11[metadata ]
22creation_date = " 2025/12/04"
3- integration = [" endpoint" ]
3+ integration = [" endpoint" , " windows " , " auditd_manager " , " sentinel_one_cloud_funnel " , " m365_defender " ]
44maturity = " production"
55updated_date = " 2025/12/04"
66
@@ -13,7 +13,7 @@ pyarmor) are particularly high-risk as they create standalone executables that c
1313This rule focuses on compilation activity that produces output binaries, filtering out inspection-only operations.
1414"""
1515from = " now-9m"
16- index = [" logs-endpoint.events.*" ]
16+ index = [" logs-endpoint.events.process *" ]
1717language = " eql"
1818license = " Elastic License v2"
1919name = " GenAI Process Compiling or Generating Executables"
@@ -49,9 +49,9 @@ references = [
4949 " https://atlas.mitre.org/techniques/AML.T0053" ,
5050 " https://www.elastic.co/security-labs/elastic-advances-llm-security"
5151]
52- risk_score = 73
52+ risk_score = 47
5353rule_id = " b2c3d4e5-f6a7-8901-bcde-f123456789ab"
54- severity = " high "
54+ severity = " medium "
5555tags = [
5656 " Domain: Endpoint" ,
5757 " OS: Linux" ,
@@ -60,15 +60,19 @@ tags = [
6060 " Use Case: Threat Detection" ,
6161 " Tactic: Execution" ,
6262 " Tactic: Defense Evasion" ,
63- " Data Source: Elastic Defend" ,
63+ " Data Source: Elastic Defend" ,
64+ " Data Source: Sysmon" ,
65+ " Data Source: Auditd Manager" ,
66+ " Data Source: Microsoft Defender for Endpoint" ,
67+ " Data Source: SentinelOne" ,
6468 " Resources: Investigation Guide" ,
6569 " Domain: LLM" ,
6670 " Mitre Atlas: T0053" ,
6771]
6872timestamp_override = " event.ingested"
6973type = " eql"
7074query = '''
71- process where event.type == "start" and event.action in ("exec", "executed", "process_started", " start", "ProcessRollup2") and
75+ process where event.type == "start" and event.type == " start" and
7276
7377 // GenAI parent process
7478 (
0 commit comments