TQL Operators and Parameters
  • 21 Dec 2025
  • 20 Minutes to read
  • Dark
    Light
  • PDF

TQL Operators and Parameters

  • Dark
    Light
  • PDF

Article summary

Overview

A ThreatConnect® Query Language (TQL) query expression includes a parameter name, an operator, and a value or list of values, and you can combine multiple query expressions using parentheses and AND/OR logic. This article provides a list of all TQL operators and parameters available in ThreatConnect.

Note
A value’s case sensitivity may depend on database deployment type, the operator being applied to it, or other factors.

Operators

Table 1 describes the ThreatConnect Query Language (TQL) operators in all their acceptable forms.

Note
Operators are case insensitive. For example, when using the IN operator in a query, it can be written as IN or in.

 

Operator(s)DescriptionExample
=, ==, EQ, EQUALSReturns objects that equal the specified value.typeName = "Adversary"
!=, NEReturns objects that do not equal the specified value.typeName != "Adversary"
>, GTReturns objects that are greater than the specified value.dateAdded > "2023-12-31"
<, LTReturns objects that are less than the specified value.dateAdded < "2023-12-31"
<=, LEQReturns objects that are less than or equal to the specified value.dateAdded <= "2023-12-31"
>=, GEQReturns objects that are greater than or equal to the specified value.dateAdded >= "2023-12-31"
INReturns objects that match any value in a list of values.typeName IN ("Host", "URL")
LIKEReturns objects that match an exact term or a pattern. Use the percent symbol (%) as a wildcard to represent zero, one, or multiple characters in a pattern.typeName LIKE ("Email%")
CONTAINSReturns objects that contain the specified value.summary CONTAINS "bad"
STARTSWITHReturns objects that start with the specified value.summary STARTSWITH "CVE-"
ENDSWITHReturns objects that end with the specified value.summary ENDSWITH ".com"
NOTNegates the IN, LIKE, CONTAINS, STARTSWITH, or ENDSWITH operator or a nested query in an expression. Place NOT before the operator or nested query to be negated.summary NOT CONTAINS "bad"
ANDLogical and that returns objects for which all conditions in the expression are true.typeName = "Host" AND dateAdded >= "2023-12-31"
ORLogical or that returns objects for which any condition in the expression is true.typeName = "Host" OR dateAdded >= "2023-12-31"

Parameters

The following subsections describe the threat intelligence, Workflow, and general TQL parameters available in ThreatConnect.

Note
Parameters are case insensitive. For example, when using the typeName parameter in a query, it can be written as typeName or typename.

Threat Intelligence Parameters

The following subsections describe the TQL parameters available for threat intelligence data objects in ThreatConnect.

Note
It is recommended to use ISO-8601-compliant formatting for TQL parameters with the Date data type.

Groups

Table 2 provides the TQL parameters available for Groups. Table 3 provides the TQL parameters available for unified Groups.

 

Object TypeParameterData TypeComments
GroupsaiProviderStringThe provider of an AI-generated summary for a relevant Group (ThreatConnect AI for user-generated summaries; the name of the feed for AI insights provided by participating feeds)
GroupsassociatedGroupSourceStringAcceptable values:
  • UNKNOWN
  • MANUAL
  • API
  • TQL
  • DNS
  • EMAIL
See the “Query for Objects by Association Method” section of Constructing Query Expressions for more information.
GroupsassociatedIndicatorIntegerDeprecated by nested query; equivalent to hasIndicator(id=n)
GroupsassociatedIndicatorSourceStringAcceptable values:
  • UNKNOWN
  • MANUAL
  • API
  • TQL
  • DNS
  • EMAIL
See the “Query for Objects by Association Method” section of Constructing Query Expressions for more information.
GroupsattackTagStringThe name of an ATT&CK® Tag applied to the Group
GroupsattributeNNDependentSee the “Query for Attributes” section of Constructing Query Expressions for more information.
GroupscreatedByUserAny username in the user’s Organization (e.g., createdBy = "joeuser@gmail.com")
GroupsdateAddedDate
GroupsdocumentDateAddedDate
GroupsdocumentFilenameString
GroupsdocumentFilesizeLong
GroupsdocumentStatusString
GroupsdocumentTypeString
GroupsdownvoteCountInteger
GroupsemailDateDate
GroupsemailFromString
GroupsemailScoreInteger
GroupsemailScoreIncludesBodyBoolean
GroupsemailSubjectString
GroupseventDateDate
GroupseventTypeEnum

The type of event that an Event Group represents.

Acceptable values:

  • Alert
  • Campaign
  • None
GroupsexternalDateAddedDateThe date that the Group was first created externally
GroupsexternalDateExpiresDateThe date that the Group was last modified externally
GroupsexternalLastModifiedDateThe date that the Group expires externally
GroupsfirstSeenDateThe date that the Group was first seen
GroupsgeneratedReportBooleanReturns Report Groups that were created using the Publish Report feature in the Report Editor
GroupshasAllTags()Nested QueryA nested query that returns only Groups with all specified Tags applied to them. The query must be of the form hasAllTags(id=x) or hasAllTags(id IN (x,y)), where x and y represent Tag ID numbers.
GroupshasArtifact()Nested Query
GroupshasAttribute()Nested Query
GroupshasCase()Nested Query
GroupshasCommonGroup()Nested QueryA nested query that returns unified Groups that meet the specified criteria. See Table 3 for a list of parameters that can be used within the hasCommonGroup() nested query parameter.
GroupshasGroup()Nested Query
GroupshasIndicator()Nested Query
GroupshasIntelQuery()Nested Query
GroupshasIntelRequirement()Nested Query
GroupshasSecurityLabel()Nested Query
GroupshasTag()Nested Query
GroupshasVictim()Nested Query
GroupshasVictimAsset()Nested Query
GroupsidIntegerThe ID number of a Group. This number can be found in the URL of the Group’s Details screen, between groups/ and /overview.
GroupsinsightsStringThe AI-generated summary of a Group provided by a participating feed for a relevant Group
GroupslastModifiedDate
GroupslastSeenDateThe date that the Group was last seen
GroupsownerInteger
GroupsownerNameString
GroupssecurityLabelString
GroupssignatureDateAddedDate
GroupssignatureFilenameString
GroupssignatureTypeString
GroupsstatusString
GroupssummaryString
GroupstagStringDeprecated by nested query; equivalent to hasTag(summary="")
GroupstagOwnerIntegerDeprecated by nested query; equivalent to hasTag(owner=n)
GroupstagOwnerNameStringDeprecated by nested query; equivalent to hasTag(ownerName="")
GroupstaskAssigneeUserme is the only valid value
GroupstaskAssigneePseudoUser
GroupstaskDateAddedDate
GroupstaskDueDateDate
GroupstaskEscalatedBoolean
GroupstaskEscalationDateDate
GroupstaskLastModifiedDate
GroupstaskOverdueBoolean
GroupstaskRemindedBoolean
GroupstaskReminderDateDate
GroupstaskStatusString
GroupstypeInteger
GroupstypeNameString
GroupsupvoteCountInteger
GroupsvictimAssetStringDeprecated by nested query; equivalent to hasVictimAsset(name="")

 

Object TypeParameterData TypeComments
Unified Vulnerability GroupscriteriaStringThe Common Platform Enumeration (CPE) match criteria of a Vulnerability
Unified Vulnerability Groupscvss_score_v2DoubleThe CVSS V2 score of a Vulnerability. Scores range from 0–10.
Unified Vulnerability Groupscvss_score_v3DoubleThe CVSS V3 score of a Vulnerability. Scores range from 0–10.
Unified Vulnerability Groupscvss_score_v3_1DoubleThe CVSS V3.1 score of a Vulnerability. Scores range from 0–10.
Unified Vulnerability Groupscvss_score_v4DoubleThe CVSS V4 score of a Vulnerability. Scores range from 0–10.
Unified Vulnerability Groupscvss_severity_v2EnumThe CVSS V2 severity of a Vulnerability

Acceptable values:
  • Unknown
  • Low
  • Medium
  • High
Unified Vulnerability Groupscvss_severity_v3EnumThe CVSS V3 severity of a Vulnerability

Acceptable values:
  • Unknown
  • Low
  • Medium
  • High
Unified Vulnerability Groupscvss_severity_v3_1EnumThe CVSS V3.1 severity of a Vulnerability

Acceptable values:
  • Unknown
  • Low
  • Medium
  • High
Unified Vulnerability Groupscvss_severity_v4EnumThe CVSS V4 severity of a Vulnerability

Acceptable values:
  • Unknown
  • Low
  • Medium
  • High
Unified Vulnerability Groupscvss_v2StringThe CVSS V2 vector string of a Vulnerability
Unified Vulnerability Groupscvss_v3StringThe CVSS V3 vector string of a Vulnerability
Unified Vulnerability Groupscvss_v3_1StringThe CVSS V3.1 vector string of a Vulnerability
Unified Vulnerability Groupscvss_v4StringThe CVSS V4 vector string of a Vulnerability
Unified GroupsdateAddedDateTimeThe date a unified Group was created in ThreatConnect
Unified GroupsdescriptionStringThe description of a unified Group
Unified Vulnerability GroupsdueDateDateTimeThe date by which organizations are expected to patch or mitigate a Vulnerability listed in the U.S. Cybersecurity and Infrastructure Security Agency (CISA) Known Exploited Vulnerabilities (KEV) Catalog
Unified Vulnerability GroupsexternalDateAddedDateTimeThe date a Vulnerability was added to the KEV Catalog
Unified GroupshasGroup()Nested QueryA nested query for association to other Groups
Unified GroupsidIntegerThe ID number of a unified Group
Unified Vulnerability GroupsknownRansomwareCampaignUseStringThe designation as to whether a KEV Vulnerability is known to have been used in a ransomware campaign

Acceptable values:
  • Known
  • Unknown
Unified GroupslastAssessedDateTimeThe date a unified Group was last assessed by an external source (e.g., VulnCheck)
Unified GroupslastModifiedDateTimeThe date a unified Group was last modified in ThreatConnect
Unified Vulnerability GroupslastPublishedDateTimeThe date a Vulnerability was published in the National Institute of Standards and Technology (NIST) National Vulnerability Database (NVD)
Unified Vulnerability GroupsnotesStringThe additional notes provided for a KEV Vulnerability
Unified Vulnerability GroupsrequiredActionStringThe immediate action required by federal entities and other organizations to address a KEV Vulnerability
Unified Vulnerability GroupsshortDescriptionStringThe short description of a KEV Vulnerability
Unified Vulnerability GroupssourceStringThe reference source for a Vulnerability
Unified Vulnerability GroupssubtypeStringThe subtype of a Vulnerability

Acceptable values:
  • CVE
  • KEV
Unified GroupssummaryStringThe name/summary of a unified Group
Unified Vulnerability GroupstitleStringThe summary of a Vulnerability provided by an external source (e.g., VulnCheck)
Unified GroupstypeIntegerThe ID number of a unified Group’s type
Unified GroupstypeNameStringThe name of a unified Group’s type
Unified Vulnerability GroupsvendorProjectStringThe vendor project that discovered a KEV Vulnerability
Unified Vulnerability GroupsvulnerabilityNameStringThe name of a KEV Vulnerability

Indicators

Table 4 provides the TQL parameters available for Indicators.

 

Object TypeParameterData TypeComments
IndicatorsabuseIpdbConfidenceScoreIntegerThe Confidence of Abuse percentage calculated by AbuseIPDB for the Indicator. It is a rating, from 0 to 100, of how confident AbuseIPDB is, based on user reports, that an IP address is entirely malicious.
IndicatorsactiveLockedBoolean
IndicatorsaddressASNInteger
IndicatorsaddressCIDRCIDR Expression
IndicatorsaddressCityString
IndicatorsaddressCountryCodeString
IndicatorsaddressCountryNameString
IndicatorsaddressIpValBigInteger
IndicatorsaddressIsIpv6Boolean
IndicatorsaddressRegisteringOrgString
IndicatorsaddressStateString
IndicatorsaddressTimezoneString
IndicatorsassociatedGroupIntegerDeprecated by nested query; equivalent to hasGroup(id=n)
IndicatorsassociatedGroupSourceStringAcceptable values:
  • UNKNOWN
  • MANUAL
  • API
  • TQL
  • DNS
  • EMAIL
See the “Query for Objects by Association Method” section of Constructing Query Expressions for more information.
IndicatorsassociatedIndicatorSourceStringAcceptable values:
  • UNKNOWN
  • MANUAL
  • API
  • TQL
  • DNS
  • EMAIL
See the “Query for Objects by Association Method” section of Constructing Query Expressions for more information.
IndicatorsattackTag
String
The name of an ATT&CK Tag applied to the Indicator
IndicatorsattributeNNDependentSee the “Query for Attributes” section of Constructing Query Expressions for more information.
IndicatorsconfidenceInteger
IndicatorsdateAddedDateAcceptable formats:
  • yyyy-MM-dd HH:mm
  • yyyy-MM-dd
  • MM-dd-yyyy
IndicatorsdescriptionString
IndicatorsdtLastUpdatedDateThe last date and time the Indicator was looked at with DomainTools®
IndicatorsdtMalwareScoreIntegerThe malware score for the Indicator in DomainTools
IndicatorsdtOverallScoreIntegerThe overall score for the Indicator in DomainTools
IndicatorsdtPhishingScoreIntegerThe phishing score for the Indicator in DomainTools
IndicatorsdtSpamScoreIntegerThe spam score for the Indicator in DomainTools
IndicatorsdtStatusBooleanThe domain status for the Indicator in DomainTools
IndicatorsexternalDateAddedDateThe date and time that the Indicator was first created externally
IndicatorsexternalDateExpiresDateThe date and time the Indicator expires externally
IndicatorsexternalLastModifiedDateThe date and time that the Indicator was last modified externally
IndicatorsfalsePositiveCountString
IndicatorsfileNameString
IndicatorsfilePathString
IndicatorsfileSizeBigInteger
IndicatorsfirstSeenDateThe date and time that the Indicator was first seen
IndicatorshasAllTags()Nested QueryA nested query that returns only Indicators with all specified Tags applied to them. The query must be of the form hasAllTags(id=x) or hasAllTags(id IN (x,y)), where x and y represent Tag ID numbers.
IndicatorshasArtifact()Nested Query
IndicatorshasAttribute()Nested Query
IndicatorshasCase()Nested Query
IndicatorshasCustomAssociation()Nested Query
IndicatorshasGroup()Nested Query
IndicatorshasIndicator()Nested Query
IndicatorshasIntelRequirement()Nested Query
IndicatorshasSecurityLabel()Nested Query
IndicatorshasTag()Nested Query
IndicatorshasVictim()Nested Query
IndicatorshasVictimAsset()Nested Query
IndicatorshostDnsActiveBoolean
IndicatorshostWhoisActiveBoolean
IndicatorsidIntegerThe ID number of an Indicator. This number can be found in the URL of the Indicator’s Details screen, between indicators/ and /overview.
IndicatorsindicatorActiveBoolean
IndicatorslastFalsePositiveDate
IndicatorslastModifiedDate
IndicatorslastObservedDate
IndicatorslastSeenDateThe date and time that the Indicator was last seen
IndicatorsobservationCountInteger
IndicatorsownerInteger
IndicatorsownerNameString
IndicatorsratingInteger
IndicatorssecurityLabelString
IndicatorssourceString
IndicatorssummaryString
IndicatorstagStringDeprecated by nested query; equivalent to hasTag(summary="")
IndicatorstagOwnerIntegerDeprecated by nested query; equivalent to hasTag(owner=n)
IndicatorstagOwnerNameStringDeprecated by nested query; equivalent to hasTag(ownerName="")
Indicators
threatAssessLastUpdated
DateTime
The date and time an Indicator’s ThreatAssess score was most recently updated (or, for newly scored Indicators, the date and time the Indicator’s ThreatAssess score was first calculated)
IndicatorsthreatAssessScoreInteger
IndicatorstypeInteger
IndicatorstypeNameString
Indicatorsvalue1StringUsed to search for Indicators that include multiple fields (e.g., File Indicators, Registry Key Indicators)
Indicatorsvalue2StringUsed to search for Indicators that include multiple fields (e.g., File Indicators, Registry Key Indicators)
Indicatorsvalue3StringUsed to search for Indicators that include multiple fields (e.g., File Indicators, Registry Key Indicators)
IndicatorsvtLastUpdatedDateThe last date and time the Indicator was looked at with VirusTotal™
IndicatorsvtMaliciousCountIntegerThe number of malicious reports for an Indicator from VirusTotal (i.e., the VirusTotal score)

Intelligence Requirements

Table 5 provides the TQL parameters available for Intelligence Requirements (IRs).

 

Object TypeParameterData TypeComments
Intelligence RequirementscategoryStringThe category of an IR
Intelligence RequirementsdateAddedDateThe date and time an IR was added to ThreatConnect
Intelligence RequirementshasArtifact()Nested QueryA nested query for association to Artifacts
Intelligence RequirementshasCase()Nested QueryA nested query for association to Cases
Intelligence RequirementshasGroup()Nested QueryA nested query for association to Groups
Intelligence RequirementshasIndicator()Nested QueryA nested query for association to Indicators
Intelligence RequirementshasTag()Nested QueryA nested query for association to Tags
Intelligence RequirementshasVictim()Nested QueryA nested query for association to Victims
Intelligence RequirementshasVictimAsset()Nested QueryA nested query for association to Victim Assets
Intelligence RequirementsidIntegerThe ID number of an IR. This number can be found in the URL of the IR’s Details screen, between intel-requirements/ and /overview.
Intelligence RequirementslastModifiedDateThe last modified date for an IR
Intelligence RequirementsownerIntegerThe ID of an IR’s owner
Intelligence RequirementsownerNameStringThe name of an IR's owner
Intelligence RequirementsrequirementStringThe summary of an IR
Intelligence RequirementssubtypeStringThe subtype of an IR
Intelligence RequirementstagStringThe name of a Tag applied to an IR
Intelligence RequirementsuniqueIdStringThe unique ID of an IR. This is the number that was entered in the ID field when the IR was created. It is found at the upper left of the header of the IR’s Details screen, both next to the Browse link and above the IR’s summary.

Intelligence Requirement Results

Table 6 provides the TQL parameters available for Intelligence Requirement (IR) results.

Important
You can query for Intelligence Requirement results only in dashboard Query cards  and when using the ThreatConnect v3 API. You cannot query for them on the Legacy Browse screen or when searching by object type on the Search screen.

 

Object TypeParameterData TypeComments
Intelligence Requirement ResultsarchivedDateDateThe date and time an IR query result was archived
Intelligence Requirement ResultsdateAddedDateThe date and time the ThreatConnect object to which an IR query result corresponds was created
Intelligence Requirement ResultshasIntelRequirement()Nested Query
Intelligence Requirement ResultsidIntegerThe ID number of an IR query result
Intelligence Requirement ResultsintelIdIntegerThe ID number of the ThreatConnect object to which an IR query result corresponds
Intelligence Requirement ResultsintelReqIdIntegerThe ID number of the IR to which an IR query result corresponds
Intelligence Requirement ResultsintelTypeStringThe type of ThreatConnect object to which an IR query result corresponds (e.g., Address, Host, Adversary, Campaign)
Intelligence Requirement ResultsisArchivedBooleanA flag indicating whether an IR query result has been archived
Intelligence Requirement ResultsisAssociatedBooleanA flag indicating whether an IR query result has been associated to an IR
Intelligence Requirement ResultsisDeletedBooleanA flag indicating whether an IR query result has been deleted
Intelligence Requirement ResultsisFalsePositiveBooleanA flag indicating whether an IR query result has been flagged as a false positive
Intelligence Requirement ResultsisLocalBooleanA flag indicating whether an IR query result exists in the owners to which you have access on your ThreatConnect instance
Intelligence Requirement ResultslastMatchedDateDateThe date and time that an IR query result last matched the IR’s keyword query
Intelligence Requirement ResultslastModifiedDateThe date and time the ThreatConnect object to which an IR query result corresponds was last modified
Intelligence Requirement ResultsownerIntegerThe ID number of the owner of the ThreatConnect object to which an IR query result corresponds
Intelligence Requirement ResultsownerNameStringThe name of the owner of the ThreatConnect object to which an IR query result corresponds
Intelligence Requirement ResultsscoreDecimalA weighted score indicating the relevancy of an IR query result
Note
The score for an IR query result is not available in the ThreatConnect UI. It can be accessed only via TQL queries and the v3 API. This parameter can be used to target IR query results that have the most relevancy out of all available IR query results.
Intelligence Requirement ResultssummaryStringThe summary of the ThreatConnect object to which an IR query result corresponds

Tags

Table 7 provides the TQL parameters available for Tags.

 

Object TypeParameterData TypeComments
TagsactiveBooleanRead-only field that can be false for certain ATT&CK Tags that become deprecated over time and will be excluded from places such as the ATT&CK Visualizer. The value of this parameter is true in all other cases.
TagsassociatedCaseIntegerDeprecated by nested query; equivalent to hasCase(id=n)
TagsassociatedGroupIntegerDeprecated by nested query; equivalent to hasGroup(id=n)
TagsassociatedIndicatorIntegerDeprecated by nested query; equivalent to hasIndicator(id=n)
TagsassociatedVictimIntegerDeprecated by nested query; equivalent to hasVictim(id=n)
TagscaseIdInteger
TagsdescriptionString
TagsfinancialRiskScoreIntegerThe financial risk score of an ATT&CK Tag as it relates to the user's Organization. This score is derived from ThreatConnect Risk Quantifier (RQ).

For more information, see ATT&CK RQ Financial Impact.
TagsfinancialRiskValue
IntegerThe financial risk currency value of an ATT&CK Tag as it relates to the user's Organization. This value is derived from ThreatConnect RQ.

For more information, see ATT&CK RQ Financial Impact.
TagshasCase()Nested Query
TagshasGroup()Nested Query
TagshasIndicator()Nested Query
TagshasVictim()Nested Query
TagsidIntegerThe ID number of a Tag. This number can be found in the URL of the Tag’s Details screen, after tag.xhtml?tag=.
TagslastUsedDate
TagsnameStringThe name of the Tag (case sensitive)
TagsnormalizedBooleanRead-only field that indicates if a Tag is defined as a main Tag within a Tag normalization rule.
TagsownerInteger
TagsownerNameString
TagssecurityCoverageEnum

The security coverage level assigned to an ATT&CK Tag in your Organization.

Acceptable values:

  • None
  • Weak
  • Moderate
  • Strong
TagssummaryStringThe name of the Tag (case insensitive)
TagstechniqueIdStringThe standard ID for specific MITRE ATT&CK techniques and sub-techniques (e.g., T1234, T1234.001). The value of this parameter is null for all non-ATT&CK Tags.

Victim Assets

Table 8 provides the TQL parameters available for Victim Assets.

 

Object TypeParameterData TypeComments
Victim AssetsassetString
Victim AssetsassociatedGroupIntegerDeprecated by nested query; equivalent to hasGroup(id=n)
Victim AssetshasGroup()Nested Query
Victim AssetshasIndicator()Nested Query
Victim AssetshasVictim()Nested Query
Victim AssetshasVictimAsset()Nested Query
Victim AssetsidInteger
Victim AssetsownerInteger
Victim AssetsownerNameString
Victim AssetssummaryString
Victim AssetstypeInteger
Victim AssetstypeNameString
Victim AssetsvictimIdInteger
Victim AssetsvictimNameString

Victims

Table 9 provides the TQL parameters available for Victims.

 

Object TypeParameterData TypeComments
VictimsassetNameStringDeprecated by nested query; equivalent to hasVictimAsset(summary="")
VictimsassetTypeIntegerDeprecated by nested query; equivalent to hasVictimAsset(type=n)
VictimsassetTypeNameStringDeprecated by nested query; equivalent to hasVictimAsset(typeName="")
VictimsattackTagStringThe name of an ATT&CK Tag applied to the Victim
VictimsattributeNNDependentSee the “Query for Attributes” section of Constructing Query Expressions for more information.
VictimsdescriptionString
VictimshasAllTags()Nested QueryA nested query that returns only Victims with all specified Tags applied to them. The query must be of the form hasAllTags(id=x) or hasAllTags(id IN (x,y)), where x and y represent Tag ID numbers.
VictimshasAttribute()Nested Query
VictimshasGroup()Nested Query
VictimshasIndicator()Nested Query
VictimshasSecurityLabel()Nested Query
VictimshasTag()Nested Query
VictimshasVictim()Nested Query
VictimshasVictimAsset()Nested Query
VictimsidIntegerThe ID number of a Victim. This number can be found in the URL of the Victim’s Details screen, after victim.xhtml?victim=.
VictimsnameString
VictimsnationalityString
VictimsorganizationString
VictimsownerInteger
VictimsownerNameString
VictimssecurityLabelString
VictimssubOrgString
VictimssummaryStringEquivalent to name
VictimstagStringDeprecated by nested query; equivalent to hasTag(summary="")
VictimstagOwnerIntegerDeprecated by nested query; equivalent to hasTag(owner=n)
VictimstagOwnerNameStringDeprecated by nested query; equivalent to hasTag(ownerName="")
VictimsworkLocationString

Workflow Parameters

The following subsections describe the TQL parameters available for Workflow objects in ThreatConnect.

Important
You can query for Workflow objects only in dashboard Query cards and the ThreatConnect v3 API. You cannot query for them on the Legacy Browse screen or when searching by object type on the Search screen.
Note
It is recommended to use ISO-8601-compliant formatting for TQL parameters with the Date data type.

Artifacts

Table 10 provides the TQL parameters available for Artifacts.

 

Workflow TypeParameterData TypeDescription
ArtifactanalyticsScoreIntegerThe ThreatAssess assessment level of the Artifact
ArtifactcaseIdIntegerThe ID number of a Case associated with an Artifact
ArtifactdateAddedDateThe date and time at which an Artifact was added to ThreatConnect
ArtifacthasCase()Nested QueryA nested query for association to other Cases
ArtifacthasGroup()Nested QueryA nested query for association to other Groups
ArtifacthasIndicator()Nested QueryA nested query for association to other Indicators
ArtifacthasNote()Nested QueryA nested query for association to other Notes
ArtifacthasTask()Nested QueryA nested query for association to other Tasks
ArtifactidIntegerThe ID number of an Artifact
ArtifactindicatorActiveBooleanA flag indicating whether the Artifact is active
ArtifactnoteIdIntegerThe ID number of a Note associated with an Artifact
ArtifactsourceStringThe source of an Artifact
ArtifactsummaryStringThe summary of an Artifact
ArtifacttaskIdIntegerThe ID number of a Task associated with an Artifact
ArtifacttypeStringThe type name of an Artifact
ArtifacttypeNameStringThe type name of an Artifact

Artifact Types

Table 11 provides the TQL parameters available for Artifact types.

 

Workflow TypeParameterData TypeDescription
ArtifactTypeactiveBooleanThe active status of an Artifact type
ArtifactTypedataTypeEnumThe data type of an Artifact type
ArtifactTypedescriptionStringThe description of an Artifact type
ArtifactTypeidIntegerThe ID number of an Artifact type
ArtifactTypeintelTypeStringThe intel type of an Artifact type
ArtifactTypemanagedBooleanThe managed status of an Artifact type
ArtifactTypenameStringThe name of an Artifact type

Cases

Table 12 provides the TQL parameters available for Cases.

 

Workflow TypeParameterData TypeDescription
CaseassignedToUserOrGroupEnumThe type of Case assignee (either User or Group)
CaseassigneeNameStringThe name of the user or user group assigned to the Case
CaseattackTagStringThe name of an ATT&CK Tag applied to the Case
CaseattributeStringAn Attribute corresponding to a Case
CasecalScoreIntegerThe CAL score of the Case (i.e., the highest CAL score among the Case’s Artifacts with a CAL score and an active Indicator Status set by CAL)
CasecaseCloseDateDateThe date and time a Case was closed
CasecaseCloseTimeDateThe date and time a Case was closed
CasecaseCloseUserUserThe username of the user who closed a Case
CasecaseDetectionTimeDateThe date and time a security incident or threat (i.e., the event that caused a Case to be opened) was detected (e.g., by the security team)
CasecaseDetectionUserUserThe username of the user who logged a Case’s detection time
CasecaseOccurrenceTimeDateThe date and time a security incident or threat (i.e., the event that caused a Case to be opened) occurred
CasecaseOccurrenceUserUserThe username of the user who logged a Case’s occurrence time
CasecaseOpenDateDateThe date and time a Case was opened
CasecaseOpenTimeDateThe date and time a Case was opened
CasecaseOpenUserUserThe username of the user who opened a Case
CasecreatedByUserThe username of the user who created a Case
CasecreatedByIdIntegerThe user ID number of the user who created a Case
CasedateAddedDateThe date on which a Case was added to ThreatConnect
CasedescriptionStringThe description of a Case
CasedetectionDueDateThe Service Level Agreement (SLA) detection due date for a Case
CasedetectionOverdueBooleanA flag indicating whether a Case exceeded the allowed completion time for its SLA detection due date
CasehasAllTags()Nested QueryA nested query that returns only Cases with all specified Tags applied to them. The query must be of the form hasAllTags(id=x) or hasAllTags(id IN (x,y)), where x and y represent Tag ID numbers.
CasehasArtifact()Nested QueryA nested query for association to Artifacts
CasehasCase()Nested QueryA nested query for association to other Cases
CasehasGroup()Nested QueryA nested query for association to other Groups
CasehasIndicator()Nested QueryA nested query for association to other Indicators
CasehasNote()Nested QueryA nested query for association to Notes
CasehasTag()Nested QueryA nested query for association to labels
CasehasTask()Nested QueryA nested query for association to Tasks
CasehasWorkflowTemplate()Nested QueryA nested query for association to Workflow Templates
CaseidIntegerThe ID number of a Case
CaseidAsStringStringThe ID number of a Case as a String
CaselastUpdatedDateThe date a Case was last updated
CasemissingArtifactCountIntegerThe number of required Artifacts that have not been collected for a Case’s Tasks
CasenameStringThe name of a Case
Note
If querying for Cases with a name that contains a backslash character (\), use a double backslash (\\) in the query to escape the single backslash. For more information, see the “Workflow-Related Queries” section of Constructing Query Expressions.
CaseownerIntegerThe ID number for the owner of a Case
CaseownerNameStringThe name of the owner of a Case
CaseresolutionStringThe resolution of a Case
CaseresponseDueDateThe SLA response due date for a Case
CaseresponseOverdueBooleanA flag indicating whether a Case exceeded the allowed completion time for its SLA response due date
CaseseverityEnumThe severity of a Case
CasestatusEnumThe status of a Case
CasetagStringThe name of a Tag applied to a Case
CasetargetIdIntegerThe user or user group ID number for a Case assignee
CasetargetTypeEnumThe target type for a Case (either User or Group)
CasethreatAssessScoreIntegerThe ThreatAssess score of a Case (i.e., the highest ThreatAssess score among the Case’s Artifacts with a ThreatAssess score)
CasetimeToDetectIntegerThe amount of time, in seconds, it took to either detect a security incident or threat after it occurred or open a Case for a security incident or threat after it was detected
CasetimeToRespondIntegerThe amount of time, in seconds, it took to respond to a security incident or threat after it was detected
CasetypeNameStringThe name of a Case
CasexidStringThe XID of a Case

Case Attributes

Table 13 provides the TQL parameters available for Case Attributes.

 

Workflow TypeParameterData TypeDescription
CaseAttributecaseIdIntegerThe ID number of a Case to which the Attribute is added
CaseAttributedateAddedDateThe date on which the Attribute was added to the system
CaseAttributedateValDateThe date value of an Attribute (applies only to certain Attribute Types)
CaseAttributedisplayedBooleanA flag indicating whether the Attribute is displayed in a Case
CaseAttributehasCase()Nested QueryA nested query for association to other Cases
CaseAttributeidIntegerThe ID number of an Attribute
CaseAttributeintValIntegerThe integer value of an Attribute (applies only to certain Attribute Types)
CaseAttributelastModifiedDateThe date when an Attribute was last modified
CaseAttributemaxSizeIntegerThe maximum length of an Attribute’s text
CaseAttributeownerIntegerThe ID of the owner in which an Attribute exists
CaseAttributeownerNameStringThe name of the owner in which an Attribute exists
CaseAttributeshortTextStringThe short text of an Attribute (applies only to certain Attribute Types)
CaseAttributesourceStringAn Attribute’s source
CaseAttributetextStringThe text of an Attribute (applies only to certain Attribute Types)
CaseAttributetypeIntegerThe ID number of an Attribute’s Type
CaseAttributetypeNameStringThe name of an Attribute’s Type
CaseAttributeuserStringThe username of the user who created an Attribute

Notes

Table 14 provides the TQL parameters available for Notes.

 

Workflow TypeParameterData TypeDescription
NoteartifactIdIntegerThe ID number of an Artifact with which a Note is associated
NoteauthorUserThe account login of a user who wrote a Note
NotecaseIdIntegerThe ID number of a Case with which a Note is associated
NotedataStringThe contents of a Note
NotedateAddedDateThe date on which a Note was written
NotehasArtifact()Nested QueryA nested query for association to Artifacts
NotehasCase()Nested QueryA nested query for association to Cases
NotehasTask()Nested QueryA nested query for association to Tasks
NoteidIntegerThe ID number of a Case
NotelastModifiedDateThe date on which a Note was last modified
NotesummaryStringText of the first 100 characters of a Note
NotetaskIdIntegerThe ID number of a Task with which a Note is associated
NoteworkflowEventIdIntegerThe ID number of a Workflow Timeline event with which a Note is associated

Tasks

Table 15 provides the TQL parameters available for Tasks.

 

Workflow TypeParameterData TypeDescription
TaskassignedToUserOrGroupEnumThe type of Task assignee (either User or Group)
TaskassigneeNameStringThe name of the user or user group assigned to the Task
TaskautomatedBooleanA flag indicating whether a Task is automated
TaskcaseIdIntegerThe ID number of a Case with which a Task is associated
TaskcaseIdAsStringStringThe ID number of a Case as a String
TaskcaseSeverityEnumThe severity of a Case associated with a Task
TaskcompletedByUserThe username of a user who completed a Task
TaskcompletedDateDateThe completion date of a Task
TaskdescriptionStringThe description of a Task
TaskdueDateDateThe due date of a Task
TaskhasArtifact()Nested QueryA nested query for association to other Artifacts
TaskhasCase()Nested QueryA nested query for association to other Cases
TaskhasNote()Nested QueryA nested query for association to other Notes
TaskidIntegerThe ID number of a Task
TaskmissingArtifactCountIntegerThe number of required Artifacts that have not been collected for a Task
TasknameStringThe name of a Task
TaskownerIntegerThe ID of the owner in which a Task exists
TaskownerNameStringThe name of the owner in which a Task exists
TaskrequiredBooleanA flag indicating whether a Task is required or not
TaskstatusEnumThe status of a Task
TasktargetIdLongThe user or user group ID number for a Task assignee
TasktargetTypeEnumThe target type for a Task (either User or Group)
TaskworkflowPhaseIntegerThe Workflow Phase of a Task
TaskworkflowStepIntegerThe Workflow step of a Task
TaskxidStringThe XID of a Task

Workflow Events

Table 16 provides the TQL parameters available for Workflow Events (i.e., Timeline Events).

 

Workflow TypeParameterData TypeDescription
WorkflowEventcaseIdIntegerThe ID number of a Case with which a Timeline Event is associated
WorkflowEventdateAddedDateThe date on which a Timeline Event was added
WorkflowEventdeletedBooleanThe deletion status of a Timeline Event
WorkflowEventdeletedReasonStringThe reason a Timeline Event was deleted
WorkflowEventeventDateDateThe date on which a Timeline Event occurred
WorkflowEventidIntegerThe ID number of a Timeline Event
WorkflowEventlinkStringUpperThe item to which a Timeline Event pertains, in format <type>:<id>
WorkflowEventsummaryStringThe text of a Timeline Event
WorkflowEventsystemGeneratedBooleanFlag determining whether a Timeline Event was created automatically by the system
WorkflowEventuserNameStringThe username associated with a Timeline Event

Workflow Templates

Table 17 provides the TQL parameters available for Workflow Templates.

 

Workflow TypeParameterData TypeDescription
WorkflowTemplateactiveBooleanThe active status of a Workflow Template
WorkflowTemplatedescriptionStringThe description of a Workflow Template
WorkflowTemplateidIntegerThe ID number of a Workflow Template
WorkflowTemplatenameStringThe name of a Workflow Template
WorkflowTemplateownerIntegerThe ID of the owner in which a Workflow Template exists
WorkflowTemplateownerNameStringThe name of the owner in which a Workflow Template exists
WorkflowTemplatetargetIdIntegerThe user or user group ID for the default assignee for a Workflow Template
WorkflowTemplatetargetTypeEnumThe target type for a Workflow Template (either User or Group)
WorkflowTemplateversionIntegerThe version of a Workflow Template

General Parameters

The following subsections describe all the general TQL parameters available in ThreatConnect.

Attribute Types

Table 18 provides the TQL parameters available for Attribute Types.

 

Object TypeParameterData TypeDescription
AttributeTypeassociatedTypeStringThe data type(s) for which an Attribute Type can be used
AttributeTypedefaultBooleanA flag designating whether the Attribute Type is a default Attribute Type
AttributeTypedefaultOwnerIdIntegerThe ID number of the owner in which an Attribute Preference is configured for the Attribute Type
AttributeTypedescriptionStringThe description of an Attribute Type
AttributeTypeidIntegerThe ID number of an Attribute Type
AttributeTypemaxsizeIntegerThe maximum size, in characters, of an Attribute Type’s value.
AttributeTypenameStringThe name of an Attribute Type
AttributeTypeownerIntegerThe ID number for the owner of an Attribute Type
AttributeTypeownerNameStringThe name of the owner of an Attribute Type
AttributeTypesystemBooleanA flag designating whether to show System-level Attributes (TRUE) or owner-specific Attributes only (FALSE)

Indicator Exclusion Lists

Table 19 provides the TQL parameters available for Indicator Exclusion Lists.

Important
Querying for Indicator Exclusion Lists with TQL is available only in the ThreatConnect v3 API.

 

Object TypeParameterData TypeDescription
IndicatorExclusionListsactiveBooleanSpecifies whether an Indicator Exclusion List is active
IndicatorExclusionListsidIntegerThe ID number of an Indicator Exclusion List
IndicatorExclusionListsmanagedBooleanSpecifies whether an Indicator Exclusion List is a non-custom, default Exclusion List managed at the System level
IndicatorExclusionListsnameStringThe name of an Indicator Exclusion List
IndicatorExclusionListsownerStringThe ID number of the owner to which an owner-level Indicator Exclusion List applies

ThreatConnect® is a registered trademark, and CAL™ is a trademark, of ThreatConnect, Inc.
DomainTools® is a registered trademark of DomainTools, LLC.
VirusTotal™ is a trademark of Google, Inc.

MITRE ATT&CK® and ATT&CK® are registered trademarks of The MITRE Corporation.

20052-04 v.26.A


Was this article helpful?

What's Next