|
1 | 1 | <!--
|
2 | 2 | sysmon-config | A sysmon configuration focused on default high-quality event tracing and easy customization by the community
|
3 |
| - Master version: 50 | Date: 2017-03-02 |
4 |
| - Master author: @SwiftOnSecurity, with contributors also credited in-line or on Git. |
| 3 | + Master version: 51 | Date: 2017-03-14 |
| 4 | + Master author: @SwiftOnSecurity, other contributors also credited in-line or on Git. |
5 | 5 | Master project: https://github.com/SwiftOnSecurity/sysmon-config
|
6 | 6 | Master license: Creative Commons Attribution 4.0 | You may privatize, fork, edit, teach, publish, or deploy for commercial use - with attribution in the text.
|
7 | 7 |
|
|
186 | 186 | <Image condition="image">sc.exe</Image> <!--Microsoft:Windows: Remotely change Windows service settings from command line | Credit @ion-storm -->
|
187 | 187 | <Image condition="image">wmic.exe</Image> <!--Microsoft:WindowsManagementInstrumentation: Credit @Cyb3rOps [ https://gist.github.com/Neo23x0/a4b4af9481e01e749409 ] -->
|
188 | 188 | <Image condition="image">wscript.exe</Image> <!--Microsoft:WindowsScriptingHost: | Credit @arekfurt -->
|
189 |
| - <Image condition="image">powershell.exe</Image> <!--Microsoft:WindowsPowerShell: | Credit @Cyb3rOps --> |
| 189 | + <Image condition="image">tor.exe</Image> <!--Tor [ https://www.hybrid-analysis.com/sample/800bf028a23440134fc834efc5c1e02cc70f05b2e800bbc285d7c92a4b126b1c?environmentId=100 ] --> |
190 | 190 | <!--Ports: Suspicious-->
|
191 | 191 | <DestinationPort condition="is">22</DestinationPort> <!--SSH protocol-->
|
192 | 192 | <DestinationPort condition="is">23</DestinationPort> <!--Telnet protocol-->
|
193 |
| - <DestinationPort condition="is">25</DestinationPort> <!--SMTP email--> |
| 193 | + <DestinationPort condition="is">25</DestinationPort> <!--SMTP mail protocol--> |
194 | 194 | <DestinationPort condition="is">3389</DestinationPort> <!--Microsoft:Windows:RDP-->
|
195 | 195 | <DestinationPort condition="is">5800</DestinationPort> <!--VNC protocol-->
|
196 | 196 | <DestinationPort condition="is">5900</DestinationPort> <!--VNC protocol-->
|
197 | 197 | <!--Ports: Proxy-->
|
198 | 198 | <DestinationPort condition="is">1080</DestinationPort> <!--Socks proxy port | Credit @ion-storm-->
|
199 |
| - <DestinationPort condition="is">8080</DestinationPort> <!--Socks proxy port | Credit @ion-storm--> |
200 | 199 | <DestinationPort condition="is">3128</DestinationPort> <!--Socks proyx port | Credit @ion-storm-->
|
| 200 | + <DestinationPort condition="is">8080</DestinationPort> <!--Socks proxy port | Credit @ion-storm--> |
201 | 201 | <!--Ports: Tor-->
|
202 | 202 | <DestinationPort condition="is">1723</DestinationPort> <!--Tor protocol | Credit @ion-storm-->
|
203 | 203 | <DestinationPort condition="is">4500</DestinationPort> <!--Tor protocol | Credit @ion-storm-->
|
|
270 | 270 | <!--SYSMON EVENT ID 10 : INTER-PROCESS ACCESS-->
|
271 | 271 | <!--DATA: UtcTime, SourceProcessGuid, SourceProcessId, SourceThreadId, SourceImage, TargetProcessGuid, TargetProcessId, TargetImage, GrantedAccess, CallTrace-->
|
272 | 272 | <ProcessAccess onmatch="include">
|
273 |
| - <!--COMMENT: Monitor for processes accessing other process' memory. This can be valuable, but can cause massive event glut. |
274 |
| - Disabled by default since including even one entry here activates this component. Reward/performance decision. |
275 |
| - Encourage you to experiment with this feature yourself.--> |
276 |
| - <!--FUTURE WORK: Include mimikatz-specific events.--> |
| 273 | + <!--COMMENT: Monitor for processes accessing other process' memory. This can be valuable, but can cause a huge number of events.--> |
277 | 274 | </ProcessAccess>
|
278 | 275 |
|
279 | 276 | <!--SYSMON EVENT ID 11 : FILE CREATED-->
|
|
333 | 330 | <!--NOTE: "contains" works by finding the first letter, then matching the second, etc, so the first letters should be as low-occurance as possible.-->
|
334 | 331 | <!--NOTE: Windows writes hundreds or thousands of registry keys a minute, so just because you're not changing stuff, doesn't mean these rules aren't being run.-->
|
335 | 332 | <!--NOTE: You don't have to spend a lot of time worrying about this, CPUs are fast, but it's something to consider. Every rule and condition type has a cost.-->
|
336 |
| - |
337 | 333 | <!--DATA: EventType, UtcTime, ProcessGuid, ProcessId, Image, TargetObject, Details, NewName-->
|
338 | 334 | <!--TECHNICAL: Possible prefixes are HKLM, HKCR, and HKEY_USERS-->
|
339 | 335 | <!--CRITICAL: Schema version 3.30 and higher use HKLM and HKEY_USERS and HKCR and CurrentControlSet instead of REGISTRY\MACHINE\ and \REGISTRY\USER\ and ControlSet001-->
|
|
417 | 413 | <TargetObject condition="begin with">HKLM\SOFTWARE\Microsoft\Security Center\UpdatesDisableNotify</TargetObject>
|
418 | 414 | <!--Windows Defender tampering | Credit @ion-storm -->
|
419 | 415 | <TargetObject condition="begin with">HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\DisableAntiSpyware</TargetObject>
|
| 416 | + <TargetObject condition="begin with">HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\DisableAntiVirus</TargetObject> |
420 | 417 | <TargetObject condition="begin with">HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring</TargetObject>
|
421 | 418 | <TargetObject condition="begin with">HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection</TargetObject>
|
422 | 419 | <TargetObject condition="begin with">HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable</TargetObject>
|
|
0 commit comments