2019-10-01 10:16:42 -04:00
title : Elastic Winlogbeat (from 7.x) index pattern and field mapping following Elastic enabled Modules
order : 20
backends :
- es-qs
- es-dsl
2020-02-24 23:20:48 +01:00
- es-rule
2021-06-08 13:32:18 -04:00
- es-rule-eql
- es-eql
2019-10-01 10:16:42 -04:00
- kibana
2020-11-09 08:42:35 +01:00
- kibana-ndjson
2019-10-01 10:16:42 -04:00
- xpack-watcher
- elastalert
- elastalert-dsl
2020-05-08 10:04:59 +02:00
- ee-outliers
2019-10-01 10:16:42 -04:00
logsources :
windows :
product : windows
index : winlogbeat-*
windows-application :
product : windows
service : application
conditions :
winlog.channel : Application
windows-security :
product : windows
service : security
conditions :
winlog.channel : Security
2021-05-30 09:27:08 +02:00
windows-system :
product : windows
service : system
conditions :
winlog.channel : System
2019-10-01 10:16:42 -04:00
windows-sysmon :
product : windows
service : sysmon
conditions :
winlog.channel : 'Microsoft-Windows-Sysmon/Operational'
2021-06-01 10:47:17 +02:00
windows-powershell :
product : windows
service : powershell
conditions :
winlog.channel : 'Microsoft-Windows-PowerShell/Operational'
windows-classicpowershell :
product : windows
service : powershell-classic
conditions :
winlog.channel : 'Windows PowerShell'
2019-10-01 10:16:42 -04:00
windows-dns-server :
product : windows
service : dns-server
conditions :
winlog.channel : 'DNS Server'
windows-driver-framework :
product : windows
service : driver-framework
conditions :
2022-02-23 17:50:23 +01:00
winlog.channel : 'Microsoft-Windows-DriverFrameworks-UserMode/Operational'
2019-10-01 10:16:42 -04:00
windows-dhcp :
product : windows
service : dhcp
conditions :
2022-02-23 17:50:23 +01:00
winlog.channel : 'Microsoft-Windows-DHCP-Server/Operational'
2020-07-02 23:20:36 +02:00
windows-ntlm :
product : windows
service : ntlm
conditions :
2022-02-23 17:50:23 +01:00
winlog.channel : 'Microsoft-Windows-NTLM/Operational'
2020-06-28 10:55:32 +02:00
windows-defender :
product : windows
service : windefend
conditions :
winlog.channel : 'Microsoft-Windows-Windows Defender/Operational'
2021-06-30 14:22:40 +02:00
windows-printservice-admin :
2021-06-30 14:09:44 +02:00
product : windows
2021-06-30 14:22:40 +02:00
service : printservice-admin
2021-06-30 14:09:44 +02:00
conditions :
2021-06-30 14:22:40 +02:00
winlog.channel : 'Microsoft-Windows-PrintService/Admin'
2021-07-01 09:55:15 +02:00
windows-printservice-operational :
product : windows
service : printservice-operational
conditions :
winlog.channel : 'Microsoft-Windows-PrintService/Operational'
2022-01-20 09:44:36 +01:00
windows-codeintegrity-operational :
product : windows
service : codeintegrity-operational
conditions :
winlog.channel : 'Microsoft-Windows-CodeIntegrity/Operational'
2021-06-30 14:16:26 +02:00
windows-smbclient-security :
product : windows
service : smbclient-security
conditions :
winlog.channel : 'Microsoft-Windows-SmbClient/Security'
2020-07-13 20:21:46 +00:00
windows-applocker :
product : windows
service : applocker
conditions :
winlog.channel :
- 'Microsoft-Windows-AppLocker/MSI and Script'
- 'Microsoft-Windows-AppLocker/EXE and DLL'
- 'Microsoft-Windows-AppLocker/Packaged app-Deployment'
- 'Microsoft-Windows-AppLocker/Packaged app-Execution'
2021-03-20 08:49:59 +01:00
windows-msexchange-management :
product : windows
service : msexchange-management
conditions :
winlog.channel : 'MSExchange Management'
2021-11-09 10:48:13 +01:00
microsoft-servicebus-client :
product : windows
service : microsoft-servicebus-client
conditions :
winlog.channel : 'Microsoft-ServiceBus-Client'
2022-02-19 10:18:49 +01:00
windows-firewall-advanced-security :
product : windows
service : firewall-as
conditions :
winlog.channel : 'Microsoft-Windows-Windows Firewall With Advanced Security/Firewall'
2022-03-03 06:27:00 +01:00
windows-bits-client :
product : windows
service : bits-client
conditions :
2022-03-05 11:21:00 +01:00
winlog.channel : 'Microsoft-Windows-Bits-Client/Operational'
2019-10-01 10:16:42 -04:00
defaultindex : winlogbeat-*
2021-02-24 14:43:13 +00:00
# Extract all field names with yq:
2019-10-01 10:16:42 -04:00
# yq -r '.detection | del(.condition) | map(keys) | .[][]' $(find sigma/rules/windows -name '*.yml') | sort -u | grep -v ^EventID$ | sed 's/^\(.*\)/ \1: winlog.event_data.\1/g'
# Keep EventID! Clean up the list afterwards!
fieldmappings :
2021-07-14 11:01:45 +08:00
EventID : event.code
2021-08-05 11:20:22 +02:00
Channel : winlog.channel
2021-08-06 10:52:24 +02:00
#Keywords: from "<System><Keywords>Value</Keywords></System><EventData>" is lost with winlogbeat exist in nxlog
2021-10-13 13:04:11 +02:00
Provider_Name : winlog.provider_name
2021-07-06 15:56:33 +02:00
CallingProcessName : winlog.event_data.CallingProcessName
2021-10-20 17:06:55 +03:00
ComputerName : winlog.computer_name
2021-07-06 15:56:33 +02:00
EventType : winlog.event_data.EventType
FailureCode : winlog.event_data.FailureCode
FileName : file.path
HiveName : winlog.event_data.HiveName
ProcessCommandLine : winlog.event_data.ProcessCommandLine
SecurityID : winlog.event_data.SecurityID
Source : winlog.event_data.Source
# Channel: WLAN-Autoconfig AND EventID: 8001
AuthenticationAlgorithm : winlog.event_data.AuthenticationAlgorithm
BSSID : winlog.event_data.BSSID
BSSType : winlog.event_data.BSSType
CipherAlgorithm : winlog.event_data.CipherAlgorithm
ConnectionId : winlog.event_data.ConnectionId
ConnectionMode : winlog.event_data.ConnectionMode
InterfaceDescription : winlog.event_data.InterfaceDescription
InterfaceGuid : winlog.event_data.InterfaceGuid
OnexEnabled : winlog.event_data.OnexEnabled
PHYType : winlog.event_data.PHYType
ProfileName : winlog.event_data.ProfileName
SSID : winlog.event_data.SSID
Accesses : winlog.event_data.Accesses
2021-07-07 12:28:00 +02:00
ClassName : winlog.event_data.ClassName
2021-07-06 15:56:33 +02:00
ClassId : winlog.event_data.ClassId
DeviceDescription : winlog.event_data.DeviceDescription
2021-07-07 12:28:00 +02:00
# ErrorCode => printservice-admin EventID: 4909 or 808
ErrorCode : winlog.event_data.ErrorCode
2021-07-06 15:56:33 +02:00
FilePath : winlog.event_data.FilePath
2021-07-07 12:28:00 +02:00
# Filename => product: antivirus
Filename : winlog.event_data.Filename
2021-07-06 15:56:33 +02:00
LDAPDisplayName : winlog.event_data.LDAPDisplayName
2021-07-07 12:28:00 +02:00
# Level => Source: MSExchange Control Panel EventID: 4
Level : winlog.event_data.Level
2021-07-06 15:56:33 +02:00
TargetProcessAddress : winlog.event_data.TargetProcessAddress
2021-07-07 12:28:00 +02:00
# UserName => smbclient-security eventid:31017
UserName : winlog.event_data.UserName
2021-08-05 10:54:58 +02:00
#
# Sysmon/Operational up to ID 25
#
RuleName : winlog.event_data.RuleName
ProcessGuid : process.entity_id
ProcessId : process.pid
Image : process.executable
FileVersion :
category=process_creation : process.pe.file_version
2021-10-28 16:05:40 +01:00
category=image_load : file.pe.file_version
2021-08-05 10:54:58 +02:00
default : winlog.event_data.FileVersion
Description :
category=process_creation : process.pe.description
2021-10-28 16:05:40 +01:00
category=image_load : file.pe.description
2021-08-05 10:54:58 +02:00
category=sysmon_error : winlog.event_data.Description
default : winlog.event_data.Description
Product :
category=process_creation : process.pe.product
2021-10-28 16:05:40 +01:00
category=image_load : file.pe.product
2021-08-05 10:54:58 +02:00
default : winlog.event_data.Product
Company :
category=process_creation : process.pe.company
2021-10-28 16:05:40 +01:00
category=image_load : file.pe.company
2021-08-05 10:54:58 +02:00
default : winlog.event_data.Company
2021-10-28 16:05:40 +01:00
OriginalFileName :
category=process_creation : process.pe.original_file_name
category=image_load : file.pe.original_file_name
default : winlog.event_data.OriginalFileName
2021-08-05 10:54:58 +02:00
CommandLine :
category=process_creation : process.command_line
2021-08-05 13:31:39 +02:00
service=security : process.command_line
2021-08-05 10:54:58 +02:00
service=powershell-classic : powershell.command.value
default : winlog.event_data.CommandLine
CurrentDirectory : process.working_directory
LogonGuid : winlog.event_data.LogonGuid
LogonId : winlog.event_data.LogonId
TerminalSessionId : winlog.event_data.TerminalSessionId
IntegrityLevel : winlog.event_data.IntegrityLevel
ParentProcessGuid : process.parent.entity_id
ParentProcessId : process.parent.pid
ParentImage : process.parent.executable
ParentCommandLine : process.parent.command_line
2021-10-27 12:58:10 +02:00
ParentUser : winlog.event_data.ParentUser #Sysmon 13.30
2021-10-27 17:13:34 +02:00
SourceUser : winlog.event_data.SourceUser #Sysmon 13.30
TargetUser : winlog.event_data.TargetUser #Sysmon 13.30
2021-08-05 10:54:58 +02:00
TargetFilename : file.path
CreationUtcTime : winlog.event_data.CreationUtcTime
PreviousCreationUtcTime : winlog.event_data.PreviousCreationUtcTime
2021-08-05 13:31:39 +02:00
Protocol :
category=network_connection : network.transport
default : winlog.event_data.Protocol
2021-08-05 10:54:58 +02:00
Initiated :
category=network_connection : network.direction
default : winlog.event_data.Initiated
#SourceIsIpv6: winlog.event_data.SourceIsIpv6 #=gets deleted and not boolean...https://github.com/elastic/beats/blob/71eee76e7cfb8d5b18dfacad64864370ddb14ce7/x-pack/winlogbeat/module/sysmon/config/winlogbeat-sysmon.js#L278-L279
SourceIp : source.ip
SourceHostname : source.domain
SourcePort : source.port
SourcePortName : winlog.event_data.SourcePortName
#DestinationIsIpv6: winlog.event_data.DestinationIsIpv6 #=gets deleted and not boolean...https://github.com/elastic/beats/blob/71eee76e7cfb8d5b18dfacad64864370ddb14ce7/x-pack/winlogbeat/module/sysmon/config/winlogbeat-sysmon.js#L278-L279
DestinationIp : destination.ip
DestinationHostname : destination.domain
DestinationPort : destination.port
DestinationPortName : network.protocol
State : winlog.event_data.State
Version : winlog.event_data.Version
SchemaVersion : winlog.event_data.SchemaVersion
ImageLoaded : file.path
Signed : file.code_signature.signed
2021-08-06 10:52:24 +02:00
Signature :
category=driver_loaded : file.code_signature.subject_name
category=image_loaded : file.code_signature.subject_name
default : winlog.event_data.Signature
2021-08-05 10:54:58 +02:00
SignatureStatus : file.code_signature.status
SourceProcessGuid : process.entity_id
SourceProcessId : process.pid
SourceImage : process.executable
TargetProcessGuid : winlog.event_data.TargetProcessGuid
TargetProcessId : winlog.event_data.TargetProcessId
TargetImage : winlog.event_data.TargetImage
NewThreadId : winlog.event_data.NewThreadId
StartAddress : winlog.event_data.StartAddress
StartModule : winlog.event_data.StartModule
StartFunction : winlog.event_data.StartFunction
Device : file.path
SourceThreadId : process.thread.id
GrantedAccess : winlog.event_data.GrantedAccess
CallTrace : winlog.event_data.CallTrace
TargetObject : registry.path
Details : winlog.event_data.Details
NewName : winlog.event_data.NewName
Configuration : winlog.event_data.Configuration
ConfigurationFileHash : winlog.event_data.ConfigurationFileHash
PipeName : file.name
User : winlog.event_data.User
EventNamespace : winlog.event_data.EventNamespace
Name : winlog.event_data.Name
Query : winlog.event_data.Query
Operation : winlog.event_data.Operation
Type : winlog.event_data.Type
Destination : process.executable
Consumer : winlog.event_data.Consumer
Filter : winlog.event_data.Filter
QueryName : dns.question.name
QueryStatus : sysmon.dns.status
QueryResults : winlog.event_data.QueryResults
IsExecutable : sysmon.file.is_executable
Archived : sysmon.file.archived
Session : winlog.event_data.Session
ClientInfo : winlog.event_data.ClientInfo
2021-08-04 15:09:02 +02:00
# SYSMON Hashes
Hashes : winlog.event_data.Hashes
# extraction from Hashes NOT a original field but find in some rule
md5 :
category=driver_load : hash.md5
category=image_load : file.hash.md5
default : process.hash.md5
sha1 :
category=driver_load : hash.sha1
category=image_load : file.hash.sha1
default : process.hash.sha1
sha256 :
category=driver_load : hash.sha256
category=image_load : file.hash.sha256
default : process.hash.sha256
Imphash :
category=driver_load : hash.imphash
category=image_load : file.hash.imphash
2021-08-04 15:46:05 +02:00
default : process.pe.imphash
2021-08-05 10:54:58 +02:00
#
# Powershell
#
CommandName : powershell.command.name
CommandPath : powershell.command.path
CommandType : powershell.command.type
EngineVersion :
service=powershell-classic : powershell.engine.version
default : winlog.event_data.EngineVersion
HostApplication : process.command_line
HostId : process.entity_id
HostName : process.title
HostVersion :
service=powershell-classic : powershell.process.executable_version
default : winlog.event_data.HostVersion
NewEngineState : powershell.engine.new_state
PipelineId : powershell.pipeline_id
PreviousEngineState : powershell.engine.previous_state
RunspaceId : powershell.runspace_id
ScriptName : file.path
SequenceNumber : event.sequence
NewProviderState : powershell.provider.new_state
ProviderName : powershell.provider.name
Payload : winlog.event_data.Payload
ContextInfo : winlog.event_data.ContextInfo
MessageNumber : powershell.sequence
MessageTotal : powershell.total
ScriptBlockText : powershell.file.script_block_text
ScriptBlockId : powershell.file.script_block_id
#
# Security
#
2021-08-05 13:31:39 +02:00
AccessGranted : winlog.event_data.AccessGranted
AccessList : winlog.event_data.AccessList
AccessMask : winlog.event_data.AccessMask
AccessReason : winlog.event_data.AccessReason
AccessRemoved : winlog.event_data.AccessRemoved
AccountDomain : user.domain
AccountExpires : winlog.event_data.AccountExpires
AccountName : user.name
AdditionalInfo : winlog.event_data.AdditionalInfo
AdditionalInfo2 : winlog.event_data.AdditionalInfo2
AllowedToDelegateTo : winlog.event_data.AllowedToDelegateTo
AppCorrelationID : winlog.event_data.AppCorrelationID
Application : process.executable
AttributeLDAPDisplayName : winlog.event_data.AttributeLDAPDisplayName
AttributeSyntaxOID : winlog.event_data.AttributeSyntaxOID
AttributeValue : winlog.event_data.AttributeValue
AuditPolicyChanges : winlog.event_data.AuditPolicyChanges
AuditSourceName : winlog.event_data.AuditSourceName
AuthenticationPackageName : winlog.event_data.AuthenticationPackageName
CallerProcessId : winlog.event_data.CallerProcessId
CallerProcessName : winlog.event_data.CallerProcessName
CategoryId : winlog.event_data.CategoryId
CertIssuerName : winlog.event_data.CertIssuerName
CertSerialNumber : winlog.event_data.CertSerialNumber
CertThumbprint : winlog.event_data.CertThumbprint
ClientAddress : source.ip
ClientName : source.domain
ClientProcessId : winlog.event_data.ClientProcessId
ClientProcessStartKey : winlog.event_data.ClientProcessStartKey
ComputerAccountChange : winlog.event_data.ComputerAccountChange
CrashOnAuditFailValue : winlog.event_data.CrashOnAuditFailValue
DestAddress : destination.ip
DestPort : destination.port
Direction : winlog.event_data.Direction
DisplayName : winlog.event_data.DisplayName
DnsHostName : winlog.event_data.DnsHostName
DomainBehaviorVersion : winlog.event_data.DomainBehaviorVersion
DomainName : winlog.event_data.DomainName
DomainPolicyChanged : winlog.event_data.DomainPolicyChanged
DomainSid : winlog.event_data.DomainSid
DSName : winlog.event_data.DSName
DSType : winlog.event_data.DSType
Dummy : winlog.event_data.Dummy
ElevatedToken : winlog.event_data.ElevatedToken
EventSourceId : winlog.event_data.EventSourceId
FailureReason : winlog.event_data.FailureReason
FilterRTID : winlog.event_data.FilterRTID
ForceLogoff : winlog.event_data.ForceLogoff
FQDN : winlog.event_data.FQDN
GroupTypeChange : winlog.event_data.GroupTypeChange
HandleId : winlog.event_data.HandleId
HomeDirectory : winlog.event_data.HomeDirectory
HomePath : winlog.event_data.HomePath
ImagePath : winlog.event_data.ImagePath
ImpersonationLevel : winlog.event_data.ImpersonationLevel
IpAddress : source.ip
IpPort : source.port
KeyLength : winlog.event_data.KeyLength
LayerName : winlog.event_data.LayerName
LayerRTID : winlog.event_data.LayerRTID
LmPackageName : winlog.event_data.LmPackageName
LockoutDuration : winlog.event_data.LockoutDuration
LockoutObservationWindow : winlog.event_data.LockoutObservationWindow
LockoutThreshold : winlog.event_data.LockoutThreshold
LogonHours : winlog.event_data.LogonHours
2021-08-05 11:20:22 +02:00
SubjectLogonId :
service=security : winlog.logon.id
default : winlog.event_data.SubjectLogonId
LogonProcessName : winlog.event_data.LogonProcessName
LogonType : winlog.event_data.LogonType
2021-08-05 13:31:39 +02:00
MachineAccountQuota : winlog.event_data.MachineAccountQuota
MandatoryLabel : winlog.event_data.MandatoryLabel
MasterKeyId : winlog.event_data.MasterKeyId
MaxPasswordAge : winlog.event_data.MaxPasswordAge
MemberName : winlog.event_data.MemberName
MemberSid : winlog.event_data.MemberSid
MinPasswordAge : winlog.event_data.MinPasswordAge
MinPasswordLength : winlog.event_data.MinPasswordLength
MixedDomainMode : winlog.event_data.MixedDomainMode
NewProcessId : process.pid
NewProcessName : process.executable
NewSd : winlog.event_data.NewSd
NewTargetUserName : winlog.event_data.NewTargetUserName
NewTime : winlog.event_data.NewTime
NewUacValue : winlog.event_data.NewUacValue
NewValue : winlog.event_data.NewValue
NewValueType : winlog.event_data.NewValueType
ObjectClass : winlog.event_data.ObjectClass
ObjectDN : winlog.event_data.ObjectDN
ObjectGUID : winlog.event_data.ObjectGUID
ObjectName : winlog.event_data.ObjectName
ObjectServer : winlog.event_data.ObjectServer
ObjectType : winlog.event_data.ObjectType
ObjectValueName : winlog.event_data.ObjectValueName
OemInformation : winlog.event_data.OemInformation
OldSd : winlog.event_data.OldSd
OldTargetUserName : winlog.event_data.OldTargetUserName
OldUacValue : winlog.event_data.OldUacValue
OldValue : winlog.event_data.OldValue
OldValueType : winlog.event_data.OldValueType
OpCorrelationID : winlog.event_data.OpCorrelationID
OperationType : winlog.event_data.OperationType
PackageName : winlog.event_data.PackageName
ParentProcessName : process.parent.name
PasswordHistoryLength : winlog.event_data.PasswordHistoryLength
PasswordLastSet : winlog.event_data.PasswordLastSet
PasswordProperties : winlog.event_data.PasswordProperties
PreAuthType : winlog.event_data.PreAuthType
PreviousTime : winlog.event_data.PreviousTime
PrimaryGroupId : winlog.event_data.PrimaryGroupId
PrivilegeList : winlog.event_data.PrivilegeList
2021-08-05 11:20:22 +02:00
ProcessName : process.executable
2021-08-05 13:31:39 +02:00
ProfilePath : winlog.event_data.ProfilePath
Properties : winlog.event_data.Properties
PuaCount : winlog.event_data.PuaCount
PuaPolicyId : winlog.event_data.PuaPolicyId
RecoveryKeyId : winlog.event_data.RecoveryKeyId
RecoveryServer : winlog.event_data.RecoveryServer
RelativeTargetName : winlog.event_data.RelativeTargetName
RemoteMachineID : winlog.event_data.RemoteMachineID
RemoteUserID : winlog.event_data.RemoteUserID
ResourceAttributes : winlog.event_data.ResourceAttributes
2021-08-05 11:20:22 +02:00
RestrictedAdminMode : winlog.event_data.RestrictedAdminMode
2021-08-05 13:31:39 +02:00
RestrictedSidCount : winlog.event_data.RestrictedSidCount
RpcCallClientLocality : winlog.event_data.RpcCallClientLocality
SamAccountName : winlog.event_data.SamAccountName
ScriptPath : winlog.event_data.ScriptPath
Service : winlog.event_data.Service
ServiceAccount : winlog.event_data.ServiceAccount
ServiceFileName : winlog.event_data.ServiceFileName
2021-08-05 10:54:58 +02:00
ServiceName :
service=security : service.name
default : winlog.event_data.ServiceName
2021-08-05 13:31:39 +02:00
ServicePrincipalNames : winlog.event_data.ServicePrincipalNames
ServiceSid : winlog.event_data.ServiceSid
ServiceStartType : winlog.event_data.ServiceStartType
2021-08-04 15:46:05 +02:00
ServiceType : winlog.event_data.ServiceType
2021-08-05 13:31:39 +02:00
SessionId : winlog.event_data.SessionId
SessionName : winlog.event_data.SessionName
ShareLocalPath : winlog.event_data.ShareLocalPath
ShareName : winlog.event_data.ShareName
SidHistory : winlog.event_data.SidHistory
SidList : winlog.event_data.SidList
SourceAddress : source.ip
Status : winlog.event_data.Status
StartType : winlog.event_data.StartType
SubcategoryGuid : winlog.event_data.SubcategoryGuid
SubcategoryId : winlog.event_data.SubcategoryId
SubjectDomainName :
service=security : user.domain
default : winlog.event_data.SubjectDomainName
SubjectUserName :
service=security : user.name
default : winlog.event_data.SubjectUserName
SubjectUserSid :
service=security : user.id
default : winlog.event_data.SubjectUserSid
SubStatus : winlog.event_data.SubStatus
TargetDomainName : user.domain
TargetLinkedLogonId : winlog.event_data.TargetLinkedLogonId
2021-08-05 13:36:18 +02:00
TargetLogonId :
2021-08-05 13:31:39 +02:00
service=security : winlog.logon.id
default : winlog.event_data.TargetLogonId
TargetOutboundDomainName : winlog.event_data.TargetOutboundDomainName
TargetOutboundUserName : winlog.event_data.TargetOutboundUserName
TargetServerName : winlog.event_data.TargetServerName
TargetSid : winlog.event_data.TargetSid
2021-09-27 09:27:01 +02:00
TargetUserName : winlog.event_data.TargetUserName
TargetUserSid : winlog.event_data.TargetUserSid
2021-08-05 13:31:39 +02:00
TaskContent : winlog.event_data.TaskContent
TaskName : winlog.event_data.TaskName
TicketEncryptionType : winlog.event_data.TicketEncryptionType
TicketOptions : winlog.event_data.TicketOptions
TokenElevationType : winlog.event_data.TokenElevationType
TransactionId : winlog.event_data.TransactionId
TransmittedServices : winlog.event_data.TransmittedServices
UserAccountControl : winlog.event_data.UserAccountControl
UserParameters : winlog.event_data.UserParameters
UserPrincipalName : winlog.event_data.UserPrincipalName
UserWorkstations : winlog.event_data.UserWorkstations
VirtualAccount : winlog.event_data.VirtualAccount
Workstation : winlog.event_data.Workstation
WorkstationName : source.domain
2021-08-06 10:52:24 +02:00
#
# System
#
DriveName : winlog.event_data.DriveName
DeviceName : winlog.event_data.DeviceName
HeaderFlags : winlog.event_data.HeaderFlags
Severity : winlog.event_data.Severity
Origin : winlog.event_data.Origin
Verb : winlog.event_data.Verb
Outcome : winlog.event_data.Outcome
SampleLength : winlog.event_data.SampleLength
SampleData : winlog.event_data.SampleData
SourceFile : winlog.event_data.SourceFile
SourceLine : winlog.event_data.SourceLine
SourceTag : winlog.event_data.SourceTag
CallStack : winlog.event_data.CallStack
2021-08-06 11:12:34 +02:00
#
# Microsoft-Windows-Windows Defender/Operational
#
2021-10-13 14:36:10 +02:00
Action_ID : winlog.event_data.Action\ ID
Action_Name : winlog.event_data.Action\ Name
Additional_Actions_ID : winlog.event_data.Additional\ Actions\ ID
Additional_Actions_String : winlog.event_data.Additional\ Actions\ String
Category_ID : winlog.event_data.Category\ ID
Category_Name : winlog.event_data.Category\ Name
Detection_ID : winlog.event_data.Detection\ ID
Detection_Time : winlog.event_data.Detection\ Time
Detection_User : winlog.event_data.Detection\ User
Engine_Version : winlog.event_data.Engine\ Version
Error_Code : winlog.event_data.Error\ Code
Error_Description : winlog.event_data.Error\ Description
Execution_ID : winlog.event_data.Execution\ ID
Execution_Name : winlog.event_data.Execution\ Name
2021-08-06 11:12:34 +02:00
FWLink : winlog.event_data.FWLink
2021-10-13 14:36:10 +02:00
New_Value : winlog.event_data.New\ Value
Old_Value : winlog.event_data.Old\ Value
Origin_ID : winlog.event_data.Origin\ ID
Origin_Name : winlog.event_data.Origin\ Name
2021-08-06 11:12:34 +02:00
Path : winlog.event_data.Path
2021-10-13 14:36:10 +02:00
Post_Clean_Status : winlog.event_data.Post\ Clean\ Status
Pre_Execution_Status : winlog.event_data.Pre\ Execution\ Status
Process_Name : winlog.event_data.Process\ Name
Product_Name : winlog.event_data.Product\ Name
Product_Version : winlog.event_data.Product\ Version
Remediation_User : winlog.event_data.Remediation\ User
Security_intelligence_Version : winlog.event_data.Security\ intelligence\ Version
Severity_ID : winlog.event_data.Severity\ ID
Severity_Name : winlog.event_data.Severity\ Name
Source_ID : winlog.event_data.Source\ ID
Source_Name : winlog.event_data.Source\ Name
Status_Code : winlog.event_data.Status\ Code
Status_Description : winlog.event_data.Status\ Description
Threat_ID : winlog.event_data.Threat\ ID
Threat_Name : winlog.event_data.Threat\ Name
Type_ID : winlog.event_data.Type\ ID
Type_Name : winlog.event_data.Type\ Name
2022-03-01 15:36:39 +01:00
#
# Microsoft-Windows-Windows Firewall With Advanced Security/Firewall
#
ApplicationPath : winlog.event_data.ApplicationPath
ModifyingApplication : winlog.event_data.ModifyingApplication
Action : winlog.event_data.Action
2022-03-05 11:21:00 +01:00