1.5. Information Artifact Types

Cyber Triage organizes data into Information Artifacts, which are a higher-level concept than something like “Prefetch”. We put “Prefetch” artifacts under the “Process” information artifact because it represents that a process ran.

You’ll see references to the following information artifacts in the this manual.

  • Users: Represents activity around user accounts
    • Accounts: What accounts existed on the host

    • Inbound Logons: Local and remote logins into the host

    • Outbound Logons: Hosts that the local user logged into from this host

    • Web Artifacts: Web browser activity from the users and downloads

    • Data Accessed: Files and documents opened by the user

  • Processes: Represents activity around processes
    • Triggered Tasks: A configuration that will launch a process based on some trigger. Examples include RunOnce key, scheduled tasks, BITSJobs, etc.

    • Process: Evidence that a process ran. Either at the time of collection or from historical data like Prefetch or audit logs.

    • Active Network Connections: Network connections from a process to another host.

    • Listening Ports: Network ports that were opened by a process and are waiting for a connection.

  • System Confirmation: Represents settings of the OS
    • OS Config Settings: Various settings of the OS that could impact audit logs or assisted in the attack.

    • Attached Devices: Shows what external devices were attached, such as USB drives.

More details can be found here