|
510 | 510 | "version": 4 |
511 | 511 | }, |
512 | 512 | "0d3d2254-2b4a-11f0-a019-f661ea17fbcc": { |
513 | | - "rule_name": "Microsoft Entra ID Session Reuse with Suspicious Graph Access", |
514 | | - "sha256": "2ff9a11a69b39d114739b56e1264c1c56b7fa7879955c39fc95314719ddfd722", |
| 513 | + "rule_name": "Microsoft Entra ID Suspicious Session Reuse to Graph Access", |
| 514 | + "sha256": "5d51cd77e355a15effce25681d7c34951a0d647ed54067f8a00cecb2d06c3894", |
515 | 515 | "type": "esql", |
516 | | - "version": 3 |
| 516 | + "version": 4 |
517 | 517 | }, |
518 | 518 | "0d69150b-96f8-467c-a86d-a67a3378ce77": { |
519 | 519 | "rule_name": "Nping Process Activity", |
|
1303 | 1303 | }, |
1304 | 1304 | "203ab79b-239b-4aa5-8e54-fc50623ee8e4": { |
1305 | 1305 | "rule_name": "Creation or Modification of Root Certificate", |
1306 | | - "sha256": "a029643dc698af540c0359ee8ad1f382db3e999941b3514b9d07b2561ee7140c", |
| 1306 | + "sha256": "cb97ac512379616b3ee47f87a9d7a7f6cdc27f77c1aeb2207f6fa1bbc5fa06af", |
1307 | 1307 | "type": "eql", |
1308 | | - "version": 313 |
| 1308 | + "version": 314 |
1309 | 1309 | }, |
1310 | 1310 | "2045567e-b0af-444a-8c0b-0b6e2dae9e13": { |
1311 | 1311 | "rule_name": "AWS Route 53 Domain Transferred to Another Account", |
|
1937 | 1937 | "type": "query", |
1938 | 1938 | "version": 107 |
1939 | 1939 | }, |
| 1940 | + "32144184-7bfa-4541-9c3f-b65f16d24df9": { |
| 1941 | + "rule_name": "Potential Web Shell ASPX File Creation", |
| 1942 | + "sha256": "706d6f81cd64e9b7c43d7e6547570fcd8295082645940422412c06cc142acb03", |
| 1943 | + "type": "eql", |
| 1944 | + "version": 1 |
| 1945 | + }, |
1940 | 1946 | "3216949c-9300-4c53-b57a-221e364c6457": { |
1941 | 1947 | "rule_name": "Unusual High Word Policy Blocks Detected", |
1942 | 1948 | "sha256": "5e62d95bdfadfdce8505ea429f74acce99d2c32d8fc2ca48883884f599022754", |
|
2485 | 2491 | }, |
2486 | 2492 | "403ef0d3-8259-40c9-a5b6-d48354712e49": { |
2487 | 2493 | "rule_name": "Unusual Persistence via Services Registry", |
2488 | | - "sha256": "953108f9385058fa30661eb24193e480e26db93fe546bc034e3e0844a84afe66", |
| 2494 | + "sha256": "3b86134e6a85714e4676aa01b2952e1a4936c55d61269d6858ab4364c23badd8", |
2489 | 2495 | "type": "eql", |
2490 | | - "version": 313 |
| 2496 | + "version": 314 |
2491 | 2497 | }, |
2492 | 2498 | "40ddbcc8-6561-44d9-afc8-eefdbfe0cccd": { |
2493 | 2499 | "rule_name": "Suspicious Modprobe File Event", |
|
2851 | 2857 | }, |
2852 | 2858 | "4bd1c1af-79d4-4d37-9efa-6e0240640242": { |
2853 | 2859 | "rule_name": "Unusual Process Execution Path - Alternate Data Stream", |
2854 | | - "sha256": "631a873fb859163e59464b6b025f23707878dd21c31102ac27a712cbacec2dfe", |
| 2860 | + "sha256": "08f92365c8289d32623711be239952da8e2d840c26fc0c8cd00126ee17684e8f", |
2855 | 2861 | "type": "eql", |
2856 | | - "version": 313 |
| 2862 | + "version": 314 |
2857 | 2863 | }, |
2858 | 2864 | "4c3c6c47-e38f-4944-be27-5c80be973bd7": { |
2859 | 2865 | "rule_name": "Unusual SSHD Child Process", |
|
3037 | 3043 | }, |
3038 | 3044 | "52aaab7b-b51c-441a-89ce-4387b3aea886": { |
3039 | 3045 | "rule_name": "Unusual Network Connection via RunDLL32", |
3040 | | - "sha256": "ae3612661681845eb5f46b07712020784c7c2dd342d10442378a84ae63049b17", |
| 3046 | + "sha256": "9a11f66a5f52ddf8e32658df86dc2ad920a342a4f635228e92331ddee8942239", |
3041 | 3047 | "type": "eql", |
3042 | | - "version": 211 |
| 3048 | + "version": 212 |
3043 | 3049 | }, |
3044 | 3050 | "52afbdc5-db15-485e-bc24-f5707f820c4b": { |
3045 | 3051 | "rule_name": "Unusual Linux Network Activity", |
|
3323 | 3329 | "type": "eql", |
3324 | 3330 | "version": 12 |
3325 | 3331 | }, |
| 3332 | + "5a876e0d-d39a-49b9-8ad8-19c9b622203b": { |
| 3333 | + "rule_name": "Command Line Obfuscation via Whitespace Padding", |
| 3334 | + "sha256": "e8e4200bfd160124ebd18fa2e0136a6e6a467bbd77c38003b4679d2c28ac425a", |
| 3335 | + "type": "esql", |
| 3336 | + "version": 1 |
| 3337 | + }, |
3326 | 3338 | "5ab49127-b1b3-46e6-8a38-9e8512a2a363": { |
3327 | 3339 | "rule_name": "ROT Encoded Python Script Execution", |
3328 | 3340 | "sha256": "2b7ba34e350a043c0b1190aa7a10e4c9ccc9d59bdc70a8557087fa86129f17ad", |
|
3379 | 3391 | }, |
3380 | 3392 | "5bb4a95d-5a08-48eb-80db-4c3a63ec78a8": { |
3381 | 3393 | "rule_name": "Suspicious PrintSpooler Service Executable File Creation", |
3382 | | - "sha256": "84ef186fe1e107f4233f5b31bb8dbb4cc3d9164eda08868b2dcb9c41450e2ac7", |
| 3394 | + "sha256": "70177fc265fa2f24acad68cd0ef289816432b3766a1b8a43e6e4742eeb754522", |
3383 | 3395 | "type": "new_terms", |
3384 | | - "version": 317 |
| 3396 | + "version": 318 |
3385 | 3397 | }, |
3386 | 3398 | "5bda8597-69a6-4b9e-87a2-69a7c963ea83": { |
3387 | 3399 | "rule_name": "Boot File Copy", |
|
3709 | 3721 | }, |
3710 | 3722 | "64f17c52-6c6e-479e-ba72-236f3df18f3d": { |
3711 | 3723 | "rule_name": "Potential PowerShell Obfuscation via Invalid Escape Sequences", |
3712 | | - "sha256": "2deaae9f306ec436dbcaa80ca7c8eedc5a563285015398e4017c49fdeabfa756", |
| 3724 | + "sha256": "fda6cdc3f42b88f38449c8dc374c2474384889313433b94cfc507f47fcf813c9", |
3713 | 3725 | "type": "esql", |
3714 | | - "version": 4 |
| 3726 | + "version": 5 |
3715 | 3727 | }, |
3716 | 3728 | "6505e02e-28dd-41cd-b18f-64e649caa4e2": { |
3717 | 3729 | "rule_name": "Manual Memory Dumping via Proc Filesystem", |
|
3781 | 3793 | }, |
3782 | 3794 | "66883649-f908-4a5b-a1e0-54090a1d3a32": { |
3783 | 3795 | "rule_name": "Connection to Commonly Abused Web Services", |
3784 | | - "sha256": "6a43a05f6e5d1f479ce30211a8231a9e75a714f6cbcc39539e36e4ea0d69677b", |
| 3796 | + "sha256": "e0bcdab50088ca7a1827ec90afe4ec21cf937ffaf9b9069142b1709b1dae722d", |
3785 | 3797 | "type": "eql", |
3786 | | - "version": 120 |
| 3798 | + "version": 121 |
3787 | 3799 | }, |
3788 | 3800 | "66c058f3-99f4-4d18-952b-43348f2577a0": { |
3789 | 3801 | "rule_name": "Linux Process Hooking via GDB", |
|
4075 | 4087 | }, |
4076 | 4088 | "6ea41894-66c3-4df7-ad6b-2c5074eb3df8": { |
4077 | 4089 | "rule_name": "Potential Windows Error Manager Masquerading", |
4078 | | - "sha256": "eec393cdeeee96acead27b0a15500be1195c020ebfdcc3d880d99c8583ce3e8b", |
| 4090 | + "sha256": "5c64c10228a0a54dc71ec736d0ceedf77938cee9b5bc4431aaa0997896c72131", |
4079 | 4091 | "type": "eql", |
4080 | | - "version": 213 |
| 4092 | + "version": 214 |
4081 | 4093 | }, |
4082 | 4094 | "6ea55c81-e2ba-42f2-a134-bccf857ba922": { |
4083 | 4095 | "rule_name": "Security Software Discovery using WMIC", |
|
4766 | 4778 | }, |
4767 | 4779 | "818e23e6-2094-4f0e-8c01-22d30f3506c6": { |
4768 | 4780 | "rule_name": "PowerShell Script Block Logging Disabled", |
4769 | | - "sha256": "a74e2f1d576685aa6609e515d8f65b5beafaa71340e79e88d1d6c46e50c4ae67", |
| 4781 | + "sha256": "c21246a4390e985fe639c73d06b845ffd8a86744834565cfb9a614a61ebc0a22", |
4770 | 4782 | "type": "eql", |
4771 | | - "version": 312 |
| 4783 | + "version": 313 |
4772 | 4784 | }, |
4773 | 4785 | "81cc58f5-8062-49a2-ba84-5cc4b4d31c40": { |
4774 | 4786 | "rule_name": "Persistence via Kernel Module Modification", |
|
4826 | 4838 | }, |
4827 | 4839 | "83bf249e-4348-47ba-9741-1202a09556ad": { |
4828 | 4840 | "rule_name": "Suspicious Windows Powershell Arguments", |
4829 | | - "sha256": "6a54429f392cbcfeb523e95780d8d88fba8ee94dec8f94a146586faccec92ba4", |
| 4841 | + "sha256": "d735d2babf46df807a11f9b74d63af45871886e7e814b0ebdcc72455f852dd6d", |
4830 | 4842 | "type": "eql", |
4831 | | - "version": 206 |
| 4843 | + "version": 207 |
4832 | 4844 | }, |
4833 | 4845 | "83e9c2b3-24ef-4c1d-a8cd-5ebafb5dfa2f": { |
4834 | 4846 | "rule_name": "Attempt to Disable IPTables or Firewall", |
|
5865 | 5877 | }, |
5866 | 5878 | "9f432a8b-9588-4550-838e-1f77285580d3": { |
5867 | 5879 | "rule_name": "Dynamic IEX Reconstruction via Method String Access", |
5868 | | - "sha256": "23f848bcf8ab02b3323f34b311b522159a77a6bf97dcc3d8089023e82dd9f9d1", |
| 5880 | + "sha256": "d780db42a9137fadf25fea4f63c471704e7c6f0b488e4dbb61ceb66ce75e0efc", |
5869 | 5881 | "type": "esql", |
5870 | | - "version": 4 |
| 5882 | + "version": 5 |
5871 | 5883 | }, |
5872 | 5884 | "9f962927-1a4f-45f3-a57b-287f2c7029c1": { |
5873 | 5885 | "rule_name": "Potential Credential Access via DCSync", |
|
6455 | 6467 | }, |
6456 | 6468 | "b0c98cfb-0745-4513-b6f9-08dddb033490": { |
6457 | 6469 | "rule_name": "Potential Dynamic IEX Reconstruction via Environment Variables", |
6458 | | - "sha256": "29e5db5ddaca083a914bfd531f068d353526cd492987ef80ced248ca1a8a5f29", |
| 6470 | + "sha256": "9107236bf5385a208a94f3b3a6934b5e38c8a96c3e94b398a2ca18dfc47a82c6", |
6459 | 6471 | "type": "esql", |
6460 | | - "version": 3 |
| 6472 | + "version": 4 |
6461 | 6473 | }, |
6462 | 6474 | "b11116fd-023c-4718-aeb8-fa9d283fc53b": { |
6463 | 6475 | "rule_name": "Kubeconfig File Creation or Modification", |
|
6989 | 7001 | }, |
6990 | 7002 | "c18975f5-676c-4091-b626-81e8938aa2ee": { |
6991 | 7003 | "rule_name": "Potential RemoteMonologue Attack", |
6992 | | - "sha256": "5bfa9994c043217b1bfb42b4f0028e2871267f04b10dc7ba6898bc97a5f6551c", |
| 7004 | + "sha256": "f6b213b207b6c6bec26cd71b03f0737f031091f4392cb2de1ada95d48a1ed594", |
6993 | 7005 | "type": "eql", |
6994 | | - "version": 2 |
| 7006 | + "version": 3 |
6995 | 7007 | }, |
6996 | 7008 | "c1a9ed70-d349-11ef-841c-f661ea17fbcd": { |
6997 | 7009 | "rule_name": "Unusual AWS S3 Object Encryption with SSE-C", |
|
7440 | 7452 | }, |
7441 | 7453 | "cd89602e-9db0-48e3-9391-ae3bf241acd8": { |
7442 | 7454 | "rule_name": "MFA Deactivation with no Re-Activation for Okta User Account", |
7443 | | - "sha256": "04ca550d18255b6f9e3437537b63cbdeedfe26f51c89cd8415e639ca6e57b68b", |
| 7455 | + "sha256": "ea5c43802417daa4603e8ddd5c129a8c63d3a5fc0bdf6ac8a481e2499dba26db", |
7444 | 7456 | "type": "eql", |
7445 | | - "version": 415 |
| 7457 | + "version": 416 |
7446 | 7458 | }, |
7447 | 7459 | "cdbebdc1-dc97-43c6-a538-f26a20c0a911": { |
7448 | 7460 | "rule_name": "Okta User Session Impersonation", |
|
8420 | 8432 | }, |
8421 | 8433 | "e903ce9a-5ce6-4246-bb14-75ed3ec2edf5": { |
8422 | 8434 | "rule_name": "Potential PowerShell Obfuscation via String Reordering", |
8423 | | - "sha256": "61334267fab7a40c13164b761aa5542572e84f08266faa14e6282c22353baedb", |
| 8435 | + "sha256": "40bf0892c2068fff5e2b61f79cb7b0eedd5aaaa6193bd39a6eb188ef6184aac3", |
8424 | 8436 | "type": "esql", |
8425 | | - "version": 5 |
| 8437 | + "version": 6 |
8426 | 8438 | }, |
8427 | 8439 | "e90ee3af-45fc-432e-a850-4a58cf14a457": { |
8428 | 8440 | "rule_name": "High Number of Okta User Password Reset or Unlock Attempts", |
|
8702 | 8714 | }, |
8703 | 8715 | "f036953a-4615-4707-a1ca-dc53bf69dcd5": { |
8704 | 8716 | "rule_name": "Unusual Child Processes of RunDLL32", |
8705 | | - "sha256": "5c086b3ea051770a44d257ef1b96a70801abf1965e2b5b1d1d4e54aaf3e033db", |
| 8717 | + "sha256": "b38b45cb340ce26c11c6845525f90bf3f24d61b736af9798d56249d3ab3547bd", |
8706 | 8718 | "type": "eql", |
8707 | | - "version": 211 |
| 8719 | + "version": 212 |
8708 | 8720 | }, |
8709 | 8721 | "f0493cb4-9b15-43a9-9359-68c23a7f2cf3": { |
8710 | 8722 | "rule_name": "Suspicious HTML File Creation", |
|
8852 | 8864 | }, |
8853 | 8865 | "f38633f4-3b31-4c80-b13d-e77c70ce8254": { |
8854 | 8866 | "rule_name": "Potential PowerShell Obfuscation via Reverse Keywords", |
8855 | | - "sha256": "1a7bb59668aeb61b005ad82af62c813287c631d756892a3770a2eac56ca9102c", |
| 8867 | + "sha256": "4935469fc2fc470b586e4d5f9667f0e749fdc27c59dd87f33de369314ff2c9c4", |
8856 | 8868 | "type": "esql", |
8857 | | - "version": 3 |
| 8869 | + "version": 4 |
8858 | 8870 | }, |
8859 | 8871 | "f391d3fd-219b-42a3-9ba9-2f66eb0155aa": { |
8860 | 8872 | "rule_name": "Kill Command Execution", |
|
9153 | 9165 | }, |
9154 | 9166 | "f9753455-8d55-4ad8-b70a-e07b6f18deea": { |
9155 | 9167 | "rule_name": "Potential PowerShell Obfuscation via High Special Character Proportion", |
9156 | | - "sha256": "54c9ab288e075807483eab23fbbea59aba7d8f760406d32755b0f297bbfe0810", |
| 9168 | + "sha256": "26098d2afb164e6f05a99cf24bd627301f808c5c1240693437cb14925bfab1c0", |
9157 | 9169 | "type": "esql", |
9158 | | - "version": 2 |
| 9170 | + "version": 3 |
9159 | 9171 | }, |
9160 | 9172 | "f9790abf-bd0c-45f9-8b5f-d0b74015e029": { |
9161 | 9173 | "rule_name": "Privileged Account Brute Force", |
|
9171 | 9183 | }, |
9172 | 9184 | "f9abcddc-a05d-4345-a81d-000b79aa5525": { |
9173 | 9185 | "rule_name": "Potential PowerShell Obfuscation via High Numeric Character Proportion", |
9174 | | - "sha256": "014464fccb4a724e2e3fe5fcc79cc09c6d0fa696ee1d2d18d1a4ebe8c97ac533", |
| 9186 | + "sha256": "fa648e659bffe932aa1fffefe9c560668d631de9217505b3e3a7df813857b011", |
9175 | 9187 | "type": "esql", |
9176 | | - "version": 4 |
| 9188 | + "version": 5 |
9177 | 9189 | }, |
9178 | 9190 | "fa01341d-6662-426b-9d0c-6d81e33c8a9d": { |
9179 | 9191 | "rule_name": "Remote File Copy to a Hidden Share", |
|
0 commit comments