Identifies and monitors the suspicious use of legitimate Windows system binaries used in fileless attacks and defense evasion.
This skill provides a comprehensive framework for detecting 'Living Off the Land' (LotL) techniques by monitoring anomalous behavior in trusted Windows binaries (LOLBins). It includes specialized Sysmon configurations, Sigma detection rules for SIEM integration, and Python-based log analysis scripts to correlate process creation, network activity, and parent-child relationships. By focusing on execution context rather than binary presence alone, it helps security teams identify sophisticated threats that bypass traditional antivirus by utilizing built-in OS tools like certutil, mshta, and regsvr32.
主な機能
01Python scripts for automated log analysis and pattern matching
02Context-aware analysis to minimize false positives in admin environments
03Sigma-compliant detection rules for cross-platform SIEM integration
040 GitHub stars
05MITRE ATT&CK mapping for detected techniques (e.g., T1218, T1105)
06Pre-configured Sysmon XML rules for LOLBin monitoring
ユースケース
01Developing real-time detection rules for SIEM or EDR platforms
02Hardening endpoint security policies by identifying dangerous binary usage
03Threat hunting for fileless attack indicators in endpoint telemetry