Skip to content

Latest commit

 

History

History
41 lines (36 loc) · 1.74 KB

what-is-sysmon.md

File metadata and controls

41 lines (36 loc) · 1.74 KB

What is Sysmon

Sysmon is a free tool initially developed by Mark Russinovich and has contributions by Tomas Garnier, David Magnotti, Mark Cook, Rob Mead, Giulia Biagini, and others at Microsoft. The tool is designed to extend the current logging capabilities in Windows to aid in understanding and detecting attackers by behavior. It was developed originally for internal use at Microsoft. (Note: There are still two versions of the tool—internal and external.) Currently, the tool supports 64-bit and 32-bit systems and uses a single command line tool for installation and configuration management.

All of the events generated by Sysmon are saved in Microsoft-Windows-Sysmon/Operational EventLog in order to accomodate security products that already leverage the EventLog, and to make the events easier to view and collect.

Sysmon is able to monitor for a series of actions on a Windows host that relate to existing behavior that is abused by threat actors. With this view on the actions, defenders are able to better detect abnormal behavior and abuses on a system.

The table below shows the event types and event ID for each.

EventType EventId
Sysmon Service Status Changed 0
ProcessCreate 1
FileCreateTime 2
NetworkConnect 3
Service State Change 4
ProcessTerminate 5
DriverLoad 6
ImageLoad 7
CreateRemoteThread 8
RawAccessRead 9
ProcessAccess 10
FileCreate 11
Registry object added or deleted 12
Registry Create 13
Registry Rename 14
FileCreateStreamHash 15
Sysmon Config Change 16
Named Pipe Create 17
Named Pipe Connected 18
WMI Event Filter 19
WMI Event Consumer 20
WMI Consumer to Filter 21
DNS Query 22
File Delete 23
Clipboard Capture 24
Process Tampering 25
File Delete Detected 26
Error 255