Files
sigma-rules/rules/ml/ml_windows_anomalous_script.toml
T
Justin Ibarra 79a0dfefbe Add ECS 1.6.0 schema for validation testing (#220)
* Add ecs 1.6.0 and refresh master ecs (2.0.0)
* update rule metadata to use ecs_version 1.6.0
2020-08-27 11:54:49 -05:00

32 lines
979 B
TOML

[metadata]
creation_date = "2020/03/25"
ecs_version = ["1.6.0"]
maturity = "production"
updated_date = "2020/03/25"
[rule]
anomaly_threshold = 50
author = ["Elastic"]
description = """
A machine learning job detected a PowerShell script with unusual data characteristics, such as obfuscation, that may be
a characteristic of malicious PowerShell script text blocks.
"""
false_positives = [
"""
Certain kinds of security testing may trigger this alert. PowerShell scripts that use high levels of obfuscation or
have unusual script block payloads may trigger this alert.
""",
]
from = "now-45m"
interval = "15m"
license = "Elastic License"
machine_learning_job_id = "windows_anomalous_script"
name = "Suspicious Powershell Script"
references = ["https://www.elastic.co/guide/en/security/current/prebuilt-ml-jobs.html"]
risk_score = 21
rule_id = "1781d055-5c66-4adf-9d60-fc0fa58337b6"
severity = "low"
tags = ["Elastic", "ML", "Windows"]
type = "machine_learning"