schemas/v1/api/api.yaml (5,499 lines of code) (raw):
'@timestamp':
dashed_name: timestamp
description: 'Date/time when the event originated.
This is the date/time extracted from the event, typically representing when the
event was generated by the source.
If the event source has no original timestamp, this value is typically populated
by the first time the event was received by the pipeline.
Required field for all events.'
example: '2016-05-23T08:05:34.853Z'
flat_name: '@timestamp'
level: core
name: '@timestamp'
normalize: []
required: true
short: Date/time when the event originated.
type: date
Target.process.Ext:
dashed_name: Target-process-Ext
description: Object for all custom defined fields to live in.
flat_name: Target.process.Ext
level: custom
name: Ext
normalize: []
original_fieldset: process
short: Object for all custom defined fields to live in.
type: object
Target.process.Ext.created_suspended:
dashed_name: Target-process-Ext-created-suspended
description: A heuristic indicating if the CREATE_SUSPENDED flag was passed to the
Win32 CreateProcess API. Not valid for direct syscalls.
example: 'true'
flat_name: Target.process.Ext.created_suspended
level: custom
name: Ext.created_suspended
normalize: []
original_fieldset: process
short: A heuristic indicating if the CREATE_SUSPENDED flag was passed to the Win32
CreateProcess API.
type: boolean
Target.process.Ext.memory_region.allocation_base:
dashed_name: Target-process-Ext-memory-region-allocation-base
description: Base address of the memory allocation containing the memory region.
example: 2431737462784
flat_name: Target.process.Ext.memory_region.allocation_base
level: custom
name: allocation_base
normalize: []
original_fieldset: memory_region
short: Base address of the memory allocation containing the memory region.
type: unsigned_long
Target.process.Ext.memory_region.allocation_protection:
dashed_name: Target-process-Ext-memory-region-allocation-protection
description: Original memory protection requested when the memory was allocated.
Example values include "RWX" and "R-X".
example: RWX
flat_name: Target.process.Ext.memory_region.allocation_protection
ignore_above: 1024
level: custom
name: allocation_protection
normalize: []
original_fieldset: memory_region
short: Original memory protection requested when the memory was allocated. Example
values include "RWX" and "R-X".
type: keyword
Target.process.Ext.memory_region.allocation_size:
dashed_name: Target-process-Ext-memory-region-allocation-size
description: Original memory size requested when the memory was allocated.
example: 4096
flat_name: Target.process.Ext.memory_region.allocation_size
level: custom
name: allocation_size
normalize: []
original_fieldset: memory_region
short: Original memory size requested when the memory was allocated.
type: unsigned_long
Target.process.Ext.memory_region.allocation_type:
dashed_name: Target-process-Ext-memory-region-allocation-type
description: The memory allocation type. Example values include "IMAGE", "MAPPED",
and "PRIVATE".
example: PRIVATE
flat_name: Target.process.Ext.memory_region.allocation_type
ignore_above: 1024
level: custom
name: allocation_type
normalize: []
original_fieldset: memory_region
short: The memory allocation type. Example values include "IMAGE", "MAPPED", and
"PRIVATE".
type: keyword
Target.process.Ext.memory_region.bytes_address:
dashed_name: Target-process-Ext-memory-region-bytes-address
description: The address where bytes_compressed begins.
example: 2431737462784
flat_name: Target.process.Ext.memory_region.bytes_address
level: custom
name: bytes_address
normalize: []
original_fieldset: memory_region
short: The address where bytes_compressed begins.
type: unsigned_long
Target.process.Ext.memory_region.bytes_allocation_offset:
dashed_name: Target-process-Ext-memory-region-bytes-allocation-offset
description: Offset of bytes_address the memory allocation. Equal to bytes_address
- allocation_base.
example: 0
flat_name: Target.process.Ext.memory_region.bytes_allocation_offset
level: custom
name: bytes_allocation_offset
normalize: []
original_fieldset: memory_region
short: Offset of bytes_address the memory allocation. Equal to bytes_address - allocation_base.
type: unsigned_long
Target.process.Ext.memory_region.bytes_compressed:
dashed_name: Target-process-Ext-memory-region-bytes-compressed
description: Up to 4MB of raw data from the memory allocation. This is compressed
with zlib.To reduce data volume, this is de-duplicated on the endpoint, and may
be missing from many alerts if the same data would be sent multiple times.
doc_values: false
example: eJzzSM3JyVcIzy/KSVEEABxJBD4=
flat_name: Target.process.Ext.memory_region.bytes_compressed
index: false
level: custom
name: bytes_compressed
normalize: []
original_fieldset: memory_region
short: Up to 4MB of raw data from the memory allocation.
type: keyword
Target.process.Ext.memory_region.bytes_compressed_present:
dashed_name: Target-process-Ext-memory-region-bytes-compressed-present
description: Whether bytes_compressed is present in this event.
example: false
flat_name: Target.process.Ext.memory_region.bytes_compressed_present
level: custom
name: bytes_compressed_present
normalize: []
original_fieldset: memory_region
short: Whether bytes_compressed is present in this event.
type: boolean
Target.process.Ext.memory_region.hash.sha256:
dashed_name: Target-process-Ext-memory-region-hash-sha256
description: The sha256 of the memory region.
example: d25ff1e6c6460a7f9de39198d182058c1712726008d187e1953b83abe977e4a0
flat_name: Target.process.Ext.memory_region.hash.sha256
ignore_above: 1024
level: custom
name: hash.sha256
normalize: []
original_fieldset: memory_region
short: The sha256 of the memory region.
type: keyword
Target.process.Ext.memory_region.malware_signature.all_names:
dashed_name: Target-process-Ext-memory-region-malware-signature-all-names
description: A sequence of signature names matched.
example: Windows.EICAR.Not-a-virus
flat_name: Target.process.Ext.memory_region.malware_signature.all_names
ignore_above: 1024
level: custom
name: all_names
normalize: []
original_fieldset: malware_signature
short: A sequence of signature names matched.
type: keyword
Target.process.Ext.memory_region.malware_signature.identifier:
dashed_name: Target-process-Ext-memory-region-malware-signature-identifier
description: malware signature identifier
flat_name: Target.process.Ext.memory_region.malware_signature.identifier
ignore_above: 1024
level: custom
name: identifier
normalize: []
original_fieldset: malware_signature
short: malware signature identifier
type: keyword
Target.process.Ext.memory_region.malware_signature.primary:
dashed_name: Target-process-Ext-memory-region-malware-signature-primary
description: The first matching details.
flat_name: Target.process.Ext.memory_region.malware_signature.primary
level: custom
name: primary
normalize: []
original_fieldset: malware_signature
short: The first matching details.
type: object
Target.process.Ext.memory_region.malware_signature.primary.matches:
dashed_name: Target-process-Ext-memory-region-malware-signature-primary-matches
description: The first matching details.
doc_values: false
flat_name: Target.process.Ext.memory_region.malware_signature.primary.matches
index: false
level: custom
name: primary.matches
normalize: []
original_fieldset: malware_signature
short: The first matching details.
type: keyword
Target.process.Ext.memory_region.malware_signature.primary.signature.hash:
dashed_name: Target-process-Ext-memory-region-malware-signature-primary-signature-hash
description: hash of file matching signature.
flat_name: Target.process.Ext.memory_region.malware_signature.primary.signature.hash
level: custom
name: primary.signature.hash
normalize: []
original_fieldset: malware_signature
short: hash of file matching signature.
type: nested
Target.process.Ext.memory_region.malware_signature.primary.signature.hash.sha256:
dashed_name: Target-process-Ext-memory-region-malware-signature-primary-signature-hash-sha256
description: sha256 hash of file matching signature.
flat_name: Target.process.Ext.memory_region.malware_signature.primary.signature.hash.sha256
ignore_above: 1024
level: custom
name: primary.signature.hash.sha256
normalize: []
original_fieldset: malware_signature
short: sha256 hash of file matching signature.
type: keyword
Target.process.Ext.memory_region.malware_signature.primary.signature.id:
dashed_name: Target-process-Ext-memory-region-malware-signature-primary-signature-id
description: The id of the first yara rule matched.
flat_name: Target.process.Ext.memory_region.malware_signature.primary.signature.id
ignore_above: 1024
level: custom
name: primary.signature.id
normalize: []
original_fieldset: malware_signature
short: The id of the first yara rule matched.
type: keyword
Target.process.Ext.memory_region.malware_signature.primary.signature.name:
dashed_name: Target-process-Ext-memory-region-malware-signature-primary-signature-name
description: The name of the first yara rule matched.
flat_name: Target.process.Ext.memory_region.malware_signature.primary.signature.name
ignore_above: 1024
level: custom
name: primary.signature.name
normalize: []
original_fieldset: malware_signature
short: The name of the first yara rule matched.
type: keyword
Target.process.Ext.memory_region.malware_signature.secondary:
dashed_name: Target-process-Ext-memory-region-malware-signature-secondary
description: Additional matching details if available.
enabled: false
flat_name: Target.process.Ext.memory_region.malware_signature.secondary
level: custom
name: secondary
normalize: []
original_fieldset: malware_signature
short: Additional matching details if available.
type: nested
Target.process.Ext.memory_region.malware_signature.secondary.matches:
dashed_name: Target-process-Ext-memory-region-malware-signature-secondary-matches
description: The second matching details.
enabled: false
flat_name: Target.process.Ext.memory_region.malware_signature.secondary.matches
ignore_above: 1024
level: custom
name: secondary.matches
normalize: []
original_fieldset: malware_signature
short: The second matching details.
type: keyword
Target.process.Ext.memory_region.malware_signature.secondary.signature.hash:
dashed_name: Target-process-Ext-memory-region-malware-signature-secondary-signature-hash
description: hash of second file matching signature.
enabled: false
flat_name: Target.process.Ext.memory_region.malware_signature.secondary.signature.hash
level: custom
name: secondary.signature.hash
normalize: []
original_fieldset: malware_signature
short: hash of second file matching signature.
type: nested
Target.process.Ext.memory_region.malware_signature.secondary.signature.hash.sha256:
dashed_name: Target-process-Ext-memory-region-malware-signature-secondary-signature-hash-sha256
description: sha256 hash of second file matching signature.
enabled: false
flat_name: Target.process.Ext.memory_region.malware_signature.secondary.signature.hash.sha256
ignore_above: 1024
level: custom
name: secondary.signature.hash.sha256
normalize: []
original_fieldset: malware_signature
short: sha256 hash of second file matching signature.
type: keyword
Target.process.Ext.memory_region.malware_signature.secondary.signature.id:
dashed_name: Target-process-Ext-memory-region-malware-signature-secondary-signature-id
description: The id of the second yara rule matched.
enabled: false
flat_name: Target.process.Ext.memory_region.malware_signature.secondary.signature.id
ignore_above: 1024
level: custom
name: secondary.signature.id
normalize: []
original_fieldset: malware_signature
short: The id of the second yara rule matched.
type: keyword
Target.process.Ext.memory_region.malware_signature.secondary.signature.name:
dashed_name: Target-process-Ext-memory-region-malware-signature-secondary-signature-name
description: The name of the second yara rule matched.
enabled: false
flat_name: Target.process.Ext.memory_region.malware_signature.secondary.signature.name
ignore_above: 1024
level: custom
name: secondary.signature.name
normalize: []
original_fieldset: malware_signature
short: The name of the second yara rule matched.
type: keyword
Target.process.Ext.memory_region.malware_signature.version:
dashed_name: Target-process-Ext-memory-region-malware-signature-version
description: malware signature version
flat_name: Target.process.Ext.memory_region.malware_signature.version
ignore_above: 1024
level: custom
name: version
normalize: []
original_fieldset: malware_signature
short: malware signature version
type: keyword
Target.process.Ext.memory_region.mapped_path:
dashed_name: Target-process-Ext-memory-region-mapped-path
description: If the memory corresponds to a file mapping, this is the file's path.
example: C:\Windows\System32\mshtml.dll
flat_name: Target.process.Ext.memory_region.mapped_path
ignore_above: 1024
level: custom
name: mapped_path
normalize: []
original_fieldset: memory_region
short: If the memory corresponds to a file mapping, this is the file's path.
type: keyword
Target.process.Ext.memory_region.mapped_pe.Ext.dotnet:
dashed_name: Target-process-Ext-memory-region-mapped-pe-Ext-dotnet
description: Whether this file is a .NET PE
example: 'true'
flat_name: Target.process.Ext.memory_region.mapped_pe.Ext.dotnet
level: custom
name: Ext.dotnet
normalize: []
original_fieldset: pe
short: Whether this file is a .NET PE
type: boolean
Target.process.Ext.memory_region.mapped_pe.Ext.sections:
dashed_name: Target-process-Ext-memory-region-mapped-pe-Ext-sections
description: The file's relevant sections, if it is a PE
flat_name: Target.process.Ext.memory_region.mapped_pe.Ext.sections
level: custom
name: Ext.sections
normalize: []
original_fieldset: pe
short: The file's sections, if it is a PE
type: object
Target.process.Ext.memory_region.mapped_pe.Ext.sections.hash.md5:
dashed_name: Target-process-Ext-memory-region-mapped-pe-Ext-sections-hash-md5
description: MD5 hash.
flat_name: Target.process.Ext.memory_region.mapped_pe.Ext.sections.hash.md5
ignore_above: 1024
level: extended
name: md5
normalize: []
original_fieldset: hash
short: MD5 hash.
type: keyword
Target.process.Ext.memory_region.mapped_pe.Ext.sections.hash.sha1:
dashed_name: Target-process-Ext-memory-region-mapped-pe-Ext-sections-hash-sha1
description: SHA1 hash.
flat_name: Target.process.Ext.memory_region.mapped_pe.Ext.sections.hash.sha1
ignore_above: 1024
level: extended
name: sha1
normalize: []
original_fieldset: hash
short: SHA1 hash.
type: keyword
Target.process.Ext.memory_region.mapped_pe.Ext.sections.hash.sha256:
dashed_name: Target-process-Ext-memory-region-mapped-pe-Ext-sections-hash-sha256
description: SHA256 hash.
flat_name: Target.process.Ext.memory_region.mapped_pe.Ext.sections.hash.sha256
ignore_above: 1024
level: extended
name: sha256
normalize: []
original_fieldset: hash
short: SHA256 hash.
type: keyword
Target.process.Ext.memory_region.mapped_pe.Ext.sections.hash.sha384:
dashed_name: Target-process-Ext-memory-region-mapped-pe-Ext-sections-hash-sha384
description: SHA384 hash.
flat_name: Target.process.Ext.memory_region.mapped_pe.Ext.sections.hash.sha384
ignore_above: 1024
level: extended
name: sha384
normalize: []
original_fieldset: hash
short: SHA384 hash.
type: keyword
Target.process.Ext.memory_region.mapped_pe.Ext.sections.hash.sha512:
dashed_name: Target-process-Ext-memory-region-mapped-pe-Ext-sections-hash-sha512
description: SHA512 hash.
flat_name: Target.process.Ext.memory_region.mapped_pe.Ext.sections.hash.sha512
ignore_above: 1024
level: extended
name: sha512
normalize: []
original_fieldset: hash
short: SHA512 hash.
type: keyword
Target.process.Ext.memory_region.mapped_pe.Ext.sections.hash.ssdeep:
dashed_name: Target-process-Ext-memory-region-mapped-pe-Ext-sections-hash-ssdeep
description: SSDEEP hash.
flat_name: Target.process.Ext.memory_region.mapped_pe.Ext.sections.hash.ssdeep
ignore_above: 1024
level: extended
name: ssdeep
normalize: []
original_fieldset: hash
short: SSDEEP hash.
type: keyword
Target.process.Ext.memory_region.mapped_pe.Ext.sections.hash.tlsh:
dashed_name: Target-process-Ext-memory-region-mapped-pe-Ext-sections-hash-tlsh
description: TLSH hash.
flat_name: Target.process.Ext.memory_region.mapped_pe.Ext.sections.hash.tlsh
ignore_above: 1024
level: extended
name: tlsh
normalize: []
original_fieldset: hash
short: TLSH hash.
type: keyword
Target.process.Ext.memory_region.mapped_pe.Ext.sections.name:
dashed_name: Target-process-Ext-memory-region-mapped-pe-Ext-sections-name
description: The section's name
example: .reloc
flat_name: Target.process.Ext.memory_region.mapped_pe.Ext.sections.name
ignore_above: 1024
level: custom
name: Ext.sections.name
normalize: []
original_fieldset: pe
short: The section's name
type: keyword
Target.process.Ext.memory_region.mapped_pe.Ext.streams:
dashed_name: Target-process-Ext-memory-region-mapped-pe-Ext-streams
description: The file's streams, if it is a PE
flat_name: Target.process.Ext.memory_region.mapped_pe.Ext.streams
level: custom
name: Ext.streams
normalize: []
original_fieldset: pe
short: The file's streams, if it is a PE
type: object
Target.process.Ext.memory_region.mapped_pe.Ext.streams.hash.md5:
dashed_name: Target-process-Ext-memory-region-mapped-pe-Ext-streams-hash-md5
description: MD5 hash.
flat_name: Target.process.Ext.memory_region.mapped_pe.Ext.streams.hash.md5
ignore_above: 1024
level: extended
name: md5
normalize: []
original_fieldset: hash
short: MD5 hash.
type: keyword
Target.process.Ext.memory_region.mapped_pe.Ext.streams.hash.sha1:
dashed_name: Target-process-Ext-memory-region-mapped-pe-Ext-streams-hash-sha1
description: SHA1 hash.
flat_name: Target.process.Ext.memory_region.mapped_pe.Ext.streams.hash.sha1
ignore_above: 1024
level: extended
name: sha1
normalize: []
original_fieldset: hash
short: SHA1 hash.
type: keyword
Target.process.Ext.memory_region.mapped_pe.Ext.streams.hash.sha256:
dashed_name: Target-process-Ext-memory-region-mapped-pe-Ext-streams-hash-sha256
description: SHA256 hash.
flat_name: Target.process.Ext.memory_region.mapped_pe.Ext.streams.hash.sha256
ignore_above: 1024
level: extended
name: sha256
normalize: []
original_fieldset: hash
short: SHA256 hash.
type: keyword
Target.process.Ext.memory_region.mapped_pe.Ext.streams.hash.sha384:
dashed_name: Target-process-Ext-memory-region-mapped-pe-Ext-streams-hash-sha384
description: SHA384 hash.
flat_name: Target.process.Ext.memory_region.mapped_pe.Ext.streams.hash.sha384
ignore_above: 1024
level: extended
name: sha384
normalize: []
original_fieldset: hash
short: SHA384 hash.
type: keyword
Target.process.Ext.memory_region.mapped_pe.Ext.streams.hash.sha512:
dashed_name: Target-process-Ext-memory-region-mapped-pe-Ext-streams-hash-sha512
description: SHA512 hash.
flat_name: Target.process.Ext.memory_region.mapped_pe.Ext.streams.hash.sha512
ignore_above: 1024
level: extended
name: sha512
normalize: []
original_fieldset: hash
short: SHA512 hash.
type: keyword
Target.process.Ext.memory_region.mapped_pe.Ext.streams.hash.ssdeep:
dashed_name: Target-process-Ext-memory-region-mapped-pe-Ext-streams-hash-ssdeep
description: SSDEEP hash.
flat_name: Target.process.Ext.memory_region.mapped_pe.Ext.streams.hash.ssdeep
ignore_above: 1024
level: extended
name: ssdeep
normalize: []
original_fieldset: hash
short: SSDEEP hash.
type: keyword
Target.process.Ext.memory_region.mapped_pe.Ext.streams.hash.tlsh:
dashed_name: Target-process-Ext-memory-region-mapped-pe-Ext-streams-hash-tlsh
description: TLSH hash.
flat_name: Target.process.Ext.memory_region.mapped_pe.Ext.streams.hash.tlsh
ignore_above: 1024
level: extended
name: tlsh
normalize: []
original_fieldset: hash
short: TLSH hash.
type: keyword
Target.process.Ext.memory_region.mapped_pe.Ext.streams.name:
dashed_name: Target-process-Ext-memory-region-mapped-pe-Ext-streams-name
description: The stream's name
example: .reloc
flat_name: Target.process.Ext.memory_region.mapped_pe.Ext.streams.name
ignore_above: 1024
level: custom
name: Ext.streams.name
normalize: []
original_fieldset: pe
short: The stream's name
type: keyword
Target.process.Ext.memory_region.mapped_pe.architecture:
dashed_name: Target-process-Ext-memory-region-mapped-pe-architecture
description: CPU architecture target for the file.
example: x64
flat_name: Target.process.Ext.memory_region.mapped_pe.architecture
ignore_above: 1024
level: extended
name: architecture
normalize: []
original_fieldset: pe
short: CPU architecture target for the file.
type: keyword
Target.process.Ext.memory_region.mapped_pe.company:
dashed_name: Target-process-Ext-memory-region-mapped-pe-company
description: Internal company name of the file, provided at compile-time.
example: Microsoft Corporation
flat_name: Target.process.Ext.memory_region.mapped_pe.company
ignore_above: 1024
level: extended
name: company
normalize: []
original_fieldset: pe
short: Internal company name of the file, provided at compile-time.
type: keyword
Target.process.Ext.memory_region.mapped_pe.description:
dashed_name: Target-process-Ext-memory-region-mapped-pe-description
description: Internal description of the file, provided at compile-time.
example: Paint
flat_name: Target.process.Ext.memory_region.mapped_pe.description
ignore_above: 1024
level: extended
name: description
normalize: []
original_fieldset: pe
short: Internal description of the file, provided at compile-time.
type: keyword
Target.process.Ext.memory_region.mapped_pe.file_version:
dashed_name: Target-process-Ext-memory-region-mapped-pe-file-version
description: Internal version of the file, provided at compile-time.
example: 6.3.9600.17415
flat_name: Target.process.Ext.memory_region.mapped_pe.file_version
ignore_above: 1024
level: extended
name: file_version
normalize: []
original_fieldset: pe
short: Process name.
type: keyword
Target.process.Ext.memory_region.mapped_pe.go_import_hash:
dashed_name: Target-process-Ext-memory-region-mapped-pe-go-import-hash
description: 'A hash of the Go language imports in a PE file excluding standard
library imports. An import hash can be used to fingerprint binaries even after
recompilation or other code-level transformations have occurred, which would change
more traditional hash values.
The algorithm used to calculate the Go symbol hash and a reference implementation
are available [here](https://github.com/elastic/toutoumomoma).'
example: 10bddcb4cee42080f76c88d9ff964491
flat_name: Target.process.Ext.memory_region.mapped_pe.go_import_hash
ignore_above: 1024
level: extended
name: go_import_hash
normalize: []
original_fieldset: pe
short: A hash of the Go language imports in a PE file.
type: keyword
Target.process.Ext.memory_region.mapped_pe.go_imports:
dashed_name: Target-process-Ext-memory-region-mapped-pe-go-imports
description: List of imported Go language element names and types.
flat_name: Target.process.Ext.memory_region.mapped_pe.go_imports
level: extended
name: go_imports
normalize: []
original_fieldset: pe
short: List of imported Go language element names and types.
type: flattened
Target.process.Ext.memory_region.mapped_pe.go_imports_names_entropy:
dashed_name: Target-process-Ext-memory-region-mapped-pe-go-imports-names-entropy
description: Shannon entropy calculation from the list of Go imports.
flat_name: Target.process.Ext.memory_region.mapped_pe.go_imports_names_entropy
format: number
level: extended
name: go_imports_names_entropy
normalize: []
original_fieldset: pe
short: Shannon entropy calculation from the list of Go imports.
type: long
Target.process.Ext.memory_region.mapped_pe.go_imports_names_var_entropy:
dashed_name: Target-process-Ext-memory-region-mapped-pe-go-imports-names-var-entropy
description: Variance for Shannon entropy calculation from the list of Go imports.
flat_name: Target.process.Ext.memory_region.mapped_pe.go_imports_names_var_entropy
format: number
level: extended
name: go_imports_names_var_entropy
normalize: []
original_fieldset: pe
short: Variance for Shannon entropy calculation from the list of Go imports.
type: long
Target.process.Ext.memory_region.mapped_pe.go_stripped:
dashed_name: Target-process-Ext-memory-region-mapped-pe-go-stripped
description: Set to true if the file is a Go executable that has had its symbols
stripped or obfuscated and false if an unobfuscated Go executable.
flat_name: Target.process.Ext.memory_region.mapped_pe.go_stripped
level: extended
name: go_stripped
normalize: []
original_fieldset: pe
short: Whether the file is a stripped or obfuscated Go executable.
type: boolean
Target.process.Ext.memory_region.mapped_pe.imphash:
dashed_name: Target-process-Ext-memory-region-mapped-pe-imphash
description: 'A hash of the imports in a PE file. An imphash -- or import hash --
can be used to fingerprint binaries even after recompilation or other code-level
transformations have occurred, which would change more traditional hash values.
Learn more at https://www.fireeye.com/blog/threat-research/2014/01/tracking-malware-import-hashing.html.'
example: 0c6803c4e922103c4dca5963aad36ddf
flat_name: Target.process.Ext.memory_region.mapped_pe.imphash
ignore_above: 1024
level: extended
name: imphash
normalize: []
original_fieldset: pe
short: A hash of the imports in a PE file.
type: keyword
Target.process.Ext.memory_region.mapped_pe.import_hash:
dashed_name: Target-process-Ext-memory-region-mapped-pe-import-hash
description: 'A hash of the imports in a PE file. An import hash can be used to
fingerprint binaries even after recompilation or other code-level transformations
have occurred, which would change more traditional hash values.
This is a synonym for imphash.'
example: d41d8cd98f00b204e9800998ecf8427e
flat_name: Target.process.Ext.memory_region.mapped_pe.import_hash
ignore_above: 1024
level: extended
name: import_hash
normalize: []
original_fieldset: pe
short: A hash of the imports in a PE file.
type: keyword
Target.process.Ext.memory_region.mapped_pe.imports:
dashed_name: Target-process-Ext-memory-region-mapped-pe-imports
description: List of imported element names and types.
flat_name: Target.process.Ext.memory_region.mapped_pe.imports
level: extended
name: imports
normalize:
- array
original_fieldset: pe
short: List of imported element names and types.
type: flattened
Target.process.Ext.memory_region.mapped_pe.imports_names_entropy:
dashed_name: Target-process-Ext-memory-region-mapped-pe-imports-names-entropy
description: Shannon entropy calculation from the list of imported element names
and types.
flat_name: Target.process.Ext.memory_region.mapped_pe.imports_names_entropy
format: number
level: extended
name: imports_names_entropy
normalize: []
original_fieldset: pe
short: Shannon entropy calculation from the list of imported element names and types.
type: long
Target.process.Ext.memory_region.mapped_pe.imports_names_var_entropy:
dashed_name: Target-process-Ext-memory-region-mapped-pe-imports-names-var-entropy
description: Variance for Shannon entropy calculation from the list of imported
element names and types.
flat_name: Target.process.Ext.memory_region.mapped_pe.imports_names_var_entropy
format: number
level: extended
name: imports_names_var_entropy
normalize: []
original_fieldset: pe
short: Variance for Shannon entropy calculation from the list of imported element
names and types.
type: long
Target.process.Ext.memory_region.mapped_pe.original_file_name:
dashed_name: Target-process-Ext-memory-region-mapped-pe-original-file-name
description: Internal name of the file, provided at compile-time.
example: MSPAINT.EXE
flat_name: Target.process.Ext.memory_region.mapped_pe.original_file_name
ignore_above: 1024
level: extended
name: original_file_name
normalize: []
original_fieldset: pe
short: Internal name of the file, provided at compile-time.
type: keyword
Target.process.Ext.memory_region.mapped_pe.pehash:
dashed_name: Target-process-Ext-memory-region-mapped-pe-pehash
description: 'A hash of the PE header and data from one or more PE sections. An
pehash can be used to cluster files by transforming structural information about
a file into a hash value.
Learn more at https://www.usenix.org/legacy/events/leet09/tech/full_papers/wicherski/wicherski_html/index.html.'
example: 73ff189b63cd6be375a7ff25179a38d347651975
flat_name: Target.process.Ext.memory_region.mapped_pe.pehash
ignore_above: 1024
level: extended
name: pehash
normalize: []
original_fieldset: pe
short: A hash of the PE header and data from one or more PE sections.
type: keyword
Target.process.Ext.memory_region.mapped_pe.product:
dashed_name: Target-process-Ext-memory-region-mapped-pe-product
description: Internal product name of the file, provided at compile-time.
example: "Microsoft\xAE Windows\xAE Operating System"
flat_name: Target.process.Ext.memory_region.mapped_pe.product
ignore_above: 1024
level: extended
name: product
normalize: []
original_fieldset: pe
short: Internal product name of the file, provided at compile-time.
type: keyword
Target.process.Ext.memory_region.mapped_pe.sections:
dashed_name: Target-process-Ext-memory-region-mapped-pe-sections
description: 'An array containing an object for each section of the PE file.
The keys that should be present in these objects are defined by sub-fields underneath
`pe.sections.*`.'
flat_name: Target.process.Ext.memory_region.mapped_pe.sections
level: extended
name: sections
normalize:
- array
original_fieldset: pe
short: Section information of the PE file.
type: nested
Target.process.Ext.memory_region.mapped_pe.sections.entropy:
dashed_name: Target-process-Ext-memory-region-mapped-pe-sections-entropy
description: Shannon entropy calculation from the section.
flat_name: Target.process.Ext.memory_region.mapped_pe.sections.entropy
format: number
level: extended
name: sections.entropy
normalize: []
original_fieldset: pe
short: Shannon entropy calculation from the section.
type: long
Target.process.Ext.memory_region.mapped_pe.sections.name:
dashed_name: Target-process-Ext-memory-region-mapped-pe-sections-name
description: PE Section List name.
flat_name: Target.process.Ext.memory_region.mapped_pe.sections.name
ignore_above: 1024
level: extended
name: sections.name
normalize: []
original_fieldset: pe
short: PE Section List name.
type: keyword
Target.process.Ext.memory_region.mapped_pe.sections.physical_size:
dashed_name: Target-process-Ext-memory-region-mapped-pe-sections-physical-size
description: PE Section List physical size.
flat_name: Target.process.Ext.memory_region.mapped_pe.sections.physical_size
format: bytes
level: extended
name: sections.physical_size
normalize: []
original_fieldset: pe
short: PE Section List physical size.
type: long
Target.process.Ext.memory_region.mapped_pe.sections.var_entropy:
dashed_name: Target-process-Ext-memory-region-mapped-pe-sections-var-entropy
description: Variance for Shannon entropy calculation from the section.
flat_name: Target.process.Ext.memory_region.mapped_pe.sections.var_entropy
format: number
level: extended
name: sections.var_entropy
normalize: []
original_fieldset: pe
short: Variance for Shannon entropy calculation from the section.
type: long
Target.process.Ext.memory_region.mapped_pe.sections.virtual_size:
dashed_name: Target-process-Ext-memory-region-mapped-pe-sections-virtual-size
description: PE Section List virtual size. This is always the same as `physical_size`.
flat_name: Target.process.Ext.memory_region.mapped_pe.sections.virtual_size
format: string
level: extended
name: sections.virtual_size
normalize: []
original_fieldset: pe
short: PE Section List virtual size. This is always the same as `physical_size`.
type: long
Target.process.Ext.memory_region.mapped_pe_detected:
dashed_name: Target-process-Ext-memory-region-mapped-pe-detected
description: Whether the file at mapped_path is an executable.
example: false
flat_name: Target.process.Ext.memory_region.mapped_pe_detected
level: custom
name: mapped_pe_detected
normalize: []
original_fieldset: memory_region
short: Whether the file at mapped_path is an executable.
type: boolean
Target.process.Ext.memory_region.memory_pe.Ext.dotnet:
dashed_name: Target-process-Ext-memory-region-memory-pe-Ext-dotnet
description: Whether this file is a .NET PE
example: 'true'
flat_name: Target.process.Ext.memory_region.memory_pe.Ext.dotnet
level: custom
name: Ext.dotnet
normalize: []
original_fieldset: pe
short: Whether this file is a .NET PE
type: boolean
Target.process.Ext.memory_region.memory_pe.Ext.sections:
dashed_name: Target-process-Ext-memory-region-memory-pe-Ext-sections
description: The file's relevant sections, if it is a PE
flat_name: Target.process.Ext.memory_region.memory_pe.Ext.sections
level: custom
name: Ext.sections
normalize: []
original_fieldset: pe
short: The file's sections, if it is a PE
type: object
Target.process.Ext.memory_region.memory_pe.Ext.sections.hash.md5:
dashed_name: Target-process-Ext-memory-region-memory-pe-Ext-sections-hash-md5
description: MD5 hash.
flat_name: Target.process.Ext.memory_region.memory_pe.Ext.sections.hash.md5
ignore_above: 1024
level: extended
name: md5
normalize: []
original_fieldset: hash
short: MD5 hash.
type: keyword
Target.process.Ext.memory_region.memory_pe.Ext.sections.hash.sha1:
dashed_name: Target-process-Ext-memory-region-memory-pe-Ext-sections-hash-sha1
description: SHA1 hash.
flat_name: Target.process.Ext.memory_region.memory_pe.Ext.sections.hash.sha1
ignore_above: 1024
level: extended
name: sha1
normalize: []
original_fieldset: hash
short: SHA1 hash.
type: keyword
Target.process.Ext.memory_region.memory_pe.Ext.sections.hash.sha256:
dashed_name: Target-process-Ext-memory-region-memory-pe-Ext-sections-hash-sha256
description: SHA256 hash.
flat_name: Target.process.Ext.memory_region.memory_pe.Ext.sections.hash.sha256
ignore_above: 1024
level: extended
name: sha256
normalize: []
original_fieldset: hash
short: SHA256 hash.
type: keyword
Target.process.Ext.memory_region.memory_pe.Ext.sections.hash.sha384:
dashed_name: Target-process-Ext-memory-region-memory-pe-Ext-sections-hash-sha384
description: SHA384 hash.
flat_name: Target.process.Ext.memory_region.memory_pe.Ext.sections.hash.sha384
ignore_above: 1024
level: extended
name: sha384
normalize: []
original_fieldset: hash
short: SHA384 hash.
type: keyword
Target.process.Ext.memory_region.memory_pe.Ext.sections.hash.sha512:
dashed_name: Target-process-Ext-memory-region-memory-pe-Ext-sections-hash-sha512
description: SHA512 hash.
flat_name: Target.process.Ext.memory_region.memory_pe.Ext.sections.hash.sha512
ignore_above: 1024
level: extended
name: sha512
normalize: []
original_fieldset: hash
short: SHA512 hash.
type: keyword
Target.process.Ext.memory_region.memory_pe.Ext.sections.hash.ssdeep:
dashed_name: Target-process-Ext-memory-region-memory-pe-Ext-sections-hash-ssdeep
description: SSDEEP hash.
flat_name: Target.process.Ext.memory_region.memory_pe.Ext.sections.hash.ssdeep
ignore_above: 1024
level: extended
name: ssdeep
normalize: []
original_fieldset: hash
short: SSDEEP hash.
type: keyword
Target.process.Ext.memory_region.memory_pe.Ext.sections.hash.tlsh:
dashed_name: Target-process-Ext-memory-region-memory-pe-Ext-sections-hash-tlsh
description: TLSH hash.
flat_name: Target.process.Ext.memory_region.memory_pe.Ext.sections.hash.tlsh
ignore_above: 1024
level: extended
name: tlsh
normalize: []
original_fieldset: hash
short: TLSH hash.
type: keyword
Target.process.Ext.memory_region.memory_pe.Ext.sections.name:
dashed_name: Target-process-Ext-memory-region-memory-pe-Ext-sections-name
description: The section's name
example: .reloc
flat_name: Target.process.Ext.memory_region.memory_pe.Ext.sections.name
ignore_above: 1024
level: custom
name: Ext.sections.name
normalize: []
original_fieldset: pe
short: The section's name
type: keyword
Target.process.Ext.memory_region.memory_pe.Ext.streams:
dashed_name: Target-process-Ext-memory-region-memory-pe-Ext-streams
description: The file's streams, if it is a PE
flat_name: Target.process.Ext.memory_region.memory_pe.Ext.streams
level: custom
name: Ext.streams
normalize: []
original_fieldset: pe
short: The file's streams, if it is a PE
type: object
Target.process.Ext.memory_region.memory_pe.Ext.streams.hash.md5:
dashed_name: Target-process-Ext-memory-region-memory-pe-Ext-streams-hash-md5
description: MD5 hash.
flat_name: Target.process.Ext.memory_region.memory_pe.Ext.streams.hash.md5
ignore_above: 1024
level: extended
name: md5
normalize: []
original_fieldset: hash
short: MD5 hash.
type: keyword
Target.process.Ext.memory_region.memory_pe.Ext.streams.hash.sha1:
dashed_name: Target-process-Ext-memory-region-memory-pe-Ext-streams-hash-sha1
description: SHA1 hash.
flat_name: Target.process.Ext.memory_region.memory_pe.Ext.streams.hash.sha1
ignore_above: 1024
level: extended
name: sha1
normalize: []
original_fieldset: hash
short: SHA1 hash.
type: keyword
Target.process.Ext.memory_region.memory_pe.Ext.streams.hash.sha256:
dashed_name: Target-process-Ext-memory-region-memory-pe-Ext-streams-hash-sha256
description: SHA256 hash.
flat_name: Target.process.Ext.memory_region.memory_pe.Ext.streams.hash.sha256
ignore_above: 1024
level: extended
name: sha256
normalize: []
original_fieldset: hash
short: SHA256 hash.
type: keyword
Target.process.Ext.memory_region.memory_pe.Ext.streams.hash.sha384:
dashed_name: Target-process-Ext-memory-region-memory-pe-Ext-streams-hash-sha384
description: SHA384 hash.
flat_name: Target.process.Ext.memory_region.memory_pe.Ext.streams.hash.sha384
ignore_above: 1024
level: extended
name: sha384
normalize: []
original_fieldset: hash
short: SHA384 hash.
type: keyword
Target.process.Ext.memory_region.memory_pe.Ext.streams.hash.sha512:
dashed_name: Target-process-Ext-memory-region-memory-pe-Ext-streams-hash-sha512
description: SHA512 hash.
flat_name: Target.process.Ext.memory_region.memory_pe.Ext.streams.hash.sha512
ignore_above: 1024
level: extended
name: sha512
normalize: []
original_fieldset: hash
short: SHA512 hash.
type: keyword
Target.process.Ext.memory_region.memory_pe.Ext.streams.hash.ssdeep:
dashed_name: Target-process-Ext-memory-region-memory-pe-Ext-streams-hash-ssdeep
description: SSDEEP hash.
flat_name: Target.process.Ext.memory_region.memory_pe.Ext.streams.hash.ssdeep
ignore_above: 1024
level: extended
name: ssdeep
normalize: []
original_fieldset: hash
short: SSDEEP hash.
type: keyword
Target.process.Ext.memory_region.memory_pe.Ext.streams.hash.tlsh:
dashed_name: Target-process-Ext-memory-region-memory-pe-Ext-streams-hash-tlsh
description: TLSH hash.
flat_name: Target.process.Ext.memory_region.memory_pe.Ext.streams.hash.tlsh
ignore_above: 1024
level: extended
name: tlsh
normalize: []
original_fieldset: hash
short: TLSH hash.
type: keyword
Target.process.Ext.memory_region.memory_pe.Ext.streams.name:
dashed_name: Target-process-Ext-memory-region-memory-pe-Ext-streams-name
description: The stream's name
example: .reloc
flat_name: Target.process.Ext.memory_region.memory_pe.Ext.streams.name
ignore_above: 1024
level: custom
name: Ext.streams.name
normalize: []
original_fieldset: pe
short: The stream's name
type: keyword
Target.process.Ext.memory_region.memory_pe.architecture:
dashed_name: Target-process-Ext-memory-region-memory-pe-architecture
description: CPU architecture target for the file.
example: x64
flat_name: Target.process.Ext.memory_region.memory_pe.architecture
ignore_above: 1024
level: extended
name: architecture
normalize: []
original_fieldset: pe
short: CPU architecture target for the file.
type: keyword
Target.process.Ext.memory_region.memory_pe.company:
dashed_name: Target-process-Ext-memory-region-memory-pe-company
description: Internal company name of the file, provided at compile-time.
example: Microsoft Corporation
flat_name: Target.process.Ext.memory_region.memory_pe.company
ignore_above: 1024
level: extended
name: company
normalize: []
original_fieldset: pe
short: Internal company name of the file, provided at compile-time.
type: keyword
Target.process.Ext.memory_region.memory_pe.description:
dashed_name: Target-process-Ext-memory-region-memory-pe-description
description: Internal description of the file, provided at compile-time.
example: Paint
flat_name: Target.process.Ext.memory_region.memory_pe.description
ignore_above: 1024
level: extended
name: description
normalize: []
original_fieldset: pe
short: Internal description of the file, provided at compile-time.
type: keyword
Target.process.Ext.memory_region.memory_pe.file_version:
dashed_name: Target-process-Ext-memory-region-memory-pe-file-version
description: Internal version of the file, provided at compile-time.
example: 6.3.9600.17415
flat_name: Target.process.Ext.memory_region.memory_pe.file_version
ignore_above: 1024
level: extended
name: file_version
normalize: []
original_fieldset: pe
short: Process name.
type: keyword
Target.process.Ext.memory_region.memory_pe.go_import_hash:
dashed_name: Target-process-Ext-memory-region-memory-pe-go-import-hash
description: 'A hash of the Go language imports in a PE file excluding standard
library imports. An import hash can be used to fingerprint binaries even after
recompilation or other code-level transformations have occurred, which would change
more traditional hash values.
The algorithm used to calculate the Go symbol hash and a reference implementation
are available [here](https://github.com/elastic/toutoumomoma).'
example: 10bddcb4cee42080f76c88d9ff964491
flat_name: Target.process.Ext.memory_region.memory_pe.go_import_hash
ignore_above: 1024
level: extended
name: go_import_hash
normalize: []
original_fieldset: pe
short: A hash of the Go language imports in a PE file.
type: keyword
Target.process.Ext.memory_region.memory_pe.go_imports:
dashed_name: Target-process-Ext-memory-region-memory-pe-go-imports
description: List of imported Go language element names and types.
flat_name: Target.process.Ext.memory_region.memory_pe.go_imports
level: extended
name: go_imports
normalize: []
original_fieldset: pe
short: List of imported Go language element names and types.
type: flattened
Target.process.Ext.memory_region.memory_pe.go_imports_names_entropy:
dashed_name: Target-process-Ext-memory-region-memory-pe-go-imports-names-entropy
description: Shannon entropy calculation from the list of Go imports.
flat_name: Target.process.Ext.memory_region.memory_pe.go_imports_names_entropy
format: number
level: extended
name: go_imports_names_entropy
normalize: []
original_fieldset: pe
short: Shannon entropy calculation from the list of Go imports.
type: long
Target.process.Ext.memory_region.memory_pe.go_imports_names_var_entropy:
dashed_name: Target-process-Ext-memory-region-memory-pe-go-imports-names-var-entropy
description: Variance for Shannon entropy calculation from the list of Go imports.
flat_name: Target.process.Ext.memory_region.memory_pe.go_imports_names_var_entropy
format: number
level: extended
name: go_imports_names_var_entropy
normalize: []
original_fieldset: pe
short: Variance for Shannon entropy calculation from the list of Go imports.
type: long
Target.process.Ext.memory_region.memory_pe.go_stripped:
dashed_name: Target-process-Ext-memory-region-memory-pe-go-stripped
description: Set to true if the file is a Go executable that has had its symbols
stripped or obfuscated and false if an unobfuscated Go executable.
flat_name: Target.process.Ext.memory_region.memory_pe.go_stripped
level: extended
name: go_stripped
normalize: []
original_fieldset: pe
short: Whether the file is a stripped or obfuscated Go executable.
type: boolean
Target.process.Ext.memory_region.memory_pe.imphash:
dashed_name: Target-process-Ext-memory-region-memory-pe-imphash
description: 'A hash of the imports in a PE file. An imphash -- or import hash --
can be used to fingerprint binaries even after recompilation or other code-level
transformations have occurred, which would change more traditional hash values.
Learn more at https://www.fireeye.com/blog/threat-research/2014/01/tracking-malware-import-hashing.html.'
example: 0c6803c4e922103c4dca5963aad36ddf
flat_name: Target.process.Ext.memory_region.memory_pe.imphash
ignore_above: 1024
level: extended
name: imphash
normalize: []
original_fieldset: pe
short: A hash of the imports in a PE file.
type: keyword
Target.process.Ext.memory_region.memory_pe.import_hash:
dashed_name: Target-process-Ext-memory-region-memory-pe-import-hash
description: 'A hash of the imports in a PE file. An import hash can be used to
fingerprint binaries even after recompilation or other code-level transformations
have occurred, which would change more traditional hash values.
This is a synonym for imphash.'
example: d41d8cd98f00b204e9800998ecf8427e
flat_name: Target.process.Ext.memory_region.memory_pe.import_hash
ignore_above: 1024
level: extended
name: import_hash
normalize: []
original_fieldset: pe
short: A hash of the imports in a PE file.
type: keyword
Target.process.Ext.memory_region.memory_pe.imports:
dashed_name: Target-process-Ext-memory-region-memory-pe-imports
description: List of imported element names and types.
flat_name: Target.process.Ext.memory_region.memory_pe.imports
level: extended
name: imports
normalize:
- array
original_fieldset: pe
short: List of imported element names and types.
type: flattened
Target.process.Ext.memory_region.memory_pe.imports_names_entropy:
dashed_name: Target-process-Ext-memory-region-memory-pe-imports-names-entropy
description: Shannon entropy calculation from the list of imported element names
and types.
flat_name: Target.process.Ext.memory_region.memory_pe.imports_names_entropy
format: number
level: extended
name: imports_names_entropy
normalize: []
original_fieldset: pe
short: Shannon entropy calculation from the list of imported element names and types.
type: long
Target.process.Ext.memory_region.memory_pe.imports_names_var_entropy:
dashed_name: Target-process-Ext-memory-region-memory-pe-imports-names-var-entropy
description: Variance for Shannon entropy calculation from the list of imported
element names and types.
flat_name: Target.process.Ext.memory_region.memory_pe.imports_names_var_entropy
format: number
level: extended
name: imports_names_var_entropy
normalize: []
original_fieldset: pe
short: Variance for Shannon entropy calculation from the list of imported element
names and types.
type: long
Target.process.Ext.memory_region.memory_pe.original_file_name:
dashed_name: Target-process-Ext-memory-region-memory-pe-original-file-name
description: Internal name of the file, provided at compile-time.
example: MSPAINT.EXE
flat_name: Target.process.Ext.memory_region.memory_pe.original_file_name
ignore_above: 1024
level: extended
name: original_file_name
normalize: []
original_fieldset: pe
short: Internal name of the file, provided at compile-time.
type: keyword
Target.process.Ext.memory_region.memory_pe.pehash:
dashed_name: Target-process-Ext-memory-region-memory-pe-pehash
description: 'A hash of the PE header and data from one or more PE sections. An
pehash can be used to cluster files by transforming structural information about
a file into a hash value.
Learn more at https://www.usenix.org/legacy/events/leet09/tech/full_papers/wicherski/wicherski_html/index.html.'
example: 73ff189b63cd6be375a7ff25179a38d347651975
flat_name: Target.process.Ext.memory_region.memory_pe.pehash
ignore_above: 1024
level: extended
name: pehash
normalize: []
original_fieldset: pe
short: A hash of the PE header and data from one or more PE sections.
type: keyword
Target.process.Ext.memory_region.memory_pe.product:
dashed_name: Target-process-Ext-memory-region-memory-pe-product
description: Internal product name of the file, provided at compile-time.
example: "Microsoft\xAE Windows\xAE Operating System"
flat_name: Target.process.Ext.memory_region.memory_pe.product
ignore_above: 1024
level: extended
name: product
normalize: []
original_fieldset: pe
short: Internal product name of the file, provided at compile-time.
type: keyword
Target.process.Ext.memory_region.memory_pe.sections:
dashed_name: Target-process-Ext-memory-region-memory-pe-sections
description: 'An array containing an object for each section of the PE file.
The keys that should be present in these objects are defined by sub-fields underneath
`pe.sections.*`.'
flat_name: Target.process.Ext.memory_region.memory_pe.sections
level: extended
name: sections
normalize:
- array
original_fieldset: pe
short: Section information of the PE file.
type: nested
Target.process.Ext.memory_region.memory_pe.sections.entropy:
dashed_name: Target-process-Ext-memory-region-memory-pe-sections-entropy
description: Shannon entropy calculation from the section.
flat_name: Target.process.Ext.memory_region.memory_pe.sections.entropy
format: number
level: extended
name: sections.entropy
normalize: []
original_fieldset: pe
short: Shannon entropy calculation from the section.
type: long
Target.process.Ext.memory_region.memory_pe.sections.name:
dashed_name: Target-process-Ext-memory-region-memory-pe-sections-name
description: PE Section List name.
flat_name: Target.process.Ext.memory_region.memory_pe.sections.name
ignore_above: 1024
level: extended
name: sections.name
normalize: []
original_fieldset: pe
short: PE Section List name.
type: keyword
Target.process.Ext.memory_region.memory_pe.sections.physical_size:
dashed_name: Target-process-Ext-memory-region-memory-pe-sections-physical-size
description: PE Section List physical size.
flat_name: Target.process.Ext.memory_region.memory_pe.sections.physical_size
format: bytes
level: extended
name: sections.physical_size
normalize: []
original_fieldset: pe
short: PE Section List physical size.
type: long
Target.process.Ext.memory_region.memory_pe.sections.var_entropy:
dashed_name: Target-process-Ext-memory-region-memory-pe-sections-var-entropy
description: Variance for Shannon entropy calculation from the section.
flat_name: Target.process.Ext.memory_region.memory_pe.sections.var_entropy
format: number
level: extended
name: sections.var_entropy
normalize: []
original_fieldset: pe
short: Variance for Shannon entropy calculation from the section.
type: long
Target.process.Ext.memory_region.memory_pe.sections.virtual_size:
dashed_name: Target-process-Ext-memory-region-memory-pe-sections-virtual-size
description: PE Section List virtual size. This is always the same as `physical_size`.
flat_name: Target.process.Ext.memory_region.memory_pe.sections.virtual_size
format: string
level: extended
name: sections.virtual_size
normalize: []
original_fieldset: pe
short: PE Section List virtual size. This is always the same as `physical_size`.
type: long
Target.process.Ext.memory_region.memory_pe_detected:
dashed_name: Target-process-Ext-memory-region-memory-pe-detected
description: Whether an executable file was found in memory.
example: false
flat_name: Target.process.Ext.memory_region.memory_pe_detected
level: custom
name: memory_pe_detected
normalize: []
original_fieldset: memory_region
short: Whether an executable file was found in memory.
type: boolean
Target.process.Ext.memory_region.region_base:
dashed_name: Target-process-Ext-memory-region-region-base
description: Base address of the memory region.
example: 2431737462784
flat_name: Target.process.Ext.memory_region.region_base
level: custom
name: region_base
normalize: []
original_fieldset: memory_region
short: Base address of the memory region.
type: unsigned_long
Target.process.Ext.memory_region.region_protection:
dashed_name: Target-process-Ext-memory-region-region-protection
description: Memory protection of the memory region. Example values include "RWX"
and "R-X".
example: RWX
flat_name: Target.process.Ext.memory_region.region_protection
ignore_above: 1024
level: custom
name: region_protection
normalize: []
original_fieldset: memory_region
short: Memory protection of the memory region. Example values include "RWX" and
"R-X".
type: keyword
Target.process.Ext.memory_region.region_size:
dashed_name: Target-process-Ext-memory-region-region-size
description: Size of the memory region.
example: 4096
flat_name: Target.process.Ext.memory_region.region_size
level: custom
name: region_size
normalize: []
original_fieldset: memory_region
short: Size of the memory region.
type: unsigned_long
Target.process.Ext.memory_region.region_start_bytes:
dashed_name: Target-process-Ext-memory-region-region-start-bytes
description: First 64 bytes at the region base address.
example: 4d5a90000300000004000000ffff0000b80000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000
flat_name: Target.process.Ext.memory_region.region_start_bytes
ignore_above: 1024
level: custom
name: region_start_bytes
normalize: []
original_fieldset: memory_region
short: First 64 bytes at the region base address.
type: keyword
Target.process.Ext.memory_region.region_state:
dashed_name: Target-process-Ext-memory-region-region-state
description: State of the memory region. Example values include "RESERVE", "COMMIT",
and "FREE".
example: COMMIT
flat_name: Target.process.Ext.memory_region.region_state
ignore_above: 1024
level: custom
name: region_state
normalize: []
original_fieldset: memory_region
short: State of the memory region. Example values include "RESERVE", "COMMIT", and
"FREE".
type: keyword
Target.process.Ext.memory_region.strings:
dashed_name: Target-process-Ext-memory-region-strings
description: Array of strings found within the memory region.
doc_values: false
flat_name: Target.process.Ext.memory_region.strings
index: false
level: custom
name: strings
normalize: []
original_fieldset: memory_region
short: Array of strings found within the memory region.
type: keyword
Target.process.Ext.protection:
dashed_name: Target-process-Ext-protection
description: Indicates the protection level of this process. Uses the same syntax
as Process Explorer. Examples include PsProtectedSignerWinTcb, PsProtectedSignerWinTcb-Light,
and PsProtectedSignerWindows-Light.
flat_name: Target.process.Ext.protection
ignore_above: 1024
level: custom
name: Ext.protection
normalize: []
original_fieldset: process
short: OS-level protections granted to this process
type: keyword
Target.process.Ext.token.integrity_level_name:
dashed_name: Target-process-Ext-token-integrity-level-name
description: Human readable integrity level.
example: one of "system", "high", "medium", "low", "untrusted"
flat_name: Target.process.Ext.token.integrity_level_name
ignore_above: 1024
level: custom
name: integrity_level_name
normalize: []
original_fieldset: token
short: Human readable integrity level.
type: keyword
Target.process.entity_id:
dashed_name: Target-process-entity-id
description: 'Unique identifier for the process.
The implementation of this is specified by the data source, but some examples
of what could be used here are a process-generated UUID, Sysmon Process GUIDs,
or a hash of some uniquely identifying components of a process.
Constructing a globally unique identifier is a common practice to mitigate PID
reuse as well as to identify a specific process over time, across multiple monitored
hosts.'
example: c2c455d9f99375d
flat_name: Target.process.entity_id
ignore_above: 1024
level: extended
name: entity_id
normalize: []
original_fieldset: process
short: Unique identifier for the process.
type: keyword
Target.process.executable:
dashed_name: Target-process-executable
description: Absolute path to the process executable.
example: /usr/bin/ssh
flat_name: Target.process.executable
ignore_above: 1024
level: extended
multi_fields:
- flat_name: Target.process.executable.caseless
ignore_above: 1024
name: caseless
normalizer: lowercase
type: keyword
- flat_name: Target.process.executable.text
name: text
norms: false
type: text
name: executable
normalize: []
original_fieldset: process
short: Absolute path to the process executable.
type: keyword
Target.process.name:
dashed_name: Target-process-name
description: 'Process name.
Sometimes called program name or similar.'
example: ssh
flat_name: Target.process.name
ignore_above: 1024
level: extended
multi_fields:
- flat_name: Target.process.name.caseless
ignore_above: 1024
name: caseless
normalizer: lowercase
type: keyword
- flat_name: Target.process.name.text
name: text
norms: false
type: text
name: name
normalize: []
original_fieldset: process
short: Process name.
type: keyword
Target.process.pid:
dashed_name: Target-process-pid
description: Process id.
example: 4242
flat_name: Target.process.pid
format: string
level: core
name: pid
normalize: []
original_fieldset: process
short: Process id.
type: long
data_stream.dataset:
dashed_name: data-stream-dataset
description: Data stream dataset name.
example: nginx.access
flat_name: data_stream.dataset
level: custom
name: dataset
normalize: []
short: The field can contain anything that makes sense to signify the source of
the data.
type: constant_keyword
data_stream.namespace:
dashed_name: data-stream-namespace
description: Data stream namespace.
example: production
flat_name: data_stream.namespace
level: custom
name: namespace
normalize: []
short: A user defined namespace. Namespaces are useful to allow grouping of data.
type: constant_keyword
data_stream.type:
dashed_name: data-stream-type
description: Data stream type.
example: logs
flat_name: data_stream.type
level: custom
name: type
normalize: []
short: An overarching type for the data stream.
type: constant_keyword
destination.ip:
dashed_name: destination-ip
description: IP address of the destination (IPv4 or IPv6).
flat_name: destination.ip
level: core
name: ip
normalize: []
short: IP address of the destination.
type: ip
destination.port:
dashed_name: destination-port
description: Port of the destination.
flat_name: destination.port
format: string
level: core
name: port
normalize: []
short: Port of the destination.
type: long
dll.Ext:
dashed_name: dll-Ext
description: Object for all custom defined fields to live in.
flat_name: dll.Ext
level: custom
name: Ext
normalize: []
short: Object for all custom defined fields to live in.
type: object
dll.Ext.code_signature:
dashed_name: dll-Ext-code-signature
description: Nested version of ECS code_signature fieldset.
flat_name: dll.Ext.code_signature
level: custom
name: Ext.code_signature
normalize: []
short: Nested version of ECS code_signature fieldset.
type: nested
dll.Ext.code_signature.exists:
dashed_name: dll-Ext-code-signature-exists
description: Boolean to capture if a signature is present.
example: 'true'
flat_name: dll.Ext.code_signature.exists
level: custom
name: Ext.code_signature.exists
normalize: []
short: Boolean to capture if a signature is present.
type: boolean
dll.Ext.code_signature.status:
dashed_name: dll-Ext-code-signature-status
description: 'Additional information about the certificate status.
This is useful for logging cryptographic errors with the certificate validity
or trust status. Leave unpopulated if the validity or trust of the certificate
was unchecked.'
example: ERROR_UNTRUSTED_ROOT
flat_name: dll.Ext.code_signature.status
ignore_above: 1024
level: custom
name: Ext.code_signature.status
normalize: []
short: Additional information about the certificate status.
type: keyword
dll.Ext.code_signature.subject_name:
dashed_name: dll-Ext-code-signature-subject-name
description: Subject name of the code signer
example: Microsoft Corporation
flat_name: dll.Ext.code_signature.subject_name
ignore_above: 1024
level: custom
name: Ext.code_signature.subject_name
normalize: []
short: Subject name of the code signer
type: keyword
dll.Ext.code_signature.trusted:
dashed_name: dll-Ext-code-signature-trusted
description: 'Stores the trust status of the certificate chain.
Validating the trust of the certificate chain may be complicated, and this field
should only be populated by tools that actively check the status.'
example: 'true'
flat_name: dll.Ext.code_signature.trusted
level: custom
name: Ext.code_signature.trusted
normalize: []
short: Stores the trust status of the certificate chain.
type: boolean
dll.hash.sha256:
dashed_name: dll-hash-sha256
description: SHA256 hash.
flat_name: dll.hash.sha256
ignore_above: 1024
level: extended
name: sha256
normalize: []
original_fieldset: hash
short: SHA256 hash.
type: keyword
dll.path:
dashed_name: dll-path
description: Full file path of the library.
example: C:\Windows\System32\kernel32.dll
flat_name: dll.path
ignore_above: 1024
level: extended
name: path
normalize: []
short: Full file path of the library.
type: keyword
ecs.version:
dashed_name: ecs-version
description: 'ECS version this event conforms to. `ecs.version` is a required field
and must exist in all events.
When querying across multiple indices -- which may conform to slightly different
ECS versions -- this field lets integrations adjust to the schema version of the
events.'
example: 1.0.0
flat_name: ecs.version
ignore_above: 1024
level: core
name: version
normalize: []
required: true
short: ECS version this event conforms to.
type: keyword
event.action:
dashed_name: event-action
description: 'The action captured by the event.
This describes the information in the event. It is more specific than `event.category`.
Examples are `group-add`, `process-started`, `file-created`. The value is normally
defined by the implementer.'
example: user-password-change
flat_name: event.action
ignore_above: 1024
level: core
name: action
normalize: []
short: The action captured by the event.
type: keyword
event.category:
allowed_values:
- description: Events in this category annotate API calls that occured on a system.
Typical sources for those events could be from the Operating System level through
the native libraries (for example Windows Win32, Linux libc, etc.), or managed
sources of events (such as ETW, syslog), but can also include network protocols
(such as SOAP, RPC, Websocket, REST, etc.)
expected_event_types:
- access
- admin
- allowed
- change
- creation
- deletion
- denied
- end
- info
- start
- user
name: api
- description: Events in this category are related to the challenge and response
process in which credentials are supplied and verified to allow the creation
of a session. Common sources for these logs are Windows event logs and ssh logs.
Visualize and analyze events in this category to look for failed logins, and
other authentication-related activity.
expected_event_types:
- start
- end
- info
name: authentication
- description: 'Events in the configuration category have to deal with creating,
modifying, or deleting the settings or parameters of an application, process,
or system.
Example sources include security policy change logs, configuration auditing
logging, and system integrity monitoring.'
expected_event_types:
- access
- change
- creation
- deletion
- info
name: configuration
- description: The database category denotes events and metrics relating to a data
storage and retrieval system. Note that use of this category is not limited
to relational database systems. Examples include event logs from MS SQL, MySQL,
Elasticsearch, MongoDB, etc. Use this category to visualize and analyze database
activity such as accesses and changes.
expected_event_types:
- access
- change
- info
- error
name: database
- description: 'Events in the driver category have to do with operating system device
drivers and similar software entities such as Windows drivers, kernel extensions,
kernel modules, etc.
Use events and metrics in this category to visualize and analyze driver-related
activity and status on hosts.'
expected_event_types:
- change
- end
- info
- start
name: driver
- description: 'This category is used for events relating to email messages, email
attachments, and email network or protocol activity.
Emails events can be produced by email security gateways, mail transfer agents,
email cloud service providers, or mail server monitoring applications.'
expected_event_types:
- info
name: email
- description: Relating to a set of information that has been created on, or has
existed on a filesystem. Use this category of events to visualize and analyze
the creation, access, and deletions of files. Events in this category can come
from both host-based and network-based sources. An example source of a network-based
detection of a file transfer would be the Zeek file.log.
expected_event_types:
- access
- change
- creation
- deletion
- info
name: file
- description: 'Use this category to visualize and analyze information such as host
inventory or host lifecycle events.
Most of the events in this category can usually be observed from the outside,
such as from a hypervisor or a control plane''s point of view. Some can also
be seen from within, such as "start" or "end".
Note that this category is for information about hosts themselves; it is not
meant to capture activity "happening on a host".'
expected_event_types:
- access
- change
- end
- info
- start
name: host
- description: Identity and access management (IAM) events relating to users, groups,
and administration. Use this category to visualize and analyze IAM-related logs
and data from active directory, LDAP, Okta, Duo, and other IAM systems.
expected_event_types:
- admin
- change
- creation
- deletion
- group
- info
- user
name: iam
- description: Relating to intrusion detections from IDS/IPS systems and functions,
both network and host-based. Use this category to visualize and analyze intrusion
detection alerts from systems such as Snort, Suricata, and Palo Alto threat
detections.
expected_event_types:
- allowed
- denied
- info
name: intrusion_detection
- description: Events in this category refer to the loading of a library, such as
(dll / so / dynlib), into a process. Use this category to visualize and analyze
library loading related activity on hosts. Keep in mind that driver related
activity will be captured under the "driver" category above.
expected_event_types:
- start
name: library
- description: Malware detection events and alerts. Use this category to visualize
and analyze malware detections from EDR/EPP systems such as Elastic Endpoint
Security, Symantec Endpoint Protection, Crowdstrike, and network IDS/IPS systems
such as Suricata, or other sources of malware-related events such as Palo Alto
Networks threat logs and Wildfire logs.
expected_event_types:
- info
name: malware
- description: Relating to all network activity, including network connection lifecycle,
network traffic, and essentially any event that includes an IP address. Many
events containing decoded network protocol transactions fit into this category.
Use events in this category to visualize or analyze counts of network ports,
protocols, addresses, geolocation information, etc.
expected_event_types:
- access
- allowed
- connection
- denied
- end
- info
- protocol
- start
name: network
- description: Relating to software packages installed on hosts. Use this category
to visualize and analyze inventory of software installed on various hosts, or
to determine host vulnerability in the absence of vulnerability scan data.
expected_event_types:
- access
- change
- deletion
- info
- installation
- start
name: package
- description: Use this category of events to visualize and analyze process-specific
information such as lifecycle events or process ancestry.
expected_event_types:
- access
- change
- end
- info
- start
name: process
- description: Having to do with settings and assets stored in the Windows registry.
Use this category to visualize and analyze activity such as registry access
and modifications.
expected_event_types:
- access
- change
- creation
- deletion
name: registry
- description: The session category is applied to events and metrics regarding logical
persistent connections to hosts and services. Use this category to visualize
and analyze interactive or automated persistent connections between assets.
Data for this category may come from Windows Event logs, SSH logs, or stateless
sessions such as HTTP cookie-based sessions, etc.
expected_event_types:
- start
- end
- info
name: session
- description: Use this category to visualize and analyze events describing threat
actors' targets, motives, or behaviors.
expected_event_types:
- indicator
name: threat
- description: Relating to vulnerability scan results. Use this category to analyze
vulnerabilities detected by Tenable, Qualys, internal scanners, and other vulnerability
management sources.
expected_event_types:
- info
name: vulnerability
- description: 'Relating to web server access. Use this category to create a dashboard
of web server/proxy activity from apache, IIS, nginx web servers, etc. Note:
events from network observers such as Zeek http log may also be included in
this category.'
expected_event_types:
- access
- error
- info
name: web
dashed_name: event-category
description: 'This is one of four ECS Categorization Fields, and indicates the second
level in the ECS category hierarchy.
`event.category` represents the "big buckets" of ECS categories. For example,
filtering on `event.category:process` yields all events relating to process activity.
This field is closely related to `event.type`, which is used as a subcategory.
This field is an array. This will allow proper categorization of some events that
fall in multiple categories.'
example: authentication
flat_name: event.category
ignore_above: 1024
level: core
name: category
normalize:
- array
short: Event category. The second categorization field in the hierarchy.
type: keyword
event.created:
dashed_name: event-created
description: '`event.created` contains the date/time when the event was first read
by an agent, or by your pipeline.
This field is distinct from `@timestamp` in that `@timestamp` typically contain
the time extracted from the original event.
In most situations, these two timestamps will be slightly different. The difference
can be used to calculate the delay between your source generating an event, and
the time when your agent first processed it. This can be used to monitor your
agent''s or pipeline''s ability to keep up with your event source.
In case the two timestamps are identical, `@timestamp` should be used.'
example: '2016-05-23T08:05:34.857Z'
flat_name: event.created
level: core
name: created
normalize: []
short: Time when the event was first read by an agent or by your pipeline.
type: date
event.dataset:
dashed_name: event-dataset
description: 'Name of the dataset.
If an event source publishes more than one type of log or events (e.g. access
log, error log), the dataset is used to specify which one the event comes from.
It''s recommended but not required to start the dataset name with the module name,
followed by a dot, then the dataset name.'
example: apache.access
flat_name: event.dataset
ignore_above: 1024
level: core
name: dataset
normalize: []
short: Name of the dataset.
type: keyword
event.end:
dashed_name: event-end
description: '`event.end` contains the date when the event ended or when the activity
was last observed.'
flat_name: event.end
level: extended
name: end
normalize: []
short: '`event.end` contains the date when the event ended or when the activity
was last observed.'
type: date
event.hash:
dashed_name: event-hash
description: Hash (perhaps logstash fingerprint) of raw field to be able to demonstrate
log integrity.
example: 123456789012345678901234567890ABCD
flat_name: event.hash
ignore_above: 1024
level: extended
name: hash
normalize: []
short: Hash (perhaps logstash fingerprint) of raw field to be able to demonstrate
log integrity.
type: keyword
event.id:
dashed_name: event-id
description: Unique ID to describe the event.
example: 8a4f500d
flat_name: event.id
ignore_above: 1024
level: core
name: id
normalize: []
short: Unique ID to describe the event.
type: keyword
event.ingested:
dashed_name: event-ingested
description: 'Timestamp when an event arrived in the central data store.
This is different from `@timestamp`, which is when the event originally occurred. It''s
also different from `event.created`, which is meant to capture the first time
an agent saw the event.
In normal conditions, assuming no tampering, the timestamps should chronologically
look like this: `@timestamp` < `event.created` < `event.ingested`.'
example: '2016-05-23T08:05:35.101Z'
flat_name: event.ingested
level: core
name: ingested
normalize: []
short: Timestamp when an event arrived in the central data store.
type: date
event.outcome:
allowed_values:
- description: Indicates that this event describes a failed result. A common example
is `event.category:file AND event.type:access AND event.outcome:failure` to
indicate that a file access was attempted, but was not successful.
name: failure
- description: Indicates that this event describes a successful result. A common
example is `event.category:file AND event.type:create AND event.outcome:success`
to indicate that a file was successfully created.
name: success
- description: Indicates that this event describes only an attempt for which the
result is unknown from the perspective of the event producer. For example, if
the event contains information only about the request side of a transaction
that results in a response, populating `event.outcome:unknown` in the request
event is appropriate. The unknown value should not be used when an outcome doesn't
make logical sense for the event. In such cases `event.outcome` should not be
populated.
name: unknown
dashed_name: event-outcome
description: 'This is one of four ECS Categorization Fields, and indicates the lowest
level in the ECS category hierarchy.
`event.outcome` simply denotes whether the event represents a success or a failure
from the perspective of the entity that produced the event.
Note that when a single transaction is described in multiple events, each event
may populate different values of `event.outcome`, according to their perspective.
Also note that in the case of a compound event (a single event that contains multiple
logical events), this field should be populated with the value that best captures
the overall success or failure from the perspective of the event producer.
Further note that not all events will have an associated outcome. For example,
this field is generally not populated for metric events, events with `event.type:info`,
or any events for which an outcome does not make logical sense.'
example: success
flat_name: event.outcome
ignore_above: 1024
level: core
name: outcome
normalize: []
short: The outcome of the event. The lowest level categorization field in the hierarchy.
type: keyword
event.start:
dashed_name: event-start
description: '`event.start` contains the date when the event started or when the
activity was first observed.'
flat_name: event.start
level: extended
name: start
normalize: []
short: '`event.start` contains the date when the event started or when the activity
was first observed.'
type: date
event.type:
allowed_values:
- description: The access event type is used for the subset of events within a category
that indicate that something was accessed. Common examples include `event.category:database
AND event.type:access`, or `event.category:file AND event.type:access`. Note
for file access, both directory listings and file opens should be included in
this subcategory. You can further distinguish access operations using the ECS
`event.action` field.
name: access
- description: 'The admin event type is used for the subset of events within a category
that are related to admin objects. For example, administrative changes within
an IAM framework that do not specifically affect a user or group (e.g., adding
new applications to a federation solution or connecting discrete forests in
Active Directory) would fall into this subcategory. Common example: `event.category:iam
AND event.type:change AND event.type:admin`. You can further distinguish admin
operations using the ECS `event.action` field.'
name: admin
- description: The allowed event type is used for the subset of events within a
category that indicate that something was allowed. Common examples include `event.category:network
AND event.type:connection AND event.type:allowed` (to indicate a network firewall
event for which the firewall disposition was to allow the connection to complete)
and `event.category:intrusion_detection AND event.type:allowed` (to indicate
a network intrusion prevention system event for which the IPS disposition was
to allow the connection to complete). You can further distinguish allowed operations
using the ECS `event.action` field, populating with values of your choosing,
such as "allow", "detect", or "pass".
name: allowed
- description: The change event type is used for the subset of events within a category
that indicate that something has changed. If semantics best describe an event
as modified, then include them in this subcategory. Common examples include
`event.category:process AND event.type:change`, and `event.category:file AND
event.type:change`. You can further distinguish change operations using the
ECS `event.action` field.
name: change
- description: Used primarily with `event.category:network` this value is used for
the subset of network traffic that includes sufficient information for the event
to be included in flow or connection analysis. Events in this subcategory will
contain at least source and destination IP addresses, source and destination
TCP/UDP ports, and will usually contain counts of bytes and/or packets transferred.
Events in this subcategory may contain unidirectional or bidirectional information,
including summary information. Use this subcategory to visualize and analyze
network connections. Flow analysis, including Netflow, IPFIX, and other flow-related
events fit in this subcategory. Note that firewall events from many Next-Generation
Firewall (NGFW) devices will also fit into this subcategory. A common filter
for flow/connection information would be `event.category:network AND event.type:connection
AND event.type:end` (to view or analyze all completed network connections, ignoring
mid-flow reports). You can further distinguish connection events using the ECS
`event.action` field, populating with values of your choosing, such as "timeout",
or "reset".
name: connection
- description: The "creation" event type is used for the subset of events within
a category that indicate that something was created. A common example is `event.category:file
AND event.type:creation`.
name: creation
- description: The deletion event type is used for the subset of events within a
category that indicate that something was deleted. A common example is `event.category:file
AND event.type:deletion` to indicate that a file has been deleted.
name: deletion
- description: The denied event type is used for the subset of events within a category
that indicate that something was denied. Common examples include `event.category:network
AND event.type:denied` (to indicate a network firewall event for which the firewall
disposition was to deny the connection) and `event.category:intrusion_detection
AND event.type:denied` (to indicate a network intrusion prevention system event
for which the IPS disposition was to deny the connection to complete). You can
further distinguish denied operations using the ECS `event.action` field, populating
with values of your choosing, such as "blocked", "dropped", or "quarantined".
name: denied
- description: The end event type is used for the subset of events within a category
that indicate something has ended. A common example is `event.category:process
AND event.type:end`.
name: end
- description: The error event type is used for the subset of events within a category
that indicate or describe an error. A common example is `event.category:database
AND event.type:error`. Note that pipeline errors that occur during the event
ingestion process should not use this `event.type` value. Instead, they should
use `event.kind:pipeline_error`.
name: error
- description: 'The group event type is used for the subset of events within a category
that are related to group objects. Common example: `event.category:iam AND event.type:creation
AND event.type:group`. You can further distinguish group operations using the
ECS `event.action` field.'
name: group
- description: 'The indicator event type is used for the subset of events within
a category that contain details about indicators of compromise (IOCs).
A common example is `event.category:threat AND event.type:indicator`.'
name: indicator
- description: The info event type is used for the subset of events within a category
that indicate that they are purely informational, and don't report a state change,
or any type of action. For example, an initial run of a file integrity monitoring
system (FIM), where an agent reports all files under management, would fall
into the "info" subcategory. Similarly, an event containing a dump of all currently
running processes (as opposed to reporting that a process started/ended) would
fall into the "info" subcategory. An additional common examples is `event.category:intrusion_detection
AND event.type:info`.
name: info
- description: The installation event type is used for the subset of events within
a category that indicate that something was installed. A common example is `event.category:package`
AND `event.type:installation`.
name: installation
- description: The protocol event type is used for the subset of events within a
category that indicate that they contain protocol details or analysis, beyond
simply identifying the protocol. Generally, network events that contain specific
protocol details will fall into this subcategory. A common example is `event.category:network
AND event.type:protocol AND event.type:connection AND event.type:end` (to indicate
that the event is a network connection event sent at the end of a connection
that also includes a protocol detail breakdown). Note that events that only
indicate the name or id of the protocol should not use the protocol value. Further
note that when the protocol subcategory is used, the identified protocol is
populated in the ECS `network.protocol` field.
name: protocol
- description: The start event type is used for the subset of events within a category
that indicate something has started. A common example is `event.category:process
AND event.type:start`.
name: start
- description: 'The user event type is used for the subset of events within a category
that are related to user objects. Common example: `event.category:iam AND event.type:deletion
AND event.type:user`. You can further distinguish user operations using the
ECS `event.action` field.'
name: user
dashed_name: event-type
description: 'This is one of four ECS Categorization Fields, and indicates the third
level in the ECS category hierarchy.
`event.type` represents a categorization "sub-bucket" that, when used along with
the `event.category` field values, enables filtering events down to a level appropriate
for single visualization.
This field is an array. This will allow proper categorization of some events that
fall in multiple event types.'
flat_name: event.type
ignore_above: 1024
level: core
name: type
normalize:
- array
short: Event type. The third categorization field in the hierarchy.
type: keyword
host.architecture:
dashed_name: host-architecture
description: Operating system architecture.
example: x86_64
flat_name: host.architecture
ignore_above: 1024
level: core
name: architecture
normalize: []
short: Operating system architecture.
type: keyword
host.domain:
dashed_name: host-domain
description: 'Name of the domain of which the host is a member.
For example, on Windows this could be the host''s Active Directory domain or NetBIOS
domain name. For Linux this could be the domain of the host''s LDAP provider.'
example: CONTOSO
flat_name: host.domain
ignore_above: 1024
level: extended
name: domain
normalize: []
short: Name of the directory the group is a member of.
type: keyword
host.hostname:
dashed_name: host-hostname
description: 'Hostname of the host.
It normally contains what the `hostname` command returns on the host machine.'
flat_name: host.hostname
ignore_above: 1024
level: core
name: hostname
normalize: []
short: Hostname of the host.
type: keyword
host.id:
dashed_name: host-id
description: 'Unique host id.
As hostname is not always unique, use values that are meaningful in your environment.
Example: The current usage of `beat.name`.'
flat_name: host.id
ignore_above: 1024
level: core
name: id
normalize: []
short: Unique host id.
type: keyword
host.ip:
dashed_name: host-ip
description: Host ip addresses.
flat_name: host.ip
level: core
name: ip
normalize:
- array
short: Host ip addresses.
type: ip
host.mac:
dashed_name: host-mac
description: 'Host MAC addresses.
The notation format from RFC 7042 is suggested: Each octet (that is, 8-bit byte)
is represented by two [uppercase] hexadecimal digits giving the value of the octet
as an unsigned integer. Successive octets are separated by a hyphen.'
example: '["00-00-5E-00-53-23", "00-00-5E-00-53-24"]'
flat_name: host.mac
ignore_above: 1024
level: core
name: mac
normalize:
- array
pattern: ^[A-F0-9]{2}(-[A-F0-9]{2}){5,}$
short: Host MAC addresses.
type: keyword
host.name:
dashed_name: host-name
description: 'Name of the host.
It can contain what hostname returns on Unix systems, the fully qualified domain
name (FQDN), or a name specified by the user. The recommended value is the lowercase
FQDN of the host.'
flat_name: host.name
ignore_above: 1024
level: core
name: name
normalize: []
short: Name of the host.
type: keyword
host.os.Ext:
dashed_name: host-os-Ext
description: Object for all custom defined fields to live in.
flat_name: host.os.Ext
level: custom
name: Ext
normalize: []
original_fieldset: os
short: Object for all custom defined fields to live in.
type: object
host.os.Ext.variant:
dashed_name: host-os-Ext-variant
description: A string value or phrase that further aid to classify or qualify the
operating system (OS). For example the distribution for a Linux OS will be entered
in this field.
example: Ubuntu
flat_name: host.os.Ext.variant
ignore_above: 1024
level: custom
name: Ext.variant
normalize: []
original_fieldset: os
short: A string value or phrase that further aid to classify or qualify the operating
system (OS).
type: keyword
host.os.family:
dashed_name: host-os-family
description: OS family (such as redhat, debian, freebsd, windows).
example: debian
flat_name: host.os.family
ignore_above: 1024
level: extended
name: family
normalize: []
original_fieldset: os
short: OS family (such as redhat, debian, freebsd, windows).
type: keyword
host.os.full:
dashed_name: host-os-full
description: Operating system name, including the version or code name.
example: Mac OS Mojave
flat_name: host.os.full
ignore_above: 1024
level: extended
multi_fields:
- flat_name: host.os.full.caseless
ignore_above: 1024
name: caseless
normalizer: lowercase
type: keyword
- flat_name: host.os.full.text
name: text
norms: false
type: text
name: full
normalize: []
original_fieldset: os
short: Operating system name, including the version or code name.
type: keyword
host.os.kernel:
dashed_name: host-os-kernel
description: Operating system kernel version as a raw string.
example: 4.4.0-112-generic
flat_name: host.os.kernel
ignore_above: 1024
level: extended
name: kernel
normalize: []
original_fieldset: os
short: Operating system kernel version as a raw string.
type: keyword
host.os.name:
dashed_name: host-os-name
description: Operating system name, without the version.
example: Mac OS X
flat_name: host.os.name
ignore_above: 1024
level: extended
multi_fields:
- flat_name: host.os.name.caseless
ignore_above: 1024
name: caseless
normalizer: lowercase
type: keyword
- flat_name: host.os.name.text
name: text
norms: false
type: text
name: name
normalize: []
original_fieldset: os
short: Operating system name, without the version.
type: keyword
host.os.platform:
dashed_name: host-os-platform
description: Operating system platform (such centos, ubuntu, windows).
example: darwin
flat_name: host.os.platform
ignore_above: 1024
level: extended
name: platform
normalize: []
original_fieldset: os
short: Operating system platform (such centos, ubuntu, windows).
type: keyword
host.os.type:
dashed_name: host-os-type
description: 'Use the `os.type` field to categorize the operating system into one
of the broad commercial families.
If the OS you''re dealing with is not listed as an expected value, the field should
not be populated. Please let us know by opening an issue with ECS, to propose
its addition.'
example: macos
expected_values:
- linux
- macos
- unix
- windows
- ios
- android
flat_name: host.os.type
ignore_above: 1024
level: extended
name: type
normalize: []
original_fieldset: os
short: 'Which commercial OS family (one of: linux, macos, unix, windows, ios or
android).'
type: keyword
host.os.version:
dashed_name: host-os-version
description: Operating system version as a raw string.
example: 10.14.1
flat_name: host.os.version
ignore_above: 1024
level: extended
name: version
normalize: []
original_fieldset: os
short: Operating system version as a raw string.
type: keyword
host.type:
dashed_name: host-type
description: 'Type of host.
For Cloud providers this can be the machine type like `t2.medium`. If vm, this
could be the container, for example, or other information meaningful in your environment.'
flat_name: host.type
ignore_above: 1024
level: core
name: type
normalize: []
short: Type of host.
type: keyword
host.uptime:
dashed_name: host-uptime
description: Seconds the host has been up.
example: 1325
flat_name: host.uptime
level: extended
name: uptime
normalize: []
short: Seconds the host has been up.
type: long
message:
dashed_name: message
description: 'For log events the message field contains the log message, optimized
for viewing in a log viewer.
For structured logs without an original message field, other fields can be concatenated
to form a human-readable summary of the event.
If multiple messages exist, they can be combined into one message.'
example: Hello World
flat_name: message
level: core
name: message
normalize: []
short: Log message optimized for viewing in a log viewer.
type: match_only_text
network.transport:
dashed_name: network-transport
description: 'Same as network.iana_number, but instead using the Keyword name of
the transport layer (udp, tcp, ipv6-icmp, etc.)
The field value must be normalized to lowercase for querying.'
example: tcp
flat_name: network.transport
ignore_above: 1024
level: core
name: transport
normalize: []
short: Protocol Name corresponding to the field `iana_number`.
type: keyword
network.type:
dashed_name: network-type
description: 'In the OSI Model this would be the Network Layer. ipv4, ipv6, ipsec,
pim, etc
The field value must be normalized to lowercase for querying.'
example: ipv4
flat_name: network.type
ignore_above: 1024
level: core
name: type
normalize: []
short: In the OSI Model this would be the Network Layer. ipv4, ipv6, ipsec, pim,
etc
type: keyword
process.Ext:
dashed_name: process-Ext
description: Object for all custom defined fields to live in.
flat_name: process.Ext
level: custom
name: Ext
normalize: []
short: Object for all custom defined fields to live in.
type: object
process.Ext.ancestry:
dashed_name: process-Ext-ancestry
description: An array of entity_ids indicating the ancestors for this event
flat_name: process.Ext.ancestry
ignore_above: 1024
level: custom
name: Ext.ancestry
normalize: []
short: An array of entity_ids indicating the ancestors for this event
type: keyword
process.Ext.api.behaviors:
dashed_name: process-Ext-api-behaviors
description: "A list of observed behaviors.\n \"cross-process\" - the observed\
\ activity was between two processes\n \"parent-child\" - the observed activity\
\ was between a parent process and its child\n \"native_api\" - a call was made\
\ directly to the Native API rather than the Win32 API\n \"direct_syscall\" -\
\ a syscall instruction originated outside of the Native API layer\n \"proxy_call\"\
\ - the call stack may indicate of a proxied API call to mask the true source\n\
\ \"sensitive_api\" - executable non-image memory is unexpectedly calling a sensitive\
\ API\n \"shellcode\" - suspicious executable non-image memory is calling a sensitive\
\ API\n \"image_hooked\" - an entry in the callstack appears to have been hooked\n\
\ \"image_indirect_call\" - an entry in the callstack was preceded by a call\
\ to a dynamically resolved function\n \"image_rop\" - no call instruction preceded\
\ an entry in the call stack\n \"image_rwx\" - an entry in the callstack is writable\n\
\ \"unbacked_rwx\" - an entry in the callstack is non-image and writable\n \"\
truncated_stack\" - call stack is unexpected truncated due to malicious tampering\
\ or system load\n \"allocate_shellcode\" - a region of non-image executable\
\ memory allocated more executable memory\n \"execute_fluctuation\" - the PAGE_EXECUTE\
\ protection is unexpectedly fluctuating\n \"write_fluctuation\" - the PAGE_WRITE\
\ protection of executable memory is unexpectedly fluctuating\n \"hook_api\"\
\ - a change to the memory protection of a small executable image memory region\
\ was made\n \"hollow_image\" - a change to the memory protection of a large\
\ executable image memory region was made\n \"hook_unbacked\" - a change to the\
\ memory protection of a small executable non-image memory was made\n \"hollow_unbacked\"\
\ - a change to the memory protection of a large executable non-image memory was\
\ made\n \"guarded_code\" - executable memory was unexpectedly marked as PAGE_GUARD\n\
\ \"hidden_code\" - executable memory was unexpectedly marked as PAGE_NOACCESS\n\
\ \"execute_shellcode\" - a region of non-image executable memory was unexpectedly\
\ transferred control\n \"hardware_breakpoint_set\" - a hardware breakpoint was\
\ set\n \"rapid_background_polling\" - a suspicious process which does rapid\
\ input polling via GetAsyncKeyState API was observed\n \"multiple_polling_processes\"\
\ - multiple suspicious processes which do rapid input polling via the GetAsyncKeyState\
\ API were observed\n \"pid_spoofing\" - The acting process details may have\
\ been spoofed to hide the true origin\n \"legacy_api\" - a deprecated or superseded\
\ API was called"
example: '[ "cross-process", "rapid_background_polling", "multiple_polling_processes",
"native_api", "shellcode" ]'
flat_name: process.Ext.api.behaviors
ignore_above: 1024
level: custom
name: behaviors
normalize: []
original_fieldset: api
short: A list of observed behaviors.
type: keyword
process.Ext.api.metadata:
dashed_name: process-Ext-api-metadata
description: Information related to the API call.
flat_name: process.Ext.api.metadata
level: custom
name: metadata
normalize: []
original_fieldset: api
short: Information related to the API call.
type: object
process.Ext.api.metadata.amsi_filenames:
dashed_name: process-Ext-api-metadata-amsi-filenames
description: A list of filenames previously scanned by AMSI.
example: '[ "C:\script.ps1" ]'
flat_name: process.Ext.api.metadata.amsi_filenames
ignore_above: 1024
level: custom
name: metadata.amsi_filenames
normalize: []
original_fieldset: api
short: A list of filenames previously scanned by AMSI.
type: keyword
process.Ext.api.metadata.amsi_logs:
dashed_name: process-Ext-api-metadata-amsi-logs
description: Information related to previous AMSI scans.
flat_name: process.Ext.api.metadata.amsi_logs
level: custom
name: metadata.amsi_logs
normalize: []
original_fieldset: api
short: Information related to previous AMSI scans.
type: object
process.Ext.api.metadata.amsi_logs.entries:
dashed_name: process-Ext-api-metadata-amsi-logs-entries
description: A subset of the AMSI content buffers scanned prior to this event.
example: '[ "[Ref].Assembly.GetType(''System.Management.Automation.AmsiUtils'').GetField(''amsiInitFailed'',
''NonPublic,Static'').SetValue($null, $true);Add-Type -TypeDefinition ''using
System; using System.Runtime.InteropServices; public class Kernel32 { [DllImport("kernel32.dll")] public
static extern IntPtr VirtualAlloc(IntPtr lpAddress, uint dwSize, uint flAllocationType,
uint flProtect);}" ]'
flat_name: process.Ext.api.metadata.amsi_logs.entries
ignore_above: 1024
level: custom
name: metadata.amsi_logs.entries
normalize: []
original_fieldset: api
short: A subset of the AMSI content buffers scanned prior to this event.
type: keyword
process.Ext.api.metadata.amsi_logs.type:
dashed_name: process-Ext-api-metadata-amsi-logs-type
description: The AMSI content type scanned prior to this event.
example: PowerShell
flat_name: process.Ext.api.metadata.amsi_logs.type
ignore_above: 1024
level: custom
name: metadata.amsi_logs.type
normalize: []
original_fieldset: api
short: The AMSI content type scanned prior to this event.
type: keyword
process.Ext.api.metadata.background_callcount:
dashed_name: process-Ext-api-metadata-background-callcount
description: This field indicates a number of all GetAsyncKeyState api calls, including
unsuccessful calls, between the last successful GetAsyncKeyState call.
example: 6021
flat_name: process.Ext.api.metadata.background_callcount
level: custom
name: metadata.background_callcount
normalize: []
original_fieldset: api
short: The number of api calls since the last successful call.
type: unsigned_long
process.Ext.api.metadata.client_is_local:
dashed_name: process-Ext-api-metadata-client-is-local
description: Indicates whether a method was called locally or remotely. It will
be true if called locally, and false if called remotely.
example: 'true'
flat_name: process.Ext.api.metadata.client_is_local
level: custom
name: metadata.client_is_local
normalize: []
original_fieldset: api
short: Indicates whether a method was called locally or from a remote host.
type: boolean
process.Ext.api.metadata.client_machine:
dashed_name: process-Ext-api-metadata-client-machine
description: Client process's machine name (provided by the client and potentially
untrustworthy).
example: DESKTOP-EXAMPLE
flat_name: process.Ext.api.metadata.client_machine
ignore_above: 1024
level: custom
name: metadata.client_machine
normalize: []
original_fieldset: api
short: Client process's machine name (provided by the client and potentially untrustworthy).
type: keyword
process.Ext.api.metadata.client_machine_fqdn:
dashed_name: process-Ext-api-metadata-client-machine-fqdn
description: Client process's machine name FQDN (provided by the client and potentially
untrustworthy).
example: DESKTOP-EXAMPLE.elastic.co
flat_name: process.Ext.api.metadata.client_machine_fqdn
ignore_above: 1024
level: custom
name: metadata.client_machine_fqdn
normalize: []
original_fieldset: api
short: Client process's machine name FQDN (provided by the client and potentially
untrustworthy).
type: keyword
process.Ext.api.metadata.client_process_id:
dashed_name: process-Ext-api-metadata-client-process-id
description: Client process id
example: 3600
flat_name: process.Ext.api.metadata.client_process_id
level: custom
name: metadata.client_process_id
normalize: []
original_fieldset: api
short: Client process id
type: unsigned_long
process.Ext.api.metadata.ms_since_last_keyevent:
dashed_name: process-Ext-api-metadata-ms-since-last-keyevent
description: This field indicates the elapsed time in milliseconds since the last
GetAsyncKeyState event.
example: 94
flat_name: process.Ext.api.metadata.ms_since_last_keyevent
level: custom
name: metadata.ms_since_last_keyevent
normalize: []
original_fieldset: api
short: This field indicates the elapsed time in milliseconds since the last GetAsyncKeyState
event.
type: unsigned_long
process.Ext.api.metadata.procedure_symbol:
dashed_name: process-Ext-api-metadata-procedure-symbol
description: Summary of the hook procedure.
example: taskbar.dll
flat_name: process.Ext.api.metadata.procedure_symbol
ignore_above: 1024
level: custom
name: metadata.procedure_symbol
normalize: []
original_fieldset: api
short: Summary of the hook procedure.
type: keyword
process.Ext.api.metadata.return_value:
dashed_name: process-Ext-api-metadata-return-value
description: Return value of RegisterRawInputDevices API call.
example: 1
flat_name: process.Ext.api.metadata.return_value
level: custom
name: metadata.return_value
normalize: []
original_fieldset: api
short: Return value of RegisterRawInputDevices API call.
type: unsigned_long
process.Ext.api.metadata.security_descriptor:
dashed_name: process-Ext-api-metadata-security-descriptor
description: The security descriptor of the device.
example: O:BAG:SYD:P(A;;FA;;;SY)(A;;FA;;;BA)S:AI(ML;;NW;;;LW)
flat_name: process.Ext.api.metadata.security_descriptor
ignore_above: 1024
level: custom
name: metadata.security_descriptor
normalize: []
original_fieldset: api
short: The security descriptor of the device.
type: keyword
process.Ext.api.metadata.start_address_allocation_protection:
dashed_name: process-Ext-api-metadata-start-address-allocation-protection
description: Memory protection attributes associated with the starting address of
a thread.
example: RCX
flat_name: process.Ext.api.metadata.start_address_allocation_protection
ignore_above: 1024
level: custom
name: metadata.start_address_allocation_protection
normalize: []
original_fieldset: api
short: Memory protection attributes associated with the starting address of a thread.
type: keyword
process.Ext.api.metadata.start_address_module:
dashed_name: process-Ext-api-metadata-start-address-module
description: Name of the module associated with the starting address of a thread.
example: C:\Windows\System32\DellTPad\ApMsgFwd.exe
flat_name: process.Ext.api.metadata.start_address_module
ignore_above: 1024
level: custom
name: metadata.start_address_module
normalize: []
original_fieldset: api
short: Name of the module associated with the starting address of a thread.
type: keyword
process.Ext.api.metadata.target_address_name:
dashed_name: process-Ext-api-metadata-target-address-name
description: The name of the memory region targeted by the API call.
example: Unbacked
flat_name: process.Ext.api.metadata.target_address_name
ignore_above: 1024
level: custom
name: metadata.target_address_name
normalize: []
original_fieldset: api
short: The name of the memory region targeted by the API call.
type: keyword
process.Ext.api.metadata.target_address_path:
dashed_name: process-Ext-api-metadata-target-address-path
description: The path of the memory region targeted by the API call.
example: C:\programdata\example.dll
flat_name: process.Ext.api.metadata.target_address_path
ignore_above: 1024
level: custom
name: metadata.target_address_path
normalize: []
original_fieldset: api
short: The path of the memory region targeted by the API call.
type: keyword
process.Ext.api.metadata.thread_info_flags:
dashed_name: process-Ext-api-metadata-thread-info-flags
description: Thread info flags.
example: 16
flat_name: process.Ext.api.metadata.thread_info_flags
level: custom
name: metadata.thread_info_flags
normalize: []
original_fieldset: api
short: Thread info flags.
type: unsigned_long
process.Ext.api.metadata.visible_windows_count:
dashed_name: process-Ext-api-metadata-visible-windows-count
description: Number of visible windows owned by the caller thread.
example: 0
flat_name: process.Ext.api.metadata.visible_windows_count
level: custom
name: metadata.visible_windows_count
normalize: []
original_fieldset: api
short: Number of visible windows owned by the caller thread.
type: unsigned_long
process.Ext.api.metadata.windows_count:
dashed_name: process-Ext-api-metadata-windows-count
description: Number of windows owned by the caller thread.
example: 2
flat_name: process.Ext.api.metadata.windows_count
level: custom
name: metadata.windows_count
normalize: []
original_fieldset: api
short: Number of windows owned by the caller thread.
type: unsigned_long
process.Ext.api.name:
dashed_name: process-Ext-api-name
description: The name of the API, usually the name of the function or system call.
example: VirtualAlloc
flat_name: process.Ext.api.name
ignore_above: 1024
level: custom
name: name
normalize: []
original_fieldset: api
short: The name of the API, usually the name of the function or system call.
type: keyword
process.Ext.api.parameters:
dashed_name: process-Ext-api-parameters
description: Parameter values passed to the API call.
flat_name: process.Ext.api.parameters
level: custom
name: parameters
normalize: []
original_fieldset: api
short: Parameter values passed to the API call.
type: object
process.Ext.api.parameters.address:
dashed_name: process-Ext-api-parameters-address
description: The target memory address.
example: 2431737462784
flat_name: process.Ext.api.parameters.address
level: custom
name: parameters.address
normalize: []
original_fieldset: api
short: The target memory address.
type: unsigned_long
process.Ext.api.parameters.allocation_type:
dashed_name: process-Ext-api-parameters-allocation-type
description: The type of memory allocation. Corresponds to `MEMORY_BASIC_INFORMATION.State`
example: COMMIT|RESERVE
flat_name: process.Ext.api.parameters.allocation_type
ignore_above: 1024
level: custom
name: parameters.allocation_type
normalize: []
original_fieldset: api
short: The type of memory allocation. Corresponds to `MEMORY_BASIC_INFORMATION.State`
type: keyword
process.Ext.api.parameters.app_name:
dashed_name: process-Ext-api-parameters-app-name
description: The application name requesting the AMSI scan.
example: PowerShell
flat_name: process.Ext.api.parameters.app_name
ignore_above: 1024
level: custom
name: parameters.app_name
normalize: []
original_fieldset: api
short: The application name requesting the AMSI scan.
type: keyword
process.Ext.api.parameters.argument1:
dashed_name: process-Ext-api-parameters-argument1
description: The first argument to the procedure.
example: 1
flat_name: process.Ext.api.parameters.argument1
level: custom
name: parameters.argument1
normalize: []
original_fieldset: api
short: The first argument to the procedure.
type: unsigned_long
process.Ext.api.parameters.argument2:
dashed_name: process-Ext-api-parameters-argument2
description: The second argument to the procedure.
example: 2
flat_name: process.Ext.api.parameters.argument2
level: custom
name: parameters.argument2
normalize: []
original_fieldset: api
short: The second argument to the procedure.
type: unsigned_long
process.Ext.api.parameters.argument3:
dashed_name: process-Ext-api-parameters-argument3
description: The third argument to the procedure.
example: 3
flat_name: process.Ext.api.parameters.argument3
level: custom
name: parameters.argument3
normalize: []
original_fieldset: api
short: The third argument to the procedure.
type: unsigned_long
process.Ext.api.parameters.buffer:
dashed_name: process-Ext-api-parameters-buffer
description: The content associated with an AMSI scan.
example: '[Ref].Assembly.GetType(''System.Management.Automation.AmsiUtils'').GetField(''amsiInitFailed'',
''NonPublic,Static'').SetValue($null, $true);Add-Type -TypeDefinition ''using
System; using System.Runtime.InteropServices; public class Kernel32 { [DllImport("kernel32.dll")] public
static extern IntPtr VirtualAlloc(IntPtr lpAddress, uint dwSize, uint flAllocationType,
uint flProtect);}''; [Kernel32]::VirtualAlloc([IntPtr]::Zero, 0x1234, 0x1000,
0x20);'
flat_name: process.Ext.api.parameters.buffer
ignore_above: 1024
level: custom
name: parameters.buffer
normalize: []
original_fieldset: api
short: The content associated with an AMSI scan.
type: keyword
process.Ext.api.parameters.consumer_details:
dashed_name: process-Ext-api-parameters-consumer-details
description: Provides specific information about an event consumer, including its
configuration, such as the command it executes, associated SID, and the consumer's
name.
flat_name: process.Ext.api.parameters.consumer_details
ignore_above: 1024
level: custom
name: parameters.consumer_details
normalize: []
original_fieldset: api
short: WMI Event consumer details.
type: keyword
process.Ext.api.parameters.consumer_name:
dashed_name: process-Ext-api-parameters-consumer-name
description: Consumer Name. Consumers specify what should happen when the conditions
in the Event Filter are triggered.
example: ExampleConsumer
flat_name: process.Ext.api.parameters.consumer_name
ignore_above: 1024
level: custom
name: parameters.consumer_name
normalize: []
original_fieldset: api
short: Consumer Name. Consumers specify what should happen when the conditions in
the Event Filter are triggered.
type: keyword
process.Ext.api.parameters.consumer_type:
dashed_name: process-Ext-api-parameters-consumer-type
description: "An example list of consumer type.\n \"ActiveScriptEventConsumer\"\
\ - Executes a predefined script in an arbitrary scripting language when an event\
\ is delivered to it.\n \"CommandLineEventConsumer\" - Launches an arbitrary\
\ process in the local system context when an event is delivered to it.\n \"\
LogFileEventConsumer\" - Writes customized strings to a text log file when events\
\ are delivered to it.\n \"NTEventLogEventConsumer\" - Logs a specific message\
\ to the Windows event log when an event is delivered to it.\n \"SMTPEventConsumer\"\
\ - Sends an email message using SMTP each time an event is delivered to it."
example: CommandLineEventConsumer
flat_name: process.Ext.api.parameters.consumer_type
ignore_above: 1024
level: custom
name: parameters.consumer_type
normalize: []
original_fieldset: api
short: WMI event consumer type.
type: keyword
process.Ext.api.parameters.content_name:
dashed_name: process-Ext-api-parameters-content-name
description: The content name, typically a filename, associated with an AMSI scan.
example: C:\script.ps1
flat_name: process.Ext.api.parameters.content_name
ignore_above: 1024
level: custom
name: parameters.content_name
normalize: []
original_fieldset: api
short: The content name, typically a filename, associated with an AMSI scan.
type: keyword
process.Ext.api.parameters.context_flags:
dashed_name: process-Ext-api-parameters-context-flags
description: The bitmask of CPU registers operated on by this call. Corresponds
to `CONTEXT.ContextFlags`
example: 1048607
flat_name: process.Ext.api.parameters.context_flags
level: custom
name: parameters.context_flags
normalize: []
original_fieldset: api
short: The bitmask of CPU registers operated on by this call. Corresponds to `CONTEXT.ContextFlags`
type: unsigned_long
process.Ext.api.parameters.desired_access:
dashed_name: process-Ext-api-parameters-desired-access
description: This parameter indicates the string value of the `DesiredAccess` field to
`OpenProcess` or `OpenThread`.
flat_name: process.Ext.api.parameters.desired_access
ignore_above: 1024
level: custom
name: parameters.desired_access
normalize: []
original_fieldset: api
short: This parameter indicates the string value of the `DesiredAccess` field to
`OpenProcess` or `OpenThread`.
type: keyword
process.Ext.api.parameters.desired_access_numeric:
dashed_name: process-Ext-api-parameters-desired-access-numeric
description: This parameter indicates the numeric value of the `DesiredAccess` field
passed to `OpenProcess` or `OpenThread`.
flat_name: process.Ext.api.parameters.desired_access_numeric
level: custom
name: parameters.desired_access_numeric
normalize: []
original_fieldset: api
short: This parameter indicates the numeric value of the `DesiredAccess` field passed
to `OpenProcess` or `OpenThread`.
type: long
process.Ext.api.parameters.device:
dashed_name: process-Ext-api-parameters-device
description: The name of the device object.
example: \Device\NPCAP
flat_name: process.Ext.api.parameters.device
ignore_above: 1024
level: custom
name: parameters.device
normalize: []
original_fieldset: api
short: The name of the device object.
type: keyword
process.Ext.api.parameters.driver:
dashed_name: process-Ext-api-parameters-driver
description: The name of the driver object.
example: \Driver\npcap
flat_name: process.Ext.api.parameters.driver
ignore_above: 1024
level: custom
name: parameters.driver
normalize: []
original_fieldset: api
short: The name of the driver object.
type: keyword
process.Ext.api.parameters.eax:
dashed_name: process-Ext-api-parameters-eax
description: The x86 EAX general purpose register. Return value in __cdecl, __stdcall,
__thiscall and __fastcall.
example: 0
flat_name: process.Ext.api.parameters.eax
level: custom
name: parameters.eax
normalize: []
original_fieldset: api
short: The x86 EAX general purpose register. Return value in __cdecl, __stdcall,
__thiscall and __fastcall.
type: unsigned_long
process.Ext.api.parameters.ebp:
dashed_name: process-Ext-api-parameters-ebp
description: The x86 EBP frame pointer register.
example: 15006644
flat_name: process.Ext.api.parameters.ebp
level: custom
name: parameters.ebp
normalize: []
original_fieldset: api
short: The x86 EBP frame pointer register.
type: unsigned_long
process.Ext.api.parameters.ebx:
dashed_name: process-Ext-api-parameters-ebx
description: The x86 EBX general purpose register.
example: 0
flat_name: process.Ext.api.parameters.ebx
level: custom
name: parameters.ebx
normalize: []
original_fieldset: api
short: The x86 EBX general purpose register.
type: unsigned_long
process.Ext.api.parameters.ecx:
dashed_name: process-Ext-api-parameters-ecx
description: The x86 ECX general purpose register. First argument in __fastcall
and __thiscall.
example: 0
flat_name: process.Ext.api.parameters.ecx
level: custom
name: parameters.ecx
normalize: []
original_fieldset: api
short: The x86 ECX general purpose register. First argument in __fastcall and __thiscall.
type: unsigned_long
process.Ext.api.parameters.edi:
dashed_name: process-Ext-api-parameters-edi
description: The x86 EDI general purpose register.
example: 0
flat_name: process.Ext.api.parameters.edi
level: custom
name: parameters.edi
normalize: []
original_fieldset: api
short: The x86 EDI general purpose register.
type: unsigned_long
process.Ext.api.parameters.edx:
dashed_name: process-Ext-api-parameters-edx
description: The x86 EDX general purpose register. Second argument in a __fastcall.
example: 0
flat_name: process.Ext.api.parameters.edx
level: custom
name: parameters.edx
normalize: []
original_fieldset: api
short: The x86 EDX general purpose register. Second argument in a __fastcall.
type: unsigned_long
process.Ext.api.parameters.eip:
dashed_name: process-Ext-api-parameters-eip
description: The x86 EIP instruction pointer register.
example: 1472790528
flat_name: process.Ext.api.parameters.eip
level: custom
name: parameters.eip
normalize: []
original_fieldset: api
short: The x86 EIP instruction pointer register.
type: unsigned_long
process.Ext.api.parameters.esi:
dashed_name: process-Ext-api-parameters-esi
description: The x86 ESI general purpose register.
example: 0
flat_name: process.Ext.api.parameters.esi
level: custom
name: parameters.esi
normalize: []
original_fieldset: api
short: The x86 ESI general purpose register.
type: unsigned_long
process.Ext.api.parameters.esp:
dashed_name: process-Ext-api-parameters-esp
description: The x86 ESP stack pointer register.
example: 15007744
flat_name: process.Ext.api.parameters.esp
level: custom
name: parameters.esp
normalize: []
original_fieldset: api
short: The x86 ESP stack pointer register.
type: unsigned_long
process.Ext.api.parameters.event_filter_details:
dashed_name: process-Ext-api-parameters-event-filter-details
description: Provide an overview of the query that define when an event should be
triggered.
flat_name: process.Ext.api.parameters.event_filter_details
ignore_above: 1024
level: custom
name: parameters.event_filter_details
normalize: []
original_fieldset: api
short: Provide an overview of the query that define when an event should be triggered.
type: keyword
process.Ext.api.parameters.event_filter_name:
dashed_name: process-Ext-api-parameters-event-filter-name
description: Event filter name. An event filter is a WMI class that defines which
events WMI delivers to a consumer.
example: ExampleFilter
flat_name: process.Ext.api.parameters.event_filter_name
ignore_above: 1024
level: custom
name: parameters.event_filter_name
normalize: []
original_fieldset: api
short: Event filter name. An event filter is a WMI class that defines which events
WMI delivers to a consumer.
type: keyword
process.Ext.api.parameters.flags:
dashed_name: process-Ext-api-parameters-flags
description: Mode flag that specifies how to interpret the information provided
by UsagePage and Usage. Third member RAWINPUTDEVICE structure.
example: INPUTSINK
flat_name: process.Ext.api.parameters.flags
ignore_above: 1024
level: custom
name: parameters.flags
normalize: []
original_fieldset: api
short: Mode flag that specifies how to interpret the information provided by UsagePage
and Usage.
type: keyword
process.Ext.api.parameters.handle_type:
dashed_name: process-Ext-api-parameters-handle-type
description: This parameter indicates whether the detected access was attempt against
a process or a thread.
example: process
flat_name: process.Ext.api.parameters.handle_type
ignore_above: 1024
level: custom
name: parameters.handle_type
normalize: []
original_fieldset: api
short: This parameter indicates whether the detected access was attempt against
a process or a thread.
type: keyword
process.Ext.api.parameters.hook_module:
dashed_name: process-Ext-api-parameters-hook-module
description: DLL containing the hook procedure.
example: c:\windows\system32\taskbar.dll
flat_name: process.Ext.api.parameters.hook_module
ignore_above: 1024
level: custom
name: parameters.hook_module
normalize: []
original_fieldset: api
short: DLL containing the hook procedure.
type: keyword
process.Ext.api.parameters.hook_type:
dashed_name: process-Ext-api-parameters-hook-type
description: Type of hook procedure to be installed.
example: WH_KEYBOARD_LL
flat_name: process.Ext.api.parameters.hook_type
ignore_above: 1024
level: custom
name: parameters.hook_type
normalize: []
original_fieldset: api
short: Type of hook procedure to be installed.
type: keyword
process.Ext.api.parameters.io_control_code:
dashed_name: process-Ext-api-parameters-io-control-code
description: The I/O control code for the requested device operation.
example: 27365
flat_name: process.Ext.api.parameters.io_control_code
level: custom
name: parameters.io_control_code
normalize: []
original_fieldset: api
short: The I/O control code for the requested device operation.
type: unsigned_long
process.Ext.api.parameters.namespace:
dashed_name: process-Ext-api-parameters-namespace
description: WMI namespace to which the connection is made.
example: root\Microsoft\Windows\DeviceGuard
flat_name: process.Ext.api.parameters.namespace
ignore_above: 1024
level: custom
name: parameters.namespace
normalize: []
original_fieldset: api
short: WMI namespace to which the connection is made.
type: keyword
process.Ext.api.parameters.operation:
dashed_name: process-Ext-api-parameters-operation
description: Specifies the connection or request to WMI
example: Win32_Process::Create
flat_name: process.Ext.api.parameters.operation
ignore_above: 1024
level: custom
name: parameters.operation
normalize: []
original_fieldset: api
short: Specifies the connection or request to WMI
type: keyword
process.Ext.api.parameters.procedure:
dashed_name: process-Ext-api-parameters-procedure
description: The memory address of the procedure or function.
example: 2431737462784
flat_name: process.Ext.api.parameters.procedure
level: custom
name: parameters.procedure
normalize: []
original_fieldset: api
short: The memory address of the procedure or function.
type: unsigned_long
process.Ext.api.parameters.protection:
dashed_name: process-Ext-api-parameters-protection
description: The memory protection for the region of pages. Corresponds to `MEMORY_BASIC_INFORMATION.Protect`
example: RWX|GUARD
flat_name: process.Ext.api.parameters.protection
ignore_above: 1024
level: custom
name: parameters.protection
normalize: []
original_fieldset: api
short: The memory protection for the region of pages. Corresponds to `MEMORY_BASIC_INFORMATION.Protect`
type: keyword
process.Ext.api.parameters.protection_old:
dashed_name: process-Ext-api-parameters-protection-old
description: The previous memory protection returned by the API call. Corresponds
to `MEMORY_BASIC_INFORMATION.Protect`
example: RCX
flat_name: process.Ext.api.parameters.protection_old
ignore_above: 1024
level: custom
name: parameters.protection_old
normalize: []
original_fieldset: api
short: The previous memory protection returned by the API call. Corresponds to `MEMORY_BASIC_INFORMATION.Protect`
type: keyword
process.Ext.api.parameters.r8:
dashed_name: process-Ext-api-parameters-r8
description: The x64 R8 general purpose register. Third argument in a __fastcall.
example: 3
flat_name: process.Ext.api.parameters.r8
level: custom
name: parameters.r8
normalize: []
original_fieldset: api
short: The x64 R8 general purpose register. Third argument in a __fastcall.
type: unsigned_long
process.Ext.api.parameters.r9:
dashed_name: process-Ext-api-parameters-r9
description: The x64 R9 general purpose register. Fourth argument in a __fastcall.
example: 4
flat_name: process.Ext.api.parameters.r9
level: custom
name: parameters.r9
normalize: []
original_fieldset: api
short: The x64 R9 general purpose register. Fourth argument in a __fastcall.
type: unsigned_long
process.Ext.api.parameters.rax:
dashed_name: process-Ext-api-parameters-rax
description: The x64 RAX general purpose register. Return value in a __fastcall.
example: 0
flat_name: process.Ext.api.parameters.rax
level: custom
name: parameters.rax
normalize: []
original_fieldset: api
short: The x64 RAX general purpose register. Return value in a __fastcall.
type: unsigned_long
process.Ext.api.parameters.rbp:
dashed_name: process-Ext-api-parameters-rbp
description: The x64 RBP general purpose register.
example: 0
flat_name: process.Ext.api.parameters.rbp
level: custom
name: parameters.rbp
normalize: []
original_fieldset: api
short: The x64 RBP general purpose register.
type: unsigned_long
process.Ext.api.parameters.rbx:
dashed_name: process-Ext-api-parameters-rbx
description: The x64 RBX general purpose register.
example: 0
flat_name: process.Ext.api.parameters.rbx
ignore_above: 1024
level: custom
name: parameters.rbx
normalize: []
original_fieldset: api
short: The x64 RBX general purpose register.
type: keyword
process.Ext.api.parameters.rcx:
dashed_name: process-Ext-api-parameters-rcx
description: The x64 RCX general purpose register. First argument in a __fastcall.
example: 1
flat_name: process.Ext.api.parameters.rcx
level: custom
name: parameters.rcx
normalize: []
original_fieldset: api
short: The x64 RCX general purpose register. First argument in a __fastcall.
type: unsigned_long
process.Ext.api.parameters.rdi:
dashed_name: process-Ext-api-parameters-rdi
description: The x64 RDI general purpose register.
example: 0
flat_name: process.Ext.api.parameters.rdi
level: custom
name: parameters.rdi
normalize: []
original_fieldset: api
short: The x64 RDI general purpose register.
type: unsigned_long
process.Ext.api.parameters.rdx:
dashed_name: process-Ext-api-parameters-rdx
description: The x64 RDX general purpose register. Second argument in a __fastcall.
example: 2
flat_name: process.Ext.api.parameters.rdx
level: custom
name: parameters.rdx
normalize: []
original_fieldset: api
short: The x64 RDX general purpose register. Second argument in a __fastcall.
type: unsigned_long
process.Ext.api.parameters.rip:
dashed_name: process-Ext-api-parameters-rip
description: The x64 RIP instruction pointer register.
example: 140706153693184
flat_name: process.Ext.api.parameters.rip
level: custom
name: parameters.rip
normalize: []
original_fieldset: api
short: The x64 RIP instruction pointer register.
type: unsigned_long
process.Ext.api.parameters.rsi:
dashed_name: process-Ext-api-parameters-rsi
description: The x64 RSI general purpose register.
example: 0
flat_name: process.Ext.api.parameters.rsi
ignore_above: 1024
level: custom
name: parameters.rsi
normalize: []
original_fieldset: api
short: The x64 RSI general purpose register.
type: keyword
process.Ext.api.parameters.rsp:
dashed_name: process-Ext-api-parameters-rsp
description: The x64 RSP stack pointer register.
example: 2431737462784
flat_name: process.Ext.api.parameters.rsp
level: custom
name: parameters.rsp
normalize: []
original_fieldset: api
short: The x64 RSP stack pointer register.
type: unsigned_long
process.Ext.api.parameters.size:
dashed_name: process-Ext-api-parameters-size
description: The size.
example: 4096
flat_name: process.Ext.api.parameters.size
level: custom
name: parameters.size
normalize: []
original_fieldset: api
short: The size.
type: unsigned_long
process.Ext.api.parameters.usage:
dashed_name: process-Ext-api-parameters-usage
description: This parameter indicates the specific device (Usage) within the Usage
Page. Second member RAWINPUTDEVICE structure.
example: KEYBOARD
flat_name: process.Ext.api.parameters.usage
ignore_above: 1024
level: custom
name: parameters.usage
normalize: []
original_fieldset: api
short: This parameter indicates the specific device (Usage) within the Usage Page.
Second member RAWINPUTDEVICE structure.
type: keyword
process.Ext.api.parameters.usage_page:
dashed_name: process-Ext-api-parameters-usage-page
description: This parameter indicates the top-level collection (Usage Page) of the
device. First member RAWINPUTDEVICE structure.
example: GENERIC
flat_name: process.Ext.api.parameters.usage_page
ignore_above: 1024
level: custom
name: parameters.usage_page
normalize: []
original_fieldset: api
short: This parameter indicates the top-level collection (Usage Page) of the device.
First member RAWINPUTDEVICE structure.
type: keyword
process.Ext.api.summary:
dashed_name: process-Ext-api-summary
description: The summary of the API call and its parameters.
example: VirtualAllocEx( file.exe, NULL, 0x42000, COMMIT|RESERVE, RWX )
flat_name: process.Ext.api.summary
ignore_above: 1024
level: custom
name: summary
normalize: []
original_fieldset: api
short: The summary of the API call and its parameters.
type: keyword
process.Ext.code_signature:
dashed_name: process-Ext-code-signature
description: Nested version of ECS code_signature fieldset.
flat_name: process.Ext.code_signature
level: custom
name: Ext.code_signature
normalize: []
short: Nested version of ECS code_signature fieldset.
type: nested
process.Ext.code_signature.exists:
dashed_name: process-Ext-code-signature-exists
description: Boolean to capture if a signature is present.
example: 'true'
flat_name: process.Ext.code_signature.exists
level: custom
name: Ext.code_signature.exists
normalize: []
short: Boolean to capture if a signature is present.
type: boolean
process.Ext.code_signature.status:
dashed_name: process-Ext-code-signature-status
description: 'Additional information about the certificate status.
This is useful for logging cryptographic errors with the certificate validity
or trust status. Leave unpopulated if the validity or trust of the certificate
was unchecked.'
example: ERROR_UNTRUSTED_ROOT
flat_name: process.Ext.code_signature.status
ignore_above: 1024
level: custom
name: Ext.code_signature.status
normalize: []
short: Additional information about the certificate status.
type: keyword
process.Ext.code_signature.subject_name:
dashed_name: process-Ext-code-signature-subject-name
description: Subject name of the code signer
example: Microsoft Corporation
flat_name: process.Ext.code_signature.subject_name
ignore_above: 1024
level: custom
name: Ext.code_signature.subject_name
normalize: []
short: Subject name of the code signer
type: keyword
process.Ext.code_signature.trusted:
dashed_name: process-Ext-code-signature-trusted
description: 'Stores the trust status of the certificate chain.
Validating the trust of the certificate chain may be complicated, and this field
should only be populated by tools that actively check the status.'
example: 'true'
flat_name: process.Ext.code_signature.trusted
level: custom
name: Ext.code_signature.trusted
normalize: []
short: Stores the trust status of the certificate chain.
type: boolean
process.Ext.created_suspended:
dashed_name: process-Ext-created-suspended
description: A heuristic indicating if the CREATE_SUSPENDED flag was passed to the
Win32 CreateProcess API. Not valid for direct syscalls.
example: 'true'
flat_name: process.Ext.created_suspended
level: custom
name: Ext.created_suspended
normalize: []
short: A heuristic indicating if the CREATE_SUSPENDED flag was passed to the Win32
CreateProcess API.
type: boolean
process.Ext.memory_region.allocation_base:
dashed_name: process-Ext-memory-region-allocation-base
description: Base address of the memory allocation containing the memory region.
example: 2431737462784
flat_name: process.Ext.memory_region.allocation_base
level: custom
name: allocation_base
normalize: []
original_fieldset: memory_region
short: Base address of the memory allocation containing the memory region.
type: unsigned_long
process.Ext.memory_region.allocation_protection:
dashed_name: process-Ext-memory-region-allocation-protection
description: Original memory protection requested when the memory was allocated.
Example values include "RWX" and "R-X".
example: RWX
flat_name: process.Ext.memory_region.allocation_protection
ignore_above: 1024
level: custom
name: allocation_protection
normalize: []
original_fieldset: memory_region
short: Original memory protection requested when the memory was allocated. Example
values include "RWX" and "R-X".
type: keyword
process.Ext.memory_region.allocation_size:
dashed_name: process-Ext-memory-region-allocation-size
description: Original memory size requested when the memory was allocated.
example: 4096
flat_name: process.Ext.memory_region.allocation_size
level: custom
name: allocation_size
normalize: []
original_fieldset: memory_region
short: Original memory size requested when the memory was allocated.
type: unsigned_long
process.Ext.memory_region.allocation_type:
dashed_name: process-Ext-memory-region-allocation-type
description: The memory allocation type. Example values include "IMAGE", "MAPPED",
and "PRIVATE".
example: PRIVATE
flat_name: process.Ext.memory_region.allocation_type
ignore_above: 1024
level: custom
name: allocation_type
normalize: []
original_fieldset: memory_region
short: The memory allocation type. Example values include "IMAGE", "MAPPED", and
"PRIVATE".
type: keyword
process.Ext.memory_region.bytes_address:
dashed_name: process-Ext-memory-region-bytes-address
description: The address where bytes_compressed begins.
example: 2431737462784
flat_name: process.Ext.memory_region.bytes_address
level: custom
name: bytes_address
normalize: []
original_fieldset: memory_region
short: The address where bytes_compressed begins.
type: unsigned_long
process.Ext.memory_region.bytes_allocation_offset:
dashed_name: process-Ext-memory-region-bytes-allocation-offset
description: Offset of bytes_address the memory allocation. Equal to bytes_address
- allocation_base.
example: 0
flat_name: process.Ext.memory_region.bytes_allocation_offset
level: custom
name: bytes_allocation_offset
normalize: []
original_fieldset: memory_region
short: Offset of bytes_address the memory allocation. Equal to bytes_address - allocation_base.
type: unsigned_long
process.Ext.memory_region.bytes_compressed:
dashed_name: process-Ext-memory-region-bytes-compressed
description: Up to 4MB of raw data from the memory allocation. This is compressed
with zlib.To reduce data volume, this is de-duplicated on the endpoint, and may
be missing from many alerts if the same data would be sent multiple times.
doc_values: false
example: eJzzSM3JyVcIzy/KSVEEABxJBD4=
flat_name: process.Ext.memory_region.bytes_compressed
index: false
level: custom
name: bytes_compressed
normalize: []
original_fieldset: memory_region
short: Up to 4MB of raw data from the memory allocation.
type: keyword
process.Ext.memory_region.bytes_compressed_present:
dashed_name: process-Ext-memory-region-bytes-compressed-present
description: Whether bytes_compressed is present in this event.
example: false
flat_name: process.Ext.memory_region.bytes_compressed_present
level: custom
name: bytes_compressed_present
normalize: []
original_fieldset: memory_region
short: Whether bytes_compressed is present in this event.
type: boolean
process.Ext.memory_region.hash.sha256:
dashed_name: process-Ext-memory-region-hash-sha256
description: The sha256 of the memory region.
example: d25ff1e6c6460a7f9de39198d182058c1712726008d187e1953b83abe977e4a0
flat_name: process.Ext.memory_region.hash.sha256
ignore_above: 1024
level: custom
name: hash.sha256
normalize: []
original_fieldset: memory_region
short: The sha256 of the memory region.
type: keyword
process.Ext.memory_region.malware_signature.all_names:
dashed_name: process-Ext-memory-region-malware-signature-all-names
description: A sequence of signature names matched.
example: Windows.EICAR.Not-a-virus
flat_name: process.Ext.memory_region.malware_signature.all_names
ignore_above: 1024
level: custom
name: all_names
normalize: []
original_fieldset: malware_signature
short: A sequence of signature names matched.
type: keyword
process.Ext.memory_region.malware_signature.identifier:
dashed_name: process-Ext-memory-region-malware-signature-identifier
description: malware signature identifier
flat_name: process.Ext.memory_region.malware_signature.identifier
ignore_above: 1024
level: custom
name: identifier
normalize: []
original_fieldset: malware_signature
short: malware signature identifier
type: keyword
process.Ext.memory_region.malware_signature.primary:
dashed_name: process-Ext-memory-region-malware-signature-primary
description: The first matching details.
flat_name: process.Ext.memory_region.malware_signature.primary
level: custom
name: primary
normalize: []
original_fieldset: malware_signature
short: The first matching details.
type: object
process.Ext.memory_region.malware_signature.primary.matches:
dashed_name: process-Ext-memory-region-malware-signature-primary-matches
description: The first matching details.
doc_values: false
flat_name: process.Ext.memory_region.malware_signature.primary.matches
index: false
level: custom
name: primary.matches
normalize: []
original_fieldset: malware_signature
short: The first matching details.
type: keyword
process.Ext.memory_region.malware_signature.primary.signature.hash:
dashed_name: process-Ext-memory-region-malware-signature-primary-signature-hash
description: hash of file matching signature.
flat_name: process.Ext.memory_region.malware_signature.primary.signature.hash
level: custom
name: primary.signature.hash
normalize: []
original_fieldset: malware_signature
short: hash of file matching signature.
type: nested
process.Ext.memory_region.malware_signature.primary.signature.hash.sha256:
dashed_name: process-Ext-memory-region-malware-signature-primary-signature-hash-sha256
description: sha256 hash of file matching signature.
flat_name: process.Ext.memory_region.malware_signature.primary.signature.hash.sha256
ignore_above: 1024
level: custom
name: primary.signature.hash.sha256
normalize: []
original_fieldset: malware_signature
short: sha256 hash of file matching signature.
type: keyword
process.Ext.memory_region.malware_signature.primary.signature.id:
dashed_name: process-Ext-memory-region-malware-signature-primary-signature-id
description: The id of the first yara rule matched.
flat_name: process.Ext.memory_region.malware_signature.primary.signature.id
ignore_above: 1024
level: custom
name: primary.signature.id
normalize: []
original_fieldset: malware_signature
short: The id of the first yara rule matched.
type: keyword
process.Ext.memory_region.malware_signature.primary.signature.name:
dashed_name: process-Ext-memory-region-malware-signature-primary-signature-name
description: The name of the first yara rule matched.
flat_name: process.Ext.memory_region.malware_signature.primary.signature.name
ignore_above: 1024
level: custom
name: primary.signature.name
normalize: []
original_fieldset: malware_signature
short: The name of the first yara rule matched.
type: keyword
process.Ext.memory_region.malware_signature.secondary:
dashed_name: process-Ext-memory-region-malware-signature-secondary
description: Additional matching details if available.
enabled: false
flat_name: process.Ext.memory_region.malware_signature.secondary
level: custom
name: secondary
normalize: []
original_fieldset: malware_signature
short: Additional matching details if available.
type: nested
process.Ext.memory_region.malware_signature.secondary.matches:
dashed_name: process-Ext-memory-region-malware-signature-secondary-matches
description: The second matching details.
enabled: false
flat_name: process.Ext.memory_region.malware_signature.secondary.matches
ignore_above: 1024
level: custom
name: secondary.matches
normalize: []
original_fieldset: malware_signature
short: The second matching details.
type: keyword
process.Ext.memory_region.malware_signature.secondary.signature.hash:
dashed_name: process-Ext-memory-region-malware-signature-secondary-signature-hash
description: hash of second file matching signature.
enabled: false
flat_name: process.Ext.memory_region.malware_signature.secondary.signature.hash
level: custom
name: secondary.signature.hash
normalize: []
original_fieldset: malware_signature
short: hash of second file matching signature.
type: nested
process.Ext.memory_region.malware_signature.secondary.signature.hash.sha256:
dashed_name: process-Ext-memory-region-malware-signature-secondary-signature-hash-sha256
description: sha256 hash of second file matching signature.
enabled: false
flat_name: process.Ext.memory_region.malware_signature.secondary.signature.hash.sha256
ignore_above: 1024
level: custom
name: secondary.signature.hash.sha256
normalize: []
original_fieldset: malware_signature
short: sha256 hash of second file matching signature.
type: keyword
process.Ext.memory_region.malware_signature.secondary.signature.id:
dashed_name: process-Ext-memory-region-malware-signature-secondary-signature-id
description: The id of the second yara rule matched.
enabled: false
flat_name: process.Ext.memory_region.malware_signature.secondary.signature.id
ignore_above: 1024
level: custom
name: secondary.signature.id
normalize: []
original_fieldset: malware_signature
short: The id of the second yara rule matched.
type: keyword
process.Ext.memory_region.malware_signature.secondary.signature.name:
dashed_name: process-Ext-memory-region-malware-signature-secondary-signature-name
description: The name of the second yara rule matched.
enabled: false
flat_name: process.Ext.memory_region.malware_signature.secondary.signature.name
ignore_above: 1024
level: custom
name: secondary.signature.name
normalize: []
original_fieldset: malware_signature
short: The name of the second yara rule matched.
type: keyword
process.Ext.memory_region.malware_signature.version:
dashed_name: process-Ext-memory-region-malware-signature-version
description: malware signature version
flat_name: process.Ext.memory_region.malware_signature.version
ignore_above: 1024
level: custom
name: version
normalize: []
original_fieldset: malware_signature
short: malware signature version
type: keyword
process.Ext.memory_region.mapped_path:
dashed_name: process-Ext-memory-region-mapped-path
description: If the memory corresponds to a file mapping, this is the file's path.
example: C:\Windows\System32\mshtml.dll
flat_name: process.Ext.memory_region.mapped_path
ignore_above: 1024
level: custom
name: mapped_path
normalize: []
original_fieldset: memory_region
short: If the memory corresponds to a file mapping, this is the file's path.
type: keyword
process.Ext.memory_region.mapped_pe.Ext.dotnet:
dashed_name: process-Ext-memory-region-mapped-pe-Ext-dotnet
description: Whether this file is a .NET PE
example: 'true'
flat_name: process.Ext.memory_region.mapped_pe.Ext.dotnet
level: custom
name: Ext.dotnet
normalize: []
original_fieldset: pe
short: Whether this file is a .NET PE
type: boolean
process.Ext.memory_region.mapped_pe.Ext.sections:
dashed_name: process-Ext-memory-region-mapped-pe-Ext-sections
description: The file's relevant sections, if it is a PE
flat_name: process.Ext.memory_region.mapped_pe.Ext.sections
level: custom
name: Ext.sections
normalize: []
original_fieldset: pe
short: The file's sections, if it is a PE
type: object
process.Ext.memory_region.mapped_pe.Ext.sections.hash.md5:
dashed_name: process-Ext-memory-region-mapped-pe-Ext-sections-hash-md5
description: MD5 hash.
flat_name: process.Ext.memory_region.mapped_pe.Ext.sections.hash.md5
ignore_above: 1024
level: extended
name: md5
normalize: []
original_fieldset: hash
short: MD5 hash.
type: keyword
process.Ext.memory_region.mapped_pe.Ext.sections.hash.sha1:
dashed_name: process-Ext-memory-region-mapped-pe-Ext-sections-hash-sha1
description: SHA1 hash.
flat_name: process.Ext.memory_region.mapped_pe.Ext.sections.hash.sha1
ignore_above: 1024
level: extended
name: sha1
normalize: []
original_fieldset: hash
short: SHA1 hash.
type: keyword
process.Ext.memory_region.mapped_pe.Ext.sections.hash.sha256:
dashed_name: process-Ext-memory-region-mapped-pe-Ext-sections-hash-sha256
description: SHA256 hash.
flat_name: process.Ext.memory_region.mapped_pe.Ext.sections.hash.sha256
ignore_above: 1024
level: extended
name: sha256
normalize: []
original_fieldset: hash
short: SHA256 hash.
type: keyword
process.Ext.memory_region.mapped_pe.Ext.sections.hash.sha384:
dashed_name: process-Ext-memory-region-mapped-pe-Ext-sections-hash-sha384
description: SHA384 hash.
flat_name: process.Ext.memory_region.mapped_pe.Ext.sections.hash.sha384
ignore_above: 1024
level: extended
name: sha384
normalize: []
original_fieldset: hash
short: SHA384 hash.
type: keyword
process.Ext.memory_region.mapped_pe.Ext.sections.hash.sha512:
dashed_name: process-Ext-memory-region-mapped-pe-Ext-sections-hash-sha512
description: SHA512 hash.
flat_name: process.Ext.memory_region.mapped_pe.Ext.sections.hash.sha512
ignore_above: 1024
level: extended
name: sha512
normalize: []
original_fieldset: hash
short: SHA512 hash.
type: keyword
process.Ext.memory_region.mapped_pe.Ext.sections.hash.ssdeep:
dashed_name: process-Ext-memory-region-mapped-pe-Ext-sections-hash-ssdeep
description: SSDEEP hash.
flat_name: process.Ext.memory_region.mapped_pe.Ext.sections.hash.ssdeep
ignore_above: 1024
level: extended
name: ssdeep
normalize: []
original_fieldset: hash
short: SSDEEP hash.
type: keyword
process.Ext.memory_region.mapped_pe.Ext.sections.hash.tlsh:
dashed_name: process-Ext-memory-region-mapped-pe-Ext-sections-hash-tlsh
description: TLSH hash.
flat_name: process.Ext.memory_region.mapped_pe.Ext.sections.hash.tlsh
ignore_above: 1024
level: extended
name: tlsh
normalize: []
original_fieldset: hash
short: TLSH hash.
type: keyword
process.Ext.memory_region.mapped_pe.Ext.sections.name:
dashed_name: process-Ext-memory-region-mapped-pe-Ext-sections-name
description: The section's name
example: .reloc
flat_name: process.Ext.memory_region.mapped_pe.Ext.sections.name
ignore_above: 1024
level: custom
name: Ext.sections.name
normalize: []
original_fieldset: pe
short: The section's name
type: keyword
process.Ext.memory_region.mapped_pe.Ext.streams:
dashed_name: process-Ext-memory-region-mapped-pe-Ext-streams
description: The file's streams, if it is a PE
flat_name: process.Ext.memory_region.mapped_pe.Ext.streams
level: custom
name: Ext.streams
normalize: []
original_fieldset: pe
short: The file's streams, if it is a PE
type: object
process.Ext.memory_region.mapped_pe.Ext.streams.hash.md5:
dashed_name: process-Ext-memory-region-mapped-pe-Ext-streams-hash-md5
description: MD5 hash.
flat_name: process.Ext.memory_region.mapped_pe.Ext.streams.hash.md5
ignore_above: 1024
level: extended
name: md5
normalize: []
original_fieldset: hash
short: MD5 hash.
type: keyword
process.Ext.memory_region.mapped_pe.Ext.streams.hash.sha1:
dashed_name: process-Ext-memory-region-mapped-pe-Ext-streams-hash-sha1
description: SHA1 hash.
flat_name: process.Ext.memory_region.mapped_pe.Ext.streams.hash.sha1
ignore_above: 1024
level: extended
name: sha1
normalize: []
original_fieldset: hash
short: SHA1 hash.
type: keyword
process.Ext.memory_region.mapped_pe.Ext.streams.hash.sha256:
dashed_name: process-Ext-memory-region-mapped-pe-Ext-streams-hash-sha256
description: SHA256 hash.
flat_name: process.Ext.memory_region.mapped_pe.Ext.streams.hash.sha256
ignore_above: 1024
level: extended
name: sha256
normalize: []
original_fieldset: hash
short: SHA256 hash.
type: keyword
process.Ext.memory_region.mapped_pe.Ext.streams.hash.sha384:
dashed_name: process-Ext-memory-region-mapped-pe-Ext-streams-hash-sha384
description: SHA384 hash.
flat_name: process.Ext.memory_region.mapped_pe.Ext.streams.hash.sha384
ignore_above: 1024
level: extended
name: sha384
normalize: []
original_fieldset: hash
short: SHA384 hash.
type: keyword
process.Ext.memory_region.mapped_pe.Ext.streams.hash.sha512:
dashed_name: process-Ext-memory-region-mapped-pe-Ext-streams-hash-sha512
description: SHA512 hash.
flat_name: process.Ext.memory_region.mapped_pe.Ext.streams.hash.sha512
ignore_above: 1024
level: extended
name: sha512
normalize: []
original_fieldset: hash
short: SHA512 hash.
type: keyword
process.Ext.memory_region.mapped_pe.Ext.streams.hash.ssdeep:
dashed_name: process-Ext-memory-region-mapped-pe-Ext-streams-hash-ssdeep
description: SSDEEP hash.
flat_name: process.Ext.memory_region.mapped_pe.Ext.streams.hash.ssdeep
ignore_above: 1024
level: extended
name: ssdeep
normalize: []
original_fieldset: hash
short: SSDEEP hash.
type: keyword
process.Ext.memory_region.mapped_pe.Ext.streams.hash.tlsh:
dashed_name: process-Ext-memory-region-mapped-pe-Ext-streams-hash-tlsh
description: TLSH hash.
flat_name: process.Ext.memory_region.mapped_pe.Ext.streams.hash.tlsh
ignore_above: 1024
level: extended
name: tlsh
normalize: []
original_fieldset: hash
short: TLSH hash.
type: keyword
process.Ext.memory_region.mapped_pe.Ext.streams.name:
dashed_name: process-Ext-memory-region-mapped-pe-Ext-streams-name
description: The stream's name
example: .reloc
flat_name: process.Ext.memory_region.mapped_pe.Ext.streams.name
ignore_above: 1024
level: custom
name: Ext.streams.name
normalize: []
original_fieldset: pe
short: The stream's name
type: keyword
process.Ext.memory_region.mapped_pe.architecture:
dashed_name: process-Ext-memory-region-mapped-pe-architecture
description: CPU architecture target for the file.
example: x64
flat_name: process.Ext.memory_region.mapped_pe.architecture
ignore_above: 1024
level: extended
name: architecture
normalize: []
original_fieldset: pe
short: CPU architecture target for the file.
type: keyword
process.Ext.memory_region.mapped_pe.company:
dashed_name: process-Ext-memory-region-mapped-pe-company
description: Internal company name of the file, provided at compile-time.
example: Microsoft Corporation
flat_name: process.Ext.memory_region.mapped_pe.company
ignore_above: 1024
level: extended
name: company
normalize: []
original_fieldset: pe
short: Internal company name of the file, provided at compile-time.
type: keyword
process.Ext.memory_region.mapped_pe.description:
dashed_name: process-Ext-memory-region-mapped-pe-description
description: Internal description of the file, provided at compile-time.
example: Paint
flat_name: process.Ext.memory_region.mapped_pe.description
ignore_above: 1024
level: extended
name: description
normalize: []
original_fieldset: pe
short: Internal description of the file, provided at compile-time.
type: keyword
process.Ext.memory_region.mapped_pe.file_version:
dashed_name: process-Ext-memory-region-mapped-pe-file-version
description: Internal version of the file, provided at compile-time.
example: 6.3.9600.17415
flat_name: process.Ext.memory_region.mapped_pe.file_version
ignore_above: 1024
level: extended
name: file_version
normalize: []
original_fieldset: pe
short: Process name.
type: keyword
process.Ext.memory_region.mapped_pe.go_import_hash:
dashed_name: process-Ext-memory-region-mapped-pe-go-import-hash
description: 'A hash of the Go language imports in a PE file excluding standard
library imports. An import hash can be used to fingerprint binaries even after
recompilation or other code-level transformations have occurred, which would change
more traditional hash values.
The algorithm used to calculate the Go symbol hash and a reference implementation
are available [here](https://github.com/elastic/toutoumomoma).'
example: 10bddcb4cee42080f76c88d9ff964491
flat_name: process.Ext.memory_region.mapped_pe.go_import_hash
ignore_above: 1024
level: extended
name: go_import_hash
normalize: []
original_fieldset: pe
short: A hash of the Go language imports in a PE file.
type: keyword
process.Ext.memory_region.mapped_pe.go_imports:
dashed_name: process-Ext-memory-region-mapped-pe-go-imports
description: List of imported Go language element names and types.
flat_name: process.Ext.memory_region.mapped_pe.go_imports
level: extended
name: go_imports
normalize: []
original_fieldset: pe
short: List of imported Go language element names and types.
type: flattened
process.Ext.memory_region.mapped_pe.go_imports_names_entropy:
dashed_name: process-Ext-memory-region-mapped-pe-go-imports-names-entropy
description: Shannon entropy calculation from the list of Go imports.
flat_name: process.Ext.memory_region.mapped_pe.go_imports_names_entropy
format: number
level: extended
name: go_imports_names_entropy
normalize: []
original_fieldset: pe
short: Shannon entropy calculation from the list of Go imports.
type: long
process.Ext.memory_region.mapped_pe.go_imports_names_var_entropy:
dashed_name: process-Ext-memory-region-mapped-pe-go-imports-names-var-entropy
description: Variance for Shannon entropy calculation from the list of Go imports.
flat_name: process.Ext.memory_region.mapped_pe.go_imports_names_var_entropy
format: number
level: extended
name: go_imports_names_var_entropy
normalize: []
original_fieldset: pe
short: Variance for Shannon entropy calculation from the list of Go imports.
type: long
process.Ext.memory_region.mapped_pe.go_stripped:
dashed_name: process-Ext-memory-region-mapped-pe-go-stripped
description: Set to true if the file is a Go executable that has had its symbols
stripped or obfuscated and false if an unobfuscated Go executable.
flat_name: process.Ext.memory_region.mapped_pe.go_stripped
level: extended
name: go_stripped
normalize: []
original_fieldset: pe
short: Whether the file is a stripped or obfuscated Go executable.
type: boolean
process.Ext.memory_region.mapped_pe.imphash:
dashed_name: process-Ext-memory-region-mapped-pe-imphash
description: 'A hash of the imports in a PE file. An imphash -- or import hash --
can be used to fingerprint binaries even after recompilation or other code-level
transformations have occurred, which would change more traditional hash values.
Learn more at https://www.fireeye.com/blog/threat-research/2014/01/tracking-malware-import-hashing.html.'
example: 0c6803c4e922103c4dca5963aad36ddf
flat_name: process.Ext.memory_region.mapped_pe.imphash
ignore_above: 1024
level: extended
name: imphash
normalize: []
original_fieldset: pe
short: A hash of the imports in a PE file.
type: keyword
process.Ext.memory_region.mapped_pe.import_hash:
dashed_name: process-Ext-memory-region-mapped-pe-import-hash
description: 'A hash of the imports in a PE file. An import hash can be used to
fingerprint binaries even after recompilation or other code-level transformations
have occurred, which would change more traditional hash values.
This is a synonym for imphash.'
example: d41d8cd98f00b204e9800998ecf8427e
flat_name: process.Ext.memory_region.mapped_pe.import_hash
ignore_above: 1024
level: extended
name: import_hash
normalize: []
original_fieldset: pe
short: A hash of the imports in a PE file.
type: keyword
process.Ext.memory_region.mapped_pe.imports:
dashed_name: process-Ext-memory-region-mapped-pe-imports
description: List of imported element names and types.
flat_name: process.Ext.memory_region.mapped_pe.imports
level: extended
name: imports
normalize:
- array
original_fieldset: pe
short: List of imported element names and types.
type: flattened
process.Ext.memory_region.mapped_pe.imports_names_entropy:
dashed_name: process-Ext-memory-region-mapped-pe-imports-names-entropy
description: Shannon entropy calculation from the list of imported element names
and types.
flat_name: process.Ext.memory_region.mapped_pe.imports_names_entropy
format: number
level: extended
name: imports_names_entropy
normalize: []
original_fieldset: pe
short: Shannon entropy calculation from the list of imported element names and types.
type: long
process.Ext.memory_region.mapped_pe.imports_names_var_entropy:
dashed_name: process-Ext-memory-region-mapped-pe-imports-names-var-entropy
description: Variance for Shannon entropy calculation from the list of imported
element names and types.
flat_name: process.Ext.memory_region.mapped_pe.imports_names_var_entropy
format: number
level: extended
name: imports_names_var_entropy
normalize: []
original_fieldset: pe
short: Variance for Shannon entropy calculation from the list of imported element
names and types.
type: long
process.Ext.memory_region.mapped_pe.original_file_name:
dashed_name: process-Ext-memory-region-mapped-pe-original-file-name
description: Internal name of the file, provided at compile-time.
example: MSPAINT.EXE
flat_name: process.Ext.memory_region.mapped_pe.original_file_name
ignore_above: 1024
level: extended
name: original_file_name
normalize: []
original_fieldset: pe
short: Internal name of the file, provided at compile-time.
type: keyword
process.Ext.memory_region.mapped_pe.pehash:
dashed_name: process-Ext-memory-region-mapped-pe-pehash
description: 'A hash of the PE header and data from one or more PE sections. An
pehash can be used to cluster files by transforming structural information about
a file into a hash value.
Learn more at https://www.usenix.org/legacy/events/leet09/tech/full_papers/wicherski/wicherski_html/index.html.'
example: 73ff189b63cd6be375a7ff25179a38d347651975
flat_name: process.Ext.memory_region.mapped_pe.pehash
ignore_above: 1024
level: extended
name: pehash
normalize: []
original_fieldset: pe
short: A hash of the PE header and data from one or more PE sections.
type: keyword
process.Ext.memory_region.mapped_pe.product:
dashed_name: process-Ext-memory-region-mapped-pe-product
description: Internal product name of the file, provided at compile-time.
example: "Microsoft\xAE Windows\xAE Operating System"
flat_name: process.Ext.memory_region.mapped_pe.product
ignore_above: 1024
level: extended
name: product
normalize: []
original_fieldset: pe
short: Internal product name of the file, provided at compile-time.
type: keyword
process.Ext.memory_region.mapped_pe.sections:
dashed_name: process-Ext-memory-region-mapped-pe-sections
description: 'An array containing an object for each section of the PE file.
The keys that should be present in these objects are defined by sub-fields underneath
`pe.sections.*`.'
flat_name: process.Ext.memory_region.mapped_pe.sections
level: extended
name: sections
normalize:
- array
original_fieldset: pe
short: Section information of the PE file.
type: nested
process.Ext.memory_region.mapped_pe.sections.entropy:
dashed_name: process-Ext-memory-region-mapped-pe-sections-entropy
description: Shannon entropy calculation from the section.
flat_name: process.Ext.memory_region.mapped_pe.sections.entropy
format: number
level: extended
name: sections.entropy
normalize: []
original_fieldset: pe
short: Shannon entropy calculation from the section.
type: long
process.Ext.memory_region.mapped_pe.sections.name:
dashed_name: process-Ext-memory-region-mapped-pe-sections-name
description: PE Section List name.
flat_name: process.Ext.memory_region.mapped_pe.sections.name
ignore_above: 1024
level: extended
name: sections.name
normalize: []
original_fieldset: pe
short: PE Section List name.
type: keyword
process.Ext.memory_region.mapped_pe.sections.physical_size:
dashed_name: process-Ext-memory-region-mapped-pe-sections-physical-size
description: PE Section List physical size.
flat_name: process.Ext.memory_region.mapped_pe.sections.physical_size
format: bytes
level: extended
name: sections.physical_size
normalize: []
original_fieldset: pe
short: PE Section List physical size.
type: long
process.Ext.memory_region.mapped_pe.sections.var_entropy:
dashed_name: process-Ext-memory-region-mapped-pe-sections-var-entropy
description: Variance for Shannon entropy calculation from the section.
flat_name: process.Ext.memory_region.mapped_pe.sections.var_entropy
format: number
level: extended
name: sections.var_entropy
normalize: []
original_fieldset: pe
short: Variance for Shannon entropy calculation from the section.
type: long
process.Ext.memory_region.mapped_pe.sections.virtual_size:
dashed_name: process-Ext-memory-region-mapped-pe-sections-virtual-size
description: PE Section List virtual size. This is always the same as `physical_size`.
flat_name: process.Ext.memory_region.mapped_pe.sections.virtual_size
format: string
level: extended
name: sections.virtual_size
normalize: []
original_fieldset: pe
short: PE Section List virtual size. This is always the same as `physical_size`.
type: long
process.Ext.memory_region.mapped_pe_detected:
dashed_name: process-Ext-memory-region-mapped-pe-detected
description: Whether the file at mapped_path is an executable.
example: false
flat_name: process.Ext.memory_region.mapped_pe_detected
level: custom
name: mapped_pe_detected
normalize: []
original_fieldset: memory_region
short: Whether the file at mapped_path is an executable.
type: boolean
process.Ext.memory_region.memory_pe.Ext.dotnet:
dashed_name: process-Ext-memory-region-memory-pe-Ext-dotnet
description: Whether this file is a .NET PE
example: 'true'
flat_name: process.Ext.memory_region.memory_pe.Ext.dotnet
level: custom
name: Ext.dotnet
normalize: []
original_fieldset: pe
short: Whether this file is a .NET PE
type: boolean
process.Ext.memory_region.memory_pe.Ext.sections:
dashed_name: process-Ext-memory-region-memory-pe-Ext-sections
description: The file's relevant sections, if it is a PE
flat_name: process.Ext.memory_region.memory_pe.Ext.sections
level: custom
name: Ext.sections
normalize: []
original_fieldset: pe
short: The file's sections, if it is a PE
type: object
process.Ext.memory_region.memory_pe.Ext.sections.hash.md5:
dashed_name: process-Ext-memory-region-memory-pe-Ext-sections-hash-md5
description: MD5 hash.
flat_name: process.Ext.memory_region.memory_pe.Ext.sections.hash.md5
ignore_above: 1024
level: extended
name: md5
normalize: []
original_fieldset: hash
short: MD5 hash.
type: keyword
process.Ext.memory_region.memory_pe.Ext.sections.hash.sha1:
dashed_name: process-Ext-memory-region-memory-pe-Ext-sections-hash-sha1
description: SHA1 hash.
flat_name: process.Ext.memory_region.memory_pe.Ext.sections.hash.sha1
ignore_above: 1024
level: extended
name: sha1
normalize: []
original_fieldset: hash
short: SHA1 hash.
type: keyword
process.Ext.memory_region.memory_pe.Ext.sections.hash.sha256:
dashed_name: process-Ext-memory-region-memory-pe-Ext-sections-hash-sha256
description: SHA256 hash.
flat_name: process.Ext.memory_region.memory_pe.Ext.sections.hash.sha256
ignore_above: 1024
level: extended
name: sha256
normalize: []
original_fieldset: hash
short: SHA256 hash.
type: keyword
process.Ext.memory_region.memory_pe.Ext.sections.hash.sha384:
dashed_name: process-Ext-memory-region-memory-pe-Ext-sections-hash-sha384
description: SHA384 hash.
flat_name: process.Ext.memory_region.memory_pe.Ext.sections.hash.sha384
ignore_above: 1024
level: extended
name: sha384
normalize: []
original_fieldset: hash
short: SHA384 hash.
type: keyword
process.Ext.memory_region.memory_pe.Ext.sections.hash.sha512:
dashed_name: process-Ext-memory-region-memory-pe-Ext-sections-hash-sha512
description: SHA512 hash.
flat_name: process.Ext.memory_region.memory_pe.Ext.sections.hash.sha512
ignore_above: 1024
level: extended
name: sha512
normalize: []
original_fieldset: hash
short: SHA512 hash.
type: keyword
process.Ext.memory_region.memory_pe.Ext.sections.hash.ssdeep:
dashed_name: process-Ext-memory-region-memory-pe-Ext-sections-hash-ssdeep
description: SSDEEP hash.
flat_name: process.Ext.memory_region.memory_pe.Ext.sections.hash.ssdeep
ignore_above: 1024
level: extended
name: ssdeep
normalize: []
original_fieldset: hash
short: SSDEEP hash.
type: keyword
process.Ext.memory_region.memory_pe.Ext.sections.hash.tlsh:
dashed_name: process-Ext-memory-region-memory-pe-Ext-sections-hash-tlsh
description: TLSH hash.
flat_name: process.Ext.memory_region.memory_pe.Ext.sections.hash.tlsh
ignore_above: 1024
level: extended
name: tlsh
normalize: []
original_fieldset: hash
short: TLSH hash.
type: keyword
process.Ext.memory_region.memory_pe.Ext.sections.name:
dashed_name: process-Ext-memory-region-memory-pe-Ext-sections-name
description: The section's name
example: .reloc
flat_name: process.Ext.memory_region.memory_pe.Ext.sections.name
ignore_above: 1024
level: custom
name: Ext.sections.name
normalize: []
original_fieldset: pe
short: The section's name
type: keyword
process.Ext.memory_region.memory_pe.Ext.streams:
dashed_name: process-Ext-memory-region-memory-pe-Ext-streams
description: The file's streams, if it is a PE
flat_name: process.Ext.memory_region.memory_pe.Ext.streams
level: custom
name: Ext.streams
normalize: []
original_fieldset: pe
short: The file's streams, if it is a PE
type: object
process.Ext.memory_region.memory_pe.Ext.streams.hash.md5:
dashed_name: process-Ext-memory-region-memory-pe-Ext-streams-hash-md5
description: MD5 hash.
flat_name: process.Ext.memory_region.memory_pe.Ext.streams.hash.md5
ignore_above: 1024
level: extended
name: md5
normalize: []
original_fieldset: hash
short: MD5 hash.
type: keyword
process.Ext.memory_region.memory_pe.Ext.streams.hash.sha1:
dashed_name: process-Ext-memory-region-memory-pe-Ext-streams-hash-sha1
description: SHA1 hash.
flat_name: process.Ext.memory_region.memory_pe.Ext.streams.hash.sha1
ignore_above: 1024
level: extended
name: sha1
normalize: []
original_fieldset: hash
short: SHA1 hash.
type: keyword
process.Ext.memory_region.memory_pe.Ext.streams.hash.sha256:
dashed_name: process-Ext-memory-region-memory-pe-Ext-streams-hash-sha256
description: SHA256 hash.
flat_name: process.Ext.memory_region.memory_pe.Ext.streams.hash.sha256
ignore_above: 1024
level: extended
name: sha256
normalize: []
original_fieldset: hash
short: SHA256 hash.
type: keyword
process.Ext.memory_region.memory_pe.Ext.streams.hash.sha384:
dashed_name: process-Ext-memory-region-memory-pe-Ext-streams-hash-sha384
description: SHA384 hash.
flat_name: process.Ext.memory_region.memory_pe.Ext.streams.hash.sha384
ignore_above: 1024
level: extended
name: sha384
normalize: []
original_fieldset: hash
short: SHA384 hash.
type: keyword
process.Ext.memory_region.memory_pe.Ext.streams.hash.sha512:
dashed_name: process-Ext-memory-region-memory-pe-Ext-streams-hash-sha512
description: SHA512 hash.
flat_name: process.Ext.memory_region.memory_pe.Ext.streams.hash.sha512
ignore_above: 1024
level: extended
name: sha512
normalize: []
original_fieldset: hash
short: SHA512 hash.
type: keyword
process.Ext.memory_region.memory_pe.Ext.streams.hash.ssdeep:
dashed_name: process-Ext-memory-region-memory-pe-Ext-streams-hash-ssdeep
description: SSDEEP hash.
flat_name: process.Ext.memory_region.memory_pe.Ext.streams.hash.ssdeep
ignore_above: 1024
level: extended
name: ssdeep
normalize: []
original_fieldset: hash
short: SSDEEP hash.
type: keyword
process.Ext.memory_region.memory_pe.Ext.streams.hash.tlsh:
dashed_name: process-Ext-memory-region-memory-pe-Ext-streams-hash-tlsh
description: TLSH hash.
flat_name: process.Ext.memory_region.memory_pe.Ext.streams.hash.tlsh
ignore_above: 1024
level: extended
name: tlsh
normalize: []
original_fieldset: hash
short: TLSH hash.
type: keyword
process.Ext.memory_region.memory_pe.Ext.streams.name:
dashed_name: process-Ext-memory-region-memory-pe-Ext-streams-name
description: The stream's name
example: .reloc
flat_name: process.Ext.memory_region.memory_pe.Ext.streams.name
ignore_above: 1024
level: custom
name: Ext.streams.name
normalize: []
original_fieldset: pe
short: The stream's name
type: keyword
process.Ext.memory_region.memory_pe.architecture:
dashed_name: process-Ext-memory-region-memory-pe-architecture
description: CPU architecture target for the file.
example: x64
flat_name: process.Ext.memory_region.memory_pe.architecture
ignore_above: 1024
level: extended
name: architecture
normalize: []
original_fieldset: pe
short: CPU architecture target for the file.
type: keyword
process.Ext.memory_region.memory_pe.company:
dashed_name: process-Ext-memory-region-memory-pe-company
description: Internal company name of the file, provided at compile-time.
example: Microsoft Corporation
flat_name: process.Ext.memory_region.memory_pe.company
ignore_above: 1024
level: extended
name: company
normalize: []
original_fieldset: pe
short: Internal company name of the file, provided at compile-time.
type: keyword
process.Ext.memory_region.memory_pe.description:
dashed_name: process-Ext-memory-region-memory-pe-description
description: Internal description of the file, provided at compile-time.
example: Paint
flat_name: process.Ext.memory_region.memory_pe.description
ignore_above: 1024
level: extended
name: description
normalize: []
original_fieldset: pe
short: Internal description of the file, provided at compile-time.
type: keyword
process.Ext.memory_region.memory_pe.file_version:
dashed_name: process-Ext-memory-region-memory-pe-file-version
description: Internal version of the file, provided at compile-time.
example: 6.3.9600.17415
flat_name: process.Ext.memory_region.memory_pe.file_version
ignore_above: 1024
level: extended
name: file_version
normalize: []
original_fieldset: pe
short: Process name.
type: keyword
process.Ext.memory_region.memory_pe.go_import_hash:
dashed_name: process-Ext-memory-region-memory-pe-go-import-hash
description: 'A hash of the Go language imports in a PE file excluding standard
library imports. An import hash can be used to fingerprint binaries even after
recompilation or other code-level transformations have occurred, which would change
more traditional hash values.
The algorithm used to calculate the Go symbol hash and a reference implementation
are available [here](https://github.com/elastic/toutoumomoma).'
example: 10bddcb4cee42080f76c88d9ff964491
flat_name: process.Ext.memory_region.memory_pe.go_import_hash
ignore_above: 1024
level: extended
name: go_import_hash
normalize: []
original_fieldset: pe
short: A hash of the Go language imports in a PE file.
type: keyword
process.Ext.memory_region.memory_pe.go_imports:
dashed_name: process-Ext-memory-region-memory-pe-go-imports
description: List of imported Go language element names and types.
flat_name: process.Ext.memory_region.memory_pe.go_imports
level: extended
name: go_imports
normalize: []
original_fieldset: pe
short: List of imported Go language element names and types.
type: flattened
process.Ext.memory_region.memory_pe.go_imports_names_entropy:
dashed_name: process-Ext-memory-region-memory-pe-go-imports-names-entropy
description: Shannon entropy calculation from the list of Go imports.
flat_name: process.Ext.memory_region.memory_pe.go_imports_names_entropy
format: number
level: extended
name: go_imports_names_entropy
normalize: []
original_fieldset: pe
short: Shannon entropy calculation from the list of Go imports.
type: long
process.Ext.memory_region.memory_pe.go_imports_names_var_entropy:
dashed_name: process-Ext-memory-region-memory-pe-go-imports-names-var-entropy
description: Variance for Shannon entropy calculation from the list of Go imports.
flat_name: process.Ext.memory_region.memory_pe.go_imports_names_var_entropy
format: number
level: extended
name: go_imports_names_var_entropy
normalize: []
original_fieldset: pe
short: Variance for Shannon entropy calculation from the list of Go imports.
type: long
process.Ext.memory_region.memory_pe.go_stripped:
dashed_name: process-Ext-memory-region-memory-pe-go-stripped
description: Set to true if the file is a Go executable that has had its symbols
stripped or obfuscated and false if an unobfuscated Go executable.
flat_name: process.Ext.memory_region.memory_pe.go_stripped
level: extended
name: go_stripped
normalize: []
original_fieldset: pe
short: Whether the file is a stripped or obfuscated Go executable.
type: boolean
process.Ext.memory_region.memory_pe.imphash:
dashed_name: process-Ext-memory-region-memory-pe-imphash
description: 'A hash of the imports in a PE file. An imphash -- or import hash --
can be used to fingerprint binaries even after recompilation or other code-level
transformations have occurred, which would change more traditional hash values.
Learn more at https://www.fireeye.com/blog/threat-research/2014/01/tracking-malware-import-hashing.html.'
example: 0c6803c4e922103c4dca5963aad36ddf
flat_name: process.Ext.memory_region.memory_pe.imphash
ignore_above: 1024
level: extended
name: imphash
normalize: []
original_fieldset: pe
short: A hash of the imports in a PE file.
type: keyword
process.Ext.memory_region.memory_pe.import_hash:
dashed_name: process-Ext-memory-region-memory-pe-import-hash
description: 'A hash of the imports in a PE file. An import hash can be used to
fingerprint binaries even after recompilation or other code-level transformations
have occurred, which would change more traditional hash values.
This is a synonym for imphash.'
example: d41d8cd98f00b204e9800998ecf8427e
flat_name: process.Ext.memory_region.memory_pe.import_hash
ignore_above: 1024
level: extended
name: import_hash
normalize: []
original_fieldset: pe
short: A hash of the imports in a PE file.
type: keyword
process.Ext.memory_region.memory_pe.imports:
dashed_name: process-Ext-memory-region-memory-pe-imports
description: List of imported element names and types.
flat_name: process.Ext.memory_region.memory_pe.imports
level: extended
name: imports
normalize:
- array
original_fieldset: pe
short: List of imported element names and types.
type: flattened
process.Ext.memory_region.memory_pe.imports_names_entropy:
dashed_name: process-Ext-memory-region-memory-pe-imports-names-entropy
description: Shannon entropy calculation from the list of imported element names
and types.
flat_name: process.Ext.memory_region.memory_pe.imports_names_entropy
format: number
level: extended
name: imports_names_entropy
normalize: []
original_fieldset: pe
short: Shannon entropy calculation from the list of imported element names and types.
type: long
process.Ext.memory_region.memory_pe.imports_names_var_entropy:
dashed_name: process-Ext-memory-region-memory-pe-imports-names-var-entropy
description: Variance for Shannon entropy calculation from the list of imported
element names and types.
flat_name: process.Ext.memory_region.memory_pe.imports_names_var_entropy
format: number
level: extended
name: imports_names_var_entropy
normalize: []
original_fieldset: pe
short: Variance for Shannon entropy calculation from the list of imported element
names and types.
type: long
process.Ext.memory_region.memory_pe.original_file_name:
dashed_name: process-Ext-memory-region-memory-pe-original-file-name
description: Internal name of the file, provided at compile-time.
example: MSPAINT.EXE
flat_name: process.Ext.memory_region.memory_pe.original_file_name
ignore_above: 1024
level: extended
name: original_file_name
normalize: []
original_fieldset: pe
short: Internal name of the file, provided at compile-time.
type: keyword
process.Ext.memory_region.memory_pe.pehash:
dashed_name: process-Ext-memory-region-memory-pe-pehash
description: 'A hash of the PE header and data from one or more PE sections. An
pehash can be used to cluster files by transforming structural information about
a file into a hash value.
Learn more at https://www.usenix.org/legacy/events/leet09/tech/full_papers/wicherski/wicherski_html/index.html.'
example: 73ff189b63cd6be375a7ff25179a38d347651975
flat_name: process.Ext.memory_region.memory_pe.pehash
ignore_above: 1024
level: extended
name: pehash
normalize: []
original_fieldset: pe
short: A hash of the PE header and data from one or more PE sections.
type: keyword
process.Ext.memory_region.memory_pe.product:
dashed_name: process-Ext-memory-region-memory-pe-product
description: Internal product name of the file, provided at compile-time.
example: "Microsoft\xAE Windows\xAE Operating System"
flat_name: process.Ext.memory_region.memory_pe.product
ignore_above: 1024
level: extended
name: product
normalize: []
original_fieldset: pe
short: Internal product name of the file, provided at compile-time.
type: keyword
process.Ext.memory_region.memory_pe.sections:
dashed_name: process-Ext-memory-region-memory-pe-sections
description: 'An array containing an object for each section of the PE file.
The keys that should be present in these objects are defined by sub-fields underneath
`pe.sections.*`.'
flat_name: process.Ext.memory_region.memory_pe.sections
level: extended
name: sections
normalize:
- array
original_fieldset: pe
short: Section information of the PE file.
type: nested
process.Ext.memory_region.memory_pe.sections.entropy:
dashed_name: process-Ext-memory-region-memory-pe-sections-entropy
description: Shannon entropy calculation from the section.
flat_name: process.Ext.memory_region.memory_pe.sections.entropy
format: number
level: extended
name: sections.entropy
normalize: []
original_fieldset: pe
short: Shannon entropy calculation from the section.
type: long
process.Ext.memory_region.memory_pe.sections.name:
dashed_name: process-Ext-memory-region-memory-pe-sections-name
description: PE Section List name.
flat_name: process.Ext.memory_region.memory_pe.sections.name
ignore_above: 1024
level: extended
name: sections.name
normalize: []
original_fieldset: pe
short: PE Section List name.
type: keyword
process.Ext.memory_region.memory_pe.sections.physical_size:
dashed_name: process-Ext-memory-region-memory-pe-sections-physical-size
description: PE Section List physical size.
flat_name: process.Ext.memory_region.memory_pe.sections.physical_size
format: bytes
level: extended
name: sections.physical_size
normalize: []
original_fieldset: pe
short: PE Section List physical size.
type: long
process.Ext.memory_region.memory_pe.sections.var_entropy:
dashed_name: process-Ext-memory-region-memory-pe-sections-var-entropy
description: Variance for Shannon entropy calculation from the section.
flat_name: process.Ext.memory_region.memory_pe.sections.var_entropy
format: number
level: extended
name: sections.var_entropy
normalize: []
original_fieldset: pe
short: Variance for Shannon entropy calculation from the section.
type: long
process.Ext.memory_region.memory_pe.sections.virtual_size:
dashed_name: process-Ext-memory-region-memory-pe-sections-virtual-size
description: PE Section List virtual size. This is always the same as `physical_size`.
flat_name: process.Ext.memory_region.memory_pe.sections.virtual_size
format: string
level: extended
name: sections.virtual_size
normalize: []
original_fieldset: pe
short: PE Section List virtual size. This is always the same as `physical_size`.
type: long
process.Ext.memory_region.memory_pe_detected:
dashed_name: process-Ext-memory-region-memory-pe-detected
description: Whether an executable file was found in memory.
example: false
flat_name: process.Ext.memory_region.memory_pe_detected
level: custom
name: memory_pe_detected
normalize: []
original_fieldset: memory_region
short: Whether an executable file was found in memory.
type: boolean
process.Ext.memory_region.region_base:
dashed_name: process-Ext-memory-region-region-base
description: Base address of the memory region.
example: 2431737462784
flat_name: process.Ext.memory_region.region_base
level: custom
name: region_base
normalize: []
original_fieldset: memory_region
short: Base address of the memory region.
type: unsigned_long
process.Ext.memory_region.region_protection:
dashed_name: process-Ext-memory-region-region-protection
description: Memory protection of the memory region. Example values include "RWX"
and "R-X".
example: RWX
flat_name: process.Ext.memory_region.region_protection
ignore_above: 1024
level: custom
name: region_protection
normalize: []
original_fieldset: memory_region
short: Memory protection of the memory region. Example values include "RWX" and
"R-X".
type: keyword
process.Ext.memory_region.region_size:
dashed_name: process-Ext-memory-region-region-size
description: Size of the memory region.
example: 4096
flat_name: process.Ext.memory_region.region_size
level: custom
name: region_size
normalize: []
original_fieldset: memory_region
short: Size of the memory region.
type: unsigned_long
process.Ext.memory_region.region_start_bytes:
dashed_name: process-Ext-memory-region-region-start-bytes
description: First 64 bytes at the region base address.
example: 4d5a90000300000004000000ffff0000b80000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000
flat_name: process.Ext.memory_region.region_start_bytes
ignore_above: 1024
level: custom
name: region_start_bytes
normalize: []
original_fieldset: memory_region
short: First 64 bytes at the region base address.
type: keyword
process.Ext.memory_region.region_state:
dashed_name: process-Ext-memory-region-region-state
description: State of the memory region. Example values include "RESERVE", "COMMIT",
and "FREE".
example: COMMIT
flat_name: process.Ext.memory_region.region_state
ignore_above: 1024
level: custom
name: region_state
normalize: []
original_fieldset: memory_region
short: State of the memory region. Example values include "RESERVE", "COMMIT", and
"FREE".
type: keyword
process.Ext.memory_region.strings:
dashed_name: process-Ext-memory-region-strings
description: Array of strings found within the memory region.
doc_values: false
flat_name: process.Ext.memory_region.strings
index: false
level: custom
name: strings
normalize: []
original_fieldset: memory_region
short: Array of strings found within the memory region.
type: keyword
process.Ext.protection:
dashed_name: process-Ext-protection
description: Indicates the protection level of this process. Uses the same syntax
as Process Explorer. Examples include PsProtectedSignerWinTcb, PsProtectedSignerWinTcb-Light,
and PsProtectedSignerWindows-Light.
flat_name: process.Ext.protection
ignore_above: 1024
level: custom
name: Ext.protection
normalize: []
short: OS-level protections granted to this process
type: keyword
process.Ext.token.integrity_level_name:
dashed_name: process-Ext-token-integrity-level-name
description: Human readable integrity level.
example: one of "system", "high", "medium", "low", "untrusted"
flat_name: process.Ext.token.integrity_level_name
ignore_above: 1024
level: custom
name: integrity_level_name
normalize: []
original_fieldset: token
short: Human readable integrity level.
type: keyword
process.code_signature.exists:
dashed_name: process-code-signature-exists
description: Boolean to capture if a signature is present.
example: 'true'
flat_name: process.code_signature.exists
level: core
name: exists
normalize: []
original_fieldset: code_signature
short: Boolean to capture if a signature is present.
type: boolean
process.code_signature.status:
dashed_name: process-code-signature-status
description: 'Additional information about the certificate status.
This is useful for logging cryptographic errors with the certificate validity
or trust status. Leave unpopulated if the validity or trust of the certificate
was unchecked.'
example: ERROR_UNTRUSTED_ROOT
flat_name: process.code_signature.status
ignore_above: 1024
level: extended
name: status
normalize: []
original_fieldset: code_signature
short: Additional information about the certificate status.
type: keyword
process.code_signature.subject_name:
dashed_name: process-code-signature-subject-name
description: Subject name of the code signer
example: Microsoft Corporation
flat_name: process.code_signature.subject_name
ignore_above: 1024
level: core
name: subject_name
normalize: []
original_fieldset: code_signature
short: Subject name of the code signer
type: keyword
process.code_signature.trusted:
dashed_name: process-code-signature-trusted
description: 'Stores the trust status of the certificate chain.
Validating the trust of the certificate chain may be complicated, and this field
should only be populated by tools that actively check the status.'
example: 'true'
flat_name: process.code_signature.trusted
level: extended
name: trusted
normalize: []
original_fieldset: code_signature
short: Stores the trust status of the certificate chain.
type: boolean
process.command_line:
dashed_name: process-command-line
description: 'Full command line that started the process, including the absolute
path to the executable, and all arguments.
Some arguments may be filtered to protect sensitive information.'
example: /usr/bin/ssh -l user 10.0.0.16
flat_name: process.command_line
level: extended
multi_fields:
- flat_name: process.command_line.caseless
ignore_above: 1024
name: caseless
normalizer: lowercase
type: keyword
- flat_name: process.command_line.text
name: text
norms: false
type: text
name: command_line
normalize: []
short: Full command line that started the process.
type: wildcard
process.entity_id:
dashed_name: process-entity-id
description: 'Unique identifier for the process.
The implementation of this is specified by the data source, but some examples
of what could be used here are a process-generated UUID, Sysmon Process GUIDs,
or a hash of some uniquely identifying components of a process.
Constructing a globally unique identifier is a common practice to mitigate PID
reuse as well as to identify a specific process over time, across multiple monitored
hosts.'
example: c2c455d9f99375d
flat_name: process.entity_id
ignore_above: 1024
level: extended
name: entity_id
normalize: []
short: Unique identifier for the process.
type: keyword
process.executable:
dashed_name: process-executable
description: Absolute path to the process executable.
example: /usr/bin/ssh
flat_name: process.executable
ignore_above: 1024
level: extended
multi_fields:
- flat_name: process.executable.caseless
ignore_above: 1024
name: caseless
normalizer: lowercase
type: keyword
- flat_name: process.executable.text
name: text
norms: false
type: text
name: executable
normalize: []
short: Absolute path to the process executable.
type: keyword
process.name:
dashed_name: process-name
description: 'Process name.
Sometimes called program name or similar.'
example: ssh
flat_name: process.name
ignore_above: 1024
level: extended
multi_fields:
- flat_name: process.name.caseless
ignore_above: 1024
name: caseless
normalizer: lowercase
type: keyword
- flat_name: process.name.text
name: text
norms: false
type: text
name: name
normalize: []
short: Process name.
type: keyword
process.pid:
dashed_name: process-pid
description: Process id.
example: 4242
flat_name: process.pid
format: string
level: core
name: pid
normalize: []
short: Process id.
type: long
process.thread.Ext:
dashed_name: process-thread-Ext
description: Object for all custom defined fields to live in.
flat_name: process.thread.Ext
level: custom
name: thread.Ext
normalize: []
short: Object for all custom defined fields to live in.
type: object
process.thread.Ext.call_stack:
dashed_name: process-thread-Ext-call-stack
description: Fields describing a stack frame. call_stack is expected to be an array
where each array element represents a stack frame.
enabled: false
flat_name: process.thread.Ext.call_stack
level: custom
name: call_stack
normalize: []
original_fieldset: call_stack
short: Fields describing a stack frame.
type: object
process.thread.Ext.call_stack.allocation_private_bytes:
dashed_name: process-thread-Ext-call-stack-allocation-private-bytes
description: The number of bytes in this memory allocation/image that are both +X
and non-shareable. Non-zero values can indicate code hooking, patching, or hollowing.
flat_name: process.thread.Ext.call_stack.allocation_private_bytes
level: custom
name: allocation_private_bytes
normalize: []
original_fieldset: call_stack
short: The number of bytes in this memory allocation/image that are both +X and
non-shareable.
type: unsigned_long
process.thread.Ext.call_stack.callsite_leading_bytes:
dashed_name: process-thread-Ext-call-stack-callsite-leading-bytes
description: Hex opcode bytes preceding the callsite
flat_name: process.thread.Ext.call_stack.callsite_leading_bytes
ignore_above: 1024
level: custom
name: callsite_leading_bytes
normalize: []
original_fieldset: call_stack
short: Hex opcode bytes preceding the callsite
type: keyword
process.thread.Ext.call_stack.callsite_trailing_bytes:
dashed_name: process-thread-Ext-call-stack-callsite-trailing-bytes
description: Hex opcode bytes after the callsite (where control will return to)
flat_name: process.thread.Ext.call_stack.callsite_trailing_bytes
ignore_above: 1024
level: custom
name: callsite_trailing_bytes
normalize: []
original_fieldset: call_stack
short: Hex opcode bytes after the callsite (where control will return to)
type: keyword
process.thread.Ext.call_stack.instruction_pointer:
dashed_name: process-thread-Ext-call-stack-instruction-pointer
description: The return address of this stack frame.
flat_name: process.thread.Ext.call_stack.instruction_pointer
ignore_above: 1024
level: custom
name: instruction_pointer
normalize: []
original_fieldset: call_stack
short: The return address of this stack frame.
type: keyword
process.thread.Ext.call_stack.module_path:
dashed_name: process-thread-Ext-call-stack-module-path
description: The path to the DLL/module containing `instruction_pointer`.
flat_name: process.thread.Ext.call_stack.module_path
ignore_above: 1024
level: custom
name: module_path
normalize: []
original_fieldset: call_stack
short: The path to the DLL/module containing `instruction_pointer`.
type: keyword
process.thread.Ext.call_stack.protection:
dashed_name: process-thread-Ext-call-stack-protection
description: Protection of the page containing this instruction. This is `R-X'
by default if omitted.
flat_name: process.thread.Ext.call_stack.protection
ignore_above: 1024
level: custom
name: protection
normalize: []
original_fieldset: call_stack
short: Protection of the page containing this instruction. This is `R-X' by default
if omitted.
type: keyword
process.thread.Ext.call_stack.protection_provenance:
dashed_name: process-thread-Ext-call-stack-protection-provenance
description: The name of the memory region that last modified the protection of
this page. "Unbacked" can indicate shellcode.
flat_name: process.thread.Ext.call_stack.protection_provenance
ignore_above: 1024
level: custom
name: protection_provenance
normalize: []
original_fieldset: call_stack
short: The name of the memory region that last modified the protection of this page. "Unbacked"
can indicate shellcode.
type: keyword
process.thread.Ext.call_stack.symbol_info:
dashed_name: process-thread-Ext-call-stack-symbol-info
description: The nearest symbol for `instruction_pointer`.
flat_name: process.thread.Ext.call_stack.symbol_info
ignore_above: 1024
level: custom
name: symbol_info
normalize: []
original_fieldset: call_stack
short: The nearest symbol for `instruction_pointer`.
type: keyword
process.thread.Ext.call_stack_contains_unbacked:
dashed_name: process-thread-Ext-call-stack-contains-unbacked
description: Indicates whether the creating thread's stack contains frames pointing
outside any known executable image.
flat_name: process.thread.Ext.call_stack_contains_unbacked
level: custom
name: thread.Ext.call_stack_contains_unbacked
normalize: []
short: Indicates whether the creating thread's stack contains frames pointing outside
any known executable image.
type: boolean
process.thread.Ext.call_stack_final_hook_module:
dashed_name: process-thread-Ext-call-stack-final-hook-module
description: The module that installed the final API hook in the call stack.
flat_name: process.thread.Ext.call_stack_final_hook_module
level: custom
name: thread.Ext.call_stack_final_hook_module
normalize: []
short: The module that installed the final API hook in the call stack.
type: nested
process.thread.Ext.call_stack_final_hook_module.code_signature:
dashed_name: process-thread-Ext-call-stack-final-hook-module-code-signature
description: Code signature of the call_stack_final_hook_module.
flat_name: process.thread.Ext.call_stack_final_hook_module.code_signature
level: custom
name: thread.Ext.call_stack_final_hook_module.code_signature
normalize: []
short: Code signature of the call_stack_final_hook_module.
type: nested
process.thread.Ext.call_stack_final_hook_module.code_signature.exists:
dashed_name: process-thread-Ext-call-stack-final-hook-module-code-signature-exists
description: Boolean to capture if a signature is present.
example: 'true'
flat_name: process.thread.Ext.call_stack_final_hook_module.code_signature.exists
level: custom
name: thread.Ext.call_stack_final_hook_module.code_signature.exists
normalize: []
short: Boolean to capture if a signature is present.
type: boolean
process.thread.Ext.call_stack_final_hook_module.code_signature.status:
dashed_name: process-thread-Ext-call-stack-final-hook-module-code-signature-status
description: 'Additional information about the certificate status.
This is useful for logging cryptographic errors with the certificate validity
or trust status. Leave unpopulated if the validity or trust of the certificate
was unchecked.'
example: ERROR_UNTRUSTED_ROOT
flat_name: process.thread.Ext.call_stack_final_hook_module.code_signature.status
ignore_above: 1024
level: custom
name: thread.Ext.call_stack_final_hook_module.code_signature.status
normalize: []
short: Additional information about the certificate status.
type: keyword
process.thread.Ext.call_stack_final_hook_module.code_signature.subject_name:
dashed_name: process-thread-Ext-call-stack-final-hook-module-code-signature-subject-name
description: Subject name of the code signer
example: Microsoft Corporation
flat_name: process.thread.Ext.call_stack_final_hook_module.code_signature.subject_name
ignore_above: 1024
level: custom
name: thread.Ext.call_stack_final_hook_module.code_signature.subject_name
normalize: []
short: Subject name of the code signer
type: keyword
process.thread.Ext.call_stack_final_hook_module.code_signature.trusted:
dashed_name: process-thread-Ext-call-stack-final-hook-module-code-signature-trusted
description: 'Stores the trust status of the certificate chain.
Validating the trust of the certificate chain may be complicated, and this field
should only be populated by tools that actively check the status.'
example: 'true'
flat_name: process.thread.Ext.call_stack_final_hook_module.code_signature.trusted
level: custom
name: thread.Ext.call_stack_final_hook_module.code_signature.trusted
normalize: []
short: Stores the trust status of the certificate chain.
type: boolean
process.thread.Ext.call_stack_final_hook_module.hash:
dashed_name: process-thread-Ext-call-stack-final-hook-module-hash
description: Hashes of the call_stack_final_hook_module.
flat_name: process.thread.Ext.call_stack_final_hook_module.hash
level: custom
name: thread.Ext.call_stack_final_hook_module.hash
normalize: []
short: Hashes of the call_stack_final_hook_module.
type: object
process.thread.Ext.call_stack_final_hook_module.hash.sha256:
dashed_name: process-thread-Ext-call-stack-final-hook-module-hash-sha256
description: The sha256 of the call_stack_final_hook_module.
example: d25ff1e6c6460a7f9de39198d182058c1712726008d187e1953b83abe977e4a0
flat_name: process.thread.Ext.call_stack_final_hook_module.hash.sha256
ignore_above: 1024
level: custom
name: thread.Ext.call_stack_final_hook_module.hash.sha256
normalize: []
short: The sha256 of the call_stack_final_hook_module.
type: keyword
process.thread.Ext.call_stack_final_hook_module.path:
dashed_name: process-thread-Ext-call-stack-final-hook-module-path
description: The file path of the call_stack_final_hook_module.
example: C:\Program Files\Example\example.dll
flat_name: process.thread.Ext.call_stack_final_hook_module.path
ignore_above: 1024
level: custom
name: thread.Ext.call_stack_final_hook_module.path
normalize: []
short: The file path of the call_stack_final_hook_module.
type: keyword
process.thread.Ext.call_stack_final_user_module:
dashed_name: process-thread-Ext-call-stack-final-user-module
description: The final non-win32 module in the call stack.
flat_name: process.thread.Ext.call_stack_final_user_module
level: custom
name: thread.Ext.call_stack_final_user_module
normalize: []
short: The final non-win32 module in the call stack.
type: nested
process.thread.Ext.call_stack_final_user_module.allocation_private_bytes:
dashed_name: process-thread-Ext-call-stack-final-user-module-allocation-private-bytes
description: The number of bytes in this memory region that are both +X and non-shareable.
Non-zero values can indicate code hooking, patching, or hollowing.
flat_name: process.thread.Ext.call_stack_final_user_module.allocation_private_bytes
level: custom
name: thread.Ext.call_stack_final_user_module.allocation_private_bytes
normalize: []
short: The number of bytes in this memory region that are both +X and non-shareable.
type: unsigned_long
process.thread.Ext.call_stack_final_user_module.code_signature:
dashed_name: process-thread-Ext-call-stack-final-user-module-code-signature
description: Code signature of the call_stack_final_user_module.
flat_name: process.thread.Ext.call_stack_final_user_module.code_signature
level: custom
name: thread.Ext.call_stack_final_user_module.code_signature
normalize: []
short: Code signature of the call_stack_final_user_module.
type: nested
process.thread.Ext.call_stack_final_user_module.code_signature.exists:
dashed_name: process-thread-Ext-call-stack-final-user-module-code-signature-exists
description: Boolean to capture if a signature is present.
example: 'true'
flat_name: process.thread.Ext.call_stack_final_user_module.code_signature.exists
level: custom
name: thread.Ext.call_stack_final_user_module.code_signature.exists
normalize: []
short: Boolean to capture if a signature is present.
type: boolean
process.thread.Ext.call_stack_final_user_module.code_signature.status:
dashed_name: process-thread-Ext-call-stack-final-user-module-code-signature-status
description: 'Additional information about the certificate status.
This is useful for logging cryptographic errors with the certificate validity
or trust status. Leave unpopulated if the validity or trust of the certificate
was unchecked.'
example: ERROR_UNTRUSTED_ROOT
flat_name: process.thread.Ext.call_stack_final_user_module.code_signature.status
ignore_above: 1024
level: custom
name: thread.Ext.call_stack_final_user_module.code_signature.status
normalize: []
short: Additional information about the certificate status.
type: keyword
process.thread.Ext.call_stack_final_user_module.code_signature.subject_name:
dashed_name: process-thread-Ext-call-stack-final-user-module-code-signature-subject-name
description: Subject name of the code signer
example: Microsoft Corporation
flat_name: process.thread.Ext.call_stack_final_user_module.code_signature.subject_name
ignore_above: 1024
level: custom
name: thread.Ext.call_stack_final_user_module.code_signature.subject_name
normalize: []
short: Subject name of the code signer
type: keyword
process.thread.Ext.call_stack_final_user_module.code_signature.trusted:
dashed_name: process-thread-Ext-call-stack-final-user-module-code-signature-trusted
description: 'Stores the trust status of the certificate chain.
Validating the trust of the certificate chain may be complicated, and this field
should only be populated by tools that actively check the status.'
example: 'true'
flat_name: process.thread.Ext.call_stack_final_user_module.code_signature.trusted
level: custom
name: thread.Ext.call_stack_final_user_module.code_signature.trusted
normalize: []
short: Stores the trust status of the certificate chain.
type: boolean
process.thread.Ext.call_stack_final_user_module.code_signature.valid:
dashed_name: process-thread-Ext-call-stack-final-user-module-code-signature-valid
description: 'Boolean to capture if the digital signature is verified against the
binary content.
Leave unpopulated if a certificate was unchecked.'
example: 'true'
flat_name: process.thread.Ext.call_stack_final_user_module.code_signature.valid
level: custom
name: thread.Ext.call_stack_final_user_module.code_signature.valid
normalize: []
short: Boolean to capture if the digital signature is verified against the binary
content.
type: boolean
process.thread.Ext.call_stack_final_user_module.hash:
dashed_name: process-thread-Ext-call-stack-final-user-module-hash
description: Hashes of the call_stack_final_user_module.
flat_name: process.thread.Ext.call_stack_final_user_module.hash
level: custom
name: thread.Ext.call_stack_final_user_module.hash
normalize: []
short: Hashes of the call_stack_final_user_module.
type: object
process.thread.Ext.call_stack_final_user_module.hash.sha256:
dashed_name: process-thread-Ext-call-stack-final-user-module-hash-sha256
description: The sha256 of the call_stack_final_user_module.
example: d25ff1e6c6460a7f9de39198d182058c1712726008d187e1953b83abe977e4a0
flat_name: process.thread.Ext.call_stack_final_user_module.hash.sha256
ignore_above: 1024
level: custom
name: thread.Ext.call_stack_final_user_module.hash.sha256
normalize: []
short: The sha256 of the call_stack_final_user_module.
type: keyword
process.thread.Ext.call_stack_final_user_module.name:
dashed_name: process-thread-Ext-call-stack-final-user-module-name
description: The file name of the call_stack_final_user_module.
example: example.dll
flat_name: process.thread.Ext.call_stack_final_user_module.name
ignore_above: 1024
level: custom
name: thread.Ext.call_stack_final_user_module.name
normalize: []
short: The file name of the call_stack_final_user_module.
type: keyword
process.thread.Ext.call_stack_final_user_module.path:
dashed_name: process-thread-Ext-call-stack-final-user-module-path
description: The file path of the call_stack_final_user_module.
example: C:\Program Files\Example\example.dll
flat_name: process.thread.Ext.call_stack_final_user_module.path
ignore_above: 1024
level: custom
name: thread.Ext.call_stack_final_user_module.path
normalize: []
short: The file path of the call_stack_final_user_module.
type: keyword
process.thread.Ext.call_stack_final_user_module.protection:
dashed_name: process-thread-Ext-call-stack-final-user-module-protection
description: The memory protection for the acting region of pages. Corresponds to
`MEMORY_BASIC_INFORMATION.Protect`
example: RWX
flat_name: process.thread.Ext.call_stack_final_user_module.protection
ignore_above: 1024
level: custom
name: thread.Ext.call_stack_final_user_module.protection
normalize: []
short: The memory protection for the acting region of pages. Corresponds to `MEMORY_BASIC_INFORMATION.Protect`
type: keyword
process.thread.Ext.call_stack_final_user_module.protection_provenance:
dashed_name: process-thread-Ext-call-stack-final-user-module-protection-provenance
description: The name of the memory region that caused the last modification of
the protection of this page. "Unbacked" may indicate shellcode.
example: third_party_hook.dll
flat_name: process.thread.Ext.call_stack_final_user_module.protection_provenance
ignore_above: 1024
level: custom
name: thread.Ext.call_stack_final_user_module.protection_provenance
normalize: []
short: The name of the memory region that caused the last modification of the protection
of this page.
type: keyword
process.thread.Ext.call_stack_final_user_module.protection_provenance_path:
dashed_name: process-thread-Ext-call-stack-final-user-module-protection-provenance-path
description: The path of the module that caused the last modification the protection
of this page.
example: C:\Program Files\Hook Inc\third_party_hook.dll
flat_name: process.thread.Ext.call_stack_final_user_module.protection_provenance_path
ignore_above: 1024
level: custom
name: thread.Ext.call_stack_final_user_module.protection_provenance_path
normalize: []
short: The path of the module that caused the last modification the protection of
this page.
type: keyword
process.thread.Ext.call_stack_final_user_module.reason:
dashed_name: process-thread-Ext-call-stack-final-user-module-reason
description: The unexpected call_stack_summary that led to an "Undetermined" protection_provenance.
example: ntdll.dll|kernelbase.dll
flat_name: process.thread.Ext.call_stack_final_user_module.reason
ignore_above: 1024
level: custom
name: thread.Ext.call_stack_final_user_module.reason
normalize: []
short: The unexpected call_stack_summary that led to an "Undetermined" protection_provenance.
type: keyword
process.thread.Ext.call_stack_summary:
dashed_name: process-thread-Ext-call-stack-summary
description: Concatentation of the non-repeated modules in the call stack.
example: ntdll.dll|example.exe|kernel32.dll|ntdll.dll
flat_name: process.thread.Ext.call_stack_summary
ignore_above: 1024
level: custom
name: thread.Ext.call_stack_summary
normalize: []
short: Concatentation of the non-repeated modules in the call stack.
type: keyword
process.thread.id:
dashed_name: process-thread-id
description: Thread ID.
example: 4242
flat_name: process.thread.id
format: string
level: extended
name: thread.id
normalize: []
short: Thread ID.
type: long
user.domain:
dashed_name: user-domain
description: 'Name of the directory the user is a member of.
For example, an LDAP or Active Directory domain name.'
flat_name: user.domain
ignore_above: 1024
level: extended
name: domain
normalize: []
short: Name of the directory the user is a member of.
type: keyword
user.hash:
dashed_name: user-hash
description: 'Unique user hash to correlate information for a user in anonymized
form.
Useful if `user.id` or `user.name` contain confidential information and cannot
be used.'
flat_name: user.hash
ignore_above: 1024
level: extended
name: hash
normalize: []
short: Unique user hash to correlate information for a user in anonymized form.
type: keyword
user.id:
dashed_name: user-id
description: Unique identifier of the user.
example: S-1-5-21-202424912787-2692429404-2351956786-1000
flat_name: user.id
ignore_above: 1024
level: core
name: id
normalize: []
short: Unique identifier of the user.
type: keyword
user.name:
dashed_name: user-name
description: Short name or login of the user.
example: a.einstein
flat_name: user.name
ignore_above: 1024
level: core
multi_fields:
- flat_name: user.name.text
name: text
type: match_only_text
name: name
normalize: []
short: Short name or login of the user.
type: keyword