Module for collecting Crowdstrike events.
Fields for Crowdstrike Falcon event and alert data.
Meta data fields for each event that include type and timestamp.
-
crowdstrike.metadata.eventType
-
DetectionSummaryEvent, FirewallMatchEvent, IncidentSummaryEvent, RemoteResponseSessionStartEvent, RemoteResponseSessionEndEvent, AuthActivityAuditEvent, or UserActivityAuditEvent
type: keyword
-
crowdstrike.metadata.eventCreationTime
-
The time this event occurred on the endpoint in UTC UNIX_MS format.
type: date
-
crowdstrike.metadata.offset
-
Offset number that tracks the location of the event in stream. This is used to identify unique detection events.
type: integer
-
crowdstrike.metadata.customerIDString
-
Customer identifier
type: keyword
-
crowdstrike.metadata.version
-
Schema version
type: keyword
Event data fields for each event and alert.
-
crowdstrike.event.ProcessStartTime
-
The process start time in UTC UNIX_MS format.
type: date
-
crowdstrike.event.ProcessEndTime
-
The process termination time in UTC UNIX_MS format.
type: date
-
crowdstrike.event.ProcessId
-
Process ID related to the detection.
type: integer
-
crowdstrike.event.ParentProcessId
-
Parent process ID related to the detection.
type: integer
-
crowdstrike.event.ComputerName
-
Name of the computer where the detection occurred.
type: keyword
-
crowdstrike.event.UserName
-
User name associated with the detection.
type: keyword
-
crowdstrike.event.DetectName
-
Name of the detection.
type: keyword
-
crowdstrike.event.DetectDescription
-
Description of the detection.
type: keyword
-
crowdstrike.event.Severity
-
Severity score of the detection.
type: integer
-
crowdstrike.event.SeverityName
-
Severity score text.
type: keyword
-
crowdstrike.event.FileName
-
File name of the associated process for the detection.
type: keyword
-
crowdstrike.event.FilePath
-
Path of the executable associated with the detection.
type: keyword
-
crowdstrike.event.CommandLine
-
Executable path with command line arguments.
type: keyword
-
crowdstrike.event.SHA1String
-
SHA1 sum of the executable associated with the detection.
type: keyword
-
crowdstrike.event.SHA256String
-
SHA256 sum of the executable associated with the detection.
type: keyword
-
crowdstrike.event.MD5String
-
MD5 sum of the executable associated with the detection.
type: keyword
-
crowdstrike.event.MachineDomain
-
Domain for the machine associated with the detection.
type: keyword
-
crowdstrike.event.FalconHostLink
-
URL to view the detection in Falcon.
type: keyword
-
crowdstrike.event.SensorId
-
Unique ID associated with the Falcon sensor.
type: keyword
-
crowdstrike.event.DetectId
-
Unique ID associated with the detection.
type: keyword
-
crowdstrike.event.LocalIP
-
IP address of the host associated with the detection.
type: keyword
-
crowdstrike.event.MACAddress
-
MAC address of the host associated with the detection.
type: keyword
-
crowdstrike.event.Tactic
-
MITRE tactic category of the detection.
type: keyword
-
crowdstrike.event.Technique
-
MITRE technique category of the detection.
type: keyword
-
crowdstrike.event.Objective
-
Method of detection.
type: keyword
-
crowdstrike.event.PatternDispositionDescription
-
Action taken by Falcon.
type: keyword
-
crowdstrike.event.PatternDispositionValue
-
Unique ID associated with action taken.
type: integer
-
crowdstrike.event.PatternDispositionFlags
-
Flags indicating actions taken.
type: object
-
crowdstrike.event.State
-
Whether the incident summary is open and ongoing or closed.
type: keyword
-
crowdstrike.event.IncidentStartTime
-
Start time for the incident in UTC UNIX format.
type: date
-
crowdstrike.event.IncidentEndTime
-
End time for the incident in UTC UNIX format.
type: date
-
crowdstrike.event.FineScore
-
Score for incident.
type: float
-
crowdstrike.event.UserId
-
Email address or user ID associated with the event.
type: keyword
-
crowdstrike.event.UserIp
-
IP address associated with the user.
type: keyword
-
crowdstrike.event.OperationName
-
Event subtype.
type: keyword
-
crowdstrike.event.ServiceName
-
Service associated with this event.
type: keyword
-
crowdstrike.event.Success
-
Indicator of whether or not this event was successful.
type: boolean
-
crowdstrike.event.UTCTimestamp
-
Timestamp associated with this event in UTC UNIX format.
type: date
-
crowdstrike.event.AuditKeyValues
-
Fields that were changed in this event.
type: nested
-
crowdstrike.event.ExecutablesWritten
-
Detected executables written to disk by a process.
type: nested
-
crowdstrike.event.SessionId
-
Session ID of the remote response session.
type: keyword
-
crowdstrike.event.HostnameField
-
Host name of the machine for the remote session.
type: keyword
-
crowdstrike.event.StartTimestamp
-
Start time for the remote session in UTC UNIX format.
type: date
-
crowdstrike.event.EndTimestamp
-
End time for the remote session in UTC UNIX format.
type: date
-
crowdstrike.event.LateralMovement
-
Lateral movement field for incident.
type: long
-
crowdstrike.event.ParentImageFileName
-
Path to the parent process.
type: keyword
-
crowdstrike.event.ParentCommandLine
-
Parent process command line arguments.
type: keyword
-
crowdstrike.event.GrandparentImageFileName
-
Path to the grandparent process.
type: keyword
-
crowdstrike.event.GrandparentCommandLine
-
Grandparent process command line arguments.
type: keyword
-
crowdstrike.event.IOCType
-
CrowdStrike type for indicator of compromise.
type: keyword
-
crowdstrike.event.IOCValue
-
CrowdStrike value for indicator of compromise.
type: keyword
-
crowdstrike.event.CustomerId
-
Customer identifier.
type: keyword
-
crowdstrike.event.DeviceId
-
Device on which the event occurred.
type: keyword
-
crowdstrike.event.Ipv
-
Protocol for network request.
type: keyword
-
crowdstrike.event.ConnectionDirection
-
Direction for network connection.
type: keyword
-
crowdstrike.event.EventType
-
CrowdStrike provided event type.
type: keyword
-
crowdstrike.event.HostName
-
Host name of the local machine.
type: keyword
-
crowdstrike.event.ICMPCode
-
RFC2780 ICMP Code field.
type: keyword
-
crowdstrike.event.ICMPType
-
RFC2780 ICMP Type field.
type: keyword
-
crowdstrike.event.ImageFileName
-
File name of the associated process for the detection.
type: keyword
-
crowdstrike.event.PID
-
Associated process id for the detection.
type: long
-
crowdstrike.event.LocalAddress
-
IP address of local machine.
type: ip
-
crowdstrike.event.LocalPort
-
Port of local machine.
type: long
-
crowdstrike.event.RemoteAddress
-
IP address of remote machine.
type: ip
-
crowdstrike.event.RemotePort
-
Port of remote machine.
type: long
-
crowdstrike.event.RuleAction
-
Firewall rule action.
type: keyword
-
crowdstrike.event.RuleDescription
-
Firewall rule description.
type: keyword
-
crowdstrike.event.RuleFamilyID
-
Firewall rule family id.
type: keyword
-
crowdstrike.event.RuleGroupName
-
Firewall rule group name.
type: keyword
-
crowdstrike.event.RuleName
-
Firewall rule name.
type: keyword
-
crowdstrike.event.RuleId
-
Firewall rule id.
type: keyword
-
crowdstrike.event.MatchCount
-
Number of firewall rule matches.
type: long
-
crowdstrike.event.MatchCountSinceLastReport
-
Number of firewall rule matches since the last report.
type: long
-
crowdstrike.event.Timestamp
-
Firewall rule triggered timestamp.
type: date
-
crowdstrike.event.Flags.Audit
-
CrowdStrike audit flag.
type: boolean
-
crowdstrike.event.Flags.Log
-
CrowdStrike log flag.
type: boolean
-
crowdstrike.event.Flags.Monitor
-
CrowdStrike monitor flag.
type: boolean
-
crowdstrike.event.Protocol
-
CrowdStrike provided protocol.
type: keyword
-
crowdstrike.event.NetworkProfile
-
CrowdStrike network profile.
type: keyword
-
crowdstrike.event.PolicyName
-
CrowdStrike policy name.
type: keyword
-
crowdstrike.event.PolicyID
-
CrowdStrike policy id.
type: keyword
-
crowdstrike.event.Status
-
CrowdStrike status.
type: keyword
-
crowdstrike.event.TreeID
-
CrowdStrike tree id.
type: keyword
-
crowdstrike.event.Commands
-
Commands run in a remote session.
type: keyword