Syslog Malware Event Infection Notification Example
<134>Nov 23 21:58:05 tap54.eng.JATP.net JATP: CEF:0|JATP|Cortex|3.6.0.15|cnc|TROJAN_Vertexbot.CY|5|externalId=353 eventId=13321 lastActivityTime=2016-02-24 02:17:25.638+00 src=31.170.165.131 dst=10.1.1.48 malwareSeverity=0.5 malwareCategory=Unknown cncServers=31.170.165.131
CEF Email Malware Event Notification Example:
2016-01-23 17:36:39.841+00 tap0.test.JATP.net CEF:0|JATP|Cortex|3.6.0.15|email|TROJAN_Zemot.CY|7|externalId=995 eventId=123 lastActivityTime=2016-01-23 17:36:39.841+00 src=50.154.149.189 dst=192.168.1.10 fileHash=d93216633bf6f86bc3076530b6e9ca6443fc75b5 fileName=abc.bin fileType=Zip archive data, at least v2.0 to extract startTime=2016-01-23 17:36:39.841+00
Syslog Email Malware Event Notification Example:
<134> Nov 23 18:50:00 tap0.test.JATP.net JATP: CEF:0|JATP|Cortex|3.6.0.15|email|TROJAN_Zemot.CY|7|externalId=995 eventId=123 lastActivityTime=2016-01-23 17:36:39.841+00 src=50.154.149.189 dst=192.168.1.10 fileHash=d93216633bf6f86bc3076530b6e9ca6443fc75b5 fileName=abc.bin fileType=Zip archive data, at least v2.0 to extract startTime=2016-01-23 17:36:39.841+00
CEF CnC Notification Example:
2016-01-23 17:36:39.841+00 tap0.test.JATP.net CEF:0|JATP|Cortex|3.6.0.15|cnc|TROJAN_Zemot.CY|7|externalId=995 eventId=123 lastActivityTime=2016-01-23 17:36:39.841+00 src=50.154.149.189 dst=192.168.1.10 malwareSeverity=0.5 malwareCategory=Trojan_DataTheft cncServers=50.154.149.189
Syslog CnC Notification Example:
<134> Nov 23 18:50:00 tap0.test.JATP.net JATP: CEF:0|JATP|Cortex|3.6.0.15|cnc|TROJAN_Zemot.CY|7|externalId=995 eventId=123 lastActivityTime=2016-01-23 17:36:39.841+00 src=50.154.149.189 dst=192.168.1.10 malwareSeverity=0.5 malwareCategory=Trojan_DataTheft cncServers=50.154.149.189
CEF File Submission Notification Example:
2016-01-23 17:36:39.841+00 tap0.test.JATP.net CEF:0|JATP|Cortex|3.6.0.15|submission|TROJAN_Zemot.CY|7|externalId=995 eventId=123 lastActivityTime=2016-01-23 17:36:39.841+00 src=50.154.149.189 dst=192.168.1.10 fileHash=d93216633bf6f86bc3076530b6e9ca6443fc75b5 fileName=abc.bin fileType=Zip archive data, at least v2.0 to extract submissionTime=2016- 01-23 17:36:39.841+00
Syslog File Upload Notification Example:
<134>Nov 23 21:58:05 tap54.eng.JATP.net JATP: CEF:0|JATP|Cortex|3.6.0.15|submission|VIRUS_NABUCUR.DC|5|externalId=354 eventId=13322 lastActivityTime=2016-02-24 02:25:05.163039+00src= dst= fileHash=12b1777e451ef24bcc940bc79cdd7a0ffb181d78 fileName= fileType=PE32 executable (GUI) Intel 80386, for MS Windows submissionTime=2016-02-24 02:25:05.163039+00
CEF Exploit Notification Example:
2016-01-23 17:36:39.841+00 tap0.test.JATP.net CEF:0|JATP|Cortex|3.6.0.15|exploit|Exploit|7|externalId=995 eventId=123 lastActivityTime=2016-01-23 17:36:39.841+00 src=50.154.149.189 dst=192.168.1.10 reqReferer=http://forums.govteen.com/content.php url=http://64.202.116.151/nzrems2/1
Syslog Exploit Notification Example:
<134>Nov 23 21:58:05 tap54.eng.JATP.net JATP: CEF:0|JATP|Cortex|3.6.0.15|exploit|Exploit|3|externalId=352 eventId=13319 lastActivityTime=2016-02-24 02:18:21.105811+00 src=64.202.116.124 dst=192.168.50.203 reqReferer=http:// www.christianforums.com/ url=http://64.202.116.124/5butqfk/?2
CEF Data Theft Notification Example:
2016-01-23 17:36:39.841+00 tap0.test.JATP.net CEF:0|JATP|Cortex|3.6.0.15|datatheft|2ND_ORDER_DLP_CUSTOMIZED : CreditCard_Rule|7|externalId=995 eventId=123 lastActivityTime=2016-01-23 17:36:39.841+00 src=50.154.149.189 dst=192.168.1.10 description=2ND_ORDER_DLP_CUSTOMIZED : CreditCard_Rule port=80 protocol=HTTP startTime=2016-01-23 17:36:39.841+00
Syslog Data Theft Notification Example:
<134> Nov 23 18:50:00 tap0.test.JATP.net JATP: CEF:0|JATP|Cortex|3.6.0.15|datatheft|2ND_ORDER_DLP_CUSTOMIZED : CreditCard_Rule|7|externalId=995 eventId=123 lastActivityTime=2016-01-23 17:36:39.841+00 src=50.154.149.189 dst=192.168.1.10 description=2ND_ORDER_DLP_CUSTOMIZED : CreditCard_Rule port=80 protocol=HTTP startTime=2016-01-23 17:36:39.841+00
CEF System Health Notification Example:
2016-01-23 17:36:39.841+00 tap0.test.JATP.net CEF:0|JATP|Cortex|3.6.0.15|3|traffic-health|5|desc=10.2.20.54 (10.2.20.54) received 0 KB of monitor traffic over last 10 minutes json={"pretty_age": "10 minutes", "ip": "10.2.20.54", "age": 10, "appliance": "10.2.20.54", "sample_size": 2, "traffic": "0”}
Syslog System Health Notification Example:
<134>Nov 24 17:12:55 tap0.eng.JATP.net JATP: CEF:0|JATP|Cortex|3.6.0.15|3|link-health|5|desc=Link eth1 on 10.2.20.54 (10.2.20.54) is down json={"interface": "eth1", "ip": "10.2.20.54", "appliance": "10.2.20.54", "app_id": "467dea60-d7da-11dd-83c7- 10bf48d79a6e", "up": false}
CEF System Audit Notification Examples:
2016-01-23 17:36:39.841+00 tap0.test.JATP.net CEF:0|JATP|Cortex|3.6.0.15|2|update-system-config|5|desc=descriptio json={ "user_id" : "8d7c450e-df6a-0ab6-193d-143bfc6f7cac", "user_name" : "test.JATP", "is_admin" : 0, "has_debug": 1 , "reset_password" : 1}
2016-01-23 17:36:39.841+00 tap0.test.JATP.net CEF:0|JATP|Cortex|3.6.0.15|2|update-smtp|5|desc=description json={ "user_id" : "8d7c450e-df6a-0ab6-193d-143bfc6f7cac", "user_name" : "test.JATP", "is_admin" : 0, "has_debug": 1 , "reset_password" : 1}
2016-01-23 17:36:39.841+00 tap0.test.JATP.net CEF:0|JATP|Cortex|3.6.0.15|2|reboot|5|desc=description json={ "user_id" : "8d7c450e-df6a-0ab6-193d-143bfc6f7cac", "user_name" : "test.JATP", "is_admin" : 0, "has_debug": 1 , "reset_password" : 1}
Syslog System Audit Notification Examples:
<134>Nov 24 14:32:59 tap0.eng.JATP.net JATP: CEF:0|JATP|Cortex|3.6.0.15|2|add-user|5|username=admin desc=Delete user 'jane' with id 'f263f0b1-353e-046c-1577-6adc1c96cb62' json={ "user_id" : "f263f0b1-353e-046c-1577-6adc1c96cb62", "user_name" : "jane"} <134>Nov 24 14:31:20 tap0.eng.JATP.net JATP: CEF:0|JATP|Cortex|3.6.0.15|2|update-user|5|username=admin desc=Updated user id '27ee212e-855d-08d4-953f-6b9cea46a679': name 'john', is admin: yes, has debug: yes, reset password: no json={ "user_id" : "27ee212e- 855d-08d4-953f-6b9cea46a679", "user_name" : "john", "is_admin" : 1, "has_debug": 1 , "reset_password" : 0}
Using CEF Alert eventID or incidentID to Display Details in the Juniper ATP Appliance Web UI
Given an incidentID or eventID, you can use the following URLs to display relative details in the Juniper ATP Appliance Web UI.
Replace “JATP_HOSTNAME_HERE” with your Juniper ATP Appliance host name, and replace “0000000” with the event_id or incident_id.
-
https://JATP_HOSTNAME_HERE/admin/index.html?incident_id=0000000
-
https://JATP_HOSTNAME_HERE/admin/index.html?event_id=0000000
The system will prompt for login/password if no login session is currently active.
CEF Extension Field Key=Value Pair Definitions
Juniper ATP Appliance uses the following parameters in its CEF extension field key=value pairs. The keys in extension have "=" sign; for example:. cncServers=a.b.c.d eventId=123. The fields before extensions are surrounded by pipes ("|"); for example: |login|, |cnc|, |JATP|.
The following table defines each extension field key in CEF and/or Syslog messages.
Extension Field Key |
Full Name & Description |
Event Type |
Data Type & Length |
CEF or Syslog Key Value (Example) |
---|---|---|---|---|
description= Only for System Audit |
description desc is the description of the system audit event |
Audit |
String 1023 characters |
description=update-user |
json= |
json output sends different data depending on what kind of System Audit event is referenced. The following sample json= is for update-user: json = { "user_id" : "2721f188-682e-03d0- 6dfa-5d5d688047b6", "username" : "test.JATP", "is_admin" : 0, "has_debug": 1 , "reset_password" : 0} |
Audit |
String 1023 characters |
json= This json= field is for login: <134> Nov 23 18:50:00 tap0.test.JATP.net JATP: CEF:0|JATP|Cortex|3.6.0. 15|2|login|5|username=a dmin desc=description json={ "user_id" : "8d7c450e-df6a-0ab6- 193d-143bfc6f7cac", "user_name" : "test.JATP", "is_admin" : 0, "has_debug": 1 , "reset_password" : 1} |
login |
Login |
Audit |
String |
login <134> Nov 23 18:50:00 tap0.test.JATP.net JATP: CEF:0|JATP|Cortex|3.6.0. 15|2|login|5|username=a dmin desc=description json={ "user_id" : "8d7c450e-df6a-0ab6- 193d-143bfc6f7cac", "user_name" : "test.JATP", "is_admin" : 0, "has_debug": 1 , "reset_password" : 1} |
login-fail |
Login failure |
Audit |
String |
login-fail <134> Nov 23 18:50:00 tap0.test.JATP.net JATP: CEF:0|JATP|Cortex|3.6.0. 15|2|loginfail| 5|username=admin desc=description json={ "user_id" : "8d7c450edf6a- 0ab6-193d- 143bfc6f7cac", "user_name" : "test.JATP", "is_admin" : 0, "has_debug": 1 , "reset_password" : 1} |
logout |
Lockout |
Audit |
String |
logout <134> Nov 23 18:50:00 tap0.test.JATP.net JATP: CEF:0|JATP|Cortex|3.6.0. 15|2|logout|5|username= admin desc=description json={ "user_id" : "8d7c450e-df6a-0ab6- 193d-143bfc6f7cac", "user_name" : "test.JATP", "is_admin" : 0, "has_debug": 1 , "reset_password" : 1} |
add-user |
Add User |
Audit |
String |
add-user <134> Nov 23 18:50:00 tap0.test.JATP.net JATP: CEF:0|JATP|Cortex|3.6.0. 15|2|adduser| 5|username=admin desc=description json={ "user_id" : "8d7c450edf6a- 0ab6-193d- 143bfc6f7cac", "user_name" : "test.JATP", "is_admin" : 0, "has_debug": 1 , "reset_password" : 1} |
update-user |
Update User |
Audit |
String |
update-user <134> Nov 23 18:50:00 tap0.test.JATP.net JATP: CEF:0|JATP|Cortex|3.6.0. 15|2|updateuser| 5|username=admin desc=description json={ "user_id" : "8d7c450edf6a- 0ab6-193d- 143bfc6f7cac", "user_name" : "test.JATP", "is_admin" : 0, "has_debug": 1 , "reset_password" : 1} |
update-system-config |
System Config Update |
Audit |
String |
update-system-config <134>Nov 24 14:35:48 tap0.eng.JATP.net JATP: CEF:0|JATP|Cortex|3.6.0. 15|2|update-systemconfig| 5|username=adm in desc=Updated update settings: software auto update: 'yes', Set hostname: 'tap0', Set server_fqdn : 'tap0.eng.JATP.net', Set ivp_format : 'application/ zip' remote shell enabled: yes json={ "do_auto_update" : 1, "hostname" : "tap0", "server_fqdn" : "tap0.eng.JATP.net", "ivp_format" : "application/zip", "remote_shell_enabled : 1 |
reboot |
Reboot |
Audit |
String |
reboot <134> Nov 23 18:50:00 tap0.test.JATP.net JATP: CEF:0|JATP|Cortex|3.6.0. 15|2|reboot|5|username =admin desc=description json={ "user_id" : "8d7c450edf6a- 0ab6-193d- 143bfc6f7cac", "user_name" : "test.JATP", "is_admin" : 0, "has_debug": 1 , "reset_password" : 1} |
appliance-connecthealth |
health of appliance connection |
Audit |
String |
appliance-connecthealth <134> Nov 23 18:50:00 tap0.test.JATP.net JATP: CEF:0|JATP|Cortex|3.6.0. 15|2|appliance-connecthealth| 5|username=adm in desc=description json={ "user_id" : "8d7c450e-df6a-0ab6- 193d-143bfc6f7cac", "user_name" : "test.JATP", "is_admin" : 0, "has_debug": 1 , "reset_password" : 1} |
link-health |
Link health |
link-health <134> Nov 23 18:50:00 tap0.test.JATP.net JATP: CEF:0|JATP|Cortex|3.6.0. 15|2|linkhealth| 5|username=adm in desc=description json={ "user_id" : "8d7c450e-df6a-0ab6- 193d-143bfc6f7cac", "user_name" : "test.JATP", "is_admin" : 0, "has_debug": 1 , "reset_password" : 1} |
||
traffic-health |
Traffic health |
traffic-health <134> Nov 23 18:50:00 tap0.test.JATP.net JATP: CEF:0|JATP|Cortex|3.6.0. 15|2|traffichealth| 5|username=adm in desc=description json={ "user_id" : "8d7c450e-df6a-0ab6- 193d-143bfc6f7cac", "user_name" : "test.JATP", "is_admin" : 0, "has_debug": 1 , "reset_password" : 1} |
||
clear-db |
Clear DB |
Audit |
String |
clear-db <134>Nov 24 16:32:03 tap0.eng.JATP.net JATP: CEF:0|JATP|Cortex|3.6.0. 15|2|cleardb| 5|username=admin desc=Clear event database json={ "status" : 0} |
restart-services |
Restart Services |
Audit |
String |
restart-services <134>Nov 24 14:37:07 tap54.eng.JATP.net JATP: CEF:0|JATP|Cortex|3.6.0. 15|2|restartservices| 5|username=ad min desc=Restart services json={ "status" : 0} |
add-report |
Add Report |
Audit |
String |
add-report <134>Nov 24 14:37:32 tap0.eng.JATP.net JATP: CEF:0|JATP|Cortex|3.6.0. 15|2|addreport| 5|username=adm in desc=Add report (id '300BF9F1-973B-4523- 8BEB-B82B70B78925') json={ "report_id" : "300BF9F1-973B-4523- 8BEB-B82B70B78925”} |
delete-report |
Delete Report |
Audit |
String |
delete-report <134>Nov 24 14:37:41 tap0.eng.JATP.netJATP JATP: CEF:0|JATP|Cortex|3.6.0. 15|2|deletereport| 5|username=adm in desc=Delete report (id 'CF411F54-EB45-0C41- 654A-AFA1B9FF9DEB') json={ "report_id" : "CF411F54-EB45-0C41- 654A-AFA1B9FF9DEB”} |
add-notification |
Add Notification |
Audit |
String |
add-notification <134>Nov 24 14:35:04 tap0.eng.JATP.net JATP: CEF:0|JATP|Cortex|3.6.0. 15|2|addnotification| 5|username =admin desc=Add notification (id 'AD5D3D6C-6A51-4BB5- 958A-A1B392D3DFDA') json={ "report_id" : "AD5D3D6C-6A51- 4BB5-958AA1B392D3DFDA”} |
delete-notification |
Delete Notification |
Audit |
String |
delete-notification <134>Nov 24 14:38:13 tap0.eng.JATP.net JATP: CEF:0|JATP|Cortex|3.6.0. 15|2|deletenotification| 5|username =admin desc=Delete notification (id '26EC53CA-B1A7-4DBAA111- 013CD2548FFD') json={ "report_id" : "26EC53CA-B1A7-4DBAA111- 013CD2548FFD”} |
add-siem |
Add SIEM |
Audit |
String |
add-siem <134>Nov 24 14:29:08 tap0.eng.JATP.net JATP: CEF:0|JATP|Cortex|3.6.0. 15|2|addsiem| 5|username=admin desc=Add SIEM upload to 'splunktest. eng.JATP.net' (id '768687F7-4A81-42AF- 897A-6814A48D4155') json={ "report_id" : "768687F7-4A81-42AF- 897A-6814A48D4155", "host_name": "splunktest. eng.JATP.net”} |
delete-siem |
Delete SIEM |
Audit |
String |
delete-siem <134>Nov 24 14:38:57 tap0.eng.JATP.net JATP: CEF:0|JATP|Cortex|3.6.0. 15|2|deletesiem| 5|username=admin desc=Delete SIEM upload to '10.9.8.7' (id '8165C17F-F375-4226- 8E7A-BC8E690E3370') json={ "report_id" : "8165C17F-F375-4226- 8E7A-BC8E690E3370", "host_name": "10.9.8.7”} |
add-email-collector |
Add Email Collector |
Audit |
String |
add-email-collector <134>Nov 24 14:39:35 tap0.eng.JATP.net JATP: CEF:0|JATP|Cortex|3.6.0. 15|2|add-emailcollector| 5|username=a dmin desc=Add email collector from '10.2.10.3' (id '5FB8FFDC-7024- 467A-8AC8- 6CD68CA8781D') json={ "report_id" : "5FB8FFDC- 7024-467A-8AC8- 6CD68CA8781D", "host_name": "10.2.10.3”} |
delete-email-collector |
Delete Email Collector |
Audit |
String |
delete-email-collector <134>Nov 24 14:39:09 tap0.eng.JATP.net JATP: CEF:0|JATP|Cortex|3.6.0. 15|2|delete-emailcollector| 5|username=a dmin desc=Delete email collector from '10.2.10.7' (id '6C36F94A-3CF2- 45D8-83B9- CDF50BE0490B') json={ "report_id" : "6C36F94A-3CF2- 45D8-83B9- CDF50BE0490B", "host_name": "10.2.10.7”} |
dst= |
destinationIPAddress dst represents the IP address of the destination when any communication to an external host is observed within the detection engine. |
Events |
IPv4 and IPv6 Addresses |
dst=128.12.38.6 Note:
Note: This could also be the destination IP address from which the user downloaded malware; this extension is not specific to infection only. |
lastActivityTime= |
Time stamp of the last activity associated with this event. |
Events |
string 1023 characters |
lastActivityTime=2016- 12-26 18:06:52.333023+00 |
fileHash= |
fileHash represents the checksum of the malware object from a Juniper ATP Appliance detection engine |
Events |
255 characters |
filehash=3174990d783f4 a1bd5e99db60176b920 |
fileName= |
fileName represents the name of the object file analyzed by Juniper ATP Appliance detection engine |
Events |
255 characters |
fileName=Trojan.Generic |
fileType= |
fileType represents the analyzed object type. |
Events |
255 characters |
fileType=pdf |
startTime= |
startTime represents the date and time of the initial malware event in the Juniper ATP Appliance detection system. |
Event |
string 1023 characters |
startTime=2016-08-11 18:22:19 |
malwareSeverity= |
Severity risk in the range 0-10 |
Event |
integer |
malwareSeverity=0.75 |
malwareCategory= |
Juniper ATP Appliance malware category determination |
Event |
string 1023 characters |
malwareCategory= |
cncServers= |
IP address of the CnC server associated with this event |
Event |
IPv4 and IPv6 Addresses |
cncServers=31.170.165.131 |
submissionTime= |
Date and time of user File Submit option from the CM Web UI |
Event |
data |
submissionTime=2016- 12-26 17:54:46.04875+00 |
src= |
The source address associated with this malware event. |
Event |
IPv4 and IPv6 Addresses |
src=64.202.116.124 |
dst= |
The source address associated with this malware event. |
Event |
IPv4 and IPv6 Addresses |
dst=10.1.1.1 |
reqReferer= |
The URL of the HTTP address that triggered or with which the malware exploit is associated |
Event |
URL |
reqReferer=http:// www.christianforums.com/ |
url= |
The URL associated with an exploit malware event. |
Event |
URL |
url=http:// 64.202.116.124/5butqfk/ ?2 |
ExternalId= |
The Juniper ATP Appliance incident number. Example: externalId=1003 |
Extern al ID |
The Juniper ATP Appliance incident number. |
Example: externalId=1003 |
EventId= |
The Juniper ATP Appliance Event ID number. Example: eventId=13405 |
Event ID |
The Juniper ATP Appliance Event ID number. |
Example: eventId=13405 |
username= |
The admin or user’s username Username is included in System Audit Syslogs. |
Event |
string |
Example: username=”s_roberts” |
port= |
Port number associated with the event |
Event |
integer |
port=22 |
protocol= |
Protocol associated with the event |
Event |
integer |
protocol=http |
appliance-connecthealth |
Connection health between Web Collectors and Secondary Cores. |
Health |
String |
<134> Nov 23 18:50:00 tap0.test.JATP.net JATP: CEF:0|JATP|Cortex|3.6.0. 15|2|appliance-connecthealth| 5|username=adm in desc=description json={ "user_id" : "8d7c450e-df6a-0ab6- 193d-143bfc6f7cac", "user_name" : "test.JATP", "is_admin" : 0, "has_debug": 1 , "reset_password" : 1} |
traffic-health |
Traffic health |
Health |
String |
traffic-health <134> Nov 23 18:50:00 tap0.test.JATP.net JATP: CEF:0|JATP|Cortex|3.6.0. 15|2|traffichealth| 5|desc=description json={ "user_id" : "8d7c450e-df6a-0ab6- 193d-143bfc6f7cac", "user_name" : "test.JATP", "is_admin" : 0, "has_debug": 1 , "reset_password" : 1} |
link-health |
Link health |
Health |
String |
link-health <134> Nov 23 18:50:00 tap0.test.JATP.net JATP: CEF:0|JATP|Cortex|3.6.0. 15|2|linkhealth| 5|desc=description json={ "user_id" : "8d7c450e-df6a-0ab6- 193d-143bfc6f7cac", "user_name" : "test.JATP", "is_admin" : 0, "has_debug": 1 , "reset_password" : 1} |
services-health |
Services health |
Health |
String |
services-health <134> Nov 23 18:50:00 tap0.test.JATP.net JATP: CEF:0|JATP|Cortex|3.6.0. 15|2|serviceshealth| 5|desc=description json={ "user_id" : "8d7c450e-df6a-0ab6- 193d-143bfc6f7cac", "user_name" : "test.JATP", "is_admin" : 0, "has_debug": 1 , "reset_password" : 1} |
src_hostname |
Hostname of the threat source. Information is obtained from Active Directory (applicable to SMB Lateral detection where host details of threat source are obtained from Active Directory) |
Event |
String |
Dec 2 17:17:25 IP Dec 02 17:08:08 hostname CEF:0|JATP|Cortex|3.6.0. 1444|cnc|TROJAN_DUSV EXT.|10|externalId=1489 eventId=14046 lastActivityTime=2016- 05-03 00:08:08.349+00 src=31.170.165.131 dst=172.20.1.201 src_hostname= dst_hostname=emailuse r-host src_username= dst_username=emailuse r malwareSeverity=0.75 malwareCategory=Troja n_Generic cncServers=31.170.165.131 |
dst_hostname |
Endpoint hostname (threat target); information is obtained from Active Directory |
Event |
String |
Dec 6 16:52:22 IP Dec 06 16:51:38 hostname CEF:0|JATP|Cortex|3.6.0. 1444|email|Phishing|8|e xternalId=1504 eventId=14067 lastActivityTime=2016- 12-06 23:51:38+00 src= dst= src_hostname= dst_hostname= src_username= dst_username=src_email_id=src@abc.com dst_email_id={test@abc.com} startTime=2016- 12-06 23:51:38+00 url=http:// greatfilesarey.asia/QA/ files_to_pcaps/ 74280968a4917da52b5 555351eeda969.bin fileHash=bce00351cfc55 9afec5beb90ea387b037 88e4af5 fileType=PE32 executable (GUI) Intel 80386, for MS Windows |
src_username |
Username of the person logged in into the threat source host. Information is obtained from Active Directory (applicable to Lateral spread because only then we will get the host details of threat source from Active Directory) |
Event |
String |
Dec 3 16:42:24 IP Dec 03 16:42:54 hostname CEF:0|JATP|Cortex|3.6.0. 1444|email|Phishing|8|e xternalId=1499 eventId=14058 lastActivityTime=2016- 05-03 23:42:54+00 src= dst= src_hostname= dst_hostname= src_username= dst_username=src_email_id=src@abc.com dst_email_id={test1@ab c.com,test2@abc.com,test3@abc.com,} url=http:/ /greatfilesarey.asia/QA/ fileType=PE32 executable (GUI) Intel 80386, for MS Windows |
dst_username: Username of the person logged in into the threat target host. Information is obtained from Active Directory. |
Dec 3 16:42:24 IP Dec 03 16:42:54 hostname CEF:0|JATP|Cortex|3.6.0. 1444|email|Phishing|8|e xternalId=1499 eventId=14058 lastActivityTime=2016- 05-03 23:42:54+00 src= dst= src_hostname= dst_hostname= src_username= dst_username=src_email_id=src@abc.com dst_email_id={test1@ab c.com,test2@abc.com,test3@abc.com,} url=http:/ /greatfilesarey.asia/QA/ fileType=PE32 executable (GUI) Intel 80386, for MS Windows |
|||
src_email_id |
Email ID of the sender of the email |
Event |
String |
Dec 3 16:42:24 IP Dec 03 16:42:54 hostname CEF:0|JATP|Cortex|3.6.0. 1444|email|Phishing|8|e xternalId=1499 eventId=14058 lastActivityTime=2016- 05-03 23:42:54+00 src_email_id=src@abc.com dst_email_id={test1@ab c.com,test2@ab c.com,test3@ab c.com,} startTime=2016-05-03 23:42:54+00 url=http:// greatfilesarey.asia/QA/ files_to_pcaps/ 74280968a4917da52b5 555351eeda969.bin fileType=PE32 executable (GUI) Intel 80386, for MS Windows |
dst_email_id |
Email IDs of recipients |
Event |
String |
Dec 3 16:42:24 IP Dec 03 16:42:54 hostname CEF:0|JATP|Cortex|3.6.0. 1444|email|Phishing|8|e xternalId=1499 eventId=14058 lastActivityTime=2016- 05-03 23:42:54+00 src_email_id=src@abc.com dst_email_id={test1@ab c.com,test2@ab c.com,test3@ab c.com,} startTime=2016-05-03 23:42:54+00 url=http:// greatfilesarey.asia/QA/ files_to_pcaps/ 74280968a4917da52b5 555351eeda969.bin fileType=PE32 executable (GUI) Intel 80386, for MS Windows |
url |
Bad URLs sent in email (In CEF/Syslog, the maximum number of bad URLs Juniper ATP Appliance sends is 5, separated by a character space) |
Event |
String |
Dec 3 16:42:24 IP Dec 03 16:42:54 hostname CEF:0|JATP|Cortex|3.6.0. 1444|email|Phishing|8|e xternalId=1499 eventId=14058 lastActivityTime=2016- 05-03 23:42:54+00 src_email_id=src@abc.com dst_email_id={test1@ab c.com,test2@ab c.com,test3@ab c.com,} startTime=2016-05-03 23:42:54+00 url=http:// greatfilesarey.asia/QA/ files_to_pcaps/ 74280968a4917da52b5 555351eeda969.bin fileType=PE32 executable (GUI) Intel 80386, for MS Windows |