9.2. Engine log data structure
The logs are composed of different parts:
The header part
The source part defined by "_source"
The field part defined by "_fields"
9.2.1. Counters of the header part of logs
Fields |
Required |
Description |
Values or example |
---|---|---|---|
_index |
Yes |
Internal index |
engines_alerts-2024.11.26-000022 |
_type |
Yes |
default type |
_doc |
_id |
Yes |
internal identifier |
q5zQZ5MBe7GX5B2fx7DG |
_version |
Yes |
internal version |
1 |
_score |
Yes |
relevance of the response to the request |
0 |
9.2.2. Counters of the source part of logs
9.2.2.1. beacon category
Level 1 |
Level 2 |
Data type |
Description |
Value or example |
---|---|---|---|---|
beacon |
active |
boolean |
Beacon is active |
true |
beacon |
hostname_resolution |
string |
Hostname resolution status |
"not_analyzed" |
beacon |
id |
string |
unique identifier for the beaconing activity or signal |
"c4c886b4ad" |
beacon |
mean_time_interval |
numeric |
Mean time interval between beacons |
1 |
beacon |
possible_cnc |
string |
Possible CNC |
"not_recognized" |
beacon |
session_count |
numeric |
Session count |
260 |
beacon |
type |
string |
Type of beacon. unique identifier for the beaconing activity or signal |
The type of connection. Can be user, token or nothing |
9.2.2.2. DCERPC category
Level 1 |
Level 2 |
Level 3 |
Data type |
Description |
Value or example |
---|---|---|---|---|---|
dcerpc |
call_id |
numeric |
unique identifier for RPC call |
27 |
|
dcerpc |
interfacesx[x] |
ack_result |
acknowledgment result of RPC interface call |
||
dcerpc |
interfaces[x] |
uuid |
universally unique identifier for the RPC interface |
||
dcerpc |
interfaces[x] |
version |
version of the RPC interface |
||
dcerpc |
req |
frag_cnt |
numeric |
number of fragments in the RPC request |
1 |
dcerpc |
req |
opnum |
numeric |
operation number for the RPC request |
4 |
dcerpc |
req |
stub_data_size |
numeric |
size of the stub data in the request |
24 |
dcerpc |
request |
raw data of the RPC request |
string |
REQUEST |
|
dcerpc |
res |
frag_cnt |
numeric |
number of fragments in the RPC response |
1 |
dcerpc |
res |
stub_data_size |
numeric |
size of the stub data in the response |
68 |
dcerpc |
response |
raw data of the RPC response |
string |
RESPONSE |
|
dcerpc |
rpc_version |
string |
version of the RPC protocol used |
5.0 |
9.2.2.3. destination category
Level 1 |
Level 2 |
Data type |
Description |
Value or example |
---|---|---|---|---|
destination |
ip |
string |
IP address of the destination |
x.x.x.x |
destination |
mac |
string |
MAC address of the destination |
90:e2:ba:a6:a4:91 |
destination |
port |
numeric |
Port of the destination |
19609 |
9.2.2.4. dga category
Level 1 |
Level 2 |
Data type |
Description |
Value or example |
---|---|---|---|---|
dga |
dga_count |
numeric |
Number of DGAs |
29 |
dga |
dga_ratio |
numeric |
Ratio of DGAs (dga_count/nx_domain_count) |
1 |
dga |
malware_behavior_confidence |
numeric |
Malware behavior confidence in percent |
50 |
dga |
nx_domain_count |
numeric |
Number of NX domains analyzed |
29 |
dga |
top_DGA |
string |
Top DGAs based on score |
tjzjyiheo.com",
"nvtcvimt.com",
"vmfyaxnse.com",
"htjykhvta.com",
"csmanuivsrlx.com",
"sbxsgfddr.com",
"oyttwuyshcgxxaenbit.com",
"seklusaprnkwhvybzc.com",
"xxcnirvbqivbucfsbliu.com",
"jgjvgfetpammdrxwn.com"
|
9.2.2.5. DHCP category
Level 1 |
Level 2 |
Data type |
Description |
Value or example |
---|---|---|---|---|
dhcp |
assigned_ip |
string |
IP address assigned by the DHCP server |
192.168.1.2 |
dhcp |
client_ip |
string |
Client IP address |
x.y.z.a |
dhcp |
client_mac |
string |
Client MAC address |
00:e0:ed:01:6e:bd |
dhcp |
dhcp_type |
string |
Type of dhcp message |
|
dhcp |
dns_servers |
string |
List of DNS servers provided by DHCP |
192.168.1.1 |
dhcp |
hostname |
string |
Hostname of the client |
d002465 |
dhcp |
id |
numeric |
Id of the dhcp message |
107809848 |
dhcp |
lease_time |
numeric |
duration for which the DHCP lease is valid |
3600 |
dhcp |
params |
numeric |
Parameters of dhcp message |
|
dhcp |
next_server_ip |
string |
IP address of the next DHCP server to contact |
0.0.0.0 |
dhcp |
relay_ip |
string |
IP address of the DHCP relay agent |
0.0.0.0 |
dhcp |
routers |
string |
list of routers/gateway addresses provided by DHCP |
192.168.1.1 |
dhcp |
subnet_mask |
string |
subnet mask assigned by the DHCP server |
255.255.255.0 |
dhcp |
type |
string |
Type of the dhcp message |
Type of DHCP message (e.g. request, offer) |
9.2.2.6. DNP3 category
Level 1 |
Level 2 |
Level 3 |
Level 4 |
Data type |
Description |
Value or example |
---|---|---|---|---|---|---|
dnp3 |
application |
control |
con |
boolean |
false |
|
dnp3 |
application |
control |
fin |
boolean |
true |
|
dnp3 |
application |
control |
fir |
boolean |
true |
|
dnp3 |
application |
control |
sequence |
numeric |
7 |
|
dnp3 |
application |
control |
uns |
boolean |
false |
|
dnp3 |
application |
complete |
boolean |
true |
||
dnp3 |
application |
function_code |
numeric |
129 |
||
dnp3 |
application |
objects |
count |
numeric |
6 |
|
dnp3 |
application |
objects |
group |
numeric |
1 |
|
dnp3 |
application |
objects |
points. sub :
- comm_lost
- index
- local_forced
- online
- prefix
- remote_forced
- reserved0
- reserved1
- restart
- state
|
numeric |
values:
- 0
- 0
- 0
- 1
- 0
- 0
- 0
- 0
- 0
- 1
|
|
dnp3 |
application |
objects |
prefix_code |
numeric |
0 |
|
dnp3 |
application |
objects |
qualifier |
numeric |
0 |
|
dnp3 |
application |
objects |
range_code |
numeric |
0 |
|
dnp3 |
application |
objects |
start |
numeric |
0 |
|
dnp3 |
application |
objects |
stop |
numeric |
5 |
|
dnp3 |
application |
objects |
variation |
numeric |
1 |
|
dnp3 |
control |
dir |
boolean |
false |
||
dnp3 |
control |
fcb |
boolean |
false |
||
dnp3 |
control |
fcv |
boolean |
false |
||
dnp3 |
control |
function_code |
numeric |
|||
dnp3 |
control |
pri |
boolean |
true |
||
dnp3 |
dst |
numeric |
3 |
|||
dnp3 |
iin |
indicators |
array |
[] |
||
dnp3 |
src |
numeric |
4 |
|||
dnp3 |
type |
string |
response |
9.2.2.7. DNS category
Level 1 |
Level 2 |
Level 3 |
Level 4 |
Data type |
Description |
Values or example |
---|---|---|---|---|---|---|
dns |
answers |
name |
string |
The domain name to which this resource record pertains. |
ztqnmsruernxksa0l.com |
|
dns |
answers |
data[0] |
rdata |
string |
Resource Data (ex: IP that domain name resolves to) |
|
dns |
answers |
data[0] |
rrname |
string |
Resource Record Name (ex: a domain name) |
|
dns |
answers |
data[0] |
rrtype |
string |
Resource Record Type (ex: A, AAAA, NS, PTR) |
|
dns |
answers |
data[0] |
tttl |
string |
Time-To-Live for this resource record |
|
dns |
answers |
type |
string |
The type of data contained in this resource record. |
A |
|
dns |
authorities |
rrname |
string |
name of the resource record in the authority section |
com |
|
dns |
authorities |
rrtype |
string |
type of the resource record in the authority section |
SOA |
|
dns |
authorities |
soa |
expire |
numeric |
expiration time for the SOA (Start of Authority) record |
604800 |
dns |
authorities |
soa |
minimum |
numeric |
minimum TTL (Time to Live) for the SOA record |
86400 |
dns |
authorities |
soa |
mname |
string |
primary master name server in the SOA record |
nstld.verisign-grs.com |
dns |
authorities |
soa |
refresh |
numeric |
refresh interval for the SOA record |
1800 |
dns |
authorities |
soa |
retry |
numeric |
retry interval for the SOA record |
900 |
dns |
authorities |
soa |
rname |
string |
responsible person’s email address in the SOA record |
a.gtld-servers.net |
dns |
authorities |
soa |
serial |
numeric |
serial number for the SOA record |
1410273997 |
dns |
authorities |
ttl |
numeric |
Time to Live (TTL) for the authority section |
5 |
|
dns |
flags |
string |
Indicating DNS answer flag, in hexadecimal |
8183 |
||
dns |
grouped |
A[0] |
string |
A record |
||
dns |
id |
numeric |
The DNS packet identifier assigned by the program that generated the query. The identifier is copied to the response. |
26738 |
||
dns |
query |
rrname |
string |
|||
dns |
query |
rrtype |
string |
A |
||
dns |
query |
tx_id |
numeric |
193630 |
||
dns |
query |
opcode |
numeric |
0 |
||
dns |
query |
type |
string |
query |
||
dns |
query |
id |
numeric |
The DNS packet identifier assigned by the program that generated the query. The identifier is copied to the response. |
57318 |
|
dns |
qr |
boolean |
Indicating in case of DNS answer flag, Query/Response flag (ex: true if set) |
true |
||
dns |
ra |
boolean |
Indicating in case of DNS answer flag, Recursion Available flag (ex: true if set) |
true |
||
dns |
rd |
boolean |
Indicating in case of DNS answer flag, Recursion Desired flag (ex: true if set) |
true |
||
dns |
response_code |
The DNS response code. |
string |
The DNS response code. |
NXDOMAIN |
|
dns |
type |
string |
Indicating DNS message type, can be “answer” or “query” |
answer |
||
dns |
version |
numeric |
Indicating DNS logging version in use |
2 |
9.2.2.8. ecs category
Level 1 |
Level 2 |
Data type |
Description |
Value or example |
---|---|---|---|---|
ecs |
version |
numeric |
ECS version this event conforms to |
8.6.0 |
9.2.2.9. email category
Level 1 |
Level 2 |
Data type |
Description |
Value or example |
---|---|---|---|---|
attachments[0] |
string |
List of objects describing the attachments. |
||
body_md5 |
MD5 hash of the email body |
|||
message_id |
unique identifier for the email message |
|||
status |
Status of the email |
|||
subject |
The subject of the email message. |
|||
subject_md5 |
MD5 hash of the email subject |
|||
to.address[0] |
Email address of recipient |
9.2.2.10. event category
Level 1 |
Level 2 |
Data type |
Description |
Value or example |
---|---|---|---|---|
event |
category |
string |
file category
network category
intrusion_detection
|
file
network
intrusion_detection
|
event |
created |
date |
Time when the event was first read by an agent or by your pipeline |
2024-12-17T11:01:15.955324+00:00 |
event |
dataset |
string |
Name of the dataset |
alert |
event |
end |
date |
2024-12-17T11:00:05.717000+00:00 |
|
event |
id |
string |
Unique ID to describe the event |
28e92cac-b1de-4b20-ab71-5eeb325f64ed |
event |
kind |
string |
The kind of the event. The highest categorization field in the hierarchy |
alert |
event |
module |
string |
Name of the module this data is coming from |
Malcore or malcore_retroanalyzer, active_cti or ... |
event |
severity |
numeric |
Analysis result code |
Between 0 and 3
0=clean
1=infected
2=suspicious
3=Other
|
event |
severity_human |
string |
Analysis result |
Suspicious |
event |
start |
date |
9.2.2.11. ether category
Level 1 |
Level 2 |
Data type |
Description |
Value or example |
---|---|---|---|---|
ether |
src_macs |
source MAC address of the Ethernet frame |
52:54:10:f5:71:63 |
|
ether |
dest_macs |
destination MAC address of the Ethernet frame |
fa:2a:73:90:d5:3d |
9.2.2.12. file category
Level 1 |
Level 2 |
Level 3 |
Data type |
Description |
Value or example |
---|---|---|---|---|---|
file |
file_id |
numeric |
The file id |
646 |
|
file |
gaps |
boolean |
Monitoring inconsistency in file size |
false |
|
file |
hash |
md5 |
string |
MD5 hash of the analyzed file |
c279be702893.... |
file |
hash |
sha1 |
string |
SHA1 of the analyzed file |
|
file |
hash |
sha256 |
string |
SHA256sum of the analyzed file |
4679e7f2018c19... |
file |
magic |
string |
File format identifier (Magic signature): detected by Sigflow using a reduced database. |
Zip archive data, at least v2.0 to extract |
|
file |
name |
string |
Name of the file including the extension, without the directory |
smtptest-2021-02-24T17-30-01Z.zip |
|
file |
sid |
string |
Alert ID. Must be unique. |
1100043 |
|
file |
size |
numeric |
File size in bytes |
77068 |
|
file |
state |
string |
Completeness of the analyzed file (CLOSED) otherwise TRUNCATED.
The Sigflow file-store.stream-depth variable defines the size of the reconstructed files.
The file is TRUNCATED if its size is > File-store stream depth (10 MB) by default.
|
CLOSED |
|
file |
stored |
boolean |
Still at "true", the file was stored on disk for further analysis |
true |
|
file |
tx_id |
numeric |
transaction identification (query/response pair) |
1 |
9.2.2.13. flow category
Level 1 |
Level 2 |
Data type |
Description |
Value or example |
---|---|---|---|---|
flow |
bytes_toclient |
numeric |
Size of flow to customer |
15280 |
flow |
bytes_toserver |
numeric |
Size of flow to server |
128 |
flow |
pkts_toclient |
numeric |
Number of packets to client |
12 |
flow |
pkts_toserver |
numeric |
Number of packets to server |
4 |
flow |
start |
date |
Date and time of first package seen by Sigflow |
2024-11-26T09:16:56.277148+0000 |
9.2.2.14. FTP category
Level 1 |
Level 2 |
Data type |
Description |
Value or example |
---|---|---|---|---|
ftp |
command |
string |
FTP command issued by the client |
EPSV |
ftp |
completion_code |
string |
FTP response code indicating the result of a command |
229 |
ftp |
dynamic_port |
numeric |
port used by FTP for dynamic data transfer (PASV mode) |
1024 |
ftp |
reply |
string |
FTP server’s reply message to the client |
"Extended Passive Mode OK (|||1024|)" |
ftp |
reply_received |
string |
timestamp when the FTP reply was received |
yes |
ftp |
reply_truncated |
boolean |
indicates if the FTP reply was truncated |
false |
9.2.2.15. FTP data category
Level 1 |
Level 2 |
Data type |
Description |
Value or example |
---|---|---|---|---|
ftp_data |
filename |
string |
name fo the file involved in FTP data transfer |
README.txt |
ftp_data |
command |
string |
FTP command related to the data transfer (e.g. RETR, STOR) |
RETR |
9.2.2.16. HTTP category
Level 1 |
Level 2 |
Level 3 |
Level 4 |
Data type |
Description |
Value or example |
---|---|---|---|---|---|---|
http |
accept |
string |
Accept header of the request |
|||
http |
accept_encoding |
string |
Accept encoding header of the request |
"accept-encoding" |
||
http |
date |
date |
Date header of the request |
"gzip, deflate" |
||
http |
hostname |
string |
The hostname this HTTP event is attributed to |
tsevid-synonymi.justdanceatsea.com |
||
http |
http_port |
port used for the HTTP connection |
numeric |
Port HTTP |
8080 |
|
http |
http_refer |
string |
"http://tsevid-synonymi.justdanceatsea.com:8080/ndf4xx22ci.php", |
|||
http |
http_user_agent |
referrer URL in the HTTP request |
string |
User agent of the request |
||
http |
http2 |
request |
priority |
numeric |
priority of the HTTP/2 request |
15 |
http |
http2 |
stream_id |
stream ID in an HTTP/2 request/response |
numeric |
13 |
|
http |
http2 |
response |
HTTP/2 response sent by the server |
numeric |
{} |
|
http |
last_modified |
string |
||||
http |
request |
method |
string |
HTTP request method |
"GET" |
|
http |
request |
mime_type |
string |
Mime type of the body of the request. |
||
http |
request_headers |
name= |
accept |
string |
acceptable content types in the HTTP request |
"accept" |
http |
request_headers |
value |
string |
value of the specific HTTP header ("/FireInstaller4.exe","GET","http", "nghttp2/1.43.0".. ) |
"/" |
|
http |
request_headers |
name= |
accept-encoding |
string |
encoding methods accepted by the client |
|
http |
request_headers |
name= |
:authority |
string |
authority (host and port) in the HTTP/2 request |
":authority" |
http |
request_headers |
name= |
:method |
string |
HTTP method (e.g., GET, POST) |
:method |
http |
request_headers |
name= |
:path |
string |
path of the resource in the HTTP requests |
":path" |
http |
request_headers |
name= |
:scheme |
string |
URI scheme (e.g. HTTP, HTTPS) |
":scheme" |
http |
request_headers |
name= |
user-agent |
string |
client’s user agent information |
"user-agent" |
http |
response |
bytes |
numeric |
Total size in bytes of the response (body and headers) |
77068 |
|
http |
response |
mime_type |
HTTP response status code |
string |
Mime type of the body of the response |
application/x-shockwave-flash |
http |
response |
status |
numeric |
HTTP response code
1xx informational response – the request was received, continuing process
2xx successful – the request was successfully received, understood, and accepted
3xx redirection – further action needs to be taken in order to complete the request
4xx client error – the request contains bad syntax or cannot be fulfilled
5xx server error – the server failed to fulfil an apparently valid request
|
200 |
|
http |
response_headers |
name= |
accept-ranges |
string |
indicates if the server supports range requests |
|
http |
response_headers |
name= |
content-length |
string |
length of the response body |
|
http |
response_headers |
name= |
content-type |
string |
type of the content returned in the response |
|
http |
response_headers |
name= |
date |
string |
date and time the response was sent |
|
http |
response_headers |
name= |
etag |
string |
entity tag for caching validation |
|
http |
response_headers |
last_modified |
etag |
string |
entity tag for the last modified version of the resource |
|
http |
response_headers |
last_modified |
server |
string |
server providing the last modified resource |
|
http |
response_headers |
last_modified |
status |
string |
status of the HTTP response |
|
http |
response_headers |
value |
string |
|||
http |
server |
value |
string |
Server header of the request |
||
http |
url |
string |
URL of the request |
|||
http |
version |
string |
HTTP version |
HTTP/1.1 |
9.2.2.17. HTTP2 category
Level 1 |
Level 2 |
Level 3 |
Level 4 |
Data type |
Value or example |
---|---|---|---|---|---|
http2 |
http_method |
string |
GET |
||
http2 |
http_user_agent |
string |
nghttp2/1.43.0 |
||
http2 |
http2 |
request |
priority |
numeric |
15 |
http2 |
http2 |
stream_id |
numeric |
13 |
|
http2 |
http2 |
response |
string |
{} |
|
http2 |
http2 |
length |
numeric |
3663 |
|
http2 |
request_headers |
name= |
accept |
string |
|
http2 |
request_headers |
value |
string |
/ |
|
http2 |
request_headers |
name= |
accept-encoding |
string |
|
http2 |
request_headers |
value |
string |
gzip, deflate |
|
http2 |
request_headers |
name= |
:authority |
string |
|
http2 |
request_headers |
value |
string |
10.2.10.205 |
|
http2 |
request_headers |
name= |
:method |
string |
|
http2 |
request_headers |
value |
string |
GET |
|
http2 |
request_headers |
name= |
:path |
string |
|
http2 |
request_headers |
value |
string |
/3k.zip |
|
http2 |
request_headers |
name= |
:scheme |
string |
|
http2 |
request_headers |
value |
string |
http |
|
http2 |
request_headers |
name= |
user-agent |
string |
|
http2 |
request_headers |
value |
string |
15 |
|
http2 |
response_headers |
name= |
accept-ranges |
string |
|
http2 |
response_headers |
value |
string |
bytes |
|
http2 |
response_headers |
name= |
content-length |
string |
|
http2 |
response_headers |
value |
string |
3663 |
|
http2 |
response_headers |
name= |
content-type |
string |
|
http2 |
response_headers |
value |
string |
text/plain |
|
http2 |
response_headers |
name= |
date |
string |
|
http2 |
response_headers |
value |
string |
Mon, 08 Jan 2024 15:28:50 GMT |
|
http2 |
response_headers |
name= |
etag |
string |
|
http2 |
response_headers |
value |
string |
"659c131d-e4f" |
|
http2 |
response_headers |
last_modified |
etag |
string |
|
http2 |
response_headers |
value |
string |
Mon, 08 Jan 2024 15:22:05 GMT |
|
http2 |
response_headers |
last_modified |
server |
string |
|
http2 |
response_headers |
value |
string |
nginx/1.25.2 |
|
http2 |
response_headers |
last_modified |
:status |
string |
|
http2 |
response_headers |
value |
string |
200 |
|
http2 |
status |
numeric |
200 |
||
http2 |
url |
string |
/3k.zip |
||
http2 |
version |
string |
2 |
9.2.2.18. IKEV2 category
Level 1 |
Level 2 |
Data type |
Description |
Value or example |
---|---|---|---|---|
ikev2 |
alg_auth |
numeric |
Authentication algorithm |
"AUTH_HMAC_SHA1_96" |
ikev2 |
alg_dh |
string |
Diffie-Hellman group |
"2048-bit MODP Group" |
ikev2 |
alg_enc |
string |
Encryption algorithm |
"ENCR_AES_CBC" |
ikev2 |
alg_esn |
string |
Extended Sequence Numbers |
"NoESN" |
ikev2 |
alg_perf |
string |
Pseudo-Random Function |
"PRF_HMAC_SHA1" |
ikev2 |
errors |
numeric |
Number of errors |
0 |
ikev2 |
exchange_type |
numeric |
IKEv2 exchange type |
34 |
ikev2 |
init_spi |
string |
Initiator's SPI |
"605830378bec4174" |
ikev2 |
message_id |
boolean |
Message ID |
0 |
ikev2 |
notify |
string |
Notify message |
[
"NAT_DETECTION_SOURCE_IP",
"NAT_DETECTION_DESTINATION_IP",
"IKEV2_FRAGMENTATION_SUPPORTED",
"MULTIPLE_AUTH_SUPPORTED"
]
|
ikev2 |
payload |
string |
Payload type |
[
"SecurityAssociation",
"KeyExchange",
"Nonce",
"Notify",
"Notify",
"Notify",
"Notify",
"NoNextPayload"
]
|
ikev2 |
resp_spi |
string |
Responder's SPI |
"5afa8990956d8af0" |
ikev2 |
role |
string |
Role of the participant |
"responder" |
ikev2 |
version_major |
numeric |
Major version |
2 |
ikev2 |
version_minor |
numeric |
Minor version |
0 |
9.2.2.19. ioc category
Level 1 |
Level 2 |
Level 3 |
Data type |
Description |
Value or example |
---|---|---|---|---|---|
ioc |
id |
numeric |
|||
ioc |
campaigns |
string |
The campaigns of the IOC |
||
ioc |
case_id |
string |
The case id of the IOC |
aa8d51ed-0883-4b12-8b43 |
|
ioc |
categories |
string |
The categories of the IOC |
trojan
malware
|
|
ioc |
creation_date |
date |
The creation date of the IOC |
2025-01-28T08:02:50+00:00 |
|
ioc |
description |
string |
The description of the IOC |
eb4db30601b1f4babefa4...' is a Suspicious SHA256.nThis SHA256 is linked to a trojan attack.nWe advised to use this IoC in detection mode. |
|
ioc |
external_links |
source_name |
string |
The external links of the IOC |
|
ioc |
external_links |
url |
string |
"source_name": "IOCAnalysisCollector"
|
|
ioc |
families |
string |
The families of the IOC |
||
ioc |
id |
string |
e9a6f382-d06b-490f-9b6e |
||
ioc |
kill_chain_phases |
string |
The kill chain phases of the IOC |
||
ioc |
meta_data |
cwe |
string |
||
ioc |
meta_data |
descriptions |
string |
||
ioc |
meta_data |
usageMode |
string |
"descriptions": [],
"usageMode": "detection",
"cwe": []
|
|
ioc |
package_date |
date |
The package date of the IOC |
025-01-28T08:50:04.124404+00:00 |
|
ioc |
relations |
string |
The uuid related to the IOC |
"0e3cc27b-7999-48ce-8484",
"5556c4ab-3e5e-4d56-8410"
|
|
ioc |
signature |
string |
The signature of the IOC |
SHA256 - trojan/malware - Unknown family - Unknown threat actor - e9a6f3 |
|
ioc |
tags |
string |
The tags of the IOC |
"trojan.generickd.66527077",
"troj/drodzp-cf",
"trojan.generickd.66527077 (b)",
"trojan/generickd!vemnohoo"
|
|
ioc |
targeted_countries |
string |
The targeted countries of the IOC |
||
ioc |
targeted_organizations |
string |
The targeted organizations of the IOC |
||
ioc |
targeted_platforms |
string |
The targeted platforms of the IOC |
||
ioc |
targeted_sectors |
string |
The targeted sectors of the IOC |
Services - Autres |
|
ioc |
threat_actor |
string |
The threat actor of the IOC |
||
ioc |
tlp |
string |
The color based level of the IOC |
green |
|
ioc |
ttp |
string |
The tactics, techniques, and procedures of the IOC |
||
ioc |
type |
string |
The type of the IOC |
SHA256 |
|
ioc |
updated_date |
date |
The updated date of the IOC |
2025-01-28T08:04:31+00:00 |
|
ioc |
usage_mode |
string |
The usage mode of the IOC |
detection |
|
ioc |
value |
string |
The value of the IOC |
eb4db357dc6f2dd8facf132ecafd... |
|
ioc |
vulnerabilities |
string |
The vulnerabilities of the IOC |
9.2.2.20. krb5 category
Level 1 |
Level 2 |
Data type |
Description |
Value or example |
---|---|---|---|---|
krb5 |
string |
cli-krb5 |
||
krb5 |
encryption |
string |
encryption |
aes256-cts-hmac-sha1-96 |
krb5 |
msg_type |
string |
msg_type |
KRB_AS_REP |
krb5 |
realm |
string |
the Kerberos Realm |
GATEWATCHER.COM |
krb5 |
sname |
string |
sname |
krbtgt/GATEWATCHER.COM |
krb5 |
weak_encryption |
boolean |
weak_encryption |
false |
9.2.2.21. malcore category
Level 1 |
Level 2 |
Level 3 |
Level 4 |
Data type |
Description |
Value or example |
---|---|---|---|---|---|---|
malcore |
analyzed_clean |
numeric |
GEYEGO: Number of engines with result CLEAN |
0 |
||
malcore |
analyzed_error |
numeric |
GEYEGO: Number of engines with result in FAILED, CLEANED_OR_DELETED, SCAN_SKIPPED_WHITELIST, SCAN_SKIPPED_BLACKLIST, NOT_SCANNED, CANCELED, UNSUPPORTED_FILE_TYPE, IN_PROGRESS |
0 |
||
malcore |
analyzed_infected |
numeric |
GEYEGO: Number of engines with result INFECTED |
9 |
||
malcore |
analyzed_other |
numeric |
GEYEGO: Number of engines with result other results than the one described above |
7 |
||
malcore |
analyzed_suspicious |
numeric |
GEYEGO: Number of engines with result SUSPICIOUS |
0 |
||
malcore |
analyzers_up |
MALCORE: Total number of engines used for this analysis |
numeric |
Total number of engines used for analysis |
16 |
|
malcore |
code |
numeric |
Usually. Can be forced to SCAN_SKIPPED_BLACKLIST(8) or SCAN_SKIPPED_WHITELIST(7) if filtered or NOT_SCANNED(10) if file is lost.
See the table Malcore engine results (Malcore engine results)
|
1 |
||
malcore |
detail_scan_time |
numeric |
File analysis time (ms) by malcore engines |
245 |
||
malcore |
detail_threat_found |
string |
Comma separated list of detected threat names |
"Infected: EICAR-Test-File (not a virus) (B).... |
||
malcore |
detail_wait_time |
numeric |
Time elapsed between sending the file to the node and receiving the engine result in milliseconds |
1096 |
||
malcore |
engine_id |
0-15 |
numeric |
unique identifier for a Malcore engine (0 to 15) |
4 |
|
malcore |
engine_id |
0-15 |
id |
string |
engine id |
b557a5r |
malcore |
engine_id |
0-15 |
scan_result |
string |
analysis result (INFECTED, UNSUPPORTED_FILE_TYPE, NOT_SCANNED or CLEAN) |
INFECTED |
malcore |
engine_id |
0-15 |
string |
threat_details |
EICAR-Test-File (not a virus) (B) |
|
malcore |
engines_last_update_date |
date |
GEYEGO: median last update time of all analyzers used. |
2023-07-11T11:32:00Z |
||
malcore |
file_type |
string |
MALCORE: file type. |
application/zip |
||
malcore |
file_type_description |
string |
MALCORE: file type, but longer. |
ZIP Archive |
||
malcore |
magic_details |
string |
GEYEGO: Lib magic result |
Zip archive data, at least v2.0 to extract |
||
malcore |
processing_time |
numeric |
1341 |
|||
malcore |
reporting_token |
string |
GEYEGO: GBOX analysis token, if available |
GBOX# |
||
malcore |
state |
string |
Result is "Infected" as soon as the result of an engine is "Infected" |
Infected |
||
malcore |
total_found |
string |
GEYEGO: string presenting <infected>/<total number> |
XX/YY with YY between 0 and 16 and XX between 0 and YY; example 9/16 |
9.2.2.22. malcore_retroanalyzer category
Level 1 |
Level 2 |
Level 3 |
Level 4 |
Data type |
Description |
Value or example |
---|---|---|---|---|---|---|
malcore_retroanalyzer |
analyzed_clean |
numeric |
GEYEGO: Number of engines with result CLEAN |
0 |
||
malcore_retroanalyzer |
analyzed_error |
numeric |
GEYEGO: Number of engines with result in FAILED, CLEANED_OR_DELETED, SCAN_SKIPPED_WHITELIST, SCAN_SKIPPED_BLACKLIST, NOT_SCANNED, CANCELED, UNSUPPORTED_FILE_TYPE, IN_PROGRESS |
0 |
||
malcore_retroanalyzer |
analyzed_infected |
numeric |
GEYEGO: Number of engines with INFECTED result |
9 |
||
malcore_retroanalyzer |
analyzed_other |
numeric |
GEYEGO: Number of engines with result other results than the one described above |
7 |
||
malcore_retroanalyzer |
analyzed_suspicious |
numeric |
GEYEGO: Number of engines with result SUSPICIOUS |
0 |
||
malcore_retroanalyzer |
analyzers_up |
numeric |
MALCORE: Total number of engines used for this analysis |
16 |
||
malcore_retroanalyzer |
code |
numeric |
Can be forced to SCAN_SKIPPED_BLACKLIST(8) or SCAN_SKIPPED_WHITELIST(7) if filtered or NOT_SCANNED(10) if file is lost.
See the table Malcore engine results (Malcore engine results)
|
1 |
||
malcore_retroanalyzer |
detail_scan_time |
numeric |
Analysis time of the files (ms) by the malcore engines |
245 |
||
malcore_retroanalyzer |
detail_threat_found |
string |
List of detected threat names, separated by commas |
"Infected: EICAR-Test-File (not a virus) (B).... |
||
malcore_retroanalyzer |
detail_wait_time |
numeric |
MALCORE: process_info.processing_time_details.others_time_process_info_processing_time_details_filetype_time, |
1096 |
||
malcore_retroanalyzer |
engine_id |
numeric |
malcore engine number (0 to 15) |
4 |
||
malcore_retroanalyzer |
engine_id |
0-15 |
id |
string |
engine id |
b557a5r |
malcore_retroanalyzer |
engine_id |
0-15 |
scan_result |
string |
analysis result (INFECTED or CLEAN) |
INFECTED |
malcore_retroanalyzer |
engine_id |
0-15 |
threat_details |
string |
treat details of the result for this engine |
EICAR-Test-File (not a virus) (B) |
malcore_retroanalyzer |
engines_last_update_date |
date |
GEYEGO: median last update time of all analyzers used. |
2023-07-11T11:32:00Z |
||
malcore_retroanalyzer |
file_type |
string |
MALCORE: file type. |
application/zip |
||
malcore_retroanalyzer |
file_type_description |
string |
MALCORE: file type, but longer. |
ZIP Archive |
||
malcore_retroanalyzer |
magic_details |
string |
GEYEGO: Lib magic result |
Zip archive data, at least v2.0 to extract |
||
malcore_retroanalyzer |
processing_time |
numeric |
1341 |
|||
malcore_retroanalyzer |
reporting_token |
string |
GEYEGO: GBOX analysis token, if available |
GBOX# |
||
malcore_retroanalyzer |
state |
string |
The result is "Infected" as soon as the result of a motor is "Infected" |
Infected |
||
malcore_retroanalyzer |
total_found |
string |
GEYEGO: string presenting <infected>/<total number> |
XX/YY with YY between 0 and 16 and XX between 0 and YY; example 9/16 |
9.2.2.23. malicious_powershell category
Level 1 |
Level 2 |
Level 3 |
Data type |
Description |
Value or example |
---|---|---|---|---|---|
malicious_powershell |
id |
string |
MD5 of the file |
b5c38e2159f80a5a3076a353360cb5f1 |
|
malicious_powershell |
proba_obfuscated |
numeric |
probability of obfuscation |
0.6 |
|
malicious_powershell |
sample_id (id) |
string |
file id |
12-04-2024T14:12:40_03afe38854c8443db03-gatewatcher.com", |
|
malicious_powershell |
score |
numeric |
score of the PowerShell script |
332 |
|
malicious_powershell |
score_details |
AddContent |
numeric |
Adds content to a file/folder |
0 |
malicious_powershell |
score_details |
Base64 |
numeric |
Score represented by an integer of a/patterns base64 detected |
188 |
malicious_powershell |
score_details |
CharInt |
numeric |
Score represented by an integer of one/of the detected charitable patterns |
6 |
malicious_powershell |
score_details |
FmtStr |
numeric |
Score represented by an integer of a/of detected fmtstr patterns |
8 |
malicious_powershell |
score_details |
GetContent |
numeric |
Get-Content applet to read file data |
0 |
malicious_powershell |
score_details |
InvokeExpression |
numeric |
InvokeExpression Applet |
100 |
malicious_powershell |
score_details |
InvokeRestMethod |
numeric |
0 |
|
malicious_powershell |
score_details |
InvokeWebRequest |
numeric |
Invoke-WebRequest applet sends HTTP and HTTPS requests to a webpage |
0 |
malicious_powershell |
score_details |
SetContent |
numeric |
Applet SetContent writes new content or replaces existing content in a file |
0 |
malicious_powershell |
score_details |
StartBitsTransfer |
numeric |
Start-BitsTransfer Order |
0 |
malicious_powershell |
score_details |
StrCat |
numeric |
Function that concatenates strings |
4 |
malicious_powershell |
score_details |
StreamReader |
numeric |
Object to read and display each directory name |
0 |
malicious_powershell |
score_details |
StreamWriter |
numeric |
Write a file that lists directories |
0 |
malicious_powershell |
score_details |
StrJoin |
numeric |
Score represented by an integer of a/strjoin patterns detected |
6 |
malicious_powershell |
score_details |
StrReplace |
numeric |
Score represented by an integer of a/strreplace patterns detected |
0 |
malicious_powershell |
score_details |
SystemIOFile |
numeric |
Manipulation of a file (creation, opening, copy, etc.) |
0 |
malicious_powershell |
score_details |
WebClientInvokation |
numeric |
Score represented by an integer of one/of detected webclientinvokation patterns |
20 |
9.2.2.24. matched_event category
Level 1 |
Level 2 |
Data type |
Description |
Value or example |
---|---|---|---|---|
matched_event |
id |
numeric |
The ID of the matched event |
|
matched_event |
content |
string |
Content all categories of the matched event |
9.2.2.25. metadata category
Level 1 |
Level 2 |
Data type |
Description |
Value or example |
---|---|---|---|---|
metadata |
flowbits |
string |
min.gethttp |
9.2.2.26. MQTT category
Level 1 |
Level 2 |
Level 3 |
Data type |
Description |
Value or example |
---|---|---|---|---|---|
mqtt |
connack |
dup |
boolean |
false |
|
mqtt |
connack |
qos |
numeric |
0 |
|
mqtt |
connack |
retain |
boolean |
false |
|
mqtt |
connack |
return_code |
numeric |
0 |
|
mqtt |
connack |
session_present |
boolean |
false |
9.2.2.27. nba category
Level 1 |
Level 2 |
Level 3 |
Data type |
Description |
Value or example |
---|---|---|---|---|---|
nba |
action |
string |
|||
nba |
category |
string |
|||
nba |
gid |
numeric |
|||
nba |
metadata |
performance_impact |
string |
||
nba |
metadata |
signature_severity |
string |
||
nba |
packet |
string |
|||
nba |
payload |
string |
|||
nba |
payload_printable |
string |
|||
nba |
rev |
numeric |
|||
nba |
signature |
string |
|||
nba |
signature_id |
numeric |
|||
nba |
stream |
numeric |
9.2.2.28. netflow category
Level 1 |
Level 2 |
Data type |
Description |
Value or example |
---|---|---|---|---|
netflow |
pkts |
numeric |
Packets of the flow |
1 |
netflow |
age |
numeric |
Age of the flow |
0 |
netflow |
end |
date |
End time of the flow |
2024-09-12T15:00:07.959357+0000 |
netflow |
min_ttl |
numeric |
Minimum TTL of the flow |
255 |
netflow |
bytes |
numeric |
Bytes of the flow |
62 |
netflow |
start |
date |
Start time of the flow |
2024-09-12T15:00:07.959357+0000 |
netflow |
max_ttl |
numeric |
Maximum TTL of the flow |
255 |
9.2.2.29. network category
Level 1 |
Level 2 |
Data type |
Description |
Value or example |
---|---|---|---|---|
network |
community_id |
string |
hash of source and destination IPs and ports, as well as the protocol used in a communication |
1:r6LvcE7ltny4a6Y9xt1Vr... |
network |
flow_id |
numeric |
Flow identifier |
363747525458479 |
network |
protocol |
string |
Application Layer protocol. For example, http, dns, or ssh |
http |
network |
timestamp |
date |
Date and time of alert generation by Sigflow |
2024-11-26T09:17:00.775521+0000 |
network |
transport |
string |
name of the transport layer (udp, tcp, ipv6-icmp, etc.) |
tcp |
network |
tx_id |
numeric |
transaction identification (query/response pair) |
0 |
9.2.2.30. NFS category
Level 1 |
Level 2 |
Data type |
Description |
Value or example |
---|---|---|---|---|
nfs |
filename |
string |
"" |
|
nfs |
file_tx |
boolean |
true |
|
nfs |
hhash |
string |
Hash of the file |
87b5a66e |
nfs |
id |
numeric |
ID of the NFS event |
1 |
nfs |
procedure |
string |
NFS procedure |
WRITE |
nfs |
status |
string |
Status of the NFS event |
OK |
nfs |
type |
string |
Type of the NFS event |
response |
nfs |
version |
numeric |
NFS version |
4 |
9.2.2.31. observer category
Level 1 |
Level 2 |
Level 3 |
Level 4 |
Data type |
Description |
Value or example |
---|---|---|---|---|---|---|
observer |
gcap |
hostname |
string |
The hostname of the gcap |
gcap-xxx.domain.local |
|
observer |
gcap |
ingress |
interface/name |
string |
GCap input interface used for capture (monx or monvirt) |
monvirt |
observer |
gcap |
version |
string |
The version of the gcap |
"2.5.4" |
|
observer |
hostname |
string |
Hostname of the observer |
"gcenter.domain", |
||
observer |
log_format_version |
string |
The log format version |
"1.0.0" |
||
observer |
product |
string |
The product name of the observer |
gcenter |
||
observer |
uuid |
string |
Unique identifier of the alert |
f639c844-3f6f-40fa-86c4-47ff603880e2 |
||
observer |
vendor |
string |
Vendor name of the observer |
gatewatcher |
||
observer |
version |
string |
Observer version |
"2.5.x." |
9.2.2.32. ransomware events
Level 1 |
Level 2 |
Data type |
Description |
Value or example |
---|---|---|---|---|
ransomware |
alert_threshold |
numeric |
The alert threshold |
930 |
ransomware |
malicious_behavior_confidence |
numeric |
Malicious behavior confidence in percent |
80 |
ransomware |
session_score |
numeric |
The session score |
35 |
9.2.2.33. RDP category
Level 1 |
Level 2 |
Level 3 |
Data type |
Description |
Value or example |
---|---|---|---|---|---|
rdp |
channels |
string |
The optional channel field is a list of requested data channel names |
[
"rdpdr",
"cliprdr",
"rdpsnd"
]
|
|
rdp |
client |
build |
string |
"Windows XP" |
|
rdp |
client |
capabilities |
string |
features and capabilities supported by the RDP client |
[ "support_errinfo_pdf" ] |
rdp |
client |
client_name |
string |
name of the RDP client |
"ISD2-KM84178" |
rdp |
client |
color_depth |
numeric |
color depth supported by the RDP client |
15 |
rdp |
client |
desktop_height |
numeric |
height of the desktop displayed by the RDP client |
|
rdp |
client |
desktop_width |
numeric |
width of the desktop displayed by the RDP client |
864 |
rdp |
client |
function_keys |
numeric |
function keys supported or configured by the RDP client |
12 |
rdp |
client |
id |
string |
unique identifier for the RDP client session |
"55274-OEM-0011903-00107" |
rdp |
client |
keyboard_layout |
string |
keyboard layout used by the RDP client |
"en-US" |
rdp |
client |
keyboard_type |
string |
type of keyboard supported by the RDP client |
"enhanced" |
rdp |
client |
product_id |
numeric |
product ID for the RDP client software |
1 |
rdp |
client |
version |
string |
version number of the RDP client |
"v5" |
rdp |
event_type |
string |
The event_type field indicates an RDP event subtype.
Possible values: initial_request,initial_response,connect_request,connect_response,tls_handshake
|
"connect_request" |
|
rdp |
protocol |
The protocol field is the selected protocol. Possible values: rdp, ssl, hybrid, rds_tls, hybrid_ex |
|||
rdp |
server_supports[0] |
The optional server_supports field is a list of server capabilities |
|||
rdp |
tx_id |
numeric |
Each RDP record contains a per-flow incrementing tx_id field |
2 |
9.2.2.34. RFB category
Level 1 |
Level 2 |
Level 3 |
Level 4 |
Data type |
Description |
Value or example |
---|---|---|---|---|---|---|
rfb |
authentication |
security_type |
numeric |
type of security method used during RFB (Remote Framebuffer) authentication |
2 |
|
rfb |
authentication |
vnc |
challenge |
string |
challenge sent by the VNC server during authentication |
"435414a03f719e3bab73fd2de5" |
rfb |
authentication |
vnc |
response |
string |
response sent by the VNC client to the authentication challend |
"50e93126e93f23a52" |
rfb |
client_protocol_version |
major |
string |
major version of the protocol used by the RFB client |
"003" |
|
rfb |
client_protocol_version |
minor |
string |
minor version of the protocol used by the RFB client |
"008" |
|
rfb |
server_protocol_version |
major |
string |
major version of the protocol used by the RFB server |
"003" |
|
rfb |
server_protocol_version |
minor |
string |
minor version of the protocol used by the RFB server |
"008" |
|
rfb |
server_security_failure_reason |
string |
reason for security failure during RFB server authentication |
"Authentication failed from 192.168.0.1" |
9.2.2.35. rpc category
Level 1 |
Level 2 |
Level 3 |
Data type |
Description |
Value or example |
---|---|---|---|---|---|
rpc |
creds |
gid |
group ID associated with the RPC credentials |
||
rpc |
creds |
machine_name |
name of the machine that initiated the RPC request |
||
rpc |
creds |
uid |
numeric |
user ID associated with the RPC credentials |
35 |
rpc |
status |
string |
status of the RPC call |
ACCEPTED |
|
rpc |
xid |
numeric |
transaction ID for the RPC request, used for matching requests and responses |
1299444754 |
9.2.2.36. Shellcode category
Level 1 |
Level 2 |
Level 3 |
Data type |
Description |
Value or example |
---|---|---|---|---|---|
Shellcode |
analysis |
args |
string |
The args of the call |
"{'pathname': '//etc/passwd', 'flags': 'O_WRONLY|O_APPEND', 'mode': 'None'}", |
Shellcode |
analysis |
call |
string |
The call |
sys_open |
Shellcode |
analysis |
info |
string |
More info |
"Stop : End of Shellcode (Exit)" |
Shellcode |
analysis |
ret |
string |
The retention |
0 |
Shellcode |
analysis |
_id |
numeric |
The id of the analysis |
-1 |
Shellcode |
analysis |
stop |
numeric |
The stop |
End of Shellcode (output) |
Shellcode |
encodings |
count |
numeric |
The count of the encoding |
1 |
Shellcode |
encodings |
name |
string |
The name of the encoding |
"Shikata_ga_nai", |
Shellcode |
encodings |
options |
string |
available encoding options used to encode shellcode |
|
Shellcode |
id |
string |
The id of the Shellcode |
8ae5f9d35f3878cace4c311d" |
|
Shellcode |
sample_id |
string |
The sample id of the Shellcode |
12-04-2024T14:17:25_925...c1c7_gcap-int-xxx.gatewatcher.com |
|
Shellcode |
sub_type |
string |
The sub type of the Shellcode |
"Linux_x86_32", |
9.2.2.37. sigflow category
Level 1 |
Level 2 |
Level 3 |
Data type |
Description |
Value or example |
---|---|---|---|---|---|
sigflow |
action |
string |
The action of the signature flow |
alert, drop, reject, pass "action": "allowed" |
|
sigflow |
category |
string |
The category of the signature flow |
Potentially Bad Traffic"
Active CTI
|
|
sigflow |
gid |
numeric |
The gid of the signature flow |
1 |
|
sigflow |
metadata |
affected_product |
string |
||
sigflow |
metadata |
attack_target |
string |
||
sigflow |
metadata |
confidence |
string |
||
sigflow |
metadata |
created_at |
string |
Created at YEAR_MONTH_DAY |
2014_11_15 |
sigflow |
metadata |
deployment |
string |
||
sigflow |
metadata |
ioc |
string |
fffc7e75-cb75-4210-.. |
|
sigflow |
metadata |
malware_family |
string |
||
sigflow |
metadata |
performance_impact |
string |
Performance impact |
Significant |
sigflow |
metadata |
reviewed_at |
string |
||
sigflow |
metadata |
risk |
string |
highly suspicious |
|
sigflow |
metadata |
signature_severity |
string |
Signature severity |
2 |
sigflow |
metadata |
updated_at |
string |
Updated at YEAR_MONTH_DAY |
2024_04_22 |
sigflow |
packet |
string |
The packet of the signature flow |
kOK6pqSQkOK... |
|
sigflow |
packet_info |
linktype |
numeric |
Type of link-layer header |
1 |
sigflow |
payload |
string |
The payload of the signature flow |
Potentially Bad Traffic |
|
sigflow |
payload_printable |
string |
The printable payload of the signature flow |
GET /emd.exe HTTP/1.1rnHost: opred.netrnConnection: Keep-Alivernrn |
|
sigflow |
rev |
numeric |
The revision of the signature flow |
11 |
|
sigflow |
signature |
string |
The signature of the signature flow |
ET CURRENT_EVENTS Terse alphanumeric executable downloader high likelihood of being hostile", |
|
sigflow |
signature_id |
numeric |
The signature id of the signature flow |
2019714 |
|
sigflow |
stream |
numeric |
The stream of the signature flow |
0 |
9.2.2.38. SIP category
Level 1 |
Level 2 |
Data type |
Description |
Value or example |
---|---|---|---|---|
sip |
code |
string |
"183" |
|
sip |
reason |
string |
"In band info available" |
|
sip |
response_line |
string |
"SIP/2.0 183 In band info available" |
|
sip |
version |
string |
"SIP/2.0" |
9.2.2.39. SMB category
Level 1 |
Level 2 |
Data type |
Description |
Value or example |
---|---|---|---|---|
smb |
client_dialects[0] |
string |
||
smb |
client_guid |
string |
||
smb |
command |
string |
command name |
"SMB2_COMMAND_SESSION_LOGOFF" |
smb |
dialect |
string |
The negotiated protocol dialect, or “unknown” if missing |
3.11 |
smb |
filename |
string |
filename for CREATE and other commands. |
|
smb |
fuid |
string |
SMB2+ file GUID. SMB1 FID as hex. |
|
smb |
id |
numeric |
internal transaction id |
12 |
smb |
max_read_size |
numeric |
||
smb |
max_write_size |
numeric |
||
smb |
session_id |
numeric |
SMB2+ session_id. SMB1 user id |
593737889611 |
smb |
server_guid |
string |
||
smb |
share |
string |
||
smb |
status |
string |
status string. Can be both NT_STATUS or DOS_ERR and other variants |
STATUS_SUCCESS |
smb |
status_code |
string |
status code as hex string |
0x0 |
smb |
tree_id |
numeric |
Tree ID |
0 |
9.2.2.40. SMTP category
Level 1 |
Level 2 |
Data type |
Description |
Value or example |
---|---|---|---|---|
smtp |
helo |
string |
the HELO command sent by the SMTP client to initiate communication |
qal-internet.internet |
smtp |
mail_from |
string |
the sender’s email address in the MAIL FROM command |
|
smtp |
rcpt_to |
string |
the recipient’s email address in the RCPT TO command |
9.2.2.41. SNMP category
Level 1 |
Level 2 |
Data type |
Description |
Value or example |
---|---|---|---|---|
snmp |
community |
string |
"" |
|
snmp |
pdu_type |
string |
"set_request" |
|
snmp |
vars |
string |
[
"1.3.6.1.2.1.1.5.0"
]
|
|
snmp |
version |
numeric |
1 |
9.2.2.42. source category
Level 1 |
Level 2 |
Data type |
Description |
Value or example |
---|---|---|---|---|
source |
ip |
string |
Source IP address detected by Sigflow |
x.y.z.A" |
source |
mac |
string |
MAC address of the source network card |
xx.... |
source |
port |
numeric |
Source port detected by Sigflow |
8080 |
9.2.2.43. SSH category
Level 1 |
Level 2 |
Level 3 |
Level 4 |
Data type |
Description |
Value or example |
---|---|---|---|---|---|---|
ssh |
client |
hassh |
string |
|||
ssh |
client |
proto_version |
string |
2.0 |
||
ssh |
client |
software_version |
string |
OpenSSH_7.4p1 |
||
ssh |
server |
hassh |
hash |
string |
b12d1a1189eff264cf533361ee |
|
ssh |
server |
hassh |
string |
curve25519-sha256, ... umac-64@openssh.com,umac-128@oppenssh.com |
||
ssh |
server |
proto_version |
string |
2.0 |
||
ssh |
server |
software_version |
string |
abbix_agent |
9.2.2.44. tcp category
Level 1 |
Level 2 |
Data type |
Description |
Value or example |
---|---|---|---|---|
tcp |
ack |
boolean |
||
tcp |
fin |
boolean |
||
tcp |
psh |
boolean |
||
tcp |
rst |
boolean |
||
tcp |
syn |
boolean |
||
tcp |
tcp_flags |
string |
9.2.2.45. TFTP category
Level 1 |
Level 2 |
Data type |
Description |
Value or example |
---|---|---|---|---|
tftp |
file |
string |
rfc1350.txt |
|
tftp |
mode |
string |
"octet" |
|
tftp |
packet |
string |
"read" |
9.2.2.46. TLS category
Level 1 |
Level 2 |
Level 3 |
Level 4 |
Data type |
Value or example |
---|---|---|---|---|---|
tls |
client |
server_name |
string |
qacrcgtyzm.com |
|
tls |
ja3 |
hash |
string |
||
tls |
ja3 |
string |
string |
||
tls |
ja3s |
hash |
string |
||
tls |
ja3s |
string |
string |
||
tls |
serial |
string |
|||
tls |
server |
certificate |
chain |
string |
MIIDjBCVBAYv2NFV7jMvdyoO... |
tls |
server |
hash |
md5 |
string |
|
tls |
server |
hash |
sha1 |
string |
29:d8:c7:2d:fa:30:26:5f:92:e8:2c:e6:62:e2:40 |
tls |
server |
hash |
sha256 |
string |
|
tls |
server |
issuer |
string |
C=US, ST=USA, L=NY, O=Company Ltd, OU=office, CN=web |
|
tls |
server |
not_after |
date |
2024-08-30T15:56:58 |
|
tls |
server |
not_before |
date |
2014-09-02T15:56:58 |
|
tls |
server |
subject |
string |
C=US, ST=USA, L=NY, O=Company Ltd, OU=office, CN=web |
|
tls |
sni |
string |
|||
tls |
version |
string |
TLSv1 |
9.2.2.47. url category
Level 1 |
Level 2 |
Data type |
Description |
Value or example |
---|---|---|---|---|
url |
domain |
string |
The domain of the URL |
"tsevid-synonymi.justdanceatsea.com" |
url |
full |
string |
The full URL |
|
url |
path |
string |
The path of the URL |
/6SuCHKKkf8Sf1aFXJPqD0R6r3oEDCrbwHFm23E... |
9.2.2.48. user_agent category
Level 1 |
Level 2 |
Data type |
Description |
Value or example |
---|---|---|---|---|
user_agent |
original |
string |
The user agent of the software used |
Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0; ...) |
9.2.2.49. @timestamp category
Level 1 |
Level 2 |
Data type |
Description |
Value or example |
---|---|---|---|---|
@timestamp |
string |
Date/time when the event was generated by the source. |
2023-10-09T08:31:04.503Z |
|
@timestamp |
dest_macs |
string |