11[metadata ]
22creation_date = " 2023/07/27"
3- integration = [" endpoint" , " auditd_manager" , " sentinel_one_cloud_funnel" , " crowdstrike " ]
3+ integration = [" endpoint" , " auditd_manager" , " sentinel_one_cloud_funnel" ]
44maturity = " production"
5- updated_date = " 2025/09/16 "
5+ updated_date = " 2025/12/17 "
66
77[rule ]
88author = [" Elastic" ]
@@ -12,7 +12,6 @@ Adversaries may collect data stored in the clipboard from users copying informat
1212"""
1313from = " now-9m"
1414index = [
15- " logs-crowdstrike.fdr*" ,
1615 " logs-endpoint.events.process*" ,
1716 " logs-sentinel_one_cloud_funnel.*" ,
1817 " endgame-*" ,
@@ -41,7 +40,7 @@ timestamp_override = "event.ingested"
4140type = " new_terms"
4241query = '''
4342event.category:process and host.os.type:"linux" and event.type:"start" and
44- event.action:("exec" or "exec_event" or "executed" or "process_started") and
43+ event.action:("exec" or "exec_event" or "executed" or "process_started" or "ProcessRollup2" ) and
4544process.name:("xclip" or "xsel" or "wl-clipboard" or "clipman" or "copyq") and
4645not process.parent.name:("bwrap" or "micro")
4746'''
@@ -96,8 +95,8 @@ reference = "https://attack.mitre.org/tactics/TA0009/"
9695
9796[rule .new_terms ]
9897field = " new_terms_fields"
99- value = [" host .id" , " process.parent.executable" ]
98+ value = [" agent .id" , " process.parent.executable" ]
10099
101100[[rule .new_terms .history_window_start ]]
102101field = " history_window_start"
103- value = " now-7d "
102+ value = " now-5d "
0 commit comments