61deed3fd2
* [Rule Tuning] Add timestamp_override field to 7.11.0 rules * Lock versions for 7.11.2 rules
29 lines
873 B
TOML
29 lines
873 B
TOML
[metadata]
|
|
creation_date = "2020/11/15"
|
|
maturity = "production"
|
|
updated_date = "2020/02/16"
|
|
|
|
[rule]
|
|
author = ["Elastic"]
|
|
description = """
|
|
Identifies process execution with a single character process name. This is often done by adversaries while staging or
|
|
executing temporary utilities.
|
|
"""
|
|
from = "now-9m"
|
|
index = ["winlogbeat-*", "logs-endpoint.events.*"]
|
|
language = "eql"
|
|
license = "Elastic License"
|
|
name = "Suspicious Execution - Short Program Name"
|
|
risk_score = 47
|
|
rule_id = "17c7f6a5-5bc9-4e1f-92bf-13632d24384d"
|
|
severity = "medium"
|
|
tags = ["Elastic", "Host", "Windows", "Threat Detection", "Execution"]
|
|
timestamp_override = "event.ingested"
|
|
type = "eql"
|
|
|
|
query = '''
|
|
process where event.type in ("start", "process_started") and length(process.name) > 0 and
|
|
length(process.name) == 5 and host.os.name == "Windows" and length(process.pe.original_file_name) > 5
|
|
'''
|
|
|