Skip to content

Commit

Permalink
Revert "Revert "Thehack3r4chan master""
Browse files Browse the repository at this point in the history
  • Loading branch information
olafhartong committed Apr 25, 2021
1 parent f36cd1d commit af2c71d
Show file tree
Hide file tree
Showing 20 changed files with 551 additions and 6 deletions.
1 change: 1 addition & 0 deletions 10_process_access/include_suspicious_locations.xml
Original file line number Diff line number Diff line change
Expand Up @@ -20,6 +20,7 @@
<SourceImage name="technique_id=T1036,technique_name=Masquerading" condition="contains">\htdocs\</SourceImage>
<SourceImage name="technique_id=T1036,technique_name=Masquerading" condition="contains">\wwwroot\</SourceImage>
<SourceImage name="technique_id=T1036,technique_name=Masquerading" condition="contains">\Temp\</SourceImage>
<SourceImage name="technique_id=T1036,technique_name=Masquerading" condition="contains">\AppData\</SourceImage>
</ProcessAccess>
</RuleGroup>
</EventFiltering>
Expand Down
11 changes: 11 additions & 0 deletions 11_file_create/include_system_drive.xml
Original file line number Diff line number Diff line change
@@ -0,0 +1,11 @@
<Sysmon schemaversion="4.40">
<EventFiltering>
<RuleGroup name="" groupRelation="or">
<FileCreate onmatch="include">
<TargetFilename name="technique_id=T1044,technique_name=File System Permissions Weakness" condition="begin with">C:\Windows\SysWoW64</TargetFilename>
<TargetFilename name="technique_id=T1047,technique_name=File System Permissions Weakness" condition="begin with">C:\Windows\System32</TargetFilename>
<TargetFilename name="technique_id=T1047,technique_name=File System Permissions Weakness" condition="begin with">C:\Windows\</TargetFilename>
</FileCreate>
</RuleGroup>
</EventFiltering>
</Sysmon>
9 changes: 9 additions & 0 deletions 12_13_14_registry_event/include_environment_mod.xml
Original file line number Diff line number Diff line change
@@ -0,0 +1,9 @@
<Sysmon schemaversion="4.40">
<EventFiltering>
<RuleGroup name="" groupRelation="or">
<RegistryEvent onmatch="include">
<TargetObject name="technique_id=T1015,technique_name=Accessibility Features" condition="contains">HKCU\Environment</TargetObject>
</RegistryEvent>
</RuleGroup>
</EventFiltering>
</Sysmon>
12 changes: 12 additions & 0 deletions 12_13_14_registry_event/include_office_oulook.xml
Original file line number Diff line number Diff line change
@@ -0,0 +1,12 @@
<Sysmon schemaversion="4.30">
<EventFiltering>
<RuleGroup name="" groupRelation="or">
<RegistryEvent onmatch="include">
<TargetObject condition="contains">\Microsoft\Office\Outlook\Addins</TargetObject> <!--Microsoft:Office: Outlook add-ins-->
<TargetObject condition="contains">\Software\Microsoft\VSTO\Security\Inclusion</TargetObject> <!-- Uncommon place to load add-ins, especially in HKCU-->
<TargetObject condition="contains">\Software\Microsoft\VSTO\SolutionMetadata</TargetObject> <!--Uncommon place to declare add-in metadata, especially in HKCU-->
<TargetObject name="technique_name=Outlook Server 95/98 Identity Keys" condition="contains">Identities</TargetObject>
</RegistryEvent>
</RuleGroup>
</EventFiltering>
</Sysmon>
12 changes: 10 additions & 2 deletions 12_13_14_registry_event/include_windows_uac_tampering.xml
Original file line number Diff line number Diff line change
Expand Up @@ -3,10 +3,18 @@
<RuleGroup name="" groupRelation="or">
<RegistryEvent onmatch="include">
<!--Windows UAC tampering-->
<TargetObject name="technique_id=T1548.002,technique_name=Bypass User Access Control" condition="begin with">HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA</TargetObject> <!--Detect: UAC Tampering | Credit @ion-storm -->
<TargetObject name="technique_id=T1548.002,technique_name=Bypass User Access Control" condition="begin with">HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\System\LocalAccountTokenFilterPolicy</TargetObject> <!--Detect: UAC Tampering | Credit @ion-storm -->
<TargetObject name="technique_id=T1548.002,technique_name=Bypass User Access Control" condition="begin with">HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA</TargetObject> <!--Detect: UAC Tampering | Credit @ion-storm -->
<TargetObject name="technique_id=T1548.002,technique_name=Bypass User Access Control" condition="begin with">HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\System\LocalAccountTokenFilterPolicy</TargetObject> <!--Detect: UAC Tampering | Credit @ion-storm -->
<TargetObject name="technique_id=T1548.002,technique_name=Bypass User Access Control" condition="begin with">HKLM\SOFTWARE\Microsoft\Security Center\UacDisableNotify</TargetObject>
<TargetObject name="technique_id=T1548.002,technique_name=Bypass User Access Control" condition="begin with">HKLM\SOFTWARE\Microsoft\Security Center\UpdatesDisableNotify</TargetObject>
<Rule name="UACMe Dir Prep" groupRelation="and">
<TargetObject name="UACMe Dir Prep" condition="begin with">HKU</TargetObject>
<TargetObject name="UACMe Dir Prep" condition="contains">Environment</TargetObject>
</Rule>
<Rule name="UACMe Dir Prep" groupRelation="and">
<TargetObject name="UACMe Dir Prep" condition="begin with">HKLM</TargetObject>
<TargetObject name="UACMe Dir Prep" condition="contains">Environment</TargetObject>
</Rule>
</RegistryEvent>
</RuleGroup>
</EventFiltering>
Expand Down
13 changes: 13 additions & 0 deletions 15_file_create_stream_hash/include_suspicious_locations.xml
Original file line number Diff line number Diff line change
@@ -0,0 +1,13 @@
<Sysmon schemaversion="4.30">
<EventFiltering>
<RuleGroup name="" groupRelation="or">
<FileCreateStreamHash onmatch="include">
<TargetFilename condition="contains">Downloads</TargetFilename> <!--Downloaded files. Does not include "Run" files in IE-->
<TargetFilename condition="contains">AppData</TargetFilename>
<TargetFilename condition="contains">Temp</TargetFilename>
<TargetFilename condition="contains">ProgramData</TargetFilename>
<TargetFilename condition="contains">Users</TargetFilename>
</FileCreateStreamHash>
</RuleGroup>
</EventFiltering>
</Sysmon>
9 changes: 9 additions & 0 deletions 17_18_pipe_event/include_all.xml
Original file line number Diff line number Diff line change
@@ -0,0 +1,9 @@
<Sysmon schemaversion="4.50">
<EventFiltering>
<RuleGroup groupRelation="or">
<PipeEvent onmatch="include">
<PipeName name="technique_id=T1033,technique_name=System Owner/User Discovery" condition="begin with">\</PipeName>
</PipeEvent>
</RuleGroup>
</EventFiltering>
</Sysmon>
Loading

0 comments on commit af2c71d

Please sign in to comment.