Skip to content

Commit aec3ec3

Browse files
committed
Merge branch '7.9' into main
2 parents 779a3a5 + 4ffdc46 commit aec3ec3

File tree

76 files changed

+225
-150
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

76 files changed

+225
-150
lines changed

etc/version.lock.json

Lines changed: 150 additions & 150 deletions
Large diffs are not rendered by default.

rules/linux/credential_access_tcpdump_activity.toml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -17,6 +17,7 @@ false_positives = [
1717
troubleshooting.
1818
""",
1919
]
20+
from = "now-9m"
2021
index = ["auditbeat-*", "logs-endpoint.events.*"]
2122
language = "kuery"
2223
license = "Elastic License"

rules/linux/defense_evasion_attempt_to_disable_iptables_or_firewall.toml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -10,6 +10,7 @@ description = """
1010
Adversaries may attempt to disable the iptables or firewall service in an attempt to affect how a host is allowed to
1111
receive or send network traffic.
1212
"""
13+
from = "now-9m"
1314
index = ["auditbeat-*", "logs-endpoint.events.*"]
1415
language = "kuery"
1516
license = "Elastic License"

rules/linux/defense_evasion_attempt_to_disable_syslog_service.toml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -10,6 +10,7 @@ description = """
1010
Adversaries may attempt to disable the syslog service in an attempt to an attempt to disrupt event logging and evade
1111
detection by security controls.
1212
"""
13+
from = "now-9m"
1314
index = ["auditbeat-*", "logs-endpoint.events.*"]
1415
language = "kuery"
1516
license = "Elastic License"

rules/linux/defense_evasion_base16_or_base32_encoding_or_decoding_activity.toml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -13,6 +13,7 @@ false_positives = [
1313
filtered by the process executable or username values.
1414
""",
1515
]
16+
from = "now-9m"
1617
index = ["auditbeat-*", "logs-endpoint.events.*"]
1718
language = "kuery"
1819
license = "Elastic License"

rules/linux/defense_evasion_base64_encoding_or_decoding_activity.toml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -13,6 +13,7 @@ false_positives = [
1313
filtered by the process executable or username values.
1414
""",
1515
]
16+
from = "now-9m"
1617
index = ["auditbeat-*", "logs-endpoint.events.*"]
1718
language = "kuery"
1819
license = "Elastic License"

rules/linux/defense_evasion_deletion_of_bash_command_line_history.toml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -10,6 +10,7 @@ description = """
1010
Adversaries may attempt to clear the bash command line history in an attempt to evade detection or forensic
1111
investigations.
1212
"""
13+
from = "now-9m"
1314
index = ["auditbeat-*", "logs-endpoint.events.*"]
1415
language = "lucene"
1516
license = "Elastic License"

rules/linux/defense_evasion_disable_selinux_attempt.toml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -11,6 +11,7 @@ Identifies potential attempts to disable Security-Enhanced Linux (SELinux), whic
1111
support access control policies. Adversaries may disable security tools to avoid possible detection of their tools and
1212
activities.
1313
"""
14+
from = "now-9m"
1415
index = ["auditbeat-*", "logs-endpoint.events.*"]
1516
language = "kuery"
1617
license = "Elastic License"

rules/linux/defense_evasion_file_deletion_via_shred.toml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -11,6 +11,7 @@ Malware or other files dropped or created on a system by an adversary may leave
1111
a network and how. Adversaries may remove these files over the course of an intrusion to keep their footprint low or
1212
remove them at the end as part of the post-intrusion cleanup process.
1313
"""
14+
from = "now-9m"
1415
index = ["auditbeat-*", "logs-endpoint.events.*"]
1516
language = "kuery"
1617
license = "Elastic License"

rules/linux/defense_evasion_file_mod_writable_dir.toml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -16,6 +16,7 @@ false_positives = [
1616
by username.
1717
""",
1818
]
19+
from = "now-9m"
1920
index = ["auditbeat-*", "logs-endpoint.events.*"]
2021
language = "kuery"
2122
license = "Elastic License"

rules/linux/defense_evasion_hex_encoding_or_decoding_activity.toml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -13,6 +13,7 @@ false_positives = [
1313
filtered by the process executable or username values.
1414
""",
1515
]
16+
from = "now-9m"
1617
index = ["auditbeat-*", "logs-endpoint.events.*"]
1718
language = "kuery"
1819
license = "Elastic License"

rules/linux/defense_evasion_hidden_file_dir_tmp.toml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -17,6 +17,7 @@ false_positives = [
1717
behavior. These events can be filtered by the process arguments, username, or process name values.
1818
""",
1919
]
20+
from = "now-9m"
2021
index = ["auditbeat-*", "logs-endpoint.events.*"]
2122
language = "lucene"
2223
license = "Elastic License"

rules/linux/defense_evasion_kernel_module_removal.toml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -17,6 +17,7 @@ false_positives = [
1717
Note that some Linux distributions are not built to support the removal of modules at all.
1818
""",
1919
]
20+
from = "now-9m"
2021
index = ["auditbeat-*", "logs-endpoint.events.*"]
2122
language = "kuery"
2223
license = "Elastic License"

rules/linux/discovery_kernel_module_enumeration.toml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -17,6 +17,7 @@ false_positives = [
1717
by ordinary users is uncommon. These can be exempted by process name or username.
1818
""",
1919
]
20+
from = "now-9m"
2021
index = ["auditbeat-*", "logs-endpoint.events.*"]
2122
language = "kuery"
2223
license = "Elastic License"

rules/linux/discovery_virtual_machine_fingerprinting.toml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -17,6 +17,7 @@ false_positives = [
1717
process arguments to eliminate potential noise.
1818
""",
1919
]
20+
from = "now-9m"
2021
index = ["auditbeat-*", "logs-endpoint.events.*"]
2122
language = "kuery"
2223
license = "Elastic License"

rules/linux/discovery_whoami_commmand.toml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -16,6 +16,7 @@ false_positives = [
1616
automation tools and frameworks.
1717
""",
1818
]
19+
from = "now-9m"
1920
index = ["auditbeat-*", "logs-endpoint.events.*"]
2021
language = "kuery"
2122
license = "Elastic License"

rules/linux/execution_perl_tty_shell.toml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -10,6 +10,7 @@ description = """
1010
Identifies when a terminal (tty) is spawned via Perl. Attackers may upgrade a simple reverse shell to a fully
1111
interactive tty after obtaining initial access to a host.
1212
"""
13+
from = "now-9m"
1314
index = ["auditbeat-*", "logs-endpoint.events.*"]
1415
language = "kuery"
1516
license = "Elastic License"

rules/linux/execution_python_tty_shell.toml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -10,6 +10,7 @@ description = """
1010
Identifies when a terminal (tty) is spawned via Python. Attackers may upgrade a simple reverse shell to a fully
1111
interactive tty after obtaining initial access to a host.
1212
"""
13+
from = "now-9m"
1314
index = ["auditbeat-*", "logs-endpoint.events.*"]
1415
language = "kuery"
1516
license = "Elastic License"

rules/linux/lateral_movement_telnet_network_activity_external.toml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -18,6 +18,7 @@ false_positives = [
1818
suspicious.
1919
""",
2020
]
21+
from = "now-9m"
2122
index = ["auditbeat-*", "logs-endpoint.events.*"]
2223
language = "kuery"
2324
license = "Elastic License"

rules/linux/lateral_movement_telnet_network_activity_internal.toml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -18,6 +18,7 @@ false_positives = [
1818
suspicious.
1919
""",
2020
]
21+
from = "now-9m"
2122
index = ["auditbeat-*", "logs-endpoint.events.*"]
2223
language = "kuery"
2324
license = "Elastic License"

rules/linux/linux_hping_activity.toml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -16,6 +16,7 @@ false_positives = [
1616
uncommon.
1717
""",
1818
]
19+
from = "now-9m"
1920
index = ["auditbeat-*", "logs-endpoint.events.*"]
2021
language = "kuery"
2122
license = "Elastic License"

rules/linux/linux_iodine_activity.toml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -16,6 +16,7 @@ false_positives = [
1616
uncommon.
1717
""",
1818
]
19+
from = "now-9m"
1920
index = ["auditbeat-*", "logs-endpoint.events.*"]
2021
language = "kuery"
2122
license = "Elastic License"

rules/linux/linux_mknod_activity.toml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -16,6 +16,7 @@ false_positives = [
1616
scripts, automation tools, and frameworks. Usage by web servers is more likely to be suspicious.
1717
""",
1818
]
19+
from = "now-9m"
1920
index = ["auditbeat-*", "logs-endpoint.events.*"]
2021
language = "kuery"
2122
license = "Elastic License"

rules/linux/linux_netcat_network_connection.toml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -18,6 +18,7 @@ false_positives = [
1818
originate from scripts, automation tools, and frameworks.
1919
""",
2020
]
21+
from = "now-9m"
2122
index = ["auditbeat-*", "logs-endpoint.events.*"]
2223
language = "kuery"
2324
license = "Elastic License"

rules/linux/linux_nmap_activity.toml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -18,6 +18,7 @@ false_positives = [
1818
uncommon.
1919
""",
2020
]
21+
from = "now-9m"
2122
index = ["auditbeat-*", "logs-endpoint.events.*"]
2223
language = "kuery"
2324
license = "Elastic License"

rules/linux/linux_nping_activity.toml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -16,6 +16,7 @@ false_positives = [
1616
is usually not routine or unannounced. Use of `Nping` by non-engineers or ordinary users is uncommon.
1717
""",
1818
]
19+
from = "now-9m"
1920
index = ["auditbeat-*", "logs-endpoint.events.*"]
2021
language = "kuery"
2122
license = "Elastic License"

rules/linux/linux_process_started_in_temp_directory.toml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -13,6 +13,7 @@ false_positives = [
1313
username.
1414
""",
1515
]
16+
from = "now-9m"
1617
index = ["auditbeat-*", "logs-endpoint.events.*"]
1718
language = "kuery"
1819
license = "Elastic License"

rules/linux/linux_socat_activity.toml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -17,6 +17,7 @@ false_positives = [
1717
more likely to be suspicious.
1818
""",
1919
]
20+
from = "now-9m"
2021
index = ["auditbeat-*", "logs-endpoint.events.*"]
2122
language = "kuery"
2223
license = "Elastic License"

rules/linux/linux_strace_activity.toml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -16,6 +16,7 @@ false_positives = [
1616
originate from developers or SREs engaged in debugging or system call tracing.
1717
""",
1818
]
19+
from = "now-9m"
1920
index = ["auditbeat-*", "logs-endpoint.events.*"]
2021
language = "kuery"
2122
license = "Elastic License"

rules/linux/persistence_kernel_module_activity.toml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -13,6 +13,7 @@ false_positives = [
1313
programs by ordinary users is uncommon.
1414
""",
1515
]
16+
from = "now-9m"
1617
index = ["auditbeat-*", "logs-endpoint.events.*"]
1718
language = "kuery"
1819
license = "Elastic License"

rules/linux/persistence_shell_activity_by_web_server.toml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -13,6 +13,7 @@ false_positives = [
1313
behavior.
1414
""",
1515
]
16+
from = "now-9m"
1617
index = ["auditbeat-*", "logs-endpoint.events.*"]
1718
language = "kuery"
1819
license = "Elastic License"

rules/linux/privilege_escalation_setgid_bit_set_via_chmod.toml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -12,6 +12,7 @@ group. An adversary can take advantage of this to either do a shell escape or ex
1212
with the setgid bit to get code running in a different user’s context. Additionally, adversaries can use this mechanism
1313
on their own malware to make sure they're able to execute in elevated contexts in the future.
1414
"""
15+
from = "now-9m"
1516
index = ["auditbeat-*", "logs-endpoint.events.*"]
1617
language = "lucene"
1718
license = "Elastic License"

rules/linux/privilege_escalation_setuid_bit_set_via_chmod.toml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -12,6 +12,7 @@ user. An adversary can take advantage of this to either do a shell escape or exp
1212
with the setuid bit to get code running in a different user’s context. Additionally, adversaries can use this mechanism
1313
on their own malware to make sure they're able to execute in elevated contexts in the future.
1414
"""
15+
from = "now-9m"
1516
index = ["auditbeat-*", "logs-endpoint.events.*"]
1617
language = "lucene"
1718
license = "Elastic License"

rules/linux/privilege_escalation_sudoers_file_mod.toml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -10,6 +10,7 @@ description = """
1010
A sudoers file specifies the commands that users or groups can run and from which terminals. Adversaries can take
1111
advantage of these configurations to execute commands as other users or spawn processes with higher privileges.
1212
"""
13+
from = "now-9m"
1314
index = ["auditbeat-*", "logs-endpoint.events.*"]
1415
language = "kuery"
1516
license = "Elastic License"

rules/windows/command_and_control_certutil_network_connection.toml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -10,6 +10,7 @@ description = """
1010
Identifies certutil.exe making a network connection. Adversaries could abuse certutil.exe to download a certificate, or
1111
malware, from a remote URL.
1212
"""
13+
from = "now-9m"
1314
index = ["winlogbeat-*", "logs-endpoint.events.*"]
1415
language = "kuery"
1516
license = "Elastic License"

rules/windows/credential_access_credential_dumping_msbuild.toml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -11,6 +11,7 @@ An instance of MSBuild, the Microsoft Build Engine, loaded DLLs (dynamically lin
1111
credential management. This technique is sometimes used for credential dumping.
1212
"""
1313
false_positives = ["The Build Engine is commonly used by Windows developers but use by non-engineers is unusual."]
14+
from = "now-9m"
1415
index = ["winlogbeat-*", "logs-endpoint.events.*"]
1516
language = "kuery"
1617
license = "Elastic License"

rules/windows/defense_evasion_adding_the_hidden_file_attribute_with_via_attribexe.toml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -7,6 +7,7 @@ updated_date = "2020/08/03"
77
[rule]
88
author = ["Elastic"]
99
description = "Adversaries can add the 'hidden' attribute to files to hide them from the user in an attempt to evade detection."
10+
from = "now-9m"
1011
index = ["winlogbeat-*", "logs-endpoint.events.*"]
1112
language = "kuery"
1213
license = "Elastic License"

rules/windows/defense_evasion_clearing_windows_event_logs.toml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -10,6 +10,7 @@ description = """
1010
Identifies attempts to clear Windows event log stores. This is often done by attackers in an attempt to evade detection
1111
or destroy forensic evidence on a system.
1212
"""
13+
from = "now-9m"
1314
index = ["winlogbeat-*", "logs-endpoint.events.*"]
1415
language = "kuery"
1516
license = "Elastic License"

rules/windows/defense_evasion_delete_volume_usn_journal_with_fsutil.toml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -10,6 +10,7 @@ description = """
1010
Identifies use of the fsutil.exe to delete the volume USNJRNL. This technique is used by attackers to eliminate evidence
1111
of files created during post-exploitation activities.
1212
"""
13+
from = "now-9m"
1314
index = ["winlogbeat-*", "logs-endpoint.events.*"]
1415
language = "kuery"
1516
license = "Elastic License"

rules/windows/defense_evasion_deleting_backup_catalogs_with_wbadmin.toml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -10,6 +10,7 @@ description = """
1010
Identifies use of the wbadmin.exe to delete the backup catalog. Ransomware and other malware may do this to prevent
1111
system recovery.
1212
"""
13+
from = "now-9m"
1314
index = ["winlogbeat-*", "logs-endpoint.events.*"]
1415
language = "kuery"
1516
license = "Elastic License"

rules/windows/defense_evasion_disable_windows_firewall_rules_with_netsh.toml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -10,6 +10,7 @@ description = """
1010
Identifies use of the netsh.exe to disable or weaken the local firewall. Attackers will use this command line tool to
1111
disable the firewall during troubleshooting or to enable network mobility.
1212
"""
13+
from = "now-9m"
1314
index = ["winlogbeat-*", "logs-endpoint.events.*"]
1415
language = "kuery"
1516
license = "Elastic License"

rules/windows/defense_evasion_encoding_or_decoding_files_via_certutil.toml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -11,6 +11,7 @@ Identifies the use of certutil.exe to encode or decode data. CertUtil is a nativ
1111
Certificate Services. CertUtil is often abused by attackers to encode or decode base64 data for stealthier command and
1212
control or exfiltration.
1313
"""
14+
from = "now-9m"
1415
index = ["winlogbeat-*", "logs-endpoint.events.*"]
1516
language = "kuery"
1617
license = "Elastic License"

rules/windows/defense_evasion_execution_msbuild_started_by_office_app.toml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -16,6 +16,7 @@ false_positives = [
1616
this program to be started by an Office application like Word or Excel.
1717
""",
1818
]
19+
from = "now-9m"
1920
index = ["winlogbeat-*", "logs-endpoint.events.*"]
2021
language = "kuery"
2122
license = "Elastic License"

rules/windows/defense_evasion_execution_msbuild_started_by_script.toml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -11,6 +11,7 @@ An instance of MSBuild, the Microsoft Build Engine, was started by a script or t
1111
behavior is unusual and is sometimes used by malicious payloads.
1212
"""
1313
false_positives = ["The Build Engine is commonly used by Windows developers but use by non-engineers is unusual."]
14+
from = "now-9m"
1415
index = ["winlogbeat-*", "logs-endpoint.events.*"]
1516
language = "kuery"
1617
license = "Elastic License"

rules/windows/defense_evasion_execution_msbuild_started_by_system_process.toml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -11,6 +11,7 @@ An instance of MSBuild, the Microsoft Build Engine, was started by Explorer or t
1111
Instrumentation) subsystem. This behavior is unusual and is sometimes used by malicious payloads.
1212
"""
1313
false_positives = ["The Build Engine is commonly used by Windows developers but use by non-engineers is unusual."]
14+
from = "now-9m"
1415
index = ["winlogbeat-*", "logs-endpoint.events.*"]
1516
language = "kuery"
1617
license = "Elastic License"

rules/windows/defense_evasion_execution_msbuild_started_renamed.toml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -11,6 +11,7 @@ An instance of MSBuild, the Microsoft Build Engine, was started after being rena
1111
indicate an attempt to run unnoticed or undetected.
1212
"""
1313
false_positives = ["The Build Engine is commonly used by Windows developers but use by non-engineers is unusual."]
14+
from = "now-9m"
1415
index = ["winlogbeat-*", "logs-endpoint.events.*"]
1516
language = "kuery"
1617
license = "Elastic License"

rules/windows/defense_evasion_execution_msbuild_started_unusal_process.toml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -16,6 +16,7 @@ false_positives = [
1616
triggers this rule it can be exempted by process, user or host name.
1717
""",
1818
]
19+
from = "now-9m"
1920
index = ["winlogbeat-*", "logs-endpoint.events.*"]
2021
language = "kuery"
2122
license = "Elastic License"

rules/windows/defense_evasion_misc_lolbin_connecting_to_the_internet.toml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -11,6 +11,7 @@ Binaries signed with trusted digital certificates can execute on Windows systems
1111
validation. Adversaries may use these binaries to 'live off the land' and execute malicious files that could bypass
1212
application allowlists and signature validation.
1313
"""
14+
from = "now-9m"
1415
index = ["winlogbeat-*", "logs-endpoint.events.*"]
1516
language = "kuery"
1617
license = "Elastic License"

rules/windows/defense_evasion_modification_of_boot_config.toml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -10,6 +10,7 @@ description = """
1010
Identifies use of bcdedit.exe to delete boot configuration data. This tactic is sometimes used as by malware or an
1111
attacker as a destructive technique.
1212
"""
13+
from = "now-9m"
1314
index = ["winlogbeat-*", "logs-endpoint.events.*"]
1415
language = "kuery"
1516
license = "Elastic License"

rules/windows/defense_evasion_volume_shadow_copy_deletion_via_vssadmin.toml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -10,6 +10,7 @@ description = """
1010
Identifies use of vssadmin.exe for shadow copy deletion on endpoints. This commonly occurs in tandem with ransomware or
1111
other destructive attacks.
1212
"""
13+
from = "now-9m"
1314
index = ["winlogbeat-*", "logs-endpoint.events.*"]
1415
language = "kuery"
1516
license = "Elastic License"

rules/windows/defense_evasion_volume_shadow_copy_deletion_via_wmic.toml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -10,6 +10,7 @@ description = """
1010
Identifies use of wmic.exe for shadow copy deletion on endpoints. This commonly occurs in tandem with ransomware or
1111
other destructive attacks.
1212
"""
13+
from = "now-9m"
1314
index = ["winlogbeat-*", "logs-endpoint.events.*"]
1415
language = "kuery"
1516
license = "Elastic License"

0 commit comments

Comments
 (0)