-
-
Notifications
You must be signed in to change notification settings - Fork 2.3k
Taxonomy
Florian Roth edited this page Nov 20, 2020
·
14 revisions
This page defines field names and log sources that should be used to ensure sharable rules.
Process creation events can be defined with the generic log source category process_creation. The event scope can be further restricted with product. Example for a process creation event log source restricted to Windows:
category: process_creation
product: windows
The field names follow the field names used in Sysmon events:
Field Name | Example Value | Comment |
---|---|---|
UtcTime | 2019-03-02 08:51:00.008 | (useless) |
ProcessGuid | {c1b49677-43f4-5c7a-0000-0010d3dd8044} | (useless) |
ProcessId | 1028 | |
Image | C:\Program Files (x86)\Google\Update\GoogleUpdate.exe | |
FileVersion | 1.3.28.13 | |
Description | Google Installer | |
Product | Google Update | |
Company | Google Inc. | |
CommandLine | "C:\Program Files (x86)\Google\Update\GoogleUpdate.exe" /ua /installsource scheduler | |
CurrentDirectory | C:\Windows\system32| | |
User | NT AUTHORITY\SYSTEM | |
LogonGuid | {c1b49677-3fb9-5c09-0000-0020e7030000} | (useless) |
LogonId | 0x3e7 | |
TerminalSessionId | 0 | |
IntegrityLevel | System | |
imphash | E96A73C7BF33A464C510EDE582318BF2 | |
md5 | CCF1D1573F175299ADE01C07791A6541 | |
sha1 | 0AE1F9071C5E8FE4A69D3F671937935D242D8A6C | |
sha256 | 68A15A34C2E28B9B521A240B948634617D72AD619E3950BC6DC769E60A0C3CF2 | |
ParentProcessGuid | {c1b49677-6b43-5c78-0000-00107fb77544} | (useless) |
ParentProcessId | 1724 | |
ParentImage | C:\Windows\System32\taskeng.exe | |
ParentCommandLine | taskeng.exe {88F94E5C-5DC3-4606-AEFA-BDCA976D6113} S-1-5-18:NT AUTHORITY\System:Service: |
We align our field names to the field names that Sysmon uses. You can find all possible field values in the Sysmon Community Guide and on UltimateWindowsSecurity.com.
-
product: windows
: Windows Operating System logs. The naming of Windows Eventlog attributes is used in Sigma rules.-
service: security
: Windows Security Event Log. Some may be covered by generic log sources. -
service: system
: Windows System Event Log -
service: sysmon
: Event Logs created by Sysmon. Some may be covered by generic log sources. service: taskscheduler
service: wmi
service: application
service: dns-server
service: driver-framework
service: powershell
-
service: powershell-classic
: ???
-
-
product: linux
: Linux log files-
service: auth
: Linux authentication logs. Usually /var/log/auth.log. -
service: auditd
: Linux audit logs -
service: clamav
: ClamAV logs
-
-
product: apache
: Apache httpd logs-
service: access
: Access logs -
service: error
: Error logs
-
-
category: proxy
- Field Name according to W3C Extended Log File Format. Additional W3 examples can be found from Microsoft.
- Field names:
- c-uri: URL requested by client
- c-uri-extension: Extension of the URL. Commonly is the requested extension of a file name
- c-uri-query: Path component of requested URL
- c-uri-stem: Stem of the requested URL
- c-useragent: the clients user agent.
- cs-bytes: Number of bytes sent from the server
- cs-cookie: Cookie headers sent from client to server.
- cs-host: Host header send from client to server
- cs-method: HTTP request method
- r-dns: The Domain requested. Additionally is referred to as the Host header or URL Domain. Recommend to use
cs-host
instead of this field - cs-referrer: The referring link or site
- cs-version: The HTTP protocol version that the client used
- sc-bytes: Number of bytes sent from the client
- sc-status: The HTTP status code
- src_ip: The IP address of the client that made the request
- dst_ip: The IP address of the server
-
category: firewall
- Field Names:
-
src_ip
,src_port
,dst_ip
,dst_port
,username
-
- Field Names:
category: dns
-
category: webserver
- Uses the same field names as
category: proxy
- Uses the same field names as