Merge pull request #208 from Cyb3rWard0g/master

Elastalert-HELK integration Updates
This commit is contained in:
Thomas Patzke 2018-12-10 22:13:37 +01:00 committed by GitHub
commit 4e3f6c366b
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
3 changed files with 124 additions and 69 deletions

View File

@ -1,11 +1,10 @@
title: Disabling Windows Event Auditing
description: >
Detects scenarios where system auditing (ie: windows event log auditing) is disabled. This may be used in a scenario
description: 'Detects scenarios where system auditing (ie: windows event log auditing) is disabled. This may be used in a scenario
where an entity would want to bypass local logging to evade detection when windows event logging is enabled and
reviewed. Also, it is recommended to turn off "Local Group Policy Object Processing" via GPO, which will make sure
that Active Directory GPOs take precedence over local/edited computer policies via something such as "gpedit.msc".
Please note, that disabling "Local Group Policy Object Processing" may cause an issue in scenarios of one off
specific GPO modifications -- however it is recommended to perform these modifications in Active Directory anyways.
specific GPO modifications -- however it is recommended to perform these modifications in Active Directory anyways.'
references:
- https://bit.ly/WinLogsZero2Hero
tags:

View File

@ -6,14 +6,16 @@ references:
tags:
- attack.execution
- attack.t1086
author: Florian Roth (rule), Daniel Bohannon (idea)
author: Florian Roth (rule), Daniel Bohannon (idea), Roberto Rodriguez (Fix)
logsource:
product: windows
service: sysmon
detection:
keywords:
Image: '*\powershell.exe'
substrings:
selection:
Image:
- '*\Powershell.exe'
EventID: 1
CommandLine:
- ' -windowstyle h '
- ' -windowstyl h'
- ' -windowsty h'
@ -54,7 +56,7 @@ detection:
- ' -encod '
- ' -enco '
- ' -en '
condition: all of them
condition: selection
falsepositives:
- Penetration tests
level: high

View File

@ -30,64 +30,118 @@ logsources:
defaultindex: logs-*
fieldmappings:
AccessMask: object_access_mask_requested
AccountName: service_account_name
AccountName:
EventID=7045: service_account_name
EventID=4624: user_name
AllowedToDelegateTo: user_attribute_allowed_todelegate
AttributeLDAPDisplayName: dsobject_attribute_name
AuditPolicyChanges: policy_changes
AuthenticationPackageName: logon_authentication_package
CallTrace: process_calltrace
CommandLine: command_line
CallTrace: process_call_trace
CommandLine: process_command_line
Company: file_company
ComputerName: host_name
Configuration:
EventID=16: sysmon_configuration
CurrentDirectory: process_current_directory
DestinationHostname: dst_host
Description: file_description
Destination:
EventID=20: wmi_consumer_destination
DestinationHostname: dst_host_name
DestinationIp: dst_ip
DestinationIsIpv6: dst_isipv6
DestinationPort: dst_port_number
Details: registry_details
DestinationPort: dst_port
DestinationPortName: dst_port_name
Details:
EventID=13: registry_key_value
Device: device_name
EngineVersion: powershell.engine.version
EventID: event_id
EventType:
EventID=12: registry_event_type
EventID=13: registry_event_type
EventID=14: registry_event_type
EventID=19: wmi_event_type
EventID=20: wmi_event_type
EventID=21: wmi_event_type
EventType: event_type
EventNamespace:
EventID=19: wmi_namespace
Filter:
EventID=21: wmi_filter_path
FailureCode: ticket_failure_code
FileVersion: file_version
GrantedAccess: process_granted_access
GroupName: group_name
HiveName: hive_name
HostVersion: powershell.host.version
Image: process_path
ImageLoaded: image_loaded
ImageLoaded:
EventID=6: driver_loaded
EventID=7: module_loaded
Imphash: hash_imphash
Initiated:
EventID=3: network_initiated"
IntegrityLevel:
EventID=1: process_integrity_level
LogonProcessName: logon_process_name
LogonType: logon_type
MachineName: host_name
Name:
EventID=19: wmi_name
EventID=20: wmi_name
NewProcessName: process_path
NewName:
EventID=14: registry_key_new_name
ObjectClass: dsobject_class
ObjectName: object_name
ObjectType: object_type
ObjectValueName: object_value_name
Operation:
EventID=19: wmi_operation
EventID=20: wmi_operation
EventID=21: wmi_operation
OperationType: object_operation_type
ParentImage: process_parent_path
ParentCommandLine: process_parent_command_line
PipeName: pipe_name
ProcessName: process_path
ProcesssCommandLine: process_command_line
Product: file_product
Properties: object_properties
Protocol:
EventID=3: network_protocol
Query:
EventID=19: wmi_query
RelativeTargetName: share_relative_target_name
SchemaVersion:
EventID=4: sysmon_schema_version
ServiceFileName: service_image_path
ServiceName: service_name
ShareName: share_name
Signature: signature
SignatureStatus: signature_status
Signed: signed
Source: source_name
SourceHostname: src_host_name
SourceImage: process_path
StartModule: thread_startmodule
Status: logon_failure_status
SubjectUserName: user_name
SourcePort: src_port
SourcePortName: src_port_name
StartAddress: thread_start_address
StartFunction: thread_start_function
StartModule: thread_start_module
Status: event_status
State:
EventID=4: service_state
EventID=16: sysmon_configuration_state
SubjectUserName:
EventID=4624: user_reporter_name
EventID=5140: user_name
TargetFilename: file_name
TargetImage: process_target_path
TargetObject: registry_target_object
TargetImage: target_process_path
TargetObject: registry_key_path
TargetImage: target_process_path
TaskName: task_name
TicketEncryptionType: ticket_encryption_type
TicketOptions: ticket_options
Type:
EventID=20: wmi_consumer_type
User: user
UserName: user_name
Workstation: src_host
WorkstationName: src_host
Version:
EventID=4: sysmon_version
Workstation: source_host_name
WorkstationName: source_host_name