Skip to content

Commit 34b37c0

Browse files
austinsongergithub-actions[bot]
authored andcommitted
[Rule Tuning] Mimikatz powershell module activity detected (#1297)
* update query * add indexes (cherry picked from commit 95e6458)
1 parent f0514de commit 34b37c0

File tree

1 file changed

+4
-6
lines changed

1 file changed

+4
-6
lines changed

rules/windows/credential_access_mimikatz_powershell_module.toml

Lines changed: 4 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
[metadata]
22
creation_date = "2020/12/07"
33
maturity = "development"
4-
updated_date = "2021/05/10"
4+
updated_date = "2021/06/17"
55

66
[rule]
77
author = ["Elastic"]
@@ -11,10 +11,10 @@ other features that make it useful for testing the security of networks. This ru
1111
PowerShell command.
1212
"""
1313
from = "now-9m"
14-
index = ["logs-endpoint.events.*"]
14+
index = ["logs-endpoint.events.*", "winlogbeat-*", "logs-windows.*"]
1515
language = "eql"
1616
license = "Elastic License v2"
17-
name = "Mimikatz Powershell Module Activity Detected"
17+
name = "Mimikatz Powershell Module Activity"
1818
note = """## Triage and analysis
1919
2020
This rule identifies an adversary attempt to collect, decrypt, and/or use cached credentials. Alerts from this rule should be prioritized because an adversary has an initial foothold onto an endpoint."""
@@ -27,11 +27,10 @@ timestamp_override = "event.ingested"
2727
type = "eql"
2828

2929
query = '''
30-
process where event.type in ("start", "process_started") and process.name in ("cmd.exe", "powershell.exe")
30+
process where event.type in ("start", "process_started") and process.name : ("cmd.exe", "powershell.exe", "pwsh.exe")
3131
and process.args : ("*DumpCreds", "*Mimikatz*")
3232
'''
3333

34-
3534
[[rule.threat]]
3635
framework = "MITRE ATT&CK"
3736
[[rule.threat.technique]]
@@ -44,4 +43,3 @@ reference = "https://attack.mitre.org/techniques/T1003/"
4443
id = "TA0006"
4544
name = "Credential Access"
4645
reference = "https://attack.mitre.org/tactics/TA0006/"
47-

0 commit comments

Comments
 (0)