Files
sigma-rules/rules/ml/ml_windows_anomalous_script.toml
T
Ross Wolf 5fcece8416 Populate rules/ directory.
Co-Authored-By: Brent Murphy <56412096+bm11100@users.noreply.github.com>
Co-Authored-By: Craig Chamberlain <randomuserid@users.noreply.github.com>
Co-Authored-By: David French <56409778+threat-punter@users.noreply.github.com>
Co-Authored-By: Derek Ditch <dcode@users.noreply.github.com>
Co-Authored-By: Justin Ibarra <brokensound77@users.noreply.github.com>
2020-06-29 22:57:03 -06:00

32 lines
983 B
TOML

[metadata]
creation_date = "2020/03/25"
ecs_version = ["1.5.0"]
maturity = "production"
updated_date = "2020/03/25"
[rule]
anomaly_threshold = 50
author = ["Elastic"]
description = """
A machine learning job detected a PowerShell script with unusual data characteristics, such as obfuscation, that may be
a characteristic of malicious PowerShell script text blocks.
"""
false_positives = [
"""
Certain kinds of security testing may trigger this signal. PowerShell scripts that use high levels of obfuscation or
have unusual script block payloads may trigger this signal.
""",
]
from = "now-45m"
interval = "15m"
license = "Elastic License"
machine_learning_job_id = "windows_anomalous_script"
name = "Suspicious Powershell Script"
references = ["https://www.elastic.co/guide/en/siem/guide/current/prebuilt-ml-jobs.html"]
risk_score = 21
rule_id = "1781d055-5c66-4adf-9d60-fc0fa58337b6"
severity = "low"
tags = ["Elastic", "ML", "Windows"]
type = "machine_learning"