-
Notifications
You must be signed in to change notification settings - Fork 19
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Windows Sysmon Events: Added new dictionary and event samples
Event samples for: 12,13,18,2,22,23 New dictionary including event sample: 26
- Loading branch information
1 parent
fa77bd4
commit 80bb4f3
Showing
7 changed files
with
164 additions
and
0 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,81 @@ | ||
name: 'Event ID 26: FileDeleteDetected (File Delete logged)' | ||
description: A file was deleted. | ||
platform: windows | ||
log_source: sysmon | ||
event_id: '26' | ||
event_version: '5' | ||
event_fields: | ||
- standard_name: tag | ||
standard_type: TBD | ||
name: RuleName | ||
type: string | ||
description: custom tag mapped to event. i.e ATT&CK technique ID | ||
sample_value: T1114 | ||
- standard_name: event_creation_time | ||
standard_type: TBD | ||
name: UtcTime | ||
type: date | ||
description: Time in UTC when event was created | ||
sample_value: 4/11/18 6:28 | ||
- standard_name: process_guid | ||
standard_type: TBD | ||
name: ProcessGuid | ||
type: string | ||
description: Process Guid of the process that deleted the file | ||
sample_value: '{A98268C1-959E-5ACD-0000-0010236E0300}' | ||
- standard_name: process_id | ||
standard_type: TBD | ||
name: ProcessId | ||
type: integer | ||
description: Process ID used by the os to identify the process that deleted the file | ||
sample_value: '1896' | ||
- standard_name: process_file_path | ||
standard_type: TBD | ||
name: Image | ||
type: string | ||
description: File path of the process that deleted the file | ||
sample_value: C:\WINDOWS\system32\explorer.exe | ||
- standard_name: user_name | ||
standard_type: TBD | ||
name: User | ||
type: string | ||
description: Name of the account who deleted the file. | ||
sample_value: DESKTOP-WARDOG\wardog | ||
- standard_name: file_name | ||
standard_type: TBD | ||
name: TargetFilename | ||
type: string | ||
description: full path name of the deleted file | ||
sample_value: C:\Users\wardog\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\7G23PHTPHSQ3S2RVKKPS.temp | ||
- standard_name: TBD | ||
standard_type: TBD | ||
name: Hashes | ||
type: string | ||
description: Hashes captured by sysmon driver of the deleted file | ||
sample_value: SHA1=B0BF5AC2E81BBF597FAD5F349FEEB32CAC449FA2, MD5=6A255BEBF3DBCD13585538ED47DBAFD7, SHA256=4668BB2223FFB983A5F1273B9E3D9FA2C5CE4A0F1FB18CA5C1B285762020073C, IMPHASH=2505BD03D7BD285E50CE89CEC02B333B | ||
- standard_name: TBD | ||
standard_type: TBD | ||
name: IsExecutable | ||
type: bool | ||
description: TBD | ||
sample_value: TBD | ||
references: | ||
- text: Sysmon Source | ||
link: https://docs.microsoft.com/en-us/sysinternals/downloads/sysmon#event-id-23-filedelete-a-file-delete-was-detected | ||
- text: Sysmon 11 - FileDelete events | ||
link: https://medium.com/falconforce/sysmon-11-dns-improvements-and-filedelete-events-7a74f17ca842 | ||
tags: [] | ||
event_sample: | ||
- format: xml | ||
sample: |- | ||
<EventData> | ||
<Data Name="RuleName">-</Data> | ||
<Data Name="UtcTime">2022-06-29 19:34:33.740</Data> | ||
<Data Name="ProcessGuid">{01e2a015-0004-62bc-2200-000000000500}</Data> | ||
<Data Name="ProcessId">1192</Data> | ||
<Data Name="User">NT AUTHORITY\SYSTEM</Data> | ||
<Data Name="Image">C:\Windows\system32\svchost.exe</Data> | ||
<Data Name="TargetFilename">C:\Windows\Prefetch\SPPSVC.EXE-B0F8131B.pf</Data> | ||
<Data Name="Hashes">SHA1=7501B6DCEBA3379749BEA17751AF10F41D2A55D1,MD5=6E44A50630221D4F99C0941EC808DC90,SHA256=93B0AD70DA6A6429C78DDED50DEE477A2299EC8D74E76E8E71CE11C5F85F1322,IMPHASH=00000000000000000000000000000000</Data> | ||
<Data Name="IsExecutable">false</Data> | ||
</EventData> |