Information about the actors involved in an attack sequence.
ID of the threat actor.
Contains information about the process associated with the threat actor. This includes details such as process name, path, execution time, and unique identifiers that help track the actor's activities within the system.
Contains information about the user session where the activity initiated.
Contains information about the user credentials used by the threat actor.