{ "000047bb-b27a-47ec-8b62-ef1a5d2c9e19": { "previous": { "8.2": { "rule_name": "Attempt to Modify an Okta Policy Rule", "sha256": "dedf2a77f86a3ecebeba40e8a1f54e713510e09384f2ca228c8adb9cc6322490", "type": "query", "version": 8 } }, "rule_name": "Attempt to Modify an Okta Policy Rule", "sha256": "dedf2a77f86a3ecebeba40e8a1f54e713510e09384f2ca228c8adb9cc6322490", "type": "query", "version": 9 }, "00140285-b827-4aee-aa09-8113f58a08f3": { "min_stack_version": "7.16", "previous": { "8.2": { "rule_name": "Potential Credential Access via Windows Utilities", "sha256": "3c01d95323f7c5eb6e183e2123acd3cdd13019c938cea3a4331856c7fc486ca7", "type": "eql", "version": 8 } }, "rule_name": "Potential Credential Access via Windows Utilities", "sha256": "3c01d95323f7c5eb6e183e2123acd3cdd13019c938cea3a4331856c7fc486ca7", "type": "eql", "version": 9 }, "0022d47d-39c7-4f69-a232-4fe9dc7a3acd": { "previous": { "8.2": { "rule_name": "System Shells via Services", "sha256": "f5fca5544409efa9be726ca0e0b1efcc9802cbd29a2890e2f612f30655bc5597", "type": "eql", "version": 14 } }, "rule_name": "System Shells via Services", "sha256": "f5fca5544409efa9be726ca0e0b1efcc9802cbd29a2890e2f612f30655bc5597", "type": "eql", "version": 15 }, "0136b315-b566-482f-866c-1d8e2477ba16": { "previous": { "8.2": { "rule_name": "Microsoft 365 User Restricted from Sending Email", "sha256": "e9e1b5a4251f0147cfd30074afa7a9cd6b88518af2163ff18c40fa4f156203c7", "type": "query", "version": 4 } }, "rule_name": "Microsoft 365 User Restricted from Sending Email", "sha256": "e9e1b5a4251f0147cfd30074afa7a9cd6b88518af2163ff18c40fa4f156203c7", "type": "query", "version": 5 }, "015cca13-8832-49ac-a01b-a396114809f6": { "previous": { "8.2": { "rule_name": "AWS Redshift Cluster Creation", "sha256": "77073d8d75f01751ef31afeb74cef13a1aa5fd817622767399143a4a9e32b788", "type": "query", "version": 3 } }, "rule_name": "AWS Redshift Cluster Creation", "sha256": "77073d8d75f01751ef31afeb74cef13a1aa5fd817622767399143a4a9e32b788", "type": "query", "version": 4 }, "027ff9ea-85e7-42e3-99d2-bbb7069e02eb": { "previous": { "8.2": { "rule_name": "Potential Cookies Theft via Browser Debugging", "sha256": "f7b2c8b4dbc662b7655d6a22c185a96ded676dfb7bbd01ba1387a147cf49c877", "type": "eql", "version": 4 } }, "rule_name": "Potential Cookies Theft via Browser Debugging", "sha256": "f7b2c8b4dbc662b7655d6a22c185a96ded676dfb7bbd01ba1387a147cf49c877", "type": "eql", "version": 5 }, "02a4576a-7480-4284-9327-548a806b5e48": { "previous": { "8.2": { "rule_name": "Potential Credential Access via DuplicateHandle in LSASS", "sha256": "b1de0af156bfc3f36a6e07bfd27aeeea26c2fc55324cef750b6b1795d5ec28eb", "type": "eql", "version": 5 } }, "rule_name": "Potential Credential Access via DuplicateHandle in LSASS", "sha256": "b1de0af156bfc3f36a6e07bfd27aeeea26c2fc55324cef750b6b1795d5ec28eb", "type": "eql", "version": 6 }, "02ea4563-ec10-4974-b7de-12e65aa4f9b3": { "previous": { "8.2": { "rule_name": "Dumping Account Hashes via Built-In Commands", "sha256": "520a5314864e727b87f4d29ec56a032097bc82fdbda532df5acdb01f02584c73", "type": "query", "version": 2 } }, "rule_name": "Dumping Account Hashes via Built-In Commands", "sha256": "520a5314864e727b87f4d29ec56a032097bc82fdbda532df5acdb01f02584c73", "type": "query", "version": 3 }, "03024bd9-d23f-4ec1-8674-3cf1a21e130b": { "previous": { "8.2": { "rule_name": "Microsoft 365 Exchange Safe Attachment Rule Disabled", "sha256": "da3bc7996bc722d2de60aae61f129bd3bd430f64ca4c1864d1a6169fd2489769", "type": "query", "version": 7 } }, "rule_name": "Microsoft 365 Exchange Safe Attachment Rule Disabled", "sha256": "da3bc7996bc722d2de60aae61f129bd3bd430f64ca4c1864d1a6169fd2489769", "type": "query", "version": 8 }, "035889c4-2686-4583-a7df-67f89c292f2c": { "previous": { "8.2": { "rule_name": "High Number of Process and/or Service Terminations", "sha256": "55455b766db2b90dcbc598a0b7474a3c2b226fcb1d6d03b9f6fe4e80fe170ac4", "type": "threshold", "version": 6 } }, "rule_name": "High Number of Process and/or Service Terminations", "sha256": "55455b766db2b90dcbc598a0b7474a3c2b226fcb1d6d03b9f6fe4e80fe170ac4", "type": "threshold", "version": 7 }, "0415f22a-2336-45fa-ba07-618a5942e22c": { "previous": { "8.2": { "rule_name": "Modification of OpenSSH Binaries", "sha256": "89a0895fd018a0cea6c1021f440e565af1bf0442862baf321221bdd278fb133d", "type": "query", "version": 3 } }, "rule_name": "Modification of OpenSSH Binaries", "sha256": "89a0895fd018a0cea6c1021f440e565af1bf0442862baf321221bdd278fb133d", "type": "query", "version": 4 }, "041d4d41-9589-43e2-ba13-5680af75ebc2": { "previous": { "8.2": { "rule_name": "Potential DNS Tunneling via Iodine", "sha256": "36645bca56ad02f128b2c33ccba12fcb05836968e9316539cff9f2446760fd62", "type": "query", "version": 9 } }, "rule_name": "Potential DNS Tunneling via Iodine", "sha256": "36645bca56ad02f128b2c33ccba12fcb05836968e9316539cff9f2446760fd62", "type": "query", "version": 10 }, "04c5a96f-19c5-44fd-9571-a0b033f9086f": { "previous": { "8.2": { "rule_name": "Azure AD Global Administrator Role Assigned", "sha256": "abb80aa2836f715afa34004e9b29a77a38c6bc1e65c576ab21b479e0a638245b", "type": "query", "version": 4 } }, "rule_name": "Azure AD Global Administrator Role Assigned", "sha256": "abb80aa2836f715afa34004e9b29a77a38c6bc1e65c576ab21b479e0a638245b", "type": "query", "version": 5 }, "053a0387-f3b5-4ba5-8245-8002cca2bd08": { "previous": { "8.2": { "rule_name": "Potential DLL Side-Loading via Microsoft Antimalware Service Executable", "sha256": "09547c03e6129c7949f7f3416adf014489344d5f43d4090c9235bee2730437b1", "type": "eql", "version": 5 } }, "rule_name": "Potential DLL Side-Loading via Microsoft Antimalware Service Executable", "sha256": "09547c03e6129c7949f7f3416adf014489344d5f43d4090c9235bee2730437b1", "type": "eql", "version": 6 }, "0564fb9d-90b9-4234-a411-82a546dc1343": { "previous": { "8.2": { "rule_name": "Microsoft IIS Service Account Password Dumped", "sha256": "9a71367ce47f6c9a0a69120cf743a61e12ffb4619cdc3e785fa76d2639853d1a", "type": "eql", "version": 7 } }, "rule_name": "Microsoft IIS Service Account Password Dumped", "sha256": "9a71367ce47f6c9a0a69120cf743a61e12ffb4619cdc3e785fa76d2639853d1a", "type": "eql", "version": 8 }, "05b358de-aa6d-4f6c-89e6-78f74018b43b": { "previous": { "8.2": { "rule_name": "Conhost Spawned By Suspicious Parent Process", "sha256": "0346953bc339297acd752cfc29853af25dcb4e17cb0b09c25014c67684219e2f", "type": "eql", "version": 8 } }, "rule_name": "Conhost Spawned By Suspicious Parent Process", "sha256": "778153c9cbb4e140ee288ddea3f425a7b2d00771e7cb4f28d9a9d2f65df0d364", "type": "eql", "version": 10 }, "05e5a668-7b51-4a67-93ab-e9af405c9ef3": { "previous": { "8.2": { "rule_name": "Interactive Terminal Spawned via Perl", "sha256": "14216eab6a7b7da3a481da0958407b9c094d4b7397d8893010ab7328ab9080fe", "type": "query", "version": 7 } }, "rule_name": "Interactive Terminal Spawned via Perl", "sha256": "14216eab6a7b7da3a481da0958407b9c094d4b7397d8893010ab7328ab9080fe", "type": "query", "version": 8 }, "0635c542-1b96-4335-9b47-126582d2c19a": { "previous": { "8.2": { "rule_name": "Remote System Discovery Commands", "sha256": "a7de1002d6f143e3652830157f48a969010b4f7702d3c4cb6b40b3b920e438d7", "type": "eql", "version": 7 } }, "rule_name": "Remote System Discovery Commands", "sha256": "a7de1002d6f143e3652830157f48a969010b4f7702d3c4cb6b40b3b920e438d7", "type": "eql", "version": 8 }, "06dceabf-adca-48af-ac79-ffdf4c3b1e9a": { "previous": { "8.2": { "rule_name": "Potential Evasion via Filter Manager", "sha256": "7bacbeef7e30a296210ae47a4d89084c9a061c575961862466dac562a92ad356", "type": "eql", "version": 11 } }, "rule_name": "Potential Evasion via Filter Manager", "sha256": "7bacbeef7e30a296210ae47a4d89084c9a061c575961862466dac562a92ad356", "type": "eql", "version": 12 }, "074464f9-f30d-4029-8c03-0ed237fffec7": { "previous": { "8.2": { "rule_name": "Remote Desktop Enabled in Windows Firewall by Netsh", "sha256": "bf0429e76fb9c1db6f809649d079add564548ab3be0cde7b59b0927794bb0535", "type": "eql", "version": 8 } }, "rule_name": "Remote Desktop Enabled in Windows Firewall by Netsh", "sha256": "bf0429e76fb9c1db6f809649d079add564548ab3be0cde7b59b0927794bb0535", "type": "eql", "version": 9 }, "080bc66a-5d56-4d1f-8071-817671716db9": { "previous": { "8.2": { "rule_name": "Suspicious Browser Child Process", "sha256": "9e1e62112cc8fa1fe71abcabf3fcfadbef76d36fedd31d254acafd00134195c0", "type": "eql", "version": 2 } }, "rule_name": "Suspicious Browser Child Process", "sha256": "9e1e62112cc8fa1fe71abcabf3fcfadbef76d36fedd31d254acafd00134195c0", "type": "eql", "version": 3 }, "082e3f8c-6f80-485c-91eb-5b112cb79b28": { "previous": { "8.2": { "rule_name": "Launch Agent Creation or Modification and Immediate Loading", "sha256": "d5e7a7f1a49e2fa16ac871bdc6c45439313a800e8071b31203b2277379185350", "type": "eql", "version": 3 } }, "rule_name": "Launch Agent Creation or Modification and Immediate Loading", "sha256": "d5e7a7f1a49e2fa16ac871bdc6c45439313a800e8071b31203b2277379185350", "type": "eql", "version": 4 }, "083fa162-e790-4d85-9aeb-4fea04188adb": { "previous": { "8.2": { "rule_name": "Suspicious Hidden Child Process of Launchd", "sha256": "e37783a55e181e238dbc63c6e18250cdbf12fb194ca0e8ee4d5df5fdaf6c4042", "type": "query", "version": 2 } }, "rule_name": "Suspicious Hidden Child Process of Launchd", "sha256": "e37783a55e181e238dbc63c6e18250cdbf12fb194ca0e8ee4d5df5fdaf6c4042", "type": "query", "version": 3 }, "08d5d7e2-740f-44d8-aeda-e41f4263efaf": { "previous": { "8.2": { "rule_name": "TCP Port 8000 Activity to the Internet", "sha256": "d0c6cdede82a9cafacef49dcd6afc1b13383214401be7fbaa3b09ae1fbe9a3fb", "type": "query", "version": 8 } }, "rule_name": "TCP Port 8000 Activity to the Internet", "sha256": "d0c6cdede82a9cafacef49dcd6afc1b13383214401be7fbaa3b09ae1fbe9a3fb", "type": "query", "version": 9 }, "092b068f-84ac-485d-8a55-7dd9e006715f": { "previous": { "8.2": { "rule_name": "Creation of Hidden Launch Agent or Daemon", "sha256": "94b21cc3439ddd578f40b04f3f0760e4017cf7b26b75b0d19bcd7165dcd89880", "type": "eql", "version": 4 } }, "rule_name": "Creation of Hidden Launch Agent or Daemon", "sha256": "94b21cc3439ddd578f40b04f3f0760e4017cf7b26b75b0d19bcd7165dcd89880", "type": "eql", "version": 5 }, "09443c92-46b3-45a4-8f25-383b028b258d": { "previous": { "8.2": { "rule_name": "Process Termination followed by Deletion", "sha256": "dc382e79713f5039f338758cba256fce1bea361004b17a9c2782dac1c917f5c7", "type": "eql", "version": 5 } }, "rule_name": "Process Termination followed by Deletion", "sha256": "dc382e79713f5039f338758cba256fce1bea361004b17a9c2782dac1c917f5c7", "type": "eql", "version": 6 }, "0968cfbd-40f0-4b1c-b7b1-a60736c7b241": { "previous": { "8.2": { "rule_name": "Linux Restricted Shell Breakout via cpulimit Shell Evasion", "sha256": "a49a4358e83bf40e29e9dad1bb8afb6700d89cfe5a5b3e29adaa28e1f3c0b244", "type": "eql", "version": 1 } }, "rule_name": "Linux Restricted Shell Breakout via cpulimit Shell Evasion", "sha256": "a49a4358e83bf40e29e9dad1bb8afb6700d89cfe5a5b3e29adaa28e1f3c0b244", "type": "eql", "version": 2 }, "09d028a5-dcde-409f-8ae0-557cef1b7082": { "previous": { "8.2": { "rule_name": "Azure Frontdoor Web Application Firewall (WAF) Policy Deleted", "sha256": "2c794ea54d9aa3824d1373096ab7db8786f2ca676b66d38be2430c91b38156c9", "type": "query", "version": 4 } }, "rule_name": "Azure Frontdoor Web Application Firewall (WAF) Policy Deleted", "sha256": "2c794ea54d9aa3824d1373096ab7db8786f2ca676b66d38be2430c91b38156c9", "type": "query", "version": 5 }, "0a97b20f-4144-49ea-be32-b540ecc445de": { "previous": { "8.2": { "rule_name": "Malware - Detected - Elastic Endgame", "sha256": "625e15fc2de85491b9506d68b1852e7faceace28909534416f3fe6df4b4e7506", "type": "query", "version": 8 } }, "rule_name": "Malware - Detected - Elastic Endgame", "sha256": "625e15fc2de85491b9506d68b1852e7faceace28909534416f3fe6df4b4e7506", "type": "query", "version": 9 }, "0b29cab4-dbbd-4a3f-9e8e-1287c7c11ae5": { "min_stack_version": "8.3", "previous": { "7.16": { "rule_name": "Anomalous Windows Process Creation", "sha256": "9e82b05aeb4575a98f709abc32dedcd6597e85d952b0f635e6e3efa77c34eea1", "type": "machine_learning", "version": 5 }, "8.2": { "rule_name": "Anomalous Windows Process Creation", "sha256": "e56af9f20aeb3c799f9f604360002ecd00c37feb5a712e6ffd320b7248621010", "type": "machine_learning", "version": 7 } }, "rule_name": "Anomalous Windows Process Creation", "sha256": "e56af9f20aeb3c799f9f604360002ecd00c37feb5a712e6ffd320b7248621010", "type": "machine_learning", "version": 8 }, "0b2f3da5-b5ec-47d1-908b-6ebb74814289": { "previous": { "8.2": { "rule_name": "User account exposed to Kerberoasting", "sha256": "83f7382ba03556568e6ccdea4af57e3323b8f4d337eca24c65ecdcf0042b672e", "type": "query", "version": 4 } }, "rule_name": "User account exposed to Kerberoasting", "sha256": "83f7382ba03556568e6ccdea4af57e3323b8f4d337eca24c65ecdcf0042b672e", "type": "query", "version": 5 }, "0c7ca5c2-728d-4ad9-b1c5-bbba83ecb1f4": { "previous": { "8.2": { "rule_name": "Peripheral Device Discovery", "sha256": "62bc9a1a7397ad3195956c7328708fb582678451ffe3cc782b1f85979b5bdf97", "type": "eql", "version": 7 } }, "rule_name": "Peripheral Device Discovery", "sha256": "62bc9a1a7397ad3195956c7328708fb582678451ffe3cc782b1f85979b5bdf97", "type": "eql", "version": 8 }, "0c9a14d9-d65d-486f-9b5b-91e4e6b22bd0": { "min_stack_version": "8.0", "previous": { "8.2": { "rule_name": "Threat Intel Indicator Match", "sha256": "08f8c238c50a92a88dbe751e24ae2b5cd38585ae57a0f026efa6cd46dbc395ec", "type": "threat_match", "version": 4 } }, "rule_name": "Threat Intel Indicator Match", "sha256": "08f8c238c50a92a88dbe751e24ae2b5cd38585ae57a0f026efa6cd46dbc395ec", "type": "threat_match", "version": 5 }, "0ce6487d-8069-4888-9ddd-61b52490cebc": { "previous": { "8.2": { "rule_name": "O365 Exchange Suspicious Mailbox Right Delegation", "sha256": "056521254f96e10279453630789e55bfcef8712bebc713ebd993a79d6c3e449f", "type": "query", "version": 4 } }, "rule_name": "O365 Exchange Suspicious Mailbox Right Delegation", "sha256": "056521254f96e10279453630789e55bfcef8712bebc713ebd993a79d6c3e449f", "type": "query", "version": 5 }, "0d69150b-96f8-467c-a86d-a67a3378ce77": { "previous": { "8.2": { "rule_name": "Nping Process Activity", "sha256": "9f2fd2cb49e759ae75d0606c5366e6428c399477ff22602ed62aeadcaf07dc6a", "type": "query", "version": 9 } }, "rule_name": "Nping Process Activity", "sha256": "9f2fd2cb49e759ae75d0606c5366e6428c399477ff22602ed62aeadcaf07dc6a", "type": "query", "version": 10 }, "0d8ad79f-9025-45d8-80c1-4f0cd3c5e8e5": { "previous": { "8.2": { "rule_name": "Execution of File Written or Modified by Microsoft Office", "sha256": "36cdee8e3178acafd49828550dd6165e96c9d6c6d363a22930ef0951f8196354", "type": "eql", "version": 7 } }, "rule_name": "Execution of File Written or Modified by Microsoft Office", "sha256": "36cdee8e3178acafd49828550dd6165e96c9d6c6d363a22930ef0951f8196354", "type": "eql", "version": 8 }, "0e52157a-8e96-4a95-a6e3-5faae5081a74": { "previous": { "8.2": { "rule_name": "SharePoint Malware File Upload", "sha256": "ec2339c33ce001404d50de90459e83490814a70cbe7257722192be7908277b0d", "type": "query", "version": 4 } }, "rule_name": "SharePoint Malware File Upload", "sha256": "ec2339c33ce001404d50de90459e83490814a70cbe7257722192be7908277b0d", "type": "query", "version": 5 }, "0e5acaae-6a64-4bbc-adb8-27649c03f7e1": { "previous": { "8.2": { "rule_name": "GCP Service Account Key Creation", "sha256": "da7d7509d3e20b62dd84274dde1294efce3201c3c1d270c12cbd05940378df7b", "type": "query", "version": 7 } }, "rule_name": "GCP Service Account Key Creation", "sha256": "da7d7509d3e20b62dd84274dde1294efce3201c3c1d270c12cbd05940378df7b", "type": "query", "version": 8 }, "0e79980b-4250-4a50-a509-69294c14e84b": { "previous": { "8.2": { "rule_name": "MsBuild Making Network Connections", "sha256": "040a83a4a14d69dbfba9c759b3726e57989f4b3fdbb1b9b8e4333ff9e4a37ba7", "type": "eql", "version": 9 } }, "rule_name": "MsBuild Making Network Connections", "sha256": "040a83a4a14d69dbfba9c759b3726e57989f4b3fdbb1b9b8e4333ff9e4a37ba7", "type": "eql", "version": 10 }, "0f616aee-8161-4120-857e-742366f5eeb3": { "previous": { "8.2": { "rule_name": "PowerShell spawning Cmd", "sha256": "02b0c2f928a762f61da9b493780d5fe36255c5565093c0d59db3776340a7b2be", "type": "query", "version": 8 } }, "rule_name": "PowerShell spawning Cmd", "sha256": "02b0c2f928a762f61da9b493780d5fe36255c5565093c0d59db3776340a7b2be", "type": "query", "version": 9 }, "0f93cb9a-1931-48c2-8cd0-f173fd3e5283": { "min_stack_version": "7.16", "previous": { "8.2": { "rule_name": "Potential LSASS Memory Dump via PssCaptureSnapShot", "sha256": "adbb844008cf9c493562c5309080461156e41dda2c575e5b11cade5ee1a4a642", "type": "threshold", "version": 5 } }, "rule_name": "Potential LSASS Memory Dump via PssCaptureSnapShot", "sha256": "adbb844008cf9c493562c5309080461156e41dda2c575e5b11cade5ee1a4a642", "type": "threshold", "version": 6 }, "0ff84c42-873d-41a2-a4ed-08d74d352d01": { "previous": { "8.2": { "rule_name": "Privilege Escalation via Root Crontab File Modification", "sha256": "a1abb66bb89a9724aa3a92789e8f5e667f5c0d2a37ba66e76aea86e582544c95", "type": "query", "version": 2 } }, "rule_name": "Privilege Escalation via Root Crontab File Modification", "sha256": "a1abb66bb89a9724aa3a92789e8f5e667f5c0d2a37ba66e76aea86e582544c95", "type": "query", "version": 3 }, "10754992-28c7-4472-be5b-f3770fd04f2d": { "previous": { "8.2": { "rule_name": "Linux Restricted Shell Breakout via awk Commands", "sha256": "d712972fb7e71daddbd2b5ced9e9845171a1e544e0e981d72fa350f743dec969", "type": "eql", "version": 1 } }, "rule_name": "Linux Restricted Shell Breakout via awk Commands", "sha256": "d712972fb7e71daddbd2b5ced9e9845171a1e544e0e981d72fa350f743dec969", "type": "eql", "version": 2 }, "10a500bb-a28f-418e-ba29-ca4c8d1a9f2f": { "previous": { "8.2": { "rule_name": "WebProxy Settings Modification", "sha256": "bfc1d542142473400cc94fe152f8c04cc7de3bd98303778df2b0d5a58750559e", "type": "query", "version": 3 } }, "rule_name": "WebProxy Settings Modification", "sha256": "bfc1d542142473400cc94fe152f8c04cc7de3bd98303778df2b0d5a58750559e", "type": "query", "version": 4 }, "11013227-0301-4a8c-b150-4db924484475": { "previous": { "8.2": { "rule_name": "Abnormally Large DNS Response", "sha256": "1c6c1c28f49e19d27efb32b7a0a94a862573e140b8942e8a0c45900daec5fdfc", "type": "query", "version": 8 } }, "rule_name": "Abnormally Large DNS Response", "sha256": "1c6c1c28f49e19d27efb32b7a0a94a862573e140b8942e8a0c45900daec5fdfc", "type": "query", "version": 9 }, "1160dcdb-0a0a-4a79-91d8-9b84616edebd": { "previous": { "8.2": { "rule_name": "Potential DLL SideLoading via Trusted Microsoft Programs", "sha256": "a15b96e8d941bb34de5bb1cb20c05f46756bd2696a7b23366a894956b4dc78d7", "type": "eql", "version": 8 } }, "rule_name": "Potential DLL SideLoading via Trusted Microsoft Programs", "sha256": "a15b96e8d941bb34de5bb1cb20c05f46756bd2696a7b23366a894956b4dc78d7", "type": "eql", "version": 9 }, "1178ae09-5aff-460a-9f2f-455cd0ac4d8e": { "previous": { "8.2": { "rule_name": "UAC Bypass via Windows Firewall Snap-In Hijack", "sha256": "4a58e037b26c33c8cf7ba52208db293282996f637eb9f0c018e476c755d815a2", "type": "eql", "version": 7 } }, "rule_name": "UAC Bypass via Windows Firewall Snap-In Hijack", "sha256": "4a58e037b26c33c8cf7ba52208db293282996f637eb9f0c018e476c755d815a2", "type": "eql", "version": 8 }, "119c8877-8613-416d-a98a-96b6664ee73a": { "previous": { "8.2": { "rule_name": "AWS RDS Snapshot Export", "sha256": "e54ac76da02c0772971016966fa9829510ed25a8cb2ef4a0b535cc85c50836cb", "type": "query", "version": 3 } }, "rule_name": "AWS RDS Snapshot Export", "sha256": "e54ac76da02c0772971016966fa9829510ed25a8cb2ef4a0b535cc85c50836cb", "type": "query", "version": 4 }, "119c8877-8613-416d-a98a-96b6664ee73a5": { "previous": { "8.2": { "rule_name": "AWS RDS Snapshot Export", "sha256": "dc07a6005a4da8eea9b23185abaf24f9db9fbe2271e4c8ddc3f39f020a9ea3d0", "type": "query", "version": 2 } }, "rule_name": "AWS RDS Snapshot Export", "sha256": "dc07a6005a4da8eea9b23185abaf24f9db9fbe2271e4c8ddc3f39f020a9ea3d0", "type": "query", "version": 3 }, "11ea6bec-ebde-4d71-a8e9-784948f8e3e9": { "previous": { "8.2": { "rule_name": "Third-party Backup Files Deleted via Unexpected Process", "sha256": "419591e43cc4c101c42c537120a98b26c5a6760abfb24f6bba8fddbd20d524fc", "type": "eql", "version": 6 } }, "rule_name": "Third-party Backup Files Deleted via Unexpected Process", "sha256": "419591e43cc4c101c42c537120a98b26c5a6760abfb24f6bba8fddbd20d524fc", "type": "eql", "version": 7 }, "12051077-0124-4394-9522-8f4f4db1d674": { "previous": { "8.2": { "rule_name": "AWS Route 53 Domain Transfer Lock Disabled", "sha256": "fb16c3f709b5cc59f4ead250115bfdac9b328fea01c4e6c8b25664e4e65d8122", "type": "query", "version": 3 } }, "rule_name": "AWS Route 53 Domain Transfer Lock Disabled", "sha256": "fb16c3f709b5cc59f4ead250115bfdac9b328fea01c4e6c8b25664e4e65d8122", "type": "query", "version": 4 }, "120559c6-5e24-49f4-9e30-8ffe697df6b9": { "previous": { "8.2": { "rule_name": "User Discovery via Whoami", "sha256": "226bffc8f05628ba3e39c84344b42aff68d3c0a8ad10612929d4cb704d902d3e", "type": "query", "version": 7 } }, "rule_name": "User Discovery via Whoami", "sha256": "226bffc8f05628ba3e39c84344b42aff68d3c0a8ad10612929d4cb704d902d3e", "type": "query", "version": 8 }, "125417b8-d3df-479f-8418-12d7e034fee3": { "previous": { "8.2": { "rule_name": "Attempt to Disable IPTables or Firewall", "sha256": "7852c6d19ed6216fb60c46fdeffb6d109d509b83ed076aab9240c57540fc2960", "type": "query", "version": 7 } }, "rule_name": "Attempt to Disable IPTables or Firewall", "sha256": "7852c6d19ed6216fb60c46fdeffb6d109d509b83ed076aab9240c57540fc2960", "type": "query", "version": 8 }, "12a2f15d-597e-4334-88ff-38a02cb1330b": { "min_stack_version": "8.2", "previous": { "8.2": { "rule_name": "Kubernetes Suspicious Self-Subject Review", "sha256": "306ca67830f8ae875c15b213764ec3c0a74b81cf5c6fb916d06b3c18d15c6553", "type": "query", "version": 2 } }, "rule_name": "Kubernetes Suspicious Self-Subject Review", "sha256": "306ca67830f8ae875c15b213764ec3c0a74b81cf5c6fb916d06b3c18d15c6553", "type": "query", "version": 2 }, "12cbf709-69e8-4055-94f9-24314385c27e": { "min_stack_version": "8.2", "previous": { "8.2": { "rule_name": "Kubernetes Pod Created With HostNetwork", "sha256": "5d921734039fe405b0c6592212c7e3019f5b13cd5364c1387b30211aebcd0f31", "type": "query", "version": 2 } }, "rule_name": "Kubernetes Pod Created With HostNetwork", "sha256": "5d921734039fe405b0c6592212c7e3019f5b13cd5364c1387b30211aebcd0f31", "type": "query", "version": 2 }, "12f07955-1674-44f7-86b5-c35da0a6f41a": { "previous": { "8.2": { "rule_name": "Suspicious Cmd Execution via WMI", "sha256": "b0ee983787f62183b3667f7047688f963bc0295b3724df34227e4b3f3a78000a", "type": "eql", "version": 6 } }, "rule_name": "Suspicious Cmd Execution via WMI", "sha256": "b0ee983787f62183b3667f7047688f963bc0295b3724df34227e4b3f3a78000a", "type": "eql", "version": 7 }, "1327384f-00f3-44d5-9a8c-2373ba071e92": { "previous": { "8.2": { "rule_name": "Persistence via Scheduled Job Creation", "sha256": "0defd980c5f36ab6de665344d2af0fd49f0d9df73599ea799119f808f1debef0", "type": "eql", "version": 5 } }, "rule_name": "Persistence via Scheduled Job Creation", "sha256": "0defd980c5f36ab6de665344d2af0fd49f0d9df73599ea799119f808f1debef0", "type": "eql", "version": 6 }, "138c5dd5-838b-446e-b1ac-c995c7f8108a": { "min_stack_version": "7.16", "previous": { "8.2": { "rule_name": "Rare User Logon", "sha256": "2cee5f1ed8eb3e96b51fe2e95091998e361671f08e86aee4e30f60585529cd00", "type": "machine_learning", "version": 4 } }, "rule_name": "Rare User Logon", "sha256": "2cee5f1ed8eb3e96b51fe2e95091998e361671f08e86aee4e30f60585529cd00", "type": "machine_learning", "version": 5 }, "139c7458-566a-410c-a5cd-f80238d6a5cd": { "previous": { "8.2": { "rule_name": "SQL Traffic to the Internet", "sha256": "26fce2242bdb3d7341ec772772151eae5dfe28e3f14a60bbe586e0d5d5842ad7", "type": "query", "version": 8 } }, "rule_name": "SQL Traffic to the Internet", "sha256": "26fce2242bdb3d7341ec772772151eae5dfe28e3f14a60bbe586e0d5d5842ad7", "type": "query", "version": 9 }, "141e9b3a-ff37-4756-989d-05d7cbf35b0e": { "previous": { "8.2": { "rule_name": "Azure External Guest User Invitation", "sha256": "f9c5b6690acc93fdfe6cae2fcb31a08572101d7f9ad2a27ba86ef235972c5386", "type": "query", "version": 7 } }, "rule_name": "Azure External Guest User Invitation", "sha256": "f9c5b6690acc93fdfe6cae2fcb31a08572101d7f9ad2a27ba86ef235972c5386", "type": "query", "version": 8 }, "143cb236-0956-4f42-a706-814bcaa0cf5a": { "previous": { "8.2": { "rule_name": "RPC (Remote Procedure Call) from the Internet", "sha256": "2b983663df2e83acf552a0e23cf64c89b7d02608e47827e831a7f83301eb1157", "type": "query", "version": 12 } }, "rule_name": "RPC (Remote Procedure Call) from the Internet", "sha256": "2b983663df2e83acf552a0e23cf64c89b7d02608e47827e831a7f83301eb1157", "type": "query", "version": 13 }, "14de811c-d60f-11ec-9fd7-f661ea17fbce": { "min_stack_version": "8.2", "previous": { "8.2": { "rule_name": "Kubernetes User Exec into Pod", "sha256": "479434937b239ed1db2b2e737280ebc352b828e02d42f9a6b502a81a26bbd158", "type": "query", "version": 3 } }, "rule_name": "Kubernetes User Exec into Pod", "sha256": "479434937b239ed1db2b2e737280ebc352b828e02d42f9a6b502a81a26bbd158", "type": "query", "version": 3 }, "14ed1aa9-ebfd-4cf9-a463-0ac59ec55204": { "previous": { "8.2": { "rule_name": "Potential Persistence via Time Provider Modification", "sha256": "27438d7546fe2773040ae8a26f1fa92ee7e93b3e006a0ab001dc3efae0168ffb", "type": "eql", "version": 4 } }, "rule_name": "Potential Persistence via Time Provider Modification", "sha256": "27438d7546fe2773040ae8a26f1fa92ee7e93b3e006a0ab001dc3efae0168ffb", "type": "eql", "version": 5 }, "15a8ba77-1c13-4274-88fe-6bd14133861e": { "previous": { "8.2": { "rule_name": "Scheduled Task Execution at Scale via GPO", "sha256": "a02b14e0e4eecfb1f00811d8373dea27f41819134a1027b66d37d6cce4eb9696", "type": "query", "version": 6 } }, "rule_name": "Scheduled Task Execution at Scale via GPO", "sha256": "a02b14e0e4eecfb1f00811d8373dea27f41819134a1027b66d37d6cce4eb9696", "type": "query", "version": 7 }, "15c0b7a7-9c34-4869-b25b-fa6518414899": { "previous": { "8.2": { "rule_name": "Remote File Download via Desktopimgdownldr Utility", "sha256": "027f4016e7b011b1e1775524d011db0f3409297811bda118d962948325c35783", "type": "eql", "version": 9 } }, "rule_name": "Remote File Download via Desktopimgdownldr Utility", "sha256": "027f4016e7b011b1e1775524d011db0f3409297811bda118d962948325c35783", "type": "eql", "version": 10 }, "15dacaa0-5b90-466b-acab-63435a59701a": { "previous": { "8.2": { "rule_name": "Virtual Private Network Connection Attempt", "sha256": "566aa4b686e805e853bdb4bcf1a3b3cd30eb2fdbc53133ba6e14e335be05c76c", "type": "eql", "version": 4 } }, "rule_name": "Virtual Private Network Connection Attempt", "sha256": "566aa4b686e805e853bdb4bcf1a3b3cd30eb2fdbc53133ba6e14e335be05c76c", "type": "eql", "version": 5 }, "16280f1e-57e6-4242-aa21-bb4d16f13b2f": { "previous": { "8.2": { "rule_name": "Azure Automation Runbook Created or Modified", "sha256": "e426eaaece53a6e1fe40d5348cd2ace438e66ba4d7326ad7eacc7d36cda6e99e", "type": "query", "version": 7 } }, "rule_name": "Azure Automation Runbook Created or Modified", "sha256": "e426eaaece53a6e1fe40d5348cd2ace438e66ba4d7326ad7eacc7d36cda6e99e", "type": "query", "version": 8 }, "16904215-2c95-4ac8-bf5c-12354e047192": { "previous": { "8.2": { "rule_name": "Potential Kerberos Attack via Bifrost", "sha256": "a7f56655ca25048d75974ac817ec66e5a3abf463324210d596a63fa3ccc77711", "type": "query", "version": 3 } }, "rule_name": "Potential Kerberos Attack via Bifrost", "sha256": "a7f56655ca25048d75974ac817ec66e5a3abf463324210d596a63fa3ccc77711", "type": "query", "version": 4 }, "169f3a93-efc7-4df2-94d6-0d9438c310d1": { "previous": { "8.2": { "rule_name": "AWS IAM Group Creation", "sha256": "3bc9921d9f20ce54ad8f1812f5f46671210c22f202b04699b27ec8b4d1a9d831", "type": "query", "version": 9 } }, "rule_name": "AWS IAM Group Creation", "sha256": "3bc9921d9f20ce54ad8f1812f5f46671210c22f202b04699b27ec8b4d1a9d831", "type": "query", "version": 10 }, "16a52c14-7883-47af-8745-9357803f0d4c": { "previous": { "8.2": { "rule_name": "Component Object Model Hijacking", "sha256": "c428fc531a25f1681bb3a26b13b8cf56b29d6c87093b3a8f14a7a6d49dc16219", "type": "eql", "version": 9 } }, "rule_name": "Component Object Model Hijacking", "sha256": "c428fc531a25f1681bb3a26b13b8cf56b29d6c87093b3a8f14a7a6d49dc16219", "type": "eql", "version": 10 }, "16fac1a1-21ee-4ca6-b720-458e3855d046": { "previous": { "8.2": { "rule_name": "Startup/Logon Script added to Group Policy Object", "sha256": "17e0c2bd35bde2a29a13b0c3601999bb1555fead5b45f0b11654ff859da8c8b6", "type": "query", "version": 6 } }, "rule_name": "Startup/Logon Script added to Group Policy Object", "sha256": "17e0c2bd35bde2a29a13b0c3601999bb1555fead5b45f0b11654ff859da8c8b6", "type": "query", "version": 7 }, "1781d055-5c66-4adf-9c59-fc0fa58336a5": { "min_stack_version": "8.3", "previous": { "7.16": { "rule_name": "Unusual Windows Username", "sha256": "15ad86ffb8402c2acabbd69bc91cf276320fbefe605de2f336f02d46936242a4", "type": "machine_learning", "version": 7 }, "8.2": { "rule_name": "Unusual Windows Username", "sha256": "8f1da2c97c296b4e212e5aacd5a608a1043a71c6de193a0568f82e09fc04cb6e", "type": "machine_learning", "version": 9 } }, "rule_name": "Unusual Windows Username", "sha256": "8f1da2c97c296b4e212e5aacd5a608a1043a71c6de193a0568f82e09fc04cb6e", "type": "machine_learning", "version": 10 }, "1781d055-5c66-4adf-9c71-fc0fa58338c7": { "min_stack_version": "8.3", "previous": { "7.16": { "rule_name": "Unusual Windows Service", "sha256": "2056eb4358a68b426256be231c045180bdc5ed38f6ea5b6f8140d1656c102a7d", "type": "machine_learning", "version": 4 }, "8.2": { "rule_name": "Unusual Windows Service", "sha256": "526315821ea6ac3e9449850d95215a802bdacb4518640f64f454e99f6cf6f251", "type": "machine_learning", "version": 6 } }, "rule_name": "Unusual Windows Service", "sha256": "526315821ea6ac3e9449850d95215a802bdacb4518640f64f454e99f6cf6f251", "type": "machine_learning", "version": 7 }, "1781d055-5c66-4adf-9d60-fc0fa58337b6": { "min_stack_version": "8.3", "previous": { "7.16": { "rule_name": "Suspicious Powershell Script", "sha256": "460a16a595ce6ae95c9edea03ef73004bc7c7308105aa6c9ea445cbde9af7acd", "type": "machine_learning", "version": 4 }, "8.2": { "rule_name": "Suspicious Powershell Script", "sha256": "62f1e3313ee3c9dbac1fa73f2238367424ff02754a4d740f973cdac6901e53a1", "type": "machine_learning", "version": 6 } }, "rule_name": "Suspicious Powershell Script", "sha256": "62f1e3313ee3c9dbac1fa73f2238367424ff02754a4d740f973cdac6901e53a1", "type": "machine_learning", "version": 7 }, "1781d055-5c66-4adf-9d82-fc0fa58449c8": { "min_stack_version": "8.3", "previous": { "7.16": { "rule_name": "Unusual Windows User Privilege Elevation Activity", "sha256": "f379e94cb9af607a023c169713f9d08359187394314686ae5e0c9e90c0cfc475", "type": "machine_learning", "version": 4 }, "8.2": { "rule_name": "Unusual Windows User Privilege Elevation Activity", "sha256": "e46cdedd322a3698ace70334ffe46355b69407965f560634a7857023937319b4", "type": "machine_learning", "version": 6 } }, "rule_name": "Unusual Windows User Privilege Elevation Activity", "sha256": "e46cdedd322a3698ace70334ffe46355b69407965f560634a7857023937319b4", "type": "machine_learning", "version": 7 }, "1781d055-5c66-4adf-9e93-fc0fa69550c9": { "min_stack_version": "8.3", "previous": { "7.16": { "rule_name": "Unusual Windows Remote User", "sha256": "56324808be7511810a3929fc18e87820ab588197a384e84b772bc3f2addc8841", "type": "machine_learning", "version": 5 }, "8.2": { "rule_name": "Unusual Windows Remote User", "sha256": "139ece349432479b389dbad5de09391bcb55c55f5fe0e4a9d97c27079deea3f6", "type": "machine_learning", "version": 7 } }, "rule_name": "Unusual Windows Remote User", "sha256": "139ece349432479b389dbad5de09391bcb55c55f5fe0e4a9d97c27079deea3f6", "type": "machine_learning", "version": 8 }, "17c7f6a5-5bc9-4e1f-92bf-13632d24384d": { "previous": { "8.2": { "rule_name": "Suspicious Execution - Short Program Name", "sha256": "f7a9602afd5c320d4f7e786cd81b89a06f9813891f1de9f73386345415fe17c2", "type": "eql", "version": 6 } }, "rule_name": "Suspicious Execution - Short Program Name", "sha256": "f7a9602afd5c320d4f7e786cd81b89a06f9813891f1de9f73386345415fe17c2", "type": "eql", "version": 7 }, "17e68559-b274-4948-ad0b-f8415bb31126": { "previous": { "8.2": { "rule_name": "Unusual Network Destination Domain Name", "sha256": "4f247c995b369cacb22a5734b72185bd8dc067b58972e3e959245d9bf0d391ab", "type": "machine_learning", "version": 4 } }, "rule_name": "Unusual Network Destination Domain Name", "sha256": "4f247c995b369cacb22a5734b72185bd8dc067b58972e3e959245d9bf0d391ab", "type": "machine_learning", "version": 5 }, "184dfe52-2999-42d9-b9d1-d1ca54495a61": { "previous": { "8.2": { "rule_name": "GCP Logging Sink Modification", "sha256": "1ffcdba13e67968ded072af5594a58c0106a9e12220cdbfa2f363a02344c80bb", "type": "query", "version": 7 } }, "rule_name": "GCP Logging Sink Modification", "sha256": "1ffcdba13e67968ded072af5594a58c0106a9e12220cdbfa2f363a02344c80bb", "type": "query", "version": 8 }, "1859ce38-6a50-422b-a5e8-636e231ea0cd": { "previous": { "8.2": { "rule_name": "Linux Restricted Shell Breakout via c89/c99 Shell evasion", "sha256": "7e7de93079eef0b085e35930659004f7dc4b966ad722932b86b82c762d627e1e", "type": "eql", "version": 1 } }, "rule_name": "Linux Restricted Shell Breakout via c89/c99 Shell evasion", "sha256": "7e7de93079eef0b085e35930659004f7dc4b966ad722932b86b82c762d627e1e", "type": "eql", "version": 2 }, "19de8096-e2b0-4bd8-80c9-34a820813fff": { "previous": { "8.2": { "rule_name": "Rare AWS Error Code", "sha256": "f2e04304395ab90b7580429890cf7e2e7ebe4d09c2a1777927222375f31c1bbc", "type": "machine_learning", "version": 9 } }, "rule_name": "Rare AWS Error Code", "sha256": "f2e04304395ab90b7580429890cf7e2e7ebe4d09c2a1777927222375f31c1bbc", "type": "machine_learning", "version": 10 }, "1a36cace-11a7-43a8-9a10-b497c5a02cd3": { "previous": { "8.2": { "rule_name": "Azure Application Credential Modification", "sha256": "2fc3c7af40f9acc3751831430f8b577e68ea3fc5381cafbdc8bfd17298b1ab66", "type": "query", "version": 6 } }, "rule_name": "Azure Application Credential Modification", "sha256": "2fc3c7af40f9acc3751831430f8b577e68ea3fc5381cafbdc8bfd17298b1ab66", "type": "query", "version": 7 }, "1a6075b0-7479-450e-8fe7-b8b8438ac570": { "previous": { "8.2": { "rule_name": "Execution of COM object via Xwizard", "sha256": "44257ec40965e6ab0a48e4394db0bff1ea0ef3f7d5d3b41bb5d0fa409457be82", "type": "eql", "version": 4 } }, "rule_name": "Execution of COM object via Xwizard", "sha256": "44257ec40965e6ab0a48e4394db0bff1ea0ef3f7d5d3b41bb5d0fa409457be82", "type": "eql", "version": 5 }, "1aa8fa52-44a7-4dae-b058-f3333b91c8d7": { "previous": { "8.2": { "rule_name": "AWS CloudTrail Log Suspended", "sha256": "6d33570b7f5f13b7bfa3455e553534f7e704a74e0a7d562b402478fab02b9809", "type": "query", "version": 8 } }, "rule_name": "AWS CloudTrail Log Suspended", "sha256": "6d33570b7f5f13b7bfa3455e553534f7e704a74e0a7d562b402478fab02b9809", "type": "query", "version": 9 }, "1aa9181a-492b-4c01-8b16-fa0735786b2b": { "previous": { "8.2": { "rule_name": "User Account Creation", "sha256": "ce771b5fe692673c9406f8817adb67945f35fca9271439cd07325d772d3781eb", "type": "eql", "version": 13 } }, "rule_name": "User Account Creation", "sha256": "ce771b5fe692673c9406f8817adb67945f35fca9271439cd07325d772d3781eb", "type": "eql", "version": 14 }, "1b21abcc-4d9f-4b08-a7f5-316f5f94b973": { "previous": { "8.2": { "rule_name": "Connection to Internal Network via Telnet", "sha256": "75c7280b4e96dec3da01270b1605656b1b566c914736d730a68aa1697c57d408", "type": "eql", "version": 7 } }, "rule_name": "Connection to Internal Network via Telnet", "sha256": "75c7280b4e96dec3da01270b1605656b1b566c914736d730a68aa1697c57d408", "type": "eql", "version": 8 }, "1ba5160d-f5a2-4624-b0ff-6a1dc55d2516": { "previous": { "8.2": { "rule_name": "AWS ElastiCache Security Group Modified or Deleted", "sha256": "f22b89997980f0f7bb68c6d90afb377a6248cbe72383c35af9fc8a7b1cdf1b63", "type": "query", "version": 4 } }, "rule_name": "AWS ElastiCache Security Group Modified or Deleted", "sha256": "f22b89997980f0f7bb68c6d90afb377a6248cbe72383c35af9fc8a7b1cdf1b63", "type": "query", "version": 5 }, "1c6a8c7a-5cb6-4a82-ba27-d5a5b8a40a38": { "previous": { "8.2": { "rule_name": "Possible Consent Grant Attack via Azure-Registered Application", "sha256": "14fb74bce42766824f847f4c2bf6d5662cad739dce676ebdc19b05f836ac231c", "type": "query", "version": 7 } }, "rule_name": "Possible Consent Grant Attack via Azure-Registered Application", "sha256": "14fb74bce42766824f847f4c2bf6d5662cad739dce676ebdc19b05f836ac231c", "type": "query", "version": 8 }, "1c84dd64-7e6c-4bad-ac73-a5014ee37042": { "previous": { "8.2": { "rule_name": "Suspicious File Creation in /etc for Persistence", "sha256": "cd44fc5e40375972b33100b8d229cd34d67d82620aafdc33c5e04e49bcc0722d", "type": "eql", "version": 2 } }, "rule_name": "Suspicious File Creation in /etc for Persistence", "sha256": "cd44fc5e40375972b33100b8d229cd34d67d82620aafdc33c5e04e49bcc0722d", "type": "eql", "version": 3 }, "1c966416-60c1-436b-bfd0-e002fddbfd89": { "previous": { "8.2": { "rule_name": "Azure Kubernetes Rolebindings Created", "sha256": "c1d21aa629ba82e68861ad58ac66781556f69ca6897fdc739676ae92cb5d530c", "type": "query", "version": 3 } }, "rule_name": "Azure Kubernetes Rolebindings Created", "sha256": "c1d21aa629ba82e68861ad58ac66781556f69ca6897fdc739676ae92cb5d530c", "type": "query", "version": 4 }, "1cd01db9-be24-4bef-8e7c-e923f0ff78ab": { "previous": { "8.2": { "rule_name": "Incoming Execution via WinRM Remote Shell", "sha256": "56c7c664e2231aae0f28ffeaebfd255b0ccd630664c396f8b269c2922e5eda24", "type": "eql", "version": 5 } }, "rule_name": "Incoming Execution via WinRM Remote Shell", "sha256": "56c7c664e2231aae0f28ffeaebfd255b0ccd630664c396f8b269c2922e5eda24", "type": "eql", "version": 6 }, "1d276579-3380-4095-ad38-e596a01bc64f": { "previous": { "8.2": { "rule_name": "Remote File Download via Script Interpreter", "sha256": "5c856b88cd99da9cc3234fbb92474ade21790debb6b3f9cea3084dfbab5ac401", "type": "eql", "version": 6 } }, "rule_name": "Remote File Download via Script Interpreter", "sha256": "5c856b88cd99da9cc3234fbb92474ade21790debb6b3f9cea3084dfbab5ac401", "type": "eql", "version": 7 }, "1d72d014-e2ab-4707-b056-9b96abe7b511": { "previous": { "8.2": { "rule_name": "External IP Lookup from Non-Browser Process", "sha256": "16796f9d1d8e8bbc8f8adaeb103a3e40551ccd80dfa261da294bb638fe2e8996", "type": "eql", "version": 10 } }, "rule_name": "External IP Lookup from Non-Browser Process", "sha256": "16796f9d1d8e8bbc8f8adaeb103a3e40551ccd80dfa261da294bb638fe2e8996", "type": "eql", "version": 11 }, "1dcc51f6-ba26-49e7-9ef4-2655abb2361e": { "previous": { "8.2": { "rule_name": "UAC Bypass via DiskCleanup Scheduled Task Hijack", "sha256": "5131fde7ee1d9a7ab0bf8e5af795722e91d8700dcad6afbc10007bc8518bc09f", "type": "eql", "version": 9 } }, "rule_name": "UAC Bypass via DiskCleanup Scheduled Task Hijack", "sha256": "5131fde7ee1d9a7ab0bf8e5af795722e91d8700dcad6afbc10007bc8518bc09f", "type": "eql", "version": 10 }, "1defdd62-cd8d-426e-a246-81a37751bb2b": { "previous": { "8.2": { "rule_name": "Execution of File Written or Modified by PDF Reader", "sha256": "fba0eaa1fc953b4e7364f5c98fc3c215c1d57826f355a11a2caa45bc09408a23", "type": "eql", "version": 6 } }, "rule_name": "Execution of File Written or Modified by PDF Reader", "sha256": "fba0eaa1fc953b4e7364f5c98fc3c215c1d57826f355a11a2caa45bc09408a23", "type": "eql", "version": 7 }, "1e0b832e-957e-43ae-b319-db82d228c908": { "previous": { "8.2": { "rule_name": "Azure Storage Account Key Regenerated", "sha256": "bef3f0b6705e193153c99d5f218502cca9f9cc83ec6d4131a6a5801931050919", "type": "query", "version": 7 } }, "rule_name": "Azure Storage Account Key Regenerated", "sha256": "bef3f0b6705e193153c99d5f218502cca9f9cc83ec6d4131a6a5801931050919", "type": "query", "version": 8 }, "1e9fc667-9ff1-4b33-9f40-fefca8537eb0": { "min_stack_version": "8.3", "previous": { "7.16": { "rule_name": "Unusual Sudo Activity", "sha256": "ea35fdcda2944c1f32b9212d1a678d78dbb16552282224aaba7c0cf16fd29716", "type": "machine_learning", "version": 2 }, "8.2": { "rule_name": "Unusual Sudo Activity", "sha256": "9d82b230918f0db964b2f2e07fca49ec284c7105c28d58018a4d322e5893bca0", "type": "machine_learning", "version": 3 } }, "rule_name": "Unusual Sudo Activity", "sha256": "9d82b230918f0db964b2f2e07fca49ec284c7105c28d58018a4d322e5893bca0", "type": "machine_learning", "version": 4 }, "1faec04b-d902-4f89-8aff-92cd9043c16f": { "min_stack_version": "8.3", "previous": { "7.16": { "rule_name": "Unusual Linux User Calling the Metadata Service", "sha256": "d8647d38ddacdcf88500083f0009fe8c6bf67cbfa193518c40becdf8c8120be3", "type": "machine_learning", "version": 3 }, "8.2": { "rule_name": "Unusual Linux User Calling the Metadata Service", "sha256": "0aec86484ab498ecfb07296e0217a2b218976158fc0c2d60ed1d7afa05fbeee4", "type": "machine_learning", "version": 5 } }, "rule_name": "Unusual Linux User Calling the Metadata Service", "sha256": "0aec86484ab498ecfb07296e0217a2b218976158fc0c2d60ed1d7afa05fbeee4", "type": "machine_learning", "version": 6 }, "1fe3b299-fbb5-4657-a937-1d746f2c711a": { "previous": { "8.2": { "rule_name": "Unusual Network Activity from a Windows System Binary", "sha256": "a25a6cfa7841ba61409e38f3cc4451de3b533cb44ae51b026ff5e2cd75fd893e", "type": "eql", "version": 3 } }, "rule_name": "Unusual Network Activity from a Windows System Binary", "sha256": "a25a6cfa7841ba61409e38f3cc4451de3b533cb44ae51b026ff5e2cd75fd893e", "type": "eql", "version": 4 }, "2003cdc8-8d83-4aa5-b132-1f9a8eb48514": { "previous": { "8.2": { "rule_name": "Exploit - Detected - Elastic Endgame", "sha256": "95bb907bc085874a3566cc325863a188bd1ac263ddbc008b39980f9e3ff2fd0c", "type": "query", "version": 9 } }, "rule_name": "Exploit - Detected - Elastic Endgame", "sha256": "95bb907bc085874a3566cc325863a188bd1ac263ddbc008b39980f9e3ff2fd0c", "type": "query", "version": 10 }, "201200f1-a99b-43fb-88ed-f65a45c4972c": { "previous": { "8.2": { "rule_name": "Suspicious .NET Code Compilation", "sha256": "97dc8e7e9d6f7c4863906556b2bf8afa6d1deb8b3274c2f5345b42fd092752ed", "type": "eql", "version": 8 } }, "rule_name": "Suspicious .NET Code Compilation", "sha256": "97dc8e7e9d6f7c4863906556b2bf8afa6d1deb8b3274c2f5345b42fd092752ed", "type": "eql", "version": 9 }, "203ab79b-239b-4aa5-8e54-fc50623ee8e4": { "previous": { "8.2": { "rule_name": "Creation or Modification of Root Certificate", "sha256": "714f37e9addc475ea630aabfa7b6f39d9f66e42f2eb4421d7b8db2c12d66481b", "type": "eql", "version": 4 } }, "rule_name": "Creation or Modification of Root Certificate", "sha256": "f74c750f35a340377bdedd1e030b78774573d90db73e7f7d4fc56b32a00198c6", "type": "eql", "version": 6 }, "2045567e-b0af-444a-8c0b-0b6e2dae9e13": { "previous": { "8.2": { "rule_name": "AWS Route 53 Domain Transferred to Another Account", "sha256": "55fc97b8c86d4bb2f2f3e6223d1c095fd7f23b4a7660daf7731df2327b94b208", "type": "query", "version": 3 } }, "rule_name": "AWS Route 53 Domain Transferred to Another Account", "sha256": "55fc97b8c86d4bb2f2f3e6223d1c095fd7f23b4a7660daf7731df2327b94b208", "type": "query", "version": 4 }, "20457e4f-d1de-4b92-ae69-142e27a4342a": { "previous": { "8.2": { "rule_name": "Access of Stored Browser Credentials", "sha256": "c4dd5556b1c735614208838e4d7793a0f092cc395477556e31e689ba5af55d42", "type": "eql", "version": 4 } }, "rule_name": "Access of Stored Browser Credentials", "sha256": "c4dd5556b1c735614208838e4d7793a0f092cc395477556e31e689ba5af55d42", "type": "eql", "version": 5 }, "208dbe77-01ed-4954-8d44-1e5751cb20de": { "previous": { "8.2": { "rule_name": "LSASS Memory Dump Handle Access", "sha256": "382d58e6dfe06d1311617f60fd4a251a23cbb5d63ada9943fb89552b5f26411e", "type": "eql", "version": 4 } }, "rule_name": "LSASS Memory Dump Handle Access", "sha256": "382d58e6dfe06d1311617f60fd4a251a23cbb5d63ada9943fb89552b5f26411e", "type": "eql", "version": 5 }, "20dc4620-3b68-4269-8124-ca5091e00ea8": { "previous": { "8.2": { "rule_name": "Auditd Max Login Sessions", "sha256": "70f4efe66d78f8696efee5cf24c949aa421b1983ddb6a69944cae1e300da5a37", "type": "query", "version": 1 } }, "rule_name": "Auditd Max Login Sessions", "sha256": "70f4efe66d78f8696efee5cf24c949aa421b1983ddb6a69944cae1e300da5a37", "type": "query", "version": 2 }, "2215b8bd-1759-4ffa-8ab8-55c8e6b32e7f": { "previous": { "8.2": { "rule_name": "SSH Authorized Keys File Modification", "sha256": "f4a814e58f6a670a3e9710e4019205d89ecef4e9d52ebd79f3f48f11f34589b6", "type": "query", "version": 3 } }, "rule_name": "SSH Authorized Keys File Modification", "sha256": "f4a814e58f6a670a3e9710e4019205d89ecef4e9d52ebd79f3f48f11f34589b6", "type": "query", "version": 4 }, "22599847-5d13-48cb-8872-5796fee8692b": { "previous": { "8.2": { "rule_name": "SUNBURST Command and Control Activity", "sha256": "d33d74f0f5ed0b09a671003ee7a1672cf041ce88e69b9ca69e539dc48869e839", "type": "eql", "version": 7 } }, "rule_name": "SUNBURST Command and Control Activity", "sha256": "d33d74f0f5ed0b09a671003ee7a1672cf041ce88e69b9ca69e539dc48869e839", "type": "eql", "version": 8 }, "227dc608-e558-43d9-b521-150772250bae": { "previous": { "8.2": { "rule_name": "AWS S3 Bucket Configuration Deletion", "sha256": "868f9f8ea7f28d0c9c45f1ef70b0a9a30d72ee674afdc28546b4d8fd7c378dca", "type": "query", "version": 8 } }, "rule_name": "AWS S3 Bucket Configuration Deletion", "sha256": "868f9f8ea7f28d0c9c45f1ef70b0a9a30d72ee674afdc28546b4d8fd7c378dca", "type": "query", "version": 9 }, "231876e7-4d1f-4d63-a47c-47dd1acdc1cb": { "previous": { "8.2": { "rule_name": "Potential Shell via Web Server", "sha256": "7002c42afeb6def92d223533bc109ec84aa817ee6a3f7601504388ec649824c1", "type": "query", "version": 11 } }, "rule_name": "Potential Shell via Web Server", "sha256": "7002c42afeb6def92d223533bc109ec84aa817ee6a3f7601504388ec649824c1", "type": "query", "version": 12 }, "2326d1b2-9acf-4dee-bd21-867ea7378b4d": { "previous": { "8.2": { "rule_name": "GCP Storage Bucket Permissions Modification", "sha256": "13bad850d4d56d9537080bd08d7cf1323cf5493cac34d11400e2586808177847", "type": "query", "version": 7 } }, "rule_name": "GCP Storage Bucket Permissions Modification", "sha256": "13bad850d4d56d9537080bd08d7cf1323cf5493cac34d11400e2586808177847", "type": "query", "version": 8 }, "2339f03c-f53f-40fa-834b-40c5983fc41f": { "previous": { "8.2": { "rule_name": "Kernel module load via insmod", "sha256": "00034358a863e1b9dc7532f056419e3c240ddd0e1349c00956bb2dbdeb11fc8e", "type": "eql", "version": 2 } }, "rule_name": "Kernel module load via insmod", "sha256": "00034358a863e1b9dc7532f056419e3c240ddd0e1349c00956bb2dbdeb11fc8e", "type": "eql", "version": 3 }, "25224a80-5a4a-4b8a-991e-6ab390465c4f": { "previous": { "8.2": { "rule_name": "Lateral Movement via Startup Folder", "sha256": "9ad1a9c3f452322adba0046955b76a13b0b567ebd9c842ed48fce9b18dfc57e3", "type": "eql", "version": 6 } }, "rule_name": "Lateral Movement via Startup Folder", "sha256": "9ad1a9c3f452322adba0046955b76a13b0b567ebd9c842ed48fce9b18dfc57e3", "type": "eql", "version": 7 }, "2636aa6c-88b5-4337-9c31-8d0192a8ef45": { "previous": { "8.2": { "rule_name": "Azure Blob Container Access Level Modification", "sha256": "d51872339b331d3547a459099f4407a540ce502c4bf2039f54fd5e157d7f7fc8", "type": "query", "version": 7 } }, "rule_name": "Azure Blob Container Access Level Modification", "sha256": "d51872339b331d3547a459099f4407a540ce502c4bf2039f54fd5e157d7f7fc8", "type": "query", "version": 8 }, "265db8f5-fc73-4d0d-b434-6483b56372e2": { "previous": { "8.2": { "rule_name": "Persistence via Update Orchestrator Service Hijack", "sha256": "d3382fc0a0f367a108909a7fb25110d07c9e6c6d38c0d616a66e83552e142ecc", "type": "eql", "version": 7 } }, "rule_name": "Persistence via Update Orchestrator Service Hijack", "sha256": "c26b7c08065554bbc3fd0106cdbc29198287f6f8784575135b2d2fcefdabf6d2", "type": "eql", "version": 9 }, "26edba02-6979-4bce-920a-70b080a7be81": { "previous": { "8.2": { "rule_name": "Azure Active Directory High Risk User Sign-in Heuristic", "sha256": "b0438274bbdcee7ca48f1445851a431851fc28d5493b108ce0eff1353199bf3b", "type": "query", "version": 3 } }, "rule_name": "Azure Active Directory High Risk User Sign-in Heuristic", "sha256": "b0438274bbdcee7ca48f1445851a431851fc28d5493b108ce0eff1353199bf3b", "type": "query", "version": 4 }, "26f68dba-ce29-497b-8e13-b4fde1db5a2d": { "previous": { "8.2": { "rule_name": "Attempts to Brute Force a Microsoft 365 User Account", "sha256": "9401b75236db68cd9cc6b95298e0c058e8bddfbc598bfe19ac9d3821904450c7", "type": "threshold", "version": 9 } }, "rule_name": "Attempts to Brute Force a Microsoft 365 User Account", "sha256": "9401b75236db68cd9cc6b95298e0c058e8bddfbc598bfe19ac9d3821904450c7", "type": "threshold", "version": 10 }, "272a6484-2663-46db-a532-ef734bf9a796": { "previous": { "8.2": { "rule_name": "Microsoft 365 Exchange Transport Rule Modification", "sha256": "f0d2392b5756282cd0987d6dc90550d4680e9718bfe0e97ba517f6c619e22cfc", "type": "query", "version": 7 } }, "rule_name": "Microsoft 365 Exchange Transport Rule Modification", "sha256": "f0d2392b5756282cd0987d6dc90550d4680e9718bfe0e97ba517f6c619e22cfc", "type": "query", "version": 8 }, "2772264c-6fb9-4d9d-9014-b416eed21254": { "previous": { "8.2": { "rule_name": "Incoming Execution via PowerShell Remoting", "sha256": "a452d8013223170883e9dfe54e40a70f096c56809ee6f00b4b3b3bed88923cea", "type": "eql", "version": 6 } }, "rule_name": "Incoming Execution via PowerShell Remoting", "sha256": "a452d8013223170883e9dfe54e40a70f096c56809ee6f00b4b3b3bed88923cea", "type": "eql", "version": 7 }, "2783d84f-5091-4d7d-9319-9fceda8fa71b": { "previous": { "8.2": { "rule_name": "GCP Firewall Rule Modification", "sha256": "fccaa904f802277b7009a410145e95e6124f88c8daaede709907851290d338b1", "type": "query", "version": 7 } }, "rule_name": "GCP Firewall Rule Modification", "sha256": "fccaa904f802277b7009a410145e95e6124f88c8daaede709907851290d338b1", "type": "query", "version": 8 }, "27f7c15a-91f8-4c3d-8b9e-1f99cc030a51": { "previous": { "8.2": { "rule_name": "Microsoft 365 Teams External Access Enabled", "sha256": "59f72647630785fb2d391210c03d5fd612a72ba3a8bfe38c766bb7d53e161432", "type": "query", "version": 7 } }, "rule_name": "Microsoft 365 Teams External Access Enabled", "sha256": "59f72647630785fb2d391210c03d5fd612a72ba3a8bfe38c766bb7d53e161432", "type": "query", "version": 8 }, "2820c9c2-bcd7-4d6e-9eba-faf3891ba450": { "previous": { "8.2": { "rule_name": "Account Password Reset Remotely", "sha256": "366853c0df9537317d7b8251ee2c51f083128394041665377f22dd63ed7104ae", "type": "eql", "version": 5 } }, "rule_name": "Account Password Reset Remotely", "sha256": "366853c0df9537317d7b8251ee2c51f083128394041665377f22dd63ed7104ae", "type": "eql", "version": 6 }, "2856446a-34e6-435b-9fb5-f8f040bfa7ed": { "min_stack_version": "7.16", "previous": { "7.16": { "rule_name": "Net command via SYSTEM account", "sha256": "a97a15880fef84d759e6bab118b8f3c882e1cfaa9d51f83415729f840218004a", "type": "eql", "version": 10 }, "8.2": { "rule_name": "Account Discovery Command via SYSTEM Account", "sha256": "e8ae7f22635132da7b5bf3533b25a8dc4f4f40bf2f7211baf9eeafdade399681", "type": "eql", "version": 14 } }, "rule_name": "Account Discovery Command via SYSTEM Account", "sha256": "e8ae7f22635132da7b5bf3533b25a8dc4f4f40bf2f7211baf9eeafdade399681", "type": "eql", "version": 15 }, "2863ffeb-bf77-44dd-b7a5-93ef94b72036": { "previous": { "8.2": { "rule_name": "Exploit - Prevented - Elastic Endgame", "sha256": "27305767d7089a0c2bead91f22c1603ce3948e10ed90397be8c2155689b3ed24", "type": "query", "version": 9 } }, "rule_name": "Exploit - Prevented - Elastic Endgame", "sha256": "27305767d7089a0c2bead91f22c1603ce3948e10ed90397be8c2155689b3ed24", "type": "query", "version": 10 }, "28896382-7d4f-4d50-9b72-67091901fd26": { "previous": { "8.2": { "rule_name": "Suspicious Process from Conhost", "sha256": "166baa4ec5aa318e31032e58e6481323c9332f11eb53f214bfdd71b0ec7e2a79", "type": "eql", "version": 8 } }, "rule_name": "Suspicious Process from Conhost", "sha256": "166baa4ec5aa318e31032e58e6481323c9332f11eb53f214bfdd71b0ec7e2a79", "type": "eql", "version": 9 }, "29052c19-ff3e-42fd-8363-7be14d7c5469": { "previous": { "8.2": { "rule_name": "AWS Security Group Configuration Change Detection", "sha256": "5be1de2e3af44cc0cbc167f1d7f1c90ff48444098d0c24135c9dc6c35e832acc", "type": "query", "version": 6 } }, "rule_name": "AWS Security Group Configuration Change Detection", "sha256": "5be1de2e3af44cc0cbc167f1d7f1c90ff48444098d0c24135c9dc6c35e832acc", "type": "query", "version": 7 }, "290aca65-e94d-403b-ba0f-62f320e63f51": { "previous": { "8.2": { "rule_name": "UAC Bypass Attempt via Windows Directory Masquerading", "sha256": "2e9b10172e965f60c6b8f06deb3d2afa88655d6cbeef88190d829bcc615583bd", "type": "eql", "version": 7 } }, "rule_name": "UAC Bypass Attempt via Windows Directory Masquerading", "sha256": "2e9b10172e965f60c6b8f06deb3d2afa88655d6cbeef88190d829bcc615583bd", "type": "eql", "version": 8 }, "2917d495-59bd-4250-b395-c29409b76086": { "previous": { "8.2": { "rule_name": "Webshell Detection: Script Process Child of Common Web Processes", "sha256": "8cc89a2f3954e9a94d134551b2c7e35824ddb4b0953aec193a7ccde465ac6c28", "type": "eql", "version": 6 } }, "rule_name": "Webshell Detection: Script Process Child of Common Web Processes", "sha256": "8cc89a2f3954e9a94d134551b2c7e35824ddb4b0953aec193a7ccde465ac6c28", "type": "eql", "version": 7 }, "291a0de9-937a-4189-94c0-3e847c8b13e4": { "previous": { "8.2": { "rule_name": "Enumeration of Privileged Local Groups Membership", "sha256": "575aaf909236a3e15025f06c51df8face3f68a0f0cdfcb253cf6f5f4509ac867", "type": "eql", "version": 6 } }, "rule_name": "Enumeration of Privileged Local Groups Membership", "sha256": "575aaf909236a3e15025f06c51df8face3f68a0f0cdfcb253cf6f5f4509ac867", "type": "eql", "version": 7 }, "2abda169-416b-4bb3-9a6b-f8d239fd78ba": { "min_stack_version": "8.2", "previous": { "8.2": { "rule_name": "Kubernetes Pod created with a Sensitive hostPath Volume", "sha256": "76a4d90f474312006bcc062984e7e4a5062a0cdda1696fe87156f8400270e065", "type": "query", "version": 2 } }, "rule_name": "Kubernetes Pod created with a Sensitive hostPath Volume", "sha256": "76a4d90f474312006bcc062984e7e4a5062a0cdda1696fe87156f8400270e065", "type": "query", "version": 2 }, "2bf78aa2-9c56-48de-b139-f169bf99cf86": { "previous": { "8.2": { "rule_name": "Adobe Hijack Persistence", "sha256": "5a2f33680f5d3113713dd626971011549b97cc2b4350b07969eb59c02e9ee152", "type": "eql", "version": 13 } }, "rule_name": "Adobe Hijack Persistence", "sha256": "5a2f33680f5d3113713dd626971011549b97cc2b4350b07969eb59c02e9ee152", "type": "eql", "version": 14 }, "2c17e5d7-08b9-43b2-b58a-0270d65ac85b": { "previous": { "8.2": { "rule_name": "Windows Defender Exclusions Added via PowerShell", "sha256": "088e485e3d1aeb759eb92a66555505e50734785025cc47355e17829f84d82169", "type": "eql", "version": 10 } }, "rule_name": "Windows Defender Exclusions Added via PowerShell", "sha256": "088e485e3d1aeb759eb92a66555505e50734785025cc47355e17829f84d82169", "type": "eql", "version": 11 }, "2c3c29a4-f170-42f8-a3d8-2ceebc18eb6a": { "previous": { "8.2": { "rule_name": "Suspicious Microsoft Diagnostics Wizard Execution", "sha256": "f07cc13e81021a1c7b7fd9908e841716a1bc7a221e1a9e4e02d8fee5a5867e71", "type": "eql", "version": 3 } }, "rule_name": "Suspicious Microsoft Diagnostics Wizard Execution", "sha256": "f07cc13e81021a1c7b7fd9908e841716a1bc7a221e1a9e4e02d8fee5a5867e71", "type": "eql", "version": 4 }, "2d8043ed-5bda-4caf-801c-c1feb7410504": { "previous": { "8.2": { "rule_name": "Enumeration of Kernel Modules", "sha256": "03683b876a96a5fe0dd98bb1c35c92bcdae7b8a549404c7c78008beb2242f655", "type": "query", "version": 7 } }, "rule_name": "Enumeration of Kernel Modules", "sha256": "03683b876a96a5fe0dd98bb1c35c92bcdae7b8a549404c7c78008beb2242f655", "type": "query", "version": 8 }, "2dd480be-1263-4d9c-8672-172928f6789a": { "previous": { "8.2": { "rule_name": "Suspicious Process Access via Direct System Call", "sha256": "bc4e5b17b420342831d86fc15f5d8cef6867bf094c8f2724fac70a4b7ed13bc0", "type": "eql", "version": 5 } }, "rule_name": "Suspicious Process Access via Direct System Call", "sha256": "bc4e5b17b420342831d86fc15f5d8cef6867bf094c8f2724fac70a4b7ed13bc0", "type": "eql", "version": 6 }, "2de10e77-c144-4e69-afb7-344e7127abd0": { "previous": { "8.2": { "rule_name": "O365 Excessive Single Sign-On Logon Errors", "sha256": "b02f5f9fa6087a2849f387d80535cd323b4f97862415a4ecc8f09d0aed319468", "type": "threshold", "version": 6 } }, "rule_name": "O365 Excessive Single Sign-On Logon Errors", "sha256": "b02f5f9fa6087a2849f387d80535cd323b4f97862415a4ecc8f09d0aed319468", "type": "threshold", "version": 7 }, "2e1e835d-01e5-48ca-b9fc-7a61f7f11902": { "previous": { "8.2": { "rule_name": "Renamed AutoIt Scripts Interpreter", "sha256": "5c32cbb481613e7aaa4f329f37af1c5f6e0b9085744a72a79a6cdc7ab4d208eb", "type": "eql", "version": 8 } }, "rule_name": "Renamed AutoIt Scripts Interpreter", "sha256": "5c32cbb481613e7aaa4f329f37af1c5f6e0b9085744a72a79a6cdc7ab4d208eb", "type": "eql", "version": 9 }, "2e29e96a-b67c-455a-afe4-de6183431d0d": { "previous": { "8.2": { "rule_name": "Potential Process Injection via PowerShell", "sha256": "309aecd37f11dd3b2be99b60a7cdd396aa3fe063de5b5661080c78eb6431c22b", "type": "query", "version": 7 } }, "rule_name": "Potential Process Injection via PowerShell", "sha256": "309aecd37f11dd3b2be99b60a7cdd396aa3fe063de5b5661080c78eb6431c22b", "type": "query", "version": 8 }, "2e580225-2a58-48ef-938b-572933be06fe": { "previous": { "8.2": { "rule_name": "Halfbaked Command and Control Beacon", "sha256": "85ef581fbbbf8ee9caeac93bf4e6a8fb80e01ff41ddc66b44474e8ddd9c66954", "type": "query", "version": 6 } }, "rule_name": "Halfbaked Command and Control Beacon", "sha256": "85ef581fbbbf8ee9caeac93bf4e6a8fb80e01ff41ddc66b44474e8ddd9c66954", "type": "query", "version": 7 }, "2edc8076-291e-41e9-81e4-e3fcbc97ae5e": { "previous": { "8.2": { "rule_name": "Creation of a Hidden Local User Account", "sha256": "b1bc45715ad3f67d0873f1022390ee9e80f1d55f616dea411a2a50739a1e271d", "type": "eql", "version": 6 } }, "rule_name": "Creation of a Hidden Local User Account", "sha256": "b1bc45715ad3f67d0873f1022390ee9e80f1d55f616dea411a2a50739a1e271d", "type": "eql", "version": 7 }, "2f0bae2d-bf20-4465-be86-1311addebaa3": { "previous": { "8.2": { "rule_name": "GCP Kubernetes Rolebindings Created or Patched", "sha256": "6d93060f9b9e8a8cef362846ea83b74bbfd9356f08524feb784b76ba45cd90ea", "type": "query", "version": 4 } }, "rule_name": "GCP Kubernetes Rolebindings Created or Patched", "sha256": "6d93060f9b9e8a8cef362846ea83b74bbfd9356f08524feb784b76ba45cd90ea", "type": "query", "version": 5 }, "2f2f4939-0b34-40c2-a0a3-844eb7889f43": { "previous": { "8.2": { "rule_name": "PowerShell Suspicious Script with Audio Capture Capabilities", "sha256": "8c3c41ca109dd2dea80139090de9ce09e5fae9f0a5e0318894115d944a8dd281", "type": "query", "version": 8 } }, "rule_name": "PowerShell Suspicious Script with Audio Capture Capabilities", "sha256": "8c3c41ca109dd2dea80139090de9ce09e5fae9f0a5e0318894115d944a8dd281", "type": "query", "version": 9 }, "2f8a1226-5720-437d-9c20-e0029deb6194": { "previous": { "8.2": { "rule_name": "Attempt to Disable Syslog Service", "sha256": "3007982e48712f1a2dce9b7569e767c68d4325b6964c8ecb84df17d31245deb0", "type": "query", "version": 8 } }, "rule_name": "Attempt to Disable Syslog Service", "sha256": "3007982e48712f1a2dce9b7569e767c68d4325b6964c8ecb84df17d31245deb0", "type": "query", "version": 9 }, "2fba96c0-ade5-4bce-b92f-a5df2509da3f": { "previous": { "8.2": { "rule_name": "Startup Folder Persistence via Unsigned Process", "sha256": "6003ad2de2c3be0333fdecb27c68927ee1d9b1643d51c2bc8a074eb92b79b4d8", "type": "eql", "version": 5 } }, "rule_name": "Startup Folder Persistence via Unsigned Process", "sha256": "6003ad2de2c3be0333fdecb27c68927ee1d9b1643d51c2bc8a074eb92b79b4d8", "type": "eql", "version": 6 }, "2ffa1f1e-b6db-47fa-994b-1512743847eb": { "previous": { "8.2": { "rule_name": "Windows Defender Disabled via Registry Modification", "sha256": "e9fa93c9f50f9f03b3a05a385cf8125bf7c8cd82734752debf725dc325d1512d", "type": "eql", "version": 8 } }, "rule_name": "Windows Defender Disabled via Registry Modification", "sha256": "343cfcace027b26bad90dbe6afee1851712f4891b988d569df88061f6dd33a46", "type": "eql", "version": 10 }, "30562697-9859-4ae0-a8c5-dab45d664170": { "previous": { "8.2": { "rule_name": "GCP Firewall Rule Creation", "sha256": "2efaa38f1a46d34342b330869668b129aa0e7132c81917d956eb81ae46cda437", "type": "query", "version": 7 } }, "rule_name": "GCP Firewall Rule Creation", "sha256": "2efaa38f1a46d34342b330869668b129aa0e7132c81917d956eb81ae46cda437", "type": "query", "version": 8 }, "3115bd2c-0baa-4df0-80ea-45e474b5ef93": { "min_stack_version": "7.16", "previous": { "8.2": { "rule_name": "Agent Spoofing - Mismatched Agent ID", "sha256": "10c613afa51415b16d20d908959aff6312558e02c66d990e5bed76cd9736396f", "type": "query", "version": 4 } }, "rule_name": "Agent Spoofing - Mismatched Agent ID", "sha256": "10c613afa51415b16d20d908959aff6312558e02c66d990e5bed76cd9736396f", "type": "query", "version": 5 }, "31295df3-277b-4c56-a1fb-84e31b4222a9": { "previous": { "8.2": { "rule_name": "Inbound Connection to an Unsecure Elasticsearch Node", "sha256": "1979684ec4fdb9241b70f9812314315e8c66b3b3520c99d68078a4dd7359b551", "type": "query", "version": 7 } }, "rule_name": "Inbound Connection to an Unsecure Elasticsearch Node", "sha256": "1979684ec4fdb9241b70f9812314315e8c66b3b3520c99d68078a4dd7359b551", "type": "query", "version": 8 }, "31b4c719-f2b4-41f6-a9bd-fce93c2eaf62": { "previous": { "8.2": { "rule_name": "Bypass UAC via Event Viewer", "sha256": "54423012fe7a928f2b418d56e7d65fa17cc990b1d459124eb30ac12d23c06485", "type": "eql", "version": 12 } }, "rule_name": "Bypass UAC via Event Viewer", "sha256": "54423012fe7a928f2b418d56e7d65fa17cc990b1d459124eb30ac12d23c06485", "type": "eql", "version": 13 }, "3202e172-01b1-4738-a932-d024c514ba72": { "previous": { "8.2": { "rule_name": "GCP Pub/Sub Topic Deletion", "sha256": "9d9731baf6e3c9b5ce561a821f35e3b7a5bbe2531d5d49245b03d4afefd8a489", "type": "query", "version": 8 } }, "rule_name": "GCP Pub/Sub Topic Deletion", "sha256": "9d9731baf6e3c9b5ce561a821f35e3b7a5bbe2531d5d49245b03d4afefd8a489", "type": "query", "version": 9 }, "323cb487-279d-4218-bcbd-a568efe930c6": { "previous": { "8.2": { "rule_name": "Azure Network Watcher Deletion", "sha256": "9a41e06817347a17572dc03234248e5e26d5ab8c057eb554ce6d670e15fb83dd", "type": "query", "version": 8 } }, "rule_name": "Azure Network Watcher Deletion", "sha256": "9a41e06817347a17572dc03234248e5e26d5ab8c057eb554ce6d670e15fb83dd", "type": "query", "version": 9 }, "32923416-763a-4531-bb35-f33b9232ecdb": { "previous": { "8.2": { "rule_name": "RPC (Remote Procedure Call) to the Internet", "sha256": "6e1b6cf51240cf453c37dad7191ec4cdc1fb33672d8965a73e4a0bfd65b82ec0", "type": "query", "version": 12 } }, "rule_name": "RPC (Remote Procedure Call) to the Internet", "sha256": "6e1b6cf51240cf453c37dad7191ec4cdc1fb33672d8965a73e4a0bfd65b82ec0", "type": "query", "version": 13 }, "32c5cf9c-2ef8-4e87-819e-5ccb7cd18b14": { "previous": { "8.2": { "rule_name": "Program Files Directory Masquerading", "sha256": "5385a0f0781bc406c13e7ece8fa9d16b8c126277b4b7b7e32401885937073810", "type": "eql", "version": 9 } }, "rule_name": "Program Files Directory Masquerading", "sha256": "5385a0f0781bc406c13e7ece8fa9d16b8c126277b4b7b7e32401885937073810", "type": "eql", "version": 10 }, "32f4675e-6c49-4ace-80f9-97c9259dca2e": { "previous": { "8.2": { "rule_name": "Suspicious MS Outlook Child Process", "sha256": "24029f0d193a2cf015820095d04f38db8e7689d9fd80bb54736635ae3d8c4a5b", "type": "eql", "version": 12 } }, "rule_name": "Suspicious MS Outlook Child Process", "sha256": "24029f0d193a2cf015820095d04f38db8e7689d9fd80bb54736635ae3d8c4a5b", "type": "eql", "version": 13 }, "333de828-8190-4cf5-8d7c-7575846f6fe0": { "previous": { "8.2": { "rule_name": "AWS IAM User Addition to Group", "sha256": "82558f0d69b0a23d533d2ab57d661a858cb205ac3257196f4984150373f3078c", "type": "query", "version": 8 } }, "rule_name": "AWS IAM User Addition to Group", "sha256": "82558f0d69b0a23d533d2ab57d661a858cb205ac3257196f4984150373f3078c", "type": "query", "version": 9 }, "33f306e8-417c-411b-965c-c2812d6d3f4d": { "previous": { "8.2": { "rule_name": "Remote File Download via PowerShell", "sha256": "63f6a17ee37cbf0d7bd188377c4f6494d67a69c54f526dc1ca286046050c1ef0", "type": "eql", "version": 6 } }, "rule_name": "Remote File Download via PowerShell", "sha256": "63f6a17ee37cbf0d7bd188377c4f6494d67a69c54f526dc1ca286046050c1ef0", "type": "eql", "version": 7 }, "34fde489-94b0-4500-a76f-b8a157cf9269": { "min_stack_version": "8.2", "previous": { "7.16": { "rule_name": "Telnet Port Activity", "sha256": "3dd4a438c915920e6ddb0a5212603af5d94fb8a6b51a32f223d930d7e3becb89", "type": "query", "version": 11 }, "8.2": { "rule_name": "Telnet Port Activity", "sha256": "51ac5d0b9e729adae08b0ac327ccba30881f6e1f4f2922f64df9fb2e88c9575c", "type": "query", "version": 13 } }, "rule_name": "Telnet Port Activity", "sha256": "51ac5d0b9e729adae08b0ac327ccba30881f6e1f4f2922f64df9fb2e88c9575c", "type": "query", "version": 13 }, "35330ba2-c859-4c98-8b7f-c19159ea0e58": { "previous": { "8.2": { "rule_name": "Execution via Electron Child Process Node.js Module", "sha256": "c02355a58778b3164e47eb2fe4dcca11c95bd0b4829fc967ca23e910651ee41b", "type": "query", "version": 2 } }, "rule_name": "Execution via Electron Child Process Node.js Module", "sha256": "c02355a58778b3164e47eb2fe4dcca11c95bd0b4829fc967ca23e910651ee41b", "type": "query", "version": 3 }, "3535c8bb-3bd5-40f4-ae32-b7cd589d5372": { "previous": { "8.2": { "rule_name": "Port Forwarding Rule Addition", "sha256": "2faacebac328480c1a53b3958e1f5bed2b09a2c0d641f75e17937a491033b986", "type": "eql", "version": 9 } }, "rule_name": "Port Forwarding Rule Addition", "sha256": "2faacebac328480c1a53b3958e1f5bed2b09a2c0d641f75e17937a491033b986", "type": "eql", "version": 10 }, "35df0dd8-092d-4a83-88c1-5151a804f31b": { "previous": { "8.2": { "rule_name": "Unusual Parent-Child Relationship", "sha256": "af8852b1023601234ff897b8f5d1eeb58d02cb81ee32f46547b91478cddbba5d", "type": "eql", "version": 13 } }, "rule_name": "Unusual Parent-Child Relationship", "sha256": "af8852b1023601234ff897b8f5d1eeb58d02cb81ee32f46547b91478cddbba5d", "type": "eql", "version": 14 }, "35f86980-1fb1-4dff-b311-3be941549c8d": { "previous": { "8.2": { "rule_name": "Network Traffic to Rare Destination Country", "sha256": "154eabb2a4e70a6d0e7d51575de9ec07c7eb10055af37c36a9fec5645b76151a", "type": "machine_learning", "version": 2 } }, "rule_name": "Network Traffic to Rare Destination Country", "sha256": "154eabb2a4e70a6d0e7d51575de9ec07c7eb10055af37c36a9fec5645b76151a", "type": "machine_learning", "version": 3 }, "3605a013-6f0c-4f7d-88a5-326f5be262ec": { "previous": { "8.2": { "rule_name": "Potential Privilege Escalation via Local Kerberos Relay over LDAP", "sha256": "b7b6b739b9fc792afe27f022163d52b96501aec86dff5a7aa67b1ca17ecd47b3", "type": "eql", "version": 1 } }, "rule_name": "Potential Privilege Escalation via Local Kerberos Relay over LDAP", "sha256": "b7b6b739b9fc792afe27f022163d52b96501aec86dff5a7aa67b1ca17ecd47b3", "type": "eql", "version": 2 }, "3688577a-d196-11ec-90b0-f661ea17fbce": { "previous": { "8.2": { "rule_name": "Process Started from Process ID (PID) File", "sha256": "e8ea41815ee4f0e3001c542877739a0c31993fd8f340a30c227e83e1227a5b44", "type": "eql", "version": 2 } }, "rule_name": "Process Started from Process ID (PID) File", "sha256": "e8ea41815ee4f0e3001c542877739a0c31993fd8f340a30c227e83e1227a5b44", "type": "eql", "version": 3 }, "36a8e048-d888-4f61-a8b9-0f9e2e40f317": { "previous": { "8.2": { "rule_name": "Suspicious ImagePath Service Creation", "sha256": "ac78614bd3094562a1560a2ade267a06ee2169a3a4863bcd4b011c3b3ce89fb5", "type": "eql", "version": 5 } }, "rule_name": "Suspicious ImagePath Service Creation", "sha256": "ac78614bd3094562a1560a2ade267a06ee2169a3a4863bcd4b011c3b3ce89fb5", "type": "eql", "version": 6 }, "378f9024-8a0c-46a5-aa08-ce147ac73a4e": { "previous": { "8.2": { "rule_name": "AWS RDS Security Group Creation", "sha256": "722a66f40e6153b12544431635f167f5dbd5b4edf250e483143ed9e6e8301d9c", "type": "query", "version": 5 } }, "rule_name": "AWS RDS Security Group Creation", "sha256": "722a66f40e6153b12544431635f167f5dbd5b4edf250e483143ed9e6e8301d9c", "type": "query", "version": 6 }, "37994bca-0611-4500-ab67-5588afe73b77": { "previous": { "8.2": { "rule_name": "Azure Active Directory High Risk Sign-in", "sha256": "ef62c7906cdf4aa106260e0c611404ffab60bb70e64a0790b22e31594f75c489", "type": "query", "version": 5 } }, "rule_name": "Azure Active Directory High Risk Sign-in", "sha256": "ef62c7906cdf4aa106260e0c611404ffab60bb70e64a0790b22e31594f75c489", "type": "query", "version": 6 }, "37b0816d-af40-40b4-885f-bb162b3c88a9": { "previous": { "8.2": { "rule_name": "Anomalous Kernel Module Activity", "sha256": "d514b94eb1d1b1d05bf21aff148b4318ba2188538a2407bb9737943370627c12", "type": "machine_learning", "version": 4 } }, "rule_name": "Anomalous Kernel Module Activity", "sha256": "d514b94eb1d1b1d05bf21aff148b4318ba2188538a2407bb9737943370627c12", "type": "machine_learning", "version": 5 }, "37b211e8-4e2f-440f-86d8-06cc8f158cfa": { "previous": { "8.2": { "rule_name": "AWS Execution via System Manager", "sha256": "8ab164b34bcbb449f1040d1b4d9427a14ca110ae445c752316da2dc962700ffc", "type": "query", "version": 8 } }, "rule_name": "AWS Execution via System Manager", "sha256": "8ab164b34bcbb449f1040d1b4d9427a14ca110ae445c752316da2dc962700ffc", "type": "query", "version": 9 }, "37f638ea-909d-4f94-9248-edd21e4a9906": { "previous": { "8.2": { "rule_name": "Finder Sync Plugin Registered and Enabled", "sha256": "efc1781240e65e524625cc68984e802b5a8ef97c2dd150b7744be336c301abae", "type": "eql", "version": 3 } }, "rule_name": "Finder Sync Plugin Registered and Enabled", "sha256": "efc1781240e65e524625cc68984e802b5a8ef97c2dd150b7744be336c301abae", "type": "eql", "version": 4 }, "3805c3dc-f82c-4f8d-891e-63c24d3102b0": { "previous": { "8.2": { "rule_name": "Attempted Bypass of Okta MFA", "sha256": "6f055cbfbd5e2282e57c78b9a1b0cb8851f7960e4ffb18c2b3f239167c504e8a", "type": "query", "version": 8 } }, "rule_name": "Attempted Bypass of Okta MFA", "sha256": "6f055cbfbd5e2282e57c78b9a1b0cb8851f7960e4ffb18c2b3f239167c504e8a", "type": "query", "version": 9 }, "3838e0e3-1850-4850-a411-2e8c5ba40ba8": { "previous": { "8.2": { "rule_name": "Network Connection via Certutil", "sha256": "8619d4e24d08fdef2c26f7eaaa74b278e714d775103212fbb572036668ae542d", "type": "eql", "version": 10 } }, "rule_name": "Network Connection via Certutil", "sha256": "8619d4e24d08fdef2c26f7eaaa74b278e714d775103212fbb572036668ae542d", "type": "eql", "version": 11 }, "38948d29-3d5d-42e3-8aec-be832aaaf8eb": { "previous": { "8.2": { "rule_name": "Prompt for Credentials with OSASCRIPT", "sha256": "7e4e0d093d72157a60ebe588dea5f0e2bb25ab83834a0b02dd15fc010edb4096", "type": "eql", "version": 6 } }, "rule_name": "Prompt for Credentials with OSASCRIPT", "sha256": "7e4e0d093d72157a60ebe588dea5f0e2bb25ab83834a0b02dd15fc010edb4096", "type": "eql", "version": 7 }, "38e5acdd-5f20-4d99-8fe4-f0a1a592077f": { "previous": { "8.2": { "rule_name": "User Added as Owner for Azure Service Principal", "sha256": "b8c7fa9f080b3a7a21e60f4baefcbb3e150b711a42e292383bd3411f7d8ab75c", "type": "query", "version": 7 } }, "rule_name": "User Added as Owner for Azure Service Principal", "sha256": "b8c7fa9f080b3a7a21e60f4baefcbb3e150b711a42e292383bd3411f7d8ab75c", "type": "query", "version": 8 }, "39144f38-5284-4f8e-a2ae-e3fd628d90b0": { "previous": { "8.2": { "rule_name": "AWS EC2 Network Access Control List Creation", "sha256": "17ad9da50d17efe58810988b1954391a488d33a2e6e9fc2f1f7eba3d8b0b3b5a", "type": "query", "version": 9 } }, "rule_name": "AWS EC2 Network Access Control List Creation", "sha256": "17ad9da50d17efe58810988b1954391a488d33a2e6e9fc2f1f7eba3d8b0b3b5a", "type": "query", "version": 10 }, "397945f3-d39a-4e6f-8bcb-9656c2031438": { "previous": { "8.2": { "rule_name": "Persistence via Microsoft Outlook VBA", "sha256": "9e863b4c0ef5e0a4b580beca53c9f874fa881da45e1bcb5072b9a9c32a0583f9", "type": "eql", "version": 6 } }, "rule_name": "Persistence via Microsoft Outlook VBA", "sha256": "9e863b4c0ef5e0a4b580beca53c9f874fa881da45e1bcb5072b9a9c32a0583f9", "type": "eql", "version": 7 }, "3a59fc81-99d3-47ea-8cd6-d48d561fca20": { "previous": { "8.2": { "rule_name": "Potential DNS Tunneling via NsLookup", "sha256": "e8d5b9ae224dcfc8a91f31fa09aaa10122e856cd35facf81a2d70027ff2b00e2", "type": "threshold", "version": 6 } }, "rule_name": "Potential DNS Tunneling via NsLookup", "sha256": "e8d5b9ae224dcfc8a91f31fa09aaa10122e856cd35facf81a2d70027ff2b00e2", "type": "threshold", "version": 7 }, "3a86e085-094c-412d-97ff-2439731e59cb": { "previous": { "8.2": { "rule_name": "Setgid Bit Set via chmod", "sha256": "8a227c09d80f4787ecef3e02690f51fd836b29aafcd6b210d859c4cd51203941", "type": "query", "version": 6 } }, "rule_name": "Setgid Bit Set via chmod", "sha256": "8a227c09d80f4787ecef3e02690f51fd836b29aafcd6b210d859c4cd51203941", "type": "query", "version": 7 }, "3ad49c61-7adc-42c1-b788-732eda2f5abf": { "previous": { "8.2": { "rule_name": "VNC (Virtual Network Computing) to the Internet", "sha256": "bde58cd0b520e18ffcf878245612b971304555cd5cf8ebd760f85f88f56d7843", "type": "query", "version": 12 } }, "rule_name": "VNC (Virtual Network Computing) to the Internet", "sha256": "bde58cd0b520e18ffcf878245612b971304555cd5cf8ebd760f85f88f56d7843", "type": "query", "version": 13 }, "3ad77ed4-4dcf-4c51-8bfc-e3f7ce316b2f": { "previous": { "8.2": { "rule_name": "Azure Full Network Packet Capture Detected", "sha256": "ab00bf952be5af8b57e616263c15d1e95b0863f6a879d70d63100a34566ee8ca", "type": "query", "version": 3 } }, "rule_name": "Azure Full Network Packet Capture Detected", "sha256": "ab00bf952be5af8b57e616263c15d1e95b0863f6a879d70d63100a34566ee8ca", "type": "query", "version": 4 }, "3b382770-efbb-44f4-beed-f5e0a051b895": { "previous": { "8.2": { "rule_name": "Malware - Prevented - Elastic Endgame", "sha256": "c68b4300522aeae03fc3516d2d25931b932ecde33cb71de6e93d31c77490ef3d", "type": "query", "version": 8 } }, "rule_name": "Malware - Prevented - Elastic Endgame", "sha256": "c68b4300522aeae03fc3516d2d25931b932ecde33cb71de6e93d31c77490ef3d", "type": "query", "version": 9 }, "3b47900d-e793-49e8-968f-c90dc3526aa1": { "previous": { "8.2": { "rule_name": "Unusual Parent Process for cmd.exe", "sha256": "1c2f64afb040fbda999b1925ab0ee45c9d59b73d38ac1619be8afbe85553a818", "type": "eql", "version": 7 } }, "rule_name": "Unusual Parent Process for cmd.exe", "sha256": "1c2f64afb040fbda999b1925ab0ee45c9d59b73d38ac1619be8afbe85553a818", "type": "eql", "version": 8 }, "3bc6deaa-fbd4-433a-ae21-3e892f95624f": { "previous": { "8.2": { "rule_name": "NTDS or SAM Database File Copied", "sha256": "0f1389e561dd415dbf6768875f965cdaa2645f07949d8f62f18e5e4f722468cd", "type": "eql", "version": 8 } }, "rule_name": "NTDS or SAM Database File Copied", "sha256": "0f1389e561dd415dbf6768875f965cdaa2645f07949d8f62f18e5e4f722468cd", "type": "eql", "version": 9 }, "3c7e32e6-6104-46d9-a06e-da0f8b5795a0": { "min_stack_version": "8.3", "previous": { "7.16": { "rule_name": "Unusual Linux Network Port Activity", "sha256": "812b60afbec769e09def857ab8078ccd803d393f5f2fdd30ab043a95574a9df6", "type": "machine_learning", "version": 5 }, "8.2": { "rule_name": "Unusual Linux Network Port Activity", "sha256": "1000f8d810e8053e982148bf3c89a01161b070ee8107e63e90cf68a25bb11a6f", "type": "machine_learning", "version": 6 } }, "rule_name": "Unusual Linux Network Port Activity", "sha256": "1000f8d810e8053e982148bf3c89a01161b070ee8107e63e90cf68a25bb11a6f", "type": "machine_learning", "version": 7 }, "3e002465-876f-4f04-b016-84ef48ce7e5d": { "previous": { "8.2": { "rule_name": "AWS CloudTrail Log Updated", "sha256": "45f58b5b1054e9f025c799101ac3c87b050379818ddb6e57f557398a30367ebe", "type": "query", "version": 8 } }, "rule_name": "AWS CloudTrail Log Updated", "sha256": "45f58b5b1054e9f025c799101ac3c87b050379818ddb6e57f557398a30367ebe", "type": "query", "version": 9 }, "3e3d15c6-1509-479a-b125-21718372157e": { "previous": { "8.2": { "rule_name": "Suspicious Emond Child Process", "sha256": "819375f19b32e2e448e4a6d6c790da158e547f395e990731f98ac61df0932c8a", "type": "eql", "version": 2 } }, "rule_name": "Suspicious Emond Child Process", "sha256": "819375f19b32e2e448e4a6d6c790da158e547f395e990731f98ac61df0932c8a", "type": "eql", "version": 3 }, "3ecbdc9e-e4f2-43fa-8cca-63802125e582": { "previous": { "8.2": { "rule_name": "Privilege Escalation via Named Pipe Impersonation", "sha256": "5bcacdc2a7f872a967066f3497b12c82638bc3a659a27706adbff5cc5783eafc", "type": "eql", "version": 6 } }, "rule_name": "Privilege Escalation via Named Pipe Impersonation", "sha256": "5bcacdc2a7f872a967066f3497b12c82638bc3a659a27706adbff5cc5783eafc", "type": "eql", "version": 7 }, "3ed032b2-45d8-4406-bc79-7ad1eabb2c72": { "previous": { "8.2": { "rule_name": "Suspicious Process Creation CallTrace", "sha256": "5d6a9da496a04a9a386268c38a7d95b3b43dceba1eb139f789392e3888f065d4", "type": "eql", "version": 4 } }, "rule_name": "Suspicious Process Creation CallTrace", "sha256": "5d6a9da496a04a9a386268c38a7d95b3b43dceba1eb139f789392e3888f065d4", "type": "eql", "version": 5 }, "3efee4f0-182a-40a8-a835-102c68a4175d": { "previous": { "8.2": { "rule_name": "Potential Password Spraying of Microsoft 365 User Accounts", "sha256": "9698e2683dc852a3ac02802f639b1e88431d9633813aaceb33b693c1312499df", "type": "threshold", "version": 8 } }, "rule_name": "Potential Password Spraying of Microsoft 365 User Accounts", "sha256": "9698e2683dc852a3ac02802f639b1e88431d9633813aaceb33b693c1312499df", "type": "threshold", "version": 9 }, "3f0e5410-a4bf-4e8c-bcfc-79d67a285c54": { "min_stack_version": "7.16", "previous": { "8.2": { "rule_name": "CyberArk Privileged Access Security Error", "sha256": "a4cc55d9e2adab88e3dd79bef6dfb423e37db0a5132b1fc6bf861eff6c99bbd2", "type": "query", "version": 3 } }, "rule_name": "CyberArk Privileged Access Security Error", "sha256": "a4cc55d9e2adab88e3dd79bef6dfb423e37db0a5132b1fc6bf861eff6c99bbd2", "type": "query", "version": 4 }, "3f3f9fe2-d095-11ec-95dc-f661ea17fbce": { "previous": { "8.2": { "rule_name": "Binary Executed from Shared Memory Directory", "sha256": "29d1520a77823f7d088b9314de0d6631707bf5d131652be37374b82142fc1be8", "type": "eql", "version": 3 } }, "rule_name": "Binary Executed from Shared Memory Directory", "sha256": "29d1520a77823f7d088b9314de0d6631707bf5d131652be37374b82142fc1be8", "type": "eql", "version": 4 }, "403ef0d3-8259-40c9-a5b6-d48354712e49": { "previous": { "8.2": { "rule_name": "Unusual Persistence via Services Registry", "sha256": "148105c8e3a9db85c29adf3f477245aa6162c8b71b330ca7533cee54cf8653a2", "type": "eql", "version": 6 } }, "rule_name": "Unusual Persistence via Services Registry", "sha256": "148105c8e3a9db85c29adf3f477245aa6162c8b71b330ca7533cee54cf8653a2", "type": "eql", "version": 7 }, "416697ae-e468-4093-a93d-59661fa619ec": { "previous": { "8.2": { "rule_name": "Control Panel Process with Unusual Arguments", "sha256": "c6484020fa29382b8f864d5b5a4bbbbbad1c7ada1c9e3e9334a4e76f607accee", "type": "eql", "version": 5 } }, "rule_name": "Control Panel Process with Unusual Arguments", "sha256": "c6484020fa29382b8f864d5b5a4bbbbbad1c7ada1c9e3e9334a4e76f607accee", "type": "eql", "version": 6 }, "41824afb-d68c-4d0e-bfee-474dac1fa56e": { "previous": { "8.2": { "rule_name": "EggShell Backdoor Execution", "sha256": "44504d76da97f26af49a5fbced5268cdb10bb46e8ef93dc1d6da2710e79c0b67", "type": "query", "version": 3 } }, "rule_name": "EggShell Backdoor Execution", "sha256": "44504d76da97f26af49a5fbced5268cdb10bb46e8ef93dc1d6da2710e79c0b67", "type": "query", "version": 4 }, "41b638a1-8ab6-4f8e-86d9-466317ef2db5": { "previous": { "8.2": { "rule_name": "Potential Hidden Local User Account Creation", "sha256": "3a997b22b42280486c04c40ba96145e2c6142071ea7c4bdbf15093b798c3a5ca", "type": "query", "version": 2 } }, "rule_name": "Potential Hidden Local User Account Creation", "sha256": "3a997b22b42280486c04c40ba96145e2c6142071ea7c4bdbf15093b798c3a5ca", "type": "query", "version": 3 }, "42bf698b-4738-445b-8231-c834ddefd8a0": { "previous": { "8.2": { "rule_name": "Okta Brute Force or Password Spraying Attack", "sha256": "a45a3f38b8831ccd84dd07383145d7045a99f2c01c9d243a92f34cb0c21dfbb7", "type": "threshold", "version": 7 } }, "rule_name": "Okta Brute Force or Password Spraying Attack", "sha256": "a45a3f38b8831ccd84dd07383145d7045a99f2c01c9d243a92f34cb0c21dfbb7", "type": "threshold", "version": 8 }, "4330272b-9724-4bc6-a3ca-f1532b81e5c2": { "min_stack_version": "8.3", "previous": { "7.16": { "rule_name": "Unusual Login Activity", "sha256": "3f35fdeeb2a9009f7f98d3094d9923caff8ad61e07dbaeb0f483e5de46092849", "type": "machine_learning", "version": 4 }, "8.2": { "rule_name": "Unusual Login Activity", "sha256": "c0354cedd39286c9d93efd09fc08c489dcc534a65e4e8914c873908ab4a052bc", "type": "machine_learning", "version": 6 } }, "rule_name": "Unusual Login Activity", "sha256": "c0354cedd39286c9d93efd09fc08c489dcc534a65e4e8914c873908ab4a052bc", "type": "machine_learning", "version": 7 }, "43303fd4-4839-4e48-b2b2-803ab060758d": { "previous": { "8.2": { "rule_name": "Web Application Suspicious Activity: No User Agent", "sha256": "56755b194b100eeda470eb0855c654fe20b327e1b99fdbecaa104209728e5b4b", "type": "query", "version": 8 } }, "rule_name": "Web Application Suspicious Activity: No User Agent", "sha256": "56755b194b100eeda470eb0855c654fe20b327e1b99fdbecaa104209728e5b4b", "type": "query", "version": 9 }, "440e2db4-bc7f-4c96-a068-65b78da59bde": { "previous": { "8.2": { "rule_name": "Startup Persistence by a Suspicious Process", "sha256": "618ba466fd4613c40dac45fb5cae32a15e17dee64a222afcc72e6188f29f04d5", "type": "eql", "version": 7 } }, "rule_name": "Startup Persistence by a Suspicious Process", "sha256": "618ba466fd4613c40dac45fb5cae32a15e17dee64a222afcc72e6188f29f04d5", "type": "eql", "version": 8 }, "445a342e-03fb-42d0-8656-0367eb2dead5": { "min_stack_version": "8.3", "previous": { "7.16": { "rule_name": "Unusual Windows Path Activity", "sha256": "845885ac400eacce386fbf5040713ed065a66b447e5ddf8f450e0939c64bab9a", "type": "machine_learning", "version": 5 }, "8.2": { "rule_name": "Unusual Windows Path Activity", "sha256": "96e95f6a002908e770ee8dc9e06b3f4955d02ace7a630a562d77630e0f51b2f7", "type": "machine_learning", "version": 7 } }, "rule_name": "Unusual Windows Path Activity", "sha256": "96e95f6a002908e770ee8dc9e06b3f4955d02ace7a630a562d77630e0f51b2f7", "type": "machine_learning", "version": 8 }, "453f659e-0429-40b1-bfdb-b6957286e04b": { "previous": { "8.2": { "rule_name": "Permission Theft - Prevented - Elastic Endgame", "sha256": "57da49505fa7a935e774a271cd364bf67750bc8021808efebe06fbdec618e335", "type": "query", "version": 9 } }, "rule_name": "Permission Theft - Prevented - Elastic Endgame", "sha256": "57da49505fa7a935e774a271cd364bf67750bc8021808efebe06fbdec618e335", "type": "query", "version": 10 }, "45ac4800-840f-414c-b221-53dd36a5aaf7": { "previous": { "8.2": { "rule_name": "Windows Event Logs Cleared", "sha256": "851e423813f44b73b33848927aea154be22e62daf4ecdd3379a6879149a06908", "type": "query", "version": 5 } }, "rule_name": "Windows Event Logs Cleared", "sha256": "851e423813f44b73b33848927aea154be22e62daf4ecdd3379a6879149a06908", "type": "query", "version": 6 }, "45d273fb-1dca-457d-9855-bcb302180c21": { "previous": { "8.2": { "rule_name": "Encrypting Files with WinRar or 7z", "sha256": "cb63bfb0c61803088becb44b9c3f8f1bc73e2260f0eea157a700f69a7437295d", "type": "eql", "version": 8 } }, "rule_name": "Encrypting Files with WinRar or 7z", "sha256": "cb63bfb0c61803088becb44b9c3f8f1bc73e2260f0eea157a700f69a7437295d", "type": "eql", "version": 9 }, "4630d948-40d4-4cef-ac69-4002e29bc3db": { "min_stack_version": "8.2", "previous": { "7.16": { "rule_name": "Adding Hidden File Attribute via Attrib", "sha256": "e42e40c2baa181d6c3f51c29b3ad19394bba3709da075d2c61d17bf16d393bb9", "type": "eql", "version": 13 }, "8.2": { "rule_name": "Adding Hidden File Attribute via Attrib", "sha256": "c69087be2366174103a5ac765084b05b5947745b58ca65590f709b73faabf6f7", "type": "eql", "version": 15 } }, "rule_name": "Adding Hidden File Attribute via Attrib", "sha256": "c69087be2366174103a5ac765084b05b5947745b58ca65590f709b73faabf6f7", "type": "eql", "version": 15 }, "4682fd2c-cfae-47ed-a543-9bed37657aa6": { "previous": { "8.2": { "rule_name": "Potential Local NTLM Relay via HTTP", "sha256": "28e0106b8d9bc8ac54ee00ee136e0576123720767e2ad6e1cc0f31c16cd70c30", "type": "eql", "version": 2 } }, "rule_name": "Potential Local NTLM Relay via HTTP", "sha256": "28e0106b8d9bc8ac54ee00ee136e0576123720767e2ad6e1cc0f31c16cd70c30", "type": "eql", "version": 3 }, "46f804f5-b289-43d6-a881-9387cf594f75": { "min_stack_version": "8.3", "previous": { "7.16": { "rule_name": "Unusual Process For a Linux Host", "sha256": "5dec41bb8c572f24b5a47b3903e2d4e2fd9bfe5a6a86789f0b50c1c52d956af6", "type": "machine_learning", "version": 7 }, "8.2": { "rule_name": "Unusual Process For a Linux Host", "sha256": "dd683127f834182f5df0f60d7a3e94dc4e45b4c40f7852a7e4bd07f9bd32c77a", "type": "machine_learning", "version": 9 } }, "rule_name": "Unusual Process For a Linux Host", "sha256": "dd683127f834182f5df0f60d7a3e94dc4e45b4c40f7852a7e4bd07f9bd32c77a", "type": "machine_learning", "version": 10 }, "47e22836-4a16-4b35-beee-98f6c4ee9bf2": { "previous": { "8.2": { "rule_name": "Suspicious Remote Registry Access via SeBackupPrivilege", "sha256": "c984738b63fde493f2f2e2fe0181ffc0c80ada3d6f79326a3315c2161ec1584b", "type": "eql", "version": 4 } }, "rule_name": "Suspicious Remote Registry Access via SeBackupPrivilege", "sha256": "c984738b63fde493f2f2e2fe0181ffc0c80ada3d6f79326a3315c2161ec1584b", "type": "eql", "version": 5 }, "47f09343-8d1f-4bb5-8bb0-00c9d18f5010": { "previous": { "8.2": { "rule_name": "Execution via Regsvcs/Regasm", "sha256": "fa283dded0764ed89000be343cbbb926c659d742d2cf19d15ad5c5680a096578", "type": "query", "version": 7 } }, "rule_name": "Execution via Regsvcs/Regasm", "sha256": "fa283dded0764ed89000be343cbbb926c659d742d2cf19d15ad5c5680a096578", "type": "query", "version": 8 }, "47f76567-d58a-4fed-b32b-21f571e28910": { "previous": { "8.2": { "rule_name": "Apple Script Execution followed by Network Connection", "sha256": "c4a4740940d540c128e334dea8de089fb468e43885cf8cbeebddf8cb6381353c", "type": "eql", "version": 5 } }, "rule_name": "Apple Script Execution followed by Network Connection", "sha256": "c4a4740940d540c128e334dea8de089fb468e43885cf8cbeebddf8cb6381353c", "type": "eql", "version": 6 }, "483c4daf-b0c6-49e0-adf3-0bfa93231d6b": { "previous": { "8.2": { "rule_name": "Microsoft Exchange Server UM Spawning Suspicious Processes", "sha256": "eedcebd26e0ea78144cccb5eba1db658364ecf34d96bf34bda790995783e79f9", "type": "eql", "version": 4 } }, "rule_name": "Microsoft Exchange Server UM Spawning Suspicious Processes", "sha256": "eedcebd26e0ea78144cccb5eba1db658364ecf34d96bf34bda790995783e79f9", "type": "eql", "version": 5 }, "48d7f54d-c29e-4430-93a9-9db6b5892270": { "previous": { "8.2": { "rule_name": "Unexpected Child Process of macOS Screensaver Engine", "sha256": "f30fa0ea64208788e3d3960717149f32a46631f77e2d2e964069e88491cb3de6", "type": "eql", "version": 5 } }, "rule_name": "Unexpected Child Process of macOS Screensaver Engine", "sha256": "f30fa0ea64208788e3d3960717149f32a46631f77e2d2e964069e88491cb3de6", "type": "eql", "version": 6 }, "48ec9452-e1fd-4513-a376-10a1a26d2c83": { "previous": { "8.2": { "rule_name": "Potential Persistence via Periodic Tasks", "sha256": "cf16c66a3b6953e016f2e40edbee489e97e385816b8241818bd2184769ecddf4", "type": "query", "version": 2 } }, "rule_name": "Potential Persistence via Periodic Tasks", "sha256": "cf16c66a3b6953e016f2e40edbee489e97e385816b8241818bd2184769ecddf4", "type": "query", "version": 3 }, "493834ca-f861-414c-8602-150d5505b777": { "min_stack_version": "7.16", "previous": { "8.2": { "rule_name": "Agent Spoofing - Multiple Hosts Using Same Agent", "sha256": "c0189c96284facaab70cb39582539f6df586acf5eaa01b3c326823c643b90a68", "type": "threshold", "version": 3 } }, "rule_name": "Agent Spoofing - Multiple Hosts Using Same Agent", "sha256": "c0189c96284facaab70cb39582539f6df586acf5eaa01b3c326823c643b90a68", "type": "threshold", "version": 4 }, "4a4e23cf-78a2-449c-bac3-701924c269d3": { "previous": { "8.2": { "rule_name": "Possible FIN7 DGA Command and Control Behavior", "sha256": "38a9ef4430e706f69e3f25e3775ef9ab5247933a6448daed8075c460dd5d4369", "type": "query", "version": 6 } }, "rule_name": "Possible FIN7 DGA Command and Control Behavior", "sha256": "38a9ef4430e706f69e3f25e3775ef9ab5247933a6448daed8075c460dd5d4369", "type": "query", "version": 7 }, "4b438734-3793-4fda-bd42-ceeada0be8f9": { "previous": { "8.2": { "rule_name": "Disable Windows Firewall Rules via Netsh", "sha256": "86416e631a84457792ada6cecb10e4dc761dff8a81cc06e0dbfbe21ff1efd6fc", "type": "eql", "version": 14 } }, "rule_name": "Disable Windows Firewall Rules via Netsh", "sha256": "86416e631a84457792ada6cecb10e4dc761dff8a81cc06e0dbfbe21ff1efd6fc", "type": "eql", "version": 15 }, "4bd1c1af-79d4-4d37-9efa-6e0240640242": { "previous": { "8.2": { "rule_name": "Unusual Process Execution Path - Alternate Data Stream", "sha256": "ebc1e9be7060855bb004538d48a77dc3f757edda38e56820190dea71ded529da", "type": "eql", "version": 8 } }, "rule_name": "Unusual Process Execution Path - Alternate Data Stream", "sha256": "ebc1e9be7060855bb004538d48a77dc3f757edda38e56820190dea71ded529da", "type": "eql", "version": 9 }, "4d50a94f-2844-43fa-8395-6afbd5e1c5ef": { "previous": { "8.2": { "rule_name": "AWS Management Console Brute Force of Root User Identity", "sha256": "163a5f3b46f7f1b2e2d69b4b4a8f2e222a05a8629f7d156e4396434ddac22480", "type": "threshold", "version": 5 } }, "rule_name": "AWS Management Console Brute Force of Root User Identity", "sha256": "163a5f3b46f7f1b2e2d69b4b4a8f2e222a05a8629f7d156e4396434ddac22480", "type": "threshold", "version": 6 }, "4da13d6e-904f-4636-81d8-6ab14b4e6ae9": { "previous": { "8.2": { "rule_name": "Attempt to Disable Gatekeeper", "sha256": "808e1a01dee8b44d384820a3fa6c98e74fe228493494c65aaa82ec5b507af950", "type": "query", "version": 3 } }, "rule_name": "Attempt to Disable Gatekeeper", "sha256": "808e1a01dee8b44d384820a3fa6c98e74fe228493494c65aaa82ec5b507af950", "type": "query", "version": 4 }, "4de76544-f0e5-486a-8f84-eae0b6063cdc": { "previous": { "8.2": { "rule_name": "Disable Windows Event and Security Logs Using Built-in Tools", "sha256": "8a9495706a1456c58669b4d529cddec0e636b13416a3f2e94e9d71cc65519af4", "type": "eql", "version": 6 } }, "rule_name": "Disable Windows Event and Security Logs Using Built-in Tools", "sha256": "8a9495706a1456c58669b4d529cddec0e636b13416a3f2e94e9d71cc65519af4", "type": "eql", "version": 7 }, "4ed493fc-d637-4a36-80ff-ac84937e5461": { "previous": { "8.2": { "rule_name": "Execution via MSSQL xp_cmdshell Stored Procedure", "sha256": "613a9b248541187cc2f4e5863d5eba55518127600f82cc188da860bccf534957", "type": "eql", "version": 7 } }, "rule_name": "Execution via MSSQL xp_cmdshell Stored Procedure", "sha256": "6fa750938202f64ef8627ffb8933cba171b5045d30c9da22bdba053d91006275", "type": "eql", "version": 9 }, "4ed678a9-3a4f-41fb-9fea-f85a6e0a0dff": { "previous": { "8.2": { "rule_name": "Suspicious Script Object Execution", "sha256": "49382356d4adbc6bb524642f92342b9e146aef2e257c41170ce74bb06684808a", "type": "eql", "version": 6 } }, "rule_name": "Suspicious Script Object Execution", "sha256": "49382356d4adbc6bb524642f92342b9e146aef2e257c41170ce74bb06684808a", "type": "eql", "version": 7 }, "4edd3e1a-3aa0-499b-8147-4d2ea43b1613": { "previous": { "8.2": { "rule_name": "Unauthorized Access to an Okta Application", "sha256": "99bc1263ad19d3e5bfe36418f450b76f8a7271baf25aa74c58f567e37a3dfbde", "type": "query", "version": 4 } }, "rule_name": "Unauthorized Access to an Okta Application", "sha256": "99bc1263ad19d3e5bfe36418f450b76f8a7271baf25aa74c58f567e37a3dfbde", "type": "query", "version": 5 }, "4fe9d835-40e1-452d-8230-17c147cafad8": { "previous": { "8.2": { "rule_name": "Execution via TSClient Mountpoint", "sha256": "76b4b534df6142578ba17c139387f4338044983089f60686dda68091177e7b3b", "type": "eql", "version": 6 } }, "rule_name": "Execution via TSClient Mountpoint", "sha256": "76b4b534df6142578ba17c139387f4338044983089f60686dda68091177e7b3b", "type": "eql", "version": 7 }, "513f0ffd-b317-4b9c-9494-92ce861f22c7": { "previous": { "8.2": { "rule_name": "Registry Persistence via AppCert DLL", "sha256": "42e78cb6dc476edd74a7a4cc77231752fc728d27210f318e6353352c95418fa2", "type": "eql", "version": 7 } }, "rule_name": "Registry Persistence via AppCert DLL", "sha256": "42e78cb6dc476edd74a7a4cc77231752fc728d27210f318e6353352c95418fa2", "type": "eql", "version": 8 }, "514121ce-c7b6-474a-8237-68ff71672379": { "previous": { "8.2": { "rule_name": "Microsoft 365 Exchange DKIM Signing Configuration Disabled", "sha256": "7c6ef54fd34285ddd5858959918293e868ea67da752bd3df50269d11f5ebd881", "type": "query", "version": 8 } }, "rule_name": "Microsoft 365 Exchange DKIM Signing Configuration Disabled", "sha256": "7c6ef54fd34285ddd5858959918293e868ea67da752bd3df50269d11f5ebd881", "type": "query", "version": 9 }, "51859fa0-d86b-4214-bf48-ebb30ed91305": { "previous": { "8.2": { "rule_name": "GCP Logging Sink Deletion", "sha256": "c2aa4f7692508f3df54b9878b13d7b677da0a4a8a274930ecf8d50d53faa4e59", "type": "query", "version": 8 } }, "rule_name": "GCP Logging Sink Deletion", "sha256": "c2aa4f7692508f3df54b9878b13d7b677da0a4a8a274930ecf8d50d53faa4e59", "type": "query", "version": 9 }, "51ce96fb-9e52-4dad-b0ba-99b54440fc9a": { "previous": { "8.2": { "rule_name": "Incoming DCOM Lateral Movement with MMC", "sha256": "587a34e68e4cdea134965146959fd12b2739ade64e6df2b2ec43fe25b3cab661", "type": "eql", "version": 6 } }, "rule_name": "Incoming DCOM Lateral Movement with MMC", "sha256": "587a34e68e4cdea134965146959fd12b2739ade64e6df2b2ec43fe25b3cab661", "type": "eql", "version": 7 }, "523116c0-d89d-4d7c-82c2-39e6845a78ef": { "previous": { "8.2": { "rule_name": "AWS GuardDuty Detector Deletion", "sha256": "2b436fd7d94632c5c485759103c5abdc1e13947c23ddeab67e8de989041d751a", "type": "query", "version": 9 } }, "rule_name": "AWS GuardDuty Detector Deletion", "sha256": "2b436fd7d94632c5c485759103c5abdc1e13947c23ddeab67e8de989041d751a", "type": "query", "version": 10 }, "52376a86-ee86-4967-97ae-1a05f55816f0": { "previous": { "8.2": { "rule_name": "Linux Restricted Shell Breakout via Linux Binary(s)", "sha256": "8f07ff6673c541fa5e2d2463e6d68a789818b436ea225ec919255f063408bc7d", "type": "eql", "version": 3 } }, "rule_name": "Linux Restricted Shell Breakout via Linux Binary(s)", "sha256": "8f07ff6673c541fa5e2d2463e6d68a789818b436ea225ec919255f063408bc7d", "type": "eql", "version": 4 }, "52aaab7b-b51c-441a-89ce-4387b3aea886": { "previous": { "8.2": { "rule_name": "Unusual Network Connection via RunDLL32", "sha256": "1ccbdedae874405695c758eb5671221d5d68d6e5cf552c9b384f03e35a694a04", "type": "eql", "version": 12 } }, "rule_name": "Unusual Network Connection via RunDLL32", "sha256": "1ccbdedae874405695c758eb5671221d5d68d6e5cf552c9b384f03e35a694a04", "type": "eql", "version": 13 }, "52afbdc5-db15-485e-bc24-f5707f820c4b": { "min_stack_version": "8.3", "previous": { "7.16": { "rule_name": "Unusual Linux Network Activity", "sha256": "64ae86b5af4ca19baebe75a2791db256410a0bb32de52364fffef246f551bc18", "type": "machine_learning", "version": 6 }, "8.2": { "rule_name": "Unusual Linux Network Activity", "sha256": "f5304548d6e36152f1e8a35019086b17cb71276fcf3b12fec97aebb69fe3be01", "type": "machine_learning", "version": 7 } }, "rule_name": "Unusual Linux Network Activity", "sha256": "f5304548d6e36152f1e8a35019086b17cb71276fcf3b12fec97aebb69fe3be01", "type": "machine_learning", "version": 8 }, "52afbdc5-db15-485e-bc35-f5707f820c4c": { "previous": { "8.2": { "rule_name": "Unusual Linux Web Activity", "sha256": "a25a0fe20cc7cdd9b940f1455c54b3cbd54a07d575ec8d8b6219b61af322aaad", "type": "machine_learning", "version": 4 } }, "rule_name": "Unusual Linux Web Activity", "sha256": "a25a0fe20cc7cdd9b940f1455c54b3cbd54a07d575ec8d8b6219b61af322aaad", "type": "machine_learning", "version": 5 }, "52afbdc5-db15-596e-bc35-f5707f820c4b": { "previous": { "8.2": { "rule_name": "Unusual Linux Network Service", "sha256": "af448b51ebd531a54c02ae19fc4cc63deef15eb691efcc957764e26879b9a87c", "type": "machine_learning", "version": 4 } }, "rule_name": "Unusual Linux Network Service", "sha256": "af448b51ebd531a54c02ae19fc4cc63deef15eb691efcc957764e26879b9a87c", "type": "machine_learning", "version": 5 }, "530178da-92ea-43ce-94c2-8877a826783d": { "previous": { "8.2": { "rule_name": "Suspicious CronTab Creation or Modification", "sha256": "89f953967ec1e459c90a04faddb79329a3e996d02b17b2d2fccb64b7dcbb6892", "type": "eql", "version": 2 } }, "rule_name": "Suspicious CronTab Creation or Modification", "sha256": "89f953967ec1e459c90a04faddb79329a3e996d02b17b2d2fccb64b7dcbb6892", "type": "eql", "version": 3 }, "536997f7-ae73-447d-a12d-bff1e8f5f0a0": { "previous": { "8.2": { "rule_name": "AWS EFS File System or Mount Deleted", "sha256": "a7f06a11fbee770dc0fca658213ecdb0694efb4e85b3a8a8827003c2f3adb3ff", "type": "query", "version": 5 } }, "rule_name": "AWS EFS File System or Mount Deleted", "sha256": "a7f06a11fbee770dc0fca658213ecdb0694efb4e85b3a8a8827003c2f3adb3ff", "type": "query", "version": 6 }, "5370d4cd-2bb3-4d71-abf5-1e1d0ff5a2de": { "previous": { "8.2": { "rule_name": "Azure Diagnostic Settings Deletion", "sha256": "b653fc13f628033560da2a89e872042c5b76e3cc0bad743e4cdb89a5b772b2f1", "type": "query", "version": 7 } }, "rule_name": "Azure Diagnostic Settings Deletion", "sha256": "b653fc13f628033560da2a89e872042c5b76e3cc0bad743e4cdb89a5b772b2f1", "type": "query", "version": 8 }, "53a26770-9cbd-40c5-8b57-61d01a325e14": { "previous": { "8.2": { "rule_name": "Suspicious PDF Reader Child Process", "sha256": "ed2c9370862e7e9588290bd1220308cffac1b348546fd5baffd11deb67d9fa07", "type": "eql", "version": 11 } }, "rule_name": "Suspicious PDF Reader Child Process", "sha256": "ed2c9370862e7e9588290bd1220308cffac1b348546fd5baffd11deb67d9fa07", "type": "eql", "version": 12 }, "54902e45-3467-49a4-8abc-529f2c8cfb80": { "min_stack_version": "8.2", "previous": { "7.16": { "rule_name": "Uncommon Registry Persistence Change", "sha256": "53219ff8987584e6547f9575812b0376420e95da290d5f3e600c864516a5d0d4", "type": "eql", "version": 8 }, "8.2": { "rule_name": "Uncommon Registry Persistence Change", "sha256": "a60309dff671aa466f3333f41a31a9f0b07ade0b60c500733a806d732dd08124", "type": "eql", "version": 10 } }, "rule_name": "Uncommon Registry Persistence Change", "sha256": "a60309dff671aa466f3333f41a31a9f0b07ade0b60c500733a806d732dd08124", "type": "eql", "version": 10 }, "54c3d186-0461-4dc3-9b33-2dc5c7473936": { "previous": { "8.2": { "rule_name": "Network Logon Provider Registry Modification", "sha256": "1762a35e44d0c99be8dd9123b515a8d30fe75580f5dff0ec13401bfdcf3caad8", "type": "eql", "version": 4 } }, "rule_name": "Network Logon Provider Registry Modification", "sha256": "1762a35e44d0c99be8dd9123b515a8d30fe75580f5dff0ec13401bfdcf3caad8", "type": "eql", "version": 5 }, "55c2bf58-2a39-4c58-a384-c8b1978153c2": { "previous": { "8.2": { "rule_name": "Windows Service Installed via an Unusual Client", "sha256": "c767cf2974b84a37ed9d7e533c9fc774c5caa31db7573052a133b1077ac19e7e", "type": "query", "version": 3 } }, "rule_name": "Windows Service Installed via an Unusual Client", "sha256": "c767cf2974b84a37ed9d7e533c9fc774c5caa31db7573052a133b1077ac19e7e", "type": "query", "version": 4 }, "55d551c6-333b-4665-ab7e-5d14a59715ce": { "previous": { "8.2": { "rule_name": "PsExec Network Connection", "sha256": "e679a602ffc602772cfe83319e32bea413a15bac34a553b9a78137cedbe4c233", "type": "eql", "version": 9 } }, "rule_name": "PsExec Network Connection", "sha256": "e679a602ffc602772cfe83319e32bea413a15bac34a553b9a78137cedbe4c233", "type": "eql", "version": 10 }, "56557cde-d923-4b88-adee-c61b3f3b5dc3": { "previous": { "8.2": { "rule_name": "Windows CryptoAPI Spoofing Vulnerability (CVE-2020-0601 - CurveBall)", "sha256": "7c071378e65d8168d8c2e1fa931505caaec90f7a44a9de1fcf80fc35f5d7cd4a", "type": "query", "version": 7 } }, "rule_name": "Windows CryptoAPI Spoofing Vulnerability (CVE-2020-0601 - CurveBall)", "sha256": "7c071378e65d8168d8c2e1fa931505caaec90f7a44a9de1fcf80fc35f5d7cd4a", "type": "query", "version": 8 }, "565c2b44-7a21-4818-955f-8d4737967d2e": { "previous": { "8.2": { "rule_name": "Potential Admin Group Account Addition", "sha256": "1ddb47cf589c553cb8a3f4450f8e5e844f990a768ca5018ecaac3e13574a46ad", "type": "query", "version": 2 } }, "rule_name": "Potential Admin Group Account Addition", "sha256": "1ddb47cf589c553cb8a3f4450f8e5e844f990a768ca5018ecaac3e13574a46ad", "type": "query", "version": 3 }, "565d6ca5-75ba-4c82-9b13-add25353471c": { "previous": { "8.2": { "rule_name": "Dumping of Keychain Content via Security Command", "sha256": "ec21f61f8d8f9880ed6b8bddf1afd429613797e5ba740478a3ecff3670f4b880", "type": "eql", "version": 4 } }, "rule_name": "Dumping of Keychain Content via Security Command", "sha256": "ec21f61f8d8f9880ed6b8bddf1afd429613797e5ba740478a3ecff3670f4b880", "type": "eql", "version": 5 }, "5663b693-0dea-4f2e-8275-f1ae5ff2de8e": { "previous": { "8.2": { "rule_name": "GCP Logging Bucket Deletion", "sha256": "3a3b6ad88408ca05c708936092266de5e85a9a6bb7bf8a82d4b7ff594155fba3", "type": "query", "version": 9 } }, "rule_name": "GCP Logging Bucket Deletion", "sha256": "3a3b6ad88408ca05c708936092266de5e85a9a6bb7bf8a82d4b7ff594155fba3", "type": "query", "version": 10 }, "56f2e9b5-4803-4e44-a0a4-a52dc79d57fe": { "previous": { "8.2": { "rule_name": "PowerShell PSReflect Script", "sha256": "e83e1f173bc605e47f440c42e553b45dd28cda90abf6497e245678c6a7708458", "type": "query", "version": 6 } }, "rule_name": "PowerShell PSReflect Script", "sha256": "e83e1f173bc605e47f440c42e553b45dd28cda90abf6497e245678c6a7708458", "type": "query", "version": 7 }, "5700cb81-df44-46aa-a5d7-337798f53eb8": { "previous": { "8.2": { "rule_name": "VNC (Virtual Network Computing) from the Internet", "sha256": "c577a8ecfea81bf251b4b191c289be058f3d8d696d941c563ff6e4263d258ed9", "type": "query", "version": 12 } }, "rule_name": "VNC (Virtual Network Computing) from the Internet", "sha256": "c577a8ecfea81bf251b4b191c289be058f3d8d696d941c563ff6e4263d258ed9", "type": "query", "version": 13 }, "571afc56-5ed9-465d-a2a9-045f099f6e7e": { "previous": { "8.2": { "rule_name": "Credential Dumping - Detected - Elastic Endgame", "sha256": "e9490c3bf59b4ca766d6cfb1d1844fbf2dc71adcb09780c761b527ecff87b428", "type": "query", "version": 9 } }, "rule_name": "Credential Dumping - Detected - Elastic Endgame", "sha256": "e9490c3bf59b4ca766d6cfb1d1844fbf2dc71adcb09780c761b527ecff87b428", "type": "query", "version": 10 }, "573f6e7a-7acf-4bcd-ad42-c4969124d3c0": { "previous": { "8.2": { "rule_name": "Azure Virtual Network Device Modified or Deleted", "sha256": "c478af6a790ea8c0dcd61f3cab330fb1abe6835df82da5a1a6c7c2ad0083c2c3", "type": "query", "version": 4 } }, "rule_name": "Azure Virtual Network Device Modified or Deleted", "sha256": "c478af6a790ea8c0dcd61f3cab330fb1abe6835df82da5a1a6c7c2ad0083c2c3", "type": "query", "version": 5 }, "577ec21e-56fe-4065-91d8-45eb8224fe77": { "previous": { "8.2": { "rule_name": "PowerShell MiniDump Script", "sha256": "cbdb31457c62480fd5c9dbf50a46f140aafd57d31ee5c2bf92d0baf962a3d480", "type": "query", "version": 9 } }, "rule_name": "PowerShell MiniDump Script", "sha256": "cbdb31457c62480fd5c9dbf50a46f140aafd57d31ee5c2bf92d0baf962a3d480", "type": "query", "version": 10 }, "581add16-df76-42bb-af8e-c979bfb39a59": { "previous": { "8.2": { "rule_name": "Deleting Backup Catalogs with Wbadmin", "sha256": "c1aec0b0b33c8a3075935263f0f719b0e21c7ba0bdfe187aab046b2de8a73393", "type": "eql", "version": 14 } }, "rule_name": "Deleting Backup Catalogs with Wbadmin", "sha256": "c1aec0b0b33c8a3075935263f0f719b0e21c7ba0bdfe187aab046b2de8a73393", "type": "eql", "version": 15 }, "58aa72ca-d968-4f34-b9f7-bea51d75eb50": { "previous": { "8.2": { "rule_name": "RDP Enabled via Registry", "sha256": "c78fc2e97a561744176f7e493729c4382c3f7057779a9176829384ebd3c3f2ca", "type": "eql", "version": 9 } }, "rule_name": "RDP Enabled via Registry", "sha256": "c78fc2e97a561744176f7e493729c4382c3f7057779a9176829384ebd3c3f2ca", "type": "eql", "version": 10 }, "58ac2aa5-6718-427c-a845-5f3ac5af00ba": { "previous": { "8.2": { "rule_name": "Zoom Meeting with no Passcode", "sha256": "b11bda77407059cc54037e469693754321f43bae2e53010ad95944e9a774276a", "type": "query", "version": 6 } }, "rule_name": "Zoom Meeting with no Passcode", "sha256": "b11bda77407059cc54037e469693754321f43bae2e53010ad95944e9a774276a", "type": "query", "version": 7 }, "58bc134c-e8d2-4291-a552-b4b3e537c60b": { "previous": { "8.2": { "rule_name": "Potential Lateral Tool Transfer via SMB Share", "sha256": "e90a1e07e34ea2f495f80b818ec08292d02a12b56a1ab8113c893adf20722fb0", "type": "eql", "version": 6 } }, "rule_name": "Potential Lateral Tool Transfer via SMB Share", "sha256": "e90a1e07e34ea2f495f80b818ec08292d02a12b56a1ab8113c893adf20722fb0", "type": "eql", "version": 7 }, "58c6d58b-a0d3-412d-b3b8-0981a9400607": { "min_stack_version": "7.16", "previous": { "7.16": { "rule_name": "Potential Privilege Escalation via InstallerFileTakeOver", "sha256": "4231315b60c3bf0fa71c1adba0830ae312ed1ab1c6bcec7f91b701ecdd5a1aed", "type": "eql", "version": 3 }, "8.2": { "rule_name": "Potential Privilege Escalation via InstallerFileTakeOver", "sha256": "d5594f7b8eedbb5ea3c923cb0cf51ae9618431b335128344238559784e938a87", "type": "eql", "version": 7 } }, "rule_name": "Potential Privilege Escalation via InstallerFileTakeOver", "sha256": "d5594f7b8eedbb5ea3c923cb0cf51ae9618431b335128344238559784e938a87", "type": "eql", "version": 8 }, "5930658c-2107-4afc-91af-e0e55b7f7184": { "previous": { "8.2": { "rule_name": "O365 Email Reported by User as Malware or Phish", "sha256": "77b9e5441d776bd1d4421ba04cf53208030a60a1536147cf517115b3e306aeca", "type": "query", "version": 3 } }, "rule_name": "O365 Email Reported by User as Malware or Phish", "sha256": "77b9e5441d776bd1d4421ba04cf53208030a60a1536147cf517115b3e306aeca", "type": "query", "version": 4 }, "594e0cbf-86cc-45aa-9ff7-ff27db27d3ed": { "previous": { "8.2": { "rule_name": "AWS CloudTrail Log Created", "sha256": "064da749510016cbce8588a084602725df9b741e5780994843c512ed98e9640a", "type": "query", "version": 8 } }, "rule_name": "AWS CloudTrail Log Created", "sha256": "064da749510016cbce8588a084602725df9b741e5780994843c512ed98e9640a", "type": "query", "version": 9 }, "59756272-1998-4b8c-be14-e287035c4d10": { "min_stack_version": "8.3", "previous": { "7.16": { "rule_name": "Unusual Linux System Owner or User Discovery Activity", "sha256": "4dfce8f9b71d1c1154bcf7d7e227f86a80e23ecf68649d7067d1b9daa21960b3", "type": "machine_learning", "version": 2 }, "8.2": { "rule_name": "Unusual Linux System Owner or User Discovery Activity", "sha256": "e41fd4f6fee735f8f4d622091922635835073038420494f835501080da741b64", "type": "machine_learning", "version": 3 } }, "rule_name": "Unusual Linux System Owner or User Discovery Activity", "sha256": "e41fd4f6fee735f8f4d622091922635835073038420494f835501080da741b64", "type": "machine_learning", "version": 4 }, "5a14d01d-7ac8-4545-914c-b687c2cf66b3": { "previous": { "8.2": { "rule_name": "UAC Bypass Attempt via Privileged IFileOperation COM Interface", "sha256": "82cb59512014ab0e01173d569e396665f29f1872f19658346dd205b1c20c2795", "type": "eql", "version": 7 } }, "rule_name": "UAC Bypass Attempt via Privileged IFileOperation COM Interface", "sha256": "82cb59512014ab0e01173d569e396665f29f1872f19658346dd205b1c20c2795", "type": "eql", "version": 8 }, "5ae4e6f8-d1bf-40fa-96ba-e29645e1e4dc": { "previous": { "8.2": { "rule_name": "Remote SSH Login Enabled via systemsetup Command", "sha256": "7331f31c20c18949ae8238427d264c121096770ea65404d5eb21382668185a67", "type": "query", "version": 5 } }, "rule_name": "Remote SSH Login Enabled via systemsetup Command", "sha256": "7331f31c20c18949ae8238427d264c121096770ea65404d5eb21382668185a67", "type": "query", "version": 6 }, "5aee924b-6ceb-4633-980e-1bde8cdb40c5": { "previous": { "8.2": { "rule_name": "Potential Secure File Deletion via SDelete Utility", "sha256": "29f7f0a29bc15d489a5dd0c181f2a35e41dd3a52f958e9c17556ddb5324eed71", "type": "eql", "version": 8 } }, "rule_name": "Potential Secure File Deletion via SDelete Utility", "sha256": "29f7f0a29bc15d489a5dd0c181f2a35e41dd3a52f958e9c17556ddb5324eed71", "type": "eql", "version": 9 }, "5b03c9fb-9945-4d2f-9568-fd690fee3fba": { "previous": { "8.2": { "rule_name": "Virtual Machine Fingerprinting", "sha256": "edd0c1216ffec478441f08a43ab313ac1130cf13b408a8328c878b9093c5f6c3", "type": "query", "version": 7 } }, "rule_name": "Virtual Machine Fingerprinting", "sha256": "edd0c1216ffec478441f08a43ab313ac1130cf13b408a8328c878b9093c5f6c3", "type": "query", "version": 8 }, "5bb4a95d-5a08-48eb-80db-4c3a63ec78a8": { "previous": { "8.2": { "rule_name": "Suspicious PrintSpooler Service Executable File Creation", "sha256": "8138db765525c64d667013ac9c356533d9aec2c7b165f949715bb78b6aa62093", "type": "eql", "version": 7 } }, "rule_name": "Suspicious PrintSpooler Service Executable File Creation", "sha256": "8138db765525c64d667013ac9c356533d9aec2c7b165f949715bb78b6aa62093", "type": "eql", "version": 8 }, "5beaebc1-cc13-4bfc-9949-776f9e0dc318": { "previous": { "8.2": { "rule_name": "AWS WAF Rule or Rule Group Deletion", "sha256": "3249161fac88f6cbf8cae454058c7467958169242359eb4fd2fa85c8b8bf00eb", "type": "query", "version": 10 } }, "rule_name": "AWS WAF Rule or Rule Group Deletion", "sha256": "3249161fac88f6cbf8cae454058c7467958169242359eb4fd2fa85c8b8bf00eb", "type": "query", "version": 11 }, "5c983105-4681-46c3-9890-0c66d05e776b": { "min_stack_version": "8.3", "previous": { "7.16": { "rule_name": "Unusual Linux Process Discovery Activity", "sha256": "d00b5c874958e60ebea75b76e2ed82104b526c831d61e946c915fd0cc7efa80d", "type": "machine_learning", "version": 2 }, "8.2": { "rule_name": "Unusual Linux Process Discovery Activity", "sha256": "af77025b9a595eb66fc50d24b2dd04472ce63a9aa0ad7a240af00ce76c0c6708", "type": "machine_learning", "version": 3 } }, "rule_name": "Unusual Linux Process Discovery Activity", "sha256": "af77025b9a595eb66fc50d24b2dd04472ce63a9aa0ad7a240af00ce76c0c6708", "type": "machine_learning", "version": 4 }, "5cd55388-a19c-47c7-8ec4-f41656c2fded": { "previous": { "8.2": { "rule_name": "Outbound Scheduled Task Activity via PowerShell", "sha256": "d5cdb6d1cae26e1717f9464ba61c0b5c5b6efa44b58e3ca27e9454960f0f410f", "type": "eql", "version": 6 } }, "rule_name": "Outbound Scheduled Task Activity via PowerShell", "sha256": "d5cdb6d1cae26e1717f9464ba61c0b5c5b6efa44b58e3ca27e9454960f0f410f", "type": "eql", "version": 7 }, "5cd8e1f7-0050-4afc-b2df-904e40b2f5ae": { "previous": { "8.2": { "rule_name": "User Added to Privileged Group in Active Directory", "sha256": "cde8abeb5602cceec08fc0e7415ed285ff46f0c199567dc7b9dc2cc243672fff", "type": "eql", "version": 7 } }, "rule_name": "User Added to Privileged Group in Active Directory", "sha256": "cde8abeb5602cceec08fc0e7415ed285ff46f0c199567dc7b9dc2cc243672fff", "type": "eql", "version": 8 }, "5d0265bf-dea9-41a9-92ad-48a8dcd05080": { "previous": { "8.2": { "rule_name": "Persistence via Login or Logout Hook", "sha256": "64a3d7ac39baa7dd7acfe11e2108403722797ba7a6bb2947e13e27e9fee1aece", "type": "eql", "version": 7 } }, "rule_name": "Persistence via Login or Logout Hook", "sha256": "64a3d7ac39baa7dd7acfe11e2108403722797ba7a6bb2947e13e27e9fee1aece", "type": "eql", "version": 8 }, "5d1d6907-0747-4d5d-9b24-e4a18853dc0a": { "previous": { "8.2": { "rule_name": "Suspicious Execution via Scheduled Task", "sha256": "8468dfe28e0ac1ca8f0451240a39d3f5d821c9283ac09106b3446287a63f12de", "type": "eql", "version": 7 } }, "rule_name": "Suspicious Execution via Scheduled Task", "sha256": "1908805d7cf7cc5350184bc2b93d9b59b0a568bbd07a49387a6ec04c474ab831", "type": "eql", "version": 9 }, "5d9f8cfc-0d03-443e-a167-2b0597ce0965": { "previous": { "8.2": { "rule_name": "Suspicious Automator Workflows Execution", "sha256": "d627f089be597dd9d5cd098afcb3df2539500a660d3d0565bdba0b3ec000f8bd", "type": "eql", "version": 2 } }, "rule_name": "Suspicious Automator Workflows Execution", "sha256": "d627f089be597dd9d5cd098afcb3df2539500a660d3d0565bdba0b3ec000f8bd", "type": "eql", "version": 3 }, "5e552599-ddec-4e14-bad1-28aa42404388": { "previous": { "8.2": { "rule_name": "Microsoft 365 Teams Guest Access Enabled", "sha256": "c2d44b6e87bf1e7dea9dd3a0d2990194af418603132d5bee07c23b69068e4717", "type": "query", "version": 7 } }, "rule_name": "Microsoft 365 Teams Guest Access Enabled", "sha256": "c2d44b6e87bf1e7dea9dd3a0d2990194af418603132d5bee07c23b69068e4717", "type": "query", "version": 8 }, "5e87f165-45c2-4b80-bfa5-52822552c997": { "previous": { "8.2": { "rule_name": "Potential PrintNightmare File Modification", "sha256": "cce3c92801296f877a7b98b1d40e5eb47cc9843149d203377272809894e0c933", "type": "eql", "version": 1 } }, "rule_name": "Potential PrintNightmare File Modification", "sha256": "cce3c92801296f877a7b98b1d40e5eb47cc9843149d203377272809894e0c933", "type": "eql", "version": 2 }, "60884af6-f553-4a6c-af13-300047455491": { "previous": { "8.2": { "rule_name": "Azure Command Execution on Virtual Machine", "sha256": "872a5367783e16ffc634425549afb38612e1eeed5207f97e5d483684f2d93cb9", "type": "query", "version": 7 } }, "rule_name": "Azure Command Execution on Virtual Machine", "sha256": "872a5367783e16ffc634425549afb38612e1eeed5207f97e5d483684f2d93cb9", "type": "query", "version": 8 }, "60b6b72f-0fbc-47e7-9895-9ba7627a8b50": { "previous": { "8.2": { "rule_name": "Azure Service Principal Addition", "sha256": "bf214c9f72e9dfa8ccd2be6ff173e12ad5c7f7bb86c95e731af9fa4fe47605a8", "type": "query", "version": 6 } }, "rule_name": "Azure Service Principal Addition", "sha256": "bf214c9f72e9dfa8ccd2be6ff173e12ad5c7f7bb86c95e731af9fa4fe47605a8", "type": "query", "version": 7 }, "60f3adec-1df9-4104-9c75-b97d9f078b25": { "previous": { "8.2": { "rule_name": "Microsoft 365 Exchange DLP Policy Removed", "sha256": "94d03cfbb90d2318be2e5e0e432a60714974dcfcf37b9582f671982a34290fc7", "type": "query", "version": 7 } }, "rule_name": "Microsoft 365 Exchange DLP Policy Removed", "sha256": "94d03cfbb90d2318be2e5e0e432a60714974dcfcf37b9582f671982a34290fc7", "type": "query", "version": 8 }, "610949a1-312f-4e04-bb55-3a79b8c95267": { "previous": { "8.2": { "rule_name": "Unusual Process Network Connection", "sha256": "621fd3c91f9762821b765a38822321c8536a7522037ff332ae4f18e0469de7d1", "type": "eql", "version": 9 } }, "rule_name": "Unusual Process Network Connection", "sha256": "621fd3c91f9762821b765a38822321c8536a7522037ff332ae4f18e0469de7d1", "type": "eql", "version": 10 }, "61ac3638-40a3-44b2-855a-985636ca985e": { "previous": { "8.2": { "rule_name": "PowerShell Suspicious Discovery Related Windows API Functions", "sha256": "96c86ebf7124b5cf3b983a969ac7334dd3f702d1e63a3a3a98b183f193d4f675", "type": "query", "version": 8 } }, "rule_name": "PowerShell Suspicious Discovery Related Windows API Functions", "sha256": "96c86ebf7124b5cf3b983a969ac7334dd3f702d1e63a3a3a98b183f193d4f675", "type": "query", "version": 9 }, "61c31c14-507f-4627-8c31-072556b89a9c": { "previous": { "8.2": { "rule_name": "Mknod Process Activity", "sha256": "9070708b87661e05dc8b0275151d9c928fbf29feacc6b771a10e56eea2ff82ea", "type": "query", "version": 7 } }, "rule_name": "Mknod Process Activity", "sha256": "9070708b87661e05dc8b0275151d9c928fbf29feacc6b771a10e56eea2ff82ea", "type": "query", "version": 8 }, "61d29caf-6c15-4d1e-9ccb-7ad12ccc0bc7": { "previous": { "8.2": { "rule_name": "AdminSDHolder SDProp Exclusion Added", "sha256": "384ea747a062c1e6197b9f85283fe5b766e6812db17234c78e527075e8a7a9b2", "type": "eql", "version": 4 } }, "rule_name": "AdminSDHolder SDProp Exclusion Added", "sha256": "384ea747a062c1e6197b9f85283fe5b766e6812db17234c78e527075e8a7a9b2", "type": "eql", "version": 5 }, "622ecb68-fa81-4601-90b5-f8cd661e4520": { "previous": { "8.2": { "rule_name": "Incoming DCOM Lateral Movement via MSHTA", "sha256": "ee6e88d5dbeb4c1e83885f6a95bf40c74f4b4f33bada19733a6e4b68694045de", "type": "eql", "version": 8 } }, "rule_name": "Incoming DCOM Lateral Movement via MSHTA", "sha256": "ee6e88d5dbeb4c1e83885f6a95bf40c74f4b4f33bada19733a6e4b68694045de", "type": "eql", "version": 9 }, "62a70f6f-3c37-43df-a556-f64fa475fba2": { "previous": { "8.2": { "rule_name": "Account Configured with Never-Expiring Password", "sha256": "323d4cd6580d5345a3d47924597c0d860fb1dba813e9aef86cf76e4558a03349", "type": "query", "version": 3 } }, "rule_name": "Account Configured with Never-Expiring Password", "sha256": "323d4cd6580d5345a3d47924597c0d860fb1dba813e9aef86cf76e4558a03349", "type": "query", "version": 4 }, "63e65ec3-43b1-45b0-8f2d-45b34291dc44": { "previous": { "8.2": { "rule_name": "Network Connection via Signed Binary", "sha256": "00acec77f8acca7e96ad28ab05da1b1784966bb82deab41663edd6da48de0198", "type": "eql", "version": 11 } }, "rule_name": "Network Connection via Signed Binary", "sha256": "00acec77f8acca7e96ad28ab05da1b1784966bb82deab41663edd6da48de0198", "type": "eql", "version": 12 }, "647fc812-7996-4795-8869-9c4ea595fe88": { "min_stack_version": "8.3", "previous": { "7.16": { "rule_name": "Anomalous Process For a Linux Population", "sha256": "c10cfdb233bb94a8778c442480ba3bf3052d77b1a7233987c6c6f02bb88a69b3", "type": "machine_learning", "version": 7 }, "8.2": { "rule_name": "Anomalous Process For a Linux Population", "sha256": "58ad6b8312fa08066d30ca38f7178f10d0af84bc3348a306635a0d5693e495fb", "type": "machine_learning", "version": 9 } }, "rule_name": "Anomalous Process For a Linux Population", "sha256": "58ad6b8312fa08066d30ca38f7178f10d0af84bc3348a306635a0d5693e495fb", "type": "machine_learning", "version": 10 }, "6482255d-f468-45ea-a5b3-d3a7de1331ae": { "previous": { "8.2": { "rule_name": "Modification of Safari Settings via Defaults Command", "sha256": "66b994ea016c69bcad77e78b66f2b07a8c7f59ac9a7390737f65a0669112fdeb", "type": "query", "version": 2 } }, "rule_name": "Modification of Safari Settings via Defaults Command", "sha256": "66b994ea016c69bcad77e78b66f2b07a8c7f59ac9a7390737f65a0669112fdeb", "type": "query", "version": 3 }, "6506c9fd-229e-4722-8f0f-69be759afd2a": { "previous": { "8.2": { "rule_name": "Potential PrintNightmare Exploit Registry Modification", "sha256": "2835937a732bcb071b232eba9fe5f11b5f7ea8c7742eec0640d79cca3fcea621", "type": "eql", "version": 2 } }, "rule_name": "Potential PrintNightmare Exploit Registry Modification", "sha256": "2835937a732bcb071b232eba9fe5f11b5f7ea8c7742eec0640d79cca3fcea621", "type": "eql", "version": 3 }, "65f9bccd-510b-40df-8263-334f03174fed": { "min_stack_version": "8.2", "previous": { "8.2": { "rule_name": "Kubernetes Exposed Service Created With Type NodePort", "sha256": "7bdb29beee19d63add116b929b7806d41ae36881ef9d37390be3331c731bcf28", "type": "query", "version": 2 } }, "rule_name": "Kubernetes Exposed Service Created With Type NodePort", "sha256": "7bdb29beee19d63add116b929b7806d41ae36881ef9d37390be3331c731bcf28", "type": "query", "version": 2 }, "661545b4-1a90-4f45-85ce-2ebd7c6a15d0": { "previous": { "8.2": { "rule_name": "Attempt to Mount SMB Share via Command Line", "sha256": "84f79df5885f139cba6c562085915ff612fcc3152820c1f1709a4e03605be755", "type": "eql", "version": 4 } }, "rule_name": "Attempt to Mount SMB Share via Command Line", "sha256": "84f79df5885f139cba6c562085915ff612fcc3152820c1f1709a4e03605be755", "type": "eql", "version": 5 }, "665e7a4f-c58e-4fc6-bc83-87a7572670ac": { "previous": { "8.2": { "rule_name": "WebServer Access Logs Deleted", "sha256": "5404cb14b4ec1009a1ebcc22171f8001feb5e5c5c5d1db44fdd77e44b2000d75", "type": "eql", "version": 6 } }, "rule_name": "WebServer Access Logs Deleted", "sha256": "5404cb14b4ec1009a1ebcc22171f8001feb5e5c5c5d1db44fdd77e44b2000d75", "type": "eql", "version": 7 }, "66883649-f908-4a5b-a1e0-54090a1d3a32": { "previous": { "8.2": { "rule_name": "Connection to Commonly Abused Web Services", "sha256": "9074d32b67e1ae4dedee47ef68052d2de75e18e968836494eeee7db8ced3559c", "type": "eql", "version": 10 } }, "rule_name": "Connection to Commonly Abused Web Services", "sha256": "9074d32b67e1ae4dedee47ef68052d2de75e18e968836494eeee7db8ced3559c", "type": "eql", "version": 11 }, "66da12b1-ac83-40eb-814c-07ed1d82b7b9": { "previous": { "8.2": { "rule_name": "Suspicious macOS MS Office Child Process", "sha256": "88578952808e432ce70c953dd9389c864ad5c28f36135c9c64410653dbe492cb", "type": "eql", "version": 3 } }, "rule_name": "Suspicious macOS MS Office Child Process", "sha256": "88578952808e432ce70c953dd9389c864ad5c28f36135c9c64410653dbe492cb", "type": "eql", "version": 4 }, "6731fbf2-8f28-49ed-9ab9-9a918ceb5a45": { "previous": { "8.2": { "rule_name": "Attempt to Modify an Okta Policy", "sha256": "f349235176eea6fab8f64b9d29af010ac35907d99e524aec451bb7143ea6aa7b", "type": "query", "version": 8 } }, "rule_name": "Attempt to Modify an Okta Policy", "sha256": "f349235176eea6fab8f64b9d29af010ac35907d99e524aec451bb7143ea6aa7b", "type": "query", "version": 9 }, "675239ea-c1bc-4467-a6d3-b9e2cc7f676d": { "previous": { "8.2": { "rule_name": "O365 Mailbox Audit Logging Bypass", "sha256": "180540c4dfa973ebb322a17a92f3bd9e1179dca70a52c648ded69003862cc3c9", "type": "query", "version": 5 } }, "rule_name": "O365 Mailbox Audit Logging Bypass", "sha256": "180540c4dfa973ebb322a17a92f3bd9e1179dca70a52c648ded69003862cc3c9", "type": "query", "version": 6 }, "676cff2b-450b-4cf1-8ed2-c0c58a4a2dd7": { "previous": { "8.2": { "rule_name": "Attempt to Revoke Okta API Token", "sha256": "7fa1e50559094f15c0d582e8502734500d72a89865f1e7b1da149ef3c6152317", "type": "query", "version": 8 } }, "rule_name": "Attempt to Revoke Okta API Token", "sha256": "7fa1e50559094f15c0d582e8502734500d72a89865f1e7b1da149ef3c6152317", "type": "query", "version": 9 }, "67a9beba-830d-4035-bfe8-40b7e28f8ac4": { "previous": { "8.2": { "rule_name": "SMTP to the Internet", "sha256": "38ddd772b9bc49726619cf527ed48d8871a0611ca88d76d03054c6702456d14d", "type": "query", "version": 8 } }, "rule_name": "SMTP to the Internet", "sha256": "38ddd772b9bc49726619cf527ed48d8871a0611ca88d76d03054c6702456d14d", "type": "query", "version": 9 }, "67f8443a-4ff3-4a70-916d-3cfa3ae9f02b": { "previous": { "8.2": { "rule_name": "High Number of Process Terminations", "sha256": "39e37ed6487827c23b34562be8be17f18cff230845a27b6d15181ae44ddbbd7f", "type": "threshold", "version": 2 } }, "rule_name": "High Number of Process Terminations", "sha256": "39e37ed6487827c23b34562be8be17f18cff230845a27b6d15181ae44ddbbd7f", "type": "threshold", "version": 3 }, "68113fdc-3105-4cdd-85bb-e643c416ef0b": { "previous": { "8.2": { "rule_name": "Query Registry via reg.exe", "sha256": "5752b998b95537fedce81850330b693ee3cb9f030b36bf07dba1da9107bd68d9", "type": "eql", "version": 3 } }, "rule_name": "Query Registry via reg.exe", "sha256": "5752b998b95537fedce81850330b693ee3cb9f030b36bf07dba1da9107bd68d9", "type": "eql", "version": 4 }, "6839c821-011d-43bd-bd5b-acff00257226": { "min_stack_version": "7.16", "previous": { "8.2": { "rule_name": "Image File Execution Options Injection", "sha256": "077626b93e411260c2b3faf85846d631184022a715c464a6297c069eb4f54ff9", "type": "eql", "version": 6 } }, "rule_name": "Image File Execution Options Injection", "sha256": "077626b93e411260c2b3faf85846d631184022a715c464a6297c069eb4f54ff9", "type": "eql", "version": 7 }, "684554fc-0777-47ce-8c9b-3d01f198d7f8": { "previous": { "8.2": { "rule_name": "New or Modified Federation Domain", "sha256": "a58f40a2a2689a462fd3ebcbf5dba55550ecc3cbcfec5949aa2a35892c5afafb", "type": "query", "version": 4 } }, "rule_name": "New or Modified Federation Domain", "sha256": "a58f40a2a2689a462fd3ebcbf5dba55550ecc3cbcfec5949aa2a35892c5afafb", "type": "query", "version": 5 }, "6885d2ae-e008-4762-b98a-e8e1cd3a81e9": { "previous": { "8.2": { "rule_name": "Threat Detected by Okta ThreatInsight", "sha256": "0ef8f32d6082e1c9bab33717afc8fe1c23e756abe5942df0dde64456026edec1", "type": "query", "version": 8 } }, "rule_name": "Threat Detected by Okta ThreatInsight", "sha256": "0ef8f32d6082e1c9bab33717afc8fe1c23e756abe5942df0dde64456026edec1", "type": "query", "version": 9 }, "68921d85-d0dc-48b3-865f-43291ca2c4f2": { "previous": { "8.2": { "rule_name": "Persistence via TelemetryController Scheduled Task Hijack", "sha256": "06f4a7443048cea7bec58e46f208e942694f415dcc65320caf513b9715052ee6", "type": "eql", "version": 9 } }, "rule_name": "Persistence via TelemetryController Scheduled Task Hijack", "sha256": "06f4a7443048cea7bec58e46f208e942694f415dcc65320caf513b9715052ee6", "type": "eql", "version": 10 }, "68994a6c-c7ba-4e82-b476-26a26877adf6": { "min_stack_version": "8.0", "previous": { "7.16": { "rule_name": "Google Workspace Admin Role Assigned to a User", "sha256": "b93cd2bb2b978c4a49aa012e3ba233f122287ffdb705c852467201a2f5818c37", "type": "query", "version": 12 }, "8.2": { "rule_name": "Google Workspace Admin Role Assigned to a User", "sha256": "d9f56f436561f5e8d14e9dce38318bf3e08a582338ac24f244aa054fdbbd0cce", "type": "query", "version": 14 } }, "rule_name": "Google Workspace Admin Role Assigned to a User", "sha256": "d9f56f436561f5e8d14e9dce38318bf3e08a582338ac24f244aa054fdbbd0cce", "type": "query", "version": 15 }, "689b9d57-e4d5-4357-ad17-9c334609d79a": { "previous": { "8.2": { "rule_name": "Scheduled Task Created by a Windows Script", "sha256": "83038e8351824fead44e9aede825e95395ae00d0112346729456aa3350bc23f3", "type": "eql", "version": 7 } }, "rule_name": "Scheduled Task Created by a Windows Script", "sha256": "83038e8351824fead44e9aede825e95395ae00d0112346729456aa3350bc23f3", "type": "eql", "version": 8 }, "68a7a5a5-a2fc-4a76-ba9f-26849de881b4": { "previous": { "8.2": { "rule_name": "AWS CloudWatch Log Group Deletion", "sha256": "eadaa242e8c74faea653a0d6055f1cd65f796118e32fd864934eff13d33551b7", "type": "query", "version": 9 } }, "rule_name": "AWS CloudWatch Log Group Deletion", "sha256": "eadaa242e8c74faea653a0d6055f1cd65f796118e32fd864934eff13d33551b7", "type": "query", "version": 10 }, "68d56fdc-7ffa-4419-8e95-81641bd6f845": { "previous": { "8.2": { "rule_name": "UAC Bypass via ICMLuaUtil Elevated COM Interface", "sha256": "431cfd25e36329eafa008281313032e48969664302df3523a6f07754afbc677d", "type": "eql", "version": 7 } }, "rule_name": "UAC Bypass via ICMLuaUtil Elevated COM Interface", "sha256": "431cfd25e36329eafa008281313032e48969664302df3523a6f07754afbc677d", "type": "eql", "version": 8 }, "699e9fdb-b77c-4c01-995c-1c15019b9c43": { "min_stack_version": "8.0", "previous": { "8.2": { "rule_name": "Threat Intel Filebeat Module (v8.x) Indicator Match", "sha256": "32f883b9ccda701081df7ad7747f8d7ba939a23f7766b682130f07db73998f6b", "type": "threat_match", "version": 4 } }, "rule_name": "Threat Intel Filebeat Module (v8.x) Indicator Match", "sha256": "32f883b9ccda701081df7ad7747f8d7ba939a23f7766b682130f07db73998f6b", "type": "threat_match", "version": 5 }, "69c251fb-a5d6-4035-b5ec-40438bd829ff": { "previous": { "8.2": { "rule_name": "Modification of Boot Configuration", "sha256": "ebcb54c25c02c260036c1db2f19a1e5b35ec0cb57e6fb5192d5c4dd3052b1805", "type": "eql", "version": 13 } }, "rule_name": "Modification of Boot Configuration", "sha256": "ebcb54c25c02c260036c1db2f19a1e5b35ec0cb57e6fb5192d5c4dd3052b1805", "type": "eql", "version": 14 }, "69c420e8-6c9e-4d28-86c0-8a2be2d1e78c": { "previous": { "8.2": { "rule_name": "AWS IAM Password Recovery Requested", "sha256": "7f96125b14edc240bd6bf616955819b7ea9fe7491f8afb0873fbf8d85b7d52ed", "type": "query", "version": 8 } }, "rule_name": "AWS IAM Password Recovery Requested", "sha256": "7f96125b14edc240bd6bf616955819b7ea9fe7491f8afb0873fbf8d85b7d52ed", "type": "query", "version": 9 }, "6a8ab9cc-4023-4d17-b5df-1a3e16882ce7": { "previous": { "8.2": { "rule_name": "Unusual Service Host Child Process - Childless Service", "sha256": "24a5e2bdad4552a26634f0a392bd7f64231ed12018f430bf08692fac52c206e1", "type": "eql", "version": 6 } }, "rule_name": "Unusual Service Host Child Process - Childless Service", "sha256": "24a5e2bdad4552a26634f0a392bd7f64231ed12018f430bf08692fac52c206e1", "type": "eql", "version": 7 }, "6aace640-e631-4870-ba8e-5fdda09325db": { "previous": { "8.2": { "rule_name": "Exporting Exchange Mailbox via PowerShell", "sha256": "88ce3666e6415c05ed475a138a1ad69be67c93f0fdb4dd5a0aba78831e6b4213", "type": "eql", "version": 10 } }, "rule_name": "Exporting Exchange Mailbox via PowerShell", "sha256": "88ce3666e6415c05ed475a138a1ad69be67c93f0fdb4dd5a0aba78831e6b4213", "type": "eql", "version": 11 }, "6b84d470-9036-4cc0-a27c-6d90bbfe81ab": { "previous": { "8.2": { "rule_name": "Sensitive Files Compression", "sha256": "1245a54f6eb888b0625cb5d21c2d3f9a32f00bd323cfe849f6c4c6e8bd3dc391", "type": "query", "version": 2 } }, "rule_name": "Sensitive Files Compression", "sha256": "1245a54f6eb888b0625cb5d21c2d3f9a32f00bd323cfe849f6c4c6e8bd3dc391", "type": "query", "version": 3 }, "6bed021a-0afb-461c-acbe-ffdb9574d3f3": { "previous": { "8.2": { "rule_name": "Remote Computer Account DnsHostName Update", "sha256": "6023b238c4eefc97b6a59ca0a23a1985dd52daf852fcbb1d338f183812588e5d", "type": "eql", "version": 2 } }, "rule_name": "Remote Computer Account DnsHostName Update", "sha256": "6023b238c4eefc97b6a59ca0a23a1985dd52daf852fcbb1d338f183812588e5d", "type": "eql", "version": 3 }, "6cd1779c-560f-4b68-a8f1-11009b27fe63": { "previous": { "8.2": { "rule_name": "Microsoft Exchange Server UM Writing Suspicious Files", "sha256": "1c68199cc49bfb97a0ba0c646a90d3b2f73cc356ef13470f54d602b4a0a4f901", "type": "eql", "version": 5 } }, "rule_name": "Microsoft Exchange Server UM Writing Suspicious Files", "sha256": "1c68199cc49bfb97a0ba0c646a90d3b2f73cc356ef13470f54d602b4a0a4f901", "type": "eql", "version": 6 }, "6d448b96-c922-4adb-b51c-b767f1ea5b76": { "min_stack_version": "8.3", "previous": { "7.16": { "rule_name": "Unusual Process For a Windows Host", "sha256": "9acf5cf644f0dd40d86fe207e02999cd5ad7cb60a50cb3c648eb7def01929e9a", "type": "machine_learning", "version": 10 }, "8.2": { "rule_name": "Unusual Process For a Windows Host", "sha256": "4e2bbfe5f472c1005d61a787175eeeb5392ecfb867b7039df22de58040ae3153", "type": "machine_learning", "version": 12 } }, "rule_name": "Unusual Process For a Windows Host", "sha256": "4e2bbfe5f472c1005d61a787175eeeb5392ecfb867b7039df22de58040ae3153", "type": "machine_learning", "version": 13 }, "6e40d56f-5c0e-4ac6-aece-bee96645b172": { "min_stack_version": "8.3", "previous": { "7.16": { "rule_name": "Anomalous Process For a Windows Population", "sha256": "265db12570310439b937bb99bc1a58f1e6ad99c7bc17a2fcde50e05cf11b03bd", "type": "machine_learning", "version": 7 }, "8.2": { "rule_name": "Anomalous Process For a Windows Population", "sha256": "0f387df0bf637f8a7cdcac7e35c402a5c25cab0df5667d31c4ed069e209e0acc", "type": "machine_learning", "version": 9 } }, "rule_name": "Anomalous Process For a Windows Population", "sha256": "0f387df0bf637f8a7cdcac7e35c402a5c25cab0df5667d31c4ed069e209e0acc", "type": "machine_learning", "version": 10 }, "6e9130a5-9be6-48e5-943a-9628bfc74b18": { "previous": { "8.2": { "rule_name": "AdminSDHolder Backdoor", "sha256": "6943781070b2e5afa4e3de92c0c934ba4f784cbb964d00cc9daafd12e86c2af2", "type": "query", "version": 3 } }, "rule_name": "AdminSDHolder Backdoor", "sha256": "6943781070b2e5afa4e3de92c0c934ba4f784cbb964d00cc9daafd12e86c2af2", "type": "query", "version": 4 }, "6e9b351e-a531-4bdc-b73e-7034d6eed7ff": { "previous": { "8.2": { "rule_name": "Enumeration of Users or Groups via Built-in Commands", "sha256": "585a781ba81a407c650ab6ef818dd199ba4814404992bc6127a023806ab5ec2c", "type": "eql", "version": 5 } }, "rule_name": "Enumeration of Users or Groups via Built-in Commands", "sha256": "585a781ba81a407c650ab6ef818dd199ba4814404992bc6127a023806ab5ec2c", "type": "eql", "version": 6 }, "6ea41894-66c3-4df7-ad6b-2c5074eb3df8": { "previous": { "8.2": { "rule_name": "Potential Windows Error Manager Masquerading", "sha256": "5eb2d277fc3beed4ad59ed441f5286ae09f2e33e7dc3f9919fc5b2cc669fd8e2", "type": "eql", "version": 5 } }, "rule_name": "Potential Windows Error Manager Masquerading", "sha256": "5eb2d277fc3beed4ad59ed441f5286ae09f2e33e7dc3f9919fc5b2cc669fd8e2", "type": "eql", "version": 6 }, "6ea55c81-e2ba-42f2-a134-bccf857ba922": { "previous": { "8.2": { "rule_name": "Security Software Discovery using WMIC", "sha256": "2e5f5ac59dea19e7af55d8f5a0db3a0bb5778cead96038507a5ffdce5601ea27", "type": "eql", "version": 8 } }, "rule_name": "Security Software Discovery using WMIC", "sha256": "2e5f5ac59dea19e7af55d8f5a0db3a0bb5778cead96038507a5ffdce5601ea27", "type": "eql", "version": 9 }, "6ea71ff0-9e95-475b-9506-2580d1ce6154": { "previous": { "8.2": { "rule_name": "DNS Activity to the Internet", "sha256": "2b8ee3ad95436f33ac0289f2bbc2af3b6582974ac3f7eeb4c557d00df664f622", "type": "query", "version": 12 } }, "rule_name": "DNS Activity to the Internet", "sha256": "2b8ee3ad95436f33ac0289f2bbc2af3b6582974ac3f7eeb4c557d00df664f622", "type": "query", "version": 13 }, "6f1500bc-62d7-4eb9-8601-7485e87da2f4": { "previous": { "8.2": { "rule_name": "SSH (Secure Shell) to the Internet", "sha256": "ccd5c6ae27b2cc637f6bbb39e5d6b025d56dc2c81975d697ada670a54ce65ef5", "type": "query", "version": 8 } }, "rule_name": "SSH (Secure Shell) to the Internet", "sha256": "ccd5c6ae27b2cc637f6bbb39e5d6b025d56dc2c81975d697ada670a54ce65ef5", "type": "query", "version": 9 }, "6f435062-b7fc-4af9-acea-5b1ead65c5a5": { "min_stack_version": "8.0", "previous": { "7.16": { "rule_name": "Google Workspace Role Modified", "sha256": "9cb9378f77ddd21f125d4bd96ae0f071a38f364c8fd7d446fb6d72144274f37a", "type": "query", "version": 12 }, "8.2": { "rule_name": "Google Workspace Role Modified", "sha256": "8dc1f19266e88e4e9730b019277e28ce3f4e7f8a2f366b75198d4d752ba789b8", "type": "query", "version": 14 } }, "rule_name": "Google Workspace Role Modified", "sha256": "8dc1f19266e88e4e9730b019277e28ce3f4e7f8a2f366b75198d4d752ba789b8", "type": "query", "version": 15 }, "6f683345-bb10-47a7-86a7-71e9c24fb358": { "previous": { "8.2": { "rule_name": "Linux Restricted Shell Breakout via the find command", "sha256": "7e1c03c53ba1a32b0780b4233a4278668a22939bf80ec896514a0237bbd28eb6", "type": "eql", "version": 1 } }, "rule_name": "Linux Restricted Shell Breakout via the find command", "sha256": "7e1c03c53ba1a32b0780b4233a4278668a22939bf80ec896514a0237bbd28eb6", "type": "eql", "version": 2 }, "7024e2a0-315d-4334-bb1a-441c593e16ab": { "previous": { "8.2": { "rule_name": "AWS CloudTrail Log Deleted", "sha256": "252bd838adede7937aef757f4542fb56c55424aa08f56d9f96c1c3bc9c37f647", "type": "query", "version": 9 } }, "rule_name": "AWS CloudTrail Log Deleted", "sha256": "252bd838adede7937aef757f4542fb56c55424aa08f56d9f96c1c3bc9c37f647", "type": "query", "version": 10 }, "7024e2a0-315d-4334-bb1a-552d604f27bc": { "previous": { "8.2": { "rule_name": "AWS Config Resource Deletion", "sha256": "b75dd0547cf5415b26f194627721331376b66a9380b020303ab189c3da78130a", "type": "query", "version": 8 } }, "rule_name": "AWS Config Resource Deletion", "sha256": "b75dd0547cf5415b26f194627721331376b66a9380b020303ab189c3da78130a", "type": "query", "version": 9 }, "70d12c9c-0dbd-4a1a-bc44-1467502c9cf6": { "previous": { "8.2": { "rule_name": "Persistence via WMI Standard Registry Provider", "sha256": "02939a6d0cebbf9eafac923b5c3c06b0c8b545c8e51694a6d42886c7cceed0c2", "type": "eql", "version": 3 } }, "rule_name": "Persistence via WMI Standard Registry Provider", "sha256": "02939a6d0cebbf9eafac923b5c3c06b0c8b545c8e51694a6d42886c7cceed0c2", "type": "eql", "version": 4 }, "70fa1af4-27fd-4f26-bd03-50b6af6b9e24": { "previous": { "8.2": { "rule_name": "Attempt to Unload Elastic Endpoint Security Kernel Extension", "sha256": "dad3c106f43e95382e1ad7cbc8f57d5b283df82773ad2e2e92ffb1debeae0f36", "type": "query", "version": 3 } }, "rule_name": "Attempt to Unload Elastic Endpoint Security Kernel Extension", "sha256": "dad3c106f43e95382e1ad7cbc8f57d5b283df82773ad2e2e92ffb1debeae0f36", "type": "query", "version": 4 }, "717f82c2-7741-4f9b-85b8-d06aeb853f4f": { "previous": { "8.2": { "rule_name": "Modification of Dynamic Linker Preload Shared Object", "sha256": "81d0f87832fa695a99b4d76255d2c78f58656da7a1989f1d7fe894cd620db85f", "type": "query", "version": 3 } }, "rule_name": "Modification of Dynamic Linker Preload Shared Object", "sha256": "81d0f87832fa695a99b4d76255d2c78f58656da7a1989f1d7fe894cd620db85f", "type": "query", "version": 4 }, "71bccb61-e19b-452f-b104-79a60e546a95": { "previous": { "8.2": { "rule_name": "Unusual File Creation - Alternate Data Stream", "sha256": "cd449787ab01780179a70626e6b6db732c370bbc384e2a54b4038b3d4ee6c2dd", "type": "eql", "version": 4 } }, "rule_name": "Unusual File Creation - Alternate Data Stream", "sha256": "bed2940df4181810e7478b8e19507306d6a16bd56bbf4441e2c50b768bff324a", "type": "eql", "version": 6 }, "71c5cb27-eca5-4151-bb47-64bc3f883270": { "previous": { "8.2": { "rule_name": "Suspicious RDP ActiveX Client Loaded", "sha256": "91cbf7f2f4a4253fc574c452cf02480f553ca46f167c6750cba1f4bae746b02d", "type": "eql", "version": 6 } }, "rule_name": "Suspicious RDP ActiveX Client Loaded", "sha256": "91cbf7f2f4a4253fc574c452cf02480f553ca46f167c6750cba1f4bae746b02d", "type": "eql", "version": 7 }, "721999d0-7ab2-44bf-b328-6e63367b9b29": { "previous": { "8.2": { "rule_name": "Microsoft 365 Potential ransomware activity", "sha256": "b91ed8e2d7e1cb283ab6ca4c730174019a360cee3c01a5c6365aedf04ed563a2", "type": "query", "version": 5 } }, "rule_name": "Microsoft 365 Potential ransomware activity", "sha256": "b91ed8e2d7e1cb283ab6ca4c730174019a360cee3c01a5c6365aedf04ed563a2", "type": "query", "version": 6 }, "729aa18d-06a6-41c7-b175-b65b739b1181": { "previous": { "8.2": { "rule_name": "Attempt to Reset MFA Factors for an Okta User Account", "sha256": "ca6648edd972ed21401c4098468a62d530987ef7fbaca081fa283b7824b54ee8", "type": "query", "version": 8 } }, "rule_name": "Attempt to Reset MFA Factors for an Okta User Account", "sha256": "ca6648edd972ed21401c4098468a62d530987ef7fbaca081fa283b7824b54ee8", "type": "query", "version": 9 }, "72d33577-f155-457d-aad3-379f9b750c97": { "previous": { "8.2": { "rule_name": "Linux Restricted Shell Breakout via env Shell Evasion", "sha256": "1afd2b836cd82dafad139963d4d003d6088aaa83f45791c64cf7c0d7b66198e6", "type": "eql", "version": 1 } }, "rule_name": "Linux Restricted Shell Breakout via env Shell Evasion", "sha256": "1afd2b836cd82dafad139963d4d003d6088aaa83f45791c64cf7c0d7b66198e6", "type": "eql", "version": 2 }, "7405ddf1-6c8e-41ce-818f-48bea6bcaed8": { "previous": { "8.2": { "rule_name": "Potential Modification of Accessibility Binaries", "sha256": "85bb1aec79329f7e94bcce8357743ed8fd42b459d5ba231131f2838ca6ced383", "type": "eql", "version": 11 } }, "rule_name": "Potential Modification of Accessibility Binaries", "sha256": "85bb1aec79329f7e94bcce8357743ed8fd42b459d5ba231131f2838ca6ced383", "type": "eql", "version": 12 }, "7453e19e-3dbf-4e4e-9ae0-33d6c6ed15e1": { "previous": { "8.2": { "rule_name": "Modification of Environment Variable via Launchctl", "sha256": "552c664af8938d92ac542029a3036de5d0b14b3fbbb8521fe59f46862cea6318", "type": "query", "version": 4 } }, "rule_name": "Modification of Environment Variable via Launchctl", "sha256": "552c664af8938d92ac542029a3036de5d0b14b3fbbb8521fe59f46862cea6318", "type": "query", "version": 5 }, "745b0119-0560-43ba-860a-7235dd8cee8d": { "min_stack_version": "7.16", "previous": { "8.2": { "rule_name": "Unusual Hour for a User to Logon", "sha256": "1e847948be954f3a3cbfb10357ae89e2badbfd6a8fbe0b16d728d77166473a07", "type": "machine_learning", "version": 2 } }, "rule_name": "Unusual Hour for a User to Logon", "sha256": "1e847948be954f3a3cbfb10357ae89e2badbfd6a8fbe0b16d728d77166473a07", "type": "machine_learning", "version": 3 }, "746edc4c-c54c-49c6-97a1-651223819448": { "previous": { "8.2": { "rule_name": "Unusual DNS Activity", "sha256": "6756a4819c149be09d06dbd77b8d1335be3f2892ec75596b19813f0e151f420e", "type": "machine_learning", "version": 5 } }, "rule_name": "Unusual DNS Activity", "sha256": "6756a4819c149be09d06dbd77b8d1335be3f2892ec75596b19813f0e151f420e", "type": "machine_learning", "version": 6 }, "75ee75d8-c180-481c-ba88-ee50129a6aef": { "previous": { "8.2": { "rule_name": "Web Application Suspicious Activity: Unauthorized Method", "sha256": "043fb6685ee21c9cd0a6a574ef411cf5548ca2c8913ee806b028c20f53afdd0a", "type": "query", "version": 9 } }, "rule_name": "Web Application Suspicious Activity: Unauthorized Method", "sha256": "043fb6685ee21c9cd0a6a574ef411cf5548ca2c8913ee806b028c20f53afdd0a", "type": "query", "version": 10 }, "76152ca1-71d0-4003-9e37-0983e12832da": { "previous": { "8.2": { "rule_name": "Potential Privilege Escalation via Sudoers File Modification", "sha256": "41bff26d8ac04c3a2f669a13e1b3edfca89037be6c5c41504748ab258705d9f1", "type": "query", "version": 2 } }, "rule_name": "Potential Privilege Escalation via Sudoers File Modification", "sha256": "41bff26d8ac04c3a2f669a13e1b3edfca89037be6c5c41504748ab258705d9f1", "type": "query", "version": 3 }, "764c8437-a581-4537-8060-1fdb0e92c92d": { "min_stack_version": "8.2", "previous": { "8.2": { "rule_name": "Kubernetes Pod Created With HostIPC", "sha256": "9a9a9b859d5aa0b1260420d9cf0d17cf615400af097106fd35f5b1d6af863196", "type": "query", "version": 2 } }, "rule_name": "Kubernetes Pod Created With HostIPC", "sha256": "9a9a9b859d5aa0b1260420d9cf0d17cf615400af097106fd35f5b1d6af863196", "type": "query", "version": 2 }, "766d3f91-3f12-448c-b65f-20123e9e9e8c": { "previous": { "8.2": { "rule_name": "Creation of Hidden Shared Object File", "sha256": "da41abaa6f339c5781096f2317c871074e954607783aa1929bfb915ce941960e", "type": "eql", "version": 2 } }, "rule_name": "Creation of Hidden Shared Object File", "sha256": "da41abaa6f339c5781096f2317c871074e954607783aa1929bfb915ce941960e", "type": "eql", "version": 3 }, "76ddb638-abf7-42d5-be22-4a70b0bf7241": { "previous": { "8.2": { "rule_name": "Privilege Escalation via Rogue Named Pipe Impersonation", "sha256": "edaa42397d413323802f1ef7f9875f5de10bed34577f53a332289a143cbc001c", "type": "eql", "version": 4 } }, "rule_name": "Privilege Escalation via Rogue Named Pipe Impersonation", "sha256": "edaa42397d413323802f1ef7f9875f5de10bed34577f53a332289a143cbc001c", "type": "eql", "version": 5 }, "76fd43b7-3480-4dd9-8ad7-8bd36bfad92f": { "previous": { "8.2": { "rule_name": "Potential Remote Desktop Tunneling Detected", "sha256": "1abb2447d34ad3e537afe69f7952979911c10b4ac2de409942b8286690971ba8", "type": "eql", "version": 8 } }, "rule_name": "Potential Remote Desktop Tunneling Detected", "sha256": "1abb2447d34ad3e537afe69f7952979911c10b4ac2de409942b8286690971ba8", "type": "eql", "version": 9 }, "770e0c4d-b998-41e5-a62e-c7901fd7f470": { "previous": { "8.2": { "rule_name": "Enumeration Command Spawned via WMIPrvSE", "sha256": "51517f9a409f7b6c6a70ee3417cb14f1ec4aa9323d6890a09c720defffd6fba1", "type": "eql", "version": 5 } }, "rule_name": "Enumeration Command Spawned via WMIPrvSE", "sha256": "51517f9a409f7b6c6a70ee3417cb14f1ec4aa9323d6890a09c720defffd6fba1", "type": "eql", "version": 6 }, "774f5e28-7b75-4a58-b94e-41bf060fdd86": { "previous": { "8.2": { "rule_name": "User Added as Owner for Azure Application", "sha256": "703fe0f5612ad2d0a2b2586ea0901b308e6d66e9fb1b42ea07f599eda881a0e9", "type": "query", "version": 7 } }, "rule_name": "User Added as Owner for Azure Application", "sha256": "703fe0f5612ad2d0a2b2586ea0901b308e6d66e9fb1b42ea07f599eda881a0e9", "type": "query", "version": 8 }, "77a3c3df-8ec4-4da4-b758-878f551dee69": { "previous": { "8.2": { "rule_name": "Adversary Behavior - Detected - Elastic Endgame", "sha256": "0072ff59ca4feee94e2d1c15d48244bba7d6706c23b5fa838b2d80f112d5d3ac", "type": "query", "version": 8 } }, "rule_name": "Adversary Behavior - Detected - Elastic Endgame", "sha256": "0072ff59ca4feee94e2d1c15d48244bba7d6706c23b5fa838b2d80f112d5d3ac", "type": "query", "version": 9 }, "785a404b-75aa-4ffd-8be5-3334a5a544dd": { "min_stack_version": "8.0", "previous": { "7.16": { "rule_name": "Application Added to Google Workspace Domain", "sha256": "05659e0fca8bfd5b058797e8189179ad491969abb24b47e22e586ea42c527deb", "type": "query", "version": 12 }, "8.2": { "rule_name": "Application Added to Google Workspace Domain", "sha256": "167624464a44f366b739b360ebb3abbf57ded7a1a0a5477391c335aa6c3a8d50", "type": "query", "version": 14 } }, "rule_name": "Application Added to Google Workspace Domain", "sha256": "167624464a44f366b739b360ebb3abbf57ded7a1a0a5477391c335aa6c3a8d50", "type": "query", "version": 15 }, "7882cebf-6cf1-4de3-9662-213aa13e8b80": { "previous": { "8.2": { "rule_name": "Azure Privilege Identity Management Role Modified", "sha256": "807ead82dbf0ca01f40078677f4aa2ee30e13874b37860fc1a835cb44f607c39", "type": "query", "version": 7 } }, "rule_name": "Azure Privilege Identity Management Role Modified", "sha256": "807ead82dbf0ca01f40078677f4aa2ee30e13874b37860fc1a835cb44f607c39", "type": "query", "version": 8 }, "78d3d8d9-b476-451d-a9e0-7a5addd70670": { "previous": { "8.2": { "rule_name": "Spike in AWS Error Messages", "sha256": "01aad6090bc10b35e30f2ba738f6102b658567c0f78ad2aea02aa8a87624cc24", "type": "machine_learning", "version": 11 } }, "rule_name": "Spike in AWS Error Messages", "sha256": "01aad6090bc10b35e30f2ba738f6102b658567c0f78ad2aea02aa8a87624cc24", "type": "machine_learning", "version": 12 }, "792dd7a6-7e00-4a0a-8a9a-a7c24720b5ec": { "previous": { "8.2": { "rule_name": "Azure Key Vault Modified", "sha256": "e1212563d20d9bd804d0f0103f0d02843b99ed1512929cf8637d33a1283c7172", "type": "query", "version": 7 } }, "rule_name": "Azure Key Vault Modified", "sha256": "e1212563d20d9bd804d0f0103f0d02843b99ed1512929cf8637d33a1283c7172", "type": "query", "version": 8 }, "79f97b31-480e-4e63-a7f4-ede42bf2c6de": { "previous": { "8.2": { "rule_name": "Potential Shadow Credentials added to AD Object", "sha256": "7e3d14629cfafc91401f89e4897f7c7c3af8fd54751dd0047922f11e48777896", "type": "query", "version": 4 } }, "rule_name": "Potential Shadow Credentials added to AD Object", "sha256": "7e3d14629cfafc91401f89e4897f7c7c3af8fd54751dd0047922f11e48777896", "type": "query", "version": 5 }, "7a137d76-ce3d-48e2-947d-2747796a78c0": { "previous": { "8.2": { "rule_name": "Network Sniffing via Tcpdump", "sha256": "a1d61d8865b525e77420ddd2744a088b6776dae60edb6673253cd1aeba1fd426", "type": "query", "version": 7 } }, "rule_name": "Network Sniffing via Tcpdump", "sha256": "a1d61d8865b525e77420ddd2744a088b6776dae60edb6673253cd1aeba1fd426", "type": "query", "version": 8 }, "7b08314d-47a0-4b71-ae4e-16544176924f": { "previous": { "8.2": { "rule_name": "File and Directory Discovery", "sha256": "720c1bc79fdb18e1f5ef2fe1e9aa79081b3ca846cdab6f115116d45d72d115b5", "type": "eql", "version": 5 } }, "rule_name": "File and Directory Discovery", "sha256": "720c1bc79fdb18e1f5ef2fe1e9aa79081b3ca846cdab6f115116d45d72d115b5", "type": "eql", "version": 6 }, "7b3da11a-60a2-412e-8aa7-011e1eb9ed47": { "previous": { "8.2": { "rule_name": "AWS ElastiCache Security Group Created", "sha256": "226ee11ffe057fb5a2ee3b7f350a57d79b5080d0586afb18939eea9ce65ae082", "type": "query", "version": 4 } }, "rule_name": "AWS ElastiCache Security Group Created", "sha256": "226ee11ffe057fb5a2ee3b7f350a57d79b5080d0586afb18939eea9ce65ae082", "type": "query", "version": 5 }, "7b8bfc26-81d2-435e-965c-d722ee397ef1": { "previous": { "8.2": { "rule_name": "Windows Network Enumeration", "sha256": "7b40b87ee1a93d70b7e567f0a0198401ed29fdc5a08e73e173aadc29c7852f58", "type": "eql", "version": 8 } }, "rule_name": "Windows Network Enumeration", "sha256": "7b40b87ee1a93d70b7e567f0a0198401ed29fdc5a08e73e173aadc29c7852f58", "type": "eql", "version": 9 }, "7ba58110-ae13-439b-8192-357b0fcfa9d7": { "previous": { "8.2": { "rule_name": "Suspicious LSASS Access via MalSecLogon", "sha256": "776bdc7d055bc880558ce25ef540c01f38557435a19f04cf3e6aad5190dafa54", "type": "eql", "version": 2 } }, "rule_name": "Suspicious LSASS Access via MalSecLogon", "sha256": "776bdc7d055bc880558ce25ef540c01f38557435a19f04cf3e6aad5190dafa54", "type": "eql", "version": 3 }, "7bcbb3ac-e533-41ad-a612-d6c3bf666aba": { "previous": { "8.2": { "rule_name": "Tampering of Bash Command-Line History", "sha256": "97b6389a0577016d4c0e86d27d8b77a359c768b9759938f8ed719c5a9a777f3a", "type": "eql", "version": 10 } }, "rule_name": "Tampering of Bash Command-Line History", "sha256": "97b6389a0577016d4c0e86d27d8b77a359c768b9759938f8ed719c5a9a777f3a", "type": "eql", "version": 11 }, "7ceb2216-47dd-4e64-9433-cddc99727623": { "previous": { "8.2": { "rule_name": "GCP Service Account Creation", "sha256": "785c10b62b59333a0f88d46a496dead6b5f7a450baf28951b38c53c1f5596014", "type": "query", "version": 7 } }, "rule_name": "GCP Service Account Creation", "sha256": "785c10b62b59333a0f88d46a496dead6b5f7a450baf28951b38c53c1f5596014", "type": "query", "version": 8 }, "7d2c38d7-ede7-4bdf-b140-445906e6c540": { "previous": { "8.2": { "rule_name": "Tor Activity to the Internet", "sha256": "a795f581489be91fab79b53ab0afee754fd43c0655cde52c08dd70983c606cb1", "type": "query", "version": 8 } }, "rule_name": "Tor Activity to the Internet", "sha256": "a795f581489be91fab79b53ab0afee754fd43c0655cde52c08dd70983c606cb1", "type": "query", "version": 9 }, "7f370d54-c0eb-4270-ac5a-9a6020585dc6": { "previous": { "8.2": { "rule_name": "Suspicious WMIC XSL Script Execution", "sha256": "f0793cb60952242e57aa18d593e65df3acba90e83548d3bdf6ed22bff64d628f", "type": "eql", "version": 5 } }, "rule_name": "Suspicious WMIC XSL Script Execution", "sha256": "f0793cb60952242e57aa18d593e65df3acba90e83548d3bdf6ed22bff64d628f", "type": "eql", "version": 6 }, "809b70d3-e2c3-455e-af1b-2626a5a1a276": { "previous": { "8.2": { "rule_name": "Unusual City For an AWS Command", "sha256": "c75d9cbac58c20495801058ce39d2b4aba8a845ec339464c961ef4bb336525ae", "type": "machine_learning", "version": 9 } }, "rule_name": "Unusual City For an AWS Command", "sha256": "c75d9cbac58c20495801058ce39d2b4aba8a845ec339464c961ef4bb336525ae", "type": "machine_learning", "version": 10 }, "80c52164-c82a-402c-9964-852533d58be1": { "previous": { "8.2": { "rule_name": "Process Injection - Detected - Elastic Endgame", "sha256": "61983f7e0e2a5a6846f2e64148a468e508bffa658f0914904759ddedd3c8b1ce", "type": "query", "version": 9 } }, "rule_name": "Process Injection - Detected - Elastic Endgame", "sha256": "61983f7e0e2a5a6846f2e64148a468e508bffa658f0914904759ddedd3c8b1ce", "type": "query", "version": 10 }, "818e23e6-2094-4f0e-8c01-22d30f3506c6": { "previous": { "8.2": { "rule_name": "PowerShell Script Block Logging Disabled", "sha256": "b6672245265d500ac777de607d8edf6b31aa2bceade6a79152a97d283673274d", "type": "eql", "version": 5 } }, "rule_name": "PowerShell Script Block Logging Disabled", "sha256": "b6672245265d500ac777de607d8edf6b31aa2bceade6a79152a97d283673274d", "type": "eql", "version": 6 }, "81cc58f5-8062-49a2-ba84-5cc4b4d31c40": { "previous": { "8.2": { "rule_name": "Persistence via Kernel Module Modification", "sha256": "6d2938fb1e03fb76895197f4565a860e7c346b8cba3ac5bc612938f6af910d86", "type": "query", "version": 8 } }, "rule_name": "Persistence via Kernel Module Modification", "sha256": "6d2938fb1e03fb76895197f4565a860e7c346b8cba3ac5bc612938f6af910d86", "type": "query", "version": 9 }, "81fe9dc6-a2d7-4192-a2d8-eed98afc766a": { "previous": { "8.2": { "rule_name": "PowerShell Suspicious Payload Encoded and Compressed", "sha256": "14de188f0368c8113c85bd365c39d0989d1cf10ed21e6b6ba1efd219c805c7fb", "type": "query", "version": 6 } }, "rule_name": "PowerShell Suspicious Payload Encoded and Compressed", "sha256": "14de188f0368c8113c85bd365c39d0989d1cf10ed21e6b6ba1efd219c805c7fb", "type": "query", "version": 7 }, "827f8d8f-4117-4ae4-b551-f56d54b9da6b": { "previous": { "8.2": { "rule_name": "Apple Scripting Execution with Administrator Privileges", "sha256": "8bdb1ce979fcefabbfaa0f4dee8b269cec0e1e7ef1d333a502ce6f17eea56cde", "type": "eql", "version": 4 } }, "rule_name": "Apple Scripting Execution with Administrator Privileges", "sha256": "8bdb1ce979fcefabbfaa0f4dee8b269cec0e1e7ef1d333a502ce6f17eea56cde", "type": "eql", "version": 5 }, "83a1931d-8136-46fc-b7b9-2db4f639e014": { "previous": { "8.2": { "rule_name": "Azure Kubernetes Pods Deleted", "sha256": "b991a10d5e4c961fbac48a5a9eaab802246deca8ee74ad44255110504a225183", "type": "query", "version": 5 } }, "rule_name": "Azure Kubernetes Pods Deleted", "sha256": "b991a10d5e4c961fbac48a5a9eaab802246deca8ee74ad44255110504a225183", "type": "query", "version": 6 }, "83b2c6e5-e0b2-42d7-8542-8f3af86a1acb": { "previous": { "8.2": { "rule_name": "Linux Restricted Shell Breakout via the mysql command", "sha256": "6a7fe2a2002dc6de66039a88c6f06a12e5ca7e45752690720ccd33d86d321194", "type": "eql", "version": 1 } }, "rule_name": "Linux Restricted Shell Breakout via the mysql command", "sha256": "6a7fe2a2002dc6de66039a88c6f06a12e5ca7e45752690720ccd33d86d321194", "type": "eql", "version": 2 }, "84da2554-e12a-11ec-b896-f661ea17fbcd": { "previous": { "8.2": { "rule_name": "Enumerating Domain Trusts via NLTEST.EXE", "sha256": "454e3aade32ff61723c870c972587300415eba273679cc9f1b5a4df21f3bb331", "type": "eql", "version": 2 } }, "rule_name": "Enumerating Domain Trusts via NLTEST.EXE", "sha256": "454e3aade32ff61723c870c972587300415eba273679cc9f1b5a4df21f3bb331", "type": "eql", "version": 3 }, "850d901a-2a3c-46c6-8b22-55398a01aad8": { "min_stack_version": "7.16", "previous": { "8.2": { "rule_name": "Potential Remote Credential Access via Registry", "sha256": "8aa38a9a88715acf22617286f18cf3b682130ccd1d625fe5f0439c81e60be69c", "type": "eql", "version": 4 } }, "rule_name": "Potential Remote Credential Access via Registry", "sha256": "8aa38a9a88715acf22617286f18cf3b682130ccd1d625fe5f0439c81e60be69c", "type": "eql", "version": 5 }, "852c1f19-68e8-43a6-9dce-340771fe1be3": { "min_stack_version": "7.16", "previous": { "8.2": { "rule_name": "Suspicious PowerShell Engine ImageLoad", "sha256": "d7c091b6f97197896f2feb40ff590004aadc49d47645dce62abd86354d7a278b", "type": "eql", "version": 8 } }, "rule_name": "Suspicious PowerShell Engine ImageLoad", "sha256": "d7c091b6f97197896f2feb40ff590004aadc49d47645dce62abd86354d7a278b", "type": "eql", "version": 9 }, "8623535c-1e17-44e1-aa97-7a0699c3037d": { "previous": { "8.2": { "rule_name": "AWS EC2 Network Access Control List Deletion", "sha256": "c6e59ebe85ab003df21fbcd6bad692bcdc76fe6c2b28629a40a6fa9c8918795e", "type": "query", "version": 9 } }, "rule_name": "AWS EC2 Network Access Control List Deletion", "sha256": "c6e59ebe85ab003df21fbcd6bad692bcdc76fe6c2b28629a40a6fa9c8918795e", "type": "query", "version": 10 }, "863cdf31-7fd3-41cf-a185-681237ea277b": { "previous": { "8.2": { "rule_name": "AWS RDS Security Group Deletion", "sha256": "f39be5f1084cc1ef95308f704a479690c24f61bce88d207ea29b7c6fcfb93708", "type": "query", "version": 5 } }, "rule_name": "AWS RDS Security Group Deletion", "sha256": "f39be5f1084cc1ef95308f704a479690c24f61bce88d207ea29b7c6fcfb93708", "type": "query", "version": 6 }, "867616ec-41e5-4edc-ada2-ab13ab45de8a": { "previous": { "8.2": { "rule_name": "AWS IAM Group Deletion", "sha256": "be3cafda2f1bc4c15c32214ed64b86374b01e2ba135956915942b0ee2158a900", "type": "query", "version": 8 } }, "rule_name": "AWS IAM Group Deletion", "sha256": "be3cafda2f1bc4c15c32214ed64b86374b01e2ba135956915942b0ee2158a900", "type": "query", "version": 9 }, "870aecc0-cea4-4110-af3f-e02e9b373655": { "previous": { "8.2": { "rule_name": "Security Software Discovery via Grep", "sha256": "b55b1241816124ff03a9d5d57583bcdf421dff533215d423116d1863b8103de1", "type": "eql", "version": 5 } }, "rule_name": "Security Software Discovery via Grep", "sha256": "b55b1241816124ff03a9d5d57583bcdf421dff533215d423116d1863b8103de1", "type": "eql", "version": 6 }, "871ea072-1b71-4def-b016-6278b505138d": { "previous": { "8.2": { "rule_name": "Enumeration of Administrator Accounts", "sha256": "06e3c5026a6339436c2ba8655621ebb2da7d12585ebd09d0971dacc7a5d5d350", "type": "eql", "version": 8 } }, "rule_name": "Enumeration of Administrator Accounts", "sha256": "06e3c5026a6339436c2ba8655621ebb2da7d12585ebd09d0971dacc7a5d5d350", "type": "eql", "version": 9 }, "87594192-4539-4bc4-8543-23bc3d5bd2b4": { "previous": { "8.2": { "rule_name": "AWS EventBridge Rule Disabled or Deleted", "sha256": "367010706d34877b7145c84d93da5e24a1de26743ac66c62886d3c3dd795c7ee", "type": "query", "version": 5 } }, "rule_name": "AWS EventBridge Rule Disabled or Deleted", "sha256": "367010706d34877b7145c84d93da5e24a1de26743ac66c62886d3c3dd795c7ee", "type": "query", "version": 6 }, "87ec6396-9ac4-4706-bcf0-2ebb22002f43": { "previous": { "8.2": { "rule_name": "FTP (File Transfer Protocol) Activity to the Internet", "sha256": "b6ea4d4c77b8c1ed584826fd5828493dc1a33eee3546be3a15f540a56a9dc9f7", "type": "query", "version": 8 } }, "rule_name": "FTP (File Transfer Protocol) Activity to the Internet", "sha256": "b6ea4d4c77b8c1ed584826fd5828493dc1a33eee3546be3a15f540a56a9dc9f7", "type": "query", "version": 9 }, "88671231-6626-4e1b-abb7-6e361a171fbb": { "previous": { "8.2": { "rule_name": "Microsoft 365 Global Administrator Role Assigned", "sha256": "7ccdd0dd55b42d0243844e56404c0100052c1390d25e282a878032c8e2fcd758", "type": "query", "version": 4 } }, "rule_name": "Microsoft 365 Global Administrator Role Assigned", "sha256": "7ccdd0dd55b42d0243844e56404c0100052c1390d25e282a878032c8e2fcd758", "type": "query", "version": 5 }, "88817a33-60d3-411f-ba79-7c905d865b2a": { "previous": { "8.2": { "rule_name": "Sublime Plugin or Application Script Modification", "sha256": "a47894d9a0ff5b4f453fdf5c5d2b60462f4f97413cff355a619f6b620598454c", "type": "eql", "version": 4 } }, "rule_name": "Sublime Plugin or Application Script Modification", "sha256": "a47894d9a0ff5b4f453fdf5c5d2b60462f4f97413cff355a619f6b620598454c", "type": "eql", "version": 5 }, "891cb88e-441a-4c3e-be2d-120d99fe7b0d": { "previous": { "8.2": { "rule_name": "Suspicious WMI Image Load from MS Office", "sha256": "a3ff7380f0b662c46ffcecab91e7b40b2ce4e9a74f19ea3aea29841af035b55c", "type": "eql", "version": 7 } }, "rule_name": "Suspicious WMI Image Load from MS Office", "sha256": "a3ff7380f0b662c46ffcecab91e7b40b2ce4e9a74f19ea3aea29841af035b55c", "type": "eql", "version": 8 }, "89583d1b-3c2e-4606-8b74-0a9fd2248e88": { "previous": { "8.2": { "rule_name": "Linux Restricted Shell Breakout via the vi command", "sha256": "4e641b4ff6b6f35846fe1d66fcc4aa611c357f27f064a62f067df3209e95af79", "type": "eql", "version": 1 } }, "rule_name": "Linux Restricted Shell Breakout via the vi command", "sha256": "4e641b4ff6b6f35846fe1d66fcc4aa611c357f27f064a62f067df3209e95af79", "type": "eql", "version": 2 }, "897dc6b5-b39f-432a-8d75-d3730d50c782": { "previous": { "8.2": { "rule_name": "Kerberos Traffic from Unusual Process", "sha256": "9f205a5f4f70064f2c0001faffa2c6e2bbec9efd880ab8f16cb9586acdeb5341", "type": "eql", "version": 9 } }, "rule_name": "Kerberos Traffic from Unusual Process", "sha256": "9f205a5f4f70064f2c0001faffa2c6e2bbec9efd880ab8f16cb9586acdeb5341", "type": "eql", "version": 10 }, "89f9a4b0-9f8f-4ee0-8823-c4751a6d6696": { "previous": { "8.2": { "rule_name": "Command Prompt Network Connection", "sha256": "84fdbb4742f2acb8edc70958e3a9125b7e482b54f5c67b93d6bbf49a257dbe54", "type": "eql", "version": 8 } }, "rule_name": "Command Prompt Network Connection", "sha256": "84fdbb4742f2acb8edc70958e3a9125b7e482b54f5c67b93d6bbf49a257dbe54", "type": "eql", "version": 9 }, "89fa6cb7-6b53-4de2-b604-648488841ab8": { "previous": { "8.2": { "rule_name": "Persistence via DirectoryService Plugin Modification", "sha256": "96a0b0230fc9db59d3bbe901162cbb19f4c0898514b124c9d953865bc23d00ac", "type": "query", "version": 3 } }, "rule_name": "Persistence via DirectoryService Plugin Modification", "sha256": "96a0b0230fc9db59d3bbe901162cbb19f4c0898514b124c9d953865bc23d00ac", "type": "query", "version": 4 }, "8a1b0278-0f9a-487d-96bd-d4833298e87a": { "previous": { "8.2": { "rule_name": "Setuid / Setgid Bit Set via chmod", "sha256": "d97ec49f15814bfde2f3f6b0603a9cf03bc171cffb3a6004202db2c71153461c", "type": "query", "version": 8 } }, "rule_name": "Setuid / Setgid Bit Set via chmod", "sha256": "d97ec49f15814bfde2f3f6b0603a9cf03bc171cffb3a6004202db2c71153461c", "type": "query", "version": 9 }, "8a1d4831-3ce6-4859-9891-28931fa6101d": { "previous": { "8.2": { "rule_name": "Suspicious Execution from a Mounted Device", "sha256": "a14388f014f4a6c633e0cc343258648222fd922ac09432bef340615503fa4136", "type": "eql", "version": 4 } }, "rule_name": "Suspicious Execution from a Mounted Device", "sha256": "a14388f014f4a6c633e0cc343258648222fd922ac09432bef340615503fa4136", "type": "eql", "version": 5 }, "8a5c1e5f-ad63-481e-b53a-ef959230f7f1": { "previous": { "8.2": { "rule_name": "Attempt to Deactivate an Okta Network Zone", "sha256": "96efba52fe6cbf544a08722635a44c05c5cd7eb8c7d96bbd84a59de1856a7235", "type": "query", "version": 6 } }, "rule_name": "Attempt to Deactivate an Okta Network Zone", "sha256": "96efba52fe6cbf544a08722635a44c05c5cd7eb8c7d96bbd84a59de1856a7235", "type": "query", "version": 7 }, "8acb7614-1d92-4359-bfcf-478b6d9de150": { "previous": { "8.2": { "rule_name": "Suspicious JAVA Child Process", "sha256": "219a9bedef498436f26a9467c7d9398c0a8a656e2740e60d9768074407878031", "type": "eql", "version": 6 } }, "rule_name": "Suspicious JAVA Child Process", "sha256": "219a9bedef498436f26a9467c7d9398c0a8a656e2740e60d9768074407878031", "type": "eql", "version": 7 }, "8b2b3a62-a598-4293-bc14-3d5fa22bb98f": { "min_stack_version": "7.16", "previous": { "8.2": { "rule_name": "Executable File Creation with Multiple Extensions", "sha256": "d28a3ed999a5ef5a95a6710b2f118f6bfbeb31aee477de537ec2854e09560190", "type": "eql", "version": 6 } }, "rule_name": "Executable File Creation with Multiple Extensions", "sha256": "d28a3ed999a5ef5a95a6710b2f118f6bfbeb31aee477de537ec2854e09560190", "type": "eql", "version": 7 }, "8b4f0816-6a65-4630-86a6-c21c179c0d09": { "previous": { "8.2": { "rule_name": "Enable Host Network Discovery via Netsh", "sha256": "73fa1cce891ee006c32650991843135e8c3b22297fcce1f98242f3b4f1d70504", "type": "eql", "version": 6 } }, "rule_name": "Enable Host Network Discovery via Netsh", "sha256": "73fa1cce891ee006c32650991843135e8c3b22297fcce1f98242f3b4f1d70504", "type": "eql", "version": 7 }, "8b64d36a-1307-4b2e-a77b-a0027e4d27c8": { "previous": { "8.2": { "rule_name": "Azure Kubernetes Events Deleted", "sha256": "44a51581dbc42a7f4e2970a5c54d8ba2c713d95e75fd6ddfecc281f479a5c5db", "type": "query", "version": 6 } }, "rule_name": "Azure Kubernetes Events Deleted", "sha256": "44a51581dbc42a7f4e2970a5c54d8ba2c713d95e75fd6ddfecc281f479a5c5db", "type": "query", "version": 7 }, "8c1bdde8-4204-45c0-9e0c-c85ca3902488": { "min_stack_version": "8.2", "previous": { "7.16": { "rule_name": "RDP (Remote Desktop Protocol) from the Internet", "sha256": "b6d7ad4ee2f11ab3ed8aa4bcee08a462a4b3aa3790ae27abd86cee6d921e3283", "type": "query", "version": 13 }, "8.2": { "rule_name": "RDP (Remote Desktop Protocol) from the Internet", "sha256": "be36f608696a60e995e56d51f29baa67f2cd8c36c86cec71f6f5ff21c6d89d3f", "type": "query", "version": 15 } }, "rule_name": "RDP (Remote Desktop Protocol) from the Internet", "sha256": "be36f608696a60e995e56d51f29baa67f2cd8c36c86cec71f6f5ff21c6d89d3f", "type": "query", "version": 15 }, "8c37dc0e-e3ac-4c97-8aa0-cf6a9122de45": { "previous": { "8.2": { "rule_name": "Unusual Child Process of dns.exe", "sha256": "780fd0a2656cb93d8449c5f2419068dc3d18d54d85279e7cf3eae7d23aa3ee1f", "type": "eql", "version": 8 } }, "rule_name": "Unusual Child Process of dns.exe", "sha256": "780fd0a2656cb93d8449c5f2419068dc3d18d54d85279e7cf3eae7d23aa3ee1f", "type": "eql", "version": 9 }, "8c81e506-6e82-4884-9b9a-75d3d252f967": { "previous": { "8.2": { "rule_name": "Potential SharpRDP Behavior", "sha256": "c67b68e5dd8c58394af905d6d43fb52fda4804d8e05559f4e3acc30255baaa73", "type": "eql", "version": 7 } }, "rule_name": "Potential SharpRDP Behavior", "sha256": "c67b68e5dd8c58394af905d6d43fb52fda4804d8e05559f4e3acc30255baaa73", "type": "eql", "version": 8 }, "8cb4f625-7743-4dfb-ae1b-ad92be9df7bd": { "previous": { "8.2": { "rule_name": "Ransomware - Detected - Elastic Endgame", "sha256": "365dff69e83d18e0698a913577e00d9e8342b03e502853d5eda7de1dcf0bb907", "type": "query", "version": 9 } }, "rule_name": "Ransomware - Detected - Elastic Endgame", "sha256": "365dff69e83d18e0698a913577e00d9e8342b03e502853d5eda7de1dcf0bb907", "type": "query", "version": 10 }, "8da41fc9-7735-4b24-9cc6-c78dfc9fc9c9": { "previous": { "8.2": { "rule_name": "Potential Privilege Escalation via PKEXEC", "sha256": "223f8d3c41ecfe859e3acfb203079fc170fe27b1c4bd4a22c29947bf238f6e0e", "type": "eql", "version": 3 } }, "rule_name": "Potential Privilege Escalation via PKEXEC", "sha256": "223f8d3c41ecfe859e3acfb203079fc170fe27b1c4bd4a22c29947bf238f6e0e", "type": "eql", "version": 4 }, "8ddab73b-3d15-4e5d-9413-47f05553c1d7": { "previous": { "8.2": { "rule_name": "Azure Automation Runbook Deleted", "sha256": "669e566b53ae65c2ea2d431812df2066226fd44ce573e527ac1f7c485f0fa5be", "type": "query", "version": 7 } }, "rule_name": "Azure Automation Runbook Deleted", "sha256": "669e566b53ae65c2ea2d431812df2066226fd44ce573e527ac1f7c485f0fa5be", "type": "query", "version": 8 }, "8f3e91c7-d791-4704-80a1-42c160d7aa27": { "previous": { "8.2": { "rule_name": "Potential Port Monitor or Print Processor Registration Abuse", "sha256": "b12dee32921ca6ff7c7b390a19ac0d2ee3e7e956d2c1efba79587c42ebc20e7e", "type": "eql", "version": 3 } }, "rule_name": "Potential Port Monitor or Print Processor Registration Abuse", "sha256": "b12dee32921ca6ff7c7b390a19ac0d2ee3e7e956d2c1efba79587c42ebc20e7e", "type": "eql", "version": 4 }, "8f919d4b-a5af-47ca-a594-6be59cd924a4": { "previous": { "8.2": { "rule_name": "Incoming DCOM Lateral Movement with ShellBrowserWindow or ShellWindows", "sha256": "863c82226f43772f3533a4f83705f1cb95f11bc1167ee249118194ae6d742fcb", "type": "eql", "version": 6 } }, "rule_name": "Incoming DCOM Lateral Movement with ShellBrowserWindow or ShellWindows", "sha256": "863c82226f43772f3533a4f83705f1cb95f11bc1167ee249118194ae6d742fcb", "type": "eql", "version": 7 }, "8fb75dda-c47a-4e34-8ecd-34facf7aad13": { "previous": { "8.2": { "rule_name": "GCP Service Account Deletion", "sha256": "d057eb6c8a3ff17bc8ab962565bc7a4f09b724c09fd6fd9feb05ac0ef07b6fe0", "type": "query", "version": 7 } }, "rule_name": "GCP Service Account Deletion", "sha256": "d057eb6c8a3ff17bc8ab962565bc7a4f09b724c09fd6fd9feb05ac0ef07b6fe0", "type": "query", "version": 8 }, "8fed8450-847e-43bd-874c-3bbf0cd425f3": { "previous": { "8.2": { "rule_name": "Linux Restricted Shell Breakout via apt/apt-get Changelog Escape", "sha256": "7e88fe635274dd47f23d744bd4b8fb482ab86c8b1b6db9434d64ab40c7edbb62", "type": "eql", "version": 1 } }, "rule_name": "Linux Restricted Shell Breakout via apt/apt-get Changelog Escape", "sha256": "7e88fe635274dd47f23d744bd4b8fb482ab86c8b1b6db9434d64ab40c7edbb62", "type": "eql", "version": 2 }, "90169566-2260-4824-b8e4-8615c3b4ed52": { "previous": { "8.2": { "rule_name": "Hping Process Activity", "sha256": "00e01283ce7ee80900ef97b32f84db309d42d308bdaee6ed1ecc46212a47bc75", "type": "query", "version": 9 } }, "rule_name": "Hping Process Activity", "sha256": "00e01283ce7ee80900ef97b32f84db309d42d308bdaee6ed1ecc46212a47bc75", "type": "query", "version": 10 }, "9055ece6-2689-4224-a0e0-b04881e1f8ad": { "previous": { "8.2": { "rule_name": "AWS Deletion of RDS Instance or Cluster", "sha256": "fccbd85c5ef8509fcdf0af7ff50d8075a6de27f496059da1d4e794064128683d", "type": "query", "version": 9 } }, "rule_name": "AWS Deletion of RDS Instance or Cluster", "sha256": "fccbd85c5ef8509fcdf0af7ff50d8075a6de27f496059da1d4e794064128683d", "type": "query", "version": 10 }, "9092cd6c-650f-4fa3-8a8a-28256c7489c9": { "previous": { "8.2": { "rule_name": "Keychain Password Retrieval via Command Line", "sha256": "bc1b529f9188d6b978a977217a53aa17210410e1741a348c6579d6f879fcfaff", "type": "eql", "version": 5 } }, "rule_name": "Keychain Password Retrieval via Command Line", "sha256": "bc1b529f9188d6b978a977217a53aa17210410e1741a348c6579d6f879fcfaff", "type": "eql", "version": 6 }, "90e28af7-1d96-4582-bf11-9a1eff21d0e5": { "previous": { "8.2": { "rule_name": "Auditd Login Attempt at Forbidden Time", "sha256": "0410b9e68a9f6e6086c24a72980f090d2a0e09ff9961adc13895613c2bb15cad", "type": "query", "version": 1 } }, "rule_name": "Auditd Login Attempt at Forbidden Time", "sha256": "0410b9e68a9f6e6086c24a72980f090d2a0e09ff9961adc13895613c2bb15cad", "type": "query", "version": 2 }, "9180ffdf-f3d0-4db3-bf66-7a14bcff71b8": { "previous": { "8.2": { "rule_name": "GCP Virtual Private Cloud Route Creation", "sha256": "34a1db159c380f672b99ce5fa36d2d08d218ff0a52d4d7f61b049fed345154f4", "type": "query", "version": 9 } }, "rule_name": "GCP Virtual Private Cloud Route Creation", "sha256": "34a1db159c380f672b99ce5fa36d2d08d218ff0a52d4d7f61b049fed345154f4", "type": "query", "version": 10 }, "91d04cd4-47a9-4334-ab14-084abe274d49": { "previous": { "8.2": { "rule_name": "AWS WAF Access Control List Deletion", "sha256": "93a8abf17df4faa81fa3dcf2a4da451cf18650e46bb92662dabff5f425fab8cd", "type": "query", "version": 9 } }, "rule_name": "AWS WAF Access Control List Deletion", "sha256": "93a8abf17df4faa81fa3dcf2a4da451cf18650e46bb92662dabff5f425fab8cd", "type": "query", "version": 10 }, "91f02f01-969f-4167-8d77-07827ac4cee0": { "previous": { "8.2": { "rule_name": "Unusual Web User Agent", "sha256": "04f5138c01040d8e441e9dd1c46ec058c99e1aae3bc6bc217dc6ae2d1354b9ab", "type": "machine_learning", "version": 5 } }, "rule_name": "Unusual Web User Agent", "sha256": "04f5138c01040d8e441e9dd1c46ec058c99e1aae3bc6bc217dc6ae2d1354b9ab", "type": "machine_learning", "version": 6 }, "91f02f01-969f-4167-8f55-07827ac3acc9": { "previous": { "8.2": { "rule_name": "Unusual Web Request", "sha256": "8ed90c2e6f751d96d7d953b317e17a7bd9fbe0af3d71eced67c8497f0e4652e9", "type": "machine_learning", "version": 5 } }, "rule_name": "Unusual Web Request", "sha256": "8ed90c2e6f751d96d7d953b317e17a7bd9fbe0af3d71eced67c8497f0e4652e9", "type": "machine_learning", "version": 6 }, "91f02f01-969f-4167-8f66-07827ac3bdd9": { "previous": { "8.2": { "rule_name": "DNS Tunneling", "sha256": "875fae8098689680444090f64ddee11724bd70f2235662b4a3a3ded028769a89", "type": "machine_learning", "version": 5 } }, "rule_name": "DNS Tunneling", "sha256": "875fae8098689680444090f64ddee11724bd70f2235662b4a3a3ded028769a89", "type": "machine_learning", "version": 6 }, "93075852-b0f5-4b8b-89c3-a226efae5726": { "previous": { "8.2": { "rule_name": "AWS Security Token Service (STS) AssumeRole Usage", "sha256": "7a748c5b733bb3376d6c9c0535838c0de1cf5effdfe0f3343404aed88a5a20e9", "type": "query", "version": 4 } }, "rule_name": "AWS Security Token Service (STS) AssumeRole Usage", "sha256": "7a748c5b733bb3376d6c9c0535838c0de1cf5effdfe0f3343404aed88a5a20e9", "type": "query", "version": 5 }, "931e25a5-0f5e-4ae0-ba0d-9e94eff7e3a4": { "previous": { "8.2": { "rule_name": "Sudoers File Modification", "sha256": "746c04754fc565aeca79758d77314d0ef46c01a45ed9ab811fb72476ca97cdf6", "type": "query", "version": 8 } }, "rule_name": "Sudoers File Modification", "sha256": "746c04754fc565aeca79758d77314d0ef46c01a45ed9ab811fb72476ca97cdf6", "type": "query", "version": 9 }, "9395fd2c-9947-4472-86ef-4aceb2f7e872": { "previous": { "8.2": { "rule_name": "AWS VPC Flow Logs Deletion", "sha256": "6ee1d2e0528d3db2c17ac7633cecd1ae6680dd8e7ebeb17778114fda474dd8d8", "type": "query", "version": 9 } }, "rule_name": "AWS VPC Flow Logs Deletion", "sha256": "6ee1d2e0528d3db2c17ac7633cecd1ae6680dd8e7ebeb17778114fda474dd8d8", "type": "query", "version": 10 }, "93b22c0a-06a0-4131-b830-b10d5e166ff4": { "previous": { "8.2": { "rule_name": "Suspicious SolarWinds Child Process", "sha256": "b8c3ce194a672208519da88f7c41c3b32cb4420879eda128da26e7092197b6bb", "type": "eql", "version": 7 } }, "rule_name": "Suspicious SolarWinds Child Process", "sha256": "c06d1b7e2037801fb0a08f1652feee62f12cfc5352b980ae9f22a33bc2b11b96", "type": "eql", "version": 9 }, "93c1ce76-494c-4f01-8167-35edfb52f7b1": { "previous": { "8.2": { "rule_name": "Encoded Executable Stored in the Registry", "sha256": "e4e3fbfe5541801f14ee027a2cc2e56362676fee8a2785c86d5c7b1c0ed7f083", "type": "eql", "version": 6 } }, "rule_name": "Encoded Executable Stored in the Registry", "sha256": "e4e3fbfe5541801f14ee027a2cc2e56362676fee8a2785c86d5c7b1c0ed7f083", "type": "eql", "version": 7 }, "93e63c3e-4154-4fc6-9f86-b411e0987bbf": { "min_stack_version": "8.0", "previous": { "7.16": { "rule_name": "Google Workspace Admin Role Deletion", "sha256": "5ec1e79923aaa0e99aabed335419a6c200972553ebdd4d99139bdb5bee03c8e6", "type": "query", "version": 12 }, "8.2": { "rule_name": "Google Workspace Admin Role Deletion", "sha256": "aeae7ce32f48766371322897bfbc3da7e4c5c5b9c1f6d5f7221bad6887a9d88a", "type": "query", "version": 14 } }, "rule_name": "Google Workspace Admin Role Deletion", "sha256": "aeae7ce32f48766371322897bfbc3da7e4c5c5b9c1f6d5f7221bad6887a9d88a", "type": "query", "version": 15 }, "93f47b6f-5728-4004-ba00-625083b3dcb0": { "previous": { "8.2": { "rule_name": "Modification of Standard Authentication Module or Configuration", "sha256": "dddc8c43c484f02c524a703587dcd5ce459cd175839be2bf3cfe60ed071df00f", "type": "query", "version": 3 } }, "rule_name": "Modification of Standard Authentication Module or Configuration", "sha256": "dddc8c43c484f02c524a703587dcd5ce459cd175839be2bf3cfe60ed071df00f", "type": "query", "version": 4 }, "954ee7c8-5437-49ae-b2d6-2960883898e9": { "previous": { "8.2": { "rule_name": "Remote Scheduled Task Creation", "sha256": "33f55756c5eb02716d08d9c2ba5fc6078a766a919114bf7029a0feb10b105993", "type": "eql", "version": 9 } }, "rule_name": "Remote Scheduled Task Creation", "sha256": "33f55756c5eb02716d08d9c2ba5fc6078a766a919114bf7029a0feb10b105993", "type": "eql", "version": 10 }, "959a7353-1129-4aa7-9084-30746b256a70": { "previous": { "8.2": { "rule_name": "PowerShell Suspicious Script with Screenshot Capabilities", "sha256": "e19c44c1daf8561a8b42d913b3be8fc7f223a78bb20d2e3fe0370028cffd0e16", "type": "query", "version": 6 } }, "rule_name": "PowerShell Suspicious Script with Screenshot Capabilities", "sha256": "e19c44c1daf8561a8b42d913b3be8fc7f223a78bb20d2e3fe0370028cffd0e16", "type": "query", "version": 7 }, "968ccab9-da51-4a87-9ce2-d3c9782fd759": { "previous": { "8.2": { "rule_name": "File made Immutable by Chattr", "sha256": "e43f3cdc4bbdbe9e5728b6989019def26df9a8abd6120e021b94fcb8282d423a", "type": "eql", "version": 2 } }, "rule_name": "File made Immutable by Chattr", "sha256": "e43f3cdc4bbdbe9e5728b6989019def26df9a8abd6120e021b94fcb8282d423a", "type": "eql", "version": 3 }, "96b9f4ea-0e8c-435b-8d53-2096e75fcac5": { "previous": { "8.2": { "rule_name": "Attempt to Create Okta API Token", "sha256": "d37cf8c47114dfde946b80c362cb55a4511f183e64c1770ee19c2fe896040498", "type": "query", "version": 8 } }, "rule_name": "Attempt to Create Okta API Token", "sha256": "d37cf8c47114dfde946b80c362cb55a4511f183e64c1770ee19c2fe896040498", "type": "query", "version": 9 }, "96e90768-c3b7-4df6-b5d9-6237f8bc36a8": { "previous": { "8.2": { "rule_name": "Access to Keychain Credentials Directories", "sha256": "c81d0a4562879c82842a812bf15248c4c5347dbc0e8c8eb1c25f0025d7fa925b", "type": "eql", "version": 8 } }, "rule_name": "Access to Keychain Credentials Directories", "sha256": "c81d0a4562879c82842a812bf15248c4c5347dbc0e8c8eb1c25f0025d7fa925b", "type": "eql", "version": 9 }, "97314185-2568-4561-ae81-f3e480e5e695": { "previous": { "8.2": { "rule_name": "Microsoft 365 Exchange Anti-Phish Rule Modification", "sha256": "6b0aee250c12113c8634c1a9b4bc83aa88487e2839f2ed15655cb69e22bf2eed", "type": "query", "version": 7 } }, "rule_name": "Microsoft 365 Exchange Anti-Phish Rule Modification", "sha256": "6b0aee250c12113c8634c1a9b4bc83aa88487e2839f2ed15655cb69e22bf2eed", "type": "query", "version": 8 }, "97359fd8-757d-4b1d-9af1-ef29e4a8680e": { "previous": { "8.2": { "rule_name": "GCP Storage Bucket Configuration Modification", "sha256": "de65ba5837645ec6e9d4f0a7c27f6451405080ded9bd6648c1a1e4f886eebb30", "type": "query", "version": 7 } }, "rule_name": "GCP Storage Bucket Configuration Modification", "sha256": "de65ba5837645ec6e9d4f0a7c27f6451405080ded9bd6648c1a1e4f886eebb30", "type": "query", "version": 8 }, "979729e7-0c52-4c4c-b71e-88103304a79f": { "previous": { "8.2": { "rule_name": "AWS SAML Activity", "sha256": "8e49254aba6e970d5d329ec1049699b7f4bd30761722bf36b85fe29082c145bc", "type": "query", "version": 4 } }, "rule_name": "AWS SAML Activity", "sha256": "8e49254aba6e970d5d329ec1049699b7f4bd30761722bf36b85fe29082c145bc", "type": "query", "version": 5 }, "97a8e584-fd3b-421f-9b9d-9c9d9e57e9d7": { "previous": { "8.2": { "rule_name": "Potential Abuse of Repeated MFA Push Notifications", "sha256": "144ced09d087c3f09d76bfab1e7d3c1f57bdabdd49aa7ba0fe91571060a904e4", "type": "eql", "version": 4 } }, "rule_name": "Potential Abuse of Repeated MFA Push Notifications", "sha256": "144ced09d087c3f09d76bfab1e7d3c1f57bdabdd49aa7ba0fe91571060a904e4", "type": "eql", "version": 5 }, "97aba1ef-6034-4bd3-8c1a-1e0996b27afa": { "previous": { "8.2": { "rule_name": "Suspicious Zoom Child Process", "sha256": "a2e6e13672acfb9ae9fb203ba3af7a125acd7cc2b39b831d5dc6ec97ff9157d7", "type": "eql", "version": 8 } }, "rule_name": "Suspicious Zoom Child Process", "sha256": "a2e6e13672acfb9ae9fb203ba3af7a125acd7cc2b39b831d5dc6ec97ff9157d7", "type": "eql", "version": 9 }, "97da359b-2b61-4a40-b2e4-8fc48cf7a294": { "previous": { "8.2": { "rule_name": "Linux Restricted Shell Breakout via the ssh command", "sha256": "835d5b35a441dd1e3abf0c3d4d19ef86039404014b487b05f77cf84e3690073f", "type": "eql", "version": 1 } }, "rule_name": "Linux Restricted Shell Breakout via the ssh command", "sha256": "835d5b35a441dd1e3abf0c3d4d19ef86039404014b487b05f77cf84e3690073f", "type": "eql", "version": 2 }, "97f22dab-84e8-409d-955e-dacd1d31670b": { "previous": { "8.2": { "rule_name": "Base64 Encoding/Decoding Activity", "sha256": "86fb84d8b0d3b72763c1f25b159b87869dedc4bbea83405c178c095c7f2e66f3", "type": "query", "version": 7 } }, "rule_name": "Base64 Encoding/Decoding Activity", "sha256": "86fb84d8b0d3b72763c1f25b159b87869dedc4bbea83405c178c095c7f2e66f3", "type": "query", "version": 8 }, "97fc44d3-8dae-4019-ae83-298c3015600f": { "min_stack_version": "8.2", "previous": { "7.16": { "rule_name": "Startup or Run Key Registry Modification", "sha256": "1827b7a04db141b503dcbe4bdd0c18468ccc43b937e02c76d1f2e7686d2b17ef", "type": "eql", "version": 7 }, "8.2": { "rule_name": "Startup or Run Key Registry Modification", "sha256": "b8f0e0bcd42ad4b4c7a8d16b4fea917dc3da3bd431d56d1b9146fce35a215ae8", "type": "eql", "version": 9 } }, "rule_name": "Startup or Run Key Registry Modification", "sha256": "b8f0e0bcd42ad4b4c7a8d16b4fea917dc3da3bd431d56d1b9146fce35a215ae8", "type": "eql", "version": 9 }, "9890ee61-d061-403d-9bf6-64934c51f638": { "previous": { "8.2": { "rule_name": "GCP IAM Service Account Key Deletion", "sha256": "04683dc2a0a34273c1d83c833ee0f3446ea94938f360c153b15449e70532f48f", "type": "query", "version": 8 } }, "rule_name": "GCP IAM Service Account Key Deletion", "sha256": "04683dc2a0a34273c1d83c833ee0f3446ea94938f360c153b15449e70532f48f", "type": "query", "version": 9 }, "98995807-5b09-4e37-8a54-5cae5dc932d7": { "previous": { "8.2": { "rule_name": "Microsoft 365 Exchange Management Group Role Assignment", "sha256": "bf052babf9f1e5b03d6a841458643cd5adb9fb5799db6ae1e3b70d73ba8e651a", "type": "query", "version": 7 } }, "rule_name": "Microsoft 365 Exchange Management Group Role Assignment", "sha256": "bf052babf9f1e5b03d6a841458643cd5adb9fb5799db6ae1e3b70d73ba8e651a", "type": "query", "version": 8 }, "98fd7407-0bd5-5817-cda0-3fcc33113a56": { "previous": { "8.2": { "rule_name": "AWS EC2 Snapshot Activity", "sha256": "ecda50c10faaaf69bff555eee2e1e479aa355b2f6e740ac6960e21f796404cb6", "type": "query", "version": 7 } }, "rule_name": "AWS EC2 Snapshot Activity", "sha256": "ecda50c10faaaf69bff555eee2e1e479aa355b2f6e740ac6960e21f796404cb6", "type": "query", "version": 8 }, "990838aa-a953-4f3e-b3cb-6ddf7584de9e": { "previous": { "8.2": { "rule_name": "Process Injection - Prevented - Elastic Endgame", "sha256": "9ab23922eb244147b8146766869d5af8629bcc869464c836e684ad7e387fafe8", "type": "query", "version": 9 } }, "rule_name": "Process Injection - Prevented - Elastic Endgame", "sha256": "9ab23922eb244147b8146766869d5af8629bcc869464c836e684ad7e387fafe8", "type": "query", "version": 10 }, "99239e7d-b0d4-46e3-8609-acafcf99f68c": { "previous": { "8.2": { "rule_name": "MacOS Installer Package Spawns Network Event", "sha256": "af290095eba13e169c4f6926e665c25448240f0ae320b80cc43138476f94ea72", "type": "eql", "version": 6 } }, "rule_name": "MacOS Installer Package Spawns Network Event", "sha256": "af290095eba13e169c4f6926e665c25448240f0ae320b80cc43138476f94ea72", "type": "eql", "version": 7 }, "9960432d-9b26-409f-972b-839a959e79e2": { "previous": { "8.2": { "rule_name": "Potential Credential Access via LSASS Memory Dump", "sha256": "88d2c5f308cc28bcc031d965e8b50aa986c141f50bc673ba4f13d1ecdcfd9758", "type": "eql", "version": 6 } }, "rule_name": "Potential Credential Access via LSASS Memory Dump", "sha256": "88d2c5f308cc28bcc031d965e8b50aa986c141f50bc673ba4f13d1ecdcfd9758", "type": "eql", "version": 7 }, "99dcf974-6587-4f65-9252-d866a3fdfd9c": { "min_stack_version": "7.16", "previous": { "8.2": { "rule_name": "Spike in Failed Logon Events", "sha256": "7e5b5594bdac57e03898b8c51949acf659ff2c63340b3ac26bd251c9f1556196", "type": "machine_learning", "version": 3 } }, "rule_name": "Spike in Failed Logon Events", "sha256": "7e5b5594bdac57e03898b8c51949acf659ff2c63340b3ac26bd251c9f1556196", "type": "machine_learning", "version": 4 }, "9a1a2dae-0b5f-4c3d-8305-a268d404c306": { "previous": { "8.2": { "rule_name": "Endpoint Security", "sha256": "7bf646bac0ffe227164e14b9c793a7b89d60415f2b09183abb46c9ec91dd99fd", "type": "query", "version": 4 } }, "rule_name": "Endpoint Security", "sha256": "7bf646bac0ffe227164e14b9c793a7b89d60415f2b09183abb46c9ec91dd99fd", "type": "query", "version": 5 }, "9a5b4e31-6cde-4295-9ff7-6be1b8567e1b": { "previous": { "8.2": { "rule_name": "Suspicious Explorer Child Process", "sha256": "3e5a528e103efa698882556f4ed88d9486cdc710c282dcbc111ee1649f800b5c", "type": "eql", "version": 7 } }, "rule_name": "Suspicious Explorer Child Process", "sha256": "3e5a528e103efa698882556f4ed88d9486cdc710c282dcbc111ee1649f800b5c", "type": "eql", "version": 8 }, "9aa0e1f6-52ce-42e1-abb3-09657cee2698": { "previous": { "8.2": { "rule_name": "Scheduled Tasks AT Command Enabled", "sha256": "ef6c8c55cdc8943049e6041daeb1fc99ac07f953f19b551643253e8fbf8135c5", "type": "eql", "version": 7 } }, "rule_name": "Scheduled Tasks AT Command Enabled", "sha256": "ef6c8c55cdc8943049e6041daeb1fc99ac07f953f19b551643253e8fbf8135c5", "type": "eql", "version": 8 }, "9b6813a1-daf1-457e-b0e6-0bb4e55b8a4c": { "previous": { "8.2": { "rule_name": "Persistence via WMI Event Subscription", "sha256": "a6dfa186d02163c2d134c0d208d5b58cf4029da56afcf4d70dd221b86240d4e6", "type": "eql", "version": 7 } }, "rule_name": "Persistence via WMI Event Subscription", "sha256": "a6dfa186d02163c2d134c0d208d5b58cf4029da56afcf4d70dd221b86240d4e6", "type": "eql", "version": 8 }, "9c260313-c811-4ec8-ab89-8f6530e0246c": { "min_stack_version": "8.2", "previous": { "7.16": { "rule_name": "Hosts File Modified", "sha256": "7781b8fa8e3efcefff36f16dedd64ea47131e917b9a753e61c95f86427a03d06", "type": "eql", "version": 8 }, "8.2": { "rule_name": "Hosts File Modified", "sha256": "4273fb3ba5f1cf4615c6884ae41611939288cb47837b3a7bf3a8e783523e6399", "type": "eql", "version": 11 } }, "rule_name": "Hosts File Modified", "sha256": "4273fb3ba5f1cf4615c6884ae41611939288cb47837b3a7bf3a8e783523e6399", "type": "eql", "version": 11 }, "9ccf3ce0-0057-440a-91f5-870c6ad39093": { "previous": { "8.2": { "rule_name": "Command Shell Activity Started via RunDLL32", "sha256": "781600e7729464fbe081f95645735a242176d063824f68bf455d85d748d47d59", "type": "eql", "version": 7 } }, "rule_name": "Command Shell Activity Started via RunDLL32", "sha256": "781600e7729464fbe081f95645735a242176d063824f68bf455d85d748d47d59", "type": "eql", "version": 8 }, "9d110cb3-5f4b-4c9a-b9f5-53f0a1707ae1": { "previous": { "8.2": { "rule_name": "Trusted Developer Application Usage", "sha256": "01562e377ae2b4b0c607fb9d5776d0d78e0c2452bfd0ec90c08ff9f99499e349", "type": "query", "version": 7 } }, "rule_name": "Trusted Developer Application Usage", "sha256": "01562e377ae2b4b0c607fb9d5776d0d78e0c2452bfd0ec90c08ff9f99499e349", "type": "query", "version": 8 }, "9d110cb3-5f4b-4c9a-b9f5-53f0a1707ae2": { "previous": { "8.2": { "rule_name": "Microsoft Build Engine Started by a Script Process", "sha256": "471cc585d9f8ced69466e297ae4f61b9e58ee967a30e25221d97cacf9aa50d3b", "type": "eql", "version": 13 } }, "rule_name": "Microsoft Build Engine Started by a Script Process", "sha256": "471cc585d9f8ced69466e297ae4f61b9e58ee967a30e25221d97cacf9aa50d3b", "type": "eql", "version": 14 }, "9d110cb3-5f4b-4c9a-b9f5-53f0a1707ae3": { "previous": { "8.2": { "rule_name": "Microsoft Build Engine Started by a System Process", "sha256": "d7934b4d043fcf05073bb18ede97a1177401869f290fa7c7e7db5e66b829d26a", "type": "eql", "version": 12 } }, "rule_name": "Microsoft Build Engine Started by a System Process", "sha256": "d7934b4d043fcf05073bb18ede97a1177401869f290fa7c7e7db5e66b829d26a", "type": "eql", "version": 13 }, "9d110cb3-5f4b-4c9a-b9f5-53f0a1707ae4": { "previous": { "8.2": { "rule_name": "Microsoft Build Engine Using an Alternate Name", "sha256": "06d7b068228fbe3b6b0a3b3a08696d011df932e353d6f91ba85d9212ed3b97da", "type": "eql", "version": 12 } }, "rule_name": "Microsoft Build Engine Using an Alternate Name", "sha256": "06d7b068228fbe3b6b0a3b3a08696d011df932e353d6f91ba85d9212ed3b97da", "type": "eql", "version": 13 }, "9d110cb3-5f4b-4c9a-b9f5-53f0a1707ae5": { "previous": { "8.2": { "rule_name": "Potential Credential Access via Trusted Developer Utility", "sha256": "0a258614c75ea2c43f5609b5f2520185390f78d6fba3a7f288fbc30d539cebd3", "type": "eql", "version": 11 } }, "rule_name": "Potential Credential Access via Trusted Developer Utility", "sha256": "0a258614c75ea2c43f5609b5f2520185390f78d6fba3a7f288fbc30d539cebd3", "type": "eql", "version": 12 }, "9d110cb3-5f4b-4c9a-b9f5-53f0a1707ae6": { "previous": { "8.2": { "rule_name": "Microsoft Build Engine Started an Unusual Process", "sha256": "85caae5e6133b35e3c9c96a9a78614f5e463243a06de92ef85ed835c67741173", "type": "eql", "version": 11 } }, "rule_name": "Microsoft Build Engine Started an Unusual Process", "sha256": "85caae5e6133b35e3c9c96a9a78614f5e463243a06de92ef85ed835c67741173", "type": "eql", "version": 12 }, "9d110cb3-5f4b-4c9a-b9f5-53f0a1707ae9": { "previous": { "8.2": { "rule_name": "Process Injection by the Microsoft Build Engine", "sha256": "bb5a421f93153184544c9cb9f4a30cd1131cf22ec8a8c86860b37ac1a0246faf", "type": "query", "version": 6 } }, "rule_name": "Process Injection by the Microsoft Build Engine", "sha256": "bb5a421f93153184544c9cb9f4a30cd1131cf22ec8a8c86860b37ac1a0246faf", "type": "query", "version": 7 }, "9d19ece6-c20e-481a-90c5-ccca596537de": { "previous": { "8.2": { "rule_name": "LaunchDaemon Creation or Modification and Immediate Loading", "sha256": "231ac00d34eed1edd30b109b9b86023f5bfe75192295b0a6a58f006642e8f1c3", "type": "eql", "version": 6 } }, "rule_name": "LaunchDaemon Creation or Modification and Immediate Loading", "sha256": "231ac00d34eed1edd30b109b9b86023f5bfe75192295b0a6a58f006642e8f1c3", "type": "eql", "version": 7 }, "9d302377-d226-4e12-b54c-1906b5aec4f6": { "min_stack_version": "8.3", "previous": { "7.16": { "rule_name": "Unusual Linux Process Calling the Metadata Service", "sha256": "939fb37f3245d63c1e25753987fcf1b542e5e60e2f84d4dc26226d40be958420", "type": "machine_learning", "version": 3 }, "8.2": { "rule_name": "Unusual Linux Process Calling the Metadata Service", "sha256": "9243ab3c932d9d5e3c214eaa2b7e38d098a5449a40b12f7e500b06c542217a95", "type": "machine_learning", "version": 5 } }, "rule_name": "Unusual Linux Process Calling the Metadata Service", "sha256": "9243ab3c932d9d5e3c214eaa2b7e38d098a5449a40b12f7e500b06c542217a95", "type": "machine_learning", "version": 6 }, "9f1c4ca3-44b5-481d-ba42-32dc215a2769": { "previous": { "8.2": { "rule_name": "Potential Protocol Tunneling via EarthWorm", "sha256": "4db70af1b033320b7eae92f920938b910eede028506cb5b5799c768de3050760", "type": "eql", "version": 4 } }, "rule_name": "Potential Protocol Tunneling via EarthWorm", "sha256": "4db70af1b033320b7eae92f920938b910eede028506cb5b5799c768de3050760", "type": "eql", "version": 5 }, "9f962927-1a4f-45f3-a57b-287f2c7029c1": { "previous": { "8.2": { "rule_name": "Potential Credential Access via DCSync", "sha256": "1de2b45a29f2d8c8e67b319082ac51b835fe7f2122a80d9760652d4c5aa9811c", "type": "eql", "version": 5 } }, "rule_name": "Potential Credential Access via DCSync", "sha256": "1de2b45a29f2d8c8e67b319082ac51b835fe7f2122a80d9760652d4c5aa9811c", "type": "eql", "version": 6 }, "9f9a2a82-93a8-4b1a-8778-1780895626d4": { "previous": { "8.2": { "rule_name": "File Permission Modification in Writable Directory", "sha256": "481ef8a8984ed57c4209a5c825a9d953d88cbaf2ab24415e1aa5d40e9fb25f6a", "type": "query", "version": 7 } }, "rule_name": "File Permission Modification in Writable Directory", "sha256": "481ef8a8984ed57c4209a5c825a9d953d88cbaf2ab24415e1aa5d40e9fb25f6a", "type": "query", "version": 8 }, "a00681e3-9ed6-447c-ab2c-be648821c622": { "previous": { "8.2": { "rule_name": "AWS Access Secret in Secrets Manager", "sha256": "138de80e62be7147988a45f810692ce217f563b1c3af65ba80456ed8a5008d17", "type": "query", "version": 7 } }, "rule_name": "AWS Access Secret in Secrets Manager", "sha256": "138de80e62be7147988a45f810692ce217f563b1c3af65ba80456ed8a5008d17", "type": "query", "version": 8 }, "a10d3d9d-0f65-48f1-8b25-af175e2594f5": { "previous": { "8.2": { "rule_name": "GCP Pub/Sub Topic Creation", "sha256": "ed779b2ab909845631b9060f9683929d4328e5d6adff9fbde0fd678e51558675", "type": "query", "version": 8 } }, "rule_name": "GCP Pub/Sub Topic Creation", "sha256": "ed779b2ab909845631b9060f9683929d4328e5d6adff9fbde0fd678e51558675", "type": "query", "version": 9 }, "a13167f1-eec2-4015-9631-1fee60406dcf": { "previous": { "8.2": { "rule_name": "InstallUtil Process Making Network Connections", "sha256": "7426f36b6f2f9fcce8f77949f922d0de43ba05d1495727ecc12ae825d70ddefa", "type": "eql", "version": 6 } }, "rule_name": "InstallUtil Process Making Network Connections", "sha256": "7426f36b6f2f9fcce8f77949f922d0de43ba05d1495727ecc12ae825d70ddefa", "type": "eql", "version": 7 }, "a1329140-8de3-4445-9f87-908fb6d824f4": { "previous": { "8.2": { "rule_name": "File Deletion via Shred", "sha256": "801e2c323c982dd5593002ab0b55be430898c3a39a55cbbea3763a78e72b4c9a", "type": "query", "version": 8 } }, "rule_name": "File Deletion via Shred", "sha256": "801e2c323c982dd5593002ab0b55be430898c3a39a55cbbea3763a78e72b4c9a", "type": "query", "version": 9 }, "a16612dd-b30e-4d41-86a0-ebe70974ec00": { "previous": { "8.2": { "rule_name": "Potential LSASS Clone Creation via PssCaptureSnapShot", "sha256": "cecd8b378d90ff1e7057c45ccaf832fc9744bc8f3776deb97f2c47f3570688a3", "type": "eql", "version": 4 } }, "rule_name": "Potential LSASS Clone Creation via PssCaptureSnapShot", "sha256": "cecd8b378d90ff1e7057c45ccaf832fc9744bc8f3776deb97f2c47f3570688a3", "type": "eql", "version": 5 }, "a17bcc91-297b-459b-b5ce-bc7460d8f82a": { "previous": { "8.2": { "rule_name": "GCP Virtual Private Cloud Route Deletion", "sha256": "e7fff6d6243de145ee5903dea17c42c8e6503e87b9de5941f5619da8e6e41b1c", "type": "query", "version": 7 } }, "rule_name": "GCP Virtual Private Cloud Route Deletion", "sha256": "e7fff6d6243de145ee5903dea17c42c8e6503e87b9de5941f5619da8e6e41b1c", "type": "query", "version": 8 }, "a1a0375f-22c2-48c0-81a4-7c2d11cc6856": { "previous": { "8.2": { "rule_name": "Potential Reverse Shell Activity via Terminal", "sha256": "2d2d26e1e48f6957ee35a58ab1f10896e7431ccd2fcb5eae32e4a78cc8872927", "type": "eql", "version": 4 } }, "rule_name": "Potential Reverse Shell Activity via Terminal", "sha256": "2d2d26e1e48f6957ee35a58ab1f10896e7431ccd2fcb5eae32e4a78cc8872927", "type": "eql", "version": 5 }, "a22a09c2-2162-4df0-a356-9aacbeb56a04": { "previous": { "8.2": { "rule_name": "DNS-over-HTTPS Enabled via Registry", "sha256": "bb8d136a1a37fe63e46a4b01dad61dfe6aa7a432add04d5ce631c8e76d26aa14", "type": "eql", "version": 5 } }, "rule_name": "DNS-over-HTTPS Enabled via Registry", "sha256": "bb8d136a1a37fe63e46a4b01dad61dfe6aa7a432add04d5ce631c8e76d26aa14", "type": "eql", "version": 6 }, "a3ea12f3-0d4e-4667-8b44-4230c63f3c75": { "previous": { "8.2": { "rule_name": "Execution via local SxS Shared Module", "sha256": "a4ffef52c49a8018f8c68b0bec5c62af6349a374edc32872c7f6b70907732002", "type": "eql", "version": 7 } }, "rule_name": "Execution via local SxS Shared Module", "sha256": "a4ffef52c49a8018f8c68b0bec5c62af6349a374edc32872c7f6b70907732002", "type": "eql", "version": 8 }, "a4c7473a-5cb4-4bc1-9d06-e4a75adbc494": { "min_stack_version": "7.16", "previous": { "8.2": { "rule_name": "Windows Registry File Creation in SMB Share", "sha256": "af1f6b1139386f2e329657d551701f981f64318017ff59baf4c6e63c73e325d9", "type": "eql", "version": 3 } }, "rule_name": "Windows Registry File Creation in SMB Share", "sha256": "af1f6b1139386f2e329657d551701f981f64318017ff59baf4c6e63c73e325d9", "type": "eql", "version": 4 }, "a4ec1382-4557-452b-89ba-e413b22ed4b8": { "previous": { "8.2": { "rule_name": "Network Connection via Mshta", "sha256": "233377abf3f67401dc4208d28639241ca34ed38ba30aa4037251b1274fa5bd17", "type": "eql", "version": 4 } }, "rule_name": "Network Connection via Mshta", "sha256": "233377abf3f67401dc4208d28639241ca34ed38ba30aa4037251b1274fa5bd17", "type": "eql", "version": 5 }, "a60326d7-dca7-4fb7-93eb-1ca03a1febbd": { "previous": { "8.2": { "rule_name": "AWS IAM Assume Role Policy Update", "sha256": "b05d32d0c6917831ae121d26c799bac883c5dbaf6f3f4396dbf212d1262fd729", "type": "query", "version": 7 } }, "rule_name": "AWS IAM Assume Role Policy Update", "sha256": "b05d32d0c6917831ae121d26c799bac883c5dbaf6f3f4396dbf212d1262fd729", "type": "query", "version": 8 }, "a605c51a-73ad-406d-bf3a-f24cc41d5c97": { "previous": { "8.2": { "rule_name": "Azure Active Directory PowerShell Sign-in", "sha256": "1a3022edabbf5b967f93873de55b070b0ad03acfe0e64efce9c54ea1600f131a", "type": "query", "version": 6 } }, "rule_name": "Azure Active Directory PowerShell Sign-in", "sha256": "1a3022edabbf5b967f93873de55b070b0ad03acfe0e64efce9c54ea1600f131a", "type": "query", "version": 7 }, "a624863f-a70d-417f-a7d2-7a404638d47f": { "previous": { "8.2": { "rule_name": "Suspicious MS Office Child Process", "sha256": "8ecbe22c4449148084624b62d3a9d5ac1cee28fe279787b787496d2e4ecbf24c", "type": "eql", "version": 13 } }, "rule_name": "Suspicious MS Office Child Process", "sha256": "8ecbe22c4449148084624b62d3a9d5ac1cee28fe279787b787496d2e4ecbf24c", "type": "eql", "version": 14 }, "a6bf4dd4-743e-4da8-8c03-3ebd753a6c90": { "previous": { "8.2": { "rule_name": "Emond Rules Creation or Modification", "sha256": "ca4522efa05af46f5c2d15dce8afad5428e8f9286f6e069e3ab6de47a4b1d518", "type": "eql", "version": 5 } }, "rule_name": "Emond Rules Creation or Modification", "sha256": "ca4522efa05af46f5c2d15dce8afad5428e8f9286f6e069e3ab6de47a4b1d518", "type": "eql", "version": 6 }, "a7ccae7b-9d2c-44b2-a061-98e5946971fa": { "previous": { "8.2": { "rule_name": "Suspicious PrintSpooler SPL File Created", "sha256": "0c834aa122c687f0bf64b255ca5bb7a8985fdbdacb382132f33c2a85fb9c9623", "type": "eql", "version": 7 } }, "rule_name": "Suspicious PrintSpooler SPL File Created", "sha256": "0c834aa122c687f0bf64b255ca5bb7a8985fdbdacb382132f33c2a85fb9c9623", "type": "eql", "version": 8 }, "a7e7bfa3-088e-4f13-b29e-3986e0e756b8": { "previous": { "8.2": { "rule_name": "Credential Acquisition via Registry Hive Dumping", "sha256": "e88078808ef1cb74258d5e45d00597dac0c94a3f8c88f56648d25f0deb6ebf97", "type": "eql", "version": 8 } }, "rule_name": "Credential Acquisition via Registry Hive Dumping", "sha256": "e88078808ef1cb74258d5e45d00597dac0c94a3f8c88f56648d25f0deb6ebf97", "type": "eql", "version": 9 }, "a87a4e42-1d82-44bd-b0bf-d9b7f91fb89e": { "previous": { "8.2": { "rule_name": "Web Application Suspicious Activity: POST Request Declined", "sha256": "6dc0831da214e7f4439b66554c58008ae27a2bb42833b0eac6cdea43a111c751", "type": "query", "version": 9 } }, "rule_name": "Web Application Suspicious Activity: POST Request Declined", "sha256": "6dc0831da214e7f4439b66554c58008ae27a2bb42833b0eac6cdea43a111c751", "type": "query", "version": 10 }, "a9198571-b135-4a76-b055-e3e5a476fd83": { "previous": { "8.2": { "rule_name": "Hex Encoding/Decoding Activity", "sha256": "b6cfa5bf24a78049ee0f873fe01bcc14ef5116a6adf59b8721abeb11ceca01cf", "type": "query", "version": 7 } }, "rule_name": "Hex Encoding/Decoding Activity", "sha256": "b6cfa5bf24a78049ee0f873fe01bcc14ef5116a6adf59b8721abeb11ceca01cf", "type": "query", "version": 8 }, "a989fa1b-9a11-4dd8-a3e9-f0de9c6eb5f2": { "previous": { "8.2": { "rule_name": "Microsoft 365 Exchange Safe Link Policy Disabled", "sha256": "0fa1301934edafb9577c165beb4d2f30393a0fe81a044fda94de91e7c9eab302", "type": "query", "version": 7 } }, "rule_name": "Microsoft 365 Exchange Safe Link Policy Disabled", "sha256": "0fa1301934edafb9577c165beb4d2f30393a0fe81a044fda94de91e7c9eab302", "type": "query", "version": 8 }, "a99f82f5-8e77-4f8b-b3ce-10c0f6afbc73": { "min_stack_version": "8.0", "previous": { "7.16": { "rule_name": "Google Workspace Password Policy Modified", "sha256": "c6815b312e514dde1e95bfba50fc831bfbdd71cde761c45cff9928ddd5251005", "type": "query", "version": 13 }, "8.2": { "rule_name": "Google Workspace Password Policy Modified", "sha256": "15915846907d1997c423e70f43245b842918bc67bf24503e76a20897f6cdadf0", "type": "query", "version": 15 } }, "rule_name": "Google Workspace Password Policy Modified", "sha256": "15915846907d1997c423e70f43245b842918bc67bf24503e76a20897f6cdadf0", "type": "query", "version": 16 }, "a9b05c3b-b304-4bf9-970d-acdfaef2944c": { "previous": { "8.2": { "rule_name": "Persistence via Hidden Run Key Detected", "sha256": "f0f8cdb52a52a12089e7390724cc44bee3445821c663cc35e2a63f065df204c8", "type": "eql", "version": 7 } }, "rule_name": "Persistence via Hidden Run Key Detected", "sha256": "f0f8cdb52a52a12089e7390724cc44bee3445821c663cc35e2a63f065df204c8", "type": "eql", "version": 8 }, "a9cb3641-ff4b-4cdc-a063-b4b8d02a67c7": { "previous": { "8.2": { "rule_name": "IPSEC NAT Traversal Port Activity", "sha256": "9514b2ab490981c6da52e14c7e684b707df17a30ee85bd55cf7aa8ec16abef5d", "type": "query", "version": 9 } }, "rule_name": "IPSEC NAT Traversal Port Activity", "sha256": "9514b2ab490981c6da52e14c7e684b707df17a30ee85bd55cf7aa8ec16abef5d", "type": "query", "version": 10 }, "aa8007f0-d1df-49ef-8520-407857594827": { "previous": { "8.2": { "rule_name": "GCP IAM Custom Role Creation", "sha256": "294bf4b8d61d9f3874898e9fef36d04a79dd0134a0b5480a4aa51c49613ffe49", "type": "query", "version": 8 } }, "rule_name": "GCP IAM Custom Role Creation", "sha256": "294bf4b8d61d9f3874898e9fef36d04a79dd0134a0b5480a4aa51c49613ffe49", "type": "query", "version": 9 }, "aa895aea-b69c-4411-b110-8d7599634b30": { "previous": { "8.2": { "rule_name": "System Log File Deletion", "sha256": "46917edee13ce1920e16d4abca0860805c2905e081f95a13acdc961ccb31bd70", "type": "eql", "version": 6 } }, "rule_name": "System Log File Deletion", "sha256": "46917edee13ce1920e16d4abca0860805c2905e081f95a13acdc961ccb31bd70", "type": "eql", "version": 7 }, "aa9a274d-6b53-424d-ac5e-cb8ca4251650": { "previous": { "8.2": { "rule_name": "Remotely Started Services via RPC", "sha256": "e0f145d909e164bdef8d6c16029e0ffaaa20e438858c8a6b08cd14b4349a40ac", "type": "eql", "version": 6 } }, "rule_name": "Remotely Started Services via RPC", "sha256": "e0f145d909e164bdef8d6c16029e0ffaaa20e438858c8a6b08cd14b4349a40ac", "type": "eql", "version": 7 }, "ab75c24b-2502-43a0-bf7c-e60e662c811e": { "previous": { "8.2": { "rule_name": "Remote Execution via File Shares", "sha256": "acb9b71ba876ce876744b2d81deec5f975cbc9622840ecf0c9a35e6460932b07", "type": "eql", "version": 3 } }, "rule_name": "Remote Execution via File Shares", "sha256": "acb9b71ba876ce876744b2d81deec5f975cbc9622840ecf0c9a35e6460932b07", "type": "eql", "version": 4 }, "abae61a8-c560-4dbd-acca-1e1438bff36b": { "min_stack_version": "8.3", "previous": { "7.16": { "rule_name": "Unusual Windows Process Calling the Metadata Service", "sha256": "c8bab792d5a0d3d62e1447a105d4446258611cda4cb8a9e4b694a0d514c93728", "type": "machine_learning", "version": 3 }, "8.2": { "rule_name": "Unusual Windows Process Calling the Metadata Service", "sha256": "e3d6764e1b127cbf3554a696701134a380a05acc03ebfd8ca6809ddb38161aeb", "type": "machine_learning", "version": 5 } }, "rule_name": "Unusual Windows Process Calling the Metadata Service", "sha256": "e3d6764e1b127cbf3554a696701134a380a05acc03ebfd8ca6809ddb38161aeb", "type": "machine_learning", "version": 6 }, "ac412404-57a5-476f-858f-4e8fbb4f48d8": { "previous": { "8.2": { "rule_name": "Potential Persistence via Login Hook", "sha256": "21c5c05e597fe02f130b9a0af8bbaa4669e45f5159f1a272e3b79187f5ba3347", "type": "query", "version": 4 } }, "rule_name": "Potential Persistence via Login Hook", "sha256": "21c5c05e597fe02f130b9a0af8bbaa4669e45f5159f1a272e3b79187f5ba3347", "type": "query", "version": 5 }, "ac5012b8-8da8-440b-aaaf-aedafdea2dff": { "previous": { "8.2": { "rule_name": "Suspicious WerFault Child Process", "sha256": "9eb523c7e7f8f2b03de629dcf315e163280f3f23f07a3c8541352802a57c4944", "type": "eql", "version": 7 } }, "rule_name": "Suspicious WerFault Child Process", "sha256": "9eb523c7e7f8f2b03de629dcf315e163280f3f23f07a3c8541352802a57c4944", "type": "eql", "version": 8 }, "ac706eae-d5ec-4b14-b4fd-e8ba8086f0e1": { "previous": { "8.2": { "rule_name": "Unusual AWS Command for a User", "sha256": "8519061439974b93fa66e8854ef592449dfff4cd1a5c9494dd9efb3df8b85b0f", "type": "machine_learning", "version": 9 } }, "rule_name": "Unusual AWS Command for a User", "sha256": "8519061439974b93fa66e8854ef592449dfff4cd1a5c9494dd9efb3df8b85b0f", "type": "machine_learning", "version": 10 }, "ac96ceb8-4399-4191-af1d-4feeac1f1f46": { "previous": { "8.2": { "rule_name": "Potential Invoke-Mimikatz PowerShell Script", "sha256": "fbe7bf8e4c621ac26b7b792325e84d8a4ebaf756e9ac6dd25c21666bde8a4bec", "type": "query", "version": 3 } }, "rule_name": "Potential Invoke-Mimikatz PowerShell Script", "sha256": "fbe7bf8e4c621ac26b7b792325e84d8a4ebaf756e9ac6dd25c21666bde8a4bec", "type": "query", "version": 4 }, "acbc8bb9-2486-49a8-8779-45fb5f9a93ee": { "min_stack_version": "8.0", "previous": { "7.16": { "rule_name": "Google Workspace API Access Granted via Domain-Wide Delegation of Authority", "sha256": "cb726260cbf8b5a0f646d56b06b9be07fc0ff6fb2efbda14ded64114e8e1c32f", "type": "query", "version": 12 }, "8.2": { "rule_name": "Google Workspace API Access Granted via Domain-Wide Delegation of Authority", "sha256": "4c8958b19960c9a1e57732514e1f40504283902ba203aa4188bb92999137aea8", "type": "query", "version": 14 } }, "rule_name": "Google Workspace API Access Granted via Domain-Wide Delegation of Authority", "sha256": "4c8958b19960c9a1e57732514e1f40504283902ba203aa4188bb92999137aea8", "type": "query", "version": 15 }, "acd611f3-2b93-47b3-a0a3-7723bcc46f6d": { "previous": { "8.2": { "rule_name": "Potential Command and Control via Internet Explorer", "sha256": "0bdd548ca60181ea30cf746e0ea8cf8e345ac00870ff3ae9f442c4270de08f1e", "type": "eql", "version": 6 } }, "rule_name": "Potential Command and Control via Internet Explorer", "sha256": "0bdd548ca60181ea30cf746e0ea8cf8e345ac00870ff3ae9f442c4270de08f1e", "type": "eql", "version": 7 }, "ace1e989-a541-44df-93a8-a8b0591b63c0": { "previous": { "8.2": { "rule_name": "Potential SSH Brute Force Detected", "sha256": "6d0cb93c3879e8f129c1c6b3ba4f47ac8247824375ceadcff0e6a9df2e21ef78", "type": "threshold", "version": 3 } }, "rule_name": "Potential SSH Brute Force Detected", "sha256": "6d0cb93c3879e8f129c1c6b3ba4f47ac8247824375ceadcff0e6a9df2e21ef78", "type": "threshold", "version": 4 }, "acf738b5-b5b2-4acc-bad9-1e18ee234f40": { "previous": { "8.2": { "rule_name": "Suspicious Managed Code Hosting Process", "sha256": "2626acff0e30a2fe082b30d09fe7f3a3dbb46c7349f961c427b70d2451ef2cb0", "type": "eql", "version": 6 } }, "rule_name": "Suspicious Managed Code Hosting Process", "sha256": "2626acff0e30a2fe082b30d09fe7f3a3dbb46c7349f961c427b70d2451ef2cb0", "type": "eql", "version": 7 }, "ad0d2742-9a49-11ec-8d6b-acde48001122": { "previous": { "8.2": { "rule_name": "Signed Proxy Execution via MS Work Folders", "sha256": "33398fe6a04ff61536aa6088fb0c111b0633efe03669e855d9ac6df46d5e40c1", "type": "eql", "version": 4 } }, "rule_name": "Signed Proxy Execution via MS Work Folders", "sha256": "33398fe6a04ff61536aa6088fb0c111b0633efe03669e855d9ac6df46d5e40c1", "type": "eql", "version": 5 }, "ad0e5e75-dd89-4875-8d0a-dfdc1828b5f3": { "previous": { "8.2": { "rule_name": "Proxy Port Activity to the Internet", "sha256": "b6ebab2e583cd3bf78d4951f8718ff88b6bbea6dfd4004c586ce00a703ec0a10", "type": "query", "version": 8 } }, "rule_name": "Proxy Port Activity to the Internet", "sha256": "b6ebab2e583cd3bf78d4951f8718ff88b6bbea6dfd4004c586ce00a703ec0a10", "type": "query", "version": 9 }, "ad3f2807-2b3e-47d7-b282-f84acbbe14be": { "min_stack_version": "8.0", "previous": { "7.16": { "rule_name": "Google Workspace Custom Admin Role Created", "sha256": "d1b026666d40c609533cf8728001d959fbf822a6ea704f9471b93c1e1bc79142", "type": "query", "version": 12 }, "8.2": { "rule_name": "Google Workspace Custom Admin Role Created", "sha256": "512538be9948d8ee8a4d339c569d5fbdc37e0701050a67f4b26f08a6e36fdb63", "type": "query", "version": 14 } }, "rule_name": "Google Workspace Custom Admin Role Created", "sha256": "512538be9948d8ee8a4d339c569d5fbdc37e0701050a67f4b26f08a6e36fdb63", "type": "query", "version": 15 }, "ad84d445-b1ce-4377-82d9-7c633f28bf9a": { "previous": { "8.2": { "rule_name": "Suspicious Portable Executable Encoded in Powershell Script", "sha256": "dd87b932c4d7e0c7d1df354bc2dd687d599fda8e96b30a3dfa407ad8b0dc1dfc", "type": "query", "version": 8 } }, "rule_name": "Suspicious Portable Executable Encoded in Powershell Script", "sha256": "dd87b932c4d7e0c7d1df354bc2dd687d599fda8e96b30a3dfa407ad8b0dc1dfc", "type": "query", "version": 9 }, "ad88231f-e2ab-491c-8fc6-64746da26cfe": { "previous": { "8.2": { "rule_name": "Kerberos Cached Credentials Dumping", "sha256": "83259690e546c1cde573408b1c7067adf11aa9bef323738c8af9f6c6414bbad2", "type": "query", "version": 6 } }, "rule_name": "Kerberos Cached Credentials Dumping", "sha256": "83259690e546c1cde573408b1c7067adf11aa9bef323738c8af9f6c6414bbad2", "type": "query", "version": 7 }, "adb961e0-cb74-42a0-af9e-29fc41f88f5f": { "previous": { "8.2": { "rule_name": "Netcat Network Activity", "sha256": "6d5d12b1e6bb04345611fdbe1efd6fcdb2969c24797068c84c66981792df43ae", "type": "eql", "version": 8 } }, "rule_name": "Netcat Network Activity", "sha256": "6d5d12b1e6bb04345611fdbe1efd6fcdb2969c24797068c84c66981792df43ae", "type": "eql", "version": 9 }, "afcce5ad-65de-4ed2-8516-5e093d3ac99a": { "min_stack_version": "7.16", "previous": { "7.16": { "rule_name": "Local Scheduled Task Creation", "sha256": "6bef89b0823728244b1f9f53b3bb4cf878d031d22d66d8f1a9ea4ad014ae3537", "type": "eql", "version": 11 }, "8.2": { "rule_name": "Local Scheduled Task Creation", "sha256": "d412e663786e8446c8b21ca4436eca75890995e2f9ba2af309afc077e1b63ef5", "type": "eql", "version": 13 } }, "rule_name": "Local Scheduled Task Creation", "sha256": "d412e663786e8446c8b21ca4436eca75890995e2f9ba2af309afc077e1b63ef5", "type": "eql", "version": 14 }, "b0046934-486e-462f-9487-0d4cf9e429c6": { "previous": { "8.2": { "rule_name": "Timestomping using Touch Command", "sha256": "badf206b4c63014bf266dbd796d05ac69c44c9ebc85b1f4c82a2fc7f24091ef6", "type": "eql", "version": 7 } }, "rule_name": "Timestomping using Touch Command", "sha256": "badf206b4c63014bf266dbd796d05ac69c44c9ebc85b1f4c82a2fc7f24091ef6", "type": "eql", "version": 8 }, "b00bcd89-000c-4425-b94c-716ef67762f6": { "previous": { "8.2": { "rule_name": "TCC Bypass via Mounted APFS Snapshot Access", "sha256": "a61edea5c1d4544de197bf9e4c4e33c1b04b7efc46be0500c67b97a63b756b5e", "type": "query", "version": 3 } }, "rule_name": "TCC Bypass via Mounted APFS Snapshot Access", "sha256": "a61edea5c1d4544de197bf9e4c4e33c1b04b7efc46be0500c67b97a63b756b5e", "type": "query", "version": 4 }, "b1c14366-f4f8-49a0-bcbb-51d2de8b0bb8": { "previous": { "8.2": { "rule_name": "Potential Persistence via Cron Job", "sha256": "0c030fdda99d067a509f80bd3faff91ee4d8414e5074a9ef6cf7bf5fc97fcbed", "type": "query", "version": 1 } }, "rule_name": "Potential Persistence via Cron Job", "sha256": "0c030fdda99d067a509f80bd3faff91ee4d8414e5074a9ef6cf7bf5fc97fcbed", "type": "query", "version": 2 }, "b240bfb8-26b7-4e5e-924e-218144a3fa71": { "previous": { "8.2": { "rule_name": "Spike in Network Traffic", "sha256": "64955fd74b359a0ab411b632bce3bd9f4520f486fe3a1b7a16e7f4973faf8417", "type": "machine_learning", "version": 3 } }, "rule_name": "Spike in Network Traffic", "sha256": "64955fd74b359a0ab411b632bce3bd9f4520f486fe3a1b7a16e7f4973faf8417", "type": "machine_learning", "version": 4 }, "b25a7df2-120a-4db2-bd3f-3e4b86b24bee": { "previous": { "8.2": { "rule_name": "Remote File Copy via TeamViewer", "sha256": "c67a26e60bcc0d0102f11fb944764f8b6dc3e298161377161f45d7c960e23899", "type": "eql", "version": 9 } }, "rule_name": "Remote File Copy via TeamViewer", "sha256": "c67a26e60bcc0d0102f11fb944764f8b6dc3e298161377161f45d7c960e23899", "type": "eql", "version": 10 }, "b2951150-658f-4a60-832f-a00d1e6c6745": { "previous": { "8.2": { "rule_name": "Microsoft 365 Unusual Volume of File Deletion", "sha256": "af13512c9e80f6b0e0f68518c427f2f85b15391d25ecab9801a969c0dcc8988a", "type": "query", "version": 4 } }, "rule_name": "Microsoft 365 Unusual Volume of File Deletion", "sha256": "af13512c9e80f6b0e0f68518c427f2f85b15391d25ecab9801a969c0dcc8988a", "type": "query", "version": 5 }, "b29ee2be-bf99-446c-ab1a-2dc0183394b8": { "previous": { "8.2": { "rule_name": "Network Connection via Compiled HTML File", "sha256": "5e51d62f56318bd78eb9684d5134fa7783186b89ac95ede02b6fb0a8292cfb09", "type": "eql", "version": 11 } }, "rule_name": "Network Connection via Compiled HTML File", "sha256": "5e51d62f56318bd78eb9684d5134fa7783186b89ac95ede02b6fb0a8292cfb09", "type": "eql", "version": 12 }, "b347b919-665f-4aac-b9e8-68369bf2340c": { "min_stack_version": "8.3", "previous": { "7.16": { "rule_name": "Unusual Linux Username", "sha256": "e25a73b70b17529d8b55a00fffc8d8519098a3374280fad8d7081623383fa6eb", "type": "machine_learning", "version": 7 }, "8.2": { "rule_name": "Unusual Linux Username", "sha256": "912c516b39b6f85f0aec770db42879bb07f167b39dceca96085ea274114e3953", "type": "machine_learning", "version": 9 } }, "rule_name": "Unusual Linux Username", "sha256": "912c516b39b6f85f0aec770db42879bb07f167b39dceca96085ea274114e3953", "type": "machine_learning", "version": 10 }, "b41a13c6-ba45-4bab-a534-df53d0cfed6a": { "previous": { "8.2": { "rule_name": "Suspicious Endpoint Security Parent Process", "sha256": "9bc0223af51d5a440aa3392f44355d22cce419d813ee3df11a0208590ee4bc2f", "type": "eql", "version": 7 } }, "rule_name": "Suspicious Endpoint Security Parent Process", "sha256": "9bc0223af51d5a440aa3392f44355d22cce419d813ee3df11a0208590ee4bc2f", "type": "eql", "version": 8 }, "b4449455-f986-4b5a-82ed-e36b129331f7": { "previous": { "8.2": { "rule_name": "Potential Persistence via Atom Init Script Modification", "sha256": "692eae78c3fbf7ad8a3d205cddb0b73107ad787cee734dae5530b050d0cff6a6", "type": "query", "version": 3 } }, "rule_name": "Potential Persistence via Atom Init Script Modification", "sha256": "692eae78c3fbf7ad8a3d205cddb0b73107ad787cee734dae5530b050d0cff6a6", "type": "query", "version": 4 }, "b45ab1d2-712f-4f01-a751-df3826969807": { "previous": { "8.2": { "rule_name": "AWS STS GetSessionToken Abuse", "sha256": "06b29e5ffac1476ee93e6bf42ca20f236d0db705ca158a59a35d234d824b4f03", "type": "query", "version": 3 } }, "rule_name": "AWS STS GetSessionToken Abuse", "sha256": "06b29e5ffac1476ee93e6bf42ca20f236d0db705ca158a59a35d234d824b4f03", "type": "query", "version": 4 }, "b4bb1440-0fcb-4ed1-87e5-b06d58efc5e9": { "previous": { "8.2": { "rule_name": "Attempt to Delete an Okta Policy", "sha256": "edcf5e80215b2447d4f0112ee839c452f063b302f7f8226074947b172e2323f5", "type": "query", "version": 8 } }, "rule_name": "Attempt to Delete an Okta Policy", "sha256": "edcf5e80215b2447d4f0112ee839c452f063b302f7f8226074947b172e2323f5", "type": "query", "version": 9 }, "b5877334-677f-4fb9-86d5-a9721274223b": { "previous": { "8.2": { "rule_name": "Clearing Windows Console History", "sha256": "fee88e407b3008427032dad110fde2345d4a282f54093f7280991a20befeb34c", "type": "eql", "version": 5 } }, "rule_name": "Clearing Windows Console History", "sha256": "fee88e407b3008427032dad110fde2345d4a282f54093f7280991a20befeb34c", "type": "eql", "version": 6 }, "b5ea4bfe-a1b2-421f-9d47-22a75a6f2921": { "previous": { "8.2": { "rule_name": "Volume Shadow Copy Deleted or Resized via VssAdmin", "sha256": "f9e7c547669253937f5c4f6d8f1a0ef17e3d2a2dfd660f265b8be56298d73b9d", "type": "eql", "version": 15 } }, "rule_name": "Volume Shadow Copy Deleted or Resized via VssAdmin", "sha256": "f9e7c547669253937f5c4f6d8f1a0ef17e3d2a2dfd660f265b8be56298d73b9d", "type": "eql", "version": 16 }, "b627cd12-dac4-11ec-9582-f661ea17fbcd": { "previous": { "8.2": { "rule_name": "Elastic Agent Service Terminated", "sha256": "800fc02710ae890dabd90ed7c6da2053a68b3843e6bc75686df22995db6c2838", "type": "eql", "version": 3 } }, "rule_name": "Elastic Agent Service Terminated", "sha256": "800fc02710ae890dabd90ed7c6da2053a68b3843e6bc75686df22995db6c2838", "type": "eql", "version": 4 }, "b64b183e-1a76-422d-9179-7b389513e74d": { "previous": { "8.2": { "rule_name": "Windows Script Interpreter Executing Process via WMI", "sha256": "80c7df7cc840129e3c4fb2dee6e31acb20b0c706d30a52b16562358420b14edd", "type": "eql", "version": 4 } }, "rule_name": "Windows Script Interpreter Executing Process via WMI", "sha256": "80c7df7cc840129e3c4fb2dee6e31acb20b0c706d30a52b16562358420b14edd", "type": "eql", "version": 5 }, "b6dce542-2b75-4ffb-b7d6-38787298ba9d": { "previous": { "8.2": { "rule_name": "Azure Event Hub Authorization Rule Created or Updated", "sha256": "04094094355895232041796a086d7abb0aa1ae7d5e22c101de47ae846055575c", "type": "query", "version": 7 } }, "rule_name": "Azure Event Hub Authorization Rule Created or Updated", "sha256": "04094094355895232041796a086d7abb0aa1ae7d5e22c101de47ae846055575c", "type": "query", "version": 8 }, "b719a170-3bdb-4141-b0e3-13e3cf627bfe": { "previous": { "8.2": { "rule_name": "Attempt to Deactivate an Okta Policy", "sha256": "ff4ea8914e56922c8a23773fda12c35216ec87250d9be3d3d4c720c9d3a51ed3", "type": "query", "version": 8 } }, "rule_name": "Attempt to Deactivate an Okta Policy", "sha256": "ff4ea8914e56922c8a23773fda12c35216ec87250d9be3d3d4c720c9d3a51ed3", "type": "query", "version": 9 }, "b8075894-0b62-46e5-977c-31275da34419": { "previous": { "8.2": { "rule_name": "Administrator Privileges Assigned to an Okta Group", "sha256": "9bb3a9964ec4649701ded0b07c680d5e1eeb51c19f098c11d5924fcf4e72612c", "type": "query", "version": 8 } }, "rule_name": "Administrator Privileges Assigned to an Okta Group", "sha256": "9bb3a9964ec4649701ded0b07c680d5e1eeb51c19f098c11d5924fcf4e72612c", "type": "query", "version": 9 }, "b83a7e96-2eb3-4edf-8346-427b6858d3bd": { "previous": { "8.2": { "rule_name": "Creation or Modification of Domain Backup DPAPI private key", "sha256": "434c624c1d4ddbd26abf31b01797279cd3eb29a00e4e07455d3188ac512fe7d7", "type": "eql", "version": 10 } }, "rule_name": "Creation or Modification of Domain Backup DPAPI private key", "sha256": "434c624c1d4ddbd26abf31b01797279cd3eb29a00e4e07455d3188ac512fe7d7", "type": "eql", "version": 11 }, "b86afe07-0d98-4738-b15d-8d7465f95ff5": { "previous": { "8.2": { "rule_name": "Network Connection via MsXsl", "sha256": "5dae170229a82ef184cbabf4ac2e3f63eb63df1d14b66d0fee6a3e1b5b9d8d9a", "type": "eql", "version": 8 } }, "rule_name": "Network Connection via MsXsl", "sha256": "5dae170229a82ef184cbabf4ac2e3f63eb63df1d14b66d0fee6a3e1b5b9d8d9a", "type": "eql", "version": 9 }, "b90cdde7-7e0d-4359-8bf0-2c112ce2008a": { "previous": { "8.2": { "rule_name": "UAC Bypass Attempt with IEditionUpgradeManager Elevated COM Interface", "sha256": "8be0bdf2c5c59327a0d79bead790436d1ee2860046be852b30b54622a7850e7d", "type": "eql", "version": 7 } }, "rule_name": "UAC Bypass Attempt with IEditionUpgradeManager Elevated COM Interface", "sha256": "8be0bdf2c5c59327a0d79bead790436d1ee2860046be852b30b54622a7850e7d", "type": "eql", "version": 8 }, "b910f25a-2d44-47f2-a873-aabdc0d355e6": { "previous": { "8.2": { "rule_name": "Chkconfig Service Add", "sha256": "ca96cc0f0a7a161daeb6c6b75a8e335cb3206cf32a6d79b50f6965c9ead69e3a", "type": "eql", "version": 2 } }, "rule_name": "Chkconfig Service Add", "sha256": "ca96cc0f0a7a161daeb6c6b75a8e335cb3206cf32a6d79b50f6965c9ead69e3a", "type": "eql", "version": 3 }, "b9554892-5e0e-424b-83a0-5aef95aa43bf": { "previous": { "8.2": { "rule_name": "Group Policy Abuse for Privilege Addition", "sha256": "cee1d015a929b92ca29c739cd0dde4b5840b9274d7a7f9a49dfb18eee6ce508b", "type": "query", "version": 6 } }, "rule_name": "Group Policy Abuse for Privilege Addition", "sha256": "cee1d015a929b92ca29c739cd0dde4b5840b9274d7a7f9a49dfb18eee6ce508b", "type": "query", "version": 7 }, "b9666521-4742-49ce-9ddc-b8e84c35acae": { "min_stack_version": "7.16", "previous": { "8.2": { "rule_name": "Creation of Hidden Files and Directories via CommandLine", "sha256": "e81ded661259ed8eb587cffafee0ca8b36aea8bc59fbf2efc795076a88e437ed", "type": "eql", "version": 10 } }, "rule_name": "Creation of Hidden Files and Directories via CommandLine", "sha256": "e81ded661259ed8eb587cffafee0ca8b36aea8bc59fbf2efc795076a88e437ed", "type": "eql", "version": 11 }, "b9960fef-82c6-4816-befa-44745030e917": { "previous": { "8.2": { "rule_name": "SolarWinds Process Disabling Services via Registry", "sha256": "9c46b2102e5e8fe2f5628ea58b100c07e32fd347df708a90b4a6735485090aaa", "type": "eql", "version": 7 } }, "rule_name": "SolarWinds Process Disabling Services via Registry", "sha256": "9c46b2102e5e8fe2f5628ea58b100c07e32fd347df708a90b4a6735485090aaa", "type": "eql", "version": 8 }, "ba342eb2-583c-439f-b04d-1fdd7c1417cc": { "min_stack_version": "8.3", "previous": { "7.16": { "rule_name": "Unusual Windows Network Activity", "sha256": "e902d7fb397e08212a5197fa5dce5708b07375ee8b7ccc2719b0633e9b8c27e3", "type": "machine_learning", "version": 7 }, "8.2": { "rule_name": "Unusual Windows Network Activity", "sha256": "7b02abc336d84242dd450c5912423eaaed3a749e68d8a3f890cfdc80079a6226", "type": "machine_learning", "version": 8 } }, "rule_name": "Unusual Windows Network Activity", "sha256": "7b02abc336d84242dd450c5912423eaaed3a749e68d8a3f890cfdc80079a6226", "type": "machine_learning", "version": 9 }, "baa5d22c-5e1c-4f33-bfc9-efa73bb53022": { "previous": { "8.2": { "rule_name": "Suspicious Image Load (taskschd.dll) from MS Office", "sha256": "22650f8dea38ba6c49c4931a71d9ea6e2cc1a2276b28ae2100f551e23bd801dc", "type": "eql", "version": 6 } }, "rule_name": "Suspicious Image Load (taskschd.dll) from MS Office", "sha256": "22650f8dea38ba6c49c4931a71d9ea6e2cc1a2276b28ae2100f551e23bd801dc", "type": "eql", "version": 7 }, "bb4fe8d2-7ae2-475c-8b5d-55b449e4264f": { "previous": { "8.2": { "rule_name": "Azure Resource Group Deletion", "sha256": "94b90ae01599bc94e246813b4a812f598fcc7446ba02ac19c80c7180d8e9acbe", "type": "query", "version": 7 } }, "rule_name": "Azure Resource Group Deletion", "sha256": "94b90ae01599bc94e246813b4a812f598fcc7446ba02ac19c80c7180d8e9acbe", "type": "query", "version": 8 }, "bb9b13b2-1700-48a8-a750-b43b0a72ab69": { "previous": { "8.2": { "rule_name": "AWS EC2 Encryption Disabled", "sha256": "205094be6c82e2874f4820a6e6e5c0316ee64f27181cc21b5e579ff7070e325a", "type": "query", "version": 8 } }, "rule_name": "AWS EC2 Encryption Disabled", "sha256": "205094be6c82e2874f4820a6e6e5c0316ee64f27181cc21b5e579ff7070e325a", "type": "query", "version": 9 }, "bba1b212-b85c-41c6-9b28-be0e5cdfc9b1": { "previous": { "8.2": { "rule_name": "OneDrive Malware File Upload", "sha256": "7dadd14a66fd84409d24d959abfe601368897ba2639a12d15fb7ae75727de751", "type": "query", "version": 3 } }, "rule_name": "OneDrive Malware File Upload", "sha256": "7dadd14a66fd84409d24d959abfe601368897ba2639a12d15fb7ae75727de751", "type": "query", "version": 4 }, "bbd1a775-8267-41fa-9232-20e5582596ac": { "previous": { "8.2": { "rule_name": "Microsoft 365 Teams Custom Application Interaction Allowed", "sha256": "0be4efbb6ae7b8d50f0cdb4977cde0d5a8bb349d00e13b1e5a79c9f3246fc72e", "type": "query", "version": 7 } }, "rule_name": "Microsoft 365 Teams Custom Application Interaction Allowed", "sha256": "0be4efbb6ae7b8d50f0cdb4977cde0d5a8bb349d00e13b1e5a79c9f3246fc72e", "type": "query", "version": 8 }, "bc0c6f0d-dab0-47a3-b135-0925f0a333bc": { "previous": { "8.2": { "rule_name": "AWS Root Login Without MFA", "sha256": "52eefd271dbc4bce341f66a15db880a0f9cd7ec4f1c8a91314507c25b010ee5e", "type": "query", "version": 7 } }, "rule_name": "AWS Root Login Without MFA", "sha256": "52eefd271dbc4bce341f66a15db880a0f9cd7ec4f1c8a91314507c25b010ee5e", "type": "query", "version": 8 }, "bc0f2d83-32b8-4ae2-b0e6-6a45772e9331": { "previous": { "8.2": { "rule_name": "GCP Storage Bucket Deletion", "sha256": "93446b0f506e848825ea5e62113b964e8bdb512e73bfe0835a17d08053ee6582", "type": "query", "version": 8 } }, "rule_name": "GCP Storage Bucket Deletion", "sha256": "93446b0f506e848825ea5e62113b964e8bdb512e73bfe0835a17d08053ee6582", "type": "query", "version": 9 }, "bc1eeacf-2972-434f-b782-3a532b100d67": { "previous": { "8.2": { "rule_name": "Attempt to Install Root Certificate", "sha256": "30586f2965e6afb9eef7a00ff280fb9900fe5d7c9f16499c2da76a6bd567e205", "type": "query", "version": 3 } }, "rule_name": "Attempt to Install Root Certificate", "sha256": "30586f2965e6afb9eef7a00ff280fb9900fe5d7c9f16499c2da76a6bd567e205", "type": "query", "version": 4 }, "bc48bba7-4a23-4232-b551-eca3ca1e3f20": { "previous": { "8.2": { "rule_name": "Azure Conditional Access Policy Modified", "sha256": "bb567cd5db3fc59b967cc96e80182e5299a5d791f77e531f72d79b3c02a477f8", "type": "query", "version": 8 } }, "rule_name": "Azure Conditional Access Policy Modified", "sha256": "bb567cd5db3fc59b967cc96e80182e5299a5d791f77e531f72d79b3c02a477f8", "type": "query", "version": 9 }, "bca7d28e-4a48-47b1-adb7-5074310e9a61": { "previous": { "8.2": { "rule_name": "GCP Service Account Disabled", "sha256": "344e1bfa420757d88f390edabb32aef5abff288cc9d99b293bdcfa0016267a34", "type": "query", "version": 7 } }, "rule_name": "GCP Service Account Disabled", "sha256": "344e1bfa420757d88f390edabb32aef5abff288cc9d99b293bdcfa0016267a34", "type": "query", "version": 8 }, "bd2c86a0-8b61-4457-ab38-96943984e889": { "previous": { "8.2": { "rule_name": "PowerShell Keylogging Script", "sha256": "0005eed7151bc66fb0cd04e87aaa3bf667dcfa1611ada4454766beb6ba00acbe", "type": "query", "version": 7 } }, "rule_name": "PowerShell Keylogging Script", "sha256": "0005eed7151bc66fb0cd04e87aaa3bf667dcfa1611ada4454766beb6ba00acbe", "type": "query", "version": 8 }, "bd7eefee-f671-494e-98df-f01daf9e5f17": { "previous": { "8.2": { "rule_name": "Suspicious Print Spooler Point and Print DLL", "sha256": "6bb8e576cae990d70ff8b16a6c8e408766a8aeda758c3f4de21bffb4c92e6f89", "type": "eql", "version": 4 } }, "rule_name": "Suspicious Print Spooler Point and Print DLL", "sha256": "6bb8e576cae990d70ff8b16a6c8e408766a8aeda758c3f4de21bffb4c92e6f89", "type": "eql", "version": 5 }, "bdcf646b-08d4-492c-870a-6c04e3700034": { "previous": { "8.2": { "rule_name": "Potential Privileged Escalation via SamAccountName Spoofing", "sha256": "c0e40bfbb0993658ffc65f2aa928ddf04bd3bb4cab36d3eb5692295c546829d2", "type": "eql", "version": 4 } }, "rule_name": "Potential Privileged Escalation via SamAccountName Spoofing", "sha256": "c0e40bfbb0993658ffc65f2aa928ddf04bd3bb4cab36d3eb5692295c546829d2", "type": "eql", "version": 5 }, "be8afaed-4bcd-4e0a-b5f9-5562003dde81": { "previous": { "8.2": { "rule_name": "Searching for Saved Credentials via VaultCmd", "sha256": "b903b68f801e8ea76737f8da58506d0a3cf41a8c58e853a307b0b8dc46a8c08d", "type": "eql", "version": 6 } }, "rule_name": "Searching for Saved Credentials via VaultCmd", "sha256": "b903b68f801e8ea76737f8da58506d0a3cf41a8c58e853a307b0b8dc46a8c08d", "type": "eql", "version": 7 }, "bf1073bf-ce26-4607-b405-ba1ed8e9e204": { "previous": { "8.2": { "rule_name": "AWS RDS Snapshot Restored", "sha256": "96e64f19d7922c69fb0c0dde9c25bdba6c32a2760f8d29c651a310cb1c8a7acf", "type": "query", "version": 5 } }, "rule_name": "AWS RDS Snapshot Restored", "sha256": "96e64f19d7922c69fb0c0dde9c25bdba6c32a2760f8d29c651a310cb1c8a7acf", "type": "query", "version": 6 }, "bfeaf89b-a2a7-48a3-817f-e41829dc61ee": { "previous": { "8.2": { "rule_name": "Suspicious DLL Loaded for Persistence or Privilege Escalation", "sha256": "71dd67b27fa1543084d78895e408c1553aae3c0e79e3450ccd0afb37828d1346", "type": "eql", "version": 6 } }, "rule_name": "Suspicious DLL Loaded for Persistence or Privilege Escalation", "sha256": "71dd67b27fa1543084d78895e408c1553aae3c0e79e3450ccd0afb37828d1346", "type": "eql", "version": 7 }, "c02c8b9f-5e1d-463c-a1b0-04edcdfe1a3d": { "previous": { "8.2": { "rule_name": "Potential Privacy Control Bypass via Localhost Secure Copy", "sha256": "479de12601bd58360df092a9a63fb5818b7e967d9142f819e26ad491b235b677", "type": "eql", "version": 5 } }, "rule_name": "Potential Privacy Control Bypass via Localhost Secure Copy", "sha256": "479de12601bd58360df092a9a63fb5818b7e967d9142f819e26ad491b235b677", "type": "eql", "version": 6 }, "c0429aa8-9974-42da-bfb6-53a0a515a145": { "previous": { "8.2": { "rule_name": "Creation or Modification of a new GPO Scheduled Task or Service", "sha256": "e9831ca3b5becdb0e68783790b36ff8efc3a0e898056a27f995b7d83053ba624", "type": "eql", "version": 9 } }, "rule_name": "Creation or Modification of a new GPO Scheduled Task or Service", "sha256": "e9831ca3b5becdb0e68783790b36ff8efc3a0e898056a27f995b7d83053ba624", "type": "eql", "version": 10 }, "c0be5f31-e180-48ed-aa08-96b36899d48f": { "previous": { "8.2": { "rule_name": "Credential Manipulation - Detected - Elastic Endgame", "sha256": "8d36cb1bb98e55bb4e2ed2cf06aac2db1e1f3a86b9c99dcc91ac589074a780b1", "type": "query", "version": 9 } }, "rule_name": "Credential Manipulation - Detected - Elastic Endgame", "sha256": "8d36cb1bb98e55bb4e2ed2cf06aac2db1e1f3a86b9c99dcc91ac589074a780b1", "type": "query", "version": 10 }, "c1812764-0788-470f-8e74-eb4a14d47573": { "previous": { "8.2": { "rule_name": "AWS EC2 Full Network Packet Capture Detected", "sha256": "1c8b9b64822df7751436f08db4f45efe622e20df94d6b8ebee251c2c88bd713f", "type": "query", "version": 4 } }, "rule_name": "AWS EC2 Full Network Packet Capture Detected", "sha256": "1c8b9b64822df7751436f08db4f45efe622e20df94d6b8ebee251c2c88bd713f", "type": "query", "version": 5 }, "c25e9c87-95e1-4368-bfab-9fd34cf867ec": { "previous": { "8.2": { "rule_name": "Microsoft IIS Connection Strings Decryption", "sha256": "e9606bdaf8cc52bc03c0de35b84bc98c73553ac3a8915da58ec88020a386f392", "type": "eql", "version": 7 } }, "rule_name": "Microsoft IIS Connection Strings Decryption", "sha256": "e9606bdaf8cc52bc03c0de35b84bc98c73553ac3a8915da58ec88020a386f392", "type": "eql", "version": 8 }, "c28c4d8c-f014-40ef-88b6-79a1d67cd499": { "min_stack_version": "8.3", "previous": { "7.16": { "rule_name": "Unusual Linux Network Connection Discovery", "sha256": "711dd36c9d0eca5be33613044ab9de38bdc703b51e619c57abd6125385dc7bb0", "type": "machine_learning", "version": 2 }, "8.2": { "rule_name": "Unusual Linux Network Connection Discovery", "sha256": "e124e0a0c8431f7cb9d2620441bbba0cd3b662770721332fa1e52b056c6c3dc2", "type": "machine_learning", "version": 3 } }, "rule_name": "Unusual Linux Network Connection Discovery", "sha256": "e124e0a0c8431f7cb9d2620441bbba0cd3b662770721332fa1e52b056c6c3dc2", "type": "machine_learning", "version": 4 }, "c292fa52-4115-408a-b897-e14f684b3cb7": { "previous": { "8.2": { "rule_name": "Persistence via Folder Action Script", "sha256": "cc52212bbc415884de6740f1eca26d7a912a4e10fcecd39f4603ba81bd669106", "type": "eql", "version": 7 } }, "rule_name": "Persistence via Folder Action Script", "sha256": "cc52212bbc415884de6740f1eca26d7a912a4e10fcecd39f4603ba81bd669106", "type": "eql", "version": 8 }, "c2d90150-0133-451c-a783-533e736c12d7": { "previous": { "8.2": { "rule_name": "Mshta Making Network Connections", "sha256": "02a38096463365b4f58f68c976bff9c94bb1b6304c1b98cc3c34a02d9bcf51f2", "type": "eql", "version": 7 } }, "rule_name": "Mshta Making Network Connections", "sha256": "02a38096463365b4f58f68c976bff9c94bb1b6304c1b98cc3c34a02d9bcf51f2", "type": "eql", "version": 8 }, "c3167e1b-f73c-41be-b60b-87f4df707fe3": { "previous": { "8.2": { "rule_name": "Permission Theft - Detected - Elastic Endgame", "sha256": "8c71d85fb8e7ca57ddb9f334300043978dd5976f7efc1d0ad06d561ea9cad9b9", "type": "query", "version": 9 } }, "rule_name": "Permission Theft - Detected - Elastic Endgame", "sha256": "8c71d85fb8e7ca57ddb9f334300043978dd5976f7efc1d0ad06d561ea9cad9b9", "type": "query", "version": 10 }, "c3b915e0-22f3-4bf7-991d-b643513c722f": { "previous": { "8.2": { "rule_name": "Persistence via BITS Job Notify Cmdline", "sha256": "b007236deb7a9347f897ceb0161f1726c57aba660f3fce96e08b686e0076aa59", "type": "eql", "version": 4 } }, "rule_name": "Persistence via BITS Job Notify Cmdline", "sha256": "b007236deb7a9347f897ceb0161f1726c57aba660f3fce96e08b686e0076aa59", "type": "eql", "version": 5 }, "c3f5e1d8-910e-43b4-8d44-d748e498ca86": { "previous": { "8.2": { "rule_name": "Potential JAVA/JNDI Exploitation Attempt", "sha256": "0e20c1d9c7505bac6f968e50499da0d632e80699fa86b8d5f80681f960853bbe", "type": "eql", "version": 3 } }, "rule_name": "Potential JAVA/JNDI Exploitation Attempt", "sha256": "0e20c1d9c7505bac6f968e50499da0d632e80699fa86b8d5f80681f960853bbe", "type": "eql", "version": 4 }, "c4210e1c-64f2-4f48-b67e-b5a8ffe3aa14": { "previous": { "8.2": { "rule_name": "Mounting Hidden or WebDav Remote Shares", "sha256": "408047e2c0358ccefc0fb4c232b448d3bc7302a380ee5bc24002b68769722707", "type": "eql", "version": 6 } }, "rule_name": "Mounting Hidden or WebDav Remote Shares", "sha256": "408047e2c0358ccefc0fb4c232b448d3bc7302a380ee5bc24002b68769722707", "type": "eql", "version": 7 }, "c4818812-d44f-47be-aaef-4cfb2f9cc799": { "previous": { "8.2": { "rule_name": "Suspicious Print Spooler File Deletion", "sha256": "4386351a99165eae57ee5fbb8dd05ebf0218c507d0b67817cc082f245026cf98", "type": "eql", "version": 5 } }, "rule_name": "Suspicious Print Spooler File Deletion", "sha256": "4386351a99165eae57ee5fbb8dd05ebf0218c507d0b67817cc082f245026cf98", "type": "eql", "version": 6 }, "c57f8579-e2a5-4804-847f-f2732edc5156": { "previous": { "8.2": { "rule_name": "Potential Remote Desktop Shadowing Activity", "sha256": "568ed65a981e9bbc685870951ed6d77baa80bf363018c8a2b861ecd9e809ead5", "type": "eql", "version": 4 } }, "rule_name": "Potential Remote Desktop Shadowing Activity", "sha256": "568ed65a981e9bbc685870951ed6d77baa80bf363018c8a2b861ecd9e809ead5", "type": "eql", "version": 5 }, "c58c3081-2e1d-4497-8491-e73a45d1a6d6": { "previous": { "8.2": { "rule_name": "GCP Virtual Private Cloud Network Deletion", "sha256": "7a972f51501b28f2921345f60267ef6856109de6b98cc9bdd0fcb8e27e44d021", "type": "query", "version": 7 } }, "rule_name": "GCP Virtual Private Cloud Network Deletion", "sha256": "7a972f51501b28f2921345f60267ef6856109de6b98cc9bdd0fcb8e27e44d021", "type": "query", "version": 8 }, "c5c9f591-d111-4cf8-baec-c26a39bc31ef": { "previous": { "8.2": { "rule_name": "Potential Credential Access via Renamed COM+ Services DLL", "sha256": "5693c66099391127c7952f8bb15cd31dbd3a0310486de295ae5fc0448a2c263c", "type": "eql", "version": 5 } }, "rule_name": "Potential Credential Access via Renamed COM+ Services DLL", "sha256": "5693c66099391127c7952f8bb15cd31dbd3a0310486de295ae5fc0448a2c263c", "type": "eql", "version": 6 }, "c5ce48a6-7f57-4ee8-9313-3d0024caee10": { "previous": { "8.2": { "rule_name": "Installation of Custom Shim Databases", "sha256": "48eaabd808b03d026b149864c92b9079d3d2059007b3725b0db4546bc065eb03", "type": "eql", "version": 4 } }, "rule_name": "Installation of Custom Shim Databases", "sha256": "48eaabd808b03d026b149864c92b9079d3d2059007b3725b0db4546bc065eb03", "type": "eql", "version": 5 }, "c5dc3223-13a2-44a2-946c-e9dc0aa0449c": { "previous": { "8.2": { "rule_name": "Microsoft Build Engine Started by an Office Application", "sha256": "367ef757eb933b6b4b09159845c8fedc97eec4dc8844727b456fc9035519c420", "type": "eql", "version": 12 } }, "rule_name": "Microsoft Build Engine Started by an Office Application", "sha256": "367ef757eb933b6b4b09159845c8fedc97eec4dc8844727b456fc9035519c420", "type": "eql", "version": 13 }, "c5f81243-56e0-47f9-b5bb-55a5ed89ba57": { "min_stack_version": "7.16", "previous": { "8.2": { "rule_name": "CyberArk Privileged Access Security Recommended Monitor", "sha256": "1ee3e28fb47b89be84bd890417f1d0f1b24cff664df7064d72ab91a8142cda07", "type": "query", "version": 3 } }, "rule_name": "CyberArk Privileged Access Security Recommended Monitor", "sha256": "1ee3e28fb47b89be84bd890417f1d0f1b24cff664df7064d72ab91a8142cda07", "type": "query", "version": 4 }, "c6453e73-90eb-4fe7-a98c-cde7bbfc504a": { "previous": { "8.2": { "rule_name": "Remote File Download via MpCmdRun", "sha256": "78c9c95071c452b4bd48d9a8d46a37b55762ba51da228e5629e93a0ceb754198", "type": "eql", "version": 9 } }, "rule_name": "Remote File Download via MpCmdRun", "sha256": "78c9c95071c452b4bd48d9a8d46a37b55762ba51da228e5629e93a0ceb754198", "type": "eql", "version": 10 }, "c6474c34-4953-447a-903e-9fcb7b6661aa": { "previous": { "8.2": { "rule_name": "IRC (Internet Relay Chat) Protocol Activity to the Internet", "sha256": "dba60ab7ccce534b20532548b6aff6b799d54bacbacf3328fd250e65420a998c", "type": "query", "version": 8 } }, "rule_name": "IRC (Internet Relay Chat) Protocol Activity to the Internet", "sha256": "dba60ab7ccce534b20532548b6aff6b799d54bacbacf3328fd250e65420a998c", "type": "query", "version": 9 }, "c749e367-a069-4a73-b1f2-43a3798153ad": { "previous": { "8.2": { "rule_name": "Attempt to Delete an Okta Network Zone", "sha256": "f2218dbd58d500ba58b0845e860e823940b702e3d10370caee0def86e1d20018", "type": "query", "version": 6 } }, "rule_name": "Attempt to Delete an Okta Network Zone", "sha256": "f2218dbd58d500ba58b0845e860e823940b702e3d10370caee0def86e1d20018", "type": "query", "version": 7 }, "c74fd275-ab2c-4d49-8890-e2943fa65c09": { "previous": { "8.2": { "rule_name": "Attempt to Modify an Okta Application", "sha256": "133f87faebe15890cf4697181eb3ff38eabbab663d367540b89039f1992489aa", "type": "query", "version": 6 } }, "rule_name": "Attempt to Modify an Okta Application", "sha256": "133f87faebe15890cf4697181eb3ff38eabbab663d367540b89039f1992489aa", "type": "query", "version": 7 }, "c7894234-7814-44c2-92a9-f7d851ea246a": { "previous": { "8.2": { "rule_name": "Unusual Network Connection via DllHost", "sha256": "404c23543760a2e14f04d2b192de7c50520d60a6f08226353de75af3a01c41ab", "type": "eql", "version": 4 } }, "rule_name": "Unusual Network Connection via DllHost", "sha256": "404c23543760a2e14f04d2b192de7c50520d60a6f08226353de75af3a01c41ab", "type": "eql", "version": 5 }, "c7908cac-337a-4f38-b50d-5eeb78bdb531": { "min_stack_version": "8.2", "previous": { "8.2": { "rule_name": "Kubernetes Privileged Pod Created", "sha256": "490d52d841dfa80ed829303bdf0106213c05928b84203e29adca6b9ee93ffc98", "type": "query", "version": 2 } }, "rule_name": "Kubernetes Privileged Pod Created", "sha256": "490d52d841dfa80ed829303bdf0106213c05928b84203e29adca6b9ee93ffc98", "type": "query", "version": 2 }, "c7ce36c0-32ff-4f9a-bfc2-dcb242bf99f9": { "previous": { "8.2": { "rule_name": "Unusual File Modification by dns.exe", "sha256": "f2595eda244fd4babde332e6b734f668a97ab1f7e128e4753c8ee5c8d3c56904", "type": "eql", "version": 8 } }, "rule_name": "Unusual File Modification by dns.exe", "sha256": "f2595eda244fd4babde332e6b734f668a97ab1f7e128e4753c8ee5c8d3c56904", "type": "eql", "version": 9 }, "c7db5533-ca2a-41f6-a8b0-ee98abe0f573": { "previous": { "8.2": { "rule_name": "Spike in Network Traffic To a Country", "sha256": "2e908b7e338192c06491e1fe991b6eae62a1d164a4bc80084ea828f31430f38f", "type": "machine_learning", "version": 2 } }, "rule_name": "Spike in Network Traffic To a Country", "sha256": "2e908b7e338192c06491e1fe991b6eae62a1d164a4bc80084ea828f31430f38f", "type": "machine_learning", "version": 3 }, "c81cefcb-82b9-4408-a533-3c3df549e62d": { "previous": { "8.2": { "rule_name": "Persistence via Docker Shortcut Modification", "sha256": "de64b4f06f8c8e2d5367a29a6312350edbc39cebe09b3f9c1063e947e4140d03", "type": "query", "version": 3 } }, "rule_name": "Persistence via Docker Shortcut Modification", "sha256": "de64b4f06f8c8e2d5367a29a6312350edbc39cebe09b3f9c1063e947e4140d03", "type": "query", "version": 4 }, "c82b2bd8-d701-420c-ba43-f11a155b681a": { "previous": { "8.2": { "rule_name": "SMB (Windows File Sharing) Activity to the Internet", "sha256": "c762f5de1c0dc8d4fbefecbe5ec987d85ff703868558b4c2025a6491f8434e05", "type": "query", "version": 12 } }, "rule_name": "SMB (Windows File Sharing) Activity to the Internet", "sha256": "c762f5de1c0dc8d4fbefecbe5ec987d85ff703868558b4c2025a6491f8434e05", "type": "query", "version": 13 }, "c82c7d8f-fb9e-4874-a4bd-fd9e3f9becf1": { "previous": { "8.2": { "rule_name": "Direct Outbound SMB Connection", "sha256": "59d2d1c4c7c6384d4d48d355fb305fb2180b4a6b7c61ff489b756fca040be0d7", "type": "eql", "version": 9 } }, "rule_name": "Direct Outbound SMB Connection", "sha256": "65f317c19bd06744eafcd8c8246900f89b760520f72bc869d0b83bee86a882c8", "type": "eql", "version": 11 }, "c85eb82c-d2c8-485c-a36f-534f914b7663": { "previous": { "8.2": { "rule_name": "Virtual Machine Fingerprinting via Grep", "sha256": "d8ee45d0074e6b1d209b59fe30f6728feb04cfcdb6ab190e899977e14bbfecf0", "type": "eql", "version": 4 } }, "rule_name": "Virtual Machine Fingerprinting via Grep", "sha256": "d8ee45d0074e6b1d209b59fe30f6728feb04cfcdb6ab190e899977e14bbfecf0", "type": "eql", "version": 5 }, "c87fca17-b3a9-4e83-b545-f30746c53920": { "previous": { "8.2": { "rule_name": "Nmap Process Activity", "sha256": "85b00c642776304ce2f5d7c1374ad4f666c1669ace49cc43ede47f075674581d", "type": "query", "version": 7 } }, "rule_name": "Nmap Process Activity", "sha256": "85b00c642776304ce2f5d7c1374ad4f666c1669ace49cc43ede47f075674581d", "type": "query", "version": 8 }, "c88d4bd0-5649-4c52-87ea-9be59dbfbcf2": { "previous": { "8.2": { "rule_name": "Parent Process PID Spoofing", "sha256": "e819002160793a70b60760ff75655b16503255435496de2e3d0dc6651af974ee", "type": "eql", "version": 2 } }, "rule_name": "Parent Process PID Spoofing", "sha256": "e819002160793a70b60760ff75655b16503255435496de2e3d0dc6651af974ee", "type": "eql", "version": 3 }, "c8b150f0-0164-475b-a75e-74b47800a9ff": { "previous": { "8.2": { "rule_name": "Suspicious Startup Shell Folder Modification", "sha256": "ca362fc15b7aa368a146c5f16f7deff23a7f90907b1a6aea57a84a3989bb3d76", "type": "eql", "version": 7 } }, "rule_name": "Suspicious Startup Shell Folder Modification", "sha256": "ca362fc15b7aa368a146c5f16f7deff23a7f90907b1a6aea57a84a3989bb3d76", "type": "eql", "version": 8 }, "c8cccb06-faf2-4cd5-886e-2c9636cfcb87": { "previous": { "8.2": { "rule_name": "Disabling Windows Defender Security Settings via PowerShell", "sha256": "8af2a2813d0cd1bd5762df61f47e5d27027bbb7fac6855f1c80192bd6fef08a9", "type": "eql", "version": 6 } }, "rule_name": "Disabling Windows Defender Security Settings via PowerShell", "sha256": "8af2a2813d0cd1bd5762df61f47e5d27027bbb7fac6855f1c80192bd6fef08a9", "type": "eql", "version": 7 }, "c9e38e64-3f4c-4bf3-ad48-0e61a60ea1fa": { "previous": { "8.2": { "rule_name": "Credential Manipulation - Prevented - Elastic Endgame", "sha256": "40292ab6b3b74c0736e9142d0a2f4da6595e481d679c644ebce45713e3cf04d3", "type": "query", "version": 9 } }, "rule_name": "Credential Manipulation - Prevented - Elastic Endgame", "sha256": "40292ab6b3b74c0736e9142d0a2f4da6595e481d679c644ebce45713e3cf04d3", "type": "query", "version": 10 }, "ca79768e-40e1-4e45-a097-0e5fbc876ac2": { "previous": { "8.2": { "rule_name": "Microsoft 365 Exchange Malware Filter Rule Modification", "sha256": "3ff02ff308fe785c128e067929b76a589d41177cafaff1dd3a0a7f318ebcb793", "type": "query", "version": 7 } }, "rule_name": "Microsoft 365 Exchange Malware Filter Rule Modification", "sha256": "3ff02ff308fe785c128e067929b76a589d41177cafaff1dd3a0a7f318ebcb793", "type": "query", "version": 8 }, "cab4f01c-793f-4a54-a03e-e5d85b96d7af": { "previous": { "8.2": { "rule_name": "Auditd Login from Forbidden Location", "sha256": "85a1d29a1ac4a700594437c856775141ae1b4cc58a4c41def22e0a8762c7a8ed", "type": "query", "version": 1 } }, "rule_name": "Auditd Login from Forbidden Location", "sha256": "85a1d29a1ac4a700594437c856775141ae1b4cc58a4c41def22e0a8762c7a8ed", "type": "query", "version": 2 }, "cac91072-d165-11ec-a764-f661ea17fbce": { "previous": { "8.2": { "rule_name": "Abnormal Process ID or Lock File Created", "sha256": "48ff4da0fcd2b34c697f944ba226e3486441002f72b255f021f57009902e59a0", "type": "eql", "version": 2 } }, "rule_name": "Abnormal Process ID or Lock File Created", "sha256": "48ff4da0fcd2b34c697f944ba226e3486441002f72b255f021f57009902e59a0", "type": "eql", "version": 3 }, "cad4500a-abd7-4ef3-b5d3-95524de7cfe1": { "min_stack_version": "8.0", "previous": { "7.16": { "rule_name": "Google Workspace MFA Enforcement Disabled", "sha256": "599fc850f87b0b11bb3af05aa1936c1859f7c5e188c1f83be2655ea3cc71a1db", "type": "query", "version": 13 }, "8.2": { "rule_name": "Google Workspace MFA Enforcement Disabled", "sha256": "d7cfa0897aa671a31636e023f43835a351b3bc09bc6e1e3a047e122eda03a7a4", "type": "query", "version": 15 } }, "rule_name": "Google Workspace MFA Enforcement Disabled", "sha256": "d7cfa0897aa671a31636e023f43835a351b3bc09bc6e1e3a047e122eda03a7a4", "type": "query", "version": 16 }, "cb71aa62-55c8-42f0-b0dd-afb0bb0b1f51": { "previous": { "8.2": { "rule_name": "Suspicious Calendar File Modification", "sha256": "ef1e067b97520b59119126b3922f3dfecb186812f90c1a7df39eb2d54fda70ea", "type": "query", "version": 3 } }, "rule_name": "Suspicious Calendar File Modification", "sha256": "ef1e067b97520b59119126b3922f3dfecb186812f90c1a7df39eb2d54fda70ea", "type": "query", "version": 4 }, "cc16f774-59f9-462d-8b98-d27ccd4519ec": { "previous": { "8.2": { "rule_name": "Process Discovery via Tasklist", "sha256": "8612fc7b7e41ef8548eb18803ce4a0ca6e178952add06c716bfbf190fa1788f3", "type": "query", "version": 6 } }, "rule_name": "Process Discovery via Tasklist", "sha256": "8612fc7b7e41ef8548eb18803ce4a0ca6e178952add06c716bfbf190fa1788f3", "type": "query", "version": 7 }, "cc2fd2d0-ba3a-4939-b87f-2901764ed036": { "previous": { "8.2": { "rule_name": "Attempt to Enable the Root Account", "sha256": "741aeb42feeab9054165b3145253ab3826124f2ba19d70c33129b46f36ef7f2a", "type": "query", "version": 2 } }, "rule_name": "Attempt to Enable the Root Account", "sha256": "741aeb42feeab9054165b3145253ab3826124f2ba19d70c33129b46f36ef7f2a", "type": "query", "version": 3 }, "cc89312d-6f47-48e4-a87c-4977bd4633c3": { "previous": { "8.2": { "rule_name": "GCP Pub/Sub Subscription Deletion", "sha256": "c31392904afea3d493c1aaed8fbb19bd0365011c9b16ff72f04f359ad770c763", "type": "query", "version": 8 } }, "rule_name": "GCP Pub/Sub Subscription Deletion", "sha256": "c31392904afea3d493c1aaed8fbb19bd0365011c9b16ff72f04f359ad770c763", "type": "query", "version": 9 }, "cc92c835-da92-45c9-9f29-b4992ad621a0": { "previous": { "8.2": { "rule_name": "Attempt to Deactivate an Okta Policy Rule", "sha256": "d7cde97c8d9a661b5b7a290af52757e631313dbcf59b0c83a65e015074d089c0", "type": "query", "version": 8 } }, "rule_name": "Attempt to Deactivate an Okta Policy Rule", "sha256": "d7cde97c8d9a661b5b7a290af52757e631313dbcf59b0c83a65e015074d089c0", "type": "query", "version": 9 }, "ccc55af4-9882-4c67-87b4-449a7ae8079c": { "previous": { "8.2": { "rule_name": "Potential Process Herpaderping Attempt", "sha256": "d3d51648e56786364ca0f5e181a5e8cf20b152c6edc443c8748cab4de6a5fa33", "type": "eql", "version": 3 } }, "rule_name": "Potential Process Herpaderping Attempt", "sha256": "d3d51648e56786364ca0f5e181a5e8cf20b152c6edc443c8748cab4de6a5fa33", "type": "eql", "version": 4 }, "cd16fb10-0261-46e8-9932-a0336278cdbe": { "previous": { "8.2": { "rule_name": "Modification or Removal of an Okta Application Sign-On Policy", "sha256": "a426f223e9e1dd9112d3cd717f84671ff7d63875d60d5dce16ebdc3568a04aa3", "type": "query", "version": 8 } }, "rule_name": "Modification or Removal of an Okta Application Sign-On Policy", "sha256": "a426f223e9e1dd9112d3cd717f84671ff7d63875d60d5dce16ebdc3568a04aa3", "type": "query", "version": 9 }, "cd4d5754-07e1-41d4-b9a5-ef4ea6a0a126": { "previous": { "8.2": { "rule_name": "Socat Process Activity", "sha256": "572416fa9eb3b37a9360cbd474d0dccd7844685ad36b022f4a42d3a4525cac25", "type": "query", "version": 7 } }, "rule_name": "Socat Process Activity", "sha256": "572416fa9eb3b37a9360cbd474d0dccd7844685ad36b022f4a42d3a4525cac25", "type": "query", "version": 8 }, "cd66a419-9b3f-4f57-8ff8-ac4cd2d5f530": { "min_stack_version": "8.3", "previous": { "7.16": { "rule_name": "Anomalous Linux Compiler Activity", "sha256": "72774e826f2421c6fb071aca38cde16199ac2227c454f40e278aa68331bfb9ff", "type": "machine_learning", "version": 3 }, "8.2": { "rule_name": "Anomalous Linux Compiler Activity", "sha256": "47355104ae58c2ce6a485512d48639feeab99afb93a70a0e73207a82bf3c6a9a", "type": "machine_learning", "version": 5 } }, "rule_name": "Anomalous Linux Compiler Activity", "sha256": "47355104ae58c2ce6a485512d48639feeab99afb93a70a0e73207a82bf3c6a9a", "type": "machine_learning", "version": 6 }, "cd66a5af-e34b-4bb0-8931-57d0a043f2ef": { "previous": { "8.2": { "rule_name": "Kernel Module Removal", "sha256": "1c8be7221b73c0ef1a2ecd9c9d67a30493f1a138df4ed632c30a1eaaad4668d8", "type": "query", "version": 8 } }, "rule_name": "Kernel Module Removal", "sha256": "1c8be7221b73c0ef1a2ecd9c9d67a30493f1a138df4ed632c30a1eaaad4668d8", "type": "query", "version": 9 }, "cd89602e-9db0-48e3-9391-ae3bf241acd8": { "previous": { "8.2": { "rule_name": "Attempt to Deactivate MFA for an Okta User Account", "sha256": "1bcabbb99bc40c24f88f8514ba0d56999857fa558bc42918f7a26088cba56a08", "type": "query", "version": 8 } }, "rule_name": "Attempt to Deactivate MFA for an Okta User Account", "sha256": "1bcabbb99bc40c24f88f8514ba0d56999857fa558bc42918f7a26088cba56a08", "type": "query", "version": 9 }, "cdbebdc1-dc97-43c6-a538-f26a20c0a911": { "previous": { "8.2": { "rule_name": "Okta User Session Impersonation", "sha256": "d74bce14eca816f10062503c436a8f5ab108761b5554f8c7439644ca4088eee8", "type": "query", "version": 3 } }, "rule_name": "Okta User Session Impersonation", "sha256": "d74bce14eca816f10062503c436a8f5ab108761b5554f8c7439644ca4088eee8", "type": "query", "version": 4 }, "ce64d965-6cb0-466d-b74f-8d2c76f47f05": { "previous": { "8.2": { "rule_name": "New ActiveSyncAllowedDeviceID Added via PowerShell", "sha256": "d6d11a510336026baccb5c48c6f213a08074dfb4e5e820dd69f75346cbaac023", "type": "eql", "version": 9 } }, "rule_name": "New ActiveSyncAllowedDeviceID Added via PowerShell", "sha256": "d6d11a510336026baccb5c48c6f213a08074dfb4e5e820dd69f75346cbaac023", "type": "eql", "version": 10 }, "cf53f532-9cc9-445a-9ae7-fced307ec53c": { "previous": { "8.2": { "rule_name": "Cobalt Strike Command and Control Beacon", "sha256": "251ce0bab9c64891a65817cbbe623561d5a89f168d844da108c03562d4e2266e", "type": "query", "version": 6 } }, "rule_name": "Cobalt Strike Command and Control Beacon", "sha256": "251ce0bab9c64891a65817cbbe623561d5a89f168d844da108c03562d4e2266e", "type": "query", "version": 7 }, "cf549724-c577-4fd6-8f9b-d1b8ec519ec0": { "min_stack_version": "8.0", "previous": { "7.16": { "rule_name": "Domain Added to Google Workspace Trusted Domains", "sha256": "cd4f89243551c1339b5502a776a7ca15183d07da9cfd5df268a4c4b2e5954c56", "type": "query", "version": 12 }, "8.2": { "rule_name": "Domain Added to Google Workspace Trusted Domains", "sha256": "01c48dc0838a6a2c291d22a40540e1bd4b156aa8b707b0e1eceb1ed6c66e31c3", "type": "query", "version": 14 } }, "rule_name": "Domain Added to Google Workspace Trusted Domains", "sha256": "01c48dc0838a6a2c291d22a40540e1bd4b156aa8b707b0e1eceb1ed6c66e31c3", "type": "query", "version": 15 }, "cff92c41-2225-4763-b4ce-6f71e5bda5e6": { "previous": { "8.2": { "rule_name": "Execution from Unusual Directory - Command Line", "sha256": "b9c23acbf43665b0b2a7a52dcb4fa5d772b1dbdace50fe13fb5e2fb36640cb45", "type": "eql", "version": 7 } }, "rule_name": "Execution from Unusual Directory - Command Line", "sha256": "b9c23acbf43665b0b2a7a52dcb4fa5d772b1dbdace50fe13fb5e2fb36640cb45", "type": "eql", "version": 8 }, "d0e159cf-73e9-40d1-a9ed-077e3158a855": { "previous": { "8.2": { "rule_name": "Registry Persistence via AppInit DLL", "sha256": "ec596232b07f57337ded42809b05e4616306c860f9cbbfdcd7016ce0f195b8f4", "type": "eql", "version": 6 } }, "rule_name": "Registry Persistence via AppInit DLL", "sha256": "ec596232b07f57337ded42809b05e4616306c860f9cbbfdcd7016ce0f195b8f4", "type": "eql", "version": 7 }, "d117cbb4-7d56-41b4-b999-bdf8c25648a0": { "previous": { "8.2": { "rule_name": "Symbolic Link to Shadow Copy Created", "sha256": "c83b9154eb59550be3f873a64afb2d96a58e3a1e3d08eb79ccfe48c5e6addf8b", "type": "eql", "version": 6 } }, "rule_name": "Symbolic Link to Shadow Copy Created", "sha256": "c83b9154eb59550be3f873a64afb2d96a58e3a1e3d08eb79ccfe48c5e6addf8b", "type": "eql", "version": 7 }, "d2053495-8fe7-4168-b3df-dad844046be3": { "previous": { "8.2": { "rule_name": "PPTP (Point to Point Tunneling Protocol) Activity", "sha256": "07e21a98e0a2f05e6d9191ef82577f66f1c1ed1a2f93cd54771faa83ee6ceda6", "type": "query", "version": 7 } }, "rule_name": "PPTP (Point to Point Tunneling Protocol) Activity", "sha256": "07e21a98e0a2f05e6d9191ef82577f66f1c1ed1a2f93cd54771faa83ee6ceda6", "type": "query", "version": 8 }, "d22a85c6-d2ad-4cc4-bf7b-54787473669a": { "previous": { "8.2": { "rule_name": "Potential Microsoft Office Sandbox Evasion", "sha256": "26ee346753067979114f45b3c4d53389580cfa75342e55b78ec8c644873fc62f", "type": "query", "version": 3 } }, "rule_name": "Potential Microsoft Office Sandbox Evasion", "sha256": "26ee346753067979114f45b3c4d53389580cfa75342e55b78ec8c644873fc62f", "type": "query", "version": 4 }, "d31f183a-e5b1-451b-8534-ba62bca0b404": { "previous": { "8.2": { "rule_name": "Disabling User Account Control via Registry Modification", "sha256": "963327ef29e41ffff32d97cc72c852380b91a1f508c7e73eb8997b8f08b7203e", "type": "eql", "version": 6 } }, "rule_name": "Disabling User Account Control via Registry Modification", "sha256": "963327ef29e41ffff32d97cc72c852380b91a1f508c7e73eb8997b8f08b7203e", "type": "eql", "version": 7 }, "d331bbe2-6db4-4941-80a5-8270db72eb61": { "previous": { "8.2": { "rule_name": "Clearing Windows Event Logs", "sha256": "23df78a46ef817bce1307cfbaae08c4b075908c253fd6742de612e50251342de", "type": "eql", "version": 15 } }, "rule_name": "Clearing Windows Event Logs", "sha256": "23df78a46ef817bce1307cfbaae08c4b075908c253fd6742de612e50251342de", "type": "eql", "version": 16 }, "d461fac0-43e8-49e2-85ea-3a58fe120b4f": { "previous": { "8.2": { "rule_name": "Shell Execution via Apple Scripting", "sha256": "d216e2e2cf3d06fa293ae9c2c3cba3977897440f561a3bcbb53130428bfae7bc", "type": "eql", "version": 4 } }, "rule_name": "Shell Execution via Apple Scripting", "sha256": "d216e2e2cf3d06fa293ae9c2c3cba3977897440f561a3bcbb53130428bfae7bc", "type": "eql", "version": 5 }, "d48e1c13-4aca-4d1f-a7b1-a9161c0ad86f": { "previous": { "8.2": { "rule_name": "Attempt to Delete an Okta Application", "sha256": "5775f8988ecf8ce2b7d4d780a1a2c5fd46e2b253c21143d53d918ed3ed0b1ea8", "type": "query", "version": 6 } }, "rule_name": "Attempt to Delete an Okta Application", "sha256": "5775f8988ecf8ce2b7d4d780a1a2c5fd46e2b253c21143d53d918ed3ed0b1ea8", "type": "query", "version": 7 }, "d49cc73f-7a16-4def-89ce-9fc7127d7820": { "previous": { "8.2": { "rule_name": "Web Application Suspicious Activity: sqlmap User Agent", "sha256": "19024513ed918b3f834bfc02a6fade03e36daff8a7c0fb19bedeaee8a1613dd2", "type": "query", "version": 8 } }, "rule_name": "Web Application Suspicious Activity: sqlmap User Agent", "sha256": "19024513ed918b3f834bfc02a6fade03e36daff8a7c0fb19bedeaee8a1613dd2", "type": "query", "version": 9 }, "d4af3a06-1e0a-48ec-b96a-faf2309fae46": { "min_stack_version": "8.3", "previous": { "7.16": { "rule_name": "Unusual Linux System Information Discovery Activity", "sha256": "e6bfd938d1323fddf3554c4c9a5a57d6490c2b23ec7d42a12455a5cd6ab96d14", "type": "machine_learning", "version": 2 }, "8.2": { "rule_name": "Unusual Linux System Information Discovery Activity", "sha256": "3d98f764fe976df253f64e01eebc8c21b6f053483109c520c47251ae353f12df", "type": "machine_learning", "version": 3 } }, "rule_name": "Unusual Linux System Information Discovery Activity", "sha256": "3d98f764fe976df253f64e01eebc8c21b6f053483109c520c47251ae353f12df", "type": "machine_learning", "version": 4 }, "d4b73fa0-9d43-465e-b8bf-50230da6718b": { "min_stack_version": "7.16", "previous": { "8.2": { "rule_name": "Unusual Source IP for a User to Logon from", "sha256": "2e2ae07f9d9f4346d8f2855672b7cb74eba7a74483e53a99064ec4e6a14560ae", "type": "machine_learning", "version": 2 } }, "rule_name": "Unusual Source IP for a User to Logon from", "sha256": "2e2ae07f9d9f4346d8f2855672b7cb74eba7a74483e53a99064ec4e6a14560ae", "type": "machine_learning", "version": 3 }, "d563aaba-2e72-462b-8658-3e5ea22db3a6": { "previous": { "8.2": { "rule_name": "Privilege Escalation via Windir Environment Variable", "sha256": "49857fe6b602ba67910cf3842eeea352c132f6555165e8bdc80a96b3811e408a", "type": "eql", "version": 5 } }, "rule_name": "Privilege Escalation via Windir Environment Variable", "sha256": "49857fe6b602ba67910cf3842eeea352c132f6555165e8bdc80a96b3811e408a", "type": "eql", "version": 6 }, "d5d86bf5-cf0c-4c06-b688-53fdc072fdfd": { "previous": { "8.2": { "rule_name": "Attempt to Delete an Okta Policy Rule", "sha256": "f46efadc5223126d7d2b269800e56bd1bfe7414df41232e503770f4d7f394e5a", "type": "query", "version": 6 } }, "rule_name": "Attempt to Delete an Okta Policy Rule", "sha256": "f46efadc5223126d7d2b269800e56bd1bfe7414df41232e503770f4d7f394e5a", "type": "query", "version": 7 }, "d61cbcf8-1bc1-4cff-85ba-e7b21c5beedc": { "previous": { "8.2": { "rule_name": "Service Command Lateral Movement", "sha256": "4f1a9cea4e27cd4aa1579b26c0e1194e00c56dbaa173df926d00b2ac54ffc361", "type": "eql", "version": 4 } }, "rule_name": "Service Command Lateral Movement", "sha256": "4f1a9cea4e27cd4aa1579b26c0e1194e00c56dbaa173df926d00b2ac54ffc361", "type": "eql", "version": 5 }, "d624f0ae-3dd1-4856-9aad-ccfe4d4bfa17": { "previous": { "8.2": { "rule_name": "AWS CloudWatch Log Stream Deletion", "sha256": "83c04102eefcd5bad2b3187a8eaa5d04383506462f09127894aabcdeb2c7cc97", "type": "query", "version": 9 } }, "rule_name": "AWS CloudWatch Log Stream Deletion", "sha256": "83c04102eefcd5bad2b3187a8eaa5d04383506462f09127894aabcdeb2c7cc97", "type": "query", "version": 10 }, "d62b64a8-a7c9-43e5-aee3-15a725a794e7": { "previous": { "8.2": { "rule_name": "GCP Pub/Sub Subscription Creation", "sha256": "e4952632295f7786983b529846c2a56aa18d946bdfe8c592ec3c1253600b8b1d", "type": "query", "version": 8 } }, "rule_name": "GCP Pub/Sub Subscription Creation", "sha256": "e4952632295f7786983b529846c2a56aa18d946bdfe8c592ec3c1253600b8b1d", "type": "query", "version": 9 }, "d6450d4e-81c6-46a3-bd94-079886318ed5": { "previous": { "8.2": { "rule_name": "Strace Process Activity", "sha256": "d429bce6c680e9197c1314118b5cf81da6824a06e1d95e2882c4a9a274975eb7", "type": "query", "version": 8 } }, "rule_name": "Strace Process Activity", "sha256": "d429bce6c680e9197c1314118b5cf81da6824a06e1d95e2882c4a9a274975eb7", "type": "query", "version": 9 }, "d68eb1b5-5f1c-4b6d-9e63-5b6b145cd4aa": { "previous": { "8.2": { "rule_name": "Microsoft 365 Exchange Anti-Phish Policy Deletion", "sha256": "a50d37bbe9b43e7724a7eb24505e7aa03927a2ec67370f69ca28127d662d68fc", "type": "query", "version": 7 } }, "rule_name": "Microsoft 365 Exchange Anti-Phish Policy Deletion", "sha256": "a50d37bbe9b43e7724a7eb24505e7aa03927a2ec67370f69ca28127d662d68fc", "type": "query", "version": 8 }, "d703a5af-d5b0-43bd-8ddb-7a5d500b7da5": { "previous": { "8.2": { "rule_name": "Modification of WDigest Security Provider", "sha256": "18ae14496eae54ed3c43ec695b95a0db7ea09815f0fb2c0c014bfa319308596a", "type": "eql", "version": 6 } }, "rule_name": "Modification of WDigest Security Provider", "sha256": "18ae14496eae54ed3c43ec695b95a0db7ea09815f0fb2c0c014bfa319308596a", "type": "eql", "version": 7 }, "d72e33fc-6e91-42ff-ac8b-e573268c5a87": { "previous": { "8.2": { "rule_name": "Command Execution via SolarWinds Process", "sha256": "12bb91c5494107580ebf88ac8241b7af9912cc883383de028b8fb9fd9532098c", "type": "eql", "version": 7 } }, "rule_name": "Command Execution via SolarWinds Process", "sha256": "12bb91c5494107580ebf88ac8241b7af9912cc883383de028b8fb9fd9532098c", "type": "eql", "version": 8 }, "d743ff2a-203e-4a46-a3e3-40512cfe8fbb": { "previous": { "8.2": { "rule_name": "Microsoft 365 Exchange Malware Filter Policy Deletion", "sha256": "f57519c1aa31055750c5639076d19820fd5ac67f477ad74655a84276f0c2ff6d", "type": "query", "version": 7 } }, "rule_name": "Microsoft 365 Exchange Malware Filter Policy Deletion", "sha256": "f57519c1aa31055750c5639076d19820fd5ac67f477ad74655a84276f0c2ff6d", "type": "query", "version": 8 }, "d75991f2-b989-419d-b797-ac1e54ec2d61": { "previous": { "8.2": { "rule_name": "SystemKey Access via Command Line", "sha256": "cd672851cc7069c4978d323f3759c166eb8be77fcacdbd1f44c796534216316a", "type": "query", "version": 3 } }, "rule_name": "SystemKey Access via Command Line", "sha256": "cd672851cc7069c4978d323f3759c166eb8be77fcacdbd1f44c796534216316a", "type": "query", "version": 4 }, "d76b02ef-fc95-4001-9297-01cb7412232f": { "min_stack_version": "8.2", "previous": { "7.16": { "rule_name": "Interactive Terminal Spawned via Python", "sha256": "1b8e9ea27c151d2de3fd5c94f0ff8de14098ccc0348a81ac3a39dc28f0dd118f", "type": "query", "version": 8 }, "8.2": { "rule_name": "Interactive Terminal Spawned via Python", "sha256": "cf57a1bf422c49749bcb59940765ee03f6b5a4d0dc3a7f2e98dc31c880a71882", "type": "query", "version": 10 } }, "rule_name": "Interactive Terminal Spawned via Python", "sha256": "cf57a1bf422c49749bcb59940765ee03f6b5a4d0dc3a7f2e98dc31c880a71882", "type": "query", "version": 10 }, "d79c4b2a-6134-4edd-86e6-564a92a933f9": { "previous": { "8.2": { "rule_name": "Azure Blob Permissions Modification", "sha256": "93f9f5b59ff0b2dda8d48b18b5d29f3434d7d8c95026e6d3029877c99182109c", "type": "query", "version": 3 } }, "rule_name": "Azure Blob Permissions Modification", "sha256": "93f9f5b59ff0b2dda8d48b18b5d29f3434d7d8c95026e6d3029877c99182109c", "type": "query", "version": 4 }, "d7d5c059-c19a-4a96-8ae3-41496ef3bcf9": { "min_stack_version": "7.16", "previous": { "8.2": { "rule_name": "Spike in Logon Events", "sha256": "2aa5266f2f98a3501aa1994db0eeb48e48c8eb3bf8bb8500f0b9a3447c472d62", "type": "machine_learning", "version": 2 } }, "rule_name": "Spike in Logon Events", "sha256": "2aa5266f2f98a3501aa1994db0eeb48e48c8eb3bf8bb8500f0b9a3447c472d62", "type": "machine_learning", "version": 3 }, "d7e62693-aab9-4f66-a21a-3d79ecdd603d": { "previous": { "8.2": { "rule_name": "SMTP on Port 26/TCP", "sha256": "f795ea35f70c7ee41f46586159af9c713d96e6b0356ce45c1bd5e35dcf5b7e9f", "type": "query", "version": 9 } }, "rule_name": "SMTP on Port 26/TCP", "sha256": "f795ea35f70c7ee41f46586159af9c713d96e6b0356ce45c1bd5e35dcf5b7e9f", "type": "query", "version": 10 }, "d8fc1cca-93ed-43c1-bbb6-c0dd3eff2958": { "previous": { "8.2": { "rule_name": "AWS IAM Deactivation of MFA Device", "sha256": "753005c4405fcb6da3a3a59832d25d2fd9fa5b4b5518af0cf58cdfc67756adbf", "type": "query", "version": 7 } }, "rule_name": "AWS IAM Deactivation of MFA Device", "sha256": "753005c4405fcb6da3a3a59832d25d2fd9fa5b4b5518af0cf58cdfc67756adbf", "type": "query", "version": 8 }, "d99a037b-c8e2-47a5-97b9-170d076827c4": { "previous": { "8.2": { "rule_name": "Volume Shadow Copy Deletion via PowerShell", "sha256": "589e122c626ad5497068f4f69cc7ef691042971e5ac9c4a8d1a1268a5af9888e", "type": "eql", "version": 6 } }, "rule_name": "Volume Shadow Copy Deletion via PowerShell", "sha256": "589e122c626ad5497068f4f69cc7ef691042971e5ac9c4a8d1a1268a5af9888e", "type": "eql", "version": 7 }, "da986d2c-ffbf-4fd6-af96-a88dbf68f386": { "previous": { "8.2": { "rule_name": "Linux Restricted Shell Breakout via the gcc command", "sha256": "0dcf883b0cf19432784e5b592f0e8a9b03bef386eb8d86065ca7d27c3b395443", "type": "eql", "version": 1 } }, "rule_name": "Linux Restricted Shell Breakout via the gcc command", "sha256": "0dcf883b0cf19432784e5b592f0e8a9b03bef386eb8d86065ca7d27c3b395443", "type": "eql", "version": 2 }, "dafa3235-76dc-40e2-9f71-1773b96d24cf": { "previous": { "8.2": { "rule_name": "Multi-Factor Authentication Disabled for an Azure User", "sha256": "fc8ed24bb22f92a18306bd5f3b1453f0368cab9e7f0ff5e90f051fd2a5d57c04", "type": "query", "version": 7 } }, "rule_name": "Multi-Factor Authentication Disabled for an Azure User", "sha256": "fc8ed24bb22f92a18306bd5f3b1453f0368cab9e7f0ff5e90f051fd2a5d57c04", "type": "query", "version": 8 }, "db8c33a8-03cd-4988-9e2c-d0a4863adb13": { "previous": { "8.2": { "rule_name": "Credential Dumping - Prevented - Elastic Endgame", "sha256": "b0491008a10432af0609a3d3046c5ba9697fe4ee6fe28c05d20735f663452a74", "type": "query", "version": 9 } }, "rule_name": "Credential Dumping - Prevented - Elastic Endgame", "sha256": "b0491008a10432af0609a3d3046c5ba9697fe4ee6fe28c05d20735f663452a74", "type": "query", "version": 10 }, "dc672cb7-d5df-4d1f-a6d7-0841b1caafb9": { "previous": { "8.2": { "rule_name": "Threat Intel Filebeat Module (v7.x) Indicator Match", "sha256": "a6db1fdda6906b8d352b2d9c369c0b2e4271c911d0919320c8dd20f053d0e095", "type": "threat_match", "version": 4 } }, "rule_name": "Threat Intel Filebeat Module (v7.x) Indicator Match", "sha256": "a6db1fdda6906b8d352b2d9c369c0b2e4271c911d0919320c8dd20f053d0e095", "type": "threat_match", "version": 5 }, "dc9c1f74-dac3-48e3-b47f-eb79db358f57": { "previous": { "8.2": { "rule_name": "Volume Shadow Copy Deletion via WMIC", "sha256": "9adb7cd1d7292a45f031dd2beda9b2cce1607bef38696f31ddd2eea4bf12ac34", "type": "eql", "version": 14 } }, "rule_name": "Volume Shadow Copy Deletion via WMIC", "sha256": "9adb7cd1d7292a45f031dd2beda9b2cce1607bef38696f31ddd2eea4bf12ac34", "type": "eql", "version": 15 }, "dca28dee-c999-400f-b640-50a081cc0fd1": { "previous": { "8.2": { "rule_name": "Unusual Country For an AWS Command", "sha256": "ddde22d6746aeb47d1d2c639b643961be9061affb3a8a997855dac8a98521f5b", "type": "machine_learning", "version": 11 } }, "rule_name": "Unusual Country For an AWS Command", "sha256": "ddde22d6746aeb47d1d2c639b643961be9061affb3a8a997855dac8a98521f5b", "type": "machine_learning", "version": 12 }, "ddab1f5f-7089-44f5-9fda-de5b11322e77": { "previous": { "8.2": { "rule_name": "NullSessionPipe Registry Modification", "sha256": "3c571a1dd8be7ebd5a8a34f2c143d1ec0405ca997f9b91ddfda5df8707b3d122", "type": "eql", "version": 3 } }, "rule_name": "NullSessionPipe Registry Modification", "sha256": "3c571a1dd8be7ebd5a8a34f2c143d1ec0405ca997f9b91ddfda5df8707b3d122", "type": "eql", "version": 4 }, "de9bd7e0-49e9-4e92-a64d-53ade2e66af1": { "previous": { "8.2": { "rule_name": "Unusual Child Process from a System Virtual Process", "sha256": "f32e6b1973127776314666998a5a0cf538c4c0fd2af4401388c467f0259e2380", "type": "eql", "version": 7 } }, "rule_name": "Unusual Child Process from a System Virtual Process", "sha256": "f32e6b1973127776314666998a5a0cf538c4c0fd2af4401388c467f0259e2380", "type": "eql", "version": 8 }, "debff20a-46bc-4a4d-bae5-5cdd14222795": { "previous": { "8.2": { "rule_name": "Base16 or Base32 Encoding/Decoding Activity", "sha256": "703cac8fdd4f1098c5947cd5c2edb3baae065d09e094928ded1d4404af74af7b", "type": "query", "version": 8 } }, "rule_name": "Base16 or Base32 Encoding/Decoding Activity", "sha256": "703cac8fdd4f1098c5947cd5c2edb3baae065d09e094928ded1d4404af74af7b", "type": "query", "version": 9 }, "df197323-72a8-46a9-a08e-3f5b04a4a97a": { "min_stack_version": "8.3", "previous": { "7.16": { "rule_name": "Unusual Windows User Calling the Metadata Service", "sha256": "40ac13cc950b6d31bbf8793ae0941af4edbaf36dc40070df6f4173775298c968", "type": "machine_learning", "version": 3 }, "8.2": { "rule_name": "Unusual Windows User Calling the Metadata Service", "sha256": "634c76aca1df7fc5b64e42733e6536ac48114a9aedd05e57024538ba6798e092", "type": "machine_learning", "version": 5 } }, "rule_name": "Unusual Windows User Calling the Metadata Service", "sha256": "634c76aca1df7fc5b64e42733e6536ac48114a9aedd05e57024538ba6798e092", "type": "machine_learning", "version": 6 }, "df26fd74-1baa-4479-b42e-48da84642330": { "previous": { "8.2": { "rule_name": "Azure Automation Account Created", "sha256": "b6e3b2811b688e3537fac8a996aee5ea20ea6ac92c3d0c09282606659b5d43d6", "type": "query", "version": 7 } }, "rule_name": "Azure Automation Account Created", "sha256": "b6e3b2811b688e3537fac8a996aee5ea20ea6ac92c3d0c09282606659b5d43d6", "type": "query", "version": 8 }, "df6f62d9-caab-4b88-affa-044f4395a1e0": { "previous": { "8.2": { "rule_name": "Dynamic Linker Copy", "sha256": "6cfd8cc95a24bd3c7b02aa0dbc131ae0aa363499d0b34da0215821ee11812f7b", "type": "eql", "version": 2 } }, "rule_name": "Dynamic Linker Copy", "sha256": "6cfd8cc95a24bd3c7b02aa0dbc131ae0aa363499d0b34da0215821ee11812f7b", "type": "eql", "version": 3 }, "df7fda76-c92b-4943-bc68-04460a5ea5ba": { "min_stack_version": "8.2", "previous": { "8.2": { "rule_name": "Kubernetes Pod Created With HostPID", "sha256": "1812535ee0bdc44f1edbc5e9801928f2712abc4984e8a97fc4f641b2b6c2ea7a", "type": "query", "version": 2 } }, "rule_name": "Kubernetes Pod Created With HostPID", "sha256": "1812535ee0bdc44f1edbc5e9801928f2712abc4984e8a97fc4f641b2b6c2ea7a", "type": "query", "version": 2 }, "df959768-b0c9-4d45-988c-5606a2be8e5a": { "previous": { "8.2": { "rule_name": "Unusual Process Execution - Temp", "sha256": "95a4dd4b036baa17e7ddbfc9e142208cc5b2b5f28ef3a929836c1a6833d3552d", "type": "query", "version": 8 } }, "rule_name": "Unusual Process Execution - Temp", "sha256": "95a4dd4b036baa17e7ddbfc9e142208cc5b2b5f28ef3a929836c1a6833d3552d", "type": "query", "version": 9 }, "e02bd3ea-72c6-4181-ac2b-0f83d17ad969": { "previous": { "8.2": { "rule_name": "Azure Firewall Policy Deletion", "sha256": "cec609b5bd2ed5b821240b2725a14f9f43703ed66c1eb444a3a3eeb917f845bd", "type": "query", "version": 8 } }, "rule_name": "Azure Firewall Policy Deletion", "sha256": "cec609b5bd2ed5b821240b2725a14f9f43703ed66c1eb444a3a3eeb917f845bd", "type": "query", "version": 9 }, "e052c845-48d0-4f46-8a13-7d0aba05df82": { "previous": { "8.2": { "rule_name": "KRBTGT Delegation Backdoor", "sha256": "8c69d278b16327517865f29ffcae09bde12f424357d992fd78ed167c305008a5", "type": "query", "version": 4 } }, "rule_name": "KRBTGT Delegation Backdoor", "sha256": "8c69d278b16327517865f29ffcae09bde12f424357d992fd78ed167c305008a5", "type": "query", "version": 5 }, "e08ccd49-0380-4b2b-8d71-8000377d6e49": { "previous": { "8.2": { "rule_name": "Attempts to Brute Force an Okta User Account", "sha256": "292a18aa33370f4a3def19295acca57a4ca7740abbadcf44671a34b77f78c7ab", "type": "threshold", "version": 7 } }, "rule_name": "Attempts to Brute Force an Okta User Account", "sha256": "292a18aa33370f4a3def19295acca57a4ca7740abbadcf44671a34b77f78c7ab", "type": "threshold", "version": 8 }, "e0dacebe-4311-4d50-9387-b17e89c2e7fd": { "min_stack_version": "7.16", "previous": { "7.16": { "rule_name": "Whitespace Padding in Process Command Line", "sha256": "de0b525b55b31026d29a5a835b5e420d95ceaa8d6c6f7e377c3b2cdae2064fdf", "type": "eql", "version": 7 }, "8.2": { "rule_name": "Whitespace Padding in Process Command Line", "sha256": "2aa8bb1cd50151cb0c68f9f9aaca7894681a205d965326b65eb8c1163e176257", "type": "eql", "version": 9 } }, "rule_name": "Whitespace Padding in Process Command Line", "sha256": "2aa8bb1cd50151cb0c68f9f9aaca7894681a205d965326b65eb8c1163e176257", "type": "eql", "version": 10 }, "e0f36de1-0342-453d-95a9-a068b257b053": { "previous": { "8.2": { "rule_name": "Azure Event Hub Deletion", "sha256": "fcaa244c4b85d912fc2186203edf3c756e86fe0f326986965d47b64b049e9a53", "type": "query", "version": 8 } }, "rule_name": "Azure Event Hub Deletion", "sha256": "fcaa244c4b85d912fc2186203edf3c756e86fe0f326986965d47b64b049e9a53", "type": "query", "version": 9 }, "e12c0318-99b1-44f2-830c-3a38a43207ca": { "previous": { "8.2": { "rule_name": "AWS Route Table Created", "sha256": "91f22a4cab37c8825bcd6d20d125eb71c27ea27151cbc76e1b597d889a832b7d", "type": "query", "version": 5 } }, "rule_name": "AWS Route Table Created", "sha256": "91f22a4cab37c8825bcd6d20d125eb71c27ea27151cbc76e1b597d889a832b7d", "type": "query", "version": 6 }, "e14c5fd7-fdd7-49c2-9e5b-ec49d817bc8d": { "previous": { "8.2": { "rule_name": "AWS RDS Cluster Creation", "sha256": "9d940646c93297f6f313fd20534a4ae320b2a9ff5921954ff8c1f05ef597333c", "type": "query", "version": 9 } }, "rule_name": "AWS RDS Cluster Creation", "sha256": "9d940646c93297f6f313fd20534a4ae320b2a9ff5921954ff8c1f05ef597333c", "type": "query", "version": 10 }, "e19e64ee-130e-4c07-961f-8a339f0b8362": { "previous": { "8.2": { "rule_name": "Connection to External Network via Telnet", "sha256": "472df9dc371166d7dad6b226846b2c2335d95a925c8a949249a6dba01f850618", "type": "eql", "version": 7 } }, "rule_name": "Connection to External Network via Telnet", "sha256": "472df9dc371166d7dad6b226846b2c2335d95a925c8a949249a6dba01f850618", "type": "eql", "version": 8 }, "e26aed74-c816-40d3-a810-48d6fbd8b2fd": { "min_stack_version": "7.16", "previous": { "8.2": { "rule_name": "Spike in Logon Events from a Source IP", "sha256": "a5988a3dfc897aa2a50b11f7ed790699fb3b5c8450c61d82e331ff65dc180d6f", "type": "machine_learning", "version": 3 } }, "rule_name": "Spike in Logon Events from a Source IP", "sha256": "a5988a3dfc897aa2a50b11f7ed790699fb3b5c8450c61d82e331ff65dc180d6f", "type": "machine_learning", "version": 4 }, "e26f042e-c590-4e82-8e05-41e81bd822ad": { "previous": { "8.2": { "rule_name": "Suspicious .NET Reflection via PowerShell", "sha256": "83939370b4568763eb651229e8801014e6e48c318980ac868ba33aad9dfdf306", "type": "query", "version": 5 } }, "rule_name": "Suspicious .NET Reflection via PowerShell", "sha256": "83939370b4568763eb651229e8801014e6e48c318980ac868ba33aad9dfdf306", "type": "query", "version": 6 }, "e2a67480-3b79-403d-96e3-fdd2992c50ef": { "previous": { "8.2": { "rule_name": "AWS Management Console Root Login", "sha256": "42d6d91e094e7f0bad724c4d71bef83efcabc880327a5d87d5e96979bc91dcc9", "type": "query", "version": 7 } }, "rule_name": "AWS Management Console Root Login", "sha256": "42d6d91e094e7f0bad724c4d71bef83efcabc880327a5d87d5e96979bc91dcc9", "type": "query", "version": 8 }, "e2f9fdf5-8076-45ad-9427-41e0e03dc9c2": { "previous": { "8.2": { "rule_name": "Suspicious Process Execution via Renamed PsExec Executable", "sha256": "cf6a6f0eadf2cdccaca88796048d328c3ddbde3453bc36f69a564675fda98019", "type": "eql", "version": 7 } }, "rule_name": "Suspicious Process Execution via Renamed PsExec Executable", "sha256": "cf6a6f0eadf2cdccaca88796048d328c3ddbde3453bc36f69a564675fda98019", "type": "eql", "version": 8 }, "e2fb5b18-e33c-4270-851e-c3d675c9afcd": { "previous": { "8.2": { "rule_name": "GCP IAM Role Deletion", "sha256": "596582abda1952e5ff855671798f64d01d0fe5088e7bf77e43841f20bf51117c", "type": "query", "version": 8 } }, "rule_name": "GCP IAM Role Deletion", "sha256": "596582abda1952e5ff855671798f64d01d0fe5088e7bf77e43841f20bf51117c", "type": "query", "version": 9 }, "e3343ab9-4245-4715-b344-e11c56b0a47f": { "previous": { "8.2": { "rule_name": "Process Activity via Compiled HTML File", "sha256": "b2464865a55c2b0b4cc06c1d870dfac128c7778611e9412fed01ada2d71fa972", "type": "eql", "version": 13 } }, "rule_name": "Process Activity via Compiled HTML File", "sha256": "b2464865a55c2b0b4cc06c1d870dfac128c7778611e9412fed01ada2d71fa972", "type": "eql", "version": 14 }, "e3c27562-709a-42bd-82f2-3ed926cced19": { "previous": { "8.2": { "rule_name": "AWS Route53 private hosted zone associated with a VPC", "sha256": "1987a386d6d4a8d7181dddd2f93a6ae937be94af71202370a5b903ea82e740ce", "type": "query", "version": 3 } }, "rule_name": "AWS Route53 private hosted zone associated with a VPC", "sha256": "1987a386d6d4a8d7181dddd2f93a6ae937be94af71202370a5b903ea82e740ce", "type": "query", "version": 4 }, "e3c5d5cb-41d5-4206-805c-f30561eae3ac": { "previous": { "8.2": { "rule_name": "Ransomware - Prevented - Elastic Endgame", "sha256": "b47502c00c1c5a89a76099135cda46927a2bac199a32fa69c796440b73fd9db8", "type": "query", "version": 9 } }, "rule_name": "Ransomware - Prevented - Elastic Endgame", "sha256": "b47502c00c1c5a89a76099135cda46927a2bac199a32fa69c796440b73fd9db8", "type": "query", "version": 10 }, "e3cf38fa-d5b8-46cc-87f9-4a7513e4281d": { "previous": { "8.2": { "rule_name": "Connection to Commonly Abused Free SSL Certificate Providers", "sha256": "025fac3c239ae8bdb22816f8add55a9f1f8683d33e9131a4a3a31b9b8034ab57", "type": "eql", "version": 6 } }, "rule_name": "Connection to Commonly Abused Free SSL Certificate Providers", "sha256": "025fac3c239ae8bdb22816f8add55a9f1f8683d33e9131a4a3a31b9b8034ab57", "type": "eql", "version": 7 }, "e3e904b3-0a8e-4e68-86a8-977a163e21d3": { "previous": { "8.2": { "rule_name": "Persistence via KDE AutoStart Script or Desktop File Modification", "sha256": "ac43607e86f104e0f628e10cf3fed3e5e19bd1eaeb254e4a0bbb5622f0901fff", "type": "eql", "version": 4 } }, "rule_name": "Persistence via KDE AutoStart Script or Desktop File Modification", "sha256": "ac43607e86f104e0f628e10cf3fed3e5e19bd1eaeb254e4a0bbb5622f0901fff", "type": "eql", "version": 5 }, "e48236ca-b67a-4b4e-840c-fdc7782bc0c3": { "previous": { "8.2": { "rule_name": "Attempt to Modify an Okta Network Zone", "sha256": "d8c50abeef3ea56327bef49926aade2c4cb9c4aac52de171ae494e75edd63816", "type": "query", "version": 8 } }, "rule_name": "Attempt to Modify an Okta Network Zone", "sha256": "d8c50abeef3ea56327bef49926aade2c4cb9c4aac52de171ae494e75edd63816", "type": "query", "version": 9 }, "e4e31051-ee01-4307-a6ee-b21b186958f4": { "previous": { "8.2": { "rule_name": "Service Creation via Local Kerberos Authentication", "sha256": "9cc4b2d0d69c50b16c191500392d6623afffd2b4a329bb2e9536341de907e1b5", "type": "eql", "version": 2 } }, "rule_name": "Service Creation via Local Kerberos Authentication", "sha256": "9cc4b2d0d69c50b16c191500392d6623afffd2b4a329bb2e9536341de907e1b5", "type": "eql", "version": 3 }, "e514d8cd-ed15-4011-84e2-d15147e059f1": { "previous": { "8.2": { "rule_name": "Kerberos Pre-authentication Disabled for User", "sha256": "d7e564ab0ed7612650185717def8f732fc9eaba9ad93059452d09ba72cd7ae6a", "type": "query", "version": 5 } }, "rule_name": "Kerberos Pre-authentication Disabled for User", "sha256": "d7e564ab0ed7612650185717def8f732fc9eaba9ad93059452d09ba72cd7ae6a", "type": "query", "version": 6 }, "e555105c-ba6d-481f-82bb-9b633e7b4827": { "min_stack_version": "8.0", "previous": { "7.16": { "rule_name": "MFA Disabled for Google Workspace Organization", "sha256": "c2ac77cd236c9997bebad7dbd68fbca34417ff4c999a05fa26114d41393ec636", "type": "query", "version": 13 }, "8.2": { "rule_name": "MFA Disabled for Google Workspace Organization", "sha256": "bce03d2540705763734e0aa3aa9e1d29b2311abdce4691366dd58b6d44721a11", "type": "query", "version": 15 } }, "rule_name": "MFA Disabled for Google Workspace Organization", "sha256": "bce03d2540705763734e0aa3aa9e1d29b2311abdce4691366dd58b6d44721a11", "type": "query", "version": 16 }, "e56993d2-759c-4120-984c-9ec9bb940fd5": { "previous": { "8.2": { "rule_name": "RDP (Remote Desktop Protocol) to the Internet", "sha256": "e2f1607e4ec15d9f1e4cdfb3c307852c151afef4fa9f42ee068ccd4b335543ed", "type": "query", "version": 8 } }, "rule_name": "RDP (Remote Desktop Protocol) to the Internet", "sha256": "e2f1607e4ec15d9f1e4cdfb3c307852c151afef4fa9f42ee068ccd4b335543ed", "type": "query", "version": 9 }, "e6c1a552-7776-44ad-ae0f-8746cc07773c": { "previous": { "8.2": { "rule_name": "Bash Shell Profile Modification", "sha256": "d5574cea1dee742493442d485015a56dd84807693c0dea38b92f3f8c87bf8f88", "type": "query", "version": 3 } }, "rule_name": "Bash Shell Profile Modification", "sha256": "d5574cea1dee742493442d485015a56dd84807693c0dea38b92f3f8c87bf8f88", "type": "query", "version": 4 }, "e6c98d38-633d-4b3e-9387-42112cd5ac10": { "previous": { "8.2": { "rule_name": "Authorization Plugin Modification", "sha256": "4e4b8ddbe7bcf880aaf748f5fa3d76a42469876a0e592d8ccd48d80169ed0771", "type": "query", "version": 3 } }, "rule_name": "Authorization Plugin Modification", "sha256": "4e4b8ddbe7bcf880aaf748f5fa3d76a42469876a0e592d8ccd48d80169ed0771", "type": "query", "version": 4 }, "e6e3ecff-03dd-48ec-acbd-54a04de10c68": { "previous": { "8.2": { "rule_name": "Possible Okta DoS Attack", "sha256": "53c7b993a4b9e4da58773e04d3a9cbb6f33e3b2975c5a88f14c63cc0ea6d1954", "type": "query", "version": 8 } }, "rule_name": "Possible Okta DoS Attack", "sha256": "53c7b993a4b9e4da58773e04d3a9cbb6f33e3b2975c5a88f14c63cc0ea6d1954", "type": "query", "version": 9 }, "e6e8912f-283f-4d0d-8442-e0dcaf49944b": { "previous": { "8.2": { "rule_name": "Screensaver Plist File Modified by Unexpected Process", "sha256": "e729c078dcf4e96d606f88ca1e5c5af1a449659cc6c1122c95169a249e03f74c", "type": "eql", "version": 4 } }, "rule_name": "Screensaver Plist File Modified by Unexpected Process", "sha256": "e729c078dcf4e96d606f88ca1e5c5af1a449659cc6c1122c95169a249e03f74c", "type": "eql", "version": 5 }, "e7075e8d-a966-458e-a183-85cd331af255": { "previous": { "8.2": { "rule_name": "Default Cobalt Strike Team Server Certificate", "sha256": "def78e2a7f58ea9d6e4fe790d93765a71427715d5b30ac836d9328fc5afaaa2a", "type": "query", "version": 7 } }, "rule_name": "Default Cobalt Strike Team Server Certificate", "sha256": "def78e2a7f58ea9d6e4fe790d93765a71427715d5b30ac836d9328fc5afaaa2a", "type": "query", "version": 8 }, "e7125cea-9fe1-42a5-9a05-b0792cf86f5a": { "previous": { "8.2": { "rule_name": "Execution of Persistent Suspicious Program", "sha256": "2fdf04b7009cd2472b90eae3023287e0ee8d2592461378505618292c3c102822", "type": "eql", "version": 3 } }, "rule_name": "Execution of Persistent Suspicious Program", "sha256": "2fdf04b7009cd2472b90eae3023287e0ee8d2592461378505618292c3c102822", "type": "eql", "version": 4 }, "e7cd5982-17c8-4959-874c-633acde7d426": { "previous": { "8.2": { "rule_name": "AWS Route Table Modified or Deleted", "sha256": "578a5b981a102054ded368e528ee57d95054d91b0072fbcc421641ff6240aa78", "type": "query", "version": 5 } }, "rule_name": "AWS Route Table Modified or Deleted", "sha256": "578a5b981a102054ded368e528ee57d95054d91b0072fbcc421641ff6240aa78", "type": "query", "version": 6 }, "e8571d5f-bea1-46c2-9f56-998de2d3ed95": { "previous": { "8.2": { "rule_name": "Service Control Spawned via Script Interpreter", "sha256": "c2363d4297c17ada60264f950fd5ceeb2522d94d858b1147b05e3cb6e8afa666", "type": "eql", "version": 13 } }, "rule_name": "Service Control Spawned via Script Interpreter", "sha256": "c2363d4297c17ada60264f950fd5ceeb2522d94d858b1147b05e3cb6e8afa666", "type": "eql", "version": 14 }, "e86da94d-e54b-4fb5-b96c-cecff87e8787": { "previous": { "8.2": { "rule_name": "Installation of Security Support Provider", "sha256": "6930fda0828ead9f29766d8893239c3a557c78cd70ddbab9442598fff4688715", "type": "eql", "version": 7 } }, "rule_name": "Installation of Security Support Provider", "sha256": "6930fda0828ead9f29766d8893239c3a557c78cd70ddbab9442598fff4688715", "type": "eql", "version": 8 }, "e90ee3af-45fc-432e-a850-4a58cf14a457": { "previous": { "8.2": { "rule_name": "High Number of Okta User Password Reset or Unlock Attempts", "sha256": "fb61c309a0e0f56c96d87b5b2512051b11481a86ee0ea795f757829a50a88a9a", "type": "threshold", "version": 7 } }, "rule_name": "High Number of Okta User Password Reset or Unlock Attempts", "sha256": "fb61c309a0e0f56c96d87b5b2512051b11481a86ee0ea795f757829a50a88a9a", "type": "threshold", "version": 8 }, "e919611d-6b6f-493b-8314-7ed6ac2e413b": { "previous": { "8.2": { "rule_name": "AWS EC2 VM Export Failure", "sha256": "2c4145f775a63a163c0ab4ba0f428cb98d0671fb1dde6829f9c2b507f433a96a", "type": "query", "version": 4 } }, "rule_name": "AWS EC2 VM Export Failure", "sha256": "2c4145f775a63a163c0ab4ba0f428cb98d0671fb1dde6829f9c2b507f433a96a", "type": "query", "version": 5 }, "e94262f2-c1e9-4d3f-a907-aeab16712e1a": { "previous": { "8.2": { "rule_name": "Unusual Executable File Creation by a System Critical Process", "sha256": "1525ec0087caa20e049ab4ebd2fdf4d75cb1fd1370bff99ce6dc73770aed7a1b", "type": "eql", "version": 7 } }, "rule_name": "Unusual Executable File Creation by a System Critical Process", "sha256": "1525ec0087caa20e049ab4ebd2fdf4d75cb1fd1370bff99ce6dc73770aed7a1b", "type": "eql", "version": 8 }, "e9abe69b-1deb-4e19-ac4a-5d5ac00f72eb": { "previous": { "8.2": { "rule_name": "Potential LSA Authentication Package Abuse", "sha256": "f8ede6bdaae2f159c71ac86b1366f22fab966c71ac620a890fc4c89930bc6cac", "type": "eql", "version": 3 } }, "rule_name": "Potential LSA Authentication Package Abuse", "sha256": "f8ede6bdaae2f159c71ac86b1366f22fab966c71ac620a890fc4c89930bc6cac", "type": "eql", "version": 4 }, "e9b4a3c7-24fc-49fd-a00f-9c938031eef1": { "previous": { "8.2": { "rule_name": "Linux Restricted Shell Breakout via busybox Shell Evasion", "sha256": "f5726e1a8ce8508e84699dd4648108f26b624ea175aeb4a0cdace248925f0d8a", "type": "eql", "version": 1 } }, "rule_name": "Linux Restricted Shell Breakout via busybox Shell Evasion", "sha256": "f5726e1a8ce8508e84699dd4648108f26b624ea175aeb4a0cdace248925f0d8a", "type": "eql", "version": 2 }, "e9ff9c1c-fe36-4d0d-b3fd-9e0bf4853a62": { "previous": { "8.2": { "rule_name": "Azure Automation Webhook Created", "sha256": "e5b59d184ef3e24f596458f15e28ad91ef1dbafd5dd5dd70da6cda067330f236", "type": "query", "version": 7 } }, "rule_name": "Azure Automation Webhook Created", "sha256": "e5b59d184ef3e24f596458f15e28ad91ef1dbafd5dd5dd70da6cda067330f236", "type": "query", "version": 8 }, "ea0784f0-a4d7-4fea-ae86-4baaf27a6f17": { "previous": { "8.2": { "rule_name": "SSH (Secure Shell) from the Internet", "sha256": "a5b483bc27ea95cd71683dd2f631a41276da2ab442b4d14e2e843c1df6519efa", "type": "query", "version": 8 } }, "rule_name": "SSH (Secure Shell) from the Internet", "sha256": "a5b483bc27ea95cd71683dd2f631a41276da2ab442b4d14e2e843c1df6519efa", "type": "query", "version": 9 }, "ea248a02-bc47-4043-8e94-2885b19b2636": { "previous": { "8.2": { "rule_name": "AWS IAM Brute Force of Assume Role Policy", "sha256": "e782f3b4525be7c780fb64337f04a76fea5509fd810c0f6370639c3008d66591", "type": "threshold", "version": 7 } }, "rule_name": "AWS IAM Brute Force of Assume Role Policy", "sha256": "e782f3b4525be7c780fb64337f04a76fea5509fd810c0f6370639c3008d66591", "type": "threshold", "version": 8 }, "eaa77d63-9679-4ce3-be25-3ba8b795e5fa": { "previous": { "8.2": { "rule_name": "Spike in Firewall Denies", "sha256": "f388ca2c8b8c928235c3197913210b2230cf556ec9fd8573106701a3fb5d07b5", "type": "machine_learning", "version": 2 } }, "rule_name": "Spike in Firewall Denies", "sha256": "f388ca2c8b8c928235c3197913210b2230cf556ec9fd8573106701a3fb5d07b5", "type": "machine_learning", "version": 3 }, "eb079c62-4481-4d6e-9643-3ca499df7aaa": { "previous": { "8.2": { "rule_name": "External Alerts", "sha256": "a85b3601831d4047395d6f38ca712e50515a4e8aa1a91dd3c803b3857d9a38bc", "type": "query", "version": 5 } }, "rule_name": "External Alerts", "sha256": "a85b3601831d4047395d6f38ca712e50515a4e8aa1a91dd3c803b3857d9a38bc", "type": "query", "version": 6 }, "eb610e70-f9e6-4949-82b9-f1c5bcd37c39": { "previous": { "8.2": { "rule_name": "PowerShell Kerberos Ticket Request", "sha256": "f2c04977975186299b4c20414c3fcc749937686fc65d5c023d2bac38d4d7f923", "type": "query", "version": 5 } }, "rule_name": "PowerShell Kerberos Ticket Request", "sha256": "f2c04977975186299b4c20414c3fcc749937686fc65d5c023d2bac38d4d7f923", "type": "query", "version": 6 }, "eb6a3790-d52d-11ec-8ce9-f661ea17fbce": { "previous": { "8.2": { "rule_name": "Suspicious Network Connection Attempt by Root", "sha256": "cace291c8dfc080449471072c9f30a270bbc610c982426d6467b5677cb3e7ddf", "type": "eql", "version": 3 } }, "rule_name": "Suspicious Network Connection Attempt by Root", "sha256": "cace291c8dfc080449471072c9f30a270bbc610c982426d6467b5677cb3e7ddf", "type": "eql", "version": 4 }, "eb9eb8ba-a983-41d9-9c93-a1c05112ca5e": { "previous": { "8.2": { "rule_name": "Potential Disabling of SELinux", "sha256": "d20cddc6cb9b6be1cd6a7423949f3879c7f7f43a3b4fc8387febbac8372dcba4", "type": "query", "version": 8 } }, "rule_name": "Potential Disabling of SELinux", "sha256": "d20cddc6cb9b6be1cd6a7423949f3879c7f7f43a3b4fc8387febbac8372dcba4", "type": "query", "version": 9 }, "ebb200e8-adf0-43f8-a0bb-4ee5b5d852c6": { "previous": { "8.2": { "rule_name": "Mimikatz Memssp Log File Detected", "sha256": "228f6f139ec1c9c8b08ad6ec16b70da46edc27cfe4f6e0cd704fb38e4c37b7b1", "type": "eql", "version": 8 } }, "rule_name": "Mimikatz Memssp Log File Detected", "sha256": "228f6f139ec1c9c8b08ad6ec16b70da46edc27cfe4f6e0cd704fb38e4c37b7b1", "type": "eql", "version": 9 }, "ebf1adea-ccf2-4943-8b96-7ab11ca173a5": { "previous": { "8.2": { "rule_name": "IIS HTTP Logging Disabled", "sha256": "7379a9e4b38b8ab051194763cfb39573689221db20c6e687894566e30663a7a1", "type": "eql", "version": 9 } }, "rule_name": "IIS HTTP Logging Disabled", "sha256": "7379a9e4b38b8ab051194763cfb39573689221db20c6e687894566e30663a7a1", "type": "eql", "version": 10 }, "ebfe1448-7fac-4d59-acea-181bd89b1f7f": { "previous": { "8.2": { "rule_name": "Process Execution from an Unusual Directory", "sha256": "27ef752b89998ad4fbbcf57fcade195acad503f119848acd7db14bd548dedbd0", "type": "eql", "version": 6 } }, "rule_name": "Process Execution from an Unusual Directory", "sha256": "27ef752b89998ad4fbbcf57fcade195acad503f119848acd7db14bd548dedbd0", "type": "eql", "version": 7 }, "ec8efb0c-604d-42fa-ac46-ed1cfbc38f78": { "previous": { "8.2": { "rule_name": "Microsoft 365 Inbox Forwarding Rule Created", "sha256": "f457cdac67081b41b3cca57d3a4be01720e798d44c449fa7bde775f77de8c2b0", "type": "query", "version": 6 } }, "rule_name": "Microsoft 365 Inbox Forwarding Rule Created", "sha256": "f457cdac67081b41b3cca57d3a4be01720e798d44c449fa7bde775f77de8c2b0", "type": "query", "version": 7 }, "ecf2b32c-e221-4bd4-aa3b-c7d59b3bc01d": { "previous": { "8.2": { "rule_name": "AWS RDS Instance/Cluster Stoppage", "sha256": "16f3aa6331c7ab9a27ff61ac841ed9388c880da58d0a9f05015dda9354c2f6f5", "type": "query", "version": 7 } }, "rule_name": "AWS RDS Instance/Cluster Stoppage", "sha256": "16f3aa6331c7ab9a27ff61ac841ed9388c880da58d0a9f05015dda9354c2f6f5", "type": "query", "version": 8 }, "ed9ecd27-e3e6-4fd9-8586-7754803f7fc8": { "previous": { "8.2": { "rule_name": "Azure Global Administrator Role Addition to PIM User", "sha256": "2bcddb0c020341ebfe3dcf8d5f57f929f17ae536598101452d7d9b1419e6176f", "type": "query", "version": 7 } }, "rule_name": "Azure Global Administrator Role Addition to PIM User", "sha256": "2bcddb0c020341ebfe3dcf8d5f57f929f17ae536598101452d7d9b1419e6176f", "type": "query", "version": 8 }, "eda499b8-a073-4e35-9733-22ec71f57f3a": { "previous": { "8.2": { "rule_name": "AdFind Command Activity", "sha256": "6066406fc5832c00400b2662b56f9e9cff4875ff349e6932dab06ac0d30c21e5", "type": "eql", "version": 10 } }, "rule_name": "AdFind Command Activity", "sha256": "6066406fc5832c00400b2662b56f9e9cff4875ff349e6932dab06ac0d30c21e5", "type": "eql", "version": 11 }, "edb91186-1c7e-4db8-b53e-bfa33a1a0a8a": { "previous": { "8.2": { "rule_name": "Attempt to Deactivate an Okta Application", "sha256": "1d7183696bff8175c0bf7984bac44c90267b9aaf49765a7b877b14bafd1d562f", "type": "query", "version": 6 } }, "rule_name": "Attempt to Deactivate an Okta Application", "sha256": "1d7183696bff8175c0bf7984bac44c90267b9aaf49765a7b877b14bafd1d562f", "type": "query", "version": 7 }, "edf8ee23-5ea7-4123-ba19-56b41e424ae3": { "min_stack_version": "8.2", "previous": { "7.16": { "rule_name": "ImageLoad via Windows Update Auto Update Client", "sha256": "ce1db93b10b8a940e45490c31cdb384062d41c0cb6395c3cc706e1de4c9cb46c", "type": "eql", "version": 7 }, "8.2": { "rule_name": "ImageLoad via Windows Update Auto Update Client", "sha256": "d8a2c21710519775b99328290a6e140ea3e75c3e833cd07dd9ac0b07dc7d6b31", "type": "eql", "version": 9 } }, "rule_name": "ImageLoad via Windows Update Auto Update Client", "sha256": "d8a2c21710519775b99328290a6e140ea3e75c3e833cd07dd9ac0b07dc7d6b31", "type": "eql", "version": 9 }, "ee5300a7-7e31-4a72-a258-250abb8b3aa1": { "min_stack_version": "7.16", "previous": { "7.16": { "rule_name": "Unusual Print Spooler Child Process", "sha256": "fe16e0a19a093e954a5c00eb0065d8cb2c1f7064b970bee83ceb761555c259c2", "type": "eql", "version": 4 }, "8.2": { "rule_name": "Unusual Print Spooler Child Process", "sha256": "3fe25e314cdcf16071088596e01b717c7be9354046ef5d784a23e38b8b1decc2", "type": "eql", "version": 8 } }, "rule_name": "Unusual Print Spooler Child Process", "sha256": "3fe25e314cdcf16071088596e01b717c7be9354046ef5d784a23e38b8b1decc2", "type": "eql", "version": 9 }, "ee619805-54d7-4c56-ba6f-7717282ddd73": { "previous": { "8.2": { "rule_name": "Linux Restricted Shell Breakout via crash Shell evasion", "sha256": "284931b7332c5d8775ad1b0d93e012b6b7391afd6b546209c576ebbb44f85a80", "type": "eql", "version": 1 } }, "rule_name": "Linux Restricted Shell Breakout via crash Shell evasion", "sha256": "284931b7332c5d8775ad1b0d93e012b6b7391afd6b546209c576ebbb44f85a80", "type": "eql", "version": 2 }, "eea82229-b002-470e-a9e1-00be38b14d32": { "previous": { "8.2": { "rule_name": "Potential Privacy Control Bypass via TCCDB Modification", "sha256": "2ea934f6af15bdbb3fd47cd5fe8c0016a6408c99beb97954a13e14b0f808437a", "type": "eql", "version": 5 } }, "rule_name": "Potential Privacy Control Bypass via TCCDB Modification", "sha256": "2ea934f6af15bdbb3fd47cd5fe8c0016a6408c99beb97954a13e14b0f808437a", "type": "eql", "version": 6 }, "ef04a476-07ec-48fc-8f3d-5e1742de76d3": { "previous": { "8.2": { "rule_name": "BPF filter applied using TC", "sha256": "a45bca6f177105ff77836c134bd1664a95a690cb62b20d6197294a472a3afb8b", "type": "eql", "version": 2 } }, "rule_name": "BPF filter applied using TC", "sha256": "a45bca6f177105ff77836c134bd1664a95a690cb62b20d6197294a472a3afb8b", "type": "eql", "version": 3 }, "ef862985-3f13-4262-a686-5f357bbb9bc2": { "previous": { "8.2": { "rule_name": "Whoami Process Activity", "sha256": "534106656edfc2ee298abcd56b00b229a452f186977558a0a3055d37dbc44742", "type": "eql", "version": 11 } }, "rule_name": "Whoami Process Activity", "sha256": "5d0df796ec4949e95ecae211e8fb18e273a374f3d3734268dd12166a9e7b0928", "type": "eql", "version": 13 }, "f036953a-4615-4707-a1ca-dc53bf69dcd5": { "previous": { "8.2": { "rule_name": "Unusual Child Processes of RunDLL32", "sha256": "8d67a8375de7566c481810000983ab19af7c13f0d3cdabf4e29a7edf7fddd825", "type": "eql", "version": 6 } }, "rule_name": "Unusual Child Processes of RunDLL32", "sha256": "8d67a8375de7566c481810000983ab19af7c13f0d3cdabf4e29a7edf7fddd825", "type": "eql", "version": 7 }, "f0493cb4-9b15-43a9-9359-68c23a7f2cf3": { "previous": { "8.2": { "rule_name": "Suspicious HTML File Creation", "sha256": "29eb6c6d14b086aa1b1c7556988f00658c69cbb37fec3e21ca03b568452f1720", "type": "eql", "version": 2 } }, "rule_name": "Suspicious HTML File Creation", "sha256": "29eb6c6d14b086aa1b1c7556988f00658c69cbb37fec3e21ca03b568452f1720", "type": "eql", "version": 3 }, "f06414a6-f2a4-466d-8eba-10f85e8abf71": { "previous": { "8.2": { "rule_name": "Administrator Role Assigned to an Okta User", "sha256": "01e9c35d451ee51ce6555cb2e69118ea0af2b526abe9523361d4adedc8eacb23", "type": "query", "version": 6 } }, "rule_name": "Administrator Role Assigned to an Okta User", "sha256": "01e9c35d451ee51ce6555cb2e69118ea0af2b526abe9523361d4adedc8eacb23", "type": "query", "version": 7 }, "f0b48bbc-549e-4bcf-8ee0-a7a72586c6a7": { "previous": { "8.2": { "rule_name": "Attempt to Remove File Quarantine Attribute", "sha256": "a6529b64b559bd8bd42c20e78b8414e067f080935f145dcd144069d59b193065", "type": "eql", "version": 6 } }, "rule_name": "Attempt to Remove File Quarantine Attribute", "sha256": "a6529b64b559bd8bd42c20e78b8414e067f080935f145dcd144069d59b193065", "type": "eql", "version": 7 }, "f0bc081a-2346-4744-a6a4-81514817e888": { "previous": { "8.2": { "rule_name": "Azure Alert Suppression Rule Created or Modified", "sha256": "2183384bcc6041752cf41516ee30721db4d87c33c6cc490a4e40f725792feeff", "type": "query", "version": 4 } }, "rule_name": "Azure Alert Suppression Rule Created or Modified", "sha256": "2183384bcc6041752cf41516ee30721db4d87c33c6cc490a4e40f725792feeff", "type": "query", "version": 5 }, "f0eb70e9-71e9-40cd-813f-bf8e8c812cb1": { "previous": { "8.2": { "rule_name": "Execution with Explicit Credentials via Scripting", "sha256": "f4436ecb9166018d1599495e008b01508f468324cbc863916483dbb05bfef6f2", "type": "query", "version": 4 } }, "rule_name": "Execution with Explicit Credentials via Scripting", "sha256": "f4436ecb9166018d1599495e008b01508f468324cbc863916483dbb05bfef6f2", "type": "query", "version": 5 }, "f24bcae1-8980-4b30-b5dd-f851b055c9e7": { "previous": { "8.2": { "rule_name": "Creation of Hidden Login Item via Apple Script", "sha256": "69f6e9352509b644c95ad43357cb6f9d3c39cb13a3a793ba5844232554883eda", "type": "eql", "version": 4 } }, "rule_name": "Creation of Hidden Login Item via Apple Script", "sha256": "69f6e9352509b644c95ad43357cb6f9d3c39cb13a3a793ba5844232554883eda", "type": "eql", "version": 5 }, "f28e2be4-6eca-4349-bdd9-381573730c22": { "previous": { "8.2": { "rule_name": "Potential OpenSSH Backdoor Logging Activity", "sha256": "d48192062bd0af2ed545308c339e302c6dcd8cdff8066bc1737b54bae82841f6", "type": "eql", "version": 4 } }, "rule_name": "Potential OpenSSH Backdoor Logging Activity", "sha256": "d48192062bd0af2ed545308c339e302c6dcd8cdff8066bc1737b54bae82841f6", "type": "eql", "version": 5 }, "f2c7b914-eda3-40c2-96ac-d23ef91776ca": { "previous": { "8.2": { "rule_name": "SIP Provider Modification", "sha256": "5262a4e6073b071fc281f6e7520b0fd5d2dc72fe5ee12be03ff920741797cf9b", "type": "eql", "version": 3 } }, "rule_name": "SIP Provider Modification", "sha256": "5262a4e6073b071fc281f6e7520b0fd5d2dc72fe5ee12be03ff920741797cf9b", "type": "eql", "version": 4 }, "f2f46686-6f3c-4724-bd7d-24e31c70f98f": { "min_stack_version": "8.2", "previous": { "7.16": { "rule_name": "LSASS Memory Dump Creation", "sha256": "3e6e50826d519b95be8230a60471e7347a0cf1a3f68d2aa857aac4ce300b05a7", "type": "eql", "version": 9 }, "8.2": { "rule_name": "LSASS Memory Dump Creation", "sha256": "d5ea7927774ec7e899aabbe5ff76bbf6320747fab152f3060a53f0ffa131d1a0", "type": "eql", "version": 11 } }, "rule_name": "LSASS Memory Dump Creation", "sha256": "d5ea7927774ec7e899aabbe5ff76bbf6320747fab152f3060a53f0ffa131d1a0", "type": "eql", "version": 11 }, "f30f3443-4fbb-4c27-ab89-c3ad49d62315": { "previous": { "8.2": { "rule_name": "AWS RDS Instance Creation", "sha256": "2df8ac1aaabae7c8c3f0efc22b7851cb24e160195b8a7f7757705c1328737d76", "type": "query", "version": 5 } }, "rule_name": "AWS RDS Instance Creation", "sha256": "2df8ac1aaabae7c8c3f0efc22b7851cb24e160195b8a7f7757705c1328737d76", "type": "query", "version": 6 }, "f3475224-b179-4f78-8877-c2bd64c26b88": { "previous": { "8.2": { "rule_name": "WMI Incoming Lateral Movement", "sha256": "f5d3902ff9b854f19e046b13efc5652fb3357e2ba0b6a03004af5dbf6ad65498", "type": "eql", "version": 5 } }, "rule_name": "WMI Incoming Lateral Movement", "sha256": "f5d3902ff9b854f19e046b13efc5652fb3357e2ba0b6a03004af5dbf6ad65498", "type": "eql", "version": 6 }, "f37f3054-d40b-49ac-aa9b-a786c74c58b8": { "previous": { "8.2": { "rule_name": "Sudo Heap-Based Buffer Overflow Attempt", "sha256": "7ae7a67bf3618c7bd90ff834cec03ddfb7fdde73bf2786adcae9331c93b735ee", "type": "threshold", "version": 2 } }, "rule_name": "Sudo Heap-Based Buffer Overflow Attempt", "sha256": "7ae7a67bf3618c7bd90ff834cec03ddfb7fdde73bf2786adcae9331c93b735ee", "type": "threshold", "version": 3 }, "f44fa4b6-524c-4e87-8d9e-a32599e4fb7c": { "previous": { "8.2": { "rule_name": "Persistence via Microsoft Office AddIns", "sha256": "8b716970a3ae6c3521ac2c34930178185ecc89e9a9cb83bca9e682e1ef1505c3", "type": "eql", "version": 6 } }, "rule_name": "Persistence via Microsoft Office AddIns", "sha256": "8b716970a3ae6c3521ac2c34930178185ecc89e9a9cb83bca9e682e1ef1505c3", "type": "eql", "version": 7 }, "f494c678-3c33-43aa-b169-bb3d5198c41d": { "previous": { "8.2": { "rule_name": "Sensitive Privilege SeEnableDelegationPrivilege assigned to a User", "sha256": "9bf14a6e899e66713cc68e923fec0464974a147ca6e00806fbc7b72a00fc2ea2", "type": "query", "version": 5 } }, "rule_name": "Sensitive Privilege SeEnableDelegationPrivilege assigned to a User", "sha256": "9bf14a6e899e66713cc68e923fec0464974a147ca6e00806fbc7b72a00fc2ea2", "type": "query", "version": 6 }, "f52362cd-baf1-4b6d-84be-064efc826461": { "previous": { "8.2": { "rule_name": "Linux Restricted Shell Breakout via flock Shell evasion", "sha256": "9a30702aaa4b583d4dfed22529c75be33a32d661580c7885d29a45fb627ec6b7", "type": "eql", "version": 1 } }, "rule_name": "Linux Restricted Shell Breakout via flock Shell evasion", "sha256": "9a30702aaa4b583d4dfed22529c75be33a32d661580c7885d29a45fb627ec6b7", "type": "eql", "version": 2 }, "f545ff26-3c94-4fd0-bd33-3c7f95a3a0fc": { "previous": { "8.2": { "rule_name": "Windows Script Executing PowerShell", "sha256": "0eea0b65385ccfaffea183f5d8fe0dc99646b80e0ce365c4bb3a9626d4e8d7b4", "type": "eql", "version": 13 } }, "rule_name": "Windows Script Executing PowerShell", "sha256": "0eea0b65385ccfaffea183f5d8fe0dc99646b80e0ce365c4bb3a9626d4e8d7b4", "type": "eql", "version": 14 }, "f63c8e3c-d396-404f-b2ea-0379d3942d73": { "previous": { "8.2": { "rule_name": "Windows Firewall Disabled via PowerShell", "sha256": "44c57bc161ee1e3d503a79ed1594a516a66e383ee248401a96dba30cb0c84122", "type": "eql", "version": 7 } }, "rule_name": "Windows Firewall Disabled via PowerShell", "sha256": "44c57bc161ee1e3d503a79ed1594a516a66e383ee248401a96dba30cb0c84122", "type": "eql", "version": 8 }, "f675872f-6d85-40a3-b502-c0d2ef101e92": { "previous": { "8.2": { "rule_name": "Delete Volume USN Journal with Fsutil", "sha256": "84ff62e38a254252fdbee7dd54a05c1d28934e10e02a095f611c07747cda8c2c", "type": "eql", "version": 12 } }, "rule_name": "Delete Volume USN Journal with Fsutil", "sha256": "84ff62e38a254252fdbee7dd54a05c1d28934e10e02a095f611c07747cda8c2c", "type": "eql", "version": 13 }, "f683dcdf-a018-4801-b066-193d4ae6c8e5": { "previous": { "8.2": { "rule_name": "SoftwareUpdate Preferences Modification", "sha256": "14d44860e159f1c957f42bccf3f51ce2cfa26c9fc283f9f21eff1e52096dfcaa", "type": "query", "version": 2 } }, "rule_name": "SoftwareUpdate Preferences Modification", "sha256": "14d44860e159f1c957f42bccf3f51ce2cfa26c9fc283f9f21eff1e52096dfcaa", "type": "query", "version": 3 }, "f766ffaf-9568-4909-b734-75d19b35cbf4": { "previous": { "8.2": { "rule_name": "Azure Service Principal Credentials Added", "sha256": "60abce2112c71ffdd5cc301d683fe30d4f3ef9462959641be4987634ac452474", "type": "query", "version": 4 } }, "rule_name": "Azure Service Principal Credentials Added", "sha256": "60abce2112c71ffdd5cc301d683fe30d4f3ef9462959641be4987634ac452474", "type": "query", "version": 5 }, "f772ec8a-e182-483c-91d2-72058f76a44c": { "previous": { "8.2": { "rule_name": "AWS CloudWatch Alarm Deletion", "sha256": "4eaf60e5412ecfdd14fef03492de085caeb67e3759d25d337ed592a4d937f76c", "type": "query", "version": 9 } }, "rule_name": "AWS CloudWatch Alarm Deletion", "sha256": "4eaf60e5412ecfdd14fef03492de085caeb67e3759d25d337ed592a4d937f76c", "type": "query", "version": 10 }, "f7c4dc5a-a58d-491d-9f14-9b66507121c0": { "previous": { "8.2": { "rule_name": "Persistent Scripts in the Startup Directory", "sha256": "da2561988baf9f0171a26e41a80e7924b7371984fca58c3fd1662dd767f6a3a9", "type": "eql", "version": 7 } }, "rule_name": "Persistent Scripts in the Startup Directory", "sha256": "da2561988baf9f0171a26e41a80e7924b7371984fca58c3fd1662dd767f6a3a9", "type": "eql", "version": 8 }, "f81ee52c-297e-46d9-9205-07e66931df26": { "previous": { "8.2": { "rule_name": "Microsoft Exchange Worker Spawning Suspicious Processes", "sha256": "d641237aa9ee963766061572dd0b8b367a932277639333967115dfcc6e36cdb9", "type": "eql", "version": 5 } }, "rule_name": "Microsoft Exchange Worker Spawning Suspicious Processes", "sha256": "d641237aa9ee963766061572dd0b8b367a932277639333967115dfcc6e36cdb9", "type": "eql", "version": 6 }, "f85ce03f-d8a8-4c83-acdc-5c8cd0592be7": { "previous": { "8.2": { "rule_name": "Suspicious Child Process of Adobe Acrobat Reader Update Service", "sha256": "0535a4c3fe822272a67d12fd5fab71556d90c54dd17cd4702af6a45db6588d1f", "type": "query", "version": 2 } }, "rule_name": "Suspicious Child Process of Adobe Acrobat Reader Update Service", "sha256": "0535a4c3fe822272a67d12fd5fab71556d90c54dd17cd4702af6a45db6588d1f", "type": "query", "version": 3 }, "f874315d-5188-4b4a-8521-d1c73093a7e4": { "previous": { "8.2": { "rule_name": "Modification of AmsiEnable Registry Key", "sha256": "5ebee476de3aadc8d6bec46ede1398e84614f270dc5c834a19d1adf957b0c0e1", "type": "eql", "version": 7 } }, "rule_name": "Modification of AmsiEnable Registry Key", "sha256": "5ebee476de3aadc8d6bec46ede1398e84614f270dc5c834a19d1adf957b0c0e1", "type": "eql", "version": 8 }, "f9590f47-6bd5-4a49-bd49-a2f886476fb9": { "min_stack_version": "8.3", "previous": { "7.16": { "rule_name": "Unusual Linux System Network Configuration Discovery", "sha256": "e0d27723f14bfc1f2d57f46507f432ac8447aeedaa48ac60222193653c4ea2a8", "type": "machine_learning", "version": 2 }, "8.2": { "rule_name": "Unusual Linux System Network Configuration Discovery", "sha256": "14d20e2e82e941edcdbd220e8a8452c2b7c3d439345f8c165c7028552891d60d", "type": "machine_learning", "version": 3 } }, "rule_name": "Unusual Linux System Network Configuration Discovery", "sha256": "14d20e2e82e941edcdbd220e8a8452c2b7c3d439345f8c165c7028552891d60d", "type": "machine_learning", "version": 4 }, "f994964f-6fce-4d75-8e79-e16ccc412588": { "previous": { "8.2": { "rule_name": "Suspicious Activity Reported by Okta User", "sha256": "63bf340350b8b593d28ec081ac9cda0e246500e5115d6613d57001bbfef4a3e9", "type": "query", "version": 8 } }, "rule_name": "Suspicious Activity Reported by Okta User", "sha256": "63bf340350b8b593d28ec081ac9cda0e246500e5115d6613d57001bbfef4a3e9", "type": "query", "version": 9 }, "fa01341d-6662-426b-9d0c-6d81e33c8a9d": { "previous": { "8.2": { "rule_name": "Remote File Copy to a Hidden Share", "sha256": "569766bec372711851a155fc64514fe8421e5c3db5f3c6e3b0ce5eb2b290fb6e", "type": "eql", "version": 6 } }, "rule_name": "Remote File Copy to a Hidden Share", "sha256": "569766bec372711851a155fc64514fe8421e5c3db5f3c6e3b0ce5eb2b290fb6e", "type": "eql", "version": 7 }, "fb02b8d3-71ee-4af1-bacd-215d23f17efa": { "min_stack_version": "7.16", "previous": { "7.16": { "rule_name": "Network Connection via Registration Utility", "sha256": "cdee88e91070d7a8c85aaec9d595418a9392d5e0a0a561789d4a51234aa790c8", "type": "eql", "version": 10 }, "8.2": { "rule_name": "Network Connection via Registration Utility", "sha256": "8c7eab8a4a361830ac00729ea391f70f4d90a8e9e3a9c14bdfaf0b9f8612fa75", "type": "eql", "version": 13 } }, "rule_name": "Network Connection via Registration Utility", "sha256": "8c7eab8a4a361830ac00729ea391f70f4d90a8e9e3a9c14bdfaf0b9f8612fa75", "type": "eql", "version": 14 }, "fb9937ce-7e21-46bf-831d-1ad96eac674d": { "previous": { "8.2": { "rule_name": "Auditd Max Failed Login Attempts", "sha256": "10e3eb490a17e954aaf3fe1059a57a5b3f7f064eeea3e41b6ac7799bde4ce412", "type": "query", "version": 1 } }, "rule_name": "Auditd Max Failed Login Attempts", "sha256": "10e3eb490a17e954aaf3fe1059a57a5b3f7f064eeea3e41b6ac7799bde4ce412", "type": "query", "version": 2 }, "fbd44836-0d69-4004-a0b4-03c20370c435": { "previous": { "8.2": { "rule_name": "AWS Configuration Recorder Stopped", "sha256": "fcbbf3876a8263b501994582b3e99b2ddf5a90b3d71dc2b2dbf4a90b4ef5f3d0", "type": "query", "version": 8 } }, "rule_name": "AWS Configuration Recorder Stopped", "sha256": "fcbbf3876a8263b501994582b3e99b2ddf5a90b3d71dc2b2dbf4a90b4ef5f3d0", "type": "query", "version": 9 }, "fc7c0fa4-8f03-4b3e-8336-c5feab0be022": { "previous": { "8.2": { "rule_name": "UAC Bypass Attempt via Elevated COM Internet Explorer Add-On Installer", "sha256": "583a2e68141b9adacd617c3da8517b10e3e9ee5f7d897dfdf86b060d095bb4f4", "type": "eql", "version": 7 } }, "rule_name": "UAC Bypass Attempt via Elevated COM Internet Explorer Add-On Installer", "sha256": "583a2e68141b9adacd617c3da8517b10e3e9ee5f7d897dfdf86b060d095bb4f4", "type": "eql", "version": 8 }, "fd3fc25e-7c7c-4613-8209-97942ac609f6": { "previous": { "8.2": { "rule_name": "Linux Restricted Shell Breakout via the expect command", "sha256": "39518f23768d9d8d0aee453661f03bc6b0f23cbb1de79fc370a7816ecebba032", "type": "eql", "version": 1 } }, "rule_name": "Linux Restricted Shell Breakout via the expect command", "sha256": "39518f23768d9d8d0aee453661f03bc6b0f23cbb1de79fc370a7816ecebba032", "type": "eql", "version": 2 }, "fd4a992d-6130-4802-9ff8-829b89ae801f": { "previous": { "8.2": { "rule_name": "Potential Application Shimming via Sdbinst", "sha256": "4b763acfaf2892abb41f28cb3f0381a3742bfc4456a0b2001aafd8c4fe93cd26", "type": "eql", "version": 11 } }, "rule_name": "Potential Application Shimming via Sdbinst", "sha256": "4b763acfaf2892abb41f28cb3f0381a3742bfc4456a0b2001aafd8c4fe93cd26", "type": "eql", "version": 12 }, "fd70c98a-c410-42dc-a2e3-761c71848acf": { "min_stack_version": "8.2", "previous": { "7.16": { "rule_name": "Suspicious CertUtil Commands", "sha256": "72b6aefd420c13f2f9a75c27271f96b8fc4a9d2ba474654cf69f6a5586bab85a", "type": "eql", "version": 14 }, "8.2": { "rule_name": "Suspicious CertUtil Commands", "sha256": "7aafa80bd5d1755dd6faec5fd986c4dd331ab5c5139ef457c089cec992e6dd21", "type": "eql", "version": 16 } }, "rule_name": "Suspicious CertUtil Commands", "sha256": "7aafa80bd5d1755dd6faec5fd986c4dd331ab5c5139ef457c089cec992e6dd21", "type": "eql", "version": 16 }, "fd7a6052-58fa-4397-93c3-4795249ccfa2": { "min_stack_version": "8.2", "previous": { "7.16": { "rule_name": "Svchost spawning Cmd", "sha256": "3d668370d9b557693bef4d3e27feee891c659346bc032f6d62a25a08561cf61f", "type": "eql", "version": 12 }, "8.2": { "rule_name": "Svchost spawning Cmd", "sha256": "8b4f2bf818097982df22d332e04ca889ab109c64f307b5f6561105a8c058be0a", "type": "eql", "version": 14 } }, "rule_name": "Svchost spawning Cmd", "sha256": "1c4aec6373efe193a4250de2efba553b30aafbfb17b9a33cf9a237ef237baa02", "type": "eql", "version": 15 }, "fe794edd-487f-4a90-b285-3ee54f2af2d3": { "previous": { "8.2": { "rule_name": "Microsoft Windows Defender Tampering", "sha256": "8ae9156a1e8b4fc571d581dadad39e033e00b984b7ce4af8939bfbe759cc8958", "type": "eql", "version": 6 } }, "rule_name": "Microsoft Windows Defender Tampering", "sha256": "8ae9156a1e8b4fc571d581dadad39e033e00b984b7ce4af8939bfbe759cc8958", "type": "eql", "version": 7 }, "feeed87c-5e95-4339-aef1-47fd79bcfbe3": { "previous": { "8.2": { "rule_name": "MS Office Macro Security Registry Modifications", "sha256": "2e8be374693ae806c801cd7688bae86a28197f10def63a9645c57e9bbf992ecb", "type": "eql", "version": 5 } }, "rule_name": "MS Office Macro Security Registry Modifications", "sha256": "2e8be374693ae806c801cd7688bae86a28197f10def63a9645c57e9bbf992ecb", "type": "eql", "version": 6 }, "ff013cb4-274d-434a-96bb-fe15ddd3ae92": { "previous": { "8.2": { "rule_name": "Roshal Archive (RAR) or PowerShell File Downloaded from the Internet", "sha256": "1b5384df54d213d82ed03c31b1cc6e0a2eb427f2c87cefc8da2bc88f7313bbb0", "type": "query", "version": 10 } }, "rule_name": "Roshal Archive (RAR) or PowerShell File Downloaded from the Internet", "sha256": "1b5384df54d213d82ed03c31b1cc6e0a2eb427f2c87cefc8da2bc88f7313bbb0", "type": "query", "version": 11 }, "ff4dd44a-0ac6-44c4-8609-3f81bc820f02": { "previous": { "8.2": { "rule_name": "Microsoft 365 Exchange Transport Rule Creation", "sha256": "4f9627d3b6b169fbfa945c83748ecb0c9a8e9b3b4ebcbcc162dcc625c469e507", "type": "query", "version": 8 } }, "rule_name": "Microsoft 365 Exchange Transport Rule Creation", "sha256": "4f9627d3b6b169fbfa945c83748ecb0c9a8e9b3b4ebcbcc162dcc625c469e507", "type": "query", "version": 9 }, "ff9b571e-61d6-4f6c-9561-eb4cca3bafe1": { "previous": { "8.2": { "rule_name": "GCP Firewall Rule Deletion", "sha256": "03a38acfa70739c8c1ab7c0f205e4f0806de8072b4475c2be8b96f1ac65b2b5d", "type": "query", "version": 7 } }, "rule_name": "GCP Firewall Rule Deletion", "sha256": "03a38acfa70739c8c1ab7c0f205e4f0806de8072b4475c2be8b96f1ac65b2b5d", "type": "query", "version": 8 } }