Zeek Logs Us Online
Zeek Logs Us Online
Version 3.0.4
proto enum Transport layer protocol of connection REJ Connection attempt rejected
service string Application protocol ID sent over connection S2 Established, Orig attempts close, no reply from Resp
duration interval How long connection lasted S3 Established, Resp attempts close, no reply from Orig
orig_bytes count Number of payload bytes originator sent RSTO Established, Orig aborted (RST)
resp_bytes count Number of payload bytes responder sent RSTR Established, Resp aborted (RST)
conn_state string Connection state (see conn.log > conn_state) RSTOS0 Orig sent SYN then RST; no Resp SYN-ACK
local_orig bool Value=T if connection originated locally RSTRH Resp sent SYN-ACK then RST; no Orig SYN
local_resp bool Value=T if connection responded locally SH Orig sent SYN then FIN; no Resp SYN-ACK (“half-open”)
missed_bytes count Number of bytes missed (packet loss) SHR Resp sent SYN-ACK then FIN; no Orig SYN
history string Connection state history OTH No SYN, not closed. Midstream traffic.
(see conn.log > history) Partial connection.
orig_pkts
orig_ip_bytes
count
count
Number of packets originator sent
Number of originator IP bytes
history
(via IP total_length header field) Orig UPPERCASE, Resp lowercase, compressed
resp_pkts count Number of packets responder sent S A SYN without the ACK bit set
resp_ip_bytes count Number of responder IP bytes H A SYN-ACK (“handshake”)
(via IP total_length header field)
A A pure ACK
tunnel_parents table If tunneled, connection UID value
of encapsulating parent(s) D Packet with payload (“data”)
orig_I2_addr string Link-layer address of originator F Packet with FIN bit set
resp_I2_addr string Link-layer address of responder R Packet with RST bit set
vlan int Outer VLAN for connection C Packet with a bad checksum
inner_vlan int Inner VLAN for connection I Inconsistent packet (Both SYN & RST)
Q Multi-flag packet (SYN & FIN or SYN + RST)
qclass count QCLASS value specifying query class total_bytes count Total number of bytes that should comprise
full file
qclass_name string Descriptive name query class
missing_bytes count Number of bytes in file stream missed
qtype count QTYPE value specifying query type
overflow_bytes count Number of bytes in file stream not delivered
qtype_name string Descriptive name for query type to stream file analyzers
rcode count Response code value in DNS response timedout bool If file analysis timed out at least once
rcode_name string Descriptive name of response code value parent_fuid string Container file ID was extracted from
AA bool Authoritative Answer bit: responding name md5 string MD5 digest of file contents
server is authority for domain name
sha1 string SHA1 digest of file contents
TC bool Truncation bit: message was truncated
sha256 string SHA256 digest of file contents
RD bool Recursion Desired bit: client wants recursive
service for query extracted string Local filename of extracted file
RA bool Recursion Available bit: name server extracted_cutoff bool Set to true if file being extracted was cut off
supports recursive queries so whole file was not logged
Z count Reserved field, usually zero in queries extracted_size count Number of bytes extracted to disk
and responses entropy double Information density of file contents
answers vector Set of resource descriptions in query answer
TTLs
rejected
vector
bool
Caching intervals of RRs in answers field
DNS query was rejected by server
ftp.log | FTP request/reply details
auth table Authoritative responses for query FIELD TYPE DESCRIPTION
addl table Additional responses for query ts time Timestamp when command sent
uid & id Underlying connection info > See conn.log
packet_segment string Payload chunk that most likely resulted in reply_msg string Reply message from server in response
protocol violation to command
data_channel record Expected FTP data channel
FTP::
Expected
Data
Channel
fuid string File unique ID
http.log | HTTP request/reply details kerberos.log | Kerberos authentication
FIELD TYPE DESCRIPTION FIELD TYPE DESCRIPTION
ts time Timestamp for when request happened ts time Timestamp for when event happened
uid & id Underlying connection info > See conn.log uid & id Underlying connection info > See conn.log
trans_depth count Pipelined depth into connection request_type string Authentication Service (AS)
or Ticket Granting Service (TGS)
method string Verb used in HTTP request (GET, POST, etc.)
client string Client
host string Value of HOST header
service string Service
uri string URI used in request
success bool Request result
referrer string Value of referer header
error_msg string Error message
version string Value of version portion of request
from time Ticket valid from
user_agent string Value of User-Agent header from client
till time Ticket valid until
origin string Value of Origin header from client
cipher string Ticket encryption type
request_body_len count Uncompressed data size from client
forwardable bool Forwardable ticket requested
response_body count Uncompressed data size from server
_len renewable bool Renewable ticket requested
status_code count Status code returned by server client_cert string Subject of client certificate, if any
_subject
status_msg string Status message returned by server
client_cert_fuid string File unique ID of client cert, if any
info_code count Last seen 1xx info reply code from server
server_cert string Subject of server certificate, if any
info_msg string Last seen 1xx info reply message from
_subject
server
server_cert_fuid string File unique ID of server cert, if any
tags table Indicators of various attributes discovered
auth_ticket string Ticket hash authorizing request/transaction
username string Username if basic-auth performed for
request new_ticket string Ticket hash returned by KDC
password string Password if basic-auth performed for
proxied table
request
All headers indicative of proxied request
mysql.log | MySQL
orig_fuids vector Ordered vector of file unique IDs FIELD TYPE DESCRIPTION
orig_filenames vector Ordered vector of filenames from client ts time Timestamp for when event happened
orig_mime_types vector Ordered vector of mime types uid & id Underlying connection info > See conn.log
resp_fuids vector Ordered vector of file unique IDs cmd string Command that was issued
resp_filenames vector Ordered vector of filenames from server arg string Argument issued to command
resp_mime_types vector Ordered vector of mime types success bool Server replied command succeeded
client_header vector Vector of HTTP header names sent by client rows count Number of affected rows, if any
_names
response string Server message, if any
server_header vector Vector of HTTP header names sent
value string Value for command given by client reply_msg string Reply message from server challenge
addl string Any additional data for command result string Successful or failed authentication
dcc_file_name string DCC filename requested ttl interval Duration between first request and either
Access-Accept message or an error
dcc_file_size count DCC transfer size as indicated by sender
dcc_mime_type string Sniffed mime type of file
fuid string File unique ID
sip.log | SIP analysis path
user_agent
vector
string
Message transmission path, from headers
Value of User-Agent header from client
FIELD TYPE DESCRIPTION tls bool Indicates connection switched to using TLS
ts time Timestamp when request happened fuids vector File unique IDs attached to message
uid & id Underlying connection info > See conn.log is_webmail bool If message sent via webmail
trans_depth count Pipelined depth into request/response
method string
transaction
Verb used in SIP request (INVITE, etc) software.log | Software used on the network
uri string URI used in request FIELD TYPE DESCRIPTION
date string Contents of Date: header from client ts time Time at which software was detected
request_from string Contents of request From: header1 host addr IP address detected running the software
request_to string Contents of To: header host_p port Port on which software is running
response_from string Contents of response From: header1 software_type enum Type of software detected
response_to string Contents of response To: header (e.g., HTTP::SERVER)
reply_to string Contents of Reply-To: header name string Name of software (e.g., Apache)
call_id string Contents of Call-ID: header from client version record Software version
Software::
seq string Contents of CSeq: header from client Version
subject string Contents of Subject: header from client
unparsed_version string Full, unparsed version string found
request_path vector Client message transmission path, extracted
url string Root URL where software was discovered
from headers
uid & id Underlying connection info > See conn.log host_key_alg string Server host key’s algorithm
trans_depth count Transaction depth if there are multiple msgs host_key string Server’s key fingerprint
helo string Contents of Helo header remote_location record Add geographic data related to remote host
geo_ of connection
mailfrom string Email addresses found in From header location
rcptto table Email addresses found in Rcpt header
date
from
string
string
Contents of Date header
Contents of From header
ssl.log | SSL handshakes
to table Contents of To header FIELD TYPE DESCRIPTION
ts time Time when SSL connection first detected
cc table Contents of CC header
uid & id Underlying connection info > See conn.log
reply_to string Contents of ReplyTo header
version string SSL/TLS version server chose
msg_id string Contents of MsgID header
cipher string SSL/TLS cipher suite server chose
in_reply_to string Contents of In-Reply-To header
curve string Elliptic curve server chose when using
subject string Contents of Subject header
ECDH/ECDHE
x_originating_ip addr Contents of X-Originating-IP header
server_name string Value of Server Name Indicator SSL/TLS
first_received string Contents of first Received header extension
second_received string Contents of second Received header resumed bool Flag that indicates session was resumed
last_reply string Last message server sent to client last_alert string Last alert seen during connection
next_protocol string Next protocol server chose using application
layer next protocol extension, if present tunnel.log | Details of encapsulating tunnels
established bool Flags if SSL session successfully established
FIELD TYPE DESCRIPTION
cert_chain_fuids vector Ordered vector of all certificate file unique ts time Time at which tunnel activity occurred
IDs for certificates offered by server
uid & id Underlying connection info > See conn.log
client_cert_chain vector Ordered vector of all certificate file unique
_fuids IDs for certificates offered by client tunnel_type enum Tunnel type
subject string Subject of X.509 cert offered by server action enum Type of activity that occurred
valid_ct_operators count Number of different log operators for which addl string Additional information accompanying
valid SCTs encountered in connection weird, if any
notary record Response from the ICSI certificate notary notice bool If weird was turned into a notice
Cert peer string Peer that originated weird
Notary::
Response
ts time Timestamp when syslog message was seen id string File ID of certificate
uid & id Underlying connection info > See conn.log certificate record X509:: Basic information about certificate
Certificate
proto enum Protocol over which message was seen
san record X509:: Subject alternative name extension of
facility string Syslog facility for message Subject certificate
severity string Syslog severity for message Alternative
Name
message string Plain text message
basic_constraints record X509:: Basic constraints extension of certificate
Basic
Constraints
Microsoft logs
dce_rpc.log | Details on DCE/RPC messages ntlm.log | NT LAN Manager (NTLM)
FIELD TYPE DESCRIPTION FIELD TYPE DESCRIPTION
ts time Timestamp for when event happened ts time Timestamp for when event happened
uid & id Underlying connection info > See conn.log uid & id Underlying connection info > See conn.log
rtt interval Round trip time from request to response username string Username given by client
named_pipe string Remote pipe name hostname string Hostname given by client
endpoint string Endpoint name looked up from uuid domainname string Domainname given by client
operation string Operation seen in call server_nb string NetBIOS name given by server in a
_computer_name CHALLENGE
server_dns string DNS name given by server in a CHALLENGE
_computer_name
server_tree_name string Tree name given by server in a CHALLENGE
success bool Indicates whether or not authentication
was successful
rdp.log | Remote Desktop Protocol (RDP) smb_files.log | Details on SMB files
FIELD TYPE DESCRIPTION FIELD TYPE DESCRIPTION
ts time Timestamp for when event happened ts time Time when file was first discovered
uid & id Underlying connection info > See conn.log uid & id Underlying connection info > See conn.log
cookie string Cookie value used by client machine fuid string Unique ID of file
result string Status result for connection action enum Action this log record represents
security_protocol string Security protocol chosen by server path string Path pulled from tree that file was
transferred to or from
client_channels vector Channels requested by the client
name string Filename if one was seen
keyboard_layout string Keyboard layout (language) of client machine
size count Total size of file
client_build string RDP client version used by client machine
prev_name string If rename action was seen, this will be file’s
client_name string Name of client machine
previous name
client_dig_product string Product ID of client machine
times record Last time file was modified
_id
SMB::
desktop_width count Desktop width of client machine MAC-
Times
desktop_height count Desktop height of client machine
requested
_color_depth
string Color depth requested by client
in high_color_depth field smb_mapping.log | SMB mappings
cert_type string If connection is encrypted with native RDP
encryption, type of cert being used FIELD TYPE DESCRIPTION
cert_count count Number of certs seen ts time Time when tree was mapped
cert_permanent bool Indicates if provided certificate or certificate uid & id Underlying connection info > See conn.log
chain is permanent or temporary path string Name of tree path
encryption_level string Encryption level of connection service string Type of resource of tree (disk share, printer
encryption string Encryption method of connection share, named pipe, etc)
_method
native_file_system string File system of tree
ssl bool Flag connection if seen over SSL
share_type string If this is SMB2, share type will be included
+ more...
Defenders have always sought the high ground in order to see farther and turn back attacks.
Corelight delivers a commanding view of your network so you can outsmart and outlast
adversaries. We capture, interpret, and connect the data that means everything to defenders.
[email protected] | 888-547-9497
CORELIGHT, INC. | [email protected] | CDS010-ZEEKSMBLOGS-V3.0-US All rights reserved. © Copyright 2020 Corelight, Inc.