Skip to content

Commit ba12a57

Browse files
Apply suggestions from code review
Co-authored-by: Samirbous <[email protected]>
1 parent 9fdef94 commit ba12a57

File tree

1 file changed

+14
-5
lines changed

1 file changed

+14
-5
lines changed

rules/cross-platform/exfiltration_genai_process_encoding_prior_to_network_activity.toml

Lines changed: 14 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
[metadata]
22
creation_date = "2025/12/04"
3-
integration = ["endpoint"]
3+
integration = ["endpoint", "windows", "sentinel_one_cloud_funnel", "m365_defender"]
44
maturity = "production"
55
updated_date = "2025/12/04"
66

@@ -13,7 +13,13 @@ before transmission to obfuscate contents and evade detection. Legitimate GenAI
1313
network communications.
1414
"""
1515
from = "now-9m"
16-
index = ["logs-endpoint.events.*"]
16+
index = [
17+
"logs-endpoint.events.process-*",
18+
"logs-windows.sysmon_operational-*",
19+
"winlogbeat-*",
20+
"logs-m365_defender.event-*",
21+
"logs-sentinel_one_cloud_funnel.*"
22+
]
1723
language = "eql"
1824
license = "Elastic License v2"
1925
name = "GenAI Process Performing Encoding/Chunking Prior to Network Activity"
@@ -50,9 +56,9 @@ references = [
5056
"https://glama.ai/blog/2025-11-11-the-lethal-trifecta-securing-model-context-protocol-against-data-flow-attacks",
5157
"https://www.elastic.co/security-labs/elastic-advances-llm-security"
5258
]
53-
risk_score = 73
59+
risk_score = 47
5460
rule_id = "c3d4e5f6-a7b8-9012-cdef-123456789abc"
55-
severity = "high"
61+
severity = "medium"
5662
tags = [
5763
"Domain: Endpoint",
5864
"OS: Linux",
@@ -62,6 +68,9 @@ tags = [
6268
"Tactic: Exfiltration",
6369
"Tactic: Defense Evasion",
6470
"Data Source: Elastic Defend",
71+
"Data Source: Sysmon",
72+
"Data Source: Microsoft Defender for Endpoint",
73+
"Data Source: SentinelOne",
6574
"Resources: Investigation Guide",
6675
"Domain: LLM",
6776
"Mitre Atlas: T0086",
@@ -73,7 +82,7 @@ sequence by process.entity_id with maxspan=30s
7382
7483
// Encoding/compression followed by network activity
7584
[process where event.type == "start"
76-
and event.action in ("exec", "executed", "process_started", "start", "ProcessRollup2")
85+
and event.type == "start"
7786
7887
// Encoding/chunking tools
7988
and (

0 commit comments

Comments
 (0)