icon/x Created with Sketch.

Splunk Cookie Policy

We use our own and third-party cookies to provide you with a great online experience. We also use these cookies to improve our products and services, support our marketing campaigns, and advertise to you on our website and other websites. Some cookies may continue to collect information after you have left our website. Learn more (including how to update your settings) here.
Accept Cookie Policy

We are working on something new...

A Fresh New Splunkbase
We are designing a New Splunkbase to improve search and discoverability of apps. Check out our new and improved features like Categories and Collections. New Splunkbase is currently in preview mode, as it is under active development. We welcome you to navigate New Splunkbase and give us feedback.

Accept License Agreements

This app is provided by a third party and your right to use the app is in accordance with the license provided by that third-party licensor. Splunk is not responsible for any third-party apps and does not provide any warranty or support. If you have any questions, complaints or claims with respect to this app, please contact the licensor directly.

Thank You

Downloading Sysmon Security Monitoring App for Splunk
SHA256 checksum (sysmon-security-monitoring-app-for-splunk_4013.tgz) b7f2057c1117c8ef089754774738b6e2efc68279b3d281ed65a0687f0c046ea1 SHA256 checksum (sysmon-security-monitoring-app-for-splunk_4011.tgz) c52346cb23bf9f3ef2ba8471c4b739168596943961177a8d99cdb9eccbe22b98 SHA256 checksum (sysmon-security-monitoring-app-for-splunk_4010.tgz) 8eb1f01586a19cb9a7a2a6b7d7ba23f3c7ad983d3d67e59766c10c152b10db01 SHA256 checksum (sysmon-security-monitoring-app-for-splunk_409.tgz) 0a9f8a3437100b49a67a6ee6f08d333395dd29dd293784b92e803c8932d1f2a8 SHA256 checksum (sysmon-security-monitoring-app-for-splunk_408.tgz) 8a94e81d55aaaed414aa6bf9224bb7307fe6064d21d6342e46fbea59786e4576 SHA256 checksum (sysmon-security-monitoring-app-for-splunk_407.tgz) fa5bcd0698e79dd3eb0ed2746a793fe451ebdd973b034bf6775859822bddc92f SHA256 checksum (sysmon-security-monitoring-app-for-splunk_400.tgz) 7f258179ca853b5dc1f0a78dc1a69fbc81329fe30105ca7c3299bea9a1ed6ed0 SHA256 checksum (sysmon-security-monitoring-app-for-splunk_300.tgz) b0b4d58b7a7cddbf739072ee92f614da1ab84979f40612a4c9155103cf099ca5 SHA256 checksum (sysmon-security-monitoring-app-for-splunk_200.tgz) e82a4b551429a36d8d3327b6660724064be117269d061c0449c536375364a6d8 SHA256 checksum (sysmon-security-monitoring-app-for-splunk_100.tgz) bccaffd7b91854b51e3bead760e632c51b676dce3ec37437753737a54faac5fe
To install your download
For instructions specific to your download, click the Details tab after closing this window.

Flag As Inappropriate

splunk

Sysmon Security Monitoring App for Splunk

This app has been archived. Learn more about app archiving.
This app is NOT supported by Splunk. Please read about what that means for you here.
Overview
Details
This app provides alerts built with splunk search macros to detect a wide variety of suspicious activity in Windows environment via Windows Sysmon and Event Logs. It is designed for 'blue-team' team members.

splunksysmonsecurity

Splunk app with security alerts to generate detections via Microsoft Sysmon and Windows Event Logs

This app provides alerts built with splunk search macros to detect a wide variety of suspicious activity in Windows environment. It is designed for 'blue-team' team members to identify suspicious activity in Windows environment.

Design

The app consists of a number of search macros which for detection of various Windows threats. The macros are listed in Advanced Search > Search Macros with sysmon_detect_* being the detection rules leveraging Sysmon and Windows Event logs

Other macros include:

  • sysmon_search - Base search used to search Sysmon logs. Used across most detection rules.
  • winlog_search - Base search used to search Windows Event logs. Used across most detection rules.
  • sysmon_rename_fields - Search used to rename/create new fields in Sysmon. Used across most detection rules.
  • sysmon_rename_fields - Search used to rename/create new fields in Windows Event Logs. Used across most detection rules.
  • sysmon_create_alert - Search used to add an alert to a lookup table. The fields in lookup table are based on Mitre Attack Framework
  • sysmon_tabulate - Tabulates the sysmon fields when searching sysmon event logs
  • winlog_tabulate_fields - Tabulates the sysmon fields when searching windows event logs

Out of the box, the splunk alerts are not currently triggered. However, it is quite easy to customize and setup appropriate alerts based on the search macros. Example alert is already created called sysmon_detect_nopac_computer_account_creation_cve_2021_42278 which is based on search macro sysmon_detect_nopac_computer_account_creation_cve_2021_42278

Setup

Install the app via Splunk Manage App.

Ensure that the Sysmon logs and Windows Event logs are enabled on the platform to be monitored for the relevant universal forwarder to forward logs to Splunk App.

For this Splunk App, the rules built typically use the following logs: -

  • Sysmon - Via customised version of SwiftOnSecurity's sysmon config to generate the relevant event logs to Splunk. This config is available here.

  • Windows Event Logs - Enabled via Local Security Policy > Security Settings > Local Policies > Audit Policy. The following settings are recommended to be turned on for Success, Failure:

    • Audit Account Logon Events
    • Audit Account Management
    • Audit Directory Services Accesses
    • Audit Logon Events
    • Audit Object Access
    • Audit Policy Change
  • Disable Windows Network Filtering Connections - Disable the Windows Network Filtering Connections as these logs can be very verbose

auditpol /set /subcategory:"Filtering Platform Connection" /success:disable /failure:enable

To configure the Splunk Universal Forwarder in Windows, the inputs.conf file available here was used to forward logs to Splunk

Refer to this guide on how to forward Sysmon Logs to Splunk.

Refer to this guide on how to forward Windows Event Logs to Splunk.

By default, the app searches index=main for sourcetype=WinEventLog:Microsoft-Windows-Sysmon/Operational (Sysmon logs) and sourcetype=WinEventLog:* (Windows Event logs).

If that is not the case, update the sysmon_search and winlog_search search macros with the log locations.

Detections

A list of all alerts categorized by the MITRE ATT&CK MATRIX built in this app are provided here and is also listed in Appendix below.

The link above additionally describes the steps to emulate the various alerts built in this app.

Reviewing Splunk alert definitions

To list all the splunk alerts included in this app, simply download and extract the Splunk app from splunkbase, and use grep to search list all the unique alert names:

cd /opt/splunksysmonsecurity/default
grep -rhioE "\[sysmon_detect_[a-zA-Z0-9_]+" savedsearches.conf | sort | uniq

To extract a specific splunk alert definition, utilize this grep search for the alert name:

cd /opt/splunksysmonsecurity/default
grep -r -n -i -A 20 sysmon_detect_lsass_memory_dumps_temp_folder  macros.conf savedsearches.conf

Appendix

Developer Notes

These are notes for this app developer's reference

Preparing app for deployment to Splunk

Refer to the steps here

List of Alerts

Release Notes

Version 4.0.13
April 7, 2023

Added new alerts:

sysmon_detect_shadow_credentials_creation
sysmon_detect_execution_filename_mismatch
sysmon_detect_lolbin_network_connection
sysmon_detect_rdp_hijacking_lastloggedon_user_hide_attempt
sysmon_detect_rdp_portnumber_change

Version 4.0.11
March 27, 2023

Added 2 alerts - sysmon_detect_chrome_credentials_read, sysmon_detect_firefox_credentials_read

Version 4.0.10
March 21, 2023

Added Windows Sysmon alert (sysmon_detect_localpotato_lpe_storsvc)

Version 4.0.9
March 19, 2023

Added alerting for attempt to steal ntlm hashes using masky (sysmon_detect_ntlm_hashes_extraction_masky)

Version 4.0.8
March 14, 2023

Added 3 new alerts:
sysmon_detect_dotnet_assembly_execution_unusual_locations
sysmon_detect_powershell_assembly_invoked_unusual
sysmon_detect_powershell_execution_non_windows_po

Version 4.0.7
March 12, 2023

Added 2 new alerts - sysmon_detect_lsass_memory_werfault_rtlreportsilentprocessExit, sysmon_detect_domain_enumeration_bloodhound

Version 4.0.0
Sept. 4, 2022
  • Added alerts for all previously created search macros
  • Fixed bugs discovered by AppInspect
  • Added new alerts/search macros. For a list of all supported alerts, please the list here
Version 3.0.0
Jan. 29, 2022
  • Added new detections such as credential dumping detection via ntdsutil
Version 2.0.0
Dec. 27, 2021
  • Added updates to package to fix Appinspect findings
  • Added a simple dashboard
  • Added icons
Version 1.0.0
Dec. 26, 2021

Initial release

Currently, the following detections (as search macros / alerts) have been been added to this app:

  • sysmon_detect_adhunttool: Detects ADHunt tool
  • sysmon_detect_windows_powershell_suspicious_command_exec: Detects strings that contain suspicious powershell patterns typically associated with malware
  • sysmon_detect_windows_powershell_long_command_exec: Detects very long powershell strings typically associated with malware
  • sysmon_detect_windows_network_connections_beaconing: Detects regular outbound network connections/beacons
  • sysmon_detect_windows_dns_connections_beaconing: Detects regular windows DNS connections/beacons
  • sysmon_detect_rubeus_via_command_line_params: Detects rubeus hacking tool in the use via command line params
  • sysmon_detect_kerberoasting_4769: Detects Kerberoasting for SPNs via Event ID 4769
  • sysmon_detect_nopac_computer_account_creation_cve_2021_42278: Detects NoPAC commuter account creation
  • sysmon_detect_unusual_shell_commands: Detects unusual shell commands being called indicating a hacker or windows administrator activity
  • sysmon_detect_spn_shell_command_kerberoasting: Detects calling of setspn command used to identify kerberoasting
  • sysmon_detect_pass_the_hash: Detect pass-the-hash attempts via windows event logs

Subscribe Share

Are you a developer?

As a Splunkbase app developer, you will have access to all Splunk development resources and receive a 10GB license to build an app that will help solve use cases for customers all over the world. Splunkbase has 1000+ apps from Splunk, our partners and our community. Find an app for most any data source and user need, or simply create your own with help from our developer portal.

Follow Us:
Splunk, Splunk>,Turn Data Into Doing, Data-to-Everything, and D2E are trademarks or registered trademarks of Splunk LLC in the United States and other countries. All other brand names,product names,or trademarks belong to their respective owners.