Skip to content

jymcheong/SysmonResources

Repository files navigation

Sysmon Resources

Consolidation of various resources related to Microsoft Sysmon. The resources are organised in the various folders above. Much of it is re-organisation of https://github.com/MHaggis/sysmon-dfir kudos to Michael Haag.

My opinions/thoughts/contributions are largely within the visualization & sample data folders (sample logs will be gradually added). Github Desktop & Typora apps made it a pleasure to organise these resources.

What is Sysmon?

System Monitor (Sysmon) is a Windows system service and device driver that, once installed on a system, remains resident across system reboots to monitor and log system activity to the Windows event log. It provides detailed information about process creations, network connections, and changes to file creation time...

Sysmon includes the following capabilities:

  • Logs process creation with full command line for both current and parent processes.

  • Records the hash of process image files using SHA1 (the default), MD5, SHA256 or IMPHASH.

  • Multiple hashes can be used at the same time.

  • Includes a process GUID in process create events to allow for correlation of events even when Windows reuses process IDs.

  • Include a session GUID in each events to allow correlation of events on same logon session.

  • Logs loading of drivers or DLLs with their signatures and hashes.

  • Logs opens for raw read access of disks and volumes

  • Optionally logs network connections, including each connection’s source process, IP addresses, port numbers, hostnames and port names.

  • Detects changes in file creation time to understand when a file was really created. Modification of file create timestamps is a technique commonly used by malware to cover its tracks.

  • Automatically reload configuration if changed in the registry.

  • Rule filtering to include or exclude certain events dynamically.

  • Generates events from early in the boot process to capture activity made by even sophisticated kernel-mode malware.

Why?

If you have the budget & luxury of using cool Endpoint Detection & Response platform, good for you. Otherwise if one wants to start somewhere within a DIY "lab", Sysmon is that free tool that you may be looking for. Making sense with all those log data can be challenging & I hope with these resources & sample data, make it somewhat more managable to explore & understand what is going on in Windows.

About

Consolidation of various resources related to Microsoft Sysmon & sample data/log

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages