Skip to content

Commit a601436

Browse files
authored
Merge branch 'main' into rt_nvexp
2 parents 6ffdcaa + 1517724 commit a601436

14 files changed

+28
-28
lines changed

rules/windows/collection_email_outlook_mailbox_via_com.toml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
creation_date = "2023/01/11"
33
integration = ["endpoint"]
44
maturity = "production"
5-
updated_date = "2025/01/15"
5+
updated_date = "2025/02/14"
66

77
[rule]
88
author = ["Elastic"]
@@ -11,7 +11,7 @@ Detects Inter-Process Communication with Outlook via Component Object Model from
1111
target user email to collect sensitive information or send email on their behalf via API.
1212
"""
1313
from = "now-9m"
14-
index = ["logs-endpoint.events.process*"]
14+
index = ["logs-endpoint.events.process-*"]
1515
language = "eql"
1616
license = "Elastic License v2"
1717
name = "Suspicious Inter-Process Communication via Outlook"

rules/windows/credential_access_dollar_account_relay.toml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
creation_date = "2024/07/24"
33
integration = ["system", "windows"]
44
maturity = "production"
5-
updated_date = "2025/01/15"
5+
updated_date = "2025/02/14"
66
min_stack_version = "8.14.0"
77
min_stack_comments = "Breaking change at 8.14.0 for the Windows Integration."
88

@@ -14,7 +14,7 @@ domain controller computer account coming from other hosts to the DC that owns t
1414
hash after capturing it using forced authentication.
1515
"""
1616
from = "now-9m"
17-
index = ["logs-system.security-*", "logs-windows.forwarded*", "winlogbeat-*"]
17+
index = ["logs-system.security*", "logs-windows.forwarded*", "winlogbeat-*"]
1818
language = "eql"
1919
license = "Elastic License v2"
2020
name = "Potential Relay Attack against a Domain Controller"

rules/windows/credential_access_imageload_azureadconnectauthsvc.toml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
creation_date = "2024/10/14"
33
integration = ["endpoint", "windows"]
44
maturity = "production"
5-
updated_date = "2025/01/15"
5+
updated_date = "2025/02/14"
66
min_stack_version = "8.14.0"
77
min_stack_comments = "Breaking change at 8.14.0 for the Windows Integration."
88

@@ -13,7 +13,7 @@ Identifies the load of a DLL without a valid code signature by the Azure AD Sync
1313
to persist or collect sensitive credentials passing through the Azure AD synchronization server.
1414
"""
1515
from = "now-9m"
16-
index = ["winlogbeat-*", "logs-endpoint.events.library*", "logs-windows.sysmon_operational-*"]
16+
index = ["winlogbeat-*", "logs-endpoint.events.library-*", "logs-windows.sysmon_operational-*"]
1717
language = "eql"
1818
license = "Elastic License v2"
1919
name = "Untrusted DLL Loaded by Azure AD Sync Service"

rules/windows/credential_access_regback_sam_security_hives.toml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,13 +2,13 @@
22
creation_date = "2024/07/01"
33
integration = ["endpoint"]
44
maturity = "production"
5-
updated_date = "2024/08/01"
5+
updated_date = "2025/02/14"
66

77
[rule]
88
author = ["Elastic"]
99
description = "Identifies attempts to access sensitive registry hives which contain credentials from the registry backup folder."
1010
from = "now-9m"
11-
index = ["logs-endpoint.events.file*"]
11+
index = ["logs-endpoint.events.file-*"]
1212
language = "eql"
1313
license = "Elastic License v2"
1414
name = "Sensitive Registry Hive Access via RegBack"

rules/windows/defense_evasion_audit_policy_disabled_winlog.toml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
creation_date = "2025/01/14"
33
integration = ["windows", "system"]
44
maturity = "production"
5-
updated_date = "2025/01/22"
5+
updated_date = "2025/02/14"
66
min_stack_version = "8.14.0"
77
min_stack_comments = "Breaking change at 8.14.0 for the Windows Integration."
88

@@ -16,7 +16,7 @@ from = "now-9m"
1616
index = [
1717
"winlogbeat-*",
1818
"logs-windows.forwarded*",
19-
"logs-system.security-*"
19+
"logs-system.security*"
2020
]
2121
language = "kuery"
2222
license = "Elastic License v2"

rules/windows/defense_evasion_lolbas_win_cdb_utility.toml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ integration = ["endpoint", "windows", "system","sentinel_one_cloud_funnel", "m36
44
maturity = "production"
55
min_stack_comments = "Breaking change at 8.14.0 for the Windows Integration."
66
min_stack_version = "8.14.0"
7-
updated_date = "2025/01/15"
7+
updated_date = "2025/02/14"
88

99
[rule]
1010
author = ["Elastic"]
@@ -19,7 +19,7 @@ index = [
1919
"endgame-*",
2020
"logs-sentinel_one_cloud_funnel.*",
2121
"logs-m365_defender.event-*",
22-
"logs-system.security-*",
22+
"logs-system.security*",
2323
"logs-crowdstrike.fdr*"
2424
]
2525
language = "eql"

rules/windows/defense_evasion_windows_filtering_platform.toml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
creation_date = "2023/12/15"
33
integration = ["system", "windows"]
44
maturity = "production"
5-
updated_date = "2025/01/15"
5+
updated_date = "2025/02/14"
66
min_stack_version = "8.14.0"
77
min_stack_comments = "Breaking change at 8.14.0 for the Windows Integration."
88

@@ -13,7 +13,7 @@ Identifies multiple Windows Filtering Platform block events and where the proces
1313
security software. Adversaries may add malicious WFP rules to prevent Endpoint security from sending telemetry.
1414
"""
1515
from = "now-9m"
16-
index = ["winlogbeat-*", "logs-windows.network-*", "logs-system.security*"]
16+
index = ["winlogbeat-*", "logs-windows.forwarded*", "logs-system.security*"]
1717
language = "eql"
1818
license = "Elastic License v2"
1919
name = "Potential Evasion via Windows Filtering Platform"

rules/windows/execution_mofcomp.toml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
creation_date = "2023/08/23"
33
integration = ["endpoint", "m365_defender", "system", "crowdstrike"]
44
maturity = "production"
5-
updated_date = "2025/01/15"
5+
updated_date = "2025/02/14"
66

77
[rule]
88
author = ["Elastic"]
@@ -12,7 +12,7 @@ files to build their own namespaces and classes into the Windows Management Inst
1212
establish persistence using WMI Event Subscription.
1313
"""
1414
from = "now-9m"
15-
index = ["logs-endpoint.events.process-*", "logs-m365_defender.event-*", "endgame-*", "logs-system.security-*", "logs-crowdstrike.fdr*"]
15+
index = ["logs-endpoint.events.process-*", "logs-m365_defender.event-*", "endgame-*", "logs-system.security*", "logs-crowdstrike.fdr*"]
1616
language = "eql"
1717
license = "Elastic License v2"
1818
name = "Mofcomp Activity"

rules/windows/execution_windows_script_from_internet.toml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ integration = ["endpoint"]
44
maturity = "production"
55
min_stack_comments = "Mark of The Web enrichment was added to Elastic Defend file events in 8.15.0."
66
min_stack_version = "8.15.0"
7-
updated_date = "2025/02/07"
7+
updated_date = "2025/02/14"
88

99
[rule]
1010
author = ["Elastic"]
@@ -13,7 +13,7 @@ Identifies the creation of a Windows script downloaded from the internet followe
1313
Adversaries may use Windows script files for initial access and execution.
1414
"""
1515
from = "now-9m"
16-
index = ["logs-endpoint.events.*"]
16+
index = ["logs-endpoint.events.file-*", "logs-endpoint.events.process-*"]
1717
language = "eql"
1818
license = "Elastic License v2"
1919
name = "Execution of a Downloaded Windows Script"

rules/windows/impact_ransomware_file_rename_smb.toml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
creation_date = "2024/05/02"
33
integration = ["endpoint"]
44
maturity = "production"
5-
updated_date = "2024/06/20"
5+
updated_date = "2025/02/14"
66

77
[rule]
88
author = ["Elastic"]
@@ -11,7 +11,7 @@ Identifies an incoming SMB connection followed by a suspicious file rename opera
1111
ransomware attack via the SMB protocol.
1212
"""
1313
from = "now-9m"
14-
index = ["logs-endpoint.events.*"]
14+
index = ["logs-endpoint.events.file-*", "logs-endpoint.events.network-*"]
1515
language = "eql"
1616
license = "Elastic License v2"
1717
name = "Suspicious File Renamed via SMB"

0 commit comments

Comments
 (0)