Files
blue-team-tools/tools/config/generic/sysmon.yml
T

191 lines
4.5 KiB
YAML
Raw Normal View History

2020-06-24 17:49:42 +02:00
title: Conversion of Generic Rules into Sysmon Specific Rules
2019-04-23 00:54:10 +02:00
order: 10
logsources:
process_creation:
category: process_creation
product: windows
conditions:
EventID: 1
rewrite:
2018-09-12 23:31:51 +02:00
product: windows
service: sysmon
2021-10-15 14:46:13 +02:00
process_creation_linux:
category: process_creation
product: linux
conditions:
EventID: 1
rewrite:
product: linux
service: sysmon
2021-06-09 12:52:38 +02:00
file_change:
category: file_change
product: windows
conditions:
EventID: 2
rewrite:
product: windows
service: sysmon
network_connection:
category: network_connection
product: windows
conditions:
2020-07-05 23:29:51 +02:00
EventID: 3
rewrite:
product: windows
service: sysmon
2021-10-16 14:22:48 +02:00
network_connectio_linux:
category: network_connection
product: linux
conditions:
EventID: 3
rewrite:
product: linux
service: sysmon
2021-06-09 12:52:38 +02:00
sysmon_status:
category: sysmon_status
product: windows
conditions:
EventID:
- 4
- 16
rewrite:
product: windows
service: sysmon
2020-09-30 20:44:14 +02:00
process_terminated:
category: process_termination
2020-07-05 23:29:51 +02:00
product: windows
conditions:
2020-09-30 20:44:14 +02:00
EventID: 5
rewrite:
product: windows
service: sysmon
2020-09-30 20:44:14 +02:00
driver_loaded:
category: driver_load
product: windows
conditions:
2020-09-30 20:44:14 +02:00
EventID: 6
rewrite:
product: windows
service: sysmon
2020-09-30 20:44:14 +02:00
image_loaded:
category: image_load
product: windows
conditions:
2020-09-30 20:44:14 +02:00
EventID: 7
rewrite:
product: windows
service: sysmon
create_remote_thread:
category: create_remote_thread
product: windows
conditions:
EventID: 8
rewrite:
product: windows
service: sysmon
raw_access_thread:
category: raw_access_thread
product: windows
conditions:
EventID: 9
rewrite:
product: windows
service: sysmon
process_access:
category: process_access
product: windows
conditions:
EventID: 10
2020-09-30 20:44:14 +02:00
rewrite:
product: windows
service: sysmon
file_creation:
category: file_event
product: windows
conditions:
EventID: 11
rewrite:
product: windows
service: sysmon
2020-09-30 20:44:14 +02:00
registry_event:
category: registry_event
product: windows
conditions:
2020-09-30 20:44:14 +02:00
EventID:
- 12
- 13
- 14
rewrite:
product: windows
service: sysmon
2020-09-30 20:44:14 +02:00
create_stream_hash:
category: create_stream_hash
product: windows
conditions:
2020-09-30 20:44:14 +02:00
EventID: 15
rewrite:
product: windows
service: sysmon
2020-09-30 20:44:14 +02:00
pipe_created:
category: pipe_created
product: windows
conditions:
2020-09-30 20:44:14 +02:00
EventID:
- 17
- 18
rewrite:
product: windows
service: sysmon
wmi_event:
category: wmi_event
product: windows
conditions:
EventID:
- 19
- 20
- 21
rewrite:
product: windows
service: sysmon
2020-09-30 20:44:14 +02:00
dns_query:
category: dns_query
product: windows
conditions:
EventID: 22
rewrite:
product: windows
service: sysmon
file_delete:
category: file_delete
product: windows
conditions:
2021-09-29 08:53:22 +02:00
EventID:
- 23
- 26
2020-09-30 20:44:14 +02:00
rewrite:
product: windows
2021-06-09 12:52:38 +02:00
service: sysmon
clipboard_capture:
category: clipboard_capture
product: windows
conditions:
EventID: 24
rewrite:
product: windows
service: sysmon
process_tampering:
category: process_tampering
product: windows
conditions:
EventID: 25
rewrite:
product: windows
service: sysmon
sysmon_error:
category: sysmon_error
product: windows
conditions:
2021-08-05 10:54:58 +02:00
EventID: 255
rewrite:
product: windows
service: sysmon