Skip to content

Network Activity events report network connection and traffic activity.

  • Category: Network Activity
  • Extends: network
  • UID: 4001

activity_id

  • Type: integer_t
  • Requirement: required
  • Values:
    • 0 - Unknown: The event activity is unknown.
    • 1 - Open: A new network connection was opened.
    • 2 - Close: The network connection was closed.
    • 3 - Reset: The network connection was abnormally terminated or closed by a middle device like firewalls.
    • 4 - Fail: The network connection failed. For example a connection timeout or no route to host.
    • 5 - Refuse: The network connection was refused. For example an attempt to connect to a server port which is not open.
    • 6 - Traffic: Network traffic report.
    • 99 - Other: The event activity is not mapped. See the activity_name attribute, which contains a data source specific value.

The normalized identifier of the activity that triggered the event.

category_uid

  • Type: integer_t
  • Requirement: required
  • Values:
    • 4 - Network Activity: Network Activity events.

The category unique identifier of the event.

class_uid

  • Type: integer_t
  • Requirement: required
  • Values:
    • 4001 - Network Activity: Network Activity events report network connection and traffic activity.

The unique identifier of a class. A Class describes the attributes available in an event.

severity_id

  • Type: integer_t
  • Requirement: required
  • Values:
    • 0 - Unknown: The event/finding severity is unknown.
    • 1 - Informational: Informational message. No action required.
    • 2 - Low: The user decides if action is needed.
    • 3 - Medium: Action is required but the situation is not serious at this time.
    • 4 - High: Action is required immediately.
    • 5 - Critical: Action is required immediately and the scope is broad.
    • 6 - Fatal: An error occurred but it is too late to take remedial action.
    • 99 - Other: The event/finding severity is not mapped. See the severity attribute, which contains a data source specific value.

The normalized identifier of the event/finding severity.The normalized severity is a measurement the effort and expense required to manage and resolve an event or incident. Smaller numerical values represent lower impact events, and larger numerical values represent higher impact events.

type_uid

  • Type: long_t
  • Requirement: required
  • Values:
    • 400100 - Network Activity: Unknown
    • 400101 - Network Activity: Open: A new network connection was opened.
    • 400102 - Network Activity: Close: The network connection was closed.
    • 400103 - Network Activity: Reset: The network connection was abnormally terminated or closed by a middle device like firewalls.
    • 400104 - Network Activity: Fail: The network connection failed. For example a connection timeout or no route to host.
    • 400105 - Network Activity: Refuse: The network connection was refused. For example an attempt to connect to a server port which is not open.
    • 400106 - Network Activity: Traffic: Network traffic report.
    • 400199 - Network Activity: Other

The event/finding type ID. It identifies the event’s semantics and structure. The value is calculated by the logging system as: class_uid * 100 + activity_id.

activity_name

  • Type: string_t
  • Requirement: optional

The event activity name, as defined by the activity_id.

category_name

  • Type: string_t
  • Requirement: optional

The event category name, as defined by category_uid value: Network Activity.

class_name

  • Type: string_t
  • Requirement: optional

The event class name, as defined by class_uid value: Network Activity.

severity

  • Type: string_t
  • Requirement: optional

The event/finding severity, normalized to the caption of the severity_id value. In the case of ‘Other’, it is defined by the source.

type_name

  • Type: string_t
  • Requirement: optional

The event/finding type name, as defined by the type_uid.

metadata

The metadata associated with the event or a finding.

proxy_connection_info network_proxy

The connection information from the proxy server to the remote server.

proxy_tls network_proxy

  • Type: tls
  • Requirement: recommended

The TLS protocol negotiated between the proxy server and the remote server.

proxy_traffic network_proxy

The network traffic refers to the amount of data moving across a network, from proxy to remote server at a given point of time.

api cloud

  • Type: api
  • Requirement: optional

Describes details about a typical API (Application Programming Interface) call.

app_name

  • Type: string_t
  • Requirement: optional

The name of the application that is associated with the event or object.

enrichments

The additional information from an external data source, which is associated with the event or a finding. For example add location information for the IP address in the DNS answers:[{"name": "answers.ip", "value": "92.24.47.250", "type": "location", "data": {"city": "Socotra", "continent": "Asia", "coordinates": [-25.4153, 17.0743], "country": "YE", "desc": "Yemen"}}]

proxy_endpoint network_proxy

The proxy (server) in a network connection.

proxy_http_request network_proxy

The HTTP Request from the proxy server to the remote server.

proxy_http_response network_proxy

The HTTP Response from the remote server to the proxy server.

raw_data

  • Type: string_t
  • Requirement: optional

The raw event/finding data as received from the source.

unmapped

  • Type: object
  • Requirement: optional

The attributes that are not mapped to the event schema. The names and values of those attributes are specific to the event source.

time

  • Type: timestamp_t
  • Requirement: required

The normalized event occurrence time or the finding creation time.

timezone_offset

  • Type: integer_t
  • Requirement: recommended

The number of minutes that the reported event time is ahead or behind UTC, in the range -1,080 to +1,080.

count

  • Type: integer_t
  • Requirement: optional

The number of times that events in the same logical group occurred during the event Start Time to End Time period.

duration

  • Type: integer_t
  • Requirement: optional

The event duration or aggregate time, the amount of time the event covers from start_time to end_time in milliseconds.

end_time

  • Type: timestamp_t
  • Requirement: optional

The end time of a time period, or the time of the most recent event included in the aggregate event.

end_time_dt datetime

  • Type: datetime_t
  • Requirement: optional

The end time of a time period, or the time of the most recent event included in the aggregate event.

start_time

  • Type: timestamp_t
  • Requirement: optional

The start time of a time period, or the time of the least recent event included in the aggregate event.

start_time_dt datetime

  • Type: datetime_t
  • Requirement: optional

The start time of a time period, or the time of the least recent event included in the aggregate event.

time_dt datetime

  • Type: datetime_t
  • Requirement: optional

The normalized event occurrence time or the finding creation time.

action_id security_control

  • Type: integer_t
  • Requirement: required
  • Values:
    • 0 - Unknown: The action was unknown. The disposition_id attribute may still be set to a non-unknown value, for example ‘Count’, ‘Uncorrected’, ‘Isolated’, ‘Quarantined’ or ‘Exonerated’.
    • 1 - Allowed: The activity was allowed. The disposition_id attribute should be set to a value that conforms to this action, for example ‘Allowed’, ‘Approved’, ‘Delayed’, ‘No Action’, ‘Count’ etc.
    • 2 - Denied: The attempted activity was denied. The disposition_id attribute should be set to a value that conforms to this action, for example ‘Blocked’, ‘Rejected’, ‘Quarantined’, ‘Isolated’, ‘Dropped’, ‘Access Revoked, etc.
    • 99 - Other: The action was not mapped. See the action attribute, which contains a data source specific value.

The action taken by a control or other policy-based system leading to an outcome or disposition. Dispositions conform to an action of 1 ‘Allowed’ or 2 ‘Denied’ in most cases. Note that 99 ‘Other’ is not an option. No action would equate to 1 ‘Allowed’. An unknown action may still correspond to a known disposition. Refer to disposition_id for the outcome of the action.

cloud cloud

  • Type: cloud
  • Requirement: required

Describes details about the Cloud environment where the event was originally created or logged.

dst_endpoint

The responder (server) in a network connection.

src_endpoint

The initiator (client) of the network connection.

connection_info

The network connection information.

device host

  • Type: device
  • Requirement: recommended

An addressable device, computer system or host.

disposition_id security_control

  • Type: integer_t
  • Requirement: recommended
  • Values:
    • 0 - Unknown: The disposition was not known.
    • 1 - Allowed: Granted access or allowed the action to the protected resource.
    • 2 - Blocked: Denied access or blocked the action to the protected resource.
    • 3 - Quarantined: A suspicious file or other content was moved to a benign location.
    • 4 - Isolated: A session was isolated on the network or within a browser.
    • 5 - Deleted: A file or other content was deleted.
    • 6 - Dropped: The request was detected as a threat and resulted in the connection being dropped.
    • 7 - Custom Action: A custom action was executed such as running of a command script. Use the message attribute of the base class for details.
    • 8 - Approved: A request or submission was approved. For example, when a form was properly filled out and submitted. This is distinct from 1 ‘Allowed’.
    • 9 - Restored: A quarantined file or other content was restored to its original location.
    • 10 - Exonerated: A suspicious or risky entity was deemed to no longer be suspicious (re-scored).
    • 11 - Corrected: A corrupt file or configuration was corrected.
    • 12 - Partially Corrected: A corrupt file or configuration was partially corrected.
    • 13 - Uncorrected: A corrupt file or configuration was not corrected.
    • 14 - Delayed: An operation was delayed, for example if a restart was required to finish the operation.
    • 15 - Detected: Suspicious activity or a policy violation was detected without further action.
    • 16 - No Action: The outcome of an operation had no action taken.
    • 17 - Logged: The operation or action was logged without further action.
    • 18 - Tagged: A file or other entity was marked with extended attributes.
    • 19 - Alert: The request or activity was detected as a threat and resulted in a notification but request was not blocked.
    • 20 - Count: Counted the request or activity but did not determine whether to allow it or block it.
    • 21 - Reset: The request was detected as a threat and resulted in the connection being reset.
    • 22 - Captcha: Required the end user to solve a CAPTCHA puzzle to prove that a human being is sending the request.
    • 23 - Challenge: Ran a silent challenge that required the client session to verify that it’s a browser, and not a bot.
    • 24 - Access Revoked: The requestor’s access has been revoked due to security policy enforcements. Note: use the Host profile if the User or Actor requestor is not present in the event class.
    • 25 - Rejected: A request or submission was rejected. For example, when a form was improperly filled out and submitted. This is distinct from 2 ‘Blocked’.
    • 26 - Unauthorized: An attempt to access a resource was denied due to an authorization check that failed. This is a more specific disposition than 2 ‘Blocked’ and can be complemented with the authorizations attribute for more detail.
    • 27 - Error: An error occurred during the processing of the activity or request. Use the message attribute of the base class for details.
    • 99 - Other: The disposition is not listed. The disposition attribute should be populated with a source specific caption.

Describes the outcome or action taken by a security control, such as access control checks, malware detections or various types of policy violations.

load_balancer load_balancer

The Load Balancer object contains information related to the device that is distributing incoming traffic to specified destinations.

message

  • Type: string_t
  • Requirement: recommended

The description of the event/finding, as defined by the source.

status_id

  • Type: integer_t
  • Requirement: recommended
  • Values:
    • 0 - Unknown: The status is unknown.
    • 1 - Success
    • 2 - Failure
    • 99 - Other: The event status is not mapped. See the status attribute, which contains a data source specific value.

The normalized identifier of the event status.

action security_control

  • Type: string_t
  • Requirement: optional

The normalized caption of action_id.

actor host

  • Type: actor
  • Requirement: optional

The actor object describes details about the user/role/process that was the source of the activity.

attacks security_control

  • Type: attack
  • Requirement: optional

An array of MITRE ATT&CK® objects describing the tactics, techniques & sub-techniques identified by a security control or finding.

authorizations security_control

Provides details about an authorization, such as authorization outcome, and any associated policies related to the activity/event.

disposition security_control

  • Type: string_t
  • Requirement: optional

The disposition name, normalized to the caption of the disposition_id value. In the case of ‘Other’, it is defined by the event source.

firewall_rule security_control

The firewall rule that triggered the event.

malware security_control

  • Type: malware
  • Requirement: optional

A list of Malware objects, describing details about the identified malware.

observables

The observables associated with the event or a finding.

proxy

The proxy (server) in a network connection.

status

  • Type: string_t
  • Requirement: optional

The event status, normalized to the caption of the status_id value. In the case of ‘Other’, it is defined by the event source.

status_code

  • Type: string_t
  • Requirement: optional

The event status code, as reported by the event source.

For example, in a Windows Failed Authentication event, this would be the value of ‘Failure Code’, e.g. 0x18.

status_detail

  • Type: string_t
  • Requirement: optional

The status details contains additional information about the event/finding outcome.

tls

  • Type: tls
  • Requirement: optional

The Transport Layer Security (TLS) attributes.

traffic

The network traffic refers to the amount of data moving across a network at a given point of time. Intended to be used alongside Network Connection.

url

  • Type: url
  • Requirement: optional

The URL details relevant to the network traffic.