event
Contents
event¶
Event attributes used to define/normalize specific metadata of the event itself. This also includes information about the host where the event was originally generated. In scenarios where an event is forwarded (Windows Event Forwarding, Syslog, etc), the ETL entity must be used.
Attributes¶
Name |
Type |
Description |
Sample Value |
---|---|---|---|
event_category_type |
string |
A description of the event, which can help with categorization. If the vendor defines a category/grouping for its log. i.e. Zeek has a few category types for its many logs (network-protocols, network-observations, etc…). Example. sysmon event id 12 is EventType field is this. |
|
event_category_type |
string |
If the event contains a category, then this it. i.e For the Windows Security channel, this could be something such as Audit object access. For Zeek conn.log, this would be network-protocols. |
|
event_count |
integer |
The number of aggregated events, if applicable |
|
event_creation_time |
datetime |
original time when event/log was created as reported from the log source itself |
|
event_duration |
float |
The length/duration of the event in seconds (e.g., 1 min is 60.0) |
|
event_end_time |
datetime |
The time in which the event ended |
|
event_error |
string |
Information about an error |
|
event_error_code |
integer |
Integer that defines a particular error |
|
event_id |
integer |
event identifier for specific event logs. Event ids might repeat across different data sources. This is most common in Windows using EventID |
|
event_message |
string |
A general message or description, either included in, or generated from the record |
|
event_original_message |
string |
The (original) log message from the source before any ETL manipulations/modifications |
|
event_original_time |
datetime |
original time when event/log was created as reported from the log source itself. |
|
event_original_uid |
string |
Original unique ID specific to the log/event as recorded from the source. |
|
event_product |
string |
The product generating the event. Vendor and product might be the same for some data sources. |
|
event_product_version |
string |
The version of the product generating the event |
|
event_recorded_time |
datetime |
The time the log was recorded on disk or data plane or if there is another timestamp with the log (common scenario if there is a a manager of many devices or the log itself tracks log time and log written/recorded time) (e.g., 1 min is 60.0). |
|
event_report_url |
string |
url of the full analysis report, if applicable |
|
event_resource_group |
string |
The resource group to which the device generating the record belongs. This might be an AWS account, or an Azure subscription or Resource Group |
|
event_resource_id |
string |
The resource ID of the device generating the message. |
|
event_result |
string |
The result reported for the activity. Empty value when not applicable |
|
event_result_details |
string |
Reason or details for the result reported in event_result |
|
event_schema_version |
string |
Azure Sentinel Schema Version |
|
event_severity |
string |
The severity of the event as defined manually or usually via the original log, commonly this would be syslog severity. The number codes should be converted to their corresponding string value. |
|
event_start_time |
datetime |
The time in which the event stated |
|
event_status |
string |
Defines the status of a particular event |
|
event_status_code |
integer |
Integer that defines a particular status |
|
event_sub_category_type |
string |
If the event contains a sub-category, then this it. i.e For the Windows Security channel, this could be something such as Audit Registry. |
|
event_sub_status |
string |
Additional status information |
|
event_sub_status_code |
integer |
Integer that defines a particular event_sub_status |
|
event_sub_type |
string |
If there are subsets of an event log type, this field carries the next level value. i.e For windows, it would be the Security channel. |
|
event_time_ingested |
datetime |
The time the event was ingested to SIEM or data pipeline. |
|
event_timestamp |
datetime |
The most accurate timestamp of the log. Commonly this will be the original reporting timestamp from the log. However, if you believe the log timestamp has been altered or skewed (ie: either due to timezone issues or NTP skew)then replace this field with the most likely timestamp. Always keep the original log timestamp in the field creation_timestamp |
|
event_timezone |
string |
Timezone of the event if it can be determined. Format such as UTC, UTC+1, UTC-5, etc… |
|
event_type |
string |
Type of event being collected. i.e For Windows it would be the Event Provider (Microsoft-Windows-Security-Auditing). I.e. Paloalto, it would be the type of event such as Traffic or Threat. I.e. Zeek Logs, one example could be the conn.log. |
|
event_type_detailed |
string |
Additional description of type if applicable |
```````` |
event_uid |
string |
Original unique ID specific to the log/event assigned to the event (not original). |
|
event_vendor |
string |
The vendor of the product generating the event |
|