exosp-ransomware-access-logs
Fetch ransomware file access logs for specified date range from Exosphere service.
exosp-ransomware-access-logs [profile=PROFILE] [duration=NUM{mon|w|d|h|m|s}] [from=yyyyMMddHHmmss] [to=yyyyMMddHHmmss] [order=ORDER]
- profile=PROFILE
- Connect profile code of Exosphere
- duration=NUM{mon|w|d|h|m|s}
- Scan only recent data. You should use s(second), m(minute), h(hour), d(day), mon(month) time unit. For example,
10smeans data from 10 seconds earlier. - from=yyyyMMddHHmmss
- Start time of range. yyyyMMddHHmmss format. If you omit time part, it will be padded by zero.
- to=yyyyMMddHHmmss
- End time of range. yyyyMMddHHmmss format. If you omit time part, it will be padded by zero.
- order=ORDER
- asc or desc.
Output Fields
| Field | Type | Name | Description |
|---|---|---|---|
| _time | String | Event time | |
| profile | String | Connect profile | Exosphere connect profile code |
| emp_name | String | Employee name | e.g. Scott |
| dept_name | String | Department name | e.g. HR |
| hostname | String | Hostname | e.g. Scott's MacBook Pro |
| os_name | String | OS name | e.g. macos |
| user | String | User | e.g. scott |
| image | String | Process name | e.g. TextExtract |
| access_file_name | String | Access file name | e.g. document.zip |
| access_file_path | String | Access file path | e.g. /path/to/document.zip |
| company_name | String | Company name | |
| product_name | String | Product name | |
| signer | String | Digital signer | |
| sha256 | String | SHA256 | |
| image_path | String | Process path | |
| dept_path | String | Department path | e.g. Logpresso > HR |