icon/x Created with Sketch.

Splunk Cookie Policy

We use our own and third-party cookies to provide you with a great online experience. We also use these cookies to improve our products and services, support our marketing campaigns, and advertise to you on our website and other websites. Some cookies may continue to collect information after you have left our website. Learn more (including how to update your settings) here.
Accept Cookie Policy

We are working on something new...

A Fresh New Splunkbase
We are designing a New Splunkbase to improve search and discoverability of apps. Check out our new and improved features like Categories and Collections. New Splunkbase is currently in preview mode, as it is under active development. We welcome you to navigate New Splunkbase and give us feedback.

Accept License Agreements

This app is provided by a third party and your right to use the app is in accordance with the license provided by that third-party licensor. Splunk is not responsible for any third-party apps and does not provide any warranty or support. If you have any questions, complaints or claims with respect to this app, please contact the licensor directly.

Thank You

Downloading Sysmon Security Monitoring App for Splunk
SHA256 checksum (sysmon-security-monitoring-app-for-splunk_4013.tgz) abfa53c6fcf30fe0cccba2eb5e4b0a1ff5e3d0eb958439affc19ba5c026a62a8 SHA256 checksum (sysmon-security-monitoring-app-for-splunk_4011.tgz) d0cb500fe45b0d6325bc390b6123e5eb12b50a5f62f69fe7c76433668532c492 SHA256 checksum (sysmon-security-monitoring-app-for-splunk_4010.tgz) 5f7f407c199b8da78cab35ac70a796970bfa0df134c297fcc84a91364db56de4 SHA256 checksum (sysmon-security-monitoring-app-for-splunk_409.tgz) cdcad2e9fc5016498021466070ba525b504e598e22d375256a177775b04d382f SHA256 checksum (sysmon-security-monitoring-app-for-splunk_408.tgz) 521b85e0e0e75c06460b7c47b2db572f5491a149b9dab1247672606ee87c65b5 SHA256 checksum (sysmon-security-monitoring-app-for-splunk_407.tgz) 7d6d72e40c95f485fef21cb12d4595a731552018b458a323b4bd90fee949c4ad SHA256 checksum (sysmon-security-monitoring-app-for-splunk_400.tgz) 9eb2ac7c580a5f9efc3a8d644b3674784e6efff7073ee9ba2f76f94af2302da2 SHA256 checksum (sysmon-security-monitoring-app-for-splunk_300.tgz) ce17abe9429d55687062fb574be97d70bac313ee44b47b0c1640459428d6396d SHA256 checksum (sysmon-security-monitoring-app-for-splunk_200.tgz) 8f978f67ce260b2c88272b2cf2cc731bc7f77775823a24d8dbae853520bc3aca SHA256 checksum (sysmon-security-monitoring-app-for-splunk_100.tgz) 17095d922b28fc6df261e388d1d55a9b2a7499cdb7d326e82db64cf602197729
To install your download
For instructions specific to your download, click the Details tab after closing this window.

Flag As Inappropriate

splunk

Sysmon Security Monitoring App for Splunk

Overview
Details
This app provides alerts built with splunk search macros to detect a wide variety of suspicious activity in Windows environment via Windows Sysmon and Event Logs. It is designed for 'blue-team' team members.

splunksysmonsecurity

Splunk app with security alerts to generate detections via Microsoft Sysmon and Windows Event Logs

This app provides alerts built with splunk search macros to detect a wide variety of suspicious activity in Windows environment. It is designed for 'blue-team' team members to identify suspicious activity in Windows environment.

Design

The app consists of a number of search macros which for detection of various Windows threats. The macros are listed in Advanced Search > Search Macros with sysmon_detect_* being the detection rules leveraging Sysmon and Windows Event logs

Other macros include:

  • sysmon_search - Base search used to search Sysmon logs. Used across most detection rules.
  • winlog_search - Base search used to search Windows Event logs. Used across most detection rules.
  • sysmon_rename_fields - Search used to rename/create new fields in Sysmon. Used across most detection rules.
  • sysmon_rename_fields - Search used to rename/create new fields in Windows Event Logs. Used across most detection rules.
  • sysmon_create_alert - Search used to add an alert to a lookup table. The fields in lookup table are based on Mitre Attack Framework
  • sysmon_tabulate - Tabulates the sysmon fields when searching sysmon event logs
  • winlog_tabulate_fields - Tabulates the sysmon fields when searching windows event logs

Out of the box, the splunk alerts are not currently triggered. However, it is quite easy to customize and setup appropriate alerts based on the search macros. Example alert is already created called sysmon_detect_nopac_computer_account_creation_cve_2021_42278 which is based on search macro sysmon_detect_nopac_computer_account_creation_cve_2021_42278

Setup

Install the app via Splunk Manage App.

Ensure that the Sysmon logs and Windows Event logs are enabled on the platform to be monitored for the relevant universal forwarder to forward logs to Splunk App.

For this Splunk App, the rules built typically use the following logs: -

  • Sysmon - Via customised version of SwiftOnSecurity's sysmon config to generate the relevant event logs to Splunk. This config is available here.

  • Windows Event Logs - Enabled via Local Security Policy > Security Settings > Local Policies > Audit Policy. The following settings are recommended to be turned on for Success, Failure:

    • Audit Account Logon Events
    • Audit Account Management
    • Audit Directory Services Accesses
    • Audit Logon Events
    • Audit Object Access
    • Audit Policy Change
  • Disable Windows Network Filtering Connections - Disable the Windows Network Filtering Connections as these logs can be very verbose

auditpol /set /subcategory:"Filtering Platform Connection" /success:disable /failure:enable

To configure the Splunk Universal Forwarder in Windows, the inputs.conf file available here was used to forward logs to Splunk

Refer to this guide on how to forward Sysmon Logs to Splunk.

Refer to this guide on how to forward Windows Event Logs to Splunk.

By default, the app searches index=main for sourcetype=WinEventLog:Microsoft-Windows-Sysmon/Operational (Sysmon logs) and sourcetype=WinEventLog:* (Windows Event logs).

If that is not the case, update the sysmon_search and winlog_search search macros with the log locations.

Detections

A list of all alerts categorized by the MITRE ATT&CK MATRIX built in this app are provided here and is also listed in Appendix below.

The link above additionally describes the steps to emulate the various alerts built in this app.

Reviewing Splunk alert definitions

To list all the splunk alerts included in this app, simply download and extract the Splunk app from splunkbase, and use grep to search list all the unique alert names:

cd /opt/splunksysmonsecurity/default
grep -rhioE "\[sysmon_detect_[a-zA-Z0-9_]+" savedsearches.conf | sort | uniq

To extract a specific splunk alert definition, utilize this grep search for the alert name:

cd /opt/splunksysmonsecurity/default
grep -r -n -i -A 20 sysmon_detect_lsass_memory_dumps_temp_folder  macros.conf savedsearches.conf

Appendix

Developer Notes

These are notes for this app developer's reference

Preparing app for deployment to Splunk

Refer to the steps here

List of Alerts

Release Notes

Version 4.0.13
April 7, 2023

Added new alerts:

sysmon_detect_shadow_credentials_creation
sysmon_detect_execution_filename_mismatch
sysmon_detect_lolbin_network_connection
sysmon_detect_rdp_hijacking_lastloggedon_user_hide_attempt
sysmon_detect_rdp_portnumber_change

Version 4.0.11
March 27, 2023

Added 2 alerts - sysmon_detect_chrome_credentials_read, sysmon_detect_firefox_credentials_read

Version 4.0.10
March 21, 2023

Added Windows Sysmon alert (sysmon_detect_localpotato_lpe_storsvc)

Version 4.0.9
March 19, 2023

Added alerting for attempt to steal ntlm hashes using masky (sysmon_detect_ntlm_hashes_extraction_masky)

Version 4.0.8
March 14, 2023

Added 3 new alerts:
sysmon_detect_dotnet_assembly_execution_unusual_locations
sysmon_detect_powershell_assembly_invoked_unusual
sysmon_detect_powershell_execution_non_windows_po

Version 4.0.7
March 12, 2023

Added 2 new alerts - sysmon_detect_lsass_memory_werfault_rtlreportsilentprocessExit, sysmon_detect_domain_enumeration_bloodhound

Version 4.0.0
Sept. 4, 2022
  • Added alerts for all previously created search macros
  • Fixed bugs discovered by AppInspect
  • Added new alerts/search macros. For a list of all supported alerts, please the list here
Version 3.0.0
Jan. 29, 2022
  • Added new detections such as credential dumping detection via ntdsutil
Version 2.0.0
Dec. 27, 2021
  • Added updates to package to fix Appinspect findings
  • Added a simple dashboard
  • Added icons
Version 1.0.0
Dec. 26, 2021

Initial release

Currently, the following detections (as search macros / alerts) have been been added to this app:

  • sysmon_detect_adhunttool: Detects ADHunt tool
  • sysmon_detect_windows_powershell_suspicious_command_exec: Detects strings that contain suspicious powershell patterns typically associated with malware
  • sysmon_detect_windows_powershell_long_command_exec: Detects very long powershell strings typically associated with malware
  • sysmon_detect_windows_network_connections_beaconing: Detects regular outbound network connections/beacons
  • sysmon_detect_windows_dns_connections_beaconing: Detects regular windows DNS connections/beacons
  • sysmon_detect_rubeus_via_command_line_params: Detects rubeus hacking tool in the use via command line params
  • sysmon_detect_kerberoasting_4769: Detects Kerberoasting for SPNs via Event ID 4769
  • sysmon_detect_nopac_computer_account_creation_cve_2021_42278: Detects NoPAC commuter account creation
  • sysmon_detect_unusual_shell_commands: Detects unusual shell commands being called indicating a hacker or windows administrator activity
  • sysmon_detect_spn_shell_command_kerberoasting: Detects calling of setspn command used to identify kerberoasting
  • sysmon_detect_pass_the_hash: Detect pass-the-hash attempts via windows event logs

Subscribe Share

Are you a developer?

As a Splunkbase app developer, you will have access to all Splunk development resources and receive a 10GB license to build an app that will help solve use cases for customers all over the world. Splunkbase has 1000+ apps from Splunk, our partners and our community. Find an app for most any data source and user need, or simply create your own with help from our developer portal.

Follow Us:
Splunk, Splunk>,Turn Data Into Doing, Data-to-Everything, and D2E are trademarks or registered trademarks of Splunk LLC in the United States and other countries. All other brand names,product names,or trademarks belong to their respective owners.