Skip to content

Latest commit

 

History

History
40 lines (33 loc) · 1.33 KB

MATCH-S00167.md

File metadata and controls

40 lines (33 loc) · 1.33 KB

Rules: Recon Using Common Windows Commands

Description

Detects a set of commands often used in recon stages by different attack groups

Additional Details

Detail Value
Type Templated Match
Category Discovery
Apply Risk to Entities device_hostname, user_username
Signal Name Recon Using Common Windows Commands
Summary Expression Detected reconnaissance activity on host: {{device_hostname}}
Score/Severity Static: 1
Enabled by Default True
Prototype False
Tags _mitreAttackTactic:TA0007, _mitreAttackTechnique:T1018

Vendors and Products

Fields Used

Origin Field
Normalized Schema baseImage
Normalized Schema commandLine
Normalized Schema device_hostname
Normalized Schema file_path
Normalized Schema listMatches
Normalized Schema lower
Normalized Schema parentBaseImage
Normalized Schema user_username