Crowdstrike fields

Module for collecting Crowdstrike events.

crowdstrike

Fields for Crowdstrike Falcon event and alert data.

metadata

Meta data fields for each event that include type and timestamp.

crowdstrike.metadata.eventType

DetectionSummaryEvent, FirewallMatchEvent, IncidentSummaryEvent, RemoteResponseSessionStartEvent, RemoteResponseSessionEndEvent, AuthActivityAuditEvent, or UserActivityAuditEvent

type: keyword

crowdstrike.metadata.eventCreationTime

The time this event occurred on the endpoint in UTC UNIX_MS format.

type: date

crowdstrike.metadata.offset

Offset number that tracks the location of the event in stream. This is used to identify unique detection events.

type: integer

crowdstrike.metadata.customerIDString

Customer identifier

type: keyword

crowdstrike.metadata.version

Schema version

type: keyword

event

Event data fields for each event and alert.

crowdstrike.event.ProcessStartTime

The process start time in UTC UNIX_MS format.

type: date

crowdstrike.event.ProcessEndTime

The process termination time in UTC UNIX_MS format.

type: date

crowdstrike.event.ProcessId

Process ID related to the detection.

type: integer

crowdstrike.event.ParentProcessId

Parent process ID related to the detection.

type: integer

crowdstrike.event.ComputerName

Name of the computer where the detection occurred.

type: keyword

crowdstrike.event.UserName

User name associated with the detection.

type: keyword

crowdstrike.event.DetectName

Name of the detection.

type: keyword

crowdstrike.event.DetectDescription

Description of the detection.

type: keyword

crowdstrike.event.Severity

Severity score of the detection.

type: integer

crowdstrike.event.SeverityName

Severity score text.

type: keyword

crowdstrike.event.FileName

File name of the associated process for the detection.

type: keyword

crowdstrike.event.FilePath

Path of the executable associated with the detection.

type: keyword

crowdstrike.event.CommandLine

Executable path with command line arguments.

type: keyword

crowdstrike.event.SHA1String

SHA1 sum of the executable associated with the detection.

type: keyword

crowdstrike.event.SHA256String

SHA256 sum of the executable associated with the detection.

type: keyword

crowdstrike.event.MD5String

MD5 sum of the executable associated with the detection.

type: keyword

crowdstrike.event.MachineDomain

Domain for the machine associated with the detection.

type: keyword

crowdstrike.event.FalconHostLink

URL to view the detection in Falcon.

type: keyword

crowdstrike.event.SensorId

Unique ID associated with the Falcon sensor.

type: keyword

crowdstrike.event.DetectId

Unique ID associated with the detection.

type: keyword

crowdstrike.event.LocalIP

IP address of the host associated with the detection.

type: keyword

crowdstrike.event.MACAddress

MAC address of the host associated with the detection.

type: keyword

crowdstrike.event.Tactic

MITRE tactic category of the detection.

type: keyword

crowdstrike.event.Technique

MITRE technique category of the detection.

type: keyword

crowdstrike.event.Objective

Method of detection.

type: keyword

crowdstrike.event.PatternDispositionDescription

Action taken by Falcon.

type: keyword

crowdstrike.event.PatternDispositionValue

Unique ID associated with action taken.

type: integer

crowdstrike.event.PatternDispositionFlags

Flags indicating actions taken.

type: object

crowdstrike.event.State

Whether the incident summary is open and ongoing or closed.

type: keyword

crowdstrike.event.IncidentStartTime

Start time for the incident in UTC UNIX format.

type: date

crowdstrike.event.IncidentEndTime

End time for the incident in UTC UNIX format.

type: date

crowdstrike.event.FineScore

Score for incident.

type: float

crowdstrike.event.UserId

Email address or user ID associated with the event.

type: keyword

crowdstrike.event.UserIp

IP address associated with the user.

type: keyword

crowdstrike.event.OperationName

Event subtype.

type: keyword

crowdstrike.event.ServiceName

Service associated with this event.

type: keyword

crowdstrike.event.Success

Indicator of whether or not this event was successful.

type: boolean

crowdstrike.event.UTCTimestamp

Timestamp associated with this event in UTC UNIX format.

type: date

crowdstrike.event.AuditKeyValues

Fields that were changed in this event.

type: nested

crowdstrike.event.ExecutablesWritten

Detected executables written to disk by a process.

type: nested

crowdstrike.event.SessionId

Session ID of the remote response session.

type: keyword

crowdstrike.event.HostnameField

Host name of the machine for the remote session.

type: keyword

crowdstrike.event.StartTimestamp

Start time for the remote session in UTC UNIX format.

type: date

crowdstrike.event.EndTimestamp

End time for the remote session in UTC UNIX format.

type: date

crowdstrike.event.LateralMovement

Lateral movement field for incident.

type: long

crowdstrike.event.ParentImageFileName

Path to the parent process.

type: keyword

crowdstrike.event.ParentCommandLine

Parent process command line arguments.

type: keyword

crowdstrike.event.GrandparentImageFileName

Path to the grandparent process.

type: keyword

crowdstrike.event.GrandparentCommandLine

Grandparent process command line arguments.

type: keyword

crowdstrike.event.IOCType

CrowdStrike type for indicator of compromise.

type: keyword

crowdstrike.event.IOCValue

CrowdStrike value for indicator of compromise.

type: keyword

crowdstrike.event.CustomerId

Customer identifier.

type: keyword

crowdstrike.event.DeviceId

Device on which the event occurred.

type: keyword

crowdstrike.event.Ipv

Protocol for network request.

type: keyword

crowdstrike.event.ConnectionDirection

Direction for network connection.

type: keyword

crowdstrike.event.EventType

CrowdStrike provided event type.

type: keyword

crowdstrike.event.HostName

Host name of the local machine.

type: keyword

crowdstrike.event.ICMPCode

RFC2780 ICMP Code field.

type: keyword

crowdstrike.event.ICMPType

RFC2780 ICMP Type field.

type: keyword

crowdstrike.event.ImageFileName

File name of the associated process for the detection.

type: keyword

crowdstrike.event.PID

Associated process id for the detection.

type: long

crowdstrike.event.LocalAddress

IP address of local machine.

type: ip

crowdstrike.event.LocalPort

Port of local machine.

type: long

crowdstrike.event.RemoteAddress

IP address of remote machine.

type: ip

crowdstrike.event.RemotePort

Port of remote machine.

type: long

crowdstrike.event.RuleAction

Firewall rule action.

type: keyword

crowdstrike.event.RuleDescription

Firewall rule description.

type: keyword

crowdstrike.event.RuleFamilyID

Firewall rule family id.

type: keyword

crowdstrike.event.RuleGroupName

Firewall rule group name.

type: keyword

crowdstrike.event.RuleName

Firewall rule name.

type: keyword

crowdstrike.event.RuleId

Firewall rule id.

type: keyword

crowdstrike.event.MatchCount

Number of firewall rule matches.

type: long

crowdstrike.event.MatchCountSinceLastReport

Number of firewall rule matches since the last report.

type: long

crowdstrike.event.Timestamp

Firewall rule triggered timestamp.

type: date

crowdstrike.event.Flags.Audit

CrowdStrike audit flag.

type: boolean

crowdstrike.event.Flags.Log

CrowdStrike log flag.

type: boolean

crowdstrike.event.Flags.Monitor

CrowdStrike monitor flag.

type: boolean

crowdstrike.event.Protocol

CrowdStrike provided protocol.

type: keyword

crowdstrike.event.NetworkProfile

CrowdStrike network profile.

type: keyword

crowdstrike.event.PolicyName

CrowdStrike policy name.

type: keyword

crowdstrike.event.PolicyID

CrowdStrike policy id.

type: keyword

crowdstrike.event.Status

CrowdStrike status.

type: keyword

crowdstrike.event.TreeID

CrowdStrike tree id.

type: keyword

crowdstrike.event.Commands

Commands run in a remote session.

type: keyword