Skip to main content

Spectra Core tags

Generic tags - can be applied to many file formats

access-control-informationThe file contains access control descriptors such as file permissions, group memberships or similar information about a securable object
anonymous-emailThe file contains e-mail addresses from anonymous e-mail providers
cert-appendixThe file contains additional data after the certificate
cert-bad-checksumThe file was signed with an invalid certificate (it didn't pass the validation process)
cert-bad-timestampThe file is digitally signed with a certificate that has a bad timestamp
cert-cross-signedThe file is digitally signed with Microsoft cross-certificate for kernel mode code signing
cert-dual-signedThe file is digitally signed with two signatures that independently verify file integrity
cert-expiredThe file's certificate chain has at least one expired certificate
cert-impersonateThe file is digitally signed with a certificate that impersonates one of well-known entities (e.g. Microsoft or Google)
cert-invalidThe file was signed with an invalid certificate (it didn't pass the validation process)
cert-malformedThe file is digitally signed with a certificate that was malformed
cert-pagehashes-bad-checksumThe file was signed with an invalid certificate (it didn't pass the validation process)
cert-revokedThe file is digitally signed with a certificate that has been revoked
cert-revoked-aa-compromiseThe file is digitally signed with a certificate that has been revoked due to AA compromise
cert-revoked-affiliation-changedThe file is digitally signed with a certificate that has been revoked due to change in affiliation
cert-revoked-ca-compromiseThe file is digitally signed with a certificate that has been revoked due to CA compromise
cert-revoked-cert-holdThe file is digitally signed with a certificate that has been put on hold (the signer has been suspended)
cert-revoked-cessation-of-operationThe file is digitally signed with a certificate that has been revoked because the signer has ceased its operations
cert-revoked-key-compromiseThe file is digitally signed with a certificate that has been revoked due to private key compromise
cert-revoked-privilege-withdrawnThe file is digitally signed with a certificate that has been revoked because the signer privilege has been withdrawn
cert-revoked-remove-from-crlThe file is digitally signed with a certificate that has been removed from the revocation list
cert-revoked-supersededThe file is digitally signed with a certificate that has been revoked because it has been superseded
cert-revoked-unspecifiedThe file is digitally signed with a certificate that has been revoked due to unspecified reason
cert-self-signedThe file is digitally signed with a self-signed certificate (e.g. JAR or APK)
cert-signedThe file is digitally signed with a certificate (signature may or may not be valid)
cert-signed-after-expirationThe file was digitally counter-signed after at least one certificate in certificate chain expired
cert-signed-after-revocationThe file is digitally signed with a certificate that has been revoked at the time of signing
cert-signed-after-valid-timeThe file is digitally signed with a certificate that was used after its validity period ended
cert-signed-before-issuingThe file is digitally signed with a certificate that was used before its validity period started
cert-timestampedThe file was digitally counter-signed by a timestamping service hosted by a certificate authority
cert-cert-timestamped-revokedThe file was digitally counter-signed by a timestamping service certificate that has been revoked
cert-cert-timestamped-untrustedThe file was digitally counter-signed by a timestamping service, but its root CA certificate is not in the Spectra Core certificate store
cert-untrustedThe file is digitally signed with a certificate that is valid, but its root CA certificate is not in the Spectra Core certificate store
cert-weak-cryptoThe file was digitally signed with certificates using insecure cryptography or old hashing algorithms
cert-weak-crypto-keyThe file was digitally signed with certificates using insecure cryptography (e.g. RSA with less than 2048 bits)
cert-weak-crypto-digestThe file was digitally signed with certificates using an old hashing algorithm (e.g. MD5)
contains-api-keyThe file contains an API key used to authenticate a user, developer, or calling program to an API
contains-archiveThe file contains one or more archive files (such as ZIP, RAR, Jar)
contains-documentThe file contains one or more document files
contains-elfThe file contains one or more ELF (Executable and Linkable Format) files
contains-key-secret-pairThe file contains plaintext credentials, generally used for authentication
contains-machoThe file contains one or more Mach-O files
contains-peThe file contains one or more PE (Portable Executable) files
contains-private-key-encryptedThe file contains an encrypted PKI private key
contains-private-key-plaintextThe file contains a PKI private key
contains-private-ssh-key-encryptedThe file contains an encrypted SSH key
contains-private-ssh-key-plaintextThe file contains an SSH key
contains-scriptThe file contains one or more script files
contains-tokenThe file contains an access or refresh token generally used for authentication
contains-webhookThe file contains a private webhook which may contain sensitive information
cryptocurrencyThe file has cryptocurrency-related indicators (e.g. accesses BitCoin wallet files)
ddeThe file has Dynamic Data Exchange capabilities that may be used to interact with other applications
desktopThe file appears to be a desktop application (e.g. PE or ELF)
email-outlookThe file has Outlook-related indicators (e.g. accesses mailbox files, credentials)
email-patternThe file has generic e-mail-related indicators (e.g. accesses mailbox files, credentials)
email-thunderbirdThe file has Thunderbird-related indicators (e.g. accesses mailbox files, credentials)
encryptedContains encrypted files (e.g. password-protected archive)
entropy-highThe file has unusually high entropy (i.e. entropy > 7)
entropy-zeroThe file is zero-filled (full of 00 bytes)
exifThe file has EXIF metadata (such as camera information or GPS metadata)
format-bad-checksumThe file likely contains corrupted content as it has failed the data integrity check
format-bad-passwordThe file is password protected, and no provided passwords were a good match
format-unsupportedThe file format is currently not supported, and it requires a deeper level of inspection to be fully analyzed
geotaggingThe file has EXIF metadata containing GPS coordinates
guid-activex-killbitThe file contains ActiveX GUIDs with the Kill-Bit flag set
im-skypeThe file has Skype-related indicators (e.g. accesses chat history, credentials)
image-corruptThe image is corrupt because of some format discrepancy (e.g. invalid segment size)
image-malformedThe image is malformed (e.g. frame dimension is zero)
image-segment-duplicateThe image has a duplicate segment
image-segment-unexpected-locationAn image segment has been found in an unexpected location
image-segment-unknownAn unknown image segment has been encountered
linguistThe file's subtype was determined by a ReversingLabs machine learning model
machine-learningThe file was classified by a ReversingLabs machine learning model
ml-modelThe file contains a machine learning model
nsis-table-invalid-offsetThe NSIS installer is corrupt due to invalid table offset
nsis-table-invalid-sizeThe NSIS installer is corrupt due to invalid table size
ntfs-alternate-data-streamThe file contains data which was part of an NTFS Alternate Data Stream
obfuscatedThe file contains obfuscated code or data
probably-packedA heuristic method determined that the PE file may be packed
overlayThe file has an overlay (appended data at the file's end) - applies only to PE files
passwordThe file is password-protected (e.g. a password-protected archive)
ransomware-artifactThe file contains artifacts associated with ransomware (e.g. mail addresses, domains)
ransomware-encryptedThe file was encrypted by known ransomware (e.g. TeslaCrypt encrypted files)
scriptThe file appears to be a script (e.g. shell or Javascript)
sql-queryThe file contains generic SQL queries
ssh-keyThe file can use or modify SSH keys
stegoThe file is a result of stego extraction
stego-compressedThe file contains compressed embedded PE files
stego-embeddedThe file contains plain embedded PE files
stego-encodedThe file contains encoded embedded PE files
stego-encryptedThe file contains encrypted embedded PE files
uri-banking-websiteThe file contains URLs related to banking and monetary institutions
uri-coinmining-domainThe file contains URLs related to coinmining services
uri-credentialsThe file contains URLs that embed sign-in credentials in plaintext due to protocol requirements
uri-deceptive-fileThe file contains URLs that point to executable content hidden behind double extensions
uri-domain-blacklistedThe file contains URLs that point to a known blacklisted domain
uri-domain-homoglyphThe file contains URLs that try to trick the user into thinking they are visiting a trusted domain
uri-domain-phishtestThe file contains URLs that are used in simulated phishing tests
uri-domain-punycodeThe file contains URLs that try to trick the user into thinking they are visiting a trusted domain
uri-domain-spoofedThe file contains URLs that try to trick the user into thinking they are visiting a trusted domain
uri-domain-typosquatThe file contains URLs that try to trick the user into thinking they are visiting a trusted domain
uri-dynamic-dnsThe file contains URLs pointing to domains hosted on dynamic DNS
uri-hostname-lengthThe file contains URLs pointing to domains that are unusually long
uri-interesting-fileThe file contains URLs that point to interesting files or file extensions
uri-ip-addressThe file contains URLs pointing to webservers hosted on IP addresses
uri-malicious-redirectThe file contains URLs that redirect to malicious domains
uri-malware-regexThe file contains URLs that match a known malware regex pattern
uri-onion-websiteThe file contains URLs pointing to domains hosted on TOR network
uri-open-redirectThe file contains URLs that redirect to other domains
uri-path-lengthThe file contains URLs pointing to paths that are unusually long
uri-path-spoofedThe file contains URLs that point to a known sign-in path but don't reside on the trusted domain
uri-placeholderThe file contains URLs with placeholder values for access credentials
uri-placeholder-knownThe file contains URLs with placeholder values for access credentials
uri-restrictedThe file contains URLs that were explicitly restricted by the user
uri-sanctioned-euThe file contains URLs of domains hosted in regions with EU sanctions
uri-sanctioned-usThe file contains URLs of domains hosted in regions with US sanctions
uri-security-websiteThe file contains URLs related to security product vendors
uri-shortenedThe file contains shortened URLs
uri-subdomain-countThe file contains URLs pointing to paths that contain excessive number of subdomains
uri-suspicious-pathThe file contains URLs that contain a suspicious path section
uri-suspicious-portThe file contains URLs that utilize non-standard ports for the specified protocol
uri-suspicious-queryThe file contains URLs that include suspicious SQL query commands
uri-suspicious-tldThe file contains URLs pointing to domains hosted on suspicious TLDs

Behavior tags - describe behavior of executables, documents, scripts, and mobile applications

bidirectional-textThe file contains special unicode characters that influence text display order
account-settings-tamperThe file can tamper with user account settings
autorunThe file can tamper with autorun settings (e.g. autorun registry keys, autorun locations)
av-disableThe file can disable services related to security products
av-impersonateThe file can impersonate services related to security products
av-service-detectThe file can detect services related to security products
av-tamperThe file can tamper with services related to security products
backup-tamperThe file can tamper with backup (e.g. erases backup copies, tampers with backup settings)
bitlocker-tamperThe file can tamper with BitLocker settings
data-exfiltrationThe file can exfiltrate various data (e.g. stored credentials, mailbox files, configuration data)
dns-tamperThe file can tamper with DNS configuration
dns-useThe file can use the DNS protocol (e.g. issues DNS queries, locates network services)
file-downloadThe file has the capability to download files
file-overwriteThe file will be overwritten by other files that share the same file path
file-uploadThe file has the capability to upload files
firewall-tamperThe file can tamper with firewall settings
ftp-useThe file can use the FTP protocol (e.g. to upload files, to download files)
hosts-modifierThe file can tamper with hosts file or registry keys
impersonate-nativeThe file can impersonate native services (e.g. impersonates Windows Explorer)
irc-useThe file can use the IRC communication protocol
log-tamperThe file can tamper with logging configuration or log files
netntlm-hash-leakThe file contains references to SMB resources that leak NetNTLM hashes
network-settings-tamperThe file can tamper with network settings
nfs-tamperThe file can tamper with NFS settings
privacy-intrusionThe file has indicators related to privacy intrusion (e.g. takes screenshots, monitors users input)
privilege-escalationThe file has the capability to elevate user privileges
process-injectionThe file has the capability to write into other processes
process-terminationThe file can terminate other processes
proxyThe file can access or modify proxy settings
registry-tamperThe file can tamper with the registry
security-settings-tamperThe file can tamper with various security settings (e.g. security or audit policies)
service-disableThe file can disable services
smb-tamperThe file can tamper with the SMB protocol
startup-tamperThe file can tamper with startup settings (e.g. Windows bootup process)
storage-settings-tamperThe file can tamper with storage settings
storage-tamperThe file can tamper with external storage
uac-bypassThe file can bypass User Account Control
update-disableThe file can disable update services
virtualization-settings-tamperThe file can tamper with virtualization settings
vpn-tamperThe file can tamper with VPN settings
vpn-useThe file has the capability to use VPN
web-requestThe file has the capability to generate web requests
wmi-useThe file can use Windows Management Instrumentation (WMI)

Application-related tags - apply only to files with application metadata (PE, ELF, OSX, DEX, …)

arch-mipsThe file's target CPU architecture is MIPS
arch-powerpcThe file's target CPU architecture is PowerPC
arch-sparcThe file's target CPU architecture is SPARC
arch-x86The file's target CPU architecture is x86
arch-x86-64The file's target CPU architecture is x86-64
arch-arm-64The file's target CPU architecture is ARM64
arch-armThe file's target CPU architecture is ARM
codeviewThe application has debugging symbols metadata
cuiThe application uses Console User Interface subsystem (applies to PE files)
force-integrityThe file has integrity protection checks that prevent execution on change
guiThe application uses Graphical User Interface subsystem (applies to PE files)
installerThe file is an installer package
installer-pluginThe file is used only temporarily to provide additional functionality during the installation procedure
library-adThe application contains advertising-related libraries (e.g. Adfonic)
library-analyticsThe application contains advertising and usage analytics-related libraries (e.g. Google Analytics)
library-audioThe application contains audio playback related libraries (e.g. Vorbis)
library-browserThe application contains browser-related libraries
library-cloudThe application contains cloud networking-related libraries (e.g. Dropbox)
library-compressionThe application contains compression-related libraries (e.g. Zip)
library-cryptoThe application contains cryptography-related libraries (e.g. OAuth)
library-databaseThe application contains database-related libraries (e.g. MySQL)
library-developmentThe application contains development-related libraries
library-driverThe application contains driver-related libraries
library-educationalThe application contains education-related libraries
library-emailThe application contains email-related libraries
library-entertainmentThe application contains entertainment-related libraries
library-gamingThe application contains gaming-related libraries
library-graphicsThe application contains drawing or rendering libraries (e.g. Unity)
library-messagingThe application contains network messaging-related libraries (e.g. RabbitMQ)
library-multimediaThe application contains multimedia-related libraries (e.g. Amazon Game Circle)
library-networkingThe applications contains network communication-related libraries (e.g. curl)
library-productivityThe application contains productivity-related libraries
library-securityThe application contains security-related libraries
library-socialThe application contains social networking-related libraries (e.g. Facebook)
library-utilityThe application contains programming utility libraries (e.g. ICU)
library-virtualizationThe application contains virtualization-related libraries
lolbinThe file was identified as a LoLBin (living-off-the-land binary)
loldriverThe file was identified as a LoLDriver (living-off-the-land driver)
pe-bad-checksumThe executable header checksum does not match the application contents
pluginThe application is plugin for particular software
protection-aslrThe file has the Address Space Layout Randomisation exploit protection enabled
protection-depThe file has the Data Execution Prevention exploit protection enabled
protection-ehcThe file has the Exception Handling Continuation exploit protection enabled
protection-cfgThe file has the Control Flow Guard exploit protection enabled
protection-cpyThe file has the safe memory copy protection enabled
protection-retThe file has the Retpoline exploit protection enabled
protection-rfgThe file has the Return Flow Guard exploit protection enabled
protection-mpxThe file has the Intel Memory Protection guard enabled
protection-xfgThe file has the Extreme Flow Guard exploit protection enabled
protection-cetThe file has the Intel Control-Flow Enforcement Technology guard enabled
protection-sdlThe file has been compiled to follow the Secure Development Lifecycle guidelines
protection-scgThe file has the Static cast guard protection enabled
protection-sehThe file has safe exception handling protection enabled
protection-stackThe file has buffer overrun exploit protection enabled
packedThe application is packed with a known packer (e.g. with UPX)
rich-headerThe application has rich header metadata (applies to PE files)
reproducible-buildThe application has been compiled in a reproducible way which invalidates all timestamps
sfxThe file is a self-extracting archive (an application that embeds an archive)
taggantThe application has Taggant-related metadata
tool-hacktoolThe application is used to assist hacking
tool-steganographyThe application has steganography capabilities
uefiThe application is designed for the UEFI subsystem (applies to PE files)
uninstallerThe application is uninstaller for particular software
unsupported-applicationThe application is deprecated and no longer supported by vendor
updaterThe application is updater for particular software
version-infoThe application has version information metadata
vulnerable-with-cveThe application has vulnerability with assigned CVE
vulnerable-without-cveThe application has vulnerability without assigned CVE
xboxThe application is designed for the XBOX subsystem (applies to PE files)

Mobile-related tags - apply only to mobile applications

android-cupcakeThe mobile application uses the Android API level 3
android-donutThe mobile application uses the Android API level 4
android-eclairThe mobile application uses the Android API levels 5 to 7
android-froyoThe mobile application uses the Android API level 8
android-gingerbreadThe mobile application uses the Android API levels 9 to 10
android-honeycombThe mobile application uses the Android API levels 11 to 13
android-ice-cream-sandwichThe mobile application uses the Android API levels 14 to 15
android-jelly-beanThe mobile application uses the Android API levels 16 to 18
android-kitkatThe mobile application uses the Android API levels 19 to 20
android-lollipopThe mobile application uses the Android API levels 21 to 22
android-marshmallowThe mobile application uses the Android API level 23
android-nougatThe mobile application uses the Android API levels 24 to 25
android-oreoThe mobile application uses the Android API levels 26 to 27
android-pieThe mobile application uses the Android API level 28
android-10The mobile application uses the Android API level 29
android-11The mobile application uses the Android API level 30
mobileThe file appears to be a mobile application (e.g. Android APK or Windows Phone applications)
mobile-custom-permissionsThe mobile application has user-defined permissions
mobile-data-accessThe mobile application can read and write to the external storage on the device
mobile-deprecatedThe mobile application can abuse permissions from deprecated APIs
mobile-gpsThe mobile application can access location services
mobile-infostealerThe mobile application can access and read information such as call logs, contacts, calendars...
mobile-loggingThe mobile application can read and modify call logs
mobile-settingsThe mobile application can change system settings on the device
mobile-smsThe mobile application can read, write, or receive SMS messages
mobile-telcoThe mobile application can access and use the telecom connection service
mobile-voicemailThe mobile application can access and send voicemail messages

Malware tags - identify malware types and refer to other malware metadata

backdoorThe malware was identified as a backdoor
c2The malware has an embedded malware/data configuration (e.g. C2 info or mutex)
custom-packedThe file appears to be packed with a custom packer
downloaderThe malware was identified as a downloader
keyloggerThe malware was identified as a keylogger
posThe malware was identified as a point-of-sale malware
ransomwareThe malware was identified as ransomware
threat-hunting-npmThe file is similar to known malicious packages published on NPM repository
threat-hunting-pypiThe file is similar to known malicious packages published on PyPI repository

Packer tags - refer to packer-related metadata

antidebuggingThe file uses anti-debugging techniques
antidumpingThe file uses anti-dumping techniques
antiemulationThe file uses anti-emulation techniques
antisandboxThe file uses anti-sandbox techniques
antitracingThe file uses anti-tracing techniques
fake-signatureThe file uses fake signatures to thwart signature-based identification
import-eliminationThe packed file eliminates or has eliminated its import information
import-redirectionThe packed file redirects imports to make unpacking harder
pe-compressionThe file has a compressed payload/configuration
pe-encryptionThe file has an encrypted payload/configuration
pe-encryption-rc4The file uses RC4 to encrypt the payload/configuration
pe-encryption-teaThe file uses TEA to encrypt the payload/configuration
polymorphicThe file was packed with a polymorphic packer
remove-epThe packed file has a stolen original entry point
remove-headerThe packed file removes the PE header during unpacking to make unpacking harder
tamper-protectionThe file checks for signs of modification to make unpacking harder

Browser tags - refer to browser-related metadata

brave-referenceThe file contains references to Brave or Brave-related data (e.g. accesses settings, contains Brave user agent strings)
chrome-referenceThe file contains references to Chrome or Chrome-related data (e.g. accesses settings, contains Chrome user agent strings)
chrome-tamperThe file can tamper with Chrome or Chrome-related settings (e.g. performs process injection into the Chrome executable)
chromium-referenceThe file contains references to Chromium or Chromium-related data (e.g. accesses settings, contains Chromium user agent strings)
chromium-tamperThe file can tamper with Chromium or Chromium-related settings (e.g. performs process injection into the Chromium executable)
edge-referenceThe file contains references to Microsoft Edge or Microsoft Edge-related data (e.g. accesses settings, contains Microsoft Edge user agent strings)
firefox-referenceThe file contains references to Firefox or Firefox-related data (e.g. accesses settings, contains Firefox user agent strings)
firefox-tamperThe file can tamper with Firefox or Firefox-related settings (e.g. performs process injection into the Firefox executable)
internet-explorer-referenceThe file contains references to Internet Explorer or Internet Explorer-related data (e.g. accesses settings, contains Internet Explorer user agent strings)
internet-explorer-tamperThe file can tamper with Internet Explorer or Internet Explorer-related settings (e.g. performs process injection into the Internet Explorer executable)
netscape-referenceThe file contains references to Netscape or Netscape-related data (e.g. accesses settings, contains Netscape user agent strings)
netscape-tamperThe file can tamper with Netscape or Netscape-related settings (e.g. performs process injection into the Netscape executable)
opera-referenceThe file contains references to Opera or Opera-related data (e.g. accesses settings, contains Opera user agent strings)
opera-tamperThe file can tamper with Opera or Opera-related settings (e.g. performs process injection into the Opera executable)
safari-referenceThe file contains references to Safari or Safari-related data (e.g. accesses settings, contains Safari user agent strings)
safari-tamperThe file can tamper with Safari or Safari-related settings (e.g. performs process injection into the Safari executable)
seamonkey-referenceThe file contains references to SeaMonkey or SeaMonkey-related data (e.g. accesses settings, contains SeaMonkey user agent strings)
vivaldi-referenceThe file contains references to Vivaldi or Vivaldi-related data (e.g. accesses settings, contains Vivaldi user agent strings)
waterfox-referenceThe file contains references to Waterfox or Waterfox-related data (e.g. accesses settings, contains Waterfox user agent strings)
yandex-referenceThe file contains references to Yandex or Yandex-related data (e.g. accesses settings, contains Yandex user agent strings)

Classification tags - apply only to classified files

cert-blacklistedThe file was digitally signed with a blacklisted certificate
cert-whitelistedThe file was digitally signed with a whitelisted certificate
cloudThe file was classified by ReversingLabs Malware Presence (e.g. the hash is a well-known threat)
sandboxThe file was classified by ReversingLabs Cloud Sandbox (e.g. the hash is a well-known threat)
exploitThe file was classified by Spectra Core exploit detection from an unpacker or a validator (e.g. RTF)
graylistingThe file was classified by graylisting (e.g. an archive containing only text files)
hierarchy-analyzerThe file was classified by Spectra Core file hierarchy analysis (e.g. embedded executables within a document format)
image-analyzerThe file was classified by Spectra Core image analyzer (e.g. suspicious data was found within an image)
riccThe file was classified by Spectra Core RICC (e.g. RHA classification, RICC rule classifications)
signatureThe file was classified by Spectra Core signature
antivirusThe file was classified by an AntiVirus component
ng-antivirusThe file was classified by a NextGen AntiVirus component
yaraThe file was classified by a YARA rule

Capability tags - refer to capabilities of executables, documents, and mobile applications

capability-advertisingThe file has advertising-related capabilities (e.g. AdMob) - applies to documents and mobile formats
capability-bluetoothThe file can use Bluetooth to communicate with other devices - mobile-specific tag
capability-cameraThe file has access to the camera - applies to documents and mobile formats
capability-cryptographyThe file has cryptography-related capabilities (e.g. it can encrypt or hash data and files)
capability-deprecatedThe file uses deprecated APIs
capability-embedsThe file has other files embedded within (e.g. an iframe or an OLE object) - document-specific tag
capability-executionThe file has execution-related capabilities (e.g. an application can spawn new processes or threads)
capability-filesystemThe file has filesystem-related capabilities (e.g. it can open and read files)
capability-identificationThe file has access to user or device identity - mobile-specific tag
capability-microphoneThe file has access to the microphone - applies to documents and mobile formats
capability-networkingThe file has networking-related capabilities (e.g. it can open a socket and send/receive data)
capability-nfcThe file can use Near Field Communication (NFC) to communicate with other devices - mobile-specific tag
capability-scriptingThe file uses a scripting language (e.g. a document contains and uses macros) - document-specific tag
capability-securityThe file has security-related capabilities
capability-socialThe file has access to social components or providers (e.g. Facebook) - applies to documents and mobile formats
capability-undocumentedThe file uses undocumented functions
capability-vpnThe file can access VPNs - mobile-specific tag
capability-walletThe file has access to user's wallet - mobile-specific tag

Indicator tags - refer to indicators found in executables, documents, scripts, and mobile applications

An indicator tag will be emitted by Spectra Core only if the priority of a particular indicator is not low (i.e. priority > 3).

indicator-anomalyThe file contains unusual characteristics (e.g. contains known whitelisted executable filenames)
indicator-autostartThe file tampers with autostart settings (e.g. tampers with autorun locations)
indicator-behaviorThe file automatically executes activities as a user (e.g. changes username or password, prints a document)
indicator-disableThe file disables system services (e.g. tampers with Windows Update)
indicator-documentThe file exhibits unusual activities when handling documents (e.g. PDF that creates new documents)
indicator-evasionThe file tries to evade common debuggers, sandboxes or analysis tools (e.g. VM environment detection)
indicator-executionThe file creates other processes or starts other applications (e.g. creates a service, installs system drivers)
indicator-exploitThe file contains known exploits against the system
indicator-familyThe file is associated with known malicious families
indicator-fileThe file accesses other files on the filesystem in an unusual way (e.g. creates a cryptographic hash of file contents)
indicator-flowThe file leaks sensitive information to external hosts or creates new files with sensitive data (e.g. exports PDF form fields to files)
indicator-macroThe file contains or executes macro functions or scripts (e.g. contains UNIX shell scripts, executes actions associated with bookmarks)
indicator-memoryThe file tampers with memory of foreign processes (e.g. does process injection)
indicator-monitorThe file has the ability to monitor host activities (e.g. accesses a list of logged on users)
indicator-networkThe file has network-related indicators (e.g. downloads a file, tampering with DNS settings)
indicator-packerThe file contains obfuscated or encrypted code or data (e.g. base64 encoded streams)
indicator-payloadThe file extracts and launches new behavior in an unusual way (e.g. injects CSS into a page)
indicator-permissionsThe file tampers with or request additional permissions for execution (e.g. tampers with user/account privileges)
indicator-registryThe file accesses registry and configuration files in an unusual way (e.g. tampers with Windows registry settings)
indicator-searchThe file enumerates or collects information from a system (e.g. enumerates network shares or mounted drives)
indicator-settingsThe file accesses or tampers with system settings (e.g. enumerates system information)
indicator-signatureThe file matches a known signature (e.g. contains known compression libraries, HTTP header fields)
indicator-stealThe file steals and leaks sensitive information (e.g. accesses Outlook account information and address book)
indicator-stealthThe file tries to hide its presence (e.g. tampers with window transparency settings, tampers with firewall settings)

String tags - related to Spectra Core interesting strings

string-fileThe file contains interesting strings related to the file URI scheme
string-scpThe file contains SCP-related interesting strings
string-calltoThe file contains interesting strings related to the CallTo communication protocol
string-h323The file contains interesting strings related to the H.323 multimedia communication protocol
string-webcalThe file contains interesting strings related to iCalendar files
string-ftpThe file contains FTP-related interesting strings
string-httpThe file contains HTTP-related interesting strings
string-httpsThe file contains HTTPS-related interesting strings
string-mailtoThe file contains mailto-related interesting strings
string-sftpThe file contains SFTP-related interesting strings
string-sipThe file contains SIP-related interesting strings
string-sshThe file contains SSH-related interesting strings
string-telnetThe file contains Telnet-related interesting strings

Compression and crypto tags - related to identified compression and crypto content

compression-aplibThe file has content related to APLib compression algorithm
compression-asdpackThe file has content related to ASDPack compression algorithm
compression-aspackThe file has content related to ASPack compression algorithm
compression-brieflzThe file has content related to BriefLZ compression algorithm
compression-brotliThe file has content related to Brotli compression algorithm
compression-bzip2The file has content related to BZip2 compression algorithm
compression-deflateThe file has content related to Deflate compression algorithm
compression-dickyThe file has content related to Dicky compression algorithm
compression-ffceThe file has content related to FFCE compression algorithm
compression-gipfeliThe file has content related to Gipfeli compression algorithm
compression-gzipThe file has content related to GZip compression
compression-inflateThe file has content related to Inflate compression algorithm
compression-jcalgThe file has content related to JCAlg compression algorithm
compression-lz4The file has content related to LZ4 compression algorithm
compression-lzbrsThe file has content related to LZBRS compression algorithm
compression-lzfseThe file has content related to LZFSE compression algorithm
compression-lzhufThe file has content related to LZHUF compression algorithm
compression-lzmaThe file has content related to LZMA compression algorithm
compression-lzmatThe file has content related to LZMAT compression algorithm
compression-lzntThe file has content related to LZNT compression algorithm
compression-lzoThe file has content related to LZO compression algorithm
compression-lzrwThe file has content related to LZRW compression algorithm
compression-lzssThe file has content related to LZSS compression algorithm
compression-ncompress42The file has content related to Ncompress42 compression algorithm
compression-neoliteThe file has content related to NeoLite compression algorithm
compression-nrvThe file has content related to NRV compression algorithm
compression-pithyThe file has content related to Pithy compression algorithm
compression-pkzipThe file has content related to PKZIP compression algorithm
compression-pucrunchThe file has content related to Pucrunch compression algorithm
compression-snappyThe file has content related to Snappy compression algorithm
compression-unlzxThe file has content related to UnLZX compression algorithm
compression-unrarlibThe file has content related to unrarlib compression algorithm
compression-zipThe file has content related to Zip compression
compression-zlibThe file has content related to Zlib compression algorithm
compression-zstdThe file has content related to Zstd compression algorithm
crypto-acssThe file has content related to ACSS algorithm
crypto-adler-crc32The file has content related to Adler-32 algorithm
crypto-base32The file has content related to Base32 algorithm
crypto-base64The file has content related to Base64 algorithm
crypto-base64urlThe file has content related to Base64URL algorithm
crypto-bcryptThe file has content related to BCrypt algorithm
crypto-bhencodeThe file has content related to Bhencode algorithm
crypto-blakeThe file has content related to Blake algorithm
crypto-blowfishThe file has content related to Blowfish algorithm
crypto-bmw512The file has content related to BMW-512 algorithm
crypto-botanThe file has content found in Botan cryptography library
crypto-camelliaThe file has content related to Camellia algorithm
crypto-castThe file has content related to CAST algorithm
crypto-cast256The file has content related to CAST-256 algorithm
crypto-clefiaThe file has content related to CLEFIA algorithm
crypto-collisionThe file contains blocks used in SHA-1 collision attacks
crypto-crc32The file has content related to CLEFIA algorithm
crypto-cryptlibThe file has content found in Cryptlib cryptography library
crypto-cryptoppThe file has content found in Cryptopp (Crypto++) cryptography library
crypto-desThe file has content related to DES algorithm
crypto-desxThe file has content related to DESX algorithm
crypto-dsaThe file has content related to Digital Signature Algorithm (DSA)
crypto-eccThe file has content related to Elliptic-curve cryptography (ECC)
crypto-frogThe file has content related to FROG algorithm
crypto-gnupgThe file has content found in GnuPG cryptography library
crypto-gnutlsThe file has content found in GnuTLS cryptography library
crypto-gostThe file has content related to GOST algorithm
crypto-havalThe file has content related to HAVAL algorithm
crypto-hmacThe file has content related to HMAC algorithm
crypto-ikeThe file has content related to Internet Key Exchange (IKE)
crypto-kasumiThe file has content related to KASUMI algorithm
crypto-keccakThe file has content related to Keccak algorithm
crypto-marsThe file has content related to MARS algorithm
crypto-md2The file has content related to MD2 algorithm
crypto-md4The file has content related to MD4 algorithm
crypto-md5The file has content related to MD5 algorithm
crypto-md5macThe file has content related to MD5-MAC algorithm
crypto-misty1The file has content related to Misty1 algorithm
crypto-misty2The file has content related to Misty2 algorithm
crypto-naclThe file has content found in NaCl cryptography libray
crypto-nettleThe file has content found in Nettle cryptography library
crypto-noekeonThe file has content related to NOEKEON algorithm
crypto-nssThe file has content found in NSS cryptography library
crypto-nushThe file has content related to NUSH algorithm
crypto-openbsd-base64The file has content related to OpenBSD Base64 algorithm
crypto-opensslThe file has content found in OpenSSL cryptography library
crypto-pbkdf2The file has content related to PBKDF2 algorithm
crypto-pkcsThe file has content related to Public Key Cryptography Standards (PKCS)
crypto-rawdesThe file has content related to RawDES algorithm
crypto-rc2The file has content related to RC2 algorithm
crypto-rc4The file has content related to RC4 algorithm
crypto-rijndaelThe file has content related to AES (Rijandel) algorithm
crypto-ripemd128The file has content related to RIPEMD-128 algorithm
crypto-ripemd160The file has content related to RIPEMD-160 algorithm
crypto-ripemd256The file has content related to RIPEMD-256 algorithm
crypto-ripemd320The file has content related to RIPEMD-320 algorithm
crypto-rsaThe file has content related to RSA algorithm
crypto-rtssThe file has content related to Robust Threshold Secret Sharing (RTSS)
crypto-saferThe file has content related to SAFER algorithm
crypto-salsa20The file has content related to Salsa20 algorithm
crypto-seedThe file has content related to SEED algorithm
crypto-serpentThe file has content related to Serpent algorithm
crypto-sha1The file has content related to SHA-1 algorithm
crypto-sha224The file has content related to SHA-224 algorithm
crypto-sha256The file has content related to SHA-256 algorithm
crypto-sha384The file has content related to SHA-384 algorithm
crypto-sha512The file has content related to SHA-512 algorithm
crypto-sharkThe file has content related to Shark algorithm
crypto-siphashThe file has content related to SipHash algorithm
crypto-skeinThe file has content related to Skein algorithm
crypto-skipjackThe file has content related to Skipjack algorithm
crypto-sms4The file has content related to SMS4 algorithm
crypto-sosemanukThe file has content related to Sosemanuk algorithm
crypto-squareThe file has content related to Square algorithm
crypto-tigerThe file has content related to Tiger algorithm
crypto-tripledesThe file has content related to TripleDES algorithm
crypto-turingThe file has content related to Turing algorithm
crypto-twofishThe file has content related to Twofish algorithm
crypto-unicornThe file has content related to Unicorn algorithm
crypto-uuencodeThe file has content related to UUencode algorithm
crypto-wakeThe file has content related to Wake algorithm
crypto-whirlpoolThe file has content related to Whirlpool algorithm
crypto-x509The file has content related to X.509 standard
crypto-xxencodeThe file has content related to XXencode algorithm

Email specific tags - related to email content

disposable-emailEmail is hosted by a service that offers disposable email addresses
email-deceptive-senderThe display name of one of the senders contains a string resembling an email address with a domain different from the specified email address
email-returnpath-mismatchThe "Return-Path" header contains an email address with a domain that is different from the domain of the sender
email-replyto-mismatchThe "Reply-To" header contains an email address with a domain that is different from the domain of the sender
email-sender-mismatchThe "Sender" header contains an email address with a domain that is different from the domain specified in the "From" header
email-envelopefrom-mismatchThe "X-Envelope-From" header contains an email address with a domain that is different from the domain of the sender
email-receivedtime-mismatchThe "Date" header indicates a time that is in the future or more than 1 hour before the time specified in the "Received" header
email-spf-failHeaders indicate that the SPF (Sender Policy Framework) check has failed
email-dkim-failHeaders indicate that the DKIM (Domain Keys Identified Mail) check has failed
email-dmarc-failHeaders indicate that the DMARC (Domain-based Message Authentication, Reporting & Conformance) check has failed
email-pgpEmail is signed and/or encrypted using "Pretty Good Privacy"
email-smimeEmail is signed and/or encrypted using "Secure/Multipurpose Internet Mail Extensions"
email-attachmentEmail contains at least one attachment
email-deceptive-extensionEmail attachment contains multiple extensions (eg. "file.doc.exe")
email-body-plainContent of email body is available in plain text format
email-body-rtfContent of email body is available in RTF format
email-body-htmlContent of email body is available in HTML format
email-impersonationThe display name of one of the senders impersonates a popular service
email-signature-impersonationEmail contents impersonate an email commonly sent by a popular service
email-urgencyEmail contains multiple phrases that imply a sense of urgency
email-sensitive-topicEmail contains multiple phrases related to sensitive topics
email-hidden-textEmail contains a hidden block of text designed to trick classification systems
email-subject-spamEmail subject contains phrases common to spam messages
email-subject-phishingEmail subject is commonly used in phishing messages
email-anonymous-providerEmail is sent using an anonymous email provider

Format specific tags - apply only specific file formats

html-frameThe HTML file contains one or more IFRAME tags
html-formThe HTML file contains one or more FORM tags
html-inputThe HTML file contains one or more INPUT tags
html-passwordThe HTML file contains one or more tags with the "password" attribute
html-imageThe HTML file contains one or more IMAGE tags
html-canvasThe HTML file contains one or more CANVAS tags
html-objectThe HTML file contains any of the following tags: APPLET, AUDIO, EMBED, OBJECT, SOURCE, VIDEO
html-downloadThe HTML file contains one or more links with the "download" attribute
html-local-linkThe HTML file contains one or more links to local files
html-trackingThe HTML file contains one or more tracking pixels
html-popupThe HTML file contains an A tag with target="_blank" attribute
html-wsffileThe HTML file contains an A tag with href="jsffile:..." or href="wsffile:..." or href="wsfhile:..."
font-embeddedThe HTML file contains embedded fonts
deceptive-linkThe HTML file contains potentially deceptive links
platform-unixThe quarantine file was created by a security solution running on a UNIX-like operating system
platform-windowsThe quarantine file was created by a security solution running on the Microsoft Windows operating system
quarantine-manualThe quarantine file was added to the quarantine manually by a user, not as a result of an automatic detection by the security solution
quarantine-malicious-contentThe quarantine file contains any number of remediated malicious content associated with a detected threat
quarantine-threat-metadataThe quarantine file contains metadata describing the antivirus specific threat which triggered the remediation
version-control-artifactThe file is part of a control structure for a version control repository (e.g. an index or revision data)