Document toolboxDocument toolbox

cef0.threatStream

Introduction

The tags beginning with cef0.threatStream identify events in CEF format generated by Anomali ThreatStream Threat Intelligence Management belonging to Anomali.

Tag structure

Events in CEF format don't have a specific tag structure, as explained in Technologies supported in CEF syslog format. They are always sent to a table with the structure cef0.deviceVendor.deviceProduct.

In this case, the valid data tables are:

Tags

Data tables

Tags

Data tables

cef0.threatStream.enterprise

cef0.threatStream.enterprise

How is the data sent to Devo?

Learn more about CEF syslog format and how Devo tags these events in Technologies supported in CEF syslog format.

Table structure

These are the fields displayed in this table:

cef0.threatStream.enterprise

✓Field

Type

Source field name

Extra fields

✓Field

Type

Source field name

Extra fields

eventdate

timestamp

 

 

hostname

str

hostchain

 

priorityCode

str

 

 

cefTag

str

 

 

cefVersion

str

 

 

embDeviceVendor

str

 

 

embDeviceProduct

str

 

 

deviceVersion

str

 

 

signatureID

str

 

 

name

str

 

 

severity

str

 

 

_cefVer

str

 

 

act

str

 

 

cat

str

 

 

cn1Label

str

 

 

cn1

int8

 

 

cn2Label

str

 

 

cn2

int8

 

 

cs1Label

str

 

 

cs1

str

 

 

cs2Label

str

 

 

cs2

str

 

 

cs3Label

str

 

 

cs3

str

 

 

cs4Label

str

 

 

cs4

str

 

 

cs5Label

str

 

 

cs5

str

 

 

cs6Label

str

 

 

cs6

str

 

 

msg

str

 

 

request

str

 

 

shost

str

 

 

src

ip4

 

 

hostchain

str

 

 ✓

tag

str

cefTag

 ✓

rawMessage

str

 

 ✓