You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Problem: The specific attack for a particular command line is not shown, how to find the corresponding attack on the server side when viewing logs?
#3000
Open
subvert0r opened this issue
Nov 29, 2024
· 1 comment
I am trying to collect attack logs on a Elastic server side from a client machine that I ran atomic on (Windows 10 client), but the problem is, when viewing process creations and their command lines, it's not obvious which attack a particular command line is, meaning it's GUID or at least a Mitre ID.
Is there anyway that I can change atomic so it would somehow put the GUID of the attack or something relate to a particular attack inside the command line of a process, for example echo or something?
The text was updated successfully, but these errors were encountered:
In Elastic (Kibana Discover), search for all logs whose process ID or logs whose parent process ID is the same as that atomic test's PID, with the KQL query
process.pid : <PID> OR process.parent.pid : <PID>
You can confirm the correct logs by searching the field process.command_line in each log.
I am trying to collect attack logs on a Elastic server side from a client machine that I ran atomic on (Windows 10 client), but the problem is, when viewing process creations and their command lines, it's not obvious which attack a particular command line is, meaning it's GUID or at least a Mitre ID.
Is there anyway that I can change atomic so it would somehow put the GUID of the attack or something relate to a particular attack inside the command line of a process, for example echo or something?
The text was updated successfully, but these errors were encountered: