Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/MHaggis/sysmon-dfir
Sources, configuration and how to detect evil things utilizing Microsoft Sysmon.
https://github.com/MHaggis/sysmon-dfir
sysmon
Last synced: 6 days ago
JSON representation
Sources, configuration and how to detect evil things utilizing Microsoft Sysmon.
- Host: GitHub
- URL: https://github.com/MHaggis/sysmon-dfir
- Owner: MHaggis
- License: gpl-3.0
- Created: 2017-01-11T07:09:03.000Z (almost 8 years ago)
- Default Branch: master
- Last Pushed: 2023-12-12T16:21:02.000Z (11 months ago)
- Last Synced: 2024-10-16T10:36:50.998Z (18 days ago)
- Topics: sysmon
- Size: 86.5 MB
- Stars: 898
- Watchers: 114
- Forks: 183
- Open Issues: 0
-
Metadata Files:
- Readme: README.legacy
- License: LICENSE
Awesome Lists containing this project
- awesome-hacking-lists - MHaggis/sysmon-dfir - Sources, configuration and how to detect evil things utilizing Microsoft Sysmon. (Others)
README
# Sysmon DFIR
Sources, configuration and how to detect evil things utilizing Microsoft Sysmon.# Install Sysmon
To install Sysmon, use the following command:
Sysmon.exe -i -h MD5,IMPHASH -n -l
### Install config ###
Run with administrator rights
~~~~
sysmon.exe -accepteula -i sysmonconfig-export.xml
~~~~Upon installation, Sysmon will begin logging events to the operational event log “C:\Windows\System32\winevt\Logs\Microsoft-Windows-Sysmon%4Operational.evtx”.
### Deploy Sysmon ###
[Sysmon.bat - Ion-Storm](https://github.com/ion-storm/sysmon-config/blob/master/Install%20Sysmon.bat)
[Deploying Sysmon through Group Policy - Pablo Delgado](http://syspanda.com/index.php/2017/02/28/deploying-sysmon-through-gpo/)
### Update existing configuration ###
Run with administrator rightssysmon.exe -c sysmonconfig-export.xml
### Configs ###
**@SwiftOnSecurity config**
Recommended.
Config will assist with bringing you up to speed in relation to critical process monitoring, network utilization, and so on. Note that the concept is to not log everything, but the most important items.
https://github.com/SwiftOnSecurity/sysmon-config
**Sysmon_config.xml**
Solid, detailed config. Probably one of the best ones out there in relation to completeness.
[MalwareArchaeology](https://www.malwarearchaeology.com/logging/)
**Sysmon-a.cfg**
Basic config that will monitor critical Windows process execution. Very basic, but a good config to get used to sysmon and how things operate.
[Blog post by blacklanternsecurity](http://www.blacklanternsecurity.com/blog/2016/12/11/sysmon-woes-elasticsearch-and-mitres-attack-matrix/)
**Sysmon-b.cfg**
Crypsis Group published config and PDF. Fairly detailed list of excludes that should assist with understanding how they work and get a configuration started.
[Crypsis Group Config](https://github.com/crypsisgroup/Splunkmon/edit/master/sysmon.cfg)
[Crypsis Group PDF](http://www.crypsisgroup.com/images/site/CG_WhitePaper_Splunkmon_1216.pdf)
**Sysmon-c.cfg**
Great configuration to understand excludes and contains.
[Decent Security Config](https://decentsecurity.com/enterprise/#/sysmon-enterprise-configuration/)
**Sysmon-d.cfg**
Solid blog post related to getting started with Sysmon. Config is nicely laid out and easy to understand.
[909Research Blog](http://909research.com/sysmon-the-best-free-windows-monitoring-tool-you-arent-using/)
**Sysmon-e.cfg**
Config is specific but it provides a good foundation for capturing a lot of specific data.
https://github.com/Prevenity/sysmon
(Translated comments to english)
**Sysmoncfg_v2|31.xml**
Related material from Splunking the Endpoint .conf talk by James Brodsky and Dimitri McKay.
[Splunking the Endpoint - Files from presentation](https://splunk.app.box.com/v/splunking-the-endpoint)
Configs are optimized for Splunk.
**Additional configs**
Configs are updated frequently --
[SwiftOnSecurity Fork by Ion-Storm](https://github.com/ion-storm/sysmon-config/blob/master/sysmonconfig-export.xml)
Server Config: https://gist.github.com/Neo23x0/a4b4af9481e01e749409
Client config: https://gist.github.com/Neo23x0/f56bea38d95040b70cf5
# Resources
[Ion-Storm Graylog App](https://github.com/ion-storm/sysmon-config)
[Advanced Incident Detection and Threat Hunting using Sysmon and Splunk Video - Tom Ueltschi](https://youtu.be/vv_VXntQTpE)
[Advanced Incident Detection and Threat Hunting using Sysmon and Splunk Slides - Tom Ueltschi](http://security-research.dyndns.org/pub/slides/BotConf/2016/Botconf-2016_Tom-Ueltschi_Sysmon.pdf)
[Splunking the Endpoint - James Brodsky](https://conf.splunk.com/session/2015/conf2015_Jbrodsky_Splunk_SecurityComplinace_SplunkingTheEndpoint_FINAL.pdf)
[Splunking the Endpoint: “Hands on!” Ransomware Edition - James Brodsky & Dimitri McKay](https://conf.splunk.com/files/2016/slides/splunking-the-endpoint-hands-on.pdf)
[Microsoft Sysmon Deployment - @dmargaritis](https://securitylogsdotorg.files.wordpress.com/2017/01/sysmon-2017-16-1.pdf)
[Sysinternals New Tool Sysmon (System Monitor) - Carlos Perez](http://www.darkoperator.com/blog/2014/8/8/sysinternals-sysmon)
[Splunkmon — Taking Sysmon to the Next Level- The Crypsis Group](http://www.crypsisgroup.com/images/site/CG_WhitePaper_Splunkmon_1216.pdf)
[Putting attackers in hi vis jackets with sysmon - Adrian Shaw](https://labs.nettitude.com/blog/putting-attackers-in-hi-vis-jackets-with-sysmon/)
[How to Go from Responding to Hunting with Sysinternals Sysmon - Mark Russinovich](https://onedrive.live.com/view.aspx?resid=D026B4699190F1E6!2843&ithint=file%2cpptx&app=PowerPoint&authkey=!AMvCRTKB_V1J5ow)
[Tracking Hackers on Your Network with Sysinternals Sysmon - Mark Russinovich](https://www.rsaconference.com/writable/presentations/file_upload/hta-w05-tracking_hackers_on_your_network_with_sysinternals_sysmon.pdf)
[Detecting Lateral Movement Using Sysmon and Splunk - David French](http://www.incidentresponderblog.com/2016/09/detecting-lateral-movement-using-sysmon.html)
[Setting up Elasticsearch 5.x – Sending Windows Logs using WinLogbeat 5.x Part 2/3 - Pablo Delgado](http://syspanda.com/index.php/2017/02/07/setting-up-elasticsearch-5-x-sending-windows-logs-using-winlogbeat-5-x/)
[Sample sysmon events and the schema you can expect in Sysmon v6 - @williballenthin](https://gist.github.com/williballenthin/f693b1c2f3d95cb8f8e17b5f7f26031d)
[Sysmon Woes, Elasticsearch and MITRE’s ATT&CK Matrix - Black Lantern Security](http://www.blacklanternsecurity.com/blog/2016/12/11/sysmon-woes-elasticsearch-and-mitres-attack-matrix/)
[Parsing Sysmon Events for IR Indicators - CrowdStrike](https://www.crowdstrike.com/blog/sysmon-2/)
[Detecting Advanced Threats with Sysmon, WEF and ElasticSearch - Joshua Lewis](https://joshuadlewis.blogspot.com/2014/10/advanced-threat-detection-with-sysmon_74.html)
[Powershell Sysmon - GitHub - Carlos Perez](https://github.com/darkoperator/Posh-Sysmon)
[Sysmon queries - GitHub - James Habben](https://github.com/JamesHabben/sysmon-queries)
[Splunk TA for Sysmon - GitHub - @daveherrald](https://github.com/splunk/TA-microsoft-sysmon)
[SplunkMon cofiguration - GitHub - The Crypsis Group](https://github.com/crypsisgroup/Splunkmon)