diff --git a/rules/windows/defense_evasion_sdelete_like_filename_rename.toml b/rules/windows/defense_evasion_sdelete_like_filename_rename.toml new file mode 100644 index 000000000..65675bef0 --- /dev/null +++ b/rules/windows/defense_evasion_sdelete_like_filename_rename.toml @@ -0,0 +1,42 @@ +[metadata] +creation_date = "2020/08/18" +ecs_version = ["1.6.0"] +maturity = "production" +updated_date = "2020/08/18" + +[rule] +author = ["Elastic"] +description = """ +Detects file name patterns generated by the use of Sysinternals SDelete utility to securely delete a file via multiple +file overwrite and rename operations. +""" +from = "now-9m" +index = ["winlogbeat-*", "logs-endpoint.events.*"] +language = "lucene" +license = "Elastic License" +name = "Potential Secure File Deletion via SDelete Utility" +note = "Verify process details such as command line and hash to confirm this activity legitimacy." +risk_score = 21 +rule_id = "5aee924b-6ceb-4633-980e-1bde8cdb40c5" +severity = "low" +tags = ["Elastic", "Windows"] +type = "query" + +query = ''' +event.category:file AND event.type:change AND file.name:/.+A+\.AAA/ +''' + + +[[rule.threat]] +framework = "MITRE ATT&CK" +[[rule.threat.technique]] +id = "T1107" +name = "File Deletion" +reference = "https://attack.mitre.org/techniques/T1107/" + + +[rule.threat.tactic] +id = "TA0005" +name = "Defense Evasion" +reference = "https://attack.mitre.org/tactics/TA0005/" +