Changed category names and remove sysmon log source

This commit is contained in:
Florian Roth
2020-06-24 17:41:21 +02:00
parent e5f36dd146
commit f3fedef8f5
77 changed files with 31 additions and 107 deletions
@@ -7,9 +7,8 @@ tags:
- attack.persistence
- attack.t1050
logsource:
category: driver_loaded
category: driver_load
product: windows
service: sysmon
detection:
selection:
ImageLoaded: '*\Temp\\*'
@@ -10,9 +10,8 @@ tags:
- attack.defense_evasion
- attack.t1036
logsource:
category: file_creation
category: file_event
product: windows
service: sysmon
detection:
selection:
Image:
@@ -10,9 +10,8 @@ tags:
- attack.credential_access
- attack.t1003
logsource:
category: file_creation
category: file_event
product: windows
service: sysmon
detection:
selection:
TargetFilename|contains:
@@ -10,9 +10,8 @@ tags:
author: Markus Neis
date: 2018/07/24
logsource:
category: file_creation
category: file_event
product: windows
service: sysmon
detection:
selection:
TargetFilename: '*\Temp\debug.bin'
@@ -11,9 +11,8 @@ tags:
- attack.credential_access
- attack.t1003
logsource:
category: file_creation
category: file_event
product: windows
service: sysmon
falsepositives:
- Very unlikely
level: critical
@@ -10,9 +10,8 @@ tags:
- attack.credential_access
- attack.t1003
logsource:
category: file_creation
category: file_event
product: windows
service: sysmon
detection:
selection:
TargetFilename|contains: 'lsass'
@@ -10,9 +10,8 @@ tags:
author: Markus Neis
date: 2018/04/07
logsource:
category: file_creation
category: file_event
product: windows
service: sysmon
detection:
selection:
TargetFilename:
@@ -11,9 +11,8 @@ tags:
- attack.t1003
level: critical
logsource:
category: file_creation
category: file_event
product: windows
service: sysmon
detection:
selection:
# Sysmon: File Creation (ID 11)
@@ -13,8 +13,7 @@ tags:
- attack.persistence
logsource:
product: windows
service: sysmon
category: file_creation
category: file_event
detection:
selection_1:
TargetFilename: '*\Local\Microsoft\Windows\SchCache\*.sch'
@@ -11,8 +11,7 @@ tags:
- attack.t1023
logsource:
product: windows
service: sysmon
category: file_creation
category: file_event
detection:
filter:
Image:
@@ -11,8 +11,7 @@ tags:
- attack.defense_evasion
logsource:
product: windows
service: sysmon
category: file_creation
category: file_event
detection:
selection_1:
TargetFilename: '*\AppData\Local\Temp\*\PROCEXP152.sys'
@@ -6,8 +6,7 @@ date: 2019/02/21
author: Samir Bousseaden
logsource:
product: windows
service: sysmon
category: file_creation
category: file_event
detection:
selection:
Image: '*\mstsc.exe'
@@ -13,8 +13,7 @@ tags:
level: critical
logsource:
product: windows
service: sysmon
category: file_creation
category: file_event
detection:
selection_2:
TargetFilename|contains: '\inetpub\wwwroot\'
@@ -11,7 +11,6 @@ tags:
- attack.persistence
logsource:
product: windows
service: sysmon
category: file_created
detection:
selection:
@@ -12,9 +12,8 @@ tags:
- attack.t1086
- attack.execution
logsource:
category: image_loaded
category: image_load
product: windows
service: sysmon
detection:
selection:
ImageLoaded|endswith:
@@ -11,9 +11,8 @@ tags:
- attack.credential_access
- car.2019-04-004
logsource:
category: image_loaded
category: image_load
product: windows
service: sysmon
date: 2017/03/13
detection:
selector:
@@ -8,9 +8,8 @@ author: Roberto Rodriguez @Cyb3rWard0g
references:
- https://github.com/hunters-forge/ThreatHunter-Playbook/blob/8869b7a58dba1cff63bae1d7ab923974b8c0539b/playbooks/WIN-190410151110.yaml
logsource:
category: image_loaded
category: image_load
product: windows
service: sysmon
tags:
- attack.execution
- attack.t1086
@@ -10,9 +10,8 @@ tags:
- attack.defense_evasion
- attack.t1073
logsource:
category: image_loaded
category: image_load
product: windows
service: sysmon
detection:
selection:
Image:
@@ -10,9 +10,8 @@ tags:
- attack.initial_access
- attack.t1193
logsource:
category: image_loaded
category: image_load
product: windows
service: sysmon
detection:
selection:
Image:
@@ -10,9 +10,8 @@ tags:
- attack.initial_access
- attack.t1193
logsource:
category: image_loaded
category: image_load
product: windows
service: sysmon
detection:
selection:
Image:
@@ -10,9 +10,8 @@ tags:
- attack.initial_access
- attack.t1193
logsource:
category: image_loaded
category: image_load
product: windows
service: sysmon
detection:
selection:
Image:
@@ -10,9 +10,8 @@ tags:
- attack.initial_access
- attack.t1193
logsource:
category: image_loaded
category: image_load
product: windows
service: sysmon
detection:
selection:
Image:
@@ -10,9 +10,8 @@ tags:
- attack.initial_access
- attack.t1193
logsource:
category: image_loaded
category: image_load
product: windows
service: sysmon
detection:
selection:
Image:
@@ -10,9 +10,8 @@ tags:
- attack.initial_access
- attack.t1193
logsource:
category: image_loaded
category: image_load
product: windows
service: sysmon
detection:
selection:
Image:
@@ -12,9 +12,8 @@ tags:
- attack.execution
- attack.t1047
logsource:
category: image_loaded
category: image_load
product: windows
service: sysmon
detection:
selection:
Image:
@@ -15,9 +15,8 @@ tags:
- attack.credential_access
- attack.t1003
logsource:
category: image_loaded
category: image_load
product: windows
service: sysmon
detection:
signedprocess:
ImageLoaded|endswith:
@@ -15,9 +15,8 @@ tags:
- attack.t1038
- attack.t1112
logsource:
category: image_loaded
category: image_load
product: windows
service: sysmon
detection:
selection:
Image:
@@ -10,9 +10,8 @@ tags:
- attack.credential_access
- attack.t1003
logsource:
category: image_loaded
category: image_load
product: windows
service: sysmon
detection:
selection:
Image|endswith: '\lsass.exe'
@@ -11,9 +11,8 @@ tags:
- attack.execution
- attack.t1047
logsource:
category: image_loaded
category: image_load
product: windows
service: sysmon
detection:
selection:
ImageLoaded|endswith:
@@ -12,7 +12,6 @@ tags:
logsource:
cqtegory: image_loaded
product: windows
service: sysmon
detection:
selection:
Image: 'C:\Windows\System32\wbem\WmiPrvSE.exe'
@@ -12,7 +12,6 @@ tags:
logsource:
category: network_connection
product: windows
service: sysmon
definition: 'Use the following config to generate the necessary Event ID 10 Process Access events: <ProcessAccess onmatch="include"><CallTrace condition="contains">VBE7.DLL</CallTrace></ProcessAccess><ProcessAccess onmatch="exclude"><CallTrace condition="excludes">UNKNOWN</CallTrace></ProcessAccess>'
detection:
selection:
@@ -12,7 +12,6 @@ author: EagleEye Team
logsource:
category: network_connection
product: windows
service: sysmon
date: 2020/05/14
detection:
selection:
@@ -13,7 +13,6 @@ tags:
logsource:
category: network_connection
product: windows
service: sysmon
detection:
selection:
Image: '*\powershell.exe'
@@ -14,7 +14,6 @@ tags:
logsource:
category: network_connection
product: windows
service: sysmon
detection:
selection:
Image: '*\svchost.exe'
@@ -12,7 +12,6 @@ tags:
logsource:
category: network_connection
product: windows
service: sysmon
detection:
selection:
DestinationPort:
@@ -13,7 +13,6 @@ tags:
logsource:
category: network_connection
product: windows
service: sysmon
detection:
selection:
Image: '*\rundll32.exe'
@@ -9,7 +9,6 @@ date: 2017/03/19
logsource:
category: network_connection
product: windows
service: sysmon
definition: 'Use the following config to generate the necessary Event ID 3 Network Connection events'
detection:
selection:
@@ -13,7 +13,6 @@ tags:
logsource:
category: network_connection
product: windows
service: sysmon
detection:
selection:
DestinationPort: 3389
@@ -13,7 +13,6 @@ tags:
logsource:
category: network_connection
product: windows
service: sysmon
detection:
selection:
DestinationPort: 88
@@ -13,7 +13,6 @@ tags:
logsource:
category: network_connection
product: windows
service: sysmon
detection:
selection:
Initiated: 'true'
@@ -13,7 +13,6 @@ tags:
logsource:
category: network_connection
product: windows
service: sysmon
detection:
selection:
Initiated: 'true'
@@ -25,7 +25,6 @@ level: high
---
logsource:
product: windows
service: sysmon
category: registry_event
detection:
# Registry Object Add
@@ -19,7 +19,6 @@ tags:
logsource:
category: process_access
product: windows
service: sysmon
detection:
selection:
TargetImage|endswith: '\lsass.exe'
@@ -16,7 +16,6 @@ tags:
logsource:
category: process_access
product: windows
service: sysmon
detection:
selection_01:
CallTrace:
@@ -13,7 +13,6 @@ tags:
logsource:
category: process_access
product: windows
service: sysmon
detection:
selection:
TargetImage: '*\windows\system32\svchost.exe'
@@ -13,7 +13,6 @@ tags:
logsource:
category: process_access
product: windows
service: sysmon
detection:
selection:
TargetImage: 'C:\windows\system32\lsass.exe'
@@ -13,7 +13,6 @@ date: 2017/03/04
logsource:
category: process_access
product: windows
service: sysmon
definition: 'Use the following config to generate the necessary Event ID 10 Process Access events: <ProcessAccess onmatch="include"><CallTrace condition="contains">VBE7.DLL</CallTrace></ProcessAccess><ProcessAccess onmatch="exclude"><CallTrace condition="excludes">UNKNOWN</CallTrace></ProcessAccess>'
detection:
selection:
@@ -9,7 +9,6 @@ date: 2019/05/20
logsource:
category: process_access
product: windows
service: sysmon
detection:
selection:
TargetImage: 'C:\windows\system32\lsass.exe'
@@ -11,7 +11,6 @@ date: 2019/04/14
logsource:
category: registry_event
product: windows
service: sysmon
detection:
selection:
TargetObject:
@@ -27,7 +27,6 @@ level: critical
logsource:
category: registry_event
product: windows
service: sysmon
detection:
selection1:
TargetObject:
@@ -13,7 +13,6 @@ author: Victor Sergeev, Daniil Yugoslavskiy, oscd.community
logsource:
category: registry_event
product: windows
service: sysmon
detection:
selection:
@@ -26,7 +26,6 @@ level: high
logsource:
category: process_creation,registry_event
product: windows
service: sysmon
detection:
# Registry Object Add
selection2:
@@ -16,7 +16,6 @@ tags:
logsource:
category: registry_event
product: windows
service: sysmon
detection:
selection:
@@ -13,7 +13,6 @@ modified: 2019/11/13
logsource:
category: registry_event
product: windows
service: sysmon
detection:
selection:
- EventID: 12 # key create
@@ -26,7 +26,6 @@ level: high
---
logsource:
product: windows
service: sysmon
category: registry_event
detection:
dnsregmod:
@@ -30,7 +30,6 @@ detection:
logsource:
category: registry_event
product: windows
service: sysmon
detection:
selection:
TargetObject|contains: Services\WCESERVICE\Start
@@ -13,7 +13,6 @@ modified: 2019/11/10
logsource:
category: registry_event
product: windows
service: sysmon
detection:
selection1:
EventType: DeleteValue
@@ -15,7 +15,6 @@ modified: 2019/11/13
logsource:
category: registry_event
product: windows
service: sysmon
detection:
selection:
- EventID:
@@ -14,7 +14,6 @@ modified: 2019/11/13
logsource:
category: registry_event
product: windows
service: sysmon
detection:
selection:
- TargetObject:
@@ -13,7 +13,6 @@ date: 2019/10/26
modified: 2019/11/11
logsource:
product: windows
service: sysmon
category: registry_event
detection:
selection:
@@ -13,7 +13,6 @@ tags:
logsource:
category: registry_event
product: windows
service: sysmon
detection:
selection:
TargetObject|endswith:
@@ -8,7 +8,6 @@ author: Samir Bousseaden
logsource:
category: registry_event
product: windows
service: sysmon
detection:
selection_reg:
TargetObject:
@@ -13,7 +13,6 @@ tags:
logsource:
category: registry_event
product: windows
service: sysmon
detection:
selection:
EventType: 'CreateKey' # don't want DeleteKey events
@@ -12,7 +12,6 @@ tags:
logsource:
category: registry_event
product: windows
service: sysmon
detection:
selection: # Detect new COM servers in the user hive
TargetObject: 'HKU\\*_Classes\CLSID\\*\InProcServer32\(Default)'
@@ -14,7 +14,6 @@ tags:
logsource:
category: registry_event
product: windows
service: sysmon
detection:
selection:
TargetObject|contains: 'TrustRecords'
@@ -13,7 +13,6 @@ date: 2019/01/18
logsource:
category: registry_event
product: windows
service: sysmon
detection:
selection_registry:
TargetObject:
@@ -22,7 +22,6 @@ level: critical
logsource:
category: registry_event
product: windows
service: sysmon
detection:
selection_registry:
TargetObject:
@@ -12,7 +12,6 @@ tags:
logsource:
category: registry_event
product: windows
service: sysmon
detection:
selection:
Image:
@@ -9,7 +9,6 @@ references:
logsource:
category: registry_event
product: windows
service: sysmon
detection:
selection:
TargetObject: '*\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run'
@@ -13,7 +13,6 @@ modified: 2020/05/24
logsource:
category: registry_event
product: windows
service: sysmon
detection:
selection:
TargetObject:
@@ -12,7 +12,6 @@ tags:
logsource:
category: registry_event
product: windows
service: sysmon
detection:
selection_1:
@@ -11,7 +11,6 @@ modified: 2019/10/15
logsource:
category: registry_event
product: windows
service: sysmon
definition: 'Requirements: Sysmon config that monitors \Keyboard Layout\Preload subkey of the HKLU hives - see https://github.com/SwiftOnSecurity/sysmon-config/pull/92/files'
detection:
selection_registry:
@@ -16,7 +16,6 @@ level: low
---
logsource:
product: windows
service: sysmon
category: registry_event
detection:
selection1:
@@ -9,7 +9,6 @@ author: Florian Roth
date: 2017/03/19
logsource:
product: windows
service: sysmon
category: registry_event
detection:
methregistry:
@@ -9,7 +9,6 @@ date: 2017/03/17
logsource:
category: registry_event
product: windows
service: sysmon
detection:
selection:
# usrclass.dat is mounted on HKU\USERSID_Classes\...
@@ -8,7 +8,6 @@ author: Karneades
logsource:
category: registry_event
product: windows
service: sysmon
detection:
selection_reg1:
TargetObject:
+3 -3
View File
@@ -29,7 +29,7 @@ logsources:
product: windows
service: sysmon
file_creation:
category: file_creation
category: file_event
product: windows
conditions:
EventID: 11
@@ -45,7 +45,7 @@ logsources:
product: windows
service: sysmon
image_loaded:
category: image_loaded
category: image_load
product: windows
conditions:
EventID: 7
@@ -53,7 +53,7 @@ logsources:
product: windows
service: sysmon
driver_loaded:
category: driver_loaded
category: driver_load
product: windows
conditions:
EventID: 6