Fields in the Events Received by Cytomic Orion
This table lists all the fields included in the events stored by Cytomic Orion along with their meaning, data types, and possible values in the case of enumerations.
Field | Description | Field Type |
---|---|---|
Client ID. |
Character string |
|
accesstype |
File access mask:
For all other operations: |
Bitmask |
accnube |
The agent installed on the client’s computer can access the Cytomic cloud. |
Boolean |
action |
Type of action taken by the Cytomic EDR or Cytomic EPDR agent, by the user, or by the affected process:
|
Enumeration |
actiontype |
Indicates the session type:
|
Enumeration |
Cytomic EDR or Cytomic EPDR advanced security policy settings. |
Character string |
|
age |
Date the file was last modified. |
Date |
alertdatetime |
UTC date when the event that triggered the indicator occurred on the client’s computer. Information regarding the time is included. To understand this field, see pandatimestatus. |
Date |
alprotocoldetected |
Application level protocol detected in the connection or one of these values:
|
Enumeration |
alprotocolexpected |
Application level protocol expected according to the connection port or one of these values:
|
Enumeration |
analysistime |
Time elapsed analyzing the file. |
Character string |
Identifier of the device that connected to a computer protected by Endpoint Access Enforcement. |
Character string |
|
blockreason |
Reason for the pop-up message displayed on the computer:
|
Enumeration |
bytesreceived |
Total bytes received by the monitored process. |
Numeric value |
bytessent |
Total bytes sent by the monitored process. |
Numeric value |
callstack |
See childfilesize. |
Numeric value |
Attributes of the child process:
|
Enumeration |
|
childattmask |
See childattributes. | |
childblake |
Blake2 signature of the child file. |
Character string |
childclassification |
Classification of the child process that performed the logged action.
|
Enumeration |
childdrive |
||
childfilename |
Child process name. |
Character string |
Size of the child file logged by the agent. |
Numeric value |
|
childfiletime |
Date of the child file logged by the agent. |
Date |
Date the file was first seen. |
Date |
|
childmd5 |
Child file hash. |
Character string |
childpath |
Path of the child file that performed the logged operation. |
Character string |
ChildPID |
Child process ID. |
Numeric value |
SHA256 signature of the child process that performed the operation. |
Character string |
|
childstatus |
Child process status.
|
Enumeration |
childurl |
File download URL. See url. |
Character string |
ciphertype |
Scan of the SSL/TLS protocol and its HTTPS characteristics (for example TLS_RSA_WITH_AES_128_GCM_SHA256). |
Character string |
classname |
Type of device where the process resides. It corresponds to the class specified in the .INF file associated with the device. |
Character string |
Command line configured as a task to be run through WMI. |
Character string |
|
confadvancedrules |
See advancedrulesconf. |
Character string |
configservicelevel |
Agent execution mode configuration. This can be temporarily different from the execution mode in progress. See servicelevel |
Enumeration |
configstring |
See extendedinfo. |
Character string |
connectionstate |
Connection status notified.
|
Enumeration |
contentencoding |
Encoding used in the content of the HTTP connection. See https://www.iana.org/assignments/http-parameters/http-parameters.xml |
Character string |
copy |
Name of the service that triggered the event. |
Character string |
Unique name of the object within the WMI hierarchy. |
Character string |
|
date |
UTC date when the event occurred on the client’s computer. No information regarding the time is included. To understand this field, see pandatimestatus. |
Numeric value |
datetime |
UTC date when the event occurred on the client’s computer. Information regarding the time is included. To understand this field, see pandatimestatus. |
Numeric value |
description |
See extendedinfo. |
Character string |
IP address of the target computer in a network connection scanned by Network Attack Protection. |
IP address |
|
Port of the target computer in a network connection scanned by Network Attack Protection. |
Numeric value |
|
details |
Summary in the form of a group of relevant fields from the event. eventtype 1 (ProcessOps) Contains the commandline field. eventtype 14 (Download) Contains the url field. eventtype 22 (NetworkOps) Contains the direction, ipv4status, protocol, and remoteport fields. eventtype 27 (RegistryOps) Contains the valuedata field. eventtype 31 (ScriptLaunch) Contains the commandline field. eventtype 46 (DnsOps) Contains the domainlist field. eventtype 47 (DeviceOps) Contains the devicetype field. eventtype 50 (UserNotification) Contains the parentfilename field. eventtype 52 (LoginOutOp) Contains the eventtype, sessiontype, loggeduser, remotemachinename, and remoteip fields. eventtype 99 (RemediationOps) Contains the remoteip, remotemachinename, commandline, and detectionid fields. eventtype 555 (IOA) Contains the extendedinfo field. |
Character string |
Unique identifier of the detection. |
Character string |
|
deviceid |
See attackerDeviceId. |
Numeric value |
Type of drive where the process or file that triggered the operation resides.
|
Enumeration |
|
eventtype 22 (NetworkOps): Network connection direction.
eventtype 99 (RemediationOps) - napdirection Network connection direction.
|
Enumeration |
|
See list. |
|
|
Entropy of the POST message content to classify the likelihood of data theft and extraction. |
Character string |
|
entropia |
See entropy. |
Numeric value |
errorcode |
Error code returned by the operating system when there is a failed login attempt.
|
Enumeration |
errorevent |
See extendedinfo. |
Character string |
errorstring |
See extendedinfo. |
Character string |
Event type logged by the agent.
|
Enumeration |
|
evidencedatetime |
||
exploitorigin |
Origin of the process exploit attempt.
|
Enumeration |
eventtype 1 (ProcessOps) - errorstrings: Character string with debug information on the security product settings. When the operation field of an event is set to DirCreate, CMOpened, or CMPCreat, the errorstring field acts as an event grouping counter: In any one-hour period, the first 50 events are logged individually. After the limit of 50 events in one hour is reached, additional events of the same type are grouped together and not sent until the first event of the same type is logged in a new hour period. At this point, the grouped event is sent with the errorstring field including both the grouped events and the first 50 events, and the counter is reset. eventtype 26 (DataAccess):
eventtype 27 (RegistryOps):
eventtype 40 (Detection) - infodiscard: Quarantine file internal information. eventtype 45 (SystemOps): Additional information about Type events:
eventtype 47 (DeviceOps) - description
eventtype 61 (ErrorEvents):
eventtype 99 (RemediationOps) - remediationdata: String of characters with these fields separated by *:
eventtype 555 (IOA): Details of the processes that generated the IOA. |
Character string |
|
failedqueries |
Number of failed DNS resolution requests sent by the process in the last hour. |
Numeric value |
firstseen |
See childfirstseen |
Date |
friendlyname |
An easily readable device name. |
Character string |
guidrule |
See ruleid. |
|
headerhttp |
HTTP header dump when the security software detects communications that use HTTP tunnels. This field shows information only if the security software Audit mode is enabled. |
Character string |
hostname |
Character string |
|
huntingruleid |
See ruleid. |
Character string |
huntingrulemitre |
TTPs associated with the hunting rule. |
Character string |
huntingrulemode |
Indicates whether the rule is enabled in the Threat Engine to generate indicators. |
Boolean |
huntingrulename |
Name of the cyberattack radar rule that detected the indicator. |
Character string |
huntingruleseverity |
Severity of the impact of the indicator generated by the hunting rule:
|
Enumeration |
huntingruletype |
Type of hunting rule.
|
Enumeration |
idname |
Device name. |
Character string |
indicatortimestamp |
See ioatimestamp. |
Date |
infodiscard |
See extendedinfo. |
Character string |
initialdomain |
See url. |
Character string |
insertiondatetime |
Date in UTC format at the time the Cytomic Orion servers logged the event sent by the computer. This date is always later than the other dates because the events are queued to be processed. |
Date |
Indicates whether the login is an interactive login. |
Binary value |
|
IOAId |
Indicator ID. |
Character string |
IOAIds |
When a sequence of events follows a pattern described in the MITRE matrix, Cytomic Orion creates an indicator (IOA) and adds the indicator ID to all the events related to it. |
Numeric value |
UTC date in epoch format (number of seconds elapsed since 1 January 1970) at the time the last event that triggered the indicator occurred. |
Date |
|
IP address type:
|
Enumeration |
|
isdestinationipv6 |
||
isdenied |
Indicates whether the reported action was denied. |
Binary value |
islocal |
Indicates whether the task was created on the local computer or on a remote computer. |
Binary value |
islocalipv6 |
Indicates whether the IP address is IPv6 or IPv4. |
Boolean |
isremoteipv6 |
Indicates whether the IP address is IPv6 or IPv4. |
Boolean |
issessioninteractive |
See interactive. |
Binary value |
key |
Affected registry branch or key. |
Character string |
lastquery |
Last query sent to the cloud by the Cytomic EDR or Cytomic EPDR agent. |
Date |
eventtype 46 (DnsOps) - DomainList:
eventtype 99 (RemediationOps) - url:
|
Character string |
|
localdatetime |
The computer date (in UTC format) at the time the logged event occurred. This date depends on the computer settings. As a result, it can be incorrect. |
Date |
eventtype 22 (NetworkOps) - localip Contains the IP address of the computer on which the event was logged, regardless of the connection direction (direction field). See remoteip and direction. eventtype 99 (RemediationOps) - naporiginip: IP address of the source computer in a network connection scanned by Network Attack Protection. |
IP address |
|
eventtype 22 (NetworkOps) - localport Contains the port of the computer on which the event was logged or of the other end of the connection depending on the direction field:
See direction. eventtype 99 (RemediationOps) - naporiginport: Port of the source computer in a network connection scanned by Network Attack Protection. |
Numeric value |
|
The user that was logged in to the computer at the time the event was generated. |
Character string |
|
machinename |
Name of the computer that ran the process. |
Character string |
manufacturer |
Device manufacturer. |
Character string |
method |
HTTP connection method when the security software detects communications that use HTTP tunnels.
This field shows information only if the security software Audit mode is enabled. |
Numeric value |
MUID |
Internal ID of the client’s computer. |
Character string |
napattack |
Network attack direction.
|
Numeric value |
napdestinationip |
See destinationip. |
|
napdestinationport |
See destinationport. |
|
napdirection |
See direction. |
|
napoccurrences | See times. |
|
naporiginip |
See localip. |
|
naporiginport |
See localport |
|
notificationtype |
Internal use. |
Character string |
numcacheclassifiedelements |
Number of items whose classification is cached in the security software. |
Numeric value |
objectname |
See datacontanier. |
|
occurrences |
Number of grouped indicators. See Indicator Grouping |
Numeric value |
opstatus |
|
Enumeration |
opentstamp |
Date of the WMI notification for WMI_CREATEPROC (54) events. |
Bitmask |
opentimestamp |
||
eventtype 1 (ProcessOps) Type of operation performed by the process.
eventtype 45 (SystemOps) - type Type of WMI operation performed by the process.
|
Enumeration |
|
eventtype 1 (ProcessOps) - operationflags Indicates the integrity level assigned by Windows to the item. See https://learn.microsoft.com/en-us/windows/win32/secauthz/mandatory-integrity-control.
eventtype 22 (NetworkOps) - SocketOpFlags Specifies the grouping algorithm used to minimize the logging of network connections with identical source and destination IP addresses and ports. Grouping occurs over time periods. Only one connection from the group is logged when the period ends. The time period varies depending on the number of connections logged:
When the specified number of connections is logged at the current grouping level, the grouping level increases. Every hour the number of logged connections is re-evaluated to lower the grouping level, if required. |
Numeric value |
|
operationstatus |
See opstatus. |
Numeric value |
Indicates whether the event must be sent to the Cytomic Insights:
|
Enumeration |
|
origusername |
User of the computer which performed the operation. |
Character string |
pandaalertid |
Internal ID of the indicator. |
Character string |
pandaid |
See accountid. |
Numeric value |
Indicates the algorithm used to calculate the dates in the Date, DateTime, and TimeStamp fields:
|
Enumeration |
|
Attributes of the parent process.
|
Enumeration |
|
parentattmask |
See parentattributes. | |
parentblake |
Blake2 signature of the parent file that performed the operation. |
Character string |
parentcount |
Number of processes with DNS failures. |
Numeric value |
parentdrive |
||
Parent file name. |
Character string |
|
parentmd5 |
Parent file hash. |
Character string |
parentpath |
Path of the parent file that performed the logged operation. |
Character string |
parentpid |
Parent process ID. |
Numeric value |
parentstatus |
|
Enumeration |
pecreationsource |
Type of drive where the process was created:
|
Numeric value |
phonedescription |
Phone description if the operation involved a device of this type. |
Character string |
pid |
Identifier of the process that started the session. |
Numeric value |
Communications protocol used by the process.
|
Enumeration |
|
proxyconnection |
The connection is through a proxy. |
Boolean |
querieddomaincount |
See times. |
Numeric value |
realservicelevel |
Current agent mode (this can be temporarily different from the mode assigned in the settings). See servicelevel |
Enumeration |
redirection |
HTTP redirection detected. This field shows information only if the security software Audit mode is enabled. |
Boolean |
registryaction |
Type of operation performed on the Windows registry of the computer.
|
Enumeration |
remediationdata | See extendedinfo. | |
remediationresult |
User’s response to the pop-up message shown by Cytomic EPDR or Cytomic EDR.
|
Enumeration |
eventtype 1 (ProcessOps) IP address of the remote computer that executed the action on the monitored computer. eventtype 22 (Networkops) Contains the IP address of the other end of the connection, regardless of the connection direction (direction field). See localip and direction. eventtype 45 (SystemOps) IP address of the computer connected to the monitored computer to execute a WMI request. |
IP address |
|
eventtype 1 (ProcessOps) Name of the remote computer that executed the action on the monitored computer. eventtype 22 (Networkops) - hostname Name of the remote computer. eventtype 45 (SystemOps) Name of the computer connected to the monitored computer to execute a WMI request. |
Character string |
|
Contains the port of the computer on which the event was logged or of the other end of the connection depending on the direction field:
|
Numeric value |
|
remoteusername |
Name of the remote user that performed the operation on the monitored computer. |
Character string |
responseclassification |
Process classification.
|
Enumeration |
Status of the device that initiated the connection to the protected computer. This status caused the blocking or monitoring of the connection by the Endpoint Access Enforcement technology.
|
Enumeration |
|
riskdetected |
See risk. |
|
eventtype 555 (IOA) - huntingruleid: Identifier of the cyberattack radar rule that detected the indicator. eventtype 22 (IOA) - ruleid: Snort rule that detected communications that use HTTP tunnels. This field shows information only if the security software Audit mode is enabled. |
Character string |
|
Agent execution mode.
|
Enumeration |
|
sessiondate |
Date the antivirus service was last started or last time it was started since the last update. |
Date |
Login type:
|
Enumeration |
|
sha256 |
See childsha256. |
Character string |
shash |
Alphanumeric character pattern followed by the hash of the child process. |
Character string |
socketopflags |
See Operationflags/ integrityLevel. | |
TelemetryType |
|
Enumeration |
timeout |
The local scan took too long to complete and the process was delegated to other mechanisms that do not impact performance. |
Boolean |
eventtype 22 (NetworkOps) Number of repetitions of a connection created by the same process on the same path, with the same localIP, RemoteIP, and RemotePort. eventtype 45 (SystemOps) Number of WMI requests per table and process grouped in a one-hour period. eventtype 46 (DnsOps) - querieddomaincount Number of different domains sent by the process for which there was a DNS resolution failure in the last hour. eventtype 99 (RemediationOps) - napocurrences Number of times the same type of network attack targeting the same IP address has been logged in a one-hour period. |
Numeric value |
|
timestamp |
UTC date in epoch format (number of seconds elapsed since 1 January 1970) at the time the event occurred on the client’s computer. To understand this field, see pandatimestatus. |
Date |
totalresolutiontime |
Indicates the time it took the cloud to respond, and whether the error code query failed.
|
Numeric value |
TTPs |
List of the MITRE tactics, techniques, and sub-techniques associated with the event. |
Character string |
type |
See operation. |
Enumeration |
uniqueid |
Unique ID of the device. |
Character string |
eventtype 14 (Download) - childurl Download URL launched by the process that generated the logged event. eventtype 22 (NetworkOps) - inicitaldomain Source domain when the security software detects an HTTP redirection. This field shows information only if the security software Audit mode is enabled. |
Character string |
|
username |
See loggeduser. | |
value |
Type of operation performed on the Windows registry of the computer.
|
Enumeration |
Data type of the value contained in the registry branch.
|
Enumeration |
|
valuedatalength |
Size of the data stored in the Windows registry. |
Numeric value |
verbosemode |
The computer is configured in Verbose mode. |
Binary value |
version |
Operating system version of the computer that ran the vulnerable software. |
Character string |
versionagent |
Installed agent version. |
Character string |
versionantiexploit |
See vantiexploit. |
Character string |
versionbloomfilter |
See vbloomfilter. |
Character string |
versioncontroller |
Psnmvctrl.dll DLL version. |
Character string |
versiondetectevent |
Deteven.dll DLL version. |
Character string |
versiondetection |
||
versiondetevenfilter |
See vdeteventfilter. |
|
versionfilterantiexploit |
See vtfilterantiexploit. |
|
versionioaplg |
See vioaplg. | |
versionproduct |
Installed protection product version. |
Character string |
versionramsomevent |
See vramsomevent. |
|
versionsherlockplg |
See vsherlockplg. | |
versiontabledetection |
See vtabledetevent. |
|
versiontableramsom |
See vtableramsomevent. |
|
versionttpplg |
See vttpplg. | |
Version of the PSNMVHookPlg32 and PSNAntiExploitPLG.dll DLLs. |
Character string |
|
Version of the Bloom filter file that contains the local goodware cache. |
Character string |
|
Version of the filter file for the contextual detection technology (deteventfilter). |
Character string |
|
PSNIOAPlg.dll DLL version. |
Character string |
|
TblEven.dll DLL version. |
Character string |
|
TblRansomEven.dll DLL version. |
Character string |
|
RansomEvent.dll DLL version. |
Character string |
|
PSNEVMGRAG.dll DLL version. |
Character string |
|
PSNAEHookPlg32.dll DLL version. |
Character string |
|
PSNMitrePlg.dll DLL version. |
Character string |
|
winningtech |
Cytomic EPDR or Cytomic EDR agent technology that raised the event:
|
Enumeration |
wsdocs |
Base-64 encoded list of all documents that were open when an exploit detection occurred. |
Character string |