- Title
- Table of Contents
- Acknowledgement(s)
- Description
- Versions History
- File Metadata
- Common CommandLine
- Threat Actor Ops (TAOps)
- Common Process Trees
- Default Install Location
- DFIR Artifacts
- Examples In The Wild
- Documentation
- Blogs / Reports References
- ATT&CK Techniques
- Telemetry
- Detection Validation
- Detection Rules
- LOLBAS / GTFOBins References
- Name - @Social_Handle
Sample Description Source
Version | SHA1 | VT |
---|---|---|
X.XX | 0000000000000000000000000000000000000000 | LINK |
- TBD
xxxxx.exe -arg1
xxxxx.exe -arg2
xxxxx.exe -arg3
Insert commands executed by threat actors or malware
.
└── parent.exe
└── child.exe
X:\XXXXX\XXXX\XXXX.exe
- TBD
- TBD
- Format (Splunk/Sigma/Elastic/Other)
- Rule Title