nldcsc-elastic-rules 0.0.8__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- nldcsc_elastic_rules/__init__.py +1 -0
- nldcsc_elastic_rules/rules/README.md +31 -0
- nldcsc_elastic_rules/rules/_deprecated/apm_null_user_agent.toml +49 -0
- nldcsc_elastic_rules/rules/_deprecated/command_and_control_connection_attempt_by_non_ssh_root_session.toml +85 -0
- nldcsc_elastic_rules/rules/_deprecated/command_and_control_dns_directly_to_the_internet.toml +85 -0
- nldcsc_elastic_rules/rules/_deprecated/command_and_control_ftp_file_transfer_protocol_activity_to_the_internet.toml +77 -0
- nldcsc_elastic_rules/rules/_deprecated/command_and_control_irc_internet_relay_chat_protocol_activity_to_the_internet.toml +76 -0
- nldcsc_elastic_rules/rules/_deprecated/command_and_control_linux_iodine_activity.toml +60 -0
- nldcsc_elastic_rules/rules/_deprecated/command_and_control_linux_port_knocking_reverse_connection.toml +110 -0
- nldcsc_elastic_rules/rules/_deprecated/command_and_control_port_8000_activity_to_the_internet.toml +63 -0
- nldcsc_elastic_rules/rules/_deprecated/command_and_control_pptp_point_to_point_tunneling_protocol_activity.toml +46 -0
- nldcsc_elastic_rules/rules/_deprecated/command_and_control_proxy_port_activity_to_the_internet.toml +66 -0
- nldcsc_elastic_rules/rules/_deprecated/command_and_control_smtp_to_the_internet.toml +73 -0
- nldcsc_elastic_rules/rules/_deprecated/command_and_control_sql_server_port_activity_to_the_internet.toml +62 -0
- nldcsc_elastic_rules/rules/_deprecated/command_and_control_ssh_secure_shell_from_the_internet.toml +89 -0
- nldcsc_elastic_rules/rules/_deprecated/command_and_control_ssh_secure_shell_to_the_internet.toml +64 -0
- nldcsc_elastic_rules/rules/_deprecated/command_and_control_tor_activity_to_the_internet.toml +69 -0
- nldcsc_elastic_rules/rules/_deprecated/container_workload_protection.toml +78 -0
- nldcsc_elastic_rules/rules/_deprecated/credential_access_aws_creds_search_inside_a_container.toml +101 -0
- nldcsc_elastic_rules/rules/_deprecated/credential_access_collection_sensitive_files_compression_inside_a_container.toml +144 -0
- nldcsc_elastic_rules/rules/_deprecated/credential_access_entra_signin_brute_force_microsoft_365_repeat_source.toml +121 -0
- nldcsc_elastic_rules/rules/_deprecated/credential_access_microsoft_365_potential_password_spraying_attack.toml +61 -0
- nldcsc_elastic_rules/rules/_deprecated/credential_access_potential_linux_ssh_bruteforce_root.toml +104 -0
- nldcsc_elastic_rules/rules/_deprecated/credential_access_sensitive_keys_or_passwords_search_inside_a_container.toml +109 -0
- nldcsc_elastic_rules/rules/_deprecated/credential_access_tcpdump_activity.toml +61 -0
- nldcsc_elastic_rules/rules/_deprecated/defense_evasion_attempt_to_disable_iptables_or_firewall.toml +53 -0
- nldcsc_elastic_rules/rules/_deprecated/defense_evasion_base64_encoding_or_decoding_activity.toml +51 -0
- nldcsc_elastic_rules/rules/_deprecated/defense_evasion_code_injection_conhost.toml +106 -0
- nldcsc_elastic_rules/rules/_deprecated/defense_evasion_execution_via_trusted_developer_utilities.toml +47 -0
- nldcsc_elastic_rules/rules/_deprecated/defense_evasion_hex_encoding_or_decoding_activity.toml +50 -0
- nldcsc_elastic_rules/rules/_deprecated/defense_evasion_ld_preload_env_variable_process_injection.toml +137 -0
- nldcsc_elastic_rules/rules/_deprecated/defense_evasion_ld_preload_shared_object_modified_inside_a_container.toml +96 -0
- nldcsc_elastic_rules/rules/_deprecated/defense_evasion_mshta_making_network_connections.toml +51 -0
- nldcsc_elastic_rules/rules/_deprecated/defense_evasion_potential_processherpaderping.toml +59 -0
- nldcsc_elastic_rules/rules/_deprecated/defense_evasion_whitespace_padding_in_command_line.toml +102 -0
- nldcsc_elastic_rules/rules/_deprecated/discovery_file_dir_discovery.toml +95 -0
- nldcsc_elastic_rules/rules/_deprecated/discovery_process_discovery_via_tasklist_command.toml +45 -0
- nldcsc_elastic_rules/rules/_deprecated/discovery_query_registry_via_reg.toml +44 -0
- nldcsc_elastic_rules/rules/_deprecated/discovery_suspicious_network_tool_launched_inside_a_container.toml +129 -0
- nldcsc_elastic_rules/rules/_deprecated/discovery_whoami_commmand.toml +48 -0
- nldcsc_elastic_rules/rules/_deprecated/execution_apt_binary.toml +53 -0
- nldcsc_elastic_rules/rules/_deprecated/execution_awk_binary_shell.toml +51 -0
- nldcsc_elastic_rules/rules/_deprecated/execution_busybox_binary.toml +50 -0
- nldcsc_elastic_rules/rules/_deprecated/execution_c89_c99_binary.toml +52 -0
- nldcsc_elastic_rules/rules/_deprecated/execution_command_shell_started_by_powershell.toml +45 -0
- nldcsc_elastic_rules/rules/_deprecated/execution_container_management_binary_launched_inside_a_container.toml +100 -0
- nldcsc_elastic_rules/rules/_deprecated/execution_cpulimit_binary.toml +53 -0
- nldcsc_elastic_rules/rules/_deprecated/execution_crash_binary.toml +50 -0
- nldcsc_elastic_rules/rules/_deprecated/execution_env_binary.toml +50 -0
- nldcsc_elastic_rules/rules/_deprecated/execution_expect_binary.toml +52 -0
- nldcsc_elastic_rules/rules/_deprecated/execution_file_made_executable_via_chmod_inside_a_container.toml +113 -0
- nldcsc_elastic_rules/rules/_deprecated/execution_find_binary.toml +52 -0
- nldcsc_elastic_rules/rules/_deprecated/execution_flock_binary.toml +50 -0
- nldcsc_elastic_rules/rules/_deprecated/execution_gcc_binary.toml +52 -0
- nldcsc_elastic_rules/rules/_deprecated/execution_interactive_exec_to_container.toml +127 -0
- nldcsc_elastic_rules/rules/_deprecated/execution_interactive_shell_spawned_from_inside_a_container.toml +109 -0
- nldcsc_elastic_rules/rules/_deprecated/execution_linux_process_started_in_temp_directory.toml +48 -0
- nldcsc_elastic_rules/rules/_deprecated/execution_mysql_binary.toml +52 -0
- nldcsc_elastic_rules/rules/_deprecated/execution_netcat_listener_established_inside_a_container.toml +114 -0
- nldcsc_elastic_rules/rules/_deprecated/execution_reverse_shell_via_named_pipe.toml +74 -0
- nldcsc_elastic_rules/rules/_deprecated/execution_shell_suspicious_parent_child_revshell_linux.toml +111 -0
- nldcsc_elastic_rules/rules/_deprecated/execution_ssh_binary.toml +53 -0
- nldcsc_elastic_rules/rules/_deprecated/execution_suspicious_jar_child_process.toml +113 -0
- nldcsc_elastic_rules/rules/_deprecated/execution_vi_binary.toml +50 -0
- nldcsc_elastic_rules/rules/_deprecated/execution_via_net_com_assemblies.toml +55 -0
- nldcsc_elastic_rules/rules/_deprecated/exfiltration_ec2_snapshot_change_activity.toml +111 -0
- nldcsc_elastic_rules/rules/_deprecated/exfiltration_rds_snapshot_export.toml +47 -0
- nldcsc_elastic_rules/rules/_deprecated/impact_potential_linux_ransomware_file_encryption.toml +87 -0
- nldcsc_elastic_rules/rules/_deprecated/impact_virtual_network_device_modified.toml +96 -0
- nldcsc_elastic_rules/rules/_deprecated/initial_access_cross_site_scripting.toml +49 -0
- nldcsc_elastic_rules/rules/_deprecated/initial_access_login_failures.toml +53 -0
- nldcsc_elastic_rules/rules/_deprecated/initial_access_login_location.toml +53 -0
- nldcsc_elastic_rules/rules/_deprecated/initial_access_login_sessions.toml +53 -0
- nldcsc_elastic_rules/rules/_deprecated/initial_access_login_time.toml +53 -0
- nldcsc_elastic_rules/rules/_deprecated/initial_access_rdp_remote_desktop_protocol_to_the_internet.toml +81 -0
- nldcsc_elastic_rules/rules/_deprecated/initial_access_ssh_connection_established_inside_a_container.toml +127 -0
- nldcsc_elastic_rules/rules/_deprecated/lateral_movement_malicious_remote_file_creation.toml +46 -0
- nldcsc_elastic_rules/rules/_deprecated/lateral_movement_remote_file_creation_in_sensitive_directory.toml +60 -0
- nldcsc_elastic_rules/rules/_deprecated/lateral_movement_ssh_process_launched_inside_a_container.toml +122 -0
- nldcsc_elastic_rules/rules/_deprecated/linux_mknod_activity.toml +37 -0
- nldcsc_elastic_rules/rules/_deprecated/linux_nmap_activity.toml +37 -0
- nldcsc_elastic_rules/rules/_deprecated/linux_socat_activity.toml +36 -0
- nldcsc_elastic_rules/rules/_deprecated/persistence_cron_jobs_creation_and_runtime.toml +58 -0
- nldcsc_elastic_rules/rules/_deprecated/persistence_etc_file_creation.toml +271 -0
- nldcsc_elastic_rules/rules/_deprecated/persistence_google_workspace_user_group_access_modified_to_allow_external_access.toml +85 -0
- nldcsc_elastic_rules/rules/_deprecated/persistence_kernel_module_activity.toml +53 -0
- nldcsc_elastic_rules/rules/_deprecated/persistence_shell_activity_by_web_server.toml +101 -0
- nldcsc_elastic_rules/rules/_deprecated/persistence_ssh_authorized_keys_modification_inside_a_container.toml +126 -0
- nldcsc_elastic_rules/rules/_deprecated/privilege_escalation_debugfs_launched_inside_a_privileged_container.toml +99 -0
- nldcsc_elastic_rules/rules/_deprecated/privilege_escalation_gcp_kubernetes_rolebindings_created_or_patched.toml +51 -0
- nldcsc_elastic_rules/rules/_deprecated/privilege_escalation_krbrelayup_suspicious_logon.toml +75 -0
- nldcsc_elastic_rules/rules/_deprecated/privilege_escalation_linux_strace_activity.toml +50 -0
- nldcsc_elastic_rules/rules/_deprecated/privilege_escalation_mount_launched_inside_a_privileged_container.toml +98 -0
- nldcsc_elastic_rules/rules/_deprecated/privilege_escalation_potential_container_escape_via_modified_notify_on_release_file.toml +99 -0
- nldcsc_elastic_rules/rules/_deprecated/privilege_escalation_potential_container_escape_via_modified_release_agent_file.toml +98 -0
- nldcsc_elastic_rules/rules/_deprecated/privilege_escalation_printspooler_malicious_driver_file_changes.toml +51 -0
- nldcsc_elastic_rules/rules/_deprecated/privilege_escalation_printspooler_malicious_registry_modification.toml +50 -0
- nldcsc_elastic_rules/rules/_deprecated/privilege_escalation_root_login_without_mfa.toml +104 -0
- nldcsc_elastic_rules/rules/_deprecated/privilege_escalation_setgid_bit_set_via_chmod.toml +56 -0
- nldcsc_elastic_rules/rules/_deprecated/threat_intel_filebeat7x.toml +191 -0
- nldcsc_elastic_rules/rules/_deprecated/threat_intel_filebeat8x.toml +192 -0
- nldcsc_elastic_rules/rules/_deprecated/threat_intel_fleet_integrations.toml +192 -0
- nldcsc_elastic_rules/rules/apm/apm_403_response_to_a_post.toml +69 -0
- nldcsc_elastic_rules/rules/apm/apm_405_response_method_not_allowed.toml +69 -0
- nldcsc_elastic_rules/rules/apm/apm_sqlmap_user_agent.toml +70 -0
- nldcsc_elastic_rules/rules/cross-platform/command_and_control_google_drive_malicious_file_download.toml +102 -0
- nldcsc_elastic_rules/rules/cross-platform/command_and_control_non_standard_ssh_port.toml +106 -0
- nldcsc_elastic_rules/rules/cross-platform/command_and_control_pan_elastic_defend_c2.toml +76 -0
- nldcsc_elastic_rules/rules/cross-platform/command_and_control_socks_fortigate_endpoint.toml +85 -0
- nldcsc_elastic_rules/rules/cross-platform/credential_access_cookies_chromium_browsers_debugging.toml +116 -0
- nldcsc_elastic_rules/rules/cross-platform/credential_access_forced_authentication_pipes.toml +112 -0
- nldcsc_elastic_rules/rules/cross-platform/credential_access_trufflehog_execution.toml +97 -0
- nldcsc_elastic_rules/rules/cross-platform/defense_evasion_agent_spoofing_mismatched_id.toml +81 -0
- nldcsc_elastic_rules/rules/cross-platform/defense_evasion_agent_spoofing_multiple_hosts.toml +87 -0
- nldcsc_elastic_rules/rules/cross-platform/defense_evasion_deleting_websvr_access_logs.toml +99 -0
- nldcsc_elastic_rules/rules/cross-platform/defense_evasion_deletion_of_bash_command_line_history.toml +111 -0
- nldcsc_elastic_rules/rules/cross-platform/defense_evasion_elastic_agent_service_terminated.toml +117 -0
- nldcsc_elastic_rules/rules/cross-platform/defense_evasion_encoding_rot13_python_script.toml +98 -0
- nldcsc_elastic_rules/rules/cross-platform/defense_evasion_masquerading_space_after_filename.toml +107 -0
- nldcsc_elastic_rules/rules/cross-platform/defense_evasion_timestomp_touch.toml +102 -0
- nldcsc_elastic_rules/rules/cross-platform/defense_evasion_whitespace_padding_command_line.toml +130 -0
- nldcsc_elastic_rules/rules/cross-platform/discovery_security_software_grep.toml +140 -0
- nldcsc_elastic_rules/rules/cross-platform/discovery_virtual_machine_fingerprinting_grep.toml +102 -0
- nldcsc_elastic_rules/rules/cross-platform/execution_aws_ssm_sendcommand_with_command_parameters.toml +166 -0
- nldcsc_elastic_rules/rules/cross-platform/execution_git_exploit_cve_2025_48384.toml +99 -0
- nldcsc_elastic_rules/rules/cross-platform/execution_pentest_eggshell_remote_admin_tool.toml +87 -0
- nldcsc_elastic_rules/rules/cross-platform/execution_potential_widespread_malware_infection.toml +92 -0
- nldcsc_elastic_rules/rules/cross-platform/execution_revershell_via_shell_cmd.toml +102 -0
- nldcsc_elastic_rules/rules/cross-platform/execution_suspicious_java_netcon_childproc.toml +132 -0
- nldcsc_elastic_rules/rules/cross-platform/guided_onboarding_sample_rule.toml +80 -0
- nldcsc_elastic_rules/rules/cross-platform/impact_hosts_file_modified.toml +119 -0
- nldcsc_elastic_rules/rules/cross-platform/initial_access_azure_o365_with_network_alert.toml +137 -0
- nldcsc_elastic_rules/rules/cross-platform/initial_access_exfiltration_new_usb_device_mounted.toml +117 -0
- nldcsc_elastic_rules/rules/cross-platform/initial_access_zoom_meeting_with_no_passcode.toml +85 -0
- nldcsc_elastic_rules/rules/cross-platform/multiple_alerts_different_tactics_host.toml +79 -0
- nldcsc_elastic_rules/rules/cross-platform/multiple_alerts_edr_elastic_defend_by_host.toml +97 -0
- nldcsc_elastic_rules/rules/cross-platform/multiple_alerts_elastic_defend_netsecurity_by_host.toml +105 -0
- nldcsc_elastic_rules/rules/cross-platform/multiple_alerts_email_elastic_defend_correlation.toml +82 -0
- nldcsc_elastic_rules/rules/cross-platform/multiple_alerts_involving_user.toml +82 -0
- nldcsc_elastic_rules/rules/cross-platform/multiple_alerts_risky_host_esql.toml +105 -0
- nldcsc_elastic_rules/rules/cross-platform/persistence_credential_access_modify_auth_module_or_config.toml +141 -0
- nldcsc_elastic_rules/rules/cross-platform/persistence_shell_profile_modification.toml +107 -0
- nldcsc_elastic_rules/rules/cross-platform/persistence_ssh_authorized_keys_modification.toml +144 -0
- nldcsc_elastic_rules/rules/cross-platform/persistence_web_server_potential_command_injection.toml +228 -0
- nldcsc_elastic_rules/rules/cross-platform/privilege_escalation_echo_nopasswd_sudoers.toml +90 -0
- nldcsc_elastic_rules/rules/cross-platform/privilege_escalation_setuid_setgid_bit_set_via_chmod.toml +113 -0
- nldcsc_elastic_rules/rules/cross-platform/privilege_escalation_sudo_buffer_overflow.toml +105 -0
- nldcsc_elastic_rules/rules/cross-platform/privilege_escalation_sudoers_file_mod.toml +91 -0
- nldcsc_elastic_rules/rules/cross-platform/reconnaissance_web_server_discovery_or_fuzzing_activity.toml +121 -0
- nldcsc_elastic_rules/rules/cross-platform/reconnaissance_web_server_unusual_spike_in_error_logs.toml +107 -0
- nldcsc_elastic_rules/rules/cross-platform/reconnaissance_web_server_unusual_spike_in_error_response_codes.toml +127 -0
- nldcsc_elastic_rules/rules/cross-platform/reconnaissance_web_server_unusual_user_agents.toml +165 -0
- nldcsc_elastic_rules/rules/integrations/aws/NOTICE.txt +26 -0
- nldcsc_elastic_rules/rules/integrations/aws/collection_cloudtrail_logging_created.toml +124 -0
- nldcsc_elastic_rules/rules/integrations/aws/collection_s3_unauthenticated_bucket_access_by_rare_source.toml +186 -0
- nldcsc_elastic_rules/rules/integrations/aws/credential_access_aws_getpassword_for_ec2_instance.toml +121 -0
- nldcsc_elastic_rules/rules/integrations/aws/credential_access_aws_iam_assume_role_brute_force.toml +105 -0
- nldcsc_elastic_rules/rules/integrations/aws/credential_access_iam_compromisedkeyquarantine_policy_attached_to_user.toml +106 -0
- nldcsc_elastic_rules/rules/integrations/aws/credential_access_iam_user_addition_to_group.toml +134 -0
- nldcsc_elastic_rules/rules/integrations/aws/credential_access_new_terms_secretsmanager_getsecretvalue.toml +144 -0
- nldcsc_elastic_rules/rules/integrations/aws/credential_access_rapid_secret_retrieval_attempts_from_secretsmanager.toml +156 -0
- nldcsc_elastic_rules/rules/integrations/aws/credential_access_retrieve_secure_string_parameters_via_ssm.toml +128 -0
- nldcsc_elastic_rules/rules/integrations/aws/credential_access_root_console_failure_brute_force.toml +152 -0
- nldcsc_elastic_rules/rules/integrations/aws/defense_evasion_cloudtrail_logging_deleted.toml +120 -0
- nldcsc_elastic_rules/rules/integrations/aws/defense_evasion_cloudtrail_logging_evasion.toml +126 -0
- nldcsc_elastic_rules/rules/integrations/aws/defense_evasion_cloudtrail_logging_suspended.toml +121 -0
- nldcsc_elastic_rules/rules/integrations/aws/defense_evasion_cloudwatch_alarm_deletion.toml +174 -0
- nldcsc_elastic_rules/rules/integrations/aws/defense_evasion_config_service_rule_deletion.toml +116 -0
- nldcsc_elastic_rules/rules/integrations/aws/defense_evasion_configuration_recorder_stopped.toml +94 -0
- nldcsc_elastic_rules/rules/integrations/aws/defense_evasion_ec2_flow_log_deletion.toml +129 -0
- nldcsc_elastic_rules/rules/integrations/aws/defense_evasion_ec2_network_acl_deletion.toml +119 -0
- nldcsc_elastic_rules/rules/integrations/aws/defense_evasion_elasticache_security_group_creation.toml +107 -0
- nldcsc_elastic_rules/rules/integrations/aws/defense_evasion_elasticache_security_group_modified_or_deleted.toml +107 -0
- nldcsc_elastic_rules/rules/integrations/aws/defense_evasion_guardduty_detector_deletion.toml +153 -0
- nldcsc_elastic_rules/rules/integrations/aws/defense_evasion_rds_instance_restored.toml +106 -0
- nldcsc_elastic_rules/rules/integrations/aws/defense_evasion_route53_dns_query_resolver_config_deletion.toml +100 -0
- nldcsc_elastic_rules/rules/integrations/aws/defense_evasion_s3_bucket_configuration_deletion.toml +179 -0
- nldcsc_elastic_rules/rules/integrations/aws/defense_evasion_s3_bucket_lifecycle_expiration_added.toml +201 -0
- nldcsc_elastic_rules/rules/integrations/aws/defense_evasion_s3_bucket_server_access_logging_disabled.toml +152 -0
- nldcsc_elastic_rules/rules/integrations/aws/defense_evasion_sqs_purge_queue.toml +171 -0
- nldcsc_elastic_rules/rules/integrations/aws/defense_evasion_sts_get_federation_token.toml +134 -0
- nldcsc_elastic_rules/rules/integrations/aws/defense_evasion_vpc_security_group_ingress_rule_added_for_remote_connections.toml +118 -0
- nldcsc_elastic_rules/rules/integrations/aws/defense_evasion_waf_acl_deletion.toml +101 -0
- nldcsc_elastic_rules/rules/integrations/aws/defense_evasion_waf_rule_or_rule_group_deletion.toml +102 -0
- nldcsc_elastic_rules/rules/integrations/aws/discovery_ec2_deprecated_ami_discovery.toml +141 -0
- nldcsc_elastic_rules/rules/integrations/aws/discovery_ec2_multi_region_describe_instances.toml +135 -0
- nldcsc_elastic_rules/rules/integrations/aws/discovery_ec2_multiple_discovery_api_calls_via_cli.toml +155 -0
- nldcsc_elastic_rules/rules/integrations/aws/discovery_ec2_userdata_request_for_ec2_instance.toml +152 -0
- nldcsc_elastic_rules/rules/integrations/aws/discovery_new_terms_sts_getcalleridentity.toml +139 -0
- nldcsc_elastic_rules/rules/integrations/aws/discovery_servicequotas_multi_region_service_quota_requests.toml +125 -0
- nldcsc_elastic_rules/rules/integrations/aws/execution_lambda_external_layer_added_to_function.toml +98 -0
- nldcsc_elastic_rules/rules/integrations/aws/execution_new_terms_cloudformation_createstack.toml +119 -0
- nldcsc_elastic_rules/rules/integrations/aws/execution_ssm_command_document_created_by_rare_user.toml +117 -0
- nldcsc_elastic_rules/rules/integrations/aws/execution_ssm_sendcommand_by_rare_user.toml +138 -0
- nldcsc_elastic_rules/rules/integrations/aws/exfiltration_dynamodb_scan_by_unusual_user.toml +133 -0
- nldcsc_elastic_rules/rules/integrations/aws/exfiltration_dynamodb_table_exported_to_s3.toml +115 -0
- nldcsc_elastic_rules/rules/integrations/aws/exfiltration_ec2_ami_shared_with_separate_account.toml +100 -0
- nldcsc_elastic_rules/rules/integrations/aws/exfiltration_ec2_ebs_snapshot_shared_with_another_account.toml +150 -0
- nldcsc_elastic_rules/rules/integrations/aws/exfiltration_ec2_export_task.toml +154 -0
- nldcsc_elastic_rules/rules/integrations/aws/exfiltration_ec2_full_network_packet_capture_detected.toml +185 -0
- nldcsc_elastic_rules/rules/integrations/aws/exfiltration_ec2_vm_export_failure.toml +108 -0
- nldcsc_elastic_rules/rules/integrations/aws/exfiltration_rds_snapshot_export.toml +88 -0
- nldcsc_elastic_rules/rules/integrations/aws/exfiltration_rds_snapshot_shared_with_another_account.toml +100 -0
- nldcsc_elastic_rules/rules/integrations/aws/exfiltration_s3_bucket_policy_added_for_external_account_access.toml +194 -0
- nldcsc_elastic_rules/rules/integrations/aws/exfiltration_s3_bucket_policy_added_for_public_access.toml +188 -0
- nldcsc_elastic_rules/rules/integrations/aws/exfiltration_s3_bucket_replicated_to_external_account.toml +93 -0
- nldcsc_elastic_rules/rules/integrations/aws/exfiltration_sns_rare_protocol_subscription_by_user.toml +155 -0
- nldcsc_elastic_rules/rules/integrations/aws/impact_aws_eventbridge_rule_disabled_or_deleted.toml +94 -0
- nldcsc_elastic_rules/rules/integrations/aws/impact_aws_s3_bucket_enumeration_or_brute_force.toml +152 -0
- nldcsc_elastic_rules/rules/integrations/aws/impact_cloudtrail_logging_updated.toml +137 -0
- nldcsc_elastic_rules/rules/integrations/aws/impact_cloudwatch_log_group_deletion.toml +202 -0
- nldcsc_elastic_rules/rules/integrations/aws/impact_cloudwatch_log_stream_deletion.toml +189 -0
- nldcsc_elastic_rules/rules/integrations/aws/impact_ec2_disable_ebs_encryption.toml +156 -0
- nldcsc_elastic_rules/rules/integrations/aws/impact_ec2_ebs_snapshot_access_removed.toml +147 -0
- nldcsc_elastic_rules/rules/integrations/aws/impact_efs_filesystem_or_mount_deleted.toml +95 -0
- nldcsc_elastic_rules/rules/integrations/aws/impact_iam_deactivate_mfa_device.toml +167 -0
- nldcsc_elastic_rules/rules/integrations/aws/impact_iam_group_deletion.toml +119 -0
- nldcsc_elastic_rules/rules/integrations/aws/impact_kms_cmk_disabled_or_scheduled_for_deletion.toml +103 -0
- nldcsc_elastic_rules/rules/integrations/aws/impact_rds_group_deletion.toml +98 -0
- nldcsc_elastic_rules/rules/integrations/aws/impact_rds_instance_cluster_deletion.toml +105 -0
- nldcsc_elastic_rules/rules/integrations/aws/impact_rds_instance_cluster_deletion_protection_disabled.toml +97 -0
- nldcsc_elastic_rules/rules/integrations/aws/impact_rds_instance_cluster_stoppage.toml +100 -0
- nldcsc_elastic_rules/rules/integrations/aws/impact_rds_snapshot_deleted.toml +98 -0
- nldcsc_elastic_rules/rules/integrations/aws/impact_s3_bucket_object_uploaded_with_ransom_extension.toml +155 -0
- nldcsc_elastic_rules/rules/integrations/aws/impact_s3_excessive_object_encryption_with_sse_c.toml +139 -0
- nldcsc_elastic_rules/rules/integrations/aws/impact_s3_object_encryption_with_external_key.toml +126 -0
- nldcsc_elastic_rules/rules/integrations/aws/impact_s3_object_versioning_disabled.toml +153 -0
- nldcsc_elastic_rules/rules/integrations/aws/impact_s3_static_site_js_file_uploaded.toml +154 -0
- nldcsc_elastic_rules/rules/integrations/aws/impact_s3_unusual_object_encryption_with_sse_c.toml +143 -0
- nldcsc_elastic_rules/rules/integrations/aws/initial_access_console_login_root.toml +165 -0
- nldcsc_elastic_rules/rules/integrations/aws/initial_access_iam_session_token_used_from_multiple_addresses.toml +225 -0
- nldcsc_elastic_rules/rules/integrations/aws/initial_access_kali_user_agent_detected_with_aws_cli.toml +89 -0
- nldcsc_elastic_rules/rules/integrations/aws/initial_access_password_recovery.toml +137 -0
- nldcsc_elastic_rules/rules/integrations/aws/initial_access_signin_console_login_federated_user.toml +131 -0
- nldcsc_elastic_rules/rules/integrations/aws/lateral_movement_aws_ssm_start_session_to_ec2_instance.toml +123 -0
- nldcsc_elastic_rules/rules/integrations/aws/lateral_movement_ec2_instance_connect_ssh_public_key_uploaded.toml +141 -0
- nldcsc_elastic_rules/rules/integrations/aws/lateral_movement_ec2_instance_console_login.toml +206 -0
- nldcsc_elastic_rules/rules/integrations/aws/lateral_movement_sns_topic_message_publish_by_rare_user.toml +190 -0
- nldcsc_elastic_rules/rules/integrations/aws/ml_cloudtrail_error_message_spike.toml +114 -0
- nldcsc_elastic_rules/rules/integrations/aws/ml_cloudtrail_rare_error_code.toml +116 -0
- nldcsc_elastic_rules/rules/integrations/aws/ml_cloudtrail_rare_method_by_city.toml +118 -0
- nldcsc_elastic_rules/rules/integrations/aws/ml_cloudtrail_rare_method_by_country.toml +118 -0
- nldcsc_elastic_rules/rules/integrations/aws/ml_cloudtrail_rare_method_by_user.toml +116 -0
- nldcsc_elastic_rules/rules/integrations/aws/persistence_aws_attempt_to_register_virtual_mfa_device.toml +171 -0
- nldcsc_elastic_rules/rules/integrations/aws/persistence_ec2_network_acl_creation.toml +133 -0
- nldcsc_elastic_rules/rules/integrations/aws/persistence_ec2_route_table_modified_or_deleted.toml +151 -0
- nldcsc_elastic_rules/rules/integrations/aws/persistence_ec2_security_group_configuration_change_detection.toml +144 -0
- nldcsc_elastic_rules/rules/integrations/aws/persistence_iam_api_calls_via_user_session_token.toml +173 -0
- nldcsc_elastic_rules/rules/integrations/aws/persistence_iam_create_login_profile_for_root.toml +167 -0
- nldcsc_elastic_rules/rules/integrations/aws/persistence_iam_create_user_via_assumed_role_on_ec2_instance.toml +142 -0
- nldcsc_elastic_rules/rules/integrations/aws/persistence_iam_group_creation.toml +136 -0
- nldcsc_elastic_rules/rules/integrations/aws/persistence_iam_roles_anywhere_profile_created.toml +176 -0
- nldcsc_elastic_rules/rules/integrations/aws/persistence_iam_roles_anywhere_trusted_anchor_created_with_external_ca.toml +169 -0
- nldcsc_elastic_rules/rules/integrations/aws/persistence_iam_user_created_access_keys_for_another_user.toml +215 -0
- nldcsc_elastic_rules/rules/integrations/aws/persistence_lambda_backdoor_invoke_function_for_any_principal.toml +100 -0
- nldcsc_elastic_rules/rules/integrations/aws/persistence_rds_cluster_creation.toml +110 -0
- nldcsc_elastic_rules/rules/integrations/aws/persistence_rds_db_instance_password_modified.toml +116 -0
- nldcsc_elastic_rules/rules/integrations/aws/persistence_rds_group_creation.toml +103 -0
- nldcsc_elastic_rules/rules/integrations/aws/persistence_rds_instance_creation.toml +90 -0
- nldcsc_elastic_rules/rules/integrations/aws/persistence_rds_instance_made_public.toml +110 -0
- nldcsc_elastic_rules/rules/integrations/aws/persistence_redshift_instance_creation.toml +93 -0
- nldcsc_elastic_rules/rules/integrations/aws/persistence_route_53_domain_transfer_lock_disabled.toml +107 -0
- nldcsc_elastic_rules/rules/integrations/aws/persistence_route_53_domain_transferred_to_another_account.toml +102 -0
- nldcsc_elastic_rules/rules/integrations/aws/persistence_route_53_hosted_zone_associated_with_a_vpc.toml +94 -0
- nldcsc_elastic_rules/rules/integrations/aws/persistence_route_table_created.toml +123 -0
- nldcsc_elastic_rules/rules/integrations/aws/persistence_sts_assume_role_with_new_mfa.toml +162 -0
- nldcsc_elastic_rules/rules/integrations/aws/privilege_escalation_iam_administratoraccess_policy_attached_to_group.toml +176 -0
- nldcsc_elastic_rules/rules/integrations/aws/privilege_escalation_iam_administratoraccess_policy_attached_to_role.toml +173 -0
- nldcsc_elastic_rules/rules/integrations/aws/privilege_escalation_iam_administratoraccess_policy_attached_to_user.toml +180 -0
- nldcsc_elastic_rules/rules/integrations/aws/privilege_escalation_iam_customer_managed_policy_attached_to_role.toml +140 -0
- nldcsc_elastic_rules/rules/integrations/aws/privilege_escalation_iam_saml_provider_updated.toml +163 -0
- nldcsc_elastic_rules/rules/integrations/aws/privilege_escalation_iam_update_assume_role_policy.toml +139 -0
- nldcsc_elastic_rules/rules/integrations/aws/privilege_escalation_role_assumption_by_service.toml +158 -0
- nldcsc_elastic_rules/rules/integrations/aws/privilege_escalation_role_assumption_by_user.toml +146 -0
- nldcsc_elastic_rules/rules/integrations/aws/privilege_escalation_sts_assume_root_from_rare_user_and_member_account.toml +170 -0
- nldcsc_elastic_rules/rules/integrations/aws/privilege_escalation_sts_role_chaining.toml +176 -0
- nldcsc_elastic_rules/rules/integrations/aws/resource_development_sns_topic_created_by_rare_user.toml +169 -0
- nldcsc_elastic_rules/rules/integrations/aws_bedrock/aws_bedrock_execution_without_guardrails.toml +109 -0
- nldcsc_elastic_rules/rules/integrations/aws_bedrock/aws_bedrock_guardrails_multiple_violations_by_single_user.toml +109 -0
- nldcsc_elastic_rules/rules/integrations/aws_bedrock/aws_bedrock_guardrails_multiple_violations_in_single_request.toml +118 -0
- nldcsc_elastic_rules/rules/integrations/aws_bedrock/aws_bedrock_high_confidence_misconduct_blocks_detected.toml +122 -0
- nldcsc_elastic_rules/rules/integrations/aws_bedrock/aws_bedrock_high_resource_consumption_detection.toml +117 -0
- nldcsc_elastic_rules/rules/integrations/aws_bedrock/aws_bedrock_multiple_attempts_to_use_denied_models_by_user.toml +111 -0
- nldcsc_elastic_rules/rules/integrations/aws_bedrock/aws_bedrock_multiple_sensitive_information_policy_blocks_detected.toml +108 -0
- nldcsc_elastic_rules/rules/integrations/aws_bedrock/aws_bedrock_multiple_topic_policy_blocks_detected.toml +108 -0
- nldcsc_elastic_rules/rules/integrations/aws_bedrock/aws_bedrock_multiple_validation_exception_errors_by_single_user.toml +117 -0
- nldcsc_elastic_rules/rules/integrations/aws_bedrock/aws_bedrock_multiple_word_policy_blocks_detected.toml +108 -0
- nldcsc_elastic_rules/rules/integrations/azure/collection_azure_storage_account_blob_public_access_enabled.toml +106 -0
- nldcsc_elastic_rules/rules/integrations/azure/collection_entra_auth_broker_sharepoint_access_for_user_principal.toml +131 -0
- nldcsc_elastic_rules/rules/integrations/azure/collection_graph_email_access_by_unusual_public_client_via_graph.toml +122 -0
- nldcsc_elastic_rules/rules/integrations/azure/credential_access_azure_entra_suspicious_signin.toml +164 -0
- nldcsc_elastic_rules/rules/integrations/azure/credential_access_azure_entra_totp_brute_force_attempts.toml +179 -0
- nldcsc_elastic_rules/rules/integrations/azure/credential_access_azure_full_network_packet_capture_detected.toml +96 -0
- nldcsc_elastic_rules/rules/integrations/azure/credential_access_azure_key_vault_excessive_retrieval.toml +193 -0
- nldcsc_elastic_rules/rules/integrations/azure/credential_access_azure_key_vault_retrieval_from_rare_identity.toml +142 -0
- nldcsc_elastic_rules/rules/integrations/azure/credential_access_azure_storage_account_keys_accessed.toml +129 -0
- nldcsc_elastic_rules/rules/integrations/azure/credential_access_entra_id_brute_force_activity.toml +255 -0
- nldcsc_elastic_rules/rules/integrations/azure/credential_access_entra_id_excessive_account_lockouts.toml +137 -0
- nldcsc_elastic_rules/rules/integrations/azure/credential_access_entra_signin_brute_force_microsoft_365.toml +265 -0
- nldcsc_elastic_rules/rules/integrations/azure/credential_access_storage_account_key_regenerated.toml +117 -0
- nldcsc_elastic_rules/rules/integrations/azure/defense_evasion_azure_automation_runbook_deleted.toml +83 -0
- nldcsc_elastic_rules/rules/integrations/azure/defense_evasion_azure_blob_permissions_modified.toml +97 -0
- nldcsc_elastic_rules/rules/integrations/azure/defense_evasion_azure_diagnostic_settings_deletion.toml +128 -0
- nldcsc_elastic_rules/rules/integrations/azure/defense_evasion_event_hub_deletion.toml +98 -0
- nldcsc_elastic_rules/rules/integrations/azure/defense_evasion_firewall_policy_deletion.toml +100 -0
- nldcsc_elastic_rules/rules/integrations/azure/defense_evasion_frontdoor_firewall_policy_deletion.toml +103 -0
- nldcsc_elastic_rules/rules/integrations/azure/defense_evasion_kubernetes_events_deleted.toml +98 -0
- nldcsc_elastic_rules/rules/integrations/azure/defense_evasion_network_watcher_deletion.toml +99 -0
- nldcsc_elastic_rules/rules/integrations/azure/defense_evasion_suppression_rule_created.toml +94 -0
- nldcsc_elastic_rules/rules/integrations/azure/discovery_blob_container_access_mod.toml +112 -0
- nldcsc_elastic_rules/rules/integrations/azure/discovery_bloodhound_user_agents_detected.toml +171 -0
- nldcsc_elastic_rules/rules/integrations/azure/discovery_teamfiltration_user_agents_detected.toml +173 -0
- nldcsc_elastic_rules/rules/integrations/azure/execution_azure_automation_runbook_created_or_modified.toml +92 -0
- nldcsc_elastic_rules/rules/integrations/azure/execution_command_virtual_machine.toml +96 -0
- nldcsc_elastic_rules/rules/integrations/azure/exfiltration_azure_storage_blob_download_azcopy_sas_token.toml +121 -0
- nldcsc_elastic_rules/rules/integrations/azure/impact_azure_compute_restore_point_collection_deleted.toml +111 -0
- nldcsc_elastic_rules/rules/integrations/azure/impact_azure_compute_restore_point_collections_deleted.toml +132 -0
- nldcsc_elastic_rules/rules/integrations/azure/impact_azure_compute_vm_snapshot_deletion.toml +132 -0
- nldcsc_elastic_rules/rules/integrations/azure/impact_azure_compute_vm_snapshot_deletions.toml +136 -0
- nldcsc_elastic_rules/rules/integrations/azure/impact_azure_key_vault_modified.toml +95 -0
- nldcsc_elastic_rules/rules/integrations/azure/impact_azure_storage_account_deletion.toml +110 -0
- nldcsc_elastic_rules/rules/integrations/azure/impact_azure_storage_account_deletion_multiple.toml +115 -0
- nldcsc_elastic_rules/rules/integrations/azure/impact_kubernetes_pod_deleted.toml +96 -0
- nldcsc_elastic_rules/rules/integrations/azure/impact_resource_group_deletion.toml +110 -0
- nldcsc_elastic_rules/rules/integrations/azure/initial_access_azure_active_directory_high_risk_signin_atrisk_or_confirmed.toml +102 -0
- nldcsc_elastic_rules/rules/integrations/azure/initial_access_azure_active_directory_powershell_signin.toml +125 -0
- nldcsc_elastic_rules/rules/integrations/azure/initial_access_entra_graph_single_session_from_multiple_addresses.toml +224 -0
- nldcsc_elastic_rules/rules/integrations/azure/initial_access_entra_id_actor_token_user_impersonation_abuse.toml +134 -0
- nldcsc_elastic_rules/rules/integrations/azure/initial_access_entra_id_device_code_auth_with_broker_client.toml +124 -0
- nldcsc_elastic_rules/rules/integrations/azure/initial_access_entra_id_high_risk_signin.toml +100 -0
- nldcsc_elastic_rules/rules/integrations/azure/initial_access_entra_id_oauth_user_impersonation_scope.toml +167 -0
- nldcsc_elastic_rules/rules/integrations/azure/initial_access_entra_id_protection_confirmed_compromise.toml +146 -0
- nldcsc_elastic_rules/rules/integrations/azure/initial_access_entra_id_protection_sign_in_risk_detected.toml +190 -0
- nldcsc_elastic_rules/rules/integrations/azure/initial_access_entra_id_protection_user_risk_detected.toml +187 -0
- nldcsc_elastic_rules/rules/integrations/azure/initial_access_entra_id_suspicious_oauth_flow_via_auth_broker_to_drs.toml +232 -0
- nldcsc_elastic_rules/rules/integrations/azure/initial_access_entra_id_unusual_ropc_login_attempt.toml +106 -0
- nldcsc_elastic_rules/rules/integrations/azure/initial_access_entra_id_user_reported_risk.toml +97 -0
- nldcsc_elastic_rules/rules/integrations/azure/initial_access_entra_illicit_consent_grant_via_registered_application.toml +145 -0
- nldcsc_elastic_rules/rules/integrations/azure/initial_access_entra_oauth_phishing_via_vscode_client.toml +133 -0
- nldcsc_elastic_rules/rules/integrations/azure/initial_access_entra_protection_multi_azure_identity_protection_alerts.toml +98 -0
- nldcsc_elastic_rules/rules/integrations/azure/initial_access_entra_rare_app_id_for_principal_auth.toml +148 -0
- nldcsc_elastic_rules/rules/integrations/azure/initial_access_entra_rare_authentication_requirement_for_principal_user.toml +153 -0
- nldcsc_elastic_rules/rules/integrations/azure/initial_access_external_guest_user_invite.toml +103 -0
- nldcsc_elastic_rules/rules/integrations/azure/initial_access_first_time_seen_device_code_auth.toml +140 -0
- nldcsc_elastic_rules/rules/integrations/azure/initial_access_graph_first_occurrence_of_client_request.toml +143 -0
- nldcsc_elastic_rules/rules/integrations/azure/persistence_azure_application_credential_modification.toml +104 -0
- nldcsc_elastic_rules/rules/integrations/azure/persistence_azure_automation_account_created.toml +98 -0
- nldcsc_elastic_rules/rules/integrations/azure/persistence_azure_automation_webhook_created.toml +102 -0
- nldcsc_elastic_rules/rules/integrations/azure/persistence_azure_global_administrator_role_assigned.toml +101 -0
- nldcsc_elastic_rules/rules/integrations/azure/persistence_azure_pim_user_added_global_admin.toml +101 -0
- nldcsc_elastic_rules/rules/integrations/azure/persistence_azure_privileged_identity_management_role_modified.toml +114 -0
- nldcsc_elastic_rules/rules/integrations/azure/persistence_azure_service_principal_credentials_added.toml +111 -0
- nldcsc_elastic_rules/rules/integrations/azure/persistence_entra_conditional_access_policy_modified.toml +116 -0
- nldcsc_elastic_rules/rules/integrations/azure/persistence_entra_id_mfa_disabled_for_user.toml +104 -0
- nldcsc_elastic_rules/rules/integrations/azure/persistence_entra_id_oidc_discovery_url_change.toml +105 -0
- nldcsc_elastic_rules/rules/integrations/azure/persistence_entra_id_rt_to_prt_transition_from_user_device.toml +152 -0
- nldcsc_elastic_rules/rules/integrations/azure/persistence_entra_id_suspicious_adrs_token_request.toml +99 -0
- nldcsc_elastic_rules/rules/integrations/azure/persistence_entra_id_suspicious_cloud_device_registration.toml +116 -0
- nldcsc_elastic_rules/rules/integrations/azure/persistence_entra_id_user_signed_in_from_unusual_device.toml +138 -0
- nldcsc_elastic_rules/rules/integrations/azure/persistence_entra_service_principal_created.toml +120 -0
- nldcsc_elastic_rules/rules/integrations/azure/persistence_graph_eam_addition_or_modification.toml +101 -0
- nldcsc_elastic_rules/rules/integrations/azure/persistence_identity_protect_alert_followed_by_device_reg.toml +107 -0
- nldcsc_elastic_rules/rules/integrations/azure/persistence_update_event_hub_auth_rule.toml +107 -0
- nldcsc_elastic_rules/rules/integrations/azure/persistence_user_added_as_owner_for_azure_application.toml +93 -0
- nldcsc_elastic_rules/rules/integrations/azure/persistence_user_added_as_owner_for_azure_service_principal.toml +95 -0
- nldcsc_elastic_rules/rules/integrations/azure/privilege_escalation_azure_kubernetes_rolebinding_created.toml +111 -0
- nldcsc_elastic_rules/rules/integrations/azure/privilege_escalation_azure_rbac_administrator_roles_assigned.toml +110 -0
- nldcsc_elastic_rules/rules/integrations/azure/privilege_escalation_entra_id_elevate_to_user_administrator_access.toml +116 -0
- nldcsc_elastic_rules/rules/integrations/azure_openai/azure_openai_denial_of_ml_service_detection.toml +100 -0
- nldcsc_elastic_rules/rules/integrations/azure_openai/azure_openai_insecure_output_handling_detection.toml +94 -0
- nldcsc_elastic_rules/rules/integrations/azure_openai/azure_openai_model_theft_detection.toml +100 -0
- nldcsc_elastic_rules/rules/integrations/beaconing/command_and_control_beaconing.toml +113 -0
- nldcsc_elastic_rules/rules/integrations/beaconing/command_and_control_beaconing_high_confidence.toml +108 -0
- nldcsc_elastic_rules/rules/integrations/cyberarkpas/privilege_escalation_cyberarkpas_error_audit_event_promotion.toml +70 -0
- nldcsc_elastic_rules/rules/integrations/cyberarkpas/privilege_escalation_cyberarkpas_recommended_events_to_monitor_promotion.toml +73 -0
- nldcsc_elastic_rules/rules/integrations/ded/exfiltration_ml_high_bytes_destination_geo_country_iso_code.toml +103 -0
- nldcsc_elastic_rules/rules/integrations/ded/exfiltration_ml_high_bytes_destination_ip.toml +102 -0
- nldcsc_elastic_rules/rules/integrations/ded/exfiltration_ml_high_bytes_destination_port.toml +102 -0
- nldcsc_elastic_rules/rules/integrations/ded/exfiltration_ml_high_bytes_destination_region_name.toml +103 -0
- nldcsc_elastic_rules/rules/integrations/ded/exfiltration_ml_high_bytes_written_to_external_device.toml +102 -0
- nldcsc_elastic_rules/rules/integrations/ded/exfiltration_ml_high_bytes_written_to_external_device_airdrop.toml +103 -0
- nldcsc_elastic_rules/rules/integrations/ded/exfiltration_ml_rare_process_writing_to_external_device.toml +102 -0
- nldcsc_elastic_rules/rules/integrations/dga/command_and_control_ml_dga_activity_using_sunburst_domain.toml +117 -0
- nldcsc_elastic_rules/rules/integrations/dga/command_and_control_ml_dga_high_sum_probability.toml +109 -0
- nldcsc_elastic_rules/rules/integrations/dga/command_and_control_ml_dns_request_high_dga_probability.toml +116 -0
- nldcsc_elastic_rules/rules/integrations/dga/command_and_control_ml_dns_request_predicted_to_be_a_dga_domain.toml +117 -0
- nldcsc_elastic_rules/rules/integrations/endpoint/defense_evasion_elastic_memory_threat_detected.toml +168 -0
- nldcsc_elastic_rules/rules/integrations/endpoint/defense_evasion_elastic_memory_threat_prevented.toml +167 -0
- nldcsc_elastic_rules/rules/integrations/endpoint/elastic_endpoint_security.toml +126 -0
- nldcsc_elastic_rules/rules/integrations/endpoint/elastic_endpoint_security_behavior_detected.toml +134 -0
- nldcsc_elastic_rules/rules/integrations/endpoint/elastic_endpoint_security_behavior_prevented.toml +135 -0
- nldcsc_elastic_rules/rules/integrations/endpoint/execution_elastic_malicious_file_detected.toml +159 -0
- nldcsc_elastic_rules/rules/integrations/endpoint/execution_elastic_malicious_file_prevented.toml +159 -0
- nldcsc_elastic_rules/rules/integrations/endpoint/impact_elastic_ransomware_detected.toml +145 -0
- nldcsc_elastic_rules/rules/integrations/endpoint/impact_elastic_ransomware_prevented.toml +146 -0
- nldcsc_elastic_rules/rules/integrations/fim/persistence_suspicious_file_modifications.toml +316 -0
- nldcsc_elastic_rules/rules/integrations/gcp/collection_gcp_pub_sub_subscription_creation.toml +94 -0
- nldcsc_elastic_rules/rules/integrations/gcp/collection_gcp_pub_sub_topic_creation.toml +97 -0
- nldcsc_elastic_rules/rules/integrations/gcp/defense_evasion_gcp_firewall_rule_created.toml +100 -0
- nldcsc_elastic_rules/rules/integrations/gcp/defense_evasion_gcp_firewall_rule_deleted.toml +97 -0
- nldcsc_elastic_rules/rules/integrations/gcp/defense_evasion_gcp_firewall_rule_modified.toml +100 -0
- nldcsc_elastic_rules/rules/integrations/gcp/defense_evasion_gcp_logging_bucket_deletion.toml +97 -0
- nldcsc_elastic_rules/rules/integrations/gcp/defense_evasion_gcp_logging_sink_deletion.toml +94 -0
- nldcsc_elastic_rules/rules/integrations/gcp/defense_evasion_gcp_pub_sub_subscription_deletion.toml +95 -0
- nldcsc_elastic_rules/rules/integrations/gcp/defense_evasion_gcp_pub_sub_topic_deletion.toml +96 -0
- nldcsc_elastic_rules/rules/integrations/gcp/defense_evasion_gcp_storage_bucket_configuration_modified.toml +95 -0
- nldcsc_elastic_rules/rules/integrations/gcp/defense_evasion_gcp_storage_bucket_permissions_modified.toml +95 -0
- nldcsc_elastic_rules/rules/integrations/gcp/defense_evasion_gcp_virtual_private_cloud_network_deleted.toml +100 -0
- nldcsc_elastic_rules/rules/integrations/gcp/defense_evasion_gcp_virtual_private_cloud_route_created.toml +101 -0
- nldcsc_elastic_rules/rules/integrations/gcp/defense_evasion_gcp_virtual_private_cloud_route_deleted.toml +101 -0
- nldcsc_elastic_rules/rules/integrations/gcp/exfiltration_gcp_logging_sink_modification.toml +97 -0
- nldcsc_elastic_rules/rules/integrations/gcp/impact_gcp_iam_role_deletion.toml +96 -0
- nldcsc_elastic_rules/rules/integrations/gcp/impact_gcp_service_account_deleted.toml +96 -0
- nldcsc_elastic_rules/rules/integrations/gcp/impact_gcp_service_account_disabled.toml +96 -0
- nldcsc_elastic_rules/rules/integrations/gcp/impact_gcp_storage_bucket_deleted.toml +87 -0
- nldcsc_elastic_rules/rules/integrations/gcp/initial_access_gcp_iam_custom_role_creation.toml +107 -0
- nldcsc_elastic_rules/rules/integrations/gcp/persistence_gcp_iam_service_account_key_deletion.toml +99 -0
- nldcsc_elastic_rules/rules/integrations/gcp/persistence_gcp_key_created_for_service_account.toml +100 -0
- nldcsc_elastic_rules/rules/integrations/gcp/persistence_gcp_service_account_created.toml +96 -0
- nldcsc_elastic_rules/rules/integrations/github/defense_evasion_github_protected_branch_settings_changed.toml +90 -0
- nldcsc_elastic_rules/rules/integrations/github/execution_github_app_deleted.toml +80 -0
- nldcsc_elastic_rules/rules/integrations/github/execution_github_high_number_of_cloned_repos_from_pat.toml +93 -0
- nldcsc_elastic_rules/rules/integrations/github/execution_github_ueba_multiple_behavior_alerts_from_account.toml +88 -0
- nldcsc_elastic_rules/rules/integrations/github/execution_new_github_app_installed.toml +85 -0
- nldcsc_elastic_rules/rules/integrations/github/impact_github_repository_deleted.toml +84 -0
- nldcsc_elastic_rules/rules/integrations/github/persistence_github_org_owner_added.toml +90 -0
- nldcsc_elastic_rules/rules/integrations/github/persistence_organization_owner_role_granted.toml +88 -0
- nldcsc_elastic_rules/rules/integrations/google_workspace/collection_google_drive_ownership_transferred_via_google_workspace.toml +119 -0
- nldcsc_elastic_rules/rules/integrations/google_workspace/collection_google_workspace_custom_gmail_route_created_or_modified.toml +119 -0
- nldcsc_elastic_rules/rules/integrations/google_workspace/credential_access_google_workspace_drive_encryption_key_accessed_by_anonymous_user.toml +120 -0
- nldcsc_elastic_rules/rules/integrations/google_workspace/defense_evasion_application_removed_from_blocklist_in_google_workspace.toml +125 -0
- nldcsc_elastic_rules/rules/integrations/google_workspace/defense_evasion_domain_added_to_google_workspace_trusted_domains.toml +117 -0
- nldcsc_elastic_rules/rules/integrations/google_workspace/defense_evasion_google_workspace_bitlocker_setting_disabled.toml +118 -0
- nldcsc_elastic_rules/rules/integrations/google_workspace/defense_evasion_google_workspace_new_oauth_login_from_third_party_application.toml +133 -0
- nldcsc_elastic_rules/rules/integrations/google_workspace/defense_evasion_restrictions_for_marketplace_modified_to_allow_any_app.toml +126 -0
- nldcsc_elastic_rules/rules/integrations/google_workspace/google_workspace_alert_center_promotion.toml +76 -0
- nldcsc_elastic_rules/rules/integrations/google_workspace/impact_google_workspace_admin_role_deletion.toml +112 -0
- nldcsc_elastic_rules/rules/integrations/google_workspace/impact_google_workspace_mfa_enforcement_disabled.toml +116 -0
- nldcsc_elastic_rules/rules/integrations/google_workspace/initial_access_external_user_added_to_google_workspace_group.toml +122 -0
- nldcsc_elastic_rules/rules/integrations/google_workspace/initial_access_google_workspace_suspended_user_renewed.toml +112 -0
- nldcsc_elastic_rules/rules/integrations/google_workspace/initial_access_object_copied_to_external_drive_with_app_consent.toml +134 -0
- nldcsc_elastic_rules/rules/integrations/google_workspace/persistence_application_added_to_google_workspace_domain.toml +111 -0
- nldcsc_elastic_rules/rules/integrations/google_workspace/persistence_google_workspace_2sv_policy_disabled.toml +116 -0
- nldcsc_elastic_rules/rules/integrations/google_workspace/persistence_google_workspace_admin_role_assigned_to_user.toml +125 -0
- nldcsc_elastic_rules/rules/integrations/google_workspace/persistence_google_workspace_api_access_granted_via_dwd.toml +117 -0
- nldcsc_elastic_rules/rules/integrations/google_workspace/persistence_google_workspace_custom_admin_role_created.toml +117 -0
- nldcsc_elastic_rules/rules/integrations/google_workspace/persistence_google_workspace_password_policy_modified.toml +124 -0
- nldcsc_elastic_rules/rules/integrations/google_workspace/persistence_google_workspace_role_modified.toml +119 -0
- nldcsc_elastic_rules/rules/integrations/google_workspace/persistence_google_workspace_user_organizational_unit_changed.toml +124 -0
- nldcsc_elastic_rules/rules/integrations/google_workspace/persistence_mfa_disabled_for_google_workspace_organization.toml +113 -0
- nldcsc_elastic_rules/rules/integrations/kubernetes/defense_evasion_events_deleted.toml +85 -0
- nldcsc_elastic_rules/rules/integrations/kubernetes/discovery_denied_service_account_request.toml +95 -0
- nldcsc_elastic_rules/rules/integrations/kubernetes/discovery_suspicious_self_subject_review.toml +98 -0
- nldcsc_elastic_rules/rules/integrations/kubernetes/execution_forbidden_creation_request.toml +80 -0
- nldcsc_elastic_rules/rules/integrations/kubernetes/execution_forbidden_request_from_unsual_user_agent.toml +77 -0
- nldcsc_elastic_rules/rules/integrations/kubernetes/execution_unusual_request_response_by_user_agent.toml +87 -0
- nldcsc_elastic_rules/rules/integrations/kubernetes/execution_user_exec_to_pod.toml +94 -0
- nldcsc_elastic_rules/rules/integrations/kubernetes/initial_access_anonymous_request_authorized.toml +98 -0
- nldcsc_elastic_rules/rules/integrations/kubernetes/persistence_exposed_service_created_with_type_nodeport.toml +104 -0
- nldcsc_elastic_rules/rules/integrations/kubernetes/privilege_escalation_container_created_with_excessive_linux_capabilities.toml +97 -0
- nldcsc_elastic_rules/rules/integrations/kubernetes/privilege_escalation_pod_created_with_hostipc.toml +114 -0
- nldcsc_elastic_rules/rules/integrations/kubernetes/privilege_escalation_pod_created_with_hostnetwork.toml +111 -0
- nldcsc_elastic_rules/rules/integrations/kubernetes/privilege_escalation_pod_created_with_hostpid.toml +114 -0
- nldcsc_elastic_rules/rules/integrations/kubernetes/privilege_escalation_pod_created_with_sensitive_hostpath_volume.toml +129 -0
- nldcsc_elastic_rules/rules/integrations/kubernetes/privilege_escalation_privileged_pod_created.toml +111 -0
- nldcsc_elastic_rules/rules/integrations/kubernetes/privilege_escalation_suspicious_assignment_of_controller_service_account.toml +103 -0
- nldcsc_elastic_rules/rules/integrations/lmd/lateral_movement_ml_high_mean_rdp_process_args.toml +102 -0
- nldcsc_elastic_rules/rules/integrations/lmd/lateral_movement_ml_high_mean_rdp_session_duration.toml +103 -0
- nldcsc_elastic_rules/rules/integrations/lmd/lateral_movement_ml_high_remote_file_size.toml +103 -0
- nldcsc_elastic_rules/rules/integrations/lmd/lateral_movement_ml_high_variance_rdp_session_duration.toml +103 -0
- nldcsc_elastic_rules/rules/integrations/lmd/lateral_movement_ml_rare_remote_file_directory.toml +103 -0
- nldcsc_elastic_rules/rules/integrations/lmd/lateral_movement_ml_rare_remote_file_extension.toml +102 -0
- nldcsc_elastic_rules/rules/integrations/lmd/lateral_movement_ml_spike_in_connections_from_a_source_ip.toml +103 -0
- nldcsc_elastic_rules/rules/integrations/lmd/lateral_movement_ml_spike_in_connections_to_a_destination_ip.toml +102 -0
- nldcsc_elastic_rules/rules/integrations/lmd/lateral_movement_ml_spike_in_rdp_processes.toml +101 -0
- nldcsc_elastic_rules/rules/integrations/lmd/lateral_movement_ml_spike_in_remote_file_transfers.toml +104 -0
- nldcsc_elastic_rules/rules/integrations/lmd/lateral_movement_ml_unusual_time_for_an_rdp_session.toml +103 -0
- nldcsc_elastic_rules/rules/integrations/o365/collection_microsoft_365_excessive_mail_items_accessed.toml +146 -0
- nldcsc_elastic_rules/rules/integrations/o365/collection_microsoft_365_mailbox_access_by_unusual_client_app_id.toml +195 -0
- nldcsc_elastic_rules/rules/integrations/o365/collection_microsoft_365_new_inbox_rule.toml +107 -0
- nldcsc_elastic_rules/rules/integrations/o365/collection_onedrive_excessive_file_downloads.toml +130 -0
- nldcsc_elastic_rules/rules/integrations/o365/credential_access_antra_id_device_reg_via_oauth_redirection.toml +122 -0
- nldcsc_elastic_rules/rules/integrations/o365/credential_access_microsoft_365_excessive_account_lockouts.toml +155 -0
- nldcsc_elastic_rules/rules/integrations/o365/credential_access_microsoft_365_potential_user_account_brute_force.toml +181 -0
- nldcsc_elastic_rules/rules/integrations/o365/credential_access_user_excessive_sso_logon_errors.toml +97 -0
- nldcsc_elastic_rules/rules/integrations/o365/defense_evasion_microsoft_365_exchange_anti_phish_policy_deletion.toml +102 -0
- nldcsc_elastic_rules/rules/integrations/o365/defense_evasion_microsoft_365_exchange_anti_phish_rule_mod.toml +102 -0
- nldcsc_elastic_rules/rules/integrations/o365/defense_evasion_microsoft_365_exchange_dkim_signing_config_disabled.toml +95 -0
- nldcsc_elastic_rules/rules/integrations/o365/defense_evasion_microsoft_365_exchange_dlp_policy_removed.toml +96 -0
- nldcsc_elastic_rules/rules/integrations/o365/defense_evasion_microsoft_365_exchange_malware_filter_policy_deletion.toml +97 -0
- nldcsc_elastic_rules/rules/integrations/o365/defense_evasion_microsoft_365_exchange_malware_filter_rule_mod.toml +96 -0
- nldcsc_elastic_rules/rules/integrations/o365/defense_evasion_microsoft_365_exchange_safe_attach_rule_disabled.toml +96 -0
- nldcsc_elastic_rules/rules/integrations/o365/defense_evasion_microsoft_365_exchange_safelinks_disabled.toml +100 -0
- nldcsc_elastic_rules/rules/integrations/o365/defense_evasion_microsoft_365_mailboxauditbypassassociation.toml +97 -0
- nldcsc_elastic_rules/rules/integrations/o365/defense_evasion_microsoft_365_new_inbox_rule_delete_or_move.toml +140 -0
- nldcsc_elastic_rules/rules/integrations/o365/defense_evasion_microsoft_365_susp_oauth2_authorization.toml +165 -0
- nldcsc_elastic_rules/rules/integrations/o365/defense_evasion_microsoft_365_teams_custom_app_interaction_allowed.toml +93 -0
- nldcsc_elastic_rules/rules/integrations/o365/defense_evasion_microsoft_365_teams_external_access_enabled.toml +91 -0
- nldcsc_elastic_rules/rules/integrations/o365/exfiltration_microsoft_365_exchange_transport_rule_creation.toml +91 -0
- nldcsc_elastic_rules/rules/integrations/o365/exfiltration_microsoft_365_exchange_transport_rule_mod.toml +92 -0
- nldcsc_elastic_rules/rules/integrations/o365/impact_microsoft_365_potential_ransomware_activity.toml +93 -0
- nldcsc_elastic_rules/rules/integrations/o365/impact_microsoft_365_unusual_volume_of_file_deletion.toml +84 -0
- nldcsc_elastic_rules/rules/integrations/o365/initial_access_defender_for_m365_threat_intelligence_signal.toml +105 -0
- nldcsc_elastic_rules/rules/integrations/o365/initial_access_entra_id_portal_login_atypical_travel.toml +132 -0
- nldcsc_elastic_rules/rules/integrations/o365/initial_access_entra_id_portal_login_impossible_travel.toml +131 -0
- nldcsc_elastic_rules/rules/integrations/o365/initial_access_microsoft_365_entra_oauth_phishing_via_vscode_client.toml +120 -0
- nldcsc_elastic_rules/rules/integrations/o365/initial_access_microsoft_365_illicit_consent_grant_via_registered_application.toml +154 -0
- nldcsc_elastic_rules/rules/integrations/o365/initial_access_microsoft_365_user_restricted_from_sending_email.toml +87 -0
- nldcsc_elastic_rules/rules/integrations/o365/initial_access_o365_user_reported_phish_malware.toml +97 -0
- nldcsc_elastic_rules/rules/integrations/o365/lateral_movement_malware_uploaded_onedrive.toml +104 -0
- nldcsc_elastic_rules/rules/integrations/o365/lateral_movement_malware_uploaded_sharepoint.toml +103 -0
- nldcsc_elastic_rules/rules/integrations/o365/persistence_exchange_suspicious_mailbox_permission_delegation.toml +140 -0
- nldcsc_elastic_rules/rules/integrations/o365/persistence_microsoft_365_exchange_management_role_assignment.toml +101 -0
- nldcsc_elastic_rules/rules/integrations/o365/persistence_microsoft_365_global_administrator_role_assign.toml +105 -0
- nldcsc_elastic_rules/rules/integrations/o365/persistence_microsoft_365_teams_guest_access_enabled.toml +91 -0
- nldcsc_elastic_rules/rules/integrations/o365/privilege_escalation_new_or_modified_federation_domain.toml +101 -0
- nldcsc_elastic_rules/rules/integrations/okta/credential_access_attempted_bypass_of_okta_mfa.toml +94 -0
- nldcsc_elastic_rules/rules/integrations/okta/credential_access_attempts_to_brute_force_okta_user_account.toml +96 -0
- nldcsc_elastic_rules/rules/integrations/okta/credential_access_multiple_auth_events_from_single_device_behind_proxy.toml +128 -0
- nldcsc_elastic_rules/rules/integrations/okta/credential_access_multiple_device_token_hashes_for_single_okta_session.toml +120 -0
- nldcsc_elastic_rules/rules/integrations/okta/credential_access_multiple_user_agent_os_authentication.toml +110 -0
- nldcsc_elastic_rules/rules/integrations/okta/credential_access_okta_authentication_for_multiple_users_from_single_source.toml +143 -0
- nldcsc_elastic_rules/rules/integrations/okta/credential_access_okta_authentication_for_multiple_users_with_the_same_device_token_hash.toml +141 -0
- nldcsc_elastic_rules/rules/integrations/okta/credential_access_okta_brute_force_or_password_spraying.toml +96 -0
- nldcsc_elastic_rules/rules/integrations/okta/credential_access_okta_mfa_bombing_via_push_notifications.toml +113 -0
- nldcsc_elastic_rules/rules/integrations/okta/credential_access_okta_multiple_device_token_hashes_for_single_user.toml +146 -0
- nldcsc_elastic_rules/rules/integrations/okta/credential_access_okta_potentially_successful_okta_bombing_via_push_notifications.toml +115 -0
- nldcsc_elastic_rules/rules/integrations/okta/credential_access_user_impersonation_access.toml +82 -0
- nldcsc_elastic_rules/rules/integrations/okta/defense_evasion_attempt_to_deactivate_okta_network_zone.toml +99 -0
- nldcsc_elastic_rules/rules/integrations/okta/defense_evasion_attempt_to_delete_okta_network_zone.toml +99 -0
- nldcsc_elastic_rules/rules/integrations/okta/defense_evasion_first_occurence_public_app_client_credential_token_exchange.toml +114 -0
- nldcsc_elastic_rules/rules/integrations/okta/defense_evasion_okta_attempt_to_deactivate_okta_policy.toml +106 -0
- nldcsc_elastic_rules/rules/integrations/okta/defense_evasion_okta_attempt_to_deactivate_okta_policy_rule.toml +105 -0
- nldcsc_elastic_rules/rules/integrations/okta/defense_evasion_okta_attempt_to_delete_okta_policy.toml +106 -0
- nldcsc_elastic_rules/rules/integrations/okta/defense_evasion_okta_attempt_to_delete_okta_policy_rule.toml +105 -0
- nldcsc_elastic_rules/rules/integrations/okta/defense_evasion_okta_attempt_to_modify_okta_network_zone.toml +105 -0
- nldcsc_elastic_rules/rules/integrations/okta/defense_evasion_okta_attempt_to_modify_okta_policy.toml +94 -0
- nldcsc_elastic_rules/rules/integrations/okta/defense_evasion_okta_attempt_to_modify_okta_policy_rule.toml +103 -0
- nldcsc_elastic_rules/rules/integrations/okta/defense_evasion_suspicious_okta_user_password_reset_or_unlock_attempts.toml +123 -0
- nldcsc_elastic_rules/rules/integrations/okta/impact_attempt_to_revoke_okta_api_token.toml +87 -0
- nldcsc_elastic_rules/rules/integrations/okta/impact_okta_attempt_to_deactivate_okta_application.toml +91 -0
- nldcsc_elastic_rules/rules/integrations/okta/impact_okta_attempt_to_delete_okta_application.toml +97 -0
- nldcsc_elastic_rules/rules/integrations/okta/impact_okta_attempt_to_modify_okta_application.toml +93 -0
- nldcsc_elastic_rules/rules/integrations/okta/impact_possible_okta_dos_attack.toml +96 -0
- nldcsc_elastic_rules/rules/integrations/okta/initial_access_first_occurrence_user_session_started_via_proxy.toml +89 -0
- nldcsc_elastic_rules/rules/integrations/okta/initial_access_new_authentication_behavior_detection.toml +80 -0
- nldcsc_elastic_rules/rules/integrations/okta/initial_access_okta_fastpass_phishing.toml +95 -0
- nldcsc_elastic_rules/rules/integrations/okta/initial_access_okta_user_attempted_unauthorized_access.toml +110 -0
- nldcsc_elastic_rules/rules/integrations/okta/initial_access_okta_user_sessions_started_from_different_geolocations.toml +121 -0
- nldcsc_elastic_rules/rules/integrations/okta/initial_access_sign_in_events_via_third_party_idp.toml +104 -0
- nldcsc_elastic_rules/rules/integrations/okta/initial_access_successful_application_sso_from_unknown_client_device.toml +99 -0
- nldcsc_elastic_rules/rules/integrations/okta/initial_access_suspicious_activity_reported_by_okta_user.toml +129 -0
- nldcsc_elastic_rules/rules/integrations/okta/lateral_movement_multiple_sessions_for_single_user.toml +113 -0
- nldcsc_elastic_rules/rules/integrations/okta/okta_threatinsight_threat_suspected_promotion.toml +67 -0
- nldcsc_elastic_rules/rules/integrations/okta/persistence_administrator_privileges_assigned_to_okta_group.toml +99 -0
- nldcsc_elastic_rules/rules/integrations/okta/persistence_administrator_role_assigned_to_okta_user.toml +100 -0
- nldcsc_elastic_rules/rules/integrations/okta/persistence_attempt_to_create_okta_api_token.toml +98 -0
- nldcsc_elastic_rules/rules/integrations/okta/persistence_attempt_to_reset_mfa_factors_for_okta_user_account.toml +99 -0
- nldcsc_elastic_rules/rules/integrations/okta/persistence_mfa_deactivation_with_no_reactivation.toml +103 -0
- nldcsc_elastic_rules/rules/integrations/okta/persistence_new_idp_successfully_added_by_admin.toml +94 -0
- nldcsc_elastic_rules/rules/integrations/okta/persistence_okta_attempt_to_modify_or_delete_application_sign_on_policy.toml +99 -0
- nldcsc_elastic_rules/rules/integrations/okta/persistence_stolen_credentials_used_to_login_to_okta_account_after_mfa_reset.toml +105 -0
- nldcsc_elastic_rules/rules/integrations/pad/privileged_access_ml_linux_high_count_privileged_process_events_by_user.toml +102 -0
- nldcsc_elastic_rules/rules/integrations/pad/privileged_access_ml_linux_high_median_process_command_line_entropy_by_user.toml +103 -0
- nldcsc_elastic_rules/rules/integrations/pad/privileged_access_ml_linux_rare_process_executed_by_user.toml +101 -0
- nldcsc_elastic_rules/rules/integrations/pad/privileged_access_ml_okta_high_sum_concurrent_sessions_by_user.toml +107 -0
- nldcsc_elastic_rules/rules/integrations/pad/privileged_access_ml_okta_rare_host_name_by_user.toml +102 -0
- nldcsc_elastic_rules/rules/integrations/pad/privileged_access_ml_okta_rare_region_name_by_user.toml +102 -0
- nldcsc_elastic_rules/rules/integrations/pad/privileged_access_ml_okta_rare_source_ip_by_user.toml +101 -0
- nldcsc_elastic_rules/rules/integrations/pad/privileged_access_ml_okta_spike_in_group_application_assignment_changes.toml +111 -0
- nldcsc_elastic_rules/rules/integrations/pad/privileged_access_ml_okta_spike_in_group_lifecycle_changes.toml +106 -0
- nldcsc_elastic_rules/rules/integrations/pad/privileged_access_ml_okta_spike_in_group_membership_changes.toml +106 -0
- nldcsc_elastic_rules/rules/integrations/pad/privileged_access_ml_okta_spike_in_group_privilege_changes.toml +111 -0
- nldcsc_elastic_rules/rules/integrations/pad/privileged_access_ml_okta_spike_in_user_lifecycle_management_changes.toml +105 -0
- nldcsc_elastic_rules/rules/integrations/pad/privileged_access_ml_windows_high_count_group_management_events.toml +108 -0
- nldcsc_elastic_rules/rules/integrations/pad/privileged_access_ml_windows_high_count_special_logon_events.toml +105 -0
- nldcsc_elastic_rules/rules/integrations/pad/privileged_access_ml_windows_high_count_special_privilege_use_events.toml +107 -0
- nldcsc_elastic_rules/rules/integrations/pad/privileged_access_ml_windows_high_count_user_account_management_events.toml +107 -0
- nldcsc_elastic_rules/rules/integrations/pad/privileged_access_ml_windows_rare_device_by_user.toml +102 -0
- nldcsc_elastic_rules/rules/integrations/pad/privileged_access_ml_windows_rare_group_name_by_user.toml +121 -0
- nldcsc_elastic_rules/rules/integrations/pad/privileged_access_ml_windows_rare_privilege_assigned_to_user.toml +107 -0
- nldcsc_elastic_rules/rules/integrations/pad/privileged_access_ml_windows_rare_region_name_by_user.toml +102 -0
- nldcsc_elastic_rules/rules/integrations/pad/privileged_access_ml_windows_rare_source_ip_by_user.toml +101 -0
- nldcsc_elastic_rules/rules/integrations/problemchild/defense_evasion_ml_rare_process_for_a_host.toml +105 -0
- nldcsc_elastic_rules/rules/integrations/problemchild/defense_evasion_ml_rare_process_for_a_parent_process.toml +107 -0
- nldcsc_elastic_rules/rules/integrations/problemchild/defense_evasion_ml_rare_process_for_a_user.toml +107 -0
- nldcsc_elastic_rules/rules/integrations/problemchild/defense_evasion_ml_suspicious_windows_event_high_probability.toml +118 -0
- nldcsc_elastic_rules/rules/integrations/problemchild/defense_evasion_ml_suspicious_windows_event_low_probability.toml +118 -0
- nldcsc_elastic_rules/rules/integrations/problemchild/defense_evasion_ml_suspicious_windows_process_cluster_from_host.toml +106 -0
- nldcsc_elastic_rules/rules/integrations/problemchild/defense_evasion_ml_suspicious_windows_process_cluster_from_parent_process.toml +108 -0
- nldcsc_elastic_rules/rules/integrations/problemchild/defense_evasion_ml_suspicious_windows_process_cluster_from_user.toml +108 -0
- nldcsc_elastic_rules/rules/linux/collection_linux_clipboard_activity.toml +95 -0
- nldcsc_elastic_rules/rules/linux/command_and_control_aws_cli_endpoint_url_used.toml +92 -0
- nldcsc_elastic_rules/rules/linux/command_and_control_cat_network_activity.toml +179 -0
- nldcsc_elastic_rules/rules/linux/command_and_control_cupsd_foomatic_rip_netcon.toml +154 -0
- nldcsc_elastic_rules/rules/linux/command_and_control_curl_socks_proxy_detected.toml +130 -0
- nldcsc_elastic_rules/rules/linux/command_and_control_curl_wget_spawn_via_nodejs_parent.toml +116 -0
- nldcsc_elastic_rules/rules/linux/command_and_control_frequent_egress_netcon_from_sus_executable.toml +162 -0
- nldcsc_elastic_rules/rules/linux/command_and_control_git_repo_or_file_download_to_sus_dir.toml +124 -0
- nldcsc_elastic_rules/rules/linux/command_and_control_ip_forwarding_activity.toml +99 -0
- nldcsc_elastic_rules/rules/linux/command_and_control_kubectl_networking_modification.toml +134 -0
- nldcsc_elastic_rules/rules/linux/command_and_control_linux_chisel_client_activity.toml +174 -0
- nldcsc_elastic_rules/rules/linux/command_and_control_linux_chisel_server_activity.toml +175 -0
- nldcsc_elastic_rules/rules/linux/command_and_control_linux_kworker_netcon.toml +155 -0
- nldcsc_elastic_rules/rules/linux/command_and_control_linux_proxychains_activity.toml +153 -0
- nldcsc_elastic_rules/rules/linux/command_and_control_linux_ssh_x11_forwarding.toml +147 -0
- nldcsc_elastic_rules/rules/linux/command_and_control_linux_suspicious_proxychains_activity.toml +183 -0
- nldcsc_elastic_rules/rules/linux/command_and_control_linux_tunneling_and_port_forwarding.toml +193 -0
- nldcsc_elastic_rules/rules/linux/command_and_control_linux_tunneling_via_ssh_option.toml +124 -0
- nldcsc_elastic_rules/rules/linux/command_and_control_suspicious_network_activity_from_unknown_executable.toml +228 -0
- nldcsc_elastic_rules/rules/linux/command_and_control_telegram_api_request.toml +125 -0
- nldcsc_elastic_rules/rules/linux/command_and_control_tunneling_via_earthworm.toml +189 -0
- nldcsc_elastic_rules/rules/linux/credential_access_aws_creds_search_inside_container.toml +118 -0
- nldcsc_elastic_rules/rules/linux/credential_access_collection_sensitive_files.toml +188 -0
- nldcsc_elastic_rules/rules/linux/credential_access_collection_sensitive_files_compression_inside_container.toml +135 -0
- nldcsc_elastic_rules/rules/linux/credential_access_credential_dumping.toml +126 -0
- nldcsc_elastic_rules/rules/linux/credential_access_gdb_init_process_hooking.toml +124 -0
- nldcsc_elastic_rules/rules/linux/credential_access_gdb_process_hooking.toml +105 -0
- nldcsc_elastic_rules/rules/linux/credential_access_gh_auth_via_nodejs.toml +97 -0
- nldcsc_elastic_rules/rules/linux/credential_access_kubernetes_service_account_secret_access.toml +144 -0
- nldcsc_elastic_rules/rules/linux/credential_access_manual_memory_dumping.toml +128 -0
- nldcsc_elastic_rules/rules/linux/credential_access_potential_linux_local_account_bruteforce.toml +118 -0
- nldcsc_elastic_rules/rules/linux/credential_access_potential_linux_ssh_bruteforce_external.toml +117 -0
- nldcsc_elastic_rules/rules/linux/credential_access_potential_linux_ssh_bruteforce_internal.toml +113 -0
- nldcsc_elastic_rules/rules/linux/credential_access_potential_successful_linux_ftp_bruteforce.toml +136 -0
- nldcsc_elastic_rules/rules/linux/credential_access_potential_successful_linux_rdp_bruteforce.toml +135 -0
- nldcsc_elastic_rules/rules/linux/credential_access_potential_successful_linux_ssh_bruteforce.toml +117 -0
- nldcsc_elastic_rules/rules/linux/credential_access_proc_credential_dumping.toml +132 -0
- nldcsc_elastic_rules/rules/linux/credential_access_sensitive_keys_or_passwords_search_inside_container.toml +119 -0
- nldcsc_elastic_rules/rules/linux/credential_access_ssh_backdoor_log.toml +174 -0
- nldcsc_elastic_rules/rules/linux/credential_access_ssh_password_grabbing_via_strace.toml +100 -0
- nldcsc_elastic_rules/rules/linux/credential_access_unusual_instance_metadata_service_api_request.toml +212 -0
- nldcsc_elastic_rules/rules/linux/defense_evasion_acl_modification_via_setfacl.toml +105 -0
- nldcsc_elastic_rules/rules/linux/defense_evasion_attempt_to_disable_auditd_service.toml +127 -0
- nldcsc_elastic_rules/rules/linux/defense_evasion_attempt_to_disable_iptables_or_firewall.toml +133 -0
- nldcsc_elastic_rules/rules/linux/defense_evasion_attempt_to_disable_syslog_service.toml +140 -0
- nldcsc_elastic_rules/rules/linux/defense_evasion_authorized_keys_file_deletion.toml +119 -0
- nldcsc_elastic_rules/rules/linux/defense_evasion_base16_or_base32_encoding_or_decoding_activity.toml +143 -0
- nldcsc_elastic_rules/rules/linux/defense_evasion_base64_decoding_activity.toml +203 -0
- nldcsc_elastic_rules/rules/linux/defense_evasion_binary_copied_to_suspicious_directory.toml +156 -0
- nldcsc_elastic_rules/rules/linux/defense_evasion_busybox_indirect_shell_spawn.toml +139 -0
- nldcsc_elastic_rules/rules/linux/defense_evasion_chattr_immutable_file.toml +140 -0
- nldcsc_elastic_rules/rules/linux/defense_evasion_clear_kernel_ring_buffer.toml +134 -0
- nldcsc_elastic_rules/rules/linux/defense_evasion_creation_of_hidden_files_directories.toml +99 -0
- nldcsc_elastic_rules/rules/linux/defense_evasion_curl_or_wget_executed_via_lolbin.toml +189 -0
- nldcsc_elastic_rules/rules/linux/defense_evasion_directory_creation_in_bin.toml +133 -0
- nldcsc_elastic_rules/rules/linux/defense_evasion_disable_apparmor_attempt.toml +133 -0
- nldcsc_elastic_rules/rules/linux/defense_evasion_disable_selinux_attempt.toml +139 -0
- nldcsc_elastic_rules/rules/linux/defense_evasion_doas_configuration_creation_or_rename.toml +117 -0
- nldcsc_elastic_rules/rules/linux/defense_evasion_dynamic_linker_file_creation.toml +162 -0
- nldcsc_elastic_rules/rules/linux/defense_evasion_esxi_suspicious_timestomp_touch.toml +133 -0
- nldcsc_elastic_rules/rules/linux/defense_evasion_file_deletion_via_shred.toml +124 -0
- nldcsc_elastic_rules/rules/linux/defense_evasion_file_mod_writable_dir.toml +138 -0
- nldcsc_elastic_rules/rules/linux/defense_evasion_hex_payload_execution_via_commandline.toml +143 -0
- nldcsc_elastic_rules/rules/linux/defense_evasion_hex_payload_execution_via_utility.toml +159 -0
- nldcsc_elastic_rules/rules/linux/defense_evasion_hidden_directory_creation.toml +141 -0
- nldcsc_elastic_rules/rules/linux/defense_evasion_hidden_file_dir_tmp.toml +148 -0
- nldcsc_elastic_rules/rules/linux/defense_evasion_hidden_shared_object.toml +133 -0
- nldcsc_elastic_rules/rules/linux/defense_evasion_interactive_shell_from_system_user.toml +135 -0
- nldcsc_elastic_rules/rules/linux/defense_evasion_interpreter_launched_from_decoded_payload.toml +156 -0
- nldcsc_elastic_rules/rules/linux/defense_evasion_journalctl_clear_logs.toml +132 -0
- nldcsc_elastic_rules/rules/linux/defense_evasion_kernel_module_removal.toml +153 -0
- nldcsc_elastic_rules/rules/linux/defense_evasion_kill_command_executed.toml +151 -0
- nldcsc_elastic_rules/rules/linux/defense_evasion_kthreadd_masquerading.toml +130 -0
- nldcsc_elastic_rules/rules/linux/defense_evasion_ld_preload_cmdline.toml +164 -0
- nldcsc_elastic_rules/rules/linux/defense_evasion_ld_so_creation.toml +161 -0
- nldcsc_elastic_rules/rules/linux/defense_evasion_log_files_deleted.toml +151 -0
- nldcsc_elastic_rules/rules/linux/defense_evasion_mount_execution.toml +127 -0
- nldcsc_elastic_rules/rules/linux/defense_evasion_multi_base64_decoding_attempt.toml +163 -0
- nldcsc_elastic_rules/rules/linux/defense_evasion_potential_kubectl_impersonation.toml +158 -0
- nldcsc_elastic_rules/rules/linux/defense_evasion_potential_kubectl_masquerading.toml +155 -0
- nldcsc_elastic_rules/rules/linux/defense_evasion_potential_proot_exploits.toml +124 -0
- nldcsc_elastic_rules/rules/linux/defense_evasion_prctl_process_name_tampering.toml +121 -0
- nldcsc_elastic_rules/rules/linux/defense_evasion_rename_esxi_files.toml +120 -0
- nldcsc_elastic_rules/rules/linux/defense_evasion_rename_esxi_index_file.toml +119 -0
- nldcsc_elastic_rules/rules/linux/defense_evasion_root_certificate_installation.toml +130 -0
- nldcsc_elastic_rules/rules/linux/defense_evasion_selinux_configuration_creation_or_renaming.toml +120 -0
- nldcsc_elastic_rules/rules/linux/defense_evasion_ssl_certificate_deletion.toml +134 -0
- nldcsc_elastic_rules/rules/linux/defense_evasion_sus_utility_executed_via_tmux_or_screen.toml +97 -0
- nldcsc_elastic_rules/rules/linux/defense_evasion_suspicious_path_mounted.toml +113 -0
- nldcsc_elastic_rules/rules/linux/defense_evasion_symlink_binary_to_writable_dir.toml +115 -0
- nldcsc_elastic_rules/rules/linux/defense_evasion_sysctl_kernel_feature_activity.toml +129 -0
- nldcsc_elastic_rules/rules/linux/defense_evasion_unsual_kill_signal.toml +108 -0
- nldcsc_elastic_rules/rules/linux/defense_evasion_unusual_preload_env_vars.toml +152 -0
- nldcsc_elastic_rules/rules/linux/defense_evasion_var_log_file_creation_by_unsual_process.toml +153 -0
- nldcsc_elastic_rules/rules/linux/discovery_docker_socket_discovery.toml +128 -0
- nldcsc_elastic_rules/rules/linux/discovery_dynamic_linker_via_od.toml +126 -0
- nldcsc_elastic_rules/rules/linux/discovery_esxi_software_via_find.toml +125 -0
- nldcsc_elastic_rules/rules/linux/discovery_esxi_software_via_grep.toml +125 -0
- nldcsc_elastic_rules/rules/linux/discovery_kernel_module_enumeration.toml +134 -0
- nldcsc_elastic_rules/rules/linux/discovery_kernel_seeking.toml +127 -0
- nldcsc_elastic_rules/rules/linux/discovery_kernel_unpacking.toml +126 -0
- nldcsc_elastic_rules/rules/linux/discovery_kubeconfig_file_discovery.toml +141 -0
- nldcsc_elastic_rules/rules/linux/discovery_kubectl_permission_discovery.toml +117 -0
- nldcsc_elastic_rules/rules/linux/discovery_linux_hping_activity.toml +141 -0
- nldcsc_elastic_rules/rules/linux/discovery_linux_nping_activity.toml +141 -0
- nldcsc_elastic_rules/rules/linux/discovery_manual_mount_discovery_via_exports_or_fstab.toml +117 -0
- nldcsc_elastic_rules/rules/linux/discovery_pam_version_discovery.toml +152 -0
- nldcsc_elastic_rules/rules/linux/discovery_ping_sweep_detected.toml +122 -0
- nldcsc_elastic_rules/rules/linux/discovery_polkit_version_discovery.toml +117 -0
- nldcsc_elastic_rules/rules/linux/discovery_port_scanning_activity_from_compromised_host.toml +156 -0
- nldcsc_elastic_rules/rules/linux/discovery_private_key_password_searching_activity.toml +114 -0
- nldcsc_elastic_rules/rules/linux/discovery_proc_maps_read.toml +116 -0
- nldcsc_elastic_rules/rules/linux/discovery_process_capabilities.toml +114 -0
- nldcsc_elastic_rules/rules/linux/discovery_pspy_process_monitoring_detected.toml +116 -0
- nldcsc_elastic_rules/rules/linux/discovery_security_file_access_via_common_utility.toml +122 -0
- nldcsc_elastic_rules/rules/linux/discovery_subnet_scanning_activity_from_compromised_host.toml +137 -0
- nldcsc_elastic_rules/rules/linux/discovery_sudo_allowed_command_enumeration.toml +119 -0
- nldcsc_elastic_rules/rules/linux/discovery_suid_sguid_enumeration.toml +142 -0
- nldcsc_elastic_rules/rules/linux/discovery_suspicious_memory_grep_activity.toml +96 -0
- nldcsc_elastic_rules/rules/linux/discovery_suspicious_network_tool_launched_inside_container.toml +147 -0
- nldcsc_elastic_rules/rules/linux/discovery_suspicious_which_command_execution.toml +97 -0
- nldcsc_elastic_rules/rules/linux/discovery_unusual_user_enumeration_via_id.toml +114 -0
- nldcsc_elastic_rules/rules/linux/discovery_virtual_machine_fingerprinting.toml +136 -0
- nldcsc_elastic_rules/rules/linux/discovery_yum_dnf_plugin_detection.toml +122 -0
- nldcsc_elastic_rules/rules/linux/execution_abnormal_process_id_file_created.toml +160 -0
- nldcsc_elastic_rules/rules/linux/execution_container_management_binary_launched_inside_container.toml +118 -0
- nldcsc_elastic_rules/rules/linux/execution_cupsd_foomatic_rip_file_creation.toml +134 -0
- nldcsc_elastic_rules/rules/linux/execution_cupsd_foomatic_rip_lp_user_execution.toml +138 -0
- nldcsc_elastic_rules/rules/linux/execution_cupsd_foomatic_rip_shell_execution.toml +145 -0
- nldcsc_elastic_rules/rules/linux/execution_cupsd_foomatic_rip_suspicious_child_execution.toml +161 -0
- nldcsc_elastic_rules/rules/linux/execution_curl_cve_2023_38545_heap_overflow.toml +135 -0
- nldcsc_elastic_rules/rules/linux/execution_egress_connection_from_entrypoint_in_container.toml +112 -0
- nldcsc_elastic_rules/rules/linux/execution_executable_stack_execution.toml +107 -0
- nldcsc_elastic_rules/rules/linux/execution_file_execution_followed_by_deletion.toml +125 -0
- nldcsc_elastic_rules/rules/linux/execution_file_made_executable_via_chmod_inside_container.toml +128 -0
- nldcsc_elastic_rules/rules/linux/execution_file_transfer_or_listener_established_via_netcat.toml +163 -0
- nldcsc_elastic_rules/rules/linux/execution_interpreter_tty_upgrade.toml +127 -0
- nldcsc_elastic_rules/rules/linux/execution_kubectl_apply_pod_from_url.toml +123 -0
- nldcsc_elastic_rules/rules/linux/execution_kubernetes_direct_api_request_via_curl_or_wget.toml +148 -0
- nldcsc_elastic_rules/rules/linux/execution_nc_listener_via_rlwrap.toml +133 -0
- nldcsc_elastic_rules/rules/linux/execution_netcon_from_rwx_mem_region_binary.toml +130 -0
- nldcsc_elastic_rules/rules/linux/execution_network_event_post_compilation.toml +132 -0
- nldcsc_elastic_rules/rules/linux/execution_perl_tty_shell.toml +123 -0
- nldcsc_elastic_rules/rules/linux/execution_potential_hack_tool_executed.toml +135 -0
- nldcsc_elastic_rules/rules/linux/execution_potentially_overly_permissive_container_creation.toml +144 -0
- nldcsc_elastic_rules/rules/linux/execution_process_backgrounded_by_unusual_parent.toml +152 -0
- nldcsc_elastic_rules/rules/linux/execution_process_started_from_process_id_file.toml +101 -0
- nldcsc_elastic_rules/rules/linux/execution_process_started_in_shared_memory_directory.toml +128 -0
- nldcsc_elastic_rules/rules/linux/execution_python_tty_shell.toml +121 -0
- nldcsc_elastic_rules/rules/linux/execution_python_webserver_spawned.toml +142 -0
- nldcsc_elastic_rules/rules/linux/execution_remote_code_execution_via_postgresql.toml +126 -0
- nldcsc_elastic_rules/rules/linux/execution_shell_evasion_linux_binary.toml +213 -0
- nldcsc_elastic_rules/rules/linux/execution_shell_openssl_client_or_server.toml +136 -0
- nldcsc_elastic_rules/rules/linux/execution_shell_via_background_process.toml +137 -0
- nldcsc_elastic_rules/rules/linux/execution_shell_via_child_tcp_utility_linux.toml +139 -0
- nldcsc_elastic_rules/rules/linux/execution_shell_via_java_revshell_linux.toml +143 -0
- nldcsc_elastic_rules/rules/linux/execution_shell_via_lolbin_interpreter_linux.toml +154 -0
- nldcsc_elastic_rules/rules/linux/execution_shell_via_meterpreter_linux.toml +148 -0
- nldcsc_elastic_rules/rules/linux/execution_shell_via_suspicious_binary.toml +147 -0
- nldcsc_elastic_rules/rules/linux/execution_shell_via_tcp_cli_utility_linux.toml +137 -0
- nldcsc_elastic_rules/rules/linux/execution_shell_via_udp_cli_utility_linux.toml +157 -0
- nldcsc_elastic_rules/rules/linux/execution_sus_extraction_or_decrompression_via_funzip.toml +139 -0
- nldcsc_elastic_rules/rules/linux/execution_suspicious_executable_running_system_commands.toml +139 -0
- nldcsc_elastic_rules/rules/linux/execution_suspicious_mining_process_creation_events.toml +117 -0
- nldcsc_elastic_rules/rules/linux/execution_suspicious_mkfifo_execution.toml +138 -0
- nldcsc_elastic_rules/rules/linux/execution_system_binary_file_permission_change.toml +118 -0
- nldcsc_elastic_rules/rules/linux/execution_tc_bpf_filter.toml +124 -0
- nldcsc_elastic_rules/rules/linux/execution_unix_socket_communication.toml +109 -0
- nldcsc_elastic_rules/rules/linux/execution_unknown_rwx_mem_region_binary_executed.toml +126 -0
- nldcsc_elastic_rules/rules/linux/execution_unusual_interactive_process_inside_container.toml +87 -0
- nldcsc_elastic_rules/rules/linux/execution_unusual_kthreadd_execution.toml +141 -0
- nldcsc_elastic_rules/rules/linux/execution_unusual_path_invocation_from_command_line.toml +145 -0
- nldcsc_elastic_rules/rules/linux/execution_unusual_pkexec_execution.toml +152 -0
- nldcsc_elastic_rules/rules/linux/exfiltration_potential_curl_data_exfiltration.toml +126 -0
- nldcsc_elastic_rules/rules/linux/exfiltration_potential_data_splitting_for_exfiltration.toml +131 -0
- nldcsc_elastic_rules/rules/linux/exfiltration_unusual_file_transfer_utility_launched.toml +130 -0
- nldcsc_elastic_rules/rules/linux/impact_data_encrypted_via_openssl.toml +118 -0
- nldcsc_elastic_rules/rules/linux/impact_esxi_process_kill.toml +116 -0
- nldcsc_elastic_rules/rules/linux/impact_memory_swap_modification.toml +144 -0
- nldcsc_elastic_rules/rules/linux/impact_potential_bruteforce_malware_infection.toml +178 -0
- nldcsc_elastic_rules/rules/linux/impact_potential_linux_ransomware_note_detected.toml +123 -0
- nldcsc_elastic_rules/rules/linux/impact_process_kill_threshold.toml +111 -0
- nldcsc_elastic_rules/rules/linux/initial_access_apache_struts_cve_2023_50164_exploitation_to_webshell.toml +144 -0
- nldcsc_elastic_rules/rules/linux/initial_access_first_time_public_key_authentication.toml +118 -0
- nldcsc_elastic_rules/rules/linux/initial_access_successful_ssh_authentication_by_unusual_ip.toml +111 -0
- nldcsc_elastic_rules/rules/linux/initial_access_successful_ssh_authentication_by_unusual_user.toml +95 -0
- nldcsc_elastic_rules/rules/linux/lateral_movement_kubeconfig_file_activity.toml +155 -0
- nldcsc_elastic_rules/rules/linux/lateral_movement_remote_file_creation_world_writeable_dir.toml +141 -0
- nldcsc_elastic_rules/rules/linux/lateral_movement_ssh_it_worm_download.toml +141 -0
- nldcsc_elastic_rules/rules/linux/lateral_movement_ssh_process_launched_inside_container.toml +138 -0
- nldcsc_elastic_rules/rules/linux/lateral_movement_telnet_network_activity_external.toml +138 -0
- nldcsc_elastic_rules/rules/linux/lateral_movement_telnet_network_activity_internal.toml +139 -0
- nldcsc_elastic_rules/rules/linux/lateral_movement_unusual_remote_file_creation.toml +148 -0
- nldcsc_elastic_rules/rules/linux/persistence_apt_package_manager_execution.toml +166 -0
- nldcsc_elastic_rules/rules/linux/persistence_apt_package_manager_file_creation.toml +163 -0
- nldcsc_elastic_rules/rules/linux/persistence_apt_package_manager_netcon.toml +159 -0
- nldcsc_elastic_rules/rules/linux/persistence_at_job_creation.toml +171 -0
- nldcsc_elastic_rules/rules/linux/persistence_boot_file_copy.toml +156 -0
- nldcsc_elastic_rules/rules/linux/persistence_bpf_probe_write_user.toml +121 -0
- nldcsc_elastic_rules/rules/linux/persistence_chkconfig_service_add.toml +203 -0
- nldcsc_elastic_rules/rules/linux/persistence_credential_access_modify_ssh_binaries.toml +229 -0
- nldcsc_elastic_rules/rules/linux/persistence_cron_job_creation.toml +269 -0
- nldcsc_elastic_rules/rules/linux/persistence_dbus_service_creation.toml +158 -0
- nldcsc_elastic_rules/rules/linux/persistence_dbus_unsual_daemon_parent_execution.toml +149 -0
- nldcsc_elastic_rules/rules/linux/persistence_dnf_package_manager_plugin_file_creation.toml +164 -0
- nldcsc_elastic_rules/rules/linux/persistence_dpkg_package_installation_from_unusual_parent.toml +152 -0
- nldcsc_elastic_rules/rules/linux/persistence_dpkg_unusual_execution.toml +147 -0
- nldcsc_elastic_rules/rules/linux/persistence_dracut_module_creation.toml +166 -0
- nldcsc_elastic_rules/rules/linux/persistence_dynamic_linker_backup.toml +197 -0
- nldcsc_elastic_rules/rules/linux/persistence_extract_initramfs_via_cpio.toml +137 -0
- nldcsc_elastic_rules/rules/linux/persistence_git_hook_execution.toml +152 -0
- nldcsc_elastic_rules/rules/linux/persistence_git_hook_file_creation.toml +164 -0
- nldcsc_elastic_rules/rules/linux/persistence_git_hook_netcon.toml +159 -0
- nldcsc_elastic_rules/rules/linux/persistence_git_hook_process_execution.toml +170 -0
- nldcsc_elastic_rules/rules/linux/persistence_grub_configuration_creation.toml +145 -0
- nldcsc_elastic_rules/rules/linux/persistence_grub_makeconfig.toml +130 -0
- nldcsc_elastic_rules/rules/linux/persistence_init_d_file_creation.toml +194 -0
- nldcsc_elastic_rules/rules/linux/persistence_insmod_kernel_module_load.toml +196 -0
- nldcsc_elastic_rules/rules/linux/persistence_kde_autostart_modification.toml +246 -0
- nldcsc_elastic_rules/rules/linux/persistence_kernel_driver_load.toml +126 -0
- nldcsc_elastic_rules/rules/linux/persistence_kernel_driver_load_by_non_root.toml +132 -0
- nldcsc_elastic_rules/rules/linux/persistence_kernel_object_file_creation.toml +136 -0
- nldcsc_elastic_rules/rules/linux/persistence_kubernetes_sensitive_file_activity.toml +131 -0
- nldcsc_elastic_rules/rules/linux/persistence_kworker_file_creation.toml +208 -0
- nldcsc_elastic_rules/rules/linux/persistence_linux_backdoor_user_creation.toml +165 -0
- nldcsc_elastic_rules/rules/linux/persistence_linux_group_creation.toml +137 -0
- nldcsc_elastic_rules/rules/linux/persistence_linux_shell_activity_via_web_server.toml +199 -0
- nldcsc_elastic_rules/rules/linux/persistence_linux_user_account_creation.toml +136 -0
- nldcsc_elastic_rules/rules/linux/persistence_linux_user_added_to_privileged_group.toml +163 -0
- nldcsc_elastic_rules/rules/linux/persistence_lkm_configuration_file_creation.toml +132 -0
- nldcsc_elastic_rules/rules/linux/persistence_manual_dracut_execution.toml +146 -0
- nldcsc_elastic_rules/rules/linux/persistence_message_of_the_day_creation.toml +188 -0
- nldcsc_elastic_rules/rules/linux/persistence_message_of_the_day_execution.toml +215 -0
- nldcsc_elastic_rules/rules/linux/persistence_network_manager_dispatcher_persistence.toml +163 -0
- nldcsc_elastic_rules/rules/linux/persistence_nodejs_pre_or_post_install_script_execution.toml +109 -0
- nldcsc_elastic_rules/rules/linux/persistence_openssl_passwd_hash_generation.toml +129 -0
- nldcsc_elastic_rules/rules/linux/persistence_pluggable_authentication_module_creation.toml +135 -0
- nldcsc_elastic_rules/rules/linux/persistence_pluggable_authentication_module_creation_in_unusual_dir.toml +122 -0
- nldcsc_elastic_rules/rules/linux/persistence_pluggable_authentication_module_pam_exec_backdoor_exec.toml +115 -0
- nldcsc_elastic_rules/rules/linux/persistence_pluggable_authentication_module_source_download.toml +108 -0
- nldcsc_elastic_rules/rules/linux/persistence_polkit_policy_creation.toml +132 -0
- nldcsc_elastic_rules/rules/linux/persistence_potential_persistence_script_executable_bit_set.toml +164 -0
- nldcsc_elastic_rules/rules/linux/persistence_process_capability_set_via_setcap.toml +120 -0
- nldcsc_elastic_rules/rules/linux/persistence_pth_file_creation.toml +165 -0
- nldcsc_elastic_rules/rules/linux/persistence_rc_local_error_via_syslog.toml +111 -0
- nldcsc_elastic_rules/rules/linux/persistence_rc_local_service_already_running.toml +124 -0
- nldcsc_elastic_rules/rules/linux/persistence_rc_script_creation.toml +189 -0
- nldcsc_elastic_rules/rules/linux/persistence_rpm_package_installation_from_unusual_parent.toml +146 -0
- nldcsc_elastic_rules/rules/linux/persistence_setuid_setgid_capability_set.toml +187 -0
- nldcsc_elastic_rules/rules/linux/persistence_shadow_file_modification.toml +126 -0
- nldcsc_elastic_rules/rules/linux/persistence_shared_object_creation.toml +205 -0
- nldcsc_elastic_rules/rules/linux/persistence_shell_configuration_modification.toml +154 -0
- nldcsc_elastic_rules/rules/linux/persistence_simple_web_server_connection_accepted.toml +152 -0
- nldcsc_elastic_rules/rules/linux/persistence_simple_web_server_creation.toml +160 -0
- nldcsc_elastic_rules/rules/linux/persistence_site_and_user_customize_file_creation.toml +160 -0
- nldcsc_elastic_rules/rules/linux/persistence_ssh_key_generation.toml +124 -0
- nldcsc_elastic_rules/rules/linux/persistence_ssh_netcon.toml +137 -0
- nldcsc_elastic_rules/rules/linux/persistence_ssh_via_backdoored_system_user.toml +135 -0
- nldcsc_elastic_rules/rules/linux/persistence_suspicious_file_opened_through_editor.toml +151 -0
- nldcsc_elastic_rules/rules/linux/persistence_suspicious_ssh_execution_xzbackdoor.toml +136 -0
- nldcsc_elastic_rules/rules/linux/persistence_systemd_generator_creation.toml +157 -0
- nldcsc_elastic_rules/rules/linux/persistence_systemd_netcon.toml +144 -0
- nldcsc_elastic_rules/rules/linux/persistence_systemd_scheduled_timer_created.toml +208 -0
- nldcsc_elastic_rules/rules/linux/persistence_systemd_service_creation.toml +261 -0
- nldcsc_elastic_rules/rules/linux/persistence_systemd_service_started.toml +241 -0
- nldcsc_elastic_rules/rules/linux/persistence_systemd_shell_execution.toml +132 -0
- nldcsc_elastic_rules/rules/linux/persistence_tainted_kernel_module_load.toml +124 -0
- nldcsc_elastic_rules/rules/linux/persistence_tainted_kernel_module_out_of_tree_load.toml +125 -0
- nldcsc_elastic_rules/rules/linux/persistence_udev_rule_creation.toml +142 -0
- nldcsc_elastic_rules/rules/linux/persistence_unpack_initramfs_via_unmkinitramfs.toml +152 -0
- nldcsc_elastic_rules/rules/linux/persistence_unusual_exim4_child_process.toml +103 -0
- nldcsc_elastic_rules/rules/linux/persistence_unusual_pam_grantor.toml +118 -0
- nldcsc_elastic_rules/rules/linux/persistence_unusual_sshd_child_process.toml +136 -0
- nldcsc_elastic_rules/rules/linux/persistence_user_credential_modification_via_echo.toml +109 -0
- nldcsc_elastic_rules/rules/linux/persistence_user_or_group_creation_or_modification.toml +129 -0
- nldcsc_elastic_rules/rules/linux/persistence_web_server_sus_child_spawned.toml +234 -0
- nldcsc_elastic_rules/rules/linux/persistence_web_server_sus_command_execution.toml +218 -0
- nldcsc_elastic_rules/rules/linux/persistence_web_server_sus_destination_port.toml +168 -0
- nldcsc_elastic_rules/rules/linux/persistence_xdg_autostart_netcon.toml +155 -0
- nldcsc_elastic_rules/rules/linux/persistence_yum_package_manager_plugin_file_creation.toml +159 -0
- nldcsc_elastic_rules/rules/linux/privilege_escalation_chown_chmod_unauthorized_file_read.toml +142 -0
- nldcsc_elastic_rules/rules/linux/privilege_escalation_container_util_misconfiguration.toml +128 -0
- nldcsc_elastic_rules/rules/linux/privilege_escalation_cve_2025_32463_nsswitch_file_creation.toml +124 -0
- nldcsc_elastic_rules/rules/linux/privilege_escalation_cve_2025_32463_sudo_chroot_execution.toml +124 -0
- nldcsc_elastic_rules/rules/linux/privilege_escalation_cve_2025_41244_vmtoolsd_lpe.toml +129 -0
- nldcsc_elastic_rules/rules/linux/privilege_escalation_dac_permissions.toml +132 -0
- nldcsc_elastic_rules/rules/linux/privilege_escalation_debugfs_launched_inside_container.toml +115 -0
- nldcsc_elastic_rules/rules/linux/privilege_escalation_docker_escape_via_nsenter.toml +86 -0
- nldcsc_elastic_rules/rules/linux/privilege_escalation_docker_mount_chroot_container_escape.toml +130 -0
- nldcsc_elastic_rules/rules/linux/privilege_escalation_docker_release_file_creation.toml +88 -0
- nldcsc_elastic_rules/rules/linux/privilege_escalation_enlightenment_window_manager.toml +115 -0
- nldcsc_elastic_rules/rules/linux/privilege_escalation_gdb_sys_ptrace_elevation.toml +127 -0
- nldcsc_elastic_rules/rules/linux/privilege_escalation_gdb_sys_ptrace_netcon.toml +158 -0
- nldcsc_elastic_rules/rules/linux/privilege_escalation_kworker_uid_elevation.toml +132 -0
- nldcsc_elastic_rules/rules/linux/privilege_escalation_ld_preload_shared_object_modif.toml +140 -0
- nldcsc_elastic_rules/rules/linux/privilege_escalation_linux_suspicious_symbolic_link.toml +146 -0
- nldcsc_elastic_rules/rules/linux/privilege_escalation_linux_uid_int_max_bug.toml +118 -0
- nldcsc_elastic_rules/rules/linux/privilege_escalation_load_and_unload_of_kernel_via_kexec.toml +167 -0
- nldcsc_elastic_rules/rules/linux/privilege_escalation_looney_tunables_cve_2023_4911.toml +127 -0
- nldcsc_elastic_rules/rules/linux/privilege_escalation_mount_launched_inside_container.toml +114 -0
- nldcsc_elastic_rules/rules/linux/privilege_escalation_netcon_via_sudo_binary.toml +132 -0
- nldcsc_elastic_rules/rules/linux/privilege_escalation_overlayfs_local_privesc.toml +118 -0
- nldcsc_elastic_rules/rules/linux/privilege_escalation_pkexec_envar_hijack.toml +130 -0
- nldcsc_elastic_rules/rules/linux/privilege_escalation_potential_bufferoverflow_attack.toml +112 -0
- nldcsc_elastic_rules/rules/linux/privilege_escalation_potential_suid_sgid_exploitation.toml +164 -0
- nldcsc_elastic_rules/rules/linux/privilege_escalation_potential_suid_sgid_proxy_execution.toml +163 -0
- nldcsc_elastic_rules/rules/linux/privilege_escalation_potential_wildcard_shell_spawn.toml +136 -0
- nldcsc_elastic_rules/rules/linux/privilege_escalation_sda_disk_mount_non_root.toml +119 -0
- nldcsc_elastic_rules/rules/linux/privilege_escalation_shadow_file_read.toml +140 -0
- nldcsc_elastic_rules/rules/linux/privilege_escalation_sudo_cve_2019_14287.toml +126 -0
- nldcsc_elastic_rules/rules/linux/privilege_escalation_sudo_hijacking.toml +149 -0
- nldcsc_elastic_rules/rules/linux/privilege_escalation_sudo_token_via_process_injection.toml +131 -0
- nldcsc_elastic_rules/rules/linux/privilege_escalation_suspicious_cap_setuid_python_execution.toml +126 -0
- nldcsc_elastic_rules/rules/linux/privilege_escalation_suspicious_chown_fowner_elevation.toml +122 -0
- nldcsc_elastic_rules/rules/linux/privilege_escalation_suspicious_passwd_file_write.toml +137 -0
- nldcsc_elastic_rules/rules/linux/privilege_escalation_suspicious_uid_guid_elevation.toml +142 -0
- nldcsc_elastic_rules/rules/linux/privilege_escalation_uid_change_post_compilation.toml +119 -0
- nldcsc_elastic_rules/rules/linux/privilege_escalation_uid_elevation_from_unknown_executable.toml +152 -0
- nldcsc_elastic_rules/rules/linux/privilege_escalation_unshare_namespace_manipulation.toml +129 -0
- nldcsc_elastic_rules/rules/linux/privilege_escalation_writable_docker_socket.toml +120 -0
- nldcsc_elastic_rules/rules/macos/command_and_control_unusual_connection_to_suspicious_top_level_domain.toml +104 -0
- nldcsc_elastic_rules/rules/macos/command_and_control_unusual_network_connection_to_suspicious_web_service.toml +197 -0
- nldcsc_elastic_rules/rules/macos/credential_access_credentials_keychains.toml +121 -0
- nldcsc_elastic_rules/rules/macos/credential_access_dumping_hashes_bi_cmds.toml +113 -0
- nldcsc_elastic_rules/rules/macos/credential_access_dumping_keychain_security.toml +116 -0
- nldcsc_elastic_rules/rules/macos/credential_access_high_volume_of_pbpaste.toml +121 -0
- nldcsc_elastic_rules/rules/macos/credential_access_kerberosdump_kcc.toml +124 -0
- nldcsc_elastic_rules/rules/macos/credential_access_keychain_pwd_retrieval_security_cmd.toml +135 -0
- nldcsc_elastic_rules/rules/macos/credential_access_mitm_localhost_webproxy.toml +116 -0
- nldcsc_elastic_rules/rules/macos/credential_access_potential_macos_ssh_bruteforce.toml +114 -0
- nldcsc_elastic_rules/rules/macos/credential_access_promt_for_pwd_via_osascript.toml +128 -0
- nldcsc_elastic_rules/rules/macos/credential_access_suspicious_web_browser_sensitive_file_access.toml +128 -0
- nldcsc_elastic_rules/rules/macos/credential_access_systemkey_dumping.toml +117 -0
- nldcsc_elastic_rules/rules/macos/defense_evasion_apple_softupdates_modification.toml +117 -0
- nldcsc_elastic_rules/rules/macos/defense_evasion_attempt_del_quarantine_attrib.toml +125 -0
- nldcsc_elastic_rules/rules/macos/defense_evasion_attempt_to_disable_gatekeeper.toml +115 -0
- nldcsc_elastic_rules/rules/macos/defense_evasion_install_root_certificate.toml +118 -0
- nldcsc_elastic_rules/rules/macos/defense_evasion_modify_environment_launchctl.toml +120 -0
- nldcsc_elastic_rules/rules/macos/defense_evasion_privacy_controls_tcc_database_modification.toml +122 -0
- nldcsc_elastic_rules/rules/macos/defense_evasion_privilege_escalation_privacy_pref_sshd_fulldiskaccess.toml +130 -0
- nldcsc_elastic_rules/rules/macos/defense_evasion_safari_config_change.toml +118 -0
- nldcsc_elastic_rules/rules/macos/defense_evasion_sandboxed_office_app_suspicious_zip_file.toml +114 -0
- nldcsc_elastic_rules/rules/macos/defense_evasion_tcc_bypass_mounted_apfs_access.toml +111 -0
- nldcsc_elastic_rules/rules/macos/defense_evasion_unload_endpointsecurity_kext.toml +128 -0
- nldcsc_elastic_rules/rules/macos/discovery_users_domain_built_in_commands.toml +133 -0
- nldcsc_elastic_rules/rules/macos/execution_defense_evasion_electron_app_childproc_node_js.toml +128 -0
- nldcsc_elastic_rules/rules/macos/execution_initial_access_suspicious_browser_childproc.toml +131 -0
- nldcsc_elastic_rules/rules/macos/execution_installer_package_spawned_network_event.toml +147 -0
- nldcsc_elastic_rules/rules/macos/execution_script_via_automator_workflows.toml +110 -0
- nldcsc_elastic_rules/rules/macos/execution_scripting_osascript_exec_followed_by_netcon.toml +138 -0
- nldcsc_elastic_rules/rules/macos/execution_shell_execution_via_apple_scripting.toml +114 -0
- nldcsc_elastic_rules/rules/macos/initial_access_suspicious_mac_ms_office_child_process.toml +182 -0
- nldcsc_elastic_rules/rules/macos/lateral_movement_credential_access_kerberos_bifrostconsole.toml +133 -0
- nldcsc_elastic_rules/rules/macos/lateral_movement_mounting_smb_share.toml +121 -0
- nldcsc_elastic_rules/rules/macos/lateral_movement_remote_ssh_login_enabled.toml +119 -0
- nldcsc_elastic_rules/rules/macos/lateral_movement_vpn_connection_attempt.toml +118 -0
- nldcsc_elastic_rules/rules/macos/persistence_account_creation_hide_at_logon.toml +116 -0
- nldcsc_elastic_rules/rules/macos/persistence_creation_change_launch_agents_file.toml +118 -0
- nldcsc_elastic_rules/rules/macos/persistence_creation_hidden_login_item_osascript.toml +139 -0
- nldcsc_elastic_rules/rules/macos/persistence_creation_modif_launch_deamon_sequence.toml +114 -0
- nldcsc_elastic_rules/rules/macos/persistence_credential_access_authorization_plugin_creation.toml +121 -0
- nldcsc_elastic_rules/rules/macos/persistence_crontab_creation.toml +118 -0
- nldcsc_elastic_rules/rules/macos/persistence_defense_evasion_hidden_launch_agent_deamon_logonitem_process.toml +138 -0
- nldcsc_elastic_rules/rules/macos/persistence_directory_services_plugins_modification.toml +111 -0
- nldcsc_elastic_rules/rules/macos/persistence_docker_shortcuts_plist_modification.toml +115 -0
- nldcsc_elastic_rules/rules/macos/persistence_emond_rules_file_creation.toml +117 -0
- nldcsc_elastic_rules/rules/macos/persistence_emond_rules_process_execution.toml +143 -0
- nldcsc_elastic_rules/rules/macos/persistence_enable_root_account.toml +115 -0
- nldcsc_elastic_rules/rules/macos/persistence_evasion_hidden_launch_agent_deamon_creation.toml +136 -0
- nldcsc_elastic_rules/rules/macos/persistence_finder_sync_plugin_pluginkit.toml +115 -0
- nldcsc_elastic_rules/rules/macos/persistence_folder_action_scripts_runtime.toml +126 -0
- nldcsc_elastic_rules/rules/macos/persistence_login_logout_hooks_defaults.toml +121 -0
- nldcsc_elastic_rules/rules/macos/persistence_loginwindow_plist_modification.toml +92 -0
- nldcsc_elastic_rules/rules/macos/persistence_modification_sublime_app_plugin_or_script.toml +123 -0
- nldcsc_elastic_rules/rules/macos/persistence_periodic_tasks_file_mdofiy.toml +119 -0
- nldcsc_elastic_rules/rules/macos/persistence_screensaver_engine_unexpected_child_process.toml +92 -0
- nldcsc_elastic_rules/rules/macos/persistence_screensaver_plist_file_modification.toml +114 -0
- nldcsc_elastic_rules/rules/macos/persistence_suspicious_calendar_modification.toml +117 -0
- nldcsc_elastic_rules/rules/macos/persistence_via_atom_init_file_modification.toml +115 -0
- nldcsc_elastic_rules/rules/macos/privilege_escalation_applescript_with_admin_privs.toml +124 -0
- nldcsc_elastic_rules/rules/macos/privilege_escalation_explicit_creds_via_scripting.toml +139 -0
- nldcsc_elastic_rules/rules/macos/privilege_escalation_exploit_adobe_acrobat_updater.toml +125 -0
- nldcsc_elastic_rules/rules/macos/privilege_escalation_local_user_added_to_admin.toml +119 -0
- nldcsc_elastic_rules/rules/macos/privilege_escalation_root_crontab_filemod.toml +119 -0
- nldcsc_elastic_rules/rules/macos/privilege_escalation_user_added_to_admin_group.toml +121 -0
- nldcsc_elastic_rules/rules/ml/command_and_control_ml_packetbeat_dns_tunneling.toml +129 -0
- nldcsc_elastic_rules/rules/ml/command_and_control_ml_packetbeat_rare_dns_question.toml +137 -0
- nldcsc_elastic_rules/rules/ml/command_and_control_ml_packetbeat_rare_urls.toml +141 -0
- nldcsc_elastic_rules/rules/ml/command_and_control_ml_packetbeat_rare_user_agent.toml +139 -0
- nldcsc_elastic_rules/rules/ml/credential_access_ml_auth_spike_in_failed_logon_events.toml +146 -0
- nldcsc_elastic_rules/rules/ml/credential_access_ml_auth_spike_in_logon_events.toml +148 -0
- nldcsc_elastic_rules/rules/ml/credential_access_ml_auth_spike_in_logon_events_from_a_source_ip.toml +162 -0
- nldcsc_elastic_rules/rules/ml/credential_access_ml_linux_anomalous_metadata_process.toml +140 -0
- nldcsc_elastic_rules/rules/ml/credential_access_ml_linux_anomalous_metadata_user.toml +141 -0
- nldcsc_elastic_rules/rules/ml/credential_access_ml_suspicious_login_activity.toml +145 -0
- nldcsc_elastic_rules/rules/ml/credential_access_ml_windows_anomalous_metadata_process.toml +133 -0
- nldcsc_elastic_rules/rules/ml/credential_access_ml_windows_anomalous_metadata_user.toml +135 -0
- nldcsc_elastic_rules/rules/ml/discovery_ml_linux_system_information_discovery.toml +137 -0
- nldcsc_elastic_rules/rules/ml/discovery_ml_linux_system_network_configuration_discovery.toml +137 -0
- nldcsc_elastic_rules/rules/ml/discovery_ml_linux_system_network_connection_discovery.toml +137 -0
- nldcsc_elastic_rules/rules/ml/discovery_ml_linux_system_process_discovery.toml +137 -0
- nldcsc_elastic_rules/rules/ml/discovery_ml_linux_system_user_discovery.toml +136 -0
- nldcsc_elastic_rules/rules/ml/execution_ml_windows_anomalous_script.toml +138 -0
- nldcsc_elastic_rules/rules/ml/initial_access_ml_auth_rare_hour_for_a_user_to_logon.toml +133 -0
- nldcsc_elastic_rules/rules/ml/initial_access_ml_auth_rare_source_ip_for_a_user.toml +145 -0
- nldcsc_elastic_rules/rules/ml/initial_access_ml_auth_rare_user_logon.toml +150 -0
- nldcsc_elastic_rules/rules/ml/initial_access_ml_linux_anomalous_user_name.toml +114 -0
- nldcsc_elastic_rules/rules/ml/initial_access_ml_windows_anomalous_user_name.toml +119 -0
- nldcsc_elastic_rules/rules/ml/initial_access_ml_windows_rare_user_type10_remote_login.toml +102 -0
- nldcsc_elastic_rules/rules/ml/ml_high_count_events_for_a_host_name.toml +93 -0
- nldcsc_elastic_rules/rules/ml/ml_high_count_network_denies.toml +113 -0
- nldcsc_elastic_rules/rules/ml/ml_high_count_network_events.toml +112 -0
- nldcsc_elastic_rules/rules/ml/ml_linux_anomalous_network_activity.toml +94 -0
- nldcsc_elastic_rules/rules/ml/ml_linux_anomalous_network_port_activity.toml +120 -0
- nldcsc_elastic_rules/rules/ml/ml_low_count_events_for_a_host_name.toml +93 -0
- nldcsc_elastic_rules/rules/ml/ml_packetbeat_rare_server_domain.toml +120 -0
- nldcsc_elastic_rules/rules/ml/ml_rare_destination_country.toml +117 -0
- nldcsc_elastic_rules/rules/ml/ml_spike_in_traffic_to_a_country.toml +117 -0
- nldcsc_elastic_rules/rules/ml/ml_windows_anomalous_network_activity.toml +91 -0
- nldcsc_elastic_rules/rules/ml/persistence_ml_linux_anomalous_process_all_hosts.toml +144 -0
- nldcsc_elastic_rules/rules/ml/persistence_ml_rare_process_by_host_linux.toml +144 -0
- nldcsc_elastic_rules/rules/ml/persistence_ml_rare_process_by_host_windows.toml +188 -0
- nldcsc_elastic_rules/rules/ml/persistence_ml_windows_anomalous_path_activity.toml +156 -0
- nldcsc_elastic_rules/rules/ml/persistence_ml_windows_anomalous_process_all_hosts.toml +201 -0
- nldcsc_elastic_rules/rules/ml/persistence_ml_windows_anomalous_process_creation.toml +186 -0
- nldcsc_elastic_rules/rules/ml/persistence_ml_windows_anomalous_service.toml +136 -0
- nldcsc_elastic_rules/rules/ml/privilege_escalation_ml_linux_anomalous_sudo_activity.toml +147 -0
- nldcsc_elastic_rules/rules/ml/privilege_escalation_ml_windows_rare_user_runas_event.toml +126 -0
- nldcsc_elastic_rules/rules/ml/resource_development_ml_linux_anomalous_compiler_activity.toml +141 -0
- nldcsc_elastic_rules/rules/network/command_and_control_accepted_default_telnet_port_connection.toml +121 -0
- nldcsc_elastic_rules/rules/network/command_and_control_cobalt_strike_beacon.toml +105 -0
- nldcsc_elastic_rules/rules/network/command_and_control_cobalt_strike_default_teamserver_cert.toml +105 -0
- nldcsc_elastic_rules/rules/network/command_and_control_download_rar_powershell_from_internet.toml +129 -0
- nldcsc_elastic_rules/rules/network/command_and_control_fin7_c2_behavior.toml +66 -0
- nldcsc_elastic_rules/rules/network/command_and_control_halfbaked_beacon.toml +103 -0
- nldcsc_elastic_rules/rules/network/command_and_control_nat_traversal_port_activity.toml +82 -0
- nldcsc_elastic_rules/rules/network/command_and_control_port_26_activity.toml +94 -0
- nldcsc_elastic_rules/rules/network/command_and_control_rdp_remote_desktop_protocol_from_the_internet.toml +144 -0
- nldcsc_elastic_rules/rules/network/command_and_control_vnc_virtual_network_computing_from_the_internet.toml +133 -0
- nldcsc_elastic_rules/rules/network/command_and_control_vnc_virtual_network_computing_to_the_internet.toml +122 -0
- nldcsc_elastic_rules/rules/network/discovery_potential_network_sweep_detected.toml +118 -0
- nldcsc_elastic_rules/rules/network/discovery_potential_port_scan_detected.toml +113 -0
- nldcsc_elastic_rules/rules/network/discovery_potential_syn_port_scan_detected.toml +112 -0
- nldcsc_elastic_rules/rules/network/initial_access_rpc_remote_procedure_call_from_the_internet.toml +113 -0
- nldcsc_elastic_rules/rules/network/initial_access_rpc_remote_procedure_call_to_the_internet.toml +113 -0
- nldcsc_elastic_rules/rules/network/initial_access_smb_windows_file_sharing_activity_to_the_internet.toml +126 -0
- nldcsc_elastic_rules/rules/network/initial_access_unsecure_elasticsearch_node.toml +92 -0
- nldcsc_elastic_rules/rules/network/lateral_movement_dns_server_overflow.toml +92 -0
- nldcsc_elastic_rules/rules/promotions/credential_access_endgame_cred_dumping_detected.toml +91 -0
- nldcsc_elastic_rules/rules/promotions/credential_access_endgame_cred_dumping_prevented.toml +90 -0
- nldcsc_elastic_rules/rules/promotions/crowdstrike_external_alerts.toml +112 -0
- nldcsc_elastic_rules/rules/promotions/elastic_security_external_alerts.toml +114 -0
- nldcsc_elastic_rules/rules/promotions/endgame_adversary_behavior_detected.toml +71 -0
- nldcsc_elastic_rules/rules/promotions/endgame_malware_detected.toml +71 -0
- nldcsc_elastic_rules/rules/promotions/endgame_malware_prevented.toml +72 -0
- nldcsc_elastic_rules/rules/promotions/endgame_ransomware_detected.toml +69 -0
- nldcsc_elastic_rules/rules/promotions/endgame_ransomware_prevented.toml +71 -0
- nldcsc_elastic_rules/rules/promotions/execution_endgame_exploit_detected.toml +97 -0
- nldcsc_elastic_rules/rules/promotions/execution_endgame_exploit_prevented.toml +99 -0
- nldcsc_elastic_rules/rules/promotions/external_alerts.toml +111 -0
- nldcsc_elastic_rules/rules/promotions/google_secops_external_alerts.toml +114 -0
- nldcsc_elastic_rules/rules/promotions/microsoft_sentinel_external_alerts.toml +113 -0
- nldcsc_elastic_rules/rules/promotions/privilege_escalation_endgame_cred_manipulation_detected.toml +85 -0
- nldcsc_elastic_rules/rules/promotions/privilege_escalation_endgame_cred_manipulation_prevented.toml +85 -0
- nldcsc_elastic_rules/rules/promotions/privilege_escalation_endgame_permission_theft_detected.toml +85 -0
- nldcsc_elastic_rules/rules/promotions/privilege_escalation_endgame_permission_theft_prevented.toml +85 -0
- nldcsc_elastic_rules/rules/promotions/privilege_escalation_endgame_process_injection_detected.toml +86 -0
- nldcsc_elastic_rules/rules/promotions/privilege_escalation_endgame_process_injection_prevented.toml +85 -0
- nldcsc_elastic_rules/rules/promotions/sentinelone_alert_external_alerts.toml +114 -0
- nldcsc_elastic_rules/rules/promotions/sentinelone_threat_external_alerts.toml +102 -0
- nldcsc_elastic_rules/rules/promotions/splunk_external_alerts.toml +114 -0
- nldcsc_elastic_rules/rules/threat_intel/threat_intel_indicator_match_address.toml +187 -0
- nldcsc_elastic_rules/rules/threat_intel/threat_intel_indicator_match_email.toml +167 -0
- nldcsc_elastic_rules/rules/threat_intel/threat_intel_indicator_match_hash.toml +235 -0
- nldcsc_elastic_rules/rules/threat_intel/threat_intel_indicator_match_registry.toml +174 -0
- nldcsc_elastic_rules/rules/threat_intel/threat_intel_indicator_match_url.toml +190 -0
- nldcsc_elastic_rules/rules/threat_intel/threat_intel_rapid7_threat_command.toml +108 -0
- nldcsc_elastic_rules/rules/windows/collection_email_outlook_mailbox_via_com.toml +122 -0
- nldcsc_elastic_rules/rules/windows/collection_email_powershell_exchange_mailbox.toml +142 -0
- nldcsc_elastic_rules/rules/windows/collection_mailbox_export_winlog.toml +124 -0
- nldcsc_elastic_rules/rules/windows/collection_posh_audio_capture.toml +135 -0
- nldcsc_elastic_rules/rules/windows/collection_posh_clipboard_capture.toml +164 -0
- nldcsc_elastic_rules/rules/windows/collection_posh_keylogger.toml +146 -0
- nldcsc_elastic_rules/rules/windows/collection_posh_mailbox.toml +155 -0
- nldcsc_elastic_rules/rules/windows/collection_posh_screen_grabber.toml +126 -0
- nldcsc_elastic_rules/rules/windows/collection_posh_webcam_video_capture.toml +134 -0
- nldcsc_elastic_rules/rules/windows/collection_winrar_encryption.toml +129 -0
- nldcsc_elastic_rules/rules/windows/command_and_control_certreq_postdata.toml +172 -0
- nldcsc_elastic_rules/rules/windows/command_and_control_common_llm_endpoint.toml +158 -0
- nldcsc_elastic_rules/rules/windows/command_and_control_common_webservices.toml +383 -0
- nldcsc_elastic_rules/rules/windows/command_and_control_dns_susp_tld.toml +105 -0
- nldcsc_elastic_rules/rules/windows/command_and_control_dns_tunneling_nslookup.toml +109 -0
- nldcsc_elastic_rules/rules/windows/command_and_control_encrypted_channel_freesslcert.toml +105 -0
- nldcsc_elastic_rules/rules/windows/command_and_control_headless_browser.toml +102 -0
- nldcsc_elastic_rules/rules/windows/command_and_control_iexplore_via_com.toml +119 -0
- nldcsc_elastic_rules/rules/windows/command_and_control_ingress_transfer_bits.toml +173 -0
- nldcsc_elastic_rules/rules/windows/command_and_control_new_terms_commonly_abused_rat_execution.toml +303 -0
- nldcsc_elastic_rules/rules/windows/command_and_control_outlook_home_page.toml +117 -0
- nldcsc_elastic_rules/rules/windows/command_and_control_port_forwarding_added_registry.toml +120 -0
- nldcsc_elastic_rules/rules/windows/command_and_control_rdp_tunnel_plink.toml +121 -0
- nldcsc_elastic_rules/rules/windows/command_and_control_remcos_rat_iocs.toml +104 -0
- nldcsc_elastic_rules/rules/windows/command_and_control_remote_file_copy_desktopimgdownldr.toml +183 -0
- nldcsc_elastic_rules/rules/windows/command_and_control_remote_file_copy_mpcmdrun.toml +181 -0
- nldcsc_elastic_rules/rules/windows/command_and_control_remote_file_copy_powershell.toml +191 -0
- nldcsc_elastic_rules/rules/windows/command_and_control_remote_file_copy_scripts.toml +152 -0
- nldcsc_elastic_rules/rules/windows/command_and_control_rmm_netsupport_susp_path.toml +102 -0
- nldcsc_elastic_rules/rules/windows/command_and_control_screenconnect_childproc.toml +120 -0
- nldcsc_elastic_rules/rules/windows/command_and_control_sunburst_c2_activity_detected.toml +165 -0
- nldcsc_elastic_rules/rules/windows/command_and_control_teamviewer_remote_file_copy.toml +142 -0
- nldcsc_elastic_rules/rules/windows/command_and_control_tool_transfer_via_curl.toml +121 -0
- nldcsc_elastic_rules/rules/windows/command_and_control_tunnel_vscode.toml +105 -0
- nldcsc_elastic_rules/rules/windows/credential_access_adidns_wildcard.toml +117 -0
- nldcsc_elastic_rules/rules/windows/credential_access_adidns_wpad_record.toml +113 -0
- nldcsc_elastic_rules/rules/windows/credential_access_browsers_unusual_parent.toml +125 -0
- nldcsc_elastic_rules/rules/windows/credential_access_bruteforce_admin_account.toml +141 -0
- nldcsc_elastic_rules/rules/windows/credential_access_bruteforce_multiple_logon_failure_followed_by_success.toml +153 -0
- nldcsc_elastic_rules/rules/windows/credential_access_bruteforce_multiple_logon_failure_same_srcip.toml +163 -0
- nldcsc_elastic_rules/rules/windows/credential_access_cmdline_dump_tool.toml +160 -0
- nldcsc_elastic_rules/rules/windows/credential_access_copy_ntds_sam_volshadowcp_cmdline.toml +171 -0
- nldcsc_elastic_rules/rules/windows/credential_access_credential_dumping_msbuild.toml +170 -0
- nldcsc_elastic_rules/rules/windows/credential_access_dcsync_newterm_subjectuser.toml +149 -0
- nldcsc_elastic_rules/rules/windows/credential_access_dcsync_replication_rights.toml +155 -0
- nldcsc_elastic_rules/rules/windows/credential_access_dcsync_user_backdoor.toml +124 -0
- nldcsc_elastic_rules/rules/windows/credential_access_disable_kerberos_preauth.toml +138 -0
- nldcsc_elastic_rules/rules/windows/credential_access_dnsnode_creation.toml +117 -0
- nldcsc_elastic_rules/rules/windows/credential_access_dollar_account_relay.toml +113 -0
- nldcsc_elastic_rules/rules/windows/credential_access_dollar_account_relay_kerberos.toml +129 -0
- nldcsc_elastic_rules/rules/windows/credential_access_dollar_account_relay_ntlm.toml +128 -0
- nldcsc_elastic_rules/rules/windows/credential_access_domain_backup_dpapi_private_keys.toml +80 -0
- nldcsc_elastic_rules/rules/windows/credential_access_dump_registry_hives.toml +118 -0
- nldcsc_elastic_rules/rules/windows/credential_access_generic_localdumps.toml +123 -0
- nldcsc_elastic_rules/rules/windows/credential_access_iis_connectionstrings_dumping.toml +108 -0
- nldcsc_elastic_rules/rules/windows/credential_access_imageload_azureadconnectauthsvc.toml +112 -0
- nldcsc_elastic_rules/rules/windows/credential_access_kerberoasting_unusual_process.toml +181 -0
- nldcsc_elastic_rules/rules/windows/credential_access_kerberos_coerce.toml +126 -0
- nldcsc_elastic_rules/rules/windows/credential_access_kerberos_coerce_dns.toml +118 -0
- nldcsc_elastic_rules/rules/windows/credential_access_kirbi_file.toml +103 -0
- nldcsc_elastic_rules/rules/windows/credential_access_ldap_attributes.toml +158 -0
- nldcsc_elastic_rules/rules/windows/credential_access_lsass_handle_via_malseclogon.toml +105 -0
- nldcsc_elastic_rules/rules/windows/credential_access_lsass_loaded_susp_dll.toml +160 -0
- nldcsc_elastic_rules/rules/windows/credential_access_lsass_memdump_file_created.toml +172 -0
- nldcsc_elastic_rules/rules/windows/credential_access_lsass_memdump_handle_access.toml +201 -0
- nldcsc_elastic_rules/rules/windows/credential_access_lsass_openprocess_api.toml +216 -0
- nldcsc_elastic_rules/rules/windows/credential_access_machine_account_smb_relay.toml +105 -0
- nldcsc_elastic_rules/rules/windows/credential_access_mimikatz_memssp_default_logs.toml +109 -0
- nldcsc_elastic_rules/rules/windows/credential_access_mimikatz_powershell_module.toml +132 -0
- nldcsc_elastic_rules/rules/windows/credential_access_mod_wdigest_security_provider.toml +118 -0
- nldcsc_elastic_rules/rules/windows/credential_access_moving_registry_hive_via_smb.toml +118 -0
- nldcsc_elastic_rules/rules/windows/credential_access_persistence_network_logon_provider_modification.toml +176 -0
- nldcsc_elastic_rules/rules/windows/credential_access_posh_invoke_ninjacopy.toml +136 -0
- nldcsc_elastic_rules/rules/windows/credential_access_posh_kerb_ticket_dump.toml +146 -0
- nldcsc_elastic_rules/rules/windows/credential_access_posh_minidump.toml +131 -0
- nldcsc_elastic_rules/rules/windows/credential_access_posh_relay_tools.toml +152 -0
- nldcsc_elastic_rules/rules/windows/credential_access_posh_request_ticket.toml +139 -0
- nldcsc_elastic_rules/rules/windows/credential_access_posh_veeam_sql.toml +134 -0
- nldcsc_elastic_rules/rules/windows/credential_access_potential_lsa_memdump_via_mirrordump.toml +103 -0
- nldcsc_elastic_rules/rules/windows/credential_access_rare_webdav_destination.toml +98 -0
- nldcsc_elastic_rules/rules/windows/credential_access_regback_sam_security_hives.toml +101 -0
- nldcsc_elastic_rules/rules/windows/credential_access_relay_ntlm_auth_via_http_spoolss.toml +130 -0
- nldcsc_elastic_rules/rules/windows/credential_access_remote_sam_secretsdump.toml +119 -0
- nldcsc_elastic_rules/rules/windows/credential_access_saved_creds_vault_winlog.toml +110 -0
- nldcsc_elastic_rules/rules/windows/credential_access_saved_creds_vaultcmd.toml +117 -0
- nldcsc_elastic_rules/rules/windows/credential_access_seenabledelegationprivilege_assigned_to_user.toml +121 -0
- nldcsc_elastic_rules/rules/windows/credential_access_shadow_credentials.toml +120 -0
- nldcsc_elastic_rules/rules/windows/credential_access_spn_attribute_modified.toml +124 -0
- nldcsc_elastic_rules/rules/windows/credential_access_suspicious_comsvcs_imageload.toml +172 -0
- nldcsc_elastic_rules/rules/windows/credential_access_suspicious_lsass_access_generic.toml +129 -0
- nldcsc_elastic_rules/rules/windows/credential_access_suspicious_lsass_access_memdump.toml +126 -0
- nldcsc_elastic_rules/rules/windows/credential_access_suspicious_lsass_access_via_snapshot.toml +109 -0
- nldcsc_elastic_rules/rules/windows/credential_access_suspicious_winreg_access_via_sebackup_priv.toml +143 -0
- nldcsc_elastic_rules/rules/windows/credential_access_symbolic_link_to_shadow_copy_created.toml +147 -0
- nldcsc_elastic_rules/rules/windows/credential_access_veeam_backup_dll_imageload.toml +112 -0
- nldcsc_elastic_rules/rules/windows/credential_access_veeam_commands.toml +129 -0
- nldcsc_elastic_rules/rules/windows/credential_access_via_snapshot_lsass_clone_creation.toml +96 -0
- nldcsc_elastic_rules/rules/windows/credential_access_wbadmin_ntds.toml +124 -0
- nldcsc_elastic_rules/rules/windows/credential_access_web_config_file_access.toml +96 -0
- nldcsc_elastic_rules/rules/windows/credential_access_wireless_creds_dumping.toml +153 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_adding_the_hidden_file_attribute_with_via_attribexe.toml +175 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_amsi_bypass_dllhijack.toml +177 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_amsi_bypass_powershell.toml +175 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_amsienable_key_mod.toml +132 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_audit_policy_disabled_winlog.toml +129 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_clearing_windows_console_history.toml +133 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_clearing_windows_event_logs.toml +121 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_clearing_windows_security_logs.toml +87 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_code_signing_policy_modification_builtin_tools.toml +139 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_code_signing_policy_modification_registry.toml +149 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_communication_apps_suspicious_child_process.toml +279 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_create_mod_root_certificate.toml +172 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_cve_2020_0601.toml +89 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_defender_disabled_via_registry.toml +136 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_defender_exclusion_via_powershell.toml +148 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_delete_volume_usn_journal_with_fsutil.toml +104 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_disable_nla.toml +110 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_disable_posh_scriptblocklogging.toml +129 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_disable_windows_firewall_rules_with_netsh.toml +105 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_disabling_windows_defender_powershell.toml +133 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_disabling_windows_logs.toml +136 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_dns_over_https_enabled.toml +111 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_dotnet_compiler_parent_process.toml +125 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_enable_inbound_rdp_with_netsh.toml +109 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_enable_network_discovery_with_netsh.toml +104 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_execution_control_panel_suspicious_args.toml +118 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_execution_lolbas_wuauclt.toml +151 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_execution_msbuild_started_by_office_app.toml +144 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_execution_msbuild_started_by_script.toml +130 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_execution_msbuild_started_by_system_process.toml +116 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_execution_msbuild_started_renamed.toml +155 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_execution_msbuild_started_unusal_process.toml +124 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_execution_suspicious_explorer_winword.toml +146 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_execution_windefend_unusual_path.toml +124 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_file_creation_mult_extension.toml +133 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_from_unusual_directory.toml +194 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_hide_encoded_executable_registry.toml +103 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_iis_httplogging_disabled.toml +107 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_indirect_exec_conhost.toml +93 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_indirect_exec_forfiles.toml +92 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_indirect_exec_openssh.toml +93 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_injection_msbuild.toml +111 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_installutil_beacon.toml +100 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_lolbas_win_cdb_utility.toml +108 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_lsass_ppl_disabled_registry.toml +111 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_masquerading_as_elastic_endpoint_process.toml +129 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_masquerading_as_svchost.toml +96 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_masquerading_business_apps_installer.toml +257 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_masquerading_communication_apps.toml +167 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_masquerading_renamed_autoit.toml +146 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_masquerading_suspicious_werfault_childproc.toml +144 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_masquerading_trusted_directory.toml +132 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_masquerading_werfault.toml +150 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_microsoft_defender_tampering.toml +158 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_misc_lolbin_connecting_to_the_internet.toml +147 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_modify_ownership_os_files.toml +111 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_ms_office_suspicious_regmod.toml +133 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_msbuild_making_network_connections.toml +164 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_mshta_beacon.toml +103 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_mshta_susp_child.toml +111 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_msiexec_child_proc_netcon.toml +124 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_msiexec_remote_payload.toml +110 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_msxsl_network.toml +98 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_network_connection_from_windows_binary.toml +199 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_ntlm_downgrade.toml +103 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_obf_args_unicode_modified_letters.toml +108 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_parent_process_pid_spoofing.toml +149 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_persistence_account_tokenfilterpolicy.toml +140 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_posh_assembly_load.toml +224 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_posh_compressed.toml +192 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_posh_defender_tampering.toml +151 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_posh_encryption.toml +110 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_posh_obfuscation.toml +147 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_posh_obfuscation_backtick.toml +170 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_posh_obfuscation_backtick_var.toml +157 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_posh_obfuscation_char_arrays.toml +158 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_posh_obfuscation_concat_dynamic.toml +154 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_posh_obfuscation_high_number_proportion.toml +170 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_posh_obfuscation_iex_env_vars_reconstruction.toml +159 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_posh_obfuscation_iex_string_reconstruction.toml +168 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_posh_obfuscation_index_reversal.toml +164 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_posh_obfuscation_reverse_keyword.toml +155 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_posh_obfuscation_string_concat.toml +159 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_posh_obfuscation_string_format.toml +178 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_posh_obfuscation_whitespace_special_proportion.toml +166 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_posh_process_injection.toml +163 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_powershell_windows_firewall_disabled.toml +141 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_process_termination_followed_by_deletion.toml +176 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_proxy_execution_via_msdt.toml +123 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_reg_disable_enableglobalqueryblocklist.toml +124 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_regmod_remotemonologue.toml +136 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_right_to_left_override.toml +122 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_root_dir_ads_creation.toml +106 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_run_virt_windowssandbox.toml +108 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_rundll32_no_arguments.toml +146 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_sc_sdset.toml +121 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_sccm_scnotification_dll.toml +87 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_scheduledjobs_at_protocol_enabled.toml +123 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_script_via_html_app.toml +144 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_sdelete_like_filename_rename.toml +112 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_sip_provider_mod.toml +112 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_solarwinds_backdoor_service_disabled_via_registry.toml +139 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_suspicious_certutil_commands.toml +153 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_suspicious_execution_from_mounted_device.toml +139 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_suspicious_managedcode_host_process.toml +108 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_suspicious_process_access_direct_syscall.toml +174 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_suspicious_process_creation_calltrace.toml +96 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_suspicious_scrobj_load.toml +112 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_suspicious_short_program_name.toml +141 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_suspicious_wmi_script.toml +108 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_suspicious_zoom_child_process.toml +161 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_system_critical_proc_abnormal_file_activity.toml +161 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_timestomp_sysmon.toml +109 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_unsigned_dll_loaded_from_suspdir.toml +192 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_untrusted_driver_loaded.toml +137 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_unusual_ads_file_creation.toml +193 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_unusual_dir_ads.toml +109 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_unusual_network_connection_via_dllhost.toml +101 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_unusual_network_connection_via_rundll32.toml +128 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_unusual_process_network_connection.toml +108 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_unusual_system_vp_child_program.toml +98 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_via_filter_manager.toml +155 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_wdac_policy_by_unusual_process.toml +104 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_windows_filtering_platform.toml +154 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_workfolders_control_execution.toml +108 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_wsl_bash_exec.toml +133 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_wsl_child_process.toml +124 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_wsl_enabled_via_dism.toml +104 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_wsl_filesystem.toml +98 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_wsl_kalilinux.toml +113 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_wsl_registry_modification.toml +108 -0
- nldcsc_elastic_rules/rules/windows/discovery_active_directory_webservice.toml +96 -0
- nldcsc_elastic_rules/rules/windows/discovery_ad_explorer_execution.toml +126 -0
- nldcsc_elastic_rules/rules/windows/discovery_adfind_command_activity.toml +147 -0
- nldcsc_elastic_rules/rules/windows/discovery_admin_recon.toml +133 -0
- nldcsc_elastic_rules/rules/windows/discovery_command_system_account.toml +126 -0
- nldcsc_elastic_rules/rules/windows/discovery_enumerating_domain_trusts_via_dsquery.toml +111 -0
- nldcsc_elastic_rules/rules/windows/discovery_enumerating_domain_trusts_via_nltest.toml +121 -0
- nldcsc_elastic_rules/rules/windows/discovery_group_policy_object_discovery.toml +100 -0
- nldcsc_elastic_rules/rules/windows/discovery_high_number_ad_properties.toml +98 -0
- nldcsc_elastic_rules/rules/windows/discovery_host_public_ip_address_lookup.toml +161 -0
- nldcsc_elastic_rules/rules/windows/discovery_peripheral_device.toml +96 -0
- nldcsc_elastic_rules/rules/windows/discovery_posh_invoke_sharefinder.toml +154 -0
- nldcsc_elastic_rules/rules/windows/discovery_posh_suspicious_api_functions.toml +206 -0
- nldcsc_elastic_rules/rules/windows/discovery_privileged_localgroup_membership.toml +207 -0
- nldcsc_elastic_rules/rules/windows/discovery_signal_unusual_discovery_signal_proc_cmdline.toml +91 -0
- nldcsc_elastic_rules/rules/windows/discovery_signal_unusual_discovery_signal_proc_executable.toml +86 -0
- nldcsc_elastic_rules/rules/windows/discovery_whoami_command_activity.toml +130 -0
- nldcsc_elastic_rules/rules/windows/execution_apt_solarwinds_backdoor_child_cmd_powershell.toml +140 -0
- nldcsc_elastic_rules/rules/windows/execution_apt_solarwinds_backdoor_unusual_child_processes.toml +126 -0
- nldcsc_elastic_rules/rules/windows/execution_com_object_xwizard.toml +123 -0
- nldcsc_elastic_rules/rules/windows/execution_command_prompt_connecting_to_the_internet.toml +166 -0
- nldcsc_elastic_rules/rules/windows/execution_command_shell_started_by_svchost.toml +208 -0
- nldcsc_elastic_rules/rules/windows/execution_command_shell_started_by_unusual_process.toml +127 -0
- nldcsc_elastic_rules/rules/windows/execution_command_shell_via_rundll32.toml +139 -0
- nldcsc_elastic_rules/rules/windows/execution_delayed_via_ping_lolbas_unsigned.toml +188 -0
- nldcsc_elastic_rules/rules/windows/execution_downloaded_shortcut_files.toml +110 -0
- nldcsc_elastic_rules/rules/windows/execution_downloaded_url_file.toml +107 -0
- nldcsc_elastic_rules/rules/windows/execution_enumeration_via_wmiprvse.toml +149 -0
- nldcsc_elastic_rules/rules/windows/execution_from_unusual_path_cmdline.toml +271 -0
- nldcsc_elastic_rules/rules/windows/execution_html_help_executable_program_connecting_to_the_internet.toml +175 -0
- nldcsc_elastic_rules/rules/windows/execution_initial_access_foxmail_exploit.toml +115 -0
- nldcsc_elastic_rules/rules/windows/execution_initial_access_via_msc_file.toml +140 -0
- nldcsc_elastic_rules/rules/windows/execution_initial_access_wps_dll_exploit.toml +113 -0
- nldcsc_elastic_rules/rules/windows/execution_mofcomp.toml +120 -0
- nldcsc_elastic_rules/rules/windows/execution_ms_office_written_file.toml +128 -0
- nldcsc_elastic_rules/rules/windows/execution_nodejs_susp_patterns.toml +119 -0
- nldcsc_elastic_rules/rules/windows/execution_pdf_written_file.toml +134 -0
- nldcsc_elastic_rules/rules/windows/execution_posh_hacktool_authors.toml +136 -0
- nldcsc_elastic_rules/rules/windows/execution_posh_hacktool_functions.toml +357 -0
- nldcsc_elastic_rules/rules/windows/execution_posh_malicious_script_agg.toml +150 -0
- nldcsc_elastic_rules/rules/windows/execution_posh_portable_executable.toml +175 -0
- nldcsc_elastic_rules/rules/windows/execution_posh_psreflect.toml +194 -0
- nldcsc_elastic_rules/rules/windows/execution_powershell_susp_args_via_winscript.toml +115 -0
- nldcsc_elastic_rules/rules/windows/execution_psexec_lateral_movement_command.toml +134 -0
- nldcsc_elastic_rules/rules/windows/execution_register_server_program_connecting_to_the_internet.toml +171 -0
- nldcsc_elastic_rules/rules/windows/execution_revshell_cmd_via_netcat.toml +97 -0
- nldcsc_elastic_rules/rules/windows/execution_scheduled_task_powershell_source.toml +110 -0
- nldcsc_elastic_rules/rules/windows/execution_scripting_remote_webdav.toml +120 -0
- nldcsc_elastic_rules/rules/windows/execution_scripts_archive_file.toml +123 -0
- nldcsc_elastic_rules/rules/windows/execution_shared_modules_local_sxs_dll.toml +73 -0
- nldcsc_elastic_rules/rules/windows/execution_suspicious_cmd_wmi.toml +117 -0
- nldcsc_elastic_rules/rules/windows/execution_suspicious_image_load_wmi_ms_office.toml +100 -0
- nldcsc_elastic_rules/rules/windows/execution_suspicious_pdf_reader.toml +143 -0
- nldcsc_elastic_rules/rules/windows/execution_suspicious_powershell_imgload.toml +141 -0
- nldcsc_elastic_rules/rules/windows/execution_suspicious_psexesvc.toml +115 -0
- nldcsc_elastic_rules/rules/windows/execution_via_compiled_html_file.toml +180 -0
- nldcsc_elastic_rules/rules/windows/execution_via_hidden_shell_conhost.toml +144 -0
- nldcsc_elastic_rules/rules/windows/execution_via_mmc_console_file_unusual_path.toml +146 -0
- nldcsc_elastic_rules/rules/windows/execution_windows_cmd_shell_susp_args.toml +179 -0
- nldcsc_elastic_rules/rules/windows/execution_windows_fakecaptcha_cmd_ps.toml +144 -0
- nldcsc_elastic_rules/rules/windows/execution_windows_phish_clickfix.toml +143 -0
- nldcsc_elastic_rules/rules/windows/execution_windows_powershell_susp_args.toml +188 -0
- nldcsc_elastic_rules/rules/windows/execution_windows_script_from_internet.toml +132 -0
- nldcsc_elastic_rules/rules/windows/exfiltration_smb_rare_destination.toml +138 -0
- nldcsc_elastic_rules/rules/windows/impact_backup_file_deletion.toml +125 -0
- nldcsc_elastic_rules/rules/windows/impact_deleting_backup_catalogs_with_wbadmin.toml +111 -0
- nldcsc_elastic_rules/rules/windows/impact_high_freq_file_renames_by_kernel.toml +114 -0
- nldcsc_elastic_rules/rules/windows/impact_mod_critical_os_files.toml +100 -0
- nldcsc_elastic_rules/rules/windows/impact_modification_of_boot_config.toml +109 -0
- nldcsc_elastic_rules/rules/windows/impact_ransomware_file_rename_smb.toml +117 -0
- nldcsc_elastic_rules/rules/windows/impact_ransomware_note_file_over_smb.toml +117 -0
- nldcsc_elastic_rules/rules/windows/impact_stop_process_service_threshold.toml +97 -0
- nldcsc_elastic_rules/rules/windows/impact_volume_shadow_copy_deletion_or_resized_via_vssadmin.toml +124 -0
- nldcsc_elastic_rules/rules/windows/impact_volume_shadow_copy_deletion_via_powershell.toml +148 -0
- nldcsc_elastic_rules/rules/windows/impact_volume_shadow_copy_deletion_via_wmic.toml +137 -0
- nldcsc_elastic_rules/rules/windows/initial_access_evasion_suspicious_htm_file_creation.toml +151 -0
- nldcsc_elastic_rules/rules/windows/initial_access_execution_from_inetcache.toml +143 -0
- nldcsc_elastic_rules/rules/windows/initial_access_execution_from_removable_media.toml +93 -0
- nldcsc_elastic_rules/rules/windows/initial_access_execution_remote_via_msiexec.toml +136 -0
- nldcsc_elastic_rules/rules/windows/initial_access_execution_via_office_addins.toml +160 -0
- nldcsc_elastic_rules/rules/windows/initial_access_exfiltration_first_time_seen_usb.toml +124 -0
- nldcsc_elastic_rules/rules/windows/initial_access_exploit_jetbrains_teamcity.toml +145 -0
- nldcsc_elastic_rules/rules/windows/initial_access_rdp_file_mail_attachment.toml +118 -0
- nldcsc_elastic_rules/rules/windows/initial_access_script_executing_powershell.toml +145 -0
- nldcsc_elastic_rules/rules/windows/initial_access_scripts_process_started_via_wmi.toml +146 -0
- nldcsc_elastic_rules/rules/windows/initial_access_suspicious_ms_exchange_files.toml +110 -0
- nldcsc_elastic_rules/rules/windows/initial_access_suspicious_ms_exchange_process.toml +147 -0
- nldcsc_elastic_rules/rules/windows/initial_access_suspicious_ms_exchange_worker_child_process.toml +129 -0
- nldcsc_elastic_rules/rules/windows/initial_access_suspicious_ms_office_child_process.toml +175 -0
- nldcsc_elastic_rules/rules/windows/initial_access_suspicious_ms_outlook_child_process.toml +162 -0
- nldcsc_elastic_rules/rules/windows/initial_access_suspicious_windows_server_update_svc.toml +121 -0
- nldcsc_elastic_rules/rules/windows/initial_access_url_cve_2025_33053.toml +120 -0
- nldcsc_elastic_rules/rules/windows/initial_access_via_explorer_suspicious_child_parent_args.toml +158 -0
- nldcsc_elastic_rules/rules/windows/initial_access_webshell_screenconnect_server.toml +127 -0
- nldcsc_elastic_rules/rules/windows/initial_access_xsl_script_execution_via_com.toml +112 -0
- nldcsc_elastic_rules/rules/windows/lateral_movement_alternate_creds_pth.toml +102 -0
- nldcsc_elastic_rules/rules/windows/lateral_movement_cmd_service.toml +127 -0
- nldcsc_elastic_rules/rules/windows/lateral_movement_credential_access_kerberos_correlation.toml +127 -0
- nldcsc_elastic_rules/rules/windows/lateral_movement_dcom_hta.toml +120 -0
- nldcsc_elastic_rules/rules/windows/lateral_movement_dcom_mmc20.toml +119 -0
- nldcsc_elastic_rules/rules/windows/lateral_movement_dcom_shellwindow_shellbrowserwindow.toml +103 -0
- nldcsc_elastic_rules/rules/windows/lateral_movement_defense_evasion_lanman_nullsessionpipe_modification.toml +121 -0
- nldcsc_elastic_rules/rules/windows/lateral_movement_direct_outbound_smb_connection.toml +158 -0
- nldcsc_elastic_rules/rules/windows/lateral_movement_evasion_rdp_shadowing.toml +122 -0
- nldcsc_elastic_rules/rules/windows/lateral_movement_executable_tool_transfer_smb.toml +110 -0
- nldcsc_elastic_rules/rules/windows/lateral_movement_execution_from_tsclient_mup.toml +109 -0
- nldcsc_elastic_rules/rules/windows/lateral_movement_execution_via_file_shares_sequence.toml +163 -0
- nldcsc_elastic_rules/rules/windows/lateral_movement_incoming_winrm_shell_execution.toml +106 -0
- nldcsc_elastic_rules/rules/windows/lateral_movement_incoming_wmi.toml +124 -0
- nldcsc_elastic_rules/rules/windows/lateral_movement_mount_hidden_or_webdav_share_net.toml +151 -0
- nldcsc_elastic_rules/rules/windows/lateral_movement_powershell_remoting_target.toml +127 -0
- nldcsc_elastic_rules/rules/windows/lateral_movement_rdp_enabled_registry.toml +132 -0
- nldcsc_elastic_rules/rules/windows/lateral_movement_rdp_sharprdp_target.toml +108 -0
- nldcsc_elastic_rules/rules/windows/lateral_movement_remote_file_copy_hidden_share.toml +108 -0
- nldcsc_elastic_rules/rules/windows/lateral_movement_remote_service_installed_winlog.toml +131 -0
- nldcsc_elastic_rules/rules/windows/lateral_movement_remote_services.toml +174 -0
- nldcsc_elastic_rules/rules/windows/lateral_movement_remote_task_creation_winlog.toml +93 -0
- nldcsc_elastic_rules/rules/windows/lateral_movement_scheduled_task_target.toml +107 -0
- nldcsc_elastic_rules/rules/windows/lateral_movement_suspicious_rdp_client_imageload.toml +123 -0
- nldcsc_elastic_rules/rules/windows/lateral_movement_unusual_dns_service_children.toml +124 -0
- nldcsc_elastic_rules/rules/windows/lateral_movement_unusual_dns_service_file_writes.toml +97 -0
- nldcsc_elastic_rules/rules/windows/lateral_movement_via_startup_folder_rdp_smb.toml +126 -0
- nldcsc_elastic_rules/rules/windows/lateral_movement_via_wsus_update.toml +105 -0
- nldcsc_elastic_rules/rules/windows/persistence_ad_adminsdholder.toml +103 -0
- nldcsc_elastic_rules/rules/windows/persistence_adobe_hijack_persistence.toml +154 -0
- nldcsc_elastic_rules/rules/windows/persistence_app_compat_shim.toml +117 -0
- nldcsc_elastic_rules/rules/windows/persistence_appcertdlls_registry.toml +121 -0
- nldcsc_elastic_rules/rules/windows/persistence_appinitdlls_registry.toml +196 -0
- nldcsc_elastic_rules/rules/windows/persistence_browser_extension_install.toml +111 -0
- nldcsc_elastic_rules/rules/windows/persistence_dontexpirepasswd_account.toml +108 -0
- nldcsc_elastic_rules/rules/windows/persistence_evasion_hidden_local_account_creation.toml +104 -0
- nldcsc_elastic_rules/rules/windows/persistence_evasion_registry_ifeo_injection.toml +134 -0
- nldcsc_elastic_rules/rules/windows/persistence_evasion_registry_startup_shell_folder_modified.toml +191 -0
- nldcsc_elastic_rules/rules/windows/persistence_group_modification_by_system.toml +104 -0
- nldcsc_elastic_rules/rules/windows/persistence_local_scheduled_job_creation.toml +114 -0
- nldcsc_elastic_rules/rules/windows/persistence_local_scheduled_task_creation.toml +109 -0
- nldcsc_elastic_rules/rules/windows/persistence_local_scheduled_task_scripting.toml +97 -0
- nldcsc_elastic_rules/rules/windows/persistence_ms_office_addins_file.toml +111 -0
- nldcsc_elastic_rules/rules/windows/persistence_ms_outlook_vba_template.toml +102 -0
- nldcsc_elastic_rules/rules/windows/persistence_msds_alloweddelegateto_krbtgt.toml +117 -0
- nldcsc_elastic_rules/rules/windows/persistence_msi_installer_task_startup.toml +121 -0
- nldcsc_elastic_rules/rules/windows/persistence_msoffice_startup_registry.toml +118 -0
- nldcsc_elastic_rules/rules/windows/persistence_netsh_helper_dll.toml +117 -0
- nldcsc_elastic_rules/rules/windows/persistence_powershell_exch_mailbox_activesync_add_device.toml +129 -0
- nldcsc_elastic_rules/rules/windows/persistence_powershell_profiles.toml +176 -0
- nldcsc_elastic_rules/rules/windows/persistence_priv_escalation_via_accessibility_features.toml +189 -0
- nldcsc_elastic_rules/rules/windows/persistence_registry_uncommon.toml +193 -0
- nldcsc_elastic_rules/rules/windows/persistence_remote_password_reset.toml +122 -0
- nldcsc_elastic_rules/rules/windows/persistence_run_key_and_startup_broad.toml +188 -0
- nldcsc_elastic_rules/rules/windows/persistence_runtime_run_key_startup_susp_procs.toml +107 -0
- nldcsc_elastic_rules/rules/windows/persistence_scheduled_task_creation_winlog.toml +104 -0
- nldcsc_elastic_rules/rules/windows/persistence_scheduled_task_updated.toml +98 -0
- nldcsc_elastic_rules/rules/windows/persistence_sdprop_exclusion_dsheuristics.toml +125 -0
- nldcsc_elastic_rules/rules/windows/persistence_service_dll_unsigned.toml +219 -0
- nldcsc_elastic_rules/rules/windows/persistence_service_windows_service_winlog.toml +148 -0
- nldcsc_elastic_rules/rules/windows/persistence_services_registry.toml +147 -0
- nldcsc_elastic_rules/rules/windows/persistence_startup_folder_file_written_by_suspicious_process.toml +172 -0
- nldcsc_elastic_rules/rules/windows/persistence_startup_folder_file_written_by_unsigned_process.toml +166 -0
- nldcsc_elastic_rules/rules/windows/persistence_startup_folder_scripts.toml +168 -0
- nldcsc_elastic_rules/rules/windows/persistence_suspicious_com_hijack_registry.toml +197 -0
- nldcsc_elastic_rules/rules/windows/persistence_suspicious_image_load_scheduled_task_ms_office.toml +182 -0
- nldcsc_elastic_rules/rules/windows/persistence_suspicious_scheduled_task_runtime.toml +153 -0
- nldcsc_elastic_rules/rules/windows/persistence_suspicious_service_created_registry.toml +119 -0
- nldcsc_elastic_rules/rules/windows/persistence_sysmon_wmi_event_subscription.toml +100 -0
- nldcsc_elastic_rules/rules/windows/persistence_system_shells_via_services.toml +160 -0
- nldcsc_elastic_rules/rules/windows/persistence_temp_scheduled_task.toml +109 -0
- nldcsc_elastic_rules/rules/windows/persistence_time_provider_mod.toml +172 -0
- nldcsc_elastic_rules/rules/windows/persistence_user_account_added_to_privileged_group_ad.toml +115 -0
- nldcsc_elastic_rules/rules/windows/persistence_user_account_creation.toml +105 -0
- nldcsc_elastic_rules/rules/windows/persistence_via_application_shimming.toml +126 -0
- nldcsc_elastic_rules/rules/windows/persistence_via_bits_job_notify_command.toml +109 -0
- nldcsc_elastic_rules/rules/windows/persistence_via_hidden_run_key_valuename.toml +139 -0
- nldcsc_elastic_rules/rules/windows/persistence_via_lsa_security_support_provider_registry.toml +127 -0
- nldcsc_elastic_rules/rules/windows/persistence_via_telemetrycontroller_scheduledtask_hijack.toml +141 -0
- nldcsc_elastic_rules/rules/windows/persistence_via_update_orchestrator_service_hijack.toml +182 -0
- nldcsc_elastic_rules/rules/windows/persistence_via_windows_management_instrumentation_event_subscription.toml +121 -0
- nldcsc_elastic_rules/rules/windows/persistence_via_wmi_stdregprov_run_services.toml +210 -0
- nldcsc_elastic_rules/rules/windows/persistence_via_xp_cmdshell_mssql_stored_procedure.toml +149 -0
- nldcsc_elastic_rules/rules/windows/persistence_web_shell_aspx_write.toml +109 -0
- nldcsc_elastic_rules/rules/windows/persistence_webshell_detection.toml +216 -0
- nldcsc_elastic_rules/rules/windows/persistence_werfault_reflectdebugger.toml +114 -0
- nldcsc_elastic_rules/rules/windows/privilege_escalation_badsuccessor_dmsa_abuse.toml +91 -0
- nldcsc_elastic_rules/rules/windows/privilege_escalation_create_process_as_different_user.toml +106 -0
- nldcsc_elastic_rules/rules/windows/privilege_escalation_create_process_with_token_unpriv.toml +121 -0
- nldcsc_elastic_rules/rules/windows/privilege_escalation_credroaming_ldap.toml +111 -0
- nldcsc_elastic_rules/rules/windows/privilege_escalation_disable_uac_registry.toml +163 -0
- nldcsc_elastic_rules/rules/windows/privilege_escalation_dmsa_creation_by_unusual_user.toml +90 -0
- nldcsc_elastic_rules/rules/windows/privilege_escalation_dns_serverlevelplugindll.toml +95 -0
- nldcsc_elastic_rules/rules/windows/privilege_escalation_driver_newterm_imphash.toml +156 -0
- nldcsc_elastic_rules/rules/windows/privilege_escalation_expired_driver_loaded.toml +105 -0
- nldcsc_elastic_rules/rules/windows/privilege_escalation_exploit_cve_202238028.toml +127 -0
- nldcsc_elastic_rules/rules/windows/privilege_escalation_gpo_schtask_service_creation.toml +125 -0
- nldcsc_elastic_rules/rules/windows/privilege_escalation_group_policy_iniscript.toml +144 -0
- nldcsc_elastic_rules/rules/windows/privilege_escalation_group_policy_privileged_groups.toml +106 -0
- nldcsc_elastic_rules/rules/windows/privilege_escalation_group_policy_scheduled_task.toml +161 -0
- nldcsc_elastic_rules/rules/windows/privilege_escalation_installertakeover.toml +156 -0
- nldcsc_elastic_rules/rules/windows/privilege_escalation_krbrelayup_service_creation.toml +119 -0
- nldcsc_elastic_rules/rules/windows/privilege_escalation_lsa_auth_package.toml +114 -0
- nldcsc_elastic_rules/rules/windows/privilege_escalation_make_token_local.toml +109 -0
- nldcsc_elastic_rules/rules/windows/privilege_escalation_msi_repair_via_mshelp_link.toml +119 -0
- nldcsc_elastic_rules/rules/windows/privilege_escalation_named_pipe_impersonation.toml +148 -0
- nldcsc_elastic_rules/rules/windows/privilege_escalation_newcreds_logon_rare_process.toml +100 -0
- nldcsc_elastic_rules/rules/windows/privilege_escalation_persistence_phantom_dll.toml +214 -0
- nldcsc_elastic_rules/rules/windows/privilege_escalation_port_monitor_print_pocessor_abuse.toml +128 -0
- nldcsc_elastic_rules/rules/windows/privilege_escalation_posh_token_impersonation.toml +219 -0
- nldcsc_elastic_rules/rules/windows/privilege_escalation_printspooler_registry_copyfiles.toml +108 -0
- nldcsc_elastic_rules/rules/windows/privilege_escalation_printspooler_service_suspicious_file.toml +159 -0
- nldcsc_elastic_rules/rules/windows/privilege_escalation_printspooler_suspicious_file_deletion.toml +104 -0
- nldcsc_elastic_rules/rules/windows/privilege_escalation_printspooler_suspicious_spl_file.toml +155 -0
- nldcsc_elastic_rules/rules/windows/privilege_escalation_reg_service_imagepath_mod.toml +180 -0
- nldcsc_elastic_rules/rules/windows/privilege_escalation_rogue_windir_environment_var.toml +110 -0
- nldcsc_elastic_rules/rules/windows/privilege_escalation_samaccountname_spoofing_attack.toml +119 -0
- nldcsc_elastic_rules/rules/windows/privilege_escalation_service_control_spawned_script_int.toml +192 -0
- nldcsc_elastic_rules/rules/windows/privilege_escalation_suspicious_dnshostname_update.toml +110 -0
- nldcsc_elastic_rules/rules/windows/privilege_escalation_thread_cpu_priority_hijack.toml +94 -0
- nldcsc_elastic_rules/rules/windows/privilege_escalation_tokenmanip_sedebugpriv_enabled.toml +127 -0
- nldcsc_elastic_rules/rules/windows/privilege_escalation_uac_bypass_com_clipup.toml +140 -0
- nldcsc_elastic_rules/rules/windows/privilege_escalation_uac_bypass_com_ieinstal.toml +143 -0
- nldcsc_elastic_rules/rules/windows/privilege_escalation_uac_bypass_com_interface_icmluautil.toml +137 -0
- nldcsc_elastic_rules/rules/windows/privilege_escalation_uac_bypass_diskcleanup_hijack.toml +153 -0
- nldcsc_elastic_rules/rules/windows/privilege_escalation_uac_bypass_dll_sideloading.toml +137 -0
- nldcsc_elastic_rules/rules/windows/privilege_escalation_uac_bypass_event_viewer.toml +179 -0
- nldcsc_elastic_rules/rules/windows/privilege_escalation_uac_bypass_mock_windir.toml +179 -0
- nldcsc_elastic_rules/rules/windows/privilege_escalation_uac_bypass_winfw_mmc_hijack.toml +177 -0
- nldcsc_elastic_rules/rules/windows/privilege_escalation_unquoted_service_path.toml +108 -0
- nldcsc_elastic_rules/rules/windows/privilege_escalation_unusual_parentchild_relationship.toml +180 -0
- nldcsc_elastic_rules/rules/windows/privilege_escalation_unusual_printspooler_childprocess.toml +128 -0
- nldcsc_elastic_rules/rules/windows/privilege_escalation_unusual_svchost_childproc_childless.toml +145 -0
- nldcsc_elastic_rules/rules/windows/privilege_escalation_via_ppid_spoofing.toml +158 -0
- nldcsc_elastic_rules/rules/windows/privilege_escalation_via_rogue_named_pipe.toml +106 -0
- nldcsc_elastic_rules/rules/windows/privilege_escalation_via_token_theft.toml +157 -0
- nldcsc_elastic_rules/rules/windows/privilege_escalation_windows_service_via_unusual_client.toml +127 -0
- nldcsc_elastic_rules/utils.py +7 -0
- nldcsc_elastic_rules-0.0.8.dist-info/METADATA +3 -0
- nldcsc_elastic_rules-0.0.8.dist-info/RECORD +1536 -0
- nldcsc_elastic_rules-0.0.8.dist-info/WHEEL +5 -0
- nldcsc_elastic_rules-0.0.8.dist-info/top_level.txt +1 -0
|
@@ -0,0 +1,97 @@
|
|
|
1
|
+
[metadata]
|
|
2
|
+
creation_date = "2020/02/18"
|
|
3
|
+
maturity = "production"
|
|
4
|
+
promotion = true
|
|
5
|
+
updated_date = "2025/03/21"
|
|
6
|
+
|
|
7
|
+
[rule]
|
|
8
|
+
author = ["Elastic"]
|
|
9
|
+
description = """
|
|
10
|
+
Elastic Endgame detected an Exploit. Click the Elastic Endgame icon in the event.module column or the link in the
|
|
11
|
+
rule.reference column for additional information.
|
|
12
|
+
"""
|
|
13
|
+
from = "now-2m"
|
|
14
|
+
index = ["endgame-*"]
|
|
15
|
+
interval = "1m"
|
|
16
|
+
language = "kuery"
|
|
17
|
+
license = "Elastic License v2"
|
|
18
|
+
max_signals = 1000
|
|
19
|
+
name = "Exploit - Detected - Elastic Endgame"
|
|
20
|
+
risk_score = 73
|
|
21
|
+
rule_id = "2003cdc8-8d83-4aa5-b132-1f9a8eb48514"
|
|
22
|
+
setup = """## Setup
|
|
23
|
+
|
|
24
|
+
### Additional notes
|
|
25
|
+
|
|
26
|
+
For information on troubleshooting the maximum alerts warning please refer to this [guide](https://www.elastic.co/guide/en/security/current/alerts-ui-monitor.html#troubleshoot-max-alerts).
|
|
27
|
+
"""
|
|
28
|
+
severity = "high"
|
|
29
|
+
tags = [
|
|
30
|
+
"Data Source: Elastic Endgame",
|
|
31
|
+
"Use Case: Threat Detection",
|
|
32
|
+
"Tactic: Execution",
|
|
33
|
+
"Tactic: Privilege Escalation",
|
|
34
|
+
"Resources: Investigation Guide",
|
|
35
|
+
]
|
|
36
|
+
timestamp_override = "event.ingested"
|
|
37
|
+
type = "query"
|
|
38
|
+
|
|
39
|
+
query = '''
|
|
40
|
+
event.kind:alert and event.module:endgame and endgame.metadata.type:detection and (event.action:exploit_event or endgame.event_subtype_full:exploit_event)
|
|
41
|
+
'''
|
|
42
|
+
note = """## Triage and analysis
|
|
43
|
+
|
|
44
|
+
> **Disclaimer**:
|
|
45
|
+
> This investigation guide was created using generative AI technology and has been reviewed to improve its accuracy and relevance. While every effort has been made to ensure its quality, we recommend validating the content and adapting it to suit your specific environment and operational needs.
|
|
46
|
+
|
|
47
|
+
### Investigating Exploit - Detected - Elastic Endgame
|
|
48
|
+
|
|
49
|
+
Elastic Endgame is a security solution that monitors and detects exploit attempts within an environment. Adversaries exploit vulnerabilities to execute unauthorized code or escalate privileges. The detection rule identifies alerts from the Endgame module, focusing on exploit-related events. It leverages metadata and event actions to flag high-risk activities, aiding in swift threat detection and response.
|
|
50
|
+
|
|
51
|
+
### Possible investigation steps
|
|
52
|
+
|
|
53
|
+
- Review the alert details to confirm the presence of event.kind:alert and event.module:endgame, ensuring the alert is relevant to the Elastic Endgame detection.
|
|
54
|
+
- Examine the event.action and endgame.event_subtype_full fields to determine the specific exploit event type, which can provide insight into the nature of the exploit attempt.
|
|
55
|
+
- Investigate the endgame.metadata.type field to gather additional context about the detection, such as the source and target of the exploit attempt.
|
|
56
|
+
- Check the associated risk score and severity level to prioritize the investigation and response efforts, focusing on high-risk activities.
|
|
57
|
+
- Correlate the alert with other related events in the environment to identify potential patterns or additional indicators of compromise.
|
|
58
|
+
- Consult the MITRE ATT&CK framework for the Execution tactic (TA0002) to understand potential techniques that might have been used and to guide further investigation steps.
|
|
59
|
+
|
|
60
|
+
### False positive analysis
|
|
61
|
+
|
|
62
|
+
- Routine software updates or patches may trigger exploit detection alerts. Users can create exceptions for known update processes by identifying their unique metadata or event actions.
|
|
63
|
+
- Legitimate administrative tools that perform actions similar to exploits might be flagged. Users should whitelist these tools by specifying their event.module or event.action attributes.
|
|
64
|
+
- Automated scripts used for system maintenance could mimic exploit behavior. To prevent false positives, users can exclude these scripts by defining their specific endgame.event_subtype_full.
|
|
65
|
+
- Security testing activities, such as penetration tests, may generate alerts. Users can manage these by setting temporary exceptions during the testing period, based on the event.kind or event.module.
|
|
66
|
+
|
|
67
|
+
### Response and remediation
|
|
68
|
+
|
|
69
|
+
- Isolate the affected system immediately to prevent further exploitation or lateral movement within the network.
|
|
70
|
+
- Terminate any unauthorized processes identified as part of the exploit event to halt malicious activity.
|
|
71
|
+
- Apply relevant security patches or updates to the affected system to address the exploited vulnerability and prevent recurrence.
|
|
72
|
+
- Conduct a thorough forensic analysis of the affected system to identify any additional indicators of compromise or secondary payloads.
|
|
73
|
+
- Restore the system from a known good backup if necessary, ensuring that the backup is free from any malicious artifacts.
|
|
74
|
+
- Monitor the network for any signs of similar exploit attempts, using enhanced logging and alerting based on the identified threat indicators.
|
|
75
|
+
- Escalate the incident to the security operations center (SOC) or incident response team for further investigation and to ensure comprehensive remediation."""
|
|
76
|
+
|
|
77
|
+
|
|
78
|
+
[[rule.threat]]
|
|
79
|
+
framework = "MITRE ATT&CK"
|
|
80
|
+
|
|
81
|
+
[rule.threat.tactic]
|
|
82
|
+
id = "TA0002"
|
|
83
|
+
name = "Execution"
|
|
84
|
+
reference = "https://attack.mitre.org/tactics/TA0002/"
|
|
85
|
+
[[rule.threat]]
|
|
86
|
+
framework = "MITRE ATT&CK"
|
|
87
|
+
[[rule.threat.technique]]
|
|
88
|
+
id = "T1068"
|
|
89
|
+
name = "Exploitation for Privilege Escalation"
|
|
90
|
+
reference = "https://attack.mitre.org/techniques/T1068/"
|
|
91
|
+
|
|
92
|
+
|
|
93
|
+
[rule.threat.tactic]
|
|
94
|
+
id = "TA0004"
|
|
95
|
+
name = "Privilege Escalation"
|
|
96
|
+
reference = "https://attack.mitre.org/tactics/TA0004/"
|
|
97
|
+
|
|
@@ -0,0 +1,99 @@
|
|
|
1
|
+
[metadata]
|
|
2
|
+
creation_date = "2020/02/18"
|
|
3
|
+
maturity = "production"
|
|
4
|
+
promotion = true
|
|
5
|
+
updated_date = "2025/03/21"
|
|
6
|
+
|
|
7
|
+
[rule]
|
|
8
|
+
author = ["Elastic"]
|
|
9
|
+
description = """
|
|
10
|
+
Elastic Endgame prevented an Exploit. Click the Elastic Endgame icon in the event.module column or the link in the
|
|
11
|
+
rule.reference column for additional information.
|
|
12
|
+
"""
|
|
13
|
+
from = "now-2m"
|
|
14
|
+
index = ["endgame-*"]
|
|
15
|
+
interval = "1m"
|
|
16
|
+
language = "kuery"
|
|
17
|
+
license = "Elastic License v2"
|
|
18
|
+
max_signals = 1000
|
|
19
|
+
name = "Exploit - Prevented - Elastic Endgame"
|
|
20
|
+
risk_score = 47
|
|
21
|
+
rule_id = "2863ffeb-bf77-44dd-b7a5-93ef94b72036"
|
|
22
|
+
setup = """## Setup
|
|
23
|
+
|
|
24
|
+
### Additional notes
|
|
25
|
+
|
|
26
|
+
For information on troubleshooting the maximum alerts warning please refer to this [guide](https://www.elastic.co/guide/en/security/current/alerts-ui-monitor.html#troubleshoot-max-alerts).
|
|
27
|
+
"""
|
|
28
|
+
severity = "medium"
|
|
29
|
+
tags = [
|
|
30
|
+
"Data Source: Elastic Endgame",
|
|
31
|
+
"Use Case: Threat Detection",
|
|
32
|
+
"Tactic: Execution",
|
|
33
|
+
"Tactic: Privilege Escalation",
|
|
34
|
+
"Resources: Investigation Guide",
|
|
35
|
+
]
|
|
36
|
+
timestamp_override = "event.ingested"
|
|
37
|
+
type = "query"
|
|
38
|
+
|
|
39
|
+
query = '''
|
|
40
|
+
event.kind:alert and event.module:endgame and endgame.metadata.type:prevention and (event.action:exploit_event or endgame.event_subtype_full:exploit_event)
|
|
41
|
+
'''
|
|
42
|
+
note = """## Triage and analysis
|
|
43
|
+
|
|
44
|
+
> **Disclaimer**:
|
|
45
|
+
> This investigation guide was created using generative AI technology and has been reviewed to improve its accuracy and relevance. While every effort has been made to ensure its quality, we recommend validating the content and adapting it to suit your specific environment and operational needs.
|
|
46
|
+
|
|
47
|
+
### Investigating Exploit - Prevented - Elastic Endgame
|
|
48
|
+
|
|
49
|
+
Elastic Endgame is a security solution designed to prevent exploits by monitoring and analyzing system behaviors. Adversaries often exploit vulnerabilities to execute unauthorized code or escalate privileges. This detection rule identifies prevention events where an exploit attempt was blocked, focusing on alerts from the Endgame module. By analyzing specific event actions and metadata, it helps security analysts quickly identify and respond to potential threats, ensuring system integrity and security.
|
|
50
|
+
|
|
51
|
+
### Possible investigation steps
|
|
52
|
+
|
|
53
|
+
- Review the alert details to confirm the event.kind is 'alert' and event.module is 'endgame', ensuring the alert is relevant to the Elastic Endgame module.
|
|
54
|
+
- Examine the endgame.metadata.type field to verify it is marked as 'prevention', indicating that the exploit attempt was successfully blocked.
|
|
55
|
+
- Analyze the event.action and endgame.event_subtype_full fields to determine the specific type of exploit event that was attempted, such as 'exploit_event'.
|
|
56
|
+
- Investigate the source and destination IP addresses, user accounts, and hostnames involved in the alert to identify potential points of compromise or targets.
|
|
57
|
+
- Check for any related alerts or logs within the same timeframe to identify patterns or additional indicators of compromise that may suggest a broader attack campaign.
|
|
58
|
+
- Assess the risk score and severity level to prioritize the investigation and determine if immediate action is required to mitigate potential threats.
|
|
59
|
+
- Document findings and any actions taken in response to the alert to maintain a comprehensive record for future reference and analysis.
|
|
60
|
+
|
|
61
|
+
### False positive analysis
|
|
62
|
+
|
|
63
|
+
- Routine software updates or patches may trigger prevention alerts as they modify system files or configurations. Review the update schedule and correlate alerts with known maintenance windows to verify legitimacy.
|
|
64
|
+
- Legitimate administrative tools or scripts that perform actions similar to exploit techniques can be flagged. Identify these tools and create exceptions for their known behaviors to reduce noise.
|
|
65
|
+
- Security testing or vulnerability scanning activities might mimic exploit attempts. Coordinate with IT and security teams to whitelist these activities during scheduled assessments.
|
|
66
|
+
- Custom applications with unique behaviors may be misidentified as threats. Work with development teams to understand these behaviors and adjust detection rules or create exceptions accordingly.
|
|
67
|
+
- Frequent alerts from specific systems or users could indicate a misconfiguration. Investigate these patterns and adjust system settings or user permissions to align with security policies.
|
|
68
|
+
|
|
69
|
+
### Response and remediation
|
|
70
|
+
|
|
71
|
+
- Immediately isolate the affected system from the network to prevent further exploitation or lateral movement by the adversary.
|
|
72
|
+
- Verify the integrity of critical system files and applications on the affected system to ensure no unauthorized changes have been made.
|
|
73
|
+
- Apply the latest security patches and updates to the affected system to address any known vulnerabilities that may have been targeted.
|
|
74
|
+
- Conduct a thorough review of user accounts and privileges on the affected system to identify and revoke any unauthorized access or privilege escalation.
|
|
75
|
+
- Restore the affected system from a known good backup if any unauthorized changes or exploit attempts have compromised system integrity.
|
|
76
|
+
- Monitor the network and system logs for any signs of similar exploit attempts or related suspicious activities to ensure no further threats are present.
|
|
77
|
+
- Escalate the incident to the security operations center (SOC) or incident response team for further investigation and to determine if additional systems may be at risk."""
|
|
78
|
+
|
|
79
|
+
|
|
80
|
+
[[rule.threat]]
|
|
81
|
+
framework = "MITRE ATT&CK"
|
|
82
|
+
|
|
83
|
+
[rule.threat.tactic]
|
|
84
|
+
id = "TA0002"
|
|
85
|
+
name = "Execution"
|
|
86
|
+
reference = "https://attack.mitre.org/tactics/TA0002/"
|
|
87
|
+
[[rule.threat]]
|
|
88
|
+
framework = "MITRE ATT&CK"
|
|
89
|
+
[[rule.threat.technique]]
|
|
90
|
+
id = "T1068"
|
|
91
|
+
name = "Exploitation for Privilege Escalation"
|
|
92
|
+
reference = "https://attack.mitre.org/techniques/T1068/"
|
|
93
|
+
|
|
94
|
+
|
|
95
|
+
[rule.threat.tactic]
|
|
96
|
+
id = "TA0004"
|
|
97
|
+
name = "Privilege Escalation"
|
|
98
|
+
reference = "https://attack.mitre.org/tactics/TA0004/"
|
|
99
|
+
|
|
@@ -0,0 +1,111 @@
|
|
|
1
|
+
[metadata]
|
|
2
|
+
creation_date = "2020/07/08"
|
|
3
|
+
maturity = "production"
|
|
4
|
+
promotion = true
|
|
5
|
+
updated_date = "2025/03/21"
|
|
6
|
+
|
|
7
|
+
[rule]
|
|
8
|
+
author = ["Elastic"]
|
|
9
|
+
description = """
|
|
10
|
+
Generates a detection alert for each external alert written to the configured indices. Enabling this rule allows you to
|
|
11
|
+
immediately begin investigating external alerts in the app.
|
|
12
|
+
"""
|
|
13
|
+
from = "now-2m"
|
|
14
|
+
index = [
|
|
15
|
+
"apm-*-transaction*",
|
|
16
|
+
"traces-apm*",
|
|
17
|
+
"auditbeat-*",
|
|
18
|
+
"filebeat-*",
|
|
19
|
+
"logs-*",
|
|
20
|
+
"packetbeat-*",
|
|
21
|
+
"winlogbeat-*",
|
|
22
|
+
]
|
|
23
|
+
interval = "1m"
|
|
24
|
+
language = "kuery"
|
|
25
|
+
license = "Elastic License v2"
|
|
26
|
+
max_signals = 1000
|
|
27
|
+
name = "External Alerts"
|
|
28
|
+
risk_score = 47
|
|
29
|
+
rule_id = "eb079c62-4481-4d6e-9643-3ca499df7aaa"
|
|
30
|
+
rule_name_override = "message"
|
|
31
|
+
setup = """## Setup
|
|
32
|
+
|
|
33
|
+
### Additional notes
|
|
34
|
+
|
|
35
|
+
For information on troubleshooting the maximum alerts warning please refer to this [guide](https://www.elastic.co/guide/en/security/current/alerts-ui-monitor.html#troubleshoot-max-alerts).
|
|
36
|
+
"""
|
|
37
|
+
severity = "medium"
|
|
38
|
+
tags = ["OS: Windows", "Data Source: APM", "OS: macOS", "OS: Linux", "Resources: Investigation Guide"]
|
|
39
|
+
timestamp_override = "event.ingested"
|
|
40
|
+
type = "query"
|
|
41
|
+
|
|
42
|
+
query = '''
|
|
43
|
+
event.kind:alert and not event.module:(endgame or endpoint or cloud_defend)
|
|
44
|
+
'''
|
|
45
|
+
note = """## Triage and analysis
|
|
46
|
+
|
|
47
|
+
> **Disclaimer**:
|
|
48
|
+
> This investigation guide was created using generative AI technology and has been reviewed to improve its accuracy and relevance. While every effort has been made to ensure its quality, we recommend validating the content and adapting it to suit your specific environment and operational needs.
|
|
49
|
+
|
|
50
|
+
### Investigating External Alerts
|
|
51
|
+
|
|
52
|
+
External alerts are crucial for identifying potential threats across diverse environments like Windows, macOS, and Linux. These alerts are generated from various sources, excluding specific modules like endpoint or cloud defend, to focus on broader threat landscapes. Adversaries may exploit vulnerabilities in these systems to execute unauthorized actions. The 'External Alerts' detection rule filters and highlights such activities by focusing on alert events, enabling analysts to swiftly investigate and mitigate risks.
|
|
53
|
+
|
|
54
|
+
### Possible investigation steps
|
|
55
|
+
|
|
56
|
+
- Review the alert details to identify the specific event.kind:alert that triggered the detection, ensuring it is not associated with the excluded modules (endgame, endpoint, or cloud_defend).
|
|
57
|
+
- Examine the source and context of the alert by checking the associated tags, such as 'OS: Windows', 'OS: macOS', or 'OS: Linux', to understand the environment affected.
|
|
58
|
+
- Gather additional context by correlating the alert with other logs or events from the same time frame or system to identify any related suspicious activities.
|
|
59
|
+
- Assess the risk score and severity level to prioritize the investigation and determine the potential impact on the organization.
|
|
60
|
+
- Investigate the origin of the alert by identifying the source IP, user account, or process involved, and check for any known vulnerabilities or exploits associated with them.
|
|
61
|
+
- Consult threat intelligence sources to determine if the alert corresponds to any known threat actors or campaigns targeting similar environments.
|
|
62
|
+
|
|
63
|
+
### False positive analysis
|
|
64
|
+
|
|
65
|
+
- Alerts from benign third-party applications may trigger false positives. Review and identify these applications, then create exceptions to exclude them from future alerts.
|
|
66
|
+
- Routine system updates or patches can generate alerts. Monitor update schedules and create exceptions for known update activities to reduce noise.
|
|
67
|
+
- Network monitoring tools might produce alerts due to their scanning activities. Verify these tools and exclude their activities if deemed non-threatening.
|
|
68
|
+
- Alerts from internal security testing or penetration testing exercises can be mistaken for threats. Coordinate with security teams to whitelist these activities during scheduled tests.
|
|
69
|
+
- Certain administrative scripts or automation tasks may trigger alerts. Evaluate these scripts and exclude them if they are part of regular operations and pose no risk.
|
|
70
|
+
|
|
71
|
+
### Response and remediation
|
|
72
|
+
|
|
73
|
+
- Isolate affected systems immediately to prevent further unauthorized actions and contain the threat.
|
|
74
|
+
- Conduct a thorough review of the alert details to identify any specific vulnerabilities or exploits used by the adversary.
|
|
75
|
+
- Apply relevant patches or updates to the affected systems to remediate any identified vulnerabilities.
|
|
76
|
+
- Restore systems from a known good backup if unauthorized changes or actions have been detected.
|
|
77
|
+
- Monitor network traffic and system logs closely for any signs of further suspicious activity or attempts to exploit similar vulnerabilities.
|
|
78
|
+
- Escalate the incident to the appropriate security team or management if the threat appears to be part of a larger attack campaign or if additional resources are needed for remediation.
|
|
79
|
+
- Enhance detection capabilities by updating security tools and configurations to better identify similar threats in the future."""
|
|
80
|
+
|
|
81
|
+
|
|
82
|
+
[[rule.risk_score_mapping]]
|
|
83
|
+
field = "event.risk_score"
|
|
84
|
+
operator = "equals"
|
|
85
|
+
value = ""
|
|
86
|
+
|
|
87
|
+
[[rule.severity_mapping]]
|
|
88
|
+
field = "event.severity"
|
|
89
|
+
operator = "equals"
|
|
90
|
+
severity = "low"
|
|
91
|
+
value = "21"
|
|
92
|
+
|
|
93
|
+
[[rule.severity_mapping]]
|
|
94
|
+
field = "event.severity"
|
|
95
|
+
operator = "equals"
|
|
96
|
+
severity = "medium"
|
|
97
|
+
value = "47"
|
|
98
|
+
|
|
99
|
+
[[rule.severity_mapping]]
|
|
100
|
+
field = "event.severity"
|
|
101
|
+
operator = "equals"
|
|
102
|
+
severity = "high"
|
|
103
|
+
value = "73"
|
|
104
|
+
|
|
105
|
+
[[rule.severity_mapping]]
|
|
106
|
+
field = "event.severity"
|
|
107
|
+
operator = "equals"
|
|
108
|
+
severity = "critical"
|
|
109
|
+
value = "99"
|
|
110
|
+
|
|
111
|
+
|
|
@@ -0,0 +1,114 @@
|
|
|
1
|
+
[metadata]
|
|
2
|
+
creation_date = "2025/07/31"
|
|
3
|
+
integration = ["google_secops"]
|
|
4
|
+
maturity = "production"
|
|
5
|
+
promotion = true
|
|
6
|
+
updated_date = "2025/10/17"
|
|
7
|
+
|
|
8
|
+
[rule]
|
|
9
|
+
author = ["Elastic"]
|
|
10
|
+
description = """
|
|
11
|
+
Generates a detection alert for each Google SecOps alert written to the configured indices. Enabling this rule allows
|
|
12
|
+
you to immediately begin investigating Google SecOps alerts in the app.
|
|
13
|
+
"""
|
|
14
|
+
from = "now-2m"
|
|
15
|
+
index = ["logs-google_secops.alert-*"]
|
|
16
|
+
interval = "1m"
|
|
17
|
+
language = "kuery"
|
|
18
|
+
license = "Elastic License v2"
|
|
19
|
+
max_signals = 1000
|
|
20
|
+
name = "Google SecOps External Alerts"
|
|
21
|
+
note = """Triage and analysis
|
|
22
|
+
|
|
23
|
+
### Investigating Google SecOps External Alerts
|
|
24
|
+
|
|
25
|
+
Google SecOps provides a robust framework for monitoring and managing security operations within cloud environments. The rule leverages specific event identifiers to flag suspicious alerts, enabling analysts to swiftly investigate potential threats and mitigate risks.
|
|
26
|
+
|
|
27
|
+
### Possible investigation steps
|
|
28
|
+
|
|
29
|
+
- Examine the timeline of events leading up to and following the alert to identify any unusual patterns or activities that may indicate malicious behavior.
|
|
30
|
+
- Cross-reference the alert with other security logs and alerts to determine if it is part of a broader attack pattern or isolated incident.
|
|
31
|
+
- Investigate the source and destination IP addresses involved in the alert to assess their legitimacy and check for any known malicious activity associated with them.
|
|
32
|
+
- Analyze user activity associated with the alert to identify any unauthorized access or privilege escalation attempts.
|
|
33
|
+
- Consult the Google SecOps investigation guide and resources tagged in the alert for specific guidance on handling similar threats.
|
|
34
|
+
|
|
35
|
+
### False positive analysis
|
|
36
|
+
|
|
37
|
+
- Alerts triggered by routine administrative actions can be false positives. Review the context of the alert to determine if it aligns with known maintenance activities.
|
|
38
|
+
- Automated scripts or tools that interact with Google SecOps may generate alerts. Identify these scripts and consider creating exceptions for their expected behavior.
|
|
39
|
+
- Frequent alerts from specific IP addresses or user accounts that are known to be secure can be excluded by adding them to an allowlist.
|
|
40
|
+
- Alerts resulting from testing or development environments should be reviewed and, if deemed non-threatening, excluded from triggering further alerts.
|
|
41
|
+
- Regularly update and review exception lists to ensure they reflect current non-threatening behaviors and do not inadvertently exclude genuine threats.
|
|
42
|
+
|
|
43
|
+
### Response and remediation
|
|
44
|
+
|
|
45
|
+
- Immediately isolate affected systems or accounts identified in the Google SecOps alert to prevent further unauthorized access or data exfiltration.
|
|
46
|
+
- Conduct a thorough review of the alert details to identify any compromised credentials or access tokens and reset them promptly.
|
|
47
|
+
- Implement network segmentation or access control measures to limit the spread of potential threats within the environment.
|
|
48
|
+
- Review and update firewall rules and security group settings to block any suspicious IP addresses or domains associated with the alert.
|
|
49
|
+
- Escalate the incident to the security operations center (SOC) or incident response team for further analysis and to determine if additional resources are needed.
|
|
50
|
+
- Document the incident, including all actions taken, and update incident response plans to incorporate lessons learned from this event.
|
|
51
|
+
- Enhance monitoring and detection capabilities by tuning existing alerts and deploying additional rules to detect similar activities in the future.
|
|
52
|
+
"""
|
|
53
|
+
references = ["https://docs.elastic.co/en/integrations/google_secops"]
|
|
54
|
+
risk_score = 47
|
|
55
|
+
rule_id = "70558fd5-6448-4c65-804a-8567ce02c3a2"
|
|
56
|
+
rule_name_override = "google_secops.alert.detection.ruleName"
|
|
57
|
+
setup = """## Setup
|
|
58
|
+
|
|
59
|
+
### Google SecOps Alert Integration
|
|
60
|
+
This rule is designed to capture alert events generated by the Google SecOps integration and promote them as Elastic detection alerts.
|
|
61
|
+
|
|
62
|
+
To capture Google SecOps alerts, install and configure the Google SecOps integration to ingest alert events into the `logs-google_secops.alert-*` index pattern.
|
|
63
|
+
|
|
64
|
+
If this rule is enabled alongside the External Alerts promotion rule (UUID: eb079c62-4481-4d6e-9643-3ca499df7aaa), you may receive duplicate alerts for the same SecOps events. Consider adding a rule exception for the External Alert rule to exclude data_stream.dataset:google_secops.alert to avoid receiving duplicate alerts.
|
|
65
|
+
|
|
66
|
+
### Additional notes
|
|
67
|
+
|
|
68
|
+
For information on troubleshooting the maximum alerts warning please refer to this [guide](https://www.elastic.co/guide/en/security/current/alerts-ui-monitor.html#troubleshoot-max-alerts).
|
|
69
|
+
"""
|
|
70
|
+
severity = "medium"
|
|
71
|
+
tags = [
|
|
72
|
+
"Data Source: Google SecOps",
|
|
73
|
+
"Use Case: Threat Detection",
|
|
74
|
+
"Resources: Investigation Guide",
|
|
75
|
+
"Promotion: External Alerts",
|
|
76
|
+
]
|
|
77
|
+
timestamp_override = "event.ingested"
|
|
78
|
+
type = "query"
|
|
79
|
+
|
|
80
|
+
query = '''
|
|
81
|
+
event.kind: alert and data_stream.dataset: google_secops.alert
|
|
82
|
+
'''
|
|
83
|
+
|
|
84
|
+
|
|
85
|
+
[[rule.risk_score_mapping]]
|
|
86
|
+
field = "event.risk_score"
|
|
87
|
+
operator = "equals"
|
|
88
|
+
value = ""
|
|
89
|
+
|
|
90
|
+
[[rule.severity_mapping]]
|
|
91
|
+
field = "event.severity"
|
|
92
|
+
operator = "equals"
|
|
93
|
+
severity = "low"
|
|
94
|
+
value = "21"
|
|
95
|
+
|
|
96
|
+
[[rule.severity_mapping]]
|
|
97
|
+
field = "event.severity"
|
|
98
|
+
operator = "equals"
|
|
99
|
+
severity = "medium"
|
|
100
|
+
value = "47"
|
|
101
|
+
|
|
102
|
+
[[rule.severity_mapping]]
|
|
103
|
+
field = "event.severity"
|
|
104
|
+
operator = "equals"
|
|
105
|
+
severity = "high"
|
|
106
|
+
value = "73"
|
|
107
|
+
|
|
108
|
+
[[rule.severity_mapping]]
|
|
109
|
+
field = "event.severity"
|
|
110
|
+
operator = "equals"
|
|
111
|
+
severity = "critical"
|
|
112
|
+
value = "99"
|
|
113
|
+
|
|
114
|
+
|
|
@@ -0,0 +1,113 @@
|
|
|
1
|
+
[metadata]
|
|
2
|
+
creation_date = "2025/07/31"
|
|
3
|
+
integration = ["microsoft_sentinel"]
|
|
4
|
+
maturity = "production"
|
|
5
|
+
promotion = true
|
|
6
|
+
updated_date = "2025/10/17"
|
|
7
|
+
|
|
8
|
+
[rule]
|
|
9
|
+
author = ["Elastic"]
|
|
10
|
+
description = """
|
|
11
|
+
Generates a detection alert for each Microsoft Sentinel alert written to the configured indices. Enabling this rule
|
|
12
|
+
allows you to immediately begin investigating Microsoft Sentinel alerts in the app.
|
|
13
|
+
"""
|
|
14
|
+
from = "now-2m"
|
|
15
|
+
index = ["logs-microsoft_sentinel.alert-*"]
|
|
16
|
+
interval = "1m"
|
|
17
|
+
language = "kuery"
|
|
18
|
+
license = "Elastic License v2"
|
|
19
|
+
max_signals = 1000
|
|
20
|
+
name = "Microsoft Sentinel External Alerts"
|
|
21
|
+
note = """ Triage and analysis
|
|
22
|
+
|
|
23
|
+
## Investigating Microsoft Sentinel External Alerts
|
|
24
|
+
|
|
25
|
+
Microsoft Sentinel is a cloud-native SIEM tool that aggregates security data for threat detection and response. The rule identifies each alert logged in Sentinel, enabling analysts to swiftly investigate potential threats.
|
|
26
|
+
|
|
27
|
+
### Possible investigation steps
|
|
28
|
+
|
|
29
|
+
- Examine the timeline of events leading up to the alert to identify any unusual or suspicious activities that may have occurred.
|
|
30
|
+
- Cross-reference the alert with other related alerts or logs in Microsoft Sentinel to determine if this is part of a larger pattern or isolated incident.
|
|
31
|
+
- Investigate the source and context of the alert to identify any patterns or anomalies that could indicate manipulation or false positives.
|
|
32
|
+
- Consult the Microsoft Sentinel investigation guide and resources tagged in the alert for specific guidance on handling similar threats.
|
|
33
|
+
|
|
34
|
+
### False positive analysis
|
|
35
|
+
|
|
36
|
+
- Alerts triggered by routine administrative tasks can be false positives. Identify these tasks and create exceptions to prevent unnecessary alerts.
|
|
37
|
+
- Frequent alerts from known safe IP addresses or domains may not indicate a threat. Whitelist these sources to reduce noise.
|
|
38
|
+
- Alerts generated by automated scripts or scheduled tasks that are part of regular operations can be excluded by setting up filters for these specific activities.
|
|
39
|
+
- Non-threatening alerts from internal network scans or vulnerability assessments should be reviewed and excluded if they are part of regular security practices.
|
|
40
|
+
- Alerts from test environments or sandboxed systems can be false positives. Exclude these environments from alert generation to focus on genuine threats.
|
|
41
|
+
|
|
42
|
+
### Response and remediation
|
|
43
|
+
|
|
44
|
+
- Contain the threat by isolating affected systems from the network to prevent further spread or data exfiltration.
|
|
45
|
+
- Review and terminate any suspicious processes or sessions identified in the alert to halt ongoing malicious activities.
|
|
46
|
+
- Conduct a thorough analysis of the alert details to identify any compromised accounts or credentials and reset passwords immediately.
|
|
47
|
+
- Apply relevant security patches or updates to affected systems to close any vulnerabilities exploited by the adversary.
|
|
48
|
+
- Restore affected systems from clean backups to ensure the integrity and security of the environment.
|
|
49
|
+
- Monitor network traffic and system logs closely for any signs of recurring or related suspicious activities.
|
|
50
|
+
- Escalate the incident to the security operations center (SOC) or incident response team for further investigation and to determine if additional resources are needed.
|
|
51
|
+
"""
|
|
52
|
+
references = ["https://docs.elastic.co/en/integrations/microsoft_sentinel"]
|
|
53
|
+
risk_score = 47
|
|
54
|
+
rule_id = "74147312-ba03-4bea-91d1-040d54c1e8c3"
|
|
55
|
+
rule_name_override = "microsoft_sentinel.alert.properties.friendly_name"
|
|
56
|
+
setup = """## Setup
|
|
57
|
+
|
|
58
|
+
### Microsoft Sentinel Alert Integration
|
|
59
|
+
This rule is designed to capture alert events generated by the Microsoft Sentinel integration and promote them as Elastic detection alerts.
|
|
60
|
+
|
|
61
|
+
To capture Microsoft Sentinel alerts, install and configure the Microsoft Sentinel integration to ingest alert events into the `logs-microsoft_sentinel.alert-*` index pattern.
|
|
62
|
+
|
|
63
|
+
If this rule is enabled alongside the External Alerts promotion rule (UUID: eb079c62-4481-4d6e-9643-3ca499df7aaa), you may receive duplicate alerts for the same Sentinel events. Consider adding a rule exception for the External Alert rule to exclude data_stream.dataset:microsoft_sentinel.alert to avoid receiving duplicate alerts.
|
|
64
|
+
|
|
65
|
+
### Additional notes
|
|
66
|
+
|
|
67
|
+
For information on troubleshooting the maximum alerts warning please refer to this [guide](https://www.elastic.co/guide/en/security/current/alerts-ui-monitor.html#troubleshoot-max-alerts).
|
|
68
|
+
"""
|
|
69
|
+
severity = "medium"
|
|
70
|
+
tags = [
|
|
71
|
+
"Data Source: Microsoft Sentinel",
|
|
72
|
+
"Use Case: Threat Detection",
|
|
73
|
+
"Resources: Investigation Guide",
|
|
74
|
+
"Promotion: External Alerts",
|
|
75
|
+
]
|
|
76
|
+
timestamp_override = "event.ingested"
|
|
77
|
+
type = "query"
|
|
78
|
+
|
|
79
|
+
query = '''
|
|
80
|
+
event.kind: alert and data_stream.dataset: microsoft_sentinel.alert
|
|
81
|
+
'''
|
|
82
|
+
|
|
83
|
+
|
|
84
|
+
[[rule.risk_score_mapping]]
|
|
85
|
+
field = "microsoft_sentinel.alert.properties.confidence_score"
|
|
86
|
+
operator = "equals"
|
|
87
|
+
value = ""
|
|
88
|
+
|
|
89
|
+
[[rule.severity_mapping]]
|
|
90
|
+
field = "event.severity"
|
|
91
|
+
operator = "equals"
|
|
92
|
+
severity = "low"
|
|
93
|
+
value = "21"
|
|
94
|
+
|
|
95
|
+
[[rule.severity_mapping]]
|
|
96
|
+
field = "event.severity"
|
|
97
|
+
operator = "equals"
|
|
98
|
+
severity = "medium"
|
|
99
|
+
value = "47"
|
|
100
|
+
|
|
101
|
+
[[rule.severity_mapping]]
|
|
102
|
+
field = "event.severity"
|
|
103
|
+
operator = "equals"
|
|
104
|
+
severity = "high"
|
|
105
|
+
value = "73"
|
|
106
|
+
|
|
107
|
+
[[rule.severity_mapping]]
|
|
108
|
+
field = "event.severity"
|
|
109
|
+
operator = "equals"
|
|
110
|
+
severity = "critical"
|
|
111
|
+
value = "99"
|
|
112
|
+
|
|
113
|
+
|
nldcsc_elastic_rules/rules/promotions/privilege_escalation_endgame_cred_manipulation_detected.toml
ADDED
|
@@ -0,0 +1,85 @@
|
|
|
1
|
+
[metadata]
|
|
2
|
+
creation_date = "2020/02/18"
|
|
3
|
+
maturity = "production"
|
|
4
|
+
promotion = true
|
|
5
|
+
updated_date = "2025/03/21"
|
|
6
|
+
|
|
7
|
+
[rule]
|
|
8
|
+
author = ["Elastic"]
|
|
9
|
+
description = """
|
|
10
|
+
Elastic Endgame detected Credential Manipulation. Click the Elastic Endgame icon in the event.module column or the link
|
|
11
|
+
in the rule.reference column for additional information.
|
|
12
|
+
"""
|
|
13
|
+
from = "now-2m"
|
|
14
|
+
index = ["endgame-*"]
|
|
15
|
+
interval = "1m"
|
|
16
|
+
language = "kuery"
|
|
17
|
+
license = "Elastic License v2"
|
|
18
|
+
max_signals = 1000
|
|
19
|
+
name = "Credential Manipulation - Detected - Elastic Endgame"
|
|
20
|
+
risk_score = 73
|
|
21
|
+
rule_id = "c0be5f31-e180-48ed-aa08-96b36899d48f"
|
|
22
|
+
setup = """## Setup
|
|
23
|
+
|
|
24
|
+
### Additional notes
|
|
25
|
+
|
|
26
|
+
For information on troubleshooting the maximum alerts warning please refer to this [guide](https://www.elastic.co/guide/en/security/current/alerts-ui-monitor.html#troubleshoot-max-alerts).
|
|
27
|
+
"""
|
|
28
|
+
severity = "high"
|
|
29
|
+
tags = ["Data Source: Elastic Endgame", "Use Case: Threat Detection", "Tactic: Privilege Escalation", "Resources: Investigation Guide"]
|
|
30
|
+
timestamp_override = "event.ingested"
|
|
31
|
+
type = "query"
|
|
32
|
+
|
|
33
|
+
query = '''
|
|
34
|
+
event.kind:alert and event.module:endgame and endgame.metadata.type:detection and (event.action:token_manipulation_event or endgame.event_subtype_full:token_manipulation_event)
|
|
35
|
+
'''
|
|
36
|
+
note = """## Triage and analysis
|
|
37
|
+
|
|
38
|
+
> **Disclaimer**:
|
|
39
|
+
> This investigation guide was created using generative AI technology and has been reviewed to improve its accuracy and relevance. While every effort has been made to ensure its quality, we recommend validating the content and adapting it to suit your specific environment and operational needs.
|
|
40
|
+
|
|
41
|
+
### Investigating Credential Manipulation - Detected - Elastic Endgame
|
|
42
|
+
|
|
43
|
+
Elastic Endgame is a security solution that monitors and detects suspicious activities, such as credential manipulation, which adversaries exploit to escalate privileges by altering access tokens. This detection rule identifies such threats by analyzing alerts for token manipulation events, leveraging its high-risk score and severity to prioritize investigation. The rule aligns with MITRE ATT&CK's framework, focusing on privilege escalation tactics.
|
|
44
|
+
|
|
45
|
+
### Possible investigation steps
|
|
46
|
+
|
|
47
|
+
- Review the alert details to confirm the presence of event.kind:alert and event.module:endgame, ensuring the alert is relevant to Elastic Endgame's detection capabilities.
|
|
48
|
+
- Examine the event.action and endgame.event_subtype_full fields for token_manipulation_event to understand the specific type of credential manipulation detected.
|
|
49
|
+
- Check the associated user account and system involved in the alert to determine if the activity aligns with expected behavior or if it indicates potential unauthorized access.
|
|
50
|
+
- Investigate the timeline of events leading up to and following the token manipulation event to identify any additional suspicious activities or patterns.
|
|
51
|
+
- Correlate the alert with other security events or logs to assess if this incident is part of a broader attack or isolated.
|
|
52
|
+
- Evaluate the risk score and severity to prioritize the response and determine if immediate action is required to mitigate potential threats.
|
|
53
|
+
|
|
54
|
+
### False positive analysis
|
|
55
|
+
|
|
56
|
+
- Routine administrative tasks involving token manipulation can trigger alerts. Review the context of the event to determine if it aligns with expected administrative behavior.
|
|
57
|
+
- Automated scripts or software updates that require token changes might be flagged. Identify and whitelist these processes if they are verified as safe and necessary for operations.
|
|
58
|
+
- Security tools or monitoring solutions that interact with access tokens for legitimate purposes may cause false positives. Ensure these tools are recognized and excluded from triggering alerts.
|
|
59
|
+
- User behavior analytics might misinterpret legitimate user actions as suspicious. Regularly update user profiles and behavior baselines to minimize these occurrences.
|
|
60
|
+
- Scheduled maintenance activities that involve access token modifications should be documented and excluded from detection rules during their execution time.
|
|
61
|
+
|
|
62
|
+
### Response and remediation
|
|
63
|
+
|
|
64
|
+
- Isolate the affected system immediately to prevent further unauthorized access or lateral movement within the network.
|
|
65
|
+
- Revoke and reset any compromised credentials or access tokens identified in the alert to prevent further misuse.
|
|
66
|
+
- Conduct a thorough review of recent access logs and token usage to identify any unauthorized access or actions taken by the adversary.
|
|
67
|
+
- Apply security patches and updates to the affected system and any related systems to close vulnerabilities that may have been exploited.
|
|
68
|
+
- Implement enhanced monitoring on the affected system and related accounts to detect any further suspicious activity or attempts at credential manipulation.
|
|
69
|
+
- Notify the security team and relevant stakeholders about the incident, providing details of the threat and actions taken, and escalate to higher management if the threat level increases.
|
|
70
|
+
- Review and update access control policies and token management practices to prevent similar incidents in the future, ensuring that least privilege principles are enforced."""
|
|
71
|
+
|
|
72
|
+
|
|
73
|
+
[[rule.threat]]
|
|
74
|
+
framework = "MITRE ATT&CK"
|
|
75
|
+
[[rule.threat.technique]]
|
|
76
|
+
id = "T1134"
|
|
77
|
+
name = "Access Token Manipulation"
|
|
78
|
+
reference = "https://attack.mitre.org/techniques/T1134/"
|
|
79
|
+
|
|
80
|
+
|
|
81
|
+
[rule.threat.tactic]
|
|
82
|
+
id = "TA0004"
|
|
83
|
+
name = "Privilege Escalation"
|
|
84
|
+
reference = "https://attack.mitre.org/tactics/TA0004/"
|
|
85
|
+
|