Documentation

Event Types Reference

Complete reference for all 67 standard event types, 28 agent types, and 10 auto-detected patterns. Use these as the event field in your POST /v1/events API calls.

Why use predefined event types?

Every predefined event type triggers specialized detection rules that custom events don't get. For example, auth.login.failure automatically activates brute force counting, credential spray detection, and distributed botnet tracking. A custom event like custom.login.fail only gets generic enrichment (GeoIP, OSINT feeds, request scanning).

21 detector functions • 46 alert types • 5 kill chain patterns • 10 detector families for FLASH-tier classification

1

Event Type Format

All event types must conform to the following validation rules before being accepted by the ingestor.

Validation regex
^[a-z][a-z0-9]{0,29}(\.[a-z][a-z0-9_]{0,29}){1,3}$

Rules

  • 2–4 dot-separated segments
  • Lowercase alphanumeric + underscore only
  • Each segment starts with a letter, max 30 characters
  • Total length max 100 characters

Valid examples

auth.login.successpayment.completedserver.ssh.login.failurecustom.form.submitted

Invalid examples

Login Faileduppercase, spaces
authonly 1 segment
AUTH.LOGINuppercase
a.b.c.d.e5 segments
2

Standard Prefixes

SOCWarden recognizes 7 standard prefixes. Events with these prefixes automatically activate the corresponding detection pipelines.

Prefixes
PrefixDescription
auth.*Authentication events
account.*Account management
data.*Data operations
admin.*Admin operations
api.*API/request events
server.*Server-level (agent)
custom.*Explicitly custom
3

Event Types by Category

All recognized event types grouped by category. Click a category to expand or collapse its table.

|

Custom Events (custom.*)

Any event type starting with custom. is accepted. These get full enrichment (GeoIP, threat feeds, risk scoring) but no event-type-specific base score. Use custom threat models (Pro+) to define detection rules for custom events.

custom.form.submittedcustom.order.placedcustom.webhook.received
4

Auto-Detected Patterns (Inferred Types)

When users send generic events (like api.request), the enricher auto-tags them if patterns match. These inferred types are added as tags and activate additional detection pipelines.

Inferred types
Inferred TypeTrigger ConditionDetection Activated
inferred:auth.failureHTTP 401/403 + auth-related pathBrute force counting
inferred:auth.successHTTP 200 + auth path + actor_id presentImpossible travel, geo-anomaly
inferred:auth.logoutPath contains /logout or /signoutSession tracking
inferred:data.exportPath contains /export or /download + rows/size in metadataBulk export detection
inferred:account.createPath contains register/signup + email presentDisposable email check
inferred:account.deleteHTTP DELETE + /users or /accounts pathAccount lifecycle
inferred:role.changeMetadata contains role/permission/privilege keysSession anomaly
inferred:mfa.eventMetadata contains mfa/2fa/totp/otp
inferred:password.eventPath contains password/reset + emailHIBP check
inferred:rate.limitedHTTP status 429
5

Risk Scoring Summary

The following event types carry a non-zero base risk score. The composite risk score is additive: base score + threat intel + network flags + behavioral detections = final score (0–100).

Base risk scores
Event TypeBase ScoreCategory
server.container.escape_attempt+60Server
server.log.tampered+50Server
server.log.cleared+45Server
auth.mfa.bypass_attempted+40Auth
server.process.suspicious+35Server
server.network.port_scan_detected+35Server
auth.mfa.disabled+30Auth
admin.user.impersonated+25Admin
account.role.changed+20Account
account.deleted+15Account
account.email.changed+15Account
data.exported+15Data
server.file.modified+15Server
server.firewall.rule_removed+15Server
server.user.su+15Server
account.phone.changed+12Account
api.unauthorized+12API
server.file.deleted+12Server
server.file.permission_changed+12Server
server.cron.added+12Server
auth.login.failure+10Auth
auth.password.changed+10Auth
auth.oauth.connected+10Auth
account.suspended+10Account
data.bulk_import+10Data
data.downloaded+10Data
admin.config.changed+10Admin
server.user.created+10Server
server.user.deleted+10Server
server.user.sudo+10Server
server.cron.modified+10Server
auth.password.reset_requested+8Auth
auth.oauth.disconnected+8Auth
data.modified+8Data
admin.settings.updated+8Admin
admin.api_key.revoked+8Admin
server.ssh.login.failure+8Server
server.firewall.rule_added+8Server
auth.session.revoked+5Auth
auth.token.revoked+5Auth
data.accessed+5Data
admin.billing.updated+5Admin
admin.api_key.created+5Admin
api.rate_limited+5API
api.request.failed+3API
server.process.executed+3Server
server.container.started+3Server

Risk score is additive.Base score + threat intel + network flags + behavioral detections = composite score (0–100). An event with base score 0 can still reach high risk if it triggers threat intel matches (e.g., Tor exit node, Spamhaus-listed IP) or behavioral detections (e.g., impossible travel).

More Documentation