nldcsc-elastic-rules 0.0.8__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- nldcsc_elastic_rules/__init__.py +1 -0
- nldcsc_elastic_rules/rules/README.md +31 -0
- nldcsc_elastic_rules/rules/_deprecated/apm_null_user_agent.toml +49 -0
- nldcsc_elastic_rules/rules/_deprecated/command_and_control_connection_attempt_by_non_ssh_root_session.toml +85 -0
- nldcsc_elastic_rules/rules/_deprecated/command_and_control_dns_directly_to_the_internet.toml +85 -0
- nldcsc_elastic_rules/rules/_deprecated/command_and_control_ftp_file_transfer_protocol_activity_to_the_internet.toml +77 -0
- nldcsc_elastic_rules/rules/_deprecated/command_and_control_irc_internet_relay_chat_protocol_activity_to_the_internet.toml +76 -0
- nldcsc_elastic_rules/rules/_deprecated/command_and_control_linux_iodine_activity.toml +60 -0
- nldcsc_elastic_rules/rules/_deprecated/command_and_control_linux_port_knocking_reverse_connection.toml +110 -0
- nldcsc_elastic_rules/rules/_deprecated/command_and_control_port_8000_activity_to_the_internet.toml +63 -0
- nldcsc_elastic_rules/rules/_deprecated/command_and_control_pptp_point_to_point_tunneling_protocol_activity.toml +46 -0
- nldcsc_elastic_rules/rules/_deprecated/command_and_control_proxy_port_activity_to_the_internet.toml +66 -0
- nldcsc_elastic_rules/rules/_deprecated/command_and_control_smtp_to_the_internet.toml +73 -0
- nldcsc_elastic_rules/rules/_deprecated/command_and_control_sql_server_port_activity_to_the_internet.toml +62 -0
- nldcsc_elastic_rules/rules/_deprecated/command_and_control_ssh_secure_shell_from_the_internet.toml +89 -0
- nldcsc_elastic_rules/rules/_deprecated/command_and_control_ssh_secure_shell_to_the_internet.toml +64 -0
- nldcsc_elastic_rules/rules/_deprecated/command_and_control_tor_activity_to_the_internet.toml +69 -0
- nldcsc_elastic_rules/rules/_deprecated/container_workload_protection.toml +78 -0
- nldcsc_elastic_rules/rules/_deprecated/credential_access_aws_creds_search_inside_a_container.toml +101 -0
- nldcsc_elastic_rules/rules/_deprecated/credential_access_collection_sensitive_files_compression_inside_a_container.toml +144 -0
- nldcsc_elastic_rules/rules/_deprecated/credential_access_entra_signin_brute_force_microsoft_365_repeat_source.toml +121 -0
- nldcsc_elastic_rules/rules/_deprecated/credential_access_microsoft_365_potential_password_spraying_attack.toml +61 -0
- nldcsc_elastic_rules/rules/_deprecated/credential_access_potential_linux_ssh_bruteforce_root.toml +104 -0
- nldcsc_elastic_rules/rules/_deprecated/credential_access_sensitive_keys_or_passwords_search_inside_a_container.toml +109 -0
- nldcsc_elastic_rules/rules/_deprecated/credential_access_tcpdump_activity.toml +61 -0
- nldcsc_elastic_rules/rules/_deprecated/defense_evasion_attempt_to_disable_iptables_or_firewall.toml +53 -0
- nldcsc_elastic_rules/rules/_deprecated/defense_evasion_base64_encoding_or_decoding_activity.toml +51 -0
- nldcsc_elastic_rules/rules/_deprecated/defense_evasion_code_injection_conhost.toml +106 -0
- nldcsc_elastic_rules/rules/_deprecated/defense_evasion_execution_via_trusted_developer_utilities.toml +47 -0
- nldcsc_elastic_rules/rules/_deprecated/defense_evasion_hex_encoding_or_decoding_activity.toml +50 -0
- nldcsc_elastic_rules/rules/_deprecated/defense_evasion_ld_preload_env_variable_process_injection.toml +137 -0
- nldcsc_elastic_rules/rules/_deprecated/defense_evasion_ld_preload_shared_object_modified_inside_a_container.toml +96 -0
- nldcsc_elastic_rules/rules/_deprecated/defense_evasion_mshta_making_network_connections.toml +51 -0
- nldcsc_elastic_rules/rules/_deprecated/defense_evasion_potential_processherpaderping.toml +59 -0
- nldcsc_elastic_rules/rules/_deprecated/defense_evasion_whitespace_padding_in_command_line.toml +102 -0
- nldcsc_elastic_rules/rules/_deprecated/discovery_file_dir_discovery.toml +95 -0
- nldcsc_elastic_rules/rules/_deprecated/discovery_process_discovery_via_tasklist_command.toml +45 -0
- nldcsc_elastic_rules/rules/_deprecated/discovery_query_registry_via_reg.toml +44 -0
- nldcsc_elastic_rules/rules/_deprecated/discovery_suspicious_network_tool_launched_inside_a_container.toml +129 -0
- nldcsc_elastic_rules/rules/_deprecated/discovery_whoami_commmand.toml +48 -0
- nldcsc_elastic_rules/rules/_deprecated/execution_apt_binary.toml +53 -0
- nldcsc_elastic_rules/rules/_deprecated/execution_awk_binary_shell.toml +51 -0
- nldcsc_elastic_rules/rules/_deprecated/execution_busybox_binary.toml +50 -0
- nldcsc_elastic_rules/rules/_deprecated/execution_c89_c99_binary.toml +52 -0
- nldcsc_elastic_rules/rules/_deprecated/execution_command_shell_started_by_powershell.toml +45 -0
- nldcsc_elastic_rules/rules/_deprecated/execution_container_management_binary_launched_inside_a_container.toml +100 -0
- nldcsc_elastic_rules/rules/_deprecated/execution_cpulimit_binary.toml +53 -0
- nldcsc_elastic_rules/rules/_deprecated/execution_crash_binary.toml +50 -0
- nldcsc_elastic_rules/rules/_deprecated/execution_env_binary.toml +50 -0
- nldcsc_elastic_rules/rules/_deprecated/execution_expect_binary.toml +52 -0
- nldcsc_elastic_rules/rules/_deprecated/execution_file_made_executable_via_chmod_inside_a_container.toml +113 -0
- nldcsc_elastic_rules/rules/_deprecated/execution_find_binary.toml +52 -0
- nldcsc_elastic_rules/rules/_deprecated/execution_flock_binary.toml +50 -0
- nldcsc_elastic_rules/rules/_deprecated/execution_gcc_binary.toml +52 -0
- nldcsc_elastic_rules/rules/_deprecated/execution_interactive_exec_to_container.toml +127 -0
- nldcsc_elastic_rules/rules/_deprecated/execution_interactive_shell_spawned_from_inside_a_container.toml +109 -0
- nldcsc_elastic_rules/rules/_deprecated/execution_linux_process_started_in_temp_directory.toml +48 -0
- nldcsc_elastic_rules/rules/_deprecated/execution_mysql_binary.toml +52 -0
- nldcsc_elastic_rules/rules/_deprecated/execution_netcat_listener_established_inside_a_container.toml +114 -0
- nldcsc_elastic_rules/rules/_deprecated/execution_reverse_shell_via_named_pipe.toml +74 -0
- nldcsc_elastic_rules/rules/_deprecated/execution_shell_suspicious_parent_child_revshell_linux.toml +111 -0
- nldcsc_elastic_rules/rules/_deprecated/execution_ssh_binary.toml +53 -0
- nldcsc_elastic_rules/rules/_deprecated/execution_suspicious_jar_child_process.toml +113 -0
- nldcsc_elastic_rules/rules/_deprecated/execution_vi_binary.toml +50 -0
- nldcsc_elastic_rules/rules/_deprecated/execution_via_net_com_assemblies.toml +55 -0
- nldcsc_elastic_rules/rules/_deprecated/exfiltration_ec2_snapshot_change_activity.toml +111 -0
- nldcsc_elastic_rules/rules/_deprecated/exfiltration_rds_snapshot_export.toml +47 -0
- nldcsc_elastic_rules/rules/_deprecated/impact_potential_linux_ransomware_file_encryption.toml +87 -0
- nldcsc_elastic_rules/rules/_deprecated/impact_virtual_network_device_modified.toml +96 -0
- nldcsc_elastic_rules/rules/_deprecated/initial_access_cross_site_scripting.toml +49 -0
- nldcsc_elastic_rules/rules/_deprecated/initial_access_login_failures.toml +53 -0
- nldcsc_elastic_rules/rules/_deprecated/initial_access_login_location.toml +53 -0
- nldcsc_elastic_rules/rules/_deprecated/initial_access_login_sessions.toml +53 -0
- nldcsc_elastic_rules/rules/_deprecated/initial_access_login_time.toml +53 -0
- nldcsc_elastic_rules/rules/_deprecated/initial_access_rdp_remote_desktop_protocol_to_the_internet.toml +81 -0
- nldcsc_elastic_rules/rules/_deprecated/initial_access_ssh_connection_established_inside_a_container.toml +127 -0
- nldcsc_elastic_rules/rules/_deprecated/lateral_movement_malicious_remote_file_creation.toml +46 -0
- nldcsc_elastic_rules/rules/_deprecated/lateral_movement_remote_file_creation_in_sensitive_directory.toml +60 -0
- nldcsc_elastic_rules/rules/_deprecated/lateral_movement_ssh_process_launched_inside_a_container.toml +122 -0
- nldcsc_elastic_rules/rules/_deprecated/linux_mknod_activity.toml +37 -0
- nldcsc_elastic_rules/rules/_deprecated/linux_nmap_activity.toml +37 -0
- nldcsc_elastic_rules/rules/_deprecated/linux_socat_activity.toml +36 -0
- nldcsc_elastic_rules/rules/_deprecated/persistence_cron_jobs_creation_and_runtime.toml +58 -0
- nldcsc_elastic_rules/rules/_deprecated/persistence_etc_file_creation.toml +271 -0
- nldcsc_elastic_rules/rules/_deprecated/persistence_google_workspace_user_group_access_modified_to_allow_external_access.toml +85 -0
- nldcsc_elastic_rules/rules/_deprecated/persistence_kernel_module_activity.toml +53 -0
- nldcsc_elastic_rules/rules/_deprecated/persistence_shell_activity_by_web_server.toml +101 -0
- nldcsc_elastic_rules/rules/_deprecated/persistence_ssh_authorized_keys_modification_inside_a_container.toml +126 -0
- nldcsc_elastic_rules/rules/_deprecated/privilege_escalation_debugfs_launched_inside_a_privileged_container.toml +99 -0
- nldcsc_elastic_rules/rules/_deprecated/privilege_escalation_gcp_kubernetes_rolebindings_created_or_patched.toml +51 -0
- nldcsc_elastic_rules/rules/_deprecated/privilege_escalation_krbrelayup_suspicious_logon.toml +75 -0
- nldcsc_elastic_rules/rules/_deprecated/privilege_escalation_linux_strace_activity.toml +50 -0
- nldcsc_elastic_rules/rules/_deprecated/privilege_escalation_mount_launched_inside_a_privileged_container.toml +98 -0
- nldcsc_elastic_rules/rules/_deprecated/privilege_escalation_potential_container_escape_via_modified_notify_on_release_file.toml +99 -0
- nldcsc_elastic_rules/rules/_deprecated/privilege_escalation_potential_container_escape_via_modified_release_agent_file.toml +98 -0
- nldcsc_elastic_rules/rules/_deprecated/privilege_escalation_printspooler_malicious_driver_file_changes.toml +51 -0
- nldcsc_elastic_rules/rules/_deprecated/privilege_escalation_printspooler_malicious_registry_modification.toml +50 -0
- nldcsc_elastic_rules/rules/_deprecated/privilege_escalation_root_login_without_mfa.toml +104 -0
- nldcsc_elastic_rules/rules/_deprecated/privilege_escalation_setgid_bit_set_via_chmod.toml +56 -0
- nldcsc_elastic_rules/rules/_deprecated/threat_intel_filebeat7x.toml +191 -0
- nldcsc_elastic_rules/rules/_deprecated/threat_intel_filebeat8x.toml +192 -0
- nldcsc_elastic_rules/rules/_deprecated/threat_intel_fleet_integrations.toml +192 -0
- nldcsc_elastic_rules/rules/apm/apm_403_response_to_a_post.toml +69 -0
- nldcsc_elastic_rules/rules/apm/apm_405_response_method_not_allowed.toml +69 -0
- nldcsc_elastic_rules/rules/apm/apm_sqlmap_user_agent.toml +70 -0
- nldcsc_elastic_rules/rules/cross-platform/command_and_control_google_drive_malicious_file_download.toml +102 -0
- nldcsc_elastic_rules/rules/cross-platform/command_and_control_non_standard_ssh_port.toml +106 -0
- nldcsc_elastic_rules/rules/cross-platform/command_and_control_pan_elastic_defend_c2.toml +76 -0
- nldcsc_elastic_rules/rules/cross-platform/command_and_control_socks_fortigate_endpoint.toml +85 -0
- nldcsc_elastic_rules/rules/cross-platform/credential_access_cookies_chromium_browsers_debugging.toml +116 -0
- nldcsc_elastic_rules/rules/cross-platform/credential_access_forced_authentication_pipes.toml +112 -0
- nldcsc_elastic_rules/rules/cross-platform/credential_access_trufflehog_execution.toml +97 -0
- nldcsc_elastic_rules/rules/cross-platform/defense_evasion_agent_spoofing_mismatched_id.toml +81 -0
- nldcsc_elastic_rules/rules/cross-platform/defense_evasion_agent_spoofing_multiple_hosts.toml +87 -0
- nldcsc_elastic_rules/rules/cross-platform/defense_evasion_deleting_websvr_access_logs.toml +99 -0
- nldcsc_elastic_rules/rules/cross-platform/defense_evasion_deletion_of_bash_command_line_history.toml +111 -0
- nldcsc_elastic_rules/rules/cross-platform/defense_evasion_elastic_agent_service_terminated.toml +117 -0
- nldcsc_elastic_rules/rules/cross-platform/defense_evasion_encoding_rot13_python_script.toml +98 -0
- nldcsc_elastic_rules/rules/cross-platform/defense_evasion_masquerading_space_after_filename.toml +107 -0
- nldcsc_elastic_rules/rules/cross-platform/defense_evasion_timestomp_touch.toml +102 -0
- nldcsc_elastic_rules/rules/cross-platform/defense_evasion_whitespace_padding_command_line.toml +130 -0
- nldcsc_elastic_rules/rules/cross-platform/discovery_security_software_grep.toml +140 -0
- nldcsc_elastic_rules/rules/cross-platform/discovery_virtual_machine_fingerprinting_grep.toml +102 -0
- nldcsc_elastic_rules/rules/cross-platform/execution_aws_ssm_sendcommand_with_command_parameters.toml +166 -0
- nldcsc_elastic_rules/rules/cross-platform/execution_git_exploit_cve_2025_48384.toml +99 -0
- nldcsc_elastic_rules/rules/cross-platform/execution_pentest_eggshell_remote_admin_tool.toml +87 -0
- nldcsc_elastic_rules/rules/cross-platform/execution_potential_widespread_malware_infection.toml +92 -0
- nldcsc_elastic_rules/rules/cross-platform/execution_revershell_via_shell_cmd.toml +102 -0
- nldcsc_elastic_rules/rules/cross-platform/execution_suspicious_java_netcon_childproc.toml +132 -0
- nldcsc_elastic_rules/rules/cross-platform/guided_onboarding_sample_rule.toml +80 -0
- nldcsc_elastic_rules/rules/cross-platform/impact_hosts_file_modified.toml +119 -0
- nldcsc_elastic_rules/rules/cross-platform/initial_access_azure_o365_with_network_alert.toml +137 -0
- nldcsc_elastic_rules/rules/cross-platform/initial_access_exfiltration_new_usb_device_mounted.toml +117 -0
- nldcsc_elastic_rules/rules/cross-platform/initial_access_zoom_meeting_with_no_passcode.toml +85 -0
- nldcsc_elastic_rules/rules/cross-platform/multiple_alerts_different_tactics_host.toml +79 -0
- nldcsc_elastic_rules/rules/cross-platform/multiple_alerts_edr_elastic_defend_by_host.toml +97 -0
- nldcsc_elastic_rules/rules/cross-platform/multiple_alerts_elastic_defend_netsecurity_by_host.toml +105 -0
- nldcsc_elastic_rules/rules/cross-platform/multiple_alerts_email_elastic_defend_correlation.toml +82 -0
- nldcsc_elastic_rules/rules/cross-platform/multiple_alerts_involving_user.toml +82 -0
- nldcsc_elastic_rules/rules/cross-platform/multiple_alerts_risky_host_esql.toml +105 -0
- nldcsc_elastic_rules/rules/cross-platform/persistence_credential_access_modify_auth_module_or_config.toml +141 -0
- nldcsc_elastic_rules/rules/cross-platform/persistence_shell_profile_modification.toml +107 -0
- nldcsc_elastic_rules/rules/cross-platform/persistence_ssh_authorized_keys_modification.toml +144 -0
- nldcsc_elastic_rules/rules/cross-platform/persistence_web_server_potential_command_injection.toml +228 -0
- nldcsc_elastic_rules/rules/cross-platform/privilege_escalation_echo_nopasswd_sudoers.toml +90 -0
- nldcsc_elastic_rules/rules/cross-platform/privilege_escalation_setuid_setgid_bit_set_via_chmod.toml +113 -0
- nldcsc_elastic_rules/rules/cross-platform/privilege_escalation_sudo_buffer_overflow.toml +105 -0
- nldcsc_elastic_rules/rules/cross-platform/privilege_escalation_sudoers_file_mod.toml +91 -0
- nldcsc_elastic_rules/rules/cross-platform/reconnaissance_web_server_discovery_or_fuzzing_activity.toml +121 -0
- nldcsc_elastic_rules/rules/cross-platform/reconnaissance_web_server_unusual_spike_in_error_logs.toml +107 -0
- nldcsc_elastic_rules/rules/cross-platform/reconnaissance_web_server_unusual_spike_in_error_response_codes.toml +127 -0
- nldcsc_elastic_rules/rules/cross-platform/reconnaissance_web_server_unusual_user_agents.toml +165 -0
- nldcsc_elastic_rules/rules/integrations/aws/NOTICE.txt +26 -0
- nldcsc_elastic_rules/rules/integrations/aws/collection_cloudtrail_logging_created.toml +124 -0
- nldcsc_elastic_rules/rules/integrations/aws/collection_s3_unauthenticated_bucket_access_by_rare_source.toml +186 -0
- nldcsc_elastic_rules/rules/integrations/aws/credential_access_aws_getpassword_for_ec2_instance.toml +121 -0
- nldcsc_elastic_rules/rules/integrations/aws/credential_access_aws_iam_assume_role_brute_force.toml +105 -0
- nldcsc_elastic_rules/rules/integrations/aws/credential_access_iam_compromisedkeyquarantine_policy_attached_to_user.toml +106 -0
- nldcsc_elastic_rules/rules/integrations/aws/credential_access_iam_user_addition_to_group.toml +134 -0
- nldcsc_elastic_rules/rules/integrations/aws/credential_access_new_terms_secretsmanager_getsecretvalue.toml +144 -0
- nldcsc_elastic_rules/rules/integrations/aws/credential_access_rapid_secret_retrieval_attempts_from_secretsmanager.toml +156 -0
- nldcsc_elastic_rules/rules/integrations/aws/credential_access_retrieve_secure_string_parameters_via_ssm.toml +128 -0
- nldcsc_elastic_rules/rules/integrations/aws/credential_access_root_console_failure_brute_force.toml +152 -0
- nldcsc_elastic_rules/rules/integrations/aws/defense_evasion_cloudtrail_logging_deleted.toml +120 -0
- nldcsc_elastic_rules/rules/integrations/aws/defense_evasion_cloudtrail_logging_evasion.toml +126 -0
- nldcsc_elastic_rules/rules/integrations/aws/defense_evasion_cloudtrail_logging_suspended.toml +121 -0
- nldcsc_elastic_rules/rules/integrations/aws/defense_evasion_cloudwatch_alarm_deletion.toml +174 -0
- nldcsc_elastic_rules/rules/integrations/aws/defense_evasion_config_service_rule_deletion.toml +116 -0
- nldcsc_elastic_rules/rules/integrations/aws/defense_evasion_configuration_recorder_stopped.toml +94 -0
- nldcsc_elastic_rules/rules/integrations/aws/defense_evasion_ec2_flow_log_deletion.toml +129 -0
- nldcsc_elastic_rules/rules/integrations/aws/defense_evasion_ec2_network_acl_deletion.toml +119 -0
- nldcsc_elastic_rules/rules/integrations/aws/defense_evasion_elasticache_security_group_creation.toml +107 -0
- nldcsc_elastic_rules/rules/integrations/aws/defense_evasion_elasticache_security_group_modified_or_deleted.toml +107 -0
- nldcsc_elastic_rules/rules/integrations/aws/defense_evasion_guardduty_detector_deletion.toml +153 -0
- nldcsc_elastic_rules/rules/integrations/aws/defense_evasion_rds_instance_restored.toml +106 -0
- nldcsc_elastic_rules/rules/integrations/aws/defense_evasion_route53_dns_query_resolver_config_deletion.toml +100 -0
- nldcsc_elastic_rules/rules/integrations/aws/defense_evasion_s3_bucket_configuration_deletion.toml +179 -0
- nldcsc_elastic_rules/rules/integrations/aws/defense_evasion_s3_bucket_lifecycle_expiration_added.toml +201 -0
- nldcsc_elastic_rules/rules/integrations/aws/defense_evasion_s3_bucket_server_access_logging_disabled.toml +152 -0
- nldcsc_elastic_rules/rules/integrations/aws/defense_evasion_sqs_purge_queue.toml +171 -0
- nldcsc_elastic_rules/rules/integrations/aws/defense_evasion_sts_get_federation_token.toml +134 -0
- nldcsc_elastic_rules/rules/integrations/aws/defense_evasion_vpc_security_group_ingress_rule_added_for_remote_connections.toml +118 -0
- nldcsc_elastic_rules/rules/integrations/aws/defense_evasion_waf_acl_deletion.toml +101 -0
- nldcsc_elastic_rules/rules/integrations/aws/defense_evasion_waf_rule_or_rule_group_deletion.toml +102 -0
- nldcsc_elastic_rules/rules/integrations/aws/discovery_ec2_deprecated_ami_discovery.toml +141 -0
- nldcsc_elastic_rules/rules/integrations/aws/discovery_ec2_multi_region_describe_instances.toml +135 -0
- nldcsc_elastic_rules/rules/integrations/aws/discovery_ec2_multiple_discovery_api_calls_via_cli.toml +155 -0
- nldcsc_elastic_rules/rules/integrations/aws/discovery_ec2_userdata_request_for_ec2_instance.toml +152 -0
- nldcsc_elastic_rules/rules/integrations/aws/discovery_new_terms_sts_getcalleridentity.toml +139 -0
- nldcsc_elastic_rules/rules/integrations/aws/discovery_servicequotas_multi_region_service_quota_requests.toml +125 -0
- nldcsc_elastic_rules/rules/integrations/aws/execution_lambda_external_layer_added_to_function.toml +98 -0
- nldcsc_elastic_rules/rules/integrations/aws/execution_new_terms_cloudformation_createstack.toml +119 -0
- nldcsc_elastic_rules/rules/integrations/aws/execution_ssm_command_document_created_by_rare_user.toml +117 -0
- nldcsc_elastic_rules/rules/integrations/aws/execution_ssm_sendcommand_by_rare_user.toml +138 -0
- nldcsc_elastic_rules/rules/integrations/aws/exfiltration_dynamodb_scan_by_unusual_user.toml +133 -0
- nldcsc_elastic_rules/rules/integrations/aws/exfiltration_dynamodb_table_exported_to_s3.toml +115 -0
- nldcsc_elastic_rules/rules/integrations/aws/exfiltration_ec2_ami_shared_with_separate_account.toml +100 -0
- nldcsc_elastic_rules/rules/integrations/aws/exfiltration_ec2_ebs_snapshot_shared_with_another_account.toml +150 -0
- nldcsc_elastic_rules/rules/integrations/aws/exfiltration_ec2_export_task.toml +154 -0
- nldcsc_elastic_rules/rules/integrations/aws/exfiltration_ec2_full_network_packet_capture_detected.toml +185 -0
- nldcsc_elastic_rules/rules/integrations/aws/exfiltration_ec2_vm_export_failure.toml +108 -0
- nldcsc_elastic_rules/rules/integrations/aws/exfiltration_rds_snapshot_export.toml +88 -0
- nldcsc_elastic_rules/rules/integrations/aws/exfiltration_rds_snapshot_shared_with_another_account.toml +100 -0
- nldcsc_elastic_rules/rules/integrations/aws/exfiltration_s3_bucket_policy_added_for_external_account_access.toml +194 -0
- nldcsc_elastic_rules/rules/integrations/aws/exfiltration_s3_bucket_policy_added_for_public_access.toml +188 -0
- nldcsc_elastic_rules/rules/integrations/aws/exfiltration_s3_bucket_replicated_to_external_account.toml +93 -0
- nldcsc_elastic_rules/rules/integrations/aws/exfiltration_sns_rare_protocol_subscription_by_user.toml +155 -0
- nldcsc_elastic_rules/rules/integrations/aws/impact_aws_eventbridge_rule_disabled_or_deleted.toml +94 -0
- nldcsc_elastic_rules/rules/integrations/aws/impact_aws_s3_bucket_enumeration_or_brute_force.toml +152 -0
- nldcsc_elastic_rules/rules/integrations/aws/impact_cloudtrail_logging_updated.toml +137 -0
- nldcsc_elastic_rules/rules/integrations/aws/impact_cloudwatch_log_group_deletion.toml +202 -0
- nldcsc_elastic_rules/rules/integrations/aws/impact_cloudwatch_log_stream_deletion.toml +189 -0
- nldcsc_elastic_rules/rules/integrations/aws/impact_ec2_disable_ebs_encryption.toml +156 -0
- nldcsc_elastic_rules/rules/integrations/aws/impact_ec2_ebs_snapshot_access_removed.toml +147 -0
- nldcsc_elastic_rules/rules/integrations/aws/impact_efs_filesystem_or_mount_deleted.toml +95 -0
- nldcsc_elastic_rules/rules/integrations/aws/impact_iam_deactivate_mfa_device.toml +167 -0
- nldcsc_elastic_rules/rules/integrations/aws/impact_iam_group_deletion.toml +119 -0
- nldcsc_elastic_rules/rules/integrations/aws/impact_kms_cmk_disabled_or_scheduled_for_deletion.toml +103 -0
- nldcsc_elastic_rules/rules/integrations/aws/impact_rds_group_deletion.toml +98 -0
- nldcsc_elastic_rules/rules/integrations/aws/impact_rds_instance_cluster_deletion.toml +105 -0
- nldcsc_elastic_rules/rules/integrations/aws/impact_rds_instance_cluster_deletion_protection_disabled.toml +97 -0
- nldcsc_elastic_rules/rules/integrations/aws/impact_rds_instance_cluster_stoppage.toml +100 -0
- nldcsc_elastic_rules/rules/integrations/aws/impact_rds_snapshot_deleted.toml +98 -0
- nldcsc_elastic_rules/rules/integrations/aws/impact_s3_bucket_object_uploaded_with_ransom_extension.toml +155 -0
- nldcsc_elastic_rules/rules/integrations/aws/impact_s3_excessive_object_encryption_with_sse_c.toml +139 -0
- nldcsc_elastic_rules/rules/integrations/aws/impact_s3_object_encryption_with_external_key.toml +126 -0
- nldcsc_elastic_rules/rules/integrations/aws/impact_s3_object_versioning_disabled.toml +153 -0
- nldcsc_elastic_rules/rules/integrations/aws/impact_s3_static_site_js_file_uploaded.toml +154 -0
- nldcsc_elastic_rules/rules/integrations/aws/impact_s3_unusual_object_encryption_with_sse_c.toml +143 -0
- nldcsc_elastic_rules/rules/integrations/aws/initial_access_console_login_root.toml +165 -0
- nldcsc_elastic_rules/rules/integrations/aws/initial_access_iam_session_token_used_from_multiple_addresses.toml +225 -0
- nldcsc_elastic_rules/rules/integrations/aws/initial_access_kali_user_agent_detected_with_aws_cli.toml +89 -0
- nldcsc_elastic_rules/rules/integrations/aws/initial_access_password_recovery.toml +137 -0
- nldcsc_elastic_rules/rules/integrations/aws/initial_access_signin_console_login_federated_user.toml +131 -0
- nldcsc_elastic_rules/rules/integrations/aws/lateral_movement_aws_ssm_start_session_to_ec2_instance.toml +123 -0
- nldcsc_elastic_rules/rules/integrations/aws/lateral_movement_ec2_instance_connect_ssh_public_key_uploaded.toml +141 -0
- nldcsc_elastic_rules/rules/integrations/aws/lateral_movement_ec2_instance_console_login.toml +206 -0
- nldcsc_elastic_rules/rules/integrations/aws/lateral_movement_sns_topic_message_publish_by_rare_user.toml +190 -0
- nldcsc_elastic_rules/rules/integrations/aws/ml_cloudtrail_error_message_spike.toml +114 -0
- nldcsc_elastic_rules/rules/integrations/aws/ml_cloudtrail_rare_error_code.toml +116 -0
- nldcsc_elastic_rules/rules/integrations/aws/ml_cloudtrail_rare_method_by_city.toml +118 -0
- nldcsc_elastic_rules/rules/integrations/aws/ml_cloudtrail_rare_method_by_country.toml +118 -0
- nldcsc_elastic_rules/rules/integrations/aws/ml_cloudtrail_rare_method_by_user.toml +116 -0
- nldcsc_elastic_rules/rules/integrations/aws/persistence_aws_attempt_to_register_virtual_mfa_device.toml +171 -0
- nldcsc_elastic_rules/rules/integrations/aws/persistence_ec2_network_acl_creation.toml +133 -0
- nldcsc_elastic_rules/rules/integrations/aws/persistence_ec2_route_table_modified_or_deleted.toml +151 -0
- nldcsc_elastic_rules/rules/integrations/aws/persistence_ec2_security_group_configuration_change_detection.toml +144 -0
- nldcsc_elastic_rules/rules/integrations/aws/persistence_iam_api_calls_via_user_session_token.toml +173 -0
- nldcsc_elastic_rules/rules/integrations/aws/persistence_iam_create_login_profile_for_root.toml +167 -0
- nldcsc_elastic_rules/rules/integrations/aws/persistence_iam_create_user_via_assumed_role_on_ec2_instance.toml +142 -0
- nldcsc_elastic_rules/rules/integrations/aws/persistence_iam_group_creation.toml +136 -0
- nldcsc_elastic_rules/rules/integrations/aws/persistence_iam_roles_anywhere_profile_created.toml +176 -0
- nldcsc_elastic_rules/rules/integrations/aws/persistence_iam_roles_anywhere_trusted_anchor_created_with_external_ca.toml +169 -0
- nldcsc_elastic_rules/rules/integrations/aws/persistence_iam_user_created_access_keys_for_another_user.toml +215 -0
- nldcsc_elastic_rules/rules/integrations/aws/persistence_lambda_backdoor_invoke_function_for_any_principal.toml +100 -0
- nldcsc_elastic_rules/rules/integrations/aws/persistence_rds_cluster_creation.toml +110 -0
- nldcsc_elastic_rules/rules/integrations/aws/persistence_rds_db_instance_password_modified.toml +116 -0
- nldcsc_elastic_rules/rules/integrations/aws/persistence_rds_group_creation.toml +103 -0
- nldcsc_elastic_rules/rules/integrations/aws/persistence_rds_instance_creation.toml +90 -0
- nldcsc_elastic_rules/rules/integrations/aws/persistence_rds_instance_made_public.toml +110 -0
- nldcsc_elastic_rules/rules/integrations/aws/persistence_redshift_instance_creation.toml +93 -0
- nldcsc_elastic_rules/rules/integrations/aws/persistence_route_53_domain_transfer_lock_disabled.toml +107 -0
- nldcsc_elastic_rules/rules/integrations/aws/persistence_route_53_domain_transferred_to_another_account.toml +102 -0
- nldcsc_elastic_rules/rules/integrations/aws/persistence_route_53_hosted_zone_associated_with_a_vpc.toml +94 -0
- nldcsc_elastic_rules/rules/integrations/aws/persistence_route_table_created.toml +123 -0
- nldcsc_elastic_rules/rules/integrations/aws/persistence_sts_assume_role_with_new_mfa.toml +162 -0
- nldcsc_elastic_rules/rules/integrations/aws/privilege_escalation_iam_administratoraccess_policy_attached_to_group.toml +176 -0
- nldcsc_elastic_rules/rules/integrations/aws/privilege_escalation_iam_administratoraccess_policy_attached_to_role.toml +173 -0
- nldcsc_elastic_rules/rules/integrations/aws/privilege_escalation_iam_administratoraccess_policy_attached_to_user.toml +180 -0
- nldcsc_elastic_rules/rules/integrations/aws/privilege_escalation_iam_customer_managed_policy_attached_to_role.toml +140 -0
- nldcsc_elastic_rules/rules/integrations/aws/privilege_escalation_iam_saml_provider_updated.toml +163 -0
- nldcsc_elastic_rules/rules/integrations/aws/privilege_escalation_iam_update_assume_role_policy.toml +139 -0
- nldcsc_elastic_rules/rules/integrations/aws/privilege_escalation_role_assumption_by_service.toml +158 -0
- nldcsc_elastic_rules/rules/integrations/aws/privilege_escalation_role_assumption_by_user.toml +146 -0
- nldcsc_elastic_rules/rules/integrations/aws/privilege_escalation_sts_assume_root_from_rare_user_and_member_account.toml +170 -0
- nldcsc_elastic_rules/rules/integrations/aws/privilege_escalation_sts_role_chaining.toml +176 -0
- nldcsc_elastic_rules/rules/integrations/aws/resource_development_sns_topic_created_by_rare_user.toml +169 -0
- nldcsc_elastic_rules/rules/integrations/aws_bedrock/aws_bedrock_execution_without_guardrails.toml +109 -0
- nldcsc_elastic_rules/rules/integrations/aws_bedrock/aws_bedrock_guardrails_multiple_violations_by_single_user.toml +109 -0
- nldcsc_elastic_rules/rules/integrations/aws_bedrock/aws_bedrock_guardrails_multiple_violations_in_single_request.toml +118 -0
- nldcsc_elastic_rules/rules/integrations/aws_bedrock/aws_bedrock_high_confidence_misconduct_blocks_detected.toml +122 -0
- nldcsc_elastic_rules/rules/integrations/aws_bedrock/aws_bedrock_high_resource_consumption_detection.toml +117 -0
- nldcsc_elastic_rules/rules/integrations/aws_bedrock/aws_bedrock_multiple_attempts_to_use_denied_models_by_user.toml +111 -0
- nldcsc_elastic_rules/rules/integrations/aws_bedrock/aws_bedrock_multiple_sensitive_information_policy_blocks_detected.toml +108 -0
- nldcsc_elastic_rules/rules/integrations/aws_bedrock/aws_bedrock_multiple_topic_policy_blocks_detected.toml +108 -0
- nldcsc_elastic_rules/rules/integrations/aws_bedrock/aws_bedrock_multiple_validation_exception_errors_by_single_user.toml +117 -0
- nldcsc_elastic_rules/rules/integrations/aws_bedrock/aws_bedrock_multiple_word_policy_blocks_detected.toml +108 -0
- nldcsc_elastic_rules/rules/integrations/azure/collection_azure_storage_account_blob_public_access_enabled.toml +106 -0
- nldcsc_elastic_rules/rules/integrations/azure/collection_entra_auth_broker_sharepoint_access_for_user_principal.toml +131 -0
- nldcsc_elastic_rules/rules/integrations/azure/collection_graph_email_access_by_unusual_public_client_via_graph.toml +122 -0
- nldcsc_elastic_rules/rules/integrations/azure/credential_access_azure_entra_suspicious_signin.toml +164 -0
- nldcsc_elastic_rules/rules/integrations/azure/credential_access_azure_entra_totp_brute_force_attempts.toml +179 -0
- nldcsc_elastic_rules/rules/integrations/azure/credential_access_azure_full_network_packet_capture_detected.toml +96 -0
- nldcsc_elastic_rules/rules/integrations/azure/credential_access_azure_key_vault_excessive_retrieval.toml +193 -0
- nldcsc_elastic_rules/rules/integrations/azure/credential_access_azure_key_vault_retrieval_from_rare_identity.toml +142 -0
- nldcsc_elastic_rules/rules/integrations/azure/credential_access_azure_storage_account_keys_accessed.toml +129 -0
- nldcsc_elastic_rules/rules/integrations/azure/credential_access_entra_id_brute_force_activity.toml +255 -0
- nldcsc_elastic_rules/rules/integrations/azure/credential_access_entra_id_excessive_account_lockouts.toml +137 -0
- nldcsc_elastic_rules/rules/integrations/azure/credential_access_entra_signin_brute_force_microsoft_365.toml +265 -0
- nldcsc_elastic_rules/rules/integrations/azure/credential_access_storage_account_key_regenerated.toml +117 -0
- nldcsc_elastic_rules/rules/integrations/azure/defense_evasion_azure_automation_runbook_deleted.toml +83 -0
- nldcsc_elastic_rules/rules/integrations/azure/defense_evasion_azure_blob_permissions_modified.toml +97 -0
- nldcsc_elastic_rules/rules/integrations/azure/defense_evasion_azure_diagnostic_settings_deletion.toml +128 -0
- nldcsc_elastic_rules/rules/integrations/azure/defense_evasion_event_hub_deletion.toml +98 -0
- nldcsc_elastic_rules/rules/integrations/azure/defense_evasion_firewall_policy_deletion.toml +100 -0
- nldcsc_elastic_rules/rules/integrations/azure/defense_evasion_frontdoor_firewall_policy_deletion.toml +103 -0
- nldcsc_elastic_rules/rules/integrations/azure/defense_evasion_kubernetes_events_deleted.toml +98 -0
- nldcsc_elastic_rules/rules/integrations/azure/defense_evasion_network_watcher_deletion.toml +99 -0
- nldcsc_elastic_rules/rules/integrations/azure/defense_evasion_suppression_rule_created.toml +94 -0
- nldcsc_elastic_rules/rules/integrations/azure/discovery_blob_container_access_mod.toml +112 -0
- nldcsc_elastic_rules/rules/integrations/azure/discovery_bloodhound_user_agents_detected.toml +171 -0
- nldcsc_elastic_rules/rules/integrations/azure/discovery_teamfiltration_user_agents_detected.toml +173 -0
- nldcsc_elastic_rules/rules/integrations/azure/execution_azure_automation_runbook_created_or_modified.toml +92 -0
- nldcsc_elastic_rules/rules/integrations/azure/execution_command_virtual_machine.toml +96 -0
- nldcsc_elastic_rules/rules/integrations/azure/exfiltration_azure_storage_blob_download_azcopy_sas_token.toml +121 -0
- nldcsc_elastic_rules/rules/integrations/azure/impact_azure_compute_restore_point_collection_deleted.toml +111 -0
- nldcsc_elastic_rules/rules/integrations/azure/impact_azure_compute_restore_point_collections_deleted.toml +132 -0
- nldcsc_elastic_rules/rules/integrations/azure/impact_azure_compute_vm_snapshot_deletion.toml +132 -0
- nldcsc_elastic_rules/rules/integrations/azure/impact_azure_compute_vm_snapshot_deletions.toml +136 -0
- nldcsc_elastic_rules/rules/integrations/azure/impact_azure_key_vault_modified.toml +95 -0
- nldcsc_elastic_rules/rules/integrations/azure/impact_azure_storage_account_deletion.toml +110 -0
- nldcsc_elastic_rules/rules/integrations/azure/impact_azure_storage_account_deletion_multiple.toml +115 -0
- nldcsc_elastic_rules/rules/integrations/azure/impact_kubernetes_pod_deleted.toml +96 -0
- nldcsc_elastic_rules/rules/integrations/azure/impact_resource_group_deletion.toml +110 -0
- nldcsc_elastic_rules/rules/integrations/azure/initial_access_azure_active_directory_high_risk_signin_atrisk_or_confirmed.toml +102 -0
- nldcsc_elastic_rules/rules/integrations/azure/initial_access_azure_active_directory_powershell_signin.toml +125 -0
- nldcsc_elastic_rules/rules/integrations/azure/initial_access_entra_graph_single_session_from_multiple_addresses.toml +224 -0
- nldcsc_elastic_rules/rules/integrations/azure/initial_access_entra_id_actor_token_user_impersonation_abuse.toml +134 -0
- nldcsc_elastic_rules/rules/integrations/azure/initial_access_entra_id_device_code_auth_with_broker_client.toml +124 -0
- nldcsc_elastic_rules/rules/integrations/azure/initial_access_entra_id_high_risk_signin.toml +100 -0
- nldcsc_elastic_rules/rules/integrations/azure/initial_access_entra_id_oauth_user_impersonation_scope.toml +167 -0
- nldcsc_elastic_rules/rules/integrations/azure/initial_access_entra_id_protection_confirmed_compromise.toml +146 -0
- nldcsc_elastic_rules/rules/integrations/azure/initial_access_entra_id_protection_sign_in_risk_detected.toml +190 -0
- nldcsc_elastic_rules/rules/integrations/azure/initial_access_entra_id_protection_user_risk_detected.toml +187 -0
- nldcsc_elastic_rules/rules/integrations/azure/initial_access_entra_id_suspicious_oauth_flow_via_auth_broker_to_drs.toml +232 -0
- nldcsc_elastic_rules/rules/integrations/azure/initial_access_entra_id_unusual_ropc_login_attempt.toml +106 -0
- nldcsc_elastic_rules/rules/integrations/azure/initial_access_entra_id_user_reported_risk.toml +97 -0
- nldcsc_elastic_rules/rules/integrations/azure/initial_access_entra_illicit_consent_grant_via_registered_application.toml +145 -0
- nldcsc_elastic_rules/rules/integrations/azure/initial_access_entra_oauth_phishing_via_vscode_client.toml +133 -0
- nldcsc_elastic_rules/rules/integrations/azure/initial_access_entra_protection_multi_azure_identity_protection_alerts.toml +98 -0
- nldcsc_elastic_rules/rules/integrations/azure/initial_access_entra_rare_app_id_for_principal_auth.toml +148 -0
- nldcsc_elastic_rules/rules/integrations/azure/initial_access_entra_rare_authentication_requirement_for_principal_user.toml +153 -0
- nldcsc_elastic_rules/rules/integrations/azure/initial_access_external_guest_user_invite.toml +103 -0
- nldcsc_elastic_rules/rules/integrations/azure/initial_access_first_time_seen_device_code_auth.toml +140 -0
- nldcsc_elastic_rules/rules/integrations/azure/initial_access_graph_first_occurrence_of_client_request.toml +143 -0
- nldcsc_elastic_rules/rules/integrations/azure/persistence_azure_application_credential_modification.toml +104 -0
- nldcsc_elastic_rules/rules/integrations/azure/persistence_azure_automation_account_created.toml +98 -0
- nldcsc_elastic_rules/rules/integrations/azure/persistence_azure_automation_webhook_created.toml +102 -0
- nldcsc_elastic_rules/rules/integrations/azure/persistence_azure_global_administrator_role_assigned.toml +101 -0
- nldcsc_elastic_rules/rules/integrations/azure/persistence_azure_pim_user_added_global_admin.toml +101 -0
- nldcsc_elastic_rules/rules/integrations/azure/persistence_azure_privileged_identity_management_role_modified.toml +114 -0
- nldcsc_elastic_rules/rules/integrations/azure/persistence_azure_service_principal_credentials_added.toml +111 -0
- nldcsc_elastic_rules/rules/integrations/azure/persistence_entra_conditional_access_policy_modified.toml +116 -0
- nldcsc_elastic_rules/rules/integrations/azure/persistence_entra_id_mfa_disabled_for_user.toml +104 -0
- nldcsc_elastic_rules/rules/integrations/azure/persistence_entra_id_oidc_discovery_url_change.toml +105 -0
- nldcsc_elastic_rules/rules/integrations/azure/persistence_entra_id_rt_to_prt_transition_from_user_device.toml +152 -0
- nldcsc_elastic_rules/rules/integrations/azure/persistence_entra_id_suspicious_adrs_token_request.toml +99 -0
- nldcsc_elastic_rules/rules/integrations/azure/persistence_entra_id_suspicious_cloud_device_registration.toml +116 -0
- nldcsc_elastic_rules/rules/integrations/azure/persistence_entra_id_user_signed_in_from_unusual_device.toml +138 -0
- nldcsc_elastic_rules/rules/integrations/azure/persistence_entra_service_principal_created.toml +120 -0
- nldcsc_elastic_rules/rules/integrations/azure/persistence_graph_eam_addition_or_modification.toml +101 -0
- nldcsc_elastic_rules/rules/integrations/azure/persistence_identity_protect_alert_followed_by_device_reg.toml +107 -0
- nldcsc_elastic_rules/rules/integrations/azure/persistence_update_event_hub_auth_rule.toml +107 -0
- nldcsc_elastic_rules/rules/integrations/azure/persistence_user_added_as_owner_for_azure_application.toml +93 -0
- nldcsc_elastic_rules/rules/integrations/azure/persistence_user_added_as_owner_for_azure_service_principal.toml +95 -0
- nldcsc_elastic_rules/rules/integrations/azure/privilege_escalation_azure_kubernetes_rolebinding_created.toml +111 -0
- nldcsc_elastic_rules/rules/integrations/azure/privilege_escalation_azure_rbac_administrator_roles_assigned.toml +110 -0
- nldcsc_elastic_rules/rules/integrations/azure/privilege_escalation_entra_id_elevate_to_user_administrator_access.toml +116 -0
- nldcsc_elastic_rules/rules/integrations/azure_openai/azure_openai_denial_of_ml_service_detection.toml +100 -0
- nldcsc_elastic_rules/rules/integrations/azure_openai/azure_openai_insecure_output_handling_detection.toml +94 -0
- nldcsc_elastic_rules/rules/integrations/azure_openai/azure_openai_model_theft_detection.toml +100 -0
- nldcsc_elastic_rules/rules/integrations/beaconing/command_and_control_beaconing.toml +113 -0
- nldcsc_elastic_rules/rules/integrations/beaconing/command_and_control_beaconing_high_confidence.toml +108 -0
- nldcsc_elastic_rules/rules/integrations/cyberarkpas/privilege_escalation_cyberarkpas_error_audit_event_promotion.toml +70 -0
- nldcsc_elastic_rules/rules/integrations/cyberarkpas/privilege_escalation_cyberarkpas_recommended_events_to_monitor_promotion.toml +73 -0
- nldcsc_elastic_rules/rules/integrations/ded/exfiltration_ml_high_bytes_destination_geo_country_iso_code.toml +103 -0
- nldcsc_elastic_rules/rules/integrations/ded/exfiltration_ml_high_bytes_destination_ip.toml +102 -0
- nldcsc_elastic_rules/rules/integrations/ded/exfiltration_ml_high_bytes_destination_port.toml +102 -0
- nldcsc_elastic_rules/rules/integrations/ded/exfiltration_ml_high_bytes_destination_region_name.toml +103 -0
- nldcsc_elastic_rules/rules/integrations/ded/exfiltration_ml_high_bytes_written_to_external_device.toml +102 -0
- nldcsc_elastic_rules/rules/integrations/ded/exfiltration_ml_high_bytes_written_to_external_device_airdrop.toml +103 -0
- nldcsc_elastic_rules/rules/integrations/ded/exfiltration_ml_rare_process_writing_to_external_device.toml +102 -0
- nldcsc_elastic_rules/rules/integrations/dga/command_and_control_ml_dga_activity_using_sunburst_domain.toml +117 -0
- nldcsc_elastic_rules/rules/integrations/dga/command_and_control_ml_dga_high_sum_probability.toml +109 -0
- nldcsc_elastic_rules/rules/integrations/dga/command_and_control_ml_dns_request_high_dga_probability.toml +116 -0
- nldcsc_elastic_rules/rules/integrations/dga/command_and_control_ml_dns_request_predicted_to_be_a_dga_domain.toml +117 -0
- nldcsc_elastic_rules/rules/integrations/endpoint/defense_evasion_elastic_memory_threat_detected.toml +168 -0
- nldcsc_elastic_rules/rules/integrations/endpoint/defense_evasion_elastic_memory_threat_prevented.toml +167 -0
- nldcsc_elastic_rules/rules/integrations/endpoint/elastic_endpoint_security.toml +126 -0
- nldcsc_elastic_rules/rules/integrations/endpoint/elastic_endpoint_security_behavior_detected.toml +134 -0
- nldcsc_elastic_rules/rules/integrations/endpoint/elastic_endpoint_security_behavior_prevented.toml +135 -0
- nldcsc_elastic_rules/rules/integrations/endpoint/execution_elastic_malicious_file_detected.toml +159 -0
- nldcsc_elastic_rules/rules/integrations/endpoint/execution_elastic_malicious_file_prevented.toml +159 -0
- nldcsc_elastic_rules/rules/integrations/endpoint/impact_elastic_ransomware_detected.toml +145 -0
- nldcsc_elastic_rules/rules/integrations/endpoint/impact_elastic_ransomware_prevented.toml +146 -0
- nldcsc_elastic_rules/rules/integrations/fim/persistence_suspicious_file_modifications.toml +316 -0
- nldcsc_elastic_rules/rules/integrations/gcp/collection_gcp_pub_sub_subscription_creation.toml +94 -0
- nldcsc_elastic_rules/rules/integrations/gcp/collection_gcp_pub_sub_topic_creation.toml +97 -0
- nldcsc_elastic_rules/rules/integrations/gcp/defense_evasion_gcp_firewall_rule_created.toml +100 -0
- nldcsc_elastic_rules/rules/integrations/gcp/defense_evasion_gcp_firewall_rule_deleted.toml +97 -0
- nldcsc_elastic_rules/rules/integrations/gcp/defense_evasion_gcp_firewall_rule_modified.toml +100 -0
- nldcsc_elastic_rules/rules/integrations/gcp/defense_evasion_gcp_logging_bucket_deletion.toml +97 -0
- nldcsc_elastic_rules/rules/integrations/gcp/defense_evasion_gcp_logging_sink_deletion.toml +94 -0
- nldcsc_elastic_rules/rules/integrations/gcp/defense_evasion_gcp_pub_sub_subscription_deletion.toml +95 -0
- nldcsc_elastic_rules/rules/integrations/gcp/defense_evasion_gcp_pub_sub_topic_deletion.toml +96 -0
- nldcsc_elastic_rules/rules/integrations/gcp/defense_evasion_gcp_storage_bucket_configuration_modified.toml +95 -0
- nldcsc_elastic_rules/rules/integrations/gcp/defense_evasion_gcp_storage_bucket_permissions_modified.toml +95 -0
- nldcsc_elastic_rules/rules/integrations/gcp/defense_evasion_gcp_virtual_private_cloud_network_deleted.toml +100 -0
- nldcsc_elastic_rules/rules/integrations/gcp/defense_evasion_gcp_virtual_private_cloud_route_created.toml +101 -0
- nldcsc_elastic_rules/rules/integrations/gcp/defense_evasion_gcp_virtual_private_cloud_route_deleted.toml +101 -0
- nldcsc_elastic_rules/rules/integrations/gcp/exfiltration_gcp_logging_sink_modification.toml +97 -0
- nldcsc_elastic_rules/rules/integrations/gcp/impact_gcp_iam_role_deletion.toml +96 -0
- nldcsc_elastic_rules/rules/integrations/gcp/impact_gcp_service_account_deleted.toml +96 -0
- nldcsc_elastic_rules/rules/integrations/gcp/impact_gcp_service_account_disabled.toml +96 -0
- nldcsc_elastic_rules/rules/integrations/gcp/impact_gcp_storage_bucket_deleted.toml +87 -0
- nldcsc_elastic_rules/rules/integrations/gcp/initial_access_gcp_iam_custom_role_creation.toml +107 -0
- nldcsc_elastic_rules/rules/integrations/gcp/persistence_gcp_iam_service_account_key_deletion.toml +99 -0
- nldcsc_elastic_rules/rules/integrations/gcp/persistence_gcp_key_created_for_service_account.toml +100 -0
- nldcsc_elastic_rules/rules/integrations/gcp/persistence_gcp_service_account_created.toml +96 -0
- nldcsc_elastic_rules/rules/integrations/github/defense_evasion_github_protected_branch_settings_changed.toml +90 -0
- nldcsc_elastic_rules/rules/integrations/github/execution_github_app_deleted.toml +80 -0
- nldcsc_elastic_rules/rules/integrations/github/execution_github_high_number_of_cloned_repos_from_pat.toml +93 -0
- nldcsc_elastic_rules/rules/integrations/github/execution_github_ueba_multiple_behavior_alerts_from_account.toml +88 -0
- nldcsc_elastic_rules/rules/integrations/github/execution_new_github_app_installed.toml +85 -0
- nldcsc_elastic_rules/rules/integrations/github/impact_github_repository_deleted.toml +84 -0
- nldcsc_elastic_rules/rules/integrations/github/persistence_github_org_owner_added.toml +90 -0
- nldcsc_elastic_rules/rules/integrations/github/persistence_organization_owner_role_granted.toml +88 -0
- nldcsc_elastic_rules/rules/integrations/google_workspace/collection_google_drive_ownership_transferred_via_google_workspace.toml +119 -0
- nldcsc_elastic_rules/rules/integrations/google_workspace/collection_google_workspace_custom_gmail_route_created_or_modified.toml +119 -0
- nldcsc_elastic_rules/rules/integrations/google_workspace/credential_access_google_workspace_drive_encryption_key_accessed_by_anonymous_user.toml +120 -0
- nldcsc_elastic_rules/rules/integrations/google_workspace/defense_evasion_application_removed_from_blocklist_in_google_workspace.toml +125 -0
- nldcsc_elastic_rules/rules/integrations/google_workspace/defense_evasion_domain_added_to_google_workspace_trusted_domains.toml +117 -0
- nldcsc_elastic_rules/rules/integrations/google_workspace/defense_evasion_google_workspace_bitlocker_setting_disabled.toml +118 -0
- nldcsc_elastic_rules/rules/integrations/google_workspace/defense_evasion_google_workspace_new_oauth_login_from_third_party_application.toml +133 -0
- nldcsc_elastic_rules/rules/integrations/google_workspace/defense_evasion_restrictions_for_marketplace_modified_to_allow_any_app.toml +126 -0
- nldcsc_elastic_rules/rules/integrations/google_workspace/google_workspace_alert_center_promotion.toml +76 -0
- nldcsc_elastic_rules/rules/integrations/google_workspace/impact_google_workspace_admin_role_deletion.toml +112 -0
- nldcsc_elastic_rules/rules/integrations/google_workspace/impact_google_workspace_mfa_enforcement_disabled.toml +116 -0
- nldcsc_elastic_rules/rules/integrations/google_workspace/initial_access_external_user_added_to_google_workspace_group.toml +122 -0
- nldcsc_elastic_rules/rules/integrations/google_workspace/initial_access_google_workspace_suspended_user_renewed.toml +112 -0
- nldcsc_elastic_rules/rules/integrations/google_workspace/initial_access_object_copied_to_external_drive_with_app_consent.toml +134 -0
- nldcsc_elastic_rules/rules/integrations/google_workspace/persistence_application_added_to_google_workspace_domain.toml +111 -0
- nldcsc_elastic_rules/rules/integrations/google_workspace/persistence_google_workspace_2sv_policy_disabled.toml +116 -0
- nldcsc_elastic_rules/rules/integrations/google_workspace/persistence_google_workspace_admin_role_assigned_to_user.toml +125 -0
- nldcsc_elastic_rules/rules/integrations/google_workspace/persistence_google_workspace_api_access_granted_via_dwd.toml +117 -0
- nldcsc_elastic_rules/rules/integrations/google_workspace/persistence_google_workspace_custom_admin_role_created.toml +117 -0
- nldcsc_elastic_rules/rules/integrations/google_workspace/persistence_google_workspace_password_policy_modified.toml +124 -0
- nldcsc_elastic_rules/rules/integrations/google_workspace/persistence_google_workspace_role_modified.toml +119 -0
- nldcsc_elastic_rules/rules/integrations/google_workspace/persistence_google_workspace_user_organizational_unit_changed.toml +124 -0
- nldcsc_elastic_rules/rules/integrations/google_workspace/persistence_mfa_disabled_for_google_workspace_organization.toml +113 -0
- nldcsc_elastic_rules/rules/integrations/kubernetes/defense_evasion_events_deleted.toml +85 -0
- nldcsc_elastic_rules/rules/integrations/kubernetes/discovery_denied_service_account_request.toml +95 -0
- nldcsc_elastic_rules/rules/integrations/kubernetes/discovery_suspicious_self_subject_review.toml +98 -0
- nldcsc_elastic_rules/rules/integrations/kubernetes/execution_forbidden_creation_request.toml +80 -0
- nldcsc_elastic_rules/rules/integrations/kubernetes/execution_forbidden_request_from_unsual_user_agent.toml +77 -0
- nldcsc_elastic_rules/rules/integrations/kubernetes/execution_unusual_request_response_by_user_agent.toml +87 -0
- nldcsc_elastic_rules/rules/integrations/kubernetes/execution_user_exec_to_pod.toml +94 -0
- nldcsc_elastic_rules/rules/integrations/kubernetes/initial_access_anonymous_request_authorized.toml +98 -0
- nldcsc_elastic_rules/rules/integrations/kubernetes/persistence_exposed_service_created_with_type_nodeport.toml +104 -0
- nldcsc_elastic_rules/rules/integrations/kubernetes/privilege_escalation_container_created_with_excessive_linux_capabilities.toml +97 -0
- nldcsc_elastic_rules/rules/integrations/kubernetes/privilege_escalation_pod_created_with_hostipc.toml +114 -0
- nldcsc_elastic_rules/rules/integrations/kubernetes/privilege_escalation_pod_created_with_hostnetwork.toml +111 -0
- nldcsc_elastic_rules/rules/integrations/kubernetes/privilege_escalation_pod_created_with_hostpid.toml +114 -0
- nldcsc_elastic_rules/rules/integrations/kubernetes/privilege_escalation_pod_created_with_sensitive_hostpath_volume.toml +129 -0
- nldcsc_elastic_rules/rules/integrations/kubernetes/privilege_escalation_privileged_pod_created.toml +111 -0
- nldcsc_elastic_rules/rules/integrations/kubernetes/privilege_escalation_suspicious_assignment_of_controller_service_account.toml +103 -0
- nldcsc_elastic_rules/rules/integrations/lmd/lateral_movement_ml_high_mean_rdp_process_args.toml +102 -0
- nldcsc_elastic_rules/rules/integrations/lmd/lateral_movement_ml_high_mean_rdp_session_duration.toml +103 -0
- nldcsc_elastic_rules/rules/integrations/lmd/lateral_movement_ml_high_remote_file_size.toml +103 -0
- nldcsc_elastic_rules/rules/integrations/lmd/lateral_movement_ml_high_variance_rdp_session_duration.toml +103 -0
- nldcsc_elastic_rules/rules/integrations/lmd/lateral_movement_ml_rare_remote_file_directory.toml +103 -0
- nldcsc_elastic_rules/rules/integrations/lmd/lateral_movement_ml_rare_remote_file_extension.toml +102 -0
- nldcsc_elastic_rules/rules/integrations/lmd/lateral_movement_ml_spike_in_connections_from_a_source_ip.toml +103 -0
- nldcsc_elastic_rules/rules/integrations/lmd/lateral_movement_ml_spike_in_connections_to_a_destination_ip.toml +102 -0
- nldcsc_elastic_rules/rules/integrations/lmd/lateral_movement_ml_spike_in_rdp_processes.toml +101 -0
- nldcsc_elastic_rules/rules/integrations/lmd/lateral_movement_ml_spike_in_remote_file_transfers.toml +104 -0
- nldcsc_elastic_rules/rules/integrations/lmd/lateral_movement_ml_unusual_time_for_an_rdp_session.toml +103 -0
- nldcsc_elastic_rules/rules/integrations/o365/collection_microsoft_365_excessive_mail_items_accessed.toml +146 -0
- nldcsc_elastic_rules/rules/integrations/o365/collection_microsoft_365_mailbox_access_by_unusual_client_app_id.toml +195 -0
- nldcsc_elastic_rules/rules/integrations/o365/collection_microsoft_365_new_inbox_rule.toml +107 -0
- nldcsc_elastic_rules/rules/integrations/o365/collection_onedrive_excessive_file_downloads.toml +130 -0
- nldcsc_elastic_rules/rules/integrations/o365/credential_access_antra_id_device_reg_via_oauth_redirection.toml +122 -0
- nldcsc_elastic_rules/rules/integrations/o365/credential_access_microsoft_365_excessive_account_lockouts.toml +155 -0
- nldcsc_elastic_rules/rules/integrations/o365/credential_access_microsoft_365_potential_user_account_brute_force.toml +181 -0
- nldcsc_elastic_rules/rules/integrations/o365/credential_access_user_excessive_sso_logon_errors.toml +97 -0
- nldcsc_elastic_rules/rules/integrations/o365/defense_evasion_microsoft_365_exchange_anti_phish_policy_deletion.toml +102 -0
- nldcsc_elastic_rules/rules/integrations/o365/defense_evasion_microsoft_365_exchange_anti_phish_rule_mod.toml +102 -0
- nldcsc_elastic_rules/rules/integrations/o365/defense_evasion_microsoft_365_exchange_dkim_signing_config_disabled.toml +95 -0
- nldcsc_elastic_rules/rules/integrations/o365/defense_evasion_microsoft_365_exchange_dlp_policy_removed.toml +96 -0
- nldcsc_elastic_rules/rules/integrations/o365/defense_evasion_microsoft_365_exchange_malware_filter_policy_deletion.toml +97 -0
- nldcsc_elastic_rules/rules/integrations/o365/defense_evasion_microsoft_365_exchange_malware_filter_rule_mod.toml +96 -0
- nldcsc_elastic_rules/rules/integrations/o365/defense_evasion_microsoft_365_exchange_safe_attach_rule_disabled.toml +96 -0
- nldcsc_elastic_rules/rules/integrations/o365/defense_evasion_microsoft_365_exchange_safelinks_disabled.toml +100 -0
- nldcsc_elastic_rules/rules/integrations/o365/defense_evasion_microsoft_365_mailboxauditbypassassociation.toml +97 -0
- nldcsc_elastic_rules/rules/integrations/o365/defense_evasion_microsoft_365_new_inbox_rule_delete_or_move.toml +140 -0
- nldcsc_elastic_rules/rules/integrations/o365/defense_evasion_microsoft_365_susp_oauth2_authorization.toml +165 -0
- nldcsc_elastic_rules/rules/integrations/o365/defense_evasion_microsoft_365_teams_custom_app_interaction_allowed.toml +93 -0
- nldcsc_elastic_rules/rules/integrations/o365/defense_evasion_microsoft_365_teams_external_access_enabled.toml +91 -0
- nldcsc_elastic_rules/rules/integrations/o365/exfiltration_microsoft_365_exchange_transport_rule_creation.toml +91 -0
- nldcsc_elastic_rules/rules/integrations/o365/exfiltration_microsoft_365_exchange_transport_rule_mod.toml +92 -0
- nldcsc_elastic_rules/rules/integrations/o365/impact_microsoft_365_potential_ransomware_activity.toml +93 -0
- nldcsc_elastic_rules/rules/integrations/o365/impact_microsoft_365_unusual_volume_of_file_deletion.toml +84 -0
- nldcsc_elastic_rules/rules/integrations/o365/initial_access_defender_for_m365_threat_intelligence_signal.toml +105 -0
- nldcsc_elastic_rules/rules/integrations/o365/initial_access_entra_id_portal_login_atypical_travel.toml +132 -0
- nldcsc_elastic_rules/rules/integrations/o365/initial_access_entra_id_portal_login_impossible_travel.toml +131 -0
- nldcsc_elastic_rules/rules/integrations/o365/initial_access_microsoft_365_entra_oauth_phishing_via_vscode_client.toml +120 -0
- nldcsc_elastic_rules/rules/integrations/o365/initial_access_microsoft_365_illicit_consent_grant_via_registered_application.toml +154 -0
- nldcsc_elastic_rules/rules/integrations/o365/initial_access_microsoft_365_user_restricted_from_sending_email.toml +87 -0
- nldcsc_elastic_rules/rules/integrations/o365/initial_access_o365_user_reported_phish_malware.toml +97 -0
- nldcsc_elastic_rules/rules/integrations/o365/lateral_movement_malware_uploaded_onedrive.toml +104 -0
- nldcsc_elastic_rules/rules/integrations/o365/lateral_movement_malware_uploaded_sharepoint.toml +103 -0
- nldcsc_elastic_rules/rules/integrations/o365/persistence_exchange_suspicious_mailbox_permission_delegation.toml +140 -0
- nldcsc_elastic_rules/rules/integrations/o365/persistence_microsoft_365_exchange_management_role_assignment.toml +101 -0
- nldcsc_elastic_rules/rules/integrations/o365/persistence_microsoft_365_global_administrator_role_assign.toml +105 -0
- nldcsc_elastic_rules/rules/integrations/o365/persistence_microsoft_365_teams_guest_access_enabled.toml +91 -0
- nldcsc_elastic_rules/rules/integrations/o365/privilege_escalation_new_or_modified_federation_domain.toml +101 -0
- nldcsc_elastic_rules/rules/integrations/okta/credential_access_attempted_bypass_of_okta_mfa.toml +94 -0
- nldcsc_elastic_rules/rules/integrations/okta/credential_access_attempts_to_brute_force_okta_user_account.toml +96 -0
- nldcsc_elastic_rules/rules/integrations/okta/credential_access_multiple_auth_events_from_single_device_behind_proxy.toml +128 -0
- nldcsc_elastic_rules/rules/integrations/okta/credential_access_multiple_device_token_hashes_for_single_okta_session.toml +120 -0
- nldcsc_elastic_rules/rules/integrations/okta/credential_access_multiple_user_agent_os_authentication.toml +110 -0
- nldcsc_elastic_rules/rules/integrations/okta/credential_access_okta_authentication_for_multiple_users_from_single_source.toml +143 -0
- nldcsc_elastic_rules/rules/integrations/okta/credential_access_okta_authentication_for_multiple_users_with_the_same_device_token_hash.toml +141 -0
- nldcsc_elastic_rules/rules/integrations/okta/credential_access_okta_brute_force_or_password_spraying.toml +96 -0
- nldcsc_elastic_rules/rules/integrations/okta/credential_access_okta_mfa_bombing_via_push_notifications.toml +113 -0
- nldcsc_elastic_rules/rules/integrations/okta/credential_access_okta_multiple_device_token_hashes_for_single_user.toml +146 -0
- nldcsc_elastic_rules/rules/integrations/okta/credential_access_okta_potentially_successful_okta_bombing_via_push_notifications.toml +115 -0
- nldcsc_elastic_rules/rules/integrations/okta/credential_access_user_impersonation_access.toml +82 -0
- nldcsc_elastic_rules/rules/integrations/okta/defense_evasion_attempt_to_deactivate_okta_network_zone.toml +99 -0
- nldcsc_elastic_rules/rules/integrations/okta/defense_evasion_attempt_to_delete_okta_network_zone.toml +99 -0
- nldcsc_elastic_rules/rules/integrations/okta/defense_evasion_first_occurence_public_app_client_credential_token_exchange.toml +114 -0
- nldcsc_elastic_rules/rules/integrations/okta/defense_evasion_okta_attempt_to_deactivate_okta_policy.toml +106 -0
- nldcsc_elastic_rules/rules/integrations/okta/defense_evasion_okta_attempt_to_deactivate_okta_policy_rule.toml +105 -0
- nldcsc_elastic_rules/rules/integrations/okta/defense_evasion_okta_attempt_to_delete_okta_policy.toml +106 -0
- nldcsc_elastic_rules/rules/integrations/okta/defense_evasion_okta_attempt_to_delete_okta_policy_rule.toml +105 -0
- nldcsc_elastic_rules/rules/integrations/okta/defense_evasion_okta_attempt_to_modify_okta_network_zone.toml +105 -0
- nldcsc_elastic_rules/rules/integrations/okta/defense_evasion_okta_attempt_to_modify_okta_policy.toml +94 -0
- nldcsc_elastic_rules/rules/integrations/okta/defense_evasion_okta_attempt_to_modify_okta_policy_rule.toml +103 -0
- nldcsc_elastic_rules/rules/integrations/okta/defense_evasion_suspicious_okta_user_password_reset_or_unlock_attempts.toml +123 -0
- nldcsc_elastic_rules/rules/integrations/okta/impact_attempt_to_revoke_okta_api_token.toml +87 -0
- nldcsc_elastic_rules/rules/integrations/okta/impact_okta_attempt_to_deactivate_okta_application.toml +91 -0
- nldcsc_elastic_rules/rules/integrations/okta/impact_okta_attempt_to_delete_okta_application.toml +97 -0
- nldcsc_elastic_rules/rules/integrations/okta/impact_okta_attempt_to_modify_okta_application.toml +93 -0
- nldcsc_elastic_rules/rules/integrations/okta/impact_possible_okta_dos_attack.toml +96 -0
- nldcsc_elastic_rules/rules/integrations/okta/initial_access_first_occurrence_user_session_started_via_proxy.toml +89 -0
- nldcsc_elastic_rules/rules/integrations/okta/initial_access_new_authentication_behavior_detection.toml +80 -0
- nldcsc_elastic_rules/rules/integrations/okta/initial_access_okta_fastpass_phishing.toml +95 -0
- nldcsc_elastic_rules/rules/integrations/okta/initial_access_okta_user_attempted_unauthorized_access.toml +110 -0
- nldcsc_elastic_rules/rules/integrations/okta/initial_access_okta_user_sessions_started_from_different_geolocations.toml +121 -0
- nldcsc_elastic_rules/rules/integrations/okta/initial_access_sign_in_events_via_third_party_idp.toml +104 -0
- nldcsc_elastic_rules/rules/integrations/okta/initial_access_successful_application_sso_from_unknown_client_device.toml +99 -0
- nldcsc_elastic_rules/rules/integrations/okta/initial_access_suspicious_activity_reported_by_okta_user.toml +129 -0
- nldcsc_elastic_rules/rules/integrations/okta/lateral_movement_multiple_sessions_for_single_user.toml +113 -0
- nldcsc_elastic_rules/rules/integrations/okta/okta_threatinsight_threat_suspected_promotion.toml +67 -0
- nldcsc_elastic_rules/rules/integrations/okta/persistence_administrator_privileges_assigned_to_okta_group.toml +99 -0
- nldcsc_elastic_rules/rules/integrations/okta/persistence_administrator_role_assigned_to_okta_user.toml +100 -0
- nldcsc_elastic_rules/rules/integrations/okta/persistence_attempt_to_create_okta_api_token.toml +98 -0
- nldcsc_elastic_rules/rules/integrations/okta/persistence_attempt_to_reset_mfa_factors_for_okta_user_account.toml +99 -0
- nldcsc_elastic_rules/rules/integrations/okta/persistence_mfa_deactivation_with_no_reactivation.toml +103 -0
- nldcsc_elastic_rules/rules/integrations/okta/persistence_new_idp_successfully_added_by_admin.toml +94 -0
- nldcsc_elastic_rules/rules/integrations/okta/persistence_okta_attempt_to_modify_or_delete_application_sign_on_policy.toml +99 -0
- nldcsc_elastic_rules/rules/integrations/okta/persistence_stolen_credentials_used_to_login_to_okta_account_after_mfa_reset.toml +105 -0
- nldcsc_elastic_rules/rules/integrations/pad/privileged_access_ml_linux_high_count_privileged_process_events_by_user.toml +102 -0
- nldcsc_elastic_rules/rules/integrations/pad/privileged_access_ml_linux_high_median_process_command_line_entropy_by_user.toml +103 -0
- nldcsc_elastic_rules/rules/integrations/pad/privileged_access_ml_linux_rare_process_executed_by_user.toml +101 -0
- nldcsc_elastic_rules/rules/integrations/pad/privileged_access_ml_okta_high_sum_concurrent_sessions_by_user.toml +107 -0
- nldcsc_elastic_rules/rules/integrations/pad/privileged_access_ml_okta_rare_host_name_by_user.toml +102 -0
- nldcsc_elastic_rules/rules/integrations/pad/privileged_access_ml_okta_rare_region_name_by_user.toml +102 -0
- nldcsc_elastic_rules/rules/integrations/pad/privileged_access_ml_okta_rare_source_ip_by_user.toml +101 -0
- nldcsc_elastic_rules/rules/integrations/pad/privileged_access_ml_okta_spike_in_group_application_assignment_changes.toml +111 -0
- nldcsc_elastic_rules/rules/integrations/pad/privileged_access_ml_okta_spike_in_group_lifecycle_changes.toml +106 -0
- nldcsc_elastic_rules/rules/integrations/pad/privileged_access_ml_okta_spike_in_group_membership_changes.toml +106 -0
- nldcsc_elastic_rules/rules/integrations/pad/privileged_access_ml_okta_spike_in_group_privilege_changes.toml +111 -0
- nldcsc_elastic_rules/rules/integrations/pad/privileged_access_ml_okta_spike_in_user_lifecycle_management_changes.toml +105 -0
- nldcsc_elastic_rules/rules/integrations/pad/privileged_access_ml_windows_high_count_group_management_events.toml +108 -0
- nldcsc_elastic_rules/rules/integrations/pad/privileged_access_ml_windows_high_count_special_logon_events.toml +105 -0
- nldcsc_elastic_rules/rules/integrations/pad/privileged_access_ml_windows_high_count_special_privilege_use_events.toml +107 -0
- nldcsc_elastic_rules/rules/integrations/pad/privileged_access_ml_windows_high_count_user_account_management_events.toml +107 -0
- nldcsc_elastic_rules/rules/integrations/pad/privileged_access_ml_windows_rare_device_by_user.toml +102 -0
- nldcsc_elastic_rules/rules/integrations/pad/privileged_access_ml_windows_rare_group_name_by_user.toml +121 -0
- nldcsc_elastic_rules/rules/integrations/pad/privileged_access_ml_windows_rare_privilege_assigned_to_user.toml +107 -0
- nldcsc_elastic_rules/rules/integrations/pad/privileged_access_ml_windows_rare_region_name_by_user.toml +102 -0
- nldcsc_elastic_rules/rules/integrations/pad/privileged_access_ml_windows_rare_source_ip_by_user.toml +101 -0
- nldcsc_elastic_rules/rules/integrations/problemchild/defense_evasion_ml_rare_process_for_a_host.toml +105 -0
- nldcsc_elastic_rules/rules/integrations/problemchild/defense_evasion_ml_rare_process_for_a_parent_process.toml +107 -0
- nldcsc_elastic_rules/rules/integrations/problemchild/defense_evasion_ml_rare_process_for_a_user.toml +107 -0
- nldcsc_elastic_rules/rules/integrations/problemchild/defense_evasion_ml_suspicious_windows_event_high_probability.toml +118 -0
- nldcsc_elastic_rules/rules/integrations/problemchild/defense_evasion_ml_suspicious_windows_event_low_probability.toml +118 -0
- nldcsc_elastic_rules/rules/integrations/problemchild/defense_evasion_ml_suspicious_windows_process_cluster_from_host.toml +106 -0
- nldcsc_elastic_rules/rules/integrations/problemchild/defense_evasion_ml_suspicious_windows_process_cluster_from_parent_process.toml +108 -0
- nldcsc_elastic_rules/rules/integrations/problemchild/defense_evasion_ml_suspicious_windows_process_cluster_from_user.toml +108 -0
- nldcsc_elastic_rules/rules/linux/collection_linux_clipboard_activity.toml +95 -0
- nldcsc_elastic_rules/rules/linux/command_and_control_aws_cli_endpoint_url_used.toml +92 -0
- nldcsc_elastic_rules/rules/linux/command_and_control_cat_network_activity.toml +179 -0
- nldcsc_elastic_rules/rules/linux/command_and_control_cupsd_foomatic_rip_netcon.toml +154 -0
- nldcsc_elastic_rules/rules/linux/command_and_control_curl_socks_proxy_detected.toml +130 -0
- nldcsc_elastic_rules/rules/linux/command_and_control_curl_wget_spawn_via_nodejs_parent.toml +116 -0
- nldcsc_elastic_rules/rules/linux/command_and_control_frequent_egress_netcon_from_sus_executable.toml +162 -0
- nldcsc_elastic_rules/rules/linux/command_and_control_git_repo_or_file_download_to_sus_dir.toml +124 -0
- nldcsc_elastic_rules/rules/linux/command_and_control_ip_forwarding_activity.toml +99 -0
- nldcsc_elastic_rules/rules/linux/command_and_control_kubectl_networking_modification.toml +134 -0
- nldcsc_elastic_rules/rules/linux/command_and_control_linux_chisel_client_activity.toml +174 -0
- nldcsc_elastic_rules/rules/linux/command_and_control_linux_chisel_server_activity.toml +175 -0
- nldcsc_elastic_rules/rules/linux/command_and_control_linux_kworker_netcon.toml +155 -0
- nldcsc_elastic_rules/rules/linux/command_and_control_linux_proxychains_activity.toml +153 -0
- nldcsc_elastic_rules/rules/linux/command_and_control_linux_ssh_x11_forwarding.toml +147 -0
- nldcsc_elastic_rules/rules/linux/command_and_control_linux_suspicious_proxychains_activity.toml +183 -0
- nldcsc_elastic_rules/rules/linux/command_and_control_linux_tunneling_and_port_forwarding.toml +193 -0
- nldcsc_elastic_rules/rules/linux/command_and_control_linux_tunneling_via_ssh_option.toml +124 -0
- nldcsc_elastic_rules/rules/linux/command_and_control_suspicious_network_activity_from_unknown_executable.toml +228 -0
- nldcsc_elastic_rules/rules/linux/command_and_control_telegram_api_request.toml +125 -0
- nldcsc_elastic_rules/rules/linux/command_and_control_tunneling_via_earthworm.toml +189 -0
- nldcsc_elastic_rules/rules/linux/credential_access_aws_creds_search_inside_container.toml +118 -0
- nldcsc_elastic_rules/rules/linux/credential_access_collection_sensitive_files.toml +188 -0
- nldcsc_elastic_rules/rules/linux/credential_access_collection_sensitive_files_compression_inside_container.toml +135 -0
- nldcsc_elastic_rules/rules/linux/credential_access_credential_dumping.toml +126 -0
- nldcsc_elastic_rules/rules/linux/credential_access_gdb_init_process_hooking.toml +124 -0
- nldcsc_elastic_rules/rules/linux/credential_access_gdb_process_hooking.toml +105 -0
- nldcsc_elastic_rules/rules/linux/credential_access_gh_auth_via_nodejs.toml +97 -0
- nldcsc_elastic_rules/rules/linux/credential_access_kubernetes_service_account_secret_access.toml +144 -0
- nldcsc_elastic_rules/rules/linux/credential_access_manual_memory_dumping.toml +128 -0
- nldcsc_elastic_rules/rules/linux/credential_access_potential_linux_local_account_bruteforce.toml +118 -0
- nldcsc_elastic_rules/rules/linux/credential_access_potential_linux_ssh_bruteforce_external.toml +117 -0
- nldcsc_elastic_rules/rules/linux/credential_access_potential_linux_ssh_bruteforce_internal.toml +113 -0
- nldcsc_elastic_rules/rules/linux/credential_access_potential_successful_linux_ftp_bruteforce.toml +136 -0
- nldcsc_elastic_rules/rules/linux/credential_access_potential_successful_linux_rdp_bruteforce.toml +135 -0
- nldcsc_elastic_rules/rules/linux/credential_access_potential_successful_linux_ssh_bruteforce.toml +117 -0
- nldcsc_elastic_rules/rules/linux/credential_access_proc_credential_dumping.toml +132 -0
- nldcsc_elastic_rules/rules/linux/credential_access_sensitive_keys_or_passwords_search_inside_container.toml +119 -0
- nldcsc_elastic_rules/rules/linux/credential_access_ssh_backdoor_log.toml +174 -0
- nldcsc_elastic_rules/rules/linux/credential_access_ssh_password_grabbing_via_strace.toml +100 -0
- nldcsc_elastic_rules/rules/linux/credential_access_unusual_instance_metadata_service_api_request.toml +212 -0
- nldcsc_elastic_rules/rules/linux/defense_evasion_acl_modification_via_setfacl.toml +105 -0
- nldcsc_elastic_rules/rules/linux/defense_evasion_attempt_to_disable_auditd_service.toml +127 -0
- nldcsc_elastic_rules/rules/linux/defense_evasion_attempt_to_disable_iptables_or_firewall.toml +133 -0
- nldcsc_elastic_rules/rules/linux/defense_evasion_attempt_to_disable_syslog_service.toml +140 -0
- nldcsc_elastic_rules/rules/linux/defense_evasion_authorized_keys_file_deletion.toml +119 -0
- nldcsc_elastic_rules/rules/linux/defense_evasion_base16_or_base32_encoding_or_decoding_activity.toml +143 -0
- nldcsc_elastic_rules/rules/linux/defense_evasion_base64_decoding_activity.toml +203 -0
- nldcsc_elastic_rules/rules/linux/defense_evasion_binary_copied_to_suspicious_directory.toml +156 -0
- nldcsc_elastic_rules/rules/linux/defense_evasion_busybox_indirect_shell_spawn.toml +139 -0
- nldcsc_elastic_rules/rules/linux/defense_evasion_chattr_immutable_file.toml +140 -0
- nldcsc_elastic_rules/rules/linux/defense_evasion_clear_kernel_ring_buffer.toml +134 -0
- nldcsc_elastic_rules/rules/linux/defense_evasion_creation_of_hidden_files_directories.toml +99 -0
- nldcsc_elastic_rules/rules/linux/defense_evasion_curl_or_wget_executed_via_lolbin.toml +189 -0
- nldcsc_elastic_rules/rules/linux/defense_evasion_directory_creation_in_bin.toml +133 -0
- nldcsc_elastic_rules/rules/linux/defense_evasion_disable_apparmor_attempt.toml +133 -0
- nldcsc_elastic_rules/rules/linux/defense_evasion_disable_selinux_attempt.toml +139 -0
- nldcsc_elastic_rules/rules/linux/defense_evasion_doas_configuration_creation_or_rename.toml +117 -0
- nldcsc_elastic_rules/rules/linux/defense_evasion_dynamic_linker_file_creation.toml +162 -0
- nldcsc_elastic_rules/rules/linux/defense_evasion_esxi_suspicious_timestomp_touch.toml +133 -0
- nldcsc_elastic_rules/rules/linux/defense_evasion_file_deletion_via_shred.toml +124 -0
- nldcsc_elastic_rules/rules/linux/defense_evasion_file_mod_writable_dir.toml +138 -0
- nldcsc_elastic_rules/rules/linux/defense_evasion_hex_payload_execution_via_commandline.toml +143 -0
- nldcsc_elastic_rules/rules/linux/defense_evasion_hex_payload_execution_via_utility.toml +159 -0
- nldcsc_elastic_rules/rules/linux/defense_evasion_hidden_directory_creation.toml +141 -0
- nldcsc_elastic_rules/rules/linux/defense_evasion_hidden_file_dir_tmp.toml +148 -0
- nldcsc_elastic_rules/rules/linux/defense_evasion_hidden_shared_object.toml +133 -0
- nldcsc_elastic_rules/rules/linux/defense_evasion_interactive_shell_from_system_user.toml +135 -0
- nldcsc_elastic_rules/rules/linux/defense_evasion_interpreter_launched_from_decoded_payload.toml +156 -0
- nldcsc_elastic_rules/rules/linux/defense_evasion_journalctl_clear_logs.toml +132 -0
- nldcsc_elastic_rules/rules/linux/defense_evasion_kernel_module_removal.toml +153 -0
- nldcsc_elastic_rules/rules/linux/defense_evasion_kill_command_executed.toml +151 -0
- nldcsc_elastic_rules/rules/linux/defense_evasion_kthreadd_masquerading.toml +130 -0
- nldcsc_elastic_rules/rules/linux/defense_evasion_ld_preload_cmdline.toml +164 -0
- nldcsc_elastic_rules/rules/linux/defense_evasion_ld_so_creation.toml +161 -0
- nldcsc_elastic_rules/rules/linux/defense_evasion_log_files_deleted.toml +151 -0
- nldcsc_elastic_rules/rules/linux/defense_evasion_mount_execution.toml +127 -0
- nldcsc_elastic_rules/rules/linux/defense_evasion_multi_base64_decoding_attempt.toml +163 -0
- nldcsc_elastic_rules/rules/linux/defense_evasion_potential_kubectl_impersonation.toml +158 -0
- nldcsc_elastic_rules/rules/linux/defense_evasion_potential_kubectl_masquerading.toml +155 -0
- nldcsc_elastic_rules/rules/linux/defense_evasion_potential_proot_exploits.toml +124 -0
- nldcsc_elastic_rules/rules/linux/defense_evasion_prctl_process_name_tampering.toml +121 -0
- nldcsc_elastic_rules/rules/linux/defense_evasion_rename_esxi_files.toml +120 -0
- nldcsc_elastic_rules/rules/linux/defense_evasion_rename_esxi_index_file.toml +119 -0
- nldcsc_elastic_rules/rules/linux/defense_evasion_root_certificate_installation.toml +130 -0
- nldcsc_elastic_rules/rules/linux/defense_evasion_selinux_configuration_creation_or_renaming.toml +120 -0
- nldcsc_elastic_rules/rules/linux/defense_evasion_ssl_certificate_deletion.toml +134 -0
- nldcsc_elastic_rules/rules/linux/defense_evasion_sus_utility_executed_via_tmux_or_screen.toml +97 -0
- nldcsc_elastic_rules/rules/linux/defense_evasion_suspicious_path_mounted.toml +113 -0
- nldcsc_elastic_rules/rules/linux/defense_evasion_symlink_binary_to_writable_dir.toml +115 -0
- nldcsc_elastic_rules/rules/linux/defense_evasion_sysctl_kernel_feature_activity.toml +129 -0
- nldcsc_elastic_rules/rules/linux/defense_evasion_unsual_kill_signal.toml +108 -0
- nldcsc_elastic_rules/rules/linux/defense_evasion_unusual_preload_env_vars.toml +152 -0
- nldcsc_elastic_rules/rules/linux/defense_evasion_var_log_file_creation_by_unsual_process.toml +153 -0
- nldcsc_elastic_rules/rules/linux/discovery_docker_socket_discovery.toml +128 -0
- nldcsc_elastic_rules/rules/linux/discovery_dynamic_linker_via_od.toml +126 -0
- nldcsc_elastic_rules/rules/linux/discovery_esxi_software_via_find.toml +125 -0
- nldcsc_elastic_rules/rules/linux/discovery_esxi_software_via_grep.toml +125 -0
- nldcsc_elastic_rules/rules/linux/discovery_kernel_module_enumeration.toml +134 -0
- nldcsc_elastic_rules/rules/linux/discovery_kernel_seeking.toml +127 -0
- nldcsc_elastic_rules/rules/linux/discovery_kernel_unpacking.toml +126 -0
- nldcsc_elastic_rules/rules/linux/discovery_kubeconfig_file_discovery.toml +141 -0
- nldcsc_elastic_rules/rules/linux/discovery_kubectl_permission_discovery.toml +117 -0
- nldcsc_elastic_rules/rules/linux/discovery_linux_hping_activity.toml +141 -0
- nldcsc_elastic_rules/rules/linux/discovery_linux_nping_activity.toml +141 -0
- nldcsc_elastic_rules/rules/linux/discovery_manual_mount_discovery_via_exports_or_fstab.toml +117 -0
- nldcsc_elastic_rules/rules/linux/discovery_pam_version_discovery.toml +152 -0
- nldcsc_elastic_rules/rules/linux/discovery_ping_sweep_detected.toml +122 -0
- nldcsc_elastic_rules/rules/linux/discovery_polkit_version_discovery.toml +117 -0
- nldcsc_elastic_rules/rules/linux/discovery_port_scanning_activity_from_compromised_host.toml +156 -0
- nldcsc_elastic_rules/rules/linux/discovery_private_key_password_searching_activity.toml +114 -0
- nldcsc_elastic_rules/rules/linux/discovery_proc_maps_read.toml +116 -0
- nldcsc_elastic_rules/rules/linux/discovery_process_capabilities.toml +114 -0
- nldcsc_elastic_rules/rules/linux/discovery_pspy_process_monitoring_detected.toml +116 -0
- nldcsc_elastic_rules/rules/linux/discovery_security_file_access_via_common_utility.toml +122 -0
- nldcsc_elastic_rules/rules/linux/discovery_subnet_scanning_activity_from_compromised_host.toml +137 -0
- nldcsc_elastic_rules/rules/linux/discovery_sudo_allowed_command_enumeration.toml +119 -0
- nldcsc_elastic_rules/rules/linux/discovery_suid_sguid_enumeration.toml +142 -0
- nldcsc_elastic_rules/rules/linux/discovery_suspicious_memory_grep_activity.toml +96 -0
- nldcsc_elastic_rules/rules/linux/discovery_suspicious_network_tool_launched_inside_container.toml +147 -0
- nldcsc_elastic_rules/rules/linux/discovery_suspicious_which_command_execution.toml +97 -0
- nldcsc_elastic_rules/rules/linux/discovery_unusual_user_enumeration_via_id.toml +114 -0
- nldcsc_elastic_rules/rules/linux/discovery_virtual_machine_fingerprinting.toml +136 -0
- nldcsc_elastic_rules/rules/linux/discovery_yum_dnf_plugin_detection.toml +122 -0
- nldcsc_elastic_rules/rules/linux/execution_abnormal_process_id_file_created.toml +160 -0
- nldcsc_elastic_rules/rules/linux/execution_container_management_binary_launched_inside_container.toml +118 -0
- nldcsc_elastic_rules/rules/linux/execution_cupsd_foomatic_rip_file_creation.toml +134 -0
- nldcsc_elastic_rules/rules/linux/execution_cupsd_foomatic_rip_lp_user_execution.toml +138 -0
- nldcsc_elastic_rules/rules/linux/execution_cupsd_foomatic_rip_shell_execution.toml +145 -0
- nldcsc_elastic_rules/rules/linux/execution_cupsd_foomatic_rip_suspicious_child_execution.toml +161 -0
- nldcsc_elastic_rules/rules/linux/execution_curl_cve_2023_38545_heap_overflow.toml +135 -0
- nldcsc_elastic_rules/rules/linux/execution_egress_connection_from_entrypoint_in_container.toml +112 -0
- nldcsc_elastic_rules/rules/linux/execution_executable_stack_execution.toml +107 -0
- nldcsc_elastic_rules/rules/linux/execution_file_execution_followed_by_deletion.toml +125 -0
- nldcsc_elastic_rules/rules/linux/execution_file_made_executable_via_chmod_inside_container.toml +128 -0
- nldcsc_elastic_rules/rules/linux/execution_file_transfer_or_listener_established_via_netcat.toml +163 -0
- nldcsc_elastic_rules/rules/linux/execution_interpreter_tty_upgrade.toml +127 -0
- nldcsc_elastic_rules/rules/linux/execution_kubectl_apply_pod_from_url.toml +123 -0
- nldcsc_elastic_rules/rules/linux/execution_kubernetes_direct_api_request_via_curl_or_wget.toml +148 -0
- nldcsc_elastic_rules/rules/linux/execution_nc_listener_via_rlwrap.toml +133 -0
- nldcsc_elastic_rules/rules/linux/execution_netcon_from_rwx_mem_region_binary.toml +130 -0
- nldcsc_elastic_rules/rules/linux/execution_network_event_post_compilation.toml +132 -0
- nldcsc_elastic_rules/rules/linux/execution_perl_tty_shell.toml +123 -0
- nldcsc_elastic_rules/rules/linux/execution_potential_hack_tool_executed.toml +135 -0
- nldcsc_elastic_rules/rules/linux/execution_potentially_overly_permissive_container_creation.toml +144 -0
- nldcsc_elastic_rules/rules/linux/execution_process_backgrounded_by_unusual_parent.toml +152 -0
- nldcsc_elastic_rules/rules/linux/execution_process_started_from_process_id_file.toml +101 -0
- nldcsc_elastic_rules/rules/linux/execution_process_started_in_shared_memory_directory.toml +128 -0
- nldcsc_elastic_rules/rules/linux/execution_python_tty_shell.toml +121 -0
- nldcsc_elastic_rules/rules/linux/execution_python_webserver_spawned.toml +142 -0
- nldcsc_elastic_rules/rules/linux/execution_remote_code_execution_via_postgresql.toml +126 -0
- nldcsc_elastic_rules/rules/linux/execution_shell_evasion_linux_binary.toml +213 -0
- nldcsc_elastic_rules/rules/linux/execution_shell_openssl_client_or_server.toml +136 -0
- nldcsc_elastic_rules/rules/linux/execution_shell_via_background_process.toml +137 -0
- nldcsc_elastic_rules/rules/linux/execution_shell_via_child_tcp_utility_linux.toml +139 -0
- nldcsc_elastic_rules/rules/linux/execution_shell_via_java_revshell_linux.toml +143 -0
- nldcsc_elastic_rules/rules/linux/execution_shell_via_lolbin_interpreter_linux.toml +154 -0
- nldcsc_elastic_rules/rules/linux/execution_shell_via_meterpreter_linux.toml +148 -0
- nldcsc_elastic_rules/rules/linux/execution_shell_via_suspicious_binary.toml +147 -0
- nldcsc_elastic_rules/rules/linux/execution_shell_via_tcp_cli_utility_linux.toml +137 -0
- nldcsc_elastic_rules/rules/linux/execution_shell_via_udp_cli_utility_linux.toml +157 -0
- nldcsc_elastic_rules/rules/linux/execution_sus_extraction_or_decrompression_via_funzip.toml +139 -0
- nldcsc_elastic_rules/rules/linux/execution_suspicious_executable_running_system_commands.toml +139 -0
- nldcsc_elastic_rules/rules/linux/execution_suspicious_mining_process_creation_events.toml +117 -0
- nldcsc_elastic_rules/rules/linux/execution_suspicious_mkfifo_execution.toml +138 -0
- nldcsc_elastic_rules/rules/linux/execution_system_binary_file_permission_change.toml +118 -0
- nldcsc_elastic_rules/rules/linux/execution_tc_bpf_filter.toml +124 -0
- nldcsc_elastic_rules/rules/linux/execution_unix_socket_communication.toml +109 -0
- nldcsc_elastic_rules/rules/linux/execution_unknown_rwx_mem_region_binary_executed.toml +126 -0
- nldcsc_elastic_rules/rules/linux/execution_unusual_interactive_process_inside_container.toml +87 -0
- nldcsc_elastic_rules/rules/linux/execution_unusual_kthreadd_execution.toml +141 -0
- nldcsc_elastic_rules/rules/linux/execution_unusual_path_invocation_from_command_line.toml +145 -0
- nldcsc_elastic_rules/rules/linux/execution_unusual_pkexec_execution.toml +152 -0
- nldcsc_elastic_rules/rules/linux/exfiltration_potential_curl_data_exfiltration.toml +126 -0
- nldcsc_elastic_rules/rules/linux/exfiltration_potential_data_splitting_for_exfiltration.toml +131 -0
- nldcsc_elastic_rules/rules/linux/exfiltration_unusual_file_transfer_utility_launched.toml +130 -0
- nldcsc_elastic_rules/rules/linux/impact_data_encrypted_via_openssl.toml +118 -0
- nldcsc_elastic_rules/rules/linux/impact_esxi_process_kill.toml +116 -0
- nldcsc_elastic_rules/rules/linux/impact_memory_swap_modification.toml +144 -0
- nldcsc_elastic_rules/rules/linux/impact_potential_bruteforce_malware_infection.toml +178 -0
- nldcsc_elastic_rules/rules/linux/impact_potential_linux_ransomware_note_detected.toml +123 -0
- nldcsc_elastic_rules/rules/linux/impact_process_kill_threshold.toml +111 -0
- nldcsc_elastic_rules/rules/linux/initial_access_apache_struts_cve_2023_50164_exploitation_to_webshell.toml +144 -0
- nldcsc_elastic_rules/rules/linux/initial_access_first_time_public_key_authentication.toml +118 -0
- nldcsc_elastic_rules/rules/linux/initial_access_successful_ssh_authentication_by_unusual_ip.toml +111 -0
- nldcsc_elastic_rules/rules/linux/initial_access_successful_ssh_authentication_by_unusual_user.toml +95 -0
- nldcsc_elastic_rules/rules/linux/lateral_movement_kubeconfig_file_activity.toml +155 -0
- nldcsc_elastic_rules/rules/linux/lateral_movement_remote_file_creation_world_writeable_dir.toml +141 -0
- nldcsc_elastic_rules/rules/linux/lateral_movement_ssh_it_worm_download.toml +141 -0
- nldcsc_elastic_rules/rules/linux/lateral_movement_ssh_process_launched_inside_container.toml +138 -0
- nldcsc_elastic_rules/rules/linux/lateral_movement_telnet_network_activity_external.toml +138 -0
- nldcsc_elastic_rules/rules/linux/lateral_movement_telnet_network_activity_internal.toml +139 -0
- nldcsc_elastic_rules/rules/linux/lateral_movement_unusual_remote_file_creation.toml +148 -0
- nldcsc_elastic_rules/rules/linux/persistence_apt_package_manager_execution.toml +166 -0
- nldcsc_elastic_rules/rules/linux/persistence_apt_package_manager_file_creation.toml +163 -0
- nldcsc_elastic_rules/rules/linux/persistence_apt_package_manager_netcon.toml +159 -0
- nldcsc_elastic_rules/rules/linux/persistence_at_job_creation.toml +171 -0
- nldcsc_elastic_rules/rules/linux/persistence_boot_file_copy.toml +156 -0
- nldcsc_elastic_rules/rules/linux/persistence_bpf_probe_write_user.toml +121 -0
- nldcsc_elastic_rules/rules/linux/persistence_chkconfig_service_add.toml +203 -0
- nldcsc_elastic_rules/rules/linux/persistence_credential_access_modify_ssh_binaries.toml +229 -0
- nldcsc_elastic_rules/rules/linux/persistence_cron_job_creation.toml +269 -0
- nldcsc_elastic_rules/rules/linux/persistence_dbus_service_creation.toml +158 -0
- nldcsc_elastic_rules/rules/linux/persistence_dbus_unsual_daemon_parent_execution.toml +149 -0
- nldcsc_elastic_rules/rules/linux/persistence_dnf_package_manager_plugin_file_creation.toml +164 -0
- nldcsc_elastic_rules/rules/linux/persistence_dpkg_package_installation_from_unusual_parent.toml +152 -0
- nldcsc_elastic_rules/rules/linux/persistence_dpkg_unusual_execution.toml +147 -0
- nldcsc_elastic_rules/rules/linux/persistence_dracut_module_creation.toml +166 -0
- nldcsc_elastic_rules/rules/linux/persistence_dynamic_linker_backup.toml +197 -0
- nldcsc_elastic_rules/rules/linux/persistence_extract_initramfs_via_cpio.toml +137 -0
- nldcsc_elastic_rules/rules/linux/persistence_git_hook_execution.toml +152 -0
- nldcsc_elastic_rules/rules/linux/persistence_git_hook_file_creation.toml +164 -0
- nldcsc_elastic_rules/rules/linux/persistence_git_hook_netcon.toml +159 -0
- nldcsc_elastic_rules/rules/linux/persistence_git_hook_process_execution.toml +170 -0
- nldcsc_elastic_rules/rules/linux/persistence_grub_configuration_creation.toml +145 -0
- nldcsc_elastic_rules/rules/linux/persistence_grub_makeconfig.toml +130 -0
- nldcsc_elastic_rules/rules/linux/persistence_init_d_file_creation.toml +194 -0
- nldcsc_elastic_rules/rules/linux/persistence_insmod_kernel_module_load.toml +196 -0
- nldcsc_elastic_rules/rules/linux/persistence_kde_autostart_modification.toml +246 -0
- nldcsc_elastic_rules/rules/linux/persistence_kernel_driver_load.toml +126 -0
- nldcsc_elastic_rules/rules/linux/persistence_kernel_driver_load_by_non_root.toml +132 -0
- nldcsc_elastic_rules/rules/linux/persistence_kernel_object_file_creation.toml +136 -0
- nldcsc_elastic_rules/rules/linux/persistence_kubernetes_sensitive_file_activity.toml +131 -0
- nldcsc_elastic_rules/rules/linux/persistence_kworker_file_creation.toml +208 -0
- nldcsc_elastic_rules/rules/linux/persistence_linux_backdoor_user_creation.toml +165 -0
- nldcsc_elastic_rules/rules/linux/persistence_linux_group_creation.toml +137 -0
- nldcsc_elastic_rules/rules/linux/persistence_linux_shell_activity_via_web_server.toml +199 -0
- nldcsc_elastic_rules/rules/linux/persistence_linux_user_account_creation.toml +136 -0
- nldcsc_elastic_rules/rules/linux/persistence_linux_user_added_to_privileged_group.toml +163 -0
- nldcsc_elastic_rules/rules/linux/persistence_lkm_configuration_file_creation.toml +132 -0
- nldcsc_elastic_rules/rules/linux/persistence_manual_dracut_execution.toml +146 -0
- nldcsc_elastic_rules/rules/linux/persistence_message_of_the_day_creation.toml +188 -0
- nldcsc_elastic_rules/rules/linux/persistence_message_of_the_day_execution.toml +215 -0
- nldcsc_elastic_rules/rules/linux/persistence_network_manager_dispatcher_persistence.toml +163 -0
- nldcsc_elastic_rules/rules/linux/persistence_nodejs_pre_or_post_install_script_execution.toml +109 -0
- nldcsc_elastic_rules/rules/linux/persistence_openssl_passwd_hash_generation.toml +129 -0
- nldcsc_elastic_rules/rules/linux/persistence_pluggable_authentication_module_creation.toml +135 -0
- nldcsc_elastic_rules/rules/linux/persistence_pluggable_authentication_module_creation_in_unusual_dir.toml +122 -0
- nldcsc_elastic_rules/rules/linux/persistence_pluggable_authentication_module_pam_exec_backdoor_exec.toml +115 -0
- nldcsc_elastic_rules/rules/linux/persistence_pluggable_authentication_module_source_download.toml +108 -0
- nldcsc_elastic_rules/rules/linux/persistence_polkit_policy_creation.toml +132 -0
- nldcsc_elastic_rules/rules/linux/persistence_potential_persistence_script_executable_bit_set.toml +164 -0
- nldcsc_elastic_rules/rules/linux/persistence_process_capability_set_via_setcap.toml +120 -0
- nldcsc_elastic_rules/rules/linux/persistence_pth_file_creation.toml +165 -0
- nldcsc_elastic_rules/rules/linux/persistence_rc_local_error_via_syslog.toml +111 -0
- nldcsc_elastic_rules/rules/linux/persistence_rc_local_service_already_running.toml +124 -0
- nldcsc_elastic_rules/rules/linux/persistence_rc_script_creation.toml +189 -0
- nldcsc_elastic_rules/rules/linux/persistence_rpm_package_installation_from_unusual_parent.toml +146 -0
- nldcsc_elastic_rules/rules/linux/persistence_setuid_setgid_capability_set.toml +187 -0
- nldcsc_elastic_rules/rules/linux/persistence_shadow_file_modification.toml +126 -0
- nldcsc_elastic_rules/rules/linux/persistence_shared_object_creation.toml +205 -0
- nldcsc_elastic_rules/rules/linux/persistence_shell_configuration_modification.toml +154 -0
- nldcsc_elastic_rules/rules/linux/persistence_simple_web_server_connection_accepted.toml +152 -0
- nldcsc_elastic_rules/rules/linux/persistence_simple_web_server_creation.toml +160 -0
- nldcsc_elastic_rules/rules/linux/persistence_site_and_user_customize_file_creation.toml +160 -0
- nldcsc_elastic_rules/rules/linux/persistence_ssh_key_generation.toml +124 -0
- nldcsc_elastic_rules/rules/linux/persistence_ssh_netcon.toml +137 -0
- nldcsc_elastic_rules/rules/linux/persistence_ssh_via_backdoored_system_user.toml +135 -0
- nldcsc_elastic_rules/rules/linux/persistence_suspicious_file_opened_through_editor.toml +151 -0
- nldcsc_elastic_rules/rules/linux/persistence_suspicious_ssh_execution_xzbackdoor.toml +136 -0
- nldcsc_elastic_rules/rules/linux/persistence_systemd_generator_creation.toml +157 -0
- nldcsc_elastic_rules/rules/linux/persistence_systemd_netcon.toml +144 -0
- nldcsc_elastic_rules/rules/linux/persistence_systemd_scheduled_timer_created.toml +208 -0
- nldcsc_elastic_rules/rules/linux/persistence_systemd_service_creation.toml +261 -0
- nldcsc_elastic_rules/rules/linux/persistence_systemd_service_started.toml +241 -0
- nldcsc_elastic_rules/rules/linux/persistence_systemd_shell_execution.toml +132 -0
- nldcsc_elastic_rules/rules/linux/persistence_tainted_kernel_module_load.toml +124 -0
- nldcsc_elastic_rules/rules/linux/persistence_tainted_kernel_module_out_of_tree_load.toml +125 -0
- nldcsc_elastic_rules/rules/linux/persistence_udev_rule_creation.toml +142 -0
- nldcsc_elastic_rules/rules/linux/persistence_unpack_initramfs_via_unmkinitramfs.toml +152 -0
- nldcsc_elastic_rules/rules/linux/persistence_unusual_exim4_child_process.toml +103 -0
- nldcsc_elastic_rules/rules/linux/persistence_unusual_pam_grantor.toml +118 -0
- nldcsc_elastic_rules/rules/linux/persistence_unusual_sshd_child_process.toml +136 -0
- nldcsc_elastic_rules/rules/linux/persistence_user_credential_modification_via_echo.toml +109 -0
- nldcsc_elastic_rules/rules/linux/persistence_user_or_group_creation_or_modification.toml +129 -0
- nldcsc_elastic_rules/rules/linux/persistence_web_server_sus_child_spawned.toml +234 -0
- nldcsc_elastic_rules/rules/linux/persistence_web_server_sus_command_execution.toml +218 -0
- nldcsc_elastic_rules/rules/linux/persistence_web_server_sus_destination_port.toml +168 -0
- nldcsc_elastic_rules/rules/linux/persistence_xdg_autostart_netcon.toml +155 -0
- nldcsc_elastic_rules/rules/linux/persistence_yum_package_manager_plugin_file_creation.toml +159 -0
- nldcsc_elastic_rules/rules/linux/privilege_escalation_chown_chmod_unauthorized_file_read.toml +142 -0
- nldcsc_elastic_rules/rules/linux/privilege_escalation_container_util_misconfiguration.toml +128 -0
- nldcsc_elastic_rules/rules/linux/privilege_escalation_cve_2025_32463_nsswitch_file_creation.toml +124 -0
- nldcsc_elastic_rules/rules/linux/privilege_escalation_cve_2025_32463_sudo_chroot_execution.toml +124 -0
- nldcsc_elastic_rules/rules/linux/privilege_escalation_cve_2025_41244_vmtoolsd_lpe.toml +129 -0
- nldcsc_elastic_rules/rules/linux/privilege_escalation_dac_permissions.toml +132 -0
- nldcsc_elastic_rules/rules/linux/privilege_escalation_debugfs_launched_inside_container.toml +115 -0
- nldcsc_elastic_rules/rules/linux/privilege_escalation_docker_escape_via_nsenter.toml +86 -0
- nldcsc_elastic_rules/rules/linux/privilege_escalation_docker_mount_chroot_container_escape.toml +130 -0
- nldcsc_elastic_rules/rules/linux/privilege_escalation_docker_release_file_creation.toml +88 -0
- nldcsc_elastic_rules/rules/linux/privilege_escalation_enlightenment_window_manager.toml +115 -0
- nldcsc_elastic_rules/rules/linux/privilege_escalation_gdb_sys_ptrace_elevation.toml +127 -0
- nldcsc_elastic_rules/rules/linux/privilege_escalation_gdb_sys_ptrace_netcon.toml +158 -0
- nldcsc_elastic_rules/rules/linux/privilege_escalation_kworker_uid_elevation.toml +132 -0
- nldcsc_elastic_rules/rules/linux/privilege_escalation_ld_preload_shared_object_modif.toml +140 -0
- nldcsc_elastic_rules/rules/linux/privilege_escalation_linux_suspicious_symbolic_link.toml +146 -0
- nldcsc_elastic_rules/rules/linux/privilege_escalation_linux_uid_int_max_bug.toml +118 -0
- nldcsc_elastic_rules/rules/linux/privilege_escalation_load_and_unload_of_kernel_via_kexec.toml +167 -0
- nldcsc_elastic_rules/rules/linux/privilege_escalation_looney_tunables_cve_2023_4911.toml +127 -0
- nldcsc_elastic_rules/rules/linux/privilege_escalation_mount_launched_inside_container.toml +114 -0
- nldcsc_elastic_rules/rules/linux/privilege_escalation_netcon_via_sudo_binary.toml +132 -0
- nldcsc_elastic_rules/rules/linux/privilege_escalation_overlayfs_local_privesc.toml +118 -0
- nldcsc_elastic_rules/rules/linux/privilege_escalation_pkexec_envar_hijack.toml +130 -0
- nldcsc_elastic_rules/rules/linux/privilege_escalation_potential_bufferoverflow_attack.toml +112 -0
- nldcsc_elastic_rules/rules/linux/privilege_escalation_potential_suid_sgid_exploitation.toml +164 -0
- nldcsc_elastic_rules/rules/linux/privilege_escalation_potential_suid_sgid_proxy_execution.toml +163 -0
- nldcsc_elastic_rules/rules/linux/privilege_escalation_potential_wildcard_shell_spawn.toml +136 -0
- nldcsc_elastic_rules/rules/linux/privilege_escalation_sda_disk_mount_non_root.toml +119 -0
- nldcsc_elastic_rules/rules/linux/privilege_escalation_shadow_file_read.toml +140 -0
- nldcsc_elastic_rules/rules/linux/privilege_escalation_sudo_cve_2019_14287.toml +126 -0
- nldcsc_elastic_rules/rules/linux/privilege_escalation_sudo_hijacking.toml +149 -0
- nldcsc_elastic_rules/rules/linux/privilege_escalation_sudo_token_via_process_injection.toml +131 -0
- nldcsc_elastic_rules/rules/linux/privilege_escalation_suspicious_cap_setuid_python_execution.toml +126 -0
- nldcsc_elastic_rules/rules/linux/privilege_escalation_suspicious_chown_fowner_elevation.toml +122 -0
- nldcsc_elastic_rules/rules/linux/privilege_escalation_suspicious_passwd_file_write.toml +137 -0
- nldcsc_elastic_rules/rules/linux/privilege_escalation_suspicious_uid_guid_elevation.toml +142 -0
- nldcsc_elastic_rules/rules/linux/privilege_escalation_uid_change_post_compilation.toml +119 -0
- nldcsc_elastic_rules/rules/linux/privilege_escalation_uid_elevation_from_unknown_executable.toml +152 -0
- nldcsc_elastic_rules/rules/linux/privilege_escalation_unshare_namespace_manipulation.toml +129 -0
- nldcsc_elastic_rules/rules/linux/privilege_escalation_writable_docker_socket.toml +120 -0
- nldcsc_elastic_rules/rules/macos/command_and_control_unusual_connection_to_suspicious_top_level_domain.toml +104 -0
- nldcsc_elastic_rules/rules/macos/command_and_control_unusual_network_connection_to_suspicious_web_service.toml +197 -0
- nldcsc_elastic_rules/rules/macos/credential_access_credentials_keychains.toml +121 -0
- nldcsc_elastic_rules/rules/macos/credential_access_dumping_hashes_bi_cmds.toml +113 -0
- nldcsc_elastic_rules/rules/macos/credential_access_dumping_keychain_security.toml +116 -0
- nldcsc_elastic_rules/rules/macos/credential_access_high_volume_of_pbpaste.toml +121 -0
- nldcsc_elastic_rules/rules/macos/credential_access_kerberosdump_kcc.toml +124 -0
- nldcsc_elastic_rules/rules/macos/credential_access_keychain_pwd_retrieval_security_cmd.toml +135 -0
- nldcsc_elastic_rules/rules/macos/credential_access_mitm_localhost_webproxy.toml +116 -0
- nldcsc_elastic_rules/rules/macos/credential_access_potential_macos_ssh_bruteforce.toml +114 -0
- nldcsc_elastic_rules/rules/macos/credential_access_promt_for_pwd_via_osascript.toml +128 -0
- nldcsc_elastic_rules/rules/macos/credential_access_suspicious_web_browser_sensitive_file_access.toml +128 -0
- nldcsc_elastic_rules/rules/macos/credential_access_systemkey_dumping.toml +117 -0
- nldcsc_elastic_rules/rules/macos/defense_evasion_apple_softupdates_modification.toml +117 -0
- nldcsc_elastic_rules/rules/macos/defense_evasion_attempt_del_quarantine_attrib.toml +125 -0
- nldcsc_elastic_rules/rules/macos/defense_evasion_attempt_to_disable_gatekeeper.toml +115 -0
- nldcsc_elastic_rules/rules/macos/defense_evasion_install_root_certificate.toml +118 -0
- nldcsc_elastic_rules/rules/macos/defense_evasion_modify_environment_launchctl.toml +120 -0
- nldcsc_elastic_rules/rules/macos/defense_evasion_privacy_controls_tcc_database_modification.toml +122 -0
- nldcsc_elastic_rules/rules/macos/defense_evasion_privilege_escalation_privacy_pref_sshd_fulldiskaccess.toml +130 -0
- nldcsc_elastic_rules/rules/macos/defense_evasion_safari_config_change.toml +118 -0
- nldcsc_elastic_rules/rules/macos/defense_evasion_sandboxed_office_app_suspicious_zip_file.toml +114 -0
- nldcsc_elastic_rules/rules/macos/defense_evasion_tcc_bypass_mounted_apfs_access.toml +111 -0
- nldcsc_elastic_rules/rules/macos/defense_evasion_unload_endpointsecurity_kext.toml +128 -0
- nldcsc_elastic_rules/rules/macos/discovery_users_domain_built_in_commands.toml +133 -0
- nldcsc_elastic_rules/rules/macos/execution_defense_evasion_electron_app_childproc_node_js.toml +128 -0
- nldcsc_elastic_rules/rules/macos/execution_initial_access_suspicious_browser_childproc.toml +131 -0
- nldcsc_elastic_rules/rules/macos/execution_installer_package_spawned_network_event.toml +147 -0
- nldcsc_elastic_rules/rules/macos/execution_script_via_automator_workflows.toml +110 -0
- nldcsc_elastic_rules/rules/macos/execution_scripting_osascript_exec_followed_by_netcon.toml +138 -0
- nldcsc_elastic_rules/rules/macos/execution_shell_execution_via_apple_scripting.toml +114 -0
- nldcsc_elastic_rules/rules/macos/initial_access_suspicious_mac_ms_office_child_process.toml +182 -0
- nldcsc_elastic_rules/rules/macos/lateral_movement_credential_access_kerberos_bifrostconsole.toml +133 -0
- nldcsc_elastic_rules/rules/macos/lateral_movement_mounting_smb_share.toml +121 -0
- nldcsc_elastic_rules/rules/macos/lateral_movement_remote_ssh_login_enabled.toml +119 -0
- nldcsc_elastic_rules/rules/macos/lateral_movement_vpn_connection_attempt.toml +118 -0
- nldcsc_elastic_rules/rules/macos/persistence_account_creation_hide_at_logon.toml +116 -0
- nldcsc_elastic_rules/rules/macos/persistence_creation_change_launch_agents_file.toml +118 -0
- nldcsc_elastic_rules/rules/macos/persistence_creation_hidden_login_item_osascript.toml +139 -0
- nldcsc_elastic_rules/rules/macos/persistence_creation_modif_launch_deamon_sequence.toml +114 -0
- nldcsc_elastic_rules/rules/macos/persistence_credential_access_authorization_plugin_creation.toml +121 -0
- nldcsc_elastic_rules/rules/macos/persistence_crontab_creation.toml +118 -0
- nldcsc_elastic_rules/rules/macos/persistence_defense_evasion_hidden_launch_agent_deamon_logonitem_process.toml +138 -0
- nldcsc_elastic_rules/rules/macos/persistence_directory_services_plugins_modification.toml +111 -0
- nldcsc_elastic_rules/rules/macos/persistence_docker_shortcuts_plist_modification.toml +115 -0
- nldcsc_elastic_rules/rules/macos/persistence_emond_rules_file_creation.toml +117 -0
- nldcsc_elastic_rules/rules/macos/persistence_emond_rules_process_execution.toml +143 -0
- nldcsc_elastic_rules/rules/macos/persistence_enable_root_account.toml +115 -0
- nldcsc_elastic_rules/rules/macos/persistence_evasion_hidden_launch_agent_deamon_creation.toml +136 -0
- nldcsc_elastic_rules/rules/macos/persistence_finder_sync_plugin_pluginkit.toml +115 -0
- nldcsc_elastic_rules/rules/macos/persistence_folder_action_scripts_runtime.toml +126 -0
- nldcsc_elastic_rules/rules/macos/persistence_login_logout_hooks_defaults.toml +121 -0
- nldcsc_elastic_rules/rules/macos/persistence_loginwindow_plist_modification.toml +92 -0
- nldcsc_elastic_rules/rules/macos/persistence_modification_sublime_app_plugin_or_script.toml +123 -0
- nldcsc_elastic_rules/rules/macos/persistence_periodic_tasks_file_mdofiy.toml +119 -0
- nldcsc_elastic_rules/rules/macos/persistence_screensaver_engine_unexpected_child_process.toml +92 -0
- nldcsc_elastic_rules/rules/macos/persistence_screensaver_plist_file_modification.toml +114 -0
- nldcsc_elastic_rules/rules/macos/persistence_suspicious_calendar_modification.toml +117 -0
- nldcsc_elastic_rules/rules/macos/persistence_via_atom_init_file_modification.toml +115 -0
- nldcsc_elastic_rules/rules/macos/privilege_escalation_applescript_with_admin_privs.toml +124 -0
- nldcsc_elastic_rules/rules/macos/privilege_escalation_explicit_creds_via_scripting.toml +139 -0
- nldcsc_elastic_rules/rules/macos/privilege_escalation_exploit_adobe_acrobat_updater.toml +125 -0
- nldcsc_elastic_rules/rules/macos/privilege_escalation_local_user_added_to_admin.toml +119 -0
- nldcsc_elastic_rules/rules/macos/privilege_escalation_root_crontab_filemod.toml +119 -0
- nldcsc_elastic_rules/rules/macos/privilege_escalation_user_added_to_admin_group.toml +121 -0
- nldcsc_elastic_rules/rules/ml/command_and_control_ml_packetbeat_dns_tunneling.toml +129 -0
- nldcsc_elastic_rules/rules/ml/command_and_control_ml_packetbeat_rare_dns_question.toml +137 -0
- nldcsc_elastic_rules/rules/ml/command_and_control_ml_packetbeat_rare_urls.toml +141 -0
- nldcsc_elastic_rules/rules/ml/command_and_control_ml_packetbeat_rare_user_agent.toml +139 -0
- nldcsc_elastic_rules/rules/ml/credential_access_ml_auth_spike_in_failed_logon_events.toml +146 -0
- nldcsc_elastic_rules/rules/ml/credential_access_ml_auth_spike_in_logon_events.toml +148 -0
- nldcsc_elastic_rules/rules/ml/credential_access_ml_auth_spike_in_logon_events_from_a_source_ip.toml +162 -0
- nldcsc_elastic_rules/rules/ml/credential_access_ml_linux_anomalous_metadata_process.toml +140 -0
- nldcsc_elastic_rules/rules/ml/credential_access_ml_linux_anomalous_metadata_user.toml +141 -0
- nldcsc_elastic_rules/rules/ml/credential_access_ml_suspicious_login_activity.toml +145 -0
- nldcsc_elastic_rules/rules/ml/credential_access_ml_windows_anomalous_metadata_process.toml +133 -0
- nldcsc_elastic_rules/rules/ml/credential_access_ml_windows_anomalous_metadata_user.toml +135 -0
- nldcsc_elastic_rules/rules/ml/discovery_ml_linux_system_information_discovery.toml +137 -0
- nldcsc_elastic_rules/rules/ml/discovery_ml_linux_system_network_configuration_discovery.toml +137 -0
- nldcsc_elastic_rules/rules/ml/discovery_ml_linux_system_network_connection_discovery.toml +137 -0
- nldcsc_elastic_rules/rules/ml/discovery_ml_linux_system_process_discovery.toml +137 -0
- nldcsc_elastic_rules/rules/ml/discovery_ml_linux_system_user_discovery.toml +136 -0
- nldcsc_elastic_rules/rules/ml/execution_ml_windows_anomalous_script.toml +138 -0
- nldcsc_elastic_rules/rules/ml/initial_access_ml_auth_rare_hour_for_a_user_to_logon.toml +133 -0
- nldcsc_elastic_rules/rules/ml/initial_access_ml_auth_rare_source_ip_for_a_user.toml +145 -0
- nldcsc_elastic_rules/rules/ml/initial_access_ml_auth_rare_user_logon.toml +150 -0
- nldcsc_elastic_rules/rules/ml/initial_access_ml_linux_anomalous_user_name.toml +114 -0
- nldcsc_elastic_rules/rules/ml/initial_access_ml_windows_anomalous_user_name.toml +119 -0
- nldcsc_elastic_rules/rules/ml/initial_access_ml_windows_rare_user_type10_remote_login.toml +102 -0
- nldcsc_elastic_rules/rules/ml/ml_high_count_events_for_a_host_name.toml +93 -0
- nldcsc_elastic_rules/rules/ml/ml_high_count_network_denies.toml +113 -0
- nldcsc_elastic_rules/rules/ml/ml_high_count_network_events.toml +112 -0
- nldcsc_elastic_rules/rules/ml/ml_linux_anomalous_network_activity.toml +94 -0
- nldcsc_elastic_rules/rules/ml/ml_linux_anomalous_network_port_activity.toml +120 -0
- nldcsc_elastic_rules/rules/ml/ml_low_count_events_for_a_host_name.toml +93 -0
- nldcsc_elastic_rules/rules/ml/ml_packetbeat_rare_server_domain.toml +120 -0
- nldcsc_elastic_rules/rules/ml/ml_rare_destination_country.toml +117 -0
- nldcsc_elastic_rules/rules/ml/ml_spike_in_traffic_to_a_country.toml +117 -0
- nldcsc_elastic_rules/rules/ml/ml_windows_anomalous_network_activity.toml +91 -0
- nldcsc_elastic_rules/rules/ml/persistence_ml_linux_anomalous_process_all_hosts.toml +144 -0
- nldcsc_elastic_rules/rules/ml/persistence_ml_rare_process_by_host_linux.toml +144 -0
- nldcsc_elastic_rules/rules/ml/persistence_ml_rare_process_by_host_windows.toml +188 -0
- nldcsc_elastic_rules/rules/ml/persistence_ml_windows_anomalous_path_activity.toml +156 -0
- nldcsc_elastic_rules/rules/ml/persistence_ml_windows_anomalous_process_all_hosts.toml +201 -0
- nldcsc_elastic_rules/rules/ml/persistence_ml_windows_anomalous_process_creation.toml +186 -0
- nldcsc_elastic_rules/rules/ml/persistence_ml_windows_anomalous_service.toml +136 -0
- nldcsc_elastic_rules/rules/ml/privilege_escalation_ml_linux_anomalous_sudo_activity.toml +147 -0
- nldcsc_elastic_rules/rules/ml/privilege_escalation_ml_windows_rare_user_runas_event.toml +126 -0
- nldcsc_elastic_rules/rules/ml/resource_development_ml_linux_anomalous_compiler_activity.toml +141 -0
- nldcsc_elastic_rules/rules/network/command_and_control_accepted_default_telnet_port_connection.toml +121 -0
- nldcsc_elastic_rules/rules/network/command_and_control_cobalt_strike_beacon.toml +105 -0
- nldcsc_elastic_rules/rules/network/command_and_control_cobalt_strike_default_teamserver_cert.toml +105 -0
- nldcsc_elastic_rules/rules/network/command_and_control_download_rar_powershell_from_internet.toml +129 -0
- nldcsc_elastic_rules/rules/network/command_and_control_fin7_c2_behavior.toml +66 -0
- nldcsc_elastic_rules/rules/network/command_and_control_halfbaked_beacon.toml +103 -0
- nldcsc_elastic_rules/rules/network/command_and_control_nat_traversal_port_activity.toml +82 -0
- nldcsc_elastic_rules/rules/network/command_and_control_port_26_activity.toml +94 -0
- nldcsc_elastic_rules/rules/network/command_and_control_rdp_remote_desktop_protocol_from_the_internet.toml +144 -0
- nldcsc_elastic_rules/rules/network/command_and_control_vnc_virtual_network_computing_from_the_internet.toml +133 -0
- nldcsc_elastic_rules/rules/network/command_and_control_vnc_virtual_network_computing_to_the_internet.toml +122 -0
- nldcsc_elastic_rules/rules/network/discovery_potential_network_sweep_detected.toml +118 -0
- nldcsc_elastic_rules/rules/network/discovery_potential_port_scan_detected.toml +113 -0
- nldcsc_elastic_rules/rules/network/discovery_potential_syn_port_scan_detected.toml +112 -0
- nldcsc_elastic_rules/rules/network/initial_access_rpc_remote_procedure_call_from_the_internet.toml +113 -0
- nldcsc_elastic_rules/rules/network/initial_access_rpc_remote_procedure_call_to_the_internet.toml +113 -0
- nldcsc_elastic_rules/rules/network/initial_access_smb_windows_file_sharing_activity_to_the_internet.toml +126 -0
- nldcsc_elastic_rules/rules/network/initial_access_unsecure_elasticsearch_node.toml +92 -0
- nldcsc_elastic_rules/rules/network/lateral_movement_dns_server_overflow.toml +92 -0
- nldcsc_elastic_rules/rules/promotions/credential_access_endgame_cred_dumping_detected.toml +91 -0
- nldcsc_elastic_rules/rules/promotions/credential_access_endgame_cred_dumping_prevented.toml +90 -0
- nldcsc_elastic_rules/rules/promotions/crowdstrike_external_alerts.toml +112 -0
- nldcsc_elastic_rules/rules/promotions/elastic_security_external_alerts.toml +114 -0
- nldcsc_elastic_rules/rules/promotions/endgame_adversary_behavior_detected.toml +71 -0
- nldcsc_elastic_rules/rules/promotions/endgame_malware_detected.toml +71 -0
- nldcsc_elastic_rules/rules/promotions/endgame_malware_prevented.toml +72 -0
- nldcsc_elastic_rules/rules/promotions/endgame_ransomware_detected.toml +69 -0
- nldcsc_elastic_rules/rules/promotions/endgame_ransomware_prevented.toml +71 -0
- nldcsc_elastic_rules/rules/promotions/execution_endgame_exploit_detected.toml +97 -0
- nldcsc_elastic_rules/rules/promotions/execution_endgame_exploit_prevented.toml +99 -0
- nldcsc_elastic_rules/rules/promotions/external_alerts.toml +111 -0
- nldcsc_elastic_rules/rules/promotions/google_secops_external_alerts.toml +114 -0
- nldcsc_elastic_rules/rules/promotions/microsoft_sentinel_external_alerts.toml +113 -0
- nldcsc_elastic_rules/rules/promotions/privilege_escalation_endgame_cred_manipulation_detected.toml +85 -0
- nldcsc_elastic_rules/rules/promotions/privilege_escalation_endgame_cred_manipulation_prevented.toml +85 -0
- nldcsc_elastic_rules/rules/promotions/privilege_escalation_endgame_permission_theft_detected.toml +85 -0
- nldcsc_elastic_rules/rules/promotions/privilege_escalation_endgame_permission_theft_prevented.toml +85 -0
- nldcsc_elastic_rules/rules/promotions/privilege_escalation_endgame_process_injection_detected.toml +86 -0
- nldcsc_elastic_rules/rules/promotions/privilege_escalation_endgame_process_injection_prevented.toml +85 -0
- nldcsc_elastic_rules/rules/promotions/sentinelone_alert_external_alerts.toml +114 -0
- nldcsc_elastic_rules/rules/promotions/sentinelone_threat_external_alerts.toml +102 -0
- nldcsc_elastic_rules/rules/promotions/splunk_external_alerts.toml +114 -0
- nldcsc_elastic_rules/rules/threat_intel/threat_intel_indicator_match_address.toml +187 -0
- nldcsc_elastic_rules/rules/threat_intel/threat_intel_indicator_match_email.toml +167 -0
- nldcsc_elastic_rules/rules/threat_intel/threat_intel_indicator_match_hash.toml +235 -0
- nldcsc_elastic_rules/rules/threat_intel/threat_intel_indicator_match_registry.toml +174 -0
- nldcsc_elastic_rules/rules/threat_intel/threat_intel_indicator_match_url.toml +190 -0
- nldcsc_elastic_rules/rules/threat_intel/threat_intel_rapid7_threat_command.toml +108 -0
- nldcsc_elastic_rules/rules/windows/collection_email_outlook_mailbox_via_com.toml +122 -0
- nldcsc_elastic_rules/rules/windows/collection_email_powershell_exchange_mailbox.toml +142 -0
- nldcsc_elastic_rules/rules/windows/collection_mailbox_export_winlog.toml +124 -0
- nldcsc_elastic_rules/rules/windows/collection_posh_audio_capture.toml +135 -0
- nldcsc_elastic_rules/rules/windows/collection_posh_clipboard_capture.toml +164 -0
- nldcsc_elastic_rules/rules/windows/collection_posh_keylogger.toml +146 -0
- nldcsc_elastic_rules/rules/windows/collection_posh_mailbox.toml +155 -0
- nldcsc_elastic_rules/rules/windows/collection_posh_screen_grabber.toml +126 -0
- nldcsc_elastic_rules/rules/windows/collection_posh_webcam_video_capture.toml +134 -0
- nldcsc_elastic_rules/rules/windows/collection_winrar_encryption.toml +129 -0
- nldcsc_elastic_rules/rules/windows/command_and_control_certreq_postdata.toml +172 -0
- nldcsc_elastic_rules/rules/windows/command_and_control_common_llm_endpoint.toml +158 -0
- nldcsc_elastic_rules/rules/windows/command_and_control_common_webservices.toml +383 -0
- nldcsc_elastic_rules/rules/windows/command_and_control_dns_susp_tld.toml +105 -0
- nldcsc_elastic_rules/rules/windows/command_and_control_dns_tunneling_nslookup.toml +109 -0
- nldcsc_elastic_rules/rules/windows/command_and_control_encrypted_channel_freesslcert.toml +105 -0
- nldcsc_elastic_rules/rules/windows/command_and_control_headless_browser.toml +102 -0
- nldcsc_elastic_rules/rules/windows/command_and_control_iexplore_via_com.toml +119 -0
- nldcsc_elastic_rules/rules/windows/command_and_control_ingress_transfer_bits.toml +173 -0
- nldcsc_elastic_rules/rules/windows/command_and_control_new_terms_commonly_abused_rat_execution.toml +303 -0
- nldcsc_elastic_rules/rules/windows/command_and_control_outlook_home_page.toml +117 -0
- nldcsc_elastic_rules/rules/windows/command_and_control_port_forwarding_added_registry.toml +120 -0
- nldcsc_elastic_rules/rules/windows/command_and_control_rdp_tunnel_plink.toml +121 -0
- nldcsc_elastic_rules/rules/windows/command_and_control_remcos_rat_iocs.toml +104 -0
- nldcsc_elastic_rules/rules/windows/command_and_control_remote_file_copy_desktopimgdownldr.toml +183 -0
- nldcsc_elastic_rules/rules/windows/command_and_control_remote_file_copy_mpcmdrun.toml +181 -0
- nldcsc_elastic_rules/rules/windows/command_and_control_remote_file_copy_powershell.toml +191 -0
- nldcsc_elastic_rules/rules/windows/command_and_control_remote_file_copy_scripts.toml +152 -0
- nldcsc_elastic_rules/rules/windows/command_and_control_rmm_netsupport_susp_path.toml +102 -0
- nldcsc_elastic_rules/rules/windows/command_and_control_screenconnect_childproc.toml +120 -0
- nldcsc_elastic_rules/rules/windows/command_and_control_sunburst_c2_activity_detected.toml +165 -0
- nldcsc_elastic_rules/rules/windows/command_and_control_teamviewer_remote_file_copy.toml +142 -0
- nldcsc_elastic_rules/rules/windows/command_and_control_tool_transfer_via_curl.toml +121 -0
- nldcsc_elastic_rules/rules/windows/command_and_control_tunnel_vscode.toml +105 -0
- nldcsc_elastic_rules/rules/windows/credential_access_adidns_wildcard.toml +117 -0
- nldcsc_elastic_rules/rules/windows/credential_access_adidns_wpad_record.toml +113 -0
- nldcsc_elastic_rules/rules/windows/credential_access_browsers_unusual_parent.toml +125 -0
- nldcsc_elastic_rules/rules/windows/credential_access_bruteforce_admin_account.toml +141 -0
- nldcsc_elastic_rules/rules/windows/credential_access_bruteforce_multiple_logon_failure_followed_by_success.toml +153 -0
- nldcsc_elastic_rules/rules/windows/credential_access_bruteforce_multiple_logon_failure_same_srcip.toml +163 -0
- nldcsc_elastic_rules/rules/windows/credential_access_cmdline_dump_tool.toml +160 -0
- nldcsc_elastic_rules/rules/windows/credential_access_copy_ntds_sam_volshadowcp_cmdline.toml +171 -0
- nldcsc_elastic_rules/rules/windows/credential_access_credential_dumping_msbuild.toml +170 -0
- nldcsc_elastic_rules/rules/windows/credential_access_dcsync_newterm_subjectuser.toml +149 -0
- nldcsc_elastic_rules/rules/windows/credential_access_dcsync_replication_rights.toml +155 -0
- nldcsc_elastic_rules/rules/windows/credential_access_dcsync_user_backdoor.toml +124 -0
- nldcsc_elastic_rules/rules/windows/credential_access_disable_kerberos_preauth.toml +138 -0
- nldcsc_elastic_rules/rules/windows/credential_access_dnsnode_creation.toml +117 -0
- nldcsc_elastic_rules/rules/windows/credential_access_dollar_account_relay.toml +113 -0
- nldcsc_elastic_rules/rules/windows/credential_access_dollar_account_relay_kerberos.toml +129 -0
- nldcsc_elastic_rules/rules/windows/credential_access_dollar_account_relay_ntlm.toml +128 -0
- nldcsc_elastic_rules/rules/windows/credential_access_domain_backup_dpapi_private_keys.toml +80 -0
- nldcsc_elastic_rules/rules/windows/credential_access_dump_registry_hives.toml +118 -0
- nldcsc_elastic_rules/rules/windows/credential_access_generic_localdumps.toml +123 -0
- nldcsc_elastic_rules/rules/windows/credential_access_iis_connectionstrings_dumping.toml +108 -0
- nldcsc_elastic_rules/rules/windows/credential_access_imageload_azureadconnectauthsvc.toml +112 -0
- nldcsc_elastic_rules/rules/windows/credential_access_kerberoasting_unusual_process.toml +181 -0
- nldcsc_elastic_rules/rules/windows/credential_access_kerberos_coerce.toml +126 -0
- nldcsc_elastic_rules/rules/windows/credential_access_kerberos_coerce_dns.toml +118 -0
- nldcsc_elastic_rules/rules/windows/credential_access_kirbi_file.toml +103 -0
- nldcsc_elastic_rules/rules/windows/credential_access_ldap_attributes.toml +158 -0
- nldcsc_elastic_rules/rules/windows/credential_access_lsass_handle_via_malseclogon.toml +105 -0
- nldcsc_elastic_rules/rules/windows/credential_access_lsass_loaded_susp_dll.toml +160 -0
- nldcsc_elastic_rules/rules/windows/credential_access_lsass_memdump_file_created.toml +172 -0
- nldcsc_elastic_rules/rules/windows/credential_access_lsass_memdump_handle_access.toml +201 -0
- nldcsc_elastic_rules/rules/windows/credential_access_lsass_openprocess_api.toml +216 -0
- nldcsc_elastic_rules/rules/windows/credential_access_machine_account_smb_relay.toml +105 -0
- nldcsc_elastic_rules/rules/windows/credential_access_mimikatz_memssp_default_logs.toml +109 -0
- nldcsc_elastic_rules/rules/windows/credential_access_mimikatz_powershell_module.toml +132 -0
- nldcsc_elastic_rules/rules/windows/credential_access_mod_wdigest_security_provider.toml +118 -0
- nldcsc_elastic_rules/rules/windows/credential_access_moving_registry_hive_via_smb.toml +118 -0
- nldcsc_elastic_rules/rules/windows/credential_access_persistence_network_logon_provider_modification.toml +176 -0
- nldcsc_elastic_rules/rules/windows/credential_access_posh_invoke_ninjacopy.toml +136 -0
- nldcsc_elastic_rules/rules/windows/credential_access_posh_kerb_ticket_dump.toml +146 -0
- nldcsc_elastic_rules/rules/windows/credential_access_posh_minidump.toml +131 -0
- nldcsc_elastic_rules/rules/windows/credential_access_posh_relay_tools.toml +152 -0
- nldcsc_elastic_rules/rules/windows/credential_access_posh_request_ticket.toml +139 -0
- nldcsc_elastic_rules/rules/windows/credential_access_posh_veeam_sql.toml +134 -0
- nldcsc_elastic_rules/rules/windows/credential_access_potential_lsa_memdump_via_mirrordump.toml +103 -0
- nldcsc_elastic_rules/rules/windows/credential_access_rare_webdav_destination.toml +98 -0
- nldcsc_elastic_rules/rules/windows/credential_access_regback_sam_security_hives.toml +101 -0
- nldcsc_elastic_rules/rules/windows/credential_access_relay_ntlm_auth_via_http_spoolss.toml +130 -0
- nldcsc_elastic_rules/rules/windows/credential_access_remote_sam_secretsdump.toml +119 -0
- nldcsc_elastic_rules/rules/windows/credential_access_saved_creds_vault_winlog.toml +110 -0
- nldcsc_elastic_rules/rules/windows/credential_access_saved_creds_vaultcmd.toml +117 -0
- nldcsc_elastic_rules/rules/windows/credential_access_seenabledelegationprivilege_assigned_to_user.toml +121 -0
- nldcsc_elastic_rules/rules/windows/credential_access_shadow_credentials.toml +120 -0
- nldcsc_elastic_rules/rules/windows/credential_access_spn_attribute_modified.toml +124 -0
- nldcsc_elastic_rules/rules/windows/credential_access_suspicious_comsvcs_imageload.toml +172 -0
- nldcsc_elastic_rules/rules/windows/credential_access_suspicious_lsass_access_generic.toml +129 -0
- nldcsc_elastic_rules/rules/windows/credential_access_suspicious_lsass_access_memdump.toml +126 -0
- nldcsc_elastic_rules/rules/windows/credential_access_suspicious_lsass_access_via_snapshot.toml +109 -0
- nldcsc_elastic_rules/rules/windows/credential_access_suspicious_winreg_access_via_sebackup_priv.toml +143 -0
- nldcsc_elastic_rules/rules/windows/credential_access_symbolic_link_to_shadow_copy_created.toml +147 -0
- nldcsc_elastic_rules/rules/windows/credential_access_veeam_backup_dll_imageload.toml +112 -0
- nldcsc_elastic_rules/rules/windows/credential_access_veeam_commands.toml +129 -0
- nldcsc_elastic_rules/rules/windows/credential_access_via_snapshot_lsass_clone_creation.toml +96 -0
- nldcsc_elastic_rules/rules/windows/credential_access_wbadmin_ntds.toml +124 -0
- nldcsc_elastic_rules/rules/windows/credential_access_web_config_file_access.toml +96 -0
- nldcsc_elastic_rules/rules/windows/credential_access_wireless_creds_dumping.toml +153 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_adding_the_hidden_file_attribute_with_via_attribexe.toml +175 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_amsi_bypass_dllhijack.toml +177 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_amsi_bypass_powershell.toml +175 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_amsienable_key_mod.toml +132 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_audit_policy_disabled_winlog.toml +129 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_clearing_windows_console_history.toml +133 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_clearing_windows_event_logs.toml +121 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_clearing_windows_security_logs.toml +87 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_code_signing_policy_modification_builtin_tools.toml +139 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_code_signing_policy_modification_registry.toml +149 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_communication_apps_suspicious_child_process.toml +279 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_create_mod_root_certificate.toml +172 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_cve_2020_0601.toml +89 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_defender_disabled_via_registry.toml +136 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_defender_exclusion_via_powershell.toml +148 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_delete_volume_usn_journal_with_fsutil.toml +104 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_disable_nla.toml +110 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_disable_posh_scriptblocklogging.toml +129 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_disable_windows_firewall_rules_with_netsh.toml +105 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_disabling_windows_defender_powershell.toml +133 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_disabling_windows_logs.toml +136 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_dns_over_https_enabled.toml +111 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_dotnet_compiler_parent_process.toml +125 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_enable_inbound_rdp_with_netsh.toml +109 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_enable_network_discovery_with_netsh.toml +104 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_execution_control_panel_suspicious_args.toml +118 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_execution_lolbas_wuauclt.toml +151 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_execution_msbuild_started_by_office_app.toml +144 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_execution_msbuild_started_by_script.toml +130 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_execution_msbuild_started_by_system_process.toml +116 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_execution_msbuild_started_renamed.toml +155 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_execution_msbuild_started_unusal_process.toml +124 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_execution_suspicious_explorer_winword.toml +146 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_execution_windefend_unusual_path.toml +124 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_file_creation_mult_extension.toml +133 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_from_unusual_directory.toml +194 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_hide_encoded_executable_registry.toml +103 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_iis_httplogging_disabled.toml +107 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_indirect_exec_conhost.toml +93 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_indirect_exec_forfiles.toml +92 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_indirect_exec_openssh.toml +93 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_injection_msbuild.toml +111 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_installutil_beacon.toml +100 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_lolbas_win_cdb_utility.toml +108 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_lsass_ppl_disabled_registry.toml +111 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_masquerading_as_elastic_endpoint_process.toml +129 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_masquerading_as_svchost.toml +96 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_masquerading_business_apps_installer.toml +257 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_masquerading_communication_apps.toml +167 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_masquerading_renamed_autoit.toml +146 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_masquerading_suspicious_werfault_childproc.toml +144 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_masquerading_trusted_directory.toml +132 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_masquerading_werfault.toml +150 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_microsoft_defender_tampering.toml +158 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_misc_lolbin_connecting_to_the_internet.toml +147 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_modify_ownership_os_files.toml +111 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_ms_office_suspicious_regmod.toml +133 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_msbuild_making_network_connections.toml +164 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_mshta_beacon.toml +103 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_mshta_susp_child.toml +111 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_msiexec_child_proc_netcon.toml +124 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_msiexec_remote_payload.toml +110 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_msxsl_network.toml +98 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_network_connection_from_windows_binary.toml +199 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_ntlm_downgrade.toml +103 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_obf_args_unicode_modified_letters.toml +108 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_parent_process_pid_spoofing.toml +149 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_persistence_account_tokenfilterpolicy.toml +140 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_posh_assembly_load.toml +224 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_posh_compressed.toml +192 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_posh_defender_tampering.toml +151 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_posh_encryption.toml +110 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_posh_obfuscation.toml +147 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_posh_obfuscation_backtick.toml +170 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_posh_obfuscation_backtick_var.toml +157 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_posh_obfuscation_char_arrays.toml +158 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_posh_obfuscation_concat_dynamic.toml +154 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_posh_obfuscation_high_number_proportion.toml +170 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_posh_obfuscation_iex_env_vars_reconstruction.toml +159 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_posh_obfuscation_iex_string_reconstruction.toml +168 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_posh_obfuscation_index_reversal.toml +164 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_posh_obfuscation_reverse_keyword.toml +155 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_posh_obfuscation_string_concat.toml +159 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_posh_obfuscation_string_format.toml +178 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_posh_obfuscation_whitespace_special_proportion.toml +166 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_posh_process_injection.toml +163 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_powershell_windows_firewall_disabled.toml +141 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_process_termination_followed_by_deletion.toml +176 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_proxy_execution_via_msdt.toml +123 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_reg_disable_enableglobalqueryblocklist.toml +124 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_regmod_remotemonologue.toml +136 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_right_to_left_override.toml +122 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_root_dir_ads_creation.toml +106 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_run_virt_windowssandbox.toml +108 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_rundll32_no_arguments.toml +146 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_sc_sdset.toml +121 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_sccm_scnotification_dll.toml +87 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_scheduledjobs_at_protocol_enabled.toml +123 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_script_via_html_app.toml +144 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_sdelete_like_filename_rename.toml +112 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_sip_provider_mod.toml +112 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_solarwinds_backdoor_service_disabled_via_registry.toml +139 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_suspicious_certutil_commands.toml +153 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_suspicious_execution_from_mounted_device.toml +139 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_suspicious_managedcode_host_process.toml +108 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_suspicious_process_access_direct_syscall.toml +174 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_suspicious_process_creation_calltrace.toml +96 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_suspicious_scrobj_load.toml +112 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_suspicious_short_program_name.toml +141 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_suspicious_wmi_script.toml +108 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_suspicious_zoom_child_process.toml +161 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_system_critical_proc_abnormal_file_activity.toml +161 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_timestomp_sysmon.toml +109 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_unsigned_dll_loaded_from_suspdir.toml +192 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_untrusted_driver_loaded.toml +137 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_unusual_ads_file_creation.toml +193 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_unusual_dir_ads.toml +109 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_unusual_network_connection_via_dllhost.toml +101 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_unusual_network_connection_via_rundll32.toml +128 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_unusual_process_network_connection.toml +108 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_unusual_system_vp_child_program.toml +98 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_via_filter_manager.toml +155 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_wdac_policy_by_unusual_process.toml +104 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_windows_filtering_platform.toml +154 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_workfolders_control_execution.toml +108 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_wsl_bash_exec.toml +133 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_wsl_child_process.toml +124 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_wsl_enabled_via_dism.toml +104 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_wsl_filesystem.toml +98 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_wsl_kalilinux.toml +113 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_wsl_registry_modification.toml +108 -0
- nldcsc_elastic_rules/rules/windows/discovery_active_directory_webservice.toml +96 -0
- nldcsc_elastic_rules/rules/windows/discovery_ad_explorer_execution.toml +126 -0
- nldcsc_elastic_rules/rules/windows/discovery_adfind_command_activity.toml +147 -0
- nldcsc_elastic_rules/rules/windows/discovery_admin_recon.toml +133 -0
- nldcsc_elastic_rules/rules/windows/discovery_command_system_account.toml +126 -0
- nldcsc_elastic_rules/rules/windows/discovery_enumerating_domain_trusts_via_dsquery.toml +111 -0
- nldcsc_elastic_rules/rules/windows/discovery_enumerating_domain_trusts_via_nltest.toml +121 -0
- nldcsc_elastic_rules/rules/windows/discovery_group_policy_object_discovery.toml +100 -0
- nldcsc_elastic_rules/rules/windows/discovery_high_number_ad_properties.toml +98 -0
- nldcsc_elastic_rules/rules/windows/discovery_host_public_ip_address_lookup.toml +161 -0
- nldcsc_elastic_rules/rules/windows/discovery_peripheral_device.toml +96 -0
- nldcsc_elastic_rules/rules/windows/discovery_posh_invoke_sharefinder.toml +154 -0
- nldcsc_elastic_rules/rules/windows/discovery_posh_suspicious_api_functions.toml +206 -0
- nldcsc_elastic_rules/rules/windows/discovery_privileged_localgroup_membership.toml +207 -0
- nldcsc_elastic_rules/rules/windows/discovery_signal_unusual_discovery_signal_proc_cmdline.toml +91 -0
- nldcsc_elastic_rules/rules/windows/discovery_signal_unusual_discovery_signal_proc_executable.toml +86 -0
- nldcsc_elastic_rules/rules/windows/discovery_whoami_command_activity.toml +130 -0
- nldcsc_elastic_rules/rules/windows/execution_apt_solarwinds_backdoor_child_cmd_powershell.toml +140 -0
- nldcsc_elastic_rules/rules/windows/execution_apt_solarwinds_backdoor_unusual_child_processes.toml +126 -0
- nldcsc_elastic_rules/rules/windows/execution_com_object_xwizard.toml +123 -0
- nldcsc_elastic_rules/rules/windows/execution_command_prompt_connecting_to_the_internet.toml +166 -0
- nldcsc_elastic_rules/rules/windows/execution_command_shell_started_by_svchost.toml +208 -0
- nldcsc_elastic_rules/rules/windows/execution_command_shell_started_by_unusual_process.toml +127 -0
- nldcsc_elastic_rules/rules/windows/execution_command_shell_via_rundll32.toml +139 -0
- nldcsc_elastic_rules/rules/windows/execution_delayed_via_ping_lolbas_unsigned.toml +188 -0
- nldcsc_elastic_rules/rules/windows/execution_downloaded_shortcut_files.toml +110 -0
- nldcsc_elastic_rules/rules/windows/execution_downloaded_url_file.toml +107 -0
- nldcsc_elastic_rules/rules/windows/execution_enumeration_via_wmiprvse.toml +149 -0
- nldcsc_elastic_rules/rules/windows/execution_from_unusual_path_cmdline.toml +271 -0
- nldcsc_elastic_rules/rules/windows/execution_html_help_executable_program_connecting_to_the_internet.toml +175 -0
- nldcsc_elastic_rules/rules/windows/execution_initial_access_foxmail_exploit.toml +115 -0
- nldcsc_elastic_rules/rules/windows/execution_initial_access_via_msc_file.toml +140 -0
- nldcsc_elastic_rules/rules/windows/execution_initial_access_wps_dll_exploit.toml +113 -0
- nldcsc_elastic_rules/rules/windows/execution_mofcomp.toml +120 -0
- nldcsc_elastic_rules/rules/windows/execution_ms_office_written_file.toml +128 -0
- nldcsc_elastic_rules/rules/windows/execution_nodejs_susp_patterns.toml +119 -0
- nldcsc_elastic_rules/rules/windows/execution_pdf_written_file.toml +134 -0
- nldcsc_elastic_rules/rules/windows/execution_posh_hacktool_authors.toml +136 -0
- nldcsc_elastic_rules/rules/windows/execution_posh_hacktool_functions.toml +357 -0
- nldcsc_elastic_rules/rules/windows/execution_posh_malicious_script_agg.toml +150 -0
- nldcsc_elastic_rules/rules/windows/execution_posh_portable_executable.toml +175 -0
- nldcsc_elastic_rules/rules/windows/execution_posh_psreflect.toml +194 -0
- nldcsc_elastic_rules/rules/windows/execution_powershell_susp_args_via_winscript.toml +115 -0
- nldcsc_elastic_rules/rules/windows/execution_psexec_lateral_movement_command.toml +134 -0
- nldcsc_elastic_rules/rules/windows/execution_register_server_program_connecting_to_the_internet.toml +171 -0
- nldcsc_elastic_rules/rules/windows/execution_revshell_cmd_via_netcat.toml +97 -0
- nldcsc_elastic_rules/rules/windows/execution_scheduled_task_powershell_source.toml +110 -0
- nldcsc_elastic_rules/rules/windows/execution_scripting_remote_webdav.toml +120 -0
- nldcsc_elastic_rules/rules/windows/execution_scripts_archive_file.toml +123 -0
- nldcsc_elastic_rules/rules/windows/execution_shared_modules_local_sxs_dll.toml +73 -0
- nldcsc_elastic_rules/rules/windows/execution_suspicious_cmd_wmi.toml +117 -0
- nldcsc_elastic_rules/rules/windows/execution_suspicious_image_load_wmi_ms_office.toml +100 -0
- nldcsc_elastic_rules/rules/windows/execution_suspicious_pdf_reader.toml +143 -0
- nldcsc_elastic_rules/rules/windows/execution_suspicious_powershell_imgload.toml +141 -0
- nldcsc_elastic_rules/rules/windows/execution_suspicious_psexesvc.toml +115 -0
- nldcsc_elastic_rules/rules/windows/execution_via_compiled_html_file.toml +180 -0
- nldcsc_elastic_rules/rules/windows/execution_via_hidden_shell_conhost.toml +144 -0
- nldcsc_elastic_rules/rules/windows/execution_via_mmc_console_file_unusual_path.toml +146 -0
- nldcsc_elastic_rules/rules/windows/execution_windows_cmd_shell_susp_args.toml +179 -0
- nldcsc_elastic_rules/rules/windows/execution_windows_fakecaptcha_cmd_ps.toml +144 -0
- nldcsc_elastic_rules/rules/windows/execution_windows_phish_clickfix.toml +143 -0
- nldcsc_elastic_rules/rules/windows/execution_windows_powershell_susp_args.toml +188 -0
- nldcsc_elastic_rules/rules/windows/execution_windows_script_from_internet.toml +132 -0
- nldcsc_elastic_rules/rules/windows/exfiltration_smb_rare_destination.toml +138 -0
- nldcsc_elastic_rules/rules/windows/impact_backup_file_deletion.toml +125 -0
- nldcsc_elastic_rules/rules/windows/impact_deleting_backup_catalogs_with_wbadmin.toml +111 -0
- nldcsc_elastic_rules/rules/windows/impact_high_freq_file_renames_by_kernel.toml +114 -0
- nldcsc_elastic_rules/rules/windows/impact_mod_critical_os_files.toml +100 -0
- nldcsc_elastic_rules/rules/windows/impact_modification_of_boot_config.toml +109 -0
- nldcsc_elastic_rules/rules/windows/impact_ransomware_file_rename_smb.toml +117 -0
- nldcsc_elastic_rules/rules/windows/impact_ransomware_note_file_over_smb.toml +117 -0
- nldcsc_elastic_rules/rules/windows/impact_stop_process_service_threshold.toml +97 -0
- nldcsc_elastic_rules/rules/windows/impact_volume_shadow_copy_deletion_or_resized_via_vssadmin.toml +124 -0
- nldcsc_elastic_rules/rules/windows/impact_volume_shadow_copy_deletion_via_powershell.toml +148 -0
- nldcsc_elastic_rules/rules/windows/impact_volume_shadow_copy_deletion_via_wmic.toml +137 -0
- nldcsc_elastic_rules/rules/windows/initial_access_evasion_suspicious_htm_file_creation.toml +151 -0
- nldcsc_elastic_rules/rules/windows/initial_access_execution_from_inetcache.toml +143 -0
- nldcsc_elastic_rules/rules/windows/initial_access_execution_from_removable_media.toml +93 -0
- nldcsc_elastic_rules/rules/windows/initial_access_execution_remote_via_msiexec.toml +136 -0
- nldcsc_elastic_rules/rules/windows/initial_access_execution_via_office_addins.toml +160 -0
- nldcsc_elastic_rules/rules/windows/initial_access_exfiltration_first_time_seen_usb.toml +124 -0
- nldcsc_elastic_rules/rules/windows/initial_access_exploit_jetbrains_teamcity.toml +145 -0
- nldcsc_elastic_rules/rules/windows/initial_access_rdp_file_mail_attachment.toml +118 -0
- nldcsc_elastic_rules/rules/windows/initial_access_script_executing_powershell.toml +145 -0
- nldcsc_elastic_rules/rules/windows/initial_access_scripts_process_started_via_wmi.toml +146 -0
- nldcsc_elastic_rules/rules/windows/initial_access_suspicious_ms_exchange_files.toml +110 -0
- nldcsc_elastic_rules/rules/windows/initial_access_suspicious_ms_exchange_process.toml +147 -0
- nldcsc_elastic_rules/rules/windows/initial_access_suspicious_ms_exchange_worker_child_process.toml +129 -0
- nldcsc_elastic_rules/rules/windows/initial_access_suspicious_ms_office_child_process.toml +175 -0
- nldcsc_elastic_rules/rules/windows/initial_access_suspicious_ms_outlook_child_process.toml +162 -0
- nldcsc_elastic_rules/rules/windows/initial_access_suspicious_windows_server_update_svc.toml +121 -0
- nldcsc_elastic_rules/rules/windows/initial_access_url_cve_2025_33053.toml +120 -0
- nldcsc_elastic_rules/rules/windows/initial_access_via_explorer_suspicious_child_parent_args.toml +158 -0
- nldcsc_elastic_rules/rules/windows/initial_access_webshell_screenconnect_server.toml +127 -0
- nldcsc_elastic_rules/rules/windows/initial_access_xsl_script_execution_via_com.toml +112 -0
- nldcsc_elastic_rules/rules/windows/lateral_movement_alternate_creds_pth.toml +102 -0
- nldcsc_elastic_rules/rules/windows/lateral_movement_cmd_service.toml +127 -0
- nldcsc_elastic_rules/rules/windows/lateral_movement_credential_access_kerberos_correlation.toml +127 -0
- nldcsc_elastic_rules/rules/windows/lateral_movement_dcom_hta.toml +120 -0
- nldcsc_elastic_rules/rules/windows/lateral_movement_dcom_mmc20.toml +119 -0
- nldcsc_elastic_rules/rules/windows/lateral_movement_dcom_shellwindow_shellbrowserwindow.toml +103 -0
- nldcsc_elastic_rules/rules/windows/lateral_movement_defense_evasion_lanman_nullsessionpipe_modification.toml +121 -0
- nldcsc_elastic_rules/rules/windows/lateral_movement_direct_outbound_smb_connection.toml +158 -0
- nldcsc_elastic_rules/rules/windows/lateral_movement_evasion_rdp_shadowing.toml +122 -0
- nldcsc_elastic_rules/rules/windows/lateral_movement_executable_tool_transfer_smb.toml +110 -0
- nldcsc_elastic_rules/rules/windows/lateral_movement_execution_from_tsclient_mup.toml +109 -0
- nldcsc_elastic_rules/rules/windows/lateral_movement_execution_via_file_shares_sequence.toml +163 -0
- nldcsc_elastic_rules/rules/windows/lateral_movement_incoming_winrm_shell_execution.toml +106 -0
- nldcsc_elastic_rules/rules/windows/lateral_movement_incoming_wmi.toml +124 -0
- nldcsc_elastic_rules/rules/windows/lateral_movement_mount_hidden_or_webdav_share_net.toml +151 -0
- nldcsc_elastic_rules/rules/windows/lateral_movement_powershell_remoting_target.toml +127 -0
- nldcsc_elastic_rules/rules/windows/lateral_movement_rdp_enabled_registry.toml +132 -0
- nldcsc_elastic_rules/rules/windows/lateral_movement_rdp_sharprdp_target.toml +108 -0
- nldcsc_elastic_rules/rules/windows/lateral_movement_remote_file_copy_hidden_share.toml +108 -0
- nldcsc_elastic_rules/rules/windows/lateral_movement_remote_service_installed_winlog.toml +131 -0
- nldcsc_elastic_rules/rules/windows/lateral_movement_remote_services.toml +174 -0
- nldcsc_elastic_rules/rules/windows/lateral_movement_remote_task_creation_winlog.toml +93 -0
- nldcsc_elastic_rules/rules/windows/lateral_movement_scheduled_task_target.toml +107 -0
- nldcsc_elastic_rules/rules/windows/lateral_movement_suspicious_rdp_client_imageload.toml +123 -0
- nldcsc_elastic_rules/rules/windows/lateral_movement_unusual_dns_service_children.toml +124 -0
- nldcsc_elastic_rules/rules/windows/lateral_movement_unusual_dns_service_file_writes.toml +97 -0
- nldcsc_elastic_rules/rules/windows/lateral_movement_via_startup_folder_rdp_smb.toml +126 -0
- nldcsc_elastic_rules/rules/windows/lateral_movement_via_wsus_update.toml +105 -0
- nldcsc_elastic_rules/rules/windows/persistence_ad_adminsdholder.toml +103 -0
- nldcsc_elastic_rules/rules/windows/persistence_adobe_hijack_persistence.toml +154 -0
- nldcsc_elastic_rules/rules/windows/persistence_app_compat_shim.toml +117 -0
- nldcsc_elastic_rules/rules/windows/persistence_appcertdlls_registry.toml +121 -0
- nldcsc_elastic_rules/rules/windows/persistence_appinitdlls_registry.toml +196 -0
- nldcsc_elastic_rules/rules/windows/persistence_browser_extension_install.toml +111 -0
- nldcsc_elastic_rules/rules/windows/persistence_dontexpirepasswd_account.toml +108 -0
- nldcsc_elastic_rules/rules/windows/persistence_evasion_hidden_local_account_creation.toml +104 -0
- nldcsc_elastic_rules/rules/windows/persistence_evasion_registry_ifeo_injection.toml +134 -0
- nldcsc_elastic_rules/rules/windows/persistence_evasion_registry_startup_shell_folder_modified.toml +191 -0
- nldcsc_elastic_rules/rules/windows/persistence_group_modification_by_system.toml +104 -0
- nldcsc_elastic_rules/rules/windows/persistence_local_scheduled_job_creation.toml +114 -0
- nldcsc_elastic_rules/rules/windows/persistence_local_scheduled_task_creation.toml +109 -0
- nldcsc_elastic_rules/rules/windows/persistence_local_scheduled_task_scripting.toml +97 -0
- nldcsc_elastic_rules/rules/windows/persistence_ms_office_addins_file.toml +111 -0
- nldcsc_elastic_rules/rules/windows/persistence_ms_outlook_vba_template.toml +102 -0
- nldcsc_elastic_rules/rules/windows/persistence_msds_alloweddelegateto_krbtgt.toml +117 -0
- nldcsc_elastic_rules/rules/windows/persistence_msi_installer_task_startup.toml +121 -0
- nldcsc_elastic_rules/rules/windows/persistence_msoffice_startup_registry.toml +118 -0
- nldcsc_elastic_rules/rules/windows/persistence_netsh_helper_dll.toml +117 -0
- nldcsc_elastic_rules/rules/windows/persistence_powershell_exch_mailbox_activesync_add_device.toml +129 -0
- nldcsc_elastic_rules/rules/windows/persistence_powershell_profiles.toml +176 -0
- nldcsc_elastic_rules/rules/windows/persistence_priv_escalation_via_accessibility_features.toml +189 -0
- nldcsc_elastic_rules/rules/windows/persistence_registry_uncommon.toml +193 -0
- nldcsc_elastic_rules/rules/windows/persistence_remote_password_reset.toml +122 -0
- nldcsc_elastic_rules/rules/windows/persistence_run_key_and_startup_broad.toml +188 -0
- nldcsc_elastic_rules/rules/windows/persistence_runtime_run_key_startup_susp_procs.toml +107 -0
- nldcsc_elastic_rules/rules/windows/persistence_scheduled_task_creation_winlog.toml +104 -0
- nldcsc_elastic_rules/rules/windows/persistence_scheduled_task_updated.toml +98 -0
- nldcsc_elastic_rules/rules/windows/persistence_sdprop_exclusion_dsheuristics.toml +125 -0
- nldcsc_elastic_rules/rules/windows/persistence_service_dll_unsigned.toml +219 -0
- nldcsc_elastic_rules/rules/windows/persistence_service_windows_service_winlog.toml +148 -0
- nldcsc_elastic_rules/rules/windows/persistence_services_registry.toml +147 -0
- nldcsc_elastic_rules/rules/windows/persistence_startup_folder_file_written_by_suspicious_process.toml +172 -0
- nldcsc_elastic_rules/rules/windows/persistence_startup_folder_file_written_by_unsigned_process.toml +166 -0
- nldcsc_elastic_rules/rules/windows/persistence_startup_folder_scripts.toml +168 -0
- nldcsc_elastic_rules/rules/windows/persistence_suspicious_com_hijack_registry.toml +197 -0
- nldcsc_elastic_rules/rules/windows/persistence_suspicious_image_load_scheduled_task_ms_office.toml +182 -0
- nldcsc_elastic_rules/rules/windows/persistence_suspicious_scheduled_task_runtime.toml +153 -0
- nldcsc_elastic_rules/rules/windows/persistence_suspicious_service_created_registry.toml +119 -0
- nldcsc_elastic_rules/rules/windows/persistence_sysmon_wmi_event_subscription.toml +100 -0
- nldcsc_elastic_rules/rules/windows/persistence_system_shells_via_services.toml +160 -0
- nldcsc_elastic_rules/rules/windows/persistence_temp_scheduled_task.toml +109 -0
- nldcsc_elastic_rules/rules/windows/persistence_time_provider_mod.toml +172 -0
- nldcsc_elastic_rules/rules/windows/persistence_user_account_added_to_privileged_group_ad.toml +115 -0
- nldcsc_elastic_rules/rules/windows/persistence_user_account_creation.toml +105 -0
- nldcsc_elastic_rules/rules/windows/persistence_via_application_shimming.toml +126 -0
- nldcsc_elastic_rules/rules/windows/persistence_via_bits_job_notify_command.toml +109 -0
- nldcsc_elastic_rules/rules/windows/persistence_via_hidden_run_key_valuename.toml +139 -0
- nldcsc_elastic_rules/rules/windows/persistence_via_lsa_security_support_provider_registry.toml +127 -0
- nldcsc_elastic_rules/rules/windows/persistence_via_telemetrycontroller_scheduledtask_hijack.toml +141 -0
- nldcsc_elastic_rules/rules/windows/persistence_via_update_orchestrator_service_hijack.toml +182 -0
- nldcsc_elastic_rules/rules/windows/persistence_via_windows_management_instrumentation_event_subscription.toml +121 -0
- nldcsc_elastic_rules/rules/windows/persistence_via_wmi_stdregprov_run_services.toml +210 -0
- nldcsc_elastic_rules/rules/windows/persistence_via_xp_cmdshell_mssql_stored_procedure.toml +149 -0
- nldcsc_elastic_rules/rules/windows/persistence_web_shell_aspx_write.toml +109 -0
- nldcsc_elastic_rules/rules/windows/persistence_webshell_detection.toml +216 -0
- nldcsc_elastic_rules/rules/windows/persistence_werfault_reflectdebugger.toml +114 -0
- nldcsc_elastic_rules/rules/windows/privilege_escalation_badsuccessor_dmsa_abuse.toml +91 -0
- nldcsc_elastic_rules/rules/windows/privilege_escalation_create_process_as_different_user.toml +106 -0
- nldcsc_elastic_rules/rules/windows/privilege_escalation_create_process_with_token_unpriv.toml +121 -0
- nldcsc_elastic_rules/rules/windows/privilege_escalation_credroaming_ldap.toml +111 -0
- nldcsc_elastic_rules/rules/windows/privilege_escalation_disable_uac_registry.toml +163 -0
- nldcsc_elastic_rules/rules/windows/privilege_escalation_dmsa_creation_by_unusual_user.toml +90 -0
- nldcsc_elastic_rules/rules/windows/privilege_escalation_dns_serverlevelplugindll.toml +95 -0
- nldcsc_elastic_rules/rules/windows/privilege_escalation_driver_newterm_imphash.toml +156 -0
- nldcsc_elastic_rules/rules/windows/privilege_escalation_expired_driver_loaded.toml +105 -0
- nldcsc_elastic_rules/rules/windows/privilege_escalation_exploit_cve_202238028.toml +127 -0
- nldcsc_elastic_rules/rules/windows/privilege_escalation_gpo_schtask_service_creation.toml +125 -0
- nldcsc_elastic_rules/rules/windows/privilege_escalation_group_policy_iniscript.toml +144 -0
- nldcsc_elastic_rules/rules/windows/privilege_escalation_group_policy_privileged_groups.toml +106 -0
- nldcsc_elastic_rules/rules/windows/privilege_escalation_group_policy_scheduled_task.toml +161 -0
- nldcsc_elastic_rules/rules/windows/privilege_escalation_installertakeover.toml +156 -0
- nldcsc_elastic_rules/rules/windows/privilege_escalation_krbrelayup_service_creation.toml +119 -0
- nldcsc_elastic_rules/rules/windows/privilege_escalation_lsa_auth_package.toml +114 -0
- nldcsc_elastic_rules/rules/windows/privilege_escalation_make_token_local.toml +109 -0
- nldcsc_elastic_rules/rules/windows/privilege_escalation_msi_repair_via_mshelp_link.toml +119 -0
- nldcsc_elastic_rules/rules/windows/privilege_escalation_named_pipe_impersonation.toml +148 -0
- nldcsc_elastic_rules/rules/windows/privilege_escalation_newcreds_logon_rare_process.toml +100 -0
- nldcsc_elastic_rules/rules/windows/privilege_escalation_persistence_phantom_dll.toml +214 -0
- nldcsc_elastic_rules/rules/windows/privilege_escalation_port_monitor_print_pocessor_abuse.toml +128 -0
- nldcsc_elastic_rules/rules/windows/privilege_escalation_posh_token_impersonation.toml +219 -0
- nldcsc_elastic_rules/rules/windows/privilege_escalation_printspooler_registry_copyfiles.toml +108 -0
- nldcsc_elastic_rules/rules/windows/privilege_escalation_printspooler_service_suspicious_file.toml +159 -0
- nldcsc_elastic_rules/rules/windows/privilege_escalation_printspooler_suspicious_file_deletion.toml +104 -0
- nldcsc_elastic_rules/rules/windows/privilege_escalation_printspooler_suspicious_spl_file.toml +155 -0
- nldcsc_elastic_rules/rules/windows/privilege_escalation_reg_service_imagepath_mod.toml +180 -0
- nldcsc_elastic_rules/rules/windows/privilege_escalation_rogue_windir_environment_var.toml +110 -0
- nldcsc_elastic_rules/rules/windows/privilege_escalation_samaccountname_spoofing_attack.toml +119 -0
- nldcsc_elastic_rules/rules/windows/privilege_escalation_service_control_spawned_script_int.toml +192 -0
- nldcsc_elastic_rules/rules/windows/privilege_escalation_suspicious_dnshostname_update.toml +110 -0
- nldcsc_elastic_rules/rules/windows/privilege_escalation_thread_cpu_priority_hijack.toml +94 -0
- nldcsc_elastic_rules/rules/windows/privilege_escalation_tokenmanip_sedebugpriv_enabled.toml +127 -0
- nldcsc_elastic_rules/rules/windows/privilege_escalation_uac_bypass_com_clipup.toml +140 -0
- nldcsc_elastic_rules/rules/windows/privilege_escalation_uac_bypass_com_ieinstal.toml +143 -0
- nldcsc_elastic_rules/rules/windows/privilege_escalation_uac_bypass_com_interface_icmluautil.toml +137 -0
- nldcsc_elastic_rules/rules/windows/privilege_escalation_uac_bypass_diskcleanup_hijack.toml +153 -0
- nldcsc_elastic_rules/rules/windows/privilege_escalation_uac_bypass_dll_sideloading.toml +137 -0
- nldcsc_elastic_rules/rules/windows/privilege_escalation_uac_bypass_event_viewer.toml +179 -0
- nldcsc_elastic_rules/rules/windows/privilege_escalation_uac_bypass_mock_windir.toml +179 -0
- nldcsc_elastic_rules/rules/windows/privilege_escalation_uac_bypass_winfw_mmc_hijack.toml +177 -0
- nldcsc_elastic_rules/rules/windows/privilege_escalation_unquoted_service_path.toml +108 -0
- nldcsc_elastic_rules/rules/windows/privilege_escalation_unusual_parentchild_relationship.toml +180 -0
- nldcsc_elastic_rules/rules/windows/privilege_escalation_unusual_printspooler_childprocess.toml +128 -0
- nldcsc_elastic_rules/rules/windows/privilege_escalation_unusual_svchost_childproc_childless.toml +145 -0
- nldcsc_elastic_rules/rules/windows/privilege_escalation_via_ppid_spoofing.toml +158 -0
- nldcsc_elastic_rules/rules/windows/privilege_escalation_via_rogue_named_pipe.toml +106 -0
- nldcsc_elastic_rules/rules/windows/privilege_escalation_via_token_theft.toml +157 -0
- nldcsc_elastic_rules/rules/windows/privilege_escalation_windows_service_via_unusual_client.toml +127 -0
- nldcsc_elastic_rules/utils.py +7 -0
- nldcsc_elastic_rules-0.0.8.dist-info/METADATA +3 -0
- nldcsc_elastic_rules-0.0.8.dist-info/RECORD +1536 -0
- nldcsc_elastic_rules-0.0.8.dist-info/WHEEL +5 -0
- nldcsc_elastic_rules-0.0.8.dist-info/top_level.txt +1 -0
|
@@ -0,0 +1,107 @@
|
|
|
1
|
+
[metadata]
|
|
2
|
+
creation_date = "2023/10/16"
|
|
3
|
+
integration = ["problemchild", "endpoint", "windows"]
|
|
4
|
+
maturity = "production"
|
|
5
|
+
updated_date = "2025/03/20"
|
|
6
|
+
|
|
7
|
+
[rule]
|
|
8
|
+
anomaly_threshold = 75
|
|
9
|
+
author = ["Elastic"]
|
|
10
|
+
description = """
|
|
11
|
+
A machine learning job has detected a suspicious Windows process. This process has been classified as malicious in two
|
|
12
|
+
ways. It was predicted to be malicious by the ProblemChild supervised ML model, and it was found to be an unusual child
|
|
13
|
+
process name, for the parent process, by an unsupervised ML model. Such a process may be an instance of suspicious or
|
|
14
|
+
malicious activity, possibly involving LOLbins, that may be resistant to detection using conventional search rules.
|
|
15
|
+
"""
|
|
16
|
+
from = "now-45m"
|
|
17
|
+
interval = "15m"
|
|
18
|
+
license = "Elastic License v2"
|
|
19
|
+
machine_learning_job_id = "problem_child_rare_process_by_parent"
|
|
20
|
+
name = "Unusual Process Spawned by a Parent Process"
|
|
21
|
+
note = """## Triage and analysis
|
|
22
|
+
|
|
23
|
+
> **Disclaimer**:
|
|
24
|
+
> This investigation guide was created using generative AI technology and has been reviewed to improve its accuracy and relevance. While every effort has been made to ensure its quality, we recommend validating the content and adapting it to suit your specific environment and operational needs.
|
|
25
|
+
|
|
26
|
+
### Investigating Unusual Process Spawned by a Parent Process
|
|
27
|
+
|
|
28
|
+
In Windows environments, processes are often spawned by parent processes to perform legitimate tasks. However, adversaries can exploit this by using legitimate tools, known as LOLbins, to execute malicious activities stealthily. The detection rule leverages machine learning to identify anomalies in process creation patterns, flagging processes that deviate from typical behavior, thus uncovering potential threats that evade traditional detection methods.
|
|
29
|
+
|
|
30
|
+
### Possible investigation steps
|
|
31
|
+
|
|
32
|
+
- Review the parent process and child process names to determine if they are known legitimate applications or if they are commonly associated with LOLbins or other malicious activities.
|
|
33
|
+
- Check the process creation time and correlate it with any known user activity or scheduled tasks to identify if the process execution aligns with expected behavior.
|
|
34
|
+
- Investigate the command line arguments used by the suspicious process to identify any unusual or potentially malicious commands or scripts being executed.
|
|
35
|
+
- Analyze the network activity associated with the process to detect any suspicious outbound connections or data exfiltration attempts.
|
|
36
|
+
- Examine the file path and hash of the executable to verify its legitimacy and check against known malware databases or threat intelligence sources.
|
|
37
|
+
- Review any recent changes to the system, such as software installations or updates, that might explain the unusual process behavior.
|
|
38
|
+
- Consult endpoint detection and response (EDR) logs or other security tools to gather additional context and evidence related to the process and its activities.
|
|
39
|
+
|
|
40
|
+
### False positive analysis
|
|
41
|
+
|
|
42
|
+
- Legitimate administrative tools like PowerShell or command prompt may be flagged when used for routine tasks. Users can create exceptions for these tools when executed by known and trusted parent processes.
|
|
43
|
+
- Software updates or installations often spawn processes that might appear unusual. Exclude these processes by identifying their typical parent-child relationships during updates.
|
|
44
|
+
- Custom scripts or automation tools used within the organization might trigger alerts. Document these scripts and their expected behavior to create exceptions for them.
|
|
45
|
+
- Frequent use of remote management tools can lead to false positives. Ensure these tools are whitelisted when used by authorized personnel.
|
|
46
|
+
- Regularly review and update the list of exceptions to accommodate changes in legitimate process behaviors over time.
|
|
47
|
+
|
|
48
|
+
### Response and remediation
|
|
49
|
+
|
|
50
|
+
- Isolate the affected system from the network to prevent further spread of the potential threat and to contain any malicious activity.
|
|
51
|
+
- Terminate the suspicious process identified by the alert to stop any ongoing malicious actions.
|
|
52
|
+
- Conduct a thorough analysis of the process and its parent to understand the scope of the compromise and identify any additional malicious activities or files.
|
|
53
|
+
- Remove any malicious files or artifacts associated with the process from the system to ensure complete remediation.
|
|
54
|
+
- Restore the system from a known good backup if the integrity of the system is compromised beyond repair.
|
|
55
|
+
- Update and patch the system to close any vulnerabilities that may have been exploited by the adversary.
|
|
56
|
+
- Escalate the incident to the security operations center (SOC) or incident response team for further investigation and to determine if additional systems are affected."""
|
|
57
|
+
references = [
|
|
58
|
+
"https://www.elastic.co/guide/en/security/current/prebuilt-ml-jobs.html",
|
|
59
|
+
"https://docs.elastic.co/en/integrations/problemchild",
|
|
60
|
+
"https://www.elastic.co/security-labs/detecting-living-off-the-land-attacks-with-new-elastic-integration",
|
|
61
|
+
]
|
|
62
|
+
risk_score = 21
|
|
63
|
+
rule_id = "ea09ff26-3902-4c53-bb8e-24b7a5d029dd"
|
|
64
|
+
setup = """## Setup
|
|
65
|
+
|
|
66
|
+
The rule requires the Living off the Land (LotL) Attack Detection integration assets to be installed, as well as Windows process events collected by integrations such as Elastic Defend or Winlogbeat.
|
|
67
|
+
|
|
68
|
+
### LotL Attack Detection Setup
|
|
69
|
+
The LotL Attack Detection integration detects living-off-the-land activity in Windows process events.
|
|
70
|
+
|
|
71
|
+
#### Prerequisite Requirements:
|
|
72
|
+
- Fleet is required for LotL Attack Detection.
|
|
73
|
+
- To configure Fleet Server refer to the [documentation](https://www.elastic.co/guide/en/fleet/current/fleet-server.html).
|
|
74
|
+
- Windows process events collected by the [Elastic Defend](https://docs.elastic.co/en/integrations/endpoint) integration or Winlogbeat(https://www.elastic.co/guide/en/beats/winlogbeat/current/_winlogbeat_overview.html).
|
|
75
|
+
- To install Elastic Defend, refer to the [documentation](https://www.elastic.co/guide/en/security/current/install-endpoint.html).
|
|
76
|
+
- To set up and run Winlogbeat, follow [this](https://www.elastic.co/guide/en/beats/winlogbeat/current/winlogbeat-installation-configuration.html) guide.
|
|
77
|
+
|
|
78
|
+
#### The following steps should be executed to install assets associated with the LotL Attack Detection integration:
|
|
79
|
+
- Go to the Kibana homepage. Under Management, click Integrations.
|
|
80
|
+
- In the query bar, search for Living off the Land Attack Detection and select the integration to see more details about it.
|
|
81
|
+
- Follow the instructions under the **Installation** section.
|
|
82
|
+
- For this rule to work, complete the instructions through **Add preconfigured anomaly detection jobs**.
|
|
83
|
+
"""
|
|
84
|
+
severity = "low"
|
|
85
|
+
tags = [
|
|
86
|
+
"Domain: Endpoint",
|
|
87
|
+
"OS: Windows",
|
|
88
|
+
"Use Case: Living off the Land Attack Detection",
|
|
89
|
+
"Rule Type: ML",
|
|
90
|
+
"Rule Type: Machine Learning",
|
|
91
|
+
"Tactic: Defense Evasion",
|
|
92
|
+
"Resources: Investigation Guide",
|
|
93
|
+
]
|
|
94
|
+
type = "machine_learning"
|
|
95
|
+
[[rule.threat]]
|
|
96
|
+
framework = "MITRE ATT&CK"
|
|
97
|
+
[[rule.threat.technique]]
|
|
98
|
+
id = "T1036"
|
|
99
|
+
name = "Masquerading"
|
|
100
|
+
reference = "https://attack.mitre.org/techniques/T1036/"
|
|
101
|
+
|
|
102
|
+
|
|
103
|
+
[rule.threat.tactic]
|
|
104
|
+
id = "TA0005"
|
|
105
|
+
name = "Defense Evasion"
|
|
106
|
+
reference = "https://attack.mitre.org/tactics/TA0005/"
|
|
107
|
+
|
nldcsc_elastic_rules/rules/integrations/problemchild/defense_evasion_ml_rare_process_for_a_user.toml
ADDED
|
@@ -0,0 +1,107 @@
|
|
|
1
|
+
[metadata]
|
|
2
|
+
creation_date = "2023/10/16"
|
|
3
|
+
integration = ["problemchild", "endpoint", "windows"]
|
|
4
|
+
maturity = "production"
|
|
5
|
+
updated_date = "2025/03/20"
|
|
6
|
+
|
|
7
|
+
[rule]
|
|
8
|
+
anomaly_threshold = 75
|
|
9
|
+
author = ["Elastic"]
|
|
10
|
+
description = """
|
|
11
|
+
A machine learning job has detected a suspicious Windows process. This process has been classified as malicious in two
|
|
12
|
+
ways. It was predicted to be malicious by the ProblemChild supervised ML model, and it was found to be suspicious given
|
|
13
|
+
that its user context is unusual and does not commonly manifest malicious activity,by an unsupervised ML model. Such a
|
|
14
|
+
process may be an instance of suspicious or malicious activity, possibly involving LOLbins, that may be resistant to
|
|
15
|
+
detection using conventional search rules.
|
|
16
|
+
"""
|
|
17
|
+
from = "now-45m"
|
|
18
|
+
interval = "15m"
|
|
19
|
+
license = "Elastic License v2"
|
|
20
|
+
machine_learning_job_id = "problem_child_rare_process_by_user"
|
|
21
|
+
name = "Unusual Process Spawned by a User"
|
|
22
|
+
note = """## Triage and analysis
|
|
23
|
+
|
|
24
|
+
> **Disclaimer**:
|
|
25
|
+
> This investigation guide was created using generative AI technology and has been reviewed to improve its accuracy and relevance. While every effort has been made to ensure its quality, we recommend validating the content and adapting it to suit your specific environment and operational needs.
|
|
26
|
+
|
|
27
|
+
### Investigating Unusual Process Spawned by a User
|
|
28
|
+
|
|
29
|
+
The detection of unusual processes spawned by users leverages machine learning to identify anomalies in user behavior and process execution. Adversaries often exploit legitimate tools, known as LOLbins, to evade detection. This rule uses both supervised and unsupervised ML models to flag processes that deviate from typical user activity, indicating potential misuse or masquerading tactics.
|
|
30
|
+
|
|
31
|
+
### Possible investigation steps
|
|
32
|
+
|
|
33
|
+
- Review the user context associated with the alert to determine if the user has a history of spawning unusual processes or if this is an isolated incident.
|
|
34
|
+
- Examine the specific process flagged by the alert, including its command line arguments, parent process, and any associated network activity, to identify potential indicators of compromise.
|
|
35
|
+
- Check for the presence of known LOLbins or other legitimate tools that may have been exploited, as indicated by the alert's focus on defense evasion tactics.
|
|
36
|
+
- Investigate any recent changes in the user's behavior or system configuration that could explain the anomaly, such as software updates or new application installations.
|
|
37
|
+
- Correlate the alert with other security events or logs from the same timeframe to identify any related suspicious activities or patterns.
|
|
38
|
+
- Assess the risk score and severity level in the context of the organization's threat landscape to prioritize the response and determine if further action is needed.
|
|
39
|
+
|
|
40
|
+
### False positive analysis
|
|
41
|
+
|
|
42
|
+
- Legitimate administrative tools may trigger false positives if they are used in atypical contexts. Users should review the context of the process execution and, if deemed safe, add these tools to an exception list to prevent future alerts.
|
|
43
|
+
- Scheduled tasks or scripts that run infrequently might be flagged as unusual. Verify the legitimacy of these tasks and consider excluding them if they are part of regular maintenance or updates.
|
|
44
|
+
- Software updates or installations can spawn processes that appear anomalous. Confirm the source and purpose of these updates, and if they are routine, create exceptions for these specific processes.
|
|
45
|
+
- Developers or IT personnel using command-line tools for legitimate purposes may trigger alerts. Evaluate the necessity of these tools in their workflow and whitelist them if they are consistently used in a non-malicious manner.
|
|
46
|
+
- New or infrequently used applications might be flagged due to lack of historical data. Assess the application's legitimacy and, if appropriate, add it to a list of known safe applications to reduce false positives.
|
|
47
|
+
|
|
48
|
+
### Response and remediation
|
|
49
|
+
|
|
50
|
+
- Isolate the affected system from the network to prevent further spread or communication with potential command and control servers.
|
|
51
|
+
- Terminate the suspicious process identified by the alert to halt any ongoing malicious activity.
|
|
52
|
+
- Conduct a thorough review of the user's recent activity and access logs to identify any unauthorized actions or data access.
|
|
53
|
+
- Reset the credentials of the affected user account to prevent further unauthorized access, ensuring that strong, unique passwords are used.
|
|
54
|
+
- Scan the system for additional indicators of compromise, such as other unusual processes or modifications to system files, and remove any identified threats.
|
|
55
|
+
- Restore the system from a known good backup if any critical system files or configurations have been altered.
|
|
56
|
+
- Escalate the incident to the security operations center (SOC) or incident response team for further investigation and to determine if additional systems are affected."""
|
|
57
|
+
references = [
|
|
58
|
+
"https://www.elastic.co/guide/en/security/current/prebuilt-ml-jobs.html",
|
|
59
|
+
"https://docs.elastic.co/en/integrations/problemchild",
|
|
60
|
+
"https://www.elastic.co/security-labs/detecting-living-off-the-land-attacks-with-new-elastic-integration",
|
|
61
|
+
]
|
|
62
|
+
risk_score = 21
|
|
63
|
+
rule_id = "40155ee4-1e6a-4e4d-a63b-e8ba16980cfb"
|
|
64
|
+
setup = """## Setup
|
|
65
|
+
|
|
66
|
+
The rule requires the Living off the Land (LotL) Attack Detection integration assets to be installed, as well as Windows process events collected by integrations such as Elastic Defend or Winlogbeat.
|
|
67
|
+
|
|
68
|
+
### LotL Attack Detection Setup
|
|
69
|
+
The LotL Attack Detection integration detects living-off-the-land activity in Windows process events.
|
|
70
|
+
|
|
71
|
+
#### Prerequisite Requirements:
|
|
72
|
+
- Fleet is required for LotL Attack Detection.
|
|
73
|
+
- To configure Fleet Server refer to the [documentation](https://www.elastic.co/guide/en/fleet/current/fleet-server.html).
|
|
74
|
+
- Windows process events collected by the [Elastic Defend](https://docs.elastic.co/en/integrations/endpoint) integration or Winlogbeat(https://www.elastic.co/guide/en/beats/winlogbeat/current/_winlogbeat_overview.html).
|
|
75
|
+
- To install Elastic Defend, refer to the [documentation](https://www.elastic.co/guide/en/security/current/install-endpoint.html).
|
|
76
|
+
- To set up and run Winlogbeat, follow [this](https://www.elastic.co/guide/en/beats/winlogbeat/current/winlogbeat-installation-configuration.html) guide.
|
|
77
|
+
|
|
78
|
+
#### The following steps should be executed to install assets associated with the LotL Attack Detection integration:
|
|
79
|
+
- Go to the Kibana homepage. Under Management, click Integrations.
|
|
80
|
+
- In the query bar, search for Living off the Land Attack Detection and select the integration to see more details about it.
|
|
81
|
+
- Follow the instructions under the **Installation** section.
|
|
82
|
+
- For this rule to work, complete the instructions through **Add preconfigured anomaly detection jobs**.
|
|
83
|
+
"""
|
|
84
|
+
severity = "low"
|
|
85
|
+
tags = [
|
|
86
|
+
"Domain: Endpoint",
|
|
87
|
+
"OS: Windows",
|
|
88
|
+
"Use Case: Living off the Land Attack Detection",
|
|
89
|
+
"Rule Type: ML",
|
|
90
|
+
"Rule Type: Machine Learning",
|
|
91
|
+
"Tactic: Defense Evasion",
|
|
92
|
+
"Resources: Investigation Guide",
|
|
93
|
+
]
|
|
94
|
+
type = "machine_learning"
|
|
95
|
+
[[rule.threat]]
|
|
96
|
+
framework = "MITRE ATT&CK"
|
|
97
|
+
[[rule.threat.technique]]
|
|
98
|
+
id = "T1036"
|
|
99
|
+
name = "Masquerading"
|
|
100
|
+
reference = "https://attack.mitre.org/techniques/T1036/"
|
|
101
|
+
|
|
102
|
+
|
|
103
|
+
[rule.threat.tactic]
|
|
104
|
+
id = "TA0005"
|
|
105
|
+
name = "Defense Evasion"
|
|
106
|
+
reference = "https://attack.mitre.org/tactics/TA0005/"
|
|
107
|
+
|
|
@@ -0,0 +1,118 @@
|
|
|
1
|
+
[metadata]
|
|
2
|
+
creation_date = "2023/10/16"
|
|
3
|
+
integration = ["problemchild", "endpoint", "windows"]
|
|
4
|
+
maturity = "production"
|
|
5
|
+
updated_date = "2025/09/08"
|
|
6
|
+
|
|
7
|
+
[rule]
|
|
8
|
+
author = ["Elastic"]
|
|
9
|
+
description = """
|
|
10
|
+
A supervised machine learning model (ProblemChild) has identified a suspicious Windows process event with high
|
|
11
|
+
probability of it being malicious activity. Alternatively, the model's blocklist identified the event as being
|
|
12
|
+
malicious.
|
|
13
|
+
"""
|
|
14
|
+
from = "now-10m"
|
|
15
|
+
index = ["logs-endpoint.events.process-*", "winlogbeat-*"]
|
|
16
|
+
language = "eql"
|
|
17
|
+
license = "Elastic License v2"
|
|
18
|
+
name = "Machine Learning Detected a Suspicious Windows Event with a High Malicious Probability Score"
|
|
19
|
+
note = """## Triage and analysis
|
|
20
|
+
|
|
21
|
+
> **Disclaimer**:
|
|
22
|
+
> This investigation guide was created using generative AI technology and has been reviewed to improve its accuracy and relevance. While every effort has been made to ensure its quality, we recommend validating the content and adapting it to suit your specific environment and operational needs.
|
|
23
|
+
|
|
24
|
+
### Investigating Machine Learning Detected a Suspicious Windows Event with a High Malicious Probability Score
|
|
25
|
+
|
|
26
|
+
The detection leverages a machine learning model, ProblemChild, to identify potentially malicious Windows processes by analyzing patterns and assigning a high probability score to suspicious activities. Adversaries may exploit legitimate processes to evade detection, often using techniques like masquerading. This rule flags high-risk events by focusing on processes with a high malicious probability score or those identified by a blocklist, excluding known benign activities.
|
|
27
|
+
|
|
28
|
+
### Possible investigation steps
|
|
29
|
+
|
|
30
|
+
- Review the process details flagged by the ProblemChild model, focusing on those with a prediction probability greater than 0.98 or identified by the blocklist.
|
|
31
|
+
- Examine the command-line arguments of the suspicious process to identify any unusual or unexpected patterns, excluding those matching known benign patterns like "*C:\\\\WINDOWS\\\\temp\\\\nessus_*.txt*" or "*C:\\\\WINDOWS\\\\temp\\\\nessus_*.tmp*".
|
|
32
|
+
- Check the parent process of the flagged event to determine if it is a legitimate process or if it has been potentially compromised.
|
|
33
|
+
- Investigate the user account associated with the process to assess if it has been involved in any other suspicious activities or if it has elevated privileges that could be exploited.
|
|
34
|
+
- Correlate the event with other security alerts or logs to identify any related activities or patterns that could indicate a broader attack campaign.
|
|
35
|
+
- Consult threat intelligence sources to determine if the process or its associated indicators are linked to known malicious activities or threat actors.
|
|
36
|
+
|
|
37
|
+
### False positive analysis
|
|
38
|
+
|
|
39
|
+
- Nessus scan files in the Windows temp directory may trigger false positives due to their temporary nature and frequent legitimate use. Users can mitigate this by adding exceptions for file paths like C:\\WINDOWS\\temp\\nessus_*.txt and C:\\WINDOWS\\temp\\nessus_*.tmp.
|
|
40
|
+
- Legitimate software updates or installations might be flagged if they mimic known malicious patterns. Users should review the process details and whitelist trusted software update processes.
|
|
41
|
+
- System administration tools that perform actions similar to those used in attacks could be misidentified. Users should verify the legitimacy of these tools and exclude them from the rule if they are part of regular administrative tasks.
|
|
42
|
+
- Custom scripts or automation tools that are not widely recognized might be flagged. Users should ensure these scripts are secure and add them to an allowlist if they are part of routine operations.
|
|
43
|
+
- Frequent false positives from specific processes can be managed by adjusting the threshold of the machine learning model or refining the blocklist to better distinguish between benign and malicious activities.
|
|
44
|
+
|
|
45
|
+
### Response and remediation
|
|
46
|
+
|
|
47
|
+
- Isolate the affected system from the network to prevent further spread of potential malicious activity.
|
|
48
|
+
- Terminate the suspicious process identified by the ProblemChild model to halt any ongoing malicious actions.
|
|
49
|
+
- Conduct a thorough scan of the affected system using updated antivirus and anti-malware tools to identify and remove any additional threats.
|
|
50
|
+
- Review and analyze the process execution history and associated files to understand the scope of the compromise and identify any persistence mechanisms.
|
|
51
|
+
- Restore any altered or deleted files from backups, ensuring that the backup is clean and free from malware.
|
|
52
|
+
- Escalate the incident to the security operations center (SOC) or incident response team for further investigation and to determine if additional systems are affected.
|
|
53
|
+
- Implement enhanced monitoring and logging for similar processes and activities to detect and respond to future attempts at masquerading or defense evasion."""
|
|
54
|
+
references = [
|
|
55
|
+
"https://www.elastic.co/guide/en/security/current/prebuilt-ml-jobs.html",
|
|
56
|
+
"https://docs.elastic.co/en/integrations/problemchild",
|
|
57
|
+
"https://www.elastic.co/security-labs/detecting-living-off-the-land-attacks-with-new-elastic-integration",
|
|
58
|
+
]
|
|
59
|
+
risk_score = 73
|
|
60
|
+
rule_id = "994e40aa-8c85-43de-825e-15f665375ee8"
|
|
61
|
+
setup = """## Setup
|
|
62
|
+
|
|
63
|
+
The rule requires the Living off the Land (LotL) Attack Detection integration assets to be installed, as well as Windows process events collected by integrations such as Elastic Defend or Winlogbeat.
|
|
64
|
+
|
|
65
|
+
### LotL Attack Detection Setup
|
|
66
|
+
The LotL Attack Detection integration detects living-off-the-land activity in Windows process events.
|
|
67
|
+
|
|
68
|
+
#### Prerequisite Requirements:
|
|
69
|
+
- Fleet is required for LotL Attack Detection.
|
|
70
|
+
- To configure Fleet Server refer to the [documentation](https://www.elastic.co/guide/en/fleet/current/fleet-server.html).
|
|
71
|
+
- Windows process events collected by the [Elastic Defend](https://docs.elastic.co/en/integrations/endpoint) integration or Winlogbeat(https://www.elastic.co/guide/en/beats/winlogbeat/current/_winlogbeat_overview.html).
|
|
72
|
+
- To install Elastic Defend, refer to the [documentation](https://www.elastic.co/guide/en/security/current/install-endpoint.html).
|
|
73
|
+
- To set up and run Winlogbeat, follow [this](https://www.elastic.co/guide/en/beats/winlogbeat/current/winlogbeat-installation-configuration.html) guide.
|
|
74
|
+
|
|
75
|
+
#### The following steps should be executed to install assets associated with the LotL Attack Detection integration:
|
|
76
|
+
- Go to the Kibana homepage. Under Management, click Integrations.
|
|
77
|
+
- In the query bar, search for Living off the Land Attack Detection and select the integration to see more details about it.
|
|
78
|
+
- Follow the instructions under the **Installation** section.
|
|
79
|
+
- For this rule to work, complete the instructions through **Configure the ingest pipeline**.
|
|
80
|
+
"""
|
|
81
|
+
severity = "high"
|
|
82
|
+
tags = [
|
|
83
|
+
"OS: Windows",
|
|
84
|
+
"Data Source: Elastic Endgame",
|
|
85
|
+
"Use Case: Living off the Land Attack Detection",
|
|
86
|
+
"Rule Type: ML",
|
|
87
|
+
"Rule Type: Machine Learning",
|
|
88
|
+
"Tactic: Defense Evasion",
|
|
89
|
+
"Data Source: Elastic Defend",
|
|
90
|
+
"Resources: Investigation Guide",
|
|
91
|
+
]
|
|
92
|
+
timestamp_override = "event.ingested"
|
|
93
|
+
type = "eql"
|
|
94
|
+
|
|
95
|
+
query = '''
|
|
96
|
+
process where ((problemchild.prediction == 1 and problemchild.prediction_probability > 0.98) or
|
|
97
|
+
blocklist_label == 1) and not process.args : ("*C:\\WINDOWS\\temp\\nessus_*.txt*", "*C:\\WINDOWS\\temp\\nessus_*.tmp*")
|
|
98
|
+
'''
|
|
99
|
+
|
|
100
|
+
|
|
101
|
+
[[rule.threat]]
|
|
102
|
+
framework = "MITRE ATT&CK"
|
|
103
|
+
[[rule.threat.technique]]
|
|
104
|
+
id = "T1036"
|
|
105
|
+
name = "Masquerading"
|
|
106
|
+
reference = "https://attack.mitre.org/techniques/T1036/"
|
|
107
|
+
[[rule.threat.technique.subtechnique]]
|
|
108
|
+
id = "T1036.004"
|
|
109
|
+
name = "Masquerade Task or Service"
|
|
110
|
+
reference = "https://attack.mitre.org/techniques/T1036/004/"
|
|
111
|
+
|
|
112
|
+
|
|
113
|
+
|
|
114
|
+
[rule.threat.tactic]
|
|
115
|
+
id = "TA0005"
|
|
116
|
+
name = "Defense Evasion"
|
|
117
|
+
reference = "https://attack.mitre.org/tactics/TA0005/"
|
|
118
|
+
|
|
@@ -0,0 +1,118 @@
|
|
|
1
|
+
[metadata]
|
|
2
|
+
creation_date = "2023/10/16"
|
|
3
|
+
integration = ["problemchild", "endpoint"]
|
|
4
|
+
maturity = "production"
|
|
5
|
+
updated_date = "2025/09/08"
|
|
6
|
+
|
|
7
|
+
[rule]
|
|
8
|
+
author = ["Elastic"]
|
|
9
|
+
description = """
|
|
10
|
+
A supervised machine learning model (ProblemChild) has identified a suspicious Windows process event with low
|
|
11
|
+
probability of it being malicious activity. Alternatively, the model's blocklist identified the event as being
|
|
12
|
+
malicious.
|
|
13
|
+
"""
|
|
14
|
+
from = "now-10m"
|
|
15
|
+
index = ["logs-endpoint.events.process-*", "winlogbeat-*"]
|
|
16
|
+
language = "eql"
|
|
17
|
+
license = "Elastic License v2"
|
|
18
|
+
name = "Machine Learning Detected a Suspicious Windows Event with a Low Malicious Probability Score"
|
|
19
|
+
references = [
|
|
20
|
+
"https://www.elastic.co/guide/en/security/current/prebuilt-ml-jobs.html",
|
|
21
|
+
"https://docs.elastic.co/en/integrations/problemchild",
|
|
22
|
+
"https://www.elastic.co/security-labs/detecting-living-off-the-land-attacks-with-new-elastic-integration",
|
|
23
|
+
]
|
|
24
|
+
risk_score = 21
|
|
25
|
+
rule_id = "13e908b9-7bf0-4235-abc9-b5deb500d0ad"
|
|
26
|
+
setup = """## Setup
|
|
27
|
+
|
|
28
|
+
The rule requires the Living off the Land (LotL) Attack Detection integration assets to be installed, as well as Windows process events collected by integrations such as Elastic Defend or Winlogbeat.
|
|
29
|
+
|
|
30
|
+
### LotL Attack Detection Setup
|
|
31
|
+
The LotL Attack Detection integration detects living-off-the-land activity in Windows process events.
|
|
32
|
+
|
|
33
|
+
#### Prerequisite Requirements:
|
|
34
|
+
- Fleet is required for LotL Attack Detection.
|
|
35
|
+
- To configure Fleet Server refer to the [documentation](https://www.elastic.co/guide/en/fleet/current/fleet-server.html).
|
|
36
|
+
- Windows process events collected by the [Elastic Defend](https://docs.elastic.co/en/integrations/endpoint) integration or Winlogbeat(https://www.elastic.co/guide/en/beats/winlogbeat/current/_winlogbeat_overview.html).
|
|
37
|
+
- To install Elastic Defend, refer to the [documentation](https://www.elastic.co/guide/en/security/current/install-endpoint.html).
|
|
38
|
+
- To set up and run Winlogbeat, follow [this](https://www.elastic.co/guide/en/beats/winlogbeat/current/winlogbeat-installation-configuration.html) guide.
|
|
39
|
+
|
|
40
|
+
#### The following steps should be executed to install assets associated with the LotL Attack Detection integration:
|
|
41
|
+
- Go to the Kibana homepage. Under Management, click Integrations.
|
|
42
|
+
- In the query bar, search for Living off the Land Attack Detection and select the integration to see more details about it.
|
|
43
|
+
- Follow the instructions under the **Installation** section.
|
|
44
|
+
- For this rule to work, complete the instructions through **Configure the ingest pipeline**.
|
|
45
|
+
"""
|
|
46
|
+
severity = "low"
|
|
47
|
+
tags = [
|
|
48
|
+
"OS: Windows",
|
|
49
|
+
"Data Source: Elastic Endgame",
|
|
50
|
+
"Use Case: Living off the Land Attack Detection",
|
|
51
|
+
"Rule Type: ML",
|
|
52
|
+
"Rule Type: Machine Learning",
|
|
53
|
+
"Tactic: Defense Evasion",
|
|
54
|
+
"Data Source: Elastic Defend",
|
|
55
|
+
"Resources: Investigation Guide",
|
|
56
|
+
]
|
|
57
|
+
timestamp_override = "event.ingested"
|
|
58
|
+
type = "eql"
|
|
59
|
+
|
|
60
|
+
query = '''
|
|
61
|
+
process where ((problemchild.prediction == 1 and problemchild.prediction_probability <= 0.98) or
|
|
62
|
+
blocklist_label == 1) and not process.args : ("*C:\\WINDOWS\\temp\\nessus_*.txt*", "*C:\\WINDOWS\\temp\\nessus_*.tmp*")
|
|
63
|
+
'''
|
|
64
|
+
note = """## Triage and analysis
|
|
65
|
+
|
|
66
|
+
> **Disclaimer**:
|
|
67
|
+
> This investigation guide was created using generative AI technology and has been reviewed to improve its accuracy and relevance. While every effort has been made to ensure its quality, we recommend validating the content and adapting it to suit your specific environment and operational needs.
|
|
68
|
+
|
|
69
|
+
### Investigating Machine Learning Detected a Suspicious Windows Event with a Low Malicious Probability Score
|
|
70
|
+
|
|
71
|
+
The detection leverages a machine learning model to identify potentially suspicious Windows processes with a low likelihood of being malicious, focusing on defense evasion tactics like masquerading. Adversaries may exploit legitimate processes to bypass security measures. This rule flags such events, excluding known benign patterns, to highlight potential threats for further analysis.
|
|
72
|
+
|
|
73
|
+
### Possible investigation steps
|
|
74
|
+
|
|
75
|
+
- Review the process details where the problemchild.prediction is 1 and the prediction_probability is less than or equal to 0.98 to understand why the process was flagged as suspicious.
|
|
76
|
+
- Check if the process is listed in the blocklist_label as 1, indicating it has been identified as malicious by the model's blocklist.
|
|
77
|
+
- Investigate the command-line arguments of the process to identify any unusual or unexpected patterns, excluding known benign patterns such as those involving "C:\\WINDOWS\\temp\\nessus_*.txt" or "C:\\WINDOWS\\temp\\nessus_*.tmp".
|
|
78
|
+
- Correlate the flagged process with other system events or logs to determine if it is part of a larger pattern of suspicious activity, focusing on defense evasion tactics like masquerading.
|
|
79
|
+
- Assess the parent process and any child processes spawned by the suspicious process to identify potential lateral movement or further malicious activity.
|
|
80
|
+
- Consult threat intelligence sources to see if the process or its associated indicators have been reported in recent threat reports or advisories.
|
|
81
|
+
|
|
82
|
+
### False positive analysis
|
|
83
|
+
|
|
84
|
+
- Nessus scan files in the Windows temp directory may trigger false positives. Exclude paths like C:\\WINDOWS\\temp\\nessus_*.txt and C:\\WINDOWS\\temp\\nessus_*.tmp to prevent these benign events from being flagged.
|
|
85
|
+
- Legitimate software updates or installations might mimic suspicious behavior. Monitor and document regular update schedules to differentiate between expected and unexpected activities.
|
|
86
|
+
- System administration scripts that automate tasks can appear suspicious. Identify and whitelist these scripts if they are part of routine operations to avoid unnecessary alerts.
|
|
87
|
+
- Custom in-house applications may not be recognized by the model. Work with IT to catalog these applications and create exceptions where necessary to reduce false positives.
|
|
88
|
+
- Regularly review and update the blocklist and exception rules to ensure they reflect the current environment and known benign activities.
|
|
89
|
+
|
|
90
|
+
### Response and remediation
|
|
91
|
+
|
|
92
|
+
- Isolate the affected system from the network to prevent potential lateral movement by the adversary exploiting the masquerading technique.
|
|
93
|
+
- Terminate the suspicious process identified by the machine learning model to halt any ongoing malicious activity.
|
|
94
|
+
- Conduct a thorough review of the process's parent and child processes to identify any additional suspicious activities or related processes that may require termination.
|
|
95
|
+
- Restore the system from a known good backup if any malicious activity is confirmed, ensuring that the backup is free from compromise.
|
|
96
|
+
- Update and patch the system to the latest security standards to close any vulnerabilities that may have been exploited.
|
|
97
|
+
- Implement enhanced monitoring for similar masquerading attempts by adjusting alert thresholds or adding specific indicators of compromise (IOCs) related to the detected event.
|
|
98
|
+
- Escalate the incident to the security operations center (SOC) or relevant security team for further analysis and to determine if additional systems are affected."""
|
|
99
|
+
|
|
100
|
+
|
|
101
|
+
[[rule.threat]]
|
|
102
|
+
framework = "MITRE ATT&CK"
|
|
103
|
+
[[rule.threat.technique]]
|
|
104
|
+
id = "T1036"
|
|
105
|
+
name = "Masquerading"
|
|
106
|
+
reference = "https://attack.mitre.org/techniques/T1036/"
|
|
107
|
+
[[rule.threat.technique.subtechnique]]
|
|
108
|
+
id = "T1036.004"
|
|
109
|
+
name = "Masquerade Task or Service"
|
|
110
|
+
reference = "https://attack.mitre.org/techniques/T1036/004/"
|
|
111
|
+
|
|
112
|
+
|
|
113
|
+
|
|
114
|
+
[rule.threat.tactic]
|
|
115
|
+
id = "TA0005"
|
|
116
|
+
name = "Defense Evasion"
|
|
117
|
+
reference = "https://attack.mitre.org/tactics/TA0005/"
|
|
118
|
+
|
|
@@ -0,0 +1,106 @@
|
|
|
1
|
+
[metadata]
|
|
2
|
+
creation_date = "2023/10/16"
|
|
3
|
+
integration = ["problemchild", "endpoint", "windows"]
|
|
4
|
+
maturity = "production"
|
|
5
|
+
updated_date = "2025/03/20"
|
|
6
|
+
|
|
7
|
+
[rule]
|
|
8
|
+
anomaly_threshold = 75
|
|
9
|
+
author = ["Elastic"]
|
|
10
|
+
description = """
|
|
11
|
+
A machine learning job combination has identified a host with one or more suspicious Windows processes that exhibit
|
|
12
|
+
unusually high malicious probability scores.These process(es) have been classified as malicious in several ways. The
|
|
13
|
+
process(es) were predicted to be malicious by the ProblemChild supervised ML model. If the anomaly contains a cluster of
|
|
14
|
+
suspicious processes, each process has the same host name, and the aggregate score of the event cluster was calculated
|
|
15
|
+
to be unusually high by an unsupervised ML model. Such a cluster often contains suspicious or malicious activity,
|
|
16
|
+
possibly involving LOLbins, that may be resistant to detection using conventional search rules.
|
|
17
|
+
"""
|
|
18
|
+
from = "now-45m"
|
|
19
|
+
interval = "15m"
|
|
20
|
+
license = "Elastic License v2"
|
|
21
|
+
machine_learning_job_id = "problem_child_high_sum_by_host"
|
|
22
|
+
name = "Host Detected with Suspicious Windows Process(es)"
|
|
23
|
+
note = """## Triage and analysis
|
|
24
|
+
|
|
25
|
+
> **Disclaimer**:
|
|
26
|
+
> This investigation guide was created using generative AI technology and has been reviewed to improve its accuracy and relevance. While every effort has been made to ensure its quality, we recommend validating the content and adapting it to suit your specific environment and operational needs.
|
|
27
|
+
|
|
28
|
+
### Investigating Host Detected with Suspicious Windows Process(es)
|
|
29
|
+
|
|
30
|
+
The detection leverages machine learning to identify clusters of Windows processes with high malicious probability scores. Adversaries exploit legitimate tools, known as LOLbins, to evade detection. This rule uses both supervised and unsupervised ML models to flag unusual process clusters on a single host, indicating potential masquerading tactics for defense evasion.
|
|
31
|
+
|
|
32
|
+
### Possible investigation steps
|
|
33
|
+
|
|
34
|
+
- Review the host name associated with the suspicious process cluster to determine if it is a critical asset or has a history of similar alerts.
|
|
35
|
+
- Examine the specific processes flagged by the ProblemChild supervised ML model to identify any known LOLbins or unusual command-line arguments that may indicate masquerading.
|
|
36
|
+
- Check the timeline of the process execution to see if it coincides with any known scheduled tasks or user activity that could explain the anomaly.
|
|
37
|
+
- Investigate the parent-child relationship of the processes to identify any unexpected or unauthorized process spawning patterns.
|
|
38
|
+
- Correlate the alert with other security events or logs from the same host to identify any additional indicators of compromise or related suspicious activity.
|
|
39
|
+
- Assess the network activity associated with the host during the time of the alert to detect any potential data exfiltration or communication with known malicious IP addresses.
|
|
40
|
+
|
|
41
|
+
### False positive analysis
|
|
42
|
+
|
|
43
|
+
- Legitimate administrative tools like PowerShell or Windows Management Instrumentation (WMI) may be flagged as suspicious due to their dual-use nature. Users can create exceptions for these tools when used by trusted administrators or during scheduled maintenance.
|
|
44
|
+
- Automated scripts or scheduled tasks that perform routine system checks or updates might trigger alerts. Review these processes and whitelist them if they are verified as part of regular operations.
|
|
45
|
+
- Software updates or installations that involve multiple processes spawning in a short time frame can be mistaken for malicious clusters. Ensure that these activities are documented and create exceptions for known update processes.
|
|
46
|
+
- Development or testing environments where new or experimental software is frequently executed may generate false positives. Consider excluding these environments from monitoring or adjusting the sensitivity of the rule for these specific hosts.
|
|
47
|
+
- Frequent use of remote desktop or remote management tools by IT staff can appear suspicious. Implement user-based exceptions for known IT personnel to reduce unnecessary alerts.
|
|
48
|
+
|
|
49
|
+
### Response and remediation
|
|
50
|
+
|
|
51
|
+
- Isolate the affected host immediately to prevent further spread of potential malicious activity. Disconnect it from the network to contain the threat.
|
|
52
|
+
- Terminate the suspicious processes identified by the alert. Use task management tools or scripts to ensure all instances of the processes are stopped.
|
|
53
|
+
- Conduct a thorough review of the host's system logs and process history to identify any additional indicators of compromise or related malicious activity.
|
|
54
|
+
- Restore the host from a known good backup if available, ensuring that the backup is free from any signs of compromise.
|
|
55
|
+
- Update and patch the host's operating system and all installed software to close any vulnerabilities that may have been exploited.
|
|
56
|
+
- Implement application whitelisting to prevent unauthorized or suspicious processes from executing in the future.
|
|
57
|
+
- Escalate the incident to the security operations center (SOC) or incident response team for further analysis and to determine if additional hosts are affected."""
|
|
58
|
+
references = [
|
|
59
|
+
"https://www.elastic.co/guide/en/security/current/prebuilt-ml-jobs.html",
|
|
60
|
+
"https://docs.elastic.co/en/integrations/problemchild",
|
|
61
|
+
"https://www.elastic.co/security-labs/detecting-living-off-the-land-attacks-with-new-elastic-integration",
|
|
62
|
+
]
|
|
63
|
+
risk_score = 21
|
|
64
|
+
rule_id = "bdfebe11-e169-42e3-b344-c5d2015533d3"
|
|
65
|
+
setup = """## Setup
|
|
66
|
+
|
|
67
|
+
The rule requires the Living off the Land (LotL) Attack Detection integration assets to be installed, as well as Windows process events collected by integrations such as Elastic Defend or Winlogbeat.
|
|
68
|
+
|
|
69
|
+
### LotL Attack Detection Setup
|
|
70
|
+
The LotL Attack Detection integration detects living-off-the-land activity in Windows process events.
|
|
71
|
+
|
|
72
|
+
#### Prerequisite Requirements:
|
|
73
|
+
- Fleet is required for LotL Attack Detection.
|
|
74
|
+
- To configure Fleet Server refer to the [documentation](https://www.elastic.co/guide/en/fleet/current/fleet-server.html).
|
|
75
|
+
- Windows process events collected by the [Elastic Defend](https://docs.elastic.co/en/integrations/endpoint) integration or Winlogbeat(https://www.elastic.co/guide/en/beats/winlogbeat/current/_winlogbeat_overview.html).
|
|
76
|
+
- To install Elastic Defend, refer to the [documentation](https://www.elastic.co/guide/en/security/current/install-endpoint.html).
|
|
77
|
+
- To set up and run Winlogbeat, follow [this](https://www.elastic.co/guide/en/beats/winlogbeat/current/winlogbeat-installation-configuration.html) guide.
|
|
78
|
+
|
|
79
|
+
#### The following steps should be executed to install assets associated with the LotL Attack Detection integration:
|
|
80
|
+
- Go to the Kibana homepage. Under Management, click Integrations.
|
|
81
|
+
- In the query bar, search for Living off the Land Attack Detection and select the integration to see more details about it.
|
|
82
|
+
- Follow the instructions under the **Installation** section.
|
|
83
|
+
- For this rule to work, complete the instructions through **Add preconfigured anomaly detection jobs**.
|
|
84
|
+
"""
|
|
85
|
+
severity = "low"
|
|
86
|
+
tags = [
|
|
87
|
+
"Use Case: Living off the Land Attack Detection",
|
|
88
|
+
"Rule Type: ML",
|
|
89
|
+
"Rule Type: Machine Learning",
|
|
90
|
+
"Tactic: Defense Evasion",
|
|
91
|
+
"Resources: Investigation Guide",
|
|
92
|
+
]
|
|
93
|
+
type = "machine_learning"
|
|
94
|
+
[[rule.threat]]
|
|
95
|
+
framework = "MITRE ATT&CK"
|
|
96
|
+
[[rule.threat.technique]]
|
|
97
|
+
id = "T1036"
|
|
98
|
+
name = "Masquerading"
|
|
99
|
+
reference = "https://attack.mitre.org/techniques/T1036/"
|
|
100
|
+
|
|
101
|
+
|
|
102
|
+
[rule.threat.tactic]
|
|
103
|
+
id = "TA0005"
|
|
104
|
+
name = "Defense Evasion"
|
|
105
|
+
reference = "https://attack.mitre.org/tactics/TA0005/"
|
|
106
|
+
|