Skip to content

Commit 681debe

Browse files
Apply suggestions from code review
Co-authored-by: Samirbous <[email protected]>
1 parent ba12a57 commit 681debe

File tree

1 file changed

+10
-3
lines changed

1 file changed

+10
-3
lines changed

rules_building_block/execution_mcp_server_child_process.toml

Lines changed: 10 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,12 @@ to execute shell commands, read files, and interact with external services. This
1414
into AI-initiated process execution for correlation with other suspicious activity.
1515
"""
1616
from = "now-9m"
17-
index = ["logs-endpoint.events.process-*"]
17+
index = [
18+
"logs-endpoint.events.process-*",
19+
"logs-windows.sysmon_operational-*",
20+
"logs-m365_defender.event-*",
21+
"logs-sentinel_one_cloud_funnel.*"
22+
]
1823
language = "eql"
1924
license = "Elastic License v2"
2025
name = "GenAI or MCP Server Child Process Execution"
@@ -29,15 +34,17 @@ tags = [
2934
"Use Case: Threat Detection",
3035
"Tactic: Execution",
3136
"Data Source: Elastic Defend",
37+
"Data Source: Sysmon",
38+
"Data Source: Microsoft Defender for Endpoint",
39+
"Data Source: SentinelOne",
3240
"Rule Type: BBR",
3341
"Domain: LLM",
3442
"Mitre Atlas: T0053",
3543
]
3644
timestamp_override = "event.ingested"
3745
type = "eql"
3846
query = '''
39-
process where event.type == "start"
40-
and event.action in ("exec", "executed", "process_started", "start", "ProcessRollup2")
47+
process where event.type == "start"
4148
and (
4249
// GenAI clients
4350
process.parent.name in (

0 commit comments

Comments
 (0)