|
515 | 515 | "version": 5 |
516 | 516 | }, |
517 | 517 | "0ce6487d-8069-4888-9ddd-61b52490cebc": { |
518 | | - "rule_name": "O365 Exchange Suspicious Mailbox Right Delegation", |
519 | | - "sha256": "433ec6996467e5a490dcc8b75069d1b4143e6ef4040333e80228dddd4fe2efd6", |
520 | | - "type": "query", |
521 | | - "version": 210 |
| 518 | + "rule_name": "Suspicious Mailbox Permission Delegation in Exchange Online", |
| 519 | + "sha256": "4d8d3bed1120c39b3997ade0ceb78776ea8e18469df1abfa37bb139ab87fc155", |
| 520 | + "type": "new_terms", |
| 521 | + "version": 211 |
522 | 522 | }, |
523 | 523 | "0d160033-fab7-4e72-85a3-3a9d80c8bff7": { |
524 | 524 | "rule_name": "Multiple Alerts Involving a User", |
525 | 525 | "sha256": "15e804addadde83664812796f8f9823a5c7ebff99e0beb27678162bd9c31e24b", |
526 | 526 | "type": "threshold", |
527 | 527 | "version": 4 |
528 | 528 | }, |
| 529 | + "0d3d2254-2b4a-11f0-a019-f661ea17fbcc": { |
| 530 | + "min_stack_version": "8.17", |
| 531 | + "rule_name": "Microsoft Entra ID Session Reuse with Suspicious Graph Access", |
| 532 | + "sha256": "5c708e3c3878ddd653cdf55f9cbaf029d5b6de268e2681c65df4ccdfd93c3223", |
| 533 | + "type": "esql", |
| 534 | + "version": 1 |
| 535 | + }, |
529 | 536 | "0d69150b-96f8-467c-a86d-a67a3378ce77": { |
530 | 537 | "rule_name": "Nping Process Activity", |
531 | 538 | "sha256": "c4bdbe8b150dc0ae69e6b9976ce317d49affb800b6a372b6b57f7aae39e58093", |
|
1573 | 1580 | "version": 107 |
1574 | 1581 | }, |
1575 | 1582 | "26f68dba-ce29-497b-8e13-b4fde1db5a2d": { |
1576 | | - "rule_name": "Attempts to Brute Force a Microsoft 365 User Account", |
1577 | | - "sha256": "d25046282b20d2a93b29f3016f1dfa97b68488629031ddb7157c032045f36b59", |
| 1583 | + "min_stack_version": "8.17", |
| 1584 | + "previous": { |
| 1585 | + "8.14": { |
| 1586 | + "max_allowable_version": 411, |
| 1587 | + "rule_name": "Attempts to Brute Force a Microsoft 365 User Account", |
| 1588 | + "sha256": "d25046282b20d2a93b29f3016f1dfa97b68488629031ddb7157c032045f36b59", |
| 1589 | + "type": "esql", |
| 1590 | + "version": 312 |
| 1591 | + } |
| 1592 | + }, |
| 1593 | + "rule_name": "Potential Microsoft 365 User Account Brute Force", |
| 1594 | + "sha256": "e19432ea193cb159db6a83bccae69b3a2165162645c22b0f8e36bee3f71ddb29", |
1578 | 1595 | "type": "esql", |
1579 | | - "version": 312 |
| 1596 | + "version": 412 |
1580 | 1597 | }, |
1581 | 1598 | "27071ea3-e806-4697-8abc-e22c92aa4293": { |
1582 | 1599 | "rule_name": "PowerShell Script with Archive Compression Capabilities", |
|
1751 | 1768 | }, |
1752 | 1769 | "2a3f38a8-204e-11f0-9c1f-f661ea17fbcd": { |
1753 | 1770 | "rule_name": "Microsoft Graph First Occurrence of Client Request", |
1754 | | - "sha256": "6b466d820148d0cfc60bfd789a05cff1216e302972ec381bde5a8b6b44f6350c", |
| 1771 | + "sha256": "b4148f8d9943e630d980806e0c498a1c96623a4c53fbd882da857b6004a18c27", |
1755 | 1772 | "type": "new_terms", |
1756 | | - "version": 1 |
| 1773 | + "version": 2 |
1757 | 1774 | }, |
1758 | 1775 | "2a692072-d78d-42f3-a48a-775677d79c4e": { |
1759 | 1776 | "rule_name": "Potential Code Execution via Postgresql", |
|
3298 | 3315 | "version": 206 |
3299 | 3316 | }, |
3300 | 3317 | "581add16-df76-42bb-af8e-c979bfb39a59": { |
3301 | | - "rule_name": "Deleting Backup Catalogs with Wbadmin", |
3302 | | - "sha256": "c84484db7d213b2da4645d1127526eb0f4d34edc4309fc2f53911783db82cb39", |
| 3318 | + "rule_name": "Backup Deletion with Wbadmin", |
| 3319 | + "sha256": "bd99f1c1dc1bbc1957f29cd1c182ab5d00d9770fd4dd77a724fee4634f6f8135", |
3303 | 3320 | "type": "eql", |
3304 | | - "version": 317 |
| 3321 | + "version": 318 |
3305 | 3322 | }, |
3306 | 3323 | "58aa72ca-d968-4f34-b9f7-bea51d75eb50": { |
3307 | 3324 | "rule_name": "RDP Enabled via Registry", |
|
4304 | 4321 | }, |
4305 | 4322 | "71bccb61-e19b-452f-b104-79a60e546a95": { |
4306 | 4323 | "rule_name": "Unusual File Creation - Alternate Data Stream", |
4307 | | - "sha256": "77153f9c14950adc74a164546568b82a599d966d5573409efd2a3e77224460af", |
| 4324 | + "sha256": "2d3be75d18124f279d600e4db3abfe4f05cd68abde7df9dc7bd130a75c5df7d0", |
4308 | 4325 | "type": "eql", |
4309 | | - "version": 318 |
| 4326 | + "version": 319 |
4310 | 4327 | }, |
4311 | 4328 | "71c5cb27-eca5-4151-bb47-64bc3f883270": { |
4312 | 4329 | "rule_name": "Suspicious RDP ActiveX Client Loaded", |
|
5681 | 5698 | }, |
5682 | 5699 | "97fc44d3-8dae-4019-ae83-298c3015600f": { |
5683 | 5700 | "rule_name": "Startup or Run Key Registry Modification", |
5684 | | - "sha256": "4ef6084162b7b7ca5747a6e4208e6088166275efe18e3b1ab8f474071b61ac66", |
| 5701 | + "sha256": "39c28c83008ef62eb99a0de82b8be41f060c25120f83de8cd7666d847a57279d", |
5685 | 5702 | "type": "eql", |
5686 | | - "version": 116 |
| 5703 | + "version": 117 |
5687 | 5704 | }, |
5688 | 5705 | "980b70a0-c820-11ed-8799-f661ea17fbcc": { |
5689 | 5706 | "rule_name": "Google Workspace Drive Encryption Key(s) Accessed from Anonymous User", |
|
5962 | 5979 | "version": 315 |
5963 | 5980 | }, |
5964 | 5981 | "a02cb68e-7c93-48d1-93b2-2c39023308eb": { |
5965 | | - "rule_name": "A scheduled task was updated", |
5966 | | - "sha256": "1948ec1ad7f97c2d6eeef3638dbbaba87d1cb382495b4bb45f1c670deb735f5c", |
5967 | | - "type": "eql", |
5968 | | - "version": 113 |
| 5982 | + "rule_name": "Unusual Scheduled Task Update", |
| 5983 | + "sha256": "a8d0255953541006b7b693b73e9b6eb8888f017f0c86096c34bc51dbf1595d31", |
| 5984 | + "type": "new_terms", |
| 5985 | + "version": 114 |
5969 | 5986 | }, |
5970 | 5987 | "a0ddb77b-0318-41f0-91e4-8c1b5528834f": { |
5971 | 5988 | "rule_name": "Potential Privilege Escalation via Python cap_setuid", |
|
6066 | 6083 | }, |
6067 | 6084 | "a3cc60d8-2701-11f0-accf-f661ea17fbcd": { |
6068 | 6085 | "rule_name": "Microsoft Entra ID SharePoint Access for User Principal via Auth Broker", |
6069 | | - "sha256": "411113088ba431184790b1d524a1f56f33cb24eee23e03dedb7ce9738bc5accf", |
| 6086 | + "sha256": "5b4cb946748f0ce168135326a6b785b8d6237caab940d43e42792bc51db177e7", |
6070 | 6087 | "type": "new_terms", |
6071 | | - "version": 1 |
| 6088 | + "version": 2 |
6072 | 6089 | }, |
6073 | 6090 | "a3ea12f3-0d4e-4667-8b44-4230c63f3c75": { |
6074 | 6091 | "rule_name": "Execution via local SxS Shared Module", |
|
7977 | 7994 | "type": "eql", |
7978 | 7995 | "version": 205 |
7979 | 7996 | }, |
| 7997 | + "da0d4bae-33ee-11f0-a59f-f661ea17fbcd": { |
| 7998 | + "rule_name": "Microsoft Entra ID Protection - Risk Detections", |
| 7999 | + "sha256": "9b9497a3de9a58ad095e62964a8a2805cd52f9730e7907d236978486f7068bd6", |
| 8000 | + "type": "query", |
| 8001 | + "version": 1 |
| 8002 | + }, |
7980 | 8003 | "da7733b1-fe08-487e-b536-0a04c6d8b0cd": { |
7981 | 8004 | "rule_name": "Code Signing Policy Modification Through Registry", |
7982 | 8005 | "sha256": "4465a0b284dd1be9c6a5f56ece22af068c8a61e9af4e7a72e9fc3f614980fd77", |
|
8122 | 8145 | "type": "new_terms", |
8123 | 8146 | "version": 3 |
8124 | 8147 | }, |
| 8148 | + "de67f85e-2d43-11f0-b8c9-f661ea17fbcc": { |
| 8149 | + "min_stack_version": "8.17", |
| 8150 | + "rule_name": "Multiple Microsoft 365 User Account Lockouts in Short Time Window", |
| 8151 | + "sha256": "75096b67404510e3b605f336c782c92b5393e605841cbe4a5c2c272e8c34adc1", |
| 8152 | + "type": "esql", |
| 8153 | + "version": 1 |
| 8154 | + }, |
8125 | 8155 | "de9bd7e0-49e9-4e92-a64d-53ade2e66af1": { |
8126 | 8156 | "rule_name": "Unusual Child Process from a System Virtual Process", |
8127 | 8157 | "sha256": "84d467b82d0972b0fd22be0fc6fa605093b59f4f5daddf51446d9c5ed62aac35", |
|
8540 | 8570 | "type": "eql", |
8541 | 8571 | "version": 312 |
8542 | 8572 | }, |
| 8573 | + "e882e934-2aaa-11f0-8272-f661ea17fbcc": { |
| 8574 | + "rule_name": "Suspicious Email Access by First-Party Application via Microsoft Graph", |
| 8575 | + "sha256": "86ff54b665e83cd9f3393f348b5867905d4f8c0479c8d2ba5c6a3f21800bbc3d", |
| 8576 | + "type": "new_terms", |
| 8577 | + "version": 1 |
| 8578 | + }, |
8543 | 8579 | "e88d1fe9-b2f4-48d4-bace-a026dc745d4b": { |
8544 | 8580 | "rule_name": "Host Files System Changes via Windows Subsystem for Linux", |
8545 | 8581 | "sha256": "1e96b9c195bd7e985d54a7ebce9b7d3769f220cf8075ff16bc5572bae23b6fa7", |
|
8908 | 8944 | "f0cc239b-67fa-46fc-89d4-f861753a40f5": { |
8909 | 8945 | "min_stack_version": "8.17", |
8910 | 8946 | "rule_name": "Microsoft Azure or Mail Sign-in from a Suspicious Source", |
8911 | | - "sha256": "3596cbeaa0407a5f2e35ddd85a3ee3d81a599369c2fe3cd3fe28a8251fee3da8", |
| 8947 | + "sha256": "4fd69243a3f405a2fc8dac28257d472860062369ad573cd79c1e6fc5b6add7a7", |
8912 | 8948 | "type": "esql", |
8913 | | - "version": 1 |
| 8949 | + "version": 2 |
8914 | 8950 | }, |
8915 | 8951 | "f0eb70e9-71e9-40cd-813f-bf8e8c812cb1": { |
8916 | 8952 | "rule_name": "Execution with Explicit Credentials via Scripting", |
|
0 commit comments