Skip to content

Commit

Permalink
Merge pull request #238 from reece394/master
Browse files Browse the repository at this point in the history
Sysmon 28 and 29 Maps
  • Loading branch information
AndrewRathbun authored Jun 9, 2024
2 parents 477d469 + 50ce996 commit 7729897
Show file tree
Hide file tree
Showing 2 changed files with 178 additions and 0 deletions.
Original file line number Diff line number Diff line change
@@ -0,0 +1,93 @@
Author: Gabriele Zambelli @gazambelli, Reece394
Description: FileBlockShredding (A file was blocked from being deleted)
EventId: 28
Channel: Microsoft-Windows-Sysmon/Operational
Provider: Microsoft-Windows-Sysmon
Maps:
-
Property: ExecutableInfo
PropertyValue: "%Image%"
Values:
-
Name: Image
Value: "/Event/EventData/Data[@Name=\"Image\"]"
-
Property: PayloadData1
PropertyValue: "ProcessID: %ProcessID%, ProcessGUID: %ProcessGUID%"
Values:
-
Name: ProcessGUID
Value: "/Event/EventData/Data[@Name=\"ProcessGuid\"]"
-
Name: ProcessID
Value: "/Event/EventData/Data[@Name=\"ProcessId\"]"
-
Property: PayloadData2
PropertyValue: "RuleName: %RuleName%"
Values:
-
Name: RuleName
Value: "/Event/EventData/Data[@Name=\"RuleName\"]"
-
Property: PayloadData3
PropertyValue: "%Hashes%"
Values:
-
Name: Hashes
Value: "/Event/EventData/Data[@Name=\"Hashes\"]"
-
Property: PayloadData4
PropertyValue: "TargetFilename: %TargetFilename%"
Values:
-
Name: TargetFilename
Value: "/Event/EventData/Data[@Name=\"TargetFilename\"]"
-
Property: PayloadData5
PropertyValue: "IsExecutable: %IsExecutable%"
Values:
-
Name: IsExecutable
Value: "/Event/EventData/Data[@Name=\"IsExecutable\"]"
-
Property: UserName
PropertyValue: "%User%"
Values:
-
Name: User
Value: "/Event/EventData/Data[@Name=\"User\"]"

# Documentation:
# https://docs.microsoft.com/en-us/sysinternals/downloads/sysmon#event-filtering-entries
# https://www.blackhillsinfosec.com/a-sysmon-event-id-breakdown/
#
# Example Event Data:
# <Event>
# <System>
# <Provider Name="Microsoft-Windows-Sysmon" Guid="5770385f-c22a-43e0-bf4c-06f5698ffbd9" />
# <EventID>28</EventID>
# <Version>5</Version>
# <Level>4</Level>
# <Task>28</Task>
# <Opcode>0</Opcode>
# <Keywords>0x8000000000000000</Keywords>
# <TimeCreated SystemTime="2024-06-09 19:59:34.9102488" />
# <EventRecordID>80</EventRecordID>
# <Correlation />
# <Execution ProcessID="3480" ThreadID="5516" />
# <Channel>Microsoft-Windows-Sysmon/Operational</Channel>
# <Computer>COMP-RENAME</Computer>
# <Security UserID="S-1-5-18" />
# </System>
# <EventData>
# <Data Name="RuleName">-</Data>
# <Data Name="UtcTime">2024-06-09 19:59:34.909</Data>
# <Data Name="ProcessGuid">cb130dc6-09a5-6666-b501-000000000c00</Data>
# <Data Name="ProcessId">3612</Data>
# <Data Name="User">COMP-RENAME\User</Data>
# <Data Name="Image">C:\Sdelete\sdelete64a.exe</Data>
# <Data Name="TargetFilename">C:\Users\User\Downloads\sysmonconfig-with-filedelete.xml</Data>
# <Data Name="Hashes">SHA1=5BA4E6B52FFA9B6996EAEBE00DD4B8A278F4AD72,MD5=67EC79C027A3DD15FC23B321A574331B,SHA256=6540E868F05795C7F17A7C89BBDE7435D75BBF90B2ECA0D301EE31FCC517CA23,IMPHASH=00000000000000000000000000000000</Data>
# <Data Name="IsExecutable">False</Data>
# </EventData>
# </Event>
Original file line number Diff line number Diff line change
@@ -0,0 +1,85 @@
Author: Gabriele Zambelli @gazambelli, Reece394
Description: FileExecutableDetected (An executable file was created)
EventId: 29
Channel: Microsoft-Windows-Sysmon/Operational
Provider: Microsoft-Windows-Sysmon
Maps:
-
Property: ExecutableInfo
PropertyValue: "%Image%"
Values:
-
Name: Image
Value: "/Event/EventData/Data[@Name=\"Image\"]"
-
Property: PayloadData1
PropertyValue: "ProcessID: %ProcessID%, ProcessGUID: %ProcessGUID%"
Values:
-
Name: ProcessGUID
Value: "/Event/EventData/Data[@Name=\"ProcessGuid\"]"
-
Name: ProcessID
Value: "/Event/EventData/Data[@Name=\"ProcessId\"]"
-
Property: PayloadData2
PropertyValue: "RuleName: %RuleName%"
Values:
-
Name: RuleName
Value: "/Event/EventData/Data[@Name=\"RuleName\"]"
-
Property: PayloadData3
PropertyValue: "%Hashes%"
Values:
-
Name: Hashes
Value: "/Event/EventData/Data[@Name=\"Hashes\"]"
-
Property: PayloadData4
PropertyValue: "TargetFilename: %TargetFilename%"
Values:
-
Name: TargetFilename
Value: "/Event/EventData/Data[@Name=\"TargetFilename\"]"
-
Property: UserName
PropertyValue: "%User%"
Values:
-
Name: User
Value: "/Event/EventData/Data[@Name=\"User\"]"

# Documentation:
# https://docs.microsoft.com/en-us/sysinternals/downloads/sysmon#event-filtering-entries
# https://www.blackhillsinfosec.com/a-sysmon-event-id-breakdown/
#
# Example Event Data:
# <Event>
# <System>
# <Provider Name="Microsoft-Windows-Sysmon" Guid="5770385f-c22a-43e0-bf4c-06f5698ffbd9" />
# <EventID>29</EventID>
# <Version>5</Version>
# <Level>4</Level>
# <Task>29</Task>
# <Opcode>0</Opcode>
# <Keywords>0x8000000000000000</Keywords>
# <TimeCreated SystemTime="2024-06-09 20:06:54.8816479" />
# <EventRecordID>207</EventRecordID>
# <Correlation />
# <Execution ProcessID="3480" ThreadID="5516" />
# <Channel>Microsoft-Windows-Sysmon/Operational</Channel>
# <Computer>COMP-RENAME</Computer>
# <Security UserID="S-1-5-18" />
# </System>
# <EventData>
# <Data Name="RuleName">-</Data>
# <Data Name="UtcTime">2024-06-09 20:06:54.873</Data>
# <Data Name="ProcessGuid">cb130dc6-0280-6666-9900-000000000c00</Data>
# <Data Name="ProcessId">6152</Data>
# <Data Name="User">COMP-RENAME\User</Data>
# <Data Name="Image">C:\Program Files (x86)\VMware\VMware Tools\vmtoolsd.exe</Data>
# <Data Name="TargetFilename">C:\Users\User\AppData\Local\Temp\vmware-User\VMwareDnD\13ca370c\7z2406-arm64.exe</Data>
# <Data Name="Hashes">SHA1=95C4B6D4F484A5F176015C5145E450BBCDB99638,MD5=78453556058A0421D6F4C77C353C3559,SHA256=43AC4903AC5BA7219C665637E71917C6A2C2F8E515344E1EE04C263B8F5C934D,IMPHASH=C3ED9FDA23EC13D6EF6214BC963B0FB3</Data>
# </EventData>
# </Event>

0 comments on commit 7729897

Please sign in to comment.