Elastic Codes

Windows*

event.code

  • 1 - Process creation

  • 13 - Registry modification (Description: Triggered when a registry key value is set (modified))

  • 15 - FileCreateStreamHash (browser file download event)

  • 11 - File create

  • 3 - Network connection

🔹 Authentication & Logon Events

  • 4624 – Successful logon

  • 4625 – Failed logon attempt

  • 4634 – Logoff

  • 4648 – Logon using explicit credentials

  • 4672 – Special privileges assigned to a new logon (e.g., admin logins)

  • 4776 – NTLM authentication attempt

🔹 Account & Privilege Changes

  • 4720 – A user account was created

  • 4722 – A user account was enabled

  • 4725 – A user account was disabled

  • 4726 – A user account was deleted

  • 4732 – A user was added to a privileged group

  • 4733 – A user was removed from a privileged group

🔹 Process & System Monitoring

  • 4688 – A new process was created

  • 4689 – A process was terminated

  • 4657 – A registry value was modified

  • 4697 – A service was installed on the system

🔹 Security & Threat Detection

  • 1102 – Security audit log cleared (potential sign of tampering)

  • 4621 – Administrator recovered from a crash

  • 4728 – A user was added to the Administrators group

  • 4768 – A Kerberos authentication ticket was requested

  • 4769 – A Kerberos service ticket was requested

  • 4104 - Remote PowerShell script execution

🔹 File & Object Access

  • 4663 – Access to an object was requested (file/folder access)

  • 4656 – A handle to an object was requested

process

  • process.command_line: -

  • process.parent.name: - app that runs the process

  • process.parent.command_line - command executed when started


Zeek*

  • source.ip - ip adress

  • dns.question.name - queried domain

Last updated