Skip to content

Sysmon

Sysmon cheat sheet

ID Name Tag
1 ProcessCreate Process Create
2 FileCreateTime File creation time
3 NetworkConnect Network connection detected
4 N/A Sysmon service state change (cannot be filtered)
5 ProcessTerminate Process terminated
6 DriverLoad Driver Loaded
7 ImageLoad Image loaded
8 CreateRemoteThread CreateRemoteThread detected
9 RawAccessRead RawAccessRead detected
10 ProcessAccess Process accessed
11 FileCreate File created
12 RegistryEvent Registry object added or deleted
13 RegistryEvent Registry value set
14 RegistryEvent Registry object renamed
15 FileCreateStreamHash File stream created
16 n/a Sysmon configuration change (cannot be filtered)
17 PipeEvent Named pipe created
18 PipeEvent Named pipe connected
19 WmiEvent WMI filter
20 WmiEvent WMI consumer
21 WmiEvent WMI consumer filter
22 DNSQuery DNS query
23 FileDelete File Delete archived
24 ClipboardChange New content in the clipboard
25 ProcessTampering Process image change
26 FileDeleteDetected File Delete logged

Sysmon Elastic ECS cheat sheet

EventID 1 Process Create

The process creation event provides extended information about a newly created process. The full command line provides context on the process execution. The ProcessGUID field is a unique value for this process across a domain to make event correlation easier. The hash is a full hash of the file with the algorithms in the HashType field.

Event Log Entry

Field Detail
UtcTime Time in UTC when event was created
ProcessGuid Process Guid of the process that got spawned/created (child)
ProcessId Process ID used by the OS to identify the created process (child)
Image File path of the process being spawned/created. Considered also the child or source process
FileVersion Version of the image associated with the main process (child)
Description Description of the image associated with the main process (child)
Product Product name the image associated with the main process (child) belongs to
OriginalFileName OriginalFileName from the PE header, added on compilation
Company Company name the image associated with the main process (child) belongs to
CommandLine Arguments which were passed to the executable associated with the main process
CurrentDirectory The path without the name of the image associated with the process
User Name of the account that created the process (child) . It usually contains domain name and username
LogonGuid Logon GUID of the user who created the new process. Value that can help you correlate this event with others that contain the same Logon GUID
LogonId Login ID of the user who created the new process. Value that can help you correlate this event with others that contain the same Logon ID
TerminalSessionId ID of the session the user belongs to
IntegrityLevel Integrity label assigned to a process
Hashes Full hash of the file with the algorithms in the HashType field
ParentProcessGuid ProcessGUID of the process that spawned/created the main process (child)
ParentProcessId Process ID of the process that spawned/created the main process (child)
ParentImage File path that spawned/created the main process
ParentCommandLine Arguments which were passed to the executable associated with the parent process
ParentUser Name of the account that created the parent process. It usually contains domain name and username

Elastic ECS Mapping

Process Create:
RuleName: technique_id=T1218.002,technique_name=rundll32.exe
UtcTime: 2022-01-29 05:33:08.667
ProcessGuid: {a7262f76-d194-61f4-c000-000000000900}
ProcessId: 1168
Image: C:\Windows\System32\rundll32.exe
FileVersion: 10.0.19041.746 (WinBuild.160101.0800)
Description: Windows host process (Rundll32)
Product: Microsoft® Windows® Operating System
Company: Microsoft Corporation
OriginalFileName: RUNDLL32.EXE
CommandLine: C:\Windows\system32\rundll32.exe C:\Windows\system32\PcaSvc.dll,PcaPatchSdbTask
CurrentDirectory: C:\Windows\system32\
User: NT AUTHORITY\SYSTEM
LogonGuid: {a7262f76-d0ce-61f4-e703-000000000000}
LogonId: 0x3E7
TerminalSessionId: 0
IntegrityLevel: System
Hashes: SHA1=DD399AE46303343F9F0DA189AEE11C67BD868222,MD5=EF3179D498793BF4234F708D3BE28633,SHA256=B53F3C0CD32D7F20849850768DA6431E5F876B7BFA61DB0AA0700B02873393FA,IMPHASH=4DB27267734D1576D75C991DC70F68AC
ParentProcessGuid: {a7262f76-d0d6-61f4-2d00-000000000900}
ParentProcessId: 1956
ParentImage: C:\Windows\System32\svchost.exe
ParentCommandLine: C:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule
ParentUser: NT AUTHORITY\SYSTEM
ECS Event Mapping Field Data (Example) Sysmon Field Mapping
event.action N/A
event.category process
event.code 1
event.created Jan 30, 2022 @ 21:51:17.092 UtcTime
event.kind event N/A
event.module sysmon N/A
event.provider Microsoft-Windows-Sysmon N/A
event.type start, process_start n/a
hash.imphash b71cb3ac5c352bec857c940cbc95f0f3 Hashes
hash.md5 60ff40cfd7fb8fe41ee4fe9ae5fe1c51 Hashes
hash.sha1 3ea7cc0 Hashes
hash.sha256 2198a7b58bccb758036b969ddae6cc2ece07565e2659a7c541a313a0492231a3 Hashes
process.args C:\Windows\system32\rundll32.exe, C:\Windows\system32\PcaSvc.dll,PcaPatchSdbTask CommandLine
process.command_line C:\Windows\system32\rundll32.exe C:\Windows\system32\PcaSvc.dll,PcaPatchSdbTask CommandLine
process.entity_id {a754cc8d-0794-61f8-d001-000000000d00} ProcessGuid
process.executable C:\Windows\System32\rundll32.exe Image
process.parent.args C:\Windows\system32\svchost.exe, -k, netsvcs, -p, -s, Schedule ParentCommandLine
process.parent.command_line C:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule ParentCommandLine
process.parent.entity_id {a754cc8d-d9d1-61f7-2600-000000000d00} ParentProcessGuid
process.parent.name svchost.exe ParentImage
process.parent.pid 1632 ParentProcessId
process.pe.company Microsoft Corporation Company
process.pe.description Windows host process (Rundll32) Description
process.pe.product Microsoft® Windows® Operating System Product
process.pid 5316 ProcessId
process.working_directory C:\Windows\system32\ CurrentDirectory
related.hash dd399ae, ef3179d498793bf4234f708d3be28633, b53f3c0cd32d7f20849850768da6431e5f876b7bfa61db0aa0700b02873393fa, 4db27267734d1576d75c991dc70f68ac Hashes
related.user SYSTEM User
user.domain NT AUTHORITY User
user.id S-1-5-18 LogonId
user.name SYSTEM User

EventID 2 File creation time changed

The change file creation time event is registered when a file creation time is explicitly modified by a process. This event helps tracking the real creation time of a file. Attackers may change the file creation time of a backdoor to make it look like it was installed with the operating system. Note that many processes legitimately change the creation time of a file; it does not necessarily indicate malicious activity.

Event Log Entry

Field Detail
UtcTime Time in UTC when event was created
ProcessGuid Process Guid of the process that changed the file creation time
ProcessId Process ID used by the OS to identify the process changing the file creation time
Image File path of the process that changed the file creation time
TargetFilename Full path name of the file
CreationUtcTime New creation time of the file
PreviousCreationUtcTime Previous creation time of the file
User Name of the account that created the file. It usually contains domain name and username

Elastic ECS Mapping

ECS Event Mapping Field Data (Example) Sysmon Field Mapping

EventID 3 Network connection

The network connection event logs TCP/UDP connections on the machine. It is disabled by default. Each connection is linked to a process through the ProcessId and ProcessGUID fields. The event also contains the source and destination host names IP addresses, port numbers and IPv6 status.

Event Log Entry

Field Detail
UtcTime Time in UTC when event was created
ProcessGuid Process Guid of the process that made the network connection
ProcessId Process ID used by the OS to identify the process that made the network connection
Image File path of the process that made the network connection
User Name of the account who made the network connection
Protocol Protocol being used for the network connection
Initiated Indicates whether the process initiated the TCP connection
SourceIsIpv6 Is the source IP an Ipv6 address
SourceIp Source IP address that made the network connection
SourceHostname DNS name of the host that made the network connection
SourcePort Source port number
SourcePortName Name of the source port being used
DestinationIsIpv6 Is the destination IP an Ipv6 address
DestinationIp IP address destination
DestinationHostname DNS name of the host that is contacted
DestinationPort Destination port number
DestinationPortName Name of the destination port

Elastic ECS Mapping

Example Event Log:

Network connection detected:
RuleName: technique_id=T1021,technique_name=Remote Services
UtcTime: 2022-01-31 19:41:19.612
ProcessGuid: {ffc6f37f-da30-61f7-1500-000000000a00}
ProcessId: 956
Image: C:\Windows\System32\svchost.exe
User: NT AUTHORITY\NETWORK SERVICE
Protocol: tcp
Initiated: false
SourceIsIpv6: false
SourceIp: 94.232.42.95
SourceHostname: -
SourcePort: 52191
SourcePortName: -
DestinationIsIpv6: false
DestinationIp: 10.40.2.103
DestinationHostname: -
DestinationPort: 3389
DestinationPortName: -
ECS Event Mapping Field Data (Example) Sysmon Field Mapping
event.code 3 N/A
event.kind event N/A
event.module sysmon N/A
event.category Network N/A
event.type connection, start, protocol N/A
event.provider Microsoft-Windows-Sysmon N/A
event.action Network connection detected (rule: NetworkConnect) N/A
destination.domain - DestinationHostname
destination.ip 10.40.2.103 DestinationIp
destination.port 3389 DestinationPort
event.created Jan 31, 2022 @ 14:41:22.352 UtcTime
network.community_id 1:pFiw4iD296r81i3sN/GWjIMRpVk= N/A
network.direction ingress Initiated
network.protocol - N/A
network.transport tcp Protocol
network.type ipv4 N/A
process.entity_id {ffc6f37f-da30-61f7-1500-000000000a00} ProcessGuid
process.executable C:\Windows\System32\svchost.exe Image
process.name svchost.exe Image
process.pid 956 ProcessId
related.ip 94.232.42.95, 10.40.2.103 N/A
related.user NETWORK SERVICE User
source.domain - SourceHostname
source.ip 94.232.42.95 SourceIp
source.port 52191 SourcePort
user.domain NT AUTHORITY User
user.id S-1-5-18 User
user.name NETWORK SERVICE User

EventID 3 Service state changed

The service state change event reports the state of the Sysmon service (started or stopped).


Last update: March 14, 2022