Data Explorer fields
- Field — You can limit your search for a specific term to a single Data Explorer field. Fields are written in lower case and include periods and underscores. For example,
remote.registered_domain. For more information, see Fields. - Field set — A field set allows you to search for a term in a group of related Data Explorer fields. Field sets are written in title case. For example,
Event Code. For more information, see Field sets.Tip: If you don't know the name of the Data Explorer field that contains your search term, try searching a field set.
Field sets
|
Field set |
Fields included |
|---|---|
|
Country |
|
|
Domain |
|
|
Event Code |
|
|
Hash |
|
|
File Name |
|
|
IP Address |
|
|
Log Source |
|
|
Login Status |
|
|
Process Name |
|
|
User |
|
Fields
|
Field |
Description |
|---|---|
|
|
The date and time when the event occurred. If the log data that Arctic Wolf® receives does not include a date and time for the event, the date and time when Arctic Wolf received the log data. The |
|
|
If the event log is a compound event, the type of incident or alert. Otherwise, the type of telemetry used to send event log data to Arctic Wolf.
Note: A compound event is a single event that contains multiple logical events. Compound events are events that the Arctic Wolf observation pipeline generates when it identifies a group of events as logically related.
|
|
|
The Windows Event logon type. For more information, see Audit logon events. |
|
|
The Windows Event ID. For more information, see:
|
|
|
The name of the user or the computer that originated the event. |
|
|
The event summary associated with the Windows Event ID. For more information, see:
|
|
|
A description of the authentication type. |
|
|
An IP address, a domain, or a Unix socket, if available. Client addresses are sometimes ambiguous. Some event logs that originate from ambiguous client addresses include this information. |
|
|
The autonomous system number (ASN) that uniquely identifies each network on the internet. |
|
|
The total number of bytes sent from the client to the server during the event. |
|
|
The client domain. |
|
|
The name of the city where the client is located. |
|
|
The ISO code for the country where the client is located. |
|
|
The name of the country where the client is located. |
|
|
The IPv4 or IPv6 address of the client. |
|
|
The classification of the client IP address as |
|
|
The total number of packets sent from the client to the server during the event. |
|
|
The port used on the client. |
|
|
The email address of the user. |
|
|
The full name of the user. |
|
|
The user ID. |
|
|
The username that identifies a user login or a short name for the user. |
|
|
The username that identifies a user login or a short name for the user. This field is an additional field to account for legacy systems. |
|
|
The person or organization who registered the domain name, according to the WHOIS database. |
|
|
The name of the city where the external IP address is located. |
|
|
The ISO code for the country where the external IP address is located. |
|
|
The name of the user that completed the operation. To disambiguate this user name, view the |
|
|
The name that an Arctic Wolf observation pipeline assigned the event. |
|
|
The name of the resource that was changed or affected in the event. For example, the name of a file or user. |
|
|
The file path of the resource that was changed or affected in the event. For example, the file path of an executable or a configuration file. |
|
|
The class of DNS data contained in the resource record. |
|
|
The data describing the resource. The meaning of this data depends on the type and class of the resource record. |
|
|
The number of seconds that a cache can keep the resource record before the record is discarded. A value of zero values mean that the data should not be cached. |
|
|
The type of data contained in the resource record. |
|
|
The class of the record being queried. |
|
|
The name of the record being queried. |
|
|
The type of record being queried. |
|
|
The person or organization who registered the domain name, according to the WHOIS database. |
|
|
All IP addresses found in the |
|
|
The DNS response code. |
|
|
The summary of the action described in the event log, according to the event source. For example, |
|
|
All categories that the event falls under. This value is an array that that enables the categorization of events that appear in more than one category. This field is closely related to |
|
|
The identification code for this event, if one exists. Some event sources use event codes to uniquely and unambiguously identify events, regardless of any wording adjustments in the event message over time or any language translations. Possible event.code field values are Windows Event IDs and Sysmon Event IDs. For more information, see:
|
|
|
The name of the dataset, according to the event source. If an event source publishes more than one type of log or event, for example, access logs and error logs, you can use the |
|
|
The duration of the event in nanoseconds. If the |
|
|
The date and time when the event ended or when the event source last observed the activity. |
|
|
A high-level summary of the type of information that the event log contains. You can use the value in this field to decide how to handle events of the same kind. Events of the same kind might need a different data retention period or different access controls. This value can also indicate if log data for this kind of event is coming in at a regular interval or not. |
|
|
The name of the module this data is coming from, if applicable. The Arctic Wolf observation pipeline populates this field if your monitoring agent uses the concept of modules or plugins to process events from a specific source, for example, Apache logs. |
|
|
Whether the event represents a success or a failure from the perspective of the entity that caused the event, if applicable.
Note:
|
|
|
The source of the event log. Event transports such as Syslog or the Windows Event Log usually mention the source of an event. The identified source can be any of these values:
|
|
|
An explanation of why the event happened. The event can be an action or an outcome. This explanation originates from the event source. |
|
|
The severity level of the event, expressed as a number. This severity level originates from the event source. The meaning of this value depends on the event source and the use cases for this type of event classification. |
|
|
The date and time when the event started or when the event source first observed the activity. |
|
|
All applicable event types. This value is an array that that enables the categorization of events that have more than one event type. This field is closely related to |
|
|
A UUID that the Arctic Wolf observation pipeline assigns to an event log. |
|
|
The folder where the file is located. This value includes the drive letter when appropriate. |
|
|
The MD5 hash of the file. |
|
|
The SHA1 hash of the file. |
|
|
The SHA256 hash of the file. |
|
|
The media type or MIME type of the file or stream of bytes, written as an IANA media type where possible. When more than one type is applicable, the most specific type should be used. For more information, see IANA Media Types. |
|
|
The name of the file, including the extension but without the file path. |
|
|
The complete path to the file, including the file name. This value includes the drive letter when appropriate. |
|
|
The name of the domain that the host is a member of. For example:
|
|
|
The external IP address of the host. |
|
|
The name of the city where the host is located. |
|
|
The ISO code for the country where the host is located. |
|
|
The name of the country where the host is located. |
|
|
The name of the host. This name is usually the value that the |
|
|
The IPv4 or IPv6 address of the host. |
|
|
The name of the host, according to the event source. This name is usually one of these values:
|
|
|
The operating system family of the host. For example, |
|
|
The email address of the user. |
|
|
The full name of the user. |
|
|
The user ID. |
|
|
The username that identifies a user login or a short name for the user. |
|
|
The username that identifies a user login or a short name for the user. This field is an additional field to account for legacy systems. |
|
|
The key-value pairs for all headers in the HTTP request. |
|
|
The HTTP request method. |
|
|
The media type or MIME type of the body of the request. |
|
|
The value of the HTTP response Content-Type header. |
|
|
The key-value pairs for all headers in the HTTP response. |
|
|
The HTTP response status code. |
|
|
Custom key-value pairs. Examples of custom key-value pairs are |
|
|
The name of an application-level protocol. This name can be arbitrarily assigned to microservices or cloud service providers like Skype, ICQ, Facebook, and X (formerly Twitter). This field is populated if the vendor or service can be derived from information like the source or destination IP address owners, port numbers, or wire format. |
|
|
The total number of bytes transferred in both directions during the event. |
|
|
The direction of the network traffic. |
|
|
The total number of packets transferred in both directions during the event. |
|
|
The layer seven network protocol name. For example, |
|
|
The name of the transport layer. For example, |
|
|
The name of the city where the event source is located. |
|
|
The ISO code for the country where the event source is located. |
|
|
The name of the country where the event source is located. |
|
|
The event source type. For example, |
|
|
The unique identifier that Arctic Wolf assigns to an Arctic Wolf appliance deployed within the organization. |
|
|
The unique identifier that Arctic Wolf assigns to the organization. |
|
|
An organization UUID that is specific to the Arctic Wolf Managed Risk service. This field is used for legacy data mapping. |
|
|
The complete command line that started the process, including the absolute path to the executable and all command arguments. |
|
|
The absolute path to the process executable file. |
|
|
The MD5 hash of the process executable file. |
|
|
The SHA1 hash of the process executable file. |
|
|
The SHA256 hash of the process executable file. |
|
|
The name of the process. |
|
|
The complete command line that started the parent process, including the absolute path to the executable and all command arguments. |
|
|
The absolute path to the parent process executable file. |
|
|
The MD5 hash of the parent process executable file. |
|
|
The SHA1 hash of the parent process executable file. |
|
|
The SHA256 hash of the parent process executable file. |
|
|
The name of the parent process. |
|
|
The parent process ID. |
|
|
The grandparent process ID. |
|
|
The working directory of the parent process. |
|
|
The process ID. |
|
|
The parent process ID. |
|
|
The working directory of the process. |
|
|
All autonomous system numbers (ASNs) found in the event log. related.as.number contains arrays of these fields and their values:
Tip: A
related field allows you to search all Data Explorer fields that contain similar or related information of the same data type. Examples of related fields are related.ip and related.user. If you don't know the name of the Data Explorer field that contains your search term, you can search a related field.
|
|
|
All user email addresses listed in the event log. related.email contains arrays of these fields and their values:
Tip: A
related field allows you to search all Data Explorer fields that contain similar or related information of the same data type. Examples of related fields are related.ip and related.user. If you don't know the name of the Data Explorer field that contains your search term, you can search a related field.
|
|
|
All groups related to users that are associated with the event.
Tip: A
related field allows you to search all Data Explorer fields that contain similar or related information of the same data type. Examples of related fields are related.ip and related.user. If you don't know the name of the Data Explorer field that contains your search term, you can search a related field.
|
|
|
All hashes found in the event log data. related.hash contains arrays of these fields and their values:
Tip: A
related field allows you to search all Data Explorer fields that contain similar or related information of the same data type. Examples of related fields are related.ip and related.user. If you don't know the name of the Data Explorer field that contains your search term, you can search a related field.
|
|
|
All hostnames or other host identifiers observed during the event. Valid values include FQDNs, domain names, workstation names, or aliases. related.hosts contains arrays of these fields and their values:
Tip: A
related field allows you to search all Data Explorer fields that contain similar or related information of the same data type. Examples of related fields are related.ip and related.user. If you don't know the name of the Data Explorer field that contains your search term, you can search a related field.
|
|
|
All IP addresses found in the event log data. related.ip contains arrays of these fields and their values:
Tip: A
related field allows you to search all Data Explorer fields that contain similar or related information of the same data type. Examples of related fields are related.ip and related.user. If you don't know the name of the Data Explorer field that contains your search term, you can search a related field.
|
|
|
All URLs to external systems where you can investigate the event.
Tip: A
related field allows you to search all Data Explorer fields that contain similar or related information of the same data type. Examples of related fields are related.ip and related.user. If you don't know the name of the Data Explorer field that contains your search term, you can search a related field.
|
|
|
All usernames or other user identifiers found in the event log data. related.user contains arrays of these fields and their values:
Tip: A
related field allows you to search all Data Explorer fields that contain similar or related information of the same data type. Examples of related fields are related.ip and related.user. If you don't know the name of the Data Explorer field that contains your search term, you can search a related field.
|
|
|
For all the domain names found in the event log data, the persons or organizations who registered the domain names, according to the WHOIS database.
Tip: A
related field allows you to search all Data Explorer fields that contain similar or related information of the same data type. Examples of related fields are related.ip and related.user. If you don't know the name of the Data Explorer field that contains your search term, you can search a related field.
|
|
|
The person or organization who registered the domain name, according to the WHOIS database. related.whois.registrant.organization contains arrays of these fields and their values:
Tip: A
related field allows you to search all Data Explorer fields that contain similar or related information of the same data type. Examples of related fields are related.ip and related.user. If you don't know the name of the Data Explorer field that contains your search term, you can search a related field.
|
|
|
An IP address, a domain, or a Unix socket, if available. Remote addresses are sometimes ambiguous. Some event logs that originate from ambiguous remote addresses include this information. |
|
|
The domain of the remote system. |
|
|
The IPv4 or IPv6 address of the remote system. |
|
|
The port used on the remote system. |
|
|
The highest registered domain of the remote system without the subdomain. |
|
|
The name of the schema or set of rules that generate analyzed events logs from raw log data that enters the Arctic Wolf observation pipeline. |
|
|
How the Arctic Wolf observation pipeline categorized the analyzed event log. |
|
|
A summary of the analyzed event log. |
|
|
The identifier assigned to the analyzed event log if the event is escalated. |
|
|
The tags that the Arctic Wolf observation pipeline attached to the analyzed event log. |
|
|
An IP address, a domain, or a Unix socket, if available. Server addresses are sometimes ambiguous. Some event logs that originate from ambiguous server addresses include this information. |
|
|
The autonomous system number (ASN) that uniquely identifies each network on the internet. |
|
|
The name of the organization associated with the server. |
|
|
The total number of bytes sent from the server to the client during the event. |
|
|
The server domain. |
|
|
The name of the city where the server is located. |
|
|
The ISO code for the country where the server is located. |
|
|
The name of the country where the server is located. |
|
|
The IPv4 or IPv6 address of the server. |
|
|
The classification of the server IP address as |
|
|
The total number of packets sent from the server to the client during the event. |
|
|
The port used on the server. |
|
|
The email address of the user. |
|
|
The full name of the user. |
|
|
The user ID. |
|
|
The username that identifies a user login or a short name for the user. |
|
|
The username that identifies a user login or a short name for the user. This field is an additional field to account for legacy systems. |
|
|
The person or organization who registered the domain name, according to the WHOIS database. |
|
|
The name of the service that is configured to send log data to Arctic Wolf. A user in your organization usually assigns a name to the service that they configure to forward log data. |
|
|
A list of keywords that the Arctic Wolf observation pipeline associated with the event log source. |
|
|
A CVSS score, which is a number ranging from zero to 10. A score of 10 indicates a risk of the highest severity. For more information, see NIST NVD Vulnerability Metrics. |
|
|
The name of the tactic, according to the MITRE ATT&CK® database, that the identified threat uses. |
|
|
The fingerprint of the certificate that the client offers. The fingerprint is derived from the SHA256 digest of the DER-encoded version of the certificate. |
|
|
The fingerprint of the certificate that the server offers. The fingerprint is derived from the SHA256 digest of the DER-encoded version of the certificate. |
|
|
The domain of the URL. For example, https://www.arcticwolf.com. In some cases, a URL might refer to an IP address and port directly, without a domain name. |
|
|
The complete URL. |
|
|
The path of the request. For example, |
|
|
The person or organization who registered the domain name, according to the WHOIS database. |
|
|
What the email address of the user was changed to. |
|
|
What the full name of the user was changed to. |
|
|
What the user ID was changed to. |
|
|
What the username or the short name for the user was changed to. |
|
|
What the username for the user was changed to. This field is an additional field to account for legacy systems. |
|
|
The email address of the user whose role or privileges an administrator assumed. |
|
|
The full name of the user whose role or privileges an administrator assumed. |
|
|
The ID of the user whose role or privileges an administrator assumed. |
|
|
The username or the short name for the user whose role or privileges an administrator assumed. |
|
|
The username for the user whose role or privileges an administrator assumed. This field is an additional field to account for legacy systems. |
|
|
The email address of the user. |
|
|
The full name of the user. |
|
|
The user ID. |
|
|
The username that identifies a user login or a short name for the user. |
|
|
The email address of the user before an administrator changed it. |
|
|
The full name of the user before an administrator changed it. |
|
|
The ID of the user before an administrator changed it. |
|
|
The username or the short name for the user before an administrator changed it. |
|
|
The username for the user before an administrator changed it. This field is an additional field to account for legacy systems. |
|
|
The username that identifies a user login or a short name for the user. This field is an additional field to account for legacy systems. |
|
|
The user agent in human-readable from. |
|
|
The unparsed user-agent string. |