Hi Brent, no apologies needed! we haven't actually said much about the ruleset here (in the mailing list) and thought it was a good opportunity to explain what it is and does.
Actually, if I am right, you helped Josh creating the Sysmon decoders/rules so thank you for that! Best On Wed, Jan 13, 2016 at 12:49 PM, Brent Morris <[email protected]> wrote: > Thanks Santiago. > > My apologies if my message was curt. I haven't seen Wazuh and I knew the > existing Sysmon decoders work fairly well. When I looked at the ones on > Wazuh, they looked fairly different than the ones I know to work. I spent > a bit of time contributing back to Josh's Github repository for them and > hit the wall with some of the variations of sysmon logs > > Thanks for the explanation! I'll take a look at Wazuh. > > On Wednesday, January 13, 2016 at 12:25:36 PM UTC-8, Santiago Bassett > wrote: >> >> Hi, >> >> Wazuh ruleset includes more than 200 new rules and mapping with PCI DSS >> controls (tagging also out-of-the box OSSEC rules). We started this effort >> for some of the OSSEC deployments we are working on, and decided it was a >> good idea to put together a ruleset (specially for cases where OSSEC is >> used for PCI DSS or in Amazon AWS environments). Currently our team is >> maintaining these rules and actively developing new ones. >> >> Regarding Sysmon decoders, we recently modified them ( >> http://defensivedepth.com/2015/12/19/new-sysmon-ossec-decoders/), fixing >> a few issues and of course contributing back to ossec-hids repository. >> >> Info on how to install the ruleset can be found here: >> http://documentation.wazuh.com/en/latest/ossec_ruleset.html >> >> If you decide to use the automatic installation ( >> http://documentation.wazuh.com/en/latest/ossec_ruleset.html#automatic-installation), >> you can run: >> >> ossec_ruleset.py -a -u -s >> >> That will create a backup of your existing rules and decoders, install >> new ones, and modify your ossec.conf to include these lines: >> >> <decoder_dir>etc/ossec_decoders</decoder_dir> >> >> <decoder_dir>etc/wazuh_decoders</decoder_dir> >> >> Hope that helps, >> >> Santiago. >> >> >> >> >> >> >> >> On Wed, Jan 13, 2016 at 11:39 AM, Brent Morris <[email protected]> >> wrote: >> >>> You should try these for Sysmon events. >>> >>> >>> https://github.com/defensivedepth/Sysmon_OSSEC/blob/master/Sysmon_OSSEC-Decoders.xml >>> >>> I'm not familiar with wazuh, if it's a fork of OSSEC decoders/rules or >>> what? >>> >>> I can tell you that the ones I've linked will work without breaking >>> other things... >>> >>> On Wednesday, January 13, 2016 at 7:24:40 AM UTC-8, [email protected] >>> wrote: >>>> >>>> Hello, >>>> >>>> I incorporated wazuh's custom OSSEC decoders for sysmon events ( >>>> https://github.com/wazuh/ossec-rules/blob/master/rules-decoders/ossec/decoders/windows_decoders.xml) >>>> by placing these decoders into /var/ossec/etc/local_decoder.xml. However, >>>> when I did this, the normal windows rules in >>>> /var/ossec/rules/msauth_rules.xml would no longer fire. Obviously I created >>>> a conflict of some sort, but I'm not certain where. >>>> >>>> To expound, here is a sample log line: >>>> >>>> 2016 Jan 13 08:19:04 WinEvtLog: Security: AUDIT_SUCCESS(4733): >>>> Microsoft-Windows-Security-Auditing: (no user): no domain: foo.local: A >>>> member was removed from a security-enabled local group. Subject: Security >>>> ID: S-1-5-18 Account Name: foo-machine$ Account Domain: FOO Logon >>>> ID: 0x3e7 Member: Security ID: >>>> S-1-5-21-xxxxxxxxxx-xxxxxxxxx-xxxxxxxxxx-xxxx Account Name: - Group: >>>> Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: >>>> Builtin Additional Information: Privileges: - >>>> >>>> >>>> Before adding a local_decoder.xml, this log line would be parsed as >>>> follows: >>>> >>>> **Phase 2: Completed decoding. >>>> decoder: 'windows' >>>> status: 'AUDIT_SUCCESS' >>>> id: '4733' >>>> extra_data: 'Microsoft-Windows-Security-Auditing' >>>> dstuser: '(no user)' >>>> system_name: 'foo-machine' >>>> >>>> **Phase 3: Completed filtering (rules). >>>> Rule id: '18217' >>>> Level: '12' >>>> Description: 'Administrators Group Changed' >>>> Info - Text: 'http://support.microsoft.com/kb/243330' >>>> **Alert to be generated. >>>> >>>> >>>> Now, it's parsed as such: >>>> >>>> **Phase 2: Completed decoding. >>>> decoder: 'windows' >>>> >>>> **Phase 3: Completed filtering (rules). >>>> Rule id: '18100' >>>> Level: '0' >>>> Description: 'Group of windows rules.' >>>> >>>> Why!?! >>>> >>>> Thanks! >>>> >>> -- >>> >>> --- >>> You received this message because you are subscribed to the Google >>> Groups "ossec-list" group. >>> To unsubscribe from this group and stop receiving emails from it, send >>> an email to [email protected]. >>> For more options, visit https://groups.google.com/d/optout. >>> >> >> -- > > --- > You received this message because you are subscribed to the Google Groups > "ossec-list" group. > To unsubscribe from this group and stop receiving emails from it, send an > email to [email protected]. > For more options, visit https://groups.google.com/d/optout. > -- --- You received this message because you are subscribed to the Google Groups "ossec-list" group. To unsubscribe from this group and stop receiving emails from it, send an email to [email protected]. For more options, visit https://groups.google.com/d/optout.
