Skip to main content
Version: 6.0

Domain Data Model

Attention!

To ensure compatibility and consistency, data is aligned to ECS (Elastic Common Schema). Additional fields that start with a capital letter are also used. These fields are not part of ECS, but are required to enrich information for this IoC type.

The fields below must be present in index documents that describe indicators of compromise (IoC).


Categorization

FieldDescription
event.categoryHigh-level event category (must be threat).
event.typeEvent type within the category (must be indicator).
event.risk_scoreNumeric risk score assigned by the log provider (0 to 100).

Main Information

FieldDescription
threat.indicator.nameIndicator of compromise. Main field used for matching.
threat.indicator.typeIndicator type.
threat.indicator.domainFully qualified domain name (FQDN). Can duplicate name.
Threat.indicator.tldTop-level domain.

Scoring and Classification

FieldDescription
Threat.indicator.severitySeverity score from SIEM (for example: Low, Medium, High).
threat.indicator.confidenceConfidence score from the IoC provider (for example: Low, Medium, High).
Threat.indicator.risk_scoreNumeric risk score calculated by SIEM (event.risk_score / 10).
Threat.indicator.categoryThreat category associated with the IoC (for example: phishing, C2, malware).
event.providerThreat intelligence data provider (for example: ThreatFox, CTT).
threat.indicator.providerAlternative field for IoC source/provider.

Enrichment and Context

FieldDescription
Threat.indicator.resolved.registrantDomain registrant (owner).
Threat.indicator.resolved.registrarDomain registrar.
threat.indicator.descriptionText description or additional threat details.
tagsTag list.
Threat.indicator.blacklistsBlacklists where this IoC was observed.

Malware Information

FieldDescription
Threat.indicator.malware.nameMalware family name (for example: Emotet, Qakbot).
Threat.indicator.malware.printableMalware strain/variant label.

Time Attributes

FieldDescription
threat.indicator.first_seenDate and time when the IoC was first observed by the provider.
threat.indicator.last_seenDate and time of the latest IoC update.
Threat.indicator.lifetimeIndicator lifetime.

False Positive Handling

FieldDescription
Threat.indicator.fp.alarmFlag indicating a potential false positive.
Threat.indicator.fp.descriptionDescription of why the IoC can be a false positive.

Data Model for Correlation

The fields below must be present in index documents that describe user network interactions. For all such sources containing this data, add the alias: sm_threat_intelligence_alerts_domain.

Network Information

FieldDescription
network.transportTransport protocol (for example: tcp, udp).
network.typeNetwork type (for example: ipv4, ipv6).
source.ipSource IP address.
source.portSource port.
destination.addressDestination address checked against the IoC database.
destination.ipDestination IP address.
destination.portDestination port.

Observer Information

FieldDescription
observer.productProduct that generated the event (for example: Cisco ASA, Kaspersky Security Center).
observer.typeObserver type (for example: firewall, antivirus, proxy).
observer.hostnameHostname of the observing device.

Participant Information

FieldDescription
host.hostnameHostname where the event occurred.
user.nameUsername that initiated the action.