When an Event is categorized properly inside the CIM, it means that we can extract deep context around the Event and construct Entity groupings based on this information.
An example of this context and the value might be: We capture Events that have multiple different type
fields which could be email
or app
for example. Each of these Events could have a common operation
value such as user-logon
and a common field auth_username
which contains the value john.doe
.
Based on this information, we can then track and correlate the behavior of the user john.doe
across all systems and have a much more powerful viewpoint into behavior. john.doe
logging into multiple systems they have never logged into before or failed logon attempts across a range of systems are much stronger signals of malicious activity than individual events alone.
Fields in bold are compulsory. Filling in as many other fields as possible will ensure that the system can fully process context and perform effective correlations.
Fields that start with a type
value indicate fields related to that entity type. For example, type = "http"
would ideally have multiple fields such as http_status_code
and http_uri
submitted with the Event, otherwise, detections associated with the type = "http"
will not be able to successfully match with full context.
type
operation
outcome
success
or failure
vendor
product
technology_group
cloud, endpoint, database, vpn
type
and technology_group
context elements, we can target activities that happen to a file
entity (type
field) in a cloud
file-sharing application (technology_group
field).environment
"Production", "Staging" or "Test"
schema_version
1.0
timestamp
13/08/2023 03:05:15
source_
source_name
- The name of the log source eg. “windows_logs” or application123_logs
source_host
- The server or host that is sending the logs. eg. host1.internal
source_type
- The type of service that is sending this data. eg syslog or gcp-audit-log
source_severity
- Severity level of the Event eg. info or "error
http_
http_status_code
- The HTTP status code of the event.http_uri
- The full URI of the request (includes path and query string).http_domain
- The domain name.http_host
- The server name where the source data has come from.http_method
- The HTTP Method used.http_protocol
- The HTTP Protocol used.http_useragent
- The browser user agent.http_request_time
- Request timing.http_body_bytes_sent
http_request_length
http_bytes_sent
http_server_name
http_referer
http_x_forwarded_for
ip_
ip_src_address
ip_src_port
ip_dst_address
ip_dst_port
ip_proxy_address
ip_src_address
is provided and is valid the following IP Address location information will be added to the Event
ip_geo_autonomous_system_number
- 12345ip_geo_autonomous_system_organization
- NetworkOperatorip_geo_city_name
- Sydneyip_geo_continent_code
- OCip_geo_country_code
- AUip_geo_country_name
- Australiaip_geo_latitude
: -33.8715ip_geo_longitude
: 151.2006ip_geo_postal_code
- 2000ip_geo_region_code
- NSWip_geo_region_name
- New South Walesip_geo_timezone
- Australia/Sydneyip_src_address
- 1.2.3.4network_
network_protocol
network_src_mac
network_dst_mac
network_bytes
host_
host_name
- The name of the serverhost_os
- The OS of the serverhost_os_version
- The OS version of the serverdata_
data_risk_score
data_sensitive_information
event_
event_description
event_result
app_
app_event
- A message from an application in relation to an event that has happenedapp_name
- Name of the applicationauth_
auth_username
- the username of the login attemptauth_domain
- the domain of the login attemptauth_response
- the response (success or fail) of the loginauth_uri
- the uri involved in the login attemptauth_message
- any error or status message associated with the eventauth_application
- The application involved in the login: eg. ssh, Secure60, win:local, signin.amazonaws.comuser_
user_name
- The text string that desribes the user (Eg “John Doe”)user_id
-The actual string or identifier that a user is logging in with (Eg “john.doe”)user_role
- The role of the usererror_
error_message
- The actual error message from the servererror_severity
- the severity level of the error (eg WARN)error_code
- Any error related identifying status codeerror_id
- Any unique ID that specifically identifies this individual event erroragent_
agent_version
file_
file_name
- The name of the filefile_path
- The path on the filesystem of the filefile_ext
- The file extensionprocess_
process_name
process_id
process_path
alert_
alert_severity
- “low”, “medium” or “high”alert_severity_id
- A number associated with severityalert_type
alert_priority
alert_description
alert_id
alert_link
alert_category
message_
message_text
- A message from a system that hasnt been parsed into other fieldssyslog_
syslog_severity
syslog_facility
We reserve any field name starting with underscore _
as an internal Secure60 fieldname. Some usage of this includes:
_project_id
- Project ID of the record_timestamp
- the time the item was created_id
- unique ID of the event_processed_time
: The time when Secure60 ingest processed the event (added to every event)