mirror of
https://github.com/valitydev/SigmaHQ.git
synced 2024-11-07 09:48:58 +00:00
Merge pull request #208 from Cyb3rWard0g/master
Elastalert-HELK integration Updates
This commit is contained in:
commit
4e3f6c366b
@ -1,11 +1,10 @@
|
||||
title: Disabling Windows Event Auditing
|
||||
description: >
|
||||
Detects scenarios where system auditing (ie: windows event log auditing) is disabled. This may be used in a scenario
|
||||
description: 'Detects scenarios where system auditing (ie: windows event log auditing) is disabled. This may be used in a scenario
|
||||
where an entity would want to bypass local logging to evade detection when windows event logging is enabled and
|
||||
reviewed. Also, it is recommended to turn off "Local Group Policy Object Processing" via GPO, which will make sure
|
||||
that Active Directory GPOs take precedence over local/edited computer policies via something such as "gpedit.msc".
|
||||
Please note, that disabling "Local Group Policy Object Processing" may cause an issue in scenarios of one off
|
||||
specific GPO modifications -- however it is recommended to perform these modifications in Active Directory anyways.
|
||||
specific GPO modifications -- however it is recommended to perform these modifications in Active Directory anyways.'
|
||||
references:
|
||||
- https://bit.ly/WinLogsZero2Hero
|
||||
tags:
|
||||
|
@ -6,14 +6,16 @@ references:
|
||||
tags:
|
||||
- attack.execution
|
||||
- attack.t1086
|
||||
author: Florian Roth (rule), Daniel Bohannon (idea)
|
||||
author: Florian Roth (rule), Daniel Bohannon (idea), Roberto Rodriguez (Fix)
|
||||
logsource:
|
||||
product: windows
|
||||
service: sysmon
|
||||
detection:
|
||||
keywords:
|
||||
Image: '*\powershell.exe'
|
||||
substrings:
|
||||
selection:
|
||||
Image:
|
||||
- '*\Powershell.exe'
|
||||
EventID: 1
|
||||
CommandLine:
|
||||
- ' -windowstyle h '
|
||||
- ' -windowstyl h'
|
||||
- ' -windowsty h'
|
||||
@ -54,7 +56,7 @@ detection:
|
||||
- ' -encod '
|
||||
- ' -enco '
|
||||
- ' -en '
|
||||
condition: all of them
|
||||
condition: selection
|
||||
falsepositives:
|
||||
- Penetration tests
|
||||
level: high
|
||||
|
@ -30,64 +30,118 @@ logsources:
|
||||
defaultindex: logs-*
|
||||
fieldmappings:
|
||||
AccessMask: object_access_mask_requested
|
||||
AccountName: service_account_name
|
||||
AccountName:
|
||||
EventID=7045: service_account_name
|
||||
EventID=4624: user_name
|
||||
AllowedToDelegateTo: user_attribute_allowed_todelegate
|
||||
AttributeLDAPDisplayName: dsobject_attribute_name
|
||||
AuditPolicyChanges: policy_changes
|
||||
AuthenticationPackageName: logon_authentication_package
|
||||
CallTrace: process_calltrace
|
||||
CommandLine: command_line
|
||||
CallTrace: process_call_trace
|
||||
CommandLine: process_command_line
|
||||
Company: file_company
|
||||
ComputerName: host_name
|
||||
Configuration:
|
||||
EventID=16: sysmon_configuration
|
||||
CurrentDirectory: process_current_directory
|
||||
DestinationHostname: dst_host
|
||||
Description: file_description
|
||||
Destination:
|
||||
EventID=20: wmi_consumer_destination
|
||||
DestinationHostname: dst_host_name
|
||||
DestinationIp: dst_ip
|
||||
DestinationIsIpv6: dst_isipv6
|
||||
DestinationPort: dst_port_number
|
||||
Details: registry_details
|
||||
DestinationPort: dst_port
|
||||
DestinationPortName: dst_port_name
|
||||
Details:
|
||||
EventID=13: registry_key_value
|
||||
Device: device_name
|
||||
EngineVersion: powershell.engine.version
|
||||
EventID: event_id
|
||||
EventType:
|
||||
EventID=12: registry_event_type
|
||||
EventID=13: registry_event_type
|
||||
EventID=14: registry_event_type
|
||||
EventID=19: wmi_event_type
|
||||
EventID=20: wmi_event_type
|
||||
EventID=21: wmi_event_type
|
||||
EventType: event_type
|
||||
EventNamespace:
|
||||
EventID=19: wmi_namespace
|
||||
Filter:
|
||||
EventID=21: wmi_filter_path
|
||||
FailureCode: ticket_failure_code
|
||||
FileVersion: file_version
|
||||
GrantedAccess: process_granted_access
|
||||
GroupName: group_name
|
||||
HiveName: hive_name
|
||||
HostVersion: powershell.host.version
|
||||
Image: process_path
|
||||
ImageLoaded: image_loaded
|
||||
ImageLoaded:
|
||||
EventID=6: driver_loaded
|
||||
EventID=7: module_loaded
|
||||
Imphash: hash_imphash
|
||||
Initiated:
|
||||
EventID=3: network_initiated"
|
||||
IntegrityLevel:
|
||||
EventID=1: process_integrity_level
|
||||
LogonProcessName: logon_process_name
|
||||
LogonType: logon_type
|
||||
MachineName: host_name
|
||||
Name:
|
||||
EventID=19: wmi_name
|
||||
EventID=20: wmi_name
|
||||
NewProcessName: process_path
|
||||
NewName:
|
||||
EventID=14: registry_key_new_name
|
||||
ObjectClass: dsobject_class
|
||||
ObjectName: object_name
|
||||
ObjectType: object_type
|
||||
ObjectValueName: object_value_name
|
||||
Operation:
|
||||
EventID=19: wmi_operation
|
||||
EventID=20: wmi_operation
|
||||
EventID=21: wmi_operation
|
||||
OperationType: object_operation_type
|
||||
ParentImage: process_parent_path
|
||||
ParentCommandLine: process_parent_command_line
|
||||
PipeName: pipe_name
|
||||
ProcessName: process_path
|
||||
ProcesssCommandLine: process_command_line
|
||||
Product: file_product
|
||||
Properties: object_properties
|
||||
Protocol:
|
||||
EventID=3: network_protocol
|
||||
Query:
|
||||
EventID=19: wmi_query
|
||||
RelativeTargetName: share_relative_target_name
|
||||
SchemaVersion:
|
||||
EventID=4: sysmon_schema_version
|
||||
ServiceFileName: service_image_path
|
||||
ServiceName: service_name
|
||||
ShareName: share_name
|
||||
Signature: signature
|
||||
SignatureStatus: signature_status
|
||||
Signed: signed
|
||||
Source: source_name
|
||||
SourceHostname: src_host_name
|
||||
SourceImage: process_path
|
||||
StartModule: thread_startmodule
|
||||
Status: logon_failure_status
|
||||
SubjectUserName: user_name
|
||||
SourcePort: src_port
|
||||
SourcePortName: src_port_name
|
||||
StartAddress: thread_start_address
|
||||
StartFunction: thread_start_function
|
||||
StartModule: thread_start_module
|
||||
Status: event_status
|
||||
State:
|
||||
EventID=4: service_state
|
||||
EventID=16: sysmon_configuration_state
|
||||
SubjectUserName:
|
||||
EventID=4624: user_reporter_name
|
||||
EventID=5140: user_name
|
||||
TargetFilename: file_name
|
||||
TargetImage: process_target_path
|
||||
TargetObject: registry_target_object
|
||||
TargetImage: target_process_path
|
||||
TargetObject: registry_key_path
|
||||
TargetImage: target_process_path
|
||||
TaskName: task_name
|
||||
TicketEncryptionType: ticket_encryption_type
|
||||
TicketOptions: ticket_options
|
||||
Type:
|
||||
EventID=20: wmi_consumer_type
|
||||
User: user
|
||||
UserName: user_name
|
||||
Workstation: src_host
|
||||
WorkstationName: src_host
|
||||
Version:
|
||||
EventID=4: sysmon_version
|
||||
Workstation: source_host_name
|
||||
WorkstationName: source_host_name
|
Loading…
Reference in New Issue
Block a user