Hi Issam,

regarding to the rule order, OSSEC checks a rule and its childs 
recursively. Try to launch *ossec-logtest* with argument *-v*:

log: '2014 Dec 20 09:29:47 WinEvtLog: Microsoft-Windows-Sysmon/Operational: 
INFORMATION(1): Microsoft-Windows-Sysmon: SYSTEM: NT AUTHORITY: 
WIN-U93G48C7BOP: Process Create:  UtcTime: 12/20/2014 2:29 PM  ProcessGuid: 
{00000000-87DB-5495-0000-001045F25A00}  ProcessId: 3048  Image: 
C:\Windows\system32\svchost.exe  CommandLine: 
"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Administrator\Desktop\ossec.log 
 User: WIN-U93G48C7BOP\Administrator  LogonGuid: 
{00000000-84B8-5494-0000-0020CB330200}  LogonId: 0x233CB 
 TerminalSessionId: 1  IntegrityLevel: High  HashType: SHA1  Hash: 
9FEF303BEDF8430403915951564E0D9888F6F365  ParentProcessGuid: 
{00000000-84B9-5494-0000-0010BE4A0200}  ParentProcessId: 848  ParentImage: 
C:\Windows\Explorer.EXE  ParentCommandLine: C:\Windows\Explorer.EXE'


**Phase 2: Completed decoding.
       decoder: 'windows'
       status: 'C:\Windows\system32\svchost.exe'
       dstuser: 'WIN-U93G48C7BOP\Administrator'
       url: '9FEF303BEDF8430403915951564E0D9888F6F365'
       extra_data: 'C:\Windows\Explorer.EXE'


**Rule debugging:
    Trying rule: 6 - Generic template for all windows rules.
       *Rule 6 matched.
       *Trying child rules.
    Trying rule: 7301 - Grouping of Symantec AV rules from eventlog.
    Trying rule: 18100 - Group of windows rules.
       *Rule 18100 matched.
       *Trying child rules.
    Trying rule: 18101 - Windows informational event.
    Trying rule: 18102 - Windows warning event.
    Trying rule: 18104 - Windows audit success event.
    Trying rule: 184666 - Sysmon - Suspicious Process - svchost.exe
       *Rule 184666 matched.
       *Trying child rules.
    Trying rule: 184667 - Sysmon - Legitimate Parent Image - svchost.exe


**Phase 3: Completed filtering (rules).
       Rule id: '184666'
       Level: '12'
       Description: 'Sysmon - Suspicious Process - svchost.exe'
**Alert to be generated.


Regards.

On Wednesday, May 18, 2016 at 5:18:28 PM UTC+2, dan (ddpbsd) wrote:
>
> On Wed, May 18, 2016 at 10:47 AM, Issam Aouad Tabet 
> <[email protected] <javascript:>> wrote: 
> > Hey everyone, 
> > 
> > I am windering if anyone can help me with these two questions: 
> > 
> > 1. I am using ossec-logtest file to test my rules in order to match with 
> > some Windows logs. Does anyone know in which order are the rules tested? 
> > It seems it is not ID number order.. 
> > 
> > 2. Here is the default predefined rule that mathes all windows events: 
> > <group name="windows,"> 
> >   <rule id="18100" level="6"> 
> >     <category>windows</category> 
> >     <description>Group of windows rules.</description> 
> >   </rule> 
> > 
> > How is this being linked with windows events logs decoder in 
> > ossec/etc/decoder.xml? Can anyone explain why is this matching all 
> windows 
> > events? Is it through the category tag? Because there is no "match" 
> tag.. 
> > 
>
> Yes, it's the category tag. Here's the windows decoder: 
> <decoder name="windows"> 
>   <type>windows</type> 
>   <prematch>^\d\d\d\d \w\w\w \d\d \d\d:\d\d:\d\d WinEvtLog: 
> |^WinEvtLog: </prematch> 
>   <regex offset="after_prematch">^\.+: (\w+)\((\d+)\): (\.+): </regex> 
>   <regex>(\.+): \.+: (\S+): </regex> 
>   <order>status, id, extra_data, user, system_name</order> 
>   <fts>name, location, user, system_name</fts> 
> </decoder> 
>
> The <type> option sets log messages that match that decoder to "windows." 
> The rules use that as a category. So basically anything that matches 
> the windows decoder should automagically trigger rule 18100. 
> This is preferable to just matching the decoder, because a number of 
> decoders can set the same type. 
>
> > Thanks a lot!! 
> > 
> > -- 
> > 
> > --- 
> > You received this message because you are subscribed to the Google 
> Groups 
> > "ossec-list" group. 
> > To unsubscribe from this group and stop receiving emails from it, send 
> an 
> > email to [email protected] <javascript:>. 
> > For more options, visit https://groups.google.com/d/optout. 
>

-- 

--- 
You received this message because you are subscribed to the Google Groups 
"ossec-list" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to [email protected].
For more options, visit https://groups.google.com/d/optout.

Reply via email to