Microsoft Sysmon

LogZilla App Store application: Microsoft Sysmon

Overview

Microsoft Sysmon (System Monitor) is a Windows system service and device driver that monitors and logs system activity to the Windows event log. Sysmon provides detailed information about process creations, network connections, file creation time changes, and other system events. Security teams use Sysmon for threat hunting, malware analysis, and incident response.

App Function

  • Parse all 30 Sysmon event types from Microsoft-Windows-Sysmon/Operational
  • Extract process execution details (command line, hashes, parent process)
  • Extract network connection metadata (IPs, ports, protocols)
  • Categorize events by type (Process, Network, File, Configuration, Service)
  • Apply MITRE ATT&CK technique mappings for security analysis
  • Apply compliance framework tags (PCI-DSS, HIPAA, SOX, NIST)
  • Detect suspicious patterns (encoded commands, suspicious paths)

Vendor Documentation

Supported Event IDs

IDDescriptionCriticalityMITRE ATT&CK
1Process CreateMediumT1059
2File creation time changedMediumT1070.006
3Network connectionLowT1071
4Sysmon service state changedLow-
5Process terminatedLow-
6Driver loadedMediumT1547.006
7Image loadedMediumT1574
8CreateRemoteThreadHighT1055
9RawAccessReadLowT1006
10ProcessAccessHighT1003
11FileCreateLowT1105
12RegistryEvent (Object create/delete)MediumT1112
13RegistryEvent (Value Set)MediumT1547.001
14RegistryEvent (Key/Value Rename)MediumT1112
15FileCreateStreamHashMediumT1564.004
16ServiceConfigurationChangeLow-
17PipeEvent (Pipe Created)MediumT1559
18PipeEvent (Pipe Connected)MediumT1570
19WmiEvent (WmiEventFilter)HighT1546.003
20WmiEvent (WmiEventConsumer)HighT1546.003
21WmiEvent (WmiEventConsumerToFilter)HighT1546.003
22DNSEvent (DNS query)LowT1071.004
23FileDelete (archived)MediumT1070.004
24ClipboardChangeLowT1115
25ProcessTamperingHighT1055
26FileDeleteDetectedMediumT1070.004
27FileBlockExecutableMedium-
28FileBlockShreddingLowT1561
29FileExecutableDetectedLowT1204
255ErrorLow-

Device Configuration

Configure Windows hosts to forward Sysmon events to LogZilla:

  1. Install Sysmon on Windows hosts using an appropriate configuration file
  2. Install and configure LogZilla Windows Agent
  3. Configure the Windows Agent to forward events from the Microsoft-Windows-Sysmon/Operational log
  4. Restart the Windows Agent service

Verification

Generate test activity (create a process, make a network connection), then verify events appear in LogZilla with program name Microsoft-Windows-Sysmon.

Incoming Log Format

Sysmon events arrive via LogZilla Windows Agent in JSON format with extra_fields containing event-specific data.

Event 1: Process Create

text
Process Create:
RuleName: -
UtcTime: 2026-01-08 16:51:06.821
ProcessGuid: {370d727e-e07a-695f-eb5b-000000005b00}
ProcessId: 38044
Image: C:\Program Files\Microsoft OneDrive\FileCoAuth.exe
CommandLine: "C:\Program Files\Microsoft OneDrive\FileCoAuth.exe" -Embedding
User: DOMAIN\username
ParentImage: C:\Windows\System32\svchost.exe
Hashes: SHA256=9660F251B9D748F70A939B12DAE2FD735E854787DB54B9145865FC2D38165F54

Event 3: Network Connection

text
Network connection detected:
RuleName: -
UtcTime: 2026-01-08 16:50:42.736
ProcessGuid: {6eb69dd4-ee6b-693d-4c00-000000001e00}
ProcessId: 3668
Image: C:\Windows\System32\dns.exe
User: NT AUTHORITY\SYSTEM
Protocol: udp
SourceIp: 192.168.161.10
SourcePort: 53
DestinationIp: 192.168.150.119
DestinationPort: 53927

Event 5: Process Terminate

text
Process terminated:
RuleName: -
UtcTime: 2026-01-08 16:51:05.492
ProcessGuid: {f68d5927-e041-695f-3933-030000003700}
ProcessId: 15572
Image: C:\Windows\System32\RuntimeBroker.exe
User: DOMAIN\username

Parsed Metadata Fields

Tag NameExampleDescription
VendorMicrosoftVendor name
ProductSysmonProduct name
Event ClassSecurityEvent classification
Event TypeProcessProcess, Network, File, Configuration, Service, Data
Compliance FrameworkPCI-DSSPCI-DSS, HIPAA, SOX, NIST
Sysmon EventID1Sysmon event ID
Sysmon DescriptionProcess CreateEvent description
CriticalityMediumEvent criticality level
MitreIdT1059MITRE ATT&CK technique ID
MITRE TacticExecutionMITRE ATT&CK tactic
Process NameC:\Windows\System32\cmd.exeProcess executable path
Process Argscmd.exe /c dirCommand line arguments
Parent ProcessC:\Windows\explorer.exeParent process path
UserDOMAIN\usernameUser account
ProtocoltcpNetwork protocol
SrcIP192.168.1.10Source IP address
DstIP192.168.1.20Destination IP address
SrcPort49152Source port
DstPort443Destination port
Image HashSHA256=9660F251...File hash
Integrity LevelMediumProcess integrity level

Log Examples

Suspicious PowerShell with Encoded Command

text
Process Create:
RuleName: -
UtcTime: 2026-01-08 16:51:06.821
ProcessGuid: {370d727e-e07a-695f-eb5b-000000005b00}
ProcessId: 38044
Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
CommandLine: "powershell.exe" -EncodedCommand SGVsbG8gV29ybGQ=
User: DOMAIN\username
ParentImage: C:\Windows\System32\cmd.exe
Hashes: SHA256=9660F251B9D748F70A939B12DAE2FD735E854787DB54B9145865FC2D38165F54

Network Connection to External IP

text
Network connection detected:
RuleName: -
UtcTime: 2026-01-08 16:50:42.736
ProcessGuid: {6eb69dd4-ee6b-693d-4c00-000000001e00}
ProcessId: 3668
Image: C:\Program Files\Google\Chrome\Application\chrome.exe
User: DOMAIN\username
Protocol: tcp
SourceIp: 192.168.1.100
SourcePort: 49152
DestinationIp: 8.8.8.8
DestinationPort: 443

Triggers

TriggerDescription
Sysmon: MITRE ATT&CK Threat DetectedAny event with MITRE ATT&CK mapping
Sysmon: Process Injection DetectedCreateRemoteThread or ProcessTampering
Sysmon: Credential Dumping AttemptProcessAccess to LSASS
Sysmon: WMI Persistence DetectedWMI event subscription activity
Sysmon: Encoded Command DetectedPowerShell with encoded command
Sysmon: Suspicious Pipe ActivityNamed pipe creation or connection
Microsoft Sysmon | LogZilla Documentation