diff --git a/windows/sysmon/events/event-12.yml b/windows/sysmon/events/event-12.yml
index 176b1bd15..5ab059f5a 100644
--- a/windows/sysmon/events/event-12.yml
+++ b/windows/sysmon/events/event-12.yml
@@ -53,3 +53,16 @@ references:
- text: TrustedSec Sysmon Community Guide
link: https://github.com/trustedsec/SysmonCommunityGuide/blob/master/registry-actions.md
tags: []
+event_sample:
+ - format: xml
+ sample: |-
+
+ -
+ CreateKey
+ 2022-06-29 18:53:12.949
+ {01e2a015-00dd-62bc-7800-000000000500}
+ 2632
+ C:\Windows\system32\ctfmon.exe
+ HKU\S-1-5-21-2073674718-3587034731-622476709-1001\SOFTWARE\Microsoft\Input\TypingInsights
+ DESKTOP-CQF82L6\pedro
+
\ No newline at end of file
diff --git a/windows/sysmon/events/event-13.yml b/windows/sysmon/events/event-13.yml
index cd9c7137d..323168b1c 100644
--- a/windows/sysmon/events/event-13.yml
+++ b/windows/sysmon/events/event-13.yml
@@ -59,3 +59,17 @@ references:
- text: TrustedSec Sysmon Community Guide
link: https://github.com/trustedsec/SysmonCommunityGuide/blob/master/registry-actions.md
tags: []
+event_sample:
+ - format: xml
+ sample: |-
+
+ -
+ SetValue
+ 2022-06-29 18:58:42.007
+ {01e2a015-00dd-62bc-7800-000000000500}
+ 2632
+ C:\Windows\system32\ctfmon.exe
+ HKU\S-1-5-21-2073674718-3587034731-622476709-1001\SOFTWARE\Microsoft\Input\TypingInsights\Insights
+ Binary Data
+ DESKTOP-CQF82L6\pedro
+
\ No newline at end of file
diff --git a/windows/sysmon/events/event-18.yml b/windows/sysmon/events/event-18.yml
index 8841d8a71..072d880f6 100644
--- a/windows/sysmon/events/event-18.yml
+++ b/windows/sysmon/events/event-18.yml
@@ -53,3 +53,16 @@ references:
- text: TrustedSec Sysmon Community Guide
link: https://github.com/trustedsec/SysmonCommunityGuide/blob/master/named-pipes.md
tags: []
+event_sample:
+ - format: xml
+ sample: |-
+
+ -
+ ConnectPipe
+ 2022-06-29 19:02:29.022
+ {01e2a015-0003-62bc-1b00-000000000500}
+ 676
+ \VBoxTrayIPC-pedro
+ C:\Windows\System32\VBoxService.exe
+ NT AUTHORITY\SYSTEM
+
\ No newline at end of file
diff --git a/windows/sysmon/events/event-2.yml b/windows/sysmon/events/event-2.yml
index de2d8b632..360e6e35e 100644
--- a/windows/sysmon/events/event-2.yml
+++ b/windows/sysmon/events/event-2.yml
@@ -59,3 +59,17 @@ references:
- text: TrustedSec Sysmon Community Guide
link: https://github.com/trustedsec/SysmonCommunityGuide/blob/master/file-create-time-change.md
tags: []
+event_sample:
+- format: xml
+ sample: |-
+
+ -
+ 2022-06-29 18:37:12.607
+ {01e2a015-752e-62bc-2e03-000000000500}
+ 1836
+ C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
+ C:\Users\pedro\AppData\Local\Microsoft\Edge\User Data\6403de3a-d41b-499a-85f6-6ca715a2c53e.tmp
+ 2022-06-28 16:50:17.602
+ 2022-06-29 18:37:12.607
+ DESKTOP-CQF82L6\pedro
+
\ No newline at end of file
diff --git a/windows/sysmon/events/event-22.yml b/windows/sysmon/events/event-22.yml
index 37e6bb7ca..d962ccf02 100644
--- a/windows/sysmon/events/event-22.yml
+++ b/windows/sysmon/events/event-22.yml
@@ -59,3 +59,17 @@ references:
- text: TrustedSec Sysmon Community Guide
link: https://github.com/trustedsec/SysmonCommunityGuide/blob/master/dns-query.md
tags: []
+event_sample:
+ - format: xml
+ sample: |-
+
+ -
+ 2022-06-29 19:06:02.389
+ {01e2a015-a2b2-62bc-ab05-000000000500}
+ 3704
+ checkappexec.microsoft.com
+ 0
+ type: 5 wd-prod-ss.trafficmanager.net;type: 5 wd-prod-ss-us-west-1-fe.westus.cloudapp.azure.com;::ffff:40.78.63.86;
+ C:\Windows\System32\smartscreen.exe
+ DESKTOP-CQF82L6\pedro
+
\ No newline at end of file
diff --git a/windows/sysmon/events/event-23.yml b/windows/sysmon/events/event-23.yml
index 6568efce8..2216993e3 100644
--- a/windows/sysmon/events/event-23.yml
+++ b/windows/sysmon/events/event-23.yml
@@ -71,3 +71,18 @@ references:
- text: Sysmon 11 - FileDelete events
link: https://medium.com/falconforce/sysmon-11-dns-improvements-and-filedelete-events-7a74f17ca842
tags: []
+event_sample:
+ - format: xml
+ sample: |-
+
+ -
+ 2022-06-29 19:25:26.450
+ {01e2a015-02ee-62bc-0e01-000000000500}
+ 1368
+ NT AUTHORITY\SYSTEM
+ C:\ProgramData\Microsoft\Windows Defender\platform\4.18.2205.7-0\MsMpEng.exe
+ C:\ProgramData\Microsoft\Windows Defender\Scans\Scans\History\CacheManager\7A012CB2-69ED-4AFD-BEF6-F12032FAA46E
+ SHA1=A35327FFEBFF1BBA6499C087CD8E1A73C12586E9,MD5=3CEB4359DFE139A2AFF614B7C7AE7DC7,SHA256=895578306B9F70AE5F670564BB039A66B0D77775D98994EE19D2ABEA0876B2D5,IMPHASH=00000000000000000000000000000000
+ false
+ true
+
\ No newline at end of file
diff --git a/windows/sysmon/events/event-26.yml b/windows/sysmon/events/event-26.yml
new file mode 100644
index 000000000..82c5e0326
--- /dev/null
+++ b/windows/sysmon/events/event-26.yml
@@ -0,0 +1,81 @@
+name: 'Event ID 26: FileDeleteDetected (File Delete logged)'
+description: A file was deleted.
+platform: windows
+log_source: sysmon
+event_id: '26'
+event_version: '5'
+event_fields:
+- standard_name: tag
+ standard_type: TBD
+ name: RuleName
+ type: string
+ description: custom tag mapped to event. i.e ATT&CK technique ID
+ sample_value: T1114
+- standard_name: event_creation_time
+ standard_type: TBD
+ name: UtcTime
+ type: date
+ description: Time in UTC when event was created
+ sample_value: 4/11/18 6:28
+- standard_name: process_guid
+ standard_type: TBD
+ name: ProcessGuid
+ type: string
+ description: Process Guid of the process that deleted the file
+ sample_value: '{A98268C1-959E-5ACD-0000-0010236E0300}'
+- standard_name: process_id
+ standard_type: TBD
+ name: ProcessId
+ type: integer
+ description: Process ID used by the os to identify the process that deleted the file
+ sample_value: '1896'
+- standard_name: process_file_path
+ standard_type: TBD
+ name: Image
+ type: string
+ description: File path of the process that deleted the file
+ sample_value: C:\WINDOWS\system32\explorer.exe
+- standard_name: user_name
+ standard_type: TBD
+ name: User
+ type: string
+ description: Name of the account who deleted the file.
+ sample_value: DESKTOP-WARDOG\wardog
+- standard_name: file_name
+ standard_type: TBD
+ name: TargetFilename
+ type: string
+ description: full path name of the deleted file
+ sample_value: C:\Users\wardog\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\7G23PHTPHSQ3S2RVKKPS.temp
+- standard_name: TBD
+ standard_type: TBD
+ name: Hashes
+ type: string
+ description: Hashes captured by sysmon driver of the deleted file
+ sample_value: SHA1=B0BF5AC2E81BBF597FAD5F349FEEB32CAC449FA2, MD5=6A255BEBF3DBCD13585538ED47DBAFD7, SHA256=4668BB2223FFB983A5F1273B9E3D9FA2C5CE4A0F1FB18CA5C1B285762020073C, IMPHASH=2505BD03D7BD285E50CE89CEC02B333B
+- standard_name: TBD
+ standard_type: TBD
+ name: IsExecutable
+ type: bool
+ description: TBD
+ sample_value: TBD
+references:
+- text: Sysmon Source
+ link: https://docs.microsoft.com/en-us/sysinternals/downloads/sysmon#event-id-23-filedelete-a-file-delete-was-detected
+- text: Sysmon 11 - FileDelete events
+ link: https://medium.com/falconforce/sysmon-11-dns-improvements-and-filedelete-events-7a74f17ca842
+tags: []
+event_sample:
+ - format: xml
+ sample: |-
+
+ -
+ 2022-06-29 19:34:33.740
+ {01e2a015-0004-62bc-2200-000000000500}
+ 1192
+ NT AUTHORITY\SYSTEM
+ C:\Windows\system32\svchost.exe
+ C:\Windows\Prefetch\SPPSVC.EXE-B0F8131B.pf
+ SHA1=7501B6DCEBA3379749BEA17751AF10F41D2A55D1,MD5=6E44A50630221D4F99C0941EC808DC90,SHA256=93B0AD70DA6A6429C78DDED50DEE477A2299EC8D74E76E8E71CE11C5F85F1322,IMPHASH=00000000000000000000000000000000
+ false
+
\ No newline at end of file