Exosphere

Download 6
Last updated Nov 9, 2024

exosp-ransomware-process-logs

Fetch ransomware execution logs for specified date range from Exosphere service.

exosp-ransomware-process-logs [profile=PROFILE] [duration=NUM{mon|w|d|h|m|s}] [from=yyyyMMddHHmmss] [to=yyyyMMddHHmmss] [order=ORDER]
profile=PROFILE
Connect profile code of Exosphere
duration=NUM{mon|w|d|h|m|s}
Scan only recent data. You should use s(second), m(minute), h(hour), d(day), mon(month) time unit. For example, 10s means data from 10 seconds earlier.
from=yyyyMMddHHmmss
Start time of range. yyyyMMddHHmmss format. If you omit time part, it will be padded by zero.
to=yyyyMMddHHmmss
End time of range. yyyyMMddHHmmss format. If you omit time part, it will be padded by zero.
order=ORDER
asc or desc.

Output Fields

FieldTypeNameDescription
_timeDateEvent time
profileStringConnect profileExosphere connect profile code
emp_nameStringEmployee namee.g. Scott
dept_nameStringDepartment namee.g. HR
hostnameStringHostnameScott's MacBook Pro
os_nameStringOS namee.g. macos
userStringUsere.g. scott
imageStringProcess namee.g. TextExtract
company_nameStringCompany name
product_nameStringProduct name
signerStringDigital signer
sha256StringSHA256
image_pathStringImage pathe.g. /Users/scott/..
dept_pathStringDepartment pathe.g. Logpresso > HR