When an Event is categorized properly inside the CIM, it means that we can extract deep context around the Event and construct Entity groupings based on this information.
An example of this context and the value might be: We capture Events that have multiple different type fields which could be email or app for example. Each of these Events could have a common operation value such as user-logon and a common field auth_username which contains the value john.doe.
Based on this information, we can then track and correlate the behavior of the user john.doe across all systems and have a much more powerful viewpoint into behavior. john.doe logging into multiple systems they have never logged into before or failed logon attempts across a range of systems are much stronger signals of malicious activity than individual events alone.
Fields in bold are compulsory. Filling in as many other fields as possible will ensure that the system can fully process context and perform effective correlations.
Fields that start with a type value indicate fields related to that entity type. For example, type = "http" would ideally have multiple fields such as http_status_code and http_uri submitted with the Event, otherwise, detections associated with the type = "http" will not be able to successfully match with full context.
typeoperationoutcomesuccess or failurevendorproducttechnology_groupcloud, endpoint, database, vpntype and technology_group context elements, we can target activities that happen to a file entity (type field) in a cloud file-sharing application (technology_group field).environment"Production", "Staging" or "Test"schema_version1.0timestamp2024-05-20T06:14:33.039601540Zsource_source_name - The name of the log source eg. “windows_logs” or application123_logssource_host - The server or host that is sending the logs. eg. host1.internalsource_type - The type of service that is sending this data. eg syslog or gcp-audit-logsource_severity - Severity level of the Event eg. info or "errorsource_department - The department associated with the event source.source_business_unit - The business unit associated with the event source.source_location - The location of the event source.source_criticality - The criticality of the event source.http_http_status_code - The HTTP status code of the event.http_uri - The full URI of the request (includes path and query string).http_domain - The domain name.http_host - The server name where the source data has come from.http_method - The HTTP Method used.http_protocol - The HTTP Protocol used.http_useragent - The browser user agent.http_request_time - Request timing.http_body_bytes_senthttp_request_lengthhttp_bytes_senthttp_server_namehttp_refererhttp_x_forwarded_forip_ip_src_addressip_src_portip_dst_addressip_dst_portip_proxy_addressip_client_address - The IP address of the system that connected to the device/application (not necessarily the browser or original source of the request)
ip_src_address is provided and is valid the following IP Address location information will be added to the Event
ip_geo_autonomous_system_number - 12345ip_geo_autonomous_system_organization - NetworkOperatorip_geo_city_name - Sydneyip_geo_continent_code - OCip_geo_country_code - AUip_geo_country_name - Australiaip_geo_latitude: -33.8715ip_geo_longitude: 151.2006ip_geo_postal_code - 2000ip_geo_region_code - NSWip_geo_region_name - New South Walesip_geo_timezone - Australia/Sydneyip_src_address - 1.2.3.4network_network_protocolnetwork_src_macnetwork_dst_macnetwork_bytesdns_dns_domaindns_typehost_host_name - The name of the serverhost_os - The OS of the serverhost_os_version - The OS version of the serverdata_data_risk_scoredata_sensitive_informationevent_event_descriptionevent_resultapp_app_event - A message from an application in relation to an event that has happenedapp_name - Name of the applicationauth_auth_username - the username of the login attemptauth_domain - the domain of the login attemptauth_response - the response (success or fail) of the loginauth_uri - the uri involved in the login attemptauth_message - any error or status message associated with the eventauth_application - The application involved in the login: eg. ssh, Secure60, win:local, signin.amazonaws.comuser_user_name - The actual string or identifier that a user is logging in with (Eg “john.doe”)user_text - The text string that desribes the user (Eg “John Doe”)user_role - The role of the usererror_error_message - The actual error message from the servererror_severity - the severity level of the error (eg WARN)error_code - Any error related identifying status codeerror_id - Any unique ID that specifically identifies this individual event erroragent_agent_versionfile_file_name - The name of the filefile_path - The path on the filesystem of the filefile_ext - The file extensionemailemail_sasl_method - SASL methodemail_sasl_username - SASL useremail_sender - Email of senderemail_recipient - Email of recpientemail_recipient_count - Count of recipientemail_encryption_protocolemail_encryption_cipheremail_encryption_keysizeprocess_process_nameprocess_idprocess_pathalert_alert_severity - “low”, “medium” or “high”alert_severity_id - A number associated with severityalert_typealert_priorityalert_descriptionalert_idalert_linkalert_categorymessage_message_text - A message from a system that hasnt been parsed into other fieldssyslog_syslog_severitysyslog_facilityWe reserve any field name starting with underscore _ as an internal Secure60 fieldname. Some usage of this includes:
_project_id - Project ID of the record_timestamp - the time the item was created_id - unique ID of the event_processed_time: The time when Secure60 ingest processed the event (added to every event)