Skip to main content
Version: 5.3

IP Data Model

Attention!

To ensure compatibility and consistency, data is aligned to ECS (Elastic Common Schema). Additional fields that start with a capital letter are also used. These fields are not part of ECS, but are required to enrich information for this IoC type.

The fields below must be present in index documents that describe indicators of compromise (IoC).

Main Information

FieldDescription
threat.indicator.nameIP address used as an indicator of compromise. Main field for matching.
event.providerThreat data provider.
threat.indicator.typeIndicator type. In this case, ipv4-addr.
threat.indicator.providerIoC source/provider.

Scoring and Classification

FieldDescription
Threat.indicator.categoryThreat category associated with the IoC (for example, C2, Scanner, Phishing).
threat.indicator.confidenceConfidence level from the IoC provider (for example: Low, Medium, High).
Threat.indicator.severitySeverity score from SIEM (for example: Low, Medium, High).
event.risk_scoreRisk score assigned by the IoC provider (0 to 100).
Threat.indicator.risk_scoreNumeric risk score calculated by SIEM (event.risk_score / 10).

Context and Enrichment

FieldDescription
threat.indicator.descriptionText description or additional threat details.
tagsList of tags or related vulnerabilities.
Threat.indicator.blacklistsBlacklists where this IoC was observed.
threat.indicator.geo.country_nameCountry associated with the IP address.
threat.indicator.geo.cityCity associated with the IP address.
threat.indicator.geo.latitudeGeographical latitude of the IP address.
threat.indicator.geo.longitudeGeographical longitude of the IP address.

Time Attributes

FieldDescription
threat.indicator.last_seenDate and time of the latest IoC update.
threat.indicator.first_seenDate and time when the IoC was first observed by the provider.
Threat.indicator.lifetimeIndicator lifetime.

False Positive Handling

FieldDescription
Threat.indicator.fp.alarmFlag indicating a potential false positive.
Threat.indicator.fp.descriptionDescription of why the IoC can be a false positive.

Data Model for Correlation

The fields below must be present in index documents that describe user network interactions. For all such sources containing this data, add the alias: sm_threat_intelligence_alerts_ip.

Observer Information

FieldDescription
observer.productProduct that generated the event (for example, Cisco ASA).
observer.typeObserver type (for example, firewall).

Network Information

FieldDescription
network.typeNetwork type (for example, ipv4, ipv6).
network.transportTransport protocol (for example, tcp, udp).
destination.addressDestination address (domain or IP) checked against the IoC database.
destination.ipDestination IP address. Key field for correlation.
destination.portDestination port.
source.ipSource IP address.

Participant Information

FieldDescription
user.nameUsername that initiated the action.
host.hostnameHostname where the event occurred.