Detecting discovery commands using MITRE Caldera and Splunk

With this information, we can head over to our Splunk instance to check if we have any logs related to the discovery of antivirus programs.

It looks like we have a few Sysmon logs from our Windows machine, which we can use to help build a detection for this technique.

Using the Sigma extension in VSCode, we can create a new Sigma rule based on what we observed in Splunk.

Select “Sigma converter” to convert the query to a new backend.

Head on over to the next blog to see how we can utilize CI/CD to send this query to our GitHub repository.


By