<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Christmas hands-on: Who stole Santa’s secret file? in Dynatrace tips</title>
    <link>https://community.dynatrace.com/t5/Dynatrace-tips/Christmas-hands-on-Who-stole-Santa-s-secret-file/m-p/266161#M1673</link>
    <description>&lt;P&gt;Excellent!!!&lt;/P&gt;</description>
    <pubDate>Tue, 24 Dec 2024 16:21:56 GMT</pubDate>
    <dc:creator>Mizső</dc:creator>
    <dc:date>2024-12-24T16:21:56Z</dc:date>
    <item>
      <title>Christmas hands-on: Who stole Santa’s secret file? 📁</title>
      <link>https://community.dynatrace.com/t5/Dynatrace-tips/Christmas-hands-on-Who-stole-Santa-s-secret-file/m-p/266126#M1668</link>
      <description>&lt;P class="noSpacingAbove noSpacingBelow" data-text-type="noSpacing"&gt;&lt;SPAN&gt;With Christmas on the way, Dynatrace is happy to bring to you: the &lt;STRONG&gt;Christmas Scavenger Hunt&lt;/STRONG&gt;!&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="File_hunt_2.jpg" style="width: 720px;"&gt;&lt;img src="https://community.dynatrace.com/t5/image/serverpage/image-id/25462i7ADCE0CE2BD6BBB1/image-size/large?v=v2&amp;amp;px=999" role="button" title="File_hunt_2.jpg" alt="File_hunt_2.jpg" /&gt;&lt;/span&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="noSpacingAbove noSpacingBelow" data-text-type="noSpacing"&gt;&lt;SPAN&gt;This blog post will guide you through an incident response hands-on exercise. Each assignment introduces a goal to reach and steps to follow to reach this goal. You can either solve it by yourself, follow the steps to solve it or just look at the &lt;/SPAN&gt;&lt;A href="https://wkf10640.apps.dynatrace.com/ui/apps/dynatrace.security.investigator/share/fe877938-7e71-47b2-8f03-dae29593daec" target="_blank" rel="noopener"&gt;&lt;SPAN&gt;solved investigation&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN&gt; available in Security Investigator.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="noSpacingAbove noSpacingBelow" data-text-type="noSpacing"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;I&gt;&lt;SPAN&gt;Twas the night before Christmas, when all through the house,&amp;nbsp;&lt;/SPAN&gt;&lt;/I&gt;&lt;BR /&gt;&lt;I&gt;&lt;SPAN&gt;Not a creature was stirring, not even a mouse.&lt;/SPAN&gt;&lt;/I&gt;&lt;BR /&gt;&lt;I&gt;&lt;SPAN&gt;The servers were humming, the data secure,&lt;/SPAN&gt;&lt;/I&gt;&lt;BR /&gt;&lt;I&gt;&lt;SPAN&gt;But little did Santa know, he'd face a big blur.&lt;/SPAN&gt;&lt;/I&gt;&lt;/P&gt;
&lt;P class="noSpacingAbove noSpacingBelow" data-text-type="noSpacing"&gt;&lt;I&gt;&lt;SPAN&gt;His sensitive files, all locked up tight,&lt;BR /&gt;&lt;/SPAN&gt;&lt;/I&gt;&lt;I&gt;&lt;SPAN&gt;Were stolen by hackers, who worked through the night.&lt;/SPAN&gt;&lt;/I&gt;&lt;BR /&gt;&lt;I&gt;&lt;SPAN&gt;With keystrokes so nimble, and firewalls breached,&lt;/SPAN&gt;&lt;/I&gt;&lt;BR /&gt;&lt;I&gt;&lt;SPAN&gt;They found all his secrets, the ones he'd kept leached.&lt;/SPAN&gt;&lt;/I&gt;&lt;/P&gt;
&lt;P class="noSpacingAbove noSpacingBelow" data-text-type="noSpacing"&gt;&lt;I&gt;&lt;SPAN&gt;St Claus was not worried, he knew what to do.&lt;/SPAN&gt;&lt;/I&gt;&lt;BR /&gt;&lt;I&gt;&lt;SPAN&gt;He’s calmness returned in a minute or two.&lt;/SPAN&gt;&lt;/I&gt;&lt;BR /&gt;&lt;I&gt;&lt;SPAN&gt;He remembered his secret—his tech-saving grace.&lt;/SPAN&gt;&lt;/I&gt;&lt;BR /&gt;&lt;I&gt;&lt;SPAN&gt;AppSec at North Pole is done by Dynatrace.&lt;/SPAN&gt;&lt;/I&gt;&lt;/P&gt;
&lt;P class="noSpacingAbove noSpacingBelow" data-text-type="noSpacing"&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;About this hands-on exercise&lt;/H3&gt;
&lt;P class="noSpacingAbove noSpacingBelow" data-text-type="noSpacing"&gt;&lt;I&gt;&lt;SPAN&gt;This hands-on exercise, with steps to embrace,&lt;/SPAN&gt;&lt;/I&gt;&lt;BR /&gt;&lt;I&gt;&lt;SPAN&gt;Guides you through forensics, at a steady pace.&lt;/SPAN&gt;&lt;/I&gt;&lt;BR /&gt;&lt;I&gt;&lt;SPAN&gt;With logs as your clues, and analytics in play,&lt;/SPAN&gt;&lt;/I&gt;&lt;BR /&gt;&lt;I&gt;&lt;SPAN&gt;It walks you through what security pros say.&lt;/SPAN&gt;&lt;/I&gt;&lt;/P&gt;
&lt;P class="noSpacingAbove noSpacingBelow" data-text-type="noSpacing"&gt;&lt;I&gt;&lt;SPAN&gt;With &lt;STRONG&gt;Security Investigator&lt;/STRONG&gt;, you’ll dive deep and clear,&lt;/SPAN&gt;&lt;/I&gt;&lt;BR /&gt;&lt;I&gt;&lt;SPAN&gt;Into logs and their secrets, no matter how near.&lt;/SPAN&gt;&lt;/I&gt;&lt;BR /&gt;&lt;I&gt;&lt;SPAN&gt;You’ll follow the steps that the experts all take,&lt;/SPAN&gt;&lt;/I&gt;&lt;BR /&gt;&lt;I&gt;&lt;SPAN&gt;To uncover the truth, and the patterns they make.&lt;/SPAN&gt;&lt;/I&gt;&lt;/P&gt;
&lt;P class="noSpacingAbove noSpacingBelow" data-text-type="noSpacing"&gt;&lt;I&gt;&lt;SPAN&gt;You’ll dig through the data, with focus and care,&lt;/SPAN&gt;&lt;/I&gt;&lt;BR /&gt;&lt;I&gt;&lt;SPAN&gt;Reconstructing the events, piece by piece, laid bare.&lt;/SPAN&gt;&lt;/I&gt;&lt;BR /&gt;&lt;I&gt;&lt;SPAN&gt;What really happened? The truth you will find,&lt;/SPAN&gt;&lt;/I&gt;&lt;BR /&gt;&lt;I&gt;&lt;SPAN&gt;As you sift through the logs, with a keen, sharp mind.&lt;/SPAN&gt;&lt;/I&gt;&lt;/P&gt;
&lt;P class="noSpacingAbove noSpacingBelow" data-text-type="noSpacing"&gt;&lt;I&gt;&lt;SPAN&gt;So dive into this journey, with knowledge in hand,&lt;/SPAN&gt;&lt;/I&gt;&lt;BR /&gt;&lt;I&gt;&lt;SPAN&gt;As a Security Engineer, you’ll take your stand.&lt;/SPAN&gt;&lt;/I&gt;&lt;BR /&gt;&lt;I&gt;&lt;SPAN&gt;And piece by piece, the evidence will show,&lt;/SPAN&gt;&lt;/I&gt;&lt;BR /&gt;&lt;I&gt;&lt;SPAN&gt;The sequence of events, and how they did flow.&lt;/SPAN&gt;&lt;/I&gt;&lt;/P&gt;
&lt;H1&gt;&amp;nbsp;&lt;/H1&gt;
&lt;H1&gt;Scenario&lt;/H1&gt;
&lt;P style="font-weight: 400;"&gt;&lt;SPAN&gt;You get a worrying call from Santa that a secret document called &lt;STRONG&gt;Emuneration.xlsx&lt;/STRONG&gt; (id: &lt;STRONG&gt;31337&lt;/STRONG&gt;) containing all the elf bonuses and extra presents has leaked from North Pole Document Management application. Since all the engineers in Santa’s support crew have their hands full with upgrading the firmware on Rudolf’s blinking nose, he asks you to help him with analyzing the application logs. You are given access to the log files at &lt;U&gt;Dynatrace Playground&lt;/U&gt; to figure out what really happened and who stole the file.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="noSpacingAbove noSpacingBelow" data-text-type="noSpacing"&gt;&lt;SPAN&gt;For conducting the log analysis, you can use the &lt;/SPAN&gt;&lt;A href="http://wkf10640.apps.dynatrace.com/ui/apps/dynatrace.security.investigator/" target="_blank" rel="noopener"&gt;&lt;SPAN&gt;Dynatrace Security Investigator&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN&gt;. You can find North Pole Document Management application logs from Grail with the &lt;FONT face="courier new,courier"&gt;log.source&lt;/FONT&gt; value &lt;FONT face="courier new,courier"&gt;my_app.log&lt;/FONT&gt;&lt;/SPAN&gt;.&lt;/P&gt;
&lt;H1 class="noSpacingAbove noSpacingBelow" data-text-type="noSpacing"&gt;&amp;nbsp;&lt;/H1&gt;
&lt;H1 class="noSpacingAbove noSpacingBelow" data-text-type="noSpacing"&gt;Let’s start the investigation&lt;/H1&gt;
&lt;P&gt;&lt;SPAN&gt;With no time to waste, let us start with the investigation to get the culprit and get to the bottom of this!&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;DIV&gt;
&lt;H2 id="1.-find-logs-from-grail" class="headingSpacingAbove headingSpacingBelow"&gt;&lt;SPAN&gt;1. Find logs from Grail&lt;/SPAN&gt;&lt;/H2&gt;
&lt;I class="e_a_1310c973 f_a_1310c973 css-105" aria-hidden="true"&gt;&lt;/I&gt;&lt;/DIV&gt;
&lt;P&gt;&lt;SPAN&gt;To start analyzing your application logs, see if you can find any logs that match the given log source &lt;FONT face="courier new,courier"&gt;my_app.log&lt;/FONT&gt;. To start a new case and fetch these logs, follow these steps:&lt;/SPAN&gt;&lt;/P&gt;
&lt;OL class="customListStyle"&gt;
&lt;LI&gt;&lt;SPAN&gt;Go to the &lt;/SPAN&gt;&lt;A href="https://www.dynatrace.com/signup/playground/" target="_blank" rel="noopener"&gt;&lt;SPAN&gt;Dynatrace Playground&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN&gt; environment and start the &lt;/SPAN&gt;&lt;A href="https://wkf10640.apps.dynatrace.com/ui/apps/dynatrace.security.investigator/" target="_blank" rel="noopener"&gt;&lt;SPAN&gt;Security Investigator&lt;/SPAN&gt;&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN&gt;Choose the “&lt;STRONG&gt;+ Case&lt;/STRONG&gt;” to start a new &lt;STRONG&gt;Investigation&lt;/STRONG&gt;.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN&gt;Fetch logs from the last 24h with the log.source my_app.log&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&lt;SPAN&gt;To do that, copy the following DQL query to the &lt;STRONG&gt;Query&lt;/STRONG&gt; section in Security Investigator, and select &lt;STRONG&gt;Run&lt;/STRONG&gt; to display the results:&lt;/SPAN&gt;&lt;/P&gt;
&lt;PRE&gt;&lt;SPAN class="fontSizeMedium"&gt;&lt;SPAN&gt;fetch logs, from: -24h&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN class="fontSizeMedium"&gt;&lt;SPAN&gt;| filter log.source == "my_app.log"&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/PRE&gt;
&lt;DIV&gt;
&lt;DIV&gt;
&lt;H2 class="headingSpacingAbove headingSpacingBelow"&gt;&amp;nbsp;&lt;/H2&gt;
&lt;H2 id="2.-preparing-the-data" class="headingSpacingAbove headingSpacingBelow"&gt;2. Preparing the data&lt;/H2&gt;
&lt;I class="e_a_1310c973 f_a_1310c973 css-105" aria-hidden="true"&gt;&lt;/I&gt;&lt;/DIV&gt;
&lt;P class="noSpacingAbove spacingBelow" data-text-type="withSpacing"&gt;&lt;SPAN&gt;&lt;STRONG&gt;Nice!&lt;/STRONG&gt; You got the logs! To analyze the log records faster and with increased precision, you must extract the data from the log records intoto separate fields. You can do this using &lt;/SPAN&gt;&lt;A href="https://docs.dynatrace.com/docs/discover-dynatrace/references/dynatrace-pattern-language" target="_blank" rel="noopener"&gt;&lt;SPAN&gt;Dynatrace Pattern Language&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN&gt; (DPL). Extract the following elements from the log records:&lt;/SPAN&gt;&lt;/P&gt;
&lt;UL class="customListStyle"&gt;
&lt;LI&gt;&lt;SPAN&gt;clients IP address;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN&gt;session ID;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN&gt;username;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN&gt;request;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN&gt;request payload;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN&gt;response;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN&gt;user-agent.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;STRONG&gt;PS! &lt;/STRONG&gt;Use the correct field types when extracting the fields to simplify further analysis. This will help you in log analysis later.&lt;/SPAN&gt;&lt;/P&gt;
&lt;OL class="customListStyle"&gt;
&lt;LI&gt;&lt;SPAN&gt;Right-click on a record in the results table and choose &lt;STRONG&gt;Extract Fields&lt;/STRONG&gt;. To add more than one record to the DPL Architect, hold the Shift key while clicking on the records in the results table before choosing &lt;STRONG&gt;Extract fields&lt;/STRONG&gt;.&lt;BR /&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="content.png" style="width: 999px;"&gt;&lt;img src="https://community.dynatrace.com/t5/image/serverpage/image-id/25461i52079F71EF725A80/image-size/large?v=v2&amp;amp;px=999" role="button" title="content.png" alt="content.png" /&gt;&lt;/span&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN&gt;Construct a &lt;STRONG&gt;new DPL pattern&lt;/STRONG&gt; based on the log format. When developing the pattern, you can see the matching &lt;STRONG&gt;portion of the logs highlighted&lt;/STRONG&gt; in the match preview editor section. To see which values are extracted as new fields, check the &lt;STRONG&gt;results&lt;/STRONG&gt; tab.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;&lt;SPAN&gt;To extract the previously listed elements from the records, use the following pattern:&lt;/SPAN&gt;&lt;/P&gt;
&lt;PRE&gt;&lt;SPAN class="fontSizeMedium"&gt;&lt;SPAN&gt;IPADDR:src_ip '\t'&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN class="fontSizeMedium"&gt;&lt;SPAN&gt;LD:session_id '\t'&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN class="fontSizeMedium"&gt;&lt;SPAN&gt;LD:user_id '\t'&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN class="fontSizeMedium"&gt;&lt;SPAN&gt;DQS:request '\t'&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN class="fontSizeMedium"&gt;&lt;SPAN&gt;JSON:payload '\t'&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN class="fontSizeMedium"&gt;&lt;SPAN&gt;INT:response '\t'&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN class="fontSizeMedium"&gt;&lt;SPAN&gt;JSON:result '\t'&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN class="fontSizeMedium"&gt;&lt;SPAN&gt;DQS:user_agent&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/PRE&gt;
&lt;DIV class="imagePlugin hasCaption" data-alignment="center" data-captiontext="DPL architect" data-imagenaturalheight="1052" data-imagenaturalwidth="2852" data-imageurl="/sites/appsecurity/SiteAssets/SitePages/Page(1)/4208245248.png" data-listid="889a956a-766f-478d-940c-4fb96ae0face" data-overlaystylesisbold="false" data-overlaystylesisitalic="false" data-overlaystylesoverlaycolor="light" data-overlaystylesoverlaytransparency="0" data-overlaystylestextboxcolor="dark" data-overlaystylestextboxopacity="0.54" data-overlaystylestextcolor="light" data-overlaytextstyles="{&amp;quot;textColor&amp;quot;:&amp;quot;light&amp;quot;,&amp;quot;isBold&amp;quot;:false,&amp;quot;isItalic&amp;quot;:false,&amp;quot;textBoxColor&amp;quot;:&amp;quot;dark&amp;quot;,&amp;quot;textBoxOpacity&amp;quot;:0.54,&amp;quot;overlayColor&amp;quot;:&amp;quot;light&amp;quot;,&amp;quot;overlayTransparency&amp;quot;:0}" data-siteid="25a53c74-a709-4de8-9c0c-7a4b0527ab92" data-uniqueid="1fa9509d-8277-4987-a17f-e0b28cbe17c0" data-webid="9c5e9eb6-ed0c-4a8d-9e27-80d7405b4df4" data-height="267.35576459502107" data-width="724.80859375" data-widthpercentage="63.08168788076588" data-uploading="0"&gt;
&lt;DIV&gt;
&lt;DIV id="c19e20c0-0ac3-44ee-8559-58ae578180da" class="aj_j_50a7110f"&gt;
&lt;DIV class="a_a_f71b5f03 css-93" data-automation-id="imageRead"&gt;
&lt;FIGURE class="f_a_f71b5f03" tabindex="0"&gt;
&lt;DIV class="b_a_f71b5f03"&gt;
&lt;DIV&gt;
&lt;DIV class="b_a_b8d6211c c_a_b8d6211c"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="content2.png" style="width: 999px;"&gt;&lt;img src="https://community.dynatrace.com/t5/image/serverpage/image-id/25442i98938617AAD12277/image-size/large?v=v2&amp;amp;px=999" role="button" title="content2.png" alt="content2.png" /&gt;&lt;/span&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/FIGURE&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P class="noSpacingAbove spacingBelow" data-text-type="withSpacing"&gt;&lt;SPAN&gt;Click &lt;STRONG&gt;Insert Pattern&lt;/STRONG&gt; to add the pattern to your DQL query and close the DPL Architect.&lt;/SPAN&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;&lt;SPAN&gt;Click &lt;STRONG&gt;Run&lt;/STRONG&gt; to execute the query and display the extracted data as new columns. Double-click any of the records in the results table to open &lt;STRONG&gt;record details&lt;/STRONG&gt; and verify if your fields were extracted as expected.&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;I&gt;&lt;SPAN&gt;&lt;STRONG&gt;PS! &lt;/STRONG&gt;&lt;/SPAN&gt;&lt;SPAN&gt;You can navigate among records in your results using the arrow keys on your keyboard or using the navigation arrows at the top of the &lt;STRONG&gt;Record details&lt;/STRONG&gt; modal.&lt;/SPAN&gt;&lt;/I&gt;&lt;BR /&gt;&amp;nbsp;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="content-2.png" style="width: 999px;"&gt;&lt;img src="https://community.dynatrace.com/t5/image/serverpage/image-id/25443iCCBF8C2772534C95/image-size/large?v=v2&amp;amp;px=999" role="button" title="content-2.png" alt="content-2.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;DIV class="imagePlugin hasCaption" data-alignment="center" data-captiontext="Record details" data-imagenaturalheight="1312" data-imagenaturalwidth="2156" data-imageurl="/sites/appsecurity/SiteAssets/SitePages/Page(1)/462323599.png" data-listid="889a956a-766f-478d-940c-4fb96ae0face" data-overlaystylesisbold="false" data-overlaystylesisitalic="false" data-overlaystylesoverlaycolor="light" data-overlaystylesoverlaytransparency="0" data-overlaystylestextboxcolor="dark" data-overlaystylestextboxopacity="0.54" data-overlaystylestextcolor="light" data-overlaytextstyles="{&amp;quot;textColor&amp;quot;:&amp;quot;light&amp;quot;,&amp;quot;isBold&amp;quot;:false,&amp;quot;isItalic&amp;quot;:false,&amp;quot;textBoxColor&amp;quot;:&amp;quot;dark&amp;quot;,&amp;quot;textBoxOpacity&amp;quot;:0.54,&amp;quot;overlayColor&amp;quot;:&amp;quot;light&amp;quot;,&amp;quot;overlayTransparency&amp;quot;:0}" data-siteid="25a53c74-a709-4de8-9c0c-7a4b0527ab92" data-uniqueid="6b756e94-6a88-4b79-9ce7-071672537c5e" data-webid="9c5e9eb6-ed0c-4a8d-9e27-80d7405b4df4" data-height="329.2384624304267" data-width="541.03515625" data-widthpercentage="47.08748096170583" data-uploading="0"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P class="noSpacingAbove spacingBelow" data-text-type="withSpacing"&gt;&lt;SPAN&gt;To keep working with just the fields you extracted, use the following &lt;FONT face="courier new,courier"&gt;fields&lt;/FONT&gt; command and re-execute the query by choosing &lt;STRONG&gt;Run&lt;/STRONG&gt;:&lt;/SPAN&gt;&lt;/P&gt;
&lt;PRE&gt;&lt;SPAN class="fontSizeMedium"&gt;&lt;SPAN&gt;| fields src_ip, session_id, user_id, request, payload, response, user_agent&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/PRE&gt;
&lt;P&gt;&lt;I&gt;&lt;SPAN&gt;&lt;STRONG&gt;PS!&lt;/STRONG&gt; Notice how each query execution has created a &lt;STRONG&gt;new node to the query tree&lt;/STRONG&gt;. The query tree enables you to navigate back to previous queries and see the previous results as you got them at the time of the execution.&lt;/SPAN&gt;&lt;/I&gt;&amp;nbsp;&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P class="noSpacingAbove spacingBelow" data-text-type="withSpacing"&gt;&lt;SPAN&gt;To keep the current node for future as a reference, give it a name: right-click the node, choose &lt;STRONG&gt;Rename&lt;/STRONG&gt; and name it &lt;/SPAN&gt;&lt;I&gt;&lt;SPAN&gt;&lt;STRONG&gt;app requests&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/I&gt;&lt;SPAN&gt;. We will need it later.&lt;/SPAN&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;/OL&gt;
&lt;/DIV&gt;
&lt;H3 class="noSpacingAbove noSpacingBelow" data-text-type="noSpacing"&gt;&amp;nbsp;&lt;/H3&gt;
&lt;H2 class="noSpacingAbove noSpacingBelow" data-text-type="noSpacing"&gt;&lt;SPAN&gt;3. Find out who has opened the file&lt;/SPAN&gt;&lt;/H2&gt;
&lt;P&gt;&lt;SPAN&gt;From the logs you can see requests that are related to documents. They all have the following format: &lt;FONT face="courier new,courier"&gt;document.php?action=open&amp;amp;doc_id=&amp;lt;doc_id&amp;gt;&lt;/FONT&gt;. Continue the investigation by looking into &lt;STRONG&gt;who opened the leaked document&lt;/STRONG&gt;.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;To create a filter to fetch only the events where the &lt;FONT face="courier new,courier"&gt;action&lt;/FONT&gt; parameter is &lt;FONT face="courier new,courier"&gt;open&lt;/FONT&gt; and the &lt;FONT face="courier new,courier"&gt;doc_id&lt;/FONT&gt; is the ID of the leaked document, follow these steps:&lt;/SPAN&gt;&lt;/P&gt;
&lt;OL class="customListStyle"&gt;
&lt;LI&gt;
&lt;P class="noSpacingAbove spacingBelow" data-text-type="withSpacing"&gt;&lt;SPAN&gt;Extract the request parameters into a separate field called &lt;FONT face="courier new,courier"&gt;params&lt;/FONT&gt; for easier filtering using the &lt;FONT face="courier new,courier"&gt;KVP&lt;/FONT&gt; matcher. Add the following &lt;FONT face="courier new,courier"&gt;parse&lt;/FONT&gt;&amp;nbsp;command to the query and click &lt;STRONG&gt;Run&lt;/STRONG&gt;:&lt;/SPAN&gt;&lt;/P&gt;
&lt;PRE&gt;&lt;SPAN class="fontSizeMedium"&gt;&lt;SPAN&gt;| parse request, "LD '?' KVP { LD:key '=' LD:value ('&amp;amp;'|' ') }:params"&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/PRE&gt;
&lt;P class="noSpacingAbove spacingBelow" data-text-type="withSpacing"&gt;&lt;SPAN&gt;When viewing record details, the new &lt;FONT face="courier new,courier"&gt;params&lt;/FONT&gt; field is visible and usable along with the other fields.&lt;/SPAN&gt;&lt;/P&gt;
&lt;DIV class="imagePlugin hasCaption" data-alignment="center" data-captiontext="Filtering in record details" data-imagenaturalheight="1244" data-imagenaturalwidth="1992" data-imageurl="/sites/appsecurity/SiteAssets/SitePages/Page(1)/2730600675.png" data-listid="889a956a-766f-478d-940c-4fb96ae0face" data-overlaystylesisbold="false" data-overlaystylesisitalic="false" data-overlaystylesoverlaycolor="light" data-overlaystylesoverlaytransparency="0" data-overlaystylestextboxcolor="dark" data-overlaystylestextboxopacity="0.54" data-overlaystylestextcolor="light" data-overlaytextstyles="{&amp;quot;textColor&amp;quot;:&amp;quot;light&amp;quot;,&amp;quot;isBold&amp;quot;:false,&amp;quot;isItalic&amp;quot;:false,&amp;quot;textBoxColor&amp;quot;:&amp;quot;dark&amp;quot;,&amp;quot;textBoxOpacity&amp;quot;:0.54,&amp;quot;overlayColor&amp;quot;:&amp;quot;light&amp;quot;,&amp;quot;overlayTransparency&amp;quot;:0}" data-siteid="25a53c74-a709-4de8-9c0c-7a4b0527ab92" data-uniqueid="df55b49c-5990-4d5d-9bc3-0e0998a07626" data-webid="9c5e9eb6-ed0c-4a8d-9e27-80d7405b4df4" data-height="340.8514919051205" data-width="545.80078125" data-widthpercentage="47.50224379895561" data-uploading="0"&gt;
&lt;DIV&gt;
&lt;DIV id="a6e38f29-ae28-4400-a67c-bc8b7a02a255" class="aj_j_50a7110f"&gt;
&lt;DIV class="a_a_f71b5f03 css-93" data-automation-id="imageRead"&gt;
&lt;FIGURE class="f_a_f71b5f03" tabindex="0"&gt;
&lt;DIV class="b_a_f71b5f03"&gt;
&lt;DIV&gt;
&lt;DIV class="b_a_b8d6211c c_a_b8d6211c"&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="content-4.png" style="width: 999px;"&gt;&lt;img src="https://community.dynatrace.com/t5/image/serverpage/image-id/25445iA77DF42CF09033EB/image-size/large?v=v2&amp;amp;px=999" role="button" title="content-4.png" alt="content-4.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/FIGURE&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;&lt;SPAN&gt;Add the following &lt;FONT face="courier new,courier"&gt;filter&lt;/FONT&gt; command to see only the events where the document &lt;FONT face="courier new,courier"&gt;31337&lt;/FONT&gt; was opened and execute the query by choosing &lt;STRONG&gt;Run&lt;/STRONG&gt;:&lt;/SPAN&gt;&lt;/P&gt;
&lt;PRE&gt;&lt;SPAN class="fontSizeMedium"&gt;&lt;SPAN&gt;| filter params[action] == "open" and params[doc_id] == "31337"&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/PRE&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P class="noSpacingAbove spacingBelow" data-text-type="withSpacing"&gt;&lt;SPAN&gt;From the results it shows that &lt;STRONG&gt;thomas&lt;/STRONG&gt; and &lt;STRONG&gt;eric&lt;/STRONG&gt; have tried to open the document.&lt;/SPAN&gt;&lt;BR /&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="content-5.png" style="width: 999px;"&gt;&lt;img src="https://community.dynatrace.com/t5/image/serverpage/image-id/25446iF3364B79A63FA51C/image-size/large?v=v2&amp;amp;px=999" role="button" title="content-5.png" alt="content-5.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;/OL&gt;
&lt;DIV&gt;
&lt;H3 class="headingSpacingAbove headingSpacingBelow"&gt;&amp;nbsp;&lt;/H3&gt;
&lt;H2 id="4.-what-did-thomas-and-eric-do" class="headingSpacingAbove headingSpacingBelow"&gt;&lt;SPAN&gt;4. What did Thomas and Eric do?&lt;/SPAN&gt;&lt;/H2&gt;
&lt;I class="e_a_1310c973 f_a_1310c973 css-105" aria-hidden="true"&gt;&lt;/I&gt;&lt;/DIV&gt;
&lt;P class="noSpacingAbove spacingBelow" data-text-type="withSpacing"&gt;&lt;SPAN&gt;Let’s dive in deeper and see what else Thomas and Eric have done in Santa’s environment. Follow these steps to set a color for the current node and &lt;STRONG&gt;look into both of their sessions&lt;/STRONG&gt; to understand if there’s something suspicious happening in either of them.&lt;/SPAN&gt;&lt;/P&gt;
&lt;OL class="customListStyle"&gt;
&lt;LI&gt;
&lt;P&gt;&lt;SPAN&gt;Open the node menu, choose &lt;STRONG&gt;Color&lt;/STRONG&gt; and select a color from the available options&lt;/SPAN&gt;&lt;BR /&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="content-6.png" style="width: 400px;"&gt;&lt;img src="https://community.dynatrace.com/t5/image/serverpage/image-id/25447i61BD4E64BBE2E8CC/image-size/medium?v=v2&amp;amp;px=400" role="button" title="content-6.png" alt="content-6.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;&lt;SPAN&gt;Add a label for the color: open the legend menu and choose &lt;STRONG&gt;Edit labels&lt;/STRONG&gt;. Label the selected color as &lt;/SPAN&gt;&lt;I&gt;&lt;SPAN&gt;&lt;STRONG&gt;opened a document&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/I&gt;&lt;BR /&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="content-7.png" style="width: 400px;"&gt;&lt;img src="https://community.dynatrace.com/t5/image/serverpage/image-id/25448iBFBC703B60CF93E8/image-size/medium?v=v2&amp;amp;px=400" role="button" title="content-7.png" alt="content-7.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;&lt;SPAN&gt;Make the color labels visible under the query tree by adding a check mark to the “Color labels” option in the legend menu.&lt;/SPAN&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P class="noSpacingAbove spacingBelow" data-text-type="withSpacing"&gt;&lt;SPAN&gt;Remove the last filtering line (&lt;/SPAN&gt;&lt;FONT face="courier new,courier"&gt;|filter params[action] == "open" and params[doc_id] == "31337"&lt;/FONT&gt;&lt;SPAN&gt;) from the query&lt;/SPAN&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN&gt;Right-click on Thomas’ &lt;FONT face="courier new,courier"&gt;session_id&lt;/FONT&gt; value, choose “&lt;STRONG&gt;Filter for&lt;/STRONG&gt;” to add it as a filter statement and &lt;STRONG&gt;Run&lt;/STRONG&gt; the query.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN&gt;It seems that there’s nothing too interesting in Thomas’ activities. Navigate back to the previous node in the query tree and repeat steps 4 and 5 with Eric’s &lt;FONT face="courier new,courier"&gt;session_id&lt;/FONT&gt; value.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/OL&gt;
&lt;P class="noSpacingAbove spacingBelow" data-text-type="withSpacing"&gt;&lt;I&gt;&lt;SPAN&gt;&lt;STRONG&gt;PS!&lt;/STRONG&gt; Did you notice that by changing the query in the tree it &lt;STRONG&gt;created a new query branch &lt;/STRONG&gt;to the query tree? You can navigate among your previous queries as you to follow different investigation paths so you can keep track of what you investigated and where.&lt;/SPAN&gt;&lt;/I&gt;&lt;BR /&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="content-8.png" style="width: 400px;"&gt;&lt;img src="https://community.dynatrace.com/t5/image/serverpage/image-id/25449i3A4A84D6D12E31E6/image-size/medium?v=v2&amp;amp;px=400" role="button" title="content-8.png" alt="content-8.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;SPAN&gt;It seems that neither Thomas nor Eric are relevant to this investigation: they both got &lt;STRONG&gt;HTTP 401 response&lt;/STRONG&gt; for the document and from the rest of the logs it seems, that they probably just tried to open the document by accident (missed the right document ID by one number).&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;DIV&gt;
&lt;H2 id="5.-all-actions-done-with-the-document" class="headingSpacingAbove headingSpacingBelow"&gt;&lt;SPAN&gt;5. All actions done with the document&lt;/SPAN&gt;&lt;/H2&gt;
&lt;I class="e_a_1310c973 f_a_1310c973 css-105" aria-hidden="true"&gt;&lt;/I&gt;&lt;/DIV&gt;
&lt;P&gt;&lt;SPAN&gt;Let’s go back to the previous (the first colored) node to see if we can gather any new knowledge when looking at &lt;STRONG&gt;all the actions&lt;/STRONG&gt; done to the document.&lt;/SPAN&gt;&lt;/P&gt;
&lt;OL class="customListStyle"&gt;
&lt;LI&gt;
&lt;P class="noSpacingAbove spacingBelow" data-text-type="withSpacing"&gt;&lt;SPAN&gt;Change the &lt;FONT face="courier new,courier"&gt;filter&lt;/FONT&gt; statement for the query to see all the actions done with the &lt;FONT face="courier new,courier"&gt;doc_id&lt;/FONT&gt; 31337. Use the following filter command and by choose &lt;STRONG&gt;Run&lt;/STRONG&gt;:&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;PRE&gt;&lt;SPAN class="fontSizeMedium"&gt;&lt;SPAN&gt;| filter params[doc_id] == “31337”&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/PRE&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P class="noSpacingAbove spacingBelow" data-text-type="withSpacing"&gt;&lt;SPAN&gt;Choose a color for the newly created node and set the label for the color as “&lt;/SPAN&gt;&lt;I&gt;&lt;SPAN&gt;&lt;STRONG&gt;other actions with the document&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/I&gt;&lt;SPAN&gt;”. The legend should look similar to this:&lt;/SPAN&gt;&lt;/P&gt;
&lt;DIV class="imagePlugin hasCaption" data-alignment="center" data-captiontext="query tree legend" data-imagenaturalheight="178" data-imagenaturalwidth="782" data-imageurl="/sites/appsecurity/SiteAssets/SitePages/Page(1)/2965144923.png" data-listid="889a956a-766f-478d-940c-4fb96ae0face" data-overlaystylesisbold="false" data-overlaystylesisitalic="false" data-overlaystylesoverlaycolor="light" data-overlaystylesoverlaytransparency="0" data-overlaystylestextboxcolor="dark" data-overlaystylestextboxopacity="0.54" data-overlaystylestextcolor="light" data-overlaytextstyles="{&amp;quot;textColor&amp;quot;:&amp;quot;light&amp;quot;,&amp;quot;isBold&amp;quot;:false,&amp;quot;isItalic&amp;quot;:false,&amp;quot;textBoxColor&amp;quot;:&amp;quot;dark&amp;quot;,&amp;quot;textBoxOpacity&amp;quot;:0.54,&amp;quot;overlayColor&amp;quot;:&amp;quot;light&amp;quot;,&amp;quot;overlayTransparency&amp;quot;:0}" data-siteid="25a53c74-a709-4de8-9c0c-7a4b0527ab92" data-uniqueid="9e549c26-471d-4ad3-a71f-00009f495d2d" data-webid="9c5e9eb6-ed0c-4a8d-9e27-80d7405b4df4" data-height="97.2317175511509" data-width="427.1640625" data-widthpercentage="37.17702893820714" data-uploading="0"&gt;
&lt;DIV id="408e11b7-5db3-4fc5-a380-6ea6c4493865" class="aj_j_50a7110f"&gt;
&lt;DIV class="a_a_f71b5f03 css-93" data-automation-id="imageRead"&gt;
&lt;FIGURE class="f_a_f71b5f03" tabindex="0"&gt;
&lt;DIV class="b_a_f71b5f03"&gt;
&lt;DIV&gt;
&lt;DIV class="b_a_b8d6211c c_a_b8d6211c"&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="content-9.png" style="width: 999px;"&gt;&lt;img src="https://community.dynatrace.com/t5/image/serverpage/image-id/25450iE8340E06D4B09254/image-size/large?v=v2&amp;amp;px=999" role="button" title="content-9.png" alt="content-9.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;In the results table you see &lt;/SPAN&gt;&lt;STRONG style="font-family: inherit;"&gt;six sessions&lt;/STRONG&gt;&lt;SPAN&gt; (including Thomas and Eric) that have performed actions with the leaked document. Let’s look into each of the new sessions in more detail. To do that, follow these steps:&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/FIGURE&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN&gt;Remove the last &lt;FONT face="courier new,courier"&gt;filter&lt;/FONT&gt; command from the DQL query&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN&gt;Right-click the first value in the &lt;FONT face="courier new,courier"&gt;session_id&lt;/FONT&gt; column and add it as a filter using &lt;STRONG&gt;Filter for&lt;/STRONG&gt; and &lt;STRONG&gt;Run&lt;/STRONG&gt; the query to create a new node with the results about the session.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN&gt;Navigate back to the previous node and repeat step 3 with next values in the &lt;FONT face="courier new,courier"&gt;session_id&lt;/FONT&gt; column. You can skip&lt;STRONG&gt; thomas&lt;/STRONG&gt; and&lt;STRONG&gt; eric&lt;/STRONG&gt;, since we already went through their sessions.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;
&lt;P class="noSpacingAbove spacingBelow" data-text-type="withSpacing"&gt;&lt;SPAN&gt;As a result, you should have a query tree that looks like this:&lt;/SPAN&gt;&lt;BR /&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="content-10.png" style="width: 340px;"&gt;&lt;img src="https://community.dynatrace.com/t5/image/serverpage/image-id/25451i62CA7D4A84043842/image-size/medium?v=v2&amp;amp;px=400" role="button" title="content-10.png" alt="content-10.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;DIV class="imagePlugin hasCaption" data-alignment="center" data-captiontext="query tree" data-imagenaturalheight="954" data-imagenaturalwidth="810" data-imageurl="/sites/appsecurity/SiteAssets/SitePages/Page(1)/881371953.png" data-listid="889a956a-766f-478d-940c-4fb96ae0face" data-overlaystylesisbold="false" data-overlaystylesisitalic="false" data-overlaystylesoverlaycolor="light" data-overlaystylesoverlaytransparency="0" data-overlaystylestextboxcolor="dark" data-overlaystylestextboxopacity="0.54" data-overlaystylestextcolor="light" data-overlaytextstyles="{&amp;quot;textColor&amp;quot;:&amp;quot;light&amp;quot;,&amp;quot;isBold&amp;quot;:false,&amp;quot;isItalic&amp;quot;:false,&amp;quot;textBoxColor&amp;quot;:&amp;quot;dark&amp;quot;,&amp;quot;textBoxOpacity&amp;quot;:0.54,&amp;quot;overlayColor&amp;quot;:&amp;quot;light&amp;quot;,&amp;quot;overlayTransparency&amp;quot;:0}" data-siteid="25a53c74-a709-4de8-9c0c-7a4b0527ab92" data-uniqueid="55755585-1813-41ad-a8ff-cfd485130d1a" data-webid="9c5e9eb6-ed0c-4a8d-9e27-80d7405b4df4" data-height="382.98020833333334" data-width="325.171875" data-widthpercentage="28.30042428198433" data-uploading="0"&gt;
&lt;DIV&gt;
&lt;DIV id="4018e644-3272-4b1c-8048-88575d6e67cb" class="aj_j_50a7110f"&gt;
&lt;DIV class="a_a_f71b5f03 css-93" data-automation-id="imageRead"&gt;
&lt;FIGURE class="f_a_f71b5f03" tabindex="0"&gt;
&lt;DIV class="b_a_f71b5f03"&gt;
&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/FIGURE&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/LI&gt;
&lt;/OL&gt;
&lt;DIV&gt;
&lt;H2 id="6.-gathering-evidence-from-a-suspicious-session" class="headingSpacingAbove headingSpacingBelow"&gt;&lt;SPAN&gt;6. Gathering evidence from a suspicious session&lt;/SPAN&gt;&lt;/H2&gt;
&lt;I class="e_a_1310c973 f_a_1310c973 css-105" aria-hidden="true"&gt;&lt;/I&gt;&lt;/DIV&gt;
&lt;P&gt;&lt;SPAN&gt;Going through the session branches, one session stands out with really suspicious requests. In Bobs' branch with the &lt;FONT face="courier new,courier"&gt;session_id&lt;/FONT&gt; value &lt;FONT face="courier new,courier"&gt;c9dde8d659d&lt;/FONT&gt;, you can see lots of suspicious activities, including uploading a file with the name &lt;FONT face="courier new,courier"&gt;shell.php&lt;/FONT&gt;. Let’s &lt;STRONG&gt;Mark the branch&lt;/STRONG&gt; with a distinct color and &lt;STRONG&gt;gather and store relevant evidence&lt;/STRONG&gt; needed for further investigation to find out &lt;STRONG&gt;who leaked the file&lt;/STRONG&gt;. To do that, follow these steps:&lt;/SPAN&gt;&lt;/P&gt;
&lt;OL class="customListStyle"&gt;
&lt;LI&gt;&lt;SPAN&gt;Change the node color to orange and add the label &lt;/SPAN&gt;&lt;I&gt;&lt;SPAN&gt;&lt;STRONG&gt;a suspicious session&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/I&gt;&lt;SPAN&gt; to the color.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN&gt;Right-click on any of the &lt;FONT face="courier new,courier"&gt;session_id&lt;/FONT&gt; values in the results table, choose &lt;/SPAN&gt;&lt;I&gt;&lt;SPAN&gt;&lt;STRONG&gt;Add to evidence list&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/I&gt;&lt;SPAN&gt;, choose &lt;/SPAN&gt;&lt;I&gt;&lt;SPAN&gt;&lt;STRONG&gt;+ Add new evidence list&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/I&gt;&lt;SPAN&gt; and name it &lt;/SPAN&gt;&lt;I&gt;&lt;SPAN&gt;&lt;STRONG&gt;Bob’s session ID&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/I&gt;&lt;SPAN&gt; for future reference.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN&gt;Right-click any of the IP addresses in the &lt;FONT face="courier new,courier"&gt;src_ip&lt;/FONT&gt; column and add Bob’s IP address as a new evidence called &lt;/SPAN&gt;&lt;I&gt;&lt;SPAN&gt;&lt;STRONG&gt;Bob’s IP address.&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/I&gt;&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;&lt;SPAN&gt;Select the &lt;FONT face="courier new,courier"&gt;/upload/shell.php&lt;/FONT&gt; portion from the &lt;FONT face="courier new,courier"&gt;&lt;STRONG&gt;content&lt;/STRONG&gt;&lt;/FONT&gt; column, right-click it and save it as a new evidence called &lt;/SPAN&gt;&lt;I&gt;&lt;SPAN&gt;&lt;STRONG&gt;suspicious script&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/I&gt;&lt;SPAN&gt;.&lt;/SPAN&gt;&lt;BR /&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="content-11.png" style="width: 400px;"&gt;&lt;img src="https://community.dynatrace.com/t5/image/serverpage/image-id/25452i7BFF090E12B6D8D0/image-size/medium?v=v2&amp;amp;px=400" role="button" title="content-11.png" alt="content-11.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P class="noSpacingAbove spacingBelow" data-text-type="withSpacing"&gt;&lt;SPAN&gt;The evidence in your case should look now something like on the following image:&lt;/SPAN&gt;&lt;BR /&gt;&amp;nbsp;&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="content-12.png" style="width: 345px;"&gt;&lt;img src="https://community.dynatrace.com/t5/image/serverpage/image-id/25453i6F5236195F22FC5E/image-size/medium?v=v2&amp;amp;px=400" role="button" title="content-12.png" alt="content-12.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;DIV class="imagePlugin hasCaption" data-alignment="center" data-captiontext="Evidence lists" data-imagenaturalheight="884" data-imagenaturalwidth="762" data-imageurl="/sites/appsecurity/SiteAssets/SitePages/Page(1)/2653221286.png" data-listid="889a956a-766f-478d-940c-4fb96ae0face" data-overlaystylesisbold="false" data-overlaystylesisitalic="false" data-overlaystylesoverlaycolor="light" data-overlaystylesoverlaytransparency="0" data-overlaystylestextboxcolor="dark" data-overlaystylestextboxopacity="0.54" data-overlaystylestextcolor="light" data-overlaytextstyles="{&amp;quot;textColor&amp;quot;:&amp;quot;light&amp;quot;,&amp;quot;isBold&amp;quot;:false,&amp;quot;isItalic&amp;quot;:false,&amp;quot;textBoxColor&amp;quot;:&amp;quot;dark&amp;quot;,&amp;quot;textBoxOpacity&amp;quot;:0.54,&amp;quot;overlayColor&amp;quot;:&amp;quot;light&amp;quot;,&amp;quot;overlayTransparency&amp;quot;:0}" data-siteid="25a53c74-a709-4de8-9c0c-7a4b0527ab92" data-uniqueid="43a28cb2-595e-45d4-a196-8f6161b09899" data-webid="9c5e9eb6-ed0c-4a8d-9e27-80d7405b4df4" data-height="371.54174868766404" data-width="320.265625" data-widthpercentage="27.873422541340297" data-uploading="0"&gt;
&lt;DIV&gt;
&lt;DIV id="6b7301d6-2eea-4ead-875a-6719f33da5ad" class="aj_j_50a7110f"&gt;
&lt;DIV class="a_a_f71b5f03 css-93" data-automation-id="imageRead"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/LI&gt;
&lt;/OL&gt;
&lt;DIV&gt;
&lt;H2 class="headingSpacingAbove headingSpacingBelow"&gt;&amp;nbsp;&lt;/H2&gt;
&lt;H2 id="10.-decoding-the-commands" class="headingSpacingAbove headingSpacingBelow"&gt;&lt;SPAN&gt;7. Decoding the commands&lt;/SPAN&gt;&lt;/H2&gt;
&lt;I class="e_a_1310c973 f_a_1310c973 css-105" aria-hidden="true"&gt;&lt;/I&gt;&lt;/DIV&gt;
&lt;P class="noSpacingAbove spacingBelow" data-text-type="withSpacing"&gt;&lt;SPAN&gt;When watching the log records in Bob’s session, you discovered that the payload posted to &lt;FONT face="courier new,courier"&gt;shell.php&lt;/FONT&gt; script is base64 decoded.&lt;/SPAN&gt;&lt;/P&gt;
&lt;FIGURE class="table"&gt;
&lt;TABLE&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD valign="top"&gt;&lt;SPAN&gt;&lt;STRONG&gt;src_ip&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/TD&gt;
&lt;TD valign="top"&gt;&lt;SPAN&gt;&lt;STRONG&gt;session_id&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/TD&gt;
&lt;TD valign="top"&gt;&lt;SPAN&gt;&lt;STRONG&gt;user_id&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/TD&gt;
&lt;TD valign="top"&gt;&lt;SPAN&gt;&lt;STRONG&gt;request&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/TD&gt;
&lt;TD valign="top"&gt;&lt;SPAN&gt;&lt;STRONG&gt;payload&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD valign="top"&gt;&lt;SPAN&gt;84.50.138.122&lt;/SPAN&gt;&lt;/TD&gt;
&lt;TD valign="top"&gt;&lt;SPAN&gt;c9dde8d659d&lt;/SPAN&gt;&lt;/TD&gt;
&lt;TD valign="top"&gt;&lt;SPAN&gt;bob&lt;/SPAN&gt;&lt;/TD&gt;
&lt;TD valign="top"&gt;&lt;SPAN&gt;POST /upload/shell.php HTTP/1.1&lt;/SPAN&gt;&lt;/TD&gt;
&lt;TD valign="top"&gt;&lt;SPAN&gt;{"p":"eyJhY3Rpb24iOiJzZXR1cCJ9"}&lt;/SPAN&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD valign="top"&gt;&lt;SPAN&gt;84.50.138.122&lt;/SPAN&gt;&lt;/TD&gt;
&lt;TD valign="top"&gt;&lt;SPAN&gt;c9dde8d659d&lt;/SPAN&gt;&lt;/TD&gt;
&lt;TD valign="top"&gt;&lt;SPAN&gt;bob&lt;/SPAN&gt;&lt;/TD&gt;
&lt;TD valign="top"&gt;&lt;SPAN&gt;POST /upload/shell.php HTTP/1.1&lt;/SPAN&gt;&lt;/TD&gt;
&lt;TD valign="top"&gt;&lt;SPAN&gt;{"p":"eyJleGVjIjoid2hvYW1pIn0="}&lt;/SPAN&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;/FIGURE&gt;
&lt;P class="noSpacingAbove spacingBelow" data-text-type="withSpacing"&gt;&lt;SPAN&gt;To understand, what is posted to the script, follow these steps:&lt;/SPAN&gt;&lt;/P&gt;
&lt;OL class="customListStyle"&gt;
&lt;LI&gt;
&lt;P class="noSpacingAbove spacingBelow" data-text-type="withSpacing"&gt;&lt;SPAN&gt;Add a filter to see only the POST requests to the &lt;FONT face="courier new,courier"&gt;shell.php&lt;/FONT&gt; script by right-clicking any of the POST requests in the &lt;FONT face="courier new,courier"&gt;content&lt;/FONT&gt; column and choosing &lt;STRONG&gt;Filter for&lt;/STRONG&gt; option from the menu:&lt;BR /&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="content-13.png" style="width: 999px;"&gt;&lt;img src="https://community.dynatrace.com/t5/image/serverpage/image-id/25454i0DEF60C3119BD84E/image-size/large?v=v2&amp;amp;px=999" role="button" title="content-13.png" alt="content-13.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;&lt;SPAN&gt;Add a new field called &lt;FONT face="courier new,courier"&gt;decoded&lt;/FONT&gt; to the results using the &lt;FONT face="courier new,courier"&gt;fieldsAdd&lt;/FONT&gt; command. The value of the field should be the base64-decoded value of the parameter &lt;FONT face="courier new,courier"&gt;p&lt;/FONT&gt; from the &lt;FONT face="courier new,courier"&gt;payload&lt;/FONT&gt; value.&lt;/SPAN&gt;&lt;/P&gt;
&lt;PRE&gt;&lt;SPAN class="fontSizeMedium"&gt;&lt;SPAN&gt;| fieldsAdd decoded=decodeBase64ToString(payload[p])&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/PRE&gt;
&lt;P class="noSpacingAbove spacingBelow" data-text-type="withSpacing"&gt;&lt;SPAN&gt;After running the query, a new field is present in the results table that contains the decoded command:&lt;/SPAN&gt;&lt;BR /&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="content-14.png" style="width: 999px;"&gt;&lt;img src="https://community.dynatrace.com/t5/image/serverpage/image-id/25455i2040E17995D2ADD0/image-size/large?v=v2&amp;amp;px=999" role="button" title="content-14.png" alt="content-14.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;DIV&gt;
&lt;H2 id="11.-find-shell-users" class="headingSpacingAbove headingSpacingBelow"&gt;8. Find shell users&lt;/H2&gt;
&lt;I class="e_a_1310c973 f_a_1310c973 css-105" aria-hidden="true"&gt;&lt;/I&gt;&lt;/DIV&gt;
&lt;P&gt;&lt;SPAN&gt;By now, you’ve discovered how the web shell was set up and the first executions of the commands using the web shell. Let’s now continue and investigate &lt;STRONG&gt;who else has used the shell&lt;/STRONG&gt;. To find out and to gather evidence about &lt;STRONG&gt;what has been done&lt;/STRONG&gt; with the suspicious script and by &lt;STRONG&gt;which sessions&lt;/STRONG&gt;, follow these steps:&lt;/SPAN&gt;&lt;/P&gt;
&lt;OL class="customListStyle"&gt;
&lt;LI&gt;&lt;SPAN&gt;Navigate back to the query node we named &lt;/SPAN&gt;&lt;I&gt;&lt;SPAN&gt;&lt;STRONG&gt;app requests&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/I&gt;&lt;SPAN&gt; in the 2. Section at step 6.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;
&lt;P class="noSpacingAbove spacingBelow" data-text-type="withSpacing"&gt;&lt;SPAN&gt;Open the evidence &lt;STRONG&gt;suspicious script&lt;/STRONG&gt; menu at the right side panel, choose &lt;STRONG&gt;Filter for&lt;/STRONG&gt; and select the column &lt;STRONG&gt;request&lt;/STRONG&gt; to apply the evidence as a filtering statement to the DQL query.&lt;/SPAN&gt;&lt;/P&gt;
&lt;DIV class="imagePlugin hasCaption" data-alignment="center" data-captiontext="Filtering by evidence lists" data-imagenaturalheight="584" data-imagenaturalwidth="800" data-imageurl="/sites/appsecurity/SiteAssets/SitePages/Page(1)/3978663368.png" data-listid="889a956a-766f-478d-940c-4fb96ae0face" data-overlaystylesisbold="false" data-overlaystylesisitalic="false" data-overlaystylesoverlaycolor="light" data-overlaystylesoverlaytransparency="0" data-overlaystylestextboxcolor="dark" data-overlaystylestextboxopacity="0.54" data-overlaystylestextcolor="light" data-overlaytextstyles="{&amp;quot;textColor&amp;quot;:&amp;quot;light&amp;quot;,&amp;quot;isBold&amp;quot;:false,&amp;quot;isItalic&amp;quot;:false,&amp;quot;textBoxColor&amp;quot;:&amp;quot;dark&amp;quot;,&amp;quot;textBoxOpacity&amp;quot;:0.54,&amp;quot;overlayColor&amp;quot;:&amp;quot;light&amp;quot;,&amp;quot;overlayTransparency&amp;quot;:0}" data-siteid="25a53c74-a709-4de8-9c0c-7a4b0527ab92" data-uniqueid="efa786c7-a760-4bed-96e6-e95cf2b969ae" data-webid="9c5e9eb6-ed0c-4a8d-9e27-80d7405b4df4" data-height="274.80507812499997" data-width="376.4453125" data-widthpercentage="32.76286444734552" data-uploading="0"&gt;
&lt;DIV id="5e6eab72-2b9f-4157-b62a-89f7655f703e" class="aj_j_50a7110f"&gt;
&lt;DIV class="a_a_f71b5f03 css-93" data-automation-id="imageRead"&gt;
&lt;FIGURE class="f_a_f71b5f03" tabindex="0"&gt;
&lt;DIV class="b_a_f71b5f03"&gt;
&lt;DIV class="b_a_b8d6211c c_a_b8d6211c"&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="content-15.png" style="width: 400px;"&gt;&lt;img src="https://community.dynatrace.com/t5/image/serverpage/image-id/25456iC19455E3FBFFDB48/image-size/medium?v=v2&amp;amp;px=400" role="button" title="content-15.png" alt="content-15.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;FIGCAPTION class="c_a_f71b5f03" title="Filtering by evidence lists" data-automation-id="captionElement-imageRead"&gt;&lt;/FIGCAPTION&gt;
&lt;/FIGURE&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN&gt;Since you already viewed Bob’s session, you can leave his session out. You can do this by opening the evidence &lt;STRONG&gt;Bob’s session id&lt;/STRONG&gt; menu, selecting &lt;STRONG&gt;Filter out.&lt;/STRONG&gt; Select the column &lt;FONT face="courier new,courier"&gt;session_id&lt;/FONT&gt; and choose &lt;STRONG&gt;Run&lt;/STRONG&gt;.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN&gt;Choose a purple color for the created node and label the color &lt;/SPAN&gt;&lt;I&gt;&lt;SPAN&gt;&lt;STRONG&gt;shell access&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/I&gt;&lt;SPAN&gt; to make the branch easier to find.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;
&lt;P class="noSpacingAbove spacingBelow" data-text-type="withSpacing"&gt;&lt;SPAN&gt;Seems that we found another session that used the web-shell. To understand what was done with the script, let’s decode the payload as we did with Bob’s session by adding the following &lt;FONT face="courier new,courier"&gt;fieldsAdd&lt;/FONT&gt; command:&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;PRE&gt;&lt;SPAN class="fontSizeMedium"&gt;&lt;SPAN&gt;| fieldsAdd decoded=decodeBase64ToString(payload[p])&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/PRE&gt;
&lt;P&gt;&lt;SPAN&gt;From the results it seems this session is the culprit behind stealing the file (and as we see, not only this file!).&lt;/SPAN&gt;&lt;/P&gt;
&lt;DIV class="imagePlugin hasCaption" data-alignment="center" data-captiontext="results table" data-imagenaturalheight="604" data-imagenaturalwidth="2212" data-imageurl="/sites/appsecurity/SiteAssets/SitePages/Page(1)/3017028647.png" data-listid="889a956a-766f-478d-940c-4fb96ae0face" data-overlaystylesisbold="false" data-overlaystylesisitalic="false" data-overlaystylesoverlaycolor="light" data-overlaystylesoverlaytransparency="0" data-overlaystylestextboxcolor="dark" data-overlaystylestextboxopacity="0.54" data-overlaystylestextcolor="light" data-overlaytextstyles="{&amp;quot;textColor&amp;quot;:&amp;quot;light&amp;quot;,&amp;quot;isBold&amp;quot;:false,&amp;quot;isItalic&amp;quot;:false,&amp;quot;textBoxColor&amp;quot;:&amp;quot;dark&amp;quot;,&amp;quot;textBoxOpacity&amp;quot;:0.54,&amp;quot;overlayColor&amp;quot;:&amp;quot;light&amp;quot;,&amp;quot;overlayTransparency&amp;quot;:0}" data-siteid="25a53c74-a709-4de8-9c0c-7a4b0527ab92" data-uniqueid="9c392473-8a4b-43a2-a810-7b26fa8469bd" data-webid="9c5e9eb6-ed0c-4a8d-9e27-80d7405b4df4" data-height="206.81116495253167" data-width="757.39453125" data-widthpercentage="65.91771377284596" data-uploading="0"&gt;
&lt;DIV id="a4d09b97-9d4c-44ab-9722-865ccad4088f" class="aj_j_50a7110f"&gt;
&lt;DIV class="a_a_f71b5f03 css-93" data-automation-id="imageRead"&gt;
&lt;FIGURE class="f_a_f71b5f03" tabindex="0"&gt;
&lt;DIV class="b_a_f71b5f03"&gt;
&lt;DIV class="b_a_b8d6211c c_a_b8d6211c"&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="content-16.png" style="width: 999px;"&gt;&lt;img src="https://community.dynatrace.com/t5/image/serverpage/image-id/25457i48C8E1421F0F8028/image-size/large?v=v2&amp;amp;px=999" role="button" title="content-16.png" alt="content-16.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/FIGURE&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/LI&gt;
&lt;/OL&gt;
&lt;DIV&gt;
&lt;H2 id="12.-simple-statistical-analysis" class="headingSpacingAbove headingSpacingBelow"&gt;&lt;SPAN&gt;9. Simple statistical analysis&lt;/SPAN&gt;&lt;/H2&gt;
&lt;I class="e_a_1310c973 f_a_1310c973 css-105" aria-hidden="true"&gt;&lt;/I&gt;&lt;/DIV&gt;
&lt;P&gt;&lt;SPAN&gt;To move further with analyzing this session, let’s do some statistical analysis for the session and see if something stands out. Let’s start by looking at all the distinct&lt;STRONG&gt; user-agents&lt;/STRONG&gt; and &lt;STRONG&gt;IP addresses&lt;/STRONG&gt; from this session.&lt;/SPAN&gt;&lt;/P&gt;
&lt;OL class="customListStyle"&gt;
&lt;LI&gt;
&lt;P&gt;&lt;SPAN&gt;Add a &lt;FONT face="courier new,courier"&gt;summarize&lt;/FONT&gt; command that will aggregate the results based on &lt;FONT face="courier new,courier"&gt;session_id&lt;/FONT&gt;, &lt;FONT face="courier new,courier"&gt;src_ip&lt;/FONT&gt; and &lt;FONT face="courier new,courier"&gt;user_agent&lt;/FONT&gt; fields:&lt;/SPAN&gt;&lt;/P&gt;
&lt;PRE&gt;&lt;SPAN class="fontSizeMedium"&gt;&lt;SPAN&gt;| summarize count(), by: { src_ip, session_id, user_agent }&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/PRE&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P class="noSpacingAbove spacingBelow" data-text-type="withSpacing"&gt;&lt;SPAN&gt;Execute the DQL query and analyze the results&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;The results reveal two records:&lt;/SPAN&gt;&lt;BR /&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="content-17.png" style="width: 999px;"&gt;&lt;img src="https://community.dynatrace.com/t5/image/serverpage/image-id/25458i3AAFEDD8449B45FF/image-size/large?v=v2&amp;amp;px=999" role="button" title="content-17.png" alt="content-17.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;We have found &lt;/SPAN&gt;&lt;STRONG style="font-family: inherit;"&gt;two IP addresses&lt;/STRONG&gt;&lt;SPAN&gt; within the same session with the &lt;/SPAN&gt;&lt;STRONG style="font-family: inherit;"&gt;same user-agent&lt;/STRONG&gt;&lt;SPAN&gt;. This might mean that if the attacker was using an anonymizer to hide their tracks, the service might have failed for some requests and might reveal the attacker’s real IP address. This requires some further investigation.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="noSpacingAbove spacingBelow" data-text-type="withSpacing"&gt;&amp;nbsp;&lt;SPAN&gt;Let’s save this evidence and continue the investigation by following these steps:&lt;/SPAN&gt;&lt;/P&gt;
&lt;DIV class="imagePlugin hasCaption" data-alignment="Center" data-imageurl="/sites/appsecurity/SiteAssets/SitePages/Page(1)/4011692222.png" data-uploading="0" data-overlaystylesoverlaytransparency="0" data-overlaystylesoverlaycolor="light" data-overlaystylestextboxopacity="0.54" data-overlaystylestextboxcolor="dark" data-overlaystylesisitalic="false" data-overlaystylesisbold="false" data-overlaystylestextcolor="light" data-overlaytextstyles="{&amp;quot;textColor&amp;quot;:&amp;quot;light&amp;quot;,&amp;quot;isBold&amp;quot;:false,&amp;quot;isItalic&amp;quot;:false,&amp;quot;textBoxColor&amp;quot;:&amp;quot;dark&amp;quot;,&amp;quot;textBoxOpacity&amp;quot;:0.54,&amp;quot;overlayColor&amp;quot;:&amp;quot;light&amp;quot;,&amp;quot;overlayTransparency&amp;quot;:0}" data-uniqueid="3bfeeff9-9a56-446f-953f-0053451a22ee" data-webid="9c5e9eb6-ed0c-4a8d-9e27-80d7405b4df4" data-siteid="25a53c74-a709-4de8-9c0c-7a4b0527ab92" data-listid="889a956a-766f-478d-940c-4fb96ae0face" data-imagenaturalheight="264" data-imagenaturalwidth="2178" data-widthpercentage="91.72786118363796" data-width="1053.953125" data-height="127.75189393939394" data-captiontext="results table"&gt;
&lt;DIV&gt;
&lt;DIV id="df204ed6-85a7-44c9-b668-71b393290e9d" class="aj_j_50a7110f"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN&gt;Right-click a value in the &lt;FONT face="courier new,courier"&gt;session_id&lt;/FONT&gt; column and save it to a new evidence list called &lt;/SPAN&gt;&lt;I&gt;&lt;SPAN&gt;&lt;STRONG&gt;attacker’s session ID&lt;/STRONG&gt;.&lt;/SPAN&gt;&lt;/I&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN&gt;Right-click the &lt;FONT face="courier new,courier"&gt;user-agent&lt;/FONT&gt; value in the user_agent column and save it to a new evidence list called &lt;/SPAN&gt;&lt;I&gt;&lt;SPAN&gt;&lt;STRONG&gt;attacker’s userAgent&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/I&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN&gt;Select both the IP addresses by holding down the Shift key, right-click them, and add them to the &lt;STRONG&gt;Suspicious&lt;/STRONG&gt; evidence list&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;DIV&gt;
&lt;H2 id="13.-unveiling-the-attacker" class="headingSpacingAbove headingSpacingBelow"&gt;&lt;SPAN&gt;10. Unveiling the attacker&lt;/SPAN&gt;&lt;/H2&gt;
&lt;I class="e_a_1310c973 f_a_1310c973 css-105" aria-hidden="true"&gt;&lt;/I&gt;&lt;/DIV&gt;
&lt;P&gt;&lt;SPAN&gt;We have found the attacker’s IP address, session ID and the session ID from where the data was stolen. Let’s see if we can also find the same indicators from another session involving some authenticated users. Follow these steps:&lt;/SPAN&gt;&lt;BR /&gt;&amp;nbsp;&lt;/P&gt;
&lt;OL class="customListStyle"&gt;
&lt;LI&gt;&lt;SPAN&gt;Navigate back to the node “&lt;/SPAN&gt;&lt;I&gt;&lt;SPAN&gt;app requests&lt;/SPAN&gt;&lt;/I&gt;&lt;SPAN&gt;“&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN&gt;Build the DQL query:&lt;/SPAN&gt;
&lt;UL class="customListStyle"&gt;
&lt;LI&gt;&lt;SPAN&gt;From the &lt;STRONG&gt;Suspicious&lt;/STRONG&gt; evidence list menu, select &lt;STRONG&gt;Filter for&lt;/STRONG&gt; and choose the &lt;FONT face="courier new,courier"&gt;src_ip&lt;/FONT&gt; as the field. Both IP addresses from the evidence lists are added to the filter.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN&gt;From the &lt;FONT face="courier new,courier"&gt;user_agent&lt;/FONT&gt; column header, select &lt;STRONG&gt;Filter for&lt;/STRONG&gt; and choose &lt;STRONG&gt;attacker’s userAgent&lt;/STRONG&gt; evidence list&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN&gt;From the &lt;FONT face="courier new,courier"&gt;session_id&lt;/FONT&gt; column header, select &lt;STRONG&gt;Filter out&lt;/STRONG&gt; and choose &lt;STRONG&gt;attacker’s session ID&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;&lt;SPAN&gt;The query filters created look like this:&lt;/SPAN&gt;&lt;/P&gt;
&lt;PRE class="noSpacingAbove spacingBelow" data-text-type="withSpacing"&gt;&lt;SPAN class="fontSizeMedium"&gt;&lt;SPAN&gt;| filter ipIn(src_ip, {"84.50.141.4", "99.47.29.66"})&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN class="fontSizeMedium"&gt;&lt;SPAN&gt;| filter contains(user_agent, "Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:104.0) Gecko/20100101 Firefox/104.0")&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN class="fontSizeMedium"&gt;&lt;SPAN&gt;| filterOut contains(session_id, "ec3d68248c9")&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/PRE&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;&lt;SPAN&gt;Add a &lt;FONT face="courier new,courier"&gt;summarize&lt;/FONT&gt; command to aggregate the results based on the source_ip, session_id and username:&lt;/SPAN&gt;&lt;/P&gt;
&lt;PRE class="noSpacingAbove spacingBelow" data-text-type="withSpacing"&gt;&lt;SPAN class="fontSizeMedium"&gt;&lt;SPAN&gt;| summarize count = count(), by: {src_ip, session_id, user_id}&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/PRE&gt;
&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN&gt;Run the query, set the node color to &lt;STRONG&gt;yellow&lt;/STRONG&gt; and label the color &lt;/SPAN&gt;&lt;I&gt;&lt;SPAN&gt;&lt;STRONG&gt;unveiling the attacker! &lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/I&gt;&lt;SPAN&gt;O&lt;/SPAN&gt;&lt;SPAN&gt;nly &lt;STRONG&gt;one other user&lt;/STRONG&gt; has used the same IP address that was accidentally used for a brief moment when stealing the documents. It is now time to call Santa back and let him know who should be added to the Naughty list!&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;DIV&gt;
&lt;H1 id="conclusion" class="headingSpacingAbove headingSpacingBelow"&gt;Conclusion&lt;/H1&gt;
&lt;I class="e_a_1310c973 f_a_1310c973 css-105" aria-hidden="true"&gt;&lt;/I&gt;&lt;/DIV&gt;
&lt;P class="noSpacingAbove spacingBelow" data-text-type="withSpacing"&gt;&lt;I&gt;It seems at last we've found the truth,&lt;/I&gt;&lt;BR /&gt;&lt;I&gt;The culprit hiding in plain view.&lt;/I&gt;&lt;BR /&gt;&lt;I&gt;An IP trace, a fleeting spark,&lt;/I&gt;&lt;BR /&gt;&lt;I&gt;Reveals the shadow in the dark.&lt;/I&gt;&lt;BR /&gt;&lt;I&gt;&lt;/I&gt;&lt;/P&gt;
&lt;P class="noSpacingAbove spacingBelow" data-text-type="withSpacing"&gt;&lt;I&gt;Though the documents did slip away,&lt;/I&gt;&lt;BR /&gt;&lt;I&gt;We’ve caught the hand that led astray.&lt;/I&gt;&lt;BR /&gt;&lt;I&gt;The evidence is clear and bright,&lt;/I&gt;&lt;BR /&gt;&lt;I&gt;The guilty party now in sight.&lt;/I&gt;&lt;/P&gt;
&lt;P class="noSpacingAbove spacingBelow" data-text-type="withSpacing"&gt;&lt;I&gt;So with our task now done and right,&lt;/I&gt;&lt;BR /&gt;&lt;I&gt;Where Dynatrace yet shed some light.&lt;/I&gt;&lt;BR /&gt;&lt;I&gt;We bid farewell to this long fight,&lt;/I&gt;&lt;BR /&gt;&lt;I&gt;Merry Christmas to all, and to all, good night!&lt;/I&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;STRONG&gt;Congratulations!&lt;/STRONG&gt; You have finished the Hands-on &lt;/SPAN&gt;&lt;SPAN class="sp-mseditorfix" data-mseditorfix="363d7011-83dd-4cc0-bdec-ea4af4df4dbb:Excercise"&gt;Exercise&lt;/SPAN&gt;&lt;SPAN&gt;! The query tree that I constructed during this investigation looks like this:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="content-3.png" style="width: 400px;"&gt;&lt;img src="https://community.dynatrace.com/t5/image/serverpage/image-id/25444i9F2834D8B84E4B93/image-size/medium?v=v2&amp;amp;px=400" role="button" title="content-3.png" alt="content-3.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;For reference, there is a read-only investigation of this walkthrough available at &lt;/SPAN&gt;&lt;A href="https://wkf10640.apps.dynatrace.com/ui/apps/dynatrace.security.investigator/share/fe877938-7e71-47b2-8f03-dae29593daec" target="_blank" rel="noopener"&gt;&lt;SPAN&gt;https://wkf10640.apps.dynatrace.com/ui/apps/dynatrace.security.investigator/share/fe877938-7e71-47b2-8f03-dae29593daec&lt;/SPAN&gt;&lt;/A&gt;&lt;/P&gt;
&lt;P class="noSpacingAbove noSpacingBelow" data-text-type="noSpacing"&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 04 Mar 2025 14:55:07 GMT</pubDate>
      <guid>https://community.dynatrace.com/t5/Dynatrace-tips/Christmas-hands-on-Who-stole-Santa-s-secret-file/m-p/266126#M1668</guid>
      <dc:creator>Tiit_Hallas</dc:creator>
      <dc:date>2025-03-04T14:55:07Z</dc:date>
    </item>
    <item>
      <title>Re: Christmas hands-on: Who stole Santa’s secret file?</title>
      <link>https://community.dynatrace.com/t5/Dynatrace-tips/Christmas-hands-on-Who-stole-Santa-s-secret-file/m-p/266132#M1669</link>
      <description>&lt;P&gt;Very funny!&lt;/P&gt;&lt;P&gt;You are right in that the attacker might be playing special tricks. The IPs are very credible &lt;span class="lia-unicode-emoji" title=":beaming_face_with_smiling_eyes:"&gt;😁&lt;/span&gt;, but the browser version reveals some things. Although a Firefox user, I was not the one &lt;span class="lia-unicode-emoji" title=":rolling_on_the_floor_laughing:"&gt;🤣&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 23 Dec 2024 23:15:12 GMT</pubDate>
      <guid>https://community.dynatrace.com/t5/Dynatrace-tips/Christmas-hands-on-Who-stole-Santa-s-secret-file/m-p/266132#M1669</guid>
      <dc:creator>AntonioSousa</dc:creator>
      <dc:date>2024-12-23T23:15:12Z</dc:date>
    </item>
    <item>
      <title>Re: Christmas hands-on: Who stole Santa’s secret file?</title>
      <link>https://community.dynatrace.com/t5/Dynatrace-tips/Christmas-hands-on-Who-stole-Santa-s-secret-file/m-p/266136#M1670</link>
      <description>&lt;P&gt;Nice one!!!!!&lt;/P&gt;</description>
      <pubDate>Tue, 24 Dec 2024 08:10:36 GMT</pubDate>
      <guid>https://community.dynatrace.com/t5/Dynatrace-tips/Christmas-hands-on-Who-stole-Santa-s-secret-file/m-p/266136#M1670</guid>
      <dc:creator>PacoPorro</dc:creator>
      <dc:date>2024-12-24T08:10:36Z</dc:date>
    </item>
    <item>
      <title>Re: Christmas hands-on: Who stole Santa’s secret file?</title>
      <link>https://community.dynatrace.com/t5/Dynatrace-tips/Christmas-hands-on-Who-stole-Santa-s-secret-file/m-p/266140#M1671</link>
      <description>&lt;P&gt;Love it! We need more scavenger hunts like this one &amp;lt;3.&lt;/P&gt;</description>
      <pubDate>Tue, 24 Dec 2024 09:46:06 GMT</pubDate>
      <guid>https://community.dynatrace.com/t5/Dynatrace-tips/Christmas-hands-on-Who-stole-Santa-s-secret-file/m-p/266140#M1671</guid>
      <dc:creator>marina_pollehn</dc:creator>
      <dc:date>2024-12-24T09:46:06Z</dc:date>
    </item>
    <item>
      <title>Re: Christmas hands-on: Who stole Santa’s secret file?</title>
      <link>https://community.dynatrace.com/t5/Dynatrace-tips/Christmas-hands-on-Who-stole-Santa-s-secret-file/m-p/266160#M1672</link>
      <description>&lt;P&gt;Brilliant!!!!&lt;/P&gt;</description>
      <pubDate>Tue, 24 Dec 2024 15:29:54 GMT</pubDate>
      <guid>https://community.dynatrace.com/t5/Dynatrace-tips/Christmas-hands-on-Who-stole-Santa-s-secret-file/m-p/266160#M1672</guid>
      <dc:creator>DanielS</dc:creator>
      <dc:date>2024-12-24T15:29:54Z</dc:date>
    </item>
    <item>
      <title>Re: Christmas hands-on: Who stole Santa’s secret file?</title>
      <link>https://community.dynatrace.com/t5/Dynatrace-tips/Christmas-hands-on-Who-stole-Santa-s-secret-file/m-p/266161#M1673</link>
      <description>&lt;P&gt;Excellent!!!&lt;/P&gt;</description>
      <pubDate>Tue, 24 Dec 2024 16:21:56 GMT</pubDate>
      <guid>https://community.dynatrace.com/t5/Dynatrace-tips/Christmas-hands-on-Who-stole-Santa-s-secret-file/m-p/266161#M1673</guid>
      <dc:creator>Mizső</dc:creator>
      <dc:date>2024-12-24T16:21:56Z</dc:date>
    </item>
    <item>
      <title>Re: Christmas hands-on: Who stole Santa’s secret file?</title>
      <link>https://community.dynatrace.com/t5/Dynatrace-tips/Christmas-hands-on-Who-stole-Santa-s-secret-file/m-p/266175#M1674</link>
      <description>&lt;P&gt;Thanks&amp;nbsp;&lt;a href="https://community.dynatrace.com/t5/user/viewprofilepage/user-id/56833"&gt;@Tiit_Hallas&lt;/a&gt;&amp;nbsp;for insightful and organized contents.&lt;/P&gt;</description>
      <pubDate>Wed, 25 Dec 2024 06:57:54 GMT</pubDate>
      <guid>https://community.dynatrace.com/t5/Dynatrace-tips/Christmas-hands-on-Who-stole-Santa-s-secret-file/m-p/266175#M1674</guid>
      <dc:creator>Peter_Youssef</dc:creator>
      <dc:date>2024-12-25T06:57:54Z</dc:date>
    </item>
    <item>
      <title>Re: Christmas hands-on: Who stole Santa’s secret file?</title>
      <link>https://community.dynatrace.com/t5/Dynatrace-tips/Christmas-hands-on-Who-stole-Santa-s-secret-file/m-p/266178#M1675</link>
      <description>&lt;P&gt;I hope your trees don't look like the one from the investigation, or otherwise, they will likely fall when your cat visits them.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;a href="https://community.dynatrace.com/t5/user/viewprofilepage/user-id/56833"&gt;@Tiit_Hallas&lt;/a&gt;&amp;nbsp;hilarious! kudos!&lt;/P&gt;</description>
      <pubDate>Wed, 25 Dec 2024 08:02:02 GMT</pubDate>
      <guid>https://community.dynatrace.com/t5/Dynatrace-tips/Christmas-hands-on-Who-stole-Santa-s-secret-file/m-p/266178#M1675</guid>
      <dc:creator>zietho</dc:creator>
      <dc:date>2024-12-25T08:02:02Z</dc:date>
    </item>
  </channel>
</rss>

