We made several improvements to Windows
intake format to easier the analyst's investigation:
The process.parent.pid
field was added to allow analysts to read the whole process tree.
The TargetLogonId
field was added to allow analysts to get the user session ID. With this ID, analysts can easily search for all actions made by an attacker.
The MessageNumber
and MessageTotal
fields were added to allow analysts to reconstitute a Poweshell script that was splitted.
The parsing of the field registry.key
was fixed.
Before: registry.key
= PATH\VALUE
Now: registry.key
= PATH
This field is now ECS compliant and aligned with other integrations like SentinelOne. It will easier investigation or creation of universal detection rules.
Finally, the detection pattern of related detection rules was updated accordingly (see changelog of June 21th 2024).