A fast reference tool for Windows Security & Sysmon events, designed for SOC analysts, threat hunters, and incident responders.
Windows Event Threat Navigator (WETNav) is a quick reference tool built to solve a common analyst problem: rapidly looking up Windows Security and Sysmon event IDs with immediate context about their security significance. Whether you're investigating an incident, building detection rules, or simply learning about Windows event logs, this tool provides fast access to event documentation with MITRE ATT&CK® mappings.
This is an experimental reference tool, not a production-ready security product. It serves as a helpful utility for speeding up the common analyst task of understanding Windows event context and potential security implications.
- 470+ Events Documented - Windows Security (441 events) and Sysmon (29 events)
- MITRE ATT&CK® Integration - Manual mappings to adversary techniques and tactics
- Enhanced Event Analysis - In-depth security context for critical events
- Key Log Fields - 152 events with exact field names and analyst guidance
- Fast Search & Filtering - Instant lookup by Event ID, name, category, or MITRE technique
At its core, this tool provides a searchable interface to:
- Look up Windows Security and Sysmon event IDs
- View event names, descriptions, and categories
- Access MITRE ATT&CK® technique mappings for threat context
- Review key log fields that SOC/IR teams should focus on during analysis
- Read analyst notes on common scenarios and investigation tips
- Understand security implications and detection strategies
- Filter events by source (Windows/Sysmon) and category
- Unified Event Data - Comprehensive Windows Security and Sysmon event database
- Enhanced Content - Deep-dive analysis for critical security events with:
- Quick answer summaries for rapid triage
- Detailed explanations of event significance
- Security implications and threat context
- Detection strategies and baseline guidance
- Real-world attack examples from documented campaigns
- Related event correlations
- Manual Technique Mappings - Events mapped to specific MITRE ATT&CK® techniques based on analyst research
- Rich Context - View Technique ID, Name, Tactics, and Descriptions
- Investigation Starting Points - Understand which adversary behaviors each event can detect
- Important Disclaimer - All mappings are potential associations; context is critical for accurate threat assessment
- Exact Technical Field Names - Uses actual Windows Event Log field names (e.g.,
SubjectUserName,LogonType,IpAddress) - Detailed Descriptions - Field explanations with examples, status codes, and analysis guidance
- Coverage Areas - Authentication, account management, process execution, network activity, policy changes, and more
- SOC/IR Focus - Highlights the most critical fields for security analysis and threat hunting
- Fast Client-Side Search - Instant results across Event ID, Name, Category, MITRE ID/Name, and Notes
- Source Filtering - Switch between Windows Security, Sysmon, or all events
- Multiple View Modes - Card view, list view, and detailed event pages
- Official Documentation Links - Direct references to Microsoft documentation
- Framework: Next.js 14 (React with App Router)
- Language: TypeScript
- Styling: Tailwind CSS
- Icons: React Icons
- Deployment: Vercel
The tool integrates several data sources processed during build:
- Contains Event ID, Source, Name, Description, and Official Link
- Derived primarily from Microsoft documentation for Security Events and Sysmon
categories.ts- Assigns categories (e.g., "Authentication", "Process Execution") to each Event IDscenarios.ts- Curated notes, common legitimate uses, and analysis considerations for specific eventsmitre.ts- Manually maps Event IDs to MITRE ATT&CK® Technique IDs (e.g., "T1059", "T1110.003") based on analyst researchkeyFields.ts- Maps 152 events to critical log fields with exact technical names and detailed descriptions
- Source: Generated offline using
process_stix.pyscript that parses the officialenterprise-attack.jsonSTIX bundle from mitre-attack/attack-stix-data - Content: Structured details (ID, Name, Description, Tactics, URL) for ATT&CK® techniques with cleaned descriptions
- Next.js app loads all data sources at build time
- For each event, looks up Category, Scenarios, and Key Log Fields from mapping files
- Uses manual MITRE mapping to find relevant Technique IDs
- Retrieves full technique details from processed STIX data
- Merged
EventDetailobjects are passed to client-side components
Experience WETN in action: wetnav.patelhari.com
- Search - Type an Event ID, keyword, category, or MITRE technique
- Filter - Click "Windows" or "Sysmon" buttons to filter by source
- Browse - Scroll through the event list or use card/list view
- Deep Dive - Click any event to see comprehensive analysis
- Learn - Read detection strategies, real-world examples, and security implications
- Node.js 18.17 or higher
- npm, yarn, or pnpm package manager
# Clone the repository
git clone https://github.com/packetwarden/WETNav.git
cd WETNav
# Install dependencies
npm install
# Run development server
npm run devOpen http://localhost:3000 in your browser.
# Create optimized production build
npm run build
# Start production server
npm startTo update the MITRE ATT&CK® technique details (techniques.json):
- Download the latest
enterprise-attack.jsonSTIX bundle from mitre-attack/attack-stix-data - Run the
process_stix.pyPython script (requires Python 3) - Copy the generated
techniques.jsonto/src/data/mitre_processed/
This is a side project and NOT a production-ready security tool. Use it as a reference aid only. Always verify information against official documentation and your own analysis.
Event descriptions and mappings are based on public data and manual interpretation. They may contain errors, omissions, or become outdated. Always verify critical information against official Microsoft documentation and current threat intelligence.
The ATT&CK® mappings represent potential associations between events and adversary techniques. An event occurring does NOT definitively mean the mapped technique was used maliciously. Context is absolutely critical - these mappings are intended as investigation starting points, not definitive indicators of compromise.
This tool comes with no warranties or guarantees. Use at your own discretion and risk.
- SIEM Detection Queries - Pre-built queries for Splunk SPL, Microsoft Sentinel KQL, and Elastic Query DSL
- Advanced Search Syntax - Boolean operators (AND, OR, NOT) and field-specific search
- Threat Actor Profiles - Link events to known threat actor TTPs and campaigns
- Export Functionality - Export event details as PDF, Markdown, or JSON
- API Access - RESTful API for programmatic access to event data
- Expand MITRE ATT&CK® mappings to additional events
- Add more enhanced event analysis with real-world examples
- Include Sysmon configuration recommendations
- Add Windows Event Forwarding (WEF) guidance
- Create detection rule templates for popular SIEM platforms
Contributions are welcome! Whether it's:
- Adding or improving MITRE ATT&CK® mappings
- Enhancing event analysis and detection guidance
- Fixing bugs or data errors
- Improving documentation
- Suggesting new features
Please open an issue or pull request on GitHub.
- Follow TypeScript best practices
- Test changes thoroughly before submitting
- Include clear commit messages
- Update documentation as needed
- Microsoft - For comprehensive Windows Security Events and Sysmon documentation
- MITRE ATT&CK® - This project utilizes ATT&CK® content. ATT&CK® is a registered trademark of The MITRE Corporation. "© 2024 The MITRE Corporation. This work is reproduced and distributed with the permission of The MITRE Corporation." (MITRE ATT&CK Website, Terms of Use)
- Microsoft Sysinternals - For the powerful Sysmon tool
- Next.js Team - For the excellent React framework
- Tailwind Labs - For the utility-first CSS framework
- Vercel - For seamless deployment and hosting
- Open Source Community - For countless tools and libraries that made this possible
- Live Demo: wetnav.patelhari.com
- GitHub Repository: github.com/packetwarden/WETNav
- Issue Tracker: GitHub Issues
- Author: Hari Patel - Cybersecurity Researcher
This project is licensed under the MIT License - see the LICENSE file for details.
- MITRE ATT&CK® content used under their terms of use
- Microsoft documentation referenced under fair use principles
- All open source libraries used under their respective licenses
Built for the security community
If this tool has helped you in your security operations, consider:
- ⭐ Starring the repository
- 🐛 Reporting issues or bugs
- 💡 Suggesting features or improvements
- 🤝 Contributing code or documentation
- 📢 Sharing with fellow security professionals