Skip to content

Commit dc7f007

Browse files
Merge branch 'main' into dec_schema_refresh
2 parents 0f964aa + 8ddf8a8 commit dc7f007

File tree

2 files changed

+9
-6
lines changed

2 files changed

+9
-6
lines changed

rules/cross-platform/initial_access_execution_susp_react_serv_child.toml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
creation_date = "2025/12/04"
33
integration = ["endpoint", "windows", "auditd_manager", "sentinel_one_cloud_funnel"]
44
maturity = "production"
5-
updated_date = "2025/12/05"
5+
updated_date = "2025/12/08"
66

77
[rule]
88
author = ["Elastic"]
@@ -77,7 +77,7 @@ tags = [
7777
timestamp_override = "event.ingested"
7878
type = "eql"
7979
query = '''
80-
process where event.type == "start" and event.action != "fork" and (
80+
process where event.type == "start" and event.action in ("exec", "executed", "start", "process_started") and (
8181
process.name in (
8282
"sh", "bash", "zsh", "curl", "wget", "id", "whoami", "uname", "cmd.exe", "cat", "powershell.exe", "java", "rundll32.exe", "wget.exe", "certutil.exe",
8383
"nc", "ncat", "netcat", "nc.openbsd", "nc.traditional", "socat", "busybox", "mkfifo", "nohup", "setsid", "xterm"

rules/windows/defense_evasion_masquerading_as_svchost.toml

Lines changed: 7 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,8 @@
11
[metadata]
22
creation_date = "2025/11/12"
3-
integration = ["windows"]
3+
integration = ["endpoint", "windows", "system"]
44
maturity = "production"
5-
updated_date = "2025/11/12"
5+
updated_date = "2025/12/05"
66
min_stack_version = "9.1.0"
77
min_stack_comments = "The esql match operator was introduced in version 9.1.0"
88

@@ -60,13 +60,16 @@ tags = [
6060
"OS: Windows",
6161
"Use Case: Threat Detection",
6262
"Tactic: Defense Evasion",
63-
"Resources: Investigation Guide"
63+
"Resources: Investigation Guide",
64+
"Data Source: Elastic Defend",
65+
"Data Source: Windows Security Event Logs",
66+
"Data Source: Sysmon"
6467
]
6568
timestamp_override = "event.ingested"
6669
type = "esql"
6770

6871
query = '''
69-
FROM logs-* metadata _id, _version, _index
72+
FROM logs-endpoint.events.process-*, logs-windows.sysmon_operational-*, logs-system.security-*, logs-windows.*, winlogbeat-* metadata _id, _version, _index
7073
| where event.category == "process" and event.type == "start" and
7174
match(process.name, "svchost.exe", { "fuzziness": 1, "max_expansions": 10 }) and
7275
not process.executable in ("C:\\Windows\\SysWOW64\\svchost.exe", "C:\\Windows\\System32\\svchost.exe") and

0 commit comments

Comments
 (0)