11[metadata ]
22creation_date = " 2021/01/19"
3- integration = [" endpoint" , " windows" , " system" ]
3+ integration = [" endpoint" , " windows" , " system" , " m365_defender " , " sentinel_one_cloud_funnel " ]
44maturity = " production"
5- updated_date = " 2024/08/07"
5+ updated_date = " 2024/10/10"
6+ min_stack_version = " 8.13.0"
7+ min_stack_comments = " Breaking change at 8.13.0 for SentinelOne Integration."
68
79[rule ]
810author = [" Elastic" ]
@@ -14,23 +16,18 @@ from = "now-9m"
1416index = [
1517 " winlogbeat-*" ,
1618 " logs-endpoint.events.process-*" ,
17- " logs-windows.*" ,
19+ " logs-windows.forwarded*" ,
20+ " logs-windows.sysmon_operational-*" ,
1821 " endgame-*" ,
1922 " logs-system.security*" ,
23+ " logs-m365_defender.event-*" ,
24+ " logs-sentinel_one_cloud_funnel.*" ,
2025]
2126language = " eql"
2227license = " Elastic License v2"
2328name = " Enumeration Command Spawned via WMIPrvSE"
2429risk_score = 21
2530rule_id = " 770e0c4d-b998-41e5-a62e-c7901fd7f470"
26- setup = """ ## Setup
27-
28- If enabling an EQL rule on a non-elastic-agent index (such as beats) for versions <8.2,
29- events will not define `event.ingested` and default fallback for EQL rules was not added until version 8.2.
30- Hence for this rule to work effectively, users will need to add a custom ingest pipeline to populate
31- `event.ingested` to @timestamp.
32- For more details on adding a custom ingest pipeline refer - https://www.elastic.co/guide/en/fleet/current/data-streams-pipeline-tutorial.html
33- """
3431severity = " low"
3532tags = [
3633 " Domain: Endpoint" ,
@@ -40,6 +37,9 @@ tags = [
4037 " Data Source: Elastic Endgame" ,
4138 " Data Source: Elastic Defend" ,
4239 " Data Source: System" ,
40+ " Data Source: Microsoft Defender for Endpoint" ,
41+ " Data Source: Sysmon" ,
42+ " Data Source: SentinelOne" ,
4343]
4444timestamp_override = " event.ingested"
4545type = " eql"
@@ -48,28 +48,9 @@ query = '''
4848process where host.os.type == "windows" and event.type == "start" and process.command_line != null and
4949 process.name:
5050 (
51- "arp.exe",
52- "dsquery.exe",
53- "dsget.exe",
54- "gpresult.exe",
55- "hostname.exe",
56- "ipconfig.exe",
57- "nbtstat.exe",
58- "net.exe",
59- "net1.exe",
60- "netsh.exe",
61- "netstat.exe",
62- "nltest.exe",
63- "ping.exe",
64- "qprocess.exe",
65- "quser.exe",
66- "qwinsta.exe",
67- "reg.exe",
68- "sc.exe",
69- "systeminfo.exe",
70- "tasklist.exe",
71- "tracert.exe",
72- "whoami.exe"
51+ "arp.exe", "dsquery.exe", "dsget.exe", "gpresult.exe", "hostname.exe", "ipconfig.exe", "nbtstat.exe",
52+ "net.exe", "net1.exe", "netsh.exe", "netstat.exe", "nltest.exe", "ping.exe", "qprocess.exe", "quser.exe",
53+ "qwinsta.exe", "reg.exe", "sc.exe", "systeminfo.exe", "tasklist.exe", "tracert.exe", "whoami.exe"
7354 ) and
7455 process.parent.name:"wmiprvse.exe" and
7556 not (
0 commit comments