|
1 | 1 | name: Sysmon EventID 1
|
2 | 2 | id: b375f4d1-d7ca-4bc0-9103-294825c0af17
|
| 3 | +version: 1 |
| 4 | +date: '2024-07-18' |
3 | 5 | author: Patrick Bareiss, Splunk
|
4 |
| -description: Event source object for Sysmon EventID 1 |
| 6 | +description: Data source object for Sysmon EventID 1 |
| 7 | +source: XmlWinEventLog:Microsoft-Windows-Sysmon/Operational |
| 8 | +sourcetype: xmlwineventlog |
| 9 | +separator: EventID |
| 10 | +supported_TA: |
| 11 | +- name: Splunk Add-on for Sysmon |
| 12 | + url: https://splunkbase.splunk.com/app/5709/ |
| 13 | + version: 4.0.0 |
5 | 14 | fields:
|
6 | 15 | - _time
|
7 | 16 | - Channel
|
@@ -100,6 +109,46 @@ fields:
|
100 | 109 | - user
|
101 | 110 | - user_id
|
102 | 111 | - vendor_product
|
| 112 | +field_mappings: |
| 113 | + - data_model: cim |
| 114 | + data_set: Endpoint.Processes |
| 115 | + mapping: |
| 116 | + ProcessGuid: Processes.process_guid |
| 117 | + ProcessId: Processes.process_id |
| 118 | + Image: Processes.process_path |
| 119 | + Image|endswith: Processes.process_name |
| 120 | + CommandLine: Processes.process |
| 121 | + CurrentDirectory: Processes.process_current_directory |
| 122 | + User: Processes.user |
| 123 | + IntegrityLevel: Processes.process_integrity_level |
| 124 | + Hashes: Processes.process_hash |
| 125 | + ParentProcessGuid: Processes.parent_process_guid |
| 126 | + ParentProcessId: Processes.parent_process_id |
| 127 | + ParentImage: Processes.parent_process_name |
| 128 | + ParentCommandLine: Processes.parent_process |
| 129 | + Computer: Processes.dest |
| 130 | + OriginalFileName: Processes.original_file_name |
| 131 | +convert_to_log_source: |
| 132 | + - data_source: Windows Event Log Security 4688 |
| 133 | + mapping: |
| 134 | + ProcessId: NewProcessId |
| 135 | + Image: NewProcessName |
| 136 | + Image|endswith: NewProcessName|endswith |
| 137 | + CommandLine: Process_Command_Line |
| 138 | + User: SubjectUserSid |
| 139 | + ParentProcessId: ProcessId |
| 140 | + ParentImage: ParentProcessName |
| 141 | + ParentImage|endswith: ParentProcessName|endswith |
| 142 | + Computer: Computer |
| 143 | + OriginalFileName: NewProcessName|endswith |
| 144 | + - data_source: Crowdstrike Process |
| 145 | + mapping: |
| 146 | + ProcessId: RawProcessId |
| 147 | + Image: ImageFileName |
| 148 | + CommandLine: CommandLine |
| 149 | + User: UserSid |
| 150 | + ParentProcessId: ParentProcessId |
| 151 | + ParentImage: ParentBaseFileName |
103 | 152 | example_log: "<Event xmlns='http://schemas.microsoft.com/win/2004/08/events/event'><System><Provider\
|
104 | 153 | \ Name='Microsoft-Windows-Sysmon' Guid='{5770385F-C22A-43E0-BF4C-06F5698FFBD9}'/><EventID>1</EventID><Version>5</Version><Level>4</Level><Task>1</Task><Opcode>0</Opcode><Keywords>0x8000000000000000</Keywords><TimeCreated\
|
105 | 154 | \ SystemTime='2020-10-08T11:03:46.617920300Z'/><EventRecordID>4522</EventRecordID><Correlation/><Execution\
|
|
0 commit comments