"original": "{\n \"metadata\": {\n \"customerIDString\": \"123123abcd\",\n \"offset\": 1,\n \"eventType\": \"DetectionSummaryEvent\",\n \"eventCreationTime\": 1686845212400,\n \"version\": \"1.0\"\n },\n \"event\": {\n \"ProcessStartTime\": 1686845212400,\n \"ProcessEndTime\": 0,\n \"ProcessId\": 123123,\n \"ParentProcessId\": 321321,\n \"ComputerName\": \"ELASTICHOST\",\n \"UserName\": \"ELASTICUSER\",\n \"DetectName\": \"NGAV\",\n \"DetectDescription\": \"This file is classified as Adware/PUP based on its SHA256 hash.\",\n \"Severity\": 2,\n \"SeverityName\": \"Low\",\n \"FileName\": \"TESTFILE.exe\",\n \"FilePath\": \"\\\\Device\\\\HarddiskVolume3\\\\Users\\\\ELASTICUSER\\\\Software\\\\TESTSOFTWARE\",\n \"CommandLine\": \"\\\"C:\\\\Users\\\\TESTUSER\\\\SOFTWARE\\\\TESTSOFTWARE\\\\FILE.exe\\\" -Embedding\",\n \"SHA256String\": \"0b2cde5b355bda69aeb15159fa98b5554053f0936259a53c6dfb0934389238a2\",\n \"MD5String\": \"49f30e09200e7b59edc5ef32fbd0442c\",\n \"SHA1String\": \"7e54a24d4df5b7fe4a75d7ce1c027705c368666b\",\n \"MachineDomain\": \"INTERNAL\",\n \"NetworkAccesses\": [\n {\n \"AccessType\": 0,\n \"AccessTimestamp\": 1686845157,\n \"Protocol\": \"TCP\",\n \"LocalAddress\": \"10.0.0.1\",\n \"LocalPort\": 53517,\n \"RemoteAddress\": \"67.43.156.1\",\n \"RemotePort\": 443,\n \"ConnectionDirection\": 0,\n \"IsIPV6\": false\n },\n {\n \"AccessType\": 0,\n \"AccessTimestamp\": 1686845158,\n \"Protocol\": \"TCP\",\n \"LocalAddress\": \"10.0.0.2\",\n \"LocalPort\": 53518,\n \"RemoteAddress\": \"67.43.156.1\",\n \"RemotePort\": 80,\n \"ConnectionDirection\": 0,\n \"IsIPV6\": false\n }\n ],\n \"FalconHostLink\": \"https://falcon.crowdstrike.com/activity/detections/detail/REFERENCE?_cid=CID\",\n \"SensorId\": \"sensorid123\",\n \"IOCType\": \"hash_sha256\",\n \"IOCValue\": \"0b2cde5b355bda69aeb15159fa98b5554053f0936259a53c6dfb0934389238a2\",\n \"DetectId\": \"detect::id::test\",\n \"LocalIP\": \"89.160.20.112\",\n \"MACAddress\": \"1c-2d-b3-4a-56-7e\",\n \"Tactic\": \"Malware\",\n \"Technique\": \"PUP\",\n \"Objective\": \"Falcon Detection Method\",\n \"PatternDispositionDescription\": \"Detection, process would have been blocked if related prevention policy setting was enabled.\",\n \"PatternDispositionValue\": 2304,\n \"PatternDispositionFlags\": {\n \"Indicator\": false,\n \"Detect\": false,\n \"InddetMask\": false,\n \"SensorOnly\": false,\n \"Rooting\": false,\n \"KillProcess\": false,\n \"KillSubProcess\": false,\n \"QuarantineMachine\": false,\n \"QuarantineFile\": false,\n \"PolicyDisabled\": true,\n \"KillParent\": false,\n \"OperationBlocked\": false,\n \"ProcessBlocked\": true,\n \"RegistryOperationBlocked\": false,\n \"CriticalProcessDisabled\": false,\n \"BootupSafeguardEnabled\": false,\n \"FsOperationBlocked\": false,\n \"HandleOperationDowngraded\": false,\n \"KillActionFailed\": false,\n \"BlockingUnsupportedOrDisabled\": false,\n \"SuspendProcess\": false,\n \"SuspendParent\": false\n },\n \"ParentImageFileName\": \"\",\n \"ParentCommandLine\": \"\",\n \"GrandparentImageFileName\": \"\",\n \"GrandparentCommandLine\": \"\",\n \"HostGroups\": \"hostgroupsID\",\n \"AssociatedFile\": \"\\\\Device\\\\HarddiskVolume3\\\\TESTUSER\\\\TESTELASTICUSER\\\\SOFTWARE\\\\TESTSOFTWARE\\\\FILE.exe\",\n \"PatternId\": 5728\n }\n}",
0 commit comments