Samirbous
9255dafe53
[New] Detonate LNK TOP Rules ( #4058 )
...
* [New] Detonate LNK TOP Rules
the following two rules are the top ones matching on TPs from detonate for LNK files, converting them to SIEM rules compatible with Sysmon/Winlogbeat, SentinelOne and M365 Defender :
https://github.com/elastic/protections-artifacts/blob/ea2f8dd3b61a7cdf2ce83ca5f06f2096bb62a494/behavior/rules/windows/execution_suspicious_powershell_execution.toml#L8
https://github.com/elastic/protections-artifacts/blob/ea2f8dd3b61a7cdf2ce83ca5f06f2096bb62a494/behavior/rules/windows/execution_suspicious_windows_command_shell_execution.toml#L8
* Update execution_windows_cmd_shell_susp_args.toml
* Update execution_windows_powershell_susp_args.toml
* Update execution_windows_cmd_shell_susp_args.toml
* Update execution_windows_powershell_susp_args.toml
* Update execution_windows_powershell_susp_args.toml
* Update execution_windows_cmd_shell_susp_args.toml
* Update execution_windows_powershell_susp_args.toml
* Update rules/windows/execution_windows_cmd_shell_susp_args.toml
* Update rules/windows/execution_windows_powershell_susp_args.toml
* Update execution_windows_cmd_shell_susp_args.toml
* Update execution_windows_cmd_shell_susp_args.toml
---------
Co-authored-by: Jonhnathan <26856693+w0rk3r@users.noreply.github.com >
2024-09-15 10:49:17 +01:00