Hi Jesus,

Yeah, I think I submitted a pull request into OSSEC some time back on 
this...  If memory serves, the other IDs are because I used the existing MS 
ID schema for OSSEC.  The odd IDs are just because these live in my 
local_rules.xml in production.  Sadly, I haven't had the time to update 
OSSEC or try any of the new distributions lately.



On Thursday, May 19, 2016 at 12:25:09 AM UTC-7, Jesus Linares wrote:
>
> Hi Brent,
>
> Your rules are in OSSEC by default (with other ID, why?) but you added a 
> few new rules. 
>
> could you send a PR to OSSEC or Wazuh 
> <https://github.com/wazuh/ossec-rules/tree/development>with your new 
> rules?. 
>
> Thanks.
>
>
> On Wednesday, May 18, 2016 at 8:38:16 PM UTC+2, Rob B wrote:
>>
>> Nice!  Thanks Pedro!  I've got it now..
>>
>> Cheers.
>>
>>
>> On Wednesday, May 18, 2016 at 10:09:14 AM UTC-4, Pedro S wrote:
>>>
>>> Hi Rob,
>>>
>>> *extra_data *is another allowed field used by OSSEC decoders to extract 
>>> information from the event, once it is extracted you can match the field 
>>> content in order to create a rule.
>>> The content of extra_data depends on the decoder which extracted it, in 
>>> Windows decoders  
>>> <https://github.com/wazuh/ossec-rules/blob/master/rules-decoders/ossec/decoders/windows_decoders.xml#L350>could
>>>  
>>> be for example: Win source, Parent Image, Protocol, Signature, Start 
>>> function...
>>>
>>> Best regards,
>>>
>>> Pedro S.
>>>
>>> On Tuesday, May 17, 2016 at 5:32:25 PM UTC+2, Rob B wrote:
>>>>
>>>> Thanks Brent.!     Funny enough, that day I figured it out and built a 
>>>> whole bunch very similar to your list.  Seems to be working very nicely, 
>>>> as 
>>>> now I find myself leaning to creating some down right creative 
>>>> composites....  (finally)
>>>>
>>>> I've been looking for some reference material on the <extra_data> tag? 
>>>>  How is this used properly?
>>>>
>>>>
>>>>
>>>> Cheers!   Rob
>>>>
>>>>
>>>> On Monday, May 16, 2016 at 5:22:08 PM UTC-4, Brent Morris wrote:
>>>>>
>>>>> Rob - can you post your OSSEC version of the log?  I can check my 
>>>>> rules.  These are a culmination of gleaned rules that I updated some time 
>>>>> back with new event IDs.  Yours is covered in there....  but I would like 
>>>>> to test it against a valid OSSEC log.  So if you can post it from the 
>>>>> OSSEC 
>>>>> logs, that'd be great.
>>>>>
>>>>> Here they are..
>>>>>
>>>>> </group>
>>>>> <!-- Microsoft Security Essentials rules -->
>>>>> <!-- see https://technet.microsoft.com/en-us/library/hh144989.aspx -->
>>>>> <group name="windows,mse,">
>>>>>   <rule id="720001" level="0">
>>>>>     <category>windows</category>
>>>>>     <if_sid>18101,18102,18103</if_sid>
>>>>>     <extra_data>^Microsoft Antimalware</extra_data>
>>>>>     <description>Grouping of Microsoft Security Essentials 
>>>>> rules.</description>
>>>>>   </rule>
>>>>>
>>>>>   <rule id="720010" level="12">
>>>>>     <if_sid>720001</if_sid>
>>>>>     <id>^1118$|^1119$</id>
>>>>>     <group>virus,</group>
>>>>>     <description>Microsoft Security Essentials - Virus detected, but 
>>>>> unable to remove.</description>
>>>>>   </rule>
>>>>>   <rule id="720011" level="7">
>>>>>     <if_sid>720001</if_sid>
>>>>>     <id>^1117$</id>
>>>>>     <group>virus,</group>
>>>>>     <description>Microsoft Security Essentials - Virus detected and 
>>>>> properly removed.</description>
>>>>>   </rule>
>>>>>
>>>>>   <rule id="720012" level="7">
>>>>>     <if_sid>720001</if_sid>
>>>>>     <id>^1119$|^1118$|^1117$|^1116$</id>
>>>>>     <group>virus,</group>
>>>>>     <description>Microsoft Security Essentials - Virus 
>>>>> detected.</description>
>>>>>   </rule>
>>>>>
>>>>>   <rule id="720013" level="7">
>>>>>     <if_sid>720001</if_sid>
>>>>>     <id>^1015$</id>
>>>>>     <group>virus,</group>
>>>>>     <description>Microsoft Security Essentials - Suspicious activity 
>>>>> detected.</description>
>>>>>   </rule>
>>>>>
>>>>>    <!-- Service conditions and errors -->
>>>>>   <rule id="720020" level="3">
>>>>>     <if_sid>720001</if_sid>
>>>>>     <id>^5007$</id>
>>>>>     <description>Microsoft Security Essentials - Configuration 
>>>>> changed.</description>
>>>>>     <group>policy_changed,</group>
>>>>>   </rule>
>>>>>   <rule id="720021" level="9">
>>>>>     <if_sid>720001</if_sid>
>>>>>     <id>^5008$</id>
>>>>>     <description>Microsoft Security Essentials - Service 
>>>>> failed.</description>
>>>>>   </rule>
>>>>>   <rule id="720022" level="9">
>>>>>     <if_sid>720001</if_sid>
>>>>>     <id>^3002$</id>
>>>>>     <description>Microsoft Security Essentials - Real time protection 
>>>>> failed.</description>
>>>>>   </rule>
>>>>>   <rule id="720023" level="8">
>>>>>     <if_sid>720001</if_sid>
>>>>>     <id>^2012$</id>
>>>>>     <description>Microsoft Security Essentials - Cannot use Dynamic 
>>>>> Signature Service.</description>
>>>>>   </rule>
>>>>>   <rule id="720024" level="8">
>>>>>     <if_sid>720001</if_sid>
>>>>>     <id>^2004$</id>
>>>>>     <description>Microsoft Security Essentials - Loading definitions 
>>>>> failed. Using last good set.</description>
>>>>>   </rule>
>>>>>   <rule id="720025" level="8">
>>>>>     <if_sid>720001</if_sid>
>>>>>     <id>^2003$</id>
>>>>>     <description>Microsoft Security Essentials - Engine update 
>>>>> failed.</description>
>>>>>   </rule>
>>>>>   <rule id="720026" level="8">
>>>>>     <if_sid>720001</if_sid>
>>>>>     <id>^2001$</id>
>>>>>     <description>Microsoft Security Essentials - Definitions update 
>>>>> failed.</description>
>>>>>   </rule>
>>>>>   <rule id="720027" level="7">
>>>>>     <if_sid>720001</if_sid>
>>>>>     <id>^1005$</id>
>>>>>     <description>Microsoft Security Essentials - Scan error. Scan has 
>>>>> stopped.</description>
>>>>>   </rule>
>>>>>   <rule id="720028" level="5">
>>>>>     <if_sid>720001</if_sid>
>>>>>     <id>^1002$</id>
>>>>>     <description>Microsoft Security Essentials - Scan stopped before 
>>>>> completion.</description>
>>>>>   </rule>
>>>>>
>>>>>   <!-- EICAR test file special case -->
>>>>>   <!-- www.eicar.org/86-0-Intended-use.html -->
>>>>>   <rule id="720041" level="5">
>>>>>     <if_sid>720012</if_sid>
>>>>>     <match>Virus:DOS/EICAR_Test_File</match>
>>>>>     <options>alert_by_email</options>
>>>>>     <description>Microsoft Security Essentials - EICAR test file 
>>>>> detected.</description>
>>>>>   </rule>
>>>>>   <rule id="720042" level="3">
>>>>>     <if_sid>720011</if_sid>
>>>>>     <match>Virus:DOS/EICAR_Test_File</match>
>>>>>     <options>alert_by_email</options>
>>>>>     <description>Microsoft Security Essentials - EICAR test file 
>>>>> removed.</description>
>>>>>   </rule>
>>>>>   <rule id="720043" level="8">
>>>>>     <if_sid>720010</if_sid>
>>>>>     <match>Virus:DOS/EICAR_Test_File</match>
>>>>>     <options>alert_by_email</options>
>>>>>     <description>Microsoft Security Essentials - EICAR test file 
>>>>> detected, but removal failed.</description>
>>>>>   </rule>
>>>>>
>>>>>   <!-- Status messages -->
>>>>>   <rule id="720050" level="3">
>>>>>     <if_sid>720001</if_sid>
>>>>>     <id>^2000$</id>
>>>>>     <description>Microsoft Security Essentials - Signature database 
>>>>> updated.</description>
>>>>>   </rule>
>>>>>   <rule id="720051" level="3">
>>>>>     <if_sid>720001</if_sid>
>>>>>     <id>^2002$</id>
>>>>>     <description>Microsoft Security Essentials - Scan engine 
>>>>> updated.</description>
>>>>>   </rule>
>>>>>   <rule id="720053" level="3">
>>>>>     <if_sid>720001</if_sid>
>>>>>     <id>^1000$|^1001$</id>
>>>>>     <description>Microsoft Security Essentials - Scan started or 
>>>>> stopped.</description>
>>>>>   </rule>
>>>>>   <rule id="720054" level="4">
>>>>>     <if_sid>720001</if_sid>
>>>>>     <id>^1013$</id>
>>>>>     <description>Microsoft Security Essentials - History 
>>>>> cleared.</description>
>>>>>   </rule>
>>>>>
>>>>>   <!-- Time based alerts -->
>>>>>   <rule id="720070" level="10" frequency="4" timeframe="240">
>>>>>     <if_matched_sid>720011</if_matched_sid>
>>>>>     <description>Multiple Microsoft Security Essentials AV warnings 
>>>>> detected.</description>
>>>>>   </rule>
>>>>>   <rule id="720071" level="10" frequency="4" timeframe="240">
>>>>>     <if_matched_sid>720012</if_matched_sid>
>>>>>     <description>Multiple Microsoft Security Essentials AV warnings 
>>>>> detected.</description>
>>>>>   </rule>
>>>>>
>>>>> </group> <!-- mse -->
>>>>>
>>>>>
>>>>> On Friday, April 22, 2016 at 1:16:22 PM UTC-7, Rob B wrote:
>>>>>>
>>>>>> Hello All,
>>>>>>
>>>>>>    Does anyone have a decoder for Windows Defender floating around 
>>>>>> out there??
>>>>>>
>>>>>> Im having a heck of a time...   Here is the event channel event 
>>>>>> example if anyone is curious or can help:  (Win10 box)
>>>>>>
>>>>>> Log Name:      Microsoft-Windows-Windows Defender/Operational
>>>>>> Source:        Microsoft-Windows-Windows Defender
>>>>>> Date:          4/22/2016 4:05:17 PM
>>>>>> Event ID:      1116
>>>>>> Task Category: None
>>>>>> Level:         Warning
>>>>>> Keywords:      
>>>>>> User:          SYSTEM
>>>>>> Computer:      VICTIM0
>>>>>> Description:
>>>>>> Windows Defender has detected malware or other potentially unwanted 
>>>>>> software.
>>>>>>  For more information please see the following:
>>>>>>
>>>>>> http://go.microsoft.com/fwlink/?linkid=37020&name=Trojan:Win32/Bagsu!rfn&threatid=2147694406&enterprise=0
>>>>>>   Name: Trojan:Win32/Bagsu!rfn
>>>>>>   ID: 2147694406
>>>>>>   Severity: Severe
>>>>>>   Category: Trojan
>>>>>>   Path: 
>>>>>> containerfile:_\\10.0.1.10\share\Malware_For_Demo\REAL_BAD_Malz2\Server.exe;file:_\\10.0.1.10\share\Malware_For_Demo\REAL_BAD_Malz2\Server.exe;file:_\\10.0.1.10\share\Malware_For_Demo\REAL_BAD_Malz2\Server.exe->(VFS:svchost.exe)
>>>>>>   Detection Origin: Network share
>>>>>>   Detection Type: Concrete
>>>>>>   Detection Source: Real-Time Protection
>>>>>>   User: frog
>>>>>>   Process Name: C:\Windows\explorer.exe
>>>>>>   Signature Version: AV: 1.217.2054.0, AS: 1.217.2054.0, NIS: 
>>>>>> 115.8.0.0
>>>>>>   Engine Version: AM: 1.1.12603.0, NIS: 2.1.11804.0
>>>>>>
>>>>>> Event Xml:
>>>>>> <Event xmlns="http://schemas.microsoft.com/win/2004/08/events/event";>
>>>>>>   <System>
>>>>>>     <Provider Name="Microsoft-Windows-Windows Defender" 
>>>>>> Guid="{11CD958A-C507-4EF3-B3F2-5FD9DFBD2C78}" />
>>>>>>     <EventID>1116</EventID>
>>>>>>     <Version>0</Version>
>>>>>>     <Level>3</Level>
>>>>>>     <Task>0</Task>
>>>>>>     <Opcode>0</Opcode>
>>>>>>     <Keywords>0x8000000000000000</Keywords>
>>>>>>     <TimeCreated SystemTime="2016-04-22T20:05:17.551083000Z" />
>>>>>>     <EventRecordID>95</EventRecordID>
>>>>>>     <Correlation ActivityID="{ECC2B320-F9A6-41AD-9F17-5C9EE24D3330}" 
>>>>>> />
>>>>>>     <Execution ProcessID="2332" ThreadID="4540" />
>>>>>>     <Channel>Microsoft-Windows-Windows Defender/Operational</Channel>
>>>>>>     <Computer>VICTIM0</Computer>
>>>>>>     <Security UserID="S-1-5-77" />
>>>>>>   </System>
>>>>>>   <EventData>
>>>>>>     <Data Name="Product Name">%%827</Data>
>>>>>>     <Data Name="Product Version">4.9.10586.0</Data>
>>>>>>     <Data Name="Detection 
>>>>>> ID">{CAADD684-36C9-444B-8A6D-8CE537A93E40}</Data>
>>>>>>     <Data Name="Detection Time">2016-04-22T20:04:40.369Z</Data>
>>>>>>     <Data Name="Unused">
>>>>>>     </Data>
>>>>>>     <Data Name="Unused2">
>>>>>>     </Data>
>>>>>>     <Data Name="Threat ID">2147694406</Data>
>>>>>>     <Data Name="Threat Name">Trojan:Win32/Bagsu!rfn</Data>
>>>>>>     <Data Name="Severity ID">5</Data>
>>>>>>     <Data Name="Severity Name">Severe</Data>
>>>>>>     <Data Name="Category ID">8</Data>
>>>>>>     <Data Name="Category Name">Trojan</Data>
>>>>>>     <Data Name="FWLink">
>>>>>> http://go.microsoft.com/fwlink/?linkid=37020&amp;name=Trojan:Win32/Bagsu!rfn&amp;threatid=2147694406&amp;enterprise=0
>>>>>> </Data>
>>>>>>     <Data Name="Status Code">1</Data>
>>>>>>     <Data Name="Status Description">
>>>>>>     </Data>
>>>>>>     <Data Name="State">1</Data>
>>>>>>     <Data Name="Source ID">3</Data>
>>>>>>     <Data Name="Source Name">%%818</Data>
>>>>>>     <Data Name="Process Name">C:\Windows\explorer.exe</Data>
>>>>>>     <Data Name="Detection User">frog</Data>
>>>>>>     <Data Name="Unused3">
>>>>>>     </Data>
>>>>>>     <Data 
>>>>>> Name="Path">containerfile:_\\10.0.1.10\share\Malware_For_Demo\REAL_BAD_Malz2\Server.exe;file:_\\10.0.1.10\share\Malware_For_Demo\REAL_BAD_Malz2\Server.exe;file:_\\10.0.1.10\share\Malware_For_Demo\REAL_BAD_Malz2\Server.exe-&gt;(VFS:svchost.exe)</Data>
>>>>>>     <Data Name="Origin ID">2</Data>
>>>>>>     <Data Name="Origin Name">%%846</Data>
>>>>>>     <Data Name="Execution ID">1</Data>
>>>>>>     <Data Name="Execution Name">%%813</Data>
>>>>>>     <Data Name="Type ID">0</Data>
>>>>>>     <Data Name="Type Name">%%822</Data>
>>>>>>     <Data Name="Pre Execution Status">0</Data>
>>>>>>     <Data Name="Action ID">9</Data>
>>>>>>     <Data Name="Action Name">%%887</Data>
>>>>>>     <Data Name="Unused4">
>>>>>>     </Data>
>>>>>>     <Data Name="Error Code">0x00000000</Data>
>>>>>>     <Data Name="Error Description">The operation completed 
>>>>>> successfully. </Data>
>>>>>>     <Data Name="Unused5">
>>>>>>     </Data>
>>>>>>     <Data Name="Post Clean Status">0</Data>
>>>>>>     <Data Name="Additional Actions ID">0</Data>
>>>>>>     <Data Name="Additional Actions String">No additional actions 
>>>>>> required</Data>
>>>>>>     <Data Name="Remediation User">
>>>>>>     </Data>
>>>>>>     <Data Name="Unused6">
>>>>>>     </Data>
>>>>>>     <Data Name="Signature Version">AV: 1.217.2054.0, AS: 
>>>>>> 1.217.2054.0, NIS: 115.8.0.0</Data>
>>>>>>     <Data Name="Engine Version">AM: 1.1.12603.0, NIS: 
>>>>>> 2.1.11804.0</Data>
>>>>>>   </EventData>
>>>>>> </Event>
>>>>>>
>>>>>>
>>>>>> Thanks!, Rob
>>>>>>
>>>>>

-- 

--- 
You received this message because you are subscribed to the Google Groups 
"ossec-list" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to [email protected].
For more options, visit https://groups.google.com/d/optout.

Reply via email to