Claroty CTD

Collect logs from Claroty CTD using Elastic Agent.

Version
0.1.1 (View all)
Compatible Kibana version(s)
8.13.0 or higher
Supported Serverless project types

Security
Observability
Subscription level
Basic
Level of support
Elastic

Overview

Claroty CTD is a robust solution that delivers comprehensive cybersecurity controls for industrial and government environments. The companyā€™s comprehensive platform connects seamlessly with customers' existing infrastructure and programs while providing a full range of industrial cybersecurity controls for visibility, threat detection, risk and vulnerability management, and secure remote access all with a significantly reduced total cost of ownership.

Claroty CTD integration collects and parses data using a Syslog server and REST API, then visualizes it in Kibana.

Compatibility

This module has been tested against the latest Claroty CTD version 4.10.0.

Data streams

The Claroty CTD integration collects 7 types of message:

Supported via Syslog

[Activity Log] - The Activity Log records activities performed in CTD in the last year by users and by the system.

[Alerts] - Qualified and quantified event or chain of events which are based on various risk factors. Further categorized as either Security Alerts or Integrity Alerts depending on the nature of the alert.

[Events] - Events are the foundation of the CTDā€™s threat detection module. They are conversations or activities logged by various engines in CTD, which are then categorized as either risky (Alert or OT Alert) or non-risky (Non-Risky Change or an OT Operation) events.

[Health Monitoring] - Scheduled periodic system Health Monitoring information can be sent via Syslog messages.This can be used for forwarding real-time system health status information to external monitoring tools and for alert generation.

[Insights] - The CTD system identifies assets affected by potential security risks, based on a variety of out-of-the-box use cases, and groups them together into insights. The purpose of the insights is to provide knowledge regarding these security risks and indicate mitigation measures, which will improve the overall security posture of the organization.

Supported via REST API

[Assets] - Asset is any distinguishable network entity. CTD can discover an extensive range of assets in three classes - OT, IT, and IoT.

[Baseline] - Baseline is a collection of valid network behaviors. An individual baseline represents a command or an instance of communication between two assets.

NOTE: The Claroty CTD integration collects logs for different events, but for syslog input we have combined all of those in one data stream named event.

Requirements

  • Elastic Agent must be installed.
  • You can install only one Elastic Agent per host.
  • Elastic Agent is required to stream data through the Syslog server and ship the data to Elastic, where the events will then be processed via the integration's ingest pipelines.

Installing and managing an Elastic Agent:

You have a few options for installing and managing an Elastic Agent:

With this approach, you install Elastic Agent and use Fleet in Kibana to define, configure, and manage your agents in a central location. We recommend using Fleet management because it makes the management and upgrade of your agents considerably easier.

Install Elastic Agent in standalone mode (advanced users):

With this approach, you install Elastic Agent and manually configure the agent locally on the system where itā€™s installed. You are responsible for managing and upgrading the agents. This approach is reserved for advanced users only.

Install Elastic Agent in a containerized environment:

You can run Elastic Agent inside a container, either with Fleet Server or standalone. Docker images for all versions of Elastic Agent are available from the Elastic Docker registry, and we provide deployment manifests for running on Kubernetes.

There are some minimum requirements for running Elastic Agent and for more information, refer to the link here.

Setup

To collect data via TCP/UDP, follow the below steps:

  1. To set up Claroty CTD, refer to the Installation Guide.
  2. To configure the syslog message types in Claroty CTD, refer to the Administration Guide.
  3. Claroty CTD supports multiple message formats, including RFC5424, CEF, and CEF(Latest). Currently, we recommend using the CEF(Latest) message format for optimal integration with Elastic.

To collect data via REST API, follow the below steps:

  1. To set up Claroty CTD, refer to the Installation Guide.
  2. Obtain the credentials (username, password, and URL) that are generated during the setup process.

Enabling the integration in Elastic:

  1. In Kibana go to Management > Integrations.

  2. In "Search for integrations" search bar, type Claroty CTD.

  3. Select "Claroty CTD" integration from the search results.

  4. To collect logs via TCP or UDP, please enter the following details:

    • Listen Address
    • Listen Port

    To collect logs via REST API, please enter the following details:

    • Username
    • Password
    • URL

Logs Reference

Event

This is the event dataset.

Example

An example event for event looks as following:

{
    "@timestamp": "2023-08-13T01:00:00.000Z",
    "agent": {
        "ephemeral_id": "6c3f14b1-0b2c-4bec-8859-27a02692a875",
        "id": "7090d98c-c949-469c-9209-a0de3adaaa65",
        "name": "docker-fleet-agent",
        "type": "filebeat",
        "version": "8.14.0"
    },
    "claroty_ctd": {
        "event": {
            "busy": {
                "dm": {
                    "a_value": 0.77,
                    "value": 0.66
                },
                "fd": 0.11,
                "sda": {
                    "a_value": 0.33,
                    "b_value": 0.44,
                    "value": 0.22
                },
                "sr": 0.55
            },
            "capsaver": {
                "folder_cleanup": true
            },
            "class_id": "HealthCheck",
            "conclude_time": 50,
            "cpu": 12.21,
            "ctrl_site": 48,
            "dissection": {
                "coverage": 44,
                "efficiency": {
                    "dcerpc": 4.2345,
                    "factory_talk_rna": 6.2345,
                    "ge_ifix": 15.2345,
                    "http": 11.2345,
                    "jrmi": 14.2345,
                    "ldap": 13.2345,
                    "llc": 16.2345,
                    "matrikon_nopc": 17.2345,
                    "modbus": 2.2345,
                    "rdp": 9.2345,
                    "smb": 3.2345,
                    "ssh": 10.2345,
                    "ssl": 7.2345,
                    "tcp_http": 12.2345,
                    "vnc": 18.2345,
                    "vrrp_protocol_matcher": 8.2345,
                    "zabbix": 5.2345
                }
            },
            "dissector_ng_packet_drops": 35,
            "dropped_entities": 51,
            "exceptions": 31,
            "full_output_packet_drops": 34,
            "input_packet_drops": 32,
            "loop_call_duration": {
                "baseline_tracker_wrker_handle_network_statistics": 1.2345,
                "cloud_client_wrkr_base_run_cloud_connected": 22.2345,
                "poll_objects": 21.2345
            },
            "memory": 13.31,
            "message": "Successfully ran health monitoring",
            "mysql_query": 19.2345,
            "name": "Health",
            "output_packet_drops": 33,
            "postgres_query": 20.2345,
            "psql_idle": {
                "in_transaction_sessions": 53,
                "sessions": 52
            },
            "queue": {
                "baseline_tracker": 1,
                "bridge": 2,
                "central_bridge": 3,
                "concluding": 4,
                "diode_feeder": 5,
                "dissector": {
                    "a_value": 7,
                    "ng": 8,
                    "value": 6
                },
                "indicator_service": 9,
                "leecher": 10,
                "monitor": 11,
                "network_statistics": 12,
                "packets": {
                    "count": 13,
                    "errors": 14
                },
                "preprocessing": {
                    "count": 15,
                    "ng": 16
                },
                "priority_processing": 17,
                "processing": {
                    "count": 18,
                    "high": 19
                },
                "purge": 22,
                "statistics_ng": 20,
                "syslog": {
                    "alerts": 23,
                    "events": 24,
                    "insights": 25
                },
                "zordon_updates": 21
            },
            "read_count": {
                "dissector": {
                    "a_value": 27,
                    "count": 26,
                    "ng": 28
                },
                "preprocessing": {
                    "count": 29,
                    "ng": 30
                }
            },
            "real_time": "2023-08-14T01:00:00.000Z",
            "sensor_name": "Sensor-1",
            "service": {
                "docker": "Down",
                "firewalld": "Down",
                "icsranger": "Down",
                "jwthenticator": "Down",
                "mariadb": "Down",
                "netunnel": "Down",
                "postgres": "Down",
                "rabbit_mq": "Down",
                "redis": "Down",
                "watchdog": "Down"
            },
            "severity": 0,
            "site": "Default",
            "sniffer_status": {
                "site": 23.2345
            },
            "tag_artifacts_drops": {
                "dissector_pypy": {
                    "sum": 43,
                    "value": 42
                },
                "preprocessor": {
                    "sum": 37,
                    "value": 36
                },
                "processor": {
                    "sum": 39,
                    "value": 38
                },
                "sniffer": {
                    "sum": 41,
                    "value": 40
                }
            },
            "time": "2023-08-13T01:00:00.000Z",
            "unhandled_events": 49,
            "used": {
                "etc": 17.71,
                "opt_icsranger": 14.41,
                "tmp": 16.61,
                "var": 15.51
            },
            "version": "0",
            "worker": {
                "active": {
                    "executer": {
                        "api": "Not Available",
                        "last_restart": "19316 days, 15 hrs, 56 min, 43 sec"
                    },
                    "value": {
                        "api": "Not Available",
                        "last_restart": "19316 days, 15 hrs, 56 min, 43 sec"
                    }
                },
                "authentication": {
                    "api": "Not Available",
                    "last_restart": "21 min, 18 sec"
                },
                "baseline_tracker": {
                    "api": "Not Available",
                    "last_restart": "19316 days, 15 hrs, 56 min, 43 sec"
                },
                "bridge": {
                    "api": "Not Available",
                    "last_restart": "19316 days, 15 hrs, 56 min, 43 sec"
                },
                "cacher": {
                    "api": "Not Available",
                    "last_restart": "19316 days, 15 hrs, 56 min, 43 sec"
                },
                "capsaver": {
                    "api": "Not Available",
                    "last_restart": "19 min, 17 sec"
                },
                "cloud": {
                    "agent": {
                        "api": "Not Available",
                        "last_restart": "19316 days, 15 hrs, 56 min, 43 sec"
                    },
                    "client": {
                        "api": "Not Available",
                        "last_restart": "19316 days, 15 hrs, 56 min, 43 sec"
                    }
                },
                "concluder": {
                    "api": "Not Available",
                    "last_restart": "19316 days, 15 hrs, 56 min, 43 sec"
                },
                "configurator": {
                    "nginx": {
                        "api": "Not Available",
                        "last_restart": "19 min, 17 sec"
                    },
                    "value": {
                        "api": "Available",
                        "last_restart": "21 min, 18 sec"
                    }
                },
                "dissector": {
                    "a_value": {
                        "api": "Available",
                        "last_restart": "18 min, 34 sec"
                    },
                    "value": {
                        "api": "Available",
                        "last_restart": "18 min, 34 sec"
                    }
                },
                "enricher": {
                    "api": "Not Available",
                    "last_restart": "19316 days, 15 hrs, 56 min, 43 sec"
                },
                "indicators": {
                    "api": {
                        "api": "Not Available",
                        "last_restart": "19316 days, 15 hrs, 56 min, 43 sec"
                    },
                    "value": {
                        "api": "Not Available",
                        "last_restart": "19316 days, 15 hrs, 56 min, 43 sec"
                    }
                },
                "insights": {
                    "api": "Not Available",
                    "last_restart": "19316 days, 15 hrs, 56 min, 43 sec"
                },
                "known_threats": {
                    "api": "Available",
                    "last_restart": "18 min, 58 sec"
                },
                "leecher": {
                    "api": "Not Available",
                    "last_restart": "19316 days, 15 hrs, 56 min, 43 sec"
                },
                "mailer": {
                    "api": "Not Available",
                    "last_restart": "19316 days, 15 hrs, 56 min, 43 sec"
                },
                "mitre": {
                    "api": "Not Available",
                    "last_restart": "19316 days, 15 hrs, 56 min, 43 sec"
                },
                "notifications": {
                    "api": "Not Available",
                    "last_restart": "19316 days, 15 hrs, 56 min, 43 sec"
                },
                "preprocessor": {
                    "api": "Not Available",
                    "last_restart": "19316 days, 15 hrs, 56 min, 43 sec"
                },
                "processor": {
                    "api": "Not Available",
                    "last_restart": "19316 days, 15 hrs, 56 min, 43 sec"
                },
                "scheduler": {
                    "api": "Available",
                    "last_restart": "21 min, 19 sec"
                },
                "sensor": {
                    "api": "Available",
                    "last_restart": "18 min, 34 sec"
                },
                "sync_manager": {
                    "api": "Not Available",
                    "last_restart": "19316 days, 15 hrs, 56 min, 43 sec"
                },
                "web": {
                    "auth": {
                        "api": "Not Available",
                        "last_restart": "21 min, 1 sec"
                    },
                    "nginx": {
                        "api": "Not Available",
                        "last_restart": "21 min, 1 sec"
                    },
                    "ranger": {
                        "api": "Not Available",
                        "last_restart": "21 min, 6 sec"
                    },
                    "ws": {
                        "api": "Not Available",
                        "last_restart": "21 min, 1 sec"
                    }
                },
                "workers": {
                    "restart": 47,
                    "stop": 46
                }
            },
            "yara_scanner_test": 45
        }
    },
    "data_stream": {
        "dataset": "claroty_ctd.event",
        "namespace": "19344",
        "type": "logs"
    },
    "ecs": {
        "version": "8.11.0"
    },
    "elastic_agent": {
        "id": "7090d98c-c949-469c-9209-a0de3adaaa65",
        "snapshot": false,
        "version": "8.14.0"
    },
    "event": {
        "agent_id_status": "verified",
        "dataset": "claroty_ctd.event",
        "ingested": "2024-09-05T10:02:23Z",
        "kind": "event",
        "original": "<134>1 2023-08-15T01:00:00Z Site syslog-HealthCheck-Default - - - CEF:0|Claroty|CTD|4.10.0|HealthCheck|Health|0|CtdRealTime=Aug 14 2023 01:00:00 CtdTimeGenerated=Aug 13 2023 01:00:00 CtdMessage=Successfully ran health monitoring CtdSite=Default CtdCpu=12.21 CtdMem=13.31 CtdUsedOptIcsranger=14.41 CtdUsedVar=15.51 CtdUsedTmp=16.61 CtdUsedEtc=17.71 CtdBusyFd=0.11 CtdBusySda=0.22 CtdBusySdaA=0.33 CtdBusySdaB=0.44 CtdBusySr=0.55 CtdBusyDm=0.66 CtdBusyDmA=0.77 CtdQuBaselineTracker=1 CtdQuBridge=2 CtdQuCentralBridge=3 CtdQuConcluding=4 CtdQuDiodeFeeder=5 CtdQuDissector=6 CtdQuDissectorA=7 CtdQuDissectorNg=8 CtdQuIndicatorService=9 CtdQuLeecher=10 CtdQuMonitor=11 CtdQuNetworkStatistics=12 CtdQuPackets=13 CtdQuPacketsErrors=14 CtdQuPreprocessing=15 CtdQuPreprocessingNg=16 CtdQuPriorityProcessing=17 CtdQuProcessing=18 CtdQuProcessingHigh=19 CtdQuStatisticsNg=20 CtdQuZordonUpdates=21 CtdQueuePurge=22 CtdQuSyslogAlerts=23 CtdQuSyslogEvents=24 CtdQuSyslogInsights=25 CtdRdDissector=26 CtdRdDissectorA=27 CtdRdDissectorNg=28 CtdRdPreprocessing=29 CtdRdPreprocessingNg=30 CtdSvcMariaDb=Down CtdSvcPostgres=Down CtdSvcRedis=Down CtdSvcRabbitMq=Down CtdSvcIcsranger=Down CtdSvcWatchdog=Down CtdSvcFirewalld=Down CtdSvcNetunnel=Down CtdSvcJwthenticator=Down CtdSvcDocker=Down CtdExceptions=31 CtdInputPacketDrops=32 CtdOutputPacketDrops=33 CtdFullOutputPacketDrops=34 CtdDissectorNgPacketDrops=35 CtdTagArtifactsDropsPreprocessor=36 CtdTagArtifactsDropsPreprocessorSum=37 CtdTagArtifactsDropsProcessor=38 CtdTagArtifactsDropsProcessorSum=39 CtdTagArtifactsDropsSniffer=40 CtdTagArtifactsDropsSnifferSum=41 CtdTagArtifactsDropsDissectorPypy=42 CtdTagArtifactsDropsDissectorPypySum=43 CtdCapsaverFolderCleanup=TRUE CtdDissectionCoverage=44 CtdCapsaverUtilzationTest=N/A CtdYaraScannerTest=45 CtdWrkrWorkersStop=46 CtdWrkrWorkersRestart=47 CtdWrkrActiveExecuter={'api': 'Not Available', 'last_restart': '19316 days, 15 hrs, 56 min, 43 sec'} CtdWrkrSensor={'api': 'Available', 'last_restart': '18 min, 34 sec'} CtdWrkrAuthentication={'api': 'Not Available', 'last_restart': '21 min, 18 sec'} CtdWrkrMailer={'api': 'Not Available', 'last_restart': '19316 days, 15 hrs, 56 min, 43 sec'} CtdWrkrMitre={'api': 'Not Available', 'last_restart': '19316 days, 15 hrs, 56 min, 43 sec'} CtdWrkrNotifications={'api': 'Not Available', 'last_restart': '19316 days, 15 hrs, 56 min, 43 sec'} CtdWrkrProcessor={'api': 'Not Available', 'last_restart': '19316 days, 15 hrs, 56 min, 43 sec'} CtdWrkrCloudAgent={'api': 'Not Available', 'last_restart': '19316 days, 15 hrs, 56 min, 43 sec'} CtdWrkrCloudClient={'api': 'Not Available', 'last_restart': '19316 days, 15 hrs, 56 min, 43 sec'} CtdWrkrScheduler={'api': 'Available', 'last_restart': '21 min, 19 sec'} CtdWrkrknownThreats={'api': 'Available', 'last_restart': '18 min, 58 sec'} CtdWrkrCacher={'api': 'Not Available', 'last_restart': '19316 days, 15 hrs, 56 min, 43 sec'} CtdWrkrInsights={'api': 'Not Available', 'last_restart': '19316 days, 15 hrs, 56 min, 43 sec'} CtdWrkrActive={'api': 'Not Available', 'last_restart': '19316 days, 15 hrs, 56 min, 43 sec'} CtdWrkrEnricher={'api': 'Not Available', 'last_restart': '19316 days, 15 hrs, 56 min, 43 sec'} CtdWrkrIndicators={'api': 'Not Available', 'last_restart': '19316 days, 15 hrs, 56 min, 43 sec'} CtdWrkrIndicatorsApi={'api': 'Not Available', 'last_restart': '19316 days, 15 hrs, 56 min, 43 sec'} CtdWrkrConcluder={'api': 'Not Available', 'last_restart': '19316 days, 15 hrs, 56 min, 43 sec'} CtdWrkrPreprocessor={'api': 'Not Available', 'last_restart': '19316 days, 15 hrs, 56 min, 43 sec'} CtdWrkrLeecher={'api': 'Not Available', 'last_restart': '19316 days, 15 hrs, 56 min, 43 sec'} CtdWrkrSyncManager={'api': 'Not Available', 'last_restart': '19316 days, 15 hrs, 56 min, 43 sec'} CtdWrkrBridge={'api': 'Not Available', 'last_restart': '19316 days, 15 hrs, 56 min, 43 sec'} CtdWrkrWebRanger={'api': 'Not Available', 'last_restart': '21 min, 6 sec'} CtdWrkrWebWs={'api': 'Not Available', 'last_restart': '21 min, 1 sec'} CtdWrkrWebAuth={'api': 'Not Available', 'last_restart': '21 min, 1 sec'} CtdWrkrWebNginx={'api': 'Not Available', 'last_restart': '21 min, 1 sec'} CtdWrkrConfigurator={'api': 'Available', 'last_restart': '21 min, 18 sec'} CtdWrkrConfiguratorNginx={'api': 'Not Available', 'last_restart': '19 min, 17 sec'} CtdWrkrCapsaver={'api': 'Not Available', 'last_restart': '19 min, 17 sec'} CtdWrkrBaselineTracker={'api': 'Not Available', 'last_restart': '19316 days, 15 hrs, 56 min, 43 sec'} CtdWrkrDissector={'api': 'Available', 'last_restart': '18 min, 34 sec'} CtdWrkrDissectorA={'api': 'Available', 'last_restart': '18 min, 34 sec'} CtdSensorName=Sensor-1 CtdCtrlSite=48 CtdLoopCallDurationBaselineTrackerWrkerHandleNetworkStatistics=1.2345 CtdDissectionEfficiencyModbus=2.2345 CtdDissectionEfficiencySmb=3.2345 CtdDissectionEfficiencyDcerpc=4.2345 CtdDissectionEfficiencyZabbix=5.2345 CtdDissectionEfficiencyFactorytalkRna=6.2345 CtdDissectionEfficiencySsl=7.2345 CtdDissectionEfficiencyVrrpProtocolMatcher=8.2345 CtdDissectionEfficiencyRdp=9.2345 CtdDissectionEfficiencySsh=10.2345 CtdDissectionEfficiencyHttp=11.2345 CtdDissectionEfficiencyTcpHttp=12.2345 CtdDissectionEfficiencyLdap=13.2345 CtdDissectionEfficiencyJrmi=14.2345 CtdDissectionEfficiencyGeIfix=15.2345 CtdDissectionEfficiencyLlc=16.2345 CtdDissectionEfficiencyMatrikonNopc=17.2345 CtdDissectionEfficiencyVnc=18.2345 CtdUnhandledEvents=49 CtdConcludeTime=50 CtdMysqlQuery=19.2345 CtdPostgresQuery=20.2345 CtdDroppedEntities=51 CtdPsqlIdleSessions=52 CtdPsqlIdleInTransactionSessions=53 CtdSnifferStatus=N/A CtdLoopCallDurationPollObjects=21.2345 CtdLoopCallDurationCloudClientWrkrBaseRunCloudConnected=22.2345 CtdSnifferStatusCentral=N/A CtdSnifferStatusSite=23.2345"
    },
    "host": {
        "cpu": {
            "usage": 12.21
        }
    },
    "input": {
        "type": "udp"
    },
    "log": {
        "source": {
            "address": "192.168.243.7:46503"
        }
    },
    "message": "Successfully ran health monitoring",
    "observer": {
        "hostname": "Default",
        "product": "CTD",
        "vendor": "Claroty",
        "version": "4.10.0"
    },
    "tags": [
        "preserve_original_event",
        "preserve_duplicate_custom_fields",
        "forwarded",
        "claroty_ctd-event"
    ]
}

Exported fields

FieldDescriptionType
@timestamp
Event timestamp.
date
claroty_ctd.event.action.status
Describes the final Status for the Activity Log (e.g. Info, Failure, Success, etc.).
keyword
claroty_ctd.event.action.value
Action of the Activity Log (e.g. Added, Removed, Updated, Created, etc.).
keyword
claroty_ctd.event.alert.id
The ID of the Alert.
keyword
claroty_ctd.event.alert.link
URL for viewing the event in CTD.
keyword
claroty_ctd.event.alert.score
Alerts are scored from a scale of 0 through 100. Actual alert score can be higher than 100 depending on the sum of various indicator scores, however it is capped at max 100.
long
claroty_ctd.event.alert.status
Used to differentiate alerts with an Unresolved vs. Resolved status. Because resolved alerts are not sent by default, this field is empty. To enable receiving resolved alerts in Syslog, use this CLI command: lm set_config report_resolved_alerts True lm rw notifications.
keyword
claroty_ctd.event.alert.type_id
The Class ID of the Alert (As it is in CTD's Back-end).
keyword
claroty_ctd.event.application
Application used in this Insight.
keyword
claroty_ctd.event.assigned_to
Name of the user who was assigned to this Alert.
keyword
claroty_ctd.event.busy.dm.a_value
How frequently the particular disk partition is in use (as a percentage between 0 and 1.
double
claroty_ctd.event.busy.dm.value
How frequently the particular disk partition is in use (as a percentage between 0 and 1.
double
claroty_ctd.event.busy.fd
How frequently the particular disk partition is in use (as a percentage between 0 and 1.
double
claroty_ctd.event.busy.sda.a_value
How frequently the particular disk partition is in use (as a percentage between 0 and 1.
double
claroty_ctd.event.busy.sda.b_value
How frequently the particular disk partition is in use (as a percentage between 0 and 1.
double
claroty_ctd.event.busy.sda.value
How frequently the particular disk partition is in use (as a percentage between 0 and 1.
double
claroty_ctd.event.busy.sr
How frequently the particular disk partition is in use (as a percentage between 0 and 1.
double
claroty_ctd.event.capsaver.folder_cleanup
boolean
claroty_ctd.event.capsaver.utilzation_test
keyword
claroty_ctd.event.category
Category/Type of the Alert.
keyword
claroty_ctd.event.class_id
CEF Event Class ID.
keyword
claroty_ctd.event.class_type
CEF Event Class type for alert and event.
keyword
claroty_ctd.event.community
In Insights involving SNMP queries this will mention the community type used during the authentication.
keyword
claroty_ctd.event.conclude_time
long
claroty_ctd.event.cpu
CPU Utilization: CPU load average as a percentage of the total available CPU capacity (including all available cores).
double
claroty_ctd.event.ctrl_site
double
claroty_ctd.event.cve.id
Unique identifier of the CVE.
keyword
claroty_ctd.event.cve.modified_date
The date and time the CVE was modified by global security community.
date
claroty_ctd.event.cve.pipe_service
In Insights involving SMB access, this will list the pipe service that was accessed.
keyword
claroty_ctd.event.cve.publish_date
The date and time the CVE was found by global security community.
date
claroty_ctd.event.cve.score
CVSS - Common Vulnerability Scoring System score (0-10).
double
claroty_ctd.event.default_password
Checks if the Asset uses a default password.
boolean
claroty_ctd.event.destination.asset_type
The asset type of the secondary asset, e.g. Engineering Station If multiple destinations exist, they won't be presented.
keyword
claroty_ctd.event.destination.host
The host name of the secondary asset involved in the Alert. May be FQDN or hostname.
keyword
claroty_ctd.event.destination.ip
The IPv4 address of the secondary asset involved in the Alert.
ip
claroty_ctd.event.destination.mac
The MAC address of the secondary asset involved in the Alert.
keyword
claroty_ctd.event.destination.zone
Destination Zone Name If multiple destinations exist, they won't be presented.
keyword
claroty_ctd.event.device_external_id
Name of the site generating the message.
keyword
claroty_ctd.event.dissection.coverage
long
claroty_ctd.event.dissection.efficiency.dcerpc
double
claroty_ctd.event.dissection.efficiency.factory_talk_rna
double
claroty_ctd.event.dissection.efficiency.ge_ifix
double
claroty_ctd.event.dissection.efficiency.http
double
claroty_ctd.event.dissection.efficiency.jrmi
double
claroty_ctd.event.dissection.efficiency.ldap
double
claroty_ctd.event.dissection.efficiency.llc
double
claroty_ctd.event.dissection.efficiency.matrikon_nopc
double
claroty_ctd.event.dissection.efficiency.modbus
double
claroty_ctd.event.dissection.efficiency.rdp
double
claroty_ctd.event.dissection.efficiency.smb
double
claroty_ctd.event.dissection.efficiency.ssh
double
claroty_ctd.event.dissection.efficiency.ssl
double
claroty_ctd.event.dissection.efficiency.tcp_http
double
claroty_ctd.event.dissection.efficiency.vnc
double
claroty_ctd.event.dissection.efficiency.vrrp_protocol_matcher
double
claroty_ctd.event.dissection.efficiency.zabbix
double
claroty_ctd.event.dissector_ng_packet_drops
long
claroty_ctd.event.dropped_entities
The number of entities dropped by the system due to reaching the limit of number of entities.
long
claroty_ctd.event.end_of_life_date
In Unsupported OS Insights, this presented the End of Life date for the primary asset of this insight.
date
claroty_ctd.event.event_type_id
The Class ID of the Event (As it is in CTD's Back-end).
keyword
claroty_ctd.event.exceptions
The number of new logged exceptions.
long
claroty_ctd.event.external.id
The ID of the Alert.
keyword
claroty_ctd.event.external.links
More information about publicly available signatures.
keyword
claroty_ctd.event.file_path
The filepath or file share envolved in the Insight.
keyword
claroty_ctd.event.full_output_packet_drops
long
claroty_ctd.event.input_packet_drops
long
claroty_ctd.event.insight.password_plaintext
Checks if the Asset implements a protocol that transfers data in plain-text.
boolean
claroty_ctd.event.insight.state
Describes the PLCā€™s state.
keyword
claroty_ctd.event.insight.user
The User name involved in the Insight.
keyword
claroty_ctd.event.insights.protocol
The Protocol envolved in the Insight.
keyword
claroty_ctd.event.insights.protocol_version
The Version of the Protocol envolved in the Insight.
keyword
claroty_ctd.event.insights.severity
Indicates the Insight Severity (Low, Medium, and High).
keyword
claroty_ctd.event.is_ghost
In Insights involving communication with other IPā€™s this will describe if the external IPā€™s are Ghost assets or real assets.
boolean
claroty_ctd.event.last_managed
In Insights involving managed PLCā€™s this will present the date when it was last managed.
date
claroty_ctd.event.log_type
Describes the level type that created the Activity Log (e.g. System or User.).
keyword
claroty_ctd.event.loop_call_duration.baseline_tracker_wrker_handle_network_statistics
double
claroty_ctd.event.loop_call_duration.cloud_client_wrkr_base_run_cloud_connected
double
claroty_ctd.event.loop_call_duration.poll_objects
double
claroty_ctd.event.memory
Memory Usage: The percent of current memory consumption.The value is a number between 0 and 100.
double
claroty_ctd.event.message
Full description of the message.
keyword
claroty_ctd.event.method
The query method used in the Insight.
keyword
claroty_ctd.event.mitre_attack.tactic_names
The MITRE ATT&CKĀ® for ICS framework Tactic that are mapped to this Alert.
keyword
claroty_ctd.event.mitre_attack.technique_ids
The MITRE ATT&CKĀ® for ICS framework Techniques that are mapped to this Alert.
keyword
claroty_ctd.event.model
This presented the model of the primary asset of this insight.
keyword
claroty_ctd.event.mysql_query
MySQL Query time, in seconds.
double
claroty_ctd.event.name
CEF Event Name.
keyword
claroty_ctd.event.no_password
Checks if the Asset has no password.
boolean
claroty_ctd.event.number_of.accesed_client
For Insights presenting assets that are identified as web servers, this field will show the clients connecting to this web server.
long
claroty_ctd.event.number_of.interface
For Insights presenting assets with multiple interfaces, this field will show the number of interfaces on the specific asset.
long
claroty_ctd.event.number_of.neighbours
In Insights presenting the highly Connected Assets, this field will show the number of connected assets.
long
claroty_ctd.event.operating_system
This presented the Operating System of the primary asset of this insight.
keyword
claroty_ctd.event.output_packet_drops
long
claroty_ctd.event.postgres_query
Postgres Query time, in seconds.
double
claroty_ctd.event.protocol
Protocol used within the Alert.
keyword
claroty_ctd.event.psql_idle.in_transaction_sessions
long
claroty_ctd.event.psql_idle.sessions
long
claroty_ctd.event.queue.baseline_tracker
Baseline Tracker queue message count.
long
claroty_ctd.event.queue.bridge
Bridge queue message count.
long
claroty_ctd.event.queue.central_bridge
CentralBridge queue message count.
long
claroty_ctd.event.queue.concluding
Concluding queue message count.
long
claroty_ctd.event.queue.diode_feeder
DiodeFeeder queue message count.
long
claroty_ctd.event.queue.dissector.a_value
DissectorA queue message count.
long
claroty_ctd.event.queue.dissector.ng
DissectorNg queue message count.
long
claroty_ctd.event.queue.dissector.value
Dissector queue message count.
long
claroty_ctd.event.queue.indicator_service
IndicatorService queue message count.
long
claroty_ctd.event.queue.leecher
Leecher queue message count.
long
claroty_ctd.event.queue.monitor
Monitor queue message count.
long
claroty_ctd.event.queue.network_statistics
NetworkStatistics queue message count.
long
claroty_ctd.event.queue.packets.count
Packets queue message count.
long
claroty_ctd.event.queue.packets.errors
PacketsErrors queue message count.
long
claroty_ctd.event.queue.preprocessing.count
Preprocessing queue message count.
long
claroty_ctd.event.queue.preprocessing.ng
PreprocessingNg queue message count.
long
claroty_ctd.event.queue.priority_processing
PriorityProcessing queue message count.
long
claroty_ctd.event.queue.processing.count
Processing queue message count.
long
claroty_ctd.event.queue.processing.high
ProcessingHigh queue message count.
long
claroty_ctd.event.queue.purge
Purge queue message count.
long
claroty_ctd.event.queue.statistics_ng
StatisticsNg queue message count.
long
claroty_ctd.event.queue.syslog.alerts
SyslogSlerts queue message count.
long
claroty_ctd.event.queue.syslog.events
SyslogEvents queue message count.
long
claroty_ctd.event.queue.syslog.insights
SyslogInsights queue message count.
long
claroty_ctd.event.queue.zordon_updates
ZordonUpdates queue message count.
long
claroty_ctd.event.read_count.dissector.a_value
The queue read count for each component.
long
claroty_ctd.event.read_count.dissector.count
The queue read count for each component.
long
claroty_ctd.event.read_count.dissector.ng
The queue read count for each component.
long
claroty_ctd.event.read_count.preprocessing.count
The queue read count for each component.
long
claroty_ctd.event.read_count.preprocessing.ng
The queue read count for each component.
long
claroty_ctd.event.real_time
Timestamp of HealthCheck creation.
date
claroty_ctd.event.resolved.as
Type of resolution. (Unresolved, Valid, Incident, Training, User Alert Rules, Unqualified, Ignore, Acknowledge, Auto Approved With No Expiration, Auto Approved With Expiration, Auto Archived With No Expiration, Auto Archived With Expiration). Because resolved alerts are not sent by default, this field is empty. To enable receiving resolved alerts in Syslog, use this CLI command: lm set_config report_resolved_alerts True lm rw notifications.
keyword
claroty_ctd.event.resolved.by
Name of the user (or System) who resolved the Alert. Because resolved alerts are not sent by default, this field is empty. To enable receiving resolved alerts in Syslog, use this CLI command: lm set_config report_resolved_alerts True lm rw notifications.
keyword
claroty_ctd.event.risk_score
In Insights presenting the top risky assets, this will present the risk for the specific asset.
long
claroty_ctd.event.sensor_name
keyword
claroty_ctd.event.series
This presented the series of the primary asset of this insight.
keyword
claroty_ctd.event.service.docker
Whether the service is running (Up or Down).
keyword
claroty_ctd.event.service.firewalld
Whether the service is running (Up or Down).
keyword
claroty_ctd.event.service.icsranger
Whether the service is running (Up or Down).
keyword
claroty_ctd.event.service.jwthenticator
Whether the service is running (Up or Down).
keyword
claroty_ctd.event.service.mariadb
Whether the service is running (Up or Down).
keyword
claroty_ctd.event.service.netunnel
Whether the service is running (Up or Down).
keyword
claroty_ctd.event.service.postgres
Whether the service is running (Up or Down).
keyword
claroty_ctd.event.service.rabbit_mq
Whether the service is running (Up or Down).
keyword
claroty_ctd.event.service.redis
Whether the service is running (Up or Down).
keyword
claroty_ctd.event.service.watchdog
Whether the service is running (Up or Down).
keyword
claroty_ctd.event.severity
CEF Event Severity.
long
claroty_ctd.event.signature.confidence
A score representing the probability that a communication event that triggers the signature is a network threat. Expressed on a scale of 1% to 100%, It is calculated using a combination of signature parameters and Claroty research, and does not apply to user-powered signatures.
keyword
claroty_ctd.event.signature.criticality
A score calculated using a combination of signature parameters and Claroty research. Possible values include Low, Medium, High, and Critical. This score is not calculated for user-powered signatures.
keyword
claroty_ctd.event.signature.id
ID number assigned to the signature by its creator.
keyword
claroty_ctd.event.signature.last_updated
Date this revision was last updated by its creator.
date
claroty_ctd.event.signature.name
Name assigned to the signature by its creator.
keyword
claroty_ctd.event.signature.powered_by
Creator and maintainer of the signature. Options include: Claroty - Signatures created by Team82 or by Claroty's data team Emerging Threats, Other - Publicly available signatures Username of the user who uploaded the signature User - User-powered signatures created in a version earlier than v4.8.0.
keyword
claroty_ctd.event.signature.tags
Attack types and other enriched signature information.
keyword
claroty_ctd.event.site
The ID of the site.
keyword
claroty_ctd.event.sniffer_status.central
keyword
claroty_ctd.event.sniffer_status.site
double
claroty_ctd.event.sniffer_status.value
keyword
claroty_ctd.event.source.asset_type
The asset type of the primary asset, e.g. Engineering Station.
keyword
claroty_ctd.event.source.host
The host name of the Primary asset involved in the Alert. May be FQDN or hostname.
keyword
claroty_ctd.event.source.ip
The IPv4 address of the primary asset involved in the Alert.
ip
claroty_ctd.event.source.mac
The MAC address of the primary asset involved in the Alert.
keyword
claroty_ctd.event.source.zone
Source Zone Name.
keyword
claroty_ctd.event.story_id
The Story ID for which this Alert is correlated.
keyword
claroty_ctd.event.tag_artifacts_drops.dissector_pypy.sum
long
claroty_ctd.event.tag_artifacts_drops.dissector_pypy.value
long
claroty_ctd.event.tag_artifacts_drops.preprocessor.sum
long
claroty_ctd.event.tag_artifacts_drops.preprocessor.value
long
claroty_ctd.event.tag_artifacts_drops.processor.sum
long
claroty_ctd.event.tag_artifacts_drops.processor.value
long
claroty_ctd.event.tag_artifacts_drops.sniffer.sum
long
claroty_ctd.event.tag_artifacts_drops.sniffer.value
long
claroty_ctd.event.time
Timestamp of Alert creation Format is: MMM dd yyyy HH:mm:ss Timezone should be UTC.
date
claroty_ctd.event.unhandled_events
The number of events that have not been handled by the system.
long
claroty_ctd.event.used.etc
The percent of disk space currently used in this particular directory.
double
claroty_ctd.event.used.opt_icsranger
The percent of disk space currently used in this particular directory.
double
claroty_ctd.event.used.tmp
The percent of disk space currently used in this particular directory.
double
claroty_ctd.event.used.var
The percent of disk space currently used in this particular directory.
double
claroty_ctd.event.user
The User name involved in the Activity Log.
keyword
claroty_ctd.event.version
CEF Event Version.
keyword
claroty_ctd.event.worker.active.executer.api
keyword
claroty_ctd.event.worker.active.executer.last_restart
keyword
claroty_ctd.event.worker.active.value.api
keyword
claroty_ctd.event.worker.active.value.last_restart
keyword
claroty_ctd.event.worker.authentication.api
keyword
claroty_ctd.event.worker.authentication.last_restart
keyword
claroty_ctd.event.worker.baseline_tracker.api
keyword
claroty_ctd.event.worker.baseline_tracker.last_restart
keyword
claroty_ctd.event.worker.bridge.api
keyword
claroty_ctd.event.worker.bridge.last_restart
keyword
claroty_ctd.event.worker.cacher.api
keyword
claroty_ctd.event.worker.cacher.last_restart
keyword
claroty_ctd.event.worker.capsaver.api
keyword
claroty_ctd.event.worker.capsaver.last_restart
keyword
claroty_ctd.event.worker.cloud.agent.api
keyword
claroty_ctd.event.worker.cloud.agent.last_restart
keyword
claroty_ctd.event.worker.cloud.client.api
keyword
claroty_ctd.event.worker.cloud.client.last_restart
keyword
claroty_ctd.event.worker.concluder.api
keyword
claroty_ctd.event.worker.concluder.last_restart
keyword
claroty_ctd.event.worker.configurator.nginx.api
keyword
claroty_ctd.event.worker.configurator.nginx.last_restart
keyword
claroty_ctd.event.worker.configurator.value.api
keyword
claroty_ctd.event.worker.configurator.value.last_restart
keyword
claroty_ctd.event.worker.dissector.a_value.api
keyword
claroty_ctd.event.worker.dissector.a_value.last_restart
keyword
claroty_ctd.event.worker.dissector.value.api
keyword
claroty_ctd.event.worker.dissector.value.last_restart
keyword
claroty_ctd.event.worker.enricher.api
keyword
claroty_ctd.event.worker.enricher.last_restart
keyword
claroty_ctd.event.worker.indicators.api.api
keyword
claroty_ctd.event.worker.indicators.api.last_restart
keyword
claroty_ctd.event.worker.indicators.value.api
keyword
claroty_ctd.event.worker.indicators.value.last_restart
keyword
claroty_ctd.event.worker.insights.api
keyword
claroty_ctd.event.worker.insights.last_restart
keyword
claroty_ctd.event.worker.known_threats.api
keyword
claroty_ctd.event.worker.known_threats.last_restart
keyword
claroty_ctd.event.worker.leecher.api
keyword
claroty_ctd.event.worker.leecher.last_restart
keyword
claroty_ctd.event.worker.mailer.api
keyword
claroty_ctd.event.worker.mailer.last_restart
keyword
claroty_ctd.event.worker.mitre.api
keyword
claroty_ctd.event.worker.mitre.last_restart
keyword
claroty_ctd.event.worker.notifications.api
keyword
claroty_ctd.event.worker.notifications.last_restart
keyword
claroty_ctd.event.worker.preprocessor.api
keyword
claroty_ctd.event.worker.preprocessor.last_restart
keyword
claroty_ctd.event.worker.processor.api
keyword
claroty_ctd.event.worker.processor.last_restart
keyword
claroty_ctd.event.worker.scheduler.api
keyword
claroty_ctd.event.worker.scheduler.last_restart
keyword
claroty_ctd.event.worker.sensor.api
keyword
claroty_ctd.event.worker.sensor.last_restart
keyword
claroty_ctd.event.worker.sync_manager.api
keyword
claroty_ctd.event.worker.sync_manager.last_restart
keyword
claroty_ctd.event.worker.web.auth.api
keyword
claroty_ctd.event.worker.web.auth.last_restart
keyword
claroty_ctd.event.worker.web.nginx.api
keyword
claroty_ctd.event.worker.web.nginx.last_restart
keyword
claroty_ctd.event.worker.web.ranger.api
keyword
claroty_ctd.event.worker.web.ranger.last_restart
keyword
claroty_ctd.event.worker.web.ws.api
keyword
claroty_ctd.event.worker.web.ws.last_restart
keyword
claroty_ctd.event.worker.workers.restart
The total number of workers restarted.
long
claroty_ctd.event.worker.workers.stop
The total number of stopped workers.
long
claroty_ctd.event.yara_scanner_test
long
data_stream.dataset
Data stream dataset.
constant_keyword
data_stream.namespace
Data stream namespace.
constant_keyword
data_stream.type
Data stream type.
constant_keyword
event.dataset
Event dataset.
constant_keyword
event.module
Event module.
constant_keyword
input.type
Type of filebeat input.
keyword
log.offset
Log offset.
long
log.source.address
Source address from which the log event read/sent.
keyword
tags
User defined tags.
keyword

Assets

This is the asset dataset.

Example

An example event for asset looks as following:

{
    "@timestamp": "2024-07-24T15:09:48.000Z",
    "agent": {
        "ephemeral_id": "639a39fa-e0cd-4d50-a485-07788e0cf613",
        "id": "7090d98c-c949-469c-9209-a0de3adaaa65",
        "name": "docker-fleet-agent",
        "type": "filebeat",
        "version": "8.14.0"
    },
    "claroty_ctd": {
        "asset": {
            "approved": true,
            "asset_types": {
                "name": "eHMI",
                "number": 1
            },
            "class_type": "OT",
            "criticalities": {
                "name": "eLow",
                "value": 0
            },
            "custom_attributes": [
                {
                    "asset_id": "1",
                    "category": {
                        "description": "sdfas",
                        "id": "1",
                        "name": "Some Asset",
                        "resource_id": "1-1",
                        "site_id": "1"
                    },
                    "id": "1",
                    "resource_id": "1-1",
                    "site_id": "1",
                    "value": "some value"
                }
            ],
            "first_seen": "2023-04-17T07:30:15.000Z",
            "ghost": false,
            "id": "1",
            "insight_names": [
                "Managed PLCs (by Rockwell users)",
                "Privileged Operations (Operated PLCs)"
            ],
            "installed_programs_count": 0,
            "ipv4": [
                "1.128.0.0"
            ],
            "last_entity_seen": "2023-04-17T07:36:30.000Z",
            "last_seen": "2023-04-17T07:36:30.000Z",
            "last_updated": "2024-07-24T15:09:48.000Z",
            "name": "1.128.0.0",
            "network": {
                "id": "1",
                "name": "Default",
                "resource_id": "1-1",
                "site_id": "1"
            },
            "network_id": "1",
            "num_alerts": 0,
            "parsed": false,
            "patch_count": 0,
            "protocol": [
                "CIP",
                "ENIP",
                "PCCC",
                "TCP"
            ],
            "purdue_level": 2,
            "resource_id": "1-1",
            "risk_level": 0,
            "site_id": "1",
            "site_name": "site-10-0-11-136",
            "special_hints": {
                "name": "eUnicast",
                "value": 0
            },
            "subnet_id": "1",
            "timestamp": "2023-04-17T07:30:15.000Z",
            "usb_devices_count": 0,
            "valid": true,
            "virtual_zone": {
                "id": "2",
                "name": "HMI: Rockwell"
            }
        }
    },
    "data_stream": {
        "dataset": "claroty_ctd.asset",
        "namespace": "42864",
        "type": "logs"
    },
    "ecs": {
        "version": "8.11.0"
    },
    "elastic_agent": {
        "id": "7090d98c-c949-469c-9209-a0de3adaaa65",
        "snapshot": false,
        "version": "8.14.0"
    },
    "event": {
        "agent_id_status": "verified",
        "category": [
            "host"
        ],
        "dataset": "claroty_ctd.asset",
        "ingested": "2024-09-05T09:56:07Z",
        "kind": "event",
        "original": "{\"active_queries_names\":[],\"active_tasks_names\":[],\"approved\":true,\"asset_type\":1,\"asset_type__\":\"eHMI\",\"children\":[],\"class_type\":\"OT\",\"code_sections\":[],\"criticality\":0,\"criticality__\":\"eLow\",\"custom_attributes\":[{\"asset_id\":1,\"category\":{\"description\":\"sdfas\",\"id\":1,\"name\":\"Some Asset\",\"resource_id\":\"1-1\",\"site_id\":1},\"id\":1,\"resource_id\":\"1-1\",\"site_id\":1,\"value\":\"some value\"}],\"custom_informations\":[],\"default_gateway\":null,\"display_name\":null,\"domain_workgroup\":null,\"edge_id\":null,\"edge_last_run\":null,\"first_seen\":\"2023-04-17T07:30:15+00:00\",\"ghost\":false,\"id\":1,\"insight_names\":[\"Managed PLCs (by Rockwell users)\",\"Privileged Operations (Operated PLCs)\"],\"installed_antivirus\":null,\"installed_programs_count\":0,\"ipv4\":[\"1.128.0.0\"],\"last_entity_seen\":\"2023-04-17T07:36:30+00:00\",\"last_seen\":\"2023-04-17T07:36:30+00:00\",\"last_updated\":\"2024-07-24T15:09:48+00:00\",\"name\":\"1.128.0.0\",\"network\":{\"id\":1,\"name\":\"Default\",\"resource_id\":\"1-1\",\"site_id\":1},\"network_id\":1,\"num_alerts\":0,\"os_architecture\":null,\"os_build\":null,\"os_revision\":null,\"os_service_pack\":null,\"parsed\":false,\"patch_count\":0,\"project_parsed\":null,\"protocol\":[\"CIP\",\"ENIP\",\"PCCC\",\"TCP\"],\"purdue_level\":2,\"resource_id\":\"1-1\",\"risk_level\":0,\"site_id\":1,\"site_name\":\"site-10-0-11-136\",\"special_hint\":0,\"special_hint__\":\"eUnicast\",\"state\":null,\"subnet\":{\"name\":\"1.128.0.0\"},\"subnet_id\":1,\"subnet_type\":0,\"timestamp\":\"2023-04-17T07:30:15+00:00\",\"usb_devices_count\":0,\"valid\":true,\"virtual_zone_id\":2,\"virtual_zone_name\":\"HMI: Rockwell\"}",
        "severity": 0,
        "type": [
            "info"
        ]
    },
    "host": {
        "id": "1",
        "name": "1.128.0.0"
    },
    "input": {
        "type": "cel"
    },
    "network": {
        "name": "Default",
        "protocol": [
            "cip",
            "enip",
            "pccc",
            "tcp"
        ]
    },
    "related": {
        "ip": [
            "1.128.0.0"
        ]
    },
    "tags": [
        "preserve_original_event",
        "preserve_duplicate_custom_fields",
        "forwarded",
        "claroty_ctd-asset"
    ]
}

Exported fields

FieldDescriptionType
@timestamp
Event timestamp.
date
claroty_ctd.asset.active.queries_names
keyword
claroty_ctd.asset.active.scans_names
keyword
claroty_ctd.asset.active.tasks_names
keyword
claroty_ctd.asset.approved
boolean
claroty_ctd.asset.asset_types.name
keyword
claroty_ctd.asset.asset_types.number
long
claroty_ctd.asset.children.active_queries_names
keyword
claroty_ctd.asset.children.active_tasks_names
keyword
claroty_ctd.asset.children.address
keyword
claroty_ctd.asset.children.approved
boolean
claroty_ctd.asset.children.asset_types.name
keyword
claroty_ctd.asset.children.asset_types.number
long
claroty_ctd.asset.children.class_type
keyword
claroty_ctd.asset.children.criticalities.name
keyword
claroty_ctd.asset.children.criticalities.value
long
claroty_ctd.asset.children.custom_informations.category
long
claroty_ctd.asset.children.custom_informations.display_key
keyword
claroty_ctd.asset.children.custom_informations.key
keyword
claroty_ctd.asset.children.custom_informations.priority
long
claroty_ctd.asset.children.custom_informations.type
long
claroty_ctd.asset.children.custom_informations.val
keyword
claroty_ctd.asset.children.default_gateway
keyword
claroty_ctd.asset.children.display_name
keyword
claroty_ctd.asset.children.domain_workgroup
keyword
claroty_ctd.asset.children.edge_id
keyword
claroty_ctd.asset.children.edge_last_run
keyword
claroty_ctd.asset.children.firmware
keyword
claroty_ctd.asset.children.first_seen
date
claroty_ctd.asset.children.ghost
boolean
claroty_ctd.asset.children.id
keyword
claroty_ctd.asset.children.installed_antivirus
keyword
claroty_ctd.asset.children.last_entity_seen
date
claroty_ctd.asset.children.last_seen
date
claroty_ctd.asset.children.last_updated
date
claroty_ctd.asset.children.model
keyword
claroty_ctd.asset.children.name
keyword
claroty_ctd.asset.children.network.id
keyword
claroty_ctd.asset.children.network.name
keyword
claroty_ctd.asset.children.network.resource_id
keyword
claroty_ctd.asset.children.network.site_id
keyword
claroty_ctd.asset.children.network_id
keyword
claroty_ctd.asset.children.os.architecture
keyword
claroty_ctd.asset.children.os.build
keyword
claroty_ctd.asset.children.os.revision
keyword
claroty_ctd.asset.children.os.service_pack
keyword
claroty_ctd.asset.children.parsed
boolean
claroty_ctd.asset.children.project_parsed.builder_hostname
keyword
claroty_ctd.asset.children.project_parsed.creation_time
long
claroty_ctd.asset.children.project_parsed.creation_ver
keyword
claroty_ctd.asset.children.project_parsed.description
keyword
claroty_ctd.asset.children.project_parsed.information_type
long
claroty_ctd.asset.children.project_parsed.modification_time
long
claroty_ctd.asset.children.project_parsed.modification_ver
keyword
claroty_ctd.asset.children.project_parsed.name
keyword
claroty_ctd.asset.children.project_parsed.priority
long
claroty_ctd.asset.children.project_parsed.project_ver
keyword
claroty_ctd.asset.children.resource_id
keyword
claroty_ctd.asset.children.risk_level
long
claroty_ctd.asset.children.serial_number
keyword
claroty_ctd.asset.children.site_id
keyword
claroty_ctd.asset.children.site_name
keyword
claroty_ctd.asset.children.special_hints.name
keyword
claroty_ctd.asset.children.special_hints.value
long
claroty_ctd.asset.children.state
keyword
claroty_ctd.asset.children.subnet.name
keyword
claroty_ctd.asset.children.subnet_id
keyword
claroty_ctd.asset.children.subnet_type
long
claroty_ctd.asset.children.timestamp
date
claroty_ctd.asset.children.vendor
keyword
claroty_ctd.asset.children.virtual_zone.id
keyword
claroty_ctd.asset.children.virtual_zone.name
keyword
claroty_ctd.asset.class_type
keyword
claroty_ctd.asset.code_sections.filename
keyword
claroty_ctd.asset.code_sections.rid
keyword
claroty_ctd.asset.code_sections.type
keyword
claroty_ctd.asset.criticalities.name
keyword
claroty_ctd.asset.criticalities.value
long
claroty_ctd.asset.custom_attributes.asset_id
keyword
claroty_ctd.asset.custom_attributes.category.description
keyword
claroty_ctd.asset.custom_attributes.category.id
keyword
claroty_ctd.asset.custom_attributes.category.name
keyword
claroty_ctd.asset.custom_attributes.category.resource_id
keyword
claroty_ctd.asset.custom_attributes.category.site_id
keyword
claroty_ctd.asset.custom_attributes.id
keyword
claroty_ctd.asset.custom_attributes.resource_id
keyword
claroty_ctd.asset.custom_attributes.site_id
keyword
claroty_ctd.asset.custom_attributes.value
keyword
claroty_ctd.asset.custom_informations.category
long
claroty_ctd.asset.custom_informations.display_key
keyword
claroty_ctd.asset.custom_informations.key
keyword
claroty_ctd.asset.custom_informations.priority
long
claroty_ctd.asset.custom_informations.type
long
claroty_ctd.asset.custom_informations.val
keyword
claroty_ctd.asset.default_gateway
keyword
claroty_ctd.asset.display_name
keyword
claroty_ctd.asset.domain_workgroup
keyword
claroty_ctd.asset.edge_id
keyword
claroty_ctd.asset.edge_last_run
keyword
claroty_ctd.asset.firmware
keyword
claroty_ctd.asset.first_seen
date
claroty_ctd.asset.ghost
boolean
claroty_ctd.asset.hostname
keyword
claroty_ctd.asset.id
keyword
claroty_ctd.asset.insight_names
keyword
claroty_ctd.asset.installed_antivirus
keyword
claroty_ctd.asset.installed_programs_count
long
claroty_ctd.asset.ipv4
ip
claroty_ctd.asset.last_entity_seen
date
claroty_ctd.asset.last_seen
date
claroty_ctd.asset.last_updated
date
claroty_ctd.asset.mac
keyword
claroty_ctd.asset.model
keyword
claroty_ctd.asset.name
keyword
claroty_ctd.asset.network.id
keyword
claroty_ctd.asset.network.name
keyword
claroty_ctd.asset.network.resource_id
keyword
claroty_ctd.asset.network.site_id
keyword
claroty_ctd.asset.network_id
keyword
claroty_ctd.asset.num_alerts
long
claroty_ctd.asset.os.architecture
keyword
claroty_ctd.asset.os.build
keyword
claroty_ctd.asset.os.revision
keyword
claroty_ctd.asset.os.service_pack
keyword
claroty_ctd.asset.parsed
boolean
claroty_ctd.asset.patch_count
long
claroty_ctd.asset.plc_slots.plcslotinformations.description
keyword
claroty_ctd.asset.plc_slots.plcslotinformations.information_type
long
claroty_ctd.asset.plc_slots.plcslotinformations.priority
long
claroty_ctd.asset.plc_slots.plcslotinformations.slot
long
claroty_ctd.asset.plc_slots.plcslotinformations.value.plcinformation.address
keyword
claroty_ctd.asset.plc_slots.plcslotinformations.value.plcinformation.description
keyword
claroty_ctd.asset.plc_slots.plcslotinformations.value.plcinformation.firmware_version
keyword
claroty_ctd.asset.plc_slots.plcslotinformations.value.plcinformation.information_type
long
claroty_ctd.asset.plc_slots.plcslotinformations.value.plcinformation.name
keyword
claroty_ctd.asset.plc_slots.plcslotinformations.value.plcinformation.order_number
keyword
claroty_ctd.asset.plc_slots.plcslotinformations.value.plcinformation.priority
long
claroty_ctd.asset.plc_slots.plcslotinformations.value.plcinformation.product
keyword
claroty_ctd.asset.plc_slots.plcslotinformations.value.plcinformation.serial_number
keyword
claroty_ctd.asset.plc_slots.plcslotinformations.value.plcinformation.vendor
keyword
claroty_ctd.asset.project_parsed.builder_hostname
keyword
claroty_ctd.asset.project_parsed.creation_time
long
claroty_ctd.asset.project_parsed.creation_ver
keyword
claroty_ctd.asset.project_parsed.description
keyword
claroty_ctd.asset.project_parsed.information_type
long
claroty_ctd.asset.project_parsed.modification_time
long
claroty_ctd.asset.project_parsed.modification_ver
keyword
claroty_ctd.asset.project_parsed.name
keyword
claroty_ctd.asset.project_parsed.priority
long
claroty_ctd.asset.project_parsed.project_ver
keyword
claroty_ctd.asset.protocol
keyword
claroty_ctd.asset.purdue_level
double
claroty_ctd.asset.resource_id
keyword
claroty_ctd.asset.risk_level
long
claroty_ctd.asset.serial_number
keyword
claroty_ctd.asset.site_id
keyword
claroty_ctd.asset.site_name
keyword
claroty_ctd.asset.special_hints.name
keyword
claroty_ctd.asset.special_hints.value
long
claroty_ctd.asset.state
keyword
claroty_ctd.asset.subnet_id
keyword
claroty_ctd.asset.timestamp
date
claroty_ctd.asset.usb_devices_count
long
claroty_ctd.asset.valid
boolean
claroty_ctd.asset.vendor
keyword
claroty_ctd.asset.virtual_zone.id
keyword
claroty_ctd.asset.virtual_zone.name
keyword
claroty_ctd.asset.vlan
keyword
data_stream.dataset
Data stream dataset.
constant_keyword
data_stream.namespace
Data stream namespace.
constant_keyword
data_stream.type
Data stream type.
constant_keyword
event.dataset
Event dataset.
constant_keyword
event.module
Event module.
constant_keyword
input.type
Type of filebeat input.
keyword
log.offset
Log offset.
long
tags
User defined tags.
keyword

Baseline

This is the baseline dataset.

Example

An example event for baseline looks as following:

{
    "@timestamp": "2024-07-09T12:03:12.000Z",
    "agent": {
        "ephemeral_id": "b90e99a6-b998-47ad-9883-8bb06ad3be20",
        "id": "7090d98c-c949-469c-9209-a0de3adaaa65",
        "name": "docker-fleet-agent",
        "type": "filebeat",
        "version": "8.14.0"
    },
    "claroty_ctd": {
        "baseline": {
            "approved": true,
            "category": 3,
            "category_access": 1,
            "description": "CIP : Read attribute 'Minor Events Reported' of object FaultLog",
            "destination": {
                "asset_id": "51",
                "entity": {
                    "asset_name": "Chemical_plant",
                    "id": "2",
                    "ipv4": "1.128.0.0",
                    "mac": "00:00:BC:C7:8F:06",
                    "resource_id": "2-1",
                    "virtual_zone_id": "3",
                    "virtual_zone_name": "PLC: Rockwell"
                }
            },
            "frequency": 0,
            "has_values": false,
            "hash": "513826395598251000",
            "id": "1",
            "last_seen": "2023-04-17T07:30:09.000Z",
            "last_updated": "2024-07-09T12:03:12.000Z",
            "protocol": "CIP",
            "resource_id": "1-1",
            "session_state": 3,
            "site_id": "1",
            "source": {
                "asset_id": "1",
                "entity": {
                    "id": "1",
                    "ipv4": "1.128.0.0",
                    "resource_id": "1-1",
                    "virtual_zone": {
                        "id": "2",
                        "name": "HMI: Rockwell"
                    }
                }
            },
            "time": "2023-04-17T07:30:09.000Z",
            "type": 0,
            "valid": true
        }
    },
    "data_stream": {
        "dataset": "claroty_ctd.baseline",
        "namespace": "38694",
        "type": "logs"
    },
    "destination": {
        "ip": [
            "1.128.0.0"
        ],
        "mac": "00-00-BC-C7-8F-06"
    },
    "ecs": {
        "version": "8.11.0"
    },
    "elastic_agent": {
        "id": "7090d98c-c949-469c-9209-a0de3adaaa65",
        "snapshot": false,
        "version": "8.14.0"
    },
    "event": {
        "agent_id_status": "verified",
        "category": [
            "network"
        ],
        "dataset": "claroty_ctd.baseline",
        "hash": "513826395598251000",
        "id": "1",
        "ingested": "2024-09-05T09:58:36Z",
        "kind": "event",
        "original": "{\"approved\":true,\"category\":3,\"category_access\":1,\"description\":\"CIP : Read attribute 'Minor Events Reported' of object FaultLog\",\"destination_asset_id\":51,\"destination_entity\":{\"asset_name\":\"Chemical_plant\",\"id\":2,\"ipv4\":\"1.128.0.0\",\"mac\":\"00:00:BC:C7:8F:06\",\"resource_id\":\"2-1\",\"virtual_zone_id\":3,\"virtual_zone_name\":\"PLC: Rockwell\"},\"dst_port\":null,\"frequency\":0,\"has_values\":false,\"hash\":513826395598251000,\"id\":1,\"interval\":null,\"last_seen\":\"2023-04-17T07:30:09+00:00\",\"last_updated\":\"2024-07-09T12:03:12+00:00\",\"protocol\":\"CIP\",\"resource_id\":\"1-1\",\"session_state\":3,\"site_id\":1,\"source_asset_id\":1,\"source_entity\":{\"asset_name\":\"1.128.0.0\",\"id\":1,\"ipv4\":\"1.128.0.0\",\"resource_id\":\"1-1\",\"virtual_zone_id\":2,\"virtual_zone_name\":\"HMI: Rockwell\"},\"src_port\":null,\"timestamp\":\"2023-04-17T07:30:09+00:00\",\"transmission\":null,\"type\":0,\"valid\":true}",
        "type": [
            "info"
        ]
    },
    "input": {
        "type": "cel"
    },
    "message": "CIP : Read attribute 'Minor Events Reported' of object FaultLog",
    "network": {
        "protocol": "cip"
    },
    "related": {
        "hash": [
            "513826395598251000"
        ],
        "ip": [
            "1.128.0.0"
        ]
    },
    "source": {
        "ip": [
            "1.128.0.0"
        ]
    },
    "tags": [
        "preserve_original_event",
        "preserve_duplicate_custom_fields",
        "forwarded",
        "claroty_ctd-baseline"
    ]
}

Exported fields

FieldDescriptionType
@timestamp
Event timestamp.
date
claroty_ctd.baseline.approved
boolean
claroty_ctd.baseline.category
long
claroty_ctd.baseline.category_access
long
claroty_ctd.baseline.description
keyword
claroty_ctd.baseline.destination.asset_id
keyword
claroty_ctd.baseline.destination.entity.asset_name
keyword
claroty_ctd.baseline.destination.entity.id
keyword
claroty_ctd.baseline.destination.entity.ipv4
ip
claroty_ctd.baseline.destination.entity.mac
keyword
claroty_ctd.baseline.destination.entity.resource_id
keyword
claroty_ctd.baseline.destination.entity.virtual_zone_id
keyword
claroty_ctd.baseline.destination.entity.virtual_zone_name
keyword
claroty_ctd.baseline.destination.port
long
claroty_ctd.baseline.frequency
long
claroty_ctd.baseline.has_values
boolean
claroty_ctd.baseline.hash
keyword
claroty_ctd.baseline.id
keyword
claroty_ctd.baseline.interval
long
claroty_ctd.baseline.last_seen
date
claroty_ctd.baseline.last_updated
date
claroty_ctd.baseline.protocol
keyword
claroty_ctd.baseline.resource_id
keyword
claroty_ctd.baseline.session_state
long
claroty_ctd.baseline.site_id
keyword
claroty_ctd.baseline.source.asset_id
keyword
claroty_ctd.baseline.source.entity.asset_name
keyword
claroty_ctd.baseline.source.entity.id
keyword
claroty_ctd.baseline.source.entity.ipv4
ip
claroty_ctd.baseline.source.entity.mac
keyword
claroty_ctd.baseline.source.entity.resource_id
keyword
claroty_ctd.baseline.source.entity.virtual_zone.id
keyword
claroty_ctd.baseline.source.entity.virtual_zone.name
keyword
claroty_ctd.baseline.source.port
long
claroty_ctd.baseline.time
date
claroty_ctd.baseline.transmission
keyword
claroty_ctd.baseline.type
long
claroty_ctd.baseline.valid
boolean
data_stream.dataset
Data stream dataset.
constant_keyword
data_stream.namespace
Data stream namespace.
constant_keyword
data_stream.type
Data stream type.
constant_keyword
event.dataset
Event dataset.
constant_keyword
event.module
Event module.
constant_keyword
input.type
Type of filebeat input.
keyword
log.offset
Log offset.
long
tags
User defined tags.
keyword

Changelog

VersionDetailsKibana version(s)

0.1.1

Bug fix View pull request
Ensure empty replacement is included in configuration.

ā€”

0.1.0

Enhancement View pull request
Initial release.

ā€”

On this page