Nice — here’s a compact, practical reference you can use for detection, hunting and response: what IoCs are, the common attack patterns they map to (MITRE ATT&CK), concrete observables to watch for, example rules/queries (Sigma, YARA, Splunk, KQL) and an operational checklist / quick playbook.
An IoC is a technical observable (or a logical pattern of observables) that, when seen in your environment, suggests malicious activity or compromise — e.g., a file hash, IP address, domain, suspicious process parent/child relationship, registry key, YARA signature, etc. IoCs are most useful when enriched with context (who, where, time, threat actor & campaign).
These are the recurring attacker behaviors you should model detectors and hunts around:
Use the MITRE ATT&CK matrix to map techniques to detections and controls.
Network
%TEMP%\<random>.exe, C:\Windows\Tasks\* created by non-admin user)explorer.exe spawning cmd.exe with encoded args)(Cloud-specific IoCs also include IAM policy changes, suspicious API calls, new external storage buckets, and unusual console logins).
(Use an EDR + central SIEM to collect these)
Sigma (conceptual Sigma rule — adapt to your SIEM)
title: Suspicious PowerShell Encoded Command
logsource:
product: windows
service: sysmon
detection:
selection:
EventID: 1
Image|endswith: '\powershell.exe'
CommandLine|contains: '-EncodedCommand'
condition: selection
level: high
(Translate Sigma to Splunk/Elastic using your toolchain.)
YARA (simple example)
rule Suspicious_Dropper_String {
meta:
author = "Analyst"
description = "Detects suspicious dropper string"
strings:
$s1 = "CreateRemoteThread" ascii
$s2 = "VirtualAllocEx" ascii
condition:
(any of ($s*))
}
(Use YARA on file stores / malware sandboxes.)
Splunk example (hunt for Office spawning cmd with URL)
index=wineventlog EventCode=1 AND Image="*\\WINWORD.EXE"
| search CommandLine="*http*"
| table _time, host, User, Image, ParentImage, CommandLine, DestinationIp
Elastic/KQL example (processes making external connections)
process.name: "powershell.exe" and network.direction: "outbound" and not process.parent.name: "explorer.exe"
Copyright © 2026 | WordPress Theme by MH Themes
Be the first to comment