Changed category names and remove sysmon log source
This commit is contained in:
+1
-2
@@ -7,9 +7,8 @@ tags:
|
||||
- attack.persistence
|
||||
- attack.t1050
|
||||
logsource:
|
||||
category: driver_loaded
|
||||
category: driver_load
|
||||
product: windows
|
||||
service: sysmon
|
||||
detection:
|
||||
selection:
|
||||
ImageLoaded: '*\Temp\\*'
|
||||
+1
-2
@@ -10,9 +10,8 @@ tags:
|
||||
- attack.defense_evasion
|
||||
- attack.t1036
|
||||
logsource:
|
||||
category: file_creation
|
||||
category: file_event
|
||||
product: windows
|
||||
service: sysmon
|
||||
detection:
|
||||
selection:
|
||||
Image:
|
||||
+1
-2
@@ -10,9 +10,8 @@ tags:
|
||||
- attack.credential_access
|
||||
- attack.t1003
|
||||
logsource:
|
||||
category: file_creation
|
||||
category: file_event
|
||||
product: windows
|
||||
service: sysmon
|
||||
detection:
|
||||
selection:
|
||||
TargetFilename|contains:
|
||||
+1
-2
@@ -10,9 +10,8 @@ tags:
|
||||
author: Markus Neis
|
||||
date: 2018/07/24
|
||||
logsource:
|
||||
category: file_creation
|
||||
category: file_event
|
||||
product: windows
|
||||
service: sysmon
|
||||
detection:
|
||||
selection:
|
||||
TargetFilename: '*\Temp\debug.bin'
|
||||
+1
-2
@@ -11,9 +11,8 @@ tags:
|
||||
- attack.credential_access
|
||||
- attack.t1003
|
||||
logsource:
|
||||
category: file_creation
|
||||
category: file_event
|
||||
product: windows
|
||||
service: sysmon
|
||||
falsepositives:
|
||||
- Very unlikely
|
||||
level: critical
|
||||
+1
-2
@@ -10,9 +10,8 @@ tags:
|
||||
- attack.credential_access
|
||||
- attack.t1003
|
||||
logsource:
|
||||
category: file_creation
|
||||
category: file_event
|
||||
product: windows
|
||||
service: sysmon
|
||||
detection:
|
||||
selection:
|
||||
TargetFilename|contains: 'lsass'
|
||||
+1
-2
@@ -10,9 +10,8 @@ tags:
|
||||
author: Markus Neis
|
||||
date: 2018/04/07
|
||||
logsource:
|
||||
category: file_creation
|
||||
category: file_event
|
||||
product: windows
|
||||
service: sysmon
|
||||
detection:
|
||||
selection:
|
||||
TargetFilename:
|
||||
+1
-2
@@ -11,9 +11,8 @@ tags:
|
||||
- attack.t1003
|
||||
level: critical
|
||||
logsource:
|
||||
category: file_creation
|
||||
category: file_event
|
||||
product: windows
|
||||
service: sysmon
|
||||
detection:
|
||||
selection:
|
||||
# Sysmon: File Creation (ID 11)
|
||||
+1
-2
@@ -13,8 +13,7 @@ tags:
|
||||
- attack.persistence
|
||||
logsource:
|
||||
product: windows
|
||||
service: sysmon
|
||||
category: file_creation
|
||||
category: file_event
|
||||
detection:
|
||||
selection_1:
|
||||
TargetFilename: '*\Local\Microsoft\Windows\SchCache\*.sch'
|
||||
+1
-2
@@ -11,8 +11,7 @@ tags:
|
||||
- attack.t1023
|
||||
logsource:
|
||||
product: windows
|
||||
service: sysmon
|
||||
category: file_creation
|
||||
category: file_event
|
||||
detection:
|
||||
filter:
|
||||
Image:
|
||||
+1
-2
@@ -11,8 +11,7 @@ tags:
|
||||
- attack.defense_evasion
|
||||
logsource:
|
||||
product: windows
|
||||
service: sysmon
|
||||
category: file_creation
|
||||
category: file_event
|
||||
detection:
|
||||
selection_1:
|
||||
TargetFilename: '*\AppData\Local\Temp\*\PROCEXP152.sys'
|
||||
+1
-2
@@ -6,8 +6,7 @@ date: 2019/02/21
|
||||
author: Samir Bousseaden
|
||||
logsource:
|
||||
product: windows
|
||||
service: sysmon
|
||||
category: file_creation
|
||||
category: file_event
|
||||
detection:
|
||||
selection:
|
||||
Image: '*\mstsc.exe'
|
||||
+1
-2
@@ -13,8 +13,7 @@ tags:
|
||||
level: critical
|
||||
logsource:
|
||||
product: windows
|
||||
service: sysmon
|
||||
category: file_creation
|
||||
category: file_event
|
||||
detection:
|
||||
selection_2:
|
||||
TargetFilename|contains: '\inetpub\wwwroot\'
|
||||
-1
@@ -11,7 +11,6 @@ tags:
|
||||
- attack.persistence
|
||||
logsource:
|
||||
product: windows
|
||||
service: sysmon
|
||||
category: file_created
|
||||
detection:
|
||||
selection:
|
||||
+1
-2
@@ -12,9 +12,8 @@ tags:
|
||||
- attack.t1086
|
||||
- attack.execution
|
||||
logsource:
|
||||
category: image_loaded
|
||||
category: image_load
|
||||
product: windows
|
||||
service: sysmon
|
||||
detection:
|
||||
selection:
|
||||
ImageLoaded|endswith:
|
||||
+1
-2
@@ -11,9 +11,8 @@ tags:
|
||||
- attack.credential_access
|
||||
- car.2019-04-004
|
||||
logsource:
|
||||
category: image_loaded
|
||||
category: image_load
|
||||
product: windows
|
||||
service: sysmon
|
||||
date: 2017/03/13
|
||||
detection:
|
||||
selector:
|
||||
+1
-2
@@ -8,9 +8,8 @@ author: Roberto Rodriguez @Cyb3rWard0g
|
||||
references:
|
||||
- https://github.com/hunters-forge/ThreatHunter-Playbook/blob/8869b7a58dba1cff63bae1d7ab923974b8c0539b/playbooks/WIN-190410151110.yaml
|
||||
logsource:
|
||||
category: image_loaded
|
||||
category: image_load
|
||||
product: windows
|
||||
service: sysmon
|
||||
tags:
|
||||
- attack.execution
|
||||
- attack.t1086
|
||||
+1
-2
@@ -10,9 +10,8 @@ tags:
|
||||
- attack.defense_evasion
|
||||
- attack.t1073
|
||||
logsource:
|
||||
category: image_loaded
|
||||
category: image_load
|
||||
product: windows
|
||||
service: sysmon
|
||||
detection:
|
||||
selection:
|
||||
Image:
|
||||
+1
-2
@@ -10,9 +10,8 @@ tags:
|
||||
- attack.initial_access
|
||||
- attack.t1193
|
||||
logsource:
|
||||
category: image_loaded
|
||||
category: image_load
|
||||
product: windows
|
||||
service: sysmon
|
||||
detection:
|
||||
selection:
|
||||
Image:
|
||||
+1
-2
@@ -10,9 +10,8 @@ tags:
|
||||
- attack.initial_access
|
||||
- attack.t1193
|
||||
logsource:
|
||||
category: image_loaded
|
||||
category: image_load
|
||||
product: windows
|
||||
service: sysmon
|
||||
detection:
|
||||
selection:
|
||||
Image:
|
||||
+1
-2
@@ -10,9 +10,8 @@ tags:
|
||||
- attack.initial_access
|
||||
- attack.t1193
|
||||
logsource:
|
||||
category: image_loaded
|
||||
category: image_load
|
||||
product: windows
|
||||
service: sysmon
|
||||
detection:
|
||||
selection:
|
||||
Image:
|
||||
+1
-2
@@ -10,9 +10,8 @@ tags:
|
||||
- attack.initial_access
|
||||
- attack.t1193
|
||||
logsource:
|
||||
category: image_loaded
|
||||
category: image_load
|
||||
product: windows
|
||||
service: sysmon
|
||||
detection:
|
||||
selection:
|
||||
Image:
|
||||
+1
-2
@@ -10,9 +10,8 @@ tags:
|
||||
- attack.initial_access
|
||||
- attack.t1193
|
||||
logsource:
|
||||
category: image_loaded
|
||||
category: image_load
|
||||
product: windows
|
||||
service: sysmon
|
||||
detection:
|
||||
selection:
|
||||
Image:
|
||||
+1
-2
@@ -10,9 +10,8 @@ tags:
|
||||
- attack.initial_access
|
||||
- attack.t1193
|
||||
logsource:
|
||||
category: image_loaded
|
||||
category: image_load
|
||||
product: windows
|
||||
service: sysmon
|
||||
detection:
|
||||
selection:
|
||||
Image:
|
||||
+1
-2
@@ -12,9 +12,8 @@ tags:
|
||||
- attack.execution
|
||||
- attack.t1047
|
||||
logsource:
|
||||
category: image_loaded
|
||||
category: image_load
|
||||
product: windows
|
||||
service: sysmon
|
||||
detection:
|
||||
selection:
|
||||
Image:
|
||||
+1
-2
@@ -15,9 +15,8 @@ tags:
|
||||
- attack.credential_access
|
||||
- attack.t1003
|
||||
logsource:
|
||||
category: image_loaded
|
||||
category: image_load
|
||||
product: windows
|
||||
service: sysmon
|
||||
detection:
|
||||
signedprocess:
|
||||
ImageLoaded|endswith:
|
||||
+1
-2
@@ -15,9 +15,8 @@ tags:
|
||||
- attack.t1038
|
||||
- attack.t1112
|
||||
logsource:
|
||||
category: image_loaded
|
||||
category: image_load
|
||||
product: windows
|
||||
service: sysmon
|
||||
detection:
|
||||
selection:
|
||||
Image:
|
||||
+1
-2
@@ -10,9 +10,8 @@ tags:
|
||||
- attack.credential_access
|
||||
- attack.t1003
|
||||
logsource:
|
||||
category: image_loaded
|
||||
category: image_load
|
||||
product: windows
|
||||
service: sysmon
|
||||
detection:
|
||||
selection:
|
||||
Image|endswith: '\lsass.exe'
|
||||
+1
-2
@@ -11,9 +11,8 @@ tags:
|
||||
- attack.execution
|
||||
- attack.t1047
|
||||
logsource:
|
||||
category: image_loaded
|
||||
category: image_load
|
||||
product: windows
|
||||
service: sysmon
|
||||
detection:
|
||||
selection:
|
||||
ImageLoaded|endswith:
|
||||
-1
@@ -12,7 +12,6 @@ tags:
|
||||
logsource:
|
||||
cqtegory: image_loaded
|
||||
product: windows
|
||||
service: sysmon
|
||||
detection:
|
||||
selection:
|
||||
Image: 'C:\Windows\System32\wbem\WmiPrvSE.exe'
|
||||
@@ -12,7 +12,6 @@ tags:
|
||||
logsource:
|
||||
category: network_connection
|
||||
product: windows
|
||||
service: sysmon
|
||||
definition: 'Use the following config to generate the necessary Event ID 10 Process Access events: <ProcessAccess onmatch="include"><CallTrace condition="contains">VBE7.DLL</CallTrace></ProcessAccess><ProcessAccess onmatch="exclude"><CallTrace condition="excludes">UNKNOWN</CallTrace></ProcessAccess>'
|
||||
detection:
|
||||
selection:
|
||||
|
||||
@@ -12,7 +12,6 @@ author: EagleEye Team
|
||||
logsource:
|
||||
category: network_connection
|
||||
product: windows
|
||||
service: sysmon
|
||||
date: 2020/05/14
|
||||
detection:
|
||||
selection:
|
||||
|
||||
@@ -13,7 +13,6 @@ tags:
|
||||
logsource:
|
||||
category: network_connection
|
||||
product: windows
|
||||
service: sysmon
|
||||
detection:
|
||||
selection:
|
||||
Image: '*\powershell.exe'
|
||||
|
||||
@@ -14,7 +14,6 @@ tags:
|
||||
logsource:
|
||||
category: network_connection
|
||||
product: windows
|
||||
service: sysmon
|
||||
detection:
|
||||
selection:
|
||||
Image: '*\svchost.exe'
|
||||
|
||||
@@ -12,7 +12,6 @@ tags:
|
||||
logsource:
|
||||
category: network_connection
|
||||
product: windows
|
||||
service: sysmon
|
||||
detection:
|
||||
selection:
|
||||
DestinationPort:
|
||||
|
||||
@@ -13,7 +13,6 @@ tags:
|
||||
logsource:
|
||||
category: network_connection
|
||||
product: windows
|
||||
service: sysmon
|
||||
detection:
|
||||
selection:
|
||||
Image: '*\rundll32.exe'
|
||||
|
||||
@@ -9,7 +9,6 @@ date: 2017/03/19
|
||||
logsource:
|
||||
category: network_connection
|
||||
product: windows
|
||||
service: sysmon
|
||||
definition: 'Use the following config to generate the necessary Event ID 3 Network Connection events'
|
||||
detection:
|
||||
selection:
|
||||
|
||||
@@ -13,7 +13,6 @@ tags:
|
||||
logsource:
|
||||
category: network_connection
|
||||
product: windows
|
||||
service: sysmon
|
||||
detection:
|
||||
selection:
|
||||
DestinationPort: 3389
|
||||
|
||||
@@ -13,7 +13,6 @@ tags:
|
||||
logsource:
|
||||
category: network_connection
|
||||
product: windows
|
||||
service: sysmon
|
||||
detection:
|
||||
selection:
|
||||
DestinationPort: 88
|
||||
|
||||
@@ -13,7 +13,6 @@ tags:
|
||||
logsource:
|
||||
category: network_connection
|
||||
product: windows
|
||||
service: sysmon
|
||||
detection:
|
||||
selection:
|
||||
Initiated: 'true'
|
||||
|
||||
@@ -13,7 +13,6 @@ tags:
|
||||
logsource:
|
||||
category: network_connection
|
||||
product: windows
|
||||
service: sysmon
|
||||
detection:
|
||||
selection:
|
||||
Initiated: 'true'
|
||||
|
||||
@@ -25,7 +25,6 @@ level: high
|
||||
---
|
||||
logsource:
|
||||
product: windows
|
||||
service: sysmon
|
||||
category: registry_event
|
||||
detection:
|
||||
# Registry Object Add
|
||||
|
||||
@@ -19,7 +19,6 @@ tags:
|
||||
logsource:
|
||||
category: process_access
|
||||
product: windows
|
||||
service: sysmon
|
||||
detection:
|
||||
selection:
|
||||
TargetImage|endswith: '\lsass.exe'
|
||||
|
||||
@@ -16,7 +16,6 @@ tags:
|
||||
logsource:
|
||||
category: process_access
|
||||
product: windows
|
||||
service: sysmon
|
||||
detection:
|
||||
selection_01:
|
||||
CallTrace:
|
||||
|
||||
@@ -13,7 +13,6 @@ tags:
|
||||
logsource:
|
||||
category: process_access
|
||||
product: windows
|
||||
service: sysmon
|
||||
detection:
|
||||
selection:
|
||||
TargetImage: '*\windows\system32\svchost.exe'
|
||||
|
||||
@@ -13,7 +13,6 @@ tags:
|
||||
logsource:
|
||||
category: process_access
|
||||
product: windows
|
||||
service: sysmon
|
||||
detection:
|
||||
selection:
|
||||
TargetImage: 'C:\windows\system32\lsass.exe'
|
||||
|
||||
@@ -13,7 +13,6 @@ date: 2017/03/04
|
||||
logsource:
|
||||
category: process_access
|
||||
product: windows
|
||||
service: sysmon
|
||||
definition: 'Use the following config to generate the necessary Event ID 10 Process Access events: <ProcessAccess onmatch="include"><CallTrace condition="contains">VBE7.DLL</CallTrace></ProcessAccess><ProcessAccess onmatch="exclude"><CallTrace condition="excludes">UNKNOWN</CallTrace></ProcessAccess>'
|
||||
detection:
|
||||
selection:
|
||||
|
||||
@@ -9,7 +9,6 @@ date: 2019/05/20
|
||||
logsource:
|
||||
category: process_access
|
||||
product: windows
|
||||
service: sysmon
|
||||
detection:
|
||||
selection:
|
||||
TargetImage: 'C:\windows\system32\lsass.exe'
|
||||
|
||||
@@ -11,7 +11,6 @@ date: 2019/04/14
|
||||
logsource:
|
||||
category: registry_event
|
||||
product: windows
|
||||
service: sysmon
|
||||
detection:
|
||||
selection:
|
||||
TargetObject:
|
||||
|
||||
@@ -27,7 +27,6 @@ level: critical
|
||||
logsource:
|
||||
category: registry_event
|
||||
product: windows
|
||||
service: sysmon
|
||||
detection:
|
||||
selection1:
|
||||
TargetObject:
|
||||
|
||||
@@ -13,7 +13,6 @@ author: Victor Sergeev, Daniil Yugoslavskiy, oscd.community
|
||||
logsource:
|
||||
category: registry_event
|
||||
product: windows
|
||||
service: sysmon
|
||||
detection:
|
||||
selection:
|
||||
|
||||
|
||||
@@ -26,7 +26,6 @@ level: high
|
||||
logsource:
|
||||
category: process_creation,registry_event
|
||||
product: windows
|
||||
service: sysmon
|
||||
detection:
|
||||
# Registry Object Add
|
||||
selection2:
|
||||
|
||||
@@ -16,7 +16,6 @@ tags:
|
||||
logsource:
|
||||
category: registry_event
|
||||
product: windows
|
||||
service: sysmon
|
||||
detection:
|
||||
selection:
|
||||
|
||||
|
||||
-1
@@ -13,7 +13,6 @@ modified: 2019/11/13
|
||||
logsource:
|
||||
category: registry_event
|
||||
product: windows
|
||||
service: sysmon
|
||||
detection:
|
||||
selection:
|
||||
- EventID: 12 # key create
|
||||
|
||||
@@ -26,7 +26,6 @@ level: high
|
||||
---
|
||||
logsource:
|
||||
product: windows
|
||||
service: sysmon
|
||||
category: registry_event
|
||||
detection:
|
||||
dnsregmod:
|
||||
|
||||
@@ -30,7 +30,6 @@ detection:
|
||||
logsource:
|
||||
category: registry_event
|
||||
product: windows
|
||||
service: sysmon
|
||||
detection:
|
||||
selection:
|
||||
TargetObject|contains: Services\WCESERVICE\Start
|
||||
|
||||
@@ -13,7 +13,6 @@ modified: 2019/11/10
|
||||
logsource:
|
||||
category: registry_event
|
||||
product: windows
|
||||
service: sysmon
|
||||
detection:
|
||||
selection1:
|
||||
EventType: DeleteValue
|
||||
|
||||
@@ -15,7 +15,6 @@ modified: 2019/11/13
|
||||
logsource:
|
||||
category: registry_event
|
||||
product: windows
|
||||
service: sysmon
|
||||
detection:
|
||||
selection:
|
||||
- EventID:
|
||||
|
||||
@@ -14,7 +14,6 @@ modified: 2019/11/13
|
||||
logsource:
|
||||
category: registry_event
|
||||
product: windows
|
||||
service: sysmon
|
||||
detection:
|
||||
selection:
|
||||
- TargetObject:
|
||||
|
||||
-1
@@ -13,7 +13,6 @@ date: 2019/10/26
|
||||
modified: 2019/11/11
|
||||
logsource:
|
||||
product: windows
|
||||
service: sysmon
|
||||
category: registry_event
|
||||
detection:
|
||||
selection:
|
||||
|
||||
@@ -13,7 +13,6 @@ tags:
|
||||
logsource:
|
||||
category: registry_event
|
||||
product: windows
|
||||
service: sysmon
|
||||
detection:
|
||||
selection:
|
||||
TargetObject|endswith:
|
||||
|
||||
@@ -8,7 +8,6 @@ author: Samir Bousseaden
|
||||
logsource:
|
||||
category: registry_event
|
||||
product: windows
|
||||
service: sysmon
|
||||
detection:
|
||||
selection_reg:
|
||||
TargetObject:
|
||||
|
||||
@@ -13,7 +13,6 @@ tags:
|
||||
logsource:
|
||||
category: registry_event
|
||||
product: windows
|
||||
service: sysmon
|
||||
detection:
|
||||
selection:
|
||||
EventType: 'CreateKey' # don't want DeleteKey events
|
||||
|
||||
@@ -12,7 +12,6 @@ tags:
|
||||
logsource:
|
||||
category: registry_event
|
||||
product: windows
|
||||
service: sysmon
|
||||
detection:
|
||||
selection: # Detect new COM servers in the user hive
|
||||
TargetObject: 'HKU\\*_Classes\CLSID\\*\InProcServer32\(Default)'
|
||||
|
||||
@@ -14,7 +14,6 @@ tags:
|
||||
logsource:
|
||||
category: registry_event
|
||||
product: windows
|
||||
service: sysmon
|
||||
detection:
|
||||
selection:
|
||||
TargetObject|contains: 'TrustRecords'
|
||||
|
||||
@@ -13,7 +13,6 @@ date: 2019/01/18
|
||||
logsource:
|
||||
category: registry_event
|
||||
product: windows
|
||||
service: sysmon
|
||||
detection:
|
||||
selection_registry:
|
||||
TargetObject:
|
||||
|
||||
@@ -22,7 +22,6 @@ level: critical
|
||||
logsource:
|
||||
category: registry_event
|
||||
product: windows
|
||||
service: sysmon
|
||||
detection:
|
||||
selection_registry:
|
||||
TargetObject:
|
||||
|
||||
@@ -12,7 +12,6 @@ tags:
|
||||
logsource:
|
||||
category: registry_event
|
||||
product: windows
|
||||
service: sysmon
|
||||
detection:
|
||||
selection:
|
||||
Image:
|
||||
|
||||
@@ -9,7 +9,6 @@ references:
|
||||
logsource:
|
||||
category: registry_event
|
||||
product: windows
|
||||
service: sysmon
|
||||
detection:
|
||||
selection:
|
||||
TargetObject: '*\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run'
|
||||
|
||||
@@ -13,7 +13,6 @@ modified: 2020/05/24
|
||||
logsource:
|
||||
category: registry_event
|
||||
product: windows
|
||||
service: sysmon
|
||||
detection:
|
||||
selection:
|
||||
TargetObject:
|
||||
|
||||
@@ -12,7 +12,6 @@ tags:
|
||||
logsource:
|
||||
category: registry_event
|
||||
product: windows
|
||||
service: sysmon
|
||||
detection:
|
||||
selection_1:
|
||||
|
||||
|
||||
@@ -11,7 +11,6 @@ modified: 2019/10/15
|
||||
logsource:
|
||||
category: registry_event
|
||||
product: windows
|
||||
service: sysmon
|
||||
definition: 'Requirements: Sysmon config that monitors \Keyboard Layout\Preload subkey of the HKLU hives - see https://github.com/SwiftOnSecurity/sysmon-config/pull/92/files'
|
||||
detection:
|
||||
selection_registry:
|
||||
|
||||
@@ -16,7 +16,6 @@ level: low
|
||||
---
|
||||
logsource:
|
||||
product: windows
|
||||
service: sysmon
|
||||
category: registry_event
|
||||
detection:
|
||||
selection1:
|
||||
|
||||
@@ -9,7 +9,6 @@ author: Florian Roth
|
||||
date: 2017/03/19
|
||||
logsource:
|
||||
product: windows
|
||||
service: sysmon
|
||||
category: registry_event
|
||||
detection:
|
||||
methregistry:
|
||||
|
||||
@@ -9,7 +9,6 @@ date: 2017/03/17
|
||||
logsource:
|
||||
category: registry_event
|
||||
product: windows
|
||||
service: sysmon
|
||||
detection:
|
||||
selection:
|
||||
# usrclass.dat is mounted on HKU\USERSID_Classes\...
|
||||
|
||||
@@ -8,7 +8,6 @@ author: Karneades
|
||||
logsource:
|
||||
category: registry_event
|
||||
product: windows
|
||||
service: sysmon
|
||||
detection:
|
||||
selection_reg1:
|
||||
TargetObject:
|
||||
|
||||
@@ -29,7 +29,7 @@ logsources:
|
||||
product: windows
|
||||
service: sysmon
|
||||
file_creation:
|
||||
category: file_creation
|
||||
category: file_event
|
||||
product: windows
|
||||
conditions:
|
||||
EventID: 11
|
||||
@@ -45,7 +45,7 @@ logsources:
|
||||
product: windows
|
||||
service: sysmon
|
||||
image_loaded:
|
||||
category: image_loaded
|
||||
category: image_load
|
||||
product: windows
|
||||
conditions:
|
||||
EventID: 7
|
||||
@@ -53,7 +53,7 @@ logsources:
|
||||
product: windows
|
||||
service: sysmon
|
||||
driver_loaded:
|
||||
category: driver_loaded
|
||||
category: driver_load
|
||||
product: windows
|
||||
conditions:
|
||||
EventID: 6
|
||||
|
||||
Reference in New Issue
Block a user