heroui logo

File and Directory Discovery

Elastic Detection Rules

View Source
Summary
This rule detects enumeration of files and directories using built-in Windows tools, specifically when commands are executed to discover valuable files or system information. It focuses on monitoring for specific commands ('dir' and 'tree.com') that are indicative of such activities. The rule triggers on the execution of these commands from any process, specifically within a one-minute window. False positives are possible since non-malicious scripts or normal user activity might generate similar command usage. Analysts are advised to investigate the context and user behavior surrounding the alerts to determine if actual malicious activity is occurring. This rule aligns with the MITRE ATT&CK framework under the technique 'File and Directory Discovery' (T1083).
Categories
  • Windows
  • Endpoint
Data Sources
  • Process
  • Command
  • Application Log
ATT&CK Techniques
  • T1083
Created: 2020-12-04