nldcsc-elastic-rules 0.0.8__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- nldcsc_elastic_rules/__init__.py +1 -0
- nldcsc_elastic_rules/rules/README.md +31 -0
- nldcsc_elastic_rules/rules/_deprecated/apm_null_user_agent.toml +49 -0
- nldcsc_elastic_rules/rules/_deprecated/command_and_control_connection_attempt_by_non_ssh_root_session.toml +85 -0
- nldcsc_elastic_rules/rules/_deprecated/command_and_control_dns_directly_to_the_internet.toml +85 -0
- nldcsc_elastic_rules/rules/_deprecated/command_and_control_ftp_file_transfer_protocol_activity_to_the_internet.toml +77 -0
- nldcsc_elastic_rules/rules/_deprecated/command_and_control_irc_internet_relay_chat_protocol_activity_to_the_internet.toml +76 -0
- nldcsc_elastic_rules/rules/_deprecated/command_and_control_linux_iodine_activity.toml +60 -0
- nldcsc_elastic_rules/rules/_deprecated/command_and_control_linux_port_knocking_reverse_connection.toml +110 -0
- nldcsc_elastic_rules/rules/_deprecated/command_and_control_port_8000_activity_to_the_internet.toml +63 -0
- nldcsc_elastic_rules/rules/_deprecated/command_and_control_pptp_point_to_point_tunneling_protocol_activity.toml +46 -0
- nldcsc_elastic_rules/rules/_deprecated/command_and_control_proxy_port_activity_to_the_internet.toml +66 -0
- nldcsc_elastic_rules/rules/_deprecated/command_and_control_smtp_to_the_internet.toml +73 -0
- nldcsc_elastic_rules/rules/_deprecated/command_and_control_sql_server_port_activity_to_the_internet.toml +62 -0
- nldcsc_elastic_rules/rules/_deprecated/command_and_control_ssh_secure_shell_from_the_internet.toml +89 -0
- nldcsc_elastic_rules/rules/_deprecated/command_and_control_ssh_secure_shell_to_the_internet.toml +64 -0
- nldcsc_elastic_rules/rules/_deprecated/command_and_control_tor_activity_to_the_internet.toml +69 -0
- nldcsc_elastic_rules/rules/_deprecated/container_workload_protection.toml +78 -0
- nldcsc_elastic_rules/rules/_deprecated/credential_access_aws_creds_search_inside_a_container.toml +101 -0
- nldcsc_elastic_rules/rules/_deprecated/credential_access_collection_sensitive_files_compression_inside_a_container.toml +144 -0
- nldcsc_elastic_rules/rules/_deprecated/credential_access_entra_signin_brute_force_microsoft_365_repeat_source.toml +121 -0
- nldcsc_elastic_rules/rules/_deprecated/credential_access_microsoft_365_potential_password_spraying_attack.toml +61 -0
- nldcsc_elastic_rules/rules/_deprecated/credential_access_potential_linux_ssh_bruteforce_root.toml +104 -0
- nldcsc_elastic_rules/rules/_deprecated/credential_access_sensitive_keys_or_passwords_search_inside_a_container.toml +109 -0
- nldcsc_elastic_rules/rules/_deprecated/credential_access_tcpdump_activity.toml +61 -0
- nldcsc_elastic_rules/rules/_deprecated/defense_evasion_attempt_to_disable_iptables_or_firewall.toml +53 -0
- nldcsc_elastic_rules/rules/_deprecated/defense_evasion_base64_encoding_or_decoding_activity.toml +51 -0
- nldcsc_elastic_rules/rules/_deprecated/defense_evasion_code_injection_conhost.toml +106 -0
- nldcsc_elastic_rules/rules/_deprecated/defense_evasion_execution_via_trusted_developer_utilities.toml +47 -0
- nldcsc_elastic_rules/rules/_deprecated/defense_evasion_hex_encoding_or_decoding_activity.toml +50 -0
- nldcsc_elastic_rules/rules/_deprecated/defense_evasion_ld_preload_env_variable_process_injection.toml +137 -0
- nldcsc_elastic_rules/rules/_deprecated/defense_evasion_ld_preload_shared_object_modified_inside_a_container.toml +96 -0
- nldcsc_elastic_rules/rules/_deprecated/defense_evasion_mshta_making_network_connections.toml +51 -0
- nldcsc_elastic_rules/rules/_deprecated/defense_evasion_potential_processherpaderping.toml +59 -0
- nldcsc_elastic_rules/rules/_deprecated/defense_evasion_whitespace_padding_in_command_line.toml +102 -0
- nldcsc_elastic_rules/rules/_deprecated/discovery_file_dir_discovery.toml +95 -0
- nldcsc_elastic_rules/rules/_deprecated/discovery_process_discovery_via_tasklist_command.toml +45 -0
- nldcsc_elastic_rules/rules/_deprecated/discovery_query_registry_via_reg.toml +44 -0
- nldcsc_elastic_rules/rules/_deprecated/discovery_suspicious_network_tool_launched_inside_a_container.toml +129 -0
- nldcsc_elastic_rules/rules/_deprecated/discovery_whoami_commmand.toml +48 -0
- nldcsc_elastic_rules/rules/_deprecated/execution_apt_binary.toml +53 -0
- nldcsc_elastic_rules/rules/_deprecated/execution_awk_binary_shell.toml +51 -0
- nldcsc_elastic_rules/rules/_deprecated/execution_busybox_binary.toml +50 -0
- nldcsc_elastic_rules/rules/_deprecated/execution_c89_c99_binary.toml +52 -0
- nldcsc_elastic_rules/rules/_deprecated/execution_command_shell_started_by_powershell.toml +45 -0
- nldcsc_elastic_rules/rules/_deprecated/execution_container_management_binary_launched_inside_a_container.toml +100 -0
- nldcsc_elastic_rules/rules/_deprecated/execution_cpulimit_binary.toml +53 -0
- nldcsc_elastic_rules/rules/_deprecated/execution_crash_binary.toml +50 -0
- nldcsc_elastic_rules/rules/_deprecated/execution_env_binary.toml +50 -0
- nldcsc_elastic_rules/rules/_deprecated/execution_expect_binary.toml +52 -0
- nldcsc_elastic_rules/rules/_deprecated/execution_file_made_executable_via_chmod_inside_a_container.toml +113 -0
- nldcsc_elastic_rules/rules/_deprecated/execution_find_binary.toml +52 -0
- nldcsc_elastic_rules/rules/_deprecated/execution_flock_binary.toml +50 -0
- nldcsc_elastic_rules/rules/_deprecated/execution_gcc_binary.toml +52 -0
- nldcsc_elastic_rules/rules/_deprecated/execution_interactive_exec_to_container.toml +127 -0
- nldcsc_elastic_rules/rules/_deprecated/execution_interactive_shell_spawned_from_inside_a_container.toml +109 -0
- nldcsc_elastic_rules/rules/_deprecated/execution_linux_process_started_in_temp_directory.toml +48 -0
- nldcsc_elastic_rules/rules/_deprecated/execution_mysql_binary.toml +52 -0
- nldcsc_elastic_rules/rules/_deprecated/execution_netcat_listener_established_inside_a_container.toml +114 -0
- nldcsc_elastic_rules/rules/_deprecated/execution_reverse_shell_via_named_pipe.toml +74 -0
- nldcsc_elastic_rules/rules/_deprecated/execution_shell_suspicious_parent_child_revshell_linux.toml +111 -0
- nldcsc_elastic_rules/rules/_deprecated/execution_ssh_binary.toml +53 -0
- nldcsc_elastic_rules/rules/_deprecated/execution_suspicious_jar_child_process.toml +113 -0
- nldcsc_elastic_rules/rules/_deprecated/execution_vi_binary.toml +50 -0
- nldcsc_elastic_rules/rules/_deprecated/execution_via_net_com_assemblies.toml +55 -0
- nldcsc_elastic_rules/rules/_deprecated/exfiltration_ec2_snapshot_change_activity.toml +111 -0
- nldcsc_elastic_rules/rules/_deprecated/exfiltration_rds_snapshot_export.toml +47 -0
- nldcsc_elastic_rules/rules/_deprecated/impact_potential_linux_ransomware_file_encryption.toml +87 -0
- nldcsc_elastic_rules/rules/_deprecated/impact_virtual_network_device_modified.toml +96 -0
- nldcsc_elastic_rules/rules/_deprecated/initial_access_cross_site_scripting.toml +49 -0
- nldcsc_elastic_rules/rules/_deprecated/initial_access_login_failures.toml +53 -0
- nldcsc_elastic_rules/rules/_deprecated/initial_access_login_location.toml +53 -0
- nldcsc_elastic_rules/rules/_deprecated/initial_access_login_sessions.toml +53 -0
- nldcsc_elastic_rules/rules/_deprecated/initial_access_login_time.toml +53 -0
- nldcsc_elastic_rules/rules/_deprecated/initial_access_rdp_remote_desktop_protocol_to_the_internet.toml +81 -0
- nldcsc_elastic_rules/rules/_deprecated/initial_access_ssh_connection_established_inside_a_container.toml +127 -0
- nldcsc_elastic_rules/rules/_deprecated/lateral_movement_malicious_remote_file_creation.toml +46 -0
- nldcsc_elastic_rules/rules/_deprecated/lateral_movement_remote_file_creation_in_sensitive_directory.toml +60 -0
- nldcsc_elastic_rules/rules/_deprecated/lateral_movement_ssh_process_launched_inside_a_container.toml +122 -0
- nldcsc_elastic_rules/rules/_deprecated/linux_mknod_activity.toml +37 -0
- nldcsc_elastic_rules/rules/_deprecated/linux_nmap_activity.toml +37 -0
- nldcsc_elastic_rules/rules/_deprecated/linux_socat_activity.toml +36 -0
- nldcsc_elastic_rules/rules/_deprecated/persistence_cron_jobs_creation_and_runtime.toml +58 -0
- nldcsc_elastic_rules/rules/_deprecated/persistence_etc_file_creation.toml +271 -0
- nldcsc_elastic_rules/rules/_deprecated/persistence_google_workspace_user_group_access_modified_to_allow_external_access.toml +85 -0
- nldcsc_elastic_rules/rules/_deprecated/persistence_kernel_module_activity.toml +53 -0
- nldcsc_elastic_rules/rules/_deprecated/persistence_shell_activity_by_web_server.toml +101 -0
- nldcsc_elastic_rules/rules/_deprecated/persistence_ssh_authorized_keys_modification_inside_a_container.toml +126 -0
- nldcsc_elastic_rules/rules/_deprecated/privilege_escalation_debugfs_launched_inside_a_privileged_container.toml +99 -0
- nldcsc_elastic_rules/rules/_deprecated/privilege_escalation_gcp_kubernetes_rolebindings_created_or_patched.toml +51 -0
- nldcsc_elastic_rules/rules/_deprecated/privilege_escalation_krbrelayup_suspicious_logon.toml +75 -0
- nldcsc_elastic_rules/rules/_deprecated/privilege_escalation_linux_strace_activity.toml +50 -0
- nldcsc_elastic_rules/rules/_deprecated/privilege_escalation_mount_launched_inside_a_privileged_container.toml +98 -0
- nldcsc_elastic_rules/rules/_deprecated/privilege_escalation_potential_container_escape_via_modified_notify_on_release_file.toml +99 -0
- nldcsc_elastic_rules/rules/_deprecated/privilege_escalation_potential_container_escape_via_modified_release_agent_file.toml +98 -0
- nldcsc_elastic_rules/rules/_deprecated/privilege_escalation_printspooler_malicious_driver_file_changes.toml +51 -0
- nldcsc_elastic_rules/rules/_deprecated/privilege_escalation_printspooler_malicious_registry_modification.toml +50 -0
- nldcsc_elastic_rules/rules/_deprecated/privilege_escalation_root_login_without_mfa.toml +104 -0
- nldcsc_elastic_rules/rules/_deprecated/privilege_escalation_setgid_bit_set_via_chmod.toml +56 -0
- nldcsc_elastic_rules/rules/_deprecated/threat_intel_filebeat7x.toml +191 -0
- nldcsc_elastic_rules/rules/_deprecated/threat_intel_filebeat8x.toml +192 -0
- nldcsc_elastic_rules/rules/_deprecated/threat_intel_fleet_integrations.toml +192 -0
- nldcsc_elastic_rules/rules/apm/apm_403_response_to_a_post.toml +69 -0
- nldcsc_elastic_rules/rules/apm/apm_405_response_method_not_allowed.toml +69 -0
- nldcsc_elastic_rules/rules/apm/apm_sqlmap_user_agent.toml +70 -0
- nldcsc_elastic_rules/rules/cross-platform/command_and_control_google_drive_malicious_file_download.toml +102 -0
- nldcsc_elastic_rules/rules/cross-platform/command_and_control_non_standard_ssh_port.toml +106 -0
- nldcsc_elastic_rules/rules/cross-platform/command_and_control_pan_elastic_defend_c2.toml +76 -0
- nldcsc_elastic_rules/rules/cross-platform/command_and_control_socks_fortigate_endpoint.toml +85 -0
- nldcsc_elastic_rules/rules/cross-platform/credential_access_cookies_chromium_browsers_debugging.toml +116 -0
- nldcsc_elastic_rules/rules/cross-platform/credential_access_forced_authentication_pipes.toml +112 -0
- nldcsc_elastic_rules/rules/cross-platform/credential_access_trufflehog_execution.toml +97 -0
- nldcsc_elastic_rules/rules/cross-platform/defense_evasion_agent_spoofing_mismatched_id.toml +81 -0
- nldcsc_elastic_rules/rules/cross-platform/defense_evasion_agent_spoofing_multiple_hosts.toml +87 -0
- nldcsc_elastic_rules/rules/cross-platform/defense_evasion_deleting_websvr_access_logs.toml +99 -0
- nldcsc_elastic_rules/rules/cross-platform/defense_evasion_deletion_of_bash_command_line_history.toml +111 -0
- nldcsc_elastic_rules/rules/cross-platform/defense_evasion_elastic_agent_service_terminated.toml +117 -0
- nldcsc_elastic_rules/rules/cross-platform/defense_evasion_encoding_rot13_python_script.toml +98 -0
- nldcsc_elastic_rules/rules/cross-platform/defense_evasion_masquerading_space_after_filename.toml +107 -0
- nldcsc_elastic_rules/rules/cross-platform/defense_evasion_timestomp_touch.toml +102 -0
- nldcsc_elastic_rules/rules/cross-platform/defense_evasion_whitespace_padding_command_line.toml +130 -0
- nldcsc_elastic_rules/rules/cross-platform/discovery_security_software_grep.toml +140 -0
- nldcsc_elastic_rules/rules/cross-platform/discovery_virtual_machine_fingerprinting_grep.toml +102 -0
- nldcsc_elastic_rules/rules/cross-platform/execution_aws_ssm_sendcommand_with_command_parameters.toml +166 -0
- nldcsc_elastic_rules/rules/cross-platform/execution_git_exploit_cve_2025_48384.toml +99 -0
- nldcsc_elastic_rules/rules/cross-platform/execution_pentest_eggshell_remote_admin_tool.toml +87 -0
- nldcsc_elastic_rules/rules/cross-platform/execution_potential_widespread_malware_infection.toml +92 -0
- nldcsc_elastic_rules/rules/cross-platform/execution_revershell_via_shell_cmd.toml +102 -0
- nldcsc_elastic_rules/rules/cross-platform/execution_suspicious_java_netcon_childproc.toml +132 -0
- nldcsc_elastic_rules/rules/cross-platform/guided_onboarding_sample_rule.toml +80 -0
- nldcsc_elastic_rules/rules/cross-platform/impact_hosts_file_modified.toml +119 -0
- nldcsc_elastic_rules/rules/cross-platform/initial_access_azure_o365_with_network_alert.toml +137 -0
- nldcsc_elastic_rules/rules/cross-platform/initial_access_exfiltration_new_usb_device_mounted.toml +117 -0
- nldcsc_elastic_rules/rules/cross-platform/initial_access_zoom_meeting_with_no_passcode.toml +85 -0
- nldcsc_elastic_rules/rules/cross-platform/multiple_alerts_different_tactics_host.toml +79 -0
- nldcsc_elastic_rules/rules/cross-platform/multiple_alerts_edr_elastic_defend_by_host.toml +97 -0
- nldcsc_elastic_rules/rules/cross-platform/multiple_alerts_elastic_defend_netsecurity_by_host.toml +105 -0
- nldcsc_elastic_rules/rules/cross-platform/multiple_alerts_email_elastic_defend_correlation.toml +82 -0
- nldcsc_elastic_rules/rules/cross-platform/multiple_alerts_involving_user.toml +82 -0
- nldcsc_elastic_rules/rules/cross-platform/multiple_alerts_risky_host_esql.toml +105 -0
- nldcsc_elastic_rules/rules/cross-platform/persistence_credential_access_modify_auth_module_or_config.toml +141 -0
- nldcsc_elastic_rules/rules/cross-platform/persistence_shell_profile_modification.toml +107 -0
- nldcsc_elastic_rules/rules/cross-platform/persistence_ssh_authorized_keys_modification.toml +144 -0
- nldcsc_elastic_rules/rules/cross-platform/persistence_web_server_potential_command_injection.toml +228 -0
- nldcsc_elastic_rules/rules/cross-platform/privilege_escalation_echo_nopasswd_sudoers.toml +90 -0
- nldcsc_elastic_rules/rules/cross-platform/privilege_escalation_setuid_setgid_bit_set_via_chmod.toml +113 -0
- nldcsc_elastic_rules/rules/cross-platform/privilege_escalation_sudo_buffer_overflow.toml +105 -0
- nldcsc_elastic_rules/rules/cross-platform/privilege_escalation_sudoers_file_mod.toml +91 -0
- nldcsc_elastic_rules/rules/cross-platform/reconnaissance_web_server_discovery_or_fuzzing_activity.toml +121 -0
- nldcsc_elastic_rules/rules/cross-platform/reconnaissance_web_server_unusual_spike_in_error_logs.toml +107 -0
- nldcsc_elastic_rules/rules/cross-platform/reconnaissance_web_server_unusual_spike_in_error_response_codes.toml +127 -0
- nldcsc_elastic_rules/rules/cross-platform/reconnaissance_web_server_unusual_user_agents.toml +165 -0
- nldcsc_elastic_rules/rules/integrations/aws/NOTICE.txt +26 -0
- nldcsc_elastic_rules/rules/integrations/aws/collection_cloudtrail_logging_created.toml +124 -0
- nldcsc_elastic_rules/rules/integrations/aws/collection_s3_unauthenticated_bucket_access_by_rare_source.toml +186 -0
- nldcsc_elastic_rules/rules/integrations/aws/credential_access_aws_getpassword_for_ec2_instance.toml +121 -0
- nldcsc_elastic_rules/rules/integrations/aws/credential_access_aws_iam_assume_role_brute_force.toml +105 -0
- nldcsc_elastic_rules/rules/integrations/aws/credential_access_iam_compromisedkeyquarantine_policy_attached_to_user.toml +106 -0
- nldcsc_elastic_rules/rules/integrations/aws/credential_access_iam_user_addition_to_group.toml +134 -0
- nldcsc_elastic_rules/rules/integrations/aws/credential_access_new_terms_secretsmanager_getsecretvalue.toml +144 -0
- nldcsc_elastic_rules/rules/integrations/aws/credential_access_rapid_secret_retrieval_attempts_from_secretsmanager.toml +156 -0
- nldcsc_elastic_rules/rules/integrations/aws/credential_access_retrieve_secure_string_parameters_via_ssm.toml +128 -0
- nldcsc_elastic_rules/rules/integrations/aws/credential_access_root_console_failure_brute_force.toml +152 -0
- nldcsc_elastic_rules/rules/integrations/aws/defense_evasion_cloudtrail_logging_deleted.toml +120 -0
- nldcsc_elastic_rules/rules/integrations/aws/defense_evasion_cloudtrail_logging_evasion.toml +126 -0
- nldcsc_elastic_rules/rules/integrations/aws/defense_evasion_cloudtrail_logging_suspended.toml +121 -0
- nldcsc_elastic_rules/rules/integrations/aws/defense_evasion_cloudwatch_alarm_deletion.toml +174 -0
- nldcsc_elastic_rules/rules/integrations/aws/defense_evasion_config_service_rule_deletion.toml +116 -0
- nldcsc_elastic_rules/rules/integrations/aws/defense_evasion_configuration_recorder_stopped.toml +94 -0
- nldcsc_elastic_rules/rules/integrations/aws/defense_evasion_ec2_flow_log_deletion.toml +129 -0
- nldcsc_elastic_rules/rules/integrations/aws/defense_evasion_ec2_network_acl_deletion.toml +119 -0
- nldcsc_elastic_rules/rules/integrations/aws/defense_evasion_elasticache_security_group_creation.toml +107 -0
- nldcsc_elastic_rules/rules/integrations/aws/defense_evasion_elasticache_security_group_modified_or_deleted.toml +107 -0
- nldcsc_elastic_rules/rules/integrations/aws/defense_evasion_guardduty_detector_deletion.toml +153 -0
- nldcsc_elastic_rules/rules/integrations/aws/defense_evasion_rds_instance_restored.toml +106 -0
- nldcsc_elastic_rules/rules/integrations/aws/defense_evasion_route53_dns_query_resolver_config_deletion.toml +100 -0
- nldcsc_elastic_rules/rules/integrations/aws/defense_evasion_s3_bucket_configuration_deletion.toml +179 -0
- nldcsc_elastic_rules/rules/integrations/aws/defense_evasion_s3_bucket_lifecycle_expiration_added.toml +201 -0
- nldcsc_elastic_rules/rules/integrations/aws/defense_evasion_s3_bucket_server_access_logging_disabled.toml +152 -0
- nldcsc_elastic_rules/rules/integrations/aws/defense_evasion_sqs_purge_queue.toml +171 -0
- nldcsc_elastic_rules/rules/integrations/aws/defense_evasion_sts_get_federation_token.toml +134 -0
- nldcsc_elastic_rules/rules/integrations/aws/defense_evasion_vpc_security_group_ingress_rule_added_for_remote_connections.toml +118 -0
- nldcsc_elastic_rules/rules/integrations/aws/defense_evasion_waf_acl_deletion.toml +101 -0
- nldcsc_elastic_rules/rules/integrations/aws/defense_evasion_waf_rule_or_rule_group_deletion.toml +102 -0
- nldcsc_elastic_rules/rules/integrations/aws/discovery_ec2_deprecated_ami_discovery.toml +141 -0
- nldcsc_elastic_rules/rules/integrations/aws/discovery_ec2_multi_region_describe_instances.toml +135 -0
- nldcsc_elastic_rules/rules/integrations/aws/discovery_ec2_multiple_discovery_api_calls_via_cli.toml +155 -0
- nldcsc_elastic_rules/rules/integrations/aws/discovery_ec2_userdata_request_for_ec2_instance.toml +152 -0
- nldcsc_elastic_rules/rules/integrations/aws/discovery_new_terms_sts_getcalleridentity.toml +139 -0
- nldcsc_elastic_rules/rules/integrations/aws/discovery_servicequotas_multi_region_service_quota_requests.toml +125 -0
- nldcsc_elastic_rules/rules/integrations/aws/execution_lambda_external_layer_added_to_function.toml +98 -0
- nldcsc_elastic_rules/rules/integrations/aws/execution_new_terms_cloudformation_createstack.toml +119 -0
- nldcsc_elastic_rules/rules/integrations/aws/execution_ssm_command_document_created_by_rare_user.toml +117 -0
- nldcsc_elastic_rules/rules/integrations/aws/execution_ssm_sendcommand_by_rare_user.toml +138 -0
- nldcsc_elastic_rules/rules/integrations/aws/exfiltration_dynamodb_scan_by_unusual_user.toml +133 -0
- nldcsc_elastic_rules/rules/integrations/aws/exfiltration_dynamodb_table_exported_to_s3.toml +115 -0
- nldcsc_elastic_rules/rules/integrations/aws/exfiltration_ec2_ami_shared_with_separate_account.toml +100 -0
- nldcsc_elastic_rules/rules/integrations/aws/exfiltration_ec2_ebs_snapshot_shared_with_another_account.toml +150 -0
- nldcsc_elastic_rules/rules/integrations/aws/exfiltration_ec2_export_task.toml +154 -0
- nldcsc_elastic_rules/rules/integrations/aws/exfiltration_ec2_full_network_packet_capture_detected.toml +185 -0
- nldcsc_elastic_rules/rules/integrations/aws/exfiltration_ec2_vm_export_failure.toml +108 -0
- nldcsc_elastic_rules/rules/integrations/aws/exfiltration_rds_snapshot_export.toml +88 -0
- nldcsc_elastic_rules/rules/integrations/aws/exfiltration_rds_snapshot_shared_with_another_account.toml +100 -0
- nldcsc_elastic_rules/rules/integrations/aws/exfiltration_s3_bucket_policy_added_for_external_account_access.toml +194 -0
- nldcsc_elastic_rules/rules/integrations/aws/exfiltration_s3_bucket_policy_added_for_public_access.toml +188 -0
- nldcsc_elastic_rules/rules/integrations/aws/exfiltration_s3_bucket_replicated_to_external_account.toml +93 -0
- nldcsc_elastic_rules/rules/integrations/aws/exfiltration_sns_rare_protocol_subscription_by_user.toml +155 -0
- nldcsc_elastic_rules/rules/integrations/aws/impact_aws_eventbridge_rule_disabled_or_deleted.toml +94 -0
- nldcsc_elastic_rules/rules/integrations/aws/impact_aws_s3_bucket_enumeration_or_brute_force.toml +152 -0
- nldcsc_elastic_rules/rules/integrations/aws/impact_cloudtrail_logging_updated.toml +137 -0
- nldcsc_elastic_rules/rules/integrations/aws/impact_cloudwatch_log_group_deletion.toml +202 -0
- nldcsc_elastic_rules/rules/integrations/aws/impact_cloudwatch_log_stream_deletion.toml +189 -0
- nldcsc_elastic_rules/rules/integrations/aws/impact_ec2_disable_ebs_encryption.toml +156 -0
- nldcsc_elastic_rules/rules/integrations/aws/impact_ec2_ebs_snapshot_access_removed.toml +147 -0
- nldcsc_elastic_rules/rules/integrations/aws/impact_efs_filesystem_or_mount_deleted.toml +95 -0
- nldcsc_elastic_rules/rules/integrations/aws/impact_iam_deactivate_mfa_device.toml +167 -0
- nldcsc_elastic_rules/rules/integrations/aws/impact_iam_group_deletion.toml +119 -0
- nldcsc_elastic_rules/rules/integrations/aws/impact_kms_cmk_disabled_or_scheduled_for_deletion.toml +103 -0
- nldcsc_elastic_rules/rules/integrations/aws/impact_rds_group_deletion.toml +98 -0
- nldcsc_elastic_rules/rules/integrations/aws/impact_rds_instance_cluster_deletion.toml +105 -0
- nldcsc_elastic_rules/rules/integrations/aws/impact_rds_instance_cluster_deletion_protection_disabled.toml +97 -0
- nldcsc_elastic_rules/rules/integrations/aws/impact_rds_instance_cluster_stoppage.toml +100 -0
- nldcsc_elastic_rules/rules/integrations/aws/impact_rds_snapshot_deleted.toml +98 -0
- nldcsc_elastic_rules/rules/integrations/aws/impact_s3_bucket_object_uploaded_with_ransom_extension.toml +155 -0
- nldcsc_elastic_rules/rules/integrations/aws/impact_s3_excessive_object_encryption_with_sse_c.toml +139 -0
- nldcsc_elastic_rules/rules/integrations/aws/impact_s3_object_encryption_with_external_key.toml +126 -0
- nldcsc_elastic_rules/rules/integrations/aws/impact_s3_object_versioning_disabled.toml +153 -0
- nldcsc_elastic_rules/rules/integrations/aws/impact_s3_static_site_js_file_uploaded.toml +154 -0
- nldcsc_elastic_rules/rules/integrations/aws/impact_s3_unusual_object_encryption_with_sse_c.toml +143 -0
- nldcsc_elastic_rules/rules/integrations/aws/initial_access_console_login_root.toml +165 -0
- nldcsc_elastic_rules/rules/integrations/aws/initial_access_iam_session_token_used_from_multiple_addresses.toml +225 -0
- nldcsc_elastic_rules/rules/integrations/aws/initial_access_kali_user_agent_detected_with_aws_cli.toml +89 -0
- nldcsc_elastic_rules/rules/integrations/aws/initial_access_password_recovery.toml +137 -0
- nldcsc_elastic_rules/rules/integrations/aws/initial_access_signin_console_login_federated_user.toml +131 -0
- nldcsc_elastic_rules/rules/integrations/aws/lateral_movement_aws_ssm_start_session_to_ec2_instance.toml +123 -0
- nldcsc_elastic_rules/rules/integrations/aws/lateral_movement_ec2_instance_connect_ssh_public_key_uploaded.toml +141 -0
- nldcsc_elastic_rules/rules/integrations/aws/lateral_movement_ec2_instance_console_login.toml +206 -0
- nldcsc_elastic_rules/rules/integrations/aws/lateral_movement_sns_topic_message_publish_by_rare_user.toml +190 -0
- nldcsc_elastic_rules/rules/integrations/aws/ml_cloudtrail_error_message_spike.toml +114 -0
- nldcsc_elastic_rules/rules/integrations/aws/ml_cloudtrail_rare_error_code.toml +116 -0
- nldcsc_elastic_rules/rules/integrations/aws/ml_cloudtrail_rare_method_by_city.toml +118 -0
- nldcsc_elastic_rules/rules/integrations/aws/ml_cloudtrail_rare_method_by_country.toml +118 -0
- nldcsc_elastic_rules/rules/integrations/aws/ml_cloudtrail_rare_method_by_user.toml +116 -0
- nldcsc_elastic_rules/rules/integrations/aws/persistence_aws_attempt_to_register_virtual_mfa_device.toml +171 -0
- nldcsc_elastic_rules/rules/integrations/aws/persistence_ec2_network_acl_creation.toml +133 -0
- nldcsc_elastic_rules/rules/integrations/aws/persistence_ec2_route_table_modified_or_deleted.toml +151 -0
- nldcsc_elastic_rules/rules/integrations/aws/persistence_ec2_security_group_configuration_change_detection.toml +144 -0
- nldcsc_elastic_rules/rules/integrations/aws/persistence_iam_api_calls_via_user_session_token.toml +173 -0
- nldcsc_elastic_rules/rules/integrations/aws/persistence_iam_create_login_profile_for_root.toml +167 -0
- nldcsc_elastic_rules/rules/integrations/aws/persistence_iam_create_user_via_assumed_role_on_ec2_instance.toml +142 -0
- nldcsc_elastic_rules/rules/integrations/aws/persistence_iam_group_creation.toml +136 -0
- nldcsc_elastic_rules/rules/integrations/aws/persistence_iam_roles_anywhere_profile_created.toml +176 -0
- nldcsc_elastic_rules/rules/integrations/aws/persistence_iam_roles_anywhere_trusted_anchor_created_with_external_ca.toml +169 -0
- nldcsc_elastic_rules/rules/integrations/aws/persistence_iam_user_created_access_keys_for_another_user.toml +215 -0
- nldcsc_elastic_rules/rules/integrations/aws/persistence_lambda_backdoor_invoke_function_for_any_principal.toml +100 -0
- nldcsc_elastic_rules/rules/integrations/aws/persistence_rds_cluster_creation.toml +110 -0
- nldcsc_elastic_rules/rules/integrations/aws/persistence_rds_db_instance_password_modified.toml +116 -0
- nldcsc_elastic_rules/rules/integrations/aws/persistence_rds_group_creation.toml +103 -0
- nldcsc_elastic_rules/rules/integrations/aws/persistence_rds_instance_creation.toml +90 -0
- nldcsc_elastic_rules/rules/integrations/aws/persistence_rds_instance_made_public.toml +110 -0
- nldcsc_elastic_rules/rules/integrations/aws/persistence_redshift_instance_creation.toml +93 -0
- nldcsc_elastic_rules/rules/integrations/aws/persistence_route_53_domain_transfer_lock_disabled.toml +107 -0
- nldcsc_elastic_rules/rules/integrations/aws/persistence_route_53_domain_transferred_to_another_account.toml +102 -0
- nldcsc_elastic_rules/rules/integrations/aws/persistence_route_53_hosted_zone_associated_with_a_vpc.toml +94 -0
- nldcsc_elastic_rules/rules/integrations/aws/persistence_route_table_created.toml +123 -0
- nldcsc_elastic_rules/rules/integrations/aws/persistence_sts_assume_role_with_new_mfa.toml +162 -0
- nldcsc_elastic_rules/rules/integrations/aws/privilege_escalation_iam_administratoraccess_policy_attached_to_group.toml +176 -0
- nldcsc_elastic_rules/rules/integrations/aws/privilege_escalation_iam_administratoraccess_policy_attached_to_role.toml +173 -0
- nldcsc_elastic_rules/rules/integrations/aws/privilege_escalation_iam_administratoraccess_policy_attached_to_user.toml +180 -0
- nldcsc_elastic_rules/rules/integrations/aws/privilege_escalation_iam_customer_managed_policy_attached_to_role.toml +140 -0
- nldcsc_elastic_rules/rules/integrations/aws/privilege_escalation_iam_saml_provider_updated.toml +163 -0
- nldcsc_elastic_rules/rules/integrations/aws/privilege_escalation_iam_update_assume_role_policy.toml +139 -0
- nldcsc_elastic_rules/rules/integrations/aws/privilege_escalation_role_assumption_by_service.toml +158 -0
- nldcsc_elastic_rules/rules/integrations/aws/privilege_escalation_role_assumption_by_user.toml +146 -0
- nldcsc_elastic_rules/rules/integrations/aws/privilege_escalation_sts_assume_root_from_rare_user_and_member_account.toml +170 -0
- nldcsc_elastic_rules/rules/integrations/aws/privilege_escalation_sts_role_chaining.toml +176 -0
- nldcsc_elastic_rules/rules/integrations/aws/resource_development_sns_topic_created_by_rare_user.toml +169 -0
- nldcsc_elastic_rules/rules/integrations/aws_bedrock/aws_bedrock_execution_without_guardrails.toml +109 -0
- nldcsc_elastic_rules/rules/integrations/aws_bedrock/aws_bedrock_guardrails_multiple_violations_by_single_user.toml +109 -0
- nldcsc_elastic_rules/rules/integrations/aws_bedrock/aws_bedrock_guardrails_multiple_violations_in_single_request.toml +118 -0
- nldcsc_elastic_rules/rules/integrations/aws_bedrock/aws_bedrock_high_confidence_misconduct_blocks_detected.toml +122 -0
- nldcsc_elastic_rules/rules/integrations/aws_bedrock/aws_bedrock_high_resource_consumption_detection.toml +117 -0
- nldcsc_elastic_rules/rules/integrations/aws_bedrock/aws_bedrock_multiple_attempts_to_use_denied_models_by_user.toml +111 -0
- nldcsc_elastic_rules/rules/integrations/aws_bedrock/aws_bedrock_multiple_sensitive_information_policy_blocks_detected.toml +108 -0
- nldcsc_elastic_rules/rules/integrations/aws_bedrock/aws_bedrock_multiple_topic_policy_blocks_detected.toml +108 -0
- nldcsc_elastic_rules/rules/integrations/aws_bedrock/aws_bedrock_multiple_validation_exception_errors_by_single_user.toml +117 -0
- nldcsc_elastic_rules/rules/integrations/aws_bedrock/aws_bedrock_multiple_word_policy_blocks_detected.toml +108 -0
- nldcsc_elastic_rules/rules/integrations/azure/collection_azure_storage_account_blob_public_access_enabled.toml +106 -0
- nldcsc_elastic_rules/rules/integrations/azure/collection_entra_auth_broker_sharepoint_access_for_user_principal.toml +131 -0
- nldcsc_elastic_rules/rules/integrations/azure/collection_graph_email_access_by_unusual_public_client_via_graph.toml +122 -0
- nldcsc_elastic_rules/rules/integrations/azure/credential_access_azure_entra_suspicious_signin.toml +164 -0
- nldcsc_elastic_rules/rules/integrations/azure/credential_access_azure_entra_totp_brute_force_attempts.toml +179 -0
- nldcsc_elastic_rules/rules/integrations/azure/credential_access_azure_full_network_packet_capture_detected.toml +96 -0
- nldcsc_elastic_rules/rules/integrations/azure/credential_access_azure_key_vault_excessive_retrieval.toml +193 -0
- nldcsc_elastic_rules/rules/integrations/azure/credential_access_azure_key_vault_retrieval_from_rare_identity.toml +142 -0
- nldcsc_elastic_rules/rules/integrations/azure/credential_access_azure_storage_account_keys_accessed.toml +129 -0
- nldcsc_elastic_rules/rules/integrations/azure/credential_access_entra_id_brute_force_activity.toml +255 -0
- nldcsc_elastic_rules/rules/integrations/azure/credential_access_entra_id_excessive_account_lockouts.toml +137 -0
- nldcsc_elastic_rules/rules/integrations/azure/credential_access_entra_signin_brute_force_microsoft_365.toml +265 -0
- nldcsc_elastic_rules/rules/integrations/azure/credential_access_storage_account_key_regenerated.toml +117 -0
- nldcsc_elastic_rules/rules/integrations/azure/defense_evasion_azure_automation_runbook_deleted.toml +83 -0
- nldcsc_elastic_rules/rules/integrations/azure/defense_evasion_azure_blob_permissions_modified.toml +97 -0
- nldcsc_elastic_rules/rules/integrations/azure/defense_evasion_azure_diagnostic_settings_deletion.toml +128 -0
- nldcsc_elastic_rules/rules/integrations/azure/defense_evasion_event_hub_deletion.toml +98 -0
- nldcsc_elastic_rules/rules/integrations/azure/defense_evasion_firewall_policy_deletion.toml +100 -0
- nldcsc_elastic_rules/rules/integrations/azure/defense_evasion_frontdoor_firewall_policy_deletion.toml +103 -0
- nldcsc_elastic_rules/rules/integrations/azure/defense_evasion_kubernetes_events_deleted.toml +98 -0
- nldcsc_elastic_rules/rules/integrations/azure/defense_evasion_network_watcher_deletion.toml +99 -0
- nldcsc_elastic_rules/rules/integrations/azure/defense_evasion_suppression_rule_created.toml +94 -0
- nldcsc_elastic_rules/rules/integrations/azure/discovery_blob_container_access_mod.toml +112 -0
- nldcsc_elastic_rules/rules/integrations/azure/discovery_bloodhound_user_agents_detected.toml +171 -0
- nldcsc_elastic_rules/rules/integrations/azure/discovery_teamfiltration_user_agents_detected.toml +173 -0
- nldcsc_elastic_rules/rules/integrations/azure/execution_azure_automation_runbook_created_or_modified.toml +92 -0
- nldcsc_elastic_rules/rules/integrations/azure/execution_command_virtual_machine.toml +96 -0
- nldcsc_elastic_rules/rules/integrations/azure/exfiltration_azure_storage_blob_download_azcopy_sas_token.toml +121 -0
- nldcsc_elastic_rules/rules/integrations/azure/impact_azure_compute_restore_point_collection_deleted.toml +111 -0
- nldcsc_elastic_rules/rules/integrations/azure/impact_azure_compute_restore_point_collections_deleted.toml +132 -0
- nldcsc_elastic_rules/rules/integrations/azure/impact_azure_compute_vm_snapshot_deletion.toml +132 -0
- nldcsc_elastic_rules/rules/integrations/azure/impact_azure_compute_vm_snapshot_deletions.toml +136 -0
- nldcsc_elastic_rules/rules/integrations/azure/impact_azure_key_vault_modified.toml +95 -0
- nldcsc_elastic_rules/rules/integrations/azure/impact_azure_storage_account_deletion.toml +110 -0
- nldcsc_elastic_rules/rules/integrations/azure/impact_azure_storage_account_deletion_multiple.toml +115 -0
- nldcsc_elastic_rules/rules/integrations/azure/impact_kubernetes_pod_deleted.toml +96 -0
- nldcsc_elastic_rules/rules/integrations/azure/impact_resource_group_deletion.toml +110 -0
- nldcsc_elastic_rules/rules/integrations/azure/initial_access_azure_active_directory_high_risk_signin_atrisk_or_confirmed.toml +102 -0
- nldcsc_elastic_rules/rules/integrations/azure/initial_access_azure_active_directory_powershell_signin.toml +125 -0
- nldcsc_elastic_rules/rules/integrations/azure/initial_access_entra_graph_single_session_from_multiple_addresses.toml +224 -0
- nldcsc_elastic_rules/rules/integrations/azure/initial_access_entra_id_actor_token_user_impersonation_abuse.toml +134 -0
- nldcsc_elastic_rules/rules/integrations/azure/initial_access_entra_id_device_code_auth_with_broker_client.toml +124 -0
- nldcsc_elastic_rules/rules/integrations/azure/initial_access_entra_id_high_risk_signin.toml +100 -0
- nldcsc_elastic_rules/rules/integrations/azure/initial_access_entra_id_oauth_user_impersonation_scope.toml +167 -0
- nldcsc_elastic_rules/rules/integrations/azure/initial_access_entra_id_protection_confirmed_compromise.toml +146 -0
- nldcsc_elastic_rules/rules/integrations/azure/initial_access_entra_id_protection_sign_in_risk_detected.toml +190 -0
- nldcsc_elastic_rules/rules/integrations/azure/initial_access_entra_id_protection_user_risk_detected.toml +187 -0
- nldcsc_elastic_rules/rules/integrations/azure/initial_access_entra_id_suspicious_oauth_flow_via_auth_broker_to_drs.toml +232 -0
- nldcsc_elastic_rules/rules/integrations/azure/initial_access_entra_id_unusual_ropc_login_attempt.toml +106 -0
- nldcsc_elastic_rules/rules/integrations/azure/initial_access_entra_id_user_reported_risk.toml +97 -0
- nldcsc_elastic_rules/rules/integrations/azure/initial_access_entra_illicit_consent_grant_via_registered_application.toml +145 -0
- nldcsc_elastic_rules/rules/integrations/azure/initial_access_entra_oauth_phishing_via_vscode_client.toml +133 -0
- nldcsc_elastic_rules/rules/integrations/azure/initial_access_entra_protection_multi_azure_identity_protection_alerts.toml +98 -0
- nldcsc_elastic_rules/rules/integrations/azure/initial_access_entra_rare_app_id_for_principal_auth.toml +148 -0
- nldcsc_elastic_rules/rules/integrations/azure/initial_access_entra_rare_authentication_requirement_for_principal_user.toml +153 -0
- nldcsc_elastic_rules/rules/integrations/azure/initial_access_external_guest_user_invite.toml +103 -0
- nldcsc_elastic_rules/rules/integrations/azure/initial_access_first_time_seen_device_code_auth.toml +140 -0
- nldcsc_elastic_rules/rules/integrations/azure/initial_access_graph_first_occurrence_of_client_request.toml +143 -0
- nldcsc_elastic_rules/rules/integrations/azure/persistence_azure_application_credential_modification.toml +104 -0
- nldcsc_elastic_rules/rules/integrations/azure/persistence_azure_automation_account_created.toml +98 -0
- nldcsc_elastic_rules/rules/integrations/azure/persistence_azure_automation_webhook_created.toml +102 -0
- nldcsc_elastic_rules/rules/integrations/azure/persistence_azure_global_administrator_role_assigned.toml +101 -0
- nldcsc_elastic_rules/rules/integrations/azure/persistence_azure_pim_user_added_global_admin.toml +101 -0
- nldcsc_elastic_rules/rules/integrations/azure/persistence_azure_privileged_identity_management_role_modified.toml +114 -0
- nldcsc_elastic_rules/rules/integrations/azure/persistence_azure_service_principal_credentials_added.toml +111 -0
- nldcsc_elastic_rules/rules/integrations/azure/persistence_entra_conditional_access_policy_modified.toml +116 -0
- nldcsc_elastic_rules/rules/integrations/azure/persistence_entra_id_mfa_disabled_for_user.toml +104 -0
- nldcsc_elastic_rules/rules/integrations/azure/persistence_entra_id_oidc_discovery_url_change.toml +105 -0
- nldcsc_elastic_rules/rules/integrations/azure/persistence_entra_id_rt_to_prt_transition_from_user_device.toml +152 -0
- nldcsc_elastic_rules/rules/integrations/azure/persistence_entra_id_suspicious_adrs_token_request.toml +99 -0
- nldcsc_elastic_rules/rules/integrations/azure/persistence_entra_id_suspicious_cloud_device_registration.toml +116 -0
- nldcsc_elastic_rules/rules/integrations/azure/persistence_entra_id_user_signed_in_from_unusual_device.toml +138 -0
- nldcsc_elastic_rules/rules/integrations/azure/persistence_entra_service_principal_created.toml +120 -0
- nldcsc_elastic_rules/rules/integrations/azure/persistence_graph_eam_addition_or_modification.toml +101 -0
- nldcsc_elastic_rules/rules/integrations/azure/persistence_identity_protect_alert_followed_by_device_reg.toml +107 -0
- nldcsc_elastic_rules/rules/integrations/azure/persistence_update_event_hub_auth_rule.toml +107 -0
- nldcsc_elastic_rules/rules/integrations/azure/persistence_user_added_as_owner_for_azure_application.toml +93 -0
- nldcsc_elastic_rules/rules/integrations/azure/persistence_user_added_as_owner_for_azure_service_principal.toml +95 -0
- nldcsc_elastic_rules/rules/integrations/azure/privilege_escalation_azure_kubernetes_rolebinding_created.toml +111 -0
- nldcsc_elastic_rules/rules/integrations/azure/privilege_escalation_azure_rbac_administrator_roles_assigned.toml +110 -0
- nldcsc_elastic_rules/rules/integrations/azure/privilege_escalation_entra_id_elevate_to_user_administrator_access.toml +116 -0
- nldcsc_elastic_rules/rules/integrations/azure_openai/azure_openai_denial_of_ml_service_detection.toml +100 -0
- nldcsc_elastic_rules/rules/integrations/azure_openai/azure_openai_insecure_output_handling_detection.toml +94 -0
- nldcsc_elastic_rules/rules/integrations/azure_openai/azure_openai_model_theft_detection.toml +100 -0
- nldcsc_elastic_rules/rules/integrations/beaconing/command_and_control_beaconing.toml +113 -0
- nldcsc_elastic_rules/rules/integrations/beaconing/command_and_control_beaconing_high_confidence.toml +108 -0
- nldcsc_elastic_rules/rules/integrations/cyberarkpas/privilege_escalation_cyberarkpas_error_audit_event_promotion.toml +70 -0
- nldcsc_elastic_rules/rules/integrations/cyberarkpas/privilege_escalation_cyberarkpas_recommended_events_to_monitor_promotion.toml +73 -0
- nldcsc_elastic_rules/rules/integrations/ded/exfiltration_ml_high_bytes_destination_geo_country_iso_code.toml +103 -0
- nldcsc_elastic_rules/rules/integrations/ded/exfiltration_ml_high_bytes_destination_ip.toml +102 -0
- nldcsc_elastic_rules/rules/integrations/ded/exfiltration_ml_high_bytes_destination_port.toml +102 -0
- nldcsc_elastic_rules/rules/integrations/ded/exfiltration_ml_high_bytes_destination_region_name.toml +103 -0
- nldcsc_elastic_rules/rules/integrations/ded/exfiltration_ml_high_bytes_written_to_external_device.toml +102 -0
- nldcsc_elastic_rules/rules/integrations/ded/exfiltration_ml_high_bytes_written_to_external_device_airdrop.toml +103 -0
- nldcsc_elastic_rules/rules/integrations/ded/exfiltration_ml_rare_process_writing_to_external_device.toml +102 -0
- nldcsc_elastic_rules/rules/integrations/dga/command_and_control_ml_dga_activity_using_sunburst_domain.toml +117 -0
- nldcsc_elastic_rules/rules/integrations/dga/command_and_control_ml_dga_high_sum_probability.toml +109 -0
- nldcsc_elastic_rules/rules/integrations/dga/command_and_control_ml_dns_request_high_dga_probability.toml +116 -0
- nldcsc_elastic_rules/rules/integrations/dga/command_and_control_ml_dns_request_predicted_to_be_a_dga_domain.toml +117 -0
- nldcsc_elastic_rules/rules/integrations/endpoint/defense_evasion_elastic_memory_threat_detected.toml +168 -0
- nldcsc_elastic_rules/rules/integrations/endpoint/defense_evasion_elastic_memory_threat_prevented.toml +167 -0
- nldcsc_elastic_rules/rules/integrations/endpoint/elastic_endpoint_security.toml +126 -0
- nldcsc_elastic_rules/rules/integrations/endpoint/elastic_endpoint_security_behavior_detected.toml +134 -0
- nldcsc_elastic_rules/rules/integrations/endpoint/elastic_endpoint_security_behavior_prevented.toml +135 -0
- nldcsc_elastic_rules/rules/integrations/endpoint/execution_elastic_malicious_file_detected.toml +159 -0
- nldcsc_elastic_rules/rules/integrations/endpoint/execution_elastic_malicious_file_prevented.toml +159 -0
- nldcsc_elastic_rules/rules/integrations/endpoint/impact_elastic_ransomware_detected.toml +145 -0
- nldcsc_elastic_rules/rules/integrations/endpoint/impact_elastic_ransomware_prevented.toml +146 -0
- nldcsc_elastic_rules/rules/integrations/fim/persistence_suspicious_file_modifications.toml +316 -0
- nldcsc_elastic_rules/rules/integrations/gcp/collection_gcp_pub_sub_subscription_creation.toml +94 -0
- nldcsc_elastic_rules/rules/integrations/gcp/collection_gcp_pub_sub_topic_creation.toml +97 -0
- nldcsc_elastic_rules/rules/integrations/gcp/defense_evasion_gcp_firewall_rule_created.toml +100 -0
- nldcsc_elastic_rules/rules/integrations/gcp/defense_evasion_gcp_firewall_rule_deleted.toml +97 -0
- nldcsc_elastic_rules/rules/integrations/gcp/defense_evasion_gcp_firewall_rule_modified.toml +100 -0
- nldcsc_elastic_rules/rules/integrations/gcp/defense_evasion_gcp_logging_bucket_deletion.toml +97 -0
- nldcsc_elastic_rules/rules/integrations/gcp/defense_evasion_gcp_logging_sink_deletion.toml +94 -0
- nldcsc_elastic_rules/rules/integrations/gcp/defense_evasion_gcp_pub_sub_subscription_deletion.toml +95 -0
- nldcsc_elastic_rules/rules/integrations/gcp/defense_evasion_gcp_pub_sub_topic_deletion.toml +96 -0
- nldcsc_elastic_rules/rules/integrations/gcp/defense_evasion_gcp_storage_bucket_configuration_modified.toml +95 -0
- nldcsc_elastic_rules/rules/integrations/gcp/defense_evasion_gcp_storage_bucket_permissions_modified.toml +95 -0
- nldcsc_elastic_rules/rules/integrations/gcp/defense_evasion_gcp_virtual_private_cloud_network_deleted.toml +100 -0
- nldcsc_elastic_rules/rules/integrations/gcp/defense_evasion_gcp_virtual_private_cloud_route_created.toml +101 -0
- nldcsc_elastic_rules/rules/integrations/gcp/defense_evasion_gcp_virtual_private_cloud_route_deleted.toml +101 -0
- nldcsc_elastic_rules/rules/integrations/gcp/exfiltration_gcp_logging_sink_modification.toml +97 -0
- nldcsc_elastic_rules/rules/integrations/gcp/impact_gcp_iam_role_deletion.toml +96 -0
- nldcsc_elastic_rules/rules/integrations/gcp/impact_gcp_service_account_deleted.toml +96 -0
- nldcsc_elastic_rules/rules/integrations/gcp/impact_gcp_service_account_disabled.toml +96 -0
- nldcsc_elastic_rules/rules/integrations/gcp/impact_gcp_storage_bucket_deleted.toml +87 -0
- nldcsc_elastic_rules/rules/integrations/gcp/initial_access_gcp_iam_custom_role_creation.toml +107 -0
- nldcsc_elastic_rules/rules/integrations/gcp/persistence_gcp_iam_service_account_key_deletion.toml +99 -0
- nldcsc_elastic_rules/rules/integrations/gcp/persistence_gcp_key_created_for_service_account.toml +100 -0
- nldcsc_elastic_rules/rules/integrations/gcp/persistence_gcp_service_account_created.toml +96 -0
- nldcsc_elastic_rules/rules/integrations/github/defense_evasion_github_protected_branch_settings_changed.toml +90 -0
- nldcsc_elastic_rules/rules/integrations/github/execution_github_app_deleted.toml +80 -0
- nldcsc_elastic_rules/rules/integrations/github/execution_github_high_number_of_cloned_repos_from_pat.toml +93 -0
- nldcsc_elastic_rules/rules/integrations/github/execution_github_ueba_multiple_behavior_alerts_from_account.toml +88 -0
- nldcsc_elastic_rules/rules/integrations/github/execution_new_github_app_installed.toml +85 -0
- nldcsc_elastic_rules/rules/integrations/github/impact_github_repository_deleted.toml +84 -0
- nldcsc_elastic_rules/rules/integrations/github/persistence_github_org_owner_added.toml +90 -0
- nldcsc_elastic_rules/rules/integrations/github/persistence_organization_owner_role_granted.toml +88 -0
- nldcsc_elastic_rules/rules/integrations/google_workspace/collection_google_drive_ownership_transferred_via_google_workspace.toml +119 -0
- nldcsc_elastic_rules/rules/integrations/google_workspace/collection_google_workspace_custom_gmail_route_created_or_modified.toml +119 -0
- nldcsc_elastic_rules/rules/integrations/google_workspace/credential_access_google_workspace_drive_encryption_key_accessed_by_anonymous_user.toml +120 -0
- nldcsc_elastic_rules/rules/integrations/google_workspace/defense_evasion_application_removed_from_blocklist_in_google_workspace.toml +125 -0
- nldcsc_elastic_rules/rules/integrations/google_workspace/defense_evasion_domain_added_to_google_workspace_trusted_domains.toml +117 -0
- nldcsc_elastic_rules/rules/integrations/google_workspace/defense_evasion_google_workspace_bitlocker_setting_disabled.toml +118 -0
- nldcsc_elastic_rules/rules/integrations/google_workspace/defense_evasion_google_workspace_new_oauth_login_from_third_party_application.toml +133 -0
- nldcsc_elastic_rules/rules/integrations/google_workspace/defense_evasion_restrictions_for_marketplace_modified_to_allow_any_app.toml +126 -0
- nldcsc_elastic_rules/rules/integrations/google_workspace/google_workspace_alert_center_promotion.toml +76 -0
- nldcsc_elastic_rules/rules/integrations/google_workspace/impact_google_workspace_admin_role_deletion.toml +112 -0
- nldcsc_elastic_rules/rules/integrations/google_workspace/impact_google_workspace_mfa_enforcement_disabled.toml +116 -0
- nldcsc_elastic_rules/rules/integrations/google_workspace/initial_access_external_user_added_to_google_workspace_group.toml +122 -0
- nldcsc_elastic_rules/rules/integrations/google_workspace/initial_access_google_workspace_suspended_user_renewed.toml +112 -0
- nldcsc_elastic_rules/rules/integrations/google_workspace/initial_access_object_copied_to_external_drive_with_app_consent.toml +134 -0
- nldcsc_elastic_rules/rules/integrations/google_workspace/persistence_application_added_to_google_workspace_domain.toml +111 -0
- nldcsc_elastic_rules/rules/integrations/google_workspace/persistence_google_workspace_2sv_policy_disabled.toml +116 -0
- nldcsc_elastic_rules/rules/integrations/google_workspace/persistence_google_workspace_admin_role_assigned_to_user.toml +125 -0
- nldcsc_elastic_rules/rules/integrations/google_workspace/persistence_google_workspace_api_access_granted_via_dwd.toml +117 -0
- nldcsc_elastic_rules/rules/integrations/google_workspace/persistence_google_workspace_custom_admin_role_created.toml +117 -0
- nldcsc_elastic_rules/rules/integrations/google_workspace/persistence_google_workspace_password_policy_modified.toml +124 -0
- nldcsc_elastic_rules/rules/integrations/google_workspace/persistence_google_workspace_role_modified.toml +119 -0
- nldcsc_elastic_rules/rules/integrations/google_workspace/persistence_google_workspace_user_organizational_unit_changed.toml +124 -0
- nldcsc_elastic_rules/rules/integrations/google_workspace/persistence_mfa_disabled_for_google_workspace_organization.toml +113 -0
- nldcsc_elastic_rules/rules/integrations/kubernetes/defense_evasion_events_deleted.toml +85 -0
- nldcsc_elastic_rules/rules/integrations/kubernetes/discovery_denied_service_account_request.toml +95 -0
- nldcsc_elastic_rules/rules/integrations/kubernetes/discovery_suspicious_self_subject_review.toml +98 -0
- nldcsc_elastic_rules/rules/integrations/kubernetes/execution_forbidden_creation_request.toml +80 -0
- nldcsc_elastic_rules/rules/integrations/kubernetes/execution_forbidden_request_from_unsual_user_agent.toml +77 -0
- nldcsc_elastic_rules/rules/integrations/kubernetes/execution_unusual_request_response_by_user_agent.toml +87 -0
- nldcsc_elastic_rules/rules/integrations/kubernetes/execution_user_exec_to_pod.toml +94 -0
- nldcsc_elastic_rules/rules/integrations/kubernetes/initial_access_anonymous_request_authorized.toml +98 -0
- nldcsc_elastic_rules/rules/integrations/kubernetes/persistence_exposed_service_created_with_type_nodeport.toml +104 -0
- nldcsc_elastic_rules/rules/integrations/kubernetes/privilege_escalation_container_created_with_excessive_linux_capabilities.toml +97 -0
- nldcsc_elastic_rules/rules/integrations/kubernetes/privilege_escalation_pod_created_with_hostipc.toml +114 -0
- nldcsc_elastic_rules/rules/integrations/kubernetes/privilege_escalation_pod_created_with_hostnetwork.toml +111 -0
- nldcsc_elastic_rules/rules/integrations/kubernetes/privilege_escalation_pod_created_with_hostpid.toml +114 -0
- nldcsc_elastic_rules/rules/integrations/kubernetes/privilege_escalation_pod_created_with_sensitive_hostpath_volume.toml +129 -0
- nldcsc_elastic_rules/rules/integrations/kubernetes/privilege_escalation_privileged_pod_created.toml +111 -0
- nldcsc_elastic_rules/rules/integrations/kubernetes/privilege_escalation_suspicious_assignment_of_controller_service_account.toml +103 -0
- nldcsc_elastic_rules/rules/integrations/lmd/lateral_movement_ml_high_mean_rdp_process_args.toml +102 -0
- nldcsc_elastic_rules/rules/integrations/lmd/lateral_movement_ml_high_mean_rdp_session_duration.toml +103 -0
- nldcsc_elastic_rules/rules/integrations/lmd/lateral_movement_ml_high_remote_file_size.toml +103 -0
- nldcsc_elastic_rules/rules/integrations/lmd/lateral_movement_ml_high_variance_rdp_session_duration.toml +103 -0
- nldcsc_elastic_rules/rules/integrations/lmd/lateral_movement_ml_rare_remote_file_directory.toml +103 -0
- nldcsc_elastic_rules/rules/integrations/lmd/lateral_movement_ml_rare_remote_file_extension.toml +102 -0
- nldcsc_elastic_rules/rules/integrations/lmd/lateral_movement_ml_spike_in_connections_from_a_source_ip.toml +103 -0
- nldcsc_elastic_rules/rules/integrations/lmd/lateral_movement_ml_spike_in_connections_to_a_destination_ip.toml +102 -0
- nldcsc_elastic_rules/rules/integrations/lmd/lateral_movement_ml_spike_in_rdp_processes.toml +101 -0
- nldcsc_elastic_rules/rules/integrations/lmd/lateral_movement_ml_spike_in_remote_file_transfers.toml +104 -0
- nldcsc_elastic_rules/rules/integrations/lmd/lateral_movement_ml_unusual_time_for_an_rdp_session.toml +103 -0
- nldcsc_elastic_rules/rules/integrations/o365/collection_microsoft_365_excessive_mail_items_accessed.toml +146 -0
- nldcsc_elastic_rules/rules/integrations/o365/collection_microsoft_365_mailbox_access_by_unusual_client_app_id.toml +195 -0
- nldcsc_elastic_rules/rules/integrations/o365/collection_microsoft_365_new_inbox_rule.toml +107 -0
- nldcsc_elastic_rules/rules/integrations/o365/collection_onedrive_excessive_file_downloads.toml +130 -0
- nldcsc_elastic_rules/rules/integrations/o365/credential_access_antra_id_device_reg_via_oauth_redirection.toml +122 -0
- nldcsc_elastic_rules/rules/integrations/o365/credential_access_microsoft_365_excessive_account_lockouts.toml +155 -0
- nldcsc_elastic_rules/rules/integrations/o365/credential_access_microsoft_365_potential_user_account_brute_force.toml +181 -0
- nldcsc_elastic_rules/rules/integrations/o365/credential_access_user_excessive_sso_logon_errors.toml +97 -0
- nldcsc_elastic_rules/rules/integrations/o365/defense_evasion_microsoft_365_exchange_anti_phish_policy_deletion.toml +102 -0
- nldcsc_elastic_rules/rules/integrations/o365/defense_evasion_microsoft_365_exchange_anti_phish_rule_mod.toml +102 -0
- nldcsc_elastic_rules/rules/integrations/o365/defense_evasion_microsoft_365_exchange_dkim_signing_config_disabled.toml +95 -0
- nldcsc_elastic_rules/rules/integrations/o365/defense_evasion_microsoft_365_exchange_dlp_policy_removed.toml +96 -0
- nldcsc_elastic_rules/rules/integrations/o365/defense_evasion_microsoft_365_exchange_malware_filter_policy_deletion.toml +97 -0
- nldcsc_elastic_rules/rules/integrations/o365/defense_evasion_microsoft_365_exchange_malware_filter_rule_mod.toml +96 -0
- nldcsc_elastic_rules/rules/integrations/o365/defense_evasion_microsoft_365_exchange_safe_attach_rule_disabled.toml +96 -0
- nldcsc_elastic_rules/rules/integrations/o365/defense_evasion_microsoft_365_exchange_safelinks_disabled.toml +100 -0
- nldcsc_elastic_rules/rules/integrations/o365/defense_evasion_microsoft_365_mailboxauditbypassassociation.toml +97 -0
- nldcsc_elastic_rules/rules/integrations/o365/defense_evasion_microsoft_365_new_inbox_rule_delete_or_move.toml +140 -0
- nldcsc_elastic_rules/rules/integrations/o365/defense_evasion_microsoft_365_susp_oauth2_authorization.toml +165 -0
- nldcsc_elastic_rules/rules/integrations/o365/defense_evasion_microsoft_365_teams_custom_app_interaction_allowed.toml +93 -0
- nldcsc_elastic_rules/rules/integrations/o365/defense_evasion_microsoft_365_teams_external_access_enabled.toml +91 -0
- nldcsc_elastic_rules/rules/integrations/o365/exfiltration_microsoft_365_exchange_transport_rule_creation.toml +91 -0
- nldcsc_elastic_rules/rules/integrations/o365/exfiltration_microsoft_365_exchange_transport_rule_mod.toml +92 -0
- nldcsc_elastic_rules/rules/integrations/o365/impact_microsoft_365_potential_ransomware_activity.toml +93 -0
- nldcsc_elastic_rules/rules/integrations/o365/impact_microsoft_365_unusual_volume_of_file_deletion.toml +84 -0
- nldcsc_elastic_rules/rules/integrations/o365/initial_access_defender_for_m365_threat_intelligence_signal.toml +105 -0
- nldcsc_elastic_rules/rules/integrations/o365/initial_access_entra_id_portal_login_atypical_travel.toml +132 -0
- nldcsc_elastic_rules/rules/integrations/o365/initial_access_entra_id_portal_login_impossible_travel.toml +131 -0
- nldcsc_elastic_rules/rules/integrations/o365/initial_access_microsoft_365_entra_oauth_phishing_via_vscode_client.toml +120 -0
- nldcsc_elastic_rules/rules/integrations/o365/initial_access_microsoft_365_illicit_consent_grant_via_registered_application.toml +154 -0
- nldcsc_elastic_rules/rules/integrations/o365/initial_access_microsoft_365_user_restricted_from_sending_email.toml +87 -0
- nldcsc_elastic_rules/rules/integrations/o365/initial_access_o365_user_reported_phish_malware.toml +97 -0
- nldcsc_elastic_rules/rules/integrations/o365/lateral_movement_malware_uploaded_onedrive.toml +104 -0
- nldcsc_elastic_rules/rules/integrations/o365/lateral_movement_malware_uploaded_sharepoint.toml +103 -0
- nldcsc_elastic_rules/rules/integrations/o365/persistence_exchange_suspicious_mailbox_permission_delegation.toml +140 -0
- nldcsc_elastic_rules/rules/integrations/o365/persistence_microsoft_365_exchange_management_role_assignment.toml +101 -0
- nldcsc_elastic_rules/rules/integrations/o365/persistence_microsoft_365_global_administrator_role_assign.toml +105 -0
- nldcsc_elastic_rules/rules/integrations/o365/persistence_microsoft_365_teams_guest_access_enabled.toml +91 -0
- nldcsc_elastic_rules/rules/integrations/o365/privilege_escalation_new_or_modified_federation_domain.toml +101 -0
- nldcsc_elastic_rules/rules/integrations/okta/credential_access_attempted_bypass_of_okta_mfa.toml +94 -0
- nldcsc_elastic_rules/rules/integrations/okta/credential_access_attempts_to_brute_force_okta_user_account.toml +96 -0
- nldcsc_elastic_rules/rules/integrations/okta/credential_access_multiple_auth_events_from_single_device_behind_proxy.toml +128 -0
- nldcsc_elastic_rules/rules/integrations/okta/credential_access_multiple_device_token_hashes_for_single_okta_session.toml +120 -0
- nldcsc_elastic_rules/rules/integrations/okta/credential_access_multiple_user_agent_os_authentication.toml +110 -0
- nldcsc_elastic_rules/rules/integrations/okta/credential_access_okta_authentication_for_multiple_users_from_single_source.toml +143 -0
- nldcsc_elastic_rules/rules/integrations/okta/credential_access_okta_authentication_for_multiple_users_with_the_same_device_token_hash.toml +141 -0
- nldcsc_elastic_rules/rules/integrations/okta/credential_access_okta_brute_force_or_password_spraying.toml +96 -0
- nldcsc_elastic_rules/rules/integrations/okta/credential_access_okta_mfa_bombing_via_push_notifications.toml +113 -0
- nldcsc_elastic_rules/rules/integrations/okta/credential_access_okta_multiple_device_token_hashes_for_single_user.toml +146 -0
- nldcsc_elastic_rules/rules/integrations/okta/credential_access_okta_potentially_successful_okta_bombing_via_push_notifications.toml +115 -0
- nldcsc_elastic_rules/rules/integrations/okta/credential_access_user_impersonation_access.toml +82 -0
- nldcsc_elastic_rules/rules/integrations/okta/defense_evasion_attempt_to_deactivate_okta_network_zone.toml +99 -0
- nldcsc_elastic_rules/rules/integrations/okta/defense_evasion_attempt_to_delete_okta_network_zone.toml +99 -0
- nldcsc_elastic_rules/rules/integrations/okta/defense_evasion_first_occurence_public_app_client_credential_token_exchange.toml +114 -0
- nldcsc_elastic_rules/rules/integrations/okta/defense_evasion_okta_attempt_to_deactivate_okta_policy.toml +106 -0
- nldcsc_elastic_rules/rules/integrations/okta/defense_evasion_okta_attempt_to_deactivate_okta_policy_rule.toml +105 -0
- nldcsc_elastic_rules/rules/integrations/okta/defense_evasion_okta_attempt_to_delete_okta_policy.toml +106 -0
- nldcsc_elastic_rules/rules/integrations/okta/defense_evasion_okta_attempt_to_delete_okta_policy_rule.toml +105 -0
- nldcsc_elastic_rules/rules/integrations/okta/defense_evasion_okta_attempt_to_modify_okta_network_zone.toml +105 -0
- nldcsc_elastic_rules/rules/integrations/okta/defense_evasion_okta_attempt_to_modify_okta_policy.toml +94 -0
- nldcsc_elastic_rules/rules/integrations/okta/defense_evasion_okta_attempt_to_modify_okta_policy_rule.toml +103 -0
- nldcsc_elastic_rules/rules/integrations/okta/defense_evasion_suspicious_okta_user_password_reset_or_unlock_attempts.toml +123 -0
- nldcsc_elastic_rules/rules/integrations/okta/impact_attempt_to_revoke_okta_api_token.toml +87 -0
- nldcsc_elastic_rules/rules/integrations/okta/impact_okta_attempt_to_deactivate_okta_application.toml +91 -0
- nldcsc_elastic_rules/rules/integrations/okta/impact_okta_attempt_to_delete_okta_application.toml +97 -0
- nldcsc_elastic_rules/rules/integrations/okta/impact_okta_attempt_to_modify_okta_application.toml +93 -0
- nldcsc_elastic_rules/rules/integrations/okta/impact_possible_okta_dos_attack.toml +96 -0
- nldcsc_elastic_rules/rules/integrations/okta/initial_access_first_occurrence_user_session_started_via_proxy.toml +89 -0
- nldcsc_elastic_rules/rules/integrations/okta/initial_access_new_authentication_behavior_detection.toml +80 -0
- nldcsc_elastic_rules/rules/integrations/okta/initial_access_okta_fastpass_phishing.toml +95 -0
- nldcsc_elastic_rules/rules/integrations/okta/initial_access_okta_user_attempted_unauthorized_access.toml +110 -0
- nldcsc_elastic_rules/rules/integrations/okta/initial_access_okta_user_sessions_started_from_different_geolocations.toml +121 -0
- nldcsc_elastic_rules/rules/integrations/okta/initial_access_sign_in_events_via_third_party_idp.toml +104 -0
- nldcsc_elastic_rules/rules/integrations/okta/initial_access_successful_application_sso_from_unknown_client_device.toml +99 -0
- nldcsc_elastic_rules/rules/integrations/okta/initial_access_suspicious_activity_reported_by_okta_user.toml +129 -0
- nldcsc_elastic_rules/rules/integrations/okta/lateral_movement_multiple_sessions_for_single_user.toml +113 -0
- nldcsc_elastic_rules/rules/integrations/okta/okta_threatinsight_threat_suspected_promotion.toml +67 -0
- nldcsc_elastic_rules/rules/integrations/okta/persistence_administrator_privileges_assigned_to_okta_group.toml +99 -0
- nldcsc_elastic_rules/rules/integrations/okta/persistence_administrator_role_assigned_to_okta_user.toml +100 -0
- nldcsc_elastic_rules/rules/integrations/okta/persistence_attempt_to_create_okta_api_token.toml +98 -0
- nldcsc_elastic_rules/rules/integrations/okta/persistence_attempt_to_reset_mfa_factors_for_okta_user_account.toml +99 -0
- nldcsc_elastic_rules/rules/integrations/okta/persistence_mfa_deactivation_with_no_reactivation.toml +103 -0
- nldcsc_elastic_rules/rules/integrations/okta/persistence_new_idp_successfully_added_by_admin.toml +94 -0
- nldcsc_elastic_rules/rules/integrations/okta/persistence_okta_attempt_to_modify_or_delete_application_sign_on_policy.toml +99 -0
- nldcsc_elastic_rules/rules/integrations/okta/persistence_stolen_credentials_used_to_login_to_okta_account_after_mfa_reset.toml +105 -0
- nldcsc_elastic_rules/rules/integrations/pad/privileged_access_ml_linux_high_count_privileged_process_events_by_user.toml +102 -0
- nldcsc_elastic_rules/rules/integrations/pad/privileged_access_ml_linux_high_median_process_command_line_entropy_by_user.toml +103 -0
- nldcsc_elastic_rules/rules/integrations/pad/privileged_access_ml_linux_rare_process_executed_by_user.toml +101 -0
- nldcsc_elastic_rules/rules/integrations/pad/privileged_access_ml_okta_high_sum_concurrent_sessions_by_user.toml +107 -0
- nldcsc_elastic_rules/rules/integrations/pad/privileged_access_ml_okta_rare_host_name_by_user.toml +102 -0
- nldcsc_elastic_rules/rules/integrations/pad/privileged_access_ml_okta_rare_region_name_by_user.toml +102 -0
- nldcsc_elastic_rules/rules/integrations/pad/privileged_access_ml_okta_rare_source_ip_by_user.toml +101 -0
- nldcsc_elastic_rules/rules/integrations/pad/privileged_access_ml_okta_spike_in_group_application_assignment_changes.toml +111 -0
- nldcsc_elastic_rules/rules/integrations/pad/privileged_access_ml_okta_spike_in_group_lifecycle_changes.toml +106 -0
- nldcsc_elastic_rules/rules/integrations/pad/privileged_access_ml_okta_spike_in_group_membership_changes.toml +106 -0
- nldcsc_elastic_rules/rules/integrations/pad/privileged_access_ml_okta_spike_in_group_privilege_changes.toml +111 -0
- nldcsc_elastic_rules/rules/integrations/pad/privileged_access_ml_okta_spike_in_user_lifecycle_management_changes.toml +105 -0
- nldcsc_elastic_rules/rules/integrations/pad/privileged_access_ml_windows_high_count_group_management_events.toml +108 -0
- nldcsc_elastic_rules/rules/integrations/pad/privileged_access_ml_windows_high_count_special_logon_events.toml +105 -0
- nldcsc_elastic_rules/rules/integrations/pad/privileged_access_ml_windows_high_count_special_privilege_use_events.toml +107 -0
- nldcsc_elastic_rules/rules/integrations/pad/privileged_access_ml_windows_high_count_user_account_management_events.toml +107 -0
- nldcsc_elastic_rules/rules/integrations/pad/privileged_access_ml_windows_rare_device_by_user.toml +102 -0
- nldcsc_elastic_rules/rules/integrations/pad/privileged_access_ml_windows_rare_group_name_by_user.toml +121 -0
- nldcsc_elastic_rules/rules/integrations/pad/privileged_access_ml_windows_rare_privilege_assigned_to_user.toml +107 -0
- nldcsc_elastic_rules/rules/integrations/pad/privileged_access_ml_windows_rare_region_name_by_user.toml +102 -0
- nldcsc_elastic_rules/rules/integrations/pad/privileged_access_ml_windows_rare_source_ip_by_user.toml +101 -0
- nldcsc_elastic_rules/rules/integrations/problemchild/defense_evasion_ml_rare_process_for_a_host.toml +105 -0
- nldcsc_elastic_rules/rules/integrations/problemchild/defense_evasion_ml_rare_process_for_a_parent_process.toml +107 -0
- nldcsc_elastic_rules/rules/integrations/problemchild/defense_evasion_ml_rare_process_for_a_user.toml +107 -0
- nldcsc_elastic_rules/rules/integrations/problemchild/defense_evasion_ml_suspicious_windows_event_high_probability.toml +118 -0
- nldcsc_elastic_rules/rules/integrations/problemchild/defense_evasion_ml_suspicious_windows_event_low_probability.toml +118 -0
- nldcsc_elastic_rules/rules/integrations/problemchild/defense_evasion_ml_suspicious_windows_process_cluster_from_host.toml +106 -0
- nldcsc_elastic_rules/rules/integrations/problemchild/defense_evasion_ml_suspicious_windows_process_cluster_from_parent_process.toml +108 -0
- nldcsc_elastic_rules/rules/integrations/problemchild/defense_evasion_ml_suspicious_windows_process_cluster_from_user.toml +108 -0
- nldcsc_elastic_rules/rules/linux/collection_linux_clipboard_activity.toml +95 -0
- nldcsc_elastic_rules/rules/linux/command_and_control_aws_cli_endpoint_url_used.toml +92 -0
- nldcsc_elastic_rules/rules/linux/command_and_control_cat_network_activity.toml +179 -0
- nldcsc_elastic_rules/rules/linux/command_and_control_cupsd_foomatic_rip_netcon.toml +154 -0
- nldcsc_elastic_rules/rules/linux/command_and_control_curl_socks_proxy_detected.toml +130 -0
- nldcsc_elastic_rules/rules/linux/command_and_control_curl_wget_spawn_via_nodejs_parent.toml +116 -0
- nldcsc_elastic_rules/rules/linux/command_and_control_frequent_egress_netcon_from_sus_executable.toml +162 -0
- nldcsc_elastic_rules/rules/linux/command_and_control_git_repo_or_file_download_to_sus_dir.toml +124 -0
- nldcsc_elastic_rules/rules/linux/command_and_control_ip_forwarding_activity.toml +99 -0
- nldcsc_elastic_rules/rules/linux/command_and_control_kubectl_networking_modification.toml +134 -0
- nldcsc_elastic_rules/rules/linux/command_and_control_linux_chisel_client_activity.toml +174 -0
- nldcsc_elastic_rules/rules/linux/command_and_control_linux_chisel_server_activity.toml +175 -0
- nldcsc_elastic_rules/rules/linux/command_and_control_linux_kworker_netcon.toml +155 -0
- nldcsc_elastic_rules/rules/linux/command_and_control_linux_proxychains_activity.toml +153 -0
- nldcsc_elastic_rules/rules/linux/command_and_control_linux_ssh_x11_forwarding.toml +147 -0
- nldcsc_elastic_rules/rules/linux/command_and_control_linux_suspicious_proxychains_activity.toml +183 -0
- nldcsc_elastic_rules/rules/linux/command_and_control_linux_tunneling_and_port_forwarding.toml +193 -0
- nldcsc_elastic_rules/rules/linux/command_and_control_linux_tunneling_via_ssh_option.toml +124 -0
- nldcsc_elastic_rules/rules/linux/command_and_control_suspicious_network_activity_from_unknown_executable.toml +228 -0
- nldcsc_elastic_rules/rules/linux/command_and_control_telegram_api_request.toml +125 -0
- nldcsc_elastic_rules/rules/linux/command_and_control_tunneling_via_earthworm.toml +189 -0
- nldcsc_elastic_rules/rules/linux/credential_access_aws_creds_search_inside_container.toml +118 -0
- nldcsc_elastic_rules/rules/linux/credential_access_collection_sensitive_files.toml +188 -0
- nldcsc_elastic_rules/rules/linux/credential_access_collection_sensitive_files_compression_inside_container.toml +135 -0
- nldcsc_elastic_rules/rules/linux/credential_access_credential_dumping.toml +126 -0
- nldcsc_elastic_rules/rules/linux/credential_access_gdb_init_process_hooking.toml +124 -0
- nldcsc_elastic_rules/rules/linux/credential_access_gdb_process_hooking.toml +105 -0
- nldcsc_elastic_rules/rules/linux/credential_access_gh_auth_via_nodejs.toml +97 -0
- nldcsc_elastic_rules/rules/linux/credential_access_kubernetes_service_account_secret_access.toml +144 -0
- nldcsc_elastic_rules/rules/linux/credential_access_manual_memory_dumping.toml +128 -0
- nldcsc_elastic_rules/rules/linux/credential_access_potential_linux_local_account_bruteforce.toml +118 -0
- nldcsc_elastic_rules/rules/linux/credential_access_potential_linux_ssh_bruteforce_external.toml +117 -0
- nldcsc_elastic_rules/rules/linux/credential_access_potential_linux_ssh_bruteforce_internal.toml +113 -0
- nldcsc_elastic_rules/rules/linux/credential_access_potential_successful_linux_ftp_bruteforce.toml +136 -0
- nldcsc_elastic_rules/rules/linux/credential_access_potential_successful_linux_rdp_bruteforce.toml +135 -0
- nldcsc_elastic_rules/rules/linux/credential_access_potential_successful_linux_ssh_bruteforce.toml +117 -0
- nldcsc_elastic_rules/rules/linux/credential_access_proc_credential_dumping.toml +132 -0
- nldcsc_elastic_rules/rules/linux/credential_access_sensitive_keys_or_passwords_search_inside_container.toml +119 -0
- nldcsc_elastic_rules/rules/linux/credential_access_ssh_backdoor_log.toml +174 -0
- nldcsc_elastic_rules/rules/linux/credential_access_ssh_password_grabbing_via_strace.toml +100 -0
- nldcsc_elastic_rules/rules/linux/credential_access_unusual_instance_metadata_service_api_request.toml +212 -0
- nldcsc_elastic_rules/rules/linux/defense_evasion_acl_modification_via_setfacl.toml +105 -0
- nldcsc_elastic_rules/rules/linux/defense_evasion_attempt_to_disable_auditd_service.toml +127 -0
- nldcsc_elastic_rules/rules/linux/defense_evasion_attempt_to_disable_iptables_or_firewall.toml +133 -0
- nldcsc_elastic_rules/rules/linux/defense_evasion_attempt_to_disable_syslog_service.toml +140 -0
- nldcsc_elastic_rules/rules/linux/defense_evasion_authorized_keys_file_deletion.toml +119 -0
- nldcsc_elastic_rules/rules/linux/defense_evasion_base16_or_base32_encoding_or_decoding_activity.toml +143 -0
- nldcsc_elastic_rules/rules/linux/defense_evasion_base64_decoding_activity.toml +203 -0
- nldcsc_elastic_rules/rules/linux/defense_evasion_binary_copied_to_suspicious_directory.toml +156 -0
- nldcsc_elastic_rules/rules/linux/defense_evasion_busybox_indirect_shell_spawn.toml +139 -0
- nldcsc_elastic_rules/rules/linux/defense_evasion_chattr_immutable_file.toml +140 -0
- nldcsc_elastic_rules/rules/linux/defense_evasion_clear_kernel_ring_buffer.toml +134 -0
- nldcsc_elastic_rules/rules/linux/defense_evasion_creation_of_hidden_files_directories.toml +99 -0
- nldcsc_elastic_rules/rules/linux/defense_evasion_curl_or_wget_executed_via_lolbin.toml +189 -0
- nldcsc_elastic_rules/rules/linux/defense_evasion_directory_creation_in_bin.toml +133 -0
- nldcsc_elastic_rules/rules/linux/defense_evasion_disable_apparmor_attempt.toml +133 -0
- nldcsc_elastic_rules/rules/linux/defense_evasion_disable_selinux_attempt.toml +139 -0
- nldcsc_elastic_rules/rules/linux/defense_evasion_doas_configuration_creation_or_rename.toml +117 -0
- nldcsc_elastic_rules/rules/linux/defense_evasion_dynamic_linker_file_creation.toml +162 -0
- nldcsc_elastic_rules/rules/linux/defense_evasion_esxi_suspicious_timestomp_touch.toml +133 -0
- nldcsc_elastic_rules/rules/linux/defense_evasion_file_deletion_via_shred.toml +124 -0
- nldcsc_elastic_rules/rules/linux/defense_evasion_file_mod_writable_dir.toml +138 -0
- nldcsc_elastic_rules/rules/linux/defense_evasion_hex_payload_execution_via_commandline.toml +143 -0
- nldcsc_elastic_rules/rules/linux/defense_evasion_hex_payload_execution_via_utility.toml +159 -0
- nldcsc_elastic_rules/rules/linux/defense_evasion_hidden_directory_creation.toml +141 -0
- nldcsc_elastic_rules/rules/linux/defense_evasion_hidden_file_dir_tmp.toml +148 -0
- nldcsc_elastic_rules/rules/linux/defense_evasion_hidden_shared_object.toml +133 -0
- nldcsc_elastic_rules/rules/linux/defense_evasion_interactive_shell_from_system_user.toml +135 -0
- nldcsc_elastic_rules/rules/linux/defense_evasion_interpreter_launched_from_decoded_payload.toml +156 -0
- nldcsc_elastic_rules/rules/linux/defense_evasion_journalctl_clear_logs.toml +132 -0
- nldcsc_elastic_rules/rules/linux/defense_evasion_kernel_module_removal.toml +153 -0
- nldcsc_elastic_rules/rules/linux/defense_evasion_kill_command_executed.toml +151 -0
- nldcsc_elastic_rules/rules/linux/defense_evasion_kthreadd_masquerading.toml +130 -0
- nldcsc_elastic_rules/rules/linux/defense_evasion_ld_preload_cmdline.toml +164 -0
- nldcsc_elastic_rules/rules/linux/defense_evasion_ld_so_creation.toml +161 -0
- nldcsc_elastic_rules/rules/linux/defense_evasion_log_files_deleted.toml +151 -0
- nldcsc_elastic_rules/rules/linux/defense_evasion_mount_execution.toml +127 -0
- nldcsc_elastic_rules/rules/linux/defense_evasion_multi_base64_decoding_attempt.toml +163 -0
- nldcsc_elastic_rules/rules/linux/defense_evasion_potential_kubectl_impersonation.toml +158 -0
- nldcsc_elastic_rules/rules/linux/defense_evasion_potential_kubectl_masquerading.toml +155 -0
- nldcsc_elastic_rules/rules/linux/defense_evasion_potential_proot_exploits.toml +124 -0
- nldcsc_elastic_rules/rules/linux/defense_evasion_prctl_process_name_tampering.toml +121 -0
- nldcsc_elastic_rules/rules/linux/defense_evasion_rename_esxi_files.toml +120 -0
- nldcsc_elastic_rules/rules/linux/defense_evasion_rename_esxi_index_file.toml +119 -0
- nldcsc_elastic_rules/rules/linux/defense_evasion_root_certificate_installation.toml +130 -0
- nldcsc_elastic_rules/rules/linux/defense_evasion_selinux_configuration_creation_or_renaming.toml +120 -0
- nldcsc_elastic_rules/rules/linux/defense_evasion_ssl_certificate_deletion.toml +134 -0
- nldcsc_elastic_rules/rules/linux/defense_evasion_sus_utility_executed_via_tmux_or_screen.toml +97 -0
- nldcsc_elastic_rules/rules/linux/defense_evasion_suspicious_path_mounted.toml +113 -0
- nldcsc_elastic_rules/rules/linux/defense_evasion_symlink_binary_to_writable_dir.toml +115 -0
- nldcsc_elastic_rules/rules/linux/defense_evasion_sysctl_kernel_feature_activity.toml +129 -0
- nldcsc_elastic_rules/rules/linux/defense_evasion_unsual_kill_signal.toml +108 -0
- nldcsc_elastic_rules/rules/linux/defense_evasion_unusual_preload_env_vars.toml +152 -0
- nldcsc_elastic_rules/rules/linux/defense_evasion_var_log_file_creation_by_unsual_process.toml +153 -0
- nldcsc_elastic_rules/rules/linux/discovery_docker_socket_discovery.toml +128 -0
- nldcsc_elastic_rules/rules/linux/discovery_dynamic_linker_via_od.toml +126 -0
- nldcsc_elastic_rules/rules/linux/discovery_esxi_software_via_find.toml +125 -0
- nldcsc_elastic_rules/rules/linux/discovery_esxi_software_via_grep.toml +125 -0
- nldcsc_elastic_rules/rules/linux/discovery_kernel_module_enumeration.toml +134 -0
- nldcsc_elastic_rules/rules/linux/discovery_kernel_seeking.toml +127 -0
- nldcsc_elastic_rules/rules/linux/discovery_kernel_unpacking.toml +126 -0
- nldcsc_elastic_rules/rules/linux/discovery_kubeconfig_file_discovery.toml +141 -0
- nldcsc_elastic_rules/rules/linux/discovery_kubectl_permission_discovery.toml +117 -0
- nldcsc_elastic_rules/rules/linux/discovery_linux_hping_activity.toml +141 -0
- nldcsc_elastic_rules/rules/linux/discovery_linux_nping_activity.toml +141 -0
- nldcsc_elastic_rules/rules/linux/discovery_manual_mount_discovery_via_exports_or_fstab.toml +117 -0
- nldcsc_elastic_rules/rules/linux/discovery_pam_version_discovery.toml +152 -0
- nldcsc_elastic_rules/rules/linux/discovery_ping_sweep_detected.toml +122 -0
- nldcsc_elastic_rules/rules/linux/discovery_polkit_version_discovery.toml +117 -0
- nldcsc_elastic_rules/rules/linux/discovery_port_scanning_activity_from_compromised_host.toml +156 -0
- nldcsc_elastic_rules/rules/linux/discovery_private_key_password_searching_activity.toml +114 -0
- nldcsc_elastic_rules/rules/linux/discovery_proc_maps_read.toml +116 -0
- nldcsc_elastic_rules/rules/linux/discovery_process_capabilities.toml +114 -0
- nldcsc_elastic_rules/rules/linux/discovery_pspy_process_monitoring_detected.toml +116 -0
- nldcsc_elastic_rules/rules/linux/discovery_security_file_access_via_common_utility.toml +122 -0
- nldcsc_elastic_rules/rules/linux/discovery_subnet_scanning_activity_from_compromised_host.toml +137 -0
- nldcsc_elastic_rules/rules/linux/discovery_sudo_allowed_command_enumeration.toml +119 -0
- nldcsc_elastic_rules/rules/linux/discovery_suid_sguid_enumeration.toml +142 -0
- nldcsc_elastic_rules/rules/linux/discovery_suspicious_memory_grep_activity.toml +96 -0
- nldcsc_elastic_rules/rules/linux/discovery_suspicious_network_tool_launched_inside_container.toml +147 -0
- nldcsc_elastic_rules/rules/linux/discovery_suspicious_which_command_execution.toml +97 -0
- nldcsc_elastic_rules/rules/linux/discovery_unusual_user_enumeration_via_id.toml +114 -0
- nldcsc_elastic_rules/rules/linux/discovery_virtual_machine_fingerprinting.toml +136 -0
- nldcsc_elastic_rules/rules/linux/discovery_yum_dnf_plugin_detection.toml +122 -0
- nldcsc_elastic_rules/rules/linux/execution_abnormal_process_id_file_created.toml +160 -0
- nldcsc_elastic_rules/rules/linux/execution_container_management_binary_launched_inside_container.toml +118 -0
- nldcsc_elastic_rules/rules/linux/execution_cupsd_foomatic_rip_file_creation.toml +134 -0
- nldcsc_elastic_rules/rules/linux/execution_cupsd_foomatic_rip_lp_user_execution.toml +138 -0
- nldcsc_elastic_rules/rules/linux/execution_cupsd_foomatic_rip_shell_execution.toml +145 -0
- nldcsc_elastic_rules/rules/linux/execution_cupsd_foomatic_rip_suspicious_child_execution.toml +161 -0
- nldcsc_elastic_rules/rules/linux/execution_curl_cve_2023_38545_heap_overflow.toml +135 -0
- nldcsc_elastic_rules/rules/linux/execution_egress_connection_from_entrypoint_in_container.toml +112 -0
- nldcsc_elastic_rules/rules/linux/execution_executable_stack_execution.toml +107 -0
- nldcsc_elastic_rules/rules/linux/execution_file_execution_followed_by_deletion.toml +125 -0
- nldcsc_elastic_rules/rules/linux/execution_file_made_executable_via_chmod_inside_container.toml +128 -0
- nldcsc_elastic_rules/rules/linux/execution_file_transfer_or_listener_established_via_netcat.toml +163 -0
- nldcsc_elastic_rules/rules/linux/execution_interpreter_tty_upgrade.toml +127 -0
- nldcsc_elastic_rules/rules/linux/execution_kubectl_apply_pod_from_url.toml +123 -0
- nldcsc_elastic_rules/rules/linux/execution_kubernetes_direct_api_request_via_curl_or_wget.toml +148 -0
- nldcsc_elastic_rules/rules/linux/execution_nc_listener_via_rlwrap.toml +133 -0
- nldcsc_elastic_rules/rules/linux/execution_netcon_from_rwx_mem_region_binary.toml +130 -0
- nldcsc_elastic_rules/rules/linux/execution_network_event_post_compilation.toml +132 -0
- nldcsc_elastic_rules/rules/linux/execution_perl_tty_shell.toml +123 -0
- nldcsc_elastic_rules/rules/linux/execution_potential_hack_tool_executed.toml +135 -0
- nldcsc_elastic_rules/rules/linux/execution_potentially_overly_permissive_container_creation.toml +144 -0
- nldcsc_elastic_rules/rules/linux/execution_process_backgrounded_by_unusual_parent.toml +152 -0
- nldcsc_elastic_rules/rules/linux/execution_process_started_from_process_id_file.toml +101 -0
- nldcsc_elastic_rules/rules/linux/execution_process_started_in_shared_memory_directory.toml +128 -0
- nldcsc_elastic_rules/rules/linux/execution_python_tty_shell.toml +121 -0
- nldcsc_elastic_rules/rules/linux/execution_python_webserver_spawned.toml +142 -0
- nldcsc_elastic_rules/rules/linux/execution_remote_code_execution_via_postgresql.toml +126 -0
- nldcsc_elastic_rules/rules/linux/execution_shell_evasion_linux_binary.toml +213 -0
- nldcsc_elastic_rules/rules/linux/execution_shell_openssl_client_or_server.toml +136 -0
- nldcsc_elastic_rules/rules/linux/execution_shell_via_background_process.toml +137 -0
- nldcsc_elastic_rules/rules/linux/execution_shell_via_child_tcp_utility_linux.toml +139 -0
- nldcsc_elastic_rules/rules/linux/execution_shell_via_java_revshell_linux.toml +143 -0
- nldcsc_elastic_rules/rules/linux/execution_shell_via_lolbin_interpreter_linux.toml +154 -0
- nldcsc_elastic_rules/rules/linux/execution_shell_via_meterpreter_linux.toml +148 -0
- nldcsc_elastic_rules/rules/linux/execution_shell_via_suspicious_binary.toml +147 -0
- nldcsc_elastic_rules/rules/linux/execution_shell_via_tcp_cli_utility_linux.toml +137 -0
- nldcsc_elastic_rules/rules/linux/execution_shell_via_udp_cli_utility_linux.toml +157 -0
- nldcsc_elastic_rules/rules/linux/execution_sus_extraction_or_decrompression_via_funzip.toml +139 -0
- nldcsc_elastic_rules/rules/linux/execution_suspicious_executable_running_system_commands.toml +139 -0
- nldcsc_elastic_rules/rules/linux/execution_suspicious_mining_process_creation_events.toml +117 -0
- nldcsc_elastic_rules/rules/linux/execution_suspicious_mkfifo_execution.toml +138 -0
- nldcsc_elastic_rules/rules/linux/execution_system_binary_file_permission_change.toml +118 -0
- nldcsc_elastic_rules/rules/linux/execution_tc_bpf_filter.toml +124 -0
- nldcsc_elastic_rules/rules/linux/execution_unix_socket_communication.toml +109 -0
- nldcsc_elastic_rules/rules/linux/execution_unknown_rwx_mem_region_binary_executed.toml +126 -0
- nldcsc_elastic_rules/rules/linux/execution_unusual_interactive_process_inside_container.toml +87 -0
- nldcsc_elastic_rules/rules/linux/execution_unusual_kthreadd_execution.toml +141 -0
- nldcsc_elastic_rules/rules/linux/execution_unusual_path_invocation_from_command_line.toml +145 -0
- nldcsc_elastic_rules/rules/linux/execution_unusual_pkexec_execution.toml +152 -0
- nldcsc_elastic_rules/rules/linux/exfiltration_potential_curl_data_exfiltration.toml +126 -0
- nldcsc_elastic_rules/rules/linux/exfiltration_potential_data_splitting_for_exfiltration.toml +131 -0
- nldcsc_elastic_rules/rules/linux/exfiltration_unusual_file_transfer_utility_launched.toml +130 -0
- nldcsc_elastic_rules/rules/linux/impact_data_encrypted_via_openssl.toml +118 -0
- nldcsc_elastic_rules/rules/linux/impact_esxi_process_kill.toml +116 -0
- nldcsc_elastic_rules/rules/linux/impact_memory_swap_modification.toml +144 -0
- nldcsc_elastic_rules/rules/linux/impact_potential_bruteforce_malware_infection.toml +178 -0
- nldcsc_elastic_rules/rules/linux/impact_potential_linux_ransomware_note_detected.toml +123 -0
- nldcsc_elastic_rules/rules/linux/impact_process_kill_threshold.toml +111 -0
- nldcsc_elastic_rules/rules/linux/initial_access_apache_struts_cve_2023_50164_exploitation_to_webshell.toml +144 -0
- nldcsc_elastic_rules/rules/linux/initial_access_first_time_public_key_authentication.toml +118 -0
- nldcsc_elastic_rules/rules/linux/initial_access_successful_ssh_authentication_by_unusual_ip.toml +111 -0
- nldcsc_elastic_rules/rules/linux/initial_access_successful_ssh_authentication_by_unusual_user.toml +95 -0
- nldcsc_elastic_rules/rules/linux/lateral_movement_kubeconfig_file_activity.toml +155 -0
- nldcsc_elastic_rules/rules/linux/lateral_movement_remote_file_creation_world_writeable_dir.toml +141 -0
- nldcsc_elastic_rules/rules/linux/lateral_movement_ssh_it_worm_download.toml +141 -0
- nldcsc_elastic_rules/rules/linux/lateral_movement_ssh_process_launched_inside_container.toml +138 -0
- nldcsc_elastic_rules/rules/linux/lateral_movement_telnet_network_activity_external.toml +138 -0
- nldcsc_elastic_rules/rules/linux/lateral_movement_telnet_network_activity_internal.toml +139 -0
- nldcsc_elastic_rules/rules/linux/lateral_movement_unusual_remote_file_creation.toml +148 -0
- nldcsc_elastic_rules/rules/linux/persistence_apt_package_manager_execution.toml +166 -0
- nldcsc_elastic_rules/rules/linux/persistence_apt_package_manager_file_creation.toml +163 -0
- nldcsc_elastic_rules/rules/linux/persistence_apt_package_manager_netcon.toml +159 -0
- nldcsc_elastic_rules/rules/linux/persistence_at_job_creation.toml +171 -0
- nldcsc_elastic_rules/rules/linux/persistence_boot_file_copy.toml +156 -0
- nldcsc_elastic_rules/rules/linux/persistence_bpf_probe_write_user.toml +121 -0
- nldcsc_elastic_rules/rules/linux/persistence_chkconfig_service_add.toml +203 -0
- nldcsc_elastic_rules/rules/linux/persistence_credential_access_modify_ssh_binaries.toml +229 -0
- nldcsc_elastic_rules/rules/linux/persistence_cron_job_creation.toml +269 -0
- nldcsc_elastic_rules/rules/linux/persistence_dbus_service_creation.toml +158 -0
- nldcsc_elastic_rules/rules/linux/persistence_dbus_unsual_daemon_parent_execution.toml +149 -0
- nldcsc_elastic_rules/rules/linux/persistence_dnf_package_manager_plugin_file_creation.toml +164 -0
- nldcsc_elastic_rules/rules/linux/persistence_dpkg_package_installation_from_unusual_parent.toml +152 -0
- nldcsc_elastic_rules/rules/linux/persistence_dpkg_unusual_execution.toml +147 -0
- nldcsc_elastic_rules/rules/linux/persistence_dracut_module_creation.toml +166 -0
- nldcsc_elastic_rules/rules/linux/persistence_dynamic_linker_backup.toml +197 -0
- nldcsc_elastic_rules/rules/linux/persistence_extract_initramfs_via_cpio.toml +137 -0
- nldcsc_elastic_rules/rules/linux/persistence_git_hook_execution.toml +152 -0
- nldcsc_elastic_rules/rules/linux/persistence_git_hook_file_creation.toml +164 -0
- nldcsc_elastic_rules/rules/linux/persistence_git_hook_netcon.toml +159 -0
- nldcsc_elastic_rules/rules/linux/persistence_git_hook_process_execution.toml +170 -0
- nldcsc_elastic_rules/rules/linux/persistence_grub_configuration_creation.toml +145 -0
- nldcsc_elastic_rules/rules/linux/persistence_grub_makeconfig.toml +130 -0
- nldcsc_elastic_rules/rules/linux/persistence_init_d_file_creation.toml +194 -0
- nldcsc_elastic_rules/rules/linux/persistence_insmod_kernel_module_load.toml +196 -0
- nldcsc_elastic_rules/rules/linux/persistence_kde_autostart_modification.toml +246 -0
- nldcsc_elastic_rules/rules/linux/persistence_kernel_driver_load.toml +126 -0
- nldcsc_elastic_rules/rules/linux/persistence_kernel_driver_load_by_non_root.toml +132 -0
- nldcsc_elastic_rules/rules/linux/persistence_kernel_object_file_creation.toml +136 -0
- nldcsc_elastic_rules/rules/linux/persistence_kubernetes_sensitive_file_activity.toml +131 -0
- nldcsc_elastic_rules/rules/linux/persistence_kworker_file_creation.toml +208 -0
- nldcsc_elastic_rules/rules/linux/persistence_linux_backdoor_user_creation.toml +165 -0
- nldcsc_elastic_rules/rules/linux/persistence_linux_group_creation.toml +137 -0
- nldcsc_elastic_rules/rules/linux/persistence_linux_shell_activity_via_web_server.toml +199 -0
- nldcsc_elastic_rules/rules/linux/persistence_linux_user_account_creation.toml +136 -0
- nldcsc_elastic_rules/rules/linux/persistence_linux_user_added_to_privileged_group.toml +163 -0
- nldcsc_elastic_rules/rules/linux/persistence_lkm_configuration_file_creation.toml +132 -0
- nldcsc_elastic_rules/rules/linux/persistence_manual_dracut_execution.toml +146 -0
- nldcsc_elastic_rules/rules/linux/persistence_message_of_the_day_creation.toml +188 -0
- nldcsc_elastic_rules/rules/linux/persistence_message_of_the_day_execution.toml +215 -0
- nldcsc_elastic_rules/rules/linux/persistence_network_manager_dispatcher_persistence.toml +163 -0
- nldcsc_elastic_rules/rules/linux/persistence_nodejs_pre_or_post_install_script_execution.toml +109 -0
- nldcsc_elastic_rules/rules/linux/persistence_openssl_passwd_hash_generation.toml +129 -0
- nldcsc_elastic_rules/rules/linux/persistence_pluggable_authentication_module_creation.toml +135 -0
- nldcsc_elastic_rules/rules/linux/persistence_pluggable_authentication_module_creation_in_unusual_dir.toml +122 -0
- nldcsc_elastic_rules/rules/linux/persistence_pluggable_authentication_module_pam_exec_backdoor_exec.toml +115 -0
- nldcsc_elastic_rules/rules/linux/persistence_pluggable_authentication_module_source_download.toml +108 -0
- nldcsc_elastic_rules/rules/linux/persistence_polkit_policy_creation.toml +132 -0
- nldcsc_elastic_rules/rules/linux/persistence_potential_persistence_script_executable_bit_set.toml +164 -0
- nldcsc_elastic_rules/rules/linux/persistence_process_capability_set_via_setcap.toml +120 -0
- nldcsc_elastic_rules/rules/linux/persistence_pth_file_creation.toml +165 -0
- nldcsc_elastic_rules/rules/linux/persistence_rc_local_error_via_syslog.toml +111 -0
- nldcsc_elastic_rules/rules/linux/persistence_rc_local_service_already_running.toml +124 -0
- nldcsc_elastic_rules/rules/linux/persistence_rc_script_creation.toml +189 -0
- nldcsc_elastic_rules/rules/linux/persistence_rpm_package_installation_from_unusual_parent.toml +146 -0
- nldcsc_elastic_rules/rules/linux/persistence_setuid_setgid_capability_set.toml +187 -0
- nldcsc_elastic_rules/rules/linux/persistence_shadow_file_modification.toml +126 -0
- nldcsc_elastic_rules/rules/linux/persistence_shared_object_creation.toml +205 -0
- nldcsc_elastic_rules/rules/linux/persistence_shell_configuration_modification.toml +154 -0
- nldcsc_elastic_rules/rules/linux/persistence_simple_web_server_connection_accepted.toml +152 -0
- nldcsc_elastic_rules/rules/linux/persistence_simple_web_server_creation.toml +160 -0
- nldcsc_elastic_rules/rules/linux/persistence_site_and_user_customize_file_creation.toml +160 -0
- nldcsc_elastic_rules/rules/linux/persistence_ssh_key_generation.toml +124 -0
- nldcsc_elastic_rules/rules/linux/persistence_ssh_netcon.toml +137 -0
- nldcsc_elastic_rules/rules/linux/persistence_ssh_via_backdoored_system_user.toml +135 -0
- nldcsc_elastic_rules/rules/linux/persistence_suspicious_file_opened_through_editor.toml +151 -0
- nldcsc_elastic_rules/rules/linux/persistence_suspicious_ssh_execution_xzbackdoor.toml +136 -0
- nldcsc_elastic_rules/rules/linux/persistence_systemd_generator_creation.toml +157 -0
- nldcsc_elastic_rules/rules/linux/persistence_systemd_netcon.toml +144 -0
- nldcsc_elastic_rules/rules/linux/persistence_systemd_scheduled_timer_created.toml +208 -0
- nldcsc_elastic_rules/rules/linux/persistence_systemd_service_creation.toml +261 -0
- nldcsc_elastic_rules/rules/linux/persistence_systemd_service_started.toml +241 -0
- nldcsc_elastic_rules/rules/linux/persistence_systemd_shell_execution.toml +132 -0
- nldcsc_elastic_rules/rules/linux/persistence_tainted_kernel_module_load.toml +124 -0
- nldcsc_elastic_rules/rules/linux/persistence_tainted_kernel_module_out_of_tree_load.toml +125 -0
- nldcsc_elastic_rules/rules/linux/persistence_udev_rule_creation.toml +142 -0
- nldcsc_elastic_rules/rules/linux/persistence_unpack_initramfs_via_unmkinitramfs.toml +152 -0
- nldcsc_elastic_rules/rules/linux/persistence_unusual_exim4_child_process.toml +103 -0
- nldcsc_elastic_rules/rules/linux/persistence_unusual_pam_grantor.toml +118 -0
- nldcsc_elastic_rules/rules/linux/persistence_unusual_sshd_child_process.toml +136 -0
- nldcsc_elastic_rules/rules/linux/persistence_user_credential_modification_via_echo.toml +109 -0
- nldcsc_elastic_rules/rules/linux/persistence_user_or_group_creation_or_modification.toml +129 -0
- nldcsc_elastic_rules/rules/linux/persistence_web_server_sus_child_spawned.toml +234 -0
- nldcsc_elastic_rules/rules/linux/persistence_web_server_sus_command_execution.toml +218 -0
- nldcsc_elastic_rules/rules/linux/persistence_web_server_sus_destination_port.toml +168 -0
- nldcsc_elastic_rules/rules/linux/persistence_xdg_autostart_netcon.toml +155 -0
- nldcsc_elastic_rules/rules/linux/persistence_yum_package_manager_plugin_file_creation.toml +159 -0
- nldcsc_elastic_rules/rules/linux/privilege_escalation_chown_chmod_unauthorized_file_read.toml +142 -0
- nldcsc_elastic_rules/rules/linux/privilege_escalation_container_util_misconfiguration.toml +128 -0
- nldcsc_elastic_rules/rules/linux/privilege_escalation_cve_2025_32463_nsswitch_file_creation.toml +124 -0
- nldcsc_elastic_rules/rules/linux/privilege_escalation_cve_2025_32463_sudo_chroot_execution.toml +124 -0
- nldcsc_elastic_rules/rules/linux/privilege_escalation_cve_2025_41244_vmtoolsd_lpe.toml +129 -0
- nldcsc_elastic_rules/rules/linux/privilege_escalation_dac_permissions.toml +132 -0
- nldcsc_elastic_rules/rules/linux/privilege_escalation_debugfs_launched_inside_container.toml +115 -0
- nldcsc_elastic_rules/rules/linux/privilege_escalation_docker_escape_via_nsenter.toml +86 -0
- nldcsc_elastic_rules/rules/linux/privilege_escalation_docker_mount_chroot_container_escape.toml +130 -0
- nldcsc_elastic_rules/rules/linux/privilege_escalation_docker_release_file_creation.toml +88 -0
- nldcsc_elastic_rules/rules/linux/privilege_escalation_enlightenment_window_manager.toml +115 -0
- nldcsc_elastic_rules/rules/linux/privilege_escalation_gdb_sys_ptrace_elevation.toml +127 -0
- nldcsc_elastic_rules/rules/linux/privilege_escalation_gdb_sys_ptrace_netcon.toml +158 -0
- nldcsc_elastic_rules/rules/linux/privilege_escalation_kworker_uid_elevation.toml +132 -0
- nldcsc_elastic_rules/rules/linux/privilege_escalation_ld_preload_shared_object_modif.toml +140 -0
- nldcsc_elastic_rules/rules/linux/privilege_escalation_linux_suspicious_symbolic_link.toml +146 -0
- nldcsc_elastic_rules/rules/linux/privilege_escalation_linux_uid_int_max_bug.toml +118 -0
- nldcsc_elastic_rules/rules/linux/privilege_escalation_load_and_unload_of_kernel_via_kexec.toml +167 -0
- nldcsc_elastic_rules/rules/linux/privilege_escalation_looney_tunables_cve_2023_4911.toml +127 -0
- nldcsc_elastic_rules/rules/linux/privilege_escalation_mount_launched_inside_container.toml +114 -0
- nldcsc_elastic_rules/rules/linux/privilege_escalation_netcon_via_sudo_binary.toml +132 -0
- nldcsc_elastic_rules/rules/linux/privilege_escalation_overlayfs_local_privesc.toml +118 -0
- nldcsc_elastic_rules/rules/linux/privilege_escalation_pkexec_envar_hijack.toml +130 -0
- nldcsc_elastic_rules/rules/linux/privilege_escalation_potential_bufferoverflow_attack.toml +112 -0
- nldcsc_elastic_rules/rules/linux/privilege_escalation_potential_suid_sgid_exploitation.toml +164 -0
- nldcsc_elastic_rules/rules/linux/privilege_escalation_potential_suid_sgid_proxy_execution.toml +163 -0
- nldcsc_elastic_rules/rules/linux/privilege_escalation_potential_wildcard_shell_spawn.toml +136 -0
- nldcsc_elastic_rules/rules/linux/privilege_escalation_sda_disk_mount_non_root.toml +119 -0
- nldcsc_elastic_rules/rules/linux/privilege_escalation_shadow_file_read.toml +140 -0
- nldcsc_elastic_rules/rules/linux/privilege_escalation_sudo_cve_2019_14287.toml +126 -0
- nldcsc_elastic_rules/rules/linux/privilege_escalation_sudo_hijacking.toml +149 -0
- nldcsc_elastic_rules/rules/linux/privilege_escalation_sudo_token_via_process_injection.toml +131 -0
- nldcsc_elastic_rules/rules/linux/privilege_escalation_suspicious_cap_setuid_python_execution.toml +126 -0
- nldcsc_elastic_rules/rules/linux/privilege_escalation_suspicious_chown_fowner_elevation.toml +122 -0
- nldcsc_elastic_rules/rules/linux/privilege_escalation_suspicious_passwd_file_write.toml +137 -0
- nldcsc_elastic_rules/rules/linux/privilege_escalation_suspicious_uid_guid_elevation.toml +142 -0
- nldcsc_elastic_rules/rules/linux/privilege_escalation_uid_change_post_compilation.toml +119 -0
- nldcsc_elastic_rules/rules/linux/privilege_escalation_uid_elevation_from_unknown_executable.toml +152 -0
- nldcsc_elastic_rules/rules/linux/privilege_escalation_unshare_namespace_manipulation.toml +129 -0
- nldcsc_elastic_rules/rules/linux/privilege_escalation_writable_docker_socket.toml +120 -0
- nldcsc_elastic_rules/rules/macos/command_and_control_unusual_connection_to_suspicious_top_level_domain.toml +104 -0
- nldcsc_elastic_rules/rules/macos/command_and_control_unusual_network_connection_to_suspicious_web_service.toml +197 -0
- nldcsc_elastic_rules/rules/macos/credential_access_credentials_keychains.toml +121 -0
- nldcsc_elastic_rules/rules/macos/credential_access_dumping_hashes_bi_cmds.toml +113 -0
- nldcsc_elastic_rules/rules/macos/credential_access_dumping_keychain_security.toml +116 -0
- nldcsc_elastic_rules/rules/macos/credential_access_high_volume_of_pbpaste.toml +121 -0
- nldcsc_elastic_rules/rules/macos/credential_access_kerberosdump_kcc.toml +124 -0
- nldcsc_elastic_rules/rules/macos/credential_access_keychain_pwd_retrieval_security_cmd.toml +135 -0
- nldcsc_elastic_rules/rules/macos/credential_access_mitm_localhost_webproxy.toml +116 -0
- nldcsc_elastic_rules/rules/macos/credential_access_potential_macos_ssh_bruteforce.toml +114 -0
- nldcsc_elastic_rules/rules/macos/credential_access_promt_for_pwd_via_osascript.toml +128 -0
- nldcsc_elastic_rules/rules/macos/credential_access_suspicious_web_browser_sensitive_file_access.toml +128 -0
- nldcsc_elastic_rules/rules/macos/credential_access_systemkey_dumping.toml +117 -0
- nldcsc_elastic_rules/rules/macos/defense_evasion_apple_softupdates_modification.toml +117 -0
- nldcsc_elastic_rules/rules/macos/defense_evasion_attempt_del_quarantine_attrib.toml +125 -0
- nldcsc_elastic_rules/rules/macos/defense_evasion_attempt_to_disable_gatekeeper.toml +115 -0
- nldcsc_elastic_rules/rules/macos/defense_evasion_install_root_certificate.toml +118 -0
- nldcsc_elastic_rules/rules/macos/defense_evasion_modify_environment_launchctl.toml +120 -0
- nldcsc_elastic_rules/rules/macos/defense_evasion_privacy_controls_tcc_database_modification.toml +122 -0
- nldcsc_elastic_rules/rules/macos/defense_evasion_privilege_escalation_privacy_pref_sshd_fulldiskaccess.toml +130 -0
- nldcsc_elastic_rules/rules/macos/defense_evasion_safari_config_change.toml +118 -0
- nldcsc_elastic_rules/rules/macos/defense_evasion_sandboxed_office_app_suspicious_zip_file.toml +114 -0
- nldcsc_elastic_rules/rules/macos/defense_evasion_tcc_bypass_mounted_apfs_access.toml +111 -0
- nldcsc_elastic_rules/rules/macos/defense_evasion_unload_endpointsecurity_kext.toml +128 -0
- nldcsc_elastic_rules/rules/macos/discovery_users_domain_built_in_commands.toml +133 -0
- nldcsc_elastic_rules/rules/macos/execution_defense_evasion_electron_app_childproc_node_js.toml +128 -0
- nldcsc_elastic_rules/rules/macos/execution_initial_access_suspicious_browser_childproc.toml +131 -0
- nldcsc_elastic_rules/rules/macos/execution_installer_package_spawned_network_event.toml +147 -0
- nldcsc_elastic_rules/rules/macos/execution_script_via_automator_workflows.toml +110 -0
- nldcsc_elastic_rules/rules/macos/execution_scripting_osascript_exec_followed_by_netcon.toml +138 -0
- nldcsc_elastic_rules/rules/macos/execution_shell_execution_via_apple_scripting.toml +114 -0
- nldcsc_elastic_rules/rules/macos/initial_access_suspicious_mac_ms_office_child_process.toml +182 -0
- nldcsc_elastic_rules/rules/macos/lateral_movement_credential_access_kerberos_bifrostconsole.toml +133 -0
- nldcsc_elastic_rules/rules/macos/lateral_movement_mounting_smb_share.toml +121 -0
- nldcsc_elastic_rules/rules/macos/lateral_movement_remote_ssh_login_enabled.toml +119 -0
- nldcsc_elastic_rules/rules/macos/lateral_movement_vpn_connection_attempt.toml +118 -0
- nldcsc_elastic_rules/rules/macos/persistence_account_creation_hide_at_logon.toml +116 -0
- nldcsc_elastic_rules/rules/macos/persistence_creation_change_launch_agents_file.toml +118 -0
- nldcsc_elastic_rules/rules/macos/persistence_creation_hidden_login_item_osascript.toml +139 -0
- nldcsc_elastic_rules/rules/macos/persistence_creation_modif_launch_deamon_sequence.toml +114 -0
- nldcsc_elastic_rules/rules/macos/persistence_credential_access_authorization_plugin_creation.toml +121 -0
- nldcsc_elastic_rules/rules/macos/persistence_crontab_creation.toml +118 -0
- nldcsc_elastic_rules/rules/macos/persistence_defense_evasion_hidden_launch_agent_deamon_logonitem_process.toml +138 -0
- nldcsc_elastic_rules/rules/macos/persistence_directory_services_plugins_modification.toml +111 -0
- nldcsc_elastic_rules/rules/macos/persistence_docker_shortcuts_plist_modification.toml +115 -0
- nldcsc_elastic_rules/rules/macos/persistence_emond_rules_file_creation.toml +117 -0
- nldcsc_elastic_rules/rules/macos/persistence_emond_rules_process_execution.toml +143 -0
- nldcsc_elastic_rules/rules/macos/persistence_enable_root_account.toml +115 -0
- nldcsc_elastic_rules/rules/macos/persistence_evasion_hidden_launch_agent_deamon_creation.toml +136 -0
- nldcsc_elastic_rules/rules/macos/persistence_finder_sync_plugin_pluginkit.toml +115 -0
- nldcsc_elastic_rules/rules/macos/persistence_folder_action_scripts_runtime.toml +126 -0
- nldcsc_elastic_rules/rules/macos/persistence_login_logout_hooks_defaults.toml +121 -0
- nldcsc_elastic_rules/rules/macos/persistence_loginwindow_plist_modification.toml +92 -0
- nldcsc_elastic_rules/rules/macos/persistence_modification_sublime_app_plugin_or_script.toml +123 -0
- nldcsc_elastic_rules/rules/macos/persistence_periodic_tasks_file_mdofiy.toml +119 -0
- nldcsc_elastic_rules/rules/macos/persistence_screensaver_engine_unexpected_child_process.toml +92 -0
- nldcsc_elastic_rules/rules/macos/persistence_screensaver_plist_file_modification.toml +114 -0
- nldcsc_elastic_rules/rules/macos/persistence_suspicious_calendar_modification.toml +117 -0
- nldcsc_elastic_rules/rules/macos/persistence_via_atom_init_file_modification.toml +115 -0
- nldcsc_elastic_rules/rules/macos/privilege_escalation_applescript_with_admin_privs.toml +124 -0
- nldcsc_elastic_rules/rules/macos/privilege_escalation_explicit_creds_via_scripting.toml +139 -0
- nldcsc_elastic_rules/rules/macos/privilege_escalation_exploit_adobe_acrobat_updater.toml +125 -0
- nldcsc_elastic_rules/rules/macos/privilege_escalation_local_user_added_to_admin.toml +119 -0
- nldcsc_elastic_rules/rules/macos/privilege_escalation_root_crontab_filemod.toml +119 -0
- nldcsc_elastic_rules/rules/macos/privilege_escalation_user_added_to_admin_group.toml +121 -0
- nldcsc_elastic_rules/rules/ml/command_and_control_ml_packetbeat_dns_tunneling.toml +129 -0
- nldcsc_elastic_rules/rules/ml/command_and_control_ml_packetbeat_rare_dns_question.toml +137 -0
- nldcsc_elastic_rules/rules/ml/command_and_control_ml_packetbeat_rare_urls.toml +141 -0
- nldcsc_elastic_rules/rules/ml/command_and_control_ml_packetbeat_rare_user_agent.toml +139 -0
- nldcsc_elastic_rules/rules/ml/credential_access_ml_auth_spike_in_failed_logon_events.toml +146 -0
- nldcsc_elastic_rules/rules/ml/credential_access_ml_auth_spike_in_logon_events.toml +148 -0
- nldcsc_elastic_rules/rules/ml/credential_access_ml_auth_spike_in_logon_events_from_a_source_ip.toml +162 -0
- nldcsc_elastic_rules/rules/ml/credential_access_ml_linux_anomalous_metadata_process.toml +140 -0
- nldcsc_elastic_rules/rules/ml/credential_access_ml_linux_anomalous_metadata_user.toml +141 -0
- nldcsc_elastic_rules/rules/ml/credential_access_ml_suspicious_login_activity.toml +145 -0
- nldcsc_elastic_rules/rules/ml/credential_access_ml_windows_anomalous_metadata_process.toml +133 -0
- nldcsc_elastic_rules/rules/ml/credential_access_ml_windows_anomalous_metadata_user.toml +135 -0
- nldcsc_elastic_rules/rules/ml/discovery_ml_linux_system_information_discovery.toml +137 -0
- nldcsc_elastic_rules/rules/ml/discovery_ml_linux_system_network_configuration_discovery.toml +137 -0
- nldcsc_elastic_rules/rules/ml/discovery_ml_linux_system_network_connection_discovery.toml +137 -0
- nldcsc_elastic_rules/rules/ml/discovery_ml_linux_system_process_discovery.toml +137 -0
- nldcsc_elastic_rules/rules/ml/discovery_ml_linux_system_user_discovery.toml +136 -0
- nldcsc_elastic_rules/rules/ml/execution_ml_windows_anomalous_script.toml +138 -0
- nldcsc_elastic_rules/rules/ml/initial_access_ml_auth_rare_hour_for_a_user_to_logon.toml +133 -0
- nldcsc_elastic_rules/rules/ml/initial_access_ml_auth_rare_source_ip_for_a_user.toml +145 -0
- nldcsc_elastic_rules/rules/ml/initial_access_ml_auth_rare_user_logon.toml +150 -0
- nldcsc_elastic_rules/rules/ml/initial_access_ml_linux_anomalous_user_name.toml +114 -0
- nldcsc_elastic_rules/rules/ml/initial_access_ml_windows_anomalous_user_name.toml +119 -0
- nldcsc_elastic_rules/rules/ml/initial_access_ml_windows_rare_user_type10_remote_login.toml +102 -0
- nldcsc_elastic_rules/rules/ml/ml_high_count_events_for_a_host_name.toml +93 -0
- nldcsc_elastic_rules/rules/ml/ml_high_count_network_denies.toml +113 -0
- nldcsc_elastic_rules/rules/ml/ml_high_count_network_events.toml +112 -0
- nldcsc_elastic_rules/rules/ml/ml_linux_anomalous_network_activity.toml +94 -0
- nldcsc_elastic_rules/rules/ml/ml_linux_anomalous_network_port_activity.toml +120 -0
- nldcsc_elastic_rules/rules/ml/ml_low_count_events_for_a_host_name.toml +93 -0
- nldcsc_elastic_rules/rules/ml/ml_packetbeat_rare_server_domain.toml +120 -0
- nldcsc_elastic_rules/rules/ml/ml_rare_destination_country.toml +117 -0
- nldcsc_elastic_rules/rules/ml/ml_spike_in_traffic_to_a_country.toml +117 -0
- nldcsc_elastic_rules/rules/ml/ml_windows_anomalous_network_activity.toml +91 -0
- nldcsc_elastic_rules/rules/ml/persistence_ml_linux_anomalous_process_all_hosts.toml +144 -0
- nldcsc_elastic_rules/rules/ml/persistence_ml_rare_process_by_host_linux.toml +144 -0
- nldcsc_elastic_rules/rules/ml/persistence_ml_rare_process_by_host_windows.toml +188 -0
- nldcsc_elastic_rules/rules/ml/persistence_ml_windows_anomalous_path_activity.toml +156 -0
- nldcsc_elastic_rules/rules/ml/persistence_ml_windows_anomalous_process_all_hosts.toml +201 -0
- nldcsc_elastic_rules/rules/ml/persistence_ml_windows_anomalous_process_creation.toml +186 -0
- nldcsc_elastic_rules/rules/ml/persistence_ml_windows_anomalous_service.toml +136 -0
- nldcsc_elastic_rules/rules/ml/privilege_escalation_ml_linux_anomalous_sudo_activity.toml +147 -0
- nldcsc_elastic_rules/rules/ml/privilege_escalation_ml_windows_rare_user_runas_event.toml +126 -0
- nldcsc_elastic_rules/rules/ml/resource_development_ml_linux_anomalous_compiler_activity.toml +141 -0
- nldcsc_elastic_rules/rules/network/command_and_control_accepted_default_telnet_port_connection.toml +121 -0
- nldcsc_elastic_rules/rules/network/command_and_control_cobalt_strike_beacon.toml +105 -0
- nldcsc_elastic_rules/rules/network/command_and_control_cobalt_strike_default_teamserver_cert.toml +105 -0
- nldcsc_elastic_rules/rules/network/command_and_control_download_rar_powershell_from_internet.toml +129 -0
- nldcsc_elastic_rules/rules/network/command_and_control_fin7_c2_behavior.toml +66 -0
- nldcsc_elastic_rules/rules/network/command_and_control_halfbaked_beacon.toml +103 -0
- nldcsc_elastic_rules/rules/network/command_and_control_nat_traversal_port_activity.toml +82 -0
- nldcsc_elastic_rules/rules/network/command_and_control_port_26_activity.toml +94 -0
- nldcsc_elastic_rules/rules/network/command_and_control_rdp_remote_desktop_protocol_from_the_internet.toml +144 -0
- nldcsc_elastic_rules/rules/network/command_and_control_vnc_virtual_network_computing_from_the_internet.toml +133 -0
- nldcsc_elastic_rules/rules/network/command_and_control_vnc_virtual_network_computing_to_the_internet.toml +122 -0
- nldcsc_elastic_rules/rules/network/discovery_potential_network_sweep_detected.toml +118 -0
- nldcsc_elastic_rules/rules/network/discovery_potential_port_scan_detected.toml +113 -0
- nldcsc_elastic_rules/rules/network/discovery_potential_syn_port_scan_detected.toml +112 -0
- nldcsc_elastic_rules/rules/network/initial_access_rpc_remote_procedure_call_from_the_internet.toml +113 -0
- nldcsc_elastic_rules/rules/network/initial_access_rpc_remote_procedure_call_to_the_internet.toml +113 -0
- nldcsc_elastic_rules/rules/network/initial_access_smb_windows_file_sharing_activity_to_the_internet.toml +126 -0
- nldcsc_elastic_rules/rules/network/initial_access_unsecure_elasticsearch_node.toml +92 -0
- nldcsc_elastic_rules/rules/network/lateral_movement_dns_server_overflow.toml +92 -0
- nldcsc_elastic_rules/rules/promotions/credential_access_endgame_cred_dumping_detected.toml +91 -0
- nldcsc_elastic_rules/rules/promotions/credential_access_endgame_cred_dumping_prevented.toml +90 -0
- nldcsc_elastic_rules/rules/promotions/crowdstrike_external_alerts.toml +112 -0
- nldcsc_elastic_rules/rules/promotions/elastic_security_external_alerts.toml +114 -0
- nldcsc_elastic_rules/rules/promotions/endgame_adversary_behavior_detected.toml +71 -0
- nldcsc_elastic_rules/rules/promotions/endgame_malware_detected.toml +71 -0
- nldcsc_elastic_rules/rules/promotions/endgame_malware_prevented.toml +72 -0
- nldcsc_elastic_rules/rules/promotions/endgame_ransomware_detected.toml +69 -0
- nldcsc_elastic_rules/rules/promotions/endgame_ransomware_prevented.toml +71 -0
- nldcsc_elastic_rules/rules/promotions/execution_endgame_exploit_detected.toml +97 -0
- nldcsc_elastic_rules/rules/promotions/execution_endgame_exploit_prevented.toml +99 -0
- nldcsc_elastic_rules/rules/promotions/external_alerts.toml +111 -0
- nldcsc_elastic_rules/rules/promotions/google_secops_external_alerts.toml +114 -0
- nldcsc_elastic_rules/rules/promotions/microsoft_sentinel_external_alerts.toml +113 -0
- nldcsc_elastic_rules/rules/promotions/privilege_escalation_endgame_cred_manipulation_detected.toml +85 -0
- nldcsc_elastic_rules/rules/promotions/privilege_escalation_endgame_cred_manipulation_prevented.toml +85 -0
- nldcsc_elastic_rules/rules/promotions/privilege_escalation_endgame_permission_theft_detected.toml +85 -0
- nldcsc_elastic_rules/rules/promotions/privilege_escalation_endgame_permission_theft_prevented.toml +85 -0
- nldcsc_elastic_rules/rules/promotions/privilege_escalation_endgame_process_injection_detected.toml +86 -0
- nldcsc_elastic_rules/rules/promotions/privilege_escalation_endgame_process_injection_prevented.toml +85 -0
- nldcsc_elastic_rules/rules/promotions/sentinelone_alert_external_alerts.toml +114 -0
- nldcsc_elastic_rules/rules/promotions/sentinelone_threat_external_alerts.toml +102 -0
- nldcsc_elastic_rules/rules/promotions/splunk_external_alerts.toml +114 -0
- nldcsc_elastic_rules/rules/threat_intel/threat_intel_indicator_match_address.toml +187 -0
- nldcsc_elastic_rules/rules/threat_intel/threat_intel_indicator_match_email.toml +167 -0
- nldcsc_elastic_rules/rules/threat_intel/threat_intel_indicator_match_hash.toml +235 -0
- nldcsc_elastic_rules/rules/threat_intel/threat_intel_indicator_match_registry.toml +174 -0
- nldcsc_elastic_rules/rules/threat_intel/threat_intel_indicator_match_url.toml +190 -0
- nldcsc_elastic_rules/rules/threat_intel/threat_intel_rapid7_threat_command.toml +108 -0
- nldcsc_elastic_rules/rules/windows/collection_email_outlook_mailbox_via_com.toml +122 -0
- nldcsc_elastic_rules/rules/windows/collection_email_powershell_exchange_mailbox.toml +142 -0
- nldcsc_elastic_rules/rules/windows/collection_mailbox_export_winlog.toml +124 -0
- nldcsc_elastic_rules/rules/windows/collection_posh_audio_capture.toml +135 -0
- nldcsc_elastic_rules/rules/windows/collection_posh_clipboard_capture.toml +164 -0
- nldcsc_elastic_rules/rules/windows/collection_posh_keylogger.toml +146 -0
- nldcsc_elastic_rules/rules/windows/collection_posh_mailbox.toml +155 -0
- nldcsc_elastic_rules/rules/windows/collection_posh_screen_grabber.toml +126 -0
- nldcsc_elastic_rules/rules/windows/collection_posh_webcam_video_capture.toml +134 -0
- nldcsc_elastic_rules/rules/windows/collection_winrar_encryption.toml +129 -0
- nldcsc_elastic_rules/rules/windows/command_and_control_certreq_postdata.toml +172 -0
- nldcsc_elastic_rules/rules/windows/command_and_control_common_llm_endpoint.toml +158 -0
- nldcsc_elastic_rules/rules/windows/command_and_control_common_webservices.toml +383 -0
- nldcsc_elastic_rules/rules/windows/command_and_control_dns_susp_tld.toml +105 -0
- nldcsc_elastic_rules/rules/windows/command_and_control_dns_tunneling_nslookup.toml +109 -0
- nldcsc_elastic_rules/rules/windows/command_and_control_encrypted_channel_freesslcert.toml +105 -0
- nldcsc_elastic_rules/rules/windows/command_and_control_headless_browser.toml +102 -0
- nldcsc_elastic_rules/rules/windows/command_and_control_iexplore_via_com.toml +119 -0
- nldcsc_elastic_rules/rules/windows/command_and_control_ingress_transfer_bits.toml +173 -0
- nldcsc_elastic_rules/rules/windows/command_and_control_new_terms_commonly_abused_rat_execution.toml +303 -0
- nldcsc_elastic_rules/rules/windows/command_and_control_outlook_home_page.toml +117 -0
- nldcsc_elastic_rules/rules/windows/command_and_control_port_forwarding_added_registry.toml +120 -0
- nldcsc_elastic_rules/rules/windows/command_and_control_rdp_tunnel_plink.toml +121 -0
- nldcsc_elastic_rules/rules/windows/command_and_control_remcos_rat_iocs.toml +104 -0
- nldcsc_elastic_rules/rules/windows/command_and_control_remote_file_copy_desktopimgdownldr.toml +183 -0
- nldcsc_elastic_rules/rules/windows/command_and_control_remote_file_copy_mpcmdrun.toml +181 -0
- nldcsc_elastic_rules/rules/windows/command_and_control_remote_file_copy_powershell.toml +191 -0
- nldcsc_elastic_rules/rules/windows/command_and_control_remote_file_copy_scripts.toml +152 -0
- nldcsc_elastic_rules/rules/windows/command_and_control_rmm_netsupport_susp_path.toml +102 -0
- nldcsc_elastic_rules/rules/windows/command_and_control_screenconnect_childproc.toml +120 -0
- nldcsc_elastic_rules/rules/windows/command_and_control_sunburst_c2_activity_detected.toml +165 -0
- nldcsc_elastic_rules/rules/windows/command_and_control_teamviewer_remote_file_copy.toml +142 -0
- nldcsc_elastic_rules/rules/windows/command_and_control_tool_transfer_via_curl.toml +121 -0
- nldcsc_elastic_rules/rules/windows/command_and_control_tunnel_vscode.toml +105 -0
- nldcsc_elastic_rules/rules/windows/credential_access_adidns_wildcard.toml +117 -0
- nldcsc_elastic_rules/rules/windows/credential_access_adidns_wpad_record.toml +113 -0
- nldcsc_elastic_rules/rules/windows/credential_access_browsers_unusual_parent.toml +125 -0
- nldcsc_elastic_rules/rules/windows/credential_access_bruteforce_admin_account.toml +141 -0
- nldcsc_elastic_rules/rules/windows/credential_access_bruteforce_multiple_logon_failure_followed_by_success.toml +153 -0
- nldcsc_elastic_rules/rules/windows/credential_access_bruteforce_multiple_logon_failure_same_srcip.toml +163 -0
- nldcsc_elastic_rules/rules/windows/credential_access_cmdline_dump_tool.toml +160 -0
- nldcsc_elastic_rules/rules/windows/credential_access_copy_ntds_sam_volshadowcp_cmdline.toml +171 -0
- nldcsc_elastic_rules/rules/windows/credential_access_credential_dumping_msbuild.toml +170 -0
- nldcsc_elastic_rules/rules/windows/credential_access_dcsync_newterm_subjectuser.toml +149 -0
- nldcsc_elastic_rules/rules/windows/credential_access_dcsync_replication_rights.toml +155 -0
- nldcsc_elastic_rules/rules/windows/credential_access_dcsync_user_backdoor.toml +124 -0
- nldcsc_elastic_rules/rules/windows/credential_access_disable_kerberos_preauth.toml +138 -0
- nldcsc_elastic_rules/rules/windows/credential_access_dnsnode_creation.toml +117 -0
- nldcsc_elastic_rules/rules/windows/credential_access_dollar_account_relay.toml +113 -0
- nldcsc_elastic_rules/rules/windows/credential_access_dollar_account_relay_kerberos.toml +129 -0
- nldcsc_elastic_rules/rules/windows/credential_access_dollar_account_relay_ntlm.toml +128 -0
- nldcsc_elastic_rules/rules/windows/credential_access_domain_backup_dpapi_private_keys.toml +80 -0
- nldcsc_elastic_rules/rules/windows/credential_access_dump_registry_hives.toml +118 -0
- nldcsc_elastic_rules/rules/windows/credential_access_generic_localdumps.toml +123 -0
- nldcsc_elastic_rules/rules/windows/credential_access_iis_connectionstrings_dumping.toml +108 -0
- nldcsc_elastic_rules/rules/windows/credential_access_imageload_azureadconnectauthsvc.toml +112 -0
- nldcsc_elastic_rules/rules/windows/credential_access_kerberoasting_unusual_process.toml +181 -0
- nldcsc_elastic_rules/rules/windows/credential_access_kerberos_coerce.toml +126 -0
- nldcsc_elastic_rules/rules/windows/credential_access_kerberos_coerce_dns.toml +118 -0
- nldcsc_elastic_rules/rules/windows/credential_access_kirbi_file.toml +103 -0
- nldcsc_elastic_rules/rules/windows/credential_access_ldap_attributes.toml +158 -0
- nldcsc_elastic_rules/rules/windows/credential_access_lsass_handle_via_malseclogon.toml +105 -0
- nldcsc_elastic_rules/rules/windows/credential_access_lsass_loaded_susp_dll.toml +160 -0
- nldcsc_elastic_rules/rules/windows/credential_access_lsass_memdump_file_created.toml +172 -0
- nldcsc_elastic_rules/rules/windows/credential_access_lsass_memdump_handle_access.toml +201 -0
- nldcsc_elastic_rules/rules/windows/credential_access_lsass_openprocess_api.toml +216 -0
- nldcsc_elastic_rules/rules/windows/credential_access_machine_account_smb_relay.toml +105 -0
- nldcsc_elastic_rules/rules/windows/credential_access_mimikatz_memssp_default_logs.toml +109 -0
- nldcsc_elastic_rules/rules/windows/credential_access_mimikatz_powershell_module.toml +132 -0
- nldcsc_elastic_rules/rules/windows/credential_access_mod_wdigest_security_provider.toml +118 -0
- nldcsc_elastic_rules/rules/windows/credential_access_moving_registry_hive_via_smb.toml +118 -0
- nldcsc_elastic_rules/rules/windows/credential_access_persistence_network_logon_provider_modification.toml +176 -0
- nldcsc_elastic_rules/rules/windows/credential_access_posh_invoke_ninjacopy.toml +136 -0
- nldcsc_elastic_rules/rules/windows/credential_access_posh_kerb_ticket_dump.toml +146 -0
- nldcsc_elastic_rules/rules/windows/credential_access_posh_minidump.toml +131 -0
- nldcsc_elastic_rules/rules/windows/credential_access_posh_relay_tools.toml +152 -0
- nldcsc_elastic_rules/rules/windows/credential_access_posh_request_ticket.toml +139 -0
- nldcsc_elastic_rules/rules/windows/credential_access_posh_veeam_sql.toml +134 -0
- nldcsc_elastic_rules/rules/windows/credential_access_potential_lsa_memdump_via_mirrordump.toml +103 -0
- nldcsc_elastic_rules/rules/windows/credential_access_rare_webdav_destination.toml +98 -0
- nldcsc_elastic_rules/rules/windows/credential_access_regback_sam_security_hives.toml +101 -0
- nldcsc_elastic_rules/rules/windows/credential_access_relay_ntlm_auth_via_http_spoolss.toml +130 -0
- nldcsc_elastic_rules/rules/windows/credential_access_remote_sam_secretsdump.toml +119 -0
- nldcsc_elastic_rules/rules/windows/credential_access_saved_creds_vault_winlog.toml +110 -0
- nldcsc_elastic_rules/rules/windows/credential_access_saved_creds_vaultcmd.toml +117 -0
- nldcsc_elastic_rules/rules/windows/credential_access_seenabledelegationprivilege_assigned_to_user.toml +121 -0
- nldcsc_elastic_rules/rules/windows/credential_access_shadow_credentials.toml +120 -0
- nldcsc_elastic_rules/rules/windows/credential_access_spn_attribute_modified.toml +124 -0
- nldcsc_elastic_rules/rules/windows/credential_access_suspicious_comsvcs_imageload.toml +172 -0
- nldcsc_elastic_rules/rules/windows/credential_access_suspicious_lsass_access_generic.toml +129 -0
- nldcsc_elastic_rules/rules/windows/credential_access_suspicious_lsass_access_memdump.toml +126 -0
- nldcsc_elastic_rules/rules/windows/credential_access_suspicious_lsass_access_via_snapshot.toml +109 -0
- nldcsc_elastic_rules/rules/windows/credential_access_suspicious_winreg_access_via_sebackup_priv.toml +143 -0
- nldcsc_elastic_rules/rules/windows/credential_access_symbolic_link_to_shadow_copy_created.toml +147 -0
- nldcsc_elastic_rules/rules/windows/credential_access_veeam_backup_dll_imageload.toml +112 -0
- nldcsc_elastic_rules/rules/windows/credential_access_veeam_commands.toml +129 -0
- nldcsc_elastic_rules/rules/windows/credential_access_via_snapshot_lsass_clone_creation.toml +96 -0
- nldcsc_elastic_rules/rules/windows/credential_access_wbadmin_ntds.toml +124 -0
- nldcsc_elastic_rules/rules/windows/credential_access_web_config_file_access.toml +96 -0
- nldcsc_elastic_rules/rules/windows/credential_access_wireless_creds_dumping.toml +153 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_adding_the_hidden_file_attribute_with_via_attribexe.toml +175 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_amsi_bypass_dllhijack.toml +177 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_amsi_bypass_powershell.toml +175 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_amsienable_key_mod.toml +132 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_audit_policy_disabled_winlog.toml +129 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_clearing_windows_console_history.toml +133 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_clearing_windows_event_logs.toml +121 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_clearing_windows_security_logs.toml +87 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_code_signing_policy_modification_builtin_tools.toml +139 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_code_signing_policy_modification_registry.toml +149 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_communication_apps_suspicious_child_process.toml +279 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_create_mod_root_certificate.toml +172 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_cve_2020_0601.toml +89 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_defender_disabled_via_registry.toml +136 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_defender_exclusion_via_powershell.toml +148 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_delete_volume_usn_journal_with_fsutil.toml +104 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_disable_nla.toml +110 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_disable_posh_scriptblocklogging.toml +129 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_disable_windows_firewall_rules_with_netsh.toml +105 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_disabling_windows_defender_powershell.toml +133 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_disabling_windows_logs.toml +136 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_dns_over_https_enabled.toml +111 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_dotnet_compiler_parent_process.toml +125 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_enable_inbound_rdp_with_netsh.toml +109 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_enable_network_discovery_with_netsh.toml +104 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_execution_control_panel_suspicious_args.toml +118 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_execution_lolbas_wuauclt.toml +151 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_execution_msbuild_started_by_office_app.toml +144 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_execution_msbuild_started_by_script.toml +130 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_execution_msbuild_started_by_system_process.toml +116 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_execution_msbuild_started_renamed.toml +155 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_execution_msbuild_started_unusal_process.toml +124 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_execution_suspicious_explorer_winword.toml +146 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_execution_windefend_unusual_path.toml +124 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_file_creation_mult_extension.toml +133 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_from_unusual_directory.toml +194 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_hide_encoded_executable_registry.toml +103 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_iis_httplogging_disabled.toml +107 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_indirect_exec_conhost.toml +93 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_indirect_exec_forfiles.toml +92 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_indirect_exec_openssh.toml +93 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_injection_msbuild.toml +111 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_installutil_beacon.toml +100 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_lolbas_win_cdb_utility.toml +108 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_lsass_ppl_disabled_registry.toml +111 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_masquerading_as_elastic_endpoint_process.toml +129 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_masquerading_as_svchost.toml +96 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_masquerading_business_apps_installer.toml +257 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_masquerading_communication_apps.toml +167 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_masquerading_renamed_autoit.toml +146 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_masquerading_suspicious_werfault_childproc.toml +144 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_masquerading_trusted_directory.toml +132 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_masquerading_werfault.toml +150 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_microsoft_defender_tampering.toml +158 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_misc_lolbin_connecting_to_the_internet.toml +147 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_modify_ownership_os_files.toml +111 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_ms_office_suspicious_regmod.toml +133 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_msbuild_making_network_connections.toml +164 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_mshta_beacon.toml +103 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_mshta_susp_child.toml +111 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_msiexec_child_proc_netcon.toml +124 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_msiexec_remote_payload.toml +110 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_msxsl_network.toml +98 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_network_connection_from_windows_binary.toml +199 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_ntlm_downgrade.toml +103 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_obf_args_unicode_modified_letters.toml +108 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_parent_process_pid_spoofing.toml +149 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_persistence_account_tokenfilterpolicy.toml +140 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_posh_assembly_load.toml +224 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_posh_compressed.toml +192 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_posh_defender_tampering.toml +151 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_posh_encryption.toml +110 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_posh_obfuscation.toml +147 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_posh_obfuscation_backtick.toml +170 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_posh_obfuscation_backtick_var.toml +157 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_posh_obfuscation_char_arrays.toml +158 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_posh_obfuscation_concat_dynamic.toml +154 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_posh_obfuscation_high_number_proportion.toml +170 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_posh_obfuscation_iex_env_vars_reconstruction.toml +159 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_posh_obfuscation_iex_string_reconstruction.toml +168 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_posh_obfuscation_index_reversal.toml +164 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_posh_obfuscation_reverse_keyword.toml +155 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_posh_obfuscation_string_concat.toml +159 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_posh_obfuscation_string_format.toml +178 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_posh_obfuscation_whitespace_special_proportion.toml +166 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_posh_process_injection.toml +163 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_powershell_windows_firewall_disabled.toml +141 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_process_termination_followed_by_deletion.toml +176 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_proxy_execution_via_msdt.toml +123 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_reg_disable_enableglobalqueryblocklist.toml +124 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_regmod_remotemonologue.toml +136 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_right_to_left_override.toml +122 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_root_dir_ads_creation.toml +106 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_run_virt_windowssandbox.toml +108 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_rundll32_no_arguments.toml +146 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_sc_sdset.toml +121 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_sccm_scnotification_dll.toml +87 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_scheduledjobs_at_protocol_enabled.toml +123 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_script_via_html_app.toml +144 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_sdelete_like_filename_rename.toml +112 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_sip_provider_mod.toml +112 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_solarwinds_backdoor_service_disabled_via_registry.toml +139 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_suspicious_certutil_commands.toml +153 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_suspicious_execution_from_mounted_device.toml +139 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_suspicious_managedcode_host_process.toml +108 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_suspicious_process_access_direct_syscall.toml +174 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_suspicious_process_creation_calltrace.toml +96 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_suspicious_scrobj_load.toml +112 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_suspicious_short_program_name.toml +141 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_suspicious_wmi_script.toml +108 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_suspicious_zoom_child_process.toml +161 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_system_critical_proc_abnormal_file_activity.toml +161 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_timestomp_sysmon.toml +109 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_unsigned_dll_loaded_from_suspdir.toml +192 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_untrusted_driver_loaded.toml +137 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_unusual_ads_file_creation.toml +193 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_unusual_dir_ads.toml +109 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_unusual_network_connection_via_dllhost.toml +101 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_unusual_network_connection_via_rundll32.toml +128 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_unusual_process_network_connection.toml +108 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_unusual_system_vp_child_program.toml +98 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_via_filter_manager.toml +155 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_wdac_policy_by_unusual_process.toml +104 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_windows_filtering_platform.toml +154 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_workfolders_control_execution.toml +108 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_wsl_bash_exec.toml +133 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_wsl_child_process.toml +124 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_wsl_enabled_via_dism.toml +104 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_wsl_filesystem.toml +98 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_wsl_kalilinux.toml +113 -0
- nldcsc_elastic_rules/rules/windows/defense_evasion_wsl_registry_modification.toml +108 -0
- nldcsc_elastic_rules/rules/windows/discovery_active_directory_webservice.toml +96 -0
- nldcsc_elastic_rules/rules/windows/discovery_ad_explorer_execution.toml +126 -0
- nldcsc_elastic_rules/rules/windows/discovery_adfind_command_activity.toml +147 -0
- nldcsc_elastic_rules/rules/windows/discovery_admin_recon.toml +133 -0
- nldcsc_elastic_rules/rules/windows/discovery_command_system_account.toml +126 -0
- nldcsc_elastic_rules/rules/windows/discovery_enumerating_domain_trusts_via_dsquery.toml +111 -0
- nldcsc_elastic_rules/rules/windows/discovery_enumerating_domain_trusts_via_nltest.toml +121 -0
- nldcsc_elastic_rules/rules/windows/discovery_group_policy_object_discovery.toml +100 -0
- nldcsc_elastic_rules/rules/windows/discovery_high_number_ad_properties.toml +98 -0
- nldcsc_elastic_rules/rules/windows/discovery_host_public_ip_address_lookup.toml +161 -0
- nldcsc_elastic_rules/rules/windows/discovery_peripheral_device.toml +96 -0
- nldcsc_elastic_rules/rules/windows/discovery_posh_invoke_sharefinder.toml +154 -0
- nldcsc_elastic_rules/rules/windows/discovery_posh_suspicious_api_functions.toml +206 -0
- nldcsc_elastic_rules/rules/windows/discovery_privileged_localgroup_membership.toml +207 -0
- nldcsc_elastic_rules/rules/windows/discovery_signal_unusual_discovery_signal_proc_cmdline.toml +91 -0
- nldcsc_elastic_rules/rules/windows/discovery_signal_unusual_discovery_signal_proc_executable.toml +86 -0
- nldcsc_elastic_rules/rules/windows/discovery_whoami_command_activity.toml +130 -0
- nldcsc_elastic_rules/rules/windows/execution_apt_solarwinds_backdoor_child_cmd_powershell.toml +140 -0
- nldcsc_elastic_rules/rules/windows/execution_apt_solarwinds_backdoor_unusual_child_processes.toml +126 -0
- nldcsc_elastic_rules/rules/windows/execution_com_object_xwizard.toml +123 -0
- nldcsc_elastic_rules/rules/windows/execution_command_prompt_connecting_to_the_internet.toml +166 -0
- nldcsc_elastic_rules/rules/windows/execution_command_shell_started_by_svchost.toml +208 -0
- nldcsc_elastic_rules/rules/windows/execution_command_shell_started_by_unusual_process.toml +127 -0
- nldcsc_elastic_rules/rules/windows/execution_command_shell_via_rundll32.toml +139 -0
- nldcsc_elastic_rules/rules/windows/execution_delayed_via_ping_lolbas_unsigned.toml +188 -0
- nldcsc_elastic_rules/rules/windows/execution_downloaded_shortcut_files.toml +110 -0
- nldcsc_elastic_rules/rules/windows/execution_downloaded_url_file.toml +107 -0
- nldcsc_elastic_rules/rules/windows/execution_enumeration_via_wmiprvse.toml +149 -0
- nldcsc_elastic_rules/rules/windows/execution_from_unusual_path_cmdline.toml +271 -0
- nldcsc_elastic_rules/rules/windows/execution_html_help_executable_program_connecting_to_the_internet.toml +175 -0
- nldcsc_elastic_rules/rules/windows/execution_initial_access_foxmail_exploit.toml +115 -0
- nldcsc_elastic_rules/rules/windows/execution_initial_access_via_msc_file.toml +140 -0
- nldcsc_elastic_rules/rules/windows/execution_initial_access_wps_dll_exploit.toml +113 -0
- nldcsc_elastic_rules/rules/windows/execution_mofcomp.toml +120 -0
- nldcsc_elastic_rules/rules/windows/execution_ms_office_written_file.toml +128 -0
- nldcsc_elastic_rules/rules/windows/execution_nodejs_susp_patterns.toml +119 -0
- nldcsc_elastic_rules/rules/windows/execution_pdf_written_file.toml +134 -0
- nldcsc_elastic_rules/rules/windows/execution_posh_hacktool_authors.toml +136 -0
- nldcsc_elastic_rules/rules/windows/execution_posh_hacktool_functions.toml +357 -0
- nldcsc_elastic_rules/rules/windows/execution_posh_malicious_script_agg.toml +150 -0
- nldcsc_elastic_rules/rules/windows/execution_posh_portable_executable.toml +175 -0
- nldcsc_elastic_rules/rules/windows/execution_posh_psreflect.toml +194 -0
- nldcsc_elastic_rules/rules/windows/execution_powershell_susp_args_via_winscript.toml +115 -0
- nldcsc_elastic_rules/rules/windows/execution_psexec_lateral_movement_command.toml +134 -0
- nldcsc_elastic_rules/rules/windows/execution_register_server_program_connecting_to_the_internet.toml +171 -0
- nldcsc_elastic_rules/rules/windows/execution_revshell_cmd_via_netcat.toml +97 -0
- nldcsc_elastic_rules/rules/windows/execution_scheduled_task_powershell_source.toml +110 -0
- nldcsc_elastic_rules/rules/windows/execution_scripting_remote_webdav.toml +120 -0
- nldcsc_elastic_rules/rules/windows/execution_scripts_archive_file.toml +123 -0
- nldcsc_elastic_rules/rules/windows/execution_shared_modules_local_sxs_dll.toml +73 -0
- nldcsc_elastic_rules/rules/windows/execution_suspicious_cmd_wmi.toml +117 -0
- nldcsc_elastic_rules/rules/windows/execution_suspicious_image_load_wmi_ms_office.toml +100 -0
- nldcsc_elastic_rules/rules/windows/execution_suspicious_pdf_reader.toml +143 -0
- nldcsc_elastic_rules/rules/windows/execution_suspicious_powershell_imgload.toml +141 -0
- nldcsc_elastic_rules/rules/windows/execution_suspicious_psexesvc.toml +115 -0
- nldcsc_elastic_rules/rules/windows/execution_via_compiled_html_file.toml +180 -0
- nldcsc_elastic_rules/rules/windows/execution_via_hidden_shell_conhost.toml +144 -0
- nldcsc_elastic_rules/rules/windows/execution_via_mmc_console_file_unusual_path.toml +146 -0
- nldcsc_elastic_rules/rules/windows/execution_windows_cmd_shell_susp_args.toml +179 -0
- nldcsc_elastic_rules/rules/windows/execution_windows_fakecaptcha_cmd_ps.toml +144 -0
- nldcsc_elastic_rules/rules/windows/execution_windows_phish_clickfix.toml +143 -0
- nldcsc_elastic_rules/rules/windows/execution_windows_powershell_susp_args.toml +188 -0
- nldcsc_elastic_rules/rules/windows/execution_windows_script_from_internet.toml +132 -0
- nldcsc_elastic_rules/rules/windows/exfiltration_smb_rare_destination.toml +138 -0
- nldcsc_elastic_rules/rules/windows/impact_backup_file_deletion.toml +125 -0
- nldcsc_elastic_rules/rules/windows/impact_deleting_backup_catalogs_with_wbadmin.toml +111 -0
- nldcsc_elastic_rules/rules/windows/impact_high_freq_file_renames_by_kernel.toml +114 -0
- nldcsc_elastic_rules/rules/windows/impact_mod_critical_os_files.toml +100 -0
- nldcsc_elastic_rules/rules/windows/impact_modification_of_boot_config.toml +109 -0
- nldcsc_elastic_rules/rules/windows/impact_ransomware_file_rename_smb.toml +117 -0
- nldcsc_elastic_rules/rules/windows/impact_ransomware_note_file_over_smb.toml +117 -0
- nldcsc_elastic_rules/rules/windows/impact_stop_process_service_threshold.toml +97 -0
- nldcsc_elastic_rules/rules/windows/impact_volume_shadow_copy_deletion_or_resized_via_vssadmin.toml +124 -0
- nldcsc_elastic_rules/rules/windows/impact_volume_shadow_copy_deletion_via_powershell.toml +148 -0
- nldcsc_elastic_rules/rules/windows/impact_volume_shadow_copy_deletion_via_wmic.toml +137 -0
- nldcsc_elastic_rules/rules/windows/initial_access_evasion_suspicious_htm_file_creation.toml +151 -0
- nldcsc_elastic_rules/rules/windows/initial_access_execution_from_inetcache.toml +143 -0
- nldcsc_elastic_rules/rules/windows/initial_access_execution_from_removable_media.toml +93 -0
- nldcsc_elastic_rules/rules/windows/initial_access_execution_remote_via_msiexec.toml +136 -0
- nldcsc_elastic_rules/rules/windows/initial_access_execution_via_office_addins.toml +160 -0
- nldcsc_elastic_rules/rules/windows/initial_access_exfiltration_first_time_seen_usb.toml +124 -0
- nldcsc_elastic_rules/rules/windows/initial_access_exploit_jetbrains_teamcity.toml +145 -0
- nldcsc_elastic_rules/rules/windows/initial_access_rdp_file_mail_attachment.toml +118 -0
- nldcsc_elastic_rules/rules/windows/initial_access_script_executing_powershell.toml +145 -0
- nldcsc_elastic_rules/rules/windows/initial_access_scripts_process_started_via_wmi.toml +146 -0
- nldcsc_elastic_rules/rules/windows/initial_access_suspicious_ms_exchange_files.toml +110 -0
- nldcsc_elastic_rules/rules/windows/initial_access_suspicious_ms_exchange_process.toml +147 -0
- nldcsc_elastic_rules/rules/windows/initial_access_suspicious_ms_exchange_worker_child_process.toml +129 -0
- nldcsc_elastic_rules/rules/windows/initial_access_suspicious_ms_office_child_process.toml +175 -0
- nldcsc_elastic_rules/rules/windows/initial_access_suspicious_ms_outlook_child_process.toml +162 -0
- nldcsc_elastic_rules/rules/windows/initial_access_suspicious_windows_server_update_svc.toml +121 -0
- nldcsc_elastic_rules/rules/windows/initial_access_url_cve_2025_33053.toml +120 -0
- nldcsc_elastic_rules/rules/windows/initial_access_via_explorer_suspicious_child_parent_args.toml +158 -0
- nldcsc_elastic_rules/rules/windows/initial_access_webshell_screenconnect_server.toml +127 -0
- nldcsc_elastic_rules/rules/windows/initial_access_xsl_script_execution_via_com.toml +112 -0
- nldcsc_elastic_rules/rules/windows/lateral_movement_alternate_creds_pth.toml +102 -0
- nldcsc_elastic_rules/rules/windows/lateral_movement_cmd_service.toml +127 -0
- nldcsc_elastic_rules/rules/windows/lateral_movement_credential_access_kerberos_correlation.toml +127 -0
- nldcsc_elastic_rules/rules/windows/lateral_movement_dcom_hta.toml +120 -0
- nldcsc_elastic_rules/rules/windows/lateral_movement_dcom_mmc20.toml +119 -0
- nldcsc_elastic_rules/rules/windows/lateral_movement_dcom_shellwindow_shellbrowserwindow.toml +103 -0
- nldcsc_elastic_rules/rules/windows/lateral_movement_defense_evasion_lanman_nullsessionpipe_modification.toml +121 -0
- nldcsc_elastic_rules/rules/windows/lateral_movement_direct_outbound_smb_connection.toml +158 -0
- nldcsc_elastic_rules/rules/windows/lateral_movement_evasion_rdp_shadowing.toml +122 -0
- nldcsc_elastic_rules/rules/windows/lateral_movement_executable_tool_transfer_smb.toml +110 -0
- nldcsc_elastic_rules/rules/windows/lateral_movement_execution_from_tsclient_mup.toml +109 -0
- nldcsc_elastic_rules/rules/windows/lateral_movement_execution_via_file_shares_sequence.toml +163 -0
- nldcsc_elastic_rules/rules/windows/lateral_movement_incoming_winrm_shell_execution.toml +106 -0
- nldcsc_elastic_rules/rules/windows/lateral_movement_incoming_wmi.toml +124 -0
- nldcsc_elastic_rules/rules/windows/lateral_movement_mount_hidden_or_webdav_share_net.toml +151 -0
- nldcsc_elastic_rules/rules/windows/lateral_movement_powershell_remoting_target.toml +127 -0
- nldcsc_elastic_rules/rules/windows/lateral_movement_rdp_enabled_registry.toml +132 -0
- nldcsc_elastic_rules/rules/windows/lateral_movement_rdp_sharprdp_target.toml +108 -0
- nldcsc_elastic_rules/rules/windows/lateral_movement_remote_file_copy_hidden_share.toml +108 -0
- nldcsc_elastic_rules/rules/windows/lateral_movement_remote_service_installed_winlog.toml +131 -0
- nldcsc_elastic_rules/rules/windows/lateral_movement_remote_services.toml +174 -0
- nldcsc_elastic_rules/rules/windows/lateral_movement_remote_task_creation_winlog.toml +93 -0
- nldcsc_elastic_rules/rules/windows/lateral_movement_scheduled_task_target.toml +107 -0
- nldcsc_elastic_rules/rules/windows/lateral_movement_suspicious_rdp_client_imageload.toml +123 -0
- nldcsc_elastic_rules/rules/windows/lateral_movement_unusual_dns_service_children.toml +124 -0
- nldcsc_elastic_rules/rules/windows/lateral_movement_unusual_dns_service_file_writes.toml +97 -0
- nldcsc_elastic_rules/rules/windows/lateral_movement_via_startup_folder_rdp_smb.toml +126 -0
- nldcsc_elastic_rules/rules/windows/lateral_movement_via_wsus_update.toml +105 -0
- nldcsc_elastic_rules/rules/windows/persistence_ad_adminsdholder.toml +103 -0
- nldcsc_elastic_rules/rules/windows/persistence_adobe_hijack_persistence.toml +154 -0
- nldcsc_elastic_rules/rules/windows/persistence_app_compat_shim.toml +117 -0
- nldcsc_elastic_rules/rules/windows/persistence_appcertdlls_registry.toml +121 -0
- nldcsc_elastic_rules/rules/windows/persistence_appinitdlls_registry.toml +196 -0
- nldcsc_elastic_rules/rules/windows/persistence_browser_extension_install.toml +111 -0
- nldcsc_elastic_rules/rules/windows/persistence_dontexpirepasswd_account.toml +108 -0
- nldcsc_elastic_rules/rules/windows/persistence_evasion_hidden_local_account_creation.toml +104 -0
- nldcsc_elastic_rules/rules/windows/persistence_evasion_registry_ifeo_injection.toml +134 -0
- nldcsc_elastic_rules/rules/windows/persistence_evasion_registry_startup_shell_folder_modified.toml +191 -0
- nldcsc_elastic_rules/rules/windows/persistence_group_modification_by_system.toml +104 -0
- nldcsc_elastic_rules/rules/windows/persistence_local_scheduled_job_creation.toml +114 -0
- nldcsc_elastic_rules/rules/windows/persistence_local_scheduled_task_creation.toml +109 -0
- nldcsc_elastic_rules/rules/windows/persistence_local_scheduled_task_scripting.toml +97 -0
- nldcsc_elastic_rules/rules/windows/persistence_ms_office_addins_file.toml +111 -0
- nldcsc_elastic_rules/rules/windows/persistence_ms_outlook_vba_template.toml +102 -0
- nldcsc_elastic_rules/rules/windows/persistence_msds_alloweddelegateto_krbtgt.toml +117 -0
- nldcsc_elastic_rules/rules/windows/persistence_msi_installer_task_startup.toml +121 -0
- nldcsc_elastic_rules/rules/windows/persistence_msoffice_startup_registry.toml +118 -0
- nldcsc_elastic_rules/rules/windows/persistence_netsh_helper_dll.toml +117 -0
- nldcsc_elastic_rules/rules/windows/persistence_powershell_exch_mailbox_activesync_add_device.toml +129 -0
- nldcsc_elastic_rules/rules/windows/persistence_powershell_profiles.toml +176 -0
- nldcsc_elastic_rules/rules/windows/persistence_priv_escalation_via_accessibility_features.toml +189 -0
- nldcsc_elastic_rules/rules/windows/persistence_registry_uncommon.toml +193 -0
- nldcsc_elastic_rules/rules/windows/persistence_remote_password_reset.toml +122 -0
- nldcsc_elastic_rules/rules/windows/persistence_run_key_and_startup_broad.toml +188 -0
- nldcsc_elastic_rules/rules/windows/persistence_runtime_run_key_startup_susp_procs.toml +107 -0
- nldcsc_elastic_rules/rules/windows/persistence_scheduled_task_creation_winlog.toml +104 -0
- nldcsc_elastic_rules/rules/windows/persistence_scheduled_task_updated.toml +98 -0
- nldcsc_elastic_rules/rules/windows/persistence_sdprop_exclusion_dsheuristics.toml +125 -0
- nldcsc_elastic_rules/rules/windows/persistence_service_dll_unsigned.toml +219 -0
- nldcsc_elastic_rules/rules/windows/persistence_service_windows_service_winlog.toml +148 -0
- nldcsc_elastic_rules/rules/windows/persistence_services_registry.toml +147 -0
- nldcsc_elastic_rules/rules/windows/persistence_startup_folder_file_written_by_suspicious_process.toml +172 -0
- nldcsc_elastic_rules/rules/windows/persistence_startup_folder_file_written_by_unsigned_process.toml +166 -0
- nldcsc_elastic_rules/rules/windows/persistence_startup_folder_scripts.toml +168 -0
- nldcsc_elastic_rules/rules/windows/persistence_suspicious_com_hijack_registry.toml +197 -0
- nldcsc_elastic_rules/rules/windows/persistence_suspicious_image_load_scheduled_task_ms_office.toml +182 -0
- nldcsc_elastic_rules/rules/windows/persistence_suspicious_scheduled_task_runtime.toml +153 -0
- nldcsc_elastic_rules/rules/windows/persistence_suspicious_service_created_registry.toml +119 -0
- nldcsc_elastic_rules/rules/windows/persistence_sysmon_wmi_event_subscription.toml +100 -0
- nldcsc_elastic_rules/rules/windows/persistence_system_shells_via_services.toml +160 -0
- nldcsc_elastic_rules/rules/windows/persistence_temp_scheduled_task.toml +109 -0
- nldcsc_elastic_rules/rules/windows/persistence_time_provider_mod.toml +172 -0
- nldcsc_elastic_rules/rules/windows/persistence_user_account_added_to_privileged_group_ad.toml +115 -0
- nldcsc_elastic_rules/rules/windows/persistence_user_account_creation.toml +105 -0
- nldcsc_elastic_rules/rules/windows/persistence_via_application_shimming.toml +126 -0
- nldcsc_elastic_rules/rules/windows/persistence_via_bits_job_notify_command.toml +109 -0
- nldcsc_elastic_rules/rules/windows/persistence_via_hidden_run_key_valuename.toml +139 -0
- nldcsc_elastic_rules/rules/windows/persistence_via_lsa_security_support_provider_registry.toml +127 -0
- nldcsc_elastic_rules/rules/windows/persistence_via_telemetrycontroller_scheduledtask_hijack.toml +141 -0
- nldcsc_elastic_rules/rules/windows/persistence_via_update_orchestrator_service_hijack.toml +182 -0
- nldcsc_elastic_rules/rules/windows/persistence_via_windows_management_instrumentation_event_subscription.toml +121 -0
- nldcsc_elastic_rules/rules/windows/persistence_via_wmi_stdregprov_run_services.toml +210 -0
- nldcsc_elastic_rules/rules/windows/persistence_via_xp_cmdshell_mssql_stored_procedure.toml +149 -0
- nldcsc_elastic_rules/rules/windows/persistence_web_shell_aspx_write.toml +109 -0
- nldcsc_elastic_rules/rules/windows/persistence_webshell_detection.toml +216 -0
- nldcsc_elastic_rules/rules/windows/persistence_werfault_reflectdebugger.toml +114 -0
- nldcsc_elastic_rules/rules/windows/privilege_escalation_badsuccessor_dmsa_abuse.toml +91 -0
- nldcsc_elastic_rules/rules/windows/privilege_escalation_create_process_as_different_user.toml +106 -0
- nldcsc_elastic_rules/rules/windows/privilege_escalation_create_process_with_token_unpriv.toml +121 -0
- nldcsc_elastic_rules/rules/windows/privilege_escalation_credroaming_ldap.toml +111 -0
- nldcsc_elastic_rules/rules/windows/privilege_escalation_disable_uac_registry.toml +163 -0
- nldcsc_elastic_rules/rules/windows/privilege_escalation_dmsa_creation_by_unusual_user.toml +90 -0
- nldcsc_elastic_rules/rules/windows/privilege_escalation_dns_serverlevelplugindll.toml +95 -0
- nldcsc_elastic_rules/rules/windows/privilege_escalation_driver_newterm_imphash.toml +156 -0
- nldcsc_elastic_rules/rules/windows/privilege_escalation_expired_driver_loaded.toml +105 -0
- nldcsc_elastic_rules/rules/windows/privilege_escalation_exploit_cve_202238028.toml +127 -0
- nldcsc_elastic_rules/rules/windows/privilege_escalation_gpo_schtask_service_creation.toml +125 -0
- nldcsc_elastic_rules/rules/windows/privilege_escalation_group_policy_iniscript.toml +144 -0
- nldcsc_elastic_rules/rules/windows/privilege_escalation_group_policy_privileged_groups.toml +106 -0
- nldcsc_elastic_rules/rules/windows/privilege_escalation_group_policy_scheduled_task.toml +161 -0
- nldcsc_elastic_rules/rules/windows/privilege_escalation_installertakeover.toml +156 -0
- nldcsc_elastic_rules/rules/windows/privilege_escalation_krbrelayup_service_creation.toml +119 -0
- nldcsc_elastic_rules/rules/windows/privilege_escalation_lsa_auth_package.toml +114 -0
- nldcsc_elastic_rules/rules/windows/privilege_escalation_make_token_local.toml +109 -0
- nldcsc_elastic_rules/rules/windows/privilege_escalation_msi_repair_via_mshelp_link.toml +119 -0
- nldcsc_elastic_rules/rules/windows/privilege_escalation_named_pipe_impersonation.toml +148 -0
- nldcsc_elastic_rules/rules/windows/privilege_escalation_newcreds_logon_rare_process.toml +100 -0
- nldcsc_elastic_rules/rules/windows/privilege_escalation_persistence_phantom_dll.toml +214 -0
- nldcsc_elastic_rules/rules/windows/privilege_escalation_port_monitor_print_pocessor_abuse.toml +128 -0
- nldcsc_elastic_rules/rules/windows/privilege_escalation_posh_token_impersonation.toml +219 -0
- nldcsc_elastic_rules/rules/windows/privilege_escalation_printspooler_registry_copyfiles.toml +108 -0
- nldcsc_elastic_rules/rules/windows/privilege_escalation_printspooler_service_suspicious_file.toml +159 -0
- nldcsc_elastic_rules/rules/windows/privilege_escalation_printspooler_suspicious_file_deletion.toml +104 -0
- nldcsc_elastic_rules/rules/windows/privilege_escalation_printspooler_suspicious_spl_file.toml +155 -0
- nldcsc_elastic_rules/rules/windows/privilege_escalation_reg_service_imagepath_mod.toml +180 -0
- nldcsc_elastic_rules/rules/windows/privilege_escalation_rogue_windir_environment_var.toml +110 -0
- nldcsc_elastic_rules/rules/windows/privilege_escalation_samaccountname_spoofing_attack.toml +119 -0
- nldcsc_elastic_rules/rules/windows/privilege_escalation_service_control_spawned_script_int.toml +192 -0
- nldcsc_elastic_rules/rules/windows/privilege_escalation_suspicious_dnshostname_update.toml +110 -0
- nldcsc_elastic_rules/rules/windows/privilege_escalation_thread_cpu_priority_hijack.toml +94 -0
- nldcsc_elastic_rules/rules/windows/privilege_escalation_tokenmanip_sedebugpriv_enabled.toml +127 -0
- nldcsc_elastic_rules/rules/windows/privilege_escalation_uac_bypass_com_clipup.toml +140 -0
- nldcsc_elastic_rules/rules/windows/privilege_escalation_uac_bypass_com_ieinstal.toml +143 -0
- nldcsc_elastic_rules/rules/windows/privilege_escalation_uac_bypass_com_interface_icmluautil.toml +137 -0
- nldcsc_elastic_rules/rules/windows/privilege_escalation_uac_bypass_diskcleanup_hijack.toml +153 -0
- nldcsc_elastic_rules/rules/windows/privilege_escalation_uac_bypass_dll_sideloading.toml +137 -0
- nldcsc_elastic_rules/rules/windows/privilege_escalation_uac_bypass_event_viewer.toml +179 -0
- nldcsc_elastic_rules/rules/windows/privilege_escalation_uac_bypass_mock_windir.toml +179 -0
- nldcsc_elastic_rules/rules/windows/privilege_escalation_uac_bypass_winfw_mmc_hijack.toml +177 -0
- nldcsc_elastic_rules/rules/windows/privilege_escalation_unquoted_service_path.toml +108 -0
- nldcsc_elastic_rules/rules/windows/privilege_escalation_unusual_parentchild_relationship.toml +180 -0
- nldcsc_elastic_rules/rules/windows/privilege_escalation_unusual_printspooler_childprocess.toml +128 -0
- nldcsc_elastic_rules/rules/windows/privilege_escalation_unusual_svchost_childproc_childless.toml +145 -0
- nldcsc_elastic_rules/rules/windows/privilege_escalation_via_ppid_spoofing.toml +158 -0
- nldcsc_elastic_rules/rules/windows/privilege_escalation_via_rogue_named_pipe.toml +106 -0
- nldcsc_elastic_rules/rules/windows/privilege_escalation_via_token_theft.toml +157 -0
- nldcsc_elastic_rules/rules/windows/privilege_escalation_windows_service_via_unusual_client.toml +127 -0
- nldcsc_elastic_rules/utils.py +7 -0
- nldcsc_elastic_rules-0.0.8.dist-info/METADATA +3 -0
- nldcsc_elastic_rules-0.0.8.dist-info/RECORD +1536 -0
- nldcsc_elastic_rules-0.0.8.dist-info/WHEEL +5 -0
- nldcsc_elastic_rules-0.0.8.dist-info/top_level.txt +1 -0
|
@@ -0,0 +1,164 @@
|
|
|
1
|
+
[metadata]
|
|
2
|
+
creation_date = "2025/04/14"
|
|
3
|
+
integration = ["windows"]
|
|
4
|
+
maturity = "production"
|
|
5
|
+
updated_date = "2025/07/16"
|
|
6
|
+
|
|
7
|
+
[rule]
|
|
8
|
+
author = ["Elastic"]
|
|
9
|
+
description = """
|
|
10
|
+
Identifies PowerShell scripts that use negative index ranges to reverse the contents of a string or array at runtime as
|
|
11
|
+
a form of obfuscation. This technique avoids direct use of reversal functions by iterating through array elements in
|
|
12
|
+
reverse order. These methods are designed to evade static analysis and bypass security protections such as the
|
|
13
|
+
Antimalware Scan Interface (AMSI).
|
|
14
|
+
"""
|
|
15
|
+
from = "now-9m"
|
|
16
|
+
language = "esql"
|
|
17
|
+
license = "Elastic License v2"
|
|
18
|
+
name = "PowerShell Obfuscation via Negative Index String Reversal"
|
|
19
|
+
note = """ ## Triage and analysis
|
|
20
|
+
|
|
21
|
+
> **Disclaimer**:
|
|
22
|
+
> This investigation guide was created using generative AI technology and has been reviewed to improve its accuracy and relevance. While every effort has been made to ensure its quality, we recommend validating the content and adapting it to suit your specific environment and operational needs.
|
|
23
|
+
|
|
24
|
+
### Investigating PowerShell Obfuscation via Negative Index String Reversal
|
|
25
|
+
|
|
26
|
+
PowerShell, a powerful scripting language, can be exploited by adversaries using obfuscation techniques like negative index string reversal to evade detection. This method manipulates strings or arrays by iterating in reverse, bypassing static analysis tools. The detection rule identifies scripts with obfuscation patterns by analyzing script length and specific indexing patterns, flagging potential threats for further investigation.
|
|
27
|
+
|
|
28
|
+
### Possible investigation steps
|
|
29
|
+
|
|
30
|
+
- Review the `powershell.file.script_block_text` to understand the script's intent and identify any suspicious or malicious behavior.
|
|
31
|
+
- Check the `host.name` and `user.id` fields to determine the affected system and user, assessing if they are high-value targets or have a history of similar alerts.
|
|
32
|
+
- Analyze the `file.path` to identify the location of the script and assess if it is in a common or suspicious directory.
|
|
33
|
+
- Investigate the `powershell.file.script_block_id` and `powershell.sequence` to trace the execution flow and determine if this script is part of a larger, potentially malicious sequence.
|
|
34
|
+
- Correlate the `agent.id` with other logs to see if there are additional related activities or alerts from the same endpoint.
|
|
35
|
+
- Examine the `count` of detected patterns to assess the level of obfuscation and potential threat severity.
|
|
36
|
+
|
|
37
|
+
### False positive analysis
|
|
38
|
+
|
|
39
|
+
- Scripts containing the keyword "GENESIS-5654" are known false positives and are automatically excluded from triggering alerts. Ensure that any legitimate scripts using this keyword are documented to prevent unnecessary investigations.
|
|
40
|
+
- Legitimate administrative scripts that use negative indexing for valid purposes may trigger false positives. Review these scripts and consider adding them to an exception list if they are frequently flagged but verified as non-malicious.
|
|
41
|
+
- Automated scripts generated by trusted software that use similar obfuscation patterns for performance or compatibility reasons can be excluded by identifying unique identifiers or patterns within these scripts and updating the exclusion criteria accordingly.
|
|
42
|
+
- Regularly update the exclusion list to include new patterns or identifiers from trusted sources as they are identified, ensuring that legitimate activities are not hindered by the detection rule.
|
|
43
|
+
- Collaborate with IT and security teams to maintain a list of known safe scripts and their characteristics, which can be referenced when analyzing potential false positives.
|
|
44
|
+
|
|
45
|
+
### Response and remediation
|
|
46
|
+
|
|
47
|
+
- Isolate the affected host immediately to prevent further spread of potentially malicious scripts or unauthorized access.
|
|
48
|
+
- Terminate any suspicious PowerShell processes identified by the alert to halt ongoing obfuscation activities.
|
|
49
|
+
- Conduct a thorough review of the PowerShell script block text and related logs to identify any malicious payloads or commands executed.
|
|
50
|
+
- Remove any identified malicious scripts or files from the affected system to prevent re-execution.
|
|
51
|
+
- Reset credentials for any user accounts involved in the alert to mitigate potential unauthorized access.
|
|
52
|
+
- Escalate the incident to the security operations team for further analysis and to determine if additional systems are compromised.
|
|
53
|
+
- Update endpoint protection and monitoring tools to enhance detection capabilities for similar obfuscation techniques in the future.
|
|
54
|
+
"""
|
|
55
|
+
risk_score = 21
|
|
56
|
+
rule_id = "9edd1804-83c7-4e48-b97d-c776b4c97564"
|
|
57
|
+
setup = """## Setup
|
|
58
|
+
|
|
59
|
+
The 'PowerShell Script Block Logging' logging policy must be enabled.
|
|
60
|
+
Steps to implement the logging policy with Advanced Audit Configuration:
|
|
61
|
+
|
|
62
|
+
```
|
|
63
|
+
Computer Configuration >
|
|
64
|
+
Administrative Templates >
|
|
65
|
+
Windows PowerShell >
|
|
66
|
+
Turn on PowerShell Script Block Logging (Enable)
|
|
67
|
+
```
|
|
68
|
+
|
|
69
|
+
Steps to implement the logging policy via registry:
|
|
70
|
+
|
|
71
|
+
```
|
|
72
|
+
reg add "hklm\\SOFTWARE\\Policies\\Microsoft\\Windows\\PowerShell\\ScriptBlockLogging" /v EnableScriptBlockLogging /t REG_DWORD /d 1
|
|
73
|
+
```
|
|
74
|
+
"""
|
|
75
|
+
severity = "low"
|
|
76
|
+
tags = [
|
|
77
|
+
"Domain: Endpoint",
|
|
78
|
+
"OS: Windows",
|
|
79
|
+
"Use Case: Threat Detection",
|
|
80
|
+
"Tactic: Defense Evasion",
|
|
81
|
+
"Data Source: PowerShell Logs",
|
|
82
|
+
"Resources: Investigation Guide",
|
|
83
|
+
]
|
|
84
|
+
timestamp_override = "event.ingested"
|
|
85
|
+
type = "esql"
|
|
86
|
+
|
|
87
|
+
query = '''
|
|
88
|
+
from logs-windows.powershell_operational* metadata _id, _version, _index
|
|
89
|
+
| where event.code == "4104"
|
|
90
|
+
|
|
91
|
+
// Filter out smaller scripts that are unlikely to implement obfuscation using the patterns we are looking for
|
|
92
|
+
| eval Esql.script_block_length = length(powershell.file.script_block_text)
|
|
93
|
+
| where Esql.script_block_length > 500
|
|
94
|
+
|
|
95
|
+
// replace the patterns we are looking for with the 🔥 emoji to enable counting them
|
|
96
|
+
// The emoji is used because it's unlikely to appear in scripts and has a consistent character length of 1
|
|
97
|
+
| eval Esql.script_block_tmp = replace(
|
|
98
|
+
powershell.file.script_block_text,
|
|
99
|
+
"""\$\w+\[\-\s?1\.\.""",
|
|
100
|
+
"🔥"
|
|
101
|
+
)
|
|
102
|
+
|
|
103
|
+
// count how many patterns were detected by calculating the number of 🔥 characters inserted
|
|
104
|
+
| eval Esql.script_block_pattern_count = length(Esql.script_block_tmp) - length(replace(Esql.script_block_tmp, "🔥", ""))
|
|
105
|
+
|
|
106
|
+
// keep the fields relevant to the query, although this is not needed as the alert is populated using _id
|
|
107
|
+
| keep
|
|
108
|
+
Esql.script_block_pattern_count,
|
|
109
|
+
Esql.script_block_length,
|
|
110
|
+
Esql.script_block_tmp,
|
|
111
|
+
powershell.file.script_block_text,
|
|
112
|
+
powershell.file.script_block_id,
|
|
113
|
+
file.path,
|
|
114
|
+
powershell.sequence,
|
|
115
|
+
powershell.total,
|
|
116
|
+
_id,
|
|
117
|
+
_index,
|
|
118
|
+
host.name,
|
|
119
|
+
agent.id,
|
|
120
|
+
user.id
|
|
121
|
+
|
|
122
|
+
// Filter for scripts that match the pattern at least once
|
|
123
|
+
| where Esql.script_block_pattern_count >= 1
|
|
124
|
+
|
|
125
|
+
// FP Patterns
|
|
126
|
+
| where not powershell.file.script_block_text like "*GENESIS-5654*"
|
|
127
|
+
'''
|
|
128
|
+
|
|
129
|
+
|
|
130
|
+
[[rule.threat]]
|
|
131
|
+
framework = "MITRE ATT&CK"
|
|
132
|
+
[[rule.threat.technique]]
|
|
133
|
+
id = "T1027"
|
|
134
|
+
name = "Obfuscated Files or Information"
|
|
135
|
+
reference = "https://attack.mitre.org/techniques/T1027/"
|
|
136
|
+
|
|
137
|
+
[[rule.threat.technique]]
|
|
138
|
+
id = "T1140"
|
|
139
|
+
name = "Deobfuscate/Decode Files or Information"
|
|
140
|
+
reference = "https://attack.mitre.org/techniques/T1140/"
|
|
141
|
+
|
|
142
|
+
|
|
143
|
+
[rule.threat.tactic]
|
|
144
|
+
id = "TA0005"
|
|
145
|
+
name = "Defense Evasion"
|
|
146
|
+
reference = "https://attack.mitre.org/tactics/TA0005/"
|
|
147
|
+
[[rule.threat]]
|
|
148
|
+
framework = "MITRE ATT&CK"
|
|
149
|
+
[[rule.threat.technique]]
|
|
150
|
+
id = "T1059"
|
|
151
|
+
name = "Command and Scripting Interpreter"
|
|
152
|
+
reference = "https://attack.mitre.org/techniques/T1059/"
|
|
153
|
+
[[rule.threat.technique.subtechnique]]
|
|
154
|
+
id = "T1059.001"
|
|
155
|
+
name = "PowerShell"
|
|
156
|
+
reference = "https://attack.mitre.org/techniques/T1059/001/"
|
|
157
|
+
|
|
158
|
+
|
|
159
|
+
|
|
160
|
+
[rule.threat.tactic]
|
|
161
|
+
id = "TA0002"
|
|
162
|
+
name = "Execution"
|
|
163
|
+
reference = "https://attack.mitre.org/tactics/TA0002/"
|
|
164
|
+
|
|
@@ -0,0 +1,155 @@
|
|
|
1
|
+
[metadata]
|
|
2
|
+
creation_date = "2025/04/14"
|
|
3
|
+
integration = ["windows"]
|
|
4
|
+
maturity = "production"
|
|
5
|
+
updated_date = "2025/08/14"
|
|
6
|
+
|
|
7
|
+
[rule]
|
|
8
|
+
author = ["Elastic"]
|
|
9
|
+
description = """
|
|
10
|
+
Identifies PowerShell scripts that use reversed strings as a form of obfuscation. These methods are designed to evade
|
|
11
|
+
static analysis and bypass security protections such as the Antimalware Scan Interface (AMSI).
|
|
12
|
+
"""
|
|
13
|
+
from = "now-9m"
|
|
14
|
+
language = "esql"
|
|
15
|
+
license = "Elastic License v2"
|
|
16
|
+
name = "Potential PowerShell Obfuscation via Reverse Keywords"
|
|
17
|
+
note = """ ## Triage and analysis
|
|
18
|
+
|
|
19
|
+
> **Disclaimer**:
|
|
20
|
+
> This investigation guide was created using generative AI technology and has been reviewed to improve its accuracy and relevance. While every effort has been made to ensure its quality, we recommend validating the content and adapting it to suit your specific environment and operational needs.
|
|
21
|
+
|
|
22
|
+
### Investigating Potential PowerShell Obfuscation via Reverse Keywords
|
|
23
|
+
|
|
24
|
+
PowerShell, a powerful scripting language in Windows environments, is often targeted by adversaries for obfuscation to bypass security measures like AMSI. Attackers reverse keywords in scripts to evade static analysis. The detection rule identifies such obfuscation by searching for reversed keywords, replacing them with a unique marker, and counting occurrences. This helps in flagging scripts with multiple obfuscated elements, indicating potential malicious activity.
|
|
25
|
+
|
|
26
|
+
### Possible investigation steps
|
|
27
|
+
|
|
28
|
+
- Review the `powershell.file.script_block_text` field to understand the context and content of the script that triggered the alert. Look for any suspicious or unexpected behavior in the script logic.
|
|
29
|
+
- Examine the `file.path` field to determine the location of the script on the system. This can provide insights into whether the script is part of a legitimate application or potentially malicious.
|
|
30
|
+
- Check the `powershell.file.script_block_id` and `powershell.sequence` fields to identify if the script is part of a larger sequence of commands. This can help in understanding the full scope of the script's execution.
|
|
31
|
+
- Investigate the `agent.id` field to identify the specific endpoint where the script was executed. This can help in correlating with other alerts or logs from the same machine.
|
|
32
|
+
- Assess the `count` field to determine the extent of obfuscation. A higher count may indicate a more heavily obfuscated script, suggesting a higher likelihood of malicious intent.
|
|
33
|
+
|
|
34
|
+
### False positive analysis
|
|
35
|
+
|
|
36
|
+
- Scripts with legitimate administrative functions may use reversed keywords for benign purposes, such as custom logging or debugging. Review the context of the script to determine if the usage is intentional and non-malicious.
|
|
37
|
+
- Automated scripts generated by legitimate software tools might include reversed keywords as part of their normal operation. Identify these tools and create exceptions for their known script patterns to prevent unnecessary alerts.
|
|
38
|
+
- Developers or IT personnel might use reversed keywords in test environments to simulate obfuscation techniques. Ensure these environments are well-documented and excluded from production monitoring to avoid false positives.
|
|
39
|
+
- PowerShell scripts used in educational or training settings may intentionally include obfuscation techniques for learning purposes. Exclude these scripts by identifying their unique characteristics or file paths.
|
|
40
|
+
- Regularly update the list of excluded scripts or patterns as new legitimate use cases are identified, ensuring the detection rule remains effective without generating excessive false positives.
|
|
41
|
+
|
|
42
|
+
### Response and remediation
|
|
43
|
+
|
|
44
|
+
- Isolate the affected system from the network to prevent further spread of potentially malicious scripts.
|
|
45
|
+
- Terminate any suspicious PowerShell processes identified by the alert to halt ongoing malicious activity.
|
|
46
|
+
- Conduct a thorough review of the script block text and associated files to understand the scope and intent of the obfuscation.
|
|
47
|
+
- Remove or quarantine any identified malicious scripts or files from the system to prevent re-execution.
|
|
48
|
+
- Restore affected systems from a known good backup if malicious activity has altered system integrity.
|
|
49
|
+
- Update endpoint protection and security tools to recognize and block similar obfuscation techniques in the future.
|
|
50
|
+
- Escalate the incident to the security operations center (SOC) or incident response team for further investigation and monitoring of potential lateral movement or additional threats.
|
|
51
|
+
"""
|
|
52
|
+
risk_score = 21
|
|
53
|
+
rule_id = "f38633f4-3b31-4c80-b13d-e77c70ce8254"
|
|
54
|
+
setup = """## Setup
|
|
55
|
+
|
|
56
|
+
The 'PowerShell Script Block Logging' logging policy must be enabled.
|
|
57
|
+
Steps to implement the logging policy with Advanced Audit Configuration:
|
|
58
|
+
|
|
59
|
+
```
|
|
60
|
+
Computer Configuration >
|
|
61
|
+
Administrative Templates >
|
|
62
|
+
Windows PowerShell >
|
|
63
|
+
Turn on PowerShell Script Block Logging (Enable)
|
|
64
|
+
```
|
|
65
|
+
|
|
66
|
+
Steps to implement the logging policy via registry:
|
|
67
|
+
|
|
68
|
+
```
|
|
69
|
+
reg add "hklm\\SOFTWARE\\Policies\\Microsoft\\Windows\\PowerShell\\ScriptBlockLogging" /v EnableScriptBlockLogging /t REG_DWORD /d 1
|
|
70
|
+
```
|
|
71
|
+
"""
|
|
72
|
+
severity = "low"
|
|
73
|
+
tags = [
|
|
74
|
+
"Domain: Endpoint",
|
|
75
|
+
"OS: Windows",
|
|
76
|
+
"Use Case: Threat Detection",
|
|
77
|
+
"Tactic: Defense Evasion",
|
|
78
|
+
"Data Source: PowerShell Logs",
|
|
79
|
+
"Resources: Investigation Guide",
|
|
80
|
+
]
|
|
81
|
+
timestamp_override = "event.ingested"
|
|
82
|
+
type = "esql"
|
|
83
|
+
|
|
84
|
+
query = '''
|
|
85
|
+
from logs-windows.powershell_operational* metadata _id, _version, _index
|
|
86
|
+
| where event.code == "4104"
|
|
87
|
+
|
|
88
|
+
// Filter for scripts that contains these keywords using MATCH, boosts the query performance,
|
|
89
|
+
// match will ignore the | and look for the individual words
|
|
90
|
+
| where powershell.file.script_block_text : "rahc|metsys|stekcos|tcejboimw|ecalper|ecnerferpe|noitcennoc|nioj|eman|vne|gnirts|tcejbo-wen|_23niw|noisserpxe|ekovni|daolnwod"
|
|
91
|
+
|
|
92
|
+
// replace the patterns we are looking for with the 🔥 emoji to enable counting them
|
|
93
|
+
// The emoji is used because it's unlikely to appear in scripts and has a consistent character length of 1
|
|
94
|
+
| eval Esql.script_block_tmp = replace(
|
|
95
|
+
powershell.file.script_block_text,
|
|
96
|
+
"""(?i)(rahc|metsys|stekcos|tcejboimw|ecalper|ecnerferpe|noitcennoc|nioj|eman\.|:vne$|gnirts|tcejbo-wen|_23niw|noisserpxe|ekovni|daolnwod)""",
|
|
97
|
+
"🔥"
|
|
98
|
+
)
|
|
99
|
+
|
|
100
|
+
// count how many patterns were detected by calculating the number of 🔥 characters inserted
|
|
101
|
+
| eval Esql.script_block_pattern_count = length(Esql.script_block_tmp) - length(replace(Esql.script_block_tmp, "🔥", ""))
|
|
102
|
+
|
|
103
|
+
// keep the fields relevant to the query, although this is not needed as the alert is populated using _id
|
|
104
|
+
| keep
|
|
105
|
+
Esql.script_block_pattern_count,
|
|
106
|
+
Esql.script_block_tmp,
|
|
107
|
+
powershell.file.script_block_text,
|
|
108
|
+
powershell.file.script_block_id,
|
|
109
|
+
file.path,
|
|
110
|
+
powershell.sequence,
|
|
111
|
+
powershell.total,
|
|
112
|
+
_id,
|
|
113
|
+
_index,
|
|
114
|
+
agent.id
|
|
115
|
+
|
|
116
|
+
// Filter for scripts that match the pattern at least twice
|
|
117
|
+
| where Esql.script_block_pattern_count >= 2
|
|
118
|
+
'''
|
|
119
|
+
|
|
120
|
+
|
|
121
|
+
[[rule.threat]]
|
|
122
|
+
framework = "MITRE ATT&CK"
|
|
123
|
+
[[rule.threat.technique]]
|
|
124
|
+
id = "T1027"
|
|
125
|
+
name = "Obfuscated Files or Information"
|
|
126
|
+
reference = "https://attack.mitre.org/techniques/T1027/"
|
|
127
|
+
|
|
128
|
+
[[rule.threat.technique]]
|
|
129
|
+
id = "T1140"
|
|
130
|
+
name = "Deobfuscate/Decode Files or Information"
|
|
131
|
+
reference = "https://attack.mitre.org/techniques/T1140/"
|
|
132
|
+
|
|
133
|
+
|
|
134
|
+
[rule.threat.tactic]
|
|
135
|
+
id = "TA0005"
|
|
136
|
+
name = "Defense Evasion"
|
|
137
|
+
reference = "https://attack.mitre.org/tactics/TA0005/"
|
|
138
|
+
[[rule.threat]]
|
|
139
|
+
framework = "MITRE ATT&CK"
|
|
140
|
+
[[rule.threat.technique]]
|
|
141
|
+
id = "T1059"
|
|
142
|
+
name = "Command and Scripting Interpreter"
|
|
143
|
+
reference = "https://attack.mitre.org/techniques/T1059/"
|
|
144
|
+
[[rule.threat.technique.subtechnique]]
|
|
145
|
+
id = "T1059.001"
|
|
146
|
+
name = "PowerShell"
|
|
147
|
+
reference = "https://attack.mitre.org/techniques/T1059/001/"
|
|
148
|
+
|
|
149
|
+
|
|
150
|
+
|
|
151
|
+
[rule.threat.tactic]
|
|
152
|
+
id = "TA0002"
|
|
153
|
+
name = "Execution"
|
|
154
|
+
reference = "https://attack.mitre.org/tactics/TA0002/"
|
|
155
|
+
|
|
@@ -0,0 +1,159 @@
|
|
|
1
|
+
[metadata]
|
|
2
|
+
creation_date = "2025/04/14"
|
|
3
|
+
integration = ["windows"]
|
|
4
|
+
maturity = "production"
|
|
5
|
+
updated_date = "2025/07/16"
|
|
6
|
+
|
|
7
|
+
[rule]
|
|
8
|
+
author = ["Elastic"]
|
|
9
|
+
description = """
|
|
10
|
+
Identifies PowerShell scripts that use string concatenation as a form of obfuscation. These methods are designed to
|
|
11
|
+
evade static analysis and bypass security protections such as the Antimalware Scan Interface (AMSI).
|
|
12
|
+
"""
|
|
13
|
+
from = "now-9m"
|
|
14
|
+
language = "esql"
|
|
15
|
+
license = "Elastic License v2"
|
|
16
|
+
name = "Potential PowerShell Obfuscation via String Concatenation"
|
|
17
|
+
note = """ ## Triage and analysis
|
|
18
|
+
|
|
19
|
+
> **Disclaimer**:
|
|
20
|
+
> This investigation guide was created using generative AI technology and has been reviewed to improve its accuracy and relevance. While every effort has been made to ensure its quality, we recommend validating the content and adapting it to suit your specific environment and operational needs.
|
|
21
|
+
|
|
22
|
+
### Investigating Potential PowerShell Obfuscation via String Concatenation
|
|
23
|
+
|
|
24
|
+
PowerShell is a powerful scripting language used for task automation and configuration management. Adversaries exploit its flexibility to obfuscate malicious scripts, often using string concatenation to evade detection. The detection rule identifies scripts with excessive concatenation patterns, flagging potential obfuscation by analyzing script length and pattern frequency, thus aiding in uncovering hidden threats.
|
|
25
|
+
|
|
26
|
+
### Possible investigation steps
|
|
27
|
+
|
|
28
|
+
- Review the powershell.file.script_block_text field to understand the content and purpose of the script, focusing on the sections identified by the string concatenation patterns.
|
|
29
|
+
- Examine the file.path field to determine the location of the script on the host system, which can provide context about its origin and potential legitimacy.
|
|
30
|
+
- Check the host.name and agent.id fields to identify the affected system and correlate with other security events or alerts from the same host for broader context.
|
|
31
|
+
- Investigate the user.id field to determine which user executed the script, assessing their role and whether they have a legitimate reason to run such scripts.
|
|
32
|
+
- Analyze the powershell.file.script_block_id and powershell.sequence fields to trace the execution flow and sequence of the script blocks, which may reveal additional obfuscation or malicious behavior.
|
|
33
|
+
- Cross-reference the _id and _index fields with other logs or alerts to identify any related incidents or patterns of activity that might indicate a larger threat campaign.
|
|
34
|
+
|
|
35
|
+
### False positive analysis
|
|
36
|
+
|
|
37
|
+
- Scripts with legitimate string concatenation for logging or configuration purposes may trigger the rule. Review the script context to determine if the concatenation is part of a benign operation.
|
|
38
|
+
- Automated scripts generated by development tools might use string concatenation extensively. Identify these tools and consider excluding their output directories or specific script patterns from the rule.
|
|
39
|
+
- PowerShell scripts used in complex data processing tasks may naturally contain high levels of string concatenation. Analyze the script's purpose and, if deemed safe, add exceptions for specific script block IDs or paths.
|
|
40
|
+
- Frequent administrative scripts that concatenate strings for dynamic command execution could be flagged. Verify the script's source and function, then whitelist known safe scripts by user ID or host name.
|
|
41
|
+
- Consider adjusting the threshold for pattern detection if legitimate scripts frequently exceed the current limit, ensuring that the rule remains effective without generating excessive false positives.
|
|
42
|
+
|
|
43
|
+
### Response and remediation
|
|
44
|
+
|
|
45
|
+
- Isolate the affected host immediately to prevent further spread of potentially malicious scripts across the network. Disconnect it from the network and any shared resources.
|
|
46
|
+
- Terminate any suspicious PowerShell processes identified by the alert to halt the execution of potentially obfuscated scripts.
|
|
47
|
+
- Conduct a thorough examination of the script block text and associated files to identify and remove any malicious code or artifacts. Use a secure, isolated environment for analysis.
|
|
48
|
+
- Restore the affected system from a known good backup if malicious activity is confirmed and cannot be easily remediated.
|
|
49
|
+
- Update and run a full antivirus and antimalware scan on the affected system to ensure no additional threats are present.
|
|
50
|
+
- Escalate the incident to the security operations center (SOC) or incident response team for further investigation and to determine if additional systems are compromised.
|
|
51
|
+
- Implement enhanced monitoring and logging for PowerShell activities across the network to detect similar obfuscation attempts in the future, ensuring that alerts are configured to notify the appropriate personnel promptly.
|
|
52
|
+
"""
|
|
53
|
+
risk_score = 47
|
|
54
|
+
rule_id = "f6d8c743-0916-4483-8333-3c6f107e0caa"
|
|
55
|
+
setup = """## Setup
|
|
56
|
+
|
|
57
|
+
The 'PowerShell Script Block Logging' logging policy must be enabled.
|
|
58
|
+
Steps to implement the logging policy with Advanced Audit Configuration:
|
|
59
|
+
|
|
60
|
+
```
|
|
61
|
+
Computer Configuration >
|
|
62
|
+
Administrative Templates >
|
|
63
|
+
Windows PowerShell >
|
|
64
|
+
Turn on PowerShell Script Block Logging (Enable)
|
|
65
|
+
```
|
|
66
|
+
|
|
67
|
+
Steps to implement the logging policy via registry:
|
|
68
|
+
|
|
69
|
+
```
|
|
70
|
+
reg add "hklm\\SOFTWARE\\Policies\\Microsoft\\Windows\\PowerShell\\ScriptBlockLogging" /v EnableScriptBlockLogging /t REG_DWORD /d 1
|
|
71
|
+
```
|
|
72
|
+
"""
|
|
73
|
+
severity = "medium"
|
|
74
|
+
tags = [
|
|
75
|
+
"Domain: Endpoint",
|
|
76
|
+
"OS: Windows",
|
|
77
|
+
"Use Case: Threat Detection",
|
|
78
|
+
"Tactic: Defense Evasion",
|
|
79
|
+
"Data Source: PowerShell Logs",
|
|
80
|
+
"Resources: Investigation Guide",
|
|
81
|
+
]
|
|
82
|
+
timestamp_override = "event.ingested"
|
|
83
|
+
type = "esql"
|
|
84
|
+
|
|
85
|
+
query = '''
|
|
86
|
+
from logs-windows.powershell_operational* metadata _id, _version, _index
|
|
87
|
+
| where event.code == "4104"
|
|
88
|
+
|
|
89
|
+
// Filter out smaller scripts that are unlikely to implement obfuscation using the patterns we are looking for
|
|
90
|
+
| eval Esql.script_block_length = length(powershell.file.script_block_text)
|
|
91
|
+
| where Esql.script_block_length > 500
|
|
92
|
+
|
|
93
|
+
// replace the patterns we are looking for with the 🔥 emoji to enable counting them
|
|
94
|
+
// The emoji is used because it's unlikely to appear in scripts and has a consistent character length of 1
|
|
95
|
+
| eval Esql.script_block_tmp = replace(
|
|
96
|
+
powershell.file.script_block_text,
|
|
97
|
+
"""['"][A-Za-z0-9.]+['"](\s?\+\s?['"][A-Za-z0-9.,\-\s]+['"]){2,}""",
|
|
98
|
+
"🔥"
|
|
99
|
+
)
|
|
100
|
+
|
|
101
|
+
// count how many patterns were detected by calculating the number of 🔥 characters inserted
|
|
102
|
+
| eval Esql.script_block_pattern_count = length(Esql.script_block_tmp) - length(replace(Esql.script_block_tmp, "🔥", ""))
|
|
103
|
+
|
|
104
|
+
// keep the fields relevant to the query, although this is not needed as the alert is populated using _id
|
|
105
|
+
| keep
|
|
106
|
+
Esql.script_block_pattern_count,
|
|
107
|
+
Esql.script_block_length,
|
|
108
|
+
Esql.script_block_tmp,
|
|
109
|
+
powershell.file.script_block_text,
|
|
110
|
+
powershell.file.script_block_id,
|
|
111
|
+
file.path,
|
|
112
|
+
powershell.sequence,
|
|
113
|
+
powershell.total,
|
|
114
|
+
_id,
|
|
115
|
+
_index,
|
|
116
|
+
host.name,
|
|
117
|
+
agent.id,
|
|
118
|
+
user.id
|
|
119
|
+
|
|
120
|
+
// Filter for scripts that match the pattern at least twice
|
|
121
|
+
| where Esql.script_block_pattern_count >= 2
|
|
122
|
+
'''
|
|
123
|
+
|
|
124
|
+
|
|
125
|
+
[[rule.threat]]
|
|
126
|
+
framework = "MITRE ATT&CK"
|
|
127
|
+
[[rule.threat.technique]]
|
|
128
|
+
id = "T1027"
|
|
129
|
+
name = "Obfuscated Files or Information"
|
|
130
|
+
reference = "https://attack.mitre.org/techniques/T1027/"
|
|
131
|
+
|
|
132
|
+
[[rule.threat.technique]]
|
|
133
|
+
id = "T1140"
|
|
134
|
+
name = "Deobfuscate/Decode Files or Information"
|
|
135
|
+
reference = "https://attack.mitre.org/techniques/T1140/"
|
|
136
|
+
|
|
137
|
+
|
|
138
|
+
[rule.threat.tactic]
|
|
139
|
+
id = "TA0005"
|
|
140
|
+
name = "Defense Evasion"
|
|
141
|
+
reference = "https://attack.mitre.org/tactics/TA0005/"
|
|
142
|
+
[[rule.threat]]
|
|
143
|
+
framework = "MITRE ATT&CK"
|
|
144
|
+
[[rule.threat.technique]]
|
|
145
|
+
id = "T1059"
|
|
146
|
+
name = "Command and Scripting Interpreter"
|
|
147
|
+
reference = "https://attack.mitre.org/techniques/T1059/"
|
|
148
|
+
[[rule.threat.technique.subtechnique]]
|
|
149
|
+
id = "T1059.001"
|
|
150
|
+
name = "PowerShell"
|
|
151
|
+
reference = "https://attack.mitre.org/techniques/T1059/001/"
|
|
152
|
+
|
|
153
|
+
|
|
154
|
+
|
|
155
|
+
[rule.threat.tactic]
|
|
156
|
+
id = "TA0002"
|
|
157
|
+
name = "Execution"
|
|
158
|
+
reference = "https://attack.mitre.org/tactics/TA0002/"
|
|
159
|
+
|
|
@@ -0,0 +1,178 @@
|
|
|
1
|
+
[metadata]
|
|
2
|
+
creation_date = "2025/04/03"
|
|
3
|
+
integration = ["windows"]
|
|
4
|
+
maturity = "production"
|
|
5
|
+
updated_date = "2025/08/14"
|
|
6
|
+
|
|
7
|
+
[rule]
|
|
8
|
+
author = ["Elastic"]
|
|
9
|
+
description = """
|
|
10
|
+
Identifies PowerShell scripts that use string reordering and runtime reconstruction techniques as a form of obfuscation.
|
|
11
|
+
These methods are designed to evade static analysis and bypass security protections such as the Antimalware Scan
|
|
12
|
+
Interface (AMSI).
|
|
13
|
+
"""
|
|
14
|
+
from = "now-9m"
|
|
15
|
+
language = "esql"
|
|
16
|
+
license = "Elastic License v2"
|
|
17
|
+
name = "Potential PowerShell Obfuscation via String Reordering"
|
|
18
|
+
note = """ ## Triage and analysis
|
|
19
|
+
|
|
20
|
+
> **Disclaimer**:
|
|
21
|
+
> This investigation guide was created using generative AI technology and has been reviewed to improve its accuracy and relevance. While every effort has been made to ensure its quality, we recommend validating the content and adapting it to suit your specific environment and operational needs.
|
|
22
|
+
|
|
23
|
+
### Investigating Potential PowerShell Obfuscation via String Reordering
|
|
24
|
+
|
|
25
|
+
PowerShell, a powerful scripting language in Windows environments, can be exploited by adversaries using obfuscation techniques like string reordering to evade detection. This involves rearranging strings and reconstructing them at runtime, bypassing static analysis and security measures. The detection rule identifies scripts with excessive length and specific patterns, flagging those with multiple occurrences of string format expressions, which are indicative of obfuscation attempts. By filtering out known benign patterns, it reduces false positives, focusing on genuine threats.
|
|
26
|
+
|
|
27
|
+
### Possible investigation steps
|
|
28
|
+
|
|
29
|
+
- Review the script block text by examining the powershell.file.script_block_text field to understand the nature of the obfuscation and identify any potentially malicious commands or patterns.
|
|
30
|
+
- Check the file.path and file.name fields to determine the origin and context of the script, which can provide insights into whether the script is part of a legitimate application or a potential threat.
|
|
31
|
+
- Investigate the host.name and user.id fields to identify the affected system and user, which can help in assessing the potential impact and scope of the incident.
|
|
32
|
+
- Analyze the powershell.file.script_block_id and powershell.sequence fields to trace the execution sequence and history of the script, which may reveal additional suspicious activities or related scripts.
|
|
33
|
+
- Correlate the alert with other security events or logs from the same host or user to identify any patterns or additional indicators of compromise that may suggest a broader attack campaign.
|
|
34
|
+
|
|
35
|
+
### False positive analysis
|
|
36
|
+
|
|
37
|
+
- Scripts related to the Icinga Framework may trigger false positives due to their use of string formatting. To handle this, ensure that the file name "framework_cache.psm1" is excluded from the detection rule.
|
|
38
|
+
- PowerShell scripts that include specific sentinel patterns, such as "sentinelbreakpoints" or paths like ":::::\\windows\\sentinel", combined with variables like "$local:Bypassed" or "origPSExecutionPolicyPreference", are known to be benign. These should be excluded to reduce noise.
|
|
39
|
+
- Regularly review and update the exclusion list to include any new benign patterns that are identified over time, ensuring the rule remains effective without generating unnecessary alerts.
|
|
40
|
+
- Consider implementing a whitelist of known safe scripts or script authors to further minimize false positives, especially in environments with frequent legitimate use of complex PowerShell scripts.
|
|
41
|
+
|
|
42
|
+
### Response and remediation
|
|
43
|
+
|
|
44
|
+
- Isolate the affected system from the network to prevent further spread of potentially malicious scripts.
|
|
45
|
+
- Terminate any suspicious PowerShell processes identified by the alert to stop ongoing malicious activity.
|
|
46
|
+
- Conduct a thorough review of the PowerShell script block text flagged by the alert to understand the intent and potential impact of the obfuscated script.
|
|
47
|
+
- Remove any malicious scripts or files identified during the investigation from the affected system to prevent re-execution.
|
|
48
|
+
- Restore the system from a known good backup if the script has caused significant changes or damage to the system.
|
|
49
|
+
- Update and strengthen endpoint protection measures, ensuring that AMSI and other security tools are fully operational and configured to detect similar obfuscation techniques.
|
|
50
|
+
- Escalate the incident to the security operations center (SOC) or incident response team for further analysis and to determine if additional systems are affected.
|
|
51
|
+
"""
|
|
52
|
+
risk_score = 21
|
|
53
|
+
rule_id = "e903ce9a-5ce6-4246-bb14-75ed3ec2edf5"
|
|
54
|
+
setup = """## Setup
|
|
55
|
+
|
|
56
|
+
The 'PowerShell Script Block Logging' logging policy must be enabled.
|
|
57
|
+
Steps to implement the logging policy with Advanced Audit Configuration:
|
|
58
|
+
|
|
59
|
+
```
|
|
60
|
+
Computer Configuration >
|
|
61
|
+
Administrative Templates >
|
|
62
|
+
Windows PowerShell >
|
|
63
|
+
Turn on PowerShell Script Block Logging (Enable)
|
|
64
|
+
```
|
|
65
|
+
|
|
66
|
+
Steps to implement the logging policy via registry:
|
|
67
|
+
|
|
68
|
+
```
|
|
69
|
+
reg add "hklm\\SOFTWARE\\Policies\\Microsoft\\Windows\\PowerShell\\ScriptBlockLogging" /v EnableScriptBlockLogging /t REG_DWORD /d 1
|
|
70
|
+
```
|
|
71
|
+
"""
|
|
72
|
+
severity = "low"
|
|
73
|
+
tags = [
|
|
74
|
+
"Domain: Endpoint",
|
|
75
|
+
"OS: Windows",
|
|
76
|
+
"Use Case: Threat Detection",
|
|
77
|
+
"Tactic: Defense Evasion",
|
|
78
|
+
"Data Source: PowerShell Logs",
|
|
79
|
+
"Resources: Investigation Guide",
|
|
80
|
+
]
|
|
81
|
+
timestamp_override = "event.ingested"
|
|
82
|
+
type = "esql"
|
|
83
|
+
|
|
84
|
+
query = '''
|
|
85
|
+
from logs-windows.powershell_operational* metadata _id, _version, _index
|
|
86
|
+
| where event.code == "4104" and powershell.file.script_block_text like "*{0}*"
|
|
87
|
+
|
|
88
|
+
// Filter out smaller scripts that are unlikely to implement obfuscation using the patterns we are looking for
|
|
89
|
+
| eval Esql.script_block_length = length(powershell.file.script_block_text)
|
|
90
|
+
| where Esql.script_block_length > 500
|
|
91
|
+
|
|
92
|
+
// replace the patterns we are looking for with the 🔥 emoji to enable counting them
|
|
93
|
+
// The emoji is used because it's unlikely to appear in scripts and has a consistent character length of 1
|
|
94
|
+
| eval Esql.script_block_tmp = replace(
|
|
95
|
+
powershell.file.script_block_text,
|
|
96
|
+
"""((\{\d+\}){2,}["']\s?-f|::Format[^\{]+(\{\d+\}){2,})""",
|
|
97
|
+
"🔥"
|
|
98
|
+
)
|
|
99
|
+
|
|
100
|
+
// count how many patterns were detected by calculating the number of 🔥 characters inserted
|
|
101
|
+
| eval Esql.script_block_pattern_count = length(Esql.script_block_tmp) - length(replace(Esql.script_block_tmp, "🔥", ""))
|
|
102
|
+
|
|
103
|
+
// keep the fields relevant to the query, although this is not needed as the alert is populated using _id
|
|
104
|
+
| keep
|
|
105
|
+
Esql.script_block_pattern_count,
|
|
106
|
+
Esql.script_block_length,
|
|
107
|
+
Esql.script_block_tmp,
|
|
108
|
+
powershell.file.script_block_text,
|
|
109
|
+
powershell.file.script_block_id,
|
|
110
|
+
file.path,
|
|
111
|
+
file.directory,
|
|
112
|
+
powershell.sequence,
|
|
113
|
+
powershell.total,
|
|
114
|
+
_id,
|
|
115
|
+
_index,
|
|
116
|
+
host.name,
|
|
117
|
+
agent.id,
|
|
118
|
+
user.id
|
|
119
|
+
|
|
120
|
+
// Filter for scripts that match the pattern at least four times
|
|
121
|
+
| where Esql.script_block_pattern_count >= 4
|
|
122
|
+
|
|
123
|
+
// Exclude Noisy Patterns
|
|
124
|
+
|
|
125
|
+
// Icinga Framework
|
|
126
|
+
| where not file.directory == "C:\\Program Files\\WindowsPowerShell\\Modules\\icinga-powershell-framework\\cache"
|
|
127
|
+
// ESQL requires this condition, otherwise it only returns matches where file.directory exists.
|
|
128
|
+
or file.directory IS NULL
|
|
129
|
+
|
|
130
|
+
| where not (powershell.file.script_block_text LIKE "*GitBranchStatus*" AND
|
|
131
|
+
powershell.file.script_block_text LIKE "*$s.BranchBehindStatusSymbol.Text*")
|
|
132
|
+
| where not
|
|
133
|
+
// https://wtfbins.wtf/17
|
|
134
|
+
(
|
|
135
|
+
(powershell.file.script_block_text like "*sentinelbreakpoints*" or
|
|
136
|
+
powershell.file.script_block_text like "*:::::\\\\windows\\\\sentinel*")
|
|
137
|
+
and
|
|
138
|
+
(powershell.file.script_block_text like "*$local:Bypassed*" or
|
|
139
|
+
powershell.file.script_block_text like "*origPSExecutionPolicyPreference*")
|
|
140
|
+
)
|
|
141
|
+
'''
|
|
142
|
+
|
|
143
|
+
|
|
144
|
+
[[rule.threat]]
|
|
145
|
+
framework = "MITRE ATT&CK"
|
|
146
|
+
[[rule.threat.technique]]
|
|
147
|
+
id = "T1027"
|
|
148
|
+
name = "Obfuscated Files or Information"
|
|
149
|
+
reference = "https://attack.mitre.org/techniques/T1027/"
|
|
150
|
+
|
|
151
|
+
[[rule.threat.technique]]
|
|
152
|
+
id = "T1140"
|
|
153
|
+
name = "Deobfuscate/Decode Files or Information"
|
|
154
|
+
reference = "https://attack.mitre.org/techniques/T1140/"
|
|
155
|
+
|
|
156
|
+
|
|
157
|
+
[rule.threat.tactic]
|
|
158
|
+
id = "TA0005"
|
|
159
|
+
name = "Defense Evasion"
|
|
160
|
+
reference = "https://attack.mitre.org/tactics/TA0005/"
|
|
161
|
+
[[rule.threat]]
|
|
162
|
+
framework = "MITRE ATT&CK"
|
|
163
|
+
[[rule.threat.technique]]
|
|
164
|
+
id = "T1059"
|
|
165
|
+
name = "Command and Scripting Interpreter"
|
|
166
|
+
reference = "https://attack.mitre.org/techniques/T1059/"
|
|
167
|
+
[[rule.threat.technique.subtechnique]]
|
|
168
|
+
id = "T1059.001"
|
|
169
|
+
name = "PowerShell"
|
|
170
|
+
reference = "https://attack.mitre.org/techniques/T1059/001/"
|
|
171
|
+
|
|
172
|
+
|
|
173
|
+
|
|
174
|
+
[rule.threat.tactic]
|
|
175
|
+
id = "TA0002"
|
|
176
|
+
name = "Execution"
|
|
177
|
+
reference = "https://attack.mitre.org/tactics/TA0002/"
|
|
178
|
+
|