From 18ff85ce84a98a274bf15cbd984e4326be64a56d Mon Sep 17 00:00:00 2001 From: Jonhnathan <26856693+w0rk3r@users.noreply.github.com> Date: Mon, 23 Oct 2023 11:44:37 -0300 Subject: [PATCH] [Promote] Expired or Revoked Driver Loaded (#3185) * [Promote] Expired or Revoked Driver Loaded * Update privilege_escalation_expired_driver_loaded.toml --- .../privilege_escalation_expired_driver_loaded.toml | 6 ++---- 1 file changed, 2 insertions(+), 4 deletions(-) rename {rules_building_block => rules/windows}/privilege_escalation_expired_driver_loaded.toml (93%) diff --git a/rules_building_block/privilege_escalation_expired_driver_loaded.toml b/rules/windows/privilege_escalation_expired_driver_loaded.toml similarity index 93% rename from rules_building_block/privilege_escalation_expired_driver_loaded.toml rename to rules/windows/privilege_escalation_expired_driver_loaded.toml index 1290427c7..72245f0e4 100644 --- a/rules_building_block/privilege_escalation_expired_driver_loaded.toml +++ b/rules/windows/privilege_escalation_expired_driver_loaded.toml @@ -4,8 +4,7 @@ integration = ["endpoint"] maturity = "production" min_stack_comments = "New fields added: required_fields, related_integrations, setup" min_stack_version = "8.3.0" -updated_date = "2023/10/13" -bypass_bbr_timing = true +updated_date = "2023/10/23" [rule] author = ["Elastic"] @@ -24,10 +23,9 @@ references = [ risk_score = 21 rule_id = "d12bac54-ab2a-4159-933f-d7bcefa7b61d" severity = "low" -tags = ["Domain: Endpoint", "OS: Windows", "Use Case: Threat Detection", "Tactic: Privilege Escalation", "Tactic: Defense Evasion", "Rule Type: BBR", "Data Source: Elastic Defend"] +tags = ["Domain: Endpoint", "OS: Windows", "Use Case: Threat Detection", "Tactic: Privilege Escalation", "Tactic: Defense Evasion", "Data Source: Elastic Defend"] timestamp_override = "event.ingested" type = "eql" -building_block_type = "default" query = ''' driver where host.os.type == "windows" and process.pid == 4 and