Splunk Enterprise Security

can some one help which CIM model maps to below event

vikram1583
Explorer

can you see if these events can fit into the Malware data model
LogName=Application
SourceName=Trend Micro OfficeScan Server
EventCode=800
EventType=3
Type=Warning
ComputerName=XXXXXXX.XXXXXX.com
User=NOT_TRANSLATED
Sid=S-1-5-18
SidType=0
TaskCategory=System
OpCode=None
RecordNumber=432219
Keywords=Classic
Message=C&C callback detected

Compromised Host: XXXXXX-XX93

IP Address: XX.XXX.19.XX

Domain: XXX prod-dba\

Date/Time: 1/2/2020 10:22:27

Callback address: xx.xxx.xx.43

C&C risk level: Dangerous

C&C list source: Relevance Rule
Action: Logged

0 Karma

kchamplin_splun
Splunk Employee
Splunk Employee
0 Karma

woodcock
Esteemed Legend

Yes, that event should be in the Malware datamodel.

0 Karma
Get Updates on the Splunk Community!

[Puzzles] Solve, Learn, Repeat: Dynamic formatting from XML events

This challenge was first posted on Slack #puzzles channelFor a previous puzzle, I needed a set of fixed-length ...

Enter the Agentic Era with Splunk AI Assistant for SPL 1.4

  🚀 Your data just got a serious AI upgrade — are you ready? Say hello to the Agentic Era with the ...

Stronger Security with Federated Search for S3, GCP SQL & Australian Threat ...

Splunk Lantern is a Splunk customer success center that provides advice from Splunk experts on valuable data ...