Skip to content

Sysmon configuration file templates with advanced event tracing and blocking

Notifications You must be signed in to change notification settings

3ch035/sysmon-config

 
 

Repository files navigation

sysmon-config | A Sysmon configuration file

This is a forked and modified version of @SwiftOnSecurity's sysmon config and a modified version of Neo23x0's sysmon blocking config. This includes all pull requests, updated schema, and additional blocking rules. The sysmonconfig-export-block-loldrivers.xml builds upon Neo23x0's config by also including a curated blocking list of malicious Living Off The Land Windows drivers used by adversaries to bypass security controls and carry out attacks.

Version & Schema

The configuration files are for Sysmon 15.0 and newer. Schema version is 4.90 and the binary version is now 18.

Maintainers of this Fork

Maintainers of Neo23x0 Fork

Additional coverage includes

  • Cobalt Strike named pipes
  • Sliver Implants
  • PrinterNightmare
  • HiveNightmare

Configs in this Repository

This repo includes the original and three additional configurations

  • sysmonconfig-export.xml the "OG" config provided by @SwiftOnSecurity
  • sysmonconfig-export-block-loldrivers.xml merged with @magicsword-io LOLDrivers to block Living Off The Land Drivers (Malicious Hashes Only) using EventID 27.
  • sysmonconfig-export-block.xml the original config provided by @Neo23x0 with some additional advanced blocking rules available since Sysmon v14 (WARNING: use it with care!)
  • sysmonconfig-malicious-hashes-exe-detect.xml builds upon @Neo23x0's config by incorporating the newest features in Sysmon 15.0 and merging @magicsword-io LOLDrivers for EventID 29. This is similar to the sysmonconfig-export-block-loldrivers.xml config but does not include blocking, only detection.

Other Sysmon Configs

  • Olaf Hartong's Sysmon Modular - modular Sysmon config for easier maintenance and generation of specific configs

Testing

This configuration is focused on detection coverage and blocking rules. I need help with testing this configuration, so please reach out!

Please report:

  1. Expressions that cause a high volume of events
  2. Blocking issues or missing elements
  3. Broken configuration elements (typos, wrong conditions)
  4. Missing coverage (preferrably as a pull request)

Usage

Install

Run with administrator rights

sysmon.exe -accepteula -i sysmonconfig-export.xml

Update existing configuration

Run with administrator rights

sysmon.exe -c sysmonconfig-export.xml

Uninstall

Run with administrator rights

sysmon.exe -u

Credits

Since we wanted to be able to receive new pull requests this repository, we had to squash all open(!) pull requests of the original reposiory into a single commit on this one.

We've pull the following requests:

Registry key to detect definitions of Windows Defender Exclusions
155 opened 12 days ago by @phantinuss

Outlook Webview URL changes
154 opened on 14 Jun by @humpalum

Event id 26
153 opened on 14 Jun by @Richman711

Important and relevant NamedPipe names
151 opened on 27 May by @Neo23x0

Added named pipe used by @Cobalt Strike
150 opened on 26 May by @WojciechLesicki

Fix FileDelete example.
149 opened on 26 May by @sigalpes

Add exclusion for WUDFHost.exe to Event 11
148 opened on 19 Apr by @lord-garmadon

Corrected event name for Event ID 23
147 opened on 16 Apr by @lord-garmadon

Monitor for .js files for Microsoft JScript
146 opened on 7 Apr by @KevinDeNotariis

Added WinRM ports and Service names
145 opened on 16 Mar by @tobor88

Add ASP files for webshells
144 opened on 8 Mar by @GossiTheDog

Update NetworkConnect rule to fix Metasploit default port
143 opened on 6 Mar by @brokenvhs

Ransomware artifacts added to File Creation config
140 opened on 18 Feb by @sduff

MiniNT registry key check
130 opened on 9 Sep 2020 by @ThisIsNotTheUserYouAreLookingFor

Added detection for CVE-2017-0199 and CVE-2017-8759.
118 opened on 21 May 2020 by @d4rk-d4nph3

Printer port changes as used in CVE-2020-1048
115 opened on 15 May 2020 by @Neo23x0

Update sysmonconfig-export.xml
108 opened on 1 Mar 2020 by @harmonkc

Changed the bypassable DNS hostname checks
107 opened on 5 Feb 2020 by @MaxNad

Added most of the missing LOLBAS for downloading executables
106 opened on 5 Feb 2020 by @MaxNad

Change Metasploit Alert port from 444 to 4444
105 opened on 5 Feb 2020 by @ION28

Add exclusion for Azure MMA agent | Add exclusion for IPAM GP PS script | Add exclusion for MonitorKnowledgeDiscovery
104 opened on 29 Jan 2020 by @adrwh

Fixed wdigest registry path
102 opened on 13 Dec 2019 by @qz8xTD

unnecessary shout out to Alpha version for DNS logging
100 opened on 10 Dec 2019 by @itpropaul

Add scripting filename targets
98 opened on 14 Nov 2019 by @bartblaze

Included some of the entries from PR to sysmonconfig-export.xml
97 opened on 6 Nov 2019 by @cudeso

Keyboard Layout Load
92 opened on 13 Oct 2019 by @Neo23x0

Fixed IMAP port
71 opened on 12 Jan 2019 by @esecrpm 66 opened on 21 Aug 2018 by @martboo 59 opened on 25 May 2018 by @paalbra

Micro-improvements to monitored scenarios
53 opened on 6 Mar 2018 by @threathunting

Corrected typo for RTF extension
50 opened on 24 Jan 2018 by @kronflux

Add Windows Trust registry keys to log
40 opened on 4 Oct 2017 by @mdunten

About

Sysmon configuration file templates with advanced event tracing and blocking

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published