- Execution
- Persistence
- Privilege Escalation
- Defense Evasion
- Credential Access
- Discovery
- Lateral Movement
- Collection
- Command and Control
- Exfiltration
- Impact
Description: Adversaries abuse PowerShell for execution
Log Sources: process_creation (Windows)
Detection Pattern:
detection:
selection:
Image|endswith: '\powershell.exe'
CommandLine|contains:
- '-enc'
- '-EncodedCommand'
- 'FromBase64String'
- 'Invoke-Expression'
- 'IEX'Tags:
tags:
- attack.execution
- attack.t1059.001Description: Abuse of cmd.exe for execution
Detection Pattern:
detection:
selection:
Image|endswith: '\cmd.exe'
CommandLine|contains:
- '/c'
- '/k'
- '&'
- '|'Description: Adversaries create scheduled tasks for persistence
Log Sources: process_creation, registry_event
Detection Pattern:
detection:
selection:
Image|endswith: '\schtasks.exe'
CommandLine|contains:
- '/create'
- '/sc minute'Description: Persistence via registry run keys
Log Sources: registry_event
Detection Pattern:
logsource:
category: registry_event
detection:
selection:
TargetObject|contains:
- '\Software\Microsoft\Windows\CurrentVersion\Run'
- '\Software\Microsoft\Windows\CurrentVersion\RunOnce'Description: Adversaries inject code into processes
Detection Pattern:
detection:
selection:
EventID: 8 # CreateRemoteThread
TargetImage|endswith:
- '\lsass.exe'
- '\explorer.exe'Description: UAC bypass techniques
Detection Pattern:
detection:
selection:
CommandLine|contains:
- 'eventvwr.exe'
- 'fodhelper.exe'
IntegrityLevel: 'High'Description: Files or information made difficult to discover or analyze
Detection Pattern:
detection:
selection:
CommandLine|contains:
- '-enc'
- 'base64'
- 'FromBase64'
- 'convert]::FromBase64String'Description: Clearing Windows event logs
Detection Pattern:
detection:
selection:
EventID: 1102 # Security log clearedDescription: Credential dumping from LSASS memory
Detection Pattern:
detection:
selection:
TargetImage|endswith: '\lsass.exe'
GrantedAccess:
- '0x1010'
- '0x1410'
- '0x147a'Description: Service principal name abuse for credential theft
Detection Pattern:
detection:
selection:
EventID: 4769
ServiceName|endswith: '$'
TicketEncryptionType: '0x17'Description: Adversaries enumerate account information
Detection Pattern:
detection:
selection:
Image|endswith:
- '\net.exe'
- '\net1.exe'
CommandLine|contains:
- 'user'
- 'group'
- 'localgroup administrators'Description: System and hardware information gathering
Detection Pattern:
detection:
selection:
Image|endswith:
- '\systeminfo.exe'
- '\wmic.exe'
CommandLine|contains:
- 'os get'
- 'computersystem'Description: Remote access via RDP
Log Sources: network_connection, authentication
Detection Pattern:
detection:
selection:
EventID: 4624
LogonType: 10 # RemoteInteractiveDescription: Lateral movement via SMB
Detection Pattern:
detection:
selection:
EventID: 5140
ShareName|endswith:
- 'ADMIN$'
- 'C$'
- 'IPC$'Description: Data archiving before exfiltration
Detection Pattern:
detection:
selection:
Image|endswith:
- '\rar.exe'
- '\7z.exe'
CommandLine|contains:
- ' a ' # Add to archive
- '-p' # PasswordDescription: C2 over HTTP/HTTPS
Log Sources: network_connection, proxy
Detection Pattern:
detection:
selection:
DestinationPort:
- 80
- 443
Initiated: 'true'
filter:
DestinationIp|startswith:
- '10.'
- '172.16.'
- '192.168.'
condition: selection and not filterDescription: Data exfiltration via existing C2
Detection Pattern:
detection:
selection:
Initiated: 'true'
DestinationPort:
- 4444
- 8080
- 8443Description: Ransomware encryption activity
Detection Pattern:
detection:
selection:
Image|endswith: '.exe'
TargetFilename|endswith:
- '.encrypted'
- '.locked'
- '.crypto'
condition: selectionWhen tagging rules with MITRE ATT&CK, use this format:
tags:
- attack.{tactic} # Lowercase tactic name
- attack.{technique_id} # Technique ID (T####) or sub-technique (T####.###)Example:
tags:
- attack.execution
- attack.t1059.001
- attack.defense_evasion
- attack.t1027Rules can map to multiple tactics and techniques:
tags:
- attack.execution # Primary tactic
- attack.t1059.001 # PowerShell
- attack.defense_evasion # Secondary tactic
- attack.t1027 # Obfuscation
- attack.t1140 # Deobfuscate/Decode Files