SysmonResources Save Abandoned

Consolidation of various resources related to Microsoft Sysmon & sample data/log

Project README

Sysmon Resources

Consolidation of various resources related to Microsoft Sysmon. The resources are organised in the various folders above. Much of it is re-organisation of https://github.com/MHaggis/sysmon-dfir kudos to Michael Haag.

My opinions/thoughts/contributions are largely within the visualization & sample data folders (sample logs will be gradually added). Github Desktop & Typora apps made it a pleasure to organise these resources.

What is Sysmon?

System Monitor (Sysmon) is a Windows system service and device driver that, once installed on a system, remains resident across system reboots to monitor and log system activity to the Windows event log. It provides detailed information about process creations, network connections, and changes to file creation time...

Sysmon includes the following capabilities:

  • Logs process creation with full command line for both current and parent processes.

  • Records the hash of process image files using SHA1 (the default), MD5, SHA256 or IMPHASH.

  • Multiple hashes can be used at the same time.

  • Includes a process GUID in process create events to allow for correlation of events even when Windows reuses process IDs.

  • Include a session GUID in each events to allow correlation of events on same logon session.

  • Logs loading of drivers or DLLs with their signatures and hashes.

  • Logs opens for raw read access of disks and volumes

  • Optionally logs network connections, including each connection’s source process, IP addresses, port numbers, hostnames and port names.

  • Detects changes in file creation time to understand when a file was really created. Modification of file create timestamps is a technique commonly used by malware to cover its tracks.

  • Automatically reload configuration if changed in the registry.

  • Rule filtering to include or exclude certain events dynamically.

  • Generates events from early in the boot process to capture activity made by even sophisticated kernel-mode malware.

Why?

If you have the budget & luxury of using cool Endpoint Detection & Response platform, good for you. Otherwise if one wants to start somewhere within a DIY "lab", Sysmon is that free tool that you may be looking for. Making sense with all those log data can be challenging & I hope with these resources & sample data, make it somewhat more managable to explore & understand what is going on in Windows.

Open Source Agenda is not affiliated with "SysmonResources" Project. README Source: jymcheong/SysmonResources
Stars
86
Open Issues
0
Last Commit
2 years ago

Open Source Agenda Badge

Open Source Agenda Rating