Appendix A - Windows Event Output Format
The Snare Agent reads audit log data from the Windows operating system. Before sending the audit event to a destination, the Agent converts the audit data into the destination format, such as SNARE, SNARE v2, SYSLOG (RFC 3164), etc. Please see Destination Configuration page in this User Guide for the full list of supported formats.
Below is the description of the event content in SNARE and SNARE v2 formats:
SNARE Format
In SNARE format, TAB delimiter is used to separate the event data values.
The format of the event log record is as follows:
Windows audit event structure - SNARE format
<hostname> <event log type> <criticality> <logname> <snare event counter> <date time> <event id> <sourcename> <username> <sidtype> <event log type> <computername> <strings...> <event log counter> <optional fields>
Windows audit event example - SNARE format
test-hostnameMSWinEventLog 0 Security 472890 Thu Mar 06 17:44:29 2025 4690 Microsoft-Windows-Security-Auditing TESTGROUP\TEST-ACCOUNTNAME$ N/A Success Audit test-hostname Sensitive Privilege Use An attempt was made to duplicate a handle to an object. Subject: Security ID: S-1-5-13 Account Name: TEST-ACCOUNTNAME$ Account Domain: TESTGROUP Logon ID: 0x3F7 Source Handle Information: Source Handle ID: 0x2ec Source Process ID: 0x16f8 New Handle Information: Target Handle ID: 0x1a0b4 Target Process ID: 0x4 78714
Windows audit event example with optional fields - SNARE format
test-hostname MSWinEventLog 0 Security 472890 Thu Mar 06 17:44:29 2025 4690 Microsoft-Windows-Security-Auditing TESTGROUP\TEST-ACCOUNTNAME$ N/A Success Audit test-hostname Sensitive Privilege Use An attempt was made to duplicate a handle to an object. Subject: Security ID: S-1-5-13 Account Name: TEST-ACCOUNTNAME$ Account Domain: TESTGROUP Logon ID: 0x3F7 Source Handle Information: Source Handle ID: 0x2ec Source Process ID: 0x16f8 New Handle Information: Target Handle ID: 0x1a0b4 Target Process ID: 0x4 78714 EventSourceId=AU_123 EventChecksum=de62d5bef24d0678eebd65d2463bf43af21ba862cd17a77dc0f88bde2ea32e2d7bfdbffbc6c0b731cc967d6107ed6d5122441c2b333b0cdbd29062368d123abc
The format of the event record is as follows:
Hostname. The assigned hostname of the machine or the override value configured in Snare Agent.
Event Log Type. Fixed value of 'MSWinEventLog'.
Criticality. This is a numeric value, determined by the Alert level configured in the audit policy in Snare Agent, as detailed in the configuration settings in Appendix B.
LogName. This is the Windows Event Log from which the event record was derived. In the above example, the event record was derived from the 'Security' event log.
Snare Event Counter. Based on the internal Snare event counter. Rotates at 'MAXDWORD'.
DateTime. This is the date time stamp of the event record.
EventID. This is the Windows Event ID.
SourceName. This is the Source of the Windows Event Log from which the event record was derived. In the above example, source is 'Microsoft-Windows-Security-Auditing'.
UserName. This is the Windows' user name.
SIDType. This is the type of SID used. In the above example, it is a 'N/A', but for some events it may also be a 'user', 'computer' or other type of SID.
EventLogType. This can be any of 'Success Audit', 'Failure Audit', 'Error', 'Information' or 'Warning'.
ComputerName. This is the Windows computer name.
CategoryString. This is the category of audit event, as detailed by the Windows event logging system. In the above example it is 'Sensitive Privilege Use'
DataString. This contains the event data. This field is generally blank except for a few particular events.
ExpandedString. This contains the expanded event details.
EventLogCounter. This is a counter of the events collected by Snare Agent from a certain Windows event log source (Security, System, Application, etc.). This counter resets to 0 for all log sources after the Snare service restart.
EventSourceId (optional). Additional data to be included in each event as specified in Event Options settings of the Agent
EventChecksum (optional). A SHA3-512 checksum of the event can optionally be included with each event sent over the network by the Snare for Windows agent. Note that the application that evaluates each record will need to strip the final delimiter, plus the checksum, prior to evaluating the event. See Destination Configuration page for enabling the checksum.
SNARE v2 Format
SNARE v2 format is comprised of Snare header followed by a single-line JSON content. As this format reads the XML representation of the Windows event log, it contains more detailed event information, and a more accurate timestamp with time zone and millisecond precision. The SNARE v2 format includes up to 12 additional fields of information depending on the event id of information from the windows event logs over the original SNARE format. Some of the additional fields include, TImeCreated which includes millisecond timing of the event, EventRecordID a windows event sequence number, process and thread information etc. The SNARE v2 log format also automatically truncates all the documentation out of the events so overall the events are smaller than the original SNARE format for which there is a truncation feature in the agent general configuration screen.
Windows audit event structure - SNARE V2 format
<hostname> <event log type> <criticality> {"Event":{...,"System":{..., "TimeCreated":{...},...},"Data":{...}}
Windows audit event example - SNARE V2 format
test-hostname MSWinEventLog 0 {"Event":{"xmlns":"http:\/\/schemas.microsoft.com\/win\/2004\/08\/events\/event","System":{"Provider":{"Name":"Microsoft-Windows-Security-Auditing","Guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}"},"EventID":"4689","Version":"0","Level":"0","Task":"13313","Opcode":"0","Keywords":"0x8020000000000000","TimeCreated":{"SystemTime":"2025-03-06T07:58:30.0637408Z","LocalTime":"2025-03-06T18:28:30.063740+10:30"},"EventRecordID":"164469288","Execution":{"ProcessID":"4","ThreadID":"245164"},"Channel":"Security","Computer":"test-hostname"},"Data":{"SubjectUserSid":"S-1-5-13","SubjectUserName":"TEST-ACCOUNTNAME$","SubjectDomainName":"TESTGROUP","SubjectLogonId":"0x3e7","Status":"0x0","ProcessId":"0x3d7e4","ProcessName":"C:\\Windows\\System32\\taskhostw.exe","EventLogCounter":"174745","EventSourceId":"AU_123"}}}