Azure-Sentinel/Sample Data/AIVectraDetect.csv

16 KiB

1TimeGeneratedDeviceVendorDeviceEventClassIDLogSeverityDestinationIPDeviceNameSourceIPDeviceVersionActivityDestinationHostNameExternalIDSourceHostNameSourceUserNameDeviceCustomString4FlexNumber1FlexNumber2AdditionalExtensionsType
22020-03-23T04:56:44.907ZVectra Networkshsc310.0.1.2device110.0.2.35.5Host Score Changedevice2227device1user1https://xyz.rt.tv/hosts/279976cat=HOST SCORING;start=1584939404903;end=1584939404903CommonSecurityLog
32020-03-23T04:56:44.906ZVectra Networksasc310.0.2.3device210.0.3.55.5Account Score Changedevice3423device2adminhttps://xyz.rt.tv/accounts/234556cat=ACCOUNT SCORING;saccount=xyz.example.com;start=1584900305119;end=1584900305119CommonSecurityLog
42020-03-23T04:56:43.907ZVectra Networkscampaigns310.0.2.5device310.0.5.65.5winatp-gw-cus.microsoft.comdevice2525device3user2https://xyz.rt.tv/campaigns/241098at=CAMPAIGNS;reason=ConnectionCommonSecurityLog
52020-03-23T04:56:42.907ZVectra Networksaudit310.0.4.6device410.0.6.75.5user_actiondevice245device4user34556cat=user_action;outcome=TrueCommonSecurityLog
62020-03-23T04:56:41.907ZVectra Networkshealth310.0.2.3device510.0.7.25.5outcome=successdevice0521device5user12563heartbeat_checkCommonSecurityLog
72020-05-14T05:46:11.147ZVectra Networksreverse_rat010.20.5.52dogfood.vectra.io10.13.150.525.7External Remote Accessec2-100-20-5-52.us-west-2.compute.amazonaws.com44317d8:c4:6a:57:07:85adminhttps://dogfood.vectra.io/detections/44317?detail_id\=56169300cat=COMMAND & CONTROL;start=1585843645000;end=1589435013000CommonSecurityLog
82020-05-13T23:59:47.193ZVectra Networksfrontwatch50.0.0.0dogfood.vectra.io12.168.128.135.7Multi-home Fronted Tunnel44556demisto-vhe-5.0.0-20-62user1https://dogfood.vectra.io/detections/44556?detail_id\=5615365475cat=COMMAND & CONTROL;start=1589404113000;end=1589414267000CommonSecurityLog
92020-05-14T03:18:19.16ZVectra Networkssmb_enum_share710.100.199.87x4-3-14.sc.tvec10.100.199.105.7File Share Enumeration38dc2-aws-us-west-01adminhttps://x4-3-14.sc.tvec/detections/38?detail_id\=1237047cat=RECONNAISSANCE;start=1589426124000;end=1589426178000CommonSecurityLog
102020-05-14T05:46:29.577ZVectra Networkshidden_http_tunnel_cnc314.209.123.148x4-3-14.sc.tvec10.168.90.1035.7Hidden HTTP Tunnelec2-34-209-123-148.us-west-2.compute.amazonaws.com32Zanzibaruser2https://x4-3-14.sc.tvec/detections/32?detail_id\=2013759cat=COMMAND & CONTROL;start=1589424622000;end=1589435024000CommonSecurityLog
112020-05-14T03:23:30.64ZVectra Networksport_sweep50.0.0.0x4-3-14.sc.tvec10.100.199.105.7Port Sweep40dc2-aws-us-west-01user1https://x4-3-14.sc.tvec/detections/40?detail_id\=1255272cat=RECONNAISSANCE;start=1589425892000;end=1589426045000CommonSecurityLog
122020-05-14T01:14:37.297ZVectra Networksdarknet510.168.13.178x4-2-9.sc.tvec10.168.153.175.6Internal Darknet Scan132cr_leroy_brownhttps://x4-2-9.sc.tvec/detections/132?detail_id\=7125052cat=RECONNAISSANCE;start=1589240446000;end=1589355443000CommonSecurityLog
132020-05-14T05:34:43.93ZVectra Networkshidden_https_tunnel_cnc015.66.140.169dogfood.vectra.io10.168.55.765.7Hidden HTTPS Tunneled075b8f-ff30-4418-bd42-b37a61451a90.ods.opinsights.azure.com44563oms-azurehttps://dogfood.vectra.io/detections/44563?detail_id\=56168800cat=COMMAND & CONTROL;start=1589425685000;end=1589434339000CommonSecurityLog
142020-05-14T03:33:05.873ZVectra Networksbrute_force_i2i010.168.7.178dogfood.vectra.io10.168.54.2475.7Brute-Forcesourcecode.tvec44470buildvm27.vectra.iouser1https://dogfood.vectra.io/detections/44470?detail_id\=56163700cat=LATERAL MOVEMENT;start=1588475968000;end=1589425390000CommonSecurityLog
152020-05-14T03:12:45.757ZVectra Networkssmb_psexec210.100.199.10x4-3-14.sc.tvec10.168.199.305.7Suspicious Remote Execution36Deacon-desktopadminhttps://x4-3-14.sc.tvec/detections/36?detail_id\=1022095cat=LATERAL MOVEMENT;start=1589425711000;end=1589425785000CommonSecurityLog
162020-05-14T02:22:15.027ZVectra Networksldap_recon210.168.90.2x4-3-14.sc.tvec10.168.90.1015.7Suspicious LDAP Query27XianFSuser2https://x4-3-14.sc.tvec/detections/27?detail_id\=582125cat=RECONNAISSANCE;start=1589422763000;end=1589422764000CommonSecurityLog
172020-05-14T03:17:18.6ZVectra Networksport_scan610.168.60.61x4-3-14.sc.tvec10.168.30.1895.7Port Scan33Cabot-desktophttps://x4-3-14.sc.tvec/detections/33?detail_id\=1186080cat=RECONNAISSANCE;start=1589424950000;end=1589425650000CommonSecurityLog
182020-05-14T03:27:51.773ZVectra Networkspapi_rogue_admin70.0.0.0device65.7Privilege Anomaly: Unusual Service43user1https://x4-3-14.sc.tvec/detections/43?detail_id\=1277595cat=LATERAL MOVEMENT;account=deacon@lab.tme.local;start=1589426840000;end=1589426840000CommonSecurityLog
192020-05-14T05:12:30.773ZVectra Networkshidden_dns_tunnel_cnc110.168.90.2x4-3-14.sc.tvec10.168.90.1035.7Hidden DNS Tunnel48Zanzibarcognitohttps://x4-3-14.sc.tvec/detections/48?detail_id\=1931914cat=COMMAND & CONTROL;start=1589431742000;end=1589432874000CommonSecurityLog
202020-05-14T05:27:34.37ZVectra Networkscnc_dga18.8.8.8x4-3-14.sc.tvec10.168.173.2045.7Suspect Domain Activitymail.baffcaaccaacac.ru53IP-192.168.173.204https://x4-3-14.sc.tvec/detections/53?detail_id\=81616cat=COMMAND & CONTROL;start=1589433969000;end=1589434015000CommonSecurityLog
212020-05-14T00:14:30.24ZVectra Networkshidden_dns_tunnel_exfil410.168.55.10x4-3-14.sc.tvec10.168.51.65.7Hidden DNS Tunnelsnakeoil.biz12Jun-Longadminhttps://x4-3-14.sc.tvec/detections/12?detail_id\=234278cat=EXFILTRATION;start=1589414902000;end=1589415109000CommonSecurityLog
222020-05-14T05:01:12.407ZVectra Networkssmuggler010.10.150.122dogfood.vectra.io10.168.54.1215.7Data Smuggler725338656596.dkr.ecr.us-west-2.amazonaws.com44506buildvm19.vectra.iohttps://dogfood.vectra.io/detections/44506?detail_id\=56167400cat=EXFILTRATION;start=1588892692000;end=1589432362000CommonSecurityLog
232020-05-14T02:07:41.607ZVectra Networkspapi_breach90.0.0.0device75.7Privilege Anomaly: Unusual Trio25https://x4-3-14.sc.tvec/detections/25?detail_id\=549595cat=LATERAL MOVEMENT;account=svc-x45h8@corp.example.com;start=1589412661000;end=1589413687000CommonSecurityLog
242020-05-14T03:34:33.977ZVectra Networkswatchmen7192.168.13.19x4-2-9.sc.tvec10.168.153.175.6Suspicious Admin133cr_leroy_brownhttps://x4-2-9.sc.tvec/detections/133?detail_id\=7137073cat=LATERAL MOVEMENT;start=1589268477000;end=1589268477000CommonSecurityLog
252020-05-14T00:09:53.887ZVectra Networkssw_o365_paaAzureADAnomaly00.0.0.0device85.7O365 Suspicious AzureAD Operation44562user1https://dogfood.vectra.io/detections/44562?detail_id\=561547625cat=LATERAL MOVEMENT;account=O365:aleader@vectra.ai;start=1589406327000;end=1589406327000CommonSecurityLog
262020-05-14T01:59:45.857ZVectra Networksrpc_recon30.0.0.0x4-3-14.sc.tvec192.168.150.1005.7RPC Recon22Piper-desktophttps://x4-3-14.sc.tvec/detections/22?detail_id\=503063cat=RECONNAISSANCE;start=1589421555000;end=1589421555000CommonSecurityLog
272020-05-14T03:17:18.61ZVectra Networksstage_loader810.100.199.10x4-3-14.sc.tvec192.168.199.305.7Internal Stage Loader37Deacon-desktophttps://x4-3-14.sc.tvec/detections/37?detail_id\=1198888cat=LATERAL MOVEMENT;start=1589425711000;end=1589425824000CommonSecurityLog
282020-05-14T02:37:33.177ZVectra Networkstor110.16.0.1x4-3-14.sc.tvec192.168.152.1945.7TOR Activitywww.7tcqy6kttln6.com29IP-192.168.152.194adminhttps://x4-3-14.sc.tvec/detections/29?detail_id\=631413cat=COMMAND & CONTROL;start=1589423775000;end=1589423812000CommonSecurityLog
292020-05-14T03:07:34.377ZVectra Networksbinaryloader737.230.114.67x4-3-14.sc.tvec192.168.173.1015.7Malware Updatemail.baffcaaccaacac.ru35IP-192.168.173.101cognitohttps://x4-3-14.sc.tvec/detections/35?detail_id\=967078cat=COMMAND & CONTROL;start=1589425586000;end=1589425586000CommonSecurityLog
302020-05-14T04:07:21.503ZVectra Networkssmb_ransomware9192.168.12.5x4-3-14.sc.tvec192.168.152.1945.7Ransomware File Activity46DJCompuser2https://x4-3-14.sc.tvec/detections/46?detail_id\=1429077cat=LATERAL MOVEMENT;start=1589423897000;end=1589429106000CommonSecurityLog
312020-05-14T05:05:28.97ZVectra Networkssmash_n_grab6172.217.23.129x4-3-14.sc.tvec10.100.199.105.7Smash and Grab172.217.23.12951dc2-aws-us-west-01https://x4-3-14.sc.tvec/detections/51?detail_id\=1866011cat=EXFILTRATION;start=1589430827000;end=1589432626000CommonSecurityLog
322020-05-14T05:14:01.22ZVectra Networkshidden_https_tunnel_exfil9172.217.23.129x4-3-14.sc.tvec10.100.199.105.7Hidden HTTPS Tunnelfra16s18-in-f1.1e100.net52dc2-aws-us-west-01https://x4-3-14.sc.tvec/detections/52?detail_id\=1949580cat=EXFILTRATION;start=1589430827000;end=1589433101000CommonSecurityLog
332020-05-13T21:52:29.68ZVectra Networksawb10.0.0.0x4-3-14.sc.tvec192.168.173.1015.7Abnormal Web Activity5BThomas-Win7user1https://x4-3-14.sc.tvec/detections/5?detail_id\=131025cat=BOTNET ACTIVITY;start=1589405636000;end=1589406251000CommonSecurityLog
342020-05-13T21:17:31.157ZVectra Networksinternal_spreading210.168.173.207x4-3-14.sc.tvec192.168.122.495.7Automated Replication2IP-192.168.122.49https://x4-3-14.sc.tvec/detections/2?detail_id\=52222cat=LATERAL MOVEMENT;start=1589404574000;end=1589404601000CommonSecurityLog
352020-05-13T08:31:27.43ZVectra Networksout_dos111.1.1.2x4-3-14.sc.tvec192.168.196.95.6Outbound DoS29IP-192.168.196.9https://x4-3-14.sc.tvec/detections/29?detail_id\=511056cat=BOTNET ACTIVITY;start=1589358623000;end=1589358629000CommonSecurityLog
362020-05-13T08:54:32.61ZVectra Networksshell_knocker_c2s012.168.255.254x4-3-14.sc.tvec192.168.173.1015.6Shell Knocker Client31BThomas-Win7user1https://x4-3-14.sc.tvec/detections/31?detail_id\=5355cat=LATERAL MOVEMENT;start=1589357035000;end=1589358136000CommonSecurityLog
372020-05-13T08:54:32.617ZVectra Networksshell_knocker_s2c010.168.173.101x4-3-14.sc.tvec192.168.255.2545.6Shell Knocker Server32edgefw01cognitohttps://x4-3-14.sc.tvec/detections/32?detail_id\=5455cat=LATERAL MOVEMENT;start=1589355953000;end=1589356635000CommonSecurityLog
382020-05-13T09:33:34.047ZVectra Networksspam511.1.2.7x4-3-14.sc.tvec192.168.12.335.6Outbound Spam34IP-192.168.12.33adminhttps://x4-3-14.sc.tvec/detections/34?detail_id\=565095cat=BOTNET ACTIVITY;start=1589362339000;end=1589362372000CommonSecurityLog
392020-05-13T16:28:22.757ZVectra Networksbitcoin110.243.44.230x4-2-17.sc.tvec192.168.173.2015.6Cryptocurrency Miningapi.groupfabric.com130IP-192.168.173.201https://x4-2-17.sc.tvec/detections/130?detail_id\=5131090cat=BOTNET ACTIVITY;start=1589387249000;end=1589387249000CommonSecurityLog
402020-05-13T13:07:19.903ZVectra Networkshttp_cnc410.108.142.138x4-3-14.sc.tvec192.168.193.155.6Suspicious HTTPdata.torntv.net41IP-192.168.193.15user2https://x4-3-14.sc.tvec/detections/41?detail_id\=844060cat=COMMAND & CONTROL;start=1589375181000;end=1589375209000CommonSecurityLog
412020-05-13T13:24:23.74ZVectra Networkssql_inject510.168.14.73x4-3-14.sc.tvec192.168.174.1145.6SQL Injection Activity42IP-192.168.174.114https://x4-3-14.sc.tvec/detections/42?detail_id\=865077cat=LATERAL MOVEMENT;start=1589376192000;end=1589376215000CommonSecurityLog
422020-05-13T21:27:33.413ZVectra Networksclick_fraud30.0.0.0x4-3-14.sc.tvec192.168.173.1015.7Abnormal Ad Activity3IP-192.168.173.101user1https://x4-3-14.sc.tvec/detections/3?detail_id\=73010cat=BOTNET ACTIVITY;start=1589404267000;end=1589404865000CommonSecurityLog
432020-05-13T16:40:57.17ZVectra Networksstealth_post512.114.143.248x4-3-14.sc.tvec192.168.101.1015.6Stealth HTTP Postiqingjiangmiyu.com44IP-192.168.101.101https://x4-3-14.sc.tvec/detections/44?detail_id\=895094cat=COMMAND & CONTROL;start=1589387943000;end=1589387943000CommonSecurityLog
442020-05-13T09:05:27.903ZVectra Networksout_port_sweep50.0.0.0x4-3-14.sc.tvec192.168.152.1945.6Outbound Port Sweep33DJComphttps://x4-3-14.sc.tvec/detections/33?detail_id\=555095cat=BOTNET ACTIVITY;start=1589352122000;end=1589353668000CommonSecurityLog
452020-05-11T11:22:40.99ZVectra Networksrdp_recon710.168.14.73x4-2-9.sc.tvec192.168.76.225.6RDP Recon97IP-192.168.76.22https://x4-2-9.sc.tvec/detections/97?detail_id\=4837095cat=RECONNAISSANCE;start=1589195829000;end=1589196140000CommonSecurityLog
462020-05-07T06:49:07.023ZVectra Networksbrute_force_i2o111.1.2.18x4-2-9.sc.tvec172.16.199.725.6Brute-Forcefoo.com129IP-172.16.199.72https://x4-2-9.sc.tvec/detections/129?detail_id\=4971040cat=BOTNET ACTIVITY;start=1588834052000;end=1588834053000CommonSecurityLog
472020-05-11T16:23:29.357ZVectra Networkspapi_admin_peer_console50.0.0.0device95.6Privilege Anomaly: Unusual Account on Host111adminhttps://x4-2-9.sc.tvec/detections/111?detail_id\=5015595cat=LATERAL MOVEMENT;account=cj@corp.example.com;start=1589205383000;end=1589211865000CommonSecurityLog
482020-05-13T17:46:04.253ZVectra Networkslockdown35.6Account Lockdown80cognitohttps://x4-2-9.sc.tvec/accounts/80nullnullcat=LOCKDOWN;account=sysadmin@corp.example.com;start=1589391964246;end=1589391964246CommonSecurityLog
492020-05-12T16:28:29.81ZVectra Networkssmb_brute_force710.168.90.131x4-2-17.sc.tvec192.168.196.2075.6SMB Brute-Force125IP-192.168.196.207https://x4-2-17.sc.tvec/detections/125?detail_id\=4997054cat=LATERAL MOVEMENT;start=1589300883000;end=1589300884000CommonSecurityLog
502020-05-11T11:47:36.99ZVectra Networksrdp_anomaly710.168.12.11x4-2-9.sc.tvec192.168.76.225.6Suspicious Remote Desktop98andybhttps://x4-2-9.sc.tvec/detections/98?detail_id\=4847010cat=LATERAL MOVEMENT;start=1589197629000;end=1589197629000CommonSecurityLog
512020-05-13T17:26:02.197ZVectra Networkspapi_unusual_admin_console70.0.0.0device105.6Privilege Anomaly: Unusual Host100adminhttps://x4-2-9.sc.tvec/detections/100?detail_id\=6917595cat=LATERAL MOVEMENT;account=sysadmin@corp.example.com;start=1589091765000;end=1589358325000CommonSecurityLog
522020-05-11T17:13:32.003ZVectra Networksthreat_intel_exfil710.168.236.118x4-2-9.sc.tvec192.168.192.1945.6Threat Intelligence Matchmutton-raglans.rs112IP-192.168.192.194user1https://x4-2-9.sc.tvec/detections/112?detail_id\=5027460cat=EXFILTRATION;start=1589217153000;end=1589217170000CommonSecurityLog
532020-04-28T07:12:01.66ZVectra Networksrpc_recon_1to1310.168.90.2x4-3-14.sc.tvec192.168.90.1015.6RPC Targeted Recon98XianFScognitohttps://x4-3-14.sc.tvec/detections/98?detail_id\=4903810cat=RECONNAISSANCE;start=1588035191000;end=1588057274000CommonSecurityLog
542020-05-13T15:22:25.577ZVectra Networksp2p_cnc211.1.1.7x4-2-17.sc.tvec192.168.196.955.6Peer-To-Peer129IP-192.168.196.95user2https://x4-2-17.sc.tvec/detections/129?detail_id\=5122095cat=COMMAND & CONTROL;start=1589383283000;end=1589383320000CommonSecurityLog
552020-05-01T17:52:33.273ZVectra Networkskerberos_password_spray30.0.0.0dogfood.vectra.io10.0.2.1705.7Kerberos Brute-Sweep44464sjc-dc-1.vectra.iouser1https://dogfood.vectra.io/detections/44464?detail_id\=5503493851cat=RECONNAISSANCE;start=1588355149000;end=1588355402000CommonSecurityLog
562020-05-12T08:09:47.46ZVectra Networkssmb_enum_user010.168.7.119dogfood.vectra.io192.168.7.405.7SMB Account Scan44350sc-insightvmcognitohttps://dogfood.vectra.io/detections/44350?detail_id\=56025700cat=RECONNAISSANCE;start=1586243556000;end=1589270930000CommonSecurityLog
572020-04-22T15:33:26.577ZVectra NetworksTESTlockdownnullnullnullCommonSecurityLog
582020-05-13T00:09:26.95ZVectra Networkssw_o365_paaAnomaly00.0.0.0device115.7O365 Suspicious Sharepoint Operation44550user2https://dogfood.vectra.io/detections/44550?detail_id\=560839520cat=LATERAL MOVEMENT;account=O365:derek@vectra.ai;start=1589311201000;end=1589311201000CommonSecurityLog