanned by CyHy at least once, as of the time this snapshot was generatedcvss_average_all
[decimal]: Average CVSS score of all hosts in this snapshotcvss_average_vulnerable
[decimal]: Average CVSS score of vulnerable hosts in this snapshotdescendants_included
[list of strings]: Identifiers of descendant organizations (if any) whose data is included in this snapshotend_time
[ISO date]: Timestamp indicating when the last scan in this snapshot was completedhost_count
[integer]: Number of hosts detected in this snapshotlast_change
[ISO date]: Timestamp indicating when this snapshot document was last updatedlatest
[boolean]: Is this the latest snapshot for this organization?networks
[list of strings]: CIDR blocks claimed by the organization (and any included descendants) at the time this snapshot was generatedowner
[string]: Organization that this snapshot is associated withparents
[ObjectId]: Identifier of the parent snapshot(s); used only for organizations with children; if this value is equal to the _id of this snapshot, then this snapshot has no parentport_count
[integer]: Total number of open ports detected in this snapshotservices
[dictionary]: Number of services detected in this snapshot, grouped by service namesilent_port_count
[integer]: Total number of ports detected in this snapshot whose service was detected as "tcpwrapped", indicating that a full TCP handshake was completed during port scanning, but the connection was closed before any data was sentstart_time
[ISO date]: Timestamp indicating when the first scan in this snapshot was completedtix_msec_open
[dictionary]: Time a ticket has been opentix_msec_to_close
[dictionary]: Time it took to close a ticketunique_operating_systems
[integer]: Number of unique operating systems detected in this snapshotunique_port_count
[integer]: Number of unique open ports detected in this snapshotunique_vulnerabilities
[dictionary]: Number of unique vulnerabilities in this snapshot, grouped by severityvulnerable_host_count
[integer]: Number of vulnerable hosts detected in this snapshotvulnerabilities
[dictionary]: Total number of vulnerabilities in this snapshot, grouped by severityworld
[dictionary]: DEPRECATED; metrics about the overall state of CyHy at the time this snapshot was generated
The data in this collection is derived from IP addresses supplied by the CyHy stakeholders.
_id
[string]: Organization identifier (corresponds to owner field in many collections)counts
[dictionary]: Number of hosts currently in each scan stage and scan statusBASESCAN
[dictionary]: DEPRECATEDNETSCAN1, NETSCAN2, PORTSCAN, VULNSCAN
[dictionaries]DONE
[integer]: Number of hosts for this organization in "DONE" status for the given scan stageREADY
[integer]: Number of hosts for this organization in "READY" status for the given scan stageRUNNING
[integer]: Number of hosts for this organization in "RUNNING" status for the given scan stageWAITING
[integer]: Number of hosts for this organization in "WAITING" status for the given scan stage
last_change
[ISO date]: Timestamp indicating when this tally document was last updated
The data in this collection is derived from IP addresses supplied by the CyHy stakeholders.
_id
[ObjectId]: Internal database id of this ticket documentdetails
[dictionary]: Vulnerability detailscve
[string]: Common Vulnerabilities and Exposures identifiercvss_base_score
[decimal]: CVSS base scorecvss_version
[string]: CVSS version used for the CVSS base scorekev
[boolean]: Is the vulnerability in this ticket a Known Exploited Vulnerability (KEV), according to the CISA KEV Catalog?kev_ransomware
[boolean]: Is the vulnerability in this ticket known to have been leveraged as part of a ransomware campaign, according to the CISA KEV Catalog?name
[string]: Vulnerability namescore_source
[string]: Source of the CVSS base score (e.g. "nvd" or "nessus")service
[string]: Name of the service detected in this ticket; this field is specific to tickets where the ticketsource
is a port scanner (e.g. "nmap")severity
[decimal]: CVSS severity ratingvpr_score
[decimal]: Tenable Vulnerability Priority Rating
events
[dictionary]: Details of key ticket eventsaction
[string]: Event type"OPENED"
- Ticket opened for the first time"VERIFIED"
- Verified that an open ticket is still open"CHANGED"
- Data within the ticket changed (e.g. marked as a false positive or the vulnerability’s CVSS score changed)"CLOSED"
- Ticket closed (vulnerability no longer detected)"REOPENED"
- A closed ticket reopened"UNVERIFIED"
- A vulnerability was detected for a ticket that is marked as a false positive
reason
[string]: Short description of the eventreference
[ObjectId]: The identifier for the vulnerability scan related to the eventtime
[ISO date]: Timestamp indicating when the event occurreddelta
[list of dictionaries]: Only applies to "CHANGED" events; list of what changedkey
[string]: Ticket field that changedfrom
[type depends on key]: Value of key before the "CHANGED" eventto
[type depends on key]: Value of key after the "CHANGED" event
false_positive
[boolean]: Is this ticket marked as a false positive?ip
[string]: IP address of the host that was vulnerability scannedip_int
[long integer]: Integer version of IP address that was vulnerability scannedlast_change
[ISO date]: Timestamp indicating when this ticket document was last updatedloc
[list]: Longitude and latitude of host (according to geolocation database) associated with this ticketopen
[boolean]: Was this vulnerability detected in the latest scan of the associated host?owner
[string]: Organization that claims the IP address associated with this ticketport
[integer]: Number of the vulnerable port in this ticketprotocol
[string]: Protocol for the vulnerable port in this ticket ("tcp" or "udp")snapshots
[list of ObjectIds]: Snapshots that include this ticketsource
[string]: Source of the vulnerability scan (e.g. "nessus" or "nmap")source_id
[integer]: Source-specific identifier for the vulnerability scan (e.g. the scanner plugin identifier that detected the vulnerability)time_closed
[ISO date]: Timestamp indicating when this ticket was closed (vulnerability was no longer detected); value of null indicates that this ticket is currently opentime_opened
[ISO date]: Timestamp indicating when this ticket was opened (vulnerability was first detected)
The data in this collection is derived from IP addresses supplied by the CyHy stakeholders.
_id
[ObjectId]: Internal database id of this vulnerability scan documentbid
[string]: Bugtraq IDcert
[string]: CERT IDcpe
[string]: Common Platform Enumeratorcve
[string]: Common Vulnerabilities and Exposures identifiercvss_base_score
[string]: CVSS base scorecvss_temporal_score
[string]: CVSS temporal scorecvss_temporal_vector
[string]: CVSS temporal vectorcvss_vector
[string]: CVSS vectordescription
[string]: Description of the vulnerability, according to the vulnerability scannerexploit_available
[string]: Whether or not an exploit is available, according to the vulnerability scannerexploitability_ease
[string]: Ease of exploitation, according to the vulnerability scannerfname
[string]: Filename of the vulnerability scanner plugin that detected this vulnerabilityip
[string]: IP address of the host that was vulnerability scannedip_int
[long integer]: Integer version of IP address that was vulnerability scannedlatest
[boolean]: Is this the latest vulnerability scan of this port/protocol/host?owner
[string]: Organization that claims the IP address associated with this vulnerability scanosvdb
[string]: Open Source Vulnerability Database identifier for the detected vulnerabilitypatch_publication_date
[ISO date]: Date when a patch was published for this vulnerabilityplugin_family
[string]: Family of the plugin run by the vulnerability scanner that detected this vulnerabilityplugin_id
[integer]: ID of the plugin run by the vulnerability scanner that detected this vulnerabilityplugin_modification_date
[ISO date]: Latest modification date of the vulnerability scanner plugin that detected this vulnerabilityplugin_name
[string]: Name of the vulnerability scanner plugin that detected this vulnerabilityplugin_output
[string]: Plugin-specific output from the vulnerability scannerplugin_publication_date
[ISO date]: Publication date of the vulnerability scanner plugin that detected this vulnerabilityplugin_type
[string]: Vulnerability scanner plugin typeport
[integer]: Number of the port that was vulnerability scannedprotocol
[string]: Protocol for the vulnerable port in this scan ("tcp" or "udp")risk_factor
[string]: Risk factor of the detected vulnerability according to the vulnerability scannerscript_version
[string]: Script version stringsee_also
[string]: Additional reference(s) for this vulnerability provided by the vulnerability scannerservice
[string]: Service detected at the vulnerable port in this scanseverity
[decimal]: CVSS v2.0 severity rating from the vulnerability scannersnapshots
[list of ObjectIds]: Snapshots that include this vulnerability scansolution
[string]: Solution to mitigate the detected vulnerability, according to the vulnerability scannersource
[string]: Source of the vulnerability scan (e.g. "nessus")synopsis
[string]: Brief overview of the vulnerabilitytime
[ISO date]: Timestamp indicating when the vulnerability was detectedvuln_publication_date
[ISO date]: Vulnerability publication datexref
[string]: External reference
_id
[ObjectId]: Internal database id of this detected applicationassessment
[string]: ID of PCA assessment where this application was detectedcampaign
[string]: ID of PCA campaign where this application was detectedcustomer
[string]: PCA customer identifier associated with this assessmentexternal_ip
[string]: External IP address of the host where the application was detectedexternal_ip_int
[long integer]: Integer version of the external IP address where the application was detectedinternal_ip
[string]: Internal IP address of the host where the application was detectedinternal_ip_int
[string]: Integer version of the internal IP address where the application was detectedname
[string]: Name of application detectedtime
[ISO date]: Timestamp indicating when this application was detecteduser
[string]: PCA ID of the user that was running the application detectedversion
[string]: Version of application detected
_id
[ObjectId]: PCA assessment (RV) IDcustomer
[string]: PCA customer identifier associated with this assessmentend_time
[ISO date]: Date the final campaign in the assessment endedstart_time
[ISO date]: Date the first campaign in the assessment startedteam_lead
[string]: Name of Federal lead for the assessment
_id
[string]: Internal ID of phishing campaignassessment
[string]: ID of PCA assessment this campaign is part ofcustomer
[string]: PCA customer identifier associated with this campaignend_time
[ISO date]: Timestamp indicating when the campaign endedimages
[dictionary]: Images associated with this campaign“landing-page”
- Internal ID of landing page image“sent-email”
- Internal ID of sent email image“link-warning”
- Internal ID of link warning image
start_time
[ISO date]: Timestamp indicating when the campaign startedsubject
[string]: Subject used in the phishing email for this campaigntemplate
[ObjectID]: ID of template associated with this campaignurl
[string] : Phishing URL found within the email templateusers
[list of strings]: PCA IDs of the users phished in this campaign
_id
[ObjectId]: Internal database id of this click documentassessment
[string]: ID of PCA assessment where this click was detectedcampaign
[string]: ID of PCA campaign where this click was detectedcustomer
[string]: PCA customer identifier associated with this assessmentsource_ip
[string]: IP address of the host that generated this clicksource_ip_int
[long integer]: Integer version of the IP address of the host that generated this clicktime
[ISO date]: Timestamp indicating when this click was detecteduser
[string]: PCA ID of the user that generated this click
_id
[string]: PCA customer identifieracronym
[string]: PCA customer acronymname
[string]: PCA customer full namecontacts
[list]: POC Contact Informationemail
[string]: Contact email addressname
[string]: Contact namephone
[string]: Contact phone numbertype
[string]: Contact type (“TECHNICAL” or “DISTRO”)
_id
[ObjectId]: Internal database id of this email documentuser
[string]: PCA ID of the user that this email was sent tocustomer
[string]: PCA customer identifier associated with this assessmentassessment
[string]: ID of PCA assessment for which this email was generatedcampaign
[string]: ID of PCA campaign for which this email was generatedtime
[ISO date]: Timestamp indicating when this email was sentstatus
[string]: Status message indicating if the email was successfully sent to the target
_id
[ObjectId]: Internal database id of this template documentname
[string]: Name of the templatetext
[string]: Content of the email template; should include subject, body, etc; can be HTMLappearance
[dictionary]: Appearance indicator ratingsgrammar
[integer]:- 0: Poor
- 1: Decent
- 2: Proper
link_domain
[integer]:- 0: Completely fake/unrelated to the subject
- 1: Attempt to look like/related to a real domain
logo_graphics
[integer]:- 0: Completely fake/unrelated to the subject
- 1: Close imposters
sender
[dictionary]: Sender indicator ratingsexternal
[integer]:- 0: Completely fake/unrelated to the subject
- 1: Looks like real external entities
internal
[integer]:- 0: Completely fake/unrelated to the subject
- 1: Looks like a possibly real internal person or group
- 2: Spoofs a real internal person or group
authoritative
[integer]:- 0: Not authoritative in nature
- 1: Sender is making a request or demand and speaks from a position of power that could be associated with a corporate/local sender
- 2: Sender is making a request or demand and speaks from a position of power that could be associated with a Federal/State office sender
relevancy
[dictionary]: Relevancy indicator ratingsorganization
[integer]:- 0: Content is not pertinent to organization’s current events, news, and does not use the name/email of the targeted user
- 1: Content is pertinent to organization’s current events, news, or uses the name/email of the targeted user
public_news
[integer]:- 0: Content is not pertinent to current events in the local area or nation
- 1: Content is pertinent to current events in the local area or nation
behavior
[dictionary]: Behavior indicator ratingsfear
[integer]:- 0: Does not appeal to a sense of fear
- 1: Email contains scareware or appeals to the emotion of fear within the theme of the email
duty_obligation
[integer]:- 0: Does not evoke a sense of duty or obligation
- 1: Email appeals to the sense of responsibility within the theme of the email
curiosity
[integer]:- 0: Does not evoke a sense of curiosity
- 1: Email appeals to the desire to learn more are within the theme of the email
greed
[integer]:- 0: Does not evoke a sense of greed
- 1: Email appeals to greed and monetary gain are within the theme of the email
assessment
[string]: PCA assessment identifier that this user_report is associated withcampaign
[string]: PCA campaign identifier that this user_report is associated withcustomer
[string]: PCA customer identifier that this user_report is associated withfirst_report
[ISO date]: Timestamp indicating when the first user click is reported for a campaigntotal_num_reports
[integer]: The total number of clicks reported for a campaign
_id
[ObjectId]: PCA ID of this usercustomer
[string]: PCA customer identifier that this user is associated withcustomer_defined_labels
[dictionary]: Customer-defined text labels for grouping users for statistical purposes
The data in this collection is derived from certificates collected by our Certificate Transparency log scanner, which only grabs certificates that apply to domains in our domains collection. NOTE: More details may be available in the GitHub README document for cyhy-ct-logs.
_id
[string]: Internal certificate identifier from the certificate transparency log where the certificate was detectedissuer
[string]: The entity that signed and issued the certificate; see RFC 5280 for detailsnot_after
[ISO date]: Timestamp indicating when the certificate expiresnot_before
[ISO date]: Timestamp indicating when the certificate became/becomes validpem
[string]: The certificate in PEM formatsct_exists
[boolean]: Whether or not the timestamp in sct_or_not_before refers to a Signed Certificate Timestampsct_or_not_before
[ISO date]: The earliest Signed Certificate Timestamp, if one exists, otherwise equal to the not_before timestampserial
[string]: Unique identifier assigned to this certificate by the issuing Certificate Authority; see RFC 5280 for detailssubjects
[list of strings]: List of hostnames/domains where this certificate can be used. This field is a concatenated list of the Common Name (if it exists; this field is deprecated) and the Subject Alternative Names.trimmed_subjects
[list of strings]: List of second-level domains where this certificate can be used. These are extracted from the subjects field.
The data in this collection is derived from domains collected by our gatherer, which pulls in domains from Cyber Hygiene and the GSA. NOTE: More details may be available in the GitHub README documents for gatherer and saver.
_id
[string]: Base domain nameagency
[dictionary]: The organization that claims ownership of the scanned domainid
[string]: Organization identifiername
[string]: Organization name
cyhy_stakeholder
[boolean]: Is the organization that claims to own this host a Cyber Hygiene stakeholder?scan_date
[ISO date]: Timestamp indicating when the domain was inserted in the database
The data in this collection is derived from domain names collected by our gatherer, which pulls in domains from Cyber Hygiene and the GSA. NOTE: More details may be available in the GitHub README document for pshtt.
_id
[string]: Internal database id of this HTTPS scan documentagency
[dictionary]: The organization that claims ownership of the scanned domainid
[string]: Organization identifiername
[string]: Organization name
base_domain
[string]: Base domain that was HTTPS scannedcanonical_url
[string]: URL based on the observed redirect logic of the scanned domaincyhy_stakeholder
[boolean]: Is the organization that claims to own this host a Cyber Hygiene stakeholder?defaults_https
[boolean]: True if the canonical_url uses HTTPSdomain
[string]: The domain that was HTTPS scanneddomain_enforces_https
[boolean]: Does the scanned domain both support HTTPS and default to HTTPS?domain_supports_https
[boolean]: True ifdowngrades_https
is False and either (1) valid_https is True or (2) https_bad_chain is True and https_bad_hostname is Falsedomain_uses_strong_hsts
[boolean]: True if hsts is True for the scanned domain and hsts_max_age is at least 31,536,000 seconds (365 days)downgrades_https
[boolean]: True if HTTPS is supported in some way, but the canonical HTTPS endpoint immediately redirects internally to HTTPhttps_bad_chain
[boolean]: True if either HTTPS endpoint (https://<domain>
,https://www.<domain>
) contains a bad chainhttps_bad_hostname
[boolean]: True if either HTTPS endpoint (https://<domain>
,https://www.<domain>
) fails hostname validationhttps_expired_cert
[boolean]: True if either HTTPS endpoint (https://<domain>
,https://www.<domain>
) has an expired certificatehttps_self_signed_cert
[boolean]: True if either HTTPS endpoint (https://<domain>
,https://www.<domain>
) has a self-signed certificatehsts
[boolean]: True if the canonical_url has HSTS enabledhsts_base_domain_preloaded
[boolean]: True if base_domain appears in appears in the Chrome preload list with the include_subdomains flag equal to Truehsts_entire_domain
[boolean]: True if the root HTTPS endpoint (not the canonical HTTPS endpoint) has HSTS enabled and uses the HSTS include_subdomains flaghsts_header
[string]: HSTS header at the canonical endpoint of the scanned domainhsts_max_age
[integer]: Max-age listed in the HSTS header at the canonical endpoint of the scanned domainhsts_preload_pending
[boolean]: True if the scanned domain appears in the Chrome preload pending list with the include_subdomains flag equal to Truehsts_preload_ready
[boolean]: True if the root HTTPS endpoint (not the canonical HTTPS endpoint) has HSTS enabled, has a max-age of at least 18 weeks, and uses the include_subdomains and preload flag.hsts_preloaded
[boolean]: True if if the scanned domain appears in the Chrome preload list with the include_subdomains flag equal to True, regardless of what header is present on any endpointis_base_domain
[boolean]: True if domain is equal to base_domainlatest
[boolean]: Is this the latest HTTPS scan of this host?live
[boolean]: Are any of the endpoints (http://<domain>
,http://www.<domain>
,https://<domain>
,https://www.<domain>
) for this domain live?redirect
[boolean]: True if at least one endpoint is a redirect, and all endpoints are either redirects or downredirect_to
[string]: URI that the scanned domain redirects to (if redirect is True)scan_date
[ISO date]: Timestamp indicating when the HTTPS scan was donestrictly_forces_https
[boolean]: True if one of the HTTPS endpoints (https://<domain>
,https://www.<domain>
) is live, and if both HTTP endpoints (http://<domain>
,http://www.<domain>
) are either down or redirect immediately to any HTTPS URIunknown_error
[boolean]: True if an unknown error occurred during the HTTPS scanvalid_https
[boolean]: True if the canonical_url responds on port 443 with an unexpired valid certificate for the hostname; can be True even if canonical_url uses HTTP
The data in this collection is derived from certificates collected by our Certificate Transparency log scanner, which only grabs certificates that apply to domains in our domains collection. NOTE: More details may be available in the GitHub README document for cyhy-ct-logs.
_id
[string]: Internal certificate identifier from the certificate transparency log where the certificate was detectedissuer
[string]: The entity that signed and issued the certificate; see RFC 5280 for detailsnot_after
[ISO date]: Timestamp indicating when the certificate expiresnot_before
[ISO date]: Timestamp indicating when the certificate became/becomes validpem
[string]: The certificate in PEM formatsct_exists
[boolean]: Whether or not the timestamp in sct_or_not_before refers to the Signed Certificate Timestampsct_or_not_before
[ISO date]: The Signed Certificate Timestamp, if it exists, otherwise equal to the not_before timestampserial
[string]: Unique identifier assigned to this certificate by the issuing Certificate Authority; see RFC 5280 for detailssubjects
[list of strings]: List of hostnames/domains where this certificate can be used. This field is a concatenated list of the Common Name (if it exists; this field is deprecated) and the Subject Alternative Names.trimmed_subjects
[list of strings]: List of second-level domains where this certificate can be used. These are extracted from the subjects field.
The data in this collection is derived from domain names collected by our gatherer, which pulls in domains from Cyber Hygiene and the GSA. NOTE: More details may be available in the GitHub README document for SSLyze.
_id
[string]: Internal database id of this SSLyze scan documentagency
[dictionary]: The organization that claims ownership of the scanned domainid
[string]: Organization identifiername
[string]: Organization name
all_forward_secrecy
[boolean]: True if every cipher supported by scanned_hostname supports forward secrecyall_rc4
[boolean]: True if every cipher supported by scanned_hostname supports RC4any_3des
[boolean]: True if any cipher supported by scanned_hostname supports 3DESany_forward_secrecy
[boolean]: True if any cipher supported by scanned_hostname supports forward secrecyany_rc4
[boolean]: True if any cipher supported by scanned_hostname supports RC4base_domain
[string]: Base domain that was scanned by SSLyzecyhy_stakeholder
[boolean]: Whether or not the organization that claims this host is a Cyber Hygiene stakeholderdomain
[string]: The domain that was scanned by SSLyzeerrors
[string]: List of errors encountered when SSLyze scanned scanned_hostnamehighest_constructed_issuer
[string]: Highest certificate issuer in the chain constructed when scanned_hostname was scanned by SSLyzehighest_served_issuer
[string]: Highest certificate issuer in the chain served when scanned_hostname was scanned by SSLyzeis_base_domain
[boolean]: True if domain is equal to base_domainis_symantec_cert
[boolean]: True if certificate detected by SSLyze was issued by Symantec Corporationkey_length
[integer]: Public key length of certificate detected by SSLyze for scanned_hostnamekey_type
[string]: Public key type of certificate detected by SSLyze for scanned_hostnamelatest
[boolean]: Is this the latest SSLyze scan of this host?not_after
[ISO date]: Timestamp indicating when the certificate for scanned_hostname expiresnot_before
[ISO date]: Timestamp indicating when the certificate for scanned_hostname became/becomes validscan_date
[ISO date]: Timestamp indicating when the SSLyze scan was donescanned_hostname
[string]: The hostname that was scanned by SSLyzescanned_port
[integer]: The port number that was scanned by SSLyzesha1_in_construsted_chain
[boolean]: True if any certificates in the chain constructed when scanned_hostname was scanned by SSLyze support SHA-1sha1_in_served_chain
[boolean]: True if any certificates in the chain served when scanned_hostname was scanned by SSLyze support SHA-1signature_algorithm
[string]: Signature algorithm of certificate detected by SSLyze for scanned_hostnamesymantec_distrust_date
[string]: Month and year when certificates issued by Symantec Corporation will no longer be trustedsslv2
[boolean]: True if SSLv2 is supported by scanned_hostnamesslv3
[boolean]: True if SSLv3 is supported by scanned_hostnamestarttls_smtp
[boolean]: True if STARTTLS on SMTP is supported by scanned_hostnametlsv1_0
[boolean]: True if TLS 1.0 is supported by scanned_hostnametlsv1_1
[boolean]: True if TLS 1.1 is supported by scanned_hostnametlsv1_2
[boolean]: True if TLS 1.2 is supported by scanned_hostname
The data in this collection is derived from domain names collected by our gatherer, which pulls in domains from Cyber Hygiene and the GSA. NOTE: More details may be available in the GitHub README document for trustymail.
_id
[string]: Internal database id of this Trustymail scan documentagency
[dictionary]: The organization that claims ownership of the scanned domainid
[string]: Organization identifiername
[string]: Organization name
aggregate_report_uris
[list of dictionaries]: List of DMARC aggregate report URIs specified by the scanned domainmodifier
[string]: DMARC aggregate report URI modifieruri
[string]: DMARC aggregate report URI
base_domain
[string]: Base domain that was scanned by Trustymaildebug_info
[string]: List of warnings or errors reported by Trustymail while scanning the domaindmarc_policy
[string]: Applicable DMARC policy for the scanned domain, based on policies found in dmarc_results and dmarc_results_base_domaindmarc_policy_percentage
[integer]: Percentage of mail that should be subjected to the dmarc_policy according to dmarc_resultsdmarc_record
[boolean]: True if a DMARC record was found for the scanned domaindmarc_record_base_domain
[boolean]: True if a DMARC record was found for base_domaindmarc_results
[string]: DMARC record that was discovered when querying DNS for the scanned domain- dmarc_results_base_domain [string]: DMARC record that was discovered when querying DNS for base_domain
domain
[string]: The domain that was scanned by Trustymaildomain_supports_smtp
[boolean]: True if any mail servers specified in an MX record associated with the scanned domain support SMTPdomain_supports_smtp_results
[string]: List of mail server and port combinations from the scanned domain that support SMTPdomain_supports_starttls
[boolean]: True if all mail servers associated with the scanned domain that support SMTP also support STARTTLSdomain_supports_starttls_results
[string]: List of mail server and port combinations from the scanned domain that support STARTTLSforensic_report_uris
[list of dictionaries]: List of DMARC forensic report URIs specified by the scanned domainmodifier
[string]: DMARC forensic report URI modifieruri
[string]: DMARC forensic report URI
has_aggregate_report_uri
[boolean]: True if dmarc_results include valid rua URIs that tell recipients where to send DMARC aggregate reports.has_forensic_report_uri
[boolean]: True if dmarc_results include valid ruf URIs that tell recipients where to send DMARC forensic reports.is_base_domain
[boolean]: True if domain is equal to base_domainlatest
[boolean]: Is this the latest Trustymail scan of this host?live
[boolean]: True if the scanned domain is published in public DNSmail_server_ports_tested
[string]: List of ports tested by Trustymail for SMTP and STARTTLS supportmail_servers
[string]: List of hosts found in the MX record of the scanned domainmx_record
[boolean]: True if an MX record for the scanned domain was found that contains one or more mail serversscan_date
[ISO date]: Timestamp indicating when the Trustymail scan was donespf_results
[string]: Text representation of any SPF record found for the scanned domainsyntax_errors
[string]: List of syntax errors encountered when Trustymail analyzed SPF records of the scanned domainvalid_dmarc
[boolean]: True if the DMARC record found for the scanned domain is syntactically correctvalid_dmarc_base_domain
[boolean]: True if the DMARC record found for base_domain is syntactically correctvalid_spf
[boolean]: True if the SPF record found for the scanned domain is syntactically correct, per RFC 4408