11[metadata ]
22creation_date = " 2025/12/04"
3- integration = [" endpoint" ]
3+ integration = [" endpoint" , " windows " , " sentinel_one_cloud_funnel " , " m365_defender " ]
44maturity = " production"
55updated_date = " 2025/12/04"
66
@@ -13,7 +13,13 @@ before transmission to obfuscate contents and evade detection. Legitimate GenAI
1313network communications.
1414"""
1515from = " now-9m"
16- index = [" logs-endpoint.events.*" ]
16+ index = [
17+ " logs-endpoint.events.process-*" ,
18+ " logs-windows.sysmon_operational-*" ,
19+ " winlogbeat-*" ,
20+ " logs-m365_defender.event-*" ,
21+ " logs-sentinel_one_cloud_funnel.*"
22+ ]
1723language = " eql"
1824license = " Elastic License v2"
1925name = " GenAI Process Performing Encoding/Chunking Prior to Network Activity"
@@ -50,9 +56,9 @@ references = [
5056 " https://glama.ai/blog/2025-11-11-the-lethal-trifecta-securing-model-context-protocol-against-data-flow-attacks" ,
5157 " https://www.elastic.co/security-labs/elastic-advances-llm-security"
5258]
53- risk_score = 73
59+ risk_score = 47
5460rule_id = " c3d4e5f6-a7b8-9012-cdef-123456789abc"
55- severity = " high "
61+ severity = " medium "
5662tags = [
5763 " Domain: Endpoint" ,
5864 " OS: Linux" ,
@@ -62,6 +68,9 @@ tags = [
6268 " Tactic: Exfiltration" ,
6369 " Tactic: Defense Evasion" ,
6470 " Data Source: Elastic Defend" ,
71+ " Data Source: Sysmon" ,
72+ " Data Source: Microsoft Defender for Endpoint" ,
73+ " Data Source: SentinelOne" ,
6574 " Resources: Investigation Guide" ,
6675 " Domain: LLM" ,
6776 " Mitre Atlas: T0086" ,
@@ -73,7 +82,7 @@ sequence by process.entity_id with maxspan=30s
7382
7483 // Encoding/compression followed by network activity
7584 [process where event.type == "start"
76- and event.action in ("exec", "executed", "process_started", " start", "ProcessRollup2")
85+ and event.type == " start"
7786
7887 // Encoding/chunking tools
7988 and (
0 commit comments