Fields of Logged Events
The telemetry that the security product installed on user computers sends to the servers in the cloud consists of events.
Each event contains fields that describe the logged activity. These fields contain specific information about the event, such as the date, the time, the type of action, and other items involved in the event.
The eventtype field indicates the type of event. Type 1 (ProcessOps) events show the subtype in the operation field.
A single field can have different names depending on the event it belongs to and the product console where it appears. The table below includes all possible names for fields and a link to the main name of each field, where its values are documented.
For example, the times field can appear in events 22 and 45 with that name, and in events 46 and 99 with the alternative names querieddomaincount and napocurrences respectively, although depending on the product console where they appear, they can be called times.
|
times |
eventtype 22 (NetworkOps) Number of repetitions of a connection created by the same process on the same path, with the same localIP, RemoteIP, and RemotePort. eventtype 45 (SystemOps) Number of WMI requests per table and process grouped in a one-hour period. eventtype 46 (DnsOps) - querieddomaincount Number of different domains sent by the process for which there was a DNS resolution failure in the last hour. eventtype 99 (RemediationOps) - napocurrences Number of times the same type of network attack targeting the same IP address has been logged in a one-hour period. |
Numeric value |
To make it easier to search for fields with multiple names, the table contains links to the main name of each field. In the above example:
|
querieddomaincount |
See times. |
|
napoccurrences |
See times. |
The description column contains the values for each field.
| Field | Description | Field Type |
|---|---|---|
| Client ID. |
Character string |
|
|
accesstype |
File access mask:
For all other operations: |
Bitmask |
|
accnube |
The agent installed on the client’s computer can access the Cytomic cloud. |
Boolean |
|
action |
Type of action taken by the Cytomic EDR or Cytomic EPDR agent, by the user, or by the affected process:
|
Enumeration |
|
actiontype |
Indicates the session type:
|
Enumeration |
|
administrators |
List of users that can manage the group without having to be root users. Available for Linux devices. |
Character string |
|
Cytomic EDR or Cytomic EPDR advanced security policy settings. |
Character string |
|
|
age |
Date the file was last modified. |
Date |
| alertdatetime |
The computer date (in UTC format) at the time the event that triggered the indicator occurred on the client’s computer. Information regarding the time is included. To understand this field, see pandatimestatus. |
Date |
|
allowedexecutor |
File owner on Linux devices. |
Character string |
|
alprotocoldetected |
Application level protocol detected in the connection or one of these values:
|
Enumeration |
|
alprotocolexpected |
Application-level protocol expected according to the connection port or one of these values:
|
Enumeration |
|
analysistime |
Time spent analyzing the file. |
Character string |
|
analyzeerr |
Code returned when the analysis of an item is complete.
|
Enumeration |
|
Identifier of the device that connected to a computer protected by Endpoint Access Enforcement. |
Character string |
|
|
blockreason |
Reason for the pop-up message displayed on the computer:
|
Enumeration |
|
bytesreceived |
Total bytes received by the monitored process. |
Numeric value |
|
bytessent |
Total bytes sent by the monitored process. |
Numeric value |
|
callstack |
See childfilesize. |
Numeric value |
|
Attributes of the child process:
0x0000002000000000 (SAFE_BOOT_MODE): The computer started in Safe Mode. |
Enumeration |
|
|
childattmask |
See childattributes. | |
|
childblake |
Blake2 signature of the child file. |
Character string |
|
childclassification |
Classification of the child process that performed the logged action.
|
Enumeration |
|
childdrive |
Type of drive where the operation was logged:
|
Numeric value |
| Name of the child process. |
Character string |
|
|
childfileowner |
Owner of the run file. |
Character string |
|
Size of the child file logged by the agent. |
Numeric value |
|
|
childfiletime |
Date of the child file logged by the agent. |
Date |
|
Date the file was first seen. |
Date |
|
|
childmd5 |
Child file hash. |
Character string |
|
Path of the child file that performed the logged operation. |
Character string |
|
|
ChildPID |
Child process ID. |
Numeric value |
|
SHA256 signature of the child process that performed the operation. |
Character string |
|
|
childstatus |
Child process status.
|
Enumeration |
|
childfileowner |
User account that owns the run file. |
Character string |
|
childurl |
File download URL. |
Character string |
|
ciphertype |
Scan of the SSL/TLS protocol and its HTTPS characteristics (for example TLS_RSA_WITH_AES_128_GCM_SHA256). |
Character string |
|
classname |
Type of device where the process resides. It corresponds to the class specified in the .INF file associated with the device. |
Character string |
|
eventtype 65 (Users) A program that runs when you log in, usually a command interpreter (such as /bin/bash) on Linux devices. eventtype 66 (SysOps) Command line that runs the task on Linux devices. eventtype 68 (XDG) Command line that is run when the .desktop file is interpreted on Linux devices. eventtype 69 (Udev) Script or command that is run when a udev rule is triggered when a device is connected/disconnected. eventtype 1 (ProcessOps) eventtype 31 (ScriptOps) eventtype 45 (SystemOps) eventtype 99 (Action) eventtype 199 (HiddenAction) Command line configured as a task to be run via WMI on Windows devices. |
Character string |
|
|
confadvancedrules |
See advancedrulesconf. |
Character string |
|
configservicelevel |
Agent execution mode configuration. This can be temporarily different from the execution mode in progress. See servicelevel |
Enumeration |
|
configstring |
See extendedinfo. |
Character string |
|
connectionstate |
Connection status notified.
|
Enumeration |
|
contentencoding |
Encoding used in the content of the HTTP connection. See https://www.iana.org/assignments/http-parameters/http-parameters.xml. |
Character string |
|
copy |
Name of the service that triggered the event. |
Character string |
|
Unique name of the object within the WMI hierarchy. |
Character string |
|
| date |
The computer date (in UTC format) at the time the logged event occurred on the client’s computer. No information regarding the time is included. To understand this field, see pandatimestatus. |
Numeric value |
| datetime |
The computer date (in UTC format) at the time the logged event occurred on the client’s computer. Information regarding the time is included. To understand this field, see pandatimestatus. |
Numeric value |
|
description |
See extendedinfo. |
Character string |
|
IP address of the target computer in a network connection scanned by Network Attack Protection. |
IP address |
|
|
Port of the target computer in a network connection scanned by Network Attack Protection. |
Numeric value |
|
|
details |
Summary in the form of a group of relevant fields from the event. eventtype 1 (ProcessOps) Contains the commandline field. eventtype 14 (Download) Contains the url field. eventtype 22 (NetworkOps) Contains the direction, ipv4status, protocol, and remoteport fields. eventtype 27 (RegistryOps) Contains the valuedata field. eventtype 31 (ScriptLaunch) Contains the commandline field. eventtype 46 (DnsOps) Contains the domainlist field. eventtype 47 (DeviceOps) Contains the devicetype field. eventtype 50 (UserNotification) Contains the parentfilename field. eventtype 52 (LoginOutOp) Contains the eventtype, sessiontype, loggeduser, remotemachinename, and remoteip fields. eventtype 99 (RemediationOps) Contains the remoteip, remotemachinename, commandline, and detectionid fields. eventtype 555 (IOA) Contains the extendedinfo field. |
Character string |
|
eventtype 1(ProcessOps) y operation=43 (Heuhooks) y winningtech=14(AntiExploit) y detectionid<=65 Nombre de la API o del grupo de APIs de Windows ejecutada por el proceso.
Resto de casos Name of the malware or attack detected. |
Character string |
|
|
deviceid |
See attackerDeviceId. |
Numeric value |
|
Type of drive where the process or file that triggered the operation resides.
|
Enumeration |
|
|
eventtype 22 (NetworkOps): Network connection direction.
eventtype 99 (RemediationOps) - napdirection Network connection direction.
|
Enumeration |
|
|
See list. |
|
|
|
Entropy of the POST message content to classify the likelihood of data theft and extraction. |
Character string |
|
|
entropia |
See entropy. |
Numeric value |
|
errorcode |
Error code returned by the operating system when there is a failed login attempt.
|
en |
|
errorevent |
See extendedinfo. |
Character string |
|
errorstring |
See extendedinfo. |
Character string |
|
Event type logged by the agent.
|
Enumeration |
|
|
executinggroup |
Indicates the group that will be used to run the process logged in the event. Available for Linux devices. |
Character string |
|
executinguser |
Indicates the user that will be used to run the process logged in the event.. Available for Linux devices. |
Character string |
|
exploitorigin |
Origin of the process exploit attempt.
|
Enumeration |
|
eventtype 0 (SvcStatus): Status of the security product agent:
eventtype 1 (ProcessOps) - errorstrings: Character string with debug information on the security product settings. When the operation field of an event is set to DirCreate, CMOpened, or CMPCreat, the errorstring field acts as an event grouping counter: In any one-hour period, the first 50 events are logged individually. After the limit of 50 events in one hour is reached, additional events of the same type are grouped together and not sent until the first event of the same type is logged in a new hour period. At this point, the grouped event is sent with the errorstring field including both the grouped events and the first 50 events, and the counter is reset. eventtype 26 (DataAccess):
eventtype 27 (RegistryOps):
eventtype 40 (Detection) - infodiscard: Quarantine file internal information. eventtype 45 (SystemOps): Additional information about Type events:
eventtype 47 (DeviceOps) - description
eventtype 61 (ErrorEvents):
eventtype 99 (RemediationOps) - remediationdata: Character string with these fields separated by *:
eventtype 555 (IOA): Details of the processes that generated the IOA. |
Character string |
|
|
failedqueries |
Number of failed DNS resolution requests sent by the process in the last hour. |
Numeric value |
|
fingerprint |
A JSON file encoded into base64 with the fingerprints detected in the TLS connection:
|
Character string |
|
firstseen |
See childfirstseen |
Date |
|
friendlyname |
An easily readable device name. |
Character string |
|
guidrule |
See ruleid. |
|
|
groupid |
ID of the group to which the user account involved in the event belongs on Linux devices. If it is 0, the group is root. |
Numeric value |
|
groupmembers |
Comma-separated list of users in the group on Linux devices. |
Character string |
|
headerhttp |
HTTP header dump when the security software detects communications that use HTTP tunnels. This field shows information only if the security software Audit mode is enabled. |
Character string |
|
hostname |
Character string |
|
|
huntingruleid |
See ruleid. |
Character string |
|
huntingrulemitre |
TTPs associated with the hunting rule. |
Character string |
|
huntingrulemode |
Indicates whether the rule is enabled in the Threat Engine to generate indicators. |
Boolean |
|
huntingrulename |
Name of the cyberattack radar rule that detected the indicator. |
Character string |
|
huntingruleseverity |
Severity of the impact of the indicator generated by the hunting rule:
|
Enumeration |
|
huntingruletype |
Type of hunting rule.
|
Enumeration |
|
idname |
Device name. |
Character string |
|
indicatortimestamp |
See ioatimestamp. |
Date |
|
infodiscard |
See extendedinfo. |
Character string |
|
initialdomain |
See url. |
Character string |
|
insertiondatetime |
Date in UTC format at the time the Cytomic Orion servers logged the event sent by the computer. This date is always later than the other dates because the events are queued for processing. |
Date |
|
Indicates whether the login is an interactive login. |
Binary value |
|
|
IOAId |
Indicator ID. |
Character string |
|
IOAIds |
When a sequence of events follows a pattern described in the MITRE matrix, Cytomic Orion creates an indicator (IOA) and adds the indicator ID to all the events related to it. |
Numeric value |
|
UTC date in epoch format (number of seconds elapsed since 1 January 1970) at the time the last event that triggered the indicator occurred. |
Date |
|
|
IP address type:
|
Enumeration |
|
|
isdenied |
Indicates whether the reported action was denied. |
Binary value |
|
islocal |
Indicates whether the task was created on the local computer or on a remote computer. |
Binary value |
|
islocalipv6 |
Indicates whether the IP address is IPv6 or IPv4. |
Boolean |
|
isremoteipv6 |
Indicates whether the IP address is IPv6 or IPv4. |
Boolean |
|
issessioninteractive |
See Interactive. |
Binary value |
|
key |
Affected registry branch or key. |
Character string |
|
lastquery |
Last query sent to the cloud by the Cytomic EDR or Cytomic EPDR agent. |
Date |
|
eventtype 46 (DnsOps) - DomainList:
eventtype 99 (RemediationOps) - url:
|
Character string |
|
|
localdatetime |
The computer date (in UTC format) at the time the logged event occurred. This date depends on the computer settings. As a result, it can be incorrect. |
Date |
|
eventtype 22 (NetworkOps) - localip Contains the IP address of the computer on which the event was logged, regardless of the connection direction (direction field). See remoteip and direction. eventtype 99 (RemediationOps) - naporiginip: IP address of the source computer in a network connection scanned by Network Attack Protection. |
IP address |
|
|
eventtype 22 (NetworkOps) - localport Contains the port of the computer on which the event was logged or of the other end of the connection depending on the direction field:
See direction. eventtype 99 (RemediationOps) - naporiginport: Port of the source computer in a network connection scanned by Network Attack Protection. |
Numeric value |
|
|
The user that was logged in to the computer at the time the event was generated. |
Character string |
|
|
machinename |
Name of the computer that ran the process. |
Character string |
|
Computer startup mode:
|
Enumeration |
|
|
Computer status:
|
Enumeration |
|
|
manufacturer |
Device manufacturer. |
Character string |
|
method |
HTTP connection method when the security software detects communications that use HTTP tunnels.
This field shows information only if the security software Audit mode is enabled. |
Numeric value |
|
MUID |
Internal ID of the client’s computer. |
Character string |
|
napattack |
Network attack direction.
|
Numeric value |
|
napdestinationip |
See destinationip. |
|
|
napdestinationport |
See destinationport. |
|
|
napdirection |
See direction. |
|
|
napoccurrences |
See times. |
|
|
naporiginip |
See localip. |
|
|
naporiginport |
See localport |
|
|
notificationtype |
Internal use. |
Character string |
|
numcacheclassifiedelements |
Number of items whose classification is cached in the security software. |
Numeric value |
|
objectname |
See datacontanier. |
|
|
occurrences |
Number of grouped indicators. See Indicator Grouping |
Numeric value |
|
opstatus |
|
Enumeration |
|
opentstamp |
Date of the WMI notification for WMI_CREATEPROC (54) events. |
Bitmask |
|
opentstamp |
||
|
Type of operation performed by the process. eventtype 1 (ProcessOps) Generic operation with operating system items.
eventtype 26 (DataAccess) Type of operation performed on the file.
eventtype 45 (SystemOps) Type of WMI operation performed by the process.
eventtype 65 (Users) Type of operation with user accounts on Linux devices.
eventtype 66 (SysOps) Type of modification to the system settings on Linux devices.
|
Enumeration |
|
|
eventtype 1 (ProcessOps) - operationflags Indicates the integrity level assigned by Windows to the item. Go to https://learn.microsoft.com/en-us/windows/win32/secauthz/mandatory-integrity-control.
eventtype 22 (NetworkOps) - SocketOpFlags Specifies the grouping algorithm used to minimize the logging of network connections with identical source and destination IP addresses and ports. Grouping occurs over time periods. Only one connection from the group is logged when the period ends. The time period varies depending on the number of connections logged:
When the specified number of connections is logged at the current grouping level, the grouping level increases. Every hour the number of logged connections is re-evaluated to lower the grouping level, if required. |
Numeric value |
|
|
operationmonitoredopen |
See operation. |
|
|
operationstatus |
See opstatus. |
Numeric value |
|
operationsvc |
See operation. |
|
|
operationsysops |
See operation. |
|
|
operationudev |
See operation. |
|
|
operationusers |
See operation. |
|
|
operationxdg |
See operation. |
|
|
Indicates whether the event must be sent to the Cytomic Insights:
|
Enumeration |
|
|
origusername |
User of the computer which performed the operation. |
Character string |
|
pandaalertid |
Internal ID of the indicator. |
Character string |
|
pandaid |
See accountid. |
Numeric value |
|
Indicates the algorithm used to calculate the dates in the Date, DateTime, and TimeStamp fields:
|
Enumeration |
|
|
Attributes of the parent process.
|
Enumeration |
|
|
parentattmask |
See parentattributes. | |
|
parentblake |
Blake2 signature of the parent file that performed the operation. |
Character string |
|
parentcount |
Number of processes with DNS failures. |
Numeric value |
|
parentdrive |
Type of drive where the operation was logged:
|
Numeric value |
| Name of the parent file. |
Character string |
|
|
parentmd5 |
Hash of the parent file. |
Character string |
|
Path of the parent file that performed the logged operation. |
Character string |
|
|
parentpid |
Parent process ID. |
Numeric value |
|
parentstatus |
|
Enumeration |
|
passwordstatus |
Password status on Linux devices.
|
Enumeration |
|
pecreationsource |
Type of drive where the process was created:
|
Numeric value |
|
phonedescription |
Phone description if the operation involved a device of this type. |
Character string |
|
pid |
Identifier of the process that started the session. |
Numeric value |
|
processtreeid |
Process tree ID. |
Numeric value |
|
Communications protocol used by the process.
|
Enumeration |
|
|
proxyconnection |
The connection is through a proxy. |
Boolean |
|
querieddomaincount |
See times. |
Numeric value |
|
realservicelevel |
Current agent mode (this can be temporarily different from the mode assigned in the settings). See servicelevel |
Enumeration |
|
redirection |
HTTP redirection detected. This field shows information only if the security software Audit mode is enabled. |
Boolean |
|
registryaction |
Type of operation performed on the Windows registry of the computer.
|
Enumeration |
| remediationdata | See extendedinfo. | |
|
remediationresult |
User’s response to the pop-up message shown by Cytomic EPDR or Cytomic EDR.
|
Enumeration |
|
eventtype 1 (ProcessOps) IP address of the remote computer that executed the action on the monitored computer. eventtype 22 (Networkops) Contains the IP address of the other end of the connection, regardless of the connection direction (direction field). See localip and direction. eventtype 42 (BandwidthUsage) IP address of the device the monitored computer connected to to download data. eventtype 45 (SystemOps) IP address of the device the monitored computer connected to execute a WMI request. |
IP address |
|
|
eventtype 1 (ProcessOps) Name of the remote computer that executed the action on the monitored computer. eventtype 22 (Networkops) - hostname Name of the remote computer. eventtype 42 (BandwidthUsage) Name of the device the monitored computer connected to to download data. eventtype 45 (SystemOps) Name of the device the monitored computer connected to to execute a WMI request. eventtype 99 (RemediationOps) Name of the remote computer that started the connection monitored by Endpoint Access Enforcement. |
Character string |
|
|
eventtype 22 (Networkops) Contains the port of the computer on which the event was logged or of the other end of the connection depending on the direction field:
eventtype 42 (BandwidthUsage) Port of the device the monitored computer connected to to download data. |
Numeric value |
|
|
remoteusername |
Name of the remote user that performed the operation on the monitored computer. |
Character string |
|
responseclassification |
Process classification.
|
Enumeration |
|
Status of the device that initiated the connection to the protected computer. This status caused the blocking or monitoring of the connection by the Endpoint Access Enforcement technology.
|
Enumeration |
|
|
riskdetected |
See risk. |
|
|
eventtype 555 (IOA) - huntingruleid: Name of the cyberattack radar rule that detected the indicator. eventtype 22 (IOA) - ruleid: Snort rule that detected communications that use HTTP tunnels. This field shows information only if the security software Audit mode is enabled. |
Character string |
|
|
Agent execution mode.
|
Enumeration |
|
|
sessiondate |
Date the antivirus service was last started or last time it was started since the last update. |
Date |
|
sessionid |
Session ID. |
Numeric value |
|
Login type:
|
Enumeration |
|
|
sha256 |
See childsha256. |
Character string |
|
shash |
Alphanumeric character pattern followed by the hash of the child process. |
Character string |
|
socketopflags |
See Operationflags/ integrityLevel. | |
|
telemetrytype |
|
Enumeration |
|
threadid |
Process thread ID. |
Numeric value |
|
timeout |
The local scan took too long to complete and the process was delegated to other mechanisms that do not impact performance. |
Boolean |
|
eventtype 22 (NetworkOps) Number of repetitions of a connection created by the same process on the same path, with the same localIP, RemoteIP, and RemotePort. eventtype 45 (SystemOps) Number of WMI requests per table and process grouped in a one-hour period. eventtype 46 (DnsOps) - querieddomaincount Number of different domains sent by the process for which there was a DNS resolution failure in the last hour. eventtype 99 (RemediationOps) - napocurrences Number of times the same type of network attack targeting the same IP address was logged in a one-hour period. eventtype 99 (RemediationOps) - napocurrences, winningtech = 16, 17 o 18 Number of times the same type of security policy was detected in a one-hour period. The first detection is logged with the field at 1. |
Numeric value |
|
|
timestamp |
UTC date in epoch format (number of nanoseconds elapsed since 1 January 1970) at the time the event occurred on the client’s computer. To understand this field, see pandatimestatus. |
Date |
|
totalresolutiontime |
Indicates the time it took the cloud to respond, and whether the error code query failed.
|
Numeric value |
|
triggertarget |
Name of the systemd unit (.service, .socket, or .path file) that activates when the scheduled timer expires. Available for Linux devices. |
Character string |
|
TTPs |
List of the MITRE tactics, techniques, and sub-techniques associated with the event. |
Character string |
|
type |
See operation. |
Enumeration |
|
uniqueid |
Unique ID of the device. |
Character string |
|
eventtype 14 (Download) - childurl Download URL launched by the process that generated the logged event. eventtype 22 (NetworkOps) - inicitaldomain Source domain when the security software detects an HTTP redirection. This field shows information only if the security software Audit mode is enabled. eventtype 99 (RemediationOps) List of 10 URLs sent by the process monitor, separated by *, in the event of the detection of an exploit. |
Character string |
|
|
userid |
ID of the user account involved in the event on Linux devices. |
Numeric value |
|
username |
See loggeduser. | |
|
value |
Registry branch and key. |
Enumeration |
|
Data type of the value contained in the registry key, and value:
|
Enumeration |
|
|
valuedatalength |
Size of the data stored in the Windows registry. |
Numeric value |
|
Version of the PSNMVHookPlg32 and PSNAntiExploitPLG.dll DLLs. |
Character string |
|
|
Version of the Bloom filter file that contains the local goodware cache. |
Character string |
|
|
vcontroller |
See versioncontroller. | |
|
Version of the filter file for the contextual detection technology (deteventfilter). |
Character string |
|
|
verbosemode |
The computer is configured in Verbose mode. |
Binary value |
|
version |
Operating system version of the computer that ran the vulnerable software. |
Character string |
|
versionagent |
Installed agent version. |
Character string |
|
versionantiexploit |
See vantiexploit. |
Character string |
|
versionbloomfilter |
See vbloomfilter. |
Character string |
|
Psnmvctrl.dll DLL version. |
Character string |
|
|
versiondetectevent |
Deteven.dll DLL version. |
Character string |
|
versiondetection |
||
|
versiondetevenfilter |
See vdeteventfilter. |
|
|
versionfilterantiexploit |
See vtfilterantiexploit. |
|
|
versionhelper |
HELPER_XX.exe DLL version. |
Character string |
|
versioninjectionplg |
PSNInyectorPLG.dll DLL version. |
Character string |
|
versionioaplg |
See vioaplg. | |
|
versionnopeanalysisfilter |
Version of the filter included in file nn.sig to analyze scripts. |
Character string |
|
versionproduct |
Installed protection product version. |
Character string |
|
versionramsomevent |
See vramsomevent. |
|
|
versionsherlockplg |
See vsherlockplg. | |
|
versiontabledetection |
See vtabledetevent. |
|
|
versiontableramsom |
See vtableramsomevent. |
|
|
versionttpplg |
See vttpplg. | |
|
PSNIOAPlg.dll DLL version. |
Character string |
|
|
TblEven.dll DLL version. |
Character string |
|
|
TblRansomEven.dll DLL version. |
Character string |
|
|
RansomEvent.dll DLL version. |
Character string |
|
|
PSNEVMGRAG.dll DLL version. |
Character string |
|
|
PSINJHOOKPLG32.dll DLL version. |
Character string |
|
|
PSNMitrePlg.dll DLL version. |
Character string |
|
|
winningtech |
Cytomic EPDR or Cytomic EDR agent technology that raised the event:
|
Enumeration |
|
wsdocs |
List of all documents that were open when an exploit detection occurred. |
Character string |