@@ -18,7 +18,7 @@ configuration: https://github.com/SwiftOnSecurity/sysmon-config
18
18
supported_TA :
19
19
- name : Splunk Add-on for Sysmon
20
20
url : https://splunkbase.splunk.com/app/5709
21
- version : 4.0.2
21
+ version : 4.0.3
22
22
fields :
23
23
- _time
24
24
- Channel
@@ -118,26 +118,26 @@ fields:
118
118
- user_id
119
119
- vendor_product
120
120
output_fields :
121
- - action
122
- - dest
123
- - original_file_name
124
- - parent_process
125
- - parent_process_exec
126
- - parent_process_guid
127
- - parent_process_id
128
- - parent_process_name
129
- - parent_process_path
130
- - process
131
- - process_exec
132
- - process_guid
133
- - process_hash
134
- - process_id
135
- - process_integrity_level
136
- - process_name
137
- - process_path
138
- - user
139
- - user_id
140
- - vendor_product
121
+ - action
122
+ - dest
123
+ - original_file_name
124
+ - parent_process
125
+ - parent_process_exec
126
+ - parent_process_guid
127
+ - parent_process_id
128
+ - parent_process_name
129
+ - parent_process_path
130
+ - process
131
+ - process_exec
132
+ - process_guid
133
+ - process_hash
134
+ - process_id
135
+ - process_integrity_level
136
+ - process_name
137
+ - process_path
138
+ - user
139
+ - user_id
140
+ - vendor_product
141
141
field_mappings :
142
142
- data_model : cim
143
143
data_set : Endpoint.Processes
@@ -178,22 +178,23 @@ convert_to_log_source:
178
178
User : UserSid
179
179
ParentProcessId : ParentProcessId
180
180
ParentImage : ParentBaseFileName
181
- example_log : <Event xmlns='http://schemas.microsoft.com/win/2004/08/events/event'><System><Provider
182
- Name='Microsoft-Windows-Sysmon' Guid='{5770385F-C22A-43E0-BF4C-06F5698FFBD9}'/><EventID>1</EventID><Version>5</Version><Level>4</Level><Task>1</Task><Opcode>0</Opcode><Keywords>0x8000000000000000</Keywords><TimeCreated
183
- SystemTime='2020-10-08T11:03:46.617920300Z'/><EventRecordID>4522</EventRecordID><Correlation/><Execution
184
- ProcessID='2912' ThreadID='3424'/><Channel>Microsoft-Windows-Sysmon/Operational</Channel><Computer>win-dc-6764986.attackrange.local</Computer><Security
185
- UserID='S-1-5-18'/></System><EventData><Data Name='RuleName'>-</Data><Data Name='UtcTime'>2020-10-08
186
- 11:03:46.615</Data><Data Name='ProcessGuid'>{96128EA2-F212-5F7E-E400-000000007F01}</Data><Data
187
- Name='ProcessId'>2296</Data><Data Name='Image'>C:\Windows\System32\cmd.exe</Data><Data
188
- Name='FileVersion'>10.0.14393.0 (rs1_release.160715-1616)</Data><Data Name='Description'>Windows
189
- Command Processor</Data><Data Name='Product'>Microsoft® Windows® Operating System</Data><Data
190
- Name='Company'>Microsoft Corporation</Data><Data Name='OriginalFileName'>Cmd.Exe</Data><Data
191
- Name='CommandLine'>"C:\Windows\system32\cmd.exe" /c "reg save HKLM\sam %%temp%%\sam
192
- & reg save HKLM\system %%temp%%\system & reg save HKLM\security %%temp%%\security"
193
- </Data><Data Name='CurrentDirectory'>C:\Users\ADMINI~1\AppData\Local\Temp\</Data><Data
194
- Name='User'>ATTACKRANGE\Administrator</Data><Data Name='LogonGuid'>{96128EA2-F210-5F7E-ACD4-080000000000}</Data><Data
195
- Name='LogonId'>0x8d4ac</Data><Data Name='TerminalSessionId'>0</Data><Data Name='IntegrityLevel'>High</Data><Data
196
- Name='Hashes'>MD5=F4F684066175B77E0C3A000549D2922C,SHA256=935C1861DF1F4018D698E8B65ABFA02D7E9037D8F68CA3C2065B6CA165D44AD2,IMPHASH=3062ED732D4B25D1C64F084DAC97D37A</Data><Data
197
- Name='ParentProcessGuid'>{96128EA2-F211-5F7E-DF00-000000007F01}</Data><Data Name='ParentProcessId'>4624</Data><Data
198
- Name='ParentImage'>C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe</Data><Data
199
- Name='ParentCommandLine'>"powershell.exe" -noninteractive -encodedcommand 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</Data></EventData></Event>
181
+ example_log : " <Event xmlns='http://schemas.microsoft.com/win/2004/08/events/event'><System><Provider\
182
+ \ Name='Microsoft-Windows-Sysmon' Guid='{5770385F-C22A-43E0-BF4C-06F5698FFBD9}'/><EventID>1</EventID><Version>5</Version><Level>4</Level><Task>1</Task><Opcode>0</Opcode><Keywords>0x8000000000000000</Keywords><TimeCreated\
183
+ \ SystemTime='2020-10-08T11:03:46.617920300Z'/><EventRecordID>4522</EventRecordID><Correlation/><Execution\
184
+ \ ProcessID='2912' ThreadID='3424'/><Channel>Microsoft-Windows-Sysmon/Operational</Channel><Computer>win-dc-6764986.attackrange.local</Computer><Security\
185
+ \ UserID='S-1-5-18'/></System><EventData><Data Name='RuleName'>-</Data><Data Name='UtcTime'>2020-10-08\
186
+ \ 11:03:46.615</Data><Data Name='ProcessGuid'>{96128EA2-F212-5F7E-E400-000000007F01}</Data><Data\
187
+ \ Name='ProcessId'>2296</Data><Data Name='Image'>C:\\ Windows\\ System32\\ cmd.exe</Data><Data\
188
+ \ Name='FileVersion'>10.0.14393.0 (rs1_release.160715-1616)</Data><Data Name='Description'>Windows\
189
+ \ Command Processor</Data><Data Name='Product'>Microsoft\xAE Windows\xAE Operating\
190
+ \ System</Data><Data Name='Company'>Microsoft Corporation</Data><Data Name='OriginalFileName'>Cmd.Exe</Data><Data\
191
+ \ Name='CommandLine'>\" C:\\ Windows\\ system32\\ cmd.exe\" /c \" reg save HKLM\\ sam\
192
+ \ %%temp%%\\ sam & reg save HKLM\\ system %%temp%%\\ system & reg save HKLM\\ \
193
+ security %%temp%%\\ security\" </Data><Data Name='CurrentDirectory'>C:\\ Users\\ ADMINI~1\\ \
194
+ AppData\\ Local\\ Temp\\ </Data><Data Name='User'>ATTACKRANGE\\ Administrator</Data><Data\
195
+ \ Name='LogonGuid'>{96128EA2-F210-5F7E-ACD4-080000000000}</Data><Data Name='LogonId'>0x8d4ac</Data><Data\
196
+ \ Name='TerminalSessionId'>0</Data><Data Name='IntegrityLevel'>High</Data><Data\
197
+ \ Name='Hashes'>MD5=F4F684066175B77E0C3A000549D2922C,SHA256=935C1861DF1F4018D698E8B65ABFA02D7E9037D8F68CA3C2065B6CA165D44AD2,IMPHASH=3062ED732D4B25D1C64F084DAC97D37A</Data><Data\
198
+ \ Name='ParentProcessGuid'>{96128EA2-F211-5F7E-DF00-000000007F01}</Data><Data Name='ParentProcessId'>4624</Data><Data\
199
+ \ Name='ParentImage'>C:\\ Windows\\ System32\\ WindowsPowerShell\\ v1.0\\ powershell.exe</Data><Data\
200
+ \ Name='ParentCommandLine'>\" powershell.exe\" -noninteractive -encodedcommand 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</Data></EventData></Event>"
0 commit comments