9.2. Engine log data structure
The logs are composed of different parts:
The leading part
The source part defined by "_source"
The field portion defined by "_fields"
9.2.1. Counters of the header part of logs
Fields |
Required |
Description |
Values or example |
---|---|---|---|
_index |
Yes |
Internal index |
engines_alerts-2024.11.26-000022 |
_type |
Yes |
default type |
_doc |
_id |
Yes |
internal identifier |
q5zQZ5MBe7GX5B2fx7DG |
_version |
Yes |
internal version |
1 |
_score |
Yes |
relevance of the response to the request |
0 |
9.2.2. Counters of the source part of logs
9.2.2.1. dga category
Level 1 |
Level 2 |
Data type |
Description |
Value or example |
---|---|---|---|---|
dga |
dga_count |
numeric |
Number of DGAs |
29 |
dga |
dga_ratio |
numeric |
Ratio of DGAs (dga_count/nx_domain_count) |
1 |
dga |
malware_behavior_confidence |
numeric |
Malware behavior confidence in percent |
50 |
dga |
nx_domain_count |
numeric |
Number of NX domains analysed |
29 |
dga |
top_DGA |
string |
Top DGAs based on score |
tjzjyiheo.com",
"nvtcvimt.com",
"vmfyaxnse.com",
"htjykhvta.com",
"csmanuivsrlx.com",
"sbxsgfddr.com",
"oyttwuyshcgxxaenbit.com",
"seklusaprnkwhvybzc.com",
"xxcnirvbqivbucfsbliu.com",
"jgjvgfetpammdrxwn.com"
|
9.2.2.2. destination category
Level 1 |
Level 2 |
Data type |
Description |
Value or example |
---|---|---|---|---|
destination |
ip |
string |
IP address of the destination |
x.x.x.x |
destination |
mac |
string |
MAC address of the destination IP |
90:e2:ba:a6:a4:91 |
destination |
port |
numeric |
Port of the destination IP |
19609 |
9.2.2.3. ecs category
Level 1 |
Level 2 |
Data type |
Description |
Value or example |
---|---|---|---|---|
ecs |
version |
numeric |
ECS version this event conforms to |
8.6.0 |
9.2.2.4. event category
Level 1 |
Level 2 |
Data type |
Description |
Value or example |
---|---|---|---|---|
event |
category |
string |
Event category |
|
event |
category |
string |
file category. The second categorization field in the hierarchy. |
|
event |
category |
string |
The second categorization field in the hierarchy. |
network category.
intrusion_detection category
|
event |
created |
date |
Time when the event was first read by an agent or by your pipeline |
2024-11-26T09:17:00.775521+0000 |
event |
dataset |
string |
Name of the dataset |
alert |
event |
end |
date |
||
event |
id |
string |
Unique ID to describe the event |
28e92cac-b1de-4b20-ab71-5eeb325f64ed |
event |
kind |
string |
The kind of the event. The highest categorization field in the hierarchy |
alert |
event |
module |
string |
Name of the module this data is coming from |
Malcore or malcore_retroanalyzer or ... |
event |
severity |
numeric |
Analysis result code. |
Between 0 and 3.
0=clean, 1=infected, 2=suspicious, 3=Other
|
event |
start |
date |
9.2.2.5. file category
Level 1 |
Level 2 |
Level 3 |
Data type |
Description |
Value or example |
---|---|---|---|---|---|
file |
file_id |
numeric |
The file id |
646 |
|
file |
gaps |
boolean |
Monitoring inconsistency in file size |
false |
|
file |
hash |
md5 |
string |
MD5 hash of the analyzed file |
c279be702893.... |
file |
hash |
sha1 |
string |
SHA1 of the analyzed file |
|
file |
hash |
sha256 |
string |
SHA256sum of the analyzed file |
4679e7f2018c19... |
file |
magic |
string |
File format identifier (Magic signature): detected by Sigflow using a reduced database. |
Zip archive data, at least v2.0 to extract |
|
file |
name |
string |
Name of the file including the extension, without the directory |
smtptest-2021-02-24T17-30-01Z.zip |
|
file |
sid |
string |
Alert ID. Must be unique. |
1100043 |
|
file |
size |
numeric |
File size in bytes |
77068 |
|
file |
state |
string |
Completeness of the analyzed file (CLOSED) otherwise TRUNCATED.
The Sigflow file-store.stream-depth variable defines the size of the reconstructed files.
The file is TRUNCATED if its size is > File-store stream depth (10 MB) by default.
|
CLOSED |
|
file |
stored |
boolean |
Still at "true", the file was stored on disk for further analysis |
true |
|
file |
tx_id |
numeric |
transaction identification (query/response pair) |
1 |
9.2.2.6. flow category
Level 1 |
Level 2 |
Data type |
Description |
Value or example |
---|---|---|---|---|
flow |
bytes_toclient |
numeric |
Size of flow to customer |
15280 |
flow |
bytes_toserver |
numeric |
Size of flow to server |
128 |
flow |
pkts_toclient |
numeric |
Number of packets to client |
12 |
flow |
pkts_toserver |
numeric |
Number of packets to server |
4 |
flow |
start |
date |
Date and time of first package seen by Sigflow |
2024-11-26T09:16:56.277148+0000 |
9.2.2.7. HTTP category
Level 1 |
Level 2 |
Level 3 |
Level 4 |
Data type |
Description |
Value or example |
---|---|---|---|---|---|---|
http |
accept |
string |
Accept header of the request |
|||
http |
date |
date |
||||
http |
hostname |
string |
The hostname this HTTP event is attributed to |
tsevid-synonymi.justdanceatsea.com |
||
http |
http_port |
numeric |
Port HTTP |
8080 |
||
http |
http_refer |
string |
"http://tsevid-synonymi.justdanceatsea.com:8080/ndf4xx22ci.php", |
|||
http |
http_user_agent |
string |
||||
http |
http2 |
request |
priority |
numeric |
||
http |
http2 |
stream_id |
numeric |
|||
http |
http2 |
response |
numeric |
|||
http |
last_modified |
string |
||||
http |
request |
method |
string |
HTTP request method |
"GET" |
|
http |
request |
mime_type |
string |
|||
http |
request_headers |
name= |
accept |
string |
||
http |
request_headers |
value |
string |
|||
http |
request_headers |
name= |
accept-encoding |
string |
||
http |
request_headers |
value |
string |
|||
http |
request_headers |
name= |
:authority |
string |
||
http |
request_headers |
value |
string |
|||
http |
request_headers |
name= |
:method |
string |
||
http |
request_headers |
value |
string |
|||
http |
request_headers |
name= |
:path |
string |
||
http |
request_headers |
value |
string |
|||
http |
request_headers |
name= |
:scheme |
string |
||
http |
request_headers |
value |
string |
|||
http |
request_headers |
name= |
user-agent |
string |
||
http |
request_headers |
value |
string |
|||
http |
response |
bytes |
numeric |
Total size in bytes of the response (body and headers) |
77068 |
|
http |
response |
mime_type |
HTTP response status code |
string |
Mime type of the body of the response |
application/x-shockwave-flash |
http |
response |
status |
numeric |
HTTP response code
1xx informational response – the request was received, continuing process
2xx successful – the request was successfully received, understood, and accepted
3xx redirection – further action needs to be taken in order to complete the request
4xx client error – the request contains bad syntax or cannot be fulfilled
5xx server error – the server failed to fulfil an apparently valid request
|
200 |
|
http |
response_headers |
name= |
accept-ranges |
string |
||
http |
response_headers |
value |
string |
|||
http |
response_headers |
name= |
content-length |
string |
||
http |
response_headers |
value |
string |
|||
http |
response_headers |
name= |
content-type |
string |
||
http |
response_headers |
value |
string |
|||
http |
response_headers |
name= |
date |
string |
||
http |
response_headers |
value |
string |
|||
http |
response_headers |
name= |
etag |
string |
||
http |
response_headers |
value |
string |
|||
http |
response_headers |
last_modified |
etag |
string |
||
http |
response_headers |
value |
string |
|||
http |
response_headers |
last_modified |
server |
string |
||
http |
response_headers |
value |
string |
|||
http |
response_headers |
last_modified |
:status |
string |
||
http |
response_headers |
value |
string |
|||
http |
url |
string |
||||
http |
version |
string |
HTTP version |
HTTP/1.1 |
9.2.2.8. ioc category
Level 1 |
Level 2 |
Level 3 |
Level 4 |
Data type |
Description |
---|---|---|---|---|---|
ioc |
id |
numeric |
|||
ioc |
campaigns |
string |
The campaigns of the IOC |
||
ioc |
case_id |
string |
The case id of the IOC |
||
ioc |
categories |
string |
The categories of the IOC |
||
ioc |
creation_date |
date |
The creation date of the IOC |
||
ioc |
description |
string |
The description of the IOC |
||
ioc |
external_links |
source_name |
string |
||
ioc |
external_links |
url |
string |
The external links of the IOC |
|
ioc |
families |
string |
The families of the IOC |
||
ioc |
kill_chain_phases |
string |
The kill chain phases of the IOC |
||
ioc |
meta_data |
cwe |
string |
The meta data of the IOC |
|
ioc |
meta_data |
descriptions |
string |
||
ioc |
meta_data |
usageMode |
string |
||
ioc |
package_date |
date |
The package date of the IOC |
||
ioc |
relations |
string |
The uuid related to the IOC |
||
ioc |
signature |
string |
The signature of the IOC |
||
ioc |
tags |
string |
The signature of the IOC |
||
ioc |
targeted_countries |
string |
The targeted countries of the IOC |
||
ioc |
targeted_organizations |
string |
The targeted organizations of the IOC |
||
ioc |
targeted_platforms |
string |
The targeted platforms of the IOC |
||
ioc |
targeted_sectors |
string |
The targeted sectors of the IOC |
||
ioc |
threat_actor |
string |
The threat actor of the IOC |
||
ioc |
tlp |
string |
The color based level of the IOC |
||
ioc |
ttp |
string |
The tactics, techniques, and procedures of the IOC |
||
ioc |
type |
string |
The type of the IOC |
||
ioc |
updated_date |
date |
The updated date of the IOC |
||
ioc |
usage_mode |
string |
The usage mode of the IOC |
||
ioc |
value |
string |
The value of the IOC |
||
ioc |
vulnerabilities |
string |
The vulnerabilities of the IOC |
9.2.2.9. malcore category
Level 1 |
Level 2 |
Level 3 |
Level 4 |
Data type |
Description |
Value or example |
---|---|---|---|---|---|---|
malcore |
analyzed_clean |
numeric |
Number of engines with result CLEAN |
0 |
||
malcore |
analyzed_error |
numeric |
Number of engines with FAILED, CLEANED or DELETED result |
0 |
||
malcore |
analyzed_infected |
numeric |
Number of engines with INFECTED result |
9 |
||
malcore |
analyzed_other |
numeric |
Number of engines with result other than CLEAN, INFECTED or SUSPICIOUS |
7 |
||
malcore |
analyzed_suspicious |
numeric |
Number of engines with SUSPICIOUS result |
0 |
||
malcore |
analyzers_up |
numeric |
Total number of engines used for analysis |
16 |
||
malcore |
code |
numeric |
malcore analysis return code
See the table Malcore engine results
|
1 |
||
malcore |
detail_scan_time |
numeric |
File analysis time (ms) by malcore engines |
245 |
||
malcore |
detail_threat_found |
string |
Comma separated list of detected threat names |
"Infected: EICAR-Test-File (not a virus) (B).... |
||
malcore |
detail_wait_time |
numeric |
Time elapsed between sending the file to the node and receiving the engine result in milliseconds |
1096 |
||
malcore |
engine_id |
0-15 |
numeric |
malcore engine number (0 to 15) |
4 |
|
malcore |
engine_id |
0-15 |
id |
string |
engine id |
b557a5r |
malcore |
engine_id |
0-15 |
scan_result |
string |
analysis result (INFECTED or CLEAN) |
INFECTED |
malcore |
engine_id |
0-15 |
threat_details |
string |
treat details of the result for this engine |
EICAR-Test-File (not a virus) (B) |
malcore |
engines_last_update_date |
date |
Date of last update of malcore engines |
2023-07-11T11:32:00Z |
||
malcore |
file_type |
string |
Type of file analyzed |
application/zip |
||
malcore |
file_type_description |
string |
Description of the file type |
ZIP Archive |
||
malcore |
magic_details |
string |
Detailed magic information (payload type) |
Zip archive data, at least v2.0 to extract |
||
malcore |
processing_time |
numeric |
Analysis processing time |
1341 |
||
malcore |
reporting_token |
string |
Token used with GBox
If no GBox then message NO GBOX
|
GBOX# |
||
malcore |
state |
string |
Malcore engine analysis result
Result is "Infected" as soon as the result of an engine is "Infected"
|
Infected |
||
malcore |
total_found |
string |
Number of engines that detected the file as infected divided by the total number of engines |
XX/YY with YY between 0 and 16 and XX between 0 and YY; example 9/16 |
9.2.2.10. malcore_retroanalyzer category
Level 1 |
Level 2 |
Level 3 |
Level 4 |
Data type |
Description |
Value or example |
---|---|---|---|---|---|---|
malcore_retroanalyzer |
analyzed_clean |
numeric |
Number of engines with result CLEAN |
0 |
||
malcore_retroanalyzer |
analyzed_error |
numeric |
Number of engines with result in FAILED, CLEANED_OR_DELETED, SCAN_SKIPPED_WHITELIST, SCAN_SKIPPED_BLACKLIST, NOT_SCANNED, CANCELED, UNSUPPORTED_FILE_TYPE, IN_PROGRESS |
0 |
||
malcore_retroanalyzer |
analyzed_infected |
numeric |
Number of engines with INFECTED result |
9 |
||
malcore_retroanalyzer |
analyzed_other |
numeric |
Number of engines with result other than CLEAN, INFECTED or SUSPICIOUS |
7 |
||
malcore_retroanalyzer |
analyzed_suspicious |
numeric |
Number of engines with SUSPICIOUS result |
0 |
||
malcore_retroanalyzer |
analyzers_up |
numeric |
Total number of engines used for analysis |
16 |
||
malcore_retroanalyzer |
code |
numeric |
malcore analysis return code
See the table Malcore engine results
|
1 |
||
malcore_retroanalyzer |
detail_scan_time |
numeric |
File analysis time (ms) by malcore engines |
245 |
||
malcore_retroanalyzer |
detail_threat_found |
string |
Comma separated list of detected threat names |
"Infected: EICAR-Test-File (not a virus) (B).... |
||
malcore_retroanalyzer |
detail_wait_time |
numeric |
Time elapsed between sending the file to the node and receiving the engine result in milliseconds |
1096 |
||
malcore_retroanalyzer |
engine_id |
numeric |
malcore engine number (0 to 15) |
4 |
||
malcore_retroanalyzer |
engine_id |
0-15 |
id |
string |
engine id |
b557a5r |
malcore_retroanalyzer |
engine_id |
0-15 |
scan_result |
string |
analysis result (INFECTED or CLEAN) |
INFECTED |
malcore_retroanalyzer |
engine_id |
0-15 |
threat_details |
string |
treat details of the result for this engine |
EICAR-Test-File (not a virus) (B) |
malcore_retroanalyzer |
engines_last_update_date |
date |
Date of last update of malcore engines |
2023-07-11T11:32:00Z |
||
malcore_retroanalyzer |
file_type |
string |
Type of file analyzed |
application/zip |
||
malcore_retroanalyzer |
file_type_description |
string |
Description of the file type |
ZIP Archive |
||
malcore_retroanalyzer |
magic_details |
string |
Detailed magic information (payload type) |
Zip archive data, at least v2.0 to extract |
||
malcore_retroanalyzer |
processing_time |
numeric |
Analysis processing time |
1341 |
||
malcore_retroanalyzer |
reporting_token |
string |
Token used with GBox
If no GBox then message NO GBOX
|
GBOX# |
||
malcore_retroanalyzer |
state |
string |
Malcore engine analysis result
Result is "Infected" as soon as the result of an engine is "Infected"
|
Infected |
||
malcore_retroanalyzer |
total_found |
string |
Number of engines that detected the file as infected divided by the total number of engines |
XX/YY with YY between 0 and 16 and XX between 0 and YY; example 9/16 |
9.2.2.11. malicious_powershell category
Level 1 |
Level 2 |
Level 3 |
Level 4 |
Data type |
Description |
Value or example |
---|---|---|---|---|---|---|
malicious_powershell |
id |
string |
||||
malicious_powershell |
proba_obfuscated |
numeric |
Probability that the powershell is offended. Value between 0 and 1 |
1 |
||
malicious_powershell |
sample_id (id) |
string |
file id |
12-04-2024T14:12:40_03afe38854c8443db03807bcc51cf935_gcap-gatewatcher.com", |
||
malicious_powershell |
score |
numeric |
score of the powershell script |
|||
malicious_powershell |
score_details |
AddContent |
numeric |
Category scores/analysis_detailed
Adds content to a file/folder
|
0 |
|
malicious_powershell |
score_details |
Base64 |
numeric |
Category scores/analysis_detailed
Score represented by an integer of a/patterns base64 detected
|
188 |
|
malicious_powershell |
score_details |
CharInt |
numeric |
Category scores/analysis_detailed
Score represented by an integer of one/of the detected charitable patterns
|
6 |
|
malicious_powershell |
score_details |
FmtStr |
numeric |
Category scores/analysis_detailed
Score represented by an integer of a/of detected fmtstr patterns
|
8 |
|
malicious_powershell |
score_details |
GetContent |
numeric |
Category scores/analysis_detailed
Get-Content applet to read file data
|
0 |
|
malicious_powershell |
score_details |
InvokeExpression |
numeric |
Category scores/analysis_detailed
InvokeExpression Applet
|
100 |
|
malicious_powershell |
score_details |
InvokeRestMethod |
numeric |
0 |
||
malicious_powershell |
score_details |
InvokeWebRequest |
numeric |
Category scores/analysis_detailed
Invoke-WebRequest applet sends HTTP and HTTPS requests to a webpage
|
0 |
|
malicious_powershell |
score_details |
SetContent |
numeric |
Category scores/analysis_detailed
Applet SetContent writes new content or replaces existing content in a file
|
0 |
|
malicious_powershell |
score_details |
StartBitsTransfer |
numeric |
Category scores/analysis_detailed
Start-BitsTransfer Order
|
0 |
|
malicious_powershell |
score_details |
StrCat |
numeric |
Category scores/analysis_detailed
Function that concatenates strings
|
4 |
|
malicious_powershell |
score_details |
StreamReader |
numeric |
Category scores/analysis_detailed
Object to read and display each directory name
|
0 |
|
malicious_powershell |
score_details |
StreamWriter |
numeric |
Category scores/analysis_detailed
Write a file that lists directories
|
0 |
|
malicious_powershell |
score_details |
StrJoin |
numeric |
Category scores/analysis_detailed
Score represented by an integer of a/strjoin patterns detected
|
6 |
|
malicious_powershell |
score_details |
StrReplace |
numeric |
Category scores/analysis_detailed
Score represented by an integer of a/strreplace patterns detected
|
0 |
|
malicious_powershell |
score_details |
SystemIOFile |
numeric |
Category scores/analysis_detailed
Manipulation of a file (creation, opening, copy, etc.)
|
0 |
|
malicious_powershell |
score_details |
WebClientInvokation |
numeric |
Category scores/analysis_detailed
Score represented by an integer of one/of detected webclientinvokation patterns
|
20 |
9.2.2.12. matched_event category
Level 1 |
Level 2 |
Level 3 |
Level 4 |
Data type |
Description |
Value or example |
---|---|---|---|---|---|---|
matched_event |
id |
numeric |
The ID of the matched event |
9.2.2.13. metadata category
Level 1 |
Level 2 |
Level 3 |
Level 4 |
Data type |
Description |
Value or example |
---|---|---|---|---|---|---|
metadata |
flowbits |
string |
min.gethttp |
9.2.2.14. network category
Level 1 |
Level 2 |
Data type |
Description |
Value or example |
---|---|---|---|---|
network |
community_id |
string |
Unique id to correlate the rise between the different security equipment |
1:r6LvcE7ltny4a6Y9xt1Vr... |
network |
flow_id |
numeric |
Flow identifier |
363747525458479 |
network |
protocol |
string |
network protocol |
http |
network |
timestamp |
date |
Date and time of alert generation by suricata |
2024-11-26T09:17:00.775521+0000 |
network |
transport |
string |
protocol layer (TCP or UDP) |
tcp |
network |
tx_id |
numeric |
transaction identification (query/response pair) |
0 |
9.2.2.15. observer category
Level 1 |
Level 2 |
Level 3 |
Level 4 |
Data type |
Description |
Value or example |
---|---|---|---|---|---|---|
observer |
gcap |
string |
GCap observer related fields |
|||
observer |
gcap |
hostname |
string |
The hostname of the gcap |
gcap-xxx.domain.local |
|
observer |
gcap |
ingress |
interface/name |
string |
GCap input interface used for capture (monx or monvirt) |
monvirt |
observer |
gcap |
version |
string |
The version of the gcap |
"2.5.4" |
|
observer |
hostname |
string |
Hostname of the observer |
"gcenter.domain", |
||
observer |
log_format_version |
string |
The log format version |
"1.0.0" |
||
observer |
product |
string |
The product name of the observer |
gcenter |
||
observer |
uuid |
string |
Unique identifier of the alert |
f639c844-3f6f-40fa-86c4-47ff603880e2 |
||
observer |
vendor |
string |
Vendor name of the observer |
gatewatcher |
||
observer |
version |
string |
Observer version |
"2.5.x." |
9.2.2.16. shellcode category
Level 1 |
Level 2 |
Level 3 |
Level 4 |
Data type |
Description |
Value or example |
---|---|---|---|---|---|---|
shellcode |
analysis |
args |
string |
Arguments of the system call used |
"{'pathname': '//etc/passwd', 'flags': 'O_WRONLY|O_APPEND', 'mode': 'None'}", |
|
shellcode |
analysis |
call |
string |
Name of system call used |
sys_open |
|
shellcode |
analysis |
info |
string |
More info |
"Stop : End of shellcode (Exit)" |
|
shellcode |
analysis |
ret |
string |
The retention |
0 |
|
shellcode |
analysis |
_id |
numeric |
Internal index |
-1 |
|
shellcode |
analysis |
stop |
numeric |
Marks the end of shellcode (End of shellcode) |
End of shellcode (output) |
|
shellcode |
encodings |
count |
numeric |
Number of successive encodings |
1 |
|
shellcode |
encodings |
name |
string |
The name of the encoding |
"Shikata_ga_nai", |
|
shellcode |
encodings |
options |
string |
|||
shellcode |
id |
string |
The id of the shellcode |
8ae5f9d35f3878cac3064fe93e4c311d" |
||
shellcode |
sample_id |
string |
The sample id of the shellcode |
|||
shellcode |
sub_type |
string |
The sub type of the shellcode |
"Linux_x86_32", |
9.2.2.17. sigflow category
Level 1 |
Level 2 |
Level 3 |
Level 4 |
Data type |
Description |
Value or example |
---|---|---|---|---|---|---|
sigflow |
action |
string |
Allowed if alert or pass is used and blocked if drop or reject is used. |
alert, drop, reject, pass "action": "allowed" |
||
sigflow |
category |
string |
Description of alert classification |
Potentially Bad Traffic" |
||
sigflow |
gid |
numeric |
Identifier of an alert group |
1 |
||
sigflow |
metadata |
affected_product |
string |
|||
sigflow |
metadata |
attack_target |
string |
|||
sigflow |
metadata |
confidence |
string |
|||
sigflow |
metadata |
created_at |
string |
Created at YEAR_MONTH_DAY |
2014_11_15 |
|
sigflow |
metadata |
deployment |
string |
|||
sigflow |
metadata |
malware_family |
string |
|||
sigflow |
metadata |
performance_impact |
string |
Performance impact |
Significant |
|
sigflow |
metadata |
reviewed_at |
string |
|||
sigflow |
metadata |
signature_severity |
string |
Signature severity |
||
sigflow |
metadata |
updated_at |
string |
Updated at YEAR_MONTH_DAY |
2024_04_22 |
|
sigflow |
packet |
string |
packet that triggered the alert registered in base64 (only for UDP) |
kOK6pqSQkOK6pqSRCABFAAA0dnRAAEAG9Ak.... |
||
sigflow |
packet_info |
linktype |
numeric |
Type of link-layer header |
1 |
|
sigflow |
payload |
string |
Payload of the base64 package
Present only if the payload option of the gcap "variable bases" menu is enabled
|
Potentially Bad Traffic |
||
sigflow |
payload_printable |
string |
Payload of the package in a readable format.
Present only if the printable payload option of the gcap «variable bases» menu is activated.
|
GET /emd.exe HTTP/1.1rnHost: opred.netrnConnection: Keep-Alivernrn |
||
sigflow |
rev |
numeric |
Alert Revision Number |
11 |
||
sigflow |
signature |
string |
The signature of the signature flow |
ET CURRENT_EVENTS Terse alphanumeric executable downloader high likelihood of being hostile", |
||
sigflow |
signature_id |
numeric |
Alert ID. Must be unique |
2019714 |
||
sigflow |
stream |
numeric |
The stream of the signature flow |
9.2.2.18. source category
Level 1 |
Level 2 |
Level 3 |
Level 4 |
Data type |
Description |
Value or example |
---|---|---|---|---|---|---|
source |
ip |
string |
Source IP address detected by Sigflow |
x.y.z.A" |
||
source |
mac |
string |
MAC address of the source netwok card |
xx.... |
||
source |
port |
numeric |
Source port detected by Sigflow |
8080 |
9.2.2.19. @timestamp category
Level 1 |
Level 2 |
Data type |
Description |
Value or example |
---|---|---|---|---|
@timestamp |
string |
Timestamp of the processing of the alert by the GCenter (corresponds to the passage in logstash) |
2023-10-09T08:31:04.503Z |
|
@timestamp |
dest_macs |
string |
Date/time when the event originated |
9.2.2.20. @version category
Level 1 |
Level 2 |
Level 3 |
Level 4 |
Data type |
Description |
Value or example |
---|---|---|---|---|---|---|
@version |
1 |
9.2.2.21. url category
Level 1 |
Level 2 |
Data type |
Description |
Value or example |
---|---|---|---|---|
url |
domain |
string |
The domain of the URL |
"tsevid-synonymi.justdanceatsea.com" |
url |
full |
string |
The full URL |
|
url |
path |
string |
The path of the URL |
/6SuCHKKkf8Sf1aFXJPqD0R6r3oEDCrbwHFm23EU-Af2zwWdHgpn6mEGu5XlxFust |
9.2.2.22. user_agent category
Level 1 |
Level 2 |
Data type |
Description |
Value or example |
---|---|---|---|---|
user_agent |
original |
string |
The user agent of the software used |
Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0; ...) |
9.2.2.23. DNS events
Level 1 |
Level 2 |
Level 3 |
Level 4 |
Data type |
description |
---|---|---|---|---|---|
dns |
answers |
name |
string |
||
dns |
answers |
type |
string |
||
dns |
authorities |
rrname |
string |
||
dns |
authorities |
rrtype |
string |
||
dns |
authorities |
soa |
expire |
numeric |
|
dns |
authorities |
soa |
minimum |
numeric |
|
dns |
authorities |
soa |
mname |
string |
|
dns |
authorities |
soa |
refresh |
numeric |
|
dns |
authorities |
soa |
retry |
numeric |
|
dns |
authorities |
soa |
rname |
string |
|
dns |
authorities |
soa |
serial |
numeric |
|
dns |
authorities |
ttl |
numeric |
||
dns |
flags |
string |
|||
dns |
id |
numeric |
|||
dns |
qr |
boolean |
|||
dns |
ra |
boolean |
|||
dns |
rd |
boolean |
|||
dns |
response_code |
string |
|||
dns |
type |
string |
|||
dns |
version |
numeric |
9.2.2.24. HTTP2 events
Level 1 |
Level 2 |
Level 3 |
Level 4 |
Data type |
---|---|---|---|---|
http2 |
http_method |
string |
||
http2 |
http_user_agent |
string |
||
http2 |
http2 |
request |
priority |
numeric |
http2 |
http2 |
stream_id |
numeric |
|
http2 |
http2 |
response |
string |
|
http2 |
http2 |
length |
numeric |
|
http2 |
request_headers |
name= |
accept |
string |
http2 |
request_headers |
value |
string |
|
http2 |
request_headers |
name= |
accept-encoding |
string |
http2 |
request_headers |
value |
string |
|
http2 |
request_headers |
name= |
:authority |
string |
http2 |
request_headers |
value |
string |
|
http2 |
request_headers |
name= |
:method |
string |
http2 |
request_headers |
value |
string |
|
http2 |
request_headers |
name= |
:path |
string |
http2 |
request_headers |
value |
string |
|
http2 |
request_headers |
name= |
:scheme |
string |
http2 |
request_headers |
value |
string |
|
http2 |
request_headers |
name= |
user-agent |
string |
http2 |
request_headers |
value |
string |
|
http2 |
response_headers |
name= |
accept-ranges |
string |
http2 |
response_headers |
value |
string |
|
http2 |
response_headers |
name= |
content-length |
string |
http2 |
response_headers |
value |
string |
|
http2 |
response_headers |
name= |
content-type |
string |
http2 |
response_headers |
value |
string |
|
http2 |
response_headers |
name= |
date |
string |
http2 |
response_headers |
value |
string |
|
http2 |
response_headers |
name= |
etag |
string |
http2 |
response_headers |
value |
string |
|
http2 |
response_headers |
last_modified |
etag |
string |
http2 |
response_headers |
value |
string |
|
http2 |
response_headers |
last_modified |
server |
string |
http2 |
response_headers |
value |
string |
|
http2 |
response_headers |
last_modified |
:status |
string |
http2 |
response_headers |
value |
string |
|
http2 |
status |
numeric |
||
http2 |
url |
string |
||
http2 |
version |
string |
9.2.2.25. TLS events
Level 1 |
Level 2 |
Level 3 |
Level 4 |
Data type |
---|---|---|---|---|
tls |
client |
server_name |
string |
|
tls |
ja3 |
hash |
string |
|
tls |
ja3 |
string |
string |
|
tls |
ja3s |
hash |
string |
|
tls |
ja3s |
string |
string |
|
tls |
serial |
string |
||
tls |
server |
certificate |
chain |
string |
tls |
server |
hash |
md5 |
string |
tls |
server |
hash |
sha1 |
string |
tls |
server |
hash |
sha256 |
string |
tls |
server |
issuer |
string |
|
tls |
server |
not_after |
date |
|
tls |
server |
not_before |
date |
|
tls |
server |
subject |
string |
|
tls |
sni |
string |
||
tls |
version |
string |
9.2.2.26. SMTP events
Level 1 |
Level 2 |
Level 3 |
Level 4 |
Data type |
---|---|---|---|---|
smtp |
helo |
string |
||
smtp |
mail_from |
string |
||
smtp |
rcpt_to |
string |
9.2.2.27. SMB events
Level 1 |
Level 2 |
Level 3 |
Level 4 |
Data type |
Description |
---|---|---|---|---|---|
smb |
command |
string |
|||
smb |
dialect |
string |
|||
smb |
filename |
string |
|||
smb |
fuid |
string |
|||
smb |
id |
numeric |
|||
smb |
session_id |
numeric |
SMB2+ session_id. SMB1 user id |
||
smb |
share |
string |
|||
smb |
status |
string |
|||
smb |
status_code |
string |
|||
smb |
tree_id |
numeric |
9.2.2.28. NFS events
Level 1 |
Level 2 |
Level 3 |
Level 4 |
Data type |
---|---|---|---|---|
nfs |
filename |
string |
||
nfs |
file_tx |
boolean |
||
nfs |
hhash |
string |
||
nfs |
id |
numeric |
||
nfs |
procedure |
string |
||
nfs |
status |
string |
||
nfs |
type |
string |
||
nfs |
version |
numeric |
9.2.2.29. FTP events
Level 1 |
Level 2 |
Level 3 |
Level 4 |
Data type |
---|---|---|---|---|
ftp |
command |
string |
||
ftp |
completion_code |
string |
||
ftp |
dynamic_port |
numeric |
||
ftp |
reply |
string |
||
ftp |
reply |
string |
||
ftp |
reply_received |
string |
||
ftp |
reply_truncated |
boolean |
9.2.2.30. TFTP events
Level 1 |
Level 2 |
Level 3 |
Level 4 |
Data type |
---|---|---|---|---|
tftp |
file |
string |
||
tftp |
mode |
string |
||
tftp |
packet |
string |
9.2.2.31. SSH events
Level 1 |
Level 2 |
Level 3 |
Level 4 |
Data type |
---|---|---|---|---|
ssh |
client |
hassh |
hash |
string |
ssh |
client |
hassh |
string |
string |
ssh |
client |
proto_version |
string |
|
ssh |
client |
software_version |
string |
|
ssh |
server |
hassh |
hash |
string |
ssh |
server |
hassh |
string |
string |
ssh |
server |
proto_version |
string |
|
ssh |
server |
software_version |
string |
9.2.2.32. krb5 events
Level 1 |
Level 2 |
Level 3 |
Level 4 |
Data type |
---|---|---|---|---|
krb5 |
cname |
string |
||
krb5 |
encryption |
string |
||
krb5 |
msg_type |
string |
||
krb5 |
realm |
string |
||
krb5 |
sname |
string |
||
krb5 |
weak_encryption |
boolean |
9.2.2.33. DHCP events
Level 1 |
Level 2 |
Level 3 |
Level 4 |
Data type |
Description |
---|---|---|---|---|---|
dhcp |
assigned_ip |
string |
|||
dhcp |
client_ip |
string |
|||
dhcp |
client_mac |
string |
|||
dhcp |
dhcp_type |
string |
|||
dhcp |
dns_servers |
string |
|||
dhcp |
hostname |
string |
|||
dhcp |
id |
numeric |
|||
dhcp |
lease_time |
numeric |
|||
dhcp |
next_server_ip |
string |
|||
dhcp |
relay_ip |
string |
|||
dhcp |
routers |
string |
|||
dhcp |
subnet_mask |
string |
|||
dhcp |
type |
string |
9.2.2.34. SNMP events
Level 1 |
Level 2 |
Level 3 |
Level 4 |
Data type |
---|---|---|---|---|
snmp |
community |
string |
||
snmp |
pdu_type |
string |
||
snmp |
vars |
string |
||
snmp |
version |
numeric |
9.2.2.35. RDP events
Level 1 |
Level 2 |
Level 3 |
Level 4 |
Data type |
---|---|---|---|---|
rdp |
channels |
string |
||
rdp |
client |
build |
string |
|
rdp |
client |
capabilities |
string |
|
rdp |
client |
client_name |
string |
|
rdp |
client |
client_name |
string |
|
rdp |
client |
color_depth |
numeric |
|
rdp |
client |
desktop_height |
numeric |
|
rdp |
client |
desktop_width |
numeric |
|
rdp |
client |
function_keys |
numeric |
|
rdp |
client |
id |
string |
|
rdp |
client |
keyboard_layout |
string |
|
rdp |
client |
keyboard_type |
string |
|
rdp |
client |
product_id |
numeric |
|
rdp |
client |
version |
string |
|
rdp |
event_type |
string |
||
rdp |
tx_id |
numeric |
9.2.2.36. RFB events
Level 1 |
Level 2 |
Level 3 |
Level 4 |
Data type |
---|---|---|---|---|
rfb |
authentication |
security_type |
numeric |
|
rfb |
authentication |
vnc |
challenge |
string |
rfb |
authentication |
vnc |
response |
string |
rfb |
client_protocol_version |
major |
string |
|
rfb |
client_protocol_version |
minor |
string |
|
rfb |
server_protocol_version |
major |
string |
|
rfb |
server_protocol_version |
minor |
string |
|
rfb |
server_security_failure_reason |
string |
9.2.2.37. IKEV2 events
Level 1 |
Level 2 |
Level 3 |
Level 4 |
Data type |
---|---|---|---|---|
ikev2 |
alg_auth |
numeric |
||
ikev2 |
alg_dh |
string |
||
ikev2 |
alg_enc |
string |
||
ikev2 |
alg_esn |
string |
||
ikev2 |
alg_perf |
string |
||
ikev2 |
errors |
boolean |
||
ikev2 |
exchange_type |
boolean |
||
ikev2 |
init_spi |
string |
||
ikev2 |
message_id |
boolean |
||
ikev2 |
notify |
string |
||
ikev2 |
payload |
string |
||
ikev2 |
resp_spi |
string |
||
ikev2 |
role |
string |
||
ikev2 |
version_major |
numeric |
||
ikev2 |
version_minor |
numeric |
9.2.2.38. SIP events
Level 1 |
Level 2 |
Level 3 |
Level 4 |
Data type |
---|---|---|---|---|
sip |
code |
string |
||
sip |
reason |
string |
||
sip |
response_line |
string |
||
sip |
version |
string |
9.2.2.39. DNP3 events
Level 1 |
Level 2 |
Level 3 |
Level 4 |
Data type |
---|---|---|---|---|
dnp3 |
application |
control |
con |
boolean |
dnp3 |
application |
control |
fin |
boolean |
dnp3 |
application |
control |
fir |
boolean |
dnp3 |
application |
control |
sequence |
numeric |
dnp3 |
application |
control |
uns |
boolean |
dnp3 |
application |
complete |
boolean |
|
dnp3 |
application |
function_code |
numeric |
|
dnp3 |
application |
objects |
count |
numeric |
dnp3 |
application |
objects |
group |
numeric |
dnp3 |
application |
objects |
group |
numeric |
dnp3 |
application |
objects |
points. sub :
- comm_lost
- index
- local_forced
- online
- prefix
- remote_forced
- reserved0
- reserved1
- restart
- state
|
numeric |
dnp3 |
application |
objects |
prefix_code |
numeric |
dnp3 |
application |
objects |
prefix_code |
numeric |
dnp3 |
application |
objects |
qualifier |
numeric |
dnp3 |
application |
objects |
range_code |
numeric |
dnp3 |
application |
objects |
start |
numeric |
dnp3 |
application |
objects |
stop |
numeric |
dnp3 |
application |
objects |
variation |
numeric |
dnp3 |
control |
dir |
boolean |
|
dnp3 |
control |
fcb |
boolean |
|
dnp3 |
control |
fcv |
boolean |
|
dnp3 |
control |
function_code |
numeric |
|
dnp3 |
control |
pri |
boolean |
|
dnp3 |
dst |
numeric |
||
dnp3 |
iin |
indicators |
string |
|
dnp3 |
src |
numeric |
||
dnp3 |
type |
string |
9.2.2.40. DCERPC events
Level 1 |
Level 2 |
Level 3 |
Level 4 |
Data type |
---|---|---|---|---|
dcerpc |
call_id |
numeric |
||
dcerpc |
req |
frag_cnt |
numeric |
|
dcerpc |
req |
opnum |
numeric |
|
dcerpc |
req |
stub_data_size |
numeric |
|
dcerpc |
request |
string |
||
dcerpc |
res |
frag_cnt |
numeric |
|
dcerpc |
res |
stub_data_size |
numeric |
|
dcerpc |
response |
string |
||
dcerpc |
rpc_version |
string |
9.2.2.41. MQTT events
Level 1 |
Level 2 |
Level 3 |
Level 4 |
Data type |
Description |
---|---|---|---|---|---|
mqtt |
connack |
dup |
boolean |
||
mqtt |
connack |
qos |
numeric |
||
mqtt |
connack |
retain |
boolean |
||
mqtt |
connack |
return_code |
numeric |
||
mqtt |
connack |
session_present |
boolean |
9.2.2.42. ransomware events
Level 1 |
Level 2 |
Level 3 |
Level 4 |
Description |
Data type |
---|---|---|---|---|---|
ransomware |
alert_threshold |
numeric |
The alert threshold |
||
ransomware |
malicious_behavior_confidence |
numeric |
Malicious behavior confidence in percent |
||
ransomware |
session_score |
numeric |
The session score |
9.2.2.43. beacon events
Level 1 |
Level 2 |
Level 3 |
Level 4 |
Data type |
---|---|---|---|---|
beacon |
active |
boolean |
||
beacon |
hostname_resolution |
string |
||
beacon |
id |
string |
||
beacon |
mean_time_interval |
numeric |
||
beacon |
possible_cnc |
string |
||
beacon |
session_count |
numeric |
||
beacon |
type |
string |
9.2.2.44. nba events
Level 1 |
Level 2 |
Level 3 |
Level 4 |
Data type |
Description |
---|---|---|---|---|---|
nba |
action |
string |
|||
nba |
category |
string |
|||
nba |
gid |
numeric |
|||
nba |
metadata |
performance_impact |
string |
||
nba |
metadata |
signature_severity |
string |
||
nba |
packet |
string |
|||
nba |
payload |
string |
|||
nba |
payload_printable |
string |
|||
nba |
rev |
numeric |
|||
nba |
signature |
string |
|||
nba |
signature_id |
numeric |
|||
nba |
stream |
numeric |
Level 1 |
Level 2 |
Level 3 |
Level 4 |
Data type |
description |
---|---|---|---|---|---|
files |
filename |
string |
|||
files |
gaps |
boolean |
|||
files |
magic |
string |
|||
files |
sha256 |
string |
|||
files |
sid |
string |
|||
files |
size |
numeric |
|||
files |
state |
string |
|||
files |
stored |
boolean |
|||
files |
tx_id |
numeric |
9.2.2.45. tcp events
Level 1 |
Level 2 |
Level 3 |
Level 4 |
Data type |
description |
---|---|---|---|---|---|
tcp |
ack |
boolean |
|||
tcp |
fin |
boolean |
|||
tcp |
psh |
boolean |
|||
tcp |
rst |
boolean |
|||
tcp |
syn |
boolean |
|||
tcp |
tcp_flags |
string |
9.2.2.46. ether events
Level 1 |
Level 2 |
Level 3 |
Level 4 |
Data type |
---|---|---|---|---|
ether |
dest_macs |
string |
||
ether |
src_macs |
string |
9.2.3. Malcore engine results
Return code |
Result |
Description |
---|---|---|
0 |
No Threat Detected |
File was analyzed and declared healthy |
1 |
Infected |
File was scanned and declared infected |
2 |
Suspicious |
The file was analyzed and declared as likely to be infected:
some Malcore engines have detected this file as malicious..
|
3 |
Failed Scan |
An error occurred during the run. |
7 |
Skipped - Whitelisted |
The file is not analyzed and considered healthy since this file is defined in the Malcore whitelist |
8 |
Skipped – Blacklisted |
The file is not scanned and considered infected since this file is defined in the Malcore blacklist |
9 |
Exceeded Archive Depth |
The number of times the file is compressed is limited (max recursion level). The message indicates that the defined value has been exceeded. |
10 |
Not scanned |
Engine not available at time of run |
12 |
Encrypted Archive |
The archive is encrypted and therefore not parsable: the password indicated does not work |
13 |
Exceeded Archive Size |
The maximum file size should not exceed the defined value (maximum value 10MB). The analyzed archive is larger than the value set |
14 |
Exceeded Archive File Number |
The maximum number of files in the archive must not exceed the defined value. The analyzed archive contains a number of files greater than the defined value |
15 |
Password Protected Document |
Solution detected inconsistent behaviour with password protected document |
16 |
Exceeded Archive Timeout |
The archive scan time has been exceeded, Malcore engines are not responding within the deadline |
17 |
Filetype Mismatch |
File type mismatch problem: the solution detects the file extension with its contents and compares it with the file extension displayed |
18 |
Potentially Vulnerable File |
Potentially vulnerable files are files associated with identified vulnerable components or applications |
19 |
Cancelled |
User explicitly canceled this file analysis request |
21 |
Yara Rule Matched |
The verdict of the result is: a Yara rule matches (malware sample identification) |
22 |
Potentially Unwanted |
Solution detected potentially unwanted applications |
23 |
Unsupported File Type |
File type not supported by the solution |
255 |
In Progress |
Analysis in progress.. |