Interpret data packages from the Trend Vision One data pipeline
This guide explains how to:
-
Interpret data packages downloaded from the Observed Attack Techniques pipeline and the Datalake pipeline.
-
Map numeric codes to their corresponding documentation and understand the structure of the data.
Use this guide to understand the fields in data exported from Trend Vision One.
This guide assumes you downloaded data packages from the Trend Vision One API.
Observed Attack Techniques pipeline packages
-
Extract the data packages using an appropriate tool or library.
The Observed Attack Techniques pipeline API returns archives in GZIP format. The archives have a JSON file with multiple JSON objects (one per line).
{"processFileHashSha256": "8bbdead...", "processUserDomain": "NT AUTHORITY", "eventSubId": 503, "plang": 1, "pver": "1..."... // Additional fields omitted } -
Locate the
eventSourceTypefield in the JSON file. -
Use the following mapping table to decide which activity data category corresponds to your log entries:
eventSourceType
EVENT_SOURCE_TYPE
Activity data category
Detailed schema documentation
1EVENT_SOURCE_TELEMETRYath-endpointActivityData
2EVENT_SOURCE_JAGUARath-detections
3EVENT_SOURCE_EVENT_LOGath-endpointActivityData
5EVENT_SOURCE_EMAIL_METAath-emailActivityData
6EVENT_SOURCE_NETWORK_ACTIVITYath-networkActivityData
7EVENT_SOURCE_MOBILE_ACTIVITYath-mobileActivityData
8EVENT_SOURCE_CONTAINER_ACTIVITYath-containerActivityData
9EVENT_SOURCE_IDENTITY_ACTIVITYath-identityActivityData
10EVENT_SOURCE_COLLABORATION_APP_ACTIVITYath-emailActivityData
- Access the detailed schema documentation based on your package type.
-
View the schema details:
- Go to the API reference of the Get Observed Attack Techniques events API.
-
Locate the schema information:
-
Go to Get Observed Attack Techniques events > Responses
-
Click to expand the "200" response.
-
Expand the "items" object.
-
-
Review the expanded schema showing all available fields and their descriptions.
Datalake pipeline packages
-
Extract the data packages using an appropriate tool or library.
The Datalake pipeline API returns archives in GZIP format. The archives have a JSON file with multiple JSON objects (one per line).
{"processFileHashSha256": "8bbdead...", "processUserDomain": "NT AUTHORITY", "eventSubId": 503, "plang": 1, "pver": "1..."... // Additional fields omitted } -
Locate the
eventSourceTypefield in the JSON file. -
Use the following mapping table to decide which activity data category corresponds to your log entries:
eventSourceType
Detailed schema documentation
EVENT_SOURCE_TELEMETRY Endpoint Activity Data.yaml EVENT_SOURCE_JAGUAR Detections.yaml EVENT_SOURCE_EVENT_LOG Endpoint Activity Data.yaml EVENT_SOURCE_EMAIL_META Email Activity Data.yaml EVENT_SOURCE_NETWORK_ACTIVITY Network Activity Data and Secure Access Activity Data.yaml EVENT_SOURCE_MOBILE_ACTIVITY Mobile Activity Data.yaml EVENT_SOURCE_CONTAINER_ACTIVITY Container Activity Data.yaml EVENT_SOURCE_IDENTITY_ACTIVITY Identity and Access Activity Data.yaml EVENT_SOURCE_COLLABORATION_APP_ACTIVITY Email Activity Data.yaml - Access the detailed schema documentation based on your package type.
