ATT&CK coverage › Technique

Network Sniffing T1040

Adversaries may passively sniff network traffic to capture information about an environment, including authentication material passed over the network. Network sniffing refers to using the network interface on a system to monitor or capture information sent over a wired or wireless connection. An adversary may place a network interface into promiscuous mode to passively access data in transit over the network, or use span ports to capture a larger amount of data.

Events covered

4 catalog events are tagged with this technique by at least one rule.

ProviderEvent IDTitle
Sysmon1Process creation
Security-Auditing4688A new process has been created.
Security-Auditing4697A service was installed in the system.
PowerShell4104Creating Scriptblock text (MessageNumber of MessageTotal).

Authoring guide

Patterns shared across the 7 rules above: which fields they filter on, what specific values they look for, and what they exclude. Field names are normalized across vendors so Sigma's Image, Elastic's process.name, and Splunk's process_name collapse into one row. Each rule contributes at most once per row.

Fields filtered most (5 distinct)

The fields most rules look at when detecting this technique. The How column shows the operators authors use (eq, wildcard, regex_match, match) and how often each appears. Sample values are concrete examples to start from, not an exhaustive list.

FieldRulesHowSample values
Image4ends_with 4\netsh.exe, \pktmon.exe, \windump.exe, \tshark.exe
OriginalFileName3eq 3netsh.exe, PktMon.exe
CommandLine3match 3wlan, s, p, trace, start
ScriptBlockText1match 1Start-NetEventSession
ServiceFileName1match 1npcap, ndiscap, USBPcap

Top indicator values (24 distinct)

Specific (field, operator, value) combinations the rules check for, ranked by how many rules under this technique use each one. The Corpus reach column counts how many rules across the entire catalog (any technique) check the same combination. High numbers point to widely-used indicators that are likely noisy on their own; combine them with another condition for useful signal. Blank means the combination is specific to rules under this technique.

FieldKindValueRules (here)Corpus reach
Imageends_with\netsh.exe216
OriginalFileNameeqnetsh.exe214
CommandLinematchwlan1
CommandLinematch s1
CommandLinematch=clear1
CommandLinematch p12
CommandLinematch k1
CommandLinematchstart16
CommandLinematchtrace12
OriginalFileNameeqPktMon.exe1
Imageends_with\pktmon.exe1
Imageends_with\tshark.exe1
CommandLinematch-i16
Imageends_with\windump.exe1
ScriptBlockTextmatchStart-NetEventSession1
ServiceFileNamematchnmnt1
ServiceFileNamematchnpf1
ServiceFileNamematchnpcap1
ServiceFileNamematchndiscap1
ServiceFileNamematchpcap1

Rules under this technique

Every rule in the catalog tagged with this technique, grouped by vendor. Click a rule title for its full predicates, exclusions, and indicators.

Sigma 6 rules

Kusto Query Language 1 rule