Skip to content

OCSF

Overview

The OCSF (Open Cybersecurity Schema Framework) is an initiative to create a common, open-source set of data standards and schemas for cybersecurity threat information. It aims to improve interoperability and streamline threat data sharing across different tools and platforms.

  • Vendor: OCSF
  • Plan: Defend Core & Defend Prime
  • Supported environment: SaaS
  • Version compatibility: 1.1
  • Detection based on: Telemetry
  • Supported application or feature: System Activity, Findings, Identity & Access Management, Network Activity, Discovery application Activity

Warning

Important note - This format is currently in beta. We highly value your feedback to improve its performance.

Configure

Deploying the Data Collection Architecture

This section will guide you through creating all the AWS resources needed to collect OCSF events. If you already have existing resources that you want to use, you may do so, but any potential issues or incompatibilities with this tutorial will be your responsibility.

Prerequisites

In order to set up the AWS architecture, you need an administator access to the Amazon console with the permissions to create and manage users, Security Lake subscribers, S3 notifications, SQS queues and resource accesses (RAM).

Create a Security DataLake subscriber

To allow Sekoia.io to collect OCSF events, you need an active subscriber.

To create a subscriber:

  1. In the AWS console, navigate to: Services > Security Lake > Subscribers.
  2. Click Create subscriber.
  3. Name the subscriber (e.g: Sekoia.io) and type a description.
  4. Select S3 as the Data access method.
  5. Type the accountID and externalID associated to the access key.
  6. Select the sources you want to forward to Sekoia.io.
  7. Click Create

Pull events

Go to the intake page and create a new intake with the OCSF format.

Type the name of the intake, select the entity and click Next. Select or create an account with the AWS Access Key, the secret key, and the region name. Set up the configuration with the name of the SQS queue (Keep the last part from the arn of the subscription endpoint).

Important

In the configuration settings of your OCSF intake, we recommend using the following configuration by default: chunk_size = 10000 and frequency = 10.

Start the intake and enjoy your events.

Raw Events Samples

In this section, you will find examples of raw logs as generated natively by the source. These examples are provided to help integrators understand the data format before ingestion into Sekoia.io. It is crucial for setting up the correct parsing stages and ensuring that all relevant information is captured.

{
    "activity_id": 1,
    "activity_name": "Create",
    "actor": {
        "idp": {
            "name": null
        },
        "invoked_by": null,
        "session": {
            "created_time": 1700239437000,
            "created_time_dt": "2023-11-17T16:43:57Z",
            "is_mfa": false,
            "issuer": "arn:aws:iam::112233445566:role/Admin"
        },
        "user": {
            "account": {
                "uid": "112233445566"
            },
            "credential_uid": null,
            "type": "AssumedRole",
            "uid": "arn:aws:sts::112233445566:assumed-role/Admin/Admin-user",
            "uid_alt": "AROA2W7SOKHEXAMPLE:Admin-user"
        }
    },
    "api": {
        "operation": "CreateUser",
        "request": {
            "data": {
                "userName": "test_user2"
            },
            "uid": "c99bf9da-e0bd-4bf7-bb32-example"
        },
        "response": {
            "data": {
                "user": {
                    "arn": "arn:aws:iam::112233445566:user/test_user2",
                    "createDate": "Mar 17, 2023 5:07:59 PM",
                    "path": "/",
                    "userId": "AIDA2W7SOKHEXAMPLE",
                    "userName": "test_user2"
                }
            },
            "error": null,
            "message": null
        },
        "service": {
            "name": "iam.amazonaws.com"
        },
        "version": null
    },
    "category_name": "Identity & Access Management Category",
    "category_uid": 3,
    "class_name": "Account Change",
    "class_uid": 3001,
    "cloud": {
        "provider": "AWS",
        "region": "us-east-1"
    },
    "http_request": {
        "user_agent": "AWS Internal"
    },
    "metadata": {
        "log_name": "AwsApiCall",
        "log_provider": "CloudTrail",
        "product": {
            "feature": {
                "name": "Management"
            },
            "name": "CloudTrail",
            "vendor_name": "AWS",
            "version": "1.08"
        },
        "profiles": [
            "cloud",
            "datetime"
        ],
        "uid": "7dd15a89-ae0f-4340-8e6c-example",
        "version": "1.1.0"
    },
    "observables": [
        {
            "name": "user.name",
            "type": "User",
            "type_id": 4,
            "value": "test_user2"
        },
        {
            "name": "src_endpoint.ip",
            "type": "IP Address",
            "type_id": 2,
            "value": "52.95.4.21"
        }
    ],
    "severity": "Informational",
    "severity_id": 1,
    "src_endpoint": {
        "ip": "52.95.4.21",
        "uid": null
    },
    "time": 1679072879000,
    "time_dt": "2023-03-17T17:07:59Z",
    "type_name": "Account Change: Create",
    "type_uid": 300101,
    "unmapped": {
        "eventType": "AwsApiCall",
        "managementEvent": true,
        "readOnly": false,
        "recipientAccountId": "112233445566",
        "requestParameters": {
            "userName": "test_user2"
        },
        "responseElements": {
            "user": {
                "arn": "arn:aws:iam::112233445566:user/test_user2",
                "createDate": "Mar 17, 2023 5:07:59 PM",
                "path": "/",
                "userId": "AIDA2W7SOKHEXAMPLE",
                "userName": "test_user2"
            }
        },
        "sessionCredentialFromConsole": "true",
        "userIdentity": {
            "sessionContext": {
                "attributes": {
                    "mfaAuthenticated": "false"
                },
                "sessionIssuer": {
                    "accountId": "112233445566",
                    "principalId": "AROA2W7SOKHEXAMPLE",
                    "type": "Role"
                },
                "webIdFederationData": {}
            }
        }
    },
    "user": {
        "name": "test_user2",
        "uid": "AROA2W7SOKHEXAMPLE:Admin-user"
    }
}
{
    "activity_id": 2,
    "activity_name": "Read",
    "actor": {
        "idp": {
            "name": null
        },
        "invoked_by": null,
        "session": {
            "created_time": 0,
            "created_time_dt": null,
            "issuer": null
        },
        "user": {
            "account": {
                "uid": "1111111111111"
            },
            "credential_uid": "AKIA3Z2XBVEXAMPLE",
            "name": "Level6",
            "type": "IAMUser",
            "uid": "arn:aws:iam::1111111111111:user/Level6",
            "uid_alt": "AIDADO2GQEXAMPLE"
        }
    },
    "api": {
        "operation": "DescribeDirectConnectGateways",
        "request": {
            "data": null,
            "uid": "1c8a6220-4263-4763-b526-example"
        },
        "response": {
            "data": {
                "directConnectGateways": []
            },
            "error": null,
            "message": null
        },
        "service": {
            "name": "directconnect.amazonaws.com"
        },
        "version": null
    },
    "category_name": "Application Activity",
    "category_uid": 6,
    "class_name": "API Activity",
    "class_uid": 6003,
    "cloud": {
        "provider": "AWS",
        "region": "us-east-1"
    },
    "http_request": {
        "user_agent": "Boto3/1.15.2 Python/3.8.2 Linux/5.6.3-arch1-1 Botocore/1.18.2"
    },
    "metadata": {
        "log_name": "AwsApiCall",
        "log_provider": "CloudTrail",
        "product": {
            "feature": {
                "name": null
            },
            "name": "CloudTrail",
            "vendor_name": "AWS",
            "version": "1.05"
        },
        "profiles": [
            "cloud",
            "datetime"
        ],
        "uid": "71c88be9-ea5c-43c7-8c82-example",
        "version": "1.1.0"
    },
    "observables": [
        {
            "name": "actor.user.name",
            "type": "User",
            "type_id": 4,
            "value": "Level6"
        },
        {
            "name": "src_endpoint.ip",
            "type": "IP Address",
            "type_id": 2,
            "value": "205.8.181.128"
        }
    ],
    "severity": "Informational",
    "severity_id": 1,
    "src_endpoint": {
        "ip": "205.8.181.128"
    },
    "status": null,
    "status_id": 99,
    "time": 1695334972000,
    "time_dt": "2023-09-21T22:22:52Z",
    "type_name": "API Activity: Read",
    "type_uid": 600302,
    "unmapped": {
        "eventType": "AwsApiCall",
        "recipientAccountId": "1111111111111",
        "requestParameters": null,
        "responseElements": {
            "directConnectGateways": []
        },
        "userIdentity": {}
    }
}
{
    "activity_id": 1,
    "activity_name": "Create",
    "actor": {
        "session": {
            "credential_uid": "EXAMPLEUIDTEST",
            "issuer": "arn:aws:iam::123456789012:role/example-test-161366663-NodeInstanceRole-abc12345678912",
            "uid": "i-12345678901"
        },
        "user": {
            "groups": [
                {
                    "name": "system:bootstrappers"
                },
                {
                    "name": "system:nodes"
                },
                {
                    "name": "system:authenticated"
                }
            ],
            "name": "system:node:ip-192-001-02-03.ec2.internal",
            "type_id": 0,
            "uid": "heptio-authenticator-aws:123456789012:ABCD1234567890EXAMPLE"
        }
    },
    "api": {
        "operation": "create",
        "request": {
            "uid": "f47c68f2-d3ac-4f96-b2f4-5d497bf79b64"
        },
        "response": {
            "code": 201
        },
        "version": "v1"
    },
    "category_name": "Application Activity",
    "category_uid": 6,
    "class_name": "API Activity",
    "class_uid": 6003,
    "cloud": {
        "account": {
            "uid": "arn:aws:sts::123456789012:assumed-role/example-test-161366663-NodeInstanceRole-abc12345678912/i-12345678901"
        },
        "provider": "AWS"
    },
    "http_request": {
        "url": {
            "path": "/api/v1/nodes"
        },
        "user_agent": "kubelet/v1.21.2 (linux/amd64) kubernetes/729bdfc"
    },
    "message": "ResponseComplete",
    "metadata": {
        "log_level": "RequestResponse",
        "product": {
            "feature": {
                "name": "Elastic Kubernetes Service"
            },
            "name": "Amazon EKS",
            "vendor_name": "AWS",
            "version": "audit.k8s.io/v1"
        },
        "profiles": [
            "cloud",
            "datetime"
        ],
        "version": "1.1.0"
    },
    "observables": [
        {
            "name": "actor.user.name",
            "type": "User Name",
            "type_id": 4,
            "value": "system:node:ip-192-001-02-03.ec2.internal"
        },
        {
            "name": "src_endpoint.ip",
            "type": "IP Address",
            "type_id": 2,
            "value": "12.000.22.33"
        },
        {
            "name": "http_request.url.path",
            "type": "URL String",
            "type_id": 6,
            "value": "/api/v1/nodes"
        }
    ],
    "resources": [
        {
            "name": "ip-192-001-02-03.ec2.internal",
            "type": "nodes"
        }
    ],
    "severity": "Informational",
    "severity_id": 1,
    "src_endpoint": {
        "ip": "12.000.22.33"
    },
    "start_time_dt": "2021-09-07 20:37:30.502000",
    "time": 1631047050642,
    "time_dt": "2021-09-07 20:37:30.642000",
    "type_name": "API Activity: Create",
    "type_uid": 600301,
    "unmapped": {
        "responseObject.status.capacity.cpu": "4",
        "annotations.authorization.k8s.io/reason": "",
        "requestObject.metadata.annotations.volumes.kubernetes.io/controller-managed-attach-detach": "true",
        "responseObject.metadata.labels.kubernetes.io/hostname": "ip-192-001-02-03.ec2.internal",
        "requestObject.metadata.labels.eks.amazonaws.com/sourceLaunchTemplateVersion": "1",
        "responseObject.metadata.labels.alpha.eksctl.io/cluster-name": "ABCD1234567890EXAMPLE",
        "responseObject.metadata.labels.eks.amazonaws.com/nodegroup-image": "ami-0193ebf9573ebc9f7",
        "responseObject.metadata.managedFields[].time": "2021-09-07T20:37:30Z",
        "responseObject.status.nodeInfo.kubeletVersion": "v1.21.2-eks-55daa9d",
        "responseObject.status.nodeInfo.kubeProxyVersion": "v1.21.2-eks-55daa9d",
        "requestObject.status.capacity.hugepages-1Gi": "0",
        "responseObject.metadata.managedFields[].manager": "kubelet",
        "annotations.authorization.k8s.io/decision": "allow",
        "requestObject.status.nodeInfo.systemUUID": "ec2483c6-33b0-e271-f36c-e14e45a361b8",
        "responseObject.metadata.name": "ip-192-001-02-03.ec2.internal",
        "responseObject.metadata.labels.eks.amazonaws.com/sourceLaunchTemplateVersion": "1",
        "responseObject.apiVersion": "v1",
        "requestObject.metadata.labels.kubernetes.io/arch": "amd64",
        "requestObject.status.allocatable.hugepages-2Mi": "0",
        "requestObject.metadata.labels.alpha.eksctl.io/cluster-name": "ABCD1234567890EXAMPLE",
        "responseObject.status.allocatable.memory": "15076868Ki",
        "responseObject.status.conditions[].lastHeartbeatTime": "2021-09-07T20:37:28Z,2021-09-07T20:37:28Z,2021-09-07T20:37:28Z,2021-09-07T20:37:28Z",
        "responseObject.spec.providerID": "aws:///us-east-1f/i-12345678901",
        "requestObject.status.nodeInfo.architecture": "amd64",
        "responseObject.status.nodeInfo.kernelVersion": "5.4.141-67.229.amzn2.x86_64",
        "responseObject.status.allocatable.pods": "58",
        "requestObject.status.conditions[].status": "False,False,False,False",
        "requestObject.metadata.labels.failure-domain.beta.kubernetes.io/region": "us-east-1",
        "responseObject.metadata.labels.beta.kubernetes.io/os": "linux",
        "responseObject.metadata.labels.kubernetes.io/os": "linux",
        "requestObject.status.addresses[].address": "192.000.22.33,12.000.22.33,ip-192-001-02-03.ec2.internal,ip-192-001-02-03.ec2.internal,ec2-12.000.22.33.compute-1.amazonaws.com",
        "responseObject.status.capacity.hugepages-1Gi": "0",
        "responseObject.status.conditions[].reason": "KubeletHasSufficientMemory,KubeletHasNoDiskPressure,KubeletHasSufficientPID,KubeletNotReady",
        "requestObject.apiVersion": "v1",
        "requestObject.status.capacity.cpu": "4",
        "requestObject.metadata.labels.node.kubernetes.io/instance-type": "m5.xlarge",
        "requestObject.metadata.labels.eks.amazonaws.com/nodegroup-image": "ami-0193ebf9573ebc9f7",
        "responseObject.metadata.labels.node.kubernetes.io/instance-type": "m5.xlarge",
        "responseObject.status.allocatable.hugepages-2Mi": "0",
        "responseObject.status.allocatable.attachable-volumes-aws-ebs": "25",
        "requestObject.status.nodeInfo.containerRuntimeVersion": "docker://19.3.13",
        "requestObject.status.allocatable.attachable-volumes-aws-ebs": "25",
        "responseObject.status.conditions[].lastTransitionTime": "2021-09-07T20:37:28Z,2021-09-07T20:37:28Z,2021-09-07T20:37:28Z,2021-09-07T20:37:28Z",
        "responseObject.metadata.creationTimestamp": "2021-09-07T20:37:30Z",
        "requestObject.metadata.labels.kubernetes.io/hostname": "ip-192-001-02-03.ec2.internal",
        "requestObject.status.nodeInfo.bootID": "0d0dd4f2-8829-4b03-9f29-794f4908281b",
        "requestObject.status.nodeInfo.kubeProxyVersion": "v1.21.2-eks-55daa9d",
        "responseObject.kind": "Node",
        "requestObject.status.nodeInfo.osImage": "Amazon Linux 2",
        "requestObject.status.conditions[].type": "MemoryPressure,DiskPressure,PIDPressure,Ready",
        "requestObject.status.daemonEndpoints.kubeletEndpoint.Port": "10250",
        "responseObject.metadata.labels.kubernetes.io/arch": "amd64",
        "responseObject.metadata.labels.eks.amazonaws.com/sourceLaunchTemplateId": "lt-0f20d6f901007611e",
        "requestObject.status.capacity.attachable-volumes-aws-ebs": "25",
        "responseObject.status.conditions[].message": "kubelet has sufficient memory available,kubelet has no disk pressure,kubelet has sufficient PID available,[container runtime status check may not have completed yet, container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:docker: network plugin is not ready: cni config uninitialized, CSINode is not yet initialized, missing node capacity for resources: ephemeral-storage]",
        "responseObject.status.nodeInfo.operatingSystem": "linux",
        "requestObject.metadata.labels.alpha.eksctl.io/nodegroup-name": "ng-5fe434eb",
        "responseObject.status.capacity.memory": "16093700Ki",
        "requestObject.metadata.labels.beta.kubernetes.io/arch": "amd64",
        "requestObject.metadata.labels.eks.amazonaws.com/capacityType": "ON_DEMAND",
        "requestObject.status.allocatable.memory": "15076868Ki",
        "requestObject.status.conditions[].lastHeartbeatTime": "2021-09-07T20:37:28Z,2021-09-07T20:37:28Z,2021-09-07T20:37:28Z,2021-09-07T20:37:28Z",
        "responseObject.status.capacity.attachable-volumes-aws-ebs": "25",
        "responseObject.status.nodeInfo.osImage": "Amazon Linux 2",
        "responseObject.metadata.labels.beta.kubernetes.io/instance-type": "m5.xlarge",
        "responseObject.metadata.labels.alpha.eksctl.io/nodegroup-name": "ng-5fe434eb",
        "requestObject.metadata.labels.beta.kubernetes.io/instance-type": "m5.xlarge",
        "responseObject.status.nodeInfo.architecture": "amd64",
        "responseObject.metadata.labels.topology.kubernetes.io/zone": "us-east-1f",
        "requestObject.status.capacity.hugepages-2Mi": "0",
        "requestObject.status.conditions[].message": "kubelet has sufficient memory available,kubelet has no disk pressure,kubelet has sufficient PID available,[container runtime status check may not have completed yet, container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:docker: network plugin is not ready: cni config uninitialized, CSINode is not yet initialized, missing node capacity for resources: ephemeral-storage]",
        "responseObject.metadata.labels.failure-domain.beta.kubernetes.io/region": "us-east-1",
        "requestObject.metadata.labels.eks.amazonaws.com/sourceLaunchTemplateId": "lt-0f20d6f901007611e",
        "responseObject.spec.taints[].effect": "NoSchedule",
        "requestObject.metadata.labels.topology.kubernetes.io/region": "us-east-1",
        "requestObject.metadata.name": "ip-192-001-02-03.ec2.internal",
        "responseObject.status.nodeInfo.machineID": "ec2483c633b0e271f36ce14e45a361b8",
        "kind": "Event",
        "responseObject.metadata.annotations.volumes.kubernetes.io/controller-managed-attach-detach": "true",
        "responseObject.status.nodeInfo.bootID": "0d0dd4f2-8829-4b03-9f29-794f4908281b",
        "responseObject.status.conditions[].status": "False,False,False,False",
        "requestObject.metadata.labels.beta.kubernetes.io/os": "linux",
        "requestObject.status.allocatable.hugepages-1Gi": "0",
        "requestObject.status.addresses[].type": "InternalIP,ExternalIP,Hostname,InternalDNS,ExternalDNS",
        "requestObject.metadata.labels.failure-domain.beta.kubernetes.io/zone": "us-east-1f",
        "requestObject.status.allocatable.cpu": "3920m",
        "requestObject.metadata.labels.kubernetes.io/os": "linux",
        "requestObject.status.nodeInfo.operatingSystem": "linux",
        "responseObject.status.daemonEndpoints.kubeletEndpoint.Port": "10250",
        "responseObject.status.nodeInfo.systemUUID": "ec2483c6-33b0-e271-f36c-e14e45a361b8",
        "responseObject.metadata.labels.failure-domain.beta.kubernetes.io/zone": "us-east-1f",
        "requestObject.metadata.labels.topology.kubernetes.io/zone": "us-east-1f",
        "responseObject.status.nodeInfo.containerRuntimeVersion": "docker://19.3.13",
        "requestObject.status.nodeInfo.kernelVersion": "5.4.141-67.229.amzn2.x86_64",
        "requestObject.kind": "Node",
        "requestObject.spec.providerID": "aws:///us-east-1f/i-12345678901",
        "responseObject.metadata.uid": "4ecf628a-1b50-47ed-932c-bb1df89dad10",
        "responseObject.status.capacity.hugepages-2Mi": "0",
        "responseObject.metadata.managedFields[].fieldsType": "FieldsV1",
        "responseObject.metadata.labels.topology.kubernetes.io/region": "us-east-1",
        "responseObject.status.capacity.pods": "58",
        "requestObject.status.capacity.memory": "16093700Ki",
        "responseObject.metadata.managedFields[].apiVersion": "v1",
        "responseObject.status.allocatable.hugepages-1Gi": "0",
        "responseObject.metadata.resourceVersion": "67933403",
        "responseObject.status.addresses[].address": "192.000.22.33,12.000.22.33,ip-192-001-02-03.ec2.internal,ip-192-001-02-03.ec2.internal,ec2-12.000.22.33.compute-1.amazonaws.com",
        "requestObject.status.conditions[].lastTransitionTime": "2021-09-07T20:37:28Z,2021-09-07T20:37:28Z,2021-09-07T20:37:28Z,2021-09-07T20:37:28Z",
        "requestObject.status.nodeInfo.kubeletVersion": "v1.21.2-eks-55daa9d",
        "responseObject.metadata.labels.eks.amazonaws.com/nodegroup": "ng-5fe434eb",
        "requestObject.metadata.labels.eks.amazonaws.com/nodegroup": "ng-5fe434eb",
        "requestObject.status.conditions[].reason": "KubeletHasSufficientMemory,KubeletHasNoDiskPressure,KubeletHasSufficientPID,KubeletNotReady",
        "responseObject.metadata.labels.eks.amazonaws.com/capacityType": "ON_DEMAND",
        "requestObject.status.nodeInfo.machineID": "ec2483c633b0e271f36ce14e45a361b8",
        "responseObject.status.addresses[].type": "InternalIP,ExternalIP,Hostname,InternalDNS,ExternalDNS",
        "responseObject.metadata.labels.beta.kubernetes.io/arch": "amd64",
        "responseObject.metadata.managedFields[].operation": "Update",
        "responseObject.status.allocatable.cpu": "3920m",
        "responseObject.status.conditions[].type": "MemoryPressure,DiskPressure,PIDPressure,Ready",
        "responseObject.spec.taints[].key": "node.kubernetes.io/not-ready",
        "sourceIPs[]": "12.000.22.33",
        "requestObject.status.capacity.pods": "58",
        "requestObject.status.allocatable.pods": "58"
    }
}
{
    "activity_id": 1,
    "activity_name": "Logon",
    "actor": {
        "idp": {
            "name": null
        },
        "invoked_by": null,
        "session": {
            "issuer": null
        },
        "user": {
            "account": {
                "uid": "111122223333"
            },
            "credential_uid": null,
            "name": "anaya",
            "type": "IAMUser",
            "uid": "arn:aws:iam::111122223333:user/anaya",
            "uid_alt": "AIDACKCEVSQ6C2EXAMPLE"
        }
    },
    "api": {
        "operation": "ConsoleLogin",
        "request": {
            "data": null,
            "uid": ""
        },
        "response": {
            "data": {
                "ConsoleLogin": "Success"
            },
            "error": null,
            "message": null
        },
        "service": {
            "name": "signin.amazonaws.com"
        },
        "version": null
    },
    "category_name": "Identity & Access Management Category",
    "category_uid": 3,
    "class_name": "Authentication",
    "class_uid": 3002,
    "cloud": {
        "provider": "AWS",
        "region": "us-east-1"
    },
    "dst_endpoint": {
        "svc_name": "https://console.aws.amazon.com/console/home?state=hashArgs%23&isauthcode=true"
    },
    "http_request": {
        "user_agent": "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_11_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.99 Safari/537.36"
    },
    "is_mfa": true,
    "metadata": {
        "event_code": "AwsConsoleSignIn",
        "log_provider": "CloudTrail",
        "product": {
            "feature": {
                "name": "Management"
            },
            "name": "CloudTrail",
            "vendor_name": "AWS",
            "version": "1.08"
        },
        "profiles": [
            "cloud",
            "datetime"
        ],
        "uid": "fed06f42-cb12-4764-8c69-example",
        "version": "1.1.0"
    },
    "observables": [
        {
            "name": "src_endpoint.ip",
            "type": "IP Address",
            "type_id": 2,
            "value": "192.0.2.0"
        }
    ],
    "session": {
        "expiration_time": null
    },
    "severity": "Informational",
    "severity_id": 1,
    "src_endpoint": {
        "ip": "192.0.2.0"
    },
    "status": "Success",
    "status_id": 1,
    "time": 1699633474000,
    "time_dt": "2023-11-10T16:24:34Z",
    "type_name": "Authentication: Logon",
    "type_uid": 300201,
    "unmapped": {
        "additionalEventData": {
            "LoginTo": "https://console.aws.amazon.com/console/home?state=hashArgs%23&isauthcode=true",
            "MFAIdentifier": "arn:aws:iam::111122223333:u2f/user/anaya/default-AAAAAAAABBBBBBBBCCCCCCCCDD",
            "MobileVersion": "No"
        },
        "eventType": "AwsConsoleSignIn",
        "recipientAccountId": "111122223333",
        "requestParameters": null,
        "responseElements": {},
        "userIdentity": {}
    },
    "user": {
        "uid": "arn:aws:iam::111122223333:user/anaya",
        "uid_alt": "AIDACKCEVSQ6C2EXAMPLE"
    }
}
{
    "activity_id": 1,
    "activity_name": "Logon",
    "actor": {
        "process": {
            "file": {
                "name": "services.exe",
                "parent_folder": "C:\\Windows\\System32",
                "path": "C:\\Windows\\System32\\services.exe",
                "type": "Regular File",
                "type_id": 1
            },
            "pid": 848
        },
        "session": {
            "uid": "0x3E7"
        },
        "user": {
            "account_type": "Windows Account",
            "account_type_id": 2,
            "domain": "ATTACKRANGE",
            "name": "WIN-DC-725$",
            "uid": "NT AUTHORITY\\SYSTEM"
        }
    },
    "auth_protocol": "Other",
    "auth_protocol_id": 99,
    "category_name": "Audit Activity",
    "category_uid": 3,
    "class_name": "Authentication",
    "class_uid": 3002,
    "device": {
        "hostname": "win-dc-725.attackrange.local",
        "os": {
            "name": "Windows",
            "type": "Windows",
            "type_id": 100
        },
        "type": "Unknown",
        "type_id": 0
    },
    "dst_endpoint": {
        "hostname": "win-dc-725.attackrange.local"
    },
    "logon_process": {
        "name": "Advapi  ",
        "pid": -1
    },
    "logon_type": "OS Service",
    "logon_type_id": 5,
    "message": "An account was successfully logged on.",
    "metadata": {
        "original_time": "03/12/2021 10:48:14 AM",
        "product": {
            "feature": {
                "name": "Security"
            },
            "name": "Microsoft Windows",
            "vendor_name": "Microsoft"
        },
        "profiles": [
            "host"
        ],
        "uid": "ce139867-ced1-4742-9bb0-ad1926b8bbe1",
        "version": "1.0.0-rc.2"
    },
    "session": {
        "uid": "0x3E7",
        "uuid": "{00000000-0000-0000-0000-000000000000}"
    },
    "severity": "Informational",
    "severity_id": 1,
    "src_endpoint": {
        "ip": "-",
        "name": "-",
        "port": 0
    },
    "status": "Success",
    "status_id": 1,
    "time": 1615564094000,
    "type_name": "Authentication: Logon",
    "type_uid": 300201,
    "unmapped": {
        "Detailed Authentication Information": {
            "Key Length": "0",
            "Package Name (NTLM only)": "-",
            "Transited Services": "-"
        },
        "EventCode": "4624",
        "EventType": "0",
        "Impersonation Level": "Impersonation",
        "Logon Information": {
            "Elevated Token": "Yes",
            "Restricted Admin Mode": "-",
            "Virtual Account": "No"
        },
        "New Logon": {
            "Linked Logon ID": "0x0",
            "Network Account Domain": "-",
            "Network Account Name": "-"
        },
        "OpCode": "Info",
        "RecordNumber": "257879",
        "SourceName": "Microsoft Windows security auditing.",
        "TaskCategory": "Logon"
    },
    "user": {
        "account_type": "Windows Account",
        "account_type_id": 2,
        "domain": "NT AUTHORITY",
        "name": "SYSTEM",
        "uid": "NT AUTHORITY\\SYSTEM"
    }
}
{
    "activity_id": 1,
    "activity_name": "Logon",
    "actor": {
        "process": {
            "file": {
                "name": "-",
                "path": "-",
                "type": "Regular File",
                "type_id": 1
            },
            "pid": 0
        },
        "session": {
            "uid": "0x0"
        },
        "user": {
            "account_type": "Windows Account",
            "account_type_id": 2,
            "domain": "-",
            "name": "-",
            "uid": "NULL SID"
        }
    },
    "auth_protocol": "NTLM",
    "auth_protocol_id": 1,
    "category_name": "Audit Activity",
    "category_uid": 3,
    "class_name": "Authentication",
    "class_uid": 3002,
    "device": {
        "hostname": "EC2AMAZ-6KJ2BPP",
        "os": {
            "name": "Windows",
            "type": "Windows",
            "type_id": 100
        },
        "type": "Unknown",
        "type_id": 0
    },
    "dst_endpoint": {
        "hostname": "EC2AMAZ-6KJ2BPP"
    },
    "logon_process": {
        "name": "NtLmSsp ",
        "pid": -1
    },
    "logon_type": "Network",
    "logon_type_id": 3,
    "message": "An account failed to log on.",
    "metadata": {
        "original_time": "10/08/2020 12:41:47 PM",
        "product": {
            "feature": {
                "name": "Security"
            },
            "name": "Microsoft Windows",
            "vendor_name": "Microsoft"
        },
        "profiles": [
            "host"
        ],
        "uid": "a738d6e6-4ebd-49bb-805e-45d0604a1bef",
        "version": "1.0.0-rc.2"
    },
    "severity": "Informational",
    "severity_id": 1,
    "src_endpoint": {
        "ip": "-",
        "name": "EC2AMAZ-6KJ2BPP",
        "port": 0
    },
    "status": "0xC000006D",
    "status_detail": "Unknown user name or bad password.",
    "status_id": 2,
    "time": 1602175307000,
    "type_name": "Authentication: Logon",
    "type_uid": 300201,
    "unmapped": {
        "Detailed Authentication Information": {
            "Key Length": "0",
            "Package Name (NTLM only)": "-",
            "Transited Services": "-"
        },
        "EventCode": "4625",
        "EventType": "0",
        "Failure Information": {
            "Sub Status": "0xC000006A"
        },
        "OpCode": "Info",
        "RecordNumber": "223742",
        "SourceName": "Microsoft Windows security auditing.",
        "TaskCategory": "Logon"
    },
    "user": {
        "account_type": "Windows Account",
        "account_type_id": 2,
        "domain": "EC2AMAZ-6KJ2BPP",
        "name": "Administrator",
        "uid": "NULL SID"
    }
}
{
    "activity_id": 2,
    "activity_name": "Update",
    "category_name": "Findings",
    "category_uid": 2,
    "class_name": "Compliance Finding",
    "class_uid": 2003,
    "cloud": {
        "account": {
            "uid": "111111111111"
        },
        "provider": "AWS",
        "region": "us-east-2"
    },
    "compliance": {
        "control": "Config.1",
        "requirements": [
            "PCI DSS 10.5.2",
            "PCI DSS 11.5"
        ],
        "standards": [
            "standards/pci-dss/v/3.2.1"
        ],
        "status": "FAILED"
    },
    "finding_info": {
        "created_time_dt": "2023-01-13T15:08:44.967-05:00",
        "desc": "This AWS control checks whether AWS Config is enabled in current account and region.",
        "first_seen_time_dt": "2023-01-13T15:08:44.967-05:00",
        "last_seen_time_dt": "2023-07-21T14:12:05.693-04:00",
        "modified_time_dt": "2023-07-21T14:11:53.060-04:00",
        "title": "PCI.Config.1 AWS Config should be enabled",
        "types": [
            "Software and Configuration Checks/Industry and Regulatory Standards/PCI-DSS"
        ],
        "uid": "arn:aws:securityhub:us-east-2:111111111111:subscription/pci-dss/v/3.2.1/PCI.Config.1/finding/7d619054-6f0d-456b-aa75-23b20f74fae6"
    },
    "metadata": {
        "log_version": "2018-10-08",
        "processed_time_dt": "2023-07-21T14:12:08.489-04:00",
        "product": {
            "feature": {
                "uid": "pci-dss/v/3.2.1/PCI.Config.1"
            },
            "name": "Security Hub",
            "uid": "arn:aws:securityhub:us-east-2::product/aws/securityhub",
            "vendor_name": "AWS"
        },
        "profiles": [
            "cloud",
            "datetime"
        ],
        "version": "1.1.0"
    },
    "observables": [
        {
            "name": "resource.uid",
            "type": "Resource UID",
            "type_id": 10,
            "value": "AWS::::Account:111111111111"
        }
    ],
    "remediation": {
        "desc": "For information on how to correct this issue, consult the AWS Security Hub controls documentation.",
        "references": [
            "https://docs.aws.amazon.com/console/securityhub/Config.1/remediation"
        ]
    },
    "resource": {
        "cloud_partition": "aws",
        "region": "us-east-2",
        "type": "AwsAccount",
        "uid": "AWS::::Account:111111111111"
    },
    "severity": "Medium",
    "severity_id": 3,
    "status": "New",
    "time": 1689963113060,
    "time_dt": "2023-07-21T14:11:53.060-04:00",
    "type_name": "Compliance Finding: Update",
    "type_uid": 200302,
    "unmapped": {
        "FindingProviderFields.Severity.Label": "MEDIUM",
        "FindingProviderFields.Severity.Original": "MEDIUM",
        "FindingProviderFields.Types[]": "Software and Configuration Checks/Industry and Regulatory Standards/PCI-DSS",
        "ProductFields.ControlId": "PCI.Config.1",
        "ProductFields.RecommendationUrl": "https://docs.aws.amazon.com/console/securityhub/Config.1/remediation",
        "ProductFields.Resources:0/Id": "arn:aws:iam::111111111111:root",
        "ProductFields.StandardsArn": "arn:aws:securityhub:::standards/pci-dss/v/3.2.1",
        "ProductFields.StandardsControlArn": "arn:aws:securityhub:us-east-2:111111111111:control/pci-dss/v/3.2.1/PCI.Config.1",
        "ProductFields.StandardsSubscriptionArn": "arn:aws:securityhub:us-east-2:111111111111:subscription/pci-dss/v/3.2.1",
        "ProductFields.aws/securityhub/CompanyName": "AWS",
        "ProductFields.aws/securityhub/FindingId": "arn:aws:securityhub:us-east-2::product/aws/securityhub/arn:aws:securityhub:us-east-2:111111111111:subscription/pci-dss/v/3.2.1/PCI.Config.1/finding/7d619054-6f0d-456b-aa75-23b20f74fae6",
        "ProductFields.aws/securityhub/ProductName": "Security Hub",
        "RecordState": "ACTIVE",
        "Severity.Normalized": "40",
        "Severity.Original": "MEDIUM",
        "Severity.Product": "40",
        "WorkflowState": "NEW"
    }
}
{
    "activity_id": 1,
    "activity_name": "Create",
    "category_name": "Findings",
    "category_uid": 2,
    "class_name": "Detection Finding",
    "class_uid": 2004,
    "cloud": {
        "account": {
            "uid": "111111111111"
        },
        "provider": "AWS",
        "region": "us-east-2"
    },
    "evidences": [
        {
            "api": {
                "operation": "DeleteTrail",
                "service": {
                    "name": "cloudtrail.amazonaws.com"
                }
            },
            "data": "",
            "src_endpoint": {
                "ip": "52.94.133.131",
                "location": {
                    "city": "",
                    "coordinates": [
                        -100.821999,
                        37.751
                    ],
                    "country": "United States"
                }
            }
        }
    ],
    "finding_info": {
        "created_time_dt": "2023-09-19T11:05:22.487-04:00",
        "desc": "AWS CloudTrail trail arn:aws:cloudtrail:us-east-2:111111111111:trail/delete-me was disabled by Admin calling DeleteTrail under unusual circumstances. This can be attackers attempt to cover their tracks by eliminating any trace of activity performed while they accessed your account.",
        "first_seen_time_dt": "2023-09-19T10:55:09.000-04:00",
        "last_seen_time_dt": "2023-09-19T10:55:09.000-04:00",
        "modified_time_dt": "2023-09-19T11:05:22.487-04:00",
        "src_url": "https://us-east-2.console.aws.amazon.com/guardduty/home?region=us-east-2#/findings?macros=current&fId=a6c556fcbc9bea427a19f8b787099a0b",
        "title": "AWS CloudTrail trail arn:aws:cloudtrail:us-east-2:111111111111:trail/delete-me was disabled.",
        "types": [
            "TTPs/Defense Evasion/Stealth:IAMUser-CloudTrailLoggingDisabled"
        ],
        "uid": "arn:aws:guardduty:us-east-2:111111111111:detector/1ac1bfceda6679698215d5d0EXAMPLE/finding/a6c556fcbc9bea427a19f8b787099a0b"
    },
    "metadata": {
        "extensions": [
            {
                "name": "linux",
                "uid": "1",
                "version": "1.1.0"
            }
        ],
        "log_version": "2018-10-08",
        "product": {
            "feature": {
                "uid": "arn:aws:guardduty:us-east-2:111111111111:detector/1ac1bfceda6679698215d5d0EXAMPLE"
            },
            "name": "GuardDuty",
            "uid": "arn:aws:securityhub:us-east-2::product/aws/guardduty",
            "vendor_name": "Amazon"
        },
        "profiles": [
            "cloud",
            "datetime",
            "linux"
        ],
        "version": "1.1.0"
    },
    "observables": [
        {
            "name": "evidences[].src_endpoint.ip",
            "type": "IP Address",
            "type_id": 2,
            "value": "52.94.133.131"
        },
        {
            "name": "resources[].uid",
            "type": "Resource UID",
            "type_id": 10,
            "value": "AWS::IAM::AccessKey:ASIATMJPC7EXAMPLE"
        }
    ],
    "resources": [
        {
            "cloud_partition": "aws",
            "data": "{\"AwsIamAccessKey\":{\"PrincipalId\":\"AROATMJPC7YEXAMPLE:example\",\"PrincipalName\":\"Admin\",\"PrincipalType\":\"AssumedRole\"}}",
            "region": "us-east-2",
            "type": "AwsIamAccessKey",
            "uid": "AWS::IAM::AccessKey:ASIATMJPC7EXAMPLE"
        }
    ],
    "severity": "Low",
    "severity_id": 2,
    "status": "New",
    "time": 1695135922487,
    "time_dt": "2023-09-19T11:05:22.487-04:00",
    "type_name": "Detection Finding: Create",
    "type_uid": 200401,
    "unmapped": {
        "FindingProviderFields.Severity.Label": "LOW",
        "FindingProviderFields.Types[]": "TTPs/Defense Evasion/Stealth:IAMUser-CloudTrailLoggingDisabled",
        "ProductFields.aws/guardduty/service/action/actionType": "AWS_API_CALL",
        "ProductFields.aws/guardduty/service/action/awsApiCallAction/affectedResources/AWS::CloudTrail::Trail": "arn:aws:cloudtrail:us-east-2:111111111111:trail/delete-me",
        "ProductFields.aws/guardduty/service/action/awsApiCallAction/callerType": "Remote IP",
        "ProductFields.aws/guardduty/service/action/awsApiCallAction/remoteIpDetails/organization/asn": "16509",
        "ProductFields.aws/guardduty/service/action/awsApiCallAction/remoteIpDetails/organization/asnOrg": "AMAZON-02",
        "ProductFields.aws/guardduty/service/action/awsApiCallAction/remoteIpDetails/organization/isp": "Amazon Office",
        "ProductFields.aws/guardduty/service/action/awsApiCallAction/remoteIpDetails/organization/org": "Amazon Office",
        "ProductFields.aws/guardduty/service/additionalInfo/type": "default",
        "ProductFields.aws/guardduty/service/archived": "false",
        "ProductFields.aws/guardduty/service/count": "1",
        "ProductFields.aws/guardduty/service/detectorId": "1ac1bfceda6679698215d5d0EXAMPLE",
        "ProductFields.aws/guardduty/service/eventFirstSeen": "2023-09-19T14:55:09.000Z",
        "ProductFields.aws/guardduty/service/eventLastSeen": "2023-09-19T14:55:09.000Z",
        "ProductFields.aws/guardduty/service/resourceRole": "TARGET",
        "ProductFields.aws/guardduty/service/serviceName": "guardduty",
        "ProductFields.aws/securityhub/CompanyName": "Amazon",
        "ProductFields.aws/securityhub/FindingId": "arn:aws:securityhub:us-east-2::product/aws/guardduty/arn:aws:guardduty:us-east-2:111111111111:detector/1ac1bfceda6679698215d5d0EXAMPLE/finding/a6c556fcbc9bea427a19f8b787099a0b",
        "ProductFields.aws/securityhub/ProductName": "GuardDuty",
        "RecordState": "ACTIVE",
        "Sample": "false",
        "Severity.Normalized": "40",
        "Severity.Product": "2",
        "WorkflowState": "NEW"
    }
}
{
    "metadata": {
        "log_version": "2018-10-08",
        "product": {
            "feature": {
                "uid": "arn:aws:guardduty:eu-west-3:11111111111:detector/effff3292fef47a8b2941836e434e833",
                "name": null
            },
            "uid": "arn:aws:securityhub:eu-west-3::product/aws/guardduty",
            "name": "GuardDuty",
            "vendor_name": "Amazon",
            "version": null
        },
        "processed_time_dt": 1726062303537,
        "profiles": [
            "cloud",
            "datetime",
            "linux"
        ],
        "version": "1.1.0",
        "extensions": [
            {
                "name": "linux",
                "uid": "1",
                "version": "1.1.0"
            }
        ]
    },
    "time": 1726062281022,
    "time_dt": 1726062281022,
    "confidence_score": null,
    "message": null,
    "cloud": {
        "account": {
            "uid": "11111111111"
        },
        "region": "eu-west-3",
        "provider": "AWS"
    },
    "resource": null,
    "finding_info": {
        "created_time_dt": 1681218428211,
        "uid": "arn:aws:guardduty:eu-west-3:11111111111:detector/effff3292fef47a8b2941836e434e833/finding/9711517f14c54eb79ad3e3b0cee89e3c",
        "desc": "The API DescribeStackEvents was invoked using root credentials from IP address 62.129.18.152.",
        "title": "The API DescribeStackEvents was invoked using root credentials.",
        "modified_time_dt": 1726062281022,
        "first_seen_time_dt": 1681218080000,
        "last_seen_time_dt": 1726061921000,
        "related_events": null,
        "types": [
            "TTPs/Policy:IAMUser-RootCredentialUsage"
        ],
        "src_url": "https://eu-west-3.console.aws.amazon.com/guardduty/home?region=eu-west-3#/findings?macros=current&fId=9711517f14c54eb79ad3e3b0cee89e3c"
    },
    "remediation": null,
    "compliance": null,
    "vulnerabilities": null,
    "resources": [
        {
            "type": "AwsIamAccessKey",
            "uid": "AWS::IAM::AccessKey:********************",
            "cloud_partition": "aws",
            "region": "eu-west-3",
            "labels": null,
            "data": "{\"AwsIamAccessKey\":{\"PrincipalId\":\"11111111111\",\"PrincipalName\":\"Root\",\"PrincipalType\":\"Root\"}}",
            "criticality": null,
            "owner": null
        }
    ],
    "evidences": [
        {
            "data": "",
            "actor": null,
            "process": null,
            "api": {
                "operation": "DescribeStackEvents",
                "response": null,
                "service": {
                    "name": "cloudformation.amazonaws.com"
                }
            },
            "src_endpoint": {
                "ip": "1.2.3.4",
                "location": {
                    "country": "France",
                    "city": "Rennes",
                    "coordinates": [
                        -1.6744,
                        48.110001
                    ]
                },
                "port": null
            },
            "connection_info": null,
            "dst_endpoint": null,
            "query": null
        }
    ],
    "class_name": "Detection Finding",
    "class_uid": 2004,
    "category_name": "Findings",
    "category_uid": 2,
    "severity_id": 2,
    "severity": "Low",
    "activity_name": "Update",
    "activity_id": 2,
    "type_uid": 200402,
    "type_name": "Detection Finding: Update",
    "status": "New",
    "accountid": null,
    "region": null,
    "asl_version": null,
    "observables": [
        {
            "name": "resources[].uid",
            "value": "AWS::IAM::AccessKey:********************",
            "type": "Resource UID",
            "type_id": 10
        },
        {
            "name": "evidences[].src_endpoint.ip",
            "value": "1.2.3.4",
            "type": "IP Address",
            "type_id": 2
        }
    ]
}
{
    "action": "Allowed",
    "action_id": 1,
    "activity_id": 6,
    "activity_name": "Traffic",
    "answers": [
        {
            "class": "IN",
            "rdata": "127.0.0.62",
            "type": "A"
        }
    ],
    "category_name": "Network Activity",
    "category_uid": 4,
    "class_name": "DNS Activity",
    "class_uid": 4003,
    "cloud": {
        "account": {
            "uid": "123456789012"
        },
        "provider": "AWS",
        "region": "us-east-1"
    },
    "connection_info": {
        "direction": "Unknown",
        "direction_id": 0,
        "protocol_name": "UDP"
    },
    "disposition": "Alert",
    "dst_endpoint": {
        "instance_uid": "rslvr-in-0000000000000000",
        "interface_uid": "rni-0000000000000000"
    },
    "firewall_rule": {
        "uid": "rslvr-frg-000000000000000"
    },
    "metadata": {
        "product": {
            "feature": {
                "name": "Resolver Query Logs"
            },
            "name": "Route 53",
            "vendor_name": "AWS",
            "version": "1.100000"
        },
        "profiles": [
            "cloud",
            "security_control",
            "datetime"
        ],
        "version": "1.1.0"
    },
    "observables": [
        {
            "name": "answers[].rdata",
            "type": "IP Address",
            "type_id": 2,
            "value": "127.0.0.62"
        },
        {
            "name": "dst_endpoint.instance_uid",
            "type": "Resource UID",
            "type_id": 10,
            "value": "rslvr-in-0000000000000000"
        },
        {
            "name": "src_endpoint.ip",
            "type": "IP Address",
            "type_id": 2,
            "value": "10.200.21.100"
        },
        {
            "name": "query.hostname",
            "type": "Hostname",
            "type_id": 1,
            "value": "ip-127-0-0-62.alert.firewall.canary."
        }
    ],
    "query": {
        "class": "IN",
        "hostname": "ip-127-0-0-62.alert.firewall.canary.",
        "type": "A"
    },
    "rcode": "NoError",
    "rcode_id": 0,
    "severity": "Informational",
    "severity_id": 1,
    "src_endpoint": {
        "ip": "10.200.21.100",
        "port": 15083,
        "vpc_uid": "vpc-00000000000000000"
    },
    "time": 1665694956000,
    "time_dt": "2022-10-13T17:02:36.000-04:00",
    "type_name": "DNS Activity: Traffic",
    "type_uid": 400306,
    "unmapped": {
        "firewall_domain_list_id": "rslvr-fdl-0000000000000"
    }
}
{
    "metadata": {
        "product": {
            "version": "1.100000",
            "name": "Route 53",
            "feature": {
                "name": "Resolver Query Logs"
            },
            "vendor_name": "AWS"
        },
        "profiles": [
            "cloud",
            "security_control",
            "datetime"
        ],
        "version": "1.1.0"
    },
    "cloud": {
        "account": {
            "uid": "111111111111"
        },
        "region": "eu-west-3",
        "provider": "AWS"
    },
    "src_endpoint": {
        "vpc_uid": "vpc-11111111",
        "ip": "1.2.3.4",
        "port": 63115,
        "instance_uid": "i-11111111111111111"
    },
    "time": 1726088328000,
    "time_dt": 1726088328000,
    "query": {
        "hostname": "_ldap._tcp.dc.example.org.",
        "type": "SRV",
        "class": "IN"
    },
    "answers": null,
    "connection_info": {
        "protocol_name": "UDP",
        "direction": "Unknown",
        "direction_id": 0
    },
    "dst_endpoint": null,
    "firewall_rule": null,
    "severity_id": 1,
    "severity": "Informational",
    "class_name": "DNS Activity",
    "class_uid": 4003,
    "category_name": "Network Activity",
    "category_uid": 4,
    "activity_id": 6,
    "activity_name": "Traffic",
    "type_uid": 400306,
    "type_name": "DNS Activity: Traffic",
    "rcode_id": 3,
    "rcode": "NXDomain",
    "disposition": "Unknown",
    "action": "Unknown",
    "action_id": 0,
    "unmapped": null,
    "accountid": null,
    "region": null,
    "asl_version": null,
    "observables": [
        {
            "name": "src_endpoint.instance_uid",
            "value": "i-11111111111111111",
            "type": "Resource UID",
            "type_id": 10
        },
        {
            "name": "query.hostname",
            "value": "_ldap._tcp.dc.example.org.",
            "type": "Hostname",
            "type_id": 1
        },
        {
            "name": "src_endpoint.ip",
            "value": "1.2.3.4",
            "type": "IP Address",
            "type_id": 2
        }
    ]
}
{
    "metadata": {
        "product": {
            "version": "1.100000",
            "name": "Route 53",
            "feature": {
                "name": "Resolver Query Logs"
            },
            "vendor_name": "AWS"
        },
        "profiles": [
            "cloud",
            "security_control",
            "datetime"
        ],
        "version": "1.1.0"
    },
    "cloud": {
        "account": {
            "uid": "111111111111"
        },
        "region": "eu-west-3",
        "provider": "AWS"
    },
    "src_endpoint": {
        "vpc_uid": "vpc-11111111",
        "ip": "1.2.3.4",
        "port": 62699,
        "instance_uid": "i-11111111111111111"
    },
    "time": 1726395887000,
    "time_dt": 1726395887000,
    "query": {
        "hostname": "settings-win.data.microsoft.com.",
        "type": "A",
        "class": "IN"
    },
    "answers": [
        {
            "type": "CNAME",
            "rdata": "atm-settingsfe-prod-geo2.trafficmanager.net.",
            "class": "IN"
        },
        {
            "type": "CNAME",
            "rdata": "settings-prod-weu-2.westeurope.cloudapp.azure.com.",
            "class": "IN"
        },
        {
            "type": "A",
            "rdata": "5.6.7.8",
            "class": "IN"
        }
    ],
    "connection_info": {
        "protocol_name": "UDP",
        "direction": "Unknown",
        "direction_id": 0
    },
    "dst_endpoint": null,
    "firewall_rule": null,
    "severity_id": 1,
    "severity": "Informational",
    "class_name": "DNS Activity",
    "class_uid": 4003,
    "category_name": "Network Activity",
    "category_uid": 4,
    "activity_id": 6,
    "activity_name": "Traffic",
    "type_uid": 400306,
    "type_name": "DNS Activity: Traffic",
    "rcode_id": 0,
    "rcode": "NoError",
    "disposition": "Unknown",
    "action": "Unknown",
    "action_id": 0,
    "unmapped": null,
    "accountid": null,
    "region": null,
    "asl_version": null,
    "observables": [
        {
            "name": "answers[].rdata",
            "value": "settings-prod-weu-2.westeurope.cloudapp.azure.com.",
            "type": "IP Address",
            "type_id": 2
        },
        {
            "name": "src_endpoint.instance_uid",
            "value": "i-11111111111111111",
            "type": "Resource UID",
            "type_id": 10
        },
        {
            "name": "answers[].rdata",
            "value": "5.6.7.8",
            "type": "IP Address",
            "type_id": 2
        },
        {
            "name": "src_endpoint.ip",
            "value": "1.2.3.4",
            "type": "IP Address",
            "type_id": 2
        },
        {
            "name": "answers[].rdata",
            "value": "atm-settingsfe-prod-geo2.trafficmanager.net.",
            "type": "IP Address",
            "type_id": 2
        },
        {
            "name": "query.hostname",
            "value": "settings-win.data.microsoft.com.",
            "type": "Hostname",
            "type_id": 1
        }
    ]
}
{
    "activity_id": 3,
    "activity_name": "Get",
    "category_name": "Network Activitys",
    "category_uid": 4,
    "class_name": "HTTP Activity",
    "class_uid": 4002,
    "cloud": {
        "provider": "AWS"
    },
    "dst_endpoint": {
        "domain": "/CanaryTest"
    },
    "firewall_rule": {
        "type": "RATE_BASED",
        "uid": "RateBasedRule"
    },
    "http_request": {
        "args": "",
        "http_method": "GET",
        "uid": "Ed0AiHF_CGYF-DA=",
        "url": {
            "path": "/CanaryTest"
        },
        "version": "HTTP/1.1"
    },
    "http_response": {
        "code": 403
    },
    "metadata": {
        "labels": null,
        "product": {
            "feature": {
                "uid": "..."
            },
            "name": "AWS WAF",
            "vendor_name": "AWS",
            "version": "1"
        },
        "version": "1.1.0-dev"
    },
    "severity_id": 1,
    "src_endpoint": {
        "ip": "52.46.82.45",
        "location": {
            "country": "FR"
        },
        "svc_name": "APIGW",
        "uid": "EXAMPLE11:rjvegx5guh:CanaryTest"
    },
    "time": 0,
    "type_name": "HTTP Activity: Get",
    "type_uid": 400203,
    "unmapped": [
        [
            "rateBasedRuleList[].rateBasedRuleId",
            "..."
        ],
        [
            "rateBasedRuleList[].customValues[].value",
            "ella"
        ],
        [
            "rateBasedRuleList[].customValues[].name",
            "dogname"
        ],
        [
            "rateBasedRuleList[].limitKey",
            "CUSTOMKEYS"
        ],
        [
            "rateBasedRuleList[].customValues[].key",
            "HEADER"
        ],
        [
            "httpRequest.headers[].value",
            "52.46.82.45,https,443,rjvegx5guh.execute-api.eu-west-3.amazonaws.com,Root=1-645566cf-7cb058b04d9bb3ee01dc4036,ella,RateBasedRuleTestKoipOneKeyModulePV2,gzip,deflate"
        ],
        [
            "rateBasedRuleList[].rateBasedRuleName",
            "RateBasedRule"
        ],
        [
            "rateBasedRuleList[].maxRateAllowed",
            "100"
        ],
        [
            "httpRequest.headers[].name",
            "X-Forwarded-For,X-Forwarded-Proto,X-Forwarded-Port,Host,X-Amzn-Trace-Id,dogname,User-Agent,Accept-Encoding"
        ]
    ]
}
{
    "cloud": {
        "account_uid": "987654321098",
        "region": "us-west-2",
        "zone": "use2-az2",
        "provider": "AWS"
    },
    "action": "Allowed",
    "action_id": 1,
    "status_code": "OK",
    "traffic": {
        "bytes": 85,
        "packets": 10
    },
    "src_endpoint": {
        "ip": "192.168.1.10",
        "port": 8080,
        "svc_name": "amazon-s3",
        "subnet_uid": "subnet-33333333333333333",
        "vpc_uid": "vpc-44444444444444444"
    },
    "dst_endpoint": {
        "ip": "192.168.1.20",
        "port": 443,
        "svc_name": "amazon-ec2",
        "interface_uid": "eni-22222222222222222",
        "instance_uid": "i-111111111111111111"
    },
    "connection_info": {
        "protocol_num": 17,
        "protocol_ver": "IPv6",
        "tcp_flags": 6,
        "direction": "egress",
        "direction_id": 2,
        "boundary_id": 99,
        "boundary": "vpn",
        "start_time": 1653200123,
        "end_time": 1653200100
    },
    "time": 1653200100,
    "type_name": "Network Activity: Traffic",
    "type_uid": 400105,
    "activity_id": 5,
    "activity_name": "Traffic",
    "class_uid": 4001,
    "class_name": "Network Activity",
    "category_uid": 4,
    "category_name": "Network Activity",
    "metadata": {
        "product": {
            "name": "Amazon VPC",
            "feature": {
                "name": "Flowlogs"
            },
            "vendor_name": "AWS"
        },
        "profiles": [
            "cloud",
            "security_control"
        ],
        "version": "1.1.0"
    },
    "severity_id": 1,
    "severity": "Informational",
    "status_id": 1,
    "status": "Success",
    "disposition": "Allowed",
    "pkt_src_aws_service": "amazon-s3",
    "pkt_dst_aws_service": "amazon-ec2",
    "sublocation_type": "subnet",
    "sublocation_id": "subnet-33333333333333333"
}
{
    "action": "Denied",
    "action_id": 2,
    "activity_id": 5,
    "activity_name": "Refuse",
    "category_name": "Network Activity",
    "category_uid": 4,
    "class_name": "Network Activity",
    "class_uid": 4001,
    "cloud": {
        "account": {
            "uid": "123456789012"
        },
        "provider": "AWS",
        "region": "us-east-1",
        "zone": "use1-az1"
    },
    "connection_info": {
        "boundary": "-",
        "boundary_id": 99,
        "direction": "Inbound",
        "direction_id": 1,
        "protocol_num": 6,
        "protocol_ver": "IPv4",
        "tcp_flags": 2
    },
    "disposition": "Blocked",
    "dst_endpoint": {
        "instance_uid": "i-000000000000000000",
        "interface_uid": "eni-000000000000000000",
        "ip": "172.31.2.52",
        "port": 39938,
        "subnet_uid": "subnet-000000000000000000",
        "svc_name": "-",
        "vpc_uid": "vpc-00000000"
    },
    "end_time_dt": "2022-04-11T20:03:08.000-04:00",
    "metadata": {
        "product": {
            "feature": {
                "name": "Flowlogs"
            },
            "name": "Amazon VPC",
            "vendor_name": "AWS",
            "version": "5"
        },
        "profiles": [
            "cloud",
            "security_control",
            "datetime"
        ],
        "version": "1.1.0"
    },
    "observables": [
        {
            "name": "dst_endpoint.ip",
            "type": "IP Address",
            "type_id": 2,
            "value": "172.31.2.52"
        },
        {
            "name": "dst_endpoint.instance_uid",
            "type": "Resource UID",
            "type_id": 10,
            "value": "i-000000000000000000"
        },
        {
            "name": "src_endpoint.ip",
            "type": "IP Address",
            "type_id": 2,
            "value": "1.2.3.4"
        }
    ],
    "severity": "Informational",
    "severity_id": 1,
    "src_endpoint": {
        "ip": "1.2.3.4",
        "port": 56858,
        "svc_name": "-"
    },
    "start_time_dt": "2022-04-11T20:02:12.000-04:00",
    "status_code": "OK",
    "time": 1649721732000,
    "time_dt": "2022-04-11T20:02:12.000-04:00",
    "traffic": {
        "bytes": 40,
        "packets": 1
    },
    "type_name": "Network Activity: Refuse",
    "type_uid": 400105,
    "unmapped": {
        "sublocation_id": "-",
        "sublocation_type": "-"
    }
}
{
    "activity_name": "Traffic",
    "activity_id": 6,
    "category_name": "Network Activity",
    "category_uid": 4,
    "class_name": "Network Activity",
    "class_uid": 4001,
    "type_uid": 400106,
    "type_name": "Network Activity: Traffic",
    "severity_id": 1,
    "severity": "Informational",
    "start_time": "2015/06/17T00:00:00.083",
    "end_time": "2015/06/17T00:00:00.089",
    "duration": 0.006,
    "metadata": {
        "product": {
            "version": "3.9.0",
            "name": "SiLK",
            "feature": {
                "name": " Network Flow Data"
            },
            "vendor_name": "CERT/NetSA at Carnegie Mellon University - Software Engineering Institute"
        },
        "version": "1.0.0-rc.3"
    },
    "src_endpoint": {
        "port": 63975,
        "ip": "192.168.40.20"
    },
    "dst_endpoint": {
        "port": 443,
        "ip": "10.0.40.21"
    },
    "connection_info": {
        "protocol_num": 6,
        "tcp_flags": 19,
        "boundary_id": 99,
        "boundary": "Other",
        "direction_id": 2,
        "direction": "Outbound"
    },
    "traffic": {
        "packets": 8,
        "bytes": 344
    },
    "unmapped": {
        "sensor": "S1",
        "in": 0,
        "out": 0,
        "nhIP": "0.0.0.0",
        "initialFlags": "",
        "sessionFlags": "",
        "attributes": "",
        "application": 0,
        "class": "all",
        "type": "outweb",
        "iType": "",
        "iCode": ""
    }
}
{
    "time": 1591367999.305988,
    "uuid": "CMdzit1AMNsmfAIiQc",
    "src_endpoint": {
        "ip": "192.168.4.76",
        "port": 36844
    },
    "dst_endpoint": {
        "ip": "192.168.4.1",
        "port": 53
    },
    "connection_info": {
        "protocol_name": "udp"
    },
    "bytes_in": 62,
    "packets_in": 2,
    "orig_bytes": {
        "ip": 118
    },
    "bytes_out": 141,
    "packets_out": 2,
    "resp_bytes": {
        "ip": 197
    },
    "duration": 0.06685185432434082,
    "unmapped": {
        "conn_state": "SF"
    },
    "category_uid": 4,
    "category_name": "Network Activity",
    "class_uid": 4001,
    "class_name": "Network Activity",
    "metadata": {
        "profiles": [
            "security_control"
        ],
        "product": {
            "name": "Zeek",
            "feature": {
                "name": "conn.log"
            },
            "vendor_name": "Zeek"
        }
    },
    "severity": "Informational",
    "severity_id": 1,
    "proposed_new_attributes": {
        "application_protocol": "dns",
        "bytes_missed": 0,
        "connection_history": "Dd"
    }
}
{
    "time": 1591367999.305988,
    "uuid": "CMdzit1AMNsmfAIiQc",
    "src_endpoint": {
        "ip": "192.168.4.76",
        "port": 36844
    },
    "dst_endpoint": {
        "ip": "192.168.4.1",
        "port": 53
    },
    "connection_info": {
        "protocol_name": "udp"
    },
    "bytes_in": 62,
    "packets_in": 2,
    "orig_bytes": {
        "ip": 118
    },
    "bytes_out": 141,
    "packets_out": 2,
    "resp_bytes": {
        "ip": 197
    },
    "duration": 0.06685185432434082,
    "unmapped": {
        "conn_state": "SF"
    },
    "category_uid": 4,
    "category_name": "Network Activity",
    "class_uid": 4001,
    "class_name": "Network Activity",
    "metadata": {
        "profiles": [
            "security_control"
        ],
        "product": {
            "name": "Zeek",
            "feature": {
                "name": "conn.log"
            },
            "vendor_name": "Zeek"
        }
    },
    "severity": "Informational",
    "severity_id": 1,
    "proposed_new_attributes": {
        "application_protocol": "dns",
        "bytes_missed": 0,
        "connection_history": "Dd"
    }
}
{
    "time": 1598377391.921726,
    "uuid": "CsukF91Bx9mrqdEaH9",
    "src_endpoint": {
        "ip": "192.168.4.49",
        "port": 56718
    },
    "dst_endpoint": {
        "ip": "13.32.202.10",
        "port": 443
    },
    "version": "TLSv12",
    "cipher": "TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256",
    "certificate": "secp256r1",
    "domain": "www.taosecurity.com",
    "certificate_chain": [
        "F2XEvj1CahhdhtfvT4",
        "FZ7ygD3ERPfEVVohG9",
        "F7vklpOKI4yX9wmvh",
        "FAnbnR32nIIr2j9XV"
    ],
    "subject": "CN=www.taosecurity.com",
    "issuer": "CN=Amazon,OU=Server CA 1B,O=Amazon,C=US",
    "unmapped": {
        "next_protocol": "h2",
        "resumed": false
    },
    "network_activity": {
        "status_id": "1"
    },
    "category_uid": 4,
    "category_name": "Network Activity",
    "class_uid": 4001,
    "class_name": "Network Activity",
    "metadata": {
        "profiles": [
            "security_control"
        ],
        "product": {
            "name": "Zeek",
            "feature": {
                "name": "ssl.log"
            },
            "vendor_name": "Zeek"
        }
    },
    "severity": "Informational",
    "severity_id": 1
}
{
    "activity_id": 1,
    "activity_name": "Launch",
    "actor": {
        "process": {
            "file": {
                "name": "cmd.exe",
                "parent_folder": "C:\\Windows\\System32",
                "path": "C:\\Windows\\System32\\cmd.exe",
                "type": "Regular File",
                "type_id": 1
            },
            "pid": 3948
        },
        "session": {
            "uid": "0x55E621"
        },
        "user": {
            "account_type": "Windows Account",
            "account_type_id": 2,
            "domain": "ATTACKRANGE",
            "name": "Administrator",
            "uid": "ATTACKRANGE\\Administrator"
        }
    },
    "category_name": "System Activity",
    "category_uid": 1,
    "class_name": "Process Activity",
    "class_uid": 1007,
    "device": {
        "hostname": "win-dc-725.attackrange.local",
        "os": {
            "name": "Windows",
            "type": "Windows",
            "type_id": 100
        },
        "type": "Unknown",
        "type_id": 0
    },
    "message": "A new process has been created.",
    "metadata": {
        "original_time": "03/12/2021 10:48:14 AM",
        "product": {
            "feature": {
                "name": "Security"
            },
            "name": "Microsoft Windows",
            "vendor_name": "Microsoft"
        },
        "profiles": [
            "host"
        ],
        "uid": "a47bd2fb-4da1-4378-8961-81f81f90aec2",
        "version": "1.0.0-rc.2"
    },
    "process": {
        "cmd_line": "reg  save HKLM\\system C:\\Users\\ADMINI~1\\AppData\\Local\\Temp\\system ",
        "file": {
            "name": "reg.exe",
            "parent_folder": "C:\\Windows\\System32",
            "path": "C:\\Windows\\System32\\reg.exe",
            "type": "Regular File",
            "type_id": 1
        },
        "pid": 4696,
        "session": {
            "uid": "0x0"
        },
        "user": {
            "domain": "-",
            "name": "-",
            "uid": "NULL SID"
        }
    },
    "severity": "Informational",
    "severity_id": 1,
    "status": "Success",
    "status_id": 1,
    "time": 1615564094000,
    "type_name": "Process Activity: Launch",
    "type_uid": 100701,
    "unmapped": {
        "EventCode": "4688",
        "EventType": "0",
        "OpCode": "Info",
        "Process Information": {
            "Mandatory Label": "Mandatory Label\\High Mandatory Level",
            "Token Elevation Type": "%%1936"
        },
        "RecordNumber": "257874",
        "SourceName": "Microsoft Windows security auditing.",
        "TaskCategory": "Process Creation"
    }
}
{
    "activity_id": 2,
    "activity_name": "Terminate",
    "actor": {
        "process": {
            "file": {
                "name": "auditon.exe",
                "parent_folder": "C:\\Generate_Security_Events1",
                "path": "C:\\Generate_Security_Events1\\auditon.exe",
                "type": "Regular File",
                "type_id": 1
            },
            "pid": 1524
        },
        "session": {
            "uid": "0x1806d9"
        },
        "user": {
            "account_type": "Windows Account",
            "account_type_id": 2,
            "domain": "LOGISTICS",
            "name": "Administrator",
            "uid": "S-1-5-21-1135140816-2109348461-2107143693-500"
        }
    },
    "category_name": "System Activity",
    "category_uid": 1,
    "class_name": "Process Activity",
    "class_uid": 1007,
    "device": {
        "hostname": "dcc1.Logistics.local",
        "os": {
            "name": "Windows",
            "type": "Windows",
            "type_id": 100
        },
        "type": "Unknown",
        "type_id": 0
    },
    "exit_code": 0,
    "message": "A process has exited.",
    "metadata": {
        "original_time": "09/05/2019 11:22:49 AM",
        "product": {
            "feature": {
                "name": "Security"
            },
            "name": "Microsoft Windows",
            "vendor_name": "Microsoft"
        },
        "profiles": [
            "host"
        ],
        "uid": "cc27b41c-94e0-48a9-8cc2-5a1598fb8d1f",
        "version": "1.0.0-rc.2"
    },
    "process": {
        "file": {
            "name": "auditon.exe",
            "parent_folder": "C:\\Generate_Security_Events1",
            "path": "C:\\Generate_Security_Events1\\auditon.exe",
            "type": "Regular File",
            "type_id": 1
        },
        "pid": 1524
    },
    "severity": "Informational",
    "severity_id": 1,
    "status": "Success",
    "status_id": 1,
    "time": 1567696969000,
    "type_name": "Process Activity: Terminate",
    "type_uid": 100702,
    "unmapped": {
        "EventCode": "4689",
        "EventType": "0",
        "OpCode": "Info",
        "RecordNumber": "6828379",
        "SourceName": "Microsoft Windows security auditing.",
        "TaskCategory": "Process Termination"
    }
}
{
    "activity_id": 1,
    "activity_name": "Generate",
    "category_name": "Findings",
    "category_uid": 2,
    "classname": "Security Finding",
    "class_uid": 2001,
    "finding": {
        "created_time": 1672758699558,
        "desc": "Linux Kernel Module injection using insmod detected (user=%user.name user_loginuid=%user.loginuid parent_process=%proc.pname module=%proc.args %container.info image=%container.image.repository:%container.image.tag)",
        "title": "Linux Kernel Module Injection Detected",
        "types": [
            "syscalls"
        ],
        "uid": "ec834826-90c1-458a-8eec-a014e7266754"
    },
    "message": "Linux Kernel Module Injection Detected",
    "metadata": {
        "version": "0.1.0",
        "product": {
            "vendor_name": "Falcosecurity",
            "name": "Falco"
        },
        "labels": [
            "process"
        ]
    },
    "observables": [
        {
            "name": "hostname",
            "type": "Other",
            "type_id": 0,
            "value": "host0.local"
        },
        {
            "name": "proc.pname",
            "type": "Other",
            "type_id": 0,
            "value": "proc.pname"
        },
        {
            "name": "container.info",
            "type": "Other",
            "type_id": 0,
            "value": "container.info"
        },
        {
            "name": "proc.args",
            "type": "Other",
            "type_id": 0,
            "value": "proc.args"
        },
        {
            "name": "user.loginuid",
            "type": "Other",
            "type_id": 0,
            "value": "user.loginuid"
        },
        {
            "name": "user.name",
            "type": "Other",
            "type_id": 0,
            "value": "user.name"
        },
        {
            "name": "container.image.repository",
            "type": "Other",
            "type_id": 0,
            "value": "container.image.repository"
        },
        {
            "name": "container.image.tag",
            "type": "Other",
            "type_id": 0,
            "value": "container.image.tag"
        }
    ],
    "raw_data": "{\"uuid\":\"ec834826-90c1-458a-8eec-a014e7266754\",\"output\":\"Linux Kernel Module injection using insmod detected (user=%user.name user_loginuid=%user.loginuid parent_process=%proc.pname module=%proc.args %container.info image=%container.image.repository:%container.image.tag)\",\"priority\":\"Warning\",\"rule\":\"Linux Kernel Module Injection Detected\",\"time\":\"2023-01-03T15:11:39.558068644Z\",\"output_fields\":{\"akey\":\"AValue\",\"bkey\":\"BValue\",\"ckey\":\"CValue\",\"container.image.repository\":\"container.image.repository\",\"container.image.tag\":\"container.image.tag\",\"container.info\":\"container.info\",\"dkey\":\"bar\",\"proc.args\":\"proc.args\",\"proc.pname\":\"proc.pname\",\"user.loginuid\":\"user.loginuid\",\"user.name\":\"user.name\"},\"source\":\"syscalls\",\"tags\":[\"process\"],\"hostname\":\"host0.local\"}",
    "severity": "Medium",
    "severity_id": 3,
    "state": "New",
    "state_id": 1,
    "status": "Warning",
    "time": 1672758699558,
    "type_name": "Security Finding: Generate",
    "type_uid": 200101
}
{
    "analytic": {
        "desc": "Custom Rule Engine",
        "name": "CRE",
        "relatedAnalytics": [
            {
                "category": "CRE_RULE",
                "name": "Network DoS Attack Detected",
                "type": "Rule",
                "typeId": 1,
                "uid": "100079"
            }
        ],
        "type": "Rule",
        "typeId": 1
    },
    "finding": {
        "uid": "591",
        "title": "BLEEDING-EDGE DOS -ISC- ICMP blind TCP reset DoS guessing attempt\n",
        "created_time": 1682347463218,
        "desc": "BLEEDING-EDGE DOS -ISC- ICMP blind TCP reset DoS guessing attempt\n",
        "first_seen_time": 1682347463000,
        "last_seen_time": 1682781010000
    },
    "confidence_score": 2,
    "confidence": "Low",
    "confidence_id": 2,
    "data_sources": [
        "Snort @ wolverine"
    ],
    "impact_score": 0,
    "impact": "Low",
    "impact_id": 1,
    "malware": [
        {
            "classification_ids": [
                5
            ],
            "classifications": [
                "DDOS"
            ],
            "name": "ICMP DoS"
        }
    ],
    "risk_level": "High",
    "risk_level_id": 3,
    "risk_score": 3,
    "state": "In Progress",
    "state_id": 2,
    "activity_id": 1,
    "category_uid": 2,
    "class_uid": 2001,
    "time": 1682347463218,
    "message": "BLEEDING-EDGE DOS -ISC- ICMP blind TCP reset DoS guessing attempt\n",
    "metadata": {
        "log_name": "Offense",
        "log_provider": "IBM QRadar",
        "original_time": 1682347463218,
        "product": {
            "lang": "en",
            "name": "QRadar SIEM",
            "version": "7.5.0",
            "vendor_name": "IBM"
        },
        "version": "7.5.0",
        "modified_time": 1682347469220
    },
    "activity_name": "Create",
    "category_name": "Findings",
    "class_name": "Security Finding",
    "count": 2,
    "end_time": 1682781010000,
    "enrichments": [
        {
            "name": "Magnitude",
            "provider": "Event Processor",
            "type": "score",
            "value": "3"
        },
        {
            "name": "offense_type",
            "provider": "Event Processor",
            "type": "correlation",
            "value": "2"
        },
        {
            "name": "offense_source",
            "provider": "Event Processor",
            "type": "correlation",
            "value": "BLEEDING-EDGE DOS -ISC- ICMP blind TCP reset DoS guessing attempt"
        },
        {
            "name": "category_count",
            "provider": "Event Processor",
            "type": "counter",
            "value": "1"
        },
        {
            "name": "device_count",
            "provider": "Event Processor",
            "type": "counter",
            "value": "1"
        },
        {
            "name": "event_count",
            "provider": "Event Processor",
            "type": "counter",
            "value": "2"
        },
        {
            "name": "flow_count",
            "provider": "Event Processor",
            "type": "counter",
            "value": "0"
        },
        {
            "name": "policy_category_count",
            "provider": "Event Processor",
            "type": "counter",
            "value": "0"
        },
        {
            "name": "remote_destination_count",
            "provider": "Event Processor",
            "type": "counter",
            "value": "0"
        },
        {
            "name": "local_destination_count",
            "provider": "Event Processor",
            "type": "counter",
            "value": "2"
        },
        {
            "name": "security_category_count",
            "provider": "Event Processor",
            "type": "counter",
            "value": "1"
        },
        {
            "name": "source_count",
            "provider": "Event Processor",
            "type": "counter",
            "value": "1"
        },
        {
            "name": "user_name_count",
            "provider": "Event Processor",
            "type": "counter",
            "value": "0"
        },
        {
            "name": "domain_id",
            "provider": "Event Processor",
            "type": "correlation",
            "value": "0"
        },
        {
            "name": "source_network",
            "provider": "Event Processor",
            "type": "network",
            "value": "Net-99-99-99.Net_99_0_0_0"
        },
        {
            "name": "destination_network",
            "provider": "Event Processor",
            "type": "network",
            "value": "Net-88-88-88.Net_88_88_0_0"
        },
        {
            "name": "destination_network",
            "provider": "Event Processor",
            "type": "network",
            "value": "Net-77-77-77.Net_77_0_0_0"
        }
    ],
    "observables": [
        {
            "name": "log_source_id",
            "type": "Other",
            "type_id": 99,
            "value": "112"
        },
        {
            "name": "log_source_name",
            "type": "Other",
            "type_id": 99,
            "value": "Snort @ wolverine"
        },
        {
            "name": "log_source_type_id",
            "type": "Other",
            "type_id": 99,
            "value": "2"
        },
        {
            "name": "log_source_type_name",
            "type": "Other",
            "type_id": 99,
            "value": "Snort"
        },
        {
            "name": "assigned_to",
            "type": "User",
            "type_id": 21,
            "value": "SomeUser"
        },
        {
            "name": "low_level_category",
            "type": "Other",
            "type_id": 99,
            "value": "ICMP DoS"
        },
        {
            "name": "source_address",
            "type": "IP Address",
            "type_id": 2,
            "value": "99.99.99.99"
        },
        {
            "name": "local_destination_address",
            "type": "IP Address",
            "type_id": 2,
            "value": "88.88.88.88"
        },
        {
            "name": "local_destination_address",
            "type": "IP Address",
            "type_id": 2,
            "value": "77.77.77.77"
        }
    ],
    "status_code": "OPEN"
}
{
    "activity_id": 1,
    "malware": [
        {
            "classification_ids": [
                -1
            ],
            "classifications": [
                "Potentially vulnerable application"
            ],
            "name": "pva.torrent.openinternet",
            "provider": "SecurityScorecard",
            "uid": "pva.torrent.openinternet_9d153be3-a48e-4498-b476-18c2a847d214"
        }
    ],
    "activity_name": "Generate",
    "category_name": "Findings",
    "category_uid": 2,
    "class_name": "Security Finding",
    "class_uid": 2001,
    "confidence": 100,
    "data": "{\"body_bytes_sent\":\"-\",\"enc_host\":\"open-internet.nl\",\"enc_raw_header\":\"-\",\"enc_request\":\"SOCKET_UDP%20%2F\",\"enc_request_body\":\"AAAEFycQGYAAAAAAiWPgag==\",\"family\":\"pva.torrent.openinternet\",\"field_1\":\"2022-06-27T01:37:06.385325  version_5\",\"remote_addr\":\"1.183.190.110\",\"remote_port\":\"2048\",\"remote_user\":\"-\", \"status\":\"200\",\"time_local\":\"2022-06-27T01:36:21.515207\"}",
    "message": "Potentially vulnerable application infection detected on IP address 1.183.190.110 by Malware DNS sinkhole on communication domain for sinkholed domain open-internet.nl",
    "severity": "Informational ",
    "severity_id": 1,
    "status": "Not applicable, static security finding from global threat intelligence monitoring",
    "status_id": -1,
    "state": "New",
    "state_id": 1,
    "time": 1668535199945,
    "timezone_offset": 0,
    "type_name": "Security Finding: Generate",
    "type_uid": 200101,
    "metadata": {
        "logged_time": 1668535199945,
        "original_time": "2022-11-15T17:59:59.945Z",
        "labels": [
            "infected_device"
        ],
        "product": {
            "lang": "en",
            "name": "SecurityScorecard Attack Surface Intelligence",
            "uid": "ssc_asi",
            "feature": {
                "uid": "ssc_malware_dns_sinkhole",
                "name": "SecurityScorecard Malware DNS Sinkhole collection system"
            },
            "vendor_name": "SecurityScorecard"
        },
        "version": "1.0.0",
        "profiles": [
            "malware",
            "reputation"
        ]
    },
    "resources": [
        {
            "group_name": "infected_device",
            "name": "IPv4 address 1.183.190.110 of device in SecurityScorecard DNS sinkhole malware, adware, or potentially unwanted/vulnerable collection logs",
            "owner": "chinatelecom.cn",
            "uid": "1.183.190.110"
        }
    ],
    "observables": [
        {
            "name": "infected_device.ip",
            "type": "IP Address",
            "type_id": 2,
            "value": "1.183.190.110"
        },
        {
            "name": "infection.category",
            "type": "Category of infection on infected device",
            "type_id": -1,
            "value": "Potentially vulnerable application"
        },
        {
            "name": "infected_device.malware_hostname",
            "type": "Hostname",
            "type_id": 1,
            "value": "open-internet.nl"
        },
        {
            "name": "infection.family",
            "type": "Malware, adware, or PUA/PVA family name",
            "type_id": -1,
            "value": "pva.torrent.openinternet"
        },
        {
            "name": "infected_device.source_port",
            "type": "Client-side port making connection to the infection communication domain",
            "type_id": -1,
            "value": "2048"
        },
        {
            "name": "infected_device.geo_location",
            "type": "Geo Location",
            "type_id": 26,
            "value": "Bieligutai, China"
        }
    ],
    "finding": {
        "title": "Infection found on 1.183.190.110",
        "uid": "2b7908d7-4b72-4f65-afa0-09bdaea46ae3",
        "types": [
            "malware_infection",
            "infected_device",
            "pva.torrent.openinternet"
        ],
        "src_url": "https://platform.securityscorecard.io/#/asi/details/1.183.190.110",
        "remediation": {
            "desc": "If this IP address is tied to your network via any observables attached to this event, take immediate steps to find the related device on your network and remove the infection seen from external threat intelligence",
            "kb_articles": [
                "https://support.securityscorecard.com/hc/en-us/articles/8528362400539-How-SecurityScorecard-collects-data-for-ASI#h_01GBX38RBVVDT63RH11KVREN0K",
                "https://support.securityscorecard.com/hc/en-us/articles/360061410291-Resolving-Malware-Findings"
            ]
        },
        "product_uid": "ssc_malware_dns_sinkhole",
        "last_seen_time": 1668535199945,
        "desc": "Potentially vulnerable application infection detected on IP address 1.183.190.110 communicating with Command-and-Control domain open-internet.nl"
    }
}
{
    "activity_id": 1,
    "malware": [
        {
            "classification_ids": [
                -1
            ],
            "classifications": [
                "Potentially vulnerable application"
            ],
            "name": "pva.torrent.openinternet",
            "provider": "SecurityScorecard",
            "uid": "pva.torrent.openinternet_e1472f25-0d2d-4b88-aac9-b7bd439218f5"
        }
    ],
    "activity_name": "Generate",
    "category_name": "Findings",
    "category_uid": 2,
    "class_name": "Security Finding",
    "class_uid": 2001,
    "confidence": 100,
    "data": "{\"body_bytes_sent\":\"-\",\"enc_host\":\"open-internet.nl\",\"enc_raw_header\":\"-\",\"enc_request\":\"SOCKET_UDP%20%2F\",\"enc_request_body\":\"AAAEFycQGYAAAAAAtdIQjw==\",\"family\":\"pva.torrent.openinternet\",\"field_1\":\"2022-06-04T10:35:07.143255  version_5\",\"remote_addr\":\"59.11.81.231\",\"remote_port\":\"6927\",\"remote_user\":\"-\", \"status\":\"200\",\"time_local\":\"2022-06-04T10:34:45.835005\"}",
    "message": "Potentially vulnerable application infection detected on IP address 59.11.81.231 by Malware DNS sinkhole on communication domain for sinkholed domain ",
    "severity": "Informational ",
    "severity_id": 1,
    "status": "Not applicable, static security finding from global threat intelligence monitoring",
    "status_id": -1,
    "state": "New",
    "state_id": 1,
    "time": 1668535199946,
    "timezone_offset": 0,
    "type_name": "Security Finding: Generate",
    "type_uid": 200101,
    "metadata": {
        "logged_time": 1668535199946,
        "original_time": "2022-11-15T17:59:59.946Z",
        "labels": [
            "infected_device"
        ],
        "product": {
            "lang": "en",
            "name": "SecurityScorecard Attack Surface Intelligence",
            "uid": "ssc_asi",
            "feature": {
                "uid": "ssc_malware_dns_sinkhole",
                "name": "SecurityScorecard Malware DNS Sinkhole collection system"
            },
            "vendor_name": "SecurityScorecard"
        },
        "version": "1.0.0",
        "profiles": [
            "malware",
            "reputation"
        ]
    },
    "resources": [
        {
            "group_name": "infected_device",
            "name": "IPv4 address 59.11.81.231 of device in SecurityScorecard DNS sinkhole malware, adware, or potentially unwanted/vulnerable collection logs",
            "owner": "krnic.or.kr",
            "uid": "59.11.81.231"
        }
    ],
    "observables": [
        {
            "name": "infected_device.ip",
            "type": "IP Address",
            "type_id": 2,
            "value": "59.11.81.231"
        },
        {
            "name": "infection.category",
            "type": "Category of infection on infected device",
            "type_id": -1,
            "value": "Potentially vulnerable application"
        },
        {
            "name": "infected_device.malware_hostname",
            "type": "Hostname",
            "type_id": 1,
            "value": null
        },
        {
            "name": "infection.family",
            "type": "Malware, adware, or PUA/PVA family name",
            "type_id": -1,
            "value": "pva.torrent.openinternet"
        },
        {
            "name": "infected_device.source_port",
            "type": "Client-side port making connection to the infection communication domain",
            "type_id": -1,
            "value": "6927"
        },
        {
            "name": "infected_device.geo_location",
            "type": "Geo Location",
            "type_id": 26,
            "value": "Seongnam-si (Buljeong-ro), Korea, Republic of"
        }
    ],
    "finding": {
        "title": "Infection found on 59.11.81.231",
        "uid": "45521c66-6498-442d-ad9b-40da9f0e9236",
        "types": [
            "malware_infection",
            "infected_device",
            "pva.torrent.openinternet"
        ],
        "src_url": "https://platform.securityscorecard.io/#/asi/details/59.11.81.231",
        "remediation": {
            "desc": "If this IP address is tied to your network via any observables attached to this event, take immediate steps to find the related device on your network and remove the infection seen from external threat intelligence",
            "kb_articles": [
                "https://support.securityscorecard.com/hc/en-us/articles/8528362400539-How-SecurityScorecard-collects-data-for-ASI#h_01GBX38RBVVDT63RH11KVREN0K",
                "https://support.securityscorecard.com/hc/en-us/articles/360061410291-Resolving-Malware-Findings"
            ]
        },
        "product_uid": "ssc_malware_dns_sinkhole",
        "last_seen_time": 1668535199947,
        "desc": "Potentially vulnerable application infection detected on IP address 59.11.81.231 communicating with Command-and-Control domain "
    }
}
{
    "activity_id": 1,
    "malware": [
        {
            "classification_ids": [
                -1
            ],
            "classifications": [
                "Potentially vulnerable application"
            ],
            "name": "pva.torrent.kickasstracker",
            "provider": "SecurityScorecard",
            "uid": "pva.torrent.kickasstracker_d605642d-9f8b-46ed-bb19-882ffc34a8f4"
        }
    ],
    "activity_name": "Generate",
    "category_name": "Findings",
    "category_uid": 2,
    "class_name": "Security Finding",
    "class_uid": 2001,
    "confidence": 100,
    "data": "{\"body_bytes_sent\":\"152\",\"enc_host\":\"open.kickasstracker.com\",\"enc_raw_header\":\"R0VUIC9zY3JhcGU/aW5mb19oYXNoPSUwMiUyNSVkYiVmMiVmZlElZWVLJTNmJWMxJTI4MW8lMGMlMDklYWElODN4JWVlJTk5IEhUVFAvMS4xDQpVc2VyLUFnZW50OiBUcmFuc21pc3Npb24vMi44NA0KSG9zdDogb3Blbi5raWNrYXNzdHJhY2tlci5jb20NCkFjY2VwdDogKi8qDQpBY2NlcHQtRW5jb2Rpbmc6IGd6aXA7cT0xLjAsIGRlZmxhdGUsIGlkZW50aXR5DQoNCg==\",\"enc_request\":\"GET%20%2Fscrape%3Finfo_hash%3D%2502%2525%25db%25f2%25ffQ%25eeK%253f%25c1%25281o%250c%2509%25aa%2583x%25ee%2599%20HTTP%2F1.1\",\"enc_request_body\":\"\",\"family\":\"pva.torrent.kickasstracker\",\"field_1\":\"2022-09-30T21:26:09.028507  version_5\",\"remote_addr\":\"190.109.227.80\",\"remote_port\":\"21886\",\"remote_user\":\"-\", \"status\":\"404\",\"time_local\":\"2022-09-30T21:25:21+00:00\"}",
    "message": "Potentially vulnerable application infection detected on IP address 190.109.227.80 by Malware DNS sinkhole on communication domain for sinkholed domain open.kickasstracker.com",
    "severity": "Informational ",
    "severity_id": 1,
    "status": "Not applicable, static security finding from global threat intelligence monitoring",
    "status_id": -1,
    "state": "New",
    "state_id": 1,
    "time": 1668535199947,
    "timezone_offset": 0,
    "type_name": "Security Finding: Generate",
    "type_uid": 200101,
    "metadata": {
        "logged_time": 1668535199947,
        "original_time": "2022-11-15T17:59:59.947Z",
        "labels": [
            "infected_device"
        ],
        "product": {
            "lang": "en",
            "name": "SecurityScorecard Attack Surface Intelligence",
            "uid": "ssc_asi",
            "feature": {
                "uid": "ssc_malware_dns_sinkhole",
                "name": "SecurityScorecard Malware DNS Sinkhole collection system"
            },
            "vendor_name": "SecurityScorecard"
        },
        "version": "1.0.0",
        "profiles": [
            "malware",
            "reputation"
        ]
    },
    "resources": [
        {
            "group_name": "infected_device",
            "name": "IPv4 address 190.109.227.80 of device in SecurityScorecard DNS sinkhole malware, adware, or potentially unwanted/vulnerable collection logs",
            "owner": "cotel.bo",
            "uid": "190.109.227.80"
        }
    ],
    "observables": [
        {
            "name": "infected_device.ip",
            "type": "IP Address",
            "type_id": 2,
            "value": "190.109.227.80"
        },
        {
            "name": "infection.category",
            "type": "Category of infection on infected device",
            "type_id": -1,
            "value": "Potentially vulnerable application"
        },
        {
            "name": "infected_device.malware_hostname",
            "type": "Hostname",
            "type_id": 1,
            "value": "open.kickasstracker.com"
        },
        {
            "name": "infection.family",
            "type": "Malware, adware, or PUA/PVA family name",
            "type_id": -1,
            "value": "pva.torrent.kickasstracker"
        },
        {
            "name": "infected_device.source_port",
            "type": "Client-side port making connection to the infection communication domain",
            "type_id": -1,
            "value": "21886"
        },
        {
            "name": "infected_device.geo_location",
            "type": "Geo Location",
            "type_id": 26,
            "value": "La Paz (Macrodistrito Centro), Bolivia, Plurinational State of"
        }
    ],
    "finding": {
        "title": "Infection found on 190.109.227.80",
        "uid": "8f91e92d-b75c-4d55-a6a2-c9f611cdea28",
        "types": [
            "malware_infection",
            "infected_device",
            "pva.torrent.kickasstracker"
        ],
        "src_url": "https://platform.securityscorecard.io/#/asi/details/190.109.227.80",
        "remediation": {
            "desc": "If this IP address is tied to your network via any observables attached to this event, take immediate steps to find the related device on your network and remove the infection seen from external threat intelligence",
            "kb_articles": [
                "https://support.securityscorecard.com/hc/en-us/articles/8528362400539-How-SecurityScorecard-collects-data-for-ASI#h_01GBX38RBVVDT63RH11KVREN0K",
                "https://support.securityscorecard.com/hc/en-us/articles/360061410291-Resolving-Malware-Findings"
            ]
        },
        "product_uid": "ssc_malware_dns_sinkhole",
        "last_seen_time": 1668535199948,
        "desc": "Potentially vulnerable application infection detected on IP address 190.109.227.80 communicating with Command-and-Control domain open.kickasstracker.com"
    }
}
{
    "activity_id": 1,
    "malware": [
        {
            "classification_ids": [
                -1
            ],
            "classifications": [
                "Adware"
            ],
            "name": "adware.android.imp",
            "provider": "SecurityScorecard",
            "uid": "adware.android.imp_7cd5cf7b-4c99-406c-ad46-621487394fba"
        }
    ],
    "activity_name": "Generate",
    "category_name": "Findings",
    "category_uid": 2,
    "class_name": "Security Finding",
    "class_uid": 2001,
    "confidence": 100,
    "data": "{\"body_bytes_sent\":\"152\",\"enc_host\":\"x-eu.58dac16e7b2c86c19cfe48914a6e8fcdac9ae06fe5cf53369beaa45b.com\",\"enc_raw_header\":\"UE9TVCAvYXVjdGlvbi9pbml0IEhUVFAvMS4xDQpDb250ZW50LVR5cGU6IGFwcGxpY2F0aW9uL3gtcHJvdG9idWYNCkFjY2VwdC1FbmNvZGluZzogZ3ppcA0KQ29udGVudC1FbmNvZGluZzogZ3ppcA0KVXNlci1BZ2VudDogRGFsdmlrLzIuMS4wIChMaW51eDsgVTsgQW5kcm9pZCAxMTsgU00tQTIwN0YgQnVpbGQvUlAxQS4yMDA3MjAuMDEyKQ0KSG9zdDogeC1ldS41OGRhYzE2ZTdiMmM4NmMxOWNmZTQ4OTE0YTZlOGZjZGFjOWFlMDZmZTVjZjUzMzY5YmVhYTQ1Yi5jb20NCkNvbm5lY3Rpb246IEtlZXAtQWxpdmUNCkNvbnRlbnQtTGVuZ3RoOiAzMDMNCg0K\",\"enc_request\":\"POST%20%2Fauction%2Finit%20HTTP%2F1.1\",\"enc_request_body\":\"H4sIAAAAAAAAAK3PzUoDMRQFYEhbSwNSnI1lljKrgYQkzd+47MqNIIg/u3qTTHCUzshMacFHEHwGwbUPaStVQTcu3F3uOXxwcI8X02TsmwWFdUehDm1ThQk6QpznvZs3JPCsCqfgb6u6PB5wWlA9y0oLzjGvCHPGE+kgEif05iq5YVZZkEye9M+Qy6LVLETpiXfOEilAE2sUJ9EIr4WCGKfibqSoVJQRrttMhKijLhjxQhsijSo29NSS4IOSDJRRzDy+IvyC8H5dLtdNe9/Nqzo2yTMSTwhf55c4wcNdlAzTwaKFKuAUj3e/+apsu6qptxnb7LE4w4efGQR4WJbtV2eUDj82U46v8gt88C3vpf0VdMt/gC/y8x9wvYUnv+FB2uOU/Y19BzRbkezaAQAA\",\"family\":\"adware.android.imp\",\"field_1\":\"2022-09-23T16:20:10.540428 version_5\",\"remote_addr\":\"38.7.186.198\",\"remote_port\":\"59750\",\"remote_user\":\"-\",\"status\":\"404\",\"time_local\":\"2022-09-23T16:19:38+00:00\"}",
    "message": "Adware infection detected on IP address 38.7.186.198 by Malware DNS sinkhole on communication domain for sinkholed domain x-eu.58dac16e7b2c86c19cfe48914a6e8fcdac9ae06fe5cf53369beaa45b.com",
    "severity": "Informational ",
    "severity_id": 1,
    "status": "Not applicable, static security finding from global threat intelligence monitoring",
    "status_id": -1,
    "state": "New",
    "state_id": 1,
    "time": 1668535199948,
    "timezone_offset": 0,
    "type_name": "Security Finding: Generate",
    "type_uid": 200101,
    "metadata": {
        "logged_time": 1668535199948,
        "original_time": "2022-11-15T17:59:59.948Z",
        "labels": [
            "infected_device"
        ],
        "product": {
            "lang": "en",
            "name": "SecurityScorecard Attack Surface Intelligence",
            "uid": "ssc_asi",
            "feature": {
                "uid": "ssc_malware_dns_sinkhole",
                "name": "SecurityScorecard Malware DNS Sinkhole collection system"
            },
            "vendor_name": "SecurityScorecard"
        },
        "version": "1.0.0",
        "profiles": [
            "malware",
            "reputation"
        ]
    },
    "resources": [
        {
            "group_name": "infected_device",
            "name": "IPv4 address 38.7.186.198 of device in SecurityScorecard DNS sinkhole malware, adware, or potentially unwanted/vulnerable collection logs",
            "owner": "emix.net.ae",
            "uid": "38.7.186.198"
        }
    ],
    "observables": [
        {
            "name": "infected_device.ip",
            "type": "IP Address",
            "type_id": 2,
            "value": "38.7.186.198"
        },
        {
            "name": "infection.category",
            "type": "Category of infection on infected device",
            "type_id": -1,
            "value": "Adware"
        },
        {
            "name": "infected_device.malware_hostname",
            "type": "Hostname",
            "type_id": 1,
            "value": "x-eu.58dac16e7b2c86c19cfe48914a6e8fcdac9ae06fe5cf53369beaa45b.com"
        },
        {
            "name": "infection.family",
            "type": "Malware, adware, or PUA/PVA family name",
            "type_id": -1,
            "value": "adware.android.imp"
        },
        {
            "name": "infected_device.source_port",
            "type": "Client-side port making connection to the infection communication domain",
            "type_id": -1,
            "value": "59750"
        },
        {
            "name": "infected_device.geo_location",
            "type": "Geo Location",
            "type_id": 26,
            "value": "Karachi (Sector Five F), Pakistan"
        }
    ],
    "finding": {
        "title": "Infection found on 38.7.186.198",
        "uid": "26c7c83d-0aad-411b-88ee-52343ff22064",
        "types": [
            "malware_infection",
            "infected_device",
            "adware.android.imp"
        ],
        "src_url": "https://platform.securityscorecard.io/#/asi/details/38.7.186.198",
        "remediation": {
            "desc": "If this IP address is tied to your network via any observables attached to this event, take immediate steps to find the related device on your network and remove the infection seen from external threat intelligence",
            "kb_articles": [
                "https://support.securityscorecard.com/hc/en-us/articles/8528362400539-How-SecurityScorecard-collects-data-for-ASI#h_01GBX38RBVVDT63RH11KVREN0K",
                "https://support.securityscorecard.com/hc/en-us/articles/360061410291-Resolving-Malware-Findings"
            ]
        },
        "product_uid": "ssc_malware_dns_sinkhole",
        "last_seen_time": 1668535199948,
        "desc": "Adware infection detected on IP address 38.7.186.198 communicating with Command-and-Control domain x-eu.58dac16e7b2c86c19cfe48914a6e8fcdac9ae06fe5cf53369beaa45b.com"
    }
}
{
    "activity_id": 99,
    "actor": {
        "process": {
            "file": {
                "name": "lsass.exe",
                "parent_folder": "C:\\Windows\\System32",
                "path": "C:\\Windows\\System32\\lsass.exe",
                "type_id": 1
            },
            "pid": 492
        },
        "session": {
            "uid": "0x3e7"
        },
        "user": {
            "account_type": "Windows Account",
            "account_type_id": 2,
            "domain": "DIR",
            "name": "STLDIRDC1$",
            "uid": "NT AUTHORITY\\SYSTEM"
        }
    },
    "category_uid": 1,
    "class_uid": 1010,
    "device": {
        "hostname": "STLDIRDC1.dir.solutia.com",
        "os": {
            "name": "Windows",
            "type_id": 100
        },
        "type_id": 0
    },
    "message": "A handle to an object was requested.",
    "metadata": {
        "original_time": "01/09/2019 12:46:00 AM",
        "product": {
            "feature": {
                "name": "Security"
            },
            "name": "Microsoft Windows",
            "vendor_name": "Microsoft"
        },
        "profiles": [
            "host"
        ],
        "uid": "d9e6a7b1-3177-4542-8de1-bfd582f87727",
        "version": "1.0.0-rc.2"
    },
    "severity_id": 1,
    "status_id": 1,
    "time": 1547012760000,
    "unmapped": {
        "Access Request Information": {
            "Access Mask": "0x2d",
            "Accesses": [
                "DELETE",
                "READ_CONTROL",
                "WRITE_DAC",
                "WRITE_OWNER",
                "ReadPasswordParameters",
                "WritePasswordParameters",
                "ReadOtherParameters",
                "WriteOtherParameters",
                "CreateUser",
                "CreateGlobalGroup",
                "CreateLocalGroup",
                "GetLocalGroupMembership",
                "ListAccounts"
            ],
            "Privileges Used for Access Check": "\u01ff\\x0F-",
            "Properties": [
                "---",
                "domain",
                "DELETE",
                "READ_CONTROL",
                "WRITE_DAC",
                "WRITE_OWNER",
                "ReadPasswordParameters",
                "WritePasswordParameters",
                "ReadOtherParameters",
                "WriteOtherParameters",
                "CreateUser",
                "CreateGlobalGroup",
                "CreateLocalGroup",
                "GetLocalGroupMembership",
                "ListAccounts",
                "Domain Password & Lockout Policies",
                "lockOutObservationWindow",
                "lockoutDuration",
                "lockoutThreshold",
                "maxPwdAge",
                "minPwdAge",
                "minPwdLength",
                "pwdHistoryLength",
                "pwdProperties",
                "Other Domain Parameters (for use by SAM)",
                "serverState",
                "serverRole",
                "modifiedCount",
                "uASCompat",
                "forceLogoff",
                "domainReplica",
                "oEMInformation",
                "Domain Administer Server"
            ],
            "Restricted SID Count": "0",
            "Transaction ID": "{00000000-0000-0000-0000-000000000000}"
        },
        "EventCode": "4661",
        "EventType": "0",
        "Object": {
            "Object Server": "Security Account Manager"
        },
        "OpCode": "Info",
        "RecordNumber": "3166250565",
        "SourceName": "Microsoft Windows security auditing.",
        "TaskCategory": "SAM"
    },
    "win_resource": {
        "name": "DC=dir,DC=solutia,DC=com",
        "type_id": 36,
        "uid": "0x7f79620"
    }
}
{
    "activity_id": 1,
    "actor": {
        "process": {
            "file": {
                "name": "explorer.exe",
                "parent_folder": "C:\\Windows",
                "path": "C:\\Windows\\explorer.exe",
                "type_id": 1
            },
            "pid": 1704
        },
        "session": {
            "uid": "0xDE9AD8"
        },
        "user": {
            "account_type": "Windows Account",
            "account_type_id": 2,
            "domain": "SESTEST",
            "name": "splunker",
            "uid": "SESTEST\\splunker"
        }
    },
    "category_uid": 1,
    "class_uid": 1010,
    "device": {
        "hostname": "SesWin2019DC1.SesTest.local",
        "os": {
            "name": "Windows",
            "type_id": 100
        },
        "type_id": 0
    },
    "message": "A privileged service was called.",
    "metadata": {
        "original_time": "01/28/2022 04:12:19 PM",
        "product": {
            "feature": {
                "name": "Security"
            },
            "name": "Microsoft Windows",
            "vendor_name": "Microsoft"
        },
        "profiles": [
            "host"
        ],
        "uid": "995559a6-1921-463f-93e1-9c5ca932dc8c",
        "version": "1.0.0-rc.2"
    },
    "severity_id": 1,
    "status_id": 2,
    "time": 1643404339000,
    "unmapped": {
        "EventCode": "4673",
        "EventType": "0",
        "OpCode": "Info",
        "RecordNumber": "374060",
        "Service Request Information": {
            "Privileges": "SeTcbPrivilege"
        },
        "SourceName": "Microsoft Windows security auditing.",
        "TaskCategory": "Sensitive Privilege Use"
    },
    "win_resource": {
        "name": "-",
        "type": "Security",
        "type_id": 0
    }
}
{
    "activity_id": 2,
    "activity_name": "Update",
    "category_name": "Findings",
    "category_uid": 2,
    "class_name": "Vulnerability Finding",
    "class_uid": 2002,
    "cloud": {
        "account": {
            "uid": "111111111111"
        },
        "provider": "AWS",
        "region": "us-east-2"
    },
    "finding_info": {
        "created_time_dt": "2023-04-21T11:59:04.000-04:00",
        "desc": "Issue summary: The AES-XTS cipher decryption implementation for 64 bit ARM\nplatform contains a bug that could cause it to read past the input buffer,\nleading to a crash.\n\nImpact summary: Applications that use the AES-XTS algorithm on the 64 bit ARM\nplatform can crash in rare circumstances. The AES-XTS algorithm is usually\nused for disk encryption.\n\nThe AES-XTS cipher decryption implementation for 64 bit ARM platform will read\npast the end of the ciphertext buffer if the ciphertext size is 4 mod 5 in 16\nbyte blocks, e.g. 144 bytes or 1024 bytes. If the memory after the ciphertext\nbuffer is unmapped, this will trigger a crash which results in a denial of\nservice.\n\nIf an attacker can control the size and location of the ciphertext buffer\nbeing decrypted by an application using AES-XTS on 64 bit ARM, the\napplication is affected. This is fairly unlikely making this issue\na Low severity one.",
        "first_seen_time_dt": "2023-04-21T11:59:04.000-04:00",
        "last_seen_time_dt": "2024-01-26T17:19:14.000-05:00",
        "modified_time_dt": "2024-01-26T17:19:14.000-05:00",
        "title": "CVE-2023-1255 - openssl",
        "types": [
            "Software and Configuration Checks/Vulnerabilities/CVE"
        ],
        "uid": "arn:aws:inspector2:us-east-2:111111111111:finding/faa0d54609b94871badcc83ac7c2add5"
    },
    "metadata": {
        "log_version": "2018-10-08",
        "processed_time_dt": "2024-01-26T17:59:56.923-05:00",
        "product": {
            "feature": {
                "uid": "AWSInspector"
            },
            "name": "Inspector",
            "uid": "arn:aws:securityhub:us-east-2::product/aws/inspector",
            "vendor_name": "Amazon",
            "version": "2"
        },
        "profiles": [
            "cloud",
            "datetime"
        ],
        "version": "1.1.0"
    },
    "observables": [
        {
            "name": "resource.uid",
            "type": "Resource UID",
            "type_id": 10,
            "value": "arn:aws:ecr:us-east-2:111111111111:repository/browserhostingstack-EXAMPLE-btb1o54yh1jr/sha256:e9e2afad74f4e80511a5cff33d3d989b9797a718425f27e549f5b1f862c058a8"
        }
    ],
    "resource": {
        "cloud_partition": "aws",
        "data": "{\"AwsEcrContainerImage\":{\"Architecture\":\"amd64\",\"ImageDigest\":\"sha256:e9e2afad74f4e80511a5cff33d3d989b9797a718425f27e549f5b1f862c058a8\",\"ImagePublishedAt\":\"2023-04-11T21:07:55Z\",\"RegistryId\":\"111111111111\",\"RepositoryName\":\"browserhostingstack-EXAMPLE-btb1o54yh1jr\"}}",
        "region": "us-east-2",
        "type": "AwsEcrContainerImage",
        "uid": "arn:aws:ecr:us-east-2:111111111111:repository/browserhostingstack-EXAMPLE-btb1o54yh1jr/sha256:e9e2afad74f4e80511a5cff33d3d989b9797a718425f27e549f5b1f862c058a8"
    },
    "severity": "Medium",
    "severity_id": 3,
    "status": "New",
    "time": 1706307554000,
    "time_dt": "2024-01-26T17:19:14.000-05:00",
    "type_name": "Vulnerability Finding: Update",
    "type_uid": 200202,
    "unmapped": {
        "FindingProviderFields.Severity.Label": "MEDIUM",
        "FindingProviderFields.Types[]": "Software and Configuration Checks/Vulnerabilities/CVE",
        "ProductFields.aws/inspector/FindingStatus": "ACTIVE",
        "ProductFields.aws/inspector/inspectorScore": "5.9",
        "ProductFields.aws/inspector/packageVulnerabilityDetails/vulnerablePackages/sourceLayerHashes": "sha256:f56be85fc22e46face30e2c3de3f7fe7c15f8fd7c4e5add29d7f64b87abdaa09",
        "ProductFields.aws/inspector/resources/1/resourceDetails/awsEcrContainerImageDetails/platform": "ALPINE_LINUX_3_17",
        "ProductFields.aws/securityhub/CompanyName": "Amazon",
        "ProductFields.aws/securityhub/FindingId": "arn:aws:securityhub:us-east-2::product/aws/inspector/arn:aws:inspector2:us-east-2:111111111111:finding/faa0d54609b94871badcc83ac7c2add5",
        "ProductFields.aws/securityhub/ProductName": "Inspector",
        "RecordState": "ACTIVE",
        "Severity.Normalized": "40",
        "Vulnerabilities[].Cvss[].Source": "NVD,NVD",
        "Vulnerabilities[].Vendor.VendorSeverity": "MEDIUM",
        "Vulnerabilities[].VulnerablePackages[].SourceLayerHash": "sha256:f56be85fc22e46face30e2c3de3f7fe7c15f8fd7c4e5add29d7f64b87abdaa09",
        "WorkflowState": "NEW"
    },
    "vulnerabilities": [
        {
            "affected_packages": [
                {
                    "architecture": "X86_64",
                    "epoch": 0,
                    "fixed_in_version": "0:3.0.8-r4",
                    "name": "openssl",
                    "package_manager": "OS",
                    "release": "r3",
                    "remediation": {
                        "desc": "apk update && apk upgrade openssl"
                    },
                    "version": "3.0.8"
                }
            ],
            "cve": {
                "created_time_dt": "2023-04-20T13:15:06.000-04:00",
                "cvss": [
                    {
                        "base_score": 5.9,
                        "vector_string": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
                        "version": "3.1"
                    },
                    {
                        "base_score": 5.9,
                        "vector_string": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
                        "version": "3.1"
                    }
                ],
                "epss": {
                    "score": "0.00066"
                },
                "modified_time_dt": "2023-09-08T13:15:15.000-04:00",
                "references": [
                    "https://nvd.nist.gov/vuln/detail/CVE-2023-1255"
                ],
                "uid": "CVE-2023-1255"
            },
            "is_exploit_available": true,
            "is_fix_available": true,
            "references": [
                "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=bc2f61ad70971869b242fc1cb445b98bad50074a",
                "https://www.openssl.org/news/secadv/20230419.txt",
                "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=02ac9c9420275868472f33b01def01218742b8bb"
            ],
            "remediation": {
                "desc": "Remediation is available. Please refer to the Fixed version in the vulnerability details section above.For detailed remediation guidance for each of the affected packages, refer to the vulnerabilities section of the detailed finding JSON."
            },
            "vendor_name": "NVD"
        }
    ]
}
{
    "activity_id": 1,
    "activity_name": "Access",
    "actor": {
        "process": {
            "file": {
                "name": "services.exe",
                "parent_folder": "C:\\Windows\\System32",
                "path": "C:\\Windows\\System32\\services.exe",
                "type": "Regular File",
                "type_id": 1
            },
            "pid": 532
        },
        "session": {
            "uid": "0x3e7"
        },
        "user": {
            "account_type": "Windows Account",
            "account_type_id": 2,
            "domain": "SOI",
            "name": "SZUSOIDC1$",
            "uid": "NT AUTHORITY\\SYSTEM"
        }
    },
    "category_name": "System Activity",
    "category_uid": 1,
    "class_name": "Windows Resource Activity",
    "class_uid": 201003,
    "device": {
        "hostname": "szusoidc1.soi.dir.acme080.com",
        "os": {
            "name": "Windows",
            "type": "Windows",
            "type_id": 100
        },
        "type": "Unknown",
        "type_id": 0
    },
    "message": "An attempt was made to access an object.",
    "metadata": {
        "original_time": "01/14/2015 08:30:54 PM",
        "product": {
            "feature": {
                "name": "Security"
            },
            "name": "Microsoft Windows",
            "vendor_name": "Microsoft"
        },
        "profiles": [
            "host"
        ],
        "uid": "05e90f2c-5be6-484c-aefb-f8e6f591bd2c",
        "version": "1.0.0-rc.2"
    },
    "severity": "Informational",
    "severity_id": 1,
    "status": "Success",
    "status_id": 1,
    "time": 1421285454000,
    "type_name": "Windows Resource Activity: Access",
    "type_uid": 101001,
    "unmapped": {
        "Access Mask": "0x2",
        "Access Request Information": {
            "Accesses": "Set key value"
        },
        "CaseID": "AD_4663",
        "EventCode": "4663",
        "EventType": "0",
        "Object": {
            "Object Server": "Security"
        },
        "OpCode": "Info",
        "RecordNumber": "989202992",
        "SourceName": "Microsoft Windows security auditing.",
        "TaskCategory": "Registry"
    },
    "win_resource": {
        "name": "\\REGISTRY\\MACHINE\\SYSTEM\\ControlSet001\\Services\\EventLog\\Security",
        "type": "Key",
        "type_id": 25,
        "uid": "0x564"
    }
}

Detection section

The following section provides information for those who wish to learn more about the detection capabilities enabled by collecting this intake. It includes details about the built-in rule catalog, event categories, and ECS fields extracted from raw events. This is essential for users aiming to create custom detection rules, perform hunting activities, or pivot in the events page.

No related built-in rules was found. This message is automatically generated.

Event Categories

The following table lists the data source offered by this integration.

Data Source Description
File monitoring OCSF allows collecting system activities
Network device logs OCSF allows collection network activities
Process monitoring OCSF allows collecting application activities

In details, the following table denotes the type of events produced by this integration.

Name Values
Kind alert, event
Category ``
Type ``

Transformed Events Samples after Ingestion

This section demonstrates how the raw logs will be transformed by our parsers. It shows the extracted fields that will be available for use in the built-in detection rules and hunting activities in the events page. Understanding these transformations is essential for analysts to create effective detection mechanisms with custom detection rules and to leverage the full potential of the collected data.

{
    "message": "{\"activity_id\": 1, \"activity_name\": \"Create\", \"actor\": {\"idp\": {\"name\": null}, \"invoked_by\": null, \"session\": {\"created_time\": 1700239437000, \"created_time_dt\": \"2023-11-17T16:43:57Z\", \"is_mfa\": false, \"issuer\": \"arn:aws:iam::112233445566:role/Admin\"}, \"user\": {\"account\": {\"uid\": \"112233445566\"}, \"credential_uid\": null, \"type\": \"AssumedRole\", \"uid\": \"arn:aws:sts::112233445566:assumed-role/Admin/Admin-user\", \"uid_alt\": \"AROA2W7SOKHEXAMPLE:Admin-user\"}}, \"api\": {\"operation\": \"CreateUser\", \"request\": {\"data\": {\"userName\": \"test_user2\"}, \"uid\": \"c99bf9da-e0bd-4bf7-bb32-example\"}, \"response\": {\"data\": {\"user\": {\"arn\": \"arn:aws:iam::112233445566:user/test_user2\", \"createDate\": \"Mar 17, 2023 5:07:59 PM\", \"path\": \"/\", \"userId\": \"AIDA2W7SOKHEXAMPLE\", \"userName\": \"test_user2\"}}, \"error\": null, \"message\": null}, \"service\": {\"name\": \"iam.amazonaws.com\"}, \"version\": null}, \"category_name\": \"Identity & Access Management Category\", \"category_uid\": 3, \"class_name\": \"Account Change\", \"class_uid\": 3001, \"cloud\": {\"provider\": \"AWS\", \"region\": \"us-east-1\"}, \"http_request\": {\"user_agent\": \"AWS Internal\"}, \"metadata\": {\"log_name\": \"AwsApiCall\", \"log_provider\": \"CloudTrail\", \"product\": {\"feature\": {\"name\": \"Management\"}, \"name\": \"CloudTrail\", \"vendor_name\": \"AWS\", \"version\": \"1.08\"}, \"profiles\": [\"cloud\", \"datetime\"], \"uid\": \"7dd15a89-ae0f-4340-8e6c-example\", \"version\": \"1.1.0\"}, \"observables\": [{\"name\": \"user.name\", \"type\": \"User\", \"type_id\": 4, \"value\": \"test_user2\"}, {\"name\": \"src_endpoint.ip\", \"type\": \"IP Address\", \"type_id\": 2, \"value\": \"52.95.4.21\"}], \"severity\": \"Informational\", \"severity_id\": 1, \"src_endpoint\": {\"ip\": \"52.95.4.21\", \"uid\": null}, \"time\": 1679072879000, \"time_dt\": \"2023-03-17T17:07:59Z\", \"type_name\": \"Account Change: Create\", \"type_uid\": 300101, \"unmapped\": {\"eventType\": \"AwsApiCall\", \"managementEvent\": true, \"readOnly\": false, \"recipientAccountId\": \"112233445566\", \"requestParameters\": {\"userName\": \"test_user2\"}, \"responseElements\": {\"user\": {\"arn\": \"arn:aws:iam::112233445566:user/test_user2\", \"createDate\": \"Mar 17, 2023 5:07:59 PM\", \"path\": \"/\", \"userId\": \"AIDA2W7SOKHEXAMPLE\", \"userName\": \"test_user2\"}}, \"sessionCredentialFromConsole\": \"true\", \"userIdentity\": {\"sessionContext\": {\"attributes\": {\"mfaAuthenticated\": \"false\"}, \"sessionIssuer\": {\"accountId\": \"112233445566\", \"principalId\": \"AROA2W7SOKHEXAMPLE\", \"type\": \"Role\"}, \"webIdFederationData\": {}}}}, \"user\": {\"name\": \"test_user2\", \"uid\": \"AROA2W7SOKHEXAMPLE:Admin-user\"}}",
    "event": {
        "action": "create",
        "category": [
            "iam"
        ],
        "kind": "event",
        "provider": "CloudTrail",
        "severity": 1,
        "type": [
            "creation",
            "info",
            "user"
        ]
    },
    "@timestamp": "2023-03-17T17:07:59Z",
    "cloud": {
        "provider": "AWS",
        "region": "us-east-1"
    },
    "ocsf": {
        "activity_id": 1,
        "activity_name": "Create",
        "class_name": "Account Change",
        "class_uid": 3001
    },
    "related": {
        "ip": [
            "52.95.4.21"
        ]
    },
    "source": {
        "address": "52.95.4.21",
        "ip": "52.95.4.21"
    },
    "user": {
        "id": "arn:aws:sts::112233445566:assumed-role/Admin/Admin-user",
        "target": {
            "id": "AROA2W7SOKHEXAMPLE:Admin-user",
            "name": "test_user2"
        }
    },
    "user_agent": {
        "device": {
            "name": "Other"
        },
        "name": "Other",
        "original": "AWS Internal",
        "os": {
            "name": "Other"
        }
    }
}
{
    "message": "{\"activity_id\": 2, \"activity_name\": \"Read\", \"actor\": {\"idp\": {\"name\": null}, \"invoked_by\": null, \"session\": {\"created_time\": 0, \"created_time_dt\": null, \"issuer\": null}, \"user\": {\"account\": {\"uid\": \"1111111111111\"}, \"credential_uid\": \"AKIA3Z2XBVEXAMPLE\", \"name\": \"Level6\", \"type\": \"IAMUser\", \"uid\": \"arn:aws:iam::1111111111111:user/Level6\", \"uid_alt\": \"AIDADO2GQEXAMPLE\"}}, \"api\": {\"operation\": \"DescribeDirectConnectGateways\", \"request\": {\"data\": null, \"uid\": \"1c8a6220-4263-4763-b526-example\"}, \"response\": {\"data\": {\"directConnectGateways\": []}, \"error\": null, \"message\": null}, \"service\": {\"name\": \"directconnect.amazonaws.com\"}, \"version\": null}, \"category_name\": \"Application Activity\", \"category_uid\": 6, \"class_name\": \"API Activity\", \"class_uid\": 6003, \"cloud\": {\"provider\": \"AWS\", \"region\": \"us-east-1\"}, \"http_request\": {\"user_agent\": \"Boto3/1.15.2 Python/3.8.2 Linux/5.6.3-arch1-1 Botocore/1.18.2\"}, \"metadata\": {\"log_name\": \"AwsApiCall\", \"log_provider\": \"CloudTrail\", \"product\": {\"feature\": {\"name\": null}, \"name\": \"CloudTrail\", \"vendor_name\": \"AWS\", \"version\": \"1.05\"}, \"profiles\": [\"cloud\", \"datetime\"], \"uid\": \"71c88be9-ea5c-43c7-8c82-example\", \"version\": \"1.1.0\"}, \"observables\": [{\"name\": \"actor.user.name\", \"type\": \"User\", \"type_id\": 4, \"value\": \"Level6\"}, {\"name\": \"src_endpoint.ip\", \"type\": \"IP Address\", \"type_id\": 2, \"value\": \"205.8.181.128\"}], \"severity\": \"Informational\", \"severity_id\": 1, \"src_endpoint\": {\"ip\": \"205.8.181.128\"}, \"status\": null, \"status_id\": 99, \"time\": 1695334972000, \"time_dt\": \"2023-09-21T22:22:52Z\", \"type_name\": \"API Activity: Read\", \"type_uid\": 600302, \"unmapped\": {\"eventType\": \"AwsApiCall\", \"recipientAccountId\": \"1111111111111\", \"requestParameters\": null, \"responseElements\": {\"directConnectGateways\": []}, \"userIdentity\": {}}}",
    "event": {
        "action": "read",
        "category": [
            "web"
        ],
        "kind": "event",
        "provider": "CloudTrail",
        "severity": 1,
        "type": [
            "info"
        ]
    },
    "@timestamp": "2023-09-21T22:22:52Z",
    "cloud": {
        "provider": "AWS",
        "region": "us-east-1"
    },
    "ocsf": {
        "activity_id": 2,
        "activity_name": "Read",
        "class_name": "API Activity",
        "class_uid": 6003
    },
    "package": {
        "description": [],
        "name": [],
        "type": []
    },
    "related": {
        "ip": [
            "205.8.181.128"
        ],
        "user": [
            "Level6"
        ]
    },
    "source": {
        "address": "205.8.181.128",
        "ip": "205.8.181.128"
    },
    "user": {
        "id": "arn:aws:iam::1111111111111:user/Level6",
        "name": "Level6"
    },
    "user_agent": {
        "device": {
            "name": "Spider"
        },
        "name": "Boto3",
        "original": "Boto3/1.15.2 Python/3.8.2 Linux/5.6.3-arch1-1 Botocore/1.18.2",
        "os": {
            "name": "Linux",
            "version": "5.6.3"
        },
        "version": "1.15.2"
    }
}
{
    "message": "{\"activity_id\": 1, \"activity_name\": \"Create\", \"actor\": {\"session\": {\"credential_uid\": \"EXAMPLEUIDTEST\", \"issuer\": \"arn:aws:iam::123456789012:role/example-test-161366663-NodeInstanceRole-abc12345678912\", \"uid\": \"i-12345678901\"}, \"user\": {\"groups\": [{\"name\": \"system:bootstrappers\"}, {\"name\": \"system:nodes\"}, {\"name\": \"system:authenticated\"}], \"name\": \"system:node:ip-192-001-02-03.ec2.internal\", \"type_id\": 0, \"uid\": \"heptio-authenticator-aws:123456789012:ABCD1234567890EXAMPLE\"}}, \"api\": {\"operation\": \"create\", \"request\": {\"uid\": \"f47c68f2-d3ac-4f96-b2f4-5d497bf79b64\"}, \"response\": {\"code\": 201}, \"version\": \"v1\"}, \"category_name\": \"Application Activity\", \"category_uid\": 6, \"class_name\": \"API Activity\", \"class_uid\": 6003, \"cloud\": {\"account\": {\"uid\": \"arn:aws:sts::123456789012:assumed-role/example-test-161366663-NodeInstanceRole-abc12345678912/i-12345678901\"}, \"provider\": \"AWS\"}, \"http_request\": {\"url\": {\"path\": \"/api/v1/nodes\"}, \"user_agent\": \"kubelet/v1.21.2 (linux/amd64) kubernetes/729bdfc\"}, \"message\": \"ResponseComplete\", \"metadata\": {\"log_level\": \"RequestResponse\", \"product\": {\"feature\": {\"name\": \"Elastic Kubernetes Service\"}, \"name\": \"Amazon EKS\", \"vendor_name\": \"AWS\", \"version\": \"audit.k8s.io/v1\"}, \"profiles\": [\"cloud\", \"datetime\"], \"version\": \"1.1.0\"}, \"observables\": [{\"name\": \"actor.user.name\", \"type\": \"User Name\", \"type_id\": 4, \"value\": \"system:node:ip-192-001-02-03.ec2.internal\"}, {\"name\": \"src_endpoint.ip\", \"type\": \"IP Address\", \"type_id\": 2, \"value\": \"12.000.22.33\"}, {\"name\": \"http_request.url.path\", \"type\": \"URL String\", \"type_id\": 6, \"value\": \"/api/v1/nodes\"}], \"resources\": [{\"name\": \"ip-192-001-02-03.ec2.internal\", \"type\": \"nodes\"}], \"severity\": \"Informational\", \"severity_id\": 1, \"src_endpoint\": {\"ip\": \"12.000.22.33\"}, \"start_time_dt\": \"2021-09-07 20:37:30.502000\", \"time\": 1631047050642, \"time_dt\": \"2021-09-07 20:37:30.642000\", \"type_name\": \"API Activity: Create\", \"type_uid\": 600301, \"unmapped\": {\"responseObject.status.capacity.cpu\": \"4\", \"annotations.authorization.k8s.io/reason\": \"\", \"requestObject.metadata.annotations.volumes.kubernetes.io/controller-managed-attach-detach\": \"true\", \"responseObject.metadata.labels.kubernetes.io/hostname\": \"ip-192-001-02-03.ec2.internal\", \"requestObject.metadata.labels.eks.amazonaws.com/sourceLaunchTemplateVersion\": \"1\", \"responseObject.metadata.labels.alpha.eksctl.io/cluster-name\": \"ABCD1234567890EXAMPLE\", \"responseObject.metadata.labels.eks.amazonaws.com/nodegroup-image\": \"ami-0193ebf9573ebc9f7\", \"responseObject.metadata.managedFields[].time\": \"2021-09-07T20:37:30Z\", \"responseObject.status.nodeInfo.kubeletVersion\": \"v1.21.2-eks-55daa9d\", \"responseObject.status.nodeInfo.kubeProxyVersion\": \"v1.21.2-eks-55daa9d\", \"requestObject.status.capacity.hugepages-1Gi\": \"0\", \"responseObject.metadata.managedFields[].manager\": \"kubelet\", \"annotations.authorization.k8s.io/decision\": \"allow\", \"requestObject.status.nodeInfo.systemUUID\": \"ec2483c6-33b0-e271-f36c-e14e45a361b8\", \"responseObject.metadata.name\": \"ip-192-001-02-03.ec2.internal\", \"responseObject.metadata.labels.eks.amazonaws.com/sourceLaunchTemplateVersion\": \"1\", \"responseObject.apiVersion\": \"v1\", \"requestObject.metadata.labels.kubernetes.io/arch\": \"amd64\", \"requestObject.status.allocatable.hugepages-2Mi\": \"0\", \"requestObject.metadata.labels.alpha.eksctl.io/cluster-name\": \"ABCD1234567890EXAMPLE\", \"responseObject.status.allocatable.memory\": \"15076868Ki\", \"responseObject.status.conditions[].lastHeartbeatTime\": \"2021-09-07T20:37:28Z,2021-09-07T20:37:28Z,2021-09-07T20:37:28Z,2021-09-07T20:37:28Z\", \"responseObject.spec.providerID\": \"aws:///us-east-1f/i-12345678901\", \"requestObject.status.nodeInfo.architecture\": \"amd64\", \"responseObject.status.nodeInfo.kernelVersion\": \"5.4.141-67.229.amzn2.x86_64\", \"responseObject.status.allocatable.pods\": \"58\", \"requestObject.status.conditions[].status\": \"False,False,False,False\", \"requestObject.metadata.labels.failure-domain.beta.kubernetes.io/region\": \"us-east-1\", \"responseObject.metadata.labels.beta.kubernetes.io/os\": \"linux\", \"responseObject.metadata.labels.kubernetes.io/os\": \"linux\", \"requestObject.status.addresses[].address\": \"192.000.22.33,12.000.22.33,ip-192-001-02-03.ec2.internal,ip-192-001-02-03.ec2.internal,ec2-12.000.22.33.compute-1.amazonaws.com\", \"responseObject.status.capacity.hugepages-1Gi\": \"0\", \"responseObject.status.conditions[].reason\": \"KubeletHasSufficientMemory,KubeletHasNoDiskPressure,KubeletHasSufficientPID,KubeletNotReady\", \"requestObject.apiVersion\": \"v1\", \"requestObject.status.capacity.cpu\": \"4\", \"requestObject.metadata.labels.node.kubernetes.io/instance-type\": \"m5.xlarge\", \"requestObject.metadata.labels.eks.amazonaws.com/nodegroup-image\": \"ami-0193ebf9573ebc9f7\", \"responseObject.metadata.labels.node.kubernetes.io/instance-type\": \"m5.xlarge\", \"responseObject.status.allocatable.hugepages-2Mi\": \"0\", \"responseObject.status.allocatable.attachable-volumes-aws-ebs\": \"25\", \"requestObject.status.nodeInfo.containerRuntimeVersion\": \"docker://19.3.13\", \"requestObject.status.allocatable.attachable-volumes-aws-ebs\": \"25\", \"responseObject.status.conditions[].lastTransitionTime\": \"2021-09-07T20:37:28Z,2021-09-07T20:37:28Z,2021-09-07T20:37:28Z,2021-09-07T20:37:28Z\", \"responseObject.metadata.creationTimestamp\": \"2021-09-07T20:37:30Z\", \"requestObject.metadata.labels.kubernetes.io/hostname\": \"ip-192-001-02-03.ec2.internal\", \"requestObject.status.nodeInfo.bootID\": \"0d0dd4f2-8829-4b03-9f29-794f4908281b\", \"requestObject.status.nodeInfo.kubeProxyVersion\": \"v1.21.2-eks-55daa9d\", \"responseObject.kind\": \"Node\", \"requestObject.status.nodeInfo.osImage\": \"Amazon Linux 2\", \"requestObject.status.conditions[].type\": \"MemoryPressure,DiskPressure,PIDPressure,Ready\", \"requestObject.status.daemonEndpoints.kubeletEndpoint.Port\": \"10250\", \"responseObject.metadata.labels.kubernetes.io/arch\": \"amd64\", \"responseObject.metadata.labels.eks.amazonaws.com/sourceLaunchTemplateId\": \"lt-0f20d6f901007611e\", \"requestObject.status.capacity.attachable-volumes-aws-ebs\": \"25\", \"responseObject.status.conditions[].message\": \"kubelet has sufficient memory available,kubelet has no disk pressure,kubelet has sufficient PID available,[container runtime status check may not have completed yet, container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:docker: network plugin is not ready: cni config uninitialized, CSINode is not yet initialized, missing node capacity for resources: ephemeral-storage]\", \"responseObject.status.nodeInfo.operatingSystem\": \"linux\", \"requestObject.metadata.labels.alpha.eksctl.io/nodegroup-name\": \"ng-5fe434eb\", \"responseObject.status.capacity.memory\": \"16093700Ki\", \"requestObject.metadata.labels.beta.kubernetes.io/arch\": \"amd64\", \"requestObject.metadata.labels.eks.amazonaws.com/capacityType\": \"ON_DEMAND\", \"requestObject.status.allocatable.memory\": \"15076868Ki\", \"requestObject.status.conditions[].lastHeartbeatTime\": \"2021-09-07T20:37:28Z,2021-09-07T20:37:28Z,2021-09-07T20:37:28Z,2021-09-07T20:37:28Z\", \"responseObject.status.capacity.attachable-volumes-aws-ebs\": \"25\", \"responseObject.status.nodeInfo.osImage\": \"Amazon Linux 2\", \"responseObject.metadata.labels.beta.kubernetes.io/instance-type\": \"m5.xlarge\", \"responseObject.metadata.labels.alpha.eksctl.io/nodegroup-name\": \"ng-5fe434eb\", \"requestObject.metadata.labels.beta.kubernetes.io/instance-type\": \"m5.xlarge\", \"responseObject.status.nodeInfo.architecture\": \"amd64\", \"responseObject.metadata.labels.topology.kubernetes.io/zone\": \"us-east-1f\", \"requestObject.status.capacity.hugepages-2Mi\": \"0\", \"requestObject.status.conditions[].message\": \"kubelet has sufficient memory available,kubelet has no disk pressure,kubelet has sufficient PID available,[container runtime status check may not have completed yet, container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:docker: network plugin is not ready: cni config uninitialized, CSINode is not yet initialized, missing node capacity for resources: ephemeral-storage]\", \"responseObject.metadata.labels.failure-domain.beta.kubernetes.io/region\": \"us-east-1\", \"requestObject.metadata.labels.eks.amazonaws.com/sourceLaunchTemplateId\": \"lt-0f20d6f901007611e\", \"responseObject.spec.taints[].effect\": \"NoSchedule\", \"requestObject.metadata.labels.topology.kubernetes.io/region\": \"us-east-1\", \"requestObject.metadata.name\": \"ip-192-001-02-03.ec2.internal\", \"responseObject.status.nodeInfo.machineID\": \"ec2483c633b0e271f36ce14e45a361b8\", \"kind\": \"Event\", \"responseObject.metadata.annotations.volumes.kubernetes.io/controller-managed-attach-detach\": \"true\", \"responseObject.status.nodeInfo.bootID\": \"0d0dd4f2-8829-4b03-9f29-794f4908281b\", \"responseObject.status.conditions[].status\": \"False,False,False,False\", \"requestObject.metadata.labels.beta.kubernetes.io/os\": \"linux\", \"requestObject.status.allocatable.hugepages-1Gi\": \"0\", \"requestObject.status.addresses[].type\": \"InternalIP,ExternalIP,Hostname,InternalDNS,ExternalDNS\", \"requestObject.metadata.labels.failure-domain.beta.kubernetes.io/zone\": \"us-east-1f\", \"requestObject.status.allocatable.cpu\": \"3920m\", \"requestObject.metadata.labels.kubernetes.io/os\": \"linux\", \"requestObject.status.nodeInfo.operatingSystem\": \"linux\", \"responseObject.status.daemonEndpoints.kubeletEndpoint.Port\": \"10250\", \"responseObject.status.nodeInfo.systemUUID\": \"ec2483c6-33b0-e271-f36c-e14e45a361b8\", \"responseObject.metadata.labels.failure-domain.beta.kubernetes.io/zone\": \"us-east-1f\", \"requestObject.metadata.labels.topology.kubernetes.io/zone\": \"us-east-1f\", \"responseObject.status.nodeInfo.containerRuntimeVersion\": \"docker://19.3.13\", \"requestObject.status.nodeInfo.kernelVersion\": \"5.4.141-67.229.amzn2.x86_64\", \"requestObject.kind\": \"Node\", \"requestObject.spec.providerID\": \"aws:///us-east-1f/i-12345678901\", \"responseObject.metadata.uid\": \"4ecf628a-1b50-47ed-932c-bb1df89dad10\", \"responseObject.status.capacity.hugepages-2Mi\": \"0\", \"responseObject.metadata.managedFields[].fieldsType\": \"FieldsV1\", \"responseObject.metadata.labels.topology.kubernetes.io/region\": \"us-east-1\", \"responseObject.status.capacity.pods\": \"58\", \"requestObject.status.capacity.memory\": \"16093700Ki\", \"responseObject.metadata.managedFields[].apiVersion\": \"v1\", \"responseObject.status.allocatable.hugepages-1Gi\": \"0\", \"responseObject.metadata.resourceVersion\": \"67933403\", \"responseObject.status.addresses[].address\": \"192.000.22.33,12.000.22.33,ip-192-001-02-03.ec2.internal,ip-192-001-02-03.ec2.internal,ec2-12.000.22.33.compute-1.amazonaws.com\", \"requestObject.status.conditions[].lastTransitionTime\": \"2021-09-07T20:37:28Z,2021-09-07T20:37:28Z,2021-09-07T20:37:28Z,2021-09-07T20:37:28Z\", \"requestObject.status.nodeInfo.kubeletVersion\": \"v1.21.2-eks-55daa9d\", \"responseObject.metadata.labels.eks.amazonaws.com/nodegroup\": \"ng-5fe434eb\", \"requestObject.metadata.labels.eks.amazonaws.com/nodegroup\": \"ng-5fe434eb\", \"requestObject.status.conditions[].reason\": \"KubeletHasSufficientMemory,KubeletHasNoDiskPressure,KubeletHasSufficientPID,KubeletNotReady\", \"responseObject.metadata.labels.eks.amazonaws.com/capacityType\": \"ON_DEMAND\", \"requestObject.status.nodeInfo.machineID\": \"ec2483c633b0e271f36ce14e45a361b8\", \"responseObject.status.addresses[].type\": \"InternalIP,ExternalIP,Hostname,InternalDNS,ExternalDNS\", \"responseObject.metadata.labels.beta.kubernetes.io/arch\": \"amd64\", \"responseObject.metadata.managedFields[].operation\": \"Update\", \"responseObject.status.allocatable.cpu\": \"3920m\", \"responseObject.status.conditions[].type\": \"MemoryPressure,DiskPressure,PIDPressure,Ready\", \"responseObject.spec.taints[].key\": \"node.kubernetes.io/not-ready\", \"sourceIPs[]\": \"12.000.22.33\", \"requestObject.status.capacity.pods\": \"58\", \"requestObject.status.allocatable.pods\": \"58\"}}",
    "event": {
        "action": "create",
        "category": [
            "web"
        ],
        "kind": "event",
        "reason": "ResponseComplete",
        "severity": 1,
        "start": "2021-09-07T20:37:30.502000Z",
        "type": [
            "info"
        ]
    },
    "@timestamp": "2021-09-07T20:37:30.642000Z",
    "cloud": {
        "account": {
            "id": "arn:aws:sts::123456789012:assumed-role/example-test-161366663-NodeInstanceRole-abc12345678912/i-12345678901"
        },
        "provider": "AWS"
    },
    "ocsf": {
        "activity_id": 1,
        "activity_name": "Create",
        "class_name": "API Activity",
        "class_uid": 6003,
        "user": {
            "groups": [
                {
                    "name": "system:bootstrappers"
                },
                {
                    "name": "system:nodes"
                },
                {
                    "name": "system:authenticated"
                }
            ]
        }
    },
    "package": {
        "description": [],
        "name": [],
        "type": []
    },
    "related": {
        "user": [
            "system:node:ip-192-001-02-03.ec2.internal"
        ]
    },
    "url": {
        "path": "/api/v1/nodes"
    },
    "user": {
        "id": "heptio-authenticator-aws:123456789012:ABCD1234567890EXAMPLE",
        "name": "system:node:ip-192-001-02-03.ec2.internal"
    },
    "user_agent": {
        "device": {
            "name": "Other"
        },
        "name": "Other",
        "original": "kubelet/v1.21.2 (linux/amd64) kubernetes/729bdfc",
        "os": {
            "name": "Linux"
        }
    }
}
{
    "message": "{\"activity_id\": 1, \"activity_name\": \"Logon\", \"actor\": {\"idp\": {\"name\": null}, \"invoked_by\": null, \"session\": {\"issuer\": null}, \"user\": {\"account\": {\"uid\": \"111122223333\"}, \"credential_uid\": null, \"name\": \"anaya\", \"type\": \"IAMUser\", \"uid\": \"arn:aws:iam::111122223333:user/anaya\", \"uid_alt\": \"AIDACKCEVSQ6C2EXAMPLE\"}}, \"api\": {\"operation\": \"ConsoleLogin\", \"request\": {\"data\": null, \"uid\": \"\"}, \"response\": {\"data\": {\"ConsoleLogin\": \"Success\"}, \"error\": null, \"message\": null}, \"service\": {\"name\": \"signin.amazonaws.com\"}, \"version\": null}, \"category_name\": \"Identity & Access Management Category\", \"category_uid\": 3, \"class_name\": \"Authentication\", \"class_uid\": 3002, \"cloud\": {\"provider\": \"AWS\", \"region\": \"us-east-1\"}, \"dst_endpoint\": {\"svc_name\": \"https://console.aws.amazon.com/console/home?state=hashArgs%23&isauthcode=true\"}, \"http_request\": {\"user_agent\": \"Mozilla/5.0 (Macintosh; Intel Mac OS X 10_11_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.99 Safari/537.36\"}, \"is_mfa\": true, \"metadata\": {\"event_code\": \"AwsConsoleSignIn\", \"log_provider\": \"CloudTrail\", \"product\": {\"feature\": {\"name\": \"Management\"}, \"name\": \"CloudTrail\", \"vendor_name\": \"AWS\", \"version\": \"1.08\"}, \"profiles\": [\"cloud\", \"datetime\"], \"uid\": \"fed06f42-cb12-4764-8c69-example\", \"version\": \"1.1.0\"}, \"observables\": [{\"name\": \"src_endpoint.ip\", \"type\": \"IP Address\", \"type_id\": 2, \"value\": \"192.0.2.0\"}], \"session\": {\"expiration_time\": null}, \"severity\": \"Informational\", \"severity_id\": 1, \"src_endpoint\": {\"ip\": \"192.0.2.0\"}, \"status\": \"Success\", \"status_id\": 1, \"time\": 1699633474000, \"time_dt\": \"2023-11-10T16:24:34Z\", \"type_name\": \"Authentication: Logon\", \"type_uid\": 300201, \"unmapped\": {\"additionalEventData\": {\"LoginTo\": \"https://console.aws.amazon.com/console/home?state=hashArgs%23&isauthcode=true\", \"MFAIdentifier\": \"arn:aws:iam::111122223333:u2f/user/anaya/default-AAAAAAAABBBBBBBBCCCCCCCCDD\", \"MobileVersion\": \"No\"}, \"eventType\": \"AwsConsoleSignIn\", \"recipientAccountId\": \"111122223333\", \"requestParameters\": null, \"responseElements\": {}, \"userIdentity\": {}}, \"user\": {\"uid\": \"arn:aws:iam::111122223333:user/anaya\", \"uid_alt\": \"AIDACKCEVSQ6C2EXAMPLE\"}}",
    "event": {
        "action": "logon",
        "category": [
            "authentication"
        ],
        "code": "AwsConsoleSignIn",
        "kind": "event",
        "outcome": "success",
        "provider": "CloudTrail",
        "severity": 1,
        "type": [
            "info",
            "start"
        ]
    },
    "@timestamp": "2023-11-10T16:24:34Z",
    "cloud": {
        "provider": "AWS",
        "region": "us-east-1"
    },
    "network": {
        "application": "https://console.aws.amazon.com/console/home?state=hashArgs%23&isauthcode=true"
    },
    "ocsf": {
        "activity_id": 1,
        "activity_name": "Logon",
        "class_name": "Authentication",
        "class_uid": 3002
    },
    "related": {
        "ip": [
            "192.0.2.0"
        ],
        "user": [
            "anaya"
        ]
    },
    "source": {
        "address": "192.0.2.0",
        "ip": "192.0.2.0"
    },
    "user": {
        "id": "arn:aws:iam::111122223333:user/anaya",
        "name": "anaya",
        "target": {
            "id": "arn:aws:iam::111122223333:user/anaya"
        }
    },
    "user_agent": {
        "device": {
            "name": "Mac"
        },
        "name": "Chrome",
        "original": "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_11_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.99 Safari/537.36",
        "os": {
            "name": "Mac OS X",
            "version": "10.11.6"
        },
        "version": "67.0.3396"
    }
}
{
    "message": "{\"activity_id\": 1, \"activity_name\": \"Logon\", \"actor\": {\"process\": {\"file\": {\"name\": \"services.exe\", \"parent_folder\": \"C:\\\\Windows\\\\System32\", \"path\": \"C:\\\\Windows\\\\System32\\\\services.exe\", \"type\": \"Regular File\", \"type_id\": 1}, \"pid\": 848}, \"session\": {\"uid\": \"0x3E7\"}, \"user\": {\"account_type\": \"Windows Account\", \"account_type_id\": 2, \"domain\": \"ATTACKRANGE\", \"name\": \"WIN-DC-725$\", \"uid\": \"NT AUTHORITY\\\\SYSTEM\"}}, \"auth_protocol\": \"Other\", \"auth_protocol_id\": 99, \"category_name\": \"Audit Activity\", \"category_uid\": 3, \"class_name\": \"Authentication\", \"class_uid\": 3002, \"device\": {\"hostname\": \"win-dc-725.attackrange.local\", \"os\": {\"name\": \"Windows\", \"type\": \"Windows\", \"type_id\": 100}, \"type\": \"Unknown\", \"type_id\": 0}, \"dst_endpoint\": {\"hostname\": \"win-dc-725.attackrange.local\"}, \"logon_process\": {\"name\": \"Advapi  \", \"pid\": -1}, \"logon_type\": \"OS Service\", \"logon_type_id\": 5, \"message\": \"An account was successfully logged on.\", \"metadata\": {\"original_time\": \"03/12/2021 10:48:14 AM\", \"product\": {\"feature\": {\"name\": \"Security\"}, \"name\": \"Microsoft Windows\", \"vendor_name\": \"Microsoft\"}, \"profiles\": [\"host\"], \"uid\": \"ce139867-ced1-4742-9bb0-ad1926b8bbe1\", \"version\": \"1.0.0-rc.2\"}, \"session\": {\"uid\": \"0x3E7\", \"uuid\": \"{00000000-0000-0000-0000-000000000000}\"}, \"severity\": \"Informational\", \"severity_id\": 1, \"src_endpoint\": {\"ip\": \"-\", \"name\": \"-\", \"port\": 0}, \"status\": \"Success\", \"status_id\": 1, \"time\": 1615564094000, \"type_name\": \"Authentication: Logon\", \"type_uid\": 300201, \"unmapped\": {\"Detailed Authentication Information\": {\"Key Length\": \"0\", \"Package Name (NTLM only)\": \"-\", \"Transited Services\": \"-\"}, \"EventCode\": \"4624\", \"EventType\": \"0\", \"Impersonation Level\": \"Impersonation\", \"Logon Information\": {\"Elevated Token\": \"Yes\", \"Restricted Admin Mode\": \"-\", \"Virtual Account\": \"No\"}, \"New Logon\": {\"Linked Logon ID\": \"0x0\", \"Network Account Domain\": \"-\", \"Network Account Name\": \"-\"}, \"OpCode\": \"Info\", \"RecordNumber\": \"257879\", \"SourceName\": \"Microsoft Windows security auditing.\", \"TaskCategory\": \"Logon\"}, \"user\": {\"account_type\": \"Windows Account\", \"account_type_id\": 2, \"domain\": \"NT AUTHORITY\", \"name\": \"SYSTEM\", \"uid\": \"NT AUTHORITY\\\\SYSTEM\"}}",
    "event": {
        "action": "logon",
        "category": [
            "authentication"
        ],
        "kind": "event",
        "outcome": "success",
        "reason": "An account was successfully logged on.",
        "severity": 1,
        "type": [
            "info",
            "start"
        ]
    },
    "@timestamp": "2021-03-12T15:48:14Z",
    "destination": {
        "address": "win-dc-725.attackrange.local",
        "domain": "win-dc-725.attackrange.local",
        "subdomain": "win-dc-725.attackrange"
    },
    "file": {
        "directory": "C:\\Windows\\System32",
        "name": "services.exe",
        "path": "C:\\Windows\\System32\\services.exe",
        "type": "Regular File"
    },
    "host": {
        "hostname": "win-dc-725.attackrange.local",
        "name": "win-dc-725.attackrange.local",
        "os": {
            "name": "Windows",
            "type": "Windows"
        },
        "type": "Unknown"
    },
    "ocsf": {
        "activity_id": 1,
        "activity_name": "Logon",
        "class_name": "Authentication",
        "class_uid": 3002
    },
    "process": {
        "pid": 848
    },
    "related": {
        "hosts": [
            "win-dc-725.attackrange.local"
        ],
        "user": [
            "WIN-DC-725$"
        ]
    },
    "source": {
        "port": 0
    },
    "user": {
        "domain": "ATTACKRANGE",
        "id": "NT AUTHORITY\\SYSTEM",
        "name": "WIN-DC-725$",
        "target": {
            "domain": "NT AUTHORITY",
            "id": "NT AUTHORITY\\SYSTEM",
            "name": "SYSTEM"
        }
    }
}
{
    "message": "{\"activity_id\": 1, \"activity_name\": \"Logon\", \"actor\": {\"process\": {\"file\": {\"name\": \"-\", \"path\": \"-\", \"type\": \"Regular File\", \"type_id\": 1}, \"pid\": 0}, \"session\": {\"uid\": \"0x0\"}, \"user\": {\"account_type\": \"Windows Account\", \"account_type_id\": 2, \"domain\": \"-\", \"name\": \"-\", \"uid\": \"NULL SID\"}}, \"auth_protocol\": \"NTLM\", \"auth_protocol_id\": 1, \"category_name\": \"Audit Activity\", \"category_uid\": 3, \"class_name\": \"Authentication\", \"class_uid\": 3002, \"device\": {\"hostname\": \"EC2AMAZ-6KJ2BPP\", \"os\": {\"name\": \"Windows\", \"type\": \"Windows\", \"type_id\": 100}, \"type\": \"Unknown\", \"type_id\": 0}, \"dst_endpoint\": {\"hostname\": \"EC2AMAZ-6KJ2BPP\"}, \"logon_process\": {\"name\": \"NtLmSsp \", \"pid\": -1}, \"logon_type\": \"Network\", \"logon_type_id\": 3, \"message\": \"An account failed to log on.\", \"metadata\": {\"original_time\": \"10/08/2020 12:41:47 PM\", \"product\": {\"feature\": {\"name\": \"Security\"}, \"name\": \"Microsoft Windows\", \"vendor_name\": \"Microsoft\"}, \"profiles\": [\"host\"], \"uid\": \"a738d6e6-4ebd-49bb-805e-45d0604a1bef\", \"version\": \"1.0.0-rc.2\"}, \"severity\": \"Informational\", \"severity_id\": 1, \"src_endpoint\": {\"ip\": \"-\", \"name\": \"EC2AMAZ-6KJ2BPP\", \"port\": 0}, \"status\": \"0xC000006D\", \"status_detail\": \"Unknown user name or bad password.\", \"status_id\": 2, \"time\": 1602175307000, \"type_name\": \"Authentication: Logon\", \"type_uid\": 300201, \"unmapped\": {\"Detailed Authentication Information\": {\"Key Length\": \"0\", \"Package Name (NTLM only)\": \"-\", \"Transited Services\": \"-\"}, \"EventCode\": \"4625\", \"EventType\": \"0\", \"Failure Information\": {\"Sub Status\": \"0xC000006A\"}, \"OpCode\": \"Info\", \"RecordNumber\": \"223742\", \"SourceName\": \"Microsoft Windows security auditing.\", \"TaskCategory\": \"Logon\"}, \"user\": {\"account_type\": \"Windows Account\", \"account_type_id\": 2, \"domain\": \"EC2AMAZ-6KJ2BPP\", \"name\": \"Administrator\", \"uid\": \"NULL SID\"}}",
    "event": {
        "action": "logon",
        "category": [
            "authentication"
        ],
        "kind": "event",
        "outcome": "failure",
        "reason": "An account failed to log on.",
        "severity": 1,
        "type": [
            "info",
            "start"
        ]
    },
    "@timestamp": "2020-10-08T16:41:47Z",
    "destination": {
        "address": "EC2AMAZ-6KJ2BPP",
        "domain": "EC2AMAZ-6KJ2BPP"
    },
    "file": {
        "type": "Regular File"
    },
    "host": {
        "hostname": "EC2AMAZ-6KJ2BPP",
        "name": "EC2AMAZ-6KJ2BPP",
        "os": {
            "name": "Windows",
            "type": "Windows"
        },
        "type": "Unknown"
    },
    "ocsf": {
        "activity_id": 1,
        "activity_name": "Logon",
        "class_name": "Authentication",
        "class_uid": 3002
    },
    "process": {
        "pid": 0
    },
    "related": {
        "hosts": [
            "EC2AMAZ-6KJ2BPP"
        ]
    },
    "source": {
        "port": 0
    },
    "user": {
        "id": "NULL SID",
        "target": {
            "domain": "EC2AMAZ-6KJ2BPP",
            "id": "NULL SID",
            "name": "Administrator"
        }
    }
}
{
    "message": "{\"activity_id\": 2, \"activity_name\": \"Update\", \"category_name\": \"Findings\", \"category_uid\": 2, \"class_name\": \"Compliance Finding\", \"class_uid\": 2003, \"cloud\": {\"account\": {\"uid\": \"111111111111\"}, \"provider\": \"AWS\", \"region\": \"us-east-2\"}, \"compliance\": {\"control\": \"Config.1\", \"requirements\": [\"PCI DSS 10.5.2\", \"PCI DSS 11.5\"], \"standards\": [\"standards/pci-dss/v/3.2.1\"], \"status\": \"FAILED\"}, \"finding_info\": {\"created_time_dt\": \"2023-01-13T15:08:44.967-05:00\", \"desc\": \"This AWS control checks whether AWS Config is enabled in current account and region.\", \"first_seen_time_dt\": \"2023-01-13T15:08:44.967-05:00\", \"last_seen_time_dt\": \"2023-07-21T14:12:05.693-04:00\", \"modified_time_dt\": \"2023-07-21T14:11:53.060-04:00\", \"title\": \"PCI.Config.1 AWS Config should be enabled\", \"types\": [\"Software and Configuration Checks/Industry and Regulatory Standards/PCI-DSS\"], \"uid\": \"arn:aws:securityhub:us-east-2:111111111111:subscription/pci-dss/v/3.2.1/PCI.Config.1/finding/7d619054-6f0d-456b-aa75-23b20f74fae6\"}, \"metadata\": {\"log_version\": \"2018-10-08\", \"processed_time_dt\": \"2023-07-21T14:12:08.489-04:00\", \"product\": {\"feature\": {\"uid\": \"pci-dss/v/3.2.1/PCI.Config.1\"}, \"name\": \"Security Hub\", \"uid\": \"arn:aws:securityhub:us-east-2::product/aws/securityhub\", \"vendor_name\": \"AWS\"}, \"profiles\": [\"cloud\", \"datetime\"], \"version\": \"1.1.0\"}, \"observables\": [{\"name\": \"resource.uid\", \"type\": \"Resource UID\", \"type_id\": 10, \"value\": \"AWS::::Account:111111111111\"}], \"remediation\": {\"desc\": \"For information on how to correct this issue, consult the AWS Security Hub controls documentation.\", \"references\": [\"https://docs.aws.amazon.com/console/securityhub/Config.1/remediation\"]}, \"resource\": {\"cloud_partition\": \"aws\", \"region\": \"us-east-2\", \"type\": \"AwsAccount\", \"uid\": \"AWS::::Account:111111111111\"}, \"severity\": \"Medium\", \"severity_id\": 3, \"status\": \"New\", \"time\": 1689963113060, \"time_dt\": \"2023-07-21T14:11:53.060-04:00\", \"type_name\": \"Compliance Finding: Update\", \"type_uid\": 200302, \"unmapped\": {\"FindingProviderFields.Severity.Label\": \"MEDIUM\", \"FindingProviderFields.Severity.Original\": \"MEDIUM\", \"FindingProviderFields.Types[]\": \"Software and Configuration Checks/Industry and Regulatory Standards/PCI-DSS\", \"ProductFields.ControlId\": \"PCI.Config.1\", \"ProductFields.RecommendationUrl\": \"https://docs.aws.amazon.com/console/securityhub/Config.1/remediation\", \"ProductFields.Resources:0/Id\": \"arn:aws:iam::111111111111:root\", \"ProductFields.StandardsArn\": \"arn:aws:securityhub:::standards/pci-dss/v/3.2.1\", \"ProductFields.StandardsControlArn\": \"arn:aws:securityhub:us-east-2:111111111111:control/pci-dss/v/3.2.1/PCI.Config.1\", \"ProductFields.StandardsSubscriptionArn\": \"arn:aws:securityhub:us-east-2:111111111111:subscription/pci-dss/v/3.2.1\", \"ProductFields.aws/securityhub/CompanyName\": \"AWS\", \"ProductFields.aws/securityhub/FindingId\": \"arn:aws:securityhub:us-east-2::product/aws/securityhub/arn:aws:securityhub:us-east-2:111111111111:subscription/pci-dss/v/3.2.1/PCI.Config.1/finding/7d619054-6f0d-456b-aa75-23b20f74fae6\", \"ProductFields.aws/securityhub/ProductName\": \"Security Hub\", \"RecordState\": \"ACTIVE\", \"Severity.Normalized\": \"40\", \"Severity.Original\": \"MEDIUM\", \"Severity.Product\": \"40\", \"WorkflowState\": \"NEW\"}}",
    "event": {
        "action": "update",
        "category": [
            "vulnerability"
        ],
        "severity": 3,
        "type": [
            "info"
        ]
    },
    "@timestamp": "2023-07-21T18:11:53.060000Z",
    "cloud": {
        "account": {
            "id": "111111111111"
        },
        "provider": "AWS",
        "region": "us-east-2"
    },
    "ocsf": {
        "activity_id": 2,
        "activity_name": "Update",
        "class_name": "Compliance Finding",
        "class_uid": 2003
    }
}
{
    "message": "{\"activity_id\": 1, \"activity_name\": \"Create\", \"category_name\": \"Findings\", \"category_uid\": 2, \"class_name\": \"Detection Finding\", \"class_uid\": 2004, \"cloud\": {\"account\": {\"uid\": \"111111111111\"}, \"provider\": \"AWS\", \"region\": \"us-east-2\"}, \"evidences\": [{\"api\": {\"operation\": \"DeleteTrail\", \"service\": {\"name\": \"cloudtrail.amazonaws.com\"}}, \"data\": \"\", \"src_endpoint\": {\"ip\": \"52.94.133.131\", \"location\": {\"city\": \"\", \"coordinates\": [-100.821999, 37.751], \"country\": \"United States\"}}}], \"finding_info\": {\"created_time_dt\": \"2023-09-19T11:05:22.487-04:00\", \"desc\": \"AWS CloudTrail trail arn:aws:cloudtrail:us-east-2:111111111111:trail/delete-me was disabled by Admin calling DeleteTrail under unusual circumstances. This can be attackers attempt to cover their tracks by eliminating any trace of activity performed while they accessed your account.\", \"first_seen_time_dt\": \"2023-09-19T10:55:09.000-04:00\", \"last_seen_time_dt\": \"2023-09-19T10:55:09.000-04:00\", \"modified_time_dt\": \"2023-09-19T11:05:22.487-04:00\", \"src_url\": \"https://us-east-2.console.aws.amazon.com/guardduty/home?region=us-east-2#/findings?macros=current&fId=a6c556fcbc9bea427a19f8b787099a0b\", \"title\": \"AWS CloudTrail trail arn:aws:cloudtrail:us-east-2:111111111111:trail/delete-me was disabled.\", \"types\": [\"TTPs/Defense Evasion/Stealth:IAMUser-CloudTrailLoggingDisabled\"], \"uid\": \"arn:aws:guardduty:us-east-2:111111111111:detector/1ac1bfceda6679698215d5d0EXAMPLE/finding/a6c556fcbc9bea427a19f8b787099a0b\"}, \"metadata\": {\"extensions\": [{\"name\": \"linux\", \"uid\": \"1\", \"version\": \"1.1.0\"}], \"log_version\": \"2018-10-08\", \"product\": {\"feature\": {\"uid\": \"arn:aws:guardduty:us-east-2:111111111111:detector/1ac1bfceda6679698215d5d0EXAMPLE\"}, \"name\": \"GuardDuty\", \"uid\": \"arn:aws:securityhub:us-east-2::product/aws/guardduty\", \"vendor_name\": \"Amazon\"}, \"profiles\": [\"cloud\", \"datetime\", \"linux\"], \"version\": \"1.1.0\"}, \"observables\": [{\"name\": \"evidences[].src_endpoint.ip\", \"type\": \"IP Address\", \"type_id\": 2, \"value\": \"52.94.133.131\"}, {\"name\": \"resources[].uid\", \"type\": \"Resource UID\", \"type_id\": 10, \"value\": \"AWS::IAM::AccessKey:ASIATMJPC7EXAMPLE\"}], \"resources\": [{\"cloud_partition\": \"aws\", \"data\": \"{\\\"AwsIamAccessKey\\\":{\\\"PrincipalId\\\":\\\"AROATMJPC7YEXAMPLE:example\\\",\\\"PrincipalName\\\":\\\"Admin\\\",\\\"PrincipalType\\\":\\\"AssumedRole\\\"}}\", \"region\": \"us-east-2\", \"type\": \"AwsIamAccessKey\", \"uid\": \"AWS::IAM::AccessKey:ASIATMJPC7EXAMPLE\"}], \"severity\": \"Low\", \"severity_id\": 2, \"status\": \"New\", \"time\": 1695135922487, \"time_dt\": \"2023-09-19T11:05:22.487-04:00\", \"type_name\": \"Detection Finding: Create\", \"type_uid\": 200401, \"unmapped\": {\"FindingProviderFields.Severity.Label\": \"LOW\", \"FindingProviderFields.Types[]\": \"TTPs/Defense Evasion/Stealth:IAMUser-CloudTrailLoggingDisabled\", \"ProductFields.aws/guardduty/service/action/actionType\": \"AWS_API_CALL\", \"ProductFields.aws/guardduty/service/action/awsApiCallAction/affectedResources/AWS::CloudTrail::Trail\": \"arn:aws:cloudtrail:us-east-2:111111111111:trail/delete-me\", \"ProductFields.aws/guardduty/service/action/awsApiCallAction/callerType\": \"Remote IP\", \"ProductFields.aws/guardduty/service/action/awsApiCallAction/remoteIpDetails/organization/asn\": \"16509\", \"ProductFields.aws/guardduty/service/action/awsApiCallAction/remoteIpDetails/organization/asnOrg\": \"AMAZON-02\", \"ProductFields.aws/guardduty/service/action/awsApiCallAction/remoteIpDetails/organization/isp\": \"Amazon Office\", \"ProductFields.aws/guardduty/service/action/awsApiCallAction/remoteIpDetails/organization/org\": \"Amazon Office\", \"ProductFields.aws/guardduty/service/additionalInfo/type\": \"default\", \"ProductFields.aws/guardduty/service/archived\": \"false\", \"ProductFields.aws/guardduty/service/count\": \"1\", \"ProductFields.aws/guardduty/service/detectorId\": \"1ac1bfceda6679698215d5d0EXAMPLE\", \"ProductFields.aws/guardduty/service/eventFirstSeen\": \"2023-09-19T14:55:09.000Z\", \"ProductFields.aws/guardduty/service/eventLastSeen\": \"2023-09-19T14:55:09.000Z\", \"ProductFields.aws/guardduty/service/resourceRole\": \"TARGET\", \"ProductFields.aws/guardduty/service/serviceName\": \"guardduty\", \"ProductFields.aws/securityhub/CompanyName\": \"Amazon\", \"ProductFields.aws/securityhub/FindingId\": \"arn:aws:securityhub:us-east-2::product/aws/guardduty/arn:aws:guardduty:us-east-2:111111111111:detector/1ac1bfceda6679698215d5d0EXAMPLE/finding/a6c556fcbc9bea427a19f8b787099a0b\", \"ProductFields.aws/securityhub/ProductName\": \"GuardDuty\", \"RecordState\": \"ACTIVE\", \"Sample\": \"false\", \"Severity.Normalized\": \"40\", \"Severity.Product\": \"2\", \"WorkflowState\": \"NEW\"}}",
    "event": {
        "action": "create",
        "category": [
            "vulnerability"
        ],
        "severity": 2,
        "type": [
            "info"
        ]
    },
    "@timestamp": "2023-09-19T15:05:22.487000Z",
    "cloud": {
        "account": {
            "id": "111111111111"
        },
        "provider": "AWS",
        "region": "us-east-2"
    },
    "ocsf": {
        "activity_id": 1,
        "activity_name": "Create",
        "class_name": "Detection Finding",
        "class_uid": 2004
    }
}
{
    "message": "{\"metadata\":{\"log_version\":\"2018-10-08\",\"product\":{\"feature\":{\"uid\":\"arn:aws:guardduty:eu-west-3:11111111111:detector/effff3292fef47a8b2941836e434e833\",\"name\":null},\"uid\":\"arn:aws:securityhub:eu-west-3::product/aws/guardduty\",\"name\":\"GuardDuty\",\"vendor_name\":\"Amazon\",\"version\":null},\"processed_time_dt\":1726062303537,\"profiles\":[\"cloud\",\"datetime\",\"linux\"],\"version\":\"1.1.0\",\"extensions\":[{\"name\":\"linux\",\"uid\":\"1\",\"version\":\"1.1.0\"}]},\"time\":1726062281022,\"time_dt\":1726062281022,\"confidence_score\":null,\"message\":null,\"cloud\":{\"account\":{\"uid\":\"11111111111\"},\"region\":\"eu-west-3\",\"provider\":\"AWS\"},\"resource\":null,\"finding_info\":{\"created_time_dt\":1681218428211,\"uid\":\"arn:aws:guardduty:eu-west-3:11111111111:detector/effff3292fef47a8b2941836e434e833/finding/9711517f14c54eb79ad3e3b0cee89e3c\",\"desc\":\"The API DescribeStackEvents was invoked using root credentials from IP address 62.129.18.152.\",\"title\":\"The API DescribeStackEvents was invoked using root credentials.\",\"modified_time_dt\":1726062281022,\"first_seen_time_dt\":1681218080000,\"last_seen_time_dt\":1726061921000,\"related_events\":null,\"types\":[\"TTPs/Policy:IAMUser-RootCredentialUsage\"],\"src_url\":\"https://eu-west-3.console.aws.amazon.com/guardduty/home?region=eu-west-3#/findings?macros=current&fId=9711517f14c54eb79ad3e3b0cee89e3c\"},\"remediation\":null,\"compliance\":null,\"vulnerabilities\":null,\"resources\":[{\"type\":\"AwsIamAccessKey\",\"uid\":\"AWS::IAM::AccessKey:********************\",\"cloud_partition\":\"aws\",\"region\":\"eu-west-3\",\"labels\":null,\"data\":\"{\\\"AwsIamAccessKey\\\":{\\\"PrincipalId\\\":\\\"11111111111\\\",\\\"PrincipalName\\\":\\\"Root\\\",\\\"PrincipalType\\\":\\\"Root\\\"}}\",\"criticality\":null,\"owner\":null}],\"evidences\":[{\"data\":\"\",\"actor\":null,\"process\":null,\"api\":{\"operation\":\"DescribeStackEvents\",\"response\":null,\"service\":{\"name\":\"cloudformation.amazonaws.com\"}},\"src_endpoint\":{\"ip\":\"1.2.3.4\",\"location\":{\"country\":\"France\",\"city\":\"Rennes\",\"coordinates\":[-1.6744,48.110001]},\"port\":null},\"connection_info\":null,\"dst_endpoint\":null,\"query\":null}],\"class_name\":\"Detection Finding\",\"class_uid\":2004,\"category_name\":\"Findings\",\"category_uid\":2,\"severity_id\":2,\"severity\":\"Low\",\"activity_name\":\"Update\",\"activity_id\":2,\"type_uid\":200402,\"type_name\":\"Detection Finding: Update\",\"status\":\"New\",\"accountid\":null,\"region\":null,\"asl_version\":null,\"observables\":[{\"name\":\"resources[].uid\",\"value\":\"AWS::IAM::AccessKey:********************\",\"type\":\"Resource UID\",\"type_id\":10},{\"name\":\"evidences[].src_endpoint.ip\",\"value\":\"1.2.3.4\",\"type\":\"IP Address\",\"type_id\":2}]}\n",
    "event": {
        "action": "update",
        "category": [
            "vulnerability"
        ],
        "severity": 2,
        "type": [
            "info"
        ]
    },
    "@timestamp": "2024-09-11T13:44:41.022000Z",
    "cloud": {
        "account": {
            "id": "11111111111"
        },
        "provider": "AWS",
        "region": "eu-west-3"
    },
    "ocsf": {
        "activity_id": 2,
        "activity_name": "Update",
        "class_name": "Detection Finding",
        "class_uid": 2004
    }
}
{
    "message": "{\"action\": \"Allowed\", \"action_id\": 1, \"activity_id\": 6, \"activity_name\": \"Traffic\", \"answers\": [{\"class\": \"IN\", \"rdata\": \"127.0.0.62\", \"type\": \"A\"}], \"category_name\": \"Network Activity\", \"category_uid\": 4, \"class_name\": \"DNS Activity\", \"class_uid\": 4003, \"cloud\": {\"account\": {\"uid\": \"123456789012\"}, \"provider\": \"AWS\", \"region\": \"us-east-1\"}, \"connection_info\": {\"direction\": \"Unknown\", \"direction_id\": 0, \"protocol_name\": \"UDP\"}, \"disposition\": \"Alert\", \"dst_endpoint\": {\"instance_uid\": \"rslvr-in-0000000000000000\", \"interface_uid\": \"rni-0000000000000000\"}, \"firewall_rule\": {\"uid\": \"rslvr-frg-000000000000000\"}, \"metadata\": {\"product\": {\"feature\": {\"name\": \"Resolver Query Logs\"}, \"name\": \"Route 53\", \"vendor_name\": \"AWS\", \"version\": \"1.100000\"}, \"profiles\": [\"cloud\", \"security_control\", \"datetime\"], \"version\": \"1.1.0\"}, \"observables\": [{\"name\": \"answers[].rdata\", \"type\": \"IP Address\", \"type_id\": 2, \"value\": \"127.0.0.62\"}, {\"name\": \"dst_endpoint.instance_uid\", \"type\": \"Resource UID\", \"type_id\": 10, \"value\": \"rslvr-in-0000000000000000\"}, {\"name\": \"src_endpoint.ip\", \"type\": \"IP Address\", \"type_id\": 2, \"value\": \"10.200.21.100\"}, {\"name\": \"query.hostname\", \"type\": \"Hostname\", \"type_id\": 1, \"value\": \"ip-127-0-0-62.alert.firewall.canary.\"}], \"query\": {\"class\": \"IN\", \"hostname\": \"ip-127-0-0-62.alert.firewall.canary.\", \"type\": \"A\"}, \"rcode\": \"NoError\", \"rcode_id\": 0, \"severity\": \"Informational\", \"severity_id\": 1, \"src_endpoint\": {\"ip\": \"10.200.21.100\", \"port\": 15083, \"vpc_uid\": \"vpc-00000000000000000\"}, \"time\": 1665694956000, \"time_dt\": \"2022-10-13T17:02:36.000-04:00\", \"type_name\": \"DNS Activity: Traffic\", \"type_uid\": 400306, \"unmapped\": {\"firewall_domain_list_id\": \"rslvr-fdl-0000000000000\"}}",
    "event": {
        "action": "traffic",
        "category": [
            "network"
        ],
        "kind": "event",
        "severity": 1,
        "type": [
            "info",
            "protocol"
        ]
    },
    "@timestamp": "2022-10-13T21:02:36Z",
    "cloud": {
        "account": {
            "id": "123456789012"
        },
        "provider": "AWS",
        "region": "us-east-1"
    },
    "dns": {
        "answers": [
            {
                "class": "IN",
                "data": "127.0.0.62",
                "type": "A"
            }
        ],
        "question": {
            "class": [
                "IN"
            ],
            "name": "ip-127-0-0-62.alert.firewall.canary.",
            "subdomain": "ip-127-0-0-62.alert.firewall",
            "type": [
                "A"
            ]
        },
        "response_code": "NoError"
    },
    "network": {
        "direction": [
            "unknown"
        ]
    },
    "ocsf": {
        "activity_id": 6,
        "activity_name": "Traffic",
        "class_name": "DNS Activity",
        "class_uid": 4003
    },
    "related": {
        "hosts": [
            "ip-127-0-0-62.alert.firewall.canary."
        ],
        "ip": [
            "10.200.21.100"
        ]
    },
    "source": {
        "address": "10.200.21.100",
        "ip": "10.200.21.100",
        "port": 15083
    }
}
{
    "message": "{\"metadata\":{\"product\":{\"version\":\"1.100000\",\"name\":\"Route 53\",\"feature\":{\"name\":\"Resolver Query Logs\"},\"vendor_name\":\"AWS\"},\"profiles\":[\"cloud\",\"security_control\",\"datetime\"],\"version\":\"1.1.0\"},\"cloud\":{\"account\":{\"uid\":\"111111111111\"},\"region\":\"eu-west-3\",\"provider\":\"AWS\"},\"src_endpoint\":{\"vpc_uid\":\"vpc-11111111\",\"ip\":\"1.2.3.4\",\"port\":63115,\"instance_uid\":\"i-11111111111111111\"},\"time\":1726088328000,\"time_dt\":1726088328000,\"query\":{\"hostname\":\"_ldap._tcp.dc.example.org.\",\"type\":\"SRV\",\"class\":\"IN\"},\"answers\":null,\"connection_info\":{\"protocol_name\":\"UDP\",\"direction\":\"Unknown\",\"direction_id\":0},\"dst_endpoint\":null,\"firewall_rule\":null,\"severity_id\":1,\"severity\":\"Informational\",\"class_name\":\"DNS Activity\",\"class_uid\":4003,\"category_name\":\"Network Activity\",\"category_uid\":4,\"activity_id\":6,\"activity_name\":\"Traffic\",\"type_uid\":400306,\"type_name\":\"DNS Activity: Traffic\",\"rcode_id\":3,\"rcode\":\"NXDomain\",\"disposition\":\"Unknown\",\"action\":\"Unknown\",\"action_id\":0,\"unmapped\":null,\"accountid\":null,\"region\":null,\"asl_version\":null,\"observables\":[{\"name\":\"src_endpoint.instance_uid\",\"value\":\"i-11111111111111111\",\"type\":\"Resource UID\",\"type_id\":10},{\"name\":\"query.hostname\",\"value\":\"_ldap._tcp.dc.example.org.\",\"type\":\"Hostname\",\"type_id\":1},{\"name\":\"src_endpoint.ip\",\"value\":\"1.2.3.4\",\"type\":\"IP Address\",\"type_id\":2}]}\n",
    "event": {
        "action": "traffic",
        "category": [
            "network"
        ],
        "kind": "event",
        "severity": 1,
        "type": [
            "info",
            "protocol"
        ]
    },
    "@timestamp": "2024-09-11T20:58:48Z",
    "cloud": {
        "account": {
            "id": "111111111111"
        },
        "provider": "AWS",
        "region": "eu-west-3"
    },
    "dns": {
        "question": {
            "class": [
                "IN"
            ],
            "name": "_ldap._tcp.dc.example.org.",
            "registered_domain": "example.org",
            "subdomain": "_ldap._tcp.dc",
            "top_level_domain": "org",
            "type": [
                "SRV"
            ]
        },
        "response_code": "NXDomain"
    },
    "network": {
        "direction": [
            "unknown"
        ]
    },
    "ocsf": {
        "activity_id": 6,
        "activity_name": "Traffic",
        "class_name": "DNS Activity",
        "class_uid": 4003
    },
    "related": {
        "hosts": [
            "_ldap._tcp.dc.example.org."
        ],
        "ip": [
            "1.2.3.4"
        ]
    },
    "source": {
        "address": "1.2.3.4",
        "ip": "1.2.3.4",
        "port": 63115
    }
}
{
    "message": "{\"metadata\":{\"product\":{\"version\":\"1.100000\",\"name\":\"Route 53\",\"feature\":{\"name\":\"Resolver Query Logs\"},\"vendor_name\":\"AWS\"},\"profiles\":[\"cloud\",\"security_control\",\"datetime\"],\"version\":\"1.1.0\"},\"cloud\":{\"account\":{\"uid\":\"111111111111\"},\"region\":\"eu-west-3\",\"provider\":\"AWS\"},\"src_endpoint\":{\"vpc_uid\":\"vpc-11111111\",\"ip\":\"1.2.3.4\",\"port\":62699,\"instance_uid\":\"i-11111111111111111\"},\"time\":1726395887000,\"time_dt\":1726395887000,\"query\":{\"hostname\":\"settings-win.data.microsoft.com.\",\"type\":\"A\",\"class\":\"IN\"},\"answers\":[{\"type\":\"CNAME\",\"rdata\":\"atm-settingsfe-prod-geo2.trafficmanager.net.\",\"class\":\"IN\"},{\"type\":\"CNAME\",\"rdata\":\"settings-prod-weu-2.westeurope.cloudapp.azure.com.\",\"class\":\"IN\"},{\"type\":\"A\",\"rdata\":\"5.6.7.8\",\"class\":\"IN\"}],\"connection_info\":{\"protocol_name\":\"UDP\",\"direction\":\"Unknown\",\"direction_id\":0},\"dst_endpoint\":null,\"firewall_rule\":null,\"severity_id\":1,\"severity\":\"Informational\",\"class_name\":\"DNS Activity\",\"class_uid\":4003,\"category_name\":\"Network Activity\",\"category_uid\":4,\"activity_id\":6,\"activity_name\":\"Traffic\",\"type_uid\":400306,\"type_name\":\"DNS Activity: Traffic\",\"rcode_id\":0,\"rcode\":\"NoError\",\"disposition\":\"Unknown\",\"action\":\"Unknown\",\"action_id\":0,\"unmapped\":null,\"accountid\":null,\"region\":null,\"asl_version\":null,\"observables\":[{\"name\":\"answers[].rdata\",\"value\":\"settings-prod-weu-2.westeurope.cloudapp.azure.com.\",\"type\":\"IP Address\",\"type_id\":2},{\"name\":\"src_endpoint.instance_uid\",\"value\":\"i-11111111111111111\",\"type\":\"Resource UID\",\"type_id\":10},{\"name\":\"answers[].rdata\",\"value\":\"5.6.7.8\",\"type\":\"IP Address\",\"type_id\":2},{\"name\":\"src_endpoint.ip\",\"value\":\"1.2.3.4\",\"type\":\"IP Address\",\"type_id\":2},{\"name\":\"answers[].rdata\",\"value\":\"atm-settingsfe-prod-geo2.trafficmanager.net.\",\"type\":\"IP Address\",\"type_id\":2},{\"name\":\"query.hostname\",\"value\":\"settings-win.data.microsoft.com.\",\"type\":\"Hostname\",\"type_id\":1}]}\n",
    "event": {
        "action": "traffic",
        "category": [
            "network"
        ],
        "kind": "event",
        "severity": 1,
        "type": [
            "info",
            "protocol"
        ]
    },
    "@timestamp": "2024-09-15T10:24:47Z",
    "cloud": {
        "account": {
            "id": "111111111111"
        },
        "provider": "AWS",
        "region": "eu-west-3"
    },
    "dns": {
        "answers": [
            {
                "class": "IN",
                "data": "atm-settingsfe-prod-geo2.trafficmanager.net.",
                "type": "CNAME"
            },
            {
                "class": "IN",
                "data": "settings-prod-weu-2.westeurope.cloudapp.azure.com.",
                "type": "CNAME"
            },
            {
                "class": "IN",
                "data": "5.6.7.8",
                "type": "A"
            }
        ],
        "question": {
            "class": [
                "IN"
            ],
            "name": "settings-win.data.microsoft.com.",
            "registered_domain": "microsoft.com",
            "subdomain": "settings-win.data",
            "top_level_domain": "com",
            "type": [
                "A"
            ]
        },
        "response_code": "NoError"
    },
    "network": {
        "direction": [
            "unknown"
        ]
    },
    "ocsf": {
        "activity_id": 6,
        "activity_name": "Traffic",
        "class_name": "DNS Activity",
        "class_uid": 4003
    },
    "related": {
        "hosts": [
            "settings-win.data.microsoft.com."
        ],
        "ip": [
            "1.2.3.4"
        ]
    },
    "source": {
        "address": "1.2.3.4",
        "ip": "1.2.3.4",
        "port": 62699
    }
}
{
    "message": "{\"activity_id\": 3, \"activity_name\": \"Get\", \"category_name\": \"Network Activitys\", \"category_uid\": 4, \"class_name\": \"HTTP Activity\", \"class_uid\": 4002, \"cloud\": {\"provider\": \"AWS\"}, \"dst_endpoint\": {\"domain\": \"/CanaryTest\"}, \"firewall_rule\": {\"type\": \"RATE_BASED\", \"uid\": \"RateBasedRule\"}, \"http_request\": {\"args\": \"\", \"http_method\": \"GET\", \"uid\": \"Ed0AiHF_CGYF-DA=\", \"url\": {\"path\": \"/CanaryTest\"}, \"version\": \"HTTP/1.1\"}, \"http_response\": {\"code\": 403}, \"metadata\": {\"labels\": null, \"product\": {\"feature\": {\"uid\": \"...\"}, \"name\": \"AWS WAF\", \"vendor_name\": \"AWS\", \"version\": \"1\"}, \"version\": \"1.1.0-dev\"}, \"severity_id\": 1, \"src_endpoint\": {\"ip\": \"52.46.82.45\", \"location\": {\"country\": \"FR\"}, \"svc_name\": \"APIGW\", \"uid\": \"EXAMPLE11:rjvegx5guh:CanaryTest\"}, \"time\": 0, \"type_name\": \"HTTP Activity: Get\", \"type_uid\": 400203, \"unmapped\": [[\"rateBasedRuleList[].rateBasedRuleId\", \"...\"], [\"rateBasedRuleList[].customValues[].value\", \"ella\"], [\"rateBasedRuleList[].customValues[].name\", \"dogname\"], [\"rateBasedRuleList[].limitKey\", \"CUSTOMKEYS\"], [\"rateBasedRuleList[].customValues[].key\", \"HEADER\"], [\"httpRequest.headers[].value\", \"52.46.82.45,https,443,rjvegx5guh.execute-api.eu-west-3.amazonaws.com,Root=1-645566cf-7cb058b04d9bb3ee01dc4036,ella,RateBasedRuleTestKoipOneKeyModulePV2,gzip,deflate\"], [\"rateBasedRuleList[].rateBasedRuleName\", \"RateBasedRule\"], [\"rateBasedRuleList[].maxRateAllowed\", \"100\"], [\"httpRequest.headers[].name\", \"X-Forwarded-For,X-Forwarded-Proto,X-Forwarded-Port,Host,X-Amzn-Trace-Id,dogname,User-Agent,Accept-Encoding\"]]}",
    "event": {
        "action": "get",
        "category": [
            "api"
        ],
        "kind": "event",
        "severity": 1,
        "type": [
            "info"
        ]
    },
    "cloud": {
        "provider": "AWS"
    },
    "destination": {
        "address": "/CanaryTest",
        "domain": "/CanaryTest"
    },
    "http": {
        "request": {
            "id": "Ed0AiHF_CGYF-DA=",
            "method": "GET"
        },
        "version": "HTTP/1.1"
    },
    "network": {
        "application": "APIGW"
    },
    "ocsf": {
        "activity_id": 3,
        "activity_name": "Get",
        "class_name": "HTTP Activity",
        "class_uid": 4002
    },
    "related": {
        "hosts": [
            "/CanaryTest"
        ],
        "ip": [
            "52.46.82.45"
        ]
    },
    "source": {
        "address": "52.46.82.45",
        "geo": {
            "country_iso_code": "FR"
        },
        "ip": "52.46.82.45"
    },
    "url": {
        "path": "/CanaryTest"
    }
}
{
    "message": "{\"cloud\": {\"account_uid\": \"987654321098\", \"region\": \"us-west-2\", \"zone\": \"use2-az2\", \"provider\": \"AWS\"}, \"action\": \"Allowed\", \"action_id\": 1, \"status_code\": \"OK\", \"traffic\": {\"bytes\": 85, \"packets\": 10}, \"src_endpoint\": {\"ip\": \"192.168.1.10\", \"port\": 8080, \"svc_name\": \"amazon-s3\", \"subnet_uid\": \"subnet-33333333333333333\", \"vpc_uid\": \"vpc-44444444444444444\"}, \"dst_endpoint\": {\"ip\": \"192.168.1.20\", \"port\": 443, \"svc_name\": \"amazon-ec2\", \"interface_uid\": \"eni-22222222222222222\", \"instance_uid\": \"i-111111111111111111\"}, \"connection_info\": {\"protocol_num\": 17, \"protocol_ver\": \"IPv6\", \"tcp_flags\": 6, \"direction\": \"egress\", \"direction_id\": 2, \"boundary_id\": 99, \"boundary\": \"vpn\", \"start_time\": 1653200123, \"end_time\": 1653200100}, \"time\": 1653200100, \"type_name\": \"Network Activity: Traffic\", \"type_uid\": 400105, \"activity_id\": 5, \"activity_name\": \"Traffic\", \"class_uid\": 4001, \"class_name\": \"Network Activity\", \"category_uid\": 4, \"category_name\": \"Network Activity\", \"metadata\": {\"product\": {\"name\": \"Amazon VPC\", \"feature\": {\"name\": \"Flowlogs\"}, \"vendor_name\": \"AWS\"}, \"profiles\": [\"cloud\", \"security_control\"], \"version\": \"1.1.0\"}, \"severity_id\": 1, \"severity\": \"Informational\", \"status_id\": 1, \"status\": \"Success\", \"disposition\": \"Allowed\", \"pkt_src_aws_service\": \"amazon-s3\", \"pkt_dst_aws_service\": \"amazon-ec2\", \"sublocation_type\": \"subnet\", \"sublocation_id\": \"subnet-33333333333333333\"}",
    "event": {
        "action": "traffic",
        "category": [
            "network"
        ],
        "kind": "event",
        "outcome": "success",
        "severity": 1,
        "type": [
            "info"
        ]
    },
    "@timestamp": "2022-05-22T06:15:00Z",
    "cloud": {
        "availability_zone": "use2-az2",
        "provider": "AWS",
        "region": "us-west-2"
    },
    "destination": {
        "address": "192.168.1.20",
        "ip": "192.168.1.20",
        "port": 443
    },
    "network": {
        "application": "amazon-ec2",
        "bytes": 85,
        "iana_number": "17",
        "packets": 10
    },
    "ocsf": {
        "activity_id": 5,
        "activity_name": "Traffic",
        "class_name": "Network Activity",
        "class_uid": 4001
    },
    "related": {
        "ip": [
            "192.168.1.10",
            "192.168.1.20"
        ]
    },
    "source": {
        "address": "192.168.1.10",
        "ip": "192.168.1.10",
        "port": 8080
    }
}
{
    "message": "{\"action\": \"Denied\", \"action_id\": 2, \"activity_id\": 5, \"activity_name\": \"Refuse\", \"category_name\": \"Network Activity\", \"category_uid\": 4, \"class_name\": \"Network Activity\", \"class_uid\": 4001, \"cloud\": {\"account\": {\"uid\": \"123456789012\"}, \"provider\": \"AWS\", \"region\": \"us-east-1\", \"zone\": \"use1-az1\"}, \"connection_info\": {\"boundary\": \"-\", \"boundary_id\": 99, \"direction\": \"Inbound\", \"direction_id\": 1, \"protocol_num\": 6, \"protocol_ver\": \"IPv4\", \"tcp_flags\": 2}, \"disposition\": \"Blocked\", \"dst_endpoint\": {\"instance_uid\": \"i-000000000000000000\", \"interface_uid\": \"eni-000000000000000000\", \"ip\": \"172.31.2.52\", \"port\": 39938, \"subnet_uid\": \"subnet-000000000000000000\", \"svc_name\": \"-\", \"vpc_uid\": \"vpc-00000000\"}, \"end_time_dt\": \"2022-04-11T20:03:08.000-04:00\", \"metadata\": {\"product\": {\"feature\": {\"name\": \"Flowlogs\"}, \"name\": \"Amazon VPC\", \"vendor_name\": \"AWS\", \"version\": \"5\"}, \"profiles\": [\"cloud\", \"security_control\", \"datetime\"], \"version\": \"1.1.0\"}, \"observables\": [{\"name\": \"dst_endpoint.ip\", \"type\": \"IP Address\", \"type_id\": 2, \"value\": \"172.31.2.52\"}, {\"name\": \"dst_endpoint.instance_uid\", \"type\": \"Resource UID\", \"type_id\": 10, \"value\": \"i-000000000000000000\"}, {\"name\": \"src_endpoint.ip\", \"type\": \"IP Address\", \"type_id\": 2, \"value\": \"1.2.3.4\"}], \"severity\": \"Informational\", \"severity_id\": 1, \"src_endpoint\": {\"ip\": \"1.2.3.4\", \"port\": 56858, \"svc_name\": \"-\"}, \"start_time_dt\": \"2022-04-11T20:02:12.000-04:00\", \"status_code\": \"OK\", \"time\": 1649721732000, \"time_dt\": \"2022-04-11T20:02:12.000-04:00\", \"traffic\": {\"bytes\": 40, \"packets\": 1}, \"type_name\": \"Network Activity: Refuse\", \"type_uid\": 400105, \"unmapped\": {\"sublocation_id\": \"-\", \"sublocation_type\": \"-\"}}",
    "event": {
        "action": "refuse",
        "category": [
            "network"
        ],
        "end": "2022-04-12T00:03:08Z",
        "kind": "event",
        "severity": 1,
        "start": "2022-04-12T00:02:12Z",
        "type": [
            "denied",
            "info"
        ]
    },
    "@timestamp": "2022-04-12T00:02:12Z",
    "cloud": {
        "account": {
            "id": "123456789012"
        },
        "availability_zone": "use1-az1",
        "provider": "AWS",
        "region": "us-east-1"
    },
    "destination": {
        "address": "172.31.2.52",
        "ip": "172.31.2.52",
        "port": 39938
    },
    "network": {
        "bytes": 40,
        "direction": [
            "inbound"
        ],
        "iana_number": "6",
        "packets": 1
    },
    "ocsf": {
        "activity_id": 5,
        "activity_name": "Refuse",
        "class_name": "Network Activity",
        "class_uid": 4001
    },
    "related": {
        "ip": [
            "1.2.3.4",
            "172.31.2.52"
        ]
    },
    "source": {
        "address": "1.2.3.4",
        "ip": "1.2.3.4",
        "port": 56858
    }
}
{
    "message": "{\"activity_name\": \"Traffic\", \"activity_id\": 6, \"category_name\": \"Network Activity\", \"category_uid\": 4, \"class_name\": \"Network Activity\", \"class_uid\": 4001, \"type_uid\": 400106, \"type_name\": \"Network Activity: Traffic\", \"severity_id\": 1, \"severity\": \"Informational\", \"start_time\": \"2015/06/17T00:00:00.083\", \"end_time\": \"2015/06/17T00:00:00.089\", \"duration\": 0.006, \"metadata\": {\"product\": {\"version\": \"3.9.0\", \"name\": \"SiLK\", \"feature\": {\"name\": \" Network Flow Data\"}, \"vendor_name\": \"CERT/NetSA at Carnegie Mellon University - Software Engineering Institute\"}, \"version\": \"1.0.0-rc.3\"}, \"src_endpoint\": {\"port\": 63975, \"ip\": \"192.168.40.20\"}, \"dst_endpoint\": {\"port\": 443, \"ip\": \"10.0.40.21\"}, \"connection_info\": {\"protocol_num\": 6, \"tcp_flags\": 19, \"boundary_id\": 99, \"boundary\": \"Other\", \"direction_id\": 2, \"direction\": \"Outbound\"}, \"traffic\": {\"packets\": 8, \"bytes\": 344}, \"unmapped\": {\"sensor\": \"S1\", \"in\": 0, \"out\": 0, \"nhIP\": \"0.0.0.0\", \"initialFlags\": \"\", \"sessionFlags\": \"\", \"attributes\": \"\", \"application\": 0, \"class\": \"all\", \"type\": \"outweb\", \"iType\": \"\", \"iCode\": \"\"}}",
    "event": {
        "action": "traffic",
        "category": [
            "network"
        ],
        "duration": 6000.0,
        "end": "2015-06-17T00:00:00.089000Z",
        "kind": "event",
        "severity": 1,
        "start": "2015-06-17T00:00:00.083000Z",
        "type": [
            "info"
        ]
    },
    "destination": {
        "address": "10.0.40.21",
        "ip": "10.0.40.21",
        "port": 443
    },
    "network": {
        "bytes": 344,
        "direction": [
            "outbound"
        ],
        "iana_number": "6",
        "packets": 8
    },
    "ocsf": {
        "activity_id": 6,
        "activity_name": "Traffic",
        "class_name": "Network Activity",
        "class_uid": 4001
    },
    "related": {
        "ip": [
            "10.0.40.21",
            "192.168.40.20"
        ]
    },
    "source": {
        "address": "192.168.40.20",
        "ip": "192.168.40.20",
        "port": 63975
    }
}
{
    "message": "{\"time\": 1591367999.305988, \"uuid\": \"CMdzit1AMNsmfAIiQc\", \"src_endpoint\": {\"ip\": \"192.168.4.76\", \"port\": 36844}, \"dst_endpoint\": {\"ip\": \"192.168.4.1\", \"port\": 53}, \"connection_info\": {\"protocol_name\": \"udp\"}, \"bytes_in\": 62, \"packets_in\": 2, \"orig_bytes\": {\"ip\": 118}, \"bytes_out\": 141, \"packets_out\": 2, \"resp_bytes\": {\"ip\": 197}, \"duration\": 0.06685185432434082, \"unmapped\": {\"conn_state\": \"SF\"}, \"category_uid\": 4, \"category_name\": \"Network Activity\", \"class_uid\": 4001, \"class_name\": \"Network Activity\", \"metadata\": {\"profiles\": [\"security_control\"], \"product\": {\"name\": \"Zeek\", \"feature\": {\"name\": \"conn.log\"}, \"vendor_name\": \"Zeek\"}}, \"severity\": \"Informational\", \"severity_id\": 1, \"proposed_new_attributes\": {\"application_protocol\": \"dns\", \"bytes_missed\": 0, \"connection_history\": \"Dd\"}}",
    "event": {
        "category": [
            "network"
        ],
        "duration": 66851.85432434082,
        "kind": "event",
        "severity": 1,
        "type": [
            "info"
        ]
    },
    "@timestamp": "2020-06-05T14:39:59.305988Z",
    "destination": {
        "address": "192.168.4.1",
        "ip": "192.168.4.1",
        "port": 53
    },
    "ocsf": {
        "class_name": "Network Activity",
        "class_uid": 4001
    },
    "related": {
        "ip": [
            "192.168.4.1",
            "192.168.4.76"
        ]
    },
    "source": {
        "address": "192.168.4.76",
        "ip": "192.168.4.76",
        "port": 36844
    }
}
{
    "message": "{\"time\": 1591367999.305988, \"uuid\": \"CMdzit1AMNsmfAIiQc\", \"src_endpoint\": {\"ip\": \"192.168.4.76\", \"port\": 36844}, \"dst_endpoint\": {\"ip\": \"192.168.4.1\", \"port\": 53}, \"connection_info\": {\"protocol_name\": \"udp\"}, \"bytes_in\": 62, \"packets_in\": 2, \"orig_bytes\": {\"ip\": 118}, \"bytes_out\": 141, \"packets_out\": 2, \"resp_bytes\": {\"ip\": 197}, \"duration\": 0.06685185432434082, \"unmapped\": {\"conn_state\": \"SF\"}, \"category_uid\": 4, \"category_name\": \"Network Activity\", \"class_uid\": 4001, \"class_name\": \"Network Activity\", \"metadata\": {\"profiles\": [\"security_control\"], \"product\": {\"name\": \"Zeek\", \"feature\": {\"name\": \"conn.log\"}, \"vendor_name\": \"Zeek\"}}, \"severity\": \"Informational\", \"severity_id\": 1, \"proposed_new_attributes\": {\"application_protocol\": \"dns\", \"bytes_missed\": 0, \"connection_history\": \"Dd\"}}",
    "event": {
        "category": [
            "network"
        ],
        "duration": 66851.85432434082,
        "kind": "event",
        "severity": 1,
        "type": [
            "info"
        ]
    },
    "@timestamp": "2020-06-05T14:39:59.305988Z",
    "destination": {
        "address": "192.168.4.1",
        "ip": "192.168.4.1",
        "port": 53
    },
    "ocsf": {
        "class_name": "Network Activity",
        "class_uid": 4001
    },
    "related": {
        "ip": [
            "192.168.4.1",
            "192.168.4.76"
        ]
    },
    "source": {
        "address": "192.168.4.76",
        "ip": "192.168.4.76",
        "port": 36844
    }
}
{
    "message": "{\"time\": 1598377391.921726, \"uuid\": \"CsukF91Bx9mrqdEaH9\", \"src_endpoint\": {\"ip\": \"192.168.4.49\", \"port\": 56718}, \"dst_endpoint\": {\"ip\": \"13.32.202.10\", \"port\": 443}, \"version\": \"TLSv12\", \"cipher\": \"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\", \"certificate\": \"secp256r1\", \"domain\": \"www.taosecurity.com\", \"certificate_chain\": [\"F2XEvj1CahhdhtfvT4\", \"FZ7ygD3ERPfEVVohG9\", \"F7vklpOKI4yX9wmvh\", \"FAnbnR32nIIr2j9XV\"], \"subject\": \"CN=www.taosecurity.com\", \"issuer\": \"CN=Amazon,OU=Server CA 1B,O=Amazon,C=US\", \"unmapped\": {\"next_protocol\": \"h2\", \"resumed\": false}, \"network_activity\": {\"status_id\": \"1\"}, \"category_uid\": 4, \"category_name\": \"Network Activity\", \"class_uid\": 4001, \"class_name\": \"Network Activity\", \"metadata\": {\"profiles\": [\"security_control\"], \"product\": {\"name\": \"Zeek\", \"feature\": {\"name\": \"ssl.log\"}, \"vendor_name\": \"Zeek\"}}, \"severity\": \"Informational\", \"severity_id\": 1}",
    "event": {
        "category": [
            "network"
        ],
        "kind": "event",
        "severity": 1,
        "type": [
            "info"
        ]
    },
    "@timestamp": "2020-08-25T17:43:11.921726Z",
    "destination": {
        "address": "13.32.202.10",
        "ip": "13.32.202.10",
        "port": 443
    },
    "ocsf": {
        "class_name": "Network Activity",
        "class_uid": 4001
    },
    "related": {
        "ip": [
            "13.32.202.10",
            "192.168.4.49"
        ]
    },
    "source": {
        "address": "192.168.4.49",
        "ip": "192.168.4.49",
        "port": 56718
    },
    "tls": {
        "server": {
            "certificate_chain": [
                "F2XEvj1CahhdhtfvT4",
                "F7vklpOKI4yX9wmvh",
                "FAnbnR32nIIr2j9XV",
                "FZ7ygD3ERPfEVVohG9"
            ]
        }
    }
}
{
    "message": "{\"activity_id\": 1, \"activity_name\": \"Launch\", \"actor\": {\"process\": {\"file\": {\"name\": \"cmd.exe\", \"parent_folder\": \"C:\\\\Windows\\\\System32\", \"path\": \"C:\\\\Windows\\\\System32\\\\cmd.exe\", \"type\": \"Regular File\", \"type_id\": 1}, \"pid\": 3948}, \"session\": {\"uid\": \"0x55E621\"}, \"user\": {\"account_type\": \"Windows Account\", \"account_type_id\": 2, \"domain\": \"ATTACKRANGE\", \"name\": \"Administrator\", \"uid\": \"ATTACKRANGE\\\\Administrator\"}}, \"category_name\": \"System Activity\", \"category_uid\": 1, \"class_name\": \"Process Activity\", \"class_uid\": 1007, \"device\": {\"hostname\": \"win-dc-725.attackrange.local\", \"os\": {\"name\": \"Windows\", \"type\": \"Windows\", \"type_id\": 100}, \"type\": \"Unknown\", \"type_id\": 0}, \"message\": \"A new process has been created.\", \"metadata\": {\"original_time\": \"03/12/2021 10:48:14 AM\", \"product\": {\"feature\": {\"name\": \"Security\"}, \"name\": \"Microsoft Windows\", \"vendor_name\": \"Microsoft\"}, \"profiles\": [\"host\"], \"uid\": \"a47bd2fb-4da1-4378-8961-81f81f90aec2\", \"version\": \"1.0.0-rc.2\"}, \"process\": {\"cmd_line\": \"reg  save HKLM\\\\system C:\\\\Users\\\\ADMINI~1\\\\AppData\\\\Local\\\\Temp\\\\system \", \"file\": {\"name\": \"reg.exe\", \"parent_folder\": \"C:\\\\Windows\\\\System32\", \"path\": \"C:\\\\Windows\\\\System32\\\\reg.exe\", \"type\": \"Regular File\", \"type_id\": 1}, \"pid\": 4696, \"session\": {\"uid\": \"0x0\"}, \"user\": {\"domain\": \"-\", \"name\": \"-\", \"uid\": \"NULL SID\"}}, \"severity\": \"Informational\", \"severity_id\": 1, \"status\": \"Success\", \"status_id\": 1, \"time\": 1615564094000, \"type_name\": \"Process Activity: Launch\", \"type_uid\": 100701, \"unmapped\": {\"EventCode\": \"4688\", \"EventType\": \"0\", \"OpCode\": \"Info\", \"Process Information\": {\"Mandatory Label\": \"Mandatory Label\\\\High Mandatory Level\", \"Token Elevation Type\": \"%%1936\"}, \"RecordNumber\": \"257874\", \"SourceName\": \"Microsoft Windows security auditing.\", \"TaskCategory\": \"Process Creation\"}}",
    "event": {
        "action": "launch",
        "category": [
            "process"
        ],
        "kind": "event",
        "outcome": "success",
        "reason": "A new process has been created.",
        "severity": 1,
        "type": [
            "info",
            "start"
        ]
    },
    "@timestamp": "2021-03-12T15:48:14Z",
    "file": {
        "directory": "C:\\Windows\\System32",
        "name": "reg.exe",
        "path": "C:\\Windows\\System32\\reg.exe",
        "type": "Regular File"
    },
    "host": {
        "hostname": "win-dc-725.attackrange.local",
        "name": "win-dc-725.attackrange.local",
        "os": {
            "name": "Windows",
            "type": "Windows"
        },
        "type": "Unknown"
    },
    "ocsf": {
        "activity_id": 1,
        "activity_name": "Launch",
        "class_name": "Process Activity",
        "class_uid": 1007
    },
    "process": {
        "command_line": "reg  save HKLM\\system C:\\Users\\ADMINI~1\\AppData\\Local\\Temp\\system ",
        "pid": 4696,
        "user": {
            "id": [
                "NULL SID"
            ]
        }
    },
    "related": {
        "hosts": [
            "win-dc-725.attackrange.local"
        ],
        "user": [
            "Administrator"
        ]
    },
    "user": {
        "domain": "ATTACKRANGE",
        "id": "ATTACKRANGE\\Administrator",
        "name": "Administrator"
    }
}
{
    "message": "{\"activity_id\": 2, \"activity_name\": \"Terminate\", \"actor\": {\"process\": {\"file\": {\"name\": \"auditon.exe\", \"parent_folder\": \"C:\\\\Generate_Security_Events1\", \"path\": \"C:\\\\Generate_Security_Events1\\\\auditon.exe\", \"type\": \"Regular File\", \"type_id\": 1}, \"pid\": 1524}, \"session\": {\"uid\": \"0x1806d9\"}, \"user\": {\"account_type\": \"Windows Account\", \"account_type_id\": 2, \"domain\": \"LOGISTICS\", \"name\": \"Administrator\", \"uid\": \"S-1-5-21-1135140816-2109348461-2107143693-500\"}}, \"category_name\": \"System Activity\", \"category_uid\": 1, \"class_name\": \"Process Activity\", \"class_uid\": 1007, \"device\": {\"hostname\": \"dcc1.Logistics.local\", \"os\": {\"name\": \"Windows\", \"type\": \"Windows\", \"type_id\": 100}, \"type\": \"Unknown\", \"type_id\": 0}, \"exit_code\": 0, \"message\": \"A process has exited.\", \"metadata\": {\"original_time\": \"09/05/2019 11:22:49 AM\", \"product\": {\"feature\": {\"name\": \"Security\"}, \"name\": \"Microsoft Windows\", \"vendor_name\": \"Microsoft\"}, \"profiles\": [\"host\"], \"uid\": \"cc27b41c-94e0-48a9-8cc2-5a1598fb8d1f\", \"version\": \"1.0.0-rc.2\"}, \"process\": {\"file\": {\"name\": \"auditon.exe\", \"parent_folder\": \"C:\\\\Generate_Security_Events1\", \"path\": \"C:\\\\Generate_Security_Events1\\\\auditon.exe\", \"type\": \"Regular File\", \"type_id\": 1}, \"pid\": 1524}, \"severity\": \"Informational\", \"severity_id\": 1, \"status\": \"Success\", \"status_id\": 1, \"time\": 1567696969000, \"type_name\": \"Process Activity: Terminate\", \"type_uid\": 100702, \"unmapped\": {\"EventCode\": \"4689\", \"EventType\": \"0\", \"OpCode\": \"Info\", \"RecordNumber\": \"6828379\", \"SourceName\": \"Microsoft Windows security auditing.\", \"TaskCategory\": \"Process Termination\"}}",
    "event": {
        "action": "terminate",
        "category": [
            "process"
        ],
        "kind": "event",
        "outcome": "success",
        "reason": "A process has exited.",
        "severity": 1,
        "type": [
            "end",
            "info"
        ]
    },
    "@timestamp": "2019-09-05T15:22:49Z",
    "file": {
        "directory": "C:\\Generate_Security_Events1",
        "name": "auditon.exe",
        "path": "C:\\Generate_Security_Events1\\auditon.exe",
        "type": "Regular File"
    },
    "host": {
        "hostname": "dcc1.Logistics.local",
        "name": "dcc1.Logistics.local",
        "os": {
            "name": "Windows",
            "type": "Windows"
        },
        "type": "Unknown"
    },
    "ocsf": {
        "activity_id": 2,
        "activity_name": "Terminate",
        "class_name": "Process Activity",
        "class_uid": 1007
    },
    "process": {
        "exit_code": 0,
        "pid": 1524
    },
    "related": {
        "hosts": [
            "dcc1.Logistics.local"
        ],
        "user": [
            "Administrator"
        ]
    },
    "user": {
        "domain": "LOGISTICS",
        "id": "S-1-5-21-1135140816-2109348461-2107143693-500",
        "name": "Administrator"
    }
}
{
    "message": "{\"activity_id\": 1, \"activity_name\": \"Generate\", \"category_name\": \"Findings\", \"category_uid\": 2, \"classname\": \"Security Finding\", \"class_uid\": 2001, \"finding\": {\"created_time\": 1672758699558, \"desc\": \"Linux Kernel Module injection using insmod detected (user=%user.name user_loginuid=%user.loginuid parent_process=%proc.pname module=%proc.args %container.info image=%container.image.repository:%container.image.tag)\", \"title\": \"Linux Kernel Module Injection Detected\", \"types\": [\"syscalls\"], \"uid\": \"ec834826-90c1-458a-8eec-a014e7266754\"}, \"message\": \"Linux Kernel Module Injection Detected\", \"metadata\": {\"version\": \"0.1.0\", \"product\": {\"vendor_name\": \"Falcosecurity\", \"name\": \"Falco\"}, \"labels\": [\"process\"]}, \"observables\": [{\"name\": \"hostname\", \"type\": \"Other\", \"type_id\": 0, \"value\": \"host0.local\"}, {\"name\": \"proc.pname\", \"type\": \"Other\", \"type_id\": 0, \"value\": \"proc.pname\"}, {\"name\": \"container.info\", \"type\": \"Other\", \"type_id\": 0, \"value\": \"container.info\"}, {\"name\": \"proc.args\", \"type\": \"Other\", \"type_id\": 0, \"value\": \"proc.args\"}, {\"name\": \"user.loginuid\", \"type\": \"Other\", \"type_id\": 0, \"value\": \"user.loginuid\"}, {\"name\": \"user.name\", \"type\": \"Other\", \"type_id\": 0, \"value\": \"user.name\"}, {\"name\": \"container.image.repository\", \"type\": \"Other\", \"type_id\": 0, \"value\": \"container.image.repository\"}, {\"name\": \"container.image.tag\", \"type\": \"Other\", \"type_id\": 0, \"value\": \"container.image.tag\"}], \"raw_data\": \"{\\\"uuid\\\":\\\"ec834826-90c1-458a-8eec-a014e7266754\\\",\\\"output\\\":\\\"Linux Kernel Module injection using insmod detected (user=%user.name user_loginuid=%user.loginuid parent_process=%proc.pname module=%proc.args %container.info image=%container.image.repository:%container.image.tag)\\\",\\\"priority\\\":\\\"Warning\\\",\\\"rule\\\":\\\"Linux Kernel Module Injection Detected\\\",\\\"time\\\":\\\"2023-01-03T15:11:39.558068644Z\\\",\\\"output_fields\\\":{\\\"akey\\\":\\\"AValue\\\",\\\"bkey\\\":\\\"BValue\\\",\\\"ckey\\\":\\\"CValue\\\",\\\"container.image.repository\\\":\\\"container.image.repository\\\",\\\"container.image.tag\\\":\\\"container.image.tag\\\",\\\"container.info\\\":\\\"container.info\\\",\\\"dkey\\\":\\\"bar\\\",\\\"proc.args\\\":\\\"proc.args\\\",\\\"proc.pname\\\":\\\"proc.pname\\\",\\\"user.loginuid\\\":\\\"user.loginuid\\\",\\\"user.name\\\":\\\"user.name\\\"},\\\"source\\\":\\\"syscalls\\\",\\\"tags\\\":[\\\"process\\\"],\\\"hostname\\\":\\\"host0.local\\\"}\", \"severity\": \"Medium\", \"severity_id\": 3, \"state\": \"New\", \"state_id\": 1, \"status\": \"Warning\", \"time\": 1672758699558, \"type_name\": \"Security Finding: Generate\", \"type_uid\": 200101}",
    "event": {
        "action": "generate",
        "category": [],
        "kind": "alert",
        "reason": "Linux Kernel Module Injection Detected",
        "severity": 3,
        "type": [
            "info"
        ]
    },
    "@timestamp": "2023-01-03T15:11:39.558000Z",
    "ocsf": {
        "activity_id": 1,
        "activity_name": "Generate",
        "class_uid": 2001
    }
}
{
    "message": "{\"analytic\": {\"desc\": \"Custom Rule Engine\", \"name\": \"CRE\", \"relatedAnalytics\": [{\"category\": \"CRE_RULE\", \"name\": \"Network DoS Attack Detected\", \"type\": \"Rule\", \"typeId\": 1, \"uid\": \"100079\"}], \"type\": \"Rule\", \"typeId\": 1}, \"finding\": {\"uid\": \"591\", \"title\": \"BLEEDING-EDGE DOS -ISC- ICMP blind TCP reset DoS guessing attempt\\n\", \"created_time\": 1682347463218, \"desc\": \"BLEEDING-EDGE DOS -ISC- ICMP blind TCP reset DoS guessing attempt\\n\", \"first_seen_time\": 1682347463000, \"last_seen_time\": 1682781010000}, \"confidence_score\": 2, \"confidence\": \"Low\", \"confidence_id\": 2, \"data_sources\": [\"Snort @ wolverine\"], \"impact_score\": 0, \"impact\": \"Low\", \"impact_id\": 1, \"malware\": [{\"classification_ids\": [5], \"classifications\": [\"DDOS\"], \"name\": \"ICMP DoS\"}], \"risk_level\": \"High\", \"risk_level_id\": 3, \"risk_score\": 3, \"state\": \"In Progress\", \"state_id\": 2, \"activity_id\": 1, \"category_uid\": 2, \"class_uid\": 2001, \"time\": 1682347463218, \"message\": \"BLEEDING-EDGE DOS -ISC- ICMP blind TCP reset DoS guessing attempt\\n\", \"metadata\": {\"log_name\": \"Offense\", \"log_provider\": \"IBM QRadar\", \"original_time\": 1682347463218, \"product\": {\"lang\": \"en\", \"name\": \"QRadar SIEM\", \"version\": \"7.5.0\", \"vendor_name\": \"IBM\"}, \"version\": \"7.5.0\", \"modified_time\": 1682347469220}, \"activity_name\": \"Create\", \"category_name\": \"Findings\", \"class_name\": \"Security Finding\", \"count\": 2, \"end_time\": 1682781010000, \"enrichments\": [{\"name\": \"Magnitude\", \"provider\": \"Event Processor\", \"type\": \"score\", \"value\": \"3\"}, {\"name\": \"offense_type\", \"provider\": \"Event Processor\", \"type\": \"correlation\", \"value\": \"2\"}, {\"name\": \"offense_source\", \"provider\": \"Event Processor\", \"type\": \"correlation\", \"value\": \"BLEEDING-EDGE DOS -ISC- ICMP blind TCP reset DoS guessing attempt\"}, {\"name\": \"category_count\", \"provider\": \"Event Processor\", \"type\": \"counter\", \"value\": \"1\"}, {\"name\": \"device_count\", \"provider\": \"Event Processor\", \"type\": \"counter\", \"value\": \"1\"}, {\"name\": \"event_count\", \"provider\": \"Event Processor\", \"type\": \"counter\", \"value\": \"2\"}, {\"name\": \"flow_count\", \"provider\": \"Event Processor\", \"type\": \"counter\", \"value\": \"0\"}, {\"name\": \"policy_category_count\", \"provider\": \"Event Processor\", \"type\": \"counter\", \"value\": \"0\"}, {\"name\": \"remote_destination_count\", \"provider\": \"Event Processor\", \"type\": \"counter\", \"value\": \"0\"}, {\"name\": \"local_destination_count\", \"provider\": \"Event Processor\", \"type\": \"counter\", \"value\": \"2\"}, {\"name\": \"security_category_count\", \"provider\": \"Event Processor\", \"type\": \"counter\", \"value\": \"1\"}, {\"name\": \"source_count\", \"provider\": \"Event Processor\", \"type\": \"counter\", \"value\": \"1\"}, {\"name\": \"user_name_count\", \"provider\": \"Event Processor\", \"type\": \"counter\", \"value\": \"0\"}, {\"name\": \"domain_id\", \"provider\": \"Event Processor\", \"type\": \"correlation\", \"value\": \"0\"}, {\"name\": \"source_network\", \"provider\": \"Event Processor\", \"type\": \"network\", \"value\": \"Net-99-99-99.Net_99_0_0_0\"}, {\"name\": \"destination_network\", \"provider\": \"Event Processor\", \"type\": \"network\", \"value\": \"Net-88-88-88.Net_88_88_0_0\"}, {\"name\": \"destination_network\", \"provider\": \"Event Processor\", \"type\": \"network\", \"value\": \"Net-77-77-77.Net_77_0_0_0\"}], \"observables\": [{\"name\": \"log_source_id\", \"type\": \"Other\", \"type_id\": 99, \"value\": \"112\"}, {\"name\": \"log_source_name\", \"type\": \"Other\", \"type_id\": 99, \"value\": \"Snort @ wolverine\"}, {\"name\": \"log_source_type_id\", \"type\": \"Other\", \"type_id\": 99, \"value\": \"2\"}, {\"name\": \"log_source_type_name\", \"type\": \"Other\", \"type_id\": 99, \"value\": \"Snort\"}, {\"name\": \"assigned_to\", \"type\": \"User\", \"type_id\": 21, \"value\": \"SomeUser\"}, {\"name\": \"low_level_category\", \"type\": \"Other\", \"type_id\": 99, \"value\": \"ICMP DoS\"}, {\"name\": \"source_address\", \"type\": \"IP Address\", \"type_id\": 2, \"value\": \"99.99.99.99\"}, {\"name\": \"local_destination_address\", \"type\": \"IP Address\", \"type_id\": 2, \"value\": \"88.88.88.88\"}, {\"name\": \"local_destination_address\", \"type\": \"IP Address\", \"type_id\": 2, \"value\": \"77.77.77.77\"}], \"status_code\": \"OPEN\"}",
    "event": {
        "action": "create",
        "category": [
            "malware"
        ],
        "end": "2023-04-29T15:10:10Z",
        "kind": "alert",
        "provider": "IBM QRadar",
        "reason": "BLEEDING-EDGE DOS -ISC- ICMP blind TCP reset DoS guessing attempt\n",
        "risk_score": 3,
        "type": [
            "info"
        ]
    },
    "@timestamp": "2023-04-24T14:44:23.218000Z",
    "ocsf": {
        "activity_id": 1,
        "activity_name": "Create",
        "class_name": "Security Finding",
        "class_uid": 2001
    },
    "vulnerability": {
        "category": [
            "DDOS"
        ]
    }
}
{
    "message": "{\"activity_id\": 1, \"malware\": [{\"classification_ids\": [-1], \"classifications\": [\"Potentially vulnerable application\"], \"name\": \"pva.torrent.openinternet\", \"provider\": \"SecurityScorecard\", \"uid\": \"pva.torrent.openinternet_9d153be3-a48e-4498-b476-18c2a847d214\"}], \"activity_name\": \"Generate\", \"category_name\": \"Findings\", \"category_uid\": 2, \"class_name\": \"Security Finding\", \"class_uid\": 2001, \"confidence\": 100, \"data\": \"{\\\"body_bytes_sent\\\":\\\"-\\\",\\\"enc_host\\\":\\\"open-internet.nl\\\",\\\"enc_raw_header\\\":\\\"-\\\",\\\"enc_request\\\":\\\"SOCKET_UDP%20%2F\\\",\\\"enc_request_body\\\":\\\"AAAEFycQGYAAAAAAiWPgag==\\\",\\\"family\\\":\\\"pva.torrent.openinternet\\\",\\\"field_1\\\":\\\"2022-06-27T01:37:06.385325  version_5\\\",\\\"remote_addr\\\":\\\"1.183.190.110\\\",\\\"remote_port\\\":\\\"2048\\\",\\\"remote_user\\\":\\\"-\\\", \\\"status\\\":\\\"200\\\",\\\"time_local\\\":\\\"2022-06-27T01:36:21.515207\\\"}\", \"message\": \"Potentially vulnerable application infection detected on IP address 1.183.190.110 by Malware DNS sinkhole on communication domain for sinkholed domain open-internet.nl\", \"severity\": \"Informational \", \"severity_id\": 1, \"status\": \"Not applicable, static security finding from global threat intelligence monitoring\", \"status_id\": -1, \"state\": \"New\", \"state_id\": 1, \"time\": 1668535199945, \"timezone_offset\": 0, \"type_name\": \"Security Finding: Generate\", \"type_uid\": 200101, \"metadata\": {\"logged_time\": 1668535199945, \"original_time\": \"2022-11-15T17:59:59.945Z\", \"labels\": [\"infected_device\"], \"product\": {\"lang\": \"en\", \"name\": \"SecurityScorecard Attack Surface Intelligence\", \"uid\": \"ssc_asi\", \"feature\": {\"uid\": \"ssc_malware_dns_sinkhole\", \"name\": \"SecurityScorecard Malware DNS Sinkhole collection system\"}, \"vendor_name\": \"SecurityScorecard\"}, \"version\": \"1.0.0\", \"profiles\": [\"malware\", \"reputation\"]}, \"resources\": [{\"group_name\": \"infected_device\", \"name\": \"IPv4 address 1.183.190.110 of device in SecurityScorecard DNS sinkhole malware, adware, or potentially unwanted/vulnerable collection logs\", \"owner\": \"chinatelecom.cn\", \"uid\": \"1.183.190.110\"}], \"observables\": [{\"name\": \"infected_device.ip\", \"type\": \"IP Address\", \"type_id\": 2, \"value\": \"1.183.190.110\"}, {\"name\": \"infection.category\", \"type\": \"Category of infection on infected device\", \"type_id\": -1, \"value\": \"Potentially vulnerable application\"}, {\"name\": \"infected_device.malware_hostname\", \"type\": \"Hostname\", \"type_id\": 1, \"value\": \"open-internet.nl\"}, {\"name\": \"infection.family\", \"type\": \"Malware, adware, or PUA/PVA family name\", \"type_id\": -1, \"value\": \"pva.torrent.openinternet\"}, {\"name\": \"infected_device.source_port\", \"type\": \"Client-side port making connection to the infection communication domain\", \"type_id\": -1, \"value\": \"2048\"}, {\"name\": \"infected_device.geo_location\", \"type\": \"Geo Location\", \"type_id\": 26, \"value\": \"Bieligutai, China\"}], \"finding\": {\"title\": \"Infection found on 1.183.190.110\", \"uid\": \"2b7908d7-4b72-4f65-afa0-09bdaea46ae3\", \"types\": [\"malware_infection\", \"infected_device\", \"pva.torrent.openinternet\"], \"src_url\": \"https://platform.securityscorecard.io/#/asi/details/1.183.190.110\", \"remediation\": {\"desc\": \"If this IP address is tied to your network via any observables attached to this event, take immediate steps to find the related device on your network and remove the infection seen from external threat intelligence\", \"kb_articles\": [\"https://support.securityscorecard.com/hc/en-us/articles/8528362400539-How-SecurityScorecard-collects-data-for-ASI#h_01GBX38RBVVDT63RH11KVREN0K\", \"https://support.securityscorecard.com/hc/en-us/articles/360061410291-Resolving-Malware-Findings\"]}, \"product_uid\": \"ssc_malware_dns_sinkhole\", \"last_seen_time\": 1668535199945, \"desc\": \"Potentially vulnerable application infection detected on IP address 1.183.190.110 communicating with Command-and-Control domain open-internet.nl\"}}",
    "event": {
        "action": "generate",
        "category": [
            "malware"
        ],
        "kind": "alert",
        "reason": "Infection found on 1.183.190.110",
        "reference": "https://platform.securityscorecard.io/#/asi/details/1.183.190.110",
        "severity": 1,
        "type": [
            "info"
        ]
    },
    "@timestamp": "2022-11-15T17:59:59.945000Z",
    "ocsf": {
        "activity_id": 1,
        "activity_name": "Generate",
        "class_name": "Security Finding",
        "class_uid": 2001
    },
    "vulnerability": {
        "category": [
            "Potentially vulnerable application"
        ]
    }
}
{
    "message": "{\"activity_id\": 1, \"malware\": [{\"classification_ids\": [-1], \"classifications\": [\"Potentially vulnerable application\"], \"name\": \"pva.torrent.openinternet\", \"provider\": \"SecurityScorecard\", \"uid\": \"pva.torrent.openinternet_e1472f25-0d2d-4b88-aac9-b7bd439218f5\"}], \"activity_name\": \"Generate\", \"category_name\": \"Findings\", \"category_uid\": 2, \"class_name\": \"Security Finding\", \"class_uid\": 2001, \"confidence\": 100, \"data\": \"{\\\"body_bytes_sent\\\":\\\"-\\\",\\\"enc_host\\\":\\\"open-internet.nl\\\",\\\"enc_raw_header\\\":\\\"-\\\",\\\"enc_request\\\":\\\"SOCKET_UDP%20%2F\\\",\\\"enc_request_body\\\":\\\"AAAEFycQGYAAAAAAtdIQjw==\\\",\\\"family\\\":\\\"pva.torrent.openinternet\\\",\\\"field_1\\\":\\\"2022-06-04T10:35:07.143255  version_5\\\",\\\"remote_addr\\\":\\\"59.11.81.231\\\",\\\"remote_port\\\":\\\"6927\\\",\\\"remote_user\\\":\\\"-\\\", \\\"status\\\":\\\"200\\\",\\\"time_local\\\":\\\"2022-06-04T10:34:45.835005\\\"}\", \"message\": \"Potentially vulnerable application infection detected on IP address 59.11.81.231 by Malware DNS sinkhole on communication domain for sinkholed domain \", \"severity\": \"Informational \", \"severity_id\": 1, \"status\": \"Not applicable, static security finding from global threat intelligence monitoring\", \"status_id\": -1, \"state\": \"New\", \"state_id\": 1, \"time\": 1668535199946, \"timezone_offset\": 0, \"type_name\": \"Security Finding: Generate\", \"type_uid\": 200101, \"metadata\": {\"logged_time\": 1668535199946, \"original_time\": \"2022-11-15T17:59:59.946Z\", \"labels\": [\"infected_device\"], \"product\": {\"lang\": \"en\", \"name\": \"SecurityScorecard Attack Surface Intelligence\", \"uid\": \"ssc_asi\", \"feature\": {\"uid\": \"ssc_malware_dns_sinkhole\", \"name\": \"SecurityScorecard Malware DNS Sinkhole collection system\"}, \"vendor_name\": \"SecurityScorecard\"}, \"version\": \"1.0.0\", \"profiles\": [\"malware\", \"reputation\"]}, \"resources\": [{\"group_name\": \"infected_device\", \"name\": \"IPv4 address 59.11.81.231 of device in SecurityScorecard DNS sinkhole malware, adware, or potentially unwanted/vulnerable collection logs\", \"owner\": \"krnic.or.kr\", \"uid\": \"59.11.81.231\"}], \"observables\": [{\"name\": \"infected_device.ip\", \"type\": \"IP Address\", \"type_id\": 2, \"value\": \"59.11.81.231\"}, {\"name\": \"infection.category\", \"type\": \"Category of infection on infected device\", \"type_id\": -1, \"value\": \"Potentially vulnerable application\"}, {\"name\": \"infected_device.malware_hostname\", \"type\": \"Hostname\", \"type_id\": 1, \"value\": null}, {\"name\": \"infection.family\", \"type\": \"Malware, adware, or PUA/PVA family name\", \"type_id\": -1, \"value\": \"pva.torrent.openinternet\"}, {\"name\": \"infected_device.source_port\", \"type\": \"Client-side port making connection to the infection communication domain\", \"type_id\": -1, \"value\": \"6927\"}, {\"name\": \"infected_device.geo_location\", \"type\": \"Geo Location\", \"type_id\": 26, \"value\": \"Seongnam-si (Buljeong-ro), Korea, Republic of\"}], \"finding\": {\"title\": \"Infection found on 59.11.81.231\", \"uid\": \"45521c66-6498-442d-ad9b-40da9f0e9236\", \"types\": [\"malware_infection\", \"infected_device\", \"pva.torrent.openinternet\"], \"src_url\": \"https://platform.securityscorecard.io/#/asi/details/59.11.81.231\", \"remediation\": {\"desc\": \"If this IP address is tied to your network via any observables attached to this event, take immediate steps to find the related device on your network and remove the infection seen from external threat intelligence\", \"kb_articles\": [\"https://support.securityscorecard.com/hc/en-us/articles/8528362400539-How-SecurityScorecard-collects-data-for-ASI#h_01GBX38RBVVDT63RH11KVREN0K\", \"https://support.securityscorecard.com/hc/en-us/articles/360061410291-Resolving-Malware-Findings\"]}, \"product_uid\": \"ssc_malware_dns_sinkhole\", \"last_seen_time\": 1668535199947, \"desc\": \"Potentially vulnerable application infection detected on IP address 59.11.81.231 communicating with Command-and-Control domain \"}}",
    "event": {
        "action": "generate",
        "category": [
            "malware"
        ],
        "kind": "alert",
        "reason": "Infection found on 59.11.81.231",
        "reference": "https://platform.securityscorecard.io/#/asi/details/59.11.81.231",
        "severity": 1,
        "type": [
            "info"
        ]
    },
    "@timestamp": "2022-11-15T17:59:59.946000Z",
    "ocsf": {
        "activity_id": 1,
        "activity_name": "Generate",
        "class_name": "Security Finding",
        "class_uid": 2001
    },
    "vulnerability": {
        "category": [
            "Potentially vulnerable application"
        ]
    }
}
{
    "message": "{\"activity_id\": 1, \"malware\": [{\"classification_ids\": [-1], \"classifications\": [\"Potentially vulnerable application\"], \"name\": \"pva.torrent.kickasstracker\", \"provider\": \"SecurityScorecard\", \"uid\": \"pva.torrent.kickasstracker_d605642d-9f8b-46ed-bb19-882ffc34a8f4\"}], \"activity_name\": \"Generate\", \"category_name\": \"Findings\", \"category_uid\": 2, \"class_name\": \"Security Finding\", \"class_uid\": 2001, \"confidence\": 100, \"data\": \"{\\\"body_bytes_sent\\\":\\\"152\\\",\\\"enc_host\\\":\\\"open.kickasstracker.com\\\",\\\"enc_raw_header\\\":\\\"R0VUIC9zY3JhcGU/aW5mb19oYXNoPSUwMiUyNSVkYiVmMiVmZlElZWVLJTNmJWMxJTI4MW8lMGMlMDklYWElODN4JWVlJTk5IEhUVFAvMS4xDQpVc2VyLUFnZW50OiBUcmFuc21pc3Npb24vMi44NA0KSG9zdDogb3Blbi5raWNrYXNzdHJhY2tlci5jb20NCkFjY2VwdDogKi8qDQpBY2NlcHQtRW5jb2Rpbmc6IGd6aXA7cT0xLjAsIGRlZmxhdGUsIGlkZW50aXR5DQoNCg==\\\",\\\"enc_request\\\":\\\"GET%20%2Fscrape%3Finfo_hash%3D%2502%2525%25db%25f2%25ffQ%25eeK%253f%25c1%25281o%250c%2509%25aa%2583x%25ee%2599%20HTTP%2F1.1\\\",\\\"enc_request_body\\\":\\\"\\\",\\\"family\\\":\\\"pva.torrent.kickasstracker\\\",\\\"field_1\\\":\\\"2022-09-30T21:26:09.028507  version_5\\\",\\\"remote_addr\\\":\\\"190.109.227.80\\\",\\\"remote_port\\\":\\\"21886\\\",\\\"remote_user\\\":\\\"-\\\", \\\"status\\\":\\\"404\\\",\\\"time_local\\\":\\\"2022-09-30T21:25:21+00:00\\\"}\", \"message\": \"Potentially vulnerable application infection detected on IP address 190.109.227.80 by Malware DNS sinkhole on communication domain for sinkholed domain open.kickasstracker.com\", \"severity\": \"Informational \", \"severity_id\": 1, \"status\": \"Not applicable, static security finding from global threat intelligence monitoring\", \"status_id\": -1, \"state\": \"New\", \"state_id\": 1, \"time\": 1668535199947, \"timezone_offset\": 0, \"type_name\": \"Security Finding: Generate\", \"type_uid\": 200101, \"metadata\": {\"logged_time\": 1668535199947, \"original_time\": \"2022-11-15T17:59:59.947Z\", \"labels\": [\"infected_device\"], \"product\": {\"lang\": \"en\", \"name\": \"SecurityScorecard Attack Surface Intelligence\", \"uid\": \"ssc_asi\", \"feature\": {\"uid\": \"ssc_malware_dns_sinkhole\", \"name\": \"SecurityScorecard Malware DNS Sinkhole collection system\"}, \"vendor_name\": \"SecurityScorecard\"}, \"version\": \"1.0.0\", \"profiles\": [\"malware\", \"reputation\"]}, \"resources\": [{\"group_name\": \"infected_device\", \"name\": \"IPv4 address 190.109.227.80 of device in SecurityScorecard DNS sinkhole malware, adware, or potentially unwanted/vulnerable collection logs\", \"owner\": \"cotel.bo\", \"uid\": \"190.109.227.80\"}], \"observables\": [{\"name\": \"infected_device.ip\", \"type\": \"IP Address\", \"type_id\": 2, \"value\": \"190.109.227.80\"}, {\"name\": \"infection.category\", \"type\": \"Category of infection on infected device\", \"type_id\": -1, \"value\": \"Potentially vulnerable application\"}, {\"name\": \"infected_device.malware_hostname\", \"type\": \"Hostname\", \"type_id\": 1, \"value\": \"open.kickasstracker.com\"}, {\"name\": \"infection.family\", \"type\": \"Malware, adware, or PUA/PVA family name\", \"type_id\": -1, \"value\": \"pva.torrent.kickasstracker\"}, {\"name\": \"infected_device.source_port\", \"type\": \"Client-side port making connection to the infection communication domain\", \"type_id\": -1, \"value\": \"21886\"}, {\"name\": \"infected_device.geo_location\", \"type\": \"Geo Location\", \"type_id\": 26, \"value\": \"La Paz (Macrodistrito Centro), Bolivia, Plurinational State of\"}], \"finding\": {\"title\": \"Infection found on 190.109.227.80\", \"uid\": \"8f91e92d-b75c-4d55-a6a2-c9f611cdea28\", \"types\": [\"malware_infection\", \"infected_device\", \"pva.torrent.kickasstracker\"], \"src_url\": \"https://platform.securityscorecard.io/#/asi/details/190.109.227.80\", \"remediation\": {\"desc\": \"If this IP address is tied to your network via any observables attached to this event, take immediate steps to find the related device on your network and remove the infection seen from external threat intelligence\", \"kb_articles\": [\"https://support.securityscorecard.com/hc/en-us/articles/8528362400539-How-SecurityScorecard-collects-data-for-ASI#h_01GBX38RBVVDT63RH11KVREN0K\", \"https://support.securityscorecard.com/hc/en-us/articles/360061410291-Resolving-Malware-Findings\"]}, \"product_uid\": \"ssc_malware_dns_sinkhole\", \"last_seen_time\": 1668535199948, \"desc\": \"Potentially vulnerable application infection detected on IP address 190.109.227.80 communicating with Command-and-Control domain open.kickasstracker.com\"}}",
    "event": {
        "action": "generate",
        "category": [
            "malware"
        ],
        "kind": "alert",
        "reason": "Infection found on 190.109.227.80",
        "reference": "https://platform.securityscorecard.io/#/asi/details/190.109.227.80",
        "severity": 1,
        "type": [
            "info"
        ]
    },
    "@timestamp": "2022-11-15T17:59:59.947000Z",
    "ocsf": {
        "activity_id": 1,
        "activity_name": "Generate",
        "class_name": "Security Finding",
        "class_uid": 2001
    },
    "vulnerability": {
        "category": [
            "Potentially vulnerable application"
        ]
    }
}
{
    "message": "{\"activity_id\": 1, \"malware\": [{\"classification_ids\": [-1], \"classifications\": [\"Adware\"], \"name\": \"adware.android.imp\", \"provider\": \"SecurityScorecard\", \"uid\": \"adware.android.imp_7cd5cf7b-4c99-406c-ad46-621487394fba\"}], \"activity_name\": \"Generate\", \"category_name\": \"Findings\", \"category_uid\": 2, \"class_name\": \"Security Finding\", \"class_uid\": 2001, \"confidence\": 100, \"data\": \"{\\\"body_bytes_sent\\\":\\\"152\\\",\\\"enc_host\\\":\\\"x-eu.58dac16e7b2c86c19cfe48914a6e8fcdac9ae06fe5cf53369beaa45b.com\\\",\\\"enc_raw_header\\\":\\\"UE9TVCAvYXVjdGlvbi9pbml0IEhUVFAvMS4xDQpDb250ZW50LVR5cGU6IGFwcGxpY2F0aW9uL3gtcHJvdG9idWYNCkFjY2VwdC1FbmNvZGluZzogZ3ppcA0KQ29udGVudC1FbmNvZGluZzogZ3ppcA0KVXNlci1BZ2VudDogRGFsdmlrLzIuMS4wIChMaW51eDsgVTsgQW5kcm9pZCAxMTsgU00tQTIwN0YgQnVpbGQvUlAxQS4yMDA3MjAuMDEyKQ0KSG9zdDogeC1ldS41OGRhYzE2ZTdiMmM4NmMxOWNmZTQ4OTE0YTZlOGZjZGFjOWFlMDZmZTVjZjUzMzY5YmVhYTQ1Yi5jb20NCkNvbm5lY3Rpb246IEtlZXAtQWxpdmUNCkNvbnRlbnQtTGVuZ3RoOiAzMDMNCg0K\\\",\\\"enc_request\\\":\\\"POST%20%2Fauction%2Finit%20HTTP%2F1.1\\\",\\\"enc_request_body\\\":\\\"H4sIAAAAAAAAAK3PzUoDMRQFYEhbSwNSnI1lljKrgYQkzd+47MqNIIg/u3qTTHCUzshMacFHEHwGwbUPaStVQTcu3F3uOXxwcI8X02TsmwWFdUehDm1ThQk6QpznvZs3JPCsCqfgb6u6PB5wWlA9y0oLzjGvCHPGE+kgEif05iq5YVZZkEye9M+Qy6LVLETpiXfOEilAE2sUJ9EIr4WCGKfibqSoVJQRrttMhKijLhjxQhsijSo29NSS4IOSDJRRzDy+IvyC8H5dLtdNe9/Nqzo2yTMSTwhf55c4wcNdlAzTwaKFKuAUj3e/+apsu6qptxnb7LE4w4efGQR4WJbtV2eUDj82U46v8gt88C3vpf0VdMt/gC/y8x9wvYUnv+FB2uOU/Y19BzRbkezaAQAA\\\",\\\"family\\\":\\\"adware.android.imp\\\",\\\"field_1\\\":\\\"2022-09-23T16:20:10.540428 version_5\\\",\\\"remote_addr\\\":\\\"38.7.186.198\\\",\\\"remote_port\\\":\\\"59750\\\",\\\"remote_user\\\":\\\"-\\\",\\\"status\\\":\\\"404\\\",\\\"time_local\\\":\\\"2022-09-23T16:19:38+00:00\\\"}\", \"message\": \"Adware infection detected on IP address 38.7.186.198 by Malware DNS sinkhole on communication domain for sinkholed domain x-eu.58dac16e7b2c86c19cfe48914a6e8fcdac9ae06fe5cf53369beaa45b.com\", \"severity\": \"Informational \", \"severity_id\": 1, \"status\": \"Not applicable, static security finding from global threat intelligence monitoring\", \"status_id\": -1, \"state\": \"New\", \"state_id\": 1, \"time\": 1668535199948, \"timezone_offset\": 0, \"type_name\": \"Security Finding: Generate\", \"type_uid\": 200101, \"metadata\": {\"logged_time\": 1668535199948, \"original_time\": \"2022-11-15T17:59:59.948Z\", \"labels\": [\"infected_device\"], \"product\": {\"lang\": \"en\", \"name\": \"SecurityScorecard Attack Surface Intelligence\", \"uid\": \"ssc_asi\", \"feature\": {\"uid\": \"ssc_malware_dns_sinkhole\", \"name\": \"SecurityScorecard Malware DNS Sinkhole collection system\"}, \"vendor_name\": \"SecurityScorecard\"}, \"version\": \"1.0.0\", \"profiles\": [\"malware\", \"reputation\"]}, \"resources\": [{\"group_name\": \"infected_device\", \"name\": \"IPv4 address 38.7.186.198 of device in SecurityScorecard DNS sinkhole malware, adware, or potentially unwanted/vulnerable collection logs\", \"owner\": \"emix.net.ae\", \"uid\": \"38.7.186.198\"}], \"observables\": [{\"name\": \"infected_device.ip\", \"type\": \"IP Address\", \"type_id\": 2, \"value\": \"38.7.186.198\"}, {\"name\": \"infection.category\", \"type\": \"Category of infection on infected device\", \"type_id\": -1, \"value\": \"Adware\"}, {\"name\": \"infected_device.malware_hostname\", \"type\": \"Hostname\", \"type_id\": 1, \"value\": \"x-eu.58dac16e7b2c86c19cfe48914a6e8fcdac9ae06fe5cf53369beaa45b.com\"}, {\"name\": \"infection.family\", \"type\": \"Malware, adware, or PUA/PVA family name\", \"type_id\": -1, \"value\": \"adware.android.imp\"}, {\"name\": \"infected_device.source_port\", \"type\": \"Client-side port making connection to the infection communication domain\", \"type_id\": -1, \"value\": \"59750\"}, {\"name\": \"infected_device.geo_location\", \"type\": \"Geo Location\", \"type_id\": 26, \"value\": \"Karachi (Sector Five F), Pakistan\"}], \"finding\": {\"title\": \"Infection found on 38.7.186.198\", \"uid\": \"26c7c83d-0aad-411b-88ee-52343ff22064\", \"types\": [\"malware_infection\", \"infected_device\", \"adware.android.imp\"], \"src_url\": \"https://platform.securityscorecard.io/#/asi/details/38.7.186.198\", \"remediation\": {\"desc\": \"If this IP address is tied to your network via any observables attached to this event, take immediate steps to find the related device on your network and remove the infection seen from external threat intelligence\", \"kb_articles\": [\"https://support.securityscorecard.com/hc/en-us/articles/8528362400539-How-SecurityScorecard-collects-data-for-ASI#h_01GBX38RBVVDT63RH11KVREN0K\", \"https://support.securityscorecard.com/hc/en-us/articles/360061410291-Resolving-Malware-Findings\"]}, \"product_uid\": \"ssc_malware_dns_sinkhole\", \"last_seen_time\": 1668535199948, \"desc\": \"Adware infection detected on IP address 38.7.186.198 communicating with Command-and-Control domain x-eu.58dac16e7b2c86c19cfe48914a6e8fcdac9ae06fe5cf53369beaa45b.com\"}}",
    "event": {
        "action": "generate",
        "category": [
            "malware"
        ],
        "kind": "alert",
        "reason": "Infection found on 38.7.186.198",
        "reference": "https://platform.securityscorecard.io/#/asi/details/38.7.186.198",
        "severity": 1,
        "type": [
            "info"
        ]
    },
    "@timestamp": "2022-11-15T17:59:59.948000Z",
    "ocsf": {
        "activity_id": 1,
        "activity_name": "Generate",
        "class_name": "Security Finding",
        "class_uid": 2001
    },
    "vulnerability": {
        "category": [
            "Adware"
        ]
    }
}
{
    "message": "{\"activity_id\": 99, \"actor\": {\"process\": {\"file\": {\"name\": \"lsass.exe\", \"parent_folder\": \"C:\\\\Windows\\\\System32\", \"path\": \"C:\\\\Windows\\\\System32\\\\lsass.exe\", \"type_id\": 1}, \"pid\": 492}, \"session\": {\"uid\": \"0x3e7\"}, \"user\": {\"account_type\": \"Windows Account\", \"account_type_id\": 2, \"domain\": \"DIR\", \"name\": \"STLDIRDC1$\", \"uid\": \"NT AUTHORITY\\\\SYSTEM\"}}, \"category_uid\": 1, \"class_uid\": 1010, \"device\": {\"hostname\": \"STLDIRDC1.dir.solutia.com\", \"os\": {\"name\": \"Windows\", \"type_id\": 100}, \"type_id\": 0}, \"message\": \"A handle to an object was requested.\", \"metadata\": {\"original_time\": \"01/09/2019 12:46:00 AM\", \"product\": {\"feature\": {\"name\": \"Security\"}, \"name\": \"Microsoft Windows\", \"vendor_name\": \"Microsoft\"}, \"profiles\": [\"host\"], \"uid\": \"d9e6a7b1-3177-4542-8de1-bfd582f87727\", \"version\": \"1.0.0-rc.2\"}, \"severity_id\": 1, \"status_id\": 1, \"time\": 1547012760000, \"unmapped\": {\"Access Request Information\": {\"Access Mask\": \"0x2d\", \"Accesses\": [\"DELETE\", \"READ_CONTROL\", \"WRITE_DAC\", \"WRITE_OWNER\", \"ReadPasswordParameters\", \"WritePasswordParameters\", \"ReadOtherParameters\", \"WriteOtherParameters\", \"CreateUser\", \"CreateGlobalGroup\", \"CreateLocalGroup\", \"GetLocalGroupMembership\", \"ListAccounts\"], \"Privileges Used for Access Check\": \"\\u01ff\\\\x0F-\", \"Properties\": [\"---\", \"domain\", \"DELETE\", \"READ_CONTROL\", \"WRITE_DAC\", \"WRITE_OWNER\", \"ReadPasswordParameters\", \"WritePasswordParameters\", \"ReadOtherParameters\", \"WriteOtherParameters\", \"CreateUser\", \"CreateGlobalGroup\", \"CreateLocalGroup\", \"GetLocalGroupMembership\", \"ListAccounts\", \"Domain Password & Lockout Policies\", \"lockOutObservationWindow\", \"lockoutDuration\", \"lockoutThreshold\", \"maxPwdAge\", \"minPwdAge\", \"minPwdLength\", \"pwdHistoryLength\", \"pwdProperties\", \"Other Domain Parameters (for use by SAM)\", \"serverState\", \"serverRole\", \"modifiedCount\", \"uASCompat\", \"forceLogoff\", \"domainReplica\", \"oEMInformation\", \"Domain Administer Server\"], \"Restricted SID Count\": \"0\", \"Transaction ID\": \"{00000000-0000-0000-0000-000000000000}\"}, \"EventCode\": \"4661\", \"EventType\": \"0\", \"Object\": {\"Object Server\": \"Security Account Manager\"}, \"OpCode\": \"Info\", \"RecordNumber\": \"3166250565\", \"SourceName\": \"Microsoft Windows security auditing.\", \"TaskCategory\": \"SAM\"}, \"win_resource\": {\"name\": \"DC=dir,DC=solutia,DC=com\", \"type_id\": 36, \"uid\": \"0x7f79620\"}}",
    "event": {
        "category": [],
        "outcome": "success",
        "reason": "A handle to an object was requested.",
        "severity": 1,
        "type": []
    },
    "@timestamp": "2019-01-09T05:46:00Z",
    "file": {
        "directory": "C:\\Windows\\System32",
        "name": "lsass.exe",
        "path": "C:\\Windows\\System32\\lsass.exe"
    },
    "host": {
        "hostname": "STLDIRDC1.dir.solutia.com",
        "name": "STLDIRDC1.dir.solutia.com",
        "os": {
            "name": "Windows"
        }
    },
    "ocsf": {
        "activity_id": 99,
        "class_uid": 1010
    },
    "process": {
        "pid": 492
    },
    "related": {
        "hosts": [
            "STLDIRDC1.dir.solutia.com"
        ],
        "user": [
            "STLDIRDC1$"
        ]
    },
    "user": {
        "domain": "DIR",
        "id": "NT AUTHORITY\\SYSTEM",
        "name": "STLDIRDC1$"
    }
}
{
    "message": "{\"activity_id\": 1, \"actor\": {\"process\": {\"file\": {\"name\": \"explorer.exe\", \"parent_folder\": \"C:\\\\Windows\", \"path\": \"C:\\\\Windows\\\\explorer.exe\", \"type_id\": 1}, \"pid\": 1704}, \"session\": {\"uid\": \"0xDE9AD8\"}, \"user\": {\"account_type\": \"Windows Account\", \"account_type_id\": 2, \"domain\": \"SESTEST\", \"name\": \"splunker\", \"uid\": \"SESTEST\\\\splunker\"}}, \"category_uid\": 1, \"class_uid\": 1010, \"device\": {\"hostname\": \"SesWin2019DC1.SesTest.local\", \"os\": {\"name\": \"Windows\", \"type_id\": 100}, \"type_id\": 0}, \"message\": \"A privileged service was called.\", \"metadata\": {\"original_time\": \"01/28/2022 04:12:19 PM\", \"product\": {\"feature\": {\"name\": \"Security\"}, \"name\": \"Microsoft Windows\", \"vendor_name\": \"Microsoft\"}, \"profiles\": [\"host\"], \"uid\": \"995559a6-1921-463f-93e1-9c5ca932dc8c\", \"version\": \"1.0.0-rc.2\"}, \"severity_id\": 1, \"status_id\": 2, \"time\": 1643404339000, \"unmapped\": {\"EventCode\": \"4673\", \"EventType\": \"0\", \"OpCode\": \"Info\", \"RecordNumber\": \"374060\", \"Service Request Information\": {\"Privileges\": \"SeTcbPrivilege\"}, \"SourceName\": \"Microsoft Windows security auditing.\", \"TaskCategory\": \"Sensitive Privilege Use\"}, \"win_resource\": {\"name\": \"-\", \"type\": \"Security\", \"type_id\": 0}}",
    "event": {
        "category": [],
        "outcome": "failure",
        "reason": "A privileged service was called.",
        "severity": 1,
        "type": []
    },
    "@timestamp": "2022-01-28T21:12:19Z",
    "file": {
        "directory": "C:\\Windows",
        "name": "explorer.exe",
        "path": "C:\\Windows\\explorer.exe"
    },
    "host": {
        "hostname": "SesWin2019DC1.SesTest.local",
        "name": "SesWin2019DC1.SesTest.local",
        "os": {
            "name": "Windows"
        }
    },
    "ocsf": {
        "activity_id": 1,
        "class_uid": 1010
    },
    "process": {
        "pid": 1704
    },
    "related": {
        "hosts": [
            "SesWin2019DC1.SesTest.local"
        ],
        "user": [
            "splunker"
        ]
    },
    "user": {
        "domain": "SESTEST",
        "id": "SESTEST\\splunker",
        "name": "splunker"
    }
}
{
    "message": "{\"activity_id\": 2, \"activity_name\": \"Update\", \"category_name\": \"Findings\", \"category_uid\": 2, \"class_name\": \"Vulnerability Finding\", \"class_uid\": 2002, \"cloud\": {\"account\": {\"uid\": \"111111111111\"}, \"provider\": \"AWS\", \"region\": \"us-east-2\"}, \"finding_info\": {\"created_time_dt\": \"2023-04-21T11:59:04.000-04:00\", \"desc\": \"Issue summary: The AES-XTS cipher decryption implementation for 64 bit ARM\\nplatform contains a bug that could cause it to read past the input buffer,\\nleading to a crash.\\n\\nImpact summary: Applications that use the AES-XTS algorithm on the 64 bit ARM\\nplatform can crash in rare circumstances. The AES-XTS algorithm is usually\\nused for disk encryption.\\n\\nThe AES-XTS cipher decryption implementation for 64 bit ARM platform will read\\npast the end of the ciphertext buffer if the ciphertext size is 4 mod 5 in 16\\nbyte blocks, e.g. 144 bytes or 1024 bytes. If the memory after the ciphertext\\nbuffer is unmapped, this will trigger a crash which results in a denial of\\nservice.\\n\\nIf an attacker can control the size and location of the ciphertext buffer\\nbeing decrypted by an application using AES-XTS on 64 bit ARM, the\\napplication is affected. This is fairly unlikely making this issue\\na Low severity one.\", \"first_seen_time_dt\": \"2023-04-21T11:59:04.000-04:00\", \"last_seen_time_dt\": \"2024-01-26T17:19:14.000-05:00\", \"modified_time_dt\": \"2024-01-26T17:19:14.000-05:00\", \"title\": \"CVE-2023-1255 - openssl\", \"types\": [\"Software and Configuration Checks/Vulnerabilities/CVE\"], \"uid\": \"arn:aws:inspector2:us-east-2:111111111111:finding/faa0d54609b94871badcc83ac7c2add5\"}, \"metadata\": {\"log_version\": \"2018-10-08\", \"processed_time_dt\": \"2024-01-26T17:59:56.923-05:00\", \"product\": {\"feature\": {\"uid\": \"AWSInspector\"}, \"name\": \"Inspector\", \"uid\": \"arn:aws:securityhub:us-east-2::product/aws/inspector\", \"vendor_name\": \"Amazon\", \"version\": \"2\"}, \"profiles\": [\"cloud\", \"datetime\"], \"version\": \"1.1.0\"}, \"observables\": [{\"name\": \"resource.uid\", \"type\": \"Resource UID\", \"type_id\": 10, \"value\": \"arn:aws:ecr:us-east-2:111111111111:repository/browserhostingstack-EXAMPLE-btb1o54yh1jr/sha256:e9e2afad74f4e80511a5cff33d3d989b9797a718425f27e549f5b1f862c058a8\"}], \"resource\": {\"cloud_partition\": \"aws\", \"data\": \"{\\\"AwsEcrContainerImage\\\":{\\\"Architecture\\\":\\\"amd64\\\",\\\"ImageDigest\\\":\\\"sha256:e9e2afad74f4e80511a5cff33d3d989b9797a718425f27e549f5b1f862c058a8\\\",\\\"ImagePublishedAt\\\":\\\"2023-04-11T21:07:55Z\\\",\\\"RegistryId\\\":\\\"111111111111\\\",\\\"RepositoryName\\\":\\\"browserhostingstack-EXAMPLE-btb1o54yh1jr\\\"}}\", \"region\": \"us-east-2\", \"type\": \"AwsEcrContainerImage\", \"uid\": \"arn:aws:ecr:us-east-2:111111111111:repository/browserhostingstack-EXAMPLE-btb1o54yh1jr/sha256:e9e2afad74f4e80511a5cff33d3d989b9797a718425f27e549f5b1f862c058a8\"}, \"severity\": \"Medium\", \"severity_id\": 3, \"status\": \"New\", \"time\": 1706307554000, \"time_dt\": \"2024-01-26T17:19:14.000-05:00\", \"type_name\": \"Vulnerability Finding: Update\", \"type_uid\": 200202, \"unmapped\": {\"FindingProviderFields.Severity.Label\": \"MEDIUM\", \"FindingProviderFields.Types[]\": \"Software and Configuration Checks/Vulnerabilities/CVE\", \"ProductFields.aws/inspector/FindingStatus\": \"ACTIVE\", \"ProductFields.aws/inspector/inspectorScore\": \"5.9\", \"ProductFields.aws/inspector/packageVulnerabilityDetails/vulnerablePackages/sourceLayerHashes\": \"sha256:f56be85fc22e46face30e2c3de3f7fe7c15f8fd7c4e5add29d7f64b87abdaa09\", \"ProductFields.aws/inspector/resources/1/resourceDetails/awsEcrContainerImageDetails/platform\": \"ALPINE_LINUX_3_17\", \"ProductFields.aws/securityhub/CompanyName\": \"Amazon\", \"ProductFields.aws/securityhub/FindingId\": \"arn:aws:securityhub:us-east-2::product/aws/inspector/arn:aws:inspector2:us-east-2:111111111111:finding/faa0d54609b94871badcc83ac7c2add5\", \"ProductFields.aws/securityhub/ProductName\": \"Inspector\", \"RecordState\": \"ACTIVE\", \"Severity.Normalized\": \"40\", \"Vulnerabilities[].Cvss[].Source\": \"NVD,NVD\", \"Vulnerabilities[].Vendor.VendorSeverity\": \"MEDIUM\", \"Vulnerabilities[].VulnerablePackages[].SourceLayerHash\": \"sha256:f56be85fc22e46face30e2c3de3f7fe7c15f8fd7c4e5add29d7f64b87abdaa09\", \"WorkflowState\": \"NEW\"}, \"vulnerabilities\": [{\"affected_packages\": [{\"architecture\": \"X86_64\", \"epoch\": 0, \"fixed_in_version\": \"0:3.0.8-r4\", \"name\": \"openssl\", \"package_manager\": \"OS\", \"release\": \"r3\", \"remediation\": {\"desc\": \"apk update && apk upgrade openssl\"}, \"version\": \"3.0.8\"}], \"cve\": {\"created_time_dt\": \"2023-04-20T13:15:06.000-04:00\", \"cvss\": [{\"base_score\": 5.9, \"vector_string\": \"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H\", \"version\": \"3.1\"}, {\"base_score\": 5.9, \"vector_string\": \"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H\", \"version\": \"3.1\"}], \"epss\": {\"score\": \"0.00066\"}, \"modified_time_dt\": \"2023-09-08T13:15:15.000-04:00\", \"references\": [\"https://nvd.nist.gov/vuln/detail/CVE-2023-1255\"], \"uid\": \"CVE-2023-1255\"}, \"is_exploit_available\": true, \"is_fix_available\": true, \"references\": [\"https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=bc2f61ad70971869b242fc1cb445b98bad50074a\", \"https://www.openssl.org/news/secadv/20230419.txt\", \"https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=02ac9c9420275868472f33b01def01218742b8bb\"], \"remediation\": {\"desc\": \"Remediation is available. Please refer to the Fixed version in the vulnerability details section above.For detailed remediation guidance for each of the affected packages, refer to the vulnerabilities section of the detailed finding JSON.\"}, \"vendor_name\": \"NVD\"}]}",
    "event": {
        "action": "update",
        "category": [
            "vulnerability"
        ],
        "severity": 3,
        "type": [
            "info"
        ]
    },
    "@timestamp": "2024-01-26T22:19:14Z",
    "cloud": {
        "account": {
            "id": "111111111111"
        },
        "provider": "AWS",
        "region": "us-east-2"
    },
    "ocsf": {
        "activity_id": 2,
        "activity_name": "Update",
        "class_name": "Vulnerability Finding",
        "class_uid": 2002
    },
    "vulnerability": {
        "id": "CVE-2023-1255",
        "scanner": {
            "vendor": "NVD"
        }
    }
}
{
    "message": "{\"activity_id\": 1, \"activity_name\": \"Access\", \"actor\": {\"process\": {\"file\": {\"name\": \"services.exe\", \"parent_folder\": \"C:\\\\Windows\\\\System32\", \"path\": \"C:\\\\Windows\\\\System32\\\\services.exe\", \"type\": \"Regular File\", \"type_id\": 1}, \"pid\": 532}, \"session\": {\"uid\": \"0x3e7\"}, \"user\": {\"account_type\": \"Windows Account\", \"account_type_id\": 2, \"domain\": \"SOI\", \"name\": \"SZUSOIDC1$\", \"uid\": \"NT AUTHORITY\\\\SYSTEM\"}}, \"category_name\": \"System Activity\", \"category_uid\": 1, \"class_name\": \"Windows Resource Activity\", \"class_uid\": 201003, \"device\": {\"hostname\": \"szusoidc1.soi.dir.acme080.com\", \"os\": {\"name\": \"Windows\", \"type\": \"Windows\", \"type_id\": 100}, \"type\": \"Unknown\", \"type_id\": 0}, \"message\": \"An attempt was made to access an object.\", \"metadata\": {\"original_time\": \"01/14/2015 08:30:54 PM\", \"product\": {\"feature\": {\"name\": \"Security\"}, \"name\": \"Microsoft Windows\", \"vendor_name\": \"Microsoft\"}, \"profiles\": [\"host\"], \"uid\": \"05e90f2c-5be6-484c-aefb-f8e6f591bd2c\", \"version\": \"1.0.0-rc.2\"}, \"severity\": \"Informational\", \"severity_id\": 1, \"status\": \"Success\", \"status_id\": 1, \"time\": 1421285454000, \"type_name\": \"Windows Resource Activity: Access\", \"type_uid\": 101001, \"unmapped\": {\"Access Mask\": \"0x2\", \"Access Request Information\": {\"Accesses\": \"Set key value\"}, \"CaseID\": \"AD_4663\", \"EventCode\": \"4663\", \"EventType\": \"0\", \"Object\": {\"Object Server\": \"Security\"}, \"OpCode\": \"Info\", \"RecordNumber\": \"989202992\", \"SourceName\": \"Microsoft Windows security auditing.\", \"TaskCategory\": \"Registry\"}, \"win_resource\": {\"name\": \"\\\\REGISTRY\\\\MACHINE\\\\SYSTEM\\\\ControlSet001\\\\Services\\\\EventLog\\\\Security\", \"type\": \"Key\", \"type_id\": 25, \"uid\": \"0x564\"}}",
    "event": {
        "action": "access",
        "category": [],
        "outcome": "success",
        "reason": "An attempt was made to access an object.",
        "severity": 1,
        "type": []
    },
    "@timestamp": "2015-01-15T01:30:54Z",
    "file": {
        "directory": "C:\\Windows\\System32",
        "name": "services.exe",
        "path": "C:\\Windows\\System32\\services.exe",
        "type": "Regular File"
    },
    "host": {
        "hostname": "szusoidc1.soi.dir.acme080.com",
        "name": "szusoidc1.soi.dir.acme080.com",
        "os": {
            "name": "Windows",
            "type": "Windows"
        },
        "type": "Unknown"
    },
    "ocsf": {
        "activity_id": 1,
        "activity_name": "Access",
        "class_name": "Windows Resource Activity",
        "class_uid": 201003
    },
    "process": {
        "pid": 532
    },
    "related": {
        "hosts": [
            "szusoidc1.soi.dir.acme080.com"
        ],
        "user": [
            "SZUSOIDC1$"
        ]
    },
    "user": {
        "domain": "SOI",
        "id": "NT AUTHORITY\\SYSTEM",
        "name": "SZUSOIDC1$"
    }
}

Extracted Fields

The following table lists the fields that are extracted, normalized under the ECS format, analyzed and indexed by the parser. It should be noted that infered fields are not listed.

Name Type Description
@timestamp date Date/time when the event originated.
cloud.account.id keyword The cloud account or organization id.
cloud.account.name keyword The cloud account name.
cloud.availability_zone keyword Availability zone in which this host, resource, or service is located.
cloud.project.id keyword The cloud project id.
cloud.provider keyword Name of the cloud provider.
cloud.region keyword Region in which this host, resource, or service is located.
container.id keyword Unique container id.
container.image.name keyword Name of the image the container was built on.
container.image.tag keyword Container image tags.
container.labels object Image labels.
container.name keyword Container name.
container.runtime keyword Runtime managing this container.
destination.bytes long Bytes sent from the destination to the source.
destination.domain keyword The domain name of the destination.
destination.geo.city_name keyword City name.
destination.geo.continent_name keyword Name of the continent.
destination.geo.country_iso_code keyword Country ISO code.
destination.geo.name keyword User-defined description of a location.
destination.geo.postal_code keyword Postal code.
destination.geo.region_iso_code keyword Region ISO code.
destination.ip ip IP address of the destination.
destination.mac keyword MAC address of the destination.
destination.packets long Packets sent from the destination to the source.
destination.port long Port of the destination.
dns.answers object Array of DNS answers.
dns.id keyword The DNS packet identifier assigned by the program that generated the query. The identifier is copied to the response.
dns.question.class keyword The class of records being queried.
dns.question.name keyword The name being queried.
dns.question.type keyword The type of record being queried.
dns.response_code keyword The DNS response code.
email.attachments.file.name keyword Name of the attachment file.
email.attachments.file.size long Attachment file size.
email.cc.address keyword Email address of CC recipient
email.from.address keyword The sender's email address.
email.local_id keyword Unique identifier given by the source.
email.message_id wildcard Value from the Message-ID header.
email.reply_to.address keyword Address replies should be delivered to.
email.subject keyword The subject of the email message.
email.to.address keyword Email address of recipient
event.action keyword The action captured by the event.
event.category keyword Event category. The second categorization field in the hierarchy.
event.code keyword Identification code for this event.
event.duration long Duration of the event in nanoseconds.
event.end date event.end contains the date when the event ended or when the activity was last observed.
event.kind keyword The kind of the event. The highest categorization field in the hierarchy.
event.provider keyword Source of the event.
event.reason keyword Reason why this event happened, according to the source
event.reference keyword Event reference URL
event.risk_score float Risk score or priority of the event (e.g. security solutions). Use your system's original value here.
event.sequence long Sequence number of the event.
event.severity long Numeric severity of the event.
event.start date event.start contains the date when the event started or when the activity was first observed.
event.type keyword Event type. The third categorization field in the hierarchy.
file.accessed date Last time the file was accessed.
file.created date File creation time.
file.directory keyword Directory where the file is located.
file.hash.md5 keyword MD5 hash.
file.hash.sha1 keyword SHA1 hash.
file.hash.sha256 keyword SHA256 hash.
file.hash.sha512 keyword SHA512 hash.
file.hash.ssdeep keyword SSDEEP hash.
file.hash.tlsh keyword TLSH hash.
file.inode keyword Inode representing the file in the filesystem.
file.mime_type keyword Media type of file, document, or arrangement of bytes.
file.mtime date Last time the file content was modified.
file.name keyword Name of the file including the extension, without the directory.
file.owner keyword File owner's username.
file.path keyword Full path to the file, including the file name.
file.size long File size in bytes.
file.type keyword File type (file, dir, or symlink).
file.uid keyword The user ID (UID) or security identifier (SID) of the file owner.
file.x509.issuer.distinguished_name keyword Distinguished name (DN) of issuing certificate authority.
file.x509.not_after date Time at which the certificate is no longer considered valid.
file.x509.serial_number keyword Unique serial number issued by the certificate authority.
file.x509.subject.distinguished_name keyword Distinguished name (DN) of the certificate subject entity.
file.x509.version_number keyword Version of x509 format.
group.id keyword Unique identifier for the group on the system/platform.
group.name keyword Name of the group.
host.domain keyword Name of the directory the group is a member of.
host.geo.city_name keyword City name.
host.geo.continent_name keyword Name of the continent.
host.geo.country_iso_code keyword Country ISO code.
host.geo.name keyword User-defined description of a location.
host.geo.postal_code keyword Postal code.
host.geo.region_iso_code keyword Region ISO code.
host.hostname keyword Hostname of the host.
host.id keyword Unique host id.
host.ip ip Host ip addresses.
host.mac keyword Host MAC addresses.
host.os.name keyword Operating system name, without the version.
host.os.type keyword Which commercial OS family (one of: linux, macos, unix or windows).
host.os.version keyword Operating system version as a raw string.
host.type keyword Type of host.
http.request.id keyword HTTP request ID.
http.request.method keyword HTTP request method.
http.request.referrer keyword Referrer for this HTTP request.
http.response.body.bytes long Size in bytes of the response body.
http.response.body.content wildcard The full HTTP response body.
http.response.status_code long HTTP response status code.
http.version keyword HTTP version.
network.application keyword Application level protocol name.
network.bytes long Total bytes transferred in both directions.
network.direction keyword Direction of the network traffic.
network.iana_number keyword IANA Protocol Number.
network.packets long Total packets transferred in both directions.
network.vlan.id keyword VLAN ID as reported by the observer.
observer.hostname keyword Hostname of the observer.
observer.ip ip IP addresses of the observer.
observer.mac keyword MAC addresses of the observer.
observer.name keyword Custom name of the observer.
observer.type keyword The type of the observer the data is coming from.
ocsf.activity_id long The normalized identifier of the activity that triggered the event.
ocsf.activity_name keyword The event activity name, as defined by the activity_id.
ocsf.class_name keyword The event class name, as defined by class_uid value: Security Finding.
ocsf.class_uid long The unique identifier of a class. A Class describes the attributes available in an event.2001 Security FindingSecurity Finding events describe findings, detections, anomalies, alerts and/or actions performed by security products.
ocsf.process.group dict
ocsf.process.parent.group dict
ocsf.process.parent.user.domain keyword
ocsf.process.parent.user.email keyword
ocsf.process.parent.user.full_name keyword
ocsf.process.parent.user.groups array
ocsf.process.user.domain keyword
ocsf.process.user.email keyword
ocsf.process.user.full_name keyword
ocsf.process.user.groups array
ocsf.user.groups array The list of groups that the user belong to
ocsf.vulnerabilities array
orchestrator.type keyword Orchestrator cluster type (e.g. kubernetes, nomad or cloudfoundry).
organization.id keyword Unique identifier for the organization.
organization.name keyword Organization name.
package.description keyword Description of the package.
package.name keyword Package name
package.type keyword Package type
process.command_line wildcard Full command line that started the process.
process.end date The time the process ended.
process.entity_id keyword Unique identifier for the process.
process.exit_code long The exit code of the process.
process.name keyword Process name.
process.parent.command_line wildcard Full command line that started the process.
process.parent.end date The time the process ended.
process.parent.entity_id keyword Unique identifier for the process.
process.parent.name keyword Process name.
process.parent.pid long Process id.
process.parent.start date The time the process started.
process.parent.thread.id long Thread ID.
process.pid long Process id.
process.start date The time the process started.
process.thread.id long Thread ID.
rule.category keyword Rule category
rule.description keyword Rule description
rule.name keyword Rule name
rule.uuid keyword Rule UUID
rule.version keyword Rule version
service.id keyword Unique identifier of the running service.
service.name keyword Name of the service.
service.version keyword Version of the service.
source.bytes long Bytes sent from the source to the destination.
source.domain keyword The domain name of the source.
source.geo.city_name keyword City name.
source.geo.continent_name keyword Name of the continent.
source.geo.country_iso_code keyword Country ISO code.
source.geo.location geo_point Longitude and latitude.
source.geo.name keyword User-defined description of a location.
source.geo.postal_code keyword Postal code.
source.geo.region_iso_code keyword Region ISO code.
source.ip ip IP address of the source.
source.mac keyword MAC address of the source.
source.packets long Packets sent from the source to the destination.
source.port long Port of the source.
threat.technique.id keyword Threat technique id.
threat.technique.name keyword Threat technique name.
tls.cipher keyword String indicating the cipher used during the current connection.
tls.client.ja3 keyword A hash that identifies clients based on how they perform an SSL/TLS handshake.
tls.client.server_name keyword Hostname the client is trying to connect to. Also called the SNI.
tls.client.supported_ciphers keyword Array of ciphers offered by the client during the client hello.
tls.client.x509.alternative_names keyword List of subject alternative names (SAN).
tls.client.x509.issuer.distinguished_name keyword Distinguished name (DN) of issuing certificate authority.
tls.client.x509.not_after date Time at which the certificate is no longer considered valid.
tls.client.x509.serial_number keyword Unique serial number issued by the certificate authority.
tls.client.x509.subject.distinguished_name keyword Distinguished name (DN) of the certificate subject entity.
tls.client.x509.version_number keyword Version of x509 format.
tls.server.certificate_chain keyword Array of PEM-encoded certificates that make up the certificate chain offered by the server.
tls.server.ja3s keyword A hash that identifies servers based on how they perform an SSL/TLS handshake.
tls.version keyword Numeric part of the version parsed from the original string.
url.domain keyword Domain of the url.
url.original wildcard Unmodified original url as seen in the event source.
url.path wildcard Path of the request, such as "/search".
url.port long Port of the request, such as 443.
url.query keyword Query string of the request.
url.scheme keyword Scheme of the url.
url.subdomain keyword The subdomain of the domain.
user.changes.domain keyword Name of the directory the user is a member of.
user.changes.email keyword User email address.
user.changes.full_name keyword User's full name, if available.
user.changes.id keyword Unique identifier of the user.
user.changes.name keyword Short name or login of the user.
user.domain keyword Name of the directory the user is a member of.
user.email keyword User email address.
user.full_name keyword User's full name, if available.
user.id keyword Unique identifier of the user.
user.name keyword Short name or login of the user.
user.target.domain keyword Name of the directory the user is a member of.
user.target.email keyword User email address.
user.target.full_name keyword User's full name, if available.
user.target.id keyword Unique identifier of the user.
user.target.name keyword Short name or login of the user.
user_agent.original keyword Unparsed user_agent string.
vulnerability.category keyword Category of a vulnerability.
vulnerability.description keyword Description of the vulnerability.
vulnerability.id keyword ID of the vulnerability.
vulnerability.scanner.vendor keyword Name of the scanner vendor.
vulnerability.score.base float Vulnerability Base score.
vulnerability.score.version keyword CVSS version.
vulnerability.severity keyword Severity of the vulnerability.

For more information on the Intake Format, please find the code of the Parser, Smart Descriptions, and Supported Events here.

Further Readings