getIncidentsByIds
You can use this method to retrieve information on multiple incidents, by referencing their IDs.
API url: CONTROL_CENTER_APIs_ACCESS_URL/v1.2/jsonrpc/incidents
Parameters
Parameter | Description | Included in request | Type | Values |
|---|---|---|---|---|
| The IDs of the incidents you want to retrieve information for. | Mandatory | Array of Strings | The list can contain up to 10 IDs. |
These are common parameters, available across all public API methods:
Parameter | Description | Included in request | Type | Values |
|---|---|---|---|---|
| This parameter adds an identifier to the request, linking it to its corresponding response. The target replies with the same value in the response, allowing easy call tracking. | Mandatory | String | No additional requirements. |
| The name of the method you are using to send the request. | Mandatory | String | Must be a valid method name. |
| The version of JSON-RPC used by the request and the response. | Mandatory | String | The only possible value is |
| An object containing the configuration of the request. | Mandatory | Object | No additional requirements. |
Return value
Attribute | Type | Description |
|---|---|---|
| Array of Objects | Details about the incidents referenced in the request. For information about each object in the array, refer to |
Objects
result
Attribute | Type | Description |
|---|---|---|
| String | The internal incident ID, which is included in the URL of the incident details page from GravityZone Control Center. |
| Integer | The incident ID displayed in GravityZone Control Center, in the Incidents page, without the |
| String | The type of the incident. Possible values:
The value of this field determines what information is included in the |
| Object | Details about the company where the incident was generated. The object contains the following settings:
|
| String | The status of the incident. Possible values:
|
| String | The incident type, determined by the main action that was taken automatically by the protection technologies when it was detected. Possible values:
|
| String | The date and time when the incident was detected in the network, in ISO-8601 format. |
| String | The date and time when the incident was last updated by GravityZone, in ISO-8601 format. |
| String | The date and time when the incident was last processed by GravityZone, in ISO-8601 format. |
| Integer | The severity score assigned to the incident, as reported by the detection technologies. Possible values: |
| String | A URL linking to a web page where the incident details can be viewed in a browser. |
| Object | The GravityZone user that is assigned to this incident. The object contains the following settings:
|
| String | The priority assigned to the incident. Possible values:
|
| Array of Strings | A list of attack types detected in the incident. Each String can be, for example:
|
| Object | Additional information regarding the incident. The information depends on the value assigned to the When
When
|
| Array of Objects | A list of notes that were attached to the incident. Each note contains the following settings:
|
partOf (Endpoint and Organization incidents) and contains (Organization incidents)
Attribute | Type | Description |
|---|---|---|
| String | The ID of the incident. |
| String | A URL that can be used to open the incident in GravityZone Control Center after logging in. |
counters (Endpoint incidents)
Attribute | Type | Description |
|---|---|---|
| Integer | The number of endpoints involved in the incident. |
| Integer | The number of files involved in the incident. |
| Integer | The number of processes involved in the incident. |
| Integer | The number of domains involved in the incident. |
| Integer | The number of registry keys involved in the incident. This applies only to endpoints that use Windows. |
| Integer | The number of system events involved in the incident. |
| Integer | The number of storage devices involved in the incident. |
counters (Organization incidents)
Attribute | Type | Description |
|---|---|---|
| Integer | The number of endpoints involved in the incident. |
| Integer | The number of servers involved in the incident. |
| Integer | The number of mobile devices involved in the incident. |
| Integer | The number of printers involved in the incident. |
| Integer | The number of routers involved in the incident. |
| Integer | The number of Internet-of-Things involved in the incident. |
| Integer | The number of identities involved in the incident. |
| Integer | The number of emails involved in the incident. |
| Integer | The number of IPs involved in the incident. |
| Integer | The number of domains involved in the incident. |
| Integer | The number of domain name servers involved in the incident. |
| Integer | The number of domain generation algorithms (DGAs) involved in the incident. |
| Integer | The number of cloud storages involved in the incident. |
| Integer | The number of Tor nodes involved in the incident. |
| Integer | The number of external drives involved in the incident. |
| Integer | The number of external sources involved in the incident. |
| Integer | The number of exfiltrated files involved in the incident. |
| Integer | The number of internal IPs involved in the incident. |
| Integer | The number of internal emails involved in the incident. |
| Integer | The number of users involved in the incident. |
| Integer | The number of virtual desktops involved in the incident. |
| Integer | The number of containers (docker, k8s, etc.) involved in the incident. |
| Integer | The number of databases involved in the incident. |
| Integer | The number of storages involved in the incident. |
| Integer | The number of Microsoft 365 (Office 365) instances involved in the incident. |
| Integer | The number of Active Directory instances involved in the incident. |
| Integer | The number of Azure Active Directory instances involved in the incident. |
| Integer | The number of Google Cloud Platform instances involved in the incident. |
| Integer | The number of Google Workspace instances involved in the incident. |
| Integer | The number of Atlassian instances involved in the incident. |
| Integer | The number of Atlassian Bitbucket products involved in the incident. |
| Integer | The number of Atlassian Jira products involved in the incident. |
| Integer | The number of Atlassian Confluence products involved in the incident. |
| Integer | The number of Bitbucket projects involved in the incident. |
| Integer | The number of Confluence spaces involved in the incident. |
| Integer | The number of AWS instances involved in the incident. |
nodes (Endpoint incidents)
Attribute | Type | Description |
|---|---|---|
| String | The ID of the node. |
| String | The name of the node. |
| String | The type of the node. Possible values:
|
| Array of Strings | A list of alert IDs. These correlate with the objects from |
| Object | The details available for the node. The data contained by this object varies based on the value of the When
When
When
When
When
For any other types, the |
fileProcess (file node) and process (registry or domain node)
Attribute | Type |
|---|---|
| Integer |
| String |
| String |
sandbox (file or process_execution node)
Attribute | Type |
|---|---|
| String |
quarantine (file or process_execution node)
Attribute | Type |
|---|---|
| String |
file (process_execution node)
Attribute | Type |
|---|---|
| String |
| String |
| String |
| String |
| Integer |
| Boolean |
process (process_execution node)
Attribute | Type | Description |
|---|---|---|
| Integer | |
| String | |
| String | |
| String | |
| String | |
| String | |
| Object | The Object contains:
|
killProcess (process_execution node)
Attribute | Type |
|---|---|
| String |
| Integer |
registry (registry node)
Attribute | Type |
|---|---|
| String |
| String |
| String |
domain (domain node)
Attribute | Type |
|---|---|
| String |
| Integer |
| String |
| String |
| String |
| String |
file (domain node)
Attribute | Type |
|---|---|
| Integer |
| String |
| String |
nodes (Organization incidents)
Attribute | Type | Description |
|---|---|---|
| String | The ID of the node. |
| String | The name of the node. |
| Boolean | Indicates if the node is a resource from the client’s network or not. |
| String | The type of the node. Possible values:
|
| Object | The details available for this node. The data contained by this object varies based on the value of the |
details (Organization incident node)
Value of | Attribute | Type |
|---|---|---|
|
| String |
| Array of Strings | |
| Array of Strings | |
| String | |
|
| String |
| Array of Strings | |
| Array of Strings | |
| String | |
| Array of Strings | |
|
| String |
| String | |
| String | |
| String | |
| String | |
|
| String |
| String | |
|
| String |
|
| String |
| Array of Strings | |
| String | |
| Array of Strings | |
|
| String |
| Array of Strings | |
| String | |
|
| String |
| Array of Strings | |
|
| String |
|
| String |
| String | |
|
| String |
| String | |
|
| String |
| String | |
|
| Array of Strings |
| Array of Strings | |
| String | |
|
| Array of Strings |
| Array of Strings | |
| String | |
|
| Array of Strings |
| Array of Strings | |
| String | |
|
| Array of Strings |
| Array of Strings | |
| String | |
| String | |
| String | |
|
| Array of Strings |
| Array of Strings | |
| String | |
| String | |
| String | |
| String | |
|
| Array of Strings |
| Array of Strings | |
| String | |
| String | |
|
| String |
|
| String |
| Array of Strings | |
| Array of Strings | |
|
| String |
|
| String |
| String | |
|
| String |
| String | |
| String |
alerts (Endpoint incidents)
Attribute | Type | Description |
|---|---|---|
| String | The ID of the alert. |
| String | The name of the alert. |
| String | The date and time when the alert was detected in the network. |
| Object | The object contains information about who detected the alert:
|
| Array of Objects | The objects contain information regarding the resources involved in the alert:
|
| Array of Objects | Extra information for the alert. Each object contains:
|
details (alerts > resources)
Value of | Attribute | Type |
|---|---|---|
|
| String |
| Integer | |
| String | |
| String | |
| String | |
| String | |
| String | |
| String | |
| String | |
| String | |
| String | |
| String | |
| String | |
| String | |
| String | |
| String | |
| String | |
|
| String |
| String | |
| Integer | |
| String | |
| Integer | |
| String | |
| String | |
| String | |
| String | |
| String | |
| Integer | |
| Integer | |
| Integer | |
| Integer | |
| String | |
| String | |
| Integer | |
| Integer | |
| String | |
| Integer | |
| String | |
| String | |
| String | |
| String | |
| String | |
| String | |
| String | |
| String | |
| String | |
| Integer | |
| String | |
| String | |
| String | |
| String | |
| String | |
| String | |
| String | |
| String | |
| String | |
| Integer | |
| String | |
| String | |
| String | |
| String | |
| String | |
| String | |
| String | |
| String | |
| String | |
| String | |
| String | |
| String | |
|
| Integer |
| String | |
| Integer | |
| String | |
| Integer | |
| String | |
| String | |
| String | |
| String | |
| String | |
| Integer | |
| String | |
| Integer | |
| String | |
| Integer | |
| Integer | |
| String | |
| String | |
| String | |
| String | |
| String | |
|
| String |
| String | |
| String | |
| String | |
| String |
alerts (Organization incidents)
Attribute | Type | Description |
|---|---|---|
| String | The ID of the alert. |
| String | The name of the alert. |
| String | The date and time when the alert was detected in the network, in ISO-8601 format. |
| Array of Strings | Sensors that detected the alert. Possible values:
|
| String | The MITRE tactic detected for this alert. Possible values:
|
| Array of Objects | This array contains data used to build the incident graph. It indicates how nodes connect. Each Object contains:
|
resources (Organization incident transition)
Attribute | Type | Description |
|---|---|---|
| String | The name of the resource. |
| String | The type of the resource. Possible values:
|
| Object | Details for the resource. Schema depends on the For more information on the fields included in this object, refer to |
details (Organization incident resource)Value of | Attribute | Type (and description) |
|---|---|---|
|
| String |
|
| String |
| String | |
|
| String |
|
| String |
| String | |
| Integer | |
| String | |
| String | |
| String | |
|
| String |
| String | |
| String | |
| String | |
| String | |
| String (ISO-8601) | |
| String | |
| Object Contains the following attributes:
| |
| Array of Objects Each Object contains the following attributes:
| |
| Array of Objects Each Object contains the following attributes:
| |
| Array of Objects Each Object contains the following attributes:
| |
| Array of Strings | |
| Array of Objects Each Object contains the following attributes:
| |
|
| String |
|
| String |
| String | |
| String | |
|
| String |
| String | |
|
| String |
|
| String |
| String | |
|
| String |
| String |
transitions (Endpoint incidents)
Attribute | Type | Description |
|---|---|---|
| String | The ID of the origin node. |
| String | The ID of the destination node. |
| String | The date and time of the transition, in ISO-8601 format. |
mitreTags (Endpoint and Organization incidents)
Attribute | Type | Description |
|---|---|---|
| String | The category the MITRE technique belongs to. |
| Array of Objects | The MITRE techniques detected for this category. Each object contains:
|
subtechniques (mitreTags > techniques)
Attribute | Type | Description |
|---|---|---|
| String | The ID of the MITRE sub-technique (for example, |
| String | The name of the MITRE sub-technique (for example, |
cves (Organization incidents)
Attribute | Type | Description |
|---|---|---|
| String | The ID of a CVE (for example, |
suspectedActors (Organization incidents)
Attribute | Type | Description |
|---|---|---|
| String | The name of the suspected actor. |
| Integer | Confidence score for correlating the attack with this actor. |
| Array of Objects | Reasons why this attack was correlated with this actor. Each Object contains:
|
incidentEvolution (Endpoint and Organization incidents)
Attribute | Type | Description |
|---|---|---|
| String | The internal incident ID, which is included in the URL of the incident details page from GravityZone Control Center. |
| Integer | The incident ID displayed in GravityZone Control Center, in the Incidents page, without the |
| String | The status of the incident. Possible values:
|
| String | A URL linking to a web page where the incident details can be viewed in a browser. |
Example
Request:
{
"id": "a1b2c3d4-e5f6-7890-abcd-ef1234567890",
"jsonrpc": "2.0",
"method": "getIncidentsByIds",
"params": {
"ids": [
"6a1b2c3d4e5f67890abcde01",
"6a1b2c3d4e5f67890abcde02"
]
}
} Response:
{
"id": "a1b2c3d4-e5f6-7890-abcd-ef1234567890",
"jsonrpc": "2.0",
"result": [
{
"incidentId": "6a1b2c3d4e5f67890abcde01",
"incidentNumber": 101,
"status": "closed",
"mainAction": "reported",
"created": "2026-03-15T15:03:03+00:00",
"lastUpdated": "2026-03-15T15:03:03+00:00",
"lastProcessed": "2026-04-10T11:17:51+00:00",
"severityScore": 48,
"incidentLink": "https://your-gz-console.example.com/#!/incidents/view/6a1b2c3d4e5f67890abcde01",
"assignee": {
"userId": "5f4e3d2c1b0a987654321fed",
"userName": "john.smith@example.com",
"companyId": "5e4d3c2b1a0987654321fedc",
"companyName": "Acme Corporation"
},
"priority": "unknown",
"attackTypes": [
"Exfiltration",
"SpearPhishing",
"Exploit"
],
"company": {
"id": "5e4d3c2b1a0987654321fedc",
"name": "Acme Corporation"
},
"incidentType": "extendedIncident",
"details": {
"counters": {
"endpoints": 1,
"servers": 0,
"mobileDevices": 0,
"printers": 0,
"routers": 0,
"IoTs": 0,
"identities": 3,
"emails": 0,
"IPs": 2,
"domains": 0,
"DNSs": 0,
"DGAs": 0,
"cloudStorages": 0,
"torNodes": 0,
"externalDrives": 0,
"externalSources": 3,
"exfiltratedFiles": 4,
"internalIPs": 0,
"internalEmails": 3,
"users": 3,
"virtualDesktops": 0,
"containers": 0,
"databases": 0,
"storages": 0,
"office365Instances": 0,
"ADInstances": 0,
"azureADInstances": 1,
"AWSInstances": 0,
"GCPInstances": 0,
"googleWorkspaceInstances": 0,
"atlassianInstances": 0,
"atlassianBitbucketProducts": 0,
"atlassianJiraProducts": 0,
"atlassianConfluenceProducts": 0,
"bitbucketProjects": 0,
"confluenceSpaces": 0
},
"incidentEvolution": [
{
"incidentId": "6a1b2c3d4e5f67890abcde05",
"incidentNumber": 105,
"status": "false_positive",
"incidentLink": "https://your-gz-console.example.com/#!/incidents/view/6a1b2c3d4e5f67890abcde05"
}
],
"contains": [],
"partOf": [],
"cves": [],
"suspectedActors": [],
"killChainPhases": [
"initial_access",
"execution",
"credential_access",
"lateral_movement",
"collection",
"command_and_control",
"exfiltration"
],
"lastKillChainPhase": "exfiltration",
"alerts": [
{
"id": "7a1b2c3d4e5f67890abcde01",
"name": "SuspiciousEmailReceived",
"date": "2026-03-15T14:57:03+00:00",
"sensors": [
"office_365",
"EDR"
],
"tactic": "initial_access",
"transitions": [
{
"from": "8a1b2c3d4e5f67890abcde01",
"to": "8a1b2c3d4e5f67890abcde02",
"resources": [
{
"name": "Important Update",
"type": "email",
"details": {
"id": "AAMkADNiNWU0YTljLTRiYmEtNGFlMi1iNzRhLWI5NDk4Y2QwOWM1NQBGAAAAAAD3LHfFVxR-TIchBqXPMdrxBwAlFp_8PvdsSKRtFCjiDPaqAAAAAAEMAAAlFp_8PvdsSKRtFCjiDPaqAAAQexample=",
"subject": "Important Update",
"userId": "alice.johnson@acmecorp.onmicrosoft.com",
"userTenantId": "a1b2c3d4-e5f6-7890-abcd-ef1234567890",
"sensorIdentifier": "sensor-o365-001",
"similarityHash": "a1b2c3d4e5f6a7b8c9d0e1f2a3b4c5d6",
"receivedOn": "2026-03-15T14:57:01+00:00",
"sender": {
"name": "threat-actor@malicious-domain.com",
"address": "threat-actor@malicious-domain.com"
},
"toRecipients": [
{
"name": "Alice Johnson",
"address": "alice.johnson@acmecorp.onmicrosoft.com"
}
],
"ccRecipients": [],
"bccRecipients": [],
"urls": [],
"attachments": [
{
"name": "notice.zip",
"fileMd5": "a1b2c3d4e5f6a7b8c9d0e1f2a3b4c5d6",
"fileSha256": "a1b2c3d4e5f6a7b8c9d0e1f2a3b4c5d6e7f8a9b0c1d2e3f4a5b6c7d8e9f0a1b2",
"size": 33879
}
]
}
}
]
}
]
},
{
"id": "7a1b2c3d4e5f67890abcde26",
"name": "SuspiciousLinkCreated",
"date": "2026-03-15T14:59:13+00:00",
"sensors": [
"office_365"
],
"tactic": "collection",
"transitions": [
{
"from": "8a1b2c3d4e5f67890abcde02",
"to": "8a1b2c3d4e5f67890abcde01",
"resources": [
{
"name": "https://acmecorp-my.sharepoint.com/personal/alice_acmecorp_onmicrosoft_com/Documents/Confidential",
"type": "file",
"details": {
"url": "https://acmecorp-my.sharepoint.com/personal/alice_acmecorp_onmicrosoft_com/Documents/Confidential",
"path": null,
"size": null,
"md5": null,
"sha256": null,
"sensorIdentifier": "sensor-o365-001"
}
},
{
"name": "https://acmecorp-my.sharepoint.com/personal/alice_acmecorp_onmicrosoft_com/Documents/Confidential",
"type": "sharing_link",
"details": {
"url": "https://acmecorp-my.sharepoint.com/personal/alice_acmecorp_onmicrosoft_com/Documents/Confidential"
}
}
]
}
]
},
{
"id": "7a1b2c3d4e5f67890abcde27",
"name": "SuspiciousAppCreated",
"date": "2026-03-15T15:01:17+00:00",
"sensors": [
"active_directory"
],
"tactic": "credential_access",
"transitions": [
{
"from": "8a1b2c3d4e5f67890abcde02",
"to": "8a1b2c3d4e5f67890abcde05",
"resources": [
{
"name": "Malicious OAuth App",
"type": "application",
"details": {
"appAddress": "https://198.51.100.42/callback",
"ip": "198.51.100.42"
}
}
]
}
]
}
],
"nodes": [
{
"id": "8a1b2c3d4e5f67890abcde01",
"name": "threat-actor@malicious-domain.com",
"isExternal": false,
"type": "user_generic",
"details": {
"emails": [
"threat-actor@malicious-domain.com"
],
"ips": [
],
"service": "malicious-domain.com"
}
},
{
"id": "8a1b2c3d4e5f67890abcde02",
"name": "alice.johnson@acmecorp.onmicrosoft.com",
"isExternal": false,
"type": "user_azure_ad",
"details": {
"emails": [
"alice.johnson@acmecorp.onmicrosoft.com"
],
"ips": [
],
"tenantId": "a1b2c3d4-e5f6-7890-abcd-ef1234567890",
"riskDetail": "userPerformedSecuredPasswordChange",
"riskLevel": "high",
"riskState": "atRisk"
}
},
{
"id": "8a1b2c3d4e5f67890abcde03",
"name": "desktop-corp01.acmecorp.local",
"isExternal": false,
"type": "endpoint",
"details": {
"hardwareId": "12345678-abcd-ef01-2345-6789abcdef01-00AABB112233",
"ips": [
"192.168.1.100"
],
"macs": [
"00AABB112233"
],
"endpointId": "5d4c3b2a190876543210fedc"
}
},
{
"id": "8a1b2c3d4e5f67890abcde04",
"name": "198.51.100.42",
"isExternal": false,
"type": "ip",
"details": {
"ip": "198.51.100.42",
"domains": [
"c2-server.malicious-domain.com"
],
"mac": null
}
},
{
"id": "8a1b2c3d4e5f67890abcde05",
"name": "a1b2c3d4-e5f6-7890-abcd-ef1234567890",
"isExternal": false,
"type": "azure_ad",
"details": {
"organizationId": "a1b2c3d4-e5f6-7890-abcd-ef1234567890"
}
}
],
"mitreTags": [
{
"category": "Initial Access",
"techniques": [
{
"name": "Phishing",
"id": "T1566",
"subtechniques": [
{
"name": "Spearphishing Attachment",
"id": "T1566.001"
}
]
}
]
}
],
"narrative": [
[
"A potential network breach originating from user: threat-actor@malicious-domain.com, has been detected as part of 2 alerts, affecting the following: managed asset: desktop-corp01.acmecorp.local, and user: alice.johnson@acmecorp.onmicrosoft.com."
]
],
"reasoning": [
[
"The incident was triggered by 2 alerts, involving managed asset: desktop-corp01.acmecorp.local, and user: alice.johnson@acmecorp.onmicrosoft.com, indicating the suspicious email(s) sent by user: threat-actor@malicious-domain.com as the root cause of the incident."
]
]
},
"notes": []
},
{
"incidentId": "6a1b2c3d4e5f67890abcde02",
"incidentNumber": 102,
"status": "closed",
"mainAction": "reported",
"created": "2026-03-10T13:38:01+00:00",
"lastUpdated": "2026-03-10T13:38:01+00:00",
"lastProcessed": "2026-04-10T11:17:08+00:00",
"severityScore": 47,
"incidentLink": "https://your-gz-console.example.com/#!/incidents/view/6a1b2c3d4e5f67890abcde02",
"assignee": null,
"priority": "unknown",
"attackTypes": [
"Defined by user"
],
"company": {
"id": "5e4d3c2b1a0987654321fedc",
"name": "Acme Corporation"
},
"incidentType": "incident",
"details": {
"detectionName": "Suspicious Registry Access by Service",
"counters": {
"endpoints": 1,
"files": 2,
"processes": 6,
"domains": 0,
"registries": 0,
"events": 12,
"storages": 0
},
"incidentEvolution": [
{
"incidentId": "6a1b2c3d4e5f67890abcde03",
"incidentNumber": 103,
"status": "closed",
"incidentLink": "https://your-gz-console.example.com/#!/incidents/view/6a1b2c3d4e5f67890abcde03"
}
],
"computerId": "5d4c3b2a190876543210fed2",
"computerName": "SERVER-PROD-01",
"computerFqdn": "server-prod-01.acmecorp.local",
"computerIp": "192.168.10.50",
"computerMacAddresses": [
"00CCDD445566"
],
"partOf": [
{
"incidentId": "6a1b2c3d4e5f67890abcde01",
"incidentLink": "https://your-gz-console.example.com/#!/incidents/view/6a1b2c3d4e5f67890abcde01"
},
{
"incidentId": "6a1b2c3d4e5f67890abcde05",
"incidentLink": "https://your-gz-console.example.com/#!/incidents/view/6a1b2c3d4e5f67890abcde05"
}
],
"alerts": [
{
"id": "9a1b2c3d4e5f67890abcde01",
"name": "SystemInformationRegistryDiscovery",
"date": "2026-03-10T13:37:50+00:00",
"detectedBy": {
"name": "SystemInformationRegistryDiscovery",
"class": "EDR Detection"
},
"resources": [
{
"type": "process",
"details": {
"pid": 9688,
"processPath": "c:\\program files\\acme\\monitoring-agent\\monitoragent.exe",
"processPathSize": 111376,
"commandLine": "\"C:\\Program Files\\Acme\\monitoring-agent\\monitoragent.exe\" -n svc",
"parentPid": 7280,
"parentProcessPath": "c:\\windows\\system32\\services.exe",
"parentProcessCmdline": "c:\\windows\\system32\\services.exe",
"parentProcessUser": "NT AUTHORITY\\SYSTEM",
"user": "SERVER-PROD-01\\svc-monitor",
"loadedModule": null,
"loadedModulePid": null,
"processInjectionWriter": null,
"processInjectionWriterPid": null,
"processInjectionTarget": null,
"processInjectionTargetPid": null,
"processInjectionSizeofWrite": null,
"processAccessPrivileges": "elevated",
"parentProcessAccessPrivileges": "elevated",
"processIntegrityLevel": "high",
"parentProcessIntegrityLevel": "system",
"processPackerName": null
}
},
{
"type": "registry",
"details": {
"registryKey": "HKLM\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion",
"registryValue": "CurrentBuild",
"registryData": "19045",
"registryType": "REG_SZ",
"registryAccessType": "QUERY"
}
}
],
"extra": [
{
"key": "extraInfo1",
"value": "Operation Channel: normal\nProcess PE VersionInfo and Certification Information: \n\nOriginal File Name: monitoragent.exe\nInternal Name: monitoragent\nFile Description: Acme Monitoring Agent Service\nCompany Name: Acme Corporation\nFile Version: 3.5.1.10247\nProduct Name: Acme Monitoring Agent\nProduct Version: 3.5.1 build-10247\nLegal Copyright: Copyright 2020-2026 Acme Corporation\nCertificate Serial: 0aabbccddee11223344556677889900\nCertificate Signer: Acme Corporation\nCertificate Issuer: DigiCert, Inc.\n\nWorking Directory: c:\\windows\\system32\\"
}
]
}
],
"nodes": [
{
"id": "9b1b2c3d4e5f67890abcde01",
"name": "collector-parent.exe",
"type": "process_execution",
"details": {
"file": {
"name": "collector-parent.exe",
"path": "c:\\tools\\data-collector\\collector-parent.exe",
"md5": "e5f6a7b8c9d0e1f2a3b4c5d6e7f8a9b0",
"sha256": "e5f6a7b8c9d0e1f2a3b4c5d6e7f8a9b0c1d2e3f4a5b6c7d8e9f0a1b2c3d4e5f6",
"size": 198656,
"isExecutable": true
},
"process": {
"pid": 10080,
"parent": {
"pid": 9688,
"name": "monitoragent.exe",
"path": "c:\\program files\\acme\\monitoring-agent\\monitoragent.exe"
},
"commandLine": "\"C:\\tools\\data-collector\\collector-parent.exe\"",
"userId": "S-1-5-21-1234567890-123456789-1234567890-1002",
"userName": "SERVER-PROD-01\\svc-monitor",
"date": "2026-03-10T13:37:40+00:00",
"name": "collector-parent.exe"
},
"sandbox": null,
"quarantine": null,
"killProcess": null
},
"alertIds": [
"9a1b2c3d4e5f67890abcde02"
]
},
{
"id": "9b1b2c3d4e5f67890abcde07",
"name": "collector-output.txt",
"type": "file",
"details": {
"name": "collector-output.txt",
"path": "c:\\tools\\data-collector\\collector-output.txt",
"md5": "c9d0e1f2a3b4c5d6e7f8a9b0c1d2e3f4",
"sha256": "c9d0e1f2a3b4c5d6e7f8a9b0c1d2e3f4a5b6c7d8e9f0a1b2c3d4e5f6a7b8c9d0",
"size": 3,
"isExecutable": false,
"fileProcess": {
"pid": 10156,
"name": "collector-worker.exe",
"path": "c:\\tools\\data-collector\\collector-worker.exe"
},
"sandbox": null,
"quarantine": null
},
"alertIds": []
},
{
"id": "9b1b2c3d4e5f67890abcde09",
"name": "SERVER-PROD-01",
"type": "endpoint",
"details": {
"id": "5d4c3b2a190876543210fed2",
"name": "SERVER-PROD-01",
"hardwareId": "aabbccdd-1122-3344-5566-778899aabbcc",
"ip": "192.168.10.50",
"isContainer": false,
"isContainerHost": false
},
"alertIds": []
}
],
"triggerNodeId": "9b1b2c3d4e5f67890abcde01",
"transitions": [
{
"from": "9b1b2c3d4e5f67890abcde01",
"to": "9b1b2c3d4e5f67890abcde02",
"date": "2026-03-10T13:37:40+00:00"
}
],
"mitreTags": [
]
},
"notes": []
}
]
}