Sysmon product comparisons
The following sections describe the differences between versions 10.6.2 of the Splunk Add-on for Microsoft Sysmon and 1.0.1 of the Splunk Add-on for Sysmon:
Field mapping comparison for versions 10.6.2 of the Splunk Add-on for Microsoft Sysmon and 1.0.1 of the Splunk Add-on for Sysmon
Version 1.0.1 of the Splunk Add-on for Sysmon introduces field mapping changes to the XmlWinEventLog sourcetype. See the following table for information in field changes between version 10.6.2 of the Splunk Add-on for Microsoft Sysmon and 1.0.1 of the Splunk Add-on for Sysmon
Source type | EventCode | Fields added | Fields modified | Fields removed | 10.6.2 extractions | 1.0.1 extractions | |
---|---|---|---|---|---|---|---|
XmlWinEventLog
|
1 | original_file_name
|
signature
|
app
|
Process Create, Process Create | Process creation, Process creation | |
XmlWinEventLog
|
2 | action
|
signature
|
app
|
File Create Time, File Create Time, change endpoint filesystem, change endpoint filesystem | A process changed a file creation time, A process changed a file creation time, endpoint filesystem, endpoint filesystem | |
XmlWinEventLog
|
3 | action
|
signature
|
dest_host
|
Network Connect, https, -, listening, Network Connect, listening port communicate network, listening port communicate network | Network connection, ip, 52.46.216.120, estabished, Network connection, communicate network, communicate network | |
XmlWinEventLog
|
4 | description
|
signature
|
direction
|
Sysmon Start, Sysmon Start | Sysmon service state changed, Sysmon service state changed | |
XmlWinEventLog
|
5 | action
|
signature
|
app
|
Process Terminate, Process Terminate | Process terminated, Process terminated | |
XmlWinEventLog
|
6 | action
|
signature
|
direction
|
Driver Load | Driver loaded | |
XmlWinEventLog
|
7 | action
|
signature
|
app
|
Image Load, unsecapp.exe, Image Load, C:\Windows\System32\wbem\unsecapp.exe, unsecapp.exe | Image loaded, oleaut32.dll, Image loaded, C:\Windows\System32\oleaut32.dll, oleaut32.dll | |
XmlWinEventLog
|
8 | action
|
signature
|
direction
|
Create Remote Thread, csrss.exe, , Create Remote Thread, csrss.exe | CreateRemoteThread, splunkd.exe, csrss.exe, CreateRemoteThread, csrss.exe, splunkd.exe | |
XmlWinEventLog
|
9 | action
|
signature
|
app
|
Raw Access Read, Raw Access Read | RawAccessRead, RawAccessRead | |
XmlWinEventLog
|
10 | action
|
process_exec
|
direction
|
svchost.exe,, Process Access,, svchost.exe, Process Access | MsMpEng.exe, svchost.exe, ProcessAccess, svchost.exe, MsMpEng.exe, ProcessAccess | |
XmlWinEventLog
|
11 | action
|
tag::eventtype
|
app
|
change endpoint filesystem, change endpoint filesystem, File Created, File Created | endpoint filesystem, endpoint filesystem, FileCreate, FileCreate | |
XmlWinEventLog
|
12 | registry_hive
|
tag::eventtype
|
app
|
change endpoint registry, change endpoint registry, Parameters, Registry object added or deleted, Registry object added or deleted | endpoint registry, endpoint registry, HKLM\System\CurrentControlSet\Services\Tcpip\Parameters, RegistryEvent (Object create and delete), RegistryEvent (Object create and delete) | |
XmlWinEventLog
|
13 | RegistryValueData
|
tag::eventtype
|
app
|
change endpoint registry, change endpoint registry, SecureTimeHigh, Registry value set, QWORD (0x01d76449-0xb4beb640), Registry value set | endpoint registry, endpoint registry, HKLM\System\CurrentControlSet\Services\W32Time\SecureTimeLimits, RegistryEvent (Value Set), SecureTimeHigh, RegistryEvent (Value Set) | |
XmlWinEventLog
|
14 | action
|
tag::eventtype
|
app
|
change endpoint registry, change endpoint registry, test1, Registry object renamed, Registry object renamed | endpoint registry, endpoint registry, HKU\S-1-5-21-2763475848-2734699699-1333640867-1011\test1, RegistryEvent (Key and Value Rename). RegistryEvent (Key and Value Rename) | |
XmlWinEventLog
|
15 | action
|
file_path
|
app
|
C:\Users\splunker\Downloads\Sublime Text Build 3211 x64 Setup.exe:Zone.Identifier, File stream created, Sublime Text Build 3211 x64 Setup.exe:Zone.Identifier, File stream created | C:\Users\splunker\Downloads\Sublime Text Build 3211 x64 Setup.exe, FileCreateStreamHash, Sublime Text Build 3211 x64 Setup.exe, FileCreateStreamHash | |
XmlWinEventLog
|
16 | description
|
EventDescription
|
direction
|
Sysmon Configuration Changed, Sysmon Configuration Changed | ServiceConfigurationChange, ServiceConfigurationChange | |
XmlWinEventLog
|
17 | action
|
EventDescription
|
app
|
Pipe Created, Pipe Created | PipeEvent (Pipe Created), PipeEvent (Pipe Created) | |
XmlWinEventLog
|
18 | action
|
EventDescription
|
app
|
Pipe Connected, Pipe Connected | PipeEvent (Pipe Connected), PipeEvent (Pipe Connected) | |
XmlWinEventLog
|
19 | action
|
EventDescription
|
direction
|
WmiEventFilter activity detected, WmiEventFilter activity detected | WmiEvent (WmiEventFilter activity detected), WmiEvent (WmiEventFilter activity detected) | |
XmlWinEventLog
|
20 | action
|
EventDescription
|
direction
|
WmiEventConsumer activity detected, WmiEventConsumer activity detected | WmiEvent (WmiEventConsumer activity detected), WmiEvent (WmiEventConsumer activity detected) | |
XmlWinEventLog
|
21 | action
|
EventDescription
|
direction
|
WmiEventConsumerToFilter activity detected, WmiEventConsumerToFilter activity detected | WmiEvent (WmiEventConsumerToFilter activity detected),WmiEvent (WmiEventConsumerToFilter activity detected) | |
XmlWinEventLog
|
22 | answer_count
|
EventDescription
|
app
|
DNS Query, DNS Query | DNSEvent (DNS query), DNSEvent (DNS query) | |
XmlWinEventLog
|
23 | action
|
process_exec
|
app
|
,Unknown,, Unknown | splunk-winevtlog.exe, FileDelete (File Delete archived), splunk-winevtlog.exe, FileDelete (File Delete archived) | |
XmlWinEventLog
|
24 | SrcHost
|
process_exec
|
app
|
,Unknown,, Unknown | rdpclip.exe, ClipboardChange (New content in the clipboard), rdpclip.exe, ClipboardChange (New content in the clipboard) | |
XmlWinEventLog
|
25 | action
|
EventDescription
|
app
|
Unknown, Unknown | ProcessTampering (Process image change), ProcessTampering (Process image change) | |
XmlWinEventLog
|
26 | action
|
process_exec
|
app
|
, Unknown,, Unknown | chrome.exe, FileDeleteDetected (File Delete logged), chrome.exe, FileDeleteDetected (File Delete logged) | |
XmlWinEventLog
|
255 | description
|
tag::eventtype
|
direction
|
service report, ms-sysmon-service, service report |
CIM model comparison for versions 10.6.2 of the Splunk Add-on for Microsoft Sysmon and 1.0.1 of the Splunk Add-on for Sysmon
Source | EventID | Previous CIM model | New CIM model |
---|---|---|---|
XmlWinEventLog
|
1, 10, 15, 17, 18, 19, 20, 21, 22, 5, 6, 8, 9 | ||
XmlWinEventLog
|
11, 12, 13, 14, 2 | Change | |
XmlWinEventLog
|
3 | Endpoint | |
XmlWinEventLog
|
16, 255, 4 | Endpoint | |
XmlWinEventLog
|
23, 26 | Endpoint | |
XmlWinEventLog
|
24, 25, 7 | Endpoint |
Lookups for the Splunk Add-on for Sysmon | Source types for the Splunk Add-on for Sysmon |
This documentation applies to the following versions of Splunk® Supported Add-ons: released
Feedback submitted, thanks!