Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[Rebase] Add support for Windows Filtering Platform (Branch: 3.12-rebase-old-PRs) (Issue: #606) #607

Open
wants to merge 1 commit into
base: master
Choose a base branch
from
Open
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
24 changes: 24 additions & 0 deletions decoders/0380-windows_decoders.xml
Original file line number Diff line number Diff line change
Expand Up @@ -621,6 +621,8 @@ Subject:
2017 Apr 18 17:30:52 WinEvtLog: Security: AUDIT_FAILURE(4625): Microsoft-Windows-Security-Auditing: (no user): no domain: WIN-1: An account failed to log on. Subject: Security ID: S-1-5-10 Account Name: WIN-1$ Account Domain: WORKGROUP Logon ID: 0x3E7 Logon Type: 10 Account For Which Logon Failed: Security ID: S-1-0-0 Account Name: Santiago Account Domain: test2 Failure Information: Failure Reason: Unknown user name or bad password. Status: 0xC000006D Sub Status: 0xC0000064 Process Information: Caller Process ID: 0xb50 Caller Process Name: C:\Windows\System32\winlogon.exe Network Information: Workstation Name: WIN-1 Source Network Address: 17.217.25.247 Source Port: 0 Detailed Authentication Information: Logon Process: User32 Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon request fails. It.

2017 Jun 10 12:34:01 WinEvtLog: Security: AUDIT_SUCCESS(4740): Microsoft-Windows-Security-Auditing: (no user): no domain: SERVER.mydomain.local: 0x8000000000000000 message: A user account was locked out. Subject: Security ID: S-1-5-18 Account Name: SERVER$ Account Domain: MYDOMAIN Logon ID: 0x3e7 Account That Was Locked Out: Security ID: S-1-5-21-1634102539-605432415-635521153-12345 Account Name: user_account_name Additional Information: Caller Computer Name: OTHERSERVER

2018 Sep 04 08:41:58 WinEvtLog: Security: AUDIT_FAILURE(5157): Microsoft-Windows-Security-Auditing: (no user): no domain: SXX_W00_QWER_1: The Windows Filtering Platform has blocked a connection. Application Information: Process ID: 4 Application Name: System Network Information: Direction: Inbound Source Address: 10.3.1.136 Source Port: 5 Destination Address: 10.3.1.100 Destination Port: 1 Protocol: 1 Filter Information: Filter Run-Time ID: 66452 Layer Name: Receive/Accept Layer Run-Time ID: 44
-->

<decoder name="windows_fields">
Expand Down Expand Up @@ -679,6 +681,28 @@ Subject:
<order>target_file</order>
</decoder>

<decoder name="windows_fields">
<type>windows</type>
<parent>windows</parent>
<regex>Application Information: Process ID: (\d+) Application Name: (\S*)</regex>
<order>process_id, Application_Name</order>
</decoder>

<decoder name="windows_fields">
<type>windows</type>
<parent>windows</parent>
<regex>System Network Information: Direction: (\S+) Source Address: (\S+) Source Port: (\d+) Destination Address: (\S+) Destination Port: (\d+) Protocol: (\S+)</regex>
<order>direction,srcip,srcport,dstip,dstport,protocol</order>
</decoder>


<decoder name="windows_fields">
<type>windows</type>
<parent>windows</parent>
<regex>Filter Information: Filter Run-Time ID: (\d*) Layer Name: (\.*) Layer Run-Time ID: (\d*)</regex>
<order>filtre_ID,Layer_Name,Layer_ID</order>
</decoder>

<!--
2016 Oct 20 09:42:00 WinEvtLog: Security: AUDIT_SUCCESS(4656): Microsoft-Windows-Security-Auditing: (no user): no domain: snaowpc: A handle to an object was requested. Subject: Security ID: S-1-5-21-466511811-1859800458-3340017162-1001 Account Name: Pedro Account Domain: snaowpc Logon ID: 0x1274A0BE Object: Source Network Address: 10.0.0.4 Object Server: Security Object Type: File Object Name: C:\ossec_test\perro1 - copia (2).txt Handle ID: 0x1dd0 Resource Attributes: - Process Information: Process ID: 0x1024 Process Name: C:\Windows\explorer.exe Access Request Information: Transaction ID: {00000000-0000-0000-0000-000000000000} Accesses: DELETE READ_CONTROL WRITE_DAC SYNCHRONIZE ReadData (or ListDirectory) WriteData (or AddFile) AppendData (or AddSubdirectory or CreatePipeInstance) ReadEA WriteEA ReadAttributes Write Attributes Access Reasons: - Access Mask: 0x17019F Privileges Used for Access Check: - Restricted SID Count: 0

Expand Down