Wazuh rule
<rule id="100002" level="10">
<if_group>sysmon_event1</if_group>
<field name="win.eventdata.originalFileName" type="pcre2">(?i)mimikatz\.exe</field>
<description>Mimikatz usage detected.</description>
<mitre>
<id>T1003</id>
</mitre>
</rule> Adding rules
Last updated