Detecting Attacker Behavior With TTPs
Crafting SPL Searches Based on Known TTPs
Example: Detecting Reconnaissance Activities with Native Windows Binaries
index="main" sourcetype="WinEventLog:Sysmon" EventCode=1 Image=*\ipconfig.exe OR Image=*\net.exe OR Image=*\whoami.exe OR Image=*\netstat.exe OR Image=*\nbtstat.exe OR Image=*\hostname.exe OR Image=*\tasklist.exe | stats count by Image,CommandLine | sort - countExample: Detecting Malicious Payload Requests Hosted on Reputable Domains
index="main" sourcetype="WinEventLog:Sysmon" EventCode=22 QueryName="*github*" | stats count by Image, QueryNameExample: Detecting PsExec Usage
index="main" sourcetype="WinEventLog:Sysmon" EventCode=13 Image="C:\Windows\system32\services.exe" TargetObject="HKLM\System\CurrentControlSet\Services\*\ImagePath" | rex field=Details "(?<reg_file_name>[^\\]+)$" | eval file_name = if(isnull(file_name),reg_file_name,lower(file_name)) | stats values(Image) AS Image, values(Details) AS RegistryDetails, values(_time) AS EventTimes, count by file_name, ComputerNameExample: Detecting Archive File Use for Data Transfer
Example: Detecting Payload Downloads via PowerShell or Edge
Example: Detecting Execution from Suspicious Locations
Example: Detecting Executables Created Outside Windows Directory
Example: Detecting Misspelled Binaries (e.g., PSEXESVC.exe)
Example: Detecting Non-standard Ports in Communication
Last updated