|
991 | 991 | }, |
992 | 992 | "181f6b23-3799-445e-9589-0018328a9e46": { |
993 | 993 | "rule_name": "Script Execution via Microsoft HTML Application", |
994 | | - "sha256": "01dda1376728fe6955188499cabdad513ced58430a823ed0efa060d3e3e4fd42", |
| 994 | + "sha256": "8e9050616bc785d696c0a88bef0934bebc593c6d8d175e23e21d7e9021e4a63b", |
995 | 995 | "type": "eql", |
996 | | - "version": 205 |
| 996 | + "version": 206 |
997 | 997 | }, |
998 | 998 | "183f3cd2-4cc6-44c0-917c-c5d29ecdcf74": { |
999 | 999 | "rule_name": "Simple HTTP Web Server Connection", |
|
2454 | 2454 | "version": 4 |
2455 | 2455 | }, |
2456 | 2456 | "3fac01b2-b811-11ef-b25b-f661ea17fbce": { |
2457 | | - "rule_name": "Azure Entra MFA TOTP Brute Force Attempts", |
2458 | | - "sha256": "096663ac4f2f65728b65859267b7a5df52cae07f45541fc4df53d7d2c0162a1c", |
| 2457 | + "rule_name": "Microsoft Entra ID MFA TOTP Brute Force Attempts", |
| 2458 | + "sha256": "00ca74cbcb463e4aab75e6f1c2caa5279929ef6c8c0ecc91e21716ab9f885a48", |
2459 | 2459 | "type": "esql", |
2460 | | - "version": 2 |
| 2460 | + "version": 3 |
2461 | 2461 | }, |
2462 | 2462 | "3fe4e20c-a600-4a86-9d98-3ecb1ef23550": { |
2463 | 2463 | "rule_name": "DNF Package Manager Plugin File Creation", |
|
3245 | 3245 | "type": "eql", |
3246 | 3246 | "version": 318 |
3247 | 3247 | }, |
| 3248 | + "5841b80f-a1f8-4c00-a966-d2cc4a7a82e4": { |
| 3249 | + "rule_name": "Unusual Web Config File Access", |
| 3250 | + "sha256": "b794e93559c621d6e245068b3dbad5a07ac97d1e4cdfd00b3083ca2c15ae8594", |
| 3251 | + "type": "new_terms", |
| 3252 | + "version": 1 |
| 3253 | + }, |
3248 | 3254 | "58aa72ca-d968-4f34-b9f7-bea51d75eb50": { |
3249 | 3255 | "rule_name": "RDP Enabled via Registry", |
3250 | 3256 | "sha256": "8d8c264f3c828e6bbfef2b4d20ae146ff9be9f011e3755c642210ed001c6c1a8", |
|
4157 | 4163 | "type": "query", |
4158 | 4164 | "version": 211 |
4159 | 4165 | }, |
| 4166 | + "70558fd5-6448-4c65-804a-8567ce02c3a2": { |
| 4167 | + "min_stack_version": "8.18", |
| 4168 | + "rule_name": "Google SecOps External Alerts", |
| 4169 | + "sha256": "3875d92943fd3bd7e6de3c62cedde504db8217fbfd89d59c6a6e5afa159386d3", |
| 4170 | + "type": "query", |
| 4171 | + "version": 1 |
| 4172 | + }, |
4160 | 4173 | "708c9d92-22a3-4fe0-b6b9-1f861c55502d": { |
4161 | 4174 | "rule_name": "Suspicious Execution via MSIEXEC", |
4162 | 4175 | "sha256": "65980fe1ae4be0bcb253357e4e833ea08e6cf9acc68b212beaf62c43948c1e50", |
|
4217 | 4230 | "type": "query", |
4218 | 4231 | "version": 5 |
4219 | 4232 | }, |
| 4233 | + "720fc1aa-e195-4a1d-81d8-04edfe5313ed": { |
| 4234 | + "min_stack_version": "8.18", |
| 4235 | + "rule_name": "Elastic Security External Alerts", |
| 4236 | + "sha256": "422e82deeff98279777d95dbf0ed16eaf90b3bb1c5a3950ad92a7fff136b9406", |
| 4237 | + "type": "query", |
| 4238 | + "version": 1 |
| 4239 | + }, |
4220 | 4240 | "721999d0-7ab2-44bf-b328-6e63367b9b29": { |
4221 | 4241 | "rule_name": "Microsoft 365 Potential ransomware activity", |
4222 | 4242 | "sha256": "efcdb7e0993e29ec64fe324c23c28c6b84a1994689b6ebab3cc2d46a4740d321", |
|
4283 | 4303 | "type": "eql", |
4284 | 4304 | "version": 215 |
4285 | 4305 | }, |
| 4306 | + "74147312-ba03-4bea-91d1-040d54c1e8c3": { |
| 4307 | + "min_stack_version": "8.18", |
| 4308 | + "rule_name": "Microsoft Sentinel External Alerts", |
| 4309 | + "sha256": "a34a03f8ae7aa0e2dd7e603598ea2a6ce21901318fe406e2e71b9bb9a42f8d8f", |
| 4310 | + "type": "query", |
| 4311 | + "version": 1 |
| 4312 | + }, |
4286 | 4313 | "7453e19e-3dbf-4e4e-9ae0-33d6c6ed15e1": { |
4287 | 4314 | "rule_name": "Modification of Environment Variable via Unsigned or Untrusted Parent", |
4288 | 4315 | "sha256": "ddf21d53d6b8b8924b7cd9e99aa28d4f195a780f81fedcabd802cfa7f5eb3443", |
|
5697 | 5724 | "type": "eql", |
5698 | 5725 | "version": 209 |
5699 | 5726 | }, |
| 5727 | + "9b35422b-9102-45a9-8610-2e0c22281c55": { |
| 5728 | + "min_stack_version": "8.18", |
| 5729 | + "rule_name": "SentinelOne Alert External Alerts", |
| 5730 | + "sha256": "68730c7058c78efbdb1fa839ed203894407fe046b9db371d79697927d04df699", |
| 5731 | + "type": "query", |
| 5732 | + "version": 1 |
| 5733 | + }, |
5700 | 5734 | "9b6813a1-daf1-457e-b0e6-0bb4e55b8a4c": { |
5701 | 5735 | "rule_name": "Persistence via WMI Event Subscription", |
5702 | 5736 | "sha256": "c41ecc6deef7ce4de642b215d877cca87c3bdd1c8dbbddece705c8d211f78b82", |
|
6346 | 6380 | "type": "new_terms", |
6347 | 6381 | "version": 13 |
6348 | 6382 | }, |
| 6383 | + "aeebe561-c338-4118-9924-8cb4e478aa58": { |
| 6384 | + "min_stack_version": "8.18", |
| 6385 | + "rule_name": "CrowdStrike External Alerts", |
| 6386 | + "sha256": "3ed638538030b56001a17551427ce3c28872dc46cc8d25eaf05b09d40b3973c6", |
| 6387 | + "type": "query", |
| 6388 | + "version": 1 |
| 6389 | + }, |
6349 | 6390 | "af1e36fe-0abd-4463-b5ec-4e276dec0b26": { |
6350 | 6391 | "rule_name": "Linux Telegram API Request", |
6351 | 6392 | "sha256": "6ac91d1a303eaa48227d0640d61daf8090249c5177fec04c8eab7eef3e42a2c6", |
|
7583 | 7624 | "type": "eql", |
7584 | 7625 | "version": 107 |
7585 | 7626 | }, |
| 7627 | + "d3b6222f-537e-4b84-956a-3ebae2dcf811": { |
| 7628 | + "min_stack_version": "8.18", |
| 7629 | + "rule_name": "Splunk External Alerts", |
| 7630 | + "sha256": "f378f24577665171fd3b33d5b1172def6d1fa3fa89da6e34e50c43d6f969e922", |
| 7631 | + "type": "query", |
| 7632 | + "version": 1 |
| 7633 | + }, |
7586 | 7634 | "d43f2b43-02a1-4219-8ce9-10929a32a618": { |
7587 | 7635 | "rule_name": "Potential PowerShell Obfuscation via Backtick-Escaped Variable Expansion", |
7588 | 7636 | "sha256": "eaeaebdaa3240798af533bd1db03a445ea59bf9841b14a82684a4de790cf0c2b", |
|
8195 | 8243 | "type": "eql", |
8196 | 8244 | "version": 218 |
8197 | 8245 | }, |
| 8246 | + "e43b7578-f3cc-4682-a8cf-f9d8a5fb07f1": { |
| 8247 | + "min_stack_version": "8.18", |
| 8248 | + "rule_name": "SentinelOne Threat External Alerts", |
| 8249 | + "sha256": "187f393346f1e5ce97e9a11d3cb68a3d26efed06da5070cba9858bb5e01bef6e", |
| 8250 | + "type": "query", |
| 8251 | + "version": 1 |
| 8252 | + }, |
8198 | 8253 | "e468f3f6-7c4c-45bb-846a-053738b3fe5d": { |
8199 | 8254 | "rule_name": "First Time Seen NewCredentials Logon Process", |
8200 | 8255 | "sha256": "1427e75700829bf8f8c5f393c446556c02e5016d04293bca9c2112a6d88fc352", |
|
8676 | 8731 | "version": 105 |
8677 | 8732 | }, |
8678 | 8733 | "f0cc239b-67fa-46fc-89d4-f861753a40f5": { |
8679 | | - "rule_name": "Microsoft Azure or Mail Sign-in from a Suspicious Source", |
8680 | | - "sha256": "4fd69243a3f405a2fc8dac28257d472860062369ad573cd79c1e6fc5b6add7a7", |
| 8734 | + "rule_name": "Microsoft 365 or Entra ID Sign-in from a Suspicious Source", |
| 8735 | + "sha256": "1c82a2568d10fea4868e5657b9934f3be6431843d1a284c5dde1fff807ea002e", |
8681 | 8736 | "type": "esql", |
8682 | | - "version": 2 |
| 8737 | + "version": 3 |
8683 | 8738 | }, |
8684 | 8739 | "f0dbff4c-1aa7-4458-9ed5-ada472f64970": { |
8685 | 8740 | "rule_name": "dMSA Account Creation by an Unusual User", |
|
8767 | 8822 | }, |
8768 | 8823 | "f33e68a4-bd19-11ed-b02f-f661ea17fbcc": { |
8769 | 8824 | "rule_name": "Google Workspace Object Copied to External Drive with App Consent", |
8770 | | - "sha256": "5377740b067e775623f0521c2d29b16c6652340c0b2039ef6eb7efd52d98693d", |
| 8825 | + "sha256": "e3d5d22bf6f0e1c8cdf350e9585236e6eb414438bc033c531501c84f9d4d3681", |
8771 | 8826 | "type": "eql", |
8772 | | - "version": 10 |
| 8827 | + "version": 11 |
8773 | 8828 | }, |
8774 | 8829 | "f3403393-1fd9-4686-8f6e-596c58bc00b4": { |
8775 | 8830 | "rule_name": "Machine Learning Detected a DNS Request Predicted to be a DGA Domain", |
|
0 commit comments