Document toolboxDocument toolbox

mdr.infocyte

Introduction

The tags beginning with mdr.infocyte identify events generated by Infocyte.

Valid tags and data tables

The full tag must have 3 levels. The first two are fixed as mdr.infocyte. The third level identifies the type of events sent.

Technology

Brand

Type

mdr

infocyte

alertdetails

These are the valid tags and corresponding data tables that will receive the parsers' data:

Tag

Data table

mdr.infocyte.alertdetails

mdr.infocyte.alertdetails

How is the data sent to Devo?

To send logs to these tables, Devo provides a collector that you can download and use to send the required events to your Devo domain. You can download the collector and learn how to use it in Infocyte collector.

Log samples

The following are sample logs sent to each of the mdr.infocyte data tables. Also, find how the information will be parsed in your data table under each sample log.

Extra columns

Fields marked as Extra in the table below are not shown by default in data tables and need to be explicitly requested in the query. You can find them marked as Extra when you perform a query so they can be easily identified. Learn more about this in Selecting unrevealed columns.

mdr.infocyte.alertdetails

2022-02-09 13:14:52.697 localhost=127.0.0.1 mdr.infocyte.alertdetails: {"flagId": "string", "flagColor": "string", "flagName": "string", "flagWeight": 0, "threatScore": 0, "threatWeight": 0, "threatName": "string", "avPositives": 0, "avTotal": 0, "hasAvScan": true, "synapse": "string", "dynamicAnalysis": true, "malicious": true, "suspicious": true, "staticAnalysis": true, "whitelist": true, "blacklist": true, "localBlacklist": true, "localWhitelist": true, "unknown": true, "notMalicious": true, "targetId": "string", "data": {}, "size": "123", "sourceId": "string", "sourceVersionId": "string", "sourceType": "string", "id": "string", "name": "string", "type": "string", "description": "string", "severity": "string", "sourceName": "string", "search": "string", "hostname": "string", "itemId": "string", "hostScanId": "string", "scanId": "string", "batchId": "string", "fileRepId": "string", "signed": true, "managed": true, "createdOn": "string", "archived": true}

And this is how the log would be parsed:

Field

Value

Type

Extra fields

eventdate

2022-02-09 13:14:52.697

timestamp


hostname

localhost

str


flagId

string

str


flagColor

string

str


flagName

string

str


flagWeight

0

int8


threatScore

0

int8


threatWeight

0

int8


threatName

string

str


avPositives

0

int8


avTotal

0

int8


hasAvScan

true

bool


synapse

string

str


dynamicAnalysis

true

bool


malicious

true

bool


suspicious

true

bool


staticAnalysis

true

bool


whitelist

true

bool


blacklist

true

bool


localBlacklist

true

bool


localWhitelist

true

bool


unknown

true

bool


notMalicious

true

bool


targetId

string

str


data

{}

str


size

123

int8


sourceId

string

str


sourceVersionId

string

str


sourceType

string

str


id

string

str


name

string

str


type

string

str


description

string

str


severity

string

str


sourceName

string

str


search

string

str


hostname2

string

str


itemId

string

str


hostScanId

string

str


scanId

string

str


batchId

string

str


fileRepId

string

str


signed

true

bool


managed

true

bool


createdOn

string

str


archived

true

bool


hostchain

localhost=127.0.0.1

str

✓

tag

mdr.infocyte.alertdetails

str

✓

rawMessage

{"flagId": "string", "flagColor": "string", "flagName": "string", "flagWeight": 0, "threatScore": 0, "threatWeight": 0, "threatName": "string", "avPositives": 0, "avTotal": 0, "hasAvScan": true, "synapse": "string", "dynamicAnalysis": true, "malicious": true, "suspicious": true, "staticAnalysis": true, "whitelist": true, "blacklist": true, "localBlacklist": true, "localWhitelist": true, "unknown": true, "notMalicious": true, "targetId": "string", "data": {}, "size": "123", "sourceId": "string", "sourceVersionId": "string", "sourceType": "string", "id": "string", "name": "string", "type": "string", "description": "string", "severity": "string", "sourceName": "string", "search": "string", "hostname": "string", "itemId": "string", "hostScanId": "string", "scanId": "string", "batchId": "string", "fileRepId": "string", "signed": true, "managed": true, "createdOn": "string", "archived": true}

str

✓