Indicators of Attack Events
Applies To: WatchGuard Advanced EPDR, WatchGuard EPDR, WatchGuard EDR
WatchGuard Advanced EPDR, EPDR, and EDR monitor the processes that run on customer computers and send the generated telemetry data to the WatchGuard cloud. Specialized threat hunters use this data to detect Indicators of Attack (IOA) on customer IT resources.
Telemetry data is stored in events which consist of several fields. The information about the event that triggered the IOA is available in JSON format in the IOA details page, as well as in the attack graphs. Depending on the IOA, some of the fields show in the Other Details section of the IOA details page and in the nodes and arrows on the attack graph. For more information, go to Indicator of Attack Details and About Attack Graphs.
Events
An event is a record that consists of fields that describe an action taken by a process on a computer. Each type of event includes a specific number of fields. This table provides the descriptions, data types, and possible values of the fields in events.
Field | Description | Field Type |
---|---|---|
accesstype |
File access mask:
For all other operations: |
Bitmask |
accnube |
The agent installed on the customer computer can access WatchGuard Cloud. |
Boolean |
action |
Type of action taken by the WatchGuard Agent, by the user, or by the affected process:
|
Enumeration |
actiontype |
Indicates the session type:
|
Enumeration |
age |
Date the file was last modified. |
Date |
blockreason |
Reason for the pop-up message displayed on the computer:
|
Enumeration |
bytesreceived |
Total bytes received by the monitored process. |
Numeric value |
bytessent |
Total bytes sent by the monitored process. |
Numeric value |
callstack/sonsize |
Size in bytes of the child file. |
Numeric value |
childattributes |
Attributes of the child process:
|
Enumeration |
childblake |
Blake2 signature of the child file. |
Character string |
childclassification |
Classification of the child process that performed the logged action.
|
Enumeration |
childfiletime |
Date of the child file logged by the agent. |
Date |
childfilesize |
Size of the child file logged by the agent. |
Numeric value |
childmd5 |
Child file hash. |
Character string |
childpath |
Path of the child file that performed the logged operation. |
Character string |
ChildPID |
Child process ID. |
Numeric value |
childurl |
File download URL. |
Character string |
childstatus |
Child process status:
|
Enumeration |
classname |
Type of device where the process resides. It corresponds to the class specified in the .INF file associated with the device. |
Character string |
configstring |
Version of the MVMF.xml file in use. |
Character string |
commandline |
Command line configured as a task to be run via WMI. |
Character string |
confadvancedrules |
WatchGuard EDR, EPDR, or Advanced EPDR advanced security policy settings. |
Character string |
copy |
Name of the service that triggered the event. |
Character string |
details |
Summary in the form of a group of relevant fields from the event. |
Character string |
description |
Description of the USB device that performed the operation. |
Character string |
detectionid |
Unique identifier of the detection . |
Numeric value |
devicetype |
Type of drive where the process or file that triggered the logged operation resides:
|
Enumeration |
direction |
Network connection direction.
|
Enumeration |
domainlist |
List of domains sent by the process to the DNS server for resolution and number of resolutions per domain. |
{domain_name,n umber#domain_ name,number} |
domainname |
Name of the domain the process tries to access/resolve. |
Character string |
errorcode |
Error code returned by the operating system when there is a failed login attempt:
|
Enumeration |
errorstring |
Character string with debug information on the security product settings. |
Character string |
eventtype |
Event type logged by the agent:
|
Enumeration |
exploitorigin |
Origin of the process exploit attempt:
|
Enumeration |
extendedinfo |
Additional information about Type events:
|
Character string |
failedqueries |
Number of failed DNS resolution requests sent by the process in the last hour. |
Numeric value |
friendlyname |
An easily readable device name. |
Character string |
firstseen |
Date the file was first seen. |
Date |
hostname |
Name of the computer that ran the process. |
Character string |
infodiscard |
Quarantine file internal information. |
Character string |
ipv4status |
IP address type:
|
Enumeration |
isdenied |
Indicates whether the reported action was denied. |
Binary value |
islocal |
Indicates whether the task was created on the local computer or on a remote computer. |
Binary value |
Interactive |
Indicates whether the login is an interactive login. |
Binary value |
idname |
Device name. |
Character string |
key |
Affected registry branch or key. |
Character string |
lastquery |
Last query sent to the cloud by the WatchGuard Endpoints Agent. |
Date |
localip |
Local IP address of the process. |
IP address |
localport |
Depends on the direction field:
|
Numeric value |
localdatetime |
The computer date (in UTC format) at the time the logged event occurred. This date depends on the computer settings. As a result, it can be incorrect. |
Date |
loggeduser |
The user that was logged in to the computer at the time the event was generated. |
Character string |
machinename |
Name of the computer that ran the process. |
Character string |
manufacturer |
Device manufacturer. |
Character string |
MUID |
Internal ID of the customer computer. |
Character string |
objectname |
Unique name of the object within the WMI hierarchy. |
Character string |
opentstamp |
Date of the WMI notification for WMI_CREATEPROC (54) events. |
Bitmask |
operation |
Type of operation performed by the process:
|
Enumeration |
operationflags/ integrityLevel |
Indicates the integrity level assigned by Windows to the item:
|
Enumeration |
operationstatus |
Indicates whether the event must be sent to the Advanced Reporting Tool:
|
Numeric value |
origusername |
User of the computer which performed the operation. |
Character string |
pandaid |
Customer ID. |
Numeric value |
pandaorionstatus |
Indicates the status of the customer computer time settings compared to the clock in WatchGuard Cloud:
|
Enumeration |
pandatimestatus |
Contents of the DateTime, Date, and LocalDateTime fields. |
Date |
parentattributes |
Attributes of the parent process:
|
Enumeration |
parentblake |
Blake2 signature of the parent file that performed the operation. |
Character string |
parentcount |
Number of processes with DNS failures. |
Numeric value |
parentmd5 |
Parent file hash. |
Character string |
parentpath |
Path of the parent file that performed the logged operation. |
Character string |
parentpid |
Parent process ID. |
Numeric value |
parentstatus |
Parent process status:
|
Enumeration |
pecreationsource |
Type of drive where the process was created:
|
Numeric value |
phonedescription |
Phone description if the operation involved a device of this type. |
Character string |
protocol |
Communications protocol used by the process:
|
Enumeration |
querieddomaincount |
Number of different domains sent by the process for which there was a DNS resolution failure in the last hour. |
Numeric value |
regaction |
Type of operation performed on the Windows registry of the computer:
|
Enumeration |
remediationresult |
User’s response to the pop-up message shown by WatchGuard Advanced EPDR, EPDR, or EDR:
|
Enumeration |
remoteip |
IP address of the computer that started the remote session. |
IP address |
remotemachinename |
Name of the computer that started the remote session. |
Character string |
remoteport |
Depends on the direction field:
|
Numeric value |
remoteusername |
Name of the computer that started the remote session. |
Character string |
sessiondate |
Date the antivirus service was last started or last time it was started since the last update. |
Date |
sessiontype |
Login type:
|
Enumeration |
servicelevel |
Agent execution mode:
|
Enumeration |
timeout |
The local scan took too long to complete and the process was delegated to other mechanisms that do not impact performance. |
Boolean |
times |
Number of times the same communication event occurred in the last hour. |
Numeric value |
timestamp |
Timestamp of the action detected on the customer computer that generated the indicator. |
Date |
totalresolutiontime |
Indicates the time it took the cloud to respond, and whether the error code query failed:
|
Numeric value |
type |
Type of WMI operation performed by the process:
|
Enumeration |
uniqueid |
Unique ID of the device. |
Character string |
url |
Download URL launched by the process that generated the logged event. |
Character string |
value |
Type of operation performed on the Windows registry of the computer:
|
Enumeration |
valuedata |
Data type of the value contained in the registry branch:
|
Enumeration |
vdetevent |
Deteven.dll DLL version. |
Character string |
version |
Operating system version of the computer that ran the vulnerable software. |
Character string |
versionagent |
Installed agent version. |
Character string |
versioncontroller |
Psnmvctrl.dll DLL version. |
Character string |
vtabledetevent |
TblEven.dll DLL version. |
Character string |
vtableramsomevent |
TblRansomEven.dll DLL version. |
Character string |
vramsomevent |
RansomEvent.dll DLL version. |
Character string |
vantiexploit |
Anti-exploit technology version. |
Character string |
vtfilteraxtiexploit |
Anti-exploit technology filter version. |
Character string |
versionproduct |
Installed protection product version. |
Character string |
winningtech |
WatchGuard Agent that raised the event:
|
Enumeration |
wsdocs |
Base-64 encoded list of all documents that were open when an exploit detection occurred. |
Character string |