Skip to main content
Version: 5.3

URL Data Model

Attention!

To ensure compatibility and consistency, data is aligned to ECS (Elastic Common Schema). Additional fields that start with a capital letter are also used. These fields are not part of ECS, but are required to enrich information for this IoC type.

The fields below must be present in index documents that describe indicators of compromise (IoC).


Main Information

FieldDescription
threat.indicator.nameFull URL used as an indicator of compromise. Main field for matching.
event.providerThreat data provider.
threat.indicator.typeIndicator type. In this case, url.
threat.indicator.url.domainDomain extracted from the URL.
threat.indicator.providerIoC source/provider.

Scoring and Classification

FieldDescription
Threat.indicator.categoryThreat category associated with the IoC (for example: phishing, malware_distribution).
threat.indicator.confidenceConfidence level from the IoC provider (for example: Low, Medium, High).
Threat.indicator.severitySeverity score from SIEM (for example: Low, Medium, High).
event.risk_scoreRisk score assigned by the IoC provider (0 to 100).
Threat.indicator.risk_scoreNumeric risk score calculated by SIEM (event.risk_score / 10).

Malware Information

FieldDescription
Threat.indicator.malware.nameMalware family name associated with the URL.
Threat.indicator.malware.printableMalware strain/variant label.

Context and Enrichment

FieldDescription
threat.indicator.descriptionText description or additional threat details.
tagsList of tags or related vulnerabilities.
Threat.indicator.blacklistsBlacklists where this IoC was observed.

Time Attributes

FieldDescription
threat.indicator.last_seenDate and time of the latest IoC update.
threat.indicator.first_seenDate and time when the IoC was first observed by the provider.
Threat.indicator.lifetimeIndicator lifetime.

False Positive Handling

FieldDescription
Threat.indicator.fp.alarmFlag indicating a potential false positive.
Threat.indicator.fp.descriptionDescription of why the IoC can be a false positive.

Data Model for Correlation

The fields below must be present in index documents that describe user network interactions. For all such sources containing this data, add the alias: sm_threat_intelligence_alerts_url.


Event Categorization

FieldDescription
Access.Control.rule.ActionAction taken by the access control system (for example: Block)

Network Information

FieldDescription
url.originalFull URL that was accessed. Key field for correlation.
network.transportTransport protocol (for example, tcp).
source.ipSource IP address.
source.portSource port.
destination.ipDestination IP address.
destination.portDestination port.

Participant Information

FieldDescription
user.nameUsername that initiated the action.
host.nameHostname from which access was made.