Join the upcoming Developer Hackathon: Splunk Build-a-thon!Register now

 Data models used by ES

Splunk Enterprise Security leverages many of the data models in the Splunk Common Information Model. See Overview of the Common Information Model in the Common Information Model Add-on Manual for an introduction to these data models and full reference information about the fields and tags they use.

In addition to the data models available as part of the Common Information Model add-on, Splunk Enterprise Security implements and uses custom data models.

  • Assets and Identities
  • Domain Analysis
  • Incident Management
  • Risk Analysis
  • Threat Intelligence
  • User and Entity Behavior Analytics

See Configure data models in the Installation and Upgrade Manual for information about how Splunk Enterprise Security accelerates and uses both CIM and custom data models.

 Assets and Identities

The fields in the Assets and Identities (Identity_Management) data model describe data generated by the asset and identity framework in Enterprise Security. This data model does not employ any tags.

Dataset nameField nameData typeDescription
All_AssetsFor a list of extracted fields, see Asset lookup fields in the Enterprise Security User manual.
All_IdentitiesFor a list of extracted fields, see Identity lookup fields in the Enterprise Security User manual.
All_IdentitiesemployedDaysnumberA calculated field based upon the identity startDate field.
All_IdentitiesexpiredDaysnumberA calculated field based upon the identity endDate field.
Expired_Identity_Activitysrc_userstringThe source user name.
Expired_Identity_Activitysrc_user_endDatetimeThe source identity's end date.
Expired_Identity_ActivityuserstringThe source user name.
Expired_Identity_Activityuser_endDatetimeThe source identity's end date.

 Domain Analysis

The fields in the Domain Analysis data model describe data generated by the WHOIS modular input. This data model does not employ any tags.

Dataset nameField nameData typeDescription
All_DomainscreatedtimeThe date when the domain was registered.
All_DomainsexpirestimeThe date when the domain will expire.
All_DomainsretrievedtimeThe date when the domain information was retrieved.
All_DomainstagstringTags associated with the domain analysis events.
All_DomainsupdatedtimeThe date when the domain registration was updated.
All_DomainsdomainstringThe domain or IP that was scanned.
All_DomainsnameserversstringThe list of authoritative name servers for the domain.
All_DomainsregistrantstringThe name of the organization or individual that registered the domain name with the registrar.
All_DomainsregistrarstringThe name of the organization or individual that maintains the domain name registration.
All_Domainsresolved_domainstringThe domain name that a scanned IP address resolved to.

 Incident Management

The fields in the Incident Management data model describe data generated by the notable event framework in Enterprise Security. This data model does not employ any tags.

Dataset nameField nameData typeDescription
Notable_Events_MetatagstringSplunk tags associated with the notable event.
Notable_Events_Metarule_idstringThe rule_id of the notable event.
Notable_Events_Metaorig_tagstringSplunk tags associated with the original events that contributed to the notable event.
Notable_EventsownerstringThe Splunk ID of the owner of the notable event.
Notable_Eventsowner_realnamestringThe real name of the owner of the notable event in Enterprise Security.
Notable_Eventsrule_namestringThe rule name of the notable event.
Notable_Eventssecurity_domainstringThe security domain of the notable event.
Notable_EventsstatusstringThe status id of the notable event.
Notable_Eventsstatus_groupstringThe status group of the notable event.
Notable_EventstagstringSplunk tags associated with the notable event.
Notable_Eventsurgency
Notable_EventsurgencystringstringThe urgency of the notable event.
Notable_EventsdeststringThe dest of the notable event.
Notable_EventssrcstringThe src of of the notable event.
Suppressed_Notable_Eventsrule_namestringThe rule_name of the suppressed notable event.
Suppressed_Notable_Eventssecurity_domainstringThe security_domain of the suppressed notable event.
Suppressed_Notable_EventssuppressionstringThe name of the suppression that suppressed this notable event.
Suppressed_Notable_EventstagstringSplunk tags associated with the suppressed notable event.
Suppressed_Notable_EventsurgencystringThe urgency of the notable event.
Suppressed_Notable_EventsdeststringThe dest of the notable event.
Suppressed_Notable_EventssrcstringThe src of the notable event.
Incident_ReviewcommentstringThe review comment.
Incident_ReviewownerstringThe owner of the notable event.
Incident_ReviewreviewerstringThe reviewer of the notable event.
Incident_Reviewrule_idstringThe rule_id of the notable event.
Incident_Reviewsecurity_domainstringThe security domain of the notable event.
Incident_ReviewstatusstringThe status of the notable event.
Incident_Reviewstatus_groupstringThe status_group of the notable event.
Incident_ReviewtagstringThe Splunk tags associated with the notable event.
Incident_ReviewurgencystringThe urgency of the notable event.
Correlation_Search_Lookups.Correlation_SearchesSee correlationsearches.conf.spec for descriptions of these fields.
Correlation_Search_Lookups.Notable_OwnersownerstringThe Splunk user ID of a potential notable owner.
Correlation_Search_Lookups.Notable_Ownersowner_realnamestringThe real name of a potential notable event owner in Enterprise Security.
Correlation_Search_Lookups.Review_StatusesSee reviewstatuses.conf.spec for descriptions of these fields.
Correlation_Search_Lookups.Security_Domainsis_enabledbooleanWhether or not the security domain is enabled.
Correlation_Search_Lookups.Security_Domainsis_expectedbooleanWhether or not the security domain is expected.
Correlation_Search_Lookups.Security_Domainsis_ignoredbooleanWhether or not the security domain is ignored.
Correlation_Search_Lookups.Security_Domainssecurity_domainstringThe security domain label.
Correlation_Search_Lookups.UrgenciesprioritystringThe priority of the notable event.
Correlation_Search_Lookups.UrgenciesseveritystringThe severity of the notable event.
Correlation_Search_Lookups.UrgenciesurgencystringThe urgency of the notable event, calculated based on the priority and severity.
Notable_Event_Suppressions.Suppression_AuditactionstringThe action performed on the suppression (enable/disable).
Notable_Event_Suppressions.Suppression_AuditsignaturestringThe signature of the suppression audit event.
Notable_Event_Suppressions.Suppression_AuditstatusstringThe status of the suppression audit event (success/failure).
Notable_Event_Suppressions.Suppression_AuditsuppressionstringThe name of the suppression.
Notable_Event_Suppressions.Suppression_AudituserstringThe user who performed the CRUD operation on suppression.
Notable_Event_Suppressions.Suppression_Audit_ExpiredsignaturestringThe signature of the suppression audit event.
Notable_Event_Suppressions.Suppression_Audit_ExpiredsuppressionstringThe name of the suppression.
Notable_Event_Suppressions.Suppression_Eventtypesstart_timetimeThe start time of the suppression.
Notable_Event_Suppressions.Suppression_Eventtypesend_timetimeThe end time of the suppression.
Notable_Event_Suppressions.Suppression_EventtypesdescriptionstringThe description of the suppression.
Notable_Event_Suppressions.Suppression_EventtypesdisabledbooleanIf the suppression is enabled or disabled.
Notable_Event_Suppressions.Suppression_EventtypessearchstringThe notable event suppression search.
Notable_Event_Suppressions.Suppression_EventtypessuppressionstringThe notable event suppression name.

 Risk Analysis

The fields in the Risk Analysis data model describe data generated by the risk framework in Enterprise Security. This data model does not employ any tags.

Dataset nameField nameData typeDescription
All_RiskannotationsstringIf you are using security framework annotations, this field is automatically provided by correlation features of applications like Splunk Enterprise Security. Do not define extractions for this field when writing add-ons.
All_Riskannotations._allstringIf you are using security framework annotations, this field is automatically provided by correlation features of applications like Splunk Enterprise Security. Do not define extractions for this field when writing add-ons.
All_Riskannotations._frameworksstringIf you are using security framework annotations, this field is automatically provided by correlation features of applications like Splunk Enterprise Security. Do not define extractions for this field when writing add-ons.
All_Riskannotations.cis20stringIf you are using security framework annotations, this field is automatically provided by correlation features of applications like Splunk Enterprise Security. Do not define extractions for this field when writing add-ons.
All_Riskannotations.kill_chain_phasesstringIf you are using security framework annotations, this field is automatically provided by correlation features of applications like Splunk Enterprise Security. Do not define extractions for this field when writing add-ons.
All_Riskannotations.mitre_attackstringIf you are using security framework annotations, this field is automatically provided by correlation features of applications like Splunk Enterprise Security. Do not define extractions for this field when writing add-ons.
All_Riskannotations.mitre_attack.mitre_descriptionstringIf you are using security framework annotations, this field is automatically provided by correlation features of applications like Splunk Enterprise Security. Do not define extractions for this field when writing add-ons.
All_Riskannotations.mitre_attack.mitre_detectionstringIf you are using security framework annotations, this field is automatically provided by correlation features of applications like Splunk Enterprise Security. Do not define extractions for this field when writing add-ons.
All_Riskannotations.mitre_attack.mitre_tacticstringIf you are using security framework annotations, this field is automatically provided by correlation features of applications like Splunk Enterprise Security. Do not define extractions for this field when writing add-ons.
All_Riskannotations.mitre_attack.mitre_tactic_idstringIf you are using security framework annotations, this field is automatically provided by correlation features of applications like Splunk Enterprise Security. Do not define extractions for this field when writing add-ons.
All_Riskannotations.mitre_attack.mitre_techniquestringIf you are using security framework annotations, this field is automatically provided by correlation features of applications like Splunk Enterprise Security. Do not define extractions for this field when writing add-ons.
All_Riskannotations.mitre_attack.mitre_technique_idstringIf you are using security framework annotations, this field is automatically provided by correlation features of applications like Splunk Enterprise Security. Do not define extractions for this field when writing add-ons.
All_Riskannotations.mitre_attack.mitre_threat_group_namestringIf you are using security framework annotations, this field is automatically provided by correlation features of applications like Splunk Enterprise Security. Do not define extractions for this field when writing add-ons.
All_Riskannotations.niststringIf you are using security framework annotations, this field is automatically provided by correlation features of applications like Splunk Enterprise Security. Do not define extractions for this field when writing add-ons.
All_Riskcalculated_risk_scorenumberThe expression that calculates the risk_score, risk_factor_add, and risk_factor_mult fields for a total score. This is derived from the fields in the data model.
All_RiskcontrolstringThe value is assigned with PCI-specific risk base searches. For example, control=1.2.3 for the search of PCI - 1.2.3 - Unauthorized Wireless Device Detected - Rule.
All_RiskcreatorstringIf the modifier was created ad-hoc, this is the Splunk user ID that created the modifier.
All_RiskdescriptionstringThe description of the risk modifier as specified by the creator or the saved search.
All_RiskdeststringThe object that is the target of the risk event.
All_Riskdest_bunitstringThis field is automatically provided by asset and identity correlation features of applications like Splunk Enterprise Security. Do not define extractions for this field when writing add-ons.
All_Riskdest_categorystringThis field is automatically provided by asset and identity correlation features of applications like Splunk Enterprise Security. Do not define extractions for this field when writing add-ons.
All_Riskdest_prioritystringThis field is automatically provided by asset and identity correlation features of applications like Splunk Enterprise Security. Do not define extractions for this field when writing add-ons.
All_RiskgovernancestringThe value is assigned with PCI-specific risk base searches. For example, governance=pci for the search of PCI - 1.2.3 - Unauthorized Wireless Device Detected - Rule.
All_Riskrisk_factor_addnumberThe expression that calculates the addition for risk factors.
All_Riskrisk_factor_add_matchednumberThe human readable names of the risk factors that matched for the risk_factor_add field.
All_Riskrisk_factor_multnumberThe expression that calculates the multiplication for risk factors.
All_Riskrisk_factor_mult_matchednumberThe human readable names of the risk factors that matched for the risk_factor_mult field.
All_Riskrisk_messagestringThis field provides a way for customizing risk created from a search.
All_Riskrisk_objectstringThe object for which the risk modifier applies.
All_Riskrisk_object_bunitstringThe business unit of the risk_object involved in the event, or who initiated the event. For authentication privilege escalation events this should represent the user targeted by the escalation. This field is automatically provided by asset and identity correlation features of applications like Splunk Enterprise Security. Do not define extractions for this field when writing add-ons.
All_Riskrisk_object_categorystringThe category of the risk_object involved in the event, or who initiated the event. For authentication privilege escalation events this should represent the user targeted by the escalation. This field is automatically provided by asset and identity correlation features of applications like Splunk Enterprise Security. Do not define extractions for this field when writing add-ons.
All_Riskrisk_object_prioritystringThe priority of the risk_object involved in the event, or who initiated the event. For authentication privilege escalation events, this should represent the user priority targeted by the escalation. This field is automatically provided by asset and identity correlation features of applications like Splunk Enterprise Security. Do not define extractions for this field when writing add-ons.
All_Riskrisk_object_typestringThe type of object for which the risk modifier applies (system, user, other).
All_Riskrisk_scorenumberThe risk score associated with the risk modifier. This is stored in the original risk event.
All_Risksavedsearch_descriptionstringUsed for calculating the description field.
All_RisksrcstringThe object that is the source of the risk event.
All_Risksrc_bunitstringThis field is automatically provided by asset and identity correlation features of applications like Splunk Enterprise Security. Do not define extractions for this field when writing add-ons.
All_Risksrc_categorystringThis field is automatically provided by asset and identity correlation features of applications like Splunk Enterprise Security. Do not define extractions for this field when writing add-ons.
All_Risksrc_prioritystringThis field is automatically provided by asset and identity correlation features of applications like Splunk Enterprise Security. Do not define extractions for this field when writing add-ons.
All_RisktagstringSplunk tags associated with the risk modifiers.
All_Riskthreat_objectstringThe field in the search results that contains a potential indicator of compromise, such as a malicious process, file hash, url, domain, ip, command line, registry entry, and so on.
All_Riskthreat_object_typestringThe category of threat object, which is typically the same type provided by the ES threat intelligence framework, such as file_hash, domain, ip, and so on.
All_RiskuserstringThe user involved in the risk event.
All_Riskuser_bunitstringThis field is automatically provided by asset and identity correlation features of applications like Splunk Enterprise Security. Do not define extractions for this field when writing add-ons.
All_Riskuser_categorystringThis field is automatically provided by asset and identity correlation features of applications like Splunk Enterprise Security. Do not define extractions for this field when writing add-ons.
All_Riskuser_prioritystringThis field is automatically provided by asset and identity correlation features of applications like Splunk Enterprise Security. Do not define extractions for this field when writing add-ons.

 Threat Intelligence

The fields in the Threat Intelligence data model describe data generated by the threat intelligence framework in Enterprise Security. This data model does not employ any tags.

Dataset nameField nameData typeDescription
Threat_Activitydest_bunitstringThe destination asset business unit.
Threat_Activitydest_categorystringThe destination asset category.
Threat_Activitydest_prioritystringThe destination asset priority.
Threat_Activitysrc_bunitstringThe source asset business unit.
Threat_Activitysrc_categorystringThe source asset category.
Threat_Activitysrc_prioritystringThe source asset priority.
Threat_Activitythreat_match_fieldstringThe name of the field for which Enterprise Security found a threat match.
Threat_Activitythreat_match_valuestringThe value Enterprise Security matched on.
Threat_Activitythreat_collectionstringThe collection of intelligence Enterprise Security matched on.
Threat_Activitythreat_collection_keystringThe KV store key of the intelligence Enterprise Security matched on.
Threat_Activitythreat_keystringThe key for the threat attribution associated with the intelligence Enterprise matched on.
Threat_ActivitydeststringThe destination of the event that Enterprise Security matched on.
Threat_Activityorig_sourcetypestringThe original sourcetype of the event Enterprise Security matched on.
Threat_ActivitysrcstringThe source of the event that we matched on.

This datamodel also contains all of the fields in the threat intelligence KV store collections.

 User and Entity Behavior Analytics

The fields in the User and Entity Behavior Analytics (UEBA) data model describes the data communicated by Splunk UBA for use in Enterprise Security. This data model does not employ any tags. To see this data model in your instance, enable SA-UEBA on the Manage Apps page in Splunk Web.

For more information, see About Splunk User Behavior Analytics.

Dataset nameField nameData typeDescription
All_UEBA_EventsactionstringThe recommended action to take in response to a threat in Splunk UBA.
All_UEBA_EventsappstringA multi-value attribute with the names of all the applications associated with the anomaly or threat.
All_UEBA_EventscategorystringThe category or categories associated with an anomaly.
All_UEBA_EventsdescriptionstringThe long description of an anomaly.
All_UEBA_EventsdvcstringA multi-value attribute with the names of all devices associated with an anomaly or threat.
All_UEBA_EventslinkstringThe link to view the anomaly or threat in Splunk UBA.
All_UEBA_EventsseveritystringThe severity level of an anomaly or threat. Based on the risk score in Splunk UBA.
All_UEBA_Eventsseverity_idnumberThe severity id of an anomaly or threat.
All_UEBA_EventssignaturestringThe internal name of a threat or anomaly.
All_UEBA_Eventsthreat_categorystringThe category of a threat in Splunk UBA.
All_UEBA_Eventsuba_event_idstringThe internal id for an anomaly or threat in Splunk UBA.
All_UEBA_Eventsuba_event_typestringAn anomaly or threat.
All_UEBA_Eventsuba_hoststringThe UBA host sending the threats and anomalies.
All_UEBA_EventsurlstringA multi-value attribute with the names of all domains associated with an anomaly.
All_UEBA_EventsuserstringA multi-value attribute with the names of all users associated with an anomaly.
All_UEBA_Eventsuba_timetimeThe time the anomaly or threat was forwarded to Enterprise Security.
All_UEBA_Eventsmodify_timetimeThe time an anomaly or threat was last modified by Splunk UBA.
All_UEBA_Eventsstart_timetimeThe time an anomaly or threat was first identified by Splunk UBA.
All_UEBA_Events.UEBA_Anomaliesuba_modeltimeThe name of the Splunk UBA model that detected the anomaly.
All_UEBA_Events.UEBA_Anomaliesuba_model_versionstringThe version of the Splunk UBA model that detected the anomaly.