Skip to content

Commit 9cf51e3

Browse files
committed
update disclaimer
1 parent a4a584d commit 9cf51e3

File tree

861 files changed

+1377
-1377
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

861 files changed

+1377
-1377
lines changed

rules/apm/apm_403_response_to_a_post.toml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -35,7 +35,7 @@ http.response.status_code:403 and http.request.method:post
3535
note = """## Triage and analysis
3636
3737
> **Disclaimer**:
38-
> This investigation guide was generated using generative AI technology and has been reviewed to improve its accuracy and relevance. While every effort has been made to ensure its quality, we recommend validating the content and adapting it to suit your specific environment and operational needs.
38+
> This investigation guide was created using generative AI technology and has been reviewed to improve its accuracy and relevance. While every effort has been made to ensure its quality, we recommend validating the content and adapting it to suit your specific environment and operational needs.
3939
4040
### Investigating Web Application Suspicious Activity: POST Request Declined
4141

rules/apm/apm_405_response_method_not_allowed.toml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -35,7 +35,7 @@ http.response.status_code:405
3535
note = """## Triage and analysis
3636
3737
> **Disclaimer**:
38-
> This investigation guide was generated using generative AI technology and has been reviewed to improve its accuracy and relevance. While every effort has been made to ensure its quality, we recommend validating the content and adapting it to suit your specific environment and operational needs.
38+
> This investigation guide was created using generative AI technology and has been reviewed to improve its accuracy and relevance. While every effort has been made to ensure its quality, we recommend validating the content and adapting it to suit your specific environment and operational needs.
3939
4040
### Investigating Web Application Suspicious Activity: Unauthorized Method
4141

rules/apm/apm_sqlmap_user_agent.toml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -35,7 +35,7 @@ user_agent.original:"sqlmap/1.3.11#stable (http://sqlmap.org)"
3535
note = """## Triage and analysis
3636
3737
> **Disclaimer**:
38-
> This investigation guide was generated using generative AI technology and has been reviewed to improve its accuracy and relevance. While every effort has been made to ensure its quality, we recommend validating the content and adapting it to suit your specific environment and operational needs.
38+
> This investigation guide was created using generative AI technology and has been reviewed to improve its accuracy and relevance. While every effort has been made to ensure its quality, we recommend validating the content and adapting it to suit your specific environment and operational needs.
3939
4040
### Investigating Web Application Suspicious Activity: sqlmap User Agent
4141

rules/cross-platform/command_and_control_google_drive_malicious_file_download.toml

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -39,20 +39,20 @@ query = '''
3939
process where
4040
4141
/* common browser processes */
42-
event.action in ("exec", "fork", "start") and
42+
event.action in ("exec", "fork", "start") and
4343
44-
process.name : ("Microsoft Edge", "chrome.exe", "Google Chrome", "google-chrome-stable",
45-
"google-chrome-beta", "google-chrome", "msedge.exe", "firefox.exe", "brave.exe",
46-
"whale.exe", "browser.exe", "dragon.exe", "vivaldi.exe", "opera.exe", "firefox",
47-
"powershell.exe", "curl", "curl.exe", "wget", "wget.exe") and
44+
process.name : ("Microsoft Edge", "chrome.exe", "Google Chrome", "google-chrome-stable",
45+
"google-chrome-beta", "google-chrome", "msedge.exe", "firefox.exe", "brave.exe",
46+
"whale.exe", "browser.exe", "dragon.exe", "vivaldi.exe", "opera.exe", "firefox",
47+
"powershell.exe", "curl", "curl.exe", "wget", "wget.exe") and
4848
4949
/* Look for Google Drive download URL with AV flag skipping */
5050
(process.command_line : "*drive.google.com*" and process.command_line : "*export=download*" and process.command_line : "*confirm=no_antivirus*")
5151
'''
5252
note = """## Triage and analysis
5353
5454
> **Disclaimer**:
55-
> This investigation guide was generated using generative AI technology and has been reviewed to improve its accuracy and relevance. While every effort has been made to ensure its quality, we recommend validating the content and adapting it to suit your specific environment and operational needs.
55+
> This investigation guide was created using generative AI technology and has been reviewed to improve its accuracy and relevance. While every effort has been made to ensure its quality, we recommend validating the content and adapting it to suit your specific environment and operational needs.
5656
5757
### Investigating Suspicious File Downloaded from Google Drive
5858

rules/cross-platform/command_and_control_non_standard_ssh_port.toml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -44,7 +44,7 @@ sequence by process.entity_id with maxspan=1m
4444
"run"
4545
)
4646
]
47-
[network where process.name:"ssh" and event.action in ("connection_attempted", "connection_accepted") and
47+
[network where process.name:"ssh" and event.action in ("connection_attempted", "connection_accepted") and
4848
destination.port != 22 and network.transport == "tcp" and not (
4949
destination.ip == null or destination.ip == "0.0.0.0" or cidrmatch(
5050
destination.ip, "10.0.0.0/8", "127.0.0.0/8", "169.254.0.0/16", "172.16.0.0/12", "192.0.0.0/24", "192.0.0.0/29",
@@ -59,7 +59,7 @@ sequence by process.entity_id with maxspan=1m
5959
note = """## Triage and analysis
6060
6161
> **Disclaimer**:
62-
> This investigation guide was generated using generative AI technology and has been reviewed to improve its accuracy and relevance. While every effort has been made to ensure its quality, we recommend validating the content and adapting it to suit your specific environment and operational needs.
62+
> This investigation guide was created using generative AI technology and has been reviewed to improve its accuracy and relevance. While every effort has been made to ensure its quality, we recommend validating the content and adapting it to suit your specific environment and operational needs.
6363
6464
### Investigating Potential Non-Standard Port SSH connection
6565

rules/cross-platform/credential_access_cookies_chromium_browsers_debugging.toml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -67,7 +67,7 @@ process where event.type in ("start", "process_started", "info") and
6767
note = """## Triage and analysis
6868
6969
> **Disclaimer**:
70-
> This investigation guide was generated using generative AI technology and has been reviewed to improve its accuracy and relevance. While every effort has been made to ensure its quality, we recommend validating the content and adapting it to suit your specific environment and operational needs.
70+
> This investigation guide was created using generative AI technology and has been reviewed to improve its accuracy and relevance. While every effort has been made to ensure its quality, we recommend validating the content and adapting it to suit your specific environment and operational needs.
7171
7272
### Investigating Potential Cookies Theft via Browser Debugging
7373

rules/cross-platform/credential_access_forced_authentication_pipes.toml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -63,7 +63,7 @@ sequence with maxspan=15s
6363
note = """## Triage and analysis
6464
6565
> **Disclaimer**:
66-
> This investigation guide was generated using generative AI technology and has been reviewed to improve its accuracy and relevance. While every effort has been made to ensure its quality, we recommend validating the content and adapting it to suit your specific environment and operational needs.
66+
> This investigation guide was created using generative AI technology and has been reviewed to improve its accuracy and relevance. While every effort has been made to ensure its quality, we recommend validating the content and adapting it to suit your specific environment and operational needs.
6767
6868
### Investigating Active Directory Forced Authentication from Linux Host - SMB Named Pipes
6969

rules/cross-platform/defense_evasion_agent_spoofing_mismatched_id.toml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -34,7 +34,7 @@ event.agent_id_status:(agent_id_mismatch or mismatch)
3434
note = """## Triage and analysis
3535
3636
> **Disclaimer**:
37-
> This investigation guide was generated using generative AI technology and has been reviewed to improve its accuracy and relevance. While every effort has been made to ensure its quality, we recommend validating the content and adapting it to suit your specific environment and operational needs.
37+
> This investigation guide was created using generative AI technology and has been reviewed to improve its accuracy and relevance. While every effort has been made to ensure its quality, we recommend validating the content and adapting it to suit your specific environment and operational needs.
3838
3939
### Investigating Agent Spoofing - Mismatched Agent ID
4040

rules/cross-platform/defense_evasion_agent_spoofing_multiple_hosts.toml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -34,7 +34,7 @@ event.agent_id_status:* and not tags:forwarded
3434
note = """## Triage and analysis
3535
3636
> **Disclaimer**:
37-
> This investigation guide was generated using generative AI technology and has been reviewed to improve its accuracy and relevance. While every effort has been made to ensure its quality, we recommend validating the content and adapting it to suit your specific environment and operational needs.
37+
> This investigation guide was created using generative AI technology and has been reviewed to improve its accuracy and relevance. While every effort has been made to ensure its quality, we recommend validating the content and adapting it to suit your specific environment and operational needs.
3838
3939
### Investigating Agent Spoofing - Multiple Hosts Using Same Agent
4040

rules/cross-platform/defense_evasion_deleting_websvr_access_logs.toml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -52,7 +52,7 @@ file where event.type == "deletion" and
5252
note = """## Triage and analysis
5353
5454
> **Disclaimer**:
55-
> This investigation guide was generated using generative AI technology and has been reviewed to improve its accuracy and relevance. While every effort has been made to ensure its quality, we recommend validating the content and adapting it to suit your specific environment and operational needs.
55+
> This investigation guide was created using generative AI technology and has been reviewed to improve its accuracy and relevance. While every effort has been made to ensure its quality, we recommend validating the content and adapting it to suit your specific environment and operational needs.
5656
5757
### Investigating WebServer Access Logs Deleted
5858

0 commit comments

Comments
 (0)