Detectionlowtest
Tap Driver Installation - Security
Detects the installation of a well-known TAP driver service. This could be a sign of potential preparation for data exfiltration using tunnelling techniques.
Convert In Phoenix Studio
Open this Sigma rule in the converter with the YAML preloaded and ready for backend selection.
Launch
Daniil Yugoslavskiy, Ian Davis, oscd.communityCreated Thu Oct 24Updated Tue Nov 299c8afa4d-0022-48f0-9456-3712466f9701windows
Log Source
Windowssecurity
ProductWindows← raw: windows
Servicesecurity← raw: security
Definition
Requirements: The System Security Extension audit subcategory need to be enabled to log the EID 4697
Detection Logic
Detection Logic1 selector
detection:
selection:
EventID: 4697
ServiceFileName|contains: 'tap0901'
condition: selectionFalse Positives
Legitimate OpenVPN TAP installation
References
MITRE ATT&CK
Tactics
Rule Metadata
Rule ID
9c8afa4d-0022-48f0-9456-3712466f9701
Status
test
Level
low
Type
Detection
Created
Thu Oct 24
Modified
Tue Nov 29
Path
rules/windows/builtin/security/win_security_tap_driver_installation.yml
Raw Tags
attack.exfiltrationattack.t1048