BasicEventViewer v4 in may 2022 Updated for ver (.NET 4.5) , Published by Damon Mohammadbagher.
+ last source/exe update(8) new version [v4.3.251.308] [Sep 08, 2022]... ,
+ in update8, BEV4 ver [v4.3.251.308] you can update BEV4 Database for MitreAttack Real-time Scanner via two methods:
+ DB Update method: 1.via Simple text file , 2.via Atomic-Red-Team md file
+ also Real-time Filters Added to source code + Making Auto Simple_text_DB_File.txt file via (Atomic-Red-Team md file).
BEV4 is Event Monitor tool (real-time & search) some simple things like Atomic-red-team yaml file added for test & Real time detection for some type of attack and ...
Note: You Need Sysmon by Default (installed in your system).
Usage Steps
Step1 (Run as Admin): BEV4.exe
Note: in this code some yaml files (atomic-red-team yaml files) added to source code as "Database" for Search in Sysmon Event ID 1 Logs (real-time & search), so this code was for test and my database in this code is not good for detect everything but my tests was very good for some attack detection (real-time) , this code was for test and you can make your own code for real-time scanning Sysmon Events or ETW Events for Attack Detections based on Windows Events or ETW/Sysmon Events etc. you can load and watch my database in this tool and in this code All command prompts or powershell scripts will detect based on Yaml files information etc. (if you want use this database you really should change some rows in this DataBase, i did not change any thing in these yaml files , i just test them for some detection tests and results was good!).
!Note: in BEV4 new version [v4.3.247.298] you can update BEV Database for MitreAttack Real-time Scanner via two methods:
! 1.via Simple text DB file (your own DB)
! 2.via Atomic-Red-Team md file (which you can download from github repo: https://github.com/redcanaryco/atomic-red-team)
Videos for Updating BEV4 DB via two Methods: via simple text DB file and via Atomic-red-team md file ....
Video [new version] for BEV4: https://www.youtube.com/watch?v=T1jYT_WcRZk
Video [new version] for BEV4: https://www.linkedin.com/posts/damonmohammadbagher_bev4-and-updating-mitreattack-real-time-scanner-activity-6971754809817231360-nPFU
old Video1 for BEV4: https://www.youtube.com/watch?v=imU82TApG2k
old Video2 for BEV4: https://www.youtube.com/watch?v=Hera3z1T5mI
Note: in the New version of BEV4 these EIDs created in Winfowd Event Log Name "BEV4.3":
EID 1: Start BEV4
EID 2: True Positive Detections
EID 3: False Positive Detections
EID 254: BEV4.3 Realtime DB Updated via Method 2
EID 255: BEV4.3 Realtime DB Updated via Method 1
Important point: About Mitre Attack Detections This code [BEV4 (v4.0)] is/was my test codes (which i will publish here....) to use some Mitre Attacks Techniques (Using Atomic red-team) yaml files just for test & help to Blue teamers to learn these things better, BEV4 test is/was very good in my opinion but ofcourse i know this will not Detect every thing but this is very good example to start for Attack Detection based on Some Mitre Attack Data (using Sysmon EID 1 ONLY in my code) + yaml files & .... , you can see every Technique has steps (Procedures) which in my code BEV4 these steps or Procedures will detect by Sysmon EID 1 (commandLine) or ETW events (CommandLine) etc, in my code i created one simple "Techniques Database" which has all steps (Procedures) for each Technique (created base on yaml file for Atomic-Red-Team). that means in my DB i have technique A with 3 lines CommandLine and my code will Detected each commandline and scan them for detection for each Sysmon/ETW events, and make score for each detection but this is not enough for very good detection (which i learned this when i make this BEV4.0 ;D ) , because always you can bypass some detection very simple (sometimes), so if you think yaml file or Mitre Attack is enough always, you are wrong (i am sure 100% about this even before make this code) but Mitre Attack is very useful thing in my opinion and as i said before "Mitre Attack is/Can not Cover Everything...", anyway this code was fun also i learned alot from yaml files (atomic-red-team) + Mitre Attack things but i am sure this (my code) will not cover all things etc this just is for test.... also about Steps (Procedures) for Each Techniques you always can bypass detection, why? because always you can!
so about "Techniques vs Procedures" this video is very good and i am agree with almost all things in this video honestly i don't know this guy (which does not matter) and i don't talk about their own tools or something like that, but this video and things which talked about that like (Techniques vs Procedures) is very good/useful for those Red-teamers/Pentesters which want to work with Blue teamers to make something for Detection (Purple Teaming) also this video is very good for all blue teamers too. btw i will publish my code and hopes to helpful for some of you to make your own detection better than before ;) why not?
video link : https://youtu.be/MHfGIY2IyXE?t=414