Campos de los eventos registrados
La telemetría que el producto de seguridad instalado en el equipo del usuario envía a los servidores en la nube está compuesta por eventos.
Cada evento está formado por campos que describen la actividad registrada. Estos campos contienen la información específica del evento, como la fecha, la hora, el tipo de acción y otros elementos involucrados.
El campo eventtype indica el tipo de evento. Los eventos de tipo 1 (ProcessOps) indican el subtipo en el campo operation.
Un mismo campo puede tener nombres diferentes dependiendo del evento al que pertenece y de la consola de producto donde se muestra. La tabla incluye todos los posibles nombres de los campos y un enlace al nombre principal del campo, donde se documentan sus valores.
Por ejemplo, el campo times puede aparecer en los eventos 22 y 45 con es mismo nombre, y en los eventos 46 y 99 como los nombre alternativos querieddomaincount y napocurrences respectivamente, aunque dependiendo de la consola de producto donde se visualicen, pueden llamarse times.
times |
eventtype 22 (NetworkOps) Number of repetitions of a connection created by the same process on the same path, with the same localIP, RemoteIP, and RemotePort. eventtype 45 (SystemOps) Number of WMI requests per table and process grouped in a one-hour period. eventtype 46 (DnsOps) - querieddomaincount Number of different domains sent by the process for which there was a DNS resolution failure in the last hour. eventtype 99 (RemediationOps) - napocurrences Number of times the same type of network attack targeting the same IP address has been logged in a one-hour period. |
Numeric value |
Para facilitar la búsqueda de campos con múltiples nombres, la tabla contiene enlaces al nombre del campo principal. En este ejemplo:
querieddomaincount |
See times. |
napoccurrences |
See times. |
En el campo descripción se incluyen los valores de cada campo.
Field | Description | Field Type |
---|---|---|
Client ID. |
Character string |
|
accesstype |
File access mask:
For all other operations: |
Bitmask |
accnube |
The agent installed on the client’s computer can access the Cytomic cloud. |
Boolean |
accountname |
Nombre de la cuenta de usuario o del grupo involucrada en el evento en sistemas operativos Linux. |
Character string |
action |
Type of action taken by the Cytomic EDR or Cytomic EPDR agent, by the user, or by the affected process:
|
Enumeration |
actiontype |
Indicates the session type:
|
Enumeration |
administrators |
Lista de usuarios que pueden gestionar el grupo sin necesidad de ser root. Disponible en sistemas operativos Linux. |
Character string |
Cytomic EDR or Cytomic EPDR advanced security policy settings. |
Character string |
|
age |
Date the file was last modified. |
Date |
alertdatetime |
The computer date (in UTC format) at the time the event that triggered the indicator occurred on the client’s computer. Information regarding the time is included. To understand this field, see pandatimestatus. |
Date |
allowedexecutor |
Propietario del fichero en sistemas operativos Linux. |
Character string |
alprotocoldetected |
Application level protocol detected in the connection or one of these values:
|
Enumeration |
alprotocolexpected |
Application level protocol expected according to the connection port or one of these values:
|
Enumeration |
analysistime |
Time spent analyzing the file. |
Character string |
analyzeerr |
Code returned when the analysis of an item is complete.
|
Enumeration |
Identifier of the device that connected to a computer protected by Endpoint Access Enforcement. |
Character string |
|
blockreason |
Reason for the pop-up message displayed on the computer:
|
Enumeration |
bytesreceived |
Total bytes received by the monitored process. |
Numeric value |
bytessent |
Total bytes sent by the monitored process. |
Numeric value |
callstack |
See childfilesize . |
Numeric value |
Attributes of the child process:
0x0000002000000000 (SAFE_BOOT_MODE): The computer started in Safe Mode. |
Enumeration |
|
childattmask |
See childattributes. | |
childblake |
Blake2 signature of the child file. |
Character string |
childclassification |
Classification of the child process that performed the logged action.
|
Enumeration |
childdrive |
Tipo de unidad donde se registró la operación:
|
Numeric value |
Name of the child process. |
Character string |
|
childfileowner |
Owner of the run file. |
Character string |
Size of the child file logged by the agent. |
Numeric value |
|
childfiletime |
Date of the child file logged by the agent. |
Date |
Date the file was first seen. |
Date |
|
childmd5 |
Child file hash. |
Character string |
Path of the child file that performed the logged operation. |
Character string |
|
ChildPID |
Child process ID. |
Numeric value |
SHA256 signature of the child process that performed the operation. |
Character string |
|
childstatus |
Child process status.
|
Enumeration |
childfileowner |
Cuenta de usuario propietaria del fichero ejecutado. |
Character string |
childurl |
File download URL. |
Character string |
ciphertype |
Scan of the SSL/TLS protocol and its HTTPS characteristics (for example TLS_RSA_WITH_AES_128_GCM_SHA256). |
Character string |
classname |
Type of device where the process resides. It corresponds to the class specified in the .INF file associated with the device. |
Character string |
eventtype 65 (Users) Programa que se ejecuta al iniciar sesión, generalmente un intérprete de comandos (por ejemplo, /bin/bash) en sistemas operativos Linux. eventtype 66(SysOps) Linea de comandos que ejecuta la tarea en sistemas operativos Linux. eventtype 68 (XDG) Linea de comandos que se ejecuta cuando el fichero .desktop es interpretado en sistemas operativos Linux. eventtype 69 (Udev) Comando o script que se ejecuta cuando se activa la regla udev al conectar / desconectar un dispositivo. eventtype 1 (ProcessOps) eventtype 31 (ScriptOps) eventtype 45 (SystemOps) eventtype 99 (Action) eventtype 199 (HiddenAction) Línea de comandos configurada como tarea para ser ejecutada a través de WMI en sistemas operativos Windows. |
Character string |
|
confadvancedrules |
See advancedrulesconf. |
Character string |
configservicelevel |
Agent execution mode configuration. This can be temporarily different from the execution mode in progress. See servicelevel |
Enumeration |
configstring |
See extendedinfo. |
Character string |
connectionstate |
Connection status notified.
|
Enumeration |
contentencoding |
Encoding used in the content of the HTTP connection. See https://www.iana.org/assignments/http-parameters/http-parameters.xml. |
Character string |
copy |
Name of the service that triggered the event. |
Character string |
Unique name of the object within the WMI hierarchy. |
Character string |
|
date |
The computer date (in UTC format) at the time the logged event occurred on the client’s computer. No information regarding the time is included. To understand this field, see pandatimestatus. |
Numeric value |
datetime |
The computer date (in UTC format) at the time the logged event occurred on the client’s computer. Information regarding the time is included. To understand this field, see pandatimestatus. |
Numeric value |
description |
See extendedinfo. |
Character string |
IP address of the target computer in a network connection scanned by Network Attack Protection. |
IP address |
|
Port of the target computer in a network connection scanned by Network Attack Protection. |
Numeric value |
|
details |
Summary in the form of a group of relevant fields from the event. eventtype 1 (ProcessOps) Contains the commandline field. eventtype 14 (Download) Contains the url field. eventtype 22 (NetworkOps) Contains the direction, ipv4status, protocol, and remoteport fields. eventtype 27 (RegistryOps) Contains the valuedata field. eventtype 31 (ScriptLaunch) Contains the commandline field. eventtype 46 (DnsOps) Contains the domainlist field. eventtype 47 (DeviceOps) Contains the devicetype field. eventtype 50 (UserNotification) Contains the parentfilename field. eventtype 52 (LoginOutOp) Contains the eventtype, sessiontype, loggeduser, remotemachinename, and remoteip fields. eventtype 99 (RemediationOps) Contains the remoteip, remotemachinename, commandline, and detectionid fields. eventtype 555 (IOA) Contains the extendedinfo field. |
Character string |
eventtype 1(ProcessOps) y operation=43 (Heuhooks) y winningtech=14(AntiExploit) y detectionid<=65 Nombre de la API o del grupo de APIs de Windows ejecutada por el proceso.
Resto de casos Name of the malware or attack detected. |
Character string |
|
deviceid |
See attackerDeviceId. |
Numeric value |
Type of drive where the process or file that triggered the operation resides.
|
Enumeration |
|
eventtype 22 (NetworkOps): Network connection direction.
eventtype 99 (RemediationOps) - napdirection Network connection direction.
|
Enumeration |
|
See list. |
|
|
Entropy of the POST message content to classify the likelihood of data theft and extraction. |
Character string |
|
entropia |
See entropy. |
Numeric value |
environment |
Muestra los pares clave / valor de las variables de entorno establecidas en la regla udev. Disponible en sistemas operativos Linux. |
Character string |
errorcode |
Error code returned by the operating system when there is a failed login attempt.
|
en |
errorevent |
See extendedinfo. |
Character string |
errorstring |
See extendedinfo. |
Character string |
Event type logged by the agent.
|
Enumeration |
|
execreload |
Comando que reinicia el servicio en sistemas operativos Linux. |
Character string |
execstart |
Comando que inicia el servicio en sistemas operativos Linux. |
Character string |
execstartpre |
Comando que se ejecuta antes de iniciar el servicio en sistemas operativos Linux. |
Character string |
execstartpost |
Comando que se ejecuta después de iniciar el servicio en sistemas operativos Linux. |
Character string |
execstop |
Comando que detiene el servicio en sistemas operativos Linux. |
Character string |
execstoppost |
Comando que detiene el servicio en sistemas operativos Linux. |
Character string |
executinggroup |
Especifica el grupo que se utilizará para ejecutar el proceso registrado en el evento. disponible en sistemas operativos Linux. |
Character string |
executinguser |
Especifica el usuario que se utilizará para ejecutar el proceso registrado en el evento. Disponible en sistemas operativos Linux. |
Character string |
exploitorigin |
Origin of the process exploit attempt.
|
Enumeration |
eventtype 0 (SvcStatus): Estado en el que se encuentra el agente del producto de seguridad:
eventtype 1 (ProcessOps) - errorstrings: Character string with debug information on the security product settings. When the operation field of an event is set to DirCreate, CMOpened, or CMPCreat, the errorstring field acts as an event grouping counter: In any one-hour period, the first 50 events are logged individually. After the limit of 50 events in one hour is reached, additional events of the same type are grouped together and not sent until the first event of the same type is logged in a new hour period. At this point, the grouped event is sent with the errorstring field including both the grouped events and the first 50 events, and the counter is reset. eventtype 26 (DataAccess):
eventtype 27 (RegistryOps):
eventtype 40 (Detection) - infodiscard: Quarantine file internal information. eventtype 45 (SystemOps): Additional information about Type events:
eventtype 47 (DeviceOps) - description
eventtype 61 (ErrorEvents):
eventtype 99 (RemediationOps) - remediationdata: Cadena de caracteres con los siguientes campos separados por *:
eventtype 555 (IOA): Details of the processes that generated the IOA. |
Character string |
|
failedqueries |
Number of failed DNS resolution requests sent by the process in the last hour. |
Numeric value |
fingerprint |
JSON en base64 con los fingerprints detectados en la conexión TLS:
|
Character string |
firstseen |
See childfirstseen |
Date |
friendlyname |
An easily readable device name. |
Character string |
guidrule |
See ruleid. |
|
groupid |
Identificador de grupo al que pertenece la cuenta de usuario involucrada en el evento en sistemas operativos Linux. Si es 0, el grupo es root. |
Numeric value |
groupmembers |
Lista de usuarios separados por coma que pertenecen al grupo en sistemas operativos Linux. |
Character string |
headerhttp |
HTTP header dump when the security software detects communications that use HTTP tunnels. This field shows information only if the security software Audit mode is enabled. |
Character string |
hostname |
Character string |
|
huntingruleid |
See ruleid. |
Character string |
huntingrulemitre |
TTPs associated with the hunting rule. |
Character string |
huntingrulemode |
Indicates whether the rule is enabled in the Threat Engine to generate indicators. |
Boolean |
huntingrulename |
Nombre de la regla del Radar de ciberataques que detectó el indicio. |
Character string |
huntingruleseverity |
Severity of the impact of the indicator generated by the hunting rule:
|
Enumeration |
huntingruletype |
Type of hunting rule.
|
Enumeration |
idname |
Device name. |
Character string |
importprogram |
Contenido de las variables que importa la regla udev desde un fichero externo en sistemas operativos Linux. |
Character string |
indicatortimestamp |
See ioatimestamp. |
Date |
infodiscard |
See extendedinfo. |
Character string |
initialdomain |
See url. |
Character string |
insertiondatetime |
Date in UTC format at the time the Cytomic Orion servers logged the event sent by the computer. This date is always later than the other dates because the events are queued to be processed. |
Date |
Indicates whether the login is an interactive login. |
Binary value |
|
IOAId |
Indicator ID. |
Character string |
IOAIds |
When a sequence of events follows a pattern described in the MITRE matrix, Cytomic Orion creates an indicator (IOA) and adds the indicator ID to all the events related to it. |
Numeric value |
Date UTC en formato epoch (número de segundos transcurridos desde el 1 de enero de 1970) del momento en que se produjo el último evento que desencadenó la creación del indicio. |
Fecha |
|
IP address type:
|
Enumeration |
|
isdenied |
Indicates whether the reported action was denied. |
Binary value |
islocal |
Indicates whether the task was created on the local computer or on a remote computer. |
Binary value |
islocalipv6 |
Indicates whether the IP address is IPv6 or IPv4. |
Boolean |
isremoteipv6 |
Indicates whether the IP address is IPv6 or IPv4. |
Boolean |
issessioninteractive |
See interactive. |
Binary value |
key |
Affected registry branch or key. |
Character string |
lastquery |
Last query sent to the cloud by the Cytomic EDR or Cytomic EPDR agent. |
Date |
eventtype 46 (DnsOps) - DomainList:
eventtype 99 (RemediationOps) - url:
|
Character string |
|
localdatetime |
The computer date (in UTC format) at the time the logged event occurred. This date depends on the computer settings. As a result, it can be incorrect. |
Date |
eventtype 22 (NetworkOps) - localip Contains the IP address of the computer on which the event was logged, regardless of the connection direction (direction field). See remoteip and direction. eventtype 99 (RemediationOps) - naporiginip: IP address of the source computer in a network connection scanned by Network Attack Protection. |
IP address |
|
eventtype 22 (NetworkOps) - localport Contains the port of the computer on which the event was logged or of the other end of the connection depending on the direction field:
See direction. eventtype 99 (RemediationOps) - naporiginport: Port of the source computer in a network connection scanned by Network Attack Protection. |
Numeric value |
|
The user that was logged in to the computer at the time the event was generated. |
Character string |
|
machinename |
Name of the computer that ran the process. |
Character string |
Modo de inicio del equipo:
|
Enumeration |
|
Estado del equipo:
|
Enumeration |
|
manufacturer |
Device manufacturer. |
Character string |
method |
HTTP connection method when the security software detects communications that use HTTP tunnels.
This field shows information only if the security software Audit mode is enabled. |
Numeric value |
MUID |
Internal ID of the client’s computer. |
Character string |
napattack |
Network attack direction.
|
Numeric value |
napdestinationip |
See destinationip. |
|
napdestinationport |
See destinationport. |
|
napdirection |
See direction. |
|
napoccurrences |
See times. |
|
naporiginip |
See localip. |
|
naporiginport |
See localport |
|
nodisplay |
Indica si el archivo .desktop está oculto o visible en el sistema XDG Autostart (no afecta a su ejecución). |
Boolean |
notificationtype |
Internal use. |
Character string |
numcacheclassifiedelements |
Number of items whose classification is cached in the security software. |
Numeric value |
objectname |
See datacontanier. |
|
occurrences |
Number of grouped indicators. See Indicator Grouping |
Numeric value |
opstatus |
|
Enumeration |
opentstamp |
Date of the WMI notification for WMI_CREATEPROC (54) events. |
Bitmask |
opentstamp |
||
Type of operation performed by the process. eventtype 1 (ProcessOps) Operación genérica con elementos del sistema operativo.
eventtype 26 (DataAccess) Tipo de operación ejecutada sobre el fichero
eventtype 45 (SystemOps) Type of WMI operation performed by the process.
eventtype 65 (Users) Tipo de operación con las cuentas de usuario en sistemas operativos Linux.
eventtype 66 (SysOps) Tipo de modificación en la configuración de sistemas operativos Linux.
eventtype 67 (SVC) Tipo de operación que crea, modifica o borra un servicio en sistemas operativos Linux.
eventtype 68 (XDG) Tipo de operación que modifica el inicio automático de aplicaciones al arrancar el sistema de ventanas en sistemas operativos Linux.
eventtype 69 (Udev) Tipo de operación que crea una regla udev para modificar el comportamiento del sistema operativo cuando se conecta un dispositivo hardware nuevo al equipo.
|
Enumeration |
|
eventtype 1 (ProcessOps) - operationflags Indicates the integrity level assigned by Windows to the item. Go to https://learn.microsoft.com/en-us/windows/win32/secauthz/mandatory-integrity-control.
eventtype 22 (NetworkOps) - SocketOpFlags Specifies the grouping algorithm used to minimize the logging of network connections with identical source and destination IP addresses and ports. Grouping occurs over time periods. Only one connection from the group is logged when the period ends. The time period varies depending on the number of connections logged:
When the specified number of connections is logged at the current grouping level, the grouping level increases. Every hour the number of logged connections is re-evaluated to lower the grouping level, if required. |
Numeric value |
|
operationmonitoredopen |
See operation. |
|
operationstatus |
See opstatus. |
Numeric value |
operationsvc |
See operation. |
|
operationsysops |
See operation. |
|
operationudev |
See operation. |
|
operationusers |
See operation. |
|
operationxdg |
See operation. |
|
Indicates whether the event must be sent to the Cytomic Insights:
|
Enumeration |
|
origusername |
User of the computer which performed the operation. |
Character string |
pandaalertid |
Internal ID of the indicator. |
Character string |
pandaid |
See accountid. |
Numeric value |
Indicates the algorithm used to calculate the dates in the Date, DateTime, and TimeStamp fields:
|
Enumeration |
|
Attributes of the parent process.
|
Enumeration |
|
parentattmask |
See parentattributes. | |
parentblake |
Blake2 signature of the parent file that performed the operation. |
Character string |
parentcount |
Number of processes with DNS failures. |
Numeric value |
parentdrive |
Tipo de unidad donde se registró la operación:
|
Numeric value |
Parent file name. |
Character string |
|
parentmd5 |
Parent file hash. |
Character string |
Path of the parent file that performed the logged operation. |
Character string |
|
parentpid |
Parent process ID. |
Numeric value |
parentstatus |
|
Enumeration |
passwordstatus |
Estado de la contraseña en sistemas operativos Linux.
|
Enumeration |
pecreationsource |
Type of drive where the process was created:
|
Numeric value |
phonedescription |
Phone description if the operation involved a device of this type. |
Character string |
pid |
Identifier of the process that started the session. |
Numeric value |
processtreeid |
Process tree ID. |
Numeric value |
Communications protocol used by the process.
|
Enumeration |
|
proxyconnection |
The connection is through a proxy. |
Boolean |
querieddomaincount |
See times. |
Numeric value |
realservicelevel |
Current agent mode (this can be temporarily different from the mode assigned in the settings). See servicelevel |
Enumeration |
redirection |
HTTP redirection detected. This field shows information only if the security software Audit mode is enabled. |
Boolean |
registryaction |
Type of operation performed on the Windows registry of the computer.
|
Enumeration |
remediationdata | See extendedinfo. | |
remediationresult |
User’s response to the pop-up message shown by Cytomic EPDR or Cytomic EDR.
|
Enumeration |
eventtype 1 (ProcessOps) IP address of the remote computer that executed the action on the monitored computer. eventtype 22 (Networkops) Contains the IP address of the other end of the connection, regardless of the connection direction (direction field). See localip and direction. eventtype 42 (BandwidthUsage) IP address of the device the monitored computer connected to to download data. eventtype 45 (SystemOps) IP address of the device the monitored computer connected to execute a WMI request. |
IP address |
|
eventtype 1 (ProcessOps) Name of the remote computer that executed the action on the monitored computer. eventtype 22 (Networkops) - hostname Name of the remote computer. eventtype 42 (BandwidthUsage) Name of the device the monitored computer connected to to download data. eventtype 45 (SystemOps) Name of the device the monitored computer connected to execute a WMI request. eventtype 99 (RemediationOps) Nombre del equipo remoto que inicia la conexión monitorizada por Endpoint Access Enforcement. |
Character string |
|
eventtype 22 (Networkops) Contains the port of the computer on which the event was logged or of the other end of the connection depending on the direction field:
eventtype 42 (BandwidthUsage) Port of the device the monitored computer connected to to download data. |
Numeric value |
|
remoteusername |
Name of the remote user that performed the operation on the monitored computer. |
Character string |
responseclassification |
Process classification.
|
Enumeration |
Status of the device that initiated the connection to the protected computer. This status caused the blocking or monitoring of the connection by the Endpoint Access Enforcement technology.
|
Enumeration |
|
riskdetected |
See risk. |
|
eventtype 555 (IOA) - huntingruleid: Nombre de la regla del Radar de ciberataques que detectó el indicio. eventtype 22 (IOA) - ruleid: Snort rule that detected communications that use HTTP tunnels. This field shows information only if the security software Audit mode is enabled. |
Character string |
|
runcommand |
Indica el comando o script que se ejecuta cuando se activa la regla udev al conectar / desconectar un dispositivo. Disponible en sistemas operativos Linux. |
Character string |
Agent execution mode.
|
Enumeration |
|
serviceuser |
Nombre de la cuenta de usuario utilizada para ejecutar el servicio en sistemas operativos Linux. |
Character string |
sessiondate |
Date the antivirus service was last started or last time it was started since the last update. |
Date |
sessionid |
Session ID. |
Numeric value |
Login type:
|
Enumeration |
|
sha256 |
See childsha256. |
Character string |
shash |
Alphanumeric character pattern followed by the hash of the child process. |
Character string |
socketopflags |
See Operationflags/ integrityLevel. | |
telemetrytype |
|
Enumeration |
threadid |
Process thread ID. |
Numeric value |
timeout |
The local scan took too long to complete and the process was delegated to other mechanisms that do not impact performance. |
Boolean |
eventtype 22 (NetworkOps) Number of repetitions of a connection created by the same process on the same path, with the same localIP, RemoteIP, and RemotePort. eventtype 45 (SystemOps) Number of WMI requests per table and process grouped in a one-hour period. eventtype 46 (DnsOps) - querieddomaincount Number of different domains sent by the process for which there was a DNS resolution failure in the last hour. eventtype 99 (RemediationOps) - napocurrences Number of times the same type of network attack targeting the same IP address has been logged in a one-hour period. eventtype 99 (RemediationOps) - napocurrences, winningtech = 16, 17 o 18 Número de veces que se ha detectado el mismo tipo de política de seguridad en el intervalo de una hora. La primera detección se registra con el campo a 1. |
Numeric value |
|
timestamp |
Date UTC en formato epoch (número de nanosegundos transcurridos desde el 1 de enero de 1970) del momento en que se produjo el evento en el equipo del cliente. Consulta pandatimestatus para interpretar correctamente este campo. |
Fecha |
totalresolutiontime |
Indicates the time it took the cloud to respond, and whether the error code query failed.
|
Numeric value |
triggertarget |
Nombre de la unidad de systemd (fichero .service, .socket o .path) que se activará cuando el temporizador programado expire. Disponible en sistemas operativos Linux. |
Character string |
TTPs |
List of the MITRE tactics, techniques, and sub-techniques associated with the event. |
Character string |
type |
See operation. |
Enumeration |
uniqueid |
Unique ID of the device. |
Character string |
eventtype 14 (Download) - childurl Download URL launched by the process that generated the logged event. eventtype 22 (NetworkOps) - inicitaldomain Source domain when the security software detects an HTTP redirection. This field shows information only if the security software Audit mode is enabled. eventtype 99 (RemediationOps) List of 10 URLs sent by the process monitor, separated by *, in the event of the detection of an exploit. |
Character string |
|
userid |
Identificador de la cuenta de usuario involucrada en el evento en sistemas operativos Linux. |
Numeric value |
username |
See loggeduser. | |
value |
Registry branch and key. |
Enumeration |
Data type of the value contained in the registry key, and value:
|
Enumeration |
|
valuedatalength |
Size of the data stored in the Windows registry. |
Numeric value |
Version of the PSNMVHookPlg32 and PSNAntiExploitPLG.dll DLLs. |
Character string |
|
Version of the Bloom filter file that contains the local goodware cache. |
Character string |
|
vcontroller |
Consulta versioncontroller. | |
Version of the filter file for the contextual detection technology (deteventfilter). |
Character string |
|
verbosemode |
The computer is configured in Verbose mode. |
Binary value |
version |
Operating system version of the computer that ran the vulnerable software. |
Character string |
versionagent |
Installed agent version. |
Character string |
versionantiexploit |
See vantiexploit. |
Character string |
versionbloomfilter |
See vbloomfilter. |
Character string |
Psnmvctrl.dll DLL version. |
Character string |
|
versiondetectevent |
Deteven.dll DLL version. |
Character string |
versiondetection |
||
versiondetevenfilter |
See vdeteventfilter. |
|
versionfilterantiexploit |
See vtfilterantiexploit. |
|
versionhelper |
Versión de la dll HELPER_XX.exe |
Character string |
versioninjectionplg |
Versión de la dll PSNInyectorPLG.dll |
Character string |
versionioaplg |
See vioaplg. | |
versionnopeanalysisfilter |
Versión del filtro del modelo en el fichero nn.sig para analizar scripts. |
Character string |
versionproduct |
Installed protection product version. |
Character string |
versionramsomevent |
See vramsomevent. |
|
versionsherlockplg |
See vsherlockplg. | |
versiontabledetection |
See vtabledetevent. |
|
versiontableramsom |
See vtableramsomevent. |
|
versionttpplg |
See vttpplg. | |
PSNIOAPlg.dll DLL version. |
Character string |
|
TblEven.dll DLL version. |
Character string |
|
TblRansomEven.dll DLL version. |
Character string |
|
RansomEvent.dll DLL version. |
Character string |
|
Versión de la dll PSNEVMGRAG.dll. |
Character string |
|
Versión de la dll PSINJHOOKPLG32.dll. |
Character string |
|
PSNMitrePlg.dll DLL version. |
Character string |
|
winningtech |
Cytomic EPDR or Cytomic EDR agent technology that raised the event:
|
Enumeration |
wsdocs |
List of all documents that were open when an exploit detection occurred. |
Character string |