Hub
Endpoint

Windows Sysmon

Sysmon (System Monitor) operational channel — process creation with full command lines, network connections, file creates, registry modifications, DNS queries, and WMI events. SwiftOnSecurity-style tuning.

Quick Start

uv tool install eventum-generator
git clone https://github.com/eventum-generator/content-packs.git
cd content-packs
eventum generate \
  --path generators/windows-sysmon/generator.yml \
  --id sysmon \
  --live-mode true

Event Types

Event IDDescriptionFrequencyCategory
11File Created~25%file
13Registry Value Set~20%registry
22DNS Query~15%network
1Process Create~12%process
5Process Terminated~10%process
3Network Connection~8%network
12Registry Create/Delete~3%registry
15FileCreateStreamHash~2%file
23File Delete (Archived)~1.5%file
26File Delete (Logged)~1%file
17Named Pipe Created~0.5%file
18Named Pipe Connected~0.5%file
25Process Tampering~0.5%process
6Driver Loadedraredriver
8CreateRemoteThreadrareprocess

Realism Features

  • Process lifecycle correlation — Event 1 stores processes; Event 5 consumes with consistent ProcessGuid, PID, Image
  • Process-to-activity linkage — DNS, file, network events reference active processes from the pool
  • 25 Windows processes with correct parent-child relationships, PE metadata, and file hashes
  • 30 real-world DNS domains with CNAME chains, resolved IPs, and NXDOMAIN distribution
  • Registry path diversity — HKLM/HKU paths covering services, security, Explorer, Defender
  • 120-host fleet with per-host record IDs and per-host process pool correlation

Sample Output

{
    "@timestamp": "2026-02-21T14:30:22.150000+00:00",
    "event": {
        "action": "Process creation",
        "category": ["process"],
        "code": "1",
        "module": "sysmon",
        "type": ["start"]
    },
    "process": {
        "executable": "C:\\Windows\\System32\\svchost.exe",
        "name": "svchost.exe",
        "pid": 6228,
        "parent": {
            "executable": "C:\\Windows\\System32\\services.exe",
            "name": "services.exe"
        }
    },
    "user": { "domain": "NT AUTHORITY", "name": "SYSTEM" },
    "winlog": {
        "channel": "Microsoft-Windows-Sysmon/Operational",
        "event_id": "1"
    }
}

Parameters

ParameterDefaultDescription
domainCONTOSONetBIOS domain name
fqdn_suffixcontoso.localDNS domain suffix
domain_sidS-1-5-21-3457937927-...Domain SID prefix
agent_version8.17.0Agent version string

Related Generators