@Na_Kang_Lim Check if json_data is Correctly Extracted | makeresults | eval _raw="Mar 18 02:32:19 MachineName python3[948]: DEBUG:root:... Dispatching: {'id': '<id>', 'type': 'threat-detection', 'entity': 'threat', 'origin': '<redacted>', 'nature': 'system', 'user': 'system', 'timestamp': '2025-03-17T19:32:17.974Z', 'threat': {'id': '<redacted_uuid>', 'maGuid': '<redacted_guid>', 'detectionDate': '2025-03-17T19:32:17.974Z', 'eventType': 'Threat Detection Summary', 'threatType': 'non-pe-file', 'threatAttrs': {'name': '<filename>.ps1', 'path': 'C:\\Powershell\\Report\\<filename>.ps1', 'md5': '<redacted_hash>', 'sha1': '<redacted_hash>', 'sha256': '<redacted_hash>'}, 'interpreterFileAttrs': {'name': 'powershell.exe', 'path': 'C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe', 'md5': '097CE5761C89434367598B34FE32893B', 'sha1': '044A0CF1F6BC478A7172BF207EEF1E201A18BA02', 'sha256': 'BA4038FD20E474C047BE8AAD5BFACDB1BFC1DDBE12F803F473B7918D8D819436'}, 'severity': 's1', 'rank': '100', 'score': '50', 'detectionTags': ['@ATA.Discovery', '@ATA.Execution'], 'contentVersion': null}, 'firstDetected': '2025-03-17T19:32:17.974Z', 'lastDetected': '2025-03-17T19:32:17.974Z', 'tenant-id': '<redacted_tenant_id>', 'transaction-id': '<redacted_transaction_id>'}" | rex field=_raw "Dispatching:\s*(?<json_data>{.*})" | eval json_data = replace(json_data, "'", "\"") | eval json_data = replace(json_data, "\\\\", "\\\\\\\\") | eval json_data = replace(json_data, "'null'", "null") | table json_data Output:- { "id": "<id>", "type": "threat-detection", "entity": "threat", "origin": "<redacted>", "nature": "system", "user": "system", "timestamp": "2025-03-17T19:32:17.974Z", "threat": { "id": "<redacted_uuid>", "maGuid": "<redacted_guid>", "detectionDate": "2025-03-17T19:32:17.974Z", "eventType": "Threat Detection Summary", "threatType": "non-pe-file", "threatAttrs": { "name": "<filename>.ps1", "path": "C:\\Powershell\\Report\\<filename>.ps1", "md5": "<redacted_hash>", "sha1": "<redacted_hash>", "sha256": "<redacted_hash>" }, "interpreterFileAttrs": { "name": "powershell.exe", "path": "C:\\Windows\\System32\\WindowsPowerShell\u000b1.0\\powershell.exe", "md5": "097CE5761C89434367598B34FE32893B", "sha1": "044A0CF1F6BC478A7172BF207EEF1E201A18BA02", "sha256": "BA4038FD20E474C047BE8AAD5BFACDB1BFC1DDBE12F803F473B7918D8D819436" }, "severity": "s1", "rank": "100", "score": "50", "detectionTags": [ "@ATA.Discovery", "@ATA.Execution" ], "contentVersion": null }, "firstDetected": "2025-03-17T19:32:17.974Z", "lastDetected": "2025-03-17T19:32:17.974Z", "tenant-id": "<redacted_tenant_id>", "transaction-id": "<redacted_transaction_id>" }
... View more