Splunk Enterprise Security

can some one help which CIM model maps to below event

vikram1583
Explorer

can you see if these events can fit into the Malware data model
LogName=Application
SourceName=Trend Micro OfficeScan Server
EventCode=800
EventType=3
Type=Warning
ComputerName=XXXXXXX.XXXXXX.com
User=NOT_TRANSLATED
Sid=S-1-5-18
SidType=0
TaskCategory=System
OpCode=None
RecordNumber=432219
Keywords=Classic
Message=C&C callback detected

Compromised Host: XXXXXX-XX93

IP Address: XX.XXX.19.XX

Domain: XXX prod-dba\

Date/Time: 1/2/2020 10:22:27

Callback address: xx.xxx.xx.43

C&C risk level: Dangerous

C&C list source: Relevance Rule
Action: Logged

0 Karma

kchamplin_splun
Splunk Employee
Splunk Employee
0 Karma

woodcock
Esteemed Legend

Yes, that event should be in the Malware datamodel.

0 Karma
Career Survey
First 500 qualified respondents will receive a $20 gift card! Tell us about your professional Splunk journey.
Get Updates on the Splunk Community!

.conf25 Global Broadcast: Don’t Miss a Moment

Hello Splunkers, .conf25 is only a click away.  Not able to make it to .conf25 in person? No worries, you can ...

Observe and Secure All Apps with Splunk

 Join Us for Our Next Tech Talk: Observe and Secure All Apps with SplunkAs organizations continue to innovate ...

What's New in Splunk Observability - August 2025

What's New We are excited to announce the latest enhancements to Splunk Observability Cloud as well as what is ...