Skip to content

Commit 91c9f54

Browse files
author
ionstorm
committed
Re-enable Browser Extension monitoring for Chrome, added MITRE Tagging
1 parent 00185b9 commit 91c9f54

File tree

1 file changed

+8
-4
lines changed

1 file changed

+8
-4
lines changed

sysmonconfig-export.xml

+8-4
Original file line numberDiff line numberDiff line change
@@ -6753,10 +6753,10 @@
67536753
<Rule name="Attack=None,Technique=None,Tactic=None,DS=File: File Creation,Level=0,Desc=CIA Vault7: https://wikileaks.org/ciav7p1/cms/page_16384212.html" groupRelation="and">
67546754
<TargetFilename condition="contains">.mht</TargetFilename>
67556755
</Rule>
6756-
<Rule name="Attack=None,Technique=None,Tactic=None,DS=File: File Creation,Level=0,Desc=Chrome Extensions" groupRelation="and">
6756+
<Rule name="Attack=T1176,Technique=Browser Extensions,Tactic=Persistence,DS=File: File Creation,Level=0,Desc=Chrome Extensions" groupRelation="and">
67576757
<TargetFilename condition="contains">\Chrome\User Data\Default\Extensions\</TargetFilename>
67586758
</Rule>
6759-
<Rule name="Attack=None,Technique=None,Tactic=None,DS=File: File Creation,Level=0,Desc=Chrome extension" groupRelation="and">
6759+
<Rule name="Attack=T1176,Technique=Browser Extensions,Tactic=Persistence,DS=File: File Creation,Level=0,Desc=Chrome extension auditing" groupRelation="and">
67606760
<TargetFilename condition="end with">.crx</TargetFilename>
67616761
</Rule>
67626762
<Rule name="Attack=None,Technique=None,Tactic=None,DS=File: File Creation,Level=0,Desc=ClickOnce extension" groupRelation="and">
@@ -7123,11 +7123,16 @@
71237123
<!--MITRE ATT&CK TECHNIQUE: Windows Management Instrumentation-->
71247124

71257125
<!--MITRE ATT&CK TACTIC: Persistence-->
7126-
<Rule name="Attack=None,Technique=None,Tactic=None,DS=Windows Registry: Windows Registry Key Modification,Level=0,Forensic=Chrome Extension auditing" groupRelation="and">
7126+
<Rule name="Attack=T1176,Technique=Browser Extensions,Tactic=Persistence,DS=Windows Registry: Windows Registry Key Modification,Level=0,Forensic=Old Chrome Extension auditing" groupRelation="and">
71277127
<TargetObject condition="contains">Google\Chrome\Extensions</TargetObject>
71287128
<TargetObject condition="end with">update_url</TargetObject>
71297129
<EventType condition="is">SetValue</EventType>
71307130
</Rule>
7131+
<Rule name="Attack=T1176,Technique=Browser Extensions,Tactic=Persistence,DS=Windows Registry: Windows Registry Key Modification,Level=0,Forensic=Chrome Extension auditing" groupRelation="and">
7132+
<TargetObject condition="contains">Google\Chrome</TargetObject>
7133+
<TargetObject condition="contains">extensions.settings</TargetObject>
7134+
<EventType condition="is">SetValue</EventType>
7135+
</Rule>
71317136
<!--MITRE ATT&CK TECHNIQUE: Account Manipulation-->
71327137
<Rule name="Attack=None,Technique=None,Tactic=None,DS=Windows Registry: Windows Registry Key Modification,Level=0,Desc=Forced password reset detected" groupRelation="and">
71337138
<TargetObject condition="contains">ForcePasswordReset</TargetObject>
@@ -8111,7 +8116,6 @@
81118116
<Rule name="Attack=None,Technique=None,Tactic=None,DS=Windows Registry: Windows Registry Key Modification,Level=0,Desc=AutoStart on Disconnect" groupRelation="and">
81128117
<TargetObject condition="contains">Windows CE Services\AutoStartOnDisconnect</TargetObject>
81138118
</Rule>
8114-
<!-- <TargetObject name="Attack=None,Technique=None,Tactic=None,DS=Windows Registry: Windows Registry Key Modification,Level=0,Desc=Chrome Extensions" condition="contains">PreferenceMACs\Default\extensions.settings</TargetObject> Nosiy and doesn't seem to provide helpful information. -->
81158119
<Rule name="Attack=None,Technique=None,Tactic=None,DS=Windows Registry: Windows Registry Key Modification,Level=0,Desc=CurrentVersion URL Key" groupRelation="and">
81168120
<TargetObject condition="contains">CurrentVersion\URL</TargetObject>
81178121
</Rule>

0 commit comments

Comments
 (0)