The following is a list of all the event keys with a definition of their function and the type of the key.
Event KeyDefinitionType
Access Control OutcomeOutcome from Access ControlString
Access Key IDThe access key IDString
Account IDThe account ID that generated the eventString
Account NameThe account name that generated the eventString
Account VendorVendor name of the account ID ownerString
Action Token jtiThe action token’s jtiString
Ad-hoc Query IDID of the ad-hoc queryString
Affected FamilySoftware family affected by the current CPEString
Affected PlatformThe platform (Linux, Mac OSX, Windows) affected by an IDS eventString
Affected PlatformsSoftware Platforms affected by the current CPEString
Affected ProductsSoftware Products affected by the current CPEString
Agent UUIDThe unique ID for agent eventString
Alarm Connector IDsConnector IDs in the alarmString
Alarm Connector Sources Connector Sources in the alarmString
Alarm Destination Asset IDsCSV of alarm destination asset IDsString Array
Alarm Destination Blacklist ActivityCVS of Observed activities of the IP addresses to cause it to be put into OTXString Array
Alarm Destination CitiesCSV of alarm destination citiesString Array
Alarm Destination CountriesCSV of alarm destination countriesString Array
Alarm Destination HostnamesArray of alarm destination hostnamesString Array
Alarm Destination IPsArray of alarm destination IPsString Array
Alarm Destination LatitudesCSV of alarm destination latitudesString Array
Alarm Destination LongitudesCSV of alarm destination longitudesString Array
Alarm Destination NamesArray with the destinations names of an alarmString Array
Alarm Destination OrganisationsCSV of alarm destination organisationsString Array
Alarm Destination User Account IDs Array of alarm destination user account IDs String Array
Alarm Destination User IDs Array of alarm destination user IDs String Array
Alarm Destination UsersArray of alarm destination usersString Array
Alarm Destination ZonesCSV of alarm destination zonesString Array
Alarm DestinationsArray with the destinations of an alarmString Array
Alarm Events CountTotal number of events in an alarmLong
Alarm IDThe ID associated with the alarmString
Alarm LabelsArray with the alarm labels IDsString Array
Alarm Response CodesArray of alarm response codesString Array
Alarm Sensor SourcesArray of the sensor sources which originate the alarmString Array
Alarm Source Asset IDSCSV of alarm source asset IDsString Array
Alarm Source Blacklist ActivityCVS of observed activities of the IP addresses to cause it to be put into OTXString Array
Alarm Source CitiesCSV of alarm source citiesString Array
Alarm Source CountriesCSV of alarm source countriesString Array
Alarm Source HostnamesArray of alarm source hostnamesString Array
Alarm Source IPSArray of alarm source IPsString Array
Alarm Source LatitudesCSV of alarm source latitudesString Array
Alarm Source LongitudesCSV of alarm source longitudesString Array
Alarm Source NamesArray of the unique sources names for an alarmString Array
Alarm Source OrganisationsCSV of alarm source organisationsString Array
Alarm Source User Account IDSArray of alarm source user account idsString Array
Alarm Source User IDSArray of alarm source user idsString Array
Alarm Source UsersArray of alarm source usersString Array
Alarm Source ZonesCSV of alarm source zonesString Array
Alarm SourcesArray of the unique sources for an alarmString Array
Analysis Account IDThe ID of the user accountString
Analysis Account NameThe name of the user accountString
Analysis Account StatusThe status of the user accountString Array
Analysis Account TypeThe type of user accountString
Analysis Account User NameThe user name associated with the user accountString
Analysis User IDThe ID of the userString
Analysis User NameThe name of the userString
Analysis User StatusThe status of the userString
App Execution ParametersThe application execution parametersString
App IDThe ID of the App which generated this eventString
App NameThe Name of the App which generated this eventString
App TypeThe App type which generated this eventString
Application ProtocolLayer-7 protocol observed in the event (eg SSH, FTP, SNMP)String
Application TypeApplication typeString
Application Application nameString
Asset Group IDThe ID of the Asset Group in AssetDBString
Asset StatusAsset StatusString
Asset TagAsset metadata nameString
Asset Tag ValueAsset metadata valueString
Assumed RoleAssumed role from AWS CloudTrail eventsString
Audit ReasonThe reason an audit event was generatedString
Authentication ModeAuthentication ModeString
Authentication Package NameThe name of the authentication package usedString
Authentication TypeThe method used be the user to authenticate, such as RSA Key, Password, Domain CredentialsString
Event KeyDefinitionType
Base Event CountA count associated with how many times was this same event observedInteger
Blacklist NameThe name listed on the blacklistString
Blacklist Reference URLThe referencing URL from the blacklistURL
Blacklist Violating IPThe IP registered to the blacklistIP
Bytes inThe number of bytes in a HTTP requestLong
Bytes outhe number of bytes in a HTTP responseLong
Event KeyDefinitionType
Case NumbersArray of case numbersString Array
Category IDThe id of the taxonomy of the eventString
Certificate Issuer NameThe issuer name of the certificateString
Certificate Serial NumberThe serial number of the certificateString
Certificate Subject NameThe subject name of the certificateString
Changed ClientThe ID of the client that was modifiedString
ConfidenceConfidence levelInteger
Connection CountNumber of incoming connectionsLong
Connector IDThe ID of the connector that generated the eventString
Connector Source FileThe source file of the connector that generated the eventString
Connector SourceThe source of the connector that generated the eventString
Console LoginThe outcome of a AWS console login tryString
ConsumerConsumer of the eventString
Container CMDContainer CMDString
Container CPUContainer CPUString
Container IDThe ID of the containerString
Container ImageThe image name used to launch the containerString
Container Image IDThe id of the image used to launch the containerString
Container MemoryContainer MemoryString
Container NameThe name of the containerString
Container Security ContextContainer security contextString
Container StateThe state of the containerString
Container VolumeContainer volumeString
Contains Credit Card NumberThe event contains credit card numbersBoolean
Content CategoryCategory of the content is being inspected as part of the connection For example in a Content Filtering or Proxy deviceString
Control IDThe Control Node ID which will process this eventString
Current PPSNumber of current packets per second (PPS)Integer
Current Working DirectoryThe Current Working Directory (CWD) referenced in the eventString
Event KeyDefinitionType
Datascience Anomaly ScoreThe score (0-1, floating point) indicating how anomalous the event is. The closer to 1, the more anomalousDouble
Datascience Inference ExplanationA JSON string representing the explanation map/dictionary of the prediction/inferenceString
Datascience Inference Type A string representing the type of inference done on the event. For example, Anomalous Login TimeString
Datascience Inference Value Data Type A string representing the data type of the value of inference result. For example, integer, float, categorical, etc.String
Datascience Inference ValueA string representing the value of inference result—something human understandable and able to write rules againstString
Destination Account IDDestination user account in the eventString
Destination Account NameDestination Account name where the event was generatedString
Destination Account Destination Account where the event was generatedString
DestinationThis is compared against several known formats to extract relevant data. For example, <hostname>:<port>:<zone>, etc.Network Info
Destination Additional HostnamesDestination additional hostnamesString Array
Destination AddressDestination IP AddressIP
Destination Address 6Destination IP Address in v6 formatString
Destination ASNDestination ASNString
Destination Asset IDCSV of alarm destination asset IDsString Array
Destination Blacklist ActivityCVS of observed activities of the IP addresses to cause it to be put into OTXString Array
Destination Blacklist PriorityOTX priorityString
Destination Blacklist ReliabilityOTX reliabilityString
Destination canonical Canonical DestinationString
Destination CityDestination CityString
Destination CountryDestination CountryString
Destination CPEDestination CPEString
Destination DatacenterDestination data centerString
Destination DatastoreDestination data storeString
Destination DNS DomainThe DNS domain part of the complete fully qualified domain nameString
Destination FQDNDestination FQDNString
Destination HostnameDestination hostnameString
Destination Infrastructure NameDestination Infrastructure NameString
Destination Infrastructure TypeDestination Infrastructure TypeString
Destination Instance IDInstance ID for destination deviceString
Destination LatitudeDestinations LatitudeString
Destination Location IDThis is an internal field used to associate this event with a particular locationString
Destination Location NameThis is an internal field used to associate this event with a particular locationString
Destination LongitudeDestinations LongitudeString
Destination MAC Destination MAC AddressMAC
Destination MAC VendorDestination MAC VendorString
Destination NameDestination NameString
Destination NAT AddressDestination NAT IP AddressIP
Destination NAT PortDestination NAT PortInteger
Destination NetmaskDestination IP Address maskIP
Destination NetworkDestination networkString
Destination NT domainDestination Windows DomainString
Destination OrganisationDestinations OrganisationString
Destination Port LabelDestination Port LabelString
Destination PortDestination PortPort
Destination Post NAT AddressDestination address for the event message after NAT occurredIP
Destination Post NAT PortPort number of the event destination after NATInteger
Destination Pre NAT AddressDestination address for the event message before NATIP
Destination Pre NAT PortPort number of the event destination before NATInteger
Destination ProcessDestination Process NameString
Destination Process IDDestination Process IDString
Destination Process UserDestination Process UserString
Destination RegionDestinations RegionString
Destination Registered CountryDestination Registered CountryString
Destination Service NameThe service which is targeted by this eventString
Destination Translated AddressIdentifies the translated destination address that the event refers to in an IP networkIP
Destination Translated PortPort after it was translatedInteger
Destination User EmailDestinations User emailString
Destination User GroupThe destination user groupString
Destination User IDDestination user in the systemString
Destination User PrivilegesDestinations Users privilegesString
Destination UserIDDestinations Users numeric IDString
Destination UsernameDestinations User nameString
Destination VGuestDestination virtual guestString
Destination VHostDestination virtual hostString
Destination VPCDestination VPCString
Destinations VPNDestinations VPNString
Destination WorkstationDestinations workstation nameString
Destination ZoneDestinations Zone (DMZ Office Outside)String
DestinationsList of destination asset IDsString Array
Device ClassThe Device Class listed in the systemString
Device ConfigurationConfiguration scheme/type set in a deviceString
Device Custom Date 1-2There are two timestamps fields available which can be used to map fields which do not fit any other field of this dictionaryString
Device Custom Date 1-2 LabelAll custom fields have a corresponding label field where the field itself can be describedString
Device Custom Number 1-3There are three number fields available which can be used to map fields which do not fit into any other field of this dictionaryInteger
Device Custom Number 1-3 LabelAll custom fields have a corresponding label field where the field itself can be describedString
Device DirectionAny information about what direction the communication that was observed has takenString
Device DNS DomainThe DNS domain part of the complete fully qualified domain nameString
Device Event CategoryRepresents the category assigned by the originating deviceString
Device External IDA name that uniquely identifies the device generating this eventString
Device FacilityThe facility generating this eventString
Device Inbound InterfaceInterface on which the packet or data entered the deviceString
Device NameThe Device Name listed in the systemString
Device NT DomainDevice Windows DomainString
Device Outbound InterfaceInterface on which the packet or data left the deviceString
Device Process NameProcess name associated to the eventString
Device Sender AddressDevice sender addressIP
Device Sender Asset IDAsset ID for device senderString
Device Time FormatFormat of the timestamp attached to this eventString
Device Translated AddressIdentifies the translated device address that the event refers to in an IP networkIP
Device VendorThe device vendorString
DNS MessageDNS response messageString
DNS RcodeDNS return messageInteger
DNS RR NameThe DNS Request/Response Resource NameString
DNS RR TypeThe DNS Resource TypeString
DNS Server AddressThe address of the DNS server referenced in the eventString
DNS TTLThe DNS Time to LiveString
DNS TypeThe DNS Type (Query / Answer)String
DurationThe duration of the connectionString
Event KeyDefinitionType
Email RecipientThe Email recipientEmail
Email RelayThe relay the email was delivered throughString
Email SenderThe Email senderEmail
Email SubjectThe subject of the emailString
Entity CategoryThe zone category of incident that is being reportedString
Environment Variable KeyThe Environment Variable key referenced in the eventString
Environment Variable ValueThe Environment Variable value referenced in the eventString
Error CodeThe error code for a HTTP responseString
Error MessageThe error message for a responseString
Event ActionThe implied action of the event - Create Read Update DeleteString
Event ActivityThe activity related to an event In an IDS event this would be the activity being detectedString
Event Attack ID The ID associated with an event reporting an attackString
Event Attack TacticThe attack tactic type associated with an event reporting an attackString
Event Attack TechniqueThe attack technique associated with an event reporting an attackString
Event Auth ActionAction of the authorization eventString
Event Auth RoleRole of the authorization eventString
Event Auth ScopeScope of the authorization eventString
Event CategoryThe taxonomy of the eventString
Event ChangeThe event change/action made by the userString
Event CVEContains information about the CVE associated with an event as an example an IDS signatureString
Event Description URLThe URL for full description of the eventString
Event Description Full description of the eventString
Event GroupEvent Grouping that this event belongs toString
Event Group Job IDWhen this group has been created from a job, the job IDString
Event Group TypeDefine which kind of event group isString
Event NameThe short user-readable description of the eventString
Event OutcomeDisplays the outcome, generally “success” or “failure”String
Event PriorityThe priority of the eventString
Event Receipt TimeThe time at which the event related to the activity was receivedDate
Event Ref DateWhen the issue was first publishedString
Event Ref IDEvent reference ID (CVE, etc)String
Event Ref IDSEvent reference IDs (CVE, OSVDB, etc)String Array
Event Ref ScoreScore for the Issue (CVSS)String
Event Ref Score V2Score V2 for the Issue (CVSS)String
Event Ref Score V3Score V3 for the Issue (CVSS)String
Event Ref SourceIssue Reference Source (CVE etc)String
Event Ref Version Issue Reference Source Version (CVE etc)String
Event SeverityThe severity of the eventString
Event SubcategoryThe sub-taxonomy of the eventString
Event TypeThe event typeString
Event ViolationThe culpritString
EventsAlarm events summaryString
ExpiresEvent expiresBoolean
External IDAn ID used by the originating deviceString
Event KeyDefinitionType
File Create TimeThe timestamp of when the file was createdString
File HashThe hash of the fileString
File Hash AlgorithmThe algorithm used to produce the file hash - SH256 MD5 etcString
File Hash Md5The MD5 of the fileString
File Hash Sha1The SHA1 of the fileString
File Hash Sha256The SHA256 of the fileString
File IDThe Operating System ID of the fileString
File KB SizeThe size in kilobytes of the fileString
File Modification TimeThe last modification time of a fileString
File NameThe short name of a fileString
File Old Create TimeThe previous creation timeString
File Old Hash_algorithmThe algorithm used to produce the file hashString
File Old HashThe previous file hashString
File Old IDThe previous ID of the fileString
File Old Modification TimeThe previous modification time of the fileString
File Old NameThe previous short file nameString
File Old OwnerOld file ownerString
File Old PathThe previous full path of the fileString
File Old PermissionThe previous old permissions of the fileString
File Old SizeThe previous size of the fileString
File Old TypeThe previous type of the fileString
File OwnerThe current owner of a fileString
File PathFull path of the fileString
File PermissionThe OS permissions of the fileString
File TypeThe type of the fileString
Full MessageA long messageString
Event KeyDefinitionType
GatewayGateway IP addresIP
Global List NameName of the Global ListString
Global List ValueValue from the listString
Group PolicyGroup Policy that the event refers to, for example a Active Directory Group PolicyString
Event KeyDefinitionType
Has AlarmIf this event is used by an alarmBoolean
Highlight FieldsArray of important fieldsString Array
HTML LinkA specified HTML link addressURL
HTML SnippetA specified HTML link snippetString
HTML TitleA specified HTML link titleString
HTTP HostnameThe hostname present in a HTTP connectionString
HTTP ReferrerThe HTTP referrer in a HTTP requestString
Event KeyDefinitionType
Identity Group NameGroup name associated with the identity source address to further identify the identity event with Group name resolutionString
Identity Host NameHost name information associated with the identity source address to further identify the true hostname tied to an eventString
Identity MACMAC associated with the identity source address to further identify the identity event with MAC resolutionString
Identity NetBIOSNetBIOS name associated with the identity source address to further identify the identity event with NetBIOS name resolutionString
Identity Source AddressIPv4 or IPv6 address that can connect an event with a true user identify or true computer identityIP
In AlarmsArray of alarms to which the event belongsString Array
Incident IDID provided by the event sourceString
Instance IDs An array of the instance IDs for the instances being terminatedString Array
Instance TypesAn array of the instance types for the instances being startedString Array
IOCsArray with the matched Indicators of CompromiseString Array
IP AddressesList of IP AddressesString Array
Event KeyDefinitionType
k8s DNS PolicyK8S DNS PolicyString
k8s Node NameK8S Node NameString
k8s PriorityK8S PriorityString
Event KeyDefinitionType
Last UpdatedWhen this item was last updatedString
Legacy AbsoluteLegacy Key: AbsoluteString
Legacy ApplicationLegacy Key: ApplicationString
Legacy Binary DataLegacy Key: Binary DataString
Legacy ConditionLegacy Key: ConditionString
Legacy CPULegacy Key: CPUString
Legacy CTXLegacy Key: CTXString
Legacy DateLegacy Key: DateString
Legacy DeviceLegacy Key: DeviceString
Legacy DomainLegacy Key: DomainString
Legacy DST IPLegacy Key: Destination IPString
Legacy DST PortLegacy Key: Destination PortString
Legacy Event IDLegacy Key: Event IDString
Legacy Event TypeLegacy Key: Event TypeString
Legacy Extra DataLegacy Key: Extra DataString
Legacy FDdateLegacy Key: FDateString
Legacy FilenameLegacy Key: FilenameString
Legacy FromLegacy Key: FromString
Legacy GzipDataLegacy Key: GzipDataString
Legacy HIDS Event TypeLegacy Key: HIDS event typeString
Legacy HostLegacy Key: hostString
Legacy Hostname”Legacy Key: hostnameString
Legacy InterfaceLegacy Key: interfaceString
Legacy IntervalLegacy Key: intervalString
Legacy Inventory SourceLegacy inventory sourceString
Legacy IPLegacy Key: IPString
Legacy IPvLegacy Key: IPvString
Legacy LogLegacy Key: logString
Legacy LoginLegacy Key: loginString
Legacy MACLegacy Key: MACString
Legacy MailLegacy Key: MailString
Legacy MemoryLegacy Key: MemoryString
Legacy OccurrencesLegacy Key: OccurrencesString
Legacy OrganizationLegacy Key: OrganizationString
Legacy OSLegacy Key: OSString
Legacy PasswordLegacy Key: PasswordString
Legacy Plugin IDLegacy Key: Plugin IDString
Legacy Plugin SIDLegacy Key: Plugin SIDString
Legacy Port FromLegacy Key: Port FromString
Legacy Port ToLegacy Key: Port ToString
Legacy Port Legacy Key: PortString
Legacy PriorityLegacy Key: PriorityString
Legacy ProtocolLegacy Key: ProtocolString
Legacy ReliabilityLegacy Key:ReliabilityString
Legacy Sensor IDLegacy Key:Sensor IDString
Legacy SensorLegacy Key:SensorString
Legacy ServiceLegacy Key:ServiceString
Legacy Snort CIDLegacy Key: Snort CIDString
Legacy Snort SIDLegacy Key: Snort SIDString
Legacy SoftwareLegacy Key: SoftwareString
Legacy SRC IPLegacy Key: Source IPString
Legacy SRC PortLegacy Key: Source PortString
Legacy StateLegacy Key: StateString
Legacy TargetLegacy Key: TargetString
Legacy ToLegacy Key: ToString
Legacy TypeLegacy Key: TypeString
Legacy UnziplenLegacy Key: Unzip LengthString
Legacy UserDataLegacy Key: UserDataString
Legacy ValueLegacy Key: ValueString
Legacy VendorLegacy Key: VendorString
Legacy VideoLegacy Key: VideoString
LevelThe standard syslog levelLong
Log FileThe Log FileString
Log The raw log used to generate this eventString
Event KeyDefinitionType
Malware FamilyMalware FamilyString
Malware VariantVirus or Malware VariantString
Matched ValueThe value that was matched for the enrichment metadataString
Mute AlarmMute alarmString
Event KeyDefinitionType
Needs EnrichmentIf the event needs to be enrichedBoolean
Needs Internal EnrichmentIf the event needs to be enriched with internal fieldsBoolean
New Basic ConstraintsNew Basic ConstraintsString
New CertificateNew CertificateString
New IPNew IPString
New IssuerNew IssuerString
New SubjectNew SubjectString
New ValueThe new value in the field, after it was modifiedString
Num ContainersNumber of ContainersString
Event KeyDefinitionType
Object IDThe ID of the Object in AssetDBString
Object TypeThe object type of the source (if applies)String
Old Basic ConstraintsOld basic constraintsString
Old CertificateOld certificateString
Old IPOld IPIP
Old issueOld issueString
Old NSOld NSString
Old subjectOld subjectString
Operating SystemOperating SystemString
OTX activitiesOTX activitiesString
Event KeyDefinitionType
Package ArchitectureThe architecture of the packageString
Package NameThe name of the packageString
Package RevisionThe revision of the packageString
Package SourceThe source of the packageString
Package VersionThe version of the packageString
Packet DataThe binary packet data of the eventString Array
Packet PayloadPacket payload information from Network IDSString
Packet TypeWhat type of packet this isString
Packets ReceivedThe number of packets receivedInteger
Packets SentThe number of packets sentInteger
Patch Reference IDPatch reference id (Oval rule, etc)String
Patch Vulnerability Reference ListList of reference ID’s (CVE, etc) for the patch eventString Array
Peak PPSPackets per second (PPS) peak valueInteger
Pefile CompanyThe company field on a PE32 executable fileString
Pefile Descriptionhe description field on a PE32 executable fileString
Pefile FileversionThe fileversion field on a PE32 executable fileString
Pefile ProductThe product field on a PE32 executable fileString
Plugin Device Type The type of the device this plugin was made forString
Plugin Device VersionThe version of the device this plugin was made forString
Plugin Device Plugin DeviceString
Plugin FamilyPlugin FamilyString
Plugin ParentParent which was used to normalize eventString
Plugin RulePlugin RuleString
Plugin VendorThe vendor of the device this plugin was made forString
Plugin VersionPlugin VersionString
PluginPlugin used to normalize eventString
PolicyPolicy that the event refers to, for example a Firewall or Content Filtering PolicyString
Policy AddressAddress referenced on a db policy firewall rule etcString
Policy InterfaceNetwork Interface referenced on a db policy firewall rule etcString
Policy MacMac address referenced on a db policy firewall rule etcString
Pre_authentication TypeThe method used be the user to pre-authenticate, RSA Key, Password, Domain CredentialsString
Previous ValueThe value present in the field, before it was modifiedString
Priority LabelPriority label of AlarmString
PriorityPriority of AlarmString
Project IDProject IDString
Protocol VersionVersion of the current protocolString
Event KeyDefinitionType
RealmRealm where the user roles and permissions applyString
Received FromSource this event was received fromString
Registry PathThe registry pathString
Registry ValueThe registry valueString
Relative Distinguished Name The name of the authentication package usedString
Reporting Device Canonical Reporting Device Canonical NameString
Reporting Device AddressReporting device addressIP
Rep Device Address 6Reporting device address version 6String
Rep Device Asset IDInstance ID for reporting deviceString
Rep Device FQDNReporting device FQDNString
Reporting Device HostnameReporting device hostnameString
Reporting Device Inbound InterfaceThe network interface receiving the traffic generating the event on the reporting deviceString
Reporting Device Instance IDInstance ID for the reporting deviceString
Rep Device Location IDThis is an internal field used to associate this event with a particular locationString
Rep Device Location NameThis is an internal field used to associate this event with a particular locationString
Reporting Device MACReporting device MACMAC
Reporting Device ModelThe model of the reporting deviceString
Reporting Device Outbound InterfaceThe network interface passing through the traffic generating the event on the reporting deviceString
Reporting Device Rule IDThe ID of the rule used by the reporting device to generate this event (ie firewall rule, CVE, IDS ruleString
Reporting Device TypeThe device type of the reporting deviceString
Reporting Device VendorThe vendor of the reporting deviceString
Reporting Device VersionThe version of the reporting deviceString
Report Executed CategoryThe category of the reportString
Report Executed Database IndexThe database index to get the reportString
Report Executed DatabaseThe database in which the report has been executedString
Report Executed DateWhen the report was executedDate
Report Executed FormatThe format we use to run the save the reportString
Report Executed KeyThe executed report’s keyString
Report Executed ParametersThe parameters used to run the queryString
Report Executed Query The query executed to fill the reportString
Report Executed rsql Query The rsql query executed to fill the reportString
Report Executed StateThe search stateString
Report Executed UserUser who run the reportString
Report Executed UUIDThe executed report’s uuid. Unique identifierString
Reputation ScoreRisk or reputation score for a hostString
Request Content TypeThe content type for the requestString
Request CookiesThe cookies passed in a HTTP requestString
Request HTTP VersionHTTP version for the requestString
Request MethodThe HTTP request method - OPTIONS, GET, HEAD, POST, PUT, DELETE, TRACE, CONNECTString
Request Referrer Referrer for the requestString
Request URL The URL reference in a HTTP requestString
Request User AgentUser agent for the requestString
Resource ProviderProvider of resourceString
Resource URIURI representing a resource uniquelyString
Response CodeThe response code for the requestInteger
Response Content TypeHTTP response content typeString
Return ValueReturn valueString
RoleRole or roles of the user in the organizationString
Rule Attack IDCorrelation Rule Attack IDString
Rule Attack TacticArray of Correlation Rule Attack TacticsString Array
Rule Attack TechniqueCorrelation Rule Attack TechniqueString
Rule DictionaryRule DictionaryString
Rule IDCorrelation Rule IDString
Rule IntentAlarm IntentString
Rule MethodAlarm MethodString
Rule NameCorrelation Rule NameString
Rule StrategyAlarm StrategyString
Rule UUIDRule ID which triggered eventString
Event KeyDefinitionType
S3 NotificationS3 notificationString
Scheduled Task ID The ID of the Scheduled taskString
Searched SiteSite searchedString
Security Group IDSecurity Group IDString
Security Group NameSecurity Group NameString
Sensor App ActionThe Sensor App Action CalledString
Sensor Event RateThe value of the sensor event rateDouble
Sensor NameThe name of the sensor that received this eventString
Sensor UUID The UUID of the sensor that received this eventString
SessionSession IdentifierString
Shared Resource NameThe name of the shared resourceString
Short MessageA short descriptive messageString
Silent Silent alarmBoolean
Source Account IDSource user account in the eventString
Source Account Name Source account name where the event was generatedString
Source AccountSource Account where the event was generatedString
Source Additional HostnamesSource additional hostnamesString Array
Source AddressSource IP AddressIP
Source Address 6Source IP Address in v6 formatString
Source ASNSource ASNString
Source Asset IDThis is an internal field used to associate this event with a particular assetString
Source Blacklist Activity Observed activity of the IP address to cause it to be put into OTXString
Source Blacklist PriorityOTX priorityString
Source Blacklist ReliabilityOTX reliabilityString
Source Canonical Canonical SourceString
Source CitySource CityString
Source CountrySource CountryString
Source CPESource CPEString
Source DatacenterSource data centerString
Source DatastoreSource data storeString
Source DNS DomainThe DNS domain part of the complete fully qualified domain nameString
Source FQDNSource FQDNString
Source HostnameSource hostnameString
Source Infrastructure NameSource Infrastructure NameString
Source Infrastructure TypeSource Infrastructure TypeString
Source Instance IDInstance ID for source deviceString
Source LatitudeSource LatitudeString
Source Location IDThis is an internal field used to associate this event with a particular locationString
Source Location NameThis is an internal field used to associate this event with a particular locationString
Source LongitudeSource LongitudeString
Source MACSource MAC AddressMAC
Source MAC VendorSource MAC VendorString
Source NameSource NameString
Source NAT AddressSource NAT IP AddressIP
Source NAT PortSource NAT PortInteger
Source NetmaskSource IP Address maskIP
Source NetworkSource networkString
Source NT DomainSource Windows DomainString
Source OrganisationSource OrganisationString
Source Port LabelSource Port LabelString
Source PortSource PortPort
Source Post Nat AddressSource address for the event message after NAT occurredIP
Source Post Nat PortPort number of the event source after NATInteger
Source Pre Nat AddressSource address for the event message before NATIP
Source Pre Nat PortPort number of the event source before NATInteger
Source ProcessSource Process nameString
Source Process Command LineThe Process Command lineString
Source Process IDSource Process IDString
Source Process ParentThe Process ParentString
Source Process Parent CommandlineThe Parent Command LineString
Source Process Parent Process IDThe Parent Process IDString
Source Process UserSource Process UserString
Source RegionSource RegionString
Source Registered CountrySource Registered CountryString
Source Service NameThe service which is responsible for generating this eventString
Source Translated AddressIdentifies the translated source address that the event refers to in an IP networkIP
Source Translated PortPort after it was translatedInteger
Source User Email DomainSource user email domainString
Source User EmailSource user emailString
Source User GroupThe source user groupString
Source User IDSource user in the systemString
Source User PrivilegesSource Users privilegesString
Source User IDSource User IDString
Source UsernameSource usernameString
Source VguestSource virtual guestString
Source VhostSource virtual hostString
Source VPCSource VPCString
Source VPNSource VPNString
Source WorkstationSource WorkstationString
Source ZoneSource ZoneString
Source Source - This is compared against several known formats to extract relevant data e.g. <hostname>:<port>:<zone> etc.Network Info
SourcesList of source asset IDsString Array
SSH Authorized KeyThe SSH authorized keyString
SSH Client ProtoIdentifies the SSH client protocolString
SSH Client SoftwareIdentifies the SSH client softwareString
SSH Server ProtoIdentifies the SSH server protocolString
SSH Server SoftwareIdentifies the SSH server softwareString
SSH Server VersionIdentifies the SSH server versionString
Stat NameThe name of the stat that has exceeded its thresholdString
Stat ValueThe value of the stat that has exceeded its thresholdInteger
Subcategory IDThe ID of the sub-taxonomy of the eventString
Suppress Rule IDID of the rule that suppressed this logString
Suppress Rule NameName of the rule that suppressed this logString
SuppressedIf event is suppressedString
Syslog Source The source channel a syslog-ng event came fromString
System Event TypeThe system event type generatedString
Event KeyDefinitionType
TagThe syslog tag (the data found before the [] after the timestamp)String
Threat Intelligence Feed NameArray with the  name of the feeds that the pulse has matchedString Array
Threat Intelligence Matched MetadataArray with tuples of metadataString Array
Ticket Encryption TypeThe ticket encryption type usedString
Time EndThe ending time of the event, such as a file downloadDate
Time Offset The time offset the event occurred inString
Time StartThe starting time of the event, such as a file downloadDate
Time ZoneThe timezone the event occurred inString
Timestamp ArrivedThe approximated time that the event arrived to the customer control nodeDate
Timestamp EndProcess end timestampDate
Timestamp OccurredThe time that the event occurred - will be set by default if not populatedDate
Timestamp ReceivedWhen the event was received by the systemDate
Timestamp StartProcess start timestampDate
Timestamp The approximated time that the event is sent from the control node to hot storageDate
TLS CipherThe cipher algorithm used for this TLS connectionString
TLS FingerprintIdentifies the SHA1 fingerprint of the certificateString
TLS IssuerDNIdentifies the issuer DN of certificateString
TLS SNIIdentifies the server name indication sent by a clientString
TLS SubjectIdentifies the subject of the TLS protocolString
TLS VersionIdentifies the version of TLS protocolString
Total Disconnection TimeTotal time the monitored asset has stopped sending dataString
Total PacketsThe total number of packets transmittedInteger
Transaction StatusTransaction statusString
TransientIs the event transientBoolean
Transport ProtocolLayer-4 protocol observed in the event (e.g. TCP, UDP)String
TTY TerminalThe TTY referenced in the eventString
Event KeyDefinitionType
Used HintIf a hint was used to find the pluginBoolean
User Group IDGroup ID that is associated with the user accountString
User PolicyPolicy associated with the user accountString
User RealmPortal name associated with the eventString
User Resource TypeUser Resource TypeString
User ResourceResource associated with the user accountString
User RoleRole type associated with the user account that created the eventString
User TypeThe type of user account. Example: Local, special, etc.String
UUIDThe unique ID for this EventString
Event KeyDefinitionType
Virtual Source AddressIP address of the virtual event sourceIP
Virtual Source NameName of the virtual event sourceString
Event KeyDefinitionType
Was FuzziedIf fuzzied parser was used to generate the eventBoolean
Was GuessedIf we brute forced the pluginBoolean
was_legacyLegacy Key: Was LegacyString
watchlistArray with matched watchlistsArray
Wireless Access PointThe access point of the wireless networkString
Wireless BSSIDThe BSSID of the wireless networkString
Wireless ChannelThe channel of the wireless networkString
Wireless EncryptionThe encryption mechanism used by the wireless networkString
Wireless SSIDThe SSID of the wireless networkString
WMI ClassWMI ClassString
WMI ConsumerWMI ConsumerString
WMI FilterWMI FilterString
WMI PathWMI PathString
Event KeyDefinitionType
Yara SignatureYara SignaturesString Array