Skip to main content

Appendix

Log Format Standards

ASIM

The Advanced Security Information Model is a layer between the data and the user to configure what and how to ingest data from a source and to route it to a destination. ASIM provides standardization for security-focused log data.

Available ASIM tables:

  • ASimAuditEventLogs
  • ASimAuthenticationEventLogs
  • ASimDhcpEventLogs
  • ASimDnsActivityLogs
  • ASimFileEventLogs
  • ASimNetworkSessionLogs
  • ASimProcessEventLogs
  • ASimRegistryEventLogs
  • ASimUserManagementActivityLogs

CEF

The Common Event Format is a standardized security event logging layout. Its creator is ArcSight, and it has been widely adopted by the industry. Features include:

  • Standard header with 7 required fields
  • Extensible key-value pair extension format
  • Header fields include: version, device vendor, device product, device version, signature ID, name, and severity
  • Extension fields use a key=value format

CIM

The Common Information Model (CIM) is a standardized data model developed by Splunk. It provides:

Common Fields:

Field CategoryFieldsDescription
Base Fieldssource, sourcetype, timestamp, host, indexCore fields for event identification and source tracking
Identity Fieldsuser, src_user, dest_userUser identification and authentication tracking
Network Fieldssrc_ip, dest_ip, src_port, dest_portNetwork communication endpoints

Data Models:

Model TypeFieldsPurpose
Authenticationaction, app, status, auth_methodTrack authentication events and access control
Network Trafficbytes, protocol, direction, tcp_flagsMonitor network communications and traffic patterns
Vulnerabilityseverity, signature, vulnerability_idTrack security vulnerabilities and risks
Changes-Track system and configuration changes
Intrusion Detection-Monitor security threats and intrusions

Event Categories:

CategoryEvent TypesDescription
Authenticationsuccess, failure, logoutAuthentication-related events and outcomes
Networkconnection, alert, trafficNetwork activity and communications
Systemchange, status, errorSystem-level events and status changes
Security-Security-related events and alerts

ECS

Elastic Common Schema (ECS) is a specification that defines a common set of fields for ingesting data into Elasticsearch. Field groups include:

Field GroupCore FieldsDescription
Base Fields@timestamp, tags, labels, messageUniversal fields that appear in every event
Hosthost.name, host.ip, host.os.*, host.macInformation about the host machine
Networknetwork.protocol, network.type, network.direction, network.bytesNetwork activity details
Source/Destinationsource.ip, source.port, dest.ip, dest.portCommunication endpoint information
Useruser.id, user.name, user.domain, user.emailUser-related information
Eventevent.category, event.type, event.action, event.outcomeEvent classification details
Filefile.path, file.size, file.type, file.hash.*File-related information
Processprocess.pid, process.name, process.args, process.parent.*Process execution details
Errorerror.code, error.message, error.type, error.stack_traceError-related information
Tracetrace.id, span.id, transaction.idDistributed tracing data

eStreamer

Cisco's event streaming protocol used by Firepower Management Center (FMC) to send events to export security event data, intrusion alerts, connection logs, and other network telemetry in real-time. It enables integration with external SIEMs and analytics platforms, providing deep visibility into network security events.

FieldDescription
eventTypeType of event (e.g., intrusion, connection, malware)
timestampTime the event occurred
sourceIPSource IP address
destinationIPDestination IP address
sourcePortSource port number
destinationPortDestination port number
protocolTransport protocol (TCP, UDP, etc.)
userIdentityAssociated user (if available)
deviceUUIDUnique identifier for the source device
applicationDetected application (e.g., HTTP, SSH)
threatScoreSeverity or risk rating of the event
signatureIDIdentifier for the security rule triggered
signatureNameDescription of the triggered security rule
malwareSHA256Hash of detected malware (if applicable)
fileNameName of the file involved in the event

eStreamer provides detailed security telemetry and integrates with SIEMs for real-time threat monitoring and forensic analysis.

IPFIX

The IP Flow Information Export is an IETF-standardized protocol for exporting flow-based traffic data from routers, switches, and other network devices. It is an evolution of NetFlow, offering greater flexibility by supporting custom fields and templates for diverse network monitoring, security, and analytics applications. IPFIX allows vendors to define and export additional data types beyond traditional NetFlow fields.

FieldDescription
sourceIPv4AddressSource IP address (IPv4)
destinationIPv4AddressDestination IP address (IPv4)
sourceIPv6AddressSource IP address (IPv6)
destinationIPv6AddressDestination IP address (IPv6)
sourceTransportPortSource port number
destinationTransportPortDestination port number
protocolIdentifierTransport protocol (TCP, UDP, etc.)
packetTotalCountNumber of packets in the flow
octetTotalCountTotal bytes transferred
flowStartMillisecondsStart timestamp in milliseconds
flowEndMillisecondsEnd timestamp in milliseconds
tcpControlBitsTCP control tcp_flags
ipClassOfServiceType of Service (QoS marking)
bgpSourceAsNumberSource BGP Autonomous System (AS) number
bgpDestinationAsNumberDestination BGP AS number
flowEndReasonReason the flow ended (e.g. timeout, TCP FIN)

IPFIX extends NetFlow by supporting variable-length fields and user-defined templates, making it highly adaptable for modern network monitoring needs.

LEEF

The Log Event Extended Format is an enterprise security event logging format created by IBM QRadar.

Features:

  • Lightweight parsing requirements
  • Fixed header fields: version, vendor, product, version, eventID
  • Variable attributes section
  • Optimized for SIEM processing

NetFlow

A network protocol developed by Cisco for collecting, analyzing, and monitoring network traffic. It captures metadata about IP traffic flows, providing insights into bandwidth usage, security threats, and network performance. NetFlow records include key details such as source and destination IPs, ports, protocol types, and timestamps.

FieldDescription
SrcAddrSource IP address
DstAddrDestination IP address
SrcPortSource port number
DstPortDestination port number
ProtocolTransport protocol (TCP, UDP, etc.)
PacketsNumber of packets in the flow
BytesTotal bytes transferred
StartTimeTimestamp of the first packet in the flow
EndTimeTimestamp of the last packet in the flow
SrcASSource Autonomous System (AS) number
DstASDestination Autonomous System (AS) number
TCPFlagsTCP control flags for the flow
ToSType of Service (QoS marking)
NextHopIP address of the next hop router
FlowDurationDuration of the flow in milliseconds

This is a general overview; actual fields may vary depending on the versions and implementations.

sFlow

sFlow (Sampled Flow) is a network monitoring protocol designed for high-speed networks. Unlike NetFlow and IPFIX, which capture complete flow records, sFlow uses packet sampling to provide scalable and efficient traffic analysis. It operates by embedding monitoring agents in network devices that randomly sample packets and send them to a central collector for analysis.

FieldDescription
sampleSequenceNumberUnique identifier for the sampled packet
sourceIPSource IP address
destinationIPDestination IP address
sourcePortSource port number
destinationPortDestination port number
protocolTransport protocol (TCP, UDP, etc.)
sampledPacketSizeSize of the sampled packet in bytes
inputInterfaceInterface where the packet was received
outputInterfaceInterface where the packet was forwarded
vlanIDVLAN identifier of the packet
tcpFlagsTCP control flags
flowSampleTypeType of sampling (e.g., packet, counter)
samplingRateRatio of sampled packets to total packets
agentAddressIP address of the device performing sampling
collectorAddressIP address of the sFlow collector

sFlow's lightweight sampling approach makes it ideal for real-time traffic monitoring in large-scale, high-speed networks.

Pattern Matching

Grok Patterns

Common patterns used in log processing:

CategoryPatterns
GeneralDATA GREEDYDATA NOTSPACE SPACE WORD
NumericBASE10NUM INT NUMBER
NetworkingHOSTNAME IP IPV4 IPV6 MAC
Data and TimeDATESTAMP DATESTAMP_RFC822 TIMESTAMP_ISO8601
File SystemFILENAME PATH
HTTPHTTPDATE HTTPDERRORLOG HTTPDUSER
SystemSYSLOGBASE SYSLOGHOST SYSLOGTIMESTAMP
OtherEMAILADDRESS URIPARAM URIPATH UUID

Metadata Tags

Common metadata fields used in log processing:

FieldSubfields
_ingeston_failure_processor_tag on_failure_processor_type
_tempobserver.mac
destinationbytes domain ip nat.port port user.domain name
emailfrom.address to.address
eventcategory kind original outcome type
sourcebytes ip user.domain group.name id xlatesrc
observerproduct type vendor
relatedhash ip

File Formats

Parquet Files

Apache Parquet is a column-oriented storage format designed for efficiency:

Row-based storage (traditional):

id,name,last_name,age
1,John,Buck,35
2,Jane,Doe,27
3,Joe,Dane,42

Column-based Storage (Parquet):

id:1,2,3
name:John,Jane,Joe
last_name:Buck,Doe,Dane
age:35,27,42

Key features:

  • Dictionary encoding
  • Compressing and bit packing
  • Run-length encoding
  • Optimal for columnar queries

PEM Files

Privacy Enhanced Mail (PEM) files are used for storing cryptographic keys and certificates:

-----BEGIN CERTIFICATE-----
MIIHzTCCBbWgAwIBAgIQaBYE3/M08XHYCnNVmcFBcjANBgkqhkiG9w0BAQsFADBy
...
-----END CERTIFICATE-----

Common uses:

  • SSL/TLS certificates
  • SSH keys
  • RSA private keys
  • Certificate chains

File characteristics:

  • Base64-encoded content
  • Begin/end markers
  • Can contain multiple certificates/keys
  • Text-based format

Protocols

Syslog

Standard protocol for system logging with severity levels:

LevelSeverityDescription
0EmergencySystem unusable
1AlertImmediate action required
2CriticalCondition critical
3ErrorErrors exist
4WarningWarnings exist
5NoticeSignificant condition
6InfoInfo messages
7DebugDebug messages

The protocol is used for:

  • System monitoring
  • Security event logging
  • Compliance tracking
  • Performance monitoring