Merge pull request #1030 from stevengoossensB/master

Updated sysmon config and rewrite rules to use categories
This commit is contained in:
Florian Roth 2021-04-23 16:52:25 +02:00 committed by GitHub
commit c7ce9154d1
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
51 changed files with 160 additions and 187 deletions

View File

@ -16,9 +16,9 @@ falsepositives:
- Unknown
level: high
detection:
selection_1:
selection:
- ImagePath|re: '.*cmd.{0,5}(?:\/c|\/r).+clip(?:\.exe)?.{0,4}&&.+clipboard]::\(\s\\\"\{\d\}.+\-f.+\"'
condition: selection and selection_1
condition: selection
---
logsource:
product: windows
@ -29,14 +29,11 @@ detection:
---
logsource:
product: windows
service: sysmon
detection:
selection:
EventID: 6
category: driver_load
---
logsource:
product: windows
service: security
detection:
selection:
EventID: 4697
EventID: 4697

View File

@ -31,7 +31,7 @@ detection:
---
logsource:
product: windows
service: sysmon
category: driver_load
detection:
selection:
EventID: 6

View File

@ -16,9 +16,9 @@ falsepositives:
- Unknown
level: high
detection:
selection_1:
selection:
- ImagePath|re: '.*cmd.{0,5}(?:\/c|\/r).+powershell.+(?:\$\{?input\}?|noexit).+\"'
condition: selection and selection_1
condition: selection
---
logsource:
product: windows
@ -29,14 +29,11 @@ detection:
---
logsource:
product: windows
service: sysmon
detection:
selection:
EventID: 6
category: driver_load
---
logsource:
product: windows
service: security
detection:
selection:
EventID: 4697
EventID: 4697

View File

@ -16,9 +16,9 @@ falsepositives:
- Unknown
level: high
detection:
selection_1:
selection:
- ImagePath|re: '.*cmd.{0,5}(?:\/c|\/r)(?:\s|)\"set\s[a-zA-Z]{3,6}.*(?:\{\d\}){1,}\\\"\s+?\-f(?:.*\)){1,}.*\"'
condition: selection and selection_1
condition: selection
---
logsource:
product: windows
@ -29,14 +29,11 @@ detection:
---
logsource:
product: windows
service: sysmon
detection:
selection:
EventID: 6
category: driver_load
---
logsource:
logsource:
product: windows
service: security
detection:
detection:
selection:
EventID: 4697
EventID: 4697

View File

@ -16,9 +16,9 @@ falsepositives:
- unknown
level: medium
detection:
selection_1:
selection:
- ImagePath|re: '(?i).*new-object.*(?:system\.io\.compression\.deflatestream|system\.io\.streamreader).*text\.encoding\]::ascii.*readtoend'
condition: selection and selection_1
condition: selection
---
logsource:
product: windows
@ -29,14 +29,11 @@ detection:
---
logsource:
product: windows
service: sysmon
detection:
selection:
EventID: 6
category: driver_load
---
logsource:
product: windows
service: security
detection:
selection:
EventID: 4697
EventID: 4697

View File

@ -16,9 +16,9 @@ falsepositives:
- Unknown
level: medium
detection:
selection_1:
selection:
- ImagePath|re: '(?i).*rundll32(?:\.exe)?(?:\s+)?shell32\.dll.*shellexec_rundll.*powershell.*\"'
condition: selection and selection_1
condition: selection
---
logsource:
product: windows
@ -29,10 +29,7 @@ detection:
---
logsource:
product: windows
service: sysmon
detection:
selection:
EventID: 6
category: driver_load
---
logsource:
product: windows

View File

@ -16,9 +16,9 @@ falsepositives:
- Unknown
level: high
detection:
selection_1:
selection:
- ImagePath|re: '(?i).*(set).*&&\s?set.*(environment|invoke|\${?input).*&&.*"'
condition: selection and selection_1
condition: selection
---
logsource:
product: windows
@ -29,10 +29,7 @@ detection:
---
logsource:
product: windows
service: sysmon
detection:
selection:
EventID: 6
category: driver_load
---
logsource:
product: windows

View File

@ -16,9 +16,9 @@ falsepositives:
- Unknown
level: high
detection:
selection_1:
selection:
- ImagePath|re: '(?i).*?echo.*clip.*&&.*(Clipboard|i`?n`?v`?o`?k`?e`?).*'
condition: selection and selection_1
condition: selection
---
logsource:
product: windows
@ -29,10 +29,7 @@ detection:
---
logsource:
product: windows
service: sysmon
detection:
selection:
EventID: 6
category: driver_load
---
logsource:
product: windows

View File

@ -16,9 +16,9 @@ falsepositives:
- Unknown
level: high
detection:
selection_1:
selection:
- ImagePath|re: '(?i).*(set).*(&&).*(mshta).*(vbscript:createobject).*(\.run).*\(window\.close\).*"'
condition: selection and selection_1
condition: selection
---
logsource:
product: windows
@ -29,10 +29,7 @@ detection:
---
logsource:
product: windows
service: sysmon
detection:
selection:
EventID: 6
category: driver_load
---
logsource:
product: windows

View File

@ -16,9 +16,9 @@ falsepositives:
- Unknown
level: high
detection:
selection_1:
selection:
- ImagePath|re: '(?i).*&&.*rundll32.*shell32\.dll.*shellexec_rundll.*(value|invoke|comspec|iex).*"'
condition: selection and selection_1
condition: selection
---
logsource:
product: windows
@ -29,10 +29,7 @@ detection:
---
logsource:
product: windows
service: sysmon
detection:
selection:
EventID: 6
category: driver_load
---
logsource:
product: windows

View File

@ -16,9 +16,9 @@ falsepositives:
- Unknown
level: high
detection:
selection_1:
selection:
- ImagePath|re: '(?i).*&&set.*(\{\d\}){2,}\\\"\s+?\-f.*&&.*cmd.*\/c' # FPs with |\/r
condition: selection and selection_1
condition: selection
---
logsource:
product: windows
@ -29,14 +29,11 @@ detection:
---
logsource:
product: windows
service: sysmon
detection:
selection:
EventID: 6
category: driver_load
---
logsource:
product: windows
service: security
detection:
selection:
EventID: 4697
EventID: 4697

View File

@ -21,7 +21,7 @@ tags:
- attack.t1569.002
- attack.s0005
detection:
selection_1:
selection:
- ServiceName|contains:
- 'fgexec'
- 'wceservice'
@ -39,7 +39,7 @@ detection:
- 'gsecdump'
- 'servpw'
- 'pwdump'
condition: selection and selection_1
condition: selection
falsepositives:
- Legitimate Administrator using credential dumping tool for password recovery
level: high
@ -53,10 +53,7 @@ detection:
---
logsource:
product: windows
service: sysmon
detection:
selection:
EventID: 6
category: driver_load
---
logsource:
product: windows

View File

@ -14,7 +14,7 @@ tags:
- attack.t1134.001
- attack.t1134.002
detection:
selection_1:
selection:
# meterpreter getsystem technique 1: cmd.exe /c echo 559891bb017 > \\.\pipe\5e120a
- ServiceFileName|contains|all:
- 'cmd'
@ -32,7 +32,7 @@ detection:
- 'rundll32'
- '.dll,a'
- '/p:'
condition: selection and selection_1
condition: selection
fields:
- ComputerName
- SubjectDomainName
@ -51,10 +51,7 @@ detection:
---
logsource:
product: windows
service: sysmon
detection:
selection:
EventID: 6
category: driver_load
---
logsource:
product: windows

View File

@ -20,10 +20,9 @@ level: critical
---
logsource:
product: windows
service: sysmon
category: registry_event
detection:
selection1:
EventID: 13
TargetObject|contains|all:
- 'SYSTEM\'
- 'ControlSet'

View File

@ -12,9 +12,9 @@ falsepositives:
- Legitimate OpenVPN TAP insntallation
level: medium
detection:
selection_1:
selection:
ImagePath|contains: 'tap0901'
condition: selection and selection_1
condition: selection
---
logsource:
product: windows
@ -25,10 +25,7 @@ detection:
---
logsource:
product: windows
service: sysmon
detection:
selection:
EventID: 6
category: driver_load
---
logsource:
product: windows

View File

@ -10,7 +10,7 @@ date: 2019/02/01
modified: 2020/08/28
logsource:
product: windows
service: sysmon
category: create_remote_thread
detection:
selection:
EventID: 8

View File

@ -14,10 +14,9 @@ date: 2018/11/30
modified: 2020/08/28
logsource:
product: windows
service: sysmon
category: create_remote_thread
detection:
selection:
EventID: 8
TargetProcessAddress|endswith:
- '0B80'
- '0C7C'

View File

@ -13,10 +13,9 @@ tags:
- attack.t1055.001
logsource:
product: windows
service: sysmon
category: create_remote_thread
detection:
selection:
EventID: 8
StartModule|endswith: '\kernel32.dll'
StartFunction: 'LoadLibraryA'
condition: selection

View File

@ -9,10 +9,9 @@ date: 2017/02/19
modified: 2021/04/01
logsource:
product: windows
service: sysmon
category: create_remote_thread
detection:
selection:
EventID: 8
TargetImage: 'C:\Windows\System32\lsass.exe'
StartModule: ''
condition: selection

View File

@ -8,7 +8,7 @@ references:
date: 2018/06/25
logsource:
product: windows
service: sysmon
category: create_remote_thread
detection:
selection:
EventID: 8

View File

@ -14,14 +14,13 @@ references:
- https://lolbas-project.github.io
logsource:
product: windows
service: sysmon
category: create_remote_thread
tags:
- attack.privilege_escalation
- attack.defense_evasion
- attack.t1055
detection:
selection:
EventID: 8
SourceImage|endswith:
- '\bash.exe'
- '\cvtres.exe'

View File

@ -14,16 +14,14 @@ date: 2018/06/03
modified: 2020/08/26
logsource:
product: windows
service: sysmon
category: create_stream_hash
definition: 'Requirements: Sysmon config with Imphash logging activated'
detection:
selection:
EventID: 15
filter1:
Imphash: '00000000000000000000000000000000'
filter2:
Imphash: null
condition: selection and not 1 of filter*
condition: not 1 of filter*
fields:
- TargetFilename
- Image

View File

@ -12,10 +12,9 @@ author: Oddvar Moe, Sander Wiebing, oscd.community
date: 2020/10/07
logsource:
product: windows
service: sysmon
category: create_stream_hash
detection:
selection:
EventID: 15
Image|endswith: '\regedit.exe'
condition: selection
fields:

View File

@ -12,10 +12,9 @@ tags:
- attack.t1189
logsource:
product: windows
service: sysmon
category: dns_query
detection:
dns_answer:
EventID: 22
QueryName: '*'
QueryStatus: '0'
filter_int_ip:

View File

@ -12,10 +12,9 @@ references:
- https://threathunterplaybook.com/evals/apt29/detections/4.B.4_83D62033-105A-4A02-8B75-DAB52D8D51EC.html
logsource:
product: windows
service: sysmon
category: file_delete
detection:
selection:
EventID: 23
TargetFilename|endswith:
- '.AAA'
- '.ZZZ'

View File

@ -12,10 +12,9 @@ references:
- https://threathunterplaybook.com/evals/apt29/detections/5.B.1_611FCA99-97D0-4873-9E51-1C1BA2DBB40D.html
logsource:
product: windows
service: sysmon
category: file_event
detection:
selection:
EventID: 11
TargetFilename|contains: 'ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp'
condition: selection
falsepositives:

View File

@ -12,10 +12,9 @@ references:
- https://threathunterplaybook.com/evals/apt29/detections/6.B.1_6392C9F1-D975-4F75-8A70-433DEDD7F622.html
logsource:
product: windows
service: sysmon
category: file_event
detection:
selection:
EventID: 11
TargetFilename|endswith: '.pfx'
condition: selection
falsepositives:

View File

@ -12,7 +12,7 @@ references:
- https://threathunterplaybook.com/evals/apt29/detections/7.A.1_3B4E5808-3C71-406A-B181-17B0CE3178C9.html
logsource:
product: windows
service: image_load
category: image_load
detection:
selection:
ImageLoaded|endswith: '\System.Drawing.ni.dll'

View File

@ -11,7 +11,7 @@ tags:
- attack.t1112
logsource:
product: windows
service: sysmon
category: registry_event
detection:
selection:
EventID:

View File

@ -37,9 +37,8 @@ detection:
---
logsource:
product: windows
service: sysmon
category: registry_event
detection:
mod_reg:
EventID: 13
TargetObject|endswith:
- '\CurrentControlSet\Services\wercplsupport\Parameters\ServiceDll'

View File

@ -11,7 +11,7 @@ tags:
date: 2020/06/09
logsource:
product: windows
service: sysmon
category: registry_event
detection:
selection:
EventID:

View File

@ -11,15 +11,13 @@ author: NVISO
date: 2020/06/09
logsource:
product: windows
service: sysmon
category: file_event
detection:
filecreate:
EventID: 11
selection:
TargetFilename|endswith:
- '\AppData\Local\Microsoft\Cache134.dat'
- '\AppData\Local\Microsoft\ExplorerSync.db'
condition: filecreate and selection
condition: selection
falsepositives:
- Unknown
level: high
level: high

View File

@ -12,10 +12,9 @@ author: megan201296
date: 2019/02/13
logsource:
product: windows
service: sysmon
category: registry_event
detection:
selection:
EventID: 13
TargetObject|contains: '\Software\AppDataLow\Software\Microsoft\'
condition: selection
falsepositives:

View File

@ -13,10 +13,9 @@ tags:
- attack.t1059.001
logsource:
product: windows
service: sysmon
category: pipe_created
detection:
selection:
EventID: 17
PipeName|startswith: '\PSHost'
filter:
Image|endswith:

View File

@ -10,13 +10,10 @@ tags:
author: Markus Neis
logsource:
product: windows
service: sysmon
category: pipe_created
definition: 'Note that you have to configure logging for PipeEvents in Symson config'
detection:
selection:
EventID:
- 17
- 18
PipeName:
- '\atctl' # https://www.virustotal.com/#/file/a4ddb2664a6c87a1d3c5da5a5a32a5df9a0b0c8f2e951811bd1ec1d44d42ccf1/detection
- '\userpipe' # ruag apt case

View File

@ -15,10 +15,9 @@ tags:
- attack.t1003.005
logsource:
product: windows
service: sysmon
category: pipe_created
detection:
selection:
EventID: 17
PipeName|contains:
- '\lsadump'
- '\cachedump'

View File

@ -8,13 +8,10 @@ date: 2017/11/06
author: Florian Roth
logsource:
product: windows
service: sysmon
definition: 'Note that you have to configure logging for PipeEvents in Symson config'
category: pipe_created
definition: 'Note that you have to configure logging for PipeEvents in Sysmon config'
detection:
selection:
EventID:
- 17
- 18
PipeName:
- '\isapi_http' # Uroburos Malware Named Pipe
- '\isapi_dg' # Uroburos Malware Named Pipe

View File

@ -11,10 +11,9 @@ references:
- https://threathunterplaybook.com/notebooks/windows/02_execution/WIN-190410151110.html
logsource:
product: windows
service: sysmon
category: pipe_created
detection:
selection:
EventID: 17
PipeName|startswith: '\PSHost'
condition: selection
falsepositives:

View File

@ -11,13 +11,10 @@ tags:
- attack.t1021.002
logsource:
product: windows
service: sysmon
category: pipe_created
definition: 'Note that you have to configure logging for PipeEvents in Symson config'
detection:
selection:
EventID:
- 17
- 18
PipeName|startswith:
- 'psexec'
- 'paexec'

View File

@ -11,12 +11,10 @@ tags:
- attack.t1059.001
logsource:
product: windows
service: sysmon
category: create_remote_thread
definition: 'Note that you have to configure logging for CreateRemoteThread in Symson config'
detection:
selection:
EventID:
- 8
SourceImage|endswith: '\powershell.exe'
condition: selection
falsepositives:

View File

@ -9,10 +9,8 @@ date: 2019/10/24
modified: 2020/08/24
logsource:
product: windows
service: sysmon
category: file_event
detection:
event:
EventID: 11
target1:
TargetFilename|contains|all:
- '\My Documents\PowerShell\'
@ -21,7 +19,7 @@ detection:
TargetFilename|contains|all:
- 'C:\Windows\System32\WindowsPowerShell\v1.0\'
- '\profile.ps1'
condition: event and (target1 or target2)
condition: target1 or target2
falsepositives:
- System administrator create Powershell profile manually
level: high

View File

@ -28,9 +28,8 @@ detection:
# Sysmon: File Creation (ID 11)
logsource:
product: windows
service: sysmon
category: file_event
detection:
selection2:
EventID: 11
TargetFilename|contains:
- 'ds7002.lnk'

View File

@ -26,7 +26,7 @@ detection:
---
logsource:
product: windows
service: sysmon
category: file_event
detection:
selection:
EventID: 11

View File

@ -23,8 +23,5 @@ logsource:
product: windows
---
logsource:
category: image_load
product: windows
service: sysmon
detection:
selection:
EventID: 7

View File

@ -10,10 +10,8 @@ tags:
- attack.t1006
logsource:
product: windows
service: sysmon
category: raw_access_thread
detection:
selection:
EventID: 9
filter_1:
Device|contains: floppy
filter_2:
@ -32,7 +30,7 @@ detection:
- '\dfsrs.exe'
- '\vds.exe'
- '\lsass.exe'
condition: selection and not filter_1 and not filter_2
condition: not filter_1 and not filter_2
fields:
- ComputerName
- Image

View File

@ -12,10 +12,9 @@ references:
- https://threathunterplaybook.com/evals/apt29/detections/1.A.1_DFD6A782-9BDB-4550-AB6B-525E825B095E.html
logsource:
product: windows
service: sysmon
category: registry_event
detection:
selection:
EventID: 13
TargetObject|contains: '\AppCompatFlags\Compatibility Assistant\Store\'
condition: selection
falsepositives:

View File

@ -15,10 +15,9 @@ references:
- https://docs.microsoft.com/en-us/windows/win32/shell/shell-and-managed-code
logsource:
product: windows
service: sysmon
category: registry_event
detection:
selection:
EventID: 12
EventType: 'DeleteKey'
TargetObject|endswith: '\shell\open\command'
condition: selection

View File

@ -10,7 +10,7 @@ author: Tom Ueltschi (@c_APT_ure)
date: 2019/01/12
logsource:
product: windows
service: sysmon
category: wmi_event
detection:
selector:
EventID:

View File

@ -13,7 +13,7 @@ tags:
- attack.t1059.005
logsource:
product: windows
service: sysmon
category: wmi_event
detection:
selection:
EventID: 20

View File

@ -17,11 +17,59 @@ logsources:
rewrite:
product: windows
service: sysmon
dns_query:
category: dns_query
process_terminated:
category: process_termination
product: windows
conditions:
EventID: 22
EventID: 5
rewrite:
product: windows
service: sysmon
driver_loaded:
category: driver_load
product: windows
conditions:
EventID: 6
rewrite:
product: windows
service: sysmon
image_loaded:
category: image_load
product: windows
conditions:
EventID: 7
rewrite:
product: windows
service: sysmon
create_remote_thread:
category: create_remote_thread
product: windows
conditions:
EventID: 8
rewrite:
product: windows
service: sysmon
raw_access_thread:
category: raw_access_thread
product: windows
conditions:
EventID: 9
rewrite:
product: windows
service: sysmon
process_access:
category: process_access
product: windows
conditions:
EventID: 10
rewrite:
product: windows
service: sysmon
file_creation:
category: file_event
product: windows
conditions:
EventID: 11
rewrite:
product: windows
service: sysmon
@ -36,44 +84,48 @@ logsources:
rewrite:
product: windows
service: sysmon
file_creation:
category: file_event
create_stream_hash:
category: create_stream_hash
product: windows
conditions:
EventID: 11
EventID: 15
rewrite:
product: windows
service: sysmon
process_access:
category: process_access
pipe_created:
category: pipe_created
product: windows
conditions:
EventID: 10
EventID:
- 17
- 18
rewrite:
product: windows
service: sysmon
image_loaded:
category: image_load
wmi_event:
category: wmi_event
product: windows
conditions:
EventID: 7
EventID:
- 19
- 20
- 21
rewrite:
product: windows
service: sysmon
driver_loaded:
category: driver_load
dns_query:
category: dns_query
product: windows
conditions:
EventID: 6
EventID: 22
rewrite:
product: windows
service: sysmon
process_terminated:
category: process_termination
file_delete:
category: file_delete
product: windows
conditions:
EventID: 5
EventID: 23
rewrite:
product: windows
service: sysmon
service: sysmon