Document toolboxDocument toolbox

cef0.crowdstrike.falconhost

Introduction

The table cef0.crowdstrike.falconhost identifies events in CEF format generated by CrowdStrike Falcon Host.

Tag structure

Events in CEF format don't have a specific tag structure, as explained in Technologies supported in CEF syslog format. They are always sent to a table with the structure cef0.deviceVendor.deviceProduct.

In this case, the valid data tables are:

TagData table

cef0.crowdstrike.falconhost

cef0.crowdstrike.falconhost

How is the data sent to Devo?

Learn more about CEF syslog format and how Devo tags these events in Technologies supported in CEF syslog format.

Log samples

The following is a sample log sent to the cef0.crowdstrike.falconhost table. Find how the information will be parsed in your data table under each sample log.

Extra columns

Fields marked as Extra in the table below are not shown by default in data tables and need to be explicitly requested in the query. You can find them marked as Extra when you perform a query so they can be easily identified. Learn more about this in Selecting unrevealed columns.

2021-11-19 10:49:19.606 localhost=127.0.0.1 14 CEF: 0|CrowdStrike|FalconHost|1.0|DetectionSummaryEvent|Detection Summary Event|2| cs6Label=FalconHostLink cs1=-at:[at+bodysaron\\\\=0#OK#5000] cn2=13658726666418 dhost=SERVERNAME-A fileHash=c8ad5284ece0bbd4a3af6ff2e7c7721a suser=SPH-123ABC-HPM duser=SPH-123ABC-HPM cn2Label=ProcessId cn1Label=ParentProcessId fname=FIBOCOM_MT_V1.0.3.9.exe cn1=13580823324206 cs1Label=CommandLine deviceCustomDate1Label=ProcessStartTime cn3Label=Offset cs6=https://falcon.crowdstrike.com/activity/detections/detail/ deviceCustomDate1=2019-05-08 14:20:56 sntdom=MC externalID=4ed9122015d7444c6c3ba3bf23d08d56 filePath=\\\\Device\\\\HarddiskVolume4\\\\Program Files (x86)\\\\Lenovo cn3=16362 shost=SPH-123ABC-HPM

And this is how the log would be parsed:

Field

Value

Type

Source field name

Extra fields

eventdate

2021-11-19 10:49:19.606

timestamp



hostchain

localhost=127.0.0.1

str


✓

priorityCode

14

str



cefTag

CEF

str



cefVersion

0

str



embDeviceVendor

CrowdStrike

str



embDeviceProduct

FalconHost

str



deviceVersion

1.0

str



signatureID

DetectionSummaryEvent

str



name

Detection Summary Event

str



severity

2

str



PolicyNameLabel

null

str



cat

null

str



cmdLine

null

str



cmdLineLabel

null

str



cn1

13580823324206

int8



cn1Label

ParentProcessId

str



cn2

13658726666418

int8



cn2Label

ProcessId

str



cn3

16362

int8



cn3Label

Offset

str



connectionDirection

null

str



connectionDirectionLabel

null

str



cs1

-at:[at+bodysaron\\=0#OK#5000]

str



cs1Label

CommandLine

str



cs6

https://falcon.crowdstrike.com/activity/detections/detail/4ed9122015d7444c6c3ba3bf23d08d56/227651344811?_cid\\=a232896240dc4ed5b9294761eb5b2322

str



cs6Label

FalconHostLink

str



deviceCustomDate1

2019-05-08 14:20:56.0

timestamp



deviceCustomDate1Label

ProcessStartTime

str



deviceId

null

str



dhost

SERVERNAME-A

str



eventType

null

str



externalID

4ed9122015d7444c6c3ba3bf23d08d56

str



fileHash

c8ad5284ece0bbd4a3af6ff2e7c7721a

str



filePath

\\Device\\HarddiskVolume4\\Program Files (x86)\\Lenovo\\DPR\\Fibocom

str



fname

FIBOCOM_MT_V1.0.3.9.exe

str



hostName

null

str



icmpCodeLabel

null

str



imageFileName

null

str



imageFileNameLabel

null

str



ipVLabel

null

str



localAddress

null

str



localAddressLabel

null

str



localPort

null

str



localPortLabel

null

str



matchCount

null

str



matchCountLabel

null

str



matchCountSinceLastReport

null

str



matchCountSinceLastReportLabel

null

str



msg

This file meets the File Analysis ML algorithm's low-confidence threshold for malware.

str



networkProfile

null

str



networkProfileLabel

null

str



protocol

null

str



protocolLabel

null

str



remoteAddress

null

str



remoteAddressLabel

null

str



remotePort

null

str



remotePortLabel

null

str



rt

null

timestamp



ruleAction

null

str



ruleActionLabel

null

str



ruleDescriptionLabel

null

str



ruleGroupName

null

str



ruleGroupNameLabel

null

str



ruleName

null

str



ruleNameLabel

null

str



shost

SPH-123ABC-HPM

str



sntdom

MC

str



statusLabel

null

str



suser

SPH-123ABC-HPM

str



duser

SPH-123ABC-HPM

str



rawMessage

CEF: 0|CrowdStrike|FalconHost|1.0|DetectionSummaryEvent|Detection Summary Event|2| cs6Label=FalconHostLink cs1=-at:[at+bodysaron\\\\=0#OK#5000] cn2=13658726666418 dhost=SERVERNAME-A fileHash=c8ad5284ece0bbd4a3af6ff2e7c7721a suser=SPH-123ABC-HPM duser=SPH-123ABC-HPM cn2Label=ProcessId cn1Label=ParentProcessId fname=FIBOCOM_MT_V1.0.3.9.exe cn1=13580823324206 cs1Label=CommandLine deviceCustomDate1Label=ProcessStartTime cn3Label=Offset cs6=https://falcon.crowdstrike.com/activity/detections/detail/ deviceCustomDate1=2019-05-08 14:20:56 sntdom=MC externalID=4ed9122015d7444c6c3ba3bf23d08d56 filePath=\\\\Device\\\\HarddiskVolume4\\\\Program Files (x86)\\\\Lenovo cn3=16362 shost=SPH-123ABC-HPM

str



tag

CEF

str

cefTag

✓