Hashcat with bcrypt
#1
I have the following hash 
$2a$08$T.139a***ULKFZQTDw0rGuxXXXXXe1PXX3XX1Ds4YSDSc****q6KC
which I understand is  bcrypt with salt (perhaps I'm wrong about the salt, 100% it's bcrypt) 
 
And I wonder how hashcat manage these hashes. I'm running -m 3200 -a 0 (hash file) (dic file) (outfile) 
is that just it and the salt (if any) is handled automatically? 

Also, I have the entire database in CVS file, is there an option to use hashcat on the file and just add entery with the cracked password for each username?