Detection rules › By event
Microsoft-Windows-Sysmon event 15
Sigma (9)
- Creation Of a Suspicious ADS File Outside a Browser Download
- Exports Registry Key To an Alternate Data Stream
- HackTool Named File Stream Created
- Hidden Executable In NTFS Alternate Data Stream
- Potential Suspicious Winget Package Installation
- Potentially Suspicious File Download From ZIP TLD
- Suspicious File Download From File Sharing Websites - File Stream
- Unusual File Download from Direct IP Address
- Unusual File Download From File Sharing Websites - File Stream