|
1 | 1 | [metadata]
|
2 | 2 | creation_date = "2020/02/18"
|
3 |
| -integration = ["endpoint", "windows"] |
| 3 | +integration = ["endpoint"] |
4 | 4 | maturity = "production"
|
5 | 5 | min_stack_comments = "New fields added: required_fields, related_integrations, setup"
|
6 | 6 | min_stack_version = "8.3.0"
|
7 |
| -updated_date = "2024/01/03" |
| 7 | +updated_date = "2024/01/22" |
8 | 8 |
|
9 | 9 | [transform]
|
10 | 10 | [[transform.osquery]]
|
@@ -41,7 +41,7 @@ connections are established by the kernel. Processes making 445/tcp connections
|
41 | 41 | suspicious user-level processes moving laterally.
|
42 | 42 | """
|
43 | 43 | from = "now-9m"
|
44 |
| -index = ["winlogbeat-*", "logs-endpoint.events.*", "logs-windows.*"] |
| 44 | +index = ["logs-endpoint.events.*"] |
45 | 45 | language = "eql"
|
46 | 46 | license = "Elastic License v2"
|
47 | 47 | name = "Direct Outbound SMB Connection"
|
@@ -104,14 +104,8 @@ query = '''
|
104 | 104 | sequence by process.entity_id with maxspan=2m
|
105 | 105 | [process where host.os.type == "windows" and event.type == "start" and process.pid != 4 and
|
106 | 106 | not user.id : ("S-1-5-19", "S-1-5-20") and
|
107 |
| - not (process.code_signature.trusted == true and not process.code_signature.subject_name : ("Famatech Corp.", "Insecure.Com LLC")) and |
108 |
| - not (process.name : "powershell.exe" and process.args : "?:\\ProgramData\\Microsoft\\Windows Defender Advanced Threat Protection\\Downloads\\PSScript_*.ps1") and |
109 |
| - not (process.executable : "?:\\EnterpriseCare\\tools\\*\\bin\\java.exe" and process.args : "com.*.launcher.Invoker") and |
110 |
| - not (process.executable : "?:\\Docusnap*\\Tools\\*\\nmap.exe" and process.args : "smb-os-discovery.nse") and |
111 |
| - not process.executable : |
112 |
| - ("?:\\Program Files\\*.exe", |
113 |
| - "?:\\Program Files (x86)\\*.exe", |
114 |
| - "?:\\Windows\\ProPatches\\Installation\\InstallationSandbox*\\stdeploy.exe")] |
| 107 | + not (process.code_signature.trusted == true and not process.code_signature.subject_name : "Microsoft *") and |
| 108 | + not (process.name : "powershell.exe" and process.args : "?:\\ProgramData\\Microsoft\\Windows Defender Advanced Threat Protection\\Downloads\\PSScript_*.ps1")] |
115 | 109 | [network where host.os.type == "windows" and destination.port == 445 and process.pid != 4 and
|
116 | 110 | not cidrmatch(destination.ip, "127.0.0.1", "::1")]
|
117 | 111 | until [process where host.os.type == "windows" and event.type == "end"]
|
|
0 commit comments