Event Class IDs
The following table describes the meaning of each Event Class ID and the data included in the extension for that event type. For an explanation of how OT Security uses each of the CEF fields included in the Extensions, see Extension Parameters — CEF Keys.
ID | Name | Description |
---|---|---|
0 | Unknown | Unidentified alert event. |
01-94 | [the type of activity that occurred] | A command sent to execute a particular type of activity to a controller in the network. For example, the Rockwell Code Download event type indicates a command sent for code download to a Rockwell controller. |
95 | New Asset Discovered | Detected a new asset in the network. |
96 | New Module | Addition of a new module to a backplane in the network. |
97 | IP Conflict | Multiple assets in the network use the same IP address. |
98 | ARP Scan Detected | Detected an Address Resolution Protocol (ARP) scan indicative of reconnaissance activity in the network. |
99 |
SYN Scan Detected Port Scan |
Detected a SYN scan indicative of reconnaissance activity in the network. |
100-107 | Inactive Asset for [time period] Minutes | An asset was inactive in the network for the specified period of time. Possible time periods are: 15 minutes, 30 minutes, one hour, 3 hours, 12 hours, one day, or one week. |
108 | Snapshot Mismatch |
The latest snapshot, which reflects the current state of the program deployed on a controller, differs from the previous snapshot of the same controller. |
109 | Unauthorized Conversation | Detected a conversation between the specified assets in the network. |
110 | Change in State | The controller changed between operational states. For example, running, stopped, test, and so on. |
111 | Change in Key State | Detected a change to the controller state by adjusting the physical key position. |
112 | Change in FW Version | Detected a change to the firmware running on the controller. |
113 | Unauthorized Tag Write | Detected an unauthorized CIP (Common Industrial Protocol) write of tag values on a controller. |
114 | Open Port | Detected a new open port in your network. |
115 | Baseline Deviation | Detected a new connection between assets that did not communicate with each other during the Network Baseline sampling period. |
116 | Module not Seen | A previously identified module is no longer detected on its backplane. |
117 | RDP Connection With Authentication | An RDP (Remote Desktop Protocol) connection was made between assets in your network, using authentication credentials. |
118 | RDP Connection Without Authentication | Detected an RDP connection between assets in your network, without using authentication credentials. |
119 | Intrusion Detected | Detected network traffic indicative of intrusion threats based on the Suricata Emerging Threat rules. |
120 | Modbus Exception Occurred: Illegal Function | Detected an illegal function error code in the Modbus protocol. |
121 | Modbus Exception Occurred: Illegal Data Address | Detected an illegal data address error code in the Modbus protocol. |
122 | Modbus Exception Occurred: Illegal Data Value | Detected an illegal data address error code in the Modbus protocol. |
123 | Traffic Data Spike Detected | Detected a dramatic increase in the volume of network traffic. |
124 | Traffic Conversation Count Spike Detected | Detected a dramatic increase in the number of conversations. |
125 | Change in Windows USB State | Detected a connection to or removal of a USB device from a Windows-based workstation. |
126-143 | [the type of activity that occurred] | A command sent to a controller in the network to execute a particular type of activity. For example, the Rockwell Code Download event type indicates a command sent for a code download to a Rockwell controller. |
144-166 | DNP3 [the type of Event that occurred] | A command sent using the DNP3 protocol. Example commands include select, operate, warm/cold restart, and so on. It also detects errors originating from internal indicators such as unsupported function codes and parameter errors. |
167-169 | Honeywell [the type of Event that occurred] | A command sent to a Honeywell PLC causing a state change: warm restart, cold restart, or stop. |
170, 171 | FTP [the type of Event that occurred] | An attempt to log in using the FTP protocol (failed or successful). |
172-174 | Telnet [the type of Event that occurred] | An attempt to log in using the Telnet protocol (successful, failed, or not detected). |
175-177 | Saia [the type of Event that occurred] | A command sent to a Saia PLC causing a state change: start, cold restart, or stop. |
178-186 | [the type of activity that occurred] | A command sent to execute a particular type of activity to a controller in the network. |
187-188 | MMS Define Variable List | A command sent to define the Manufacturing Message Specification (MMS) variable list. |
188 | MMS Delete Variable List | A command sent to delete the MMS variable list. |
189 | ICCP Create Data Set | A command sent using the Inter-Control Center Communications Protocol (ICCP). |
190 | ICCP Bilateral Table Exchange | A command sent using the Inter-Control Center Communications Protocol (ICCP). |
191 | Rediscovered Asset | Rediscovered a new asset in the network. |
192-195 | [the type of activity that occurred] | A command sent to execute a particular type of activity to a controller in the network. |
196-197 | IEC 61850 [the type of event that occurred] | Detected a subscription failure or an authorized write command. |