{ "enrichments": [ { "field_name": "severity", "value": "High", "confidence": 0.86, "method": "classification", "reasoning": "Encoded PowerShell plus outbound beacon attempt on finance endpoints indicates probable hands-on intrusion." }, { "field_name": "likely_root_cause", "value": "Phishing-delivered macro spawning PowerShell with command-and-control bootstrap.", "confidence": 0.78, "method": "assessment", "reasoning": "Behavior matches common initial access plus tooling chain." }, { "field_name": "first_action", "value": "Isolate host in Falcon, kill process tree, quarantine artifact, and rotate creds used in the last 24h.", "confidence": 0.8, "method": "reasoning", "reasoning": "Containment + credential hygiene reduces lateral movement risk." } ] }