--- Name: Binary.exe Description: Something general about the binary Aliases: # Optional field if any common aliases exist of the binary with nearly the same functionality, - Alias: Binary64.exe # but for example, is built for different architecture. Author: The name of the person that created this file Created: 1970-01-01 # YYYY-MM-DD (date the person created this file) Commands: - Command: The command Description: Description of the command Usecase: A description of the usecase Category: Execute Privileges: Required privs MitreID: T1055 OperatingSystem: Windows 10 1803, Windows 10 1703 - Command: The second command Description: Description of the second command Usecase: A description of the usecase Category: AWL Bypass Privileges: Required privs MitreID: T1033 OperatingSystem: Windows 10 All Full_Path: - Path: c:\windows\system32\bin.exe - Path: c:\windows\syswow64\bin.exe Code_Sample: - Code: http://example.com/git.txt Detection: - IOC: Event ID 10 - IOC: binary.exe spawned - Analysis: https://example.com/to/blog/gist/writeup/if/applicable - Sigma: https://example.com/to/sigma/rule/if/applicable - Elastic: https://example.com/to/elastic/rule/if/applicable - Splunk: https://example.com/to/splunk/rule/if/applicable - BlockRule: https://example.com/to/microsoft/block/rules/if/applicable Resources: - Link: http://blogpost.com - Link: http://twitter.com/something - Link: http://example.com/Threatintelreport Acknowledgement: - Person: John Doe Handle: '@johndoe' - Person: Ola Norman Handle: '@olaNor'