Hi,
For Windows system, security and sysmon, most events arelogged under the parent field "event_data.*" .
Some of these map easily into ECS like: IpPort,IpAddress,ProcessId. While others are not so straighforward: LmPackageName,TargetLogonId.
Is there a need for a top level for event_data or can they be patched under some other field such host.*.
Would like to know some guidelines on how these can be mapped into ECS without breaking future changes and keeping consistent with the goals of ECS.
Security Events:
"event_data": {
"ProcessName": "-",
"LogonGuid": "{6823A8C7-1FF6-3D97-7BE9-BCEE2D}",
"LogonType": "3",
"IpPort": "54313",
"SubjectLogonId": "0x0",
"TransmittedServices": "-",
"KeyLength": "0",
"LmPackageName": "-",
"TargetLogonId": "0x1408bb25f",
"SubjectUserName": "-",
"IpAddress": "10.13.38.45",
"SubjectDomainName": "-",
"ImpersonationLevel": "%%1833",
"ProcessId": "0x0",
"TargetUserName": "N133973",
"LogonProcessName": "Kerberos",
"TargetDomainName": "DOMAIN",
"SubjectUserSid": "S-1-0-0",
"AuthenticationPackageName": "Kerberos",
"TargetUserSid": "S-1-5-21-117609710-1482476501-18016745317"
}
Sysmon Events
"event_data":{
"DestinationIsIpv6":"true",
"Image":"C:\\\\Program Files (x86)\\java.exe",
"Initiated":"true",
"ProcessGuid":"{BBBBBBBBB-CCCCC-0000-AAAAAAAAAAAA}",
"ProcessId":"4924",
"Protocol":"udp",
"SourceIsIpv6":"true",
"SourcePort":"5400",
"UtcTime":"2018-11-22 19:27:56.107"
}
Hi,
For Windows system, security and sysmon, most events arelogged under the parent field "event_data.*" .
Some of these map easily into ECS like:
IpPort,IpAddress,ProcessId. While others are not so straighforward:LmPackageName,TargetLogonId.Is there a need for a top level for
event_dataor can they be patched under some other field suchhost.*.Would like to know some guidelines on how these can be mapped into ECS without breaking future changes and keeping consistent with the goals of ECS.
Security Events:
Sysmon Events