device.external_ip
) to their corresponding observable types (e.g., IP Address), ensuring structured and consistent extraction.Extract Observables Action Fields
Parameter | Description |
---|---|
Alert ID | The Alert ID received from the incoming alert payload |
Create Observables: | If the Create Observables option is enabled, extracted observables are added to the Observables Table, categorized by type (e.g., IP addresses, usernames). |
Link Existing Observables: | If the Link Existing Observables option is enabled, the extracted observables are linked to the alert record, associating them with existing data for further investigation. |
JSON
outputs are provided for illustrative purposes only. The actual results you see may vary depending on how you have configured the Extract Observables action and the associated Extract Observable Rules.Extract Observables Output Example
Breakdown of the `JSON` Key-Value Pairs
matched_rule
: Indicates whether the alert matched an existing Observable Extraction Rule.rule
: The name of the rule that was matched, if applicable.processing_status
: Represents the current state of the observable extraction workflow.0
observables were extracted.processing_status
field will be omitted from the output. As a result, the processing status will not be updated when the action is executed.extracted_observables
: A list of observables that were successfully extracted from the alert. Each observable object contains the following attributes:id
: A unique identifier for the observable.name
: The logical name of the observable (e.g., agent_id
).type
: The classification of the observable (e.g., Device Agent ID
).content
: The extracted value or identifier (e.g., a hash, string, or ID).relation
: The context in which the observable is associated with the alert (e.g., Target Device
).is_new
: A boolean value that indicates whether the observable was newly extracted during alert processing. If set to true
, the observable is considered new and will be included in the new_observables
array at the bottom of the JSON output. If set to false
, the observable already existed in the system and will not appear in the new_observables
list.case_type
: The case type defines the classification or category assigned to the case that was generated from the alert. This value is typically determined based on the matched rule.new_observables
: [] – This array contains only observables marked with is_new: true
. An observable is considered new and included here only if an identical observable (based on its content
value) does not already exist in the system. This ensures that duplicate observables are not reprocessed.100 observables
to extract from a single alert, the system will not extract any. This is a built-in size limit.
'Extract Observables' Action – Suspicious File Execution Detected
./whoami.rtf
)—is suspicious since RTF files are not meant to be executable. This suggests Masquerading, where attackers disguise malicious files to bypass security measures.The file’s execution indicates a possible attempt to gather system information using the whoami
command. Further investigation is needed to assess the impact and mitigate risks.Click here to view the full Alert's Payload