|
481 | 481 | "name": "ThreatIntelligenceProperties", |
482 | 482 | "required": true, |
483 | 483 | "schema": { |
484 | | - "$ref": "#/definitions/ThreatIntelligenceIndicatorModelForRequestBody" |
| 484 | + "$ref": "#/definitions/ThreatIntelligenceIndicatorModel" |
485 | 485 | }, |
486 | 486 | "x-ms-parameter-location": "method" |
487 | 487 | }, |
|
491 | 491 | "name": "ThreatIntelligenceReplaceTags", |
492 | 492 | "required": true, |
493 | 493 | "schema": { |
494 | | - "$ref": "#/definitions/ThreatIntelligenceIndicatorModelForRequestBody" |
| 494 | + "$ref": "#/definitions/ThreatIntelligenceIndicatorModel" |
495 | 495 | }, |
496 | 496 | "x-ms-parameter-location": "method" |
497 | 497 | }, |
|
538 | 538 | "items": { |
539 | 539 | "$ref": "#/definitions/ThreatIntelligenceInformation" |
540 | 540 | }, |
541 | | - "type": "array" |
| 541 | + "type": "array", |
| 542 | + "x-ms-identifiers": [] |
542 | 543 | } |
543 | 544 | }, |
544 | 545 | "type": "object", |
|
550 | 551 | "allOf": [ |
551 | 552 | { |
552 | 553 | "$ref": "../../../common/2.0/types.json#/definitions/ResourceWithEtag" |
553 | | - }, |
554 | | - { |
555 | | - "$ref": "#/definitions/ThreatIntelligenceResourceKind" |
556 | 554 | } |
557 | 555 | ], |
558 | 556 | "description": "Threat intelligence information object.", |
| 557 | + "properties": { |
| 558 | + "kind": { |
| 559 | + "$ref": "#/definitions/ThreatIntelligenceResourceInnerKind", |
| 560 | + "description": "The kind of the entity." |
| 561 | + } |
| 562 | + }, |
559 | 563 | "discriminator": "kind", |
560 | 564 | "type": "object", |
561 | 565 | "required": [ |
|
579 | 583 | "type": "object", |
580 | 584 | "x-ms-discriminator-value": "indicator" |
581 | 585 | }, |
582 | | - "ThreatIntelligenceIndicatorModelForRequestBody": { |
583 | | - "allOf": [ |
584 | | - { |
585 | | - "$ref": "#/definitions/ThreatIntelligenceResourceKind" |
586 | | - } |
587 | | - ], |
588 | | - "description": "Threat intelligence indicator entity used in request body.", |
589 | | - "properties": { |
590 | | - "etag": { |
591 | | - "description": "Etag of the azure resource", |
592 | | - "type": "string" |
593 | | - }, |
594 | | - "properties": { |
595 | | - "$ref": "#/definitions/ThreatIntelligenceIndicatorProperties", |
596 | | - "description": "Threat Intelligence Entity properties", |
597 | | - "x-ms-client-flatten": true |
598 | | - } |
599 | | - }, |
600 | | - "type": "object", |
601 | | - "x-ms-discriminator-value": "indicator" |
602 | | - }, |
603 | | - "ThreatIntelligenceResourceKind": { |
604 | | - "description": "Describes an entity with kind.", |
605 | | - "properties": { |
606 | | - "kind": { |
607 | | - "$ref": "#/definitions/ThreatIntelligenceResourceInnerKind", |
608 | | - "description": "The kind of the entity." |
609 | | - } |
610 | | - }, |
611 | | - "discriminator": "kind", |
612 | | - "required": [ |
613 | | - "kind" |
614 | | - ], |
615 | | - "type": "object" |
616 | | - }, |
617 | 586 | "ThreatIntelligenceResourceInnerKind": { |
618 | 587 | "description": "The kind of the threat intelligence entity", |
619 | 588 | "enum": [ |
|
645 | 614 | "description": "tag", |
646 | 615 | "type": "string" |
647 | 616 | }, |
648 | | - "type": "array" |
| 617 | + "type": "array", |
| 618 | + "x-ms-identifiers": [] |
649 | 619 | }, |
650 | 620 | "lastUpdatedTimeUtc": { |
651 | 621 | "description": "Last updated time in UTC", |
|
669 | 639 | "description": "Indicator type of a threat intelligence entity", |
670 | 640 | "type": "string" |
671 | 641 | }, |
672 | | - "type": "array" |
| 642 | + "type": "array", |
| 643 | + "x-ms-identifiers": [] |
673 | 644 | }, |
674 | 645 | "pattern": { |
675 | 646 | "description": "Pattern of a threat intelligence entity", |
|
689 | 660 | "description": "Kill chain phase", |
690 | 661 | "$ref": "#/definitions/ThreatIntelligenceKillChainPhase" |
691 | 662 | }, |
692 | | - "type": "array" |
| 663 | + "type": "array", |
| 664 | + "x-ms-identifiers": [] |
693 | 665 | }, |
694 | 666 | "parsedPattern": { |
695 | 667 | "description": "Parsed patterns", |
696 | 668 | "items": { |
697 | 669 | "description": "Parsed pattern", |
698 | 670 | "$ref": "#/definitions/ThreatIntelligenceParsedPattern" |
699 | 671 | }, |
700 | | - "type": "array" |
| 672 | + "type": "array", |
| 673 | + "x-ms-identifiers": [] |
701 | 674 | }, |
702 | 675 | "externalId": { |
703 | 676 | "description": "External ID of threat intelligence entity", |
|
721 | 694 | "description": "external_reference", |
722 | 695 | "$ref": "#/definitions/ThreatIntelligenceExternalReference" |
723 | 696 | }, |
724 | | - "type": "array" |
| 697 | + "type": "array", |
| 698 | + "x-ms-identifiers": [] |
725 | 699 | }, |
726 | 700 | "granularMarkings": { |
727 | 701 | "description": "Granular Markings", |
728 | 702 | "items": { |
729 | 703 | "description": "Granular marking", |
730 | 704 | "$ref": "#/definitions/ThreatIntelligenceGranularMarkingModel" |
731 | 705 | }, |
732 | | - "type": "array" |
| 706 | + "type": "array", |
| 707 | + "x-ms-identifiers": [] |
733 | 708 | }, |
734 | 709 | "labels": { |
735 | 710 | "description": "Labels of threat intelligence entity", |
736 | 711 | "items": { |
737 | 712 | "description": "label", |
738 | 713 | "type": "string" |
739 | 714 | }, |
740 | | - "type": "array" |
| 715 | + "type": "array", |
| 716 | + "x-ms-identifiers": [] |
741 | 717 | }, |
742 | 718 | "revoked": { |
743 | 719 | "description": "Is threat intelligence entity revoked", |
|
754 | 730 | "description": "Threat intelligence entity object marking reference", |
755 | 731 | "type": "string" |
756 | 732 | }, |
757 | | - "type": "array" |
| 733 | + "type": "array", |
| 734 | + "x-ms-identifiers": [] |
758 | 735 | }, |
759 | 736 | "language": { |
760 | 737 | "description": "Language of threat intelligence entity", |
|
766 | 743 | "description": "Threat type", |
767 | 744 | "type": "string" |
768 | 745 | }, |
769 | | - "type": "array" |
| 746 | + "type": "array", |
| 747 | + "x-ms-identifiers": [] |
770 | 748 | }, |
771 | 749 | "validFrom": { |
772 | 750 | "description": "Valid from", |
|
819 | 797 | "description": "Pattern type key", |
820 | 798 | "$ref": "#/definitions/ThreatIntelligenceParsedPatternTypeValue" |
821 | 799 | }, |
822 | | - "type": "array" |
| 800 | + "type": "array", |
| 801 | + "x-ms-identifiers": [] |
823 | 802 | } |
824 | 803 | }, |
825 | 804 | "type": "object" |
|
856 | 835 | "description": "granular marking model selector", |
857 | 836 | "type": "string" |
858 | 837 | }, |
859 | | - "type": "array" |
| 838 | + "type": "array", |
| 839 | + "x-ms-identifiers": [] |
860 | 840 | } |
861 | 841 | }, |
862 | 842 | "type": "object" |
|
926 | 906 | "description": "Sort By", |
927 | 907 | "$ref": "#/definitions/ThreatIntelligenceSortingCriteria" |
928 | 908 | }, |
929 | | - "type": "array" |
| 909 | + "type": "array", |
| 910 | + "x-ms-identifiers": [] |
930 | 911 | }, |
931 | 912 | "sources": { |
932 | 913 | "description": "Sources of threat intelligence indicators", |
933 | 914 | "items": { |
934 | 915 | "description": "Source", |
935 | 916 | "type": "string" |
936 | 917 | }, |
937 | | - "type": "array" |
| 918 | + "type": "array", |
| 919 | + "x-ms-identifiers": [] |
938 | 920 | }, |
939 | 921 | "patternTypes": { |
940 | 922 | "description": "Pattern types", |
941 | 923 | "items": { |
942 | 924 | "description": "Pattern type", |
943 | 925 | "type": "string" |
944 | 926 | }, |
945 | | - "type": "array" |
| 927 | + "type": "array", |
| 928 | + "x-ms-identifiers": [] |
946 | 929 | }, |
947 | 930 | "threatTypes": { |
948 | 931 | "description": "Threat types of threat intelligence indicators", |
949 | 932 | "items": { |
950 | 933 | "description": "Threat type of a threat intelligence indicator", |
951 | 934 | "type": "string" |
952 | 935 | }, |
953 | | - "type": "array" |
| 936 | + "type": "array", |
| 937 | + "x-ms-identifiers": [] |
954 | 938 | }, |
955 | 939 | "ids": { |
956 | 940 | "description": "Ids of threat intelligence indicators", |
957 | 941 | "items": { |
958 | 942 | "description": "Id of a threat intelligence indicator", |
959 | 943 | "type": "string" |
960 | 944 | }, |
961 | | - "type": "array" |
| 945 | + "type": "array", |
| 946 | + "x-ms-identifiers": [] |
962 | 947 | }, |
963 | 948 | "keywords": { |
964 | 949 | "description": "Keywords for searching threat intelligence indicators", |
965 | 950 | "items": { |
966 | 951 | "description": "keyword for searching threat intelligence indicators", |
967 | 952 | "type": "string" |
968 | 953 | }, |
969 | | - "type": "array" |
| 954 | + "type": "array", |
| 955 | + "x-ms-identifiers": [] |
970 | 956 | }, |
971 | 957 | "skipToken": { |
972 | 958 | "description": "Skip token.", |
|
1022 | 1008 | "description": "parameter", |
1023 | 1009 | "type": "string" |
1024 | 1010 | }, |
1025 | | - "type": "array" |
| 1011 | + "type": "array", |
| 1012 | + "x-ms-identifiers": [] |
1026 | 1013 | } |
1027 | 1014 | }, |
1028 | 1015 | "type": "object" |
|
1035 | 1022 | "items": { |
1036 | 1023 | "$ref": "#/definitions/ThreatIntelligenceMetrics" |
1037 | 1024 | }, |
1038 | | - "type": "array" |
| 1025 | + "type": "array", |
| 1026 | + "x-ms-identifiers": [] |
1039 | 1027 | } |
1040 | 1028 | }, |
1041 | 1029 | "required": [ |
|
1066 | 1054 | "description": "parameter", |
1067 | 1055 | "$ref": "#/definitions/ThreatIntelligenceMetricEntity" |
1068 | 1056 | }, |
1069 | | - "type": "array" |
| 1057 | + "type": "array", |
| 1058 | + "x-ms-identifiers": [] |
1070 | 1059 | }, |
1071 | 1060 | "patternTypeMetrics": { |
1072 | 1061 | "description": "Pattern type metrics", |
1073 | 1062 | "items": { |
1074 | 1063 | "description": "parameter", |
1075 | 1064 | "$ref": "#/definitions/ThreatIntelligenceMetricEntity" |
1076 | 1065 | }, |
1077 | | - "type": "array" |
| 1066 | + "type": "array", |
| 1067 | + "x-ms-identifiers": [] |
1078 | 1068 | }, |
1079 | 1069 | "sourceMetrics": { |
1080 | 1070 | "description": "Source metrics", |
1081 | 1071 | "items": { |
1082 | 1072 | "description": "parameter", |
1083 | 1073 | "$ref": "#/definitions/ThreatIntelligenceMetricEntity" |
1084 | 1074 | }, |
1085 | | - "type": "array" |
| 1075 | + "type": "array", |
| 1076 | + "x-ms-identifiers": [] |
1086 | 1077 | } |
1087 | 1078 | }, |
1088 | 1079 | "type": "object" |
|
0 commit comments