From 5ef70cc990212c5fa62ff5f51c410979dc0c6423 Mon Sep 17 00:00:00 2001 From: pe3zx Date: Sun, 23 Dec 2018 22:56:45 +0700 Subject: [PATCH] [Tools][DFIR] salesforce/bro-sysmon --- README.md | 4 ++++ 1 file changed, 4 insertions(+) diff --git a/README.md b/README.md index 88703d2..04ebeb4 100644 --- a/README.md +++ b/README.md @@ -1334,6 +1334,10 @@ _return-to-libc techniques_ ptresearch/AttackDetection The Attack Detection Team searches for new vulnerabilities and 0-days, reproduces it and creates PoC exploits to understand how these security flaws work and how related attacks can be detected on the network layer. Additionally, we are interested in malware and hackers’ TTPs, so we develop Suricata rules for detecting all sorts of such activities. + + salesforce/bro-sysmon + Bro-Sysmon enables Bro to receive Windows Event Logs. This provide a method to associate Network Monitoring and Host Monitoring. The work was spurred by the need to associate JA3 and HASSH fingerprints with the application on the host. The example below shows the hostname, Process ID, connection information, JA3 fingerprints, Application Path, and binary hashes. + SecurityRiskAdvisors/TALR Threat Alert Logic Repository (TALR) - A public repository for the collection and sharing of detection rules in platform agnostic formats. Collected rules are appended with STIX required fields for simplified sharing over TAXII servers.