Parsers and Generated Fields

Tag Fields Created by Parser darktrace-detect
  • #Cps.version

  • #Vendor

  • #ecs.version

  • #event.dataset

  • #event.kind

  • #event.module

  • #event.outcome

  • #observer.type

Fields Identified by Parser darktrace-detect
Vendor FieldCPS FieldDescription
Vendor.dstdestination.addressDestination address for CEF DCIP logs
Vendor.macdestination.macDestination MAC for CEF DCIP logs
Vendor.attachment_sha1s[]email.attachments[].file.hash.sha1Email attachment SHA1 hashes
Vendor.attachment_sha256s[]email.attachments[].file.hash.sha256Email attachment SHA256 hashes
Vendor.directionemail.directionEmail direction
Vendor.fromemail.from.address[0]Email sender address
Vendor.message_idemail.message_idEmail message ID
Vendor.subjectemail.subjectEmail subject
Vendor.recipients[]email.to.address[]Email recipient addresses
Vendor.modelevent.actionEvent action for Antigena events
Vendor.typeevent.actionEvent action for audit events
Vendor.codeidevent.codeEvent code for Antigena events
Vendor.creationTimeevent.createdEvent creation time
Vendor.endevent.endEvent end time for Antigena events
Vendor.periods[0].endevent.endEvent end time
Vendor.codeuuidevent.idEvent ID for Antigena events
Vendor.idevent.idEvent identifier for AI Analyst events
Vendor.uuidevent.idEvent identifier for email events
Vendor.descriptionevent.reasonEvent description for audit events
Vendor.messageevent.reasonEvent message for system status events
Vendor.nameevent.reasonEvent reason for CEF DCIP logs
Vendor.reasonevent.reasonEvent reason for Antigena events
Vendor.titleevent.reasonEvent title/reason
Vendor.aiaScoreevent.risk_scoreAI Analyst score
Vendor.anomaly_scoreevent.risk_scoreEmail anomaly score
Vendor.priorityevent.risk_scorePriority for system status events
Vendor.scoreevent.risk_scoreModel breach score
Vendor.aiaScoreevent.severitySeverity for AI Analyst events when category is critical or suspicious
Vendor.model.priorityevent.severitySeverity for model breach events based on priority thresholds
Vendor.priorityevent.severitySeverity for system status events
Vendor.scoreevent.severitySeverity for model breach events based on score thresholds
Vendor.severityevent.severitySeverity mapping for CEF DCIP logs
Vendor.periods[0].startevent.startEvent start time
Vendor.startevent.startEvent start time for Antigena events
Vendor.breachUrlevent.urlBreach URL
Vendor.darktraceUrlevent.urlDarktrace URL for CEF DCIP logs
Vendor.incidentEventUrlevent.urlEvent URL
Vendor.urlevent.urlEvent URL for Antigena events
Vendor.currentGroupgroup.idCurrent group ID for CEF DCIP logs
Vendor.device.hostnamehost.hostname 
Vendor.device.hostnamehost.hostname/host.ip[0]Hostname or IP based on format
Vendor.hostnamehost.hostname/host.ip[0]Hostname for system status events
Vendor.device.didhost.idDevice identifier
Vendor.device.iphost.ip[0]Device IP address
Vendor.dvchost.ip[0]Device IP for CEF DCIP logs
Vendor.ip_addresshost.ip[0]IP address for system status events
Vendor.device.ip6host.ip[1]Device IPv6 address
Vendor.deviceMacAddresshost.macDevice MAC address for CEF DCIP logs
Vendor.device.macaddresshost.mac[0]Device MAC address
Vendor.dvchosthost.nameDevice hostname for CEF DCIP logs
Vendor.device.oshost.os.typeHost OS type for Antigena events
Vendor.device.typenamehost.typeDevice type
Vendor.methodhttp.request.methodHTTP method for audit events
Vendor.statushttp.response.status_codeHTTP status code for audit events
Vendor.namemessageMessage for CEF DCIP logs
Vendor.pdidprocess.pidProcess ID for Antigena events
Vendor.model.created.byrule.author[0]Model creator
Vendor.action_familyrule.categoryRule category for Antigena events
Vendor.model.categoryrule.categoryModel category
Vendor.inhibitorrule.descriptionRule description for Antigena events
Vendor.model.descriptionrule.descriptionModel description
Vendor.modelrule.name 
Vendor.model.namerule.nameModel name
Vendor.model.uuidrule.uuidModel UUID
Vendor.model.versionrule.versionModel version
Vendor.ipsource.ipSource IP for audit events
Vendor.sourceIPsource.ipSource IP address (only if valid IP)
Vendor.activityIdthreat.group.idThreat group identifier
Vendor.mitreTactics[]threat.tactic.name[] MITRE ATT&CK tactic names
x.techniqueIDthreat.technique.id 
Vendor.mitreIdthreat.technique.id[]MITRE technique IDs for CEF DCIP logs
Vendor.mitreTechniques[].techniqueIDthreat.technique.id[] MITRE ATT&CK technique IDs
x.techniquethreat.technique.name 
Vendor.mitreTechniques[].techniquethreat.technique.name[] MITRE ATT&CK technique names
Vendor.usernameuser.nameUsername for audit events