still; not work for me :(

then i try on win.eventdata.image
<group name="windows, sysmon, sysmon_process-anomalies">
<rule id="100014" level="12">
<if_sid>60002</if_sid> <!-- Event logs -->
<field name="win.eventdata.image">\.+mimikatz</field>
<description>Mimikatz detected</description>
<options>no_full_log</options>
<mitre>
<id>T1003.001</id> <!-- Credential Dumping: LSASS Memory -->
<id>T1003.002</id> <!-- Credential Dumping: Security Account Manager -->
<id>T1003.003</id> <!-- Credential Dumping: NTDS.dit -->
<id>T1550.001</id> <!-- Adversarial Use of Credentials: Application Access -->
<id>T1550.002</id> <!-- Adversarial Use of Credentials: Login -->
<id>T1550.003</id> <!-- Adversarial Use of Credentials: Domain Accounts -->
<id>T1555.001</id> <!-- Credentials from Web Browsers: Credential Dumping -->
</mitre>
</rule>
</group>
but no luck..
none of my rule is working on event security data, but when i try on sysmon it works.
the issue is need to work on window security event. kindly guide me