@@ -490,17 +490,17 @@ Original JSON body passed for the event at index time.
490
490
===== Basic query example
491
491
492
492
The following EQL search request searches for events with an `event.category` of
493
- `file ` that meet the following conditions:
493
+ `process ` that meet the following conditions:
494
494
495
- * A `file .name` of `cmd.exe`
495
+ * A `process .name` of `cmd.exe`
496
496
* An `process.pid` other than `2013`
497
497
498
498
[source,console]
499
499
----
500
500
GET /my-index-000001/_eql/search
501
501
{
502
502
"query": """
503
- file where (file .name == "cmd.exe" and process.pid != 2013)
503
+ process where (process .name == "cmd.exe" and process.pid != 2013)
504
504
"""
505
505
}
506
506
----
@@ -532,52 +532,38 @@ the events in ascending, lexicographic order.
532
532
{
533
533
"_index": "my-index-000001",
534
534
"_type": "_doc",
535
- "_id": "fwGeywNsBl8Y9Ys1x51b ",
535
+ "_id": "babI3XMBI9IjHuIqU0S_ ",
536
536
"_score": null,
537
537
"_source": {
538
- "@timestamp": "2020 -12-06T11:04:07 .000Z",
538
+ "@timestamp": "2099 -12-06T11:04:05 .000Z",
539
539
"event": {
540
- "category": "file",
541
- "id": "dGCHwoeS",
542
- "sequence": 2,
543
- },
544
- "file": {
545
- "accessed": "2020-12-07T11:07:08.000Z",
546
- "name": "cmd.exe",
547
- "path": "C:\\Windows\\System32\\cmd.exe",
548
- "type": "file",
549
- "size": 16384
540
+ "category": "process",
541
+ "id": "edwCRnyD",
542
+ "sequence": 1
550
543
},
551
544
"process": {
545
+ "pid": 2012,
552
546
"name": "cmd.exe",
553
- "executable": "C:\\Windows\\System32\\cmd.exe",
554
- "pid": 2012
547
+ "executable": "C:\\Windows\\System32\\cmd.exe"
555
548
}
556
549
}
557
550
},
558
551
{
559
552
"_index": "my-index-000001",
560
553
"_type": "_doc",
561
- "_id": "AtOJ4UjUBAAx3XR5kcCM ",
554
+ "_id": "b6bI3XMBI9IjHuIqU0S_ ",
562
555
"_score": null,
563
556
"_source": {
564
- "@timestamp": "2020 -12-07T11:07:08 .000Z",
557
+ "@timestamp": "2099 -12-07T11:06:07 .000Z",
565
558
"event": {
566
- "category": "file",
567
- "id": "bYA7gPay",
568
- "sequence": 4
569
- },
570
- "file": {
571
- "accessed": "2020-12-07T11:07:08.000Z",
572
- "name": "cmd.exe",
573
- "path": "C:\\Windows\\System32\\cmd.exe",
574
- "type": "file",
575
- "size": 16384
559
+ "category": "process",
560
+ "id": "cMyt5SZ2",
561
+ "sequence": 3
576
562
},
577
563
"process": {
564
+ "pid": 2012,
578
565
"name": "cmd.exe",
579
- "executable": "C:\\Windows\\System32\\cmd.exe",
580
- "pid": 2012
566
+ "executable": "C:\\Windows\\System32\\cmd.exe"
581
567
}
582
568
}
583
569
}
@@ -586,8 +572,8 @@ the events in ascending, lexicographic order.
586
572
}
587
573
----
588
574
// TESTRESPONSE[s/"took": 6/"took": $body.took/]
589
- // TESTRESPONSE[s/"_id": "fwGeywNsBl8Y9Ys1x51b "/"_id": $body.hits.events.0._id/]
590
- // TESTRESPONSE[s/"_id": "AtOJ4UjUBAAx3XR5kcCM "/"_id": $body.hits.events.1._id/]
575
+ // TESTRESPONSE[s/"_id": "babI3XMBI9IjHuIqU0S_ "/"_id": $body.hits.events.0._id/]
576
+ // TESTRESPONSE[s/"_id": "b6bI3XMBI9IjHuIqU0S_ "/"_id": $body.hits.events.1._id/]
591
577
592
578
[[eql-search-api-sequence-ex]]
593
579
===== Sequence query example
@@ -651,49 +637,50 @@ shared `process.pid` value for each matching event.
651
637
"_type": "_doc",
652
638
"_id": "AtOJ4UjUBAAx3XR5kcCM",
653
639
"_version": 1,
654
- "_seq_no": 3 ,
640
+ "_seq_no": 1 ,
655
641
"_primary_term": 1,
656
642
"_score": null,
657
643
"_source": {
658
- "@timestamp": "2020 -12-07T11:07:08 .000Z",
644
+ "@timestamp": "2099 -12-06T11:04:07 .000Z",
659
645
"event": {
660
646
"category": "file",
661
- "id": "bYA7gPay ",
662
- "sequence": 4
647
+ "id": "dGCHwoeS ",
648
+ "sequence": 2
663
649
},
664
650
"file": {
665
- "accessed": "2020 -12-07T11:07:08.000Z",
651
+ "accessed": "2099 -12-07T11:07:08.000Z",
666
652
"name": "cmd.exe",
667
653
"path": "C:\\Windows\\System32\\cmd.exe",
668
654
"type": "file",
669
655
"size": 16384
670
656
},
671
- "process": {
657
+ "process": {
658
+ "pid": 2012,
672
659
"name": "cmd.exe",
673
- "executable": "C:\\Windows\\System32\\cmd.exe",
674
- "pid": 2012
660
+ "executable": "C:\\Windows\\System32\\cmd.exe"
675
661
}
676
662
}
677
663
},
678
664
{
679
665
"_index": "my-index-000001",
680
666
"_type": "_doc",
681
- "_id": "yDwnGIJouOYGBzP0ZE9n ",
667
+ "_id": "OQmfCaduce8zoHT93o4H ",
682
668
"_version": 1,
683
- "_seq_no": 4 ,
669
+ "_seq_no": 3 ,
684
670
"_primary_term": 1,
685
671
"_score": null,
686
672
"_source": {
687
- "@timestamp": "2020 -12-07T11:07:09.000Z",
673
+ "@timestamp": "2099 -12-07T11:07:09.000Z",
688
674
"event": {
689
675
"category": "process",
690
676
"id": "aR3NWVOs",
691
- "sequence": 5
677
+ "sequence": 4
692
678
},
693
- "process": {
679
+ "process": {
680
+ "pid": 2012,
694
681
"name": "regsvr32.exe",
695
- "executable ": "C:\\Windows\\System32\\ regsvr32.exe",
696
- "pid ": 2012
682
+ "command_line ": "regsvr32.exe /s /u /i:https://...RegSvr32.sct scrobj.dll ",
683
+ "executable ": "C:\\Windows\\System32\\regsvr32.exe"
697
684
}
698
685
}
699
686
}
@@ -705,4 +692,4 @@ shared `process.pid` value for each matching event.
705
692
----
706
693
// TESTRESPONSE[s/"took": 6/"took": $body.took/]
707
694
// TESTRESPONSE[s/"_id": "AtOJ4UjUBAAx3XR5kcCM"/"_id": $body.hits.sequences.0.events.0._id/]
708
- // TESTRESPONSE[s/"_id": "yDwnGIJouOYGBzP0ZE9n "/"_id": $body.hits.sequences.0.events.1._id/]
695
+ // TESTRESPONSE[s/"_id": "OQmfCaduce8zoHT93o4H "/"_id": $body.hits.sequences.0.events.1._id/]
0 commit comments