Skip to content

Commit 30c2337

Browse files
author
ionstorm
committed
Add Spear Phishing detection, add @twitter tagging
1 parent dac2f47 commit 30c2337

File tree

1 file changed

+6
-2
lines changed

1 file changed

+6
-2
lines changed

sysmonconfig-export.xml

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,8 +4,8 @@
44
_\ \/ // (_-</ ' \/ _ \/ _ \ / __ |/ / / / > _/_ _/ /__/ ,<
55
/___/\_, /___/_/_/_/\___/_//_/ /_/ |_/_/ /_/ |_____/ \___/_/|_|
66
/___/
7-
Author: ionstorm
8-
Contributors: NerbalOne
7+
Author: @ionstorm
8+
Contributors: @NerbalOne
99
Project: https://github.com/ion-storm/sysmon-config
1010
License: Creative Commons Attribution 4.0 | You may privatize, fork, edit, teach, publish, or deploy for commercial use - with attribution in the text.
1111
Methodology: Detect the most Techniques per data source in MITRE ATT&CK.
@@ -9643,6 +9643,10 @@
96439643
<TargetFilename condition="begin with">C:\Users\</TargetFilename>
96449644
<TargetFilename condition="contains">\Downloads</TargetFilename>
96459645
</Rule>
9646+
<Rule name="Attack=T1566.001,Technique=Phishing: Spear Phishing Attachment,Tactic=Initial Access,DS=Process: Process Creation,Level=0,Alert=Executed files within Outlook Attachments,Risk=30" groupRelation="and">
9647+
<Image condition="begin with">C:\Users\</Image>
9648+
<Image condition="contains">Content.Outlook</Image>
9649+
</Rule>
96469650
<Rule name="Attack=T1036.008,Technique=Masquerading: Masquerade File Type,Tactic=Defense Evasion,DS=File: File Creation,Level=4,Alert=Pe File Detected under Unusual File extension,Risk=10" groupRelation="or">
96479651
<TargetFilename condition="not end with">.exe</TargetFilename>
96489652
<TargetFilename condition="not end with">.dll</TargetFilename>

0 commit comments

Comments
 (0)