Skip to content

Taxonomy

Florian Roth edited this page Nov 20, 2020 · 14 revisions

This page defines field names and log sources that should be used to ensure sharable rules.

Log Sources

Generic

Process Creation Events

Process creation events can be defined with the generic log source category process_creation. The event scope can be further restricted with product. Example for a process creation event log source restricted to Windows:

category: process_creation
product: windows

The field names follow the field names used in Sysmon events:

Field Name Example Value Comment
UtcTime 2019-03-02 08:51:00.008 (useless)
ProcessGuid {c1b49677-43f4-5c7a-0000-0010d3dd8044} (useless)
ProcessId 1028
Image C:\Program Files (x86)\Google\Update\GoogleUpdate.exe
FileVersion 1.3.28.13
Description Google Installer
Product Google Update
Company Google Inc.
CommandLine "C:\Program Files (x86)\Google\Update\GoogleUpdate.exe" /ua /installsource scheduler
CurrentDirectory C:\Windows\system32|
User NT AUTHORITY\SYSTEM
LogonGuid {c1b49677-3fb9-5c09-0000-0020e7030000} (useless)
LogonId 0x3e7
TerminalSessionId 0
IntegrityLevel System
imphash E96A73C7BF33A464C510EDE582318BF2
md5 CCF1D1573F175299ADE01C07791A6541
sha1 0AE1F9071C5E8FE4A69D3F671937935D242D8A6C
sha256 68A15A34C2E28B9B521A240B948634617D72AD619E3950BC6DC769E60A0C3CF2
ParentProcessGuid {c1b49677-6b43-5c78-0000-00107fb77544} (useless)
ParentProcessId 1724
ParentImage C:\Windows\System32\taskeng.exe
ParentCommandLine taskeng.exe {88F94E5C-5DC3-4606-AEFA-BDCA976D6113} S-1-5-18:NT AUTHORITY\System:Service:

Other Generic Rule Categories

We align our field names to the field names that Sysmon uses. You can find all possible field values in the Sysmon Community Guide and on UltimateWindowsSecurity.com.

Specific

  • product: windows: Windows Operating System logs. The naming of Windows Eventlog attributes is used in Sigma rules.
    • service: security: Windows Security Event Log. Some may be covered by generic log sources.
    • service: system: Windows System Event Log
    • service: sysmon: Event Logs created by Sysmon. Some may be covered by generic log sources.
    • service: taskscheduler
    • service: wmi
    • service: application
    • service: dns-server
    • service: driver-framework
    • service: powershell
    • service: powershell-classic: ???
  • product: linux: Linux log files
    • service: auth: Linux authentication logs. Usually /var/log/auth.log.
    • service: auditd: Linux audit logs
    • service: clamav: ClamAV logs
  • product: apache: Apache httpd logs
    • service: access: Access logs
    • service: error: Error logs
  • category: proxy
    • Field Name according to W3C Extended Log File Format. Additional W3 examples can be found from Microsoft.
    • Field names:
      • c-uri: URL requested by client
      • c-uri-extension: Extension of the URL. Commonly is the requested extension of a file name
      • c-uri-query: Path component of requested URL
      • c-uri-stem: Stem of the requested URL
      • c-useragent: the clients user agent.
      • cs-bytes: Number of bytes sent from the server
      • cs-cookie: Cookie headers sent from client to server.
      • cs-host: Host header send from client to server
      • cs-method: HTTP request method
      • r-dns: The Domain requested. Additionally is referred to as the Host header or URL Domain. Recommend to use cs-host instead of this field
      • cs-referrer: The referring link or site
      • cs-version: The HTTP protocol version that the client used
      • sc-bytes: Number of bytes sent from the client
      • sc-status: The HTTP status code
      • src_ip: The IP address of the client that made the request
      • dst_ip: The IP address of the server
  • category: firewall
    • Field Names:
      • src_ip, src_port, dst_ip, dst_port, username
  • category: dns
  • category: webserver
    • Uses the same field names as category: proxy
Clone this wiki locally