Change log for WINEVTLOG_XML
Date | Changes |
---|---|
2024-10-10 | Enhancement:
- Added support for a new pattern of syslog logs. - Changed EventId mapping from "column4" to "column6". |
2024-10-04 | Enhancement:
- Added support for new pattern of SYSLOG logs. |
2024-10-01 | Enhancement:
- Modified the XML pattern to parse "LogonProcessName". |
2024-09-24 | Enhancement:
- Added new Grok patterns to parse "task_command" and "task_arguments" fields. |
2024-09-03 | Enhancement:
- Mapped "DomainPolicyChanged" to "security_result.detection_fields". |
2024-08-30 | Enhancement:
- Added support to handle unparsed SYSLOG + KV logs. - Modified mappong for "AttributeLDAPDisplayName" from "target.resource.type" to "target.resource.resource_subtype". - Handled logs having "EventId" as 4826. - Mapped "MemberSid" to "principal.resource.attribute.labels". |
2024-08-27 | Enhancement:
- Modified FILE/USER/NETWORK/STATUS uncategorized events to appropriate event types. |
2024-08-21 | Enhancement:
- Added support to parse syslog and CSV logs. |
2024-08-16 | Enhancement:
- Mapped "source" to "about.process.command_line". |
2024-08-13 | Enhancement:
- Added support for new format of syslog and JSON logs. |
2024-08-08 | Enhancement:
- Mapped "task_command" to "principal.process.file.full_path" and "task_arguments" to "principal.process.command_line" for EventIDs "4698", "4699", "4700", "4701", and "4702". |
2024-08-06 | Enhancement:
- Added support to parse logs with EventIDs 1149, 21, and 4611. - Added support to map "CallerProcessName" to "target.file.full_path" for logs with EventId 4799. - Mapped "Param1" to "target.user.userid". - Mapped "Param2" to "principal.administrative_domain". - Mapped "Param3" to "principal.ip". - Added a grok pattern to parse UserData from field "Message". |
2024-07-26 | Enhancement:
- Added support to parse dropped logs. - Mapped "SubjectUserName" and "SubjectUserSid" to "additional.fields". |
2024-07-08 | Enhancement:
- Mapped "Hostname" to "additional.fields" with "src" as the key. - Added support to parse logs for EventID 5157. - Mapped "UserRight", and "AuditSourceName" to "security_result.detection_fields". - Added support for McAfee logs. |
2024-06-24 | Enhancement:
- Added support to parse dropped logs. - Mapped "PackageName" to "security_result.detection_fields". |
2024-06-10 | Bug-Fix, Enhancement:
- Added "gsub" for "NewProcessName" to restore "C~" to "C:". - Added "gsub" for "Task Name" and "Auditing Settings" to parse them properly. - Added a Grok pattern for "Logon Type" for EventID 4634. - Mapped "AgentLogFile" to "additional.fields". |
2024-05-20 | Enhancement, Bug-Fix:
- Added support to parse logs for EventIDs 5807, 5723, 5721, 5840, 5802. - Changed mapping of "TargetUserName" from "additional.fields" to "target.user.userid". - Mapped "SubjectAccountName" to "principal.user.userid" and "TargetAccountName" to "target.user.userid" for EventIDs 4648, 4624, and 4720. - Mapped "ProcessName" to "target.process.file.full_path" for EventID 1. - Mapped "TargetServerName" to "additional.fields". - Added "gsub" for "Source Workstation" and "Error Code" fields to avoid "Error" getting mapped to "principal.hostname". |
2024-05-14 | Enhancement:
- Added support to parse logs for EventID 4739. |
2024-05-06 | Enhancement:
- Mapped "Privileges" to "security_result.detection_fields". |
2024-04-23 | Enhancement:
- Added support to map "Logon Type" for logs with EventIds 4624. - Mapped "Logon Type" to "additional.fields". |
2024-04-23 | Enhancement:
- Added support to map "Logon Type" for logs with EventIds 4624. - Mapped "Logon Type" to "additional.fields". |
2024-04-16 | Enhancement:
- Mapped "IpAddress1" to "principal.ip" when "EventID" is 4625. - Mapped "AccessRight" to "additional.fields" as per its corresponding values. |
2024-03-25 | Enhancement:
- Added additional mapping of fields for logs with EventIds 4648, 4771. |
2024-03-15 | Enhancement:
- Changed mapping of "principal.user.user_display_name" to "target.user.user_display_name" for "EventIDs" 4732,4733,4728,4729,4756,4757,4746,4747,4751,4752,4761,4762 logs. - When "EventID" is 5140, then mapped "ShareName" to "target.file.names". - When "EventID" is 4624, then mapped "LmPackageName" to "target.labels". |
2024-02-20 | Enhancement:
- Added support for new pattern of XML logs embedded in JSON fields. - Added support for "EventIDs" 4947 and 8222. - When "EventID" is 4985, then mapped "SubjectDomainName" to "principal.administrative_domain". |
2024-02-13 | Enhancement:
- Added a block for "EventId" "1309" to parse unparsed logs. - Replaced redundant code with common code. - Mapped "Hostname" to "principal.asset.hostname". - Mapped "WorkstationName", "TargetAccountDomain", "SourceAddress", "DSName", "database_name", and "target_hostname" to "target.asset.hostname". |
2024-01-25 | Enhancement:
- Mapped "Properties" to "target.resource.attribute.labels". |
2024-01-05 | Enhancement:
- Mapped "TargetLogonId", "AccessMask", "CertIssuerName", "TicketOptions", "TargetUserName", "AttributeLDAPDisplayName", "AttributeValues", "ObjectDN" to "additional.fields". |
2023-12-29 | Enhancement:
- Added support for "EventIDs" 0, 208, 219, 233, 1000, 1026, 1315, 10000, 10001, 10002, 10003, 10114, 16969, 17573, 18453, 18454, 36867, 49930 logs. - Added a null check for "registry_key" before setting the "metadata.event_type" to "REGISTRY_MODIFICATION" for "EventID" 13. - Added a null check for "registry_key" before setting the "metadata.event_type" to "REGISTRY_CREATION" for "EventID" 12. - When "target.registry" is empty and "Hostname" is present, then set "metadata.event_type" to "STATUS_UPDATE" for "EventIDs" 12, 13. - Added a regular expression pattern as conditional check for "UserID" to match "windows_sid" pattern for "EventIDs" 7040, 7045. - When "UserID" does not match "windows_sid", then mapped "UserID" to "principal.user.userid" for "EventID" 4070. - When "UserID" does not match "windows_sid", then mapped "UserID" to "target.user.userid" for "EventID" 4075. |
2023-11-20 | Enhancement:
- Added a regular expression pattern as conditional check for "TargetUserSid" to match "windows_sid" pattern. - Added a regular expression pattern as conditional check for "TargetSid" to match "windows_sid" pattern. - Added a regular expression pattern as conditional check for "SubjectUserSid" to match "windows_sid" pattern. - Set "event1.idm.read_only_udm.metadata.event_type" from "STATUS_UPDATE" to "USER_RESOURCE_ACCESS" when "Event.System.EventID" value is "4797". - Mapped "Event.System.Provider@Name" to "event1.principal.application" when "Event.System.EventID" value is "4797". - Mapped "Event.System.Correlation@ActivityID" to "event1.security_result.detection_fields" when "Event.System.EventID" value is "4797". - Mapped "Event.System.Execution@ProcessID" to "event1.principal.process.pid" when "Event.System.EventID" value is "4797". - Mapped "Event.EventData.Data@SubjectUserName" to "event1.idm.read_only_udm.principal.user.userid" when "Event.System.EventID" value is "4797". - Mapped "Event.EventData.Data@SubjectDomainName" to "event1.idm.read_only_udm.principal.administrative_domain" when "Event.System.EventID" value is "4797". - Mapped "Event.EventData.Data@Workstation" to "event1.idm.read_only_udm.target.hostname" when "Event.System.EventID" value is "4797". - Mapped "Event.EventData.Data@TargetUserName" to "event1.idm.read_only_udm.target.user.userid" when "Event.System.EventID" value is "4797". - Mapped "Event.EventData.Data@TargetDomainName" to "event1.idm.read_only_udm.target.administrative_domain" when "Event.System.EventID" value is "4797". |
2023-11-10 | Enhancement:
- Added support for EventIDs 4098, 14554 logs. - Mapped "Keywords" to "additional.fields". - Mapped "AttributeLDAPDisplayName" to "target.resource.attribute.labels" for EventId 5136. |
2023-11-02 | Enhancement:
- For logs with EventId 4624: - Added a new Grok pattern to parse log with EventId 4624. - Mapped "PrincipalDomain" to "principal.administrative_domain". - Mapped "PrincipalAccountName" to "principal.user.userid". - Mapped "TargetAccountName" to "target.user.userid". - Mapped "TargetDomain" to "target.administrative_domain". - Mapped "Logon GUID" to "principal.resource.id". - Mapped "ProcessID" to "target.process.pid". - Mapped "SourceAddress" to "principal.ip". - Mapped "Security_ID", "VirtualAccount", "EventCategory", "ImpersonationLevel", "LinkedLogonID", "NetworkAccountName", "NetworkAccountDomain",and "RestrictedAdminMode" to "security_result.detection_fields". - Mapped "LogonID" and "TargetLogonID" to "about.labels". - Mapped "AgentDevice" to "additional.fields". - Mapped "EventType" to "target.registry.registry_key". - Mapped "SourcePort" to "principal.port". - For logs with EventId 4794: - Mapped "Workstation" to "principal.hostname". - Mapped "ProcessId" to "principal.process.pid". - Mapped "SourceName" to "target.application". - Mapped "ProviderGuid" to "target.resource.product_object_id". |
2023-10-10 | Enhancement:
- Added support for EventIDs 403,404,410,510,1001,1502,1100,4105,4703,4793,4797,4954,5158,5379,5827,6417,10016,10028,18452,36871,1073748860,1073747010, 2147483684 logs. - Added support for logs that contain Task =~ "SE_ADT". - Added null check for "AccountName" for EventID=1704,4624,4625,5861. |
2023-09-12 | Bug-Fix:
- Removed mapping of "ProcessName" from "principal.user.userid". - Added support for new pattern of 4781 event logs. - Checked and added "on_error" for "ProviderGuid","LogonID","SourceName","Task","SourceModuleName","SourceModuleType" for EventID=4825. - Added null check for "UserID" for EventID=517. - Added support for new pattern of 4731 event logs. |
2023-08-25 | - Resolved issue caused due to mapping of "security_result.about.resource.type".
|
2023-08-21 | Bug-Fix:
- Mapped "Account Name" to "principal.user.userid" for EventID 4625 logs. - Mapped "Account Domain" to "principal.administrative_domain" for EventID 4625 logs. - Mapped "Workstation Name" to "principal.hostname" for EventID 4625 logs. - Mapped "Caller Process Id" to "principal.process.pid" for EventID 4625 logs. - Mapped "Source Network Address" to "principal.ip" for EventID 4625 logs. - Mapped "Source Port" to "principal.port" for EventID 4625 logs. - Mapped "Logon Process" to "additional.fields" for EventID 4625 logs. - Mapped "Opcode" to "about.labels". - Mapped "SubjectLogonId" to "principal.labels". - Mapped "SubjectUserSid" to "principal.user.windows_sid". - Mapped "ServiceName" to "target.application". - Mapped "ImpersonationLevel" to "about.labels". - Mapped "TargetHandleId" to "about.labels". - Mapped "RestrictedAdminMode" to "about.labels". - Mapped "TargetOutboundDomainName" to "target.user.attribute.labels". - Mapped "KeyLength" to "target.labels". - Mapped "LmPackageName" to "target.labels". - Mapped "TargetLogonId" to "target.labels". - Mapped "TransmittedServices" to "target.labels". - Mapped "TargetLinkedLogonId" to "target.labels". - Mapped "VirtualAccount" to "target.labels". - Mapped "OldSd" to "target.resource.attribute.labels". - Mapped "NewSd" to "target.resource.attribute.labels". |
2023-07-24 | Enhancement:
- Added support for EventID 16384 and 16394. - Handled nested XML EventID logs. |
2023-03-17 | Enhancement:
- Supported key-value format logs. - Mapped "Channel", "SubjectLogonId", and "ThreadId" to "additional.labels". Enhancement: Parsed the logs with EventID's 4674, 4932, and 4933. - When "EventID" is 4731, 4732, 4733, 4734, 4735, 4737, 4798, or 4799, mapped the following: - Mapped "TargetDomainName" to "target.administrative_domain". - Mapped "TargetSid" to "target.user.windows_sid". |
2023-01-15 | Enhancement:
- For "EventId": 8004. - Mapped "Task" to "target.resource.type". - Mapped "DomainName" to "principal.administrative_domain". - Mapped "Keywords","Channel","Level","SChannelName","SChannelType","Opcode" to "". - Mapped "ThreadID" to "target.resource.attribute.labels". |
2023-01-13 | Enhancement:
- Handled unparsed logs having "EventId": 5001, 5007. - Mapped "ProcessID" to "target.process.pid". - Mapped "ProviderGuid" to "target.resource.product_object_id". - Mapped "UserID" to "target.user.windows_sid". - Mapped "ProductName" and "ProductVersion" to "metadata.product_version". - Mapped "metadata.event_type" to "STATUS_UPDATE". |
2022-12-06 | Enhancement:
- Handled unparsed logs having "EventId": 8004. |