You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
558 lines
27 KiB
558 lines
27 KiB
import traceback
|
|
import logging
|
|
from lib.Banner import *
|
|
import argparse
|
|
import pandas as pd
|
|
import lib.EvtxDetection as EvtxDetection
|
|
import lib.CSVDetection as CSVDetection
|
|
import lib.EvtxHunt as EvtxHunt
|
|
from evtx import PyEvtxParser
|
|
from sys import exit
|
|
from pytz import timezone
|
|
from dateutil import tz
|
|
import glob
|
|
import os
|
|
import re
|
|
|
|
|
|
Output=""
|
|
Path=""
|
|
Security_path=""
|
|
system_path=""
|
|
scheduledtask_path=""
|
|
defender_path=""
|
|
powershell_path=""
|
|
powershellop_path=""
|
|
terminal_path=""
|
|
winrm_path=""
|
|
sysmon_path=""
|
|
|
|
Security_path_list=[]
|
|
system_path_list=[]
|
|
scheduledtask_path_list=[]
|
|
defender_path_list=[]
|
|
powershell_path_list=[]
|
|
powershellop_path_list=[]
|
|
terminal_path_list=[]
|
|
winrm_path_list=[]
|
|
sysmon_path_list=[]
|
|
|
|
input_timezone=timezone("UTC")
|
|
|
|
Logon_Events=[{'Date and Time':[],'timestamp':[],'Event ID':[],'Account Name':[],'Account Domain':[],'Logon Type':[],'Logon Process':[],'Source IP':[],'Workstation Name':[],'Original Event Log':[]}]
|
|
Executed_Process_Summary=[{'Process Name':[],'Number of Execution':[]}]
|
|
TerminalServices_Summary=[{'User':[],'Number of Logins':[]}]
|
|
Security_Authentication_Summary=[{'User':[],'Number of Failed Logins':[],'Number of Successful Logins':[]}]
|
|
Sysmon_events=[{'Date and Time':[],'timestamp':[],'Detection Rule':[],'Severity':[],'Detection Domain':[],'Event Description':[],'Event ID':[],'Original Event Log':[]}]
|
|
WinRM_events=[{'Date and Time':[],'timestamp':[],'Detection Rule':[],'Severity':[],'Detection Domain':[],'Event Description':[],'Event ID':[],'Original Event Log':[]}]
|
|
Security_events=[{'Date and Time':[],'timestamp':[],'Detection Rule':[],'Severity':[],'Detection Domain':[],'Event Description':[],'Event ID':[],'Original Event Log':[]}]
|
|
System_events=[{'Date and Time':[],'timestamp':[],'Detection Rule':[],'Severity':[],'Detection Domain':[],'Service Name':[],'Event Description':[],'Event ID':[],'Original Event Log':[]}]
|
|
ScheduledTask_events=[{'Date and Time':[],'timestamp':[],'Detection Rule':[],'Severity':[],'Detection Domain':[],'Schedule Task Name':[],'Event Description':[],'Event ID':[],'Original Event Log':[]}]
|
|
Powershell_events=[{'Date and Time':[],'timestamp':[],'Detection Rule':[],'Severity':[],'Detection Domain':[],'Event Description':[],'Event ID':[],'Original Event Log':[]}]
|
|
Powershell_Operational_events=[{'Date and Time':[],'timestamp':[],'Detection Rule':[],'Severity':[],'Detection Domain':[],'Event Description':[],'Event ID':[],'Original Event Log':[]}]
|
|
TerminalServices_events=[{'Date and Time':[],'timestamp':[],'Detection Rule':[],'Severity':[],'Detection Domain':[],'Event Description':[],'Event ID':[],'Original Event Log':[]}]
|
|
Windows_Defender_events=[{'Date and Time':[],'timestamp':[],'Detection Rule':[],'Severity':[],'Detection Domain':[],'Event Description':[],'Event ID':[],'Original Event Log':[]}]
|
|
Timesketch_events=[{'message':[],'timestamp':[],'datetime':[],'timestamp_desc':[],'Event Description':[],'Severity':[],'Detection Domain':[],'Event ID':[],'Original Event Log':[]}]
|
|
|
|
|
|
|
|
|
|
def evtxdetect():
|
|
global input_timezone,Logon_Events,Executed_Process_Summary,TerminalServices_Summary,Security_Authentication_Summary,Sysmon_events,WinRM_events,Security_events,System_events,ScheduledTask_events,Powershell_events,Powershell_Operational_events,TerminalServices_events,Windows_Defender_events,Timesketch_events,TerminalServices_Summary,Security_Authentication_Summary
|
|
try:
|
|
print(Security_path)
|
|
EvtxDetection.detect_events_security_log(Security_path,input_timezone)
|
|
except IOError :
|
|
print("Error Analyzing Security logs: ", end='')
|
|
print("File Path Does Not Exist")
|
|
except Exception as e:
|
|
print("Error Analyzing Security logs")
|
|
logging.error(traceback.format_exc())
|
|
try:
|
|
EvtxDetection.detect_events_system_log(system_path,input_timezone)
|
|
except IOError :
|
|
print("Error Analyzing System logs : ", end='')
|
|
print("File Path Does Not Exist")
|
|
except Exception as e:
|
|
print("Error Analyzing System logs ")
|
|
logging.error(traceback.format_exc())
|
|
try :
|
|
EvtxDetection.detect_events_powershell_operational_log(powershellop_path,input_timezone)
|
|
except IOError :
|
|
print("Error Analyzing Powershell Operational logs : ", end='')
|
|
print("File Path Does Not Exist")
|
|
except Exception as e:
|
|
print("Error Analyzing Powershell Operational logs ")
|
|
logging.error(traceback.format_exc())
|
|
try :
|
|
EvtxDetection.detect_events_powershell_log(powershell_path,input_timezone)
|
|
except IOError :
|
|
print("Error Analyzing Powershell logs : ", end='')
|
|
print("File Path Does Not Exist")
|
|
except Exception as e:
|
|
print("Error Analyzing Powershell logs ")
|
|
logging.error(traceback.format_exc())
|
|
try :
|
|
EvtxDetection.detect_events_TerminalServices_LocalSessionManager_log(terminal_path,input_timezone)
|
|
except IOError :
|
|
print("Error Analyzing TerminalServices LocalSessionManager logs: ", end='')
|
|
print("File Path Does Not Exist")
|
|
except Exception as e:
|
|
print("Error Analyzing TerminalServices LocalSessionManager logs")
|
|
logging.error(traceback.format_exc())
|
|
try:
|
|
EvtxDetection.detect_events_scheduled_task_log(scheduledtask_path,input_timezone)
|
|
except IOError :
|
|
print("Error Analyzing Scheduled Task logs : ", end='')
|
|
print("File Path Does Not Exist")
|
|
except Exception as e:
|
|
print("Error Analyzing Scheduled Task logs ")
|
|
logging.error(traceback.format_exc())
|
|
|
|
try:
|
|
EvtxDetection.detect_events_windows_defender_log(defender_path,input_timezone)
|
|
except IOError :
|
|
print("Error Analyzing Windows Defender logs : ", end='')
|
|
print("File Path Does Not Exist")
|
|
except Exception as e:
|
|
print("Error Analyzing Windows Defender logs ")
|
|
logging.error(traceback.format_exc())
|
|
try:
|
|
EvtxDetection.detect_events_Microsoft_Windows_WinRM(winrm_path,input_timezone)
|
|
except IOError :
|
|
print("Error Analyzing WinRM logs : ", end='')
|
|
print("File Path Does Not Exist")
|
|
except Exception as e:
|
|
print("Error Analyzing WinRM logs ")
|
|
logging.error(traceback.format_exc())
|
|
|
|
try:
|
|
EvtxDetection.detect_events_Sysmon_log(sysmon_path,input_timezone)
|
|
except IOError :
|
|
print("Error Analyzing Sysmon logs ")
|
|
print("File Path Does Not Exist")
|
|
except Exception as e:
|
|
print("Error Analyzing Sysmon logs ")
|
|
logging.error(traceback.format_exc())
|
|
|
|
|
|
Sysmon_events = EvtxDetection.Sysmon_events
|
|
WinRM_events =EvtxDetection.WinRM_events
|
|
Security_events =EvtxDetection.Security_events
|
|
System_events =EvtxDetection.System_events
|
|
ScheduledTask_events =EvtxDetection.ScheduledTask_events
|
|
Powershell_events =EvtxDetection.Powershell_events
|
|
Powershell_Operational_events =EvtxDetection.Powershell_Operational_events
|
|
TerminalServices_events =EvtxDetection.TerminalServices_events
|
|
Windows_Defender_events =EvtxDetection.Windows_Defender_events
|
|
Timesketch_events =EvtxDetection.Timesketch_events
|
|
TerminalServices_Summary=EvtxDetection.TerminalServices_Summary
|
|
Executed_Process_Summary=EvtxDetection.Executed_Process_Summary
|
|
Security_Authentication_Summary =EvtxDetection.Security_Authentication_Summary
|
|
Logon_Events =EvtxDetection.Logon_Events
|
|
|
|
def csvdetect(winevent):
|
|
global Executed_Process_Summary,TerminalServices_Summary,Security_Authentication_Summary,Sysmon_events,WinRM_events,Security_events,System_events,ScheduledTask_events,Powershell_events,Powershell_Operational_events,TerminalServices_events,Windows_Defender_events,Timesketch_events,TerminalServices_Summary,Security_Authentication_Summary
|
|
try:
|
|
#print(Security_path,winevent)
|
|
CSVDetection.detect_events_security_log(Security_path,winevent)
|
|
except IOError :
|
|
print("Error Analyzing Security logs: ", end='')
|
|
print("File Path Does Not Exist")
|
|
except Exception as e:
|
|
print("Error Analyzing Security logs")
|
|
logging.error(traceback.format_exc())
|
|
try:
|
|
CSVDetection.detect_events_system_log(system_path,winevent)
|
|
except IOError :
|
|
print("Error Analyzing System logs : ", end='')
|
|
print("File Path Does Not Exist")
|
|
except Exception as e:
|
|
print("Error Analyzing System logs ")
|
|
logging.error(traceback.format_exc())
|
|
try :
|
|
CSVDetection.detect_events_powershell_operational_log(powershellop_path,winevent)
|
|
except IOError :
|
|
print("Error Analyzing Powershell Operational logs : ", end='')
|
|
print("File Path Does Not Exist")
|
|
except Exception as e:
|
|
print("Error Analyzing Powershell Operational logs ")
|
|
logging.error(traceback.format_exc())
|
|
try :
|
|
CSVDetection.detect_events_powershell_log(powershell_path,winevent)
|
|
except IOError :
|
|
print("Error Analyzing Powershell logs : ", end='')
|
|
print("File Path Does Not Exist")
|
|
except Exception as e:
|
|
print("Error Analyzing Powershell logs ")
|
|
logging.error(traceback.format_exc())
|
|
try :
|
|
CSVDetection.detect_events_TerminalServices_LocalSessionManager_log(terminal_path,winevent)
|
|
except IOError :
|
|
print("Error Analyzing TerminalServices LocalSessionManager logs: ", end='')
|
|
print("File Path Does Not Exist")
|
|
except Exception as e:
|
|
print("Error Analyzing TerminalServices LocalSessionManager logs")
|
|
logging.error(traceback.format_exc())
|
|
try:
|
|
CSVDetection.detect_events_scheduled_task_log(scheduledtask_path,winevent)
|
|
except IOError :
|
|
print("Error Analyzing Scheduled Task logs : ", end='')
|
|
print("File Path Does Not Exist")
|
|
except Exception as e:
|
|
print("Error Analyzing Scheduled Task logs ")
|
|
logging.error(traceback.format_exc())
|
|
|
|
try:
|
|
CSVDetection.detect_events_windows_defender_log(defender_path,winevent)
|
|
except IOError :
|
|
print("Error Analyzing Windows Defender logs : ", end='')
|
|
print("File Path Does Not Exist")
|
|
except Exception as e:
|
|
print("Error Analyzing Windows Defender logs ")
|
|
logging.error(traceback.format_exc())
|
|
try:
|
|
CSVDetection.detect_events_Microsoft_Windows_WinRM_CSV_log(winrm_path,winevent)
|
|
except IOError :
|
|
print("Error Analyzing WinRM logs : ", end='')
|
|
print("File Path Does Not Exist")
|
|
except Exception as e:
|
|
print("Error Analyzing WinRM logs ")
|
|
logging.error(traceback.format_exc())
|
|
|
|
try:
|
|
CSVDetection.detect_events_Sysmon_log(sysmon_path,winevent)
|
|
except IOError :
|
|
print("Error Analyzing Sysmon logs ")
|
|
print("File Path Does Not Exist")
|
|
except Exception as e:
|
|
print("Error Analyzing Sysmon logs ")
|
|
logging.error(traceback.format_exc())
|
|
|
|
|
|
Sysmon_events = CSVDetection.Sysmon_events
|
|
WinRM_events =CSVDetection.WinRM_events
|
|
Security_events =CSVDetection.Security_events
|
|
System_events =CSVDetection.System_events
|
|
ScheduledTask_events =CSVDetection.ScheduledTask_events
|
|
Powershell_events =CSVDetection.Powershell_events
|
|
Powershell_Operational_events =CSVDetection.Powershell_Operational_events
|
|
TerminalServices_events =CSVDetection.TerminalServices_events
|
|
Windows_Defender_events =CSVDetection.Windows_Defender_events
|
|
Timesketch_events =CSVDetection.Timesketch_events
|
|
TerminalServices_Summary=CSVDetection.TerminalServices_Summary
|
|
Executed_Process_Summary=CSVDetection.Executed_Process_Summary
|
|
Security_Authentication_Summary =CSVDetection.Security_Authentication_Summary
|
|
|
|
def evtxdetect_auto():
|
|
global input_timezone,Logon_Events,Executed_Process_Summary,TerminalServices_Summary,Security_Authentication_Summary,Sysmon_events,WinRM_events,Security_events,System_events,ScheduledTask_events,Powershell_events,Powershell_Operational_events,TerminalServices_events,Windows_Defender_events,Timesketch_events,TerminalServices_Summary,Security_Authentication_Summary
|
|
try:
|
|
#print(Security_path)
|
|
EvtxDetection.detect_events_security_log(Security_path_list,input_timezone)
|
|
except IOError :
|
|
print("Error Analyzing Security logs: ", end='')
|
|
print("File Path Does Not Exist")
|
|
except Exception as e:
|
|
print("Error Analyzing Security logs")
|
|
logging.error(traceback.format_exc())
|
|
try:
|
|
EvtxDetection.detect_events_system_log(system_path_list,input_timezone)
|
|
except IOError :
|
|
print("Error Analyzing System logs : ", end='')
|
|
print("File Path Does Not Exist")
|
|
except Exception as e:
|
|
print("Error Analyzing System logs ")
|
|
logging.error(traceback.format_exc())
|
|
try :
|
|
EvtxDetection.detect_events_powershell_operational_log(powershellop_path_list,input_timezone)
|
|
except IOError :
|
|
print("Error Analyzing Powershell Operational logs : ", end='')
|
|
print("File Path Does Not Exist")
|
|
except Exception as e:
|
|
print("Error Analyzing Powershell Operational logs ")
|
|
logging.error(traceback.format_exc())
|
|
try :
|
|
EvtxDetection.detect_events_powershell_log(powershell_path_list,input_timezone)
|
|
except IOError :
|
|
print("Error Analyzing Powershell logs : ", end='')
|
|
print("File Path Does Not Exist")
|
|
except Exception as e:
|
|
print("Error Analyzing Powershell logs ")
|
|
logging.error(traceback.format_exc())
|
|
try :
|
|
EvtxDetection.detect_events_TerminalServices_LocalSessionManager_log(terminal_path_list,input_timezone)
|
|
except IOError :
|
|
print("Error Analyzing TerminalServices LocalSessionManager logs: ", end='')
|
|
print("File Path Does Not Exist")
|
|
except Exception as e:
|
|
print("Error Analyzing TerminalServices LocalSessionManager logs")
|
|
logging.error(traceback.format_exc())
|
|
try:
|
|
EvtxDetection.detect_events_scheduled_task_log(scheduledtask_path_list,input_timezone)
|
|
except IOError :
|
|
print("Error Analyzing Scheduled Task logs : ", end='')
|
|
print("File Path Does Not Exist")
|
|
except Exception as e:
|
|
print("Error Analyzing Scheduled Task logs ")
|
|
logging.error(traceback.format_exc())
|
|
|
|
try:
|
|
EvtxDetection.detect_events_windows_defender_log(defender_path_list,input_timezone)
|
|
except IOError :
|
|
print("Error Analyzing Windows Defender logs : ", end='')
|
|
print("File Path Does Not Exist")
|
|
except Exception as e:
|
|
print("Error Analyzing Windows Defender logs ")
|
|
logging.error(traceback.format_exc())
|
|
try:
|
|
EvtxDetection.detect_events_Microsoft_Windows_WinRM(winrm_path_list,input_timezone)
|
|
except IOError :
|
|
print("Error Analyzing WinRM logs : ", end='')
|
|
print("File Path Does Not Exist")
|
|
except Exception as e:
|
|
print("Error Analyzing WinRM logs ")
|
|
logging.error(traceback.format_exc())
|
|
|
|
try:
|
|
EvtxDetection.detect_events_Sysmon_log(sysmon_path_list,input_timezone)
|
|
except IOError :
|
|
print("Error Analyzing Sysmon logs ")
|
|
print("File Path Does Not Exist")
|
|
except Exception as e:
|
|
print("Error Analyzing Sysmon logs ")
|
|
logging.error(traceback.format_exc())
|
|
|
|
|
|
Sysmon_events = EvtxDetection.Sysmon_events
|
|
WinRM_events =EvtxDetection.WinRM_events
|
|
Security_events =EvtxDetection.Security_events
|
|
System_events =EvtxDetection.System_events
|
|
ScheduledTask_events =EvtxDetection.ScheduledTask_events
|
|
Powershell_events =EvtxDetection.Powershell_events
|
|
Powershell_Operational_events =EvtxDetection.Powershell_Operational_events
|
|
TerminalServices_events =EvtxDetection.TerminalServices_events
|
|
Windows_Defender_events =EvtxDetection.Windows_Defender_events
|
|
Timesketch_events =EvtxDetection.Timesketch_events
|
|
TerminalServices_Summary=EvtxDetection.TerminalServices_Summary
|
|
Executed_Process_Summary=EvtxDetection.Executed_Process_Summary
|
|
Security_Authentication_Summary =EvtxDetection.Security_Authentication_Summary
|
|
Logon_Events =EvtxDetection.Logon_Events
|
|
|
|
|
|
def auto_detect(path):
|
|
global input_timezone
|
|
EventID_rex = re.compile('<EventID.*>(.*)<\/EventID>', re.IGNORECASE)
|
|
Channel_rex = re.compile('<Channel.*>(.*)<\/Channel>', re.IGNORECASE)
|
|
Computer_rex = re.compile('<Computer.*>(.*)<\/Computer>', re.IGNORECASE)
|
|
|
|
|
|
if os.path.isdir(path):
|
|
files=glob.glob(path+"*.evtx")
|
|
elif os.path.isfile(path):
|
|
files=glob.glob(path)
|
|
else:
|
|
print("Issue with the path" )
|
|
return
|
|
#print("hunting ( %s ) in files ( %s )"%(str_regex,files))
|
|
#user_string = input('please enter a string to convert to regex: ')
|
|
for file in files:
|
|
print("Analyzing "+file)
|
|
try:
|
|
parser = PyEvtxParser(file)
|
|
except:
|
|
print("Issue analyzing "+file +"\nplease check if its not corrupted")
|
|
continue
|
|
try:
|
|
|
|
for record in parser.records():
|
|
Channel = Channel_rex.findall(record['data'])
|
|
if Channel[0].strip()=="Security":
|
|
Security_path_list.append(file)
|
|
break
|
|
if Channel[0].strip()=="System":
|
|
system_path_list.append(file)
|
|
break
|
|
if Channel[0].strip()=="Windows PowerShell":
|
|
powershell_path_list.append(file)
|
|
break
|
|
if Channel[0].strip()=="Microsoft-Windows-PowerShell/Operational":
|
|
powershellop_path_list.append(file)
|
|
break
|
|
if Channel[0].strip()=="Microsoft-Windows-TerminalServices-LocalSessionManager/Operational":
|
|
terminal_path_list.append(file)
|
|
break
|
|
if Channel[0].strip()=="Microsoft-Windows-TaskScheduler/Operational":
|
|
scheduledtask_path_list.append(file)
|
|
break
|
|
if Channel[0].strip()=="Microsoft-Windows-Windows Defender/Operational":
|
|
defender_path_list.append(file)
|
|
break
|
|
if Channel[0].strip()=="Microsoft-Windows-WinRM/Operational":
|
|
winrm_path_list.append(file)
|
|
break
|
|
if Channel[0].strip()=="Microsoft-Windows-Sysmon/Operational":
|
|
sysmon_path_list.append(file)
|
|
break
|
|
break
|
|
except:
|
|
print("issue assigning path")
|
|
evtxdetect_auto()
|
|
def threat_hunt(path,str_regex):
|
|
global input_timezone, Output
|
|
import os
|
|
|
|
if os.path.isdir(path):
|
|
files=glob.glob(path+"*.evtx")
|
|
elif os.path.isfile(path):
|
|
files=glob.glob(path)
|
|
|
|
else:
|
|
print("Issue with the path" )
|
|
return
|
|
print("hunting ( %s ) in files ( %s )"%(str_regex,files))
|
|
#user_string = input('please enter a string to convert to regex: ')
|
|
EvtxHunt.Evtx_hunt(files,str_regex,input_timezone,Output)
|
|
|
|
def report():
|
|
global Output
|
|
timesketch=Output+"_TimeSketch.csv"
|
|
Report=Output+"_Report.xlsx"
|
|
LogonEvents=Output+"_Logon_Events.csv"
|
|
Sysmon = pd.DataFrame(Sysmon_events[0])
|
|
System = pd.DataFrame(System_events[0])
|
|
Powershell = pd.DataFrame(Powershell_events[0])
|
|
Powershell_Operational = pd.DataFrame(Powershell_Operational_events[0])
|
|
Security = pd.DataFrame(Security_events[0])
|
|
TerminalServices = pd.DataFrame(TerminalServices_events[0])
|
|
WinRM = pd.DataFrame(WinRM_events[0])
|
|
Windows_Defender = pd.DataFrame(Windows_Defender_events[0])
|
|
ScheduledTask = pd.DataFrame(ScheduledTask_events[0])
|
|
Terminal_Services_Summary = pd.DataFrame(TerminalServices_Summary[0])
|
|
Authentication_Summary = pd.DataFrame(Security_Authentication_Summary[0])
|
|
ExecutedProcess_Summary=pd.DataFrame(Executed_Process_Summary[0])
|
|
Logon_Events_pd=pd.DataFrame(Logon_Events[0])
|
|
|
|
# allresults=pd.DataFrame([TerminalServices,Powershell_Operational],columns=['Date and Time', 'Detection Rule','Detection Domain','Severity','Event Description','Event ID','Original Event Log'])
|
|
allresults = pd.concat(
|
|
[ScheduledTask, Powershell_Operational, Sysmon, System, Powershell, Security, TerminalServices, WinRM,
|
|
Windows_Defender], join="inner", ignore_index=True)
|
|
allresults = allresults.rename(columns={'Date and Time': 'datetime', 'Detection Rule': 'message'})
|
|
allresults['timestamp_desc'] = ""
|
|
allresults = allresults[
|
|
['message','timestamp', 'datetime', 'timestamp_desc', 'Detection Domain', 'Severity', 'Event Description', 'Event ID',
|
|
'Original Event Log']]
|
|
allresults.to_csv(timesketch, index=False)
|
|
print("Time Sketch Report saved as "+timesketch)
|
|
Logon_Events_pd.to_csv(LogonEvents, index=False)
|
|
# Sysmon=Sysmon.reset_index()
|
|
# Sysmon=Sysmon.drop(['index'],axis=1)
|
|
writer = pd.ExcelWriter(Report, engine='xlsxwriter', options={'encoding': 'utf-8'})
|
|
System.to_excel(writer, sheet_name='System Events', index=False)
|
|
Powershell.to_excel(writer, sheet_name='Powershell Events', index=False)
|
|
Powershell_Operational.to_excel(writer, sheet_name='Powershell_Operational Events', index=False)
|
|
Sysmon.to_excel(writer, sheet_name='Sysmon Events', index=False)
|
|
Security.to_excel(writer, sheet_name='Security Events', index=False)
|
|
TerminalServices.to_excel(writer, sheet_name='TerminalServices Events', index=False)
|
|
WinRM.to_excel(writer, sheet_name='WinRM Events', index=False)
|
|
Windows_Defender.to_excel(writer, sheet_name='Windows_Defender Events', index=False)
|
|
ScheduledTask.to_excel(writer, sheet_name='ScheduledTask Events', index=False)
|
|
Terminal_Services_Summary.to_excel(writer, sheet_name='Terminal Services Logon Summary', index=False)
|
|
Authentication_Summary.to_excel(writer, sheet_name='Security Authentication Summary', index=False)
|
|
ExecutedProcess_Summary.to_excel(writer, sheet_name='Executed Process Summary', index=False)
|
|
writer.save()
|
|
print("Report saved as "+Report)
|
|
|
|
|
|
|
|
def main():
|
|
print(Banner)
|
|
global Output,Path,Security_path,system_path,scheduledtask_path,defender_path,powershell_path,powershellop_path,terminal_path,winrm_path,sysmon_path,input_timezone
|
|
parser = argparse.ArgumentParser()
|
|
parser.add_argument("-p","--path", help="path to folder containing windows event logs generated by the powershell log collector")
|
|
parser.add_argument("-o", "--out",
|
|
help="output file name")
|
|
parser.add_argument("-t","--type", help="csv ( logs from get-eventlog or windows event log GUI or logs from Get-WinEvent ) , evtx ( EVTX extension windows event log )",choices=["csv","evtx"])
|
|
parser.add_argument("--security", help="Path to Security Logs")
|
|
parser.add_argument("--system", help="Path to System Logs")
|
|
parser.add_argument("--scheduledtask", help="Path to Scheduled Tasks Logs")
|
|
parser.add_argument("--defender", help="Path to Defender Logs")
|
|
parser.add_argument("--powershell", help="Path to Powershell Logs")
|
|
parser.add_argument("--powershellop", help="Path to Powershell Operational Logs")
|
|
parser.add_argument("--terminal", help="Path to TerminalServices LocalSessionManager Logs")
|
|
parser.add_argument("--winrm", help="Path to Winrm Logs")
|
|
parser.add_argument("--sysmon", help="Path to Sysmon Logs")
|
|
parser.add_argument("-tz","--timezone", help="default Timezone is UTC , you can enter ( 'local' : for local timzone , <Country time zone> : like (Asia/Dubai) )")
|
|
parser.add_argument("-hunt","--hunt", help="String or regex to be searched in evtx log path")
|
|
|
|
|
|
args = parser.parse_args()
|
|
if args.out is not None:
|
|
Output=args.out
|
|
if (args.path is None and args.security is None and args.system is None and args.scheduledtask is None and args.defender is None and args.powershell is None and args.powershellop is None and args.terminal is None and args.winrm is None and args.sysmon is None):
|
|
print("You didn't specify a path for any log \nuse --help to print help message")
|
|
exit()
|
|
if args.type is None and args.hunt is None:
|
|
print("log type must be defined using -t \ncsv( logs from get-eventlog or windows event log GUI or logs from Get-WinEvent ) , evtx ( EVTX extension windows event log )\nuse --help to print help message")
|
|
exit()
|
|
else:
|
|
if args.path is not None:
|
|
Path=args.path
|
|
if args.hunt is not None:
|
|
threat_hunt(Path,args.hunt)
|
|
return
|
|
if args.type=="evtx":
|
|
Security_path=Path+"/Security.evtx"
|
|
system_path =Path+"/System.evtx"
|
|
scheduledtask_path = Path+"/TaskScheduler.evtx"
|
|
defender_path = Path+"/Windows_Defender.evtx"
|
|
powershell_path = Path+"/Windows_PowerShell.evtx"
|
|
powershellop_path = Path+"/Powershell_Operational.evtx"
|
|
terminal_path = Path+"/LocalSessionManager.evtx"
|
|
winrm_path = Path+"/WinRM.evtx"
|
|
sysmon_path = Path+"/Sysmon.evtx"
|
|
if args.type=="csv":
|
|
Security_path=Path+"/Security.csv"
|
|
system_path =Path+"/System.csv"
|
|
scheduledtask_path = Path+"/TaskScheduler.csv"
|
|
defender_path = Path+"/Windows_Defender.csv"
|
|
powershell_path = Path+"/Windows_PowerShell.csv"
|
|
powershellop_path = Path+"/Powershell_Operational.csv"
|
|
terminal_path = Path+"/LocalSessionManager.csv"
|
|
winrm_path = Path+"/WinRM.csv"
|
|
sysmon_path = Path+"/Sysmon.csv"
|
|
if args.security is not None:
|
|
Security_path = args.security
|
|
|
|
if args.system is not None:
|
|
system_path=args.system
|
|
|
|
if args.scheduledtask is not None:
|
|
scheduledtask_path=args.scheduledtask
|
|
|
|
if args.defender is not None:
|
|
defender_path=args.defender
|
|
if args.powershell is not None:
|
|
powershell_path=args.powershell
|
|
if args.powershellop is not None:
|
|
powershellop_path=args.powershellop
|
|
if args.terminal is not None:
|
|
terminal_path=args.terminal
|
|
if args.winrm is not None:
|
|
winrm_path=args.winrm
|
|
if args.sysmon is not None:
|
|
sysmon_path=args.sysmon
|
|
if args.timezone is not None:
|
|
if args.timezone.lower()=="local":
|
|
input_timezone=tz.tzlocal()
|
|
else:
|
|
input_timezone=timezone(args.timezone)
|
|
if args.type=="evtx":
|
|
#evtxdetect()
|
|
auto_detect(Path)
|
|
if args.type=="csv":
|
|
csvdetect(True)
|
|
report()
|
|
|
|
|
|
main()
|