Techniques
Sample rules
File and Directory Discovery
- source: elastic
- technicques:
- T1083
Description
Enumeration of files and directories using built-in tools. Adversaries may use the information discovered to plan follow-on activity.
Detection logic
sequence by agent.id, user.name with maxspan=1m
[process where event.type in ("start", "process_started") and
((process.name : "cmd.exe" or process.pe.original_file_name == "Cmd.Exe") and process.args : "dir") or
process.name : "tree.com"]
[process where event.type in ("start", "process_started") and
((process.name : "cmd.exe" or process.pe.original_file_name == "Cmd.Exe") and process.args : "dir") or
process.name : "tree.com"]
[process where event.type in ("start", "process_started") and
((process.name : "cmd.exe" or process.pe.original_file_name == "Cmd.Exe") and process.args : "dir") or
process.name : "tree.com"]