nldcsc-elastic-rules 0.0.8__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- nldcsc_elastic_rules/__init__.py +1 -0
- nldcsc_elastic_rules/rules/README.md +31 -0
- nldcsc_elastic_rules/rules/_deprecated/apm_null_user_agent.toml +49 -0
- nldcsc_elastic_rules/rules/_deprecated/command_and_control_connection_attempt_by_non_ssh_root_session.toml +85 -0
- nldcsc_elastic_rules/rules/_deprecated/command_and_control_dns_directly_to_the_internet.toml +85 -0
- nldcsc_elastic_rules/rules/_deprecated/command_and_control_ftp_file_transfer_protocol_activity_to_the_internet.toml +77 -0
- nldcsc_elastic_rules/rules/_deprecated/command_and_control_irc_internet_relay_chat_protocol_activity_to_the_internet.toml +76 -0
- nldcsc_elastic_rules/rules/_deprecated/command_and_control_linux_iodine_activity.toml +60 -0
- nldcsc_elastic_rules/rules/_deprecated/command_and_control_linux_port_knocking_reverse_connection.toml +110 -0
- nldcsc_elastic_rules/rules/_deprecated/command_and_control_port_8000_activity_to_the_internet.toml +63 -0
- nldcsc_elastic_rules/rules/_deprecated/command_and_control_pptp_point_to_point_tunneling_protocol_activity.toml +46 -0
- nldcsc_elastic_rules/rules/_deprecated/command_and_control_proxy_port_activity_to_the_internet.toml +66 -0
- nldcsc_elastic_rules/rules/_deprecated/command_and_control_smtp_to_the_internet.toml +73 -0
- nldcsc_elastic_rules/rules/_deprecated/command_and_control_sql_server_port_activity_to_the_internet.toml +62 -0
- nldcsc_elastic_rules/rules/_deprecated/command_and_control_ssh_secure_shell_from_the_internet.toml +89 -0
- nldcsc_elastic_rules/rules/_deprecated/command_and_control_ssh_secure_shell_to_the_internet.toml +64 -0
- nldcsc_elastic_rules/rules/_deprecated/command_and_control_tor_activity_to_the_internet.toml +69 -0
- nldcsc_elastic_rules/rules/_deprecated/container_workload_protection.toml +78 -0
- nldcsc_elastic_rules/rules/_deprecated/credential_access_aws_creds_search_inside_a_container.toml +101 -0
- nldcsc_elastic_rules/rules/_deprecated/credential_access_collection_sensitive_files_compression_inside_a_container.toml +144 -0
- nldcsc_elastic_rules/rules/_deprecated/credential_access_entra_signin_brute_force_microsoft_365_repeat_source.toml +121 -0
- nldcsc_elastic_rules/rules/_deprecated/credential_access_microsoft_365_potential_password_spraying_attack.toml +61 -0
- nldcsc_elastic_rules/rules/_deprecated/credential_access_potential_linux_ssh_bruteforce_root.toml +104 -0
- nldcsc_elastic_rules/rules/_deprecated/credential_access_sensitive_keys_or_passwords_search_inside_a_container.toml +109 -0
- nldcsc_elastic_rules/rules/_deprecated/credential_access_tcpdump_activity.toml +61 -0
- nldcsc_elastic_rules/rules/_deprecated/defense_evasion_attempt_to_disable_iptables_or_firewall.toml +53 -0
- nldcsc_elastic_rules/rules/_deprecated/defense_evasion_base64_encoding_or_decoding_activity.toml +51 -0
- nldcsc_elastic_rules/rules/_deprecated/defense_evasion_code_injection_conhost.toml +106 -0
- nldcsc_elastic_rules/rules/_deprecated/defense_evasion_execution_via_trusted_developer_utilities.toml +47 -0
- nldcsc_elastic_rules/rules/_deprecated/defense_evasion_hex_encoding_or_decoding_activity.toml +50 -0
- nldcsc_elastic_rules/rules/_deprecated/defense_evasion_ld_preload_env_variable_process_injection.toml +137 -0
- nldcsc_elastic_rules/rules/_deprecated/defense_evasion_ld_preload_shared_object_modified_inside_a_container.toml +96 -0
- nldcsc_elastic_rules/rules/_deprecated/defense_evasion_mshta_making_network_connections.toml +51 -0
- nldcsc_elastic_rules/rules/_deprecated/defense_evasion_potential_processherpaderping.toml +59 -0
- nldcsc_elastic_rules/rules/_deprecated/defense_evasion_whitespace_padding_in_command_line.toml +102 -0
- nldcsc_elastic_rules/rules/_deprecated/discovery_file_dir_discovery.toml +95 -0
- nldcsc_elastic_rules/rules/_deprecated/discovery_process_discovery_via_tasklist_command.toml +45 -0
- nldcsc_elastic_rules/rules/_deprecated/discovery_query_registry_via_reg.toml +44 -0
- nldcsc_elastic_rules/rules/_deprecated/discovery_suspicious_network_tool_launched_inside_a_container.toml +129 -0
- nldcsc_elastic_rules/rules/_deprecated/discovery_whoami_commmand.toml +48 -0
- nldcsc_elastic_rules/rules/_deprecated/execution_apt_binary.toml +53 -0
- nldcsc_elastic_rules/rules/_deprecated/execution_awk_binary_shell.toml +51 -0
- nldcsc_elastic_rules/rules/_deprecated/execution_busybox_binary.toml +50 -0
- nldcsc_elastic_rules/rules/_deprecated/execution_c89_c99_binary.toml +52 -0
- nldcsc_elastic_rules/rules/_deprecated/execution_command_shell_started_by_powershell.toml +45 -0
- nldcsc_elastic_rules/rules/_deprecated/execution_container_management_binary_launched_inside_a_container.toml +100 -0
- nldcsc_elastic_rules/rules/_deprecated/execution_cpulimit_binary.toml +53 -0
- nldcsc_elastic_rules/rules/_deprecated/execution_crash_binary.toml +50 -0
- nldcsc_elastic_rules/rules/_deprecated/execution_env_binary.toml +50 -0
- nldcsc_elastic_rules/rules/_deprecated/execution_expect_binary.toml +52 -0
- nldcsc_elastic_rules/rules/_deprecated/execution_file_made_executable_via_chmod_inside_a_container.toml +113 -0
- nldcsc_elastic_rules/rules/_deprecated/execution_find_binary.toml +52 -0
- nldcsc_elastic_rules/rules/_deprecated/execution_flock_binary.toml +50 -0
- nldcsc_elastic_rules/rules/_deprecated/execution_gcc_binary.toml +52 -0
- nldcsc_elastic_rules/rules/_deprecated/execution_interactive_exec_to_container.toml +127 -0
- nldcsc_elastic_rules/rules/_deprecated/execution_interactive_shell_spawned_from_inside_a_container.toml +109 -0
- nldcsc_elastic_rules/rules/_deprecated/execution_linux_process_started_in_temp_directory.toml +48 -0
- nldcsc_elastic_rules/rules/_deprecated/execution_mysql_binary.toml +52 -0
- nldcsc_elastic_rules/rules/_deprecated/execution_netcat_listener_established_inside_a_container.toml +114 -0
- nldcsc_elastic_rules/rules/_deprecated/execution_reverse_shell_via_named_pipe.toml +74 -0
- nldcsc_elastic_rules/rules/_deprecated/execution_shell_suspicious_parent_child_revshell_linux.toml +111 -0
- nldcsc_elastic_rules/rules/_deprecated/execution_ssh_binary.toml +53 -0
- nldcsc_elastic_rules/rules/_deprecated/execution_suspicious_jar_child_process.toml +113 -0
- nldcsc_elastic_rules/rules/_deprecated/execution_vi_binary.toml +50 -0
- nldcsc_elastic_rules/rules/_deprecated/execution_via_net_com_assemblies.toml +55 -0
- nldcsc_elastic_rules/rules/_deprecated/exfiltration_ec2_snapshot_change_activity.toml +111 -0
- nldcsc_elastic_rules/rules/_deprecated/exfiltration_rds_snapshot_export.toml +47 -0
- nldcsc_elastic_rules/rules/_deprecated/impact_potential_linux_ransomware_file_encryption.toml +87 -0
- nldcsc_elastic_rules/rules/_deprecated/impact_virtual_network_device_modified.toml +96 -0
- nldcsc_elastic_rules/rules/_deprecated/initial_access_cross_site_scripting.toml +49 -0
- nldcsc_elastic_rules/rules/_deprecated/initial_access_login_failures.toml +53 -0
- nldcsc_elastic_rules/rules/_deprecated/initial_access_login_location.toml +53 -0
- nldcsc_elastic_rules/rules/_deprecated/initial_access_login_sessions.toml +53 -0
- nldcsc_elastic_rules/rules/_deprecated/initial_access_login_time.toml +53 -0
- nldcsc_elastic_rules/rules/_deprecated/initial_access_rdp_remote_desktop_protocol_to_the_internet.toml +81 -0
- nldcsc_elastic_rules/rules/_deprecated/initial_access_ssh_connection_established_inside_a_container.toml +127 -0
- nldcsc_elastic_rules/rules/_deprecated/lateral_movement_malicious_remote_file_creation.toml +46 -0
- nldcsc_elastic_rules/rules/_deprecated/lateral_movement_remote_file_creation_in_sensitive_directory.toml +60 -0
- nldcsc_elastic_rules/rules/_deprecated/lateral_movement_ssh_process_launched_inside_a_container.toml +122 -0
- nldcsc_elastic_rules/rules/_deprecated/linux_mknod_activity.toml +37 -0
- nldcsc_elastic_rules/rules/_deprecated/linux_nmap_activity.toml +37 -0
- nldcsc_elastic_rules/rules/_deprecated/linux_socat_activity.toml +36 -0
- nldcsc_elastic_rules/rules/_deprecated/persistence_cron_jobs_creation_and_runtime.toml +58 -0
- nldcsc_elastic_rules/rules/_deprecated/persistence_etc_file_creation.toml +271 -0
- nldcsc_elastic_rules/rules/_deprecated/persistence_google_workspace_user_group_access_modified_to_allow_external_access.toml +85 -0
- nldcsc_elastic_rules/rules/_deprecated/persistence_kernel_module_activity.toml +53 -0
- nldcsc_elastic_rules/rules/_deprecated/persistence_shell_activity_by_web_server.toml +101 -0
- nldcsc_elastic_rules/rules/_deprecated/persistence_ssh_authorized_keys_modification_inside_a_container.toml +126 -0
- nldcsc_elastic_rules/rules/_deprecated/privilege_escalation_debugfs_launched_inside_a_privileged_container.toml +99 -0
- nldcsc_elastic_rules/rules/_deprecated/privilege_escalation_gcp_kubernetes_rolebindings_created_or_patched.toml +51 -0
- nldcsc_elastic_rules/rules/_deprecated/privilege_escalation_krbrelayup_suspicious_logon.toml +75 -0
- nldcsc_elastic_rules/rules/_deprecated/privilege_escalation_linux_strace_activity.toml +50 -0
- nldcsc_elastic_rules/rules/_deprecated/privilege_escalation_mount_launched_inside_a_privileged_container.toml +98 -0
- nldcsc_elastic_rules/rules/_deprecated/privilege_escalation_potential_container_escape_via_modified_notify_on_release_file.toml +99 -0
- nldcsc_elastic_rules/rules/_deprecated/privilege_escalation_potential_container_escape_via_modified_release_agent_file.toml +98 -0
- nldcsc_elastic_rules/rules/_deprecated/privilege_escalation_printspooler_malicious_driver_file_changes.toml +51 -0
- nldcsc_elastic_rules/rules/_deprecated/privilege_escalation_printspooler_malicious_registry_modification.toml +50 -0
- nldcsc_elastic_rules/rules/_deprecated/privilege_escalation_root_login_without_mfa.toml +104 -0
- nldcsc_elastic_rules/rules/_deprecated/privilege_escalation_setgid_bit_set_via_chmod.toml +56 -0
- nldcsc_elastic_rules/rules/_deprecated/threat_intel_filebeat7x.toml +191 -0
- nldcsc_elastic_rules/rules/_deprecated/threat_intel_filebeat8x.toml +192 -0
- nldcsc_elastic_rules/rules/_deprecated/threat_intel_fleet_integrations.toml +192 -0
- nldcsc_elastic_rules/rules/apm/apm_403_response_to_a_post.toml +69 -0
- nldcsc_elastic_rules/rules/apm/apm_405_response_method_not_allowed.toml +69 -0
- nldcsc_elastic_rules/rules/apm/apm_sqlmap_user_agent.toml +70 -0
- nldcsc_elastic_rules/rules/cross-platform/command_and_control_google_drive_malicious_file_download.toml +102 -0
- nldcsc_elastic_rules/rules/cross-platform/command_and_control_non_standard_ssh_port.toml +106 -0
- nldcsc_elastic_rules/rules/cross-platform/command_and_control_pan_elastic_defend_c2.toml +76 -0
- nldcsc_elastic_rules/rules/cross-platform/command_and_control_socks_fortigate_endpoint.toml +85 -0
- nldcsc_elastic_rules/rules/cross-platform/credential_access_cookies_chromium_browsers_debugging.toml +116 -0
- nldcsc_elastic_rules/rules/cross-platform/credential_access_forced_authentication_pipes.toml +112 -0
- nldcsc_elastic_rules/rules/cross-platform/credential_access_trufflehog_execution.toml +97 -0
- nldcsc_elastic_rules/rules/cross-platform/defense_evasion_agent_spoofing_mismatched_id.toml +81 -0
- nldcsc_elastic_rules/rules/cross-platform/defense_evasion_agent_spoofing_multiple_hosts.toml +87 -0
- nldcsc_elastic_rules/rules/cross-platform/defense_evasion_deleting_websvr_access_logs.toml +99 -0
- nldcsc_elastic_rules/rules/cross-platform/defense_evasion_deletion_of_bash_command_line_history.toml +111 -0
- nldcsc_elastic_rules/rules/cross-platform/defense_evasion_elastic_agent_service_terminated.toml +117 -0
- nldcsc_elastic_rules/rules/cross-platform/defense_evasion_encoding_rot13_python_script.toml +98 -0
- nldcsc_elastic_rules/rules/cross-platform/defense_evasion_masquerading_space_after_filename.toml +107 -0
- nldcsc_elastic_rules/rules/cross-platform/defense_evasion_timestomp_touch.toml +102 -0
- nldcsc_elastic_rules/rules/cross-platform/defense_evasion_whitespace_padding_command_line.toml +130 -0
- nldcsc_elastic_rules/rules/cross-platform/discovery_security_software_grep.toml +140 -0
- nldcsc_elastic_rules/rules/cross-platform/discovery_virtual_machine_fingerprinting_grep.toml +102 -0
- nldcsc_elastic_rules/rules/cross-platform/execution_aws_ssm_sendcommand_with_command_parameters.toml +166 -0
- nldcsc_elastic_rules/rules/cross-platform/execution_git_exploit_cve_2025_48384.toml +99 -0
- nldcsc_elastic_rules/rules/cross-platform/execution_pentest_eggshell_remote_admin_tool.toml +87 -0
- nldcsc_elastic_rules/rules/cross-platform/execution_potential_widespread_malware_infection.toml +92 -0
- nldcsc_elastic_rules/rules/cross-platform/execution_revershell_via_shell_cmd.toml +102 -0
- nldcsc_elastic_rules/rules/cross-platform/execution_suspicious_java_netcon_childproc.toml +132 -0
- nldcsc_elastic_rules/rules/cross-platform/guided_onboarding_sample_rule.toml +80 -0
- nldcsc_elastic_rules/rules/cross-platform/impact_hosts_file_modified.toml +119 -0
- nldcsc_elastic_rules/rules/cross-platform/initial_access_azure_o365_with_network_alert.toml +137 -0
- nldcsc_elastic_rules/rules/cross-platform/initial_access_exfiltration_new_usb_device_mounted.toml +117 -0
- nldcsc_elastic_rules/rules/cross-platform/initial_access_zoom_meeting_with_no_passcode.toml +85 -0
- nldcsc_elastic_rules/rules/cross-platform/multiple_alerts_different_tactics_host.toml +79 -0
- nldcsc_elastic_rules/rules/cross-platform/multiple_alerts_edr_elastic_defend_by_host.toml +97 -0
- nldcsc_elastic_rules/rules/cross-platform/multiple_alerts_elastic_defend_netsecurity_by_host.toml +105 -0
- nldcsc_elastic_rules/rules/cross-platform/multiple_alerts_email_elastic_defend_correlation.toml +82 -0
- nldcsc_elastic_rules/rules/cross-platform/multiple_alerts_involving_user.toml +82 -0
- nldcsc_elastic_rules/rules/cross-platform/multiple_alerts_risky_host_esql.toml +105 -0
- nldcsc_elastic_rules/rules/cross-platform/persistence_credential_access_modify_auth_module_or_config.toml +141 -0
- nldcsc_elastic_rules/rules/cross-platform/persistence_shell_profile_modification.toml +107 -0
- nldcsc_elastic_rules/rules/cross-platform/persistence_ssh_authorized_keys_modification.toml +144 -0
- nldcsc_elastic_rules/rules/cross-platform/persistence_web_server_potential_command_injection.toml +228 -0
- nldcsc_elastic_rules/rules/cross-platform/privilege_escalation_echo_nopasswd_sudoers.toml +90 -0
- nldcsc_elastic_rules/rules/cross-platform/privilege_escalation_setuid_setgid_bit_set_via_chmod.toml +113 -0
- nldcsc_elastic_rules/rules/cross-platform/privilege_escalation_sudo_buffer_overflow.toml +105 -0
- nldcsc_elastic_rules/rules/cross-platform/privilege_escalation_sudoers_file_mod.toml +91 -0
- nldcsc_elastic_rules/rules/cross-platform/reconnaissance_web_server_discovery_or_fuzzing_activity.toml +121 -0
- nldcsc_elastic_rules/rules/cross-platform/reconnaissance_web_server_unusual_spike_in_error_logs.toml +107 -0
- nldcsc_elastic_rules/rules/cross-platform/reconnaissance_web_server_unusual_spike_in_error_response_codes.toml +127 -0
- nldcsc_elastic_rules/rules/cross-platform/reconnaissance_web_server_unusual_user_agents.toml +165 -0
- nldcsc_elastic_rules/rules/integrations/aws/NOTICE.txt +26 -0
- nldcsc_elastic_rules/rules/integrations/aws/collection_cloudtrail_logging_created.toml +124 -0
- nldcsc_elastic_rules/rules/integrations/aws/collection_s3_unauthenticated_bucket_access_by_rare_source.toml +186 -0
- nldcsc_elastic_rules/rules/integrations/aws/credential_access_aws_getpassword_for_ec2_instance.toml +121 -0
- nldcsc_elastic_rules/rules/integrations/aws/credential_access_aws_iam_assume_role_brute_force.toml +105 -0
- nldcsc_elastic_rules/rules/integrations/aws/credential_access_iam_compromisedkeyquarantine_policy_attached_to_user.toml +106 -0
- nldcsc_elastic_rules/rules/integrations/aws/credential_access_iam_user_addition_to_group.toml +134 -0
- nldcsc_elastic_rules/rules/integrations/aws/credential_access_new_terms_secretsmanager_getsecretvalue.toml +144 -0
- nldcsc_elastic_rules/rules/integrations/aws/credential_access_rapid_secret_retrieval_attempts_from_secretsmanager.toml +156 -0
- nldcsc_elastic_rules/rules/integrations/aws/credential_access_retrieve_secure_string_parameters_via_ssm.toml +128 -0
- nldcsc_elastic_rules/rules/integrations/aws/credential_access_root_console_failure_brute_force.toml +152 -0
- nldcsc_elastic_rules/rules/integrations/aws/defense_evasion_cloudtrail_logging_deleted.toml +120 -0
- nldcsc_elastic_rules/rules/integrations/aws/defense_evasion_cloudtrail_logging_evasion.toml +126 -0
- nldcsc_elastic_rules/rules/integrations/aws/defense_evasion_cloudtrail_logging_suspended.toml +121 -0
- nldcsc_elastic_rules/rules/integrations/aws/defense_evasion_cloudwatch_alarm_deletion.toml +174 -0
- nldcsc_elastic_rules/rules/integrations/aws/defense_evasion_config_service_rule_deletion.toml +116 -0
- nldcsc_elastic_rules/rules/integrations/aws/defense_evasion_configuration_recorder_stopped.toml +94 -0
- nldcsc_elastic_rules/rules/integrations/aws/defense_evasion_ec2_flow_log_deletion.toml +129 -0
- nldcsc_elastic_rules/rules/integrations/aws/defense_evasion_ec2_network_acl_deletion.toml +119 -0
- nldcsc_elastic_rules/rules/integrations/aws/defense_evasion_elasticache_security_group_creation.toml +107 -0
- nldcsc_elastic_rules/rules/integrations/aws/defense_evasion_elasticache_security_group_modified_or_deleted.toml +107 -0
- nldcsc_elastic_rules/rules/integrations/aws/defense_evasion_guardduty_detector_deletion.toml +153 -0
- nldcsc_elastic_rules/rules/integrations/aws/defense_evasion_rds_instance_restored.toml +106 -0
- nldcsc_elastic_rules/rules/integrations/aws/defense_evasion_route53_dns_query_resolver_config_deletion.toml +100 -0
- nldcsc_elastic_rules/rules/integrations/aws/defense_evasion_s3_bucket_configuration_deletion.toml +179 -0
- nldcsc_elastic_rules/rules/integrations/aws/defense_evasion_s3_bucket_lifecycle_expiration_added.toml +201 -0
- nldcsc_elastic_rules/rules/integrations/aws/defense_evasion_s3_bucket_server_access_logging_disabled.toml +152 -0
- nldcsc_elastic_rules/rules/integrations/aws/defense_evasion_sqs_purge_queue.toml +171 -0
- nldcsc_elastic_rules/rules/integrations/aws/defense_evasion_sts_get_federation_token.toml +134 -0
- nldcsc_elastic_rules/rules/integrations/aws/defense_evasion_vpc_security_group_ingress_rule_added_for_remote_connections.toml +118 -0
- nldcsc_elastic_rules/rules/integrations/aws/defense_evasion_waf_acl_deletion.toml +101 -0
- nldcsc_elastic_rules/rules/integrations/aws/defense_evasion_waf_rule_or_rule_group_deletion.toml +102 -0
- nldcsc_elastic_rules/rules/integrations/aws/discovery_ec2_deprecated_ami_discovery.toml +141 -0
- nldcsc_elastic_rules/rules/integrations/aws/discovery_ec2_multi_region_describe_instances.toml +135 -0
- nldcsc_elastic_rules/rules/integrations/aws/discovery_ec2_multiple_discovery_api_calls_via_cli.toml +155 -0
- nldcsc_elastic_rules/rules/integrations/aws/discovery_ec2_userdata_request_for_ec2_instance.toml +152 -0
- nldcsc_elastic_rules/rules/integrations/aws/discovery_new_terms_sts_getcalleridentity.toml +139 -0
- nldcsc_elastic_rules/rules/integrations/aws/discovery_servicequotas_multi_region_service_quota_requests.toml +125 -0
- nldcsc_elastic_rules/rules/integrations/aws/execution_lambda_external_layer_added_to_function.toml +98 -0
- nldcsc_elastic_rules/rules/integrations/aws/execution_new_terms_cloudformation_createstack.toml +119 -0
- nldcsc_elastic_rules/rules/integrations/aws/execution_ssm_command_document_created_by_rare_user.toml +117 -0
- nldcsc_elastic_rules/rules/integrations/aws/execution_ssm_sendcommand_by_rare_user.toml +138 -0
- nldcsc_elastic_rules/rules/integrations/aws/exfiltration_dynamodb_scan_by_unusual_user.toml +133 -0
- nldcsc_elastic_rules/rules/integrations/aws/exfiltration_dynamodb_table_exported_to_s3.toml +115 -0
- nldcsc_elastic_rules/rules/integrations/aws/exfiltration_ec2_ami_shared_with_separate_account.toml +100 -0
- nldcsc_elastic_rules/rules/integrations/aws/exfiltration_ec2_ebs_snapshot_shared_with_another_account.toml +150 -0
- nldcsc_elastic_rules/rules/integrations/aws/exfiltration_ec2_export_task.toml +154 -0
- nldcsc_elastic_rules/rules/integrations/aws/exfiltration_ec2_full_network_packet_capture_detected.toml +185 -0
- nldcsc_elastic_rules/rules/integrations/aws/exfiltration_ec2_vm_export_failure.toml +108 -0
- nldcsc_elastic_rules/rules/integrations/aws/exfiltration_rds_snapshot_export.toml +88 -0
- nldcsc_elastic_rules/rules/integrations/aws/exfiltration_rds_snapshot_shared_with_another_account.toml +100 -0
- nldcsc_elastic_rules/rules/integrations/aws/exfiltration_s3_bucket_policy_added_for_external_account_access.toml +194 -0
- nldcsc_elastic_rules/rules/integrations/aws/exfiltration_s3_bucket_policy_added_for_public_access.toml +188 -0
- nldcsc_elastic_rules/rules/integrations/aws/exfiltration_s3_bucket_replicated_to_external_account.toml +93 -0
- nldcsc_elastic_rules/rules/integrations/aws/exfiltration_sns_rare_protocol_subscription_by_user.toml +155 -0
- nldcsc_elastic_rules/rules/integrations/aws/impact_aws_eventbridge_rule_disabled_or_deleted.toml +94 -0
- nldcsc_elastic_rules/rules/integrations/aws/impact_aws_s3_bucket_enumeration_or_brute_force.toml +152 -0
- nldcsc_elastic_rules/rules/integrations/aws/impact_cloudtrail_logging_updated.toml +137 -0
- nldcsc_elastic_rules/rules/integrations/aws/impact_cloudwatch_log_group_deletion.toml +202 -0
- nldcsc_elastic_rules/rules/integrations/aws/impact_cloudwatch_log_stream_deletion.toml +189 -0
- nldcsc_elastic_rules/rules/integrations/aws/impact_ec2_disable_ebs_encryption.toml +156 -0
- nldcsc_elastic_rules/rules/integrations/aws/impact_ec2_ebs_snapshot_access_removed.toml +147 -0
- nldcsc_elastic_rules/rules/integrations/aws/impact_efs_filesystem_or_mount_deleted.toml +95 -0
- nldcsc_elastic_rules/rules/integrations/aws/impact_iam_deactivate_mfa_device.toml +167 -0
- nldcsc_elastic_rules/rules/integrations/aws/impact_iam_group_deletion.toml +119 -0
- nldcsc_elastic_rules/rules/integrations/aws/impact_kms_cmk_disabled_or_scheduled_for_deletion.toml +103 -0
- nldcsc_elastic_rules/rules/integrations/aws/impact_rds_group_deletion.toml +98 -0
- nldcsc_elastic_rules/rules/integrations/aws/impact_rds_instance_cluster_deletion.toml +105 -0
- nldcsc_elastic_rules/rules/integrations/aws/impact_rds_instance_cluster_deletion_protection_disabled.toml +97 -0
- nldcsc_elastic_rules/rules/integrations/aws/impact_rds_instance_cluster_stoppage.toml +100 -0
- nldcsc_elastic_rules/rules/integrations/aws/impact_rds_snapshot_deleted.toml +98 -0
- nldcsc_elastic_rules/rules/integrations/aws/impact_s3_bucket_object_uploaded_with_ransom_extension.toml +155 -0
- nldcsc_elastic_rules/rules/integrations/aws/impact_s3_excessive_object_encryption_with_sse_c.toml +139 -0
- nldcsc_elastic_rules/rules/integrations/aws/impact_s3_object_encryption_with_external_key.toml +126 -0
- nldcsc_elastic_rules/rules/integrations/aws/impact_s3_object_versioning_disabled.toml +153 -0
- nldcsc_elastic_rules/rules/integrations/aws/impact_s3_static_site_js_file_uploaded.toml +154 -0
- nldcsc_elastic_rules/rules/integrations/aws/impact_s3_unusual_object_encryption_with_sse_c.toml +143 -0
- nldcsc_elastic_rules/rules/integrations/aws/initial_access_console_login_root.toml +165 -0
- nldcsc_elastic_rules/rules/integrations/aws/initial_access_iam_session_token_used_from_multiple_addresses.toml +225 -0
- nldcsc_elastic_rules/rules/integrations/aws/initial_access_kali_user_agent_detected_with_aws_cli.toml +89 -0
- nldcsc_elastic_rules/rules/integrations/aws/initial_access_password_recovery.toml +137 -0
- nldcsc_elastic_rules/rules/integrations/aws/initial_access_signin_console_login_federated_user.toml +131 -0
- nldcsc_elastic_rules/rules/integrations/aws/lateral_movement_aws_ssm_start_session_to_ec2_instance.toml +123 -0
- nldcsc_elastic_rules/rules/integrations/aws/lateral_movement_ec2_instance_connect_ssh_public_key_uploaded.toml +141 -0
- nldcsc_elastic_rules/rules/integrations/aws/lateral_movement_ec2_instance_console_login.toml +206 -0
- nldcsc_elastic_rules/rules/integrations/aws/lateral_movement_sns_topic_message_publish_by_rare_user.toml +190 -0
- nldcsc_elastic_rules/rules/integrations/aws/ml_cloudtrail_error_message_spike.toml +114 -0
- nldcsc_elastic_rules/rules/integrations/aws/ml_cloudtrail_rare_error_code.toml +116 -0
- nldcsc_elastic_rules/rules/integrations/aws/ml_cloudtrail_rare_method_by_city.toml +118 -0
- nldcsc_elastic_rules/rules/integrations/aws/ml_cloudtrail_rare_method_by_country.toml +118 -0
- nldcsc_elastic_rules/rules/integrations/aws/ml_cloudtrail_rare_method_by_user.toml +116 -0
- nldcsc_elastic_rules/rules/integrations/aws/persistence_aws_attempt_to_register_virtual_mfa_device.toml +171 -0
- nldcsc_elastic_rules/rules/integrations/aws/persistence_ec2_network_acl_creation.toml +133 -0
- nldcsc_elastic_rules/rules/integrations/aws/persistence_ec2_route_table_modified_or_deleted.toml +151 -0
- nldcsc_elastic_rules/rules/integrations/aws/persistence_ec2_security_group_configuration_change_detection.toml +144 -0
- nldcsc_elastic_rules/rules/integrations/aws/persistence_iam_api_calls_via_user_session_token.toml +173 -0
- nldcsc_elastic_rules/rules/integrations/aws/persistence_iam_create_login_profile_for_root.toml +167 -0
- nldcsc_elastic_rules/rules/integrations/aws/persistence_iam_create_user_via_assumed_role_on_ec2_instance.toml +142 -0
- nldcsc_elastic_rules/rules/integrations/aws/persistence_iam_group_creation.toml +136 -0
- nldcsc_elastic_rules/rules/integrations/aws/persistence_iam_roles_anywhere_profile_created.toml +176 -0
- nldcsc_elastic_rules/rules/integrations/aws/persistence_iam_roles_anywhere_trusted_anchor_created_with_external_ca.toml +169 -0
- nldcsc_elastic_rules/rules/integrations/aws/persistence_iam_user_created_access_keys_for_another_user.toml +215 -0
- nldcsc_elastic_rules/rules/integrations/aws/persistence_lambda_backdoor_invoke_function_for_any_principal.toml +100 -0
- nldcsc_elastic_rules/rules/integrations/aws/persistence_rds_cluster_creation.toml +110 -0
- nldcsc_elastic_rules/rules/integrations/aws/persistence_rds_db_instance_password_modified.toml +116 -0
- nldcsc_elastic_rules/rules/integrations/aws/persistence_rds_group_creation.toml +103 -0
- nldcsc_elastic_rules/rules/integrations/aws/persistence_rds_instance_creation.toml +90 -0
- nldcsc_elastic_rules/rules/integrations/aws/persistence_rds_instance_made_public.toml +110 -0
- nldcsc_elastic_rules/rules/integrations/aws/persistence_redshift_instance_creation.toml +93 -0
- nldcsc_elastic_rules/rules/integrations/aws/persistence_route_53_domain_transfer_lock_disabled.toml +107 -0
- nldcsc_elastic_rules/rules/integrations/aws/persistence_route_53_domain_transferred_to_another_account.toml +102 -0
- nldcsc_elastic_rules/rules/integrations/aws/persistence_route_53_hosted_zone_associated_with_a_vpc.toml +94 -0
- nldcsc_elastic_rules/rules/integrations/aws/persistence_route_table_created.toml +123 -0
- nldcsc_elastic_rules/rules/integrations/aws/persistence_sts_assume_role_with_new_mfa.toml +162 -0
- nldcsc_elastic_rules/rules/integrations/aws/privilege_escalation_iam_administratoraccess_policy_attached_to_group.toml +176 -0
- nldcsc_elastic_rules/rules/integrations/aws/privilege_escalation_iam_administratoraccess_policy_attached_to_role.toml +173 -0
- nldcsc_elastic_rules/rules/integrations/aws/privilege_escalation_iam_administratoraccess_policy_attached_to_user.toml +180 -0
- nldcsc_elastic_rules/rules/integrations/aws/privilege_escalation_iam_customer_managed_policy_attached_to_role.toml +140 -0
- nldcsc_elastic_rules/rules/integrations/aws/privilege_escalation_iam_saml_provider_updated.toml +163 -0
- nldcsc_elastic_rules/rules/integrations/aws/privilege_escalation_iam_update_assume_role_policy.toml +139 -0
- nldcsc_elastic_rules/rules/integrations/aws/privilege_escalation_role_assumption_by_service.toml +158 -0
- nldcsc_elastic_rules/rules/integrations/aws/privilege_escalation_role_assumption_by_user.toml +146 -0
- nldcsc_elastic_rules/rules/integrations/aws/privilege_escalation_sts_assume_root_from_rare_user_and_member_account.toml +170 -0
- nldcsc_elastic_rules/rules/integrations/aws/privilege_escalation_sts_role_chaining.toml +176 -0
- nldcsc_elastic_rules/rules/integrations/aws/resource_development_sns_topic_created_by_rare_user.toml +169 -0
- nldcsc_elastic_rules/rules/integrations/aws_bedrock/aws_bedrock_execution_without_guardrails.toml +109 -0
- nldcsc_elastic_rules/rules/integrations/aws_bedrock/aws_bedrock_guardrails_multiple_violations_by_single_user.toml +109 -0
- nldcsc_elastic_rules/rules/integrations/aws_bedrock/aws_bedrock_guardrails_multiple_violations_in_single_request.toml +118 -0
- nldcsc_elastic_rules/rules/integrations/aws_bedrock/aws_bedrock_high_confidence_misconduct_blocks_detected.toml +122 -0
- nldcsc_elastic_rules/rules/integrations/aws_bedrock/aws_bedrock_high_resource_consumption_detection.toml +117 -0
- nldcsc_elastic_rules/rules/integrations/aws_bedrock/aws_bedrock_multiple_attempts_to_use_denied_models_by_user.toml +111 -0
- nldcsc_elastic_rules/rules/integrations/aws_bedrock/aws_bedrock_multiple_sensitive_information_policy_blocks_detected.toml +108 -0
- nldcsc_elastic_rules/rules/integrations/aws_bedrock/aws_bedrock_multiple_topic_policy_blocks_detected.toml +108 -0
- nldcsc_elastic_rules/rules/integrations/aws_bedrock/aws_bedrock_multiple_validation_exception_errors_by_single_user.toml +117 -0
- nldcsc_elastic_rules/rules/integrations/aws_bedrock/aws_bedrock_multiple_word_policy_blocks_detected.toml +108 -0
- nldcsc_elastic_rules/rules/integrations/azure/collection_azure_storage_account_blob_public_access_enabled.toml +106 -0
- nldcsc_elastic_rules/rules/integrations/azure/collection_entra_auth_broker_sharepoint_access_for_user_principal.toml +131 -0
- nldcsc_elastic_rules/rules/integrations/azure/collection_graph_email_access_by_unusual_public_client_via_graph.toml +122 -0
- nldcsc_elastic_rules/rules/integrations/azure/credential_access_azure_entra_suspicious_signin.toml +164 -0
- nldcsc_elastic_rules/rules/integrations/azure/credential_access_azure_entra_totp_brute_force_attempts.toml +179 -0
- nldcsc_elastic_rules/rules/integrations/azure/credential_access_azure_full_network_packet_capture_detected.toml +96 -0
- nldcsc_elastic_rules/rules/integrations/azure/credential_access_azure_key_vault_excessive_retrieval.toml +193 -0
- nldcsc_elastic_rules/rules/integrations/azure/credential_access_azure_key_vault_retrieval_from_rare_identity.toml +142 -0
- nldcsc_elastic_rules/rules/integrations/azure/credential_access_azure_storage_account_keys_accessed.toml +129 -0
- nldcsc_elastic_rules/rules/integrations/azure/credential_access_entra_id_brute_force_activity.toml +255 -0
- nldcsc_elastic_rules/rules/integrations/azure/credential_access_entra_id_excessive_account_lockouts.toml +137 -0
- nldcsc_elastic_rules/rules/integrations/azure/credential_access_entra_signin_brute_force_microsoft_365.toml +265 -0
- nldcsc_elastic_rules/rules/integrations/azure/credential_access_storage_account_key_regenerated.toml +117 -0
- nldcsc_elastic_rules/rules/integrations/azure/defense_evasion_azure_automation_runbook_deleted.toml +83 -0
- nldcsc_elastic_rules/rules/integrations/azure/defense_evasion_azure_blob_permissions_modified.toml +97 -0
- nldcsc_elastic_rules/rules/integrations/azure/defense_evasion_azure_diagnostic_settings_deletion.toml +128 -0
- nldcsc_elastic_rules/rules/integrations/azure/defense_evasion_event_hub_deletion.toml +98 -0
- nldcsc_elastic_rules/rules/integrations/azure/defense_evasion_firewall_policy_deletion.toml +100 -0
- nldcsc_elastic_rules/rules/integrations/azure/defense_evasion_frontdoor_firewall_policy_deletion.toml +103 -0
- nldcsc_elastic_rules/rules/integrations/azure/defense_evasion_kubernetes_events_deleted.toml +98 -0
- nldcsc_elastic_rules/rules/integrations/azure/defense_evasion_network_watcher_deletion.toml +99 -0
- nldcsc_elastic_rules/rules/integrations/azure/defense_evasion_suppression_rule_created.toml +94 -0
- nldcsc_elastic_rules/rules/integrations/azure/discovery_blob_container_access_mod.toml +112 -0
- nldcsc_elastic_rules/rules/integrations/azure/discovery_bloodhound_user_agents_detected.toml +171 -0
- nldcsc_elastic_rules/rules/integrations/azure/discovery_teamfiltration_user_agents_detected.toml +173 -0
- nldcsc_elastic_rules/rules/integrations/azure/execution_azure_automation_runbook_created_or_modified.toml +92 -0
- nldcsc_elastic_rules/rules/integrations/azure/execution_command_virtual_machine.toml +96 -0
- nldcsc_elastic_rules/rules/integrations/azure/exfiltration_azure_storage_blob_download_azcopy_sas_token.toml +121 -0
- nldcsc_elastic_rules/rules/integrations/azure/impact_azure_compute_restore_point_collection_deleted.toml +111 -0
- nldcsc_elastic_rules/rules/integrations/azure/impact_azure_compute_restore_point_collections_deleted.toml +132 -0
- nldcsc_elastic_rules/rules/integrations/azure/impact_azure_compute_vm_snapshot_deletion.toml +132 -0
- nldcsc_elastic_rules/rules/integrations/azure/impact_azure_compute_vm_snapshot_deletions.toml +136 -0
- nldcsc_elastic_rules/rules/integrations/azure/impact_azure_key_vault_modified.toml +95 -0
- nldcsc_elastic_rules/rules/integrations/azure/impact_azure_storage_account_deletion.toml +110 -0
- nldcsc_elastic_rules/rules/integrations/azure/impact_azure_storage_account_deletion_multiple.toml +115 -0
- nldcsc_elastic_rules/rules/integrations/azure/impact_kubernetes_pod_deleted.toml +96 -0
- nldcsc_elastic_rules/rules/integrations/azure/impact_resource_group_deletion.toml +110 -0
- nldcsc_elastic_rules/rules/integrations/azure/initial_access_azure_active_directory_high_risk_signin_atrisk_or_confirmed.toml +102 -0
- nldcsc_elastic_rules/rules/integrations/azure/initial_access_azure_active_directory_powershell_signin.toml +125 -0
- nldcsc_elastic_rules/rules/integrations/azure/initial_access_entra_graph_single_session_from_multiple_addresses.toml +224 -0
- nldcsc_elastic_rules/rules/integrations/azure/initial_access_entra_id_actor_token_user_impersonation_abuse.toml +134 -0
- nldcsc_elastic_rules/rules/integrations/azure/initial_access_entra_id_device_code_auth_with_broker_client.toml +124 -0
- nldcsc_elastic_rules/rules/integrations/azure/initial_access_entra_id_high_risk_signin.toml +100 -0
- nldcsc_elastic_rules/rules/integrations/azure/initial_access_entra_id_oauth_user_impersonation_scope.toml +167 -0
- nldcsc_elastic_rules/rules/integrations/azure/initial_access_entra_id_protection_confirmed_compromise.toml +146 -0
- nldcsc_elastic_rules/rules/integrations/azure/initial_access_entra_id_protection_sign_in_risk_detected.toml +190 -0
- nldcsc_elastic_rules/rules/integrations/azure/initial_access_entra_id_protection_user_risk_detected.toml +187 -0
- nldcsc_elastic_rules/rules/integrations/azure/initial_access_entra_id_suspicious_oauth_flow_via_auth_broker_to_drs.toml +232 -0
- nldcsc_elastic_rules/rules/integrations/azure/initial_access_entra_id_unusual_ropc_login_attempt.toml +106 -0
- nldcsc_elastic_rules/rules/integrations/azure/initial_access_entra_id_user_reported_risk.toml +97 -0
- nldcsc_elastic_rules/rules/integrations/azure/initial_access_entra_illicit_consent_grant_via_registered_application.toml +145 -0
- nldcsc_elastic_rules/rules/integrations/azure/initial_access_entra_oauth_phishing_via_vscode_client.toml +133 -0
- nldcsc_elastic_rules/rules/integrations/azure/initial_access_entra_protection_multi_azure_identity_protection_alerts.toml +98 -0
- nldcsc_elastic_rules/rules/integrations/azure/initial_access_entra_rare_app_id_for_principal_auth.toml +148 -0
- nldcsc_elastic_rules/rules/integrations/azure/initial_access_entra_rare_authentication_requirement_for_principal_user.toml +153 -0
- nldcsc_elastic_rules/rules/integrations/azure/initial_access_external_guest_user_invite.toml +103 -0
- nldcsc_elastic_rules/rules/integrations/azure/initial_access_first_time_seen_device_code_auth.toml +140 -0
- nldcsc_elastic_rules/rules/integrations/azure/initial_access_graph_first_occurrence_of_client_request.toml +143 -0
- nldcsc_elastic_rules/rules/integrations/azure/persistence_azure_application_credential_modification.toml +104 -0
- nldcsc_elastic_rules/rules/integrations/azure/persistence_azure_automation_account_created.toml +98 -0
- nldcsc_elastic_rules/rules/integrations/azure/persistence_azure_automation_webhook_created.toml +102 -0
- nldcsc_elastic_rules/rules/integrations/azure/persistence_azure_global_administrator_role_assigned.toml +101 -0
- nldcsc_elastic_rules/rules/integrations/azure/persistence_azure_pim_user_added_global_admin.toml +101 -0
- nldcsc_elastic_rules/rules/integrations/azure/persistence_azure_privileged_identity_management_role_modified.toml +114 -0
- nldcsc_elastic_rules/rules/integrations/azure/persistence_azure_service_principal_credentials_added.toml +111 -0
- nldcsc_elastic_rules/rules/integrations/azure/persistence_entra_conditional_access_policy_modified.toml +116 -0
- nldcsc_elastic_rules/rules/integrations/azure/persistence_entra_id_mfa_disabled_for_user.toml +104 -0
- nldcsc_elastic_rules/rules/integrations/azure/persistence_entra_id_oidc_discovery_url_change.toml +105 -0
- nldcsc_elastic_rules/rules/integrations/azure/persistence_entra_id_rt_to_prt_transition_from_user_device.toml +152 -0
- nldcsc_elastic_rules/rules/integrations/azure/persistence_entra_id_suspicious_adrs_token_request.toml +99 -0
- nldcsc_elastic_rules/rules/integrations/azure/persistence_entra_id_suspicious_cloud_device_registration.toml +116 -0
- nldcsc_elastic_rules/rules/integrations/azure/persistence_entra_id_user_signed_in_from_unusual_device.toml +138 -0
- nldcsc_elastic_rules/rules/integrations/azure/persistence_entra_service_principal_created.toml +120 -0
- nldcsc_elastic_rules/rules/integrations/azure/persistence_graph_eam_addition_or_modification.toml +101 -0
- nldcsc_elastic_rules/rules/integrations/azure/persistence_identity_protect_alert_followed_by_device_reg.toml +107 -0
- nldcsc_elastic_rules/rules/integrations/azure/persistence_update_event_hub_auth_rule.toml +107 -0
- nldcsc_elastic_rules/rules/integrations/azure/persistence_user_added_as_owner_for_azure_application.toml +93 -0
- nldcsc_elastic_rules/rules/integrations/azure/persistence_user_added_as_owner_for_azure_service_principal.toml +95 -0
- nldcsc_elastic_rules/rules/integrations/azure/privilege_escalation_azure_kubernetes_rolebinding_created.toml +111 -0
- nldcsc_elastic_rules/rules/integrations/azure/privilege_escalation_azure_rbac_administrator_roles_assigned.toml +110 -0
- nldcsc_elastic_rules/rules/integrations/azure/privilege_escalation_entra_id_elevate_to_user_administrator_access.toml +116 -0
- nldcsc_elastic_rules/rules/integrations/azure_openai/azure_openai_denial_of_ml_service_detection.toml +100 -0
- nldcsc_elastic_rules/rules/integrations/azure_openai/azure_openai_insecure_output_handling_detection.toml +94 -0
- nldcsc_elastic_rules/rules/integrations/azure_openai/azure_openai_model_theft_detection.toml +100 -0
- nldcsc_elastic_rules/rules/integrations/beaconing/command_and_control_beaconing.toml +113 -0
- nldcsc_elastic_rules/rules/integrations/beaconing/command_and_control_beaconing_high_confidence.toml +108 -0
- nldcsc_elastic_rules/rules/integrations/cyberarkpas/privilege_escalation_cyberarkpas_error_audit_event_promotion.toml +70 -0
- nldcsc_elastic_rules/rules/integrations/cyberarkpas/privilege_escalation_cyberarkpas_recommended_events_to_monitor_promotion.toml +73 -0
- nldcsc_elastic_rules/rules/integrations/ded/exfiltration_ml_high_bytes_destination_geo_country_iso_code.toml +103 -0
- nldcsc_elastic_rules/rules/integrations/ded/exfiltration_ml_high_bytes_destination_ip.toml +102 -0
- nldcsc_elastic_rules/rules/integrations/ded/exfiltration_ml_high_bytes_destination_port.toml +102 -0
- nldcsc_elastic_rules/rules/integrations/ded/exfiltration_ml_high_bytes_destination_region_name.toml +103 -0
- nldcsc_elastic_rules/rules/integrations/ded/exfiltration_ml_high_bytes_written_to_external_device.toml +102 -0
- nldcsc_elastic_rules/rules/integrations/ded/exfiltration_ml_high_bytes_written_to_external_device_airdrop.toml +103 -0
- nldcsc_elastic_rules/rules/integrations/ded/exfiltration_ml_rare_process_writing_to_external_device.toml +102 -0
- nldcsc_elastic_rules/rules/integrations/dga/command_and_control_ml_dga_activity_using_sunburst_domain.toml +117 -0
- nldcsc_elastic_rules/rules/integrations/dga/command_and_control_ml_dga_high_sum_probability.toml +109 -0
- nldcsc_elastic_rules/rules/integrations/dga/command_and_control_ml_dns_request_high_dga_probability.toml +116 -0
- nldcsc_elastic_rules/rules/integrations/dga/command_and_control_ml_dns_request_predicted_to_be_a_dga_domain.toml +117 -0
- nldcsc_elastic_rules/rules/integrations/endpoint/defense_evasion_elastic_memory_threat_detected.toml +168 -0
- nldcsc_elastic_rules/rules/integrations/endpoint/defense_evasion_elastic_memory_threat_prevented.toml +167 -0
- nldcsc_elastic_rules/rules/integrations/endpoint/elastic_endpoint_security.toml +126 -0
- nldcsc_elastic_rules/rules/integrations/endpoint/elastic_endpoint_security_behavior_detected.toml +134 -0
- nldcsc_elastic_rules/rules/integrations/endpoint/elastic_endpoint_security_behavior_prevented.toml +135 -0
- nldcsc_elastic_rules/rules/integrations/endpoint/execution_elastic_malicious_file_detected.toml +159 -0
- nldcsc_elastic_rules/rules/integrations/endpoint/execution_elastic_malicious_file_prevented.toml +159 -0
- nldcsc_elastic_rules/rules/integrations/endpoint/impact_elastic_ransomware_detected.toml +145 -0
- nldcsc_elastic_rules/rules/integrations/endpoint/impact_elastic_ransomware_prevented.toml +146 -0
- nldcsc_elastic_rules/rules/integrations/fim/persistence_suspicious_file_modifications.toml +316 -0
- nldcsc_elastic_rules/rules/integrations/gcp/collection_gcp_pub_sub_subscription_creation.toml +94 -0
- nldcsc_elastic_rules/rules/integrations/gcp/collection_gcp_pub_sub_topic_creation.toml +97 -0
- nldcsc_elastic_rules/rules/integrations/gcp/defense_evasion_gcp_firewall_rule_created.toml +100 -0
- nldcsc_elastic_rules/rules/integrations/gcp/defense_evasion_gcp_firewall_rule_deleted.toml +97 -0
- nldcsc_elastic_rules/rules/integrations/gcp/defense_evasion_gcp_firewall_rule_modified.toml +100 -0
- nldcsc_elastic_rules/rules/integrations/gcp/defense_evasion_gcp_logging_bucket_deletion.toml +97 -0
- nldcsc_elastic_rules/rules/integrations/gcp/defense_evasion_gcp_logging_sink_deletion.toml +94 -0
- nldcsc_elastic_rules/rules/integrations/gcp/defense_evasion_gcp_pub_sub_subscription_deletion.toml +95 -0
- nldcsc_elastic_rules/rules/integrations/gcp/defense_evasion_gcp_pub_sub_topic_deletion.toml +96 -0
- nldcsc_elastic_rules/rules/integrations/gcp/defense_evasion_gcp_storage_bucket_configuration_modified.toml +95 -0
- nldcsc_elastic_rules/rules/integrations/gcp/defense_evasion_gcp_storage_bucket_permissions_modified.toml +95 -0
- nldcsc_elastic_rules/rules/integrations/gcp/defense_evasion_gcp_virtual_private_cloud_network_deleted.toml +100 -0
- nldcsc_elastic_rules/rules/integrations/gcp/defense_evasion_gcp_virtual_private_cloud_route_created.toml +101 -0
- nldcsc_elastic_rules/rules/integrations/gcp/defense_evasion_gcp_virtual_private_cloud_route_deleted.toml +101 -0
- nldcsc_elastic_rules/rules/integrations/gcp/exfiltration_gcp_logging_sink_modification.toml +97 -0
- nldcsc_elastic_rules/rules/integrations/gcp/impact_gcp_iam_role_deletion.toml +96 -0
- nldcsc_elastic_rules/rules/integrations/gcp/impact_gcp_service_account_deleted.toml +96 -0
- nldcsc_elastic_rules/rules/integrations/gcp/impact_gcp_service_account_disabled.toml +96 -0
- nldcsc_elastic_rules/rules/integrations/gcp/impact_gcp_storage_bucket_deleted.toml +87 -0
- nldcsc_elastic_rules/rules/integrations/gcp/initial_access_gcp_iam_custom_role_creation.toml +107 -0
- nldcsc_elastic_rules/rules/integrations/gcp/persistence_gcp_iam_service_account_key_deletion.toml +99 -0
- nldcsc_elastic_rules/rules/integrations/gcp/persistence_gcp_key_created_for_service_account.toml +100 -0
- nldcsc_elastic_rules/rules/integrations/gcp/persistence_gcp_service_account_created.toml +96 -0
- nldcsc_elastic_rules/rules/integrations/github/defense_evasion_github_protected_branch_settings_changed.toml +90 -0
- nldcsc_elastic_rules/rules/integrations/github/execution_github_app_deleted.toml +80 -0
- nldcsc_elastic_rules/rules/integrations/github/execution_github_high_number_of_cloned_repos_from_pat.toml +93 -0
- nldcsc_elastic_rules/rules/integrations/github/execution_github_ueba_multiple_behavior_alerts_from_account.toml +88 -0
- nldcsc_elastic_rules/rules/integrations/github/execution_new_github_app_installed.toml +85 -0
- nldcsc_elastic_rules/rules/integrations/github/impact_github_repository_deleted.toml +84 -0
- nldcsc_elastic_rules/rules/integrations/github/persistence_github_org_owner_added.toml +90 -0
- nldcsc_elastic_rules/rules/integrations/github/persistence_organization_owner_role_granted.toml +88 -0
- nldcsc_elastic_rules/rules/integrations/google_workspace/collection_google_drive_ownership_transferred_via_google_workspace.toml +119 -0
- nldcsc_elastic_rules/rules/integrations/google_workspace/collection_google_workspace_custom_gmail_route_created_or_modified.toml +119 -0
- nldcsc_elastic_rules/rules/integrations/google_workspace/credential_access_google_workspace_drive_encryption_key_accessed_by_anonymous_user.toml +120 -0
- nldcsc_elastic_rules/rules/integrations/google_workspace/defense_evasion_application_removed_from_blocklist_in_google_workspace.toml +125 -0
- nldcsc_elastic_rules/rules/integrations/google_workspace/defense_evasion_domain_added_to_google_workspace_trusted_domains.toml +117 -0
- nldcsc_elastic_rules/rules/integrations/google_workspace/defense_evasion_google_workspace_bitlocker_setting_disabled.toml +118 -0
- nldcsc_elastic_rules/rules/integrations/google_workspace/defense_evasion_google_workspace_new_oauth_login_from_third_party_application.toml +133 -0
- nldcsc_elastic_rules/rules/integrations/google_workspace/defense_evasion_restrictions_for_marketplace_modified_to_allow_any_app.toml +126 -0
- nldcsc_elastic_rules/rules/integrations/google_workspace/google_workspace_alert_center_promotion.toml +76 -0
- nldcsc_elastic_rules/rules/integrations/google_workspace/impact_google_workspace_admin_role_deletion.toml +112 -0
- nldcsc_elastic_rules/rules/integrations/google_workspace/impact_google_workspace_mfa_enforcement_disabled.toml +116 -0
- nldcsc_elastic_rules/rules/integrations/google_workspace/initial_access_external_user_added_to_google_workspace_group.toml +122 -0
- nldcsc_elastic_rules/rules/integrations/google_workspace/initial_access_google_workspace_suspended_user_renewed.toml +112 -0
- nldcsc_elastic_rules/rules/integrations/google_workspace/initial_access_object_copied_to_external_drive_with_app_consent.toml +134 -0
- nldcsc_elastic_rules/rules/integrations/google_workspace/persistence_application_added_to_google_workspace_domain.toml +111 -0
- nldcsc_elastic_rules/rules/integrations/google_workspace/persistence_google_workspace_2sv_policy_disabled.toml +116 -0
- nldcsc_elastic_rules/rules/integrations/google_workspace/persistence_google_workspace_admin_role_assigned_to_user.toml +125 -0
- nldcsc_elastic_rules/rules/integrations/google_workspace/persistence_google_workspace_api_access_granted_via_dwd.toml +117 -0
- nldcsc_elastic_rules/rules/integrations/google_workspace/persistence_google_workspace_custom_admin_role_created.toml +117 -0
- nldcsc_elastic_rules/rules/integrations/google_workspace/persistence_google_workspace_password_policy_modified.toml +124 -0
- nldcsc_elastic_rules/rules/integrations/google_workspace/persistence_google_workspace_role_modified.toml +119 -0
- nldcsc_elastic_rules/rules/integrations/google_workspace/persistence_google_workspace_user_organizational_unit_changed.toml +124 -0
- nldcsc_elastic_rules/rules/integrations/google_workspace/persistence_mfa_disabled_for_google_workspace_organization.toml +113 -0
- nldcsc_elastic_rules/rules/integrations/kubernetes/defense_evasion_events_deleted.toml +85 -0
- nldcsc_elastic_rules/rules/integrations/kubernetes/discovery_denied_service_account_request.toml +95 -0
- nldcsc_elastic_rules/rules/integrations/kubernetes/discovery_suspicious_self_subject_review.toml +98 -0
- nldcsc_elastic_rules/rules/integrations/kubernetes/execution_forbidden_creation_request.toml +80 -0
- nldcsc_elastic_rules/rules/integrations/kubernetes/execution_forbidden_request_from_unsual_user_agent.toml +77 -0
- nldcsc_elastic_rules/rules/integrations/kubernetes/execution_unusual_request_response_by_user_agent.toml +87 -0
- nldcsc_elastic_rules/rules/integrations/kubernetes/execution_user_exec_to_pod.toml +94 -0
- nldcsc_elastic_rules/rules/integrations/kubernetes/initial_access_anonymous_request_authorized.toml +98 -0
- nldcsc_elastic_rules/rules/integrations/kubernetes/persistence_exposed_service_created_with_type_nodeport.toml +104 -0
- nldcsc_elastic_rules/rules/integrations/kubernetes/privilege_escalation_container_created_with_excessive_linux_capabilities.toml +97 -0
- nldcsc_elastic_rules/rules/integrations/kubernetes/privilege_escalation_pod_created_with_hostipc.toml +114 -0
- nldcsc_elastic_rules/rules/integrations/kubernetes/privilege_escalation_pod_created_with_hostnetwork.toml +111 -0
- nldcsc_elastic_rules/rules/integrations/kubernetes/privilege_escalation_pod_created_with_hostpid.toml +114 -0
- nldcsc_elastic_rules/rules/integrations/kubernetes/privilege_escalation_pod_created_with_sensitive_hostpath_volume.toml +129 -0
- nldcsc_elastic_rules/rules/integrations/kubernetes/privilege_escalation_privileged_pod_created.toml +111 -0
- nldcsc_elastic_rules/rules/integrations/kubernetes/privilege_escalation_suspicious_assignment_of_controller_service_account.toml +103 -0
- nldcsc_elastic_rules/rules/integrations/lmd/lateral_movement_ml_high_mean_rdp_process_args.toml +102 -0
- nldcsc_elastic_rules/rules/integrations/lmd/lateral_movement_ml_high_mean_rdp_session_duration.toml +103 -0
- nldcsc_elastic_rules/rules/integrations/lmd/lateral_movement_ml_high_remote_file_size.toml +103 -0
- nldcsc_elastic_rules/rules/integrations/lmd/lateral_movement_ml_high_variance_rdp_session_duration.toml +103 -0
- nldcsc_elastic_rules/rules/integrations/lmd/lateral_movement_ml_rare_remote_file_directory.toml +103 -0
- nldcsc_elastic_rules/rules/integrations/lmd/lateral_movement_ml_rare_remote_file_extension.toml +102 -0
- nldcsc_elastic_rules/rules/integrations/lmd/lateral_movement_ml_spike_in_connections_from_a_source_ip.toml +103 -0
- nldcsc_elastic_rules/rules/integrations/lmd/lateral_movement_ml_spike_in_connections_to_a_destination_ip.toml +102 -0
- nldcsc_elastic_rules/rules/integrations/lmd/lateral_movement_ml_spike_in_rdp_processes.toml +101 -0
- nldcsc_elastic_rules/rules/integrations/lmd/lateral_movement_ml_spike_in_remote_file_transfers.toml +104 -0
- nldcsc_elastic_rules/rules/integrations/lmd/lateral_movement_ml_unusual_time_for_an_rdp_session.toml +103 -0
- nldcsc_elastic_rules/rules/integrations/o365/collection_microsoft_365_excessive_mail_items_accessed.toml +146 -0
- nldcsc_elastic_rules/rules/integrations/o365/collection_microsoft_365_mailbox_access_by_unusual_client_app_id.toml +195 -0
- nldcsc_elastic_rules/rules/integrations/o365/collection_microsoft_365_new_inbox_rule.toml +107 -0
- nldcsc_elastic_rules/rules/integrations/o365/collection_onedrive_excessive_file_downloads.toml +130 -0
- nldcsc_elastic_rules/rules/integrations/o365/credential_access_antra_id_device_reg_via_oauth_redirection.toml +122 -0
- nldcsc_elastic_rules/rules/integrations/o365/credential_access_microsoft_365_excessive_account_lockouts.toml +155 -0
- nldcsc_elastic_rules/rules/integrations/o365/credential_access_microsoft_365_potential_user_account_brute_force.toml +181 -0
- nldcsc_elastic_rules/rules/integrations/o365/credential_access_user_excessive_sso_logon_errors.toml +97 -0
- nldcsc_elastic_rules/rules/integrations/o365/defense_evasion_microsoft_365_exchange_anti_phish_policy_deletion.toml +102 -0
- nldcsc_elastic_rules/rules/integrations/o365/defense_evasion_microsoft_365_exchange_anti_phish_rule_mod.toml +102 -0
- nldcsc_elastic_rules/rules/integrations/o365/defense_evasion_microsoft_365_exchange_dkim_signing_config_disabled.toml +95 -0
- nldcsc_elastic_rules/rules/integrations/o365/defense_evasion_microsoft_365_exchange_dlp_policy_removed.toml +96 -0
- nldcsc_elastic_rules/rules/integrations/o365/defense_evasion_microsoft_365_exchange_malware_filter_policy_deletion.toml +97 -0
- nldcsc_elastic_rules/rules/integrations/o365/defense_evasion_microsoft_365_exchange_malware_filter_rule_mod.toml +96 -0
- nldcsc_elastic_rules/rules/integrations/o365/defense_evasion_microsoft_365_exchange_safe_attach_rule_disabled.toml +96 -0
- nldcsc_elastic_rules/rules/integrations/o365/defense_evasion_microsoft_365_exchange_safelinks_disabled.toml +100 -0
- nldcsc_elastic_rules/rules/integrations/o365/defense_evasion_microsoft_365_mailboxauditbypassassociation.toml +97 -0
- nldcsc_elastic_rules/rules/integrations/o365/defense_evasion_microsoft_365_new_inbox_rule_delete_or_move.toml +140 -0
- nldcsc_elastic_rules/rules/integrations/o365/defense_evasion_microsoft_365_susp_oauth2_authorization.toml +165 -0
- nldcsc_elastic_rules/rules/integrations/o365/defense_evasion_microsoft_365_teams_custom_app_interaction_allowed.toml +93 -0
- nldcsc_elastic_rules/rules/integrations/o365/defense_evasion_microsoft_365_teams_external_access_enabled.toml +91 -0
- nldcsc_elastic_rules/rules/integrations/o365/exfiltration_microsoft_365_exchange_transport_rule_creation.toml +91 -0
- nldcsc_elastic_rules/rules/integrations/o365/exfiltration_microsoft_365_exchange_transport_rule_mod.toml +92 -0
- nldcsc_elastic_rules/rules/integrations/o365/impact_microsoft_365_potential_ransomware_activity.toml +93 -0
- nldcsc_elastic_rules/rules/integrations/o365/impact_microsoft_365_unusual_volume_of_file_deletion.toml +84 -0
- nldcsc_elastic_rules/rules/integrations/o365/initial_access_defender_for_m365_threat_intelligence_signal.toml +105 -0
- nldcsc_elastic_rules/rules/integrations/o365/initial_access_entra_id_portal_login_atypical_travel.toml +132 -0
- nldcsc_elastic_rules/rules/integrations/o365/initial_access_entra_id_portal_login_impossible_travel.toml +131 -0
- nldcsc_elastic_rules/rules/integrations/o365/initial_access_microsoft_365_entra_oauth_phishing_via_vscode_client.toml +120 -0
- nldcsc_elastic_rules/rules/integrations/o365/initial_access_microsoft_365_illicit_consent_grant_via_registered_application.toml +154 -0
- nldcsc_elastic_rules/rules/integrations/o365/initial_access_microsoft_365_user_restricted_from_sending_email.toml +87 -0
- nldcsc_elastic_rules/rules/integrations/o365/initial_access_o365_user_reported_phish_malware.toml +97 -0
- nldcsc_elastic_rules/rules/integrations/o365/lateral_movement_malware_uploaded_onedrive.toml +104 -0
- nldcsc_elastic_rules/rules/integrations/o365/lateral_movement_malware_uploaded_sharepoint.toml +103 -0
- nldcsc_elastic_rules/rules/integrations/o365/persistence_exchange_suspicious_mailbox_permission_delegation.toml +140 -0
- nldcsc_elastic_rules/rules/integrations/o365/persistence_microsoft_365_exchange_management_role_assignment.toml +101 -0
- nldcsc_elastic_rules/rules/integrations/o365/persistence_microsoft_365_global_administrator_role_assign.toml +105 -0
- nldcsc_elastic_rules/rules/integrations/o365/persistence_microsoft_365_teams_guest_access_enabled.toml +91 -0
- nldcsc_elastic_rules/rules/integrations/o365/privilege_escalation_new_or_modified_federation_domain.toml +101 -0
- nldcsc_elastic_rules/rules/integrations/okta/credential_access_attempted_bypass_of_okta_mfa.toml +94 -0
- nldcsc_elastic_rules/rules/integrations/okta/credential_access_attempts_to_brute_force_okta_user_account.toml +96 -0
- nldcsc_elastic_rules/rules/integrations/okta/credential_access_multiple_auth_events_from_single_device_behind_proxy.toml +128 -0
- nldcsc_elastic_rules/rules/integrations/okta/credential_access_multiple_device_token_hashes_for_single_okta_session.toml +120 -0
- nldcsc_elastic_rules/rules/integrations/okta/credential_access_multiple_user_agent_os_authentication.toml +110 -0
- nldcsc_elastic_rules/rules/integrations/okta/credential_access_okta_authentication_for_multiple_users_from_single_source.toml +143 -0
- nldcsc_elastic_rules/rules/integrations/okta/credential_access_okta_authentication_for_multiple_users_with_the_same_device_token_hash.toml +141 -0
- nldcsc_elastic_rules/rules/integrations/okta/credential_access_okta_brute_force_or_password_spraying.toml +96 -0
- nldcsc_elastic_rules/rules/integrations/okta/credential_access_okta_mfa_bombing_via_push_notifications.toml +113 -0
- nldcsc_elastic_rules/rules/integrations/okta/credential_access_okta_multiple_device_token_hashes_for_single_user.toml +146 -0
- nldcsc_elastic_rules/rules/integrations/okta/credential_access_okta_potentially_successful_okta_bombing_via_push_notifications.toml +115 -0
- nldcsc_elastic_rules/rules/integrations/okta/credential_access_user_impersonation_access.toml +82 -0
- nldcsc_elastic_rules/rules/integrations/okta/defense_evasion_attempt_to_deactivate_okta_network_zone.toml +99 -0
- nldcsc_elastic_rules/rules/integrations/okta/defense_evasion_attempt_to_delete_okta_network_zone.toml +99 -0
- nldcsc_elastic_rules/rules/integrations/okta/defense_evasion_first_occurence_public_app_client_credential_token_exchange.toml +114 -0
- nldcsc_elastic_rules/rules/integrations/okta/defense_evasion_okta_attempt_to_deactivate_okta_policy.toml +106 -0
- nldcsc_elastic_rules/rules/integrations/okta/defense_evasion_okta_attempt_to_deactivate_okta_policy_rule.toml +105 -0
- nldcsc_elastic_rules/rules/integrations/okta/defense_evasion_okta_attempt_to_delete_okta_policy.toml +106 -0
- nldcsc_elastic_rules/rules/integrations/okta/defense_evasion_okta_attempt_to_delete_okta_policy_rule.toml +105 -0
- nldcsc_elastic_rules/rules/integrations/okta/defense_evasion_okta_attempt_to_modify_okta_network_zone.toml +105 -0
- nldcsc_elastic_rules/rules/integrations/okta/defense_evasion_okta_attempt_to_modify_okta_policy.toml +94 -0
- nldcsc_elastic_rules/rules/integrations/okta/defense_evasion_okta_attempt_to_modify_okta_policy_rule.toml +103 -0
- nldcsc_elastic_rules/rules/integrations/okta/defense_evasion_suspicious_okta_user_password_reset_or_unlock_attempts.toml +123 -0
- nldcsc_elastic_rules/rules/integrations/okta/impact_attempt_to_revoke_okta_api_token.toml +87 -0
- nldcsc_elastic_rules/rules/integrations/okta/impact_okta_attempt_to_deactivate_okta_application.toml +91 -0
- nldcsc_elastic_rules/rules/integrations/okta/impact_okta_attempt_to_delete_okta_application.toml +97 -0
- nldcsc_elastic_rules/rules/integrations/okta/impact_okta_attempt_to_modify_okta_application.toml +93 -0
- nldcsc_elastic_rules/rules/integrations/okta/impact_possible_okta_dos_attack.toml +96 -0
- nldcsc_elastic_rules/rules/integrations/okta/initial_access_first_occurrence_user_session_started_via_proxy.toml +89 -0
- nldcsc_elastic_rules/rules/integrations/okta/initial_access_new_authentication_behavior_detection.toml +80 -0
- nldcsc_elastic_rules/rules/integrations/okta/initial_access_okta_fastpass_phishing.toml +95 -0
- nldcsc_elastic_rules/rules/integrations/okta/initial_access_okta_user_attempted_unauthorized_access.toml +110 -0
- nldcsc_elastic_rules/rules/integrations/okta/initial_access_okta_user_sessions_started_from_different_geolocations.toml +121 -0
- nldcsc_elastic_rules/rules/integrations/okta/initial_access_sign_in_events_via_third_party_idp.toml +104 -0
- nldcsc_elastic_rules/rules/integrations/okta/initial_access_successful_application_sso_from_unknown_client_device.toml +99 -0
- nldcsc_elastic_rules/rules/integrations/okta/initial_access_suspicious_activity_reported_by_okta_user.toml +129 -0
- nldcsc_elastic_rules/rules/integrations/okta/lateral_movement_multiple_sessions_for_single_user.toml +113 -0
- nldcsc_elastic_rules/rules/integrations/okta/okta_threatinsight_threat_suspected_promotion.toml +67 -0
- nldcsc_elastic_rules/rules/integrations/okta/persistence_administrator_privileges_assigned_to_okta_group.toml +99 -0
- nldcsc_elastic_rules/rules/integrations/okta/persistence_administrator_role_assigned_to_okta_user.toml +100 -0
- nldcsc_elastic_rules/rules/integrations/okta/persistence_attempt_to_create_okta_api_token.toml +98 -0
- nldcsc_elastic_rules/rules/integrations/okta/persistence_attempt_to_reset_mfa_factors_for_okta_user_account.toml +99 -0
- nldcsc_elastic_rules/rules/integrations/okta/persistence_mfa_deactivation_with_no_reactivation.toml +103 -0
- nldcsc_elastic_rules/rules/integrations/okta/persistence_new_idp_successfully_added_by_admin.toml +94 -0
- nldcsc_elastic_rules/rules/integrations/okta/persistence_okta_attempt_to_modify_or_delete_application_sign_on_policy.toml +99 -0
- nldcsc_elastic_rules/rules/integrations/okta/persistence_stolen_credentials_used_to_login_to_okta_account_after_mfa_reset.toml +105 -0
- nldcsc_elastic_rules/rules/integrations/pad/privileged_access_ml_linux_high_count_privileged_process_events_by_user.toml +102 -0
- nldcsc_elastic_rules/rules/integrations/pad/privileged_access_ml_linux_high_median_process_command_line_entropy_by_user.toml +103 -0
- nldcsc_elastic_rules/rules/integrations/pad/privileged_access_ml_linux_rare_process_executed_by_user.toml +101 -0
- nldcsc_elastic_rules/rules/integrations/pad/privileged_access_ml_okta_high_sum_concurrent_sessions_by_user.toml +107 -0
- nldcsc_elastic_rules/rules/integrations/pad/privileged_access_ml_okta_rare_host_name_by_user.toml +102 -0
- nldcsc_elastic_rules/rules/integrations/pad/privileged_access_ml_okta_rare_region_name_by_user.toml +102 -0
- nldcsc_elastic_rules/rules/integrations/pad/privileged_access_ml_okta_rare_source_ip_by_user.toml +101 -0
- nldcsc_elastic_rules/rules/integrations/pad/privileged_access_ml_okta_spike_in_group_application_assignment_changes.toml +111 -0
- nldcsc_elastic_rules/rules/integrations/pad/privileged_access_ml_okta_spike_in_group_lifecycle_changes.toml +106 -0
- nldcsc_elastic_rules/rules/integrations/pad/privileged_access_ml_okta_spike_in_group_membership_changes.toml +106 -0
- nldcsc_elastic_rules/rules/integrations/pad/privileged_access_ml_okta_spike_in_group_privilege_changes.toml +111 -0
- nldcsc_elastic_rules/rules/integrations/pad/privileged_access_ml_okta_spike_in_user_lifecycle_management_changes.toml +105 -0
- nldcsc_elastic_rules/rules/integrations/pad/privileged_access_ml_windows_high_count_group_management_events.toml +108 -0
- nldcsc_elastic_rules/rules/integrations/pad/privileged_access_ml_windows_high_count_special_logon_events.toml +105 -0
- nldcsc_elastic_rules/rules/integrations/pad/privileged_access_ml_windows_high_count_special_privilege_use_events.toml +107 -0
- nldcsc_elastic_rules/rules/integrations/pad/privileged_access_ml_windows_high_count_user_account_management_events.toml +107 -0
- nldcsc_elastic_rules/rules/integrations/pad/privileged_access_ml_windows_rare_device_by_user.toml +102 -0
- nldcsc_elastic_rules/rules/integrations/pad/privileged_access_ml_windows_rare_group_name_by_user.toml +121 -0
- nldcsc_elastic_rules/rules/integrations/pad/privileged_access_ml_windows_rare_privilege_assigned_to_user.toml +107 -0
- nldcsc_elastic_rules/rules/integrations/pad/privileged_access_ml_windows_rare_region_name_by_user.toml +102 -0
- nldcsc_elastic_rules/rules/integrations/pad/privileged_access_ml_windows_rare_source_ip_by_user.toml +101 -0
- nldcsc_elastic_rules/rules/integrations/problemchild/defense_evasion_ml_rare_process_for_a_host.toml +105 -0
- nldcsc_elastic_rules/rules/integrations/problemchild/defense_evasion_ml_rare_process_for_a_parent_process.toml +107 -0
- nldcsc_elastic_rules/rules/integrations/problemchild/defense_evasion_ml_rare_process_for_a_user.toml +107 -0
- nldcsc_elastic_rules/rules/integrations/problemchild/defense_evasion_ml_suspicious_windows_event_high_probability.toml +118 -0
- nldcsc_elastic_rules/rules/integrations/problemchild/defense_evasion_ml_suspicious_windows_event_low_probability.toml +118 -0
- nldcsc_elastic_rules/rules/integrations/problemchild/defense_evasion_ml_suspicious_windows_process_cluster_from_host.toml +106 -0
- nldcsc_elastic_rules/rules/integrations/problemchild/defense_evasion_ml_suspicious_windows_process_cluster_from_parent_process.toml +108 -0
- nldcsc_elastic_rules/rules/integrations/problemchild/defense_evasion_ml_suspicious_windows_process_cluster_from_user.toml +108 -0
- nldcsc_elastic_rules/rules/linux/collection_linux_clipboard_activity.toml +95 -0
- nldcsc_elastic_rules/rules/linux/command_and_control_aws_cli_endpoint_url_used.toml +92 -0
- nldcsc_elastic_rules/rules/linux/command_and_control_cat_network_activity.toml +179 -0
- nldcsc_elastic_rules/rules/linux/command_and_control_cupsd_foomatic_rip_netcon.toml +154 -0
- nldcsc_elastic_rules/rules/linux/command_and_control_curl_socks_proxy_detected.toml +130 -0
- nldcsc_elastic_rules/rules/linux/command_and_control_curl_wget_spawn_via_nodejs_parent.toml +116 -0
- nldcsc_elastic_rules/rules/linux/command_and_control_frequent_egress_netcon_from_sus_executable.toml +162 -0
- nldcsc_elastic_rules/rules/linux/command_and_control_git_repo_or_file_download_to_sus_dir.toml +124 -0
- nldcsc_elastic_rules/rules/linux/command_and_control_ip_forwarding_activity.toml +99 -0
- nldcsc_elastic_rules/rules/linux/command_and_control_kubectl_networking_modification.toml +134 -0
- nldcsc_elastic_rules/rules/linux/command_and_control_linux_chisel_client_activity.toml +174 -0
- nldcsc_elastic_rules/rules/linux/command_and_control_linux_chisel_server_activity.toml +175 -0
- nldcsc_elastic_rules/rules/linux/command_and_control_linux_kworker_netcon.toml +155 -0
- nldcsc_elastic_rules/rules/linux/command_and_control_linux_proxychains_activity.toml +153 -0
- nldcsc_elastic_rules/rules/linux/command_and_control_linux_ssh_x11_forwarding.toml +147 -0
- nldcsc_elastic_rules/rules/linux/command_and_control_linux_suspicious_proxychains_activity.toml +183 -0
- nldcsc_elastic_rules/rules/linux/command_and_control_linux_tunneling_and_port_forwarding.toml +193 -0
- nldcsc_elastic_rules/rules/linux/command_and_control_linux_tunneling_via_ssh_option.toml +124 -0
- nldcsc_elastic_rules/rules/linux/command_and_control_suspicious_network_activity_from_unknown_executable.toml +228 -0
- nldcsc_elastic_rules/rules/linux/command_and_control_telegram_api_request.toml +125 -0
- nldcsc_elastic_rules/rules/linux/command_and_control_tunneling_via_earthworm.toml +189 -0
- nldcsc_elastic_rules/rules/linux/credential_access_aws_creds_search_inside_container.toml +118 -0
- nldcsc_elastic_rules/rules/linux/credential_access_collection_sensitive_files.toml +188 -0
- nldcsc_elastic_rules/rules/linux/credential_access_collection_sensitive_files_compression_inside_container.toml +135 -0
- nldcsc_elastic_rules/rules/linux/credential_access_credential_dumping.toml +126 -0
- nldcsc_elastic_rules/rules/linux/credential_access_gdb_init_process_hooking.toml +124 -0
- nldcsc_elastic_rules/rules/linux/credential_access_gdb_process_hooking.toml +105 -0
- nldcsc_elastic_rules/rules/linux/credential_access_gh_auth_via_nodejs.toml +97 -0
- nldcsc_elastic_rules/rules/linux/credential_access_kubernetes_service_account_secret_access.toml +144 -0
- nldcsc_elastic_rules/rules/linux/credential_access_manual_memory_dumping.toml +128 -0
- nldcsc_elastic_rules/rules/linux/credential_access_potential_linux_local_account_bruteforce.toml +118 -0
- nldcsc_elastic_rules/rules/linux/credential_access_potential_linux_ssh_bruteforce_external.toml +117 -0
- nldcsc_elastic_rules/rules/linux/credential_access_potential_linux_ssh_bruteforce_internal.toml +113 -0
- nldcsc_elastic_rules/rules/linux/credential_access_potential_successful_linux_ftp_bruteforce.toml +136 -0
- nldcsc_elastic_rules/rules/linux/credential_access_potential_successful_linux_rdp_bruteforce.toml +135 -0
- nldcsc_elastic_rules/rules/linux/credential_access_potential_successful_linux_ssh_bruteforce.toml +117 -0
- nldcsc_elastic_rules/rules/linux/credential_access_proc_credential_dumping.toml +132 -0
- nldcsc_elastic_rules/rules/linux/credential_access_sensitive_keys_or_passwords_search_inside_container.toml +119 -0
- nldcsc_elastic_rules/rules/linux/credential_access_ssh_backdoor_log.toml +174 -0
- nldcsc_elastic_rules/rules/linux/credential_access_ssh_password_grabbing_via_strace.toml +100 -0
- nldcsc_elastic_rules/rules/linux/credential_access_unusual_instance_metadata_service_api_request.toml +212 -0
- nldcsc_elastic_rules/rules/linux/defense_evasion_acl_modification_via_setfacl.toml +105 -0
- nldcsc_elastic_rules/rules/linux/defense_evasion_attempt_to_disable_auditd_service.toml +127 -0
- nldcsc_elastic_rules/rules/linux/defense_evasion_attempt_to_disable_iptables_or_firewall.toml +133 -0
- nldcsc_elastic_rules/rules/linux/defense_evasion_attempt_to_disable_syslog_service.toml +140 -0
- nldcsc_elastic_rules/rules/linux/defense_evasion_authorized_keys_file_deletion.toml +119 -0
- nldcsc_elastic_rules/rules/linux/defense_evasion_base16_or_base32_encoding_or_decoding_activity.toml +143 -0
- nldcsc_elastic_rules/rules/linux/defense_evasion_base64_decoding_activity.toml +203 -0
- nldcsc_elastic_rules/rules/linux/defense_evasion_binary_copied_to_suspicious_directory.toml +156 -0
- nldcsc_elastic_rules/rules/linux/defense_evasion_busybox_indirect_shell_spawn.toml +139 -0
- nldcsc_elastic_rules/rules/linux/defense_evasion_chattr_immutable_file.toml +140 -0
- nldcsc_elastic_rules/rules/linux/defense_evasion_clear_kernel_ring_buffer.toml +134 -0
- nldcsc_elastic_rules/rules/linux/defense_evasion_creation_of_hidden_files_directories.toml +99 -0
- nldcsc_elastic_rules/rules/linux/defense_evasion_curl_or_wget_executed_via_lolbin.toml +189 -0
- nldcsc_elastic_rules/rules/linux/defense_evasion_directory_creation_in_bin.toml +133 -0
- nldcsc_elastic_rules/rules/linux/defense_evasion_disable_apparmor_attempt.toml +133 -0
- nldcsc_elastic_rules/rules/linux/defense_evasion_disable_selinux_attempt.toml +139 -0
- nldcsc_elastic_rules/rules/linux/defense_evasion_doas_configuration_creation_or_rename.toml +117 -0
- nldcsc_elastic_rules/rules/linux/defense_evasion_dynamic_linker_file_creation.toml +162 -0
- nldcsc_elastic_rules/rules/linux/defense_evasion_esxi_suspicious_timestomp_touch.toml +133 -0
- nldcsc_elastic_rules/rules/linux/defense_evasion_file_deletion_via_shred.toml +124 -0
- nldcsc_elastic_rules/rules/linux/defense_evasion_file_mod_writable_dir.toml +138 -0
- nldcsc_elastic_rules/rules/linux/defense_evasion_hex_payload_execution_via_commandline.toml +143 -0
- nldcsc_elastic_rules/rules/linux/defense_evasion_hex_payload_execution_via_utility.toml +159 -0
- nldcsc_elastic_rules/rules/linux/defense_evasion_hidden_directory_creation.toml +141 -0
- nldcsc_elastic_rules/rules/linux/defense_evasion_hidden_file_dir_tmp.toml +148 -0
- nldcsc_elastic_rules/rules/linux/defense_evasion_hidden_shared_object.toml +133 -0
- nldcsc_elastic_rules/rules/linux/defense_evasion_interactive_shell_from_system_user.toml +135 -0
- nldcsc_elastic_rules/rules/linux/defense_evasion_interpreter_launched_from_decoded_payload.toml +156 -0
- nldcsc_elastic_rules/rules/linux/defense_evasion_journalctl_clear_logs.toml +132 -0
- nldcsc_elastic_rules/rules/linux/defense_evasion_kernel_module_removal.toml +153 -0
- nldcsc_elastic_rules/rules/linux/defense_evasion_kill_command_executed.toml +151 -0
- nldcsc_elastic_rules/rules/linux/defense_evasion_kthreadd_masquerading.toml +130 -0
- nldcsc_elastic_rules/rules/linux/defense_evasion_ld_preload_cmdline.toml +164 -0
- nldcsc_elastic_rules/rules/linux/defense_evasion_ld_so_creation.toml +161 -0
- nldcsc_elastic_rules/rules/linux/defense_evasion_log_files_deleted.toml +151 -0
- nldcsc_elastic_rules/rules/linux/defense_evasion_mount_execution.toml +127 -0
- nldcsc_elastic_rules/rules/linux/defense_evasion_multi_base64_decoding_attempt.toml +163 -0
- nldcsc_elastic_rules/rules/linux/defense_evasion_potential_kubectl_impersonation.toml +158 -0
- nldcsc_elastic_rules/rules/linux/defense_evasion_potential_kubectl_masquerading.toml +155 -0
- nldcsc_elastic_rules/rules/linux/defense_evasion_potential_proot_exploits.toml +124 -0
- nldcsc_elastic_rules/rules/linux/defense_evasion_prctl_process_name_tampering.toml +121 -0
- nldcsc_elastic_rules/rules/linux/defense_evasion_rename_esxi_files.toml +120 -0
- nldcsc_elastic_rules/rules/linux/defense_evasion_rename_esxi_index_file.toml +119 -0
- nldcsc_elastic_rules/rules/linux/defense_evasion_root_certificate_installation.toml +130 -0
- nldcsc_elastic_rules/rules/linux/defense_evasion_selinux_configuration_creation_or_renaming.toml +120 -0
- nldcsc_elastic_rules/rules/linux/defense_evasion_ssl_certificate_deletion.toml +134 -0
- nldcsc_elastic_rules/rules/linux/defense_evasion_sus_utility_executed_via_tmux_or_screen.toml +97 -0
- nldcsc_elastic_rules/rules/linux/defense_evasion_suspicious_path_mounted.toml +113 -0
- nldcsc_elastic_rules/rules/linux/defense_evasion_symlink_binary_to_writable_dir.toml +115 -0
- nldcsc_elastic_rules/rules/linux/defense_evasion_sysctl_kernel_feature_activity.toml +129 -0
- nldcsc_elastic_rules/rules/linux/defense_evasion_unsual_kill_signal.toml +108 -0
- nldcsc_elastic_rules/rules/linux/defense_evasion_unusual_preload_env_vars.toml +152 -0
- nldcsc_elastic_rules/rules/linux/defense_evasion_var_log_file_creation_by_unsual_process.toml +153 -0
- nldcsc_elastic_rules/rules/linux/discovery_docker_socket_discovery.toml +128 -0
- nldcsc_elastic_rules/rules/linux/discovery_dynamic_linker_via_od.toml +126 -0
- nldcsc_elastic_rules/rules/linux/discovery_esxi_software_via_find.toml +125 -0
- nldcsc_elastic_rules/rules/linux/discovery_esxi_software_via_grep.toml +125 -0
- nldcsc_elastic_rules/rules/linux/discovery_kernel_module_enumeration.toml +134 -0
- nldcsc_elastic_rules/rules/linux/discovery_kernel_seeking.toml +127 -0
- nldcsc_elastic_rules/rules/linux/discovery_kernel_unpacking.toml +126 -0
- nldcsc_elastic_rules/rules/linux/discovery_kubeconfig_file_discovery.toml +141 -0
- nldcsc_elastic_rules/rules/linux/discovery_kubectl_permission_discovery.toml +117 -0
- nldcsc_elastic_rules/rules/linux/discovery_linux_hping_activity.toml +141 -0
- nldcsc_elastic_rules/rules/linux/discovery_linux_nping_activity.toml +141 -0
- nldcsc_elastic_rules/rules/linux/discovery_manual_mount_discovery_via_exports_or_fstab.toml +117 -0
- nldcsc_elastic_rules/rules/linux/discovery_pam_version_discovery.toml +152 -0
- nldcsc_elastic_rules/rules/linux/discovery_ping_sweep_detected.toml +122 -0
- nldcsc_elastic_rules/rules/linux/discovery_polkit_version_discovery.toml +117 -0
- nldcsc_elastic_rules/rules/linux/discovery_port_scanning_activity_from_compromised_host.toml +156 -0
- nldcsc_elastic_rules/rules/linux/discovery_private_key_password_searching_activity.toml +114 -0
- nldcsc_elastic_rules/rules/linux/discovery_proc_maps_read.toml +116 -0
- nldcsc_elastic_rules/rules/linux/discovery_process_capabilities.toml +114 -0
- nldcsc_elastic_rules/rules/linux/discovery_pspy_process_monitoring_detected.toml +116 -0
- nldcsc_elastic_rules/rules/linux/discovery_security_file_access_via_common_utility.toml +122 -0
- nldcsc_elastic_rules/rules/linux/discovery_subnet_scanning_activity_from_compromised_host.toml +137 -0
- nldcsc_elastic_rules/rules/linux/discovery_sudo_allowed_command_enumeration.toml +119 -0
- nldcsc_elastic_rules/rules/linux/discovery_suid_sguid_enumeration.toml +142 -0
- nldcsc_elastic_rules/rules/linux/discovery_suspicious_memory_grep_activity.toml +96 -0
- nldcsc_elastic_rules/rules/linux/discovery_suspicious_network_tool_launched_inside_container.toml +147 -0
- nldcsc_elastic_rules/rules/linux/discovery_suspicious_which_command_execution.toml +97 -0
- nldcsc_elastic_rules/rules/linux/discovery_unusual_user_enumeration_via_id.toml +114 -0
- nldcsc_elastic_rules/rules/linux/discovery_virtual_machine_fingerprinting.toml +136 -0
- nldcsc_elastic_rules/rules/linux/discovery_yum_dnf_plugin_detection.toml +122 -0
- nldcsc_elastic_rules/rules/linux/execution_abnormal_process_id_file_created.toml +160 -0
- nldcsc_elastic_rules/rules/linux/execution_container_management_binary_launched_inside_container.toml +118 -0
- nldcsc_elastic_rules/rules/linux/execution_cupsd_foomatic_rip_file_creation.toml +134 -0
- nldcsc_elastic_rules/rules/linux/execution_cupsd_foomatic_rip_lp_user_execution.toml +138 -0
- nldcsc_elastic_rules/rules/linux/execution_cupsd_foomatic_rip_shell_execution.toml +145 -0
- nldcsc_elastic_rules/rules/linux/execution_cupsd_foomatic_rip_suspicious_child_execution.toml +161 -0
- nldcsc_elastic_rules/rules/linux/execution_curl_cve_2023_38545_heap_overflow.toml +135 -0
- nldcsc_elastic_rules/rules/linux/execution_egress_connection_from_entrypoint_in_container.toml +112 -0
- nldcsc_elastic_rules/rules/linux/execution_executable_stack_execution.toml +107 -0
- nldcsc_elastic_rules/rules/linux/execution_file_execution_followed_by_deletion.toml +125 -0
- nldcsc_elastic_rules/rules/linux/execution_file_made_executable_via_chmod_inside_container.toml +128 -0
- nldcsc_elastic_rules/rules/linux/execution_file_transfer_or_listener_established_via_netcat.toml +163 -0
- nldcsc_elastic_rules/rules/linux/execution_interpreter_tty_upgrade.toml +127 -0
- nldcsc_elastic_rules/rules/linux/execution_kubectl_apply_pod_from_url.toml +123 -0
- nldcsc_elastic_rules/rules/linux/execution_kubernetes_direct_api_request_via_curl_or_wget.toml +148 -0
- nldcsc_elastic_rules/rules/linux/execution_nc_listener_via_rlwrap.toml +133 -0
- nldcsc_elastic_rules/rules/linux/execution_netcon_from_rwx_mem_region_binary.toml +130 -0
- nldcsc_elastic_rules/rules/linux/execution_network_event_post_compilation.toml +132 -0
- nldcsc_elastic_rules/rules/linux/execution_perl_tty_shell.toml +123 -0
- nldcsc_elastic_rules/rules/linux/execution_potential_hack_tool_executed.toml +135 -0
- nldcsc_elastic_rules/rules/linux/execution_potentially_overly_permissive_container_creation.toml +144 -0
- nldcsc_elastic_rules/rules/linux/execution_process_backgrounded_by_unusual_parent.toml +152 -0
- nldcsc_elastic_rules/rules/linux/execution_process_started_from_process_id_file.toml +101 -0
- nldcsc_elastic_rules/rules/linux/execution_process_started_in_shared_memory_directory.toml +128 -0
- nldcsc_elastic_rules/rules/linux/execution_python_tty_shell.toml +121 -0
- nldcsc_elastic_rules/rules/linux/execution_python_webserver_spawned.toml +142 -0
- nldcsc_elastic_rules/rules/linux/execution_remote_code_execution_via_postgresql.toml +126 -0
- nldcsc_elastic_rules/rules/linux/execution_shell_evasion_linux_binary.toml +213 -0
- nldcsc_elastic_rules/rules/linux/execution_shell_openssl_client_or_server.toml +136 -0
- nldcsc_elastic_rules/rules/linux/execution_shell_via_background_process.toml +137 -0
- nldcsc_elastic_rules/rules/linux/execution_shell_via_child_tcp_utility_linux.toml +139 -0
- nldcsc_elastic_rules/rules/linux/execution_shell_via_java_revshell_linux.toml +143 -0
- nldcsc_elastic_rules/rules/linux/execution_shell_via_lolbin_interpreter_linux.toml +154 -0
- nldcsc_elastic_rules/rules/linux/execution_shell_via_meterpreter_linux.toml +148 -0
- nldcsc_elastic_rules/rules/linux/execution_shell_via_suspicious_binary.toml +147 -0
- nldcsc_elastic_rules/rules/linux/execution_shell_via_tcp_cli_utility_linux.toml +137 -0
- nldcsc_elastic_rules/rules/linux/execution_shell_via_udp_cli_utility_linux.toml +157 -0
- nldcsc_elastic_rules/rules/linux/execution_sus_extraction_or_decrompression_via_funzip.toml +139 -0
- nldcsc_elastic_rules/rules/linux/execution_suspicious_executable_running_system_commands.toml +139 -0
- nldcsc_elastic_rules/rules/linux/execution_suspicious_mining_process_creation_events.toml +117 -0
- nldcsc_elastic_rules/rules/linux/execution_suspicious_mkfifo_execution.toml +138 -0
- nldcsc_elastic_rules/rules/linux/execution_system_binary_file_permission_change.toml +118 -0
- nldcsc_elastic_rules/rules/linux/execution_tc_bpf_filter.toml +124 -0
- nldcsc_elastic_rules/rules/linux/execution_unix_socket_communication.toml +109 -0
- nldcsc_elastic_rules/rules/linux/execution_unknown_rwx_mem_region_binary_executed.toml +126 -0
- nldcsc_elastic_rules/rules/linux/execution_unusual_interactive_process_inside_container.toml +87 -0
- nldcsc_elastic_rules/rules/linux/execution_unusual_kthreadd_execution.toml +141 -0
- nldcsc_elastic_rules/rules/linux/execution_unusual_path_invocation_from_command_line.toml +145 -0
- nldcsc_elastic_rules/rules/linux/execution_unusual_pkexec_execution.toml +152 -0
- nldcsc_elastic_rules/rules/linux/exfiltration_potential_curl_data_exfiltration.toml +126 -0
- nldcsc_elastic_rules/rules/linux/exfiltration_potential_data_splitting_for_exfiltration.toml +131 -0
- nldcsc_elastic_rules/rules/linux/exfiltration_unusual_file_transfer_utility_launched.toml +130 -0
- nldcsc_elastic_rules/rules/linux/impact_data_encrypted_via_openssl.toml +118 -0
- nldcsc_elastic_rules/rules/linux/impact_esxi_process_kill.toml +116 -0
- nldcsc_elastic_rules/rules/linux/impact_memory_swap_modification.toml +144 -0
- nldcsc_elastic_rules/rules/linux/impact_potential_bruteforce_malware_infection.toml +178 -0
- nldcsc_elastic_rules/rules/linux/impact_potential_linux_ransomware_note_detected.toml +123 -0
- nldcsc_elastic_rules/rules/linux/impact_process_kill_threshold.toml +111 -0
- nldcsc_elastic_rules/rules/linux/initial_access_apache_struts_cve_2023_50164_exploitation_to_webshell.toml +144 -0
- nldcsc_elastic_rules/rules/linux/initial_access_first_time_public_key_authentication.toml +118 -0
- nldcsc_elastic_rules/rules/linux/initial_access_successful_ssh_authentication_by_unusual_ip.toml +111 -0
- nldcsc_elastic_rules/rules/linux/initial_access_successful_ssh_authentication_by_unusual_user.toml +95 -0
- nldcsc_elastic_rules/rules/linux/lateral_movement_kubeconfig_file_activity.toml +155 -0
- nldcsc_elastic_rules/rules/linux/lateral_movement_remote_file_creation_world_writeable_dir.toml +141 -0
- nldcsc_elastic_rules/rules/linux/lateral_movement_ssh_it_worm_download.toml +141 -0
- nldcsc_elastic_rules/rules/linux/lateral_movement_ssh_process_launched_inside_container.toml +138 -0
- nldcsc_elastic_rules/rules/linux/lateral_movement_telnet_network_activity_external.toml +138 -0
- nldcsc_elastic_rules/rules/linux/lateral_movement_telnet_network_activity_internal.toml +139 -0
- nldcsc_elastic_rules/rules/linux/lateral_movement_unusual_remote_file_creation.toml +148 -0
- nldcsc_elastic_rules/rules/linux/persistence_apt_package_manager_execution.toml +166 -0
- nldcsc_elastic_rules/rules/linux/persistence_apt_package_manager_file_creation.toml +163 -0
- nldcsc_elastic_rules/rules/linux/persistence_apt_package_manager_netcon.toml +159 -0
- nldcsc_elastic_rules/rules/linux/persistence_at_job_creation.toml +171 -0
- nldcsc_elastic_rules/rules/linux/persistence_boot_file_copy.toml +156 -0
- nldcsc_elastic_rules/rules/linux/persistence_bpf_probe_write_user.toml +121 -0
- nldcsc_elastic_rules/rules/linux/persistence_chkconfig_service_add.toml +203 -0
- nldcsc_elastic_rules/rules/linux/persistence_credential_access_modify_ssh_binaries.toml +229 -0
- nldcsc_elastic_rules/rules/linux/persistence_cron_job_creation.toml +269 -0
- nldcsc_elastic_rules/rules/linux/persistence_dbus_service_creation.toml +158 -0
- nldcsc_elastic_rules/rules/linux/persistence_dbus_unsual_daemon_parent_execution.toml +149 -0
- nldcsc_elastic_rules/rules/linux/persistence_dnf_package_manager_plugin_file_creation.toml +164 -0
- nldcsc_elastic_rules/rules/linux/persistence_dpkg_package_installation_from_unusual_parent.toml +152 -0
- nldcsc_elastic_rules/rules/linux/persistence_dpkg_unusual_execution.toml +147 -0
- nldcsc_elastic_rules/rules/linux/persistence_dracut_module_creation.toml +166 -0
- nldcsc_elastic_rules/rules/linux/persistence_dynamic_linker_backup.toml +197 -0
- nldcsc_elastic_rules/rules/linux/persistence_extract_initramfs_via_cpio.toml +137 -0
- nldcsc_elastic_rules/rules/linux/persistence_git_hook_execution.toml +152 -0
- nldcsc_elastic_rules/rules/linux/persistence_git_hook_file_creation.toml +164 -0
- nldcsc_elastic_rules/rules/linux/persistence_git_hook_netcon.toml +159 -0
- nldcsc_elastic_rules/rules/linux/persistence_git_hook_process_execution.toml +170 -0
- nldcsc_elastic_rules/rules/linux/persistence_grub_configuration_creation.toml +145 -0
- nldcsc_elastic_rules/rules/linux/persistence_grub_makeconfig.toml +130 -0
- nldcsc_elastic_rules/rules/linux/persistence_init_d_file_creation.toml +194 -0
- nldcsc_elastic_rules/rules/linux/persistence_insmod_kernel_module_load.toml +196 -0
- nldcsc_elastic_rules/rules/linux/persistence_kde_autostart_modification.toml +246 -0
- nldcsc_elastic_rules/rules/linux/persistence_kernel_driver_load.toml +126 -0
- nldcsc_elastic_rules/rules/linux/persistence_kernel_driver_load_by_non_root.toml +132 -0
- nldcsc_elastic_rules/rules/linux/persistence_kernel_object_file_creation.toml +136 -0
- nldcsc_elastic_rules/rules/linux/persistence_kubernetes_sensitive_file_activity.toml +131 -0
- nldcsc_elastic_rules/rules/linux/persistence_kworker_file_creation.toml +208 -0
- nldcsc_elastic_rules/rules/linux/persistence_linux_backdoor_user_creation.toml +165 -0
- nldcsc_elastic_rules/rules/linux/persistence_linux_group_creation.toml +137 -0
- nldcsc_elastic_rules/rules/linux/persistence_linux_shell_activity_via_web_server.toml +199 -0
- nldcsc_elastic_rules/rules/linux/persistence_linux_user_account_creation.toml +136 -0
- nldcsc_elastic_rules/rules/linux/persistence_linux_user_added_to_privileged_group.toml +163 -0
- nldcsc_elastic_rules/rules/linux/persistence_lkm_configuration_file_creation.toml +132 -0
- nldcsc_elastic_rules/rules/linux/persistence_manual_dracut_execution.toml +146 -0
- nldcsc_elastic_rules/rules/linux/persistence_message_of_the_day_creation.toml +188 -0
- nldcsc_elastic_rules/rules/linux/persistence_message_of_the_day_execution.toml +215 -0
- nldcsc_elastic_rules/rules/linux/persistence_network_manager_dispatcher_persistence.toml +163 -0
- nldcsc_elastic_rules/rules/linux/persistence_nodejs_pre_or_post_install_script_execution.toml +109 -0
- nldcsc_elastic_rules/rules/linux/persistence_openssl_passwd_hash_generation.toml +129 -0
- nldcsc_elastic_rules/rules/linux/persistence_pluggable_authentication_module_creation.toml +135 -0
- nldcsc_elastic_rules/rules/linux/persistence_pluggable_authentication_module_creation_in_unusual_dir.toml +122 -0
- nldcsc_elastic_rules/rules/linux/persistence_pluggable_authentication_module_pam_exec_backdoor_exec.toml +115 -0
- nldcsc_elastic_rules/rules/linux/persistence_pluggable_authentication_module_source_download.toml +108 -0
- nldcsc_elastic_rules/rules/linux/persistence_polkit_policy_creation.toml +132 -0
- nldcsc_elastic_rules/rules/linux/persistence_potential_persistence_script_executable_bit_set.toml +164 -0
- nldcsc_elastic_rules/rules/linux/persistence_process_capability_set_via_setcap.toml +120 -0
- nldcsc_elastic_rules/rules/linux/persistence_pth_file_creation.toml +165 -0
- nldcsc_elastic_rules/rules/linux/persistence_rc_local_error_via_syslog.toml +111 -0
- nldcsc_elastic_rules/rules/linux/persistence_rc_local_service_already_running.toml +124 -0
- nldcsc_elastic_rules/rules/linux/persistence_rc_script_creation.toml +189 -0
- nldcsc_elastic_rules/rules/linux/persistence_rpm_package_installation_from_unusual_parent.toml +146 -0
- nldcsc_elastic_rules/rules/linux/persistence_setuid_setgid_capability_set.toml +187 -0
- nldcsc_elastic_rules/rules/linux/persistence_shadow_file_modification.toml +126 -0
- nldcsc_elastic_rules/rules/linux/persistence_shared_object_creation.toml +205 -0
- nldcsc_elastic_rules/rules/linux/persistence_shell_configuration_modification.toml +154 -0
- nldcsc_elastic_rules/rules/linux/persistence_simple_web_server_connection_accepted.toml +152 -0
- nldcsc_elastic_rules/rules/linux/persistence_simple_web_server_creation.toml +160 -0
- nldcsc_elastic_rules/rules/linux/persistence_site_and_user_customize_file_creation.toml +160 -0
- nldcsc_elastic_rules/rules/linux/persistence_ssh_key_generation.toml +124 -0
- nldcsc_elastic_rules/rules/linux/persistence_ssh_netcon.toml +137 -0
- nldcsc_elastic_rules/rules/linux/persistence_ssh_via_backdoored_system_user.toml +135 -0
- nldcsc_elastic_rules/rules/linux/persistence_suspicious_file_opened_through_editor.toml +151 -0
- nldcsc_elastic_rules/rules/linux/persistence_suspicious_ssh_execution_xzbackdoor.toml +136 -0
- nldcsc_elastic_rules/rules/linux/persistence_systemd_generator_creation.toml +157 -0
- nldcsc_elastic_rules/rules/linux/persistence_systemd_netcon.toml +144 -0
- nldcsc_elastic_rules/rules/linux/persistence_systemd_scheduled_timer_created.toml +208 -0
- nldcsc_elastic_rules/rules/linux/persistence_systemd_service_creation.toml +261 -0
- nldcsc_elastic_rules/rules/linux/persistence_systemd_service_started.toml +241 -0
- nldcsc_elastic_rules/rules/linux/persistence_systemd_shell_execution.toml +132 -0
- nldcsc_elastic_rules/rules/linux/persistence_tainted_kernel_module_load.toml +124 -0
- nldcsc_elastic_rules/rules/linux/persistence_tainted_kernel_module_out_of_tree_load.toml +125 -0
- nldcsc_elastic_rules/rules/linux/persistence_udev_rule_creation.toml +142 -0
- nldcsc_elastic_rules/rules/linux/persistence_unpack_initramfs_via_unmkinitramfs.toml +152 -0
- nldcsc_elastic_rules/rules/linux/persistence_unusual_exim4_child_process.toml +103 -0
- nldcsc_elastic_rules/rules/linux/persistence_unusual_pam_grantor.toml +118 -0
- nldcsc_elastic_rules/rules/linux/persistence_unusual_sshd_child_process.toml +136 -0
- nldcsc_elastic_rules/rules/linux/persistence_user_credential_modification_via_echo.toml +109 -0
- nldcsc_elastic_rules/rules/linux/persistence_user_or_group_creation_or_modification.toml +129 -0
- nldcsc_elastic_rules/rules/linux/persistence_web_server_sus_child_spawned.toml +234 -0
- nldcsc_elastic_rules/rules/linux/persistence_web_server_sus_command_execution.toml +218 -0
- nldcsc_elastic_rules/rules/linux/persistence_web_server_sus_destination_port.toml +168 -0
- nldcsc_elastic_rules/rules/linux/persistence_xdg_autostart_netcon.toml +155 -0
- nldcsc_elastic_rules/rules/linux/persistence_yum_package_manager_plugin_file_creation.toml +159 -0
- nldcsc_elastic_rules/rules/linux/privilege_escalation_chown_chmod_unauthorized_file_read.toml +142 -0
- nldcsc_elastic_rules/rules/linux/privilege_escalation_container_util_misconfiguration.toml +128 -0
- nldcsc_elastic_rules/rules/linux/privilege_escalation_cve_2025_32463_nsswitch_file_creation.toml +124 -0
- nldcsc_elastic_rules/rules/linux/privilege_escalation_cve_2025_32463_sudo_chroot_execution.toml +124 -0
- nldcsc_elastic_rules/rules/linux/privilege_escalation_cve_2025_41244_vmtoolsd_lpe.toml +129 -0
- nldcsc_elastic_rules/rules/linux/privilege_escalation_dac_permissions.toml +132 -0
- nldcsc_elastic_rules/rules/linux/privilege_escalation_debugfs_launched_inside_container.toml +115 -0
- nldcsc_elastic_rules/rules/linux/privilege_escalation_docker_escape_via_nsenter.toml +86 -0
- nldcsc_elastic_rules/rules/linux/privilege_escalation_docker_mount_chroot_container_escape.toml +130 -0
- nldcsc_elastic_rules/rules/linux/privilege_escalation_docker_release_file_creation.toml +88 -0
- nldcsc_elastic_rules/rules/linux/privilege_escalation_enlightenment_window_manager.toml +115 -0
- nldcsc_elastic_rules/rules/linux/privilege_escalation_gdb_sys_ptrace_elevation.toml +127 -0
- nldcsc_elastic_rules/rules/linux/privilege_escalation_gdb_sys_ptrace_netcon.toml +158 -0
- nldcsc_elastic_rules/rules/linux/privilege_escalation_kworker_uid_elevation.toml +132 -0
- nldcsc_elastic_rules/rules/linux/privilege_escalation_ld_preload_shared_object_modif.toml +140 -0
- nldcsc_elastic_rules/rules/linux/privilege_escalation_linux_suspicious_symbolic_link.toml +146 -0
- nldcsc_elastic_rules/rules/linux/privilege_escalation_linux_uid_int_max_bug.toml +118 -0
- nldcsc_elastic_rules/rules/linux/privilege_escalation_load_and_unload_of_kernel_via_kexec.toml +167 -0
- nldcsc_elastic_rules/rules/linux/privilege_escalation_looney_tunables_cve_2023_4911.toml +127 -0
- nldcsc_elastic_rules/rules/linux/privilege_escalation_mount_launched_inside_container.toml +114 -0
- nldcsc_elastic_rules/rules/linux/privilege_escalation_netcon_via_sudo_binary.toml +132 -0
- nldcsc_elastic_rules/rules/linux/privilege_escalation_overlayfs_local_privesc.toml +118 -0
- nldcsc_elastic_rules/rules/linux/privilege_escalation_pkexec_envar_hijack.toml +130 -0
- nldcsc_elastic_rules/rules/linux/privilege_escalation_potential_bufferoverflow_attack.toml +112 -0
- nldcsc_elastic_rules/rules/linux/privilege_escalation_potential_suid_sgid_exploitation.toml +164 -0
- nldcsc_elastic_rules/rules/linux/privilege_escalation_potential_suid_sgid_proxy_execution.toml +163 -0
- nldcsc_elastic_rules/rules/linux/privilege_escalation_potential_wildcard_shell_spawn.toml +136 -0
- nldcsc_elastic_rules/rules/linux/privilege_escalation_sda_disk_mount_non_root.toml +119 -0
- nldcsc_elastic_rules/rules/linux/privilege_escalation_shadow_file_read.toml +140 -0
- nldcsc_elastic_rules/rules/linux/privilege_escalation_sudo_cve_2019_14287.toml +126 -0
- nldcsc_elastic_rules/rules/linux/privilege_escalation_sudo_hijacking.toml +149 -0
- nldcsc_elastic_rules/rules/linux/privilege_escalation_sudo_token_via_process_injection.toml +131 -0
- nldcsc_elastic_rules/rules/linux/privilege_escalation_suspicious_cap_setuid_python_execution.toml +126 -0
- nldcsc_elastic_rules/rules/linux/privilege_escalation_suspicious_chown_fowner_elevation.toml +122 -0
- nldcsc_elastic_rules/rules/linux/privilege_escalation_suspicious_passwd_file_write.toml +137 -0
- nldcsc_elastic_rules/rules/linux/privilege_escalation_suspicious_uid_guid_elevation.toml +142 -0
- nldcsc_elastic_rules/rules/linux/privilege_escalation_uid_change_post_compilation.toml +119 -0
- nldcsc_elastic_rules/rules/linux/privilege_escalation_uid_elevation_from_unknown_executable.toml +152 -0
- nldcsc_elastic_rules/rules/linux/privilege_escalation_unshare_namespace_manipulation.toml +129 -0
- nldcsc_elastic_rules/rules/linux/privilege_escalation_writable_docker_socket.toml +120 -0
- nldcsc_elastic_rules/rules/macos/command_and_control_unusual_connection_to_suspicious_top_level_domain.toml +104 -0
- nldcsc_elastic_rules/rules/macos/command_and_control_unusual_network_connection_to_suspicious_web_service.toml +197 -0
- nldcsc_elastic_rules/rules/macos/credential_access_credentials_keychains.toml +121 -0
- nldcsc_elastic_rules/rules/macos/credential_access_dumping_hashes_bi_cmds.toml +113 -0
- nldcsc_elastic_rules/rules/macos/credential_access_dumping_keychain_security.toml +116 -0
- nldcsc_elastic_rules/rules/macos/credential_access_high_volume_of_pbpaste.toml +121 -0
- nldcsc_elastic_rules/rules/macos/credential_access_kerberosdump_kcc.toml +124 -0
- nldcsc_elastic_rules/rules/macos/credential_access_keychain_pwd_retrieval_security_cmd.toml +135 -0
- nldcsc_elastic_rules/rules/macos/credential_access_mitm_localhost_webproxy.toml +116 -0
- nldcsc_elastic_rules/rules/macos/credential_access_potential_macos_ssh_bruteforce.toml +114 -0
- nldcsc_elastic_rules/rules/macos/credential_access_promt_for_pwd_via_osascript.toml +128 -0
- nldcsc_elastic_rules/rules/macos/credential_access_suspicious_web_browser_sensitive_file_access.toml +128 -0
- nldcsc_elastic_rules/rules/macos/credential_access_systemkey_dumping.toml +117 -0
- nldcsc_elastic_rules/rules/macos/defense_evasion_apple_softupdates_modification.toml +117 -0
- nldcsc_elastic_rules/rules/macos/defense_evasion_attempt_del_quarantine_attrib.toml +125 -0
- nldcsc_elastic_rules/rules/macos/defense_evasion_attempt_to_disable_gatekeeper.toml +115 -0
- nldcsc_elastic_rules/rules/macos/defense_evasion_install_root_certificate.toml +118 -0
- nldcsc_elastic_rules/rules/macos/defense_evasion_modify_environment_launchctl.toml +120 -0
- nldcsc_elastic_rules/rules/macos/defense_evasion_privacy_controls_tcc_database_modification.toml +122 -0
- nldcsc_elastic_rules/rules/macos/defense_evasion_privilege_escalation_privacy_pref_sshd_fulldiskaccess.toml +130 -0
- nldcsc_elastic_rules/rules/macos/defense_evasion_safari_config_change.toml +118 -0
- nldcsc_elastic_rules/rules/macos/defense_evasion_sandboxed_office_app_suspicious_zip_file.toml +114 -0
- nldcsc_elastic_rules/rules/macos/defense_evasion_tcc_bypass_mounted_apfs_access.toml +111 -0
- nldcsc_elastic_rules/rules/macos/defense_evasion_unload_endpointsecurity_kext.toml +128 -0
- nldcsc_elastic_rules/rules/macos/discovery_users_domain_built_in_commands.toml +133 -0
- nldcsc_elastic_rules/rules/macos/execution_defense_evasion_electron_app_childproc_node_js.toml +128 -0
- nldcsc_elastic_rules/rules/macos/execution_initial_access_suspicious_browser_childproc.toml +131 -0
- nldcsc_elastic_rules/rules/macos/execution_installer_package_spawned_network_event.toml +147 -0
- nldcsc_elastic_rules/rules/macos/execution_script_via_automator_workflows.toml +110 -0
- nldcsc_elastic_rules/rules/macos/execution_scripting_osascript_exec_followed_by_netcon.toml +138 -0
- nldcsc_elastic_rules/rules/macos/execution_shell_execution_via_apple_scripting.toml +114 -0
- nldcsc_elastic_rules/rules/macos/initial_access_suspicious_mac_ms_office_child_process.toml +182 -0
- nldcsc_elastic_rules/rules/macos/lateral_movement_credential_access_kerberos_bifrostconsole.toml +133 -0
- nldcsc_elastic_rules/rules/macos/lateral_movement_mounting_smb_share.toml +121 -0
- nldcsc_elastic_rules/rules/macos/lateral_movement_remote_ssh_login_enabled.toml +119 -0
- nldcsc_elastic_rules/rules/macos/lateral_movement_vpn_connection_attempt.toml +118 -0
- nldcsc_elastic_rules/rules/macos/persistence_account_creation_hide_at_logon.toml +116 -0
- nldcsc_elastic_rules/rules/macos/persistence_creation_change_launch_agents_file.toml +118 -0
- nldcsc_elastic_rules/rules/macos/persistence_creation_hidden_login_item_osascript.toml +139 -0
- nldcsc_elastic_rules/rules/macos/persistence_creation_modif_launch_deamon_sequence.toml +114 -0
- nldcsc_elastic_rules/rules/macos/persistence_credential_access_authorization_plugin_creation.toml +121 -0
- nldcsc_elastic_rules/rules/macos/persistence_crontab_creation.toml +118 -0
- nldcsc_elastic_rules/rules/macos/persistence_defense_evasion_hidden_launch_agent_deamon_logonitem_process.toml +138 -0
- nldcsc_elastic_rules/rules/macos/persistence_directory_services_plugins_modification.toml +111 -0
- nldcsc_elastic_rules/rules/macos/persistence_docker_shortcuts_plist_modification.toml +115 -0
- nldcsc_elastic_rules/rules/macos/persistence_emond_rules_file_creation.toml +117 -0
- nldcsc_elastic_rules/rules/macos/persistence_emond_rules_process_execution.toml +143 -0
- nldcsc_elastic_rules/rules/macos/persistence_enable_root_account.toml +115 -0
- nldcsc_elastic_rules/rules/macos/persistence_evasion_hidden_launch_agent_deamon_creation.toml +136 -0
- nldcsc_elastic_rules/rules/macos/persistence_finder_sync_plugin_pluginkit.toml +115 -0
- nldcsc_elastic_rules/rules/macos/persistence_folder_action_scripts_runtime.toml +126 -0
- nldcsc_elastic_rules/rules/macos/persistence_login_logout_hooks_defaults.toml +121 -0
- nldcsc_elastic_rules/rules/macos/persistence_loginwindow_plist_modification.toml +92 -0
- nldcsc_elastic_rules/rules/macos/persistence_modification_sublime_app_plugin_or_script.toml +123 -0
- nldcsc_elastic_rules/rules/macos/persistence_periodic_tasks_file_mdofiy.toml +119 -0
- nldcsc_elastic_rules/rules/macos/persistence_screensaver_engine_unexpected_child_process.toml +92 -0
- nldcsc_elastic_rules/rules/macos/persistence_screensaver_plist_file_modification.toml +114 -0
- nldcsc_elastic_rules/rules/macos/persistence_suspicious_calendar_modification.toml +117 -0
- nldcsc_elastic_rules/rules/macos/persistence_via_atom_init_file_modification.toml +115 -0
- nldcsc_elastic_rules/rules/macos/privilege_escalation_applescript_with_admin_privs.toml +124 -0
- nldcsc_elastic_rules/rules/macos/privilege_escalation_explicit_creds_via_scripting.toml +139 -0
- nldcsc_elastic_rules/rules/macos/privilege_escalation_exploit_adobe_acrobat_updater.toml +125 -0
- nldcsc_elastic_rules/rules/macos/privilege_escalation_local_user_added_to_admin.toml +119 -0
- nldcsc_elastic_rules/rules/macos/privilege_escalation_root_crontab_filemod.toml +119 -0
- nldcsc_elastic_rules/rules/macos/privilege_escalation_user_added_to_admin_group.toml +121 -0
- nldcsc_elastic_rules/rules/ml/command_and_control_ml_packetbeat_dns_tunneling.toml +129 -0
- nldcsc_elastic_rules/rules/ml/command_and_control_ml_packetbeat_rare_dns_question.toml +137 -0
- nldcsc_elastic_rules/rules/ml/command_and_control_ml_packetbeat_rare_urls.toml +141 -0
- nldcsc_elastic_rules/rules/ml/command_and_control_ml_packetbeat_rare_user_agent.toml +139 -0
- nldcsc_elastic_rules/rules/ml/credential_access_ml_auth_spike_in_failed_logon_events.toml +146 -0
- nldcsc_elastic_rules/rules/ml/credential_access_ml_auth_spike_in_logon_events.toml +148 -0
- nldcsc_elastic_rules/rules/ml/credential_access_ml_auth_spike_in_logon_events_from_a_source_ip.toml +162 -0
- nldcsc_elastic_rules/rules/ml/credential_access_ml_linux_anomalous_metadata_process.toml +140 -0
- nldcsc_elastic_rules/rules/ml/credential_access_ml_linux_anomalous_metadata_user.toml +141 -0
- nldcsc_elastic_rules/rules/ml/credential_access_ml_suspicious_login_activity.toml +145 -0
- nldcsc_elastic_rules/rules/ml/credential_access_ml_windows_anomalous_metadata_process.toml +133 -0
- nldcsc_elastic_rules/rules/ml/credential_access_ml_windows_anomalous_metadata_user.toml +135 -0
- nldcsc_elastic_rules/rules/ml/discovery_ml_linux_system_information_discovery.toml +137 -0
- nldcsc_elastic_rules/rules/ml/discovery_ml_linux_system_network_configuration_discovery.toml +137 -0
- nldcsc_elastic_rules/rules/ml/discovery_ml_linux_system_network_connection_discovery.toml +137 -0
- nldcsc_elastic_rules/rules/ml/discovery_ml_linux_system_process_discovery.toml +137 -0
- nldcsc_elastic_rules/rules/ml/discovery_ml_linux_system_user_discovery.toml +136 -0
- nldcsc_elastic_rules/rules/ml/execution_ml_windows_anomalous_script.toml +138 -0
- nldcsc_elastic_rules/rules/ml/initial_access_ml_auth_rare_hour_for_a_user_to_logon.toml +133 -0
- nldcsc_elastic_rules/rules/ml/initial_access_ml_auth_rare_source_ip_for_a_user.toml +145 -0
- nldcsc_elastic_rules/rules/ml/initial_access_ml_auth_rare_user_logon.toml +150 -0
- nldcsc_elastic_rules/rules/ml/initial_access_ml_linux_anomalous_user_name.toml +114 -0
- nldcsc_elastic_rules/rules/ml/initial_access_ml_windows_anomalous_user_name.toml +119 -0
- nldcsc_elastic_rules/rules/ml/initial_access_ml_windows_rare_user_type10_remote_login.toml +102 -0
- nldcsc_elastic_rules/rules/ml/ml_high_count_events_for_a_host_name.toml +93 -0
- nldcsc_elastic_rules/rules/ml/ml_high_count_network_denies.toml +113 -0
- nldcsc_elastic_rules/rules/ml/ml_high_count_network_events.toml +112 -0
- nldcsc_elastic_rules/rules/ml/ml_linux_anomalous_network_activity.toml +94 -0
- nldcsc_elastic_rules/rules/ml/ml_linux_anomalous_network_port_activity.toml +120 -0
- nldcsc_elastic_rules/rules/ml/ml_low_count_events_for_a_host_name.toml +93 -0
- nldcsc_elastic_rules/rules/ml/ml_packetbeat_rare_server_domain.toml +120 -0
- nldcsc_elastic_rules/rules/ml/ml_rare_destination_country.toml +117 -0
- nldcsc_elastic_rules/rules/ml/ml_spike_in_traffic_to_a_country.toml +117 -0
- nldcsc_elastic_rules/rules/ml/ml_windows_anomalous_network_activity.toml +91 -0
- nldcsc_elastic_rules/rules/ml/persistence_ml_linux_anomalous_process_all_hosts.toml +144 -0
- nldcsc_elastic_rules/rules/ml/persistence_ml_rare_process_by_host_linux.toml +144 -0
- nldcsc_elastic_rules/rules/ml/persistence_ml_rare_process_by_host_windows.toml +188 -0
- nldcsc_elastic_rules/rules/ml/persistence_ml_windows_anomalous_path_activity.toml +156 -0
- nldcsc_elastic_rules/rules/ml/persistence_ml_windows_anomalous_process_all_hosts.toml +201 -0
- nldcsc_elastic_rules/rules/ml/persistence_ml_windows_anomalous_process_creation.toml +186 -0
- nldcsc_elastic_rules/rules/ml/persistence_ml_windows_anomalous_service.toml +136 -0
- nldcsc_elastic_rules/rules/ml/privilege_escalation_ml_linux_anomalous_sudo_activity.toml +147 -0
- nldcsc_elastic_rules/rules/ml/privilege_escalation_ml_windows_rare_user_runas_event.toml +126 -0
- nldcsc_elastic_rules/rules/ml/resource_development_ml_linux_anomalous_compiler_activity.toml +141 -0
- nldcsc_elastic_rules/rules/network/command_and_control_accepted_default_telnet_port_connection.toml +121 -0
- nldcsc_elastic_rules/rules/network/command_and_control_cobalt_strike_beacon.toml +105 -0
- nldcsc_elastic_rules/rules/network/command_and_control_cobalt_strike_default_teamserver_cert.toml +105 -0
- nldcsc_elastic_rules/rules/network/command_and_control_download_rar_powershell_from_internet.toml +129 -0
- nldcsc_elastic_rules/rules/network/command_and_control_fin7_c2_behavior.toml +66 -0
- nldcsc_elastic_rules/rules/network/command_and_control_halfbaked_beacon.toml +103 -0
- nldcsc_elastic_rules/rules/network/command_and_control_nat_traversal_port_activity.toml +82 -0
- nldcsc_elastic_rules/rules/network/command_and_control_port_26_activity.toml +94 -0
- nldcsc_elastic_rules/rules/network/command_and_control_rdp_remote_desktop_protocol_from_the_internet.toml +144 -0
- nldcsc_elastic_rules/rules/network/command_and_control_vnc_virtual_network_computing_from_the_internet.toml +133 -0
- nldcsc_elastic_rules/rules/network/command_and_control_vnc_virtual_network_computing_to_the_internet.toml +122 -0
- nldcsc_elastic_rules/rules/network/discovery_potential_network_sweep_detected.toml +118 -0
- nldcsc_elastic_rules/rules/network/discovery_potential_port_scan_detected.toml +113 -0
- nldcsc_elastic_rules/rules/network/discovery_potential_syn_port_scan_detected.toml +112 -0
- nldcsc_elastic_rules/rules/network/initial_access_rpc_remote_procedure_call_from_the_internet.toml +113 -0
- nldcsc_elastic_rules/rules/network/initial_access_rpc_remote_procedure_call_to_the_internet.toml +113 -0
- nldcsc_elastic_rules/rules/network/initial_access_smb_windows_file_sharing_activity_to_the_internet.toml +126 -0
- nldcsc_elastic_rules/rules/network/initial_access_unsecure_elasticsearch_node.toml +92 -0
- nldcsc_elastic_rules/rules/network/lateral_movement_dns_server_overflow.toml +92 -0
- nldcsc_elastic_rules/rules/promotions/credential_access_endgame_cred_dumping_detected.toml +91 -0
- nldcsc_elastic_rules/rules/promotions/credential_access_endgame_cred_dumping_prevented.toml +90 -0
- nldcsc_elastic_rules/rules/promotions/crowdstrike_external_alerts.toml +112 -0
- nldcsc_elastic_rules/rules/promotions/elastic_security_external_alerts.toml +114 -0
- nldcsc_elastic_rules/rules/promotions/endgame_adversary_behavior_detected.toml +71 -0
- nldcsc_elastic_rules/rules/promotions/endgame_malware_detected.toml +71 -0
- nldcsc_elastic_rules/rules/promotions/endgame_malware_prevented.toml +72 -0
- nldcsc_elastic_rules/rules/promotions/endgame_ransomware_detected.toml +69 -0
- nldcsc_elastic_rules/rules/promotions/endgame_ransomware_prevented.toml +71 -0
- nldcsc_elastic_rules/rules/promotions/execution_endgame_exploit_detected.toml +97 -0
- nldcsc_elastic_rules/rules/promotions/execution_endgame_exploit_prevented.toml +99 -0
- nldcsc_elastic_rules/rules/promotions/external_alerts.toml +111 -0
- nldcsc_elastic_rules/rules/promotions/google_secops_external_alerts.toml +114 -0
- nldcsc_elastic_rules/rules/promotions/microsoft_sentinel_external_alerts.toml +113 -0
- nldcsc_elastic_rules/rules/promotions/privilege_escalation_endgame_cred_manipulation_detected.toml +85 -0
- nldcsc_elastic_rules/rules/promotions/privilege_escalation_endgame_cred_manipulation_prevented.toml +85 -0
- nldcsc_elastic_rules/rules/promotions/privilege_escalation_endgame_permission_theft_detected.toml +85 -0
- nldcsc_elastic_rules/rules/promotions/privilege_escalation_endgame_permission_theft_prevented.toml +85 -0
- nldcsc_elastic_rules/rules/promotions/privilege_escalation_endgame_process_injection_detected.toml +86 -0
- nldcsc_elastic_rules/rules/promotions/privilege_escalation_endgame_process_injection_prevented.toml +85 -0
- nldcsc_elastic_rules/rules/promotions/sentinelone_alert_external_alerts.toml +114 -0
- nldcsc_elastic_rules/rules/promotions/sentinelone_threat_external_alerts.toml +102 -0
- nldcsc_elastic_rules/rules/promotions/splunk_external_alerts.toml +114 -0
- nldcsc_elastic_rules/rules/threat_intel/threat_intel_indicator_match_address.toml +187 -0
- nldcsc_elastic_rules/rules/threat_intel/threat_intel_indicator_match_email.toml +167 -0
- nldcsc_elastic_rules/rules/threat_intel/threat_intel_indicator_match_hash.toml +235 -0
- nldcsc_elastic_rules/rules/threat_intel/threat_intel_indicator_match_registry.toml +174 -0
- nldcsc_elastic_rules/rules/threat_intel/threat_intel_indicator_match_url.toml +190 -0
- nldcsc_elastic_rules/rules/threat_intel/threat_intel_rapid7_threat_command.toml +108 -0
- nldcsc_elastic_rules/rules/windows/collection_email_outlook_mailbox_via_com.toml +122 -0
- nldcsc_elastic_rules/rules/windows/collection_email_powershell_exchange_mailbox.toml +142 -0
- nldcsc_elastic_rules/rules/windows/collection_mailbox_export_winlog.toml +124 -0
- nldcsc_elastic_rules/rules/windows/collection_posh_audio_capture.toml +135 -0
- nldcsc_elastic_rules/rules/windows/collection_posh_clipboard_capture.toml +164 -0
- nldcsc_elastic_rules/rules/windows/collection_posh_keylogger.toml +146 -0
- nldcsc_elastic_rules/rules/windows/collection_posh_mailbox.toml +155 -0
- nldcsc_elastic_rules/rules/windows/collection_posh_screen_grabber.toml +126 -0
- nldcsc_elastic_rules/rules/windows/collection_posh_webcam_video_capture.toml +134 -0
- nldcsc_elastic_rules/rules/windows/collection_winrar_encryption.toml +129 -0
- nldcsc_elastic_rules/rules/windows/command_and_control_certreq_postdata.toml +172 -0
- nldcsc_elastic_rules/rules/windows/command_and_control_common_llm_endpoint.toml +158 -0
- nldcsc_elastic_rules/rules/windows/command_and_control_common_webservices.toml +383 -0
- nldcsc_elastic_rules/rules/windows/command_and_control_dns_susp_tld.toml +105 -0
- nldcsc_elastic_rules/rules/windows/command_and_control_dns_tunneling_nslookup.toml +109 -0
- nldcsc_elastic_rules/rules/windows/command_and_control_encrypted_channel_freesslcert.toml +105 -0
- nldcsc_elastic_rules/rules/windows/command_and_control_headless_browser.toml +102 -0
- nldcsc_elastic_rules/rules/windows/command_and_control_iexplore_via_com.toml +119 -0
- nldcsc_elastic_rules/rules/windows/command_and_control_ingress_transfer_bits.toml +173 -0
- nldcsc_elastic_rules/rules/windows/command_and_control_new_terms_commonly_abused_rat_execution.toml +303 -0
- nldcsc_elastic_rules/rules/windows/command_and_control_outlook_home_page.toml +117 -0
- nldcsc_elastic_rules/rules/windows/command_and_control_port_forwarding_added_registry.toml +120 -0
- nldcsc_elastic_rules/rules/windows/command_and_control_rdp_tunnel_plink.toml +121 -0
- nldcsc_elastic_rules/rules/windows/command_and_control_remcos_rat_iocs.toml +104 -0
- nldcsc_elastic_rules/rules/windows/command_and_control_remote_file_copy_desktopimgdownldr.toml +183 -0
- nldcsc_elastic_rules/rules/windows/command_and_control_remote_file_copy_mpcmdrun.toml +181 -0
- nldcsc_elastic_rules/rules/windows/command_and_control_remote_file_copy_powershell.toml +191 -0
- nldcsc_elastic_rules/rules/windows/command_and_control_remote_file_copy_scripts.toml +152 -0
- nldcsc_elastic_rules/rules/windows/command_and_control_rmm_netsupport_susp_path.toml +102 -0
- nldcsc_elastic_rules/rules/windows/command_and_control_screenconnect_childproc.toml +120 -0
- nldcsc_elastic_rules/rules/windows/command_and_control_sunburst_c2_activity_detected.toml +165 -0
- nldcsc_elastic_rules/rules/windows/command_and_control_teamviewer_remote_file_copy.toml +142 -0
- nldcsc_elastic_rules/rules/windows/command_and_control_tool_transfer_via_curl.toml +121 -0
- nldcsc_elastic_rules/rules/windows/command_and_control_tunnel_vscode.toml +105 -0
- nldcsc_elastic_rules/rules/windows/credential_access_adidns_wildcard.toml +117 -0
- nldcsc_elastic_rules/rules/windows/credential_access_adidns_wpad_record.toml +113 -0
- nldcsc_elastic_rules/rules/windows/credential_access_browsers_unusual_parent.toml +125 -0
- nldcsc_elastic_rules/rules/windows/credential_access_bruteforce_admin_account.toml +141 -0
- nldcsc_elastic_rules/rules/windows/credential_access_bruteforce_multiple_logon_failure_followed_by_success.toml +153 -0
- nldcsc_elastic_rules/rules/windows/credential_access_bruteforce_multiple_logon_failure_same_srcip.toml +163 -0
- nldcsc_elastic_rules/rules/windows/credential_access_cmdline_dump_tool.toml +160 -0
- nldcsc_elastic_rules/rules/windows/credential_access_copy_ntds_sam_volshadowcp_cmdline.toml +171 -0
- nldcsc_elastic_rules/rules/windows/credential_access_credential_dumping_msbuild.toml +170 -0
- nldcsc_elastic_rules/rules/windows/credential_access_dcsync_newterm_subjectuser.toml +149 -0
- nldcsc_elastic_rules/rules/windows/credential_access_dcsync_replication_rights.toml +155 -0
- nldcsc_elastic_rules/rules/windows/credential_access_dcsync_user_backdoor.toml +124 -0
- nldcsc_elastic_rules/rules/windows/credential_access_disable_kerberos_preauth.toml +138 -0
- nldcsc_elastic_rules/rules/windows/credential_access_dnsnode_creation.toml +117 -0
- nldcsc_elastic_rules/rules/windows/credential_access_dollar_account_relay.toml +113 -0
- nldcsc_elastic_rules/rules/windows/credential_access_dollar_account_relay_kerberos.toml +129 -0
- nldcsc_elastic_rules/rules/windows/credential_access_dollar_account_relay_ntlm.toml +128 -0
- nldcsc_elastic_rules/rules/windows/credential_access_domain_backup_dpapi_private_keys.toml +80 -0
- nldcsc_elastic_rules/rules/windows/credential_access_dump_registry_hives.toml +118 -0
- nldcsc_elastic_rules/rules/windows/credential_access_generic_localdumps.toml +123 -0
- nldcsc_elastic_rules/rules/windows/credential_access_iis_connectionstrings_dumping.toml +108 -0
- nldcsc_elastic_rules/rules/windows/credential_access_imageload_azureadconnectauthsvc.toml +112 -0
- nldcsc_elastic_rules/rules/windows/credential_access_kerberoasting_unusual_process.toml +181 -0
- nldcsc_elastic_rules/rules/windows/credential_access_kerberos_coerce.toml +126 -0
- nldcsc_elastic_rules/rules/windows/credential_access_kerberos_coerce_dns.toml +118 -0
- nldcsc_elastic_rules/rules/windows/credential_access_kirbi_file.toml +103 -0
- nldcsc_elastic_rules/rules/windows/credential_access_ldap_attributes.toml +158 -0
- nldcsc_elastic_rules/rules/windows/credential_access_lsass_handle_via_malseclogon.toml +105 -0
- nldcsc_elastic_rules/rules/windows/credential_access_lsass_loaded_susp_dll.toml +160 -0
- nldcsc_elastic_rules/rules/windows/credential_access_lsass_memdump_file_created.toml +172 -0
- nldcsc_elastic_rules/rules/windows/credential_access_lsass_memdump_handle_access.toml +201 -0
- nldcsc_elastic_rules/rules/windows/credential_access_lsass_openprocess_api.toml +216 -0
- nldcsc_elastic_rules/rules/windows/credential_access_machine_account_smb_relay.toml +105 -0
- nldcsc_elastic_rules/rules/windows/credential_access_mimikatz_memssp_default_logs.toml +109 -0
- nldcsc_elastic_rules/rules/windows/credential_access_mimikatz_powershell_module.toml +132 -0
- nldcsc_elastic_rules/rules/windows/credential_access_mod_wdigest_security_provider.toml +118 -0
- nldcsc_elastic_rules/rules/windows/credential_access_moving_registry_hive_via_smb.toml +118 -0
- nldcsc_elastic_rules/rules/windows/credential_access_persistence_network_logon_provider_modification.toml +176 -0
- nldcsc_elastic_rules/rules/windows/credential_access_posh_invoke_ninjacopy.toml +136 -0
- nldcsc_elastic_rules/rules/windows/credential_access_posh_kerb_ticket_dump.toml +146 -0
- nldcsc_elastic_rules/rules/windows/credential_access_posh_minidump.toml +131 -0
- nldcsc_elastic_rules/rules/windows/credential_access_posh_relay_tools.toml +152 -0
- nldcsc_elastic_rules/rules/windows/credential_access_posh_request_ticket.toml +139 -0
- nldcsc_elastic_rules/rules/windows/credential_access_posh_veeam_sql.toml +134 -0
- nldcsc_elastic_rules/rules/windows/credential_access_potential_lsa_memdump_via_mirrordump.toml +103 -0
- nldcsc_elastic_rules/rules/windows/credential_access_rare_webdav_destination.toml +98 -0
- nldcsc_elastic_rules/rules/windows/credential_access_regback_sam_security_hives.toml +101 -0
- nldcsc_elastic_rules/rules/windows/credential_access_relay_ntlm_auth_via_http_spoolss.toml +130 -0
- nldcsc_elastic_rules/rules/windows/credential_access_remote_sam_secretsdump.toml +119 -0
- nldcsc_elastic_rules/rules/windows/credential_access_saved_creds_vault_winlog.toml +110 -0
- nldcsc_elastic_rules/rules/windows/credential_access_saved_creds_vaultcmd.toml +117 -0
- nldcsc_elastic_rules/rules/windows/credential_access_seenabledelegationprivilege_assigned_to_user.toml +121 -0
- nldcsc_elastic_rules/rules/windows/credential_access_shadow_credentials.toml +120 -0
- nldcsc_elastic_rules/rules/windows/credential_access_spn_attribute_modified.toml +124 -0
- nldcsc_elastic_rules/rules/windows/credential_access_suspicious_comsvcs_imageload.toml +172 -0
- nldcsc_elastic_rules/rules/windows/credential_access_suspicious_lsass_access_generic.toml +129 -0
- nldcsc_elastic_rules/rules/windows/credential_access_suspicious_lsass_access_memdump.toml +126 -0
- nldcsc_elastic_rules/rules/windows/credential_access_suspicious_lsass_access_via_snapshot.toml +109 -0
- nldcsc_elastic_rules/rules/windows/credential_access_suspicious_winreg_access_via_sebackup_priv.toml +143 -0
- nldcsc_elastic_rules/rules/windows/credential_access_symbolic_link_to_shadow_copy_created.toml +147 -0
- nldcsc_elastic_rules/rules/windows/credential_access_veeam_backup_dll_imageload.toml +112 -0
- nldcsc_elastic_rules/rules/windows/credential_access_veeam_commands.toml +129 -0
- nldcsc_elastic_rules/rules/windows/credential_access_via_snapshot_lsass_clone_creation.toml +96 -0
- nldcsc_elastic_rules/rules/windows/credential_access_wbadmin_ntds.toml +124 -0
- nldcsc_elastic_rules/rules/windows/credential_access_web_config_file_access.toml +96 -0
- nldcsc_elastic_rules/rules/windows/credential_access_wireless_creds_dumping.toml +153 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_adding_the_hidden_file_attribute_with_via_attribexe.toml +175 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_amsi_bypass_dllhijack.toml +177 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_amsi_bypass_powershell.toml +175 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_amsienable_key_mod.toml +132 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_audit_policy_disabled_winlog.toml +129 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_clearing_windows_console_history.toml +133 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_clearing_windows_event_logs.toml +121 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_clearing_windows_security_logs.toml +87 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_code_signing_policy_modification_builtin_tools.toml +139 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_code_signing_policy_modification_registry.toml +149 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_communication_apps_suspicious_child_process.toml +279 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_create_mod_root_certificate.toml +172 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_cve_2020_0601.toml +89 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_defender_disabled_via_registry.toml +136 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_defender_exclusion_via_powershell.toml +148 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_delete_volume_usn_journal_with_fsutil.toml +104 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_disable_nla.toml +110 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_disable_posh_scriptblocklogging.toml +129 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_disable_windows_firewall_rules_with_netsh.toml +105 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_disabling_windows_defender_powershell.toml +133 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_disabling_windows_logs.toml +136 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_dns_over_https_enabled.toml +111 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_dotnet_compiler_parent_process.toml +125 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_enable_inbound_rdp_with_netsh.toml +109 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_enable_network_discovery_with_netsh.toml +104 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_execution_control_panel_suspicious_args.toml +118 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_execution_lolbas_wuauclt.toml +151 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_execution_msbuild_started_by_office_app.toml +144 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_execution_msbuild_started_by_script.toml +130 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_execution_msbuild_started_by_system_process.toml +116 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_execution_msbuild_started_renamed.toml +155 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_execution_msbuild_started_unusal_process.toml +124 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_execution_suspicious_explorer_winword.toml +146 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_execution_windefend_unusual_path.toml +124 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_file_creation_mult_extension.toml +133 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_from_unusual_directory.toml +194 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_hide_encoded_executable_registry.toml +103 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_iis_httplogging_disabled.toml +107 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_indirect_exec_conhost.toml +93 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_indirect_exec_forfiles.toml +92 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_indirect_exec_openssh.toml +93 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_injection_msbuild.toml +111 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_installutil_beacon.toml +100 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_lolbas_win_cdb_utility.toml +108 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_lsass_ppl_disabled_registry.toml +111 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_masquerading_as_elastic_endpoint_process.toml +129 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_masquerading_as_svchost.toml +96 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_masquerading_business_apps_installer.toml +257 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_masquerading_communication_apps.toml +167 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_masquerading_renamed_autoit.toml +146 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_masquerading_suspicious_werfault_childproc.toml +144 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_masquerading_trusted_directory.toml +132 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_masquerading_werfault.toml +150 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_microsoft_defender_tampering.toml +158 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_misc_lolbin_connecting_to_the_internet.toml +147 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_modify_ownership_os_files.toml +111 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_ms_office_suspicious_regmod.toml +133 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_msbuild_making_network_connections.toml +164 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_mshta_beacon.toml +103 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_mshta_susp_child.toml +111 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_msiexec_child_proc_netcon.toml +124 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_msiexec_remote_payload.toml +110 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_msxsl_network.toml +98 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_network_connection_from_windows_binary.toml +199 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_ntlm_downgrade.toml +103 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_obf_args_unicode_modified_letters.toml +108 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_parent_process_pid_spoofing.toml +149 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_persistence_account_tokenfilterpolicy.toml +140 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_posh_assembly_load.toml +224 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_posh_compressed.toml +192 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_posh_defender_tampering.toml +151 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_posh_encryption.toml +110 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_posh_obfuscation.toml +147 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_posh_obfuscation_backtick.toml +170 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_posh_obfuscation_backtick_var.toml +157 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_posh_obfuscation_char_arrays.toml +158 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_posh_obfuscation_concat_dynamic.toml +154 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_posh_obfuscation_high_number_proportion.toml +170 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_posh_obfuscation_iex_env_vars_reconstruction.toml +159 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_posh_obfuscation_iex_string_reconstruction.toml +168 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_posh_obfuscation_index_reversal.toml +164 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_posh_obfuscation_reverse_keyword.toml +155 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_posh_obfuscation_string_concat.toml +159 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_posh_obfuscation_string_format.toml +178 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_posh_obfuscation_whitespace_special_proportion.toml +166 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_posh_process_injection.toml +163 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_powershell_windows_firewall_disabled.toml +141 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_process_termination_followed_by_deletion.toml +176 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_proxy_execution_via_msdt.toml +123 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_reg_disable_enableglobalqueryblocklist.toml +124 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_regmod_remotemonologue.toml +136 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_right_to_left_override.toml +122 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_root_dir_ads_creation.toml +106 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_run_virt_windowssandbox.toml +108 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_rundll32_no_arguments.toml +146 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_sc_sdset.toml +121 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_sccm_scnotification_dll.toml +87 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_scheduledjobs_at_protocol_enabled.toml +123 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_script_via_html_app.toml +144 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_sdelete_like_filename_rename.toml +112 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_sip_provider_mod.toml +112 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_solarwinds_backdoor_service_disabled_via_registry.toml +139 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_suspicious_certutil_commands.toml +153 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_suspicious_execution_from_mounted_device.toml +139 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_suspicious_managedcode_host_process.toml +108 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_suspicious_process_access_direct_syscall.toml +174 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_suspicious_process_creation_calltrace.toml +96 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_suspicious_scrobj_load.toml +112 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_suspicious_short_program_name.toml +141 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_suspicious_wmi_script.toml +108 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_suspicious_zoom_child_process.toml +161 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_system_critical_proc_abnormal_file_activity.toml +161 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_timestomp_sysmon.toml +109 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_unsigned_dll_loaded_from_suspdir.toml +192 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_untrusted_driver_loaded.toml +137 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_unusual_ads_file_creation.toml +193 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_unusual_dir_ads.toml +109 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_unusual_network_connection_via_dllhost.toml +101 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_unusual_network_connection_via_rundll32.toml +128 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_unusual_process_network_connection.toml +108 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_unusual_system_vp_child_program.toml +98 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_via_filter_manager.toml +155 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_wdac_policy_by_unusual_process.toml +104 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_windows_filtering_platform.toml +154 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_workfolders_control_execution.toml +108 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_wsl_bash_exec.toml +133 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_wsl_child_process.toml +124 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_wsl_enabled_via_dism.toml +104 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_wsl_filesystem.toml +98 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_wsl_kalilinux.toml +113 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_wsl_registry_modification.toml +108 -0
- nldcsc_elastic_rules/rules/windows/discovery_active_directory_webservice.toml +96 -0
- nldcsc_elastic_rules/rules/windows/discovery_ad_explorer_execution.toml +126 -0
- nldcsc_elastic_rules/rules/windows/discovery_adfind_command_activity.toml +147 -0
- nldcsc_elastic_rules/rules/windows/discovery_admin_recon.toml +133 -0
- nldcsc_elastic_rules/rules/windows/discovery_command_system_account.toml +126 -0
- nldcsc_elastic_rules/rules/windows/discovery_enumerating_domain_trusts_via_dsquery.toml +111 -0
- nldcsc_elastic_rules/rules/windows/discovery_enumerating_domain_trusts_via_nltest.toml +121 -0
- nldcsc_elastic_rules/rules/windows/discovery_group_policy_object_discovery.toml +100 -0
- nldcsc_elastic_rules/rules/windows/discovery_high_number_ad_properties.toml +98 -0
- nldcsc_elastic_rules/rules/windows/discovery_host_public_ip_address_lookup.toml +161 -0
- nldcsc_elastic_rules/rules/windows/discovery_peripheral_device.toml +96 -0
- nldcsc_elastic_rules/rules/windows/discovery_posh_invoke_sharefinder.toml +154 -0
- nldcsc_elastic_rules/rules/windows/discovery_posh_suspicious_api_functions.toml +206 -0
- nldcsc_elastic_rules/rules/windows/discovery_privileged_localgroup_membership.toml +207 -0
- nldcsc_elastic_rules/rules/windows/discovery_signal_unusual_discovery_signal_proc_cmdline.toml +91 -0
- nldcsc_elastic_rules/rules/windows/discovery_signal_unusual_discovery_signal_proc_executable.toml +86 -0
- nldcsc_elastic_rules/rules/windows/discovery_whoami_command_activity.toml +130 -0
- nldcsc_elastic_rules/rules/windows/execution_apt_solarwinds_backdoor_child_cmd_powershell.toml +140 -0
- nldcsc_elastic_rules/rules/windows/execution_apt_solarwinds_backdoor_unusual_child_processes.toml +126 -0
- nldcsc_elastic_rules/rules/windows/execution_com_object_xwizard.toml +123 -0
- nldcsc_elastic_rules/rules/windows/execution_command_prompt_connecting_to_the_internet.toml +166 -0
- nldcsc_elastic_rules/rules/windows/execution_command_shell_started_by_svchost.toml +208 -0
- nldcsc_elastic_rules/rules/windows/execution_command_shell_started_by_unusual_process.toml +127 -0
- nldcsc_elastic_rules/rules/windows/execution_command_shell_via_rundll32.toml +139 -0
- nldcsc_elastic_rules/rules/windows/execution_delayed_via_ping_lolbas_unsigned.toml +188 -0
- nldcsc_elastic_rules/rules/windows/execution_downloaded_shortcut_files.toml +110 -0
- nldcsc_elastic_rules/rules/windows/execution_downloaded_url_file.toml +107 -0
- nldcsc_elastic_rules/rules/windows/execution_enumeration_via_wmiprvse.toml +149 -0
- nldcsc_elastic_rules/rules/windows/execution_from_unusual_path_cmdline.toml +271 -0
- nldcsc_elastic_rules/rules/windows/execution_html_help_executable_program_connecting_to_the_internet.toml +175 -0
- nldcsc_elastic_rules/rules/windows/execution_initial_access_foxmail_exploit.toml +115 -0
- nldcsc_elastic_rules/rules/windows/execution_initial_access_via_msc_file.toml +140 -0
- nldcsc_elastic_rules/rules/windows/execution_initial_access_wps_dll_exploit.toml +113 -0
- nldcsc_elastic_rules/rules/windows/execution_mofcomp.toml +120 -0
- nldcsc_elastic_rules/rules/windows/execution_ms_office_written_file.toml +128 -0
- nldcsc_elastic_rules/rules/windows/execution_nodejs_susp_patterns.toml +119 -0
- nldcsc_elastic_rules/rules/windows/execution_pdf_written_file.toml +134 -0
- nldcsc_elastic_rules/rules/windows/execution_posh_hacktool_authors.toml +136 -0
- nldcsc_elastic_rules/rules/windows/execution_posh_hacktool_functions.toml +357 -0
- nldcsc_elastic_rules/rules/windows/execution_posh_malicious_script_agg.toml +150 -0
- nldcsc_elastic_rules/rules/windows/execution_posh_portable_executable.toml +175 -0
- nldcsc_elastic_rules/rules/windows/execution_posh_psreflect.toml +194 -0
- nldcsc_elastic_rules/rules/windows/execution_powershell_susp_args_via_winscript.toml +115 -0
- nldcsc_elastic_rules/rules/windows/execution_psexec_lateral_movement_command.toml +134 -0
- nldcsc_elastic_rules/rules/windows/execution_register_server_program_connecting_to_the_internet.toml +171 -0
- nldcsc_elastic_rules/rules/windows/execution_revshell_cmd_via_netcat.toml +97 -0
- nldcsc_elastic_rules/rules/windows/execution_scheduled_task_powershell_source.toml +110 -0
- nldcsc_elastic_rules/rules/windows/execution_scripting_remote_webdav.toml +120 -0
- nldcsc_elastic_rules/rules/windows/execution_scripts_archive_file.toml +123 -0
- nldcsc_elastic_rules/rules/windows/execution_shared_modules_local_sxs_dll.toml +73 -0
- nldcsc_elastic_rules/rules/windows/execution_suspicious_cmd_wmi.toml +117 -0
- nldcsc_elastic_rules/rules/windows/execution_suspicious_image_load_wmi_ms_office.toml +100 -0
- nldcsc_elastic_rules/rules/windows/execution_suspicious_pdf_reader.toml +143 -0
- nldcsc_elastic_rules/rules/windows/execution_suspicious_powershell_imgload.toml +141 -0
- nldcsc_elastic_rules/rules/windows/execution_suspicious_psexesvc.toml +115 -0
- nldcsc_elastic_rules/rules/windows/execution_via_compiled_html_file.toml +180 -0
- nldcsc_elastic_rules/rules/windows/execution_via_hidden_shell_conhost.toml +144 -0
- nldcsc_elastic_rules/rules/windows/execution_via_mmc_console_file_unusual_path.toml +146 -0
- nldcsc_elastic_rules/rules/windows/execution_windows_cmd_shell_susp_args.toml +179 -0
- nldcsc_elastic_rules/rules/windows/execution_windows_fakecaptcha_cmd_ps.toml +144 -0
- nldcsc_elastic_rules/rules/windows/execution_windows_phish_clickfix.toml +143 -0
- nldcsc_elastic_rules/rules/windows/execution_windows_powershell_susp_args.toml +188 -0
- nldcsc_elastic_rules/rules/windows/execution_windows_script_from_internet.toml +132 -0
- nldcsc_elastic_rules/rules/windows/exfiltration_smb_rare_destination.toml +138 -0
- nldcsc_elastic_rules/rules/windows/impact_backup_file_deletion.toml +125 -0
- nldcsc_elastic_rules/rules/windows/impact_deleting_backup_catalogs_with_wbadmin.toml +111 -0
- nldcsc_elastic_rules/rules/windows/impact_high_freq_file_renames_by_kernel.toml +114 -0
- nldcsc_elastic_rules/rules/windows/impact_mod_critical_os_files.toml +100 -0
- nldcsc_elastic_rules/rules/windows/impact_modification_of_boot_config.toml +109 -0
- nldcsc_elastic_rules/rules/windows/impact_ransomware_file_rename_smb.toml +117 -0
- nldcsc_elastic_rules/rules/windows/impact_ransomware_note_file_over_smb.toml +117 -0
- nldcsc_elastic_rules/rules/windows/impact_stop_process_service_threshold.toml +97 -0
- nldcsc_elastic_rules/rules/windows/impact_volume_shadow_copy_deletion_or_resized_via_vssadmin.toml +124 -0
- nldcsc_elastic_rules/rules/windows/impact_volume_shadow_copy_deletion_via_powershell.toml +148 -0
- nldcsc_elastic_rules/rules/windows/impact_volume_shadow_copy_deletion_via_wmic.toml +137 -0
- nldcsc_elastic_rules/rules/windows/initial_access_evasion_suspicious_htm_file_creation.toml +151 -0
- nldcsc_elastic_rules/rules/windows/initial_access_execution_from_inetcache.toml +143 -0
- nldcsc_elastic_rules/rules/windows/initial_access_execution_from_removable_media.toml +93 -0
- nldcsc_elastic_rules/rules/windows/initial_access_execution_remote_via_msiexec.toml +136 -0
- nldcsc_elastic_rules/rules/windows/initial_access_execution_via_office_addins.toml +160 -0
- nldcsc_elastic_rules/rules/windows/initial_access_exfiltration_first_time_seen_usb.toml +124 -0
- nldcsc_elastic_rules/rules/windows/initial_access_exploit_jetbrains_teamcity.toml +145 -0
- nldcsc_elastic_rules/rules/windows/initial_access_rdp_file_mail_attachment.toml +118 -0
- nldcsc_elastic_rules/rules/windows/initial_access_script_executing_powershell.toml +145 -0
- nldcsc_elastic_rules/rules/windows/initial_access_scripts_process_started_via_wmi.toml +146 -0
- nldcsc_elastic_rules/rules/windows/initial_access_suspicious_ms_exchange_files.toml +110 -0
- nldcsc_elastic_rules/rules/windows/initial_access_suspicious_ms_exchange_process.toml +147 -0
- nldcsc_elastic_rules/rules/windows/initial_access_suspicious_ms_exchange_worker_child_process.toml +129 -0
- nldcsc_elastic_rules/rules/windows/initial_access_suspicious_ms_office_child_process.toml +175 -0
- nldcsc_elastic_rules/rules/windows/initial_access_suspicious_ms_outlook_child_process.toml +162 -0
- nldcsc_elastic_rules/rules/windows/initial_access_suspicious_windows_server_update_svc.toml +121 -0
- nldcsc_elastic_rules/rules/windows/initial_access_url_cve_2025_33053.toml +120 -0
- nldcsc_elastic_rules/rules/windows/initial_access_via_explorer_suspicious_child_parent_args.toml +158 -0
- nldcsc_elastic_rules/rules/windows/initial_access_webshell_screenconnect_server.toml +127 -0
- nldcsc_elastic_rules/rules/windows/initial_access_xsl_script_execution_via_com.toml +112 -0
- nldcsc_elastic_rules/rules/windows/lateral_movement_alternate_creds_pth.toml +102 -0
- nldcsc_elastic_rules/rules/windows/lateral_movement_cmd_service.toml +127 -0
- nldcsc_elastic_rules/rules/windows/lateral_movement_credential_access_kerberos_correlation.toml +127 -0
- nldcsc_elastic_rules/rules/windows/lateral_movement_dcom_hta.toml +120 -0
- nldcsc_elastic_rules/rules/windows/lateral_movement_dcom_mmc20.toml +119 -0
- nldcsc_elastic_rules/rules/windows/lateral_movement_dcom_shellwindow_shellbrowserwindow.toml +103 -0
- nldcsc_elastic_rules/rules/windows/lateral_movement_defense_evasion_lanman_nullsessionpipe_modification.toml +121 -0
- nldcsc_elastic_rules/rules/windows/lateral_movement_direct_outbound_smb_connection.toml +158 -0
- nldcsc_elastic_rules/rules/windows/lateral_movement_evasion_rdp_shadowing.toml +122 -0
- nldcsc_elastic_rules/rules/windows/lateral_movement_executable_tool_transfer_smb.toml +110 -0
- nldcsc_elastic_rules/rules/windows/lateral_movement_execution_from_tsclient_mup.toml +109 -0
- nldcsc_elastic_rules/rules/windows/lateral_movement_execution_via_file_shares_sequence.toml +163 -0
- nldcsc_elastic_rules/rules/windows/lateral_movement_incoming_winrm_shell_execution.toml +106 -0
- nldcsc_elastic_rules/rules/windows/lateral_movement_incoming_wmi.toml +124 -0
- nldcsc_elastic_rules/rules/windows/lateral_movement_mount_hidden_or_webdav_share_net.toml +151 -0
- nldcsc_elastic_rules/rules/windows/lateral_movement_powershell_remoting_target.toml +127 -0
- nldcsc_elastic_rules/rules/windows/lateral_movement_rdp_enabled_registry.toml +132 -0
- nldcsc_elastic_rules/rules/windows/lateral_movement_rdp_sharprdp_target.toml +108 -0
- nldcsc_elastic_rules/rules/windows/lateral_movement_remote_file_copy_hidden_share.toml +108 -0
- nldcsc_elastic_rules/rules/windows/lateral_movement_remote_service_installed_winlog.toml +131 -0
- nldcsc_elastic_rules/rules/windows/lateral_movement_remote_services.toml +174 -0
- nldcsc_elastic_rules/rules/windows/lateral_movement_remote_task_creation_winlog.toml +93 -0
- nldcsc_elastic_rules/rules/windows/lateral_movement_scheduled_task_target.toml +107 -0
- nldcsc_elastic_rules/rules/windows/lateral_movement_suspicious_rdp_client_imageload.toml +123 -0
- nldcsc_elastic_rules/rules/windows/lateral_movement_unusual_dns_service_children.toml +124 -0
- nldcsc_elastic_rules/rules/windows/lateral_movement_unusual_dns_service_file_writes.toml +97 -0
- nldcsc_elastic_rules/rules/windows/lateral_movement_via_startup_folder_rdp_smb.toml +126 -0
- nldcsc_elastic_rules/rules/windows/lateral_movement_via_wsus_update.toml +105 -0
- nldcsc_elastic_rules/rules/windows/persistence_ad_adminsdholder.toml +103 -0
- nldcsc_elastic_rules/rules/windows/persistence_adobe_hijack_persistence.toml +154 -0
- nldcsc_elastic_rules/rules/windows/persistence_app_compat_shim.toml +117 -0
- nldcsc_elastic_rules/rules/windows/persistence_appcertdlls_registry.toml +121 -0
- nldcsc_elastic_rules/rules/windows/persistence_appinitdlls_registry.toml +196 -0
- nldcsc_elastic_rules/rules/windows/persistence_browser_extension_install.toml +111 -0
- nldcsc_elastic_rules/rules/windows/persistence_dontexpirepasswd_account.toml +108 -0
- nldcsc_elastic_rules/rules/windows/persistence_evasion_hidden_local_account_creation.toml +104 -0
- nldcsc_elastic_rules/rules/windows/persistence_evasion_registry_ifeo_injection.toml +134 -0
- nldcsc_elastic_rules/rules/windows/persistence_evasion_registry_startup_shell_folder_modified.toml +191 -0
- nldcsc_elastic_rules/rules/windows/persistence_group_modification_by_system.toml +104 -0
- nldcsc_elastic_rules/rules/windows/persistence_local_scheduled_job_creation.toml +114 -0
- nldcsc_elastic_rules/rules/windows/persistence_local_scheduled_task_creation.toml +109 -0
- nldcsc_elastic_rules/rules/windows/persistence_local_scheduled_task_scripting.toml +97 -0
- nldcsc_elastic_rules/rules/windows/persistence_ms_office_addins_file.toml +111 -0
- nldcsc_elastic_rules/rules/windows/persistence_ms_outlook_vba_template.toml +102 -0
- nldcsc_elastic_rules/rules/windows/persistence_msds_alloweddelegateto_krbtgt.toml +117 -0
- nldcsc_elastic_rules/rules/windows/persistence_msi_installer_task_startup.toml +121 -0
- nldcsc_elastic_rules/rules/windows/persistence_msoffice_startup_registry.toml +118 -0
- nldcsc_elastic_rules/rules/windows/persistence_netsh_helper_dll.toml +117 -0
- nldcsc_elastic_rules/rules/windows/persistence_powershell_exch_mailbox_activesync_add_device.toml +129 -0
- nldcsc_elastic_rules/rules/windows/persistence_powershell_profiles.toml +176 -0
- nldcsc_elastic_rules/rules/windows/persistence_priv_escalation_via_accessibility_features.toml +189 -0
- nldcsc_elastic_rules/rules/windows/persistence_registry_uncommon.toml +193 -0
- nldcsc_elastic_rules/rules/windows/persistence_remote_password_reset.toml +122 -0
- nldcsc_elastic_rules/rules/windows/persistence_run_key_and_startup_broad.toml +188 -0
- nldcsc_elastic_rules/rules/windows/persistence_runtime_run_key_startup_susp_procs.toml +107 -0
- nldcsc_elastic_rules/rules/windows/persistence_scheduled_task_creation_winlog.toml +104 -0
- nldcsc_elastic_rules/rules/windows/persistence_scheduled_task_updated.toml +98 -0
- nldcsc_elastic_rules/rules/windows/persistence_sdprop_exclusion_dsheuristics.toml +125 -0
- nldcsc_elastic_rules/rules/windows/persistence_service_dll_unsigned.toml +219 -0
- nldcsc_elastic_rules/rules/windows/persistence_service_windows_service_winlog.toml +148 -0
- nldcsc_elastic_rules/rules/windows/persistence_services_registry.toml +147 -0
- nldcsc_elastic_rules/rules/windows/persistence_startup_folder_file_written_by_suspicious_process.toml +172 -0
- nldcsc_elastic_rules/rules/windows/persistence_startup_folder_file_written_by_unsigned_process.toml +166 -0
- nldcsc_elastic_rules/rules/windows/persistence_startup_folder_scripts.toml +168 -0
- nldcsc_elastic_rules/rules/windows/persistence_suspicious_com_hijack_registry.toml +197 -0
- nldcsc_elastic_rules/rules/windows/persistence_suspicious_image_load_scheduled_task_ms_office.toml +182 -0
- nldcsc_elastic_rules/rules/windows/persistence_suspicious_scheduled_task_runtime.toml +153 -0
- nldcsc_elastic_rules/rules/windows/persistence_suspicious_service_created_registry.toml +119 -0
- nldcsc_elastic_rules/rules/windows/persistence_sysmon_wmi_event_subscription.toml +100 -0
- nldcsc_elastic_rules/rules/windows/persistence_system_shells_via_services.toml +160 -0
- nldcsc_elastic_rules/rules/windows/persistence_temp_scheduled_task.toml +109 -0
- nldcsc_elastic_rules/rules/windows/persistence_time_provider_mod.toml +172 -0
- nldcsc_elastic_rules/rules/windows/persistence_user_account_added_to_privileged_group_ad.toml +115 -0
- nldcsc_elastic_rules/rules/windows/persistence_user_account_creation.toml +105 -0
- nldcsc_elastic_rules/rules/windows/persistence_via_application_shimming.toml +126 -0
- nldcsc_elastic_rules/rules/windows/persistence_via_bits_job_notify_command.toml +109 -0
- nldcsc_elastic_rules/rules/windows/persistence_via_hidden_run_key_valuename.toml +139 -0
- nldcsc_elastic_rules/rules/windows/persistence_via_lsa_security_support_provider_registry.toml +127 -0
- nldcsc_elastic_rules/rules/windows/persistence_via_telemetrycontroller_scheduledtask_hijack.toml +141 -0
- nldcsc_elastic_rules/rules/windows/persistence_via_update_orchestrator_service_hijack.toml +182 -0
- nldcsc_elastic_rules/rules/windows/persistence_via_windows_management_instrumentation_event_subscription.toml +121 -0
- nldcsc_elastic_rules/rules/windows/persistence_via_wmi_stdregprov_run_services.toml +210 -0
- nldcsc_elastic_rules/rules/windows/persistence_via_xp_cmdshell_mssql_stored_procedure.toml +149 -0
- nldcsc_elastic_rules/rules/windows/persistence_web_shell_aspx_write.toml +109 -0
- nldcsc_elastic_rules/rules/windows/persistence_webshell_detection.toml +216 -0
- nldcsc_elastic_rules/rules/windows/persistence_werfault_reflectdebugger.toml +114 -0
- nldcsc_elastic_rules/rules/windows/privilege_escalation_badsuccessor_dmsa_abuse.toml +91 -0
- nldcsc_elastic_rules/rules/windows/privilege_escalation_create_process_as_different_user.toml +106 -0
- nldcsc_elastic_rules/rules/windows/privilege_escalation_create_process_with_token_unpriv.toml +121 -0
- nldcsc_elastic_rules/rules/windows/privilege_escalation_credroaming_ldap.toml +111 -0
- nldcsc_elastic_rules/rules/windows/privilege_escalation_disable_uac_registry.toml +163 -0
- nldcsc_elastic_rules/rules/windows/privilege_escalation_dmsa_creation_by_unusual_user.toml +90 -0
- nldcsc_elastic_rules/rules/windows/privilege_escalation_dns_serverlevelplugindll.toml +95 -0
- nldcsc_elastic_rules/rules/windows/privilege_escalation_driver_newterm_imphash.toml +156 -0
- nldcsc_elastic_rules/rules/windows/privilege_escalation_expired_driver_loaded.toml +105 -0
- nldcsc_elastic_rules/rules/windows/privilege_escalation_exploit_cve_202238028.toml +127 -0
- nldcsc_elastic_rules/rules/windows/privilege_escalation_gpo_schtask_service_creation.toml +125 -0
- nldcsc_elastic_rules/rules/windows/privilege_escalation_group_policy_iniscript.toml +144 -0
- nldcsc_elastic_rules/rules/windows/privilege_escalation_group_policy_privileged_groups.toml +106 -0
- nldcsc_elastic_rules/rules/windows/privilege_escalation_group_policy_scheduled_task.toml +161 -0
- nldcsc_elastic_rules/rules/windows/privilege_escalation_installertakeover.toml +156 -0
- nldcsc_elastic_rules/rules/windows/privilege_escalation_krbrelayup_service_creation.toml +119 -0
- nldcsc_elastic_rules/rules/windows/privilege_escalation_lsa_auth_package.toml +114 -0
- nldcsc_elastic_rules/rules/windows/privilege_escalation_make_token_local.toml +109 -0
- nldcsc_elastic_rules/rules/windows/privilege_escalation_msi_repair_via_mshelp_link.toml +119 -0
- nldcsc_elastic_rules/rules/windows/privilege_escalation_named_pipe_impersonation.toml +148 -0
- nldcsc_elastic_rules/rules/windows/privilege_escalation_newcreds_logon_rare_process.toml +100 -0
- nldcsc_elastic_rules/rules/windows/privilege_escalation_persistence_phantom_dll.toml +214 -0
- nldcsc_elastic_rules/rules/windows/privilege_escalation_port_monitor_print_pocessor_abuse.toml +128 -0
- nldcsc_elastic_rules/rules/windows/privilege_escalation_posh_token_impersonation.toml +219 -0
- nldcsc_elastic_rules/rules/windows/privilege_escalation_printspooler_registry_copyfiles.toml +108 -0
- nldcsc_elastic_rules/rules/windows/privilege_escalation_printspooler_service_suspicious_file.toml +159 -0
- nldcsc_elastic_rules/rules/windows/privilege_escalation_printspooler_suspicious_file_deletion.toml +104 -0
- nldcsc_elastic_rules/rules/windows/privilege_escalation_printspooler_suspicious_spl_file.toml +155 -0
- nldcsc_elastic_rules/rules/windows/privilege_escalation_reg_service_imagepath_mod.toml +180 -0
- nldcsc_elastic_rules/rules/windows/privilege_escalation_rogue_windir_environment_var.toml +110 -0
- nldcsc_elastic_rules/rules/windows/privilege_escalation_samaccountname_spoofing_attack.toml +119 -0
- nldcsc_elastic_rules/rules/windows/privilege_escalation_service_control_spawned_script_int.toml +192 -0
- nldcsc_elastic_rules/rules/windows/privilege_escalation_suspicious_dnshostname_update.toml +110 -0
- nldcsc_elastic_rules/rules/windows/privilege_escalation_thread_cpu_priority_hijack.toml +94 -0
- nldcsc_elastic_rules/rules/windows/privilege_escalation_tokenmanip_sedebugpriv_enabled.toml +127 -0
- nldcsc_elastic_rules/rules/windows/privilege_escalation_uac_bypass_com_clipup.toml +140 -0
- nldcsc_elastic_rules/rules/windows/privilege_escalation_uac_bypass_com_ieinstal.toml +143 -0
- nldcsc_elastic_rules/rules/windows/privilege_escalation_uac_bypass_com_interface_icmluautil.toml +137 -0
- nldcsc_elastic_rules/rules/windows/privilege_escalation_uac_bypass_diskcleanup_hijack.toml +153 -0
- nldcsc_elastic_rules/rules/windows/privilege_escalation_uac_bypass_dll_sideloading.toml +137 -0
- nldcsc_elastic_rules/rules/windows/privilege_escalation_uac_bypass_event_viewer.toml +179 -0
- nldcsc_elastic_rules/rules/windows/privilege_escalation_uac_bypass_mock_windir.toml +179 -0
- nldcsc_elastic_rules/rules/windows/privilege_escalation_uac_bypass_winfw_mmc_hijack.toml +177 -0
- nldcsc_elastic_rules/rules/windows/privilege_escalation_unquoted_service_path.toml +108 -0
- nldcsc_elastic_rules/rules/windows/privilege_escalation_unusual_parentchild_relationship.toml +180 -0
- nldcsc_elastic_rules/rules/windows/privilege_escalation_unusual_printspooler_childprocess.toml +128 -0
- nldcsc_elastic_rules/rules/windows/privilege_escalation_unusual_svchost_childproc_childless.toml +145 -0
- nldcsc_elastic_rules/rules/windows/privilege_escalation_via_ppid_spoofing.toml +158 -0
- nldcsc_elastic_rules/rules/windows/privilege_escalation_via_rogue_named_pipe.toml +106 -0
- nldcsc_elastic_rules/rules/windows/privilege_escalation_via_token_theft.toml +157 -0
- nldcsc_elastic_rules/rules/windows/privilege_escalation_windows_service_via_unusual_client.toml +127 -0
- nldcsc_elastic_rules/utils.py +7 -0
- nldcsc_elastic_rules-0.0.8.dist-info/METADATA +3 -0
- nldcsc_elastic_rules-0.0.8.dist-info/RECORD +1536 -0
- nldcsc_elastic_rules-0.0.8.dist-info/WHEEL +5 -0
- nldcsc_elastic_rules-0.0.8.dist-info/top_level.txt +1 -0
|
@@ -0,0 +1,105 @@
|
|
|
1
|
+
[metadata]
|
|
2
|
+
creation_date = "2021/02/03"
|
|
3
|
+
integration = ["endpoint"]
|
|
4
|
+
maturity = "production"
|
|
5
|
+
updated_date = "2025/01/15"
|
|
6
|
+
|
|
7
|
+
[rule]
|
|
8
|
+
author = ["Elastic"]
|
|
9
|
+
description = """
|
|
10
|
+
Identifies the attempted use of a heap-based buffer overflow vulnerability for the Sudo binary in Unix-like systems
|
|
11
|
+
(CVE-2021-3156). Successful exploitation allows an unprivileged user to escalate to the root user.
|
|
12
|
+
"""
|
|
13
|
+
false_positives = [
|
|
14
|
+
"""
|
|
15
|
+
This rule could generate false positives if the process arguments leveraged by the exploit are shared by custom
|
|
16
|
+
scripts using the Sudo or Sudoedit binaries. Only Sudo versions 1.8.2 through 1.8.31p2 and 1.9.0 through 1.9.5p1 are
|
|
17
|
+
affected; if those versions are not present on the endpoint, this could be a false positive.
|
|
18
|
+
""",
|
|
19
|
+
]
|
|
20
|
+
from = "now-9m"
|
|
21
|
+
index = ["auditbeat-*", "logs-endpoint.events.*"]
|
|
22
|
+
language = "kuery"
|
|
23
|
+
license = "Elastic License v2"
|
|
24
|
+
name = "Sudo Heap-Based Buffer Overflow Attempt"
|
|
25
|
+
references = [
|
|
26
|
+
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=2021-3156",
|
|
27
|
+
"https://blog.qualys.com/vulnerabilities-research/2021/01/26/cve-2021-3156-heap-based-buffer-overflow-in-sudo-baron-samedit",
|
|
28
|
+
"https://www.bleepingcomputer.com/news/security/latest-macos-big-sur-also-has-sudo-root-privilege-escalation-flaw",
|
|
29
|
+
"https://www.sudo.ws/alerts/unescape_overflow.html",
|
|
30
|
+
]
|
|
31
|
+
risk_score = 73
|
|
32
|
+
rule_id = "f37f3054-d40b-49ac-aa9b-a786c74c58b8"
|
|
33
|
+
severity = "high"
|
|
34
|
+
tags = [
|
|
35
|
+
"Domain: Endpoint",
|
|
36
|
+
"OS: Linux",
|
|
37
|
+
"OS: macOS",
|
|
38
|
+
"Use Case: Threat Detection",
|
|
39
|
+
"Tactic: Privilege Escalation",
|
|
40
|
+
"Use Case: Vulnerability",
|
|
41
|
+
"Data Source: Elastic Defend",
|
|
42
|
+
"Resources: Investigation Guide",
|
|
43
|
+
]
|
|
44
|
+
timestamp_override = "event.ingested"
|
|
45
|
+
type = "threshold"
|
|
46
|
+
|
|
47
|
+
query = '''
|
|
48
|
+
event.category:process and event.type:start and
|
|
49
|
+
process.name:(sudo or sudoedit) and
|
|
50
|
+
process.args:(*\\ and ("-i" or "-s"))
|
|
51
|
+
'''
|
|
52
|
+
note = """## Triage and analysis
|
|
53
|
+
|
|
54
|
+
> **Disclaimer**:
|
|
55
|
+
> This investigation guide was created using generative AI technology and has been reviewed to improve its accuracy and relevance. While every effort has been made to ensure its quality, we recommend validating the content and adapting it to suit your specific environment and operational needs.
|
|
56
|
+
|
|
57
|
+
### Investigating Sudo Heap-Based Buffer Overflow Attempt
|
|
58
|
+
|
|
59
|
+
Sudo is a critical utility in Unix-like systems, allowing users to execute commands with elevated privileges. A heap-based buffer overflow in Sudo (CVE-2021-3156) can be exploited by attackers to gain root access. Adversaries may craft specific command-line arguments to trigger this vulnerability. The detection rule identifies suspicious Sudo or Sudoedit invocations with particular argument patterns, signaling potential exploitation attempts.
|
|
60
|
+
|
|
61
|
+
### Possible investigation steps
|
|
62
|
+
|
|
63
|
+
- Review the alert details to confirm the presence of suspicious Sudo or Sudoedit invocations with the specific argument patterns: process.args containing a backslash followed by either "-i" or "-s".
|
|
64
|
+
- Examine the process execution context by gathering additional details such as the user account associated with the process, the parent process, and the command line used.
|
|
65
|
+
- Check the system logs for any other unusual or unauthorized activities around the time of the alert to identify potential lateral movement or further exploitation attempts.
|
|
66
|
+
- Investigate the history of the user account involved to determine if there have been any previous suspicious activities or privilege escalation attempts.
|
|
67
|
+
- Assess the system for any signs of compromise or unauthorized changes, such as new user accounts, modified files, or unexpected network connections.
|
|
68
|
+
- Verify the current version of Sudo installed on the system to determine if it is vulnerable to CVE-2021-3156 and consider applying patches or updates if necessary.
|
|
69
|
+
|
|
70
|
+
### False positive analysis
|
|
71
|
+
|
|
72
|
+
- Routine administrative tasks using sudo or sudoedit with interactive or shell options may trigger the rule. Review the context of these commands and consider excluding specific user accounts or scripts that are known to perform legitimate administrative functions.
|
|
73
|
+
- Automated scripts or cron jobs that use sudo with the -i or -s options for legitimate purposes can be flagged. Identify these scripts and add them to an exception list to prevent unnecessary alerts.
|
|
74
|
+
- Development or testing environments where users frequently test commands with elevated privileges might generate false positives. Implement a separate monitoring policy for these environments or exclude known test accounts.
|
|
75
|
+
- Security tools or monitoring solutions that simulate attacks for testing purposes may inadvertently trigger the rule. Ensure these tools are recognized and excluded from triggering alerts by adding them to an exception list.
|
|
76
|
+
- Users with legitimate reasons to frequently switch to root using sudo -i or sudo -s should be identified, and their activities should be monitored separately to avoid false positives.
|
|
77
|
+
|
|
78
|
+
### Response and remediation
|
|
79
|
+
|
|
80
|
+
- Immediately isolate the affected system from the network to prevent further exploitation or lateral movement by the attacker.
|
|
81
|
+
- Terminate any suspicious sudo or sudoedit processes identified by the detection rule to halt ongoing exploitation attempts.
|
|
82
|
+
- Apply the latest security patches and updates to the Sudo utility on all affected systems to remediate the vulnerability (CVE-2021-3156).
|
|
83
|
+
- Conduct a thorough review of system logs and process execution history to identify any unauthorized access or privilege escalation activities.
|
|
84
|
+
- Reset passwords for all user accounts on the affected system, especially those with elevated privileges, to mitigate potential credential compromise.
|
|
85
|
+
- Escalate the incident to the security operations center (SOC) or incident response team for further investigation and to assess the scope of the breach.
|
|
86
|
+
- Implement enhanced monitoring and alerting for sudo and sudoedit command executions across the network to detect similar exploitation attempts in the future."""
|
|
87
|
+
|
|
88
|
+
|
|
89
|
+
[[rule.threat]]
|
|
90
|
+
framework = "MITRE ATT&CK"
|
|
91
|
+
[[rule.threat.technique]]
|
|
92
|
+
id = "T1068"
|
|
93
|
+
name = "Exploitation for Privilege Escalation"
|
|
94
|
+
reference = "https://attack.mitre.org/techniques/T1068/"
|
|
95
|
+
|
|
96
|
+
|
|
97
|
+
[rule.threat.tactic]
|
|
98
|
+
id = "TA0004"
|
|
99
|
+
name = "Privilege Escalation"
|
|
100
|
+
reference = "https://attack.mitre.org/tactics/TA0004/"
|
|
101
|
+
|
|
102
|
+
[rule.threshold]
|
|
103
|
+
field = ["host.hostname"]
|
|
104
|
+
value = 100
|
|
105
|
+
|
|
@@ -0,0 +1,91 @@
|
|
|
1
|
+
[metadata]
|
|
2
|
+
creation_date = "2020/04/13"
|
|
3
|
+
integration = ["endpoint"]
|
|
4
|
+
maturity = "production"
|
|
5
|
+
updated_date = "2025/07/14"
|
|
6
|
+
|
|
7
|
+
[rule]
|
|
8
|
+
author = ["Elastic"]
|
|
9
|
+
description = """
|
|
10
|
+
A sudoers file specifies the commands that users or groups can run and from which terminals. Adversaries can take
|
|
11
|
+
advantage of these configurations to execute commands as other users or spawn processes with higher privileges.
|
|
12
|
+
"""
|
|
13
|
+
from = "now-9m"
|
|
14
|
+
index = ["auditbeat-*", "logs-endpoint.events.*"]
|
|
15
|
+
language = "eql"
|
|
16
|
+
license = "Elastic License v2"
|
|
17
|
+
name = "Sudoers File Modification"
|
|
18
|
+
references = ["https://www.elastic.co/security-labs/primer-on-persistence-mechanisms"]
|
|
19
|
+
risk_score = 47
|
|
20
|
+
rule_id = "931e25a5-0f5e-4ae0-ba0d-9e94eff7e3a4"
|
|
21
|
+
severity = "medium"
|
|
22
|
+
tags = [
|
|
23
|
+
"Domain: Endpoint",
|
|
24
|
+
"OS: Linux",
|
|
25
|
+
"OS: macOS",
|
|
26
|
+
"Use Case: Threat Detection",
|
|
27
|
+
"Tactic: Privilege Escalation",
|
|
28
|
+
"Data Source: Elastic Defend",
|
|
29
|
+
"Resources: Investigation Guide",
|
|
30
|
+
]
|
|
31
|
+
timestamp_override = "event.ingested"
|
|
32
|
+
type = "eql"
|
|
33
|
+
query = '''
|
|
34
|
+
file where host.os.type in ("linux", "macos") and event.type in ("creation", "change") and
|
|
35
|
+
file.path like ("/etc/sudoers*", "/private/etc/sudoers*") and not (
|
|
36
|
+
process.name in ("dpkg", "platform-python", "puppet", "yum", "dnf") or
|
|
37
|
+
process.executable in ("/opt/chef/embedded/bin/ruby", "/opt/puppetlabs/puppet/bin/ruby", "/usr/bin/dockerd")
|
|
38
|
+
)
|
|
39
|
+
'''
|
|
40
|
+
note = """## Triage and analysis
|
|
41
|
+
|
|
42
|
+
> **Disclaimer**:
|
|
43
|
+
> This investigation guide was created using generative AI technology and has been reviewed to improve its accuracy and relevance. While every effort has been made to ensure its quality, we recommend validating the content and adapting it to suit your specific environment and operational needs.
|
|
44
|
+
|
|
45
|
+
### Investigating Sudoers File Modification
|
|
46
|
+
|
|
47
|
+
The sudoers file is crucial in Unix-like systems, defining user permissions for executing commands with elevated privileges. Adversaries may exploit this by altering the file to gain unauthorized access or escalate privileges. The detection rule identifies suspicious changes to the sudoers file, excluding legitimate processes, to flag potential privilege escalation attempts.
|
|
48
|
+
|
|
49
|
+
### Possible investigation steps
|
|
50
|
+
|
|
51
|
+
- Review the alert details to identify the specific file path that triggered the alert, focusing on /etc/sudoers* or /private/etc/sudoers*.
|
|
52
|
+
- Examine the process information associated with the change event, particularly the process.name and process.executable fields, to determine if the modification was made by a suspicious or unauthorized process.
|
|
53
|
+
- Check the user account associated with the process that made the change to the sudoers file to assess if the account has a legitimate reason to modify the file.
|
|
54
|
+
- Investigate recent login activity and user behavior for the account involved in the modification to identify any anomalies or signs of compromise.
|
|
55
|
+
- Review system logs around the time of the alert to gather additional context on what other activities occurred on the system, which might indicate a broader attack or compromise.
|
|
56
|
+
- Assess the current state of the sudoers file to identify any unauthorized or suspicious entries that could indicate privilege escalation attempts.
|
|
57
|
+
|
|
58
|
+
### False positive analysis
|
|
59
|
+
|
|
60
|
+
- System updates and package installations can trigger changes to the sudoers file. Exclude processes like dpkg, yum, dnf, and platform-python from triggering alerts as they are commonly involved in legitimate updates.
|
|
61
|
+
- Configuration management tools such as Puppet and Chef may modify the sudoers file as part of their normal operations. Exclude process executables like /opt/chef/embedded/bin/ruby and /opt/puppetlabs/puppet/bin/ruby to prevent false positives.
|
|
62
|
+
- Docker daemon processes might interact with the sudoers file during container operations. Exclude /usr/bin/dockerd to avoid unnecessary alerts related to Docker activities.
|
|
63
|
+
- Regularly review and update the exclusion list to ensure it reflects the current environment and operational tools, minimizing false positives while maintaining security vigilance.
|
|
64
|
+
|
|
65
|
+
### Response and remediation
|
|
66
|
+
|
|
67
|
+
- Immediately isolate the affected system from the network to prevent further unauthorized access or privilege escalation.
|
|
68
|
+
- Review the recent changes to the sudoers file to identify unauthorized modifications and revert them to the last known good configuration.
|
|
69
|
+
- Conduct a thorough examination of system logs to identify any unauthorized access or actions performed using elevated privileges, focusing on the time frame of the detected change.
|
|
70
|
+
- Reset passwords and review access permissions for all users with sudo privileges to ensure no unauthorized accounts have been added or existing accounts have been compromised.
|
|
71
|
+
- Escalate the incident to the security operations team for further investigation and to determine if additional systems have been affected.
|
|
72
|
+
- Implement additional monitoring on the affected system and similar systems to detect any further attempts to modify the sudoers file or other privilege escalation activities.
|
|
73
|
+
- Review and update security policies and configurations to prevent similar incidents, ensuring that only authorized processes can modify the sudoers file."""
|
|
74
|
+
|
|
75
|
+
[[rule.threat]]
|
|
76
|
+
framework = "MITRE ATT&CK"
|
|
77
|
+
|
|
78
|
+
[[rule.threat.technique]]
|
|
79
|
+
id = "T1548"
|
|
80
|
+
name = "Abuse Elevation Control Mechanism"
|
|
81
|
+
reference = "https://attack.mitre.org/techniques/T1548/"
|
|
82
|
+
|
|
83
|
+
[[rule.threat.technique.subtechnique]]
|
|
84
|
+
id = "T1548.003"
|
|
85
|
+
name = "Sudo and Sudo Caching"
|
|
86
|
+
reference = "https://attack.mitre.org/techniques/T1548/003/"
|
|
87
|
+
|
|
88
|
+
[rule.threat.tactic]
|
|
89
|
+
id = "TA0004"
|
|
90
|
+
name = "Privilege Escalation"
|
|
91
|
+
reference = "https://attack.mitre.org/tactics/TA0004/"
|
|
@@ -0,0 +1,121 @@
|
|
|
1
|
+
[metadata]
|
|
2
|
+
creation_date = "2025/11/19"
|
|
3
|
+
integration = ["network_traffic", "nginx", "apache", "apache_tomcat", "iis"]
|
|
4
|
+
maturity = "production"
|
|
5
|
+
updated_date = "2025/11/24"
|
|
6
|
+
|
|
7
|
+
[rule]
|
|
8
|
+
author = ["Elastic"]
|
|
9
|
+
description = """
|
|
10
|
+
This rule detects potential web server discovery or fuzzing activity by identifying a high volume of HTTP GET requests resulting
|
|
11
|
+
in 404 or 403 status codes from a single source IP address within a short timeframe. Such patterns may indicate that an attacker
|
|
12
|
+
is attempting to discover hidden or unlinked resources on a web server, which can be a precursor to more targeted attacks.
|
|
13
|
+
"""
|
|
14
|
+
from = "now-9m"
|
|
15
|
+
interval = "10m"
|
|
16
|
+
language = "esql"
|
|
17
|
+
license = "Elastic License v2"
|
|
18
|
+
name = "Web Server Discovery or Fuzzing Activity"
|
|
19
|
+
note = """ ## Triage and analysis
|
|
20
|
+
|
|
21
|
+
> **Disclaimer**:
|
|
22
|
+
> This investigation guide was created using generative AI technology and has been reviewed to improve its accuracy and relevance. While every effort has been made to ensure its quality, we recommend validating the content and adapting it to suit your specific environment and operational needs.
|
|
23
|
+
|
|
24
|
+
### Investigating Web Server Discovery or Fuzzing Activity
|
|
25
|
+
|
|
26
|
+
This rule flags a single origin generating a rapid burst of GET requests that produce many 404/403 responses, a hallmark of automated web discovery or fuzzing. Attackers commonly run wordlist-driven enumeration to probe paths such as /admin/, /login, /backup.zip, /.env, /.git/, and undocumented API routes, gauging which resources exist and where access controls fail. Detecting this reconnaissance early helps prevent subsequent targeted exploitation of newly found endpoints and weak authentication flows.
|
|
27
|
+
|
|
28
|
+
### Possible investigation steps
|
|
29
|
+
|
|
30
|
+
- Correlate user-agent, TLS JA3/JA4, Host/SNI, and X-Forwarded-For to fingerprint the client, identify common fuzzing tools or disguised automation, and recover the true origin if traffic traversed a CDN or proxy.
|
|
31
|
+
- Summarize the top requested paths and response codes for this source to spot any 2xx or 401 outcomes amid the denials, flagging hits on sensitive locations such as /.env, /.git, /admin interfaces, backups, installer scripts, and undocumented API routes.
|
|
32
|
+
- Pivot to the same timeframe for adjacent web and authentication activity from this origin to see whether POSTs, credential attempts, or parameterized requests followed the enumeration, indicating progression toward exploitation or spraying.
|
|
33
|
+
- Review WAF/CDN and reverse-proxy logs for blocks, challenges, or rate limiting and whether multiple virtual hosts were targeted via the Host header, confirming if and how far requests reached the application tier.
|
|
34
|
+
- Validate whether the source aligns with approved internal scanners or scheduled testing via inventories and change records, and if not, enrich with ASN/geolocation, reverse DNS, and threat intel to assess reputation and recurrence across your estate.
|
|
35
|
+
|
|
36
|
+
### False positive analysis
|
|
37
|
+
|
|
38
|
+
- An internal QA link checker or monitoring crawler run from a single host can request hundreds of unique paths and generate many 404/403 GETs when routes, assets, or permissions are misconfigured.
|
|
39
|
+
- A shared egress IP (NAT or corporate proxy) aggregating many users during a faulty deployment can trigger high volumes of 404/403 GETs as browsers collectively hit moved or newly restricted resources.
|
|
40
|
+
|
|
41
|
+
### Response and remediation
|
|
42
|
+
|
|
43
|
+
- Immediately rate-limit or block the offending source IP at the WAF/CDN and reverse proxy, applying a challenge or temporary ban to the observed User-Agent and JA3/JA4 fingerprint driving the 500+ unique-path 404/403 GET burst.
|
|
44
|
+
- If traffic came through a proxy or CDN, use X-Forwarded-For to identify and block the true origin, and add a temporary ASN or geolocation block if the source aligns with known scanner networks.
|
|
45
|
+
- Verify whether the source is an approved internal scanner; if not, disable the job or container, remove any scheduled tasks and API keys used, and notify the owner to stop testing against production immediately.
|
|
46
|
+
- Review the requested path list to identify any 2xx or 401 hits and remediate exposures such as accessible /.env, /.git, /admin interfaces, backup archives, or installer scripts by removing files, disabling endpoints, and rotating secrets.
|
|
47
|
+
- Escalate to incident response if enumeration persists after blocking, pivots to POSTs or credential attempts, originates from rotating IPs (Tor/VPN/residential), or produces 2xx on sensitive endpoints despite WAF rules.
|
|
48
|
+
- Harden the web tier by enabling per-IP rate limiting and bot challenges, turning off directory listing and default app endpoints, blocking patterns like /.git/, /.env, and /backup.zip at the WAF, and restricting origin access to CDN egress only.
|
|
49
|
+
"""
|
|
50
|
+
risk_score = 21
|
|
51
|
+
rule_id = "8383a8d0-008b-47a5-94e5-496629dc3590"
|
|
52
|
+
severity = "low"
|
|
53
|
+
tags = [
|
|
54
|
+
"Domain: Web",
|
|
55
|
+
"Domain: Network",
|
|
56
|
+
"Use Case: Threat Detection",
|
|
57
|
+
"Tactic: Reconnaissance",
|
|
58
|
+
"Data Source: Network Packet Capture",
|
|
59
|
+
"Data Source: Nginx",
|
|
60
|
+
"Data Source: Apache",
|
|
61
|
+
"Data Source: Apache Tomcat",
|
|
62
|
+
"Data Source: IIS",
|
|
63
|
+
"Resources: Investigation Guide",
|
|
64
|
+
]
|
|
65
|
+
timestamp_override = "event.ingested"
|
|
66
|
+
type = "esql"
|
|
67
|
+
query = '''
|
|
68
|
+
from logs-network_traffic.http-*, logs-network_traffic.tls-*, logs-nginx.access-*, logs-apache.access-*, logs-apache_tomcat.access-*, logs-iis.access-*
|
|
69
|
+
| where
|
|
70
|
+
(url.original is not null or url.full is not null) and
|
|
71
|
+
http.request.method == "GET" and
|
|
72
|
+
http.response.status_code in (404, 403)
|
|
73
|
+
|
|
74
|
+
| eval Esql.url_text = case(url.original is not null, url.original, url.full)
|
|
75
|
+
| eval Esql.url_lower = to_lower(Esql.url_text)
|
|
76
|
+
|
|
77
|
+
| keep
|
|
78
|
+
@timestamp,
|
|
79
|
+
event.dataset,
|
|
80
|
+
http.request.method,
|
|
81
|
+
http.response.status_code,
|
|
82
|
+
source.ip,
|
|
83
|
+
agent.id,
|
|
84
|
+
host.name,
|
|
85
|
+
Esql.url_lower
|
|
86
|
+
| stats
|
|
87
|
+
Esql.event_count = count(),
|
|
88
|
+
Esql.url_lower_count_distinct = count_distinct(Esql.url_lower),
|
|
89
|
+
Esql.host_name_values = values(host.name),
|
|
90
|
+
Esql.agent_id_values = values(agent.id),
|
|
91
|
+
Esql.http_request_method_values = values(http.request.method),
|
|
92
|
+
Esql.http_response_status_code_values = values(http.response.status_code),
|
|
93
|
+
Esql.url_path_values = values(Esql.url_lower),
|
|
94
|
+
Esql.event_dataset_values = values(event.dataset)
|
|
95
|
+
by source.ip
|
|
96
|
+
| where
|
|
97
|
+
Esql.event_count > 500 and Esql.url_lower_count_distinct > 250
|
|
98
|
+
'''
|
|
99
|
+
|
|
100
|
+
[[rule.threat]]
|
|
101
|
+
framework = "MITRE ATT&CK"
|
|
102
|
+
|
|
103
|
+
[[rule.threat.technique]]
|
|
104
|
+
id = "T1595"
|
|
105
|
+
name = "Active Scanning"
|
|
106
|
+
reference = "https://attack.mitre.org/techniques/T1595/"
|
|
107
|
+
|
|
108
|
+
[[rule.threat.technique.subtechnique]]
|
|
109
|
+
id = "T1595.002"
|
|
110
|
+
name = "Vulnerability Scanning"
|
|
111
|
+
reference = "https://attack.mitre.org/techniques/T1595/002/"
|
|
112
|
+
|
|
113
|
+
[[rule.threat.technique.subtechnique]]
|
|
114
|
+
id = "T1595.003"
|
|
115
|
+
name = "Wordlist Scanning"
|
|
116
|
+
reference = "https://attack.mitre.org/techniques/T1595/003/"
|
|
117
|
+
|
|
118
|
+
[rule.threat.tactic]
|
|
119
|
+
id = "TA0043"
|
|
120
|
+
name = "Reconnaissance"
|
|
121
|
+
reference = "https://attack.mitre.org/tactics/TA0043/"
|
nldcsc_elastic_rules/rules/cross-platform/reconnaissance_web_server_unusual_spike_in_error_logs.toml
ADDED
|
@@ -0,0 +1,107 @@
|
|
|
1
|
+
[metadata]
|
|
2
|
+
creation_date = "2025/11/19"
|
|
3
|
+
integration = ["nginx", "apache", "apache_tomcat", "iis"]
|
|
4
|
+
maturity = "production"
|
|
5
|
+
updated_date = "2025/11/25"
|
|
6
|
+
|
|
7
|
+
[rule]
|
|
8
|
+
author = ["Elastic"]
|
|
9
|
+
description = """
|
|
10
|
+
This rule detects unusual spikes in error logs from web servers, which may indicate reconnaissance activities such
|
|
11
|
+
as vulnerability scanning or fuzzing attempts by adversaries. These activities often generate a high volume of error
|
|
12
|
+
responses as they probe for weaknesses in web applications. Error response codes may potentially indicate server-side
|
|
13
|
+
issues that could be exploited.
|
|
14
|
+
"""
|
|
15
|
+
from = "now-9m"
|
|
16
|
+
interval = "10m"
|
|
17
|
+
language = "esql"
|
|
18
|
+
license = "Elastic License v2"
|
|
19
|
+
name = "Potential Spike in Web Server Error Logs"
|
|
20
|
+
note = """ ## Triage and analysis
|
|
21
|
+
|
|
22
|
+
> **Disclaimer**:
|
|
23
|
+
> This investigation guide was created using generative AI technology and has been reviewed to improve its accuracy and relevance. While every effort has been made to ensure its quality, we recommend validating the content and adapting it to suit your specific environment and operational needs.
|
|
24
|
+
|
|
25
|
+
### Investigating Potential Spike in Web Server Error Logs
|
|
26
|
+
|
|
27
|
+
This detection flags spikes of web server error responses across HTTP/TLS and common server platforms, signaling active scanning or fuzzing that can expose misconfigurations or exploitable paths. A typical pattern is an automated scanner sweeping endpoints like /admin/, /debug/, /.env, /.git, and backup archives while mutating query parameters, producing repeated 404/403 and occasional 500 responses across multiple applications within minutes.
|
|
28
|
+
|
|
29
|
+
### Possible investigation steps
|
|
30
|
+
|
|
31
|
+
- Pivot on the noisy client IP(s) to build a minute-by-minute timeline across affected hosts showing request rate, status codes, methods, and top paths to distinguish automated scanning from a localized application failure.
|
|
32
|
+
- Enrich the client with ASN, geolocation, hosting/Tor/proxy reputation, historical sightings, and maintenance windows to quickly decide if it matches a known external scanner or an internal scheduled test.
|
|
33
|
+
- Aggregate the most requested URIs and verbs and look for telltale patterns such as /.env, /.git, backup archives, admin consoles, or unusual verbs like PROPFIND/TRACE, then correlate any 5xx bursts with application and server error logs and recent deploys or config changes.
|
|
34
|
+
- Hunt for follow-on success from the same client by checking for subsequent 200/302s to sensitive paths, authentication events and session creation, or evidence of file writes and suspicious child processes on the web hosts.
|
|
35
|
+
- If traffic traverses a CDN/WAF/load balancer, pivot to those logs to recover true client IPs, review rule matches and throttling, and determine whether similar patterns occurred across multiple edges or regions.
|
|
36
|
+
|
|
37
|
+
### False positive analysis
|
|
38
|
+
|
|
39
|
+
- Internal QA or integration tests that systematically crawl application routes after a deployment can generate bursts of 404/403 and occasional 500s from a single client IP, closely resembling active scanning.
|
|
40
|
+
- A transient backend outage or misconfiguration (broken asset paths or auth flows) can cause legitimate traffic to return many errors aggregated under a shared egress IP (NAT), pushing per-IP counts above the threshold without adversary activity.
|
|
41
|
+
|
|
42
|
+
### Response and remediation
|
|
43
|
+
|
|
44
|
+
- Immediately block or throttle the noisy client IPs at the WAF/CDN and load balancer by enabling per-IP rate limits and signatures for scanner patterns such as repeated hits to /.env, /.git, /admin, backup archives, or unusual verbs like PROPFIND/TRACE.
|
|
45
|
+
- If errors include concentrated 5xx responses from one web host, drain that node from service behind the load balancer, capture its web and application error logs, and roll back the most recent deploy or config change until error rates normalize.
|
|
46
|
+
- Remove risky exposures uncovered by the scan by denying access to environment files and VCS directories (.env, .git), disabling directory listing, locking down admin consoles, and rejecting unsupported HTTP methods at the web server.
|
|
47
|
+
- Escalate to Incident Response if the same client shifts from errors to successful access on sensitive endpoints (200/302 to /admin, /login, or API keys), if you observe file writes under the webroot or suspicious child processes, or if multiple unrelated clients show the same pattern across regions.
|
|
48
|
+
- Recover service by redeploying known-good builds, re-enabling health checks, running smoke tests against top routes, and restoring normal WAF/CDN policies while keeping a temporary blocklist for the offending IPs.
|
|
49
|
+
- Harden long term by tuning WAF/CDN to auto-throttle bursty 404/403/500 patterns, disabling TRACE/OPTIONS where unused, minimizing verbose error pages, and ensuring logs capture the true client IP via X-Forwarded-For or True-Client-IP headers.
|
|
50
|
+
"""
|
|
51
|
+
risk_score = 21
|
|
52
|
+
rule_id = "6631a759-4559-4c33-a392-13f146c8bcc4"
|
|
53
|
+
severity = "low"
|
|
54
|
+
tags = [
|
|
55
|
+
"Domain: Web",
|
|
56
|
+
"Use Case: Threat Detection",
|
|
57
|
+
"Tactic: Reconnaissance",
|
|
58
|
+
"Data Source: Nginx",
|
|
59
|
+
"Data Source: Apache",
|
|
60
|
+
"Data Source: Apache Tomcat",
|
|
61
|
+
"Data Source: IIS",
|
|
62
|
+
"Resources: Investigation Guide",
|
|
63
|
+
]
|
|
64
|
+
timestamp_override = "event.ingested"
|
|
65
|
+
type = "esql"
|
|
66
|
+
query = '''
|
|
67
|
+
from logs-nginx.error-*, logs-apache_tomcat.error-*, logs-apache.error-*, logs-iis.error-*
|
|
68
|
+
| keep
|
|
69
|
+
@timestamp,
|
|
70
|
+
event.type,
|
|
71
|
+
event.dataset,
|
|
72
|
+
source.ip,
|
|
73
|
+
agent.id,
|
|
74
|
+
host.name
|
|
75
|
+
| where source.ip is not null
|
|
76
|
+
| stats
|
|
77
|
+
Esql.event_count = count(),
|
|
78
|
+
Esql.host_name_values = values(host.name),
|
|
79
|
+
Esql.agent_id_values = values(agent.id),
|
|
80
|
+
Esql.event_dataset_values = values(event.dataset)
|
|
81
|
+
by source.ip, agent.id
|
|
82
|
+
| where
|
|
83
|
+
Esql.event_count > 25
|
|
84
|
+
'''
|
|
85
|
+
|
|
86
|
+
[[rule.threat]]
|
|
87
|
+
framework = "MITRE ATT&CK"
|
|
88
|
+
|
|
89
|
+
[[rule.threat.technique]]
|
|
90
|
+
id = "T1595"
|
|
91
|
+
name = "Active Scanning"
|
|
92
|
+
reference = "https://attack.mitre.org/techniques/T1595/"
|
|
93
|
+
|
|
94
|
+
[[rule.threat.technique.subtechnique]]
|
|
95
|
+
id = "T1595.002"
|
|
96
|
+
name = "Vulnerability Scanning"
|
|
97
|
+
reference = "https://attack.mitre.org/techniques/T1595/002/"
|
|
98
|
+
|
|
99
|
+
[[rule.threat.technique.subtechnique]]
|
|
100
|
+
id = "T1595.003"
|
|
101
|
+
name = "Wordlist Scanning"
|
|
102
|
+
reference = "https://attack.mitre.org/techniques/T1595/003/"
|
|
103
|
+
|
|
104
|
+
[rule.threat.tactic]
|
|
105
|
+
id = "TA0043"
|
|
106
|
+
name = "Reconnaissance"
|
|
107
|
+
reference = "https://attack.mitre.org/tactics/TA0043/"
|
|
@@ -0,0 +1,127 @@
|
|
|
1
|
+
[metadata]
|
|
2
|
+
creation_date = "2025/11/19"
|
|
3
|
+
integration = ["network_traffic", "nginx", "apache", "apache_tomcat", "iis"]
|
|
4
|
+
maturity = "production"
|
|
5
|
+
updated_date = "2025/11/24"
|
|
6
|
+
|
|
7
|
+
[rule]
|
|
8
|
+
author = ["Elastic"]
|
|
9
|
+
description = """
|
|
10
|
+
This rule detects unusual spikes in error response codes (500, 502, 503, 504) from web servers, which may indicate
|
|
11
|
+
reconnaissance activities such as vulnerability scanning or fuzzing attempts by adversaries. These activities often
|
|
12
|
+
generate a high volume of error responses as they probe for weaknesses in web applications. Error response codes
|
|
13
|
+
may potentially indicate server-side issues that could be exploited.
|
|
14
|
+
"""
|
|
15
|
+
from = "now-9m"
|
|
16
|
+
interval = "10m"
|
|
17
|
+
language = "esql"
|
|
18
|
+
license = "Elastic License v2"
|
|
19
|
+
name = "Web Server Potential Spike in Error Response Codes"
|
|
20
|
+
note = """ ## Triage and analysis
|
|
21
|
+
|
|
22
|
+
> **Disclaimer**:
|
|
23
|
+
> This investigation guide was created using generative AI technology and has been reviewed to improve its accuracy and relevance. While every effort has been made to ensure its quality, we recommend validating the content and adapting it to suit your specific environment and operational needs.
|
|
24
|
+
|
|
25
|
+
### Investigating Web Server Potential Spike in Error Response Codes
|
|
26
|
+
|
|
27
|
+
This rule detects bursts of 5xx errors (500–504) from GET traffic, highlighting abnormal server behavior that accompanies active scanning or fuzzing and exposes fragile code paths or misconfigured proxies. Attackers sweep common and generated endpoints while mutating query params and headers—path traversal, template syntax, large payloads—to repeatedly force backend exceptions and gateway timeouts, enumerate which routes fail, and pinpoint inputs that leak stack traces or crash components for follow-on exploitation.
|
|
28
|
+
|
|
29
|
+
### Possible investigation steps
|
|
30
|
+
|
|
31
|
+
- Plot error rates per minute by server and client around the alert window to confirm the spike, determine scope, and separate a single noisy client from a platform-wide issue.
|
|
32
|
+
- Aggregate the failing URL paths and query strings from the flagged client and look for enumeration sequences, traversal encoding, template injection markers, or oversized inputs indicative of fuzzing.
|
|
33
|
+
- Examine User-Agent, Referer, header mix, and TLS JA3 for generic scanner signatures or reuse across multiple clients, and enrich the originating IP with reputation and hosting-provider attribution.
|
|
34
|
+
- Correlate the timeframe with reverse proxy/WAF/IDS and application error logs or stack traces to identify which routes threw exceptions or timeouts and whether they align with the client’s input patterns.
|
|
35
|
+
- Validate backend and dependency health (upstreams, databases, caches, deployments) to rule out infrastructure regressions, then compare whether only the suspicious client experiences disproportionate failures.
|
|
36
|
+
|
|
37
|
+
### False positive analysis
|
|
38
|
+
|
|
39
|
+
- A scheduled deployment or upstream dependency issue can cause normal GET traffic to fail with 502/503/504, and many users egressing through a shared NAT or reverse proxy may be aggregated as one source IP that triggers the spike.
|
|
40
|
+
- An internal health-check, load test, or site crawler running from a single host can rapidly traverse endpoints and induce 500 errors on fragile routes, mimicking scanner-like behavior without malicious intent.
|
|
41
|
+
|
|
42
|
+
### Response and remediation
|
|
43
|
+
|
|
44
|
+
- Immediately rate-limit or block the originating client(s) at the edge (reverse proxy/WAF) using the observed source IPs, User-Agent/TLS fingerprints, and the failing URL patterns generating 5xx bursts.
|
|
45
|
+
- Drain the origin upstream(s) showing repeated 500/502/503/504 on the probed routes, roll back the latest deployment or config change for those services, and disable any unstable endpoint or plugin that is crashing under input fuzzing.
|
|
46
|
+
- Restart affected application workers and proxies, purge bad cache entries, re-enable traffic gradually with canary percentage, and confirm normal response rates via synthetic checks against the previously failing URLs.
|
|
47
|
+
- Escalate to Security Operations and Incident Response if 5xx spikes persist after blocking or if error pages expose stack traces, credentials, or admin route disclosures, or if traffic originates from multiple global hosting ASNs.
|
|
48
|
+
- Deploy targeted WAF rules for path traversal and injection markers seen in the URLs, enforce per-IP and per-route rate limits, tighten upstream timeouts/circuit breakers, and replace verbose error pages with generic responses that omit stack details.
|
|
49
|
+
- Add bot management and IP reputation blocking at the CDN/edge, lock down unauthenticated access to admin/debug routes, and instrument alerts that trigger on sustained 5xx bursts per client and per route with automatic edge throttling.
|
|
50
|
+
"""
|
|
51
|
+
risk_score = 21
|
|
52
|
+
rule_id = "6fa3abe3-9cd8-41de-951b-51ed8f710523"
|
|
53
|
+
severity = "low"
|
|
54
|
+
tags = [
|
|
55
|
+
"Domain: Web",
|
|
56
|
+
"Domain: Network",
|
|
57
|
+
"Use Case: Threat Detection",
|
|
58
|
+
"Tactic: Reconnaissance",
|
|
59
|
+
"Data Source: Network Packet Capture",
|
|
60
|
+
"Data Source: Nginx",
|
|
61
|
+
"Data Source: Apache",
|
|
62
|
+
"Data Source: Apache Tomcat",
|
|
63
|
+
"Data Source: IIS",
|
|
64
|
+
"Resources: Investigation Guide",
|
|
65
|
+
]
|
|
66
|
+
timestamp_override = "event.ingested"
|
|
67
|
+
type = "esql"
|
|
68
|
+
query = '''
|
|
69
|
+
from logs-network_traffic.http-*, logs-network_traffic.tls-*, logs-nginx.access-*, logs-apache.access-*, logs-apache_tomcat.access-*, logs-iis.access-*
|
|
70
|
+
| where
|
|
71
|
+
(url.original is not null or url.full is not null) and
|
|
72
|
+
http.request.method == "GET" and
|
|
73
|
+
http.response.status_code in (
|
|
74
|
+
500, // Internal Server Error
|
|
75
|
+
502, // Bad Gateway
|
|
76
|
+
503, // Service Unavailable
|
|
77
|
+
504 // Gateway Timeout
|
|
78
|
+
)
|
|
79
|
+
| eval Esql.url_text = case(url.original is not null, url.original, url.full)
|
|
80
|
+
| eval Esql.url_lower = to_lower(Esql.url_text)
|
|
81
|
+
|
|
82
|
+
| keep
|
|
83
|
+
@timestamp,
|
|
84
|
+
event.dataset,
|
|
85
|
+
http.request.method,
|
|
86
|
+
http.response.status_code,
|
|
87
|
+
source.ip,
|
|
88
|
+
agent.id,
|
|
89
|
+
host.name,
|
|
90
|
+
Esql.url_lower
|
|
91
|
+
| stats
|
|
92
|
+
Esql.event_count = count(),
|
|
93
|
+
Esql.http_response_status_code_count = count(http.response.status_code),
|
|
94
|
+
Esql.http_response_status_code_values = values(http.response.status_code),
|
|
95
|
+
Esql.host_name_values = values(host.name),
|
|
96
|
+
Esql.agent_id_values = values(agent.id),
|
|
97
|
+
Esql.http_request_method_values = values(http.request.method),
|
|
98
|
+
Esql.http_response_status_code_values = values(http.response.status_code),
|
|
99
|
+
Esql.url_path_values = values(Esql.url_lower),
|
|
100
|
+
Esql.event_dataset_values = values(event.dataset)
|
|
101
|
+
by source.ip, agent.id
|
|
102
|
+
| where
|
|
103
|
+
Esql.http_response_status_code_count > 10
|
|
104
|
+
'''
|
|
105
|
+
|
|
106
|
+
[[rule.threat]]
|
|
107
|
+
framework = "MITRE ATT&CK"
|
|
108
|
+
|
|
109
|
+
[[rule.threat.technique]]
|
|
110
|
+
id = "T1595"
|
|
111
|
+
name = "Active Scanning"
|
|
112
|
+
reference = "https://attack.mitre.org/techniques/T1595/"
|
|
113
|
+
|
|
114
|
+
[[rule.threat.technique.subtechnique]]
|
|
115
|
+
id = "T1595.002"
|
|
116
|
+
name = "Vulnerability Scanning"
|
|
117
|
+
reference = "https://attack.mitre.org/techniques/T1595/002/"
|
|
118
|
+
|
|
119
|
+
[[rule.threat.technique.subtechnique]]
|
|
120
|
+
id = "T1595.003"
|
|
121
|
+
name = "Wordlist Scanning"
|
|
122
|
+
reference = "https://attack.mitre.org/techniques/T1595/003/"
|
|
123
|
+
|
|
124
|
+
[rule.threat.tactic]
|
|
125
|
+
id = "TA0043"
|
|
126
|
+
name = "Reconnaissance"
|
|
127
|
+
reference = "https://attack.mitre.org/tactics/TA0043/"
|