- Print
- DarkLight
Events Overview
LimaCharlie provides a multitude of events based on actions generated by sensors, systems, services, artifacts, and other key functions of the platform. The following pages provide details on structured events available in LimaCharlie. Note, this section only describes events generated by the LimaCharlie Endpoint Agent Sensor or the LimaCharlie platform. Events generated by third-party sources (i.e., ingested via an Adapter) will be provided in their raw format, and can be addressed as such within Detection & Response rules.
Missing events on a sensor timeline?
Not seeing an expected event in your timeline? Be sure that you included all events of interest in your Exfil Control.
Operationalizing Events
Events can be observed and matched by Detection & Response rules to automate behavior and can also be streamed via Outputs to the destination of your choice.
Schema
Specific Event schemas are learned and available through the Schema API, learn more here.
Streams
There are 6 different event streams moving through LimaCharlie:Name | Description | D&R Target | Output |
---|---|---|---|
Events | Events sent from sensors | <default> | ✅ |
Deployment | Lifecycle events sent from sensors | deployment | ✅ |
Detections | Detections reported from D&R rules | detection | ✅ |
Artifacts | Artifacts sent from sensors (or API) | artifact | ✅ |
Artifact Events | Lifecycle events for artifacts | artifact_event | ✅ |
Audit | Audit logs for management activity within LimaCharlie | audit | ✅ |
Billing | Billing activity within LimaCharlie | billing | ✅ |
Formatting
At a high level, events in LimaCharlie are in standard formatted JSON.
{
"type": "object",
"properties": {
"event": {
"type": "any",
"description": "Schema is determined by the routing/event_type"
},
"routing": {
"type": "object",
"properties": {
"this": {
"type": "string",
"description": "GUID (i.e. 1e9e242a512d9a9b16d326ac30229e7b) - see 'Atoms' section for more detail",
"format": "Atom"
},
"event_type": {
"type": "string",
"description": "The event type (e.g. NEW_PROCESS, NETWORK_SUMMARY) dictates the 'event' schema"
},
"event_time": {
"type": "integer",
"description": "The time the event was observed on the host"
},
"event_id": {
"type": "string",
"format": "UUID"
},
"oid": {
"type": "string",
"format": "UUID",
"description": "Organization ID"
},
"sid": {
"type": ["string", "null"],
"format": "UUID",
"description": "Sensor ID"
},
"did": {
"type": ["string", "null"],
"format": "UUID",
"description": "Device ID"
},
"iid": {
"type": ["string", "null"],
"format": "UUID",
"description": "Installer Key ID"
},
"investigation_id": {
"type": ["string", "null"],
"format": "string",
"description": "Events responding to a command will include this if it was provided along with the command"
},
"parent": {
"type": ["string", "null"],
"description": "Atom of possible parent event",
"format": "Atom"
},
"target": {
"type": ["string", "null"],
"description": "Atom of possible target event",
"format": "Atom"
},
"hostname": {
"type": ["string", "null"],
},
"arch": {
"type": ["integer", "null"],
"description": "Integer corresponds with sensor architecture"
},
"plat": {
"type": ["integer", "null"],
"description": "Integer corresponds with sensor platform"
},
"tags": {
"type": ["array"],
"format": "string",
"description": "Tags applied to sensor at the time the event was sent"
},
}
}
}
}
The following is a sample event utilizing the above schema:
{
"event": {
"BASE_ADDRESS": 140702709383168,
"COMMAND_LINE": "C:\\\\Windows\\\\System32\\\\evil.exe -Embedding",
"FILE_IS_SIGNED": 1,
"FILE_PATH": "C:\\\\Windows\\\\System32\\\\evil.exe",
"HASH": "5ef1322b96f176c4ea4b8304caf8b45e2e42c3188aa52ed1fd6196afc04b7297",
"MEMORY_USAGE": 9515008,
"PARENT": {
"BASE_ADDRESS": 140697905135616,
"COMMAND_LINE": "C:\\\\Windows\\\\system32\\\\unknown.exe -k Launch",
"CREATION_TIME": 1625797634428,
"FILE_IS_SIGNED": 1,
"FILE_PATH": "C:\\\\Windows\\\\system32\\\\unknown.exe",
"HASH": "438b6ccd84f4dd32d9684ed7d58fd7d1e5a75fe3f3d14ab6c788e6bb0ffad5e7",
"MEMORY_USAGE": 19070976,
"PARENT_ATOM": "ebf1884039c7650401b2198f60f89d2d",
"PARENT_PROCESS_ID": 123,
"PROCESS_ID": 1234,
"THIS_ATOM": "ad48d1f14a8e5a114e85f79b60f89d2d",
` "THREADS": 14,
"TIMESTAMP": 1626905901981,
"USER_NAME": "NT AUTHORITY\\\\SYSTEM"
},
"PARENT_PROCESS_ID": 580,
"PROCESS_ID": 5096,
"THREADS": 6,
"USER_NAME": "BUILTIN\\\\Administrators"
},
"routing": {
"this": "655c970d2052b9f1c365839b611baf96",
"parent": "ad48d1f14a3e5a114e85f79b60f89d2d",
"arch": 2,
"did": "3ef599f3-64dc-51f5-8322-62b0a6b8eef7",
"event_id": "bdf6df69-b72c-470a-994b-216f1cdde9a7",
"event_time": 1629204374140,
"event_type": "NEW_PROCESS",
"ext_ip": "123.456.78.901",
"hostname": "test-host-123",
"iid": "e22638c9-44a6-455a-83e2-a689ac9868a7",
"int_ip": "10.4.34.227",
"moduleid": 2,
"oid": "8cbe27f4-agh1-4afb-ba19-138cd51389cd",
"plat": 268435456,
"sid": "d3d17f12-eecf-5287-b3a1-bf267aabb3cf",
"tags": ["server"],
},
}