Skip to content

Latest commit

 

History

History
 
 

Folders and files

NameName
Last commit message
Last commit date

parent directory

..
 
 
 
 
 
 
 
 
 
 

README.md

Endpoint Security Integration

This integration sets up templates and index patterns required for Endpoint Security.

Compatibility

For compatibility information view our documentation.

Logs

The log type of documents are stored in the logs-endpoint.* indices. The following sections define the mapped fields sent by the endpoint.

alerts

Exported fields

Field Description Type
@timestamp Date/time when the event originated. This is the date/time extracted from the event, typically representing when the event was generated by the source. If the event source has no original timestamp, this value is typically populated by the first time the event was received by the pipeline. Required field for all events. date
Endpoint.policy The policy fields are used to hold information about applied policy. object
Endpoint.policy.applied information about the policy that is applied object
Endpoint.policy.applied.id the id of the applied policy keyword
Endpoint.policy.applied.name the name of this applied policy keyword
Endpoint.policy.applied.status the status of the applied policy keyword
Endpoint.policy.applied.version the version of this applied policy keyword
Ransomware.child_pids Array of child PIDs for ransomware which spawns numerous processes to handle encryption. long
Ransomware.feature Ransomware feature which triggered the alert. keyword
Ransomware.files Information about each file event attributed to the ransomware. Expected to be an array. nested
Ransomware.files.data File header or MBR bytes. binary
Ransomware.files.entropy Entropy of file contents. double
Ransomware.files.extension File extension, excluding the leading dot. keyword
Ransomware.files.metrics Suspicious ransomware behaviours associated with the file event. keyword
Ransomware.files.operation Operation applied to file. keyword
Ransomware.files.original.extension Original file extension prior to the file event. keyword
Ransomware.files.original.path Original file path prior to the file event. keyword
Ransomware.files.path Full path to the file, including the file name. keyword
Ransomware.files.score Ransomware score for this particular file event. double
Ransomware.score Total ransomware score for aggregated file events. double
Ransomware.version Ransomware artifact version. keyword
Target.dll.Ext Object for all custom defined fields to live in. object
Target.dll.Ext.code_signature Nested version of ECS code_signature fieldset. nested
Target.dll.Ext.code_signature.exists Boolean to capture if a signature is present. boolean
Target.dll.Ext.code_signature.status Additional information about the certificate status. This is useful for logging cryptographic errors with the certificate validity or trust status. Leave unpopulated if the validity or trust of the certificate was unchecked. keyword
Target.dll.Ext.code_signature.subject_name Subject name of the code signer keyword
Target.dll.Ext.code_signature.trusted Stores the trust status of the certificate chain. Validating the trust of the certificate chain may be complicated, and this field should only be populated by tools that actively check the status. boolean
Target.dll.Ext.code_signature.valid Boolean to capture if the digital signature is verified against the binary content. Leave unpopulated if a certificate was unchecked. boolean
Target.dll.Ext.compile_time Timestamp from when the module was compiled. date
Target.dll.Ext.malware_classification.identifier The model's unique identifier. keyword
Target.dll.Ext.malware_classification.score The score produced by the classification model. double
Target.dll.Ext.malware_classification.threshold The score threshold for the model. Files that score above this threshold are considered malicious. double
Target.dll.Ext.malware_classification.upx_packed Whether UPX packing was detected. boolean
Target.dll.Ext.malware_classification.version The version of the model used. keyword
Target.dll.Ext.mapped_address The base address where this module is loaded. keyword
Target.dll.Ext.mapped_size The size of this module's memory mapping, in bytes. long
Target.dll.hash.md5 MD5 hash. keyword
Target.dll.hash.sha1 SHA1 hash. keyword
Target.dll.hash.sha256 SHA256 hash. keyword
Target.dll.hash.sha512 SHA512 hash. keyword
Target.dll.name Name of the library. This generally maps to the name of the file on disk. keyword
Target.dll.path Full file path of the library. keyword
Target.dll.pe.company Internal company name of the file, provided at compile-time. keyword
Target.dll.pe.description Internal description of the file, provided at compile-time. keyword
Target.dll.pe.file_version Internal version of the file, provided at compile-time. keyword
Target.dll.pe.imphash A hash of the imports in a PE file. An imphash -- or import hash -- can be used to fingerprint binaries even after recompilation or other code-level transformations have occurred, which would change more traditional hash values. Learn more at https://www.fireeye.com/blog/threat-research/2014/01/tracking-malware-import-hashing.html. keyword
Target.dll.pe.original_file_name Internal name of the file, provided at compile-time. keyword
Target.dll.pe.product Internal product name of the file, provided at compile-time. keyword
Target.process.Ext Object for all custom defined fields to live in. object
Target.process.Ext.ancestry An array of entity_ids indicating the ancestors for this event keyword
Target.process.Ext.authentication_id Process authentication ID keyword
Target.process.Ext.code_signature Nested version of ECS code_signature fieldset. nested
Target.process.Ext.code_signature.exists Boolean to capture if a signature is present. boolean
Target.process.Ext.code_signature.status Additional information about the certificate status. This is useful for logging cryptographic errors with the certificate validity or trust status. Leave unpopulated if the validity or trust of the certificate was unchecked. keyword
Target.process.Ext.code_signature.subject_name Subject name of the code signer keyword
Target.process.Ext.code_signature.trusted Stores the trust status of the certificate chain. Validating the trust of the certificate chain may be complicated, and this field should only be populated by tools that actively check the status. boolean
Target.process.Ext.code_signature.valid Boolean to capture if the digital signature is verified against the binary content. Leave unpopulated if a certificate was unchecked. boolean
Target.process.Ext.malware_classification.identifier The model's unique identifier. keyword
Target.process.Ext.malware_classification.score The score produced by the classification model. double
Target.process.Ext.malware_classification.threshold The score threshold for the model. Files that score above this threshold are considered malicious. double
Target.process.Ext.malware_classification.upx_packed Whether UPX packing was detected. boolean
Target.process.Ext.malware_classification.version The version of the model used. keyword
Target.process.Ext.services Services running in this process. keyword
Target.process.Ext.session Session information for the current process keyword
Target.process.Ext.token.domain Domain of token user. keyword
Target.process.Ext.token.elevation Whether the token is elevated or not boolean
Target.process.Ext.token.elevation_type What level of elevation the token has keyword
Target.process.Ext.token.impersonation_level Impersonation level. Only valid for impersonation tokens. keyword
Target.process.Ext.token.integrity_level Numeric integrity level. long
Target.process.Ext.token.integrity_level_name Human readable integrity level. keyword
Target.process.Ext.token.is_appcontainer Whether or not this is an appcontainer token. boolean
Target.process.Ext.token.privileges Array describing the privileges associated with the token. nested
Target.process.Ext.token.privileges.description Description of the privilege. keyword
Target.process.Ext.token.privileges.enabled Whether or not the privilege is enabled. boolean
Target.process.Ext.token.privileges.name Name of the privilege. keyword
Target.process.Ext.token.sid Token user's Security Identifier (SID). keyword
Target.process.Ext.token.type Type of the token, either primary or impersonation. keyword
Target.process.Ext.token.user Username of token owner. keyword
Target.process.Ext.user User associated with the running process. keyword
Target.process.args Array of process arguments, starting with the absolute path to the executable. May be filtered to protect sensitive information. keyword
Target.process.args_count Length of the process.args array. This field can be useful for querying or performing bucket analysis on how many arguments were provided to start a process. More arguments may be an indication of suspicious activity. long
Target.process.command_line Full command line that started the process, including the absolute path to the executable, and all arguments. Some arguments may be filtered to protect sensitive information. keyword
Target.process.entity_id Unique identifier for the process. The implementation of this is specified by the data source, but some examples of what could be used here are a process-generated UUID, Sysmon Process GUIDs, or a hash of some uniquely identifying components of a process. Constructing a globally unique identifier is a common practice to mitigate PID reuse as well as to identify a specific process over time, across multiple monitored hosts. keyword
Target.process.executable Absolute path to the process executable. keyword
Target.process.exit_code The exit code of the process, if this is a termination event. The field should be absent if there is no exit code for the event (e.g. process start). long
Target.process.hash.md5 MD5 hash. keyword
Target.process.hash.sha1 SHA1 hash. keyword
Target.process.hash.sha256 SHA256 hash. keyword
Target.process.hash.sha512 SHA512 hash. keyword
Target.process.name Process name. Sometimes called program name or similar. keyword
Target.process.parent.Ext Object for all custom defined fields to live in. object
Target.process.parent.Ext.code_signature Nested version of ECS code_signature fieldset. nested
Target.process.parent.Ext.code_signature.exists Boolean to capture if a signature is present. boolean
Target.process.parent.Ext.code_signature.status Additional information about the certificate status. This is useful for logging cryptographic errors with the certificate validity or trust status. Leave unpopulated if the validity or trust of the certificate was unchecked. keyword
Target.process.parent.Ext.code_signature.subject_name Subject name of the code signer keyword
Target.process.parent.Ext.code_signature.trusted Stores the trust status of the certificate chain. Validating the trust of the certificate chain may be complicated, and this field should only be populated by tools that actively check the status. boolean
Target.process.parent.Ext.code_signature.valid Boolean to capture if the digital signature is verified against the binary content. Leave unpopulated if a certificate was unchecked. boolean
Target.process.parent.Ext.real The field set containing process info in case of any pid spoofing. This is mainly useful for process.parent. object
Target.process.parent.Ext.real.pid For process.parent this will be the ppid of the process that actually spawned the current process. long
Target.process.parent.args Array of process arguments, starting with the absolute path to the executable. May be filtered to protect sensitive information. keyword
Target.process.parent.args_count Length of the process.args array. This field can be useful for querying or performing bucket analysis on how many arguments were provided to start a process. More arguments may be an indication of suspicious activity. long
Target.process.parent.command_line Full command line that started the process, including the absolute path to the executable, and all arguments. Some arguments may be filtered to protect sensitive information. keyword
Target.process.parent.entity_id Unique identifier for the process. The implementation of this is specified by the data source, but some examples of what could be used here are a process-generated UUID, Sysmon Process GUIDs, or a hash of some uniquely identifying components of a process. Constructing a globally unique identifier is a common practice to mitigate PID reuse as well as to identify a specific process over time, across multiple monitored hosts. keyword
Target.process.parent.executable Absolute path to the process executable. keyword
Target.process.parent.exit_code The exit code of the process, if this is a termination event. The field should be absent if there is no exit code for the event (e.g. process start). long
Target.process.parent.hash.md5 MD5 hash. keyword
Target.process.parent.hash.sha1 SHA1 hash. keyword
Target.process.parent.hash.sha256 SHA256 hash. keyword
Target.process.parent.hash.sha512 SHA512 hash. keyword
Target.process.parent.name Process name. Sometimes called program name or similar. keyword
Target.process.parent.pgid Identifier of the group of processes the process belongs to. long
Target.process.parent.pid Process id. long
Target.process.parent.ppid Parent process' pid. long
Target.process.parent.start The time the process started. date
Target.process.parent.thread.id Thread ID. long
Target.process.parent.thread.name Thread name. keyword
Target.process.parent.title Process title. The proctitle, some times the same as process name. Can also be different: for example a browser setting its title to the web page currently opened. keyword
Target.process.parent.uptime Seconds the process has been up. long
Target.process.parent.working_directory The working directory of the process. keyword
Target.process.pe.company Internal company name of the file, provided at compile-time. keyword
Target.process.pe.description Internal description of the file, provided at compile-time. keyword
Target.process.pe.file_version Internal version of the file, provided at compile-time. keyword
Target.process.pe.imphash A hash of the imports in a PE file. An imphash -- or import hash -- can be used to fingerprint binaries even after recompilation or other code-level transformations have occurred, which would change more traditional hash values. Learn more at https://www.fireeye.com/blog/threat-research/2014/01/tracking-malware-import-hashing.html. keyword
Target.process.pe.original_file_name Internal name of the file, provided at compile-time. keyword
Target.process.pe.product Internal product name of the file, provided at compile-time. keyword
Target.process.pgid Identifier of the group of processes the process belongs to. long
Target.process.pid Process id. long
Target.process.ppid Parent process' pid. long
Target.process.start The time the process started. date
Target.process.thread.Ext Object for all custom defined fields to live in. object
Target.process.thread.Ext.service Service associated with the thread. keyword
Target.process.thread.Ext.start The time the thread started. date
Target.process.thread.Ext.start_address Memory address where the thread began execution. keyword
Target.process.thread.Ext.start_address_module The dll/module where the thread began execution. keyword
Target.process.thread.Ext.token.domain Domain of token user. keyword
Target.process.thread.Ext.token.elevation Whether the token is elevated or not boolean
Target.process.thread.Ext.token.elevation_type What level of elevation the token has keyword
Target.process.thread.Ext.token.impersonation_level Impersonation level. Only valid for impersonation tokens. keyword
Target.process.thread.Ext.token.integrity_level Numeric integrity level. long
Target.process.thread.Ext.token.integrity_level_name Human readable integrity level. keyword
Target.process.thread.Ext.token.is_appcontainer Whether or not this is an appcontainer token. boolean
Target.process.thread.Ext.token.privileges Array describing the privileges associated with the token. nested
Target.process.thread.Ext.token.privileges.description Description of the privilege. keyword
Target.process.thread.Ext.token.privileges.enabled Whether or not the privilege is enabled. boolean
Target.process.thread.Ext.token.privileges.name Name of the privilege. keyword
Target.process.thread.Ext.token.sid Token user's Security Identifier (SID). keyword
Target.process.thread.Ext.token.type Type of the token, either primary or impersonation. keyword
Target.process.thread.Ext.token.user Username of token owner. keyword
Target.process.thread.Ext.uptime Seconds since thread started. long
Target.process.thread.id Thread ID. long
Target.process.thread.name Thread name. keyword
Target.process.title Process title. The proctitle, some times the same as process name. Can also be different: for example a browser setting its title to the web page currently opened. keyword
Target.process.uptime Seconds the process has been up. long
Target.process.working_directory The working directory of the process. keyword
agent.ephemeral_id Ephemeral identifier of this agent (if one exists). This id normally changes across restarts, but agent.id does not. keyword
agent.id Unique identifier of this agent (if one exists). Example: For Beats this would be beat.id. keyword
agent.name Custom name of the agent. This is a name that can be given to an agent. This can be helpful if for example two Filebeat instances are running on the same host but a human readable separation is needed on which Filebeat instance data is coming from. If no name is given, the name is often left empty. keyword
agent.type Type of the agent. The agent type always stays the same and should be given by the agent used. In case of Filebeat the agent would always be Filebeat also if two Filebeat instances are run on the same machine. keyword
agent.version Version of the agent. keyword
data_stream.dataset Data stream dataset name. constant_keyword
data_stream.namespace Data stream namespace. constant_keyword
data_stream.type Data stream type. constant_keyword
destination.geo.city_name City name. keyword
destination.geo.continent_name Name of the continent. keyword
destination.geo.country_iso_code Country ISO code. keyword
destination.geo.country_name Country name. keyword
destination.geo.location Longitude and latitude. geo_point
destination.geo.name User-defined description of a location, at the level of granularity they care about. Could be the name of their data centers, the floor number, if this describes a local physical entity, city names. Not typically used in automated geolocation. keyword
destination.geo.region_iso_code Region ISO code. keyword
destination.geo.region_name Region name. keyword
dll.Ext Object for all custom defined fields to live in. object
dll.Ext.code_signature Nested version of ECS code_signature fieldset. nested
dll.Ext.code_signature.exists Boolean to capture if a signature is present. boolean
dll.Ext.code_signature.status Additional information about the certificate status. This is useful for logging cryptographic errors with the certificate validity or trust status. Leave unpopulated if the validity or trust of the certificate was unchecked. keyword
dll.Ext.code_signature.subject_name Subject name of the code signer keyword
dll.Ext.code_signature.trusted Stores the trust status of the certificate chain. Validating the trust of the certificate chain may be complicated, and this field should only be populated by tools that actively check the status. boolean
dll.Ext.code_signature.valid Boolean to capture if the digital signature is verified against the binary content. Leave unpopulated if a certificate was unchecked. boolean
dll.Ext.compile_time Timestamp from when the module was compiled. date
dll.Ext.malware_classification.identifier The model's unique identifier. keyword
dll.Ext.malware_classification.score The score produced by the classification model. double
dll.Ext.malware_classification.threshold The score threshold for the model. Files that score above this threshold are considered malicious. double
dll.Ext.malware_classification.upx_packed Whether UPX packing was detected. boolean
dll.Ext.malware_classification.version The version of the model used. keyword
dll.Ext.mapped_address The base address where this module is loaded. keyword
dll.Ext.mapped_size The size of this module's memory mapping, in bytes. long
dll.hash.md5 MD5 hash. keyword
dll.hash.sha1 SHA1 hash. keyword
dll.hash.sha256 SHA256 hash. keyword
dll.hash.sha512 SHA512 hash. keyword
dll.name Name of the library. This generally maps to the name of the file on disk. keyword
dll.path Full file path of the library. keyword
dll.pe.company Internal company name of the file, provided at compile-time. keyword
dll.pe.description Internal description of the file, provided at compile-time. keyword
dll.pe.file_version Internal version of the file, provided at compile-time. keyword
dll.pe.imphash A hash of the imports in a PE file. An imphash -- or import hash -- can be used to fingerprint binaries even after recompilation or other code-level transformations have occurred, which would change more traditional hash values. Learn more at https://www.fireeye.com/blog/threat-research/2014/01/tracking-malware-import-hashing.html. keyword
dll.pe.original_file_name Internal name of the file, provided at compile-time. keyword
dll.pe.product Internal product name of the file, provided at compile-time. keyword
ecs.version ECS version this event conforms to. ecs.version is a required field and must exist in all events. When querying across multiple indices -- which may conform to slightly different ECS versions -- this field lets integrations adjust to the schema version of the events. keyword
elastic.agent The agent fields contain data about the Elastic Agent. The Elastic Agent is the management agent that manages other agents or process on the host. object
elastic.agent.id Unique identifier of this elastic agent (if one exists). keyword
event.action The action captured by the event. This describes the information in the event. It is more specific than event.category. Examples are group-add, process-started, file-created. The value is normally defined by the implementer. keyword
event.category This is one of four ECS Categorization Fields, and indicates the second level in the ECS category hierarchy. event.category represents the "big buckets" of ECS categories. For example, filtering on event.category:process yields all events relating to process activity. This field is closely related to event.type, which is used as a subcategory. This field is an array. This will allow proper categorization of some events that fall in multiple categories. keyword
event.code Identification code for this event, if one exists. Some event sources use event codes to identify messages unambiguously, regardless of message language or wording adjustments over time. An example of this is the Windows Event ID. keyword
event.created event.created contains the date/time when the event was first read by an agent, or by your pipeline. This field is distinct from @timestamp in that @timestamp typically contain the time extracted from the original event. In most situations, these two timestamps will be slightly different. The difference can be used to calculate the delay between your source generating an event, and the time when your agent first processed it. This can be used to monitor your agent's or pipeline's ability to keep up with your event source. In case the two timestamps are identical, @timestamp should be used. date
event.dataset Name of the dataset. If an event source publishes more than one type of log or events (e.g. access log, error log), the dataset is used to specify which one the event comes from. It's recommended but not required to start the dataset name with the module name, followed by a dot, then the dataset name. keyword
event.hash Hash (perhaps logstash fingerprint) of raw field to be able to demonstrate log integrity. keyword
event.id Unique ID to describe the event. keyword
event.ingested Timestamp when an event arrived in the central data store. This is different from @timestamp, which is when the event originally occurred. It's also different from event.created, which is meant to capture the first time an agent saw the event. In normal conditions, assuming no tampering, the timestamps should chronologically look like this: @timestamp < event.created < event.ingested. date
event.kind This is one of four ECS Categorization Fields, and indicates the highest level in the ECS category hierarchy. event.kind gives high-level information about what type of information the event contains, without being specific to the contents of the event. For example, values of this field distinguish alert events from metric events. The value of this field can be used to inform how these kinds of events should be handled. They may warrant different retention, different access control, it may also help understand whether the data coming in at a regular interval or not. keyword
event.module Name of the module this data is coming from. If your monitoring agent supports the concept of modules or plugins to process events of a given source (e.g. Apache logs), event.module should contain the name of this module. keyword
event.outcome This is one of four ECS Categorization Fields, and indicates the lowest level in the ECS category hierarchy. event.outcome simply denotes whether the event represents a success or a failure from the perspective of the entity that produced the event. Note that when a single transaction is described in multiple events, each event may populate different values of event.outcome, according to their perspective. Also note that in the case of a compound event (a single event that contains multiple logical events), this field should be populated with the value that best captures the overall success or failure from the perspective of the event producer. Further note that not all events will have an associated outcome. For example, this field is generally not populated for metric events, events with event.type:info, or any events for which an outcome does not make logical sense. keyword
event.provider Source of the event. Event transports such as Syslog or the Windows Event Log typically mention the source of an event. It can be the name of the software that generated the event (e.g. Sysmon, httpd), or of a subsystem of the operating system (kernel, Microsoft-Windows-Security-Auditing). keyword
event.sequence Sequence number of the event. The sequence number is a value published by some event sources, to make the exact ordering of events unambiguous, regardless of the timestamp precision. long
event.severity The numeric severity of the event according to your event source. What the different severity values mean can be different between sources and use cases. It's up to the implementer to make sure severities are consistent across events from the same source. The Syslog severity belongs in log.syslog.severity.code. event.severity is meant to represent the severity according to the event source (e.g. firewall, IDS). If the event source does not publish its own severity, you may optionally copy the log.syslog.severity.code to event.severity. long
event.type This is one of four ECS Categorization Fields, and indicates the third level in the ECS category hierarchy. event.type represents a categorization "sub-bucket" that, when used along with the event.category field values, enables filtering events down to a level appropriate for single visualization. This field is an array. This will allow proper categorization of some events that fall in multiple event types. keyword
file.Ext Object for all custom defined fields to live in. object
file.Ext.code_signature Nested version of ECS code_signature fieldset. nested
file.Ext.code_signature.exists Boolean to capture if a signature is present. boolean
file.Ext.code_signature.status Additional information about the certificate status. This is useful for logging cryptographic errors with the certificate validity or trust status. Leave unpopulated if the validity or trust of the certificate was unchecked. keyword
file.Ext.code_signature.subject_name Subject name of the code signer keyword
file.Ext.code_signature.trusted Stores the trust status of the certificate chain. Validating the trust of the certificate chain may be complicated, and this field should only be populated by tools that actively check the status. boolean
file.Ext.code_signature.valid Boolean to capture if the digital signature is verified against the binary content. Leave unpopulated if a certificate was unchecked. boolean
file.Ext.entry_modified Time of last status change. See st_ctim member of struct stat. double
file.Ext.macro.code_page Identifies the character encoding used for this macro. https://docs.microsoft.com/en-us/windows/win32/intl/code-page-identifiers long
file.Ext.macro.collection Object containing hashes for the macro collection. object
file.Ext.macro.collection.hash.md5 MD5 hash. keyword
file.Ext.macro.collection.hash.sha1 SHA1 hash. keyword
file.Ext.macro.collection.hash.sha256 SHA256 hash. keyword
file.Ext.macro.collection.hash.sha512 SHA512 hash. keyword
file.Ext.macro.errors Errors that occurred when parsing this document file. nested
file.Ext.macro.errors.count Number of times this error that occurred. long
file.Ext.macro.errors.error_type The type of parsing error that occurred. keyword
file.Ext.macro.file_extension The extension of the file containing this macro (e.g. .docm) keyword
file.Ext.macro.project_file Metadata about the corresponding VBA project file object
file.Ext.macro.project_file.hash.md5 MD5 hash. keyword
file.Ext.macro.project_file.hash.sha1 SHA1 hash. keyword
file.Ext.macro.project_file.hash.sha256 SHA256 hash. keyword
file.Ext.macro.project_file.hash.sha512 SHA512 hash. keyword
file.Ext.macro.stream Streams associated with the document. nested
file.Ext.macro.stream.hash.md5 MD5 hash. keyword
file.Ext.macro.stream.hash.sha1 SHA1 hash. keyword
file.Ext.macro.stream.hash.sha256 SHA256 hash. keyword
file.Ext.macro.stream.hash.sha512 SHA512 hash. keyword
file.Ext.macro.stream.name Name of the stream. keyword
file.Ext.macro.stream.raw_code First 100KB of raw stream binary. Can be useful to analyze false positives and malicious payloads. keyword
file.Ext.macro.stream.raw_code_size The original stream size. Indicates whether stream.raw_code was truncated. keyword
file.Ext.malware_classification.identifier The model's unique identifier. keyword
file.Ext.malware_classification.score The score produced by the classification model. double
file.Ext.malware_classification.threshold The score threshold for the model. Files that score above this threshold are considered malicious. double
file.Ext.malware_classification.upx_packed Whether UPX packing was detected. boolean
file.Ext.malware_classification.version The version of the model used. keyword
file.Ext.original Original file information during a modification event. object
file.Ext.original.gid Primary group ID (GID) of the file. keyword
file.Ext.original.group Primary group name of the file. keyword
file.Ext.original.mode Original file mode prior to a modification event keyword
file.Ext.original.name Original file name prior to a modification event keyword
file.Ext.original.owner File owner's username. keyword
file.Ext.original.path Original file path prior to a modification event keyword
file.Ext.original.uid The user ID (UID) or security identifier (SID) of the file owner. keyword
file.Ext.quarantine_path Path on endpoint the quarantined file was originally. keyword
file.Ext.quarantine_result Boolean representing whether or not file quarantine succeeded. boolean
file.Ext.temp_file_path Path on endpoint where a copy of the file is being stored. Used to make ephemeral files retrievable. keyword
file.Ext.windows Platform-specific Windows fields object
file.Ext.windows.zone_identifier Windows zone identifier for a file keyword
file.accessed Last time the file was accessed. Note that not all filesystems keep track of access time. date
file.attributes Array of file attributes. Attributes names will vary by platform. Here's a non-exhaustive list of values that are expected in this field: archive, compressed, directory, encrypted, execute, hidden, read, readonly, system, write. keyword
file.created File creation time. Note that not all filesystems store the creation time. date
file.ctime Last time the file attributes or metadata changed. Note that changes to the file content will update mtime. This implies ctime will be adjusted at the same time, since mtime is an attribute of the file. date
file.device Device that is the source of the file. keyword
file.directory Directory where the file is located. It should include the drive letter, when appropriate. keyword
file.drive_letter Drive letter where the file is located. This field is only relevant on Windows. The value should be uppercase, and not include the colon. keyword
file.extension File extension. keyword
file.gid Primary group ID (GID) of the file. keyword
file.group Primary group name of the file. keyword
file.hash.md5 MD5 hash. keyword
file.hash.sha1 SHA1 hash. keyword
file.hash.sha256 SHA256 hash. keyword
file.hash.sha512 SHA512 hash. keyword
file.inode Inode representing the file in the filesystem. keyword
file.mime_type MIME type should identify the format of the file or stream of bytes using https://www.iana.org/assignments/media-types/media-types.xhtml[IANA official types], where possible. When more than one type is applicable, the most specific type should be used. keyword
file.mode Mode of the file in octal representation. keyword
file.mtime Last time the file content was modified. date
file.name Name of the file including the extension, without the directory. keyword
file.owner File owner's username. keyword
file.path Full path to the file, including the file name. It should include the drive letter, when appropriate. keyword
file.pe.company Internal company name of the file, provided at compile-time. keyword
file.pe.description Internal description of the file, provided at compile-time. keyword
file.pe.file_version Internal version of the file, provided at compile-time. keyword
file.pe.imphash A hash of the imports in a PE file. An imphash -- or import hash -- can be used to fingerprint binaries even after recompilation or other code-level transformations have occurred, which would change more traditional hash values. Learn more at https://www.fireeye.com/blog/threat-research/2014/01/tracking-malware-import-hashing.html. keyword
file.pe.original_file_name Internal name of the file, provided at compile-time. keyword
file.pe.product Internal product name of the file, provided at compile-time. keyword
file.size File size in bytes. Only relevant when file.type is "file". long
file.target_path Target path for symlinks. keyword
file.type File type (file, dir, or symlink). keyword
file.uid The user ID (UID) or security identifier (SID) of the file owner. keyword
group.Ext Object for all custom defined fields to live in. object
group.Ext.real Group info prior to any setgid operations. object
group.Ext.real.id Unique identifier for the group on the system/platform. keyword
group.Ext.real.name Name of the group. keyword
group.domain Name of the directory the group is a member of. For example, an LDAP or Active Directory domain name. keyword
group.id Unique identifier for the group on the system/platform. keyword
group.name Name of the group. keyword
host.architecture Operating system architecture. keyword
host.domain Name of the domain of which the host is a member. For example, on Windows this could be the host's Active Directory domain or NetBIOS domain name. For Linux this could be the domain of the host's LDAP provider. keyword
host.geo.city_name City name. keyword
host.geo.continent_name Name of the continent. keyword
host.geo.country_iso_code Country ISO code. keyword
host.geo.country_name Country name. keyword
host.geo.location Longitude and latitude. geo_point
host.geo.name User-defined description of a location, at the level of granularity they care about. Could be the name of their data centers, the floor number, if this describes a local physical entity, city names. Not typically used in automated geolocation. keyword
host.geo.region_iso_code Region ISO code. keyword
host.geo.region_name Region name. keyword
host.hostname Hostname of the host. It normally contains what the hostname command returns on the host machine. keyword
host.id Unique host id. As hostname is not always unique, use values that are meaningful in your environment. Example: The current usage of beat.name. keyword
host.ip Host ip addresses. ip
host.mac Host mac addresses. keyword
host.name Name of the host. It can contain what hostname returns on Unix systems, the fully qualified domain name, or a name specified by the user. The sender decides which value to use. keyword
host.os.Ext Object for all custom defined fields to live in. object
host.os.Ext.variant A string value or phrase that further aid to classify or qualify the operating system (OS). For example the distribution for a Linux OS will be entered in this field. keyword
host.os.family OS family (such as redhat, debian, freebsd, windows). keyword
host.os.full Operating system name, including the version or code name. keyword
host.os.kernel Operating system kernel version as a raw string. keyword
host.os.name Operating system name, without the version. keyword
host.os.platform Operating system platform (such centos, ubuntu, windows). keyword
host.os.version Operating system version as a raw string. keyword
host.type Type of host. For Cloud providers this can be the machine type like t2.medium. If vm, this could be the container, for example, or other information meaningful in your environment. keyword
host.uptime Seconds the host has been up. long
host.user.Ext Object for all custom defined fields to live in. object
host.user.Ext.real User info prior to any setuid operations. object
host.user.Ext.real.id One or multiple unique identifiers of the user. keyword
host.user.Ext.real.name Short name or login of the user. keyword
host.user.domain Name of the directory the user is a member of. For example, an LDAP or Active Directory domain name. keyword
host.user.email User email address. keyword
host.user.full_name User's full name, if available. keyword
host.user.group.Ext Object for all custom defined fields to live in. object
host.user.group.Ext.real Group info prior to any setgid operations. object
host.user.group.Ext.real.id Unique identifier for the group on the system/platform. keyword
host.user.group.Ext.real.name Name of the group. keyword
host.user.group.domain Name of the directory the group is a member of. For example, an LDAP or Active Directory domain name. keyword
host.user.group.id Unique identifier for the group on the system/platform. keyword
host.user.group.name Name of the group. keyword
host.user.hash Unique user hash to correlate information for a user in anonymized form. Useful if user.id or user.name contain confidential information and cannot be used. keyword
host.user.id Unique identifier of the user. keyword
host.user.name Short name or login of the user. keyword
message For log events the message field contains the log message, optimized for viewing in a log viewer. For structured logs without an original message field, other fields can be concatenated to form a human-readable summary of the event. If multiple messages exist, they can be combined into one message. text
process.Ext Object for all custom defined fields to live in. object
process.Ext.ancestry An array of entity_ids indicating the ancestors for this event keyword
process.Ext.authentication_id Process authentication ID keyword
process.Ext.code_signature Nested version of ECS code_signature fieldset. nested
process.Ext.code_signature.exists Boolean to capture if a signature is present. boolean
process.Ext.code_signature.status Additional information about the certificate status. This is useful for logging cryptographic errors with the certificate validity or trust status. Leave unpopulated if the validity or trust of the certificate was unchecked. keyword
process.Ext.code_signature.subject_name Subject name of the code signer keyword
process.Ext.code_signature.trusted Stores the trust status of the certificate chain. Validating the trust of the certificate chain may be complicated, and this field should only be populated by tools that actively check the status. boolean
process.Ext.code_signature.valid Boolean to capture if the digital signature is verified against the binary content. Leave unpopulated if a certificate was unchecked. boolean
process.Ext.malware_classification.identifier The model's unique identifier. keyword
process.Ext.malware_classification.score The score produced by the classification model. double
process.Ext.malware_classification.threshold The score threshold for the model. Files that score above this threshold are considered malicious. double
process.Ext.malware_classification.upx_packed Whether UPX packing was detected. boolean
process.Ext.malware_classification.version The version of the model used. keyword
process.Ext.services Services running in this process. keyword
process.Ext.session Session information for the current process keyword
process.Ext.token.domain Domain of token user. keyword
process.Ext.token.elevation Whether the token is elevated or not boolean
process.Ext.token.elevation_type What level of elevation the token has keyword
process.Ext.token.impersonation_level Impersonation level. Only valid for impersonation tokens. keyword
process.Ext.token.integrity_level Numeric integrity level. long
process.Ext.token.integrity_level_name Human readable integrity level. keyword
process.Ext.token.is_appcontainer Whether or not this is an appcontainer token. boolean
process.Ext.token.privileges Array describing the privileges associated with the token. nested
process.Ext.token.privileges.description Description of the privilege. keyword
process.Ext.token.privileges.enabled Whether or not the privilege is enabled. boolean
process.Ext.token.privileges.name Name of the privilege. keyword
process.Ext.token.sid Token user's Security Identifier (SID). keyword
process.Ext.token.type Type of the token, either primary or impersonation. keyword
process.Ext.token.user Username of token owner. keyword
process.Ext.user User associated with the running process. keyword
process.args Array of process arguments, starting with the absolute path to the executable. May be filtered to protect sensitive information. keyword
process.args_count Length of the process.args array. This field can be useful for querying or performing bucket analysis on how many arguments were provided to start a process. More arguments may be an indication of suspicious activity. long
process.command_line Full command line that started the process, including the absolute path to the executable, and all arguments. Some arguments may be filtered to protect sensitive information. keyword
process.entity_id Unique identifier for the process. The implementation of this is specified by the data source, but some examples of what could be used here are a process-generated UUID, Sysmon Process GUIDs, or a hash of some uniquely identifying components of a process. Constructing a globally unique identifier is a common practice to mitigate PID reuse as well as to identify a specific process over time, across multiple monitored hosts. keyword
process.executable Absolute path to the process executable. keyword
process.exit_code The exit code of the process, if this is a termination event. The field should be absent if there is no exit code for the event (e.g. process start). long
process.hash.md5 MD5 hash. keyword
process.hash.sha1 SHA1 hash. keyword
process.hash.sha256 SHA256 hash. keyword
process.hash.sha512 SHA512 hash. keyword
process.name Process name. Sometimes called program name or similar. keyword
process.parent.Ext Object for all custom defined fields to live in. object
process.parent.Ext.code_signature Nested version of ECS code_signature fieldset. nested
process.parent.Ext.code_signature.exists Boolean to capture if a signature is present. boolean
process.parent.Ext.code_signature.status Additional information about the certificate status. This is useful for logging cryptographic errors with the certificate validity or trust status. Leave unpopulated if the validity or trust of the certificate was unchecked. keyword
process.parent.Ext.code_signature.subject_name Subject name of the code signer keyword
process.parent.Ext.code_signature.trusted Stores the trust status of the certificate chain. Validating the trust of the certificate chain may be complicated, and this field should only be populated by tools that actively check the status. boolean
process.parent.Ext.code_signature.valid Boolean to capture if the digital signature is verified against the binary content. Leave unpopulated if a certificate was unchecked. boolean
process.parent.Ext.real The field set containing process info in case of any pid spoofing. This is mainly useful for process.parent. object
process.parent.Ext.real.pid For process.parent this will be the ppid of the process that actually spawned the current process. long
process.parent.args Array of process arguments, starting with the absolute path to the executable. May be filtered to protect sensitive information. keyword
process.parent.args_count Length of the process.args array. This field can be useful for querying or performing bucket analysis on how many arguments were provided to start a process. More arguments may be an indication of suspicious activity. long
process.parent.command_line Full command line that started the process, including the absolute path to the executable, and all arguments. Some arguments may be filtered to protect sensitive information. keyword
process.parent.entity_id Unique identifier for the process. The implementation of this is specified by the data source, but some examples of what could be used here are a process-generated UUID, Sysmon Process GUIDs, or a hash of some uniquely identifying components of a process. Constructing a globally unique identifier is a common practice to mitigate PID reuse as well as to identify a specific process over time, across multiple monitored hosts. keyword
process.parent.executable Absolute path to the process executable. keyword
process.parent.exit_code The exit code of the process, if this is a termination event. The field should be absent if there is no exit code for the event (e.g. process start). long
process.parent.hash.md5 MD5 hash. keyword
process.parent.hash.sha1 SHA1 hash. keyword
process.parent.hash.sha256 SHA256 hash. keyword
process.parent.hash.sha512 SHA512 hash. keyword
process.parent.name Process name. Sometimes called program name or similar. keyword
process.parent.pgid Identifier of the group of processes the process belongs to. long
process.parent.pid Process id. long
process.parent.ppid Parent process' pid. long
process.parent.start The time the process started. date
process.parent.thread.id Thread ID. long
process.parent.thread.name Thread name. keyword
process.parent.title Process title. The proctitle, some times the same as process name. Can also be different: for example a browser setting its title to the web page currently opened. keyword
process.parent.uptime Seconds the process has been up. long
process.parent.working_directory The working directory of the process. keyword
process.pe.company Internal company name of the file, provided at compile-time. keyword
process.pe.description Internal description of the file, provided at compile-time. keyword
process.pe.file_version Internal version of the file, provided at compile-time. keyword
process.pe.imphash A hash of the imports in a PE file. An imphash -- or import hash -- can be used to fingerprint binaries even after recompilation or other code-level transformations have occurred, which would change more traditional hash values. Learn more at https://www.fireeye.com/blog/threat-research/2014/01/tracking-malware-import-hashing.html. keyword
process.pe.original_file_name Internal name of the file, provided at compile-time. keyword
process.pe.product Internal product name of the file, provided at compile-time. keyword
process.pgid Identifier of the group of processes the process belongs to. long
process.pid Process id. long
process.ppid Parent process' pid. long
process.start The time the process started. date
process.thread.Ext Object for all custom defined fields to live in. object
process.thread.Ext.service Service associated with the thread. keyword
process.thread.Ext.start The time the thread started. date
process.thread.Ext.start_address Memory address where the thread began execution. keyword
process.thread.Ext.start_address_module The dll/module where the thread began execution. keyword
process.thread.Ext.token.domain Domain of token user. keyword
process.thread.Ext.token.elevation Whether the token is elevated or not boolean
process.thread.Ext.token.elevation_type What level of elevation the token has keyword
process.thread.Ext.token.impersonation_level Impersonation level. Only valid for impersonation tokens. keyword
process.thread.Ext.token.integrity_level Numeric integrity level. long
process.thread.Ext.token.integrity_level_name Human readable integrity level. keyword
process.thread.Ext.token.is_appcontainer Whether or not this is an appcontainer token. boolean
process.thread.Ext.token.privileges Array describing the privileges associated with the token. nested
process.thread.Ext.token.privileges.description Description of the privilege. keyword
process.thread.Ext.token.privileges.enabled Whether or not the privilege is enabled. boolean
process.thread.Ext.token.privileges.name Name of the privilege. keyword
process.thread.Ext.token.sid Token user's Security Identifier (SID). keyword
process.thread.Ext.token.type Type of the token, either primary or impersonation. keyword
process.thread.Ext.token.user Username of token owner. keyword
process.thread.Ext.uptime Seconds since thread started. long
process.thread.id Thread ID. long
process.thread.name Thread name. keyword
process.title Process title. The proctitle, some times the same as process name. Can also be different: for example a browser setting its title to the web page currently opened. keyword
process.uptime Seconds the process has been up. long
process.working_directory The working directory of the process. keyword
rule.author Name, organization, or pseudonym of the author or authors who created the rule used to generate this event. keyword
rule.category A categorization value keyword used by the entity using the rule for detection of this event. keyword
rule.description The description of the rule generating the event. keyword
rule.id A rule ID that is unique within the scope of an agent, observer, or other entity using the rule for detection of this event. keyword
rule.license Name of the license under which the rule used to generate this event is made available. keyword
rule.name The name of the rule or signature generating the event. keyword
rule.reference Reference URL to additional information about the rule used to generate this event. The URL can point to the vendor's documentation about the rule. If that's not available, it can also be a link to a more general page describing this type of alert. keyword
rule.ruleset Name of the ruleset, policy, group, or parent category in which the rule used to generate this event is a member. keyword
rule.uuid A rule ID that is unique within the scope of a set or group of agents, observers, or other entities using the rule for detection of this event. keyword
rule.version The version / revision of the rule being used for analysis. keyword
source.geo.city_name City name. keyword
source.geo.continent_name Name of the continent. keyword
source.geo.country_iso_code Country ISO code. keyword
source.geo.country_name Country name. keyword
source.geo.location Longitude and latitude. geo_point
source.geo.name User-defined description of a location, at the level of granularity they care about. Could be the name of their data centers, the floor number, if this describes a local physical entity, city names. Not typically used in automated geolocation. keyword
source.geo.region_iso_code Region ISO code. keyword
source.geo.region_name Region name. keyword
threat.framework Name of the threat framework used to further categorize and classify the tactic and technique of the reported threat. Framework classification can be provided by detecting systems, evaluated at ingest time, or retrospectively tagged to events. keyword
threat.tactic.id The id of tactic used by this threat. You can use a MITRE ATT&CK® tactic, for example. (ex. https://attack.mitre.org/tactics/TA0040/ ) keyword
threat.tactic.name Name of the type of tactic used by this threat. You can use a MITRE ATT&CK® tactic, for example. (ex. https://attack.mitre.org/tactics/TA0040/) keyword
threat.tactic.reference The reference url of tactic used by this threat. You can use a MITRE ATT&CK® tactic, for example. (ex. https://attack.mitre.org/tactics/TA0040/ ) keyword
threat.technique.id The id of technique used by this threat. You can use a MITRE ATT&CK® technique, for example. (ex. https://attack.mitre.org/techniques/T1499/) keyword
threat.technique.name The name of technique used by this threat. You can use a MITRE ATT&CK® technique, for example. (ex. https://attack.mitre.org/techniques/T1499/) keyword
threat.technique.reference The reference url of technique used by this threat. You can use a MITRE ATT&CK® technique, for example. (ex. https://attack.mitre.org/techniques/T1499/ ) keyword
user.Ext Object for all custom defined fields to live in. object
user.Ext.real User info prior to any setuid operations. object
user.Ext.real.id One or multiple unique identifiers of the user. keyword
user.Ext.real.name Short name or login of the user. keyword
user.domain Name of the directory the user is a member of. For example, an LDAP or Active Directory domain name. keyword
user.email User email address. keyword
user.full_name User's full name, if available. keyword
user.group.Ext Object for all custom defined fields to live in. object
user.group.Ext.real Group info prior to any setgid operations. object
user.group.Ext.real.id Unique identifier for the group on the system/platform. keyword
user.group.Ext.real.name Name of the group. keyword
user.group.domain Name of the directory the group is a member of. For example, an LDAP or Active Directory domain name. keyword
user.group.id Unique identifier for the group on the system/platform. keyword
user.group.name Name of the group. keyword
user.hash Unique user hash to correlate information for a user in anonymized form. Useful if user.id or user.name contain confidential information and cannot be used. keyword
user.id Unique identifier of the user. keyword
user.name Short name or login of the user. keyword

file

Exported fields

Field Description Type
@timestamp Date/time when the event originated. This is the date/time extracted from the event, typically representing when the event was generated by the source. If the event source has no original timestamp, this value is typically populated by the first time the event was received by the pipeline. Required field for all events. date
agent.id Unique identifier of this agent (if one exists). Example: For Beats this would be beat.id. keyword
agent.type Type of the agent. The agent type always stays the same and should be given by the agent used. In case of Filebeat the agent would always be Filebeat also if two Filebeat instances are run on the same machine. keyword
agent.version Version of the agent. keyword
data_stream.dataset Data stream dataset name. constant_keyword
data_stream.namespace Data stream namespace. constant_keyword
data_stream.type Data stream type. constant_keyword
destination.geo.city_name City name. keyword
destination.geo.continent_name Name of the continent. keyword
destination.geo.country_iso_code Country ISO code. keyword
destination.geo.country_name Country name. keyword
destination.geo.location Longitude and latitude. geo_point
destination.geo.name User-defined description of a location, at the level of granularity they care about. Could be the name of their data centers, the floor number, if this describes a local physical entity, city names. Not typically used in automated geolocation. keyword
destination.geo.region_iso_code Region ISO code. keyword
destination.geo.region_name Region name. keyword
ecs.version ECS version this event conforms to. ecs.version is a required field and must exist in all events. When querying across multiple indices -- which may conform to slightly different ECS versions -- this field lets integrations adjust to the schema version of the events. keyword
event.Ext Object for all custom defined fields to live in. object
event.Ext.correlation Information about event this should be correlated with. object
event.Ext.correlation.id ID of event that this event is correlated to, e.g. quarantine event associated with an unquarantine event keyword
event.action The action captured by the event. This describes the information in the event. It is more specific than event.category. Examples are group-add, process-started, file-created. The value is normally defined by the implementer. keyword
event.category This is one of four ECS Categorization Fields, and indicates the second level in the ECS category hierarchy. event.category represents the "big buckets" of ECS categories. For example, filtering on event.category:process yields all events relating to process activity. This field is closely related to event.type, which is used as a subcategory. This field is an array. This will allow proper categorization of some events that fall in multiple categories. keyword
event.code Identification code for this event, if one exists. Some event sources use event codes to identify messages unambiguously, regardless of message language or wording adjustments over time. An example of this is the Windows Event ID. keyword
event.created event.created contains the date/time when the event was first read by an agent, or by your pipeline. This field is distinct from @timestamp in that @timestamp typically contain the time extracted from the original event. In most situations, these two timestamps will be slightly different. The difference can be used to calculate the delay between your source generating an event, and the time when your agent first processed it. This can be used to monitor your agent's or pipeline's ability to keep up with your event source. In case the two timestamps are identical, @timestamp should be used. date
event.dataset Name of the dataset. If an event source publishes more than one type of log or events (e.g. access log, error log), the dataset is used to specify which one the event comes from. It's recommended but not required to start the dataset name with the module name, followed by a dot, then the dataset name. keyword
event.hash Hash (perhaps logstash fingerprint) of raw field to be able to demonstrate log integrity. keyword
event.id Unique ID to describe the event. keyword
event.ingested Timestamp when an event arrived in the central data store. This is different from @timestamp, which is when the event originally occurred. It's also different from event.created, which is meant to capture the first time an agent saw the event. In normal conditions, assuming no tampering, the timestamps should chronologically look like this: @timestamp < event.created < event.ingested. date
event.kind This is one of four ECS Categorization Fields, and indicates the highest level in the ECS category hierarchy. event.kind gives high-level information about what type of information the event contains, without being specific to the contents of the event. For example, values of this field distinguish alert events from metric events. The value of this field can be used to inform how these kinds of events should be handled. They may warrant different retention, different access control, it may also help understand whether the data coming in at a regular interval or not. keyword
event.module Name of the module this data is coming from. If your monitoring agent supports the concept of modules or plugins to process events of a given source (e.g. Apache logs), event.module should contain the name of this module. keyword
event.outcome This is one of four ECS Categorization Fields, and indicates the lowest level in the ECS category hierarchy. event.outcome simply denotes whether the event represents a success or a failure from the perspective of the entity that produced the event. Note that when a single transaction is described in multiple events, each event may populate different values of event.outcome, according to their perspective. Also note that in the case of a compound event (a single event that contains multiple logical events), this field should be populated with the value that best captures the overall success or failure from the perspective of the event producer. Further note that not all events will have an associated outcome. For example, this field is generally not populated for metric events, events with event.type:info, or any events for which an outcome does not make logical sense. keyword
event.provider Source of the event. Event transports such as Syslog or the Windows Event Log typically mention the source of an event. It can be the name of the software that generated the event (e.g. Sysmon, httpd), or of a subsystem of the operating system (kernel, Microsoft-Windows-Security-Auditing). keyword
event.sequence Sequence number of the event. The sequence number is a value published by some event sources, to make the exact ordering of events unambiguous, regardless of the timestamp precision. long
event.severity The numeric severity of the event according to your event source. What the different severity values mean can be different between sources and use cases. It's up to the implementer to make sure severities are consistent across events from the same source. The Syslog severity belongs in log.syslog.severity.code. event.severity is meant to represent the severity according to the event source (e.g. firewall, IDS). If the event source does not publish its own severity, you may optionally copy the log.syslog.severity.code to event.severity. long
event.type This is one of four ECS Categorization Fields, and indicates the third level in the ECS category hierarchy. event.type represents a categorization "sub-bucket" that, when used along with the event.category field values, enables filtering events down to a level appropriate for single visualization. This field is an array. This will allow proper categorization of some events that fall in multiple event types. keyword
file.Ext Object for all custom defined fields to live in. object
file.Ext.entropy Entropy calculation of file's header and footer used to check file integrity. double
file.Ext.header_data First 16 bytes of file used to check file integrity. text
file.Ext.monotonic_id File event monotonic ID. unsigned_long
file.Ext.original Original file information during a modification event. object
file.Ext.original.gid Primary group ID (GID) of the file. keyword
file.Ext.original.group Primary group name of the file. keyword
file.Ext.original.mode Original file mode prior to a modification event keyword
file.Ext.original.name Original file name prior to a modification event keyword
file.Ext.original.owner File owner's username. keyword
file.Ext.original.path Original file path prior to a modification event keyword
file.Ext.original.uid The user ID (UID) or security identifier (SID) of the file owner. keyword
file.Ext.windows Platform-specific Windows fields object
file.Ext.windows.zone_identifier Windows zone identifier for a file keyword
file.accessed Last time the file was accessed. Note that not all filesystems keep track of access time. date
file.attributes Array of file attributes. Attributes names will vary by platform. Here's a non-exhaustive list of values that are expected in this field: archive, compressed, directory, encrypted, execute, hidden, read, readonly, system, write. keyword
file.created File creation time. Note that not all filesystems store the creation time. date
file.ctime Last time the file attributes or metadata changed. Note that changes to the file content will update mtime. This implies ctime will be adjusted at the same time, since mtime is an attribute of the file. date
file.device Device that is the source of the file. keyword
file.directory Directory where the file is located. It should include the drive letter, when appropriate. keyword
file.drive_letter Drive letter where the file is located. This field is only relevant on Windows. The value should be uppercase, and not include the colon. keyword
file.extension File extension. keyword
file.gid Primary group ID (GID) of the file. keyword
file.group Primary group name of the file. keyword
file.hash.md5 MD5 hash. keyword
file.hash.sha1 SHA1 hash. keyword
file.hash.sha256 SHA256 hash. keyword
file.hash.sha512 SHA512 hash. keyword
file.inode Inode representing the file in the filesystem. keyword
file.mime_type MIME type should identify the format of the file or stream of bytes using https://www.iana.org/assignments/media-types/media-types.xhtml[IANA official types], where possible. When more than one type is applicable, the most specific type should be used. keyword
file.mode Mode of the file in octal representation. keyword
file.mtime Last time the file content was modified. date
file.name Name of the file including the extension, without the directory. keyword
file.owner File owner's username. keyword
file.path Full path to the file, including the file name. It should include the drive letter, when appropriate. keyword
file.pe.company Internal company name of the file, provided at compile-time. keyword
file.pe.description Internal description of the file, provided at compile-time. keyword
file.pe.file_version Internal version of the file, provided at compile-time. keyword
file.pe.imphash A hash of the imports in a PE file. An imphash -- or import hash -- can be used to fingerprint binaries even after recompilation or other code-level transformations have occurred, which would change more traditional hash values. Learn more at https://www.fireeye.com/blog/threat-research/2014/01/tracking-malware-import-hashing.html. keyword
file.pe.original_file_name Internal name of the file, provided at compile-time. keyword
file.pe.product Internal product name of the file, provided at compile-time. keyword
file.size File size in bytes. Only relevant when file.type is "file". long
file.target_path Target path for symlinks. keyword
file.type File type (file, dir, or symlink). keyword
file.uid The user ID (UID) or security identifier (SID) of the file owner. keyword
group.Ext Object for all custom defined fields to live in. object
group.Ext.real Group info prior to any setgid operations. object
group.Ext.real.id Unique identifier for the group on the system/platform. keyword
group.Ext.real.name Name of the group. keyword
group.domain Name of the directory the group is a member of. For example, an LDAP or Active Directory domain name. keyword
group.id Unique identifier for the group on the system/platform. keyword
group.name Name of the group. keyword
host.architecture Operating system architecture. keyword
host.domain Name of the domain of which the host is a member. For example, on Windows this could be the host's Active Directory domain or NetBIOS domain name. For Linux this could be the domain of the host's LDAP provider. keyword
host.hostname Hostname of the host. It normally contains what the hostname command returns on the host machine. keyword
host.id Unique host id. As hostname is not always unique, use values that are meaningful in your environment. Example: The current usage of beat.name. keyword
host.ip Host ip addresses. ip
host.mac Host mac addresses. keyword
host.name Name of the host. It can contain what hostname returns on Unix systems, the fully qualified domain name, or a name specified by the user. The sender decides which value to use. keyword
host.os.Ext Object for all custom defined fields to live in. object
host.os.Ext.variant A string value or phrase that further aid to classify or qualify the operating system (OS). For example the distribution for a Linux OS will be entered in this field. keyword
host.os.family OS family (such as redhat, debian, freebsd, windows). keyword
host.os.full Operating system name, including the version or code name. keyword
host.os.kernel Operating system kernel version as a raw string. keyword
host.os.name Operating system name, without the version. keyword
host.os.platform Operating system platform (such centos, ubuntu, windows). keyword
host.os.version Operating system version as a raw string. keyword
host.type Type of host. For Cloud providers this can be the machine type like t2.medium. If vm, this could be the container, for example, or other information meaningful in your environment. keyword
host.uptime Seconds the host has been up. long
message For log events the message field contains the log message, optimized for viewing in a log viewer. For structured logs without an original message field, other fields can be concatenated to form a human-readable summary of the event. If multiple messages exist, they can be combined into one message. text
process.Ext Object for all custom defined fields to live in. object
process.Ext.ancestry An array of entity_ids indicating the ancestors for this event keyword
process.args_count Length of the process.args array. This field can be useful for querying or performing bucket analysis on how many arguments were provided to start a process. More arguments may be an indication of suspicious activity. long
process.entity_id Unique identifier for the process. The implementation of this is specified by the data source, but some examples of what could be used here are a process-generated UUID, Sysmon Process GUIDs, or a hash of some uniquely identifying components of a process. Constructing a globally unique identifier is a common practice to mitigate PID reuse as well as to identify a specific process over time, across multiple monitored hosts. keyword
process.executable Absolute path to the process executable. keyword
process.name Process name. Sometimes called program name or similar. keyword
process.pid Process id. long
process.ppid Parent process' pid. long
process.thread.id Thread ID. long
source.geo.city_name City name. keyword
source.geo.continent_name Name of the continent. keyword
source.geo.country_iso_code Country ISO code. keyword
source.geo.country_name Country name. keyword
source.geo.location Longitude and latitude. geo_point
source.geo.name User-defined description of a location, at the level of granularity they care about. Could be the name of their data centers, the floor number, if this describes a local physical entity, city names. Not typically used in automated geolocation. keyword
source.geo.region_iso_code Region ISO code. keyword
source.geo.region_name Region name. keyword
user.Ext Object for all custom defined fields to live in. object
user.Ext.real User info prior to any setuid operations. object
user.Ext.real.id One or multiple unique identifiers of the user. keyword
user.Ext.real.name Short name or login of the user. keyword
user.domain Name of the directory the user is a member of. For example, an LDAP or Active Directory domain name. keyword
user.email User email address. keyword
user.full_name User's full name, if available. keyword
user.group.Ext Object for all custom defined fields to live in. object
user.group.Ext.real Group info prior to any setgid operations. object
user.group.Ext.real.id Unique identifier for the group on the system/platform. keyword
user.group.Ext.real.name Name of the group. keyword
user.group.domain Name of the directory the group is a member of. For example, an LDAP or Active Directory domain name. keyword
user.group.id Unique identifier for the group on the system/platform. keyword
user.group.name Name of the group. keyword
user.hash Unique user hash to correlate information for a user in anonymized form. Useful if user.id or user.name contain confidential information and cannot be used. keyword
user.id Unique identifier of the user. keyword
user.name Short name or login of the user. keyword

library

Exported fields

Field Description Type
@timestamp Date/time when the event originated. This is the date/time extracted from the event, typically representing when the event was generated by the source. If the event source has no original timestamp, this value is typically populated by the first time the event was received by the pipeline. Required field for all events. date
agent.id Unique identifier of this agent (if one exists). Example: For Beats this would be beat.id. keyword
agent.type Type of the agent. The agent type always stays the same and should be given by the agent used. In case of Filebeat the agent would always be Filebeat also if two Filebeat instances are run on the same machine. keyword
agent.version Version of the agent. keyword
data_stream.dataset Data stream dataset name. constant_keyword
data_stream.namespace Data stream namespace. constant_keyword
data_stream.type Data stream type. constant_keyword
destination.geo.city_name City name. keyword
destination.geo.continent_name Name of the continent. keyword
destination.geo.country_iso_code Country ISO code. keyword
destination.geo.country_name Country name. keyword
destination.geo.location Longitude and latitude. geo_point
destination.geo.name User-defined description of a location, at the level of granularity they care about. Could be the name of their data centers, the floor number, if this describes a local physical entity, city names. Not typically used in automated geolocation. keyword
destination.geo.region_iso_code Region ISO code. keyword
destination.geo.region_name Region name. keyword
dll.Ext Object for all custom defined fields to live in. object
dll.Ext.code_signature Nested version of ECS code_signature fieldset. nested
dll.Ext.code_signature.exists Boolean to capture if a signature is present. boolean
dll.Ext.code_signature.status Additional information about the certificate status. This is useful for logging cryptographic errors with the certificate validity or trust status. Leave unpopulated if the validity or trust of the certificate was unchecked. keyword
dll.Ext.code_signature.subject_name Subject name of the code signer keyword
dll.Ext.code_signature.trusted Stores the trust status of the certificate chain. Validating the trust of the certificate chain may be complicated, and this field should only be populated by tools that actively check the status. boolean
dll.Ext.code_signature.valid Boolean to capture if the digital signature is verified against the binary content. Leave unpopulated if a certificate was unchecked. boolean
dll.code_signature.exists Boolean to capture if a signature is present. boolean
dll.code_signature.status Additional information about the certificate status. This is useful for logging cryptographic errors with the certificate validity or trust status. Leave unpopulated if the validity or trust of the certificate was unchecked. keyword
dll.code_signature.subject_name Subject name of the code signer keyword
dll.code_signature.trusted Stores the trust status of the certificate chain. Validating the trust of the certificate chain may be complicated, and this field should only be populated by tools that actively check the status. boolean
dll.code_signature.valid Boolean to capture if the digital signature is verified against the binary content. Leave unpopulated if a certificate was unchecked. boolean
dll.hash.md5 MD5 hash. keyword
dll.hash.sha1 SHA1 hash. keyword
dll.hash.sha256 SHA256 hash. keyword
dll.hash.sha512 SHA512 hash. keyword
dll.name Name of the library. This generally maps to the name of the file on disk. keyword
dll.path Full file path of the library. keyword
dll.pe.company Internal company name of the file, provided at compile-time. keyword
dll.pe.description Internal description of the file, provided at compile-time. keyword
dll.pe.file_version Internal version of the file, provided at compile-time. keyword
dll.pe.imphash A hash of the imports in a PE file. An imphash -- or import hash -- can be used to fingerprint binaries even after recompilation or other code-level transformations have occurred, which would change more traditional hash values. Learn more at https://www.fireeye.com/blog/threat-research/2014/01/tracking-malware-import-hashing.html. keyword
dll.pe.original_file_name Internal name of the file, provided at compile-time. keyword
dll.pe.product Internal product name of the file, provided at compile-time. keyword
ecs.version ECS version this event conforms to. ecs.version is a required field and must exist in all events. When querying across multiple indices -- which may conform to slightly different ECS versions -- this field lets integrations adjust to the schema version of the events. keyword
event.action The action captured by the event. This describes the information in the event. It is more specific than event.category. Examples are group-add, process-started, file-created. The value is normally defined by the implementer. keyword
event.category This is one of four ECS Categorization Fields, and indicates the second level in the ECS category hierarchy. event.category represents the "big buckets" of ECS categories. For example, filtering on event.category:process yields all events relating to process activity. This field is closely related to event.type, which is used as a subcategory. This field is an array. This will allow proper categorization of some events that fall in multiple categories. keyword
event.code Identification code for this event, if one exists. Some event sources use event codes to identify messages unambiguously, regardless of message language or wording adjustments over time. An example of this is the Windows Event ID. keyword
event.created event.created contains the date/time when the event was first read by an agent, or by your pipeline. This field is distinct from @timestamp in that @timestamp typically contain the time extracted from the original event. In most situations, these two timestamps will be slightly different. The difference can be used to calculate the delay between your source generating an event, and the time when your agent first processed it. This can be used to monitor your agent's or pipeline's ability to keep up with your event source. In case the two timestamps are identical, @timestamp should be used. date
event.dataset Name of the dataset. If an event source publishes more than one type of log or events (e.g. access log, error log), the dataset is used to specify which one the event comes from. It's recommended but not required to start the dataset name with the module name, followed by a dot, then the dataset name. keyword
event.hash Hash (perhaps logstash fingerprint) of raw field to be able to demonstrate log integrity. keyword
event.id Unique ID to describe the event. keyword
event.ingested Timestamp when an event arrived in the central data store. This is different from @timestamp, which is when the event originally occurred. It's also different from event.created, which is meant to capture the first time an agent saw the event. In normal conditions, assuming no tampering, the timestamps should chronologically look like this: @timestamp < event.created < event.ingested. date
event.kind This is one of four ECS Categorization Fields, and indicates the highest level in the ECS category hierarchy. event.kind gives high-level information about what type of information the event contains, without being specific to the contents of the event. For example, values of this field distinguish alert events from metric events. The value of this field can be used to inform how these kinds of events should be handled. They may warrant different retention, different access control, it may also help understand whether the data coming in at a regular interval or not. keyword
event.module Name of the module this data is coming from. If your monitoring agent supports the concept of modules or plugins to process events of a given source (e.g. Apache logs), event.module should contain the name of this module. keyword
event.outcome This is one of four ECS Categorization Fields, and indicates the lowest level in the ECS category hierarchy. event.outcome simply denotes whether the event represents a success or a failure from the perspective of the entity that produced the event. Note that when a single transaction is described in multiple events, each event may populate different values of event.outcome, according to their perspective. Also note that in the case of a compound event (a single event that contains multiple logical events), this field should be populated with the value that best captures the overall success or failure from the perspective of the event producer. Further note that not all events will have an associated outcome. For example, this field is generally not populated for metric events, events with event.type:info, or any events for which an outcome does not make logical sense. keyword
event.provider Source of the event. Event transports such as Syslog or the Windows Event Log typically mention the source of an event. It can be the name of the software that generated the event (e.g. Sysmon, httpd), or of a subsystem of the operating system (kernel, Microsoft-Windows-Security-Auditing). keyword
event.sequence Sequence number of the event. The sequence number is a value published by some event sources, to make the exact ordering of events unambiguous, regardless of the timestamp precision. long
event.severity The numeric severity of the event according to your event source. What the different severity values mean can be different between sources and use cases. It's up to the implementer to make sure severities are consistent across events from the same source. The Syslog severity belongs in log.syslog.severity.code. event.severity is meant to represent the severity according to the event source (e.g. firewall, IDS). If the event source does not publish its own severity, you may optionally copy the log.syslog.severity.code to event.severity. long
event.type This is one of four ECS Categorization Fields, and indicates the third level in the ECS category hierarchy. event.type represents a categorization "sub-bucket" that, when used along with the event.category field values, enables filtering events down to a level appropriate for single visualization. This field is an array. This will allow proper categorization of some events that fall in multiple event types. keyword
file.Ext Object for all custom defined fields to live in. object
file.Ext.code_signature Nested version of ECS code_signature fieldset. nested
file.Ext.code_signature.exists Boolean to capture if a signature is present. boolean
file.Ext.code_signature.status Additional information about the certificate status. This is useful for logging cryptographic errors with the certificate validity or trust status. Leave unpopulated if the validity or trust of the certificate was unchecked. keyword
file.Ext.code_signature.subject_name Subject name of the code signer keyword
file.Ext.code_signature.trusted Stores the trust status of the certificate chain. Validating the trust of the certificate chain may be complicated, and this field should only be populated by tools that actively check the status. boolean
file.Ext.code_signature.valid Boolean to capture if the digital signature is verified against the binary content. Leave unpopulated if a certificate was unchecked. boolean
file.hash.md5 MD5 hash. keyword
file.hash.sha1 SHA1 hash. keyword
file.hash.sha256 SHA256 hash. keyword
file.hash.sha512 SHA512 hash. keyword
file.name Name of the file including the extension, without the directory. keyword
file.path Full path to the file, including the file name. It should include the drive letter, when appropriate. keyword
file.pe.company Internal company name of the file, provided at compile-time. keyword
file.pe.description Internal description of the file, provided at compile-time. keyword
file.pe.file_version Internal version of the file, provided at compile-time. keyword
file.pe.imphash A hash of the imports in a PE file. An imphash -- or import hash -- can be used to fingerprint binaries even after recompilation or other code-level transformations have occurred, which would change more traditional hash values. Learn more at https://www.fireeye.com/blog/threat-research/2014/01/tracking-malware-import-hashing.html. keyword
file.pe.original_file_name Internal name of the file, provided at compile-time. keyword
file.pe.product Internal product name of the file, provided at compile-time. keyword
group.Ext Object for all custom defined fields to live in. object
group.Ext.real Group info prior to any setgid operations. object
group.Ext.real.id Unique identifier for the group on the system/platform. keyword
group.Ext.real.name Name of the group. keyword
group.domain Name of the directory the group is a member of. For example, an LDAP or Active Directory domain name. keyword
group.id Unique identifier for the group on the system/platform. keyword
group.name Name of the group. keyword
host.architecture Operating system architecture. keyword
host.domain Name of the domain of which the host is a member. For example, on Windows this could be the host's Active Directory domain or NetBIOS domain name. For Linux this could be the domain of the host's LDAP provider. keyword
host.hostname Hostname of the host. It normally contains what the hostname command returns on the host machine. keyword
host.id Unique host id. As hostname is not always unique, use values that are meaningful in your environment. Example: The current usage of beat.name. keyword
host.ip Host ip addresses. ip
host.mac Host mac addresses. keyword
host.name Name of the host. It can contain what hostname returns on Unix systems, the fully qualified domain name, or a name specified by the user. The sender decides which value to use. keyword
host.os.Ext Object for all custom defined fields to live in. object
host.os.Ext.variant A string value or phrase that further aid to classify or qualify the operating system (OS). For example the distribution for a Linux OS will be entered in this field. keyword
host.os.family OS family (such as redhat, debian, freebsd, windows). keyword
host.os.full Operating system name, including the version or code name. keyword
host.os.kernel Operating system kernel version as a raw string. keyword
host.os.name Operating system name, without the version. keyword
host.os.platform Operating system platform (such centos, ubuntu, windows). keyword
host.os.version Operating system version as a raw string. keyword
host.type Type of host. For Cloud providers this can be the machine type like t2.medium. If vm, this could be the container, for example, or other information meaningful in your environment. keyword
host.uptime Seconds the host has been up. long
message For log events the message field contains the log message, optimized for viewing in a log viewer. For structured logs without an original message field, other fields can be concatenated to form a human-readable summary of the event. If multiple messages exist, they can be combined into one message. text
process.Ext Object for all custom defined fields to live in. object
process.Ext.ancestry An array of entity_ids indicating the ancestors for this event keyword
process.entity_id Unique identifier for the process. The implementation of this is specified by the data source, but some examples of what could be used here are a process-generated UUID, Sysmon Process GUIDs, or a hash of some uniquely identifying components of a process. Constructing a globally unique identifier is a common practice to mitigate PID reuse as well as to identify a specific process over time, across multiple monitored hosts. keyword
process.executable Absolute path to the process executable. keyword
process.name Process name. Sometimes called program name or similar. keyword
process.pid Process id. long
process.thread.id Thread ID. long
source.geo.city_name City name. keyword
source.geo.continent_name Name of the continent. keyword
source.geo.country_iso_code Country ISO code. keyword
source.geo.country_name Country name. keyword
source.geo.location Longitude and latitude. geo_point
source.geo.name User-defined description of a location, at the level of granularity they care about. Could be the name of their data centers, the floor number, if this describes a local physical entity, city names. Not typically used in automated geolocation. keyword
source.geo.region_iso_code Region ISO code. keyword
source.geo.region_name Region name. keyword
user.Ext Object for all custom defined fields to live in. object
user.Ext.real User info prior to any setuid operations. object
user.Ext.real.id One or multiple unique identifiers of the user. keyword
user.Ext.real.name Short name or login of the user. keyword
user.domain Name of the directory the user is a member of. For example, an LDAP or Active Directory domain name. keyword
user.email User email address. keyword
user.full_name User's full name, if available. keyword
user.group.Ext Object for all custom defined fields to live in. object
user.group.Ext.real Group info prior to any setgid operations. object
user.group.Ext.real.id Unique identifier for the group on the system/platform. keyword
user.group.Ext.real.name Name of the group. keyword
user.group.domain Name of the directory the group is a member of. For example, an LDAP or Active Directory domain name. keyword
user.group.id Unique identifier for the group on the system/platform. keyword
user.group.name Name of the group. keyword
user.hash Unique user hash to correlate information for a user in anonymized form. Useful if user.id or user.name contain confidential information and cannot be used. keyword
user.id Unique identifier of the user. keyword
user.name Short name or login of the user. keyword

network

Exported fields

Field Description Type
@timestamp Date/time when the event originated. This is the date/time extracted from the event, typically representing when the event was generated by the source. If the event source has no original timestamp, this value is typically populated by the first time the event was received by the pipeline. Required field for all events. date
agent.id Unique identifier of this agent (if one exists). Example: For Beats this would be beat.id. keyword
agent.type Type of the agent. The agent type always stays the same and should be given by the agent used. In case of Filebeat the agent would always be Filebeat also if two Filebeat instances are run on the same machine. keyword
agent.version Version of the agent. keyword
data_stream.dataset Data stream dataset name. constant_keyword
data_stream.namespace Data stream namespace. constant_keyword
data_stream.type Data stream type. constant_keyword
destination.address Some event destination addresses are defined ambiguously. The event will sometimes list an IP, a domain or a unix socket. You should always store the raw address in the .address field. Then it should be duplicated to .ip or .domain, depending on which one it is. keyword
destination.bytes Bytes sent from the destination to the source. long
destination.domain Destination domain. keyword
destination.geo.city_name City name. keyword
destination.geo.continent_name Name of the continent. keyword
destination.geo.country_iso_code Country ISO code. keyword
destination.geo.country_name Country name. keyword
destination.geo.location Longitude and latitude. geo_point
destination.geo.name User-defined description of a location, at the level of granularity they care about. Could be the name of their data centers, the floor number, if this describes a local physical entity, city names. Not typically used in automated geolocation. keyword
destination.geo.region_iso_code Region ISO code. keyword
destination.geo.region_name Region name. keyword
destination.ip IP address of the destination (IPv4 or IPv6). ip
destination.packets Packets sent from the destination to the source. long
destination.port Port of the destination. long
destination.registered_domain The highest registered destination domain, stripped of the subdomain. For example, the registered domain for "foo.example.com" is "example.com". This value can be determined precisely with a list like the public suffix list (http://publicsuffix.org). Trying to approximate this by simply taking the last two labels will not work well for TLDs such as "co.uk". keyword
destination.top_level_domain The effective top level domain (eTLD), also known as the domain suffix, is the last part of the domain name. For example, the top level domain for example.com is "com". This value can be determined precisely with a list like the public suffix list (http://publicsuffix.org). Trying to approximate this by simply taking the last label will not work well for effective TLDs such as "co.uk". keyword
dns.Ext Object for all custom defined fields to live in. object
dns.Ext.options DNS options field, uint64, representing as a keyword to avoid overflows in ES keyword
dns.Ext.status DNS status field, uint32 long
dns.question.name The name being queried. If the name field contains non-printable characters (below 32 or above 126), those characters should be represented as escaped base 10 integers (\DDD). Back slashes and quotes should be escaped. Tabs, carriage returns, and line feeds should be converted to \t, \r, and \n respectively. keyword
dns.question.registered_domain The highest registered domain, stripped of the subdomain. For example, the registered domain for "foo.example.com" is "example.com". This value can be determined precisely with a list like the public suffix list (http://publicsuffix.org). Trying to approximate this by simply taking the last two labels will not work well for TLDs such as "co.uk". keyword
dns.question.subdomain The subdomain is all of the labels under the registered_domain. If the domain has multiple levels of subdomain, such as "sub2.sub1.example.com", the subdomain field should contain "sub2.sub1", with no trailing period. keyword
dns.question.top_level_domain The effective top level domain (eTLD), also known as the domain suffix, is the last part of the domain name. For example, the top level domain for example.com is "com". This value can be determined precisely with a list like the public suffix list (http://publicsuffix.org). Trying to approximate this by simply taking the last label will not work well for effective TLDs such as "co.uk". keyword
dns.question.type The type of record being queried. keyword
dns.resolved_ip Array containing all IPs seen in answers.data. The answers array can be difficult to use, because of the variety of data formats it can contain. Extracting all IP addresses seen in there to dns.resolved_ip makes it possible to index them as IP addresses, and makes them easier to visualize and query for. ip
ecs.version ECS version this event conforms to. ecs.version is a required field and must exist in all events. When querying across multiple indices -- which may conform to slightly different ECS versions -- this field lets integrations adjust to the schema version of the events. keyword
event.action The action captured by the event. This describes the information in the event. It is more specific than event.category. Examples are group-add, process-started, file-created. The value is normally defined by the implementer. keyword
event.category This is one of four ECS Categorization Fields, and indicates the second level in the ECS category hierarchy. event.category represents the "big buckets" of ECS categories. For example, filtering on event.category:process yields all events relating to process activity. This field is closely related to event.type, which is used as a subcategory. This field is an array. This will allow proper categorization of some events that fall in multiple categories. keyword
event.code Identification code for this event, if one exists. Some event sources use event codes to identify messages unambiguously, regardless of message language or wording adjustments over time. An example of this is the Windows Event ID. keyword
event.created event.created contains the date/time when the event was first read by an agent, or by your pipeline. This field is distinct from @timestamp in that @timestamp typically contain the time extracted from the original event. In most situations, these two timestamps will be slightly different. The difference can be used to calculate the delay between your source generating an event, and the time when your agent first processed it. This can be used to monitor your agent's or pipeline's ability to keep up with your event source. In case the two timestamps are identical, @timestamp should be used. date
event.dataset Name of the dataset. If an event source publishes more than one type of log or events (e.g. access log, error log), the dataset is used to specify which one the event comes from. It's recommended but not required to start the dataset name with the module name, followed by a dot, then the dataset name. keyword
event.hash Hash (perhaps logstash fingerprint) of raw field to be able to demonstrate log integrity. keyword
event.id Unique ID to describe the event. keyword
event.ingested Timestamp when an event arrived in the central data store. This is different from @timestamp, which is when the event originally occurred. It's also different from event.created, which is meant to capture the first time an agent saw the event. In normal conditions, assuming no tampering, the timestamps should chronologically look like this: @timestamp < event.created < event.ingested. date
event.kind This is one of four ECS Categorization Fields, and indicates the highest level in the ECS category hierarchy. event.kind gives high-level information about what type of information the event contains, without being specific to the contents of the event. For example, values of this field distinguish alert events from metric events. The value of this field can be used to inform how these kinds of events should be handled. They may warrant different retention, different access control, it may also help understand whether the data coming in at a regular interval or not. keyword
event.module Name of the module this data is coming from. If your monitoring agent supports the concept of modules or plugins to process events of a given source (e.g. Apache logs), event.module should contain the name of this module. keyword
event.outcome This is one of four ECS Categorization Fields, and indicates the lowest level in the ECS category hierarchy. event.outcome simply denotes whether the event represents a success or a failure from the perspective of the entity that produced the event. Note that when a single transaction is described in multiple events, each event may populate different values of event.outcome, according to their perspective. Also note that in the case of a compound event (a single event that contains multiple logical events), this field should be populated with the value that best captures the overall success or failure from the perspective of the event producer. Further note that not all events will have an associated outcome. For example, this field is generally not populated for metric events, events with event.type:info, or any events for which an outcome does not make logical sense. keyword
event.provider Source of the event. Event transports such as Syslog or the Windows Event Log typically mention the source of an event. It can be the name of the software that generated the event (e.g. Sysmon, httpd), or of a subsystem of the operating system (kernel, Microsoft-Windows-Security-Auditing). keyword
event.sequence Sequence number of the event. The sequence number is a value published by some event sources, to make the exact ordering of events unambiguous, regardless of the timestamp precision. long
event.severity The numeric severity of the event according to your event source. What the different severity values mean can be different between sources and use cases. It's up to the implementer to make sure severities are consistent across events from the same source. The Syslog severity belongs in log.syslog.severity.code. event.severity is meant to represent the severity according to the event source (e.g. firewall, IDS). If the event source does not publish its own severity, you may optionally copy the log.syslog.severity.code to event.severity. long
event.type This is one of four ECS Categorization Fields, and indicates the third level in the ECS category hierarchy. event.type represents a categorization "sub-bucket" that, when used along with the event.category field values, enables filtering events down to a level appropriate for single visualization. This field is an array. This will allow proper categorization of some events that fall in multiple event types. keyword
group.Ext Object for all custom defined fields to live in. object
group.Ext.real Group info prior to any setgid operations. object
group.Ext.real.id Unique identifier for the group on the system/platform. keyword
group.Ext.real.name Name of the group. keyword
group.domain Name of the directory the group is a member of. For example, an LDAP or Active Directory domain name. keyword
group.id Unique identifier for the group on the system/platform. keyword
group.name Name of the group. keyword
host.architecture Operating system architecture. keyword
host.domain Name of the domain of which the host is a member. For example, on Windows this could be the host's Active Directory domain or NetBIOS domain name. For Linux this could be the domain of the host's LDAP provider. keyword
host.hostname Hostname of the host. It normally contains what the hostname command returns on the host machine. keyword
host.id Unique host id. As hostname is not always unique, use values that are meaningful in your environment. Example: The current usage of beat.name. keyword
host.ip Host ip addresses. ip
host.mac Host mac addresses. keyword
host.name Name of the host. It can contain what hostname returns on Unix systems, the fully qualified domain name, or a name specified by the user. The sender decides which value to use. keyword
host.os.Ext Object for all custom defined fields to live in. object
host.os.Ext.variant A string value or phrase that further aid to classify or qualify the operating system (OS). For example the distribution for a Linux OS will be entered in this field. keyword
host.os.family OS family (such as redhat, debian, freebsd, windows). keyword
host.os.full Operating system name, including the version or code name. keyword
host.os.kernel Operating system kernel version as a raw string. keyword
host.os.name Operating system name, without the version. keyword
host.os.platform Operating system platform (such centos, ubuntu, windows). keyword
host.os.version Operating system version as a raw string. keyword
host.type Type of host. For Cloud providers this can be the machine type like t2.medium. If vm, this could be the container, for example, or other information meaningful in your environment. keyword
host.uptime Seconds the host has been up. long
http.request.body.bytes Size in bytes of the request body. long
http.request.body.content The full HTTP request body. keyword
http.request.bytes Total size in bytes of the request (body and headers). long
http.response.Ext Object for all custom defined fields to live in. object
http.response.Ext.version HTTP version keyword
http.response.body.bytes Size in bytes of the response body. long
http.response.body.content The full HTTP response body. keyword
http.response.bytes Total size in bytes of the response (body and headers). long
http.response.status_code HTTP response status code. long
message For log events the message field contains the log message, optimized for viewing in a log viewer. For structured logs without an original message field, other fields can be concatenated to form a human-readable summary of the event. If multiple messages exist, they can be combined into one message. text
network.bytes Total bytes transferred in both directions. If source.bytes and destination.bytes are known, network.bytes is their sum. long
network.community_id A hash of source and destination IPs and ports, as well as the protocol used in a communication. This is a tool-agnostic standard to identify flows. Learn more at https://github.com/corelight/community-id-spec. keyword
network.direction Direction of the network traffic. Recommended values are: * inbound * outbound * internal * external * unknown When mapping events from a host-based monitoring context, populate this field from the host's point of view. When mapping events from a network or perimeter-based monitoring context, populate this field from the point of view of your network perimeter. keyword
network.iana_number IANA Protocol Number (https://www.iana.org/assignments/protocol-numbers/protocol-numbers.xhtml). Standardized list of protocols. This aligns well with NetFlow and sFlow related logs which use the IANA Protocol Number. keyword
network.packets Total packets transferred in both directions. If source.packets and destination.packets are known, network.packets is their sum. long
network.protocol L7 Network protocol name. ex. http, lumberjack, transport protocol. The field value must be normalized to lowercase for querying. See the documentation section "Implementing ECS". keyword
network.transport Same as network.iana_number, but instead using the Keyword name of the transport layer (udp, tcp, ipv6-icmp, etc.) The field value must be normalized to lowercase for querying. See the documentation section "Implementing ECS". keyword
network.type In the OSI Model this would be the Network Layer. ipv4, ipv6, ipsec, pim, etc The field value must be normalized to lowercase for querying. See the documentation section "Implementing ECS". keyword
process.Ext Object for all custom defined fields to live in. object
process.Ext.ancestry An array of entity_ids indicating the ancestors for this event keyword
process.entity_id Unique identifier for the process. The implementation of this is specified by the data source, but some examples of what could be used here are a process-generated UUID, Sysmon Process GUIDs, or a hash of some uniquely identifying components of a process. Constructing a globally unique identifier is a common practice to mitigate PID reuse as well as to identify a specific process over time, across multiple monitored hosts. keyword
process.executable Absolute path to the process executable. keyword
process.name Process name. Sometimes called program name or similar. keyword
process.pid Process id. long
process.thread.id Thread ID. long
source.address Some event source addresses are defined ambiguously. The event will sometimes list an IP, a domain or a unix socket. You should always store the raw address in the .address field. Then it should be duplicated to .ip or .domain, depending on which one it is. keyword
source.bytes Bytes sent from the source to the destination. long
source.domain Source domain. keyword
source.geo.city_name City name. keyword
source.geo.continent_name Name of the continent. keyword
source.geo.country_iso_code Country ISO code. keyword
source.geo.country_name Country name. keyword
source.geo.location Longitude and latitude. geo_point
source.geo.name User-defined description of a location, at the level of granularity they care about. Could be the name of their data centers, the floor number, if this describes a local physical entity, city names. Not typically used in automated geolocation. keyword
source.geo.region_iso_code Region ISO code. keyword
source.geo.region_name Region name. keyword
source.ip IP address of the source (IPv4 or IPv6). ip
source.packets Packets sent from the source to the destination. long
source.port Port of the source. long
source.registered_domain The highest registered source domain, stripped of the subdomain. For example, the registered domain for "foo.example.com" is "example.com". This value can be determined precisely with a list like the public suffix list (http://publicsuffix.org). Trying to approximate this by simply taking the last two labels will not work well for TLDs such as "co.uk". keyword
source.top_level_domain The effective top level domain (eTLD), also known as the domain suffix, is the last part of the domain name. For example, the top level domain for example.com is "com". This value can be determined precisely with a list like the public suffix list (http://publicsuffix.org). Trying to approximate this by simply taking the last label will not work well for effective TLDs such as "co.uk". keyword
user.Ext Object for all custom defined fields to live in. object
user.Ext.real User info prior to any setuid operations. object
user.Ext.real.id One or multiple unique identifiers of the user. keyword
user.Ext.real.name Short name or login of the user. keyword
user.domain Name of the directory the user is a member of. For example, an LDAP or Active Directory domain name. keyword
user.email User email address. keyword
user.full_name User's full name, if available. keyword
user.group.Ext Object for all custom defined fields to live in. object
user.group.Ext.real Group info prior to any setgid operations. object
user.group.Ext.real.id Unique identifier for the group on the system/platform. keyword
user.group.Ext.real.name Name of the group. keyword
user.group.domain Name of the directory the group is a member of. For example, an LDAP or Active Directory domain name. keyword
user.group.id Unique identifier for the group on the system/platform. keyword
user.group.name Name of the group. keyword
user.hash Unique user hash to correlate information for a user in anonymized form. Useful if user.id or user.name contain confidential information and cannot be used. keyword
user.id Unique identifier of the user. keyword
user.name Short name or login of the user. keyword

process

Exported fields

Field Description Type
@timestamp Date/time when the event originated. This is the date/time extracted from the event, typically representing when the event was generated by the source. If the event source has no original timestamp, this value is typically populated by the first time the event was received by the pipeline. Required field for all events. date
agent.id Unique identifier of this agent (if one exists). Example: For Beats this would be beat.id. keyword
agent.type Type of the agent. The agent type always stays the same and should be given by the agent used. In case of Filebeat the agent would always be Filebeat also if two Filebeat instances are run on the same machine. keyword
agent.version Version of the agent. keyword
data_stream.dataset Data stream dataset name. constant_keyword
data_stream.namespace Data stream namespace. constant_keyword
data_stream.type Data stream type. constant_keyword
destination.geo.city_name City name. keyword
destination.geo.continent_name Name of the continent. keyword
destination.geo.country_iso_code Country ISO code. keyword
destination.geo.country_name Country name. keyword
destination.geo.location Longitude and latitude. geo_point
destination.geo.name User-defined description of a location, at the level of granularity they care about. Could be the name of their data centers, the floor number, if this describes a local physical entity, city names. Not typically used in automated geolocation. keyword
destination.geo.region_iso_code Region ISO code. keyword
destination.geo.region_name Region name. keyword
ecs.version ECS version this event conforms to. ecs.version is a required field and must exist in all events. When querying across multiple indices -- which may conform to slightly different ECS versions -- this field lets integrations adjust to the schema version of the events. keyword
event.action The action captured by the event. This describes the information in the event. It is more specific than event.category. Examples are group-add, process-started, file-created. The value is normally defined by the implementer. keyword
event.category This is one of four ECS Categorization Fields, and indicates the second level in the ECS category hierarchy. event.category represents the "big buckets" of ECS categories. For example, filtering on event.category:process yields all events relating to process activity. This field is closely related to event.type, which is used as a subcategory. This field is an array. This will allow proper categorization of some events that fall in multiple categories. keyword
event.code Identification code for this event, if one exists. Some event sources use event codes to identify messages unambiguously, regardless of message language or wording adjustments over time. An example of this is the Windows Event ID. keyword
event.created event.created contains the date/time when the event was first read by an agent, or by your pipeline. This field is distinct from @timestamp in that @timestamp typically contain the time extracted from the original event. In most situations, these two timestamps will be slightly different. The difference can be used to calculate the delay between your source generating an event, and the time when your agent first processed it. This can be used to monitor your agent's or pipeline's ability to keep up with your event source. In case the two timestamps are identical, @timestamp should be used. date
event.dataset Name of the dataset. If an event source publishes more than one type of log or events (e.g. access log, error log), the dataset is used to specify which one the event comes from. It's recommended but not required to start the dataset name with the module name, followed by a dot, then the dataset name. keyword
event.hash Hash (perhaps logstash fingerprint) of raw field to be able to demonstrate log integrity. keyword
event.id Unique ID to describe the event. keyword
event.ingested Timestamp when an event arrived in the central data store. This is different from @timestamp, which is when the event originally occurred. It's also different from event.created, which is meant to capture the first time an agent saw the event. In normal conditions, assuming no tampering, the timestamps should chronologically look like this: @timestamp < event.created < event.ingested. date
event.kind This is one of four ECS Categorization Fields, and indicates the highest level in the ECS category hierarchy. event.kind gives high-level information about what type of information the event contains, without being specific to the contents of the event. For example, values of this field distinguish alert events from metric events. The value of this field can be used to inform how these kinds of events should be handled. They may warrant different retention, different access control, it may also help understand whether the data coming in at a regular interval or not. keyword
event.module Name of the module this data is coming from. If your monitoring agent supports the concept of modules or plugins to process events of a given source (e.g. Apache logs), event.module should contain the name of this module. keyword
event.outcome This is one of four ECS Categorization Fields, and indicates the lowest level in the ECS category hierarchy. event.outcome simply denotes whether the event represents a success or a failure from the perspective of the entity that produced the event. Note that when a single transaction is described in multiple events, each event may populate different values of event.outcome, according to their perspective. Also note that in the case of a compound event (a single event that contains multiple logical events), this field should be populated with the value that best captures the overall success or failure from the perspective of the event producer. Further note that not all events will have an associated outcome. For example, this field is generally not populated for metric events, events with event.type:info, or any events for which an outcome does not make logical sense. keyword
event.provider Source of the event. Event transports such as Syslog or the Windows Event Log typically mention the source of an event. It can be the name of the software that generated the event (e.g. Sysmon, httpd), or of a subsystem of the operating system (kernel, Microsoft-Windows-Security-Auditing). keyword
event.sequence Sequence number of the event. The sequence number is a value published by some event sources, to make the exact ordering of events unambiguous, regardless of the timestamp precision. long
event.severity The numeric severity of the event according to your event source. What the different severity values mean can be different between sources and use cases. It's up to the implementer to make sure severities are consistent across events from the same source. The Syslog severity belongs in log.syslog.severity.code. event.severity is meant to represent the severity according to the event source (e.g. firewall, IDS). If the event source does not publish its own severity, you may optionally copy the log.syslog.severity.code to event.severity. long
event.type This is one of four ECS Categorization Fields, and indicates the third level in the ECS category hierarchy. event.type represents a categorization "sub-bucket" that, when used along with the event.category field values, enables filtering events down to a level appropriate for single visualization. This field is an array. This will allow proper categorization of some events that fall in multiple event types. keyword
group.Ext Object for all custom defined fields to live in. object
group.Ext.real Group info prior to any setgid operations. object
group.Ext.real.id Unique identifier for the group on the system/platform. keyword
group.Ext.real.name Name of the group. keyword
group.domain Name of the directory the group is a member of. For example, an LDAP or Active Directory domain name. keyword
group.id Unique identifier for the group on the system/platform. keyword
group.name Name of the group. keyword
host.architecture Operating system architecture. keyword
host.domain Name of the domain of which the host is a member. For example, on Windows this could be the host's Active Directory domain or NetBIOS domain name. For Linux this could be the domain of the host's LDAP provider. keyword
host.hostname Hostname of the host. It normally contains what the hostname command returns on the host machine. keyword
host.id Unique host id. As hostname is not always unique, use values that are meaningful in your environment. Example: The current usage of beat.name. keyword
host.ip Host ip addresses. ip
host.mac Host mac addresses. keyword
host.name Name of the host. It can contain what hostname returns on Unix systems, the fully qualified domain name, or a name specified by the user. The sender decides which value to use. keyword
host.os.Ext Object for all custom defined fields to live in. object
host.os.Ext.variant A string value or phrase that further aid to classify or qualify the operating system (OS). For example the distribution for a Linux OS will be entered in this field. keyword
host.os.family OS family (such as redhat, debian, freebsd, windows). keyword
host.os.full Operating system name, including the version or code name. keyword
host.os.kernel Operating system kernel version as a raw string. keyword
host.os.name Operating system name, without the version. keyword
host.os.platform Operating system platform (such centos, ubuntu, windows). keyword
host.os.version Operating system version as a raw string. keyword
host.type Type of host. For Cloud providers this can be the machine type like t2.medium. If vm, this could be the container, for example, or other information meaningful in your environment. keyword
host.uptime Seconds the host has been up. long
message For log events the message field contains the log message, optimized for viewing in a log viewer. For structured logs without an original message field, other fields can be concatenated to form a human-readable summary of the event. If multiple messages exist, they can be combined into one message. text
package.name Package name keyword
process.Ext Object for all custom defined fields to live in. object
process.Ext.ancestry An array of entity_ids indicating the ancestors for this event keyword
process.Ext.authentication_id Process authentication ID keyword
process.Ext.code_signature Nested version of ECS code_signature fieldset. nested
process.Ext.code_signature.exists Boolean to capture if a signature is present. boolean
process.Ext.code_signature.status Additional information about the certificate status. This is useful for logging cryptographic errors with the certificate validity or trust status. Leave unpopulated if the validity or trust of the certificate was unchecked. keyword
process.Ext.code_signature.subject_name Subject name of the code signer keyword
process.Ext.code_signature.trusted Stores the trust status of the certificate chain. Validating the trust of the certificate chain may be complicated, and this field should only be populated by tools that actively check the status. boolean
process.Ext.code_signature.valid Boolean to capture if the digital signature is verified against the binary content. Leave unpopulated if a certificate was unchecked. boolean
process.Ext.session Session information for the current process keyword
process.Ext.token.elevation Whether the token is elevated or not boolean
process.Ext.token.elevation_type What level of elevation the token has keyword
process.Ext.token.integrity_level_name Human readable integrity level. keyword
process.args Array of process arguments, starting with the absolute path to the executable. May be filtered to protect sensitive information. keyword
process.args_count Length of the process.args array. This field can be useful for querying or performing bucket analysis on how many arguments were provided to start a process. More arguments may be an indication of suspicious activity. long
process.code_signature.exists Boolean to capture if a signature is present. boolean
process.code_signature.status Additional information about the certificate status. This is useful for logging cryptographic errors with the certificate validity or trust status. Leave unpopulated if the validity or trust of the certificate was unchecked. keyword
process.code_signature.subject_name Subject name of the code signer keyword
process.code_signature.trusted Stores the trust status of the certificate chain. Validating the trust of the certificate chain may be complicated, and this field should only be populated by tools that actively check the status. boolean
process.code_signature.valid Boolean to capture if the digital signature is verified against the binary content. Leave unpopulated if a certificate was unchecked. boolean
process.command_line Full command line that started the process, including the absolute path to the executable, and all arguments. Some arguments may be filtered to protect sensitive information. keyword
process.entity_id Unique identifier for the process. The implementation of this is specified by the data source, but some examples of what could be used here are a process-generated UUID, Sysmon Process GUIDs, or a hash of some uniquely identifying components of a process. Constructing a globally unique identifier is a common practice to mitigate PID reuse as well as to identify a specific process over time, across multiple monitored hosts. keyword
process.executable Absolute path to the process executable. keyword
process.exit_code The exit code of the process, if this is a termination event. The field should be absent if there is no exit code for the event (e.g. process start). long
process.hash.md5 MD5 hash. keyword
process.hash.sha1 SHA1 hash. keyword
process.hash.sha256 SHA256 hash. keyword
process.hash.sha512 SHA512 hash. keyword
process.name Process name. Sometimes called program name or similar. keyword
process.parent.Ext Object for all custom defined fields to live in. object
process.parent.Ext.code_signature Nested version of ECS code_signature fieldset. nested
process.parent.Ext.code_signature.exists Boolean to capture if a signature is present. boolean
process.parent.Ext.code_signature.status Additional information about the certificate status. This is useful for logging cryptographic errors with the certificate validity or trust status. Leave unpopulated if the validity or trust of the certificate was unchecked. keyword
process.parent.Ext.code_signature.subject_name Subject name of the code signer keyword
process.parent.Ext.code_signature.trusted Stores the trust status of the certificate chain. Validating the trust of the certificate chain may be complicated, and this field should only be populated by tools that actively check the status. boolean
process.parent.Ext.code_signature.valid Boolean to capture if the digital signature is verified against the binary content. Leave unpopulated if a certificate was unchecked. boolean
process.parent.Ext.real The field set containing process info in case of any pid spoofing. This is mainly useful for process.parent. object
process.parent.Ext.real.pid For process.parent this will be the ppid of the process that actually spawned the current process. long
process.parent.args Array of process arguments, starting with the absolute path to the executable. May be filtered to protect sensitive information. keyword
process.parent.args_count Length of the process.args array. This field can be useful for querying or performing bucket analysis on how many arguments were provided to start a process. More arguments may be an indication of suspicious activity. long
process.parent.code_signature.exists Boolean to capture if a signature is present. boolean
process.parent.code_signature.status Additional information about the certificate status. This is useful for logging cryptographic errors with the certificate validity or trust status. Leave unpopulated if the validity or trust of the certificate was unchecked. keyword
process.parent.code_signature.subject_name Subject name of the code signer keyword
process.parent.code_signature.trusted Stores the trust status of the certificate chain. Validating the trust of the certificate chain may be complicated, and this field should only be populated by tools that actively check the status. boolean
process.parent.code_signature.valid Boolean to capture if the digital signature is verified against the binary content. Leave unpopulated if a certificate was unchecked. boolean
process.parent.command_line Full command line that started the process, including the absolute path to the executable, and all arguments. Some arguments may be filtered to protect sensitive information. keyword
process.parent.entity_id Unique identifier for the process. The implementation of this is specified by the data source, but some examples of what could be used here are a process-generated UUID, Sysmon Process GUIDs, or a hash of some uniquely identifying components of a process. Constructing a globally unique identifier is a common practice to mitigate PID reuse as well as to identify a specific process over time, across multiple monitored hosts. keyword
process.parent.executable Absolute path to the process executable. keyword
process.parent.exit_code The exit code of the process, if this is a termination event. The field should be absent if there is no exit code for the event (e.g. process start). long
process.parent.hash.md5 MD5 hash. keyword
process.parent.hash.sha1 SHA1 hash. keyword
process.parent.hash.sha256 SHA256 hash. keyword
process.parent.hash.sha512 SHA512 hash. keyword
process.parent.name Process name. Sometimes called program name or similar. keyword
process.parent.pe.company Internal company name of the file, provided at compile-time. keyword
process.parent.pe.description Internal description of the file, provided at compile-time. keyword
process.parent.pe.file_version Internal version of the file, provided at compile-time. keyword
process.parent.pe.imphash A hash of the imports in a PE file. An imphash -- or import hash -- can be used to fingerprint binaries even after recompilation or other code-level transformations have occurred, which would change more traditional hash values. Learn more at https://www.fireeye.com/blog/threat-research/2014/01/tracking-malware-import-hashing.html. keyword
process.parent.pe.original_file_name Internal name of the file, provided at compile-time. keyword
process.parent.pe.product Internal product name of the file, provided at compile-time. keyword
process.parent.pgid Identifier of the group of processes the process belongs to. long
process.parent.pid Process id. long
process.parent.ppid Parent process' pid. long
process.parent.thread.id Thread ID. long
process.parent.thread.name Thread name. keyword
process.parent.title Process title. The proctitle, some times the same as process name. Can also be different: for example a browser setting its title to the web page currently opened. keyword
process.parent.uptime Seconds the process has been up. long
process.parent.working_directory The working directory of the process. keyword
process.pe.company Internal company name of the file, provided at compile-time. keyword
process.pe.description Internal description of the file, provided at compile-time. keyword
process.pe.file_version Internal version of the file, provided at compile-time. keyword
process.pe.imphash A hash of the imports in a PE file. An imphash -- or import hash -- can be used to fingerprint binaries even after recompilation or other code-level transformations have occurred, which would change more traditional hash values. Learn more at https://www.fireeye.com/blog/threat-research/2014/01/tracking-malware-import-hashing.html. keyword
process.pe.original_file_name Internal name of the file, provided at compile-time. keyword
process.pe.product Internal product name of the file, provided at compile-time. keyword
process.pgid Identifier of the group of processes the process belongs to. long
process.pid Process id. long
process.ppid Parent process' pid. long
process.thread.id Thread ID. long
process.thread.name Thread name. keyword
process.title Process title. The proctitle, some times the same as process name. Can also be different: for example a browser setting its title to the web page currently opened. keyword
process.uptime Seconds the process has been up. long
process.working_directory The working directory of the process. keyword
source.geo.city_name City name. keyword
source.geo.continent_name Name of the continent. keyword
source.geo.country_iso_code Country ISO code. keyword
source.geo.country_name Country name. keyword
source.geo.location Longitude and latitude. geo_point
source.geo.name User-defined description of a location, at the level of granularity they care about. Could be the name of their data centers, the floor number, if this describes a local physical entity, city names. Not typically used in automated geolocation. keyword
source.geo.region_iso_code Region ISO code. keyword
source.geo.region_name Region name. keyword
user.Ext Object for all custom defined fields to live in. object
user.Ext.real User info prior to any setuid operations. object
user.Ext.real.id One or multiple unique identifiers of the user. keyword
user.Ext.real.name Short name or login of the user. keyword
user.domain Name of the directory the user is a member of. For example, an LDAP or Active Directory domain name. keyword
user.email User email address. keyword
user.full_name User's full name, if available. keyword
user.group.Ext Object for all custom defined fields to live in. object
user.group.Ext.real Group info prior to any setgid operations. object
user.group.Ext.real.id Unique identifier for the group on the system/platform. keyword
user.group.Ext.real.name Name of the group. keyword
user.group.domain Name of the directory the group is a member of. For example, an LDAP or Active Directory domain name. keyword
user.group.id Unique identifier for the group on the system/platform. keyword
user.group.name Name of the group. keyword
user.hash Unique user hash to correlate information for a user in anonymized form. Useful if user.id or user.name contain confidential information and cannot be used. keyword
user.id Unique identifier of the user. keyword
user.name Short name or login of the user. keyword

registry

Exported fields

Field Description Type
@timestamp Date/time when the event originated. This is the date/time extracted from the event, typically representing when the event was generated by the source. If the event source has no original timestamp, this value is typically populated by the first time the event was received by the pipeline. Required field for all events. date
agent.id Unique identifier of this agent (if one exists). Example: For Beats this would be beat.id. keyword
agent.type Type of the agent. The agent type always stays the same and should be given by the agent used. In case of Filebeat the agent would always be Filebeat also if two Filebeat instances are run on the same machine. keyword
agent.version Version of the agent. keyword
data_stream.dataset Data stream dataset name. constant_keyword
data_stream.namespace Data stream namespace. constant_keyword
data_stream.type Data stream type. constant_keyword
destination.geo.city_name City name. keyword
destination.geo.continent_name Name of the continent. keyword
destination.geo.country_iso_code Country ISO code. keyword
destination.geo.country_name Country name. keyword
destination.geo.location Longitude and latitude. geo_point
destination.geo.name User-defined description of a location, at the level of granularity they care about. Could be the name of their data centers, the floor number, if this describes a local physical entity, city names. Not typically used in automated geolocation. keyword
destination.geo.region_iso_code Region ISO code. keyword
destination.geo.region_name Region name. keyword
ecs.version ECS version this event conforms to. ecs.version is a required field and must exist in all events. When querying across multiple indices -- which may conform to slightly different ECS versions -- this field lets integrations adjust to the schema version of the events. keyword
event.action The action captured by the event. This describes the information in the event. It is more specific than event.category. Examples are group-add, process-started, file-created. The value is normally defined by the implementer. keyword
event.category This is one of four ECS Categorization Fields, and indicates the second level in the ECS category hierarchy. event.category represents the "big buckets" of ECS categories. For example, filtering on event.category:process yields all events relating to process activity. This field is closely related to event.type, which is used as a subcategory. This field is an array. This will allow proper categorization of some events that fall in multiple categories. keyword
event.code Identification code for this event, if one exists. Some event sources use event codes to identify messages unambiguously, regardless of message language or wording adjustments over time. An example of this is the Windows Event ID. keyword
event.created event.created contains the date/time when the event was first read by an agent, or by your pipeline. This field is distinct from @timestamp in that @timestamp typically contain the time extracted from the original event. In most situations, these two timestamps will be slightly different. The difference can be used to calculate the delay between your source generating an event, and the time when your agent first processed it. This can be used to monitor your agent's or pipeline's ability to keep up with your event source. In case the two timestamps are identical, @timestamp should be used. date
event.dataset Name of the dataset. If an event source publishes more than one type of log or events (e.g. access log, error log), the dataset is used to specify which one the event comes from. It's recommended but not required to start the dataset name with the module name, followed by a dot, then the dataset name. keyword
event.hash Hash (perhaps logstash fingerprint) of raw field to be able to demonstrate log integrity. keyword
event.id Unique ID to describe the event. keyword
event.ingested Timestamp when an event arrived in the central data store. This is different from @timestamp, which is when the event originally occurred. It's also different from event.created, which is meant to capture the first time an agent saw the event. In normal conditions, assuming no tampering, the timestamps should chronologically look like this: @timestamp < event.created < event.ingested. date
event.kind This is one of four ECS Categorization Fields, and indicates the highest level in the ECS category hierarchy. event.kind gives high-level information about what type of information the event contains, without being specific to the contents of the event. For example, values of this field distinguish alert events from metric events. The value of this field can be used to inform how these kinds of events should be handled. They may warrant different retention, different access control, it may also help understand whether the data coming in at a regular interval or not. keyword
event.module Name of the module this data is coming from. If your monitoring agent supports the concept of modules or plugins to process events of a given source (e.g. Apache logs), event.module should contain the name of this module. keyword
event.outcome This is one of four ECS Categorization Fields, and indicates the lowest level in the ECS category hierarchy. event.outcome simply denotes whether the event represents a success or a failure from the perspective of the entity that produced the event. Note that when a single transaction is described in multiple events, each event may populate different values of event.outcome, according to their perspective. Also note that in the case of a compound event (a single event that contains multiple logical events), this field should be populated with the value that best captures the overall success or failure from the perspective of the event producer. Further note that not all events will have an associated outcome. For example, this field is generally not populated for metric events, events with event.type:info, or any events for which an outcome does not make logical sense. keyword
event.provider Source of the event. Event transports such as Syslog or the Windows Event Log typically mention the source of an event. It can be the name of the software that generated the event (e.g. Sysmon, httpd), or of a subsystem of the operating system (kernel, Microsoft-Windows-Security-Auditing). keyword
event.sequence Sequence number of the event. The sequence number is a value published by some event sources, to make the exact ordering of events unambiguous, regardless of the timestamp precision. long
event.severity The numeric severity of the event according to your event source. What the different severity values mean can be different between sources and use cases. It's up to the implementer to make sure severities are consistent across events from the same source. The Syslog severity belongs in log.syslog.severity.code. event.severity is meant to represent the severity according to the event source (e.g. firewall, IDS). If the event source does not publish its own severity, you may optionally copy the log.syslog.severity.code to event.severity. long
event.type This is one of four ECS Categorization Fields, and indicates the third level in the ECS category hierarchy. event.type represents a categorization "sub-bucket" that, when used along with the event.category field values, enables filtering events down to a level appropriate for single visualization. This field is an array. This will allow proper categorization of some events that fall in multiple event types. keyword
group.Ext Object for all custom defined fields to live in. object
group.Ext.real Group info prior to any setgid operations. object
group.Ext.real.id Unique identifier for the group on the system/platform. keyword
group.Ext.real.name Name of the group. keyword
group.domain Name of the directory the group is a member of. For example, an LDAP or Active Directory domain name. keyword
group.id Unique identifier for the group on the system/platform. keyword
group.name Name of the group. keyword
host.architecture Operating system architecture. keyword
host.domain Name of the domain of which the host is a member. For example, on Windows this could be the host's Active Directory domain or NetBIOS domain name. For Linux this could be the domain of the host's LDAP provider. keyword
host.hostname Hostname of the host. It normally contains what the hostname command returns on the host machine. keyword
host.id Unique host id. As hostname is not always unique, use values that are meaningful in your environment. Example: The current usage of beat.name. keyword
host.ip Host ip addresses. ip
host.mac Host mac addresses. keyword
host.name Name of the host. It can contain what hostname returns on Unix systems, the fully qualified domain name, or a name specified by the user. The sender decides which value to use. keyword
host.os.Ext Object for all custom defined fields to live in. object
host.os.Ext.variant A string value or phrase that further aid to classify or qualify the operating system (OS). For example the distribution for a Linux OS will be entered in this field. keyword
host.os.family OS family (such as redhat, debian, freebsd, windows). keyword
host.os.full Operating system name, including the version or code name. keyword
host.os.kernel Operating system kernel version as a raw string. keyword
host.os.name Operating system name, without the version. keyword
host.os.platform Operating system platform (such centos, ubuntu, windows). keyword
host.os.version Operating system version as a raw string. keyword
host.type Type of host. For Cloud providers this can be the machine type like t2.medium. If vm, this could be the container, for example, or other information meaningful in your environment. keyword
host.uptime Seconds the host has been up. long
message For log events the message field contains the log message, optimized for viewing in a log viewer. For structured logs without an original message field, other fields can be concatenated to form a human-readable summary of the event. If multiple messages exist, they can be combined into one message. text
process.Ext Object for all custom defined fields to live in. object
process.Ext.ancestry An array of entity_ids indicating the ancestors for this event keyword
process.entity_id Unique identifier for the process. The implementation of this is specified by the data source, but some examples of what could be used here are a process-generated UUID, Sysmon Process GUIDs, or a hash of some uniquely identifying components of a process. Constructing a globally unique identifier is a common practice to mitigate PID reuse as well as to identify a specific process over time, across multiple monitored hosts. keyword
process.executable Absolute path to the process executable. keyword
process.name Process name. Sometimes called program name or similar. keyword
process.pid Process id. long
process.thread.id Thread ID. long
registry.data.bytes Original bytes written with base64 encoding. For Windows registry operations, such as SetValueEx and RegQueryValueEx, this corresponds to the data pointed by lp_data. This is optional but provides better recoverability and should be populated for REG_BINARY encoded values. keyword
registry.data.strings Content when writing string types. Populated as an array when writing string data to the registry. For single string registry types (REG_SZ, REG_EXPAND_SZ), this should be an array with one string. For sequences of string with REG_MULTI_SZ, this array will be variable length. For numeric data, such as REG_DWORD and REG_QWORD, this should be populated with the decimal representation (e.g "1"). keyword
registry.hive Abbreviated name for the hive. keyword
registry.key Hive-relative path of keys. keyword
registry.path Full path, including hive, key and value keyword
registry.value Name of the value written. keyword
source.geo.city_name City name. keyword
source.geo.continent_name Name of the continent. keyword
source.geo.country_iso_code Country ISO code. keyword
source.geo.country_name Country name. keyword
source.geo.location Longitude and latitude. geo_point
source.geo.name User-defined description of a location, at the level of granularity they care about. Could be the name of their data centers, the floor number, if this describes a local physical entity, city names. Not typically used in automated geolocation. keyword
source.geo.region_iso_code Region ISO code. keyword
source.geo.region_name Region name. keyword
user.Ext Object for all custom defined fields to live in. object
user.Ext.real User info prior to any setuid operations. object
user.Ext.real.id One or multiple unique identifiers of the user. keyword
user.Ext.real.name Short name or login of the user. keyword
user.domain Name of the directory the user is a member of. For example, an LDAP or Active Directory domain name. keyword
user.email User email address. keyword
user.full_name User's full name, if available. keyword
user.group.Ext Object for all custom defined fields to live in. object
user.group.Ext.real Group info prior to any setgid operations. object
user.group.Ext.real.id Unique identifier for the group on the system/platform. keyword
user.group.Ext.real.name Name of the group. keyword
user.group.domain Name of the directory the group is a member of. For example, an LDAP or Active Directory domain name. keyword
user.group.id Unique identifier for the group on the system/platform. keyword
user.group.name Name of the group. keyword
user.hash Unique user hash to correlate information for a user in anonymized form. Useful if user.id or user.name contain confidential information and cannot be used. keyword
user.id Unique identifier of the user. keyword
user.name Short name or login of the user. keyword

security

Exported fields

Field Description Type
@timestamp Date/time when the event originated. This is the date/time extracted from the event, typically representing when the event was generated by the source. If the event source has no original timestamp, this value is typically populated by the first time the event was received by the pipeline. Required field for all events. date
agent.id Unique identifier of this agent (if one exists). Example: For Beats this would be beat.id. keyword
agent.type Type of the agent. The agent type always stays the same and should be given by the agent used. In case of Filebeat the agent would always be Filebeat also if two Filebeat instances are run on the same machine. keyword
agent.version Version of the agent. keyword
data_stream.dataset Data stream dataset name. constant_keyword
data_stream.namespace Data stream namespace. constant_keyword
data_stream.type Data stream type. constant_keyword
destination.geo.city_name City name. keyword
destination.geo.continent_name Name of the continent. keyword
destination.geo.country_iso_code Country ISO code. keyword
destination.geo.country_name Country name. keyword
destination.geo.location Longitude and latitude. geo_point
destination.geo.name User-defined description of a location, at the level of granularity they care about. Could be the name of their data centers, the floor number, if this describes a local physical entity, city names. Not typically used in automated geolocation. keyword
destination.geo.region_iso_code Region ISO code. keyword
destination.geo.region_name Region name. keyword
ecs.version ECS version this event conforms to. ecs.version is a required field and must exist in all events. When querying across multiple indices -- which may conform to slightly different ECS versions -- this field lets integrations adjust to the schema version of the events. keyword
event.action The action captured by the event. This describes the information in the event. It is more specific than event.category. Examples are group-add, process-started, file-created. The value is normally defined by the implementer. keyword
event.category This is one of four ECS Categorization Fields, and indicates the second level in the ECS category hierarchy. event.category represents the "big buckets" of ECS categories. For example, filtering on event.category:process yields all events relating to process activity. This field is closely related to event.type, which is used as a subcategory. This field is an array. This will allow proper categorization of some events that fall in multiple categories. keyword
event.code Identification code for this event, if one exists. Some event sources use event codes to identify messages unambiguously, regardless of message language or wording adjustments over time. An example of this is the Windows Event ID. keyword
event.created event.created contains the date/time when the event was first read by an agent, or by your pipeline. This field is distinct from @timestamp in that @timestamp typically contain the time extracted from the original event. In most situations, these two timestamps will be slightly different. The difference can be used to calculate the delay between your source generating an event, and the time when your agent first processed it. This can be used to monitor your agent's or pipeline's ability to keep up with your event source. In case the two timestamps are identical, @timestamp should be used. date
event.dataset Name of the dataset. If an event source publishes more than one type of log or events (e.g. access log, error log), the dataset is used to specify which one the event comes from. It's recommended but not required to start the dataset name with the module name, followed by a dot, then the dataset name. keyword
event.hash Hash (perhaps logstash fingerprint) of raw field to be able to demonstrate log integrity. keyword
event.id Unique ID to describe the event. keyword
event.ingested Timestamp when an event arrived in the central data store. This is different from @timestamp, which is when the event originally occurred. It's also different from event.created, which is meant to capture the first time an agent saw the event. In normal conditions, assuming no tampering, the timestamps should chronologically look like this: @timestamp < event.created < event.ingested. date
event.kind This is one of four ECS Categorization Fields, and indicates the highest level in the ECS category hierarchy. event.kind gives high-level information about what type of information the event contains, without being specific to the contents of the event. For example, values of this field distinguish alert events from metric events. The value of this field can be used to inform how these kinds of events should be handled. They may warrant different retention, different access control, it may also help understand whether the data coming in at a regular interval or not. keyword
event.module Name of the module this data is coming from. If your monitoring agent supports the concept of modules or plugins to process events of a given source (e.g. Apache logs), event.module should contain the name of this module. keyword
event.outcome This is one of four ECS Categorization Fields, and indicates the lowest level in the ECS category hierarchy. event.outcome simply denotes whether the event represents a success or a failure from the perspective of the entity that produced the event. Note that when a single transaction is described in multiple events, each event may populate different values of event.outcome, according to their perspective. Also note that in the case of a compound event (a single event that contains multiple logical events), this field should be populated with the value that best captures the overall success or failure from the perspective of the event producer. Further note that not all events will have an associated outcome. For example, this field is generally not populated for metric events, events with event.type:info, or any events for which an outcome does not make logical sense. keyword
event.provider Source of the event. Event transports such as Syslog or the Windows Event Log typically mention the source of an event. It can be the name of the software that generated the event (e.g. Sysmon, httpd), or of a subsystem of the operating system (kernel, Microsoft-Windows-Security-Auditing). keyword
event.sequence Sequence number of the event. The sequence number is a value published by some event sources, to make the exact ordering of events unambiguous, regardless of the timestamp precision. long
event.severity The numeric severity of the event according to your event source. What the different severity values mean can be different between sources and use cases. It's up to the implementer to make sure severities are consistent across events from the same source. The Syslog severity belongs in log.syslog.severity.code. event.severity is meant to represent the severity according to the event source (e.g. firewall, IDS). If the event source does not publish its own severity, you may optionally copy the log.syslog.severity.code to event.severity. long
event.type This is one of four ECS Categorization Fields, and indicates the third level in the ECS category hierarchy. event.type represents a categorization "sub-bucket" that, when used along with the event.category field values, enables filtering events down to a level appropriate for single visualization. This field is an array. This will allow proper categorization of some events that fall in multiple event types. keyword
group.Ext Object for all custom defined fields to live in. object
group.Ext.real Group info prior to any setgid operations. object
group.Ext.real.id Unique identifier for the group on the system/platform. keyword
group.Ext.real.name Name of the group. keyword
group.domain Name of the directory the group is a member of. For example, an LDAP or Active Directory domain name. keyword
group.id Unique identifier for the group on the system/platform. keyword
group.name Name of the group. keyword
host.architecture Operating system architecture. keyword
host.domain Name of the domain of which the host is a member. For example, on Windows this could be the host's Active Directory domain or NetBIOS domain name. For Linux this could be the domain of the host's LDAP provider. keyword
host.hostname Hostname of the host. It normally contains what the hostname command returns on the host machine. keyword
host.id Unique host id. As hostname is not always unique, use values that are meaningful in your environment. Example: The current usage of beat.name. keyword
host.ip Host ip addresses. ip
host.mac Host mac addresses. keyword
host.name Name of the host. It can contain what hostname returns on Unix systems, the fully qualified domain name, or a name specified by the user. The sender decides which value to use. keyword
host.os.Ext Object for all custom defined fields to live in. object
host.os.Ext.variant A string value or phrase that further aid to classify or qualify the operating system (OS). For example the distribution for a Linux OS will be entered in this field. keyword
host.os.family OS family (such as redhat, debian, freebsd, windows). keyword
host.os.full Operating system name, including the version or code name. keyword
host.os.kernel Operating system kernel version as a raw string. keyword
host.os.name Operating system name, without the version. keyword
host.os.platform Operating system platform (such centos, ubuntu, windows). keyword
host.os.version Operating system version as a raw string. keyword
host.type Type of host. For Cloud providers this can be the machine type like t2.medium. If vm, this could be the container, for example, or other information meaningful in your environment. keyword
host.uptime Seconds the host has been up. long
message For log events the message field contains the log message, optimized for viewing in a log viewer. For structured logs without an original message field, other fields can be concatenated to form a human-readable summary of the event. If multiple messages exist, they can be combined into one message. text
process.Ext Object for all custom defined fields to live in. object
process.Ext.ancestry An array of entity_ids indicating the ancestors for this event keyword
process.entity_id Unique identifier for the process. The implementation of this is specified by the data source, but some examples of what could be used here are a process-generated UUID, Sysmon Process GUIDs, or a hash of some uniquely identifying components of a process. Constructing a globally unique identifier is a common practice to mitigate PID reuse as well as to identify a specific process over time, across multiple monitored hosts. keyword
process.executable Absolute path to the process executable. keyword
process.name Process name. Sometimes called program name or similar. keyword
process.pid Process id. long
process.thread.id Thread ID. long
source.geo.city_name City name. keyword
source.geo.continent_name Name of the continent. keyword
source.geo.country_iso_code Country ISO code. keyword
source.geo.country_name Country name. keyword
source.geo.location Longitude and latitude. geo_point
source.geo.name User-defined description of a location, at the level of granularity they care about. Could be the name of their data centers, the floor number, if this describes a local physical entity, city names. Not typically used in automated geolocation. keyword
source.geo.region_iso_code Region ISO code. keyword
source.geo.region_name Region name. keyword
user.Ext Object for all custom defined fields to live in. object
user.Ext.real User info prior to any setuid operations. object
user.Ext.real.id One or multiple unique identifiers of the user. keyword
user.Ext.real.name Short name or login of the user. keyword
user.domain Name of the directory the user is a member of. For example, an LDAP or Active Directory domain name. keyword
user.email User email address. keyword
user.full_name User's full name, if available. keyword
user.group.Ext Object for all custom defined fields to live in. object
user.group.Ext.real Group info prior to any setgid operations. object
user.group.Ext.real.id Unique identifier for the group on the system/platform. keyword
user.group.Ext.real.name Name of the group. keyword
user.group.domain Name of the directory the group is a member of. For example, an LDAP or Active Directory domain name. keyword
user.group.id Unique identifier for the group on the system/platform. keyword
user.group.name Name of the group. keyword
user.hash Unique user hash to correlate information for a user in anonymized form. Useful if user.id or user.name contain confidential information and cannot be used. keyword
user.id Unique identifier of the user. keyword
user.name Short name or login of the user. keyword

Metrics

The metrics type of documents are stored in metrics-endpoint.* indices. The following sections define the mapped fields sent by the endpoint.

metadata

Exported fields

Field Description Type
@timestamp Date/time when the event originated. This is the date/time extracted from the event, typically representing when the event was generated by the source. If the event source has no original timestamp, this value is typically populated by the first time the event was received by the pipeline. Required field for all events. date
Endpoint.policy The policy fields are used to hold information about applied policy. object
Endpoint.policy.applied information about the policy that is applied object
Endpoint.policy.applied.id the id of the applied policy keyword
Endpoint.policy.applied.name the name of this applied policy keyword
Endpoint.policy.applied.status the status of the applied policy keyword
Endpoint.status The current status of the endpoint e.g. enrolled, unenrolled. keyword
agent.id Unique identifier of this agent (if one exists). Example: For Beats this would be beat.id. keyword
agent.name Custom name of the agent. This is a name that can be given to an agent. This can be helpful if for example two Filebeat instances are running on the same host but a human readable separation is needed on which Filebeat instance data is coming from. If no name is given, the name is often left empty. keyword
agent.type Type of the agent. The agent type always stays the same and should be given by the agent used. In case of Filebeat the agent would always be Filebeat also if two Filebeat instances are run on the same machine. keyword
agent.version Version of the agent. keyword
data_stream.dataset Data stream dataset name. constant_keyword
data_stream.namespace Data stream namespace. constant_keyword
data_stream.type Data stream type. constant_keyword
ecs.version ECS version this event conforms to. ecs.version is a required field and must exist in all events. When querying across multiple indices -- which may conform to slightly different ECS versions -- this field lets integrations adjust to the schema version of the events. keyword
elastic.agent The agent fields contain data about the Elastic Agent. The Elastic Agent is the management agent that manages other agents or process on the host. object
elastic.agent.id Unique identifier of this elastic agent (if one exists). keyword
event.action The action captured by the event. This describes the information in the event. It is more specific than event.category. Examples are group-add, process-started, file-created. The value is normally defined by the implementer. keyword
event.category This is one of four ECS Categorization Fields, and indicates the second level in the ECS category hierarchy. event.category represents the "big buckets" of ECS categories. For example, filtering on event.category:process yields all events relating to process activity. This field is closely related to event.type, which is used as a subcategory. This field is an array. This will allow proper categorization of some events that fall in multiple categories. keyword
event.code Identification code for this event, if one exists. Some event sources use event codes to identify messages unambiguously, regardless of message language or wording adjustments over time. An example of this is the Windows Event ID. keyword
event.created event.created contains the date/time when the event was first read by an agent, or by your pipeline. This field is distinct from @timestamp in that @timestamp typically contain the time extracted from the original event. In most situations, these two timestamps will be slightly different. The difference can be used to calculate the delay between your source generating an event, and the time when your agent first processed it. This can be used to monitor your agent's or pipeline's ability to keep up with your event source. In case the two timestamps are identical, @timestamp should be used. date
event.dataset Name of the dataset. If an event source publishes more than one type of log or events (e.g. access log, error log), the dataset is used to specify which one the event comes from. It's recommended but not required to start the dataset name with the module name, followed by a dot, then the dataset name. keyword
event.hash Hash (perhaps logstash fingerprint) of raw field to be able to demonstrate log integrity. keyword
event.id Unique ID to describe the event. keyword
event.ingested Timestamp when an event arrived in the central data store. This is different from @timestamp, which is when the event originally occurred. It's also different from event.created, which is meant to capture the first time an agent saw the event. In normal conditions, assuming no tampering, the timestamps should chronologically look like this: @timestamp < event.created < event.ingested. date
event.kind This is one of four ECS Categorization Fields, and indicates the highest level in the ECS category hierarchy. event.kind gives high-level information about what type of information the event contains, without being specific to the contents of the event. For example, values of this field distinguish alert events from metric events. The value of this field can be used to inform how these kinds of events should be handled. They may warrant different retention, different access control, it may also help understand whether the data coming in at a regular interval or not. keyword
event.module Name of the module this data is coming from. If your monitoring agent supports the concept of modules or plugins to process events of a given source (e.g. Apache logs), event.module should contain the name of this module. keyword
event.outcome This is one of four ECS Categorization Fields, and indicates the lowest level in the ECS category hierarchy. event.outcome simply denotes whether the event represents a success or a failure from the perspective of the entity that produced the event. Note that when a single transaction is described in multiple events, each event may populate different values of event.outcome, according to their perspective. Also note that in the case of a compound event (a single event that contains multiple logical events), this field should be populated with the value that best captures the overall success or failure from the perspective of the event producer. Further note that not all events will have an associated outcome. For example, this field is generally not populated for metric events, events with event.type:info, or any events for which an outcome does not make logical sense. keyword
event.provider Source of the event. Event transports such as Syslog or the Windows Event Log typically mention the source of an event. It can be the name of the software that generated the event (e.g. Sysmon, httpd), or of a subsystem of the operating system (kernel, Microsoft-Windows-Security-Auditing). keyword
event.sequence Sequence number of the event. The sequence number is a value published by some event sources, to make the exact ordering of events unambiguous, regardless of the timestamp precision. long
event.severity The numeric severity of the event according to your event source. What the different severity values mean can be different between sources and use cases. It's up to the implementer to make sure severities are consistent across events from the same source. The Syslog severity belongs in log.syslog.severity.code. event.severity is meant to represent the severity according to the event source (e.g. firewall, IDS). If the event source does not publish its own severity, you may optionally copy the log.syslog.severity.code to event.severity. long
event.type This is one of four ECS Categorization Fields, and indicates the third level in the ECS category hierarchy. event.type represents a categorization "sub-bucket" that, when used along with the event.category field values, enables filtering events down to a level appropriate for single visualization. This field is an array. This will allow proper categorization of some events that fall in multiple event types. keyword
host.architecture Operating system architecture. keyword
host.domain Name of the domain of which the host is a member. For example, on Windows this could be the host's Active Directory domain or NetBIOS domain name. For Linux this could be the domain of the host's LDAP provider. keyword
host.hostname Hostname of the host. It normally contains what the hostname command returns on the host machine. keyword
host.id Unique host id. As hostname is not always unique, use values that are meaningful in your environment. Example: The current usage of beat.name. keyword
host.ip Host ip addresses. ip
host.mac Host mac addresses. keyword
host.name Name of the host. It can contain what hostname returns on Unix systems, the fully qualified domain name, or a name specified by the user. The sender decides which value to use. keyword
host.os.Ext Object for all custom defined fields to live in. object
host.os.Ext.variant A string value or phrase that further aid to classify or qualify the operating system (OS). For example the distribution for a Linux OS will be entered in this field. keyword
host.os.family OS family (such as redhat, debian, freebsd, windows). keyword
host.os.full Operating system name, including the version or code name. keyword
host.os.kernel Operating system kernel version as a raw string. keyword
host.os.name Operating system name, without the version. keyword
host.os.platform Operating system platform (such centos, ubuntu, windows). keyword
host.os.version Operating system version as a raw string. keyword
host.type Type of host. For Cloud providers this can be the machine type like t2.medium. If vm, this could be the container, for example, or other information meaningful in your environment. keyword
host.uptime Seconds the host has been up. long

metrics

Metrics documents contain performance information about the endpoint executable and the host it is running on.

Exported fields

Field Description Type
@timestamp Date/time when the event originated. This is the date/time extracted from the event, typically representing when the event was generated by the source. If the event source has no original timestamp, this value is typically populated by the first time the event was received by the pipeline. Required field for all events. date
Endpoint.metrics Metrics fields hold the endpoint and system's performance metrics object
Endpoint.metrics.cpu CPU statistics object
Endpoint.metrics.cpu.endpoint CPU metrics for the endpoint object
Endpoint.metrics.cpu.endpoint.histogram This field defines an elasticsearch histogram field (https://www.elastic.co/guide/en/elasticsearch/reference/current/histogram.html#histogram) The values field includes 20 buckets (each bucket is 5%) representing the cpu usage The counts field includes 20 buckets of how many times the endpoint's cpu usage fell into each bucket histogram
Endpoint.metrics.cpu.endpoint.latest Average CPU over the last sample interval half_float
Endpoint.metrics.cpu.endpoint.mean Average CPU load used by the endpoint half_float
Endpoint.metrics.memory Memory statistics object
Endpoint.metrics.memory.endpoint Endpoint memory utilization object
Endpoint.metrics.memory.endpoint.private The memory private to the endpoint object
Endpoint.metrics.memory.endpoint.private.latest The memory usage by the endpoint for the last sample interval long
Endpoint.metrics.memory.endpoint.private.mean Average memory usage by the endpoint since its start long
Endpoint.metrics.uptime Number of seconds since boot object
Endpoint.metrics.uptime.endpoint Number of seconds since the endpoint was started long
Endpoint.metrics.uptime.system Number of seconds since the system was started long
agent.id Unique identifier of this agent (if one exists). Example: For Beats this would be beat.id. keyword
agent.type Type of the agent. The agent type always stays the same and should be given by the agent used. In case of Filebeat the agent would always be Filebeat also if two Filebeat instances are run on the same machine. keyword
agent.version Version of the agent. keyword
data_stream.dataset Data stream dataset name. constant_keyword
data_stream.namespace Data stream namespace. constant_keyword
data_stream.type Data stream type. constant_keyword
ecs.version ECS version this event conforms to. ecs.version is a required field and must exist in all events. When querying across multiple indices -- which may conform to slightly different ECS versions -- this field lets integrations adjust to the schema version of the events. keyword
event.action The action captured by the event. This describes the information in the event. It is more specific than event.category. Examples are group-add, process-started, file-created. The value is normally defined by the implementer. keyword
event.category This is one of four ECS Categorization Fields, and indicates the second level in the ECS category hierarchy. event.category represents the "big buckets" of ECS categories. For example, filtering on event.category:process yields all events relating to process activity. This field is closely related to event.type, which is used as a subcategory. This field is an array. This will allow proper categorization of some events that fall in multiple categories. keyword
event.code Identification code for this event, if one exists. Some event sources use event codes to identify messages unambiguously, regardless of message language or wording adjustments over time. An example of this is the Windows Event ID. keyword
event.created event.created contains the date/time when the event was first read by an agent, or by your pipeline. This field is distinct from @timestamp in that @timestamp typically contain the time extracted from the original event. In most situations, these two timestamps will be slightly different. The difference can be used to calculate the delay between your source generating an event, and the time when your agent first processed it. This can be used to monitor your agent's or pipeline's ability to keep up with your event source. In case the two timestamps are identical, @timestamp should be used. date
event.dataset Name of the dataset. If an event source publishes more than one type of log or events (e.g. access log, error log), the dataset is used to specify which one the event comes from. It's recommended but not required to start the dataset name with the module name, followed by a dot, then the dataset name. keyword
event.end event.end contains the date when the event ended or when the activity was last observed. date
event.hash Hash (perhaps logstash fingerprint) of raw field to be able to demonstrate log integrity. keyword
event.id Unique ID to describe the event. keyword
event.ingested Timestamp when an event arrived in the central data store. This is different from @timestamp, which is when the event originally occurred. It's also different from event.created, which is meant to capture the first time an agent saw the event. In normal conditions, assuming no tampering, the timestamps should chronologically look like this: @timestamp < event.created < event.ingested. date
event.kind This is one of four ECS Categorization Fields, and indicates the highest level in the ECS category hierarchy. event.kind gives high-level information about what type of information the event contains, without being specific to the contents of the event. For example, values of this field distinguish alert events from metric events. The value of this field can be used to inform how these kinds of events should be handled. They may warrant different retention, different access control, it may also help understand whether the data coming in at a regular interval or not. keyword
event.module Name of the module this data is coming from. If your monitoring agent supports the concept of modules or plugins to process events of a given source (e.g. Apache logs), event.module should contain the name of this module. keyword
event.outcome This is one of four ECS Categorization Fields, and indicates the lowest level in the ECS category hierarchy. event.outcome simply denotes whether the event represents a success or a failure from the perspective of the entity that produced the event. Note that when a single transaction is described in multiple events, each event may populate different values of event.outcome, according to their perspective. Also note that in the case of a compound event (a single event that contains multiple logical events), this field should be populated with the value that best captures the overall success or failure from the perspective of the event producer. Further note that not all events will have an associated outcome. For example, this field is generally not populated for metric events, events with event.type:info, or any events for which an outcome does not make logical sense. keyword
event.provider Source of the event. Event transports such as Syslog or the Windows Event Log typically mention the source of an event. It can be the name of the software that generated the event (e.g. Sysmon, httpd), or of a subsystem of the operating system (kernel, Microsoft-Windows-Security-Auditing). keyword
event.sequence Sequence number of the event. The sequence number is a value published by some event sources, to make the exact ordering of events unambiguous, regardless of the timestamp precision. long
event.severity The numeric severity of the event according to your event source. What the different severity values mean can be different between sources and use cases. It's up to the implementer to make sure severities are consistent across events from the same source. The Syslog severity belongs in log.syslog.severity.code. event.severity is meant to represent the severity according to the event source (e.g. firewall, IDS). If the event source does not publish its own severity, you may optionally copy the log.syslog.severity.code to event.severity. long
event.start event.start contains the date when the event started or when the activity was first observed. date
event.type This is one of four ECS Categorization Fields, and indicates the third level in the ECS category hierarchy. event.type represents a categorization "sub-bucket" that, when used along with the event.category field values, enables filtering events down to a level appropriate for single visualization. This field is an array. This will allow proper categorization of some events that fall in multiple event types. keyword
host.architecture Operating system architecture. keyword
host.domain Name of the domain of which the host is a member. For example, on Windows this could be the host's Active Directory domain or NetBIOS domain name. For Linux this could be the domain of the host's LDAP provider. keyword
host.hostname Hostname of the host. It normally contains what the hostname command returns on the host machine. keyword
host.id Unique host id. As hostname is not always unique, use values that are meaningful in your environment. Example: The current usage of beat.name. keyword
host.ip Host ip addresses. ip
host.mac Host mac addresses. keyword
host.name Name of the host. It can contain what hostname returns on Unix systems, the fully qualified domain name, or a name specified by the user. The sender decides which value to use. keyword
host.os.Ext Object for all custom defined fields to live in. object
host.os.Ext.variant A string value or phrase that further aid to classify or qualify the operating system (OS). For example the distribution for a Linux OS will be entered in this field. keyword
host.os.family OS family (such as redhat, debian, freebsd, windows). keyword
host.os.full Operating system name, including the version or code name. keyword
host.os.kernel Operating system kernel version as a raw string. keyword
host.os.name Operating system name, without the version. keyword
host.os.platform Operating system platform (such centos, ubuntu, windows). keyword
host.os.version Operating system version as a raw string. keyword
host.type Type of host. For Cloud providers this can be the machine type like t2.medium. If vm, this could be the container, for example, or other information meaningful in your environment. keyword
host.uptime Seconds the host has been up. long
message For log events the message field contains the log message, optimized for viewing in a log viewer. For structured logs without an original message field, other fields can be concatenated to form a human-readable summary of the event. If multiple messages exist, they can be combined into one message. text

policy response

Exported fields

Field Description Type
@timestamp Date/time when the event originated. This is the date/time extracted from the event, typically representing when the event was generated by the source. If the event source has no original timestamp, this value is typically populated by the first time the event was received by the pipeline. Required field for all events. date
Endpoint.policy The policy fields are used to hold information about applied policy. object
Endpoint.policy.applied information about the policy that is applied object
Endpoint.policy.applied.id the id of the applied policy keyword
Endpoint.policy.applied.name the name of this applied policy keyword
Endpoint.policy.applied.status the status of the applied policy keyword
Endpoint.policy.applied.version the version of this applied policy keyword
agent.id Unique identifier of this agent (if one exists). Example: For Beats this would be beat.id. keyword
agent.type Type of the agent. The agent type always stays the same and should be given by the agent used. In case of Filebeat the agent would always be Filebeat also if two Filebeat instances are run on the same machine. keyword
agent.version Version of the agent. keyword
data_stream.dataset Data stream dataset name. constant_keyword
data_stream.namespace Data stream namespace. constant_keyword
data_stream.type Data stream type. constant_keyword
ecs.version ECS version this event conforms to. ecs.version is a required field and must exist in all events. When querying across multiple indices -- which may conform to slightly different ECS versions -- this field lets integrations adjust to the schema version of the events. keyword
event.action The action captured by the event. This describes the information in the event. It is more specific than event.category. Examples are group-add, process-started, file-created. The value is normally defined by the implementer. keyword
event.category This is one of four ECS Categorization Fields, and indicates the second level in the ECS category hierarchy. event.category represents the "big buckets" of ECS categories. For example, filtering on event.category:process yields all events relating to process activity. This field is closely related to event.type, which is used as a subcategory. This field is an array. This will allow proper categorization of some events that fall in multiple categories. keyword
event.code Identification code for this event, if one exists. Some event sources use event codes to identify messages unambiguously, regardless of message language or wording adjustments over time. An example of this is the Windows Event ID. keyword
event.created event.created contains the date/time when the event was first read by an agent, or by your pipeline. This field is distinct from @timestamp in that @timestamp typically contain the time extracted from the original event. In most situations, these two timestamps will be slightly different. The difference can be used to calculate the delay between your source generating an event, and the time when your agent first processed it. This can be used to monitor your agent's or pipeline's ability to keep up with your event source. In case the two timestamps are identical, @timestamp should be used. date
event.dataset Name of the dataset. If an event source publishes more than one type of log or events (e.g. access log, error log), the dataset is used to specify which one the event comes from. It's recommended but not required to start the dataset name with the module name, followed by a dot, then the dataset name. keyword
event.hash Hash (perhaps logstash fingerprint) of raw field to be able to demonstrate log integrity. keyword
event.id Unique ID to describe the event. keyword
event.ingested Timestamp when an event arrived in the central data store. This is different from @timestamp, which is when the event originally occurred. It's also different from event.created, which is meant to capture the first time an agent saw the event. In normal conditions, assuming no tampering, the timestamps should chronologically look like this: @timestamp < event.created < event.ingested. date
event.kind This is one of four ECS Categorization Fields, and indicates the highest level in the ECS category hierarchy. event.kind gives high-level information about what type of information the event contains, without being specific to the contents of the event. For example, values of this field distinguish alert events from metric events. The value of this field can be used to inform how these kinds of events should be handled. They may warrant different retention, different access control, it may also help understand whether the data coming in at a regular interval or not. keyword
event.module Name of the module this data is coming from. If your monitoring agent supports the concept of modules or plugins to process events of a given source (e.g. Apache logs), event.module should contain the name of this module. keyword
event.outcome This is one of four ECS Categorization Fields, and indicates the lowest level in the ECS category hierarchy. event.outcome simply denotes whether the event represents a success or a failure from the perspective of the entity that produced the event. Note that when a single transaction is described in multiple events, each event may populate different values of event.outcome, according to their perspective. Also note that in the case of a compound event (a single event that contains multiple logical events), this field should be populated with the value that best captures the overall success or failure from the perspective of the event producer. Further note that not all events will have an associated outcome. For example, this field is generally not populated for metric events, events with event.type:info, or any events for which an outcome does not make logical sense. keyword
event.provider Source of the event. Event transports such as Syslog or the Windows Event Log typically mention the source of an event. It can be the name of the software that generated the event (e.g. Sysmon, httpd), or of a subsystem of the operating system (kernel, Microsoft-Windows-Security-Auditing). keyword
event.sequence Sequence number of the event. The sequence number is a value published by some event sources, to make the exact ordering of events unambiguous, regardless of the timestamp precision. long
event.severity The numeric severity of the event according to your event source. What the different severity values mean can be different between sources and use cases. It's up to the implementer to make sure severities are consistent across events from the same source. The Syslog severity belongs in log.syslog.severity.code. event.severity is meant to represent the severity according to the event source (e.g. firewall, IDS). If the event source does not publish its own severity, you may optionally copy the log.syslog.severity.code to event.severity. long
event.type This is one of four ECS Categorization Fields, and indicates the third level in the ECS category hierarchy. event.type represents a categorization "sub-bucket" that, when used along with the event.category field values, enables filtering events down to a level appropriate for single visualization. This field is an array. This will allow proper categorization of some events that fall in multiple event types. keyword
host.architecture Operating system architecture. keyword
host.hostname Hostname of the host. It normally contains what the hostname command returns on the host machine. keyword
host.id Unique host id. As hostname is not always unique, use values that are meaningful in your environment. Example: The current usage of beat.name. keyword
host.ip Host ip addresses. ip
host.mac Host mac addresses. keyword
host.name Name of the host. It can contain what hostname returns on Unix systems, the fully qualified domain name, or a name specified by the user. The sender decides which value to use. keyword
host.os.Ext Object for all custom defined fields to live in. object
host.os.Ext.variant A string value or phrase that further aid to classify or qualify the operating system (OS). For example the distribution for a Linux OS will be entered in this field. keyword
host.os.family OS family (such as redhat, debian, freebsd, windows). keyword
host.os.full Operating system name, including the version or code name. keyword
host.os.kernel Operating system kernel version as a raw string. keyword
host.os.name Operating system name, without the version. keyword
host.os.platform Operating system platform (such centos, ubuntu, windows). keyword
host.os.version Operating system version as a raw string. keyword
message For log events the message field contains the log message, optimized for viewing in a log viewer. For structured logs without an original message field, other fields can be concatenated to form a human-readable summary of the event. If multiple messages exist, they can be combined into one message. text