Rob,
Just a tip
 If you have virtual box or VMware, throw a Manager on their and use it to 
test your rules and decoders. You can just paste the log into 
ossec-logtest. It will sure save you a lot of heartache when 
troubleshooting.

Hope that helps

On Monday, April 25, 2016 at 10:13:13 AM UTC-4, Rob B wrote:
>
> dang good idea!   thanks dan!
>
> On Monday, April 25, 2016 at 9:35:20 AM UTC-4, dan (ddpbsd) wrote:
>>
>> On Fri, Apr 22, 2016 at 4:16 PM, Rob B <[email protected]> wrote: 
>> > Hello All, 
>> > 
>> >    Does anyone have a decoder for Windows Defender floating around out 
>> > there?? 
>> > 
>> > Im having a heck of a time...   Here is the event channel event example 
>> if 
>> > anyone is curious or can help:  (Win10 box) 
>> > 
>>
>> The easiest way to provide log samples that can be turned into 
>> decoders and rules is to turn on the logall option, and grab the logs 
>> from /var/ossec/logs/archives/archives.log on the manager. 
>>
>> > Log Name:      Microsoft-Windows-Windows Defender/Operational 
>> > Source:        Microsoft-Windows-Windows Defender 
>> > Date:          4/22/2016 4:05:17 PM 
>> > Event ID:      1116 
>> > Task Category: None 
>> > Level:         Warning 
>> > Keywords: 
>> > User:          SYSTEM 
>> > Computer:      VICTIM0 
>> > Description: 
>> > Windows Defender has detected malware or other potentially unwanted 
>> > software. 
>> >  For more information please see the following: 
>> > 
>> http://go.microsoft.com/fwlink/?linkid=37020&name=Trojan:Win32/Bagsu!rfn&threatid=2147694406&enterprise=0
>>  
>> >   Name: Trojan:Win32/Bagsu!rfn 
>> >   ID: 2147694406 
>> >   Severity: Severe 
>> >   Category: Trojan 
>> >   Path: 
>> > 
>> containerfile:_\\10.0.1.10\share\Malware_For_Demo\REAL_BAD_Malz2\Server.exe;file:_\\10.0.1.10\share\Malware_For_Demo\REAL_BAD_Malz2\Server.exe;file:_\\10.0.1.10\share\Malware_For_Demo\REAL_BAD_Malz2\Server.exe->(VFS:svchost.exe)
>>  
>>
>> >   Detection Origin: Network share 
>> >   Detection Type: Concrete 
>> >   Detection Source: Real-Time Protection 
>> >   User: frog 
>> >   Process Name: C:\Windows\explorer.exe 
>> >   Signature Version: AV: 1.217.2054.0, AS: 1.217.2054.0, NIS: 115.8.0.0 
>> >   Engine Version: AM: 1.1.12603.0, NIS: 2.1.11804.0 
>> > 
>> > Event Xml: 
>> > <Event xmlns="http://schemas.microsoft.com/win/2004/08/events/event";> 
>> >   <System> 
>> >     <Provider Name="Microsoft-Windows-Windows Defender" 
>> > Guid="{11CD958A-C507-4EF3-B3F2-5FD9DFBD2C78}" /> 
>> >     <EventID>1116</EventID> 
>> >     <Version>0</Version> 
>> >     <Level>3</Level> 
>> >     <Task>0</Task> 
>> >     <Opcode>0</Opcode> 
>> >     <Keywords>0x8000000000000000</Keywords> 
>> >     <TimeCreated SystemTime="2016-04-22T20:05:17.551083000Z" /> 
>> >     <EventRecordID>95</EventRecordID> 
>> >     <Correlation ActivityID="{ECC2B320-F9A6-41AD-9F17-5C9EE24D3330}" /> 
>> >     <Execution ProcessID="2332" ThreadID="4540" /> 
>> >     <Channel>Microsoft-Windows-Windows Defender/Operational</Channel> 
>> >     <Computer>VICTIM0</Computer> 
>> >     <Security UserID="S-1-5-77" /> 
>> >   </System> 
>> >   <EventData> 
>> >     <Data Name="Product Name">%%827</Data> 
>> >     <Data Name="Product Version">4.9.10586.0</Data> 
>> >     <Data Name="Detection 
>> ID">{CAADD684-36C9-444B-8A6D-8CE537A93E40}</Data> 
>> >     <Data Name="Detection Time">2016-04-22T20:04:40.369Z</Data> 
>> >     <Data Name="Unused"> 
>> >     </Data> 
>> >     <Data Name="Unused2"> 
>> >     </Data> 
>> >     <Data Name="Threat ID">2147694406</Data> 
>> >     <Data Name="Threat Name">Trojan:Win32/Bagsu!rfn</Data> 
>> >     <Data Name="Severity ID">5</Data> 
>> >     <Data Name="Severity Name">Severe</Data> 
>> >     <Data Name="Category ID">8</Data> 
>> >     <Data Name="Category Name">Trojan</Data> 
>> >     <Data 
>> > Name="FWLink">
>> http://go.microsoft.com/fwlink/?linkid=37020&amp;name=Trojan:Win32/Bagsu!rfn&amp;threatid=2147694406&amp;enterprise=0</Data>
>>  
>>
>> >     <Data Name="Status Code">1</Data> 
>> >     <Data Name="Status Description"> 
>> >     </Data> 
>> >     <Data Name="State">1</Data> 
>> >     <Data Name="Source ID">3</Data> 
>> >     <Data Name="Source Name">%%818</Data> 
>> >     <Data Name="Process Name">C:\Windows\explorer.exe</Data> 
>> >     <Data Name="Detection User">frog</Data> 
>> >     <Data Name="Unused3"> 
>> >     </Data> 
>> >     <Data 
>> > 
>> Name="Path">containerfile:_\\10.0.1.10\share\Malware_For_Demo\REAL_BAD_Malz2\Server.exe;file:_\\10.0.1.10\share\Malware_For_Demo\REAL_BAD_Malz2\Server.exe;file:_\\10.0.1.10\share\Malware_For_Demo\REAL_BAD_Malz2\Server.exe-&gt;(VFS:svchost.exe)</Data>
>>  
>>
>> >     <Data Name="Origin ID">2</Data> 
>> >     <Data Name="Origin Name">%%846</Data> 
>> >     <Data Name="Execution ID">1</Data> 
>> >     <Data Name="Execution Name">%%813</Data> 
>> >     <Data Name="Type ID">0</Data> 
>> >     <Data Name="Type Name">%%822</Data> 
>> >     <Data Name="Pre Execution Status">0</Data> 
>> >     <Data Name="Action ID">9</Data> 
>> >     <Data Name="Action Name">%%887</Data> 
>> >     <Data Name="Unused4"> 
>> >     </Data> 
>> >     <Data Name="Error Code">0x00000000</Data> 
>> >     <Data Name="Error Description">The operation completed 
>> successfully. 
>> > </Data> 
>> >     <Data Name="Unused5"> 
>> >     </Data> 
>> >     <Data Name="Post Clean Status">0</Data> 
>> >     <Data Name="Additional Actions ID">0</Data> 
>> >     <Data Name="Additional Actions String">No additional actions 
>> > required</Data> 
>> >     <Data Name="Remediation User"> 
>> >     </Data> 
>> >     <Data Name="Unused6"> 
>> >     </Data> 
>> >     <Data Name="Signature Version">AV: 1.217.2054.0, AS: 1.217.2054.0, 
>> NIS: 
>> > 115.8.0.0</Data> 
>> >     <Data Name="Engine Version">AM: 1.1.12603.0, NIS: 
>> 2.1.11804.0</Data> 
>> >   </EventData> 
>> > </Event> 
>> > 
>> > 
>> > Thanks!, Rob 
>> > 
>> > -- 
>> > 
>> > --- 
>> > You received this message because you are subscribed to the Google 
>> Groups 
>> > "ossec-list" group. 
>> > To unsubscribe from this group and stop receiving emails from it, send 
>> an 
>> > email to [email protected]. 
>> > For more options, visit https://groups.google.com/d/optout. 
>>
>

-- 

--- 
You received this message because you are subscribed to the Google Groups 
"ossec-list" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to [email protected].
For more options, visit https://groups.google.com/d/optout.

Reply via email to