TTPwire Vol. 1 · MITRE ATT&CK·Tagged

← All stories

Black Hills InfoSec

Parsing Sysmon Logs on Microsoft Sentinel

Kassie Kimball · 2023-03-07 · Read original ↗

ATT&CK techniques detected

3 predictions
T1654Log Enumeration
96%
"parsing sysmon logs on microsoft sentinel parsing sysmon logs on microsoft sentinel tl ; dr : many parsers have been written and several are referenced here. this blog describes a simple parser for sysmon logs through event id ( eid ) 28 for microsoft sentinel. let ’ s start with…"
T1654Log Enumeration
46%
"users * \ downloads ) locations in userland get blocked with the sysmon eid 27 configuration shown above. this configuration is insufficient for proper usage for modern protective considerations but demonstrates the possibilities. this event then gets written to windows logs. ass…"
T1055.001Dynamic-link Library Injection
40%
"– the best system monitor for windows! even better than windows auditing! olaf hartong ’ s sysmon modular – the best configuration generator for sysmon ever shared with the world! olaf hartong ’ s recent article on sysmon eid 27 – file block executables – and the baseline for get…"

Summary

Jordan Drysdale // Tl;dr: Many parsers have been written and several are referenced here. This blog describes a simple parser for Sysmon logs through Event ID (EID) 28 for Microsoft […]

The post Parsing Sysmon Logs on Microsoft Sentinel appeared first on Black Hills Information Security, Inc..