mirror of
https://github.com/valitydev/atomic-threat-coverage.git
synced 2024-11-07 01:55:21 +00:00
updates
This commit is contained in:
commit
b19867ce4d
@ -1,4 +1,4 @@
|
||||
| Title | DN_0001_windows_process_creation_4688 |
|
||||
| Title | DN_0001_4688_windows_process_creation |
|
||||
|:---------------|:-----------------------------------------------------------------------------------------------------------------|
|
||||
| Description | Windows process creation log, not including command line. |
|
||||
| Logging Policy | <ul><li>[LP_0001_windows_audit_process_creation](../Logging_Policies/LP_0001_windows_audit_process_creation.md)</li></ul> |
|
||||
@ -7,7 +7,7 @@
|
||||
| Type | Windows Log |
|
||||
| Channel | Security |
|
||||
| Provider | Microsoft-Windows-Security-Auditing |
|
||||
| Fields | <ul><li>EventID</li><li>Hostname</li><li>Username</li><li>UserSid</li><li>ProcessPid</li><li>ProcessName</li><li>NewProcessName</li><li>Image</li><li>ParentImage</li><li>ParentProcessPid</li><li>ParentProcessName</li><li>MandatoryLabel</li><li>TokenElevationType</li><li>LogonId</li></ul> |
|
||||
| Fields | <ul><li>EventID</li><li>Hostname</li><li>Username</li><li>UserSid</li><li>ProcessPid</li><li>ProcessId</li><li>ThreadID</li><li>ProcessName</li><li>NewProcessName</li><li>Image</li><li>ParentImage</li><li>ParentProcessPid</li><li>ParentProcessName</li><li>MandatoryLabel</li><li>TokenElevationType</li><li>LogonId</li></ul> |
|
||||
|
||||
|
||||
## Log Samples
|
@ -1,4 +1,4 @@
|
||||
| Title | DN_0002_windows_process_creation_with_commandline_4688 |
|
||||
| Title | DN_0002_4688_windows_process_creation_with_commandline |
|
||||
|:---------------|:-----------------------------------------------------------------------------------------------------------------|
|
||||
| Description | Windows process creation log, including command line. |
|
||||
| Logging Policy | <ul><li>[LP_0001_windows_audit_process_creation](../Logging_Policies/LP_0001_windows_audit_process_creation.md)</li><li>[LP_0002_windows_audit_process_creation_with_commandline](../Logging_Policies/LP_0002_windows_audit_process_creation_with_commandline.md)</li></ul> |
|
||||
@ -7,7 +7,7 @@
|
||||
| Type | Windows Log |
|
||||
| Channel | Security |
|
||||
| Provider | Microsoft-Windows-Security-Auditing |
|
||||
| Fields | <ul><li>EventID</li><li>Hostname</li><li>Username</li><li>UserSid</li><li>ProcessPid</li><li>ProcessName</li><li>NewProcessName</li><li>Image</li><li>CommandLine</li><li>ProcessCommandLine</li><li>ProcesssCommandLine</li><li>ParentProcessPid</li><li>ParentImage</li><li>ParentProcessName</li><li>MandatoryLabel</li><li>TokenElevationType</li><li>LogonId</li></ul> |
|
||||
| Fields | <ul><li>EventID</li><li>Hostname</li><li>Username</li><li>UserSid</li><li>ProcessPid</li><li>ProcessId</li><li>ThreadID</li><li>ProcessName</li><li>NewProcessName</li><li>Image</li><li>CommandLine</li><li>ProcessCommandLine</li><li>ProcesssCommandLine</li><li>ParentProcessPid</li><li>ParentImage</li><li>ParentProcessName</li><li>MandatoryLabel</li><li>TokenElevationType</li><li>LogonId</li></ul> |
|
||||
|
||||
|
||||
## Log Samples
|
||||
@ -49,6 +49,7 @@
|
||||
<Data Name="MandatoryLabel">S-1-16-8192</Data>
|
||||
</EventData>
|
||||
</Event>
|
||||
|
||||
```
|
||||
|
||||
|
@ -1,4 +1,4 @@
|
||||
| Title | DN_0003_windows_sysmon_process_creation_1 |
|
||||
| Title | DN_0003_1_windows_sysmon_process_creation |
|
||||
|:---------------|:-----------------------------------------------------------------------------------------------------------------|
|
||||
| Description | Windows process creation log, including command line. |
|
||||
| Logging Policy | <ul><li>[LP_0003_windows_sysmon_process_creation](../Logging_Policies/LP_0003_windows_sysmon_process_creation.md)</li></ul> |
|
||||
@ -7,7 +7,7 @@
|
||||
| Type | Windows Log |
|
||||
| Channel | Microsoft-Windows-Sysmon/Operational |
|
||||
| Provider | Microsoft-Windows-Sysmon |
|
||||
| Fields | <ul><li>EventID</li><li>Hostname</li><li>Username</li><li>ProcessGuid</li><li>ProcessId</li><li>ProcessName</li><li>CommandLine</li><li>LogonGuid</li><li>LogonId</li><li>TerminalSessionid</li><li>IntegrityLevel</li><li>Imphash</li><li>Sha256hash</li><li>Sha1hash</li><li>Md5hash</li><li>Image</li><li>ParentImage</li><li>ParentProcessGuid</li><li>ParentProcessId</li><li>ParentProcessName</li><li>ParentCommandLine</li></ul> |
|
||||
| Fields | <ul><li>EventID</li><li>Hostname</li><li>Username</li><li>ProcessGuid</li><li>ProcessId</li><li>ThreadID</li><li>ProcessName</li><li>CommandLine</li><li>LogonGuid</li><li>LogonId</li><li>TerminalSessionid</li><li>IntegrityLevel</li><li>Imphash</li><li>Sha256hash</li><li>Sha1hash</li><li>Md5hash</li><li>Image</li><li>ParentImage</li><li>ParentProcessGuid</li><li>ParentProcessId</li><li>ParentProcessName</li><li>ParentCommandLine</li></ul> |
|
||||
|
||||
|
||||
## Log Samples
|
@ -1,4 +1,4 @@
|
||||
| Title | DN_0004_windows_account_logon_4624 |
|
||||
| Title | DN_0004_4624_windows_account_logon |
|
||||
|:---------------|:-----------------------------------------------------------------------------------------------------------------|
|
||||
| Description | An account was successfully logged on. |
|
||||
| Logging Policy | <ul><li>[LP_0004_windows_audit_logon](../Logging_Policies/LP_0004_windows_audit_logon.md)</li></ul> |
|
||||
@ -7,7 +7,7 @@
|
||||
| Type | Windows Log |
|
||||
| Channel | Security |
|
||||
| Provider | Microsoft-Windows-Security-Auditing |
|
||||
| Fields | <ul><li>EventID</li><li>AccountName</li><li>Hostname</li><li>Computer</li><li>SubjectUserSid</li><li>SubjectUserName</li><li>SubjectDomainName</li><li>SubjectLogonId</li><li>TargetUserSid</li><li>TargetUserName</li><li>TargetDomainName</li><li>TargetLogonId</li><li>LogonType</li><li>LogonProcessName</li><li>AuthenticationPackageName</li><li>WorkstationName</li><li>LogonGuid</li><li>TransmittedServices</li><li>LmPackageName</li><li>KeyLength</li><li>ProcessId</li><li>ProcessName</li><li>IpAddress</li><li>IpPort</li><li>ImpersonationLevel</li><li>RestrictedAdminMode</li><li>TargetOutboundUserName</li><li>TargetOutboundDomainName</li><li>VirtualAccount</li><li>TargetLinkedLogonId</li><li>ElevatedToken</li></ul> |
|
||||
| Fields | <ul><li>EventID</li><li>AccountName</li><li>Hostname</li><li>Computer</li><li>SubjectUserSid</li><li>SubjectUserName</li><li>SubjectDomainName</li><li>SubjectLogonId</li><li>TargetUserSid</li><li>TargetUserName</li><li>TargetDomainName</li><li>TargetLogonId</li><li>LogonType</li><li>LogonProcessName</li><li>AuthenticationPackageName</li><li>WorkstationName</li><li>LogonGuid</li><li>TransmittedServices</li><li>LmPackageName</li><li>KeyLength</li><li>ProcessId</li><li>ThreadID</li><li>ProcessName</li><li>IpAddress</li><li>IpPort</li><li>ImpersonationLevel</li><li>RestrictedAdminMode</li><li>TargetOutboundUserName</li><li>TargetOutboundDomainName</li><li>VirtualAccount</li><li>TargetLinkedLogonId</li><li>ElevatedToken</li></ul> |
|
||||
|
||||
|
||||
## Log Samples
|
@ -0,0 +1,48 @@
|
||||
| Title | DN_0005_7045_windows_service_insatalled |
|
||||
|:---------------|:-----------------------------------------------------------------------------------------------------------------|
|
||||
| Description | A service was installed in the system. |
|
||||
| Logging Policy | <ul><li>[N](../Logging_Policies/N.md)</li><li>[o](../Logging_Policies/o.md)</li><li>[n](../Logging_Policies/n.md)</li><li>[e](../Logging_Policies/e.md)</li></ul> |
|
||||
| References | <ul><li>[N](N)</li><li>[o](o)</li><li>[n](n)</li><li>[e](e)</li></ul> |
|
||||
| Platform | Windows |
|
||||
| Type | Windows Log |
|
||||
| Channel | System |
|
||||
| Provider | Service Control Manager |
|
||||
| Fields | <ul><li>EventID</li><li>ProcessID</li><li>ThreadID</li><li>ServiceName</li><li>ImagePath</li><li>ServiceFileName</li><li>ServiceType</li><li>StartType</li><li>AccountName</li><li>UserSid</li><li>Computer</li></ul> |
|
||||
|
||||
|
||||
## Log Samples
|
||||
|
||||
### Raw Log
|
||||
|
||||
```
|
||||
- <Event xmlns="http://schemas.microsoft.com/win/2004/08/events/event">
|
||||
- <System>
|
||||
<Provider Name="Service Control Manager" Guid="{555908d1-a6d7-4695-8e1e-26931d2012f4}" EventSourceName="Service Control Manager" />
|
||||
<EventID Qualifiers="16384">7045</EventID>
|
||||
<Version>0</Version>
|
||||
<Level>4</Level>
|
||||
<Task>0</Task>
|
||||
<Opcode>0</Opcode>
|
||||
<Keywords>0x8080000000000000</Keywords>
|
||||
<TimeCreated SystemTime="2017-07-02T15:48:56.256752900Z" />
|
||||
<EventRecordID>762</EventRecordID>
|
||||
<Correlation />
|
||||
<Execution ProcessID="568" ThreadID="1792" />
|
||||
<Channel>System</Channel>
|
||||
<Computer>DESKTOP</Computer>
|
||||
<Security UserID="S-1-5-21-2073602604-586167410-2329295167-1001" />
|
||||
</System>
|
||||
- <EventData>
|
||||
<Data Name="ServiceName">sshd</Data>
|
||||
<Data Name="ImagePath">C:\Program Files\OpenSSH\sshd.exe</Data>
|
||||
<Data Name="ServiceType">user mode service</Data>
|
||||
<Data Name="StartType">demand start</Data>
|
||||
<Data Name="AccountName">LocalSystem</Data>
|
||||
</EventData>
|
||||
</Event>
|
||||
|
||||
```
|
||||
|
||||
|
||||
|
||||
|
@ -0,0 +1,51 @@
|
||||
| Title | DN_0006_2_windows_sysmon_process_changed_a_file_creation_time |
|
||||
|:---------------|:-----------------------------------------------------------------------------------------------------------------|
|
||||
| Description | Explicit modification of file creation timestamp by a process |
|
||||
| Logging Policy | <ul><li>[None](../Logging_Policies/None.md)</li></ul> |
|
||||
| References | <ul><li>[https://www.ultimatewindowssecurity.com/securitylog/encyclopedia/event.aspx?eventid=90002](https://www.ultimatewindowssecurity.com/securitylog/encyclopedia/event.aspx?eventid=90002)</li><li>[https://github.com/Cyb3rWard0g/OSSEM/blob/master/data_dictionaries/windows/sysmon/event-2.md](https://github.com/Cyb3rWard0g/OSSEM/blob/master/data_dictionaries/windows/sysmon/event-2.md)</li></ul> |
|
||||
| Platform | Windows |
|
||||
| Type | Windows Log |
|
||||
| Channel | Microsoft-Windows-Sysmon/Operational |
|
||||
| Provider | Microsoft-Windows-Sysmon |
|
||||
| Fields | <ul><li>EventID</li><li>Computer</li><li>UtcTime</li><li>ProcessGuid</li><li>ProcessId</li><li>Image</li><li>TargetFilename</li><li>CreationUtcTime</li><li>PreviousCreationUtcTime</li></ul> |
|
||||
|
||||
|
||||
## Log Samples
|
||||
|
||||
### Raw Log
|
||||
|
||||
```
|
||||
- <Event xmlns="http://schemas.microsoft.com/win/2004/08/events/event">
|
||||
- <System>
|
||||
<Provider Name="Microsoft-Windows-Sysmon" Guid="{5770385F-C22A-43E0-BF4C-06F5698FFBD9}" />
|
||||
<EventID>2</EventID>
|
||||
<Version>4</Version>
|
||||
<Level>4</Level>
|
||||
<Task>2</Task>
|
||||
<Opcode>0</Opcode>
|
||||
<Keywords>0x8000000000000000</Keywords>
|
||||
<TimeCreated SystemTime="2018-12-10T15:08:56.961102400Z" />
|
||||
<EventRecordID>6994</EventRecordID>
|
||||
<Correlation />
|
||||
<Execution ProcessID="2940" ThreadID="3576" />
|
||||
<Channel>Microsoft-Windows-Sysmon/Operational</Channel>
|
||||
<Computer>atc-win-10.atc.local</Computer>
|
||||
<Security UserID="S-1-5-18" />
|
||||
</System>
|
||||
- <EventData>
|
||||
<Data Name="RuleName" />
|
||||
<Data Name="UtcTime">2018-12-10 15:08:56.954</Data>
|
||||
<Data Name="ProcessGuid">{9683FBB1-8164-5C0E-0000-00104B532800}</Data>
|
||||
<Data Name="ProcessId">2788</Data>
|
||||
<Data Name="Image">C:\Users\user1\AppData\Local\Temp\chocolatey\wireshark\2.6.5\Wireshark-win64-2.6.5.exe</Data>
|
||||
<Data Name="TargetFilename">C:\Program Files\Wireshark\user-guide.chm</Data>
|
||||
<Data Name="CreationUtcTime">2018-11-28 18:37:08.000</Data>
|
||||
<Data Name="PreviousCreationUtcTime">2018-12-10 15:08:56.486</Data>
|
||||
</EventData>
|
||||
</Event>
|
||||
|
||||
```
|
||||
|
||||
|
||||
|
||||
|
@ -0,0 +1,61 @@
|
||||
| Title | DN_0007_3_windows_sysmon_network_connection |
|
||||
|:---------------|:-----------------------------------------------------------------------------------------------------------------|
|
||||
| Description | TCP/UDP connections made by a process |
|
||||
| Logging Policy | <ul><li>[LP_0005_windows_sysmon_network_connection](../Logging_Policies/LP_0005_windows_sysmon_network_connection.md)</li></ul> |
|
||||
| References | <ul><li>[https://www.ultimatewindowssecurity.com/securitylog/encyclopedia/event.aspx?eventid=90003](https://www.ultimatewindowssecurity.com/securitylog/encyclopedia/event.aspx?eventid=90003)</li><li>[https://github.com/Cyb3rWard0g/OSSEM/blob/master/data_dictionaries/windows/sysmon/event-3.md](https://github.com/Cyb3rWard0g/OSSEM/blob/master/data_dictionaries/windows/sysmon/event-3.md)</li></ul> |
|
||||
| Platform | Windows |
|
||||
| Type | Windows Log |
|
||||
| Channel | Microsoft-Windows-Sysmon/Operational |
|
||||
| Provider | Microsoft-Windows-Sysmon |
|
||||
| Fields | <ul><li>EventID</li><li>Computer</li><li>UtcTime</li><li>ProcessGuid</li><li>ProcessId</li><li>Image</li><li>User</li><li>Protocol</li><li>Initiated</li><li>SourceIsIpv6</li><li>SourceIp</li><li>SourceHostname</li><li>SourcePort</li><li>SourcePortName</li><li>DestinationIsIpv6</li><li>DestinationIp</li><li>DestinationHostname</li><li>DestinationPort</li><li>DestinationPortName</li></ul> |
|
||||
|
||||
|
||||
## Log Samples
|
||||
|
||||
### Raw Log
|
||||
|
||||
```
|
||||
- <Event xmlns="http://schemas.microsoft.com/win/2004/08/events/event">
|
||||
- <System>
|
||||
<Provider Name="Microsoft-Windows-Sysmon" Guid="{5770385F-C22A-43E0-BF4C-06F5698FFBD9}" />
|
||||
<EventID>3</EventID>
|
||||
<Version>5</Version>
|
||||
<Level>4</Level>
|
||||
<Task>3</Task>
|
||||
<Opcode>0</Opcode>
|
||||
<Keywords>0x8000000000000000</Keywords>
|
||||
<TimeCreated SystemTime="2019-02-05T15:16:29.384924000Z" />
|
||||
<EventRecordID>16000</EventRecordID>
|
||||
<Correlation />
|
||||
<Execution ProcessID="1828" ThreadID="2764" />
|
||||
<Channel>Microsoft-Windows-Sysmon/Operational</Channel>
|
||||
<Computer>ATC-WIN-7.atc.local</Computer>
|
||||
<Security UserID="S-1-5-18" />
|
||||
</System>
|
||||
- <EventData>
|
||||
<Data Name="RuleName" />
|
||||
<Data Name="UtcTime">2019-02-05 15:16:17.411</Data>
|
||||
<Data Name="ProcessGuid">{A96EFBF1-A8C9-5C59-0000-0010D274D300}</Data>
|
||||
<Data Name="ProcessId">3900</Data>
|
||||
<Data Name="Image">C:\Users\user1\Desktop\SysinternalsSuite\PsExec.exe</Data>
|
||||
<Data Name="User">ATC-WIN-7\user1</Data>
|
||||
<Data Name="Protocol">tcp</Data>
|
||||
<Data Name="Initiated">true</Data>
|
||||
<Data Name="SourceIsIpv6">false</Data>
|
||||
<Data Name="SourceIp">10.0.0.111</Data>
|
||||
<Data Name="SourceHostname">ATC-WIN-7.atc.local</Data>
|
||||
<Data Name="SourcePort">49603</Data>
|
||||
<Data Name="SourcePortName" />
|
||||
<Data Name="DestinationIsIpv6">false</Data>
|
||||
<Data Name="DestinationIp">10.0.0.103</Data>
|
||||
<Data Name="DestinationHostname">ATC-WIN-10</Data>
|
||||
<Data Name="DestinationPort">135</Data>
|
||||
<Data Name="DestinationPortName">epmap</Data>
|
||||
</EventData>
|
||||
</Event>
|
||||
|
||||
```
|
||||
|
||||
|
||||
|
||||
|
@ -0,0 +1,47 @@
|
||||
| Title | DN_0007_windows_sysmon_sysmon_service_state_changed_4 |
|
||||
|:---------------|:-----------------------------------------------------------------------------------------------------------------|
|
||||
| Description | Sysmon service changed status |
|
||||
| Logging Policy | <ul><li>[None](../Logging_Policies/None.md)</li></ul> |
|
||||
| References | <ul><li>[https://www.ultimatewindowssecurity.com/securitylog/encyclopedia/event.aspx?eventid=90004](https://www.ultimatewindowssecurity.com/securitylog/encyclopedia/event.aspx?eventid=90004)</li><li>[https://github.com/Cyb3rWard0g/OSSEM/blob/master/data_dictionaries/windows/sysmon/event-4.md](https://github.com/Cyb3rWard0g/OSSEM/blob/master/data_dictionaries/windows/sysmon/event-4.md)</li></ul> |
|
||||
| Platform | Windows |
|
||||
| Type | Windows Log |
|
||||
| Channel | Microsoft-Windows-Sysmon/Operational |
|
||||
| Provider | Microsoft-Windows-Sysmon |
|
||||
| Fields | <ul><li>EventID</li><li>Computer</li><li>UtcTime</li><li>State</li></ul> |
|
||||
|
||||
|
||||
## Log Samples
|
||||
|
||||
### Raw Log
|
||||
|
||||
```
|
||||
- <Event xmlns="http://schemas.microsoft.com/win/2004/08/events/event">
|
||||
- <System>
|
||||
<Provider Name="Microsoft-Windows-Sysmon" Guid="{5770385F-C22A-43E0-BF4C-06F5698FFBD9}" />
|
||||
<EventID>4</EventID>
|
||||
<Version>3</Version>
|
||||
<Level>4</Level>
|
||||
<Task>4</Task>
|
||||
<Opcode>0</Opcode>
|
||||
<Keywords>0x8000000000000000</Keywords>
|
||||
<TimeCreated SystemTime="2019-02-05T13:11:20.289486200Z" />
|
||||
<EventRecordID>45818</EventRecordID>
|
||||
<Correlation />
|
||||
<Execution ProcessID="3172" ThreadID="4192" />
|
||||
<Channel>Microsoft-Windows-Sysmon/Operational</Channel>
|
||||
<Computer>atc-win-10.atc.local</Computer>
|
||||
<Security UserID="S-1-5-18" />
|
||||
</System>
|
||||
- <EventData>
|
||||
<Data Name="UtcTime">2019-02-05 13:11:20.281</Data>
|
||||
<Data Name="State">Started</Data>
|
||||
<Data Name="Version">8.00</Data>
|
||||
<Data Name="SchemaVersion">4.10</Data>
|
||||
</EventData>
|
||||
</Event>
|
||||
|
||||
```
|
||||
|
||||
|
||||
|
||||
|
@ -0,0 +1,48 @@
|
||||
| Title | DN_0009_5_windows_sysmon_process_terminated |
|
||||
|:---------------|:-----------------------------------------------------------------------------------------------------------------|
|
||||
| Description | Process has been terminated |
|
||||
| Logging Policy | <ul><li>[None](../Logging_Policies/None.md)</li></ul> |
|
||||
| References | <ul><li>[https://www.ultimatewindowssecurity.com/securitylog/encyclopedia/event.aspx?eventid=90005](https://www.ultimatewindowssecurity.com/securitylog/encyclopedia/event.aspx?eventid=90005)</li></ul> |
|
||||
| Platform | Windows |
|
||||
| Type | Windows Log |
|
||||
| Channel | Microsoft-Windows-Sysmon/Operational |
|
||||
| Provider | Microsoft-Windows-Sysmon |
|
||||
| Fields | <ul><li>EventID</li><li>Computer</li><li>UtcTime</li><li>ProcessGuid</li><li>ProcessId</li><li>Image</li></ul> |
|
||||
|
||||
|
||||
## Log Samples
|
||||
|
||||
### Raw Log
|
||||
|
||||
```
|
||||
- <Event xmlns="http://schemas.microsoft.com/win/2004/08/events/event">
|
||||
- <System>
|
||||
<Provider Name="Microsoft-Windows-Sysmon" Guid="{5770385F-C22A-43E0-BF4C-06F5698FFBD9}" />
|
||||
<EventID>5</EventID>
|
||||
<Version>3</Version>
|
||||
<Level>4</Level>
|
||||
<Task>5</Task>
|
||||
<Opcode>0</Opcode>
|
||||
<Keywords>0x8000000000000000</Keywords>
|
||||
<TimeCreated SystemTime="2019-02-05T15:16:38.833314100Z" />
|
||||
<EventRecordID>57994</EventRecordID>
|
||||
<Correlation />
|
||||
<Execution ProcessID="3172" ThreadID="4192" />
|
||||
<Channel>Microsoft-Windows-Sysmon/Operational</Channel>
|
||||
<Computer>atc-win-10.atc.local</Computer>
|
||||
<Security UserID="S-1-5-18" />
|
||||
</System>
|
||||
- <EventData>
|
||||
<Data Name="RuleName" />
|
||||
<Data Name="UtcTime">2019-02-05 15:16:38.821</Data>
|
||||
<Data Name="ProcessGuid">{9683FBB1-A8D6-5C59-0000-001009797000}</Data>
|
||||
<Data Name="ProcessId">2440</Data>
|
||||
<Data Name="Image">C:\Windows\PSEXESVC.exe</Data>
|
||||
</EventData>
|
||||
</Event>
|
||||
|
||||
```
|
||||
|
||||
|
||||
|
||||
|
@ -0,0 +1,50 @@
|
||||
| Title | DN_0010_6_windows_sysmon_driver_loaded |
|
||||
|:---------------|:-----------------------------------------------------------------------------------------------------------------|
|
||||
| Description | The driver loaded events provides information about a driver being loaded on the system. The configured hashes are provided as well as signature information |
|
||||
| Logging Policy | <ul><li>[None](../Logging_Policies/None.md)</li></ul> |
|
||||
| References | <ul><li>[https://www.ultimatewindowssecurity.com/securitylog/encyclopedia/event.aspx?eventid=90006](https://www.ultimatewindowssecurity.com/securitylog/encyclopedia/event.aspx?eventid=90006)</li><li>[https://github.com/Cyb3rWard0g/OSSEM/blob/master/data_dictionaries/windows/sysmon/event-6.md](https://github.com/Cyb3rWard0g/OSSEM/blob/master/data_dictionaries/windows/sysmon/event-6.md)</li></ul> |
|
||||
| Platform | Windows |
|
||||
| Type | Windows Log |
|
||||
| Channel | Microsoft-Windows-Sysmon/Operational |
|
||||
| Provider | Microsoft-Windows-Sysmon |
|
||||
| Fields | <ul><li>EventID</li><li>Computer</li><li>UtcTime</li><li>ImageLoaded</li><li>Hashes</li><li>Signed</li><li>Signature</li><li>SignatureStatus</li></ul> |
|
||||
|
||||
|
||||
## Log Samples
|
||||
|
||||
### Raw Log
|
||||
|
||||
```
|
||||
- <Event xmlns="http://schemas.microsoft.com/win/2004/08/events/event">
|
||||
- <System>
|
||||
<Provider Name="Microsoft-Windows-Sysmon" Guid="{5770385F-C22A-43E0-BF4C-06F5698FFBD9}" />
|
||||
<EventID>6</EventID>
|
||||
<Version>3</Version>
|
||||
<Level>4</Level>
|
||||
<Task>6</Task>
|
||||
<Opcode>0</Opcode>
|
||||
<Keywords>0x8000000000000000</Keywords>
|
||||
<TimeCreated SystemTime="2018-12-09T21:41:44.778524700Z" />
|
||||
<EventRecordID>4565</EventRecordID>
|
||||
<Correlation />
|
||||
<Execution ProcessID="2996" ThreadID="3992" />
|
||||
<Channel>Microsoft-Windows-Sysmon/Operational</Channel>
|
||||
<Computer>atc-win-10.atc.local</Computer>
|
||||
<Security UserID="S-1-5-18" />
|
||||
</System>
|
||||
- <EventData>
|
||||
<Data Name="RuleName" />
|
||||
<Data Name="UtcTime">2018-12-09 21:41:41.091</Data>
|
||||
<Data Name="ImageLoaded">C:\Windows\System32\drivers\PROCEXP152.SYS</Data>
|
||||
<Data Name="Hashes">MD5=8213C5972C91A56BE78CD02A4DE4E3FC,SHA256=95D07C3B8DF26790AC43BB4259F65D1E90B03EA31D66F1B3961D85E21C5FF590</Data>
|
||||
<Data Name="Signed">true</Data>
|
||||
<Data Name="Signature">Sysinternals</Data>
|
||||
<Data Name="SignatureStatus">Valid</Data>
|
||||
</EventData>
|
||||
</Event>
|
||||
|
||||
```
|
||||
|
||||
|
||||
|
||||
|
@ -0,0 +1,52 @@
|
||||
| Title | DN_0011_7_windows_sysmon_image_loaded |
|
||||
|:---------------|:-----------------------------------------------------------------------------------------------------------------|
|
||||
| Description | The image loaded event logs when a module is loaded in a specific process. |
|
||||
| Logging Policy | <ul><li>[LP_0006_windows_sysmon_image_loaded](../Logging_Policies/LP_0006_windows_sysmon_image_loaded.md)</li></ul> |
|
||||
| References | <ul><li>[https://www.ultimatewindowssecurity.com/securitylog/encyclopedia/event.aspx?eventid=90007](https://www.ultimatewindowssecurity.com/securitylog/encyclopedia/event.aspx?eventid=90007)</li><li>[https://github.com/Cyb3rWard0g/OSSEM/blob/master/data_dictionaries/windows/sysmon/event-7.md](https://github.com/Cyb3rWard0g/OSSEM/blob/master/data_dictionaries/windows/sysmon/event-7.md)</li></ul> |
|
||||
| Platform | Windows |
|
||||
| Type | Windows Log |
|
||||
| Channel | Microsoft-Windows-Sysmon/Operational |
|
||||
| Provider | Microsoft-Windows-Sysmon |
|
||||
| Fields | <ul><li>EventID</li><li>Computer</li><li>UtcTime</li><li>ProcessGuid</li><li>ProcessId</li><li>Image</li><li>ImageLoaded</li><li>Hashes</li><li>Signed</li><li>Signature</li><li>SignatureStatus</li></ul> |
|
||||
|
||||
|
||||
## Log Samples
|
||||
|
||||
### Raw Log
|
||||
|
||||
```
|
||||
- <Event xmlns="http://schemas.microsoft.com/win/2004/08/events/event">
|
||||
- <System>
|
||||
<Provider Name="Microsoft-Windows-Sysmon" Guid="{5770385F-C22A-43E0-BF4C-06F5698FFBD9}" />
|
||||
<EventID>7</EventID>
|
||||
<Version>3</Version>
|
||||
<Level>4</Level>
|
||||
<Task>7</Task>
|
||||
<Opcode>0</Opcode>
|
||||
<Keywords>0x8000000000000000</Keywords>
|
||||
<TimeCreated SystemTime="2017-04-28T22:45:16.663226600Z" />
|
||||
<EventRecordID>16636</EventRecordID>
|
||||
<Correlation />
|
||||
<Execution ProcessID="3216" ThreadID="3964" />
|
||||
<Channel>Microsoft-Windows-Sysmon/Operational</Channel>
|
||||
<Computer>rfsH.lab.local</Computer>
|
||||
<Security UserID="S-1-5-18" />
|
||||
</System>
|
||||
- <EventData>
|
||||
<Data Name="UtcTime">2017-04-28 22:45:16.662</Data>
|
||||
<Data Name="ProcessGuid">{A23EAE89-C5FA-5903-0000-0010BF439000}</Data>
|
||||
<Data Name="ProcessId">12536</Data>
|
||||
<Data Name="Image">C:\Windows\System32\notepad.exe</Data>
|
||||
<Data Name="ImageLoaded">C:\Windows\System32\ole32.dll</Data>
|
||||
<Data Name="Hashes">SHA1=B2A2BBCFB69B1F0982C4B82055DAD9BAE4384E4B</Data>
|
||||
<Data Name="Signed">true</Data>
|
||||
<Data Name="Signature">Microsoft Windows</Data>
|
||||
<Data Name="SignatureStatus">Valid</Data>
|
||||
</EventData>
|
||||
</Event>
|
||||
|
||||
```
|
||||
|
||||
|
||||
|
||||
|
@ -0,0 +1,54 @@
|
||||
| Title | DN_0012_8_windows_sysmon_CreateRemoteThread |
|
||||
|:---------------|:-----------------------------------------------------------------------------------------------------------------|
|
||||
| Description | The CreateRemoteThread event detects when a process creates a thread in another process. |
|
||||
| Logging Policy | <ul><li>[None](../Logging_Policies/None.md)</li></ul> |
|
||||
| References | <ul><li>[https://www.ultimatewindowssecurity.com/securitylog/encyclopedia/event.aspx?eventid=90008](https://www.ultimatewindowssecurity.com/securitylog/encyclopedia/event.aspx?eventid=90008)</li><li>[https://github.com/Cyb3rWard0g/OSSEM/blob/master/data_dictionaries/windows/sysmon/event-8.md](https://github.com/Cyb3rWard0g/OSSEM/blob/master/data_dictionaries/windows/sysmon/event-8.md)</li></ul> |
|
||||
| Platform | Windows |
|
||||
| Type | Windows Log |
|
||||
| Channel | Microsoft-Windows-Sysmon/Operational |
|
||||
| Provider | Microsoft-Windows-Sysmon |
|
||||
| Fields | <ul><li>EventID</li><li>Computer</li><li>UtcTime</li><li>SourceProcessGuid</li><li>SourceProcessId</li><li>SourceImage</li><li>TargetProcessGuid</li><li>TargetProcessId</li><li>TargetImage</li><li>NewThreadId</li><li>StartAddress</li><li>StartModule</li><li>StartFunction</li></ul> |
|
||||
|
||||
|
||||
## Log Samples
|
||||
|
||||
### Raw Log
|
||||
|
||||
```
|
||||
- <Event xmlns="http://schemas.microsoft.com/win/2004/08/events/event">
|
||||
- <System>
|
||||
<Provider Name="Microsoft-Windows-Sysmon" Guid="{5770385F-C22A-43E0-BF4C-06F5698FFBD9}" />
|
||||
<EventID>8</EventID>
|
||||
<Version>2</Version>
|
||||
<Level>4</Level>
|
||||
<Task>8</Task>
|
||||
<Opcode>0</Opcode>
|
||||
<Keywords>0x8000000000000000</Keywords>
|
||||
<TimeCreated SystemTime="2017-05-13T22:53:43.214864300Z" />
|
||||
<EventRecordID>739823</EventRecordID>
|
||||
<Correlation />
|
||||
<Execution ProcessID="2848" ThreadID="3520" />
|
||||
<Channel>Microsoft-Windows-Sysmon/Operational</Channel>
|
||||
<Computer>rfsH.lab.local</Computer>
|
||||
<Security UserID="S-1-5-18" />
|
||||
</System>
|
||||
- <EventData>
|
||||
<Data Name="UtcTime">2017-05-13 22:53:43.214</Data>
|
||||
<Data Name="SourceProcessGuid">{A23EAE89-8E6D-5917-0000-0010DFAF5004}</Data>
|
||||
<Data Name="SourceProcessId">8804</Data>
|
||||
<Data Name="SourceImage">C:\Program Files (x86)\Microsoft Visual Studio 14.0\Common7\IDE\Remote Debugger\x64\msvsmon.exe</Data>
|
||||
<Data Name="TargetProcessGuid">{A23EAE89-8E5A-5917-0000-00100E3E4D04}</Data>
|
||||
<Data Name="TargetProcessId">2024</Data>
|
||||
<Data Name="TargetImage">C:\repos\Supercharger\Mtg.Supercharger.ControllerService\bin\x64\Debug\Mtg.Supercharger.ControllerService.exe</Data>
|
||||
<Data Name="NewThreadId">20532</Data>
|
||||
<Data Name="StartAddress">0x00007FFB09321970</Data>
|
||||
<Data Name="StartModule">C:\Windows\SYSTEM32\ntdll.dll</Data>
|
||||
<Data Name="StartFunction">DbgUiRemoteBreakin</Data>
|
||||
</EventData>
|
||||
</Event>
|
||||
|
||||
```
|
||||
|
||||
|
||||
|
||||
|
@ -0,0 +1,48 @@
|
||||
| Title | DN_0013_9_windows_sysmon_RawAccessRead |
|
||||
|:---------------|:-----------------------------------------------------------------------------------------------------------------|
|
||||
| Description | The RawAccessRead event detects when a process conducts reading operations from the drive using the \\.\ denotation. |
|
||||
| Logging Policy | <ul><li>[None](../Logging_Policies/None.md)</li></ul> |
|
||||
| References | <ul><li>[https://www.ultimatewindowssecurity.com/securitylog/encyclopedia/event.aspx?eventid=90009](https://www.ultimatewindowssecurity.com/securitylog/encyclopedia/event.aspx?eventid=90009)</li><li>[https://github.com/Cyb3rWard0g/OSSEM/blob/master/data_dictionaries/windows/sysmon/event-9.md](https://github.com/Cyb3rWard0g/OSSEM/blob/master/data_dictionaries/windows/sysmon/event-9.md)</li></ul> |
|
||||
| Platform | Windows |
|
||||
| Type | Windows Log |
|
||||
| Channel | Microsoft-Windows-Sysmon/Operational |
|
||||
| Provider | Microsoft-Windows-Sysmon |
|
||||
| Fields | <ul><li>EventID</li><li>Computer</li><li>UtcTime</li><li>ProcessGuid</li><li>ProcessId</li><li>Image</li><li>Device</li></ul> |
|
||||
|
||||
|
||||
## Log Samples
|
||||
|
||||
### Raw Log
|
||||
|
||||
```
|
||||
- <Event xmlns="http://schemas.microsoft.com/win/2004/08/events/event">
|
||||
- <System>
|
||||
<Provider Name="Microsoft-Windows-Sysmon" Guid="{5770385F-C22A-43E0-BF4C-06F5698FFBD9}" />
|
||||
<EventID>9</EventID>
|
||||
<Version>2</Version>
|
||||
<Level>4</Level>
|
||||
<Task>9</Task>
|
||||
<Opcode>0</Opcode>
|
||||
<Keywords>0x8000000000000000</Keywords>
|
||||
<TimeCreated SystemTime="2018-03-22T20:32:22.333778700Z" />
|
||||
<EventRecordID>1944686</EventRecordID>
|
||||
<Correlation />
|
||||
<Execution ProcessID="19572" ThreadID="21888" />
|
||||
<Channel>Microsoft-Windows-Sysmon/Operational</Channel>
|
||||
<Computer>rfsH.lab.local</Computer>
|
||||
<Security UserID="S-1-5-18" />
|
||||
</System>
|
||||
- <EventData>
|
||||
<Data Name="UtcTime">2018-03-22 20:32:22.332</Data>
|
||||
<Data Name="ProcessGuid">{A23EAE89-C65F-5AB2-0000-0010EB030000}</Data>
|
||||
<Data Name="ProcessId">4</Data>
|
||||
<Data Name="Image">System</Data>
|
||||
<Data Name="Device">\Device\HarddiskVolume2</Data>
|
||||
</EventData>
|
||||
</Event>
|
||||
|
||||
```
|
||||
|
||||
|
||||
|
||||
|
@ -0,0 +1,54 @@
|
||||
| Title | DN_0014_10_windows_sysmon_ProcessAccess |
|
||||
|:---------------|:-----------------------------------------------------------------------------------------------------------------|
|
||||
| Description | The process accessed event reports when a process opens another process, an operation that’s often followed by information queries or reading and writing the address space of the target process. |
|
||||
| Logging Policy | <ul><li>[LP_0007_windows_sysmon_ProcessAccess](../Logging_Policies/LP_0007_windows_sysmon_ProcessAccess.md)</li></ul> |
|
||||
| References | <ul><li>[https://www.ultimatewindowssecurity.com/securitylog/encyclopedia/event.aspx?eventid=90010](https://www.ultimatewindowssecurity.com/securitylog/encyclopedia/event.aspx?eventid=90010)</li><li>[https://github.com/Cyb3rWard0g/OSSEM/blob/master/data_dictionaries/windows/sysmon/event-10.md](https://github.com/Cyb3rWard0g/OSSEM/blob/master/data_dictionaries/windows/sysmon/event-10.md)</li></ul> |
|
||||
| Platform | Windows |
|
||||
| Type | Windows Log |
|
||||
| Channel | Microsoft-Windows-Sysmon/Operational |
|
||||
| Provider | Microsoft-Windows-Sysmon |
|
||||
| Fields | <ul><li>EventID</li><li>Computer</li><li>UtcTime</li><li>SourceProcessGUID</li><li>SourceProcessId</li><li>SourceThreadId</li><li>SourceImage</li><li>TargetProcessGUID</li><li>TargetProcessId</li><li>TargetImage</li><li>GrantedAccess</li><li>CallTrace</li></ul> |
|
||||
|
||||
|
||||
## Log Samples
|
||||
|
||||
### Raw Log
|
||||
|
||||
```
|
||||
- <Event xmlns="http://schemas.microsoft.com/win/2004/08/events/event">
|
||||
- <System>
|
||||
<Provider Name="Microsoft-Windows-Sysmon" Guid="{5770385F-C22A-43E0-BF4C-06F5698FFBD9}" />
|
||||
<EventID>10</EventID>
|
||||
<Version>3</Version>
|
||||
<Level>4</Level>
|
||||
<Task>10</Task>
|
||||
<Opcode>0</Opcode>
|
||||
<Keywords>0x8000000000000000</Keywords>
|
||||
<TimeCreated SystemTime="2019-01-30T14:28:35.216091900Z" />
|
||||
<EventRecordID>42444</EventRecordID>
|
||||
<Correlation />
|
||||
<Execution ProcessID="3892" ThreadID="5724" />
|
||||
<Channel>Microsoft-Windows-Sysmon/Operational</Channel>
|
||||
<Computer>atc-win-10.atc.local</Computer>
|
||||
<Security UserID="S-1-5-18" />
|
||||
</System>
|
||||
- <EventData>
|
||||
<Data Name="RuleName" />
|
||||
<Data Name="UtcTime">2019-01-30 14:28:35.212</Data>
|
||||
<Data Name="SourceProcessGUID">{9683FBB1-B470-5C51-0000-0010521EBB00}</Data>
|
||||
<Data Name="SourceProcessId">6916</Data>
|
||||
<Data Name="SourceThreadId">8080</Data>
|
||||
<Data Name="SourceImage">C:\Users\user1\Desktop\mimi\x64\mimikatz.exe</Data>
|
||||
<Data Name="TargetProcessGUID">{9683FBB1-9A52-5C51-0000-0010C3610000}</Data>
|
||||
<Data Name="TargetProcessId">672</Data>
|
||||
<Data Name="TargetImage">C:\windows\system32\lsass.exe</Data>
|
||||
<Data Name="GrantedAccess">0x1010</Data>
|
||||
<Data Name="CallTrace">C:\windows\SYSTEM32\ntdll.dll+9a3c4|C:\windows\System32\KERNELBASE.dll+2fd5d|C:\Users\user1\Desktop\mimi\x64\mimikatz.exe+7a906|C:\Users\user1\Desktop\mimi\x64\mimikatz.exe+7ac75|C:\Users\user1\Desktop\mimi\x64\mimikatz.exe+7a82d|C:\Users\user1\Desktop\mimi\x64\mimikatz.exe+4d28c|C:\Users\user1\Desktop\mimi\x64\mimikatz.exe+4d0c4|C:\Users\user1\Desktop\mimi\x64\mimikatz.exe+4cea1|C:\Users\user1\Desktop\mimi\x64\mimikatz.exe+80675|C:\windows\System32\KERNEL32.DLL+13034|C:\windows\SYSTEM32\ntdll.dll+71471</Data>
|
||||
</EventData>
|
||||
</Event>
|
||||
|
||||
```
|
||||
|
||||
|
||||
|
||||
|
@ -0,0 +1,50 @@
|
||||
| Title | DN_0015_11_windows_sysmon_FileCreate |
|
||||
|:---------------|:-----------------------------------------------------------------------------------------------------------------|
|
||||
| Description | File create operations are logged when a file is created or overwritten. This event is useful for monitoring autostart locations, like the Startup folder, as well as temporary and download directories, which are common places malware drops during initial infection. |
|
||||
| Logging Policy | <ul><li>[LP_0008_windows_sysmon_FileCreate](../Logging_Policies/LP_0008_windows_sysmon_FileCreate.md)</li></ul> |
|
||||
| References | <ul><li>[https://www.ultimatewindowssecurity.com/securitylog/encyclopedia/event.aspx?eventid=90011](https://www.ultimatewindowssecurity.com/securitylog/encyclopedia/event.aspx?eventid=90011)</li><li>[https://github.com/Cyb3rWard0g/OSSEM/blob/master/data_dictionaries/windows/sysmon/event-11.md](https://github.com/Cyb3rWard0g/OSSEM/blob/master/data_dictionaries/windows/sysmon/event-11.md)</li></ul> |
|
||||
| Platform | Windows |
|
||||
| Type | Windows Log |
|
||||
| Channel | Microsoft-Windows-Sysmon/Operational |
|
||||
| Provider | Microsoft-Windows-Sysmon |
|
||||
| Fields | <ul><li>EventID</li><li>Computer</li><li>UtcTime</li><li>ProcessGuid</li><li>ProcessId</li><li>Image</li><li>TargetFilename</li><li>CreationUtcTime</li></ul> |
|
||||
|
||||
|
||||
## Log Samples
|
||||
|
||||
### Raw Log
|
||||
|
||||
```
|
||||
- <Event xmlns="http://schemas.microsoft.com/win/2004/08/events/event">
|
||||
- <System>
|
||||
<Provider Name="Microsoft-Windows-Sysmon" Guid="{5770385F-C22A-43E0-BF4C-06F5698FFBD9}" />
|
||||
<EventID>11</EventID>
|
||||
<Version>2</Version>
|
||||
<Level>4</Level>
|
||||
<Task>11</Task>
|
||||
<Opcode>0</Opcode>
|
||||
<Keywords>0x8000000000000000</Keywords>
|
||||
<TimeCreated SystemTime="2019-01-30T15:08:51.296611700Z" />
|
||||
<EventRecordID>42528</EventRecordID>
|
||||
<Correlation />
|
||||
<Execution ProcessID="3892" ThreadID="5724" />
|
||||
<Channel>Microsoft-Windows-Sysmon/Operational</Channel>
|
||||
<Computer>atc-win-10.atc.local</Computer>
|
||||
<Security UserID="S-1-5-18" />
|
||||
</System>
|
||||
- <EventData>
|
||||
<Data Name="RuleName" />
|
||||
<Data Name="UtcTime">2019-01-30 15:08:51.287</Data>
|
||||
<Data Name="ProcessGuid">{9683FBB1-9A3F-5C51-0000-0010EB030000}</Data>
|
||||
<Data Name="ProcessId">4</Data>
|
||||
<Data Name="Image">System</Data>
|
||||
<Data Name="TargetFilename">C:\Windows\PSEXESVC.exe</Data>
|
||||
<Data Name="CreationUtcTime">2019-01-30 15:08:51.287</Data>
|
||||
</EventData>
|
||||
</Event>
|
||||
|
||||
```
|
||||
|
||||
|
||||
|
||||
|
@ -0,0 +1,50 @@
|
||||
| Title | DN_0016_12_windows_sysmon_RegistryEvent |
|
||||
|:---------------|:-----------------------------------------------------------------------------------------------------------------|
|
||||
| Description | Registry key and value create and delete operations map to this event type, which can be useful for monitoring for changes to Registry autostart locations, or specific malware registry modifications. |
|
||||
| Logging Policy | <ul><li>[None](../Logging_Policies/None.md)</li></ul> |
|
||||
| References | <ul><li>[https://www.ultimatewindowssecurity.com/securitylog/encyclopedia/event.aspx?eventid=90012](https://www.ultimatewindowssecurity.com/securitylog/encyclopedia/event.aspx?eventid=90012)</li><li>[https://github.com/Cyb3rWard0g/OSSEM/blob/master/data_dictionaries/windows/sysmon/event-12.md](https://github.com/Cyb3rWard0g/OSSEM/blob/master/data_dictionaries/windows/sysmon/event-12.md)</li></ul> |
|
||||
| Platform | Windows |
|
||||
| Type | Windows Log |
|
||||
| Channel | Microsoft-Windows-Sysmon/Operational |
|
||||
| Provider | Microsoft-Windows-Sysmon |
|
||||
| Fields | <ul><li>EventID</li><li>Computer</li><li>EventType</li><li>UtcTime</li><li>ProcessGuid</li><li>ProcessId</li><li>Image</li><li>TargetObject</li></ul> |
|
||||
|
||||
|
||||
## Log Samples
|
||||
|
||||
### Raw Log
|
||||
|
||||
```
|
||||
- <Event xmlns="http://schemas.microsoft.com/win/2004/08/events/event">
|
||||
- <System>
|
||||
<Provider Name="Microsoft-Windows-Sysmon" Guid="{5770385F-C22A-43E0-BF4C-06F5698FFBD9}" />
|
||||
<EventID>12</EventID>
|
||||
<Version>2</Version>
|
||||
<Level>4</Level>
|
||||
<Task>12</Task>
|
||||
<Opcode>0</Opcode>
|
||||
<Keywords>0x8000000000000000</Keywords>
|
||||
<TimeCreated SystemTime="2019-01-30T17:05:28.027841800Z" />
|
||||
<EventRecordID>42938</EventRecordID>
|
||||
<Correlation />
|
||||
<Execution ProcessID="3892" ThreadID="5724" />
|
||||
<Channel>Microsoft-Windows-Sysmon/Operational</Channel>
|
||||
<Computer>atc-win-10.atc.local</Computer>
|
||||
<Security UserID="S-1-5-18" />
|
||||
</System>
|
||||
- <EventData>
|
||||
<Data Name="RuleName" />
|
||||
<Data Name="EventType">DeleteKey</Data>
|
||||
<Data Name="UtcTime">2019-01-30 17:05:28.023</Data>
|
||||
<Data Name="ProcessGuid">{9683FBB1-D812-5C51-0000-0010F3871201}</Data>
|
||||
<Data Name="ProcessId">10396</Data>
|
||||
<Data Name="Image">C:\Windows\regedit.exe</Data>
|
||||
<Data Name="TargetObject">HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\New Key #1</Data>
|
||||
</EventData>
|
||||
</Event>
|
||||
|
||||
```
|
||||
|
||||
|
||||
|
||||
|
@ -0,0 +1,51 @@
|
||||
| Title | DN_0016_13_windows_sysmon_RegistryEvent |
|
||||
|:---------------|:-----------------------------------------------------------------------------------------------------------------|
|
||||
| Description | This Registry event type identifies Registry value modifications. The event records the value written for Registry values of type DWORD and QWORD. |
|
||||
| Logging Policy | <ul><li>[None](../Logging_Policies/None.md)</li></ul> |
|
||||
| References | <ul><li>[https://www.ultimatewindowssecurity.com/securitylog/encyclopedia/event.aspx?eventid=90013](https://www.ultimatewindowssecurity.com/securitylog/encyclopedia/event.aspx?eventid=90013)</li><li>[https://github.com/Cyb3rWard0g/OSSEM/blob/master/data_dictionaries/windows/sysmon/event-13.md](https://github.com/Cyb3rWard0g/OSSEM/blob/master/data_dictionaries/windows/sysmon/event-13.md)</li></ul> |
|
||||
| Platform | Windows |
|
||||
| Type | Windows Log |
|
||||
| Channel | Microsoft-Windows-Sysmon/Operational |
|
||||
| Provider | Microsoft-Windows-Sysmon |
|
||||
| Fields | <ul><li>EventID</li><li>Computer</li><li>EventType</li><li>UtcTime</li><li>ProcessGuid</li><li>ProcessId</li><li>Image</li><li>TargetObject</li><li>Details</li></ul> |
|
||||
|
||||
|
||||
## Log Samples
|
||||
|
||||
### Raw Log
|
||||
|
||||
```
|
||||
- <Event xmlns="http://schemas.microsoft.com/win/2004/08/events/event">
|
||||
- <System>
|
||||
<Provider Name="Microsoft-Windows-Sysmon" Guid="{5770385F-C22A-43E0-BF4C-06F5698FFBD9}" />
|
||||
<EventID>13</EventID>
|
||||
<Version>2</Version>
|
||||
<Level>4</Level>
|
||||
<Task>13</Task>
|
||||
<Opcode>0</Opcode>
|
||||
<Keywords>0x8000000000000000</Keywords>
|
||||
<TimeCreated SystemTime="2019-01-30T17:06:11.698273500Z" />
|
||||
<EventRecordID>42943</EventRecordID>
|
||||
<Correlation />
|
||||
<Execution ProcessID="3892" ThreadID="5724" />
|
||||
<Channel>Microsoft-Windows-Sysmon/Operational</Channel>
|
||||
<Computer>atc-win-10.atc.local</Computer>
|
||||
<Security UserID="S-1-5-18" />
|
||||
</System>
|
||||
- <EventData>
|
||||
<Data Name="RuleName" />
|
||||
<Data Name="EventType">SetValue</Data>
|
||||
<Data Name="UtcTime">2019-01-30 17:06:11.673</Data>
|
||||
<Data Name="ProcessGuid">{9683FBB1-D812-5C51-0000-0010F3871201}</Data>
|
||||
<Data Name="ProcessId">10396</Data>
|
||||
<Data Name="Image">C:\Windows\regedit.exe</Data>
|
||||
<Data Name="TargetObject">HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\New Value #1</Data>
|
||||
<Data Name="Details">C:\Program Files\Sublime Text 3\sublime_text.exe</Data>
|
||||
</EventData>
|
||||
</Event>
|
||||
|
||||
```
|
||||
|
||||
|
||||
|
||||
|
@ -0,0 +1,51 @@
|
||||
| Title | DN_0018_14_windows_sysmon_RegistryEvent |
|
||||
|:---------------|:-----------------------------------------------------------------------------------------------------------------|
|
||||
| Description | Registry key and value rename operations map to this event type, recording the new name of the key or value that was renamed. |
|
||||
| Logging Policy | <ul><li>[None](../Logging_Policies/None.md)</li></ul> |
|
||||
| References | <ul><li>[https://www.ultimatewindowssecurity.com/securitylog/encyclopedia/event.aspx?eventid=90014](https://www.ultimatewindowssecurity.com/securitylog/encyclopedia/event.aspx?eventid=90014)</li><li>[https://github.com/Cyb3rWard0g/OSSEM/blob/master/data_dictionaries/windows/sysmon/event-14.md](https://github.com/Cyb3rWard0g/OSSEM/blob/master/data_dictionaries/windows/sysmon/event-14.md)</li></ul> |
|
||||
| Platform | Windows |
|
||||
| Type | Windows Log |
|
||||
| Channel | Microsoft-Windows-Sysmon/Operational |
|
||||
| Provider | Microsoft-Windows-Sysmon |
|
||||
| Fields | <ul><li>EventID</li><li>Computer</li><li>EventType</li><li>UtcTime</li><li>ProcessGuid</li><li>ProcessId</li><li>Image</li><li>TargetObject</li><li>Details</li></ul> |
|
||||
|
||||
|
||||
## Log Samples
|
||||
|
||||
### Raw Log
|
||||
|
||||
```
|
||||
- <Event xmlns="http://schemas.microsoft.com/win/2004/08/events/event">
|
||||
- <System>
|
||||
<Provider Name="Microsoft-Windows-Sysmon" Guid="{5770385F-C22A-43E0-BF4C-06F5698FFBD9}" />
|
||||
<EventID>14</EventID>
|
||||
<Version>2</Version>
|
||||
<Level>4</Level>
|
||||
<Task>14</Task>
|
||||
<Opcode>0</Opcode>
|
||||
<Keywords>0x8000000000000000</Keywords>
|
||||
<TimeCreated SystemTime="2019-01-30T18:16:38.889738400Z" />
|
||||
<EventRecordID>43065</EventRecordID>
|
||||
<Correlation />
|
||||
<Execution ProcessID="3892" ThreadID="5724" />
|
||||
<Channel>Microsoft-Windows-Sysmon/Operational</Channel>
|
||||
<Computer>atc-win-10.atc.local</Computer>
|
||||
<Security UserID="S-1-5-18" />
|
||||
</System>
|
||||
- <EventData>
|
||||
<Data Name="RuleName" />
|
||||
<Data Name="EventType">RenameKey</Data>
|
||||
<Data Name="UtcTime">2019-01-30 18:16:38.886</Data>
|
||||
<Data Name="ProcessGuid">{9683FBB1-D812-5C51-0000-0010F3871201}</Data>
|
||||
<Data Name="ProcessId">10396</Data>
|
||||
<Data Name="Image">C:\Windows\regedit.exe</Data>
|
||||
<Data Name="TargetObject">HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\New Key #1</Data>
|
||||
<Data Name="NewName">HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\New Key #2</Data>
|
||||
</EventData>
|
||||
</Event>
|
||||
|
||||
```
|
||||
|
||||
|
||||
|
||||
|
@ -0,0 +1,51 @@
|
||||
| Title | DN_0019_15_windows_sysmon_FileCreateStreamHash |
|
||||
|:---------------|:-----------------------------------------------------------------------------------------------------------------|
|
||||
| Description | This event logs when a named file stream is created, and it generates events that log the hash of the contents of the file to which the stream is assigned (the unnamed stream), as well as the contents of the named stream. |
|
||||
| Logging Policy | <ul><li>[None](../Logging_Policies/None.md)</li></ul> |
|
||||
| References | <ul><li>[https://github.com/Cyb3rWard0g/OSSEM/blob/master/data_dictionaries/windows/sysmon/event-15.md](https://github.com/Cyb3rWard0g/OSSEM/blob/master/data_dictionaries/windows/sysmon/event-15.md)</li><li>[https://www.ultimatewindowssecurity.com/securitylog/encyclopedia/event.aspx?eventid=90015](https://www.ultimatewindowssecurity.com/securitylog/encyclopedia/event.aspx?eventid=90015)</li></ul> |
|
||||
| Platform | Windows |
|
||||
| Type | Windows Log |
|
||||
| Channel | Microsoft-Windows-Sysmon/Operational |
|
||||
| Provider | Microsoft-Windows-Sysmon |
|
||||
| Fields | <ul><li>EventID</li><li>Computer</li><li>UtcTime</li><li>ProcessGuid</li><li>ProcessId</li><li>Image</li><li>TargetFilename</li><li>CreationUtcTime</li><li>Hash</li></ul> |
|
||||
|
||||
|
||||
## Log Samples
|
||||
|
||||
### Raw Log
|
||||
|
||||
```
|
||||
- <Event xmlns="http://schemas.microsoft.com/win/2004/08/events/event">
|
||||
- <System>
|
||||
<Provider Name="Microsoft-Windows-Sysmon" Guid="{5770385F-C22A-43E0-BF4C-06F5698FFBD9}" />
|
||||
<EventID>15</EventID>
|
||||
<Version>2</Version>
|
||||
<Level>4</Level>
|
||||
<Task>15</Task>
|
||||
<Opcode>0</Opcode>
|
||||
<Keywords>0x8000000000000000</Keywords>
|
||||
<TimeCreated SystemTime="2019-01-21T12:43:53.385072700Z" />
|
||||
<EventRecordID>34115</EventRecordID>
|
||||
<Correlation />
|
||||
<Execution ProcessID="2052" ThreadID="4092" />
|
||||
<Channel>Microsoft-Windows-Sysmon/Operational</Channel>
|
||||
<Computer>atc-win-10.atc.local</Computer>
|
||||
<Security UserID="S-1-5-18" />
|
||||
</System>
|
||||
- <EventData>
|
||||
<Data Name="RuleName" />
|
||||
<Data Name="UtcTime">2019-01-21 12:43:53.368</Data>
|
||||
<Data Name="ProcessGuid">{9683FBB1-A860-5C45-0000-0010274F1400}</Data>
|
||||
<Data Name="ProcessId">6604</Data>
|
||||
<Data Name="Image">C:\windows\Explorer.EXE</Data>
|
||||
<Data Name="TargetFilename">C:\Users\user1\Downloads\wce_v1_42beta_x64\wce.exe</Data>
|
||||
<Data Name="CreationUtcTime">2013-11-11 22:41:40.000</Data>
|
||||
<Data Name="Hash">MD5=CCF1D1573F175299ADE01C07791A6541,SHA256=68A15A34C2E28B9B521A240B948634617D72AD619E3950BC6DC769E60A0C3CF2</Data>
|
||||
</EventData>
|
||||
</Event>
|
||||
|
||||
```
|
||||
|
||||
|
||||
|
||||
|
@ -0,0 +1,49 @@
|
||||
| Title | DN_0020_17_windows_sysmon_PipeEvent |
|
||||
|:---------------|:-----------------------------------------------------------------------------------------------------------------|
|
||||
| Description | This event generates when a named pipe is created. Malware often uses named pipes for interprocess communication. |
|
||||
| Logging Policy | <ul><li>[None](../Logging_Policies/None.md)</li></ul> |
|
||||
| References | <ul><li>[https://github.com/Cyb3rWard0g/OSSEM/blob/master/data_dictionaries/windows/sysmon/event-17.md](https://github.com/Cyb3rWard0g/OSSEM/blob/master/data_dictionaries/windows/sysmon/event-17.md)</li><li>[https://www.ultimatewindowssecurity.com/securitylog/encyclopedia/event.aspx?eventid=90017](https://www.ultimatewindowssecurity.com/securitylog/encyclopedia/event.aspx?eventid=90017)</li></ul> |
|
||||
| Platform | Windows |
|
||||
| Type | Windows Log |
|
||||
| Channel | Microsoft-Windows-Sysmon/Operational |
|
||||
| Provider | Microsoft-Windows-Sysmon |
|
||||
| Fields | <ul><li>EventID</li><li>Computer</li><li>UtcTime</li><li>ProcessGuid</li><li>ProcessId</li><li>PipeName</li><li>Image</li></ul> |
|
||||
|
||||
|
||||
## Log Samples
|
||||
|
||||
### Raw Log
|
||||
|
||||
```
|
||||
- <Event xmlns="http://schemas.microsoft.com/win/2004/08/events/event">
|
||||
- <System>
|
||||
<Provider Name="Microsoft-Windows-Sysmon" Guid="{5770385F-C22A-43E0-BF4C-06F5698FFBD9}" />
|
||||
<EventID>17</EventID>
|
||||
<Version>1</Version>
|
||||
<Level>4</Level>
|
||||
<Task>17</Task>
|
||||
<Opcode>0</Opcode>
|
||||
<Keywords>0x8000000000000000</Keywords>
|
||||
<TimeCreated SystemTime="2019-02-05T13:37:34.396695400Z" />
|
||||
<EventRecordID>46617</EventRecordID>
|
||||
<Correlation />
|
||||
<Execution ProcessID="3172" ThreadID="4192" />
|
||||
<Channel>Microsoft-Windows-Sysmon/Operational</Channel>
|
||||
<Computer>atc-win-10.atc.local</Computer>
|
||||
<Security UserID="S-1-5-18" />
|
||||
</System>
|
||||
- <EventData>
|
||||
<Data Name="RuleName" />
|
||||
<Data Name="UtcTime">2019-02-05 13:37:34.396</Data>
|
||||
<Data Name="ProcessGuid">{9683FBB1-919E-5C59-0000-0010A0E53B00}</Data>
|
||||
<Data Name="ProcessId">7128</Data>
|
||||
<Data Name="PipeName">\PSEXESVC-ATC-WIN-7-2728-stdin</Data>
|
||||
<Data Name="Image">C:\windows\PSEXESVC.exe</Data>
|
||||
</EventData>
|
||||
</Event>
|
||||
|
||||
```
|
||||
|
||||
|
||||
|
||||
|
@ -0,0 +1,49 @@
|
||||
| Title | DN_0021_18_windows_sysmon_PipeEvent |
|
||||
|:---------------|:-----------------------------------------------------------------------------------------------------------------|
|
||||
| Description | This event logs when a named pipe connection is made between a client and a server. |
|
||||
| Logging Policy | <ul><li>[None](../Logging_Policies/None.md)</li></ul> |
|
||||
| References | <ul><li>[https://github.com/Cyb3rWard0g/OSSEM/blob/master/data_dictionaries/windows/sysmon/event-18.md](https://github.com/Cyb3rWard0g/OSSEM/blob/master/data_dictionaries/windows/sysmon/event-18.md)</li><li>[https://www.ultimatewindowssecurity.com/securitylog/encyclopedia/event.aspx?eventid=90018](https://www.ultimatewindowssecurity.com/securitylog/encyclopedia/event.aspx?eventid=90018)</li></ul> |
|
||||
| Platform | Windows |
|
||||
| Type | Windows Log |
|
||||
| Channel | Microsoft-Windows-Sysmon/Operational |
|
||||
| Provider | Microsoft-Windows-Sysmon |
|
||||
| Fields | <ul><li>EventID</li><li>Computer</li><li>UtcTime</li><li>ProcessGuid</li><li>ProcessId</li><li>PipeName</li><li>Image</li></ul> |
|
||||
|
||||
|
||||
## Log Samples
|
||||
|
||||
### Raw Log
|
||||
|
||||
```
|
||||
- <Event xmlns="http://schemas.microsoft.com/win/2004/08/events/event">
|
||||
- <System>
|
||||
<Provider Name="Microsoft-Windows-Sysmon" Guid="{5770385F-C22A-43E0-BF4C-06F5698FFBD9}" />
|
||||
<EventID>18</EventID>
|
||||
<Version>1</Version>
|
||||
<Level>4</Level>
|
||||
<Task>18</Task>
|
||||
<Opcode>0</Opcode>
|
||||
<Keywords>0x8000000000000000</Keywords>
|
||||
<TimeCreated SystemTime="2019-02-05T13:37:34.457379300Z" />
|
||||
<EventRecordID>46620</EventRecordID>
|
||||
<Correlation />
|
||||
<Execution ProcessID="3172" ThreadID="4192" />
|
||||
<Channel>Microsoft-Windows-Sysmon/Operational</Channel>
|
||||
<Computer>tdl-win-10.tdl.local</Computer>
|
||||
<Security UserID="S-1-5-18" />
|
||||
</System>
|
||||
- <EventData>
|
||||
<Data Name="RuleName" />
|
||||
<Data Name="UtcTime">2019-02-05 13:37:34.455</Data>
|
||||
<Data Name="ProcessGuid">{9683FBB1-8B5F-5C59-0000-0010EB030000}</Data>
|
||||
<Data Name="ProcessId">4</Data>
|
||||
<Data Name="PipeName">\PSEXESVC-TDL-WIN-7-2728-stdin</Data>
|
||||
<Data Name="Image">System</Data>
|
||||
</EventData>
|
||||
</Event>
|
||||
|
||||
```
|
||||
|
||||
|
||||
|
||||
|
@ -0,0 +1,51 @@
|
||||
| Title | DN_0022_19_windows_sysmon_WmiEvent |
|
||||
|:---------------|:-----------------------------------------------------------------------------------------------------------------|
|
||||
| Description | When a WMI event filter is registered, which is a method used by malware to execute, this event logs the WMI namespace, filter name and filter expression. |
|
||||
| Logging Policy | <ul><li>[None](../Logging_Policies/None.md)</li></ul> |
|
||||
| References | <ul><li>[https://github.com/Cyb3rWard0g/OSSEM/blob/master/data_dictionaries/windows/sysmon/event-19.md](https://github.com/Cyb3rWard0g/OSSEM/blob/master/data_dictionaries/windows/sysmon/event-19.md)</li><li>[https://www.ultimatewindowssecurity.com/securitylog/encyclopedia/event.aspx?eventid=90019](https://www.ultimatewindowssecurity.com/securitylog/encyclopedia/event.aspx?eventid=90019)</li></ul> |
|
||||
| Platform | Windows |
|
||||
| Type | Windows Log |
|
||||
| Channel | Microsoft-Windows-Sysmon/Operational |
|
||||
| Provider | Microsoft-Windows-Sysmon |
|
||||
| Fields | <ul><li>EventID</li><li>Computer</li><li>EventType</li><li>UtcTime</li><li>Operation</li><li>User</li><li>EventNamespace</li><li>Name</li><li>Query</li></ul> |
|
||||
|
||||
|
||||
## Log Samples
|
||||
|
||||
### Raw Log
|
||||
|
||||
```
|
||||
- <Event xmlns="http://schemas.microsoft.com/win/2004/08/events/event">
|
||||
- <System>
|
||||
<Provider Name="Microsoft-Windows-Sysmon" Guid="{5770385F-C22A-43E0-BF4C-06F5698FFBD9}" />
|
||||
<EventID>19</EventID>
|
||||
<Version>3</Version>
|
||||
<Level>4</Level>
|
||||
<Task>19</Task>
|
||||
<Opcode>0</Opcode>
|
||||
<Keywords>0x8000000000000000</Keywords>
|
||||
<TimeCreated SystemTime="2019-02-05T14:44:42.434534600Z" />
|
||||
<EventRecordID>46712</EventRecordID>
|
||||
<Correlation />
|
||||
<Execution ProcessID="3172" ThreadID="444" />
|
||||
<Channel>Microsoft-Windows-Sysmon/Operational</Channel>
|
||||
<Computer>atc-win-10.atc.local</Computer>
|
||||
<Security UserID="S-1-5-18" />
|
||||
</System>
|
||||
- <EventData>
|
||||
<Data Name="RuleName" />
|
||||
<Data Name="EventType">WmiFilterEvent</Data>
|
||||
<Data Name="UtcTime">2019-02-05 14:44:42.432</Data>
|
||||
<Data Name="Operation">Created</Data>
|
||||
<Data Name="User">atc-win-10\user1</Data>
|
||||
<Data Name="EventNamespace">"root\\CimV2"</Data>
|
||||
<Data Name="Name">"AtomicRedTeam-WMIPersistence-Example"</Data>
|
||||
<Data Name="Query">"SELECT * FROM __InstanceModificationEvent WITHIN 60 WHERE TargetInstance ISA 'Win32_PerfFormattedData_PerfOS_System' AND TargetInstance.SystemUpTime >= 240 AND TargetInstance.SystemUpTime < 325"</Data>
|
||||
</EventData>
|
||||
</Event>
|
||||
|
||||
```
|
||||
|
||||
|
||||
|
||||
|
@ -0,0 +1,51 @@
|
||||
| Title | DN_0023_20_windows_sysmon_WmiEvent |
|
||||
|:---------------|:-----------------------------------------------------------------------------------------------------------------|
|
||||
| Description | This event logs the registration of WMI consumers, recording the consumer name, log, and destination. |
|
||||
| Logging Policy | <ul><li>[None](../Logging_Policies/None.md)</li></ul> |
|
||||
| References | <ul><li>[https://github.com/Cyb3rWard0g/OSSEM/blob/master/data_dictionaries/windows/sysmon/event-20.md](https://github.com/Cyb3rWard0g/OSSEM/blob/master/data_dictionaries/windows/sysmon/event-20.md)</li><li>[https://www.ultimatewindowssecurity.com/securitylog/encyclopedia/event.aspx?eventid=90020](https://www.ultimatewindowssecurity.com/securitylog/encyclopedia/event.aspx?eventid=90020)</li></ul> |
|
||||
| Platform | Windows |
|
||||
| Type | Windows Log |
|
||||
| Channel | Microsoft-Windows-Sysmon/Operational |
|
||||
| Provider | Microsoft-Windows-Sysmon |
|
||||
| Fields | <ul><li>EventID</li><li>Computer</li><li>EventType</li><li>UtcTime</li><li>Operation</li><li>User</li><li>Name</li><li>Type</li><li>Destination</li></ul> |
|
||||
|
||||
|
||||
## Log Samples
|
||||
|
||||
### Raw Log
|
||||
|
||||
```
|
||||
- <Event xmlns="http://schemas.microsoft.com/win/2004/08/events/event">
|
||||
- <System>
|
||||
<Provider Name="Microsoft-Windows-Sysmon" Guid="{5770385F-C22A-43E0-BF4C-06F5698FFBD9}" />
|
||||
<EventID>20</EventID>
|
||||
<Version>3</Version>
|
||||
<Level>4</Level>
|
||||
<Task>20</Task>
|
||||
<Opcode>0</Opcode>
|
||||
<Keywords>0x8000000000000000</Keywords>
|
||||
<TimeCreated SystemTime="2019-02-05T14:44:42.518512400Z" />
|
||||
<EventRecordID>46713</EventRecordID>
|
||||
<Correlation />
|
||||
<Execution ProcessID="3172" ThreadID="444" />
|
||||
<Channel>Microsoft-Windows-Sysmon/Operational</Channel>
|
||||
<Computer>atc-win-10.atc.local</Computer>
|
||||
<Security UserID="S-1-5-18" />
|
||||
</System>
|
||||
- <EventData>
|
||||
<Data Name="RuleName" />
|
||||
<Data Name="EventType">WmiConsumerEvent</Data>
|
||||
<Data Name="UtcTime">2019-02-05 14:44:42.510</Data>
|
||||
<Data Name="Operation">Created</Data>
|
||||
<Data Name="User">atc-win-10\user1</Data>
|
||||
<Data Name="Name">"AtomicRedTeam-WMIPersistence-Example"</Data>
|
||||
<Data Name="Type">Command Line</Data>
|
||||
<Data Name="Destination">"C:\\windows\\System32\\notepad.exe"</Data>
|
||||
</EventData>
|
||||
</Event>
|
||||
|
||||
```
|
||||
|
||||
|
||||
|
||||
|
@ -0,0 +1,50 @@
|
||||
| Title | DN_0024_21_windows_sysmon_WmiEvent |
|
||||
|:---------------|:-----------------------------------------------------------------------------------------------------------------|
|
||||
| Description | When a consumer binds to a filter, this event logs the consumer name and filter path. |
|
||||
| Logging Policy | <ul><li>[None](../Logging_Policies/None.md)</li></ul> |
|
||||
| References | <ul><li>[https://github.com/Cyb3rWard0g/OSSEM/blob/master/data_dictionaries/windows/sysmon/event-21.md](https://github.com/Cyb3rWard0g/OSSEM/blob/master/data_dictionaries/windows/sysmon/event-21.md)</li><li>[https://www.ultimatewindowssecurity.com/securitylog/encyclopedia/event.aspx?eventid=90021](https://www.ultimatewindowssecurity.com/securitylog/encyclopedia/event.aspx?eventid=90021)</li></ul> |
|
||||
| Platform | Windows |
|
||||
| Type | Windows Log |
|
||||
| Channel | Microsoft-Windows-Sysmon/Operational |
|
||||
| Provider | Microsoft-Windows-Sysmon |
|
||||
| Fields | <ul><li>EventID</li><li>Computer</li><li>EventType</li><li>UtcTime</li><li>Operation</li><li>User</li><li>Consumer</li><li>Filter</li></ul> |
|
||||
|
||||
|
||||
## Log Samples
|
||||
|
||||
### Raw Log
|
||||
|
||||
```
|
||||
- <Event xmlns="http://schemas.microsoft.com/win/2004/08/events/event">
|
||||
- <System>
|
||||
<Provider Name="Microsoft-Windows-Sysmon" Guid="{5770385F-C22A-43E0-BF4C-06F5698FFBD9}" />
|
||||
<EventID>21</EventID>
|
||||
<Version>3</Version>
|
||||
<Level>4</Level>
|
||||
<Task>21</Task>
|
||||
<Opcode>0</Opcode>
|
||||
<Keywords>0x8000000000000000</Keywords>
|
||||
<TimeCreated SystemTime="2019-02-05T14:44:47.091658300Z" />
|
||||
<EventRecordID>46714</EventRecordID>
|
||||
<Correlation />
|
||||
<Execution ProcessID="3172" ThreadID="444" />
|
||||
<Channel>Microsoft-Windows-Sysmon/Operational</Channel>
|
||||
<Computer>atc-win-10.atc.local</Computer>
|
||||
<Security UserID="S-1-5-18" />
|
||||
</System>
|
||||
- <EventData>
|
||||
<Data Name="RuleName" />
|
||||
<Data Name="EventType">WmiBindingEvent</Data>
|
||||
<Data Name="UtcTime">2019-02-05 14:44:47.087</Data>
|
||||
<Data Name="Operation">Created</Data>
|
||||
<Data Name="User">atc-win-10\user1</Data>
|
||||
<Data Name="Consumer">"\\\\.\\ROOT\\subscription:CommandLineEventConsumer.Name=\"AtomicRedTeam-WMIPersistence-Example\""</Data>
|
||||
<Data Name="Filter">"\\\\.\\ROOT\\subscription:__EventFilter.Name=\"AtomicRedTeam-WMIPersistence-Example\""</Data>
|
||||
</EventData>
|
||||
</Event>
|
||||
|
||||
```
|
||||
|
||||
|
||||
|
||||
|
@ -3,7 +3,7 @@
|
||||
| Description | Detects Hurricane Panda Activity |
|
||||
| ATT&CK Tactic | <ul><li>[TA0004: Privilege Escalation](https://attack.mitre.org/tactics/TA0004)</li></ul> |
|
||||
| ATT&CK Technique | <ul><li>[T1068](https://attack.mitre.org/tactics/T1068)</li></ul> |
|
||||
| Data Needed | <ul><li>[DN_0003_windows_sysmon_process_creation_1](../Data_Needed/DN_0003_windows_sysmon_process_creation_1.md)</li><li>[DN_0002_windows_process_creation_with_commandline_4688](../Data_Needed/DN_0002_windows_process_creation_with_commandline_4688.md)</li></ul> |
|
||||
| Data Needed | <ul></ul> |
|
||||
| Trigger | There is no Trigger for this technique yet. |
|
||||
| Severity Level | high |
|
||||
| False Positives | <ul><li>Unknown</li></ul> |
|
||||
|
@ -3,7 +3,7 @@
|
||||
| Description | Detect remote login by Administrator user depending on internal pattern |
|
||||
| ATT&CK Tactic | <ul><li>[TA0008: Lateral Movement](https://attack.mitre.org/tactics/TA0008)</li></ul> |
|
||||
| ATT&CK Technique | <ul><li>[T1078](https://attack.mitre.org/tactics/T1078)</li></ul> |
|
||||
| Data Needed | <ul><li>[DN_0004_windows_account_logon_4624](../Data_Needed/DN_0004_windows_account_logon_4624.md)</li></ul> |
|
||||
| Data Needed | <ul></ul> |
|
||||
| Trigger | There is no Trigger for this technique yet. |
|
||||
| Severity Level | low |
|
||||
| False Positives | <ul><li>Legitimate administrative activity</li></ul> |
|
||||
|
@ -3,7 +3,7 @@
|
||||
| Description | Detects suspicious process run from unusual locations |
|
||||
| ATT&CK Tactic | <ul><li>[TA0005: Defense Evasion](https://attack.mitre.org/tactics/TA0005)</li></ul> |
|
||||
| ATT&CK Technique | <ul><li>[T1036](https://attack.mitre.org/tactics/T1036)</li></ul> |
|
||||
| Data Needed | <ul><li>[DN_0002_windows_process_creation_with_commandline_4688](../Data_Needed/DN_0002_windows_process_creation_with_commandline_4688.md)</li><li>[DN_0003_windows_sysmon_process_creation_1](../Data_Needed/DN_0003_windows_sysmon_process_creation_1.md)</li></ul> |
|
||||
| Data Needed | <ul></ul> |
|
||||
| Trigger | <ul><li>[T1036](../Triggering/T1036.md)</li></ul> |
|
||||
| Severity Level | medium |
|
||||
| False Positives | <ul><li>False positives depend on scripts and administrative tools used in the monitored environment</li></ul> |
|
||||
|
@ -0,0 +1,85 @@
|
||||
| Title | Abusing impersonation. Service account –> SYSTEM |
|
||||
|:---------------------|:------------------------------------------------------------------------------------------------------------------------------------------------------------|
|
||||
| Description | Detection of processes spawned under SYSTEM by processes started with Network or Local service accounts |
|
||||
| ATT&CK Tactic | <ul><li>[TA0005: Defense Evasion](https://attack.mitre.org/tactics/TA0005)</li><li>[TA0004: Privilege Escalation](https://attack.mitre.org/tactics/TA0004)</li></ul> |
|
||||
| ATT&CK Technique | <ul><li>[T1134](https://attack.mitre.org/tactics/T1134)</li></ul> |
|
||||
| Data Needed | <ul><li>[[]](../Data_Needed/[].md)</li><li>[['DN_0003_1_windows_sysmon_process_creation']](../Data_Needed/['DN_0003_1_windows_sysmon_process_creation'].md)</li><li>[['DN_0003_1_windows_sysmon_process_creation']](../Data_Needed/['DN_0003_1_windows_sysmon_process_creation'].md)</li></ul> |
|
||||
| Trigger | <ul><li>[T1134](../Triggering/T1134.md)</li></ul> |
|
||||
| Severity Level | critical |
|
||||
| False Positives | <ul><li>Todo</li></ul> |
|
||||
| Development Status | experimental |
|
||||
| References | <ul><li>[https://www.slideshare.net/heirhabarov/hunting-for-privilege-escalation-in-windows-environment](https://www.slideshare.net/heirhabarov/hunting-for-privilege-escalation-in-windows-environment)</li></ul> |
|
||||
| Author | Teymur Kheirkhabarov |
|
||||
|
||||
|
||||
## Detection Rules
|
||||
|
||||
### Sigma rule
|
||||
|
||||
```
|
||||
title: Abusing impersonation. Service account –> SYSTEM
|
||||
description: Detection of processes spawned under SYSTEM by processes started with Network or Local service accounts
|
||||
references:
|
||||
- https://www.slideshare.net/heirhabarov/hunting-for-privilege-escalation-in-windows-environment
|
||||
tags:
|
||||
- attack.defense_evasion
|
||||
- attack.privilege_escalation
|
||||
- attack.t1134
|
||||
status: experimental
|
||||
author: Teymur Kheirkhabarov
|
||||
logsource:
|
||||
product: windows
|
||||
service: sysmon
|
||||
detection:
|
||||
selection1:
|
||||
EventID: 1
|
||||
User: "NT AUTHORITY\\SYSTEM"
|
||||
ParentUser:
|
||||
- "NT AUTHORITY\\NETWORK SERVICE"
|
||||
- "NT AUTHORITY\\LOCAL SERVICE"
|
||||
selection2:
|
||||
CommandLine:
|
||||
- "*rundll32*"
|
||||
selection3:
|
||||
CommandLine:
|
||||
- "*DavSetCookie*"
|
||||
condition: selection1 and not (selection2 and selection3)
|
||||
falsepositives:
|
||||
- Todo
|
||||
level: critical
|
||||
enrichment:
|
||||
- EN_0001_cache_sysmon_event_id_1_info
|
||||
- EN_0002_enrich_sysmon_event_id_1_with_parent_info
|
||||
|
||||
```
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
### Kibana query
|
||||
|
||||
```
|
||||
((EventID:"1" AND User:"NT AUTHORITY\\\\SYSTEM" AND ParentUser:("NT AUTHORITY\\\\NETWORK SERVICE" "NT AUTHORITY\\\\LOCAL SERVICE")) AND NOT ((CommandLine:("*rundll32*") AND CommandLine:("*DavSetCookie*"))))
|
||||
```
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
### X-Pack Watcher
|
||||
|
||||
```
|
||||
curl -s -XPUT -H \'Content-Type: application/json\' --data-binary @- localhost:9200/_xpack/watcher/watch/Abusing-impersonation.-Service-account-\xe2\x80\x93>-SYSTEM <<EOF\n{\n "trigger": {\n "schedule": {\n "interval": "30m"\n }\n },\n "input": {\n "search": {\n "request": {\n "body": {\n "size": 0,\n "query": {\n "query_string": {\n "query": "((EventID:\\"1\\" AND User:\\"NT AUTHORITY\\\\\\\\SYSTEM\\" AND ParentUser:(\\"NT AUTHORITY\\\\\\\\NETWORK SERVICE\\" \\"NT AUTHORITY\\\\\\\\LOCAL SERVICE\\")) AND NOT ((CommandLine:(\\"*rundll32*\\") AND CommandLine:(\\"*DavSetCookie*\\"))))",\n "analyze_wildcard": true\n }\n }\n },\n "indices": []\n }\n }\n },\n "condition": {\n "compare": {\n "ctx.payload.hits.total": {\n "not_eq": 0\n }\n }\n },\n "actions": {\n "send_email": {\n "email": {\n "to": null,\n "subject": "Sigma Rule \'Abusing impersonation. Service account \\u2013> SYSTEM\'",\n "body": "Hits:\\n{{#ctx.payload.hits.hits}}{{_source}}\\n================================================================================\\n{{/ctx.payload.hits.hits}}",\n "attachments": {\n "data.json": {\n "data": {\n "format": "json"\n }\n }\n }\n }\n }\n }\n}\nEOF\n
|
||||
```
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
### Graylog
|
||||
|
||||
```
|
||||
((EventID:"1" AND User:"NT AUTHORITY\\\\SYSTEM" AND ParentUser:("NT AUTHORITY\\\\NETWORK SERVICE" "NT AUTHORITY\\\\LOCAL SERVICE")) AND NOT ((CommandLine:("*rundll32*") AND CommandLine:("*DavSetCookie*"))))
|
||||
```
|
||||
|
@ -0,0 +1,77 @@
|
||||
| Title | Windows Kernel and 3rd-party drivers exploits. Token stealing |
|
||||
|:---------------------|:------------------------------------------------------------------------------------------------------------------------------------------------------------|
|
||||
| Description | Detection of child processes spawned with SYSTEM privileges by parents with non-SYSTEM privileges and Medium integrity level |
|
||||
| ATT&CK Tactic | <ul><li>[TA0004: Privilege Escalation](https://attack.mitre.org/tactics/TA0004)</li></ul> |
|
||||
| ATT&CK Technique | <ul><li>[T1068](https://attack.mitre.org/tactics/T1068)</li></ul> |
|
||||
| Data Needed | <ul></ul> |
|
||||
| Trigger | There is no Trigger for this technique yet. |
|
||||
| Severity Level | critical |
|
||||
| False Positives | <ul><li>Todo</li></ul> |
|
||||
| Development Status | experimental |
|
||||
| References | <ul><li>[https://www.slideshare.net/heirhabarov/hunting-for-privilege-escalation-in-windows-environment](https://www.slideshare.net/heirhabarov/hunting-for-privilege-escalation-in-windows-environment)</li></ul> |
|
||||
| Author | Teymur Kheirkhabarov |
|
||||
|
||||
|
||||
## Detection Rules
|
||||
|
||||
### Sigma rule
|
||||
|
||||
```
|
||||
title: Windows Kernel and 3rd-party drivers exploits. Token stealing
|
||||
description: Detection of child processes spawned with SYSTEM privileges by parents with non-SYSTEM privileges and Medium integrity level
|
||||
references:
|
||||
- https://www.slideshare.net/heirhabarov/hunting-for-privilege-escalation-in-windows-environment
|
||||
tags:
|
||||
- attack.privilege_escalation
|
||||
- attack.t1068
|
||||
status: experimental
|
||||
author: Teymur Kheirkhabarov
|
||||
logsource:
|
||||
product: windows
|
||||
service: sysmon
|
||||
detection:
|
||||
selection:
|
||||
EventID: 1
|
||||
ParentIntegrityLevel: Medium
|
||||
IntegrityLevel: System
|
||||
User: "NT AUTHORITY\\SYSTEM"
|
||||
condition: selection
|
||||
falsepositives:
|
||||
- Todo
|
||||
level: critical
|
||||
enrichment:
|
||||
- EN_0001_cache_sysmon_event_id_1_info
|
||||
- EN_0002_enrich_sysmon_event_id_1_with_parent_info
|
||||
|
||||
```
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
### Kibana query
|
||||
|
||||
```
|
||||
(EventID:"1" AND ParentIntegrityLevel:"Medium" AND IntegrityLevel:"System" AND User:"NT AUTHORITY\\\\SYSTEM")
|
||||
```
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
### X-Pack Watcher
|
||||
|
||||
```
|
||||
curl -s -XPUT -H \'Content-Type: application/json\' --data-binary @- localhost:9200/_xpack/watcher/watch/Windows-Kernel-and-3rd-party-drivers-exploits.-Token-stealing <<EOF\n{\n "trigger": {\n "schedule": {\n "interval": "30m"\n }\n },\n "input": {\n "search": {\n "request": {\n "body": {\n "size": 0,\n "query": {\n "query_string": {\n "query": "(EventID:\\"1\\" AND ParentIntegrityLevel:\\"Medium\\" AND IntegrityLevel:\\"System\\" AND User:\\"NT AUTHORITY\\\\\\\\SYSTEM\\")",\n "analyze_wildcard": true\n }\n }\n },\n "indices": []\n }\n }\n },\n "condition": {\n "compare": {\n "ctx.payload.hits.total": {\n "not_eq": 0\n }\n }\n },\n "actions": {\n "send_email": {\n "email": {\n "to": null,\n "subject": "Sigma Rule \'Windows Kernel and 3rd-party drivers exploits. Token stealing\'",\n "body": "Hits:\\n{{#ctx.payload.hits.hits}}{{_source}}\\n================================================================================\\n{{/ctx.payload.hits.hits}}",\n "attachments": {\n "data.json": {\n "data": {\n "format": "json"\n }\n }\n }\n }\n }\n }\n}\nEOF\n
|
||||
```
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
### Graylog
|
||||
|
||||
```
|
||||
(EventID:"1" AND ParentIntegrityLevel:"Medium" AND IntegrityLevel:"System" AND User:"NT AUTHORITY\\\\SYSTEM")
|
||||
```
|
||||
|
@ -3,7 +3,7 @@
|
||||
| Description | Detects suspicious process that use escape characters |
|
||||
| ATT&CK Tactic | <ul><li>[TA0005: Defense Evasion](https://attack.mitre.org/tactics/TA0005)</li></ul> |
|
||||
| ATT&CK Technique | <ul><li>[T1140](https://attack.mitre.org/tactics/T1140)</li></ul> |
|
||||
| Data Needed | <ul><li>[DN_0002_windows_process_creation_with_commandline_4688](../Data_Needed/DN_0002_windows_process_creation_with_commandline_4688.md)</li><li>[DN_0003_windows_sysmon_process_creation_1](../Data_Needed/DN_0003_windows_sysmon_process_creation_1.md)</li></ul> |
|
||||
| Data Needed | <ul></ul> |
|
||||
| Trigger | <ul><li>[T1140](../Triggering/T1140.md)</li></ul> |
|
||||
| Severity Level | low |
|
||||
| False Positives | <ul><li>False positives depend on scripts and administrative tools used in the monitored environment</li></ul> |
|
||||
|
@ -3,7 +3,7 @@
|
||||
| Description | Detects a set of commands often used in recon stages by different attack groups |
|
||||
| ATT&CK Tactic | <ul><li>[TA0007: Discovery](https://attack.mitre.org/tactics/TA0007)</li></ul> |
|
||||
| ATT&CK Technique | <ul><li>[T1073](https://attack.mitre.org/tactics/T1073)</li><li>[T1012](https://attack.mitre.org/tactics/T1012)</li></ul> |
|
||||
| Data Needed | <ul><li>[DN_0003_windows_sysmon_process_creation_1](../Data_Needed/DN_0003_windows_sysmon_process_creation_1.md)</li><li>[DN_0002_windows_process_creation_with_commandline_4688](../Data_Needed/DN_0002_windows_process_creation_with_commandline_4688.md)</li></ul> |
|
||||
| Data Needed | <ul></ul> |
|
||||
| Trigger | <ul><li>[T1012](../Triggering/T1012.md)</li></ul> |
|
||||
| Severity Level | medium |
|
||||
| False Positives | <ul><li>False positives depend on scripts and administrative tools used in the monitored environment</li></ul> |
|
||||
|
@ -3,7 +3,7 @@
|
||||
| Description | Detects suspicious IIS native-code module installations via command line |
|
||||
| ATT&CK Tactic | <ul><li>[TA0003: Persistence](https://attack.mitre.org/tactics/TA0003)</li></ul> |
|
||||
| ATT&CK Technique | <ul><li>[T1100](https://attack.mitre.org/tactics/T1100)</li></ul> |
|
||||
| Data Needed | <ul><li>[DN_0003_windows_sysmon_process_creation_1](../Data_Needed/DN_0003_windows_sysmon_process_creation_1.md)</li><li>[DN_0002_windows_process_creation_with_commandline_4688](../Data_Needed/DN_0002_windows_process_creation_with_commandline_4688.md)</li></ul> |
|
||||
| Data Needed | <ul></ul> |
|
||||
| Trigger | There is no Trigger for this technique yet. |
|
||||
| Severity Level | medium |
|
||||
| False Positives | <ul><li>Unknown as it may vary from organisation to arganisation how admins use to install IIS modules</li></ul> |
|
||||
|
@ -3,7 +3,7 @@
|
||||
| Description | Detects execution of ntdsutil.exe, which can be used for various attacks against the NTDS database (NTDS.DIT) |
|
||||
| ATT&CK Tactic | <ul><li>[TA0006: Credential Access](https://attack.mitre.org/tactics/TA0006)</li></ul> |
|
||||
| ATT&CK Technique | <ul><li>[T1003](https://attack.mitre.org/tactics/T1003)</li></ul> |
|
||||
| Data Needed | <ul><li>[DN_0003_windows_sysmon_process_creation_1](../Data_Needed/DN_0003_windows_sysmon_process_creation_1.md)</li><li>[DN_0002_windows_process_creation_with_commandline_4688](../Data_Needed/DN_0002_windows_process_creation_with_commandline_4688.md)</li></ul> |
|
||||
| Data Needed | <ul></ul> |
|
||||
| Trigger | <ul><li>[T1003](../Triggering/T1003.md)</li></ul> |
|
||||
| Severity Level | high |
|
||||
| False Positives | <ul><li>NTDS maintenance</li></ul> |
|
||||
|
@ -3,7 +3,7 @@
|
||||
| Description | Detects base64 encoded strings used in hidden malicious PowerShell command lines |
|
||||
| ATT&CK Tactic | <ul><li>[TA0002: Execution](https://attack.mitre.org/tactics/TA0002)</li></ul> |
|
||||
| ATT&CK Technique | <ul><li>[T1086](https://attack.mitre.org/tactics/T1086)</li></ul> |
|
||||
| Data Needed | <ul><li>[DN_0002_windows_process_creation_with_commandline_4688](../Data_Needed/DN_0002_windows_process_creation_with_commandline_4688.md)</li></ul> |
|
||||
| Data Needed | <ul></ul> |
|
||||
| Trigger | <ul><li>[T1086](../Triggering/T1086.md)</li></ul> |
|
||||
| Severity Level | high |
|
||||
| False Positives | <ul><li>Penetration tests</li></ul> |
|
||||
|
@ -3,7 +3,7 @@
|
||||
| Description | Detects suspicious process run from unusual locations |
|
||||
| ATT&CK Tactic | <ul><li>[TA0005: Defense Evasion](https://attack.mitre.org/tactics/TA0005)</li></ul> |
|
||||
| ATT&CK Technique | <ul><li>[T1036](https://attack.mitre.org/tactics/T1036)</li></ul> |
|
||||
| Data Needed | <ul><li>[DN_0002_windows_process_creation_with_commandline_4688](../Data_Needed/DN_0002_windows_process_creation_with_commandline_4688.md)</li><li>[DN_0003_windows_sysmon_process_creation_1](../Data_Needed/DN_0003_windows_sysmon_process_creation_1.md)</li></ul> |
|
||||
| Data Needed | <ul></ul> |
|
||||
| Trigger | <ul><li>[T1036](../Triggering/T1036.md)</li></ul> |
|
||||
| Severity Level | medium |
|
||||
| False Positives | <ul><li>False positives depend on scripts and administrative tools used in the monitored environment</li></ul> |
|
||||
|
@ -3,7 +3,7 @@
|
||||
| Description | Detects suspicious process related to rundll32 based on arguments |
|
||||
| ATT&CK Tactic | <ul><li>[TA0005: Defense Evasion](https://attack.mitre.org/tactics/TA0005)</li><li>[TA0002: Execution](https://attack.mitre.org/tactics/TA0002)</li></ul> |
|
||||
| ATT&CK Technique | <ul><li>[T1085](https://attack.mitre.org/tactics/T1085)</li></ul> |
|
||||
| Data Needed | <ul><li>[DN_0002_windows_process_creation_with_commandline_4688](../Data_Needed/DN_0002_windows_process_creation_with_commandline_4688.md)</li><li>[DN_0003_windows_sysmon_process_creation_1](../Data_Needed/DN_0003_windows_sysmon_process_creation_1.md)</li></ul> |
|
||||
| Data Needed | <ul></ul> |
|
||||
| Trigger | <ul><li>[T1085](../Triggering/T1085.md)</li></ul> |
|
||||
| Severity Level | |
|
||||
| False Positives | <ul><li>False positives depend on scripts and administrative tools used in the monitored environment</li></ul> |
|
||||
|
@ -3,7 +3,7 @@
|
||||
| Description | Detects Access to Domain Group Policies stored in SYSVOL |
|
||||
| ATT&CK Tactic | <ul><li>[TA0006: Credential Access](https://attack.mitre.org/tactics/TA0006)</li></ul> |
|
||||
| ATT&CK Technique | <ul><li>[T1003](https://attack.mitre.org/tactics/T1003)</li></ul> |
|
||||
| Data Needed | <ul><li>[DN_0003_windows_sysmon_process_creation_1](../Data_Needed/DN_0003_windows_sysmon_process_creation_1.md)</li><li>[DN_0002_windows_process_creation_with_commandline_4688](../Data_Needed/DN_0002_windows_process_creation_with_commandline_4688.md)</li></ul> |
|
||||
| Data Needed | <ul></ul> |
|
||||
| Trigger | <ul><li>[T1003](../Triggering/T1003.md)</li></ul> |
|
||||
| Severity Level | medium |
|
||||
| False Positives | <ul><li>administrative activity</li></ul> |
|
||||
|
@ -0,0 +1,78 @@
|
||||
| Title | Token swapping using Mimikatz driver |
|
||||
|:---------------------|:------------------------------------------------------------------------------------------------------------------------------------------------------------|
|
||||
| Description | Detection of child processes spawned under SYSTEM by process with High integrity level |
|
||||
| ATT&CK Tactic | <ul><li>[TA0005: Defense Evasion](https://attack.mitre.org/tactics/TA0005)</li><li>[TA0004: Privilege Escalation](https://attack.mitre.org/tactics/TA0004)</li></ul> |
|
||||
| ATT&CK Technique | <ul><li>[T1134](https://attack.mitre.org/tactics/T1134)</li></ul> |
|
||||
| Data Needed | <ul></ul> |
|
||||
| Trigger | <ul><li>[T1134](../Triggering/T1134.md)</li></ul> |
|
||||
| Severity Level | critical |
|
||||
| False Positives | <ul><li>Todo</li></ul> |
|
||||
| Development Status | experimental |
|
||||
| References | <ul><li>[https://www.slideshare.net/heirhabarov/hunting-for-privilege-escalation-in-windows-environment](https://www.slideshare.net/heirhabarov/hunting-for-privilege-escalation-in-windows-environment)</li></ul> |
|
||||
| Author | Teymur Kheirkhabarov |
|
||||
|
||||
|
||||
## Detection Rules
|
||||
|
||||
### Sigma rule
|
||||
|
||||
```
|
||||
title: Token swapping using Mimikatz driver
|
||||
description: Detection of child processes spawned under SYSTEM by process with High integrity level
|
||||
references:
|
||||
- https://www.slideshare.net/heirhabarov/hunting-for-privilege-escalation-in-windows-environment
|
||||
tags:
|
||||
- attack.defense_evasion
|
||||
- attack.privilege_escalation
|
||||
- attack.t1134
|
||||
status: experimental
|
||||
author: Teymur Kheirkhabarov
|
||||
logsource:
|
||||
product: windows
|
||||
service: sysmon
|
||||
detection:
|
||||
selection:
|
||||
EventID: 1
|
||||
ParentIntegrityLevel: High
|
||||
IntegrityLevel: System
|
||||
User: "NT AUTHORITY\\SYSTEM"
|
||||
condition: selection
|
||||
falsepositives:
|
||||
- Todo
|
||||
level: critical
|
||||
enrichment:
|
||||
- EN_0001_cache_sysmon_event_id_1_info
|
||||
- EN_0002_enrich_sysmon_event_id_1_with_parent_info
|
||||
|
||||
```
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
### Kibana query
|
||||
|
||||
```
|
||||
(EventID:"1" AND ParentIntegrityLevel:"High" AND IntegrityLevel:"System" AND User:"NT AUTHORITY\\\\SYSTEM")
|
||||
```
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
### X-Pack Watcher
|
||||
|
||||
```
|
||||
curl -s -XPUT -H \'Content-Type: application/json\' --data-binary @- localhost:9200/_xpack/watcher/watch/Token-swapping-using-Mimikatz-driver <<EOF\n{\n "trigger": {\n "schedule": {\n "interval": "30m"\n }\n },\n "input": {\n "search": {\n "request": {\n "body": {\n "size": 0,\n "query": {\n "query_string": {\n "query": "(EventID:\\"1\\" AND ParentIntegrityLevel:\\"High\\" AND IntegrityLevel:\\"System\\" AND User:\\"NT AUTHORITY\\\\\\\\SYSTEM\\")",\n "analyze_wildcard": true\n }\n }\n },\n "indices": []\n }\n }\n },\n "condition": {\n "compare": {\n "ctx.payload.hits.total": {\n "not_eq": 0\n }\n }\n },\n "actions": {\n "send_email": {\n "email": {\n "to": null,\n "subject": "Sigma Rule \'Token swapping using Mimikatz driver\'",\n "body": "Hits:\\n{{#ctx.payload.hits.hits}}{{_source}}\\n================================================================================\\n{{/ctx.payload.hits.hits}}",\n "attachments": {\n "data.json": {\n "data": {\n "format": "json"\n }\n }\n }\n }\n }\n }\n}\nEOF\n
|
||||
```
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
### Graylog
|
||||
|
||||
```
|
||||
(EventID:"1" AND ParentIntegrityLevel:"High" AND IntegrityLevel:"System" AND User:"NT AUTHORITY\\\\SYSTEM")
|
||||
```
|
||||
|
@ -3,7 +3,7 @@
|
||||
| Description | Detects WMI script event consumers |
|
||||
| ATT&CK Tactic | <ul><li>[TA0002: Execution](https://attack.mitre.org/tactics/TA0002)</li><li>[TA0003: Persistence](https://attack.mitre.org/tactics/TA0003)</li></ul> |
|
||||
| ATT&CK Technique | <ul><li>[T1047](https://attack.mitre.org/tactics/T1047)</li></ul> |
|
||||
| Data Needed | <ul><li>[DN_0003_windows_sysmon_process_creation_1](../Data_Needed/DN_0003_windows_sysmon_process_creation_1.md)</li><li>[DN_0002_windows_process_creation_with_commandline_4688](../Data_Needed/DN_0002_windows_process_creation_with_commandline_4688.md)</li><li>[DN_0001_windows_process_creation_4688](../Data_Needed/DN_0001_windows_process_creation_4688.md)</li></ul> |
|
||||
| Data Needed | <ul></ul> |
|
||||
| Trigger | <ul><li>[T1047](../Triggering/T1047.md)</li></ul> |
|
||||
| Severity Level | high |
|
||||
| False Positives | <ul><li>Legitimate event consumers</li></ul> |
|
||||
|
@ -0,0 +1,17 @@
|
||||
| Title | LP_0005_windows_sysmon_network_connection |
|
||||
|:---------------|:--------------------------------------------------------------------------------|
|
||||
| Description | The network connection event logs TCP/UDP connections on the machine. It is disabled by default. Each connection is linked to a process through the ProcessId and ProcessGUID fields. The event also contains the source and destination host names IP addresses, port numbers and IPv6 status. |
|
||||
| Default | Not configured |
|
||||
| Event Volume | High |
|
||||
| EventID | <ul><li>3</li></ul> |
|
||||
| References | <ul><li>[https://docs.microsoft.com/en-us/sysinternals/downloads/sysmon](https://docs.microsoft.com/en-us/sysinternals/downloads/sysmon)</li></ul> |
|
||||
|
||||
|
||||
|
||||
## Configuration
|
||||
|
||||
Sysmon event id 3 is disabled by default.
|
||||
It can be enabled by specyfying -n option
|
||||
However due to high level of produced logs it should be filtred with configuration file
|
||||
Sample configuration might be found here: https://github.com/SwiftOnSecurity/sysmon-config/blob/master/sysmonconfig-export.xml
|
||||
|
@ -0,0 +1,17 @@
|
||||
| Title | LP_0006_windows_sysmon_image_loaded |
|
||||
|:---------------|:--------------------------------------------------------------------------------|
|
||||
| Description | The image loaded event logs when a module is loaded in a specific process. This event is disabled by default and needs to be configured with the –l option. It indicates the process in which the module is loaded, hashes and signature information. The signature is created asynchronously for performance reasons and indicates if the file was removed after loading. This event should be configured carefully, as monitoring all image load events will generate a large number of events. |
|
||||
| Default | Not configured |
|
||||
| Event Volume | High |
|
||||
| EventID | <ul><li>7</li></ul> |
|
||||
| References | <ul><li>[https://docs.microsoft.com/en-us/sysinternals/downloads/sysmon](https://docs.microsoft.com/en-us/sysinternals/downloads/sysmon)</li></ul> |
|
||||
|
||||
|
||||
|
||||
## Configuration
|
||||
|
||||
Sysmon event id 7 is disabled by default.
|
||||
It can be enabled by specyfying -l option
|
||||
However due to high level of produced logs it should be filtred with configuration file
|
||||
Sample configuration might be found here: https://github.com/SwiftOnSecurity/sysmon-config/blob/master/sysmonconfig-export.xml
|
||||
|
@ -0,0 +1,26 @@
|
||||
| Title | LP_0007_windows_sysmon_ProcessAccess |
|
||||
|:---------------|:--------------------------------------------------------------------------------|
|
||||
| Description | The process accessed event reports when a process opens another process, an operation that’s often followed by information queries or reading and writing the address space of the target process. This enables detection of hacking tools that read the memory contents of processes like Local Security Authority (Lsass.exe) in order to steal credentials for use in Pass-the-Hash attacks. Enabling it can generate significant amounts of logging if there are diagnostic utilities active that repeatedly open processes to query their state, so it generally should only be done so with filters that remove expected accesses. |
|
||||
| Default | Not configured |
|
||||
| Event Volume | High |
|
||||
| EventID | <ul><li>10</li></ul> |
|
||||
| References | <ul><li>[https://docs.microsoft.com/en-us/sysinternals/downloads/sysmon](https://docs.microsoft.com/en-us/sysinternals/downloads/sysmon)</li></ul> |
|
||||
|
||||
|
||||
|
||||
## Configuration
|
||||
|
||||
Sysmon event id 10 is disabled by default.
|
||||
It can be enabled by specyfying configuration
|
||||
However due to high level of produced logs it should be filtred with configuration file
|
||||
Sample configuration:
|
||||
```
|
||||
<ProcessAccess onmatch="include">
|
||||
<TargetImage condition="is">C:\Windows\system32\lsass.exe</TargetImage>
|
||||
</ProcessAccess>
|
||||
<ProcessAccess onmatch="exclude">
|
||||
<SourceImage condition="is">C:\windows\system32\wbem\wmiprvse.exe</SourceImage>
|
||||
<SourceImage condition="is">C:\windows\system32\svchost.exe</TargetImage>
|
||||
</ProcessAccess>
|
||||
```
|
||||
|
@ -0,0 +1,92 @@
|
||||
| Title | LP_0008_windows_sysmon_FileCreate |
|
||||
|:---------------|:--------------------------------------------------------------------------------|
|
||||
| Description | File create operations are logged when a file is created or overwritten. This event is useful for monitoring autostart locations, like the Startup folder, as well as temporary and download directories, which are common places malware drops during initial infection. |
|
||||
| Default | Partially (Other) |
|
||||
| Event Volume | High |
|
||||
| EventID | <ul><li>11</li></ul> |
|
||||
| References | <ul><li>[https://docs.microsoft.com/en-us/sysinternals/downloads/sysmon](https://docs.microsoft.com/en-us/sysinternals/downloads/sysmon)</li></ul> |
|
||||
|
||||
|
||||
|
||||
## Configuration
|
||||
|
||||
Sysmon event id 11 is enabled by default however default configuration might not be sufficient.
|
||||
Sample configuration providing much better visibility might be found here: https://github.com/SwiftOnSecurity/sysmon-config/blob/master/sysmonconfig-export.xml
|
||||
|
||||
```
|
||||
<!--DATA: UtcTime, ProcessGuid, ProcessId, Image, TargetFilename, CreationUtcTime-->
|
||||
<FileCreate onmatch="include">
|
||||
<TargetFilename condition="contains">\Start Menu</TargetFilename> <!--Microsoft:Windows: Startup links and shortcut modification [ https://attack.mitre.org/wiki/Technique/T1023 ] -->
|
||||
<TargetFilename condition="contains">\Startup\</TargetFilename> <!--Microsoft:Office: Changes to user's auto-launched files and shortcuts-->
|
||||
<TargetFilename condition="contains">\Content.Outlook\</TargetFilename> <!--Microsoft:Outlook: attachments-->
|
||||
<TargetFilename condition="contains">\Downloads\</TargetFilename> <!--Downloaded files. Does not include "Run" files in IE-->
|
||||
<TargetFilename condition="end with">.application</TargetFilename> <!--Microsoft:ClickOnce: [ https://blog.netspi.com/all-you-need-is-one-a-clickonce-love-story/ ] -->
|
||||
<TargetFilename condition="end with">.appref-ms</TargetFilename> <!--Microsoft:ClickOnce application | Credit @ion-storm -->
|
||||
<TargetFilename condition="end with">.bat</TargetFilename> <!--Batch scripting-->
|
||||
<TargetFilename condition="end with">.chm</TargetFilename>
|
||||
<TargetFilename condition="end with">.cmd</TargetFilename> <!--Batch scripting: Batch scripts can also use the .cmd extension | Credit: @mmazanec -->
|
||||
<TargetFilename condition="end with">.cmdline</TargetFilename> <!--Microsoft:dotNet: Executed by cvtres.exe-->
|
||||
<TargetFilename condition="end with">.docm</TargetFilename> <!--Microsoft:Office:Word: Macro-->
|
||||
<TargetFilename condition="end with">.exe</TargetFilename> <!--Executable-->
|
||||
<TargetFilename condition="end with">.jar</TargetFilename> <!--Java applets-->
|
||||
<TargetFilename condition="end with">.jnlp</TargetFilename> <!--Java applets-->
|
||||
<TargetFilename condition="end with">.jse</TargetFilename> <!--Scripting [ Example: https://www.sophos.com/en-us/threat-center/threat-analyses/viruses-and-spyware/Mal~Phires-C/detailed-analysis.aspx ] -->
|
||||
<TargetFilename condition="end with">.hta</TargetFilename> <!--Scripting-->
|
||||
<TargetFilename condition="end with">.pptm</TargetFilename> <!--Microsoft:Office:Word: Macro-->
|
||||
<TargetFilename condition="end with">.ps1</TargetFilename> <!--PowerShell [ More information: http://www.hexacorn.com/blog/2014/08/27/beyond-good-ol-run-key-part-16/ ] -->
|
||||
<TargetFilename condition="end with">.sys</TargetFilename> <!--System driver files-->
|
||||
<TargetFilename condition="end with">.scr</TargetFilename> <!--System driver files-->
|
||||
<TargetFilename condition="end with">.vbe</TargetFilename> <!--VisualBasicScripting-->
|
||||
<TargetFilename condition="end with">.vbs</TargetFilename> <!--VisualBasicScripting-->
|
||||
<TargetFilename condition="end with">.xlsm</TargetFilename> <!--Microsoft:Office:Word: Macro-->
|
||||
<TargetFilename condition="end with">proj</TargetFilename><!--Microsoft:MSBuild:Script: More information: https://twitter.com/subTee/status/885919612969394177-->
|
||||
<TargetFilename condition="end with">.sln</TargetFilename><!--Microsoft:MSBuild:Script: More information: https://twitter.com/subTee/status/885919612969394177-->
|
||||
<TargetFilename condition="begin with">C:\Users\Default</TargetFilename> <!--Microsoft:Windows: Changes to default user profile-->
|
||||
<TargetFilename condition="begin with">C:\Windows\system32\Drivers</TargetFilename> <!--Microsoft: Drivers dropped here-->
|
||||
<TargetFilename condition="begin with">C:\Windows\SysWOW64\Drivers</TargetFilename> <!--Microsoft: Drivers dropped here-->
|
||||
<TargetFilename condition="begin with">C:\Windows\system32\GroupPolicy\Machine\Scripts</TargetFilename> <!--Group policy [ More information: http://www.hexacorn.com/blog/2017/01/07/beyond-good-ol-run-key-part-52/ ] -->
|
||||
<TargetFilename condition="begin with">C:\Windows\system32\GroupPolicy\User\Scripts</TargetFilename> <!--Group policy [ More information: http://www.hexacorn.com/blog/2017/01/07/beyond-good-ol-run-key-part-52/ ] -->
|
||||
<TargetFilename condition="begin with">C:\Windows\system32\Wbem</TargetFilename> <!--Microsoft:WMI: [ More information: http://2014.hackitoergosum.org/slides/day1_WMI_Shell_Andrei_Dumitrescu.pdf ] -->
|
||||
<TargetFilename condition="begin with">C:\Windows\SysWOW64\Wbem</TargetFilename> <!--Microsoft:WMI: [ More information: http://2014.hackitoergosum.org/slides/day1_WMI_Shell_Andrei_Dumitrescu.pdf ] -->
|
||||
<TargetFilename condition="begin with">C:\Windows\system32\WindowsPowerShell</TargetFilename> <!--Microsoft:Powershell: Look for modifications for persistence [ https://www.malwarearchaeology.com/cheat-sheets ] -->
|
||||
<TargetFilename condition="begin with">C:\Windows\SysWOW64\WindowsPowerShell</TargetFilename> <!--Microsoft:Powershell: Look for modifications for persistence [ https://www.malwarearchaeology.com/cheat-sheets ] -->
|
||||
<TargetFilename condition="begin with">C:\Windows\Tasks\</TargetFilename> <!--Microsoft:ScheduledTasks [ https://attack.mitre.org/wiki/Technique/T1053 ] -->
|
||||
<TargetFilename condition="begin with">C:\Windows\system32\Tasks</TargetFilename> <!--Microsoft:ScheduledTasks [ https://attack.mitre.org/wiki/Technique/T1053 ] -->
|
||||
<!--Windows application compatibility-->
|
||||
<TargetFilename condition="begin with">C:\Windows\AppPatch\Custom</TargetFilename> <!--Microsoft:Windows: Application compatibility shims [ https://www.fireeye.com/blog/threat-research/2017/05/fin7-shim-databases-persistence.html ] -->
|
||||
<TargetFilename condition="contains">VirtualStore</TargetFilename> <!--Microsoft:Windows: UAC virtualization [ https://blogs.msdn.microsoft.com/oldnewthing/20150902-00/?p=91681 ] -->
|
||||
<!--Exploitable file names-->
|
||||
<TargetFilename condition="end with">.xls</TargetFilename> <!--Legacy Office files are often used for attacks-->
|
||||
<TargetFilename condition="end with">.ppt</TargetFilename> <!--Legacy Office files are often used for attacks-->
|
||||
<TargetFilename condition="end with">.rft</TargetFilename> <!--RTF files often 0day malware vectors when opened by Office-->
|
||||
</FileCreate>
|
||||
|
||||
<FileCreate onmatch="exclude">
|
||||
<!--SECTION: Microsoft-->
|
||||
<Image condition="is">C:\Program Files (x86)\EMET 5.5\EMET_Service.exe</Image> <!--Microsoft:EMET: Writes to C:\Windows\AppPatch\-->
|
||||
<!--SECTION: Microsoft:Office-->
|
||||
<TargetFilename condition="is">C:\Windows\System32\Tasks\OfficeSoftwareProtectionPlatform\SvcRestartTask</TargetFilename>
|
||||
<!--SECTION: Microsoft:Office:Click2Run-->
|
||||
<Image condition="is">C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeC2RClient.exe</Image> <!-- Microsoft:Office Click2Run-->
|
||||
<!--SECTION: Microsoft:Windows-->
|
||||
<Image condition="is">C:\Windows\system32\smss.exe</Image> <!-- Microsoft:Windows: Session Manager SubSystem: Creates swapfile.sys,pagefile.sys,hiberfile.sys-->
|
||||
<Image condition="is">C:\Windows\system32\CompatTelRunner.exe</Image> <!-- Microsoft:Windows: Windows 10 app, creates tons of cache files-->
|
||||
<Image condition="is">\\?\C:\Windows\system32\wbem\WMIADAP.EXE</Image> <!-- Microsoft:Windows: WMI Performance updates-->
|
||||
<Image condition="is">C:\Windows\system32\mobsync.exe</Image> <!--Microsoft:Windows: Network file syncing-->
|
||||
<TargetFilename condition="begin with">C:\Windows\system32\DriverStore\Temp\</TargetFilename> <!-- Microsoft:Windows: Temp files by DrvInst.exe-->
|
||||
<TargetFilename condition="begin with">C:\Windows\system32\wbem\Performance\</TargetFilename> <!-- Microsoft:Windows: Created in wbem by WMIADAP.exe-->
|
||||
<TargetFilename condition="end with">WRITABLE.TST</TargetFilename> <!-- Microsoft:Windows: Created in wbem by svchost-->
|
||||
<TargetFilename condition="begin with">C:\Windows\Installer\</TargetFilename> <!--Microsoft:Windows:Installer: Ignore MSI installer files caching-->
|
||||
<!--SECTION: Microsoft:Windows:Updates-->
|
||||
<TargetFilename condition="begin with">C:\$WINDOWS.~BT\Sources\</TargetFilename> <!-- Microsoft:Windows: Feature updates containing lots of .exe and .sys-->
|
||||
<Image condition="begin with">C:\Windows\winsxs\amd64_microsoft-windows</Image> <!-- Microsoft:Windows: Windows update-->
|
||||
<!--SECTION: Dell-->
|
||||
<Image condition="is">C:\Program Files (x86)\Dell\CommandUpdate\InvColPC.exe</Image>
|
||||
<!--SECTION: Intel-->
|
||||
<Image condition="is">C:\Windows\system32\igfxCUIService.exe</Image> <!--Intel: Drops bat and other files in \Windows in normal operation-->
|
||||
<!--SECTION: Adobe-->
|
||||
<TargetFilename condition="is">C:\Windows\System32\Tasks\Adobe Acrobat Update Task</TargetFilename>
|
||||
<TargetFilename condition="is">C:\Windows\System32\Tasks\Adobe Flash Player Updater</TargetFilename>
|
||||
</FileCreate>
|
||||
```
|
||||
|
366
analytics.csv
366
analytics.csv
@ -4,6 +4,7 @@ TA0002: Execution,attack.t1047,WMI Persistence - Script Event Consumer,Hostname,
|
||||
TA0002: Execution,attack.t1047,WMI Persistence - Script Event Consumer,Username,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,1,LP_0003_windows_sysmon_process_creation
|
||||
TA0002: Execution,attack.t1047,WMI Persistence - Script Event Consumer,ProcessGuid,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,1,LP_0003_windows_sysmon_process_creation
|
||||
TA0002: Execution,attack.t1047,WMI Persistence - Script Event Consumer,ProcessId,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,1,LP_0003_windows_sysmon_process_creation
|
||||
TA0002: Execution,attack.t1047,WMI Persistence - Script Event Consumer,ThreadID,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,1,LP_0003_windows_sysmon_process_creation
|
||||
TA0002: Execution,attack.t1047,WMI Persistence - Script Event Consumer,ProcessName,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,1,LP_0003_windows_sysmon_process_creation
|
||||
TA0002: Execution,attack.t1047,WMI Persistence - Script Event Consumer,CommandLine,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,1,LP_0003_windows_sysmon_process_creation
|
||||
TA0002: Execution,attack.t1047,WMI Persistence - Script Event Consumer,LogonGuid,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,1,LP_0003_windows_sysmon_process_creation
|
||||
@ -25,6 +26,7 @@ TA0002: Execution,attack.t1047,WMI Persistence - Script Event Consumer,Hostname,
|
||||
TA0002: Execution,attack.t1047,WMI Persistence - Script Event Consumer,Username,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,4688,LP_0002_windows_audit_process_creation_with_commandline
|
||||
TA0002: Execution,attack.t1047,WMI Persistence - Script Event Consumer,ProcessGuid,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,4688,LP_0002_windows_audit_process_creation_with_commandline
|
||||
TA0002: Execution,attack.t1047,WMI Persistence - Script Event Consumer,ProcessId,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,4688,LP_0002_windows_audit_process_creation_with_commandline
|
||||
TA0002: Execution,attack.t1047,WMI Persistence - Script Event Consumer,ThreadID,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,4688,LP_0002_windows_audit_process_creation_with_commandline
|
||||
TA0002: Execution,attack.t1047,WMI Persistence - Script Event Consumer,ProcessName,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,4688,LP_0002_windows_audit_process_creation_with_commandline
|
||||
TA0002: Execution,attack.t1047,WMI Persistence - Script Event Consumer,CommandLine,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,4688,LP_0002_windows_audit_process_creation_with_commandline
|
||||
TA0002: Execution,attack.t1047,WMI Persistence - Script Event Consumer,LogonGuid,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,4688,LP_0002_windows_audit_process_creation_with_commandline
|
||||
@ -51,6 +53,8 @@ TA0002: Execution,attack.t1047,WMI Persistence - Script Event Consumer,ProcessGu
|
||||
TA0002: Execution,attack.t1047,WMI Persistence - Script Event Consumer,ProcessGuid,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,4696,LP_0001_windows_audit_process_creation
|
||||
TA0002: Execution,attack.t1047,WMI Persistence - Script Event Consumer,ProcessId,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,4688,LP_0001_windows_audit_process_creation
|
||||
TA0002: Execution,attack.t1047,WMI Persistence - Script Event Consumer,ProcessId,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,4696,LP_0001_windows_audit_process_creation
|
||||
TA0002: Execution,attack.t1047,WMI Persistence - Script Event Consumer,ThreadID,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,4688,LP_0001_windows_audit_process_creation
|
||||
TA0002: Execution,attack.t1047,WMI Persistence - Script Event Consumer,ThreadID,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,4696,LP_0001_windows_audit_process_creation
|
||||
TA0002: Execution,attack.t1047,WMI Persistence - Script Event Consumer,ProcessName,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,4688,LP_0001_windows_audit_process_creation
|
||||
TA0002: Execution,attack.t1047,WMI Persistence - Script Event Consumer,ProcessName,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,4696,LP_0001_windows_audit_process_creation
|
||||
TA0002: Execution,attack.t1047,WMI Persistence - Script Event Consumer,CommandLine,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,4688,LP_0001_windows_audit_process_creation
|
||||
@ -83,11 +87,35 @@ TA0002: Execution,attack.t1047,WMI Persistence - Script Event Consumer,ParentPro
|
||||
TA0002: Execution,attack.t1047,WMI Persistence - Script Event Consumer,ParentProcessName,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,4696,LP_0001_windows_audit_process_creation
|
||||
TA0002: Execution,attack.t1047,WMI Persistence - Script Event Consumer,ParentCommandLine,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,4688,LP_0001_windows_audit_process_creation
|
||||
TA0002: Execution,attack.t1047,WMI Persistence - Script Event Consumer,ParentCommandLine,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,4696,LP_0001_windows_audit_process_creation
|
||||
TA0002: Execution,attack.t1047,WMI Persistence - Script Event Consumer,EventID,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,11,LP_0008_windows_sysmon_FileCreate
|
||||
TA0002: Execution,attack.t1047,WMI Persistence - Script Event Consumer,Hostname,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,11,LP_0008_windows_sysmon_FileCreate
|
||||
TA0002: Execution,attack.t1047,WMI Persistence - Script Event Consumer,Username,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,11,LP_0008_windows_sysmon_FileCreate
|
||||
TA0002: Execution,attack.t1047,WMI Persistence - Script Event Consumer,ProcessGuid,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,11,LP_0008_windows_sysmon_FileCreate
|
||||
TA0002: Execution,attack.t1047,WMI Persistence - Script Event Consumer,ProcessId,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,11,LP_0008_windows_sysmon_FileCreate
|
||||
TA0002: Execution,attack.t1047,WMI Persistence - Script Event Consumer,ThreadID,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,11,LP_0008_windows_sysmon_FileCreate
|
||||
TA0002: Execution,attack.t1047,WMI Persistence - Script Event Consumer,ProcessName,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,11,LP_0008_windows_sysmon_FileCreate
|
||||
TA0002: Execution,attack.t1047,WMI Persistence - Script Event Consumer,CommandLine,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,11,LP_0008_windows_sysmon_FileCreate
|
||||
TA0002: Execution,attack.t1047,WMI Persistence - Script Event Consumer,LogonGuid,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,11,LP_0008_windows_sysmon_FileCreate
|
||||
TA0002: Execution,attack.t1047,WMI Persistence - Script Event Consumer,LogonId,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,11,LP_0008_windows_sysmon_FileCreate
|
||||
TA0002: Execution,attack.t1047,WMI Persistence - Script Event Consumer,TerminalSessionid,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,11,LP_0008_windows_sysmon_FileCreate
|
||||
TA0002: Execution,attack.t1047,WMI Persistence - Script Event Consumer,IntegrityLevel,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,11,LP_0008_windows_sysmon_FileCreate
|
||||
TA0002: Execution,attack.t1047,WMI Persistence - Script Event Consumer,Imphash,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,11,LP_0008_windows_sysmon_FileCreate
|
||||
TA0002: Execution,attack.t1047,WMI Persistence - Script Event Consumer,Sha256hash,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,11,LP_0008_windows_sysmon_FileCreate
|
||||
TA0002: Execution,attack.t1047,WMI Persistence - Script Event Consumer,Sha1hash,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,11,LP_0008_windows_sysmon_FileCreate
|
||||
TA0002: Execution,attack.t1047,WMI Persistence - Script Event Consumer,Md5hash,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,11,LP_0008_windows_sysmon_FileCreate
|
||||
TA0002: Execution,attack.t1047,WMI Persistence - Script Event Consumer,Image,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,11,LP_0008_windows_sysmon_FileCreate
|
||||
TA0002: Execution,attack.t1047,WMI Persistence - Script Event Consumer,ParentImage,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,11,LP_0008_windows_sysmon_FileCreate
|
||||
TA0002: Execution,attack.t1047,WMI Persistence - Script Event Consumer,ParentProcessGuid,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,11,LP_0008_windows_sysmon_FileCreate
|
||||
TA0002: Execution,attack.t1047,WMI Persistence - Script Event Consumer,ParentProcessId,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,11,LP_0008_windows_sysmon_FileCreate
|
||||
TA0002: Execution,attack.t1047,WMI Persistence - Script Event Consumer,ParentProcessName,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,11,LP_0008_windows_sysmon_FileCreate
|
||||
TA0002: Execution,attack.t1047,WMI Persistence - Script Event Consumer,ParentCommandLine,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,11,LP_0008_windows_sysmon_FileCreate
|
||||
TA0002: Execution,attack.t1047,WMI Persistence - Script Event Consumer,EventID,Windows,Windows Log,Security,1,LP_0003_windows_sysmon_process_creation
|
||||
TA0002: Execution,attack.t1047,WMI Persistence - Script Event Consumer,Hostname,Windows,Windows Log,Security,1,LP_0003_windows_sysmon_process_creation
|
||||
TA0002: Execution,attack.t1047,WMI Persistence - Script Event Consumer,Username,Windows,Windows Log,Security,1,LP_0003_windows_sysmon_process_creation
|
||||
TA0002: Execution,attack.t1047,WMI Persistence - Script Event Consumer,UserSid,Windows,Windows Log,Security,1,LP_0003_windows_sysmon_process_creation
|
||||
TA0002: Execution,attack.t1047,WMI Persistence - Script Event Consumer,ProcessPid,Windows,Windows Log,Security,1,LP_0003_windows_sysmon_process_creation
|
||||
TA0002: Execution,attack.t1047,WMI Persistence - Script Event Consumer,ProcessId,Windows,Windows Log,Security,1,LP_0003_windows_sysmon_process_creation
|
||||
TA0002: Execution,attack.t1047,WMI Persistence - Script Event Consumer,ThreadID,Windows,Windows Log,Security,1,LP_0003_windows_sysmon_process_creation
|
||||
TA0002: Execution,attack.t1047,WMI Persistence - Script Event Consumer,ProcessName,Windows,Windows Log,Security,1,LP_0003_windows_sysmon_process_creation
|
||||
TA0002: Execution,attack.t1047,WMI Persistence - Script Event Consumer,NewProcessName,Windows,Windows Log,Security,1,LP_0003_windows_sysmon_process_creation
|
||||
TA0002: Execution,attack.t1047,WMI Persistence - Script Event Consumer,Image,Windows,Windows Log,Security,1,LP_0003_windows_sysmon_process_creation
|
||||
@ -105,6 +133,8 @@ TA0002: Execution,attack.t1047,WMI Persistence - Script Event Consumer,Hostname,
|
||||
TA0002: Execution,attack.t1047,WMI Persistence - Script Event Consumer,Username,Windows,Windows Log,Security,4688,LP_0002_windows_audit_process_creation_with_commandline
|
||||
TA0002: Execution,attack.t1047,WMI Persistence - Script Event Consumer,UserSid,Windows,Windows Log,Security,4688,LP_0002_windows_audit_process_creation_with_commandline
|
||||
TA0002: Execution,attack.t1047,WMI Persistence - Script Event Consumer,ProcessPid,Windows,Windows Log,Security,4688,LP_0002_windows_audit_process_creation_with_commandline
|
||||
TA0002: Execution,attack.t1047,WMI Persistence - Script Event Consumer,ProcessId,Windows,Windows Log,Security,4688,LP_0002_windows_audit_process_creation_with_commandline
|
||||
TA0002: Execution,attack.t1047,WMI Persistence - Script Event Consumer,ThreadID,Windows,Windows Log,Security,4688,LP_0002_windows_audit_process_creation_with_commandline
|
||||
TA0002: Execution,attack.t1047,WMI Persistence - Script Event Consumer,ProcessName,Windows,Windows Log,Security,4688,LP_0002_windows_audit_process_creation_with_commandline
|
||||
TA0002: Execution,attack.t1047,WMI Persistence - Script Event Consumer,NewProcessName,Windows,Windows Log,Security,4688,LP_0002_windows_audit_process_creation_with_commandline
|
||||
TA0002: Execution,attack.t1047,WMI Persistence - Script Event Consumer,Image,Windows,Windows Log,Security,4688,LP_0002_windows_audit_process_creation_with_commandline
|
||||
@ -127,6 +157,10 @@ TA0002: Execution,attack.t1047,WMI Persistence - Script Event Consumer,UserSid,W
|
||||
TA0002: Execution,attack.t1047,WMI Persistence - Script Event Consumer,UserSid,Windows,Windows Log,Security,4696,LP_0001_windows_audit_process_creation
|
||||
TA0002: Execution,attack.t1047,WMI Persistence - Script Event Consumer,ProcessPid,Windows,Windows Log,Security,4688,LP_0001_windows_audit_process_creation
|
||||
TA0002: Execution,attack.t1047,WMI Persistence - Script Event Consumer,ProcessPid,Windows,Windows Log,Security,4696,LP_0001_windows_audit_process_creation
|
||||
TA0002: Execution,attack.t1047,WMI Persistence - Script Event Consumer,ProcessId,Windows,Windows Log,Security,4688,LP_0001_windows_audit_process_creation
|
||||
TA0002: Execution,attack.t1047,WMI Persistence - Script Event Consumer,ProcessId,Windows,Windows Log,Security,4696,LP_0001_windows_audit_process_creation
|
||||
TA0002: Execution,attack.t1047,WMI Persistence - Script Event Consumer,ThreadID,Windows,Windows Log,Security,4688,LP_0001_windows_audit_process_creation
|
||||
TA0002: Execution,attack.t1047,WMI Persistence - Script Event Consumer,ThreadID,Windows,Windows Log,Security,4696,LP_0001_windows_audit_process_creation
|
||||
TA0002: Execution,attack.t1047,WMI Persistence - Script Event Consumer,ProcessName,Windows,Windows Log,Security,4688,LP_0001_windows_audit_process_creation
|
||||
TA0002: Execution,attack.t1047,WMI Persistence - Script Event Consumer,ProcessName,Windows,Windows Log,Security,4696,LP_0001_windows_audit_process_creation
|
||||
TA0002: Execution,attack.t1047,WMI Persistence - Script Event Consumer,NewProcessName,Windows,Windows Log,Security,4688,LP_0001_windows_audit_process_creation
|
||||
@ -151,11 +185,72 @@ TA0002: Execution,attack.t1047,WMI Persistence - Script Event Consumer,TokenElev
|
||||
TA0002: Execution,attack.t1047,WMI Persistence - Script Event Consumer,TokenElevationType,Windows,Windows Log,Security,4696,LP_0001_windows_audit_process_creation
|
||||
TA0002: Execution,attack.t1047,WMI Persistence - Script Event Consumer,LogonId,Windows,Windows Log,Security,4688,LP_0001_windows_audit_process_creation
|
||||
TA0002: Execution,attack.t1047,WMI Persistence - Script Event Consumer,LogonId,Windows,Windows Log,Security,4696,LP_0001_windows_audit_process_creation
|
||||
TA0002: Execution,attack.t1047,WMI Persistence - Script Event Consumer,EventID,Windows,Windows Log,Security,11,LP_0008_windows_sysmon_FileCreate
|
||||
TA0002: Execution,attack.t1047,WMI Persistence - Script Event Consumer,Hostname,Windows,Windows Log,Security,11,LP_0008_windows_sysmon_FileCreate
|
||||
TA0002: Execution,attack.t1047,WMI Persistence - Script Event Consumer,Username,Windows,Windows Log,Security,11,LP_0008_windows_sysmon_FileCreate
|
||||
TA0002: Execution,attack.t1047,WMI Persistence - Script Event Consumer,UserSid,Windows,Windows Log,Security,11,LP_0008_windows_sysmon_FileCreate
|
||||
TA0002: Execution,attack.t1047,WMI Persistence - Script Event Consumer,ProcessPid,Windows,Windows Log,Security,11,LP_0008_windows_sysmon_FileCreate
|
||||
TA0002: Execution,attack.t1047,WMI Persistence - Script Event Consumer,ProcessId,Windows,Windows Log,Security,11,LP_0008_windows_sysmon_FileCreate
|
||||
TA0002: Execution,attack.t1047,WMI Persistence - Script Event Consumer,ThreadID,Windows,Windows Log,Security,11,LP_0008_windows_sysmon_FileCreate
|
||||
TA0002: Execution,attack.t1047,WMI Persistence - Script Event Consumer,ProcessName,Windows,Windows Log,Security,11,LP_0008_windows_sysmon_FileCreate
|
||||
TA0002: Execution,attack.t1047,WMI Persistence - Script Event Consumer,NewProcessName,Windows,Windows Log,Security,11,LP_0008_windows_sysmon_FileCreate
|
||||
TA0002: Execution,attack.t1047,WMI Persistence - Script Event Consumer,Image,Windows,Windows Log,Security,11,LP_0008_windows_sysmon_FileCreate
|
||||
TA0002: Execution,attack.t1047,WMI Persistence - Script Event Consumer,CommandLine,Windows,Windows Log,Security,11,LP_0008_windows_sysmon_FileCreate
|
||||
TA0002: Execution,attack.t1047,WMI Persistence - Script Event Consumer,ProcessCommandLine,Windows,Windows Log,Security,11,LP_0008_windows_sysmon_FileCreate
|
||||
TA0002: Execution,attack.t1047,WMI Persistence - Script Event Consumer,ProcesssCommandLine,Windows,Windows Log,Security,11,LP_0008_windows_sysmon_FileCreate
|
||||
TA0002: Execution,attack.t1047,WMI Persistence - Script Event Consumer,ParentProcessPid,Windows,Windows Log,Security,11,LP_0008_windows_sysmon_FileCreate
|
||||
TA0002: Execution,attack.t1047,WMI Persistence - Script Event Consumer,ParentImage,Windows,Windows Log,Security,11,LP_0008_windows_sysmon_FileCreate
|
||||
TA0002: Execution,attack.t1047,WMI Persistence - Script Event Consumer,ParentProcessName,Windows,Windows Log,Security,11,LP_0008_windows_sysmon_FileCreate
|
||||
TA0002: Execution,attack.t1047,WMI Persistence - Script Event Consumer,MandatoryLabel,Windows,Windows Log,Security,11,LP_0008_windows_sysmon_FileCreate
|
||||
TA0002: Execution,attack.t1047,WMI Persistence - Script Event Consumer,TokenElevationType,Windows,Windows Log,Security,11,LP_0008_windows_sysmon_FileCreate
|
||||
TA0002: Execution,attack.t1047,WMI Persistence - Script Event Consumer,LogonId,Windows,Windows Log,Security,11,LP_0008_windows_sysmon_FileCreate
|
||||
TA0002: Execution,attack.t1047,WMI Persistence - Script Event Consumer,EventID,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,1,LP_0003_windows_sysmon_process_creation
|
||||
TA0002: Execution,attack.t1047,WMI Persistence - Script Event Consumer,Computer,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,1,LP_0003_windows_sysmon_process_creation
|
||||
TA0002: Execution,attack.t1047,WMI Persistence - Script Event Consumer,UtcTime,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,1,LP_0003_windows_sysmon_process_creation
|
||||
TA0002: Execution,attack.t1047,WMI Persistence - Script Event Consumer,ProcessGuid,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,1,LP_0003_windows_sysmon_process_creation
|
||||
TA0002: Execution,attack.t1047,WMI Persistence - Script Event Consumer,ProcessId,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,1,LP_0003_windows_sysmon_process_creation
|
||||
TA0002: Execution,attack.t1047,WMI Persistence - Script Event Consumer,Image,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,1,LP_0003_windows_sysmon_process_creation
|
||||
TA0002: Execution,attack.t1047,WMI Persistence - Script Event Consumer,TargetFilename,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,1,LP_0003_windows_sysmon_process_creation
|
||||
TA0002: Execution,attack.t1047,WMI Persistence - Script Event Consumer,CreationUtcTime,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,1,LP_0003_windows_sysmon_process_creation
|
||||
TA0002: Execution,attack.t1047,WMI Persistence - Script Event Consumer,EventID,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,4688,LP_0002_windows_audit_process_creation_with_commandline
|
||||
TA0002: Execution,attack.t1047,WMI Persistence - Script Event Consumer,Computer,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,4688,LP_0002_windows_audit_process_creation_with_commandline
|
||||
TA0002: Execution,attack.t1047,WMI Persistence - Script Event Consumer,UtcTime,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,4688,LP_0002_windows_audit_process_creation_with_commandline
|
||||
TA0002: Execution,attack.t1047,WMI Persistence - Script Event Consumer,ProcessGuid,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,4688,LP_0002_windows_audit_process_creation_with_commandline
|
||||
TA0002: Execution,attack.t1047,WMI Persistence - Script Event Consumer,ProcessId,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,4688,LP_0002_windows_audit_process_creation_with_commandline
|
||||
TA0002: Execution,attack.t1047,WMI Persistence - Script Event Consumer,Image,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,4688,LP_0002_windows_audit_process_creation_with_commandline
|
||||
TA0002: Execution,attack.t1047,WMI Persistence - Script Event Consumer,TargetFilename,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,4688,LP_0002_windows_audit_process_creation_with_commandline
|
||||
TA0002: Execution,attack.t1047,WMI Persistence - Script Event Consumer,CreationUtcTime,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,4688,LP_0002_windows_audit_process_creation_with_commandline
|
||||
TA0002: Execution,attack.t1047,WMI Persistence - Script Event Consumer,EventID,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,4688,LP_0001_windows_audit_process_creation
|
||||
TA0002: Execution,attack.t1047,WMI Persistence - Script Event Consumer,EventID,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,4696,LP_0001_windows_audit_process_creation
|
||||
TA0002: Execution,attack.t1047,WMI Persistence - Script Event Consumer,Computer,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,4688,LP_0001_windows_audit_process_creation
|
||||
TA0002: Execution,attack.t1047,WMI Persistence - Script Event Consumer,Computer,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,4696,LP_0001_windows_audit_process_creation
|
||||
TA0002: Execution,attack.t1047,WMI Persistence - Script Event Consumer,UtcTime,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,4688,LP_0001_windows_audit_process_creation
|
||||
TA0002: Execution,attack.t1047,WMI Persistence - Script Event Consumer,UtcTime,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,4696,LP_0001_windows_audit_process_creation
|
||||
TA0002: Execution,attack.t1047,WMI Persistence - Script Event Consumer,ProcessGuid,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,4688,LP_0001_windows_audit_process_creation
|
||||
TA0002: Execution,attack.t1047,WMI Persistence - Script Event Consumer,ProcessGuid,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,4696,LP_0001_windows_audit_process_creation
|
||||
TA0002: Execution,attack.t1047,WMI Persistence - Script Event Consumer,ProcessId,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,4688,LP_0001_windows_audit_process_creation
|
||||
TA0002: Execution,attack.t1047,WMI Persistence - Script Event Consumer,ProcessId,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,4696,LP_0001_windows_audit_process_creation
|
||||
TA0002: Execution,attack.t1047,WMI Persistence - Script Event Consumer,Image,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,4688,LP_0001_windows_audit_process_creation
|
||||
TA0002: Execution,attack.t1047,WMI Persistence - Script Event Consumer,Image,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,4696,LP_0001_windows_audit_process_creation
|
||||
TA0002: Execution,attack.t1047,WMI Persistence - Script Event Consumer,TargetFilename,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,4688,LP_0001_windows_audit_process_creation
|
||||
TA0002: Execution,attack.t1047,WMI Persistence - Script Event Consumer,TargetFilename,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,4696,LP_0001_windows_audit_process_creation
|
||||
TA0002: Execution,attack.t1047,WMI Persistence - Script Event Consumer,CreationUtcTime,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,4688,LP_0001_windows_audit_process_creation
|
||||
TA0002: Execution,attack.t1047,WMI Persistence - Script Event Consumer,CreationUtcTime,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,4696,LP_0001_windows_audit_process_creation
|
||||
TA0002: Execution,attack.t1047,WMI Persistence - Script Event Consumer,EventID,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,11,LP_0008_windows_sysmon_FileCreate
|
||||
TA0002: Execution,attack.t1047,WMI Persistence - Script Event Consumer,Computer,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,11,LP_0008_windows_sysmon_FileCreate
|
||||
TA0002: Execution,attack.t1047,WMI Persistence - Script Event Consumer,UtcTime,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,11,LP_0008_windows_sysmon_FileCreate
|
||||
TA0002: Execution,attack.t1047,WMI Persistence - Script Event Consumer,ProcessGuid,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,11,LP_0008_windows_sysmon_FileCreate
|
||||
TA0002: Execution,attack.t1047,WMI Persistence - Script Event Consumer,ProcessId,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,11,LP_0008_windows_sysmon_FileCreate
|
||||
TA0002: Execution,attack.t1047,WMI Persistence - Script Event Consumer,Image,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,11,LP_0008_windows_sysmon_FileCreate
|
||||
TA0002: Execution,attack.t1047,WMI Persistence - Script Event Consumer,TargetFilename,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,11,LP_0008_windows_sysmon_FileCreate
|
||||
TA0002: Execution,attack.t1047,WMI Persistence - Script Event Consumer,CreationUtcTime,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,11,LP_0008_windows_sysmon_FileCreate
|
||||
TA0002: Execution,attack.t1047,WMI Persistence - Script Event Consumer,EventID,Windows,Windows Log,Security,1,LP_0003_windows_sysmon_process_creation
|
||||
TA0002: Execution,attack.t1047,WMI Persistence - Script Event Consumer,Hostname,Windows,Windows Log,Security,1,LP_0003_windows_sysmon_process_creation
|
||||
TA0002: Execution,attack.t1047,WMI Persistence - Script Event Consumer,Username,Windows,Windows Log,Security,1,LP_0003_windows_sysmon_process_creation
|
||||
TA0002: Execution,attack.t1047,WMI Persistence - Script Event Consumer,UserSid,Windows,Windows Log,Security,1,LP_0003_windows_sysmon_process_creation
|
||||
TA0002: Execution,attack.t1047,WMI Persistence - Script Event Consumer,ProcessPid,Windows,Windows Log,Security,1,LP_0003_windows_sysmon_process_creation
|
||||
TA0002: Execution,attack.t1047,WMI Persistence - Script Event Consumer,ProcessId,Windows,Windows Log,Security,1,LP_0003_windows_sysmon_process_creation
|
||||
TA0002: Execution,attack.t1047,WMI Persistence - Script Event Consumer,ThreadID,Windows,Windows Log,Security,1,LP_0003_windows_sysmon_process_creation
|
||||
TA0002: Execution,attack.t1047,WMI Persistence - Script Event Consumer,ProcessName,Windows,Windows Log,Security,1,LP_0003_windows_sysmon_process_creation
|
||||
TA0002: Execution,attack.t1047,WMI Persistence - Script Event Consumer,NewProcessName,Windows,Windows Log,Security,1,LP_0003_windows_sysmon_process_creation
|
||||
TA0002: Execution,attack.t1047,WMI Persistence - Script Event Consumer,Image,Windows,Windows Log,Security,1,LP_0003_windows_sysmon_process_creation
|
||||
@ -170,6 +265,8 @@ TA0002: Execution,attack.t1047,WMI Persistence - Script Event Consumer,Hostname,
|
||||
TA0002: Execution,attack.t1047,WMI Persistence - Script Event Consumer,Username,Windows,Windows Log,Security,4688,LP_0002_windows_audit_process_creation_with_commandline
|
||||
TA0002: Execution,attack.t1047,WMI Persistence - Script Event Consumer,UserSid,Windows,Windows Log,Security,4688,LP_0002_windows_audit_process_creation_with_commandline
|
||||
TA0002: Execution,attack.t1047,WMI Persistence - Script Event Consumer,ProcessPid,Windows,Windows Log,Security,4688,LP_0002_windows_audit_process_creation_with_commandline
|
||||
TA0002: Execution,attack.t1047,WMI Persistence - Script Event Consumer,ProcessId,Windows,Windows Log,Security,4688,LP_0002_windows_audit_process_creation_with_commandline
|
||||
TA0002: Execution,attack.t1047,WMI Persistence - Script Event Consumer,ThreadID,Windows,Windows Log,Security,4688,LP_0002_windows_audit_process_creation_with_commandline
|
||||
TA0002: Execution,attack.t1047,WMI Persistence - Script Event Consumer,ProcessName,Windows,Windows Log,Security,4688,LP_0002_windows_audit_process_creation_with_commandline
|
||||
TA0002: Execution,attack.t1047,WMI Persistence - Script Event Consumer,NewProcessName,Windows,Windows Log,Security,4688,LP_0002_windows_audit_process_creation_with_commandline
|
||||
TA0002: Execution,attack.t1047,WMI Persistence - Script Event Consumer,Image,Windows,Windows Log,Security,4688,LP_0002_windows_audit_process_creation_with_commandline
|
||||
@ -189,6 +286,10 @@ TA0002: Execution,attack.t1047,WMI Persistence - Script Event Consumer,UserSid,W
|
||||
TA0002: Execution,attack.t1047,WMI Persistence - Script Event Consumer,UserSid,Windows,Windows Log,Security,4696,LP_0001_windows_audit_process_creation
|
||||
TA0002: Execution,attack.t1047,WMI Persistence - Script Event Consumer,ProcessPid,Windows,Windows Log,Security,4688,LP_0001_windows_audit_process_creation
|
||||
TA0002: Execution,attack.t1047,WMI Persistence - Script Event Consumer,ProcessPid,Windows,Windows Log,Security,4696,LP_0001_windows_audit_process_creation
|
||||
TA0002: Execution,attack.t1047,WMI Persistence - Script Event Consumer,ProcessId,Windows,Windows Log,Security,4688,LP_0001_windows_audit_process_creation
|
||||
TA0002: Execution,attack.t1047,WMI Persistence - Script Event Consumer,ProcessId,Windows,Windows Log,Security,4696,LP_0001_windows_audit_process_creation
|
||||
TA0002: Execution,attack.t1047,WMI Persistence - Script Event Consumer,ThreadID,Windows,Windows Log,Security,4688,LP_0001_windows_audit_process_creation
|
||||
TA0002: Execution,attack.t1047,WMI Persistence - Script Event Consumer,ThreadID,Windows,Windows Log,Security,4696,LP_0001_windows_audit_process_creation
|
||||
TA0002: Execution,attack.t1047,WMI Persistence - Script Event Consumer,ProcessName,Windows,Windows Log,Security,4688,LP_0001_windows_audit_process_creation
|
||||
TA0002: Execution,attack.t1047,WMI Persistence - Script Event Consumer,ProcessName,Windows,Windows Log,Security,4696,LP_0001_windows_audit_process_creation
|
||||
TA0002: Execution,attack.t1047,WMI Persistence - Script Event Consumer,NewProcessName,Windows,Windows Log,Security,4688,LP_0001_windows_audit_process_creation
|
||||
@ -207,11 +308,28 @@ TA0002: Execution,attack.t1047,WMI Persistence - Script Event Consumer,TokenElev
|
||||
TA0002: Execution,attack.t1047,WMI Persistence - Script Event Consumer,TokenElevationType,Windows,Windows Log,Security,4696,LP_0001_windows_audit_process_creation
|
||||
TA0002: Execution,attack.t1047,WMI Persistence - Script Event Consumer,LogonId,Windows,Windows Log,Security,4688,LP_0001_windows_audit_process_creation
|
||||
TA0002: Execution,attack.t1047,WMI Persistence - Script Event Consumer,LogonId,Windows,Windows Log,Security,4696,LP_0001_windows_audit_process_creation
|
||||
TA0002: Execution,attack.t1047,WMI Persistence - Script Event Consumer,EventID,Windows,Windows Log,Security,11,LP_0008_windows_sysmon_FileCreate
|
||||
TA0002: Execution,attack.t1047,WMI Persistence - Script Event Consumer,Hostname,Windows,Windows Log,Security,11,LP_0008_windows_sysmon_FileCreate
|
||||
TA0002: Execution,attack.t1047,WMI Persistence - Script Event Consumer,Username,Windows,Windows Log,Security,11,LP_0008_windows_sysmon_FileCreate
|
||||
TA0002: Execution,attack.t1047,WMI Persistence - Script Event Consumer,UserSid,Windows,Windows Log,Security,11,LP_0008_windows_sysmon_FileCreate
|
||||
TA0002: Execution,attack.t1047,WMI Persistence - Script Event Consumer,ProcessPid,Windows,Windows Log,Security,11,LP_0008_windows_sysmon_FileCreate
|
||||
TA0002: Execution,attack.t1047,WMI Persistence - Script Event Consumer,ProcessId,Windows,Windows Log,Security,11,LP_0008_windows_sysmon_FileCreate
|
||||
TA0002: Execution,attack.t1047,WMI Persistence - Script Event Consumer,ThreadID,Windows,Windows Log,Security,11,LP_0008_windows_sysmon_FileCreate
|
||||
TA0002: Execution,attack.t1047,WMI Persistence - Script Event Consumer,ProcessName,Windows,Windows Log,Security,11,LP_0008_windows_sysmon_FileCreate
|
||||
TA0002: Execution,attack.t1047,WMI Persistence - Script Event Consumer,NewProcessName,Windows,Windows Log,Security,11,LP_0008_windows_sysmon_FileCreate
|
||||
TA0002: Execution,attack.t1047,WMI Persistence - Script Event Consumer,Image,Windows,Windows Log,Security,11,LP_0008_windows_sysmon_FileCreate
|
||||
TA0002: Execution,attack.t1047,WMI Persistence - Script Event Consumer,ParentImage,Windows,Windows Log,Security,11,LP_0008_windows_sysmon_FileCreate
|
||||
TA0002: Execution,attack.t1047,WMI Persistence - Script Event Consumer,ParentProcessPid,Windows,Windows Log,Security,11,LP_0008_windows_sysmon_FileCreate
|
||||
TA0002: Execution,attack.t1047,WMI Persistence - Script Event Consumer,ParentProcessName,Windows,Windows Log,Security,11,LP_0008_windows_sysmon_FileCreate
|
||||
TA0002: Execution,attack.t1047,WMI Persistence - Script Event Consumer,MandatoryLabel,Windows,Windows Log,Security,11,LP_0008_windows_sysmon_FileCreate
|
||||
TA0002: Execution,attack.t1047,WMI Persistence - Script Event Consumer,TokenElevationType,Windows,Windows Log,Security,11,LP_0008_windows_sysmon_FileCreate
|
||||
TA0002: Execution,attack.t1047,WMI Persistence - Script Event Consumer,LogonId,Windows,Windows Log,Security,11,LP_0008_windows_sysmon_FileCreate
|
||||
TA0003: Persistence,attack.t1047,WMI Persistence - Script Event Consumer,EventID,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,1,LP_0003_windows_sysmon_process_creation
|
||||
TA0003: Persistence,attack.t1047,WMI Persistence - Script Event Consumer,Hostname,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,1,LP_0003_windows_sysmon_process_creation
|
||||
TA0003: Persistence,attack.t1047,WMI Persistence - Script Event Consumer,Username,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,1,LP_0003_windows_sysmon_process_creation
|
||||
TA0003: Persistence,attack.t1047,WMI Persistence - Script Event Consumer,ProcessGuid,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,1,LP_0003_windows_sysmon_process_creation
|
||||
TA0003: Persistence,attack.t1047,WMI Persistence - Script Event Consumer,ProcessId,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,1,LP_0003_windows_sysmon_process_creation
|
||||
TA0003: Persistence,attack.t1047,WMI Persistence - Script Event Consumer,ThreadID,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,1,LP_0003_windows_sysmon_process_creation
|
||||
TA0003: Persistence,attack.t1047,WMI Persistence - Script Event Consumer,ProcessName,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,1,LP_0003_windows_sysmon_process_creation
|
||||
TA0003: Persistence,attack.t1047,WMI Persistence - Script Event Consumer,CommandLine,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,1,LP_0003_windows_sysmon_process_creation
|
||||
TA0003: Persistence,attack.t1047,WMI Persistence - Script Event Consumer,LogonGuid,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,1,LP_0003_windows_sysmon_process_creation
|
||||
@ -233,6 +351,7 @@ TA0003: Persistence,attack.t1047,WMI Persistence - Script Event Consumer,Hostnam
|
||||
TA0003: Persistence,attack.t1047,WMI Persistence - Script Event Consumer,Username,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,4688,LP_0002_windows_audit_process_creation_with_commandline
|
||||
TA0003: Persistence,attack.t1047,WMI Persistence - Script Event Consumer,ProcessGuid,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,4688,LP_0002_windows_audit_process_creation_with_commandline
|
||||
TA0003: Persistence,attack.t1047,WMI Persistence - Script Event Consumer,ProcessId,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,4688,LP_0002_windows_audit_process_creation_with_commandline
|
||||
TA0003: Persistence,attack.t1047,WMI Persistence - Script Event Consumer,ThreadID,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,4688,LP_0002_windows_audit_process_creation_with_commandline
|
||||
TA0003: Persistence,attack.t1047,WMI Persistence - Script Event Consumer,ProcessName,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,4688,LP_0002_windows_audit_process_creation_with_commandline
|
||||
TA0003: Persistence,attack.t1047,WMI Persistence - Script Event Consumer,CommandLine,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,4688,LP_0002_windows_audit_process_creation_with_commandline
|
||||
TA0003: Persistence,attack.t1047,WMI Persistence - Script Event Consumer,LogonGuid,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,4688,LP_0002_windows_audit_process_creation_with_commandline
|
||||
@ -259,6 +378,8 @@ TA0003: Persistence,attack.t1047,WMI Persistence - Script Event Consumer,Process
|
||||
TA0003: Persistence,attack.t1047,WMI Persistence - Script Event Consumer,ProcessGuid,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,4696,LP_0001_windows_audit_process_creation
|
||||
TA0003: Persistence,attack.t1047,WMI Persistence - Script Event Consumer,ProcessId,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,4688,LP_0001_windows_audit_process_creation
|
||||
TA0003: Persistence,attack.t1047,WMI Persistence - Script Event Consumer,ProcessId,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,4696,LP_0001_windows_audit_process_creation
|
||||
TA0003: Persistence,attack.t1047,WMI Persistence - Script Event Consumer,ThreadID,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,4688,LP_0001_windows_audit_process_creation
|
||||
TA0003: Persistence,attack.t1047,WMI Persistence - Script Event Consumer,ThreadID,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,4696,LP_0001_windows_audit_process_creation
|
||||
TA0003: Persistence,attack.t1047,WMI Persistence - Script Event Consumer,ProcessName,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,4688,LP_0001_windows_audit_process_creation
|
||||
TA0003: Persistence,attack.t1047,WMI Persistence - Script Event Consumer,ProcessName,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,4696,LP_0001_windows_audit_process_creation
|
||||
TA0003: Persistence,attack.t1047,WMI Persistence - Script Event Consumer,CommandLine,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,4688,LP_0001_windows_audit_process_creation
|
||||
@ -291,11 +412,35 @@ TA0003: Persistence,attack.t1047,WMI Persistence - Script Event Consumer,ParentP
|
||||
TA0003: Persistence,attack.t1047,WMI Persistence - Script Event Consumer,ParentProcessName,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,4696,LP_0001_windows_audit_process_creation
|
||||
TA0003: Persistence,attack.t1047,WMI Persistence - Script Event Consumer,ParentCommandLine,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,4688,LP_0001_windows_audit_process_creation
|
||||
TA0003: Persistence,attack.t1047,WMI Persistence - Script Event Consumer,ParentCommandLine,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,4696,LP_0001_windows_audit_process_creation
|
||||
TA0003: Persistence,attack.t1047,WMI Persistence - Script Event Consumer,EventID,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,11,LP_0008_windows_sysmon_FileCreate
|
||||
TA0003: Persistence,attack.t1047,WMI Persistence - Script Event Consumer,Hostname,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,11,LP_0008_windows_sysmon_FileCreate
|
||||
TA0003: Persistence,attack.t1047,WMI Persistence - Script Event Consumer,Username,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,11,LP_0008_windows_sysmon_FileCreate
|
||||
TA0003: Persistence,attack.t1047,WMI Persistence - Script Event Consumer,ProcessGuid,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,11,LP_0008_windows_sysmon_FileCreate
|
||||
TA0003: Persistence,attack.t1047,WMI Persistence - Script Event Consumer,ProcessId,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,11,LP_0008_windows_sysmon_FileCreate
|
||||
TA0003: Persistence,attack.t1047,WMI Persistence - Script Event Consumer,ThreadID,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,11,LP_0008_windows_sysmon_FileCreate
|
||||
TA0003: Persistence,attack.t1047,WMI Persistence - Script Event Consumer,ProcessName,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,11,LP_0008_windows_sysmon_FileCreate
|
||||
TA0003: Persistence,attack.t1047,WMI Persistence - Script Event Consumer,CommandLine,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,11,LP_0008_windows_sysmon_FileCreate
|
||||
TA0003: Persistence,attack.t1047,WMI Persistence - Script Event Consumer,LogonGuid,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,11,LP_0008_windows_sysmon_FileCreate
|
||||
TA0003: Persistence,attack.t1047,WMI Persistence - Script Event Consumer,LogonId,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,11,LP_0008_windows_sysmon_FileCreate
|
||||
TA0003: Persistence,attack.t1047,WMI Persistence - Script Event Consumer,TerminalSessionid,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,11,LP_0008_windows_sysmon_FileCreate
|
||||
TA0003: Persistence,attack.t1047,WMI Persistence - Script Event Consumer,IntegrityLevel,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,11,LP_0008_windows_sysmon_FileCreate
|
||||
TA0003: Persistence,attack.t1047,WMI Persistence - Script Event Consumer,Imphash,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,11,LP_0008_windows_sysmon_FileCreate
|
||||
TA0003: Persistence,attack.t1047,WMI Persistence - Script Event Consumer,Sha256hash,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,11,LP_0008_windows_sysmon_FileCreate
|
||||
TA0003: Persistence,attack.t1047,WMI Persistence - Script Event Consumer,Sha1hash,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,11,LP_0008_windows_sysmon_FileCreate
|
||||
TA0003: Persistence,attack.t1047,WMI Persistence - Script Event Consumer,Md5hash,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,11,LP_0008_windows_sysmon_FileCreate
|
||||
TA0003: Persistence,attack.t1047,WMI Persistence - Script Event Consumer,Image,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,11,LP_0008_windows_sysmon_FileCreate
|
||||
TA0003: Persistence,attack.t1047,WMI Persistence - Script Event Consumer,ParentImage,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,11,LP_0008_windows_sysmon_FileCreate
|
||||
TA0003: Persistence,attack.t1047,WMI Persistence - Script Event Consumer,ParentProcessGuid,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,11,LP_0008_windows_sysmon_FileCreate
|
||||
TA0003: Persistence,attack.t1047,WMI Persistence - Script Event Consumer,ParentProcessId,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,11,LP_0008_windows_sysmon_FileCreate
|
||||
TA0003: Persistence,attack.t1047,WMI Persistence - Script Event Consumer,ParentProcessName,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,11,LP_0008_windows_sysmon_FileCreate
|
||||
TA0003: Persistence,attack.t1047,WMI Persistence - Script Event Consumer,ParentCommandLine,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,11,LP_0008_windows_sysmon_FileCreate
|
||||
TA0003: Persistence,attack.t1047,WMI Persistence - Script Event Consumer,EventID,Windows,Windows Log,Security,1,LP_0003_windows_sysmon_process_creation
|
||||
TA0003: Persistence,attack.t1047,WMI Persistence - Script Event Consumer,Hostname,Windows,Windows Log,Security,1,LP_0003_windows_sysmon_process_creation
|
||||
TA0003: Persistence,attack.t1047,WMI Persistence - Script Event Consumer,Username,Windows,Windows Log,Security,1,LP_0003_windows_sysmon_process_creation
|
||||
TA0003: Persistence,attack.t1047,WMI Persistence - Script Event Consumer,UserSid,Windows,Windows Log,Security,1,LP_0003_windows_sysmon_process_creation
|
||||
TA0003: Persistence,attack.t1047,WMI Persistence - Script Event Consumer,ProcessPid,Windows,Windows Log,Security,1,LP_0003_windows_sysmon_process_creation
|
||||
TA0003: Persistence,attack.t1047,WMI Persistence - Script Event Consumer,ProcessId,Windows,Windows Log,Security,1,LP_0003_windows_sysmon_process_creation
|
||||
TA0003: Persistence,attack.t1047,WMI Persistence - Script Event Consumer,ThreadID,Windows,Windows Log,Security,1,LP_0003_windows_sysmon_process_creation
|
||||
TA0003: Persistence,attack.t1047,WMI Persistence - Script Event Consumer,ProcessName,Windows,Windows Log,Security,1,LP_0003_windows_sysmon_process_creation
|
||||
TA0003: Persistence,attack.t1047,WMI Persistence - Script Event Consumer,NewProcessName,Windows,Windows Log,Security,1,LP_0003_windows_sysmon_process_creation
|
||||
TA0003: Persistence,attack.t1047,WMI Persistence - Script Event Consumer,Image,Windows,Windows Log,Security,1,LP_0003_windows_sysmon_process_creation
|
||||
@ -313,6 +458,8 @@ TA0003: Persistence,attack.t1047,WMI Persistence - Script Event Consumer,Hostnam
|
||||
TA0003: Persistence,attack.t1047,WMI Persistence - Script Event Consumer,Username,Windows,Windows Log,Security,4688,LP_0002_windows_audit_process_creation_with_commandline
|
||||
TA0003: Persistence,attack.t1047,WMI Persistence - Script Event Consumer,UserSid,Windows,Windows Log,Security,4688,LP_0002_windows_audit_process_creation_with_commandline
|
||||
TA0003: Persistence,attack.t1047,WMI Persistence - Script Event Consumer,ProcessPid,Windows,Windows Log,Security,4688,LP_0002_windows_audit_process_creation_with_commandline
|
||||
TA0003: Persistence,attack.t1047,WMI Persistence - Script Event Consumer,ProcessId,Windows,Windows Log,Security,4688,LP_0002_windows_audit_process_creation_with_commandline
|
||||
TA0003: Persistence,attack.t1047,WMI Persistence - Script Event Consumer,ThreadID,Windows,Windows Log,Security,4688,LP_0002_windows_audit_process_creation_with_commandline
|
||||
TA0003: Persistence,attack.t1047,WMI Persistence - Script Event Consumer,ProcessName,Windows,Windows Log,Security,4688,LP_0002_windows_audit_process_creation_with_commandline
|
||||
TA0003: Persistence,attack.t1047,WMI Persistence - Script Event Consumer,NewProcessName,Windows,Windows Log,Security,4688,LP_0002_windows_audit_process_creation_with_commandline
|
||||
TA0003: Persistence,attack.t1047,WMI Persistence - Script Event Consumer,Image,Windows,Windows Log,Security,4688,LP_0002_windows_audit_process_creation_with_commandline
|
||||
@ -335,6 +482,10 @@ TA0003: Persistence,attack.t1047,WMI Persistence - Script Event Consumer,UserSid
|
||||
TA0003: Persistence,attack.t1047,WMI Persistence - Script Event Consumer,UserSid,Windows,Windows Log,Security,4696,LP_0001_windows_audit_process_creation
|
||||
TA0003: Persistence,attack.t1047,WMI Persistence - Script Event Consumer,ProcessPid,Windows,Windows Log,Security,4688,LP_0001_windows_audit_process_creation
|
||||
TA0003: Persistence,attack.t1047,WMI Persistence - Script Event Consumer,ProcessPid,Windows,Windows Log,Security,4696,LP_0001_windows_audit_process_creation
|
||||
TA0003: Persistence,attack.t1047,WMI Persistence - Script Event Consumer,ProcessId,Windows,Windows Log,Security,4688,LP_0001_windows_audit_process_creation
|
||||
TA0003: Persistence,attack.t1047,WMI Persistence - Script Event Consumer,ProcessId,Windows,Windows Log,Security,4696,LP_0001_windows_audit_process_creation
|
||||
TA0003: Persistence,attack.t1047,WMI Persistence - Script Event Consumer,ThreadID,Windows,Windows Log,Security,4688,LP_0001_windows_audit_process_creation
|
||||
TA0003: Persistence,attack.t1047,WMI Persistence - Script Event Consumer,ThreadID,Windows,Windows Log,Security,4696,LP_0001_windows_audit_process_creation
|
||||
TA0003: Persistence,attack.t1047,WMI Persistence - Script Event Consumer,ProcessName,Windows,Windows Log,Security,4688,LP_0001_windows_audit_process_creation
|
||||
TA0003: Persistence,attack.t1047,WMI Persistence - Script Event Consumer,ProcessName,Windows,Windows Log,Security,4696,LP_0001_windows_audit_process_creation
|
||||
TA0003: Persistence,attack.t1047,WMI Persistence - Script Event Consumer,NewProcessName,Windows,Windows Log,Security,4688,LP_0001_windows_audit_process_creation
|
||||
@ -359,11 +510,72 @@ TA0003: Persistence,attack.t1047,WMI Persistence - Script Event Consumer,TokenEl
|
||||
TA0003: Persistence,attack.t1047,WMI Persistence - Script Event Consumer,TokenElevationType,Windows,Windows Log,Security,4696,LP_0001_windows_audit_process_creation
|
||||
TA0003: Persistence,attack.t1047,WMI Persistence - Script Event Consumer,LogonId,Windows,Windows Log,Security,4688,LP_0001_windows_audit_process_creation
|
||||
TA0003: Persistence,attack.t1047,WMI Persistence - Script Event Consumer,LogonId,Windows,Windows Log,Security,4696,LP_0001_windows_audit_process_creation
|
||||
TA0003: Persistence,attack.t1047,WMI Persistence - Script Event Consumer,EventID,Windows,Windows Log,Security,11,LP_0008_windows_sysmon_FileCreate
|
||||
TA0003: Persistence,attack.t1047,WMI Persistence - Script Event Consumer,Hostname,Windows,Windows Log,Security,11,LP_0008_windows_sysmon_FileCreate
|
||||
TA0003: Persistence,attack.t1047,WMI Persistence - Script Event Consumer,Username,Windows,Windows Log,Security,11,LP_0008_windows_sysmon_FileCreate
|
||||
TA0003: Persistence,attack.t1047,WMI Persistence - Script Event Consumer,UserSid,Windows,Windows Log,Security,11,LP_0008_windows_sysmon_FileCreate
|
||||
TA0003: Persistence,attack.t1047,WMI Persistence - Script Event Consumer,ProcessPid,Windows,Windows Log,Security,11,LP_0008_windows_sysmon_FileCreate
|
||||
TA0003: Persistence,attack.t1047,WMI Persistence - Script Event Consumer,ProcessId,Windows,Windows Log,Security,11,LP_0008_windows_sysmon_FileCreate
|
||||
TA0003: Persistence,attack.t1047,WMI Persistence - Script Event Consumer,ThreadID,Windows,Windows Log,Security,11,LP_0008_windows_sysmon_FileCreate
|
||||
TA0003: Persistence,attack.t1047,WMI Persistence - Script Event Consumer,ProcessName,Windows,Windows Log,Security,11,LP_0008_windows_sysmon_FileCreate
|
||||
TA0003: Persistence,attack.t1047,WMI Persistence - Script Event Consumer,NewProcessName,Windows,Windows Log,Security,11,LP_0008_windows_sysmon_FileCreate
|
||||
TA0003: Persistence,attack.t1047,WMI Persistence - Script Event Consumer,Image,Windows,Windows Log,Security,11,LP_0008_windows_sysmon_FileCreate
|
||||
TA0003: Persistence,attack.t1047,WMI Persistence - Script Event Consumer,CommandLine,Windows,Windows Log,Security,11,LP_0008_windows_sysmon_FileCreate
|
||||
TA0003: Persistence,attack.t1047,WMI Persistence - Script Event Consumer,ProcessCommandLine,Windows,Windows Log,Security,11,LP_0008_windows_sysmon_FileCreate
|
||||
TA0003: Persistence,attack.t1047,WMI Persistence - Script Event Consumer,ProcesssCommandLine,Windows,Windows Log,Security,11,LP_0008_windows_sysmon_FileCreate
|
||||
TA0003: Persistence,attack.t1047,WMI Persistence - Script Event Consumer,ParentProcessPid,Windows,Windows Log,Security,11,LP_0008_windows_sysmon_FileCreate
|
||||
TA0003: Persistence,attack.t1047,WMI Persistence - Script Event Consumer,ParentImage,Windows,Windows Log,Security,11,LP_0008_windows_sysmon_FileCreate
|
||||
TA0003: Persistence,attack.t1047,WMI Persistence - Script Event Consumer,ParentProcessName,Windows,Windows Log,Security,11,LP_0008_windows_sysmon_FileCreate
|
||||
TA0003: Persistence,attack.t1047,WMI Persistence - Script Event Consumer,MandatoryLabel,Windows,Windows Log,Security,11,LP_0008_windows_sysmon_FileCreate
|
||||
TA0003: Persistence,attack.t1047,WMI Persistence - Script Event Consumer,TokenElevationType,Windows,Windows Log,Security,11,LP_0008_windows_sysmon_FileCreate
|
||||
TA0003: Persistence,attack.t1047,WMI Persistence - Script Event Consumer,LogonId,Windows,Windows Log,Security,11,LP_0008_windows_sysmon_FileCreate
|
||||
TA0003: Persistence,attack.t1047,WMI Persistence - Script Event Consumer,EventID,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,1,LP_0003_windows_sysmon_process_creation
|
||||
TA0003: Persistence,attack.t1047,WMI Persistence - Script Event Consumer,Computer,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,1,LP_0003_windows_sysmon_process_creation
|
||||
TA0003: Persistence,attack.t1047,WMI Persistence - Script Event Consumer,UtcTime,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,1,LP_0003_windows_sysmon_process_creation
|
||||
TA0003: Persistence,attack.t1047,WMI Persistence - Script Event Consumer,ProcessGuid,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,1,LP_0003_windows_sysmon_process_creation
|
||||
TA0003: Persistence,attack.t1047,WMI Persistence - Script Event Consumer,ProcessId,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,1,LP_0003_windows_sysmon_process_creation
|
||||
TA0003: Persistence,attack.t1047,WMI Persistence - Script Event Consumer,Image,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,1,LP_0003_windows_sysmon_process_creation
|
||||
TA0003: Persistence,attack.t1047,WMI Persistence - Script Event Consumer,TargetFilename,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,1,LP_0003_windows_sysmon_process_creation
|
||||
TA0003: Persistence,attack.t1047,WMI Persistence - Script Event Consumer,CreationUtcTime,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,1,LP_0003_windows_sysmon_process_creation
|
||||
TA0003: Persistence,attack.t1047,WMI Persistence - Script Event Consumer,EventID,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,4688,LP_0002_windows_audit_process_creation_with_commandline
|
||||
TA0003: Persistence,attack.t1047,WMI Persistence - Script Event Consumer,Computer,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,4688,LP_0002_windows_audit_process_creation_with_commandline
|
||||
TA0003: Persistence,attack.t1047,WMI Persistence - Script Event Consumer,UtcTime,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,4688,LP_0002_windows_audit_process_creation_with_commandline
|
||||
TA0003: Persistence,attack.t1047,WMI Persistence - Script Event Consumer,ProcessGuid,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,4688,LP_0002_windows_audit_process_creation_with_commandline
|
||||
TA0003: Persistence,attack.t1047,WMI Persistence - Script Event Consumer,ProcessId,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,4688,LP_0002_windows_audit_process_creation_with_commandline
|
||||
TA0003: Persistence,attack.t1047,WMI Persistence - Script Event Consumer,Image,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,4688,LP_0002_windows_audit_process_creation_with_commandline
|
||||
TA0003: Persistence,attack.t1047,WMI Persistence - Script Event Consumer,TargetFilename,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,4688,LP_0002_windows_audit_process_creation_with_commandline
|
||||
TA0003: Persistence,attack.t1047,WMI Persistence - Script Event Consumer,CreationUtcTime,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,4688,LP_0002_windows_audit_process_creation_with_commandline
|
||||
TA0003: Persistence,attack.t1047,WMI Persistence - Script Event Consumer,EventID,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,4688,LP_0001_windows_audit_process_creation
|
||||
TA0003: Persistence,attack.t1047,WMI Persistence - Script Event Consumer,EventID,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,4696,LP_0001_windows_audit_process_creation
|
||||
TA0003: Persistence,attack.t1047,WMI Persistence - Script Event Consumer,Computer,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,4688,LP_0001_windows_audit_process_creation
|
||||
TA0003: Persistence,attack.t1047,WMI Persistence - Script Event Consumer,Computer,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,4696,LP_0001_windows_audit_process_creation
|
||||
TA0003: Persistence,attack.t1047,WMI Persistence - Script Event Consumer,UtcTime,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,4688,LP_0001_windows_audit_process_creation
|
||||
TA0003: Persistence,attack.t1047,WMI Persistence - Script Event Consumer,UtcTime,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,4696,LP_0001_windows_audit_process_creation
|
||||
TA0003: Persistence,attack.t1047,WMI Persistence - Script Event Consumer,ProcessGuid,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,4688,LP_0001_windows_audit_process_creation
|
||||
TA0003: Persistence,attack.t1047,WMI Persistence - Script Event Consumer,ProcessGuid,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,4696,LP_0001_windows_audit_process_creation
|
||||
TA0003: Persistence,attack.t1047,WMI Persistence - Script Event Consumer,ProcessId,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,4688,LP_0001_windows_audit_process_creation
|
||||
TA0003: Persistence,attack.t1047,WMI Persistence - Script Event Consumer,ProcessId,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,4696,LP_0001_windows_audit_process_creation
|
||||
TA0003: Persistence,attack.t1047,WMI Persistence - Script Event Consumer,Image,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,4688,LP_0001_windows_audit_process_creation
|
||||
TA0003: Persistence,attack.t1047,WMI Persistence - Script Event Consumer,Image,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,4696,LP_0001_windows_audit_process_creation
|
||||
TA0003: Persistence,attack.t1047,WMI Persistence - Script Event Consumer,TargetFilename,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,4688,LP_0001_windows_audit_process_creation
|
||||
TA0003: Persistence,attack.t1047,WMI Persistence - Script Event Consumer,TargetFilename,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,4696,LP_0001_windows_audit_process_creation
|
||||
TA0003: Persistence,attack.t1047,WMI Persistence - Script Event Consumer,CreationUtcTime,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,4688,LP_0001_windows_audit_process_creation
|
||||
TA0003: Persistence,attack.t1047,WMI Persistence - Script Event Consumer,CreationUtcTime,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,4696,LP_0001_windows_audit_process_creation
|
||||
TA0003: Persistence,attack.t1047,WMI Persistence - Script Event Consumer,EventID,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,11,LP_0008_windows_sysmon_FileCreate
|
||||
TA0003: Persistence,attack.t1047,WMI Persistence - Script Event Consumer,Computer,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,11,LP_0008_windows_sysmon_FileCreate
|
||||
TA0003: Persistence,attack.t1047,WMI Persistence - Script Event Consumer,UtcTime,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,11,LP_0008_windows_sysmon_FileCreate
|
||||
TA0003: Persistence,attack.t1047,WMI Persistence - Script Event Consumer,ProcessGuid,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,11,LP_0008_windows_sysmon_FileCreate
|
||||
TA0003: Persistence,attack.t1047,WMI Persistence - Script Event Consumer,ProcessId,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,11,LP_0008_windows_sysmon_FileCreate
|
||||
TA0003: Persistence,attack.t1047,WMI Persistence - Script Event Consumer,Image,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,11,LP_0008_windows_sysmon_FileCreate
|
||||
TA0003: Persistence,attack.t1047,WMI Persistence - Script Event Consumer,TargetFilename,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,11,LP_0008_windows_sysmon_FileCreate
|
||||
TA0003: Persistence,attack.t1047,WMI Persistence - Script Event Consumer,CreationUtcTime,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,11,LP_0008_windows_sysmon_FileCreate
|
||||
TA0003: Persistence,attack.t1047,WMI Persistence - Script Event Consumer,EventID,Windows,Windows Log,Security,1,LP_0003_windows_sysmon_process_creation
|
||||
TA0003: Persistence,attack.t1047,WMI Persistence - Script Event Consumer,Hostname,Windows,Windows Log,Security,1,LP_0003_windows_sysmon_process_creation
|
||||
TA0003: Persistence,attack.t1047,WMI Persistence - Script Event Consumer,Username,Windows,Windows Log,Security,1,LP_0003_windows_sysmon_process_creation
|
||||
TA0003: Persistence,attack.t1047,WMI Persistence - Script Event Consumer,UserSid,Windows,Windows Log,Security,1,LP_0003_windows_sysmon_process_creation
|
||||
TA0003: Persistence,attack.t1047,WMI Persistence - Script Event Consumer,ProcessPid,Windows,Windows Log,Security,1,LP_0003_windows_sysmon_process_creation
|
||||
TA0003: Persistence,attack.t1047,WMI Persistence - Script Event Consumer,ProcessId,Windows,Windows Log,Security,1,LP_0003_windows_sysmon_process_creation
|
||||
TA0003: Persistence,attack.t1047,WMI Persistence - Script Event Consumer,ThreadID,Windows,Windows Log,Security,1,LP_0003_windows_sysmon_process_creation
|
||||
TA0003: Persistence,attack.t1047,WMI Persistence - Script Event Consumer,ProcessName,Windows,Windows Log,Security,1,LP_0003_windows_sysmon_process_creation
|
||||
TA0003: Persistence,attack.t1047,WMI Persistence - Script Event Consumer,NewProcessName,Windows,Windows Log,Security,1,LP_0003_windows_sysmon_process_creation
|
||||
TA0003: Persistence,attack.t1047,WMI Persistence - Script Event Consumer,Image,Windows,Windows Log,Security,1,LP_0003_windows_sysmon_process_creation
|
||||
@ -378,6 +590,8 @@ TA0003: Persistence,attack.t1047,WMI Persistence - Script Event Consumer,Hostnam
|
||||
TA0003: Persistence,attack.t1047,WMI Persistence - Script Event Consumer,Username,Windows,Windows Log,Security,4688,LP_0002_windows_audit_process_creation_with_commandline
|
||||
TA0003: Persistence,attack.t1047,WMI Persistence - Script Event Consumer,UserSid,Windows,Windows Log,Security,4688,LP_0002_windows_audit_process_creation_with_commandline
|
||||
TA0003: Persistence,attack.t1047,WMI Persistence - Script Event Consumer,ProcessPid,Windows,Windows Log,Security,4688,LP_0002_windows_audit_process_creation_with_commandline
|
||||
TA0003: Persistence,attack.t1047,WMI Persistence - Script Event Consumer,ProcessId,Windows,Windows Log,Security,4688,LP_0002_windows_audit_process_creation_with_commandline
|
||||
TA0003: Persistence,attack.t1047,WMI Persistence - Script Event Consumer,ThreadID,Windows,Windows Log,Security,4688,LP_0002_windows_audit_process_creation_with_commandline
|
||||
TA0003: Persistence,attack.t1047,WMI Persistence - Script Event Consumer,ProcessName,Windows,Windows Log,Security,4688,LP_0002_windows_audit_process_creation_with_commandline
|
||||
TA0003: Persistence,attack.t1047,WMI Persistence - Script Event Consumer,NewProcessName,Windows,Windows Log,Security,4688,LP_0002_windows_audit_process_creation_with_commandline
|
||||
TA0003: Persistence,attack.t1047,WMI Persistence - Script Event Consumer,Image,Windows,Windows Log,Security,4688,LP_0002_windows_audit_process_creation_with_commandline
|
||||
@ -397,6 +611,10 @@ TA0003: Persistence,attack.t1047,WMI Persistence - Script Event Consumer,UserSid
|
||||
TA0003: Persistence,attack.t1047,WMI Persistence - Script Event Consumer,UserSid,Windows,Windows Log,Security,4696,LP_0001_windows_audit_process_creation
|
||||
TA0003: Persistence,attack.t1047,WMI Persistence - Script Event Consumer,ProcessPid,Windows,Windows Log,Security,4688,LP_0001_windows_audit_process_creation
|
||||
TA0003: Persistence,attack.t1047,WMI Persistence - Script Event Consumer,ProcessPid,Windows,Windows Log,Security,4696,LP_0001_windows_audit_process_creation
|
||||
TA0003: Persistence,attack.t1047,WMI Persistence - Script Event Consumer,ProcessId,Windows,Windows Log,Security,4688,LP_0001_windows_audit_process_creation
|
||||
TA0003: Persistence,attack.t1047,WMI Persistence - Script Event Consumer,ProcessId,Windows,Windows Log,Security,4696,LP_0001_windows_audit_process_creation
|
||||
TA0003: Persistence,attack.t1047,WMI Persistence - Script Event Consumer,ThreadID,Windows,Windows Log,Security,4688,LP_0001_windows_audit_process_creation
|
||||
TA0003: Persistence,attack.t1047,WMI Persistence - Script Event Consumer,ThreadID,Windows,Windows Log,Security,4696,LP_0001_windows_audit_process_creation
|
||||
TA0003: Persistence,attack.t1047,WMI Persistence - Script Event Consumer,ProcessName,Windows,Windows Log,Security,4688,LP_0001_windows_audit_process_creation
|
||||
TA0003: Persistence,attack.t1047,WMI Persistence - Script Event Consumer,ProcessName,Windows,Windows Log,Security,4696,LP_0001_windows_audit_process_creation
|
||||
TA0003: Persistence,attack.t1047,WMI Persistence - Script Event Consumer,NewProcessName,Windows,Windows Log,Security,4688,LP_0001_windows_audit_process_creation
|
||||
@ -415,11 +633,28 @@ TA0003: Persistence,attack.t1047,WMI Persistence - Script Event Consumer,TokenEl
|
||||
TA0003: Persistence,attack.t1047,WMI Persistence - Script Event Consumer,TokenElevationType,Windows,Windows Log,Security,4696,LP_0001_windows_audit_process_creation
|
||||
TA0003: Persistence,attack.t1047,WMI Persistence - Script Event Consumer,LogonId,Windows,Windows Log,Security,4688,LP_0001_windows_audit_process_creation
|
||||
TA0003: Persistence,attack.t1047,WMI Persistence - Script Event Consumer,LogonId,Windows,Windows Log,Security,4696,LP_0001_windows_audit_process_creation
|
||||
TA0003: Persistence,attack.t1047,WMI Persistence - Script Event Consumer,EventID,Windows,Windows Log,Security,11,LP_0008_windows_sysmon_FileCreate
|
||||
TA0003: Persistence,attack.t1047,WMI Persistence - Script Event Consumer,Hostname,Windows,Windows Log,Security,11,LP_0008_windows_sysmon_FileCreate
|
||||
TA0003: Persistence,attack.t1047,WMI Persistence - Script Event Consumer,Username,Windows,Windows Log,Security,11,LP_0008_windows_sysmon_FileCreate
|
||||
TA0003: Persistence,attack.t1047,WMI Persistence - Script Event Consumer,UserSid,Windows,Windows Log,Security,11,LP_0008_windows_sysmon_FileCreate
|
||||
TA0003: Persistence,attack.t1047,WMI Persistence - Script Event Consumer,ProcessPid,Windows,Windows Log,Security,11,LP_0008_windows_sysmon_FileCreate
|
||||
TA0003: Persistence,attack.t1047,WMI Persistence - Script Event Consumer,ProcessId,Windows,Windows Log,Security,11,LP_0008_windows_sysmon_FileCreate
|
||||
TA0003: Persistence,attack.t1047,WMI Persistence - Script Event Consumer,ThreadID,Windows,Windows Log,Security,11,LP_0008_windows_sysmon_FileCreate
|
||||
TA0003: Persistence,attack.t1047,WMI Persistence - Script Event Consumer,ProcessName,Windows,Windows Log,Security,11,LP_0008_windows_sysmon_FileCreate
|
||||
TA0003: Persistence,attack.t1047,WMI Persistence - Script Event Consumer,NewProcessName,Windows,Windows Log,Security,11,LP_0008_windows_sysmon_FileCreate
|
||||
TA0003: Persistence,attack.t1047,WMI Persistence - Script Event Consumer,Image,Windows,Windows Log,Security,11,LP_0008_windows_sysmon_FileCreate
|
||||
TA0003: Persistence,attack.t1047,WMI Persistence - Script Event Consumer,ParentImage,Windows,Windows Log,Security,11,LP_0008_windows_sysmon_FileCreate
|
||||
TA0003: Persistence,attack.t1047,WMI Persistence - Script Event Consumer,ParentProcessPid,Windows,Windows Log,Security,11,LP_0008_windows_sysmon_FileCreate
|
||||
TA0003: Persistence,attack.t1047,WMI Persistence - Script Event Consumer,ParentProcessName,Windows,Windows Log,Security,11,LP_0008_windows_sysmon_FileCreate
|
||||
TA0003: Persistence,attack.t1047,WMI Persistence - Script Event Consumer,MandatoryLabel,Windows,Windows Log,Security,11,LP_0008_windows_sysmon_FileCreate
|
||||
TA0003: Persistence,attack.t1047,WMI Persistence - Script Event Consumer,TokenElevationType,Windows,Windows Log,Security,11,LP_0008_windows_sysmon_FileCreate
|
||||
TA0003: Persistence,attack.t1047,WMI Persistence - Script Event Consumer,LogonId,Windows,Windows Log,Security,11,LP_0008_windows_sysmon_FileCreate
|
||||
TA0005: Defense Evasion,attack.t1036,Suspicious Process Start Locations,EventID,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,1,LP_0003_windows_sysmon_process_creation
|
||||
TA0005: Defense Evasion,attack.t1036,Suspicious Process Start Locations,Hostname,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,1,LP_0003_windows_sysmon_process_creation
|
||||
TA0005: Defense Evasion,attack.t1036,Suspicious Process Start Locations,Username,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,1,LP_0003_windows_sysmon_process_creation
|
||||
TA0005: Defense Evasion,attack.t1036,Suspicious Process Start Locations,ProcessGuid,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,1,LP_0003_windows_sysmon_process_creation
|
||||
TA0005: Defense Evasion,attack.t1036,Suspicious Process Start Locations,ProcessId,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,1,LP_0003_windows_sysmon_process_creation
|
||||
TA0005: Defense Evasion,attack.t1036,Suspicious Process Start Locations,ThreadID,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,1,LP_0003_windows_sysmon_process_creation
|
||||
TA0005: Defense Evasion,attack.t1036,Suspicious Process Start Locations,ProcessName,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,1,LP_0003_windows_sysmon_process_creation
|
||||
TA0005: Defense Evasion,attack.t1036,Suspicious Process Start Locations,CommandLine,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,1,LP_0003_windows_sysmon_process_creation
|
||||
TA0005: Defense Evasion,attack.t1036,Suspicious Process Start Locations,LogonGuid,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,1,LP_0003_windows_sysmon_process_creation
|
||||
@ -441,6 +676,7 @@ TA0005: Defense Evasion,attack.t1036,Suspicious Process Start Locations,Hostname
|
||||
TA0005: Defense Evasion,attack.t1036,Suspicious Process Start Locations,Username,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,4688,LP_0002_windows_audit_process_creation_with_commandline
|
||||
TA0005: Defense Evasion,attack.t1036,Suspicious Process Start Locations,ProcessGuid,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,4688,LP_0002_windows_audit_process_creation_with_commandline
|
||||
TA0005: Defense Evasion,attack.t1036,Suspicious Process Start Locations,ProcessId,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,4688,LP_0002_windows_audit_process_creation_with_commandline
|
||||
TA0005: Defense Evasion,attack.t1036,Suspicious Process Start Locations,ThreadID,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,4688,LP_0002_windows_audit_process_creation_with_commandline
|
||||
TA0005: Defense Evasion,attack.t1036,Suspicious Process Start Locations,ProcessName,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,4688,LP_0002_windows_audit_process_creation_with_commandline
|
||||
TA0005: Defense Evasion,attack.t1036,Suspicious Process Start Locations,CommandLine,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,4688,LP_0002_windows_audit_process_creation_with_commandline
|
||||
TA0005: Defense Evasion,attack.t1036,Suspicious Process Start Locations,LogonGuid,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,4688,LP_0002_windows_audit_process_creation_with_commandline
|
||||
@ -467,6 +703,8 @@ TA0005: Defense Evasion,attack.t1036,Suspicious Process Start Locations,ProcessG
|
||||
TA0005: Defense Evasion,attack.t1036,Suspicious Process Start Locations,ProcessGuid,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,4696,LP_0001_windows_audit_process_creation
|
||||
TA0005: Defense Evasion,attack.t1036,Suspicious Process Start Locations,ProcessId,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,4688,LP_0001_windows_audit_process_creation
|
||||
TA0005: Defense Evasion,attack.t1036,Suspicious Process Start Locations,ProcessId,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,4696,LP_0001_windows_audit_process_creation
|
||||
TA0005: Defense Evasion,attack.t1036,Suspicious Process Start Locations,ThreadID,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,4688,LP_0001_windows_audit_process_creation
|
||||
TA0005: Defense Evasion,attack.t1036,Suspicious Process Start Locations,ThreadID,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,4696,LP_0001_windows_audit_process_creation
|
||||
TA0005: Defense Evasion,attack.t1036,Suspicious Process Start Locations,ProcessName,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,4688,LP_0001_windows_audit_process_creation
|
||||
TA0005: Defense Evasion,attack.t1036,Suspicious Process Start Locations,ProcessName,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,4696,LP_0001_windows_audit_process_creation
|
||||
TA0005: Defense Evasion,attack.t1036,Suspicious Process Start Locations,CommandLine,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,4688,LP_0001_windows_audit_process_creation
|
||||
@ -504,6 +742,8 @@ TA0005: Defense Evasion,attack.t1036,Suspicious Process Start Locations,Hostname
|
||||
TA0005: Defense Evasion,attack.t1036,Suspicious Process Start Locations,Username,Windows,Windows Log,Security,1,LP_0003_windows_sysmon_process_creation
|
||||
TA0005: Defense Evasion,attack.t1036,Suspicious Process Start Locations,UserSid,Windows,Windows Log,Security,1,LP_0003_windows_sysmon_process_creation
|
||||
TA0005: Defense Evasion,attack.t1036,Suspicious Process Start Locations,ProcessPid,Windows,Windows Log,Security,1,LP_0003_windows_sysmon_process_creation
|
||||
TA0005: Defense Evasion,attack.t1036,Suspicious Process Start Locations,ProcessId,Windows,Windows Log,Security,1,LP_0003_windows_sysmon_process_creation
|
||||
TA0005: Defense Evasion,attack.t1036,Suspicious Process Start Locations,ThreadID,Windows,Windows Log,Security,1,LP_0003_windows_sysmon_process_creation
|
||||
TA0005: Defense Evasion,attack.t1036,Suspicious Process Start Locations,ProcessName,Windows,Windows Log,Security,1,LP_0003_windows_sysmon_process_creation
|
||||
TA0005: Defense Evasion,attack.t1036,Suspicious Process Start Locations,NewProcessName,Windows,Windows Log,Security,1,LP_0003_windows_sysmon_process_creation
|
||||
TA0005: Defense Evasion,attack.t1036,Suspicious Process Start Locations,Image,Windows,Windows Log,Security,1,LP_0003_windows_sysmon_process_creation
|
||||
@ -521,6 +761,8 @@ TA0005: Defense Evasion,attack.t1036,Suspicious Process Start Locations,Hostname
|
||||
TA0005: Defense Evasion,attack.t1036,Suspicious Process Start Locations,Username,Windows,Windows Log,Security,4688,LP_0002_windows_audit_process_creation_with_commandline
|
||||
TA0005: Defense Evasion,attack.t1036,Suspicious Process Start Locations,UserSid,Windows,Windows Log,Security,4688,LP_0002_windows_audit_process_creation_with_commandline
|
||||
TA0005: Defense Evasion,attack.t1036,Suspicious Process Start Locations,ProcessPid,Windows,Windows Log,Security,4688,LP_0002_windows_audit_process_creation_with_commandline
|
||||
TA0005: Defense Evasion,attack.t1036,Suspicious Process Start Locations,ProcessId,Windows,Windows Log,Security,4688,LP_0002_windows_audit_process_creation_with_commandline
|
||||
TA0005: Defense Evasion,attack.t1036,Suspicious Process Start Locations,ThreadID,Windows,Windows Log,Security,4688,LP_0002_windows_audit_process_creation_with_commandline
|
||||
TA0005: Defense Evasion,attack.t1036,Suspicious Process Start Locations,ProcessName,Windows,Windows Log,Security,4688,LP_0002_windows_audit_process_creation_with_commandline
|
||||
TA0005: Defense Evasion,attack.t1036,Suspicious Process Start Locations,NewProcessName,Windows,Windows Log,Security,4688,LP_0002_windows_audit_process_creation_with_commandline
|
||||
TA0005: Defense Evasion,attack.t1036,Suspicious Process Start Locations,Image,Windows,Windows Log,Security,4688,LP_0002_windows_audit_process_creation_with_commandline
|
||||
@ -543,6 +785,10 @@ TA0005: Defense Evasion,attack.t1036,Suspicious Process Start Locations,UserSid,
|
||||
TA0005: Defense Evasion,attack.t1036,Suspicious Process Start Locations,UserSid,Windows,Windows Log,Security,4696,LP_0001_windows_audit_process_creation
|
||||
TA0005: Defense Evasion,attack.t1036,Suspicious Process Start Locations,ProcessPid,Windows,Windows Log,Security,4688,LP_0001_windows_audit_process_creation
|
||||
TA0005: Defense Evasion,attack.t1036,Suspicious Process Start Locations,ProcessPid,Windows,Windows Log,Security,4696,LP_0001_windows_audit_process_creation
|
||||
TA0005: Defense Evasion,attack.t1036,Suspicious Process Start Locations,ProcessId,Windows,Windows Log,Security,4688,LP_0001_windows_audit_process_creation
|
||||
TA0005: Defense Evasion,attack.t1036,Suspicious Process Start Locations,ProcessId,Windows,Windows Log,Security,4696,LP_0001_windows_audit_process_creation
|
||||
TA0005: Defense Evasion,attack.t1036,Suspicious Process Start Locations,ThreadID,Windows,Windows Log,Security,4688,LP_0001_windows_audit_process_creation
|
||||
TA0005: Defense Evasion,attack.t1036,Suspicious Process Start Locations,ThreadID,Windows,Windows Log,Security,4696,LP_0001_windows_audit_process_creation
|
||||
TA0005: Defense Evasion,attack.t1036,Suspicious Process Start Locations,ProcessName,Windows,Windows Log,Security,4688,LP_0001_windows_audit_process_creation
|
||||
TA0005: Defense Evasion,attack.t1036,Suspicious Process Start Locations,ProcessName,Windows,Windows Log,Security,4696,LP_0001_windows_audit_process_creation
|
||||
TA0005: Defense Evasion,attack.t1036,Suspicious Process Start Locations,NewProcessName,Windows,Windows Log,Security,4688,LP_0001_windows_audit_process_creation
|
||||
@ -572,6 +818,7 @@ TA0006: Credential Access,attack.t1003,Suspicious SYSVOL Domain Group Policy Acc
|
||||
TA0006: Credential Access,attack.t1003,Suspicious SYSVOL Domain Group Policy Access,Username,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,1,LP_0003_windows_sysmon_process_creation
|
||||
TA0006: Credential Access,attack.t1003,Suspicious SYSVOL Domain Group Policy Access,ProcessGuid,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,1,LP_0003_windows_sysmon_process_creation
|
||||
TA0006: Credential Access,attack.t1003,Suspicious SYSVOL Domain Group Policy Access,ProcessId,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,1,LP_0003_windows_sysmon_process_creation
|
||||
TA0006: Credential Access,attack.t1003,Suspicious SYSVOL Domain Group Policy Access,ThreadID,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,1,LP_0003_windows_sysmon_process_creation
|
||||
TA0006: Credential Access,attack.t1003,Suspicious SYSVOL Domain Group Policy Access,ProcessName,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,1,LP_0003_windows_sysmon_process_creation
|
||||
TA0006: Credential Access,attack.t1003,Suspicious SYSVOL Domain Group Policy Access,CommandLine,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,1,LP_0003_windows_sysmon_process_creation
|
||||
TA0006: Credential Access,attack.t1003,Suspicious SYSVOL Domain Group Policy Access,LogonGuid,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,1,LP_0003_windows_sysmon_process_creation
|
||||
@ -593,6 +840,7 @@ TA0006: Credential Access,attack.t1003,Suspicious SYSVOL Domain Group Policy Acc
|
||||
TA0006: Credential Access,attack.t1003,Suspicious SYSVOL Domain Group Policy Access,Username,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,4688,LP_0002_windows_audit_process_creation_with_commandline
|
||||
TA0006: Credential Access,attack.t1003,Suspicious SYSVOL Domain Group Policy Access,ProcessGuid,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,4688,LP_0002_windows_audit_process_creation_with_commandline
|
||||
TA0006: Credential Access,attack.t1003,Suspicious SYSVOL Domain Group Policy Access,ProcessId,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,4688,LP_0002_windows_audit_process_creation_with_commandline
|
||||
TA0006: Credential Access,attack.t1003,Suspicious SYSVOL Domain Group Policy Access,ThreadID,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,4688,LP_0002_windows_audit_process_creation_with_commandline
|
||||
TA0006: Credential Access,attack.t1003,Suspicious SYSVOL Domain Group Policy Access,ProcessName,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,4688,LP_0002_windows_audit_process_creation_with_commandline
|
||||
TA0006: Credential Access,attack.t1003,Suspicious SYSVOL Domain Group Policy Access,CommandLine,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,4688,LP_0002_windows_audit_process_creation_with_commandline
|
||||
TA0006: Credential Access,attack.t1003,Suspicious SYSVOL Domain Group Policy Access,LogonGuid,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,4688,LP_0002_windows_audit_process_creation_with_commandline
|
||||
@ -619,6 +867,8 @@ TA0006: Credential Access,attack.t1003,Suspicious SYSVOL Domain Group Policy Acc
|
||||
TA0006: Credential Access,attack.t1003,Suspicious SYSVOL Domain Group Policy Access,ProcessGuid,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,4696,LP_0001_windows_audit_process_creation
|
||||
TA0006: Credential Access,attack.t1003,Suspicious SYSVOL Domain Group Policy Access,ProcessId,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,4688,LP_0001_windows_audit_process_creation
|
||||
TA0006: Credential Access,attack.t1003,Suspicious SYSVOL Domain Group Policy Access,ProcessId,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,4696,LP_0001_windows_audit_process_creation
|
||||
TA0006: Credential Access,attack.t1003,Suspicious SYSVOL Domain Group Policy Access,ThreadID,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,4688,LP_0001_windows_audit_process_creation
|
||||
TA0006: Credential Access,attack.t1003,Suspicious SYSVOL Domain Group Policy Access,ThreadID,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,4696,LP_0001_windows_audit_process_creation
|
||||
TA0006: Credential Access,attack.t1003,Suspicious SYSVOL Domain Group Policy Access,ProcessName,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,4688,LP_0001_windows_audit_process_creation
|
||||
TA0006: Credential Access,attack.t1003,Suspicious SYSVOL Domain Group Policy Access,ProcessName,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,4696,LP_0001_windows_audit_process_creation
|
||||
TA0006: Credential Access,attack.t1003,Suspicious SYSVOL Domain Group Policy Access,CommandLine,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,4688,LP_0001_windows_audit_process_creation
|
||||
@ -656,6 +906,8 @@ TA0006: Credential Access,attack.t1003,Suspicious SYSVOL Domain Group Policy Acc
|
||||
TA0006: Credential Access,attack.t1003,Suspicious SYSVOL Domain Group Policy Access,Username,Windows,Windows Log,Security,1,LP_0003_windows_sysmon_process_creation
|
||||
TA0006: Credential Access,attack.t1003,Suspicious SYSVOL Domain Group Policy Access,UserSid,Windows,Windows Log,Security,1,LP_0003_windows_sysmon_process_creation
|
||||
TA0006: Credential Access,attack.t1003,Suspicious SYSVOL Domain Group Policy Access,ProcessPid,Windows,Windows Log,Security,1,LP_0003_windows_sysmon_process_creation
|
||||
TA0006: Credential Access,attack.t1003,Suspicious SYSVOL Domain Group Policy Access,ProcessId,Windows,Windows Log,Security,1,LP_0003_windows_sysmon_process_creation
|
||||
TA0006: Credential Access,attack.t1003,Suspicious SYSVOL Domain Group Policy Access,ThreadID,Windows,Windows Log,Security,1,LP_0003_windows_sysmon_process_creation
|
||||
TA0006: Credential Access,attack.t1003,Suspicious SYSVOL Domain Group Policy Access,ProcessName,Windows,Windows Log,Security,1,LP_0003_windows_sysmon_process_creation
|
||||
TA0006: Credential Access,attack.t1003,Suspicious SYSVOL Domain Group Policy Access,NewProcessName,Windows,Windows Log,Security,1,LP_0003_windows_sysmon_process_creation
|
||||
TA0006: Credential Access,attack.t1003,Suspicious SYSVOL Domain Group Policy Access,Image,Windows,Windows Log,Security,1,LP_0003_windows_sysmon_process_creation
|
||||
@ -673,6 +925,8 @@ TA0006: Credential Access,attack.t1003,Suspicious SYSVOL Domain Group Policy Acc
|
||||
TA0006: Credential Access,attack.t1003,Suspicious SYSVOL Domain Group Policy Access,Username,Windows,Windows Log,Security,4688,LP_0002_windows_audit_process_creation_with_commandline
|
||||
TA0006: Credential Access,attack.t1003,Suspicious SYSVOL Domain Group Policy Access,UserSid,Windows,Windows Log,Security,4688,LP_0002_windows_audit_process_creation_with_commandline
|
||||
TA0006: Credential Access,attack.t1003,Suspicious SYSVOL Domain Group Policy Access,ProcessPid,Windows,Windows Log,Security,4688,LP_0002_windows_audit_process_creation_with_commandline
|
||||
TA0006: Credential Access,attack.t1003,Suspicious SYSVOL Domain Group Policy Access,ProcessId,Windows,Windows Log,Security,4688,LP_0002_windows_audit_process_creation_with_commandline
|
||||
TA0006: Credential Access,attack.t1003,Suspicious SYSVOL Domain Group Policy Access,ThreadID,Windows,Windows Log,Security,4688,LP_0002_windows_audit_process_creation_with_commandline
|
||||
TA0006: Credential Access,attack.t1003,Suspicious SYSVOL Domain Group Policy Access,ProcessName,Windows,Windows Log,Security,4688,LP_0002_windows_audit_process_creation_with_commandline
|
||||
TA0006: Credential Access,attack.t1003,Suspicious SYSVOL Domain Group Policy Access,NewProcessName,Windows,Windows Log,Security,4688,LP_0002_windows_audit_process_creation_with_commandline
|
||||
TA0006: Credential Access,attack.t1003,Suspicious SYSVOL Domain Group Policy Access,Image,Windows,Windows Log,Security,4688,LP_0002_windows_audit_process_creation_with_commandline
|
||||
@ -695,6 +949,10 @@ TA0006: Credential Access,attack.t1003,Suspicious SYSVOL Domain Group Policy Acc
|
||||
TA0006: Credential Access,attack.t1003,Suspicious SYSVOL Domain Group Policy Access,UserSid,Windows,Windows Log,Security,4696,LP_0001_windows_audit_process_creation
|
||||
TA0006: Credential Access,attack.t1003,Suspicious SYSVOL Domain Group Policy Access,ProcessPid,Windows,Windows Log,Security,4688,LP_0001_windows_audit_process_creation
|
||||
TA0006: Credential Access,attack.t1003,Suspicious SYSVOL Domain Group Policy Access,ProcessPid,Windows,Windows Log,Security,4696,LP_0001_windows_audit_process_creation
|
||||
TA0006: Credential Access,attack.t1003,Suspicious SYSVOL Domain Group Policy Access,ProcessId,Windows,Windows Log,Security,4688,LP_0001_windows_audit_process_creation
|
||||
TA0006: Credential Access,attack.t1003,Suspicious SYSVOL Domain Group Policy Access,ProcessId,Windows,Windows Log,Security,4696,LP_0001_windows_audit_process_creation
|
||||
TA0006: Credential Access,attack.t1003,Suspicious SYSVOL Domain Group Policy Access,ThreadID,Windows,Windows Log,Security,4688,LP_0001_windows_audit_process_creation
|
||||
TA0006: Credential Access,attack.t1003,Suspicious SYSVOL Domain Group Policy Access,ThreadID,Windows,Windows Log,Security,4696,LP_0001_windows_audit_process_creation
|
||||
TA0006: Credential Access,attack.t1003,Suspicious SYSVOL Domain Group Policy Access,ProcessName,Windows,Windows Log,Security,4688,LP_0001_windows_audit_process_creation
|
||||
TA0006: Credential Access,attack.t1003,Suspicious SYSVOL Domain Group Policy Access,ProcessName,Windows,Windows Log,Security,4696,LP_0001_windows_audit_process_creation
|
||||
TA0006: Credential Access,attack.t1003,Suspicious SYSVOL Domain Group Policy Access,NewProcessName,Windows,Windows Log,Security,4688,LP_0001_windows_audit_process_creation
|
||||
@ -724,6 +982,7 @@ TA0005: Defense Evasion,attack.t1036,Suspicious Process Start Locations,Hostname
|
||||
TA0005: Defense Evasion,attack.t1036,Suspicious Process Start Locations,Username,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,1,LP_0003_windows_sysmon_process_creation
|
||||
TA0005: Defense Evasion,attack.t1036,Suspicious Process Start Locations,ProcessGuid,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,1,LP_0003_windows_sysmon_process_creation
|
||||
TA0005: Defense Evasion,attack.t1036,Suspicious Process Start Locations,ProcessId,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,1,LP_0003_windows_sysmon_process_creation
|
||||
TA0005: Defense Evasion,attack.t1036,Suspicious Process Start Locations,ThreadID,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,1,LP_0003_windows_sysmon_process_creation
|
||||
TA0005: Defense Evasion,attack.t1036,Suspicious Process Start Locations,ProcessName,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,1,LP_0003_windows_sysmon_process_creation
|
||||
TA0005: Defense Evasion,attack.t1036,Suspicious Process Start Locations,CommandLine,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,1,LP_0003_windows_sysmon_process_creation
|
||||
TA0005: Defense Evasion,attack.t1036,Suspicious Process Start Locations,LogonGuid,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,1,LP_0003_windows_sysmon_process_creation
|
||||
@ -745,6 +1004,7 @@ TA0005: Defense Evasion,attack.t1036,Suspicious Process Start Locations,Hostname
|
||||
TA0005: Defense Evasion,attack.t1036,Suspicious Process Start Locations,Username,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,4688,LP_0002_windows_audit_process_creation_with_commandline
|
||||
TA0005: Defense Evasion,attack.t1036,Suspicious Process Start Locations,ProcessGuid,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,4688,LP_0002_windows_audit_process_creation_with_commandline
|
||||
TA0005: Defense Evasion,attack.t1036,Suspicious Process Start Locations,ProcessId,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,4688,LP_0002_windows_audit_process_creation_with_commandline
|
||||
TA0005: Defense Evasion,attack.t1036,Suspicious Process Start Locations,ThreadID,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,4688,LP_0002_windows_audit_process_creation_with_commandline
|
||||
TA0005: Defense Evasion,attack.t1036,Suspicious Process Start Locations,ProcessName,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,4688,LP_0002_windows_audit_process_creation_with_commandline
|
||||
TA0005: Defense Evasion,attack.t1036,Suspicious Process Start Locations,CommandLine,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,4688,LP_0002_windows_audit_process_creation_with_commandline
|
||||
TA0005: Defense Evasion,attack.t1036,Suspicious Process Start Locations,LogonGuid,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,4688,LP_0002_windows_audit_process_creation_with_commandline
|
||||
@ -771,6 +1031,8 @@ TA0005: Defense Evasion,attack.t1036,Suspicious Process Start Locations,ProcessG
|
||||
TA0005: Defense Evasion,attack.t1036,Suspicious Process Start Locations,ProcessGuid,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,4696,LP_0001_windows_audit_process_creation
|
||||
TA0005: Defense Evasion,attack.t1036,Suspicious Process Start Locations,ProcessId,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,4688,LP_0001_windows_audit_process_creation
|
||||
TA0005: Defense Evasion,attack.t1036,Suspicious Process Start Locations,ProcessId,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,4696,LP_0001_windows_audit_process_creation
|
||||
TA0005: Defense Evasion,attack.t1036,Suspicious Process Start Locations,ThreadID,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,4688,LP_0001_windows_audit_process_creation
|
||||
TA0005: Defense Evasion,attack.t1036,Suspicious Process Start Locations,ThreadID,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,4696,LP_0001_windows_audit_process_creation
|
||||
TA0005: Defense Evasion,attack.t1036,Suspicious Process Start Locations,ProcessName,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,4688,LP_0001_windows_audit_process_creation
|
||||
TA0005: Defense Evasion,attack.t1036,Suspicious Process Start Locations,ProcessName,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,4696,LP_0001_windows_audit_process_creation
|
||||
TA0005: Defense Evasion,attack.t1036,Suspicious Process Start Locations,CommandLine,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,4688,LP_0001_windows_audit_process_creation
|
||||
@ -808,6 +1070,8 @@ TA0005: Defense Evasion,attack.t1036,Suspicious Process Start Locations,Hostname
|
||||
TA0005: Defense Evasion,attack.t1036,Suspicious Process Start Locations,Username,Windows,Windows Log,Security,1,LP_0003_windows_sysmon_process_creation
|
||||
TA0005: Defense Evasion,attack.t1036,Suspicious Process Start Locations,UserSid,Windows,Windows Log,Security,1,LP_0003_windows_sysmon_process_creation
|
||||
TA0005: Defense Evasion,attack.t1036,Suspicious Process Start Locations,ProcessPid,Windows,Windows Log,Security,1,LP_0003_windows_sysmon_process_creation
|
||||
TA0005: Defense Evasion,attack.t1036,Suspicious Process Start Locations,ProcessId,Windows,Windows Log,Security,1,LP_0003_windows_sysmon_process_creation
|
||||
TA0005: Defense Evasion,attack.t1036,Suspicious Process Start Locations,ThreadID,Windows,Windows Log,Security,1,LP_0003_windows_sysmon_process_creation
|
||||
TA0005: Defense Evasion,attack.t1036,Suspicious Process Start Locations,ProcessName,Windows,Windows Log,Security,1,LP_0003_windows_sysmon_process_creation
|
||||
TA0005: Defense Evasion,attack.t1036,Suspicious Process Start Locations,NewProcessName,Windows,Windows Log,Security,1,LP_0003_windows_sysmon_process_creation
|
||||
TA0005: Defense Evasion,attack.t1036,Suspicious Process Start Locations,Image,Windows,Windows Log,Security,1,LP_0003_windows_sysmon_process_creation
|
||||
@ -825,6 +1089,8 @@ TA0005: Defense Evasion,attack.t1036,Suspicious Process Start Locations,Hostname
|
||||
TA0005: Defense Evasion,attack.t1036,Suspicious Process Start Locations,Username,Windows,Windows Log,Security,4688,LP_0002_windows_audit_process_creation_with_commandline
|
||||
TA0005: Defense Evasion,attack.t1036,Suspicious Process Start Locations,UserSid,Windows,Windows Log,Security,4688,LP_0002_windows_audit_process_creation_with_commandline
|
||||
TA0005: Defense Evasion,attack.t1036,Suspicious Process Start Locations,ProcessPid,Windows,Windows Log,Security,4688,LP_0002_windows_audit_process_creation_with_commandline
|
||||
TA0005: Defense Evasion,attack.t1036,Suspicious Process Start Locations,ProcessId,Windows,Windows Log,Security,4688,LP_0002_windows_audit_process_creation_with_commandline
|
||||
TA0005: Defense Evasion,attack.t1036,Suspicious Process Start Locations,ThreadID,Windows,Windows Log,Security,4688,LP_0002_windows_audit_process_creation_with_commandline
|
||||
TA0005: Defense Evasion,attack.t1036,Suspicious Process Start Locations,ProcessName,Windows,Windows Log,Security,4688,LP_0002_windows_audit_process_creation_with_commandline
|
||||
TA0005: Defense Evasion,attack.t1036,Suspicious Process Start Locations,NewProcessName,Windows,Windows Log,Security,4688,LP_0002_windows_audit_process_creation_with_commandline
|
||||
TA0005: Defense Evasion,attack.t1036,Suspicious Process Start Locations,Image,Windows,Windows Log,Security,4688,LP_0002_windows_audit_process_creation_with_commandline
|
||||
@ -847,6 +1113,10 @@ TA0005: Defense Evasion,attack.t1036,Suspicious Process Start Locations,UserSid,
|
||||
TA0005: Defense Evasion,attack.t1036,Suspicious Process Start Locations,UserSid,Windows,Windows Log,Security,4696,LP_0001_windows_audit_process_creation
|
||||
TA0005: Defense Evasion,attack.t1036,Suspicious Process Start Locations,ProcessPid,Windows,Windows Log,Security,4688,LP_0001_windows_audit_process_creation
|
||||
TA0005: Defense Evasion,attack.t1036,Suspicious Process Start Locations,ProcessPid,Windows,Windows Log,Security,4696,LP_0001_windows_audit_process_creation
|
||||
TA0005: Defense Evasion,attack.t1036,Suspicious Process Start Locations,ProcessId,Windows,Windows Log,Security,4688,LP_0001_windows_audit_process_creation
|
||||
TA0005: Defense Evasion,attack.t1036,Suspicious Process Start Locations,ProcessId,Windows,Windows Log,Security,4696,LP_0001_windows_audit_process_creation
|
||||
TA0005: Defense Evasion,attack.t1036,Suspicious Process Start Locations,ThreadID,Windows,Windows Log,Security,4688,LP_0001_windows_audit_process_creation
|
||||
TA0005: Defense Evasion,attack.t1036,Suspicious Process Start Locations,ThreadID,Windows,Windows Log,Security,4696,LP_0001_windows_audit_process_creation
|
||||
TA0005: Defense Evasion,attack.t1036,Suspicious Process Start Locations,ProcessName,Windows,Windows Log,Security,4688,LP_0001_windows_audit_process_creation
|
||||
TA0005: Defense Evasion,attack.t1036,Suspicious Process Start Locations,ProcessName,Windows,Windows Log,Security,4696,LP_0001_windows_audit_process_creation
|
||||
TA0005: Defense Evasion,attack.t1036,Suspicious Process Start Locations,NewProcessName,Windows,Windows Log,Security,4688,LP_0001_windows_audit_process_creation
|
||||
@ -876,6 +1146,7 @@ TA0007: Discovery,attack.t1073,Reconnaissance Activity with Net Command,Hostname
|
||||
TA0007: Discovery,attack.t1073,Reconnaissance Activity with Net Command,Username,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,1,LP_0003_windows_sysmon_process_creation
|
||||
TA0007: Discovery,attack.t1073,Reconnaissance Activity with Net Command,ProcessGuid,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,1,LP_0003_windows_sysmon_process_creation
|
||||
TA0007: Discovery,attack.t1073,Reconnaissance Activity with Net Command,ProcessId,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,1,LP_0003_windows_sysmon_process_creation
|
||||
TA0007: Discovery,attack.t1073,Reconnaissance Activity with Net Command,ThreadID,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,1,LP_0003_windows_sysmon_process_creation
|
||||
TA0007: Discovery,attack.t1073,Reconnaissance Activity with Net Command,ProcessName,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,1,LP_0003_windows_sysmon_process_creation
|
||||
TA0007: Discovery,attack.t1073,Reconnaissance Activity with Net Command,CommandLine,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,1,LP_0003_windows_sysmon_process_creation
|
||||
TA0007: Discovery,attack.t1073,Reconnaissance Activity with Net Command,LogonGuid,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,1,LP_0003_windows_sysmon_process_creation
|
||||
@ -897,6 +1168,7 @@ TA0007: Discovery,attack.t1073,Reconnaissance Activity with Net Command,Hostname
|
||||
TA0007: Discovery,attack.t1073,Reconnaissance Activity with Net Command,Username,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,4688,LP_0002_windows_audit_process_creation_with_commandline
|
||||
TA0007: Discovery,attack.t1073,Reconnaissance Activity with Net Command,ProcessGuid,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,4688,LP_0002_windows_audit_process_creation_with_commandline
|
||||
TA0007: Discovery,attack.t1073,Reconnaissance Activity with Net Command,ProcessId,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,4688,LP_0002_windows_audit_process_creation_with_commandline
|
||||
TA0007: Discovery,attack.t1073,Reconnaissance Activity with Net Command,ThreadID,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,4688,LP_0002_windows_audit_process_creation_with_commandline
|
||||
TA0007: Discovery,attack.t1073,Reconnaissance Activity with Net Command,ProcessName,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,4688,LP_0002_windows_audit_process_creation_with_commandline
|
||||
TA0007: Discovery,attack.t1073,Reconnaissance Activity with Net Command,CommandLine,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,4688,LP_0002_windows_audit_process_creation_with_commandline
|
||||
TA0007: Discovery,attack.t1073,Reconnaissance Activity with Net Command,LogonGuid,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,4688,LP_0002_windows_audit_process_creation_with_commandline
|
||||
@ -923,6 +1195,8 @@ TA0007: Discovery,attack.t1073,Reconnaissance Activity with Net Command,ProcessG
|
||||
TA0007: Discovery,attack.t1073,Reconnaissance Activity with Net Command,ProcessGuid,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,4696,LP_0001_windows_audit_process_creation
|
||||
TA0007: Discovery,attack.t1073,Reconnaissance Activity with Net Command,ProcessId,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,4688,LP_0001_windows_audit_process_creation
|
||||
TA0007: Discovery,attack.t1073,Reconnaissance Activity with Net Command,ProcessId,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,4696,LP_0001_windows_audit_process_creation
|
||||
TA0007: Discovery,attack.t1073,Reconnaissance Activity with Net Command,ThreadID,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,4688,LP_0001_windows_audit_process_creation
|
||||
TA0007: Discovery,attack.t1073,Reconnaissance Activity with Net Command,ThreadID,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,4696,LP_0001_windows_audit_process_creation
|
||||
TA0007: Discovery,attack.t1073,Reconnaissance Activity with Net Command,ProcessName,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,4688,LP_0001_windows_audit_process_creation
|
||||
TA0007: Discovery,attack.t1073,Reconnaissance Activity with Net Command,ProcessName,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,4696,LP_0001_windows_audit_process_creation
|
||||
TA0007: Discovery,attack.t1073,Reconnaissance Activity with Net Command,CommandLine,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,4688,LP_0001_windows_audit_process_creation
|
||||
@ -960,6 +1234,8 @@ TA0007: Discovery,attack.t1073,Reconnaissance Activity with Net Command,Hostname
|
||||
TA0007: Discovery,attack.t1073,Reconnaissance Activity with Net Command,Username,Windows,Windows Log,Security,1,LP_0003_windows_sysmon_process_creation
|
||||
TA0007: Discovery,attack.t1073,Reconnaissance Activity with Net Command,UserSid,Windows,Windows Log,Security,1,LP_0003_windows_sysmon_process_creation
|
||||
TA0007: Discovery,attack.t1073,Reconnaissance Activity with Net Command,ProcessPid,Windows,Windows Log,Security,1,LP_0003_windows_sysmon_process_creation
|
||||
TA0007: Discovery,attack.t1073,Reconnaissance Activity with Net Command,ProcessId,Windows,Windows Log,Security,1,LP_0003_windows_sysmon_process_creation
|
||||
TA0007: Discovery,attack.t1073,Reconnaissance Activity with Net Command,ThreadID,Windows,Windows Log,Security,1,LP_0003_windows_sysmon_process_creation
|
||||
TA0007: Discovery,attack.t1073,Reconnaissance Activity with Net Command,ProcessName,Windows,Windows Log,Security,1,LP_0003_windows_sysmon_process_creation
|
||||
TA0007: Discovery,attack.t1073,Reconnaissance Activity with Net Command,NewProcessName,Windows,Windows Log,Security,1,LP_0003_windows_sysmon_process_creation
|
||||
TA0007: Discovery,attack.t1073,Reconnaissance Activity with Net Command,Image,Windows,Windows Log,Security,1,LP_0003_windows_sysmon_process_creation
|
||||
@ -977,6 +1253,8 @@ TA0007: Discovery,attack.t1073,Reconnaissance Activity with Net Command,Hostname
|
||||
TA0007: Discovery,attack.t1073,Reconnaissance Activity with Net Command,Username,Windows,Windows Log,Security,4688,LP_0002_windows_audit_process_creation_with_commandline
|
||||
TA0007: Discovery,attack.t1073,Reconnaissance Activity with Net Command,UserSid,Windows,Windows Log,Security,4688,LP_0002_windows_audit_process_creation_with_commandline
|
||||
TA0007: Discovery,attack.t1073,Reconnaissance Activity with Net Command,ProcessPid,Windows,Windows Log,Security,4688,LP_0002_windows_audit_process_creation_with_commandline
|
||||
TA0007: Discovery,attack.t1073,Reconnaissance Activity with Net Command,ProcessId,Windows,Windows Log,Security,4688,LP_0002_windows_audit_process_creation_with_commandline
|
||||
TA0007: Discovery,attack.t1073,Reconnaissance Activity with Net Command,ThreadID,Windows,Windows Log,Security,4688,LP_0002_windows_audit_process_creation_with_commandline
|
||||
TA0007: Discovery,attack.t1073,Reconnaissance Activity with Net Command,ProcessName,Windows,Windows Log,Security,4688,LP_0002_windows_audit_process_creation_with_commandline
|
||||
TA0007: Discovery,attack.t1073,Reconnaissance Activity with Net Command,NewProcessName,Windows,Windows Log,Security,4688,LP_0002_windows_audit_process_creation_with_commandline
|
||||
TA0007: Discovery,attack.t1073,Reconnaissance Activity with Net Command,Image,Windows,Windows Log,Security,4688,LP_0002_windows_audit_process_creation_with_commandline
|
||||
@ -999,6 +1277,10 @@ TA0007: Discovery,attack.t1073,Reconnaissance Activity with Net Command,UserSid,
|
||||
TA0007: Discovery,attack.t1073,Reconnaissance Activity with Net Command,UserSid,Windows,Windows Log,Security,4696,LP_0001_windows_audit_process_creation
|
||||
TA0007: Discovery,attack.t1073,Reconnaissance Activity with Net Command,ProcessPid,Windows,Windows Log,Security,4688,LP_0001_windows_audit_process_creation
|
||||
TA0007: Discovery,attack.t1073,Reconnaissance Activity with Net Command,ProcessPid,Windows,Windows Log,Security,4696,LP_0001_windows_audit_process_creation
|
||||
TA0007: Discovery,attack.t1073,Reconnaissance Activity with Net Command,ProcessId,Windows,Windows Log,Security,4688,LP_0001_windows_audit_process_creation
|
||||
TA0007: Discovery,attack.t1073,Reconnaissance Activity with Net Command,ProcessId,Windows,Windows Log,Security,4696,LP_0001_windows_audit_process_creation
|
||||
TA0007: Discovery,attack.t1073,Reconnaissance Activity with Net Command,ThreadID,Windows,Windows Log,Security,4688,LP_0001_windows_audit_process_creation
|
||||
TA0007: Discovery,attack.t1073,Reconnaissance Activity with Net Command,ThreadID,Windows,Windows Log,Security,4696,LP_0001_windows_audit_process_creation
|
||||
TA0007: Discovery,attack.t1073,Reconnaissance Activity with Net Command,ProcessName,Windows,Windows Log,Security,4688,LP_0001_windows_audit_process_creation
|
||||
TA0007: Discovery,attack.t1073,Reconnaissance Activity with Net Command,ProcessName,Windows,Windows Log,Security,4696,LP_0001_windows_audit_process_creation
|
||||
TA0007: Discovery,attack.t1073,Reconnaissance Activity with Net Command,NewProcessName,Windows,Windows Log,Security,4688,LP_0001_windows_audit_process_creation
|
||||
@ -1028,6 +1310,7 @@ TA0007: Discovery,attack.t1012,Reconnaissance Activity with Net Command,Hostname
|
||||
TA0007: Discovery,attack.t1012,Reconnaissance Activity with Net Command,Username,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,1,LP_0003_windows_sysmon_process_creation
|
||||
TA0007: Discovery,attack.t1012,Reconnaissance Activity with Net Command,ProcessGuid,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,1,LP_0003_windows_sysmon_process_creation
|
||||
TA0007: Discovery,attack.t1012,Reconnaissance Activity with Net Command,ProcessId,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,1,LP_0003_windows_sysmon_process_creation
|
||||
TA0007: Discovery,attack.t1012,Reconnaissance Activity with Net Command,ThreadID,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,1,LP_0003_windows_sysmon_process_creation
|
||||
TA0007: Discovery,attack.t1012,Reconnaissance Activity with Net Command,ProcessName,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,1,LP_0003_windows_sysmon_process_creation
|
||||
TA0007: Discovery,attack.t1012,Reconnaissance Activity with Net Command,CommandLine,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,1,LP_0003_windows_sysmon_process_creation
|
||||
TA0007: Discovery,attack.t1012,Reconnaissance Activity with Net Command,LogonGuid,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,1,LP_0003_windows_sysmon_process_creation
|
||||
@ -1049,6 +1332,7 @@ TA0007: Discovery,attack.t1012,Reconnaissance Activity with Net Command,Hostname
|
||||
TA0007: Discovery,attack.t1012,Reconnaissance Activity with Net Command,Username,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,4688,LP_0002_windows_audit_process_creation_with_commandline
|
||||
TA0007: Discovery,attack.t1012,Reconnaissance Activity with Net Command,ProcessGuid,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,4688,LP_0002_windows_audit_process_creation_with_commandline
|
||||
TA0007: Discovery,attack.t1012,Reconnaissance Activity with Net Command,ProcessId,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,4688,LP_0002_windows_audit_process_creation_with_commandline
|
||||
TA0007: Discovery,attack.t1012,Reconnaissance Activity with Net Command,ThreadID,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,4688,LP_0002_windows_audit_process_creation_with_commandline
|
||||
TA0007: Discovery,attack.t1012,Reconnaissance Activity with Net Command,ProcessName,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,4688,LP_0002_windows_audit_process_creation_with_commandline
|
||||
TA0007: Discovery,attack.t1012,Reconnaissance Activity with Net Command,CommandLine,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,4688,LP_0002_windows_audit_process_creation_with_commandline
|
||||
TA0007: Discovery,attack.t1012,Reconnaissance Activity with Net Command,LogonGuid,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,4688,LP_0002_windows_audit_process_creation_with_commandline
|
||||
@ -1075,6 +1359,8 @@ TA0007: Discovery,attack.t1012,Reconnaissance Activity with Net Command,ProcessG
|
||||
TA0007: Discovery,attack.t1012,Reconnaissance Activity with Net Command,ProcessGuid,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,4696,LP_0001_windows_audit_process_creation
|
||||
TA0007: Discovery,attack.t1012,Reconnaissance Activity with Net Command,ProcessId,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,4688,LP_0001_windows_audit_process_creation
|
||||
TA0007: Discovery,attack.t1012,Reconnaissance Activity with Net Command,ProcessId,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,4696,LP_0001_windows_audit_process_creation
|
||||
TA0007: Discovery,attack.t1012,Reconnaissance Activity with Net Command,ThreadID,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,4688,LP_0001_windows_audit_process_creation
|
||||
TA0007: Discovery,attack.t1012,Reconnaissance Activity with Net Command,ThreadID,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,4696,LP_0001_windows_audit_process_creation
|
||||
TA0007: Discovery,attack.t1012,Reconnaissance Activity with Net Command,ProcessName,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,4688,LP_0001_windows_audit_process_creation
|
||||
TA0007: Discovery,attack.t1012,Reconnaissance Activity with Net Command,ProcessName,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,4696,LP_0001_windows_audit_process_creation
|
||||
TA0007: Discovery,attack.t1012,Reconnaissance Activity with Net Command,CommandLine,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,4688,LP_0001_windows_audit_process_creation
|
||||
@ -1112,6 +1398,8 @@ TA0007: Discovery,attack.t1012,Reconnaissance Activity with Net Command,Hostname
|
||||
TA0007: Discovery,attack.t1012,Reconnaissance Activity with Net Command,Username,Windows,Windows Log,Security,1,LP_0003_windows_sysmon_process_creation
|
||||
TA0007: Discovery,attack.t1012,Reconnaissance Activity with Net Command,UserSid,Windows,Windows Log,Security,1,LP_0003_windows_sysmon_process_creation
|
||||
TA0007: Discovery,attack.t1012,Reconnaissance Activity with Net Command,ProcessPid,Windows,Windows Log,Security,1,LP_0003_windows_sysmon_process_creation
|
||||
TA0007: Discovery,attack.t1012,Reconnaissance Activity with Net Command,ProcessId,Windows,Windows Log,Security,1,LP_0003_windows_sysmon_process_creation
|
||||
TA0007: Discovery,attack.t1012,Reconnaissance Activity with Net Command,ThreadID,Windows,Windows Log,Security,1,LP_0003_windows_sysmon_process_creation
|
||||
TA0007: Discovery,attack.t1012,Reconnaissance Activity with Net Command,ProcessName,Windows,Windows Log,Security,1,LP_0003_windows_sysmon_process_creation
|
||||
TA0007: Discovery,attack.t1012,Reconnaissance Activity with Net Command,NewProcessName,Windows,Windows Log,Security,1,LP_0003_windows_sysmon_process_creation
|
||||
TA0007: Discovery,attack.t1012,Reconnaissance Activity with Net Command,Image,Windows,Windows Log,Security,1,LP_0003_windows_sysmon_process_creation
|
||||
@ -1129,6 +1417,8 @@ TA0007: Discovery,attack.t1012,Reconnaissance Activity with Net Command,Hostname
|
||||
TA0007: Discovery,attack.t1012,Reconnaissance Activity with Net Command,Username,Windows,Windows Log,Security,4688,LP_0002_windows_audit_process_creation_with_commandline
|
||||
TA0007: Discovery,attack.t1012,Reconnaissance Activity with Net Command,UserSid,Windows,Windows Log,Security,4688,LP_0002_windows_audit_process_creation_with_commandline
|
||||
TA0007: Discovery,attack.t1012,Reconnaissance Activity with Net Command,ProcessPid,Windows,Windows Log,Security,4688,LP_0002_windows_audit_process_creation_with_commandline
|
||||
TA0007: Discovery,attack.t1012,Reconnaissance Activity with Net Command,ProcessId,Windows,Windows Log,Security,4688,LP_0002_windows_audit_process_creation_with_commandline
|
||||
TA0007: Discovery,attack.t1012,Reconnaissance Activity with Net Command,ThreadID,Windows,Windows Log,Security,4688,LP_0002_windows_audit_process_creation_with_commandline
|
||||
TA0007: Discovery,attack.t1012,Reconnaissance Activity with Net Command,ProcessName,Windows,Windows Log,Security,4688,LP_0002_windows_audit_process_creation_with_commandline
|
||||
TA0007: Discovery,attack.t1012,Reconnaissance Activity with Net Command,NewProcessName,Windows,Windows Log,Security,4688,LP_0002_windows_audit_process_creation_with_commandline
|
||||
TA0007: Discovery,attack.t1012,Reconnaissance Activity with Net Command,Image,Windows,Windows Log,Security,4688,LP_0002_windows_audit_process_creation_with_commandline
|
||||
@ -1151,6 +1441,10 @@ TA0007: Discovery,attack.t1012,Reconnaissance Activity with Net Command,UserSid,
|
||||
TA0007: Discovery,attack.t1012,Reconnaissance Activity with Net Command,UserSid,Windows,Windows Log,Security,4696,LP_0001_windows_audit_process_creation
|
||||
TA0007: Discovery,attack.t1012,Reconnaissance Activity with Net Command,ProcessPid,Windows,Windows Log,Security,4688,LP_0001_windows_audit_process_creation
|
||||
TA0007: Discovery,attack.t1012,Reconnaissance Activity with Net Command,ProcessPid,Windows,Windows Log,Security,4696,LP_0001_windows_audit_process_creation
|
||||
TA0007: Discovery,attack.t1012,Reconnaissance Activity with Net Command,ProcessId,Windows,Windows Log,Security,4688,LP_0001_windows_audit_process_creation
|
||||
TA0007: Discovery,attack.t1012,Reconnaissance Activity with Net Command,ProcessId,Windows,Windows Log,Security,4696,LP_0001_windows_audit_process_creation
|
||||
TA0007: Discovery,attack.t1012,Reconnaissance Activity with Net Command,ThreadID,Windows,Windows Log,Security,4688,LP_0001_windows_audit_process_creation
|
||||
TA0007: Discovery,attack.t1012,Reconnaissance Activity with Net Command,ThreadID,Windows,Windows Log,Security,4696,LP_0001_windows_audit_process_creation
|
||||
TA0007: Discovery,attack.t1012,Reconnaissance Activity with Net Command,ProcessName,Windows,Windows Log,Security,4688,LP_0001_windows_audit_process_creation
|
||||
TA0007: Discovery,attack.t1012,Reconnaissance Activity with Net Command,ProcessName,Windows,Windows Log,Security,4696,LP_0001_windows_audit_process_creation
|
||||
TA0007: Discovery,attack.t1012,Reconnaissance Activity with Net Command,NewProcessName,Windows,Windows Log,Security,4688,LP_0001_windows_audit_process_creation
|
||||
@ -1180,6 +1474,7 @@ TA0004: Privilege Escalation,attack.t1068,Hurricane Panda Activity,Hostname,Wind
|
||||
TA0004: Privilege Escalation,attack.t1068,Hurricane Panda Activity,Username,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,1,LP_0003_windows_sysmon_process_creation
|
||||
TA0004: Privilege Escalation,attack.t1068,Hurricane Panda Activity,ProcessGuid,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,1,LP_0003_windows_sysmon_process_creation
|
||||
TA0004: Privilege Escalation,attack.t1068,Hurricane Panda Activity,ProcessId,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,1,LP_0003_windows_sysmon_process_creation
|
||||
TA0004: Privilege Escalation,attack.t1068,Hurricane Panda Activity,ThreadID,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,1,LP_0003_windows_sysmon_process_creation
|
||||
TA0004: Privilege Escalation,attack.t1068,Hurricane Panda Activity,ProcessName,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,1,LP_0003_windows_sysmon_process_creation
|
||||
TA0004: Privilege Escalation,attack.t1068,Hurricane Panda Activity,CommandLine,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,1,LP_0003_windows_sysmon_process_creation
|
||||
TA0004: Privilege Escalation,attack.t1068,Hurricane Panda Activity,LogonGuid,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,1,LP_0003_windows_sysmon_process_creation
|
||||
@ -1201,6 +1496,7 @@ TA0004: Privilege Escalation,attack.t1068,Hurricane Panda Activity,Hostname,Wind
|
||||
TA0004: Privilege Escalation,attack.t1068,Hurricane Panda Activity,Username,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,4688,LP_0002_windows_audit_process_creation_with_commandline
|
||||
TA0004: Privilege Escalation,attack.t1068,Hurricane Panda Activity,ProcessGuid,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,4688,LP_0002_windows_audit_process_creation_with_commandline
|
||||
TA0004: Privilege Escalation,attack.t1068,Hurricane Panda Activity,ProcessId,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,4688,LP_0002_windows_audit_process_creation_with_commandline
|
||||
TA0004: Privilege Escalation,attack.t1068,Hurricane Panda Activity,ThreadID,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,4688,LP_0002_windows_audit_process_creation_with_commandline
|
||||
TA0004: Privilege Escalation,attack.t1068,Hurricane Panda Activity,ProcessName,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,4688,LP_0002_windows_audit_process_creation_with_commandline
|
||||
TA0004: Privilege Escalation,attack.t1068,Hurricane Panda Activity,CommandLine,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,4688,LP_0002_windows_audit_process_creation_with_commandline
|
||||
TA0004: Privilege Escalation,attack.t1068,Hurricane Panda Activity,LogonGuid,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,4688,LP_0002_windows_audit_process_creation_with_commandline
|
||||
@ -1227,6 +1523,8 @@ TA0004: Privilege Escalation,attack.t1068,Hurricane Panda Activity,ProcessGuid,W
|
||||
TA0004: Privilege Escalation,attack.t1068,Hurricane Panda Activity,ProcessGuid,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,4696,LP_0001_windows_audit_process_creation
|
||||
TA0004: Privilege Escalation,attack.t1068,Hurricane Panda Activity,ProcessId,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,4688,LP_0001_windows_audit_process_creation
|
||||
TA0004: Privilege Escalation,attack.t1068,Hurricane Panda Activity,ProcessId,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,4696,LP_0001_windows_audit_process_creation
|
||||
TA0004: Privilege Escalation,attack.t1068,Hurricane Panda Activity,ThreadID,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,4688,LP_0001_windows_audit_process_creation
|
||||
TA0004: Privilege Escalation,attack.t1068,Hurricane Panda Activity,ThreadID,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,4696,LP_0001_windows_audit_process_creation
|
||||
TA0004: Privilege Escalation,attack.t1068,Hurricane Panda Activity,ProcessName,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,4688,LP_0001_windows_audit_process_creation
|
||||
TA0004: Privilege Escalation,attack.t1068,Hurricane Panda Activity,ProcessName,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,4696,LP_0001_windows_audit_process_creation
|
||||
TA0004: Privilege Escalation,attack.t1068,Hurricane Panda Activity,CommandLine,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,4688,LP_0001_windows_audit_process_creation
|
||||
@ -1264,6 +1562,8 @@ TA0004: Privilege Escalation,attack.t1068,Hurricane Panda Activity,Hostname,Wind
|
||||
TA0004: Privilege Escalation,attack.t1068,Hurricane Panda Activity,Username,Windows,Windows Log,Security,1,LP_0003_windows_sysmon_process_creation
|
||||
TA0004: Privilege Escalation,attack.t1068,Hurricane Panda Activity,UserSid,Windows,Windows Log,Security,1,LP_0003_windows_sysmon_process_creation
|
||||
TA0004: Privilege Escalation,attack.t1068,Hurricane Panda Activity,ProcessPid,Windows,Windows Log,Security,1,LP_0003_windows_sysmon_process_creation
|
||||
TA0004: Privilege Escalation,attack.t1068,Hurricane Panda Activity,ProcessId,Windows,Windows Log,Security,1,LP_0003_windows_sysmon_process_creation
|
||||
TA0004: Privilege Escalation,attack.t1068,Hurricane Panda Activity,ThreadID,Windows,Windows Log,Security,1,LP_0003_windows_sysmon_process_creation
|
||||
TA0004: Privilege Escalation,attack.t1068,Hurricane Panda Activity,ProcessName,Windows,Windows Log,Security,1,LP_0003_windows_sysmon_process_creation
|
||||
TA0004: Privilege Escalation,attack.t1068,Hurricane Panda Activity,NewProcessName,Windows,Windows Log,Security,1,LP_0003_windows_sysmon_process_creation
|
||||
TA0004: Privilege Escalation,attack.t1068,Hurricane Panda Activity,Image,Windows,Windows Log,Security,1,LP_0003_windows_sysmon_process_creation
|
||||
@ -1281,6 +1581,8 @@ TA0004: Privilege Escalation,attack.t1068,Hurricane Panda Activity,Hostname,Wind
|
||||
TA0004: Privilege Escalation,attack.t1068,Hurricane Panda Activity,Username,Windows,Windows Log,Security,4688,LP_0002_windows_audit_process_creation_with_commandline
|
||||
TA0004: Privilege Escalation,attack.t1068,Hurricane Panda Activity,UserSid,Windows,Windows Log,Security,4688,LP_0002_windows_audit_process_creation_with_commandline
|
||||
TA0004: Privilege Escalation,attack.t1068,Hurricane Panda Activity,ProcessPid,Windows,Windows Log,Security,4688,LP_0002_windows_audit_process_creation_with_commandline
|
||||
TA0004: Privilege Escalation,attack.t1068,Hurricane Panda Activity,ProcessId,Windows,Windows Log,Security,4688,LP_0002_windows_audit_process_creation_with_commandline
|
||||
TA0004: Privilege Escalation,attack.t1068,Hurricane Panda Activity,ThreadID,Windows,Windows Log,Security,4688,LP_0002_windows_audit_process_creation_with_commandline
|
||||
TA0004: Privilege Escalation,attack.t1068,Hurricane Panda Activity,ProcessName,Windows,Windows Log,Security,4688,LP_0002_windows_audit_process_creation_with_commandline
|
||||
TA0004: Privilege Escalation,attack.t1068,Hurricane Panda Activity,NewProcessName,Windows,Windows Log,Security,4688,LP_0002_windows_audit_process_creation_with_commandline
|
||||
TA0004: Privilege Escalation,attack.t1068,Hurricane Panda Activity,Image,Windows,Windows Log,Security,4688,LP_0002_windows_audit_process_creation_with_commandline
|
||||
@ -1303,6 +1605,10 @@ TA0004: Privilege Escalation,attack.t1068,Hurricane Panda Activity,UserSid,Windo
|
||||
TA0004: Privilege Escalation,attack.t1068,Hurricane Panda Activity,UserSid,Windows,Windows Log,Security,4696,LP_0001_windows_audit_process_creation
|
||||
TA0004: Privilege Escalation,attack.t1068,Hurricane Panda Activity,ProcessPid,Windows,Windows Log,Security,4688,LP_0001_windows_audit_process_creation
|
||||
TA0004: Privilege Escalation,attack.t1068,Hurricane Panda Activity,ProcessPid,Windows,Windows Log,Security,4696,LP_0001_windows_audit_process_creation
|
||||
TA0004: Privilege Escalation,attack.t1068,Hurricane Panda Activity,ProcessId,Windows,Windows Log,Security,4688,LP_0001_windows_audit_process_creation
|
||||
TA0004: Privilege Escalation,attack.t1068,Hurricane Panda Activity,ProcessId,Windows,Windows Log,Security,4696,LP_0001_windows_audit_process_creation
|
||||
TA0004: Privilege Escalation,attack.t1068,Hurricane Panda Activity,ThreadID,Windows,Windows Log,Security,4688,LP_0001_windows_audit_process_creation
|
||||
TA0004: Privilege Escalation,attack.t1068,Hurricane Panda Activity,ThreadID,Windows,Windows Log,Security,4696,LP_0001_windows_audit_process_creation
|
||||
TA0004: Privilege Escalation,attack.t1068,Hurricane Panda Activity,ProcessName,Windows,Windows Log,Security,4688,LP_0001_windows_audit_process_creation
|
||||
TA0004: Privilege Escalation,attack.t1068,Hurricane Panda Activity,ProcessName,Windows,Windows Log,Security,4696,LP_0001_windows_audit_process_creation
|
||||
TA0004: Privilege Escalation,attack.t1068,Hurricane Panda Activity,NewProcessName,Windows,Windows Log,Security,4688,LP_0001_windows_audit_process_creation
|
||||
@ -1332,6 +1638,7 @@ TA0003: Persistence,attack.t1100,IIS Native-Code Module Command Line Installatio
|
||||
TA0003: Persistence,attack.t1100,IIS Native-Code Module Command Line Installation,Username,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,1,LP_0003_windows_sysmon_process_creation
|
||||
TA0003: Persistence,attack.t1100,IIS Native-Code Module Command Line Installation,ProcessGuid,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,1,LP_0003_windows_sysmon_process_creation
|
||||
TA0003: Persistence,attack.t1100,IIS Native-Code Module Command Line Installation,ProcessId,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,1,LP_0003_windows_sysmon_process_creation
|
||||
TA0003: Persistence,attack.t1100,IIS Native-Code Module Command Line Installation,ThreadID,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,1,LP_0003_windows_sysmon_process_creation
|
||||
TA0003: Persistence,attack.t1100,IIS Native-Code Module Command Line Installation,ProcessName,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,1,LP_0003_windows_sysmon_process_creation
|
||||
TA0003: Persistence,attack.t1100,IIS Native-Code Module Command Line Installation,CommandLine,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,1,LP_0003_windows_sysmon_process_creation
|
||||
TA0003: Persistence,attack.t1100,IIS Native-Code Module Command Line Installation,LogonGuid,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,1,LP_0003_windows_sysmon_process_creation
|
||||
@ -1353,6 +1660,7 @@ TA0003: Persistence,attack.t1100,IIS Native-Code Module Command Line Installatio
|
||||
TA0003: Persistence,attack.t1100,IIS Native-Code Module Command Line Installation,Username,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,4688,LP_0002_windows_audit_process_creation_with_commandline
|
||||
TA0003: Persistence,attack.t1100,IIS Native-Code Module Command Line Installation,ProcessGuid,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,4688,LP_0002_windows_audit_process_creation_with_commandline
|
||||
TA0003: Persistence,attack.t1100,IIS Native-Code Module Command Line Installation,ProcessId,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,4688,LP_0002_windows_audit_process_creation_with_commandline
|
||||
TA0003: Persistence,attack.t1100,IIS Native-Code Module Command Line Installation,ThreadID,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,4688,LP_0002_windows_audit_process_creation_with_commandline
|
||||
TA0003: Persistence,attack.t1100,IIS Native-Code Module Command Line Installation,ProcessName,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,4688,LP_0002_windows_audit_process_creation_with_commandline
|
||||
TA0003: Persistence,attack.t1100,IIS Native-Code Module Command Line Installation,CommandLine,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,4688,LP_0002_windows_audit_process_creation_with_commandline
|
||||
TA0003: Persistence,attack.t1100,IIS Native-Code Module Command Line Installation,LogonGuid,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,4688,LP_0002_windows_audit_process_creation_with_commandline
|
||||
@ -1379,6 +1687,8 @@ TA0003: Persistence,attack.t1100,IIS Native-Code Module Command Line Installatio
|
||||
TA0003: Persistence,attack.t1100,IIS Native-Code Module Command Line Installation,ProcessGuid,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,4696,LP_0001_windows_audit_process_creation
|
||||
TA0003: Persistence,attack.t1100,IIS Native-Code Module Command Line Installation,ProcessId,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,4688,LP_0001_windows_audit_process_creation
|
||||
TA0003: Persistence,attack.t1100,IIS Native-Code Module Command Line Installation,ProcessId,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,4696,LP_0001_windows_audit_process_creation
|
||||
TA0003: Persistence,attack.t1100,IIS Native-Code Module Command Line Installation,ThreadID,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,4688,LP_0001_windows_audit_process_creation
|
||||
TA0003: Persistence,attack.t1100,IIS Native-Code Module Command Line Installation,ThreadID,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,4696,LP_0001_windows_audit_process_creation
|
||||
TA0003: Persistence,attack.t1100,IIS Native-Code Module Command Line Installation,ProcessName,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,4688,LP_0001_windows_audit_process_creation
|
||||
TA0003: Persistence,attack.t1100,IIS Native-Code Module Command Line Installation,ProcessName,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,4696,LP_0001_windows_audit_process_creation
|
||||
TA0003: Persistence,attack.t1100,IIS Native-Code Module Command Line Installation,CommandLine,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,4688,LP_0001_windows_audit_process_creation
|
||||
@ -1416,6 +1726,8 @@ TA0003: Persistence,attack.t1100,IIS Native-Code Module Command Line Installatio
|
||||
TA0003: Persistence,attack.t1100,IIS Native-Code Module Command Line Installation,Username,Windows,Windows Log,Security,1,LP_0003_windows_sysmon_process_creation
|
||||
TA0003: Persistence,attack.t1100,IIS Native-Code Module Command Line Installation,UserSid,Windows,Windows Log,Security,1,LP_0003_windows_sysmon_process_creation
|
||||
TA0003: Persistence,attack.t1100,IIS Native-Code Module Command Line Installation,ProcessPid,Windows,Windows Log,Security,1,LP_0003_windows_sysmon_process_creation
|
||||
TA0003: Persistence,attack.t1100,IIS Native-Code Module Command Line Installation,ProcessId,Windows,Windows Log,Security,1,LP_0003_windows_sysmon_process_creation
|
||||
TA0003: Persistence,attack.t1100,IIS Native-Code Module Command Line Installation,ThreadID,Windows,Windows Log,Security,1,LP_0003_windows_sysmon_process_creation
|
||||
TA0003: Persistence,attack.t1100,IIS Native-Code Module Command Line Installation,ProcessName,Windows,Windows Log,Security,1,LP_0003_windows_sysmon_process_creation
|
||||
TA0003: Persistence,attack.t1100,IIS Native-Code Module Command Line Installation,NewProcessName,Windows,Windows Log,Security,1,LP_0003_windows_sysmon_process_creation
|
||||
TA0003: Persistence,attack.t1100,IIS Native-Code Module Command Line Installation,Image,Windows,Windows Log,Security,1,LP_0003_windows_sysmon_process_creation
|
||||
@ -1433,6 +1745,8 @@ TA0003: Persistence,attack.t1100,IIS Native-Code Module Command Line Installatio
|
||||
TA0003: Persistence,attack.t1100,IIS Native-Code Module Command Line Installation,Username,Windows,Windows Log,Security,4688,LP_0002_windows_audit_process_creation_with_commandline
|
||||
TA0003: Persistence,attack.t1100,IIS Native-Code Module Command Line Installation,UserSid,Windows,Windows Log,Security,4688,LP_0002_windows_audit_process_creation_with_commandline
|
||||
TA0003: Persistence,attack.t1100,IIS Native-Code Module Command Line Installation,ProcessPid,Windows,Windows Log,Security,4688,LP_0002_windows_audit_process_creation_with_commandline
|
||||
TA0003: Persistence,attack.t1100,IIS Native-Code Module Command Line Installation,ProcessId,Windows,Windows Log,Security,4688,LP_0002_windows_audit_process_creation_with_commandline
|
||||
TA0003: Persistence,attack.t1100,IIS Native-Code Module Command Line Installation,ThreadID,Windows,Windows Log,Security,4688,LP_0002_windows_audit_process_creation_with_commandline
|
||||
TA0003: Persistence,attack.t1100,IIS Native-Code Module Command Line Installation,ProcessName,Windows,Windows Log,Security,4688,LP_0002_windows_audit_process_creation_with_commandline
|
||||
TA0003: Persistence,attack.t1100,IIS Native-Code Module Command Line Installation,NewProcessName,Windows,Windows Log,Security,4688,LP_0002_windows_audit_process_creation_with_commandline
|
||||
TA0003: Persistence,attack.t1100,IIS Native-Code Module Command Line Installation,Image,Windows,Windows Log,Security,4688,LP_0002_windows_audit_process_creation_with_commandline
|
||||
@ -1455,6 +1769,10 @@ TA0003: Persistence,attack.t1100,IIS Native-Code Module Command Line Installatio
|
||||
TA0003: Persistence,attack.t1100,IIS Native-Code Module Command Line Installation,UserSid,Windows,Windows Log,Security,4696,LP_0001_windows_audit_process_creation
|
||||
TA0003: Persistence,attack.t1100,IIS Native-Code Module Command Line Installation,ProcessPid,Windows,Windows Log,Security,4688,LP_0001_windows_audit_process_creation
|
||||
TA0003: Persistence,attack.t1100,IIS Native-Code Module Command Line Installation,ProcessPid,Windows,Windows Log,Security,4696,LP_0001_windows_audit_process_creation
|
||||
TA0003: Persistence,attack.t1100,IIS Native-Code Module Command Line Installation,ProcessId,Windows,Windows Log,Security,4688,LP_0001_windows_audit_process_creation
|
||||
TA0003: Persistence,attack.t1100,IIS Native-Code Module Command Line Installation,ProcessId,Windows,Windows Log,Security,4696,LP_0001_windows_audit_process_creation
|
||||
TA0003: Persistence,attack.t1100,IIS Native-Code Module Command Line Installation,ThreadID,Windows,Windows Log,Security,4688,LP_0001_windows_audit_process_creation
|
||||
TA0003: Persistence,attack.t1100,IIS Native-Code Module Command Line Installation,ThreadID,Windows,Windows Log,Security,4696,LP_0001_windows_audit_process_creation
|
||||
TA0003: Persistence,attack.t1100,IIS Native-Code Module Command Line Installation,ProcessName,Windows,Windows Log,Security,4688,LP_0001_windows_audit_process_creation
|
||||
TA0003: Persistence,attack.t1100,IIS Native-Code Module Command Line Installation,ProcessName,Windows,Windows Log,Security,4696,LP_0001_windows_audit_process_creation
|
||||
TA0003: Persistence,attack.t1100,IIS Native-Code Module Command Line Installation,NewProcessName,Windows,Windows Log,Security,4688,LP_0001_windows_audit_process_creation
|
||||
@ -1484,6 +1802,7 @@ TA0006: Credential Access,attack.t1003,Invocation of Active Directory Diagnostic
|
||||
TA0006: Credential Access,attack.t1003,Invocation of Active Directory Diagnostic Tool (ntdsutil.exe),Username,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,1,LP_0003_windows_sysmon_process_creation
|
||||
TA0006: Credential Access,attack.t1003,Invocation of Active Directory Diagnostic Tool (ntdsutil.exe),ProcessGuid,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,1,LP_0003_windows_sysmon_process_creation
|
||||
TA0006: Credential Access,attack.t1003,Invocation of Active Directory Diagnostic Tool (ntdsutil.exe),ProcessId,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,1,LP_0003_windows_sysmon_process_creation
|
||||
TA0006: Credential Access,attack.t1003,Invocation of Active Directory Diagnostic Tool (ntdsutil.exe),ThreadID,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,1,LP_0003_windows_sysmon_process_creation
|
||||
TA0006: Credential Access,attack.t1003,Invocation of Active Directory Diagnostic Tool (ntdsutil.exe),ProcessName,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,1,LP_0003_windows_sysmon_process_creation
|
||||
TA0006: Credential Access,attack.t1003,Invocation of Active Directory Diagnostic Tool (ntdsutil.exe),CommandLine,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,1,LP_0003_windows_sysmon_process_creation
|
||||
TA0006: Credential Access,attack.t1003,Invocation of Active Directory Diagnostic Tool (ntdsutil.exe),LogonGuid,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,1,LP_0003_windows_sysmon_process_creation
|
||||
@ -1505,6 +1824,7 @@ TA0006: Credential Access,attack.t1003,Invocation of Active Directory Diagnostic
|
||||
TA0006: Credential Access,attack.t1003,Invocation of Active Directory Diagnostic Tool (ntdsutil.exe),Username,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,4688,LP_0002_windows_audit_process_creation_with_commandline
|
||||
TA0006: Credential Access,attack.t1003,Invocation of Active Directory Diagnostic Tool (ntdsutil.exe),ProcessGuid,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,4688,LP_0002_windows_audit_process_creation_with_commandline
|
||||
TA0006: Credential Access,attack.t1003,Invocation of Active Directory Diagnostic Tool (ntdsutil.exe),ProcessId,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,4688,LP_0002_windows_audit_process_creation_with_commandline
|
||||
TA0006: Credential Access,attack.t1003,Invocation of Active Directory Diagnostic Tool (ntdsutil.exe),ThreadID,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,4688,LP_0002_windows_audit_process_creation_with_commandline
|
||||
TA0006: Credential Access,attack.t1003,Invocation of Active Directory Diagnostic Tool (ntdsutil.exe),ProcessName,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,4688,LP_0002_windows_audit_process_creation_with_commandline
|
||||
TA0006: Credential Access,attack.t1003,Invocation of Active Directory Diagnostic Tool (ntdsutil.exe),CommandLine,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,4688,LP_0002_windows_audit_process_creation_with_commandline
|
||||
TA0006: Credential Access,attack.t1003,Invocation of Active Directory Diagnostic Tool (ntdsutil.exe),LogonGuid,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,4688,LP_0002_windows_audit_process_creation_with_commandline
|
||||
@ -1531,6 +1851,8 @@ TA0006: Credential Access,attack.t1003,Invocation of Active Directory Diagnostic
|
||||
TA0006: Credential Access,attack.t1003,Invocation of Active Directory Diagnostic Tool (ntdsutil.exe),ProcessGuid,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,4696,LP_0001_windows_audit_process_creation
|
||||
TA0006: Credential Access,attack.t1003,Invocation of Active Directory Diagnostic Tool (ntdsutil.exe),ProcessId,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,4688,LP_0001_windows_audit_process_creation
|
||||
TA0006: Credential Access,attack.t1003,Invocation of Active Directory Diagnostic Tool (ntdsutil.exe),ProcessId,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,4696,LP_0001_windows_audit_process_creation
|
||||
TA0006: Credential Access,attack.t1003,Invocation of Active Directory Diagnostic Tool (ntdsutil.exe),ThreadID,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,4688,LP_0001_windows_audit_process_creation
|
||||
TA0006: Credential Access,attack.t1003,Invocation of Active Directory Diagnostic Tool (ntdsutil.exe),ThreadID,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,4696,LP_0001_windows_audit_process_creation
|
||||
TA0006: Credential Access,attack.t1003,Invocation of Active Directory Diagnostic Tool (ntdsutil.exe),ProcessName,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,4688,LP_0001_windows_audit_process_creation
|
||||
TA0006: Credential Access,attack.t1003,Invocation of Active Directory Diagnostic Tool (ntdsutil.exe),ProcessName,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,4696,LP_0001_windows_audit_process_creation
|
||||
TA0006: Credential Access,attack.t1003,Invocation of Active Directory Diagnostic Tool (ntdsutil.exe),CommandLine,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,4688,LP_0001_windows_audit_process_creation
|
||||
@ -1568,6 +1890,8 @@ TA0006: Credential Access,attack.t1003,Invocation of Active Directory Diagnostic
|
||||
TA0006: Credential Access,attack.t1003,Invocation of Active Directory Diagnostic Tool (ntdsutil.exe),Username,Windows,Windows Log,Security,1,LP_0003_windows_sysmon_process_creation
|
||||
TA0006: Credential Access,attack.t1003,Invocation of Active Directory Diagnostic Tool (ntdsutil.exe),UserSid,Windows,Windows Log,Security,1,LP_0003_windows_sysmon_process_creation
|
||||
TA0006: Credential Access,attack.t1003,Invocation of Active Directory Diagnostic Tool (ntdsutil.exe),ProcessPid,Windows,Windows Log,Security,1,LP_0003_windows_sysmon_process_creation
|
||||
TA0006: Credential Access,attack.t1003,Invocation of Active Directory Diagnostic Tool (ntdsutil.exe),ProcessId,Windows,Windows Log,Security,1,LP_0003_windows_sysmon_process_creation
|
||||
TA0006: Credential Access,attack.t1003,Invocation of Active Directory Diagnostic Tool (ntdsutil.exe),ThreadID,Windows,Windows Log,Security,1,LP_0003_windows_sysmon_process_creation
|
||||
TA0006: Credential Access,attack.t1003,Invocation of Active Directory Diagnostic Tool (ntdsutil.exe),ProcessName,Windows,Windows Log,Security,1,LP_0003_windows_sysmon_process_creation
|
||||
TA0006: Credential Access,attack.t1003,Invocation of Active Directory Diagnostic Tool (ntdsutil.exe),NewProcessName,Windows,Windows Log,Security,1,LP_0003_windows_sysmon_process_creation
|
||||
TA0006: Credential Access,attack.t1003,Invocation of Active Directory Diagnostic Tool (ntdsutil.exe),Image,Windows,Windows Log,Security,1,LP_0003_windows_sysmon_process_creation
|
||||
@ -1585,6 +1909,8 @@ TA0006: Credential Access,attack.t1003,Invocation of Active Directory Diagnostic
|
||||
TA0006: Credential Access,attack.t1003,Invocation of Active Directory Diagnostic Tool (ntdsutil.exe),Username,Windows,Windows Log,Security,4688,LP_0002_windows_audit_process_creation_with_commandline
|
||||
TA0006: Credential Access,attack.t1003,Invocation of Active Directory Diagnostic Tool (ntdsutil.exe),UserSid,Windows,Windows Log,Security,4688,LP_0002_windows_audit_process_creation_with_commandline
|
||||
TA0006: Credential Access,attack.t1003,Invocation of Active Directory Diagnostic Tool (ntdsutil.exe),ProcessPid,Windows,Windows Log,Security,4688,LP_0002_windows_audit_process_creation_with_commandline
|
||||
TA0006: Credential Access,attack.t1003,Invocation of Active Directory Diagnostic Tool (ntdsutil.exe),ProcessId,Windows,Windows Log,Security,4688,LP_0002_windows_audit_process_creation_with_commandline
|
||||
TA0006: Credential Access,attack.t1003,Invocation of Active Directory Diagnostic Tool (ntdsutil.exe),ThreadID,Windows,Windows Log,Security,4688,LP_0002_windows_audit_process_creation_with_commandline
|
||||
TA0006: Credential Access,attack.t1003,Invocation of Active Directory Diagnostic Tool (ntdsutil.exe),ProcessName,Windows,Windows Log,Security,4688,LP_0002_windows_audit_process_creation_with_commandline
|
||||
TA0006: Credential Access,attack.t1003,Invocation of Active Directory Diagnostic Tool (ntdsutil.exe),NewProcessName,Windows,Windows Log,Security,4688,LP_0002_windows_audit_process_creation_with_commandline
|
||||
TA0006: Credential Access,attack.t1003,Invocation of Active Directory Diagnostic Tool (ntdsutil.exe),Image,Windows,Windows Log,Security,4688,LP_0002_windows_audit_process_creation_with_commandline
|
||||
@ -1607,6 +1933,10 @@ TA0006: Credential Access,attack.t1003,Invocation of Active Directory Diagnostic
|
||||
TA0006: Credential Access,attack.t1003,Invocation of Active Directory Diagnostic Tool (ntdsutil.exe),UserSid,Windows,Windows Log,Security,4696,LP_0001_windows_audit_process_creation
|
||||
TA0006: Credential Access,attack.t1003,Invocation of Active Directory Diagnostic Tool (ntdsutil.exe),ProcessPid,Windows,Windows Log,Security,4688,LP_0001_windows_audit_process_creation
|
||||
TA0006: Credential Access,attack.t1003,Invocation of Active Directory Diagnostic Tool (ntdsutil.exe),ProcessPid,Windows,Windows Log,Security,4696,LP_0001_windows_audit_process_creation
|
||||
TA0006: Credential Access,attack.t1003,Invocation of Active Directory Diagnostic Tool (ntdsutil.exe),ProcessId,Windows,Windows Log,Security,4688,LP_0001_windows_audit_process_creation
|
||||
TA0006: Credential Access,attack.t1003,Invocation of Active Directory Diagnostic Tool (ntdsutil.exe),ProcessId,Windows,Windows Log,Security,4696,LP_0001_windows_audit_process_creation
|
||||
TA0006: Credential Access,attack.t1003,Invocation of Active Directory Diagnostic Tool (ntdsutil.exe),ThreadID,Windows,Windows Log,Security,4688,LP_0001_windows_audit_process_creation
|
||||
TA0006: Credential Access,attack.t1003,Invocation of Active Directory Diagnostic Tool (ntdsutil.exe),ThreadID,Windows,Windows Log,Security,4696,LP_0001_windows_audit_process_creation
|
||||
TA0006: Credential Access,attack.t1003,Invocation of Active Directory Diagnostic Tool (ntdsutil.exe),ProcessName,Windows,Windows Log,Security,4688,LP_0001_windows_audit_process_creation
|
||||
TA0006: Credential Access,attack.t1003,Invocation of Active Directory Diagnostic Tool (ntdsutil.exe),ProcessName,Windows,Windows Log,Security,4696,LP_0001_windows_audit_process_creation
|
||||
TA0006: Credential Access,attack.t1003,Invocation of Active Directory Diagnostic Tool (ntdsutil.exe),NewProcessName,Windows,Windows Log,Security,4688,LP_0001_windows_audit_process_creation
|
||||
@ -1636,6 +1966,7 @@ TA0005: Defense Evasion,attack.t1140,Suspicious Commandline Escape,Hostname,Wind
|
||||
TA0005: Defense Evasion,attack.t1140,Suspicious Commandline Escape,Username,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,1,LP_0003_windows_sysmon_process_creation
|
||||
TA0005: Defense Evasion,attack.t1140,Suspicious Commandline Escape,ProcessGuid,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,1,LP_0003_windows_sysmon_process_creation
|
||||
TA0005: Defense Evasion,attack.t1140,Suspicious Commandline Escape,ProcessId,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,1,LP_0003_windows_sysmon_process_creation
|
||||
TA0005: Defense Evasion,attack.t1140,Suspicious Commandline Escape,ThreadID,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,1,LP_0003_windows_sysmon_process_creation
|
||||
TA0005: Defense Evasion,attack.t1140,Suspicious Commandline Escape,ProcessName,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,1,LP_0003_windows_sysmon_process_creation
|
||||
TA0005: Defense Evasion,attack.t1140,Suspicious Commandline Escape,CommandLine,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,1,LP_0003_windows_sysmon_process_creation
|
||||
TA0005: Defense Evasion,attack.t1140,Suspicious Commandline Escape,LogonGuid,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,1,LP_0003_windows_sysmon_process_creation
|
||||
@ -1657,6 +1988,7 @@ TA0005: Defense Evasion,attack.t1140,Suspicious Commandline Escape,Hostname,Wind
|
||||
TA0005: Defense Evasion,attack.t1140,Suspicious Commandline Escape,Username,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,4688,LP_0002_windows_audit_process_creation_with_commandline
|
||||
TA0005: Defense Evasion,attack.t1140,Suspicious Commandline Escape,ProcessGuid,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,4688,LP_0002_windows_audit_process_creation_with_commandline
|
||||
TA0005: Defense Evasion,attack.t1140,Suspicious Commandline Escape,ProcessId,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,4688,LP_0002_windows_audit_process_creation_with_commandline
|
||||
TA0005: Defense Evasion,attack.t1140,Suspicious Commandline Escape,ThreadID,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,4688,LP_0002_windows_audit_process_creation_with_commandline
|
||||
TA0005: Defense Evasion,attack.t1140,Suspicious Commandline Escape,ProcessName,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,4688,LP_0002_windows_audit_process_creation_with_commandline
|
||||
TA0005: Defense Evasion,attack.t1140,Suspicious Commandline Escape,CommandLine,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,4688,LP_0002_windows_audit_process_creation_with_commandline
|
||||
TA0005: Defense Evasion,attack.t1140,Suspicious Commandline Escape,LogonGuid,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,4688,LP_0002_windows_audit_process_creation_with_commandline
|
||||
@ -1683,6 +2015,8 @@ TA0005: Defense Evasion,attack.t1140,Suspicious Commandline Escape,ProcessGuid,W
|
||||
TA0005: Defense Evasion,attack.t1140,Suspicious Commandline Escape,ProcessGuid,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,4696,LP_0001_windows_audit_process_creation
|
||||
TA0005: Defense Evasion,attack.t1140,Suspicious Commandline Escape,ProcessId,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,4688,LP_0001_windows_audit_process_creation
|
||||
TA0005: Defense Evasion,attack.t1140,Suspicious Commandline Escape,ProcessId,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,4696,LP_0001_windows_audit_process_creation
|
||||
TA0005: Defense Evasion,attack.t1140,Suspicious Commandline Escape,ThreadID,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,4688,LP_0001_windows_audit_process_creation
|
||||
TA0005: Defense Evasion,attack.t1140,Suspicious Commandline Escape,ThreadID,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,4696,LP_0001_windows_audit_process_creation
|
||||
TA0005: Defense Evasion,attack.t1140,Suspicious Commandline Escape,ProcessName,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,4688,LP_0001_windows_audit_process_creation
|
||||
TA0005: Defense Evasion,attack.t1140,Suspicious Commandline Escape,ProcessName,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,4696,LP_0001_windows_audit_process_creation
|
||||
TA0005: Defense Evasion,attack.t1140,Suspicious Commandline Escape,CommandLine,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,4688,LP_0001_windows_audit_process_creation
|
||||
@ -1720,6 +2054,8 @@ TA0005: Defense Evasion,attack.t1140,Suspicious Commandline Escape,Hostname,Wind
|
||||
TA0005: Defense Evasion,attack.t1140,Suspicious Commandline Escape,Username,Windows,Windows Log,Security,1,LP_0003_windows_sysmon_process_creation
|
||||
TA0005: Defense Evasion,attack.t1140,Suspicious Commandline Escape,UserSid,Windows,Windows Log,Security,1,LP_0003_windows_sysmon_process_creation
|
||||
TA0005: Defense Evasion,attack.t1140,Suspicious Commandline Escape,ProcessPid,Windows,Windows Log,Security,1,LP_0003_windows_sysmon_process_creation
|
||||
TA0005: Defense Evasion,attack.t1140,Suspicious Commandline Escape,ProcessId,Windows,Windows Log,Security,1,LP_0003_windows_sysmon_process_creation
|
||||
TA0005: Defense Evasion,attack.t1140,Suspicious Commandline Escape,ThreadID,Windows,Windows Log,Security,1,LP_0003_windows_sysmon_process_creation
|
||||
TA0005: Defense Evasion,attack.t1140,Suspicious Commandline Escape,ProcessName,Windows,Windows Log,Security,1,LP_0003_windows_sysmon_process_creation
|
||||
TA0005: Defense Evasion,attack.t1140,Suspicious Commandline Escape,NewProcessName,Windows,Windows Log,Security,1,LP_0003_windows_sysmon_process_creation
|
||||
TA0005: Defense Evasion,attack.t1140,Suspicious Commandline Escape,Image,Windows,Windows Log,Security,1,LP_0003_windows_sysmon_process_creation
|
||||
@ -1737,6 +2073,8 @@ TA0005: Defense Evasion,attack.t1140,Suspicious Commandline Escape,Hostname,Wind
|
||||
TA0005: Defense Evasion,attack.t1140,Suspicious Commandline Escape,Username,Windows,Windows Log,Security,4688,LP_0002_windows_audit_process_creation_with_commandline
|
||||
TA0005: Defense Evasion,attack.t1140,Suspicious Commandline Escape,UserSid,Windows,Windows Log,Security,4688,LP_0002_windows_audit_process_creation_with_commandline
|
||||
TA0005: Defense Evasion,attack.t1140,Suspicious Commandline Escape,ProcessPid,Windows,Windows Log,Security,4688,LP_0002_windows_audit_process_creation_with_commandline
|
||||
TA0005: Defense Evasion,attack.t1140,Suspicious Commandline Escape,ProcessId,Windows,Windows Log,Security,4688,LP_0002_windows_audit_process_creation_with_commandline
|
||||
TA0005: Defense Evasion,attack.t1140,Suspicious Commandline Escape,ThreadID,Windows,Windows Log,Security,4688,LP_0002_windows_audit_process_creation_with_commandline
|
||||
TA0005: Defense Evasion,attack.t1140,Suspicious Commandline Escape,ProcessName,Windows,Windows Log,Security,4688,LP_0002_windows_audit_process_creation_with_commandline
|
||||
TA0005: Defense Evasion,attack.t1140,Suspicious Commandline Escape,NewProcessName,Windows,Windows Log,Security,4688,LP_0002_windows_audit_process_creation_with_commandline
|
||||
TA0005: Defense Evasion,attack.t1140,Suspicious Commandline Escape,Image,Windows,Windows Log,Security,4688,LP_0002_windows_audit_process_creation_with_commandline
|
||||
@ -1759,6 +2097,10 @@ TA0005: Defense Evasion,attack.t1140,Suspicious Commandline Escape,UserSid,Windo
|
||||
TA0005: Defense Evasion,attack.t1140,Suspicious Commandline Escape,UserSid,Windows,Windows Log,Security,4696,LP_0001_windows_audit_process_creation
|
||||
TA0005: Defense Evasion,attack.t1140,Suspicious Commandline Escape,ProcessPid,Windows,Windows Log,Security,4688,LP_0001_windows_audit_process_creation
|
||||
TA0005: Defense Evasion,attack.t1140,Suspicious Commandline Escape,ProcessPid,Windows,Windows Log,Security,4696,LP_0001_windows_audit_process_creation
|
||||
TA0005: Defense Evasion,attack.t1140,Suspicious Commandline Escape,ProcessId,Windows,Windows Log,Security,4688,LP_0001_windows_audit_process_creation
|
||||
TA0005: Defense Evasion,attack.t1140,Suspicious Commandline Escape,ProcessId,Windows,Windows Log,Security,4696,LP_0001_windows_audit_process_creation
|
||||
TA0005: Defense Evasion,attack.t1140,Suspicious Commandline Escape,ThreadID,Windows,Windows Log,Security,4688,LP_0001_windows_audit_process_creation
|
||||
TA0005: Defense Evasion,attack.t1140,Suspicious Commandline Escape,ThreadID,Windows,Windows Log,Security,4696,LP_0001_windows_audit_process_creation
|
||||
TA0005: Defense Evasion,attack.t1140,Suspicious Commandline Escape,ProcessName,Windows,Windows Log,Security,4688,LP_0001_windows_audit_process_creation
|
||||
TA0005: Defense Evasion,attack.t1140,Suspicious Commandline Escape,ProcessName,Windows,Windows Log,Security,4696,LP_0001_windows_audit_process_creation
|
||||
TA0005: Defense Evasion,attack.t1140,Suspicious Commandline Escape,NewProcessName,Windows,Windows Log,Security,4688,LP_0001_windows_audit_process_creation
|
||||
@ -1788,6 +2130,7 @@ TA0005: Defense Evasion,attack.t1085,Suspicious Rundll32 Activity,Hostname,Windo
|
||||
TA0005: Defense Evasion,attack.t1085,Suspicious Rundll32 Activity,Username,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,1,LP_0003_windows_sysmon_process_creation
|
||||
TA0005: Defense Evasion,attack.t1085,Suspicious Rundll32 Activity,ProcessGuid,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,1,LP_0003_windows_sysmon_process_creation
|
||||
TA0005: Defense Evasion,attack.t1085,Suspicious Rundll32 Activity,ProcessId,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,1,LP_0003_windows_sysmon_process_creation
|
||||
TA0005: Defense Evasion,attack.t1085,Suspicious Rundll32 Activity,ThreadID,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,1,LP_0003_windows_sysmon_process_creation
|
||||
TA0005: Defense Evasion,attack.t1085,Suspicious Rundll32 Activity,ProcessName,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,1,LP_0003_windows_sysmon_process_creation
|
||||
TA0005: Defense Evasion,attack.t1085,Suspicious Rundll32 Activity,CommandLine,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,1,LP_0003_windows_sysmon_process_creation
|
||||
TA0005: Defense Evasion,attack.t1085,Suspicious Rundll32 Activity,LogonGuid,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,1,LP_0003_windows_sysmon_process_creation
|
||||
@ -1809,6 +2152,7 @@ TA0005: Defense Evasion,attack.t1085,Suspicious Rundll32 Activity,Hostname,Windo
|
||||
TA0005: Defense Evasion,attack.t1085,Suspicious Rundll32 Activity,Username,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,4688,LP_0002_windows_audit_process_creation_with_commandline
|
||||
TA0005: Defense Evasion,attack.t1085,Suspicious Rundll32 Activity,ProcessGuid,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,4688,LP_0002_windows_audit_process_creation_with_commandline
|
||||
TA0005: Defense Evasion,attack.t1085,Suspicious Rundll32 Activity,ProcessId,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,4688,LP_0002_windows_audit_process_creation_with_commandline
|
||||
TA0005: Defense Evasion,attack.t1085,Suspicious Rundll32 Activity,ThreadID,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,4688,LP_0002_windows_audit_process_creation_with_commandline
|
||||
TA0005: Defense Evasion,attack.t1085,Suspicious Rundll32 Activity,ProcessName,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,4688,LP_0002_windows_audit_process_creation_with_commandline
|
||||
TA0005: Defense Evasion,attack.t1085,Suspicious Rundll32 Activity,CommandLine,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,4688,LP_0002_windows_audit_process_creation_with_commandline
|
||||
TA0005: Defense Evasion,attack.t1085,Suspicious Rundll32 Activity,LogonGuid,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,4688,LP_0002_windows_audit_process_creation_with_commandline
|
||||
@ -1835,6 +2179,8 @@ TA0005: Defense Evasion,attack.t1085,Suspicious Rundll32 Activity,ProcessGuid,Wi
|
||||
TA0005: Defense Evasion,attack.t1085,Suspicious Rundll32 Activity,ProcessGuid,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,4696,LP_0001_windows_audit_process_creation
|
||||
TA0005: Defense Evasion,attack.t1085,Suspicious Rundll32 Activity,ProcessId,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,4688,LP_0001_windows_audit_process_creation
|
||||
TA0005: Defense Evasion,attack.t1085,Suspicious Rundll32 Activity,ProcessId,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,4696,LP_0001_windows_audit_process_creation
|
||||
TA0005: Defense Evasion,attack.t1085,Suspicious Rundll32 Activity,ThreadID,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,4688,LP_0001_windows_audit_process_creation
|
||||
TA0005: Defense Evasion,attack.t1085,Suspicious Rundll32 Activity,ThreadID,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,4696,LP_0001_windows_audit_process_creation
|
||||
TA0005: Defense Evasion,attack.t1085,Suspicious Rundll32 Activity,ProcessName,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,4688,LP_0001_windows_audit_process_creation
|
||||
TA0005: Defense Evasion,attack.t1085,Suspicious Rundll32 Activity,ProcessName,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,4696,LP_0001_windows_audit_process_creation
|
||||
TA0005: Defense Evasion,attack.t1085,Suspicious Rundll32 Activity,CommandLine,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,4688,LP_0001_windows_audit_process_creation
|
||||
@ -1872,6 +2218,8 @@ TA0005: Defense Evasion,attack.t1085,Suspicious Rundll32 Activity,Hostname,Windo
|
||||
TA0005: Defense Evasion,attack.t1085,Suspicious Rundll32 Activity,Username,Windows,Windows Log,Security,1,LP_0003_windows_sysmon_process_creation
|
||||
TA0005: Defense Evasion,attack.t1085,Suspicious Rundll32 Activity,UserSid,Windows,Windows Log,Security,1,LP_0003_windows_sysmon_process_creation
|
||||
TA0005: Defense Evasion,attack.t1085,Suspicious Rundll32 Activity,ProcessPid,Windows,Windows Log,Security,1,LP_0003_windows_sysmon_process_creation
|
||||
TA0005: Defense Evasion,attack.t1085,Suspicious Rundll32 Activity,ProcessId,Windows,Windows Log,Security,1,LP_0003_windows_sysmon_process_creation
|
||||
TA0005: Defense Evasion,attack.t1085,Suspicious Rundll32 Activity,ThreadID,Windows,Windows Log,Security,1,LP_0003_windows_sysmon_process_creation
|
||||
TA0005: Defense Evasion,attack.t1085,Suspicious Rundll32 Activity,ProcessName,Windows,Windows Log,Security,1,LP_0003_windows_sysmon_process_creation
|
||||
TA0005: Defense Evasion,attack.t1085,Suspicious Rundll32 Activity,NewProcessName,Windows,Windows Log,Security,1,LP_0003_windows_sysmon_process_creation
|
||||
TA0005: Defense Evasion,attack.t1085,Suspicious Rundll32 Activity,Image,Windows,Windows Log,Security,1,LP_0003_windows_sysmon_process_creation
|
||||
@ -1889,6 +2237,8 @@ TA0005: Defense Evasion,attack.t1085,Suspicious Rundll32 Activity,Hostname,Windo
|
||||
TA0005: Defense Evasion,attack.t1085,Suspicious Rundll32 Activity,Username,Windows,Windows Log,Security,4688,LP_0002_windows_audit_process_creation_with_commandline
|
||||
TA0005: Defense Evasion,attack.t1085,Suspicious Rundll32 Activity,UserSid,Windows,Windows Log,Security,4688,LP_0002_windows_audit_process_creation_with_commandline
|
||||
TA0005: Defense Evasion,attack.t1085,Suspicious Rundll32 Activity,ProcessPid,Windows,Windows Log,Security,4688,LP_0002_windows_audit_process_creation_with_commandline
|
||||
TA0005: Defense Evasion,attack.t1085,Suspicious Rundll32 Activity,ProcessId,Windows,Windows Log,Security,4688,LP_0002_windows_audit_process_creation_with_commandline
|
||||
TA0005: Defense Evasion,attack.t1085,Suspicious Rundll32 Activity,ThreadID,Windows,Windows Log,Security,4688,LP_0002_windows_audit_process_creation_with_commandline
|
||||
TA0005: Defense Evasion,attack.t1085,Suspicious Rundll32 Activity,ProcessName,Windows,Windows Log,Security,4688,LP_0002_windows_audit_process_creation_with_commandline
|
||||
TA0005: Defense Evasion,attack.t1085,Suspicious Rundll32 Activity,NewProcessName,Windows,Windows Log,Security,4688,LP_0002_windows_audit_process_creation_with_commandline
|
||||
TA0005: Defense Evasion,attack.t1085,Suspicious Rundll32 Activity,Image,Windows,Windows Log,Security,4688,LP_0002_windows_audit_process_creation_with_commandline
|
||||
@ -1911,6 +2261,10 @@ TA0005: Defense Evasion,attack.t1085,Suspicious Rundll32 Activity,UserSid,Window
|
||||
TA0005: Defense Evasion,attack.t1085,Suspicious Rundll32 Activity,UserSid,Windows,Windows Log,Security,4696,LP_0001_windows_audit_process_creation
|
||||
TA0005: Defense Evasion,attack.t1085,Suspicious Rundll32 Activity,ProcessPid,Windows,Windows Log,Security,4688,LP_0001_windows_audit_process_creation
|
||||
TA0005: Defense Evasion,attack.t1085,Suspicious Rundll32 Activity,ProcessPid,Windows,Windows Log,Security,4696,LP_0001_windows_audit_process_creation
|
||||
TA0005: Defense Evasion,attack.t1085,Suspicious Rundll32 Activity,ProcessId,Windows,Windows Log,Security,4688,LP_0001_windows_audit_process_creation
|
||||
TA0005: Defense Evasion,attack.t1085,Suspicious Rundll32 Activity,ProcessId,Windows,Windows Log,Security,4696,LP_0001_windows_audit_process_creation
|
||||
TA0005: Defense Evasion,attack.t1085,Suspicious Rundll32 Activity,ThreadID,Windows,Windows Log,Security,4688,LP_0001_windows_audit_process_creation
|
||||
TA0005: Defense Evasion,attack.t1085,Suspicious Rundll32 Activity,ThreadID,Windows,Windows Log,Security,4696,LP_0001_windows_audit_process_creation
|
||||
TA0005: Defense Evasion,attack.t1085,Suspicious Rundll32 Activity,ProcessName,Windows,Windows Log,Security,4688,LP_0001_windows_audit_process_creation
|
||||
TA0005: Defense Evasion,attack.t1085,Suspicious Rundll32 Activity,ProcessName,Windows,Windows Log,Security,4696,LP_0001_windows_audit_process_creation
|
||||
TA0005: Defense Evasion,attack.t1085,Suspicious Rundll32 Activity,NewProcessName,Windows,Windows Log,Security,4688,LP_0001_windows_audit_process_creation
|
||||
@ -1940,6 +2294,7 @@ TA0002: Execution,attack.t1085,Suspicious Rundll32 Activity,Hostname,Windows,Win
|
||||
TA0002: Execution,attack.t1085,Suspicious Rundll32 Activity,Username,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,1,LP_0003_windows_sysmon_process_creation
|
||||
TA0002: Execution,attack.t1085,Suspicious Rundll32 Activity,ProcessGuid,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,1,LP_0003_windows_sysmon_process_creation
|
||||
TA0002: Execution,attack.t1085,Suspicious Rundll32 Activity,ProcessId,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,1,LP_0003_windows_sysmon_process_creation
|
||||
TA0002: Execution,attack.t1085,Suspicious Rundll32 Activity,ThreadID,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,1,LP_0003_windows_sysmon_process_creation
|
||||
TA0002: Execution,attack.t1085,Suspicious Rundll32 Activity,ProcessName,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,1,LP_0003_windows_sysmon_process_creation
|
||||
TA0002: Execution,attack.t1085,Suspicious Rundll32 Activity,CommandLine,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,1,LP_0003_windows_sysmon_process_creation
|
||||
TA0002: Execution,attack.t1085,Suspicious Rundll32 Activity,LogonGuid,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,1,LP_0003_windows_sysmon_process_creation
|
||||
@ -1961,6 +2316,7 @@ TA0002: Execution,attack.t1085,Suspicious Rundll32 Activity,Hostname,Windows,Win
|
||||
TA0002: Execution,attack.t1085,Suspicious Rundll32 Activity,Username,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,4688,LP_0002_windows_audit_process_creation_with_commandline
|
||||
TA0002: Execution,attack.t1085,Suspicious Rundll32 Activity,ProcessGuid,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,4688,LP_0002_windows_audit_process_creation_with_commandline
|
||||
TA0002: Execution,attack.t1085,Suspicious Rundll32 Activity,ProcessId,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,4688,LP_0002_windows_audit_process_creation_with_commandline
|
||||
TA0002: Execution,attack.t1085,Suspicious Rundll32 Activity,ThreadID,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,4688,LP_0002_windows_audit_process_creation_with_commandline
|
||||
TA0002: Execution,attack.t1085,Suspicious Rundll32 Activity,ProcessName,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,4688,LP_0002_windows_audit_process_creation_with_commandline
|
||||
TA0002: Execution,attack.t1085,Suspicious Rundll32 Activity,CommandLine,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,4688,LP_0002_windows_audit_process_creation_with_commandline
|
||||
TA0002: Execution,attack.t1085,Suspicious Rundll32 Activity,LogonGuid,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,4688,LP_0002_windows_audit_process_creation_with_commandline
|
||||
@ -1987,6 +2343,8 @@ TA0002: Execution,attack.t1085,Suspicious Rundll32 Activity,ProcessGuid,Windows,
|
||||
TA0002: Execution,attack.t1085,Suspicious Rundll32 Activity,ProcessGuid,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,4696,LP_0001_windows_audit_process_creation
|
||||
TA0002: Execution,attack.t1085,Suspicious Rundll32 Activity,ProcessId,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,4688,LP_0001_windows_audit_process_creation
|
||||
TA0002: Execution,attack.t1085,Suspicious Rundll32 Activity,ProcessId,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,4696,LP_0001_windows_audit_process_creation
|
||||
TA0002: Execution,attack.t1085,Suspicious Rundll32 Activity,ThreadID,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,4688,LP_0001_windows_audit_process_creation
|
||||
TA0002: Execution,attack.t1085,Suspicious Rundll32 Activity,ThreadID,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,4696,LP_0001_windows_audit_process_creation
|
||||
TA0002: Execution,attack.t1085,Suspicious Rundll32 Activity,ProcessName,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,4688,LP_0001_windows_audit_process_creation
|
||||
TA0002: Execution,attack.t1085,Suspicious Rundll32 Activity,ProcessName,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,4696,LP_0001_windows_audit_process_creation
|
||||
TA0002: Execution,attack.t1085,Suspicious Rundll32 Activity,CommandLine,Windows,Windows Log,Microsoft-Windows-Sysmon/Operational,4688,LP_0001_windows_audit_process_creation
|
||||
@ -2024,6 +2382,8 @@ TA0002: Execution,attack.t1085,Suspicious Rundll32 Activity,Hostname,Windows,Win
|
||||
TA0002: Execution,attack.t1085,Suspicious Rundll32 Activity,Username,Windows,Windows Log,Security,1,LP_0003_windows_sysmon_process_creation
|
||||
TA0002: Execution,attack.t1085,Suspicious Rundll32 Activity,UserSid,Windows,Windows Log,Security,1,LP_0003_windows_sysmon_process_creation
|
||||
TA0002: Execution,attack.t1085,Suspicious Rundll32 Activity,ProcessPid,Windows,Windows Log,Security,1,LP_0003_windows_sysmon_process_creation
|
||||
TA0002: Execution,attack.t1085,Suspicious Rundll32 Activity,ProcessId,Windows,Windows Log,Security,1,LP_0003_windows_sysmon_process_creation
|
||||
TA0002: Execution,attack.t1085,Suspicious Rundll32 Activity,ThreadID,Windows,Windows Log,Security,1,LP_0003_windows_sysmon_process_creation
|
||||
TA0002: Execution,attack.t1085,Suspicious Rundll32 Activity,ProcessName,Windows,Windows Log,Security,1,LP_0003_windows_sysmon_process_creation
|
||||
TA0002: Execution,attack.t1085,Suspicious Rundll32 Activity,NewProcessName,Windows,Windows Log,Security,1,LP_0003_windows_sysmon_process_creation
|
||||
TA0002: Execution,attack.t1085,Suspicious Rundll32 Activity,Image,Windows,Windows Log,Security,1,LP_0003_windows_sysmon_process_creation
|
||||
@ -2041,6 +2401,8 @@ TA0002: Execution,attack.t1085,Suspicious Rundll32 Activity,Hostname,Windows,Win
|
||||
TA0002: Execution,attack.t1085,Suspicious Rundll32 Activity,Username,Windows,Windows Log,Security,4688,LP_0002_windows_audit_process_creation_with_commandline
|
||||
TA0002: Execution,attack.t1085,Suspicious Rundll32 Activity,UserSid,Windows,Windows Log,Security,4688,LP_0002_windows_audit_process_creation_with_commandline
|
||||
TA0002: Execution,attack.t1085,Suspicious Rundll32 Activity,ProcessPid,Windows,Windows Log,Security,4688,LP_0002_windows_audit_process_creation_with_commandline
|
||||
TA0002: Execution,attack.t1085,Suspicious Rundll32 Activity,ProcessId,Windows,Windows Log,Security,4688,LP_0002_windows_audit_process_creation_with_commandline
|
||||
TA0002: Execution,attack.t1085,Suspicious Rundll32 Activity,ThreadID,Windows,Windows Log,Security,4688,LP_0002_windows_audit_process_creation_with_commandline
|
||||
TA0002: Execution,attack.t1085,Suspicious Rundll32 Activity,ProcessName,Windows,Windows Log,Security,4688,LP_0002_windows_audit_process_creation_with_commandline
|
||||
TA0002: Execution,attack.t1085,Suspicious Rundll32 Activity,NewProcessName,Windows,Windows Log,Security,4688,LP_0002_windows_audit_process_creation_with_commandline
|
||||
TA0002: Execution,attack.t1085,Suspicious Rundll32 Activity,Image,Windows,Windows Log,Security,4688,LP_0002_windows_audit_process_creation_with_commandline
|
||||
@ -2063,6 +2425,10 @@ TA0002: Execution,attack.t1085,Suspicious Rundll32 Activity,UserSid,Windows,Wind
|
||||
TA0002: Execution,attack.t1085,Suspicious Rundll32 Activity,UserSid,Windows,Windows Log,Security,4696,LP_0001_windows_audit_process_creation
|
||||
TA0002: Execution,attack.t1085,Suspicious Rundll32 Activity,ProcessPid,Windows,Windows Log,Security,4688,LP_0001_windows_audit_process_creation
|
||||
TA0002: Execution,attack.t1085,Suspicious Rundll32 Activity,ProcessPid,Windows,Windows Log,Security,4696,LP_0001_windows_audit_process_creation
|
||||
TA0002: Execution,attack.t1085,Suspicious Rundll32 Activity,ProcessId,Windows,Windows Log,Security,4688,LP_0001_windows_audit_process_creation
|
||||
TA0002: Execution,attack.t1085,Suspicious Rundll32 Activity,ProcessId,Windows,Windows Log,Security,4696,LP_0001_windows_audit_process_creation
|
||||
TA0002: Execution,attack.t1085,Suspicious Rundll32 Activity,ThreadID,Windows,Windows Log,Security,4688,LP_0001_windows_audit_process_creation
|
||||
TA0002: Execution,attack.t1085,Suspicious Rundll32 Activity,ThreadID,Windows,Windows Log,Security,4696,LP_0001_windows_audit_process_creation
|
||||
TA0002: Execution,attack.t1085,Suspicious Rundll32 Activity,ProcessName,Windows,Windows Log,Security,4688,LP_0001_windows_audit_process_creation
|
||||
TA0002: Execution,attack.t1085,Suspicious Rundll32 Activity,ProcessName,Windows,Windows Log,Security,4696,LP_0001_windows_audit_process_creation
|
||||
TA0002: Execution,attack.t1085,Suspicious Rundll32 Activity,NewProcessName,Windows,Windows Log,Security,4688,LP_0001_windows_audit_process_creation
|
||||
|
|
51
dataneeded/DN_0010_6_windows_sysmon_driver_loaded.yml
Normal file
51
dataneeded/DN_0010_6_windows_sysmon_driver_loaded.yml
Normal file
@ -0,0 +1,51 @@
|
||||
title: DN_0010_6_windows_sysmon_driver_loaded
|
||||
description: >
|
||||
The driver loaded events provides information about a driver being loaded on the system. The configured hashes are provided as well as signature information
|
||||
loggingpolicy:
|
||||
- None
|
||||
references:
|
||||
- https://www.ultimatewindowssecurity.com/securitylog/encyclopedia/event.aspx?eventid=90006
|
||||
- https://github.com/Cyb3rWard0g/OSSEM/blob/master/data_dictionaries/windows/sysmon/event-6.md
|
||||
category: OS Logs
|
||||
platform: Windows
|
||||
type: Windows Log
|
||||
channel: Microsoft-Windows-Sysmon/Operational
|
||||
provider: Microsoft-Windows-Sysmon
|
||||
fields:
|
||||
- EventID
|
||||
- Computer
|
||||
- UtcTime
|
||||
- ImageLoaded
|
||||
- Hashes
|
||||
- Signed
|
||||
- Signature
|
||||
- SignatureStatus
|
||||
sample: |
|
||||
- <Event xmlns="http://schemas.microsoft.com/win/2004/08/events/event">
|
||||
- <System>
|
||||
<Provider Name="Microsoft-Windows-Sysmon" Guid="{5770385F-C22A-43E0-BF4C-06F5698FFBD9}" />
|
||||
<EventID>6</EventID>
|
||||
<Version>3</Version>
|
||||
<Level>4</Level>
|
||||
<Task>6</Task>
|
||||
<Opcode>0</Opcode>
|
||||
<Keywords>0x8000000000000000</Keywords>
|
||||
<TimeCreated SystemTime="2018-12-09T21:41:44.778524700Z" />
|
||||
<EventRecordID>4565</EventRecordID>
|
||||
<Correlation />
|
||||
<Execution ProcessID="2996" ThreadID="3992" />
|
||||
<Channel>Microsoft-Windows-Sysmon/Operational</Channel>
|
||||
<Computer>atc-win-10.atc.local</Computer>
|
||||
<Security UserID="S-1-5-18" />
|
||||
</System>
|
||||
- <EventData>
|
||||
<Data Name="RuleName" />
|
||||
<Data Name="UtcTime">2018-12-09 21:41:41.091</Data>
|
||||
<Data Name="ImageLoaded">C:\Windows\System32\drivers\PROCEXP152.SYS</Data>
|
||||
<Data Name="Hashes">MD5=8213C5972C91A56BE78CD02A4DE4E3FC,SHA256=95D07C3B8DF26790AC43BB4259F65D1E90B03EA31D66F1B3961D85E21C5FF590</Data>
|
||||
<Data Name="Signed">true</Data>
|
||||
<Data Name="Signature">Sysinternals</Data>
|
||||
<Data Name="SignatureStatus">Valid</Data>
|
||||
</EventData>
|
||||
</Event>
|
||||
|
56
dataneeded/DN_0011_7_windows_sysmon_image_loaded.yml
Normal file
56
dataneeded/DN_0011_7_windows_sysmon_image_loaded.yml
Normal file
@ -0,0 +1,56 @@
|
||||
title: DN_0011_7_windows_sysmon_image_loaded
|
||||
description: >
|
||||
The image loaded event logs when a module is loaded in a specific process.
|
||||
loggingpolicy:
|
||||
- LP_0006_windows_sysmon_image_loaded
|
||||
references:
|
||||
- https://www.ultimatewindowssecurity.com/securitylog/encyclopedia/event.aspx?eventid=90007
|
||||
- https://github.com/Cyb3rWard0g/OSSEM/blob/master/data_dictionaries/windows/sysmon/event-7.md
|
||||
category: OS Logs
|
||||
platform: Windows
|
||||
type: Windows Log
|
||||
channel: Microsoft-Windows-Sysmon/Operational
|
||||
provider: Microsoft-Windows-Sysmon
|
||||
fields:
|
||||
- EventID
|
||||
- Computer
|
||||
- UtcTime
|
||||
- ProcessGuid
|
||||
- ProcessId
|
||||
- Image
|
||||
- ImageLoaded
|
||||
- Hashes
|
||||
- Signed
|
||||
- Signature
|
||||
- SignatureStatus
|
||||
sample: |
|
||||
- <Event xmlns="http://schemas.microsoft.com/win/2004/08/events/event">
|
||||
- <System>
|
||||
<Provider Name="Microsoft-Windows-Sysmon" Guid="{5770385F-C22A-43E0-BF4C-06F5698FFBD9}" />
|
||||
<EventID>7</EventID>
|
||||
<Version>3</Version>
|
||||
<Level>4</Level>
|
||||
<Task>7</Task>
|
||||
<Opcode>0</Opcode>
|
||||
<Keywords>0x8000000000000000</Keywords>
|
||||
<TimeCreated SystemTime="2017-04-28T22:45:16.663226600Z" />
|
||||
<EventRecordID>16636</EventRecordID>
|
||||
<Correlation />
|
||||
<Execution ProcessID="3216" ThreadID="3964" />
|
||||
<Channel>Microsoft-Windows-Sysmon/Operational</Channel>
|
||||
<Computer>rfsH.lab.local</Computer>
|
||||
<Security UserID="S-1-5-18" />
|
||||
</System>
|
||||
- <EventData>
|
||||
<Data Name="UtcTime">2017-04-28 22:45:16.662</Data>
|
||||
<Data Name="ProcessGuid">{A23EAE89-C5FA-5903-0000-0010BF439000}</Data>
|
||||
<Data Name="ProcessId">12536</Data>
|
||||
<Data Name="Image">C:\Windows\System32\notepad.exe</Data>
|
||||
<Data Name="ImageLoaded">C:\Windows\System32\ole32.dll</Data>
|
||||
<Data Name="Hashes">SHA1=B2A2BBCFB69B1F0982C4B82055DAD9BAE4384E4B</Data>
|
||||
<Data Name="Signed">true</Data>
|
||||
<Data Name="Signature">Microsoft Windows</Data>
|
||||
<Data Name="SignatureStatus">Valid</Data>
|
||||
</EventData>
|
||||
</Event>
|
||||
|
60
dataneeded/DN_0012_8_windows_sysmon_CreateRemoteThread.yml
Normal file
60
dataneeded/DN_0012_8_windows_sysmon_CreateRemoteThread.yml
Normal file
@ -0,0 +1,60 @@
|
||||
title: DN_0012_8_windows_sysmon_CreateRemoteThread
|
||||
description: >
|
||||
The CreateRemoteThread event detects when a process creates a thread in another process.
|
||||
loggingpolicy:
|
||||
- None
|
||||
references:
|
||||
- https://www.ultimatewindowssecurity.com/securitylog/encyclopedia/event.aspx?eventid=90008
|
||||
- https://github.com/Cyb3rWard0g/OSSEM/blob/master/data_dictionaries/windows/sysmon/event-8.md
|
||||
category: OS Logs
|
||||
platform: Windows
|
||||
type: Windows Log
|
||||
channel: Microsoft-Windows-Sysmon/Operational
|
||||
provider: Microsoft-Windows-Sysmon
|
||||
fields:
|
||||
- EventID
|
||||
- Computer
|
||||
- UtcTime
|
||||
- SourceProcessGuid
|
||||
- SourceProcessId
|
||||
- SourceImage
|
||||
- TargetProcessGuid
|
||||
- TargetProcessId
|
||||
- TargetImage
|
||||
- NewThreadId
|
||||
- StartAddress
|
||||
- StartModule
|
||||
- StartFunction
|
||||
sample: |
|
||||
- <Event xmlns="http://schemas.microsoft.com/win/2004/08/events/event">
|
||||
- <System>
|
||||
<Provider Name="Microsoft-Windows-Sysmon" Guid="{5770385F-C22A-43E0-BF4C-06F5698FFBD9}" />
|
||||
<EventID>8</EventID>
|
||||
<Version>2</Version>
|
||||
<Level>4</Level>
|
||||
<Task>8</Task>
|
||||
<Opcode>0</Opcode>
|
||||
<Keywords>0x8000000000000000</Keywords>
|
||||
<TimeCreated SystemTime="2017-05-13T22:53:43.214864300Z" />
|
||||
<EventRecordID>739823</EventRecordID>
|
||||
<Correlation />
|
||||
<Execution ProcessID="2848" ThreadID="3520" />
|
||||
<Channel>Microsoft-Windows-Sysmon/Operational</Channel>
|
||||
<Computer>rfsH.lab.local</Computer>
|
||||
<Security UserID="S-1-5-18" />
|
||||
</System>
|
||||
- <EventData>
|
||||
<Data Name="UtcTime">2017-05-13 22:53:43.214</Data>
|
||||
<Data Name="SourceProcessGuid">{A23EAE89-8E6D-5917-0000-0010DFAF5004}</Data>
|
||||
<Data Name="SourceProcessId">8804</Data>
|
||||
<Data Name="SourceImage">C:\Program Files (x86)\Microsoft Visual Studio 14.0\Common7\IDE\Remote Debugger\x64\msvsmon.exe</Data>
|
||||
<Data Name="TargetProcessGuid">{A23EAE89-8E5A-5917-0000-00100E3E4D04}</Data>
|
||||
<Data Name="TargetProcessId">2024</Data>
|
||||
<Data Name="TargetImage">C:\repos\Supercharger\Mtg.Supercharger.ControllerService\bin\x64\Debug\Mtg.Supercharger.ControllerService.exe</Data>
|
||||
<Data Name="NewThreadId">20532</Data>
|
||||
<Data Name="StartAddress">0x00007FFB09321970</Data>
|
||||
<Data Name="StartModule">C:\Windows\SYSTEM32\ntdll.dll</Data>
|
||||
<Data Name="StartFunction">DbgUiRemoteBreakin</Data>
|
||||
</EventData>
|
||||
</Event>
|
||||
|
48
dataneeded/DN_0013_9_windows_sysmon_RawAccessRead.yml
Normal file
48
dataneeded/DN_0013_9_windows_sysmon_RawAccessRead.yml
Normal file
@ -0,0 +1,48 @@
|
||||
title: DN_0013_9_windows_sysmon_RawAccessRead
|
||||
description: >
|
||||
The RawAccessRead event detects when a process conducts reading operations from the drive using the \\.\ denotation.
|
||||
loggingpolicy:
|
||||
- None
|
||||
references:
|
||||
- https://www.ultimatewindowssecurity.com/securitylog/encyclopedia/event.aspx?eventid=90009
|
||||
- https://github.com/Cyb3rWard0g/OSSEM/blob/master/data_dictionaries/windows/sysmon/event-9.md
|
||||
category: OS Logs
|
||||
platform: Windows
|
||||
type: Windows Log
|
||||
channel: Microsoft-Windows-Sysmon/Operational
|
||||
provider: Microsoft-Windows-Sysmon
|
||||
fields:
|
||||
- EventID
|
||||
- Computer
|
||||
- UtcTime
|
||||
- ProcessGuid
|
||||
- ProcessId
|
||||
- Image
|
||||
- Device
|
||||
sample: |
|
||||
- <Event xmlns="http://schemas.microsoft.com/win/2004/08/events/event">
|
||||
- <System>
|
||||
<Provider Name="Microsoft-Windows-Sysmon" Guid="{5770385F-C22A-43E0-BF4C-06F5698FFBD9}" />
|
||||
<EventID>9</EventID>
|
||||
<Version>2</Version>
|
||||
<Level>4</Level>
|
||||
<Task>9</Task>
|
||||
<Opcode>0</Opcode>
|
||||
<Keywords>0x8000000000000000</Keywords>
|
||||
<TimeCreated SystemTime="2018-03-22T20:32:22.333778700Z" />
|
||||
<EventRecordID>1944686</EventRecordID>
|
||||
<Correlation />
|
||||
<Execution ProcessID="19572" ThreadID="21888" />
|
||||
<Channel>Microsoft-Windows-Sysmon/Operational</Channel>
|
||||
<Computer>rfsH.lab.local</Computer>
|
||||
<Security UserID="S-1-5-18" />
|
||||
</System>
|
||||
- <EventData>
|
||||
<Data Name="UtcTime">2018-03-22 20:32:22.332</Data>
|
||||
<Data Name="ProcessGuid">{A23EAE89-C65F-5AB2-0000-0010EB030000}</Data>
|
||||
<Data Name="ProcessId">4</Data>
|
||||
<Data Name="Image">System</Data>
|
||||
<Data Name="Device">\Device\HarddiskVolume2</Data>
|
||||
</EventData>
|
||||
</Event>
|
||||
|
59
dataneeded/DN_0014_10_windows_sysmon_ProcessAccess.yml
Normal file
59
dataneeded/DN_0014_10_windows_sysmon_ProcessAccess.yml
Normal file
@ -0,0 +1,59 @@
|
||||
title: DN_0014_10_windows_sysmon_ProcessAccess
|
||||
description: >
|
||||
The process accessed event reports when a process opens another process, an operation that’s often followed by information queries or reading and writing the address space of the target process.
|
||||
loggingpolicy:
|
||||
- LP_0007_windows_sysmon_ProcessAccess
|
||||
references:
|
||||
- https://www.ultimatewindowssecurity.com/securitylog/encyclopedia/event.aspx?eventid=90010
|
||||
- https://github.com/Cyb3rWard0g/OSSEM/blob/master/data_dictionaries/windows/sysmon/event-10.md
|
||||
category: OS Logs
|
||||
platform: Windows
|
||||
type: Windows Log
|
||||
channel: Microsoft-Windows-Sysmon/Operational
|
||||
provider: Microsoft-Windows-Sysmon
|
||||
fields:
|
||||
- EventID
|
||||
- Computer
|
||||
- UtcTime
|
||||
- SourceProcessGUID
|
||||
- SourceProcessId
|
||||
- SourceThreadId
|
||||
- SourceImage
|
||||
- TargetProcessGUID
|
||||
- TargetProcessId
|
||||
- TargetImage
|
||||
- GrantedAccess
|
||||
- CallTrace
|
||||
sample: |
|
||||
- <Event xmlns="http://schemas.microsoft.com/win/2004/08/events/event">
|
||||
- <System>
|
||||
<Provider Name="Microsoft-Windows-Sysmon" Guid="{5770385F-C22A-43E0-BF4C-06F5698FFBD9}" />
|
||||
<EventID>10</EventID>
|
||||
<Version>3</Version>
|
||||
<Level>4</Level>
|
||||
<Task>10</Task>
|
||||
<Opcode>0</Opcode>
|
||||
<Keywords>0x8000000000000000</Keywords>
|
||||
<TimeCreated SystemTime="2019-01-30T14:28:35.216091900Z" />
|
||||
<EventRecordID>42444</EventRecordID>
|
||||
<Correlation />
|
||||
<Execution ProcessID="3892" ThreadID="5724" />
|
||||
<Channel>Microsoft-Windows-Sysmon/Operational</Channel>
|
||||
<Computer>atc-win-10.atc.local</Computer>
|
||||
<Security UserID="S-1-5-18" />
|
||||
</System>
|
||||
- <EventData>
|
||||
<Data Name="RuleName" />
|
||||
<Data Name="UtcTime">2019-01-30 14:28:35.212</Data>
|
||||
<Data Name="SourceProcessGUID">{9683FBB1-B470-5C51-0000-0010521EBB00}</Data>
|
||||
<Data Name="SourceProcessId">6916</Data>
|
||||
<Data Name="SourceThreadId">8080</Data>
|
||||
<Data Name="SourceImage">C:\Users\user1\Desktop\mimi\x64\mimikatz.exe</Data>
|
||||
<Data Name="TargetProcessGUID">{9683FBB1-9A52-5C51-0000-0010C3610000}</Data>
|
||||
<Data Name="TargetProcessId">672</Data>
|
||||
<Data Name="TargetImage">C:\windows\system32\lsass.exe</Data>
|
||||
<Data Name="GrantedAccess">0x1010</Data>
|
||||
<Data Name="CallTrace">C:\windows\SYSTEM32\ntdll.dll+9a3c4|C:\windows\System32\KERNELBASE.dll+2fd5d|C:\Users\user1\Desktop\mimi\x64\mimikatz.exe+7a906|C:\Users\user1\Desktop\mimi\x64\mimikatz.exe+7ac75|C:\Users\user1\Desktop\mimi\x64\mimikatz.exe+7a82d|C:\Users\user1\Desktop\mimi\x64\mimikatz.exe+4d28c|C:\Users\user1\Desktop\mimi\x64\mimikatz.exe+4d0c4|C:\Users\user1\Desktop\mimi\x64\mimikatz.exe+4cea1|C:\Users\user1\Desktop\mimi\x64\mimikatz.exe+80675|C:\windows\System32\KERNEL32.DLL+13034|C:\windows\SYSTEM32\ntdll.dll+71471</Data>
|
||||
</EventData>
|
||||
</Event>
|
||||
|
51
dataneeded/DN_0015_11_windows_sysmon_FileCreate.yml
Normal file
51
dataneeded/DN_0015_11_windows_sysmon_FileCreate.yml
Normal file
@ -0,0 +1,51 @@
|
||||
title: DN_0015_11_windows_sysmon_FileCreate
|
||||
description: >
|
||||
File create operations are logged when a file is created or overwritten. This event is useful for monitoring autostart locations, like the Startup folder, as well as temporary and download directories, which are common places malware drops during initial infection.
|
||||
loggingpolicy:
|
||||
- LP_0008_windows_sysmon_FileCreate
|
||||
references:
|
||||
- https://www.ultimatewindowssecurity.com/securitylog/encyclopedia/event.aspx?eventid=90011
|
||||
- https://github.com/Cyb3rWard0g/OSSEM/blob/master/data_dictionaries/windows/sysmon/event-11.md
|
||||
category: OS Logs
|
||||
platform: Windows
|
||||
type: Windows Log
|
||||
channel: Microsoft-Windows-Sysmon/Operational
|
||||
provider: Microsoft-Windows-Sysmon
|
||||
fields:
|
||||
- EventID
|
||||
- Computer
|
||||
- UtcTime
|
||||
- ProcessGuid
|
||||
- ProcessId
|
||||
- Image
|
||||
- TargetFilename
|
||||
- CreationUtcTime
|
||||
sample: |
|
||||
- <Event xmlns="http://schemas.microsoft.com/win/2004/08/events/event">
|
||||
- <System>
|
||||
<Provider Name="Microsoft-Windows-Sysmon" Guid="{5770385F-C22A-43E0-BF4C-06F5698FFBD9}" />
|
||||
<EventID>11</EventID>
|
||||
<Version>2</Version>
|
||||
<Level>4</Level>
|
||||
<Task>11</Task>
|
||||
<Opcode>0</Opcode>
|
||||
<Keywords>0x8000000000000000</Keywords>
|
||||
<TimeCreated SystemTime="2019-01-30T15:08:51.296611700Z" />
|
||||
<EventRecordID>42528</EventRecordID>
|
||||
<Correlation />
|
||||
<Execution ProcessID="3892" ThreadID="5724" />
|
||||
<Channel>Microsoft-Windows-Sysmon/Operational</Channel>
|
||||
<Computer>atc-win-10.atc.local</Computer>
|
||||
<Security UserID="S-1-5-18" />
|
||||
</System>
|
||||
- <EventData>
|
||||
<Data Name="RuleName" />
|
||||
<Data Name="UtcTime">2019-01-30 15:08:51.287</Data>
|
||||
<Data Name="ProcessGuid">{9683FBB1-9A3F-5C51-0000-0010EB030000}</Data>
|
||||
<Data Name="ProcessId">4</Data>
|
||||
<Data Name="Image">System</Data>
|
||||
<Data Name="TargetFilename">C:\Windows\PSEXESVC.exe</Data>
|
||||
<Data Name="CreationUtcTime">2019-01-30 15:08:51.287</Data>
|
||||
</EventData>
|
||||
</Event>
|
||||
|
51
dataneeded/DN_0016_12_windows_sysmon_RegistryEvent.yml
Normal file
51
dataneeded/DN_0016_12_windows_sysmon_RegistryEvent.yml
Normal file
@ -0,0 +1,51 @@
|
||||
title: DN_0016_12_windows_sysmon_RegistryEvent
|
||||
description: >
|
||||
Registry key and value create and delete operations map to this event type, which can be useful for monitoring for changes to Registry autostart locations, or specific malware registry modifications.
|
||||
loggingpolicy:
|
||||
- None
|
||||
references:
|
||||
- https://www.ultimatewindowssecurity.com/securitylog/encyclopedia/event.aspx?eventid=90012
|
||||
- https://github.com/Cyb3rWard0g/OSSEM/blob/master/data_dictionaries/windows/sysmon/event-12.md
|
||||
category: OS Logs
|
||||
platform: Windows
|
||||
type: Windows Log
|
||||
channel: Microsoft-Windows-Sysmon/Operational
|
||||
provider: Microsoft-Windows-Sysmon
|
||||
fields:
|
||||
- EventID
|
||||
- Computer
|
||||
- EventType
|
||||
- UtcTime
|
||||
- ProcessGuid
|
||||
- ProcessId
|
||||
- Image
|
||||
- TargetObject
|
||||
sample: |
|
||||
- <Event xmlns="http://schemas.microsoft.com/win/2004/08/events/event">
|
||||
- <System>
|
||||
<Provider Name="Microsoft-Windows-Sysmon" Guid="{5770385F-C22A-43E0-BF4C-06F5698FFBD9}" />
|
||||
<EventID>12</EventID>
|
||||
<Version>2</Version>
|
||||
<Level>4</Level>
|
||||
<Task>12</Task>
|
||||
<Opcode>0</Opcode>
|
||||
<Keywords>0x8000000000000000</Keywords>
|
||||
<TimeCreated SystemTime="2019-01-30T17:05:28.027841800Z" />
|
||||
<EventRecordID>42938</EventRecordID>
|
||||
<Correlation />
|
||||
<Execution ProcessID="3892" ThreadID="5724" />
|
||||
<Channel>Microsoft-Windows-Sysmon/Operational</Channel>
|
||||
<Computer>atc-win-10.atc.local</Computer>
|
||||
<Security UserID="S-1-5-18" />
|
||||
</System>
|
||||
- <EventData>
|
||||
<Data Name="RuleName" />
|
||||
<Data Name="EventType">DeleteKey</Data>
|
||||
<Data Name="UtcTime">2019-01-30 17:05:28.023</Data>
|
||||
<Data Name="ProcessGuid">{9683FBB1-D812-5C51-0000-0010F3871201}</Data>
|
||||
<Data Name="ProcessId">10396</Data>
|
||||
<Data Name="Image">C:\Windows\regedit.exe</Data>
|
||||
<Data Name="TargetObject">HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\New Key #1</Data>
|
||||
</EventData>
|
||||
</Event>
|
||||
|
53
dataneeded/DN_0017_13_windows_sysmon_RegistryEvent.yml
Normal file
53
dataneeded/DN_0017_13_windows_sysmon_RegistryEvent.yml
Normal file
@ -0,0 +1,53 @@
|
||||
title: DN_0016_13_windows_sysmon_RegistryEvent
|
||||
description: >
|
||||
This Registry event type identifies Registry value modifications. The event records the value written for Registry values of type DWORD and QWORD.
|
||||
loggingpolicy:
|
||||
- None
|
||||
references:
|
||||
- https://www.ultimatewindowssecurity.com/securitylog/encyclopedia/event.aspx?eventid=90013
|
||||
- https://github.com/Cyb3rWard0g/OSSEM/blob/master/data_dictionaries/windows/sysmon/event-13.md
|
||||
category: OS Logs
|
||||
platform: Windows
|
||||
type: Windows Log
|
||||
channel: Microsoft-Windows-Sysmon/Operational
|
||||
provider: Microsoft-Windows-Sysmon
|
||||
fields:
|
||||
- EventID
|
||||
- Computer
|
||||
- EventType
|
||||
- UtcTime
|
||||
- ProcessGuid
|
||||
- ProcessId
|
||||
- Image
|
||||
- TargetObject
|
||||
- Details
|
||||
sample: |
|
||||
- <Event xmlns="http://schemas.microsoft.com/win/2004/08/events/event">
|
||||
- <System>
|
||||
<Provider Name="Microsoft-Windows-Sysmon" Guid="{5770385F-C22A-43E0-BF4C-06F5698FFBD9}" />
|
||||
<EventID>13</EventID>
|
||||
<Version>2</Version>
|
||||
<Level>4</Level>
|
||||
<Task>13</Task>
|
||||
<Opcode>0</Opcode>
|
||||
<Keywords>0x8000000000000000</Keywords>
|
||||
<TimeCreated SystemTime="2019-01-30T17:06:11.698273500Z" />
|
||||
<EventRecordID>42943</EventRecordID>
|
||||
<Correlation />
|
||||
<Execution ProcessID="3892" ThreadID="5724" />
|
||||
<Channel>Microsoft-Windows-Sysmon/Operational</Channel>
|
||||
<Computer>atc-win-10.atc.local</Computer>
|
||||
<Security UserID="S-1-5-18" />
|
||||
</System>
|
||||
- <EventData>
|
||||
<Data Name="RuleName" />
|
||||
<Data Name="EventType">SetValue</Data>
|
||||
<Data Name="UtcTime">2019-01-30 17:06:11.673</Data>
|
||||
<Data Name="ProcessGuid">{9683FBB1-D812-5C51-0000-0010F3871201}</Data>
|
||||
<Data Name="ProcessId">10396</Data>
|
||||
<Data Name="Image">C:\Windows\regedit.exe</Data>
|
||||
<Data Name="TargetObject">HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\New Value #1</Data>
|
||||
<Data Name="Details">C:\Program Files\Sublime Text 3\sublime_text.exe</Data>
|
||||
</EventData>
|
||||
</Event>
|
||||
|
53
dataneeded/DN_0018_14_windows_sysmon_RegistryEvent.yml
Normal file
53
dataneeded/DN_0018_14_windows_sysmon_RegistryEvent.yml
Normal file
@ -0,0 +1,53 @@
|
||||
title: DN_0018_14_windows_sysmon_RegistryEvent
|
||||
description: >
|
||||
Registry key and value rename operations map to this event type, recording the new name of the key or value that was renamed.
|
||||
loggingpolicy:
|
||||
- None
|
||||
references:
|
||||
- https://www.ultimatewindowssecurity.com/securitylog/encyclopedia/event.aspx?eventid=90014
|
||||
- https://github.com/Cyb3rWard0g/OSSEM/blob/master/data_dictionaries/windows/sysmon/event-14.md
|
||||
category: OS Logs
|
||||
platform: Windows
|
||||
type: Windows Log
|
||||
channel: Microsoft-Windows-Sysmon/Operational
|
||||
provider: Microsoft-Windows-Sysmon
|
||||
fields:
|
||||
- EventID
|
||||
- Computer
|
||||
- EventType
|
||||
- UtcTime
|
||||
- ProcessGuid
|
||||
- ProcessId
|
||||
- Image
|
||||
- TargetObject
|
||||
- Details
|
||||
sample: |
|
||||
- <Event xmlns="http://schemas.microsoft.com/win/2004/08/events/event">
|
||||
- <System>
|
||||
<Provider Name="Microsoft-Windows-Sysmon" Guid="{5770385F-C22A-43E0-BF4C-06F5698FFBD9}" />
|
||||
<EventID>14</EventID>
|
||||
<Version>2</Version>
|
||||
<Level>4</Level>
|
||||
<Task>14</Task>
|
||||
<Opcode>0</Opcode>
|
||||
<Keywords>0x8000000000000000</Keywords>
|
||||
<TimeCreated SystemTime="2019-01-30T18:16:38.889738400Z" />
|
||||
<EventRecordID>43065</EventRecordID>
|
||||
<Correlation />
|
||||
<Execution ProcessID="3892" ThreadID="5724" />
|
||||
<Channel>Microsoft-Windows-Sysmon/Operational</Channel>
|
||||
<Computer>atc-win-10.atc.local</Computer>
|
||||
<Security UserID="S-1-5-18" />
|
||||
</System>
|
||||
- <EventData>
|
||||
<Data Name="RuleName" />
|
||||
<Data Name="EventType">RenameKey</Data>
|
||||
<Data Name="UtcTime">2019-01-30 18:16:38.886</Data>
|
||||
<Data Name="ProcessGuid">{9683FBB1-D812-5C51-0000-0010F3871201}</Data>
|
||||
<Data Name="ProcessId">10396</Data>
|
||||
<Data Name="Image">C:\Windows\regedit.exe</Data>
|
||||
<Data Name="TargetObject">HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\New Key #1</Data>
|
||||
<Data Name="NewName">HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\New Key #2</Data>
|
||||
</EventData>
|
||||
</Event>
|
||||
|
@ -0,0 +1,53 @@
|
||||
title: DN_0019_15_windows_sysmon_FileCreateStreamHash
|
||||
description: >
|
||||
This event logs when a named file stream is created, and it generates events that log the hash of the contents of the file to which the stream is assigned (the unnamed stream), as well as the contents of the named stream.
|
||||
loggingpolicy:
|
||||
- None
|
||||
references:
|
||||
- https://github.com/Cyb3rWard0g/OSSEM/blob/master/data_dictionaries/windows/sysmon/event-15.md
|
||||
- https://www.ultimatewindowssecurity.com/securitylog/encyclopedia/event.aspx?eventid=90015
|
||||
category: OS Logs
|
||||
platform: Windows
|
||||
type: Windows Log
|
||||
channel: Microsoft-Windows-Sysmon/Operational
|
||||
provider: Microsoft-Windows-Sysmon
|
||||
fields:
|
||||
- EventID
|
||||
- Computer
|
||||
- UtcTime
|
||||
- ProcessGuid
|
||||
- ProcessId
|
||||
- Image
|
||||
- TargetFilename
|
||||
- CreationUtcTime
|
||||
- Hash
|
||||
sample: |
|
||||
- <Event xmlns="http://schemas.microsoft.com/win/2004/08/events/event">
|
||||
- <System>
|
||||
<Provider Name="Microsoft-Windows-Sysmon" Guid="{5770385F-C22A-43E0-BF4C-06F5698FFBD9}" />
|
||||
<EventID>15</EventID>
|
||||
<Version>2</Version>
|
||||
<Level>4</Level>
|
||||
<Task>15</Task>
|
||||
<Opcode>0</Opcode>
|
||||
<Keywords>0x8000000000000000</Keywords>
|
||||
<TimeCreated SystemTime="2019-01-21T12:43:53.385072700Z" />
|
||||
<EventRecordID>34115</EventRecordID>
|
||||
<Correlation />
|
||||
<Execution ProcessID="2052" ThreadID="4092" />
|
||||
<Channel>Microsoft-Windows-Sysmon/Operational</Channel>
|
||||
<Computer>atc-win-10.atc.local</Computer>
|
||||
<Security UserID="S-1-5-18" />
|
||||
</System>
|
||||
- <EventData>
|
||||
<Data Name="RuleName" />
|
||||
<Data Name="UtcTime">2019-01-21 12:43:53.368</Data>
|
||||
<Data Name="ProcessGuid">{9683FBB1-A860-5C45-0000-0010274F1400}</Data>
|
||||
<Data Name="ProcessId">6604</Data>
|
||||
<Data Name="Image">C:\windows\Explorer.EXE</Data>
|
||||
<Data Name="TargetFilename">C:\Users\user1\Downloads\wce_v1_42beta_x64\wce.exe</Data>
|
||||
<Data Name="CreationUtcTime">2013-11-11 22:41:40.000</Data>
|
||||
<Data Name="Hash">MD5=CCF1D1573F175299ADE01C07791A6541,SHA256=68A15A34C2E28B9B521A240B948634617D72AD619E3950BC6DC769E60A0C3CF2</Data>
|
||||
</EventData>
|
||||
</Event>
|
||||
|
49
dataneeded/DN_0020_17_windows_sysmon_PipeEvent.yml
Normal file
49
dataneeded/DN_0020_17_windows_sysmon_PipeEvent.yml
Normal file
@ -0,0 +1,49 @@
|
||||
title: DN_0020_17_windows_sysmon_PipeEvent
|
||||
description: >
|
||||
This event generates when a named pipe is created. Malware often uses named pipes for interprocess communication.
|
||||
loggingpolicy:
|
||||
- LP_0009_windows_sysmon_PipeEvent
|
||||
references:
|
||||
- https://github.com/Cyb3rWard0g/OSSEM/blob/master/data_dictionaries/windows/sysmon/event-17.md
|
||||
- https://www.ultimatewindowssecurity.com/securitylog/encyclopedia/event.aspx?eventid=90017
|
||||
category: OS Logs
|
||||
platform: Windows
|
||||
type: Windows Log
|
||||
channel: Microsoft-Windows-Sysmon/Operational
|
||||
provider: Microsoft-Windows-Sysmon
|
||||
fields:
|
||||
- EventID
|
||||
- Computer
|
||||
- UtcTime
|
||||
- ProcessGuid
|
||||
- ProcessId
|
||||
- PipeName
|
||||
- Image
|
||||
sample: |
|
||||
- <Event xmlns="http://schemas.microsoft.com/win/2004/08/events/event">
|
||||
- <System>
|
||||
<Provider Name="Microsoft-Windows-Sysmon" Guid="{5770385F-C22A-43E0-BF4C-06F5698FFBD9}" />
|
||||
<EventID>17</EventID>
|
||||
<Version>1</Version>
|
||||
<Level>4</Level>
|
||||
<Task>17</Task>
|
||||
<Opcode>0</Opcode>
|
||||
<Keywords>0x8000000000000000</Keywords>
|
||||
<TimeCreated SystemTime="2019-02-05T13:37:34.396695400Z" />
|
||||
<EventRecordID>46617</EventRecordID>
|
||||
<Correlation />
|
||||
<Execution ProcessID="3172" ThreadID="4192" />
|
||||
<Channel>Microsoft-Windows-Sysmon/Operational</Channel>
|
||||
<Computer>atc-win-10.atc.local</Computer>
|
||||
<Security UserID="S-1-5-18" />
|
||||
</System>
|
||||
- <EventData>
|
||||
<Data Name="RuleName" />
|
||||
<Data Name="UtcTime">2019-02-05 13:37:34.396</Data>
|
||||
<Data Name="ProcessGuid">{9683FBB1-919E-5C59-0000-0010A0E53B00}</Data>
|
||||
<Data Name="ProcessId">7128</Data>
|
||||
<Data Name="PipeName">\PSEXESVC-ATC-WIN-7-2728-stdin</Data>
|
||||
<Data Name="Image">C:\windows\PSEXESVC.exe</Data>
|
||||
</EventData>
|
||||
</Event>
|
||||
|
49
dataneeded/DN_0021_18_windows_sysmon_PipeEvent.yml
Normal file
49
dataneeded/DN_0021_18_windows_sysmon_PipeEvent.yml
Normal file
@ -0,0 +1,49 @@
|
||||
title: DN_0021_18_windows_sysmon_PipeEvent
|
||||
description: >
|
||||
This event logs when a named pipe connection is made between a client and a server.
|
||||
loggingpolicy:
|
||||
- LP_0009_windows_sysmon_PipeEvent
|
||||
references:
|
||||
- https://github.com/Cyb3rWard0g/OSSEM/blob/master/data_dictionaries/windows/sysmon/event-18.md
|
||||
- https://www.ultimatewindowssecurity.com/securitylog/encyclopedia/event.aspx?eventid=90018
|
||||
category: OS Logs
|
||||
platform: Windows
|
||||
type: Windows Log
|
||||
channel: Microsoft-Windows-Sysmon/Operational
|
||||
provider: Microsoft-Windows-Sysmon
|
||||
fields:
|
||||
- EventID
|
||||
- Computer
|
||||
- UtcTime
|
||||
- ProcessGuid
|
||||
- ProcessId
|
||||
- PipeName
|
||||
- Image
|
||||
sample: |
|
||||
- <Event xmlns="http://schemas.microsoft.com/win/2004/08/events/event">
|
||||
- <System>
|
||||
<Provider Name="Microsoft-Windows-Sysmon" Guid="{5770385F-C22A-43E0-BF4C-06F5698FFBD9}" />
|
||||
<EventID>18</EventID>
|
||||
<Version>1</Version>
|
||||
<Level>4</Level>
|
||||
<Task>18</Task>
|
||||
<Opcode>0</Opcode>
|
||||
<Keywords>0x8000000000000000</Keywords>
|
||||
<TimeCreated SystemTime="2019-02-05T13:37:34.457379300Z" />
|
||||
<EventRecordID>46620</EventRecordID>
|
||||
<Correlation />
|
||||
<Execution ProcessID="3172" ThreadID="4192" />
|
||||
<Channel>Microsoft-Windows-Sysmon/Operational</Channel>
|
||||
<Computer>tdl-win-10.tdl.local</Computer>
|
||||
<Security UserID="S-1-5-18" />
|
||||
</System>
|
||||
- <EventData>
|
||||
<Data Name="RuleName" />
|
||||
<Data Name="UtcTime">2019-02-05 13:37:34.455</Data>
|
||||
<Data Name="ProcessGuid">{9683FBB1-8B5F-5C59-0000-0010EB030000}</Data>
|
||||
<Data Name="ProcessId">4</Data>
|
||||
<Data Name="PipeName">\PSEXESVC-TDL-WIN-7-2728-stdin</Data>
|
||||
<Data Name="Image">System</Data>
|
||||
</EventData>
|
||||
</Event>
|
||||
|
53
dataneeded/DN_0022_19_windows_sysmon_WmiEvent.yml
Normal file
53
dataneeded/DN_0022_19_windows_sysmon_WmiEvent.yml
Normal file
@ -0,0 +1,53 @@
|
||||
title: DN_0022_19_windows_sysmon_WmiEvent
|
||||
description: >
|
||||
When a WMI event filter is registered, which is a method used by malware to execute, this event logs the WMI namespace, filter name and filter expression.
|
||||
loggingpolicy:
|
||||
- LP_0010_windows_sysmon_WmiEvent
|
||||
references:
|
||||
- https://github.com/Cyb3rWard0g/OSSEM/blob/master/data_dictionaries/windows/sysmon/event-19.md
|
||||
- https://www.ultimatewindowssecurity.com/securitylog/encyclopedia/event.aspx?eventid=90019
|
||||
category: OS Logs
|
||||
platform: Windows
|
||||
type: Windows Log
|
||||
channel: Microsoft-Windows-Sysmon/Operational
|
||||
provider: Microsoft-Windows-Sysmon
|
||||
fields:
|
||||
- EventID
|
||||
- Computer
|
||||
- EventType
|
||||
- UtcTime
|
||||
- Operation
|
||||
- User
|
||||
- EventNamespace
|
||||
- Name
|
||||
- Query
|
||||
sample: |
|
||||
- <Event xmlns="http://schemas.microsoft.com/win/2004/08/events/event">
|
||||
- <System>
|
||||
<Provider Name="Microsoft-Windows-Sysmon" Guid="{5770385F-C22A-43E0-BF4C-06F5698FFBD9}" />
|
||||
<EventID>19</EventID>
|
||||
<Version>3</Version>
|
||||
<Level>4</Level>
|
||||
<Task>19</Task>
|
||||
<Opcode>0</Opcode>
|
||||
<Keywords>0x8000000000000000</Keywords>
|
||||
<TimeCreated SystemTime="2019-02-05T14:44:42.434534600Z" />
|
||||
<EventRecordID>46712</EventRecordID>
|
||||
<Correlation />
|
||||
<Execution ProcessID="3172" ThreadID="444" />
|
||||
<Channel>Microsoft-Windows-Sysmon/Operational</Channel>
|
||||
<Computer>atc-win-10.atc.local</Computer>
|
||||
<Security UserID="S-1-5-18" />
|
||||
</System>
|
||||
- <EventData>
|
||||
<Data Name="RuleName" />
|
||||
<Data Name="EventType">WmiFilterEvent</Data>
|
||||
<Data Name="UtcTime">2019-02-05 14:44:42.432</Data>
|
||||
<Data Name="Operation">Created</Data>
|
||||
<Data Name="User">atc-win-10\user1</Data>
|
||||
<Data Name="EventNamespace">"root\\CimV2"</Data>
|
||||
<Data Name="Name">"AtomicRedTeam-WMIPersistence-Example"</Data>
|
||||
<Data Name="Query">"SELECT * FROM __InstanceModificationEvent WITHIN 60 WHERE TargetInstance ISA 'Win32_PerfFormattedData_PerfOS_System' AND TargetInstance.SystemUpTime >= 240 AND TargetInstance.SystemUpTime < 325"</Data>
|
||||
</EventData>
|
||||
</Event>
|
||||
|
53
dataneeded/DN_0023_20_windows_sysmon_WmiEvent.yml
Normal file
53
dataneeded/DN_0023_20_windows_sysmon_WmiEvent.yml
Normal file
@ -0,0 +1,53 @@
|
||||
title: DN_0023_20_windows_sysmon_WmiEvent
|
||||
description: >
|
||||
This event logs the registration of WMI consumers, recording the consumer name, log, and destination.
|
||||
loggingpolicy:
|
||||
- LP_0010_windows_sysmon_WmiEvent
|
||||
references:
|
||||
- https://github.com/Cyb3rWard0g/OSSEM/blob/master/data_dictionaries/windows/sysmon/event-20.md
|
||||
- https://www.ultimatewindowssecurity.com/securitylog/encyclopedia/event.aspx?eventid=90020
|
||||
category: OS Logs
|
||||
platform: Windows
|
||||
type: Windows Log
|
||||
channel: Microsoft-Windows-Sysmon/Operational
|
||||
provider: Microsoft-Windows-Sysmon
|
||||
fields:
|
||||
- EventID
|
||||
- Computer
|
||||
- EventType
|
||||
- UtcTime
|
||||
- Operation
|
||||
- User
|
||||
- Name
|
||||
- Type
|
||||
- Destination
|
||||
sample: |
|
||||
- <Event xmlns="http://schemas.microsoft.com/win/2004/08/events/event">
|
||||
- <System>
|
||||
<Provider Name="Microsoft-Windows-Sysmon" Guid="{5770385F-C22A-43E0-BF4C-06F5698FFBD9}" />
|
||||
<EventID>20</EventID>
|
||||
<Version>3</Version>
|
||||
<Level>4</Level>
|
||||
<Task>20</Task>
|
||||
<Opcode>0</Opcode>
|
||||
<Keywords>0x8000000000000000</Keywords>
|
||||
<TimeCreated SystemTime="2019-02-05T14:44:42.518512400Z" />
|
||||
<EventRecordID>46713</EventRecordID>
|
||||
<Correlation />
|
||||
<Execution ProcessID="3172" ThreadID="444" />
|
||||
<Channel>Microsoft-Windows-Sysmon/Operational</Channel>
|
||||
<Computer>atc-win-10.atc.local</Computer>
|
||||
<Security UserID="S-1-5-18" />
|
||||
</System>
|
||||
- <EventData>
|
||||
<Data Name="RuleName" />
|
||||
<Data Name="EventType">WmiConsumerEvent</Data>
|
||||
<Data Name="UtcTime">2019-02-05 14:44:42.510</Data>
|
||||
<Data Name="Operation">Created</Data>
|
||||
<Data Name="User">atc-win-10\user1</Data>
|
||||
<Data Name="Name">"AtomicRedTeam-WMIPersistence-Example"</Data>
|
||||
<Data Name="Type">Command Line</Data>
|
||||
<Data Name="Destination">"C:\\windows\\System32\\notepad.exe"</Data>
|
||||
</EventData>
|
||||
</Event>
|
||||
|
51
dataneeded/DN_0024_21_windows_sysmon_WmiEvent.yml
Normal file
51
dataneeded/DN_0024_21_windows_sysmon_WmiEvent.yml
Normal file
@ -0,0 +1,51 @@
|
||||
title: DN_0024_21_windows_sysmon_WmiEvent
|
||||
description: >
|
||||
When a consumer binds to a filter, this event logs the consumer name and filter path.
|
||||
loggingpolicy:
|
||||
- LP_0010_windows_sysmon_WmiEvent
|
||||
references:
|
||||
- https://github.com/Cyb3rWard0g/OSSEM/blob/master/data_dictionaries/windows/sysmon/event-21.md
|
||||
- https://www.ultimatewindowssecurity.com/securitylog/encyclopedia/event.aspx?eventid=90021
|
||||
category: OS Logs
|
||||
platform: Windows
|
||||
type: Windows Log
|
||||
channel: Microsoft-Windows-Sysmon/Operational
|
||||
provider: Microsoft-Windows-Sysmon
|
||||
fields:
|
||||
- EventID
|
||||
- Computer
|
||||
- EventType
|
||||
- UtcTime
|
||||
- Operation
|
||||
- User
|
||||
- Consumer
|
||||
- Filter
|
||||
sample: |
|
||||
- <Event xmlns="http://schemas.microsoft.com/win/2004/08/events/event">
|
||||
- <System>
|
||||
<Provider Name="Microsoft-Windows-Sysmon" Guid="{5770385F-C22A-43E0-BF4C-06F5698FFBD9}" />
|
||||
<EventID>21</EventID>
|
||||
<Version>3</Version>
|
||||
<Level>4</Level>
|
||||
<Task>21</Task>
|
||||
<Opcode>0</Opcode>
|
||||
<Keywords>0x8000000000000000</Keywords>
|
||||
<TimeCreated SystemTime="2019-02-05T14:44:47.091658300Z" />
|
||||
<EventRecordID>46714</EventRecordID>
|
||||
<Correlation />
|
||||
<Execution ProcessID="3172" ThreadID="444" />
|
||||
<Channel>Microsoft-Windows-Sysmon/Operational</Channel>
|
||||
<Computer>atc-win-10.atc.local</Computer>
|
||||
<Security UserID="S-1-5-18" />
|
||||
</System>
|
||||
- <EventData>
|
||||
<Data Name="RuleName" />
|
||||
<Data Name="EventType">WmiBindingEvent</Data>
|
||||
<Data Name="UtcTime">2019-02-05 14:44:47.087</Data>
|
||||
<Data Name="Operation">Created</Data>
|
||||
<Data Name="User">atc-win-10\user1</Data>
|
||||
<Data Name="Consumer">"\\\\.\\ROOT\\subscription:CommandLineEventConsumer.Name=\"AtomicRedTeam-WMIPersistence-Example\""</Data>
|
||||
<Data Name="Filter">"\\\\.\\ROOT\\subscription:__EventFilter.Name=\"AtomicRedTeam-WMIPersistence-Example\""</Data>
|
||||
</EventData>
|
||||
</Event>
|
||||
|
18
loggingpolicies/LP_0006_windows_sysmon_image_loaded.yml
Normal file
18
loggingpolicies/LP_0006_windows_sysmon_image_loaded.yml
Normal file
@ -0,0 +1,18 @@
|
||||
title: LP_0006_windows_sysmon_image_loaded
|
||||
default: Not configured
|
||||
volume: High
|
||||
description: >
|
||||
The image loaded event logs when a module is loaded in a specific process.
|
||||
This event is disabled by default and needs to be configured with the –l option.
|
||||
It indicates the process in which the module is loaded, hashes and signature information.
|
||||
The signature is created asynchronously for performance reasons and indicates if the file was removed after loading.
|
||||
This event should be configured carefully, as monitoring all image load events will generate a large number of events.
|
||||
eventID:
|
||||
- 7
|
||||
references:
|
||||
- https://docs.microsoft.com/en-us/sysinternals/downloads/sysmon
|
||||
configuration: |
|
||||
Sysmon event id 7 is disabled by default.
|
||||
It can be enabled by specyfying -l option
|
||||
However due to high level of produced logs it should be filtred with configuration file
|
||||
Sample configuration might be found here: https://github.com/SwiftOnSecurity/sysmon-config/blob/master/sysmonconfig-export.xml
|
29
loggingpolicies/LP_0007_windows_sysmon_ProcessAccess.yml
Normal file
29
loggingpolicies/LP_0007_windows_sysmon_ProcessAccess.yml
Normal file
@ -0,0 +1,29 @@
|
||||
title: LP_0007_windows_sysmon_ProcessAccess
|
||||
default: Not configured
|
||||
volume: High
|
||||
description: >
|
||||
The process accessed event reports when a process opens another process,
|
||||
an operation that’s often followed by information queries or reading and writing the address
|
||||
space of the target process. This enables detection of hacking tools that read the memory
|
||||
contents of processes like Local Security Authority (Lsass.exe) in order to steal credentials for use in Pass-the-Hash
|
||||
attacks. Enabling it can generate significant amounts of logging if there are diagnostic utilities active
|
||||
that repeatedly open processes to query their state, so it generally should only be done so with filters
|
||||
that remove expected accesses.
|
||||
eventID:
|
||||
- 10
|
||||
references:
|
||||
- https://docs.microsoft.com/en-us/sysinternals/downloads/sysmon
|
||||
configuration: |
|
||||
Sysmon event id 10 is disabled by default.
|
||||
It can be enabled by specyfying configuration
|
||||
However due to high level of produced logs it should be filtred with configuration file
|
||||
Sample configuration:
|
||||
```
|
||||
<ProcessAccess onmatch="include">
|
||||
<TargetImage condition="is">C:\Windows\system32\lsass.exe</TargetImage>
|
||||
</ProcessAccess>
|
||||
<ProcessAccess onmatch="exclude">
|
||||
<SourceImage condition="is">C:\windows\system32\wbem\wmiprvse.exe</SourceImage>
|
||||
<SourceImage condition="is">C:\windows\system32\svchost.exe</TargetImage>
|
||||
</ProcessAccess>
|
||||
```
|
89
loggingpolicies/LP_0008_windows_sysmon_FileCreate.yml
Normal file
89
loggingpolicies/LP_0008_windows_sysmon_FileCreate.yml
Normal file
@ -0,0 +1,89 @@
|
||||
title: LP_0008_windows_sysmon_FileCreate
|
||||
default: Partially (Other)
|
||||
volume: High
|
||||
description: >
|
||||
File create operations are logged when a file is created or overwritten. This event is useful for monitoring autostart locations, like the Startup folder, as well as temporary and download directories, which are common places malware drops during initial infection.
|
||||
eventID:
|
||||
- 11
|
||||
references:
|
||||
- https://docs.microsoft.com/en-us/sysinternals/downloads/sysmon
|
||||
configuration: |
|
||||
Sysmon event id 11 is enabled by default however default configuration might not be sufficient.
|
||||
Sample configuration providing much better visibility might be found here: https://github.com/SwiftOnSecurity/sysmon-config/blob/master/sysmonconfig-export.xml
|
||||
|
||||
```
|
||||
<!--DATA: UtcTime, ProcessGuid, ProcessId, Image, TargetFilename, CreationUtcTime-->
|
||||
<FileCreate onmatch="include">
|
||||
<TargetFilename condition="contains">\Start Menu</TargetFilename> <!--Microsoft:Windows: Startup links and shortcut modification [ https://attack.mitre.org/wiki/Technique/T1023 ] -->
|
||||
<TargetFilename condition="contains">\Startup\</TargetFilename> <!--Microsoft:Office: Changes to user's auto-launched files and shortcuts-->
|
||||
<TargetFilename condition="contains">\Content.Outlook\</TargetFilename> <!--Microsoft:Outlook: attachments-->
|
||||
<TargetFilename condition="contains">\Downloads\</TargetFilename> <!--Downloaded files. Does not include "Run" files in IE-->
|
||||
<TargetFilename condition="end with">.application</TargetFilename> <!--Microsoft:ClickOnce: [ https://blog.netspi.com/all-you-need-is-one-a-clickonce-love-story/ ] -->
|
||||
<TargetFilename condition="end with">.appref-ms</TargetFilename> <!--Microsoft:ClickOnce application | Credit @ion-storm -->
|
||||
<TargetFilename condition="end with">.bat</TargetFilename> <!--Batch scripting-->
|
||||
<TargetFilename condition="end with">.chm</TargetFilename>
|
||||
<TargetFilename condition="end with">.cmd</TargetFilename> <!--Batch scripting: Batch scripts can also use the .cmd extension | Credit: @mmazanec -->
|
||||
<TargetFilename condition="end with">.cmdline</TargetFilename> <!--Microsoft:dotNet: Executed by cvtres.exe-->
|
||||
<TargetFilename condition="end with">.docm</TargetFilename> <!--Microsoft:Office:Word: Macro-->
|
||||
<TargetFilename condition="end with">.exe</TargetFilename> <!--Executable-->
|
||||
<TargetFilename condition="end with">.jar</TargetFilename> <!--Java applets-->
|
||||
<TargetFilename condition="end with">.jnlp</TargetFilename> <!--Java applets-->
|
||||
<TargetFilename condition="end with">.jse</TargetFilename> <!--Scripting [ Example: https://www.sophos.com/en-us/threat-center/threat-analyses/viruses-and-spyware/Mal~Phires-C/detailed-analysis.aspx ] -->
|
||||
<TargetFilename condition="end with">.hta</TargetFilename> <!--Scripting-->
|
||||
<TargetFilename condition="end with">.pptm</TargetFilename> <!--Microsoft:Office:Word: Macro-->
|
||||
<TargetFilename condition="end with">.ps1</TargetFilename> <!--PowerShell [ More information: http://www.hexacorn.com/blog/2014/08/27/beyond-good-ol-run-key-part-16/ ] -->
|
||||
<TargetFilename condition="end with">.sys</TargetFilename> <!--System driver files-->
|
||||
<TargetFilename condition="end with">.scr</TargetFilename> <!--System driver files-->
|
||||
<TargetFilename condition="end with">.vbe</TargetFilename> <!--VisualBasicScripting-->
|
||||
<TargetFilename condition="end with">.vbs</TargetFilename> <!--VisualBasicScripting-->
|
||||
<TargetFilename condition="end with">.xlsm</TargetFilename> <!--Microsoft:Office:Word: Macro-->
|
||||
<TargetFilename condition="end with">proj</TargetFilename><!--Microsoft:MSBuild:Script: More information: https://twitter.com/subTee/status/885919612969394177-->
|
||||
<TargetFilename condition="end with">.sln</TargetFilename><!--Microsoft:MSBuild:Script: More information: https://twitter.com/subTee/status/885919612969394177-->
|
||||
<TargetFilename condition="begin with">C:\Users\Default</TargetFilename> <!--Microsoft:Windows: Changes to default user profile-->
|
||||
<TargetFilename condition="begin with">C:\Windows\system32\Drivers</TargetFilename> <!--Microsoft: Drivers dropped here-->
|
||||
<TargetFilename condition="begin with">C:\Windows\SysWOW64\Drivers</TargetFilename> <!--Microsoft: Drivers dropped here-->
|
||||
<TargetFilename condition="begin with">C:\Windows\system32\GroupPolicy\Machine\Scripts</TargetFilename> <!--Group policy [ More information: http://www.hexacorn.com/blog/2017/01/07/beyond-good-ol-run-key-part-52/ ] -->
|
||||
<TargetFilename condition="begin with">C:\Windows\system32\GroupPolicy\User\Scripts</TargetFilename> <!--Group policy [ More information: http://www.hexacorn.com/blog/2017/01/07/beyond-good-ol-run-key-part-52/ ] -->
|
||||
<TargetFilename condition="begin with">C:\Windows\system32\Wbem</TargetFilename> <!--Microsoft:WMI: [ More information: http://2014.hackitoergosum.org/slides/day1_WMI_Shell_Andrei_Dumitrescu.pdf ] -->
|
||||
<TargetFilename condition="begin with">C:\Windows\SysWOW64\Wbem</TargetFilename> <!--Microsoft:WMI: [ More information: http://2014.hackitoergosum.org/slides/day1_WMI_Shell_Andrei_Dumitrescu.pdf ] -->
|
||||
<TargetFilename condition="begin with">C:\Windows\system32\WindowsPowerShell</TargetFilename> <!--Microsoft:Powershell: Look for modifications for persistence [ https://www.malwarearchaeology.com/cheat-sheets ] -->
|
||||
<TargetFilename condition="begin with">C:\Windows\SysWOW64\WindowsPowerShell</TargetFilename> <!--Microsoft:Powershell: Look for modifications for persistence [ https://www.malwarearchaeology.com/cheat-sheets ] -->
|
||||
<TargetFilename condition="begin with">C:\Windows\Tasks\</TargetFilename> <!--Microsoft:ScheduledTasks [ https://attack.mitre.org/wiki/Technique/T1053 ] -->
|
||||
<TargetFilename condition="begin with">C:\Windows\system32\Tasks</TargetFilename> <!--Microsoft:ScheduledTasks [ https://attack.mitre.org/wiki/Technique/T1053 ] -->
|
||||
<!--Windows application compatibility-->
|
||||
<TargetFilename condition="begin with">C:\Windows\AppPatch\Custom</TargetFilename> <!--Microsoft:Windows: Application compatibility shims [ https://www.fireeye.com/blog/threat-research/2017/05/fin7-shim-databases-persistence.html ] -->
|
||||
<TargetFilename condition="contains">VirtualStore</TargetFilename> <!--Microsoft:Windows: UAC virtualization [ https://blogs.msdn.microsoft.com/oldnewthing/20150902-00/?p=91681 ] -->
|
||||
<!--Exploitable file names-->
|
||||
<TargetFilename condition="end with">.xls</TargetFilename> <!--Legacy Office files are often used for attacks-->
|
||||
<TargetFilename condition="end with">.ppt</TargetFilename> <!--Legacy Office files are often used for attacks-->
|
||||
<TargetFilename condition="end with">.rft</TargetFilename> <!--RTF files often 0day malware vectors when opened by Office-->
|
||||
</FileCreate>
|
||||
|
||||
<FileCreate onmatch="exclude">
|
||||
<!--SECTION: Microsoft-->
|
||||
<Image condition="is">C:\Program Files (x86)\EMET 5.5\EMET_Service.exe</Image> <!--Microsoft:EMET: Writes to C:\Windows\AppPatch\-->
|
||||
<!--SECTION: Microsoft:Office-->
|
||||
<TargetFilename condition="is">C:\Windows\System32\Tasks\OfficeSoftwareProtectionPlatform\SvcRestartTask</TargetFilename>
|
||||
<!--SECTION: Microsoft:Office:Click2Run-->
|
||||
<Image condition="is">C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeC2RClient.exe</Image> <!-- Microsoft:Office Click2Run-->
|
||||
<!--SECTION: Microsoft:Windows-->
|
||||
<Image condition="is">C:\Windows\system32\smss.exe</Image> <!-- Microsoft:Windows: Session Manager SubSystem: Creates swapfile.sys,pagefile.sys,hiberfile.sys-->
|
||||
<Image condition="is">C:\Windows\system32\CompatTelRunner.exe</Image> <!-- Microsoft:Windows: Windows 10 app, creates tons of cache files-->
|
||||
<Image condition="is">\\?\C:\Windows\system32\wbem\WMIADAP.EXE</Image> <!-- Microsoft:Windows: WMI Performance updates-->
|
||||
<Image condition="is">C:\Windows\system32\mobsync.exe</Image> <!--Microsoft:Windows: Network file syncing-->
|
||||
<TargetFilename condition="begin with">C:\Windows\system32\DriverStore\Temp\</TargetFilename> <!-- Microsoft:Windows: Temp files by DrvInst.exe-->
|
||||
<TargetFilename condition="begin with">C:\Windows\system32\wbem\Performance\</TargetFilename> <!-- Microsoft:Windows: Created in wbem by WMIADAP.exe-->
|
||||
<TargetFilename condition="end with">WRITABLE.TST</TargetFilename> <!-- Microsoft:Windows: Created in wbem by svchost-->
|
||||
<TargetFilename condition="begin with">C:\Windows\Installer\</TargetFilename> <!--Microsoft:Windows:Installer: Ignore MSI installer files caching-->
|
||||
<!--SECTION: Microsoft:Windows:Updates-->
|
||||
<TargetFilename condition="begin with">C:\$WINDOWS.~BT\Sources\</TargetFilename> <!-- Microsoft:Windows: Feature updates containing lots of .exe and .sys-->
|
||||
<Image condition="begin with">C:\Windows\winsxs\amd64_microsoft-windows</Image> <!-- Microsoft:Windows: Windows update-->
|
||||
<!--SECTION: Dell-->
|
||||
<Image condition="is">C:\Program Files (x86)\Dell\CommandUpdate\InvColPC.exe</Image>
|
||||
<!--SECTION: Intel-->
|
||||
<Image condition="is">C:\Windows\system32\igfxCUIService.exe</Image> <!--Intel: Drops bat and other files in \Windows in normal operation-->
|
||||
<!--SECTION: Adobe-->
|
||||
<TargetFilename condition="is">C:\Windows\System32\Tasks\Adobe Acrobat Update Task</TargetFilename>
|
||||
<TargetFilename condition="is">C:\Windows\System32\Tasks\Adobe Flash Player Updater</TargetFilename>
|
||||
</FileCreate>
|
||||
```
|
18
loggingpolicies/LP_0009_windows_sysmon_PipeEvent.yml
Normal file
18
loggingpolicies/LP_0009_windows_sysmon_PipeEvent.yml
Normal file
@ -0,0 +1,18 @@
|
||||
title: LP_0009_windows_sysmon_PipeEvent
|
||||
default: Not configured
|
||||
volume: Low
|
||||
description: >
|
||||
Enables logging of events related to usage or creation of pipes.
|
||||
eventID:
|
||||
- 17
|
||||
- 18
|
||||
references:
|
||||
- https://docs.microsoft.com/en-us/sysinternals/downloads/sysmon
|
||||
configuration: |
|
||||
This configuration should be further tunned according to baseline
|
||||
|
||||
Sample configuration:
|
||||
```
|
||||
<PipeEvent onmatch="exclude">
|
||||
</PipeEvent>
|
||||
```
|
23
loggingpolicies/LP_0010_windows_sysmon_WmiEvent.yml
Normal file
23
loggingpolicies/LP_0010_windows_sysmon_WmiEvent.yml
Normal file
@ -0,0 +1,23 @@
|
||||
title: LP_0010_windows_sysmon_WmiEvent
|
||||
default: Not configured
|
||||
volume: Low
|
||||
description: >
|
||||
Enables logging of events related to usage of windows management interface.
|
||||
Possible events are:
|
||||
- WmiEventFilter activity detected
|
||||
- WmiEventConsumer activity detected
|
||||
- WmiEventConsumerToFilter activity detected
|
||||
eventID:
|
||||
- 19
|
||||
- 20
|
||||
- 21
|
||||
references:
|
||||
- https://docs.microsoft.com/en-us/sysinternals/downloads/sysmon
|
||||
configuration: |
|
||||
This configuration should be further tunned according to baseline
|
||||
|
||||
Sample configuration:
|
||||
```
|
||||
<WmiEvent onmatch="exclude">
|
||||
</WmiEvent>
|
||||
```
|
@ -258,7 +258,8 @@ def calculate_dn_for_dr(dict_of_dn_files, dict_of_logsource_fields_from_dr, dr_l
|
||||
list_of_DN_matched_by_fields_and_logsource.append(dn.get('title'))
|
||||
|
||||
# and only in the last step we check EventID
|
||||
if dr_dn['EventID'] != None:
|
||||
|
||||
if 'EventID' in dr_dn:
|
||||
eventID = dr_dn['EventID']
|
||||
for dn in dn_list:
|
||||
if dn['title'] in list_of_DN_matched_by_fields_and_logsource:
|
||||
|
Loading…
Reference in New Issue
Block a user