Skip to content

Commit 289d5e9

Browse files
authored
Merge pull request #12 from phantinuss/master
fix: revert to schema version 4.50. Newer schema versions are put on …
2 parents b818d1f + 86397d2 commit 289d5e9

1 file changed

Lines changed: 5 additions & 10 deletions

File tree

sysmonconfig-export.xml

Lines changed: 5 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -50,12 +50,12 @@
5050
- "Image" is a technical term for a compiled binary file like an EXE or DLL. Also, it can match just the filename, or entire path.
5151
- "ProcessGuid" and "LoginGuid" are not random, they contain some embedded information. https://gist.github.com/mattifestation/0102042160c9a60b2b847378c0ef70b4
5252
53-
FILTERING: Filter conditions available for use are: is,is any,is not,contains,contains any,contains all,excludes,excludes any,excludes all,begin with,end with,not begin with,not end with,less than,more than,image
53+
FILTERING: Filter conditions available for use are: is,is not,contains,contains any,contains all,excludes,excludes any,excludes all,begin with,end with,less than,more than,image
5454
- The "image" filter is usable on any field. Same as "is" but can either match entire string, or only the text after last "\". Credit: @mattifestation
5555
5656
-->
5757

58-
<Sysmon schemaversion="4.70">
58+
<Sysmon schemaversion="4.50">
5959
<!--SYSMON META CONFIG-->
6060
<HashAlgorithms>md5,sha256,IMPHASH</HashAlgorithms> <!-- Both MD5 and SHA256 are the industry-standard algorithms. Remove IMPHASH if you do not use DLL import fingerprinting. -->
6161
<CheckRevocation/> <!-- Check loaded drivers, log if their code-signing certificate has been revoked, in case malware stole one to sign a kernel driver -->
@@ -486,21 +486,16 @@
486486
<RuleGroup name="" groupRelation="or">
487487
<ProcessAccess onmatch="include">
488488
<!-- CobaltStrike BOF using OpenProcess/NtOpenProcess Ref: https://medium.com/falconforce/falconfriday-direct-system-calls-and-cobalt-strike-bofs-0xff14-741fa8e1bdd6 -->
489-
<Rule groupRelation="and">
490-
<CallTrace condition="not begin with">C:\Windows\SYSTEM32\ntdll.dll</CallTrace>
491-
<CallTrace condition="not begin with">C:\Windows\SYSTEM32\win32u.dll</CallTrace>
492-
<CallTrace condition="not begin with">C:\Windows\SYSTEM32\wow64win.dll</CallTrace>
493-
</Rule>
494489
<CallTrace condition="begin with">UNKNOWN</CallTrace>
495-
<!-- Inject AMSI Bypass via CobaltStrike BOF Ref: https://github.com/boku7/injectAmsiBypass -->
490+
<!-- Typical ProcessAccess Pattern of CobaltStrike BOF Ref: e.g. https://github.com/boku7/injectAmsiBypass -->
496491
<Rule groupRelation="and">
497492
<CallTrace condition="contains">UNKNOWN</CallTrace>
498-
<GrantedAccess condition="contains any">0x1028</GrantedAccess>
493+
<GrantedAccess condition="contains any">0x1028;0x1fffff</GrantedAccess>
499494
</Rule>
500495
<!-- lsass.exe access with critical permission -->
501496
<Rule groupRelation="and">
502497
<TargetImage condition="end with">lsass.exe</TargetImage>
503-
<GrantedAccess condition="contains any">0x40,0x1000,0x1010,0x1038,0x1410,0x1418,0x1438,0x143a,0x100000,0x1f0fff,0x1f1fff,0x1f2fff,0x1f3fff,0x1fffff</GrantedAccess> <!--0x1400 too noisy-->
498+
<GrantedAccess condition="contains any">0x40;0x1000;0x1010;0x1038;0x1410;0x1418;0x1438;0x143a;0x100000;0x1f0fff;0x1f1fff;0x1f2fff;0x1f3fff;0x1fffff</GrantedAccess> <!--0x1400 too noisy-->
504499
</Rule>
505500
<!-- LittleCorporal generated MalDoc Ref: https://github.com/connormcgarr/LittleCorporal -->
506501
<Rule groupRelation="and">

0 commit comments

Comments
 (0)