Skip to content

Commit bf3b683

Browse files
committed
get rid of event_sources folder.
Update sysmon_eventid_1.yml with latest version from other repo for contentctl init to work properly
1 parent fe8f9df commit bf3b683

File tree

2 files changed

+50
-52
lines changed

2 files changed

+50
-52
lines changed

contentctl/templates/data_sources/Sysmon_EventID.yml

Lines changed: 0 additions & 51 deletions
This file was deleted.

contentctl/templates/event_sources/Sysmon_EventID_1.yml renamed to contentctl/templates/data_sources/sysmon_eventid_1.yml

Lines changed: 50 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,16 @@
11
name: Sysmon EventID 1
22
id: b375f4d1-d7ca-4bc0-9103-294825c0af17
3+
version: 1
4+
date: '2024-07-18'
35
author: Patrick Bareiss, Splunk
4-
description: Event source object for Sysmon EventID 1
6+
description: Data source object for Sysmon EventID 1
7+
source: XmlWinEventLog:Microsoft-Windows-Sysmon/Operational
8+
sourcetype: xmlwineventlog
9+
separator: EventID
10+
supported_TA:
11+
- name: Splunk Add-on for Sysmon
12+
url: https://splunkbase.splunk.com/app/5709/
13+
version: 4.0.0
514
fields:
615
- _time
716
- Channel
@@ -100,6 +109,46 @@ fields:
100109
- user
101110
- user_id
102111
- vendor_product
112+
field_mappings:
113+
- data_model: cim
114+
data_set: Endpoint.Processes
115+
mapping:
116+
ProcessGuid: Processes.process_guid
117+
ProcessId: Processes.process_id
118+
Image: Processes.process_path
119+
Image|endswith: Processes.process_name
120+
CommandLine: Processes.process
121+
CurrentDirectory: Processes.process_current_directory
122+
User: Processes.user
123+
IntegrityLevel: Processes.process_integrity_level
124+
Hashes: Processes.process_hash
125+
ParentProcessGuid: Processes.parent_process_guid
126+
ParentProcessId: Processes.parent_process_id
127+
ParentImage: Processes.parent_process_name
128+
ParentCommandLine: Processes.parent_process
129+
Computer: Processes.dest
130+
OriginalFileName: Processes.original_file_name
131+
convert_to_log_source:
132+
- data_source: Windows Event Log Security 4688
133+
mapping:
134+
ProcessId: NewProcessId
135+
Image: NewProcessName
136+
Image|endswith: NewProcessName|endswith
137+
CommandLine: Process_Command_Line
138+
User: SubjectUserSid
139+
ParentProcessId: ProcessId
140+
ParentImage: ParentProcessName
141+
ParentImage|endswith: ParentProcessName|endswith
142+
Computer: Computer
143+
OriginalFileName: NewProcessName|endswith
144+
- data_source: Crowdstrike Process
145+
mapping:
146+
ProcessId: RawProcessId
147+
Image: ImageFileName
148+
CommandLine: CommandLine
149+
User: UserSid
150+
ParentProcessId: ParentProcessId
151+
ParentImage: ParentBaseFileName
103152
example_log: "<Event xmlns='http://schemas.microsoft.com/win/2004/08/events/event'><System><Provider\
104153
\ Name='Microsoft-Windows-Sysmon' Guid='{5770385F-C22A-43E0-BF4C-06F5698FFBD9}'/><EventID>1</EventID><Version>5</Version><Level>4</Level><Task>1</Task><Opcode>0</Opcode><Keywords>0x8000000000000000</Keywords><TimeCreated\
105154
\ SystemTime='2020-10-08T11:03:46.617920300Z'/><EventRecordID>4522</EventRecordID><Correlation/><Execution\

0 commit comments

Comments
 (0)