|
1 | 1 | [metadata] |
2 | 2 | creation_date = "2025/11/12" |
3 | | -integration = ["windows"] |
| 3 | +integration = ["endpoint", "windows", "system"] |
4 | 4 | maturity = "production" |
5 | | -updated_date = "2025/11/12" |
| 5 | +updated_date = "2025/12/05" |
6 | 6 | min_stack_version = "9.1.0" |
7 | 7 | min_stack_comments = "The esql match operator was introduced in version 9.1.0" |
8 | 8 |
|
@@ -60,13 +60,16 @@ tags = [ |
60 | 60 | "OS: Windows", |
61 | 61 | "Use Case: Threat Detection", |
62 | 62 | "Tactic: Defense Evasion", |
63 | | - "Resources: Investigation Guide" |
| 63 | + "Resources: Investigation Guide", |
| 64 | + "Data Source: Elastic Defend", |
| 65 | + "Data Source: Windows Security Event Logs", |
| 66 | + "Data Source: Sysmon" |
64 | 67 | ] |
65 | 68 | timestamp_override = "event.ingested" |
66 | 69 | type = "esql" |
67 | 70 |
|
68 | 71 | query = ''' |
69 | | -FROM logs-* metadata _id, _version, _index |
| 72 | +FROM logs-endpoint.events.process-*, logs-windows.sysmon_operational-*, logs-system.security-*, logs-windows.*, winlogbeat-* metadata _id, _version, _index |
70 | 73 | | where event.category == "process" and event.type == "start" and |
71 | 74 | match(process.name, "svchost.exe", { "fuzziness": 1, "max_expansions": 10 }) and |
72 | 75 | not process.executable in ("C:\\Windows\\SysWOW64\\svchost.exe", "C:\\Windows\\System32\\svchost.exe") and |
|
0 commit comments