|
Abnormal Security
(abnormal_security_threat)
|
| email.message_id |
Message ID |
Unique identifier of the email |
| srcip |
Source IP |
Source IP address |
| email.recipient.addresses |
Recipient Address(es) |
All recipients of the email, including those in the 'To', 'CC' (carbon copy), and 'BCC' (blind carbon copy) fields. |
| email.to.addresses |
To Address(es) |
Primary intended recipients of the email. These are the email addresses explicitly listed in the 'To' field of the email. |
| email.from.address |
From Address |
Email address that appears in the 'From' field of the email. It is the address that the recipient sees as the sender of the email. |
| email.subject |
Email Subject |
Subject line of the email |
| abnormal_security.sentTime |
Sent Time |
Time the email was sent |
| abnormal_security.receivedTime |
Received Time |
Time the email was received |
| abnormal_security.attackStrategy |
Attack Strategy |
Strategy used in the attack |
| abnormal_security.attackType |
Attack Type |
Type of attack |
| abnormal_security.attackVector |
Attack Vector |
Vector used in the attack |
| abnormal_security.remediationStatus |
Remediation Status |
Status of the remediation |
| abnormal_security.autoRemediated |
Auto-Remediated |
Whether the email was auto-remediated or not |
| abnormal_security.summaryInsights |
Summary Insights |
Summary insights about the email |
| abnormal_security.urlCount |
URL Count |
Number of URLs in the email |
| abnormal_security.attachmentCount |
Attachment Count |
Number of attachments in the email |
| abnormal_security.abxPortalUrl |
ABX Portal URL |
URL to the ABX portal for more details |
| url_list |
URL List |
List of URLs in the email |
|
|
Acronis (Antimalware protection)
(acronis_cyber_protect)
|
| event.threat.name |
Alert Type |
Alert type |
| acronis_cyber_protect.details.threatName |
Acronis Threat Name |
Acronis threat name |
| event.category |
Alert Category |
Alert category |
| host.name |
Host Name |
Host name |
| event.severity_str |
Acronis Severity Level |
Acronis severity level |
| file.name |
File Name |
File name |
| file.path |
File Path |
File path |
| file.hash.sha1 |
File SHA1 |
File SHA1 |
| file.hash.md5 |
File MD5 |
File MD5 |
| file.hash.sha256 |
File SHA256 |
File SHA256 |
|
|
Acronis (EDR)
(acronis_cyber_protect)
|
| event.threat.name |
Alert Type |
Alert type |
| event.category |
Alert Category |
Alert category |
| host.name |
Host Name |
Host name |
| event.severity_str |
Acronis Severity Level |
Acronis severity level |
| acronis_cyber_protect.details.redirectLink |
Acronis Alert Redirect Link |
Acronis alert redirect link |
| acronis_cyber_protect.details.verdict |
Acronis Alert Verdict |
Acronis alert verdict |
|
|
Acronis (Email security)
(acronis_cyber_protect)
|
| event.threat.name |
Alert Type |
Alert type |
| event.category |
Alert Category |
Alert category |
| event.severity_str |
Acronis Severity Level |
Acronis severity level |
| email.from.address |
Email From Address |
Email from address |
| email.subject |
Email Subject |
Email Subject |
|
|
Acronis (URL filtering)
(acronis_cyber_protect)
|
| event.threat.name |
Alert Type |
Alert type |
| acronis_cyber_protect.details.threatName |
Acronis Threat Name |
Acronis threat name |
| event.category |
Alert Category |
Alert category |
| host.name |
Host Name |
Host name |
| event.severity_str |
Acronis Severity Level |
Acronis severity level |
| url |
URL |
URL |
| process.pid |
Process ID |
Process ID |
| process.executable |
Process Path |
Process path |
|
|
Armis
(armis)
|
| armis.alertId |
Alert ID |
Alert ID assigned by Armis |
| armis.severity |
Armis Severity |
Original severity from Armis |
| armis.title |
Alert Title |
Title of the alert |
| armis.policyTitle |
Policy Title |
Title of the policy that triggered the alert |
| armis.affectedDevicesCount |
Affected Devices Count |
Number of devices affected by the alert |
| armis.deviceIds |
Affected Device IDs |
IDs of the affected devices |
| host_list |
Affected Devices |
List of affected devices |
| ip |
Host IP |
Host IP address |
| mac |
Host MAC |
Host MAC address |
| armis.status |
Armis Alert Status |
Current status of the alert from Armis |
|
|
Avanan (Delivered)
(avanan) 
|
| email.from.address |
From Address |
Who the email is from |
| email.to.addresses |
To Address(es) |
Primary intended recipient of the email |
| email.sender.address |
Sender Address |
Who actually sent the email on behalf of the primary sender |
| email.recipient.addresses |
Recipient Address(es) |
Who received the email (including CC and BCC) |
| email.subject |
Email Subject |
Email subject |
| url_list |
URL List |
URL(s) in the email |
| domain_list |
Email Links Domain(s) |
Email links domain(s) |
| file_list |
File List |
File name of the malicious file |
| name |
File Name |
File name |
| hash.md5 |
Host Hash |
File hash |
| threat_indicator.labels |
File Hash Reputation Label(s) |
File hash reputation label(s) |
| threat_indicator.sources |
File Hash Reputation Source(s) |
File hash reputation source(s) |
|
|
Avanan (Quarantined)
(avanan) 
|
| email.from.address |
From Address |
Who the email is from |
| email.to.addresses |
To Address(es) |
Primary intended recipient of the email |
| email.sender.address |
Sender Address |
Who actually sent the email on behalf of the primary sender |
| email.recipient.addresses |
Recipient Address(es) |
Who received the email (including CC and BCC) |
| email.subject |
Email Subject |
Email subject |
| url_list |
URL List |
URL(s) in the email |
| domain_list |
Email Links Domain(s) |
Email links domain(s) |
| file_list |
File List |
File name of the malicious file |
| name |
File Name |
File name |
| hash.md5 |
Host Hash |
File hash |
| threat_indicator.labels |
File Hash Reputation Label(s) |
File hash reputation label(s) |
| threat_indicator.sources |
File Hash Reputation Source(s) |
File hash reputation source(s) |
|
|
AWS GuardDuty
(aws_guardduty)
|
| aws_guardduty.Title |
Alert Title |
AWS GuardDuty alert title |
| host_list |
Host IP Address(es) |
Private IP addresses of the network interfaces of the resource instance |
| user.name |
User Name |
User name associated with the access key details of the resource |
| event.threat.name |
Threat Name |
Threat name |
| event.severity |
AWS GuardDuty Severity Score |
AWS GuardDuty severity score |
| cloud.resource.type |
Cloud Resource Type |
Cloud resource type |
| cloud.resource.id |
Cloud Resource ID |
Cloud resource ID |
| cloud.resource.name |
Cloud Resource Name |
Cloud resource name |
|
|
Bitdefender IP
(bitdefender_ip)
|
| host.name |
Host Name |
Host name |
| host.ip |
Host IP Address |
Host IP address |
| srcip |
Source IP |
Source IP address |
|
|
Bitdefender Threat
(bitdefender_threat)
|
| host.name |
Host Name |
Host name |
| host.ip |
Host IP Address |
Host IP address |
| event.threat.name |
Threat Type |
Threat type |
|
|
Bitdefender URL
(bitdefender_url)
|
| host.name |
Host Name |
Host name |
| host.ip |
Host IP Address |
Host IP address |
| url |
URL |
URL |
|
|
Blackberry CylancePROTECT
(cylance_protect)
|
| host.name |
Host Name |
Computer name |
| host.ip |
Host IP Address |
Host IP address |
| file_name |
File Name |
File name |
| file_path |
File Path |
File path |
| process_name |
Process Name |
Process name |
|
|
Broadcom SES Incident
(broadcom_ses)
|
| event.severity |
Broadcom SES Severity |
Original severity from Broadcom SES |
| broadcom.incident_uid |
Broadcom SES Incident ID |
Unique identifier for the Broadcom SES incident |
| broadcom.events |
Event List |
User activities and process executions detected in this incident |
| device_name |
Device Name |
Device name |
| device_ip |
Device IP |
Device IP address |
| user.name |
User Name |
User name |
| process.pid |
Process ID |
Process ID |
| process.file.path |
Process Path |
Process path |
| process.file.name |
Process Name |
Process name |
| process.file.sha1 |
File SHA1 Hash |
SHA1 hash of the malicious file |
| process.file.md5 |
File MD5 Hash |
MD5 hash of the malicious file |
| process.file.sha2 |
File SHA256 Hash |
SHA256 hash of the malicious file |
| parent.pid |
Parent Process ID |
Parent process ID |
| parent.file.path |
Parent Process Path |
Parent process path |
| parent.file.sha1 |
Parent File SHA1 Hash |
SHA1 hash of the parent file |
| parent.file.sha2 |
Parent File SHA256 Hash |
SHA256 hash of the parent file |
| parent.file.md5 |
Parent File MD5 Hash |
MD5 hash of the parent file |
| file.name |
File Name |
File name |
| process_list |
Process Threat Intelligence |
Threat intelligence information for processes |
| threat_indicator.labels |
Threat Labels |
Threat intelligence labels for this process hash |
| threat_indicator.sources |
Threat Sources |
Threat intelligence sources that identified this process hash |
| parent.threat_indicator.labels |
Parent Threat Labels |
Threat intelligence labels for the parent process hash |
| parent.threat_indicator.sources |
Parent Threat Sources |
Threat intelligence sources that identified the parent process hash |
|
|
CrowdStrike
(crowdstrike)
|
| host.name |
Computer Name |
Computer name |
| hostip |
Host IP Address |
Host IP address |
| user.name |
User Name |
User name |
| file.name |
File Name |
File name |
| file.path |
File Path |
File path |
| process.command_line |
Command Line |
Command line |
|
|
Cybereason
(cybereason)
|
| user_list |
User Names |
User names |
| file.name |
File Name |
File name |
| process.name |
Process Name |
Process name |
| host_list |
Host IP Address(es) |
Host IP address(es) |
|
|
Cynet
(cynet)
|
| host.ip |
Host IP Address |
Host IP address |
| event.threat.name |
Threat Name |
Event threat name |
| file.name |
File Name |
File name |
|
|
Deep Instinct
(deepinstinct)
|
| deep_instinct.msp_name |
MSP Name |
MSP name |
| event.id |
Event ID |
Event ID |
| deep_instinct.type |
Type |
Deep Instinct event type |
| host.name |
Host Name |
Host name |
| host.ip |
Host IP Address |
Host IP address |
| file.path |
File Path |
File path |
| file.file_hash |
File Hash |
File hash |
| file.threat_indicator.labels |
File Hash Reputation Label(s) |
File hash reputation label(s) |
| file.threat_indicator.sources |
File Hash Reputation Source(s) |
File hash reputation source(s) |
| deep_instinct.action |
Event Action |
Deep Instinct event action |
| deep_instinct.threat_type |
Deep Instinct Threat Type |
Deep Instinct threat type |
| event.severity_str |
Original Deep Instinct Severity |
Original Deep Instinct severity |
|
|
ESET Cloud Office Security
(eset_cloud_office_security)
|
| eset.Tenant |
ESET Tenant |
ESET Cloud Office Security tenant name |
| eset.OperationId |
ESET Operation ID |
ESET Cloud Office Security operation ID |
| eset.ScanResult |
ESET Threat Type |
ESET Cloud Office Security threat type |
| eset.Action |
ESET Event Action |
ESET Cloud Office Security event action |
| file.name |
File Name |
File name |
| file.hash.sha1 |
File SHA1 Hash |
SHA1 hash of the malicious file |
| srcip |
Source IP |
Email sender source IP address |
| email.from.address |
Sender Address |
Sender IP address |
| email.to.addresses |
Recipient Address(es) |
Recipient IP address(es) |
| email.subject |
Email Subject |
Email subject |
|
|
ESET Protect
(eset_protect_filtered_websites_event)
|
| srcip |
Source IP |
Source IP address |
| dstip |
Destination IP |
Destination IP address |
| eset.rule_id |
ESET Protect Rule ID |
ESET Protect rule ID |
| eset.event_type |
ESET Protect Event Type |
ESET Protect event type |
| event.severity_str |
ESET Protect Event Severity |
ESET Protect event severity |
| event.threat.name |
ESET Protect Threat Name |
ESET Protect threat name |
| process.executable |
Process Path |
Process path |
| user.name |
User Name |
User name |
| host.name |
Host Name |
Host name |
| file.hash.sha1 |
File SHA1 Hash |
File SHA1 hash |
| file.threat_indicator.labels |
File Hash Reputation Label(s) |
File hash reputation label(s) |
| file.threat_indicator.sources |
File Hash Reputation Source(s) |
File hash reputation source(s) |
|
|
ESET Protect
(eset_protect_firewall_aggregated_event)
|
| srcip |
Source IP |
Source IP address |
| dstip |
Destination IP |
Destination IP address |
| eset.event_type |
ESET Protect Event Type |
ESET Protect event type |
| event.severity_str |
ESET Protect Event Severity |
ESET Protect event severity |
| event.threat.name |
ESET Protect Threat Name |
ESET Protect threat name |
| process.executable |
Process Path |
Process path |
| user.name |
User Name |
User name |
|
|
ESET Protect
(eset_protect_inspect_alert)
|
| host.ip |
Host IP |
Host IP address |
| host.name |
Host Name |
Host name |
| eset.event_type |
ESET Protect Event Type |
ESET Protect event type |
| eset.rulename |
ESET Protect Rule Name |
ESET Protect rule name |
| process.executable |
Process Path |
Process path |
| user.name |
User Name |
User name |
| event.severity_str |
ESET Protect Event Severity |
ESET Protect event severity |
| eset.eiconsolelink |
ESET Protect Console Link |
ESET Protect console link |
| eset.source_uuid |
ESET Protect Source UUID |
ESET Protect source UUID |
| file.hash.sha1 |
File SHA1 Hash |
File SHA1 hash |
| file.threat_indicator.labels |
File Hash Reputation Label(s) |
File Hash reputation label(s) |
| file.threat_indicator.sources |
File Hash Reputation Source(s) |
File Hash reputation source(s) |
|
|
ESET Protect
(eset_protect_threat_event)
|
| host.ip |
Host IP |
Host IP address |
| host.name |
Host Name |
Host name |
| eset.event_type |
ESET Protect Event Type |
ESET Protect event type |
| process.executable |
Process Path |
Process path |
| user.name |
User Name |
User name |
| event.severity_str |
ESET Protect Event Severity |
ESET Protect event severity |
| eset.source_uuid |
ESET Protect Source UUID |
ESET Protect source UUID |
| file.hash.sha1 |
File SHA1 Hash |
File SHA1 hash |
| file.threat_indicator.labels |
File Hash Reputation Label(s) |
File Hash reputation label(s) |
| file.threat_indicator.sources |
File Hash Reputation Source(s) |
File Hash reputation source(s) |
|
|
Fortinet Lacework
(laceworkt)
|
| fortinet_lacework.START_TIME |
Start Time |
Time and date when the hourly aggregation time period starts |
| fortinet_lacework.END_TIME |
End Time |
Time and date when the hourly aggregation time period ends |
| event.threat.name |
Alert Type |
Type of the alert |
| fortinet_lacework.EVENT_ID |
Event ID |
Unique identifier generated for this event by Lacework FortiCNAPP |
| fortinet_lacework.EVENT_MODEL |
Event Model |
Data model used for generating the alert |
| fortinet_lacework.EVENT_ACTOR |
Event Actor |
Event actor that categorizes the type of an alert such as application, process, files, etc |
| fortinet_lacework.ENTITY_MAP.User |
User(s) |
User(s) |
| KEY.username |
User Name |
User's name |
| PROPS.hostname |
Host Name |
User's host name |
| fortinet_lacework.ENTITY_MAP.CT_User |
CloudTrail User(s) |
CloudTrail user(s) |
| KEY.username |
User Name |
User's name |
| PROPS.account |
User Account |
User's account |
| fortinet_lacework.ENTITY_MAP.SourceIpAddress |
Source IP Address(es) |
Source IP address(es) |
| KEY.ip_addr |
IP Address |
IP address |
| fortinet_lacework.ENTITY_MAP.FileExePath |
File Path(s) |
File path(s) |
| KEY.exe_path |
File Path |
File path |
| fortinet_lacework.ENTITY_MAP.Process |
Process(es) |
Process(es) |
| PROPS.hostname |
Host Name |
Host name |
| PROPS.cmdline |
Command Line |
Command line |
| PROPS.pid |
PID |
Unique identifier of the process |
| fortinet_lacework.ENTITY_MAP.Machine |
Machine(s) |
Machine(s) |
| PROPS.hostname |
Host Name |
Host name |
| PROPS.internal_ip_addr |
IP Address |
IP address |
|
|
Google Workspace Alert
(google_workspace_alert)
|
| source |
Alert Source |
Alert source
|
| type |
Alert Type |
Alert type |
| rule.name |
Rule Name |
Alert rule name |
| host.ip |
Login IP Address |
IP address associated with the warning event |
| data.email |
Data Email |
Email of the user to which this event belongs |
| securityInvestigationToolLink |
Investigation Tool Link |
Google Workspace security investigation tool link |
| user.id |
User ID |
User ID |
| user.name |
User Name |
User name |
| email.from.address |
Email From Address |
Email from IP address |
| email.recipient.addresses |
Email Recipient Addresses |
Email recipient addresses |
|
|
Huntress
(huntress_incident)
|
| huntress.organization_name |
Organization Name |
Huntress organization name |
| huntress.security_products |
Originating Security Products |
Originating security products |
| huntress.incident_report_url |
Incident Report URL |
Huntress incident report URL |
| huntress.user_url |
User URL |
Huntress user URL |
| huntress.host_url |
Host URL |
Huntress host URL |
| host.name |
Host Name |
Host name |
| host.ip |
Host IP |
Host IP address |
| user_name |
User Name |
User name |
| event.threat_list |
Huntress Event Threat List |
Huntress event threat list |
| name |
Threat Name |
Huntress Event Threat Name |
| severity |
Threat Severity |
Huntress Event Threat Severity |
|
|
HYAS Protect
(hyas_protect_block) 
|
| srcip |
Client IP |
Client IP address |
| dns.question.name |
Domain |
Domain |
| hyas_protect.registrar |
Domain Registrar |
Domain registrar |
| domain_creation |
Domain Creation Date |
Domain creation date |
| hyas_protect.verdictStatus |
HYAS Protect Verdict Status |
HYAS Protect verdict status:
-
Allow: allow
-
Block: block
-
Highly Suspicious: bad
-
Watch Engine: suspicious
|
| hyas_protect.reason.type |
HYAS Protect Reason Type |
HYAS Protect reason type |
| hyas_protect.reason.lists |
HYAS Protect Reason Lists |
HYAS Protect reason lists |
| id |
ID |
Reason ID |
| name |
Name |
Reason name |
| datatype |
Datatype |
Reason data type |
| dns.resolved_ip |
Resolved IP(s) |
Resolved IP address(es) |
| dns.answers |
DNS Answer(s) |
DNS answer(s) |
| name |
Domain name |
Domain name to which this resource record pertains. If a chain of CNAME is being resolved, each answer’s name should be the one that corresponds with the answer’s data. |
| type |
Data Type |
Type of data contained in this resource record |
| data |
Data |
Data in this resource record |
|
|
HYAS Protect
(hyas_protect_bad) 
|
| srcip |
Client IP |
Client IP address |
| dns.question.name |
Domain |
Domain |
| hyas_protect.registrar |
Domain Registrar |
Domain registrar |
| domain_creation |
Domain Creation Date |
Domain creation date |
| hyas_protect.verdictStatus |
HYAS Protect Verdict Status |
HYAS Protect verdict status:
-
Allow: allow
-
Block: block
-
Highly Suspicious: bad
-
Watch Engine: suspicious
|
| hyas_protect.reason.type |
HYAS Protect Reason Type |
HYAS Protect reason type |
| hyas_protect.reason.lists |
HYAS Protect Reason Lists |
HYAS Protect reason lists |
| id |
ID |
Reason ID |
| name |
Name |
Reason name |
| datatype |
Datatype |
Reason data type |
| dns.resolved_ip |
Resolved IP(s) |
Resolved IP address(es) |
| dns.answers |
DNS Answer(s) |
DNS answer(s) |
| name |
Domain name |
Domain name to which this resource record pertains. If a chain of CNAME is being resolved, each answer’s name should be the one that corresponds with the answer’s data. |
| type |
Data Type |
Type of data contained in this resource record |
| data |
Data |
Data in this resource record |
|
|
HYAS Protect
(hyas_protect_suspicious) 
|
| srcip |
Client IP |
Client IP address |
| dns.question.name |
Domain |
Domain |
| hyas_protect.registrar |
Domain Registrar |
Domain registrar |
| domain_creation |
Domain Creation Date |
Domain creation date |
| hyas_protect.verdictStatus |
HYAS Protect Verdict Status |
HYAS Protect verdict status:
-
Allow: allow
-
Block: block
-
Highly Suspicious: bad
-
Watch Engine: suspicious
|
| hyas_protect.reason.type |
HYAS Protect Reason Type |
HYAS Protect reason type |
| hyas_protect.reason.lists |
HYAS Protect Reason Lists |
HYAS Protect reason lists |
| id |
ID |
Reason ID |
| name |
Name |
Reason name |
| datatype |
Datatype |
Reason data type |
| dns.resolved_ip |
Resolved IP(s) |
Resolved IP address(es) |
| dns.answers |
DNS Answer(s) |
DNS answer(s) |
| name |
Domain name |
Domain name to which this resource record pertains. If a chain of CNAME is being resolved, each answer’s name should be the one that corresponds with the answer’s data. |
| type |
Data Type |
Type of data contained in this resource record |
| data |
Data |
Data in this resource record |
|
|
LimaCharlie Events
(limacharlie_alert)
|
| srcip_host |
Source Host |
Name of the workstation |
| srcip |
Source IP |
IP address of the source |
| srcport |
Source IP Port |
Port of the source IP address |
| host.name |
Host Name |
Host name |
| host.ip |
Host IP |
Host IP address |
| limacharlie.detect.event.ACTION |
Action |
Event action |
| limacharlie.detect.event.REGISTRY_KEY |
Registry Key |
Registry key |
| limacharlie.detect.event.REGISTRY_VALUE |
Registry Value |
Registry value |
| process.name |
Process File Path |
File path of the process |
| process.hash.sha256 |
Process File Hash |
File hash of the process |
| process.threat_indicator.labels |
Process File Hash Reputation Label(s) |
Process file hash reputation label(s) |
| process.threat_indicator.sources |
Process File Hash Reputation Source(s) |
Process file hash reputation source(s) |
| event.severity_str |
LimaCharlie Severity |
Original severity of the LimaCharlie alert |
| limacharlie.detect.event.EVENT.EventData.TargetUserSid |
SID |
SID of the target user |
| file.path |
File Path |
Path of the file |
| file.hash.sha256 |
File Hash |
SHA256 hash of the file |
| file.threat_indicator.labels |
File Hash Reputation Label(s) |
File hash reputation label(s) |
| file.threat_indicator.sources |
File Hash Reputation Source(s) |
File hash reputation source(s) |
| process.command_line |
Process Command Line |
Command line of the process |
| process.pid |
Process ID |
Process ID |
| user.name |
User Name |
User name |
| limacharlie.detect.event.EVENT.System.EventID |
Event ID |
Event ID |
| limacharlie.detect.event.EVENT.EventData.LogonType |
Logon Type |
Logon type |
| limacharlie.detect.event.EVENT.EventData.ProcessName |
Process Name |
Process name |
| limacharlie.detect.event.PARENT.FILE_PATH |
Parent Process File Path |
File path of the parent process |
| limacharlie.detect.event.PARENT.HASH |
Parent Process File Hash |
File hash of the parent process |
| process.parent.threat_indicator.labels |
Parent Process File Hash Reputation Label(s) |
Reputation label(s) of the parent process file hash |
| process.parent.threat_indicator.sources |
Parent Process File Hash Reputation Source(s) |
Reputation source(s) of the parent process file hash |
| process.parent.command_line |
Parent Process Command Line |
Command line of the parent process |
| process.parent.pid |
Parent Process ID |
Parent process ID |
| limacharlie.detect.event.PARENT.USER_NAME |
Parent User Name |
User name of the parent process |
| limacharlie.link |
LimaCharlie Alert Link |
LimaCharlie alert link |
| limacharlie.source_rule |
Source Rule |
Source rule that LimaCharlie used to generate the alert |
| limacharlie.detect_mtd.references |
Rule References |
References of the rule |
|
|
Microsoft Defender for Endpoint
(ms_defender_atp)
|
| host.name |
Host Name |
Host name |
| host.ip |
Host IP Address |
Host IP address |
| user.name |
User Name |
User name |
| user.domain |
User Domain |
User domain |
| threat |
Threat Name |
Threat name |
| file_list |
File List |
File list |
| process_list |
Process List |
Process list |
|
|
Microsoft Entra ID (formerly Azure Active Directory)
(azure_ad_risk_detection)
|
| userDisplayName |
User Name |
User name |
| ipAddress |
Host IP Address |
Host IP address |
| riskEventType |
Event Type |
Risk event type |
|
|
Microsoft Defender for Cloud
(microsoft_defender_cloud)
|
| microsoft_defender_cloud.AlertUri |
Microsoft Defender for Cloud Alert URI |
Microsoft Defender for Cloud alert URI |
| event.severity_str |
Microsoft Defender for Cloud Severity |
Original severity from Microsoft Defender for Cloud |
| microsoft_defender_cloud.AlertDisplayName |
Microsoft Defender for Cloud Alert Name |
Microsoft Defender for Cloud alert name |
| cloud.resource.name |
Cloud Resource Name |
Cloud resource name |
| cloud.resource.type |
Cloud Resource Type |
Cloud resource type |
| cloud.resource.id |
Cloud Resource ID |
Cloud resource ID |
| srcip_list |
Source IP List |
Source IP address list |
| srcip |
Source IP |
Source IP address |
| user.name |
User Name |
User name |
| host.name |
Host Name |
Host name |
| host.ip |
Host IP Address |
Host IP address |
| file.name |
File Name |
File name |
| file.path |
File Path |
File path |
| file.hash.md5 |
File MD5 Hash |
File MD5 hash |
| file.hash.sha256 |
File SHA256 Hash |
File SHA256 hash |
| process.executable |
Process Executable |
Process executable |
| process.id |
Process ID |
Process ID |
| process.command_line |
Process Command Line |
Process command line |
| process.parent.name |
Parent Process Name |
Parent process name |
| process.parent.executable |
Parent Process Executable |
Parent process executable |
| process.parent.id |
Parent Process ID |
Parent process ID |
| process.parent.command_line |
Parent Process Command Line |
Parent process command line |
| microsoft_defender_cloud.ExtendedProperties |
Extended Properties |
Extended properties |
| microsoft_defender_cloud.ExtendedProperties.Potential causes |
Potential Causes |
Potential causes |
| microsoft_defender_cloud.ExtendedProperties.Recommended actions |
Recommended Actions |
Recommended actions |
| microsoft_defender_cloud.ExtendedProperties.Event of Interest |
Event of Interest |
Event of interest |
| microsoft_defender_cloud.RemediationSteps |
Remediation Steps |
Remediation steps |
|
|
Microsoft Defender for Cloud Apps
(ms_defender_for_cloud_apps) 
|
| microsoft_defender_for_cloud_apps.URL |
Microsoft Defender for Cloud Apps URL |
Microsoft Defender for Cloud Apps URL |
| event.threat_list |
Risk category |
Threat list |
| name |
Risk category |
Microsoft Defender for Cloud Apps risk category |
| event.severity_str |
Microsoft Defender for Cloud Apps Severity |
Original severity value from Microsoft Defender for Cloud Apps |
| microsoft_defender_for_cloud_apps.isPreview |
Preview |
Alerts that have been recently released as GA |
| user.id |
User ID |
User ID of entity that was involved in this alert |
| user.name |
Username |
Username of entity that was involved in this alert |
| srcip |
Source IP Address |
Source IP address of attack that was involved in this alert |
| srcip_host |
Source Host |
Name of the source workstation involved in this alert |
| dstip_host |
Destination Host |
Name of the destination workstation involved in this alert |
| observables |
Entities |
List of observables related to the alert |
| name |
Entity name |
Entity name |
| type |
Entity type |
Entity type |
| id |
Entity ID |
Entity ID |
|
|
Microsoft Defender XDR
(microsoft_defender_xdr)
|
| event.severity_str |
Severity |
Alert severity |
| event.threat.name |
Threat Name |
Threat name |
| microsoft_graph_security_api.evidence |
Evidence |
Evidence |
| type |
Type |
Evidence type |
| userAccount.userPrincipalName |
User Name |
User's name |
| userAccount.azureAdUserId |
User ID |
User's ID |
| fileDetails.fileName |
File Name |
File name |
| fileDetails.filePath |
File Path |
File path |
| fileDetails.sha256 |
SHA256 |
SHA256 hash |
| fileDetails.md5 |
MD5 |
MD5 hash |
| fileDetails.sha1 |
SHA1 |
SHA1 hash |
| hostName |
Host Name |
Host name |
| ipInterfaces |
IP Interfaces |
IP interfaces of the device during the time of the alert |
| ipAddress |
IP Address |
IP address |
|
|
Microsoft Office 365
(microsoft_365)
|
| event.threat.name |
Threat Name |
Threat name |
| event.severity_str |
Microsoft 365 Severity Level |
Microsoft 365 severity level |
| event.category |
Category |
Microsoft 365 alert category |
| Source |
Source |
Microsoft 365 alert source |
| AlertType |
Alert Type |
Microsoft 365 alert type
|
| event_summary.alert_entity_list |
Alert Entity List |
Microsoft 365 Alert entity list |
| username |
User Name |
User name |
|
|
Microsoft Sentinel
(ms_sentinel_incident)
|
| microsoft_sentinel.Title |
Incident Title |
Microsoft Sentinel incident title |
| microsoft_sentinel.ModifiedBy |
Modified By |
Microsoft Sentinel modified by |
| microsoft_sentinel.AdditionalData.alertsCount |
Alerts Count |
Microsoft Sentinel additional data alerts count |
| microsoft_sentinel.IncidentUrl |
Incident Link |
Microsoft Sentinel incident link |
| microsoft_sentinel.SourceSystem |
Source System |
Microsoft Sentinel source system |
| microsoft_sentinel.AlertIds |
Alert IDs |
Microsoft Sentinel alert IDs |
|
|
Mimecast Attachment Protect
(mimecast_attachment_protect)
Mimecast API 1.0
|
| srcip |
Source IP Address |
Source IP address of the original message that contained the malicious file |
| file.name |
File Name |
File name of the malicious file |
| mimecast.fileExt |
File Extension |
File extension of the malicious file |
| mimecast.Size |
File Size |
Size (in bytes) of the malicious file |
| mimecast.sizeAttachment |
File Size |
Size (in bytes) of the malicious file |
| file.hash.md5 |
File MD5 Hash |
MD5 hash of the malicious file |
| file.hash.sha1 |
File SHA1 Hash |
SHA1 hash of the malicious file |
| file.hash.sha256 |
File SHA256 Hash |
SHA256 hash of the malicious file |
| mimecast.fileMime |
File MIME Type |
Detected MIME type of the malicious file |
| email.sender.address |
Sender Address |
Sender address |
| email.recipient.addresses |
Recipient Address(es) |
Recipient address(es) |
| email.subject |
Email Subject |
Email subject |
| mimecast.senderDomain |
Sender Domain |
Sender domain |
| mimecast.Route |
The Route of the Message |
Route of the message |
| mimecast.route |
The Route of the Message |
Route of the message |
|
|
Mimecast AV
(mimecast_av)
Mimecast API 1.0
|
| srcip |
Source IP Address |
Source IP address of the original message |
| file.name |
File Name |
File name |
| mimecast.fileExt |
File Extension |
File extension |
| mimecast.fileExtension |
File Extension |
File extension |
| mimecast.Size |
Email Size |
Total size of the email |
| mimecast.emailSize |
Email Size |
Total size of the email |
| file.hash.md5 |
File MD5 Hash |
File MD5 hash |
| file.hash.sha1 |
File SHA1 Hash |
File SHA1 hash |
| file.hash.sha256 |
File SHA256 Hash |
File SHA256 hash |
| mimecast.fileMime |
File MIME Type |
File MIME type |
| email.sender.address |
Sender Address |
Sender address |
| mimecast.senderDomain |
Sender Domain |
Sender domain |
| email.recipient.addresses |
Recipient Address(es) |
Recipient address(es) |
| email.subject |
Email Subject |
Email subject |
| mimecast.Route |
The Route of the Message |
Route of the message |
| mimecast.route |
The Route of the Message |
Route of the message |
| mimecast.Virus |
Virus Signature |
Virus signature |
| mimecast.virusFound |
Virus Signature |
Virus signature |
|
|
Mimecast Impersonation Protect
(mimecast_email_impersonation_protect)
Mimecast API 1.0
Mimecast API 2.0
|
| mimecast.aCode |
Mimecast aCode |
Unique ID used to track the email through the different log types from Mimecast |
| srcip |
Source IP Address |
Source IP address of the original message |
| email.sender.address |
Sender Address |
Sender address |
| email.recipient.addresses |
Recipient Address(es) |
Recipient address(es) |
| email.subject |
Email Subject |
Email subject |
| event.threat.name |
Alert Definition |
Alert definition |
| mimecast.Hits |
Number of Items Flagged |
Number of items flagged for the message |
| mimecast.Route |
The Route of the Message |
Route of the message |
|
|
Mimecast Internal Email Protect
(mimecast_internal_email_protect)
Mimecast API 1.0
Mimecast API 2.0
|
|
mimecast.aCode
|
Mimecast aCode |
Unique ID used to track the email through the different log types from Mimecast |
|
mimecast.processingId
|
Mimecast aCode |
Unique ID used to track the email through the different log types from Mimecast |
| srcip |
Source IP Address |
Source IP address of the sending mail server |
| url |
Clicked URL |
URL the user clicked |
| event.threat.name |
URL Category |
URL category |
| email.sender.address |
Sender Address |
Sender address |
| email.recipient.addresses |
Recipient Address(es) |
Recipient address(es) |
| email.subject |
Email Subject |
Email subject |
| mimecast.Route |
The Route of the Message |
Route of the message |
|
|
Mimecast Malicious Receipt Log
(mimecast_receipt_with_virus)
Mimecast API 1.0
Mimecast API 2.0
|
|
mimecast.aCode
|
Mimecast aCode |
Unique ID used to track the email through the different log types from Mimecast |
|
mimecast.processingId
|
Mimecast aCode |
Unique ID used to track the email through the different log types from Mimecast |
| srcip |
Source IP Address |
Source IP address of the sending mail server |
| email.sender.address |
Sender Address |
Sender address |
| email.recipient.addresses |
Recipient Address(es) |
Recipient address(es) |
| email.subject |
Email Subject |
Email subject |
|
mimecast.Error
|
Errors Occurred |
Information about any errors that occurred during receipt |
|
mimecast.receiptErrors
|
Errors Occurred |
Information about any errors that occurred during receipt |
|
mimecast.Dir
|
Email Direction |
Direction of the email based on the sending and receiving domains |
|
mimecast.direction
|
Email Direction |
Direction of the email based on the sending and receiving domains |
|
mimecast.Virus
|
Virus Signature |
Virus signature |
|
mimecast.virusFound
|
Virus Signature |
Virus signature |
|
mimecast.Act
|
Action |
Action taken at the receipt stage |
|
mimecast.action
|
Action |
Action taken at the receipt stage |
|
mimecast.RejInfo
|
Rejection Information |
Rejection information if the email was rejected at the receipt stage |
|
mimecast.rejectionInfo
|
Rejection Information |
Rejection information if the email was rejected at the receipt stage |
|
mimecast.RejType
|
Rejection Type |
Rejection type if the email was rejected at the receipt stage |
|
mimecast.rejectionType
|
Rejection Type |
Rejection type if the email was rejected at the receipt stage |
|
mimecast.TlsVer
|
TLS Version |
TLS version used if the email was received using TLS |
|
mimecast.tlsVersion
|
TLS Version |
TLS version used if the email was received using TLS |
|
mimecast.Cphr
|
TLS Cipher |
TLS cipher used if the email was received using TLS |
|
mimecast.tlsCipher
|
TLS Cipher |
TLS cipher used if the email was received using TLS |
|
|
Mimecast URL Protect
(mimecast_url_protect)
Mimecast API 1.0
|
| srcip |
Source IP Address |
Source IP address of the sending mail server |
| url |
Clicked URL |
URL the user clicked |
| event.threat.name |
URL Category |
URL category |
| event.reason |
Reason |
Event reason |
| email.sender.address |
Sender Address |
Sender address |
| email.recipient.addresses |
Recipient Address(es) |
Recipient address(es) |
| email.subject |
Email Subject |
Email subject |
| mimecast.action |
Mimecast Action |
Mimecast action |
| mimecast.senderDomain |
Sender Domain |
Sender domain |
| mimecast.route |
The Route of the Message |
Route of the message |
|
|
Netskope Alert (Breach)
(netskope_protect_breach)
|
| netskopewsg.type |
Netskope Alert Type |
Netskope alert type |
| netskopewsg.breach_id |
Netskope Breach ID |
Netskope breach ID |
| netskopewsg.alert_name |
Alert Name |
Alert name |
| srcip |
Source IP |
Source IP address |
| dstip |
Destination IP |
Destination IP address |
| host.ip |
Host IP (User's IP) |
Host IP address (user's IP address) |
| user.name |
User Name |
User name associated with Netskope account |
| netskopewsg.matched_username |
Matched User Name |
Email address associated with the breached access method |
| url |
URL |
URL |
| event.severity_str |
Netskope Alert Severity |
Netskope alert severity |
| netskopewsg.breach_score |
Netskope Breach Score |
Netskope breach score |
| file.hash.sha256 |
File SHA256 Hash |
SHA256 hash of the file |
| file.hash.md5 |
File MD5 Hash |
MD5 hash of the file |
| file.threat_indicator.labels |
File Hash Reputation Label(s) |
File hash reputation label(s) |
| file.threat_indicator.sources |
File Hash Reputation Source(s) |
File hash reputation source(s) |
|
|
Netskope Alert (Connection)
(netskope_protect_connection)
|
| netskopewsg.type |
Netskope Alert Type |
Netskope alert type |
| netskopewsg.connection_id |
Netskope Connection ID |
Netskope connection ID |
| srcip |
Source IP |
Source IP address |
| dstip |
Destination IP |
Destination IP address |
| host.ip |
Host IP (User's IP) |
Host IP address (user's IP address) |
| user.name |
User Name |
User name |
| url |
URL |
URL |
| event.severity_str |
Netskope Alert Severity |
Netskope alert severity |
| file.hash.sha256 |
File SHA256 Hash |
SHA256 hash of the file |
| file.hash.md5 |
File MD5 Hash |
MD5 hash of the file |
| file.threat_indicator.labels |
File Hash Reputation Label(s) |
File hash reputation label(s) |
| file.threat_indicator.sources |
File Hash Reputation Source(s) |
File hash reputation source(s) |
|
|
Netskope Alert
(netskope_protect)
|
| netskopewsg.type |
Netskope Alert Type |
Netskope alert type |
| netskopewsg.breach_id |
Netskope Breach ID |
Netskope breach ID |
| netskopewsg.alert_name |
Alert Name |
Alert name |
| srcip |
Source IP |
Source IP address |
| dstip |
Destination IP |
Destination IP address |
| host.ip |
Host IP (User's IP) |
Host IP address (user's IP address) |
| host.name |
Host Name |
Host name |
| user.name |
User Name |
User name associated with Netskope account |
| netskopewsg.matched_username |
Matched User Name |
Email address associated with the breached access method |
| netskopewsg.activity |
Activity |
Activity |
| netskopewsg.action |
Action |
Action |
| netskopewsg.policy |
Policy Name |
Policy name |
| netskopewsg.app |
Application |
Application |
| url |
Application URL |
Application URL |
| event.severity_str |
Netskope Alert Severity |
Netskope alert severity |
| netskopewsg.breach_score |
Netskope Breach Score |
Netskope breach score |
| file.hash.sha256 |
File SHA256 Hash |
SHA256 hash of the file |
| file.hash.md5 |
File MD5 Hash |
MD5 hash of the file |
| file.threat_indicator.labels |
File Hash Reputation Label(s) |
File hash reputation label(s) |
| file.threat_indicator.sources |
File Hash Reputation Source(s) |
File hash reputation source(s) |
|
|
Netskope Alert (Malsite)
(netskope_protect_malsite)
|
| netskopewsg.type |
Netskope Alert Type |
Netskope alert type |
| event.threat.name |
Malsite Category |
Malsite category |
| netskopewsg.malsite_id |
Malsite ID |
Malsite ID |
| srcip |
Source IP |
Source IP address |
| dstip |
Destination IP |
Destination IP address |
| host.ip |
Host IP (User's IP) |
Host IP address (user's IP address) |
| user.name |
User Name |
User name |
| url |
Malsite URL |
Malsite URL |
| event.severity_str |
Netskope Alert Severity |
Netskope alert severity |
| file.hash.sha256 |
File SHA256 Hash |
SHA256 hash of the file |
| file.hash.md5 |
File MD5 Hash |
MD5 hash of the file |
| file.threat_indicator.labels |
File Hash Reputation Label(s) |
File hash reputation label(s) |
| file.threat_indicator.sources |
File Hash Reputation Source(s) |
File hash reputation source(s) |
|
|
Oracle Cloud Infrastructure (OCI) CloudGuard
(oci_cloudguard)
|
| event.type |
Problem Type |
Problem type |
| event.threat.name |
Threat Name |
Threat name |
| event.severity_str |
OCI Severity Level |
OCI CloudGuard severity level |
| cloud.resource.type |
Cloud Resource Type |
Cloud resource type |
| cloud.resource.id |
Cloud Resource ID |
Cloud resource ID |
| cloud.resource.name |
Cloud Resource Name |
Cloud resource name |
| oracle.data.additionalDetails.problemRecommendation |
Problem Recommendation |
Problem recommendation from OCI |
|
|
Palo Alto Networks Cortex XDR(PAN NGFW)
(palo_alto_cortex_xdr_ngfw)
|
| palo_alto_networks.name |
Alert Name |
Alert name |
| palo_alto_networks.source |
Source |
Alert source |
| palo_alto_networks.category |
Category |
Alert category |
| event.severity_str |
Palo Alto Networks Cortex XDR Alert Severity |
Palo Alto Networks Cortex XDR alert severity |
| host.name |
Host Name |
Host name |
| host.ip |
Host IP |
Host IP address |
| palo_alto_networks.alert_id |
Alert ID |
Alert ID |
| palo_alto_networks.action_pretty |
Action |
Action taken |
| palo_alto_networks.agent_version |
Agent Version |
Agent version |
| palo_alto_networks.resolution_status |
Status |
Resolution status |
| palo_alto_networks.events |
Network Events |
Network events |
| event_type |
Event Type |
Event type |
| fw_rule |
Rule Name |
Firewall rule name |
| fw_rule_id |
Rule ID |
Firewall rule ID |
| action_local_ip |
Local IP |
Local IP address |
| action_local_port |
Local Port |
Local port |
| action_remote_ip |
Remote IP |
Remote IP address |
| action_remote_port |
Remote Port |
Remote port |
| action_country |
Remote Country |
Remote country |
| dst_action_country |
Dest Country |
Destination country |
| fw_device_name |
Device Name |
Firewall device name |
| fw_serial_number |
Serial Number |
Firewall serial number |
| fw_interface_from |
From Interface |
From interface |
| fw_interface_to |
To Interface |
To interface |
| fw_app_id |
App ID |
Application ID |
| fw_app_category |
App Category |
App category |
| fw_app_subcategory |
App Subcategory |
App subcategory |
| fw_app_technology |
App Technology |
App technology |
|
|
Palo Alto Networks Cortex XDR(XDR Agent)
(palo_alto_cortex_xdr_agent)
|
| palo_alto_networks.name |
Alert Name |
Alert name |
| palo_alto_networks.source |
Source |
Alert source |
| palo_alto_networks.category |
Category |
Alert category |
| event.severity_str |
Palo Alto Networks Cortex XDR Alert Severity |
Palo Alto Networks Cortex XDR alert severity |
| host.name |
Host Name |
Host name |
| host.ip |
Host IP |
Host IP address |
| palo_alto_networks.alert_id |
Alert ID |
Alert ID |
| palo_alto_networks.action_pretty |
Action |
Action taken |
| palo_alto_networks.agent_version |
Agent Version |
Agent version |
| palo_alto_networks.resolution_status |
Status |
Resolution status |
| palo_alto_networks.events |
Events |
Related events |
| event_type |
Event Type |
Event type |
| user_name |
User Name |
User name |
| action_process_image_name |
Action Process |
Action process |
| actor_process_image_name |
Actor Process |
Actor process |
| action_process_image_sha256 |
Process SHA256 |
Process SHA256 |
| actor_process_image_sha256 |
Actor SHA256 |
Actor process SHA256 |
| action_process_image_command_line |
Command Line |
Process command line |
| actor_process_command_line |
Actor Command Line |
Actor command line |
| actor_process_image_path |
Actor Process Path |
Actor process path |
| actor_process_image_md5 |
Actor MD5 Hash |
Actor process MD5 |
| actor_process_signature_vendor |
Actor Signature Vendor |
Actor process signature vendor |
| actor_process_signature_status |
Actor Signature Status |
Actor process signature status |
| actor_process_os_pid |
Actor Process PID |
Actor process PID |
| actor_thread_thread_id |
Actor Thread ID |
Actor thread ID |
| causality_actor_process_image_name |
Causality Actor Process Name |
Causality actor process name |
| causality_actor_process_image_path |
Causality Actor Process Path |
Causality actor process path |
| causality_actor_process_command_line |
Causality Actor Command Line |
Causality actor process command line |
| causality_actor_process_image_sha256 |
Causality Actor SHA256 |
Causality actor process SHA256 |
| causality_actor_process_signature_vendor |
Causality Actor Signature Vendor |
Causality actor process signature vendor |
| causality_actor_process_signature_status |
Causality Actor Signature Status |
Causality actor process signature status |
| causality_actor_process_execution_time |
Causality Actor Execution Time |
Causality actor process execution time |
| action_process_image_path |
Action Process Path |
Action process path |
| action_process_signature_vendor |
Action Process Signature Vendor |
Action process signature vendor |
| action_process_signature_status |
Action Process Signature Status |
Action process signature status |
| action_file_name |
Action File Name |
Action file name |
| action_file_path |
Action File Path |
Action file path |
| action_file_sha256 |
Action File SHA256 |
Action file SHA256 |
| action_file_md5 |
Action File MD5 |
Action file MD5 |
|
|
Palo Alto Networks Cortex XDR(XDR Analytics BIOC)
(palo_alto_cortex_xdr_analytics_bioc)
|
| palo_alto_networks.name |
Alert Name |
Alert name |
| palo_alto_networks.category |
Category |
Alert category |
| palo_alto_networks.alert_type |
Alert Type |
Alert yype |
| event.severity_str |
Palo Alto Networks Cortex XDR Alert Severity |
Palo Alto Networks Cortex XDR alert severity |
| host.name |
Host Name |
Host name |
| host.ip |
Host IP |
Host IP address |
| palo_alto_networks.alert_id |
Alert ID |
Alert ID |
| palo_alto_networks.matching_service_rule_id |
Rule ID |
Matching rule ID |
| palo_alto_networks.matching_status |
Match Status |
Matching status |
| palo_alto_networks.action_pretty |
Action |
Action taken |
| palo_alto_networks.source |
Source |
Alert source |
| palo_alto_networks.agent_version |
Agent Version |
Agent version |
| palo_alto_networks.agent_os_type |
OS Type |
Operating System type |
| palo_alto_networks.agent_os_sub_type |
OS Version |
OS version |
| palo_alto_networks.resolution_status |
Status |
Resolution status |
| palo_alto_networks.mitre_tactic_id_and_name |
MITRE Tactics |
MITRE tactics |
| palo_alto_networks.mitre_technique_id_and_name |
MITRE Techniques |
MITRE techniques |
| palo_alto_networks.events |
Events |
Related events |
| event_type |
Event Type |
Event type |
| user_name |
User Name |
User name |
| action_process_image_name |
Action Process |
Action process |
| action_process_image_command_line |
Command Line |
Process command line |
| actor_process_image_path |
Actor Process Path |
Actor process path |
| action_process_image_sha256 |
Process SHA256 |
Process SHA256 |
| action_process_signature_vendor |
Action Process Signature Vendor |
Action process signature vendor |
| action_process_signature_status |
Action Process Signature Status |
Action process signature status |
| action_process_causality_id |
Action Process Causality ID |
Action process causality ID |
| actor_process_image_name |
Actor Process |
Actor process |
| actor_process_command_line |
Actor Command Line |
Actor command line |
| actor_process_image_path |
Actor Process Path |
Actor process path |
| actor_process_image_sha256 |
Actor SHA256 |
Actor process SHA256 |
| actor_process_image_md5 |
Actor MD5 Hash |
Actor process MD5 |
| actor_process_signature_vendor |
Actor Signature Vendor |
Actor process signature vendor |
| actor_process_signature_status |
Actor Signature Status |
Actor process signature status |
| actor_process_os_pid |
Actor Process PID |
Actor process PID |
| actor_process_instance_id |
Actor Process Instance ID |
Actor process instance ID |
| actor_process_causality_id |
Actor Process Causality ID |
Actor process causality ID |
| causality_actor_process_image_name |
Causality Actor Process Name |
Causality actor process name |
| causality_actor_process_image_path |
Causality Actor Process Path |
Causality actor process path |
| causality_actor_process_command_line |
Causality Actor Command Line |
Causality actor process command line |
| causality_actor_process_image_sha256 |
Causality Actor SHA256 |
Causality actor process SHA256 |
| causality_actor_process_image_md5 |
Causality Actor MD5 |
Causality actor process MD5 |
| causality_actor_process_signature_vendor |
Causality Actor Signature Vendor |
Causality actor process signature vendor |
| causality_actor_process_signature_status |
Causality Actor Signature Status |
Causality actor process signature status |
| causality_actor_process_execution_time |
Causality Actor Execution Time |
Causality actor process execution time |
| causality_actor_causality_id |
Causality Actor Causality ID |
Causality actor causality ID |
| os_actor_process_image_name |
OS Actor Process Name |
OS actor process name |
| os_actor_process_image_path |
OS Actor Process Path |
OS actor process path |
| os_actor_process_command_line |
OS Actor Command Line |
OS actor process command line |
| os_actor_process_image_sha256 |
OS Actor SHA256 |
OS actor process SHA256 |
| os_actor_process_signature_vendor |
OS Actor Signature Vendor |
OS actor process signature vendor |
| os_actor_process_signature_status |
OS Actor Signature Status |
OS actor process signature status |
| os_actor_process_os_pid |
OS Actor Process PID |
OS actor process PID |
| os_actor_process_instance_id |
OS Actor Process Instance ID |
OS actor process instance ID |
| os_actor_process_causality_id |
OS Actor Process Causality ID |
OS actor process causality ID |
| os_actor_thread_thread_id |
OS Actor Thread ID |
OS actor thread ID |
| event_timestamp |
Event Timestamp |
Event timestamp |
| association_strength |
Association Strength |
Association strength |
| event_sub_type |
Event Sub Type |
Event sub type |
| agent_install_type |
Agent Install Type |
Agent install type |
| agent_host_boot_time |
Agent Host Boot Time |
Agent host boot time |
| contains_featured_host |
Contains Featured Host |
Contains featured host |
| contains_featured_ip |
Contains Featured IP |
Contains featured IP address |
| contains_featured_user |
Contains Featured User |
Contains featured user |
| action_country |
Action Country |
Action country |
|
|
Palo Alto Networks Cortex XDR(XDR BIOC)
(palo_alto_cortex_xdr_bioc)
|
| palo_alto_networks.name |
Alert Name |
Alert name |
| palo_alto_networks.category |
Category |
Alert category |
| palo_alto_networks.bioc_category_enum_key |
BIOC Category |
BIOC category |
| palo_alto_networks.alert_type |
Alert Type |
Alert type |
| event.severity_str |
Palo Alto Networks Cortex XDR Alert Severity |
Palo Alto Networks Cortex XDR alert severity |
| host.name |
Host Name |
Host name |
| host.ip |
Host IP |
Host IP address |
| palo_alto_networks.alert_id |
Alert ID |
Alert ID |
| palo_alto_networks.case_id |
Case ID |
Case ID |
| palo_alto_networks.matching_service_rule_id |
Rule ID |
Matching rule ID |
| palo_alto_networks.matching_status |
Match Status |
Matching status |
| palo_alto_networks.action_pretty |
Action |
Action taken |
| palo_alto_networks.source |
Source |
Alert source |
| palo_alto_networks.agent_version |
Agent Version |
Agent version |
| palo_alto_networks.agent_os_type |
OS Type |
Operating System type |
| palo_alto_networks.agent_os_sub_type |
OS Version |
OS version |
| palo_alto_networks.resolution_status |
Status |
Resolution status |
| palo_alto_networks.bioc_indicator |
BIOC Indicator |
BIOC indicator details |
| palo_alto_networks.mitre_tactic_id_and_name |
MITRE Tactics |
MITRE tactics |
| palo_alto_networks.mitre_technique_id_and_name |
MITRE Techniques |
MITRE techniques |
| palo_alto_networks.events |
Events |
Related events |
| event_type |
Event Type |
Event type |
| user_name |
User Name |
User name |
| action_process_image_name |
Action Process |
Action process |
| action_process_image_command_line |
Command Line |
Process command line |
| actor_process_image_path |
Actor Process Path |
Actor process path |
| action_process_image_sha256 |
Process SHA256 |
Process SHA256 |
| action_process_signature_vendor |
Action Process Signature Vendor |
Action process signature vendor |
| action_process_signature_status |
Action Process Signature Status |
Action process signature status |
| action_process_causality_id |
Action Process Causality ID |
Action process causality ID |
| action_process_instance_id |
Action Process Instance ID |
Action process instance ID |
| actor_process_image_name |
Actor Process |
Actor process |
| actor_process_command_line |
Actor Command Line |
Actor command line |
| actor_process_image_path |
Actor Process Path |
Actor process path |
| actor_process_image_sha256 |
Actor SHA256 |
Actor process SHA256 |
| actor_process_image_md5 |
Actor MD5 Hash |
Actor process MD5 |
| actor_process_signature_vendor |
Actor Signature Vendor |
Actor process signature vendor |
| actor_process_signature_status |
Actor Signature Status |
Actor process signature status |
| actor_process_os_pid |
Actor Process PID |
Actor process PID |
| actor_process_instance_id |
Actor Process Instance ID |
Actor process instance ID |
| actor_process_causality_id |
Actor Process Causality ID |
Actor process causality ID |
| actor_thread_thread_id |
Actor Thread ID |
Actor thread ID |
| causality_actor_process_image_name |
Causality Actor Process Name |
Causality actor process name |
| causality_actor_process_image_path |
Causality Actor Process Path |
Causality actor process path |
| causality_actor_process_command_line |
Causality Actor Command Line |
Causality actor process command line |
| causality_actor_process_image_sha256 |
Causality Actor SHA256 |
Causality actor process SHA256 |
| causality_actor_process_image_md5 |
Causality Actor MD5 |
Causality actor process MD5 |
| causality_actor_process_signature_vendor |
Causality Actor Signature Vendor |
Causality actor process signature vendor |
| causality_actor_process_signature_status |
Causality Actor Signature Status |
Causality actor process signature status |
| causality_actor_process_execution_time |
Causality Actor Execution Time |
Causality actor process execution time |
| causality_actor_causality_id |
Causality Actor Causality ID |
Causality actor causality ID |
| os_actor_process_image_name |
OS Actor Process Name |
OS actor process name |
| os_actor_process_image_path |
OS Actor Process Path |
OS actor process path |
| os_actor_process_command_line |
OS Actor Command Line |
OS actor process command line |
| os_actor_process_image_sha256 |
OS Actor SHA256 |
OS actor process SHA256 |
| os_actor_process_signature_vendor |
OS Actor Signature Vendor |
OS actor process signature vendor |
| os_actor_process_signature_status |
OS Actor Signature Status |
OS actor process signature status |
| os_actor_process_os_pid |
OS Actor Process PID |
OS actor process PID |
| os_actor_process_instance_id |
OS Actor Process Instance ID |
OS actor process instance ID |
| os_actor_process_causality_id |
OS Actor Process Causality ID |
OS actor process causality ID |
| os_actor_thread_thread_id |
OS Actor Thread ID |
OS actor thread ID |
| event_timestamp |
Event Timestamp |
Event timestamp |
| association_strength |
Association Strength |
Association strength |
| dst_association_strength |
Dst Association Strength |
Destination association strength |
| event_sub_type |
Event Sub Type |
Event sub type |
| agent_install_type |
Agent Install Type |
Agent install type |
| agent_host_boot_time |
Agent Host Boot Time |
Agent host boot time |
| contains_featured_host |
Contains Featured Host |
Contains featured host |
| contains_featured_ip |
Contains Featured IP |
Contains featured IP address |
| contains_featured_user |
Contains Featured User |
Contains featured user |
| action_country |
Action Country |
Action country |
|
|
Palo Alto Networks Cortex XDR(XDR IOC)
(palo_alto_cortex_xdr_ioc_alerts)
|
| palo_alto_networks.name |
Alert Name |
Alert name |
| palo_alto_networks.category |
IOC Category |
IOC category |
| palo_alto_networks.bioc_category_enum_key |
IOC Type |
IOC type |
| event.severity_str |
Palo Alto Networks Cortex XDR Alert Severity |
Palo Alto Networks Cortex XDR alert severity |
| host.name |
Host Name |
Host name |
| host.ip |
Host IP |
Host IP address |
| palo_alto_networks.alert_id |
Alert ID |
Alert ID |
| palo_alto_networks.matching_service_rule_id |
Rule ID |
Matching rule ID |
| palo_alto_networks.matching_status |
Match Status |
Matching status |
| palo_alto_networks.action_pretty |
Action |
Action taken |
| palo_alto_networks.source |
Source |
Alert source |
| palo_alto_networks.agent_version |
Agent Version |
Agent version |
| palo_alto_networks.agent_os_type |
OS Type |
Operating System type |
| palo_alto_networks.agent_os_sub_type |
OS Version |
OS version |
| palo_alto_networks.resolution_status |
Status |
Resolution status |
| palo_alto_networks.events |
Events |
Related events |
| event_type |
Event Type |
Event type |
| user_name |
User Name |
User name |
| action_process_image_name |
Action Process |
Action process |
| actor_process_image_name |
Actor Process |
Actor process |
| action_process_image_sha256 |
Process SHA256 |
Process SHA256 |
| actor_process_image_sha256 |
Actor SHA256 |
Actor process SHA256 |
| action_process_image_command_line |
Command Line |
Process command line |
| actor_process_command_line |
Actor Command Line |
Actor command line |
| actor_process_image_path |
Actor Process Path |
Actor process path |
| actor_process_image_md5 |
Actor MD5 Hash |
Actor process MD5 |
| actor_process_signature_vendor |
Actor Signature Vendor |
Actor process signature vendor |
| actor_process_signature_status |
Actor Signature Status |
Actor process signature status |
| actor_process_os_pid |
Actor Process PID |
Actor process PID |
| actor_thread_thread_id |
Actor Thread ID |
Actor thread ID |
| causality_actor_process_image_name |
Causality Actor Process Name |
Causality actor process name |
| causality_actor_process_image_path |
Causality Actor Process Path |
Causality actor process path |
| causality_actor_process_command_line |
Causality Actor Command Line |
Causality actor process command line |
| causality_actor_process_image_sha256 |
Causality Actor SHA256 |
Causality actor process SHA256 |
| causality_actor_process_signature_vendor |
Causality Actor Signature Vendor |
Causality actor process signature vendor |
| causality_actor_process_signature_status |
Causality Actor Signature Status |
Causality actor process signature status |
| causality_actor_process_execution_time |
Causality Actor Execution Time |
Causality actor process execution time |
| action_process_image_path |
Action Process Path |
Action process path |
| action_process_signature_vendor |
Action Process Signature Vendor |
Action process signature vendor |
| action_process_signature_status |
Action Process Signature Status |
Action process signature status |
| action_file_name |
Action File Name |
Action file name |
| action_file_path |
Action File Path |
Action file path |
| action_file_sha256 |
Action File SHA256 |
Action file SHA256 |
| action_file_md5 |
Action File MD5 |
Action file MD5 |
|
|
Proofpoint TAP
(proofpoint_tap)
|
| srcip |
Source IP Address |
Source IP address |
| url |
Malicious URL |
Malicious URL that was clicked |
| email.subject |
Email Subject |
Email subject |
| email.sender.address |
Sender Address |
Who actually sent the email on behalf of the primary sender |
| email.from.address |
From Address |
Who the email is from |
| email.recipient.addresses |
Recipient Address(es) |
Who received the email (including CC and BCC) |
| email.to.addresses |
To Address(es) |
Primary intended recipient of the email |
| email.x_mailer |
X-Mailer |
X-Mailer content |
| event.threat_list |
Proofpoint Event Threat List |
Threat category: Threat artifact |
| name |
Threat Name |
Proofpoint threat name |
| category |
Threat Category |
Proofpoint threat category |
| attachment |
Threat Attachment |
Proofpoint threat attachment |
| severity |
Proofpoint Threat Severity |
Proofpoint threat severity |
| url |
Proofpoint Threat URL |
Proofpoint threat URL |
|
|
Recorded Future Alert
(recorded_future_normal_alert)
|
| recorded_future.rule.name |
Rule Name |
Rule name |
| recorded_future.owner_organisation_details.organisations |
Organizations as defined by Recorded Future |
Organizations as defined by Recorded Future |
| organisation_name |
Organization Name |
Organization name |
| recorded_future.log.triggered |
Alert Time |
Alert time |
| recorded_future.url.portal |
Recorded Future Alert URL |
Recorded Future alert URL |
| recorded_future.rule.url.portal |
Recorded Future Alert Rule URL |
Recorded Future alert rule URL |
|
|
Recorded Future Playbook Alert
(recorded_future_playbook_alert)
|
| recorded_future.playbook_alert_id |
Playbook Alert ID |
Playbook alert ID |
| recorded_future.priority |
Alert Priority |
Alert priority |
| recorded_future.panel_status.case_rule_label |
Playbook Alert Rule Name |
Playbook alert rule name |
| recorded_future.title |
Alert Title |
Alert title |
| recorded_future.panel_status.entity_name |
Entity Name |
Entity name |
| recorded_future.panel_status.entity_id |
Entity ID |
Entity ID |
| recorded_future.owner_organisation_details.organisations |
Organizations as defined by Recorded Future |
Organizations as defined by Recorded Future |
| organisation_name |
Organization Name |
Organization name |
| recorded_future.panel_status.targets |
Alert Targets |
Alert targets |
| recorded_future.panel_status.targets_obj |
Alert Targets |
Alert targets |
| name |
Alert Target |
Alert target |
| recorded_future.actions_taken |
Actions Taken |
Actions taken |
| recorded_future.panel_status.subject |
Affected Subject |
Affected subject |
| recorded_future.panel_status.authorization_url |
Authorization URL |
Authorization URL |
| recorded_future.panel_evidence_summary.malware_family.name |
Malware Family |
Malware family |
| recorded_future.panel_evidence_summary.compromised_host.malware_file |
Malware File |
Malware file |
| recorded_future.panel_evidence_summary.compromised_host.exfiltration_date |
Exfiltration Date |
Exfiltration date |
| recorded_future.panel_evidence_summary.compromised_host.os_username |
Compromised Host OS |
Compromised host OS username |
| recorded_future.panel_evidence_summary.compromised_host.computer_name |
Compromised Host Computer Name |
Compromised host computer name |
| recorded_future.panel_evidence_summary.infrastructure.ip |
Infrastructure IP Address |
Infrastructure IP address |
| recorded_future.panel_evidence_summary.repository.name |
Repository Name |
Repository name |
| recorded_future.panel_evidence_summary.repository.owner.name |
Repository Owner |
Repository owner |
| recorded_future.panel_status.entity_criticality |
Critical Level for Entity |
Critical level for entity |
| recorded_future.panel_status.lifecycle_stage |
Lifecycle Stage |
Lifecycle stage |
| recorded_future.panel_overview.event_type |
Alert Event Type |
Alert event type |
| recorded_future.panel_overview.location |
Alert Location |
Alert location |
| recorded_future.panel_overview.facility_name |
Facility Name |
Facility name |
|
|
SentinelOne Cloud
(sentinelone)
|
| host.name |
Host Name |
Computer name |
| host.ip |
Host IP Address |
Host IP address |
| file.name |
File Name |
File name |
| file.path |
File Path |
File path |
| process.parent.name |
Parent Process Name |
Originator process name |
|
|
Sophos Alerts
(sophos_alerts)
|
| host.ip |
Host IP |
Host IP address |
| user.name |
User Name |
User name |
| event.severity_str |
Sophos Severity |
Original severity level from Sophos |
| sophos.type |
Sophos Event Type |
Sophos event type |
| sophos.data.endpoint_platform |
Endpoint Platform |
Endpoint platform |
| file.path |
File Path |
File path |
| file.hash.sha256 |
File SHA256 |
File SHA256 |
|
|
Sophos Events
(sophos_events)
|
| host.ip |
Host IP |
Host IP address |
| user.name |
User Name |
User name |
| sophos.user_id |
User ID |
User ID |
| event.severity_str |
Sophos Severity |
Original severity level from Sophos |
| sophos.type |
Sophos Event Type |
Sophos event type |
| sophos.endpoint_type |
Endpoint Platform |
Endpoint platform |
| file.path |
File Path |
File path |
| file.hash.sha256 |
File SHA256 |
File SHA256 |
|
|
Trellix (FireEye) Endpoint Security (AMSI)
(fireeye_amsi)
|
| fireeye.source |
Alert Type |
FireEye alert source type |
| event.threat.name |
Threat Name |
FireEye alert name |
| event.severity_str |
Severity |
Severity level |
| host.ip |
Host IP Address |
Host IP address |
| host.name |
Host Name |
Host name |
| file_list |
File List |
File list |
| process_list |
Process List |
Process list: Pid (process command line) |
| event.url |
Event URL |
FireEye event URL |
|
|
Trellix (FireEye) Endpoint Security (IOC)
(fireeye_ioc)
|
| fireeye.source |
Alert Type |
FireEye alert source type |
| host.ip |
Host IP Address |
Host IP address |
| host.name |
Host Name |
Host name |
| event.name |
Event Name |
Event name |
| file.name |
File Name |
File name |
| process.name |
Process Name |
Process name |
| event.url |
Event URL |
FireEye event URL |
|
|
Trellix (FireEye) Endpoint Security (MAL)
(fireeye_mal)
|
| fireeye.source |
Alert Type |
FireEye alert source type |
| event.threat.name |
Threat Name |
FireEye alert name |
| fireeye.infection_type |
Infection Type |
FireEye Infection Type |
| event.severity_str |
FireEye Severity Level |
FireEye severity level |
| host.ip |
Host IP Address |
Host IP address |
| host.name |
Host IP Address |
Host name |
| file.path |
File Path |
File path |
| file.hash.md5 |
File MD5 Hash |
File MD5 hash |
| file.hash.sha1 |
File SHA1 Hash |
File SHA1 hash |
| file.hash.sha256 |
File SHA256 Hash |
File SHA256 hash |
| process.executable |
Event Actor Process Path |
FireEye event actor process path |
| process.pid |
Event Actor Process Pid |
FireEye event actor process Pid |
| event.url |
Event URL |
FireEye event URL |
|
|
Trellix (FireEye) Endpoint Security (PROCGUARD)
(fireeye_procguard)
|
| fireeye.source |
Alert Type |
FireEye alert source type |
| event.threat.name |
Threat Name |
FireEye alert name |
| host.ip |
Host IP Address |
Host IP address |
| host.name |
Host Name |
Host name |
| file_list |
File List |
File list |
| process_list |
Process List |
Process list: Pid (process command line) |
| event.url |
Event URL |
FireEye event URL |
|
|
Trellix MVISION
(trellix_mvision)
|
| process.command_line |
Command Line |
Full command line that was executed by the process |
| process.pid |
Process ID |
Unique identifier of the process |
| process.executable |
Executable |
Executable file associated with the process |
| host.name |
Host Name |
Name of the host where the event occurred |
| user.name |
User Name |
Name of the user associated with the event |
| event.severity_str |
Trellix MVISION Severity |
Original severity from Trellix MVISION |
| event.threat.name |
Threat Name |
Name of the detected threat or activity |
|
|
Trend Micro Vision One
(trendmicro_visionone)
|
| event.threat.name |
Threat Name |
Threat name |
| event.severity_str |
Trend Micro Vision One Severity |
Original Trend Micro Vision One severity level |
| trendmicro_visionone.workbenchLink |
Trend Micro Vision One Workbench Link |
Trend Micro Vision One workbench link |
| host_list |
Host(s) |
Related host(s) |
| name |
Host Name |
Host name |
| ips |
Host IP(s) |
Host IP addresses |
| process_list |
Process(es) |
Related process(es) |
| file_list |
File(s) |
Related file(s) |
| name |
File Name |
File name |
| path |
File Path |
File path |
| hash.md5 |
File MD5 Hash |
File MD5 hash |
| hash.sha1 |
File SHA1 Hash |
File SHA1 hash |
| hash.sha256 |
File SHA256 Hash |
File SHA256 hash |
| trendmicro_visionone.alertProvider |
Alert Provider |
Trend Micro Vision One alert provider |
| user_list |
User(s) |
Related user(s) |
|
|
Varonis DatAdvantage
(varonis_datadvantage)
|
| event.type |
Event Type |
Event type |
| event.threat.name |
Threat Name |
Threat name |
| event.severity |
CEF Severity Level |
Original CEF severity level |
| user.name |
User Name |
User name |
| file.name |
File Name |
File name |
| file.path |
File Path |
File path |
|
|
VMware Carbon Black Cloud
(carbonblack)
|
| host.name |
Host Name |
Computer name |
| host.external_ip |
Host Name |
Host external IP address |
| host.ip |
Host Internal IP Address |
Host internal IP address |
| process.name |
Process Name |
Process name |
| event.description |
Event Reason |
Event reason |
|
|
Windows Defender Antivirus
(windows_defender_antivirus)
|
| event.ms_incident_id |
Incident ID |
Windows Defender incident ID |
| threat |
Threat Name |
Threat name |
| host.name |
Host Name |
Computer name |
| hostip |
Host IP Address |
Host IP address |
| file.path |
File Path |
File path |
| process.name |
Process Name |
Process name |
|