Parsers and Generated Fields

Tag Fields Created by Parser microsoft-sysmon
  • #Cps.version

  • #Vendor

  • #ecs.version

  • #event.dataset

  • #event.kind

  • #event.module

  • #event.outcome

  • #observer.type

Fields Identified by Parser microsoft-sysmon
Source FieldCPS FieldDescriptionMapping
Vendor.TimeCreated@timestampEvent timestampParsed from timestamp field using conditional format detection
Vendor.EventData.DestinationHostnamedestination.domainDestination domainCopied from DestinationHostname and converted to lowercase
Vendor.EventData.DestinationIpdestination.ipDestination IP addressCopied from DestinationIp
Vendor.EventData.DestinationPortdestination.portDestination portCopied from DestinationPort
Vendor.EventData.QueryResultsdns.answers.data[]DNS answer dataExtracted from QueryResults using regex pattern
Vendor.EventData.QueryResultsdns.answers.type[]DNS answer typeMapped from DNS type ID in QueryResults
Vendor.EventData.QueryNamedns.question.nameDNS query nameCopied from QueryName
Noneecs.versionECS schema versionStatic value: 9.1.0
Vendor.EventData.IDerror.codeError codeCopied from EventData.ID for error events
Vendor.EventIDevent.actionSpecific action performedStatic value based on EventID mapping
Vendor.EventIDevent.category[]Event category classificationArray populated based on EventID conditions
Noneevent.datasetDataset identifierStatic value: windows.sysmon
Noneevent.kindEvent categorizationStatic value: event
Noneevent.moduleModule nameStatic value: windows
Vendor.EventIDevent.type[]Event type classificationArray populated based on EventID conditions
Vendor.EventData.Signedfile.code_signature.existsWhether file is signedCopied from Signed
Vendor.EventData.SignatureStatusfile.code_signature.statusCode signature statusCopied from SignatureStatus
Vendor.EventData.Signaturefile.code_signature.subject_nameCode signature subjectCopied from Signature
Vendor.EventData.SignatureStatusfile.code_signature.validCode signature validityStatic value based on SignatureStatus evaluation
Vendor.EventData.Hashes.MD5file.hash.md5File MD5 hashCopied from Hashes.MD5 and converted to lowercase
Vendor.EventData.Hashes.SHA1file.hash.sha1File SHA1 hashCopied from Hashes.SHA1 and converted to lowercase
Vendor.EventData.Hashes.SHA256file.hash.sha256File SHA256 hashCopied from Hashes.SHA256 and converted to lowercase
Vendor.EventData.PipeNamefile.nameFile nameCopied from PipeName
Vendor.EventData.TargetFilename, Vendor.EventData.Device, Vendor.EventData.ImageLoadedfile.pathFile pathCopied from TargetFilename, Device, or ImageLoaded
Vendor.EventData.Companyfile.pe.companyPE company informationCopied from Company when not "-"
Vendor.EventData.Descriptionfile.pe.descriptionPE descriptionCopied from Description when not "-"
Vendor.EventData.FileVersionfile.pe.file_versionPE file versionCopied from FileVersion when not "-"
Vendor.EventData.Hashes.IMPHASHfile.pe.imphashFile PE import hashCopied from Hashes.IMPHASH for specific EventIDs
Vendor.EventData.OriginalFileNamefile.pe.original_file_nameOriginal PE file nameCopied from OriginalFileName when not "-"
Vendor.EventData.Productfile.pe.productPE product informationCopied from Product when not "-"
Vendor.EventData.Initiatednetwork.directionNetwork connection directionStatic value based on Initiated field evaluation
Vendor.EventData.DestinationPortName, Vendor.EventData.SourcePortNamenetwork.protocolNetwork protocolStatic value "dns" for EventID 22, otherwise from PortName fields
Vendor.EventData.Protocolnetwork.transportNetwork transport protocolCopied from Protocol
Vendor.EventData.SourceIsIpv6network.typeNetwork type (IPv4/IPv6)Static value based on SourceIsIpv6 field evaluation
Vendor.EventData.CommandLineprocess.command_lineProcess command lineCopied from CommandLine
Vendor.EventData.ProcessGuid, Vendor.EventData.SourceProcessGuidprocess.entity_idProcess entity identifierCopied from ProcessGuid or SourceProcessGuid
Vendor.EventData.Image, Vendor.EventData.SourceImage, Vendor.EventData.Destinationprocess.executableProcess executable pathCopied from Image, SourceImage, or Destination
Vendor.EventData.Hashes.MD5process.hash.md5Process MD5 hashCopied from Hashes.MD5 and converted to lowercase
Vendor.EventData.Hashes.SHA1process.hash.sha1Process SHA1 hashCopied from Hashes.SHA1 and converted to lowercase
Vendor.EventData.Hashes.SHA256process.hash.sha256Process SHA256 hashCopied from Hashes.SHA256 and converted to lowercase
process.executableprocess.nameProcess nameExtracted from executable path using string split
Vendor.EventData.ParentCommandLineprocess.parent.command_lineParent process command lineCopied from ParentCommandLine
Vendor.EventData.ParentProcessGuidprocess.parent.entity_idParent process entity identifierCopied from ParentProcessGuid
Vendor.EventData.ParentImageprocess.parent.executableParent process executable pathCopied from ParentImage
process.parent.executableprocess.parent.nameParent process nameExtracted from parent executable path using string split
Vendor.EventData.ParentProcessIdprocess.parent.pidParent process identifierCopied from ParentProcessId
Vendor.EventData.Companyprocess.pe.companyPE company informationCopied from Company when not "-"
Vendor.EventData.Descriptionprocess.pe.descriptionPE descriptionCopied from Description when not "-"
Vendor.EventData.FileVersionprocess.pe.file_versionPE file versionCopied from FileVersion when not "-"
Vendor.EventData.Hashes.IMPHASHprocess.pe.imphashProcess PE import hashCopied from Hashes.IMPHASH for specific EventIDs
Vendor.EventData.OriginalFileNameprocess.pe.original_file_nameOriginal PE file nameCopied from OriginalFileName when not "-"
Vendor.EventData.Productprocess.pe.productPE product informationCopied from Product when not "-"
Vendor.EventData.ProcessId, Vendor.EventData.SourceProcessIdprocess.pidProcess identifierCopied from ProcessId or SourceProcessId
Vendor.EventData.SourceThreadIdprocess.thread.idThread identifierCopied from SourceThreadId
Vendor.EventData.CurrentDirectoryprocess.working_directoryProcess working directoryCopied from CurrentDirectory
Vendor.EventData.TargetObjectregistry.hiveRegistry hiveExtracted from registry path using regex pattern
Vendor.EventData.TargetObjectregistry.keyRegistry keyExtracted from registry path using regex pattern
Vendor.EventData.TargetObjectregistry.pathRegistry pathCopied from TargetObject for registry EventIDs
Vendor.EventData.TargetObjectregistry.valueRegistry valueExtracted from registry path using regex pattern
Vendor.EventData.RuleNamerule.nameRule name that triggeredCopied from Vendor.EventData.RuleName when exists and not "-"
Vendor.EventData.SourceHostnamesource.domainSource domainCopied from SourceHostname and converted to lowercase
Vendor.EventData.SourceIpsource.ipSource IP addressCopied from SourceIp
Vendor.EventData.SourcePortsource.portSource portCopied from SourcePort
Vendor.EventData.Useruser.domainUser domainExtracted from User field using regex pattern and converted to lowercase
Vendor.winlog.user.identifieruser.idUser identifierCopied from user identifier
Vendor.EventData.Useruser.nameUser nameExtracted from User field using regex pattern