Repository of sentinel alerts and hunting queries leveraging sysmon and the MITRE ATT&CK framework


Sentinel ATT&CK aims to simplify the rapid deployment of a threat hunting capability that leverages Sysmon and MITRE ATT&CK on Azure Sentinel.

DISCLAIMER: This tool is not a magic bullet. It will require tuning and real investigative work to be truly effective in your environment.


Sentinel ATT&CK provides the following set of tools:


Head over to the WIKI to learn how to deploy and run Sentinel ATT&CK.

A copy of the DEF CON 27 cloud village presentation introducing Sentinel ATT&CK can be found here and here.

Sentinel ATT&CK test lab

Within the lab folder a terraform script is provided to automate the deployment of a testing lab.

Please note: the terraform script deploys a highly insecure test environment. It is not meant to be used in production and the environment should be destroyed immediately after use.

The terraform script provisions:

  • An Azure Sentinel instance
  • A Windows 10 virtual machine (PC1)
  • A Windows Server 2012 Active Directory domain controller (DC1)
  • Post-deployment scripts to install and configure sysmon on PC1
  • Post-deployment scripts to install and configure Active Directory on DC1


  1. Install/configure/authenticate Terraform following these Microsoft docs.
  2. Create a variables.tfvars file in the lab directory, using the variables.tfvars.txt file as a template and making sure to complete all fields.The variables.tfvars file is the heart of the terraform playbook and it allows:
    • To specify authentication credentials (the file is ignored by git)
    • To define the lab name, active directory domain and provisioning location (eg. west us)
    • To define workstation and server accounts
    • To define workstation and server names, vm sizes and image configurations
  3. Add administrator password, lab domain and lab netbios name to your create-ad.ps1 script
  4. Add administrator username, password and lab domain to the install-utilities.ps1 script
  5. Run the following command:terraform init
  6. Run the following command:terraform apply --var-file="variables.tfvars"

    Note: You can safely ignore the deprecation warnings from terraform

  7. After deployment, if you intend to keep the lab running for a sustained period of time, you should run the following two clean-up commands:terraform destroy -target azurerm_storage_blob.utilsblob

    terraform destroy -target azurerm_storage_blob.adblob

  8. The lab can be destroyed at any moment by running the following command:terraform deploy --var-file="variables.tfvars"

As a next step you should onboard Sysmon data into Sentinel.

Onboarding sysmon data to Azure Sentinel

This is a quick, super terse guide to onboarding Sysmon data to Azure Sentinel. At the end of this guide you'll have a basic, yet functioning Sentinel lab to test out the detection rules provided in this repository.

  • Step 1: Provision a Windows 10 virtual machine (or machines) in your Azure environment.You can follow microsoft's official documentation or use the included terraform deployment script to quickly provision a lab. If you use the terraform script create a variables.tfvars file in the root directory, using the variables.tfvars.txt file as a template and making sure to complete all fields.
  • Step 2: Provision a log analytics workspace

    NOTE: If during step 1 you have deployed your lab using the included terraform deployment script you can skip this step.

    The second step is to provision a log analytics workspace into which an Azure Sentinel will be deployed

  • Step 3: Deploy an Azure Sentinel instanceNOTE: If during step 1 you have deployed your lab using the included terraform deployment script you can skip this step.

    The third step is to deploy the Azure Sentinel SIEM instance

    View demo

  • Step 4: Install Sysmon and load the provided sysmon configuration file on virtual machinesNOTE: If during step 1 you have deployed your lab using the included terraform deployment script you can skip this step.

    In order for the virtual machines in your lab/network to send the correct data to Sentinel you must:

    1. Install Sysmon on the virtual machines to monitor; to do so follow the official documentation
    2. Download the provided sysmon configuration file on the virtual machines to monitor
    3. Load the conguration file by executing the following command within the directory containing sysmonconfig.xmlsysmon -c sysmonconfig.xml
  • Step 5: Enable security eventsThe fifth step is to enable the collection of security events

    View demo

  • Step 6: Activate windows event logs as data sourcesThe sixth step is to activate the collection of the correct event logs. The correct event logs are:
    • Application
    • Microsoft-Windows-Sysmon/Operational
    • Microsoft-Windows-WMI-Activity/Operational
    • System

    Note that Microsoft-Windows-Sysmon/Operational does not appear in the drop down menu. You must hit enter after inputting the data source to add it to the list

    View demo

  • Step 7: Connect Virtual Machine(s) to SentinelThe seventh step is to connect the virtual machine to Sentinel to being collecting sysmon data

    View demo

  • Step 8: Check Sysmon data transmissionThe eighth step is to check that sysmon data is correctly being forwarded to sentinel, the following Kusto Query can be run to verify the correct transmission of sysmon data:
      Event | where Source == "Microsoft-Windows-Sysmon" | limit 20

    Note that at this stage raw, unparsed data is being sent to sentinel

    View demo

  • Step 9: Install Sysmon event parserThe final step is to install the parser to ensure Sysmon events are stored and parsed according to the OSSEM standard and to allow for compatibility with the repository's detection rules.

    View demo

Next, you should install the ATT&CK telemetry dashboard.


As this repository is constantly being updated and worked on, if you spot any problems we warmly welcome pull requests or submissions on the issue tracker.

Authors and contributors

Sentinel ATT&CK is built with ❤ by:

  • Edoardo Gerosa Twitter Follow

Special thanks go to the following contributors:

More at:

March 19, 2020


Hakin9 TEAM
Hakin9 is a monthly magazine dedicated to hacking and cybersecurity. In every edition, we try to focus on different approaches to show various techniques - defensive and offensive. This knowledge will help you understand how most popular attacks are performed and how to protect your data from them. Our tutorials, case studies and online courses will prepare you for the upcoming, potential threats in the cyber security world. We collaborate with many individuals and universities and public institutions, but also with companies such as Xento Systems, CATO Networks, EY, CIPHER Intelligence LAB, redBorder, TSG, and others.
Notify of

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Inline Feedbacks
View all comments
© HAKIN9 MEDIA SP. Z O.O. SP. K. 2023